NCES Data Confidentiality and Data Licensing Program Marilyn Seastrom July, 2013 Washington, DC.

Slides:



Advertisements
Similar presentations
FERPA - Sharing Student Information
Advertisements

FERPA: UPDATE ON THE FAMILY EDUCATIONAL RIGHTS AND PRIVACY ACT Presented by Brenda V. S. Selman University Registrar-MU University of Missouri-Columbia.
Overview of the Privacy Act
HIPAA and Public Health 2007 Epi Rapid Response Team Conference.
National Science Foundation Division of Science Resources Statistics May The Confidential Information Protection and Statistical Efficiency Act.
FERPA Family Educational Rights and Privacy Act September 20, 2012Presented by: David Stocker General Counsel ACT, Inc.
COMPLYING WITH HIPAA PRIVACY RULES Presented by: Larry Grudzien, Attorney at Law.
CIPSEA, Confidentiality and the ALMIS Database Roger Therrien Director, Office of Research Connecticut Department of Labor ALMIS Database Seminar San Diego,
1 Office of the General Counsel FERPA  Family Educational Rights and Privacy Act (20 U.S.C § 1232g)
Family Educational Rights and Privacy Act What you need to know...
1 OSHA FEDERAL OCCUPATIONAL SAFETY AND HEALTH ACT (OSHA) OF 1970 George Mason University College of Nursing and Health Science Regulatory Requirements.
1 Disclaimer The following information was presented by Andrew Levy of the Office of General Counsel of DHS on June 12, 2007 at the 2007 Chemical Sector.
Recently Issued OHRP Documents: Guidance on Subject Withdrawal and Draft Revised FWA Secretary’s Advisory Committee on Human Research Protections October.
Developing a Records & Information Retention & Disposition Program:
2/16/2010 The Family Educational Records and Privacy Act.
FERPA The Family Educational Rights and Privacy Act.
1 FERPA and Student Privacy in Records of University Research ECURE March 1, 2005 Richard Rainsberger, Ph.D. Consultant, Education Records Law and Privacy.
What is personally identifiable information (PII)? KDE Employee Training Data Security Video Series 1 of 3 October 2014.
FAMILY EDUCATIONAL RIGHTS AND PRIVACY ACT Electronic Signatures This work is the intellectual property of the author. Permission is granted for this material.
Data Access and Data Sharing KDE Employee Training Data Security Video Series 2 of 3 October 2014.
Federalwide Assurance Presentation for IRB Members.
CUI Statistical: Collaborative Efforts of Federal Statistical Agencies Eve Powell-Griner National Center for Health Statistics.
FERPA Family Educational Rights and Privacy Act and Rebecca Macon Registrar University of Georgia Presentation for GASFAA October.
FERPA at The Catholic University of America Presented by Laura Jacobs Anderson Associate Registrar Office of Enrollment Services.
HIPAA PRIVACY AND SECURITY AWARENESS.
Overview of 2002 CIPSEA: Methods to Protect Confidential Tabular Data Amrut Champaneri, Ph.D. U.S. Department of Transportation Bureau of Transportation.
April 2011 Conducting Research at SPC Approval Process and Procedures Center of Excellence for Teaching and Learning.
Confidentiality and Public Information Act LISD Special Education Department Training SY
707 KAR 1:360 Confidentiality of Information. Section 1: Access Rights 1) An LEA shall permit a parent to inspect and review any education records relating.
Family Educational Rights and Privacy Act. From the moment a child enters the school system, sensitive information is collected about the child (and even.
FERPA: What you Need to Know The Family Educational Rights and Privacy Act & SEI.
HOOVER CITY SCHOOLS In-Service Training: Annual Review of.
Family Educational Rights and Privacy Act (FERPA) UNION COLLEGE.
Calloway County Schools CONFIDENTIALITY TRAINING Protection of Personal Information School Year
HIPAA PRACTICAL APPLICATION WORKSHOP Orientation Module 1B Anderson Health Information Systems, Inc.
Session Title: FERPA: What You Need To Know Presented By: Jeffery Loggins Institution: Mississippi Valley State University September 15, 2015.
FAMIS CONFERENCE Mari M. Presley, Assistant General Counsel Florida Department of Education June 12, 2012.
1 CONFIDENTIALITY. 2 Requirement Under IDEA 34 CFR Sec (c) All staff collecting or using personally identifiable information in public education.
Special Education 101 Elementary Dept. Chair 1/27/2009 Confidentiality.
Rhonda Anderson, RHIA, President  …is a PROCESS, not a PROJECT 2.
When Can You Redact Information Without Requesting an Attorney General Decision? Karen Hattaway Assistant Attorney General Open Records Division Views.
Research & Economic Development Office of Grants and Contracts Administration Data Security Presented by Debbie Bolick September 24, 2015.
FERPA Guidelines for Cooperating Teacher and University Supervisors.
SPECIAL EDUCATION A REVIEW OF:  CHILD FIND/ SPED PROCESS  FERPA AND CONFIDENTIALITY  LENGTH OF SCHOOL DAY.
Configuring Electronic Health Records Privacy and Security in the US Lecture b This material (Comp11_Unit7b) was developed by Oregon Health & Science University.
Human Subjects Research Requirements (EDGAR Part 97) General Rule When federally-supported research involves human subjects, it must be approved by an.
Sharing Information (FERPA) FY07 REMS Initial Grantee Meeting December 5, 2007, San Diego, CA U.S. Department of Education, Office of Safe and Drug-Free.
FERPA for the Financial Aid Office NCASFAA Fall Conference November 2012.
TASFAA 2016 Legacy of Leadership. TASFAA 2016 Legacy of Leadership Family Educational Rights and Privacy Act (FERPA) An Overview Molly Thompson Associate.
The Georgia Open Records Act and ferpa
CCB TECHNICAL ASSISTANCE CALL July 12, :30-1:30 1.
Laws and Regulations. Family Educational Rights and Privacy Act Children’s Online Privacy Protection Act Protection of Pupil Rights Amendment Health Insurance.
Section 4 Policies and legislation AQA ICT A2 Level © Nelson Thornes Section 4: Policies and Legislation Legislation – practical implications.
Welcome to Workforce 3 One U.S. Department of Labor Employment and Training Administration Webinar Date: Thursday, October 23, 2014 Presented by: Division.
POLICIES & PROCEDURES FOR HANDLING CONFIDENTIAL INFORMATION NOVEMBER 5 TH 2015.
HIPAA Training Workshop #3 Individual Rights Kaye L. Rankin Rankin Healthcare Consultants, Inc.
FERPA Family Educational Rights and Privacy Act
Denise Chrysler, JD Director, Mid-States Region
Nassau Association of School Technologists
John Chase USFS PNW RMA Forest Inventory and Analysis
Tomball Independent School District Annual Confidentiality Training
Student Data Privacy and Security
Providing Access to Your Data: Handling sensitive data
Refuah Community Health Collaborative (RCHC) PPS
Disability Services Agencies Briefing On HIPAA
Protecting Student Data/ Financial Aid Data Sharing
Family Educational Rights & Privacy Act (FERPA)
Welcome to the FERPA training for Faculty and Staff.
Confidentiality Training 2014
Presentation transcript:

NCES Data Confidentiality and Data Licensing Program Marilyn Seastrom July, 2013 Washington, DC

What Are NCES Responsibilities Under Law? PART C—NATIONAL CENTER FOR EDUCATION STATISTICS –SECTION DUTIES (a) GENERAL DUTIES.—The Statistics Center shall collect, report, analyze, and disseminate statistical data related to education in the United States and in other nations 2

What Are NCES Responsibilities Under Law? SECTION 154. PERFORMANCE OF DUTIES. 2) SOURCE OF INFORMATION.—The Statistics Commissioner may, as appropriate, use information collected—.. (B) by other offices within the Institute and by other Federal departments, agencies, and instrumentalities. 3

What Are NCES Responsibilities Under Law? SECTION 156. DISSEMINATION The Statistics Center may furnish transcripts or copies of tables and other statistical records and make special statistical compilations and surveys for State and local officials, public and private organizations, and individuals. 4

What Are NCES Authorities Under Law? The Commissioner may utilize temporary staff, including employees of Federal, State, or local agencies …and employees of private organizations to assist the Center in performing the Center’s responsibilities, but only if such temporary staff are sworn to observe the IES confidentiality law. 5

What Confidentiality Laws Apply? Education Sciences Reform Act of 2002 (ESRA 2002) –Privacy Act of 1974, as amended –Family Educational Rights and Privacy Act of 1974 –US Patriot Act of 2001 NCES is also covered under the E-Government Act of 2002, Title V, Subtitle A, Confidential Information Protection (CIP 2002) 6

IES Confidentiality Law Education Sciences Reform Act of 2002 (ESRA) All individually identifiable information about students, their families, and their schools shall remain confidential. The law requires that no person may: Use any individually identifiable information collected under an ERSA nondisclosure pledge for any nonstatistical purpose, except in the case of terrorism; 7

IES Confidentiality Law Make any publication whereby the data for a particular person can be identified Permit anyone other than the individuals authorized by the Director to examine the individual reports. Individually identifiable information is immune from legal process, and shall not, without the consent of the individual concerned, be admitted as evidence or used for any purpose in any action, suit, or other judicial or administrative proceeding, except in the case of terrorism. 8

IES Confidentiality Law Employees, including temporary employees, or other persons who have sworn to observe the limitations imposed by this law, who knowingly publish or communicate any individually identifiable information will be subject to fines of up to $250,000, or up to 5 years in prison, or both (Class E felony). 9

How Does IES Release Data? Released data are designated either restricted- use or public-use. –Restricted-use data have all direct identifiers removed and either include confidentiality edits performed (data perturbation) or are subject to cell size restrictions in data releases. 10

How Does IES Release Data? Released data are designated either restricted- use or public-use. –Public-use sample survey data start from the approved restricted-use data and are subject to disclosure limitation analysis resulting in further perturbations, coarsening, and item suppression 11

How Does IES Release Data? Released data are designated either restricted- use or public-use. –Public-use administrative data start from the restricted-use data and are subject to disclosure limitation analysis resulting in cell suppressions, reporting some aggregate point estimates as ranges, and/or rounding 12

History of Data Licensing System External users are loaned restricted use data through a license between IES, the user, and the user’s institution or organization. –1989: Initiated talks with OMB to start a trial data licensing system; Developed protocol and legal documents –1991: First license issued –2000: 502 restricted-use licenses –2007: Implemented electronic application system –2013: 900 restricted-use licenses 13

What Does a Data License Involve? IES loans restricted-use data only to qualified organizations in the United States. This restriction is because the underlying laws are US laws. Individual researchers must apply through an organization (e.g., a university, a research institution, or company). 14

What Does a Data License Involve? Complete an on-line application Submit signed license document –Primary Researcher –Senior Official at Institution Submit signed and notarized affidavits of nondisclosure for all proposed data users Submit a signed security plan –System Security Officer 15

What Does a Data License Involve? Maintain a data license file and ensure that all authorized users follow the agreed upon terms Participate in unannounced security inspections to ensure compliance Adhere to established publication rules to protect confidential data Submit all release materials to IES Data Security Office for disclosure review 16

What Does a Data License Involve? Notify IES immediately if the researcher receives any legal, investigatory, or other demand for disclosure of subject data. Use the on-line license system to notify IES of any modifications in project operations or security procedures, including any departures or additions to the project staff. The PPO may also submit a request for more data. 17

What Does a Data License Involve? Using the electronic license system to close the License when the research that is the subject of the agreement has been completed or the license terminates, whichever occurs first. –The restricted-use data and all other individually identifiable information (e.g., the one backup copy, working notes) shall be destroyed under IES supervision or by approved IES procedures. 18

What Does a Data License Involve? The researcher must –read the Restricted-Use Data Procedures Manual, –provide a justification for the need for the restricted use data, –submit the required documents, –agree to keep the data safe from unauthorized disclosures at all times, and –agree to participate fully in unannounced, unscheduled inspections by IES Data Security Officials to ensure compliance with the terms of the license and the security procedures and plan. 19

License Lessons Learned Maintain complete and detailed records of all license transactions. Complete annual online training. Value of Security inspections. –Use security inspections to correct minor violations. Need for regular contact with licensees. –Use and automated features of electronic license system to send annual reminders for personnel and security updates. Automate license closeout reminders 20

NCES Contact Information NCES website: NCES Restricted Use License Program: NCES newsflash: sign up at Marilyn Seastrom (202) Thank you

NCES Confidentiality Laws 6

NCES Employees NCES staff take an oath of office. They are informed about the requirements of the confidentiality law. They work in a guarded facility with controlled access. They must monitor the confidentiality of individually identifiable information in their daily activities and in the release of information to the public. 11

Confidential Information The term “individually or personally identifiable information” means any record, response form, completed survey, or aggregation from which information about particular individuals or schools may be revealed. Included are –Direct identifiers (e.g., name, SSN, biometric records, or video image) and –Indirect identifiers (e.g., date and place of birth, mother’s maiden name, gender, age, race/ethnicity, a specific geographical location, or other descriptors which in combination are linkable to a specific individual). 1

CIPSEA Use of Agents Federal statistical agencies may designate agents by contract or special agreement to perform exclusively statistical activities subject to CIPSEA limitations. The agency shall ensure that all agents comply with the agency’s confidentiality procedures. 13

Confidentiality Edits for Sample Survey Data  Use a confidentiality edit to protect data in reporting  Match a sample of records with those from another geographic region on a set of key attributes,  Swap all the attributes on the matched records.  Use these protected files for tabulations. 16

Disclosure Limitation Techniques  Recode variables that have extreme cases (e.g. salaries)  To avoid attribute disclosure that could lead to an identity disclosure  Review data against potential external sources of data that are available for matching  To avoid identity disclosure 19

Cell Size Restrictions for Confidential Sample Survey Data If there are no confidentiality edits and fewer than three cases (i.e., 1 or 2) –Collapse cells--Combine the “sensitive” cell with a related category for a larger cell size until there are no remaining sensitive cells. 17

Cell Size Restrictions for Administrative Data with PII Use reporting rules specified with the restricted use data file –Cell suppression and reporting ranges –Rounding 17

Safeguards and Data Access Disclosure Review Board—technical staff who clear anonymized files for release as public-use file and who approve data perturbations for restricted use files. Data Analysis System—tabulations are provided online using either restricted- or public-use data. Restricted-Use Data Licensing System—NCES data security staff and contractor security investigators issue licenses and conduct inspections. 20

CIPSEA Annual Reporting Requirements List individual surveys collected under a CIPSEA confidentiality pledge List individual surveys collected under another arrangement, including promises made for data protection, if any Report on agency data protection procedures Report on the number of existing agents –Contractors –Licensees 14

NCES Confidentiality Laws The Privacy Act of 1974—“to provide certain safeguards for an individual against invasion of personal privacy…” Violation is a misdemeanor and is subject to a fine up to $5,000. 2

NCES Confidentiality Laws The Family Educational Rights and Privacy Act (20 U.S.C. § 1232g; 34 CFR Part 99) protects the privacy of student education records. FERPA applies to student record data in all schools that receive funds under an applicable program of the U.S. Department of Education. FERPA allows schools to disclose those records to specified officials for audit or evaluation purposes. FERPA applies to administrative record data that NCES obtains from the school or institution without the explicit written consent of the parent or student. 4

CIPSEA Confidential Information Protection and Statistical Efficiency Act of 2002 (CIPSEA) (44 USC 3501) Protects information supplied by individuals or organizations information under a pledge of confidentiality for statistical purposes from disclosure in identifiable form and from nonstatistical uses  Violation—Class E Felony with a fine up to $250,000, or up to five years imprisonment, or both. 12

Types of Disclosures  Three types of disclosure:  Identity disclosure--third party can identify a subject from released data  Attribute disclosure--confidential information about a subject is revealed and can be attributed to the subject  Inferential disclosure--information can be inferred with high confidence from statistical properties of released data  Statistical agencies are concerned with identity and attribute disclosure. 14