Category Archives: PTAC

Linking It All Together: Ready, Set, Go!

This third of three mini-webinars presented during Linking Week 2017, reviewed lessons learned from the week and shared resources and supports that address specific data linking needs. Presented by Sharon Walsh, Duane Brown, Bruce Bull, & Baron Rodriguez in May 2017 Link to Recording Link to Presentation

Understanding what HIPAA Is and Is Not

Screen shot: When does FERPA Apply to EC Organizations? slide

Presenters: Baron Rodriguez (DaSy, EDTAP, PTAC), Ann Agnew (DaSy), & Ross Lemke (IDC) The session covers working knowledge on HIPAA regulations and requirements as well as ways HIPAA and FERPA overlap or interact. Participants will gain knowledge about HIPAA as it relates to Part C and Part B 619 agencies, programs, and service providers. Aspects […]

Data Breach Simulation

Title slide: Data Breach Exercise

Presenters: Baron Rodriguez (DaSy, EDTAP, PTAC) & Ross Lemke (IDC) This interactive session walks teams through a data breach scenario ‘ripped from the headlines’!. The intended outcome is to ready teams for the twists, turns, and bad assumptions or decisions made that sometimes can be more damaging than the data breach. Link to Presentation

2015 Early Childhood Privacy and Confidentiality Workshop

PTAC logo: padlock

Conference: Early Childhood Privacy and Confidentiality Workshop Date: February 2015 Presenters: Baron Rodriguez, Frank Miller, Joyce Popp, Sharon Walsh, Robin Nelson, & Missy Cochenour This presentation is focused on the privacy and security of data in the early childhood sector. State teams were invited to participate in an all-day training where they learned about FERPA […]

Data De-identification: An Overview of Basic Terms

Types of data by sensitivity

This 2014 document is intended to assist early intervention service programs and providers and preschool special education programs and agencies in maintaining compliance with privacy and confidentiality requirements under IDEA and FERPA. It reviews the terminology used to describe data de-identification as well as related concepts and approaches; provides general best practice de-identification strategies for […]