Topics » Privacy and Confidentiality The use of quality early intervention and education data enables policymakers, administrators, educators, service providers and parents to design and implement effective practices to improve […]
Category Archives: Toolkit Support Pages
Data Sharing Agreement Checklist for IDEA Part C and Part B 619 Agencies and Programs
This 2014 document is an adaptation of the 2012 release of “Data Sharing Agreement Checklist” intended for K-12 audiences. Presented as a checklist, the document summarizes the requirements for the […]
Data De-identification: An Overview of Basic Terms
This 2014 document is intended to assist early intervention service programs and providers and preschool special education programs and agencies in maintaining compliance with privacy and confidentiality requirements under IDEA […]
Frequently Asked Questions: IDEA Early Childhood – Disclosure Avoidance
This 2014 document is an adaptation of the 2012 release of Frequently Asked Questions – Disclosure Avoidance intended for K-12 audiences. Presented here in the form of responses to frequently […]
Best Practices for Data Destruction
This 2014 document from the U.S. Department of Education’s Privacy Technical Assistance Center (PTAC) is a best practices guide on properly destroying sensitive student data after it is no longer […]
Identity Authentication Best Practices
This 2012 brief offers best practice recommendations for developing and implementing effective authentication processes to help ensure that only appropriate individuals and entities have access to education records. General suggestions […]
Traveling Through Time: The Forum Guide to Longitudinal Data Systems (Book III)
This 2011 electronic book is the third in a four-part series about longitudinal data systems. It provides guidance on organizational issues, how to keep the project moving forward, and ensuring […]
Data Security: Top Threats to Data Protection
This 2011 brief outlines critical threats to educational data and information systems. Threats are divided into two categories: technical and non-technical. A brief description of each threat is followed by […]