Future&of&Privacy&Forum& July&2015&
|
|
|
- Dwayne Norton
- 9 years ago
- Views:
Transcription
1
2 De#Identification-and-Student-Data- Understanding-De#Identification-of-Education-Records-and-Related-Requirements-of-FERPA- - Appropriateandwell/designedstudentdatausebyschools,families,researchers,andservice providers,greatlyenhancesteachingandlearning.newtechnologieslinkedtohighcapacity broadbandnetworksoffereducatorsandotherstakeholdersaccesstopowerfulanalyticaltools, richdata,anddynamicdigitalresources,whichcanimprovestudentoutcomesandinform importanteducationpolicyreforms.thesetechnologyadvancements,however,alsoinvitenew risksforexposingpersonallyidentifiablestudentdatatounauthorizeddisclosures,misuse,and abuse.inordertoreaptechnology sbenefitswithoutencounteringthesepitfalls,educational agenciesandinstitutions,andtheiroutsidepartners,mustdevelopandimplementmore effectivestrategiesandtoolsforpromotingstudents privacyandconfidentiality. Datade/identificationrepresentsoneprivacyprotectionstrategythatshouldbeineverystudent dataholder splaybook.integratedwithotherrobustprivacyandsecurityprotections, appropriatede/identification choosingthebestde/identificationtechniquebasedonagiven datadisclosurepurposeandrisklevel providesapathwayforprotectingstudentprivacy withoutcompromisingdata svalue.thispaperprovidesahighlevelintroductionto:(1) educationrecordsde/identificationtechniques;and(2)exploresthefamilyeducationalrights andprivacyact s(ferpa)applicationtode/identifiededucationrecords. 1 Thepaperalsoexplores howadvancesinmathematicalandstatisticaltechniques,computationalpower,andinternet connectivitymaybemakingde/identificationofstudentdatamorechallengingandthusraising potentialquestionsaboutferpa slong/standingpermissivestructureforsharingnon/personally identifiableinformation. The-Three#Legged-Stool-of-De#Identification:-Personally-Identifiable-Information,-De# identification-strategies,-and-data-sharing-purposes-&-disclosure-risk-assessment-- Datade/identificationisatechnicallyandlegallycomplexissuewithspecialnuancesacross industriesandareasoflaw.thispapernarrowlyexaminestheissuefromtheperspectiveof educationrecordsandferpa.theu.s.departmentofeducation sprivacyandtechnical AssistanceCenter(PTAC)definesde/identificationasthe processofremovingorobscuringany personallyidentifiableinformationfromstudentrecordsinawaythatminimizestheriskof unintendeddisclosureoftheidentityofindividualsandinformationaboutthem. 2 UnderstandingPTAC sdefinitioniscriticaltocomplyingwithferpaandensuringadherenceto de/identificationbestpractice.withthatgoalinmind,thissectionintroducesthreecorestudent datade/identificationconceptsdrawnfromptac sdefinitionandferpa(lawandregulations): personallyidentifiableinformation(pii);de/identificationprocesses;disclosurepurposeandrisk assessment. 1 FamilyEducationalRightsandPrivacyAct,20U.S.C.1232g. 2 DataDe&identification:AnOverviewofBasicTerms.U.S.DepartmentofEducationPrivacyTechnicalAssistanceCenter,PTAC/GL, Oct2012(updatedMay2013).&& & 1
3 PersonallyIdentifiableInformation Educationalagenciesandinstitutions,andtheirpartners,usede/identificationtoseveror obscureconnectionsbetweenusefuleducationdataand personallyidentifiabledata. FERPA s sharingprohibitionsandrequirements(exploredlaterinthepaper)onlyapplytopii.inother words,non/personallyidentifiableinformationmaybesharedandretainedwithoutrestriction (withanarrowexceptionrelatedtode/identifieddataconnectedtoarecordlocator).asaresult, understandingthelaw sdefinitionofpiiiscriticaltomakingdeterminationsabouthowstudent datamaybeused,when,andbywhom.underferpa,piiincludes,butisnotlimitedto: a) Thestudent sname b) Thenameofthestudent sparentorotherfamilymembers; c) Theaddressofthestudentorstudent sfamily; d) Apersonalidentifier,suchasthestudent ssocialsecuritynumber,studentnumber,or biometricrecord; e) Otherindirectidentifiers,suchasthestudent sdateofbirth,placeofbirth,andmother s maidenname; f) Otherinformationthat,aloneorincombination,islinkedorlinkabletoaspecificstudent thatwouldallowareasonablepersonintheschoolcommunity,whodoesnothave knowledgeoftherelevantcircumstances,toidentifythestudentwithreasonable certainty;or g) Informationrequestedbyapersonwhotheeducationalagencyorinstitutionreasonably believesknowstheidentityofthestudenttowhomtheeducationrecordrelates. 3 Educationalagenciesorinstitutions,andpartnerentities,suchastechnologyvendors, communitybasedorganizations,orresearchers,interestedinusingde/identificationasaprivacy protectionstrategy,mustpayparticularattentiontothedefinition sinclusionof indirect identifiers and otherinformation. Datade/identificationtechniquesareusedtoremovethe directidentifiersdescribedabove,aswellasindirectidentifiersandotherinformation,whichif leftunaddressed,couldbeusedtoidentifyindividualstudents.otherexamplesofindirect identifiersincluderace,religion,weight,activities,employmentinformation,medical information,educationinformation,andfinancialinformation. 4 DataDe&IdentificationTechniques Datade/identification removingorobscuringpii/beginswitheliminatingalldirectstudent identifiersfromaneducationrecord,buteducationagenciesandinstitutions,andotherdata holders,musttakefurtherstepstoensurethatindirectidentifiersorotherinformationdonot enableanunauthorizedactorfromdeterminingastudent sidentity.thesefurtherstepsinvolve usingsophisticatedmathematicalandstatisticalde/identificationtechniques,including 3 &FERPA,10U.S.C.1232g;34CFR 99.3.& 4 SeePrivacyandTechnicalAssistanceOnlineGlossary:& & 2
4 leveragingtechnologytoensurethemethodsareaccuratelyandcomprehensivelyappliedacross largeandcomplexdatasets.selectionofanappropriatede/identificationstrategywillvarybased onspecificcontext,includingwhetheritwillbeappliedtoindividualleveldata(information collectedandrecordedseparatelyforeachstudent)oraggregatedata(datacombinedfrom severalmeasurements).theformerrequiresmuchmorerobustprotections. TheU.S.DepartmentofEducation sptacprovideshelpfulguidancematerials,includingcase studies,thatprovidedetailedinformationaboutde/identificationapproaches, 5 butcommon methodsincludethefollowingstrategies. 6 SeeAddendumAforhighlevelexamplesofeach technique. Blurring- Reducingtheprecisionof discloseddatatominimize thecertaintyofindividual identification.forexample convertingcontinuousdata elementsintocategorical elementsthatsubsume uniquecases. Perturbation- Makingsmallchangesto thedatatoprevent identificationofindividuals fromuniqueorrare populationgroups.for example,swappingdata amongindividualcellsto introduceuncertainty. Suppression- Removingdata,for examplefromacellorrow, topreventthe identificationofindividuals insmallgroupsorthose withuniquecharacteristics. Usuallyrequires suppressionofnon/ sensitivedata. SharingPurpose&PIIDisclosureRiskassessment Educationalagenciesandinstitutionsplanningtousede/identificationtechniquestoenable unconsenteddatasharing ininstanceswhenaferpadisclosureexceptiondoesnotapply/ mustmakea reasonabledeterminationthatthestudent sidentityisnotpersonallyidentifiable becauseofuniquepatternsofinformationaboutthestudentwhetherthroughsingleormultiple releases,andtakingintoaccountotherreasonablyavailableinformation. 7 Thestandardfor makingthisdeterminationisdiscussedlaterinthepaper,butneitherferpa,northeu.s. DepartmentofEducation sferparegulations,providea safeharbor listingspecificstepsthat leadtoappropriatede/identification.instead,federalpolicyprovidesastandardformakingcase/ by/casejudgmentsofpiidisclosureriskattheeducationalagency,institution,orapprovedparty level. 8 Thiscase/by/caseapproachmeansthatthelistofindirectidentifiersthatmustbe removedorobscuredtoachieveappropriatede/identificationwilllikelyvarybycircumstance. 5&PrivacyandTechnicalAssistanceCenter: PTAC/FAQ/2,October2012(updatedMay2013),DataDe&identification:AnOverviewofBasicTerms,PTAC/GL,Oct2012(updated May2013),CaseStudy#5:MinimizingAccesstoPII:BetPracticesforAccessControlsandDisclosureAvoidanceTechniques,PTAC/ CS/5,October2012.& 6&Seealso,FederalCommitteeonStatisticalMethodology sstatisticalpolicyworkingpaper22reportonstatisticaldisclosure LimitationMethodology,(73Fed.Reg.74806/35,Dec9,2008). 7 73FR73833,December9,2008.& 8 73FR74834,December9,2008. & 3
5 Selectinganappropriatede/identificationmethoddependsinpartonexaminingtheplanned datasharingpurpose.thedatasharingpurposeandde/identificationstrategymustbe compatible. 9 Forexample,researchersinterestedinexaminingstudents performanceovertime mightrequireaccesstodetailed,accurateacademicinformationspanningseveralyears(limiting useofde/identificationtechniquesthatdiminishadata svalidity).researchersstudyinga studentcohort sgrowthtowardastate scollegeandcareerreadystandardsusingaspecific pedagogy,forexample,wouldnotbeabletousedatade/identifiedusingatechniquethatlimits thedata sreliabilityandvalidity.(alternatively,thistypeoflongitudinalresearchmightbe conductedusingde/identifieddatalinkedtoarecordlocatortoenabletheoriginating educationalagencyorinstitutiontoprovidede/identifieddataforthesamestudentsovertime. Useofsuchalocatordoesnotrenderthedata personallyidentifiable underferpa,butitdoes triggerspecialrequirements.)conversely,datasharedforpurposesthatrequirelessdata precisionandaccuracy,suchassoftwaretrainingortechnologyresearchanddevelopment,could usemuchmoreaggressivede/identificationstrategies,suchasusingtechniquesthatreplace sensitiveinformationwithinauthenticormodifieddata. Pleasenote,usingde/identificationtechniquesasaprivacytooldoesnotalwaysinvolve removingallpii,butinsituationswhenpiiremainspartofagivendataset(i.e.wherethedata hasnotbeencompletelyde/identified),unconsentedsharingmayonlyoccurwithconsentor consistentwithanappropriateferpaexception.forexample,aneducationalagencyor institutionsharingpiiunderaqualifiedferpaexceptionmaywishtousede/identification techniquestominimizepiireleasedtoanoutsideentity,eventhoughtheymaylawfullysharea rangeofstudentlevelinformation.tobemorespecific,aresearchermightconductastudythat requiresadiscretelistofindirectidentifiersthattogethercouldleadtothestudent s identification,suchasastudent sage,raceandfamilyfinancialinformation,butnotrequiring otherpiifoundinthesameeducationrecords.insuchaninstance,thesethreepiecesof personallyidentifiablestudentdata andotherinformationattachedthem/wouldremain subjecttoferpa sdisclosurelimitationsandotherrequirements,butde/identification techniques(e.g.,suppression)couldprovideadditionalprotectionforthestudentbyremoving data,forexamplefromacellorrow,unnecessarytothestudy.researcherslawfullyusingpiiin thiscontextandothercases,however,mustcompletelyde/identifyanyreportorother informationbeforereleasingittothepublicorotherparties,includingotherresearchers. 10 Entitiesplanningtousede/identificationtechniquesmustmitigatetheriskofexposingthe identityofindividualstudents.therefore,afterexaminingtherequirementsofagivendata sharingpurpose,educationdataholdersmustalsoassesstherisksassociatedwiththeirplanned disclosure,includingconsideringpastdatareleases(theriskofre/identificationiscumulative), samplesize,thenatureofthedatarecipient, 11 whetherthedatawillbefurthersharedormade 9&DataDe&identification:AnOverviewofBasicTerms.U.S.DepartmentofEducationPrivacyTechnicalAssistanceCenter,PTAC/GL, Oct2012(updatedMay2013),p.4.& 10 73FR74834,December9, TheDepartmentofEducationhassaid thereisnostatutoryauthorityinferpatomodifytheprohibitionondisclosureof personallyidentifiableinformationfromeducationrecords,ortheexceptionstothewrittenconsentrequirement,basedonthe trackrecordoftheparty,includingjournalistsandresearchers,inmaintainingtheconfidentialityofinformationfromeducation & 4
6 public,andothercontextualconditions. 12 Moreaggressivede/identificationstrategiesare requiredinsituationswhenthestudentdataispotentiallyatgreaterriskofre/identification. Forexample,de/identifieddatasharedforaspecificpurposewithatrustedpublicorprivate entitysuchasastatedepartmentofeducation,institutionofhighereducation,orprofessional vendorwithstrictlegalandcontractprotections(e.g.,anagreementwithstrictre/disclosure limitations),mightbelesslikelytobewidelyavailablelater(decreasingthere/identification threatassociatedwithcumulativedatareleases),comparedforexampletoannualschoolor districtperformancedataposteddirectlytoapublicwebsitetocomplywithfederalandstate accountabilityrequirements.whyisgreaterpublicavailabilityofaproperlyde/identifieddataset apotentialproblem?insomecases,de/identifieddatamightbesubjecttonefarious comparisonswithotherdatasets(e.g.,withwidelyavailablestudent directoryinformation )or otherattemptstorevealpii.whendataentersthepublicdomain,itcouldbeexposedtocutting/ edgetoolsandtechniquesdesignedtocomparethede/identifieddatatootherpubliclyavailable datasetsandthusrevealastudents identity(theferpaimplicationsofsuchabreakthroughare discussedfurtherbelow). Althoughexpertsdisagreeabouttheextenttowhichnewtechnologiesandtechniquescan back map de/identifieddatatorevealastudent sidentity,aseriousstatisticalanalysisthatensures alldirectandindirectidentifiershavebeenremovedcanbeperformedtoensureanyre/ identificationriskisremote. Inshort,prudentstudentdataholdersshouldconsiderusing inlightofnewdataminingand comparisontechniquesthatmightbemoreeffectivethaniscommonlyaccepted themost aggressivede/identificationstrategiespossiblewhendatawillbemadepublicorsharedwidely. WhendataissharedwithlimitedrestrictedpartiesunderstrongcontrolsandunderaFERP exception,acombinationoftechnical,administrativeandcontractualcontrolswillbe appropriateforreasonablede/identificationmeasuresthatmaypreservegreaterutilityofthe data. Application-of-FERPA-to-De#Identified-Records-- Asageneralrule,FERPAprohibitsthedisclosureofeducationrecordscontainingpersonally identifiablestudentdatawithoutparentoreligiblestudentconsent. 13 Therefore,thereleaseof educationrecordsthathavebeenappropriatelyde/identified purgedofdirectandallnecessary indirectidentifiersinagivencontext/isnotconsidereda disclosure underferpa,sinceby definitionsuchrecordsdonotcontainpii. 14 Properlyde/identifiedstudentdatathusmaybe sharedwithoutlimitationunderferpa(althoughotherfederalandstateprivacylawsmay apply).furthermore, de/identifiedinformationfromeducationrecordsisnotsubjecttoany &&&&&&&&&&&&& recordsthattheyhavereceived. (73FR74834).Nonetheless,therecipients identityshouldlikelybeconsideredamongother variablesineachriskassessment. 12 FrequentlyAskedQuestions DisclosureAvoidance,p.4,PTAC/FAQ/2,Oct2012(updatedMay2013).p.2/3& 13 20U.S.C.1232g(b)(1) 14 34CFR99.31(b)(1) & 5
7 destructionrequirementsbecause,bydefinition,itisnot personallyidentifiableinformation. 15 TheDepartmenthassaid,however,apartyreleasingde/identifiedstudentdatamightmitigate risksassociatedwithfuturedatareleasesbyindependentlyrequiringdatadestructioninsome circumstances. 16 Thereisoneimportantexception,however,toFERPA sunconsentedsharingexceptionforde/ identifieddata.de/identifieddatacoupledwitharecordcodeorlocatorbyaneducational agencyorinstitution allowingittobematchedlatertotherecordsource/mayonlybeshared foreducationresearch.althoughthedepartment sregulationsandguidancedonotspecifically discussthequestion,itappearsthateducationalagenciesorinstitutionsmayselectanyqualified thirdpartytoconductresearchunderthisprovision,butallsecondary(non/research)usesofde/ identifieddatawitharecordlocatorareprohibited.furthermore,thedatasharingentitymay notdiscloseinformationabouthowitgeneratedandassignedtherecordcode,orother informationthatmightallowadatarecipienttoidentifyastudentbasedontherecordcode. Lastly,therecordcodemustnotbebasedonastudent ssocialsecuritynumberorother personalinformation. 17 Suchadatasetremainscategorizedas de/identified, andmaythusbe sharedwithoutparentoreligiblestudentconsent,butunlikeotherde/identifieddataitmayonly besharedfortheresearchpurposespecifiedtotheeducationalagencyorinstitution,consistent withtheotherrequirementsdescribedabove. Beforesuchdatasharingcanoccur,however,theeducationrecordmustbeproperlyde/ identified.asreferencedabove,the releasingpartyisresponsibleforconductingitsown analysisandidentifyingthebestmethodstoprotecttheconfidentialityofinformationfrom educationrecordsitchoosestorelease. 18 ThisdeterminationdependsonFERPA sdisclosure riskassessmentstandard.thisstandardaskswhethera reasonablepersonintheschool communitywhodoesnothavepersonalknowledgeoftherelevantcircumstances couldusethe releaseddata,andotherpubliclyavailabledata,toidentifyanindividualstudentwith reasonablecertainty. 19 Thisstandardextendstopossibledataholdersbeyondtheliteralschool community. TheDepartmentofEducationdoesnotrequireeducationalagenciesandinstitutionstouse specificdatadisclosureavoidancetechniquestoachievethisstandard,andstatedinarecent rulemaking, itisnotpossibletoprescribeoridentifyasinglemethodtominimizetheriskof disclosingpersonallyidentifiableinformationthatwillapplyineverycircumstance 20 The Departmenthasalsosaid determiningwhetheraparticularsetofmethodsforde/identifying dataandlimitingdisclosureriskisadequatecannotbemadewithoutexaminingtheunderlying datasets,otherdatathathavebeenreleased,publiclyavailabledirectoriesandotherdatathat arelinkedorlinkabletotheinformationinquestions. 21 Inotherwords,thepartyreleasingdata 15&73FR15585,March24,2008& 16&73FR74835,December9,2008& 17 34CFR99.31(b)(2)(i)/(iii) FR74835,December9, CFR 99.3,34CFR 99.31(b)(1) 20 73FR74835,December9, Ibidat74835& & 6
8 mustperformacontextspecificanalysisandidentifythebestmethodforprotectingstudent informationsubjecttodisclosures.properapplicationoftheacceptedmathematicaland statisticalde/identificationstrategiesdescribedearlierinthepapermeetthislegalstandardin manyinstances,butbylaweachsharingcontextmustbeindependentlyanalyzedagainstthe Department sreasonablenessstandard. 22 Someexpertshavearguedthatgivenrecentcaseswhereresearchershaveleveragedaccessto otherpubliclyavailabledatasetstoidentifyspecificindividuals,absolutedatade/identification maybeimpossible,orataminimum,increasinglydifficult. 23 Inlightofthisuncertainty,data sharingpartiesshouldverycarefullyanalyzeeachproposeddisclosureofde/identifieddata againstferpa sreasonablenessstandardandalsoconsiderusingcontractsthatspecify protections aboveandbeyondferpa/thatcouldfurtherminimizetheriskofre/identification. De#Identified-Data:-Retention-and-Destruction- FERPApermitsthirdpartydataholders,includingvendors,toretainanduseappropriatelyde/ identifieddata solongasitisnotassociatedwitharecordlocator/foranysecondarypurpose. Furthermore,FERPAdoesnotdescribehowde/identifieddatashouldbemanaged,including,as describedabove,whenandhowthedatashouldbedestroyed.vendorsandotherthirdparty holdersmust,however,ensurethatagivende/identifieddatasetisnotsubjecttorelevant contractterms,orotherfederal,state,andlocalprivacylawsandregulations,whichmight containmorestringentdataretentionordestructionrequirements. 24 Forexample,personaldata subjecttothechildren sonlineprivacyprotectionactmayonlyberetainedsolongasis necessarytofulfillthepurposeforwhichitwascollected,andcoppacoveredentitiesmust deletetheinformationusingreasonablemeasurestoprotectagainstitsunauthorizedaccessor use. 25 AlthoughFERPAdoesnotgoverntheuse,retentionanddestructionofproperlyde/identified data,thirdpartiesshouldhavesoundpolicies guidedbynationalinstituteofstandardsand TechnologyorPTACbestpracticerecommendations/addressingtheseissues.Thisinternal, independentstepincludesensuringthatde/identifieddataisdestroyedwhenitisnolonger needed,inordertominimizere/identificationrisksassociatedwithpossiblefutureeffortsto compareandlinkthedatawithotherdatasets.dataholdersmustalsoensurethattheytake properactionstodestroydata.simplydeletingdataisnotsufficientinmostcasesandptac s datadestructionbestpracticesprovidehelpfulguidance.ptacrecommendsthatdataholders makerisk/baseddecisionsonwhich[destruction]method/[e.g.clearing,purging,ordestroying data]/ismostappropriatebasedonthedatatype,riskofdisclosure,andtheimpactifthatdata weretobedisclosedwithoutauthorization. 26 Thedatade/identificationmethodusedtoremove 22 34CFR99.31.(b)(1).Seealso,PTACFrequentlyAskedQuestions DisclosureAvoidance,p.4,PTAC/FAQ/2,Oct2012(updated May2013). 23 BrokenPromisesofPrivacy:RespondingtotheSurprisingFailureofAnonymization,PaulOhm,UniversityofColoradoLaw School,UCLALawReview,Vol.57,p.1701, PrivacyandTechnicalAssistanceCenter,BestPracticesforDataDestruction,p.5,PTAC/IB/5,May C.F.R PTACBestPracticesforDataDestruction,p.5. & 7
9 PIIfromadatasetshouldbeacentralfactorinmakingthisdetermination.Dataholdersseeking additionalguidanceonproperdestructionstrategiesshouldconsultrecommendationsmadeby thenationalinstituteofstandardsandtechnologyandotherexpertsources. 27 Conclusion- De/identificationoffersanimportanttoolforeducationalagencies,institutionsandtheir partnersseekingtomaximizestudentdata spotentialvaluetoimprovingteachingandlearning, whilealsocarefullyprotectingstudentprivacyandconfidentiality.properdatade/identification requires,however,deeptechnicalknowledgeandexpertiseandadherencetoindustrybest practice.therefore,studentdataholdersshouldnotattempttode/identifystudentdatasets withoutcompetentsupport.theyshouldalsoconsultcompetentlegalcounseltoensurethat theirdatamanagementpoliciesandpractices includingde/identificationstrategies/comply withferpaandallotherrelevantfederal,state,andlocallawsandrequirementspotentially applicabletothedatatheymanage. 27 NationalInstituteofStandardsandTechnology(NIST)SpecialPublication800/88Rev.1:GuidelinesforMediaSanitization. December2014. & & 8
10 IllustrationofCommonDe1IdentificationMeasuresinAggregateDataSets Joan sdirectoridentifiers StudentName:JoanSmith StudentsParents:JohnSmith&JackieSmith Address: th Street,Washington,D.C. StudentNumber:4444 SocialSecurityNumber:555C555C555 Joan sindirectidentifiers DataofBirth:11/01/2000 Race:AlaskaNative Gender:Female PlaceofBirth:Washington,D.C. FamilyIncome:$85,000 GPA:3.75 AllDirectIdentifiersRemoved Joan sindirectidentifiers DataofBirth:2000 Race:UniqueCharacteristicRemoved Gender:Female Mother smaidenname:unique CharacteristicRemoved PlaceofBirth:MidCAtlantic FamilyIncome:$50,000C$100,000 GPA: Mike sindirectidentifiers DataofBirth:1999 Race:UniqueCharacteristicRemoved Gender:Female Mother smaidenname:unique CharacteristicRemoved PlaceofBirth:Midwest FamilyIncome:$50,000C$100,000 GPA: Joan sindirectidentifiers DataofBirth:2000 Race:UniqueCharacteristicRemoved Gender:Male Mother smaidenname:uniquecharacteristic Removed PlaceofBirth:Northeast FamilyIncome:$50,000C$100,000 GPA: AllDirect Identifiers Removed Joan sindirectidentifiers DataofBirth:11/01/2000 Race:AlaskaNative Gender:Female PlaceofBirth:Washington,D.C. FamilyIncome:$85,000 GPA:3.75 AllDirect Identifiers Removed Joan sindirectidentifiers DataofBirth:2000 Race:Minority Gender:Female Mother smaidenname:johnson PlaceofBirth:MidCAtlantic FamilyIncome:$50,000C$100,000 GPA: Raw$Individual$Student$Data$in$Aggregate$Data$Table$ Redacted$Individual$Student$Level$Data$in$ Aggregate$Data$Table$ $ Blurring$(Reducing$Data$Precision$including$$ Using$Broader$Categories)$ $ Suppression$(Removing$Data$from$a$Cell$or$Row)$ Perturbation$(Small$Data$Changes,$including$through$$ Swapping$Data$among$Cells)$ $$
Foster Care/Texas State Adoption Frequently Asked Questions
FosterCare/TexasStateAdoption FrequentlyAskedQuestions Q:WhyshouldIbecomepartoftheInternationalFamilyServicesfamily? A:Therearealotofreallygreatagenciesthatyoucanworkwith.Wefeelthatourbestassetisthat whenyouworkwithus,wetreatyoulikefamily.weknowthatwhenyoubringachildintoyourhome
COLLECTION, USE, AND DISCLOSURE LIMITATION
COLLECTION, USE, AND DISCLOSURE LIMITATION This is one of a series of companion documents to The Nationwide Privacy and Security Framework for Electronic Exchange of Individually Identifiable Health Information
Sample Business Associate Agreement Provisions
Sample Business Associate Agreement Provisions Words or phrases contained in brackets are intended as either optional language or as instructions to the users of these sample provisions. Definitions Catch-all
HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT (HIPAA) TERMS AND CONDITIONS FOR BUSINESS ASSOCIATES
HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT (HIPAA) TERMS AND CONDITIONS FOR BUSINESS ASSOCIATES I. Overview / Definitions The Health Insurance Portability and Accountability Act is a federal law
ENROLLMENT DATA SHARING AGREEMENT Between «Institution» and the Minnesota Office of Higher Education
ENROLLMENT DATA SHARING AGREEMENT Between «Institution» and the Minnesota Office of Higher Education The «Institution» is an educational agency or institution subject to the Family Educational Rights and
De-Identification of Health Data under HIPAA: Regulations and Recent Guidance" " "
De-Identification of Health Data under HIPAA: Regulations and Recent Guidance" " " D even McGraw " Director, Health Privacy Project January 15, 201311 HIPAA Scope Does not cover all health data Applies
Privacy Impact Assessment
DECEMBER 20, 2013 Privacy Impact Assessment MARKET ANALYSIS OF ADMINISTRATIVE DATA UNDER RESEARCH AUTHORITIES Contact Point: Claire Stapleton Chief Privacy Officer 1700 G Street, NW Washington, DC 20552
FERPA Compliance: Using Student Data in the AEFIS Solution Platform
Academic Evaluation, Feedback and Intervention System TM FERPA Compliance: Using Student Data in the AEFIS Solution Platform Untra Academic Management Solutions, LLC recognizes the necessary security measures
BUSINESS ASSOCIATE AGREEMENT
BUSINESS ASSOCIATE AGREEMENT This Addendum is made part of the agreement between Boston Medical Center ("Covered Entity ) and ( Business Associate"), dated [the Underlying Agreement ]. In connection with
School based budgeting and management. Question: Response:
Title: Date: School basedbudgetingandmanagement August2009 Question: Whatisschool basedbudgetingandmanagement?specifically,whatimpactsor effectshavebeenseeninthisreformapproach?whatimportant implementationconsiderationsareinvolvedwithsuchanapproach?whatare
SOUTH DAKOTA DEPARTMENT OF EDUCATION
SOUTH DAKOTA DEPARTMENT OF EDUCATION Data Access Policy DOE Data Management Office (605) 773-3248 05/05/2015 1 P age TABLE OF CONTENTS Contents TABLE OF CONTENTS... 2 POLICY STATEMENT... 3 PURPOSE... 3
Ausgrid Privacy Policy
Ausgrid Privacy Policy Ausgrid is responsible for the safe and reliable supply of electricity to homes and businesses throughout Sydney, the Hunter and the Central Coast. Its network is made up of more
Privacy and EHR Information Flows in Canada. EHIL Webinar Series. Presented by: Joan Roch, Chief Privacy Strategist, Canada Health Infoway
Privacy and EHR Information Flows in Canada EHIL Webinar Series Presented by: Joan Roch, Chief Privacy Strategist, Canada Health Infoway March 1, 2011 Outline 1. Background 2. Infoway s privacy mandate
Degrees of De-identification of Clinical Research Data
Vol. 7, No. 11, November 2011 Can You Handle the Truth? Degrees of De-identification of Clinical Research Data By Jeanne M. Mattern Two sets of U.S. government regulations govern the protection of personal
RESEARCH INVOLVING DATA AND/OR BIOLOGICAL SPECIMENS
RESEARCH INVOLVING DATA AND/OR BIOLOGICAL SPECIMENS 1. Overview IRB approval and participant informed consent are required to collect biological specimens for research purposes. Similarly, IRB approval
HIPAA Privacy Rule Primer for the College or University Administrator
HIPAA Privacy Rule Primer for the College or University Administrator On August 14, 2002, the Department of Health and Human Services ( HHS ) issued final medical privacy regulations (the Privacy Rule
BUSINESS ASSOCIATE AGREEMENT
BUSINESS ASSOCIATE AGREEMENT This Business Associate Agreement (the "Agreement") is made and entered into this day of,, by and between Quicktate and idictate ("Business Associate") and ("Covered Entity").
HIPAA BUSINESS ASSOCIATE SUBCONTRACTOR AGREEMENT
This HIPAA Sub Business Associate Agreement ("Sub Agreement") is entered into by and between HR Simplified, Inc. ( Business Associate ) and [Vendor Name] on behalf of itself and its Affiliates ( Subcontractor
Memorandum. Factual Background
Memorandum TO: FROM: SUBJECT: Chris Ianelli and Jill Mullan, ispecimen, Inc. Kristen Rosati and Ana Christian, Polsinelli, PC ispecimen Regulatory Compliance DATE: January 26, 2014 You have asked us to
Connecticut s P20 WIN Data Governance Manual
Connecticut s P20 WIN Data Governance Manual This manual provides a detailed description of the structure, processes, roles and responsibilities that guide the governance of P20 WIN. Prepared by P20 WIN
BUSINESS ASSOCIATE AGREEMENT
THIS IS A TEMPLATE ONLY. CERTAIN STATES MAY NOT PERMIT THE TYPES OF ACTIVITIES ALLOWED HEREUNDER RELATING TO PROTECTED HEALTH INFORMATION. THUS THIS AGREEMENT MAY NEED TO BE MODIFIED IN ORDER TO COMPLY
MICHIGAN INDIAN ELDERS ASSOCIATION
MICHIGAN INDIAN ELDERS ASSOCIATION 2016 SCHOLARSHIP APPLICATION STUDENT S NAME Last First Middle Initial MAILING ADDRESS Street Address PO Box City State Zip code ( ) Telephone Number FATHER S NAME MOTHER
This Instruction implements Department of Homeland Security (DHS) Directive 110-01, Privacy Policy for Operational Use of Social Media.
I. Purpose Department of Homeland Security DHS Directives System Instruction Number: 110-01-001 Revision Number: 00 Issue Date: 6/8/2012 PRIVACY POLICY FOR OPERATIONAL USE OF SOCIAL MEDIA This Instruction
THE CENTER FOR GLOBAL EDUCATION & CITIZENSHIP
THE CENTER FOR GLOBAL EDUCATION & CITIZENSHIP 2011 SUMMER FASHION PROGRAM STUDENT APPLICATION CHECKLIST To apply for the Summer Fashion Program, please submit the required documents to The Center for Global
DATA USE AGREEMENT Minnesota Hospital Association
DATA USE AGREEMENT Minnesota Hospital Association This Data Use Agreement ("Agreement") is between Minnesota Hospital Association ("MHA") and ("Data User"). MHA collects and maintains certain data comprising
Health Insurance Portability & Accountability Act (HIPAA) Compliance Application
Health Insurance Portability & Accountability Act (HIPAA) Compliance Application IRB Office 101 - Altru Psychiatry Center 860 S. Columbia Rd, Grand Forks, North Dakota 58201 Phone: (701) 780-6161 PROJECT
Communicating with a Patient s Family, Friends, or Others Involved in the Patient s Care
A HEALTH CARE PROVIDER S GUIDE TO THE HIPAA PRIVACY RULE: Communicating with a Patient s Family, Friends, or U.S. Department of Health and Human Services Office for Civil Rights This guide explains when
Family Educational Rights and Privacy Act (FERPA) Final Rule 34 CFR Part 99. Section-by-Section Analysis December 2008
Family Educational Rights and Privacy Act (FERPA) Final Rule 34 CFR Part 99 Section-by-Section Analysis December 2008 Under FERPA, 20 U.S.C. 1232g, a parent or eligible student has a right to inspect and
Centralized vs. Federated:
Centralized vs. Federated: State Approaches to P-20W Data Systems Historically, efforts to create a P-20W 1 data repository resulted in the development and use of a single, centralized data system that
BUSINESS ASSOCIATE AGREEMENT BETWEEN AND COMMISSION ON ACCREDITATION, AMERICAN PSYCHOLOGICAL ASSOCIATION
BUSINESS ASSOCIATE AGREEMENT BETWEEN AND COMMISSION ON ACCREDITATION, AMERICAN PSYCHOLOGICAL ASSOCIATION This Agreement governs the provision of Protected Health Information ("PHI") (as defined in 45 C.F.R.
SJUSD Retiree Transition Frequently Asked Questions
SJUSDRetireeTransition FrequentlyAskedQuestions Q:WhatisaMedigapPlan? A:MedigapplansaredesignedtocovertheDeductiblesandCoinsurancenotcoveredbyOriginal MedicarePartAandB.Thereare10StandardMedigapPlansAvailable:PlansA
UNITED STATES DISTRICT COURT CENTRAL DISTRICT OF CALIFORNIA, WESTERN DIVISION
Case :-cv-0 Document Filed 0// Page of Page ID #: 0 ANTHONY ALEXIS, DC Bar # Email: [email protected] Phone: (0) - JEFFREY PAUL EHRLICH, FL Bar # Email: [email protected] Phone: (0) - JOHN C.
MMA SAMPLE FORM *REVIEW CAREFULLY & ADAPT TO YOUR PRACTICE*
This is only sample language. The language should be changed to accurately reflect business arrangements between a covered entity and business associate or business associate and subcontractor. In addition,
BUSINESS ASSOCIATE ADDENDUM
BUSINESS ASSOCIATE ADDENDUM This Business Associate Addendum ( Addendum ) adds to and is made a part of the Q- global Subscription and License Agreement by and between NCS Pearson, Inc. ( Business Associate
Plaintiff, the Consumer Financial Protection Bureau ( CFPB or Bureau ),
The Gordon Law Firm, P.C., a professional corporation; Abraham Michael Pessar, an individual; Division One Investment and Loan, Inc., a corporation, and also d/b/a Division One Business Solutions, D1 Companies,
Guidance on De-identification of Protected Health Information November 26, 2012.
Guidance Regarding Methods for De-identification of Protected Health Information in Accordance with the Health Insurance Portability and Accountability Act (HIPAA) Privacy Rule November 26, 2012 OCR gratefully
Family Educational Rights Privacy (FERPA) Act
F l o r i d a H o u s e o f R e p r e s e n t a t i v e s Family Educational Rights Privacy (FERPA) Act EDUCATION FACT SHEET 2010-11 What is the Family Educational Rights Privacy Act? The Family Educational
What is Covered by HIPAA at VCU?
What is Covered by HIPAA at VCU? The Privacy Rule was designed to protect private health information from incidental disclosures. The regulations specifically apply to health care providers, health plans,
South Dakota Parental Rights and Procedural Safeguards
South Dakota Parental Rights and Procedural Safeguards Special Education Programs Revised July 2011 Prior Written Notice... 1 Definition of Parental Consent... 3 Definition of a Parent... 3 Parental Consent...
MEMORANDUM. I. Accurate Framing of Communications Privacy Policy Should Acknowledge Full Range of Threats to Consumer Privacy
MEMORANDUM To: Interested Persons From: Claire Gartland, Khaliah Barnes, and Marc Rotenberg, Electronic Privacy Information Center (EPIC) Re: FCC Communications Privacy Rulemaking Date: EPIC is circulating
Revision to the Executive Director for Health Care Policy and Financing Rule Concerning the All-Payers Claims Database, Section 1.
STATEMENT OF BASIS AND PURPOSE 1. Summary of the basis and purpose for the rule or rule change. (State what the rule says or does and explain why the rule or rule change is necessary). These rules establish
Testimony. before the. National Committee on Vital and Health Statistics Ad Hoc Workgroup for Secondary Uses of Health Data
Testimony before the National Committee on Vital and Health Statistics Ad Hoc Workgroup for Secondary Uses of Health Data Presented by: Shirley S. Lady Vice President, BHI Blue Cross and Blue Shield Association
PRIVACY POLICY. Last Revised: June 23, 2014 1. About this Privacy Policy.
Last Revised: June 23, 2014 1. About this Privacy Policy. PRIVACY POLICY This Privacy Policy is a statement by Active Data, Inc. ( Active Data ) that describes how we collect, store, process, and share
American Bar Association. Technical Session Between the Department of Health and Human Services and the Joint Committee on Employee Benefits
American Bar Association Technical Session Between the Department of Health and Human Services and the Joint Committee on Employee Benefits May 6, 2008 The following notes are based upon the personal comments
SaaS. Business Associate Agreement
SaaS Business Associate Agreement This Business Associate Agreement ( BA Agreement ) becomes effective pursuant to the terms of Section 5 of the End User Service Agreement ( EUSA ) between Customer ( Covered
FirstCarolinaCare Insurance Company Business Associate Agreement
FirstCarolinaCare Insurance Company Business Associate Agreement THIS BUSINESS ASSOCIATE AGREEMENT ("Agreement"), is made and entered into as of, 20 (the "Effective Date") between FirstCarolinaCare Insurance
ADDENDUM TO ADMINISTRATIVE SERVICES AGREEMENT FOR HIPAA PRIVACY/SECURITY RULES
ADDENDUM TO ADMINISTRATIVE SERVICES AGREEMENT FOR HIPAA PRIVACY/SECURITY RULES This Addendum is entered into effective as of, by and among Delta Dental of Virginia ("Business Associate"), and ( Covered
[4830-01-p] DEPARTMENT OF THE TREASURY Internal Revenue Service 26 CFR Parts 1 and 301 [REG-129916-07] RIN 1545-BG76
[4830-01-p] DEPARTMENT OF THE TREASURY Internal Revenue Service 26 CFR Parts 1 and 301 [REG-129916-07] RIN 1545-BG76 AGENCY: Internal Revenue Service (IRS), Treasury. ACTION: Notice of proposed rulemaking.
HIPAA BUSINESS ASSOCIATE AGREEMENT
HIPAA BUSINESS ASSOCIATE AGREEMENT This HIPAA Business Associate Agreement ( Agreement ) is entered into as of the day of, 2013 by and between RUTGERS UNIVERSITY, a Hybrid Entity, on behalf and for the
Before the FEDERAL TRADE COMMISSION Washington, DC 20580. In re Maricopa Community College District
Before the FEDERAL TRADE COMMISSION Washington, DC 20580 In the Matter of ) ) Maricopa County Community College District ) ) ) Complaint, Request for Investigation, Injunction, and Other Relief Submitted
Computer Security (EDA263 / DIT 641)
Computer Security (EDA263 / DIT 641) Lecture 12: Database Security Erland Jonsson Department of Computer Science and Engineering Chalmers University of Technology Sweden Outline Introduction to databases
ENVIRONMENTAL PROTECTION AGENCY. 40 CFR Part 70. [EPA-R02-OAR-2015-0837; FRL-9948-31-Region 2]
This document is scheduled to be published in the Federal Register on 06/24/2016 and available online at http://federalregister.gov/a/2016-15004, and on FDsys.gov 6560-50-P ENVIRONMENTAL PROTECTION AGENCY
APPENDIX I: STANDARD FORM BUSINESS ASSOCIATE CONTRACT AND DATA USE AGREEMENT (2012 Version)
APPENDIX I: STANDARD FORM BUSINESS ASSOCIATE CONTRACT AND DATA USE AGREEMENT (2012 Version) THIS AGREEMENT is entered into and made effective the day of, 2012 (the Effective Date ), by and between (a)
BUSINESS ASSOCIATE AGREEMENT. Recitals
BUSINESS ASSOCIATE AGREEMENT This Agreement is executed this 8 th day of February, 2013, by BETA Healthcare Group. Recitals BETA Healthcare Group consists of BETA Risk Management Authority (BETARMA) and
Minnesota s Statewide Longitudinal Education Data System (SLEDS) Data Access & Management Policy
Minnesota s Statewide Longitudinal Education Data System (SLEDS) Data Access & Management Policy October 23, 2014 Approved by SLEDS Governance 1 Contents Section 1 - Overview... 5 1.1 Purpose... 5 Policy
APPENDIX I: STANDARD FORM BUSINESS ASSOCIATE CONTRACT AND DATA USE AGREEMENT
APPENDIX I: STANDARD FORM BUSINESS ASSOCIATE CONTRACT AND DATA USE AGREEMENT THIS AGREEMENT is entered into and made effective the day of, 20 (the Effective Date ), by and between (a) THE SOCIETY OF GYNECOLOGIC
Submitted via the Federal e Rulemaking Portal at http://www.regulations.gov,
MERCER. Submitted via the Federal e Rulemaking Portal at http://www.regulations.gov, Mr. Robert dev. Frierson Secretary Board of the Federal Reserve System 20th Street and Constitution Avenue NW Washington,
STATE OF WISCONSIN Department of Safety and Professional Services
STATE OF WISCONSIN Department of Safety and Professional Services IN THE MATTER OF RULE-MAKING : ORDER OF THE PROCEEDINGS BEFORE THE : DEPARTMENT OF SAFETY AND DEPARTMENT OF SAFETY AND : PROFESSIONAL SERVICES,
THE GRAMM-LEACH-BLILEY ACT FOR INDEPENDENT SCHOOLS
THE GRAMM-LEACH-BLILEY ACT FOR INDEPENDENT SCHOOLS Timothy Tobin, Partner Michael Epshteyn, Associate Of Hogan Lovells US LLP February 2014 Introduction The federal Gramm-Leach-Bliley Act ( GLBA ) 1 regulates
H I P AA B U S I N E S S AS S O C I ATE AGREEMENT
H I P AA B U S I N E S S AS S O C I ATE AGREEMENT This HIPAA BUSINESS ASSOCIATE AGREEMENT (the BAA ) is entered into by and between Opticare of Utah, Inc. ( Covered Entity ), and,( Business Associate ).
