Data Governance Plan

1                  PURPOSE­

Data governance is an organizational approach to data and information management that is formalized as a set of policies and procedures that encompass the full life cycle of data; from acquisition, to use, to disposal. The Utah Board of Education (Roots Charter High School) takes seriously its moral and legal responsibility to protect student privacy and ensure data security. Utah’s Student Data Protection Act (SDPA), U.C.A §53A-1-1401 requires that Roots Charter High School adopt a Data Governance Plan.

2               SCOPE AND APPLICABILITY

This policy is applicable to all employees, temporary employees, and contractors of the School. The policy must be used to assess agreements made to disclose data to third-parties. This policy must also be used to assess the risk of conducting business. In accordance with Agency policy and procedures, this policy will be reviewed and adjusted on an annual basis or more frequently, as needed. This policy is designed to ensure only authorized disclosure of confidential information. The following 8 subsections provide data governance policies and processes for Roots Charter High School:

1.              Data Advisory Groups

2.            Non-Disclosure Assurances for Employees

3.            Data Security and Privacy Training for Employees

4.            Data Disclosure

5.            Data Breach

6.            Record Retention and Expungement

7.            Data Quality

8.           Transparency

Furthermore, this policy works in conjunction with the Information Security Policy, which:

·           Designates Roots Charter High School as the steward for all confidential information maintained within Roots Charter High School.

·           Designates Data Stewards access for all confidential information.

·           Requires Data Stewards to maintain a record of all confidential information that they are responsible for.

·       Requires Data Stewards to manage confidential information according to this policy and all other applicable policies, standards and plans.

3               DATA ADVISORY GROUPS

3.1                  Structure

Roots Charter High School has a three-tiered data governance structure to ensure that data is protected at all levels of Utah’s educational system.

3.2                Group Membership

Membership in the groups is determined by the Director. Group membership is for two years. If individual members exit the group prior to fulfilling their two-year appointment, the board may authorize Roots Charter High School’s Chief Officer to appoint a replacement member.

3.3                Individual and Group Responsibilities

The following tables outlines individual Roots Charter High School staff and advisory group responsibilities.

 

 

 

 

 

 

 

 

 

 

 

Role

Responsibilities

LEA Student Data Manager

1.              authorize and manage the sharing, outside of the education entity, of personally identifiable student data from a cumulative record for the education entity

2.            act as the primary local point of contact for the state student data officer.

3.            A student data manager may share personally identifiable student data that are:

a.            of a student with the student and the student's parent

b.            required by state or federal law

c.             in an aggregate form with appropriate data redaction techniques applied

d.            for a school official

e.            for an authorized caseworker or other representative of the Department of Human Services or the Juvenile Court

f.             in response to a subpoena issued by a court.

g.            directory information

h.            submitted data requests from external researchers or evaluators,

4.            A student data manager may not share personally identifiable student data for the purpose of external research or evaluation.

5.            Create and maintain a list of all LEA staff that have access to personally identifiable student data.

6.            Ensure annual LEA level training on data privacy to all staff members, including volunteers. Document all staff names, roles, and training dates, times, locations, and agendas.

IT Systems Security Manager

1.              Acts as the primary point of contact for state student data security administration in assisting the board to administer this part;

2.            ensures compliance with security systems laws throughout the public education system, including:

  1. providing training and support to applicable Roots Charter High School employees; and
  2. producing resource materials, model plans, and model forms for LEA systems security;

3.            investigates complaints of alleged violations of systems breaches;

4.            provides an annual report to the board on Roots Charter High School’s systems security needs

Educators

1.              Ensures compliance with FERPA and state privacy laws throughout the public education system, including:

2.            Attend training and support required by Roots Charter High School; and

3.            Report  complaints of alleged violations of systems breaches;

 

3.3.1                      Table 1. Individual Roots Charter High School Staff Responsibilities

 

 

4               EMPLOYEE NON-DISCLOSURE ASSURANCES

Employee non-disclosure assurances are intended to minimize the risk of human error and misuse of information.

4.1                 Scope

All Roots Charter High School board members, employees, contractors and volunteers must sign and obey the Roots Charter High School Employee Non-Disclosure Agreement (See Appendix A), which describes the permissible uses of state technology and information.

4.2               Non-Compliance

Non-compliance with the agreements shall result in consequences up to and including removal of access to Roots Charter High School network; if this access is required for employment, employees and contractors may be subject to dismissal.

4.3               Non-Disclosure Assurances

All student data utilized by Roots Charter High School is protected as defined by the Family Educational Rights and Privacy Act (FERPA) and Utah statute.  This policy outlines the way Roots Charter High School staff is to utilize data and protect personally identifiable and confidential information. A signed agreement form is required from all Roots Charter High School staff to verify agreement to adhere to/abide by these practices and will be maintained in Roots Charter High School Human Resources. All Roots Charter High School employees (including contract or temporary) will:

  1. Complete a Security and Privacy Fundamentals Training.
  2. Complete a Security and Privacy Training for Researchers and Evaluators, if your position is a research analyst or if requested by the Chief Privacy Officer.
  3. Consult with Roots Charter High School internal data owners when creating or disseminating reports containing data.
  4. Use password-protected state-authorized computers when accessing any student-level or staff-level records.
  5. NOT share individual passwords for personal computers or data systems with anyone.
  6. Log out of any data system/portal and close the browser after each use.
  7. Store sensitive data on appropriate-secured location.  Unsecured access and flash drives, DVD, CD-ROM or other removable media, or personally owned computers or devices are not deemed appropriate for storage of sensitive, confidential or student data.
  8. Keep printed reports with personally identifiable information in a locked location while unattended, and use the secure document destruction service provided at Roots Charter High School when disposing of such records.
  9. NOT share personally identifying data during public presentations, webinars, etc. If users need to demonstrate child/staff level data, demo records should be used for such presentations.
  10. Redact any personally identifiable information when sharing sample reports with general audiences, in accordance with guidance provided by the student data manager, found in Appendix B (Protecting PII in Public Reporting).
  11.  Take steps to avoid disclosure of personally identifiable information in reports, such as aggregating, data suppression, rounding, recoding, blurring, perturbation, etc.
  12. Delete files containing sensitive data after using them on computers, or move them to secured servers or personal folders accessible only by authorized parties.
  13. NOT use email to send screenshots, text, or attachments that contain personally identifiable or other sensitive information. If users receive an email containing such information, they will delete the screenshots/text when forwarding or replying to these messages. If there is any doubt about the sensitivity of the data the Student Data Privacy Manager should be consulted..
  14. Use secure methods when sharing or transmitting sensitive data. The approved method is Roots Charter High School’s Secure File Transfer Protocol (SFTP) website. Also, sharing within secured server folders is appropriate for Roots Charter High School internal file transfer.
  15. NOT transmit child/staff-level data externally unless expressly authorized in writing by the data owner and then only transmit data via approved methods such as described in item ten.
  16. Limit use of individual data to the purposes which have been authorized within the scope of job responsibilities.

4.4              data security and privacy training

4.4.1                      Purpose

Roots Charter High School will provide a range of training opportunities for all Roots Charter High School staff, including volunteers, contractors and temporary employees with access to student educational data or confidential educator records in order to minimize the risk of human error and misuse of information.

4.4.2                    Scope

All Roots Charter High School board members, employees, and contracted partners.

4.4.3                    Compliance

New employees that do not comply may not be able to use Roots Charter High School networks or technology.

4.4.4                    Policy

1.              Within the first week of employment, all Roots Charter High School board members, employees, and contracted partners must sign and follow the Roots Charter High School Employee Acceptable Use Policy, which describes the permissible uses of state technology and information.

2.            New employees that do not comply may not be able to use Roots Charter High School networks or technology. Within the first week of employment, all Roots Charter High School board members, employees, and contracted partners also must sign and obey the Roots Charter High School Employee Non-Disclosure Agreement, which describes appropriate uses and the safeguarding of student and educator data.

3.            All current Roots Charter High School board members, employees, and contracted partners are required to participate in an annual Security and Privacy Fundamentals Training Curriculum within 60 days of the adoption of this rule.

4.            Roots Charter High School requires a targeted Security and Privacy Training for Data Stewards and IT staff for other specific groups within the agency that collect, store, or disclose data. The Chief Privacy Officer will identify these groups. Data and Statistics Coordinator will determine the annual training topics for these targeted groups based on Roots Charter High School training needs.

5.            Participation in the training as well as a signed copy of the Employee Non-Disclosure Agreement will be annually monitored by supervisors. Supervisors and the board secretary will annually report all Roots Charter High School board members, employees, and contracted partners who do not have these requirements completed to the IT Security Manager.

5               Data disclosure

5.1                  Purpose

Providing data to persons and entities outside of the Roots Charter High School increases transparency, promotes education in Utah, and increases knowledge about Utah public education. This policy establishes the protocols and procedures for sharing data maintained by Roots Charter High School. It is intended to be consistent with the disclosure provisions of the federal Family Educational Rights and Privacy Act (FERPA), 20 U.S.C. 1232g, 34 CFR Part 99 and Utah’s Student Data Protection Act (SDPA), U.C.A §53A-1-1401.

5.2                Policy for disclosure of Personally Identifiable Information (PII)

5.2.1                      Student or Student’s Parent/Guardian Access

Parents are advised that the records maintained by Roots Charter High School are provided to Roots Charter High School by the school district in which their student is/was enrolled, and access to their student’s record can be obtained from the student’s school district. In accordance with FERPA regulations 20 U.S.C. § 1232g (a)(1) (A) (B) (C) and (D), LEAs will provide parents with access to their child’s education records, or an eligible student access to his or her own education records (excluding information on other students, the financial records of parents, and confidential letters of recommendation if the student has waived the right to access), within 45 days of receiving an official request. LEAs and Roots Charter High School is not required to provide data that it does not maintain, nor is Roots Charter High School required to create education records in response to an eligible student's request.

5.2.2                    Third Party Vendor

Third party vendors may have access to students’ personally identifiable information if the vendor is designated as a “school official” as defined in FERPA, 34 CFR §§ 99.31(a)(1) and 99.7(a)(3)(iii). A school official may include parties such as: professors, instructors, administrators, health staff, counselors, attorneys, clerical staff, trustees, members of committees and disciplinary boards, and a contractor, consultant, volunteer or other party to whom the school has outsourced institutional services or functions.

All third-party vendors contracting with Roots Charter High School must be compliant with Utah’s Student Data Protection Act (SDPA), U.C.A §53A-1-1401. Vendors determined not to be compliant may not be allowed to enter into future contracts with Roots Charter High School without third-party verification that they are compliant with federal and state law, and board rule.

5.2.3                    Internal Partner Requests

Internal partners to Roots Charter High School include LEA and school officials that are determined to have a legitimate educational interest in the information. All requests shall be documented in Roots Charter High School’s data request ticketing system.

5.2.4                    Governmental Agency Requests

Roots Charter High School may not disclose personally identifiable information of students to external persons or organizations to conduct research or evaluation that is not directly related to a state or federal program reporting requirement, audit, or evaluation. The requesting governmental agency must provide evidence the federal or state requirements to share data in order to satisfy FERPA disclosure exceptions to data without consent in the case of a federal or state

a)           reporting requirement

b)           audit

c)            evaluation

The Coordinator of Data and Statistics will ensure the proper data disclosure avoidance are included if necessary. An Interagency Agreement must be reviewed by legal staff and must include “FERPA-Student Level Data Protection Standard Terms and Conditions or Required Attachment Language.”

5.3                Policy for External disclosure of Non-Personally Identifiable Information (PII)

5.3.1                      Scope

External data requests from individuals or organizations that are not intending on conducting external research or are not fulfilling a state or federal reporting requirement, audit, or evaluation.

5.3.2                    Student Data Disclosure Risk Levels

Roots Charter High School has determined four levels of data requests with corresponding policies and procedures for appropriately protecting data based on risk: Low, Medium, and High. The Coordinator of Data and Statistics will make final determinations on classification of student data requests risk level.

5.3.2.1                       Low-Risk Data Request Process                    

Definition: High-level aggregate data

Examples:

·       Graduation rate by year for the state

·       Percent of third-graders scoring proficient on the SAGE ELA assessment

                      

Process: Requester creates a ticket, Data Request forwarded to appropriate Data Steward. Data Steward fulfills request and saves the dataset in a secure folder managed by the Coordinator of Data and Statistics. The Data Steward closes the ticket.

 

5.3.2.2                     Medium-Risk Data Request Process              

Definition: Aggregate data, but because of potentially low n-sizes, the data must have disclosure avoidance methods applied.

 

Examples:

·       Graduation rate by year and LEA

·       Percent of third-graders scoring proficient on the SAGE ELA assessment by school

·       Child Nutrition Program Free or Reduced Lunch percentages by school

                      

Process: Requester creates a ticket, Data Request forwarded to appropriate Data Steward, Data Steward fulfills request, applies appropriate disclosure avoidance techniques, and sends to another Data Steward for Quality Assurance (ensuring student data protection). If it passes QA, data are sent to requester and saves the dataset in a secure folder managed by the Coordinator of Data and Statistics. Data Steward closes the ticket. If it does not pass QA, the data are sent back to the Data Steward for modification.

5.3.2.3                     High-Risk Data Request Process                    

Definition: Student-level data that are de-identified.

 

Examples:

·       De-identified student-level graduation data

·       De-identified student-level SAGE ELA assessment scores for grades 3-6.

                      

Process: Requester creates a ticket, Data Request forwarded to Data and Statistic Coordinator for review. If the request is approved, an MOA is drafted and sent to legal, placed on the board consent calendar, reviewed by the Superintendent, sent to the Purchasing/Contract Manager, sent to Coordinator or Data and Statistics, appropriate Data Steward fulfills request, de-identifies data as appropriate, and sends to another Data Steward for Quality Assurance (ensuring student data protection). If it passes QA, data are sent to requester and saves the dataset in a secure folder managed by the Coordinator of Data and Statistics. The Data Steward closes the ticket. If it does not pass QA, the data are sent back to the Data Steward for modification.

 

5.4               Data Disclosure to a Requesting External Researcher or Evaluator

Responsibility: The Coordinator of Data and Statistics will ensure the proper data are shared with external researcher or evaluator to comply with federal, state, and board rules.

Roots Charter High School may not disclose personally identifiable information of students to external persons or organizations to conduct research or evaluation that is not directly related to a state or federal program audit or evaluation. Data that do not disclose PII may be shared with external researcher or evaluators for projects unrelated to federal or state requirements if:

1.              A Roots Charter High School Director, Superintendent, or board member sponsors an external researcher or evaluator request.

2.            Student data are not PII and are de-identified through disclosure avoidance techniques and other pertinent techniques as determined by the Coordinator of Data and Statistics.

3.            Researchers and evaluators supply the Roots Charter High School a copy of any publication or presentation that uses Roots Charter High School data 10 business days prior to any publication or presentation.

 

Process: Research Proposal must be submitted using this form: http://www.schools.utah.gov/data/Data-Request/ResearcherProposal.aspx. Research proposals are sent directly to the Coordinator of Data and Statistics for review. If the request is approved, an MOA is drafted and sent to legal, placed on the board consent calendar, reviewed by the Superintendent, sent to the Purchasing/Contract Manager, sent to Coordinator or Data and Statistics, appropriate Data Steward fulfills request, de-identifies data as appropriate, and sends to another Data Steward for Quality Assurance (ensuring student data protection). If it passes QA, data are sent to requester and saves the dataset in a secure folder managed by the Coordinator of Data and Statistics. The Data Steward closes the ticket. If it does not pass QA, the data are sent back to the Data Steward for modification.

6               Data breach

6.1                 Purpose

Establishing a plan for responding to a data breach, complete with clearly defined roles and responsibilities, will promote better response coordination and help educational organizations shorten their incident response time. Prompt response is essential for minimizing the risk of any further data loss and, therefore, plays an important role in mitigating any negative consequences of the breach, including potential harm to affected individuals.

6.2               Policy

Roots Charter High School shall follow industry best practices to protect information and data. In the event of a data breach or inadvertent disclosure of personally identifiable information, Roots Charter High School staff shall follow industry best practices outlined in the Agency IT Security Policy for responding to the breach. Further, Roots Charter High School shall follow best practices for notifying affected parties, including students, in the case of an adult student, or parents or legal guardians, if the student is not an adult student.

Concerns about security breaches must be reported immediately to the IT security manager who will collaborate with appropriate members of the Roots Charter High School executive team to determine whether a security breach has occurred. If the Roots Charter High School data breach response team determines that one or more employees or contracted partners have substantially failed to comply with Roots Charter High School’s Agency IT Security Policy and relevant privacy policies, they will identify appropriate consequences, which may include termination of employment or a contract and further legal action. Concerns about security breaches that involve the IT Security Manager must be reported immediately to the Superintendent.

Roots Charter High School will provide and periodically update, in keeping with industry best practices, resources for Utah LEAs in preparing for and responding to a security breach. Roots Charter High School will make these resources available on its website.

7                Record retention and expungement

7.1                  Purpose

Records retention and expungement policies promote efficient management of records, preservation of records of enduring value, quality access to public information, and data privacy.

7.2                Scope

Roots Charter High School board members and staff.

7.3                Policy

The Roots Charter High School, staff, Utah LEAs and schools shall retain and dispose of student records in accordance with Section 63G-2-604, 53A-1-1407, and shall comply with active retention schedules for student records per Utah Division of Archive and Record Services.

In accordance with 53A-1-1407, the Roots Charter High School shall expunge student data that is stored upon request of the student if the student is at least 23 years old. The Roots Charter High School may expunge medical records and behavioral test assessments. Roots Charter High School will not expunge student records of grades, transcripts, a record of the student’s enrollment or assessment information. Roots Charter High School staff will collaborate with Utah State Achieves and Records Services in updating data retention schedules.

Roots Charter High School maintained student-level discipline data will be expunged after three years.

8               Quality Assurances and Transparency Requirements

8.1                 Purpose

Data quality is achieved when information is valid for the use to which it is applied, is consistent with other reported data and users of the data have confidence in and rely upon it.  Good data quality does not solely exist with the data itself, but is also a function of appropriate data interpretation and use and the perceived quality of the data.  Thus, true data quality involves not just those auditing, cleaning and reporting the data, but also data consumers. Data quality at is addressed in five areas:

8.1.1                       Data Governance Structure

The Roots Charter High School data governance policy is structured to encourage the effective and appropriate use of educational data.  The Roots Charter High School data governance structure centers on the idea that data is the responsibility of all Roots Charter High School sections and that data driven decision making is the goal of all data collection, storage, reporting and analysis.   Data driven decision making guides what data is collected, reported and analyzed.

8.1.2                     Data Requirements and Definitions

Clear and consistent data requirements and definitions are necessary for good data quality.  On the data collection side, the Roots Charter High School communicates data requirements and definitions to LEAs through the Data Clearinghouse Update Transactions documentation (see http://www.schools.utah.gov/computerservices/Data-Clearinghouse.aspx).  The Roots Charter High School also communicates with LEA IT staff regularly, at monthly Data Warehouse Group meetings and at biannual Data Conferences.  Where possible, Roots Charter High School program specialists are invited to these meetings and the same guidance is given to the appropriate LEA program directors.

On the data reporting side, the production and presentation layers provide standard data definitions and business rules.  Data Stewards coordinate data releases through the Data Stewards Group meetings.  All data released includes relevant data definitions, business rules, and are date stamped.  Further, Data and Statistics produces documentation, trainings and FAQs on key statistics and reports, such as AYP, graduation rate and class size.

8.1.3                     Data Collection

Data elements should be collected only once—no duplicate data collections are permitted.  Where possible, data is collected at the lowest level available (i.e. at the student/teacher level).  Thus, there are no aggregate data collections if the aggregate data can be derived or calculated from the detailed data.

For all new data collections, Roots Charter High School provides to LEAs clear guidelines for data collection and the purpose of the data request.  The Roots Charter High School also notifies LEAs as soon as possible about future data collections.  Time must be given to LEAs in order for them to begin gathering the data needed.

8.1.4                     Data Auditing

Data and Statistics Data Analysts perform regular and ad hoc data auditing.  They analyze data in the warehouse for anomalies, investigate the source of the anomalies, and work with IT and/or LEAs in explaining and/or correcting the anomalies.   Data Analysts also work with School Finance to address findings from the Auditors.

8.1.5                     Quality Control Checklist

Checklists have been proven to increase quality (See Appendix C).  Therefore, before releasing high-risk data, Data Stewards and Data Analysts must successfully complete the data release checklist in three areas: reliability, validity and presentation.

9               Data Transparency

Annually, Roots Charter High School will publically post:

·           Roots Charter High School data collections

·           Metadata Dictionary as described in Utah’s Student Data Protection Act (SDPA), U.C.A §53A-1-1401

 

 

 

 

 

 

 

 

 

 

 

10          Appendix

Appendix A. Roots Charter High School Employee Non-Disclosure Agreement

As an employee of the {Insert LEA Name here}, I hereby affirm that: (Initial)  

______ I have read the Employee Non-Disclosure Assurances attached to this agreement form and read and reviewed Data Governance Plan Roots Charter High School policies. These assurances address general procedures, data use/sharing, and data security.        

______ I will abide by the terms of the Roots Charter High School’s policies and its subordinate process and procedures;

______ I grant permission for the manual and electronic collection and retention of security related information, including but not limited to photographic or videotape images, of your attempts to access the facility and/or workstations.

 

Trainings

______ I have completed Roots Charter High School’s Data Security and Privacy Fundamentals Training.

______ I will complete Roots Charter High School’s Data Security and Privacy Fundamentals Training within 30 days.

 

Using Roots Charter High School Data and Reporting Systems

______ I will use a password-protected computer when accessing data and reporting systems, viewing child/staff records, and downloading reports.

______ I will not share or exchange individual passwords, for either personal computer(s) or Roots Charter High School system user accounts, with Roots Charter High School staff or participating program staff.

______I will log out of and close the browser after each use of Roots Charter High School data and reporting systems.

______I will only access data in which I have received explicit written permissions from the data owner.

______I will not attempt to identify individuals, except as is required to fulfill job or volunteer duties, or to publicly release confidential data;

 

Handling Sensitive Data

______ I will keep sensitive data on password-protected state-authorized computers.

______ I will keep any printed files containing personally identifiable information in a locked location while unattended.

______ I will not share child/staff-identifying data during public presentations, webinars, etc. I understand that dummy records should be used for such presentations.

______ I will delete files containing sensitive data after working with them from my desktop, or move them to a secured Roots Charter High School server.

Reporting & Data Sharing

______ I will not redisclose or share any confidential data analysis except to other authorized personnel without [Roots Charter High School]’s expressed written consent.

______ I will not publically publish any data without the approval of the Superintendent.

______ I will take steps to avoid disclosure of personally identifiable information in state-level reports, such as aggregating, data suppression, rounding, recoding, blurring, perturbation, etc.

______ I will not use email to send screenshots, text, or attachments that contain personally identifiable or other sensitive information. If I receive an email containing such information, I will delete the screenshots/text when forwarding or replying to these messages.

______I will not transmit child/staff-level data externally unless explicitly authorized in writing.

______ I understand that when sharing child/staff-identifying data with authorized individuals, the only approved methods are phone calls or Roots Charter High School’s Secure File Transfer Protocol (SFTP). Also, sharing within secured server folders is appropriate for Roots Charter High School internal file transfer.

______ I will immediately report any data breaches, suspected data breaches, or any other suspicious activity related to data access to my supervisor and the Roots Charter High School Information Security Officer. Moreover, I acknowledge my role as a public servant and steward of child/staff information, and affirm that I will handle personal information with care to prevent disclosure.

 

Consequences for Non-Compliance

______ I understand that access to the Roots Charter High School network and systems can be suspended based on any violation of this contract or risk of unauthorized disclosure of confidential information;

______I understand that failure to report violation of confidentiality by others is just as serious as my own violation and may subject me to personnel action, including termination.

 

Termination of Employment

_______I agree that upon the cessation of my employment from Roots Charter High School, I will not disclose or otherwise disseminate any confidential or personally identifiable information to anyone outside of Roots Charter High School without the prior written permission of the Student Data Manager of Roots Charter High School.

Print Name: ___________________________________

Signed: ________________________________________    

Date: __________________

Appendix B. Protecting PII in Public Reporting

Data Gateway Statistical Reporting Method for Protecting PII

Public education reports offer the challenge of meeting transparency requirements while also meeting legal requirements to protect each student’s personally identifiable information (PII). Recognizing this, the reporting requirements state that subgroup disaggregation of the data may not be published if the results would yield personally identifiable information about an individual student. While the data used by the {Insert LEA Name here} (Roots Charter High School ) and local education agencies (LEAs) is comprehensive, the data made available to the public is masked to avoid unintended disclosure of personally identifiable information at summary school, LEA, or state-level reports.

This is done by applying the following statistical method for protecting PII.

  1. Underlying counts for groups or subgroups totals are not reported.
  2. If a reporting group has 1 or more subgroup(s) with 10 or fewer students.
  1. For subgroups with 300 or more students, apply the following suppression rules.
  1. Values of 99% to 100% are recoded to ≥99%
  2. Values of 0% to 1% are recoded to ≤1%
  1. For subgroups with 100 or more than but less than 300 students, apply the following suppression rules.
  1. Values of 98% to 100% are recoded to ≥98%
  2. Values of 0% to 2% are recoded to ≤2%
  1. For subgroups with 40 or more but less than 100 students, apply the following suppression rules.
  1. Values of 95% to 100% are recoded to ≥95%
  2. Values of 0% to 5% are recoded to ≤5%
  1. For subgroups with 20 or more but less than 40 students, apply the following suppression rules.
  1. Values of 90% to 100% are recoded to ≥90%
  2. Values of 0% to 10% are recoded to ≤10%
  3. Recode the percentage in all remaining categories in all groups into intervals as follows (11-19,20-29,…,80-89)
  1. For subgroups with 10 or more but less than 20 students, apply the following suppression rules.
  1. Values of 80% to 100% are recoded to ≥80%
  2. Values of 0% to 20% are recoded to ≤20%
  3. Recode the percentage in all remaining categories in all groups into intervals as follows (20-29,30-39,…,70-79)

 

Appendix C. Example Quality Control Checklist

Reliability (results are consistent)

  1. Same definitions were used for same or similar data previously reported or it is made very clear in answering the request how and why different definitions were used
  2. Results are consistent with other reported results or conflicting results are identified and an explanation provided in request as to why is different
  3. All data used to answer this particular request was consistently defined (i.e. if teacher data and student data are reported together, are from the same year/time period)
  4. Another Roots Charter High School data steward could reproduce the results using the information provided in the metadata

Validity (results measure what are supposed to measure, data addresses the request)

  1. Request was clarified
  2. Identified and included all data owners that would have a stake in the data used
  3. Data owners approve of data definitions and business rules used in the request
  4. All pertinent business rules were applied
  5. Data answers the intent of the request (intent ascertained from clarifying request)
  6. Data answers the purpose of the request (audience, use, etc.)
  7. Limits of the data are clearly stated
  8. Definitions of terms and business rules are outlined so that a typical person can understand what the data represents

Presentation

  1. Is date-stamped
  2. Small n-sizes and other privacy issues are appropriately handled
  3. Wording, spelling and grammar are correct
  4. Data presentation is well organized and meets the needs of the requester
  5. Data is provided in a format appropriate to the request
  6. A typical person could not easily misinterpret the presentation of the data