Panel Maintenance for the Full Scale Sample

Baccalaureate and Beyond Longitudinal Study, 2008/12 (B&B:08/12) Field Test 2011

1850-0729 4416 rev B and B 2008-12 Field Test 2011 Appendix A-F

Panel Maintenance for the Full Scale Sample

OMB: 1850-0729

Document [docx]
Download: docx | pdf



Appendixes A - F



TABLE OF CONTENTS

CONTENTS

Appendix A Studies Addressing Issues Relevant to NCES Postsecondary

Longitudinal and Sample Surveys Studies Program A-1

Appendix B Technical Review Panel Contact List B-1

Appendix C Confidentiality Agreements C-1

Appendix D Letters and Contacting Materials D-1

Appendix E Linkages to Administrative Data Sources E-1

Appendix F Data Security Language for Vendor Contracts F-1



Appendix A
Studies Addressing Issues Relevant to NCES’ Postsecondary Longitudinal and Sample Surveys Studies Program

Unannotated Bibliography of Publications Using B&B Data
Arranged alphabetically by year



National Center for Education Statistics (NCES) publication numbers are indicated in brackets. Publications with an NCES number may be accessed from the National Center for Education Statistics (NCES) at http://nces.ed.gov.

2009

Ingersoll, R. M., and Perda, D. (2009). The Mathematics and Science Teacher Shortage: Fact and Myth. CPRE Research Report #RR-621. Madison, WI: Consortium for Policy Research in Education.


Ionescu, F. (2009). The Federal Student Loan Program: Quantitative Implications for College Enrollment and Default Rates. Review of Economic Dynamics, 12(1): 205–231.


Olbrecht, A. (2009). Do Academically Deficient Scholarship Athletes Earn Higher Wages Subsequent to Graduation? Economics of Education Review, 28(5): 611–619.


Snyder, T.D., Dillow, S.A., and Hoffman, C.M. (2009). Digest of Education Statistics, 2008 (NCES 2009-020). National Center for Education Statistics, Institute of Education Sciences, U.S. Department of Education. Washington, DC.


Wei, C.C., and Horn, L. (2009). A Profile of Successful Pell Grant Recipients: Time to Bachelor’s Degree and Early Graduate School Enrollment (NCES 2009-156). National Center for Education Statistics, Institute of Education Sciences, U.S. Department of Education. Washington, DC.


2008

Anderson, S.E. (2008). Teacher Career Choices: Timing of Teacher Careers Among 1992–93 Bachelor’s Degree Recipients (NCES 2008-153). National Center for Education Statistics, Institute of Education Sciences, U.S. Department of Education. Washington, DC.

Bosshardt, W., and Watts, M. (2008). Undergraduate Students’ Coursework in Economics. Journal of Economic Education, 39(2): 198–205.

Choy, S., and Bradburn, E. (2008). Ten Years After College: Comparing the Employment Experiences of 1992–93 Bachelor’s Degree Recipients With Academic and Career-Oriented Majors (NCES 2008-155). National Center for Education Statistics, Institute of Education Sciences, U.S. Department of Education. Washington, DC.

Ionescu, F. A. (2008). Consolidation of Student Loan Repayments and Default Incentives. The B.E. Journal of Macroeconomics, 8(1), Article 22.


Lowe, S. K., Borstorff, P. C., and Landry III, Robert J. (2008). An Empirical Examination of the Phenomenon of Grade Inflation in Higher Education: A Focus of Grade Divergence Between Business and Other Fields of Study. Academy of Educational Leadership Journal, 12(1), 15–33.

Mittapalli, K. (2008). Understanding Classroom Teacher Attrition: Characteristics of Three Groups. ERS Spectrum, 26(3), 21–33.

Sasser, A. (2008). The Future of the Skilled Labor Force in New England: The Supply of Recent College Graduates. Boston: New England Policy Center, Federal Reserve Bank of Boston.

Strayhorn, T. (2008). Influences on Labor Market Outcomes of African American College Graduates: A National Study. Journal of Higher Education, 79(1): 28–57.

Zhang, L. (2008). Gender and Racial Gaps in Earnings Among Recent College Graduates. Review of Higher Education, 32(1): 51–72.

Zhang, L. (2008). The Way to Wealth and the Way to Leisure: The Impact of College Education on Graduates’ Earnings and Hours of Work. Research in Higher Education, 49(3), 199–213.

2007

Alt, M.N., and Henke, R.R. (2007). To Teach or Not to Teach? Teaching Experience and Preparation Among 1992–93 Bachelor’s Degree Recipients 10 Years After College (NCES 2007-163). National Center for Education Statistics, Institute of Education Sciences, U.S. Department of Education. Washington, DC.

Bacolod, M. (2007). Who Teaches and Where They Choose to Teach: College Graduates of the 1990s. Educational Evaluation and Policy Analysis, 29(3): 155–168.

Masuo, D.M., Kutara, P., Wall, R., and Cheang, M. (2007). Financial Information Project: Assessing the Financial Interests of College Students. Journal of Family and Consumer Sciences, 99(3): 29–36.

Nevill, S.C., and Chen, X. (2007). The Path Through Graduate School: A Longitudinal Examination 10 Years After Bachelor’s Degree (NCES 2007-162). National Center for Education Statistics, Institute of Education Sciences, U.S. Department of Education. Washington, DC.

2006

Bradburn, E.M., Nevill, S., and Cataldi, E.F. (2006). Where Are They Now? A Description of 1992–93 Bachelor’s Degree Recipients 10 Years Later (NCES 2007-159). National Center for Education Statistics, Institute of Education Sciences, U.S. Department of Education. Washington, DC.

Choy, S.P., and Li, X. (2006). Dealing With Debt: 1992–93 Bachelor’s Degree Recipients 10 Years Later (NCES 2006-156). National Center for Education Statistics, Institute of Education Sciences, U.S. Department of Education. Washington, DC.

Goyette, K., and Mullen, A. (2006). Who Studies the Arts and Sciences? Social Background and the Choice and Consequences of Undergraduate Field of Study. Journal of Higher Education, 77(3): 497–538.

Joy, L. (2006). Occupational Differences Between Recent Male and Female College Graduates. Economics of Education Review, 25(2): 221–231.

Strayhorn, T. (2006). Factors Influencing the Academic Achievement of First-Generation College Students. NASPA Journal, 43(4): 82–111.

2005

Bosshardt, W., and Watts, M. (2005). Teachers’ Undergraduate Coursework in Economics in the Baccalaureate and Beyond Longitudinal Study. Journal of Economic Education, 36(4): 400.

Bradburn, E.M., Nevill, S., and Cataldi, E.F. (2005). 1992–93 Bachelor’s Degree Recipients and Their Opinions About Education in 2003 (NCES 2005-174). National Center for Education Statistics, Institute of Education Sciences, U.S. Department of Education. Washington, DC.

Choy, S.P., and Li, X. (2005). Debt Burden: A Comparison of 1992–93 and 1999–2000 Bachelor’s Degree Recipients a Year After Graduating (NCES 2005-170). National Center for Education Statistics, Institute of Education Sciences, U.S. Department of Education. Washington, DC.

Henke, R.R., Peter, K., Li, X., and Geis, S. (2005). Elementary/Secondary School Teaching Among Recent College Graduates: 1994 and 2001 (NCES 2005-161). National Center for Education Statistics, Institute of Education Sciences, U.S. Department of Education. Washington, DC.

Minicozzi, A. (2005). The Short Term Effect of Educational Debt on Job Decisions. Economics of Education Review, 24(4): 417–430.

Peter, K., and Cataldi, E.F. (2005). The Road Less Traveled? Students Who Enroll in Multiple Institutions (NCES 2005-157). National Center for Education Statistics, Institute of Education Sciences, U.S. Department of Education. Washington, DC.

Peter, K., and Horn, L. (2005). Gender Differences in Participation and Completion of Undergraduate Education and How They Have Changed Over Time (NCES 2005-169). National Center for Education Statistics, Institute of Education Sciences, U.S. Department of Education. Washington, DC.

Wine, J.S., Cominole, M.B., Wheeless, S., Dudley, K., and Franklin, J. (2005). 1993/03 Baccalaureate and Beyond Longitudinal Study (B&B:93/03) Methodology Report (NCES 2006-166). National Center for Education Statistics, Institute of Education Sciences, U.S. Department of Education. Washington, DC.

Zhang, L. (2005). Advance to Graduate Education: The Effect of College Quality and Undergraduate Majors. Review of Higher Education, 28(3): 313–338.

Zhang, L. (2005). Do Measures of College Quality Matter? The Effect of College Quality on Graduates’ Earnings. Review of Higher Education, 28(4): 571–596.

2004

Heuer, R. (2004). Migration of Recent College Graduates. Doctoral dissertation, North Carolina State University.

Perna, L.W. (2004). Understanding the Decision to Enroll in Graduate School: Sex and Racial/Ethnic Group Differences. Journal of Higher Education, 75(5): 487–527.

Price, D.V. (2004). Educational Debt Burden Among Student Borrowers: An Analysis of the Baccalaureate and Beyond Panel, 1997 Follow-Up. Research in Higher Education, 45(7): 701–737.

Shen, J., Mansberger, N., and Yang, H. (2004). Teacher Quality and Students Placed at Risk: Results from the Baccalaureate and Beyond Longitudinal Study, 1993–97. Educating Students Placed at Risk. Educational Horizons, 82(3): 226–235.

2003

Bradburn, E.M., Berger, R., Li, X., Peter, K., and Rooney, K. (2003). A Descriptive Summary of 1999–2000 Bachelor’s Degree Recipients 1 Year Later, With an Analysis of Time to Degree (NCES 2003-165). National Center for Education Statistics, Institute of Education Sciences, U.S. Department of Education. Washington, DC.

Charleston, S., Riccobono, J., Mosquin, P., and Link, M. (2003). Baccalaureate and Beyond Longitudinal Study: 2000–01 (B&B:2000/01) Methodology Report (NCES 2003-156). National Center for Education Statistics, Institute of Education Sciences, U.S. Department of Education. Washington, DC.

Millett, C.M. (2003). How Undergraduate Loan Debt Affects Application and Enrollment in Graduate or First Professional School. Journal of Higher Education, 74(4): 386–427.

2002

Bradburn, E.M., and Berger, R. (2002). Beyond 9 to 5: The Diversity of Employment Among 1992–93 College Graduates in 1997 (NCES 2003-152). National Center for Education Statistics, U.S. Department of Education. Washington, DC.

LaTurner, R.J. (2002). Teachers’ Academic Preparation and Commitment To Teach Math and Science. Teaching and Teacher Education, 18(6): 653–663.

2001

Clune, M.S., Nunez, A.-M., and Choy, S.P. (2001). Competing Choices: Men’s and Women’s Paths After Earning a Bachelor’s Degree (NCES 2001-154). National Center for Education Statistics, U.S. Department of Education. Washington, DC.

Heller, D.E. (2001). Debts and Decisions: Student Loans and Their Relationship to Graduate School and Career Choice. New Agenda Series™ (Vol. 3, No. 4). Indianapolis, IN: Lumina Foundation for Education.

Henke, R., and Zahn, L. (2001). Attrition of New Teachers Among Recent College Graduates: Comparing Occupational Stability Among 1992–93 College Graduates Who Taught and Those Who Worked in Other Occupations (NCES 2001-189). National Center for Education Statistics, U.S. Department of Education. Washington, DC.

Henry, D.P. (2001). Student Debt and Debt Burden of Graduate and First Professional Students: A National and Institutional Analysis. Unpublished doctoral dissertation, The College of William and Mary.

Horn, L.J., and Zahn, L. (2001). From Bachelor’s Degree To Work: Major Field of Study and Employment Outcomes of 1992–93 Bachelor’s Degree Recipients Who Did Not Enroll in Graduate Education by 1997 (NCES 2001-165). National Center for Education Statistics, U.S. Department of Education. Washington, DC.

Perry, K.K. (2001). Where College Students Live After They Graduate. National Center for Education Statistics, U.S. Department of Education. Washington, DC.

2000

Choy, S.P. (2000). Debt Burden Four Years After College (NCES 2000-188). National Center for Education Statistics, U.S. Department of Education. Washington, DC.

Henke, R.R., Chen, X., and Geis, S. (2000). Progress Through the Teacher Pipeline: 1992–93 College Graduates and Elementary/Secondary School Teaching as of 1997 (NCES 2000-152). National Center for Education Statistics, U.S. Department of Education. Washington, DC.

Redd, K.E. (2000). HBCU Graduates: Employment Earnings and Success After College. New Agenda Series™ (Vol. 2, No. 4). Indianapolis, IN: USA Group, Inc.

1999

Boe, E.E., Cook, L.H., Paulsen, C.A., Barkanic, G., and Leow, C.S. (1999). Productivity of Teacher Preparation Programs: Surplus or Shortage in Quantity and Quality of Degree Graduates. Data Analysis Report No.1999-DAR2. Philadelphia: University of Pennsylvania Center for Research and Evaluation in Social Policy.

Fabiano, L. (1999). Measuring Teacher Qualifications (NCES 1999-04). National Center for Education Statistics, U.S. Department of Education. Washington, DC.

Green, P., Myers, S., Veldaman, C., and Pedlow, S. (1999). Baccalaureate and Beyond Longitudinal Study: 1993/97 Second Follow-up Methodology Report (NCES 1999-159). National Center for Education Statistics, U.S. Department of Education. Washington, DC.

Horn, L.J., and Berktold, J. (1999). Students With Disabilities in Postsecondary Education: A Profile of Preparation, Participation, and Outcomes (NCES 1999-187). National Center for Education Statistics, U.S. Department of Education. Washington, DC.

McCormick, A.C., Nunez, A.-M., Shah, V., and Choy, S.P. (1999). Life After College: A Descriptive Summary of 1992–93 Bachelor’s Degree Recipients in 1997, With an Essay on Participation in Graduate and First-Professional Education (NCES 1999-155). National Center for Education Statistics, U.S. Department of Education. Washington, DC.

Salvucci, S., Wenck, S., and Tyson, J. (1999). Development of a Prototype System for Accessing Linked NCES Data (NCES 98-15). National Center for Education Statistics, U.S. Department of Education. Washington, DC.

Shafer, L.L. (1999). Data Sources on Lifelong Learning Available From the National Center for Education Statistics. Working Paper (NCES 1999-11). National Center for Education Statistics, U.S. Department of Education. Washington, DC.

Syverson, P.D. (1999). Part-Time Study Plus Full-Time Employment: The New Way to Go to Graduate School. Invited Commentary. Education Statistics Quarterly, 1(3): 13–15.

Terkla, D.G. (1999). Baccalaureate and Beyond: Tracking Long-Term Outcomes for Bachelor’s Degree Recipients. Invited Commentary. Education Statistics Quarterly, 1(3): 16–17.

1998

Nunez, A.-M., and Cuccaro-Alamin, S. (1998). First-Generation Students: Undergraduates Whose Parents Never Enrolled in Postsecondary Education (NCES 98-082). National Center for Education Statistics, U.S. Department of Education. Washington, DC.

Thomas, S.L. (1998). Deferred Costs and Economic Returns to College Major, Quality, and Performance: Recent Trends. Paper presented at the annual meeting of the Association for the Study of Higher Education, Miami, FL.

1997

Choy, S.P., and Geis, S. (1997). Early Labor Force Experiences and Debt Burden (NCES 97-286). National Center for Education Statistics, U.S. Department of Education. Washington, DC.

Dey, E.L., Hurtado, S., Rhee, B.-S., Inkelas, K.K., Wimsatt, L.A., and Guan, F. (1997). Improving Research on Postsecondary Student Outcomes: A Review of the Strengths and Limitations of National Data Resources. NCPI–5–01. Stanford, CA: National Center for Postsecondary Improvement.

Henke, R.R., Choy, S.P., Chen, X., Geis, S., and Alt, M.N. (1997). America’s Teachers: Profile of a Profession, 1993–94 (NCES 97-460). National Center for Education Statistics, U.S. Department of Education. Washington, DC.

Veldman, C., Green, P.J., Myers, S., Chuchro, L., and Giese, P. (1997). Baccalaureate and Beyond Longitudinal Study: Second Follow-up Field Test Report, 1996 (NCES 97-261). National Center for Education Statistics, U.S. Department of Education. Washington, DC.

1996

Green, P.J., Meyers, S.L., Giese, P., Law, J., Speizer, H.M., Tardino, V.S., and Knepper, P. (1996). Baccalaureate and Beyond Longitudinal Study: 1993/94 First Follow-up Methodology Report (NCES 96–149). National Center for Education Statistics, U.S. Department of Education. Washington, DC.

Henke, R.R., Geis, S., and Giambattista, J. (1996). Out of the Lecture Hall and Into the Classroom: 1992–93 College Graduates and Elementary/Secondary School Teaching (NCES 96-899). National Center for Education Statistics, U.S. Department of Education. Washington, DC.

McCormick, A., and Horn, L.J. (1996). A Descriptive Summary of 1992–93 Bachelor’s Degree Recipients: 1 Year Later, With Essay on Time to Degree (NCES 96-158). National Center for Education Statistics, U.S. Department of Education. Washington, DC.

1995

McGrew, K. (1995). Disability Summary Analyses of Select National Data Collection Programs. Technical Report 11. Minneapolis, MN: National Center on Educational Outcomes, University of Minnesota.

1994

Knepper, P. (1994). Field Test Methodology Report, Baccalaureate and Beyond First Follow-up (B&B:93/94) (NCES 94-371). National Center for Education Statistics, U.S. Department of Education. Washington, DC.

Appendix B
Technical Review Panel Contact List


2008/09 Baccalaureate and Beyond Longitudinal Study (B&B:08/09)

Technical Review Panel



Eric Bettinger

Stanford University

520 Galvez Mall

Stanford, CA 94305

Voice: (650)736-7727

Email: [email protected]


Bryan Cook

American Council on Education

One Dupont Circle, NW, Suite 800

Washington, DC 20036

Voice: (202)939-9381

Email: [email protected]


Daniel Goldhaber

University of Washington

425 Pontius Avenue North, Suite 410

Seattle, WA 98109

Voice: (206)685-2214

Email: [email protected]


Jason Grissom

Harry S. Truman School of Public Affairs

University of Missouri

118 Middlebush Hall

Columbia, MO 65211

Voice: (573)884-3632

Email: [email protected]


Tammy Halligan

Career College Association

10 G Street, NE, Suite 750

Washington, DC 20002-4213

Voice: (202)336-6839

Email: [email protected]


Young Kim

American Council on Education

One Dupont Circle NW

Washington, DC 20036

Voice: (202)939-9707

Email: [email protected]


Laura Perna

University of Pennsylvania

Graduate School of Education

3700 Walnut, Room 424

Philadelphia, PA 19104-6216

Voice: (215)746-2522

Email: [email protected]


Kent Phillippe

American Association of Community Colleges

One Dupont Circle, NW, Suite 410

Washington, DC 20036

Voice: (202)728-0200

Email: [email protected]


Michael Podgursky

University of Missouri

233 Professional Building

Columbia, MO 65211

Voice: (573)884-7741

Email: [email protected]


Steven Rivkin

Amherst College

P.O. Box 5000

Amherst, MA 01002-5000

Voice: (413)542-2106

Email: [email protected]


Harold Salzman

Rutgers University

30 Livingston Avenue

John J. Heldrich Center for Workforce Development

Amherst, NJ 08901-8554

Voice: (978)929-9503

Email: [email protected]


Judith Scott-Clayton

Columbia University

Teachers College

525 West 120th Street, Box 174

New York, NY 10027

Voice: (212)678-3478

Email: [email protected]


Jeff Strohl

Georgetown University

Center on Education and the Workforce

37th and O Streets, NW – 5000 Harris Building

Washington, DC 20057

Voice: (202)687-4945

Email: [email protected]


Paul Umbach

North Carolina State University

College of Education

300 Poe Hall, Box 7801

Raleigh, NC 27695

Voice: (919)515-9336

Email: [email protected]


Robert Yin

Cosmos Corporation

3 Bethesda Metro Center, Suite 420

Bethesda, MD 20814

Voice: (301)215-9100

Email: [email protected]


Federal Panelists


Nabeel Alsalam

Congressional Budget Office

Ford House Office Building

Room 423A

Washington, DC 20515

Voice: (202)225-2639

Email: [email protected]


Shane Ball

United States Department of Agriculture

National Institute of Food and Agriculture

1400 Independence Avenue SW, Stop 2201

Washington, DC 20250

Voice: (202)720-6346

Email: [email protected]


David Bergeron

U.S. Department of Education

Office of Postsecondary Education (OPE)

1990 K Street, NW, Room 8022

Washington, DC 20006-8540

Voice: (202)502-7815

Email: [email protected]


Jack Buckley

U.S. Department of Education, NCES

1990 K Street NW, Room 9049

Washington, DC 20006

Email: [email protected]


Elise Christopher

U.S. Department of Education, NCES

1990 K Street, NW, Room 9021

Washington, DC 20006

Voice: (202)502-7899

Email: [email protected]


Mark Fiegener

National Science Foundation

4201 Wilson Boulevard, Suite 965

Division of Science Resources Statistics

Arlington, VA 22230

Voice: (703)292-4622

Email: [email protected]


Daniel Goldenberg

U.S. Department of Education

Office of Planning, Evaluation and Policy Development (OPEPD)

Budget Service, Cost Estimation and Analysis Division

400 Maryland Avenue SW - Room 5W308

Washington, DC 20202

Voice: (202)401-3562

Email: [email protected]


Kashka Kubzdela

U.S. Department of Education

1990 K Street, NW, Room 9014

Washington, DC 20006

Voice: (202)502-7411

Email: [email protected]


Flora Lan

National Science Foundation

4201 Wilson Boulevard, Suite 965

Division of Science Resources Statistics

Arlington, VA 22230

Voice: (703)292-4758

Email: [email protected]


Rochelle Martinez

Office of Management and Budget

725 17th Street, NW

Room 10202 NEOB

Washington, DC 20503

Voice: (202)395-3147

Email:[email protected]


Hiromi Ono

Institute of Education Sciences, NCER

555 New Jersey Avenue NW

Room 617A

Washington, DC 20208

Voice: (202)208-2174

Email: [email protected]


Emilda Rivers

National Science Foundation

4201 Wilson Boulevard, Suite 965

Division of Science Resources Statistics

Arlington, VA 22230

Voice: (703)292-7773

Email: [email protected]


Allen Ruby

Institute of Education Sciences, NCER

555 New Jersey Avenue, NW

Room 611B

Washington, DC 20208-5500

Voice: (202)219-1591

Email: [email protected]


David Smole

Congressional Research Service

101 Independence Avenue, SE

Washington, DC 20540-7440

Voice: (202)707-0624

Email: [email protected]


John Wirt

U.S. Department of Education, NCES

El/Sec Sample Survey Studies Program-ESLSD

1990 K Street, NW, Room 9028

Washington, DC 20006

Voice: (202)502-7478

Email: [email protected]


Ex Officio Members

U.S. Department of Education, NCES

Postsecondary, Adult, and Career Education Division (PACE)


Sharon Boivin

U.S. Department of Education, NCES

1990 K Street, NW, Room 8101

Washington, DC 20006-8540

Voice: (202)502-7627

Email: [email protected]


Lisa Hudson

U.S. Department of Education, NCES

1990 K Street, NW, Room 8104

Washington, DC 20006

Voice: (202)502-7358

Email: [email protected]


Tracy Hunt-White

U.S. Department of Education, NCES

1990 K Street, NW, Room 8113B

Washington, DC 20006

Voice: (202)502-7438

Email: [email protected]


Elise Miller

U.S. Department of Education, NCES

1990 K Street, NW, Room 8113A

Washington, DC 20006

Voice: (202)502-7318

Email: [email protected]


Isaiah O'Rear

U.S. Department of Education, NCES

1990 K Street, NW, Room 8133

Washington, DC 20006

Voice: (202)502-7378

Email: Isaiah.O'[email protected]


Sean Simone

U.S. Department of Education, NCES

1990 K Street NW, Room 8125

Washington, DC 20006

Voice: (202)502-7367

Email: [email protected]


Ted Socha

U.S. Department of Education, NCES

1990 K Street, NW, Room 8130

Washington, DC 20006

Voice: (202)502-7383

Email: [email protected]


Matthew Soldner

U.S. Department of Education, NCES

1990 K Street, NW, Room 8121

Washington, DC 20006

Voice: (202)219-7025

Email: [email protected]


Tom Weko

U.S. Department of Education, NCES

1990 K Street, NW, Room 8099

Washington, DC 20006

Voice: (202)502-7643

Email: [email protected]


Linda Zimbler

U.S. Department of Education, NCES

1990 K Street, NW, Room 8123

Washington, DC 20006-5652

Voice: (202)502-7481

Email: [email protected]


Consultants & Subcontractors


Cynthia Decker

Laurium Evaluation Group

2216 East 26th Place

Tulsa, OK 74114

Voice: (918)728-8380

Email: [email protected]


Andrea Sykes

Laurium Evaluation Group

6032 Holland Court

Columbia, MD 21044

Voice: (240)593-4842

Email: [email protected]


Kforce Government Solutions


Daniel Heffron

Kforce Government Solutions (KGS)

2750 Prosperity Avenue, Suite 300

Fairfax, VA 22031

Voice: (703)245-7388

Email: [email protected]


MPR Associates


Caitlin Green

MPR Associates

2150 Shattuck Avenue, Suite 800

Berkeley, CA 94704

Voice: (510)849-4942

Email: [email protected]


Robin Henke

MPR Associates

2150 Shattuck Avenue, Suite 800

Berkeley, CA 94704

Voice: (510)849-4942

Email: [email protected]


Jennie Woo

MPR Associates

2150 Shattuck Avenue, Suite 800

Berkeley, CA 94704

Voice: (510)849-4942

Email: [email protected]


RTI International


Donna Anderson

RTI International

Education Studies Division

P.O. Box 12194 – 3040 Cornwallis Road

Research Triangle Park, NC 27709

Voice: (919)990-8399

Email: [email protected]


Janet Austin

RTI International

Education Studies Division

P.O. Box 12194 – 3040 Cornwallis Road

Research Triangle Park, NC 27709

Voice: (919)541-7101

Email: [email protected]


Melissa Cominole

RTI International

Education Studies Division

P.O. Box 12194 – 3040 Cornwallis Road

Research Triangle Park, NC 27709

Voice: (919)990-8456

Email: [email protected]


Jeff Franklin

RTI International

Education Studies Division

P.O. Box 12194 – 3040 Cornwallis Road

Research Triangle Park, NC 27709

Voice: (919)485-2614

Email: [email protected]


John Riccobono

RTI International

Education Studies Division

P.O. Box 12194 – 3040 Cornwallis Road

Research Triangle Park, NC 27709

Voice: (919)541-7006

Email: [email protected]


Bryan Shepherd

RTI International

Education Studies Division

P.O. Box 12194 – 3040 Cornwallis Road

Research Triangle Park, NC 27709

Voice: (919)316-3482

Email: [email protected]


Peter Siegel

RTI International

Statistics & Epidemiology

P.O. Box 12194 – 3040 Cornwallis Road

Research Triangle Park, NC 27709

Voice: (919)541-6348

Email: [email protected]


Jennifer Wine

RTI International

Education Studies Division

P.O. Box 12194 – 3040 Cornwallis Road

Research Triangle Park, NC 27709

Voice: (919)541-6870

Email: [email protected]



Appendix C
Confidentiality Agreements

CONFIDENTIALITY AGREEMENT

2007-2008 National Postsecondary Student Aid Study (NPSAS:08)

Option 7 – Baccalaureate & Beyond Longitudinal Study 2008/12 (B&B:08/12)

(RTI Under Contract No. ED-05-CO-0033)


Safeguards for Individuals Against Invasion of Privacy: In accordance with the Privacy Act of 1974 (5 United States Code 552a), the Education Sciences Reform Act of 2002 (Public Law 107-279), the Federal Statistical Confidentiality Order of 1997, the E-Government Act of 2002 (Public Law 107-347), the Computer Security Act of 1987, and the National Center for Education Statistics’ (NCES’) Restricted Use Data Procedures Manual, RTI International (RTI) and all its subcontractors are required to comply with the applicable provisions of the legislation, regulations, and guidelines and to undertake all necessary safeguards for individuals against invasions of privacy.

To provide this assurance and these safeguards in performance of work on this project, all staff, consultants, and agents of RTI, and its subcontractors who have any access to study data, shall be bound by the following assurance.


Assurance of Confidentiality

1. In accordance with all applicable legislation, regulations, and guidelines, RTI assures all respondents that their responses may be used only for statistical purposes and may not be disclosed, or used, in identifiable form for any other purpose except as required by law [Education Sciences Reform Act of 2002 (ESRA 2002), 20 U.S. Code, § 9573].

2. The following safeguards will be implemented to assure that confidentiality is protected as allowable by law (20 U.S.C. § 9573) by all employees, consultants, agents, and representatives of RTI and all subcontractors and that physical security of the records is provided:

  1. All staff with access to data will take an oath of nondisclosure and sign an affidavit to that effect.

  2. At each site where these items are processed or maintained, all confidential records that will permit identification of individuals shall be kept in a safe, locked room when not in use or personally attended by project staff.

  3. When confidential records are not locked, admittance to the room or area in which they reside shall be restricted to staff sworn to confidentiality on this project.

  4. All electronic data shall be maintained in secure and protected data files, and personally identifying information shall be maintained on separate files from statistical data collected under this contract.

  5. All data files on network or multi-user systems shall be under strict control of a database manager with access restricted to project staff sworn to confidentiality, and then only on a need-to-know basis.

  6. All data files on single-user computers shall be password protected and all such machines will be locked and maintained in a locked room when not attended by project staff sworn to confidentiality.

  7. External electronically stored data files (e.g., tapes on diskettes) shall be maintained in a locked storage device in a locked room when not attended by project staff sworn to confidentiality.

  8. Any data released to the general public shall be appropriately masked or perturbated such that linkages to individually identifying information are protected to avoid individual identification in disclosed data.

  9. Data or copies of data may not leave the authorized site for any reason.

3. Staff, consultants, agents, or RTI and all its subcontractors will take all necessary steps to ensure that the letter and intent of all applicable legislation, regulations, and guidelines are enforced at all times through appropriate qualifications standards for all personnel working on this project and through adequate training and periodic follow-up procedures.



By my signature affixed below, I hereby swear and affirm that I have carefully read this statement and fully understand the statement as well as legislative and regulatory assurances that pertain to the confidential nature of all records to be handled in regard to this project, and will adhere to all safeguards that have been developed to provide such confidentiality. As an employee, consultant, agent, or representative of RTI or one of its subcontractors, consultants, agents, or representatives, I understand that I am prohibited by law from disclosing any such confidential information to anyone other than staff, consultant, agents, or representatives of RTI, its subcontractors, or agents, and NCES. I understand that any willful and knowing individual disclosure or allowance of disclosure in violation of the applicable legislation, regulations, and guidelines is punishable by law and would subject the violator to possible fine or imprisonment.



/ / /

(Signature) (RTI Employee ID Number) (Date)



/ / /

(Supervisor's Signature) (RTI Employee ID Number) (Date)

AFFIDAVIT OF NONDISCLOSURE

2007-2008 National Postsecondary Student Aid Study (NPSAS:08)

Option 7 – Baccalaureate & Beyond Longitudinal Study 2008/12 (B&B:08/12)

(RTI Under Contract No. ED-05-CO-0033)


(Name)




(Job Title)




(Date of Assignment to B&B:2008/09 Project)




(Organization, State, or Local Agency or Instrumentality)




(Address)


I, _________________________________, do solemnly swear (or affirm) that when given access to any Baccalaureate & Beyond Longitudinal Study 2008/12 (B&B:2008/12) project-related data bases or files containing individually identifiable information, I will not:

  1. use or reveal any individually identifiable information furnished, acquired, retrieved or assembled by me or others, under the provisions of Section 183 of the Education Sciences Reform Act of 2002 (PL 107-279) and Title V, subtitle A of the E-Government Act of 2002 (PL 107-347) for any purpose other than statistical purposes specified in the NCES survey, project or contract;

  2. make any disclosure or publication whereby a sample unit or survey respondent could be identified or the data furnished by or related to any particular person under this section could be identified; or

  3. permit anyone other than the individuals authorized by the Commissioner of the National Center for Education Statistics to examine the individual reports.

_____________________________

(Signature)

(The penalty for unlawful disclosure is a fine of not more than $250,000 [under 18 U.S.C. 3571] or imprisonment for not more than 5 years [under 18 U.S.C. 3559], or both. The word "swear" should be stricken out wherever it appears when a person elects to affirm the affidavit rather than to swear to it.)


State of _________________________

County of ________________________

Subscribed and sworn/affirmed before me, _____________________________, a Notary Public in and for ________________________County, State of ____________________________, on this date, _______________.



___________________________________________

Notary Public

My commission expires: ____________________________________.


Appendix D
Letters and Contacting Materials


B&B Study Brochure D-3

Initial Contact Address Update Letter D-5

Data Collection Announcement Letter D-7

Thank You/Reminder Postcard D-9

Enclosure D-10

Data Collection Announcement Email D-11

Early Completion Reminder Email D-12

Second Periodic Reminder Email D-13

Script for B&B 2nd Follow-Up FT Video D-14



Note: The materials included in this appendix reference the field test study to be conducted in 2011. These materials will also be used for the full-scale study. Materials will be updated to reflect full-scale sample sizes and dates. Emails and letters providing similar content to those shown in this appendix will be sent throughout data collection to encourage participation.  In addition, sample members that request follow-up reminders via text message will receive text message prompts to complete the survey.



B&B STUDY BROCHURE

INITIAL CONTACT ADDRESS UPDATE LETTER

«fname» «mname» «lname» «suffix» Study ID: «caseid»

«addr1»

«addr2»

«city», «state» «zip»«zip4»


Dear «fname»,


You have been randomly selected to participate in the Baccalaureate and Beyond Longitudinal Study (B&B), sponsored by the National Center for Education Statistics (NCES) in the U.S. Department of Education’s Institute of Education Sciences. B&B will collect education, employment, and other information from you and others like you who graduated from college during the 2006–07 school year. Data collected from B&B will help educators, researchers, and policymakers better understand how earning a bachelor’s degree impacts choices about further education and work. This is the second round of B&B. Whether or not you have participated in prior rounds of B&B, your participation now is critically important.


When B&B data collection begins in July 2011, you will receive a letter in a large white envelope that will provide specific information about how to participate. That package will also include a $5 bill as a token of our appreciation for your participation. The letter will explain that if you complete the approximately 35-minute survey on the Web by the date indicated, you will receive an additional <<$AMT>> as a token of our appreciation. In the meantime, we need to update our contact information for you.


Please help us now by providing your mailing address, telephone number(s), and e-mail address(es) on the enclosed address update sheet and returning it in the enclosed postage-paid envelope. To update your information online, or to find out more about B&B, visit the study’s website at https://surveys.nces.ed.gov/bab/.


NCES has contracted with RTI International to conduct B&B on its behalf. The enclosed brochure provides a brief description of B&B, findings from past studies, and a summary of our strict confidentiality procedures. If you have additional questions or concerns about the study after reviewing this material, please call the RTI study director, Melissa Cominole, toll-free at 1-866-662-8227.


We thank you in advance for your participation in this important study. Your cooperation is greatly appreciated.


Sincerely,




T

To update your contact information online: Go to: https://surveys.nces.ed.gov/bab/

Enter Study ID number: «caseid»

homas Weko

Associate Commissioner

Postsecondary Studies Division

National Center for Education Statistics

Enclosure

According to the Paperwork Reduction Act of 1995, no persons are required to respond to a collection of information unless it displays a valid OMB control number.  The valid OMB control number for this voluntary information collection is 1850–0729.  The time required to complete this information collection is estimated to average 35 minutes per response, including the time to review instructions, gather the data needed, and complete and review the information collection.  If you have any comments concerning the accuracy of the time estimate or suggestions for improving this survey, please write to: U.S. Department of Education, Washington, DC 20202–4537.  If you have any comments or concerns regarding the status of your individual submission of this survey, write directly to: The 2008-12 Baccalaureate and Beyond Longitudinal Study (B&B:08/12), National Center for Education Statistics, 1990 K Street, NW, Washington, DC  20006.





DATA COLLECTION ANNOUNCEMENT LETTER


February 1, 2021


«fname» «mname» «lname» «suffix» Study ID: «caseid»

«addr1»

«addr2»

«city», «state» «zip»-«zip4»


Dear «fname»,


Surveys for the Baccalaureate and Beyond Longitudinal Study (B&B) are now being conducted. The survey will take about 35 minutes to complete. As a token of our appreciation for your participation in the study, we have enclosed a $5 bill. Once you complete the survey, we will mail you an additional $«IncAmt» check.


You may access the survey by logging on to our secure website at https://surveys.nces.ed.gov/bab/ using the Study ID and password provided below. The password is case sensitive; you will need to enter it exactly as it appears here.


Study ID = «caseid»

Password = «password»m


Enclosed you will find a brochure with a brief description of findings from prior B&B studies and our strict confidentiality procedures. Federal law requires that we protect your privacy. Your responses will be secured behind firewalls and will be encrypted during internet transmission. Your responses will be used only for statistical purposes and may not be disclosed, or used, in identifiable form for any other purpose, except as required by law. If you have questions, problems completing your survey online, or prefer to complete the survey over the telephone, simply call the B&B Help Desk toll-free at 1-877-262-4440. Your participation, while voluntary, is critical to the study’s success.


If you have any other questions or concerns about the study, please contact the B&B Project Director, Melissa Cominole, toll-free at 1-866-662-8227, [email protected], or the NCES Project Officer, Mr. Ted Socha, at 1-202-502-7383, [email protected].

Thank you in advance for making B&B a success.

Picture 36 Sincerely,


Melissa Cominole Ted Socha

B&B Project Director NCES Project Officer

Education Studies Division National Center for Education Statistics

RTI International U.S. Department of Education


Enclosure RTI USE ONLY: «panelinfo»

According to the Paperwork Reduction Act of 1995, no persons are required to respond to a collection of information unless it displays a valid OMB control number. The valid OMB control number of this information collection is 1850-0729, and it is completely voluntary. The time required to complete this information collection is estimated to average 35 minutes per response, including the time to review instructions, search existing data resources, gather the data needed, and complete and review the information collection. If you have any comments concerning the accuracy of the time estimate or suggestions for improving the survey, please write to: U.S. Department of Education, 400 Maryland Avenue SW, Washington, DC 20006. If you have comments or concerns regarding the status of your individual survey, write directly to: Mr. Ted Socha, National Center for Education Statistics, 1990 K Street, NW, Washington, DC 20006.


THANK YOU/REMINDER POSTCARD


BACCALAUREATE AND BEYOND LONGITUDINAL

STUDY





PO Box 12194

Research Triangle Park, NC 27709-2194

RTI Project #0209777.700.234


ADDRESS SERVICE REQUESTED


«fname» «mname» «lname» «suffix»

«addr1»

«addr2»

«city», «state» «zip»«zip4»



12345678/








BACCALAUREATE

AND BEYOND LONGITUDINAL

STUDY


Recently, we sent you information about participating in the Baccalaureate and Beyond Longitudinal Study (B&B) and completing the survey. If you have already completed the survey, we would like to thank you. Your assistance is very much appreciated.

If you have not yet completed the survey, we would like to remind you that if you complete the survey by «date», you will receive $«IncAmt» as a token of our appreciation.

To complete the online survey over our secure website, log on to https://surveys.nces.ed.gov/bab/.

If you have any questions or problems while completing the online survey or would like to complete the survey over the telephone with a professionally trained interviewer, please contact the B&B Help Desk toll-free at 1-877-262-4440.

RTI International is conducting this study for the National Center for Education Statistics (NCES) in the U.S. Department of Education’s Institute of Education Sciences.



Thank you.

THANK YOU LETTER


(Date)



«fname» «mname» «lname» «suffix» Study ID: «caseid»

«addr1»

«addr2»

«city», «state» «zip» «zip4»

Dear «fname» «lname»:

Thank you for completing the Baccalaureate and Beyond Longitudinal Study (B&B) survey!

The National Center for Education Statistics (NCES) in the U.S. Department of Education’s Institute of Education Sciences and the staff of B&B thank you for your participation.

Enclosed you will find a check for $«IncAmt» as a token of our appreciation.

Your participation in B&B is very important in helping to ensure the success of the study.

If you have any questions, please do not hesitate to contact us toll-free at 1-866-662-8227.

Sincerely,

Picture 36



Melissa Cominole Ted Socha

B&B Project Director NCES Project Officer

Education Studies Division National Center for Education Statistics

RTI International U.S. Department of Education


Enclosure 


DATA COLLECTION ANNOUNCEMENT EMAIL



Dear [FNAME]


In recent years you participated in the National Postsecondary Study Aid Study (NPSAS) and or the Baccalaureate and Beyond Longitudinal Study (B&B). Surveys for the next round of B&B are now being conducted. The survey will take about 35 minutes to complete and the data collected from it will help researchers and policy makers to better understand individual’s education and work experiences after completing a bachelor’s degree.


If you complete your B&B survey by [WEB_INC_DATE], you will receive a $[INCAMT] check as a token of our appreciation. To access the online survey, log in to our secure website at https://surveys.nces.ed.gov/bab/ using the Study ID and password provided below. The password is case sensitive; you will need to enter it exactly as it appears here.


Study ID = [CASEID]

Password = [PASSWORD]e


If you have questions or problems completing your survey, or would like to complete the survey over the telephone, please call the B&B Help Desk toll free at 1-877-262-4440.


Your participation is voluntary but critically important to the success of the study. To ensure confidentiality, your responses will be secured behind firewalls and will be encrypted during internet transmission. Federal law requires that we protect your privacy. Your responses will be used only for statistical purposes and will not be disclosed, or used, in identifiable form for any other purpose, except as required by law.


RTI International is conducting B&B on behalf of the National Center for Education Statistics (NCES) in the U.S. Department of Education's Institute of Education Sciences. If you have any questions about the study, please contact me toll-free at 1-866-662-8227, e-mail: [email protected], or the NCES Project Officer, Ted Socha, at 1-202-502-7383, e-mail: [email protected].


Thank you for helping to make B&B a success.

 

 

Melissa Cominole

B&B Project Director

 

EARLY COMPLETION REMINDER EMAIL


Dear [FIRSTNAME],


We would like to remind you that the early response period for the Baccalaureate and Beyond Longitudinal Study (B&B) is drawing to a close. I hope that you will participate in the study soon.

If you complete your survey by [WEB_INC_DATE], you will receive a $[INCAMT] check as a token of our appreciation.


To access the online survey, go to https://surveys.nces.ed.gov/bab/, and log in using the Study ID and password listed below. The password is case sensitive; please enter it exactly as it appears here.


Study ID = [CASEID]

Password = [PASSWORD]a


If you need help accessing the online survey, or if you prefer to complete the survey by telephone, please call our Help Desk at 1-877-262-4440.


RTI International is conducting this study for the National Center for Education Statistics (NCES) in the U.S. Department of Education's Institute of Education Sciences. If you have any questions or concerns about the study, please contact me, toll-free at 1-866-662-8227 (e-mail: [email protected]), or the NCES Project Officer, Ted Socha, at 1-202-502-7383 (e-mail: [email protected]).


Thank you in advance for your participation in this very important study.


S incerely,



Melissa Cominole

B&B Project Director

SECOND PERIODIC REMINDER EMAIL


Dear [FIRSTNAME] [LASTNAME],


I am writing to ask that you take a few moments to complete your survey for the Baccalaureate and Beyond Longitudinal Study (B&B), sponsored by the U.S. Department of Education's National Center for Education Statistics (NCES). It takes, on average, only 35 minutes, and with your participation, you will be helping researchers and policymakers better understand how earning a bachelor's degree affects the lives of students and their transition to the workforce.


You can complete the survey on our secure website, https://surveys.nces.ed.gov/bab/, using your unique Study ID number and password provided below:

Study ID number = [CASEID]

Password = [PASSWORD]d


The password is case sensitive, so be sure to enter it exactly as it appears above.


Alternatively, you may complete the survey with one of our professional telephone interviewers by calling us at 1-877-262-4440 (toll-free).


Your responses will be used only for statistical purposes and may not be disclosed in identifiable form for any purpose, except as required by law. If you have questions or problems completing your survey, simply call the B&B Help Desk at 1-877-262-4440 or reply to this e-mail.


Thank you for helping to make B&B a success!


Sincerely,



Melissa Cominole

B&B Project Director




SCRIPT FOR B&B 2ND FOLLOW-UP FT VIDEO1


Sample member (SM) goes to the mailbox and gets out a letter:

SM: “Another letter about the Department of Education’s B&B survey. Why do they keep bugging me? This is going in the trash…”

Helicopter with Ed on the side:

“Ed: Sounds like I’m needed!”

Ed lowers into view:

Ed: “Before you throw that away, I’ve got a few things I’d like to tell you.”

SM: “Who are you?”

Ed: “I’m Ed, from the U.S. Department of Education. We want you to take our survey because we want to learn more about what college graduates do in the years following degree completion ”

SM: “What kind of things will you ask me about?”

Scenes progress from a college graduate to a teacher in a classroom, an astronaut, a policeman, travel in a foreign country, life changes (marriage, children), and receiving financial incentive:

Ed: “We’re interested in what you’ve been doing since graduation. Did you become a teacher, or go back to school yourself? Did you become a scientist? an astronaut? A police-officer?

Have you had any life changes, like getting married or having kids?

We can also offer you a cash incentive to thank you for your time.

Scene back in front of house:

SM: “Well, I’m pretty busy…”

Scenes progress from using a phone to using a computer to a home visit:

Ed: “We make it easy for you. You can do the B&B interview by phone, or on the web using your own computer. It won’t take long. In some parts of the country we can even send someone to your house!

Scene back in front of house:

SM: “OK, but one more question. How do I know my answers will stay confidential?

Lego policeman closes a vault/safe

Ed: “Federal law requires that we protect all data collected. Protecting your data is our number one concern.”

SM: “That sounds pretty good, I’ll do it!

Ed turns and talks to the camera:

Ed: “You, too, can help us make the B&B study a success!

Cut to scene of Lego people appearing, holding hands, and swaying back and forth:

Ed: As a recent college graduate, you are in a special position to provide us vital information on your experiences after graduation. With your help we can develop better programs that help students like you find success in college and beyond.

Back in front of house.

SM: “Thanks, ED!!”

Ed: “Thank you for taking our surveyyyyyyyyyyyy!”

Display contact screen:

ED (speaking over the final “credit” slide with the info below typed on it):

Call us toll free at 1-877-662-8227 to complete your interview today! “

And don’t forget to check your e-mail for more information about your participation in this study.”




Appendix E
Linkages to Administrative Data Sources

E.1 Develop Linkages with Administrative Data Sources

RTI will develop linkages with existing data sources to supplement the Baccalaureate and Beyond Longitudinal Study (B&B:08/12) interview data. RTI recognizes the great value added to the B&B:08/12 data file with the addition of data from specific administrative data sources. Certain data (for example, specific financial aid amounts and associated dates) can only be accurately obtained from sources other than the student or parent. Through our experience providing data for many National Center for Education Statistics (NCES) postsecondary studies, including previous B&B studies, Beginning Postsecondary Student (BPS), and National Postsecondary Study Aid Study (NPSAS), we have gained considerable knowledge performing file merges with many existing sources of valuable data, including Department of Education’s (ED) Central Processing System (CPS) for Free Application for Federal Student Aid (FAFSA) data, the National Student Loan Data System (NSLDS), and ACT. For this study, we propose to perform file merges with the following datasets: CPS, NSLDS, and National Student Clearinghouse.

The Family Educational Rights and Privacy Act (FERPA), (34 CFR Part 99) allows the disclosure of information without prior consent for the purposes of B&B:08/12 according to the following excerpts: 99.31 asks “Under what conditions is prior consent not required to disclose information?” and explains in 99.31 (a) “an educational agency or institution may disclose personally identifiable information from an education record of a student without the consent required by 99.30 if the disclosure meets one or more specific conditions. B&B:08/12 collection falls under:

Sec. 99.31 (a)( 3). The disclosure is, subject to the requirements of Sec. 99.35, to authorized representatives of--

(i) The Comptroller General of the United States;

(ii) The Attorney General of the United States;

(iii) The Secretary; or

(iv) State and local educational authorities.


B&B:08/12 is collecting data under the Secretary’s authority. The personally identifiable information is collected from student record systems with adherence to the security protocol detailed in 99.35: “What conditions apply to disclosure of information for Federal or State program purposes?”


(a)(1) Authorized representatives of the officials or agencies headed by officials listed in Sec. 99.31(a)(3) may have access to education records in connection with an audit or evaluation of Federal or State supported education programs, or for the enforcement of or

compliance with Federal legal requirements that relate to those programs.

(2) Authority for an agency or official listed in Sec. 99.31(a)(3) to conduct an audit, evaluation, or compliance or enforcement activity is not conferred by the Act or this part and must be established under other Federal, State, or local authority.

(b) Information that is collected under paragraph (a) of this section must:

(1) Be protected in a manner that does not permit personal identification of individuals by anyone other than the officials or agencies headed by officials referred to in paragraph (a) of this section, except that those officials and agencies may make further disclosures of personally identifiable information from education records on behalf of the educational agency or institution in accordance with the requirements of Sec. 99.33(b); and

(2) Be destroyed when no longer needed for the purposes listed in paragraph (a) of this section.

(c) Paragraph (b) of this section does not apply if:

(1) The parent or eligible student has given written consent for the

disclosure under Sec. 99.30; or

(2) The collection of personally identifiable information is

specifically authorized by Federal law.


Secure Data Transfers. NCES has set up a secure data transfer system, using their NCES member site with Secure Sockets Layer (SSL) technology, described above. We will use this electronic system for submitting data containing potentially identifying information (such as SSNs, names, and dates of birth of our sample members) along with their survey ID (not the same ID that is available on the restricted-use data). Before being transmitted, files will be encrypted using FIPS 140-2 validated encryption tools. We will receive data from the NCES system as well. The system requires that both parties to the transfer be registered users of the NCES Members Site and that their Members Site privileges be set to allow use of the secure data transfer service as described above. This process will be used for all file matching procedures described below, except in instances when the vendor already has a secure data transfer system in place.

E.2 File Merge with ED Central Processing System (CPS)

RTI proposes to perform file merges with the CPS data containing federal student aid application information. The merge with CPS can occur at any time for any number of cases, provided that the case has an apparently valid SSN associated with it. RTI sends a file to CPS and receives in return a large data file containing all students who applied for federal aid. We already have existing programs and procedures in place to prepare and submit files according to rigorous CPS standards. Similarly, we have already developed programs and procedures to receive and process data obtained from CPS.

RTI will electronically upload a file on the FAFSA secure web-site for matching which contains SSN and the first 2 letters of the sample member’s last name (but no other information). Access to the site for the upload is restricted to authorized users who are registered and provide identification/authentication information (SSN, DOB, and personal identification number [PIN]) to the FAFSA data site. The file is retrieved by the Central Processing System or CPS (the FAFSA contractor data system) for linkage. The linked file, containing student aid applications for matched records, is then made available to us only through a secure connection (EdConnect) which requires username and password. All CPS files will be processed, edited, and documented for inclusion on the analytic data files.

The CPS data obtained for the NPSAS:12 data collection will cover academic years beginning with 2010–2011. All CPS files will be processed, edited, and documented for inclusion in the Electronic Codebook (ECB).

E.3 File Merge with National Student Loan Data System Disbursement

RTI will also conduct a file merge with the NSLDS to collect federal loan and Pell grant data for the 2010–2011 award year. The resulting file will contain cumulative amounts for each student’s entire postsecondary education enrollment. NCES has set up a secure data transfer system that uses their NCES member site and Secure Sockets Layer (SSL) technology. The system requires that both parties to the transfer be registered users of the NCES Members Site and that their Members Site privileges be set to allow use of the secure data transfer service. These privileges are set up and carefully controlled by the ED’s Institute of Education Sciences (IES) NCES Chief Technology Officer (CTO). This service has been designed by ED/NCES specifically for the secure transfer of electronic files containing personally identifying information (i.e., data protected under the Privacy Act or otherwise posing risk of disclosure) and can be used for NCES-to-Contractor; Contractor-to-Subcontractor; Subcontractor-to-Contractor; and Contractor-to-Other-Agency data transfers. The party uploading the information onto the secure server at NCES is responsible for deleting the file(s) after the successful transfer has been confirmed. Data transfers using this system will include notification to the ED/IES, the NCES CTO, and the NCES Deputy Commissioner as well as the ED/NCES project officer. The notification will include the names and affiliations of the parties in the data exchange/transfer and the nature and approximate size of the data to be transferred. We have programs to create the files for the merge and also programs to read the data we receive. All matching processes are initiated by RTI staff providing a file with one record per sample member to be merged.

E.6 File Merge with the National Student Clearinghouse

RTI will use the National Student Clearinghouse to obtain the Student Tracker data on institutions attended, enrollment dates, and degree completions for the B&B:08/12 sample.

RTI will first set up an account with the Clearinghouse which will enable sending and receiving of files securely over encrypted FTPS connections. The file containing sensitive student identifiers (name, date of birth, and Social Security number) will be encrypted using FIPS 140-2 validated encryption tools then submitted to the Clearinghouse using their secure FTP site. All files received by the Clearinghouse will be securely stored using FIPS 140-2 validated AES encryption, the US federal encryption standard. Matched files, containing data on enrollment dates, institution names, and degrees completed, will be returned to RTI using the same secure FTP site. This file merge will only be conducted during the full-scale study.

Appendix F
Data Security Language for Vendor Contracts







Data Security Requirements


    1. Contractor shall use data supplied to them by Company for the specific purpose included in the corresponding Statements of Work only.

    2. Contractor will protect all data supplied to them by Company as specifically stated in Exhibit C, attached.

    3. Unless otherwise agreed to, Contractor will promptly and properly destroy data supplied to them by Company upon the Statement of Work completion date.



EXHIBIT C

COMPANY INFORMATION SECURITY REQUIREMENTS

  1. Definitions.

“Business Contact Information” is defined as name, job title, department name, company name, business telephone, business fax number, and business email address.

“COMPANY Confidential Information” as defined in the Agreement.

“Information Processing System(s)” is defined as the individual and collective electronic, mechanical, or software components of CONTRACTOR operations that store and/or process COMPANY Confidential Information.

“Information Security Event” is defined as any situation where COMPANY Confidential Information is lost; is subject to unauthorized or inappropriate access, use, or misuse; the security, confidentiality, or integrity of the information is compromised; or the availability of CONTRACTOR Information Processing Systems is compromised by external attack.

“Security Breach” is defined as an unauthorized access to CONTRACTOR’s facilities, Information Processing Systems or networks used to service, store, or access COMPANY Confidential Information, provided such unauthorized access exposes COMPANY Confidential Information or provided CONTRACTOR is required to report such unauthorized access to appropriate legal or regulatory agencies or affected COMPANY members.

“Industry best practice” is defined by the information security guidelines prepared by the PCI Security Standards Council and documented in the PCI DSS requirements as well as standards and guidelines prepared by the Federal Financial Institutions Examination Council (FFIEC)

  1. Security and Confidentiality.

Before receiving, or continuing to receive, COMPANY Confidential Information, CONTRACTOR will implement and maintain an information security program that ensures: 1) COMPANY’s Confidential Information and CONTRACTOR’s Information Processing Systems are protected from internal and external security threats; and 2) that COMPANY Confidential Information is protected from unauthorized disclosure.

  1. Security Policy.

    1. Formal Security Policy. Consistent with the requirement of this Attachment, CONTRACTOR will create an information security policy that is approved by CONTRACTOR’s management, published and communicated to all CONTRACTOR’s employees. Such information security policy may be reviewed by COMPANY at CONTRACTOR’s place of business pursuant to confidentiality obligations.

    2. Security Policy Review. CONTRACTOR will review the information security policy at planned intervals or if significant changes occur to ensure its continuing suitability, adequacy, and effectiveness.

  2. Asset Management.

    1. Asset Inventory. CONTRACTOR shall have the ability to identify the location of all CONTRACTOR Information Processing Systems and media containing COMPANY Confidential Information.

    2. Acceptable Use. CONTRACTOR will implement rules for the acceptable use of information and assets which is no less restrictive than industry best practice and consistent with the requirements of this Attachment.

    3. Equipment Use While on COMPANY Premises. While on COMPANY’s premises, CONTRACTOR will not connect hardware (physically or via a wireless connection) to COMPANY systems unless necessary for CONTRACTOR to perform Services under this Agreement. This hardware must be inspected / scanned by COMPANY before use.

    4. Portable Devices. COMPANY Confidential Information, with the exception of Business Contact Information, may not be stored on portable devices including, but not limited to, laptops, external hard drives, Personal Digital Assistants, MP3 devices, and USB devices.

    5. Personally-owned Equipment. COMPANY Confidential Information, with the exception of Business Contact Information, may not be stored on personally‑owned equipment.

  3. Human Resources Security.

    1. Security Awareness Training. Prior to CONTRACTOR employees receiving access to COMPANY Confidential Information, they will receive security awareness training appropriate to their job function. CONTRACTOR will also ensure that recurring security awareness training is performed.

    2. Removal of access Rights. The access rights of all CONTRACTOR employees to CONTRACTOR Information Processing Systems or media containing COMPANY Confidential Information will be removed immediately upon termination of their employment, contract or agreement, or adjusted upon change.

  4. Physical and Environmental Security.

    1. Secure Areas. CONTRACTOR will secure all areas, including loading docks, holding areas, telecommunications areas, cabling areas and off-site areas that contain Information Processing Systems or media containing COMPANY Confidential Information by the use of appropriate security controls in order to ensure that only authorized personnel are allowed access and to prevent damage and interference. The following controls will be implemented:

      1. Access will be controlled and restricted by use of a defined security perimeter, appropriate security barriers, entry controls and authentication controls. A record of all accesses will be securely maintained.

      2. All personnel will be required to wear some form of visible identification to identify them as employees, contractors, visitors, et cetera.

      3. Visitors to secure areas will be supervised, or cleared for non-escorted accessed via an appropriate background check. Their date and time of entry and departure will be recorded.

    2. Environmental Security. CONTRACTOR will protect equipment from power failures and other disruptions caused by failures in supporting utilities.

  5. Communications and Operations Management.

    1. Protections Against Malicious Code. CONTRACTOR will implement detection, prevention, and recovery controls to protect against malicious software, which is no less than current industry best practice and perform appropriate employee training on the prevention and detection of malicious software.

    2. Back-ups. CONTRACTOR will perform appropriate back-ups of CONTRACTOR Information Processing Systems and media containing COMPANY Confidential Information as required in order to ensure services and service levels described in this Statement of Work.

    3. Media and Information Handling. CONTRACTOR will protect against unauthorized access or misuse of COMPANY Confidential Information contained on media by use of a media control management program and provide a copy of the program to COMPANY.

      1. COMPANY input and result code data can be stored as Audit Data in a SQLServer table. All Audit Data on this SQLServer table can only be accessed for up to 180 days. After 180 days the Audit Data in the SQLServer table is automatically destroyed.

    4. Media and Information Disposal. CONTRACTOR will securely and safely dispose of COMPANY Confidential Information that resides on media (including but not limited to hard copies, disks, CDs, DVDs, optical disks, USB devices, hard drives) upon the Statement of Work completion date using establishment of procedures to include, but not be limited to:

      1. Disposing of COMPANY Confidential Information on mediaso that it is rendered unreadable or undecipherable, such as by burning, shredding, pulverizing or overwriting in compliance with DoD Standard 5220.22-M.

      2. Maintaining a secured disposal log that provides an audit trail of disposal activities.

      3. Purging COMPANY Confidential Information from all CONTRACTOR’s physical storage mediums (filing cabinets, drawers, et cetera.) and from all Information Processing Systems, including back-up systems, within thirty (30) days of the latest occurrence of following: upon termination of this agreement; or as soon as the COMPANY Confidential Information is no longer required to perform services under this Statement of Work.

      4. Providing a Certificate of Destruction to COMPANY certifying that all COMPANY Confidential Information was purged. The certificate will be provided to COMPANY within ten (10) business days after the information was purged.

    5. Exchange of Information. To protect confidentiality and integrity of COMPANY Confidential Information in transit, CONTRACTOR will:

      1. Perform an inventory, analysis and risk assessment of all data exchange channels (including but not limited to FTP, HTTP, HTTPS, SMTP, modem, and fax) to identify and mitigate risks to COMPANY Confidential Information from these channels.

      2. Monitor and inspect all data exchange channels to detect unauthorized information releases.

      3. Ensure that appropriate security controls using approved data exchange channels are employed when exchanging COMPANY Confidential Information.

      4. If COMPANY Confidential Information can only be sent to CONTRACTOR electronically, then CONTRACTOR must employ industry standard encryption security measures (minimum standard of NIST’s FIPS 140-2) to encrypt COMPANY Confidential Information prior to transmitting via the Internet. Otherwise, COMPANY Confidential Information can only be sent to CONTRACTOR using an encrypted (minimum standard NIST’s FIPS 140-2) CD-ROM sent via courier service with a tracking number.

      5. Ensure that information (including persistent cookies) about COMPANY customers, members or employees is not harvested by CONTRACTOR web pages except for purposes of this Agreement.

    6. Monitoring. To protect against unauthorized access or misuse of COMPANY Confidential Information residing on CONTRACTOR Information Processing Systems, CONTRACTOR will:

      1. Employ current industry best practice security controls and tools to monitor Information Processing Systems and log user activities, exceptions, unauthorized information processing activities, suspicious activities and information security events. Logging facilities and log information will be protected against tampering and unauthorized access. Logs will be kept for at least 90 days.

      2. Perform frequent reviews of logs and take necessary actions to protect against unauthorized access or misuse of COMPANY Confidential Information.

      3. At COMPANY’s request, make logs available to COMPANY to assist in investigations of security breaches.

      4. Comply with all relevant legal requirements applicable to monitoring and logging activities.

      5. Ensure that the clocks of all relevant information processing systems are synchronized using a national or international time source.

  6. Access Control.

    1. User access Management. To protect against unauthorized access or misuse of COMPANY Confidential Information residing on CONTRACTOR Information Processing Systems, CONTRACTOR will:

      1. Employ a formal user registration and de-registration procedure for granting and revoking access and access rights to all CONTRACTOR Information Processing Systems.

      2. Employ a formal password management process.

      3. Perform recurring reviews of users’ access and access rights to ensure that they are appropriate for the users’ role.

    2. User Responsibilities. To protect against unauthorized access or misuse of COMPANY Confidential Information residing on CONTRACTOR Information Processing Systems, CONTRACTOR will:

      1. Ensure that CONTRACTOR Information Processing Systems users follow current security practices in the selection and use of strong passwords.

      2. Ensure that unattended equipment has appropriate protection to prohibit access and use by unauthorized individuals.

      3. Ensure that COMPANY Confidential Information contained at workstations, including but not limited to paper and on display screens is protected from unauthorized access.

    3. Network access Control. access to internal, external, and public network services that allow access to CONTRACTOR Information Processing Systems shall be controlled. CONTRACTOR will:

      1. Ensure that current industry best practice standard authentication mechanisms for network users and equipment are in place and updated as necessary.

      2. Ensure electronic perimeter controls are in place to protect CONTRACTOR Information Processing Systems from unauthorized access.

      3. Ensure authentication methods are used to control access by remote users.

      4. Ensure physical and logical access to diagnostic and configuration ports is controlled.

    4. Operating System access Control. To protect against unauthorized access or misuse of COMPANY Confidential Information residing on CONTRACTOR Information Processing Systems, CONTRACTOR will:

      1. Ensure that access to operating systems is controlled by a secure log-on procedure.

      2. Ensure that CONTRACTOR Information Processing System users have a unique identifier (user ID).

      3. Ensure that the use of utility programs that are capable of overriding system and application controls are highly restricted and tightly controlled.

      4. Ensure that inactive sessions are shut down when technically possible after a defined period of inactivity.

      5. Employ restrictions on connection times when technically possible to provide additional security for high risk applications.

    5. Mobile Computing and Remote Working. To protect COMPANY Confidential Information residing on CONTRACTOR Information Processing Systems from the risks inherent in mobile computing and remote working, CONTRACTOR will:

      1. Perform a risk assessment to identify and mitigate risks to COMPANY Confidential Information from residing on mobile computing and remote access systems.

      2. Develop a policy, operational plans and procedures for managing mobile computing and remote access systems to ensure that COMPANY Confidential Information does not reside on or are used on these systems.

  7. Information Systems Acquisition, Development and Maintenance.

    1. Security of System Files. To protect CONTRACTOR Information Processing Systems and system files containing COMPANY Confidential Information, CONTRACTOR will ensure that access to source code is restricted to authorized users who have a direct need to know.

    2. Security in Development and Support Processes. To protect CONTRACTOR Information Processing Systems and system files containing COMPANY Confidential Information, CONTRACTOR will:

      1. Ensure that the implementation of changes is controlled by the use of formal change control procedures.

      2. Employ industry best practice security controls to minimize information leakage.

      3. Employ oversight quality controls and security management of outsourced software development.

  8. Information Security Incident Management.


Reporting Information Security Events and Weaknesses. To protect CONTRACTOR Information Processing Systems and system files containing COMPANY Confidential Information, CONTRACTOR will, in the event that Contractor becomes aware of (or reasonably suspects) that any information and data obtained pursuant to the Services has been compromised in any manner, immediately notify Company via email or telephone call and follow-up on the incident in writing and provide all requested information about the event. For purposes of this obligation, “compromise” includes suspected or known incidents without limitation: (i) any unauthorized access to information and data obtained pursuant to the Services, (ii) any inadvertent disclosure of information and data obtained pursuant to the Services to any third party, (iii) any known or suspected misuse of information and data obtained pursuant to the Services by any person (even if such person was authorized to access such information or data), (iv) any suspected use of information and data obtained pursuant to the Services by any person outside of the scope of that person’s authority, and (v) any known or suspected alteration of information and data obtained pursuant to the Services other than as required or permitted by this Agreement.

    1. Information Security Events and Security Breaches: Contractor shall

      1. Implement a process to ensure that Information Security Events and Security Breaches are reported through appropriate management channels as quickly as possible.

      2. Train all employees of information systems and services how to report any observed or suspected Information Security Events and Security Breaches.

      3. Notify COMPANY by email ([email protected] or by phone (800-334‑8571) immediately of all suspected Information Security Events and Security Breaches. Following any such event or breach, CONTRACTOR will promptly notify COMPANY as to the COMPANY Confidential Information affected and the details of the event or breach.

  1. Business Continuity Management.

    1. Business Continuity Management Program. In order to ensure services and service levels described in this agreement, CONTRACTOR will:

      1. Develop and maintain a process for business continuity throughout the organization that addresses the information security requirements needed for the CONTRACTOR’s business continuity so that the provision of products and/or services provided under the Agreement to COMPANY is uninterrupted.

      2. Identify events that can cause interruptions to business processes, along with the probability and impact of such interruptions and their consequences for information security.

      3. Develop and implement plans to maintain or restore operations and ensure availability of information at the required level and in the required time scales following interruption to, or failure of, critical business processes and provide COMPANY a copy of the same.

      4. Test and update Business Continuity Plans regularly to ensure that they are up‑to-date and effective.

  2. Security Assessments.

    1. Initial and Recurring Security Assessments. CONTRACTOR will permit COMPANY representatives to perform an on-site physical and logical Security Assessment of CONTRACTOR’s data processing and business facilities prior to the release of COMPANY Confidential Information and each year thereafter. Security Assessments will be performed during regular business hours, at a date and time agreed to by both parties, and will not require online access to CONTRACTOR’s Information Processing Systems.

    2. Security Assessments Following Information Security Events and Security Breaches. Following the occurrence of an Information Security Event or Security Breach, CONTRACTOR will permit COMPANY representatives to perform an on-site physical and logical Security Assessment of CONTRACTOR’s data processing and business facilities to assess the impact of the event or breach even if a Security Assessment has been completed within the year.

    3. Security Assessment Findings. Upon completion of a Security Assessment, COMPANY will provide CONTRACTOR with a Security Assessment completion letter that summarizes COMPANY’s Security Assessment findings. These findings may identify critical security deficiencies identified as “Mandatory” that require immediate correction before COMPANY can release, or continue to release, COMPANY Confidential Information to CONTRACTOR. CONTRACTOR will implement and continue to maintain all mutually agreed upon “Mandatory” security findings. If mutual agreement to “Mandatory” security findings cannot be reached, then these issues may be escalated using the dispute resolution provisions within this Agreement.







1 Note: The video file or screen shots for the Lego video are available upon request.


Supporting Statement Request for OMB Review I

File Typeapplication/vnd.openxmlformats-officedocument.wordprocessingml.document
File TitleChapter 2
Authorelyjak
File Modified0000-00-00
File Created2021-02-01

© 2024 OMB.report | Privacy Policy