Appendix A-B HSLS 2009 Panel Maintenance 2018-2021 Supplemental Materials

Appendix A-B HSLS 2009 Panel Maintenance 2018-2021 Supplemental Materials.docx

High School Longitudinal Study of 2009 (HSLS:09) Panel Maintenance 2018 and 2021

Appendix A-B HSLS 2009 Panel Maintenance 2018-2021 Supplemental Materials

OMB: 1850-0852

Document [docx]
Download: docx | pdf

High School Longitudinal Study of 2009 (HSLS:09) Panel Maintenance 2018 & 2021



Appendix A through B










OMB# 1850-0852 v.29









National Center for Education Statistics

U.S. Department of Education





June 2021




Appendix A
HSLS:09 Technical Review Panel (TRP) Participants






















Technical Review Panel


Stephen DesJardins

Professor

Center for the Study of Higher and Postsecondary Education, School of Education; Gerald R. Ford School of Public Policy

University of Michigan

610 East University Avenue, SOE Building

Ann Arbor, MI 48129

Phone: 734-647-1984

Email: [email protected]


Jeremy Finn

Professor

Graduate School of Education

The University at Buffalo – SUNY

422 Christopher Baldy Hall

Buffalo, NY 14260

Phone: 716-645-1126

Email: [email protected]


Deborah Floyd

Dean and Professor

Graduate College

Florida Atlantic University

777 Glades Road, SU-80 Room 101

Boca Raton, FL 33431

Phone: 561-297-4358

Email: [email protected]


Robert Gonyea

Associate Director

Center for Postsecondary Research

Indiana University School of Education

1900 East Tenth Street

Bloomington, IN 47406

Phone: 812-856-3014

Email: [email protected]


Vinetta Jones

School of Educatio

Howard University

2441 4th Street NW

Washington, DC 20059

Phone: 301-395-5335

Email: [email protected]


Amaury Nora

Professor and Associate Dean for Research

College of Education and Human Development

University of Texas at San Antonio

One UTSA Circle

San Antonio, TX 78249

Phone: 210-458-4112

Email: [email protected]


Kent Phillippe

Associate Vice President, Research & Student Success

American Association of Community Colleges

One Dupont Circle, NW, Suite #410

Washington, DC 20036

Phone: 202-416-4505

Email: [email protected]


Jeff Strohl

Director of Research

Georgetown University Center on Education and the Workforce

3300 White Haven, Suite 3200

Washington, DC 20015

Phone: 202-687-4945

Email: [email protected]


Federal Invitees

Alicia Bolton

U.S. Department of Education, OCTAE

550 12th Street SW., Room 11108, PCP,

Washington, DC 20202

Phone: 202-245-6868

Email: [email protected]


Greg Darnieder

U.S. Department of Education, OS

Office of the Secretary

400 Maryland Avenue SW, LBJ – 7W105

Washington, DC 20202

Phone: 202-401-1367

Email: [email protected]


Kyrie Dragoo

Congressional Research Service

101 Independence Avenue, SE

LM-320

Washington, DC 20540

Phone: 202-707-4421

Email: [email protected]


Mark Fiegener

National Science Foundation

4201 Wilson Boulevard

Arlington, VA 22230

Phone: 703-292-4622

Email: [email protected]


Rochelle (Shelly) Martinez

Office of Management and Budget

Washington, DC 20503

Phone: 202-395-3147

Email: [email protected]


Ruth Neild

Deputy Director for Policy and Research

U.S. Department of Education, IES

555 New Jersey Ave, NW

Room 500e

Washington, DC 20208-5500

Phone: 202- 208-1200

Email: [email protected]


Susan Rundell Singer

National Science Foundation

4201 Wilson Boulevard

Arlington, VA 22230

Phone: 703-292-8637

Email: [email protected]


Marsha Silverberg

U.S. Department of Education, IES

555 New Jersey Avenue NW

Room 310F

Washington, DC 20208

Phone: 202-208-7178

Email: [email protected]


Johan Uvin

Acting Assistant Secretary

U.S. Department of Education

Office of Career, Technical and Adult Education

400 Maryland Avenue SW

Washington, DC 20202

Phone: 202-245-6332

Email: [email protected]


NCES


Sharon Boivin

U.S. Department of Education, NCES

1990 K Street NW

Room 8102

Washington, DC 20006

Phone: 202-502-7627

Email: [email protected]


Peggy Carr

U.S. Department of Education, NCES

1990 K Street NW

Room 8095

Washington, DC 20006

Phone: 202-502-7321

Email: [email protected]


Chris Chapman

U.S. Department of Education, NCES

1990 K Street NW

Room 9042

Washington, DC 20006

Phone: 202-502-7414

Email: [email protected]


Elise Christopher

U.S. Department of Education, NCES

1990 K Street NW

Room 9030

Washington, DC 20006

Phone: 202-502-7899

Email: [email protected]


Lisa Hudson

U.S. Department of Education, NCES

1990 K Street NW

Room 9036

Washington, DC 20006

Phone: 202-502-7358

Email: [email protected]


Tracy Hunt-White

U.S. Department of Education, NCES

1990 K Street NW

Room 9018

Washington, DC 20006

Phone: 202-502-7438

Email: [email protected]


Kashka Kubzdela

U.S. Department of Education, NCES

1990 K Street NW

Room 9014

Washington, DC 20006

Phone: 202-502-7411

Email: [email protected]


Marilyn Seastrom

U.S. Department of Education, NCES

1990 K Street NW

Room 9047

Washington, DC 20006

Phone: 202-502-7303

Email: [email protected]


Sean Simone

U.S. Department of Education, NCES

1990 K Street NW

Room 9025

Washington, DC 20006

Phone: 202-502-7367

Email: [email protected]


Ted Socha

U.S. Department of Education, NCES

1990 K Street NW

Room 9028

Washington, DC 20006

Phone: 202-502-7383

Email: [email protected]


RTI International


Melissa Cominole

RTI International

3040 East Cornwallis Road

P.O. Box 12194

Research Triangle Park, NC 27709

Phone: 919-990-8456

Email: [email protected]


Laura Fritch

RTI International

3040 East Cornwallis Road

P.O. Box 12194

Research Triangle Park, NC 27709

Phone: 919-990-8318

Email: [email protected]


Steven Ingels

RTI International

702 13th Street NW, Suite #750

Washington, DC 20005

Phone: 202-728-2095

Email: [email protected]


Tiffany Mattox

RTI International

3040 East Cornwallis Road

Research Triangle Park, NC 27709

Phone: 919-485-7791

Email: [email protected]


Tim Morgan

RTI International

3040 East Cornwallis Road

P.O. Box 12194

Research Triangle Park, NC 27709

Phone: 919-485-2676

Email: [email protected]


Dan Pratt

RTI International

3040 East Cornwallis Road

P.O. Box 12194

Research Triangle Park, NC 27709

Phone: 919-541-6615

Email: [email protected]


Erin Velez

RTI International

702 13th Street NW, Suite #750

Washington, DC 20005

Phone: 202-974-7879

Email: [email protected]


Jamie Wescott

RTI International

3040 East Cornwallis Road

P.O. Box 12194

Research Triangle Park, NC 27709

Phone: 919-541-6990

Email: [email protected]


David Wilson

RTI International

3040 East Cornwallis Road

P.O. Box 12194

Research Triangle Park, NC 27709

Phone: 919-541-6990

Email: [email protected]


Consultants


Sandy Baum

Consultant

George Washington University and Urban Institute

161 East Chicago Avenue

#45C

Chicago, IL 60611

Phone: 518-369-3774

Email: [email protected]


Bruce Daniel

Sanametrix, Inc.

South Tower, Suite #200

1120 20th Street NW

Washington, DC 20036

Phone: 301-373-8344

Email: [email protected]


Dan Potter

American Institutes for Research

1000 Thomas Jefferson Street, NW

Washington, DC 20007

Phone: 202-403-6182

Email: [email protected]



Appendix B
Data Security Language for Vendor Contracts



Data Security Requirements


    1. Contractor shall use data supplied to them by Company for the specific purpose included in the corresponding Statements of Work only.

    2. Contractor will protect all data supplied to them by Company as specifically stated in Exhibit C, below.

    3. Unless otherwise agreed to, Contractor will promptly and properly destroy data supplied to them by Company upon the Statement of Work completion date.



EXHIBIT C

COMPANY INFORMATION SECURITY REQUIREMENTS

  1. Definitions.

“Business Contact Information” is defined as name, job title, department name, company name, business telephone, business fax number, and business email address.

“COMPANY Confidential Information” as defined in the Agreement.

“Information Processing System(s)” is defined as the individual and collective electronic, mechanical, or software components of CONTRACTOR operations that store and/or process COMPANY Confidential Information.

“Information Security Event” is defined as any situation where COMPANY Confidential Information is lost; is subject to unauthorized or inappropriate access, use, or misuse; the security, confidentiality, or integrity of the information is compromised; or the availability of CONTRACTOR Information Processing Systems is compromised by external attack.

“Security Breach” is defined as an unauthorized access to CONTRACTOR’s facilities, Information Processing Systems or networks used to service, store, or access COMPANY Confidential Information, provided such unauthorized access exposes COMPANY Confidential Information or provided CONTRACTOR is required to report such unauthorized access to appropriate legal or regulatory agencies or affected COMPANY members.

“Industry best practice” is defined by the information security guidelines prepared by the PCI Security Standards Council and documented in the PCI DSS requirements as well as standards and guidelines prepared by the Federal Financial Institutions Examination Council (FFIEC)

  1. Security and Confidentiality.

Before receiving, or continuing to receive, COMPANY Confidential Information, CONTRACTOR will implement and maintain an information security program that ensures: 1) COMPANY’s Confidential Information and CONTRACTOR’s Information Processing Systems are protected from internal and external security threats; and 2) that COMPANY Confidential Information is protected from unauthorized disclosure.

  1. Security Policy.

    1. Formal Security Policy. Consistent with the requirement of this Attachment, CONTRACTOR will create an information security policy that is approved by CONTRACTOR’s management, published and communicated to all CONTRACTOR’s employees. Such information security policy may be reviewed by COMPANY at CONTRACTOR’s place of business pursuant to confidentiality obligations.

    2. Security Policy Review. CONTRACTOR will review the information security policy at planned intervals or if significant changes occur to ensure its continuing suitability, adequacy, and effectiveness.

  2. Asset Management.

    1. Asset Inventory. CONTRACTOR shall have the ability to identify the location of all CONTRACTOR Information Processing Systems and media containing COMPANY Confidential Information.

    2. Acceptable Use. CONTRACTOR will implement rules for the acceptable use of information and assets which is no less restrictive than industry best practice and consistent with the requirements of this Attachment.

    3. Equipment Use While on COMPANY Premises. While on COMPANY’s premises, CONTRACTOR will not connect hardware (physically or via a wireless connection) to COMPANY systems unless necessary for CONTRACTOR to perform Services under this Agreement. This hardware must be inspected / scanned by COMPANY before use.

    4. Portable Devices. COMPANY Confidential Information, with the exception of Business Contact Information, may not be stored on portable devices including, but not limited to, laptops, external hard drives, Personal Digital Assistants, MP3 devices, and USB devices.

    5. Personally-owned Equipment. COMPANY Confidential Information, with the exception of Business Contact Information, may not be stored on personally‑owned equipment.

  3. Human Resources Security.

    1. Security Awareness Training. Prior to CONTRACTOR employees receiving access to COMPANY Confidential Information, they will receive security awareness training appropriate to their job function. CONTRACTOR will also ensure that recurring security awareness training is performed.

    2. Removal of access Rights. The access rights of all CONTRACTOR employees to CONTRACTOR Information Processing Systems or media containing COMPANY Confidential Information will be removed immediately upon termination of their employment, contract or agreement, or adjusted upon change.

  4. Physical and Environmental Security.

    1. Secure Areas. CONTRACTOR will secure all areas, including loading docks, holding areas, telecommunications areas, cabling areas and off-site areas that contain Information Processing Systems or media containing COMPANY Confidential Information by the use of appropriate security controls in order to ensure that only authorized personnel are allowed access and to prevent damage and interference. The following controls will be implemented:

      1. Access will be controlled and restricted by use of a defined security perimeter, appropriate security barriers, entry controls and authentication controls. A record of all accesses will be securely maintained.

      2. All personnel will be required to wear some form of visible identification to identify them as employees, contractors, visitors, et cetera.

      3. Visitors to secure areas will be supervised, or cleared for non-escorted accessed via an appropriate background check. Their date and time of entry and departure will be recorded.

    2. Environmental Security. CONTRACTOR will protect equipment from power failures and other disruptions caused by failures in supporting utilities.

  5. Communications and Operations Management.

    1. Protection Against Malicious Code. CONTRACTOR will implement detection, prevention, and recovery controls to protect against malicious software, which is no less than current industry best practice and perform appropriate employee training on the prevention and detection of malicious software.

    2. Back-ups. CONTRACTOR will perform appropriate back-ups of CONTRACTOR Information Processing Systems and media containing COMPANY Confidential Information as required in order to ensure services and service levels described in this Statement of Work.

    3. Media and Information Handling. CONTRACTOR will protect against unauthorized access or misuse of COMPANY Confidential Information contained on media by use of a media control management program and provide a copy of the program to COMPANY.

      1. COMPANY input and result code data can be stored as Audit Data in a SQLServer table. All Audit Data on this SQLServer table can only be accessed for up to 180 days. After 180 days the Audit Data in the SQLServer table is automatically destroyed.

    4. Media and Information Disposal. CONTRACTOR will securely and safely dispose of COMPANY Confidential Information that resides on media (including but not limited to hard copies, disks, CDs, DVDs, optical disks, USB devices, hard drives) upon the Statement of Work completion date using establishment of procedures to include, but not be limited to:

      1. Disposing of COMPANY Confidential Information on mediaso that it is rendered unreadable or undecipherable, such as by burning, shredding, pulverizing or overwriting in compliance with DoD Standard 5220.22-M.

      2. Maintaining a secured disposal log that provides an audit trail of disposal activities.

      3. Purging COMPANY Confidential Information from all CONTRACTOR’s physical storage mediums (filing cabinets, drawers, et cetera.) and from all Information Processing Systems, including back-up systems, within thirty (30) days of the latest occurrence of following: upon termination of this agreement; or as soon as the COMPANY Confidential Information is no longer required to perform services under this Statement of Work.

      4. Providing a Certificate of Destruction to COMPANY certifying that all COMPANY Confidential Information was purged. The certificate will be provided to COMPANY within ten (10) business days after the information was purged.

    5. Exchange of Information. To protect confidentiality and integrity of COMPANY Confidential Information in transit, CONTRACTOR will:

      1. Perform an inventory, analysis and risk assessment of all data exchange channels (including but not limited to FTP, HTTP, HTTPS, SMTP, modem, and fax) to identify and mitigate risks to COMPANY Confidential Information from these channels.

      2. Monitor and inspect all data exchange channels to detect unauthorized information releases.

      3. Ensure that appropriate security controls using approved data exchange channels are employed when exchanging COMPANY Confidential Information.

      4. If COMPANY Confidential Information can only be sent to CONTRACTOR electronically, then CONTRACTOR must employ industry standard encryption security measures (minimum standard of NIST’s FIPS 140-2) to encrypt COMPANY Confidential Information prior to transmitting via the Internet. Otherwise, COMPANY Confidential Information can only be sent to CONTRACTOR using an encrypted (minimum standard NIST’s FIPS 140-2) CD-ROM sent via courier service with a tracking number.

      5. Ensure that information (including persistent cookies) about COMPANY customers, members or employees is not harvested by CONTRACTOR web pages except for purposes of this Agreement.

    6. Monitoring. To protect against unauthorized access or misuse of COMPANY Confidential Information residing on CONTRACTOR Information Processing Systems, CONTRACTOR will:

      1. Employ current industry best practice security controls and tools to monitor Information Processing Systems and log user activities, exceptions, unauthorized information processing activities, suspicious activities and information security events. Logging facilities and log information will be protected against tampering and unauthorized access. Logs will be kept for at least 90 days.

      2. Perform frequent reviews of logs and take necessary actions to protect against unauthorized access or misuse of COMPANY Confidential Information.

      3. At COMPANY’s request, make logs available to COMPANY to assist in investigations of security breaches.

      4. Comply with all relevant legal requirements applicable to monitoring and logging activities.

      5. Ensure that the clocks of all relevant information processing systems are synchronized using a national or international time source.

  6. Access Control.

    1. User access Management. To protect against unauthorized access or misuse of COMPANY Confidential Information residing on CONTRACTOR Information Processing Systems, CONTRACTOR will:

      1. Employ a formal user registration and de-registration procedure for granting and revoking access and access rights to all CONTRACTOR Information Processing Systems.

      2. Employ a formal password management process.

      3. Perform recurring reviews of users’ access and access rights to ensure that they are appropriate for the users’ role.

    2. User Responsibilities. To protect against unauthorized access or misuse of COMPANY Confidential Information residing on CONTRACTOR Information Processing Systems, CONTRACTOR will:

      1. Ensure that CONTRACTOR Information Processing Systems users follow current security practices in the selection and use of strong passwords.

      2. Ensure that unattended equipment has appropriate protection to prohibit access and use by unauthorized individuals.

      3. Ensure that COMPANY Confidential Information contained at workstations, including but not limited to paper and on display screens is protected from unauthorized access.

    3. Network access Control. access to internal, external, and public network services that allow access to CONTRACTOR Information Processing Systems shall be controlled. CONTRACTOR will:

      1. Ensure that current industry best practice standard authentication mechanisms for network users and equipment are in place and updated as necessary.

      2. Ensure electronic perimeter controls are in place to protect CONTRACTOR Information Processing Systems from unauthorized access.

      3. Ensure authentication methods are used to control access by remote users.

      4. Ensure physical and logical access to diagnostic and configuration ports is controlled.

    4. Operating System access Control. To protect against unauthorized access or misuse of COMPANY Confidential Information residing on CONTRACTOR Information Processing Systems, CONTRACTOR will:

      1. Ensure that access to operating systems is controlled by a secure log-on procedure.

      2. Ensure that CONTRACTOR Information Processing System users have a unique identifier (user ID).

      3. Ensure that the use of utility programs that are capable of overriding system and application controls are highly restricted and tightly controlled.

      4. Ensure that inactive sessions are shut down when technically possible after a defined period of inactivity.

      5. Employ restrictions on connection times when technically possible to provide additional security for high risk applications.

    5. Mobile Computing and Remote Working. To protect COMPANY Confidential Information residing on CONTRACTOR Information Processing Systems from the risks inherent in mobile computing and remote working, CONTRACTOR will:

      1. Perform a risk assessment to identify and mitigate risks to COMPANY Confidential Information from residing on mobile computing and remote access systems.

      2. Develop a policy, operational plans and procedures for managing mobile computing and remote access systems to ensure that COMPANY Confidential Information does not reside on or are used on these systems.

  7. Information Systems Acquisition, Development and Maintenance.

    1. Security of System Files. To protect CONTRACTOR Information Processing Systems and system files containing COMPANY Confidential Information, CONTRACTOR will ensure that access to source code is restricted to authorized users who have a direct need to know.

    2. Security in Development and Support Processes. To protect CONTRACTOR Information Processing Systems and system files containing COMPANY Confidential Information, CONTRACTOR will:

      1. Ensure that the implementation of changes is controlled by the use of formal change control procedures.

      2. Employ industry best practice security controls to minimize information leakage.

      3. Employ oversight quality controls and security management of outsourced software development.

  8. Information Security Incident Management.


Reporting Information Security Events and Weaknesses. To protect CONTRACTOR Information Processing Systems and system files containing COMPANY Confidential Information, CONTRACTOR will, in the event that Contractor becomes aware of (or reasonably suspects) that any information and data obtained pursuant to the Services has been compromised in any manner, immediately notify Company via email or telephone call and follow-up on the incident in writing and provide all requested information about the event. For purposes of this obligation, “compromise” includes suspected or known incidents without limitation: (i) any unauthorized access to information and data obtained pursuant to the Services, (ii) any inadvertent disclosure of information and data obtained pursuant to the Services to any third party, (iii) any known or suspected misuse of information and data obtained pursuant to the Services by any person (even if such person was authorized to access such information or data), (iv) any suspected use of information and data obtained pursuant to the Services by any person outside of the scope of that person’s authority, and (v) any known or suspected alteration of information and data obtained pursuant to the Services other than as required or permitted by this Agreement.

    1. Information Security Events and Security Breaches: Contractor shall

      1. Implement a process to ensure that Information Security Events and Security Breaches are reported through appropriate management channels as quickly as possible.

      2. Train all employees of information systems and services how to report any observed or suspected Information Security Events and Security Breaches.

      3. Notify COMPANY by email ([email protected] or by phone (800-334‑8571) immediately of all suspected Information Security Events and Security Breaches. Following any such event or breach, CONTRACTOR will promptly notify COMPANY as to the COMPANY Confidential Information affected and the details of the event or breach.

  1. Business Continuity Management.

    1. Business Continuity Management Program. In order to ensure services and service levels described in this agreement, CONTRACTOR will:

      1. Develop and maintain a process for business continuity throughout the organization that addresses the information security requirements needed for the CONTRACTOR’s business continuity so that the provision of products and/or services provided under the Agreement to COMPANY is uninterrupted.

      2. Identify events that can cause interruptions to business processes, along with the probability and impact of such interruptions and their consequences for information security.

      3. Develop and implement plans to maintain or restore operations and ensure availability of information at the required level and in the required time scales following interruption to, or failure of, critical business processes and provide COMPANY a copy of the same.

      4. Test and update Business Continuity Plans regularly to ensure that they are up‑to-date and effective.

  2. Security Assessments.

    1. Initial and Recurring Security Assessments. CONTRACTOR will permit COMPANY representatives to perform an on-site physical and logical Security Assessment of CONTRACTOR’s data processing and business facilities prior to the release of COMPANY Confidential Information and each year thereafter. Security Assessments will be performed during regular business hours, at a date and time agreed to by both parties, and will not require online access to CONTRACTOR’s Information Processing Systems.

    2. Security Assessments Following Information Security Events and Security Breaches. Following the occurrence of an Information Security Event or Security Breach, CONTRACTOR will permit COMPANY representatives to perform an on-site physical and logical Security Assessment of CONTRACTOR’s data processing and business facilities to assess the impact of the event or breach even if a Security Assessment has been completed within the year.

    3. Security Assessment Findings. Upon completion of a Security Assessment, COMPANY will provide CONTRACTOR with a Security Assessment completion letter that summarizes COMPANY’s Security Assessment findings. These findings may identify critical security deficiencies identified as “Mandatory” that require immediate correction before COMPANY can release, or continue to release, COMPANY Confidential Information to CONTRACTOR. CONTRACTOR will implement and continue to maintain all mutually agreed upon “Mandatory” security findings. If mutual agreement to “Mandatory” security findings cannot be reached, then these issues may be escalated using the dispute resolution provisions within this Agreement.


File Typeapplication/vnd.openxmlformats-officedocument.wordprocessingml.document
File Title«FirstName» «LastName»
AuthorJanet Austin
File Modified0000-00-00
File Created2021-05-28

© 2024 OMB.report | Privacy Policy