In today’s high-speed, electronically connected society, exam integrity incidents occur more frequently and present greater risks to test sponsors and their examinations. When incidents occur that threaten the integrity of your exam, you must have a comprehensive investigation plan in place that your team members understand and are prepared to execute swiftly and thoroughly.
Thorough investigations of exam integrity violations are needed in response to a wide range of possible exam integrity incidents; from individual cheating, to collusion, to item harvesting. It’s important to have personnel trained and ready to respond with effective strategies to (1) detect and mitigate exam integrity vulnerabilities and (2) conduct internal exam integrity investigations when incidents occur.
Join our hosts, Marc Weinstein and Ben Mannes of Caveon Investigation Services as they discuss why a sound investigation plan is necessary, what to consider when an investigation is conducted, and why having the right resources is so important.
Home Visit: A Brief Personal Overview Of The Multi-step Based Data Collection...SONALI THAPA
This poster was presented at the Professional Poster Presentation session at Towson University. This event was attended by students, faculty and members in the field of Health Science on April 8th, 2016.
Preparing to Testify About Mobile Device EvidenceCellebrite
Taking a judge and jury through your investigative process, and why mobile evidence is relevant to your case, is only half of testimony. You should also be prepared to testify about the tools and methods you used, and to address any challenges to your process. This session will tell you what you need to know about mobile forensic extraction, analysis and interpretation; how to deal with questions about vendors’ proprietary methods; and specific challenges around mobile evidence authenticity and admissibility.
A Step-by-Step Guide to Conducting Effective Workplace Investigations.pdfLisa Bell
Discover how to conduct workplace investigations correctly with our step-by-step guide. Resolve issues, ensure compliance, and nurture a positive work environment.
Best Practices for Workplace Investigations.pdfLisa Bell
Discover top workplace investigation practices for HR and managers. Expert advice on resolving issues, ensuring privacy, and maintaining legal compliance.
Home Visit: A Brief Personal Overview Of The Multi-step Based Data Collection...SONALI THAPA
This poster was presented at the Professional Poster Presentation session at Towson University. This event was attended by students, faculty and members in the field of Health Science on April 8th, 2016.
Preparing to Testify About Mobile Device EvidenceCellebrite
Taking a judge and jury through your investigative process, and why mobile evidence is relevant to your case, is only half of testimony. You should also be prepared to testify about the tools and methods you used, and to address any challenges to your process. This session will tell you what you need to know about mobile forensic extraction, analysis and interpretation; how to deal with questions about vendors’ proprietary methods; and specific challenges around mobile evidence authenticity and admissibility.
A Step-by-Step Guide to Conducting Effective Workplace Investigations.pdfLisa Bell
Discover how to conduct workplace investigations correctly with our step-by-step guide. Resolve issues, ensure compliance, and nurture a positive work environment.
Best Practices for Workplace Investigations.pdfLisa Bell
Discover top workplace investigation practices for HR and managers. Expert advice on resolving issues, ensuring privacy, and maintaining legal compliance.
Workplace Investigations (Series: Protecting Your Employee Assets: The Life C...Financial Poise
Now, more than ever, employers must be prepared to promptly and effectively respond to complaints of workplace harassment and/or discrimination. Often, that requires knowing when and how to conduct an internal investigation. Given the significance of the issues often at stake and the potential for a negative outcome (attorneys’ fees, high dollar settlement, negative PR), learning on the fly is not a viable option when undertaking an investigation. This program covers a host of questions, including what sort of issues should be investigated, who should conduct the investigation, what steps should you take and in what order, who should be interviewed, what sort of documents should be created and how do you close out the investigation? It also explores the investigation process and provides guidance from a seasoned investigator as to how to handle the many issues that you will often confront during the course of an investigation.
To view the accompanying webinar, go to:
A sample guide to to assist in consistency during a compliant of misconduct and the ensuing investigation. Great for Supervisors and employees to understand the steps that will be followed.
@HR2CEO
OCR Audits Are Coming – Is Your Organization Prepared?Polsinelli PC
OCR has finally launched its Phase 2 formal audits of Covered Entities (CEs) and Business Associates (BAs). The first step of an audit will consist of OCR reviewing a CE's policies, procedures, and processes for HIPAA Privacy, Security, and Breach Notification Compliance. If significant noncompliance is uncovered, OCR may probe further with an on-site inspection. Upon notice of an OCR audit, OCR will require CEs and BAs to produce their HIPAA policies, procedures, and other compliance documents within 10 days. If you wait until notice of an audit to shore up your HIPAA policies, procedures and compliance documents, it will be too late. All this occurs under the backdrop of dramatically increased HIPAA enforcement actions by OCR; in the first quarter of 2016 alone, OCR extracted settlements or imposed CMPs in six formal cases ranging from $125,000 to $3.9 million. That is as many settlements as OCR extracted in the entire year of 2015.
How are your HIPAA policies and procedures? Have you ever developed them? Can you find them? Will they pass an OCR review? Has your organization undergone a HIPAA Security Risk Analysis? Has it been updated? An ounce of HIPAA preparation now will save $100,000s in cure later. Polsinelli presents this webinar to explain what to expect from an OCR audit and how to prepare a "HIPAA audit binder" that will put you in a better position to respond to OCR if the agency should come knocking.
I Know What You Did Last Summer: Workplace Investigations (Series: Protecting...Financial Poise
Now, more than ever, employers must be prepared to promptly and effectively respond to complaints of workplace harassment and/or discrimination. Often, that requires knowing when and how to conduct an internal investigation. Given the significance of the issues often at stake and the potential for a negative outcome (attorneys’ fees, high dollar settlement, negative PR), learning on the fly is not a viable option when undertaking an investigation. This program covers a host of questions, including what sort of issues should be investigated, who should conduct the investigation, what steps should you take and in what order, who should be interviewed, what sort of documents should be created and how do you close out the investigation? It also explores the investigation process and provides guidance from a seasoned investigator as to how to handle the many issues that you will often confront during the course of an investigation.
To listen to this webinar on-demand, go to: https://www.financialpoise.com/financial-poise-webinars/workplace-investigations-2020/
Get your Ducks in a Row - The OCR Audit Season is About to BeginID Experts
The HHS Office for Civil Rights has unveiled information about Phase 2 of its HIPAA audits. These audits will be conducted by OCR itself and will focus on high-risk areas and enforcement. Organizations may be hearing from OCR over this summer, with audits to begin in the fall. This webinar will overview some lessons learned from the first round of audits and highlight the changes and process for the next round. Phase 2’s additional focus on compliance with breach notification rule will be discussed. We also will provide some tips to prepare for the audits, which also will be helpful to prepare for any OCR investigation or compliance review.
To view the Webinar Recording, click here: https://www2.idexpertscorp.com/resources/single/get-your-ducks-in-a-row-the-ocr-audit-season-is-about-to-begin/r-general
Brian HughesTheimportanceof evidencecollectionan.docxjasoninnes20
Brian Hughes
The
importance
of evidence
collection
and preser-
vation
can be
overpowered
by other
priorities.
Incident Investigation:
Evidence Preservation
Looking back at your last incident investiga-tion, did you experience anything similiar orwere you faced with any of these dilemmas?
•While attending to the needs of injured and dis-
tressed employees, time-sensitive evidence was
missed.
• While securing the area and bringing it back to
a safe mode, circumstances that could have served
as evidence had to be altered.
•In the bustle to minimize costly downtime,
resuming production rushed the evidence collec-
tion process.
• A piece of critical evidence
disappeared.
•The legal department
wished it had more to demon-
strate due diligence.
•A regulatory body's
requirement or request could
not be fulfilled.
In tlie rush to return to a
state that resembles normalcy,
the importance of evidence
collection and preservation
can be overlooked or over-
powered by other priorities.
Evidence is critical to any incident investigation
because it is the data that support the conclusions
of the investigation. The primary intent of an inci-
dent investigation is to identify effective solutions.
To accomplish this, the investigation needs to
uncover causes and how they relate to one another.
Evidence provides support for what the team con-
cludes to be causes, it cultivates a level of confi-
dence that correlates directly to the quality of the
evidence collected. Evidence is the foimdation for
an investigation—for the investigation team as well
as for others reviewing fuhue investigation results
and conclusions.
Many companies do not have a formal evidence
preservation policy in place, so the process is ad
hoc—left up to the investigator or individuals on
the team. Some highly regulated companies, with
the nature of their governing regulations, specify
requirements for evidence documentation. They
tailor their evidence preservation policy to match
the requirements of the regulatory agency. But evi-
dence documentation is not necessarily the same as
evidence collection or preservation. Regulatory
requirements must be considered. However, a poli-
cy can be developed that fulfills the objectives of
the investigation and the requirements of regulato-
ry agencies.
It is best to decide how to handle evidence
before an emergency occurs. Develop an evidence
preservation policy based on the organization's
needs and distribute it to everyone who will have
the responsibility to carry it out. Include it in train-
ing curriculum so pc\iple are familiar with the
process before they actually need it.
What follows are guidelines that any company
can use to develop a simple evidence preservation
policy to help ensure that evidence is managed
effectively throughout an investigation.
Step 1: Assess the Significance
Ask a few simple questions to dtxument the
actual and potential significance of the problem.
Try not to overreact to a rela-
tively benign problem ...
Workplace Investigations (Series: Protecting Your Employee Assets: The Life C...Financial Poise
Now, more than ever, employers must be prepared to promptly and effectively respond to complaints of workplace harassment and/or discrimination. Often, that requires knowing when and how to conduct an internal investigation. Given the significance of the issues often at stake and the potential for a negative outcome (attorneys’ fees, high dollar settlement, negative PR), learning on the fly is not a viable option when undertaking an investigation. This program covers a host of questions, including what sort of issues should be investigated, who should conduct the investigation, what steps should you take and in what order, who should be interviewed, what sort of documents should be created and how do you close out the investigation? It also explores the investigation process and provides guidance from a seasoned investigator as to how to handle the many issues that you will often confront during the course of an investigation.
To view the accompanying webinar, go to:
A sample guide to to assist in consistency during a compliant of misconduct and the ensuing investigation. Great for Supervisors and employees to understand the steps that will be followed.
@HR2CEO
OCR Audits Are Coming – Is Your Organization Prepared?Polsinelli PC
OCR has finally launched its Phase 2 formal audits of Covered Entities (CEs) and Business Associates (BAs). The first step of an audit will consist of OCR reviewing a CE's policies, procedures, and processes for HIPAA Privacy, Security, and Breach Notification Compliance. If significant noncompliance is uncovered, OCR may probe further with an on-site inspection. Upon notice of an OCR audit, OCR will require CEs and BAs to produce their HIPAA policies, procedures, and other compliance documents within 10 days. If you wait until notice of an audit to shore up your HIPAA policies, procedures and compliance documents, it will be too late. All this occurs under the backdrop of dramatically increased HIPAA enforcement actions by OCR; in the first quarter of 2016 alone, OCR extracted settlements or imposed CMPs in six formal cases ranging from $125,000 to $3.9 million. That is as many settlements as OCR extracted in the entire year of 2015.
How are your HIPAA policies and procedures? Have you ever developed them? Can you find them? Will they pass an OCR review? Has your organization undergone a HIPAA Security Risk Analysis? Has it been updated? An ounce of HIPAA preparation now will save $100,000s in cure later. Polsinelli presents this webinar to explain what to expect from an OCR audit and how to prepare a "HIPAA audit binder" that will put you in a better position to respond to OCR if the agency should come knocking.
I Know What You Did Last Summer: Workplace Investigations (Series: Protecting...Financial Poise
Now, more than ever, employers must be prepared to promptly and effectively respond to complaints of workplace harassment and/or discrimination. Often, that requires knowing when and how to conduct an internal investigation. Given the significance of the issues often at stake and the potential for a negative outcome (attorneys’ fees, high dollar settlement, negative PR), learning on the fly is not a viable option when undertaking an investigation. This program covers a host of questions, including what sort of issues should be investigated, who should conduct the investigation, what steps should you take and in what order, who should be interviewed, what sort of documents should be created and how do you close out the investigation? It also explores the investigation process and provides guidance from a seasoned investigator as to how to handle the many issues that you will often confront during the course of an investigation.
To listen to this webinar on-demand, go to: https://www.financialpoise.com/financial-poise-webinars/workplace-investigations-2020/
Get your Ducks in a Row - The OCR Audit Season is About to BeginID Experts
The HHS Office for Civil Rights has unveiled information about Phase 2 of its HIPAA audits. These audits will be conducted by OCR itself and will focus on high-risk areas and enforcement. Organizations may be hearing from OCR over this summer, with audits to begin in the fall. This webinar will overview some lessons learned from the first round of audits and highlight the changes and process for the next round. Phase 2’s additional focus on compliance with breach notification rule will be discussed. We also will provide some tips to prepare for the audits, which also will be helpful to prepare for any OCR investigation or compliance review.
To view the Webinar Recording, click here: https://www2.idexpertscorp.com/resources/single/get-your-ducks-in-a-row-the-ocr-audit-season-is-about-to-begin/r-general
Brian HughesTheimportanceof evidencecollectionan.docxjasoninnes20
Brian Hughes
The
importance
of evidence
collection
and preser-
vation
can be
overpowered
by other
priorities.
Incident Investigation:
Evidence Preservation
Looking back at your last incident investiga-tion, did you experience anything similiar orwere you faced with any of these dilemmas?
•While attending to the needs of injured and dis-
tressed employees, time-sensitive evidence was
missed.
• While securing the area and bringing it back to
a safe mode, circumstances that could have served
as evidence had to be altered.
•In the bustle to minimize costly downtime,
resuming production rushed the evidence collec-
tion process.
• A piece of critical evidence
disappeared.
•The legal department
wished it had more to demon-
strate due diligence.
•A regulatory body's
requirement or request could
not be fulfilled.
In tlie rush to return to a
state that resembles normalcy,
the importance of evidence
collection and preservation
can be overlooked or over-
powered by other priorities.
Evidence is critical to any incident investigation
because it is the data that support the conclusions
of the investigation. The primary intent of an inci-
dent investigation is to identify effective solutions.
To accomplish this, the investigation needs to
uncover causes and how they relate to one another.
Evidence provides support for what the team con-
cludes to be causes, it cultivates a level of confi-
dence that correlates directly to the quality of the
evidence collected. Evidence is the foimdation for
an investigation—for the investigation team as well
as for others reviewing fuhue investigation results
and conclusions.
Many companies do not have a formal evidence
preservation policy in place, so the process is ad
hoc—left up to the investigator or individuals on
the team. Some highly regulated companies, with
the nature of their governing regulations, specify
requirements for evidence documentation. They
tailor their evidence preservation policy to match
the requirements of the regulatory agency. But evi-
dence documentation is not necessarily the same as
evidence collection or preservation. Regulatory
requirements must be considered. However, a poli-
cy can be developed that fulfills the objectives of
the investigation and the requirements of regulato-
ry agencies.
It is best to decide how to handle evidence
before an emergency occurs. Develop an evidence
preservation policy based on the organization's
needs and distribute it to everyone who will have
the responsibility to carry it out. Include it in train-
ing curriculum so pc\iple are familiar with the
process before they actually need it.
What follows are guidelines that any company
can use to develop a simple evidence preservation
policy to help ensure that evidence is managed
effectively throughout an investigation.
Step 1: Assess the Significance
Ask a few simple questions to dtxument the
actual and potential significance of the problem.
Try not to overreact to a rela-
tively benign problem ...
Caveon Webinar Series - A Guide to Online Protection Strategies - March 28, ...Caveon Test Security
Join Executive Web Patrol Managers, Cary Straw and Jen Baldwin, as we explore the systems, methods and steps you need to successfully protect and extend the life of your high stakes certification, licensure, and state assessment exams from online threats.
Some of the questions we will answer include:
• Which processes should I implement to decrease the chance of my content appearing online?
• Where are the best places to use online security resources?
• Where do I look next if I found a threat, and where are the threats likely to spread?
• What are proactive steps I can take to protect my exams online?
• Who should be in my protection hierarchy?
• Am I "safe" after I've found a threat, and have had it removed?
Caveon Webinar Series - Five Things You Can Do Now to Protect Your Assessment...Caveon Test Security
Test season is approaching quickly! Maintaining the security and validity of assessment results is critical to support federal accountability and peer review requirements.
Kick off testing season with this year's first Caveon Webinar, "Five Things You Can Do Right Now to Protect Your Assessment Programs."
This webinar will focus on:
• Test security threats & risk analysis
• Creating test security policies and procedures
• Planning and implementing on-site monitoring
• Reviewing anomalous test results
• Managing incident reports
Join the webinar to learn more, and you'll be off to a strong start in protecting your tests, your results, and your reputation.
If you missed the first three sessions, you can still view them. And, if you can't attend on January 17, go ahead and register anyway and we will send you the recording and slides after the session.
The Do's and Dont's of Administering High Stakes Tests in Schools Final 121217Caveon Test Security
There is a great deal of advice available about giving high stakes tests securely in school settings. States run annual training sessions and provide test administration manuals. Major vendors serving schools provide training and guidelines of varying types. Sometimes the different sources disagree and the emphases vary by the nature of the helping agency. What is a test administrator to do?
This webinar focuses on administering tests in schools and identifies ten "best practices" that apply to all high stakes testing. The content is drawn from careful analyses of current testing practices by states, districts, and testing vendors.
To be an effective test administrator, you will need to read the background materials about each testing program and attend any training that is provided. If you also follow the guidelines presented in this webinar, you will be in a very good position to promote fairness and validity in each of the programs for which you share responsibility.
In this webinar, you will learn:
* Ten Best Practices that apply to all high stakes testing
* What is required to be an effective test administrator
* How to promote fairness and validity in your testing programs
Sponsored by the National Association of Assessment Directors and Caveon Consulting Services, Caveon Test Security
Caveon Webinar Series - The Art of Test Security - Know Thy Enemy - November ...Caveon Test Security
As Sun Tsu famously said... "If you know your enemy as you know yourself, you need not fear 100 battles." On the battlefield of security -- whether home security, airport security, or test security - the first step to success is knowing the threats.
Are you worried about tests being stolen and shared online? Or test takers cheating by being coached by an expert? If so, the steps to successfully protecting your test and triumphing over these fears include:
• conducting a risk assessment
• determining (and ranking) which threats pose the greatest risk
• strategizing how to render those threats impotent
• determining the right combination of prevention, detection and deterrence tactics for your program
This webinar will teach you to conquer the steps in this test security process. Join Caveon CEO David Foster to learn how to analyze and rank the threats that are specific to your program. You will also discover the three solutions necessary to counter any and all of these threats.
Caveon Webinar Series - Four Steps to Effective Investigations in School Dis...Caveon Test Security
Now that spring test administrations are almost over, K-12 districts and schools can breathe a sigh of relief. Weeks of vigilance have paid off with a smooth, incident-free test administration. Not your district? You’re not alone. No matter the extent of planning, training, and oversight, there are always unforeseen events that result in testing irregularities. Most will be straightforward and covered by standard policies and procedures. But some incidents may set off your internal alarms. By themselves, these reports are only single data points and need to be explored to determine the larger context and what really happened. This webinar will provide information on:
How to develop a plan for responding to test irregularity reports and;
How to carry out investigations if additional information is needed.
The session is free, and will only last 30 minutes. Space is limited, so register today! We look forward to seeing you on May 18th!
If you missed the first two sessions, you can still view them. And, if you can't attend on May 18, go ahead and register anyway and we will automatically send you the recording and slides after the session.
Caveon Webinar Series - On-site Monitoring in Districts 0317Caveon Test Security
Are you sure that school leaders and educators are following your state and local assessment policies and procedures during the administration of assessments?
On-site monitoring of assessment administrations at schools and in classrooms is an effective quality assurance measure that:
• ensures compliance with standardized policies and procedures
• helps identify the greatest areas of vulnerability in your assessment administration processes
• creates opportunities to improve training, and
• clarifies messaging about assessments for school leaders and educators.
Finally, LEA-sponsored monitoring demonstrates a strong commitment to the integrity of assessments and the important decisions made based upon assessment results.
By attending this webinar, you will gain exposure to:
1) the goals and purposes of monitoring,
2) best-practice monitoring activities during assessment administrations,
3) evaluating data from monitoring reports,
4) potential outcomes from monitoring and
5) first steps in implementing a monitoring program.
Caveon Test Security, the industry leader in providing security solutions for protecting high-stakes, K-12 assessments, is pleased to announce the first webinar in a series of 3, focused on test security challenges faced specifically by districts.
Session #1: Avoiding A School District Test Cheating Scandal:
A Tale of Two Cities
January 25, 2017, 12:00 p.m. ET
As a number of U.S. school districts have learned, mishandling of cheating incidents on tests, particularly state assessments, can have very negative and pervasive effects. This webinar reviews two examples of actual test cheating situations in school districts, contrasts how they were handled, and lays out practical and "battle-tested" strategies for avoiding and, if necessary, coping with test cheating events. Having a strong security plan and acting wisely and decisively when you see signs of trouble can be a very productive approach. This webinar will give you tools to manage a test cheating incident if you have a suspected or confirmed report of cheating.
Caveon Webinar Series - Discrete Option Multiple Choice: A Revolution in Te...Caveon Test Security
High-stakes testing faces major changes due to the use of computers and other technology in test administration. Some such changes include new test designs (such as computerized adaptive testing), proctoring tests online, and even administering tests on tablets and smartphones to improve test taker convenience. One of the most important changes is innovative new item types that better measure important skills. The Discrete Option Multiple Choice item type, or DOMC, is one of these ground-breaking new item types.
The DOMC item has the potential to revolutionize testing. It brings significant benefits in security, quality of measurement, fairness, test development, and test administration.
Caveon Webinar Series - Test Cheaters Say the Darnedest Things! - 072016Caveon Test Security
You won't believe what's actually happened in the world of testing!
What goes on in the mind of a would-be test cheater? While cheating is a serious offense, some of test takers go to great (and sometimes comical) lengths to try gaining an unfair advantage to achieve a successful testing outcome.
Join us as we look at some of the most memorable proctor/test taker cheating encounters. Our special guest, Jarret Dyer, of the College of DuPage Testing Center, has created a compilation of test proctor stories from testing centers around the United States and across the globe. Jarret will share his 'best of' stories, while Caveon's John Fremer will discuss the consequences of not following the right test security processes and procedures. You don't want to miss this fun, yet informative session! To listen to the recording that goes along with these slides, go to https://youtu.be/r-CCaDf7NEk
Caveon Webinar Series - The Test Security Framework- Why Different Tests Nee...Caveon Test Security
The need for global workforce skills credentials continues to grow. At the same time, the global workforce is shrinking. It is imperative that skill recognition be accurate and the level of test security be appropriate for the skills being assessed. The Security subcommittee of the new Workforce Skills Credentialing division of ATP created a new test security framework that will provide guidance to testing organizations when selecting the level of security needed for their assessments.
Join our guest presenters, Rachel Schoenig and Jennifer Geraets of ACT, as they discuss the challenge of identifying global workforce skills and how this new test security framework will help to align the expectations of those involved with workforce credentialing (e.g., test publishers, examinees, and employers). Rachel and Jennifer will also provide a call to action, requesting your comments on this new framework.
Caveon Webinar Series - Conducting Test Security Investigations in School Di...Caveon Test Security
In the coming weeks, schools all over the country will be administering standardized exams to millions of students. And inevitably, test security incidents will arise, many of which may directly impact test score validity. Is your team prepared to answer the following tough questions?
• What will you do if you find yourself in a position of having to respond to an incident or breach in your state or district?
• What process will you follow?
• What is your incident escalation plan?
• How will you communicate with internal and external stakeholders?
• Most importantly, how will you discover the truth of what did or did not occur, and its impact on test scores?
Join Caveon’s test security experts for an important, hour-long webinar to help you understand the steps to take when challenging situations arise. We will share:
• Recent experiences other districts have had with possible cheating, and what they have done to resolve their concerns
• Information and tools for you to arm yourself before an issue arises, and to help you be better equipped to deal effectively and efficiently
• Essential tips you need to know when invoking a Security Incident Response Plan, and further conducting a security investigation
Caveon Webinar Series - Creating Your Test Security Game Plan - March 2016Caveon Test Security
History has shown that as stakes rise for testing programs, so do threats to the program's test result validity. There are stories in the media almost daily about high-stakes programs suffering at the hands of those intent on obtaining the content for disingenuous purposes. Having a game plan in place before a threat or validity issue occurs is vital. This month's webinar will focus on key steps your organization can take to maximize your protection from test fraud, and stay one step ahead of the game.
Caveon Webinar Series - Mastering the US DOE Test Security Requirements Janua...Caveon Test Security
The U.S. Department of Education recently issued the Peer Review of State Assessment Systems, which includes a required "Critical Element" on Test Security. To fulfill this requirement, States must submit documentation of policies and procedures in four categories of test security: prevention, detection, remediation, and investigation.
It is up to each State to determine which steps to implement and what evidence to submit to prove they have met each of these requirements. Evidence could, and should, include a myriad of test security measures ranging from Security Handbooks and annual proctor training, to data forensics and web monitoring procedures (and everything in between).
Caveon can help guide you through this complicated process. In the upcoming session, our test security experts will unpack the requirements of this section of the Peer Review process. The goal is to help you form a road map moving forward, provide information on the best practices for protecting your assessments, and outline resources to streamline the process.
Caveon Webinar Series - Will the Real Cloned Item Please Stand Up? finalCaveon Test Security
Join us for this month's webinar on the ins and outs of developing item clones. While many of us are aware of the benefits cloning can provide, such as expanding an item bank, lengthening the shelf life of an exam, or deterring and detecting cheating, questions remain regarding the best practices for implementation. Secure exam development experts will address the question, "How do we know, during development, when an item has been sufficiently altered, making it a "real clone" and not just an "imitator" of a clone?" The answer isn't as clear cut as it would seem.
Additional topics will include:
• General information on cloning
• Lessons learned from the field
• Creative ideas for streamlining cloning processes
This webinar will help assessment and program managers be better positioned to put on their cloning lab coats and reap the rewards of this best practice in test security.
Caveon Webinar Series - Lessons Learned at the 2015 National Conference on S...Caveon Test Security
The National Conference on Student Assessment (NCSA) was held last month in San Diego, and Caveon was there. This month's webinar will focus on lessons learned at the conference regarding test security, and what's happening in the state assessment arena in terms of test security right now.
Caveon's Steve Addicott and Jamie Mulkey will be joined by special guest Walt Drane, State Assessment Director, Mississippi Department of Education. The panelists will summarize the test security trends and strategies that they drew from the conference, and also share key points from sessions they presented.
Caveon Webinar Series - Learning and Teaching Best Practices in Test Security...Caveon Test Security
Test security has been emerging as a cohesive discipline for the past ten years. There are no college courses that teach test security. And, even if there were, many practitioners don't have time to take those classes. How do you stay abreast of current developments? How do you train your staff in latest best practices if you don't know about them? Are there resources out there, and how do you find them?
In this webinar, Caveon will host several special guest practitioners from various industries. These test security veterans have had to answer these very questions. They will address how continuing education will help you improve test security in your organization.
Ethnobotany and Ethnopharmacology:
Ethnobotany in herbal drug evaluation,
Impact of Ethnobotany in traditional medicine,
New development in herbals,
Bio-prospecting tools for drug discovery,
Role of Ethnopharmacology in drug evaluation,
Reverse Pharmacology.
How to Split Bills in the Odoo 17 POS ModuleCeline George
Bills have a main role in point of sale procedure. It will help to track sales, handling payments and giving receipts to customers. Bill splitting also has an important role in POS. For example, If some friends come together for dinner and if they want to divide the bill then it is possible by POS bill splitting. This slide will show how to split bills in odoo 17 POS.
How to Make a Field invisible in Odoo 17Celine George
It is possible to hide or invisible some fields in odoo. Commonly using “invisible” attribute in the field definition to invisible the fields. This slide will show how to make a field invisible in odoo 17.
Unit 8 - Information and Communication Technology (Paper I).pdfThiyagu K
This slides describes the basic concepts of ICT, basics of Email, Emerging Technology and Digital Initiatives in Education. This presentations aligns with the UGC Paper I syllabus.
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdfTechSoup
In this webinar you will learn how your organization can access TechSoup's wide variety of product discount and donation programs. From hardware to software, we'll give you a tour of the tools available to help your nonprofit with productivity, collaboration, financial management, donor tracking, security, and more.
The Art Pastor's Guide to Sabbath | Steve ThomasonSteve Thomason
What is the purpose of the Sabbath Law in the Torah. It is interesting to compare how the context of the law shifts from Exodus to Deuteronomy. Who gets to rest, and why?
Palestine last event orientationfvgnh .pptxRaedMohamed3
An EFL lesson about the current events in Palestine. It is intended to be for intermediate students who wish to increase their listening skills through a short lesson in power point.
4. Yes, this means YOU!
▪Certification/Professional
Testing (Nonprofit/NGO)
▪State Education Departments
▪School Districts
▪Other government Agencies
▪Inspectors General
4
5. Are you Investigating?
▪ Do you have have an investigative response plan in
place to reflexively assess the risk/vulnerability
presented by a suspected exam integrity issue?
▪ Do you have a framework in place to respond to
possible issues raised by tipline reports, web
searches, and/or data forensic analyses?
▪ Do you have a comprehensive investigative plan,
trained manpower, or the resources to perform
these tasks effectively?
▪ Do you have exam integrity-specific training and/or
have had exam integrity added to your SOPs?
5
6. Investigating Cheating:
What you need:
Test Security Framework/Program
– Threat Assessment
– Staff designee
– Effective policies & agreements
– Effective executive and legal support
Investigative Framework
– Detection Methods
• Tip lines, Data Forensics, Web Patrol, Vendor notification
agreements, Routine Audits, etc.
– Investigative response plan
• Incident triage
• Who investigates?
• What & when to investigate?
• Evidence Collection (data/physical and interviews)
• Evidence preservation
• Reporting
6
7. If you don’t have the framework in place
• Do you have the resources to do this internally
(or externally)?
• Have you discussed this with your executive
leadership?
– Do you have corporate buy-in?
– Are their expectations realistic?
– Are decisions made based on best practices and
exam integrity expertise?
– Have you started budgeting for this framework?
(It’s always more cost effective to have a plan vs.
responding to an incident unprepared)
7
8. Planning to Investigate:
Test Security Framework/Program
Threat Assessment
– Who performs this?
– What needs to be reviewed?
Staff designee
– Who investigates possible exam integrity
issues, are they assessment staff, a vendor, or
an outside agency (Inspector General, etc.)?
Effective policies & agreements
– What candidate, staff, vendor, and stakeholder
agreements are in place?
8
9. Planning to Investigate:
Effective executive and legal support
• Effective executive support
– Who decides to investigate?
• Who’s recommendation is it based on?
• How are potential internal disagreements resolved?
– How are investigations budgeted (staff, resources, &
funding?)
– Are organizational priorities clearly supporting the
goals of an investigation?
• Effective legal support
– Is legal consultation with the appropriate counsel?
• Skill set is not just that of education, but of intellectual
property, criminal law, contracts, and white collar
investigations.
• Is it cost effective?
9
10. Investigative Framework:
Detection Methods
Use of sources/tip lines
Online/social intelligence
Data forensic/psychometric auditing (scoring)
– Statistical analysis
– Erasure Analysis
– Other methods
“Surveys”
Performance auditing – spot checking
– Site visits/secret shopper/exam-day observation
Interviews of employees/students/candidates
– Interviewers should be trained investigators
10
11. Investigative Framework
After Detecting Evidence of Cheating,
What is the Investigative Process?
1. Identify investigative goals
2. Identify the evidence available
3. Preserve, gather and document evidence
4. Report findings & make recommendations
11
12. Investigative Framework
Investigative Goals
1. Ensure validity of exam results
2. Identify and punish cheaters
3. Preserve integrity, meaning and value of
assessment, certification, license or credentia
4. Restore or build public confidence
5. Deter cheating
12
13. Investigative Response Planning
Draft an investigations plan that includes the
following essential components:
1. Establish investigative goals
2. Create timeline for investigation
3. Identify all participants in investigation and scope
of duties for each
4. Identify and prioritize documentary and physical
evidence to preserve and collect
5. Identify witnesses to be interviewed and establish
order of interviews
6. Determine the method of reporting conclusions
and findings to the organization
13
14. Investigative Response Planning:
Incident Triage
• After detection, what steps are taken next?
– How can you decide what type of investigation is
warranted?
– Preliminary Investigation
• Are the allegations substantiated enough to
invest investigative resources?
– If so, are the allegations severe enough to warrant
investigation or referral?
• Preserving initial evidence?
– Anything that may be time-sensitive/subject to
disposal
• Reporting the results of your Preliminary
Investigation
– Making recommendations to leadership in
a stepwise, detailed approach. 14
15. Investigative Response Planning:
What & When to Investigate
• What is the scope of investigation?
• Is a performance audit more suitable than an
investigation?
• How important is confidentiality?
15
16. Investigative Response Planning:
Evidence Collection & Preservation
Preserve all potentially relevant documents
and electronically stored information (“ESI”)
Issue evidence hold memo to all potential
witnesses and custodians for documents and
ESI
Advise all potential witnesses to maintain
confidentiality of investigation and NOT to
discuss the subject of the investigation with
each other
16
17. Investigative Response Planning:
Evidence Collection & Preservation
Ensure admissibility of evidence in potential
future proceedings by preserving the chain of
custody, as follows:
1. Identify source of evidence
2. Record date, time and location of where evidence
was collected
3. Identify person that collected evidence, as well as
any witnesses of the process
4. Establish where evidence is taken and by whom,
as well as how evidence is secured for the
duration of the investigation
5. Keep evidence in a secure location, with limited
access, and make a record every time a person
accesses the evidence
6. Create a written record of all steps
in the process
17
18. Conducting Investigations
Identify, Gather and Preserve Available Evidence
Data forensics and analytics, including score
history
Documentation of testing procedures and
participants, including seating charts and chain of
custody documents for test and answer
documents
Video and/or audio surveillance of test center
Biometric data for examinees
Test center admittance and break logs
Tipster statements
Electronic evidence, including but not limited to
cell phone images, text messages, call records &
emails
Social media and other information posted
online
18
19. Investigative Response Planning:
Reporting
Written Report or In-Person Presentation of
Findings?
– Likelihood of public disclosure and/or scrutiny
by media?
– Likelihood that report could be produced to a
third party in discovery?
– Intend to provide report to a government
agency?
– Need to tell the organization’s story about the
matter?
– Does the test sponsor need a roadmap for
further
action in response to findings? 19
20. Investigative Response Planning:
Reporting
What Level of Detail Should be Included in the Written
Report?
• Report could be written at a high level to summarize
findings or in granular detail
• Consider including the following components:
1. Introduction
2. Description of events that triggered the investigation
3. Description of the investigative methodology
4. Concise statement of specific findings of the investigation
5. Summary of all evidence gathered
6. Identify each person who engaged in wrongdoing and
describe what, if any, laws, regulations, and/or policies
each person violated
7. Identify possible courses of action for organization20
21. Investigative Response Planning:
Reporting
• Be factual, not conclusory
• Detailed evidence included in an
addendum with chain of custody
• Incident response recommendations can
be made consistent with your policies
21
22. Investigative Response Planning:
Reporting
• Use a confidential memorandum for
improvement recommendations
– separate from the report of investigative
findings.
• Questions to be addressed:
– Was a security vulnerability identified during the
incident?
– If so, what can be done to change policies,
procedures, or technologies to better deter or
detect it?
– Are there other ramifications to the
organization from the incident?
22
23. Updating the Plan:
Separate after-action reporting
Lessons learned
Process improvement
Mitigation and Prevention
What internal process changes
could have prevented this type of
exam integrity issue in the future?
Executive discussion
23
24. Join us at ATP and Online
Security at the Forefront – March 2nd, 4 PM
Exam Security Incident Response Workshop –
March 3rd, 8:30 AM
Working a Case: Best Practices in Conducting
Exam Integrity Investigations – March 4th, 11:30
AM
Twitter: @ExamIntegrity
LinkedIn Groups: Exam Integrity, ATP Test
Security
24
25. Thank you
Ben Mannes
ben.mannes@caveon.com
Marc Weinstein
marc.weinstein@caveon.com
25
- LinkedIn Group – Test Security
- Follow Caveon on twitter @caveon
- Check out our blog…www.caveon.com/blog/
- LinkedIn Group – Caveon Test Security
Editor's Notes
CIS’ Managing Directors Ben Mannes and Marc Weinstein have extensive experience in investigations stemming from their respective law enforcement backgrounds, and are highly regarded for their casework in the exam integrity community; having successfully investigated hundreds of high-stakes cheating cases in the US and Puerto Rico. They contribute through membership and volunteer with the Association of Test Publishers, Institute for Credentialing Excellence, InfraGard, and the Association of Inspectors General.
Caveon Investigative Services completes the only end-to-end solution in exam integrity services, which includes:
Threat assessments
Data forensics,
Comprehensive investigations of testing-related incidents, threats, and vulnerabilities.
CIS offers investigative services, professional training, and it’s unique “CIS On-Call” service to its nationwide clientele, to equip test sponsors with professional test security investigative support for national certification boards, state/local education departments, admittance examiners, licensing boards, and other professional testing organizations worldwide.
Certification/Professional Testing (Nonprofit/NGO)
Loss of revenue/intellectual property
Erosion of your credential’s brand/public trust, limiting legal liability
Unqualified people practicing with your credentials
State Education Departments
Quality metrics, District/School funding
Fair assistance for students who need targeted improvement
Flagging potential irregularities for referral
School Districts
Proper supervision and oversight of schools
Assuring fair assessment and quality metrics within schools
Working with the states to eliminate potential integrity issues before they are escalated to probes into district responses.
Other government Agencies
Addressing issues related to civil service, in service, promotional, and related testing
Inspectors General
Called upon to investigate cheating scandals
Performance auditing on assessment programs
Could work jointly with stakeholder agencies to perform this task routinely, with minimal manpower
Despite a marked increase in reported cheating scandals that weaken the integrity of assessment programs, many test sponsors still do not have an investigative response plan in place to reflexively assess the risk/vulnerability presented by a suspected exam integrity issue.
Many test sponsors that have developed a test security program do not have a framework in place to respond to possible issues raised by tip line reports, web searches, and/or data forensic analyses.
Despite a drastically increased reliance on standardized testing in education and public employment, most public assessment programs do not have a comprehensive investigative plan, trained manpower, or the resources to perform these tasks effectively.
Oversight agencies in many jurisdictions haven’t received exam integrity-specific training and/or have had exam integrity added to their SOPs
Threat Assessment
To be performed by Exam Integrity professionals with a Red Cell/Blue Cell approach (worst case vs. best case scenarios)
Life performance auditing of exam administrations, development activities, etc.
Full review of organizational procedures and policies relating to testing, to include staff, stakeholder, and candidate agreements
Staff designee
Who investigates possible exam integrity issues, are they assessment staff, a vendor, or an outside agency (Inspector General, etc.)?
Does that designee also conduct preventative exam integrity functions (Audits, web intelligence, stakeholder outreach, threat assessment)?
What training/experience does the designee have in Exam Integrity Investigations
Effective policies & agreements
Candidate, staff, vendor and stakeholder agreements
Employment/candidate policies that require cooperation with investigations
MOAs with outside investigative agencies and/or contracts with vendors
Agreements with subjects who provide assistance with investigations
After detection, what steps are taken next?
How can you decide what type of investigation is warranted?
Preliminary Investigation
Who, What, When, Where, How
Why only when available/applicable (reading too much into motive before facts are obtained is a waste of time & resources)
Are the allegations substantiated enough to invest investigative resources?
If so, are the allegations severe enough to warrant investigation or referral?
Preserving initial evidence?
Anything that may be time-sensitive/subject to disposal:
Statements, screen caps, surveillance footage, log files, exam books & answer sheets.
Reporting the results of your Preliminary Investigation
Making recommendations to leadership in a stepwise, detailed approach.
What is the scope of investigation?
Candidate(s)?
Staff Members/Vendors?
Organized Schemes?
Public Corruption/Faculty or District Involvement, Knowledge, or Willful Blindness
Is a performance audit more suitable than an investigation?
When an allegation doesn’t warrant action against a subject, but a process/policy vulnerability is what contributed to its detection.
Confidentiality
If an investigation may be initiated, do not tip your hand!
Simply hold scores/ratings for applicable parties until the outcome of the investigation.
Do not discuss granular information outside the investigative team
Applies to senior staff and boards
Plan should designate a senior decision-maker who can supervise the investigation and be privy to case-sensitive information.
Improvement recommendations and lessons learned should usually, but not always, be set forth in a confidential memorandum separate from the report of investigative findings.
Questions to be addressed:
Was a security vulnerability identified during the incident?
If so, what can be done to change policies, procedures, or technologies to better deter or detect it?
Are there other ramifications to the organization from the incident?