SlideShare a Scribd company logo
Caveon Webinar Series:
Exam Integrity Investigations:
An Introduction to the Essentials
January 21, 2015
1
About Your Speakers
2
A. Benjamin Mannes, CPP, SSI, CHS-III Marc J. Weinstein, ESQ.
3
Why We’re Here
Yes, this means YOU!
▪Certification/Professional
Testing (Nonprofit/NGO)
▪State Education Departments
▪School Districts
▪Other government Agencies
▪Inspectors General
4
Are you Investigating?
▪ Do you have have an investigative response plan in
place to reflexively assess the risk/vulnerability
presented by a suspected exam integrity issue?
▪ Do you have a framework in place to respond to
possible issues raised by tipline reports, web
searches, and/or data forensic analyses?
▪ Do you have a comprehensive investigative plan,
trained manpower, or the resources to perform
these tasks effectively?
▪ Do you have exam integrity-specific training and/or
have had exam integrity added to your SOPs?
5
Investigating Cheating:
What you need:
 Test Security Framework/Program
– Threat Assessment
– Staff designee
– Effective policies & agreements
– Effective executive and legal support
 Investigative Framework
– Detection Methods
• Tip lines, Data Forensics, Web Patrol, Vendor notification
agreements, Routine Audits, etc.
– Investigative response plan
• Incident triage
• Who investigates?
• What & when to investigate?
• Evidence Collection (data/physical and interviews)
• Evidence preservation
• Reporting
6
If you don’t have the framework in place
• Do you have the resources to do this internally
(or externally)?
• Have you discussed this with your executive
leadership?
– Do you have corporate buy-in?
– Are their expectations realistic?
– Are decisions made based on best practices and
exam integrity expertise?
– Have you started budgeting for this framework?
(It’s always more cost effective to have a plan vs.
responding to an incident unprepared)
7
Planning to Investigate:
Test Security Framework/Program
 Threat Assessment
– Who performs this?
– What needs to be reviewed?
 Staff designee
– Who investigates possible exam integrity
issues, are they assessment staff, a vendor, or
an outside agency (Inspector General, etc.)?
 Effective policies & agreements
– What candidate, staff, vendor, and stakeholder
agreements are in place?
8
Planning to Investigate:
Effective executive and legal support
• Effective executive support
– Who decides to investigate?
• Who’s recommendation is it based on?
• How are potential internal disagreements resolved?
– How are investigations budgeted (staff, resources, &
funding?)
– Are organizational priorities clearly supporting the
goals of an investigation?
• Effective legal support
– Is legal consultation with the appropriate counsel?
• Skill set is not just that of education, but of intellectual
property, criminal law, contracts, and white collar
investigations.
• Is it cost effective?
9
Investigative Framework:
Detection Methods
 Use of sources/tip lines
 Online/social intelligence
 Data forensic/psychometric auditing (scoring)
– Statistical analysis
– Erasure Analysis
– Other methods
 “Surveys”
 Performance auditing – spot checking
– Site visits/secret shopper/exam-day observation
 Interviews of employees/students/candidates
– Interviewers should be trained investigators
10
Investigative Framework
After Detecting Evidence of Cheating,
What is the Investigative Process?
1. Identify investigative goals
2. Identify the evidence available
3. Preserve, gather and document evidence
4. Report findings & make recommendations
11
Investigative Framework
Investigative Goals
1. Ensure validity of exam results
2. Identify and punish cheaters
3. Preserve integrity, meaning and value of
assessment, certification, license or credentia
4. Restore or build public confidence
5. Deter cheating
12
Investigative Response Planning
Draft an investigations plan that includes the
following essential components:
1. Establish investigative goals
2. Create timeline for investigation
3. Identify all participants in investigation and scope
of duties for each
4. Identify and prioritize documentary and physical
evidence to preserve and collect
5. Identify witnesses to be interviewed and establish
order of interviews
6. Determine the method of reporting conclusions
and findings to the organization
13
Investigative Response Planning:
Incident Triage
• After detection, what steps are taken next?
– How can you decide what type of investigation is
warranted?
– Preliminary Investigation
• Are the allegations substantiated enough to
invest investigative resources?
– If so, are the allegations severe enough to warrant
investigation or referral?
• Preserving initial evidence?
– Anything that may be time-sensitive/subject to
disposal
• Reporting the results of your Preliminary
Investigation
– Making recommendations to leadership in
a stepwise, detailed approach. 14
Investigative Response Planning:
What & When to Investigate
• What is the scope of investigation?
• Is a performance audit more suitable than an
investigation?
• How important is confidentiality?
15
Investigative Response Planning:
Evidence Collection & Preservation
 Preserve all potentially relevant documents
and electronically stored information (“ESI”)
 Issue evidence hold memo to all potential
witnesses and custodians for documents and
ESI
 Advise all potential witnesses to maintain
confidentiality of investigation and NOT to
discuss the subject of the investigation with
each other
16
Investigative Response Planning:
Evidence Collection & Preservation
Ensure admissibility of evidence in potential
future proceedings by preserving the chain of
custody, as follows:
1. Identify source of evidence
2. Record date, time and location of where evidence
was collected
3. Identify person that collected evidence, as well as
any witnesses of the process
4. Establish where evidence is taken and by whom,
as well as how evidence is secured for the
duration of the investigation
5. Keep evidence in a secure location, with limited
access, and make a record every time a person
accesses the evidence
6. Create a written record of all steps
in the process
17
Conducting Investigations
Identify, Gather and Preserve Available Evidence
 Data forensics and analytics, including score
history
 Documentation of testing procedures and
participants, including seating charts and chain of
custody documents for test and answer
documents
 Video and/or audio surveillance of test center
 Biometric data for examinees
 Test center admittance and break logs
 Tipster statements
 Electronic evidence, including but not limited to
cell phone images, text messages, call records &
emails
 Social media and other information posted
online
18
Investigative Response Planning:
Reporting
Written Report or In-Person Presentation of
Findings?
– Likelihood of public disclosure and/or scrutiny
by media?
– Likelihood that report could be produced to a
third party in discovery?
– Intend to provide report to a government
agency?
– Need to tell the organization’s story about the
matter?
– Does the test sponsor need a roadmap for
further
action in response to findings? 19
Investigative Response Planning:
Reporting
What Level of Detail Should be Included in the Written
Report?
• Report could be written at a high level to summarize
findings or in granular detail
• Consider including the following components:
1. Introduction
2. Description of events that triggered the investigation
3. Description of the investigative methodology
4. Concise statement of specific findings of the investigation
5. Summary of all evidence gathered
6. Identify each person who engaged in wrongdoing and
describe what, if any, laws, regulations, and/or policies
each person violated
7. Identify possible courses of action for organization20
Investigative Response Planning:
Reporting
• Be factual, not conclusory
• Detailed evidence included in an
addendum with chain of custody
• Incident response recommendations can
be made consistent with your policies
21
Investigative Response Planning:
Reporting
• Use a confidential memorandum for
improvement recommendations
– separate from the report of investigative
findings.
• Questions to be addressed:
– Was a security vulnerability identified during the
incident?
– If so, what can be done to change policies,
procedures, or technologies to better deter or
detect it?
– Are there other ramifications to the
organization from the incident?
22
Updating the Plan:
Separate after-action reporting
 Lessons learned
 Process improvement
 Mitigation and Prevention
 What internal process changes
could have prevented this type of
exam integrity issue in the future?
 Executive discussion
23
Join us at ATP and Online
 Security at the Forefront – March 2nd, 4 PM
 Exam Security Incident Response Workshop –
March 3rd, 8:30 AM
 Working a Case: Best Practices in Conducting
Exam Integrity Investigations – March 4th, 11:30
AM
 Twitter: @ExamIntegrity
 LinkedIn Groups: Exam Integrity, ATP Test
Security
24
Thank you
Ben Mannes
ben.mannes@caveon.com
Marc Weinstein
marc.weinstein@caveon.com
25
- LinkedIn Group – Test Security
- Follow Caveon on twitter @caveon
- Check out our blog…www.caveon.com/blog/
- LinkedIn Group – Caveon Test Security

More Related Content

Similar to Caveon Webinar Series - Exam Integrity Investigations, An Introduction to the Essentials - January 2015

Investigation Guidance
Investigation GuidanceInvestigation Guidance
Investigation GuidanceSarah Gardner
 
CH-1 Introduction to research.pptx
CH-1 Introduction to research.pptxCH-1 Introduction to research.pptx
CH-1 Introduction to research.pptx
jemalmohamed4
 
Preparing a-case-study-a-guide-for-designing-and-conducting-a-case-study-for-...
Preparing a-case-study-a-guide-for-designing-and-conducting-a-case-study-for-...Preparing a-case-study-a-guide-for-designing-and-conducting-a-case-study-for-...
Preparing a-case-study-a-guide-for-designing-and-conducting-a-case-study-for-...
sreenath T.V
 
Workplace Investigations (Series: Protecting Your Employee Assets: The Life C...
Workplace Investigations (Series: Protecting Your Employee Assets: The Life C...Workplace Investigations (Series: Protecting Your Employee Assets: The Life C...
Workplace Investigations (Series: Protecting Your Employee Assets: The Life C...
Financial Poise
 
Workplace Investigation Guide
Workplace Investigation GuideWorkplace Investigation Guide
Workplace Investigation Guide
@HR2CEO
 
Writing research proposal
Writing research proposalWriting research proposal
Writing research proposal
abween1
 
ACCA-IIA Singapore Seminar 2015 Part 5 Investigation
ACCA-IIA Singapore Seminar 2015 Part 5 InvestigationACCA-IIA Singapore Seminar 2015 Part 5 Investigation
ACCA-IIA Singapore Seminar 2015 Part 5 Investigation
BillyCheuk
 
Chapter 4 Understanding Data and Ways to Systematically Collect Data
Chapter 4   Understanding Data and Ways to Systematically Collect DataChapter 4   Understanding Data and Ways to Systematically Collect Data
Chapter 4 Understanding Data and Ways to Systematically Collect Data
Carla Kristina Cruz
 
OCR Audits Are Coming – Is Your Organization Prepared?
OCR Audits Are Coming – Is Your Organization Prepared?OCR Audits Are Coming – Is Your Organization Prepared?
OCR Audits Are Coming – Is Your Organization Prepared?
Polsinelli PC
 
chapter4-understandingdataandwaystosystematicallycollectdata-170809052400.pptx
chapter4-understandingdataandwaystosystematicallycollectdata-170809052400.pptxchapter4-understandingdataandwaystosystematicallycollectdata-170809052400.pptx
chapter4-understandingdataandwaystosystematicallycollectdata-170809052400.pptx
venuspatatag4
 
I Know What You Did Last Summer: Workplace Investigations (Series: Protecting...
I Know What You Did Last Summer: Workplace Investigations (Series: Protecting...I Know What You Did Last Summer: Workplace Investigations (Series: Protecting...
I Know What You Did Last Summer: Workplace Investigations (Series: Protecting...
Financial Poise
 
Research process made by dr nishant those who want to understand research pro...
Research process made by dr nishant those who want to understand research pro...Research process made by dr nishant those who want to understand research pro...
Research process made by dr nishant those who want to understand research pro...
Nishant Taralkar
 
Levels of irb review july 16 2019
Levels of irb review july 16 2019Levels of irb review july 16 2019
Levels of irb review july 16 2019
Weam Banjar
 
Chapter 3
Chapter 3Chapter 3
Chapter 3
Sharad Patel
 
Get your Ducks in a Row - The OCR Audit Season is About to Begin
Get your Ducks in a Row - The OCR Audit Season is About to BeginGet your Ducks in a Row - The OCR Audit Season is About to Begin
Get your Ducks in a Row - The OCR Audit Season is About to Begin
ID Experts
 
Market and Social Research Part 2
Market and Social Research Part 2Market and Social Research Part 2
Market and Social Research Part 2
bestsliders
 
Submitting a research proposal
Submitting a research proposalSubmitting a research proposal
Submitting a research proposal
Royal College of Occupational Therapists
 
Brian HughesTheimportanceof evidencecollectionan.docx
Brian HughesTheimportanceof evidencecollectionan.docxBrian HughesTheimportanceof evidencecollectionan.docx
Brian HughesTheimportanceof evidencecollectionan.docx
jasoninnes20
 
EAPP Quarter2 - Module4_ Data Collection Methods & Tools for Research.pdf
EAPP Quarter2 - Module4_ Data Collection Methods & Tools for Research.pdfEAPP Quarter2 - Module4_ Data Collection Methods & Tools for Research.pdf
EAPP Quarter2 - Module4_ Data Collection Methods & Tools for Research.pdf
Leah Condina
 

Similar to Caveon Webinar Series - Exam Integrity Investigations, An Introduction to the Essentials - January 2015 (20)

Investigation Guidance
Investigation GuidanceInvestigation Guidance
Investigation Guidance
 
Research project mgt
Research project mgtResearch project mgt
Research project mgt
 
CH-1 Introduction to research.pptx
CH-1 Introduction to research.pptxCH-1 Introduction to research.pptx
CH-1 Introduction to research.pptx
 
Preparing a-case-study-a-guide-for-designing-and-conducting-a-case-study-for-...
Preparing a-case-study-a-guide-for-designing-and-conducting-a-case-study-for-...Preparing a-case-study-a-guide-for-designing-and-conducting-a-case-study-for-...
Preparing a-case-study-a-guide-for-designing-and-conducting-a-case-study-for-...
 
Workplace Investigations (Series: Protecting Your Employee Assets: The Life C...
Workplace Investigations (Series: Protecting Your Employee Assets: The Life C...Workplace Investigations (Series: Protecting Your Employee Assets: The Life C...
Workplace Investigations (Series: Protecting Your Employee Assets: The Life C...
 
Workplace Investigation Guide
Workplace Investigation GuideWorkplace Investigation Guide
Workplace Investigation Guide
 
Writing research proposal
Writing research proposalWriting research proposal
Writing research proposal
 
ACCA-IIA Singapore Seminar 2015 Part 5 Investigation
ACCA-IIA Singapore Seminar 2015 Part 5 InvestigationACCA-IIA Singapore Seminar 2015 Part 5 Investigation
ACCA-IIA Singapore Seminar 2015 Part 5 Investigation
 
Chapter 4 Understanding Data and Ways to Systematically Collect Data
Chapter 4   Understanding Data and Ways to Systematically Collect DataChapter 4   Understanding Data and Ways to Systematically Collect Data
Chapter 4 Understanding Data and Ways to Systematically Collect Data
 
OCR Audits Are Coming – Is Your Organization Prepared?
OCR Audits Are Coming – Is Your Organization Prepared?OCR Audits Are Coming – Is Your Organization Prepared?
OCR Audits Are Coming – Is Your Organization Prepared?
 
chapter4-understandingdataandwaystosystematicallycollectdata-170809052400.pptx
chapter4-understandingdataandwaystosystematicallycollectdata-170809052400.pptxchapter4-understandingdataandwaystosystematicallycollectdata-170809052400.pptx
chapter4-understandingdataandwaystosystematicallycollectdata-170809052400.pptx
 
I Know What You Did Last Summer: Workplace Investigations (Series: Protecting...
I Know What You Did Last Summer: Workplace Investigations (Series: Protecting...I Know What You Did Last Summer: Workplace Investigations (Series: Protecting...
I Know What You Did Last Summer: Workplace Investigations (Series: Protecting...
 
Research process made by dr nishant those who want to understand research pro...
Research process made by dr nishant those who want to understand research pro...Research process made by dr nishant those who want to understand research pro...
Research process made by dr nishant those who want to understand research pro...
 
Levels of irb review july 16 2019
Levels of irb review july 16 2019Levels of irb review july 16 2019
Levels of irb review july 16 2019
 
Chapter 3
Chapter 3Chapter 3
Chapter 3
 
Get your Ducks in a Row - The OCR Audit Season is About to Begin
Get your Ducks in a Row - The OCR Audit Season is About to BeginGet your Ducks in a Row - The OCR Audit Season is About to Begin
Get your Ducks in a Row - The OCR Audit Season is About to Begin
 
Market and Social Research Part 2
Market and Social Research Part 2Market and Social Research Part 2
Market and Social Research Part 2
 
Submitting a research proposal
Submitting a research proposalSubmitting a research proposal
Submitting a research proposal
 
Brian HughesTheimportanceof evidencecollectionan.docx
Brian HughesTheimportanceof evidencecollectionan.docxBrian HughesTheimportanceof evidencecollectionan.docx
Brian HughesTheimportanceof evidencecollectionan.docx
 
EAPP Quarter2 - Module4_ Data Collection Methods & Tools for Research.pdf
EAPP Quarter2 - Module4_ Data Collection Methods & Tools for Research.pdfEAPP Quarter2 - Module4_ Data Collection Methods & Tools for Research.pdf
EAPP Quarter2 - Module4_ Data Collection Methods & Tools for Research.pdf
 

More from Caveon Test Security

Unpublished study indicates high chance of fraud in thousands of tests of enem
Unpublished study indicates high chance of fraud in thousands of tests of enemUnpublished study indicates high chance of fraud in thousands of tests of enem
Unpublished study indicates high chance of fraud in thousands of tests of enem
Caveon Test Security
 
Caveon webinar series - smart items- using innovative item design to make you...
Caveon webinar series - smart items- using innovative item design to make you...Caveon webinar series - smart items- using innovative item design to make you...
Caveon webinar series - smart items- using innovative item design to make you...
Caveon Test Security
 
Caveon webinar series - smart items- using innovative item design to make you...
Caveon webinar series - smart items- using innovative item design to make you...Caveon webinar series - smart items- using innovative item design to make you...
Caveon webinar series - smart items- using innovative item design to make you...
Caveon Test Security
 
Caveon Webinar Series - A Guide to Online Protection Strategies - March 28, ...
Caveon Webinar Series -  A Guide to Online Protection Strategies - March 28, ...Caveon Webinar Series -  A Guide to Online Protection Strategies - March 28, ...
Caveon Webinar Series - A Guide to Online Protection Strategies - March 28, ...
Caveon Test Security
 
Caveon Webinar Series - Five Things You Can Do Now to Protect Your Assessment...
Caveon Webinar Series - Five Things You Can Do Now to Protect Your Assessment...Caveon Webinar Series - Five Things You Can Do Now to Protect Your Assessment...
Caveon Webinar Series - Five Things You Can Do Now to Protect Your Assessment...
Caveon Test Security
 
The Do's and Dont's of Administering High Stakes Tests in Schools Final 121217
The Do's and Dont's of Administering High Stakes Tests in Schools Final 121217The Do's and Dont's of Administering High Stakes Tests in Schools Final 121217
The Do's and Dont's of Administering High Stakes Tests in Schools Final 121217
Caveon Test Security
 
Caveon Webinar Series - The Art of Test Security - Know Thy Enemy - November ...
Caveon Webinar Series - The Art of Test Security - Know Thy Enemy - November ...Caveon Webinar Series - The Art of Test Security - Know Thy Enemy - November ...
Caveon Webinar Series - The Art of Test Security - Know Thy Enemy - November ...
Caveon Test Security
 
Caveon Webinar Series - Four Steps to Effective Investigations in School Dis...
Caveon Webinar Series -  Four Steps to Effective Investigations in School Dis...Caveon Webinar Series -  Four Steps to Effective Investigations in School Dis...
Caveon Webinar Series - Four Steps to Effective Investigations in School Dis...
Caveon Test Security
 
Caveon Webinar Series - On-site Monitoring in Districts 0317
Caveon Webinar Series - On-site Monitoring in Districts 0317Caveon Webinar Series - On-site Monitoring in Districts 0317
Caveon Webinar Series - On-site Monitoring in Districts 0317
Caveon Test Security
 
CESP Study Session #1 October 2016
CESP Study Session #1 October 2016CESP Study Session #1 October 2016
CESP Study Session #1 October 2016
Caveon Test Security
 
A Tale of Two Cities - School District Webinar #1 Jan 2017
A Tale of Two Cities - School District Webinar  #1 Jan 2017A Tale of Two Cities - School District Webinar  #1 Jan 2017
A Tale of Two Cities - School District Webinar #1 Jan 2017
Caveon Test Security
 
Caveon Webinar Series - Discrete Option Multiple Choice: A Revolution in Te...
Caveon Webinar Series  - Discrete Option Multiple Choice:  A Revolution in Te...Caveon Webinar Series  - Discrete Option Multiple Choice:  A Revolution in Te...
Caveon Webinar Series - Discrete Option Multiple Choice: A Revolution in Te...
Caveon Test Security
 
Caveon Webinar Series - Test Cheaters Say the Darnedest Things! - 072016
Caveon Webinar Series -  Test Cheaters Say the Darnedest Things! - 072016Caveon Webinar Series -  Test Cheaters Say the Darnedest Things! - 072016
Caveon Webinar Series - Test Cheaters Say the Darnedest Things! - 072016
Caveon Test Security
 
Caveon Webinar Series - The Test Security Framework- Why Different Tests Nee...
Caveon Webinar Series -  The Test Security Framework- Why Different Tests Nee...Caveon Webinar Series -  The Test Security Framework- Why Different Tests Nee...
Caveon Webinar Series - The Test Security Framework- Why Different Tests Nee...
Caveon Test Security
 
Caveon Webinar Series - Conducting Test Security Investigations in School Di...
Caveon Webinar Series -  Conducting Test Security Investigations in School Di...Caveon Webinar Series -  Conducting Test Security Investigations in School Di...
Caveon Webinar Series - Conducting Test Security Investigations in School Di...
Caveon Test Security
 
Caveon Webinar Series - Creating Your Test Security Game Plan - March 2016
Caveon Webinar Series -  Creating Your Test Security Game Plan - March 2016Caveon Webinar Series -  Creating Your Test Security Game Plan - March 2016
Caveon Webinar Series - Creating Your Test Security Game Plan - March 2016
Caveon Test Security
 
Caveon Webinar Series - Mastering the US DOE Test Security Requirements Janua...
Caveon Webinar Series - Mastering the US DOE Test Security Requirements Janua...Caveon Webinar Series - Mastering the US DOE Test Security Requirements Janua...
Caveon Webinar Series - Mastering the US DOE Test Security Requirements Janua...
Caveon Test Security
 
Caveon Webinar Series - Will the Real Cloned Item Please Stand Up? final
Caveon Webinar Series -  Will the Real Cloned Item Please Stand Up? finalCaveon Webinar Series -  Will the Real Cloned Item Please Stand Up? final
Caveon Webinar Series - Will the Real Cloned Item Please Stand Up? final
Caveon Test Security
 
Caveon Webinar Series - Lessons Learned at the 2015 National Conference on S...
Caveon Webinar Series -  Lessons Learned at the 2015 National Conference on S...Caveon Webinar Series -  Lessons Learned at the 2015 National Conference on S...
Caveon Webinar Series - Lessons Learned at the 2015 National Conference on S...
Caveon Test Security
 
Caveon Webinar Series - Learning and Teaching Best Practices in Test Security...
Caveon Webinar Series - Learning and Teaching Best Practices in Test Security...Caveon Webinar Series - Learning and Teaching Best Practices in Test Security...
Caveon Webinar Series - Learning and Teaching Best Practices in Test Security...
Caveon Test Security
 

More from Caveon Test Security (20)

Unpublished study indicates high chance of fraud in thousands of tests of enem
Unpublished study indicates high chance of fraud in thousands of tests of enemUnpublished study indicates high chance of fraud in thousands of tests of enem
Unpublished study indicates high chance of fraud in thousands of tests of enem
 
Caveon webinar series - smart items- using innovative item design to make you...
Caveon webinar series - smart items- using innovative item design to make you...Caveon webinar series - smart items- using innovative item design to make you...
Caveon webinar series - smart items- using innovative item design to make you...
 
Caveon webinar series - smart items- using innovative item design to make you...
Caveon webinar series - smart items- using innovative item design to make you...Caveon webinar series - smart items- using innovative item design to make you...
Caveon webinar series - smart items- using innovative item design to make you...
 
Caveon Webinar Series - A Guide to Online Protection Strategies - March 28, ...
Caveon Webinar Series -  A Guide to Online Protection Strategies - March 28, ...Caveon Webinar Series -  A Guide to Online Protection Strategies - March 28, ...
Caveon Webinar Series - A Guide to Online Protection Strategies - March 28, ...
 
Caveon Webinar Series - Five Things You Can Do Now to Protect Your Assessment...
Caveon Webinar Series - Five Things You Can Do Now to Protect Your Assessment...Caveon Webinar Series - Five Things You Can Do Now to Protect Your Assessment...
Caveon Webinar Series - Five Things You Can Do Now to Protect Your Assessment...
 
The Do's and Dont's of Administering High Stakes Tests in Schools Final 121217
The Do's and Dont's of Administering High Stakes Tests in Schools Final 121217The Do's and Dont's of Administering High Stakes Tests in Schools Final 121217
The Do's and Dont's of Administering High Stakes Tests in Schools Final 121217
 
Caveon Webinar Series - The Art of Test Security - Know Thy Enemy - November ...
Caveon Webinar Series - The Art of Test Security - Know Thy Enemy - November ...Caveon Webinar Series - The Art of Test Security - Know Thy Enemy - November ...
Caveon Webinar Series - The Art of Test Security - Know Thy Enemy - November ...
 
Caveon Webinar Series - Four Steps to Effective Investigations in School Dis...
Caveon Webinar Series -  Four Steps to Effective Investigations in School Dis...Caveon Webinar Series -  Four Steps to Effective Investigations in School Dis...
Caveon Webinar Series - Four Steps to Effective Investigations in School Dis...
 
Caveon Webinar Series - On-site Monitoring in Districts 0317
Caveon Webinar Series - On-site Monitoring in Districts 0317Caveon Webinar Series - On-site Monitoring in Districts 0317
Caveon Webinar Series - On-site Monitoring in Districts 0317
 
CESP Study Session #1 October 2016
CESP Study Session #1 October 2016CESP Study Session #1 October 2016
CESP Study Session #1 October 2016
 
A Tale of Two Cities - School District Webinar #1 Jan 2017
A Tale of Two Cities - School District Webinar  #1 Jan 2017A Tale of Two Cities - School District Webinar  #1 Jan 2017
A Tale of Two Cities - School District Webinar #1 Jan 2017
 
Caveon Webinar Series - Discrete Option Multiple Choice: A Revolution in Te...
Caveon Webinar Series  - Discrete Option Multiple Choice:  A Revolution in Te...Caveon Webinar Series  - Discrete Option Multiple Choice:  A Revolution in Te...
Caveon Webinar Series - Discrete Option Multiple Choice: A Revolution in Te...
 
Caveon Webinar Series - Test Cheaters Say the Darnedest Things! - 072016
Caveon Webinar Series -  Test Cheaters Say the Darnedest Things! - 072016Caveon Webinar Series -  Test Cheaters Say the Darnedest Things! - 072016
Caveon Webinar Series - Test Cheaters Say the Darnedest Things! - 072016
 
Caveon Webinar Series - The Test Security Framework- Why Different Tests Nee...
Caveon Webinar Series -  The Test Security Framework- Why Different Tests Nee...Caveon Webinar Series -  The Test Security Framework- Why Different Tests Nee...
Caveon Webinar Series - The Test Security Framework- Why Different Tests Nee...
 
Caveon Webinar Series - Conducting Test Security Investigations in School Di...
Caveon Webinar Series -  Conducting Test Security Investigations in School Di...Caveon Webinar Series -  Conducting Test Security Investigations in School Di...
Caveon Webinar Series - Conducting Test Security Investigations in School Di...
 
Caveon Webinar Series - Creating Your Test Security Game Plan - March 2016
Caveon Webinar Series -  Creating Your Test Security Game Plan - March 2016Caveon Webinar Series -  Creating Your Test Security Game Plan - March 2016
Caveon Webinar Series - Creating Your Test Security Game Plan - March 2016
 
Caveon Webinar Series - Mastering the US DOE Test Security Requirements Janua...
Caveon Webinar Series - Mastering the US DOE Test Security Requirements Janua...Caveon Webinar Series - Mastering the US DOE Test Security Requirements Janua...
Caveon Webinar Series - Mastering the US DOE Test Security Requirements Janua...
 
Caveon Webinar Series - Will the Real Cloned Item Please Stand Up? final
Caveon Webinar Series -  Will the Real Cloned Item Please Stand Up? finalCaveon Webinar Series -  Will the Real Cloned Item Please Stand Up? final
Caveon Webinar Series - Will the Real Cloned Item Please Stand Up? final
 
Caveon Webinar Series - Lessons Learned at the 2015 National Conference on S...
Caveon Webinar Series -  Lessons Learned at the 2015 National Conference on S...Caveon Webinar Series -  Lessons Learned at the 2015 National Conference on S...
Caveon Webinar Series - Lessons Learned at the 2015 National Conference on S...
 
Caveon Webinar Series - Learning and Teaching Best Practices in Test Security...
Caveon Webinar Series - Learning and Teaching Best Practices in Test Security...Caveon Webinar Series - Learning and Teaching Best Practices in Test Security...
Caveon Webinar Series - Learning and Teaching Best Practices in Test Security...
 

Recently uploaded

Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
AzmatAli747758
 
Ethnobotany and Ethnopharmacology ......
Ethnobotany and Ethnopharmacology ......Ethnobotany and Ethnopharmacology ......
Ethnobotany and Ethnopharmacology ......
Ashokrao Mane college of Pharmacy Peth-Vadgaon
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
siemaillard
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
siemaillard
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
Jisc
 
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
BhavyaRajput3
 
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
Nguyen Thanh Tu Collection
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
JosvitaDsouza2
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
DeeptiGupta154
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
Jisc
 
How to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS ModuleHow to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS Module
Celine George
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
Celine George
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
Thiyagu K
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
Tamralipta Mahavidyalaya
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
TechSoup
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
joachimlavalley1
 
Template Jadual Bertugas Kelas (Boleh Edit)
Template Jadual Bertugas Kelas (Boleh Edit)Template Jadual Bertugas Kelas (Boleh Edit)
Template Jadual Bertugas Kelas (Boleh Edit)
rosedainty
 
The Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve ThomasonThe Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve Thomason
Steve Thomason
 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
Anna Sz.
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
RaedMohamed3
 

Recently uploaded (20)

Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
 
Ethnobotany and Ethnopharmacology ......
Ethnobotany and Ethnopharmacology ......Ethnobotany and Ethnopharmacology ......
Ethnobotany and Ethnopharmacology ......
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
 
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
 
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
 
How to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS ModuleHow to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS Module
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
 
Template Jadual Bertugas Kelas (Boleh Edit)
Template Jadual Bertugas Kelas (Boleh Edit)Template Jadual Bertugas Kelas (Boleh Edit)
Template Jadual Bertugas Kelas (Boleh Edit)
 
The Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve ThomasonThe Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve Thomason
 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
 

Caveon Webinar Series - Exam Integrity Investigations, An Introduction to the Essentials - January 2015

  • 1. Caveon Webinar Series: Exam Integrity Investigations: An Introduction to the Essentials January 21, 2015 1
  • 2. About Your Speakers 2 A. Benjamin Mannes, CPP, SSI, CHS-III Marc J. Weinstein, ESQ.
  • 4. Yes, this means YOU! ▪Certification/Professional Testing (Nonprofit/NGO) ▪State Education Departments ▪School Districts ▪Other government Agencies ▪Inspectors General 4
  • 5. Are you Investigating? ▪ Do you have have an investigative response plan in place to reflexively assess the risk/vulnerability presented by a suspected exam integrity issue? ▪ Do you have a framework in place to respond to possible issues raised by tipline reports, web searches, and/or data forensic analyses? ▪ Do you have a comprehensive investigative plan, trained manpower, or the resources to perform these tasks effectively? ▪ Do you have exam integrity-specific training and/or have had exam integrity added to your SOPs? 5
  • 6. Investigating Cheating: What you need:  Test Security Framework/Program – Threat Assessment – Staff designee – Effective policies & agreements – Effective executive and legal support  Investigative Framework – Detection Methods • Tip lines, Data Forensics, Web Patrol, Vendor notification agreements, Routine Audits, etc. – Investigative response plan • Incident triage • Who investigates? • What & when to investigate? • Evidence Collection (data/physical and interviews) • Evidence preservation • Reporting 6
  • 7. If you don’t have the framework in place • Do you have the resources to do this internally (or externally)? • Have you discussed this with your executive leadership? – Do you have corporate buy-in? – Are their expectations realistic? – Are decisions made based on best practices and exam integrity expertise? – Have you started budgeting for this framework? (It’s always more cost effective to have a plan vs. responding to an incident unprepared) 7
  • 8. Planning to Investigate: Test Security Framework/Program  Threat Assessment – Who performs this? – What needs to be reviewed?  Staff designee – Who investigates possible exam integrity issues, are they assessment staff, a vendor, or an outside agency (Inspector General, etc.)?  Effective policies & agreements – What candidate, staff, vendor, and stakeholder agreements are in place? 8
  • 9. Planning to Investigate: Effective executive and legal support • Effective executive support – Who decides to investigate? • Who’s recommendation is it based on? • How are potential internal disagreements resolved? – How are investigations budgeted (staff, resources, & funding?) – Are organizational priorities clearly supporting the goals of an investigation? • Effective legal support – Is legal consultation with the appropriate counsel? • Skill set is not just that of education, but of intellectual property, criminal law, contracts, and white collar investigations. • Is it cost effective? 9
  • 10. Investigative Framework: Detection Methods  Use of sources/tip lines  Online/social intelligence  Data forensic/psychometric auditing (scoring) – Statistical analysis – Erasure Analysis – Other methods  “Surveys”  Performance auditing – spot checking – Site visits/secret shopper/exam-day observation  Interviews of employees/students/candidates – Interviewers should be trained investigators 10
  • 11. Investigative Framework After Detecting Evidence of Cheating, What is the Investigative Process? 1. Identify investigative goals 2. Identify the evidence available 3. Preserve, gather and document evidence 4. Report findings & make recommendations 11
  • 12. Investigative Framework Investigative Goals 1. Ensure validity of exam results 2. Identify and punish cheaters 3. Preserve integrity, meaning and value of assessment, certification, license or credentia 4. Restore or build public confidence 5. Deter cheating 12
  • 13. Investigative Response Planning Draft an investigations plan that includes the following essential components: 1. Establish investigative goals 2. Create timeline for investigation 3. Identify all participants in investigation and scope of duties for each 4. Identify and prioritize documentary and physical evidence to preserve and collect 5. Identify witnesses to be interviewed and establish order of interviews 6. Determine the method of reporting conclusions and findings to the organization 13
  • 14. Investigative Response Planning: Incident Triage • After detection, what steps are taken next? – How can you decide what type of investigation is warranted? – Preliminary Investigation • Are the allegations substantiated enough to invest investigative resources? – If so, are the allegations severe enough to warrant investigation or referral? • Preserving initial evidence? – Anything that may be time-sensitive/subject to disposal • Reporting the results of your Preliminary Investigation – Making recommendations to leadership in a stepwise, detailed approach. 14
  • 15. Investigative Response Planning: What & When to Investigate • What is the scope of investigation? • Is a performance audit more suitable than an investigation? • How important is confidentiality? 15
  • 16. Investigative Response Planning: Evidence Collection & Preservation  Preserve all potentially relevant documents and electronically stored information (“ESI”)  Issue evidence hold memo to all potential witnesses and custodians for documents and ESI  Advise all potential witnesses to maintain confidentiality of investigation and NOT to discuss the subject of the investigation with each other 16
  • 17. Investigative Response Planning: Evidence Collection & Preservation Ensure admissibility of evidence in potential future proceedings by preserving the chain of custody, as follows: 1. Identify source of evidence 2. Record date, time and location of where evidence was collected 3. Identify person that collected evidence, as well as any witnesses of the process 4. Establish where evidence is taken and by whom, as well as how evidence is secured for the duration of the investigation 5. Keep evidence in a secure location, with limited access, and make a record every time a person accesses the evidence 6. Create a written record of all steps in the process 17
  • 18. Conducting Investigations Identify, Gather and Preserve Available Evidence  Data forensics and analytics, including score history  Documentation of testing procedures and participants, including seating charts and chain of custody documents for test and answer documents  Video and/or audio surveillance of test center  Biometric data for examinees  Test center admittance and break logs  Tipster statements  Electronic evidence, including but not limited to cell phone images, text messages, call records & emails  Social media and other information posted online 18
  • 19. Investigative Response Planning: Reporting Written Report or In-Person Presentation of Findings? – Likelihood of public disclosure and/or scrutiny by media? – Likelihood that report could be produced to a third party in discovery? – Intend to provide report to a government agency? – Need to tell the organization’s story about the matter? – Does the test sponsor need a roadmap for further action in response to findings? 19
  • 20. Investigative Response Planning: Reporting What Level of Detail Should be Included in the Written Report? • Report could be written at a high level to summarize findings or in granular detail • Consider including the following components: 1. Introduction 2. Description of events that triggered the investigation 3. Description of the investigative methodology 4. Concise statement of specific findings of the investigation 5. Summary of all evidence gathered 6. Identify each person who engaged in wrongdoing and describe what, if any, laws, regulations, and/or policies each person violated 7. Identify possible courses of action for organization20
  • 21. Investigative Response Planning: Reporting • Be factual, not conclusory • Detailed evidence included in an addendum with chain of custody • Incident response recommendations can be made consistent with your policies 21
  • 22. Investigative Response Planning: Reporting • Use a confidential memorandum for improvement recommendations – separate from the report of investigative findings. • Questions to be addressed: – Was a security vulnerability identified during the incident? – If so, what can be done to change policies, procedures, or technologies to better deter or detect it? – Are there other ramifications to the organization from the incident? 22
  • 23. Updating the Plan: Separate after-action reporting  Lessons learned  Process improvement  Mitigation and Prevention  What internal process changes could have prevented this type of exam integrity issue in the future?  Executive discussion 23
  • 24. Join us at ATP and Online  Security at the Forefront – March 2nd, 4 PM  Exam Security Incident Response Workshop – March 3rd, 8:30 AM  Working a Case: Best Practices in Conducting Exam Integrity Investigations – March 4th, 11:30 AM  Twitter: @ExamIntegrity  LinkedIn Groups: Exam Integrity, ATP Test Security 24
  • 25. Thank you Ben Mannes ben.mannes@caveon.com Marc Weinstein marc.weinstein@caveon.com 25 - LinkedIn Group – Test Security - Follow Caveon on twitter @caveon - Check out our blog…www.caveon.com/blog/ - LinkedIn Group – Caveon Test Security

Editor's Notes

  1. CIS’ Managing Directors Ben Mannes and Marc Weinstein have extensive experience in investigations stemming from their respective law enforcement backgrounds, and are highly regarded for their casework in the exam integrity community; having successfully investigated hundreds of high-stakes cheating cases in the US and Puerto Rico. They contribute through membership and volunteer with the Association of Test Publishers, Institute for Credentialing Excellence, InfraGard, and the Association of Inspectors General. Caveon Investigative Services completes the only end-to-end solution in exam integrity services, which includes: Threat assessments Data forensics, Comprehensive investigations of testing-related incidents, threats, and vulnerabilities. CIS offers investigative services, professional training, and it’s unique “CIS On-Call” service to its nationwide clientele, to equip test sponsors with professional test security investigative support for national certification boards, state/local education departments, admittance examiners, licensing boards, and other professional testing organizations worldwide.
  2. Certification/Professional Testing (Nonprofit/NGO) Loss of revenue/intellectual property Erosion of your credential’s brand/public trust, limiting legal liability Unqualified people practicing with your credentials State Education Departments Quality metrics, District/School funding Fair assistance for students who need targeted improvement Flagging potential irregularities for referral School Districts Proper supervision and oversight of schools Assuring fair assessment and quality metrics within schools Working with the states to eliminate potential integrity issues before they are escalated to probes into district responses. Other government Agencies Addressing issues related to civil service, in service, promotional, and related testing Inspectors General Called upon to investigate cheating scandals Performance auditing on assessment programs Could work jointly with stakeholder agencies to perform this task routinely, with minimal manpower
  3. Despite a marked increase in reported cheating scandals that weaken the integrity of assessment programs, many test sponsors still do not have an investigative response plan in place to reflexively assess the risk/vulnerability presented by a suspected exam integrity issue. Many test sponsors that have developed a test security program do not have a framework in place to respond to possible issues raised by tip line reports, web searches, and/or data forensic analyses. Despite a drastically increased reliance on standardized testing in education and public employment, most public assessment programs do not have a comprehensive investigative plan, trained manpower, or the resources to perform these tasks effectively. Oversight agencies in many jurisdictions haven’t received exam integrity-specific training and/or have had exam integrity added to their SOPs
  4. Threat Assessment To be performed by Exam Integrity professionals with a Red Cell/Blue Cell approach (worst case vs. best case scenarios) Life performance auditing of exam administrations, development activities, etc. Full review of organizational procedures and policies relating to testing, to include staff, stakeholder, and candidate agreements Staff designee Who investigates possible exam integrity issues, are they assessment staff, a vendor, or an outside agency (Inspector General, etc.)? Does that designee also conduct preventative exam integrity functions (Audits, web intelligence, stakeholder outreach, threat assessment)? What training/experience does the designee have in Exam Integrity Investigations Effective policies & agreements Candidate, staff, vendor and stakeholder agreements Employment/candidate policies that require cooperation with investigations MOAs with outside investigative agencies and/or contracts with vendors Agreements with subjects who provide assistance with investigations
  5. After detection, what steps are taken next? How can you decide what type of investigation is warranted? Preliminary Investigation Who, What, When, Where, How Why only when available/applicable (reading too much into motive before facts are obtained is a waste of time & resources) Are the allegations substantiated enough to invest investigative resources? If so, are the allegations severe enough to warrant investigation or referral? Preserving initial evidence? Anything that may be time-sensitive/subject to disposal: Statements, screen caps, surveillance footage, log files, exam books & answer sheets. Reporting the results of your Preliminary Investigation Making recommendations to leadership in a stepwise, detailed approach.
  6. What is the scope of investigation? Candidate(s)? Staff Members/Vendors? Organized Schemes? Public Corruption/Faculty or District Involvement, Knowledge, or Willful Blindness Is a performance audit more suitable than an investigation? When an allegation doesn’t warrant action against a subject, but a process/policy vulnerability is what contributed to its detection. Confidentiality If an investigation may be initiated, do not tip your hand! Simply hold scores/ratings for applicable parties until the outcome of the investigation. Do not discuss granular information outside the investigative team Applies to senior staff and boards Plan should designate a senior decision-maker who can supervise the investigation and be privy to case-sensitive information.
  7. Improvement recommendations and lessons learned should usually, but not always, be set forth in a confidential memorandum separate from the report of investigative findings. Questions to be addressed: Was a security vulnerability identified during the incident? If so, what can be done to change policies, procedures, or technologies to better deter or detect it? Are there other ramifications to the organization from the incident?