3.702 Maintaining Test and Data Security

    • Test Security
      • All standardized tests, teacher-created exams, and other assessments must be handled in a secure manner before, during, and after administration.
      • Test materials may only be accessed by authorized personnel. Storage must be locked and monitored when not in use.
      • Staff may not copy, photograph, share, or disclose test questions or answer keys except as specifically permitted by test publishers or administration.
      • Students are prohibited from accessing test content in advance or using unauthorized resources during assessments.
      • Any suspected breach (e.g., lost test booklets, compromised online passwords, or observed cheating) must be reported immediately to school administration.
    • Data Security
      • Student records, test results, and personally identifiable information must be protected in compliance with FERPA (Family Educational Rights and Privacy Act) and applicable state laws.
      • Access to digital data systems is restricted to individuals with legitimate educational need, using unique, password-protected accounts.
      • Paper records containing sensitive data must be stored in locked files with controlled access.
      • Staff must not disclose student information to unauthorized parties, including other students or parents, without proper consent.
    • Technology Protections
      • Computers and devices used for administering online assessments or managing student data must be secured and password protection.
      • Test sessions delivered online must use secure browsers or platforms as directed by the assessment provider.
      • Staff and students must not attempt to bypass, disable, or alter security features of testing software or student information systems.
    • Training and Awareness
      • All faculty and staff will receive regular training on assessment protocols, data privacy, and security best practices.
      • Students will be educated about academic honesty, appropriate use of technology, and the consequences of security violations.