LEA Data Governance Plan
1. Governing Principles
Weber School District (referred to as the LEA throughout) takes its responsibility toward student data seriously. This governance plan incorporates the following Generally Accepted Information Principles (GAIP):
- Risk: There is risk associated with data and content. The risk must be formally recognized, either as a liability or through incurring costs to manage and reduce the inherent risk.
- Due Diligence: If a risk is known, it must be reported. If a risk is possible, it must be confirmed.
- Audit: The accuracy of data and content is subject to periodic audit by an independent body.
- Accountability: An organization must identify parties which are ultimately responsible for data and content assets.
- Liability: The risks in information means there is a financial liability inherent in all data or content that is based on regulatory and ethical misuse or mismanagement.
2. Data Maintenance and Protection Policy
The LEA recognizes that there is risk and liability in maintaining student data and other education-related data and will incorporate reasonable data industry best practices to mitigate this risk.
In accordance with R277-487, the LEA shall do the following:
- Designate an individual as an Information Security Officer
- Adopt the CIS Controls or comparable
- Report to the USBE by October 1 each year regarding the status of the adoption of the CIS controls or comparable and future plans for improvement.
3. Roles and Responsibilities Policy
The LEA acknowledges the need to identify parties who are ultimately responsible and accountable for data and content assets. These individuals and their responsibilities are as follows:
3.1 Data Manager roles and responsibilities
- authorize and manage the sharing, outside of the student data manager's education entity, of personally identifiable student data for the education entity as described in this section
- provide for necessary technical assistance, training, and support
- act as the primary local point of contact for the state student data officer
- ensure that the following notices are available to parents:
3.2 Information Security Officer
- Oversee adoption of the CIS controls
- Provide for necessary technical assistance, training, and support as it relates to IT security
4. Training and Support Policy
The LEA recognizes that training and supporting educators and staff regarding federal and state data privacy laws is a necessary control to ensure legal compliance.
- The data manager will ensure that educators who have access to student records will receive an annual training on confidentiality of student data to all employees with access to student data. The content of this training will be based on the Data Sharing Policy.
- By October 1 each year, the data manager will report to USBE the completion status of the annual confidentiality training and provide a copy of the training materials used.
- The data manager shall keep a list of all employees who are authorized to access student education records after having completed a training that meets the requirements of 53E-9-204.
- Training will be provided via MyStudent and will be a requirement to access student records from that program and any others that contain student information.
5. Audit Policy
In accordance with the risk management priorities of the LEA, the LEA will conduct an audit of:
- The effectiveness of the controls used to follow this data governance plan; and
- Third-party contractors, as permitted by the contract described in 53E-9-309(2).
6. Data Sharing Policy
There is a risk of redisclosure whenever student data are shared. The LEA shall follow appropriate controls to mitigate the risk of redisclosure and to ensure compliance with federal and state law.
- The data manager shall approve all data sharing or designate other individuals who have been trained on compliance requirements with FERPA.
- Utah DPA as listed on the website will be the main source of vendor approval. It lists those who are approved, denied, or in the process of being vetted.
- Teachers can only release student information after the approval process has been completed and the vendor is listed on the Utah DPA website.
- Teachers and Staff will submit the website/app to their Administrator
- If it is approved by their Administrator, then it will be submitted to the Student Data Security Manager (SDSM)
- The SDSM will also view all security protocols listed for the website, including login security.
- If the website is secure, then it will be turned over to the Curriculum Department.
- The Curriculum Department will go through all websites and determine if they are aligned with curriculum and if similar websites are already being used in the district
- Once the website/app is approved by the Curriculum Department, it will be routed back to the SDSM
- The SDSM will then send the company a personalized Contract for signature
- When the Contract is signed and returned to the SDSM, one of two things will happen:
- The website will be added to the approved list.
- The website will be turned over to development for login sync with district servers and then added to the approved list
- For external research, the data manager shall ensure that the study follows the requirements of FERPA’s study exception described in 34 CFR 99.31(a)(6).
- After sharing from student records, the data manager shall ensure that an entry is made in the LEA Metadata Dictionary to record that the exchange happened.
- After sharing from student records, the data manager shall make a note in the student record of the exchange in accordance with 34 CFR 99.32.
7. Expungement Request Policy
The LEA recognizes the risk associated with data following a student year after year that could be used to mistreat the student. The LEA shall review all requests for records expungement from parents and make a determination based on the following procedure.
The following records may not be expunged: grades, transcripts, a record of the student’s enrollment, assessment information.
The procedure for expungement shall match the record amendment procedure found in 34 CFR 99, Subpart C of FERPA.
- If a parent believes that a record is misleading, inaccurate, or in violation of the student’s privacy, they may request that the record be expunged.
- The LEA shall decide whether to expunge the data within a reasonable time after the request.
- If the LEA decides not to expunge the record, they will inform the parent of their decision as well as the right to an appeal hearing.
- The LEA shall hold the hearing within a reasonable time after receiving the request for a hearing.
- The LEA shall provide the parent notice of the date, time, and place in advance of the hearing.
- The hearing shall be conducted by any individual that does not have a direct interest in the outcome of the hearing.
- The LEA shall give the parent a full and fair opportunity to present relevant evidence. At the parents’ expense and choice, they may be represented by an individual of their choice, including an attorney.
- The LEA shall make its decision in writing within a reasonable time following the hearing.
- The decision must be based exclusively on evidence presented at the hearing and include a summary of the evidence and reasons for the decision.
- If the decision is to expunge the record, the LEA will seal it or make it otherwise unavailable to other staff and educators.
8. Data Breach Response Policy
The LEA shall follow industry best practices to protect information and data. In the event of a data breach or inadvertent disclosure of personally identifiable information, the LEA staff shall follow industry best practices for responding to the breach.
- The Data Manager will work with the information security officer to designate individuals to be members of the cyber incident response team (CIRT)
- At the beginning of an investigation, the information security officer will begin tracking the incident and log all information and evidence related to the investigation.
- The information security officer will call the CIRT into action once there is reasonable evidence that an incident or breach has occurred.
- The information security officer will coordinate with other IT staff to determine the root cause of the breach and close the breach.
- The CIRT will coordinate with legal counsel to determine if the incident is meets the legal definition of a significant breach as defined in R277-487 and determine which entities and individuals need to be notified.
- If law enforcement is notified and begins an investigation, the CIRT will consult with them before notifying parents or the public so as to not interfere with the law enforcement investigation.
9. Publication Policy
The LEA recognizes the importance of transparency and will post this policy on the LEA website.