Chapter Contents
Only Restricted-Use Data Are Licensed
When IES conducts surveys, the data collected sometimes include individually identifiable information, which is confidential and protected by law. 1
Restricted-use data is the term for survey data that contain individually identifiable information. Only restricted-use data are licensed. (Note: Public-use data are not licensed.)
The restricted-use data provided to the licensee and all information derived from those data, and all data resulting from merges, matches, or other uses of the data provided by IES with other data are subject to the License and are referred to in the License as "subject data."
Individually identifiable information includes, but is not limited to, personal data in the following categories:
The restricted-use databases that are available to organizations in the United States through these licensing procedures are listed at: NCES online catalogue.
Three similar License documents are used to lend restricted-use data: Memorandum of Understanding, License, and Contract. All three are referred to as Licenses and, when signed, are equally binding on the licensees.
The Memorandum of Understanding is used to provide data to federal agencies or offices, external to IES. A copy of the memorandum is in Appendix E.
The License is used to provide data to non-federal agencies or offices, including organizations working on analysis contracts with IES. Appendix F contains a copy of the License.
When IES has a contract involving the collection of restricted-use data, the contract "boiler plate" includes the provisions of the License.
In brief, each of the three License types:
Virtually every organization needs a License document to authorize individual access to restricted-use data.
The type of organization determines the specific license document.
Type of Organization | License Document |
---|---|
Federal Agencies* | Memorandum of Understanding |
IES Staff | Oath of office replaces Memorandum; staff must sign a form provided by the IES Data Security Office to obtain the data. |
Non-Federal Agencies/Groups/Organizations | License |
State and Local Agencies | License |
Research Laboratories | License |
Data Collection Contractor
(to IES) |
License "Boiler Plate" in Contract |
Subcontractor (to IES Contractor) | License "Boiler Plate" in Contract |
Survey Pre-Tests | License "Boiler Plate" in Contract |
Analysis Contractor | License |
* This includes other components of the Department of Education. |
IES staff are subject to all of the obligations and restrictions protecting restricted-use data. Further, IES staff are not authorized to issue restricted-use data files.
Staff perform pre-tests to review the data collection process and to test the validity of the survey instrument. Because respondent data are acquired to test the proposed survey design, the responses collected in this pre-test sampling may contain individually identifiable information and thus may be subject to restricted-use data security procedures.
The IES Contracting Office Representative (COR) who is responsible for conducting these pre-tests, must submit a written description of what is involved in the survey design review to the IES Data Security Office. The COR must also obtain an executed Affidavit of Nondisclosure from all persons outside IES who will review the survey design and will have access to these data. The COR will keep all original Affidavits of Nondisclosure in the project file and be able to produce them on request.
An organization or individual performing work under contract must complete the licensing process unless the collection of restricted-use data is required to fulfill the terms of the contract. The conditions spelled out in the License are incorporated in the "boiler plate" of contracts that collect any personally identifiable information on behalf of IES
A contractor who proposes to do independent research using the restricted-use data to perform work for IES must submit a formal, written request. If the purpose of the independent research is different from the purpose for using the data as stated in the contract, the contractor must follow the standard application process for obtaining a License (see Section 2.4).
To qualify for and receive restricted-use data, applicants must submit all four types of documents:
The Formal Request will ask for specific items of information. This information will be collected through the IES electronic license application system at: http://nces.ed.gov/StatProg/instruct.asp.
After the initial online Formal Request has undergone a preliminary review and received a provisional approval to proceed from the IES Data Security Office, applicants are to prepare, complete and return the signed License, notarized Affidavits, and the Security Plan Form.
Mail all documents, signed by the Principal Project Officer (PPO) and Senior Official (SO) to the IES Data Security Office.
The IES Data Security Office staff will review the submitted documents for content and completeness.
The License documents are only submitted to the IES front office for final approval when all required information has been received and the License application is complete.
The decision to grant a License is solely that of the Director or a designated Commissioner. The License approval becomes effective on the date of the Director's Commissioner’s signature.
The Formal Request will ask for specific items of information (see checklist below). Your information will be collected through the IES electronic license application system at: http://nces.ed.gov/StatProg/instruct.asp.
Formal Request Checklist | ✓ |
---|---|
(1) The name, title, and contact information of the Principal Project Officer | |
(2) The name, title, and contact information of the Senior Official | |
(3) The name, title, and contact information of the System Security Officer | |
(4) The title of the database(s) requested for access | |
(5) A description of the statistical research project and how the restricted-use database will be used and justification for access | |
(6) The names and titles of other persons who will use and access the data | |
(7) The estimated loan period (not to exceed five years) |
The Formal Request requirements are described in more detail below:
(1) The name, title, and contact information of the Principal Project Officer who will oversee the daily operations. To qualify for and receive a restricted-use data License and the restricted-use data, academic applicants must have the rank of post-doctoral fellow or above to serve as the Principal Project Officer (PPO). Visiting professors or scholars cannot serve as a PPO. Applicants in research laboratories or analytic consulting firms must have the rank of research associate or above to serve in this role. (The PPO is the researcher in charge of the day-to-day operations involving the use of subject data and is responsible for liaising with the IES Data Security Office.)
(2) The name, title, and contact information of the Senior Official having the signatory authority to legally bind the organization to the provisions of the License contract.
(3) The name, title, and contact information of the Systems Security Officer who will oversee the security of the data. The PPO can also serve as the SSO.(4) The title of the database(s) the organization wants to access.
(5) A description of the statistical research project. The description must fulfill the following conditions for each dataset requested:
Note: The purpose of the research for which the data are requested must accord with the purpose for which the survey data were collected. Descriptions of those purposes are in Appendix H.
If an applicant requests access to subject data that are currently under an IES Contract/Task Order with the applicant, the applicant must provide:
(6) The names and titles of other persons who will be accessing the database. Generally, the staff is limited to a maximum of seven (7) persons. Exceptions to this limit may be authorized by the IES Data Security Office. Written documentation authorizing the exception must be obtained from IES. Please note that requests for additional data or amendments to an existing License will only be accepted from the PPO.
(7) The estimated loan period necessary for accessing the database. Loan periods are in one-year increments and may not exceed a five-year period. The loan period starts on the date that IES signs the License document.
The
License Document Checklist | ✓ |
---|---|
Review the appropriate License document | |
Insert the name of the Agency or organization to be licensed in the appropriate blank(s) | |
The Senior Official (or appropriate government official for an MOU) signs the License | |
The Principal Project Officer signs the License | |
Indicate loan period (not to exceed five years) | |
Send the original signed License to the IES Data Security Office |
An Affidavit of Nondisclosure must be executed for each person who will have access to the data
Affidavit of Nondisclosure Checklist | ✓ |
---|---|
Obtain a notarized Affidavit of Nondisclosure from each person who may come in contact with the subject data, as well as anyone other than security/ or police or personnel who have key access to the secure project office. (For more information on this requirement, see Chapter 3.) | |
Fill in all requested information on the Affidavit | |
Send the original signed and notarized Affidavits of Nondisclosure to the IES Data Security Office |
Appendix G contains a copy of the Affidavit of Nondisclosure form.
In general, an individual who is not an IES employee and who wants access to licensed individually identifiable information must execute an Affidavit of Nondisclosure and submit it, through a licensed organization, to the IES Data Security Office. IES allows up to six (6) individuals per License to have access to the subject data.
The one-page Affidavit contains:
Affidavits are "data-specific": they are only valid for the data listed on the form. I anticipate requesting future rounds of data collection for database include all data names and all subsequent followups that will be needed; for example, "the base year data and all subsequent followups."
Notarized documents cannot be amended by IES. To access any data data that were not listed on the notarized affidavit-including subsequent followup of a listed database, another affidavit must be executed. Each affidavit must be accompanied by a IES license user training certificate. (See Section 3.6, License User Training.)
Organizations must promptly notify IES of any changes in project staff. (See Section 2.6, Amending a License.)
The Security Plan Form contains the detailed procedures for protecting the subject data.
Security Plan Form Checklist | ✓ |
---|---|
Review Chapter 3, Security Procedures | |
Fill out the Security Plan Form found in Appendix J | |
Send the original, signed Security Plan Form to the IES Data Security Office |
Restricted-use data must be kept secure at all times, meaning that the individually identifiable information is secure from unauthorized disclosure or modification. Security procedures are explained in detail in Chapter 3; the Security Plan Form can be found in Appendix J.
Note: In lieu of the Security Plan Form, federal agencies must submit documentation verifying that the agency has an approved Certification and Accreditation (C&A) for its IT systems. Federal agencies must adhere to the security requirements set forth in the MOU.
Once the License is approved by IES, the IES Data Security Office sends the licensee the data and other items.
Final Product Package Contents | ✓ |
---|---|
The new licensee receives the License package that includes: | |
|
|
|
|
|
The package is sent Restricted Delivery - Certified Mail to the licensee. All restricted-use data on CD-ROM are encrypted and require a passphrase to open. The PPO must email the IES Data Security Office with a the names of the encrypted files received in order to obtain the needed passphrases.
Note: Only one copy of a database in any format can be borrowed at a time. A licensee who has a copy of the database and wants a revised version must return the original via certified mail before the revised version will be sent. (See Section 2.6, Amending a License.)
Under no circumstances may the original or a duplicate of the database be removed or electronically communicated from the licensee's secure project office.
The licensee is responsible for all terms and conditions in the License document, the Security Plan Form and related materials. (See the appropriate license document in Appendix E or F for full requirements.)
This section addresses three major administrative requirements:
The Principal Project Officer (PPO) is accountable for having all pertinent information listed below in a License file.
License File Checklist | ✓ |
---|---|
The PPO shall maintain a License file in the secure project office where the licensee stores the restricted-use data. This file must contain the following items: | |
|
|
|
|
|
|
|
Note: All project staff shall both READ and UNDERSTAND this material. All individuals who have access to the subject data must be fully aware of the required security requirements and procedures. (The Principal Project Officer is directly responsible for ensuring that all project staff understand and implement all of the required security procedures.)
If the licensee intends to publish or distribute any information product that uses the subject data where unauthorized persons will have access, then the licensee must submit an advance copy of the product to the IES Data Security Office via email to IES_DRR@ed.gov with the Disclosure Risk Review Template as an attachment prior to its publication or access by non-licensed individuals. The subject of the email and the Disclosure Risk Review Template shall be named DRR_LicenseNumber_Institution_AuthorName_YYMMDD.doc (e.g., DRR_123546_HortonU_Seuss_220204.doc). Upon final approval, the document will cleared by the IES Data Security Office, then licensee may distribute the document as desired.
Research Publication Checklist | ✓ |
---|---|
The PPO shall forward a copy of each publication containing information based on restricted-use data to the IES Data Security Office for a disclosure review. For all datasets produced by IES or NCES, licensees are required to round all unweighted sample size numbers to the nearest ten (nearest 50 for ECLS-B) in all information products (i.e.: proposals, presentations, papers or other documents that are based on or use restricted-use data). For all other datasets, including administrative datasets produced by other agencies within the Department of Education (e.g. EDFacts, CRDC, etc.), disclosure avoidance standards will vary. The required disclosure avoidance measures for these non-IES datasets will be listed in a readme.txt file included with that specific dataset. Licensees are required to provide a draft copy of each information product that is based on or uses restricted-use data to the IES Data Security Office for a disclosure review. The licensee must not release the information product to any person not authorized to access the data until formally notified by IES that no potential disclosures were found. This review process usually takes 5 to 10 business days. |
The License (Section IV.G) gives IES the right to conduct unannounced, unscheduled inspections of the licensee's secure project office to assess compliance with the provisions of the License, security procedures (see Chapter 3), and the licensee's submitted Security Plan Form. (The inspection procedures are described in Chapter 4, and a copy of the On-Site Inspection Guideline can be found in Appendix K.)
Any violation found during the inspection may subject the licensee to immediate revocation of the License by IES, or report of the violation to the U.S. Attorney.
On-site Inspection Checklist | ✓ |
---|---|
When an on-site inspection is conducted, IES will provide formal notification of any violations of the required security procedures. If violations are reported, the licensee must take the following steps: | |
|
|
|
The licensee shall notify IES immediately when he/she receives any legal, investigatory or other demand for IES subject data, including any request or requirement to provide subject data to a state agency or state contractor. The licensee is not authorized to give IES subject data to the requester.
IES must be kept informed of any modifications in project operations throughout the span of the loan period. The most common changes to a License can be done online through the licensee's online License information page. All amendment requests must be initiated by the Principal Project Officer (or the Senior Official in the PPO's absence). A weblink to the licensee's online License information page may be obtained from the IES Data Security Office at the request of the PPO, or can be obtained through the system login page, at: https://nces.ed.gov/statprog/licenseapp/RequestEmail.asp
Seven types of amendments can be submitted via the online License system:Note: Paper requests for these six amendments will not be accepted. These amendments, and the associated documentation required for each, are described in more detail below.
To submit the desired amendment, the PPO must click on the corresponding button on the licensee’s online License information page, and complete the information on the presented web pages. Once the amendment is submitted, the PPO will receive an automatically-generated email stating that the request has been received by the IES Data Security Office. Another email will be generated when the amendment has been approved by IES. The licensee is responsible for keeping copies of these emails in the License file as discussed in Section 2.5.
Note: The online License system will only process one amendment request at a time. If another amendment has already been requested, no other amendments to the License are possible until the pending amendment has been approved or canceled.
An "Add User" amendment is requested in order to add additional project staff to the License (multiple new users may be added in the same amendment request). After the "Add User" amendment has been submitted, the licensee must then send an original signed and notarized Affidavit of Nondisclosure and an IES license data user training certificate for each new user(s) to IES.
Once the affidavits and training certificates have been received, the amendment will be approved through the online system and the users will then be approved to access the restricted-use data. Until the "Add User" amendment has been approved, the new user(s) must not be allowed access to the subject data.
Add User Amendment Checklist | ✓ |
---|---|
Notify IES of any additions to project staff via an "Add User" amendment request through the online License system. | |
Send the notarized Affidavit(s) of Nondisclosure and training certificates for the additional users to IES. | |
Retain copies of the emails from IES confirming the initial submission and final approval of the "Add User" amendment in the License file. |
A "Delete User" amendment is requested in order to remove listed users from the License. This amendment requires no corresponding paperwork. The IES Data Security Office usually approves these amendments in one business day. After removal from the License, the departing individual(s) must not be permitted access to the restricted-use data.
Delete User Amendment Checklist | ✓ |
---|---|
Notify IES of any reductions in project staff via a "Delete User" amendment request through the online License system. | |
Mark Affidavits of removed users as "Void" in the License file. | |
Retain copies of the emails from IES confirming the initial submission and final approval of the "Delete User" amendment in the License file. |
A licensee may request access to another database in addition to what was agreed to in the original License, by means of an "Add Database" amendment through the online License system. This amendment must also be requested in order to obtain different waves of the database(s) requested under the original License.
Any new database requested must be covered by the Affidavits of Nondisclosure on file for each listed License user. If the requested database is covered, no paperwork is needed to complete the amendment process. If the Affidavit(s) does not cover the requested data, the licensee must send IES new original signed and notarized Affidavits for all listed users who will have access to the new database.
Each request for a different database (i.e., other than a followup to a previously loaned database) must be accompanied by a description of the statistical research project and how the restricted-use database will be used and justification for access. (See detailed Formal Request Requirements in Section 2.4).
Upon receipt of Affidavits that cover the requested data, the IES Data Security Office will approve the amendment. The new database will be sent Restricted Delivery—Certified Mail to the listed address of the PPO.
Add Database Amendment Checklist | ✓ |
---|---|
Initiate the request for the additional database(s) via an "Add Database" amendment request through the online License system | |
Complete all required fields for the amendment online. | |
Send in newly signed and notarized Affidavits for all license users if current Affidavits do not cover the requested database(s). Copies of all new affidavits should be retained in the License file. | |
Retain copies of the emails from IES confirming the initial submission and final approval of the "Add Database" amendment in the License file. |
If the focus of your research changes from the project approved in your initial license request, an amendment must be filed describing the new research project. This amendment must include: the following:
As part of the License agreement, IES requires each licensee to designate a specific secure project office in which the restricted-use data will be used and stored. If the location of the secure project office is going to be changed, or an additional project office added to the License, the PPO must submit a "Modify Security Plan" amendment through the online License system before the relocation. The PPO must detail the new location and any changes to the established security procedures in the amendment request. The PPO must also send a completed and signed Security Plan Form with the new information to the IES Data Security Office for review before this amendment can be approved. The restricted-use data cannot be moved to the new location until the revised Security Plan Form has been approved by IES.
Note: If the secure project office must change locations temporarily (e.g. for remodeling or maintenance), and will return to the approved site within a short period of time, no "Modify Security Plan" is required. In this case, the PPO should email the IES Data Security Office with the following information: the temporary location of the secure project office, the expected duration of the relocation, and confirmation that all required security procedures will be followed at the new location. Information regarding the required security procedures may be found in Chapter 3.
Modify Security Plan Amendment Checklist | ✓ |
---|---|
Inform the IES Data Security Office of a location change for the secure project office via a "Modify Security Plan" amendment through the online License system. This amendment must be submitted and approved before the location of the restricted-use data is changed. | |
Complete all required fields for the amendment online, detailing the new address and other pertinent information. | |
Send in a completed and signed Security Plan Form detailing the new information. | |
Retain copies of the emails from IES confirming the initial submission and final approval of the "Modify Security Plan" amendment in the License file. |
When the loan period of the original License agreement is completed, licensees have the option of extending the loan period for up to five years, using an "Extend License" amendment request through the online License system. The licensee must meet all current licensing requirements in order to qualify for the extension. New license data user training certificates must be submitted for each authorized user on the license. Any obsolete paperwork must be updated, and all current security standards required by IES at the time of the extension must be adopted by the licensee before the License extension is approved.
Upon receipt of the amendment request, the IES Data Security Office will review the License file to determine if any information or paperwork needs to be updated. An email will then be sent to the licensee detailing any further steps that must be taken (if any) to complete the extension request. If updated paperwork is required, the extension request will not be approved until the new paperwork is received and approved by the IES Data Security Office.
The "Extend License" amendment request may be submitted up to one year before the expiration of the loan period, and at any point thereafter. Note: Once the loan period for the License has ended, a licensee will only be able to extend or close-out their License; no other amendments will be accepted for an expired License.
Extend License Amendment Checklist | ✓ |
---|---|
Submit the "Extend License" amendment through the online License system within one year of the expiration of the License loan period. | |
Complete and sign any updated paperwork requested by the IES Data Security Office and send the paperwork to the IES Data Security Office | |
Retain copies of the emails from IES confirming the initial submission and final approval of the "Extend License" amendment in the License file, along with copies of all updated paperwork. |
When the loan period is complete and no extension is desired, or the licensee does not need the restricted-use data any longer, a "Close-out License" amendment must be submitted through the online License system. After the request has been submitted online, the licensee must return all restricted-use data and associated materials to IES, along with a completed and signed close-out certification form. A copy of the close-out certification form may be found in Appendix M.
On the close-out certification form, the PPO must list all databases being returned, and confirm that all restricted-use data have been wiped from the computer, that all backup copies and any restricted-use data printouts have been destroyed, and that any remaining documents or publications using the restricted-use data will be sent to the IES Data Security Office for disclosure review prior to distribution to non-licensed individuals (the disclosure review process is described in Section 2.5). The form must also be signed by a second witness, confirming the restricted-use data have been deleted or destroyed.
This completed and signed form must be sent to IES along with all restricted-use data materials obtained under the License, and a tracking number must be used on the shipment. Unless the restricted-use data materials and the completed close-out form are both returned to the IES Data Security Office, the License cannot be closed.
.Once all restricted-use data and the close-out certification form have been received, the "Close-out License" amendment request will be approved by IES and the licensee will receive an email confirmation that the License has been closed. Note: The IES Data Security Office reserves the right to conduct a close-out inspection of the project site after the License has been closed in order to ensure that all required close-out procedures have been followed.
Close-out License Amendment Checklist | ✓ |
---|---|
Request a “Close-out License” amendment online through the online License system if the licensee no longer needs the restricted-use data or if the loan period has expired. | |
Destroy all hard copy versions of subject data and backup copies. Overwrite the subject data on computer used in analysis (all data must be totally obliterated so that the data cannot be recovered by any means). | |
Return the original subject data and a completed close-out certification form to the IES Data Security Office using a tracking number on the shipment. | |
Submit any remaining documents or publications to the IES Data Security Office for disclosure review prior to disseminating them to non-licensed individuals. |
Changes to the License that are not covered by the six online amendments should only be initiated by the PPO through an email to the IES Data Security Office. Such changes might include changing the PPO, SO or SSO, canceling a pending online amendment, or requesting new copies of databases already obtained under the License if original copies are found to be defective.
All amendment requests and changes to the License must originate from the PPO.
The following checklist summarizes the Licensing Procedures for Restricted-Use Data.
ACTIVITY | ✓ |
---|---|
REVIEW REQUIRED PROCEDURES | |
Obtain a copy of the Restricted-Use Data Procedures Manual. | |
|
|
APPLYING FOR A LICENSE | |
Submit the following to the IES Data Security Office through the electronic license application system at: http://nces.ed.gov/StatProg/instruct.asp - | |
Formal Request: |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Paperwork |
|
Send the following three items to the IES Data Security Program. | |
|
|
|
|
|
|
|
|
|
|
REQUIRED LICENSEE ACTIVITY | |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
AMENDING A LICENSE | |
Licensee must notify IES if there will be any changes to the conditions of the License. The following six amendments must be initiated through the online License system: | |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Any other changes to the License must be requested via email by the PPO. |
![]() |
![]() |