Skip Navigation
small header image
Statistical Standards Program

Table of Contents

Restricted-use Data Applicants:
As of July 1, 2007, IES/NCES will only accept restricted-use data License applications through its new Electronic Application System. Any License application that does not come through this new system will be returned to the applicant. More information about applying for a License is available in the instructions and in the Restricted-Use Data Procedures Manual.

PUBLICATION INFORMATION

 

CONTACTS

 

INTRODUCTION

Restricted-Use Data
Public-Use Data
Overview
   Laws
   Licensing Procedures
   Security Procedures
   On-Site Inspections
 


LAWS

1.1 Basic Statutes
1.2 Privacy Act of 1974
   Privacy Standards
   Computer Security Guideline
1.3 Computer Security Act of 1987
1.4 Education Sciences Reform Act of 2002
   Confidentiality Standards
   Violations
1.5 USA Patriot Act of 2001
1.6 E-Government Act of 2002
 


LICENSING PROCEDURES

2.1 What Data Are Licensed
   Only Restricted-Use Data Are Licensed
   Available Restricted-Use Databases
2.2 What is a License?
   Memorandum of Understanding
   License
   Contracts
   Content of License Documents
2.3 Who Needs a License Document
   Matching Organizations to License Documents
   Restricted-Use Data and IES Staff
   Pre-test Monitoring
   Contractors
2.4 Applying for a License
   Summary of Procedures
   Formal Request
   License Document
   Affidavits of Nondisclosure
   Security Plan Form
   Receiving the Requested Materials
2.5 Required Licensee Activity
   Maintaining the License File
   Submitting Research Publications
   Passing On-Site Inspections
   Outside Requests for Data
2.6 Amending a License
   Addition to Project Staff
   Reduction of Project Staff
   Requesting an Additional Database
2.7 Closing-Out the License Period
2.8 Applicant/Licensee Record
 


SECURITY PROCEDURES

3.1 Introduction
   Basic Statutes
   IES Statutes
   Other Statutes
3.2 Risk Management
3.3 General Security Requirements
   Assign Security Responsibilities
   Complete Security Plan
   Restrict Access to Data
   Use Data at Licensed Site Only
   Respond to Outside Request for Subject Data
   Return Original Data to IES
3.4 Physical Handling, Storage, and Transportation
   Protect Machine-Readable Media and Printed
   Material
   Avoid Disclosure from Printed Material
   Restrict Copying of Data
   Limit Transporting of Data
3.5 Computer Security Requirements
   Standalone Computer
 


ON-SITE INSPECTIONS

4.1 On-Site Inspection Procedures
   License Procedures
   Security Procedures and Security Plan Form
4.2 On-Site Inspection Guideline
4.3    Violations, Penalties, and Prosecution
   Violations
   List of Most Common Violations
   Prosecution and Penalties


APPENDICES

Appendix A   Definition of Terms
Appendix B Public-Use Data (recent information is available on the NCES Online Catalog)
Appendix C Privacy Act of 1974
Appendix D Agency-Specific Laws
Appendix E Memorandum of Understanding
Appendix F License
Appendix G Affidavit of Nondisclosure
Appendix H Restricted-Use Databases (recent information is available on the NCES Online Catalog)
Appendix I Availability of Restricted-Use Data (recent information is available on the NCES Online Catalog)
Appendix J Restricted-use Data Security Plan Form
Appendix K On-Site Inspection Guideline
Appendix L E-Government Act of 2002