Data Governance & Security

Data governance and data security are two interconnected, yet distinct programs that ensure the privacy and safekeeping of data that enters and leaves the ERDC P20W. Each program involves People Processes, Business Processes, and Technical Structures.

Data Governance

Data Governance for the P20W statewide longitudinal data system (SLDS) is documented through:

1. Business & Technical Processes: Our business processes related to data sharing are rooted in compliance with state and federal laws that ensure student privacy, as well as proper access, use, and storage of data. Technical solutions are embedded within our business processes for fulfilling data requests to maintain limited access and the safe exchange of data with contributors and requestors.

2. People Roles: Our governance ensures that staff meets professional standards for privacy and data use, that we involve our data contributors, and that we maintain relationships with informed data requestors.

Data Security

Data Security for the P20W statewide longitudinal data system (SLDS) is documented through:

1. Business & Technical Processes: Our business processes are designed to ensure the security of P20W data as it moves from ERDC partners, to the ERDC and on to data requestors, as well as data from requestors to the ERDC. This includes technical structures to protect the data and communications networking components, connections, and contents; protecting the physical items and objects from unauthorized access or misuse.

2. People Roles: Our security processes cover the roles of ERDC staff and contractors who access and/or work with either P20W data in a research or technical capacity.