U.S. flag

An official website of the United States government

Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.


Secure .gov websites use HTTPS
A lock () or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Indiana PYs 2020-2023 Published Approved

Located in:
  • III. Operational Planning Elements

    The Unified or Combined State Plan must include an Operational Planning Elements section that supports the State’s strategy and the system-wide vision described in Section II(c) above.  Unless otherwise noted, all Operational Planning Elements apply to Combined State Plan partner programs included in the plan as well as to core programs.  This section must include—

    • b. State Operating Systems and Policies

      The Unified or Combined State Plan must include a description of the State operating systems and policies that will support the implementation of the State strategy described in section II Strategic Elements.  This includes—

III. b. 6. D. Privacy Safeguards

Describe the privacy safeguards incorporated in the State’s workforce development system, including safeguards required by section 444 of the General Education Provisions Act (20 U.S.C. 1232g) and other applicable Federal laws.

Current Narrative:

Indiana recognizes that a key element to utilizing data across agencies for either improved customer service or improved measurement and tracking of outcomes is ensuring the integrity of all data. This is accomplished with various technical safeguards and ensuring personnel handling this data are properly trained in all relevant regulations and the fundamentals of handling personal and confidential data. Technical safeguards include:

  • Approved processes that limit access to the data to only those personnel who require access to carry out their daily job functions;
  • Network security, monitoring, firewalls, etc. to prevent unauthorized access to data from entities outside of State government;
  • Encryption technology; and
  • Secure data transport mechanisms.

All State personnel undergo annual training on the proper handling of confidential data. This training is updated to reflect the most current statutes and interpretations. Those specifically involved in reporting are trained on the various de-identification and aggregation rules that apply.