Located in:
- III. Operational Planning Elements
The Unified or Combined State Plan must include an Operational Planning Elements section that supports the State’s strategy and the system-wide vision described in Section II(c) above. Unless otherwise noted, all Operational Planning Elements apply to Combined State Plan partner programs included in the plan as well as to core programs. This section must include—
- b. State Operating Systems and Policies
The Unified or Combined State Plan must include a description of the State operating systems and policies that will support the implementation of the State strategy described in section II Strategic Elements. This includes—
- b. State Operating Systems and Policies
III. b. 6. D. Privacy Safeguards
Describe the privacy safeguards incorporated in the State’s workforce development system, including safeguards required by section 444 of the General Education Provisions Act (20 U.S.C. 1232g) and other applicable Federal laws.
Current Narrative:
Indiana recognizes that a key element to utilizing data across agencies for either improved customer service or improved measurement and tracking of outcomes is ensuring the integrity of all data. This is accomplished with various technical safeguards and ensuring personnel handling this data are properly trained in all relevant regulations and the fundamentals of handling personal and confidential data. Technical safeguards include:
Approved processes that limit access to the data to only those personnel who require access to carry out their daily job functions;
Network security, monitoring, firewalls, etc. to prevent unauthorized access to data from entities outside of State government;
Encryption technology; and
Secure data transport mechanisms.
All State personnel undergo annual training on the proper handling of confidential data. This training is updated to reflect the most current statutes and interpretations of confidentiality statutes and regulations. Those specifically involved in reporting are trained regarding the various de-identification and aggregation rules that apply. All individuals with access to protected information must also follow agency guidance on appropriate sharing and storage of data.