Transcript Slide 1

How Do You Know Who Your Students Really Are?
Facing Authentication Regulations
Pat James Hanz
July 6, 2009
For audio call Toll Free 1-888-886-3951
and use PIN/code
731522
Housekeeping
• Maximize your CCC Confer window.
• Mute your phone (*6) if you have visitors or noise in your office.
• Please note phone audio may be in presenter-only mode.
• Ask questions over the phone when the presenter prompts.
• Ask questions throughout presentation via the chat window.
• Turn on or off Closed Captioning by clicking on the
icon.
• Save the presentation or chat by clicking on the
icon.
• Vote Yes or No by using the
icon.
How to use VoIP
1) To listen, adjust your speaker volume (left bottom of window)
2) To speak you’ll need a microphone or USB headset.
a) First, run the audio wizard Tools/Audio/Audio Setup Wizard.
b) Second, press on the mic icon when it is free (release when finished
speaking)
To Send Chat Messages
Type your message and click Send
or Enter on your keyboard.
To Turn On Closed Captioning
Click to open the Closed-Captioning text window
Emoticons!
Let everyone know how you feel
about the presentation.
Click on one of the emoticons.
Authentication:
Do you know who your
students really are?
A conversation about ideas.
The Issue: Higher Education
Opportunities Act 2008
Section 495 of the HEOA 2008:
‘‘(ii) the agency or association requires an
institution that offers distance education or
correspondence education to have processes
through which the institution establishes
that the student who registers in a distance
education or correspondence education course or
program is the same student who participates in
and completes and receives credit for the course.”
What did we do?
Clarification, please.
The Conferees [legislators] expect institutions that offer
distance education to have security mechanisms in
place, such as identification numbers or other pass code
information required to be used each time the student
participates in class time or coursework on-line. As new
identification technologies are developed and become
more sophisticated, less expensive and more
mainstream, the Conferees anticipate that accrediting
agencies or associations and institutions will consider
their use in the future.
JOINT EXPLANATORY STATEMENT OF THE COMMITTEE OF CONFERENCE:
http://help.senate.gov/Hearings/2008_07_29_E/Statement_of_Managers.pdf
Final Language says we have
options.
Higher Education Act
602.17 Application of standards in reaching an accreditation decision.
1) Requires institutions to verify the identity of a student who
participates in class or coursework by using, at the option
of the institution, methods such as –
(i) A secure login and pass code;
(ii) proctored examinations; and
(iii) New or other technologies and practices that are effective in
verifying student identification;
(2) Makes clear in writing that institutions must use processes
that protect student privacy and notify students of projected
additional student charges associated with verification of
student identity, if any , at the time of registration or
enrollment.
What???
Translation:
We don’t have to employ invasive measures and the
accreditation agencies have to ensure that colleges have
processes established that ensure that the student we
registered is the student taking the course.
•We have do develop processes!
•We have to adopt the processes!
•They have to be written down someplace! (Evidence)
•Everyone has to follow them!
What will be asked in Accreditation?
•Has authentication of student identity been a common institutional practice
to date?
•In Policy: Is it treated separately or as part of academic honesty/integrity
policies.
•In Practice: Is authentication left to the individual instructor’s discretion and
responsibility, or is done or enforced by institutionally mandated practices?
•Have Evidence
Stolen shamelessly from Barbara Beno’s presentation….
What do I think we shouldn’t be
discussing?
Secure Exam Remote Proctor!
Acxiom
What should we be discussing?
• Strategies that promote Academic Integrity
Online
• Cheating in all classes
• Good teaching
– Resource:
WCET Resources including Best Practice Strategies
and Examples of Institutional Practices and Policies:
http://www.wcet.info/2.0/index.php?q=node/1212
What do you think?
(resources to follow)
WCET to the rescue!
Western Cooperative for Educational
Telecommunications
• Webinars and Presentations
•
http://www.immagic.com/eLibrary/ARCHIVES/GENERAL/WCET_US/W090320E.pdf
• Discussions: DE Coordinators, ETAC, ASCCC
• Resources:
– WCET Resources including Best Practice Strategies and Examples of Institutional
Practices and Policies: http://www.wcet.info/2.0/index.php?q=node/1212
– American Council on Education: Nice Analysis: http://www.acenet.edu/enewsletters/p2p/ACE_HEA_analysis_818.pdf
– Rule Making:
http://www.ed.gov/policy/highered/reg/hearulemaking/2009/accreditation.html
– Presentation by Barbara Beno
http://wiche.edu/attachment_library/conference_presentations/whats_around_the_corner_b
eno.pdf
– Presentation by Laurie McNabb
http://wiche.edu/attachment_library/conference_presentations/whats_around_the_corner_
mcnabb.pdf
Q&A
Patricia James
Dean of Library and Technology
(Distance Education, too!)
And
Co-Director of @ONE
[email protected]
951 639 5440
Evaluation Survey Link
http://tinyurl.com/ONEeval-09Su-Authenication
Thanks for Attending
For upcoming desktop seminars and links to recently archived
seminars, check the @ONE Web site at:
http://www.cccone.org/seminars/index.php