March Edition
calendar-icon_whitecircle
Onsite Test Administration Monitoring
Monitoring of test administrations can provide valuable information on the fidelity with which the test administration and security procedures are being applied.
Test administration monitoring is a critical element of test security. On-site monitoring of test administrations can provide valuable information on the fidelity with which the test administration and security procedures are being applied. Monitoring procedures should include a plan for on-site monitoring of both paper/pencil and computer-based administrations, as well as the use of forms for documenting and certifying that applicable test administration and security procedures were followed by all school personnel. Technology that enhances the state’s capability to monitor security procedures for assessment administrations should also be included. A secure digital platform, configured to reflect the state’s assessment policies, should be utilized to input, store, manage, analyze and report on data related to test security incidents. Levels of access to incident data should be provided based on staff requirements to protect confidential information. Data analytics and reporting should enable the state to easily comply with peer review guidance requiring states to be able to summarize incident data over time, including incident types and resolutions.

States should clearly describe the scope and manner of monitoring state assessment administrations, as well as the systems used to capture and report monitoring data and observations. Examples of procurement language include:
  • Standardized monitoring protocols and checklists should be developed in accordance with state testing regulations, policies and administration manuals, to ensure careful, complete, and fair monitoring of state assessment administrations across all schools.
  • Two qualified monitors should visit each school selected by the state for monitoring. It is estimated that the duration of each school observation should range between 4 and 6 hours on site.
  • Monitoring protocols should include the authentication of monitor credentials by school staff.
You might also like...
More Reads
Detecting Anomalies
Learn about using data forensics analyses to detect instances of test fraud in K-12 test administrations.
caveon
Home
Featured Articles
→ The Language of Test Security
→ It's a Risky Business
→ Jim Wollack Speaks
→ 5 Steps to K-12 Test Security Success
Short Reads
→ Interview: John Fremer
→ Industry insider: 30 Questions for Walt Drane
Contact
caveontoc_icon_BLUE_desktop
Submit
Join our mailing list
Copyright© 2018 Caveon, LLC.
All rights reserved. Privacy Policy | Terms of Use
Contact
Interested in learning more about how to secure your testing program? Contact us.
Vendors should provide comprehensive monitoring protocols that include requirements for staff assignments and training, scheduling, materials storage, document management and distribution, testing accommodations, testing rosters, and other test administration documentation.Monitors should identify and document any incomplete or missing documentation, proctoring issues, and perceived violations of any policies and procedures. 

The monitoring protocols should include a reliable system for immediately notifying the state of any testing irregularities observed during monitoring, in accordance with criteria established by the state. Vendors should utilize a secure, Internet-based digital platform that allows monitors to enter monitoring data and observations in real time while on-site at schools via electronic tablet devices, in order to provide real-time monitoring data to the state, and promptly notify the state of any irregularities. 

Monitors must be required to meet certain professional qualifications that will be established in consultation with the state and should receive training specific to the monitoring engagement. Monitor training should, at a minimum, include the goals of monitoring, relevant state laws and policies, examples or case studies, components of successful monitoring, and instructions for recording and reporting data. The secure monitoring platform should store all monitoring data collected by monitors, provide analytics on every monitoring data point and allow for configurable reports to be generated based upon the data at the school, district or state level.
Webinar
caveontoc_icon_BLUE_desktop
Home
home_icon
Featured Articles
star
→ The Language of Test Security
→ What Are My Threats
→ A Tale of Two Cities
→ Web and Social Media Monitoring
Feature Articles
bookicon2
→ Detecting Anomalies
→ Onsite Test Administration Monitoring
→ Investigating Testing Irregularities
→ Resources
→ About Caveon
Contact
envelope_white
cross_closecaveon