This is the accessible text file for GAO report number GAO-13-495R 
entitled 'K-12 Education: States' Test Security Policies and 
Procedures Varied' which was released on May 16, 2013. 

This text file was formatted by the U.S. Government Accountability 
Office (GAO) to be accessible to users with visual impairments, as 
part of a longer term project to improve GAO products' accessibility. 
Every attempt has been made to maintain the structural and data 
integrity of the original printed product. Accessibility features, 
such as text descriptions of tables, consecutively numbered footnotes 
placed at the end of the file, and the text of agency comment letters, 
are provided but may not exactly duplicate the presentation or format 
of the printed version. The portable document format (PDF) file is an 
exact electronic replica of the printed version. We welcome your 
feedback. Please E-mail your comments regarding the contents or 
accessibility features of this document to Webmaster@gao.gov. 

This is a work of the U.S. government and is not subject to copyright 
protection in the United States. It may be reproduced and distributed 
in its entirety without further permission from GAO. Because this work 
may contain copyrighted images or other material, permission from the 
copyright holder may be necessary if you wish to reproduce this 
material separately. 

GAO-13-495R: 

United States Government Accountability Office: 
GAO: 
441 G St. N.W. 
Washington, DC 20548: 

May 16, 2013: 

The Honorable Arne Duncan Secretary:
U.S. Department of Education: 

K-12 Education: States' Test Security Policies and Procedures Varied: 

Dear Mr. Secretary: 

Student results on statewide assessment tests required under the 
Elementary and Secondary Education Act of 1965 (ESEA), as amended, are 
used to measure students' proficiency in core subjects, hold schools 
accountable for student achievement, and make key decisions, such as 
determining which low-performing schools should receive targeted 
interventions in order to improve student achievement. Therefore, it 
is critical that these results be valid and reliable. 

However, in recent years, instances of cheating by educators on state 
assessments have surfaced, undermining the integrity of the test 
results. For example, 82 educators in 30 Atlanta schools confessed to 
improperly raising scores on state tests administered in the 2008-09 
school year. According to a district attorney press release, there 
were 35 indictments resulting from this investigation. Effective and 
rigorous assessment security policies, when properly implemented, can 
help prevent and detect cheating and other testing irregularities, but 
GAO's prior work on the implementation of assessments showed that one 
of four states judgmentally selected for review relied on inadequate 
security procedures that could negatively affect the validity and 
reliability of their assessment systems.[Footnote 1] 

In 2010, the Council of Chief State School Officers (CCSSO) and the 
Association of Test Publishers (ATP) published a set of voluntary best 
practices for states and testing companies to use to strengthen the 
implementation of state assessment programs. Their publication 
includes best practices in six categories related to the security of 
paper-and computer-based tests.[Footnote 2] However, it is not known 
whether states have included these practices in their security 
policies and procedures or what additional efforts states have under 
way to detect and prevent cheating or other irregularities. 

Because state assessments--which the U.S. Department of Education 
(Education) has supported with over $2 billion since 2002--serve as 
the basis for school accountability and allocation of resources for 
targeted interventions, we prepared this report under the authority of 
the Comptroller General to conduct work on GAO's initiative.[Footnote 
3] Our objectives were to determine: 

1. the extent to which states' policies and procedures include leading 
practices to prevent testing irregularities, 

2. what oversight states use to help ensure that districts and schools 
are following test security policies and procedures, and how often 
cheating by school officials was identified as part of this oversight, 
and: 

3. what sources of information or assistance states rely on for test 
security issues and what additional assistance would be useful. 

Scope and Methodology: 

To address our objectives, we designed and administered a web-based 
survey of testing administrators in the 50 states and the District of 
Columbia.[Footnote 4] We conducted our survey from November 2012 to 
January 2013, and received a response rate of 100 percent. We relied 
on the Operational Best Practices for Statewide Large-Scale Assessment 
Programs guide as a basis to design the survey. The survey included 
questions about each state's assessment program generally, as well as 
more specific questions about policies and procedures related to test 
administration, training, and states' oversight of assessment security 
policies and procedures for computer-based assessments.[Footnote 5] We 
also collected information on states' oversight activities and the 
extent to which states detected instances of cheating by school 
officials. 

To inform the survey, we conducted pretests with testing officials 
from four state educational agencies. We also conducted site visits 
and semi-structured interviews with state educational agencies and 
school districts in two states--Tennessee and Virginia. These states 
reflected a range of districts (e.g., urban and rural), use of 
computer-based assessments, and alleged or confirmed incidences of 
cheating. To further inform the survey, we reviewed relevant documents 
from Education and interviewed Education officials and representatives 
from the Council of Chief State School Officers, the Council of Great 
City Schools, American Association of School Administrators, and the 
Association of Test Publishers. We also interviewed officials from one 
test security company, Caveon Test Security, and individual test 
publishers, such as CTB/McGraw Hill and Measured Progress. In 
addition, we analyzed relevant federal laws. We did not analyze or 
verify information pertaining to state laws, policies, or procedures; 
therefore, all such descriptions of state laws, policies, or 
procedures were obtained from survey responses. 

We conducted our work from March 2012 to May 2013 in accordance with 
generally accepted government auditing standards. Those standards 
require that we plan and perform the audit to obtain sufficient, 
appropriate evidence to provide a reasonable basis for our findings 
and conclusions based on our audit objectives. We believe that the 
evidence obtained provides a reasonable basis for our findings and 
conclusions based on our audit objectives. 

Summary: 

In summary, our nationwide survey of state assessment directors 
indicates the following: 

* According to our survey, all states reported that their policies and 
procedures included 50 percent or more of the leading practices to 
prevent test irregularities in the following five areas--security 
plans, security training, security breaches, test administration and 
protecting secure materials. Additionally, of the 28 states that 
administered computer-based assessments, the majority reported 
including half or more of the leading practices in computer-based 
testing. However, states varied in the extent to which they 
incorporated elements of certain categories of leading practices. For 
example, 22 states reported having all of the leading practices for 
security training, but four states reported having none of the 
practices in this category. Although state officials reported having a 
variety of security policies and procedures in place, many reported 
feeling vulnerable to cheating at some point during the testing 
process. 

* States reported using various tools, such as statistical analyses of 
student data, monitoring, and audits of testing procedures, to oversee 
districts' implementation of test security policies and procedures, 
and most states have used this oversight to identify cheating in 
recent years. According to the state officials we surveyed, these 
oversight tools detected potential cheating by school officials in 
school years 2010-11 and 2011-12. For example, officials in 40 states 
reported allegations of cheating in the past two school years, and 
officials in 33 states confirmed at least one instance of cheating. 
Further, 32 states reported that they canceled, invalidated, or 
nullified test scores as a result of cheating. 

* States reported receiving assistance with test security from several 
sources, with testing contractors being the most frequent source of 
support. States also identified areas where additional assistance with 
test security would be useful. In particular, officials from the 
majority of states reported that it would be very or extremely useful 
if Education gathered and disseminated information on best practices 
in test security. After our survey was administered, Education 
released a report--consisting largely of the opinions of experts and 
practitioners--that discussed best practices and policies related to 
testing integrity.[Footnote 6] 

Concluding Observations: 

As more information about leading practices in test security is 
developed and disseminated, states will have improved access to the 
tools they need to develop strong policies and procedures in test 
security, and reduce their vulnerability to cheating on assessments. 
In particular, as more states begin using computer-based assessments--
which may address some vulnerabilities of paper-based assessments, but 
may also create new ones, such as computer security breaches--
additional guidance and oversight will be key to ensuring that 
appropriate policies and procedures are adopted by schools to address 
these new vulnerabilities. 

Although the risk of cheating on statewide assessments can never be 
completely eliminated, implementation of strong policies and 
procedures for preventing cheating, combined with robust oversight and 
detection by states, can greatly improve the integrity of test 
results. Without these measures, there is a higher risk that decisions 
based on test results may be faulty, and lead to damaging results, 
including failing to identify and provide resources for 
underperforming schools and students most in need of academic support. 

Agency Comments: 

We provided a draft of this correspondence to the Department of 
Education for review and comment. In its written comments, reproduced 
in enclosure III, Education complimented GAO's efforts to describe the 
test security policies and procedures reported by states. Education 
also recognized the remaining work that will be necessary to ensure 
test security in light of states' efforts to implement new assessments 
aligned with college-and career-ready standards. Further, Education 
stated that it would continue to share best practices with states to 
reinforce the importance of test security and integrity. 

In addition to Education, we are sending copies of this correspondence 
to the appropriate congressional committees. We will also make copies 
available to others on request. This correspondence is available at no 
charge on the GAO website at [hyperlink, http://www.gao.gov]. 

If you or your staff members have questions about this correspondence, 
please contact me at (206) 287-4809 or calboml@gao.gov. Contact points 
for our Offices of Congressional Relations and Public Affairs may be 
found on the last page of this correspondence. Key contributors to 
this correspondence were Scott Spicer, Assistant Director; James 
Bennett; David Chrisinger; Paul Desaulniers; Alex Galuten; Danielle 
Giese; Jamila Kennedy; Jean McSween; Anna Maria Ortiz; Salvatore 
Sorbello; and John Townes. Also contributing to this correspondence 
were Lucas Alvarez; Amy Anderson; Deborah Bland; Jason Palmer; and 
Ashanta Williams. 

Sincerely yours, 

Signed by: 

Linda M. Calbom:
Western Regional Director: 

Enclosures (3): 

[End of section] 

Enclosure I: Briefing Slides: 

K-12 EDUCATION: States’ Test Security Policies and Procedures Varied: 

Briefing for the Secretary of Education: 

For more information, contact Linda M. Calbom, (206) 287-4809 or 
calboml@gao.gov. 

Overview: 

* Introduction; 
* Research Objectives; 
* Scope and Methodology; 
* Summary of Findings; 
* Background; 
* Findings; 
* Concluding Observations. 

Introduction: 

Statewide tests (or assessments) are used to measure students’ 
performance in core subjects, hold schools accountable for student 
achievement, and make key decisions, such as targeting interventions 
to underperforming schools. Thus, it is critical that test results be 
valid and reliable. 

However, in recent years, reports of school officials cheating on 
statewide assessments have surfaced in districts across the country, 
undermining the integrity of test results. For example: 

* In 2012, California invalidated scores from 23 schools as a result 
of cheating by school officials, according to a local media report. 

* In Atlanta, Georgia, 82 public school teachers and principals 
admitted to cheating on tests administered during the 2008-09 school 
year. According to a district attorney press release, there were 35 
indictments resulting from this investigation. 

* Similar allegations were also investigated in other states; for 
example, Illinois, Maryland, Pennsylvania, Texas, and Washington, D.C. 

GAO’s prior work on state assessments—which addressed challenges states 
face with implementing valid and reliable assessments and the U.S. 
Department of Education’s (Education) oversight of assessment 
implementation—showed that one of four states judgmentally selected for 
review relied on inadequate security procedures.[A] 

Effective test security policies and procedures, when properly 
implemented, can help prevent and detect cheating and other 
irregularities that can undermine the validity and reliability of 
state assessments. 

[A] GAO, No Child Left Behind Act: Enhancements in the Department of 
Education’s Review Process Could Improve State Academic Assessments, 
GAO-09-911 (Washington, D.C.: Sep. 24, 2009). 

Research Objectives: 

We prepared this report under the Comptroller General’s authority[A] to 
conduct work on GAO's initiative because reliable state assessments 
serve as the basis for school accountability and allocation of 
resources for targeted interventions. Our objectives were: 

1) To what extent do states’ policies and procedures include leading 
practices to prevent testing irregularities? 

2) What oversight do states use to help ensure that districts and 
schools are following test security policies and procedures, and how 
often was cheating by school officials identified as part of this 
oversight? 

3) On what sources do states rely for information or assistance with 
test security issues and what additional assistance would be useful? 

[A] See 31 U.S.C. § 717(b)(1). 

Scope and Methodology: 

We conducted a nationwide survey of state testing administrators to 
determine the extent to which their policies and procedures included 
leading practices in test security.[A] 

* We used the Operational Best Practices for Large-Scale Statewide 
Assessment Programs[B] as a basis to design the survey and conducted 
pretests with testing officials from four state educational agencies. 

* The survey asked questions on six categories of leading practices 
identified in the best practices guide—security plans, security 
training, security breaches, test administration, protecting secure 
materials and computer-based testing. The survey also included 
questions about state oversight and procedures and the extent to which 
oversight activities detected cheating. 

We conducted our survey from November 2012 to January 2013, and 
received a response rate of 100 percent. 

[A] Our survey did not examine state or local implementation of these 
test security policies. 

[B] The Council of Chief State School Officers and the Association of 
Test Publishers, Operational Best Practices for Statewide Large-Scale 
Assessment Programs (Washington, D.C.: 2010). 

To inform the survey, we conducted site visits and semi-structured 
interviews with state educational agencies and school districts in two 
states-—Tennessee and Virginia—-that reflected a range of districts 
(e.g., urban and rural), use of computer-based assessments, and 
alleged or confirmed incidences of cheating by school officials. 

To further inform the survey, we reviewed documents and interviewed 
officials from Education, national education organizations, test 
publishing companies, and one test security company. We also analyzed 
relevant federal laws. We did not analyze or verify information 
pertaining to state laws, policies, or procedures; therefore, all such 
descriptions are taken from survey responses. 

We conducted our work from March 2012 to May 2013 in accordance with 
generally accepted government auditing standards. Those standards 
require that we plan and perform the audit to obtain sufficient, 
appropriate evidence to provide a reasonable basis for our findings 
and conclusions based on our audit objectives. We believe that the 
evidence obtained provides a reasonable basis for our findings and 
conclusions based on our audit objectives. 

Summary of Findings: 

All states reported including at least 50 percent of the leading 
practices in test security into their policies and procedures. 
However, states varied in the extent to which they incorporated 
certain categories of leading practices.[A] For example, 22 states 
reported having all of the leading practices for security training, 
but four states had none of the practices in this category. Despite 
having reported that they have various leading practices in place to 
mitigate testing irregularities and prevent cheating, many states 
reported feeling vulnerable to cheating at some point during the 
testing process. 

States use several tools to oversee test security, including 
monitoring, audits of testing procedures, and analyses of test data. 
As a result of these oversight activities, 40 states detected 
potential cheating during the past two school years and 33 states 
confirmed at least one instance of cheating. Further, 32 states 
reported canceling, invalidating, or nullifying test scores from 
individual students, schools, or districts because of suspected or 
confirmed instances of cheating by school officials. 

States relied on several sources for assistance with test security 
issues and identified additional areas where assistance from Education 
would be useful. Subsequent to our survey, Education issued a report-—
consisting largely of the opinions of experts and practitioners-—that 
discussed best practices and policies for testing integrity.[B] 

[A] See enclosure II for more information on leading practices by 
state. 

[B] U.S. Department of Education, Institute of Education Sciences, 
National Center for Education Statistics, Testing Integrity Symposium: 
Issues and Recommendations for Best Practice (2013). 

Background: 

Since 2002, Education provided over $2 billion for state testing 
required under the Elementary and Secondary Education Act of 1965 
(ESEA), as amended. ESEA requires states receiving ESEA, Part A funds 
to: 

* develop high-quality academic assessments that measure students’ 
knowledge of reading/language arts, mathematics, and science; 

* test all students in grades 3 through 8 annually in mathematics and 
reading/language arts and at least once in grades 10 through 12; and; 

* test students in science at least once during grades 3 through 5, 6 
through 9, and 10 through 12. 

These assessments can be delivered via traditional pencil and paper or 
computer-based methods. 

Student performance, as measured in part by these assessments, is the 
basis for school accountability, including corrective actions such as 
removing principals, implementing new curricula, or restructuring 
schools. 

Further, valid assessment results are necessary for resources to be 
accurately targeted to underperforming schools. For example, the 
School Improvement Grants program targets resources to schools that 
are below a certain threshold of student academic performance. 

Some states provide awards or recognition for improving assessment 
scores, which could provide incentives to cheat. 

According to our nationwide survey: 

* 24 states[A] reported either providing awards or special recognition 
based on student test scores, 

* 24 states reported linking assessment scores to educator 
evaluations, and, 

* 9 states reported linking assessment scores to promotions. 

[A] Throughout this report, we refer to the District of Columbia as a 
state. 

In 2010, the Council of Chief State School Officers (CCSSO) and the 
Association of Test Publishers (ATP) published a set of voluntary best 
practices in test security for states and testing companies. 

The practices were developed by a working group comprised of state 
education officials and representatives of test publishing companies 
and a test security firm. 

They cover topics central to designing, developing, administering, and 
scoring state assessments. 

The working group reported applying several criteria to help ensure 
the practices they recommended were proven and would benefit users. 

For example, the working group assessed whether the practices were: 

* used by more than one state or testing company; 

* ready and available to be implemented; and; 

* presented in a way that would permit alternative methods of 
attaining the same goal. 

CCSSO and ATP plan to publish a new guide that focuses on leading 
practices in test security for computer-based statewide assessments. 

According to the CCSSO and ATP document, states do not necessarily 
need to include all of the leading practices to have a successful test 
security program. 

Education has led two initiatives aimed at collecting and sharing 
information on practices and policies that have been used to prevent, 
detect, and respond to testing irregularities: 

* First, Education published a request for information in the Federal 
Register on January 17, 2012, asking the public to submit best 
practices and policies regarding prevention, detection, and 
investigation of testing irregularities.[A] 

* In addition, on February 28, 2012, Education’s National Center for 
Education Statistics sponsored a symposium on testing integrity 
comprised of external experts and industry leaders to discuss best 
practices and how these practices might change for computer-based 
assessments. 

[A] 77 Fed. Reg. 2280 (Jan. 17, 2012). 

Finding 1: Leading Practices: Extent of leading practices included in 
test security policies and procedures varied: 

According to our survey results, all states’ policies and procedures 
included many of the leading practices to prevent testing 
irregularities; however, they varied in the extent to which they 
incorporated these practices. Further, despite their established test 
security policies and procedures to prevent cheating, states reported 
being vulnerable to cheating at some point during the testing process. 
See enclosure II for a complete listing of the leading practices in 
each category and information on cases of leading practices reported 
by states. 

All states reported having at least 50 percent (37 of 74) of the 
leading practices across five of the six categories: security plans; 
security training; security breaches; test administration; and 
protecting secure materials.[A] 

Figure 1: Number of states that reported having various percentages of 
leading practices across five categories of leading practices: 

[Refer to PDF for image: table] 

Percentage of leading practices (Total = 74): 

50% (37): 
Number of states: 1. 

51% to 74% (41-55): 
Number of states: 15. 

75% to 89% (56-66): 
Number of states: 21. 

90% or more (67-72): 
Number of states: 14. 

Source: GAO survey of state testing directors. 

[End of figure] 

[A] We also surveyed states to determine the extent to which they 
incorporated leading practices in computer-based testing. According to 
our survey, 28 states reported administering computer-based tests. 
Therefore, we report the results of that category separately later in 
this report. 

Finding 1: Leading Practices – Test Security Plans: Extent of leading 
practices included in test security policies and procedures varied: 

Leading practices for test security plans include having procedures 
for keeping testing facilities and materials secure, and methods of 
transferring hard copies of testing materials. 

Fourteen states reported having all (9 of 9) of the leading practices 
in this category. 

Additionally, within this category all 51 states reported having 
requirements for the security of testing materials. 

Figure 2: Number of states that reported having various 
numbers of leading practices within the security plans category: 

[Refer to PDF for image: horizontal bar graph] 

Number of leading practices (Total = 9): 9; 
Number of states: 14. 

Number of leading practices (Total = 9): 8; 
Number of states: 18. 

Number of leading practices (Total = 9): 7; 
Number of states: 8. 

Number of leading practices (Total = 9): 6; 
Number of states: 8. 

Number of leading practices (Total = 9): 5; 
Number of states: 3. 

Source: GAO survey of state testing directors. 

[End of figure] 

Finding 1: Leading Practices – Security Training: Extent of leading 
practices included in test security policies and procedures varied: 

Security training leading practices include the development of training 
materials and conducting training on test security. 

Twenty-two states reported having all (11 of 11) of the leading 
practices in this category. 

However, four states reported not having any of the leading practices 
in the security training category. 

Figure 3: Number of states that reported having various numbers 
of leading practices within the security training category: 

[Refer to PDF for image: horizontal bar graph] 

Number of leading practices (Total = 11): 11; 
Number of states: 22. 

Number of leading practices (Total = 11): 10; 
Number of states: 10. 

Number of leading practices (Total = 11): 8 or 9; 
Number of states: 11. 

Number of leading practices (Total = 11): 6 or 7; 
Number of states: 4. 

Number of leading practices (Total = 11): None; 
Number of states: 4. 

Source: GAO survey of state testing directors. 

[End of figure] 

Finding 1: Leading Practices – Security Breaches: Extent of leading 
practices included in test security policies and procedures varied: 

Leading practices for dealing with security breaches include 
procedures to prevent potential breaches—-such as coaching or altering 
test responses—-and steps to take if they occur, including 
consequences for individuals responsible for the breach. 

Twenty-four states reported having all (6 of 6) of the leading 
practices in this category. 

Three states reported not having any of the leading practices in the 
security breaches category. 

Figure 4: Number of states that reported having various numbers 
of leading practices within the security breaches category: 

[Refer to PDF for image: horizontal bar graph] 

Number of leading practices (Total = 6): 6; 
Number of states: 24. 

Number of leading practices (Total = 6): 5; 
Number of states: 18. 

Number of leading practices (Total = 6): 4; 
Number of states: 4. 

Number of leading practices (Total = 6): 1 to 3; 
Number of states: 2. 

Number of leading practices (Total = 6): None; 
Number of states: 3. 

Source: GAO survey of state testing directors. 

[End of figure] 

Finding 1: Leading Practices – Test Administration: Extent of leading 
practices included in test security policies and procedures varied: 

Leading practices in test administration include procedures for 
securing the testing environment and preventing or managing possible 
testing irregularities, among other things. 

Most states reported having over half of the 32 leading practices in 
this category. 

However, within this category, only eight states reported having 
requirements for recording seating chart information, and only six 
states reported having requirements that teachers not proctor their 
own classrooms during statewide tests. 

Figure 5: Number of states that reported having various numbers 
of leading practices within the test administration category" 

[Refer to PDF for image: horizontal bar graph] 

Number of leading practices (Total = 32): 29 to 31; 
Number of states: 21. 

Number of leading practices (Total = 32): 24 to 28; 
Number of states: 24. 

Number of leading practices (Total = 32): 18 to 20; 
Number of states: 2. 

Number of leading practices (Total = 32): 6 to 10; 
Number of states: 4. 

Source: GAO survey of state testing directors. 

[End of figure] 

Finding 1: Leading Practices – Protecting Secure Materials Extent of 
leading practices included in test security policies and procedures 
varied: 

Leading practices for protecting secure materials include procedures 
to account for and protect secure materials at all stages of 
distribution, receipt, storage and return. 

Seven states reported having all (16 of 16) of the leading practices 
in this category. 

However, fewer than half of the states reported having procedures for 
physical access controls (20 states) and visitor policy regulations 
(25 states). 

Figure 6: Number of states that reported having various numbers 
of leading practices within the protecting secure materials category: 

[Refer to PDF for image: horizontal bar graph] 

Number of leading practices (Total = 16): 16; 
Number of states: 7. 

Number of leading practices (Total = 16): 13 to 15; 
Number of states: 23. 

Number of leading practices (Total = 16): 9 to 12; 
Number of states: 14. 

Number of leading practices (Total = 16): 3 to 8; 
Number of states: 7. 

Source: GAO survey of state testing directors. 

[End of figure] 

Finding 1: Leading Practices – Computer-based Testing Extent of 
leading practices included in test security policies and procedures 
varied: 

Computer-based practices include requirements that clearly document 
and explain the use of any software, including supporting devices such 
as scanners. 

Of the 28 states that reported administering computer-based tests, 
eight states reported having all (14 of 14) of the leading practices 
in this category; 19 of the remaining 20 states reported having over 
half of the practices, with Kansas the only exception. 

By the 2014-15 school year, 47 states are currently expected to be 
using computer-based assessments.[A] 

[A] These states have entered partnerships to use computer-based tests 
to measure student progress against the Common Core State Standards, 
which provide a consistent understanding of what students 
are expected to learn. 

Figure 7: Number of states that reported having various numbers 
of leading practices within the computer-based testing category: 

[Refer to PDF for image: horizontal bar graph] 

Number of leading practices (Total = 14): 14; 
Number of states: 8. 

Number of leading practices (Total = 14): 13; 
Number of states: 7. 

Number of leading practices (Total = 14): 10 to 12; 
Number of states: 8. 

Number of leading practices (Total = 14): 5 to 9; 
Number of states: 5. 

Source: GAO survey of state testing directors. 

[End of figure] 

Finding 1: Leading Practices: Regardless of security practices, states 
feel vulnerable to cheating: 

Despite having a variety of policies and procedures to mitigate 
testing irregularities, many state officials reported feeling 
vulnerable to cheating at some point during the testing process.[A] 

[A] This figure includes states responding that they felt “somewhat 
vulnerable”; “moderately vulnerable”; “very vulnerable”; or “extremely 
vulnerable” to cheating. 

Figure 8: Number of states that reported being vulnerable during 
various stages of testing: 

[Refer to PDF for image: horizontal bar graph] 

Before test: 40; 
During test: 50; 
After test: 47; 
Chain of custody: 43; 
When testing students in need of accommodations: 45. 

Source: GAO survey of state testing directors. 

[End of figure] 

Finding 2: State Oversight: States used a variety of tools to oversee 
test security and identify cheating: 

States reported using several oversight tools to ensure that school 
districts are following test security policies and procedures. As a 
result of these oversight activities, 32 states reported voiding test 
scores because of suspected or confirmed instances of cheating by 
school officials in the past two school years. 

Finding 2: State Oversight: States used a variety of tools to oversee 
test security and identify cheating: 

State officials reported that they use a number of different oversight 
tools to ensure districts are following test security policies and 
procedures. 

Figure 9: Number of states (out of 51, including the District of 
Columbia) reporting that they used these tools to ensure that school 
districts and schools were following test security policies and 
procedures: 

[Refer to PDF for image: 5 pie-charts] 

Analysis of student data: 
States using the oversight tools: 38; 
States not using the oversight tools: 13. 

Monitoring visit: 
States using the oversight tools: 36; 
States not using the oversight tools: 15. 

Remote monitoring: 
States using the oversight tools: 22; 
States not using the oversight tools: 29. 

Formal audits: 
States using the oversight tools: 21; 
States not using the oversight tools: 30. 

Outside security firm: 
States using the oversight tools: 8; 
States not using the oversight tools: 43. 

Source: GAO survey of state testing directors. 

[End of figure] 

State officials reported that, during the past two school years, they 
detected potential cheating as a result of the following state 
oversight activities. 

Figure 10: Number of states (out of 51, including the District of 
Columbia) reporting that they used these activities to detect reports 
of cheating in school years 2010-11 and 2011-12: 

[Refer to PDF for image: 4 pie-charts] 

Hotlines: 
States using the activity to detect reports of cheating: 22; 
States not using the activity to detect reports of cheating: 29. 

Reporting: 
States using the activity to detect reports of cheating: 21; 
States not using the activity to detect reports of cheating: 30. 

Monitoring: 
States using the activity to detect reports of cheating: 17; 
States not using the activity to detect reports of cheating: 34. 

Auditing: 
States using the activity to detect reports of cheating: 11; 
States not using the activity to detect reports of cheating: 40. 

Note: Reporting mechanisms may include online or paper-based forms for 
reporting security breaches by district and school officials, parents, 
or students. 

Source: GAO survey of state testing directors. 

[End of figure] 

Our analysis found that states also use statistical analysis of 
assessment data to identify suspicious patterns of scores at the 
classroom, grade, school, or district level that are highly unlikely 
and may suggest cheating.[A] 

Officials from 37 states reported that they conducted formal 
statistical analyses to detect indications of cheating for the 2011-
2012 testing cycle. 

* For example, 33 states reported using erasure analysis, which usually 
focuses on the number or proportion of answers that were changed from 
wrong to right. 

* Twenty-eight states reported using gain or loss score analysis, which 
considers whether average test score improvements are unusual relative 
to the average improvement in similar classrooms or grades. 

[A] These methods alone cannot verify whether cheating occurred. They 
can, however, inform future investigations or corroborate other 
reports of teachers or administrators cheating. 

State officials reported using the results of the statistical analyses 
to: 

* inform training on assessment security (34 states), 
* conduct investigations in schools (34 states), 
* select districts or schools for monitoring visits (28 states), and, 
* make changes to state assessment security policies (26 states). 

Forty states reported allegations of cheating by school officials in 
the past two school years. Of these, 33 states confirmed at least one 
instance of cheating.[A] 

Twenty-nine states reported allegations of cheating for school year 
2011-12, and a similar number reported allegations of cheating in 
school year 2010-11. 

[A] Allegations of cheating could include different numbers of 
individuals. For example, one allegation could cover one individual, 
multiple tests, grade levels, schools, or individuals. 

In school years 2011-12 and 2010-11, 32 states reported canceling, 
invalidating, or nullifying test scores from individual students, 
schools, or districts because of suspected or confirmed cheating by 
school officials. 

Some state and school district officials we interviewed during our 
site visits reported that test scores could be voided due to cheating; 
districts may face corrective actions; and educators may face 
personnel actions, such as removal of teaching credentials. 

Finding 3: States’ Sources of Assistance: States received assistance 
with test security, but seek additional support: 

States relied on several sources of support for assistance with test 
security issues and identified additional areas where assistance from 
Education would be useful. Subsequent to our survey, Education issued 
a report that discusses best practices and policies for testing 
integrity. 

States reported receiving assistance with assessment security from 
several sources, but most frequently from testing contractors. 

Figure 11: Primary sources of information states rely on for 
assistance with test security issues: 

[Refer to PDF for image: horizontal bar graph] 

Number of states: 

Testing contractors: 47; 
Council of Chief State School Officers: 36; 
Other state education agencies: 29; 
Education: 16; 
National Council of Measurement Education: 16; 
Other sources: 11. 

Source: GAO survey of state testing directors. 

[End of figure] 

When asked in the survey-—administered between November 2012 and 
January 2013-—how Education could best serve the states, officials 
from the majority of states reported that it would be very or 
extremely useful if Education would: 

* gather information on best practices in test security (35 states), 
and; 

* disseminate information on best practices (36 states). 

On February 12, 2013, Education released a report—-consisting largely 
of the opinions of experts who responded to Education’s request for 
information or presented at the Testing Integrity Symposium-—
discussing practices and policies related to four areas of testing 
integrity. 

Education stated that the document will be a starting point for 
further dialogue about the integrity of academic assessments. 

State officials reported other areas, which were not discussed in 
Education’s February 2013 report, where additional assistance would be 
useful: 

* Officials from 35 states said it would be very or extremely useful 
to have additional opportunities for state collaboration about 
assessment security issues. 

* Additionally, about one-third of the states reported that it would 
be very or extremely useful if Education provided assistance with 
drafting requests for proposals for testing vendors. 

Concluding Observations: 

As more information about leading practices in test security is 
developed and disseminated, states will have improved access to the 
tools they need to develop strong policies and procedures in test 
security, and reduce their vulnerability to cheating on assessments. In 
particular, as more states begin using computer-based assessments—-
which may address some vulnerabilities of paper-based assessments, but 
may also create new ones, such as computer security breaches—-
additional guidance and oversight will be key to ensuring that 
appropriate policies and procedures are adopted by schools to address 
these new vulnerabilities. 

Although the risk of cheating on statewide assessments can never be 
completely eliminated, implementation of strong policies and 
procedures for preventing cheating, combined with robust oversight and 
detection by states, can greatly improve the integrity of test 
results. Without these measures, there is a higher risk that decisions 
based on test results may be faulty, and lead to damaging results, 
including failing to identify and provide resources for 
underperforming schools and students most in need of academic support. 

[End of Briefing Slides] 

Enclosure II: Leading Practices Included in Policies and Procedures by 
Category Reported by Each State: 

Note: Cells marked with a “Yes” indicate that state officials responded 
“yes” to having the leading practice. Blank [empty] cells indicate 
that state officials did not respond, or responded “no” or “don’t know.”
 

Table 1: Security Plans: 

AL; 
Rules for Storage of Testing Materials: Yes; 
Security of Testing Materials: Yes; 
Internet Connectivity Procedures: [Empty]; 
Methods of Electronic Transfer: Yes; 
Methods of Transfer for Hard Copies of Testing Materials: Yes; 
Procedures for Removal of Materials After Testing is Complete: Yes; 
Procedures to Keep Testing Facilities Secure: Yes; 
Test Item Release Process: Yes; 
Periodic Audits: Yes. 

AK; 
Rules for Storage of Testing Materials: Yes; 
Security of Testing Materials: Yes; 
Internet Connectivity Procedures: [Empty]; 
Methods of Electronic Transfer: Yes; 
Methods of Transfer for Hard Copies of Testing Materials: Yes; 
Procedures for Removal of Materials After Testing is Complete: Yes; 
Procedures to Keep Testing Facilities Secure: Yes; 
Test Item Release Process: [Empty]; 
Periodic Audits: [Empty]. 

AZ; 
Rules for Storage of Testing Materials: Yes; 
Security of Testing Materials: Yes; 
Internet Connectivity Procedures: Yes; 
Methods of Electronic Transfer: Yes; 
Methods of Transfer for Hard Copies of Testing Materials: Yes; 
Procedures for Removal of Materials After Testing is Complete: Yes; 
Procedures to Keep Testing Facilities Secure: Yes; 
Test Item Release Process: Yes; 
Periodic Audits: Yes. 

AR; 
Rules for Storage of Testing Materials: Yes; 
Security of Testing Materials: Yes; 
Internet Connectivity Procedures: Yes; 
Methods of Electronic Transfer: Yes; 
Methods of Transfer for Hard Copies of Testing Materials: Yes; 
Procedures for Removal of Materials After Testing is Complete: Yes; 
Procedures to Keep Testing Facilities Secure: Yes; 
Test Item Release Process: Yes; 
Periodic Audits: Yes. 

CA; 
Rules for Storage of Testing Materials: Yes; 
Security of Testing Materials: Yes; 
Internet Connectivity Procedures: [Empty]; 
Methods of Electronic Transfer: Yes; 
Methods of Transfer for Hard Copies of Testing Materials: Yes; 
Procedures for Removal of Materials After Testing is Complete: Yes; 
Procedures to Keep Testing Facilities Secure: Yes; 
Test Item Release Process: Yes; 
Periodic Audits: Yes. 

CO; 
Rules for Storage of Testing Materials: Yes; 
Security of Testing Materials: Yes; 
Internet Connectivity Procedures: Yes; 
Methods of Electronic Transfer: Yes; 
Methods of Transfer for Hard Copies of Testing Materials: Yes; 
Procedures for Removal of Materials After Testing is Complete: Yes; 
Procedures to Keep Testing Facilities Secure: Yes; 
Test Item Release Process: Yes; 
Periodic Audits: Yes. 

CT; 
Rules for Storage of Testing Materials: Yes; 
Security of Testing Materials: Yes; 
Internet Connectivity Procedures: Yes; 
Methods of Electronic Transfer: [Empty]; 
Methods of Transfer for Hard Copies of Testing Materials: Yes; 
Procedures for Removal of Materials After Testing is Complete: Yes; 
Procedures to Keep Testing Facilities Secure: Yes; 
Test Item Release Process: Yes; 
Periodic Audits: Yes. 

DC; 
Rules for Storage of Testing Materials: Yes; 
Security of Testing Materials: Yes; 
Internet Connectivity Procedures: Yes; 
Methods of Electronic Transfer: Yes; 
Methods of Transfer for Hard Copies of Testing Materials: Yes; 
Procedures for Removal of Materials After Testing is Complete: Yes; 
Procedures to Keep Testing Facilities Secure: Yes; 
Test Item Release Process: Yes; 
Periodic Audits: Yes. 

DE; 
Rules for Storage of Testing Materials: Yes; 
Security of Testing Materials: Yes; 
Internet Connectivity Procedures: Yes; 
Methods of Electronic Transfer: Yes; 
Methods of Transfer for Hard Copies of Testing Materials: Yes; 
Procedures for Removal of Materials After Testing is Complete: Yes; 
Procedures to Keep Testing Facilities Secure: Yes; 
Test Item Release Process: Yes; 
Periodic Audits: [Empty]. 

FL; 
Rules for Storage of Testing Materials: Yes; 
Security of Testing Materials: Yes; 
Internet Connectivity Procedures: Yes; 
Methods of Electronic Transfer: Yes; 
Methods of Transfer for Hard Copies of Testing Materials: Yes; 
Procedures for Removal of Materials After Testing is Complete: Yes; 
Procedures to Keep Testing Facilities Secure: Yes; 
Test Item Release Process: [Empty]; 
Periodic Audits: [Empty]. 

GA; 
Rules for Storage of Testing Materials: Yes; 
Security of Testing Materials: Yes; 
Internet Connectivity Procedures: Yes; 
Methods of Electronic Transfer: Yes; 
Methods of Transfer for Hard Copies of Testing Materials: Yes; 
Procedures for Removal of Materials After Testing is Complete: Yes; 
Procedures to Keep Testing Facilities Secure: Yes; 
Test Item Release Process: Yes; 
Periodic Audits: [Empty]. 

HI; 
Rules for Storage of Testing Materials: [Empty]; 
Security of Testing Materials: Yes; 
Internet Connectivity Procedures: Yes; 
Methods of Electronic Transfer: Yes; 
Methods of Transfer for Hard Copies of Testing Materials: Yes; 
Procedures for Removal of Materials After Testing is Complete: [Empty]; 
Procedures to Keep Testing Facilities Secure: Yes; 
Test Item Release Process: Yes; 
Periodic Audits: [Empty]. 

ID; 
Rules for Storage of Testing Materials: Yes; 
Security of Testing Materials: Yes; 
Internet Connectivity Procedures: Yes; 
Methods of Electronic Transfer: [Empty]; 
Methods of Transfer for Hard Copies of Testing Materials: Yes; 
Procedures for Removal of Materials After Testing is Complete: Yes; 
Procedures to Keep Testing Facilities Secure: Yes; 
Test Item Release Process: [Empty]; 
Periodic Audits: Yes. 

IL; 
Rules for Storage of Testing Materials: Yes; 
Security of Testing Materials: Yes; 
Internet Connectivity Procedures: [Empty]; 
Methods of Electronic Transfer: [Empty]; 
Methods of Transfer for Hard Copies of Testing Materials: Yes; 
Procedures for Removal of Materials After Testing is Complete: Yes; 
Procedures to Keep Testing Facilities Secure: Yes; 
Test Item Release Process: [Empty]; 
Periodic Audits: Yes. 

IN; 
Rules for Storage of Testing Materials: Yes; 
Security of Testing Materials: Yes; 
Internet Connectivity Procedures: Yes; 
Methods of Electronic Transfer: Yes; 
Methods of Transfer for Hard Copies of Testing Materials: Yes; 
Procedures for Removal of Materials After Testing is Complete: Yes; 
Procedures to Keep Testing Facilities Secure: Yes; 
Test Item Release Process: Yes; 
Periodic Audits: Yes. 

IA; 
Rules for Storage of Testing Materials: Yes; 
Security of Testing Materials: Yes; 
Internet Connectivity Procedures: [Empty]; 
Methods of Electronic Transfer: [Empty]; 
Methods of Transfer for Hard Copies of Testing Materials: Yes; 
Procedures for Removal of Materials After Testing is Complete: Yes; 
Procedures to Keep Testing Facilities Secure: Yes; 
Test Item Release Process: Yes; 
Periodic Audits: Yes. 

KS; 
Rules for Storage of Testing Materials: Yes; 
Security of Testing Materials: Yes; 
Internet Connectivity Procedures: Yes; 
Methods of Electronic Transfer: Yes; 
Methods of Transfer for Hard Copies of Testing Materials: Yes; 
Procedures for Removal of Materials After Testing is Complete: Yes; 
Procedures to Keep Testing Facilities Secure: [Empty]; 
Test Item Release Process: Yes; 
Periodic Audits: Yes. 

KY; 
Rules for Storage of Testing Materials: Yes; 
Security of Testing Materials: Yes; 
Internet Connectivity Procedures: Yes; 
Methods of Electronic Transfer: Yes; 
Methods of Transfer for Hard Copies of Testing Materials: Yes; 
Procedures for Removal of Materials After Testing is Complete: Yes; 
Procedures to Keep Testing Facilities Secure: Yes; 
Test Item Release Process: Yes; 
Periodic Audits: Yes. 

LA; 
Rules for Storage of Testing Materials: Yes; 
Security of Testing Materials: Yes; 
Internet Connectivity Procedures: Yes; 
Methods of Electronic Transfer: Yes; 
Methods of Transfer for Hard Copies of Testing Materials: Yes; 
Procedures for Removal of Materials After Testing is Complete: Yes; 
Procedures to Keep Testing Facilities Secure: Yes; 
Test Item Release Process: Yes; 
Periodic Audits: [Empty]. 

ME; 
Rules for Storage of Testing Materials: Yes; 
Security of Testing Materials: Yes; 
Internet Connectivity Procedures: Yes; 
Methods of Electronic Transfer: Yes; 
Methods of Transfer for Hard Copies of Testing Materials: Yes; 
Procedures for Removal of Materials After Testing is Complete: Yes; 
Procedures to Keep Testing Facilities Secure: Yes; 
Test Item Release Process: Yes; 
Periodic Audits: [Empty]. 

MD; 
Rules for Storage of Testing Materials: Yes; 
Security of Testing Materials: Yes; 
Internet Connectivity Procedures: Yes; 
Methods of Electronic Transfer: Yes; 
Methods of Transfer for Hard Copies of Testing Materials: Yes; 
Procedures for Removal of Materials After Testing is Complete: Yes; 
Procedures to Keep Testing Facilities Secure: Yes; 
Test Item Release Process: Yes; 
Periodic Audits: Yes. 

MA; 
Rules for Storage of Testing Materials: Yes; 
Security of Testing Materials: Yes; 
Internet Connectivity Procedures: [Empty]; 
Methods of Electronic Transfer: [Empty]; 
Methods of Transfer for Hard Copies of Testing Materials: Yes; 
Procedures for Removal of Materials After Testing is Complete: Yes; 
Procedures to Keep Testing Facilities Secure: Yes; 
Test Item Release Process: Yes; 
Periodic Audits: Yes. 

MI; 
Rules for Storage of Testing Materials: Yes; 
Security of Testing Materials: Yes; 
Internet Connectivity Procedures: [Empty]; 
Methods of Electronic Transfer: [Empty]; 
Methods of Transfer for Hard Copies of Testing Materials: Yes; 
Procedures for Removal of Materials After Testing is Complete: Yes; 
Procedures to Keep Testing Facilities Secure: Yes; 
Test Item Release Process: [Empty]; 
Periodic Audits: Yes. 

MN; 
Rules for Storage of Testing Materials: Yes; 
Security of Testing Materials: Yes; 
Internet Connectivity Procedures: Yes; 
Methods of Electronic Transfer: Yes; 
Methods of Transfer for Hard Copies of Testing Materials: Yes; 
Procedures for Removal of Materials After Testing is Complete: Yes; 
Procedures to Keep Testing Facilities Secure: Yes; 
Test Item Release Process: Yes; 
Periodic Audits: Yes. 

MS; 
Rules for Storage of Testing Materials: Yes; 
Security of Testing Materials: Yes; 
Internet Connectivity Procedures: [Empty]; 
Methods of Electronic Transfer: Yes; 
Methods of Transfer for Hard Copies of Testing Materials: Yes; 
Procedures for Removal of Materials After Testing is Complete: Yes; 
Procedures to Keep Testing Facilities Secure: Yes; 
Test Item Release Process: [Empty]; 
Periodic Audits: Yes. 

MO; 
Rules for Storage of Testing Materials: Yes; 
Security of Testing Materials: Yes; 
Internet Connectivity Procedures: Yes; 
Methods of Electronic Transfer: Yes; 
Methods of Transfer for Hard Copies of Testing Materials: Yes; 
Procedures for Removal of Materials After Testing is Complete: Yes; 
Procedures to Keep Testing Facilities Secure: Yes; 
Test Item Release Process: Yes; 
Periodic Audits: Yes. 

MT; 
Rules for Storage of Testing Materials: Yes; 
Security of Testing Materials: Yes; 
Internet Connectivity Procedures: Yes; 
Methods of Electronic Transfer: Yes; 
Methods of Transfer for Hard Copies of Testing Materials: Yes; 
Procedures for Removal of Materials After Testing is Complete: Yes; 
Procedures to Keep Testing Facilities Secure: Yes; 
Test Item Release Process: Yes; 
Periodic Audits: [Empty]. 

NE; 
Rules for Storage of Testing Materials: Yes; 
Security of Testing Materials: Yes; 
Internet Connectivity Procedures: Yes; 
Methods of Electronic Transfer: Yes; 
Methods of Transfer for Hard Copies of Testing Materials: Yes; 
Procedures for Removal of Materials After Testing is Complete: Yes; 
Procedures to Keep Testing Facilities Secure: Yes; 
Test Item Release Process: Yes; 
Periodic Audits: Yes. 

NV; 
Rules for Storage of Testing Materials: Yes; 
Security of Testing Materials: Yes; 
Internet Connectivity Procedures: [Empty]; 
Methods of Electronic Transfer: [Empty]; 
Methods of Transfer for Hard Copies of Testing Materials: Yes; 
Procedures for Removal of Materials After Testing is Complete: Yes; 
Procedures to Keep Testing Facilities Secure: Yes; 
Test Item Release Process: [Empty]; 
Periodic Audits: [Empty]. 

NH; 
Rules for Storage of Testing Materials: [Empty]; 
Security of Testing Materials: Yes; 
Internet Connectivity Procedures: Yes; 
Methods of Electronic Transfer: Yes; 
Methods of Transfer for Hard Copies of Testing Materials: Yes; 
Procedures for Removal of Materials After Testing is Complete: Yes; 
Procedures to Keep Testing Facilities Secure: [Empty]; 
Test Item Release Process: Yes; 
Periodic Audits: Yes. 

NJ; 
Rules for Storage of Testing Materials: Yes; 
Security of Testing Materials: Yes; 
Internet Connectivity Procedures: [Empty]; 
Methods of Electronic Transfer: [Empty]; 
Methods of Transfer for Hard Copies of Testing Materials: Yes; 
Procedures for Removal of Materials After Testing is Complete: Yes; 
Procedures to Keep Testing Facilities Secure: Yes; 
Test Item Release Process: [Empty]; 
Periodic Audits: Yes. 

NM; 
Rules for Storage of Testing Materials: Yes; 
Security of Testing Materials: Yes; 
Internet Connectivity Procedures: [Empty]; 
Methods of Electronic Transfer: Yes; 
Methods of Transfer for Hard Copies of Testing Materials: Yes; 
Procedures for Removal of Materials After Testing is Complete: Yes; 
Procedures to Keep Testing Facilities Secure: Yes; 
Test Item Release Process: Yes; 
Periodic Audits: Yes. 

NY; 
Rules for Storage of Testing Materials: Yes; 
Security of Testing Materials: Yes; 
Internet Connectivity Procedures: [Empty]; 
Methods of Electronic Transfer: [Empty]; 
Methods of Transfer for Hard Copies of Testing Materials: [Empty]; 
Procedures for Removal of Materials After Testing is Complete: Yes; 
Procedures to Keep Testing Facilities Secure: Yes; 
Test Item Release Process: Yes; 
Periodic Audits: Yes. 

NC; 
Rules for Storage of Testing Materials: Yes; 
Security of Testing Materials: Yes; 
Internet Connectivity Procedures: Yes; 
Methods of Electronic Transfer: Yes; 
Methods of Transfer for Hard Copies of Testing Materials: Yes; 
Procedures for Removal of Materials After Testing is Complete: Yes; 
Procedures to Keep Testing Facilities Secure: Yes; 
Test Item Release Process: Yes; 
Periodic Audits: Yes. 

ND; 
Rules for Storage of Testing Materials: Yes; 
Security of Testing Materials: Yes; 
Internet Connectivity Procedures: Yes; 
Methods of Electronic Transfer: Yes; 
Methods of Transfer for Hard Copies of Testing Materials: Yes; 
Procedures for Removal of Materials After Testing is Complete: Yes; 
Procedures to Keep Testing Facilities Secure: Yes; 
Test Item Release Process: [Empty]; 
Periodic Audits: Yes. 

OH; 
Rules for Storage of Testing Materials: Yes; 
Security of Testing Materials: Yes; 
Internet Connectivity Procedures: [Empty]; 
Methods of Electronic Transfer: [Empty]; 
Methods of Transfer for Hard Copies of Testing Materials: Yes; 
Procedures for Removal of Materials After Testing is Complete: Yes; 
Procedures to Keep Testing Facilities Secure: [Empty]; 
Test Item Release Process: Yes; 
Periodic Audits: [Empty]. 

OK; 
Rules for Storage of Testing Materials: Yes; 
Security of Testing Materials: Yes; 
Internet Connectivity Procedures: Yes; 
Methods of Electronic Transfer: Yes; 
Methods of Transfer for Hard Copies of Testing Materials: Yes; 
Procedures for Removal of Materials After Testing is Complete: Yes; 
Procedures to Keep Testing Facilities Secure: Yes; 
Test Item Release Process: Yes; 
Periodic Audits: Yes. 

OR; 
Rules for Storage of Testing Materials: Yes; 
Security of Testing Materials: Yes; 
Internet Connectivity Procedures: Yes; 
Methods of Electronic Transfer: Yes; 
Methods of Transfer for Hard Copies of Testing Materials: Yes; 
Procedures for Removal of Materials After Testing is Complete: Yes; 
Procedures to Keep Testing Facilities Secure: Yes; 
Test Item Release Process: Yes; 
Periodic Audits: [Empty]. 

PA; 
Rules for Storage of Testing Materials: Yes; 
Security of Testing Materials: Yes; 
Internet Connectivity Procedures: Yes; 
Methods of Electronic Transfer: Yes; 
Methods of Transfer for Hard Copies of Testing Materials: Yes; 
Procedures for Removal of Materials After Testing is Complete: Yes; 
Procedures to Keep Testing Facilities Secure: Yes; 
Test Item Release Process: Yes; 
Periodic Audits: Yes. 

RI; 
Rules for Storage of Testing Materials: Yes; 
Security of Testing Materials: Yes; 
Internet Connectivity Procedures: Yes; 
Methods of Electronic Transfer: [Empty]; 
Methods of Transfer for Hard Copies of Testing Materials: [Empty]; 
Procedures for Removal of Materials After Testing is Complete: Yes; 
Procedures to Keep Testing Facilities Secure: Yes; 
Test Item Release Process: Yes; 
Periodic Audits: Yes. 

SC; 
Rules for Storage of Testing Materials: Yes; 
Security of Testing Materials: Yes; 
Internet Connectivity Procedures: Yes; 
Methods of Electronic Transfer: [Empty]; 
Methods of Transfer for Hard Copies of Testing Materials: Yes; 
Procedures for Removal of Materials After Testing is Complete: Yes; 
Procedures to Keep Testing Facilities Secure: Yes; 
Test Item Release Process: Yes; 
Periodic Audits: Yes. 

SD; 
Rules for Storage of Testing Materials: Yes; 
Security of Testing Materials: Yes; 
Internet Connectivity Procedures: [Empty]; 
Methods of Electronic Transfer: Yes; 
Methods of Transfer for Hard Copies of Testing Materials: Yes; 
Procedures for Removal of Materials After Testing is Complete: Yes; 
Procedures to Keep Testing Facilities Secure: Yes; 
Test Item Release Process: [Empty]; 
Periodic Audits: Yes. 

TN; 
Rules for Storage of Testing Materials: Yes; 
Security of Testing Materials: Yes; 
Internet Connectivity Procedures: [Empty]; 
Methods of Electronic Transfer: Yes; 
Methods of Transfer for Hard Copies of Testing Materials: Yes; 
Procedures for Removal of Materials After Testing is Complete: Yes; 
Procedures to Keep Testing Facilities Secure: Yes; 
Test Item Release Process: Yes; 
Periodic Audits: Yes. 

TX; 
Rules for Storage of Testing Materials: Yes; 
Security of Testing Materials: Yes; 
Internet Connectivity Procedures: Yes; 
Methods of Electronic Transfer: Yes; 
Methods of Transfer for Hard Copies of Testing Materials: Yes; 
Procedures for Removal of Materials After Testing is Complete: Yes; 
Procedures to Keep Testing Facilities Secure: Yes; 
Test Item Release Process: Yes; 
Periodic Audits: [Empty]. 

UT; 
Rules for Storage of Testing Materials: Yes; 
Security of Testing Materials: Yes; 
Internet Connectivity Procedures: Yes; 
Methods of Electronic Transfer: Yes; 
Methods of Transfer for Hard Copies of Testing Materials: Yes; 
Procedures for Removal of Materials After Testing is Complete: Yes; 
Procedures to Keep Testing Facilities Secure: Yes; 
Test Item Release Process: Yes; 
Periodic Audits: [Empty]. 

VT; 
Rules for Storage of Testing Materials: Yes; 
Security of Testing Materials: Yes; 
Internet Connectivity Procedures: Yes; 
Methods of Electronic Transfer: Yes; 
Methods of Transfer for Hard Copies of Testing Materials: Yes; 
Procedures for Removal of Materials After Testing is Complete: Yes; 
Procedures to Keep Testing Facilities Secure: Yes; 
Test Item Release Process: Yes; 
Periodic Audits: [Empty]. 

VA; 
Rules for Storage of Testing Materials: Yes; 
Security of Testing Materials: Yes; 
Internet Connectivity Procedures: Yes; 
Methods of Electronic Transfer: Yes; 
Methods of Transfer for Hard Copies of Testing Materials: Yes; 
Procedures for Removal of Materials After Testing is Complete: Yes; 
Procedures to Keep Testing Facilities Secure: Yes; 
Test Item Release Process: Yes; 
Periodic Audits: Yes. 

WA; 
Rules for Storage of Testing Materials: Yes; 
Security of Testing Materials: Yes; 
Internet Connectivity Procedures: [Empty]; 
Methods of Electronic Transfer: Yes; 
Methods of Transfer for Hard Copies of Testing Materials: Yes; 
Procedures for Removal of Materials After Testing is Complete: Yes; 
Procedures to Keep Testing Facilities Secure: Yes; 
Test Item Release Process: Yes; 
Periodic Audits: Yes. 

WV; 
Rules for Storage of Testing Materials: Yes; 
Security of Testing Materials: Yes; 
Internet Connectivity Procedures: Yes; 
Methods of Electronic Transfer: Yes; 
Methods of Transfer for Hard Copies of Testing Materials: Yes; 
Procedures for Removal of Materials After Testing is Complete: Yes; 
Procedures to Keep Testing Facilities Secure: [Empty]; 
Test Item Release Process: [Empty]; 
Periodic Audits: [Empty]. 

WI; 
Rules for Storage of Testing Materials: Yes; 
Security of Testing Materials: Yes; 
Internet Connectivity Procedures: [Empty]; 
Methods of Electronic Transfer: [Empty]; 
Methods of Transfer for Hard Copies of Testing Materials: Yes; 
Procedures for Removal of Materials After Testing is Complete: Yes; 
Procedures to Keep Testing Facilities Secure: Yes; 
Test Item Release Process: Yes; 
Periodic Audits: [Empty]. 

WY; 
Rules for Storage of Testing Materials: Yes; 
Security of Testing Materials: Yes; 
Internet Connectivity Procedures: [Empty]; 
Methods of Electronic Transfer: [Empty]; 
Methods of Transfer for Hard Copies of Testing Materials: Yes; 
Procedures for Removal of Materials After Testing is Complete: Yes; 
Procedures to Keep Testing Facilities Secure: [Empty]; 
Test Item Release Process: Yes; 
Periodic Audits: [Empty]. 

Source: GAO survey of state testing directors. 

[End of table] 

Table 2: Training: 

Key: 

1. Reporting Test Administration Irregularities and Security Breaches; 
2. Handling Allowable Accommodations; 
3. Ensuring Test Security During All Stages of Administration; 
4. Documentation how the Assessment is to be Administered; 
5. Administering Test Under Normal Standardized Conditions; 
6. Dealing with Cases Involving Expected Collusion Between Adults; 
7. A Process for Addressing Unforeseen Difficulties with Test 
Administration; 
8. Answering Student Questions About the Assessment; 
9. Allowing Student Activities After Completing the Assessment if 
Students are Still Engaged in the Assessment; 
10. Standards for Triggering An Investigation; 
11. Protocols for Conducting An Investigation. 

AL; 
1: Yes; 
2: Yes; 
3: Yes; 
4: Yes; 
5: Yes; 
6: Yes; 
7: Yes; 
8: Yes; 
9: Yes; 
10: Yes; 
11: Yes. 

AK; 
1: Yes; 
2: Yes; 
3: Yes; 
4: Yes; 
5: Yes; 
6: Yes; 
7: Yes; 
8: Yes; 
9: Yes; 
10: Yes; 
11: Yes. 

AZ; 
1: Yes; 
2: Yes; 
3: Yes; 
4: Yes; 
5: Yes; 
6: Yes; 
7: Yes; 
8: Yes; 
9: Yes; 
10: Yes; 
11: Yes. 

AR; 
1: Yes; 
2: Yes; 
3: Yes; 
4: Yes; 
5: Yes; 
6: [Empty]; 
7: Yes; 
8: Yes; 
9: Yes; 
10: [Empty]; 
11: [Empty]. 

CA; 
1: Yes; 
2: Yes; 
3: Yes; 
4: Yes; 
5: Yes; 
6: Yes; 
7: Yes; 
8: Yes; 
9: Yes; 
10: Yes; 
11: Yes. 

CO; 
1: Yes; 
2: Yes; 
3: Yes; 
4: Yes; 
5: Yes; 
6: [Empty]; 
7: Yes; 
8: Yes; 
9: Yes; 
10: Yes; 
11: Yes. 

CT; 
1: Yes; 
2: Yes; 
3: Yes; 
4: [Empty]; 
5: Yes; 
6: [Empty]; 
7: Yes; 
8: Yes; 
9: Yes; 
10: Yes; 
11: [Empty]. 

DC; 
1: Yes; 
2: Yes; 
3: Yes; 
4: Yes; 
5: Yes; 
6: Yes; 
7: Yes; 
8: Yes; 
9: Yes; 
10: Yes; 
11: Yes. 

DE; 
1: Yes; 
2: Yes; 
3: Yes; 
4: [Empty]; 
5: Yes; 
6: Yes; 
7: Yes; 
8: Yes; 
9: Yes; 
10: Yes; 
11: Yes. 

FL; 
1: Yes; 
2: Yes; 
3: Yes; 
4: Yes; 
5: Yes; 
6: Yes; 
7: Yes; 
8: Yes; 
9: Yes; 
10: Yes; 
11: Yes. 

GA; 
1: Yes; 
2: Yes; 
3: Yes; 
4: Yes; 
5: Yes; 
6: Yes; 
7: Yes; 
8: Yes; 
9: Yes; 
10: Yes; 
11: Yes. 

HI; 
1: Yes; 
2: Yes; 
3: Yes; 
4: Yes; 
5: Yes; 
6: [Empty]; 
7: Yes; 
8: Yes; 
9: Yes; 
10: Yes; 
11: Yes. 

ID; 
1: [Empty]; 
2: Yes; 
3: Yes; 
4: Yes; 
5: Yes; 
6: Yes; 
7: Yes; 
8: Yes; 
9: Yes; 
10: Yes; 
11: Yes. 

IL; 
1: Yes; 
2: Yes; 
3: Yes; 
4: Yes; 
5: Yes; 
6: [Empty]; 
7: Yes; 
8: Yes; 
9: Yes; 
10: Yes; 
11: Yes. 

IN; 
1: Yes; 
2: Yes; 
3: Yes; 
4: Yes; 
5: Yes; 
6: [Empty]; 
7: Yes; 
8: Yes; 
9: [Empty]; 
10: Yes; 
11: Yes. 

IA; 
1: [Empty]; 
2: [Empty]; 
3: [Empty]; 
4: [Empty]; 
5: [Empty]; 
6: [Empty]; 
7: [Empty]; 
8: [Empty]; 
9: [Empty]; 
10: [Empty]; 
11: [Empty]. 

KS; 
1: Yes; 
2: Yes; 
3: Yes; 
4: Yes; 
5: Yes; 
6: [Empty]; 
7: [Empty]; 
8: [Empty]; 
9: [Empty]; 
10: Yes; 
11: [Empty]. 

KY; 
1: Yes; 
2: Yes; 
3: Yes; 
4: Yes; 
5: Yes; 
6: Yes; 
7: Yes; 
8: Yes; 
9: Yes; 
10: Yes; 
11: Yes. 

LA; 
1: [Empty]; 
2: [Empty]; 
3: [Empty]; 
4: [Empty]; 
5: [Empty]; 
6: [Empty]; 
7: [Empty]; 
8: [Empty]; 
9: [Empty]; 
10: [Empty]; 
11: [Empty]. 

ME; 
1: Yes; 
2: Yes; 
3: Yes; 
4: Yes; 
5: Yes; 
6: Yes; 
7: Yes; 
8: Yes; 
9: Yes; 
10: Yes; 
11: Yes. 

MD; 
1: Yes; 
2: Yes; 
3: Yes; 
4: [Empty]; 
5: [Empty]; 
6: Yes; 
7: Yes; 
8: Yes; 
9: [Empty]; 
10: Yes; 
11: Yes. 

MA; 
1: Yes; 
2: Yes; 
3: Yes; 
4: Yes; 
5: Yes; 
6: [Empty]; 
7: Yes; 
8: Yes; 
9: Yes; 
10: Yes; 
11: Yes. 

MI; 
1: Yes; 
2: [Empty]; 
3: Yes; 
4: Yes; 
5: Yes; 
6: [Empty]; 
7: Yes; 
8: [Empty]; 
9: Yes; 
10: [Empty]; 
11: [Empty]. 

MN; 
1: [Empty]; 
2: [Empty]; 
3: [Empty]; 
4: [Empty]; 
5: [Empty]; 
6: [Empty]; 
7: [Empty]; 
8: [Empty]; 
9: [Empty]; 
10: [Empty]; 
11: [Empty]. 

MS; 
1: Yes; 
2: Yes; 
3: Yes; 
4: Yes; 
5: Yes; 
6: Yes; 
7: Yes; 
8: Yes; 
9: Yes; 
10: Yes; 
11: Yes. 

MO; 
1: Yes; 
2: Yes; 
3: Yes; 
4: Yes; 
5: Yes; 
6: [Empty]; 
7: Yes; 
8: Yes; 
9: Yes; 
10: [Empty]; 
11: [Empty]. 

MT; 
1: Yes; 
2: Yes; 
3: [Empty]; 
4: Yes; 
5: Yes; 
6: Yes; 
7: Yes; 
8: [Empty]; 
9: Yes; 
10: Yes; 
11: Yes. 

NE; 
1: Yes; 
2: Yes; 
3: Yes; 
4: Yes; 
5: Yes; 
6: Yes; 
7: Yes; 
8: Yes; 
9: Yes; 
10: [Empty]; 
11: Yes. 

NV; 
1: Yes; 
2: Yes; 
3: Yes; 
4: Yes; 
5: Yes; 
6: Yes; 
7: Yes; 
8: Yes; 
9: Yes; 
10: Yes; 
11: Yes. 

NH; 
1: Yes; 
2: Yes; 
3: Yes; 
4: Yes; 
5: Yes; 
6: Yes; 
7: Yes; 
8: Yes; 
9: Yes; 
10: Yes; 
11: [Empty]. 

NJ; 
1: Yes; 
2: Yes; 
3: Yes; 
4: Yes; 
5: Yes; 
6: [Empty]; 
7: Yes; 
8: [Empty]; 
9: Yes; 
10: [Empty]; 
11: Yes. 

NM; 
1: Yes; 
2: Yes; 
3: Yes; 
4: Yes; 
5: Yes; 
6: Yes; 
7: Yes; 
8: Yes; 
9: Yes; 
10: Yes; 
11: Yes. 

NY; 
1: Yes; 
2: Yes; 
3: Yes; 
4: Yes; 
5: Yes; 
6: Yes; 
7: Yes; 
8: Yes; 
9: Yes; 
10: Yes; 
11: Yes. 

NC; 
1: Yes; 
2: Yes; 
3: Yes; 
4: Yes; 
5: Yes; 
6: Yes; 
7: Yes; 
8: Yes; 
9: Yes; 
10: Yes; 
11: Yes. 

ND; 
1: Yes; 
2: Yes; 
3: Yes; 
4: Yes; 
5: Yes; 
6: [Empty]; 
7: [Empty]; 
8: Yes; 
9: [Empty]; 
10: [Empty]; 
11: [Empty]. 

OH; 
1: [Empty]; 
2: [Empty]; 
3: [Empty]; 
4: [Empty]; 
5: [Empty]; 
6: [Empty]; 
7: [Empty]; 
8: [Empty]; 
9: [Empty]; 
10: [Empty]; 
11: [Empty]. 

OK; 
1: Yes; 
2: [Empty]; 
3: Yes; 
4: Yes; 
5: Yes; 
6: [Empty]; 
7: Yes; 
8: Yes; 
9: Yes; 
10: Yes; 
11: [Empty]. 

OR; 
1: Yes; 
2: Yes; 
3: Yes; 
4: Yes; 
5: Yes; 
6: Yes; 
7: Yes; 
8: Yes; 
9: Yes; 
10: Yes; 
11: Yes. 

PA; 
1: Yes; 
2: Yes; 
3: Yes; 
4: Yes; 
5: Yes; 
6: Yes; 
7: Yes; 
8: Yes; 
9: Yes; 
10: Yes; 
11: Yes. 

RI; 
1: Yes; 
2: Yes; 
3: Yes; 
4: Yes; 
5: Yes; 
6: [Empty]; 
7: Yes; 
8: Yes; 
9: Yes; 
10: [Empty]; 
11: [Empty]. 

SC; 
1: Yes; 
2: Yes; 
3: Yes; 
4: Yes; 
5: Yes; 
6: Yes; 
7: Yes; 
8: Yes; 
9: Yes; 
10: Yes; 
11: Yes. 

SD; 
1: Yes; 
2: Yes; 
3: Yes; 
4: Yes; 
5: Yes; 
6: [Empty]; 
7: Yes; 
8: Yes; 
9: Yes; 
10: [Empty]; 
11: Yes. 

TN; 
1: Yes; 
2: Yes; 
3: Yes; 
4: Yes; 
5: Yes; 
6: Yes; 
7: Yes; 
8: Yes; 
9: Yes; 
10: Yes; 
11: Yes. 

TX; 
1: Yes; 
2: Yes; 
3: Yes; 
4: Yes; 
5: Yes; 
6: Yes; 
7: Yes; 
8: Yes; 
9: Yes; 
10: Yes; 
11: Yes. 

UT; 
1: Yes; 
2: Yes; 
3: Yes; 
4: Yes; 
5: Yes; 
6: Yes; 
7: Yes; 
8: Yes; 
9: Yes; 
10: Yes; 
11: Yes. 

VT; 
1: Yes; 
2: Yes; 
3: Yes; 
4: Yes; 
5: Yes; 
6: Yes; 
7: Yes; 
8: Yes; 
9: Yes; 
10: Yes; 
11: [Empty]. 

VA; 
1: Yes; 
2: Yes; 
3: Yes; 
4: Yes; 
5: Yes; 
6: Yes; 
7: Yes; 
8: Yes; 
9: Yes; 
10: Yes; 
11: Yes. 

WA; 
1: Yes; 
2: Yes; 
3: Yes; 
4: Yes; 
5: Yes; 
6: [Empty]; 
7: Yes; 
8: Yes; 
9: Yes; 
10: Yes; 
11: Yes. 

WV; 
1: Yes; 
2: Yes; 
3: Yes; 
4: Yes; 
5: Yes; 
6: [Empty]; 
7: Yes; 
8: [Empty]; 
9: Yes; 
10: Yes; 
11: Yes. 

WI; 
1: Yes; 
2: Yes; 
3: Yes; 
4: Yes; 
5: Yes; 
6: Yes; 
7: Yes; 
8: Yes; 
9: Yes; 
10: Yes; 
11: Yes. 

WY; 
1: Yes; 
2: Yes; 
3: Yes; 
4: Yes; 
5: Yes; 
6: [Empty]; 
7: Yes; 
8: Yes; 
9: [Empty]; 
10: [Empty]; 
11: [Empty]. 

Source: GAO survey of state testing directors. 

[End of table] 

Table 3: Security Breaches: 

AL; 
Procedures to Prevent Potential Security Breaches: Yes; 
A Recovery Plan for how to Mitigate a Security Breach: Yes; 
Information on Potential Consequences to Individual(s) Responsible for 
the Breach: Yes; 
Procedures to be Invoked if Security Breaches Occur that Jeopardize 
Integrity of Student Test Score Results: Yes; 
Development of a Form for Documenting Breaches: Yes; 
A Communications Plan for All Stakeholders to Follow if a Breach 
Occurs: Yes. 

AK; 
Procedures to Prevent Potential Security Breaches: Yes; 
A Recovery Plan for how to Mitigate a Security Breach: Yes; 
Information on Potential Consequences to Individual(s) Responsible for 
the Breach: Yes; 
Procedures to be Invoked if Security Breaches Occur that Jeopardize 
Integrity of Student Test Score Results: Yes; 
Development of a Form for Documenting Breaches: Yes; 
A Communications Plan for All Stakeholders to Follow if a Breach 
Occurs: Yes. 

AZ; 
Procedures to Prevent Potential Security Breaches: Yes; 
A Recovery Plan for how to Mitigate a Security Breach: [Empty]; 
Information on Potential Consequences to Individual(s) Responsible for 
the Breach: Yes; 
Procedures to be Invoked if Security Breaches Occur that Jeopardize 
Integrity of Student Test Score Results: Yes; 
Development of a Form for Documenting Breaches: Yes; 
A Communications Plan for All Stakeholders to Follow if a Breach 
Occurs: Yes. 

AR; 
Procedures to Prevent Potential Security Breaches: Yes; 
A Recovery Plan for how to Mitigate a Security Breach: [Empty]; 
Information on Potential Consequences to Individual(s) Responsible for 
the Breach: Yes; 
Procedures to be Invoked if Security Breaches Occur that Jeopardize 
Integrity of Student Test Score Results: Yes; 
Development of a Form for Documenting Breaches: [Empty]; 
A Communications Plan for All Stakeholders to Follow if a Breach 
Occurs: [Empty]. 

CA; 
Procedures to Prevent Potential Security Breaches: Yes; 
A Recovery Plan for how to Mitigate a Security Breach: Yes; 
Information on Potential Consequences to Individual(s) Responsible for 
the Breach: Yes; 
Procedures to be Invoked if Security Breaches Occur that Jeopardize 
Integrity of Student Test Score Results: Yes; 
Development of a Form for Documenting Breaches: Yes; 
A Communications Plan for All Stakeholders to Follow if a Breach 
Occurs: Yes. 

CO; 
Procedures to Prevent Potential Security Breaches: Yes; 
A Recovery Plan for how to Mitigate a Security Breach: Yes; 
Information on Potential Consequences to Individual(s) Responsible for 
the Breach: Yes; 
Procedures to be Invoked if Security Breaches Occur that Jeopardize 
Integrity of Student Test Score Results: Yes; 
Development of a Form for Documenting Breaches: Yes; 
A Communications Plan for All Stakeholders to Follow if a Breach 
Occurs: [Empty]. 

CT; 
Procedures to Prevent Potential Security Breaches: Yes; 
A Recovery Plan for how to Mitigate a Security Breach: Yes; 
Information on Potential Consequences to Individual(s) Responsible for 
the Breach: Yes; 
Procedures to be Invoked if Security Breaches Occur that Jeopardize 
Integrity of Student Test Score Results: Yes; 
Development of a Form for Documenting Breaches: Yes; 
A Communications Plan for All Stakeholders to Follow if a Breach 
Occurs: [Empty]. 

DC; 
Procedures to Prevent Potential Security Breaches: Yes; 
A Recovery Plan for how to Mitigate a Security Breach: Yes; 
Information on Potential Consequences to Individual(s) Responsible for 
the Breach: Yes; 
Procedures to be Invoked if Security Breaches Occur that Jeopardize 
Integrity of Student Test Score Results: Yes; 
Development of a Form for Documenting Breaches: Yes; 
A Communications Plan for All Stakeholders to Follow if a Breach 
Occurs: Yes. 

DE; 
Procedures to Prevent Potential Security Breaches: Yes; 
A Recovery Plan for how to Mitigate a Security Breach: [Empty]; 
Information on Potential Consequences to Individual(s) Responsible for 
the Breach: Yes; 
Procedures to be Invoked if Security Breaches Occur that Jeopardize 
Integrity of Student Test Score Results: Yes; 
Development of a Form for Documenting Breaches: Yes; 
A Communications Plan for All Stakeholders to Follow if a Breach 
Occurs: Yes. 

FL; 
Procedures to Prevent Potential Security Breaches: Yes; 
A Recovery Plan for how to Mitigate a Security Breach: Yes; 
Information on Potential Consequences to Individual(s) Responsible for 
the Breach: Yes; 
Procedures to be Invoked if Security Breaches Occur that Jeopardize 
Integrity of Student Test Score Results: Yes; 
Development of a Form for Documenting Breaches: Yes; 
A Communications Plan for All Stakeholders to Follow if a Breach 
Occurs: Yes. 

GA; 
Procedures to Prevent Potential Security Breaches: Yes; 
A Recovery Plan for how to Mitigate a Security Breach: Yes; 
Information on Potential Consequences to Individual(s) Responsible for 
the Breach: Yes; 
Procedures to be Invoked if Security Breaches Occur that Jeopardize 
Integrity of Student Test Score Results: Yes; 
Development of a Form for Documenting Breaches: Yes; 
A Communications Plan for All Stakeholders to Follow if a Breach 
Occurs: Yes. 

HI; 
Procedures to Prevent Potential Security Breaches: Yes; 
A Recovery Plan for how to Mitigate a Security Breach: Yes; 
Information on Potential Consequences to Individual(s) Responsible for 
the Breach: Yes; 
Procedures to be Invoked if Security Breaches Occur that Jeopardize 
Integrity of Student Test Score Results: Yes; 
Development of a Form for Documenting Breaches: Yes; 
A Communications Plan for All Stakeholders to Follow if a Breach 
Occurs: Yes. 

ID; 
Procedures to Prevent Potential Security Breaches: Yes; 
A Recovery Plan for how to Mitigate a Security Breach: [Empty]; 
Information on Potential Consequences to Individual(s) Responsible for 
the Breach: Yes; 
Procedures to be Invoked if Security Breaches Occur that Jeopardize 
Integrity of Student Test Score Results: Yes; 
Development of a Form for Documenting Breaches: Yes; 
A Communications Plan for All Stakeholders to Follow if a Breach 
Occurs: Yes. 

IL; 
Procedures to Prevent Potential Security Breaches: Yes; 
A Recovery Plan for how to Mitigate a Security Breach: [Empty]; 
Information on Potential Consequences to Individual(s) Responsible for 
the Breach: Yes; 
Procedures to be Invoked if Security Breaches Occur that Jeopardize 
Integrity of Student Test Score Results: Yes; 
Development of a Form for Documenting Breaches: Yes; 
A Communications Plan for All Stakeholders to Follow if a Breach 
Occurs: [Empty]. 

IN; 
Procedures to Prevent Potential Security Breaches: Yes; 
A Recovery Plan for how to Mitigate a Security Breach: Yes; 
Information on Potential Consequences to Individual(s) Responsible for 
the Breach: Yes; 
Procedures to be Invoked if Security Breaches Occur that Jeopardize 
Integrity of Student Test Score Results: Yes; 
Development of a Form for Documenting Breaches: Yes; 
A Communications Plan for All Stakeholders to Follow if a Breach 
Occurs: [Empty]. 

IA; 
Procedures to Prevent Potential Security Breaches: Yes; 
A Recovery Plan for how to Mitigate a Security Breach: Yes; 
Information on Potential Consequences to Individual(s) Responsible for 
the Breach: Yes; 
Procedures to be Invoked if Security Breaches Occur that Jeopardize 
Integrity of Student Test Score Results: Yes; 
Development of a Form for Documenting Breaches: Yes; 
A Communications Plan for All Stakeholders to Follow if a Breach 
Occurs: [Empty]. 

KS; 
Procedures to Prevent Potential Security Breaches: Yes; 
A Recovery Plan for how to Mitigate a Security Breach: Yes; 
Information on Potential Consequences to Individual(s) Responsible for 
the Breach: Yes; 
Procedures to be Invoked if Security Breaches Occur that Jeopardize 
Integrity of Student Test Score Results: Yes; 
Development of a Form for Documenting Breaches: [Empty]; 
A Communications Plan for All Stakeholders to Follow if a Breach 
Occurs: Yes. 

KY; 
Procedures to Prevent Potential Security Breaches: Yes; 
A Recovery Plan for how to Mitigate a Security Breach: Yes; 
Information on Potential Consequences to Individual(s) Responsible for 
the Breach: Yes; 
Procedures to be Invoked if Security Breaches Occur that Jeopardize 
Integrity of Student Test Score Results: Yes; 
Development of a Form for Documenting Breaches: Yes; 
A Communications Plan for All Stakeholders to Follow if a Breach 
Occurs: Yes. 

LA; 
Procedures to Prevent Potential Security Breaches: Yes; 
A Recovery Plan for how to Mitigate a Security Breach: Yes; 
Information on Potential Consequences to Individual(s) Responsible for 
the Breach: Yes; 
Procedures to be Invoked if Security Breaches Occur that Jeopardize 
Integrity of Student Test Score Results: Yes; 
Development of a Form for Documenting Breaches: Yes; 
A Communications Plan for All Stakeholders to Follow if a Breach 
Occurs: Yes. 

ME; 
Procedures to Prevent Potential Security Breaches: Yes; 
A Recovery Plan for how to Mitigate a Security Breach: Yes; 
Information on Potential Consequences to Individual(s) Responsible for 
the Breach: Yes; 
Procedures to be Invoked if Security Breaches Occur that Jeopardize 
Integrity of Student Test Score Results: Yes; 
Development of a Form for Documenting Breaches: Yes; 
A Communications Plan for All Stakeholders to Follow if a Breach 
Occurs: [Empty]. 

MD; 
Procedures to Prevent Potential Security Breaches: Yes; 
A Recovery Plan for how to Mitigate a Security Breach: Yes; 
Information on Potential Consequences to Individual(s) Responsible for 
the Breach: Yes; 
Procedures to be Invoked if Security Breaches Occur that Jeopardize 
Integrity of Student Test Score Results: Yes; 
Development of a Form for Documenting Breaches: Yes; 
A Communications Plan for All Stakeholders to Follow if a Breach 
Occurs: Yes. 

MA; 
Procedures to Prevent Potential Security Breaches: Yes; 
A Recovery Plan for how to Mitigate a Security Breach: Yes; 
Information on Potential Consequences to Individual(s) Responsible for 
the Breach: Yes; 
Procedures to be Invoked if Security Breaches Occur that Jeopardize 
Integrity of Student Test Score Results: Yes; 
Development of a Form for Documenting Breaches: [Empty]; 
A Communications Plan for All Stakeholders to Follow if a Breach 
Occurs: Yes. 

MI; 
Procedures to Prevent Potential Security Breaches: Yes; 
A Recovery Plan for how to Mitigate a Security Breach: Yes; 
Information on Potential Consequences to Individual(s) Responsible for 
the Breach: [Empty]; 
Procedures to be Invoked if Security Breaches Occur that Jeopardize 
Integrity of Student Test Score Results: Yes; 
Development of a Form for Documenting Breaches: Yes; 
A Communications Plan for All Stakeholders to Follow if a Breach 
Occurs: [Empty]. 

MN; 
Procedures to Prevent Potential Security Breaches: Yes; 
A Recovery Plan for how to Mitigate a Security Breach: Yes; 
Information on Potential Consequences to Individual(s) Responsible for 
the Breach: [Empty]; 
Procedures to be Invoked if Security Breaches Occur that Jeopardize 
Integrity of Student Test Score Results: Yes; 
Development of a Form for Documenting Breaches: Yes; 
A Communications Plan for All Stakeholders to Follow if a Breach 
Occurs: Yes. 

MS; 
Procedures to Prevent Potential Security Breaches: Yes; 
A Recovery Plan for how to Mitigate a Security Breach: [Empty]; 
Information on Potential Consequences to Individual(s) Responsible for 
the Breach: Yes; 
Procedures to be Invoked if Security Breaches Occur that Jeopardize 
Integrity of Student Test Score Results: Yes; 
Development of a Form for Documenting Breaches: [Empty]; 
A Communications Plan for All Stakeholders to Follow if a Breach 
Occurs: Yes. 

MO; 
Procedures to Prevent Potential Security Breaches: [Empty]; 
A Recovery Plan for how to Mitigate a Security Breach: [Empty]; 
Information on Potential Consequences to Individual(s) Responsible for 
the Breach: [Empty]; 
Procedures to be Invoked if Security Breaches Occur that Jeopardize 
Integrity of Student Test Score Results: [Empty]; 
Development of a Form for Documenting Breaches: [Empty]; 
A Communications Plan for All Stakeholders to Follow if a Breach 
Occurs: [Empty]. 

MT; 
Procedures to Prevent Potential Security Breaches: Yes; 
A Recovery Plan for how to Mitigate a Security Breach: Yes; 
Information on Potential Consequences to Individual(s) Responsible for 
the Breach: Yes; 
Procedures to be Invoked if Security Breaches Occur that Jeopardize 
Integrity of Student Test Score Results: Yes; 
Development of a Form for Documenting Breaches: Yes; 
A Communications Plan for All Stakeholders to Follow if a Breach 
Occurs: Yes. 

NE; 
Procedures to Prevent Potential Security Breaches: Yes; 
A Recovery Plan for how to Mitigate a Security Breach: Yes; 
Information on Potential Consequences to Individual(s) Responsible for 
the Breach: Yes; 
Procedures to be Invoked if Security Breaches Occur that Jeopardize 
Integrity of Student Test Score Results: Yes; 
Development of a Form for Documenting Breaches: Yes; 
A Communications Plan for All Stakeholders to Follow if a Breach 
Occurs: Yes. 

NV; 
Procedures to Prevent Potential Security Breaches: Yes; 
A Recovery Plan for how to Mitigate a Security Breach: Yes; 
Information on Potential Consequences to Individual(s) Responsible for 
the Breach: Yes; 
Procedures to be Invoked if Security Breaches Occur that Jeopardize 
Integrity of Student Test Score Results: Yes; 
Development of a Form for Documenting Breaches: Yes; 
A Communications Plan for All Stakeholders to Follow if a Breach 
Occurs: Yes. 

NH; 
Procedures to Prevent Potential Security Breaches: [Empty]; 
A Recovery Plan for how to Mitigate a Security Breach: Yes; 
Information on Potential Consequences to Individual(s) Responsible for 
the Breach: [Empty]; 
Procedures to be Invoked if Security Breaches Occur that Jeopardize 
Integrity of Student Test Score Results: [Empty]; 
Development of a Form for Documenting Breaches: [Empty]; 
A Communications Plan for All Stakeholders to Follow if a Breach 
Occurs: [Empty]. 

NJ; 
Procedures to Prevent Potential Security Breaches: Yes; 
A Recovery Plan for how to Mitigate a Security Breach: Yes; 
Information on Potential Consequences to Individual(s) Responsible for 
the Breach: Yes; 
Procedures to be Invoked if Security Breaches Occur that Jeopardize 
Integrity of Student Test Score Results: Yes; 
Development of a Form for Documenting Breaches: Yes; 
A Communications Plan for All Stakeholders to Follow if a Breach 
Occurs: Yes. 

NM; 
Procedures to Prevent Potential Security Breaches: Yes; 
A Recovery Plan for how to Mitigate a Security Breach: Yes; 
Information on Potential Consequences to Individual(s) Responsible for 
the Breach: Yes; 
Procedures to be Invoked if Security Breaches Occur that Jeopardize 
Integrity of Student Test Score Results: Yes; 
Development of a Form for Documenting Breaches: Yes; 
A Communications Plan for All Stakeholders to Follow if a Breach 
Occurs: Yes. 

NY; 
Procedures to Prevent Potential Security Breaches: Yes; 
A Recovery Plan for how to Mitigate a Security Breach: [Empty]; 
Information on Potential Consequences to Individual(s) Responsible for 
the Breach: Yes; 
Procedures to be Invoked if Security Breaches Occur that Jeopardize 
Integrity of Student Test Score Results: Yes; 
Development of a Form for Documenting Breaches: Yes; 
A Communications Plan for All Stakeholders to Follow if a Breach 
Occurs: [Empty]. 

NC; 
Procedures to Prevent Potential Security Breaches: Yes; 
A Recovery Plan for how to Mitigate a Security Breach: Yes; 
Information on Potential Consequences to Individual(s) Responsible for 
the Breach: Yes; 
Procedures to be Invoked if Security Breaches Occur that Jeopardize 
Integrity of Student Test Score Results: Yes; 
Development of a Form for Documenting Breaches: Yes; 
A Communications Plan for All Stakeholders to Follow if a Breach 
Occurs: Yes. 

ND; 
Procedures to Prevent Potential Security Breaches: Yes; 
A Recovery Plan for how to Mitigate a Security Breach: [Empty]; 
Information on Potential Consequences to Individual(s) Responsible for 
the Breach: Yes; 
Procedures to be Invoked if Security Breaches Occur that Jeopardize 
Integrity of Student Test Score Results: Yes; 
Development of a Form for Documenting Breaches: Yes; 
A Communications Plan for All Stakeholders to Follow if a Breach 
Occurs: Yes. 

OH; 
Procedures to Prevent Potential Security Breaches: Yes; 
A Recovery Plan for how to Mitigate a Security Breach: Yes; 
Information on Potential Consequences to Individual(s) Responsible for 
the Breach: Yes; 
Procedures to be Invoked if Security Breaches Occur that Jeopardize 
Integrity of Student Test Score Results: Yes; 
Development of a Form for Documenting Breaches: Yes; 
A Communications Plan for All Stakeholders to Follow if a Breach 
Occurs: Yes. 

OK; 
Procedures to Prevent Potential Security Breaches: Yes; 
A Recovery Plan for how to Mitigate a Security Breach: Yes; 
Information on Potential Consequences to Individual(s) Responsible for 
the Breach: Yes; 
Procedures to be Invoked if Security Breaches Occur that Jeopardize 
Integrity of Student Test Score Results: Yes; 
Development of a Form for Documenting Breaches: Yes; 
A Communications Plan for All Stakeholders to Follow if a Breach 
Occurs: Yes. 

OR; 
Procedures to Prevent Potential Security Breaches: Yes; 
A Recovery Plan for how to Mitigate a Security Breach: Yes; 
Information on Potential Consequences to Individual(s) Responsible for 
the Breach: Yes; 
Procedures to be Invoked if Security Breaches Occur that Jeopardize 
Integrity of Student Test Score Results: Yes; 
Development of a Form for Documenting Breaches: Yes; 
A Communications Plan for All Stakeholders to Follow if a Breach 
Occurs: Yes. 

PA; 
Procedures to Prevent Potential Security Breaches: Yes; 
A Recovery Plan for how to Mitigate a Security Breach: [Empty]; 
Information on Potential Consequences to Individual(s) Responsible for 
the Breach: Yes; 
Procedures to be Invoked if Security Breaches Occur that Jeopardize 
Integrity of Student Test Score Results: Yes; 
Development of a Form for Documenting Breaches: Yes; 
A Communications Plan for All Stakeholders to Follow if a Breach 
Occurs: Yes. 

RI; 
Procedures to Prevent Potential Security Breaches: Yes; 
A Recovery Plan for how to Mitigate a Security Breach: Yes; 
Information on Potential Consequences to Individual(s) Responsible for 
the Breach: Yes; 
Procedures to be Invoked if Security Breaches Occur that Jeopardize 
Integrity of Student Test Score Results: Yes; 
Development of a Form for Documenting Breaches: Yes; 
A Communications Plan for All Stakeholders to Follow if a Breach 
Occurs: [Empty]. 

SC; 
Procedures to Prevent Potential Security Breaches: Yes; 
A Recovery Plan for how to Mitigate a Security Breach: Yes; 
Information on Potential Consequences to Individual(s) Responsible for 
the Breach: Yes; 
Procedures to be Invoked if Security Breaches Occur that Jeopardize 
Integrity of Student Test Score Results: Yes; 
Development of a Form for Documenting Breaches: Yes; 
A Communications Plan for All Stakeholders to Follow if a Breach 
Occurs: Yes. 

SD; 
Procedures to Prevent Potential Security Breaches: Yes; 
A Recovery Plan for how to Mitigate a Security Breach: [Empty]; 
Information on Potential Consequences to Individual(s) Responsible for 
the Breach: Yes; 
Procedures to be Invoked if Security Breaches Occur that Jeopardize 
Integrity of Student Test Score Results: Yes; 
Development of a Form for Documenting Breaches: Yes; 
A Communications Plan for All Stakeholders to Follow if a Breach 
Occurs: Yes. 

TN; 
Procedures to Prevent Potential Security Breaches: Yes; 
A Recovery Plan for how to Mitigate a Security Breach: Yes; 
Information on Potential Consequences to Individual(s) Responsible for 
the Breach: Yes; 
Procedures to be Invoked if Security Breaches Occur that Jeopardize 
Integrity of Student Test Score Results: Yes; 
Development of a Form for Documenting Breaches: Yes; 
A Communications Plan for All Stakeholders to Follow if a Breach 
Occurs: Yes. 

TX; 
Procedures to Prevent Potential Security Breaches: Yes; 
A Recovery Plan for how to Mitigate a Security Breach: Yes; 
Information on Potential Consequences to Individual(s) Responsible for 
the Breach: Yes; 
Procedures to be Invoked if Security Breaches Occur that Jeopardize 
Integrity of Student Test Score Results: Yes; 
Development of a Form for Documenting Breaches: Yes; 
A Communications Plan for All Stakeholders to Follow if a Breach 
Occurs: Yes. 

UT; 
Procedures to Prevent Potential Security Breaches: [Empty]; 
A Recovery Plan for how to Mitigate a Security Breach: [Empty]; 
Information on Potential Consequences to Individual(s) Responsible for 
the Breach: [Empty]; 
Procedures to be Invoked if Security Breaches Occur that Jeopardize 
Integrity of Student Test Score Results: [Empty]; 
Development of a Form for Documenting Breaches: [Empty]; 
A Communications Plan for All Stakeholders to Follow if a Breach 
Occurs: [Empty]. 

VT; 
Procedures to Prevent Potential Security Breaches: Yes; 
A Recovery Plan for how to Mitigate a Security Breach: Yes; 
Information on Potential Consequences to Individual(s) Responsible for 
the Breach: Yes; 
Procedures to be Invoked if Security Breaches Occur that Jeopardize 
Integrity of Student Test Score Results: Yes; 
Development of a Form for Documenting Breaches: [Empty]; 
A Communications Plan for All Stakeholders to Follow if a Breach 
Occurs: Yes. 

VA; 
Procedures to Prevent Potential Security Breaches: Yes; 
A Recovery Plan for how to Mitigate a Security Breach: Yes; 
Information on Potential Consequences to Individual(s) Responsible for 
the Breach: Yes; 
Procedures to be Invoked if Security Breaches Occur that Jeopardize 
Integrity of Student Test Score Results: Yes; 
Development of a Form for Documenting Breaches: Yes; 
A Communications Plan for All Stakeholders to Follow if a Breach 
Occurs: Yes. 

WA; 
Procedures to Prevent Potential Security Breaches: Yes; 
A Recovery Plan for how to Mitigate a Security Breach: Yes; 
Information on Potential Consequences to Individual(s) Responsible for 
the Breach: Yes; 
Procedures to be Invoked if Security Breaches Occur that Jeopardize 
Integrity of Student Test Score Results: Yes; 
Development of a Form for Documenting Breaches: Yes; 
A Communications Plan for All Stakeholders to Follow if a Breach 
Occurs: Yes. 

WV; 
Procedures to Prevent Potential Security Breaches: Yes; 
A Recovery Plan for how to Mitigate a Security Breach: [Empty]; 
Information on Potential Consequences to Individual(s) Responsible for 
the Breach: Yes; 
Procedures to be Invoked if Security Breaches Occur that Jeopardize 
Integrity of Student Test Score Results: Yes; 
Development of a Form for Documenting Breaches: Yes; 
A Communications Plan for All Stakeholders to Follow if a Breach 
Occurs: Yes. 

WI; 
Procedures to Prevent Potential Security Breaches: Yes; 
A Recovery Plan for how to Mitigate a Security Breach: Yes; 
Information on Potential Consequences to Individual(s) Responsible for 
the Breach: Yes; 
Procedures to be Invoked if Security Breaches Occur that Jeopardize 
Integrity of Student Test Score Results: Yes; 
Development of a Form for Documenting Breaches: [Empty]; 
A Communications Plan for All Stakeholders to Follow if a Breach 
Occurs: Yes. 

WY; 
Procedures to Prevent Potential Security Breaches: [Empty]; 
A Recovery Plan for how to Mitigate a Security Breach: [Empty]; 
Information on Potential Consequences to Individual(s) Responsible for 
the Breach: [Empty]; 
Procedures to be Invoked if Security Breaches Occur that Jeopardize 
Integrity of Student Test Score Results: [Empty]; 
Development of a Form for Documenting Breaches: [Empty]; 
A Communications Plan for All Stakeholders to Follow if a Breach 
Occurs: [Empty]. 

Source: GAO survey of state testing directors. 

[End of table] 

Table 4: Test Administration: 

Key: 

1. Procedures for Proper Handling of Secure Materials; 
2. Procedures for Secure Storage of Materials Prior to Test 
Administration; 
3. Procedures for Secure Storage of Materials During the Test; 
4. Procedures for Secure Storage of Materials After the Test; 
5. Procedures for Proper Handling of Tests Given with Accommodations 
and/or in Alternate Assessment Formats; 
6. Requirements to Obtain Confidentiality Agreements/Oaths from 
Proctors and/or Administrators; 
7. Rules and Procedures to Prevent/Respond to Instances of Test 
Administration Irregularities and/or Cheating; 
8. Requirements that Teachers Not Proctor their Own Classrooms for 
Statewide Tests; 
9. Identification of a Test Administrator to Student Ratio; 
10. Identification of Rooms for Administration and Their Requirements; 
11. Identification of Allowable and Expressly Prohibited Materials; 
12. Roles and Responsibilities for Assessment Proctors; 
13. An Overview of State Assessment Program, including laws and 
regulations; 
14. General Information About Particular Assessments; 
15. Ethical Practices; 
16. Regulations or Codes; 
17. Roles and Responsibilities of District and School Staff; 
18. Process for Determining Accommodations; 
19. Participation Requirements for Students in the Assessment Program; 
20. General Administration Guidance; 
21. Provision of Accurate Student Information and Demographics; 
22. Reports Available Following Test Administration; 
23. Necessary Forms for the Assessment Program; 
24. Information on School Security Breaches or Test Irregularities; 
25. Procedures for Administration of Alternate Assessments; 
26. Procedures for Ordering Additional Materials; 
27. Preparation of Testing Sites; 
28. Secure Distribution of Test Materials; 
29. Maintaining a Secure Inventory of Returned Test Materials; 
30. Procedures for Returning Test Materials to the Service Provider; 
31. Forms Used During Test Administration; 
32. Recording Seating Chart Information. 

AL; 
1: Yes; 
2: Yes; 
3: Yes; 
4: Yes; 
5: Yes; 
6: Yes; 
7: Yes; 
8: [Empty]; 
9: Yes; 
10: Yes; 
11: Yes; 
12: Yes; 
13: Yes; 
14: Yes; 
15: Yes; 
16: Yes; 
17: Yes; 
18: Yes; 
19: Yes; 
20: Yes; 
21: Yes; 
22: Yes; 
23: Yes; 
24: Yes; 
25: Yes; 
26: Yes; 
27: Yes; 
28: Yes; 
29: Yes; 
30: Yes; 
31: Yes; 
32: Yes. 

AK; 
1: Yes; 
2: Yes; 
3: [Empty]; 
4: Yes; 
5: Yes; 
6: Yes; 
7: Yes; 
8: Yes; 
9: [Empty]; 
10: [Empty]; 
11: [Empty]; 
12: [Empty]; 
13: [Empty]; 
14: [Empty]; 
15: [Empty]; 
16: [Empty]; 
17: [Empty]; 
18: [Empty]; 
19: [Empty]; 
20: [Empty]; 
21: [Empty]; 
22: [Empty]; 
23: [Empty]; 
24: [Empty]; 
25: [Empty]; 
26: [Empty]; 
27: [Empty]; 
28: [Empty]; 
29: [Empty]; 
30: [Empty]; 
31: [Empty]; 
32: [Empty]. 

AZ; 
1: Yes; 
2: Yes; 
3: Yes; 
4: Yes; 
5: Yes; 
6: Yes; 
7: Yes; 
8: [Empty]; 
9: [Empty]; 
10: [Empty]; 
11: Yes; 
12: Yes; 
13: Yes; 
14: Yes; 
15: Yes; 
16: Yes; 
17: Yes; 
18: Yes; 
19: Yes; 
20: Yes; 
21: Yes; 
22: Yes; 
23: Yes; 
24: Yes; 
25: Yes; 
26: Yes; 
27: Yes; 
28: Yes; 
29: Yes; 
30: Yes; 
31: Yes; 
32: [Empty]. 

AR; 
1: Yes; 
2: Yes; 
3: Yes; 
4: Yes; 
5: Yes; 
6: Yes; 
7: Yes; 
8: [Empty]; 
9: Yes; 
10: [Empty]; 
11: Yes; 
12: Yes; 
13: Yes; 
14: Yes; 
15: Yes; 
16: Yes; 
17: Yes; 
18: Yes; 
19: Yes; 
20: Yes; 
21: Yes; 
22: [Empty]; 
23: Yes; 
24: Yes; 
25: Yes; 
26: Yes; 
27: Yes; 
28: Yes; 
29: Yes; 
30: Yes; 
31: Yes; 
32: [Empty]. 

CA; 
1: Yes; 
2: Yes; 
3: Yes; 
4: Yes; 
5: Yes; 
6: Yes; 
7: Yes; 
8: [Empty]; 
9: [Empty]; 
10: Yes; 
11: Yes; 
12: Yes; 
13: Yes; 
14: Yes; 
15: Yes; 
16: Yes; 
17: Yes; 
18: Yes; 
19: Yes; 
20: Yes; 
21: Yes; 
22: Yes; 
23: Yes; 
24: Yes; 
25: Yes; 
26: Yes; 
27: Yes; 
28: Yes; 
29: Yes; 
30: Yes; 
31: Yes; 
32: [Empty]. 

CO; 
1: Yes; 
2: Yes; 
3: Yes; 
4: Yes; 
5: Yes; 
6: Yes; 
7: Yes; 
8: [Empty]; 
9: Yes; 
10: Yes; 
11: Yes; 
12: Yes; 
13: Yes; 
14: Yes; 
15: Yes; 
16: Yes; 
17: Yes; 
18: Yes; 
19: Yes; 
20: Yes; 
21: Yes; 
22: Yes; 
23: Yes; 
24: Yes; 
25: Yes; 
26: Yes; 
27: Yes; 
28: Yes; 
29: Yes; 
30: Yes; 
31: Yes; 
32: Yes. 

CT; 
1: Yes; 
2: Yes; 
3: Yes; 
4: Yes; 
5: Yes; 
6: [Empty]; 
7: [Empty]; 
8: [Empty]; 
9: [Empty]; 
10: Yes; 
11: Yes; 
12: Yes; 
13: Yes; 
14: Yes; 
15: [Empty]; 
16: Yes; 
17: Yes; 
18: Yes; 
19: Yes; 
20: Yes; 
21: Yes; 
22: Yes; 
23: Yes; 
24: Yes; 
25: Yes; 
26: Yes; 
27: Yes; 
28: Yes; 
29: Yes; 
30: Yes; 
31: [Empty]; 
32: [Empty]. 

DC; 
1: Yes; 
2: Yes; 
3: Yes; 
4: Yes; 
5: Yes; 
6: Yes; 
7: Yes; 
8: Yes; 
9: Yes; 
10: Yes; 
11: Yes; 
12: [Empty]; 
13: Yes; 
14: Yes; 
15: Yes; 
16: Yes; 
17: Yes; 
18: Yes; 
19: Yes; 
20: Yes; 
21: Yes; 
22: Yes; 
23: Yes; 
24: Yes; 
25: Yes; 
26: Yes; 
27: Yes; 
28: Yes; 
29: Yes; 
30: Yes; 
31: Yes; 
32: [Empty]. 

DE; 
1: Yes; 
2: Yes; 
3: [Empty]; 
4: [Empty]; 
5: Yes; 
6: Yes; 
7: Yes; 
8: [Empty]; 
9: [Empty]; 
10: [Empty]; 
11: Yes; 
12: Yes; 
13: Yes; 
14: Yes; 
15: Yes; 
16: Yes; 
17: Yes; 
18: Yes; 
19: Yes; 
20: Yes; 
21: Yes; 
22: Yes; 
23: Yes; 
24: Yes; 
25: Yes; 
26: [Empty]; 
27: Yes; 
28: Yes; 
29: Yes; 
30: Yes; 
31: [Empty]; 
32: [Empty]. 

FL; 
1: Yes; 
2: Yes; 
3: Yes; 
4: Yes; 
5: Yes; 
6: Yes; 
7: Yes; 
8: [Empty]; 
9: Yes; 
10: Yes; 
11: Yes; 
12: Yes; 
13: Yes; 
14: Yes; 
15: Yes; 
16: Yes; 
17: Yes; 
18: Yes; 
19: Yes; 
20: Yes; 
21: Yes; 
22: [Empty]; 
23: Yes; 
24: Yes; 
25: Yes; 
26: Yes; 
27: Yes; 
28: Yes; 
29: Yes; 
30: Yes; 
31: Yes; 
32: Yes. 

GA; 
1: Yes; 
2: Yes; 
3: Yes; 
4: Yes; 
5: Yes; 
6: [Empty]; 
7: Yes; 
8: [Empty]; 
9: Yes; 
10: Yes; 
11: Yes; 
12: Yes; 
13: Yes; 
14: Yes; 
15: Yes; 
16: Yes; 
17: Yes; 
18: Yes; 
19: Yes; 
20: Yes; 
21: Yes; 
22: Yes; 
23: Yes; 
24: Yes; 
25: Yes; 
26: Yes; 
27: Yes; 
28: Yes; 
29: Yes; 
30: Yes; 
31: Yes; 
32: [Empty]. 

HI; 
1: Yes; 
2: Yes; 
3: Yes; 
4: Yes; 
5: Yes; 
6: [Empty]; 
7: Yes; 
8: [Empty]; 
9: [Empty]; 
10: [Empty]; 
11: [Empty]; 
12: [Empty]; 
13: [Empty]; 
14: [Empty]; 
15: [Empty]; 
16: [Empty]; 
17: [Empty]; 
18: [Empty]; 
19: [Empty]; 
20: [Empty]; 
21: [Empty]; 
22: [Empty]; 
23: [Empty]; 
24: [Empty]; 
25: [Empty]; 
26: [Empty]; 
27: [Empty]; 
28: [Empty]; 
29: [Empty]; 
30: [Empty]; 
31: [Empty]; 
32: [Empty]. 

ID; 
1: Yes; 
2: Yes; 
3: Yes; 
4: Yes; 
5: Yes; 
6: Yes; 
7: Yes; 
8: [Empty]; 
9: Yes; 
10: Yes; 
11: Yes; 
12: Yes; 
13: Yes; 
14: Yes; 
15: Yes; 
16: Yes; 
17: Yes; 
18: Yes; 
19: Yes; 
20: Yes; 
21: Yes; 
22: Yes; 
23: Yes; 
24: [Empty]; 
25: Yes; 
26: Yes; 
27: Yes; 
28: Yes; 
29: Yes; 
30: Yes; 
31: Yes; 
32: [Empty]. 

IL; 
1: Yes; 
2: Yes; 
3: Yes; 
4: Yes; 
5: Yes; 
6: [Empty]; 
7: Yes; 
8: [Empty]; 
9: [Empty]; 
10: [Empty]; 
11: Yes; 
12: Yes; 
13: Yes; 
14: Yes; 
15: Yes; 
16: Yes; 
17: Yes; 
18: Yes; 
19: Yes; 
20: Yes; 
21: [Empty]; 
22: [Empty]; 
23: Yes; 
24: Yes; 
25: Yes; 
26: Yes; 
27: Yes; 
28: Yes; 
29: Yes; 
30: Yes; 
31: Yes; 
32: [Empty]. 

IN; 
1: Yes; 
2: Yes; 
3: Yes; 
4: Yes; 
5: Yes; 
6: Yes; 
7: Yes; 
8: [Empty]; 
9: [Empty]; 
10: [Empty]; 
11: Yes; 
12: Yes; 
13: Yes; 
14: Yes; 
15: Yes; 
16: Yes; 
17: Yes; 
18: Yes; 
19: Yes; 
20: Yes; 
21: Yes; 
22: [Empty]; 
23: Yes; 
24: Yes; 
25: Yes; 
26: Yes; 
27: [Empty]; 
28: Yes; 
29: Yes; 
30: Yes; 
31: Yes; 
32: [Empty]. 

IA; 
1: Yes; 
2: Yes; 
3: Yes; 
4: Yes; 
5: Yes; 
6: Yes; 
7: Yes; 
8: [Empty]; 
9: [Empty]; 
10: [Empty]; 
11: Yes; 
12: Yes; 
13: Yes; 
14: Yes; 
15: Yes; 
16: Yes; 
17: Yes; 
18: Yes; 
19: Yes; 
20: Yes; 
21: Yes; 
22: Yes; 
23: Yes; 
24: Yes; 
25: Yes; 
26: Yes; 
27: Yes; 
28: Yes; 
29: Yes; 
30: Yes; 
31: Yes; 
32: [Empty]. 

KS; 
1: Yes; 
2: Yes; 
3: Yes; 
4: Yes; 
5: Yes; 
6: Yes; 
7: Yes; 
8: [Empty]; 
9: [Empty]; 
10: Yes; 
11: Yes; 
12: [Empty]; 
13: Yes; 
14: Yes; 
15: Yes; 
16: Yes; 
17: Yes; 
18: Yes; 
19: Yes; 
20: [Empty]; 
21: Yes; 
22: Yes; 
23: Yes; 
24: Yes; 
25: Yes; 
26: Yes; 
27: Yes; 
28: Yes; 
29: Yes; 
30: Yes; 
31: Yes; 
32: [Empty]. 

KY; 
1: Yes; 
2: Yes; 
3: Yes; 
4: Yes; 
5: Yes; 
6: Yes; 
7: Yes; 
8: [Empty]; 
9: [Empty]; 
10: Yes; 
11: Yes; 
12: Yes; 
13: Yes; 
14: Yes; 
15: Yes; 
16: Yes; 
17: Yes; 
18: Yes; 
19: Yes; 
20: Yes; 
21: Yes; 
22: Yes; 
23: Yes; 
24: Yes; 
25: Yes; 
26: Yes; 
27: Yes; 
28: Yes; 
29: Yes; 
30: Yes; 
31: Yes; 
32: Yes. 

LA; 
1: Yes; 
2: Yes; 
3: Yes; 
4: Yes; 
5: Yes; 
6: Yes; 
7: Yes; 
8: Yes; 
9: Yes; 
10: [Empty]; 
11: Yes; 
12: Yes; 
13: Yes; 
14: Yes; 
15: Yes; 
16: Yes; 
17: Yes; 
18: Yes; 
19: Yes; 
20: Yes; 
21: Yes; 
22: Yes; 
23: Yes; 
24: Yes; 
25: Yes; 
26: Yes; 
27: Yes; 
28: Yes; 
29: Yes; 
30: Yes; 
31: Yes; 
32: [Empty]. 

ME; 
1: Yes; 
2: Yes; 
3: Yes; 
4: Yes; 
5: Yes; 
6: Yes; 
7: Yes; 
8: [Empty]; 
9: Yes; 
10: Yes; 
11: Yes; 
12: Yes; 
13: [Empty]; 
14: Yes; 
15: Yes; 
16: Yes; 
17: Yes; 
18: Yes; 
19: Yes; 
20: Yes; 
21: Yes; 
22: Yes; 
23: Yes; 
24: Yes; 
25: Yes; 
26: Yes; 
27: Yes; 
28: Yes; 
29: Yes; 
30: Yes; 
31: Yes; 
32: Yes. 

MD; 
1: Yes; 
2: Yes; 
3: Yes; 
4: Yes; 
5: Yes; 
6: Yes; 
7: Yes; 
8: [Empty]; 
9: [Empty]; 
10: Yes; 
11: Yes; 
12: Yes; 
13: Yes; 
14: Yes; 
15: Yes; 
16: Yes; 
17: Yes; 
18: Yes; 
19: Yes; 
20: Yes; 
21: Yes; 
22: Yes; 
23: Yes; 
24: Yes; 
25: Yes; 
26: Yes; 
27: Yes; 
28: Yes; 
29: Yes; 
30: Yes; 
31: Yes; 
32: [Empty]. 

MA; 
1: Yes; 
2: Yes; 
3: [Empty]; 
4: Yes; 
5: Yes; 
6: Yes; 
7: Yes; 
8: [Empty]; 
9: [Empty]; 
10: Yes; 
11: Yes; 
12: Yes; 
13: Yes; 
14: Yes; 
15: Yes; 
16: [Empty]; 
17: Yes; 
18: Yes; 
19: Yes; 
20: Yes; 
21: Yes; 
22: [Empty]; 
23: Yes; 
24: Yes; 
25: Yes; 
26: Yes; 
27: Yes; 
28: Yes; 
29: Yes; 
30: Yes; 
31: Yes; 
32: [Empty]. 

MI; 
1: Yes; 
2: Yes; 
3: Yes; 
4: Yes; 
5: Yes; 
6: Yes; 
7: Yes; 
8: [Empty]; 
9: [Empty]; 
10: Yes; 
11: Yes; 
12: Yes; 
13: [Empty]; 
14: Yes; 
15: Yes; 
16: Yes; 
17: Yes; 
18: [Empty]; 
19: Yes; 
20: Yes; 
21: Yes; 
22: [Empty]; 
23: Yes; 
24: Yes; 
25: Yes; 
26: Yes; 
27: Yes; 
28: Yes; 
29: Yes; 
30: Yes; 
31: Yes; 
32: [Empty]. 

MN; 
1: Yes; 
2: Yes; 
3: Yes; 
4: Yes; 
5: Yes; 
6: Yes; 
7: Yes; 
8: [Empty]; 
9: Yes; 
10: Yes; 
11: Yes; 
12: Yes; 
13: Yes; 
14: Yes; 
15: Yes; 
16: Yes; 
17: Yes; 
18: Yes; 
19: Yes; 
20: Yes; 
21: Yes; 
22: Yes; 
23: Yes; 
24: Yes; 
25: Yes; 
26: Yes; 
27: Yes; 
28: Yes; 
29: Yes; 
30: Yes; 
31: Yes; 
32: [Empty]. 

MS; 
1: Yes; 
2: Yes; 
3: Yes; 
4: Yes; 
5: Yes; 
6: Yes; 
7: Yes; 
8: [Empty]; 
9: Yes; 
10: [Empty]; 
11: Yes; 
12: Yes; 
13: Yes; 
14: Yes; 
15: Yes; 
16: Yes; 
17: Yes; 
18: Yes; 
19: Yes; 
20: Yes; 
21: Yes; 
22: Yes; 
23: Yes; 
24: Yes; 
25: Yes; 
26: Yes; 
27: Yes; 
28: Yes; 
29: Yes; 
30: Yes; 
31: Yes; 
32: Yes. 

MO; 
1: Yes; 
2: Yes; 
3: Yes; 
4: Yes; 
5: Yes; 
6: [Empty]; 
7: Yes; 
8: [Empty]; 
9: [Empty]; 
10: [Empty]; 
11: Yes; 
12: Yes; 
13: Yes; 
14: Yes; 
15: Yes; 
16: [Empty]; 
17: Yes; 
18: Yes; 
19: Yes; 
20: Yes; 
21: [Empty]; 
22: [Empty]; 
23: Yes; 
24: Yes; 
25: Yes; 
26: Yes; 
27: Yes; 
28: Yes; 
29: Yes; 
30: Yes; 
31: Yes; 
32: [Empty]. 

MT; 
1: [Empty]; 
2: [Empty]; 
3: [Empty]; 
4: [Empty]; 
5: [Empty]; 
6: [Empty]; 
7: [Empty]; 
8: [Empty]; 
9: [Empty]; 
10: [Empty]; 
11: Yes; 
12: Yes; 
13: [Empty]; 
14: Yes; 
15: [Empty]; 
16: [Empty]; 
17: Yes; 
18: Yes; 
19: Yes; 
20: Yes; 
21: Yes; 
22: Yes; 
23: Yes; 
24: Yes; 
25: Yes; 
26: Yes; 
27: Yes; 
28: Yes; 
29: Yes; 
30: Yes; 
31: Yes; 
32: [Empty]. 

NE; 
1: Yes; 
2: Yes; 
3: Yes; 
4: Yes; 
5: Yes; 
6: Yes; 
7: Yes; 
8: [Empty]; 
9: Yes; 
10: Yes; 
11: Yes; 
12: Yes; 
13: Yes; 
14: Yes; 
15: Yes; 
16: Yes; 
17: Yes; 
18: Yes; 
19: Yes; 
20: Yes; 
21: Yes; 
22: Yes; 
23: Yes; 
24: Yes; 
25: Yes; 
26: Yes; 
27: Yes; 
28: Yes; 
29: Yes; 
30: Yes; 
31: Yes; 
32: [Empty]. 

NV; 
1: Yes; 
2: Yes; 
3: Yes; 
4: Yes; 
5: Yes; 
6: [Empty]; 
7: Yes; 
8: [Empty]; 
9: [Empty]; 
10: [Empty]; 
11: Yes; 
12: Yes; 
13: Yes; 
14: Yes; 
15: Yes; 
16: Yes; 
17: Yes; 
18: Yes; 
19: Yes; 
20: Yes; 
21: Yes; 
22: Yes; 
23: Yes; 
24: Yes; 
25: Yes; 
26: Yes; 
27: Yes; 
28: Yes; 
29: Yes; 
30: Yes; 
31: Yes; 
32: [Empty]. 

NH; 
1: Yes; 
2: Yes; 
3: Yes; 
4: Yes; 
5: Yes; 
6: Yes; 
7: Yes; 
8: [Empty]; 
9: [Empty]; 
10: [Empty]; 
11: Yes; 
12: Yes; 
13: [Empty]; 
14: Yes; 
15: [Empty]; 
16: [Empty]; 
17: Yes; 
18: Yes; 
19: Yes; 
20: Yes; 
21: Yes; 
22: Yes; 
23: Yes; 
24: Yes; 
25: Yes; 
26: Yes; 
27: Yes; 
28: Yes; 
29: Yes; 
30: Yes; 
31: Yes; 
32: [Empty]. 

NJ; 
1: Yes; 
2: Yes; 
3: Yes; 
4: Yes; 
5: Yes; 
6: Yes; 
7: Yes; 
8: [Empty]; 
9: [Empty]; 
10: [Empty]; 
11: [Empty]; 
12: Yes; 
13: [Empty]; 
14: [Empty]; 
15: [Empty]; 
16: [Empty]; 
17: [Empty]; 
18: [Empty]; 
19: [Empty]; 
20: [Empty]; 
21: [Empty]; 
22: [Empty]; 
23: [Empty]; 
24: [Empty]; 
25: [Empty]; 
26: [Empty]; 
27: [Empty]; 
28: [Empty]; 
29: [Empty]; 
30: [Empty]; 
31: [Empty]; 
32: [Empty]. 

NM; 
1: Yes; 
2: Yes; 
3: Yes; 
4: Yes; 
5: Yes; 
6: Yes; 
7: Yes; 
8: Yes; 
9: Yes; 
10: Yes; 
11: Yes; 
12: Yes; 
13: Yes; 
14: Yes; 
15: Yes; 
16: Yes; 
17: Yes; 
18: Yes; 
19: Yes; 
20: Yes; 
21: Yes; 
22: Yes; 
23: Yes; 
24: Yes; 
25: Yes; 
26: Yes; 
27: Yes; 
28: Yes; 
29: Yes; 
30: Yes; 
31: Yes; 
32: [Empty]. 

NY; 
1: Yes; 
2: Yes; 
3: Yes; 
4: Yes; 
5: Yes; 
6: Yes; 
7: Yes; 
8: [Empty]; 
9: [Empty]; 
10: Yes; 
11: Yes; 
12: Yes; 
13: Yes; 
14: Yes; 
15: Yes; 
16: Yes; 
17: Yes; 
18: Yes; 
19: Yes; 
20: Yes; 
21: Yes; 
22: Yes; 
23: Yes; 
24: Yes; 
25: Yes; 
26: Yes; 
27: Yes; 
28: Yes; 
29: Yes; 
30: Yes; 
31: Yes; 
32: [Empty]. 

NC; 
1: Yes; 
2: Yes; 
3: Yes; 
4: Yes; 
5: Yes; 
6: Yes; 
7: Yes; 
8: [Empty]; 
9: Yes; 
10: Yes; 
11: Yes; 
12: Yes; 
13: Yes; 
14: Yes; 
15: Yes; 
16: Yes; 
17: Yes; 
18: Yes; 
19: Yes; 
20: Yes; 
21: Yes; 
22: Yes; 
23: Yes; 
24: Yes; 
25: Yes; 
26: Yes; 
27: Yes; 
28: Yes; 
29: Yes; 
30: Yes; 
31: Yes; 
32: [Empty]. 

ND; 
1: Yes; 
2: Yes; 
3: Yes; 
4: Yes; 
5: Yes; 
6: Yes; 
7: Yes; 
8: [Empty]; 
9: [Empty]; 
10: Yes; 
11: Yes; 
12: Yes; 
13: Yes; 
14: Yes; 
15: Yes; 
16: Yes; 
17: Yes; 
18: Yes; 
19: Yes; 
20: Yes; 
21: Yes; 
22: Yes; 
23: Yes; 
24: Yes; 
25: Yes; 
26: Yes; 
27: Yes; 
28: Yes; 
29: Yes; 
30: Yes; 
31: Yes; 
32: [Empty]. 

OH; 
1: Yes; 
2: Yes; 
3: Yes; 
4: Yes; 
5: Yes; 
6: [Empty]; 
7: Yes; 
8: [Empty]; 
9: Yes; 
10: [Empty]; 
11: Yes; 
12: Yes; 
13: Yes; 
14: Yes; 
15: Yes; 
16: Yes; 
17: Yes; 
18: Yes; 
19: Yes; 
20: Yes; 
21: Yes; 
22: Yes; 
23: Yes; 
24: Yes; 
25: Yes; 
26: Yes; 
27: Yes; 
28: Yes; 
29: Yes; 
30: Yes; 
31: Yes; 
32: [Empty]. 

OK; 
1: Yes; 
2: Yes; 
3: Yes; 
4: Yes; 
5: Yes; 
6: Yes; 
7: Yes; 
8: Yes; 
9: Yes; 
10: Yes; 
11: Yes; 
12: Yes; 
13: Yes; 
14: Yes; 
15: Yes; 
16: Yes; 
17: Yes; 
18: Yes; 
19: Yes; 
20: Yes; 
21: Yes; 
22: Yes; 
23: Yes; 
24: Yes; 
25: Yes; 
26: [Empty]; 
27: Yes; 
28: Yes; 
29: [Empty]; 
30: Yes; 
31: Yes; 
32: [Empty]. 

OR; 
1: Yes; 
2: Yes; 
3: Yes; 
4: Yes; 
5: Yes; 
6: Yes; 
7: [Empty]; 
8: Yes; 
9: [Empty]; 
10: Yes; 
11: Yes; 
12: Yes; 
13: Yes; 
14: Yes; 
15: Yes; 
16: Yes; 
17: Yes; 
18: Yes; 
19: Yes; 
20: Yes; 
21: Yes; 
22: Yes; 
23: Yes; 
24: Yes; 
25: Yes; 
26: Yes; 
27: Yes; 
28: Yes; 
29: [Empty]; 
30: Yes; 
31: Yes; 
32: [Empty]. 

PA; 
1: Yes; 
2: Yes; 
3: Yes; 
4: Yes; 
5: Yes; 
6: Yes; 
7: Yes; 
8: [Empty]; 
9: [Empty]; 
10: [Empty]; 
11: Yes; 
12: Yes; 
13: Yes; 
14: Yes; 
15: Yes; 
16: [Empty]; 
17: Yes; 
18: Yes; 
19: Yes; 
20: Yes; 
21: Yes; 
22: [Empty]; 
23: Yes; 
24: Yes; 
25: Yes; 
26: Yes; 
27: Yes; 
28: Yes; 
29: Yes; 
30: Yes; 
31: Yes; 
32: [Empty]. 

RI; 
1: [Empty]; 
2: [Empty]; 
3: [Empty]; 
4: [Empty]; 
5: [Empty]; 
6: [Empty]; 
7: [Empty]; 
8: [Empty]; 
9: [Empty]; 
10: [Empty]; 
11: Yes; 
12: Yes; 
13: Yes; 
14: Yes; 
15: Yes; 
16: Yes; 
17: Yes; 
18: Yes; 
19: Yes; 
20: Yes; 
21: Yes; 
22: [Empty]; 
23: Yes; 
24: Yes; 
25: Yes; 
26: Yes; 
27: Yes; 
28: Yes; 
29: Yes; 
30: Yes; 
31: Yes; 
32: [Empty]. 

SC; 
1: Yes; 
2: Yes; 
3: Yes; 
4: Yes; 
5: Yes; 
6: Yes; 
7: Yes; 
8: [Empty]; 
9: [Empty]; 
10: Yes; 
11: Yes; 
12: Yes; 
13: Yes; 
14: Yes; 
15: Yes; 
16: [Empty]; 
17: Yes; 
18: Yes; 
19: Yes; 
20: Yes; 
21: [Empty]; 
22: Yes; 
23: Yes; 
24: Yes; 
25: Yes; 
26: Yes; 
27: Yes; 
28: Yes; 
29: Yes; 
30: Yes; 
31: Yes; 
32: [Empty]. 

SD; 
1: [Empty]; 
2: [Empty]; 
3: [Empty]; 
4: [Empty]; 
5: [Empty]; 
6: [Empty]; 
7: [Empty]; 
8: [Empty]; 
9: Yes; 
10: Yes; 
11: [Empty]; 
12: [Empty]; 
13: [Empty]; 
14: [Empty]; 
15: [Empty]; 
16: [Empty]; 
17: [Empty]; 
18: [Empty]; 
19: [Empty]; 
20: [Empty]; 
21: [Empty]; 
22: Yes; 
23: Yes; 
24: Yes; 
25: Yes; 
26: Yes; 
27: Yes; 
28: [Empty]; 
29: Yes; 
30: Yes; 
31: [Empty]; 
32: [Empty]. 

TN; 
1: Yes; 
2: Yes; 
3: Yes; 
4: Yes; 
5: Yes; 
6: Yes; 
7: Yes; 
8: [Empty]; 
9: [Empty]; 
10: Yes; 
11: Yes; 
12: Yes; 
13: Yes; 
14: Yes; 
15: Yes; 
16: Yes; 
17: Yes; 
18: Yes; 
19: Yes; 
20: Yes; 
21: Yes; 
22: Yes; 
23: Yes; 
24: Yes; 
25: [Empty]; 
26: Yes; 
27: [Empty]; 
28: Yes; 
29: Yes; 
30: Yes; 
31: Yes; 
32: [Empty]. 

TX; 
1: Yes; 
2: Yes; 
3: Yes; 
4: Yes; 
5: Yes; 
6: Yes; 
7: Yes; 
8: [Empty]; 
9: Yes; 
10: Yes; 
11: Yes; 
12: Yes; 
13: Yes; 
14: Yes; 
15: Yes; 
16: Yes; 
17: Yes; 
18: Yes; 
19: Yes; 
20: Yes; 
21: Yes; 
22: Yes; 
23: Yes; 
24: Yes; 
25: Yes; 
26: Yes; 
27: Yes; 
28: Yes; 
29: Yes; 
30: Yes; 
31: Yes; 
32: Yes. 

UT; 
1: Yes; 
2: Yes; 
3: Yes; 
4: Yes; 
5: Yes; 
6: [Empty]; 
7: Yes; 
8: [Empty]; 
9: [Empty]; 
10: Yes; 
11: Yes; 
12: Yes; 
13: Yes; 
14: Yes; 
15: Yes; 
16: Yes; 
17: Yes; 
18: Yes; 
19: Yes; 
20: [Empty]; 
21: [Empty]; 
22: Yes; 
23: Yes; 
24: Yes; 
25: Yes; 
26: Yes; 
27: Yes; 
28: Yes; 
29: Yes; 
30: Yes; 
31: Yes; 
32: Yes. 

VT; 
1: Yes; 
2: Yes; 
3: Yes; 
4: Yes; 
5: Yes; 
6: Yes; 
7: Yes; 
8: [Empty]; 
9: [Empty]; 
10: [Empty]; 
11: Yes; 
12: Yes; 
13: Yes; 
14: Yes; 
15: Yes; 
16: Yes; 
17: Yes; 
18: Yes; 
19: Yes; 
20: Yes; 
21: Yes; 
22: Yes; 
23: Yes; 
24: Yes; 
25: Yes; 
26: Yes; 
27: Yes; 
28: Yes; 
29: Yes; 
30: Yes; 
31: Yes; 
32: [Empty]. 

VA; 
1: Yes; 
2: Yes; 
3: Yes; 
4: Yes; 
5: Yes; 
6: Yes; 
7: Yes; 
8: [Empty]; 
9: Yes; 
10: Yes; 
11: Yes; 
12: Yes; 
13: Yes; 
14: Yes; 
15: Yes; 
16: Yes; 
17: Yes; 
18: Yes; 
19: Yes; 
20: Yes; 
21: Yes; 
22: Yes; 
23: Yes; 
24: Yes; 
25: Yes; 
26: Yes; 
27: Yes; 
28: Yes; 
29: Yes; 
30: Yes; 
31: Yes; 
32: [Empty]. 

WA; 
1: Yes; 
2: Yes; 
3: Yes; 
4: Yes; 
5: Yes; 
6: Yes; 
7: Yes; 
8: [Empty]; 
9: [Empty]; 
10: [Empty]; 
11: Yes; 
12: Yes; 
13: Yes; 
14: Yes; 
15: Yes; 
16: Yes; 
17: Yes; 
18: Yes; 
19: Yes; 
20: Yes; 
21: Yes; 
22: Yes; 
23: Yes; 
24: Yes; 
25: Yes; 
26: Yes; 
27: Yes; 
28: Yes; 
29: Yes; 
30: Yes; 
31: Yes; 
32: [Empty]. 

WV; 
1: Yes; 
2: Yes; 
3: Yes; 
4: Yes; 
5: Yes; 
6: Yes; 
7: Yes; 
8: [Empty]; 
9: [Empty]; 
10: [Empty]; 
11: Yes; 
12: Yes; 
13: Yes; 
14: Yes; 
15: Yes; 
16: Yes; 
17: Yes; 
18: Yes; 
19: Yes; 
20: Yes; 
21: Yes; 
22: Yes; 
23: Yes; 
24: Yes; 
25: Yes; 
26: Yes; 
27: Yes; 
28: Yes; 
29: Yes; 
30: Yes; 
31: Yes; 
32: [Empty]. 

WI; 
1: Yes; 
2: Yes; 
3: Yes; 
4: Yes; 
5: Yes; 
6: Yes; 
7: Yes; 
8: [Empty]; 
9: [Empty]; 
10: [Empty]; 
11: Yes; 
12: Yes; 
13: Yes; 
14: Yes; 
15: Yes; 
16: [Empty]; 
17: Yes; 
18: Yes; 
19: Yes; 
20: Yes; 
21: Yes; 
22: Yes; 
23: Yes; 
24: Yes; 
25: Yes; 
26: Yes; 
27: [Empty]; 
28: Yes; 
29: Yes; 
30: Yes; 
31: Yes; 
32: [Empty]. 

WY; 
1: Yes; 
2: Yes; 
3: Yes; 
4: Yes; 
5: Yes; 
6: Yes; 
7: Yes; 
8: [Empty]; 
9: [Empty]; 
10: [Empty]; 
11: Yes; 
12: Yes; 
13: [Empty]; 
14: Yes; 
15: Yes; 
16: [Empty]; 
17: Yes; 
18: Yes; 
19: Yes; 
20: Yes; 
21: Yes; 
22: Yes; 
23: [Empty]; 
24: Yes; 
25: Yes; 
26: Yes; 
27: Yes; 
28: Yes; 
29: Yes; 
30: Yes; 
31: Yes; 
32: [Empty]. 

Source: GAO survey of state testing directors. 

[End of table] 

Table 5: Protecting Secure Materials: 

Key: 

1. Procedures on how Security Issues should be Managed at State and 
Local Levels; 
2. Chain of Custody Procedures for Tracking all Secure Test Materials; 
3. Established and Documented Destination for Distribution; 
4. Plan to Account for and Return all Secure Materials; 
5. Plan for Secure Material's Disposition and Salvage; 
6. Procedures Describing What to Do when Test Materials are Missing; 
Procedures to Keep Facilities Secure: 
7. Physical Access Controls; 
8. Visitor Policy Regulations; 
9. Security System for Online Security; 
10. Procedures for Online Security; 
Chain of Custody Procedures: 
11. Procedures for the Handoff of Materials; 
12. Process to Request Additional Materials; 
13. Procedures Describing What to Do when Materials are Missing; 
14. Instructions on Reassembling Scorable and Secure Materials; 
15. Instructions on Shipping Materials to the Service Provider; 
16. Procedures for Recovering Materials Provided by the Client and 
Service Provider. 

AL; 
1: Yes; 
2: Yes; 
3: Yes; 
4: Yes; 
5: Yes; 
6: Yes; 
7: Yes; 
8: Yes; 
9: [Empty]; 
10: [Empty]; 
11: Yes; 
12: Yes; 
13: Yes; 
14: Yes; 
15: Yes; 
16: Yes. 

AK; 
1: Yes; 
2: Yes; 
3: Yes; 
4: [Empty]; 
5: Yes; 
6: Yes; 
7: [Empty]; 
8: [Empty]; 
9: [Empty]; 
10: [Empty]; 
11. Yes; 
12: Yes; 
13: Yes; 
14: Yes; 
15: Yes; 
16: Yes. 

AZ; 
1: Yes; 
2: Yes; 
3: Yes; 
4: Yes; 
5: Yes; 
6: Yes; 
7: Yes; 
8: [Empty]; 
9: [Empty]; 
10: [Empty]; 
11. Yes; 
12: Yes; 
13: Yes; 
14: Yes; 
15: Yes; 
16: Yes. 

AR; 
1: Yes; 
2: Yes; 
3: Yes; 
4: Yes; 
5: Yes; 
6: Yes; 
7: [Empty]; 
8: [Empty]; 
9: Yes; 
10: Yes; 
11. Yes; 
12: Yes; 
13: Yes; 
14: Yes; 
15: Yes; 
16: Yes. 

CA; 
1: Yes; 
2: Yes; 
3: Yes; 
4: Yes; 
5: Yes; 
6: Yes; 
7: Yes; 
8: Yes; 
9: Yes; 
10: Yes; 
11. [Empty]; 
12: [Empty]; 
13: [Empty]; 
14: [Empty]; 
15: [Empty]; 
16: [Empty]. 

CO; 
1: Yes; 
2: Yes; 
3: Yes; 
4: Yes; 
5: Yes; 
6: [Empty]; 
7: [Empty]; 
8: Yes; 
9: [Empty]; 
10: [Empty]; 
11. Yes; 
12: Yes; 
13: Yes; 
14: Yes; 
15: Yes; 
16: [Empty]. 

CT; 
1: Yes; 
2: Yes; 
3: Yes; 
4: Yes; 
5: [Empty]; 
6: Yes; 
7: [Empty]; 
8: [Empty]; 
9: Yes; 
10: Yes; 
11. [Empty]; 
12: [Empty]; 
13: [Empty]; 
14: [Empty]; 
15: [Empty]; 
16: [Empty]. 

DC; 
1: Yes; 
2: Yes; 
3: Yes; 
4: Yes; 
5: Yes; 
6: Yes; 
7: Yes; 
8: Yes; 
9: [Empty]; 
10: [Empty]; 
11. Yes; 
12: Yes; 
13: Yes; 
14: Yes; 
15: Yes; 
16: Yes. 

DE; 
1: Yes; 
2: Yes; 
3: [Empty]; 
4: Yes; 
5: [Empty]; 
6: Yes; 
7: [Empty]; 
8: Yes; 
9: Yes; 
10: Yes; 
11. Yes; 
12: Yes; 
13: Yes; 
14: Yes; 
15: [Empty]; 
16: Yes. 

FL; 
1: Yes; 
2: Yes; 
3: Yes; 
4: Yes; 
5: Yes; 
6: Yes; 
7: [Empty]; 
8: [Empty]; 
9: Yes; 
10: Yes; 
11. Yes; 
12: Yes; 
13: Yes; 
14: Yes; 
15: Yes; 
16: [Empty]. 

GA; 
1: Yes; 
2: Yes; 
3: Yes; 
4: Yes; 
5: Yes; 
6: Yes; 
7: Yes; 
8: Yes; 
9: Yes; 
10: Yes; 
11. Yes; 
12: Yes; 
13: Yes; 
14: Yes; 
15: Yes; 
16: Yes. 

HI; 
1: Yes; 
2: Yes; 
3: Yes; 
4: Yes; 
5: Yes; 
6: Yes; 
7: [Empty]; 
8: Yes; 
9: Yes; 
10: Yes; 
11. [Empty]; 
12: [Empty]; 
13: [Empty]; 
14: [Empty]; 
15: [Empty]; 
16: [Empty]. 

ID; 
1: Yes; 
2: Yes; 
3: Yes; 
4: Yes; 
5: Yes; 
6: Yes; 
7: [Empty]; 
8: [Empty]; 
9: Yes; 
10: Yes; 
11. Yes; 
12: Yes; 
13: Yes; 
14: Yes; 
15: Yes; 
16: Yes. 

IL; 
1: Yes; 
2: Yes; 
3: [Empty]; 
4: Yes; 
5: Yes; 
6: [Empty]; 
7: [Empty]; 
8: [Empty]; 
9: [Empty]; 
10: [Empty]; 
11. [Empty]; 
12: [Empty]; 
13: [Empty]; 
14: [Empty]; 
15: [Empty]; 
16: [Empty]. 

IN; 
1: Yes; 
2: Yes; 
3: Yes; 
4: Yes; 
5: Yes; 
6: Yes; 
7: [Empty]; 
8: [Empty]; 
9: Yes; 
10: Yes; 
11. Yes; 
12: Yes; 
13: Yes; 
14: Yes; 
15: Yes; 
16: Yes. 

IA; 
1: Yes; 
2: Yes; 
3: Yes; 
4: Yes; 
5: Yes; 
6: Yes; 
7: Yes; 
8: Yes; 
9: [Empty]; 
10: [Empty]; 
11. Yes; 
12: Yes; 
13: Yes; 
14: Yes; 
15: Yes; 
16: Yes. 

KS; 
1: Yes; 
2: [Empty]; 
3: [Empty]; 
4: [Empty]; 
5: [Empty]; 
6: [Empty]; 
7: [Empty]; 
8: [Empty]; 
9: [Empty]; 
10: [Empty]; 
11. Yes; 
12: Yes; 
13: [Empty]; 
14: [Empty]; 
15: [Empty]; 
16: [Empty]. 

KY; 
1: [Empty]; 
2: Yes; 
3: Yes; 
4: Yes; 
5: Yes; 
6: Yes; 
7: Yes; 
8: Yes; 
9: Yes; 
10: Yes; 
11. Yes; 
12: Yes; 
13: Yes; 
14: Yes; 
15: Yes; 
16: Yes. 

LA; 
1: Yes; 
2: Yes; 
3: Yes; 
4: Yes; 
5: Yes; 
6: Yes; 
7: Yes; 
8: [Empty]; 
9: Yes; 
10: Yes; 
11. [Empty]; 
12: [Empty]; 
13: [Empty]; 
14: [Empty]; 
15: [Empty]; 
16: [Empty]. 

ME; 
1: Yes; 
2: Yes; 
3: Yes; 
4: Yes; 
5: Yes; 
6: Yes; 
7: [Empty]; 
8: Yes; 
9: Yes; 
10: Yes; 
11. Yes; 
12: Yes; 
13: Yes; 
14: Yes; 
15: Yes; 
16: Yes. 

MD; 
1: Yes; 
2: Yes; 
3: Yes; 
4: Yes; 
5: Yes; 
6: Yes; 
7: Yes; 
8: Yes; 
9: Yes; 
10: Yes; 
11. Yes; 
12: Yes; 
13: Yes; 
14: Yes; 
15: Yes; 
16: Yes. 

MA; 
1: Yes; 
2: Yes; 
3: Yes; 
4: Yes; 
5: Yes; 
6: Yes; 
7: [Empty]; 
8: Yes; 
9: [Empty]; 
10: [Empty]; 
11. Yes; 
12: Yes; 
13: Yes; 
14: Yes; 
15: Yes; 
16: Yes. 

MI; 
1: Yes; 
2: Yes; 
3: Yes; 
4: Yes; 
5: Yes; 
6: Yes; 
7: [Empty]; 
8: Yes; 
9: Yes; 
10: Yes; 
11. Yes; 
12: Yes; 
13: Yes; 
14: Yes; 
15: Yes; 
16: [Empty]. 

MN; 
1: Yes; 
2: Yes; 
3: Yes; 
4: Yes; 
5: Yes; 
6: Yes; 
7: [Empty]; 
8: Yes; 
9: Yes; 
10: Yes; 
11. Yes; 
12: Yes; 
13: Yes; 
14: Yes; 
15: Yes; 
16: [Empty]. 

MS; 
1: Yes; 
2: Yes; 
3: Yes; 
4: Yes; 
5: Yes; 
6: Yes; 
7: [Empty]; 
8: Yes; 
9: [Empty]; 
10: Yes; 
11. Yes; 
12: Yes; 
13: Yes; 
14: Yes; 
15: Yes; 
16: Yes. 

MO; 
1: Yes; 
2: Yes; 
3: Yes; 
4: Yes; 
5: Yes; 
6: Yes; 
7: [Empty]; 
8: [Empty]; 
9: Yes; 
10: Yes; 
11. Yes; 
12: Yes; 
13: Yes; 
14: Yes; 
15: Yes; 
16: Yes. 

MT; 
1: Yes; 
2: Yes; 
3: Yes; 
4: Yes; 
5: Yes; 
6: Yes; 
7: [Empty]; 
8: [Empty]; 
9: Yes; 
10: Yes; 
11. [Empty]; 
12: [Empty]; 
13: [Empty]; 
14: [Empty]; 
15: [Empty]; 
16: [Empty]. 

NE; 
1: Yes; 
2: Yes; 
3: Yes; 
4: Yes; 
5: Yes; 
6: Yes; 
7: [Empty]; 
8: Yes; 
9: Yes; 
10: Yes; 
11. Yes; 
12: Yes; 
13: Yes; 
14: Yes; 
15: Yes; 
16: Yes. 

NV; 
1: Yes; 
2: Yes; 
3: Yes; 
4: Yes; 
5: Yes; 
6: Yes; 
7: Yes; 
8: Yes; 
9: [Empty]; 
10: [Empty]; 
11. Yes; 
12: Yes; 
13: Yes; 
14: Yes; 
15: Yes; 
16: Yes. 

NH; 
1: Yes; 
2: [Empty]; 
3: Yes; 
4: Yes; 
5: Yes; 
6: Yes; 
7: [Empty]; 
8: [Empty]; 
9: [Empty]; 
10: [Empty]; 
11. [Empty]; 
12: [Empty]; 
13: [Empty]; 
14: [Empty]; 
15: [Empty]; 
16: [Empty]. 

NJ; 
1: Yes; 
2: Yes; 
3: Yes; 
4: Yes; 
5: Yes; 
6: Yes; 
7: Yes; 
8: [Empty]; 
9: [Empty]; 
10: [Empty]; 
11. Yes; 
12: Yes; 
13: Yes; 
14: Yes; 
15: Yes; 
16: Yes. 

NM; 
1: Yes; 
2: Yes; 
3: Yes; 
4: Yes; 
5: Yes; 
6: Yes; 
7: Yes; 
8: Yes; 
9: [Empty]; 
10: [Empty]; 
11. Yes; 
12: Yes; 
13: Yes; 
14: Yes; 
15: [Empty]; 
16: Yes. 

NY; 
1: Yes; 
2: Yes; 
3: Yes; 
4: Yes; 
5: Yes; 
6: Yes; 
7: [Empty]; 
8: [Empty]; 
9: [Empty]; 
10: [Empty]; 
11. Yes; 
12: Yes; 
13: Yes; 
14: Yes; 
15: Yes; 
16: Yes. 

NC; 
1: Yes; 
2: Yes; 
3: Yes; 
4: Yes; 
5: Yes; 
6: Yes; 
7: Yes; 
8: Yes; 
9: Yes; 
10: Yes; 
11. Yes; 
12: Yes; 
13: Yes; 
14: Yes; 
15: Yes; 
16: Yes. 

ND; 
1: Yes; 
2: Yes; 
3: Yes; 
4: Yes; 
5: Yes; 
6: Yes; 
7: Yes; 
8: Yes; 
9: Yes; 
10: Yes; 
11. Yes; 
12: Yes; 
13: Yes; 
14: Yes; 
15: Yes; 
16: Yes. 

OH; 
1: Yes; 
2: Yes; 
3: Yes; 
4: Yes; 
5: Yes; 
6: Yes; 
7: [Empty]; 
8: [Empty]; 
9: [Empty]; 
10: [Empty]; 
11. Yes; 
12: Yes; 
13: Yes; 
14: Yes; 
15: Yes; 
16: Yes. 

OK; 
1: Yes; 
2: Yes; 
3: Yes; 
4: Yes; 
5: Yes; 
6: Yes; 
7: Yes; 
8: Yes; 
9: Yes; 
10: Yes; 
11. Yes; 
12: Yes; 
13: Yes; 
14: Yes; 
15: Yes; 
16: Yes. 

OR; 
1: Yes; 
2: Yes; 
3: Yes; 
4: Yes; 
5: Yes; 
6: Yes; 
7: Yes; 
8: Yes; 
9: Yes; 
10: Yes; 
11. Yes; 
12: Yes; 
13: [Empty]; 
14: [Empty]; 
15: Yes; 
16: Yes. 

PA; 
1: Yes; 
2: Yes; 
3: Yes; 
4: Yes; 
5: Yes; 
6: Yes; 
7: [Empty]; 
8: [Empty]; 
9: Yes; 
10: Yes; 
11. [Empty]; 
12: Yes; 
13: Yes; 
14: Yes; 
15: Yes; 
16: Yes. 

RI; 
1: Yes; 
2: Yes; 
3: [Empty]; 
4: Yes; 
5: Yes; 
6: Yes; 
7: [Empty]; 
8: [Empty]; 
9: [Empty]; 
10: Yes; 
11. [Empty]; 
12: Yes; 
13: Yes; 
14: [Empty]; 
15: Yes; 
16: Yes. 

SC; 
1: Yes; 
2: Yes; 
3: Yes; 
4: Yes; 
5: [Empty]; 
6: Yes; 
7: [Empty]; 
8: [Empty]; 
9: [Empty]; 
10: [Empty]; 
11. Yes; 
12: Yes; 
13: Yes; 
14: [Empty]; 
15: Yes; 
16: [Empty]. 

SD; 
1: Yes; 
2: [Empty]; 
3: Yes; 
4: Yes; 
5: Yes; 
6: Yes; 
7: Yes; 
8: [Empty]; 
9: [Empty]; 
10: [Empty]; 
11. [Empty]; 
12: Yes; 
13: Yes; 
14: [Empty]; 
15: Yes; 
16: Yes. 

TN; 
1: Yes; 
2: Yes; 
3: Yes; 
4: Yes; 
5: Yes; 
6: Yes; 
7: Yes; 
8: [Empty]; 
9: [Empty]; 
10: [Empty]; 
11. Yes; 
12: Yes; 
13: Yes; 
14: Yes; 
15: Yes; 
16: [Empty]. 

TEX; 
1: Yes; 
2: Yes; 
3: Yes; 
4: Yes; 
5: Yes; 
6: Yes; 
7: Yes; 
8: Yes; 
9: Yes; 
10: Yes; 
11. Yes; 
12: Yes; 
13: Yes; 
14: Yes; 
15: Yes; 
16: Yes. 

UT; 
1: Yes; 
2: Yes; 
3: Yes; 
4: Yes; 
5: Yes; 
6: Yes; 
7: [Empty]; 
8: [Empty]; 
9: Yes; 
10: Yes; 
11. Yes; 
12: Yes; 
13: Yes; 
14: Yes; 
15: Yes; 
16: [Empty]. 

VT; 
1: Yes; 
2: Yes; 
3: Yes; 
4: Yes; 
5: Yes; 
6: Yes; 
7: [Empty]; 
8: Yes; 
9: Yes; 
10: Yes; 
11. Yes; 
12: Yes; 
13: Yes; 
14: Yes; 
15: Yes; 
16: Yes. 

VA; 
1: Yes; 
2: Yes; 
3: Yes; 
4: Yes; 
5: Yes; 
6: Yes; 
7: Yes; 
8: Yes; 
9: Yes; 
10: Yes; 
11. Yes; 
12: Yes; 
13: Yes; 
14: Yes; 
15: Yes; 
16: Yes. 

WA; 
1: Yes; 
2: Yes; 
3: Yes; 
4: Yes; 
5: Yes; 
6: Yes; 
7: [Empty]; 
8: [Empty]; 
9: [Empty]; 
10: [Empty]; 
11. Yes; 
12: Yes; 
13: Yes; 
14: Yes; 
15: Yes; 
16: Yes. 

WV; 
1: Yes; 
2: Yes; 
3: Yes; 
4: Yes; 
5: Yes; 
6: Yes; 
7: [Empty]; 
8: [Empty]; 
9: [Empty]; 
10: [Empty]; 
11. Yes; 
12: Yes; 
13: Yes; 
14: Yes; 
15: Yes; 
16: Yes. 

WI; 
1: Yes; 
2: [Empty]; 
3: [Empty]; 
4: Yes; 
5: Yes; 
6: Yes; 
7: [Empty]; 
8: [Empty]; 
9: [Empty]; 
10: [Empty]; 
11. [Empty]; 
12: [Empty]; 
13: [Empty]; 
14: [Empty]; 
15: [Empty]; 
16: [Empty]. 

WY; 
1: Yes; 
2: [Empty]; 
3: Yes; 
4: Yes; 
5: Yes; 
6: Yes; 
7: [Empty]; 
8: [Empty]; 
9: [Empty]; 
10: [Empty]; 
11. [Empty]; 
12: [Empty]; 
13: [Empty]; 
14: [Empty]; 
15: [Empty]; 
16: [Empty]. 

Source: GAO survey of state testing directors. 

[End of table] 

Table 6: Computer-Based: 

Key: 

Protocols: 
1. Limited Internet Access; 
2. Logs to Monitor Access; 
3. Checking for Other Devices; 
4. Identity Checks/Seating Charts; 
Secure electronic transfer: 
5. Encrypted Data Exchange; 
6. Secure FTP Sites; Requirements: 
7. Use of Software; 
8. Minimum Technology Infrastructure; 
9. Infrastructure Readiness; 
10. Security of Online Environment; 
Maintaining Security of online environment: 
11. Locking Down Computer; 
12. Securing Cell Phones and Other Devices; 
13. Establish Security Codes; 
Training: 
14. Specific Written Training Procedures. 

AR; 
1: Yes; 
2: Yes; 
3: Yes; 
4: [Empty]; 
5; Yes; 
6: Yes; 
7: Yes; 
8: Yes; 
9: Yes; 
10: Yes; 
11: Yes; 
12: Yes; 
13: Yes; 
14: Yes. 

CT; 
1: Yes; 
2: [Empty]; 
3: [Empty]; 
4: [Empty]; 
5: [Empty]; 
6: Yes; 
7: [Empty]; 
8: Yes; 
9: Yes; 
10: Yes; 
11: Yes; 
12: Yes; 
13: Yes; 
14: [Empty]. 

DE; 
1: Yes; 
2: Yes; 
3: Yes; 
4: Yes; 
5: Yes; 
6: Yes; 
7: Yes; 
8: Yes; 
9: Yes; 
10: [Empty]; 
11: Yes; 
12: Yes; 
13: Yes; 
14: Yes. 

FL; 
1: Yes; 
2: Yes; 
3: Yes; 
4: Yes; 
5: Yes; 
6: Yes; 
7: Yes; 
8: Yes; 
9: Yes; 
10: Yes; 
11: Yes; 
12: Yes; 
13: Yes; 
14: Yes. 

GA; 
1: Yes; 
2: Yes; 
3: Yes; 
4: Yes; 
5: Yes; 
6: Yes; 
7: Yes; 
8: Yes; 
9: Yes; 
10: Yes; 
11: Yes; 
12: Yes; 
13: Yes; 
14: Yes. 

HI; 
1: Yes; 
2: Yes; 
3: Yes; 
4: [Empty]; 
5: Yes; 
6: Yes; 
7: Yes; 
8: Yes; 
9: Yes; 
10: [Empty]; 
11: Yes; 
12: Yes; 
13: Yes; 
14: Yes. 

ID; 
1: Yes; 
2: [Empty]; 
3: Yes; 
4: [Empty]; 
5: [Empty]; 
6: [Empty]; 
7: [Empty]; 
8: Yes; 
9: Yes; 
10: Yes; 
11: Yes; 
12: Yes; 
13: Yes; 
14: Yes. 

IN; 
1: Yes; 
2: Yes; 
3: Yes; 
4: [Empty]; 
5: Yes; 
6: [Empty]; 
7: [Empty]; 
8: Yes; 
9: Yes; 
10: [Empty]; 
11: Yes; 
12: Yes; 
13: Yes; 
14: Yes. 

KS; 
1: [Empty]; 
2: [Empty]; 
3: [Empty]; 
4: [Empty]; 
5: Yes; 
6: Yes; 
7: [Empty]; 
8: Yes; 
9: [Empty]; 
10: [Empty]; 
11: [Empty]; 
12: [Empty]; 
13: Yes; 
14: Yes. 

KY; 
1: Yes; 
2: [Empty]; 
3: Yes; 
4: Yes; 
5: [Empty]; 
6: [Empty]; 
7: [Empty]; 
8: Yes; 
9: Yes; 
10: Yes; 
11: [Empty]; 
12: Yes; 
13: Yes; 
14: Yes. 

LA; 
1: Yes; 
2: Yes; 
3: [Empty]; 
4: [Empty]; 
5: Yes; 
6: Yes; 
7: [Empty]; 
8: Yes; 
9: Yes; 
10: Yes; 
11: Yes; 
12: Yes; 
13: Yes; 
14: Yes. 

MD; 
1: Yes; 
2: Yes; 
3: Yes; 
4: Yes; 
5: Yes; 
6: Yes; 
7: Yes; 
8: Yes; 
9: Yes; 
10: Yes; 
11: Yes; 
12: Yes; 
13: Yes; 
14: Yes. 

MN; 
1: Yes; 
2: Yes; 
3: Yes; 
4: Yes; 
5: Yes; 
6: Yes; 
7: [Empty]; 
8: Yes; 
9: Yes; 
10: Yes; 
11: Yes; 
12: Yes; 
13: [Empty]; 
14: Yes. 

MS; 
1: Yes; 
2: Yes; 
3: Yes; 
4: Yes; 
5: Yes; 
6: Yes; 
7: Yes; 
8: Yes; 
9: [Empty]; 
10: Yes; 
11: Yes; 
12: Yes; 
13: Yes; 
14: Yes. 

MO; 
1: Yes; 
2: [Empty]; 
3: Yes; 
4: [Empty]; 
5: Yes; 
6: Yes; 
7: [Empty]; 
8: Yes; 
9: Yes; 
10: [Empty]; 
11: Yes; 
12: Yes; 
13: Yes; 
14: Yes. 

NE; 
1: Yes; 
2: Yes; 
3: Yes; 
4: Yes; 
5: Yes; 
6: Yes; 
7: Yes; 
8: Yes; 
9: Yes; 
10: Yes; 
11: Yes; 
12: Yes; 
13: Yes; 
14: Yes. 

NC; 
1: Yes; 
2: Yes; 
3: Yes; 
4: [Empty]; 
5: Yes; 
6: Yes; 
7: Yes; 
8: Yes; 
9: Yes; 
10: Yes; 
11: Yes; 
12: Yes; 
13: Yes; 
14: Yes. 

ND; 
1: [Empty]; 
2: Yes; 
3: Yes; 
4: Yes; 
5: [Empty]; 
6: Yes; 
7: [Empty]; 
8: Yes; 
9: [Empty]; 
10: Yes; 
11: Yes; 
12: Yes; 
13: Yes; 
14: Yes. 

OK; 
1: Yes; 
2: Yes; 
3: Yes; 
4: Yes; 
5: Yes; 
6: Yes; 
7: Yes; 
8: Yes; 
9: Yes; 
10: Yes; 
11: Yes; 
12: Yes; 
13: Yes; 
14: Yes. 

OR; 
1: Yes; 
2: [Empty]; 
3: Yes; 
4: Yes; 
5: Yes; 
6: Yes; 
7: Yes; 
8: Yes; 
9: Yes; 
10: Yes; 
11: [Empty]; 
12: Yes; 
13: Yes; 
14: Yes. 

PA; 
1: Yes; 
2: Yes; 
3: Yes; 
4: [Empty]; 
5: Yes; 
6: Yes; 
7: Yes; 
8: Yes; 
9: Yes; 
10: [Empty]; 
11: Yes; 
12: Yes; 
13: Yes; 
14: Yes. 

SC; 
1: Yes; 
2: Yes; 
3: Yes; 
4: Yes; 
5: Yes; 
6: Yes; 
7: Yes; 
8: Yes; 
9: Yes; 
10: Yes; 
11: Yes; 
12: Yes; 
13: Yes; 
14: Yes. 

TX; 
1: Yes; 
2: Yes; 
3: Yes; 
4: Yes; 
5: Yes; 
6: Yes; 
7: Yes; 
8: Yes; 
9: Yes; 
10: Yes; 
11: Yes; 
12: Yes; 
13: Yes; 
14: Yes. 

UT; 
1: Yes; 
2: Yes; 
3: Yes; 
4: Yes; 
5: Yes; 
6: Yes; 
7: Yes; 
8: Yes; 
9: Yes; 
10: Yes; 
11: Yes; 
12: [Empty]; 
13: Yes; 
14: Yes. 

VT; 
1: Yes; 
2: [Empty]; 
3: Yes; 
4: [Empty]; 
5: Yes; 
6: Yes; 
7: [Empty]; 
8: Yes; 
9: Yes; 
10: [Empty]; 
11: Yes; 
12: [Empty]; 
13: Yes; 
14: Yes. 

VA; 
1: Yes; 
2: Yes; 
3: Yes; 
4: [Empty]; 
5: Yes; 
6: Yes; 
7: Yes; 
8: Yes; 
9: Yes; 
10: Yes; 
11: Yes; 
12: Yes; 
13: Yes; 
14: Yes. 

WA; 
1: Yes; 
2: Yes; 
3: Yes; 
4: Yes; 
5: Yes; 
6: Yes; 
7: Yes; 
8: Yes; 
9: Yes; 
10: Yes; 
11: Yes; 
12: Yes; 
13: [Empty]; 
14: Yes. 

WV; 
1: Yes; 
2: Yes; 
3: Yes; 
4: Yes; 
5: Yes; 
6: Yes; 
7: Yes; 
8: Yes; 
9: Yes; 
10: Yes; 
11: Yes; 
12: Yes; 
13: Yes; 
14: Yes. 

Source: GAO survey of state testing directors. 

Note: Officials from the 28 states listed in this table reported 
administering computer-based statewide assessments. Therefore, we only 
report the responses of those 28 states for the computer-based 
category of leading practices. 

[End of table] 

[End of section] 

Enclosure III: Comments from the U.S. Department of Education: 

United States Department of Education: 
Office Of Elementary and Secondary Education: 
The Assistant Secretary: 
400 Maryland Ave., Sw. 
Washington, DC 20202
[hyperlink, http://www.ed.gov] 

May 8, 2013: 

Ms. Linda M. Calbom: 
Western Regional Director: 
U.S. Government Accountability Office: 
441 G Street, NW: 
Washington, DC 20548: 

Dear Ms. Calbom: 

I am writing to provide comments on the U.S. Government Accountability 
Office's (GAO) draft document titled "K-12 Education: States' Test 
Security Policies and Procedures Varied" (GAO-13-495R). We are 
generally pleased with GAO's work on this important topic of test 
security and integrity and the efforts that many State and local 
governments are making on this important subject. We are gratified 
that the draft report recognizes the important efforts of the 
Department in convening a symposium on test integrity and in providing 
a follow-up report on best practices and policies. 

There is still more work to do in this area, especially as new 
assessments aligned with college- and career-ready standards are 
developed and implemented. We will continue to work with State and 
local governments to share new developments, best practices, and 
improved processes in this area in order to reinforce the importance 
and increase awareness of test security and integrity. 

We appreciate the opportunity to comment on this document. 

Sincerely, 

Signed by: 
Deborah S. Delisle 

[End of section] 

Footnotes: 

[1] GAO, No Child Left Behind Act: Enhancements in the Department of 
Education's Review Process Could Improve State Academic Assessments, 
[hyperlink, http://www.gao.gov/products/GAO-09-911] (Washington, D.C.: 
Sep. 24, 2009). 

[2] The Council of Chief State School Officers and the Association of 
Test Publishers, Operational Best Practices for Statewide Large-Scale 
Assessment Programs (Washington, D.C.:, 2010). 

[3] See 31 U.S.C. § 717(b)(1). 

[4] Throughout the report we refer to the District of Columbia as a 
state. 

[5] Our survey did not examine state or local implementation of these 
test security policies. 

[6] U.S. Department of Education, Institute of Education Sciences, 
National Center for Education Statistics, Testing Integrity Symposium: 
Issues and Recommendations for Best Practice (Washington, D.C.: 2013). 

[End of section] 

GAO’s Mission: 

The Government Accountability Office, the audit, evaluation, and 
investigative arm of Congress, exists to support Congress in meeting 
its constitutional responsibilities and to help improve the 
performance and accountability of the federal government for the 
American people. GAO examines the use of public funds; evaluates 
federal programs and policies; and provides analyses, recommendations, 
and other assistance to help Congress make informed oversight, policy, 
and funding decisions. GAO’s commitment to good government is 
reflected in its core values of accountability, integrity, and 
reliability. 

Obtaining Copies of GAO Reports and Testimony: 

The fastest and easiest way to obtain copies of GAO documents at no 
cost is through GAO’s website [hyperlink, http://www.gao.gov]. Each 
weekday afternoon, GAO posts on its website newly released reports, 
testimony, and correspondence. To have GAO e-mail you a list of newly 
posted products, go to [hyperlink, http://www.gao.gov] and select 
“E-mail Updates.” 

Order by Phone: 

The price of each GAO publication reflects GAO’s actual cost of 
production and distribution and depends on the number of pages in the 
publication and whether the publication is printed in color or black 
and white. Pricing and ordering information is posted on GAO’s 
website, [hyperlink, http://www.gao.gov/ordering.htm]. 

Place orders by calling (202) 512-6000, toll free (866) 801-7077, or 
TDD (202) 512-2537. 

Orders may be paid for using American Express, Discover Card, 
MasterCard, Visa, check, or money order. Call for additional 
information. 

Connect with GAO: 

Connect with GAO on facebook, flickr, twitter, and YouTube.
Subscribe to our RSS Feeds or E mail Updates. Listen to our Podcasts.
Visit GAO on the web at [hyperlink, http://www.gao.gov]. 

To Report Fraud, Waste, and Abuse in Federal Programs: 

Contact: 
Website: [hyperlink, http://www.gao.gov/fraudnet/fraudnet.htm]; 
E-mail: fraudnet@gao.gov; 
Automated answering system: (800) 424-5454 or (202) 512-7470. 

Congressional Relations: 

Katherine Siggerud, Managing Director, siggerudk@gao.gov: 
(202) 512-4400: 
U.S. Government Accountability Office: 
441 G Street NW, Room 7125: 
Washington, DC 20548. 

Public Affairs: 
Chuck Young, Managing Director, youngc1@gao.gov: 
(202) 512-4800: 
U.S. Government Accountability Office: 
441 G Street NW, Room 7149: 
Washington, DC 20548. 

[End of document]