Secure Browser
In 2005/06, POST replaced the POSTRAC testing system with the Test Management and Assessment System (TMAS). In addition to the new testing system, POST purchased laptop computers to be used by basic course presenters (presenters) for online testing purposes. The Memorandum of Understanding between the presenters and POST restricted use of the laptop computers for any basic course function (e.g., report writing, workbook access) other than administering Learning Domain and Comprehensive Tests and required each computer be locked down during the testing process by installing a CrownePoint developed lockdown application on each computer.
As the POST-purchased computers became obsolete and presenters began purchasing their own computers for online testing purposes, POST continued restricting computers used for testing purposes from being used for other basic course functions. In response, numerous presenters reverted back to paper-and-pencil testing in order to use the presenter purchased computers for functions other than testing. In order to get presenters back to online testing, POST’s Computer Services Bureau developed a thumb (boot) drive solution in 2013 which would allow presenters to use the computers for both online testing and other basic course functions. The boot drive locks the computer down and accesses the testing system website. POST serialized each drive, required the drives be secured between test sessions and be inventoried before and after each test session.
In 2017, POST required all presenters to administer comprehensive tests in an online format and released an updated testing system, TMAS II. POST also required all presenters to use the boot drives when testing. This proved to be a very cumbersome and costly process for both POST and the presenters. Not only was POST purchasing the boot drives, but there were many staff hours invested in troubleshooting issues as the boot drives were not always compatible with the presenter’s computers. Some of the difficulties experienced with the boot drives are hardware incompatibility and network connection issues. In order to address this issue, the Computer Services Bureau created a secure browser option for testing which requires an application be installed on each computer used for testing.
The secure browser works in the same fashion as the boot drives and locks the computer down for testing purposes. From a test security standpoint, the boot drives are not the most secure method for testing, as they require secure storage and could easily be removed from the testing venue if the inventory process is not completed after each test session. For this reason, POST will begin supplying presenters with the secure browser in place of the boot drives.
Terminology
In 2009, POST started requiring each presenter develop a program specific test security policy. Prior to 2009, submission of a test security policy was optional for presenters and for those presenters that wanted to develop a policy, POST supplied guidelines that outlined the topic areas to be covered. With the requirement that each presenter develop and submit a policy, the guidelines have become required topics and a policy would not be approved without that information included.
Scenario Test Matrix
In 2006, POST revised the scenario testing process and new test materials were developed. One of these items was a scenario matrix that presenters could use for scoring each test and tracking in one place how each student was doing not only on the scenario test as a whole, but how they were performing on each required competency (e.g., officer safety, communication, use of force.) This is valuable information for agencies to be able to view for background and field training purposes. The scenario matrix is a controlled document, and is required to be secured as it contains the scoring values for each scenario. Some presenters were providing copies of the matrix to students which violates test security requirements. In response, the matrix was added to the list of test materials that must be destroyed within 10 days of the conclusion of the class; however, requiring the matrix to be destroyed within that time frame removes the value offered to agencies during the background or field training processes. To ensure this information is still available to agencies, the destruction time frame is being removed but a retention requirement is being added. |