← All Webinars | L.A.B.S. #4
A Holistic Approach to Security in Remote Proctoring
Learn strategies for implementing security in remote proctoring without losing a seamless test-taker experience.
From test day preparations to real-time monitoring during exams, and in-depth post-analysis, our panel of experts will equip you with invaluable insights and strategies to safeguard the integrity of your assessments. Learn how to prevent cheating attempts, strike a balance between security and user experience, and harness data analytics for continuous improvement.
Our host Sandy Hogg, Business Manager, is joined by:
-Chris Glacken (Director of Innovative Tech., ITS)
-Harry Samit (Director, Special Investigations, Pearson VUE)
-Pete Van Dyke (Certification Security Program Manager, Amazon Web Services)
-Jon Jensen (former Senior Vice President, Product Management, Examity)
+
Interested in partnering on a webinar? Share your ideas at webinars@testsys.com.
1
00:00:09.380 --> 00:00:12.650
Hello everybody, and thank you so much for joining us today.
2
00:00:13.310 --> 00:00:16.530
We are gonna give everyone a few minutes to join. Before we get started,
3
00:00:16.840 --> 00:00:21.530
I'll aim to get started around 12:03 because we have quite the jam packed
4
00:00:21.530 --> 00:00:25.970
session in store. But, uh, while we're waiting for everyone to join,
5
00:00:26.510 --> 00:00:30.890
we have got a poll here for you to answer. So I'm gonna launch that now.
6
00:00:33.240 --> 00:00:37.820
Uh, the panelists and I are a little curious to know a little more about how you
7
00:00:37.850 --> 00:00:39.620
feel about remote proctoring today.
8
00:00:40.400 --> 00:00:43.660
So please go ahead and share your thoughts as you're getting settled in,
9
00:00:43.960 --> 00:00:47.500
and I will share the results with you before we dive in.
10
00:01:04.480 --> 00:01:07.590
Great, lots of you answering the poll. More than half. Appreciate that.
11
00:01:32.680 --> 00:01:36.290
Once again, if you are just joining us, we're gonna get started at around 12:03,
12
00:01:36.350 --> 00:01:39.770
but in the meantime, uh, please get settled in and, uh,
13
00:01:40.560 --> 00:01:41.810
take a look at the poll we've launched.
14
00:01:41.820 --> 00:01:46.090
We're trying to get a sense of how you feel about re remote proctoring today.
15
00:01:59.610 --> 00:02:04.240
75% of you hit have answered so far, which I, which I really appreciate.
16
00:02:20.660 --> 00:02:23.120
You'll notice that there's not really a neutral option on here,
17
00:02:23.140 --> 00:02:25.360
so we are really trying to force you to make a decision.
18
00:02:52.810 --> 00:02:55.700
Alright, we're at 12:03, so I'm going to stop the poll.
19
00:02:55.700 --> 00:02:58.960
82% of you have participated and,
20
00:02:59.000 --> 00:03:01.820
and I don't know if it's a surprise or not, but, uh,
21
00:03:02.990 --> 00:03:07.400
most of you have a pretty positive feel toward remote proctoring overall.
22
00:03:07.400 --> 00:03:11.640
Either you love it or the benefits outweigh the challenges.
23
00:03:11.780 --> 00:03:14.520
So I think that's really helpful for us to know,
24
00:03:14.950 --> 00:03:18.120
kind of migrating into, into the webinar today.
25
00:03:19.730 --> 00:03:24.030
So thank you so much. Okay, well,
26
00:03:24.080 --> 00:03:28.070
we're gonna get started. So, welcome everyone. My name is Sandy Hogg.
27
00:03:28.170 --> 00:03:30.990
I'm the Manager of Business Development at ITS,
28
00:03:31.570 --> 00:03:35.230
and I will be your host and moderator during today's webinar. Once again,
29
00:03:35.230 --> 00:03:38.990
thank you so much for joining us. Uh, we really do appreciate your,
30
00:03:38.990 --> 00:03:39.950
your time and your company.
31
00:03:41.310 --> 00:03:45.700
We've got a great session lined up today with an impressive panel where we'll be
32
00:03:45.700 --> 00:03:50.380
trying to touch on all areas of security considerations for remote
33
00:03:50.380 --> 00:03:53.660
proctored exams. So we're hoping that you leave with, you know,
34
00:03:53.660 --> 00:03:57.860
some new ideas and a rounded perspective on securing these exams
35
00:03:58.480 --> 00:04:00.620
before, during, and after test day.
36
00:04:01.270 --> 00:04:04.330
And that's also how we try to group our questions as well to,
37
00:04:04.350 --> 00:04:07.130
to make sure that we're addressing this topic holistically.
38
00:04:08.400 --> 00:04:10.090
This will be a panel style webinar,
39
00:04:10.230 --> 00:04:13.130
so for the majority of the time it'll just be me and the panelists on screen
40
00:04:13.130 --> 00:04:16.560
talking. Before we jump in,
41
00:04:16.760 --> 00:04:20.120
I just wanted to go over a few housekeeping items. First.
42
00:04:20.180 --> 00:04:24.280
we have reserved some dedicated time at the end of this webinar for Q and A,
43
00:04:24.740 --> 00:04:25.720
but you know, that said,
44
00:04:25.730 --> 00:04:29.600
we're not going to be just ignoring any questions that are submitted during the
45
00:04:29.600 --> 00:04:32.240
webinar as a rule or anything. So, you know,
46
00:04:32.240 --> 00:04:36.840
if something that one of our guests says does inspire a question that makes more
47
00:04:36.840 --> 00:04:39.880
sense in context, please do go ahead and submit it using that,
48
00:04:39.880 --> 00:04:41.200
that Q and A button in your,
49
00:04:41.200 --> 00:04:43.960
your Zoom interface and we'll try to work it in as time allows.
50
00:04:45.220 --> 00:04:46.590
This webinar will be recorded,
51
00:04:46.810 --> 00:04:49.870
so we'll share the link to access that after the webinar has ended.
52
00:04:49.870 --> 00:04:54.670
You'll get an email and there will also be a survey at the end, uh,
53
00:04:54.670 --> 00:04:58.110
that will appear in your Zoom window, so please don't click away too quickly.
54
00:04:58.530 --> 00:04:58.860
Uh,
55
00:04:58.860 --> 00:05:02.550
we'd love to hear your feedback about your thoughts on today's webinar as well
56
00:05:02.550 --> 00:05:05.760
as suggestions for future topics. Alright,
57
00:05:06.140 --> 00:05:07.680
so without any further delay,
58
00:05:07.880 --> 00:05:12.560
I am going to ask today's panelists to join and introduce themselves.
59
00:05:18.620 --> 00:05:21.800
All right. Everyone's very prompt. Uh,
60
00:05:22.420 --> 00:05:27.040
so I'm going to start with Pete. Um, I'll ask you to introduce yourself,
61
00:05:27.040 --> 00:05:28.440
tell us a little bit about yourself,
62
00:05:28.900 --> 00:05:32.520
and I'm wondering if you'll also share a bit about what you're currently focused
63
00:05:32.520 --> 00:05:37.520
on and sort of what's top of mind for you from a security standpoint in just a
64
00:05:37.520 --> 00:05:38.353
few words.
65
00:05:38.810 --> 00:05:40.880
Thank you, Sandy. Uh, my name is Pete Van Dyke.
66
00:05:40.880 --> 00:05:44.800
I've been working in certification for 15 years. Uh,
67
00:05:45.020 --> 00:05:49.480
I'm a security program manager at Amazon with their certification program,
68
00:05:50.100 --> 00:05:52.240
uh, spent the last three and a half years doing that,
69
00:05:52.340 --> 00:05:57.280
and I divide my time currently between people that steal our content and publish
70
00:05:57.280 --> 00:06:00.280
it on brain dump websites, uh, proxy testers,
71
00:06:00.460 --> 00:06:03.880
and those that misbehave on individual exams.
72
00:06:05.310 --> 00:06:09.260
Great, thank you so much. Um, Harry, why don't you go next?
73
00:06:09.960 --> 00:06:11.420
Hi, I am Harry Samit. Uh,
74
00:06:11.460 --> 00:06:15.020
I am the director of Special Investigations for Pearson VUE. Uh,
75
00:06:15.050 --> 00:06:20.020
I've been in certifications and assessment for about three years. Prior to that,
76
00:06:20.220 --> 00:06:23.380
I spent 21 years, uh, as a Special Agent in the FBI,
77
00:06:23.380 --> 00:06:27.340
and then before that nine years as a Naval Intelligence Officer. Um,
78
00:06:27.640 --> 00:06:31.180
my typical day-to-day is using the techniques I learned in those,
79
00:06:31.390 --> 00:06:34.940
those past professions, um, to,
80
00:06:34.980 --> 00:06:38.500
to figure out what happened when there's a, an incident, a crisis misconduct,
81
00:06:39.280 --> 00:06:41.180
um, of some nature on an exam,
82
00:06:41.180 --> 00:06:45.710
either discovered in advance during the exam or after the exam. Um,
83
00:06:45.770 --> 00:06:47.190
the team that I work with, uh,
84
00:06:47.190 --> 00:06:50.630
we try and figure out what happened and who is responsible. Great.
85
00:06:51.630 --> 00:06:54.620
Thank you. Jon, how about you?
86
00:06:56.400 --> 00:06:58.780
Thanks, Sandy. My name is Jon Jensen.
87
00:06:59.000 --> 00:07:02.180
I'm the Senior Vice President of Product Management at Examity.
88
00:07:02.730 --> 00:07:06.820
I've been in the industry for just a couple of years, so a relative newcomer,
89
00:07:06.820 --> 00:07:10.020
but I've been in the software and technology space for over 20 years.
90
00:07:10.080 --> 00:07:11.500
So really fun.
91
00:07:12.080 --> 00:07:15.780
My role is really thinking about how to make our software work better,
92
00:07:16.320 --> 00:07:20.140
and that's a challenge because I'm trying to balance the needs of our test
93
00:07:20.160 --> 00:07:24.020
takers and making sure that they have a smooth and seamless experience while
94
00:07:24.130 --> 00:07:28.460
also making sure that we are enforcing the rules of, um,
95
00:07:28.460 --> 00:07:30.660
the program and making sure that the exam is,
96
00:07:30.800 --> 00:07:33.620
is a fair experience for everybody. So thanks for having me.
97
00:07:34.490 --> 00:07:38.400
Great. Thanks for joining us. And last but not least, Chris.
98
00:07:39.690 --> 00:07:41.990
Hi, thanks, Sandy. My name's Chris Glacken.
99
00:07:41.990 --> 00:07:44.510
I'm Director of Innovative Technologies at ITS.
100
00:07:44.980 --> 00:07:47.390
I've been in the assessment industry for about nine years now,
101
00:07:47.850 --> 00:07:51.830
and my main focus is on, um, building out our, uh, secure browsers,
102
00:07:51.830 --> 00:07:54.510
our lockdown browsers for the Windows and Mac platforms,
103
00:07:54.970 --> 00:07:59.030
as well as building out our ITS ProctorNow, um, remote proctoring product.
104
00:08:00.330 --> 00:08:04.600
Great. Awesome. We have, you guys have such a, a, a,
105
00:08:04.720 --> 00:08:08.160
a wide range of experience, so I'm really excited to dive in here. Uh,
106
00:08:08.220 --> 00:08:12.040
I'd like to start with, uh, sort of an introductory high level question.
107
00:08:12.140 --> 00:08:16.480
So we're talking about, you know, defending ourselves against, um, you know,
108
00:08:16.480 --> 00:08:20.000
de de defending ourselves, uh, in a remote proctoring scenario.
109
00:08:20.220 --> 00:08:24.560
So I'm curious about, you know, the enemies that we're defending against. Right?
110
00:08:24.580 --> 00:08:29.000
So what motivations could a bad actor have, uh,
111
00:08:29.040 --> 00:08:32.800
during a remote remotely proctored exam? Uh, I'd like to start with Harry.
112
00:08:34.570 --> 00:08:38.590
So in terms of motivation, uh, I think the obvious one, um,
113
00:08:38.730 --> 00:08:42.430
and the one that we see most often, probably the vast majority, uh,
114
00:08:42.430 --> 00:08:46.750
of bad actors is gonna be financial. Um, like any criminal, um,
115
00:08:47.410 --> 00:08:49.990
the folks who seek to hack,
116
00:08:50.620 --> 00:08:54.430
hack or steal intellectual property, um, you know,
117
00:08:54.450 --> 00:08:57.640
to do all the sorts of things they do to impact an exam program,
118
00:08:57.870 --> 00:09:00.520
they're doing it to make money. Um, you know,
119
00:09:00.550 --> 00:09:04.720
it's a pretty lucrative business out there, uh, depending on the desirability,
120
00:09:05.420 --> 00:09:07.880
uh, and the potential for changing, uh,
121
00:09:07.900 --> 00:09:12.640
the path of someone's life of a certification. Um, you know, the,
122
00:09:12.660 --> 00:09:16.520
the bad guys stand to make a substantial profit from, um,
123
00:09:16.750 --> 00:09:21.200
influence and exam and exam the course of an exam. There are two other,
124
00:09:21.660 --> 00:09:23.960
um, motivations we've detected and,
125
00:09:24.020 --> 00:09:27.800
and they're rare enough that it's a surprise when they happen. Um,
126
00:09:28.020 --> 00:09:32.000
one of them is, uh, is altruism. One of them is they will, uh,
127
00:09:32.200 --> 00:09:35.600
people will often steal intellectual property because they think they're
128
00:09:35.600 --> 00:09:40.040
helping, um, other candidates, uh, you know, they don't intend to sell it,
129
00:09:40.040 --> 00:09:43.600
they don't intend to profit financially f from it. Um, but they think they're,
130
00:09:43.600 --> 00:09:47.960
they're helping their colleagues or their, their co travelers in that space.
131
00:09:48.740 --> 00:09:53.680
Um, and then the other kind, uh, that is probably the rarest, fortunately, um,
132
00:09:53.740 --> 00:09:58.500
is educational misconduct where an instructor will actually, you know,
133
00:09:58.500 --> 00:10:03.500
someone who is responsible for doing training will actually steal content, uh,
134
00:10:03.500 --> 00:10:06.860
because it's easier to do that rather than actually teaching his students, uh,
135
00:10:06.920 --> 00:10:09.220
you know, the materials that they need to pass the exam.
136
00:10:10.480 --> 00:10:14.860
Oh, interesting. All right. So money altruism and educational misconduct.
137
00:10:15.280 --> 00:10:16.980
Uh, I'm gonna go over to Pete and see,
138
00:10:16.980 --> 00:10:19.180
do you have anything to add to that list or expand upon?
139
00:10:19.810 --> 00:10:21.460
Well, uh, on the financial side,
140
00:10:21.610 --> 00:10:24.860
just in the IT exam universe,
141
00:10:25.410 --> 00:10:30.140
it's estimated that proxy testing is a multi hundred million
142
00:10:30.160 --> 00:10:34.060
dollar business annually. So, uh, you know, the, uh,
143
00:10:34.520 --> 00:10:38.060
the organizations that are doing this are very sophisticated, uh,
144
00:10:38.290 --> 00:10:42.020
very motivated, and it's a very lucrative business for them. So, uh,
145
00:10:42.020 --> 00:10:43.420
this isn't going away anytime soon.
146
00:10:44.970 --> 00:10:48.510
And could you define proxy testing just for the audience in case there's someone
147
00:10:48.510 --> 00:10:49.630
who doesn't know what that means here?
148
00:10:50.100 --> 00:10:54.150
Sure. Proxy testing is when a, uh, individual or an organization, uh,
149
00:10:54.210 --> 00:10:58.870
offers to take an exam for a candidate for a fee. Uh,
150
00:10:59.250 --> 00:11:02.030
and we see a wide variety of fees for this. On the IT side,
151
00:11:02.030 --> 00:11:03.350
it's not unusual for a,
152
00:11:03.810 --> 00:11:08.670
for fees of between $250 and $2,000 for
153
00:11:08.710 --> 00:11:10.750
a, uh, for a proxy exam. Wow. So, uh,
154
00:11:10.810 --> 00:11:14.070
if somebody doesn't feel confident enough or if they've got some other
155
00:11:14.070 --> 00:11:14.830
motivation,
156
00:11:14.830 --> 00:11:19.030
I need to have this certification in order to keep my job as an example, uh,
157
00:11:19.700 --> 00:11:20.550
it's, uh, there,
158
00:11:20.550 --> 00:11:22.750
there are plenty of people out there that are willing to take a test,
159
00:11:22.750 --> 00:11:25.510
usually through remote control of a computer. Uh,
160
00:11:25.730 --> 00:11:27.150
and that's known as proxy testing.
161
00:11:28.010 --> 00:11:31.830
Wow. Thank you. Appreciate that. Alright,
162
00:11:31.830 --> 00:11:33.430
so now that we've set the stage a little bit,
163
00:11:33.850 --> 00:11:36.630
I'd like to move into thinking about, you know,
164
00:11:36.630 --> 00:11:40.390
some things that need to happen prior to a candidate sitting down to take a
165
00:11:40.390 --> 00:11:43.870
test, maybe during sort of the design phase of an exam or a form.
166
00:11:45.030 --> 00:11:47.220
First question here is, you know,
167
00:11:47.220 --> 00:11:52.020
what should programs be thinking about as they are designing and planning for,
168
00:11:52.240 --> 00:11:56.840
uh, an exam that they'd like to be remote proctored? You know, for example,
169
00:11:56.840 --> 00:12:00.640
what are some industry best practices for securing those remotely proctored
170
00:12:00.730 --> 00:12:04.480
exams? I'm gonna start with Chris, I'm curious for your perspective on this.
171
00:12:07.250 --> 00:12:10.140
Sure. So I think with regards to that question,
172
00:12:10.140 --> 00:12:13.900
three things really jump out at me When I think about that. The,
173
00:12:13.920 --> 00:12:16.740
the things that you wanna be thinking about are, uh, a level,
174
00:12:16.770 --> 00:12:18.900
what level of security you're gonna want to implement,
175
00:12:19.490 --> 00:12:21.620
what do you want the examinee experience to be,
176
00:12:22.040 --> 00:12:26.220
and what kind of resources do you have to implement everything? So,
177
00:12:26.320 --> 00:12:29.540
so I think all three of those put together really going to, um,
178
00:12:29.920 --> 00:12:30.980
put you in a spot where,
179
00:12:31.190 --> 00:12:33.820
where you end up with whatever solution that you're gonna go for.
180
00:12:33.920 --> 00:12:36.340
So during that process, you're gonna want to ask your thing,
181
00:12:36.340 --> 00:12:37.980
you're going to ask yourself things like,
182
00:12:38.200 --> 00:12:42.060
how well do you trust your candidates and what are the penalties for cheating a
183
00:12:42.180 --> 00:12:45.340
a penalty? Like, um, being, being banned from the possession, uh,
184
00:12:45.340 --> 00:12:48.700
being banned from a profession for life is gonna be a lot more severe than a
185
00:12:48.700 --> 00:12:52.700
more lower stakes college course that isn't gonna have something like that and
186
00:12:52.700 --> 00:12:55.620
they can go turn around and take the test or move into another course.
187
00:12:55.760 --> 00:12:59.340
So mm-hmm. So those are factors that come into play. And, um,
188
00:12:59.440 --> 00:13:02.580
you need to ask yourself things like, what, what is your plan if you're,
189
00:13:02.640 --> 00:13:05.940
if you get content exposure and are, are you even okay with the,
190
00:13:06.040 --> 00:13:10.140
the possibility of having content exposure delivering through remote?
191
00:13:10.540 --> 00:13:12.460
'cause that is a possibility. Um,
192
00:13:12.480 --> 00:13:16.060
you need to think through the processes that you're gonna have for violations
193
00:13:16.120 --> 00:13:20.480
and potential misconduct and, um, and,
194
00:13:20.900 --> 00:13:23.600
and also the, uh, the possibility of misconduct.
195
00:13:23.660 --> 00:13:25.960
So what are you gonna do if it's not a hundred percent certain?
196
00:13:25.960 --> 00:13:28.120
Because most of the time it's probably not gonna be,
197
00:13:28.180 --> 00:13:30.440
or be able to a hundred percent prove it without a doubt.
198
00:13:30.820 --> 00:13:34.360
So those are things that you're all gonna want to think of. Um, with,
199
00:13:34.360 --> 00:13:36.720
with regards to best practices, you're gonna want to, you,
200
00:13:36.780 --> 00:13:40.000
you wanna look at things like definitely a lockdown browser is a must have.
201
00:13:40.020 --> 00:13:41.560
It should not be the only thing you have,
202
00:13:41.580 --> 00:13:45.880
but it should be one of those levels that you have with your security to camera
203
00:13:46.190 --> 00:13:49.520
room scans, um, verifying the candidate and those type of things as well.
204
00:13:51.990 --> 00:13:54.500
Thank you, Chris. Um, Harry,
205
00:13:54.500 --> 00:13:57.500
curious if you have anything to add to this in terms of best practices?
206
00:13:58.340 --> 00:14:03.220
I do. So we, we think of, we think of exam security for, uh,
207
00:14:03.220 --> 00:14:06.660
frankly for in-person or remotely proctored exams as a,
208
00:14:06.660 --> 00:14:11.100
as a 360 degree endeavor. Um, by which we mean before, during,
209
00:14:11.320 --> 00:14:15.350
and after the exam. Um, you know, best practices,
210
00:14:15.970 --> 00:14:20.750
as Chris said, really depend on the appetite for risk, um, the threat that the,
211
00:14:20.750 --> 00:14:25.750
that the exam sponsor is facing. Um, but, but prior to the exam, um,
212
00:14:25.860 --> 00:14:28.870
that incorporates things like, uh, exam design, you know,
213
00:14:28.890 --> 00:14:32.910
how the content is presented and security features inherent in the design of
214
00:14:32.910 --> 00:14:36.270
the, of the test itself during the exam. Um,
215
00:14:36.370 --> 00:14:40.430
it incorporates things like Chris said, like the, uh, the, the secure browser,
216
00:14:40.850 --> 00:14:45.310
um, greeter and proctor training, um, steps that, uh,
217
00:14:45.450 --> 00:14:47.470
the exam provider and, you know,
218
00:14:47.470 --> 00:14:51.680
the exam delivery mechanism use to keep the exam secure
219
00:14:52.410 --> 00:14:56.320
while the candidate is in the hot seat. And then the, the final phase,
220
00:14:56.420 --> 00:14:59.400
the after is really where my team comes in, uh, most often,
221
00:14:59.720 --> 00:15:04.320
although we certainly dabble in, in all three arenas. Um, and that is, um,
222
00:15:04.830 --> 00:15:09.720
when misconduct or the possibility of misconduct is detected, uh,
223
00:15:09.980 --> 00:15:13.520
we step in and then conduct a thorough investigation to find out what happened.
224
00:15:13.700 --> 00:15:15.320
And to Chris's point, um,
225
00:15:15.320 --> 00:15:19.560
there are very few black and whites in the exam security world. Uh,
226
00:15:19.750 --> 00:15:24.120
it's not generally simple to be able to say, okay,
227
00:15:24.120 --> 00:15:28.320
we understand with complete clarity what happened, and we can give you,
228
00:15:28.940 --> 00:15:32.720
uh, a blow by blow. Um, there are some ambiguities here. Uh,
229
00:15:32.740 --> 00:15:36.920
and that's where experience and corporate knowledge and understanding the
230
00:15:36.920 --> 00:15:38.880
threat, what the bad guys do and how they operate,
231
00:15:38.880 --> 00:15:40.920
that's where that all comes together. Hmm.
232
00:15:42.240 --> 00:15:45.580
So 360 degree endeavor I like, I, I like,
233
00:15:45.780 --> 00:15:50.200
I think that's helpful to think of it that way. Alright.
234
00:15:50.340 --> 00:15:53.480
So n next I'd like to, to,
235
00:15:54.020 --> 00:15:58.160
I'm curious about how much information you share with the end users, you know,
236
00:15:58.160 --> 00:16:01.120
the candidates to prepare for testing. You know,
237
00:16:01.260 --> 00:16:05.720
how do you set expectations with them and is there a risk of giving too much
238
00:16:06.040 --> 00:16:09.840
information away in that sort of candidate preparation, um,
239
00:16:09.840 --> 00:16:14.760
that might aid bad actors or those who who wish to misbehave?
240
00:16:14.980 --> 00:16:16.160
Um, I'm gonna start with Pete.
241
00:16:17.210 --> 00:16:18.640
Thank you. Uh, well, we,
242
00:16:18.740 --> 00:16:22.760
we at Amazon try to be as transparent as possible as far as what kind of
243
00:16:23.000 --> 00:16:27.760
behaviors will result in an invalidation, uh,
244
00:16:28.060 --> 00:16:31.640
of an exam or perhaps banning from a program. So, uh,
245
00:16:31.740 --> 00:16:36.000
we do this in multiple ways and multiple spaces, including a, uh,
246
00:16:36.000 --> 00:16:37.640
checklist that has to be, uh,
247
00:16:37.800 --> 00:16:41.760
attested to right before launch of a proctored exam. So, uh,
248
00:16:41.760 --> 00:16:44.640
we tell 'em that you can't leave the, uh, the webcam view,
249
00:16:44.740 --> 00:16:47.440
you can't lean partially off screen, you can't have a third party,
250
00:16:47.540 --> 00:16:50.360
you can't access an electronic device mm-hmm. Or cell phone,
251
00:16:50.370 --> 00:16:55.200
those types of things. Uh, what we've found is, uh, is that you, you can't be,
252
00:16:55.700 --> 00:16:59.920
you can't, you can't deliver this information frequently enough. Uh, as,
253
00:16:59.940 --> 00:17:03.040
as you've, as you probably know, if you've ever taken one of these exams,
254
00:17:03.140 --> 00:17:06.200
you're nervous, you're skipping over things that say, click here to continue.
255
00:17:06.720 --> 00:17:09.000
Uh, so even if we put it 10 times, they use,
256
00:17:09.100 --> 00:17:12.720
the chances of people skipping over 10 times are pretty frequent. Now, what we,
257
00:17:12.720 --> 00:17:15.560
uh, what what we do slightly differently, we, uh,
258
00:17:15.580 --> 00:17:20.200
we inform our candidates that we use data forensics after the fact to look at
259
00:17:20.480 --> 00:17:24.600
score similarities and other, uh, other categories. Uh,
260
00:17:24.820 --> 00:17:29.240
we are not entirely transparent on what it is that we look for with data
261
00:17:29.480 --> 00:17:33.440
forensics, because that would allow people, uh, an edge and give them a way to,
262
00:17:33.580 --> 00:17:37.000
uh, to misbehave without detection. So, uh,
263
00:17:37.170 --> 00:17:41.160
while we do talk about the fact that we're using these tools and what the
264
00:17:41.360 --> 00:17:42.640
sanctions are for them, we don't, uh,
265
00:17:42.660 --> 00:17:45.640
we don't specify what exactly we do with data forensics.
266
00:17:45.980 --> 00:17:50.960
Mm-hmm. Yeah. You don't wanna give give all that away. Um, all right,
267
00:17:50.960 --> 00:17:53.280
great. I'm curious, Jon, do you have anything to add?
268
00:17:55.250 --> 00:17:55.680
Yeah,
269
00:17:55.680 --> 00:17:58.820
one of the things that's always a challenge for our program is to make sure that
270
00:17:58.820 --> 00:18:02.300
you're clearly communicating the rules and expectations during the exam.
271
00:18:02.760 --> 00:18:04.740
And just like Pete said, people don't like to read.
272
00:18:05.280 --> 00:18:06.860
So one of the biggest challenges,
273
00:18:07.280 --> 00:18:12.020
how to distill what really matters into a short and consumable set
274
00:18:12.200 --> 00:18:15.300
of rules to help test takers really understand.
275
00:18:15.960 --> 00:18:20.180
So we definitely continue to repeat and refresh, um, test takers,
276
00:18:20.180 --> 00:18:22.100
keep 'em in every notification that we can,
277
00:18:22.100 --> 00:18:24.860
helping them understand that there are rules, you should pay attention to them.
278
00:18:25.400 --> 00:18:29.460
But from the program's perspective, make sure that, like Chris said earlier,
279
00:18:29.490 --> 00:18:32.540
that you've thought about kind of end-to-end what rules are really impactful,
280
00:18:33.320 --> 00:18:37.860
and make sure that you're enforcing those with your, um, proctoring provider,
281
00:18:38.400 --> 00:18:41.780
but also make sure that you're not making it overly complicated. Mm-hmm. Um,
282
00:18:41.780 --> 00:18:44.420
you have a lot of flexibility with different platforms than what you can do,
283
00:18:44.560 --> 00:18:47.020
but make sure you have a plan ahead of time for what you should do,
284
00:18:47.020 --> 00:18:51.700
what really matters. Things like, um, if a child walks into the room or not,
285
00:18:51.700 --> 00:18:53.220
if a pet walks into the room or not,
286
00:18:53.220 --> 00:18:55.140
like some of those things can be really disruptive,
287
00:18:55.490 --> 00:18:58.180
potentially in a remote testing environment.
288
00:18:58.180 --> 00:19:00.700
We all don't have the same control of our environment as you do in the test
289
00:19:00.700 --> 00:19:01.320
center.
290
00:19:01.320 --> 00:19:04.700
So you've gotta think about what really is going to matter to your program and
291
00:19:04.700 --> 00:19:07.460
what's not. Mm-hmm. And that comes down to your assessment of the risk,
292
00:19:07.800 --> 00:19:08.820
how it impacts the program,
293
00:19:09.040 --> 00:19:11.620
and how it impacts the experience of the person taking the test.
294
00:19:11.880 --> 00:19:16.070
Mm-hmm. Great. Thanks. Harry, you have your hand up, you have something to add?
295
00:19:16.260 --> 00:19:16.550
Yeah,
296
00:19:16.550 --> 00:19:19.910
I just wanted to add it, it's an interesting question how much I,
297
00:19:20.970 --> 00:19:24.750
how much information is shared with test takers? With candidates? Um,
298
00:19:24.810 --> 00:19:27.350
that's a good one because it's always a balance, right? When,
299
00:19:27.380 --> 00:19:31.430
when taking action to remediate misconduct exam,
300
00:19:31.430 --> 00:19:33.990
sponsors wanna be able to tell the candidate, you know,
301
00:19:33.990 --> 00:19:35.790
we got you dead to rights, and here's why.
302
00:19:36.020 --> 00:19:38.070
Obviously the biggest motivation for that is to,
303
00:19:38.250 --> 00:19:41.990
for stall any legal action or any, you know,
304
00:19:42.130 --> 00:19:46.590
the candidate taking any steps to, you know, defame, publicly defame the,
305
00:19:46.610 --> 00:19:51.350
the exam sponsor. But the reality is, as that information is shared, um,
306
00:19:51.350 --> 00:19:54.390
these techniques spread through the illicit testing community.
307
00:19:54.390 --> 00:19:57.470
And so the bad guys learn more and more about how we do business. And so,
308
00:19:59.290 --> 00:20:02.390
um, a, a very famous icon in the testing industry,
309
00:20:02.410 --> 00:20:05.950
one that I was presenting with at a conference once said, um, in,
310
00:20:05.970 --> 00:20:09.630
in language I understood candidates are not entitled to due process. Right?
311
00:20:09.660 --> 00:20:11.870
This isn't a criminal proceeding.
312
00:20:11.870 --> 00:20:15.430
And so we don't have to tell them every piece of evidence that we used in how we
313
00:20:15.710 --> 00:20:17.270
obtained it before we take action. Mm-hmm.
314
00:20:17.450 --> 00:20:20.470
And so that's a great thing to remember, right? We, you know,
315
00:20:20.490 --> 00:20:22.630
as a security practitioner, uh,
316
00:20:22.790 --> 00:20:27.550
I wanna share much less typically than than usual because I don't want them to
317
00:20:27.550 --> 00:20:28.383
know how we do business.
318
00:20:30.120 --> 00:20:32.270
Right? So then that's an interesting question is like,
319
00:20:32.270 --> 00:20:36.750
how much evidence is enough to share with them that like, we, we've got you,
320
00:20:36.750 --> 00:20:39.910
we know it, but without kind of giving too much away.
321
00:20:40.450 --> 00:20:42.310
And of course, the candidate knows, right? I mean,
322
00:20:42.310 --> 00:20:45.750
they have guilty knowledge so they know, right? So, you know, for all of the,
323
00:20:46.250 --> 00:20:48.560
um, posturing and the lawsuits that,
324
00:20:48.560 --> 00:20:51.000
that I've seen threaten in the three years that I'm here,
325
00:20:51.270 --> 00:20:54.120
that I've been here in, in this, in this industry, um,
326
00:20:54.280 --> 00:20:58.740
I have yet to see a candidate actually sue, uh, you know, an exam provider,
327
00:20:58.750 --> 00:21:01.580
especially when the evidence, when they know the evidence is ample,
328
00:21:01.580 --> 00:21:03.860
even if it hasn't been explained to them. Hmm.
329
00:21:05.030 --> 00:21:09.450
That's definitely good to keep in mind. Awesome. Well, thank you so much.
330
00:21:09.500 --> 00:21:12.530
We're gonna shift a little bit into, you know,
331
00:21:13.120 --> 00:21:15.530
when the candidate's in the hot seat to use Harry's words,
332
00:21:15.600 --> 00:21:17.930
sort of during the testing, um,
333
00:21:17.930 --> 00:21:21.530
some security tactics or some things to be thinking about. Um,
334
00:21:21.550 --> 00:21:22.730
so one important thing that we,
335
00:21:22.790 --> 00:21:26.970
we talk about here is balancing user experience with security, right?
336
00:21:26.970 --> 00:21:30.090
This is something that I think everyone who's delivering a remotely proctored
337
00:21:30.090 --> 00:21:32.330
exam is trying to do. Um,
338
00:21:32.830 --> 00:21:37.650
so what are some factors to consider when setting that balance?
339
00:21:38.150 --> 00:21:39.290
Uh, I'd like to start with Jon.
340
00:21:41.300 --> 00:21:44.270
Yeah, thank you. There's a lot that goes into that.
341
00:21:44.370 --> 00:21:48.470
And when you think about the design of a platform or a tool set,
342
00:21:49.050 --> 00:21:51.630
the hard work is in making a complicated process,
343
00:21:51.820 --> 00:21:56.110
like checking in and taking an exam be simple and easy for the test taker.
344
00:21:56.490 --> 00:21:59.830
So when we think about the user experience, there's a couple of key motivations.
345
00:22:00.490 --> 00:22:01.170
One is,
346
00:22:01.170 --> 00:22:05.550
how do we get the test taker into the hot seat as quickly as possible?
347
00:22:06.370 --> 00:22:09.750
How do we make sure that they understand exactly what they're going to encounter
348
00:22:09.760 --> 00:22:13.750
along the way? So, for example, if there's an ID check,
349
00:22:13.750 --> 00:22:16.870
they're expected to present a government issue to ID along the way,
350
00:22:17.210 --> 00:22:19.310
we need to make sure that they know that and they expect it.
351
00:22:19.310 --> 00:22:22.790
Because you'd be surprised how many times people are like, oh, sorry,
352
00:22:22.790 --> 00:22:26.830
I gotta go get my wallet. Oh, my wallet's in my car. Oh, my, um,
353
00:22:26.830 --> 00:22:29.510
partner took my car to the grocery store. You know, I mean, there's,
354
00:22:29.580 --> 00:22:31.590
it's amazing how many times that happens in the moment.
355
00:22:32.090 --> 00:22:36.670
And the longer that process takes, the more stress there is for the test taker.
356
00:22:36.730 --> 00:22:39.750
Mm-hmm. Um, the other consideration is the technical problems.
357
00:22:39.750 --> 00:22:41.910
If your technology doesn't work smoothly,
358
00:22:42.540 --> 00:22:45.990
there's gonna be points in time where there's inevitably some sort of a
359
00:22:45.990 --> 00:22:49.150
technical problem, which really can amplify the stress on the candidate,
360
00:22:49.320 --> 00:22:51.390
which means ultimately, even if they get into the test,
361
00:22:51.740 --> 00:22:55.190
they might not have the same ability to perform as they did before.
362
00:22:55.330 --> 00:22:59.430
So we're thinking about how do we make it predictable? How do we make it smooth?
363
00:22:59.690 --> 00:23:03.510
And on the other side of that, from an internal perspective,
364
00:23:03.520 --> 00:23:04.670
we're always looking at the metrics.
365
00:23:05.130 --> 00:23:08.030
What's the time it takes test takers to check in? Where do they get stuck?
366
00:23:08.030 --> 00:23:12.270
Where do our support tickets get filed so that internally we can find and assess
367
00:23:12.270 --> 00:23:15.390
those and make changes to our platform to remove those, um,
368
00:23:15.410 --> 00:23:16.590
or reduce those barriers.
369
00:23:17.520 --> 00:23:21.050
Mm-hmm. Yeah, you wanna be as frictionless as possible,
370
00:23:21.230 --> 00:23:25.370
but with also making sure everything's set up. Um, Chris,
371
00:23:25.510 --> 00:23:27.930
I'm curious if you have anything to add there about, you know,
372
00:23:27.930 --> 00:23:31.490
how to set that balance between user experience and, and security.
373
00:23:32.570 --> 00:23:36.940
Sure. Yeah, I, I agree with everything Jon said. Um, to kind of expand on,
374
00:23:37.000 --> 00:23:41.420
on a, a bit from a technical perspective, uh, an example is, um, I,
375
00:23:41.540 --> 00:23:43.820
I like what Jon said about making sure a candidate is,
376
00:23:43.840 --> 00:23:45.800
is prepared and they know what's gonna be expected of them.
377
00:23:46.220 --> 00:23:49.680
So a security feature that I've really come to find value in is a,
378
00:23:49.680 --> 00:23:53.800
is a two camera implementation. So you want to, when you do security,
379
00:23:53.820 --> 00:23:56.720
you always wanna make sure you have certain levels. So if they get by one level,
380
00:23:56.980 --> 00:23:59.440
you have other things in place that are gonna be there to try to catch that.
381
00:23:59.440 --> 00:24:02.720
And two cameras a good way to work around those kind of things.
382
00:24:02.820 --> 00:24:05.160
But also with regards to user experience,
383
00:24:05.600 --> 00:24:08.480
introducing a second camera also introduces another friction point.
384
00:24:08.710 --> 00:24:11.920
It's a piece of technology and connection, so it's another point of failure too.
385
00:24:12.340 --> 00:24:14.400
So you need to think, so the candidate needs to be prepared,
386
00:24:14.400 --> 00:24:15.440
know that they're gonna have that,
387
00:24:15.630 --> 00:24:18.120
know that they're gonna have a device for it and know that they're gonna need to
388
00:24:18.120 --> 00:24:21.120
have a spot and how they're gonna need to position that because it's gonna be a
389
00:24:21.120 --> 00:24:23.920
smaller device, need a way to put it. Um,
390
00:24:23.940 --> 00:24:27.840
accommodations are also something that I find very interesting from a security
391
00:24:27.840 --> 00:24:31.160
perspective. So accessibility software, um,
392
00:24:31.680 --> 00:24:33.400
anything an accessibility software is gonna do.
393
00:24:33.460 --> 00:24:37.720
All those inter interfaces it can have are something, another, uh, process,
394
00:24:38.120 --> 00:24:40.560
a malicious process that somebody can make, could use too.
395
00:24:40.900 --> 00:24:43.760
So you don't want to keep the door open completely to accessibility,
396
00:24:43.820 --> 00:24:47.040
but you wanna make sure that you're offering and making available the
397
00:24:47.040 --> 00:24:49.200
accessibility tools to the people that actually need it.
398
00:24:49.460 --> 00:24:51.840
So you wanna take those things into consideration as well.
399
00:24:52.660 --> 00:24:54.360
So you're saying that if, you know,
400
00:24:54.800 --> 00:24:59.080
allowing other programs or other processes to be running for accessibility
401
00:24:59.080 --> 00:24:59.790
purposes,
402
00:24:59.790 --> 00:25:04.120
invites sort of opens more doors for something to be happening with those,
403
00:25:04.310 --> 00:25:05.600
like someone to take over it?
404
00:25:06.180 --> 00:25:07.400
So processes, yes.
405
00:25:07.460 --> 00:25:11.840
But also it's more the fact that those processes are using native APIs with the
406
00:25:11.840 --> 00:25:13.920
system. So if you're gonna allow those APIs in general,
407
00:25:13.920 --> 00:25:17.280
whether it's those processes or a process that's homegrown,
408
00:25:17.410 --> 00:25:20.480
those are the things that you need to consider should you really be allowing
409
00:25:20.480 --> 00:25:22.440
those APIs to interact with your application.
410
00:25:23.480 --> 00:25:26.890
Okay. Because it could pose greater risks. Okay.
411
00:25:26.990 --> 00:25:30.050
It can, yeah, it can be used for, um, content manipulation,
412
00:25:30.050 --> 00:25:34.530
selecting content on the screen. Um, so screen scraping a a lot of those things,
413
00:25:34.890 --> 00:25:36.730
anything from interacting to stealing content.
414
00:25:37.470 --> 00:25:40.890
Got it. Thank you, Chris. Pete, I see you have your hands up.
415
00:25:41.360 --> 00:25:44.170
Yeah, I just wanted to add that one other element to this is, uh,
416
00:25:44.350 --> 00:25:46.610
is the element of fairness. Uh, it's,
417
00:25:46.640 --> 00:25:51.050
it's crucial to have policies and procedures in place and to follow those. So,
418
00:25:51.110 --> 00:25:55.810
uh, if candidate A behaves in one way and ends up getting, uh,
419
00:25:55.810 --> 00:26:00.090
getting banned from the program and candidate B just gets a warning, uh, that,
420
00:26:00.090 --> 00:26:04.250
that news travels very quickly and is very damaging to a program. So, uh,
421
00:26:05.270 --> 00:26:08.250
the other side of it is one of the worst things that can happen is to, uh,
422
00:26:08.700 --> 00:26:13.490
invalidate or ban someone from a program incorrectly. Those accidents happen.
423
00:26:14.110 --> 00:26:17.650
Uh, so a lot of programs, including ours,
424
00:26:17.680 --> 00:26:21.770
have appeals processes, uh, at every stage so that, uh,
425
00:26:22.030 --> 00:26:26.810
in the one in a million chance that someone is incorrectly invalidated or banned
426
00:26:26.810 --> 00:26:29.850
from a program, there's the opportunity to go back, take a second look,
427
00:26:29.850 --> 00:26:33.490
and make sure that that was done correctly, so that nobody is, nobody is harmed.
428
00:26:33.750 --> 00:26:35.670
Mm-hmm. Yeah, I didn't,
429
00:26:35.670 --> 00:26:38.270
I've never thought about that before the appeals process, how many, um,
430
00:26:38.570 --> 00:26:41.430
you said appeals process at every stage, sort of how many,
431
00:26:41.570 --> 00:26:42.590
how many stages is that?
432
00:26:44.060 --> 00:26:46.550
Well, it depends on what the violation is. So if it's a,
433
00:26:46.550 --> 00:26:51.030
if it's a data forensics related, uh, invalidation, we have two different, uh,
434
00:26:51.130 --> 00:26:53.310
two different appeals processes. Uh,
435
00:26:53.310 --> 00:26:57.030
otherwise if it's a invalidation or a ban from the program, we have, uh,
436
00:26:57.090 --> 00:27:01.270
we have one, uh, that typically involves us going back and reviewing video,
437
00:27:01.460 --> 00:27:06.230
reviewing, uh, score similarities, uh, and not only looking at the,
438
00:27:06.450 --> 00:27:07.710
at the exam in question,
439
00:27:07.710 --> 00:27:11.190
but looking at any other exam that candidate has ever taken with us. Mm-hmm.
440
00:27:11.270 --> 00:27:14.870
So if we can discover a pattern from six months or a year ago that, uh,
441
00:27:14.870 --> 00:27:17.110
that carried forward into a, uh, suspicious exam,
442
00:27:17.690 --> 00:27:21.190
all of that is fair game for our, uh, our appeals investigations.
443
00:27:22.030 --> 00:27:26.520
Hmm. That's good to know. All right. Well, thank you so much. Uh,
444
00:27:26.590 --> 00:27:29.200
next question in this area, I'm curious,
445
00:27:29.420 --> 00:27:33.720
and this one I kind of wanna go to all panelists because I am sure you all have
446
00:27:33.990 --> 00:27:36.280
some fun stories to share with us. Um,
447
00:27:37.530 --> 00:27:40.480
would like to know some approaches that some, you know,
448
00:27:40.620 --> 00:27:45.320
bad actors or misbehaviors, uh, you know, would take to,
449
00:27:46.100 --> 00:27:48.720
to misbehave on a test or, or steal content, you know,
450
00:27:48.720 --> 00:27:51.960
what are some things that you've seen in terms of the range of ways that people
451
00:27:52.100 --> 00:27:56.960
can, can misbehave? Let's start with, um, Harry, and,
452
00:27:56.980 --> 00:27:58.000
and then we'll go around.
453
00:27:59.060 --> 00:28:03.880
So, so what I'm about to say comes from, you know, the experience of,
454
00:28:04.380 --> 00:28:08.760
um, my team investigating this for 500 or so clients. And so,
455
00:28:09.220 --> 00:28:09.620
um,
456
00:28:09.620 --> 00:28:13.320
the way I I start this description always in presentations is there's a million
457
00:28:13.320 --> 00:28:14.560
stories in the naked city.
458
00:28:14.560 --> 00:28:19.120
There's lots of different ways that bad guys think to threaten
459
00:28:19.350 --> 00:28:22.320
exam content. Um, however, that being said,
460
00:28:22.380 --> 00:28:26.840
you can divide those really only into two categories, and it's important to,
461
00:28:26.840 --> 00:28:30.240
to simplify it when you're thinking about it. So, for all the different schemes,
462
00:28:30.860 --> 00:28:33.680
really the only two things there are are proxy testing,
463
00:28:33.770 --> 00:28:37.360
which is another person taking the exam for the benefit of the candidate,
464
00:28:37.940 --> 00:28:42.160
or content harvesting where someone is stealing the intellectual property of the
465
00:28:42.160 --> 00:28:44.760
exam sponsor so they can sell it or distribute it.
466
00:28:45.150 --> 00:28:49.480
Both are significant threats to the exam program. Um, but that are the two,
467
00:28:49.610 --> 00:28:53.920
those are the two broad general categories. Mm-hmm. And within, within that,
468
00:28:54.380 --> 00:28:56.240
you know, we see all sorts of different attacks.
469
00:28:56.300 --> 00:29:01.000
We see technical attacks where some pretty sophisticated folks, um,
470
00:29:01.340 --> 00:29:02.360
who have, you know,
471
00:29:02.880 --> 00:29:06.640
excellent knowledge of how locked secure browsers work and how, you know,
472
00:29:06.640 --> 00:29:10.080
tests are delivered, um, attempt to threaten those using technology.
473
00:29:10.500 --> 00:29:15.080
We also see simple, very simple, um, measures taken where, um,
474
00:29:15.420 --> 00:29:15.730
you know,
475
00:29:15.730 --> 00:29:19.840
folks understand the limitations of the webcam and the microphone on the,
476
00:29:19.840 --> 00:29:24.120
you know, native to the candidate system, and they take steps to avoid that. Um,
477
00:29:24.420 --> 00:29:27.200
you know, the techniques are really limited only by the,
478
00:29:27.260 --> 00:29:30.880
the bad guy's imagination. And they definitely,
479
00:29:30.880 --> 00:29:33.720
definitely respond to our countermeasures.
480
00:29:33.780 --> 00:29:38.320
So as we implement a new technique or a new exam security measure,
481
00:29:38.510 --> 00:29:42.120
they are already very quickly working on a new way to get around that.
482
00:29:42.220 --> 00:29:44.320
And so it's a, it's a constant back and forth
483
00:29:44.780 --> 00:29:48.040
Mm-hmm. Constantly evolving. Pete, you have your hand up.
484
00:29:48.160 --> 00:29:49.680
I think that means you wanna answer next,
485
00:29:52.760 --> 00:29:55.120
Actually, I meant I forgot to, to lower my hand, but I'll, uh,
486
00:29:55.120 --> 00:29:56.400
I'll give it a shot. Oh,
487
00:29:58.140 --> 00:29:59.280
Please go ahead. Uh,
488
00:29:59.580 --> 00:30:04.280
For individuals taking, uh, online proctored exams, the, the two most common,
489
00:30:04.820 --> 00:30:05.280
uh,
490
00:30:05.280 --> 00:30:09.880
misbehaviors that we witness are either a third party present in the room or
491
00:30:09.990 --> 00:30:13.000
accessing a cell phone. Uh, if they're accessing the cell phone mm-hmm.
492
00:30:13.080 --> 00:30:13.840
One of two things is happening.
493
00:30:13.840 --> 00:30:17.200
They're either researching answers for a test question,
494
00:30:17.660 --> 00:30:22.160
or they're harvesting questions by taking photographs with a, with a cell phone,
495
00:30:22.460 --> 00:30:24.080
uh, for a third party. Uh,
496
00:30:24.260 --> 00:30:28.520
it could be as simple as someone standing behind them and indicating this,
497
00:30:28.520 --> 00:30:32.680
this one is answer A, this is answer choice B, this is answer choice C. Mm-hmm.
498
00:30:32.760 --> 00:30:34.720
Uh, in some cases, a third party present that is, uh,
499
00:30:34.720 --> 00:30:37.640
that is operating the keyboard. Uh,
500
00:30:38.100 --> 00:30:41.680
or we see very frequently a combination of the two where a third party is
501
00:30:41.920 --> 00:30:46.040
actually photographing, uh, the screen and harvesting on harvesting content.
502
00:30:46.280 --> 00:30:50.360
I had one of those last week where the candidate was taking the exam,
503
00:30:50.500 --> 00:30:52.240
he had his arms spread aside,
504
00:30:52.620 --> 00:30:55.520
and all of a sudden his cell phone creeps up in the, uh,
505
00:30:55.520 --> 00:30:59.120
between his arm and his, uh, and his chest and took a picture. Uh,
506
00:30:59.280 --> 00:31:03.440
I noticed that 25 times and a 50 question exam. So, uh, either,
507
00:31:03.460 --> 00:31:07.120
either someone has three arms or there was a third party behind, uh,
508
00:31:07.120 --> 00:31:10.560
operating there. So that's what we see most frequently. Wow.
509
00:31:11.230 --> 00:31:15.560
That is, that is impressive. Um, Chris,
510
00:31:15.630 --> 00:31:20.200
I'll go to you next. Uh, anything else to add here about some, some, some, uh,
511
00:31:21.080 --> 00:31:25.080
I guess, innovative approaches that you've seen or heard of? Yeah.
512
00:31:25.380 --> 00:31:28.680
Um, yeah, so, so yeah, the, the hidden camera, um,
513
00:31:28.780 --> 00:31:30.960
didn't sound like that last person hit it too well,
514
00:31:31.020 --> 00:31:35.240
but the camera take taking images of the screen. I think another, another,
515
00:31:35.240 --> 00:31:38.280
another area. So, so you have the proxy testing, you have the steam,
516
00:31:38.500 --> 00:31:42.000
the screen scaling content. I also think that there's a, um,
517
00:31:42.070 --> 00:31:45.760
kind of a self-help cheating too. And so what I mean by that is,
518
00:31:45.780 --> 00:31:47.840
is figuring out a way to beat the,
519
00:31:47.940 --> 00:31:51.600
the security measures in place in order to just help yourself take the exam.
520
00:31:52.060 --> 00:31:56.120
And so an example of that would be you figuring out how to use a virtual machine
521
00:31:56.180 --> 00:31:59.840
to, to get around the secure browser so that way you can, um,
522
00:31:59.980 --> 00:32:01.680
use Google yourself during the exam.
523
00:32:01.700 --> 00:32:03.720
So similar like what Pete said with using a phone,
524
00:32:03.740 --> 00:32:05.480
but doing it right on the screen so it's a little,
525
00:32:05.580 --> 00:32:09.800
little less detectable and working around those ways. I think, uh,
526
00:32:10.000 --> 00:32:14.360
GPT is really kind of expanding that 'cause it's, while,
527
00:32:14.360 --> 00:32:16.440
while Google you can eventually get to the answer,
528
00:32:16.440 --> 00:32:18.200
your hands are gonna have to do a lot of movement,
529
00:32:18.200 --> 00:32:21.480
and it's gonna be obvious to a proctor that you're doing that. Whereas GPT,
530
00:32:21.830 --> 00:32:25.840
it's a lot, you have to do a lot less to get a much better or accurate answer.
531
00:32:25.900 --> 00:32:29.840
And then depending on what kind of attacks there are, they could be done as,
532
00:32:29.840 --> 00:32:34.120
as simple as a, a hot stroke or a hotkey, um, implementation depending on what,
533
00:32:34.430 --> 00:32:35.400
what, what the, uh,
534
00:32:35.790 --> 00:32:38.760
what the actor can figure out what's allowed and what's not allowed. So,
535
00:32:39.140 --> 00:32:41.680
so when I say GPTT, I'm talking about like Chat GPT,
536
00:32:41.680 --> 00:32:44.000
those LLMs that are out there and you asking a question,
537
00:32:44.020 --> 00:32:47.080
it gives you the answer. You can even put in the whole multiple choice question.
538
00:32:47.220 --> 00:32:50.240
So, so figuring out those ways and, and combining that,
539
00:32:50.430 --> 00:32:53.080
combining those attacks between content stealing,
540
00:32:53.180 --> 00:32:56.320
and then just taking that content and moving it right off to the l l m,
541
00:32:56.500 --> 00:33:00.200
the chat GPT and getting your answer back and, and doing those type of things.
542
00:33:00.200 --> 00:33:03.360
So I think self-help, um, I'm referring to it as self-help,
543
00:33:03.360 --> 00:33:07.640
but basically a giving yourself a way to cheat without needing to evolve a third
544
00:33:07.640 --> 00:33:11.720
party is also, um, is also something I've seen out there. Hmm.
545
00:33:13.310 --> 00:33:17.480
Alright. Thank you. Uh, definitely lots of different perspectives. Jon,
546
00:33:17.840 --> 00:33:20.960
anything to, to round us out with this laundry list?
547
00:33:22.860 --> 00:33:26.490
Definitely, and there was a, a question in Q and A that I, uh,
548
00:33:26.850 --> 00:33:30.170
answered about Chat GTP and asking if it was something that had really, um,
549
00:33:30.400 --> 00:33:32.930
created more incident of cheating. And, um,
550
00:33:33.090 --> 00:33:34.650
I appreciate what you said about that, Chris. Like,
551
00:33:34.790 --> 00:33:38.650
people are finding better and better ways to get information out of the exam
552
00:33:39.200 --> 00:33:40.610
into any type of a,
553
00:33:40.750 --> 00:33:43.850
an AI model that'll help answer the question and get it back into the exam and
554
00:33:43.850 --> 00:33:44.810
it's getting faster and faster.
555
00:33:44.910 --> 00:33:48.450
So instead of people trying to google the answers they're using, um,
556
00:33:48.730 --> 00:33:51.130
a model like that, which is definitely it,
557
00:33:51.130 --> 00:33:55.610
it's not really increasing the number of, um, times that people attempt, um,
558
00:33:55.750 --> 00:33:57.410
to bypass the rules and look up answers,
559
00:33:57.410 --> 00:33:59.490
but it does definitely give them a better tool.
560
00:33:59.490 --> 00:34:01.730
It's more likely to give them something accurate as an answer,
561
00:34:01.980 --> 00:34:06.170
which is definitely a problem. Um, from our side as like our,
562
00:34:06.230 --> 00:34:08.330
our proctor team seems everything, like,
563
00:34:08.330 --> 00:34:11.090
there's funny stories about moms hiding under desks, you know,
564
00:34:11.380 --> 00:34:13.850
which gets discovered in the room pan to try and, you know,
565
00:34:13.850 --> 00:34:15.010
whisper the answers to their,
566
00:34:15.700 --> 00:34:19.490
their kids to all sorts of shenanigans like that. Um,
567
00:34:20.000 --> 00:34:24.570
sometimes it takes proctors, um, communicating amongst the team and being like,
568
00:34:24.790 --> 00:34:29.410
Hey, we've seen the same background a few too many times and identifying proxy
569
00:34:29.410 --> 00:34:31.770
testing rings based on their location, um,
570
00:34:31.770 --> 00:34:34.930
because there's not that many cubicles that color on a given day.
571
00:34:36.070 --> 00:34:38.890
And so we definitely find that, like Harry said,
572
00:34:38.890 --> 00:34:40.330
it's something that's continually evolving.
573
00:34:40.330 --> 00:34:45.050
People are always trying to find a new and innovative way to circumvent the
574
00:34:45.050 --> 00:34:45.710
rules. Um,
575
00:34:45.710 --> 00:34:49.930
and one thing that's so different about testing online is it's a lot more
576
00:34:50.130 --> 00:34:50.963
scalable. Um,
577
00:34:51.120 --> 00:34:54.850
it's not that scalable to physically go to a test center and take a test for
578
00:34:55.010 --> 00:34:57.530
somebody, but it's much more accessible now, um,
579
00:34:57.550 --> 00:35:00.610
in the same way that our tests are more accessible now, which has good and bad.
580
00:35:00.610 --> 00:35:01.110
Mm-hmm.
581
00:35:01.110 --> 00:35:03.010
Mm-hmm. Wow.
582
00:35:03.090 --> 00:35:06.490
I think we've just taught the audience a lot about some of the different ways
583
00:35:06.490 --> 00:35:11.450
that people, uh, uh, try to misbehave. So,
584
00:35:11.500 --> 00:35:11.850
Chris,
585
00:35:11.850 --> 00:35:15.450
there's one thing that you mentioned earlier that I wanna come back to a little
586
00:35:15.450 --> 00:35:16.370
bit. You mentioned,
587
00:35:16.410 --> 00:35:21.130
I think in your first answer that a secure browser is not enough. So, you know,
588
00:35:21.710 --> 00:35:24.370
can you tell me a little bit more about some of the various tools or
589
00:35:24.370 --> 00:35:27.570
technologies in the administrator's toolbox and,
590
00:35:27.590 --> 00:35:30.730
and why is a secure browser not enough at minimum?
591
00:35:32.550 --> 00:35:36.450
Um, yeah, so, so yeah, I, I definitely do not think a secure browser is,
592
00:35:36.510 --> 00:35:39.400
is enough. There's a lot of layers that need to be put in when you're,
593
00:35:39.400 --> 00:35:41.920
when you're, um, putting together a security implementation. I,
594
00:35:42.160 --> 00:35:44.640
I do really like the two camera option. I also,
595
00:35:44.720 --> 00:35:46.720
I recognize it doesn't make sense for everybody. It,
596
00:35:46.720 --> 00:35:48.360
it adds more friction in certain points.
597
00:35:48.420 --> 00:35:50.040
So it's not something you always want to use,
598
00:35:50.040 --> 00:35:53.240
but it is a useful tool if it makes sense for you and it's something that can
599
00:35:53.240 --> 00:35:55.000
work for your program. Um,
600
00:35:55.000 --> 00:35:57.880
there's different levels of proctoring too that can be implemented.
601
00:35:57.880 --> 00:36:01.600
So you can have like live real-time proctors, professional proctors, um,
602
00:36:02.060 --> 00:36:05.720
or more with like the, the Proctor Now solutions you can have like,
603
00:36:05.720 --> 00:36:09.320
you bring your own proctor or like a record and review or a hybrid model where
604
00:36:09.320 --> 00:36:12.040
really the candidate doesn't really know if they're being live proctor or not,
605
00:36:12.040 --> 00:36:15.680
but you have the tools in place and you can come and review after the fact. And,
606
00:36:15.700 --> 00:36:18.760
and AI notifications are also a useful tool too, um,
607
00:36:18.760 --> 00:36:22.280
with regards to proctoring and helping out and just improving the efficiency of
608
00:36:22.280 --> 00:36:26.200
the proctor. Um, secure browsers are definitely interesting.
609
00:36:26.200 --> 00:36:28.080
There's a whole bunch of different ones out there.
610
00:36:28.560 --> 00:36:30.560
I think when with regards to remote proctoring,
611
00:36:30.560 --> 00:36:33.520
you really need to use an application based lockdown browser.
612
00:36:33.660 --> 00:36:35.960
And so when I say secure browser, a lockdown browser,
613
00:36:36.350 --> 00:36:39.840
what I'm talking about is an application that can lock down the machine and only
614
00:36:39.890 --> 00:36:44.560
allow access to the applications and the content that should be taken during the
615
00:36:44.560 --> 00:36:48.520
exam. So that way you can't use other things during the exam. Um,
616
00:36:48.520 --> 00:36:53.130
there's different levels of it, um, but really it, it's, it's,
617
00:36:53.160 --> 00:36:56.210
it's a program at the end of the day, and so there,
618
00:36:57.050 --> 00:36:59.970
a secure browser in my opinion, can be beat.
619
00:37:00.030 --> 00:37:03.610
If there's somebody determined enough out there and they have the time and the
620
00:37:03.850 --> 00:37:07.130
resources and the motivation to do it, they, they will find a way.
621
00:37:07.130 --> 00:37:08.130
And so it's something that,
622
00:37:08.130 --> 00:37:11.850
it's an area that you constantly have to be vigilant in, constantly have to be,
623
00:37:11.910 --> 00:37:16.770
um, watching for, for new attacks out there and providing the updates. Um,
624
00:37:17.030 --> 00:37:17.863
the secure browser,
625
00:37:18.000 --> 00:37:20.810
it's so much more than just looking for processes these days.
626
00:37:21.110 --> 00:37:22.770
It used to be housed behind, uh,
627
00:37:23.080 --> 00:37:26.770
testing center with trusted admins and those type of things. But with,
628
00:37:26.770 --> 00:37:28.850
in the remote world, those days are long gone.
629
00:37:28.910 --> 00:37:30.930
People now have access to the software,
630
00:37:30.930 --> 00:37:33.730
they can download it because they need to. And so you need to,
631
00:37:33.730 --> 00:37:36.290
you need to take extra steps that didn't have to be taken before.
632
00:37:36.290 --> 00:37:38.330
You need to make sure that these, um,
633
00:37:38.480 --> 00:37:40.450
attackers trying to use the secure browser,
634
00:37:40.510 --> 00:37:43.210
you can't get like unlimited attempts to try to figure out a solution.
635
00:37:43.210 --> 00:37:46.170
You need to make sure that you're applying security in a smart way.
636
00:37:46.170 --> 00:37:48.810
You need to make sure that you're not only looking for processes,
637
00:37:48.830 --> 00:37:49.930
but you're doing for, you're,
638
00:37:49.930 --> 00:37:54.250
you're looking at the operating system holistically are, are every,
639
00:37:54.250 --> 00:37:58.570
every API and every interface that the secure browser's using is something
640
00:37:58.570 --> 00:38:02.930
else another application can do. Um, so you, you need to monitor these things.
641
00:38:02.930 --> 00:38:06.290
You need to, you need to watch for process hijacking and those type of things.
642
00:38:06.430 --> 00:38:10.130
Um, so it's, it's really just the gamut. And at the end of the day, uh, all,
643
00:38:10.130 --> 00:38:11.730
when you consider all those things together,
644
00:38:12.150 --> 00:38:15.690
it just makes it so secure browser is a very good tool and something you should
645
00:38:15.690 --> 00:38:18.930
have, but it should not be the only tool in the toolbox. Mm-hmm.
646
00:38:19.780 --> 00:38:22.010
Great. Thanks. Jon. Would you like to add?
647
00:38:23.440 --> 00:38:24.530
Yeah, it's interesting.
648
00:38:24.530 --> 00:38:28.170
There's two questions in the Q and A that really kind of tie into this one
649
00:38:28.170 --> 00:38:31.250
asking about how do you totally secure an environment and then the other,
650
00:38:31.710 --> 00:38:34.530
how effective secure browsers are detecting processes.
651
00:38:35.060 --> 00:38:38.960
And I think the important thing to realize is there's no complete single
652
00:38:39.320 --> 00:38:42.040
solution. We can never perfectly secure an environment.
653
00:38:42.470 --> 00:38:46.680
What we have to do is go back to that original plan and strategy for your exam
654
00:38:46.820 --> 00:38:50.170
and determine how much risk, um, you can afford,
655
00:38:50.710 --> 00:38:53.690
what's the right way based on the security, or sorry,
656
00:38:53.770 --> 00:38:55.050
based on the exam and your goals,
657
00:38:55.050 --> 00:38:58.530
what's the right level of security to introduce the right amount of friction to
658
00:38:58.530 --> 00:39:00.730
balance your security and user experience goals.
659
00:39:01.190 --> 00:39:02.810
So there isn't perfect solutions,
660
00:39:02.830 --> 00:39:07.090
and it's always going to be an iterative process as we introduce new
661
00:39:07.090 --> 00:39:09.130
countermeasures to, Harry said this exactly right. Like,
662
00:39:09.140 --> 00:39:11.610
we'll introduce a new countermeasure, there'll be a new response to it,
663
00:39:11.950 --> 00:39:13.410
and that's gonna be continuous forever.
664
00:39:14.190 --> 00:39:17.370
The key is that you set goals for your program that makes sense,
665
00:39:17.870 --> 00:39:20.290
so that you know how you're gonna respond if it happens.
666
00:39:20.670 --> 00:39:24.330
You understand that you put the right kind of set of protections into place
667
00:39:24.340 --> 00:39:27.130
based on the significance of the exam, um,
668
00:39:27.390 --> 00:39:31.170
and do your best to monitor the data that comes back so you can make adjustments
669
00:39:31.170 --> 00:39:31.910
over time.
670
00:39:31.910 --> 00:39:35.630
Mm-hmm. Great. Thank you. Um,
671
00:39:35.890 --> 00:39:40.510
so last question about, uh, that pertains to sort of during the exam here.
672
00:39:40.930 --> 00:39:44.390
Uh, we mentioned this a little bit earlier about some of the distractions, uh,
673
00:39:44.390 --> 00:39:47.670
coming in the room and some things that are a little bit out of your control,
674
00:39:47.760 --> 00:39:50.110
right? Some things may be common like someone,
675
00:39:50.430 --> 00:39:54.030
a child or a pet or something entering the room. But, you know,
676
00:39:54.030 --> 00:39:56.910
curious from your perspective, what are,
677
00:39:56.930 --> 00:40:00.750
what's sort of like that allowable threshold for those distractions? Uh,
678
00:40:00.750 --> 00:40:02.430
this kind of plays into that, you know,
679
00:40:02.430 --> 00:40:04.750
user friendliness versus security as well, you know,
680
00:40:04.970 --> 00:40:07.430
how do you make that determination? Um, Jon,
681
00:40:07.870 --> 00:40:12.130
anything to add to that or any, any thoughts on that question?
682
00:40:13.960 --> 00:40:16.060
Um, I got distracted reading one of the questions
683
00:40:16.640 --> 00:40:19.700
To ask again. I'm sorry. That's okay. No, it's okay. We talked about, you know,
684
00:40:19.700 --> 00:40:22.940
the candidate controls the environment, distractions may be common. Um,
685
00:40:23.200 --> 00:40:23.460
you know,
686
00:40:23.460 --> 00:40:27.020
what's the allowable threshold for allowing those distractions before an exam's
687
00:40:27.180 --> 00:40:28.013
terminated?
688
00:40:28.190 --> 00:40:29.023
Terminated? Yeah.
689
00:40:29.580 --> 00:40:32.780
I think that there needs to be a really specific choice made by the program
690
00:40:32.990 --> 00:40:34.260
ahead of time. Um,
691
00:40:34.720 --> 00:40:39.540
and what I mean by that is you need to think about how high stakes the
692
00:40:39.540 --> 00:40:43.620
exam is. And we generally approach that with, um,
693
00:40:43.730 --> 00:40:47.540
kind of packaging it in two general default things of is this something that is,
694
00:40:47.760 --> 00:40:51.660
um, a strict exam or a more balanced exam?
695
00:40:52.240 --> 00:40:56.380
And what we will do with that is determine what threshold it is where,
696
00:40:56.920 --> 00:40:58.940
for example, if a child walks into the room,
697
00:40:58.940 --> 00:41:02.540
there are certain programs that choose to terminate an exam at that point
698
00:41:02.540 --> 00:41:04.100
because of that violation.
699
00:41:04.360 --> 00:41:08.740
And so our goal is to have a suite of tools that a program can use to customize
700
00:41:09.170 --> 00:41:14.020
what level they want, um, based on their needs. So from our perspective,
701
00:41:14.080 --> 00:41:16.780
we have to have a, a wide range of that,
702
00:41:16.800 --> 00:41:20.260
but it's really down to the program to determine what's most appropriate. Um,
703
00:41:20.760 --> 00:41:24.140
and there's definitely not a single size that fits all. Mm-hmm.
704
00:41:25.790 --> 00:41:27.370
Um, Pete, anything to add to that?
705
00:41:28.130 --> 00:41:31.220
Yeah, to add to that, uh, it has to be iterative. Uh,
706
00:41:31.400 --> 00:41:33.480
at Amazon we used to have a very hard line.
707
00:41:33.740 --> 00:41:37.960
Any third party in the testing area equaled, uh,
708
00:41:38.120 --> 00:41:40.760
invalidation of the exam and termination of the exam.
709
00:41:41.260 --> 00:41:45.120
And then we realized that there are some circumstances where a toddler walks in
710
00:41:45.120 --> 00:41:47.760
to say hi to daddy or mom, uh,
711
00:41:48.300 --> 00:41:52.480
or you've got somebody in the, in the far background that opens the door,
712
00:41:52.640 --> 00:41:55.920
realizes that somebody's taking an exam and leaves, uh,
713
00:41:55.920 --> 00:42:00.840
without interacting whatsoever with a candidate. It was grossly unfair to, uh,
714
00:42:00.940 --> 00:42:04.720
to just automatically terminate those exams and require somebody to pay a fee
715
00:42:04.720 --> 00:42:08.800
for testing again. So, um, mm-hmm. We, we back down on that a little bit.
716
00:42:08.980 --> 00:42:12.840
And obviously if a child enters, we're assuming that they're not giving any, uh,
717
00:42:13.020 --> 00:42:17.560
any pre-knowledge of test questions. Uh, but, uh, but also, uh,
718
00:42:18.100 --> 00:42:22.960
we, we provide two warnings for that before we, uh, before we terminate an exam.
719
00:42:23.140 --> 00:42:23.973
Mm-hmm.
720
00:42:24.230 --> 00:42:29.030
Well, stricter balanced exam, you know,
721
00:42:29.030 --> 00:42:29.990
needing it to be iterative.
722
00:42:30.070 --> 00:42:31.910
I think those all sound like really good approaches to,
723
00:42:31.930 --> 00:42:35.000
to make that decision for your program. All right.
724
00:42:35.000 --> 00:42:36.840
So let's move into the final sort of phase here,
725
00:42:36.840 --> 00:42:40.840
talking about what you should be doing after the testing happens. So, uh,
726
00:42:40.900 --> 00:42:43.240
I'm gonna kick it off, Pete, I know you just talked, but, you know,
727
00:42:43.260 --> 00:42:45.160
I'm curious for your thoughts on this one. You know,
728
00:42:45.550 --> 00:42:50.200
tell me about what post-analysis steps should every testing
729
00:42:50.200 --> 00:42:51.080
program be doing?
730
00:42:52.280 --> 00:42:53.190
Thank you. Uh,
731
00:42:53.470 --> 00:42:58.150
I really think that that all depends on how well funded your exam program is.
732
00:42:58.290 --> 00:43:02.870
If you have a relatively small scope program and you're presenting 500 or a
733
00:43:03.070 --> 00:43:04.550
thousand exams a year, uh,
734
00:43:04.610 --> 00:43:09.110
you may not have funding to do things like full-blown data forensics, uh,
735
00:43:09.330 --> 00:43:14.070
and statistical analysis. Uh, in that case, just, uh, you know, some,
736
00:43:14.100 --> 00:43:18.790
some basic, uh, basic score analysis. Uh, so looking at it, uh,
737
00:43:18.890 --> 00:43:21.230
if, if the typical candidate for this, uh,
738
00:43:21.230 --> 00:43:24.510
this particular exam takes 45 minutes to complete an exam,
739
00:43:24.850 --> 00:43:28.510
and you have somebody that completed it in six minutes and 30 seconds, uh,
740
00:43:28.580 --> 00:43:31.550
that might be a red flag that this is something worth looking at. Um,
741
00:43:31.770 --> 00:43:35.390
if you're well funded, you have a, uh, a higher scope program, and you're, uh,
742
00:43:35.410 --> 00:43:39.830
you're delivering tens of thousands or hundreds of thousands of exams a year,
743
00:43:40.330 --> 00:43:44.590
uh, then you may have the, uh, the, the fortune of, uh, of, uh,
744
00:43:45.610 --> 00:43:49.630
of, uh, having a team that can look at, uh, data forensics,
745
00:43:49.630 --> 00:43:52.950
looking at score similarities, looking at, uh, at all of, uh,
746
00:43:53.210 --> 00:43:56.990
all those different elements to, uh, to determine whether or not, uh,
747
00:43:56.990 --> 00:44:00.920
whether or not misbehavior is occurring that way. Mm-hmm.
748
00:44:02.550 --> 00:44:04.460
Harry, wonder if you have anything to add to that?
749
00:44:05.460 --> 00:44:08.580
I do. Um, just to quote another one of our clients, and,
750
00:44:08.580 --> 00:44:11.260
and that's something I'll put in a pitch for here. Um,
751
00:44:11.400 --> 00:44:13.660
we conduct investigations jointly with our clients.
752
00:44:13.800 --> 00:44:18.180
We learn from them and they learn from us. And so, um, when I get to this later,
753
00:44:18.180 --> 00:44:19.500
I'll talk about joint investigations.
754
00:44:19.580 --> 00:44:21.980
I think another question is more appropriate to that,
755
00:44:22.040 --> 00:44:23.780
but the reason I'm quoting my,
756
00:44:23.840 --> 00:44:27.540
our clients so much is because we learn from them. And, and so this quote is,
757
00:44:28.400 --> 00:44:30.060
you really cannot, um,
758
00:44:30.420 --> 00:44:34.240
abdicate responsibility for the security of your own program. And, and by that,
759
00:44:34.240 --> 00:44:38.800
what this client meant is somebody at the exam sponsor has to be looking at
760
00:44:38.800 --> 00:44:42.440
results. And, and Pete, I think did a good job of explaining, you know,
761
00:44:42.440 --> 00:44:43.520
based on resources,
762
00:44:43.520 --> 00:44:46.200
maybe it's a whole psychometrics team that can do forensics and,
763
00:44:46.260 --> 00:44:47.880
and very detailed analysis.
764
00:44:48.330 --> 00:44:53.260
Maybe it's just one person based on the size of the program who has
765
00:44:53.260 --> 00:44:57.300
other roles and responsibilities, but who also has as a,
766
00:44:57.360 --> 00:44:59.620
as one of their collateral duties security.
767
00:45:00.040 --> 00:45:04.260
But somebody has to be flying the air, the security airplane, um,
768
00:45:04.320 --> 00:45:07.540
and monitoring it. And sadly, we do see clients where, you know,
769
00:45:07.590 --> 00:45:12.380
three or four people share that responsibility. And inevitably that's,
770
00:45:12.380 --> 00:45:17.180
those are the programs where sometimes the ball is dropped or, um, you know,
771
00:45:17.240 --> 00:45:19.860
no one's watching for periods of months or even years.
772
00:45:20.360 --> 00:45:24.700
And so it's important whatever level of scrutiny that you do that someone does
773
00:45:24.700 --> 00:45:27.740
it. And I will also add one other technique, um,
774
00:45:27.840 --> 00:45:32.460
in addition to forensics is a tip line, um, to, again, to quote a client,
775
00:45:32.520 --> 00:45:34.420
if you don't have a tip line, uh,
776
00:45:34.420 --> 00:45:37.660
then you are blind to the exam security threats that your program faces.
777
00:45:37.840 --> 00:45:39.820
And so it's important that you have a capability,
778
00:45:39.840 --> 00:45:42.220
and it doesn't have to be a man telephone, it can be an email,
779
00:45:42.800 --> 00:45:45.380
but your candidates are out there seeing what,
780
00:45:45.410 --> 00:45:47.660
what their colleagues are doing and what other people in their,
781
00:45:47.680 --> 00:45:49.580
in their position are doing. Um,
782
00:45:49.710 --> 00:45:54.220
oftentimes they wanna report misconduct themselves because of course they share
783
00:45:54.250 --> 00:45:57.820
your interest in keeping the program safe. The honest candidates always do.
784
00:45:58.280 --> 00:46:01.420
And so in addition to forensics and looking at scores,
785
00:46:01.520 --> 00:46:05.060
you also have to have a way for someone outside the,
786
00:46:05.160 --> 00:46:09.020
the company to be able to report to you if they see something bad happening. So,
787
00:46:09.020 --> 00:46:09.853
tip line. Mm-hmm.
788
00:46:10.040 --> 00:46:14.000
Tip line. Okay. Uh, we've already touched this a little bit,
789
00:46:14.060 --> 00:46:16.520
but I do wanna just make sure that we call out, you know,
790
00:46:16.870 --> 00:46:20.080
what is the balance between failing someone or allowing them to pass?
791
00:46:20.220 --> 00:46:24.280
If you think that they are misbehaving, you know, where do you draw that line?
792
00:46:24.300 --> 00:46:26.880
And I, I, I assume that we're going to say it sort of depends,
793
00:46:26.980 --> 00:46:30.360
but kind of curious what some of those decision factors are. Um, Jon,
794
00:46:30.420 --> 00:46:32.200
I'm wondering if you could say a few words on that.
795
00:46:35.420 --> 00:46:39.790
There's definitely a few, um, key factors. I, I think, um,
796
00:46:40.890 --> 00:46:45.230
really thinking about the way to secure, um, the environment,
797
00:46:45.250 --> 00:46:49.670
the pieces that, that come into that it's, it's again,
798
00:46:49.670 --> 00:46:53.210
putting the layers in place that you have to have, um,
799
00:46:54.270 --> 00:46:56.130
not leaving it until the moment, um,
800
00:46:56.320 --> 00:46:58.970
that you're just launching an exam or new version to make sure that you've
801
00:46:58.970 --> 00:47:02.890
thought about the continuums. Um, and there was a, a question in the qa, uh,
802
00:47:02.890 --> 00:47:06.520
well, about the, what layers go into the environment and it's,
803
00:47:07.230 --> 00:47:11.960
it's gotta be clear rules, clear responses to those rules. We typically rely,
804
00:47:12.180 --> 00:47:15.640
um, on tactics like room pads and other things,
805
00:47:15.640 --> 00:47:20.560
sometimes even partway through the exam to re-secure if there's an anomaly or
806
00:47:20.720 --> 00:47:24.640
something that might kind of cause us to question the situation. Um,
807
00:47:25.170 --> 00:47:27.320
those are kind of the top of mind for me. Mm-hmm.
808
00:47:28.270 --> 00:47:29.580
And Pete, anything to add to that?
809
00:47:30.490 --> 00:47:33.780
Well, I think it, it, uh, it also has something to do with, uh,
810
00:47:33.780 --> 00:47:37.260
with severity of offense and provability of offense.
811
00:47:37.840 --> 00:47:41.460
So if I were, if I wanted to scan, uh,
812
00:47:41.660 --> 00:47:45.860
a document that I have on my iPhone, I would place that outside of,
813
00:47:46.040 --> 00:47:47.340
of a webcam view.
814
00:47:47.960 --> 00:47:51.780
And the only way I'm gonna be able to access that is if I'm consistently looking
815
00:47:51.840 --> 00:47:55.060
to the side to see what's on, on that, uh,
816
00:47:55.720 --> 00:48:00.340
on that smartphone. Um, we use, in that case, we, uh,
817
00:48:00.520 --> 00:48:02.020
the first time somebody looks off screen,
818
00:48:02.020 --> 00:48:05.180
we issue a warning and let them know that continuing that can, uh,
819
00:48:05.200 --> 00:48:08.540
can result in termination of the exam. The second time we get a second warning,
820
00:48:08.670 --> 00:48:10.820
third time they do it, it's uh, it's invalidated.
821
00:48:10.840 --> 00:48:15.180
Now the proof side of that is we can't see from our webcam recording
822
00:48:15.650 --> 00:48:17.820
what exactly it is that they're looking at. We,
823
00:48:17.920 --> 00:48:20.060
we know it's a device or it's perhaps notes,
824
00:48:20.240 --> 00:48:23.740
but we don't know for certain that they are notes about the, uh, about the,
825
00:48:23.920 --> 00:48:28.260
the exam. Now, if somebody leaves webcam view, uh,
826
00:48:28.440 --> 00:48:29.160
for five,
827
00:48:29.160 --> 00:48:32.900
six seconds and then comes back or decides that they want a bathroom break,
828
00:48:32.900 --> 00:48:36.140
even though we don't offer those for our exams and comes back a minute and a
829
00:48:36.140 --> 00:48:40.380
half later, uh, that's a, that's an automatic, uh, violation and,
830
00:48:40.480 --> 00:48:43.300
and termination of the exam because, uh, you know,
831
00:48:43.320 --> 00:48:45.980
who knows what they were doing during that minute and a half if they were
832
00:48:45.980 --> 00:48:48.940
cribbing up on answers for a question that they're having a difficult time
833
00:48:48.940 --> 00:48:52.580
answering or, uh, or what the case might be. So it is, but, uh,
834
00:48:52.580 --> 00:48:55.940
provability does definitely play a, a role in this. Mm-hmm.
835
00:48:56.240 --> 00:48:59.660
And is it fair to say, Pete? A lot of it comes down to indicators,
836
00:48:59.690 --> 00:49:04.500
like we're looking for indicators of potential problems. And, um,
837
00:49:04.690 --> 00:49:08.500
it's, it's funny 'cause I think about this a lot. I, in my office, um,
838
00:49:08.570 --> 00:49:11.540
I've got a big window to my right and people walk their dogs by all the time,
839
00:49:12.000 --> 00:49:15.540
and I, uh, I'm always like, Ooh, you know, who's walking by? What's going on?
840
00:49:15.540 --> 00:49:15.740
Like,
841
00:49:15.740 --> 00:49:18.620
I look out there a lot and I think about if I was in this environment in a test,
842
00:49:19.640 --> 00:49:22.940
at what point in time would my natural habits get me in trouble with that?
843
00:49:23.000 --> 00:49:27.460
And so part of it is there may be a completely innocent reason,
844
00:49:27.480 --> 00:49:32.020
and that's why we really push on the way we flag and talk about events is
845
00:49:32.930 --> 00:49:36.180
what, like what's the indicators, what's the potential event? Like, we're,
846
00:49:36.180 --> 00:49:39.020
what we're trying to be very careful about how we capture that because we
847
00:49:39.220 --> 00:49:41.580
provide data to a program and so they can make a judgment call,
848
00:49:42.320 --> 00:49:45.260
but there might be an an excuse you never really know,
849
00:49:45.920 --> 00:49:50.260
but if there's enough indicators, chances are it might also not be innocent.
850
00:49:50.260 --> 00:49:53.660
And so you've gotta be watching and thinking about how to interpret that data
851
00:49:53.660 --> 00:49:55.700
because you can never have the full story. Mm-hmm.
852
00:49:57.000 --> 00:50:01.200
That's a good point. Alright, so Harry, uh,
853
00:50:01.810 --> 00:50:06.080
wanna chat with you for a a minute about major misconduct. This is one of,
854
00:50:06.110 --> 00:50:08.000
this is one of your major areas of focus.
855
00:50:08.460 --> 00:50:12.920
So what are some signs that major misconduct is afoot and it's not just a
856
00:50:12.920 --> 00:50:14.720
one-off, you know, and, uh,
857
00:50:15.110 --> 00:50:18.800
what are some indicators that a more in-depth investigation may be warranted?
858
00:50:19.700 --> 00:50:24.020
So I think, uh, I think, uh, we, we, the way I characterize,
859
00:50:24.080 --> 00:50:27.840
the way we do intake of investigations is, uh,
860
00:50:28.020 --> 00:50:30.000
we are not shy and we're not proud.
861
00:50:30.010 --> 00:50:33.680
We'll take information from anywhere as long as it's truthful and it's,
862
00:50:33.680 --> 00:50:36.000
it's accurate, it's verifiable. Um,
863
00:50:36.140 --> 00:50:39.160
so we will take lead information from major misconduct, from,
864
00:50:39.160 --> 00:50:40.800
from literally anyone, uh,
865
00:50:40.800 --> 00:50:43.960
as long as we can prove that the information is accurate. Um,
866
00:50:44.590 --> 00:50:47.160
sources that we will typically draw on.
867
00:50:47.160 --> 00:50:50.720
We have informants that we've recruited over time who are reporting to us what
868
00:50:50.720 --> 00:50:55.560
the bad guys are doing. Um, we, we use tip lines, both Pearson VUE has,
869
00:50:55.580 --> 00:50:59.840
we have our own tip line, and then our clients all almost all have, uh,
870
00:50:59.900 --> 00:51:03.960
robust tip line capabilities. And so, we'll, we'll take it that way. Um,
871
00:51:04.500 --> 00:51:07.080
we also, um, rely heavily on forensics, right?
872
00:51:07.080 --> 00:51:09.640
If our psychometric teams are telling us there's a problem,
873
00:51:09.940 --> 00:51:14.120
or because of joint investigations with our clients, our client's,
874
00:51:14.120 --> 00:51:17.320
psychometric teams are telling us, um, there's an issue,
875
00:51:17.320 --> 00:51:21.000
then we will look there. Um, and typically it doesn't start as a major problem,
876
00:51:21.000 --> 00:51:25.040
right? Uh, if, if one, you know, one person out there,
877
00:51:25.300 --> 00:51:27.120
one colleague of a candidate says, Hey,
878
00:51:27.120 --> 00:51:30.920
this guy sits in the next cubicle and I heard that he's cheating. Um, you know,
879
00:51:30.920 --> 00:51:34.080
I heard he, he had someone take his exam. Um, you know,
880
00:51:34.080 --> 00:51:37.480
we'll gather all the information from that tipster from that person and maybe
881
00:51:37.480 --> 00:51:41.440
it'll turn into a major investigation because we will recognize that the
882
00:51:41.680 --> 00:51:45.640
technique is one used by dozens or hundreds of candidates. Um, so again,
883
00:51:45.640 --> 00:51:48.720
it really depends where we get the information from. Um,
884
00:51:49.060 --> 00:51:51.080
we look at everything at least on the,
885
00:51:51.100 --> 00:51:54.880
on the VUE Special Investigations team as having the potential for being a
886
00:51:54.880 --> 00:51:59.520
large scale threat because oftentimes many of them are. Um,
887
00:51:59.580 --> 00:52:02.600
and then what we do with that information is also, I think, significant.
888
00:52:02.660 --> 00:52:04.360
So I'll just take a second to talk about it.
889
00:52:04.660 --> 00:52:08.120
In addition to sharing it with our clients so they can take remedial action and,
890
00:52:08.140 --> 00:52:10.520
and handle the candidate misconduct, um,
891
00:52:10.580 --> 00:52:13.640
we also share it with our internal teams. Um, you know,
892
00:52:13.640 --> 00:52:18.360
we are very aggressive at pushing techniques that we see, you know,
893
00:52:18.440 --> 00:52:23.120
what the bad guys are doing to our development teams so that they can implement
894
00:52:23.120 --> 00:52:27.040
their own countermeasures to stop them. And so we talk with the product owners,
895
00:52:27.140 --> 00:52:30.120
in this case, the on VUE product owners on a daily,
896
00:52:30.120 --> 00:52:33.600
sometimes hourly basis so they can build a higher wall.
897
00:52:34.060 --> 00:52:38.090
Mm-hmm. Uh, last question here. Uh,
898
00:52:38.670 --> 00:52:41.890
how often would you guys say a new technique pops up and,
899
00:52:41.910 --> 00:52:45.530
and how do you find out about it? Uh, I'll start with Chris quickly. Um,
900
00:52:45.590 --> 00:52:48.530
you know, how often would you say you're seeing new techniques to respond to?
901
00:52:49.730 --> 00:52:52.940
Yeah, I, I think it's more driven by just, um, what the market is, uh,
902
00:52:52.940 --> 00:52:57.340
how valuable that is and what, what workarounds have recent or what, um,
903
00:52:57.700 --> 00:53:00.340
security ha has the wall gotten higher recently. Mm-hmm. Um,
904
00:53:00.340 --> 00:53:02.700
every time the wall gets higher, it's gonna get, um,
905
00:53:02.700 --> 00:53:04.620
they're gonna come up with a new way to get around that.
906
00:53:04.680 --> 00:53:09.060
And so there's certainly, um, e even even at a very high,
907
00:53:09.060 --> 00:53:12.660
easy to level for some or easy level that somebody's not very exp experienced
908
00:53:12.660 --> 00:53:16.060
with computers, you can easily find a website that's out there selling,
909
00:53:16.060 --> 00:53:19.220
selling some of the attacks that I mentioned earlier, um, in,
910
00:53:19.220 --> 00:53:20.940
in the form of software. And so those,
911
00:53:20.940 --> 00:53:23.540
those things are constantly popping up every time a measure,
912
00:53:23.590 --> 00:53:25.920
every time you implement a measure, it,
913
00:53:25.940 --> 00:53:29.200
it pretty much you're starting a stopwatch for somebody to try to figure that
914
00:53:29.200 --> 00:53:31.680
out if there's value in, in figuring it out.
915
00:53:32.540 --> 00:53:34.800
Got it. Thank you, Harry, in a couple seconds,
916
00:53:35.200 --> 00:53:37.760
anything else to add to that about how, how often these pop up?
917
00:53:38.340 --> 00:53:42.200
No, it's, it's, I think Chris covered it. It's not super often, um, you know,
918
00:53:42.200 --> 00:53:46.800
the bad guys evolve, uh, for sure in response to what we're doing, but it, it,
919
00:53:46.800 --> 00:53:49.400
you know, it's not hour by hour, minute by minute, I mean,
920
00:53:49.400 --> 00:53:53.200
it takes them a while to figure out what we're doing and then to develop
921
00:53:53.560 --> 00:53:55.840
procedures. Um, you know, there's, there's been a,
922
00:53:55.840 --> 00:53:58.600
there was a big one earlier this year where they invented a whole new way of,
923
00:53:58.700 --> 00:54:00.960
of doing proxy testing. Um,
924
00:54:01.180 --> 00:54:05.840
but I'd say only one or two major new techniques a year, uh, by and large.
925
00:54:06.170 --> 00:54:07.880
Great. Alright,
926
00:54:08.030 --> 00:54:11.640
last presenter question before we grab some of the questions from the Q and A.
927
00:54:11.720 --> 00:54:14.600
I appreciate that you guys have been answering sort of in writing throughout,
928
00:54:14.980 --> 00:54:18.160
uh, in, as you know, just a couple of seconds I wanna go around the table.
929
00:54:18.250 --> 00:54:19.440
Where do you see us,
930
00:54:20.130 --> 00:54:23.240
where do you think we'll be in one to two years with regards to remote
931
00:54:23.240 --> 00:54:25.440
proctoring? Uh, Pete, I'm gonna start with you.
932
00:54:26.960 --> 00:54:28.400
I think, uh, I think both, uh,
933
00:54:28.400 --> 00:54:33.240
both proxy testers and misbehaving candidates and test delivery providers
934
00:54:33.580 --> 00:54:37.280
are gonna be using AI and machine learning a lot more than we're using now. Uh,
935
00:54:37.380 --> 00:54:38.800
the, the big, uh,
936
00:54:39.660 --> 00:54:43.960
the big detractors for both of those right now are things like GDPR and, uh,
937
00:54:43.960 --> 00:54:46.520
requirements and restrictions outside of the United States.
938
00:54:46.940 --> 00:54:50.880
And the fact that these programs are still in their infant stage, uh,
939
00:54:51.170 --> 00:54:54.200
don't work very well and are incredibly slow, but once, uh,
940
00:54:54.390 --> 00:54:59.200
once they speed up and are are real time as opposed to, uh, long pauses between,
941
00:54:59.620 --> 00:55:02.240
uh, between prompts and answers, I think we're gonna be in trouble.
942
00:55:04.300 --> 00:55:07.800
All right. Chris, you're next on my list. Anything, uh, any insights,
943
00:55:07.990 --> 00:55:09.040
predictions to add?
944
00:55:10.160 --> 00:55:11.160
I think, um, I,
945
00:55:11.280 --> 00:55:15.080
I do think that we'll see probably more record and review from a a proctoring
946
00:55:15.080 --> 00:55:18.520
standpoint, um, from a, from a bad actor standpoint,
947
00:55:18.680 --> 00:55:21.800
I think it will be the same but different. I think they'll, uh,
948
00:55:21.800 --> 00:55:23.280
they'll find new ways, but the,
949
00:55:23.300 --> 00:55:26.120
the same people trying to do it will still be trying to do it. If there're,
950
00:55:26.120 --> 00:55:29.080
if there's money there, they're, they're gonna be looking for that money. Uh,
951
00:55:29.080 --> 00:55:31.160
something I, something I am interested to see is,
952
00:55:31.180 --> 00:55:36.160
is does what is AI going to be used to help? Um,
953
00:55:36.230 --> 00:55:38.360
well, I, I'm, I know it is gonna be used, but like,
954
00:55:38.380 --> 00:55:41.760
how is AI gonna really make these, make them,
955
00:55:42.000 --> 00:55:44.040
I improve the frequency of their attack?
956
00:55:44.100 --> 00:55:48.120
Is it gonna increase the frequency of their attacks? Because AI, not only is it,
957
00:55:48.120 --> 00:55:51.560
uh, beneficial, but it also can be used to, um, make,
958
00:55:51.630 --> 00:55:54.440
make development and those type of things easier as well.
959
00:55:55.140 --> 00:55:58.840
Mm-hmm. Uh, Harry, anything to add? Any
960
00:55:58.840 --> 00:56:00.920
Prediction? Yeah, I would just, I would just say I wanted to,
961
00:56:00.920 --> 00:56:03.040
to add this earlier, but then we move past it.
962
00:56:03.620 --> 00:56:08.490
The real benefit of AI to the bad guys so far that we've been able to see
963
00:56:08.550 --> 00:56:11.570
is it reduces their need for experts. And what I mean by that is,
964
00:56:12.310 --> 00:56:14.290
if I set up a proxy, you know,
965
00:56:14.370 --> 00:56:19.210
a proxy business running it out of my house and I want to test on five different
966
00:56:19.240 --> 00:56:20.250
exam programs, you know,
967
00:56:20.250 --> 00:56:24.240
I wanna test a w s 'cause Pete's here and I want to test three or four other
968
00:56:24.270 --> 00:56:27.960
exam programs, chances are I can't, you know,
969
00:56:27.960 --> 00:56:32.200
Harry can't pass all of those exams himself. So he has to, you know,
970
00:56:32.280 --> 00:56:34.640
I have to go out and get experts. I have to get, you know,
971
00:56:34.860 --> 00:56:38.560
my wife can maybe pass an exam and then my next door neighbor can pass an exam.
972
00:56:38.940 --> 00:56:42.760
And then the coordination of scheduling all those folks and making those remote
973
00:56:42.760 --> 00:56:44.160
access proxy tests happen.
974
00:56:44.710 --> 00:56:49.120
What Chat GPT and the large learning models allow these proxy testers to do is
975
00:56:49.120 --> 00:56:52.480
dispense with those experts. Because as Chris described it,
976
00:56:52.500 --> 00:56:57.280
you can type in a portion of the question and Chat GPT will give you
977
00:56:58.000 --> 00:57:01.280
a reasonable answer that would let you take the, you know, answer the question.
978
00:57:01.700 --> 00:57:04.320
And so Chat GPT is really streamlining,
979
00:57:04.580 --> 00:57:09.040
at least has the potential to really streamline how these remote access proxy
980
00:57:09.190 --> 00:57:10.680
organizations do business.
981
00:57:12.770 --> 00:57:16.080
Definitely. All right. Jon, last prediction. I
982
00:57:16.950 --> 00:57:21.540
Think that you'll continue to see AI used more and more on both sides.
983
00:57:21.860 --> 00:57:23.140
Absolutely. And if you think about,
984
00:57:23.140 --> 00:57:25.060
especially from the certification perspective,
985
00:57:25.220 --> 00:57:27.940
a lot of what we're trying to do is help people demonstrate skills.
986
00:57:28.660 --> 00:57:33.460
I imagine we'll get to a point soon where AI is able to evaluate someone's
987
00:57:33.460 --> 00:57:34.040
performance.
988
00:57:34.040 --> 00:57:37.380
So if you think about performance-based testing and some of those things,
989
00:57:37.450 --> 00:57:39.740
it's a great way to demonstrate, like, it's one thing to say,
990
00:57:39.780 --> 00:57:43.260
I know the answers to an AWS exam. It's another thing to say,
991
00:57:43.300 --> 00:57:44.740
I know how to set up an e c two cluster.
992
00:57:45.440 --> 00:57:47.380
And one of the things that is gonna change,
993
00:57:47.540 --> 00:57:51.940
I think will be our ability to evaluate responses. So I,
994
00:57:52.180 --> 00:57:55.620
I would imagine that we'll start to see AI being able to evaluate our
995
00:57:55.620 --> 00:57:57.260
performance of a task, our response,
996
00:57:57.420 --> 00:58:00.420
something that's not just based on evaluating question and answers.
997
00:58:00.480 --> 00:58:04.860
And we've already seen it becoming much more able to understand big blocks of
998
00:58:05.060 --> 00:58:06.900
language, like essay answers and, and the like.
999
00:58:07.320 --> 00:58:10.500
So I think it's gonna be incredibly amazing from a learning perspective.
1000
00:58:10.940 --> 00:58:11.773
I think as humans,
1001
00:58:11.930 --> 00:58:16.100
it's gonna change the way that we access information in an extreme way,
1002
00:58:16.130 --> 00:58:19.340
just like the internet did and all of a sudden information's at our fingertips,
1003
00:58:19.650 --> 00:58:22.020
well now it'll be more digestible and more consumable.
1004
00:58:22.080 --> 00:58:25.340
So I think it's gonna be really exciting and there's gonna be endless amounts of
1005
00:58:25.340 --> 00:58:28.180
work for us to do, um, to keep testing secure and fair.
1006
00:58:28.240 --> 00:58:29.660
And I'm excited about it.
1007
00:58:30.810 --> 00:58:35.360
Great. Thank you. Oh my goodness. We are at time more or less,
1008
00:58:35.700 --> 00:58:40.200
um, I see in looking at the questions and answers that are here now,
1009
00:58:40.200 --> 00:58:42.360
like I said, thank you so much for, uh,
1010
00:58:42.360 --> 00:58:45.000
the panelists for answering those questions live. I,
1011
00:58:45.080 --> 00:58:48.560
I believe we can share the Q and A after we will have a sort of a,
1012
00:58:48.640 --> 00:58:53.070
a post webinar email going out. Um, uh, any,
1013
00:58:53.780 --> 00:58:56.270
I'll, I'll open it up to the panelists for, you know, the,
1014
00:58:56.270 --> 00:58:58.870
the most upvoted question in here is about, you know,
1015
00:58:58.870 --> 00:59:02.710
when someone's caught with misconduct, how much information is provided, uh,
1016
00:59:02.710 --> 00:59:04.070
and the details of their misconduct.
1017
00:59:04.220 --> 00:59:06.550
Does anyone wanna attempt an answer at that?
1018
00:59:10.900 --> 00:59:14.830
Maybe Pete or Jon, you just came off mute.
1019
00:59:15.810 --> 00:59:18.750
Uh, I was just gonna go on mute. I think probably Harry and Pete have the best,
1020
00:59:19.330 --> 00:59:21.880
we provide a lot of data, but we don't usually make those judgment calls.
1021
00:59:22.430 --> 00:59:24.760
Alright, Harry, since you came off mute, let us, uh,
1022
00:59:25.590 --> 00:59:29.600
Talk Yeah, yeah. To Jon's point, we never make those judgment calls. So, uh,
1023
00:59:29.640 --> 00:59:33.480
a famous quote from J Edgar Hoover, you know, the FBI is, you know,
1024
00:59:33.480 --> 00:59:35.880
the FBI is in fact gathering information. We don't,
1025
00:59:36.140 --> 00:59:40.760
we don't judge guilt or innocence. We provide the facts. That's exactly how, um,
1026
00:59:40.950 --> 00:59:43.560
this team operates. We provide, um,
1027
00:59:43.980 --> 00:59:46.960
all of the facts that are available to the client,
1028
00:59:47.100 --> 00:59:50.680
and then they compare them to their hundreds of different policies and
1029
00:59:50.880 --> 00:59:54.440
procedures and they make the decision on, you know, adjudication.
1030
00:59:54.440 --> 00:59:56.000
Sometimes they'll ask us what, you know,
1031
00:59:56.000 --> 00:59:58.840
what are other clients in the space doing or,
1032
00:59:58.900 --> 01:00:02.920
or what's an industry best practice? But, but we never make a decision. Um,
1033
01:00:02.980 --> 01:00:04.760
we will occasionally make recommendations,
1034
01:00:04.860 --> 01:00:09.560
but our primary role is providing facts to people like Pete and then they make
1035
01:00:09.560 --> 01:00:10.393
the decision.
1036
01:00:10.580 --> 01:00:15.390
Mm-hmm. All right. Well, thank you so much everybody. We are at time right now.
1037
01:00:15.950 --> 01:00:17.990
I, I wanna once again, thank you all for joining us.
1038
01:00:18.120 --> 01:00:20.870
Thank you so much to our panelists for enjoying us.
1039
01:00:21.030 --> 01:00:24.510
I think we all learned a lot. Um, like I said, uh,
1040
01:00:24.890 --> 01:00:27.110
you should be getting a follow-up email with a recording.
1041
01:00:27.440 --> 01:00:29.270
We'll see what we can do about the Q and A, uh,
1042
01:00:29.270 --> 01:00:31.310
the questions that have been answered. And, uh,
1043
01:00:31.320 --> 01:00:35.910
don't click away too fast for the survey. So thank you all once again.
1044
01:00:38.000 --> 01:00:38.833
Bye.
1045
01:00:38.970 --> 01:00:39.400
Thank you.