Popular Articles
Twitter Feed
The Authentication Process - External Authentication
Feedback is given primarily through the external authentication report, but in addition the external authenticator may be required to give verbal feedback directly to management and/or assessors and/or the results approval panel.
The external authentication report must be completed (using QQI template or provider's own) and submitted to the provider and should include:
- http://www.fess.ie/templates/ja_edenite/images/bullet.gif) 18px 7px no-repeat;">Provider details
- http://www.fess.ie/templates/ja_edenite/images/bullet.gif) 18px 7px no-repeat;">Date
- http://www.fess.ie/templates/ja_edenite/images/bullet.gif) 18px 7px no-repeat;">Basis for sample selected and sample size
- http://www.fess.ie/templates/ja_edenite/images/bullet.gif) 18px 7px no-repeat;">External authenticator's details
- http://www.fess.ie/templates/ja_edenite/images/bullet.gif) 18px 7px no-repeat;">A report on moderation/extent to which assessment decisions were consistent with national standards
- http://www.fess.ie/templates/ja_edenite/images/bullet.gif) 18px 7px no-repeat;">Awards moderated (modules)
- http://www.fess.ie/templates/ja_edenite/images/bullet.gif) 18px 7px no-repeat;">Number and % of grades changed
- http://www.fess.ie/templates/ja_edenite/images/bullet.gif) 18px 7px no-repeat;">Good practice observed
- http://www.fess.ie/templates/ja_edenite/images/bullet.gif) 18px 7px no-repeat;">Concerns identified
- http://www.fess.ie/templates/ja_edenite/images/bullet.gif) 18px 7px no-repeat;">Areas for improvement
- http://www.fess.ie/templates/ja_edenite/images/bullet.gif) 18px 7px no-repeat;">Signature
The final results sheets are left with the provider on the day of external authentication. All moderated grades will be listed on the authentication report (results sheet from the QBS).
Where grades have been changed the external authenticator will have taken notes on why grades were changed and these notes will be included or attached to the external authentication report.
Assessors may be available to the external authenticator if agreed in advance with the provider and in accordance with the provider's quality assurance policies and procedures.
Where an external authenticator changes a grade, they will have to change the mark to reflect the grade change. This does not involve re-marking the work. For example, if an external authenticator moderates a portfolio of learner evidence which is marked at 78% and therefore graded merit and the external authenticator deems this portfolio to be at distinction level, he/she will change the grade to distinction and the mark to 80%.
Yes, all learner evidence must be available to the external authenticator. This should be established with the provider prior to the visit of the external authenticator.
This will depend on the total number of learner assessment portfolios presented for authentication and on the provider's sampling strategy. The sample must be sufficient in size to enable the external authenticator to make an informed judgement on the consistency of assessment decisions in the context of the award standards.
If the external authenticator determines that the sample yielded by the provider's sampling strategy is not sufficient to enable him/her to make an informed judgement on the consistency of assessment decisions in the context of the award standards, he/she may request to see more learner evidence.
Yes. Where the learners are completing the same major, special purpose, supplemental and/or minor award. However, a provider must document their agreed procedures for sampling (including a sampling strategy) ensuring that all the criteria as set out by QQI in the Quality Assuring Assessment Guidelines for Providers, revised 2013, p 27/28 are met.
This will depend on a provider's agreed sampling strategy and on how the strategy is intended to be applied. It could yield the same sample and it may not. It is more than likely that the chosen samples will be different for internal verification and external authentication, as both processes have very different functions.
There are a number of things that an external authenticator should do in preparation for the external authentication visit, including:
Agree the terms and conditions for conducting external authentication with the provider
Confirm, with the provider, the availability of
Acquire knowledge of:
What does the external authenticator do if the internal verification process has not been completed?
The external authenticator should not commence external authentication until the internal verification process is complete. An internal verification report must be available to the external authenticator.
Internal verification and external authentication comprise the two elements of a provider's quality assured authentication process. The internal verification process must precede the external authentication process. Internal verification is a monitoring process which confirms that the provider's assessment procedures have been applied consistently across assessment activities and also verifies the accuracy of assessment results. The external authentication process involves the moderation of assessment evidence to confirm that the assessment evidence and its grading are consistent with national standards.
Although it is not the role of the external authenticator to be a member of the results approval panel, the provider may request that the external authenticator be a member of or be available to the results approval panel. This would be negotiated between the external authenticator and the provider.
The external authenticator must complete an external authentication report and make it available to the provider's results approval panel.
Yes. According to QQI, external authenticator(s) should be "independent of the centre to which they are assigned" (QQI Quality Assuring Assessment Guidelines for Providers revised 2013, p 26) . Therefore, for a multi-centre/location provider, an external authenticator may be selected from within the provider but must be external to the centre/location. A provider must document their procedures for selecting external authenticator(s) as part of their quality assuring assessment process.
No. According to QQI Quality Assuring Assessment Guidelines for Providers (revised 2013, p. 26), the external authenticator selected should "have technical/subject matter expertise within the appropriate award area/field of learning". However, in some cases an external authenticator may be in a position to moderate results in general award areas within the context of the field of learning in which s/he is moderating, for example, an external authenticator moderating a major award in childcare may be in a position to moderate a minor award in communications for the same group of learners.
A provider will ensure that all major/special purpose/supplemental award areas and all centres have an external authenticator assigned per annum, as identified by QQI in the Quality Assuring Assessment Guidelines for Providers (2013 p. 27).
In addition, ALL awards should be included in a sample over a two year cycle (Quality Assuring Assessment Guidelines for Providers (2013 p. 43).
The role of the external authenticator is to provide independent confirmation of the fair and consistent assessment of learners and to ensure consistency of assessment results with national standards. This is achieved by moderating learner assessment evidence against the relevant standard and the assessment criteria in the award specifications and validated programmes. External authenticators are appointed by the provider in order to carry out this role. For further information see page 26 of the QQI Quality Assuring ASsessment, Guidleins for Providers revised 2013
Providers can source external authenticators from the QQI external authenticator panel. In addition, providers may appoint external authenticators through their own quality assured processes as agreed with QQI.
Information on the QQI panel of external authenticators can be found on the QBS.
