WorldWideScience

Sample records for avoiding confidential statement

  1. 5 CFR 3902.104 - Confidentiality of employees' statements.

    Science.gov (United States)

    2010-01-01

    ... Confidentiality of employees' statements. Each supplemental statement of employment and financial interests shall... carry out the purpose of this part or as otherwise required by law. Information from these statements... 5 Administrative Personnel 3 2010-01-01 2010-01-01 false Confidentiality of employees' statements...

  2. 19 CFR 200.735-121 - Confidentiality of employees' statements.

    Science.gov (United States)

    2010-04-01

    ... RESPONSIBILITIES AND CONDUCT Provisions Governing Statements of Employment and Financial Interests § 200.735-121 Confidentiality of employees' statements. Each statement of employment and financial interests, and each... carry out the purpose of this part. The Deputy DAEO may not disclose information from the statement...

  3. 18 CFR 706.410 - Confidentiality of statements.

    Science.gov (United States)

    2010-04-01

    ... use of information on the statements shall be limited to that necessary to carry out the purposes of... EMPLOYEE RESPONSIBILITIES AND CONDUCT Statements of Employment and Financial Interests § 706.410 Confidentiality of statements. Each statement of employment and financial interests, and each supplementary...

  4. 22 CFR 1203.735-409 - Confidentiality of employees' statements.

    Science.gov (United States)

    2010-04-01

    ... 22 Foreign Relations 2 2010-04-01 2010-04-01 true Confidentiality of employees' statements. 1203.735-409 Section 1203.735-409 Foreign Relations UNITED STATES INTERNATIONAL DEVELOPMENT COOPERATION AGENCY EMPLOYEE RESPONSIBILITIES AND CONDUCT Statements of Employment and Financial Interests § 1203.735...

  5. Confidentiality

    African Journals Online (AJOL)

    jacobien

    essential to the professional ethics of med- ical practitioners. As important ... guish four such values: autonomy, privacy, promise-keeping and utility ... value their privacy. Confidentiality obvi- ously fosters privacy by preventing the spread of privileged information that would violate privacy. Promise-keeping. Given that doctors ...

  6. 37 CFR 384.5 - Confidential information.

    Science.gov (United States)

    2010-07-01

    ... 37 Patents, Trademarks, and Copyrights 1 2010-07-01 2010-07-01 false Confidential information. 384... BUSINESS ESTABLISHMENT SERVICES § 384.5 Confidential information. (a) Definition. For purposes of this part, “Confidential Information” shall include the statements of account, any information contained therein, including...

  7. 37 CFR 261.5 - Confidential information.

    Science.gov (United States)

    2010-07-01

    ... 37 Patents, Trademarks, and Copyrights 1 2010-07-01 2010-07-01 false Confidential information. 261... THE MAKING OF EPHEMERAL REPRODUCTIONS § 261.5 Confidential information. (a) For purposes of this part, “Confidential Information” shall include the statements of account, any information contained therein, including...

  8. 37 CFR 382.14 - Confidential information.

    Science.gov (United States)

    2010-07-01

    ... 37 Patents, Trademarks, and Copyrights 1 2010-07-01 2010-07-01 false Confidential information. 382... Confidential information. (a) Definition. For purposes of this subpart, “Confidential Information” shall include the statements of account and any information contained therein, including the amount of royalty...

  9. Computer Security: Printing confidentially

    CERN Multimedia

    Stefan Lueders, Computer Security Team

    2015-01-01

    Have you ever hesitated to print a confidential document using CERN printers? Or perhaps you have rushed quickly to the printer after hitting the “print” button in order to avoid someone else getting hold of and reading your document? These times are over now with the new printing infrastructure!   Indeed, many of us regularly print out confidential documents like our salary slips, MARS forms, tendering documents and drafts of preliminary papers. The upcoming CERN data protection policy will require all of us to respect the confidentiality of such documents and, as the word “confidential” implies, access to “confidential” or sensitive documents will be tightly controlled. What can we do about the public printers located in many buildings, floors and shared spaces - accessible not only to CERN staff and users but also to visitors and guests? Some printers are located in the vicinity of restaurants, cafeterias or close to paths taken b...

  10. 37 CFR 262.5 - Confidential information.

    Science.gov (United States)

    2010-07-01

    ... 37 Patents, Trademarks, and Copyrights 1 2010-07-01 2010-07-01 false Confidential information. 262... information. (a) Definition. For purposes of this part, “Confidential Information” shall include the statements of account, any information contained therein, including the amount of royalty payments, and any...

  11. 37 CFR 380.5 - Confidential information.

    Science.gov (United States)

    2010-07-01

    ... 37 Patents, Trademarks, and Copyrights 1 2010-07-01 2010-07-01 false Confidential information. 380... information. (a) Definition. For purposes of this part, “Confidential Information” shall include the statements of account and any information contained therein, including the amount of royalty payments, and...

  12. 40 CFR 716.55 - Confidentiality claims.

    Science.gov (United States)

    2010-07-01

    ... for company name or address, financial statistics, and product codes used by a company. This... than company name or address, financial statistics, and product codes used by a company, which is... brief statement for the basis of the claim as well as a label such as “confidential,” “proprietary,” or...

  13. 30 CFR 47.85 - Confidentiality agreement and remedies.

    Science.gov (United States)

    2010-07-01

    ... TRAINING HAZARD COMMUNICATION (HazCom) Trade Secret Hazardous Chemical § 47.85 Confidentiality agreement... trade secret chemical identity to the health purposes indicated in the written statement of need; (2... designated representative, or the health professional to disclose the trade secret chemical identity to MSHA...

  14. 48 CFR 9903.202-4 - Privileged and confidential information.

    Science.gov (United States)

    2010-10-01

    ... confidential information. 9903.202-4 Section 9903.202-4 Federal Acquisition Regulations System COST ACCOUNTING... Statement contains trade secrets and commercial or financial information, which is privileged and... AND COST ACCOUNTING STANDARDS CONTRACT COVERAGE CAS Program Requirements 9903.202-4 Privileged and...

  15. Ombuds’ corner: Confidentiality

    CERN Multimedia

    Vincent Vuillemin

    2011-01-01

    In this series, the Bulletin aims to explain the role of the Ombuds at CERN by presenting practical examples of misunderstandings that could have been resolved by the Ombuds if he had been contacted earlier. Please note that, in all the situations we present, the names are fictitious and used only to improve clarity.    Jane* came to the Ombuds to share her concerns about the actions of Mike*, one of her senior colleague supervisors, and insisted on the absolute confidentiality. The Ombuds promised to keep the information confidential following the terms of his mandate. During the discussion it appeared that the whole group was affected by the situation, spending a lot of time discussing how to resolve the problem instead of focusing on their main responsibilities. The risks for the Organization seemed very high and could possibly endanger the safety of the operations.  On one side, the Ombuds believed that it was essential to bring this matter to the attention of senior managem...

  16. Confidentiality and the adolescent patient

    African Journals Online (AJOL)

    the patient's explicit authorisation.1. Without assurances of confidentiality patients may be unwilling to give doctors the information they need to provide good care. This article examines the scope and limits of confidentiality in the case of ado- lescent patients. Suggestions that adolescents should be allowed to make medical ...

  17. Environmental impact statements

    International Nuclear Information System (INIS)

    Stewing, C.

    1986-01-01

    The adoption of US-type environmental impact statements is considered to be approaching. Environmental impact statements are defined as comprehensive analyses of the future effects of measures on environmental conditions with the aim of avoiding ecological disadvantages. The recommendation ratified by the European Communities on June 27, 1985 requires the environmental impact statement to be implemented as a mandatory procedure. The implementation is difficult to realize. Particular problems consist in the alignment of the environmental impact statement with existing administrative procedures and in the operationable formulation of the aims and results of the statement. Paragraph 72 of the administrative procedures law (VwVfG) shows that planning procedures and environmental impact statement are to be treated as two parallel regulations. The structural order of environmental impact statements must therefore be integrated into the regulations of planning procedures. (orig./HP) [de

  18. Confidential Business Information under TSCA

    Science.gov (United States)

    This website informs businesses, policymakers, and the public about the confidential business information (CBI) provisions of § 14 of the Toxic Substances Control Act (TSCA), as amended by the Frank R. Lautenberg Chemical Safety for the 21st Century Act.

  19. Confidentiality in gamete donation

    Directory of Open Access Journals (Sweden)

    Neda Yavari

    2006-03-01

    Full Text Available During recent decades, the third person intervention in human artificial insemination has created new hopes for infertile couples. However these new progresses have propounded new ethical and legal concerns for families. One of them is confidentiality regarding gamete donor's identity, and its disclosure to the future child and others. Of course, negligence to this ethical issue would produce a big barrier for efficient health care services."nFor compiling this article we searched different websites including Pubmed, Ovid, Elsevier, Google and etc and the resulting articles were investigated carefully. "nIn this article, the history of gamete donation in different countries is reviewed initially and the mentioned reasons for anonymity with that of disclosure are compared. "nBecause of the different cultures and values of various societies, it is not justifiable to propose a unique method regarding this issue; however, there have to be clear rules in this regard, in each country. In order to facilitate this process, pretreatment counseling courses should be established to explain different aspects of this issue for the recipients.

  20. Evaluation in a competitive utility environment: the threat of confidentiality

    International Nuclear Information System (INIS)

    Vine, Edward

    1997-01-01

    information needs and sources and revise existing policies. 2. Review process for handling confidentiality claims and revise existing policies. 3. Monitor restructuring activities. 4. Develop framework and specific guidelines. 5. Develop standards of conduct. 6. Hold workshops on confidentiality. 7. Design and implement a pilot project. 8. Establish and support consumer advocates. 9. Support more research on confidentiality. Utilities will be reluctant to support these activities and develop the new rules of the game. Regulators need to be more proactive and conduct the above activities promptly in order to avoid paralysis and inertia and to maintain the regulatory balance. The lack of a regulatory framework and specific policies for information access may only make existing problems more severe. The issue of confidentiality has broad sociopolitical dimensions. In the next few years, commissions will be asked to create information policies that will demonstrate the degree of their support for public access to utility- held information. These policies will be important since they can ''profoundly affect the manner in which an individual in a society, indeed a society itself, makes political, economic and social choices.'' Finally, in all likelihood, evaluators will need to adapt to an environment where utility data will be more difficult to obtain and disseminate. It is premature to see how increased confidentiality will affect the objectivity, usefulness, validity, and reliability of evaluations. If the evaluation community wishes to maintain the high its work, creative solutions will most needed

  1. 12 CFR 366.13 - What is my obligation regarding confidential information?

    Science.gov (United States)

    2010-01-01

    ... services on your behalf may use or disclose information obtained from us or a third party in connection... general public. (b) The following are examples of when your use of confidential information is... financial information, such as a financial statement to an unauthorized party. ...

  2. Contractual Protection of Confidential Business Information: In Norwegian Employment- and Business Contracts

    OpenAIRE

    Coates, Sarah Lea

    2013-01-01

    Confidential information can be one of the most valuable assets in a business. By avoiding the disclosure of such information, companies are able to maintain their competitive advantage. The main purpose of this thesis is to establish how and to what extent companies can protect confidential business information by contractual regulations according to Norwegian law. This thesis was written with a scholarship from the research project "Nordic Restatement of Contract Law".

  3. 7 CFR 983.65 - Confidential information.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 8 2010-01-01 2010-01-01 false Confidential information. 983.65 Section 983.65..., ARIZONA, AND NEW MEXICO Reports, Books and Records § 983.65 Confidential information. All reports and records furnished or submitted by handlers to the committee which include confidential data or information...

  4. Confidentiality and integrity in crowdsourcing systems

    CERN Document Server

    Ranj Bar, Amin

    2014-01-01

    Confidentiality and Integrity in Crowdsourcing Systems focuses on identity, privacy, and security related issues in crowdsourcing systems and in particular the confidentiality and integrity of online data created via crowdsourcing. This book begins with an introduction to crowdsourcing and then covers the privacy and security challenges of Confidentiality. The book examines integrity in these systems and the management and control of crowdsourcing systems.

  5. Confidential data in a competitive utility environment: A regulatory perspective

    Energy Technology Data Exchange (ETDEWEB)

    Vine, E.

    1996-08-01

    Historically, the electric utility industry has been regarded as one of the most open industries in the United States in sharing information but their reputation is being challenged by competitive energy providers, the general public, regulators, and other stakeholders. As the prospect of competition among electricity power providers has increased in recent years, many utilities have been requesting that the data they submit to their utility regulatory commissions remain confidential. Withholding utility information from the public is likely to have serious and significant policy implications with respect to: (1) consumer education, the pursuit of truth, mutual respect among parties, and social cooperation; (2) the creation of a fair market for competitive energy services; (3) the regulatory balance; (4) regional and national assessments of energy-savings opportunities; (5) research and development; and (6) evaluations of utility programs, plans, and policies. In a telephone survey of all public utility commissions (PUCs) that regulate electric and gas utilities in the U.S., we found that almost all PUCs have received requests from utility companies for data to be filed as confidential, and confidential data filings appear to have increased (both in scope and in frequency) in those states where utility restructuring is being actively discussed. The most common types of data submitted as confidential by utilities dealt with specific customer data, market data, avoided costs, and utility costs.

  6. The Adolescent's Right to Confidential Care When Considering Abortion.

    Science.gov (United States)

    2017-02-01

    In this statement, the American Academy of Pediatrics reaffirms its position that the rights of adolescents to confidential care when considering abortion should be protected. Adolescents should be encouraged to involve their parents and other trusted adults in decisions regarding pregnancy termination, and most do so voluntarily. The majority of states require that minors have parental consent for an abortion. However, legislation mandating parental involvement does not achieve the intended benefit of promoting family communication, and it increases the risk of harm to the adolescent by delaying access to appropriate medical care. This statement presents a summary of pertinent current information related to the benefits and risks of legislation requiring mandatory parental involvement in an adolescent's decision to obtain an abortion. Copyright © 2017 by the American Academy of Pediatrics.

  7. WTO confidential: the case of asbestos.

    Science.gov (United States)

    Castleman, Barry

    2003-01-01

    The World Trade Organization (WTO), established in 1995, adjudicates "trade disputes" between member nations in cases with human rights, cultural, environmental, and public health significance. Throughout the resolution process and even after a case's conclusion, little of what happens is made accessible to the public. However, it is one thing to criticize the WTO for its lack of transparency from outside the process and another to critically examine what was withheld from disclosure and what dangers that presents. This is the inside story from a scientific adviser to one party in a WTO case, who analyzes what happened from a public health point of view. The analysis concludes that the public health justification for banning asbestos was accepted in the end by WTO economists, despite the WTO's bias in favor of the party (Canada) making the free trade challenge (to public health legislation), despite the WTO's lack of expertise in science, medicine, engineering, and public health, and despite important erroneous statements made to the WTO under the cover of confidentiality. The case nevertheless illustrates that the WTO's threat to national sovereignty could never withstand the light of day if the limitations and dangers of the process were open for all to see.

  8. 21 CFR 720.8 - Confidentiality of statements.

    Science.gov (United States)

    2010-04-01

    ... whether the identity of an ingredient qualifies as a trade secret: (1) The extent to which the identity of... the identity of the claimed trade secret ingredient to the petitioner and to its competitors; (5) The... necessary to make a determination about whether the identity of an ingredient is a trade secret, FDA...

  9. Confidential patent application with an example of preparation

    Directory of Open Access Journals (Sweden)

    Obrad T. Čabarkapa

    2013-12-01

    is submitted: power of attorney; cofirmation on presenting the invention at an international exhibition; certified copy of the first patent application; statement on the basis of entitlement to file an application; statement by the inventor if he does not want to be mentioned in the patent application; proof of the payment of the patent application fee; statement of a joint representative if there are more applicants. Conclusion In order that a confidential invention receive  patent or petty patent protection, it is necessary to file a patent application. A confidential patent application is a very comprehensive document which has to be compiled with expert knowledge from both the technical field to which the application relates and the field of intellectual property protection. The shown content of the confidential patent application with an example can be useful for inventors in their attempts to draw up their own patent applications. [1] The structure and the content of a confidential patent application  is identical  to the content and the form of a patent application submitted to the Intellectual Property Office,a competent state institution for the protection of intellectual property. 

  10. Critical Care Nurses' Knowledge of Confidentiality Legislation.

    Science.gov (United States)

    Newman, Angela B; Kjervik, Diane K

    2016-05-01

    Health care legislation can be difficult to understand and apply in critical situations where patients may not be physically capable of autonomous control of confidential health information. Nurses are often the first to encounter confidential information about patients. To explore critical care nurses' knowledge of federal and North Carolina state legislation regarding confidentiality. This descriptive, qualitative study included 12 critical care nurses who were asked to describe their knowledge of federal confidentiality legislation and specific knowledge of North Carolina's confidentiality legislation. Critical care nurses were knowledgeable about federal confidentiality laws but demonstrated a need for further education about state-specific legislation. Nurses' application of confidentiality legislation demonstrates their knowledge of confidentiality legislation. To continue the trusting relationship that nurses have traditionally held with patients and patients' families, it is imperative for nurses to remain current about confidentiality legislation. Through education both before and after licensure, correct application of legislation can be achieved. Further research can aid in exploring the intersection between health care legislation and ethics. ©2016 American Association of Critical-Care Nurses.

  11. 7 CFR 930.73 - Confidential information.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 8 2010-01-01 2010-01-01 false Confidential information. 930.73 Section 930.73... Handling Reports and Records § 930.73 Confidential information. All reports and records furnished or submitted by handlers to the Board and its authorized agents which include data or information constituting...

  12. 7 CFR 28.960 - Confidential information.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 2 2010-01-01 2010-01-01 false Confidential information. 28.960 Section 28.960 Agriculture Regulations of the Department of Agriculture AGRICULTURAL MARKETING SERVICE (Standards... Tests § 28.960 Confidential information. No information concerning individual tests under the...

  13. 7 CFR 996.72 - Confidential information.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 8 2010-01-01 2010-01-01 false Confidential information. 996.72 Section 996.72... Confidential information. All reports and records furnished or submitted by handlers and importers to USDA which include data or information constituting a trade secret or disclosing a trade position, financial...

  14. 7 CFR 993.71 - Confidential information.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 8 2010-01-01 2010-01-01 false Confidential information. 993.71 Section 993.71... CALIFORNIA Order Regulating Handling Reports and Books and Other Records § 993.71 Confidential information... information constituting a trade secret or disclosing of the trade position, financial condition, or business...

  15. 7 CFR 929.65 - Confidential information.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 8 2010-01-01 2010-01-01 false Confidential information. 929.65 Section 929.65... Confidential information. All reports and records furnished or submitted by handlers to the committee and its authorized agents which include data or information constituting a trade secret or disclosing the trade...

  16. 7 CFR 932.63 - Confidential information.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 8 2010-01-01 2010-01-01 false Confidential information. 932.63 Section 932.63... Regulating Handling Reports and Records § 932.63 Confidential information. All reports and information... any person, other than the Secretary upon request therefor, data, or information obtained or extracted...

  17. 7 CFR 989.75 - Confidential information.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 8 2010-01-01 2010-01-01 false Confidential information. 989.75 Section 989.75... GROWN IN CALIFORNIA Order Regulating Handling Reports and Records § 989.75 Confidential information. All... to no person, except the Secretary upon request therefor, data or information obtained or extracted...

  18. 7 CFR 982.70 - Confidential information.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 8 2010-01-01 2010-01-01 false Confidential information. 982.70 Section 982.70... WASHINGTON Order Regulating Handling Records and Reports § 982.70 Confidential information. All reports and records furnished or submitted by handlers to the Board, which include data or information constituting a...

  19. 7 CFR 900.309 - Confidential information.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 8 2010-01-01 2010-01-01 false Confidential information. 900.309 Section 900.309... to Agricultural Marketing Agreement Act of 1937, as Amended § 900.309 Confidential information. The... information furnished to, compiled by, or in the possession of the referendum agent, shall be regarded as...

  20. 49 CFR 537.12 - Confidential information.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 6 2010-10-01 2010-10-01 false Confidential information. 537.12 Section 537.12... ADMINISTRATION, DEPARTMENT OF TRANSPORTATION AUTOMOTIVE FUEL ECONOMY REPORTS § 537.12 Confidential information. (a) Information made available under § 537.11 for public inspection does not include information for...

  1. 7 CFR 900.407 - Confidential information.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 8 2010-01-01 2010-01-01 false Confidential information. 900.407 Section 900.407... to the Agricultural Marketing Agreement Act of 1937, as Amended § 900.407 Confidential information... voted or the manner in which any person voted) and all information furnished to, compiled by, or in...

  2. 7 CFR 900.352 - Confidential information.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 8 2010-01-01 2010-01-01 false Confidential information. 900.352 Section 900.352... Determining the Qualification of Cooperative Milk Marketing Associations § 900.352 Confidential information. The documents and other information submitted by an applicant association and otherwise obtained by...

  3. 42 CFR 2.13 - Confidentiality restrictions.

    Science.gov (United States)

    2010-10-01

    ... CONFIDENTIALITY OF ALCOHOL AND DRUG ABUSE PATIENT RECORDS General Provisions § 2.13 Confidentiality restrictions..., administrative, or legislative proceedings conducted by any Federal, State, or local authority. Any disclosure... place where only alcohol or drug abuse diagnosis, treatment, or referral is provided may be acknowledged...

  4. 14 CFR 414.13 - Confidentiality.

    Science.gov (United States)

    2010-01-01

    ... application that trade secrets or proprietary commercial or financial data be treated as confidential, and...,” “Proprietary Commercial Information,” “Trade Secret,” or “Confidential Treatment Requested.” Where this marking... proposed criteria for evaluating a safety approval is secret, as classified by the U.S. Government, or the...

  5. 10 CFR 430.75 - Confidentiality.

    Science.gov (United States)

    2010-01-01

    ... 10 Energy 3 2010-01-01 2010-01-01 false Confidentiality. 430.75 Section 430.75 Energy DEPARTMENT OF ENERGY ENERGY CONSERVATION ENERGY CONSERVATION PROGRAM FOR CONSUMER PRODUCTS Certification and... information or data which the person believes to be confidential and exempt law from public disclosure should...

  6. Shade avoidance.

    Science.gov (United States)

    Casal, Jorge J

    2012-01-01

    The presence of neighboring vegetation modifies the light environment experienced by plants, generating signals that are perceived by phytochromes and cryptochromes. These signals cause large changes in plant body form and function, including enhanced growth of the hypocotyl and petioles, a more erect position of the leaves and early flowering in Arabidopsis thaliana. Collectively, these so-called shade-avoidance responses tend to reduce the degree of current or future shade by neighbors. Shade light signals increase the abundance of PHYTOCHROME INTERACTING FACTOR 4 (PIF4) and PIF5 proteins, promote the synthesis and redirection of auxin, favor the degradation of DELLA proteins and increase the expression of auxin, gibberellins and brassinosteroid-promoted genes, among other events downstream the photoreceptors. Selectively disrupting these events by genetic or pharmacological approaches affects shade-avoidance responses with an intensity that depends on the developmental context and the environment. Shade-avoidance responses provide a model to investigate the signaling networks used by plants to take advantage of the cues provided by the environment to adjust to the challenges imposed by the environment itself.

  7. 7 CFR 1425.5 - Confidentiality.

    Science.gov (United States)

    2010-01-01

    ... AGRICULTURE LOANS, PURCHASES, AND OTHER OPERATIONS COOPERATIVE MARKETING ASSOCIATIONS § 1425.5 Confidentiality. Information submitted to CCC related to trade secrets, financial or commercial operations, or the financial...

  8. 7 CFR 1220.624 - Confidentiality.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 10 2010-01-01 2010-01-01 false Confidentiality. 1220.624 Section 1220.624 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (MARKETING... Secretary may direct. ...

  9. 7 CFR 1210.352 - Confidential treatment.

    Science.gov (United States)

    2010-01-01

    ... PROMOTION PLAN Watermelon Research and Promotion Plan Reports, Books, and Records § 1210.352 Confidential... a suit or administrative hearing brought at the direction, or on the request, of the Secretary, or...

  10. 7 CFR 54.1033 - Confidential treatment.

    Science.gov (United States)

    2010-01-01

    ... Sanitary Design and Fabrication of Equipment Used in the Slaughter, Processing, and Packaging of Livestock and Poultry Products § 54.1033 Confidential treatment. Every design review specialist providing...

  11. Biosafety data as confidential business information.

    Science.gov (United States)

    Nielsen, Kaare M

    2013-01-01

    Removal of confidentiality claims on biosafety data is necessary to adhere to standard scientific procedures of quality assurance, to increase transparency, to minimize impacts of conflicts of interests, and ultimately to improve public confidence in GMOs.

  12. Collision avoidance

    Energy Technology Data Exchange (ETDEWEB)

    Glynn, P.

    2008-04-01

    A suite of new collision avoidance systems (CAS 1,2,3, and 4) for heavy vehicles particularly mine haul trucks, is presented for vehicles whose structure and size necessarily impeded driver visibility. The systems use probe radar systems, continuous wave Doppler radar, ultrasonic Doppler, radio frequency tagging and laser scanning technology. The main goal of the ACARP/CSIRO funded projects is to determine the appropriate use and adaptation of commercially available technologies, and where possible, produce a low cost variant suitable for use in proximity detection on large mining industry haul trucks. CAS variants produced were subjected to a field demonstration and linked to the output from the earlier CAS 1 project. The research concentrated on large mine haul trucks operating in open cut coal mines. While the results are especially applicable to the Queensland and New South Wales coal industries, they are also applicable worldwide. 1 tab.

  13. Confidentiality versus transparency in contemporary tax law

    OpenAIRE

    Anđelković, Mileva

    2017-01-01

    Dilemma with regard to defining limit between tax confidentiality and tax transparency is particulary expressed in contemporary tax law. International tax relations indicate that countries tend towards fostering tax transparency with the expect of better collection of taxes and fair distribution of tax burden. The right to secrecy and confidentiality of personal data, as one of the basic rights, guarantees taxpayers that data collected about them shall be used only for the purpose of taxation...

  14. THE INFORMATION CONFIDENTIALITY AND CYBER SECURITY IN MEDICAL INSTITUTIONS

    Directory of Open Access Journals (Sweden)

    SABAU-POPA CLAUDIA DIANA

    2015-07-01

    Full Text Available The information confidentiality and cyber security risk affects the right to confidentiality and privacy of the patient, as regulated in Romania by the Law 46/2002. The manifestation of the cyber security risk event affects the reputation of the healthcare institution and is becoming more and more complex and often due to the: development of network technology, the medical equipment connected to wifi and the electronic databases. The databases containing medical records were implemented due to automation. Thus, transforming data into medical knowledge contribute to a better understanding of the disease. Due to these factors, the measures taken by the hospital management for this type of risk are adapted to the cyber changes. The hospital objectives aim: the implementation of a robust information system, the early threats identifications and the incident reporting. Neglecting this type of risk can generate financial loss, inability to continue providing health care services for a certain period of time, providing an erroneous diagnosis, medical equipment errors etc. Thus, in a digital age the appropriate risk management for the information security and cyber risk represent a necessity. The main concern of hospitals worldwide is to align with international requirements and obtain credentials in terms of data security from the International Organisation for Standardization, which regulates the management of this type of risk. Romania is at the beginning in terms of concerns regarding the management, avoidance and mitigation of information security, the health system being most highly exposed to its manifestation. The present paper examines the concerns of the health system to the confidentiality of information and cyber security risk and its management arrangements. Thus, a set of key risk indicators is implemented and monitored for 2011-2013, using a user interface, a Dashboard, which acts as an early warning system of the manifestation of the

  15. Environmental statement

    International Nuclear Information System (INIS)

    Iannone, G.

    1995-01-01

    This paper focusses on one of the basic points of EU (European Union) regulation 1863/1993, namely the disclosure of information via an environmental statement. The author examines the uses to which the data may be put, emphasizes the importance of the environmental statement's contents and addressee, and describes the key function of external data control by an environmental verifier. Lastly, the author shows that the environmental statement could replace a number of documents that companies are now required to file with various agencies; this would reduce their administrative burden

  16. 18 CFR 706.405 - Supplementary statements.

    Science.gov (United States)

    2010-04-01

    ... employee shall at all times avoid acquiring a financial interest that could result, or taking an action... EMPLOYEE RESPONSIBILITIES AND CONDUCT Statements of Employment and Financial Interests § 706.405... employment and financial interests shall be reported in a supplementary statement, in the format prescribed...

  17. Resonating Statements

    DEFF Research Database (Denmark)

    Hjelholt, Morten; Jensen, Tina Blegind

    2015-01-01

    IT projects are often complex arrangements of technological components, social actions, and organizational transformation that are difficult to manage in practice. This paper takes an analytical discourse perspective to explore the process of legitimizing IT projects. We introduce the concept of ...... as part of a feedback loop to re-attach the localized IT project to the broader national discourse. The paper concludes with reflections on how to actively build on resonating statements as a strategic resource for legitimizing IT projects...... of resonating statements to highlight how central actors navigate in various discourses over time. Particularly, the statements and actions of an IT project manager are portrayed to show how individuals can legitimize actions by connecting statements to historically produced discourses. The case study...... of an IT project in a Danish local government spans a two-year time period and demonstrates a double-loop legitimization process. First, resonating statements are produced to localize a national IT initiative to support the specificity of a local government discourse. Second, the resonating statements are used...

  18. 12 CFR 978.6 - Access to confidential information.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 7 2010-01-01 2010-01-01 false Access to confidential information. 978.6... OPERATIONS AND AUTHORITIES BANK REQUESTS FOR INFORMATION § 978.6 Access to confidential information. Each Bank shall ensure that access to the confidential information stored at its facility is limited to...

  19. 22 CFR 130.15 - Confidential business information.

    Science.gov (United States)

    2010-04-01

    ..., confidential business information means commercial or financial information which by law is entitled to... 22 Foreign Relations 1 2010-04-01 2010-04-01 false Confidential business information. 130.15... CONTRIBUTIONS, FEES AND COMMISSIONS § 130.15 Confidential business information. (a) Any person who is required...

  20. CRAC: Confidentiality Risk Assessment and IT-Infrastructure Comparison

    NARCIS (Netherlands)

    Morali, A.; Zambon, Emmanuele; Etalle, Sandro; Wieringa, Roelf J.

    In this paper we present CRAC, an IT infrastructure-based method for assessing and comparing confidentiality risks of IT based collaborations. The method determines confidentiality risks by taking into account the effects of the leakage of confidential information (e.g. industrial secrets and user

  1. 29 CFR 2704.204 - Confidential financial information.

    Science.gov (United States)

    2010-07-01

    ... 29 Labor 9 2010-07-01 2010-07-01 false Confidential financial information. 2704.204 Section 2704... § 2704.204 Confidential financial information. Ordinarily, the net-worth and annual-receipts exhibits... administrative law judge in a sealed envelope labeled “Confidential Financial Information,” accompanied by a...

  2. 7 CFR 987.67 - Confidential information.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 8 2010-01-01 2010-01-01 false Confidential information. 987.67 Section 987.67... information. All data or other information constituting a trade secret or disclosing a trade position or... the Committee and information which would reveal the circumstances of a single handler shall be...

  3. 42 CFR 136.57 - Confidentiality.

    Science.gov (United States)

    2010-10-01

    ... 42 Public Health 1 2010-10-01 2010-10-01 false Confidentiality. 136.57 Section 136.57 Public Health PUBLIC HEALTH SERVICE, DEPARTMENT OF HEALTH AND HUMAN SERVICES INDIAN HEALTH SERVICE, DEPARTMENT OF HEALTH AND HUMAN SERVICES INDIAN HEALTH Abortions and Related Medical Services in Indian Health...

  4. 42 CFR 136a.57 - Confidentiality.

    Science.gov (United States)

    2010-10-01

    ... 42 Public Health 1 2010-10-01 2010-10-01 false Confidentiality. 136a.57 Section 136a.57 Public Health PUBLIC HEALTH SERVICE, DEPARTMENT OF HEALTH AND HUMAN SERVICES INDIAN HEALTH SERVICE, DEPARTMENT OF HEALTH AND HUMAN SERVICES INDIAN HEALTH Abortions and Related Medical Services in Indian Health...

  5. 42 CFR 50.310 - Confidentiality.

    Science.gov (United States)

    2010-10-01

    ... 42 Public Health 1 2010-10-01 2010-10-01 false Confidentiality. 50.310 Section 50.310 Public Health PUBLIC HEALTH SERVICE, DEPARTMENT OF HEALTH AND HUMAN SERVICES GRANTS POLICIES OF GENERAL APPLICABILITY Abortions and Related Medical Services in Federally Assisted Programs of the Public Health Service...

  6. Confidential benchmarking based on multiparty computation

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre; Damgård, Kasper Lyneborg; Nielsen, Kurt

    We report on the design and implementation of a system that uses multiparty computation to enable banks to benchmark their customers' confidential performance data against a large representative set of confidential performance data from a consultancy house. The system ensures that both the banks'...... state during the computation. We ran the system with two servers doing the secure computation using a database with information on about 2500 users. Answers arrived in about 25 seconds.......We report on the design and implementation of a system that uses multiparty computation to enable banks to benchmark their customers' confidential performance data against a large representative set of confidential performance data from a consultancy house. The system ensures that both the banks...... debt. We propose a model based on linear programming for doing the benchmarking and implement it using the SPDZ protocol by Damgård et al., which we modify using a new idea that allows clients to supply data and get output without having to participate in the preprocessing phase and without keeping...

  7. 7 CFR 1207.352 - Confidential treatment.

    Science.gov (United States)

    2010-01-01

    ... AGREEMENTS AND ORDERS; MISCELLANEOUS COMMODITIES), DEPARTMENT OF AGRICULTURE POTATO RESEARCH AND PROMOTION PLAN Potato Research and Promotion Plan Reports, Books, and Records § 1207.352 Confidential treatment... relevant shall be disclosed by them, and then only in a suit or administrative hearing brought at the...

  8. 7 CFR 1205.340 - Confidential treatment.

    Science.gov (United States)

    2010-01-01

    ... AGREEMENTS AND ORDERS; MISCELLANEOUS COMMODITIES), DEPARTMENT OF AGRICULTURE COTTON RESEARCH AND PROMOTION Cotton Research and Promotion Order Reports, Books, and Records § 1205.340 Confidential treatment. All... administrative hearing brought at the direction, or upon the request, of the Secretary of Agriculture, or to...

  9. 15 CFR 705.6 - Confidential information.

    Science.gov (United States)

    2010-01-01

    ... 15 Commerce and Foreign Trade 2 2010-01-01 2010-01-01 false Confidential information. 705.6 Section 705.6 Commerce and Foreign Trade Regulations Relating to Commerce and Foreign Trade (Continued) BUREAU OF INDUSTRY AND SECURITY, DEPARTMENT OF COMMERCE NATIONAL SECURITY INDUSTRIAL BASE REGULATIONS...

  10. Audit, Accountability and Confidential Enquiries into Maternal ...

    African Journals Online (AJOL)

    HP

    Improving the quality of care is essential for achieving reductions in maternal mortality. Audit is one of the methods which can be used to simultaneously assess as well as improve quality. This commentary discusses one type of audit. – confidential enquiries into maternal death. We believe that the enthusiasm for ...

  11. 7 CFR 1212.107 - Confidential information.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 10 2010-01-01 2010-01-01 false Confidential information. 1212.107 Section 1212.107 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (MARKETING... RESEARCH, PROMOTION, CONSUMER EDUCATION AND INDUSTRY INFORMATION ORDER Referendum Procedures § 1212.107...

  12. 8 CFR 1003.108 - Confidentiality.

    Science.gov (United States)

    2010-01-01

    ... preliminary inquiry. The EOIR disciplinary counsel, in the exercise of discretion, may disclose documents and... of Intent to Discipline. Resolutions, such as warning letters, admonitions, and agreements in lieu of discipline, reached prior to the issuance of a Notice of Intent to Discipline, will remain confidential...

  13. Confidentiality of Accounting Academics: Consequences of Nonconformity

    Science.gov (United States)

    Amponsah, Emmanuel B.; Boateng, Peter Agyekum; Onuoha, Luke N.

    2016-01-01

    This paper examined ways by which nonconformity to confidentiality among accounting academics could lead to increased-recruitment-and-legal-costs to their employing universities in Ghana that offered accounting degree programmes. With a cross-sectional design, data collected from 1,225 accountants analysed via Cronbach's alpha,…

  14. 42 CFR 93.108 - Confidentiality.

    Science.gov (United States)

    2010-10-01

    ... 42 Public Health 1 2010-10-01 2010-10-01 false Confidentiality. 93.108 Section 93.108 Public Health PUBLIC HEALTH SERVICE, DEPARTMENT OF HEALTH AND HUMAN SERVICES HEALTH ASSESSMENTS AND HEALTH EFFECTS STUDIES OF HAZARDOUS SUBSTANCES RELEASES AND FACILITIES PUBLIC HEALTH SERVICE POLICIES ON RESEARCH...

  15. 38 CFR 1.462 - Confidentiality restrictions.

    Science.gov (United States)

    2010-07-01

    ... Sickle Cell Anemia § 1.462 Confidentiality restrictions. (a) General. The patient records to which §§ 1..., infection with the HIV, or sickle cell anemia may be acknowledged only if the patient's written consent is... with the HIV, or sickle cell anemia. (2) Any answer to a request for a disclosure of patient records...

  16. Parents: Avoid Kids Foot Problems with the Right Shoes

    Science.gov (United States)

    ... Print | Share Avoid Kids Foot Problems with the Right Shoes Before you head to the store to ... College of Foot and Ankle Surgeons (ACFAS), All Rights Reserved. Privacy Statement | Disclaimer | Terms and Conditions | Site ...

  17. financial statements

    International Development Research Centre (IDRC) Digital Library (Canada)

    This Management's Discussion and Analysis (MD&A) provides a narrative discussion of the financial results and operational changes for the financial year ended on. 31 March 2015. This discussion should be read with the. Financial Statements and accompanying notes provided on pages 46-63, which were prepared in ...

  18. Rio 2016 financial statements

    OpenAIRE

    2015-01-01

    These documents include the report from independent auditors balance sheet, the statement of income, the statement of changes in equity, the statement of cash flows and the explanatory notes to the financial statements.

  19. WTO confidential: the case of asbestos. World Trade Organization.

    Science.gov (United States)

    Castleman, Barry

    2002-01-01

    The World Trade Organization (WTO), created in 1995, adjudicates "trade disputes" between member nations in cases with great human rights, cultural, environmental, and public health significance. Throughout the process of dispute resolution and even after a case is concluded, very little of what happens is made accessible to the public. However, it is one thing to criticize the WTO for its lack of transparency from outside the process, and another to critically examine what was withheld from disclosure and what dangers that presents. This is the inside story from a scientific adviser to one of the parties in a WTO case, analyzing what happened from a public health point of view. This analysis concludes that the public health justification of banning asbestos was accepted in the end by the economists at the WTO, despite the WTO's bias in favoring the party (Canada) making the free trade challenge (to public health legislation, in this case) in numerous stages of the process, despite the WTO's utter lack of expertise in science, medicine, engineering, and public health, and despite important erroneous statements made to the WTO under the cover of confidentiality. Despite its result, this case illustrates that the WTO's threat to national sovereignty could never withstand the light of day, that the people of the world would reject this dangerous free trade fundamentalism if the limitations and dangers of the process were open for all to see.

  20. Why children die: avoidable factors associated with child deaths.

    Science.gov (United States)

    Pearson, G A; Ward-Platt, M; Harnden, A; Kelly, D

    2011-10-01

    To describe the avoidable factors associated with child deaths identified by a confidential enquiry. In the Centre for Maternal and Child Enquiries confidential enquiry, a sample (13%) of cases was subjected to case note review by multidisciplinary panels attempting to identify avoidable factors associated with the deaths. Cases were selected blindly but in equal numbers from predetermined age bands and participating regions. The anonymised records were reviewed in regions remote to where the child lived and died. Panel composition, conduct and reporting were standardised. 119 of 126 cases reviewed by enquiry panels had sufficient information to determine avoidable factors. These cases were comparable with the whole dataset in terms of sex and causes of death. 31 (26%) of 119 had avoidable factors that were predominantly related to individuals or agencies with a direct responsibility to the child. 51 (43%) of 119 were defined as potentially avoidable. In all, 130 factors were considered in relation to these 82 cases, and 64% of the factors were healthcare related. Avoidable factors were more likely where life-limiting illness was not present. Recurring avoidable factors included failure to recognise serious illness at the point of presentation and death occurring in children who had been lost to follow-up. Child Death Overview Panels now have the responsibility to review child deaths using similar methods but relying upon data forms rather than the case record. Analysis of contributory factors on a national scale has the potential to improve understanding of why children die and indicate strategies to reduce child mortality.

  1. Confidentiality in crisis counseling: a philosophical perspective.

    Science.gov (United States)

    Mayo, D J

    1984-01-01

    Crisis interventionists frequently confront a moral dilemma when violating client trust seems necessary if self-destructive behavior is to be prevented. Two fundamental moral values conflict in such cases: concern for client welfare and respect for client rights and autonomy. Each of these values is grounded in one of two important Western ethical traditions: Utilitarianism and Kantian Formalism, respectively. Following critical examination of each of these theories, attention is given to a series of hypothetical cases involving the confidentiality dilemma.

  2. Confidentiality and Security in Medical Information Systems

    Directory of Open Access Journals (Sweden)

    Victor Papanaga

    2008-11-01

    Full Text Available Behind the technologies Medical System contains different types of information including patient information also. The patient data is classified as confidential and is one of the patient rights based on World Health Organization declaration. There are several compromises in solutions selection based on hardware and software requirements, performance, usability, portability. This article presents the investigation results and proposes the secured solution principles for the medical system that deal with patient data.

  3. Patient confidentiality, ethics and licensing in telemedicine.

    Science.gov (United States)

    Yadav, H; Lin, W Y

    2001-01-01

    Telemedicine is fast becoming popular in many countries in the world. It has several advantages such as being cost saving and providing better access to health care in the remote areas in many parts of the world. However, it has some disadvantages as well. One of the major problems is the problem of patients' rights and confidentiality in the use of telemedicine. There are no standard guidelines and procedures in the practice of telemedicine as yet. Both the patient and the physician are unsure of the standard of practice and how to maintain confidentiality. The patient is uncertain as to how to protect her/his rights in the use of telemedicine. The issue of litigation is also unclear as to where the physician is practicing when he/she uses telemedicine. Is she/he practicing in the country where the patient is or is the physician practicing in the country of her/his origin? These issues need to be addressed urgently so that telemedicine will have standards of ethical practice and the patient's rights and confidentiality will be protected.

  4. Practical State Machine Replication with Confidentiality

    Energy Technology Data Exchange (ETDEWEB)

    Duan, Sisi [ORNL; Zhang, Haibin [University of North Carolina, Chapel Hill

    2016-01-01

    We study how to enable arbitrary randomized algorithms in Byzantine fault-tolerant (BFT) settings. We formalize a randomized BFT protocol and provide a simple and efficient construction that can be built on any existing BFT protocols while adding practically no overhead. We go one step further to revisit a confidential BFT protocol (Yin et al., SOSP '03). We show that their scheme is potentially susceptible to safety and confidentiality attacks. We then present a new protocol that is secure in the stronger model we formalize, by extending the idea of a randomized BFT protocol. Our protocol uses only efficient symmetric cryptography, while Yin et al.'s uses costly threshold signatures. We implemented and evaluated our protocols on microbenchmarks and real-world use cases. We show that our randomized BFT protocol is as efficient as conventional BFT protocols, and our confidential BFT protocol is two to three orders of magnitude faster than Yin et al.'s, which is less secure than ours.

  5. Access control and confidentiality in radiology

    Science.gov (United States)

    Noumeir, Rita; Chafik, Adil

    2005-04-01

    A medical record contains a large amount of data about the patient such as height, weight and blood pressure. It also contains sensitive information such as fertility, abortion, psychiatric data, sexually transmitted diseases and diagnostic results. Access to this information must be carefully controlled. Information technology has greatly improved patient care. The recent extensive deployment of digital medical images made diagnostic images promptly available to healthcare decision makers, regardless of their geographic location. Medical images are digitally archived, transferred on telecommunication networks, and visualized on computer screens. However, with the widespread use of computing and communication technologies in healthcare, the issue of data security has become increasingly important. Most of the work until now has focused on the security of data communication to ensure its integrity, authentication, confidentiality and user accountability. The mechanisms that have been proposed to achieve the security of data communication are not specific to healthcare. Data integrity can be achieved with data signature. Data authentication can be achieved with certificate exchange. Data confidentiality can be achieved with encryption. User accountability can be achieved with audits. Although these mechanisms are essential to ensure data security during its transfer on the network, access control is needed in order to ensure data confidentiality and privacy within the information system application. In this paper, we present and discuss an access control mechanism that takes into account the notion of a care process. Radiology information is categorized and a model to enforce data privacy is proposed.

  6. PRN 2000-5: Guidance for Mandatory and Advisory Labeling Statements

    Science.gov (United States)

    This notice provides guidance for improving the clarity of labeling statements in order to avoid confusing directions and precautions and to prevent the misuse of pesticides. It includes definitions and examples for mandatory and advisory label statements.

  7. Patient confidentiality and mental health. Part 2: dilemmas of disclosure.

    Science.gov (United States)

    McHale, Jean

    The article is the second in the series examining some of the issues relating to patient confidentiality and mental health. It explores the situations in which confidential patient information may be disclosed by nurses. First, disclosure with consent is considered. Second, disclosure where it is in 'the public interest' is explored. Third, those situations in which disclosure may be required by statute are discussed. The article concludes by suggesting that the whole area of confidentiality is ripe for reconsideration and perhaps statutory reform.

  8. 40 CFR 94.517 - Treatment of confidential information.

    Science.gov (United States)

    2010-07-01

    ... PROGRAMS (CONTINUED) CONTROL OF EMISSIONS FROM MARINE COMPRESSION-IGNITION ENGINES Manufacturer Production Line Testing Programs § 94.517 Treatment of confidential information. Except for information required...

  9. 13 CFR 120.1060 - Confidentiality of Reports, Risk Ratings and related Confidential Information.

    Science.gov (United States)

    2010-01-01

    ... SMALL BUSINESS ADMINISTRATION BUSINESS LOANS Risk-Based Lender Oversight Supervision § 120.1060... Lender, Intermediary, or NTAP for its confidential use only. The Reports, Risk Ratings, and related... written permission. An SBA Lender, Intermediary, and NTAP may use the Report, Risk Rating, and...

  10. Child deaths: confidential enquiry into the role and quality of UK primary care.

    Science.gov (United States)

    Harnden, Anthony; Mayon-White, Richard; Mant, David; Kelly, Deirdre; Pearson, Gale

    2009-11-01

    In 2006 the Confidential Enquiry into Maternal and Perinatal Deaths was extended to pilot a collection of child deaths. This helped optimise data collection for local safeguarding children's boards, which, since April 2008, have a statutory responsibility to review all child deaths. Reviewing primary care records may highlight areas in which systems, skills, and care could be improved. To review the role and quality of primary care in child deaths. Confidential enquiry into child deaths. Five regions of the UK: North-East, South-West and West Midlands, Wales, and Northern Ireland. The confidential enquiry collected core data for all child deaths (age range 28 days to 17 years) and an age-stratified sample was assessed by multidisciplinary panels for avoidable factors. An independent detailed review was conducted of the primary care records on all children in the North-East region and all children who were reviewed by panel in the other four regions. Primary care records were reviewed for 168 child deaths. There were 25 (15%) deaths from acute infection, 22 (13%) from cancer, and 11 (7%) from asthma or epilepsy. Fifty-nine (35%) deaths were sudden: sudden unexplained death in infancy, suicides, and assaults. Of 149 with immunisation records, only 88 (59%) had been fully vaccinated on time. One or more primary care professionals were involved in the management of 90 (54%) children. Avoidable primary care factors were identified in 18 (20%) of these deaths. Avoidable primary care factors included failure in the recognition and management of serious infection, failure to vaccinate, and inadequate management of asthma and epilepsy. Decisions made about diagnosis and management in primary care may affect the cause, time, and circumstances of a child's death. Maintaining skills in assessing the acutely ill child remains an essential part of good clinical practice.

  11. 12 CFR 261.20 - Confidential supervisory information made available to supervised financial institutions and...

    Science.gov (United States)

    2010-01-01

    ... Certain Circumstances § 261.20 Confidential supervisory information made available to supervised financial... information to supervised financial institutions. Confidential supervisory information concerning a supervised...) Disclosure of confidential supervisory information by supervised financial institution—(1) Parent bank...

  12. Confidential Declaration of Family Situation (CDFS)

    CERN Multimedia

    Human Resources Department

    2005-01-01

    The Confidential Declaration of Family Situation (CDFS) becomes a new computerized EDH form from October 2005 In accordance with Article R IV 1.17 of the Staff Regulations, Staff Members and Fellows, married or separated, must notify any changes in their spouse's income or health insurance cover in writing to CERN, within 30 calendar days of the change. This is necessary for the Organization to determine if a supplementary contribution is payable to the CERN Health Insurance Scheme (CHIS) for the spouse's coverage and, if so, the amount. Until now a paper form called « Confidential Declaration of Family Situation » (CDFS) was used for that purpose.  From early October 2005 the CDFS will be computerized for the whole Organization. Henceforth, any changes in a spouse's income or health insurance cover must be notified using EDH (Electronic Document Handling). Additionally, annual updates of the declaration will be required and will be requested by automatic e-mail. Early October an email will be...

  13. Confidential Declaration of Family Situation (CDFS)

    CERN Multimedia

    Human Resources Department

    2005-01-01

    The Confidential Declaration of Family Situation (CDFS) becomes a new computerized EDH form from October 2005 In accordance with Article R IV 1.17 of the Staff Regulations, Staff Members and Fellows, married or separated, must notify any changes in their spouse's income or health insurance cover in writing to CERN, within 30 calendar days of the change. This is necessary for the Organization to determine if a supplementary contribution is payable to the CERN Health Insurance Scheme (CHIS) for the spouse's coverage and, if so, the amount. Until now a paper form called « Confidential Declaration of Family Situation » (CDFS) was used for that purpose.  From early October 2005 the CDFS will be computerized for the whole Organization. Henceforth, any changes in a spouse's income or health insurance cover must be notified using EDH (Electronic Document Handling). Additionally, annual updates of the declaration will be required and will be requested by automatic e-mail. Early October an email will be sent to...

  14. Privacy, confidentiality and automated health information systems.

    Science.gov (United States)

    Vuori, H

    1977-12-01

    Professor Vuori's paper, first presented at the fourth Medico-legal Conference in Prague in the spring of this year, deals with the problem of the maintenance of confidentiality in computerized health records. Although more and more information is required, the hardware of the computer systems is so sophisticated that it would be very expensive indeed to 'break in' and steal from a modern data bank. Those concerned with programming computers are becoming more aware of their responsibilities concerning confidentiality and privacy, to the extent that a legal code of ethics for programmers is being formulated. They are also aware that the most sensitive of all relationships--the doctor-patient relationship--could be in danger if they failed to maintain high standards of integrity. An area of danger is where administrative boundaries between systems must be crossed--say between those of health and employment. Protection of privacy must be ensured by releasing full information about the type of data being stored, and by maintaining democratic control over the establishment of information systems.

  15. Ombuds’ corner: Open door and confidentiality

    CERN Multimedia

    Vincent Vuillemin

    2013-01-01

    For the Open Days, CERN will be transparent for all visitors. It's also the occasion to remember that the Ombuds' door is fully open every day of the year for all persons working for or on behalf of CERN.   The door is open, but as soon as it's closed for a discussion, the office becomes a place where total confidentiality is preserved. This may appear as a contradiction, no? The Ombuds is available to help everyone in all circumstances, but his clause of confidentiality prevents him from acting without the consent of his “visitors”. How can he possibly resolve the in-house conflicts in groups, or units, if all the parties do not voluntarily participate in its resolution? The answer is clear: the job of the Ombuds is to help the parties resolve their conflict by themselves. He will provide a few rules of communication, a process of mutual respect, suggest some possibilities that the parties may want to follow, and mediate the dispute so that people...

  16. 50 CFR 600.130 - Protection of confidentiality of statistics.

    Science.gov (United States)

    2010-10-01

    ... statistics. 600.130 Section 600.130 Wildlife and Fisheries FISHERY CONSERVATION AND MANAGEMENT, NATIONAL... Fishery Management Councils § 600.130 Protection of confidentiality of statistics. Each Council must establish appropriate procedures for ensuring the confidentiality of the statistics that may be submitted to...

  17. the internet, virtual communities and threats to confidentiality

    African Journals Online (AJOL)

    privacy and confidentiality in this use of the Internet, and to suggest ways in ... especially privacy and confidentiality on the one hand and .... Wired Digital Ine. We pledge that Wired Digital Ine. will not release your personal data to anyone else without your consent. - period. You may change the status of whether you wish to.

  18. 75 FR 65013 - Access in Litigation to Confidential Business Information

    Science.gov (United States)

    2010-10-21

    ... AGENCY Access in Litigation to Confidential Business Information AGENCY: Environmental Protection Agency (``EPA''). ACTION: Notice of Transfer of Information Claimed as Confidential Business Information to the... New York (the ``Litigation''), information which has been submitted to EPA by its contractors that is...

  19. Client confidentiality: Perspectives of students in a healthcare ...

    African Journals Online (AJOL)

    This moral dilemma is difficult for students to circumvent and therefore this paper presents healthcare students' perspectives of confidentiality. Methods. We aimed to explore healthcare students' views and experiences of confidentiality as an ethical principle by adopting a qualitative explorative approach. Purposeful ...

  20. 29 CFR 4010.13 - Confidentiality of information submitted.

    Science.gov (United States)

    2010-07-01

    ... REPORTING AND DISCLOSURE REQUIREMENTS ANNUAL FINANCIAL AND ACTUARIAL INFORMATION REPORTING § 4010.13 Confidentiality of information submitted. In accordance with § 4901.21(a)(3) of this chapter and ERISA section... 29 Labor 9 2010-07-01 2010-07-01 false Confidentiality of information submitted. 4010.13 Section...

  1. 19 CFR 210.5 - Confidential business information.

    Science.gov (United States)

    2010-04-01

    ... administrative law judge shall decide whether information in a document addressed to the administrative law judge... confidential treatment. The administrative law judge shall also decide, with respect to all orders, initial... law judge, or another section of this part states otherwise, confidential business information shall...

  2. 7 CFR 1210.532 - Confidential books, records, and reports.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 10 2010-01-01 2010-01-01 false Confidential books, records, and reports. 1210.532... WATERMELON RESEARCH AND PROMOTION PLAN Rules and Regulations Records § 1210.532 Confidential books, records, and reports. All information obtained from the books, records, and reports of handlers and importers...

  3. 7 CFR 1205.540 - Confidential books, records, and reports.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 10 2010-01-01 2010-01-01 false Confidential books, records, and reports. 1205.540 Section 1205.540 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL... Confidential books, records, and reports. All information obtained from the books, records, and reports of...

  4. 38 CFR 17.501 - Confidential and privileged documents.

    Science.gov (United States)

    2010-07-01

    ... AFFAIRS MEDICAL Confidentiality of Healthcare Quality Assurance Review Records § 17.501 Confidential and... healthcare quality assurance reviews with examples are: (1) Monitoring and evaluation reviews conducted by a... and the regulations in §§ 17.500 through 17.511; and (4) Contracted external reviews of care...

  5. 20 CFR 726.113 - Disclosure of confidential information.

    Science.gov (United States)

    2010-04-01

    ... MINE OPERATOR'S INSURANCE Authorization of Self-Insurers § 726.113 Disclosure of confidential... 20 Employees' Benefits 3 2010-04-01 2010-04-01 false Disclosure of confidential information. 726... authorized self-insurer or applicant for the authorization of self-insurance obtained by the Office shall be...

  6. Ethics in health care: confidentiality and information technologies

    African Journals Online (AJOL)

    Ethics CPD Supplement: Ethics in health care: confidentiality and information technologies. S3. Vol 56 No 1 ... Before the advent of the new communication and information technologies (NCITs), patient care was sometimes delayed because of the lengthy time it ... confidentiality. Instead of receiving vintage sports car news,.

  7. 37 CFR 404.14 - Confidentiality of information.

    Science.gov (United States)

    2010-07-01

    ... 37 Patents, Trademarks, and Copyrights 1 2010-07-01 2010-07-01 false Confidentiality of information. 404.14 Section 404.14 Patents, Trademarks, and Copyrights ASSISTANT SECRETARY FOR TECHNOLOGY POLICY, DEPARTMENT OF COMMERCE LICENSING OF GOVERNMENT OWNED INVENTIONS § 404.14 Confidentiality of...

  8. Genetic secrets: Protecting privacy and confidentiality in the genetic era

    Energy Technology Data Exchange (ETDEWEB)

    Rothstein, M.A. [ed.

    1998-07-01

    Few developments are likely to affect human beings more profoundly in the long run than the discoveries resulting from advances in modern genetics. Although the developments in genetic technology promise to provide many additional benefits, their application to genetic screening poses ethical, social, and legal questions, many of which are rooted in issues of privacy and confidentiality. The ethical, practical, and legal ramifications of these and related questions are explored in depth. The broad range of topics includes: the privacy and confidentiality of genetic information; the challenges to privacy and confidentiality that may be projected to result from the emerging genetic technologies; the role of informed consent in protecting the confidentiality of genetic information in the clinical setting; the potential uses of genetic information by third parties; the implications of changes in the health care delivery system for privacy and confidentiality; relevant national and international developments in public policies, professional standards, and laws; recommendations; and the identification of research needs.

  9. Joint Statement on Insect Repellents by EPA and CDC

    Science.gov (United States)

    The EPA and the CDC are recommending the public to use insect repellents and take other precautions to avoid biting insects that carry serious diseases. This statement discusses diseases of concern, government roles, and repellent selection and use.

  10. Color-avoiding percolation

    Science.gov (United States)

    Krause, Sebastian M.; Danziger, Michael M.; Zlatić, Vinko

    2017-08-01

    Many real world networks have groups of similar nodes which are vulnerable to the same failure or adversary. Nodes can be colored in such a way that colors encode the shared vulnerabilities. Using multiple paths to avoid these vulnerabilities can greatly improve network robustness, if such paths exist. Color-avoiding percolation provides a theoretical framework for analyzing this scenario, focusing on the maximal set of nodes which can be connected via multiple color-avoiding paths. In this paper we extend the basic theory of color-avoiding percolation that was published in S. M. Krause et al. [Phys. Rev. X 6, 041022 (2016)], 10.1103/PhysRevX.6.041022. We explicitly account for the fact that the same particular link can be part of different paths avoiding different colors. This fact was previously accounted for with a heuristic approximation. Here we propose a better method for solving this problem which is substantially more accurate for many avoided colors. Further, we formulate our method with differentiated node functions, either as senders and receivers, or as transmitters. In both functions, nodes can be explicitly trusted or avoided. With only one avoided color we obtain standard percolation. Avoiding additional colors one by one, we can understand the critical behavior of color-avoiding percolation. For unequal color frequencies, we find that the colors with the largest frequencies control the critical threshold and exponent. Colors of small frequencies have only a minor influence on color-avoiding connectivity, thus allowing for approximations.

  11. 19 CFR 200.735-117 - Supplementary statements.

    Science.gov (United States)

    2010-04-01

    ... under this section, each employee shall at all times avoid acquiring a financial interest that could... CONDUCT Provisions Governing Statements of Employment and Financial Interests § 200.735-117 Supplementary... and financial interests shall be reported in a supplementary statement as of June 30 each year. If no...

  12. 5 CFR 2634.901 - Policies of confidential financial disclosure reporting.

    Science.gov (United States)

    2010-01-01

    ... Confidential Financial Disclosure Reports § 2634.901 Policies of confidential financial disclosure reporting. (a) The confidential financial reporting system set forth in this subpart is designed to complement... confidential basis, additional information from persons who are already subject to the public reporting...

  13. Surveillance Avoidance Technique Demonstration.

    Science.gov (United States)

    1983-12-02

    path and, using the evaluation module for feedback , alter the path until acceptable surveil- lance avoidance performance is achieved. The current ISAS...Nmber Diselav Stage Containing - Date: I I Time ( GIlT ): Figure 3-46: Textual Display for GRAPHICAL Module 3-64 Surveillance Avoidance Final Report System

  14. 40 CFR 704.7 - Confidential business information claims.

    Science.gov (United States)

    2010-07-01

    ... by marking the specific information on each page with a label such as “confidential”, “proprietary... concerning all information which is claimed confidential: (1) My company has taken measures to protect the...

  15. Confidential close call reporting system : preliminary evaluation findings.

    Science.gov (United States)

    2008-12-01

    The Federal Railroad Administration (FRA) is implementing a collaborative problem-solving approach to improving safety. The Confidential Close Call Reporting System (C3RS) is a human factors-based approach that is designed to reduce the accident rate...

  16. 40 CFR 86.615-84 - Treatment of confidential information.

    Science.gov (United States)

    2010-07-01

    ...) Selective Enforcement Auditing of New Light-Duty Vehicles, Light-Duty Trucks, and Heavy-Duty Vehicles § 86... part 2, subpart B. (b) Any claim of confidentiality must accompany the information at the time it is...

  17. Analysis of LYSA-calculus with explicit confidentiality annotations

    DEFF Research Database (Denmark)

    Gao, Han; Nielson, Hanne Riis

    2006-01-01

    Recently there has been an increased research interest in applying process calculi in the verification of cryptographic protocols due to their ability to formally model protocols. This work presents LYSA with explicit confidentiality annotations for indicating the expected behavior of target...... malicious activities performed by attackers as specified by the confidentiality annotations. The proposed analysis approach is fully automatic without the need of human intervention and has been applied successfully to a number of protocols....

  18. Statement on Human Cloning

    Science.gov (United States)

    ... for the Advancement of Science Statement on Human Cloning Tweet The American Association for the Advancement of ... for this statement on human cloning. Ban Reproductive Cloning AAAS endorses a legally enforceable ban on efforts ...

  19. [Cologne Statement for Medical Care of Refugees].

    Science.gov (United States)

    Wiesmüller, G A; Dötsch, J; Weiß, M; Wiater, A; Fätkenheuer, G; Nitschke, H; Bunte, A

    2016-04-01

    The Cologne statement resulted from both regional and nationwide controversial discussions about meaning and purpose of an initial examination for infectious diseases of refugees with respect to limited time, personnel and financial resources. Refugees per se are no increased infection risk factors for the general population as well as aiders, when the aiders comply with general hygiene rules and are vaccinated according to the recommendations of the German Standing Committee on Vaccination (STIKO). This is supported by our own data. Based on individual medical history, refugees need medical care, which is offered purposeful, economic, humanitarian and ethical. In addition to medical confidentiality, the reporting obligation according § 34 Infection Protection Act (IPA) and the examination concerning infectious pulmonary tuberculosis according to § 36 (4) IPA must be considered. © Georg Thieme Verlag KG Stuttgart · New York.

  20. Rio 2016 financial statements 2011

    OpenAIRE

    2015-01-01

    This document includes the report from independent auditors, the balance sheet, the statement of income, the statement of changes in equity, the statement of cash flows and the explanatory notes to the financial statements as of December 2011.

  1. Financial Statements Analysis

    OpenAIRE

    Tănase Alin-Eliodor

    2014-01-01

    This article focuses on analyzing of a consolidated financial statements of a hypothetically SME. The interpretation of the financial position and performances is based on the more than 40 financial key ratios computed by using financial data from consolidated income statement, consolidated financial position and cash flow. However additional data from notes to financial statements are provided.

  2. Avoidant personality disorder

    Science.gov (United States)

    American Psychiatric Association. Avoidant personality disorder. Diagnostic and Statistical Manual of Mental Disorders: DSM-5 . 5th ed. Arlington, VA: American Psychiatric Publishing. 2013;672-675. Blais MA, Smallwood P, Groves JE, Rivas-Vazquez RA, Hopwood ...

  3. Neuromorphic UAS Collision Avoidance

    Data.gov (United States)

    National Aeronautics and Space Administration — Collision avoidance for unmanned aerial systems (UAS) traveling at high relative speeds is a challenging task. It requires both the detection of a possible collision...

  4. Plagiarism in Personal Statements of Anesthesiology Residency Applicants.

    Science.gov (United States)

    Parks, Lance J; Sizemore, Daniel C; Johnstone, Robert E

    2016-02-15

    Plagiarism by residency applicants in their personal statements, as well as sites that sell personal statements, have been described, and led in 2011 to advice to avoid plagiarism and the caution that plagiarism detection software was available. We screened personal statements of 467 anesthesiology residency applicants from 2013-2014 using Viper Plagiarism Scanner software, and studied them for plagiarism. After quotes and commonly used phrases were removed, 82 statements contained unoriginal content of 8 or more consecutive words. After the study, 13.6% of personal statements from non-United States medical school graduates, and 4.0% from United States medical school graduates, contained plagiarized material, a significant difference. Plagiarized content ranged up to 58%. Plagiarism continues to occur in anesthesiology residency personal statements, with a higher incidence among graduates of non-United States medical schools.

  5. Nuclear exports. Parliamentary control and confidentiality

    International Nuclear Information System (INIS)

    Feldmann, Ulrike

    2015-01-01

    With its decision taken on 21. October 2014 (Az.: 2 BvE 5/11) the Federal Constitutional Court (BVerfG) decided during court proceedings between administrative bodies on the scope and limits of the parliamentary right of information. Even though the proceeding did not deal with nuclear exports but arm exports, foreign trade law, however, does not only designate an export licence obligation for military weapons but also for so called dual-use goods meaning goods, which can be used both for friendly as well as for military purposes. The export of these goods requires according to the so-called Dual-Use Regulation (EG) 428/2009 a licence. Annex I category 0 of the regulation (EG) 428/2009 lists a variety of nuclear materials, plants and equipment items for which this licence applies. In the same manner as arm exports, also exports of nuclear dual-use goods are being discussed in a special cabinet committee, the Federal Security Council (BSR), which shall coordinate cross-departmentally the German security and defence policy under consideration of economic interests and which categorises its results, according to the rules of procedure, as confidential. Also legally not regulated but common ''preliminary enquiries'' at the responsible Federal Ministry or rather Federal Office of Economics and Export Control by companies which plan an export and want to affirm the general approval for their export business prior to conclusion of contract take not only place for arm exports but also for nuclear dual-use goods. The decision by the Federal Constitutional Court can be applied to consultations about the authorisation of nuclear dual-use goods.

  6. Cost Avoidance Techniques for RC-135 Program Flying Training

    Science.gov (United States)

    2013-06-01

    Background ..................................................................................................................... 1 Problem Statement...34 1 COST AVOIDANCE TECHNIQUES FOR RC-135 PROGRAM FLYING TRAINING I. Introduction Background The 338th Combat Training...Approach TAC/VOR/LOC Approach - GPS AR01 Receiver A/R Day AR02 Receiver A/R Night R050 Rec A/R-Tanker Auto Off P015 Instrument ( IFR ) Departure TO40

  7. 77 FR 26709 - Swap Data Repositories: Interpretative Statement Regarding the Confidentiality and...

    Science.gov (United States)

    2012-05-07

    ... unnecessarily inhibited. For example, the Commission has learned that foreign regulatory authorities have asked... foreign regulatory authorities from accessing data in which they have an independent and sufficient...://www.cftc.gov that it may deem to be inappropriate for publication, such as obscene language. All...

  8. 77 FR 65177 - Swap Data Repositories: Interpretative Statement Regarding the Confidentiality and...

    Science.gov (United States)

    2012-10-25

    ... Strategix, LLC (``Cloud Strategix''), representing the data hosting and cloud computing industry, in... similar type of information sharing arrangement executed with the Commission, and/or a foreign regulator... Roundtable, June 6, 2012; (iii) Cloud Strategix, LLC, June 5, 2012; and (iv) the Depository Trust & Clearing...

  9. Chuukese Patients, Dual Role Interpreters, and Confidentiality: Exploring Clinic Interpretation Services for Reproductive Health Patients.

    Science.gov (United States)

    Smith, Sarah A

    2018-04-01

    This exploratory study analyzes limited English proficient (LEP) Chuukese patients' perspectives on dual-role interpreters in Guam and Chuuk. Methods included ethnographic observations of encounters with health care workers (HCWs) and 225 female Chuukese patients seeking reproductive healthcare in community health clinics: 126 women in Guam and 99 women in Chuuk. Ethnographic observations were supplemented by semi-structured interviews with 26 HCWs, and life history interviews with 15 Chuukese transnational migrant women. Notes from interview transcripts and observations were analyzed using critical interpretive and grounded theory. Findings demonstrated that Chuukese LEP patients need and at times want interpreters in order to understand their healthcare visits. In the absence of professional interpreters, ad-hoc interpreters (family interpreters and employees of the clinic) are an important resource. However, social and cultural concerns with community confidentiality influenced patient trust of staff interpreters. This lack of trust can limit access to health care overall, as some patients may avoid seeking care to prevent their confidential health information being disclosed. These complexities in interpretation must be considered in order for clinics to provide optimal care for the communities they serve.

  10. Reactive Collision Avoidance Algorithm

    Science.gov (United States)

    Scharf, Daniel; Acikmese, Behcet; Ploen, Scott; Hadaegh, Fred

    2010-01-01

    The reactive collision avoidance (RCA) algorithm allows a spacecraft to find a fuel-optimal trajectory for avoiding an arbitrary number of colliding spacecraft in real time while accounting for acceleration limits. In addition to spacecraft, the technology can be used for vehicles that can accelerate in any direction, such as helicopters and submersibles. In contrast to existing, passive algorithms that simultaneously design trajectories for a cluster of vehicles working to achieve a common goal, RCA is implemented onboard spacecraft only when an imminent collision is detected, and then plans a collision avoidance maneuver for only that host vehicle, thus preventing a collision in an off-nominal situation for which passive algorithms cannot. An example scenario for such a situation might be when a spacecraft in the cluster is approaching another one, but enters safe mode and begins to drift. Functionally, the RCA detects colliding spacecraft, plans an evasion trajectory by solving the Evasion Trajectory Problem (ETP), and then recovers after the collision is avoided. A direct optimization approach was used to develop the algorithm so it can run in real time. In this innovation, a parameterized class of avoidance trajectories is specified, and then the optimal trajectory is found by searching over the parameters. The class of trajectories is selected as bang-off-bang as motivated by optimal control theory. That is, an avoiding spacecraft first applies full acceleration in a constant direction, then coasts, and finally applies full acceleration to stop. The parameter optimization problem can be solved offline and stored as a look-up table of values. Using a look-up table allows the algorithm to run in real time. Given a colliding spacecraft, the properties of the collision geometry serve as indices of the look-up table that gives the optimal trajectory. For multiple colliding spacecraft, the set of trajectories that avoid all spacecraft is rapidly searched on

  11. Improving Individual Acceptance of Health Clouds through Confidentiality Assurance.

    Science.gov (United States)

    Ermakova, Tatiana; Fabian, Benjamin; Zarnekow, Rüdiger

    2016-10-26

    Cloud computing promises to essentially improve healthcare delivery performance. However, shifting sensitive medical records to third-party cloud providers could create an adoption hurdle because of security and privacy concerns. This study examines the effect of confidentiality assurance in a cloud-computing environment on individuals' willingness to accept the infrastructure for inter-organizational sharing of medical data. We empirically investigate our research question by a survey with over 260 full responses. For the setting with a high confidentiality assurance, we base on a recent multi-cloud architecture which provides very high confidentiality assurance through a secret-sharing mechanism: Health information is cryptographically encoded and distributed in a way that no single and no small group of cloud providers is able to decode it. Our results indicate the importance of confidentiality assurance in individuals' acceptance of health clouds for sensitive medical data. Specifically, this finding holds for a variety of practically relevant circumstances, i.e., in the absence and despite the presence of conventional offline alternatives and along with pseudonymization. On the other hand, we do not find support for the effect of confidentiality assurance in individuals' acceptance of health clouds for non-sensitive medical data. These results could support the process of privacy engineering for health-cloud solutions.

  12. Computer Security: confidentiality is everybody’s business

    CERN Multimedia

    Stefan Lueders, Computer Security Team

    2015-01-01

    Recently, a zip file with confidential information was mistakenly made public on one of CERN’s websites. Although the file was only intended for members of an internal committee, when placing it onto the CERN website, someone made a mistake when setting the access permissions and, thus, made the file accessible to everyone visiting the site!   Unfortunately, this is but one example of such mistakes. We have seen other documents made accessible to a much wider audience than originally intended… CERN takes serious measures to ensure the confidentiality of data. Confidential or “sensitive” documents (following the nomenclature set out in the CERN Data Protection Policy) deserve professional handling and access protections given only to the people who really need to access them. As such, they must not be widely circulated as attachments in e-mails and, most definitely, must not be stored on random public websites for the sole purpose of shari...

  13. Human pathogen avoidance adaptations

    NARCIS (Netherlands)

    Tybur, J.M.; Lieberman, D.

    2016-01-01

    Over the past few decades, researchers have become increasingly interested in the adaptations guiding the avoidance of disease-causing organisms. Here we discuss the latest developments in this area, including a recently developed information-processing model of the adaptations underlying pathogen

  14. Avoiding the Flu

    Science.gov (United States)

    ... on. Feature: Flu Avoiding the Flu Past Issues / Fall 2009 Table of Contents Children from six months of age and young people up to 24 years of age are particularly at risk this year from the 2009 H1N1 flu. They ...

  15. Independent consultants : fiduciary duties, trade secrets and confidential information

    International Nuclear Information System (INIS)

    Fraser, B.; Wilhelmson, M.

    1999-01-01

    Because of cutbacks and downsizing within the petroleum industry, it has become one of the largest users of contract personnel to provide services that were previously provided by senior levels of management. This paper explored the application of common law fiduciary duties and the duty of confidence to the independent workforce. It examined to what extent fiduciary duties apply to independent consultants and the best way for the employer to protect itself from the potential misuse of confidential information. Part 1 of the paper described fiduciary duties. A fiduciary relationship was described as one that possesses the following three characteristics: (1) the fiduciary has scope for the exercise of some discretion of power, (2) the fiduciary can unilaterally exercise that power to affect the beneficiary's practical interests, and (3) the beneficiary is peculiarly vulnerable to the fiduciary holding the discretion of power. Three examples of how the courts treated some arguments regarding fiduciaries were presented. Part 2 of this paper discussed how trade secrets and confidential information should be handled. It was explained, that regardless of fiduciary duties, the unauthorized use of confidential information by an independent contractor can give rise to liability and an award of damages by the courts. Some examples where the Supreme Court of Canada found breach of confidence by a party were presented. Information communicated from an employer to an employee can be divided into the following three categories: (1) publicly accessible and not confidential, (2) confidential and must be treated as such while an employee is employed, but if learned becomes part of the employees skill and knowledge, and (3) specific confidential trade secrets that cannot lawfully be used for anyone's benefit but the employer's. Issues regarding defining rights and obligations by contract were also discussed

  16. Financial Statement Math

    OpenAIRE

    2007-01-01

    game tool Game Tool Interactive Media Element The purpose of this interactive exercise is to help you understand the math in the income statement and balance sheet., Give the proper mathematical computations in order to correctly prepare the income statement and the balance sheet.The exercise is divided into 3 parts: The income Statement, The Balance Sheet - Assets, The Balance Sheet - Liabilities, GB3050 Financial Reporting and Analysis

  17. Clinical confidentiality in the extradition proceedings relating to Senator Pinochet.

    Science.gov (United States)

    Hughes, C G

    2001-01-01

    The extradition proceedings relating to Senator Pinochet were ultimately resolved by the decision of the Secretary of State on the basis of medical evidence as to the Senator's competence to participate in a criminal trial. In considering the decision-making of the Secretary of State the court considered whether a confidential medical report, which dealt with matters of fact and opinion, could be disclosed to interested parties. The interests of justice in a significant, novel and complex case over-rode Senator Pinochet's expectations of confidentiality and his right to respect for private life under Article 8(1) of the European Convention on Human Rights (ECHR).

  18. Enhanced Obfuscation Technique for Data Confidentiality in Public Cloud Storage

    Directory of Open Access Journals (Sweden)

    Oli S. Arul

    2016-01-01

    Full Text Available With an advent of cloud computing, data storage has become a boon in information technology. At the same time, data storage in remote places have become important issues. Lot of techniques are available to ensure protection of data confidentiality. These techniques do not completely serve the purpose in protecting data. The Obfuscation techniques come to rescue for protecting data from malicious attacks. This paper proposes an obfuscation technique to encrypt the desired data type on the cloud providing more protection from unknown hackers. The experimental results show that the time taken for obfuscation is low and the confidentiality percentage is high when compared with existing techniques.

  19. 75 FR 55577 - Clean Water Act; Contractor Access to Confidential Business Information

    Science.gov (United States)

    2010-09-13

    ... mining; construction and development; drinking water treatment; industrial container and drum cleaning... ENVIRONMENTAL PROTECTION AGENCY [FRL-9200-8] Clean Water Act; Contractor Access to Confidential... Environmental Protection Agency's (EPA) Office of Water intends to transfer confidential business information...

  20. Avoiding Simplicity Is Complex

    Science.gov (United States)

    Allender, Eric

    It is a trivial observation that every decidable set has strings of length n with Kolmogorov complexity logn + O(1) if it has any strings of length n at all. Things become much more interesting when one asks whether a similar property holds when one considers resource-bounded Kolmogorov complexity. This is the question considered here: Can a feasible set A avoid accepting strings of low resource-bounded Kolmogorov complexity, while still accepting some (or many) strings of length n?

  1. Flocking with Obstacle Avoidance

    Science.gov (United States)

    2003-02-15

    combination of these three protocols led to creation of the first animation of flocking in 1987. In [17], the society of boids is viewed as a distributed...clearly a centralized algorithm which is highly undesirable for flocking due to its high communication cost. The second approach is feasible if the net is... Flocking with Obstacle Avoidance ∗ Reza Olfati Saber † e-mail: olfati@cds.caltech.edu February 15, 2003 Technical Report CIT-CDS 03-006 Abstract In

  2. 40 CFR 53.15 - Trade secrets and confidential or privileged information.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 5 2010-07-01 2010-07-01 false Trade secrets and confidential or... Provisions § 53.15 Trade secrets and confidential or privileged information. Any information submitted under this part that is claimed to be a trade secret or confidential or privileged information shall be...

  3. 75 FR 3232 - Access to Confidential Business Information by Versar Inc. and Its Identified Subcontractor

    Science.gov (United States)

    2010-01-20

    ... AGENCY Access to Confidential Business Information by Versar Inc. and Its Identified Subcontractor AGENCY... North Springfield, VA and its subcontractor, to access information which has been submitted to EPA under... or determined to be Confidential Business Information (CBI). DATES: Access to the confidential data...

  4. 48 CFR 1552.235-80 - Access to confidential business information.

    Science.gov (United States)

    2010-10-01

    ... Clauses 1552.235-80 Access to confidential business information. As prescribed in 1535.007-70(g), insert the following clause. Access to Confidential Business Information (OCT 2000) It is not anticipated that it will be necessary for the contractor to have access to confidential business information (CBI...

  5. 10 CFR 9.28 - Predisclosure notification procedures for information containing trade secrets or confidential...

    Science.gov (United States)

    2010-01-01

    ... containing trade secrets or confidential commercial or financial information. 9.28 Section 9.28 Energy... notification procedures for information containing trade secrets or confidential commercial or financial... such trade secrets or confidential commercial or financial information, the NRC will give the submitter...

  6. 78 FR 44622 - Agency Information Collection; Activity Under OMB Review; Confidential Close Call Reporting System

    Science.gov (United States)

    2013-07-24

    ... Technology Administration (RITA), Bureau of Transportation Statistics (BTS), DOT. ACTION: Notice. SUMMARY: In... Confidentiality Provisions: The confidentiality of Close Call data is protected under the BTS confidentiality... statistical and non-identifying data will be made publicly available through reports. BTS will not release to...

  7. Teaching Philosophy Statements

    Science.gov (United States)

    Faryadi, Qais

    2015-01-01

    This article examines the rationale for my teaching philosophy. Using a personal perspective, I explain my objectives, mission, and vision in writing my philosophy of teaching statements. This article also creates a road map and reference points for educators who want to write their own teaching philosophy statements to help them make informed…

  8. Confidentiality concerning HIV/AIDS status - the implications of the ...

    African Journals Online (AJOL)

    Department of Business Administration, University of Natal, Durban. L. A. Dancaster. B. CaM. HONS. LLB.• LLM. ... Heerden's wife was a business partner of McGeary, and Van. Heerden claimed that this was why Kruger ..... fundamental principles regarding confidentiality and the HIV patient. It is important for both the legal ...

  9. Confidentiality with respect to third parties: a psychoanalytic view.

    Science.gov (United States)

    Furlong, Allannah

    2005-04-01

    It is assumed that confidentiality is not one singular ethical entity but a conglomerate of quite different issues depending upon clinical context and the sector of information sharing at stake. The focus here is on how to think psychoanalytically about requests for information from third parties (payers, courts, public security). Defining confidentiality as a promise to 'never tell anything' outside of the relationship omits evaluation of the impact of the third's listening on the combined freedom of thought and freedom of speech in analyst and analysand. Circulation of information outside the dyad need not be toxic, need not disrupt the analytic couple's openness to new meaning. Key to contamination and inhibition of analytic work is whether or not disclosure serves an analytic end. Current defense of confidentiality relies heavily on the models of protection of privacy and professional secrecy, which, though useful and relevant, fail to encompass the transitional, intersubjective space engendered by the analytic process. Suggestions are made for alternate sources of paradigms better suited to represent the latter. Offered for discussion is a draft of a confidentiality policy with respect to third parties that is informed by psychoanalytic theory and clinical practice rather than by local legal jurisdiction or original disciplines' ethics codes.

  10. 19 CFR 201.6 - Confidential business information.

    Science.gov (United States)

    2010-04-01

    ..., or apparatus, or to the production, sales, shipments, purchases, transfers, identification of... business information (e.g., discussion of trends) will be treated as confidential business information only...) day period for filing an appeal shall be tolled on the filing of an amended request and a new twenty...

  11. Zerber: r-Confidential Indexing for Distributed Documents

    NARCIS (Netherlands)

    Zerr, Sergej; Demidova, Elena; Olmedilla, Daniel; Nejdl, Wolfgang; Winslett, Marianne; Mitra, Soumyadeb

    2008-01-01

    Zerr, S., Demidova, E., Olmedilla, D., Nejdl, W., Winslett, M., & Mitra, S. (2008). Zerber: r-Confidential Indexing for Distributed Documents. In J. Teubner (Eds.), Proceedings of the 11th International Conference on Extending Database Technology (pp. 287-298). March, 25-29, 2008, Nantes, France.

  12. The internet, virtual communities and threats to confidentiality ...

    African Journals Online (AJOL)

    Objectives. To describe the role of the Internet in building virtual communities of doctors, to identify threats to privacy and confidentiality in this use of the Internet, and to suggest ways in which this threat can be managed. Summary. The Internet is revolutionising the medical profession. The doctor's role as medical expert is ...

  13. 40 CFR 763.179 - Confidential business information claims.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 30 2010-07-01 2010-07-01 false Confidential business information claims. 763.179 Section 763.179 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED... for your product? Consider in your answer such constraints as capital and marketing cost, specialized...

  14. 22 CFR 1104.17 - Confidentiality of archaeological resource information.

    Science.gov (United States)

    2010-04-01

    ... 22 Foreign Relations 2 2010-04-01 2010-04-01 true Confidentiality of archaeological resource information. 1104.17 Section 1104.17 Foreign Relations INTERNATIONAL BOUNDARY AND WATER COMMISSION, UNITED... of archaeological resource information. (a) The Commissioner shall not make available to the public...

  15. Effective verification of confidentiality for multi-threaded programs

    NARCIS (Netherlands)

    Ngo, Minh Tri; Stoelinga, Mariëlle Ida Antoinette; Huisman, Marieke

    2014-01-01

    This paper studies how confidentiality properties of multi-threaded programs can be verified efficiently by a combination of newly developed and existing model checking algorithms. In particular, we study the verification of scheduler-specific observational determinism (SSOD), a property that

  16. 15 CFR 295.9 - Protection of confidential information.

    Science.gov (United States)

    2010-01-01

    ... confidential basis in connection with the activities of any business or joint research and development venture...) Information on the business operation of any member of the business or joint venture; (2) Trade secrets possessed by any business or any member of the joint venture. ...

  17. 7 CFR 1207.540 - Confidential books, records, and reports.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 10 2010-01-01 2010-01-01 false Confidential books, records, and reports. 1207.540 Section 1207.540 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL... books, records, and reports. All information obtained from the books, records, and reports of handler...

  18. 40 CFR 91.516 - Treatment of confidential information.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 20 2010-07-01 2010-07-01 false Treatment of confidential information. 91.516 Section 91.516 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) AIR PROGRAMS (CONTINUED) CONTROL OF EMISSIONS FROM MARINE SPARK-IGNITION ENGINES Manufacturer Production Line...

  19. 40 CFR 303.31 - Assurance of claimant confidentiality.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 27 2010-07-01 2010-07-01 false Assurance of claimant confidentiality. 303.31 Section 303.31 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) SUPERFUND, EMERGENCY PLANNING, AND COMMUNITY RIGHT-TO-KNOW PROGRAMS CITIZEN AWARDS FOR INFORMATION ON CRIMINAL...

  20. 40 CFR 85.1415 - Treatment of confidential information.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 18 2010-07-01 2010-07-01 false Treatment of confidential information. 85.1415 Section 85.1415 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) AIR PROGRAMS (CONTINUED) CONTROL OF AIR POLLUTION FROM MOBILE SOURCES Urban Bus Rebuild Requirements § 85.1415...

  1. 12 CFR 19.181 - Confidentiality of formal investigations.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 1 2010-01-01 2010-01-01 false Confidentiality of formal investigations. 19.181 Section 19.181 Banks and Banking COMPTROLLER OF THE CURRENCY, DEPARTMENT OF THE TREASURY RULES OF... only in accordance with the provisions of part 4 of this chapter. ...

  2. IT Confidentiality Risk Assessment for an Architecture-Based Approach

    NARCIS (Netherlands)

    Morali, A.; Zambon, Emmanuele; Etalle, Sandro; Overbeek, Paul

    2008-01-01

    Information systems require awareness of risks and a good understanding of vulnerabilities and their exploitations. In this paper, we propose a novel approach for the systematic assessment and analysis of confidentiality risks caused by disclosure of operational and functional information. The

  3. 45 CFR 1321.51 - Confidentiality and disclosure of information.

    Science.gov (United States)

    2010-10-01

    ... 45 Public Welfare 4 2010-10-01 2010-10-01 false Confidentiality and disclosure of information. 1321.51 Section 1321.51 Public Welfare Regulations Relating to Public Welfare (Continued) OFFICE OF... AMERICANS PROGRAMS GRANTS TO STATE AND COMMUNITY PROGRAMS ON AGING State Agency Responsibilities § 1321.51...

  4. Time for Action: Audit, Accountability and Confidential Enquiries into ...

    African Journals Online (AJOL)

    Improving the quality of care is essential for achieving reductions in maternal mortality. Audit is one of the methods which can be used to simultaneously assess as well as improve quality. This commentary discusses one type of audit – confidential enquiries into maternal death. We believe that the enthusiasm for ...

  5. 15 CFR 325.16 - Protecting confidentiality of information.

    Science.gov (United States)

    2010-01-01

    ... 15 Commerce and Foreign Trade 2 2010-01-01 2010-01-01 false Protecting confidentiality of information. 325.16 Section 325.16 Commerce and Foreign Trade Regulations Relating to Commerce and Foreign Trade (Continued) INTERNATIONAL TRADE ADMINISTRATION, DEPARTMENT OF COMMERCE MISCELLANEOUS REGULATIONS...

  6. Meaningful Use of a Confidential Adolescent Patient Portal.

    Science.gov (United States)

    Thompson, Lindsay A; Martinko, Thomas; Budd, Pamela; Mercado, Rebeccah; Schentrup, Anzeela M

    2016-02-01

    To design and evaluate the usage of an adolescent patient portal specifically adapted for adolescent health care needs that also satisfied institutional meaningful use guidelines regarding electronic health records. Key stakeholders at one academic health care center adopted an online portal and opted to designate a patient portal specifically for adolescents to maximize confidentiality in compliance with state privacy laws. This study analyzed aggregate electronic health record data of adolescents' (ages 12-17.9 years) uptake, usage, and functionality of this portal and compared it to parent portal usage for younger children (ages 0-11 years). Differences in means were calculated using paired t tests. The portal was used similarly between parents of young children and adolescents, with almost 1,000 enrollees in each group from September 1, 2012 to March 31, 2015. There were no gender differences in enrollment. Adolescents were less likely than parents of younger children to review appointments (73% vs. 85%), laboratory tests (67% vs. 79%), problem lists (40% vs. 78%), or allergies (45% vs. 77%, all p values adolescents sent 1,397 confidential messages. Institutional decisions for implementing meaningful use requirements can align with goals of adolescent health. Patient portals can enhance adolescent health care quality and adolescents readily use a confidential portal. Implementation of meaningful use requirements should be checked against adolescent health care needs to maximize confidentiality and promote health communication. Copyright © 2016 Society for Adolescent Health and Medicine. Published by Elsevier Inc. All rights reserved.

  7. Opening statements and general statements by delegation

    International Nuclear Information System (INIS)

    1978-01-01

    23 delegations have submitted general reports and statements on the situation and evolution of the nuclear fuel cycle. Each report reflects the particular interests of the country that submitted it. All in all, these reports provide general background information on the subject of the conference

  8. Avoidable waste management costs

    Energy Technology Data Exchange (ETDEWEB)

    Hsu, K.; Burns, M.; Priebe, S.; Robinson, P.

    1995-01-01

    This report describes the activity based costing method used to acquire variable (volume dependent or avoidable) waste management cost data for routine operations at Department of Energy (DOE) facilities. Waste volumes from environmental restoration, facility stabilization activities, and legacy waste were specifically excluded from this effort. A core team consisting of Idaho National Engineering Laboratory, Los Alamos National Laboratory, Rocky Flats Environmental Technology Site, and Oak Ridge Reservation developed and piloted the methodology, which can be used to determine avoidable waste management costs. The method developed to gather information was based on activity based costing, which is a common industrial engineering technique. Sites submitted separate flow diagrams that showed the progression of work from activity to activity for each waste type or treatability group. Each activity on a flow diagram was described in a narrative, which detailed the scope of the activity. Labor and material costs based on a unit quantity of waste being processed were then summed to generate a total cost for that flow diagram. Cross-complex values were calculated by determining a weighted average for each waste type or treatability group based on the volume generated. This study will provide DOE and contractors with a better understanding of waste management processes and their associated costs. Other potential benefits include providing cost data for sites to perform consistent cost/benefit analysis of waste minimization and pollution prevention (WMIN/PP) options identified during pollution prevention opportunity assessments and providing a means for prioritizing and allocating limited resources for WMIN/PP.

  9. Avoidable waste management costs

    International Nuclear Information System (INIS)

    Hsu, K.; Burns, M.; Priebe, S.; Robinson, P.

    1995-01-01

    This report describes the activity based costing method used to acquire variable (volume dependent or avoidable) waste management cost data for routine operations at Department of Energy (DOE) facilities. Waste volumes from environmental restoration, facility stabilization activities, and legacy waste were specifically excluded from this effort. A core team consisting of Idaho National Engineering Laboratory, Los Alamos National Laboratory, Rocky Flats Environmental Technology Site, and Oak Ridge Reservation developed and piloted the methodology, which can be used to determine avoidable waste management costs. The method developed to gather information was based on activity based costing, which is a common industrial engineering technique. Sites submitted separate flow diagrams that showed the progression of work from activity to activity for each waste type or treatability group. Each activity on a flow diagram was described in a narrative, which detailed the scope of the activity. Labor and material costs based on a unit quantity of waste being processed were then summed to generate a total cost for that flow diagram. Cross-complex values were calculated by determining a weighted average for each waste type or treatability group based on the volume generated. This study will provide DOE and contractors with a better understanding of waste management processes and their associated costs. Other potential benefits include providing cost data for sites to perform consistent cost/benefit analysis of waste minimization and pollution prevention (WMIN/PP) options identified during pollution prevention opportunity assessments and providing a means for prioritizing and allocating limited resources for WMIN/PP

  10. Cash flow statement

    Directory of Open Access Journals (Sweden)

    Pavlović Miloš

    2013-01-01

    Full Text Available A cash flow is "bloodstream" of business and without constant cash flow a company would not be able to function. The cash flow statement is statutory financial report that provides information to the interested parties on cash inflows and outflows from operating, investing and financing activities during the accounting period. This paper will discuss the origin and significance of the cash slow statement; in addition, we will define the main categories of this statement and present the methodology of its composition in accordance with IAS 7.

  11. Public expectations concerning confidentiality protection of adolescents' sexual and reproductive health care in Lithuania

    DEFF Research Database (Denmark)

    Jaruseviciene, Lina; Zaborskis, Apolinaras; Lazarus, Jeffrey Victor

    2014-01-01

    for confidentiality using a five-point Likert scale for eight types of SRH consultations. RESULTS: Public anticipation for confidentiality depended on whether issues related to sexual behaviour or to its consequences were addressed during adolescent consultation. Only younger respondents had higher expectations......OBJECTIVE: An adolescent's right to confidential healthcare is protected by international law and professional consensus. However, parental and social support for confidential sexual and reproductive health (SRH) services, in particular, varies greatly. This study documents Lithuanian residents...... for confidentiality in both contexts. Public expectations regarding confidentiality were less demanding in 2012 than in 2005. CONCLUSIONS: The expectation of confidentiality protection was greater for topics related to sexual behaviour than for the consequences of sexual behaviour, such as pregnancy, abortion...

  12. Systematization of falsification risk factors in financial statements: accounting aspect

    Directory of Open Access Journals (Sweden)

    N.О. Mizyakina

    2016-12-01

    Full Text Available The presence of false information in the financial statements significantly undermines the confidence of investors and creditors of a company. This necessitates finding and identifying risk factors for falsifying financial statements. Risk factors for financial statements falsification are various and there are different approaches to their classification. It is found out that there is the problem on the clear separation of the concept "creative accounting" (which allows to present a company in the best light for investors and creditors within the law and the concept "falsification of financial statements indicators", which undermines confidence and causes million expenditures of investors and creditors. The article determines the main reasons and factors that lead to the falsification of enterprise’s financial statements. The study suggests the approaches to the classification of risk factors for falsifying financial statements, including those, which have a direct or indirect impact on the reporting. The classification of risk factors for falsifying financial statements is necessary to systematize falsification risks of financial statements in order to minimize them and avoid them during the process of formation of financial reporting indicators.

  13. Medical confidentiality versus disclosure: Ethical and legal dilemmas.

    LENUS (Irish Health Repository)

    Agyapong, V I O

    2009-02-01

    A case is described of a fifty year old single man who made disclosures about criminal sexual practices during a psychiatric assessment. In common practice with other professional men, a doctor is under a duty not to disclose, without the consent of his patient, information which he has gained in his professional capacity other than in exceptional circumstances. We discuss the ethical and legal considerations surrounding issues of medical confidentiality and the dilemma that sometimes face clinicians, when they feel obliged, in the public interest, to disclose information they have gained in confidence. Breach of confidences can have deleterious consequences; particularly for the doctor-patient relationship, but failure to disclose in some situations could have serious implications for the well-being of the wider society. Doctors should be aware of the basic principles of confidentiality and the ethical and legal framework around which they are built.

  14. [Ethics in pediatric emergencies: Care access, communication, and confidentiality].

    Science.gov (United States)

    Benoit, J; Berdah, L; Carlier-Gonod, A; Guillou, T; Kouche, C; Patte, M; Schneider, M; Talcone, S; Chappuy, H

    2015-05-01

    Children suffer most from today's increasing precariousness. In France, access to care is available for all children through various structures and existing measures. The support for foreign children is overseen by specific legislation often unfamiliar to caregivers. Pediatric emergencies, their location, organization, actors, and patient flow are a particular environment that is not always suitable to communication and may lead to situations of abuse. Communication should not be forgotten because of the urgency of the situation. The place of the child in the dialogue is often forgotten. Considering the triangular relationship, listening to the child and involving the parents in care are the basis for a good therapeutic alliance. Privacy and medical confidentiality in pediatric emergencies are governed by law. However, changes in treatments and medical practices along with the variety of actors involved imply both individual and collective limitations, to the detriment of medical confidentiality. Copyright © 2015 Elsevier Masson SAS. All rights reserved.

  15. An efficient steganography method for hiding patient confidential information.

    Science.gov (United States)

    Al-Dmour, Hayat; Al-Ani, Ahmed; Nguyen, Hung

    2014-01-01

    This paper deals with the important issue of security and confidentiality of patient information when exchanging or storing medical images. Steganography has recently been viewed as an alternative or complement to cryptography, as existing cryptographic systems are not perfect due to their vulnerability to certain types of attack. We propose in this paper a new steganography algorithm for hiding patient confidential information. It utilizes Pixel Value Differencing (PVD) to identify contrast regions in the image and a Hamming code that embeds 3 secret message bits into 4 bits of the cover image. In order to preserve the content of the region of interest (ROI), the embedding is only performed using the Region of Non-Interest (RONI).

  16. Confidentiality and its limits: some contributions from Christianity.

    Science.gov (United States)

    Torrance, I R

    2003-02-01

    The issue is whether Christianity, of its nature, would seek to prevent a justifiable breach of confidentiality or could endorse it, under certain circumstances, as the act which is fundamentally more loving or more truthful. The individualistic nature of Western Christianity is noted. The Lutheran theologian Dietrich Bonhoeffer is used to show Christian support for dynamic rather than literal truth telling, and for awareness of the contexts and power relations within which persons stand.

  17. Privacy, confidentiality and abortion statistics: a question of public interest?

    Science.gov (United States)

    McHale, Jean V; Jones, June

    2012-01-01

    The precise nature and scope of healthcare confidentiality has long been the subject of debate. While the obligation of confidentiality is integral to professional ethical codes and is also safeguarded under English law through the equitable remedy of breach of confidence, underpinned by the right to privacy enshrined in Article 8 of the Human Rights Act 1998, it has never been regarded as absolute. But when can and should personal information be made available for statistical and research purposes and what if the information in question is highly sensitive information, such as that relating to the termination of pregnancy after 24 weeks? This article explores the case of In the Matter of an Appeal to the Information Tribunal under section 57 of the Freedom of Information Act 2000, concerning the decision of the Department of Health to withhold some statistical data from the publication of its annual abortion statistics. The specific data being withheld concerned the termination for serious fetal handicap under section 1(1)d of the Abortion Act 1967. The paper explores the implications of this case, which relate both to the nature and scope of personal privacy. It suggests that lessons can be drawn from this case about public interest and use of statistical information and also about general policy issues concerning the legal regulation of confidentiality and privacy in the future.

  18. Conflicting duties over confidentiality in Argentina and Peru.

    Science.gov (United States)

    Cavallo, Mercedes

    2011-02-01

    The medical duty of confidentiality represents a key element for the provision of reproductive and sexual health services. In some Latin American countries, such as Argentina and Peru, the legal systems impose—or are interpreted as imposing—on health professionals the duty of confidentiality, but also the duty to report the commission of a public order offense that they know about owing to the practicing of their profession. In these countries, the conflicting duties and the criminalization of abortion cause severe public health and human rights problems when health professionals assist their patients for post-abortion treatment. Typically, patients are deterred from seeking prompt medical care, and their privacy, autonomy, and dignity are violated. A 2010 ruling from the Supreme Court of Argentina and a 2004 ruling from the Inter-American Court of Human Rights emerge as important instruments that grant a more adequate protection of medical confidentiality. © 2010 International Federation of Gynecology and Obstetrics. Published by Elsevier Ireland Ltd. All rights reserved.

  19. Is patient confidentiality compromised with the electronic health record?: a position paper.

    Science.gov (United States)

    Wallace, Ilse M

    2015-02-01

    In order for electronic health records to fulfill their expected benefits, protection of privacy of patient information is key. Lack of trust in confidentiality can lead to reluctance in disclosing all relevant information, which could have grave consequences. This position paper contemplates whether patient confidentiality is compromised by electronic health records. The position that confidentiality is compromised was supported by the four bioethical principles and argued that despite laws and various safeguards to protect patients' confidentiality, numerous data breaches have occurred. The position that confidentiality is not compromised was supported by virtue ethics and a utilitarian viewpoint and argued that safeguards keep information confidential and the public feels relatively safe with the electronic health record. The article concludes with an ethically superior position that confidentiality is compromised with the electronic health record. Although organizational and governmental ways of enhancing the confidentiality of patient information within the electronic health record facilitate confidentiality, the ultimate responsibility of maintaining confidentiality rests with the individual end-users and their ethical code of conduct. The American Nurses Association Code of Ethics for nurses calls for nurses to be watchful with data security in electronic communications.

  20. Auditing nuclear materials statements

    International Nuclear Information System (INIS)

    Anon.

    1973-01-01

    A standard that may be used as a guide for persons making independent examinations of nuclear materials statements or reports regarding inventory quantities on hand, receipts, production, shipment, losses, etc. is presented. The objective of the examination of nuclear materials statements by the independent auditor is the expression of an opinion on the fairness with which the statements present the nuclear materials position of a nuclear materials facility and the movement of such inventory materials for the period under review. The opinion is based upon an examination made in accordance with auditing criteria, including an evaluation of internal control, a test of recorded transactions, and a review of measured discards and materials unaccounted for (MUF). The standard draws heavily upon financial auditing standards and procedures published by the American Institute of Certified Public Accountants

  1. 76 FR 72403 - Access to Confidential Business Information by Primus Solutions, Inc.

    Science.gov (United States)

    2011-11-23

    ...] Access to Confidential Business Information by Primus Solutions, Inc. AGENCY: Environmental Protection Agency (EPA). ACTION: Notice. SUMMARY: EPA has authorized its contractor, Primus Solutions, Inc., (Primus...

  2. Healthcare avoidance: a critical review.

    Science.gov (United States)

    Byrne, Sharon K

    2008-01-01

    The purpose of this study is to provide a critical review and synthesis of theoretical and research literature documenting the impact of avoidance on healthcare behaviors, identify the factors that influence healthcare avoidance and delay in the adult population, and propose a direction for future research. The Theory of Reasoned Action, Theory of Planned Behavior, Theory of Care-Seeking Behavior, the Transtheoretical Model, and the Behavioral Model of Health Services Use/Utilization are utilized to elaborate on the context within which individual intention to engage in healthcare behaviors occurs. Research literature on the concept of healthcare avoidance obtained by using computerized searches of CINAHL, MEDLINE, PSYCH INFO, and HAPI databases, from 1995 to 2007, were reviewed. Studies were organized by professional disciplines. Healthcare avoidance is a common and highly variable experience. Multiple administrative, demographic, personal, and provider factors are related to healthcare avoidance, for example, distrust of providers and/or the science community, health beliefs, insurance status, or socioeconomic/income level. Although the concept is recognized by multiple disciplines, limited research studies address its impact on healthcare decision making. More systematic research is needed to determine correlates of healthcare avoidance. Such studies will help investigators identify patients at risk for avoidant behaviors and provide the basis for health-promoting interventions. Methodological challenges include identification of characteristics of individuals and environments that hinder healthcare behaviors, as well as, the complexity of measuring healthcare avoidance. Studies need to systematically explore the influence of avoidance behaviors on specific healthcare populations at risk.

  3. Stimulus conflict triggers behavioral avoidance.

    Science.gov (United States)

    Dignath, David; Eder, Andreas B

    2015-12-01

    According to a recent extension of the conflict-monitoring theory, conflict between two competing response tendencies is registered as an aversive event and triggers a motivation to avoid the source of conflict. In the present study, we tested this assumption. Over five experiments, we examined whether conflict is associated with an avoidance motivation and whether stimulus conflict or response conflict triggers an avoidance tendency. Participants first performed a color Stroop task. In a subsequent motivation test, participants responded to Stroop stimuli with approach- and avoidance-related lever movements. These results showed that Stroop-conflict stimuli increased the frequency of avoidance responses in a free-choice motivation test, and also increased the speed of avoidance relative to approach responses in a forced-choice test. High and low proportions of response conflict in the Stroop task had no effect on avoidance in the motivation test. Avoidance of conflict was, however, obtained even with new conflict stimuli that had not been presented before in a Stroop task, and when the Stroop task was replaced with an unrelated filler task. Taken together, these results suggest that stimulus conflict is sufficient to trigger avoidance.

  4. Corporate Information Management Financial Statements

    National Research Council Canada - National Science Library

    Gimble, Thomas

    1995-01-01

    The audit objective was to determine whether the OASD(C31) methods for preparing FY 1996 CIM, general purpose financial statements will result in auditable and complete general purpose financial statements...

  5. Teaching Confidentiality through Comics at One Spanish Medical School.

    Science.gov (United States)

    Lalanda, Mónica; Altisent, Rogelio; Delgado-Marroquín, Maria Teresa

    2018-02-01

    At the University of Zaragoza in Spain we developed an innovative way to teach the concept of confidentiality to medical students, which we tested by comparing the use of customized comics with more traditional methods. We proved that using comics is more attractive to students than lectures and class discussions, that it increases class participation and students' self-awareness of learning, and that it maintains the same academic results. We share our experience visually in a two-page comic. © 2018 American Medical Association. All Rights Reserved.

  6. Statement on Plagiarism

    Indian Academy of Sciences (India)

    Home; Journals; Resonance – Journal of Science Education; Volume 13; Issue 5. Statement on Plagiarism. S Mahadevan N Mukunda. Editorial Volume 13 Issue 5 May 2008 pp 403-404. Fulltext. Click here to view fulltext PDF. Permanent link: https://www.ias.ac.in/article/fulltext/reso/013/05/0403-0404. Author Affiliations.

  7. Consolidating Financial Statements.

    Science.gov (United States)

    Wood, Marcia R.

    This publication is designed to be a desktop reference and assist financial officers in both public and independent institutions of higher education in the preparation of consolidated financial statements. Chapter 1 covers generally accepted accounting principles and other accounting literature, and summarizes reporting rules of the Financial…

  8. Consolidated financial statements

    OpenAIRE

    Blaha, Miroslav

    2010-01-01

    This work provides basic information about consolidation and consolidated financial statements. In the beginning there are definisions of the members of the group under discussion and their relationship. Hereafter concepts of consolidation, accounting methods and methods of consolidation are discussed. It also compares approach of different accounting systems to consolidation.

  9. CONSOLIDATED FINANCIAL STATEMENTS UNDER IFRS

    OpenAIRE

    Tănase Alin-Eliodor; Calotă Traian-Ovidiu

    2013-01-01

    This article is focuses on accounting consolidation techniques and the preparation of consolidation worksheets for the components of financial statements (statement of comprehensive income, statement of changes in equity, and financial position). The presented group includes parent company, two subsidiaries (only one fully controlled by the parent company) and a jointly controlled entity. The financial statements are presented under the following standards IFRS 3 Business Combination, IAS 27 ...

  10. Fundamentals of Financial Statements Audit

    OpenAIRE

    World Bank

    2011-01-01

    The purpose of an audit is to enhance the degree of confidence of intended users in the financial statements. The objective of an audit of financial statements is to enable an auditor to express an opinion as to whether the financial statements are prepared, in all material respects, in accordance with International Financial Reporting Standards or another identified financial reporting fr...

  11. Conflict Avoidance and University Management.

    Science.gov (United States)

    Tagliacozzo, Daisy M.

    The conditions that intensify conflict avoidance by the central administration in making strategic decisions, and the consequences of such avoidance for the management of college affairs, are discussed. The implication of an emerging decision-making style for adapting the organization to changing environments is also considered. Some of the…

  12. HIPAA-protecting patient confidentiality or covering something else?

    Directory of Open Access Journals (Sweden)

    Robbins RA

    2013-10-01

    Full Text Available No abstract available. Article truncated at 150 words. A case of a physician fired from the Veterans Administration (VA for violation of the Health Care Portability and Accountability Act of 1996 (HIPAA illustrates a problem with both the law and the VA. Anil Parikh, a VA physician at the Jesse Brown VA in Chicago, was dismissed on a charge of making unauthorized disclosures of confidential patient information on October 19, 2007. On January 3, 2011 the Merit Systems Protection Board (MSPB reversed Dr. Parikh’s removal. Dr. Parikh's initially made disclosures to the VA Office of Inspector General and to Senator Barack Obama and Congressman Luis Gutierrez, in whose district the Jesse Brown VA lies. Dr. Parikh alleged that there were systematic problems within the Jesse Brown VA that resulted in untimely and inadequate patient care. The confidential patient information Parikh disclosed included examples of the misdiagnoses and misdirection of patients within the hospital. Specifically, Dr. Parikh alleged that …

  13. 41 CFR 105-60.405 - Processing requests for confidential commercial information.

    Science.gov (United States)

    2010-07-01

    ... MATERIALS 60.4-Described Records § 105-60.405 Processing requests for confidential commercial information... 41 Public Contracts and Property Management 3 2010-07-01 2010-07-01 false Processing requests for confidential commercial information. 105-60.405 Section 105-60.405 Public Contracts and Property Management...

  14. 40 CFR 2.208 - Substantive criteria for use in confidentiality determinations.

    Science.gov (United States)

    2010-07-01

    ... nor withdrawn; (b) The business has satisfactorily shown that it has taken reasonable measures to... GENERAL PUBLIC INFORMATION Confidentiality of Business Information § 2.208 Substantive criteria for use in confidentiality determinations. Determinations issued under §§ 2.204 through 2.207 shall hold that business...

  15. 75 FR 81266 - Access by EPA Contractors to Information Claimed as Confidential Business Information (CBI...

    Science.gov (United States)

    2010-12-27

    ... AGENCY Access by EPA Contractors to Information Claimed as Confidential Business Information (CBI... determined to be, confidential business information (CBI). Contractor access to this information, which is... information by the contractor and the contractor must require its personnel who require access to information...

  16. 77 FR 10506 - Access to Confidential Business Information by Syracuse Research Corporation, Inc., and Its...

    Science.gov (United States)

    2012-02-22

    ... AGENCY Access to Confidential Business Information by Syracuse Research Corporation, Inc., and Its... Syracuse, NY, and its identified subcontractor BeakerTree Corporation to access information which has been... information may be claimed or determined to be Confidential Business Information (CBI). DATES: Access to the...

  17. 5 CFR 1204.14 - Requests for access to confidential commercial information.

    Science.gov (United States)

    2010-01-01

    ... Freedom of Information Act § 1204.14 Requests for access to confidential commercial information. (a... 5 Administrative Personnel 3 2010-01-01 2010-01-01 false Requests for access to confidential commercial information. 1204.14 Section 1204.14 Administrative Personnel MERIT SYSTEMS PROTECTION BOARD...

  18. 76 FR 7559 - Access in Litigation to Confidential Business Information; Transfer of Information Claimed as...

    Science.gov (United States)

    2011-02-10

    ... AGENCY Access in Litigation to Confidential Business Information; Transfer of Information Claimed as Confidential Business Information to the United States Department of Justice and Parties to Certain Litigation... Litigation''), information which has been submitted to EPA by its contractors that is claimed to be, or has...

  19. 49 CFR Appendix A to Part 512 - Certificate in Support of Request for Confidentiality

    Science.gov (United States)

    2010-10-01

    ..., state as follows: (1) I am (official's name, title) and I am authorized by (company) to execute this... confidential and proprietary data and is being submitted with the claim that it is entitled to confidential... information provided by the responsible (company) personnel who have authority in the normal course of...

  20. 5 CFR 2634.604 - Custody of and denial of public access to confidential reports.

    Science.gov (United States)

    2010-01-01

    ... 5 Administrative Personnel 3 2010-01-01 2010-01-01 false Custody of and denial of public access to confidential reports. 2634.604 Section 2634.604 Administrative Personnel OFFICE OF GOVERNMENT ETHICS GOVERNMENT... § 2634.604 Custody of and denial of public access to confidential reports. (a) Any report filed with an...

  1. Having Confidence in Therapeutic Work with Young People: Constraints and Challenges to Confidentiality

    Science.gov (United States)

    Jenkins, Peter

    2010-01-01

    Confidentiality presents particular challenges to practitioners working with young people, on account of the latter's vulnerability and emotional immaturity. Ethical codes place a key importance on confidentiality, from deontological and teleological perspectives. However, young clients may rely on a more pragmatic approach in deciding whether to…

  2. 48 CFR 1552.235-71 - Treatment of confidential business information.

    Science.gov (United States)

    2010-10-01

    ... determined that in the performance of a contract, EPA may furnish confidential business information to the... Contractor: Treatment of Confidential Business Information (APR 1984) (a) The Contracting Officer, after a... without the prior written approval of the Assistant General Counsel for Contracts and Information Law; and...

  3. 16 CFR 1702.6 - Trade secrets and other confidential information.

    Science.gov (United States)

    2010-01-01

    ... 16 Commercial Practices 2 2010-01-01 2010-01-01 false Trade secrets and other confidential information. 1702.6 Section 1702.6 Commercial Practices CONSUMER PRODUCT SAFETY COMMISSION POISON PREVENTION...; PETITION PROCEDURES AND REQUIREMENTS § 1702.6 Trade secrets and other confidential information. Where a...

  4. 42 CFR 405.215 - Confidential commercial and trade secret information.

    Science.gov (United States)

    2010-10-01

    ... 42 Public Health 2 2010-10-01 2010-10-01 false Confidential commercial and trade secret information. 405.215 Section 405.215 Public Health CENTERS FOR MEDICARE & MEDICAID SERVICES, DEPARTMENT OF... trade secret information. To the extent that CMS relies on confidential commercial or trade secret...

  5. 42 CFR 2.1 - Statutory authority for confidentiality of drug abuse patient records.

    Science.gov (United States)

    2010-10-01

    ... HUMAN SERVICES GENERAL PROVISIONS CONFIDENTIALITY OF ALCOHOL AND DRUG ABUSE PATIENT RECORDS Introduction § 2.1 Statutory authority for confidentiality of drug abuse patient records. The restrictions of these regulations upon the disclosure and use of drug abuse patient records were initially authorized by section 408...

  6. 77 FR 69585 - Greenhouse Gas Reporting Program: Proposed Amendments and Confidentiality Determinations for...

    Science.gov (United States)

    2012-11-20

    ... AGENCY 40 CFR Part 98 Greenhouse Gas Reporting Program: Proposed Amendments and Confidentiality... rule titled ``Greenhouse Gas Reporting Program: Proposed Amendments and Confidentiality Determinations....gov . For technical questions, please see the ] Greenhouse Gas Reporting Program Web site http://www...

  7. 42 CFR 51.45 - Confidentiality of protection and advocacy system records.

    Science.gov (United States)

    2010-10-01

    ... 42 Public Health 1 2010-10-01 2010-10-01 false Confidentiality of protection and advocacy system... GRANTS REQUIREMENTS APPLICABLE TO THE PROTECTION AND ADVOCACY FOR INDIVIDUALS WITH MENTAL ILLNESS PROGRAM Access to Records, Facilities and Individuals § 51.45 Confidentiality of protection and advocacy system...

  8. 30 CFR 210.40 - Will MMS keep the information I provide confidential?

    Science.gov (United States)

    2010-07-01

    ... 30 Mineral Resources 2 2010-07-01 2010-07-01 false Will MMS keep the information I provide... MINERALS REVENUE MANAGEMENT FORMS AND REPORTS General Provisions § 210.40 Will MMS keep the information I provide confidential? The MMS will treat information obtained under this part as confidential to the...

  9. 30 CFR 291.111 - How does MMS treat the confidential information I provide?

    Science.gov (United States)

    2010-07-01

    ... 30 Mineral Resources 2 2010-07-01 2010-07-01 false How does MMS treat the confidential information... SHELF LANDS ACT § 291.111 How does MMS treat the confidential information I provide? (a) Any person who provides documents under this part in response to a request by MMS to inform a decision on whether open...

  10. 12 CFR 261.16 - Request for access to confidential commercial or financial information.

    Science.gov (United States)

    2010-01-01

    ... or financial information. 261.16 Section 261.16 Banks and Banking FEDERAL RESERVE SYSTEM (CONTINUED) BOARD OF GOVERNORS OF THE FEDERAL RESERVE SYSTEM RULES REGARDING AVAILABILITY OF INFORMATION Published... confidential commercial or financial information. (a) Request for confidential information. A request by a...

  11. 24 CFR 15.108 - What are HUD's policies concerning designating confidential commercial or financial information...

    Science.gov (United States)

    2010-04-01

    ... designating confidential commercial or financial information under Exemption 4 of the FOIA and responding to... financial information. Except as provided in this section or otherwise required by law, HUD officers and employees may not disclose business information which is considered as confidential commercial or financial...

  12. 19 CFR 206.7 - Confidential business information; furnishing of nonconfidential summaries thereof.

    Science.gov (United States)

    2010-04-01

    ... 19 Customs Duties 3 2010-04-01 2010-04-01 false Confidential business information; furnishing of... NONADJUDICATIVE INVESTIGATIONS INVESTIGATIONS RELATING TO GLOBAL AND BILATERAL SAFEGUARD ACTIONS, MARKET DISRUPTION, TRADE DIVERSION, AND REVIEW OF RELIEF ACTIONS General § 206.7 Confidential business information...

  13. 40 CFR 725.15 - Determining applicability when microorganism identity or use is confidential or uncertain.

    Science.gov (United States)

    2010-07-01

    ... ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) TOXIC SUBSTANCES CONTROL ACT REPORTING REQUIREMENTS AND REVIEW... appear on the public version of the Inventory, in § 725.239 or in subpart M of this part. Instead, it is contained in a confidential version held in EPA's Confidential Business Information Center (CBIC). The...

  14. 49 CFR 512.6 - How should I prepare documents when submitting a claim for confidentiality?

    Science.gov (United States)

    2010-10-01

    ... “Confidential Bus Info” appears in the file name or, if that is not practicable, the characters “Conf Bus Info... consecutive page numbers or sequential identifiers so that any page can be identified and located using the... page can be identified and located using the file name and page number. Confidential portions of...

  15. Genetic secrets: Protecting privacy and confidentiality in the genetic era. Final report

    Energy Technology Data Exchange (ETDEWEB)

    Rothstein, M.A. [ed.

    1998-09-01

    Few developments are likely to affect human beings more profoundly in the long run than the discoveries resulting from advances in modern genetics. Although the developments in genetic technology promise to provide many additional benefits, their application to genetic screening poses ethical, social, and legal questions, many of which are rooted in issues of privacy and confidentiality. The ethical, practical, and legal ramifications of these and related questions are explored in depth. The broad range of topics includes: the privacy and confidentiality of genetic information; the challenges to privacy and confidentiality that may be projected to result from the emerging genetic technologies; the role of informed consent in protecting the confidentiality of genetic information in the clinical setting; the potential uses of genetic information by third parties; the implications of changes in the health care delivery system for privacy and confidentiality; relevant national and international developments in public policies, professional standards, and laws; recommendations; and the identification of research needs.

  16. Translation of Financial Statements

    OpenAIRE

    Dalthan Simas; Otavio De Medeiros

    2005-01-01

    This paper has the purpose of surveying and critically analyzing the effects of accounting procedures which are closely related to groups of companies operating multinationally. These are the methods for translation of financial statements, e.g. the Temporal and the Closing- rate Methods, as far as those methods are embodied in accounting standards which have been either recommended or adopted by countries such as the UK and US. We conclude that with regard to changing prices, General Price L...

  17. Python Switch Statement

    Directory of Open Access Journals (Sweden)

    2008-06-01

    Full Text Available The Python programming language does not have a built in switch/case control structure as found in many other high level programming languages. It is thought by some that this is a deficiency in the language, and the control structure should be added. This paper demonstrates that not only is the control structure not needed, but that the methods available in Python are more expressive than built in case statements in other high level languages.

  18. Traveler's Health: Avoid Bug Bites

    Science.gov (United States)

    ... fabric. Avoid Bugs Where You Are Staying Choose hotel rooms or other accommodations that are air conditioned ... to Us Policies FOIA Accessibility Privacy No FEAR Act Inspector General USA.gov Contact CDC Centers for ...

  19. Avoided intersections of nodal lines

    International Nuclear Information System (INIS)

    Monastra, Alejandro G; Smilansky, Uzy; Gnutzmann, Sven

    2003-01-01

    We consider real eigenfunctions of the Schroedinger operator in 2D. The nodal lines of separable systems form a regular grid, and the number of nodal crossings equals the number of nodal domains. In contrast, for wavefunctions of non-integrable systems nodal intersections are rare, and for random waves, the expected number of intersections in any finite area vanishes. However, nodal lines display characteristic avoided crossings which we study in this work. We define a measure for the avoidance range and compute its distribution for the random wave ensemble. We show that the avoidance range distribution of wavefunctions of chaotic systems follows the expected random wave distributions, whereas for wavefunctions of classically integrable but quantum non-separable systems, the distribution is quite different. Thus, the study of the avoidance distribution provides more support to the conjecture that nodal structures of chaotic systems are reproduced by the predictions of the random wave ensemble

  20. Predator avoidance in extremophile fish

    OpenAIRE

    Bierbach, David; Schulte, Matthias; Herrmann, Nina; Zimmer, Claudia; Arias-Rodriguez, Lenin; Indy, Jeane Rimber; Riesch, Rüdiger; Plath, Martin

    2013-01-01

    Extreme habitats are often characterized by reduced predation pressures, thus representing refuges for the inhabiting species. The present study was designed to investigate predator avoidance of extremophile populations of Poecilia mexicana and P. sulphuraria that either live in hydrogen sulfide-rich (sulfidic) springs or cave habitats, both of which are known to have impoverished piscine predator regimes. Focal fishes that inhabited sulfidic springs showed slightly weaker avoidance reactions...

  1. Predator avoidance in extremophile fish.

    Science.gov (United States)

    Bierbach, David; Schulte, Matthias; Herrmann, Nina; Zimmer, Claudia; Arias-Rodriguez, Lenin; Indy, Jeane Rimber; Riesch, Rüdiger; Plath, Martin

    2013-02-06

    Extreme habitats are often characterized by reduced predation pressures, thus representing refuges for the inhabiting species. The present study was designed to investigate predator avoidance of extremophile populations of Poecilia mexicana and P. sulphuraria that either live in hydrogen sulfide-rich (sulfidic) springs or cave habitats, both of which are known to have impoverished piscine predator regimes. Focal fishes that inhabited sulfidic springs showed slightly weaker avoidance reactions when presented with several naturally occurring predatory cichlids, but strongest differences to populations from non-sulfidic habitats were found in a decreased shoaling tendency with non-predatory swordtail (Xiphophorus hellerii) females. When comparing avoidance reactions between P. mexicana from a sulfidic cave (Cueva del Azufre) and the adjacent sulfidic surface creek (El Azufre), we found only slight differences in predator avoidance, but surface fish reacted much more strongly to the non-predatory cichlid Vieja bifasciata. Our third experiment was designed to disentangle learned from innate effects of predator recognition. We compared laboratory-reared (i.e., predator-naïve) and wild-caught (i.e., predator-experienced) individuals of P. mexicana from a non-sulfidic river and found no differences in their reaction towards the presented predators. Overall, our results indicate (1) that predator avoidance is still functional in extremophile Poecilia spp. and (2) that predator recognition and avoidance reactions have a strong genetic basis.

  2. Predator Avoidance in Extremophile Fish

    Directory of Open Access Journals (Sweden)

    Martin Plath

    2013-02-01

    Full Text Available Extreme habitats are often characterized by reduced predation pressures, thus representing refuges for the inhabiting species. The present study was designed to investigate predator avoidance of extremophile populations of Poecilia mexicana and P. sulphuraria that either live in hydrogen sulfide-rich (sulfidic springs or cave habitats, both of which are known to have impoverished piscine predator regimes. Focal fishes that inhabited sulfidic springs showed slightly weaker avoidance reactions when presented with several naturally occurring predatory cichlids, but strongest differences to populations from non-sulfidic habitats were found in a decreased shoaling tendency with non-predatory swordtail (Xiphophorus hellerii females. When comparing avoidance reactions between P. mexicana from a sulfidic cave (Cueva del Azufre and the adjacent sulfidic surface creek (El Azufre, we found only slight differences in predator avoidance, but surface fish reacted much more strongly to the non-predatory cichlid Vieja bifasciata. Our third experiment was designed to disentangle learned from innate effects of predator recognition. We compared laboratory-reared (i.e., predator-naïve and wild-caught (i.e., predator-experienced individuals of P. mexicana from a non-sulfidic river and found no differences in their reaction towards the presented predators. Overall, our results indicate (1 that predator avoidance is still functional in extremophile Poecilia spp. and (2 that predator recognition and avoidance reactions have a strong genetic basis.

  3. Disclosure of past crimes: an analysis of mental health professionals' attitudes towards breaching confidentiality.

    Science.gov (United States)

    Wangmo, Tenzin; Handtke, Violet; Elger, Bernice Simone

    2014-09-01

    Ensuring confidentiality is the cornerstone of trust within the doctor-patient relationship. However, health care providers have an obligation to serve not only their patient's interests but also those of potential victims and society, resulting in circumstances where confidentiality must be breached. This article describes the attitudes of mental health professionals (MHPs) when patients disclose past crimes unknown to the justice system. Twenty-four MHPs working in Swiss prisons were interviewed. They shared their experiences concerning confidentiality practices and attitudes towards breaching confidentiality in prison. Qualitative analysis revealed that MHPs study different factors before deciding whether a past crime should be disclosed, including: (1) the type of therapy the prisoner-patient was seeking (i.e., whether it was court-ordered or voluntary), (2) the type of crime that is revealed (e.g., a serious crime, a crime of a similar nature to the original crime, or a minor crime), and (3) the danger posed by the prisoner-patient. Based on this study's findings, risk assessment of dangerousness was one of the most important factors determining disclosures of past crimes, taking into consideration both the type of therapy and the crime involved. Attitudes of MHPs varied with regard to confidentiality rules and when to breach confidentiality, and there was thus a lack of consensus as to when and whether past crimes should be reported. Hence, legal and ethical requirements concerning confidentiality breaches must be made clear and known to physicians in order to guide them with difficult cases.

  4. Privacy and confidentiality: perspectives of mental health consumers and carers in pharmacy settings.

    Science.gov (United States)

    Hattingh, Hendrika Laetitia; Knox, Kathy; Fejzic, Jasmina; McConnell, Denise; Fowler, Jane L; Mey, Amary; Kelly, Fiona; Wheeler, Amanda J

    2015-02-01

    The study aims to explore within the community pharmacy practice context the views of mental health stakeholders on: (1) current and past experiences of privacy, confidentiality and support; and (2) expectations and needs in relation to privacy and confidentiality. In-depth interviews and focus groups were conducted in three states in Australia, namely Queensland, the northern region of New South Wales and Western Australia, between December 2011 and March 2012. There were 98 participants consisting of consumers and carers (n = 74), health professionals (n = 13) and representatives from consumer organisations (n = 11). Participants highlighted a need for improved staff awareness. Consumers indicated a desire to receive information in a way that respects their privacy and confidentiality, in an appropriate space. Areas identified that require improved protection of privacy and confidentiality during pharmacy interactions were the number of staff having access to sensitive information, workflow models causing information exposure and pharmacies' layout not facilitating private discussions. Challenges experienced by carers created feelings of isolation which could impact on care. This study explored mental health stakeholders' experiences and expectations regarding privacy and confidentiality in the Australian community pharmacy context. A need for better pharmacy staff training about the importance of privacy and confidentiality and strategies to enhance compliance with national pharmacy practice requirements was identified. Findings provided insight into privacy and confidentiality needs and will assist in the development of pharmacy staff training material to better support consumers with sensitive conditions. © 2014 Royal Pharmaceutical Society.

  5. Approach/avoidance in dreams.

    Science.gov (United States)

    Malcolm-Smith, Susan; Koopowitz, Sheri; Pantelis, Eleni; Solms, Mark

    2012-03-01

    The influential threat simulation theory (TST) asserts that dreaming yields adaptive advantage by providing a virtual environment in which threat-avoidance may be safely rehearsed. We have previously found the incidence of biologically threatening dreams to be around 20%, with successful threat avoidance occurring in approximately one-fifth of such dreams. TST asserts that threat avoidance is over-represented relative to other possible dream contents. To begin assessing this issue, we contrasted the incidence of 'avoidance' dreams with that of their opposite: 'approach' dreams. Because TST states that the threat-avoidance function is only fully activated in ecologically valid (biologically threatening) contexts, we also performed this contrast for populations living in both high- and low-threat environments. We find that 'approach' dreams are significantly more prevalent across both contexts. We suggest these results are more consistent with the view that dreaming is generated by reward-seeking systems than by fear-conditioning systems, although reward-seeking is clearly not the only factor determining the content of dreams. Copyright © 2011 Elsevier Inc. All rights reserved.

  6. European Respiratory Society statement

    DEFF Research Database (Denmark)

    Miravitlles, Marc; Dirksen, Asger; Ferrarotti, Ilaria

    2017-01-01

    lung disease. A large proportion of individuals affected remain undiagnosed and therefore without access to appropriate care and treatment.The most recent international statement on AATD was published by the American Thoracic Society and the European Respiratory Society in 2003. Since then there has...... the efficacy and safety of augmentation therapy, the only specific treatment available for the pulmonary disease associated with AATD.As AATD is a rare disease, it is crucial to organise national and international registries and collect information prospectively about the natural history of the disease...

  7. 7 CFR 1212.51 - Financial statements.

    Science.gov (United States)

    2010-01-01

    ... statements. (a) The Board shall prepare and submit financial statements to the Department on a periodic basis. Each such financial statement shall include, but not be limited to, a balance sheet, income statement... 7 Agriculture 10 2010-01-01 2010-01-01 false Financial statements. 1212.51 Section 1212.51...

  8. 1987 Statement on Software Copyright: An ICCE Policy Statement.

    Science.gov (United States)

    Computing Teacher, 1987

    1987-01-01

    Building on the 1983 policy statement developed by the International Council for Computers in Education (ICCE), this statement recommends the adoption of a school district copyright policy, adoption of the suggested software use guidelines, and use of the copyright page of software documentation to ascertain user's rights, obligations, and licence…

  9. 37 CFR 201.29 - Access to, and confidentiality of, Statements of Account, Verification Auditor's Reports, and...

    Science.gov (United States)

    2010-07-01

    ... 37 Patents, Trademarks, and Copyrights 1 2010-07-01 2010-07-01 false Access to, and... Patents, Trademarks, and Copyrights COPYRIGHT OFFICE, LIBRARY OF CONGRESS COPYRIGHT OFFICE AND PROCEDURES... Form.” The requestor must submit a copy of the completed DART Access Form to the Licensing Specialist...

  10. Avoidance: grammatical or semantic causes?

    NARCIS (Netherlands)

    Hulstijn, J.H.; Marchena, E.

    1989-01-01

    This article follows up on a study by Dagut and Laufer (1985), who found that Hebrew learners of English avoid phrasal verbs, such as ‘let down’, while preferring one-word verbs, such as ‘;disappoint’, since phrasal verbs do not exist in Hebrew. A corollary derived from Dagut and Laufer's study is

  11. How to avoid sedation complications

    African Journals Online (AJOL)

    To ensure patient safety, it is crucial that the airway is safeguarded. The single most important responsibility is to protect it. An unobstructed airway, with intact protective reflexes and respiratory drive, is essential to avoid complications. In some procedures, e.g. dental, the airway may need to be shared with the surgeon.

  12. Avoiding plagiarism in academic writing.

    Science.gov (United States)

    Anderson, Irene

    Plagiarism means taking the work of another and presenting it as one's own, resulting in potential upset for the original author and disrepute for the professions involved. This article aims to explore the issue of plagiarism and some mechanisms for detection and avoidance.

  13. Avoiding unfavourable outcomes in liposuction

    Directory of Open Access Journals (Sweden)

    Atul Khanna

    2013-01-01

    Full Text Available The origin of liposuction can be traced to an adverse event by Dujarrier in 1921 when he used a uterine curette to remove fat from the knees of a ballerina ending in an amputation secondary to damage of the femoral artery. The history of liposuction since then has been one of avoiding complications and optimising outcome. After this adverse event, liposuction was abandoned until the 1960′s when Schrudde revived the practice using small stab incisions and sharp curettage with the secondary suction to aspirate the freed tissue. This technique was associated with a high incidence of complications especially seroma and skin necrosis. Illouz then replaced the curette with a blunt cannula connected to vacuum pump thus avoiding the complications of a sharp curette. Despite the presence of various techniques for liposuction, suction assisted liposuction (SAL is still the standard technique of liposuction. This article aims to discuss literature regarding the various aspects of liposuction (SAL and to highlight the salient points in the literature and in the senior author′s experience in order to avoid unfavourable outcomes in liposuction. A literature review on avoiding complication is in liposuction including some of the seminal papers on liposuction. Liposuction is generally a safe procedure with reproducible outcome. Just like any surgical procedure it should be treated with the utmost care. Illouz published 10 commandments for liposuction in 1989 and we review these commandments to demonstrate how liposuction has evolved.

  14. Confidentiality Enhancement of Highly Sensitive Nuclear Data Using Steganography with Chaotic Encryption over OFDM Channel

    International Nuclear Information System (INIS)

    Mahmoud, S.; Ayad, N.; Elsayed, F.; Elbendary, M.

    2016-01-01

    Full text: Due to the widespread usage of the internet and other wired and wireless communication methods, the security of the transmitted data has become a major requirement. Nuclear knowledge is mainly built upon the exchange of nuclear information which is considered highly sensitive information, so its security has to be enhanced by using high level security mechanisms. Data confidentiality is concerned with the achievement of higher protection for confidential information from unauthorized disclosure or access. Cryptography and steganography are famous and widely used techniques that process information in order to achieve its confidentiality, but sometimes, when used individually, they don’t satisfy a required level of security for highly sensitive data. In this paper, cryptography is accompanied with steganography for constituting a multilayer security techniques that can strengthen the level of security of highly confidential nuclear data that are archived or transmitted through different channel types and noise conditions. (author)

  15. 19 CFR 206.47 - Limited disclosure of certain confidential business information under administrative protective...

    Science.gov (United States)

    2010-04-01

    ... business information under administrative protective order. 206.47 Section 206.47 Customs Duties UNITED STATES INTERNATIONAL TRADE COMMISSION NONADJUDICATIVE INVESTIGATIONS INVESTIGATIONS RELATING TO GLOBAL... Trade Act, the Secretary shall make confidential business information available to authorized applicants...

  16. Confidentiality and parental involvement in adolescent sexual and reproductive health care

    DEFF Research Database (Denmark)

    Jaruseviciene, Lina; Lazarus, Jeff; Zaborskis, Apolinaras

    2011-01-01

    AIM: We surveyed Lithuanian general practitioners' (GPs) views on the importance of confidentiality for adolescents and on their practices in informing parents about sexual and reproductive health consultations with this age group. METHODS: In this cross-sectional study, a 41-item questionnaire...... was sent to a random sample of 607 Lithuanian GPs. The purpose of this questionnaire was to gain knowledge about current practices of GPs in informing parents on the importance of confidentiality as well as in protecting the privacy of minors. GPs' knowledge of the current legal age limit...... of confidentiality protection in patient-provider settings was also assessed. RESULTS: Although 67.5% of the responding GPs (response rate 73.5%) stated that they inform the parents or guardians of adolescent patients about the importance of confidentiality, 82.9% of them only did so if the opportunity arose. When...

  17. 21 CFR 822.23 - Is the information in my submission considered confidential?

    Science.gov (United States)

    2010-04-01

    ... with the Freedom of Information Act. We will continue to protect trade secret and confidential... patients. You may wish to indicate in your submission which information you consider trade secret or...

  18. Confidentiality Protections for Adolescents and Young Adults in the Health Care Billing and Insurance Claims Process.

    Science.gov (United States)

    2016-03-01

    The importance of protecting confidential health care for adolescents and young adults is well documented. State and federal confidentiality protections exist for both minors and young adults, although the laws vary among states, particularly for minors. However, such confidentiality is potentially violated by billing practices and in the processing of health insurance claims. To address this problem, policies and procedures should be established so that health care billing and insurance claims processes do not impede the ability of providers to deliver essential health care services on a confidential basis to adolescents and young adults covered as dependents on a family's health insurance plan. Copyright © 2016 Society for Adolescent Health and Medicine. Published by Elsevier Inc. All rights reserved.

  19. Confidential close call reporting system (C3RS) lessons learned team baseline phase report.

    Science.gov (United States)

    2015-05-01

    The Federal Railroad Administration (FRA) has established a program called the Confidential Close Call Reporting System : (C3 : RS), which allows events to be reported anonymously and dealt with non-punitively and without fear or reprisal through : s...

  20. Confidential close call reporting system (C3RS) lessons learned team baseline phased report

    Science.gov (United States)

    2015-05-08

    The Federal Railroad Administration (FRA) has established a program called the Confidential Close Call Reporting System : (C3RS), which allows events to be reported anonymously and dealt with non-punitively and without fear or reprisal through : stru...

  1. Developing an effective corrective action process : lessons learned from operating a confidential close call reporting system

    Science.gov (United States)

    2013-03-05

    In 2007, the Federal Railroad Administration (FRA) launched : C3RS, the Confidential Close Call Reporting System, as a : demonstration project to learn how to facilitate the effective : reporting and implementation of corrective actions, and assess t...

  2. 76 FR 77224 - Access to Confidential Business Information by Primus Solutions, Inc.

    Science.gov (United States)

    2011-12-12

    ... From the Federal Register Online via the Government Publishing Office ENVIRONMENTAL PROTECTION AGENCY Access to Confidential Business Information by Primus Solutions, Inc. AGENCY: Environmental Protection Agency (EPA). ACTION: Notice. SUMMARY: EPA has authorized its contractor, Primus Solutions, Inc...

  3. 75 FR 78238 - Access to Confidential Business Information by Science Applications International Corporation and...

    Science.gov (United States)

    2010-12-15

    ... Business Information by Science Applications International Corporation and Its Identified Subcontractors..., Science Applications International Corporation (SAIC) of San Diego, CA, and Its Identified Subcontractors... Control Act (TSCA). Some of the information may be claimed or determined to be Confidential Business...

  4. Design and realization of confidential data management system RFID-based

    Science.gov (United States)

    Huang, Wei; Wang, Zhong; Wang, Xin

    2017-03-01

    This paper introduces the composition of RFID system, and then analyzes the hardware design and software design systems, and finally summarizes the realization and application of the confidential data management system RFID-based.

  5. 75 FR 56096 - Access to Confidential Business Information by Industrial Economics Incorporated

    Science.gov (United States)

    2010-09-15

    ... ENVIRONMENTAL PROTECTION AGENCY [EPA-HQ-OPPT-2003-0004; FRL-8845-1] Access to Confidential Business Information by Industrial Economics Incorporated AGENCY: Environmental Protection Agency (EPA). ACTION: Notice. SUMMARY: EPA has authorized contractor, Industrial Economics Incorporated (IEI) of...

  6. Usage of internal statements in making consolidated financial statement

    Directory of Open Access Journals (Sweden)

    V.N. Herman

    2016-12-01

    Full Text Available The emergence of the consolidated financial statements is the result of integration processes in the businesses that lead to pooling of different companies. As consolidated financial statements present an aggregated look at the financial position of a parent and its subsidiaries, they let you gauge the overall health of an entire group of companies as opposed to one company’s standalone position. Consolidation of financial statements requires from the participants of joining elaborating their individual statements. The article describes the general scheme of consolidation process and defines the key trends of consolidation adjustments, in particular, financial investments, internal operations, goodwill and exchange rate differences. It is found out that to get information about internal operations and financial investments such data have to be synthesized from internal statements. This approach allows using the same accounting methods to parent and subsidiary entities. The objects, the users and the subject domain of internal statements are determined in order to make consolidation of financial statements of joining.

  7. THE POSSIBLE CONFIDENTIALITY: THE PUBLIC ADMINISTRATION AS PARTY IN THE ALTERNATIVE DISPUTE RESOLUTION MECHANISM

    Directory of Open Access Journals (Sweden)

    Carlos Alberto de Salles

    2017-05-01

    Full Text Available This article debates the tension that exists between confidentiality, usual in ADRs, and the publicity principle, that rules the Public Administration in Brazil. As a solution points that the parameter of confidentiality when Public Administration is a party must be the preservation of accountability of the involved agencies, what means, the capacity to answer to its own goals and to obey the public control.

  8. Nursing Students' Perceptions of Confidentiality, Accountability, and E-Professionalism in Relation to Facebook.

    Science.gov (United States)

    Barnable, Alexia; Cunning, Glenda; Parcon, Mariel

    This study examined nursing students' perceptions of confidentiality, accountability, and e-professionalism in relation to Facebook. All of the students were aware that posting patients' names and pictures of patients constituted a confidentiality breach. When comparing students based on educational status, there were differing opinions on whether employers should use Facebook profile information for hiring decisions. Nursing programs should provide current education, including clear and up-to-date policies, about social media use.

  9. Statement on virginity testing.

    Science.gov (United States)

    2015-07-01

    Virginity testing (virginity examination) is a gynecological examination that is intended to correlate the status and appearance of the hymen with previous sexual contact to determine whether a female has had or is habituated to sexual intercourse. Virginity examinations are practiced in many countries, often forcibly, including in detention places; on women who allege rape or are accused of prostitution; and as part of public or social policies to control sexuality. The Independent Forensic Expert Group (IFEG) - thirty-five preeminent independent forensic experts from eighteen countries specialized in evaluating and documenting the physical and psychological effects of torture and ill-treatment - released a statement on the practice in December 2014. In its statement, the IFEG outlines the physical and psychological effects of forcibly conducting virginity examinations on females based on its collective experience. The Group assesses whether, based on the effects, forcibly conducted virginity examinations constitute cruel, inhuman, or degrading treatment or torture. Finally, the IFEG addresses the medical interpretation, relevance, and ethical implications of such examinations. The IFEG concludes that virginity examinations are medically unreliable and have no clinical or scientific value. These examinations are inherently discriminatory and, in almost all instances, when conducted forcibly, result in significant physical and mental pain and suffering, thereby constituting cruel, inhuman and degrading treatment or torture. When virginity examinations are forcibly conducted and involve vaginal penetration, the examination should be considered as sexual assault and rape. Involvement of health professionals in these examinations violates the basic standards and ethics of the professions. Copyright © 2015 Torture. Published by Elsevier Ltd.. All rights reserved.

  10. Human avoidance and approach learning: evidence for overlapping neural systems and experiential avoidance modulation of avoidance neurocircuitry.

    Science.gov (United States)

    Schlund, Michael W; Magee, Sandy; Hudgins, Caleb D

    2011-12-01

    Adaptive functioning is thought to reflect a balance between approach and avoidance neural systems with imbalances often producing pathological forms of avoidance. Yet little evidence is available in healthy adults demonstrating a balance between approach and avoidance neural systems and modulation in avoidance neurocircuitry by vulnerability factors for avoidance. Consequently, we used functional magnetic resonance imaging (fMRI) to compare changes in brain activation associated with human avoidance and approach learning and modulation of avoidance neurocircuitry by experiential avoidance. fMRI tracked trial-by-trial increases in activation while adults learned through trial and error an avoidance response that prevented money loss and an approach response that produced money gain. Avoidance and approach cues elicited similar experience-dependent increases in activation in a fronto-limbic-striatal network. Positive and negative reinforcing outcomes (i.e., money gain and avoidance of loss) also elicited similar increases in activation in frontal and striatal regions. Finally, increased experiential avoidance and self-punishment coping was associated with decreased activation in medial/superior frontal regions, anterior cingulate, amygdala and hippocampus. These findings suggest avoidance and approach learning recruit a similar fronto-limbic-striatal network in healthy adults. Increased experiential avoidance also appears to be associated with reduced frontal and limbic reactivity in avoidance, establishing an important link between maladaptive avoidance coping and altered responses in avoidance neurocircuitry. Copyright © 2011 Elsevier B.V. All rights reserved.

  11. When security and medicine missions conflict: confidentiality in prison settings.

    Science.gov (United States)

    Allen, Scott A; Aburabi, Raed

    2016-06-13

    Purpose - It is a simple fact that prisons cannot exist - practically, legally, ethically or morally - without the support of physicians and other health professionals. Access to adequate healthcare is one of the fundamental measures of the legitimacy of a jail or prison. At the same time, there is a fundamental tension in the missions of the prison and doctor. The primary mission of the prison is security and often punishment. Reform and rehabilitation have intermittently been stated goals of prisons in the last century, but in practice those humane goals have rarely governed prison administrative culture. The primary mission of the physician is to promote the health and welfare of his or her patient. The paper aims to discuss these issues. Design/methodology/approach - At times, what is required to serve the patient's best interest is at odds with the interests of security. Much of the work of the prison physician does not conflict with the operation of security. Indeed, much of the work of the prison physician is allowed to proceed without much interference from the security regime. But given the fundamental discord in the legitimate missions of security vs medicine, conflict between the doctor and the warden is inevitable. Findings - In this paper, the authors consider the example of patient confidentiality to illustrate this conflict, using case examples inspired by real cases from the experience of the authors. Originality/value - The authors provide an ethical and practical framework for health professionals to employ when confronting these inevitable conflicts in correctional settings.

  12. Confidentiality Protection of Digital Health Records in Cloud Computing.

    Science.gov (United States)

    Chen, Shyh-Wei; Chiang, Dai Lun; Liu, Chia-Hui; Chen, Tzer-Shyong; Lai, Feipei; Wang, Huihui; Wei, Wei

    2016-05-01

    Electronic medical records containing confidential information were uploaded to the cloud. The cloud allows medical crews to access and manage the data and integration of medical records easily. This data system provides relevant information to medical personnel and facilitates and improve electronic medical record management and data transmission. A structure of cloud-based and patient-centered personal health record (PHR) is proposed in this study. This technique helps patients to manage their health information, such as appointment date with doctor, health reports, and a completed understanding of their own health conditions. It will create patients a positive attitudes to maintain the health. The patients make decision on their own for those whom has access to their records over a specific span of time specified by the patients. Storing data in the cloud environment can reduce costs and enhance the share of information, but the potential threat of information security should be taken into consideration. This study is proposing the cloud-based secure transmission mechanism is suitable for multiple users (like nurse aides, patients, and family members).

  13. Assessment of Geographic Information Systems and Data Confidentiality Guidelines in STD Programs.

    Science.gov (United States)

    Bissette, Jennifer M; Stover, Jeffrey A; Newman, Lori M; Delcher, Philip Christopher; Bernstein, Kyle T; Matthews, Lindsey

    2009-01-01

    Advancements in technology, such as geographic information systems (GIS), expand sexually transmitted disease (STD) program capacity for data analysis and visualization, and introduce additional confidentiality considerations. We developed a survey to examine GIS use among STD programs and to better understand existing data confidentiality practices. A Web-based survey of eight to 22 questions, depending on program-specific GIS capacity, was e-mailed to all STD program directors through the National Coalition of STD Directors in November 2004. Survey responses were accepted until April 15, 2005. Eighty-five percent of the 65 currently funded STD programs responded to the survey. Of those, 58% used GIS and 54% used geocoding. STD programs that did not use GIS (42%) identified lack of training and insufficient staff as primary barriers. Mapping, spatial analyses, and targeting program interventions were the main reasons for geocoding data. Nineteen of the 25 programs that responded to questions related to statistical disclosure rules employed a numerator rule, and 56% of those used a variation of the "Rule of 5." Of the 28 programs that responded to questions pertaining to confidentiality guidelines, 82% addressed confidentiality of GIS data informally. Survey findings showed the increasing use of GIS and highlighted the struggles STD programs face in employing GIS and protecting confidentiality. Guidance related to data confidentiality and additional access to GIS software and training could assist programs in optimizing use of spatial data.

  14. Avoidant personality disorder: current insights

    Directory of Open Access Journals (Sweden)

    Lampe L

    2018-03-01

    Full Text Available Lisa Lampe,1 Gin S Malhi2 1Discipline of Psychiatry, University of Newcastle, Newcastle, NSW, Australia; 2Discipline of Psychiatry, University of Sydney, Sydney, NSW, Australia Abstract: Avoidant personality disorder (AVPD is a relatively common disorder that is associated with significant distress, impairment, and disability. It is a chronic disorder with an early age at onset and a lifelong impact. Yet it is underrecognized and poorly studied. Little is known regarding the most effective treatment. The impetus for research into this condition has waxed and waned, possibly due to concerns regarding its distinctiveness from other disorders, especially social anxiety disorder (SAD, schizoid personality disorder, and dependent personality disorder. The prevailing paradigm subscribes to the “severity continuum hypothesis”, in which AVPD is viewed essentially as a severe variant of SAD. However, areas of discontinuity have been described, and there is support for retaining AVPD as a distinct diagnostic category. Recent research has focused on the phenomenology of AVPD, factors of possible etiological significance such as early parenting experiences, attachment style, temperament, and cognitive processing. Self-concept, avoidant behavior, early attachments, and attachment style may represent points of difference from SAD that also have relevance to treatment. Additional areas of research not focused specifically on AVPD, including the literature on social cognition as it relates to attachment and personality style, report findings that are promising for future research aimed at better delineating AVPD and informing treatment. Keywords: avoidant personality disorder, social anxiety disorder, social cognition, psychotherapy, attachment

  15. Behavioral variability as avoidance behavior.

    Science.gov (United States)

    Fonseca Júnior, Amilcar Rodrigues; Leite Hunziker, Maria Helena

    2017-11-01

    This study aimed to investigate whether variable patterns of responses can be acquired and maintained by negative reinforcement under an avoidance contingency. Six male Wistar rats were exposed to sessions in which behavioral variability was reinforced according to a Lag contingency: Sequences of three responses on two levers had to differ from one, two or three previous sequences for shocks to be avoided (Lag 1, Lag 2 and Lag 3, respectively). Performance under the Lag conditions was compared with performance on a Yoke condition in which the animals received the same reinforcement frequency and distribution as in the Lag condition but behavioral variability was not required. The results showed that most of the subjects varied their sequences under the Lag contingencies, avoiding shocks with relatively high probability (≥ 0.7). Under the Yoke procedure, responding continued to occur with high probability, but the behavioral variability decreased. These results suggest that behavioral variability can be negatively reinforced. © 2017 Society for the Experimental Analysis of Behavior.

  16. Avoiding congestion in recommender systems

    Science.gov (United States)

    Ren, Xiaolong; Lü, Linyuan; Liu, Runran; Zhang, Jianlin

    2014-06-01

    Recommender systems use the historical activities and personal profiles of users to uncover their preferences and recommend objects. Most of the previous methods are based on objects’ (and/or users’) similarity rather than on their difference. Such approaches are subject to a high risk of increasingly exposing users to a narrowing band of popular objects. As a result, a few objects may be recommended to an enormous number of users, resulting in the problem of recommendation congestion, which is to be avoided, especially when the recommended objects are limited resources. In order to quantitatively measure a recommendation algorithm's ability to avoid congestion, we proposed a new metric inspired by the Gini index, which is used to measure the inequality of the individual wealth distribution in an economy. Besides this, a new recommendation method called directed weighted conduction (DWC) was developed by considering the heat conduction process on a user-object bipartite network with different thermal conductivities. Experimental results obtained for three benchmark data sets showed that the DWC algorithm can effectively avoid system congestion, and greatly improve the novelty and diversity, while retaining relatively high accuracy, in comparison with the state-of-the-art methods.

  17. Avoiding congestion in recommender systems

    International Nuclear Information System (INIS)

    Ren, Xiaolong; Lü, Linyuan; Liu, Runran; Zhang, Jianlin

    2014-01-01

    Recommender systems use the historical activities and personal profiles of users to uncover their preferences and recommend objects. Most of the previous methods are based on objects’ (and/or users’) similarity rather than on their difference. Such approaches are subject to a high risk of increasingly exposing users to a narrowing band of popular objects. As a result, a few objects may be recommended to an enormous number of users, resulting in the problem of recommendation congestion, which is to be avoided, especially when the recommended objects are limited resources. In order to quantitatively measure a recommendation algorithm's ability to avoid congestion, we proposed a new metric inspired by the Gini index, which is used to measure the inequality of the individual wealth distribution in an economy. Besides this, a new recommendation method called directed weighted conduction (DWC) was developed by considering the heat conduction process on a user–object bipartite network with different thermal conductivities. Experimental results obtained for three benchmark data sets showed that the DWC algorithm can effectively avoid system congestion, and greatly improve the novelty and diversity, while retaining relatively high accuracy, in comparison with the state-of-the-art methods. (paper)

  18. Childhood obesity case statement.

    Science.gov (United States)

    Esposito, Paul W; Caskey, Paul; Heaton, Lisa E; Otsuka, Norman

    2013-04-01

    The goal of this publication is to raise awareness of the impact of childhood obesity on the musculoskeletal health of children and its potential long-term implications. Relevant articles dealing with musculoskeletal disorders either caused by or worsened by childhood obesity were reviewed through a Pub Med search. Efforts to recognize and combat the childhood obesity epidemic were also identified through Internet search engines. This case statement was then reviewed by the members of the pediatric specialty group of the US Bone and Joint Initiative, which represents an extensive number of organizations dealing with musculoskeletal health. Multiple musculoskeletal disorders are clearly caused by or worsened by childhood obesity. The review of the literature clearly demonstrates the increased frequency and severity of many childhood musculoskeletal disorders. Concerns about the long-term implications of these childhood onset disorders such as pain and degenerative changes into adulthood are clearly recognized by all the member organizations of the US Bone and Joint Initiative. It is imperative to recognize the long-term implications of musculoskeletal disorders caused by or worsened by childhood obesity. It is also important to recognize that the ability to exercise comfortably is a key factor to developing a healthy lifestyle and maintaining a healthy body weight. Efforts to develop reasonable and acceptable programs to increase physical activity by all facets of society should be supported. Further research into the long-term implications of childhood musculoskeletal disorders related to childhood obesity is necessary. Copyright © 2013 Elsevier Inc. All rights reserved.

  19. 3 CFR - Presidential Signing Statements

    Science.gov (United States)

    2010-01-01

    ... basis of policy disagreements. At the same time, such signing statements serve a legitimate function in... interpretations of the Constitution that are well-founded. 3. To promote transparency and accountability, I will...

  20. Basic statements of relativity theory

    Directory of Open Access Journals (Sweden)

    Wolfgang Muschik

    2010-04-01

    Full Text Available Some basic statements of relativity theory, starting out with geometry and observers up to Einstein's field equations, are collected in a systematical order without any proof, to serve as a short survey of tools and results.

  1. Environmental Impact Statement Filing Guidance

    Science.gov (United States)

    Describes how to submit an environmental impact statement through the e-NEPA electronic submission system. Describes how EPA submits a notice of availability in to the Federal Register and how the comment time period if set forth.

  2. Writing Your UCAS Personal Statement.

    OpenAIRE

    Parkinson, Tess

    2010-01-01

    The personal statement on the UCAS form is your best opportunity to "sell" yourself to the universities of your choice. Here, Tess Parkinson, a psychology admissions tutor, gives inside advice on how to approach what may seem a daunting task.

  3. THE PRINCIPLE OF CONFIDENTIALITY IN ARBITRATION. APPLICATION AND LIMITATIONS OF THE PRINCIPLE

    Directory of Open Access Journals (Sweden)

    Bazil Oglindă

    2015-11-01

    Full Text Available Over the years, arbitration has grown to be the preferred means of dispute resolution by commercial entities. One of the benefits that build the attraction for this system of dispute resolution was the principle of confidentiality. One issue that needs to be analyzed is about the reasons why confidentiality is so important in business. Confidentiality is a principle largely embraced in arbitration, but, as we will see, the principle is not an absolute one. There are a set of questions that needs to be answer to, like: Who is bound by the duty of confidentiality? Does this refer only to the parties or does it expands to other actors involved in the arbitral proceedings? What happens with the obligation of confidentiality when issues are brought before a court, taking in account the principle of open justice? We will see that in some countries are procedural laws allowing the courts to order an arbitration claim to be heard in public or in private. Another important aspect that has arisen in the last period is regarding the public policy and the protection of public interest as a limitation to confidentiality of arbitration. This is a sensitive matter especially when one of the parties is a state or a state entity. This study aims to explore the principle of confidentiality in arbitration by focusing on its domain and on its limits, both from the comparative approach and from the Romanian approach. Knowing all this aspects, we will realize the importance of having professional counseling when drafting an arbitration clause and how this can be the missing puzzle piece of your business.

  4. GASB Statement No. 3 Guides Deposits, Investments.

    Science.gov (United States)

    Barker, Linda A.

    1986-01-01

    Discusses an April 1986 Governmental Accounting Standards Board statement concerning disclosures of repurchase and reverse repurchase agreements. The statement tries to help financial statement users assess the risks a goverment entity takes when investing public funds. It is effective for financial statement periods ending after December 15,…

  5. It's Time to Implement GASB Statement 54

    Science.gov (United States)

    Heinfeld, Gary; Nuehring, Bert

    2012-01-01

    In February 2009, the Governmental Accounting Standards Board (GASB) issued Statement No. 54, "Find Balance Reporting and Governmental Fund Type Definitions." This statement changes how a fund balance is classified on the face of the government fund financial statements and refines the definitions for government fund types. The statement's…

  6. 29 CFR 99.310 - Financial statements.

    Science.gov (United States)

    2010-07-01

    ....310 Financial statements. (a) Financial statements. The auditee shall prepare financial statements that reflect its financial position, results of operations or changes in net assets, and, where... 29 Labor 1 2010-07-01 2010-07-01 true Financial statements. 99.310 Section 99.310 Labor Office of...

  7. Brane singularities and their avoidance

    International Nuclear Information System (INIS)

    Antoniadis, Ignatios; Cotsakis, Spiros; Klaoudatou, Ifigeneia

    2010-01-01

    The singularity structure and the corresponding asymptotic behavior of a 3-brane coupled to a scalar field or to a perfect fluid in a five-dimensional bulk is analyzed in full generality using the method of asymptotic splittings. In the case of the scalar field, it is shown that the collapse singularity at a finite distance from the brane can be avoided only at the expense of making the brane world-volume positively or negatively curved. In the case where the bulk field content is parametrized by an analog of perfect fluid with an arbitrary equation of state P = γρ between the 'pressure' P and the 'density' ρ, our results depend crucially on the constant fluid parameter γ. (i) For γ > -1/2, the flat brane solution suffers from a collapse singularity at a finite distance that disappears in the curved case. (ii) For γ < -1, the singularity cannot be avoided and it becomes of the big rip type for a flat brane. (iii) For -1 < γ ≤ -1/2, the surprising result is found that while the curved brane solution is singular, the flat brane is not, opening the possibility for a revival of the self-tuning proposal.

  8. When not to avoid inbreeding.

    Science.gov (United States)

    Kokko, Hanna; Ots, Indrek

    2006-03-01

    Avoidance of incestuous matings is widely reported across many animal taxa, and the adaptive value of such behavior is explained through inbreeding depression. However, an old and somewhat neglected theoretical result predicts that inbred matings offer another, positive effect on the inclusive fitness of parents: an individual who mates with a relative will help that relative to spread genes identical by descent. This benefit can be substantial, if the additional mating achieved by the relative does not harm his mating success otherwise, and in the context of selfing in plants the phenomenon is well known. Here, we develop a model that derives expected values of inbreeding tolerance, that is, the magnitude of inbreeding depression that is required to make individuals avoid inbreeding, for different animal life histories and parental investment patterns. We also distinguish between simultaneous and sequential mate choice, and show that inbreeding tolerance should often be remarkably high in the latter scenario in particular, although egalitarian parental care will lead to lower tolerance. There is a mismatch between theory and data: the almost complete lack of cases where individuals prefer to mate incestuously is at odds with a large overlap between the predicted range of inbreeding tolerance and estimates of inbreeding depression found in nature. We discuss four different solutions to this enigma, and suggest that inbreeding tolerance, where it is found, should not always be attributed to a simple constraint that has prevented finding any other mate.

  9. Avoidant personality disorder: current insights.

    Science.gov (United States)

    Lampe, Lisa; Malhi, Gin S

    2018-01-01

    Avoidant personality disorder (AVPD) is a relatively common disorder that is associated with significant distress, impairment, and disability. It is a chronic disorder with an early age at onset and a lifelong impact. Yet it is underrecognized and poorly studied. Little is known regarding the most effective treatment. The impetus for research into this condition has waxed and waned, possibly due to concerns regarding its distinctiveness from other disorders, especially social anxiety disorder (SAD), schizoid personality disorder, and dependent personality disorder. The prevailing paradigm subscribes to the "severity continuum hypothesis", in which AVPD is viewed essentially as a severe variant of SAD. However, areas of discontinuity have been described, and there is support for retaining AVPD as a distinct diagnostic category. Recent research has focused on the phenomenology of AVPD, factors of possible etiological significance such as early parenting experiences, attachment style, temperament, and cognitive processing. Self-concept, avoidant behavior, early attachments, and attachment style may represent points of difference from SAD that also have relevance to treatment. Additional areas of research not focused specifically on AVPD, including the literature on social cognition as it relates to attachment and personality style, report findings that are promising for future research aimed at better delineating AVPD and informing treatment.

  10. Blue light regulated shade avoidance.

    Science.gov (United States)

    Keuskamp, Diederik H; Keller, Mercedes M; Ballaré, Carlos L; Pierik, Ronald

    2012-04-01

    Most plants grow in dense vegetation with the risk of being out-competed by neighboring plants. These neighbors can be detected not only through the depletion in light quantity that they cause, but also through the change in light quality, which plants perceive using specific photoreceptors. Both the reduction of the red:far-red ratio and the depletion of blue light are signals that induce a set of phenotypic traits, such as shoot elongation and leaf hyponasty, which increase the likelihood of light capture in dense plant stands. This set of phenotypic responses are part of the so called shade avoidance syndrome (SAS). This addendum discusses recent findings on the regulation of the SAS of Arabidopsis thaliana upon blue light depletion. Keller et al. and Keuskamp et al. show that the low blue light attenuation induced shade avoidance response of seedling and rosette-stage A. thaliana plants differ in their hormonal regulation. These studies also show there is a regulatory overlap with the R:FR-regulated SAS.

  11. Avoidant personality disorder: current insights

    Science.gov (United States)

    Lampe, Lisa; Malhi, Gin S

    2018-01-01

    Avoidant personality disorder (AVPD) is a relatively common disorder that is associated with significant distress, impairment, and disability. It is a chronic disorder with an early age at onset and a lifelong impact. Yet it is underrecognized and poorly studied. Little is known regarding the most effective treatment. The impetus for research into this condition has waxed and waned, possibly due to concerns regarding its distinctiveness from other disorders, especially social anxiety disorder (SAD), schizoid personality disorder, and dependent personality disorder. The prevailing paradigm subscribes to the “severity continuum hypothesis”, in which AVPD is viewed essentially as a severe variant of SAD. However, areas of discontinuity have been described, and there is support for retaining AVPD as a distinct diagnostic category. Recent research has focused on the phenomenology of AVPD, factors of possible etiological significance such as early parenting experiences, attachment style, temperament, and cognitive processing. Self-concept, avoidant behavior, early attachments, and attachment style may represent points of difference from SAD that also have relevance to treatment. Additional areas of research not focused specifically on AVPD, including the literature on social cognition as it relates to attachment and personality style, report findings that are promising for future research aimed at better delineating AVPD and informing treatment. PMID:29563846

  12. Hinkley Point 'C': a summary of the Environmental Statement

    International Nuclear Information System (INIS)

    1987-08-01

    The Environmental Statement describes the potentially significant environmental effects of the proposed pressurized water reactor station at Hinkley Point in Somerset, and the ways in which the Central Electricity Generating Board (CEGB) intends to avoid, reduce or remedy these effects. It also explains the CEGB's reasons for proposing a PWR at Hinkley Point. The Environmental Statement has been produced to inform local authorities, the public and the Secretary of State for Energy about the CEGB's proposals. The Secretary of State has to decide whether or not consent for construction of Hinkley Point 'C' power station should be given, and in reaching that decision has to consider, amongst other matters, the environmental effects of the project. This summary and the Environmental Statement also describe the CEGB's plans for developing Hinkley Point 'C. Some details are yet to be finalised and may be subject to change, but this will not affect the overall validity of the environmental analysis given in these documents. Greater detail can be found in the full Environmental Statement. (author)

  13. IPPF statement on infertility.

    Science.gov (United States)

    1984-12-01

    The policy statement on infertility issued by the International Medical Advisory Panel of the International Planned Parenthood Federation (IPPF) and adopted by the Central Council of the IPPF in November, 1984, is provided. The IPPF recognizes that subinfertility and infertility is a part of family planning and provides suggestions for how Family Planning Associations (FPAs) can provide supportive assistance in this area of concern. Depending on the facilities and resources available at specific clinics, FPS can provide preventive, counseling, diagnostic, treatment, and referral services. FPAs can play a major role in prevention. Many conditions which cause infertility are preventable, and these include sexually transmitted diseases, infections stemming from abortion and childbirth, and possibly tuberculosis. IUDs increase the risk of pelvic inflammatory disease and may increase the risk of infertility; however, a direct relationship between IUDs and infertility has not been established. Injectable contraceptives may delay the return of fertility but do not lead to permanent infertility. Barrier methods protect againsr sexually transmitted diseases, and oral contraceptives may provide protection from pelvic inflammatory disease. FPAs should be familiar with the major causes of infertility in their region and adopt an advocacy role by promoting community programs to control sexually transmitted diseases which may play a role in infertility, to improve obstetric care, to increase access to reproductive health services, and to provide reproductive educational services for adolescents. FPAs can work in cooporation with other agencies concerned with infertility prevention and management. FPAs can play a direct role by educating their clients about infertility prevention. Most FPAs do have have the facilities and personnel to provide diagnostic and treatment services, but they can provide referral services. They should establish a link with centers which are fully

  14. Navigating ethics of physician-patient confidentiality: a communication privacy management analysis.

    Science.gov (United States)

    Petronio, Sandra; Dicorcia, Mark J; Duggan, Ashley

    2012-01-01

    The ethics of physician-patient confidentiality is often fraught with contradictions. Privacy boundaries are not always clear, and patients can leave an interaction with their physicians feeling uncomfortable about the security of their private medical information. The best way to meet confidentiality and privacy management expectations that patients have may not be readily apparent. Without realizing it, a physician may communicate a patient's information in ways that are inconsistent with that person's perceptions of how his/her medical information should be treated. A proposed model is presented as a tool for physicians to better serve the privacy and confidentiality needs of their patients. This model depends on the communication privacy management (CPM) perspective that emerged from a 35-year research program investigating how people regulate and control information they consider private and confidential. A physician's use of this model enables the ability to establish a confidentiality pledge that can address issues in understanding the best way to communicate about privacy management with patients and more likely overcome potential negative outcomes.

  15. METHODS FOR ASSESSING SECURITY THREATS CONFIDENTIAL INFORMATION FOR THE INFORMATION AND TELECOMMUNICATIONS SYSTEMS

    Directory of Open Access Journals (Sweden)

    E. V. Belokurova

    2015-01-01

    Full Text Available The article discusses the different approaches to assessing the safety of confidential information-term for information and telecommunication systems of various pre-appreciable destination in the presence of internal and external threats to its integrity and availability. The difficulty of ensuring the security of confidential information from exposure to information and telecommunication systems of external and internal threats at the present time, is of particular relevance. This problem is confirmed by the analysis of available statistical information on the impact of threats on the security circulating in the information and telecommunications system. Leak confidential information, intellectual property, information, know-how is the result of significant material and moral damage caused to the owner of the restricted information. The paper presents the structure of the indicators and criteria shows that the most promising are analytical criteria. However, their use to assess the level of security of confidential information is difficult due to the lack of appropriate mathematical models. The complexity of the problem is that existing traditional mathematical models are not always appropriate for the stated objectives. Therefore, it is necessary to develop mathematical models designed to assess the security of confidential information and its impact on information and telecommunication system threats.

  16. Hormonal Regulation in Shade Avoidance

    Directory of Open Access Journals (Sweden)

    Chuanwei Yang

    2017-09-01

    Full Text Available At high vegetation density, shade-intolerant plants sense a reduction in the red (660 nm to far-red (730 nm light ratio (R/FR in addition to a general reduction in light intensity. These light signals trigger a spectrum of morphological changes manifested by growth of stem-like tissue (hypocotyl, petiole, etc. instead of harvestable organs (leaves, fruits, seeds, etc.—namely, shade avoidance syndrome (SAS. Common phenotypical changes related to SAS are changes in leaf hyponasty, an increase in hypocotyl and internode elongation and extended petioles. Prolonged shade exposure leads to early flowering, less branching, increased susceptibility to insect herbivory, and decreased seed yield. Thus, shade avoidance significantly impacts on agronomic traits. Many genetic and molecular studies have revealed that phytochromes, cryptochromes and UVR8 (UV-B photoreceptor protein monitor the changes in light intensity under shade and regulate the stability or activity of phytochrome-interacting factors (PIFs. PIF-governed modulation of the expression of auxin biosynthesis, transporter and signaling genes is the major driver for shade-induced hypocotyl elongation. Besides auxin, gibberellins, brassinosteroids, and ethylene are also required for shade-induced hypocotyl or petiole elongation growth. In leaves, accumulated auxin stimulates cytokinin oxidase expression to break down cytokinins and inhibit leaf growth. In the young buds, shade light promotes the accumulation of abscisic acid to repress branching. Shade light also represses jasmonate- and salicylic acid-induced defense responses to balance resource allocation between growth and defense. Here we will summarize recent findings relating to such hormonal regulation in SAS in Arabidopsis thaliana, Brassica rapa, and certain crops.

  17. Confidentiality, 'no blame culture' and whistleblowing, non-physician practice and accountability.

    Science.gov (United States)

    White, Stuart M

    2006-12-01

    Confidentiality is a core tenet of medical professionalism, which enables the maintenance of trust in a doctor-patient relationship. However, both the amount of personal data stored and the number of third parties who might access this data have increased dramatically in the digital age, necessitating the introduction of various national data protection acts. Paradoxically, the Freedom of Information Act 2000 allows United Kingdom citizens to access information held by public bodies, including hospitals. Furthermore, the Public Interest Disclosure Act 1998 actively protects physicians who breach their duty of confidentiality in the name of public interest ('whistleblowing'). This article explores the evolution of the law and ethics in this area, and draws attention to the difficulties in balancing confidentiality against freedom of information. In addition, the role and responsibilities of the non-physician anaesthetist are examined.

  18. Using software agents to preserve individual health data confidentiality in micro-scale geographical analyses.

    Science.gov (United States)

    Kamel Boulos, Maged N; Cai, Qiang; Padget, Julian A; Rushton, Gerard

    2006-04-01

    Confidentiality constraints often preclude the release of disaggregate data about individuals, which limits the types and accuracy of the results of geographical health analyses that could be done. Access to individually geocoded (disaggregate) data often involves lengthy and cumbersome procedures through review boards and committees for approval (and sometimes is not possible). Moreover, current data confidentiality-preserving solutions compatible with fine-level spatial analyses either lack flexibility or yield less than optimal results (because of confidentiality-preserving changes they introduce to disaggregate data), or both. In this paper, we present a simulation case study to illustrate how some analyses cannot be (or will suffer if) done on aggregate data. We then quickly review some existing data confidentiality-preserving techniques, and move on to explore a solution based on software agents with the potential of providing flexible, controlled (software-only) access to unmodified confidential disaggregate data and returning only results that do not expose any person-identifiable details. The solution is thus appropriate for micro-scale geographical analyses where no person-identifiable details are required in the final results (i.e., only aggregate results are needed). Our proposed software agent technique also enables post-coordinated analyses to be designed and carried out on the confidential database(s), as needed, compared to a more conventional solution based on the Web Services model that would only support a rigid, pre-coordinated (pre-determined) and rather limited set of analyses. The paper also provides an exploratory discussion of mobility, security, and trust issues associated with software agents, as well as possible directions/solutions to address these issues, including the use of virtual organizations. Successful partnerships between stakeholder organizations, proper collaboration agreements, clear policies, and unambiguous interpretations

  19. Paternalistic breaches of confidentiality in prison: mental health professionals' attitudes and justifications.

    Science.gov (United States)

    Elger, Bernice Simone; Handtke, Violet; Wangmo, Tenzin

    2015-06-01

    This manuscript presents mental health practitioners' (MHPs) practice, attitudes and justifications for breaching confidentiality when imprisoned patients disclose suicidal thoughts or abuse by others. 24 MHPs working in Swiss prisons shared their experiences regarding confidentiality practices. The data were analysed qualitatively and MHPs' attitudes and course of action were identified. Analysis revealed paternalistic breaches of confidentiality. When patients reported suicidal thoughts and abuse, MHPs believed that forgoing confidentiality is necessary to protect patients, providing several justifications for it. Patients were informed that such information will be transmitted without their consent to medical and non-medical prison personnel. With reference to suicidal attempts, MHPs resorted to methods that may reduce suicidal attempts such as transfer to hospital or internal changes in living arrangements, which would require provision of certain information to prison guards. In cases of abuse, some MHPs convinced patients to accept intervention or sometimes overrode competent patients' refusals to report. Also in the case of abuse, provision of limited information to other prison personnel was seen as an acceptable method to protect patients from further harm. Breaches of confidentiality, whether limited or full, remain unethical, when used for competent patients based solely on paternalistic justifications. Institutionalising ethical and legal procedures to address suicidal and abuse situations would be helpful. Education and training to help both medical and prison personnel to respond to such situations in an appropriate manner that ensures confidentiality and protects patients from suicide and abuse are necessary. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://group.bmj.com/group/rights-licensing/permissions.

  20. Experiential avoidance in body dysmorphic disorder.

    Science.gov (United States)

    Wilson, Anne C; Wilhelm, Sabine; Hartmann, Andrea S

    2014-09-01

    Experiential avoidance (i.e., the attempt to avoid certain internal experiences including bodily sensations, thoughts, emotions, memories, and urges) has been studied in various psychological disorders. However, research examining experiential avoidance in individuals with body dysmorphic disorder (BDD) is limited and inconsistent. The present study compared experiential avoidance in individuals with primary BDD (n=23) to healthy controls (n=22). Standardized measures were used to assess baseline clinical characteristics as well as experiential avoidance. Compared to healthy controls, individuals with BDD presented with significantly greater experiential avoidance (pdepressive symptoms (p<.01) and avoidant coping strategies (p<.01). Clinician sensitivity to experiential avoidance may serve to improve the course of treatment for BDD. Copyright © 2014 Elsevier Ltd. All rights reserved.

  1. School Avoidance: Tips for Concerned Parents

    Science.gov (United States)

    ... Email Print Share School Avoidance: Tips for Concerned Parents Page Content ​School avoidance – sometimes called school refusal ... school bully) Actual physical harm Tips for Concerned Parents: As a first step, the management of school ...

  2. Spanish Consensus Statement

    Science.gov (United States)

    Rey, Guillermo Álvarez; Cuesta, Jordi Ardevol; Loureda, Rafael Arriaza; España, Fernando Ávila; Matas, Ramón Balius; Pazos, Fernando Baró; de Dios Beas Jiménez, Juan; Rosell, Jorge Candel; Fernandez, César Cobián; Ros, Francisco Esparza; Colmenero, Josefina Espejo; de Prado, Jorge Fernández; Cota, Juan José García; González, Jose Ignacio Garrido; Santander, Manuela González; Munilla, Miguel Ángel Herrador; Ruiz, Francisco Ivorra; Díaz, Fernando Jiménez; Marqueta, Pedro Manonelles; Fernandez, Antonio Maestro; Benito, Juan José Muñoz; Vilás, Ramón Olivé; Teres, Xavier Peirau; Amaro, José Peña; Roque, Juan Pérez San; Parenteu, Christophe Ramírez; Serna, Juan Ribas; Álvarez, Mikel Sánchez; Marchori, Carlos Sanchez; Soto, Miguel del Valle; Alonso, José María Villalón; García, Pedro Guillen; de la Iglesia, Nicolas Hugo; Alcorocho, Juan Manuel Lopez

    2015-01-01

    On the 21st of March, 2015, experts met at Clínica CEMTRO in Madrid, Spain, under the patronage of The Spanish Society for Sports Traumatology (SETRADE), The Spanish Federation of Sports Medicine (FEMEDE), The Spanish Association of Medical Services for Football Clubs (AEMEF), and The Spanish Association of Medical Services for Basketball Clubs (AEMB) with the aim of establishing a round table that would allow specialists to consider the most appropriate current general actions to be taken when treating muscle tears in sport, based on proven scientific data described in the medical literature. Each expert received a questionnaire prior to the aforementioned meeting comprising a set of questions concerning therapeutic indications generally applied in the different stages present during muscle repair. The present Consensus Document is the result of the answers to the questionnaire and resulting discussion and consensus over which are the best current indications in the treatment of muscle tears in sport. Avoiding immobilization, not taking nonsteroidal anti-inflammatory drugs (NSAIDs) randomly, fostering early mobilization, increasing vascularization of injured, site and regulating inflammatory mechanisms—without inhibiting these from the early stages of the recovery period—all stood out as main points of the Consensus Document. Additionally, there is controversy concerning cell stimulation techniques and the use of growth factors or cell inhibitors. The decision concerning discharge was unanimous, as was the criteria considered when it came to performing sport techniques without pain. PMID:27213161

  3. Conflict Avoidance in a University Context

    Science.gov (United States)

    Barsky, Allan E.; Wood, Lorinda

    2005-01-01

    This ethnographic study explores patterns of conflict avoidance among university students, professors, administrators and staff. Analysis of their narratives of conflict avoidance suggests that avoidance can be beneficial in some circumstances, depending upon personality issues, cost?benefit analysis, power imbalance, type of work, length of…

  4. 48 CFR 1552.235-75 - Access to Toxic Substances Control Act Confidential Business Information (APR 1996).

    Science.gov (United States)

    2010-10-01

    ...: Access to Toxic Substances Control Act Confidential Business Information (APR 1996) In order to perform... 48 Federal Acquisition Regulations System 6 2010-10-01 2010-10-01 true Access to Toxic Substances Control Act Confidential Business Information (APR 1996). 1552.235-75 Section 1552.235-75 Federal...

  5. Confidentiality Protection of User Data and Adaptive Resource Allocation for Managing Multiple Workflow Performance in Service-Based Systems

    Science.gov (United States)

    An, Ho

    2012-01-01

    In this dissertation, two interrelated problems of service-based systems (SBS) are addressed: protecting users' data confidentiality from service providers, and managing performance of multiple workflows in SBS. Current SBSs pose serious limitations to protecting users' data confidentiality. Since users' sensitive data is sent in…

  6. 21 CFR 860.5 - Confidentiality and use of data and information submitted in connection with classification and...

    Science.gov (United States)

    2010-04-01

    ... 21 Food and Drugs 8 2010-04-01 2010-04-01 false Confidentiality and use of data and information... DEVICE CLASSIFICATION PROCEDURES General § 860.5 Confidentiality and use of data and information... for public disclosure and the use by the Commissioner of data and information submitted to...

  7. 20 CFR 402.90 - Exemption four for withholding records: Trade secrets and confidential commercial or financial...

    Science.gov (United States)

    2010-04-01

    ... four for withholding records: Trade secrets and confidential commercial or financial information. We will withhold trade secrets and commercial or financial information that is obtained from a person and is privileged or confidential. (a) Trade secrets. A trade secret is a secret, commercially valuable...

  8. 36 CFR 902.54 - Trade secrets and commercial or financial information that is privileged or confidential.

    Science.gov (United States)

    2010-07-01

    ... or financial information that is privileged or confidential. 902.54 Section 902.54 Parks, Forests... information that is privileged or confidential. (a) Trade secrets and commercial or financial information that... within the statutory exemption. This includes the following: (1) Commercial or financial information not...

  9. 21 CFR 20.61 - Trade secrets and commercial or financial information which is privileged or confidential.

    Science.gov (United States)

    2010-04-01

    ... secrets and commercial or financial information which is privileged or confidential. (a) A trade secret... the productive process. (b) Commercial or financial information that is privileged or confidential... 21 Food and Drugs 1 2010-04-01 2010-04-01 false Trade secrets and commercial or financial...

  10. 29 CFR 4901.24 - Special rules for trade secrets and confidential commercial or financial information submitted to...

    Science.gov (United States)

    2010-07-01

    ... or financial information submitted to the PBGC. 4901.24 Section 4901.24 Labor Regulations Relating to... Special rules for trade secrets and confidential commercial or financial information submitted to the PBGC... secret or is commercial or financial information that is privileged or confidential. Facts asserted...

  11. Lithuanian general practitioners' knowledge of confidentiality laws in adolescent sexual and reproductive healthcare: a cross-sectional study

    DEFF Research Database (Denmark)

    Lazarus, Jeff; Jaruseviciene, Lina; Liljestrand, Jerker

    2008-01-01

    In Lithuania, the legislation addressing confidentiality in adolescent healthcare is contradictory and vague. Previous studies have also revealed that medico-legal knowledge among physicians is poor, and attitudes play a correspondingly greater role than legal knowledge in ensuring the confidenti...

  12. 49 CFR 40.321 - What is the general confidentiality rule for drug and alcohol test information?

    Science.gov (United States)

    2010-10-01

    ... Transportation PROCEDURES FOR TRANSPORTATION WORKPLACE DRUG AND ALCOHOL TESTING PROGRAMS Confidentiality and Release of Information § 40.321 What is the general confidentiality rule for drug and alcohol test... DOT drug or alcohol testing process, you are prohibited from releasing individual test results or...

  13. Population avoidance in aimpoint selection

    International Nuclear Information System (INIS)

    Andre, C.G.

    1978-01-01

    In most past studies of the effectiveness of tactical nuclear weapons vs the amount of collateral damage produced (civilian casualties), civilians have been congregated into idealized shaped towns and cities, and criteria for city avoidance were usually formulated in terms relating to a town's population. This treatment was sufficient in those studies where weapon yields were so large that great numbers of civilians were almost always placed at risk. As further studies developed, demonstrating that real progress could be made in reducing the numbers of civilians potentially placed at risk in tactical nuclear warfare situations, the inadequacies of the present treatment became obvious. The need existed for a more detailed description of the distribution of civilians. The method described determines the number of civilians at risk for a weapon under consideration being detonated at a given point and displays a symbol relating to the numbers at risk on a map or a transparency that overlays a 1:50,000 map of the region. Thus, a weapons planner making the selection of aimpoints for inflicting the necessary military damage required has the means to reduce potential civilian casualties by properly choosing the weapon and aimpoints

  14. Diabetes Australia position statement. A new language for diabetes

    DEFF Research Database (Denmark)

    Speight, J.; Conn, J.; Dunning, T.

    2012-01-01

    . Words do more than reflect people's reality: they create reality and affect how people view the world and their diabetes. Language needs to engage people with diabetes and support their self-care efforts. Importantly, language that de-motivates or induces fear, guilt or distress needs to be avoided...... and countered. Diabetes Australia believes optimal communication increases the motivation, health and well-being of people with diabetes, and that careless or negative language can be de-motivating, is often inaccurate, and can be harmful. Diabetes Australia developed this position statement to encourage...... greater awareness of the language surrounding diabetes and provide recommendations for more careful and positive language use....

  15. Accounting Principles and Financial Statements.

    Science.gov (United States)

    Robinson, Daniel D.

    1973-01-01

    This document presents the background and analysis of the American Institute of Certified Public Accountants (AICPA) guide to auditing colleges and universities. Highlights include the approval of the market value option, the treatment of endowment gains, debt services as transfers, the decisions on pledges, the use of financial statements, the…

  16. COMPARATIVE FINANCIAL STATEMENTS. CONVERGENCE VERSUS DIVERGENCE

    Directory of Open Access Journals (Sweden)

    Nicolae ECOBICI

    2010-09-01

    Full Text Available In this paper I compared the Romanian financial statements with the US GAAP financial statements in terms of two criteria: first the reference period and secondly the shape, structure and content of financial statements. Nowadays the two accounting systems, the French and Anglo-Saxon, tend to harmonize. I will present the convergences and the divergences between the financial statements of Romania, subject to OMFP 3055/2009, in parallel with the Anglo-Saxon accounting system.

  17. 76 FR 9012 - Access to Confidential Business Information by Electronic Consulting Services, Inc.

    Science.gov (United States)

    2011-02-16

    ...EPA has authorized its contractor, Electronic Consulting Services, Inc. (ECS) of Fairfax, VA, to access information which has been submitted to EPA under all sections of the Toxic Substances Control Act (TSCA). Some of the information may be claimed or determined to be Confidential Business Information (CBI).

  18. 20 CFR 603.4 - What is the confidentiality requirement of Federal UC law?

    Science.gov (United States)

    2010-04-01

    ... 20 Employees' Benefits 3 2010-04-01 2010-04-01 false What is the confidentiality requirement of Federal UC law? 603.4 Section 603.4 Employees' Benefits EMPLOYMENT AND TRAINING ADMINISTRATION, DEPARTMENT....C. 502(a)), State law must include provision for such methods of administration as are found by the...

  19. Canadian policy makers' views on pharmaceutical reimbursement contracts involving confidential discounts from drug manufacturers.

    Science.gov (United States)

    Morgan, Steven G; Thomson, Paige A; Daw, Jamie R; Friesen, Melissa K

    2013-10-01

    Pharmaceutical policy makers are increasingly negotiating reimbursement contracts that include confidential price terms that may be affected by drug utilization volumes, patterns, or outcomes. Though such contracts may offer a variety of benefits, including the ability to tie payment to the actual performance of a product, they may also create potential policy challenges. Through telephone interviews about this type of contract, we studied the views of officials in nine of ten Canadian provinces. Use of reimbursement contracts involving confidential discounts is new in Canada and ideas about power and equity emerged as cross-cutting themes in our interviews. Though confidential rebates can lower prices and thereby increase coverage of new medicines, several policy makers felt they had little power in the decision to negotiate rebates. Study participants explained that the recent rise in the use of rebates had been driven by manufacturers' pricing tactics and precedent set by other jurisdictions. Several policy makers expressed concerns that confidential rebates could result in inter-jurisdictional inequities in drug pricing and coverage. Policy makers also noted un-insured and under-insured patients must pay inflated "list prices" even if rebates are negotiated by drug plans. The establishment of policies for disciplined negotiations, inter-jurisdictional cooperation, and provision of drug coverage for all citizens are potential solutions to the challenges created by this new pharmaceutical pricing paradigm. Copyright © 2013 The Authors. Published by Elsevier Ireland Ltd.. All rights reserved.

  20. 77 FR 66977 - Access by EPA Contractors to Information Claimed as Confidential Business Information (CBI...

    Science.gov (United States)

    2012-11-08

    ... AGENCY Access by EPA Contractors to Information Claimed as Confidential Business Information (CBI... authorize various contractors to access information which will be submitted to EPA under Title II of the...). Access to this information, which is related to 40 CFR Part 79; 40 CFR Part 80; and 40 CFR Part 98...

  1. 75 FR 60452 - Clean Water Act; Contractor Access to Confidential Business Information

    Science.gov (United States)

    2010-09-30

    ... AGENCY Clean Water Act; Contractor Access to Confidential Business Information AGENCY: Environmental... CWA. Transfer of the information will allow the contractors and subcontractors to access information... its personnel who require access to information claimed as CBI to sign written non-disclosure...

  2. Cyber-Security Challenges with SMEs in Developing Economies: Issues of Confidentiality, Integrity & Availability (CIA)

    DEFF Research Database (Denmark)

    Yeboah-Boateng, Ezer Osei

    , to develop customer-centric strategies. While connectivity is indispensable for achieving business success, being connected also implies being exposed to a myriad of cyber-security challenges, such as vulnerabilities of confidentiality, integrity and availability (CIA). As vulnerabilities are exploited...

  3. 49 CFR 659.11 - Confidentiality of investigation reports and security plans.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 7 2010-10-01 2010-10-01 false Confidentiality of investigation reports and security plans. 659.11 Section 659.11 Transportation Other Regulations Relating to Transportation (Continued) FEDERAL TRANSIT ADMINISTRATION, DEPARTMENT OF TRANSPORTATION RAIL FIXED GUIDEWAY SYSTEMS; STATE...

  4. Ensuring Confidentiality of Geocoded Health Data: Assessing Geographic Masking Strategies for Individual-Level Data

    Directory of Open Access Journals (Sweden)

    Paul A. Zandbergen

    2014-01-01

    Full Text Available Public health datasets increasingly use geographic identifiers such as an individual’s address. Geocoding these addresses often provides new insights since it becomes possible to examine spatial patterns and associations. Address information is typically considered confidential and is therefore not released or shared with others. Publishing maps with the locations of individuals, however, may also breach confidentiality since addresses and associated identities can be discovered through reverse geocoding. One commonly used technique to protect confidentiality when releasing individual-level geocoded data is geographic masking. This typically consists of applying a certain amount of random perturbation in a systematic manner to reduce the risk of reidentification. A number of geographic masking techniques have been developed as well as methods to quantity the risk of reidentification associated with a particular masking method. This paper presents a review of the current state-of-the-art in geographic masking, summarizing the various methods and their strengths and weaknesses. Despite recent progress, no universally accepted or endorsed geographic masking technique has emerged. Researchers on the other hand are publishing maps using geographic masking of confidential locations. Any researcher publishing such maps is advised to become familiar with the different masking techniques available and their associated reidentification risks.

  5. Ensuring Confidentiality of Geocoded Health Data: Assessing Geographic Masking Strategies for Individual-Level Data.

    Science.gov (United States)

    Zandbergen, Paul A

    2014-01-01

    Public health datasets increasingly use geographic identifiers such as an individual's address. Geocoding these addresses often provides new insights since it becomes possible to examine spatial patterns and associations. Address information is typically considered confidential and is therefore not released or shared with others. Publishing maps with the locations of individuals, however, may also breach confidentiality since addresses and associated identities can be discovered through reverse geocoding. One commonly used technique to protect confidentiality when releasing individual-level geocoded data is geographic masking. This typically consists of applying a certain amount of random perturbation in a systematic manner to reduce the risk of reidentification. A number of geographic masking techniques have been developed as well as methods to quantity the risk of reidentification associated with a particular masking method. This paper presents a review of the current state-of-the-art in geographic masking, summarizing the various methods and their strengths and weaknesses. Despite recent progress, no universally accepted or endorsed geographic masking technique has emerged. Researchers on the other hand are publishing maps using geographic masking of confidential locations. Any researcher publishing such maps is advised to become familiar with the different masking techniques available and their associated reidentification risks.

  6. 40 CFR 1601.26 - Special procedures for confidential business information.

    Science.gov (United States)

    2010-07-01

    ... described in paragraph (c) of this section, the CSB shall, to the extent permitted by law, afford a business... business information. 1601.26 Section 1601.26 Protection of Environment CHEMICAL SAFETY AND HAZARD... Requesting and Disclosing Records § 1601.26 Special procedures for confidential business information. (a) In...

  7. 22 CFR 1101.5 - Security, confidentiality and protection of records.

    Science.gov (United States)

    2010-04-01

    ... records. 1101.5 Section 1101.5 Foreign Relations INTERNATIONAL BOUNDARY AND WATER COMMISSION, UNITED... administrative, technical and physical safeguards to ensure the security and confidentiality of records and to... maintained. (b) When maintained in manual form (typed, printed, handwritten, etc.) records shall be...

  8. HIV testing sites' communication about adolescent confidentiality: potential barriers and facilitators to testing.

    Science.gov (United States)

    Hyden, Christel; Allegrante, John P; Cohall, Alwyn T

    2014-03-01

    This study sought to evaluate HIV testing locations in New York City in terms of staff communication of confidentiality policies for adolescent clients. Using the New York State Directory of HIV Counseling and Testing Resources as a sampling frame, this study made telephone contact with 164 public HIV testing locations in New York City and used a semistructured interview to ask questions about confidentiality, parental permission, and parent access to test results. At 48% of locations, either HIV testing was not offered or we were unable to reach a staff member to ask questions about testing options and confidentiality. At the remaining sites, information provided regarding confidentiality, parental consent, and privacy of test results was correct only 69% to 85% of the time. Additionally, 23% of sites successfully contacted offered testing exclusively between 9:00 a.m. and 3:00 p.m. weekdays, when most adolescents are in school. Our findings point to a need for increased training and quality control at the clinical level to ensure that consumers in need of HIV testing are provided with accurate information and accessible services. Furthermore, these results highlight the need for more "patient-centric" sites with enhanced accessibility for potential clients, particularly youth.

  9. 19 CFR 206.66 - Limited disclosure of certain confidential business information under administrative protective...

    Science.gov (United States)

    2010-04-01

    ... business information under administrative protective order. 206.66 Section 206.66 Customs Duties UNITED STATES INTERNATIONAL TRADE COMMISSION NONADJUDICATIVE INVESTIGATIONS INVESTIGATIONS RELATING TO GLOBAL... section 422(b) of the Trade Act, the Secretary shall make confidential business information available to...

  10. 77 FR 13124 - Disclosure of Confidential Business Information Obtained Under the Comprehensive Environmental...

    Science.gov (United States)

    2012-03-05

    ... the agency, or (ii) Each affected business is informed of those disclosures under this paragraph (h)(3... will provide adequate protection to the interests of affected businesses. Pursuant to 40 CFR 2.310(h)(4... AGENCY Disclosure of Confidential Business Information Obtained Under the Comprehensive Environmental...

  11. Providing integrity, authenticity, and confidentiality for header and pixel data of DICOM images.

    Science.gov (United States)

    Al-Haj, Ali

    2015-04-01

    Exchange of medical images over public networks is subjected to different types of security threats. This has triggered persisting demands for secured telemedicine implementations that will provide confidentiality, authenticity, and integrity for the transmitted images. The medical image exchange standard (DICOM) offers mechanisms to provide confidentiality for the header data of the image but not for the pixel data. On the other hand, it offers mechanisms to achieve authenticity and integrity for the pixel data but not for the header data. In this paper, we propose a crypto-based algorithm that provides confidentially, authenticity, and integrity for the pixel data, as well as for the header data. This is achieved by applying strong cryptographic primitives utilizing internally generated security data, such as encryption keys, hashing codes, and digital signatures. The security data are generated internally from the header and the pixel data, thus a strong bond is established between the DICOM data and the corresponding security data. The proposed algorithm has been evaluated extensively using DICOM images of different modalities. Simulation experiments show that confidentiality, authenticity, and integrity have been achieved as reflected by the results we obtained for normalized correlation, entropy, PSNR, histogram analysis, and robustness.

  12. The Psychological Competence of Police Officers in Confidential Cooperation with Citizens

    Science.gov (United States)

    Uspanov, Zholdybai T.; Turabayeva, Dana S.; Ermolovich, Vladimir F.

    2016-01-01

    This research studied the psychological aspects of citizens' assistance to law enforcement agencies on a confidential basis. The comprehensive observance of the psychological norms of cooperation is determined by the professional ethics of police officers, the necessity of nondisclosure of investigation secrets by citizens, and the security of the…

  13. The Confidentiality of Medical Secrets of Patients by the Nursing Staff

    Directory of Open Access Journals (Sweden)

    Chalkias Theodoros

    2010-01-01

    Full Text Available In this article you will find a critical discussion about the significance of confidentiality of "medical secrets" (keeping the secrets of ill people by nurses. Special cases are mentioned regarding the need to keep, or reveal the secret.

  14. 75 FR 46948 - Medicare Program; Listening Session Regarding Confidential Feedback Reports and the...

    Science.gov (United States)

    2010-08-04

    ...] Medicare Program; Listening Session Regarding Confidential Feedback Reports and the Implementation of a... Services (CMS), HHS. ACTION: Notice of meeting. SUMMARY: This notice announces a listening session being... modifier to the fee- for-service physician fee schedule. The purpose of the listening session is to solicit...

  15. 22 CFR 212.38 - Predisclosure notification procedures for confidential commercial information.

    Science.gov (United States)

    2010-04-01

    ... 22 Foreign Relations 1 2010-04-01 2010-04-01 false Predisclosure notification procedures for confidential commercial information. 212.38 Section 212.38 Foreign Relations AGENCY FOR INTERNATIONAL DEVELOPMENT PUBLIC INFORMATION Access to Agency Records § 212.38 Predisclosure notification procedures for...

  16. Teaching Journalism Students about Confidential Whistleblower Sources: An Analysis of Introductory News Writing Textbooks

    Science.gov (United States)

    Huxford, John; Moore, Maria A.

    2011-01-01

    Whistleblowers are a key journalistic source for many current news stories. However, reporters pursuing these major stories must navigate the dilemma between transparent full disclosure and protecting their confidential source. Professional journalists begin their journey as students, and students begin their journey in the classroom with a…

  17. 40 CFR 370.64 - What information can I claim as trade secret or confidential?

    Science.gov (United States)

    2010-07-01

    ... secret or confidential? (a) Trade secrets. You may be able to withhold the name of a specific chemical... trade secret. The requirements for withholding trade secret information are set forth in EPCRA section... trade secret in accordance with trade secrecy requirements, you must report the generic class or...

  18. 18 CFR 401.75 - Protection of trade secrets; Confidential information.

    Science.gov (United States)

    2010-04-01

    ... to Decisions of the Executive Director in Water Qualtity Cases § 401.75 Protection of trade secrets; Confidential information. No person shall be required in such report to divulge trade secrets or secret... relates to the trade secrets, processes, operations, style of work, or apparatus, or to the identity...

  19. 5 CFR 213.3301 - Positions of a confidential or policy-determining nature.

    Science.gov (United States)

    2010-01-01

    ... 5 Administrative Personnel 1 2010-01-01 2010-01-01 false Positions of a confidential or policy-determining nature. 213.3301 Section 213.3301 Administrative Personnel OFFICE OF PERSONNEL MANAGEMENT CIVIL... or policy-determining nature. (a) Upon specific authorization by OPM, agencies may make appointments...

  20. 42 CFR 2.2 - Statutory authority for confidentiality of alcohol abuse patient records.

    Science.gov (United States)

    2010-10-01

    ... by section 333 of the Comprehensive Alcohol Abuse and Alcoholism Prevention, Treatment, and... connection with the performance of any program or activity relating to alcoholism or alcohol abuse education... 42 Public Health 1 2010-10-01 2010-10-01 false Statutory authority for confidentiality of alcohol...

  1. 77 FR 1434 - Proposed Confidentiality Determinations for Data Elements Under the Mandatory Reporting of...

    Science.gov (United States)

    2012-01-10

    ... cause substantial harm to the business's competitive position. See 40 CFR 2.208(e)(1). Consistent with... competitive harm if released and therefore will be protected as confidential business information. EPA finds... advantage at the expense of the reporter's competitive advantage. Therefore...

  2. 21 CFR 20.55 - Indexing trade secrets and confidential commercial or financial information.

    Science.gov (United States)

    2010-04-01

    ... or financial information. 20.55 Section 20.55 Food and Drugs FOOD AND DRUG ADMINISTRATION, DEPARTMENT OF HEALTH AND HUMAN SERVICES GENERAL PUBLIC INFORMATION Procedures and Fees § 20.55 Indexing trade secrets and confidential commercial or financial information. Whenever the Food and Drug Administration...

  3. 75 FR 29754 - Claims of Confidentiality of Certain Chemical Identities Contained in Health and Safety Studies...

    Science.gov (United States)

    2010-05-27

    ... Submitted Under the Toxic Substances Control Act AGENCY: Environmental Protection Agency (EPA). ACTION... Toxic Substances Control Act (TSCA) in accordance with Agency regulations at 40 CFR part 2, subpart B... on similar efforts regarding confidentiality of chemical identities listed on the public version of...

  4. 77 FR 76028 - Access to Confidential Business Information by Science Applications International Corporation and...

    Science.gov (United States)

    2012-12-26

    ... Business Information by Science Applications International Corporation and Its Identified Subcontractor...: EPA has authorized its contractor, Science Applications International Corporation (SAIC) of McLean, VA... information may be claimed or determined to be Confidential Business Information (CBI). DATES: Access to the...

  5. 78 FR 66697 - Access to Confidential Business Information by Science Applications International Corporation and...

    Science.gov (United States)

    2013-11-06

    ... Business Information by Science Applications International Corporation and Its Identified Subcontractors..., Science Applications International Corporation (SAIC) of McLean, VA, and its subcontractors to access...). Some of the information may have been claimed or determined to be Confidential Business Information...

  6. Wavelet-Based ECG Steganography for Protecting Patient Confidential Information in Point-of-Care Systems.

    Science.gov (United States)

    Ibaida, Ayman; Khalil, Ibrahim

    2013-12-01

    With the growing number of aging population and a significant portion of that suffering from cardiac diseases, it is conceivable that remote ECG patient monitoring systems are expected to be widely used as point-of-care (PoC) applications in hospitals around the world. Therefore, huge amount of ECG signal collected by body sensor networks from remote patients at homes will be transmitted along with other physiological readings such as blood pressure, temperature, glucose level, etc., and diagnosed by those remote patient monitoring systems. It is utterly important that patient confidentiality is protected while data are being transmitted over the public network as well as when they are stored in hospital servers used by remote monitoring systems. In this paper, a wavelet-based steganography technique has been introduced which combines encryption and scrambling technique to protect patient confidential data. The proposed method allows ECG signal to hide its corresponding patient confidential data and other physiological information thus guaranteeing the integration between ECG and the rest. To evaluate the effectiveness of the proposed technique on the ECG signal, two distortion measurement metrics have been used: the percentage residual difference and the wavelet weighted PRD. It is found that the proposed technique provides high-security protection for patients data with low (less than 1%) distortion and ECG data remain diagnosable after watermarking (i.e., hiding patient confidential data) and as well as after watermarks (i.e., hidden data) are removed from the watermarked data.

  7. 17 CFR 145.9 - Petition for confidential treatment of information submitted to the Commission.

    Science.gov (United States)

    2010-04-01

    ... may summarily reject the submitter's request for confidential treatment with leave to the submitter to... treatment of information submitted to the Commission. 145.9 Section 145.9 Commodity and Securities Exchanges... treatment of information submitted to the Commission. (a) Purpose. This section provides a procedure by...

  8. 21 CFR 1316.23 - Confidentiality of identity of research subjects.

    Science.gov (United States)

    2010-04-01

    ... 21 Food and Drugs 9 2010-04-01 2010-04-01 false Confidentiality of identity of research subjects. 1316.23 Section 1316.23 Food and Drugs DRUG ENFORCEMENT ADMINISTRATION, DEPARTMENT OF JUSTICE ADMINISTRATIVE FUNCTIONS, PRACTICES, AND PROCEDURES Protection of Researchers and Research Subjects § 1316.23...

  9. 6 CFR 25.10 - Confidentiality and protection of Intellectual Property.

    Science.gov (United States)

    2010-01-01

    ... protection of Intellectual Property. (a) General. The Secretary, in consultation with the Office of... 6 Domestic Security 1 2010-01-01 2010-01-01 false Confidentiality and protection of Intellectual Property. 25.10 Section 25.10 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY...

  10. Chaos-based encryption keys and neural key-store for cloud-hosted data confidentiality

    CSIR Research Space (South Africa)

    Mosola, NN

    2017-09-01

    Full Text Available towards gaining unauthorised access to cloud-bound or cloud-hosted data. This paper proposes a client-end encryption and key management system to curb attacks that targets compromising the confidentiality of cloud-hosted data. The proposed system uses...

  11. 77 FR 109 - Inquiry To Learn Whether Businesses Assert Business Confidentiality Claims Regarding Waste Import...

    Science.gov (United States)

    2012-01-03

    ... definition of ``affected business,'' and are not covered by today's notice. They consist of any business that... today's notice. They consist of any business that actually submitted information responsive to a FOIA... Businesses Assert Business Confidentiality Claims Regarding Waste Import and Export AGENCY: Environmental...

  12. 75 FR 44951 - Inquiry To Learn Whether Businesses Assert Business Confidentiality Claims

    Science.gov (United States)

    2010-07-30

    ... are not covered by today's notice. They consist of any business that actually submitted to EPA any... definition of ``affected business,'' and are not covered by today's notice. They consist of any business that... Businesses Assert Business Confidentiality Claims AGENCY: Environmental Protection Agency (EPA). ACTION...

  13. 76 FR 362 - Inquiry To Learn Whether Businesses Assert Business Confidentiality Claims

    Science.gov (United States)

    2011-01-04

    ...,'' and are not covered by today's notice. They consist of any business that actually submitted to EPA any... today's notice. They consist of any business that actually submitted information responsive to a FOIA... Businesses Assert Business Confidentiality Claims AGENCY: Environmental Protection Agency (EPA). ACTION...

  14. 77 FR 25475 - Inquiry To Learn Whether Businesses Assert Business Confidentiality Claims Regarding Waste Import...

    Science.gov (United States)

    2012-04-30

    ... meet the definition of ``affected business,'' and are not covered by today's notice. They consist of..., however, do not meet the definition of ``affected business,'' and are not covered by today's notice. They... Businesses Assert Business Confidentiality Claims Regarding Waste Import and Export AGENCY: Environmental...

  15. 78 FR 2669 - Waste Import and Export; Inquiry To Learn Whether Businesses Assert Business Confidentiality Claims

    Science.gov (United States)

    2013-01-14

    ... definition of ``affected business,'' and are not covered by today's notice. They consist of any business that... ``affected business,'' and are not covered by today's notice. They consist of any business that actually...; Inquiry To Learn Whether Businesses Assert Business Confidentiality Claims AGENCY: Environmental...

  16. 75 FR 4812 - Inquiry To Learn Whether Businesses Assert Business Confidentiality Claims

    Science.gov (United States)

    2010-01-29

    ..., however, do not meet the definition of ``affected business,'' and are not covered by today's notice. They... today's notice. They consist of any business that actually submitted information responsive to a FOIA... Businesses Assert Business Confidentiality Claims AGENCY: Environmental Protection Agency (EPA). ACTION...

  17. Adolescents' and Young Adults' Reports of Barriers to Confidential Health Care and Receipt of Contraceptive Services.

    Science.gov (United States)

    Fuentes, Liza; Ingerick, Meghan; Jones, Rachel; Lindberg, Laura

    2018-01-01

    The purpose of this study was to describe adolescents' and young adults' concerns about confidential reproductive health care and experience with time alone with a provider, and examine the association of these confidentiality issues with receipt of contraceptive services. Data from the 2013 to 2015 National Survey of Family Growth were analyzed using Poisson regression to describe 15- to 25-year-olds' confidential reproductive health-care concerns and time alone with a provider at last health-care visit according to sociodemographic characteristics. We also assessed whether confidentiality issues were associated with obtaining contraceptive services among females. Concerns about confidential reproductive health care were less common among 15- to 17-year-olds who were covered by Medicaid compared to their parents' private insurance (adjusted risk ratio [ARR] = .61, confidence interval [CI] .41-.91) and had high-school graduate mothers compared to college-graduate mothers (ARR = .68, CI .47-.99), and were more common among those who lived with neither parent compared to living with both parents (ARR = 2.0, CI 1.27-3.16). Time alone with a provider was more common among black girls than white girls (ARR = 1.57, CI 1.11-2.22) and less common among girls covered by Medicaid than those with parents' private insurance (ARR = .72, CI .56-.92). Time alone was less common among boys living with neither parent compared to living with two parents (ARR = .48, CI .25-.91) and with high-school graduate mothers compared to college-graduate mothers (ARR = .59, CI .42-.84). Among sexually experienced girls and women, confidentiality concerns were associated with a reduced likelihood of having received a contraceptive service in the past year. Greater efforts are needed to support young Americans in receiving confidential care. Copyright © 2017 The Society for Adolescent Health and Medicine. Published by Elsevier Inc. All rights reserved.

  18. 75 FR 22577 - Proposed Privacy Policy Statement

    Science.gov (United States)

    2010-04-29

    ... request for public comment on Proposed Privacy Policy Statement. SUMMARY: The U.S. Election Assistance Commission (EAC) seeks public comment on the Proposed Privacy Policy Statement. OMB Memorandum M-99- 18.... These statements are intended to inform the public of government- wide policies and how each agency...

  19. 16 CFR 455.4 - Contrary statements.

    Science.gov (United States)

    2010-01-01

    ... 16 Commercial Practices 1 2010-01-01 2010-01-01 false Contrary statements. 455.4 Section 455.4 Commercial Practices FEDERAL TRADE COMMISSION TRADE REGULATION RULES USED MOTOR VEHICLE TRADE REGULATION RULE § 455.4 Contrary statements. You may not make any statements, oral or written, or take other actions...

  20. Biological Awareness: Statements for Self-Discovery.

    Science.gov (United States)

    Edington, D.W.; Cunningham, Lee

    This guide to biological awareness through guided self-discovery is based on 51 single focus statements concerning the human body. For each statement there are explanations of the underlying physiological principles and suggested activities and discussion ideas to encourage understanding of the statement in terms of the human body's functions,…

  1. 12 CFR 611.515 - Information statement.

    Science.gov (United States)

    2010-01-01

    ... audited balance sheet and income statement and notes thereto of the bank or the association, as applicable... assets, a balance sheet and income statement of the bank and the association showing its financial condition before the transfer of authority and a pro forma balance sheet and income statement for the bank...

  2. Generalization of socially transmitted and instructed avoidance

    Directory of Open Access Journals (Sweden)

    Gemma eCameron

    2015-06-01

    Full Text Available Excessive avoidance behavior, in which an instrumental action prevents an upcoming aversive event, is a defining feature of anxiety disorders. Left unchecked, both fear and avoidance of potentially threatening stimuli may generalize to perceptually related stimuli and situations. The behavioral consequences of generalization mean that aversive learning experiences with specific threats may lead people to infer that classes of related stimuli are threatening, potentially dangerous, and need to be avoided, despite differences in physical form. Little is known about avoidance generalization in humans and the learning pathways by which it may be transmitted. In the present study, we compared two pathways to avoidance, instructions and social observation, on subsequent generalization of avoidance behavior, fear expectancy and physiological arousal. Participants first learned that one cue was a danger cue (conditioned stimulus, CS+ and another was a safety cue (CS-. Groups then were either instructed that a simple avoidance response in the presence of the CS+ cancelled upcoming shock presentations (instructed-learning group or observed a short movie showing a demonstrator performing the avoidance response to prevent shock (observational-learning group. During generalization testing, danger and safety cues were presented along with generalization stimuli that parametrically varied in perceptual similarity to the CS+. Reinstatement of fear and avoidance was also tested. Findings demonstrate, for the first time, generalization of socially transmitted and instructed avoidance: both groups showed comparable generalization gradients in fear expectancy, avoidance behavior and arousal. Return of fear was evident, suggesting that generalized avoidance remains persistent following extinction testing. The utility of the present paradigm for research on avoidance generalization is discussed.

  3. Analysis of the ethical aspects of professional confidentiality in dental practice

    Directory of Open Access Journals (Sweden)

    Cléa Adas Saliba Garbin

    2008-02-01

    Full Text Available From the point of view of deontological ethics, privacy is a moral right that patients are entitled to and it is bound to professional confidentiality. Otherwise, the information given by patients to health professionals would not be reliable and a trustable relationship could not be established. The aim of the present study was to assess, by means of questionnaires with open and closed questions, the awareness and attitudes of 100 dentists working in the city of Andradina, São Paulo State, Brazil, with respect to professional confidentiality in dental practice. Most dentists (91.43% reported to have instructed their assistants on professional confidentiality. However, 44.29% of the interviewees showed to act contradictorily as reported talking about the clinical cases of their patients to their friends or spouses. The great majority of professionals (98.57% believed that it is important to have classes on Ethics and Bioethics during graduation and, when asked about their knowledge of the penalties imposed for breach of professional confidentiality, only 48.57% of them declared to be aware of it. Only 28.57% of the interviewees affirmed to have exclusive access to the files; 67.14% reported that that files were also accessed by their secretary; 1.43% answered that their spouses also had access, and 2.86% did not answer. From the results of the present survey, it could be observed that, although dentists affirmed to be aware of professional confidentiality, their attitudes did not adhere to ethical and legal requirements. This stand of health professionals has contributed to violate professional ethics and the law itself, bringing problems both to the professional and to the patient.

  4. Knowledge and Perceptions of Health Workers' Training on Ethics, Confidentiality and Medico-Legal Issues.

    Science.gov (United States)

    Barnie, Bernard Asamoah; Forson, Paa Kobina; Opare-Addo, Mercy Naa Aduele; Appiah-Poku, John; Rhule, Gyikua Plange; Oduro, George; Adu-Sarkodie, Yaw; Donkor, Peter

    2015-02-01

    Health care delivery in recent times has become more complicated, as patients expect health personnel to not only provide professional services but be accountable as well. It is thus imperative that health personnel are aware of their responsibility to the patient and also sensitive to medico legal issues if quality health care is to be assured. The aim of the study was to assess the knowledge and perception of health care workers on their training in ethics, confidentiality and medico-legal issues. It was expected that the results would inform policy on the training of the health workers. A cross-sectional survey was conducted among some categories of health workers (Doctors, Nurses and Health care assistants) at the Accident and Emergency directorate of Komfo Anokye Teaching Hospital, Ghana. A self-administered questionnaire was used to elicit information on ethics, confidentiality and medico- legal issues. Data collected was analyzed using SPSS version 16. A total of 103 health care workers were enrolled on the study representing 96% response rate. The study revealed that 74% had knowledge on ethics, confidentiality and medico- legal concepts; and 35.4% of the respondents indicated that health workers attitudes to ethics, confidentiality and medico- legal concepts was inadequate. About 28.3% indicated that their attitudes were good while 26.3% indicated attitudes were adequate with only 2% indicating that attitudes were very good. Nearly, 49% of the respondents also indicated that training on medico-legal issues should be taught during formal training and also on-the-job. Knowledge of health workers on ethics confidentiality and medico-legal issues is high and their perceptions are positive. However, regular training to update their knowledge will be necessary in order to ensure continuous improvement of the quality of health care delivery.

  5. Analysis of the ethical aspects of professional confidentiality in dental practice.

    Science.gov (United States)

    Garbin, Cléa Adas Saliba; Garbin, Artênio José Isper; Saliba, Nemre Adas; de Lima, Daniela Coelho; de Macedo, Ana Paula Ayala

    2008-01-01

    From the point of view of deontological ethics, privacy is a moral right that patients are entitled to and it is bound to professional confidentiality. Otherwise, the information given by patients to health professionals would not be reliable and a trustable relationship could not be established. The aim of the present study was to assess, by means of questionnaires with open and closed questions, the awareness and attitudes of 100 dentists working in the city of Andradina, São Paulo State, Brazil, with respect to professional confidentiality in dental practice. Most dentists (91.43%) reported to have instructed their assistants on professional confidentiality. However, 44.29% of the interviewees showed to act contradictorily as reported talking about the clinical cases of their patients to their friends or spouses. The great majority of professionals (98.57%) believed that it is important to have classes on Ethics and Bioethics during graduation and, when asked about their knowledge of the penalties imposed for breach of professional confidentiality, only 48.57% of them declared to be aware of it. Only 28.57% of the interviewees affirmed to have exclusive access to the files; 67.14% reported that that files were also accessed by their secretary; 1.43% answered that their spouses also had access, and 2.86% did not answer. From the results of the present survey, it could be observed that, although dentists affirmed to be aware of professional confidentiality, their attitudes did not adhere to ethical and legal requirements. This stand of health professionals has contributed to violate professional ethics and the law itself, bringing problems both to the professional and to the patient.

  6. Sexual Fears and Avoidant Sexual Behavior in Medical Students.

    Science.gov (United States)

    Popov, Stefan P; Mateva, Nonka G; Iliev, Yanko T; Dechev, Ivan D; Karalilova, Rositsa V

    2015-01-01

    Sexual fears, sometimes in the form of phobias, lead to aversive or sexually avoidant behavior blocking sexual closeness and resulting in deep personal and interpersonal distress. To determine the types of sexual fears and aversive behavior in young people of reproductive age (students) and their degree of markedness as to encourage a further implementation of prevention programs and interventions. The study included 116 fifth-year medical students in Plovdiv Medical University. Of these, 55 men and 61 women were assessed with the Sexual Aversion Scale, a 30-item self-rating questionnaire. The Diagnostic and Statistical Manual of Mental Disorders criteria of sexual aversion were used. The statistical analyses used were descriptive statistics and independent samples t-test. Sexual fears and aversive or blocking behavior are mild to moderate, mean score of 1.54 ± 0.04, without statistically significant gender differences. Both sexes have established fear-related sexual aversive motives of sexual behavior related to the risk of unwanted pregnancy and HIV infection. Women have significantly higher average scores for the following statements: fear of sexual intercourse (1.61 vs 1.25), avoidance of situations in which they may be involved sexually (1.95 vs 1.51), avoidance of genital sexual contact (1.44 vs 1.16), fear of catching a sexually transmitted disease (2.46 vs 2.09 ), fear of pregnancy (2.61 vs 2.15) and concerns what other people think of them (2.34 vs 1.93 ). Sexual fears and aversive or blocking behavior were mild to moderate. In both sexes similar fears--aversive or blocking patterns of sexual behavior were found, mainly associated with the fear of unwanted pregnancy and the risk of HIV infection, more expressed in women.

  7. Disasters of endoscopic surgery and how to avoid them: error analysis.

    Science.gov (United States)

    Troidl, H

    1999-08-01

    For every innovation there are two sides to consider. For endoscopic surgery the positive side is more comfort for the patient, and the negative side is new complications, even disasters, such as injuries to organs (e.g., the bowel), vessels, and the common bile duct. These disasters are rare and seldom reported in the scientific world, as at conferences, at symposiums, and in publications. Today there are many methods for testing an innovation (controlled clinical trials, consensus conferences, audits, and confidential inquiries). Reporting "complications," however, does not help to avoid them. We need real methods for avoiding negative failures. The failure analysis is the method of choice in industry. If an airplane crashes, error analysis starts immediately. Humans make errors, and making errors means punishment. Failure analysis means rigorously and objectively investigating a clinical situation to find clinical relevant information for avoiding these negative events in the future. Error analysis has four important steps: (1) What was the clinical situation? (2) What has happened? (3) Most important: Why did it happen? (4) How do we avoid the negative event or disaster in the future. Error analysis has decisive advantages. It is easy to perform; it supplies clinically relevant information to help avoid it; and there is no need for money. It can be done everywhere; and the information is available in a short time. The other side of the coin is that error analysis is of course retrospective, it may not be objective, and most important it will probably have legal consequences. To be more effective in medicine and surgery we must handle our errors using a different approach. According to Sir Karl Popper: "The consituation is that we have to learn from our errors. To cover up failure is therefore the biggest intellectual sin.

  8. Integration of Weather Avoidance and Traffic Separation

    Science.gov (United States)

    Consiglio, Maria C.; Chamberlain, James P.; Wilson, Sara R.

    2011-01-01

    This paper describes a dynamic convective weather avoidance concept that compensates for weather motion uncertainties; the integration of this weather avoidance concept into a prototype 4-D trajectory-based Airborne Separation Assurance System (ASAS) application; and test results from a batch (non-piloted) simulation of the integrated application with high traffic densities and a dynamic convective weather model. The weather model can simulate a number of pseudo-random hazardous weather patterns, such as slow- or fast-moving cells and opening or closing weather gaps, and also allows for modeling of onboard weather radar limitations in range and azimuth. The weather avoidance concept employs nested "core" and "avoid" polygons around convective weather cells, and the simulations assess the effectiveness of various avoid polygon sizes in the presence of different weather patterns, using traffic scenarios representing approximately two times the current traffic density in en-route airspace. Results from the simulation experiment show that the weather avoidance concept is effective over a wide range of weather patterns and cell speeds. Avoid polygons that are only 2-3 miles larger than their core polygons are sufficient to account for weather uncertainties in almost all cases, and traffic separation performance does not appear to degrade with the addition of weather polygon avoidance. Additional "lessons learned" from the batch simulation study are discussed in the paper, along with insights for improving the weather avoidance concept. Introduction

  9. Consolidated financial statements for fiscal year 1996

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1997-02-01

    The following overview and accompanying audited financial statements have been prepared for Fiscal Year (FY) 1996 to report the financial position and the results of operations of the Department of Energy. These statements include the consolidated Statement of Financial Position and the consolidated Statement of Operations and Changes in Net Position. The statements have been prepared in accordance with the Office of Management and Budget Bulletin No. 94-01, Form and Content for Agency Financial Statements, and were developed in accordance with the hierarchy of accounting standards described therein. The overview provides a narrative on the Department of Energy`s mission, activities, and accomplishments. Utilizing performance measures as the primary vehicle for communicating Departmental accomplishments and results, this overview discusses the most significant measures while others are discussed in the supplemental information to the financial statements.

  10. MEASUREMENT OF APPLICATION OF ISO 27001 OF CUSTOMER CELLULAR CARD CONFIDENTIALITY DATA IN PT. XYZ AREA JAKARTA

    Directory of Open Access Journals (Sweden)

    Krishna Rahadian

    2014-10-01

    Full Text Available The purpose of this study was to evaluate the effects of the process of ISO 27001 with respect to the confidentiality of customer cellular card Jakarta and to improve cellular card customer data confidentiality at PT.XYZ from data leakage of the customer data due to the third party involvement, clean-desk policy, and access right. Recommendation regarding the improvement is provided after reviewing the confidentiality of customer data. The survey in this study is conducted by questionnaire. From the evaluation results of the questionnaire, it is concluded that the larger customer data leaks are mainly caused by the external factors.

  11. Computer Security: improve software, avoid blunder

    CERN Multimedia

    Computer Security Team

    2014-01-01

    Recently, a severe vulnerability has been made public about how Apple devices are wrongly handling encryption. This vulnerability rendered SSL/TLS protection useless, and permitted attackers checking out a wireless network to capture or modify data in encrypted sessions.   In other words, all confidential data like passwords, banking information, etc. could have been siphoned off by a targeted attack. While Apple has been quick in providing adequate security patches for iOS devices and Macs, it is an excellent example of how small mistakes can lead to big security holes. Here is the corresponding code from Apple’s Open Source repository. Can you spot the issue? 1 static OSStatus 2 SSLVerifySignedServerKeyExchange(SSLContext *ctx, bool isRsa, SSLBuffer signedParams, uint8_t *signature, UInt16 signatureLen) 3 { 4              OSStatus &nb...

  12. Effects of IFRS adoption on tax avoidance

    Directory of Open Access Journals (Sweden)

    Renata Nogueira Braga

    Full Text Available ABSTRACT This study investigates the association between mandatory International Financial Reporting Standards (IFRS adoption and corporate tax avoidance. In this study, tax avoidance is defined as a reduction in the effective corporate income tax rate through tax planning activities, whether these are legal, questionable, or even illegal. Three measures of tax avoidance are used and factors at the country and firm level (that have already been associated with tax avoidance in prior research are controlled. Using samples that range from 9,389 to 15,423 publicly-traded companies from 35 countries, covering 1999 to 2014, it is found that IFRS adoption is associated with higher levels of corporate tax avoidance, even when the level of book-tax conformity required in the countries and the volume of accruals are controlled, both of which are considered potential determinants of this relationship. Furthermore, the results suggest that after IFRS adoption, firms in higher book-tax conformity environments engage more in tax avoidance than firms in lower book-tax conformity environments. It is also identified that engagement in tax avoidance after IFRS adoption derives not only from accruals management, but also from practices that do not involve accruals. The main conclusion is that companies engage more in tax avoidance after mandatory IFRS adoption.

  13. Strategic Family Therapy of Avoidant Behavior.

    Science.gov (United States)

    Burgess, Thomas A.; Hinkle, J. Scott

    1993-01-01

    Notes that Millon's biopsychosocial model asserts that socioenvironmental factors of parental or peer rejection may shape development of avoidant behavior but does not elaborate on how family system may perpetuate its existence once disorder has evolved. Presents brief overview of avoidant behavior and strategic family therapy case study.…

  14. To Tell, or Not to Tell; Confidentiality in an Iranian HIV Positive Patient: A Viewpoint

    Directory of Open Access Journals (Sweden)

    Mahshad Noroozi

    2017-08-01

    Full Text Available Confidentiality is a basic concept in medical ethics and protecting confidentiality is considered as physicians’ duty. In some occasions, this protection is in conflict with the right of the patient’s sexual partner, who should be informed about the possibility of being infected. The sexual partner being pregnant, the situation is going to be more complicated. In this paper, we present a case discussion with special ethical, legal, social, cultural, and religious aspects. According to this informing sexual partner with the patient’s assent, opt-out Human immunodeficiency virus (HIV screening in pregnant women and enhancing psychosocial and family support are highly recommended. Strategic changes in health system policies and regulations seem to be necessary as well.

  15. Controls Mitigating the Risk of Confidential Information Disclosure by Facebook: Essential Concern in Auditing Information Security

    Directory of Open Access Journals (Sweden)

    Ivan Ognyanov Kuyumdzhiev

    2014-08-01

    Full Text Available Facebook allows people to easily share information about themselves which in some cases could be classified as confidential or sensitive in the organisation they’re working for. In this paper we discuss the type of data stored by Facebook and the scope of the terms “confidential” and “sensitive data”. The intersection of these areas shows that there is high possibility for confidential data disclosure in organisations with none or ineffective security policy. This paper proposes a strategy for managing the risks of information leakage. We define five levels of controls against posting non-public data on Facebook - security policy, applications installed on employees’ workstations, specific router software or firmware, software in the cloud, Facebook itself. Advantages and disadvantages of every level are evaluated. As a result we propose developing of new control integrated in the social media.

  16. Biobanks in South Africa: A global perspective on privacy and confidentiality

    Directory of Open Access Journals (Sweden)

    Riaan Rheeder

    2017-05-01

    Full Text Available The Universal Declaration of Bioethics and Human Rights (UDBHR of the United Nations Educational, Scientific and Cultural Organization (UNESCO was adopted unanimously in 2005 by the world community as a universal guideline, according to which members of the global community were accountable to each other. Research results from UNESCO show that the UDBHR has had little or no impact in South Africa (SA. The primary objective of this article is to promote awareness of the UDBHR in SA and Africa by focusing on Article 9 of the Declaration, which accepts the right to privacy and confidentiality. For this objective to be relevant in the SA context, depends on whether the guidelines of the National Department of Health’s Ethics in Health Research: Principles, Processes and Structures of 2015 acknowledge biobanks of the universally accepted ethical guidelines on privacy and confidentiality of autonomous persons and whether these guidelines are broadly in accordance with global bioethical guidelines.

  17. Knowledge, attitudes and practice of confidentiality of patients' health records among health care professionals at Federal Medical Centre, Bida.

    Science.gov (United States)

    Adeleke, I T; Adekanye, A O; Adefemi, S A; Onawola, K A; Okuku, A G; Sheshi, E U; James-Adeniran, J A; Francis, M; Elegbe, T R O; Ayeni, A M; Tume, A A

    2011-01-01

    The quality of information shared with health care professionals depends on their ability to keep it confidential especially in this information technology age when unguided access is imminent. In view ofthis, the study described knowledge, attitude and practice of confidentiality of patients' health records amongst health care professionals at Federal Medical Centre Bida, Nigeria. A semi-structured self-administered.questionnaire on the subject was administered to 313 health professionals chosen by stratified random sampling in the hospital. Majority (161, 66.8%) of the participants were less than ten years in practice. Virtually, all (232, 96.3%) have heard about confidentiality mostly from schools (134, 55.6%), on-the-job (61, 25.3%) and from multiple sources (18, 7.5%). On responsibility for confidentiality; only 35 (14.5%) knew it is the responsibility of every health professional, while the majority; 117 (48.5%) felt it was exclusively meant for health information management professionals. Responses to issues on confidentiality range from 58.1% (revelation of documented next of kin to relatives of dead patients by staff) to 94.2% (employing the service of untrained interpreter). Very few (28, 11.6%) argued that confidentiality and privacy are not synonymous. Recommendations given to improve the practice of confidentiality include among others, observance of good health records practice by all professionals/stakeholders, continuing sensitisation of all staffandsanction against erring staff. Although, most professionals were aware of confidentiality, there appears a gap of in-depth knowledge and lack of awareness of respective responsibility towards it. However, they will do better if given the enabling environment and continuing education on the subject.

  18. Spatial confidentiality and GIS: re-engineering mortality locations from published maps about Hurricane Katrina

    Directory of Open Access Journals (Sweden)

    Leitner Michael

    2006-10-01

    Full Text Available Abstract Background Geographic Information Systems (GIS can provide valuable insight into patterns of human activity. Online spatial display applications, such as Google Earth, can democratise this information by disseminating it to the general public. Although this is a generally positive advance for society, there is a legitimate concern involving the disclosure of confidential information through spatial display. Although guidelines exist for aggregated data, little has been written concerning the display of point level information. The concern is that a map containing points representing cases of cancer or an infectious disease, could be re-engineered back to identify an actual residence. This risk is investigated using point mortality locations from Hurricane Katrina re-engineered from a map published in the Baton Rouge Advocate newspaper, and a field team validating these residences using search and rescue building markings. Results We show that the residence of an individual, visualized as a generalized point covering approximately one and half city blocks on a map, can be re-engineered back to identify the actual house location, or at least a close neighbour, even if the map contains little spatial reference information. The degree of re-engineering success is also shown to depend on the urban characteristic of the neighborhood. Conclusion The results in this paper suggest a need to re-evaluate current guidelines for the display of point (address level data. Examples of other point maps displaying health data extracted from the academic literature are presented where a similar re-engineering approach might cause concern with respect to violating confidentiality. More research is also needed into the role urban structure plays in the accuracy of re-engineering. We suggest that health and spatial scientists should be proactive and suggest a series of point level spatial confidentiality guidelines before governmental decisions are made

  19. Safeguarding critical e-documents implementing a program for securing confidential information assets

    CERN Document Server

    Smallwood, Robert F

    2012-01-01

    Practical, step-by-step guidance for corporations, universities and government agencies to protect and secure confidential documents and business records Managers and public officials are looking for technology and information governance solutions to "information leakage" in an understandable, concise format. Safeguarding Critical E-Documents provides a road map for corporations, governments, financial services firms, hospitals, law firms, universities and other organizations to safeguard their internal electronic documents and private communications.Provides practical, step-by-step guidance o

  20. Approaching confidentiality at a familial level in genomic medicine: a focus group study with healthcare professionals.

    Science.gov (United States)

    Dheensa, Sandi; Fenwick, Angela; Lucassen, Anneke

    2017-02-03

    Clinical genetics guidelines from 2011 conceptualise genetic information as confidential to families, not individuals. The normative consequence of this is that the family's interest is the primary consideration and genetic information is shared unless there are good reasons not to do so. We investigated healthcare professionals' (HCPs') views about, and reasoning around, individual and familial approaches to confidentiality and how such views influenced their practice. 16 focus groups with 80 HCPs working in/with clinical genetics services were analysed, drawing on grounded theory. Participants raised seven problems with, and arguments against, going beyond the individual approach to confidentiality. These problems fell into two overlapping categories: 'relationships' and 'structures'. Most participants had never considered ways to-or thought it was impossible to-treat familial genetic information and personal information differently. They worried that putting the familial approach into practice could disrupt family dynamics and erode patient trust in the health service. They also thought they had insufficient resources to share information and feared that sharing might change the standard of care and make them more vulnerable to liability. A familial approach to confidentiality has not been accepted or adopted as a standard, but wider research suggests that some of the problems HCPs perceived are surmountable and sharing in the interest of the family can be achieved. However, further research is needed to explore how personal and familial genetic information can be separated in practice. Our findings are relevant to HCPs across health services who are starting to use genome tests as part of their routine investigations. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://www.bmj.com/company/products-services/rights-and-licensing/.

  1. Confidentiality protections versus collaborative care in the treatment of substance use disorders

    OpenAIRE

    Manuel, Jennifer K; Newville, Howard; Larios, Sandra E; Sorensen, James L

    2013-01-01

    Abstract Practitioners in federally-assisted substance use disorder (SUD) treatment programs are faced with increasingly complex decisions when addressing patient confidentiality issues. Recent policy changes, intended to make treatment more available and accessible, are having an impact on delivery of SUD treatment in the United States. The addition of electronic health records provides opportunity for more rapid and comprehensive communication between patients’ primary and SUD ...

  2. Legislative Bans Analysis of the Confidential Citizens’ Assistance to the ORA According to the Contract

    Directory of Open Access Journals (Sweden)

    Tambovtsev A. I.

    2013-05-01

    Full Text Available The article deals with the research of legislative bans on drawing the citizens to confidential assistance according to the contract provided for by Article 17 “On operational search activity”. The author analyses different scientific standpoints concerning the reasons of such legislative restrictions, gives the legal and terminological evaluation of the notions used in the norm considered, offers his own approaches to the decision of some problems revealed

  3. Moving Obstacle Avoidance for Unmanned Aerial Vehicles

    Science.gov (United States)

    Lin, Yucong

    There has been a vast increase in applications of Unmanned Aerial Vehicles (UAVs) in civilian domains. To operate in the civilian airspace, a UAV must be able to sense and avoid both static and moving obstacles for flight safety. While indoor and low-altitude environments are mainly occupied by static obstacles, risks in space of higher altitude primarily come from moving obstacles such as other aircraft or flying vehicles in the airspace. Therefore, the ability to avoid moving obstacles becomes a necessity for Unmanned Aerial Vehicles. Towards enabling a UAV to autonomously sense and avoid moving obstacles, this thesis makes the following contributions. Initially, an image-based reactive motion planner is developed for a quadrotor to avoid a fast approaching obstacle. Furthermore, A Dubin's curve based geometry method is developed as a global path planner for a fixed-wing UAV to avoid collisions with aircraft. The image-based method is unable to produce an optimal path and the geometry method uses a simplified UAV model. To compensate these two disadvantages, a series of algorithms built upon the Closed-Loop Rapid Exploratory Random Tree are developed as global path planners to generate collision avoidance paths in real time. The algorithms are validated in Software-In-the-Loop (SITL) and Hardware-In-the-Loop (HIL) simulations using a fixed-wing UAV model and in real flight experiments using quadrotors. It is observed that the algorithm enables a UAV to avoid moving obstacles approaching to it with different directions and speeds.

  4. Individual differences in women's rape avoidance behaviors.

    Science.gov (United States)

    McKibbin, William F; Shackelford, Todd K; Miner, Emily J; Bates, Vincent M; Liddle, James R

    2011-04-01

    Rape can exact severe psychological, physical, and reproductive costs on women, and likely was a recurrent adaptive problem over human evolutionary history. Therefore, women may have evolved psychological mechanisms that motivate rape avoidance behaviors. Guided heuristically by an evolutionary perspective, we tested the hypothesis that women's rape avoidance behaviors would vary with several individual difference variables. Specifically, we predicted that rape avoidance behaviors would covary positively with (1) women's attractiveness, (2) women's involvement in a committed romantic relationship, and (3) the number of family members living nearby. We also predicted that women's rape avoidance behaviors would covary negatively with age. We administered the Rape Avoidance Inventory (McKibbin et al., Pers Indiv Differ 39:336-340, 2009) and a demographic survey to a sample of women (n = 144). The results of correlational and regression analyses were consistent with the predictions, with the exception that women's rape avoidance behaviors did not covary with women's age. Discussion highlighted limitations of the current research and directions for future research on women's rape avoidance psychology and behaviors.

  5. FEATURES OF CONSOLIDATED FINANCIAL STATEMENTS: FOREIGN EXPERIENCE

    Directory of Open Access Journals (Sweden)

    S. V. KUCHER

    2016-12-01

    Full Text Available The article researches the features of preparation and submission of the consolidated financial statements of the world countries of different systems of accounting standardization in order to identify the areas of accounting improvement for the process of consolidation of financial reporting indicators. The main problems of consolidated financial statements preparation by business entities in Ukraine are determined. The author determines the theoretical and practical problems of consolidation of financial statements of organizational and methodical character. The comparative analysis of the features of standardization process of financial statements consolidation in the world countries is carried out. The main differences in the requirements for the formation of consolidated financial statements indicators of such countries as the French Republic, the Federal Republic of Germany, the Republic of Belarus and the People’s Republic of China are outlined. The main directions of scientific researches on the improvement of accounting and analytical support for the preparation of consolidated financial statements are formed.

  6. A Policy-Based Framework for Preserving Confidentiality in BYOD Environments: A Review of Information Security Perspectives

    Directory of Open Access Journals (Sweden)

    Chalee Vorakulpipat

    2017-01-01

    Full Text Available Today, many organizations allow their employees to bring their own smartphones or tablets to work and to access the corporate network, which is known as a bring your own device (BYOD. However, many such companies overlook potential security risks concerning privacy and confidentiality. This paper provides a review of existing literature concerning the preservation of privacy and confidentiality, with a focus on recent trends in the use of BYOD. This review spans a large spectrum of information security research, ranging from management (risk and policy to technical aspects of privacy and confidentiality in BYOD. Furthermore, this study proposes a policy-based framework for preserving data confidentiality in BYOD. This framework considers a number of aspects of information security and corresponding techniques, such as policy, location privacy, centralized control, cryptography, and operating system level security, which have been omitted in previous studies. The main contribution is to investigate recent trends concerning the preservation of confidentiality in BYOD from the perspective of information security and to analyze the critical and comprehensive factors needed to strengthen data privacy in BYOD. Finally, this paper provides a foundation for developing the concept of preserving confidentiality in BYOD and describes the key technical and organizational challenges faced by BYOD-friendly organizations.

  7. A right to confidentiality or a duty to disclose? Ethical guidance for conducting prevention research with children and adolescents.

    Science.gov (United States)

    Hiriscau, Ioana E; Stingelin-Giles, Nicola; Stadler, Christina; Schmeck, Klaus; Reiter-Theil, Stella

    2014-06-01

    Conducting prevention research with children and adolescents raises ethical challenges especially regarding confidentiality. Research with children and adolescents often applies methodologies which aims at the disclosure of sensitive information about practices that impact on adolescent mental and physical health such as sexual activity, smoking, alcohol consumption, illegal drug use, self-damaging and suicidal behaviour (ideation and attempts). The scope of the article is to review normative documents that cover topics relevant for confidentiality when conducting research with children and adolescents. A systematic literature search in MEDLINE was performed to identify relevant international and European guidelines and codes of ethics that cover health, behavioural and social science research. Additionally, the European Research Ethics website was consulted for double check. However, none of the documents aimed at biomedical, behavioural or social research offers concrete support in resolving practical research ethics problems regarding confidentiality. The codes show a lack of clarity in any circumstances in which the researcher might have an obligation to breach confidentiality by disclosing sensitive information. Only little information is given on what kind of disclosed information, if disclosed, might justify breaching confidentiality. The findings prove a need for normative documents to address the ethical questions regarding confidentiality arising in research practice explicitly and specifically. Moreover, further forms of ethical guidance should be developed to support ethical research with children and adolescents.

  8. Genesis and Development of Consolidated Financial Statements

    OpenAIRE

    Kostyantyn Bezverkhiy

    2015-01-01

    In the context of economy globalization it is the mission of consolidated financial statements to meet demands of users for financial information about activities of a company group as one company. The article is devoted to study of genesis and development of consolidated financial statements of companies. Historical prerequisites of genesis of consolidated financial statements are shown as well as factors which conduced to their spreading. The approaches are elucidated to preparation of cons...

  9. Saskatchewan Energy Holdings Ltd. consolidated financial statements

    International Nuclear Information System (INIS)

    1991-01-01

    The consolidated financial statements of Saskatchewan Energy Holdings Ltd. (formerly Saskatchewan Energy Corporation) as of December 31, 1990, and the consolidated statements of earnings and retained earnings and changes in cash position for the year are presented. Data include an inventory of supplies, natural gas in storage, property, plant and equipment. Financial statements are also presented for the year ending December 31, 1989, with comparative figures for the seven months ending December 31, 1988

  10. Financial Statement Fraud Detection using Text Mining

    OpenAIRE

    Rajan Gupta; Nasib Singh Gill

    2013-01-01

    Data mining techniques have been used enormously by the researchers’ community in detecting financial statement fraud. Most of the research in this direction has used the numbers (quantitative information) i.e. financial ratios present in the financial statements for detecting fraud. There is very little or no research on the analysis of text such as auditor’s comments or notes present in published reports. In this study we propose a text mining approach for detecting financial statement frau...

  11. Position Statement on Active Outdoor Play

    OpenAIRE

    Tremblay, Mark S.; Gray, Casey; Babcock, Shawna; Barnes, Joel; Costas Bradstreet, Christa; Carr, Dawn; Chabot, Guylaine; Choquette, Louise; Chorney, David; Collyer, Cam; Herrington, Susan; Janson, Katherine; Janssen, Ian; Larouche, Richard; Pickett, William

    2015-01-01

    A diverse, cross-sectorial group of partners, stakeholders and researchers, collaborated to develop an evidence-informed Position Statement on active outdoor play for children aged 3–12 years. The Position Statement was created in response to practitioner, academic, legal, insurance and public debate, dialogue and disagreement on the relative benefits and harms of active (including risky) outdoor play. The Position Statement development process was informed by two systematic reviews, a critic...

  12. Ethical aspects in tissue research: thematic analysis of ethical statements to the research ethics committee

    Science.gov (United States)

    2012-01-01

    Background Many studies have been published about ethics committees and the clarifications requested about the submitted applications. In Finland, ethics committees require a separate statement on ethical aspects of the research in applications to the ethics committee. However, little is known about how researchers consider the ethical aspects of their own studies. Methods The data were collected from all the applications received by the official regional ethics committee in the Hospital District of Northern Savo during 2004–2009 (n = 688). These included a total of 56 studies involving research on tissue other than blood. The statements by the researchers about the ethics about their own research in these applications were analyzed by thematic content analysis under the following themes: recruitment, informed consent, risks and benefits, confidentiality and societal meaning. Results The researchers tended to describe recruitment and informed consent process very briefly. Usually these descriptions simply stated who the recruiter was and that written consent would be required. There was little information provided on the recruitment situation and on how the study recruiters would be informed. Although most of the studies were clinical, the possibility was hardly ever discussed that patients could fail to distinguish between care and research. Conclusion The written guidelines, available on the webpages of the ethics committee, do not seem to be enough to help researchers achieve this goal. In addition to detailed guidelines for researchers, investigators need to be taught to appreciate the ethical aspects in their own studies. PMID:22873761

  13. Statement

    International Nuclear Information System (INIS)

    Park, H.

    2003-01-01

    Full text: I am glad to be here for this presentation this morning. As you know, the Republic of Korea has had much experience in the construction and operation of nuclear power plants (NPPs), but we have no experience in decommissioning. The first research reactor in the Republic of Korea, KRR-1 TRIGA Mark II, first started operation in 1962, and the second one, KRR-2 TRIGA Mark III, first started in 1972. Operation of both of these was phased out in 1995 when they reached the end of their life span and also due to the operation of a new research reactor, HANARO (High-flux Advanced Neutron Application Reactor), at the site of the Korea Atomic Energy Research Institute (KAERI) in Taejon. The decommissioning project for both research reactors was launched in January 1997 and will be completed in December 2008. KAERI has to choose the immediate decommissioning approach because of the following reasons. First, the land and reactor buildings were sold to the Korea Electric Power Co. (KEPCO) in 1985. By the terms of the Atomic Energy Act, KAERI as the operator must decommission the reactor. Second, research and development related to decommissioning should be carried out for secure NPP decommissioning that is upcoming. Lastly, KAERI must prevent the spread of radiation hazards into the reactor building's environs, which is rapidly becoming a densely populated area because of urbanization. Most of the radioactive wastes produced during decommissioning will be packed in 4 m 3 ISO type containers, which will then be stored until they are transported to the national disposal site for low and intermediate level waste. Even though it is not certain when the disposal site will be operational, decommissioning should not be deferred. Both of the reactors and related facilities are not in good condition because of minimum budgeting for the maintenance of the facilities. The most important issue is how to keep radioactive materials in a safe and well controlled condition. Therefore, KAERI decided upon immediate decommissioning of both research reactors. Currently, the Republic of Korea has 17 NPPs in operation.They consist of 13 PWR and 4 CANDU type PHWR reactors.The first NPP in the Republic of Korea was Kori-1, which started operation in 1978. Taking into account its design life span of 30 years, it will be shut down in 2008. But the utility company for the NPP, the Korea Hydro-Nuclear Co. (KHNC), is promoting the extension of its life. However, it is expected that there will be many difficulties in obtaining public acceptance. In considering the decommissioning of the NPP, it is recommended that heavily populated countries such as the Republic of Korea choose immediate decommissioning. According to the power supply plan of Korea, 11 more NPPs are being planned for construction and operation until the year 2015. However, it is not easy to get new sites for them. Therefore, it is desirable to locate the new reactors at current sites. Most of the sites have duplicate reactors, but their life spans are not comparable with each other. Therefore, decommissioning should wait until both reactors at the site have reached the end of their life. After decommissioning of the retired reactor, it is desirable to install the Korean Standard Nuclear Plant (KSNP), which has a capacity of 1400 MW(e). This will be one way of resolving the siting problem and reducing the cost of decommissioning and construction. If the Republic of Korea decides to start decommissioning NPPs in 2013, it is necessary to secure the necessary and related technologies for successful decommissioning through R and D. Therefore, during the decommissioning of KRR-1 and KRR-2, basic technologies will be developed and demonstrated under middle to long term R and D programmes. The object of the first stage of the programme, from August 2001 to March 2004, is technology development related to the decommissioning of the research reactor. During the second stage of the programme, April 2004 to March 2007, the basic techniques will be developed for the decommissioning of NPPs.Thank you for your attention. (author)

  14. New statement of leave format

    CERN Multimedia

    HR Department

    2009-01-01

    Following the communication of the Standing Concertation Committee published in Weekly Bulletin No. 18-19 of 27 April 2009, the current statement of leave on monthly pay slips has been replaced with the EDH Leave Transactions report that displays the up-to-date situation of individual leave balances at all times. The report is available on EDH. Additionally, the layout of the pay slip has been modernised. The new version of the pay slip will be send out from September 2009 onwards. Finance and Purchasing Department, Personnel Accounting Human Resources Department, Organisation and Procedures General Infrastructure Services Department, Administrative Information Services

  15. Statement of the Pugwash council

    International Nuclear Information System (INIS)

    1997-01-01

    In the fiftieth year since the first and only use of nuclear weapons in war, the evidence of actual progress towards the elimination of such weapons is decidedly mixed. The statement of the Pugwash council involves the following issues: agenda for a nuclear-weapon-free world; reduction of proliferation risks; monitoring, control and reducing arms trade, transfer and production; global governance as a cooperative activity of states and non-governmental organisations to address the questions of global security; security in the Asia-Pacific region; and energy-environment-development interactions

  16. How to avoid overheating during exercise

    Science.gov (United States)

    ... patientinstructions/000865.htm How to avoid overheating during exercise To use the sharing features on this page, ... condition can get heat illness. Stay Cool During Exercise Try these tips to help prevent heat-related ...

  17. Dual Eligibles and Potentially Avoidable Hospitalizations

    Data.gov (United States)

    U.S. Department of Health & Human Services — About 25 percent of the hospitalizations for dual eligible beneficiaries in 2005 were potentially avoidable. Medicare and Medicaid spending for those potentially...

  18. USAID IT Reform Cost Savings/Avoidance

    Data.gov (United States)

    US Agency for International Development — The Office of the Chief Information Officer in the Management Bureau of USAID launched initiatives designed for IT cost savings and avoidance. This dataset includes...

  19. GSA IT Reform Cost Savings/Avoidance

    Data.gov (United States)

    General Services Administration — GSA IT provides data related to Agency IT initiatives that save or avoid expenditures. This data is provided as a requirement of OMB's Integrated Data Collection...

  20. Food Waste Avoidance Actions in Food Retailing

    DEFF Research Database (Denmark)

    Kulikovskaja, Viktorija; Aschemann-Witzel, Jessica

    2017-01-01

    Food waste occurs throughout the entire food supply chain, from production to consumption of food in households. Retailers are in a unique position to contribute to food waste avoidance, not only by minimizing the amount of waste in their distribution channels but also by influencing consumer...... attitudes and behaviors. This explorative study aims to identify which food waste avoidance actions are conducted by retailers in Denmark, to which extent, and how they vary across food categories and supermarket chain. Based on an analysis of secondary and empirical data collected via observations...... at retail stores, the authors identify 22 food waste avoidance actions in Danish retail. The results provide new insights into food waste avoidance in retail. Based on the findings, suggestions for further research directions are developed that should serve to identify the most efficient customer targeted...

  1. Directional Collision Avoidance in Ad Hoc Networks

    National Research Council Canada - National Science Library

    Wang, Yu; Garcia-Luna-Aceves, J. J

    2004-01-01

    This paper analyzes the performance of directional collision avoidance schemes, in which antenna systems are used to direct the transmission and reception of control and data packets in channel access...

  2. The challenges for scientists in avoiding plagiarism.

    Science.gov (United States)

    Fisher, E R; Partin, K M

    2014-01-01

    Although it might seem to be a simple task for scientists to avoid plagiarism and thereby an allegation of research misconduct, assessment of trainees in the Responsible Conduct of Research and recent findings from the National Science Foundation Office of Inspector General regarding plagiarism suggests otherwise. Our experiences at a land-grant academic institution in assisting researchers in avoiding plagiarism are described. We provide evidence from a university-wide multi-disciplinary course that understanding how to avoid plagiarism in scientific writing is more difficult than it might appear, and that a failure to learn the rules of appropriate citation may cause dire consequences. We suggest that new strategies to provide training in avoiding plagiarism are required.

  3. Toddlers at the Table: Avoiding Power Struggles

    Science.gov (United States)

    ... try a new food being offered. Avoid the Junk Food Trap Toddlers need to eat healthy to get ... need. Candy, potato chips, and other low-nutrient "junk foods" shouldn't be part of their diet because ...

  4. When Should a Mother Avoid Breastfeeding?

    Science.gov (United States)

    ... submit" name="commit" type="submit" value="Submit" /> Breastfeeding Information for Families Breastfeeding Hotline The HHS Office ... Tweet Share Compartir When should a mother avoid breastfeeding? Health professionals agree that human milk provides the ...

  5. Avoiding Anemia: Boost Your Red Blood Cells

    Science.gov (United States)

    ... Issues Subscribe January 2014 Print this issue Avoiding Anemia Boost Your Red Blood Cells En español Send ... Disease When Blood Cells Bend Wise Choices Preventing Anemia To prevent or treat iron-deficiency anemia: Eat ...

  6. Mindfulness and experiential avoidance as predictors of posttraumatic stress disorder avoidance symptom severity.

    Science.gov (United States)

    Thompson, Brian L; Waltz, Jennifer

    2010-05-01

    Mindfulness reflects an awareness of present moment experiences through an attitude of acceptance and openness (Bishop et al., 2004; Cardaciotto, Herbert, Forman, Moitra, & Farrow, 2008). Experiential avoidance, by contrast, refers to attempts to change, alter, or avoid private experiences (e.g., thoughts, feelings, sensations), and it is believed to underlie a number of psychopathologies, including PTSD (Hayes, Wilson, Gifford, Follette, & Strosahl, 1996). We were interested in the ability of mindfulness to predict the variance of PTSD avoidance symptom severity above and beyond experiential avoidance. 378 introductory psychology students were administered self-report measures of PTSD, mindfulness, experiential avoidance, thought suppression, alexithymia, and avoidant coping. Mindfulness, specifically nonjudgment of experiences, accounted for a unique portion of the variance in PTSD avoidance symptoms. Copyright 2010 Elsevier Ltd. All rights reserved.

  7. Banking deregulation and corporate tax avoidance

    Directory of Open Access Journals (Sweden)

    Bill B. Francis

    2017-06-01

    Full Text Available We investigate whether tax avoidance substitutes for external financing. We exploit interstate banking deregulation as a quasi-external shock to examine whether firms engage in less tax avoidance after banking deregulation, because of cheaper and easier access to credit from banks. We find no empirical evidence to support this substitutive relation, even for firms with higher financial constraints or firms with higher external financing dependence.

  8. Mobile Robot Collision Avoidance in Human Environments

    Directory of Open Access Journals (Sweden)

    Lingqi Zeng

    2013-01-01

    Full Text Available Collision avoidance is a fundamental requirement for mobile robots. Avoiding moving obstacles (also termed dynamic obstacles with unpredictable direction changes, such as humans, is more challenging than avoiding moving obstacles whose motion can be predicted. Precise information on the future moving directions of humans is unobtainable for use in navigation algorithms. Furthermore, humans should be able to pursue their activities unhindered and without worrying about the robots around them. In this paper, both active and critical regions are used to deal with the uncertainty of human motion. A procedure is introduced to calculate the region sizes based on worst-case avoidance conditions. Next, a novel virtual force field-based mobile robot navigation algorithm (termed QVFF is presented. This algorithm may be used with both holonomic and nonholonomic robots. It incorporates improved virtual force functions for avoiding moving obstacles and its stability is proven using a piecewise continuous Lyapunov function. Simulation and experimental results are provided for a human walking towards the robot and blocking the path to a goal location. Next, the proposed algorithm is compared with five state-of-the-art navigation algorithms for an environment with one human walking with an unpredictable change in direction. Finally, avoidance results are presented for an environment containing three walking humans. The QVFF algorithm consistently generated collision-free paths to the goal.

  9. Objectives of Financial Statements. Report of the Study Group on the Objectives of Financial Statements.

    Science.gov (United States)

    American Inst. of Certified Public Accountants, New York, NY.

    This report discusses the objectives of financial statements. Emphasis is placed on the function of objectives; users, their goals, and their information needs; the primary enterprise goal and earning power; accountability and financial statements; financial statements--reporting on the goal attainment of business enterprises; financial…

  10. WA10 Working in partnership with people with learning disabilities: academics and people with learning disabilities working together to disseminate the findings of a confidential inquiry into deaths of people with learning disabilities through film.

    Science.gov (United States)

    Russ, Lesley

    2015-04-01

    In England, between 2010-2013, a Confidential Inquiry into premature Deaths of People with Learning Disabilities was commissioned by the Department of Health. This took place in SW England led by Norah Fry Research Centre at Bristol University. Findings from the investigations into 247 deaths included that men with learning disabilities die, on average 13 years sooner and women, on average 20 years sooner, than the general population. Over 1/3 (37%) were found to be avoidable, being amenable to good quality healthcare. A number of key recommendations were made which required understanding by a range of audiences including people with learning disabilities and their carers. This workshop will demonstrate how academics can work with actors with learning disabilities to disseminate research findings about a sensitive subject in a thought provoking and accessible way. Academics worked with the MISFITs theatre company to make a DVD about the findings and recommendations of the Confidential Inquiry. The DVD presents the findings of the Confidential Inquiry through the stories of John, Bill, Karen and Emily. It powerfully illustrates the importance of diagnosing and treating illness of people with learning disabilities in a timely and appropriate manner and highlights the measures that could be taken to reduce premature deaths in this population. The session provides an example of how the voices of people with learning disabilities can communicate research messages effectively to people with learning disabilities, health and social care practitioners and others who support the learning disability population. © 2015, Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://group.bmj.com/group/rights-licensing/permissions.

  11. Position Statement on Active Outdoor Play

    Science.gov (United States)

    Tremblay, Mark S.; Gray, Casey; Babcock, Shawna; Barnes, Joel; Costas Bradstreet, Christa; Carr, Dawn; Chabot, Guylaine; Choquette, Louise; Chorney, David; Collyer, Cam; Herrington, Susan; Janson, Katherine; Janssen, Ian; Larouche, Richard; Pickett, William; Power, Marlene; Sandseter, Ellen Beate Hansen; Simon, Brenda; Brussoni, Mariana

    2015-01-01

    A diverse, cross-sectorial group of partners, stakeholders and researchers, collaborated to develop an evidence-informed Position Statement on active outdoor play for children aged 3–12 years. The Position Statement was created in response to practitioner, academic, legal, insurance and public debate, dialogue and disagreement on the relative benefits and harms of active (including risky) outdoor play. The Position Statement development process was informed by two systematic reviews, a critical appraisal of the current literature and existing position statements, engagement of research experts (N = 9) and cross-sectorial individuals/organizations (N = 17), and an extensive stakeholder consultation process (N = 1908). More than 95% of the stakeholders consulted strongly agreed or somewhat agreed with the Position Statement; 14/17 participating individuals/organizations endorsed it; and over 1000 additional individuals and organizations requested their name be listed as a supporter. The final Position Statement on Active Outdoor Play states: “Access to active play in nature and outdoors—with its risks— is essential for healthy child development. We recommend increasing children’s opportunities for self-directed play outdoors in all settings—at home, at school, in child care, the community and nature.” The full Position Statement provides context for the statement, evidence supporting it, and a series of recommendations to increase active outdoor play opportunities to promote healthy child development. PMID:26062040

  12. ICCE Publishes Statement on Software Copyright Violations.

    Science.gov (United States)

    Electronic Learning, 1983

    1983-01-01

    The Policy Statement on Network and Multiple Machine Software of the International Council for Computers in Education (ICCE) calls for cooperation between educators, software developers, and vendors in preventing software piracy. This summary includes a suggested district policy statement on software copyright. (MBR)

  13. 14 CFR 313.6 - Energy statements.

    Science.gov (United States)

    2010-01-01

    ... action taken or to be taken upon energy efficiency and conservation. The administrative law judge or the... REGULATIONS IMPLEMENTATION OF THE ENERGY POLICY AND CONSERVATION ACT § 313.6 Energy statements. (a) Each major... 14 Aeronautics and Space 4 2010-01-01 2010-01-01 false Energy statements. 313.6 Section 313.6...

  14. 78 FR 48672 - Environmental Impacts Statements;

    Science.gov (United States)

    2013-08-09

    ... ENVIRONMENTAL PROTECTION AGENCY [ER-FRL-9010-5] Environmental Impacts Statements; Notice of Availability Responsible Agency: Office of Federal Activities, General Information (202) 564-7146 or http://www.epa.gov/compliance/nepa/ . Weekly receipt of Environmental Impact Statements Filed 07/29/2013 Through...

  15. 75 FR 8988 - Environmental Impact Statements; Availability

    Science.gov (United States)

    2010-02-26

    ... DEPARTMENT OF THE INTERIOR Environmental Impact Statements; Availability AGENCY: National Park Service. ACTION: Notice of availability for the Record of Decision on the Final Environmental Impact...) for the final Environmental Impact Statement (EIS) for the disposition of the Bureau of Mines property...

  16. 7 CFR 4279.137 - Financial statements.

    Science.gov (United States)

    2010-01-01

    ... accordance with Generally Accepted Accounting Principles will be required. (b) If specific circumstances... 7 Agriculture 15 2010-01-01 2010-01-01 false Financial statements. 4279.137 Section 4279.137... § 4279.137 Financial statements. (a) The lender will determine the type and frequency of submission of...

  17. Accept & Reject Statement-Based Uncertainty Models

    NARCIS (Netherlands)

    E. Quaeghebeur (Erik); G. de Cooman; F. Hermans (Felienne)

    2015-01-01

    textabstractWe develop a framework for modelling and reasoning with uncertainty based on accept and reject statements about gambles. It generalises the frameworks found in the literature based on statements of acceptability, desirability, or favourability and clarifies their relative position. Next

  18. Applying Statement 34's Capital Asset Requirements.

    Science.gov (United States)

    Finden, Randal

    2001-01-01

    Discusses common issues and offers recommendations related to revisions in Governmental Accounting Standards Board Statement 34 wherein the financial reporting of the general fixed-assets account group is eliminated and instead a school district's general capital assets are reported and depreciated on the new statement of net assets and statement…

  19. Position Statement on Active Outdoor Play

    Directory of Open Access Journals (Sweden)

    Mark S. Tremblay

    2015-06-01

    Full Text Available A diverse, cross-sectorial group of partners, stakeholders and researchers, collaborated to develop an evidence-informed Position Statement on active outdoor play for children aged 3–12 years. The Position Statement was created in response to practitioner, academic, legal, insurance and public debate, dialogue and disagreement on the relative benefits and harms of active (including risky outdoor play. The Position Statement development process was informed by two systematic reviews, a critical appraisal of the current literature and existing position statements, engagement of research experts (N = 9 and cross-sectorial individuals/organizations (N = 17, and an extensive stakeholder consultation process (N = 1908. More than 95% of the stakeholders consulted strongly agreed or somewhat agreed with the Position Statement; 14/17 participating individuals/organizations endorsed it; and over 1000 additional individuals and organizations requested their name be listed as a supporter. The final Position Statement on Active Outdoor Play states: “Access to active play in nature and outdoors—with its risks— is essential for healthy child development. We recommend increasing children’s opportunities for self-directed play outdoors in all settings—at home, at school, in child care, the community and nature.” The full Position Statement provides context for the statement, evidence supporting it, and a series of recommendations to increase active outdoor play opportunities to promote healthy child development.

  20. Position Statement on Active Outdoor Play.

    Science.gov (United States)

    Tremblay, Mark S; Gray, Casey; Babcock, Shawna; Barnes, Joel; Bradstreet, Christa Costas; Carr, Dawn; Chabot, Guylaine; Choquette, Louise; Chorney, David; Collyer, Cam; Herrington, Susan; Janson, Katherine; Janssen, Ian; Larouche, Richard; Pickett, William; Power, Marlene; Sandseter, Ellen Beate Hansen; Simon, Brenda; Brussoni, Mariana

    2015-06-08

    A diverse, cross-sectorial group of partners, stakeholders and researchers, collaborated to develop an evidence-informed Position Statement on active outdoor play for children aged 3-12 years. The Position Statement was created in response to practitioner, academic, legal, insurance and public debate, dialogue and disagreement on the relative benefits and harms of active (including risky) outdoor play. The Position Statement development process was informed by two systematic reviews, a critical appraisal of the current literature and existing position statements, engagement of research experts (N=9) and cross-sectorial individuals/organizations (N=17), and an extensive stakeholder consultation process (N=1908). More than 95% of the stakeholders consulted strongly agreed or somewhat agreed with the Position Statement; 14/17 participating individuals/organizations endorsed it; and over 1000 additional individuals and organizations requested their name be listed as a supporter. The final Position Statement on Active Outdoor Play states: "Access to active play in nature and outdoors--with its risks--is essential for healthy child development. We recommend increasing children's opportunities for self-directed play outdoors in all settings--at home, at school, in child care, the community and nature." The full Position Statement provides context for the statement, evidence supporting it, and a series of recommendations to increase active outdoor play opportunities to promote healthy child development.

  1. Rape avoidance behavior among Slovak women.

    Science.gov (United States)

    Prokop, Pavol

    2013-05-28

    Rape has been a recurrent adaptive problem for many species, including humans. Rape is costly to women in terms of disease transmission, partner abandonment, and unwanted pregnancy (among other costs). Therefore, behavioral strategies which allow women to avoid coercive men may have been favored by selection. In line with this evolutionary reasoning, the current research documented that physically stronger women and those in a committed romantic relationship reported more rape avoidance behavior. In addition, virgin women tended to perform more rape avoidance behavior compared with their non-virgin counterparts. Women with high conception risk perceived themselves as physically stronger, which may protect them against a potential rapist. Fear of unwanted pregnancy from rape decreased as age increased, reflecting higher fertility among younger participants. However, older women reported more rape avoidance behavior, which contradicts evolutionary predictions. The results provide some support for evolutionary hypotheses of rape avoidance behavior which suggest that woman's perception of rape is influenced by parental investment and perceived physical condition.

  2. DNA elasticity: topology of self-avoidance

    International Nuclear Information System (INIS)

    Samuel, Joseph; Sinha, Supurna; Ghosh, Abhijit

    2006-01-01

    We present a theoretical treatment of DNA stretching and twisting experiments, in which we discuss global topological subtleties of self-avoiding ribbons and provide an underlying justification for the worm-like rod chain (WLRC) model proposed by Bouchiat and Mezard. Some theoretical points regarding the WLRC model are clarified: the 'local writhe formula' and the use of an adjustable cut-off parameter to 'regularize' the model. Our treatment brings out the precise relation between the worm-like chain (WLC), the paraxial worm-like chain (PWLC) and the WLRC models. We describe the phenomenon of 'topological untwisting' and the resulting collapse of link sectors in the WLC model and note that this leads to a free energy profile periodic in the applied link. This periodicity disappears when one takes into account the topology of self-avoidance or at large stretch forces (paraxial limit). We note that the difficult non-local notion of self-avoidance can be replaced (in an approximation) by the simpler local notion of 'south avoidance'. This gives an explanation for the efficacy of the approach of Bouchiat and Mezard in explaining the 'hat curves' using the WLRC model, which is a south avoiding model. We propose a new class of experiments to probe the continuous transition between the periodic and aperiodic behaviour of the free energy

  3. Peer conflict avoidance: associations with loneliness, social anxiety, and social avoidance.

    Science.gov (United States)

    Johnson, H D; LaVoie, J C; Spenceri, M C; Mahoney-Wernli, M A

    2001-02-01

    Failure to resolve peer conflict is associated with children's reports of loneliness, social anxiety, and social avoidance. Although these relationships are well established, researchers have not examined the association between the avoidance of peer conflict and various adjustment characteristics. The current study examined the association between avoidance of conflict and measures of loneliness, social anxiety, and social avoidance for 59 pupils in Grade 4 (31 boys and 28 girls) and 47 in Grade 8 (22 boys and 25 girls). Volunteers indicated that conflict avoidance based on autonomy, e.g., independence issues, and interpersonal issues, e.g., closeness and cohesion, was associated with scores on loneliness for boys and girls, respectively. Conflict avoidance for emotional and physical well-being and fear of punishment was associated with increased reports of loneliness and social anxiety for children in Grade 4.

  4. Control of Bank Consolidated Financial Statements Quality

    Directory of Open Access Journals (Sweden)

    Margarita S. Ambarchyan

    2013-01-01

    Full Text Available The author presents the multiple linear regression model of bank consolidated financial statements quality. The article considers six characteristics that can be used to estimate the level of bank consolidated financial statements quality. The multiple linear regression model was developed, using the results of point-based system of consolidated financial statements of thirty European bank and financial groups on the basis of the developed characteristics. The author offers to use the characteristic significance factor in the process of consolidated financial statements appraisal by points. The constructed regression model is checked on accuracy and statistical significance. The model can be used by internal auditors and financial analytics as an instrument for bank and non-bank consolidated financial statements quality control

  5. Disrupted avoidance learning in functional neurological disorder: Implications for harm avoidance theories

    Directory of Open Access Journals (Sweden)

    Laurel S. Morris

    2017-01-01

    Conclusions: FND patients had impaired instrumental avoidance learning, findings that parallel previous observations of impaired action-outcome binding. FND patients further show enhanced behavioural and neural sensitivity to negative information. However, this did not translate to improved avoidance learning. Put together, our findings do not support the theory of harm avoidance in FND. We highlight a potential mechanism by which negative contexts interfere with adaptive behaviours in this under-explored disorder.

  6. Public expectations concerning confidentiality protection of adolescents' sexual and reproductive health care in Lithuania: findings of the surveys conducted in 2005 and 2012.

    Science.gov (United States)

    Jaruseviciene, Lina; Zaborskis, Apolinaras; Lazarus, Jeffrey Victor

    2014-04-01

    An adolescent's right to confidential healthcare is protected by international law and professional consensus. However, parental and social support for confidential sexual and reproductive health (SRH) services, in particular, varies greatly. This study documents Lithuanian residents' expectations with regard to confidentiality protection for adolescents in this domain, and explores the factors related to the diversity of these expectations. Two national surveys of Lithuanian residents completed in 2005 and 2012 using anonymous questionnaires. Participants rated their expectations for confidentiality using a five-point Likert scale for eight types of SRH consultations. Public anticipation for confidentiality depended on whether issues related to sexual behaviour or to its consequences were addressed during adolescent consultation. Only younger respondents had higher expectations for confidentiality in both contexts. Public expectations regarding confidentiality were less demanding in 2012 than in 2005. The expectation of confidentiality protection was greater for topics related to sexual behaviour than for the consequences of sexual behaviour, such as pregnancy, abortion or a sexually transmitted infection. This implies a need for targeted information strategies for the general population and explicit guidance for physicians on when and for whom care should remain confidential.

  7. Persistence Statements: Describing Digital Stickiness

    Directory of Open Access Journals (Sweden)

    John Kunze

    2017-08-01

    Full Text Available In this paper we present a draft vocabulary for making “persistence statements.” These are simple tools for pragmatically addressing the concern that anyone feels upon experiencing a broken web link. Scholars increasingly use scientific and cultural assets in digital form, but choosing which among many objects to cite for the long term can be difficult. There are few well-defined terms to describe the various kinds and qualities of persistence that object repositories and identifier resolvers do or don’t provide. Given an object’s identifier, one should be able to query a provider to retrieve human- and machine-readable information to help judge the level of service to expect and help gauge whether the identifier is durable enough, as a sort of long-term bet, to include in a citation. The vocabulary should enable providers to articulate persistence policies and set user expectations.

  8. New apparatus for training the avoidance reaction.

    Science.gov (United States)

    Tikal, K

    1988-01-01

    A new apparatus for active avoidance training in rats consists of a short, wide runway which can be tilted from a horizontal to vertical position. One half of the electrifiable grid floor is covered by a nonconducting sheet. For brightness (black-white) discrimination training a white walled goal box can be inserted into the runway and shifted from left to right during training. Avoidance training of 24 rats (female Wistar SPF) required 14.1 +/- 2.6 (mean +/- SEM) to-criterion trials (9/10) and was completed in less than 4 min. Brightness discrimination training required 21.3 +/- 2.1 to-criterion trials and the time of training did not exceed 12 min. The retention of the acquired responses was very good in both cases. The main advantage of the apparatus is very rapid acquisition of the one-way and discriminated avoidance without the necessity of manual manipulation of the animal.

  9. Do allergic families avoid keeping furry pets?

    Science.gov (United States)

    Bertelsen, R J; Carlsen, K C L; Granum, B; Carlsen, K-H; Håland, G; Devulapalli, C S; Munthe-Kaas, M C; Mowinckel, P; Løvik, M

    2010-06-01

    Studies addressing the relationship between pet keeping and development of asthma and allergies may be influenced by pet avoidance in families with a history of allergic disease. Following a cohort of 1019 children in Oslo till 10 years of age, we studied the association of pet keeping with socio-economic factors and allergic disease in the family. A family history of asthma and rhinoconjunctivitis was not significantly associated with pet ownership at birth or with pet removal by 10 years. Acquiring cats and dogs was less likely if the child had allergic rhinoconjunctivitis, whereas no association was seen with asthma (in any family member). Single parenthood increased the likelihood of acquiring a cat, smoking parents more often had cats or dogs, and having older siblings was associated with keeping dogs and other furry pets. Among 319 families reporting pet avoidance, 70% never had pets, 8% had given up pets, and 22% avoided a particular type of pet only. Twenty-four per cent of the parents failed to retrospectively report pet keeping during the child's first year of life. Overall, allergic rhinitis, but not asthma was associated with actual pet avoidance, whereas the strongest predictors for keeping pets were found to be socio-economic factors. Allergic disease in a child most often does not lead to the removal of the family's furry pet. Pet avoidance is associated with allergic symptoms, but not asthma. Socio-economic factors like parental education, single parenthood and smoking affects the families' decisions on pet keeping, including the type of pets the families will avoid or acquire. The large recall error demonstrated points to the need for prospective data regarding pet keeping.

  10. Alcohol and cancer: a position statement from Cancer Council Australia.

    Science.gov (United States)

    Winstanley, Margaret H; Pratt, Iain S; Chapman, Kathryn; Griffin, Hayley J; Croager, Emma J; Olver, Ian N; Sinclair, Craig; Slevin, Terry J

    2011-05-02

    The Cancer Council Australia (CCA) Alcohol Working Group has prepared a position statement on alcohol use and cancer. The statement has been reviewed by external experts and endorsed by the CCA Board. Alcohol use is a cause of cancer. Any level of alcohol consumption increases the risk of developing an alcohol-related cancer; the level of risk increases in line with the level of consumption. It is estimated that 5070 cases of cancer (or 5% of all cancers) are attributable to long-term chronic use of alcohol each year in Australia. Together, smoking and alcohol have a synergistic effect on cancer risk, meaning the combined effects of use are significantly greater than the sum of individual risks. Alcohol use may contribute to weight (fat) gain, and greater body fatness is a convincing cause of cancers of the oesophagus, pancreas, bowel, endometrium, kidney and breast (in postmenopausal women). The existing evidence does not justify the promotion of alcohol use to prevent coronary heart disease, as the previously reported role of alcohol in reducing heart disease risk in light-to-moderate drinkers appears to have been overestimated. CCA recommends that to reduce their risk of cancer, people limit their consumption of alcohol, or better still avoid alcohol altogether. For individuals who choose to drink alcohol, CCA recommends that they drink only within the National Health and Medical Research Council guidelines for alcohol consumption.

  11. Reasonable Avoidability, Responsibility and Lifestyle Diseases

    DEFF Research Database (Denmark)

    Andersen, Martin Marchman

    2012-01-01

    In “Health, Luck and Justice” Shlomi Segall argues for a luck egalitarian approach to justice in health care. As the basis for a just distribution he suggests a principle of Reasonable Avoidability, which he takes to imply that we do not have justice-based reasons to treat diseases brought about...... such as smoking and over-eating, nor that responsibility is ultimately irrelevant for the principle of Reasonable Avoidability. Second, I object to an argument of Segall’s, according to which the size of the health-care costs related to smoking and obesity is irrelevant for whether society reasonably can expect...

  12. Further results on self-avoiding walks

    Science.gov (United States)

    Temperley, H. N. V.

    1994-05-01

    A Gaussian model of self-avoiding walks is studied. Not only is any cluster integral exactly evaluable, but whole sub-series can be evaluated exactly in terms of associated Riemann zeta functions. The results are compared with information recently obtained on self-avoiding walks on the plane square and simple cubic lattices and, as expected, are very similar. Use is made of the author's recent result that the reciprocal of the walks generating function is the generating function for irreducible cluster-sums. This is split into sub-series all of which have the same radius of convergence, and the significance of this is discussed.

  13. Collision Avoidance Short Course Part I: Theory

    Science.gov (United States)

    Hejduk, Matthew D.

    2017-01-01

    Satellite conjunction assessment is perhaps the fastest-growing area in space situational awareness and protection, with military, civil, and commercial satellite owner operators embracing more and more sophisticated processes to avoid the avoidable namely collisions between high-value space assets and orbital debris. NASA and CNES have collaborated to offer an introductory short course on all the major aspects of the conjunction assessment problem. This half-day course will cover satellite conjunction dynamics and theory, JSpOC conjunction data products, major risk assessment parameters and plots, conjunction remediation decision support, and present and future challenges. This briefing represents the NASA portion of the course.

  14. Telerobotics with whole-arm collision avoidance

    Science.gov (United States)

    Wilhelmsen, Karl C.; Strenn, Stephen

    1993-12-01

    The complexity of telerobotic operations in a cluttered environment is exacerbated by the need to present collision information to the operator in an understandable fashion. In addition to preventing movements which will cause collisions, a system providing some form of virtual force reflection is desirable. With this goal in mind Lawrence Livermore National Laboratory (LLNL) has installed a kinetically similar master/slave system and developed a whole arm collision avoidance system which interacts directly with the telerobotic controller. LLNL has also provided a structure to allow for automated upgrades of workcell models and provide collision avoidance even in a dynamically changing workcell.

  15. DLP: REDUCED RISK OF LEAKAGE OF CONFIDENTIAL INFORMATION OF THE BANK

    Directory of Open Access Journals (Sweden)

    T. A. Andryianava

    2017-01-01

    Full Text Available Research application of DLP-system for protection of confidential information, a methodology for adapting the DLP-system to the specific activities of the organization, comparative analysis of the results of standard and adapted DLP-systems in the Bank. Developed: a technique for analyzing information security events, algorithm for responding to identified events, methodology and procedures for adapting the standard DLP-system to the specifics of the Bank’s activities. The methodology for adapting a standard DLP-system to the specifics of the Bank’s work consists of the following activities: identification of critical corporate information categories, audit of information systems, description of current risks and their assessment, introduction of rules for Bank’s critical information and setting up a DLP system in accordance with the specifics of the Bank’s work. Modernization of the configuration of a standard DLP-system includes the following procedures: selection of confidential information of the Bank based on membership criteria, setting up detection, creating perimeters and developing an algorithm for responding to identified information security events in the Bank. The algorithm is designed to improve the efficiency of the response of information security officers in cases of incident detection and describes the stages of the subsequent actions. The results of the research prove that using an adapted DLP-system significantly reduces the number of false positives, increasing the accuracy of detecting confidential information and reducing the risk of leakage of critical information outside the corporate network. The application of the adapted DLP-system in the Bank allowed to increase the speed of response of information security specialists to the information security events detected by the DLP-system adapted to the Bank, and also allowed the DLP-system to transition from the copy mode to the blocking mode of illegitimate transfer

  16. Reconfiguring waveguide-gratings-based M-signature codecs to enhance OCDMA network confidentiality

    Science.gov (United States)

    Huang, Jen-Fa; Chen, Kai-Sheng; Lin, Ying-Chen; Li, Chung-Yu

    2014-02-01

    A reconfiguration scheme based on composite signature codes over waveguide-gratings-based optical code-division multiple-access (OCDMA) network coder/decoders (codecs) is proposed in the paper. By using central control node to monitor network traffic condition and reconfigure the composite signature codes made up of maximal-length sequence (M-sequence) component codes and random changing the signature codes assigned for each user to improve the confidentiality performance in an OCDMA system. The proposed scheme is analyzed with some practical eavesdroppers' attacks.

  17. Practice points on three aspects of oil and gas property transactions - operatorship, confidentiality and title review

    International Nuclear Information System (INIS)

    Edwards, P.D.

    1999-01-01

    Practice points regarding three aspects of oil and gas property transactions were described. The first topic dealt with purchase and sale transactions and how to determine which party is entitled to act as the Operator following the sale of the Operator's interest. The second topic addressed issues of confidentiality in connection with oil and gas transactions. The final point discussed contractual provisions relating to title defects, along with their many variations and legal consequences. All three of these topics present issues which give rise to a surprising number of disputes, but which frequently receive only cursory attention in the negotiation and documentation of oil and gas transactions

  18. Stakeholder Orientation in Cruise Lines’ Mission Statements

    Directory of Open Access Journals (Sweden)

    Lara Penco

    2017-11-01

    Full Text Available Consistent with the extant management literature, mission statements are crucial for the sustainability and growth of any firms and have been considered to be a tool for the strategic management process. Despite the considerable attention awarded to this theme, the role of the mission statement in the strategic management of tourism firms has not been sufficiently highlighted. The present paper tries to bridge this literature gap and aims to (i analyze the content of mission statements; and (ii investigate the stakeholder orientation of cruise line mission statements. We apply a content analysis method to analyze the mission statements of 44 cruise lines, employing three different perspectives: (1 the inclusion of stakeholder groups; (2 mentions of specific “mission” components; (3 reference to four goals usually assigned to mission statements. The analysis was performed using the software package QDA-Miner. The results suggest that it is possible to identify four clusters of firms that present similar content in their mission statements, and that cruise companies tend to reserve a major attention to customers. This contribution presents some valuable research implications mainly useful for researchers and academics, but also maybe of benefit to professionals and investors.

  19. Statement of Claim under Kosovo Legislation

    Directory of Open Access Journals (Sweden)

    Nehat Idrizi

    2018-03-01

    Full Text Available “Statement of Claim” represents a topic of special importance for civil proceedings law in the Republic of Kosovo, especially now that this institution is regulated by the provisions of the Law on Contested Procedure (LCP. In this regard, the role of the court (both in the contested and the execution procedure is emphasized in the implementation of this institution during the procedure of realization of subjective civil rights of the parties in the proceedings, or contesting them by the other party, as well as the implementation of the measures through which statement of claim is provided in the execution procedure. Statement of claim may arise if the claimant makes the existence of his claim or his subjective right credible, and if there is a risk that without the statement of claim or the imposition of the preliminary injunction, respondent (opponent of the statement of claim or the opposing party would significantly impede or hamper the realization of the claim in various forms. LCP has provided the conditions under which the statement of claim can be made in the contested procedure, the types of measures, the manner of imposing, as well as legal remedies against the decisions by which the proposed measures for statement of claim may be imposed or rejected. The court may impose a preliminary injunction only in the circumstances when the claimant (stating the claim within the time limit set by the court pays the imposed guarantee amount.

  20. Women Coping with a Partner's Sexual Avoidance.

    Science.gov (United States)

    Renshaw, Domeena C.

    2001-01-01

    Discusses the complexities of sexual avoidance, or Hypoactive Sexual Desire (HSD), a previously neglected aspect of a couple's relationship. Suggests that learning from a therapist to accept and enjoy other forms of sexual exchange can open up new horizons of physical and emotional intimacy. (Contains 17 references.) (GCP)

  1. Audit incorporating avoidability and appropriate intervention can ...

    African Journals Online (AJOL)

    Audit incorporating avoidability and appropriate intervention can significantly decrease perinatal mortality. H. R. G. Ward, G. R. Howarth, O. J. N. Jennings,. R. C. Pattinson .... 6 months) and seven interns. The study was .... maternity care notes study: a randomized control trial to assess the effects of giving expectant mothers ...

  2. The Netherlands Bird Avoidance Model, Final Report

    NARCIS (Netherlands)

    Shamoun-Baranes, J.; Bouten, W.; Sierdsema, H.; van Belle, J.; van Gasteren, J.R.; van Loon, E.E.

    2006-01-01

    The NL-BAM was developed as a web-based decision support tool to be used by the bird hazard avoidance experts in the ecology unit of the Royal Netherlands Air Force. The NL-BAM will be used together with the ROBIN 4 radar system to provide BirdTAMS, for real time warnings and flight planning and to

  3. 49 CFR 260.49 - Avoiding defaults.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 4 2010-10-01 2010-10-01 false Avoiding defaults. 260.49 Section 260.49 Transportation Other Regulations Relating to Transportation (Continued) FEDERAL RAILROAD ADMINISTRATION... REHABILITATION AND IMPROVEMENT FINANCING PROGRAM Procedures To Be Followed in the Event of Default § 260.49...

  4. Avoidance Motivation and Conservation of Energy

    NARCIS (Netherlands)

    Roskes, Marieke; Elliot, Andrew J.; Nijstad, Bernard A.; De Dreu, Carsten K. W.

    Compared to approach motivation, avoidance motivation evokes vigilance, attention to detail, systematic information processing, and the recruitment of cognitive resources. From a conservation of energy perspective it follows that people would be reluctant to engage in the kind of effortful cognitive

  5. Reasonable Avoidability, Responsibility and Lifestyle Diseases

    DEFF Research Database (Denmark)

    Andersen, Martin Marchman

    2012-01-01

    by imprudent behavior such as smoking and over-eating. While I seek to investigate how more precisely we are to understand this principle of Reasonable Avoidability, I also object to it. First, I argue that Segall neither succeeds in showing that individuals quite generally are responsible for behaviors...

  6. Avoidance motivation and conservation of energy

    NARCIS (Netherlands)

    Roskes, Marieke; Elliot, Andrew J.; Nijstad, Bernard A.; De Dreu, Carsten K W

    Compared to approach motivation, avoidance motivation evokes vigilance, attention to detail, systematic information processing, and the recruitment of cognitive resources. From a conservation of energy perspective it follows that people would be reluctant to engage in the kind of effortful cognitive

  7. Rewarding peak avoidance: the Dutch 'Spitsmijden' projects

    NARCIS (Netherlands)

    Knockaert, J.; Bakens, J.; Ettema, D.F.; Verhoef, E.

    2011-01-01

    The Dutch road network is becoming increasingly congested. In late 2006, a group of companies, universities and government institutions established the Spitsmijden project. ‘Spitsmijden’ is the Dutch term for ‘avoiding the peak’. This joint initiative aimed to identify and assess a short-term

  8. Wake Vortex Avoidance System and Method

    Science.gov (United States)

    Shams, Qamar A. (Inventor); Zuckerwar, Allan J. (Inventor); Knight, Howard K. (Inventor)

    2017-01-01

    A wake vortex avoidance system includes a microphone array configured to detect low frequency sounds. A signal processor determines a geometric mean coherence based on the detected low frequency sounds. A display displays wake vortices based on the determined geometric mean coherence.

  9. Audit incorporating avoidability and appropriate intervention can ...

    African Journals Online (AJOL)

    Objective. To evaluate the role of the ICA (Identification, Cause, Avoidable factor) Solution method of perinatal audit in reducing perinatal mortality. Design. Retrospective audit of 1 060 perinatal deaths between 1 January 1991 and 31 December 1992. Setting. Livingstone Hospital Maternity Service. Subjects. One thousand ...

  10. Obstacle detection and avoiding of quadcopter

    Science.gov (United States)

    Wang, Dizhong; Lin, Jiajian

    2017-10-01

    Recent years, the flight control technology over quadcopter has been boosted vigorously and acquired the comprehensive application in a variety of industries. However, it is prominent for there to be problems existed in the stable and secure flight with the development of its autonomous flight. Through comparing with the characteristics of ultrasonic ranging and laser Time-of-Flight(abbreviated to ToF) distance as well as vision measurement and its related sensors, the obstacle detection and identification sensors need to be installed in order to effectively enhance the safety flying for aircraft, which is essential for avoiding the dangers around the surroundings. That the major sensors applied to objects perception at present are distance measuring instruments which based on the principle and application of non-contact detection technology . Prior to acknowledging the general principles of flight and obstacle avoiding, the aerodynamics modeling of the quadcopter and its object detection means has been initially determined on this paper. Based on such premise, this article emphasized on describing and analyzing the research on obstacle avoiding technology and its application status, and making an expectation for the trend of its development after analyzing the primary existing problems concerning its accuracy object avoidance.

  11. Approach and avoidance in fear of spiders

    NARCIS (Netherlands)

    Rinck, M.; Becker, E.S.

    2007-01-01

    We examined attitudes towards spiders by employing an Approach-Avoidance Task, in which participants respond to pictures by pulling a joystick towards themselves or by pushing it away from themselves. For spider fearfuls, this stimulus–response assignment is either compatible (push spiders away) or

  12. Detect and Avoid (DAA) Automation Maneuver Study

    Science.gov (United States)

    2017-02-01

    controlled a UAS through airspace including several proximal aircraft. 15. SUBJECT TERMS Drones ; Detect and Avoid; Remotely Piloted Aircraft...maneuver guidance presentation but the transparency “threshold” needed to result in appropriate automation usage , which is defined as both high rates of

  13. Adjusting the Interview to Avoid Cultural Bias.

    Science.gov (United States)

    Mahoney, Frances Eileen

    1992-01-01

    Considers cultural bias in employment interviews. Compares white American and Navajo interview styles and suggests new approach for recruiters to make interviewing less culturally biased. Recommends that recruiters not ask direct questions about personal achievements, try indirect approach, avoid making judgments on first impressions and…

  14. How to Interpret Uncertainty Avoidance Scores

    DEFF Research Database (Denmark)

    Schramm, Jette

    2000-01-01

    Addresses the cultural dimension of uncertainty avoidance (UA), of US and German staffing decisions – but uses a different viewpoint. Discusses and challenges the hitherto accepted meaning of individual positions of countries UA, using Höfstede’s guide. Adumbrates the concept of UA at the two lev...

  15. [Femicide: a Avoidable Mortality? The "Tivoli" Model].

    Science.gov (United States)

    De Salazar, Vitaliano; Borzi, Claudia; Maggiani, Michela; Amato, Simona

    2017-01-01

    The Instabul Convention is a normative tool for the prevention of women's violence in Europe. Rome 5 Local Healthcare Authority has implemented a synergistic intervention model in joint ventures with all stakeholders and institutions involved: the Tivoli Model. This model provides a synergistic social, health, legal and training approach to prevent violence against women in a logic of preventing an avoidable mortality.

  16. Simple Obstacle Avoidance Algorithm for Rehabilitation Robots

    NARCIS (Netherlands)

    Stuyt, Floran H.A.; Römer, GertWillem R.B.E.; Stuyt, Harry .J.A.

    2007-01-01

    The efficiency of a rehabilitation robot is improved by offering record-and-replay to operate the robot. While automatically moving to a stored target (replay) collisions of the robot with obstacles in its work space must be avoided. A simple, though effective, generic and deterministic algorithm

  17. FORUM Achieving weight loss and avoiding obesity

    African Journals Online (AJOL)

    The efficacy of diets advocating extreme macronutrient manipulation has been reviewed extensively. Studies involving participation for 12 months or longer revealed that diet adherence, length of intervention and level of calorie. ISSUES IN MEDICINE. Achieving weight loss and avoiding obesity. Maria Elizabeth Catsicas.

  18. Pathological Demand Avoidance: Exploring the Behavioural Profile

    Science.gov (United States)

    O'Nions, Elizabeth; Viding, Essi; Greven, Corina U; Ronald, Angelica; Happé, Francesca

    2014-01-01

    "Pathological Demand Avoidance" is a term increasingly used by practitioners in the United Kingdom. It was coined to describe a profile of obsessive resistance to everyday demands and requests, with a tendency to resort to "socially manipulative" behaviour, including outrageous or embarrassing acts. Pathological demand…

  19. Power Factor Controller Avoids False Turnoff

    Science.gov (United States)

    Nola, F. J.

    1983-01-01

    Single-phase power-factor controller includes special inhibiting circuit to avoid false turnoff. If thyristor trigger signal occurs during flow of current from preceding half cycle, inhibiting signal delays application of trigger pulse until beginning of next current half cycle.

  20. Avoidable cancers in the Nordic countries. Occupation

    DEFF Research Database (Denmark)

    Dreyer, L; Andersen, A; Pukkala, E

    1997-01-01

    around the year 2000, with 1,890 among men and fewer than 25 among women. The proportions that could be avoided if industrial carcinogens were eliminated would be 70% of mesotheliomas, 20% of cancers of the nasal cavity and sinuses, 12% of lung cancers, 5% of laryngeal cancers, 2% of urinary bladder...

  1. Measuring Patients’ Attachment Avoidance in Psychotherapy: Development of the Attachment Avoidance in Therapy Scale (AATS

    Directory of Open Access Journals (Sweden)

    András Láng

    2012-11-01

    Full Text Available A new scale measuring patient-therapist attachment avoidance was developed. Attachment Avoidance in Therapy Scale is a new measure based on the Bartholomew model of adult attachment (Bartholomew & Horowitz, 1991 and the Experience in Close Relationships Scale (Brennan, Clark, & Shaver, 1998 to measure patients’ attachment avoidance towards therapists. With 112 patient-therapist dyads participating in the study, validation of a preliminary scale – measuring both attachment anxiety and attachment avoidance in therapy – took place using therapists’ evaluations of patients’ relational behavior and patients’ self-reports about their attitude toward psychotherapy. Analysis of the data revealed six underlying scales. Results showed all six scales to be reliable. Validation of scales measuring attachment anxiety failed. The importance of Attachment Avoidance in Therapy Scale and its subscales is discussed.

  2. Bursting neurons and ultrasound avoidance in crickets

    Directory of Open Access Journals (Sweden)

    Gary eMarsat

    2012-07-01

    Full Text Available Decision making in invertebrates often relies on simple neural circuits composed of only a few identified neurons. The relative simplicity of these circuits makes it possible to identify the key computation and neural properties underlying decisions. In this review, we summarize recent research on the neural basis of ultrasound avoidance in crickets, a response that allows escape from echolocating bats. The key neural property shaping behavioral output is high-frequency bursting of an identified interneuron, AN2, which carries information about ultrasound stimuli from receptor neurons to the brain. AN2's spike train consists of clusters of spikes –bursts– that may be interspersed with isolated, non-burst spikes. AN2 firing is necessary and sufficient to trigger avoidance steering but only high-rate firing, such as occurs in bursts, evokes this response. AN2 bursts are therefore at the core of the computation involved in deciding whether or not to steer away from ultrasound. Bursts in AN2 are triggered by synaptic input from nearly synchronous bursts in ultrasound receptors. Thus the population response at the very first stage of sensory processing –the auditory receptor- already differentiates the features of the stimulus that will trigger a behavioral response from those that will not. Adaptation, both intrinsic to AN2 and within ultrasound receptors, scales the burst-generating features according to the stimulus statistics, thus filtering out background noise and ensuring that bursts occur selectively in response to salient peaks in ultrasound intensity. Furthermore AN2’s sensitivity to ultrasound varies adaptively with predation pressure, through both developmental and evolutionary mechanisms. We discuss how this key relationship between bursting and the triggering of avoidance behavior is also observed in other invertebrate systems such as the avoidance of looming visual stimuli in locusts or heat avoidance in beetles.

  3. Using and Disclosing Confidential Patient Information and The English Common Law: What are the Information Requirements of a Valid Consent?

    Science.gov (United States)

    Chico, Victoria; Taylor, Mark J

    2018-02-01

    The National Health Service in England and Wales is dependent upon the flow of confidential patient data. In the context of consent to the use of patient health data, insistence on the requirements of an 'informed' consent that are difficult to achieve will drive reliance on alternatives to consent. Here we argue that one can obtain a valid consent to the disclosure of confidential patient data, such that this disclosure would not amount to a breach of the common law duty of confidentiality, having provided less information than would typically be associated with an 'informed consent'. This position protects consent as a practicable legal basis for disclosure from debilitating uncertainty or impracticability and, perhaps counter-intuitively, promotes patient autonomy.

  4. Medical liability, safety and confidentiality in maritime telemedicine--the MERMAID position on issues of importance.

    Science.gov (United States)

    Ladas, P; Giatagatzidis, P; Anogianakis, G; Maglavera, S

    1997-01-01

    Telemedicine dates to the days of "wireless telegraphy". As an "extraordinary" arrangement for medical services delivered at time of need, telemedicine has thus far escaped the developments that have taken place over the last 50 years in the areas of medical liability, safety and confidentiality. Today, however, telemedicine is also used to increase quality and cost effectiveness of healthcare provision. This trend is set by the U.S. where the U.S. federal government funds telemedicine at an annual rate of more than $100 million i.e., at a rate 30 times or more than what the EU does while state and local agency support and private business investment in telemedicine is 3 to 4 times larger than that of the U.S. federal government. In this respect it must be stressed that technology tends to satisfy the relevant demand for telecommunications. Telemedicine is used in diverse areas such as pathology, surgery, physical therapy, and psychiatry. It is expected to revolutionise health care in the coming decade and, therefore, it will certainly take into account requirements for medical liability, safety and confidentiality in the same way as traditional "establishment" medicine does.

  5. Biobanks in South Africa: A global perspective on privacy and confidentiality.

    Science.gov (United States)

    Rheeder, Riaan

    2017-04-25

    The Universal Declaration of Bioethics and Human Rights (UDBHR) of the United Nations Educational, Scientific and Cultural Organization (UNESCO) was adopted unanimously in 2005 by the world community as a universal guideline, according to which members of the global community were accountable to each other. Research results from UNESCO show that the UDBHR has had little or no impact in South Africa (SA). The primary objective of this article is to promote awareness of the UDBHR in SA and Africa by focusing on Article 9 of the Declaration, which accepts the right to privacy and confidentiality. For this objective to be relevant in the SA context, depends on whether the guidelines of the National Department of Health's Ethics in Health Research: Principles, Processes and Structures of 2015 acknowledge biobanks of the universally accepted ethical guidelines on privacy and confidentiality of autonomous persons and whether these guidelines are broadly in accordance with global bioethical guidelines.

  6. Contractual obligations and the sharing of confidential health information in sport.

    Science.gov (United States)

    Anderson, L

    2008-09-01

    As an employee, a sports doctor has obligations to their employer, but also professional and widely accepted obligations of a doctor to the patient (in this case the individual team member). The conflict is evident when sports doctors are asked by an athlete to keep personal health information confidential from the coach and team management, and yet both doctor and athlete have employment contracts specifying that such information shall be shared. Recent research in New Zealand shows that despite the presence of an employment contract, there appears to be a wide range of behaviours among sports doctors when an athlete requests that information about them be kept from team management. Many seem willing to honour requests to keep health information about the athlete confidential, thereby being in breach of the employment contract, while others insist on informing team management against the wishes of the athlete. There are a number of potential solutions to this dilemma from forcing doctors to meet their contractual obligations, to limiting the expectations of the employment contract. This paper suggests that at times it may be appropriate to do both, making the position of the doctor clearer and supporting the ability of this group to resist pressure by coaches and management through having a robust code of ethics.

  7. CONSISE statement on the reporting of Seroepidemiologic Studies for influenza (ROSES-I statement): an extension of the STROBE statement.

    Science.gov (United States)

    Horby, Peter W; Laurie, Karen L; Cowling, Benjamin J; Engelhardt, Othmar G; Sturm-Ramirez, Katharine; Sanchez, Jose L; Katz, Jacqueline M; Uyeki, Timothy M; Wood, John; Van Kerkhove, Maria D

    2017-01-01

    Population-based serologic studies are a vital tool for understanding the epidemiology of influenza and other respiratory viruses, including the early assessment of the transmissibility and severity of the 2009 influenza pandemic, and Middle East respiratory syndrome coronavirus. However, interpretation of the results of serologic studies has been hampered by the diversity of approaches and the lack of standardized methods and reporting. The objective of the CONSISE ROSES-I statement was to improve the quality and transparency of reporting of influenza seroepidemiologic studies and facilitate the assessment of the validity and generalizability of published results. The ROSES-I statement was developed as an expert consensus of the CONSISE epidemiology and laboratory working groups. The recommendations are presented in the familiar format of a reporting guideline. Because seroepidemiologic studies are a specific type of observational epidemiology study, the ROSES-I statement is built upon the STROBE guidelines. As such, the ROSES-I statement should be seen as an extension of the STROBE guidelines. The ROSES-I statement presents 42 items that can be used as a checklist of the information that should be included in the results of published seroepidemiologic studies, and which can also serve as a guide to the items that need to be considered during study design and implementation. We hope that the ROSES-I statement will contribute to improving the quality of reporting of seroepidemiologic studies. © 2016 The Authors. Influenza and Other Respiratory Viruses Published by John Wiley & Sons Ltd.

  8. Tomographic patient registration and conformal avoidance tomotherapy

    Science.gov (United States)

    Aldridge, Jennifer Stacy

    Development of tomotherapy has led to the emergence of several processes, providing the basis for many unique investigative opportunities. These processes include setup verification, tomographic verification, megavoltage dose reconstruction, and conformal avoidance tomotherapy. Setup verification and conformal avoidance tomotherapy, in particular, are two closely intertwined matters. In order to avoid critical structures located within or adjacent to indistinct tumor regions, accurate patient positioning from fraction to fraction must be ensured. With tomographic patient registration, a higher level of assurance is offered than with traditional positioning methods. Translational and rotational offsets are calculated directly from projection data using cross- correlation or fast Fourier transforms. Experiments assessing the algorithm's ability to calculate individual offsets were conducted using the University of Wisconsin's Tomotherapy Benchtop. These experiments indicate statistical errors within +/-1 mm for offsets up to approximately 20 mm, with maximum offset errors of about +/-2 mm for displacements up to 35 mm. The angular offset component is within +/-2°. To evaluate the registration process as a whole, experimental results from a few multi-parameter examples are also analyzed. With the development of tomographic patient registration in projection space, efforts to promote further sparing of critical structures are justified. Conformal avoidance tomotherapy has as its objective to treat an indistinct tumor region while conformally avoiding any normal critical structures in that region. To demonstrate the advantages of conformal avoidance tomotherapy, conventional and tomotherapy treatments are contrasted for both nasopharyngeal and breast carcinoma cases. For initial research efforts, computed tomography data sets of a human male and female were obtained via the ``Visible Human Project''. Since these data sets are on the order of hundreds of megabytes, both

  9. 7 CFR 900.350 - General statement.

    Science.gov (United States)

    2010-01-01

    ... Determining the Qualification of Cooperative Milk Marketing Associations § 900.350 General statement. Cooperative marketing associations apply for qualification by the Secretary under the Federal milk order... Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (Marketing Agreements...

  10. Annual report and accounting statements 2007: ELETROBRAS

    International Nuclear Information System (INIS)

    2007-01-01

    This document reports the actives of the ELETROBRAS during the year 2007 related to: electricity market, international activities, strategic planning, financial indicators, business analysis, relationship with investors, energy marketing, operational research, technological development, financial statements, social responsibility and environment

  11. Assessing Risk with GASB Statement No. 3.

    Science.gov (United States)

    Wood, Venita M.; Scott, Bob

    1987-01-01

    Discusses a Government Accounting Standards Board (GASB) publication designed to provide financial statement users with information to assess a government's actual and future deposit and investment market and credit risk. (MLF)

  12. European position statement on lung cancer screening

    DEFF Research Database (Denmark)

    Oudkerk, Matthijs; Devaraj, Anand; Vliegenthart, Rozemarijn

    2017-01-01

    Lung cancer screening with low-dose CT can save lives. This European Union (EU) position statement presents the available evidence and the major issues that need to be addressed to ensure the successful implementation of low-dose CT lung cancer screening in Europe. This statement identified...... specific actions required by the European lung cancer screening community to adopt before the implementation of low-dose CT lung cancer screening. This position statement recommends the following actions: a risk stratification approach should be used for future lung cancer low-dose CT programmes...... 200 mm3, should be managed in multidisciplinary teams according to this EU position statement recommendations to ensure that patients receive the most appropriate treatment; and planning for implementation of low-dose CT screening should start throughout Europe as soon as possible. European countries...

  13. 48 CFR 35.005 - Work statement.

    Science.gov (United States)

    2010-10-01

    .... (b) In basic research the emphasis is on achieving specified objectives and knowledge rather than on... between work statements for fixed-price contracts and cost-reimbursement contracts should be even clearer...

  14. Defense Departmental Reporting Systems - Audited Financial Statements

    National Research Council Canada - National Science Library

    Granetto, Paul

    2001-01-01

    .... The Chief Financial Officers Act requires the Inspector General, DoD, to audit the financial statements of DoD organizations in accordance with generally accepted Government auditing standards...

  15. 12 CFR 327.2 - Certified statements.

    Science.gov (United States)

    2010-01-01

    ... the FDIC's e-business Web site FDICconnect a quarterly certified statement invoice each assessment... of the Assessments Section. (4) Each assessment period, the FDIC will provide courtesy e-mail...

  16. Online, Batch and CICS Social Security Statement

    Data.gov (United States)

    Social Security Administration — A database that contains client preference information for the SSA initiated Social Security Statement as well as other data including SSN, disposition for paper SS...

  17. Back to Basics: Teaching the Statement of Cash Flows

    Science.gov (United States)

    Cecil, H. Wayne; King, Teresa T.; Andrews, Christine P.

    2011-01-01

    A conceptual foundation for the Statement of Cash Flows based on the ten elements of financial statements provides students with a deep understanding of core accounting concepts. Traditional methods of teaching the statement of cash flows tend to focus on statement preparation rules, masking the effect of business events on the change in cash.…

  18. 21 CFR 801.61 - Statement of identity.

    Science.gov (United States)

    2010-04-01

    ... 21 Food and Drugs 8 2010-04-01 2010-04-01 false Statement of identity. 801.61 Section 801.61 Food... DEVICES LABELING Labeling Requirements for Over-the-Counter Devices § 801.61 Statement of identity. (a... principal features a statement of the identity of the commodity. (b) Such statement of identity shall be in...

  19. 21 CFR 201.61 - Statement of identity.

    Science.gov (United States)

    2010-04-01

    ... 21 Food and Drugs 4 2010-04-01 2010-04-01 false Statement of identity. 201.61 Section 201.61 Food...: GENERAL LABELING Labeling Requirements for Over-the-Counter Drugs § 201.61 Statement of identity. (a) The... features a statement of the identity of the commodity. (b) Such statement of identity shall be in terms of...

  20. 40 CFR 156.68 - First aid statement.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 23 2010-07-01 2010-07-01 false First aid statement. 156.68 Section... aid statement. (a) Product as sold and distributed. Each product must bear a first aid statement if... with water prior to use, the label may also include a statement describing how the first aid measures...

  1. 32 CFR 651.23 - Environmental impact statement.

    Science.gov (United States)

    2010-07-01

    ... Environmental impact statement. An Environmental Impact statement (EIS) is a detailed written statement required by NEPA for major federal actions significantly affecting the quality of the human environment (42 U... 32 National Defense 4 2010-07-01 2010-07-01 true Environmental impact statement. 651.23 Section...

  2. 12 CFR 328.3 - Official advertising statement requirements.

    Science.gov (United States)

    2010-01-01

    ... institution. (d) Types of advertisements which do not require the official advertising statement. The following types of advertisements do not require use of the official advertising statement: (1) Statements... 12 Banks and Banking 4 2010-01-01 2010-01-01 false Official advertising statement requirements...

  3. 46 CFR 504.7 - Environmental impact statements.

    Science.gov (United States)

    2010-10-01

    ... 46 Shipping 9 2010-10-01 2010-10-01 false Environmental impact statements. 504.7 Section 504.7... POLICY ANALYSIS § 504.7 Environmental impact statements. (a) General. (1) An environmental impact... environmental impact statements. (1) A draft environmental impact statement (DEIS) will initially be prepared in...

  4. 22 CFR 216.7 - Environmental impact statements.

    Science.gov (United States)

    2010-04-01

    ... 22 Foreign Relations 1 2010-04-01 2010-04-01 false Environmental impact statements. 216.7 Section... Environmental impact statements. (a) Applicability. An Environmental Impact Statement shall be prepared when... Environmental Impact Statement relating to paragraph (a)(2) of this section shall comply with the CEQ...

  5. 46 CFR 232.5 - Income Statement Accounts.

    Science.gov (United States)

    2010-10-01

    ... 46 Shipping 8 2010-10-01 2010-10-01 false Income Statement Accounts. 232.5 Section 232.5 Shipping... ACTIVITIES UNIFORM FINANCIAL REPORTING REQUIREMENTS Income Statement § 232.5 Income Statement Accounts. (a... balance sheet and to the income statement. (3) 650Other Shipping Operations Revenue. This account shall be...

  6. 20 CFR 404.632 - Statements filed with a hospital.

    Science.gov (United States)

    2010-04-01

    ... 20 Employees' Benefits 2 2010-04-01 2010-04-01 false Statements filed with a hospital. 404.632... § 404.632 Statements filed with a hospital. A statement (generally a hospital admission form) filed with a hospital may serve as a written statement under § 404.630 if the requirements of this section are...

  7. The Feasibility of Avoiding Future Climate Impacts: Results from the AVOID Programmes

    Science.gov (United States)

    Lowe, J. A.; Warren, R.; Arnell, N.; Buckle, S.

    2014-12-01

    The AVOID programme and its successor, AVOID2, have focused on answering three core questions: how do we characterise potentially dangerous climate change and impacts, which emissions pathways can avoid at least some of these impacts, and how feasible are the future reductions needed to significantly deviate from a business-as-usual future emissions pathway. The first AVOID project succeeded in providing the UK Government with evidence to inform its position on climate change. A key part of the work involved developing a range of global emissions pathways and estimating and understanding the corresponding global impacts. This made use of a combination of complex general circulation models, simple climate models, pattern-scaling and state-of-the art impacts models. The results characterise the range of avoidable impacts across the globe in several key sectors including river and coastal flooding, cooling and heating energy demand, crop productivity and aspects of biodiversity. The avoided impacts between a scenario compatible with a 4ºC global warming and one with a 2ºC global warming were found to be highly sector dependent and avoided fractions typically ranged between 20% and 70%. A further key aspect was characterising the magnitude of the uncertainty involved, which is found to be very large in some impact sectors although the avoided fraction appears a more robust metric. The AVOID2 programme began in 2014 and will provide results in the run up to the Paris CoP in 2015. This includes new post-IPCC 5th assessment evidence to inform the long-term climate goal, a more comprehensive assessment of the uncertainty ranges of feasible emission pathways compatible with the long-term goal and enhanced estimates of global impacts using the latest generation of impact models and scenarios.

  8. CONTROVERSY REGARDING ELEMENTS IN THE FINANCIAL STATEMENTS

    OpenAIRE

    Marilena-Roxana Zuca

    2013-01-01

    The definitions of the elements identify their main traits, but their purpose, the reason for their presence in the financial statements is ensured by meeting the recognition criteria.The current concerns of accounting regulatory organisms in setting and developing the elements and the common conceptual Framework have materialized by setting recognition criteria, that help to achieve a more accurate position of elements in the financial statements, thus creating credibility and relevance of t...

  9. Observational research and the STROBE statement

    Directory of Open Access Journals (Sweden)

    Mary Bravo-Peña

    2014-12-01

    Full Text Available Observational research is the source of the largest amount of evidence in health care. Their proper use depends on several factors, among them a complete reporting. This article presents the STROBE Statement (Strengthening the Reporting of Observational Studies in Epidemiology and its influence on complete research reporting. We recommended the use of the STROBE Statement and their checklist in order to improve the completeness of reporting of observational research and increase its usability.

  10. Statement of Agreements Registered With The Agency

    International Nuclear Information System (INIS)

    1960-01-01

    This document contains a statement of all the agreements which had been registered with the Agency by 30 June 1960 under the Regulations for the Registration of Agreements adopted by the Board of Governors in implementation of Article XXII. B of the Statute. In compliance with Article VI of the Regulations this statement is hereby transmitted to all Members of the Agency for their information. A copy is also being sent to the Secretary-General of the United Nations

  11. Statement of nuclear incidents at nuclear installations

    International Nuclear Information System (INIS)

    2001-07-01

    A statement of nuclear incidents at nuclear installations in Britain during the first quarter of 2001 is published today by the Health and Safety Executive. It covers the period 1 January to 31 March 2001. The statement is published under arrangements that came into effect from the first quarter of 1993, derived from the Health and Safety Commission's powers under section 11 of the Health and Safety at Work, etc. Act 1974

  12. Discovering and avoiding self-contradiction:

    DEFF Research Database (Denmark)

    Olivares Bøgeskov, Benjamin Miguel

    This paper presents an innovative method to teach ethics, which has so far been implemented amongst Danish students. The method focuses on developing skills to conduct a methodical, ethical dialogue by teaching students to become aware of self-contradictions and learning to avoid them. This method......, this method focuses not so much on teaching what other people think, but rather starts by finding out what the students think, and to which degree they contradict themselves. In addition the method focuses on how students argue for their positions when entering an ethical dialogue. The method focuses on two...... (learning the skills to conduct an ethical dialogue) builds on the previous ability to identify contradictions. This is done by focusing in 4 basic rules that introduce the basic principles of a dialectical dialogue. These rules allow them to avoid fundamental mistakes which otherwise hinder an ethical...

  13. Avoidant Personality Disorder: a Current Review.

    Science.gov (United States)

    Weinbrecht, Anna; Schulze, Lars; Boettcher, Johanna; Renneberg, Babette

    2016-03-01

    This review focuses on recent research on diagnostic aspects, etiology, and treatment of avoidant personality disorder (AVPD). Current studies stress the close relation between AVPD and social anxiety disorder, the influence of genetic factors in the development of AVPD, and the relative stability of symptoms. Treatment approaches should target the pervasive patterns of social inhibition, feelings of inadequacy, and hypersensitivity to negative evaluation. Empirical evidence for cognitive-behavior and schema therapy is promising. Few other therapeutic approaches have been developed, but until now, these have only been investigated in case studies. We conclude that AVPD qualifies as a neglected disorder and that more research specifically on avoidant personality disorder symptoms and its treatment is needed.

  14. How to avoid deferred-compensation troubles.

    Science.gov (United States)

    Freeman, Todd I

    2005-06-01

    Executive compensation packages have long included stock options and deferred compensation plans in order to compete for talent. Last year, Congress passed a law in response to the Enron debacle, in which executives were perceived to be protecting their deferred compensation at the expense of employees, creditors, and investors. The new law is designed to protect companies and their shareholders from being raided by the very executives that guided the company to financial ruin. Physicians who are part owners of medical practices need to know about the changes in the law regarding deferred compensation and how to avoid costly tax penalties. This article discusses how the changes affect medical practices as well as steps physician-owned clinics can take to avoid the risk of penalty, such as freezing deferred compensation and creating a new deferred compensation plan.

  15. Discovering and avoiding self-contradiction:

    DEFF Research Database (Denmark)

    Olivares Bøgeskov, Benjamin Miguel

    This paper presents an innovative method to teach ethics, which has so far been implemented amongst Danish students. The method focuses on developing skills to conduct a methodical, ethical dialogue by teaching students to become aware of self-contradictions and learning to avoid them. This method...... was created as a response to a recurring disappointment relating to the common way of teaching ethics in Danish nursing schools, in which students are introduced to ethical theories and asked to use them to reflect on concrete ethical cases. In these courses, quite commonly students were able to understand...... aspects –first developing critical self-refection and secondly developing skills to conduct an ethical dialogue. The first aspect is addressed by finding out what the students think, do they contradict themselves and how to avoid self-contradictions. This is done by using a questionnaire with 13 ethical...

  16. Reducing voluntary, avoidable turnover through selection.

    Science.gov (United States)

    Barrick, Murray R; Zimmerman, Ryan D

    2005-01-01

    The authors investigated the efficacy of several variables used to predict voluntary, organizationally avoidable turnover even before the employee is hired. Analyses conducted on applicant data collected in 2 separate organizations (N = 445) confirmed that biodata, clear-purpose attitudes and intentions, and disguised-purpose dispositional retention scales predicted voluntary, avoidable turnover (rs ranged from -.16 to -.22, R = .37, adjusted R = .33). Results also revealed that biodata scales and disguised-purpose retention scales added incremental validity, whereas clear-purpose retention scales did not explain significant incremental variance in turnover beyond what was explained by biodata and disguised-purpose scales. Furthermore, disparate impact (subgroup differences on race, sex, and age) was consistently small (average d = 0.12 when the majority group scored higher than the minority group).

  17. Construction dispute research conceptualisation, avoidance and resolution

    CERN Document Server

    2014-01-01

    There are three specific purposes of Construction Dispute Research. First, this volume aims to summarise studies on construction dispute. Second, apart from the theoretical constructs, where appropriate empirical tests are also included. This approach serves to go beyond the commonly used anecdotal approach for the subject matters. Third, it is the sincere hope of the authors that this book will help shaping research agenda of construction dispute.  The studies are mostly framed from a management perspective drawing on methods and concepts in contract law, economics, psychology and management science.   The book has twenty chapters that are arranged in four parts covering conceptualisation, avoidance, negotiation and mediation. Part 1 is devoted for dispute conceptualisation. A building is only as strong as its foundation. Thus it is no better start to study construction dispute by conceptualisation. The theme of Part 2 is dispute avoidance. The conventional wisdom of ‘prevention is better than cure’ se...

  18. Research on embedded automobile collision avoidance system

    Directory of Open Access Journals (Sweden)

    TAO Feng

    2016-08-01

    Full Text Available Taking ARM embedded Linux operating system as the development platform,combined with AVR microcontroller,while optimizing the ranging algorithm and using air ultrasonic transducer,the measurement range of which can be up to 50 meter,this paper designs a high-precision,range far,low price,various models suitable automobile collision avoidance warning system.The system adopts Forlinx OK6410 development board for the master.AVR microcontroller is responsible for taking the data of traveling distance between vehicles,and with the ARM development board via RS232 communication transfers vehicle′s distance and speed information to the ARM development boards.The system uses the established collision avoidance model to get alarm information.Experiments show that the system can accurately send out alarm information within a certain range.It is innovative and practical.

  19. Optical Flow based Robot Obstacle Avoidance

    Directory of Open Access Journals (Sweden)

    Kahlouche Souhila

    2008-11-01

    Full Text Available In this paper we try to develop an algorithm for visual obstacle avoidance of autonomous mobile robot. The input of the algorithm is an image sequence grabbed by an embedded camera on the B21r robot in motion. Then, the optical flow information is extracted from the image sequence in order to be used in the navigation algorithm. The optical flow provides very important information about the robot environment, like: the obstacles disposition, the robot heading, the time to collision and the depth. The strategy consists in balancing the amount of left and right side flow to avoid obstacles, this technique allows robot navigation without any collision with obstacles. The robustness of the algorithm will be showed by some examples.

  20. Cod avoidance by area regulations in Kattegat

    DEFF Research Database (Denmark)

    Eliasen, Søren Qvist

    2014-01-01

    presents two initiatives for cod avoidance in Kattegat; a fisher initiative sharing information about cod bycatch which could lead to real time closures in areas with high bycatch of juveniles, for vessels with low cod quota to avoid catch of all cod, and a Danish Swedish Government initiative of permanent...... fair and the goals should be clear, not least when the descriptors of the Marine Strategy Framework Directive, which might be more intangible for the fishers, are part of the goal of the measures. If incentives created by the regulation are stable over at least a few years the fishers and fishers......’ organisations are more capable at being active partners in developing the systems that support the discard ban. An example from the examined initiatives are the outline of a fleet information system, providing the skipper with information about hotspots of unwanted species allowing him to make a better plan...

  1. Flashback Avoidance in Swirling Flow Burners

    Directory of Open Access Journals (Sweden)

    Vigueras-Zúñiga Marco Osvaldo

    2014-10-01

    Full Text Available Lean premixed combustion using swirling flows is widely used in gas turbines and combustion. Although flashback is not generally a problem with natural gas combustion, there are some reports of flashback damage with existing gas turbines, whilst hydrogen enriched fuel blends cause concerns in this area. Thus, this paper describes a practical approach to study and avoid flashback in a pilot scale 100 kW tangential swirl burner. The flashback phenomenon is studied experimentally via the derivation of flashback limits for a variety of different geometrical conditions. A high speed camera is used to visualize the process and distinguish new patterns of avoidance. The use of a central fuel injector is shown to give substantial benefits in terms of flashback resistance. Conclusions are drawn as to mitigation technologies.

  2. Robot maps, robot moves, robot avoids

    OpenAIRE

    Farrugia, Claire

    2014-01-01

    Robotics is a cornerstone for this century’s innovations. From robot nurses to your own personal assistant, most robots need to know: ‘where is it?’ ‘Where should it go?’ And ‘how to get there?’ Without answers to these questions a robot cannot do much. http://www.um.edu.mt/think/robot-maps-robot-moves-robot-avoids/

  3. Tax avoidance: Definition and prevention issues

    Directory of Open Access Journals (Sweden)

    Anđelković Mileva

    2014-01-01

    Full Text Available The problem of resolving issues pertaining to tax avoidance, and particularly its aggressive forms, has been the focal point of discussion among tax scholars which is increasingly gaining attention of politicians alike. As opposed to tax evasion (which is illegal, the phenomenon of tax avoidance calls for careful consideration of state fiscal interests and a highly precise demarcation of the thin line between the acceptable and unacceptable conduct. In many contemporary states, tax avoidance (which implies a formal behaviour of tax payers within the limits of tax legislation but contrary to the tax regulation objectives is declared to be illegitimate. State authorities do not want to tolerate such activity, which results in tax payers' reduction or avoidance of tax liabilities. We should also bear in mind that all tax payers have the tax planning option at their disposal, by means of which they make sure that they do not pay more tax than they are legally obliged to. However, in case they skilfully use the tax regulation flaws and loopholes for the sole purpose of tax evasion, and/or resort to misrepresentation and deceptive constructs, they are considered to be exceeding the limits of acceptable tax behaviour. In comparison to the specific anti-abuse measures which have been built into some national tax legislations, there is a growing number of states that introduce the general anti-abuse legislations, which is based on judicial doctrines or statutory legislation. Yet, there is a notable difference among the envisaged anti-abuse measures depending on whether the national legislation is based on the Anglo-American or European-Continental legal system. The efficiency of applying these general anti-abuse rules in taxation largely rests on their interpretation as well as on their relationship with the principle of legality.

  4. The International Double Taxation – Avoiding Methods

    OpenAIRE

    Nicoleta Barbuta-Misu

    2009-01-01

    The paper presents the main causes that determine double taxation, its forms, i.e. the economicdouble taxation and the international legal double taxation, the need for eliminating the double taxation andavoiding methods. In the presentation of the avoidance methods have been used practical examples forcomparison of the tax advantages for income beneficiary between: the total exemption method andprogressive exemption method, on the one hand, and total crediting method and ordinary crediting m...

  5. Avoiding breakdown in the CGS algorithm

    Science.gov (United States)

    Brezinski, Claude; Sadok, Hassane

    1991-06-01

    The conjugate gradient squared algorithm can suffer of similar breakdowns as Lanczos type methods for the same reason that is the non-existence of some formal orthogonal polynomials. Thus curing such breakdowns is possible by jumping over these non-existing polynomials and using only those of them which exist. The technique used is similar to that employed for avoiding breakdowns in Lanczos type methods. The implementation of these new methods is discussed. Numerical examples are given.

  6. Coda-avoiding : some Evidence from Portuguese

    OpenAIRE

    Veloso, João

    2008-01-01

    Romance languages are known to be more restrictive than Germanic languages as far as segmental coda-filling is concerned. Moreover, it is also known that within the Romance family some languages have more restrictive constraints ruling coda-filling than others. This paper deals with the specific question of segmental coda-filling in Portuguese. Looking at a large array of different historical phenomena, it is claimed that avoiding any segmental material in coda position corresponds to a very ...

  7. Traffic jam driving with NMV avoidance

    OpenAIRE

    Milanés Montero, Vicente; Alonso, Luciano; Villagra Serrano, Jorge; Godoy, Jorge; Pedro Lucio, María Teresa de; Oria, Juan P.

    2012-01-01

    n recent years, the development of advanced driver assistance systems (ADAS) – mainly based on lidar and cameras – has considerably improved the safety of driving in urban environments. These systems provide warning signals for the driver in the case that any unexpected traffic circumstance is detected. The next step is to develop systems capable not only of warning the driver but also of taking over control of the car to avoid a potential collision. In the present communication, a system cap...

  8. Potentially avoidable peripartum hysterectomies in Denmark

    DEFF Research Database (Denmark)

    Colmorn, Lotte Berdiin; Krebs, Lone; Langhoff-Roos, Jens

    2016-01-01

    to minimize the number of unnecessary peripartum hysterectomies, obstetricians and anesthesiologists should investigate individual cases by structured clinical audit, and disseminate and discuss the results for educational purposes. An international collaboration is warranted to strengthen our recommendations......Objective: To audit the clinical management preceding peripartum hysterectomy and evaluate if peripartum hysterectomies are potentially avoidable and by which means. Material and Methods: We developed a structured audit form based on explicit criteria for the minimal mandatory management...

  9. Airborne Collision Detection and Avoidance for Small UAS Sense and Avoid Systems

    Science.gov (United States)

    Sahawneh, Laith Rasmi

    The increasing demand to integrate unmanned aircraft systems (UAS) into the national airspace is motivated by the rapid growth of the UAS industry, especially small UAS weighing less than 55 pounds. Their use however has been limited by the Federal Aviation Administration regulations due to collision risk they pose, safety and regulatory concerns. Therefore, before civil aviation authorities can approve routine UAS flight operations, UAS must be equipped with sense-and-avoid technology comparable to the see-and-avoid requirements for manned aircraft. The sense-and-avoid problem includes several important aspects including regulatory and system-level requirements, design specifications and performance standards, intruder detecting and tracking, collision risk assessment, and finally path planning and collision avoidance. In this dissertation, our primary focus is on developing an collision detection, risk assessment and avoidance framework that is computationally affordable and suitable to run on-board small UAS. To begin with, we address the minimum sensing range for the sense-and-avoid (SAA) system. We present an approximate close form analytical solution to compute the minimum sensing range to safely avoid an imminent collision. The approach is then demonstrated using a radar sensor prototype that achieves the required minimum sensing range. In the area of collision risk assessment and collision prediction, we present two approaches to estimate the collision risk of an encounter scenario. The first is a deterministic approach similar to those been developed for Traffic Alert and Collision Avoidance (TCAS) in manned aviation. We extend the approach to account for uncertainties of state estimates by deriving an analytic expression to propagate the error variance using Taylor series approximation. To address unanticipated intruders maneuvers, we propose an innovative probabilistic approach to quantify likely intruder trajectories and estimate the probability of

  10. Resonating Statements: Discursive acts in IT projects

    DEFF Research Database (Denmark)

    Hjelholt, Morten; Jensen, Tina Blegind

    2015-01-01

    IT projects are often complex arrangements of technological components, social actions, and organizational transformation that are difficult to manage in practice. This paper takes an analytical discourse perspective to explore the process of legitimizing IT projects. We introduce the concept of ...... as part of a feedback loop to re-attach the localized IT project to the broader national discourse. The paper concludes with reflections on how to actively build on resonating statements as a strategic resource for legitimizing IT projects....... of resonating statements to highlight how central actors navigate in various discourses over time. Particularly, the statements and actions of an IT project manager are portrayed to show how individuals can legitimize actions by connecting statements to historically produced discourses. The case study...... of an IT project in a Danish local government spans a two-year time period and demonstrates a double-loop legitimization process. First, resonating statements are produced to localize a national IT initiative to support the specificity of a local government discourse. Second, the resonating statements are used...

  11. Granting silence to avoid wireless collisions

    KAUST Repository

    Choi, Jung Il

    2010-10-01

    We describe grant-to-send, a novel collision avoidance algorithm for wireless mesh networks. Rather than announce packets it intends to send, a node using grant-to-send announces packets it expects to hear others send. We present evidence that inverting collision avoidance in this way greatly improves wireless mesh performance. Evaluating four protocols from 802.11 meshes and 802.15.4 sensor networks, we find that grant-to-send matches or outperforms CSMA and RTS/CTS in all cases. For example, in a 4-hop UDP flow, grantto- send can achieve 96% of the theoretical maximum throughput while maintaining a 99.9% packet delivery ratio. Grant-tosend is also general enough to replace protocol-specific collision avoidance mechanisms common to sensor network protocols. Grant-to-send is simple. For example, incorporating it into 802.11 requires only 11 lines of driver code and no hardware changes. Furthermore, as it reuses existing 802.11 mechanisms, grant-to-send inter-operates with current networks and can be incrementally deployed. © 2010 IEEE.

  12. Knowing and Avoiding Plagiarism During Scientific Writing

    Science.gov (United States)

    Kumar, P Mohan; Priya, N Swapna; Musalaiah, SVVS; Nagasree, M

    2014-01-01

    Plagiarism has become more common in both dental and medical communities. Most of the writers do not know that plagiarism is a serious problem. Plagiarism can range from simple dishonesty (minor copy paste/any discrepancy) to a more serious problem (major discrepancy/duplication of manuscript) when the authors do cut-copy-paste from the original source without giving adequate credit to the main source. When we search databases like PubMed/MedLine there is a lot of information regarding plagiarism. However, it is still a current topic of interest to all the researchers to know how to avoid plagiarism. It's time to every young researcher to know ethical guidelines while writing any scientific publications. By using one's own ideas, we can write the paper completely without looking at the original source. Specific words from the source can be added by using quotations and citing them which can help in not only supporting your work and amplifying ideas but also avoids plagiarism. It is compulsory to all the authors, reviewers and editors of all the scientific journals to know about the plagiarism and how to avoid it by following ethical guidelines and use of plagiarism detection software while scientific writing. PMID:25364588

  13. Urban water restrictions: Attitudes and avoidance

    Science.gov (United States)

    Cooper, Bethany; Burton, Michael; Crase, Lin

    2011-12-01

    In most urban cities across Australia, water restrictions remain the dominant policy mechanism to restrict urban water consumption. The extensive adoption of water restrictions as a means to limit demand, over several years, means that Australian urban water prices have consistently not reflected the opportunity cost of water. Given the generally strong political support for water restrictions and the likelihood that they will persist for some time, there is value in understanding households' attitudes in this context. More specifically, identifying the welfare gains associated with avoiding urban water restrictions entirely would be a nontrivial contribution to our knowledge and offer insights into the benefits of alternative policy responses. This paper describes the results from a contingent valuation study that investigates consumers' willingness to pay to avoid urban water restrictions. Importantly, the research also investigates the influence of cognitive and exogenous dimensions on the utility gain associated with avoiding water restrictions. The results provide insights into the impact of the current policy mechanism on economic welfare.

  14. Pavlovian Control of Escape and Avoidance.

    Science.gov (United States)

    Millner, Alexander J; Gershman, Samuel J; Nock, Matthew K; den Ouden, Hanneke E M

    2017-12-15

    To survive in complex environments, animals need to have mechanisms to select effective actions quickly, with minimal computational costs. As perhaps the computationally most parsimonious of these systems, Pavlovian control accomplishes this by hardwiring specific stereotyped responses to certain classes of stimuli. It is well documented that appetitive cues initiate a Pavlovian bias toward vigorous approach; however, Pavlovian responses to aversive stimuli are less well understood. Gaining a deeper understanding of aversive Pavlovian responses, such as active avoidance, is important given the critical role these behaviors play in several psychiatric conditions. The goal of the current study was to establish a behavioral and computational framework to examine aversive Pavlovian responses (activation vs. inhibition) depending on the proximity of an aversive state (escape vs. avoidance). We introduce a novel task in which participants are exposed to primary aversive (noise) stimuli and characterized behavior using a novel generative computational model. This model combines reinforcement learning and drift-diffusion models so as to capture effects of invigoration/inhibition in both explicit choice behavior as well as changes in RT. Choice and RT results both suggest that escape is associated with a bias for vigorous action, whereas avoidance is associated with behavioral inhibition. These results lay a foundation for future work seeking insights into typical and atypical aversive Pavlovian responses involved in psychiatric disorders, allowing us to quantify both implicit and explicit indices of vigorous choice behavior in the context of aversion.

  15. Traffic jam driving with NMV avoidance

    Science.gov (United States)

    Milanés, Vicente; Alonso, Luciano; Villagrá, Jorge; Godoy, Jorge; de Pedro, Teresa; Oria, Juan P.

    2012-08-01

    In recent years, the development of advanced driver assistance systems (ADAS) - mainly based on lidar and cameras - has considerably improved the safety of driving in urban environments. These systems provide warning signals for the driver in the case that any unexpected traffic circumstance is detected. The next step is to develop systems capable not only of warning the driver but also of taking over control of the car to avoid a potential collision. In the present communication, a system capable of autonomously avoiding collisions in traffic jam situations is presented. First, a perception system was developed for urban situations—in which not only vehicles have to be considered, but also pedestrians and other non-motor-vehicles (NMV). It comprises a differential global positioning system (DGPS) and wireless communication for vehicle detection, and an ultrasound sensor for NMV detection. Then, the vehicle's actuators - brake and throttle pedals - were modified to permit autonomous control. Finally, a fuzzy logic controller was implemented capable of analyzing the information provided by the perception system and of sending control commands to the vehicle's actuators so as to avoid accidents. The feasibility of the integrated system was tested by mounting it in a commercial vehicle, with the results being encouraging.

  16. Rapid Assessment of Avoidable Blindness in India.

    Directory of Open Access Journals (Sweden)

    John Neena

    Full Text Available BACKGROUND: Rapid assessment of avoidable blindness provides valid estimates in a short period of time to assess the magnitude and causes of avoidable blindness. The study determined magnitude and causes of avoidable blindness in India in 2007 among the 50+ population. METHODS AND FINDINGS: Sixteen randomly selected districts where blindness surveys were undertaken 7 to 10 years earlier were identified for a follow up survey. Stratified cluster sampling was used and 25 clusters (20 rural and 5 urban were randomly picked in each district.. After a random start, 100 individuals aged 50+ were enumerated and examined sequentially in each cluster. All those with presenting vision = 50 years were enumerated, and 94.7% examined. Based on presenting vision,, 4.4% (95% Confidence Interval[CI]: 4.1,4.8 were severely visually impaired (vision<6/60 to 3/60 in the better eye and 3.6% (95% CI: 3.3,3.9 were blind (vision<3/60 in the better eye. Prevalence of low vision (<6/18 to 6/60 in the better eye was 16.8% (95% CI: 16.0,17.5. Prevalence of blindness and severe visual impairment (<6/60 in the better eye was higher among rural residents (8.2%; 95% CI: 7.9,8.6 compared to urban (7.1%; 95% CI: 5.0, 9.2, among females (9.2%; 95% CI: 8.6,9.8 compared to males (6.5%; 95% CI: 6.0,7.1 and people above 70 years (20.6%; 95% CI: 19.1,22.0 compared to people aged 50-54 years (1.3%; 95% CI: 1.1,1.6. Of all blindness, 88.2% was avoidable. of which 81.9% was due to cataract and 7.1% to uncorrected refractive errors/uncorrected aphakia. CONCLUSIONS: Cataract and refractive errors are major causes of blindness and low vision and control strategies should prioritize them. Most blindness and low vision burden is avoidable.

  17. Predictable and avoidable: What’s next?

    Directory of Open Access Journals (Sweden)

    Ivo Pezzuto

    2014-09-01

    Full Text Available The author of this paper (Dr. Ivo Pezzuto has been one of the first authors to write back in 2008 about the alleged "subprime mortgage loans fraud" which has triggered the 2008 financial crisis, in combination with multiple other complex, highly interrelated, and concurrent factors. The author has been also one of the first authors to report in that same working paper of 2008 (available on SSRN and titled "Miraculous Financial Engineering or Toxic Finance? The Genesis of the U.S. Subprime Mortgage Loans Crisis and its Consequences on the Global Financial Markets and Real Economy" the high probability of a Eurozone debt crisis, due to a number of unsolved structural macroeconomic problems, the lack of a single crisis resolution scheme, current account imbalances, and in some countries, housing bubbles/high private debt. In the book published in 2013 and titled "Predictable and Avoidable: Repairing Economic Dislocation and Preventing the Recurrence of Crisis", Dr. Ivo Pezzuto has exposed the root causes of the financial crisis in order to enables readers to understand that the crisis we have seen was predictable and should have been avoidable, and that a recurrence can be avoided, if lessons are learned and the right action taken. Almost one year after the publication of the book "Predictable and Avoidable: Repairing Economic Dislocation and Preventing the Recurrence of Crisis", the author has decided to write this working paper to explore what happened in the meantime to the financial markets and to the financial regulation implementation. Most of all, the author with this working paper aims to provide an updated analysis as strategist and scenario analyst on the topics addressed in the book "Predictable and Avoidable" based on a forward-looking perspective and on potential "tail risk" scenarios. The topics reported in this paper relate to financial crises; Government policy; financial regulation; corporate governance; credit risk management

  18. Financial statements for legal persons without patrimonial purpose

    OpenAIRE

    Franca DUMITRU; Maria MORARU

    2012-01-01

    Annual financial statements and annual financial statements that are simplified represent a whole. According to the law of accounting, annual financial statements must be accompanied by a written declaration of assumption of responsibility by the leadership of the legal person for annual financial statements in accordance with Accounting rules for legal persons without patrimonial purpose. Annual financial statements are prepared in a clear manner and should be consistent with the provisions ...

  19. See-and-Avoid Collision Avoidance Using ADS-B Signal and Radar Sensing, Phase II

    Data.gov (United States)

    National Aeronautics and Space Administration — IAI proposes an innovative collision avoidance radar and communication technology to detect and track both cooperative and non-cooperative targets. The system...

  20. Outsourcing medical data analyses: can technology overcome legal, privacy, and confidentiality issues?

    Science.gov (United States)

    Brumen, Bostjan; Heričko, Marjan; Sevčnikar, Andrej; Završnik, Jernej; Hölbl, Marko

    2013-12-16

    Medical data are gold mines for deriving the knowledge that could change the course of a single patient's life or even the health of the entire population. A data analyst needs to have full access to relevant data, but full access may be denied by privacy and confidentiality of medical data legal regulations, especially when the data analyst is not affiliated with the data owner. Our first objective was to analyze the privacy and confidentiality issues and the associated regulations pertaining to medical data, and to identify technologies to properly address these issues. Our second objective was to develop a procedure to protect medical data in such a way that the outsourced analyst would be capable of doing analyses on protected data and the results would be comparable, if not the same, as if they had been done on the original data. Specifically, our hypothesis was there would not be a difference between the outsourced decision trees built on encrypted data and the ones built on original data. Using formal definitions, we developed an algorithm to protect medical data for outsourced analyses. The algorithm was applied to publicly available datasets (N=30) from the medical and life sciences fields. The analyses were performed on the original and the protected datasets and the results of the analyses were compared. Bootstrapped paired t tests for 2 dependent samples were used to test whether the mean differences in size, number of leaves, and the accuracy of the original and the encrypted decision trees were significantly different. The decision trees built on encrypted data were virtually the same as those built on original data. Out of 30 datasets, 100% of the trees had identical accuracy. The size of a tree and the number of leaves was different only once (1/30, 3%, P=.19). The proposed algorithm encrypts a file with plain text medical data into an encrypted file with the data protected in such a way that external data analyses are still possible. The results