WorldWideScience

Sample records for avoiding confidential statement

  1. 37 CFR 260.4 - Confidential information and statements of account.

    Science.gov (United States)

    2010-07-01

    ... Confidential information and statements of account. (a) For purposes of this part, confidential information shall include statements of account and any information pertaining to the statements of account... included on the statement of account. (d) Access to the confidential information pertaining to the royalty...

  2. 18 CFR 706.410 - Confidentiality of statements.

    Science.gov (United States)

    2010-04-01

    ... use of information on the statements shall be limited to that necessary to carry out the purposes of... EMPLOYEE RESPONSIBILITIES AND CONDUCT Statements of Employment and Financial Interests § 706.410 Confidentiality of statements. Each statement of employment and financial interests, and each supplementary...

  3. 49 CFR 805.735-21 - Confidentiality of statements.

    Science.gov (United States)

    2010-10-01

    ... TRANSPORTATION SAFETY BOARD EMPLOYEE RESPONSIBILITIES AND CONDUCT § 805.735-21 Confidentiality of statements. Subject to the provisions of § 805.735-24 concerning review of employee statements, each statement of... Personnel Officer is personally responsible for the retention of employee statements in confidence and may...

  4. 37 CFR 382.4 - Confidential information and statements of account.

    Science.gov (United States)

    2010-07-01

    ... information and statements of account. (a) For purposes of this subpart, confidential information shall include statements of account and any information pertaining to the statements of account designated as... payments. (c) A statement of account shall include only such information as is necessary to verify the...

  5. 37 CFR 201.29 - Access to, and confidentiality of, Statements of Account, Verification Auditor's Reports, and...

    Science.gov (United States)

    2010-07-01

    ... confidentiality of, Statements of Account, Verification Auditor's Reports, and other verification information... GENERAL PROVISIONS § 201.29 Access to, and confidentiality of, Statements of Account, Verification Auditor... Account, including the Primary Auditor's Reports, filed under 17 U.S.C. 1003(c) and access to a Verifying...

  6. Library Records: A Review of Confidentiality Laws and Policies.

    Science.gov (United States)

    Million, Angela C.; Fisher, Kim N.

    1986-01-01

    Cites the importance of having a state law, knowing what it says, and having a library policy statement regarding the confidentiality of patron records. Discussion covers writing and implementing a policy, the role of automation, existing laws, library records defined, exceptions to confidentiality, and legal liability. Thirty-seven references are…

  7. 7 CFR 1280.227 - Confidentiality.

    Science.gov (United States)

    2010-01-01

    ... statistical data collected therefrom, which statements do not identify the information furnished by any person... 7 Agriculture 10 2010-01-01 2010-01-01 false Confidentiality. 1280.227 Section 1280.227 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (MARKETING...

  8. 7 CFR 1216.62 - Confidential treatment.

    Science.gov (United States)

    2010-01-01

    ... this subpart or statistical data collected therefrom, which statements do not identify the information... 7 Agriculture 10 2010-01-01 2010-01-01 false Confidential treatment. 1216.62 Section 1216.62 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (MARKETING...

  9. 7 CFR 1209.62 - Confidential treatment.

    Science.gov (United States)

    2010-01-01

    ... this subpart or statistical data collected therefrom, which statements do not identify the information... 7 Agriculture 10 2010-01-01 2010-01-01 false Confidential treatment. 1209.62 Section 1209.62 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (MARKETING...

  10. 7 CFR 1221.127 - Confidential treatment.

    Science.gov (United States)

    2010-01-01

    ... statistical data collected there from, which statements do not identify the information furnished by any... 7 Agriculture 10 2010-01-01 2010-01-01 false Confidential treatment. 1221.127 Section 1221.127 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (MARKETING...

  11. 7 CFR 1160.403 - Confidential treatment.

    Science.gov (United States)

    2010-01-01

    ... statistical data collected from such sources, which statements do not identify the information furnished by... 7 Agriculture 9 2010-01-01 2009-01-01 true Confidential treatment. 1160.403 Section 1160.403 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (Marketing...

  12. 7 CFR 1250.354 - Confidential treatment.

    Science.gov (United States)

    2010-01-01

    ... subject to this subpart or statistical data collected therefrom, which statements do not identify the... 7 Agriculture 10 2010-01-01 2010-01-01 false Confidential treatment. 1250.354 Section 1250.354 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (MARKETING...

  13. 7 CFR 1260.203 - Confidential treatment.

    Science.gov (United States)

    2010-01-01

    ... of persons subject to this subpart or statistical data collected therefrom, which statements do not... 7 Agriculture 10 2010-01-01 2010-01-01 false Confidential treatment. 1260.203 Section 1260.203 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (MARKETING...

  14. 7 CFR 1215.62 - Confidential treatment.

    Science.gov (United States)

    2010-01-01

    ... persons subject to this part or statistical data collected therefrom, which statements do not identify the... 7 Agriculture 10 2010-01-01 2010-01-01 false Confidential treatment. 1215.62 Section 1215.62 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (MARKETING...

  15. 7 CFR 1212.72 - Confidential treatment.

    Science.gov (United States)

    2010-01-01

    ... statements based upon the reports of the number of persons subject to this subpart or statistical data... 7 Agriculture 10 2010-01-01 2010-01-01 false Confidential treatment. 1212.72 Section 1212.72 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (MARKETING...

  16. 7 CFR 1206.62 - Confidential treatment.

    Science.gov (United States)

    2010-01-01

    ... statements based upon the reports of the number of persons subject to this subpart or statistical data... 7 Agriculture 10 2010-01-01 2010-01-01 false Confidential treatment. 1206.62 Section 1206.62 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (MARKETING...

  17. Computer Security: Printing confidentially

    CERN Document Server

    Stefan Lueders, Computer Security Team

    2015-01-01

    Have you ever hesitated to print a confidential document using CERN printers? Or perhaps you have rushed quickly to the printer after hitting the “print” button in order to avoid someone else getting hold of and reading your document? These times are over now with the new printing infrastructure!   Indeed, many of us regularly print out confidential documents like our salary slips, MARS forms, tendering documents and drafts of preliminary papers. The upcoming CERN data protection policy will require all of us to respect the confidentiality of such documents and, as the word “confidential” implies, access to “confidential” or sensitive documents will be tightly controlled. What can we do about the public printers located in many buildings, floors and shared spaces - accessible not only to CERN staff and users but also to visitors and guests? Some printers are located in the vicinity of restaurants, cafeterias or close to paths taken b...

  18. 12 CFR 366.13 - What is my obligation regarding confidential information?

    Science.gov (United States)

    2010-01-01

    ... services on your behalf may use or disclose information obtained from us or a third party in connection... general public. (b) The following are examples of when your use of confidential information is... financial information, such as a financial statement to an unauthorized party. ...

  19. 48 CFR 1415.207-71 - Confidentiality of proposal evaluation.

    Science.gov (United States)

    2010-10-01

    ... THE INTERIOR CONTRACTING METHODS AND CONTRACT TYPES CONTRACTING BY NEGOTIATION Solicitation and... evaluators and advisors shall sign a Conflict of Interest Certificate and a Confidentiality Certificate in a... outside the Government shall take into consideration requirements for avoiding individual conflicts of...

  20. Confidential patent application with an example of preparation

    Directory of Open Access Journals (Sweden)

    Obrad T. Čabarkapa

    2013-12-01

    is submitted: power of attorney; cofirmation on presenting the invention at an international exhibition; certified copy of the first patent application; statement on the basis of entitlement to file an application; statement by the inventor if he does not want to be mentioned in the patent application; proof of the payment of the patent application fee; statement of a joint representative if there are more applicants. Conclusion In order that a confidential invention receive  patent or petty patent protection, it is necessary to file a patent application. A confidential patent application is a very comprehensive document which has to be compiled with expert knowledge from both the technical field to which the application relates and the field of intellectual property protection. The shown content of the confidential patent application with an example can be useful for inventors in their attempts to draw up their own patent applications. [1] The structure and the content of a confidential patent application  is identical  to the content and the form of a patent application submitted to the Intellectual Property Office,a competent state institution for the protection of intellectual property. 

  1. Participants' safety versus confidentiality: A case study of HIV research.

    Science.gov (United States)

    Leyva-Moral, Juan Manuel; Feijoo-Cid, Maria

    2017-05-01

    Background When conducting qualitative research, participants usually share lots of personal and private information with the researcher. As researchers, we must preserve participants' identity and confidentiality of the data. Objective To critically analyze an ethical conflict encountered regarding confidentiality when doing qualitative research. Research design Case study. Findings and discussion one of the participants in a study aiming to explain the meaning of living with HIV verbalized his imminent intention to commit suicide because of stigma of other social problems arising from living with HIV. Given the life-threatening situation, the commitment related to not disclosing the participant's identity and/or the content of the interview had to be broken. To avoid or prevent suicide, the therapist in charge of the case was properly informed about the participant's intentions. One important question arises from this case: was it ethically appropriate to break the confidentiality commitment? Conclusion confidentiality could be broken if a life-threatening event is identified during data collection and participants must know that. This has to be clearly stated in the informed consent form.

  2. Confidentiality and personal integrity.

    Science.gov (United States)

    Edgar, A

    1994-06-01

    This paper uses the social theory of Erving Goffman in order to argue that confidentiality should be understood in relation to the mundane social skills by which individuals present and respect specific self-images of themselves and others during social interaction. The breaching of confidentiality is analysed in terms of one person's capacity to embarrass another, and so to expose that person as incompetent. Respecting confidentiality may at once serve to protect the vulnerable from an unjust society, and yet also protect the guilty from just accusation. Ethical reasoning about confidentiality must therefore recognize the dangers of prejudice and violence inherent in decisions to breach or to respect confidentiality. Case studies are used to illustrate the efficacy of this account, culminating with analyses of three examples from the UKCC document Confidentiality.

  3. Confidential data in a competitive utility environment: A regulatory perspective

    Energy Technology Data Exchange (ETDEWEB)

    Vine, E.

    1996-08-01

    Historically, the electric utility industry has been regarded as one of the most open industries in the United States in sharing information but their reputation is being challenged by competitive energy providers, the general public, regulators, and other stakeholders. As the prospect of competition among electricity power providers has increased in recent years, many utilities have been requesting that the data they submit to their utility regulatory commissions remain confidential. Withholding utility information from the public is likely to have serious and significant policy implications with respect to: (1) consumer education, the pursuit of truth, mutual respect among parties, and social cooperation; (2) the creation of a fair market for competitive energy services; (3) the regulatory balance; (4) regional and national assessments of energy-savings opportunities; (5) research and development; and (6) evaluations of utility programs, plans, and policies. In a telephone survey of all public utility commissions (PUCs) that regulate electric and gas utilities in the U.S., we found that almost all PUCs have received requests from utility companies for data to be filed as confidential, and confidential data filings appear to have increased (both in scope and in frequency) in those states where utility restructuring is being actively discussed. The most common types of data submitted as confidential by utilities dealt with specific customer data, market data, avoided costs, and utility costs.

  4. Evaluation in a competitive utility environment: the threat of confidentiality

    International Nuclear Information System (INIS)

    Vine, Edward

    1997-01-01

    information needs and sources and revise existing policies. 2. Review process for handling confidentiality claims and revise existing policies. 3. Monitor restructuring activities. 4. Develop framework and specific guidelines. 5. Develop standards of conduct. 6. Hold workshops on confidentiality. 7. Design and implement a pilot project. 8. Establish and support consumer advocates. 9. Support more research on confidentiality. Utilities will be reluctant to support these activities and develop the new rules of the game. Regulators need to be more proactive and conduct the above activities promptly in order to avoid paralysis and inertia and to maintain the regulatory balance. The lack of a regulatory framework and specific policies for information access may only make existing problems more severe. The issue of confidentiality has broad sociopolitical dimensions. In the next few years, commissions will be asked to create information policies that will demonstrate the degree of their support for public access to utility- held information. These policies will be important since they can ''profoundly affect the manner in which an individual in a society, indeed a society itself, makes political, economic and social choices.'' Finally, in all likelihood, evaluators will need to adapt to an environment where utility data will be more difficult to obtain and disseminate. It is premature to see how increased confidentiality will affect the objectivity, usefulness, validity, and reliability of evaluations. If the evaluation community wishes to maintain the high its work, creative solutions will most needed

  5. 18 CFR 706.405 - Supplementary statements.

    Science.gov (United States)

    2010-04-01

    ... employee shall at all times avoid acquiring a financial interest that could result, or taking an action... EMPLOYEE RESPONSIBILITIES AND CONDUCT Statements of Employment and Financial Interests § 706.405... employment and financial interests shall be reported in a supplementary statement, in the format prescribed...

  6. 77 FR 65177 - Swap Data Repositories: Interpretative Statement Regarding the Confidentiality and...

    Science.gov (United States)

    2012-10-25

    ... COMMODITY FUTURES TRADING COMMISSION Swap Data Repositories: Interpretative Statement Regarding...\\ which requires all swaps-- whether cleared or uncleared--to be reported to swap data repositories... of the CEA to add a definition of the term ``swap data repository.'' Pursuant to CEA section 1a(48...

  7. Confidentiality and integrity in crowdsourcing systems

    CERN Document Server

    Ranj Bar, Amin

    2014-01-01

    Confidentiality and Integrity in Crowdsourcing Systems focuses on identity, privacy, and security related issues in crowdsourcing systems and in particular the confidentiality and integrity of online data created via crowdsourcing. This book begins with an introduction to crowdsourcing and then covers the privacy and security challenges of Confidentiality. The book examines integrity in these systems and the management and control of crowdsourcing systems.

  8. A challenge to unqualified medical confidentiality.

    Science.gov (United States)

    Bozzo, Alexander

    2018-04-01

    Medical personnel sometimes face a seeming conflict between a duty to respect patient confidentiality and a duty to warn or protect endangered third parties. The conventional answer to dilemmas of this sort is that, in certain circumstances, medical professionals have an obligation to breach confidentiality. Kenneth Kipnis has argued, however, that the conventional wisdom on the nature of medical confidentiality is mistaken. Kipnis argues that the obligation to respect patient confidentiality is unqualified or absolute, since unqualified policies can save more lives in the long run. In this paper, I identify the form of Kipnis's argument and present a challenge to it. I conclude that, as matters stand now, a qualified confidentiality policy is the more rational choice. © Article author(s) (or their employer(s) unless otherwise stated in the text of the article) 2018. All rights reserved. No commercial use is permitted unless otherwise expressly granted.

  9. Confidential donation confirmation as an alternative to confidential unit exclusion: 15 months experience of the HEMOMINAS foundation

    Directory of Open Access Journals (Sweden)

    Flávia Cristine Martineli Loureiro

    2011-01-01

    Full Text Available BACKGROUND: Confidential unit exclusion remains a controversial strategy to reduce the residual risk of transfusion-transmitted infections. OBJECTIVE: This study aimed to analyze confidential unit exclusion from its development in a large institution in light of confidential donation confirmation. METHODS: Data of individuals who donated from October 1, 2008 to December 31, 2009 were analyzed in a case-control study. The serological results and sociodemographic characteristics of donors who did not confirm their donations were compared to those who did. Variables with p-values < 0.20 in univariate analysis were included in a logistic multivariate analysis. RESULTS: In the univariate analysis there was a statically significant association between positive serological results and response to confidential donation confirmation of "No". Donation type, (firsttime or return donor - OR 1.69, CI 1.37-2.09, gender (OR 1.66, CI 1.35-2.04, education level (OR 2.82, CI 2.30-3.47 and ethnic background (OR 0.67, CI 0.55-0.82 were included in the final logistic regression model. In all logistic regression models analyzed, the serological suitability and confidential donation confirmation were not found to be statistically associated. The adoption of new measures of clinical classification such as audiovisual touch-screen computer-assisted self-administered interviews might be more effective than confidential unit exclusion in the identification of donor risk behavior. The requirement that transfusion services continue to use confidential unit exclusion needs to be debated in countries where more specific and sensitive clinical and serological screening methods are available. CONCLUSION: Our findings suggest that there are not enough benefits to justify continued use of confidential donation confirmation in the analyzed institution.

  10. 49 CFR 805.735-17 - Supplementary statements.

    Science.gov (United States)

    2010-10-01

    ... SAFETY BOARD EMPLOYEE RESPONSIBILITIES AND CONDUCT § 805.735-17 Supplementary statements. Changes in, or additions to, the information contained in an employee's statement of employment and financial interests.... Notwithstanding the filing of the annual report required by this section, each employee shall at all times avoid...

  11. 22 CFR 130.15 - Confidential business information.

    Science.gov (United States)

    2010-04-01

    ..., confidential business information means commercial or financial information which by law is entitled to... 22 Foreign Relations 1 2010-04-01 2010-04-01 false Confidential business information. 130.15... CONTRIBUTIONS, FEES AND COMMISSIONS § 130.15 Confidential business information. (a) Any person who is required...

  12. 7 CFR 1280.634 - Confidentiality.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 10 2010-01-01 2010-01-01 false Confidentiality. 1280.634 Section 1280.634 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (MARKETING... persons voting in the referendum and ballots shall be confidential and the contents of the ballots shall...

  13. 19 CFR 200.735-117 - Supplementary statements.

    Science.gov (United States)

    2010-04-01

    ... under this section, each employee shall at all times avoid acquiring a financial interest that could... CONDUCT Provisions Governing Statements of Employment and Financial Interests § 200.735-117 Supplementary... and financial interests shall be reported in a supplementary statement as of June 30 each year. If no...

  14. 15 CFR 806.5 - Confidentiality.

    Science.gov (United States)

    2010-01-01

    ... 15 Commerce and Foreign Trade 3 2010-01-01 2010-01-01 false Confidentiality. 806.5 Section 806.5 Commerce and Foreign Trade Regulations Relating to Commerce and Foreign Trade (Continued) BUREAU OF ECONOMIC ANALYSIS, DEPARTMENT OF COMMERCE DIRECT INVESTMENT SURVEYS § 806.5 Confidentiality. Information...

  15. Confidentiality in psychological practice: a decrepit concept?

    Science.gov (United States)

    McMahon, M; Knowles, A D

    1995-11-01

    Although the principle of confidentiality in the relationship between psychologists and client has been vaunted, and is emphasised in the Australian Psychological Society's Code of Professional Conduct (the APS code; 1994), the confidentiality of this relationship is circumscribed by the absence of legal protections, the ethical beliefs of psychologists, institutional practices, and the provisions of the APS code itself. Lack of privilege in judicial proceedings, and statutory obligations to report certain types of behaviour, mandate breaches of confidentiality in some circumstances. Ethical beliefs of psychologists may support disclosure, especially where it is believed that there is danger of serious physical harm to the client or others. Multidisciplinary teams and institutional settings require the exchange of information for optimal delivery of services. Recent amendments to the APS code may require disclosure without the client's consent when a client is believed to be suicidal. Such developments, when considered at all, are typically regarded as exceptions to a general obligation of confidentiality. However, discussion of exceptions presupposes agreement on fundamental principle: the significance of, and rationale for, confidentiality in the psychologist-client relationship. It is argued in this paper that the obligation of confidentiality has been assumed rather than vigorously analysed and empirically explored. A critical examination of this obligation is the most appropriate starting point for the rehabilitation of contemporary principles of confidentiality in the psychologist-client relationship.

  16. 7 CFR 1150.278 - Confidential treatment.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 9 2010-01-01 2009-01-01 true Confidential treatment. 1150.278 Section 1150.278 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (Marketing... of Milk Producer Organizations § 1150.278 Confidential treatment. All documents and other information...

  17. 40 CFR 716.55 - Confidentiality claims.

    Science.gov (United States)

    2010-07-01

    ... confidential business information, health and safety studies of any substance or mixture that has been offered for commercial distribution (including for test marketing purposes and for use in research and... because disclosure would reveal a confidential process or quantitative mixture composition should briefly...

  18. 7 CFR 1206.107 - Confidential information.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 10 2010-01-01 2010-01-01 false Confidential information. 1206.107 Section 1206.107 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (MARKETING... INFORMATION Referendum Procedures. § 1206.107 Confidential information. The ballots and other information or...

  19. The Confidentiality of Interlibrary Loan Records.

    Science.gov (United States)

    Nolan, Christopher W.

    1993-01-01

    Discusses potential problems for confidentiality within interlibrary loan requests, outlines legal issues related to confidentiality, and proposes guidelines intended to protect library users' rights to privacy. Interlibrary loan documentation procedures are considered; laws and professional standards are reviewed; and the disposition of…

  20. 31 CFR 9.6 - Confidential information.

    Science.gov (United States)

    2010-07-01

    ... 9.6 Money and Finance: Treasury Office of the Secretary of the Treasury EFFECTS OF IMPORTED ARTICLES ON THE NATIONAL SECURITY § 9.6 Confidential information. Information submitted in confidence which... marked “Business Confidential.” [40 FR 50717, Oct. 31, 1975] ...

  1. 15 CFR 705.6 - Confidential information.

    Science.gov (United States)

    2010-01-01

    ... EFFECT OF IMPORTED ARTICLES ON THE NATIONAL SECURITY § 705.6 Confidential information. (a) Any... the investigation that would disclose national security classified information or business... Security Classified” or “Business Confidential,” as appropriate, marked at the top of each sheet. Any...

  2. 7 CFR 1207.352 - Confidential treatment.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 10 2010-01-01 2010-01-01 false Confidential treatment. 1207.352 Section 1207.352 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (MARKETING... PLAN Potato Research and Promotion Plan Reports, Books, and Records § 1207.352 Confidential treatment...

  3. 7 CFR 1205.340 - Confidential treatment.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 10 2010-01-01 2010-01-01 false Confidential treatment. 1205.340 Section 1205.340 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (MARKETING... Cotton Research and Promotion Order Reports, Books, and Records § 1205.340 Confidential treatment. All...

  4. 7 CFR 1220.243 - Confidential treatment.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 10 2010-01-01 2010-01-01 false Confidential treatment. 1220.243 Section 1220.243 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (MARKETING... Confidential treatment. Except as otherwise provided in the Act, financial or commercial information that is...

  5. THE INFORMATION CONFIDENTIALITY AND CYBER SECURITY IN MEDICAL INSTITUTIONS

    Directory of Open Access Journals (Sweden)

    SABAU-POPA CLAUDIA DIANA

    2015-07-01

    Full Text Available The information confidentiality and cyber security risk affects the right to confidentiality and privacy of the patient, as regulated in Romania by the Law 46/2002. The manifestation of the cyber security risk event affects the reputation of the healthcare institution and is becoming more and more complex and often due to the: development of network technology, the medical equipment connected to wifi and the electronic databases. The databases containing medical records were implemented due to automation. Thus, transforming data into medical knowledge contribute to a better understanding of the disease. Due to these factors, the measures taken by the hospital management for this type of risk are adapted to the cyber changes. The hospital objectives aim: the implementation of a robust information system, the early threats identifications and the incident reporting. Neglecting this type of risk can generate financial loss, inability to continue providing health care services for a certain period of time, providing an erroneous diagnosis, medical equipment errors etc. Thus, in a digital age the appropriate risk management for the information security and cyber risk represent a necessity. The main concern of hospitals worldwide is to align with international requirements and obtain credentials in terms of data security from the International Organisation for Standardization, which regulates the management of this type of risk. Romania is at the beginning in terms of concerns regarding the management, avoidance and mitigation of information security, the health system being most highly exposed to its manifestation. The present paper examines the concerns of the health system to the confidentiality of information and cyber security risk and its management arrangements. Thus, a set of key risk indicators is implemented and monitored for 2011-2013, using a user interface, a Dashboard, which acts as an early warning system of the manifestation of the

  6. Confidentiality and the employee assistance program professional.

    Science.gov (United States)

    Mistretta, E F; Inlow, L B

    1991-02-01

    During the last two decades EAPs have offered employees confidential assessment, counseling, and referral. Many occupational health nurses have taken on the role of EAP professional or function as the liaison between the EAP counselor and the employee. The occupational health nurse involved in any EAP issue must adhere to the standards of confidentiality. The federal and state laws, company policy, and professional codes of ethics regarding these clients must be clearly understood, especially related to the issue of confidentiality.

  7. Professional Disclosure Statements and Formal Plans for Supervision: Two Strategies for Minimizing the Risk of Ethical Conflicts in Post-Master's Supervision.

    Science.gov (United States)

    Cobia, Debra C.; Boes, Susan R.

    2000-01-01

    Discusses ethical conflicts related to issues of informed consent, due process, competence, confidentiality, and dual relationships in supervision. Proposes two strategies as ways to minimize the potential for ethical conflict in post-master's supervision: the use of professional disclosure statements by supervisors and the development of formal…

  8. 15 CFR 718.3 - Disclosure of confidential business information.

    Science.gov (United States)

    2010-01-01

    ... 15 Commerce and Foreign Trade 2 2010-01-01 2010-01-01 false Disclosure of confidential business... (Continued) BUREAU OF INDUSTRY AND SECURITY, DEPARTMENT OF COMMERCE CHEMICAL WEAPONS CONVENTION REGULATIONS CONFIDENTIAL BUSINESS INFORMATION § 718.3 Disclosure of confidential business information. (a) General...

  9. Plagiarism in Personal Statements of Anesthesiology Residency Applicants.

    Science.gov (United States)

    Parks, Lance J; Sizemore, Daniel C; Johnstone, Robert E

    2016-02-15

    Plagiarism by residency applicants in their personal statements, as well as sites that sell personal statements, have been described, and led in 2011 to advice to avoid plagiarism and the caution that plagiarism detection software was available. We screened personal statements of 467 anesthesiology residency applicants from 2013-2014 using Viper Plagiarism Scanner software, and studied them for plagiarism. After quotes and commonly used phrases were removed, 82 statements contained unoriginal content of 8 or more consecutive words. After the study, 13.6% of personal statements from non-United States medical school graduates, and 4.0% from United States medical school graduates, contained plagiarized material, a significant difference. Plagiarized content ranged up to 58%. Plagiarism continues to occur in anesthesiology residency personal statements, with a higher incidence among graduates of non-United States medical schools.

  10. Pengaruh Ukuran Perusahaan terhadap Aggressive Tax Avoidance di Indonesia

    Directory of Open Access Journals (Sweden)

    M. Khoiru Rusydi

    2013-08-01

    Full Text Available This study aims to empirically examine the effect of firm size (Firm Size against aggressive tax avoidance (aggressive tax avoidance in Indonesia. The method in use is descriptive quantitative with panel data of financial statements of listed companies on the Stock Exchange in the period 2010-2012 which regresswith Eviews program. The results of this study indicate that company size has no effect on aggressive tax avoidance in Indonesia, which means that the behavior of firms in Indonesia for more aggressive tax avoidance do not affect the size of the company.

  11. Pengaruh Ukuran Perusahaan terhadap Aggressive Tax Avoidance di Indonesia

    OpenAIRE

    M. Khoiru Rusydi

    2013-01-01

    This study aims to empirically examine the effect of firm size (Firm Size) against aggressive tax avoidance (aggressive tax avoidance) in Indonesia. The method in use is descriptive quantitative with panel data of financial statements of listed companies on the Stock Exchange in the period 2010-2012 which regresswith Eviews program. The results of this study indicate that company size has no effect on aggressive tax avoidance in Indonesia, which means that the behavior of firms in Indonesia f...

  12. 19 CFR 181.121 - Maintenance of confidentiality.

    Science.gov (United States)

    2010-04-01

    ... 181.121 Customs Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY; DEPARTMENT OF THE TREASURY (CONTINUED) NORTH AMERICAN FREE TRADE AGREEMENT Confidentiality of Business... possession of confidential business information collected pursuant to this part shall, in accordance with...

  13. Law and ethics in conflict over confidentiality?

    Science.gov (United States)

    Dickens, B M; Cook, R J

    2000-09-01

    Ethical principles that require the preservation of patients' confidential information are reinforced by principles found in several areas of law, such as law on contracts, negligence, defamation and fiduciary duty. However, laws sometimes compel disclosures of medical confidences, and more often may justify or excuse disclosures. Legally contentious issues concern patients' confidences regarding possible unlawful conduct, such as pregnancy termination, and the risk of spread of HIV and other infections. This article reviews the various legal bases of the duty of confidentiality, and legal challenges to the ethical obligation of non-disclosure. It addresses the justifications and limits of exchange of patients' health information among healthcare professionals and trainees, and considers legally recognized limits of confidential duties, and the scope of legitimate disclosure. An underlying theme is how to determine whether physicians are ethically justified in employing the discretion the law sometimes affords them to breach patients' expectations of confidentiality.

  14. 19 CFR 210.5 - Confidential business information.

    Science.gov (United States)

    2010-04-01

    ... 19 Customs Duties 3 2010-04-01 2010-04-01 false Confidential business information. 210.5 Section 210.5 Customs Duties UNITED STATES INTERNATIONAL TRADE COMMISSION INVESTIGATIONS OF UNFAIR PRACTICES IN IMPORT TRADE ADJUDICATION AND ENFORCEMENT Rules of General Applicability § 210.5 Confidential...

  15. WTO confidential: the case of asbestos.

    Science.gov (United States)

    Castleman, Barry

    2003-01-01

    The World Trade Organization (WTO), established in 1995, adjudicates "trade disputes" between member nations in cases with human rights, cultural, environmental, and public health significance. Throughout the resolution process and even after a case's conclusion, little of what happens is made accessible to the public. However, it is one thing to criticize the WTO for its lack of transparency from outside the process and another to critically examine what was withheld from disclosure and what dangers that presents. This is the inside story from a scientific adviser to one party in a WTO case, who analyzes what happened from a public health point of view. The analysis concludes that the public health justification for banning asbestos was accepted in the end by WTO economists, despite the WTO's bias in favor of the party (Canada) making the free trade challenge (to public health legislation), despite the WTO's lack of expertise in science, medicine, engineering, and public health, and despite important erroneous statements made to the WTO under the cover of confidentiality. The case nevertheless illustrates that the WTO's threat to national sovereignty could never withstand the light of day if the limitations and dangers of the process were open for all to see.

  16. 42 CFR 35.11 - Clinical records; confidential.

    Science.gov (United States)

    2010-10-01

    ... EXAMINATIONS HOSPITAL AND STATION MANAGEMENT General § 35.11 Clinical records; confidential. A complete clinical record shall be maintained for each patient admitted to a station or hospital of the Service. Such... 42 Public Health 1 2010-10-01 2010-10-01 false Clinical records; confidential. 35.11 Section 35.11...

  17. Parents: Avoid Kids Foot Problems with the Right Shoes

    Science.gov (United States)

    ... Print | Share Avoid Kids Foot Problems with the Right Shoes Before you head to the store to ... College of Foot and Ankle Surgeons (ACFAS), All Rights Reserved. Privacy Statement | Disclaimer | Terms and Conditions | Site ...

  18. Is patient confidentiality compromised with the electronic health record?: a position paper.

    Science.gov (United States)

    Wallace, Ilse M

    2015-02-01

    In order for electronic health records to fulfill their expected benefits, protection of privacy of patient information is key. Lack of trust in confidentiality can lead to reluctance in disclosing all relevant information, which could have grave consequences. This position paper contemplates whether patient confidentiality is compromised by electronic health records. The position that confidentiality is compromised was supported by the four bioethical principles and argued that despite laws and various safeguards to protect patients' confidentiality, numerous data breaches have occurred. The position that confidentiality is not compromised was supported by virtue ethics and a utilitarian viewpoint and argued that safeguards keep information confidential and the public feels relatively safe with the electronic health record. The article concludes with an ethically superior position that confidentiality is compromised with the electronic health record. Although organizational and governmental ways of enhancing the confidentiality of patient information within the electronic health record facilitate confidentiality, the ultimate responsibility of maintaining confidentiality rests with the individual end-users and their ethical code of conduct. The American Nurses Association Code of Ethics for nurses calls for nurses to be watchful with data security in electronic communications.

  19. Can you keep a secret? Confidentiality in psychotherapy.

    Science.gov (United States)

    Younggren, Jeffrey N; Harris, Eric A

    2008-05-01

    Confidentiality is the secret-keeping duty that arises from the establishment of the professional relationship psychologists develop with their clients. It is a duty created by the professional relationship, it is set forth in the American Psychological Association's (2002) Ethical Principles and Code of Conduct, and it is codified in many state regulations. However, the difference between confidentiality and legal privilege; how, why, and when it can be violated; and the reasons for so doing are not well understood by many practitioners. While on the surface confidentiality might seem to be an easy concept to apply to professional practice, in fact it is quite complex and filled with exceptions that frequently differ from circumstance to circumstance and from state to state. A lack of respect for and a lack of familiarity with the significance of these exceptions could have dire professional consequences. This article reviews the ethical imperative of confidentiality and then provides examples of legal cases that help to better understand its complexity. Then, we offer strategies designed to help metal health practitioners when they are confronted with questions regarding confidentiality and privilege.

  20. Protecting Privacy and Confidentiality in Environmental Health Research.

    Science.gov (United States)

    Resnik, David B

    2010-01-01

    Environmental health researchers often need to make difficult decisions on how to protect privacy and confidentiality when they conduct research in the home or workplace. These dilemmas are different from those normally encountered in clinical research. Although protecting privacy and confidentiality is one of the most important principles of research involving human subjects, it can be overridden to prevent imminent harm to individuals or if required by law. Investigators should carefully consider the facts and circumstances and use good judgment when deciding whether to breach privacy or confidentiality.

  1. Ombuds’ corner: Confidentiality

    CERN Multimedia

    Vincent Vuillemin

    2011-01-01

    In this series, the Bulletin aims to explain the role of the Ombuds at CERN by presenting practical examples of misunderstandings that could have been resolved by the Ombuds if he had been contacted earlier. Please note that, in all the situations we present, the names are fictitious and used only to improve clarity.    Jane* came to the Ombuds to share her concerns about the actions of Mike*, one of her senior colleague supervisors, and insisted on the absolute confidentiality. The Ombuds promised to keep the information confidential following the terms of his mandate. During the discussion it appeared that the whole group was affected by the situation, spending a lot of time discussing how to resolve the problem instead of focusing on their main responsibilities. The risks for the Organization seemed very high and could possibly endanger the safety of the operations.  On one side, the Ombuds believed that it was essential to bring this matter to the attention of senior managem...

  2. Confidential benchmarking based on multiparty computation

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre; Damgård, Kasper Lyneborg; Nielsen, Kurt

    We report on the design and implementation of a system that uses multiparty computation to enable banks to benchmark their customers' confidential performance data against a large representative set of confidential performance data from a consultancy house. The system ensures that both the banks......' and the consultancy house's data stays confidential, the banks as clients learn nothing but the computed benchmarking score. In the concrete business application, the developed prototype help Danish banks to find the most efficient customers among a large and challenging group of agricultural customers with too much...... debt. We propose a model based on linear programming for doing the benchmarking and implement it using the SPDZ protocol by Damgård et al., which we modify using a new idea that allows clients to supply data and get output without having to participate in the preprocessing phase and without keeping...

  3. Client confidentiality: Perspectives of students in a healthcare ...

    African Journals Online (AJOL)

    This moral dilemma is difficult for students to circumvent and therefore this paper presents healthcare students' perspectives of confidentiality. Methods. We aimed to explore healthcare students' views and experiences of confidentiality as an ethical principle by adopting a qualitative explorative approach. Purposeful ...

  4. Physician Knowledge and Attitudes around Confidential Care for Minor Patients.

    Science.gov (United States)

    Riley, Margaret; Ahmed, Sana; Reed, Barbara D; Quint, Elisabeth H

    2015-08-01

    Minor adolescent patients have a legal right to access certain medical services confidentially without parental consent or notification. We sought to assess physicians' knowledge of these laws, attitudes around the provision of confidential care to minors, and barriers to providing confidential care. An anonymous online survey was sent to physicians in the Departments of Family Medicine, Internal Medicine-Pediatrics, Obstetrics/Gynecology, and Pediatrics at the University of Michigan. Response rate was 40% (259/650). The majority of physicians felt comfortable addressing sexual health, mental health, and substance use with adolescent patients. On average, physicians answered just over half of the legal knowledge questions correctly (mean 56.6% ± 16.7%). The majority of physicians approved of laws allowing minors to consent for confidential care (90.8% ± 1.7% approval), while substantially fewer (45.1% ± 4.5%) approved of laws allowing parental notification of this care at the physician's discretion. Most physicians agreed that assured access to confidential care should be a right for adolescents. After taking the survey most physicians (76.6%) felt they needed additional training on confidentiality laws. The provision of confidential care to minors was perceived to be most inhibited by insurance issues, parental concerns/relationships with the family, and issues with the electronic medical record. Physicians are comfortable discussing sensitive issues with adolescents and generally approve of minor consent laws, but lack knowledge about what services a minor can access confidentially. Further research is needed to assess best methods to educate physicians about minors' legal rights to confidential healthcare services. Copyright © 2015 North American Society for Pediatric and Adolescent Gynecology. Published by Elsevier Inc. All rights reserved.

  5. Breaching confidentiality: medical mandatory reporting laws in Iran.

    Science.gov (United States)

    Milanifar, Alireza; Larijani, Bagher; Paykarzadeh, Parvaneh; Ashtari, Golanna; Mehdi Akhondi, Mohammad

    2014-01-01

    Medical ethics is a realm where four important subjects of philosophy, medicine, theology and law are covered. Physicians and philosophers cooperation in this area will have great efficiency in the respective ethical rules formation. In addition to respect the autonomy of the patient, physician's obligation is to ensure that the medical intervention has benefit for the patient and the harm is minimal. There is an obvious conflict between duty of confidentiality and duty of mandatory reporting. Professional confidentiality is one of the basic components in building a constant physician-patient relationship which nowadays, beside the novelty, it is the subject of discussion. Legal obligation of confidentiality is not absolute. In physician-patient relationship, keeping patient's secrets and maintaining confidentiality is a legal and ethical duty, and disclosure of such secrets is mainly through specific statutes. Thus, there are a number of situations where breach of confidentiality is permitted in different legal systems. One of the situations where breaching confidentiality is permitted is the medical mandatory reporting to the relevant authority which is in accordance with many countries' legal systems. Some situations are considered in many countries legal systems' such as notification of births and deaths, infectious diseases, child abuse, sport and relevant events, medical errors, drug side effects and dangerous pregnancies. In this paper, we will examine and discuss medical mandatory reporting and its ethical and legal aspects in the judicial and legal system of Iran and few other countries. Finally we will suggest making Medical Mandatory Reporting Law in Iran.

  6. Confidentiality: From the Stacks to the Witness Stand.

    Science.gov (United States)

    Lee, Janis M.; Smith, G. Guy

    1988-01-01

    A library director describes her experience of safeguarding the confidentiality of the circulation records of a woman who went on a shooting rampage at a shopping mall. The lawyer who represented the library discusses the legal responsibility of public and school libraries concerning confidentiality. (CLB)

  7. Environmental impact statement 1987. Umweltgutachten 1987

    Energy Technology Data Exchange (ETDEWEB)

    1988-01-01

    In its third statement after 1974 and 1978 the Council of Environmental Experts describes the state of the environment and points out misdevelopments and ways of avoiding them. The subject's complexity defies the environmental impact statement's completeness. Other than the two preceding ones the 1987 statement focuses but on selected fields and aspects. In view of the fact that the environmental policy of the late eighties and of the nineties to come requires a general, transsectoral and balanced concept the statement puts much care into a comprehensive discussion of the basic traits of a general environmental policy. The characteristics worked out are applicable to any environmental sector and include man's consciousness of the environment and his behaviour towards it, active pollution abatement, economic aspects, and the structure of pollution sources in the Federal Republic of Germany. While the sectors of pollution control include ground and air pollution abatement the selected fields comprise environment and health, energy, transportation, regional planning, and recreation and tourism. (orig./HSCH).

  8. 20 CFR 726.113 - Disclosure of confidential information.

    Science.gov (United States)

    2010-04-01

    ... MINE OPERATOR'S INSURANCE Authorization of Self-Insurers § 726.113 Disclosure of confidential... 20 Employees' Benefits 3 2010-04-01 2010-04-01 false Disclosure of confidential information. 726... authorized self-insurer or applicant for the authorization of self-insurance obtained by the Office shall be...

  9. Practical State Machine Replication with Confidentiality

    Energy Technology Data Exchange (ETDEWEB)

    Duan, Sisi [ORNL; Zhang, Haibin [University of North Carolina, Chapel Hill

    2016-01-01

    We study how to enable arbitrary randomized algorithms in Byzantine fault-tolerant (BFT) settings. We formalize a randomized BFT protocol and provide a simple and efficient construction that can be built on any existing BFT protocols while adding practically no overhead. We go one step further to revisit a confidential BFT protocol (Yin et al., SOSP '03). We show that their scheme is potentially susceptible to safety and confidentiality attacks. We then present a new protocol that is secure in the stronger model we formalize, by extending the idea of a randomized BFT protocol. Our protocol uses only efficient symmetric cryptography, while Yin et al.'s uses costly threshold signatures. We implemented and evaluated our protocols on microbenchmarks and real-world use cases. We show that our randomized BFT protocol is as efficient as conventional BFT protocols, and our confidential BFT protocol is two to three orders of magnitude faster than Yin et al.'s, which is less secure than ours.

  10. CRAC : Confidentiality risk analysis and IT-architecture comparison of business networks

    NARCIS (Netherlands)

    Morali, A.; Zambon, E.; Etalle, S.; Wieringa, R.J.

    2009-01-01

    The leakage of confidential information (e.g. industrial secrets, patient records and user credentials) is one of the risks that have to be accounted for and mitigated by organizations dealing with confidential data. Unfortunately, assessing confidentiality risk is challenging, particularly in the

  11. Designing a Mobile Game to Teach Conceptual Knowledge of Avoiding 'Phishing Attacks'

    OpenAIRE

    Asanka, Nalin; Love, Steve; Scott, Michael

    2012-01-01

    Phishing is a form of online identity theft, which attempts to appropriate confidential and sensitive information such as usernames and passwords from its victims. To facilitate cyberspace as a secure environment, phishing education needs to be made accessible to home computer users and mobile games enable embedded learning in a natural environment. Previously, we have introduced a mobile game design that aimed to enhance avoidance motivation and behavior to protect against phishing threats. ...

  12. 29 CFR 4010.13 - Confidentiality of information submitted.

    Science.gov (United States)

    2010-07-01

    ... REPORTING AND DISCLOSURE REQUIREMENTS ANNUAL FINANCIAL AND ACTUARIAL INFORMATION REPORTING § 4010.13 Confidentiality of information submitted. In accordance with § 4901.21(a)(3) of this chapter and ERISA section... 29 Labor 9 2010-07-01 2010-07-01 false Confidentiality of information submitted. 4010.13 Section...

  13. 75 FR 75586 - Confidentiality of Suspicious Activity Reports

    Science.gov (United States)

    2010-12-03

    ...] RIN 1550-AC26 Confidentiality of Suspicious Activity Reports AGENCY: The Office of Thrift Supervision... implementing the Bank Secrecy Act (BSA) governing the confidentiality of a suspicious activity report (SAR) to... corporations regulated by the OTS, to keep certain records and make certain reports that have been determined...

  14. Protecting confidentiality rights: the need for an ethical practice model.

    Science.gov (United States)

    Fisher, Mary Alice

    2008-01-01

    All psychologists must uphold the same ethical standards about confidentiality even though each state imposes different legal limits on their ability to protect clients' confidences. The resulting ethical-legal confusion is exacerbated by legally based confidentiality training that treats legal exceptions as if they were the rule and fosters the impression that attorneys are now the only real experts about this aspect of practice. This article provides an ethics-based confidentiality practice model that clarifies the ethical rule and puts its legal exceptions into ethical perspective. Like the Confidentiality section of the American Psychological Association's (2002) Ethical Principles of Psychologists and Code of Conduct, this outline would apply to all psychologists regardless of state laws, but the details of its implementation would vary according to role and setting. It can be used as a universal training outline, a consultation and supervision tool, a guide to professional practice, and a basis for clearer ongoing conversation about the ethics of "conditional confidentiality." Psychologists can use this practice model to regain their status as experts about the confidentiality ethics of their own profession. PsycINFO Database Record (c) 2008 APA, all rights reserved.

  15. Genetic secrets: Protecting privacy and confidentiality in the genetic era

    Energy Technology Data Exchange (ETDEWEB)

    Rothstein, M.A. [ed.

    1998-07-01

    Few developments are likely to affect human beings more profoundly in the long run than the discoveries resulting from advances in modern genetics. Although the developments in genetic technology promise to provide many additional benefits, their application to genetic screening poses ethical, social, and legal questions, many of which are rooted in issues of privacy and confidentiality. The ethical, practical, and legal ramifications of these and related questions are explored in depth. The broad range of topics includes: the privacy and confidentiality of genetic information; the challenges to privacy and confidentiality that may be projected to result from the emerging genetic technologies; the role of informed consent in protecting the confidentiality of genetic information in the clinical setting; the potential uses of genetic information by third parties; the implications of changes in the health care delivery system for privacy and confidentiality; relevant national and international developments in public policies, professional standards, and laws; recommendations; and the identification of research needs.

  16. 15 CFR 718.2 - Identification of confidential business information.

    Science.gov (United States)

    2010-01-01

    ... business information. 718.2 Section 718.2 Commerce and Foreign Trade Regulations Relating to Commerce and Foreign Trade (Continued) BUREAU OF INDUSTRY AND SECURITY, DEPARTMENT OF COMMERCE CHEMICAL WEAPONS CONVENTION REGULATIONS CONFIDENTIAL BUSINESS INFORMATION 718.2 Identification of confidential business...

  17. 7 CFR 1425.5 - Confidentiality.

    Science.gov (United States)

    2010-01-01

    ... AGRICULTURE LOANS, PURCHASES, AND OTHER OPERATIONS COOPERATIVE MARKETING ASSOCIATIONS § 1425.5 Confidentiality. Information submitted to CCC related to trade secrets, financial or commercial operations, or the financial...

  18. 50 CFR 600.130 - Protection of confidentiality of statistics.

    Science.gov (United States)

    2010-10-01

    ... statistics. 600.130 Section 600.130 Wildlife and Fisheries FISHERY CONSERVATION AND MANAGEMENT, NATIONAL... Fishery Management Councils § 600.130 Protection of confidentiality of statistics. Each Council must establish appropriate procedures for ensuring the confidentiality of the statistics that may be submitted to...

  19. 26 CFR 1.533-2 - Statement required.

    Science.gov (United States)

    2010-04-01

    ... Internal Revenue INTERNAL REVENUE SERVICE, DEPARTMENT OF THE TREASURY (CONTINUED) INCOME TAX (CONTINUED) INCOME TAXES (CONTINUED) Corporations Used to Avoid Income Tax on Shareholders § 1.533-2 Statement... shareholders, the amounts that would be payable to each of the shareholders if the income of the corporation...

  20. 7 CFR 1205.540 - Confidential books, records, and reports.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 10 2010-01-01 2010-01-01 false Confidential books, records, and reports. 1205.540 Section 1205.540 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL... Confidential books, records, and reports. All information obtained from the books, records, and reports of...

  1. Improving Individual Acceptance of Health Clouds through Confidentiality Assurance.

    Science.gov (United States)

    Ermakova, Tatiana; Fabian, Benjamin; Zarnekow, Rüdiger

    2016-10-26

    Cloud computing promises to essentially improve healthcare delivery performance. However, shifting sensitive medical records to third-party cloud providers could create an adoption hurdle because of security and privacy concerns. This study examines the effect of confidentiality assurance in a cloud-computing environment on individuals' willingness to accept the infrastructure for inter-organizational sharing of medical data. We empirically investigate our research question by a survey with over 260 full responses. For the setting with a high confidentiality assurance, we base on a recent multi-cloud architecture which provides very high confidentiality assurance through a secret-sharing mechanism: Health information is cryptographically encoded and distributed in a way that no single and no small group of cloud providers is able to decode it. Our results indicate the importance of confidentiality assurance in individuals' acceptance of health clouds for sensitive medical data. Specifically, this finding holds for a variety of practically relevant circumstances, i.e., in the absence and despite the presence of conventional offline alternatives and along with pseudonymization. On the other hand, we do not find support for the effect of confidentiality assurance in individuals' acceptance of health clouds for non-sensitive medical data. These results could support the process of privacy engineering for health-cloud solutions.

  2. 40 CFR 790.7 - Confidentiality.

    Science.gov (United States)

    2010-07-01

    ... words “confidential business information,” “trade secret,” or another appropriate phrase indicating its... competitor use such information? How substantial would the harmful effects be? What is the causal...

  3. [Statement of the board of directors of the German Sociological Society on the population census].

    Science.gov (United States)

    1983-10-01

    This statement concerning population censuses has been prepared at the request of the board of directors of the German Sociological Society in light of the controversy surrounding the 1983 census in the Federal Republic of Germany. It is suggested that sample surveys cannot replace a census, a census is indispensable as a data source for regional analyses and studies of small population groups, a census must be carried out in a way that preserves the confidentiality of data, and census data must be accessible to scientific research.

  4. 13 CFR 120.1060 - Confidentiality of Reports, Risk Ratings and related Confidential Information.

    Science.gov (United States)

    2010-01-01

    ... other than SBA's Lender oversight and SBA's portfolio management purposes. An SBA Lender, Intermediary... conjunction with SBA's Lender Oversight Program and SBA's portfolio management (for purposes of this... 13 Business Credit and Assistance 1 2010-01-01 2010-01-01 false Confidentiality of Reports, Risk...

  5. Computer Security: confidentiality is everybody’s business

    CERN Multimedia

    Stefan Lueders, Computer Security Team

    2015-01-01

    Recently, a zip file with confidential information was mistakenly made public on one of CERN’s websites. Although the file was only intended for members of an internal committee, when placing it onto the CERN website, someone made a mistake when setting the access permissions and, thus, made the file accessible to everyone visiting the site!   Unfortunately, this is but one example of such mistakes. We have seen other documents made accessible to a much wider audience than originally intended… CERN takes serious measures to ensure the confidentiality of data. Confidential or “sensitive” documents (following the nomenclature set out in the CERN Data Protection Policy) deserve professional handling and access protections given only to the people who really need to access them. As such, they must not be widely circulated as attachments in e-mails and, most definitely, must not be stored on random public websites for the sole purpose of shari...

  6. [Cologne Statement for Medical Care of Refugees].

    Science.gov (United States)

    Wiesmüller, G A; Dötsch, J; Weiß, M; Wiater, A; Fätkenheuer, G; Nitschke, H; Bunte, A

    2016-04-01

    The Cologne statement resulted from both regional and nationwide controversial discussions about meaning and purpose of an initial examination for infectious diseases of refugees with respect to limited time, personnel and financial resources. Refugees per se are no increased infection risk factors for the general population as well as aiders, when the aiders comply with general hygiene rules and are vaccinated according to the recommendations of the German Standing Committee on Vaccination (STIKO). This is supported by our own data. Based on individual medical history, refugees need medical care, which is offered purposeful, economic, humanitarian and ethical. In addition to medical confidentiality, the reporting obligation according § 34 Infection Protection Act (IPA) and the examination concerning infectious pulmonary tuberculosis according to § 36 (4) IPA must be considered. © Georg Thieme Verlag KG Stuttgart · New York.

  7. Systematization of falsification risk factors in financial statements: accounting aspect

    Directory of Open Access Journals (Sweden)

    N.О. Mizyakina

    2016-12-01

    Full Text Available The presence of false information in the financial statements significantly undermines the confidence of investors and creditors of a company. This necessitates finding and identifying risk factors for falsifying financial statements. Risk factors for financial statements falsification are various and there are different approaches to their classification. It is found out that there is the problem on the clear separation of the concept "creative accounting" (which allows to present a company in the best light for investors and creditors within the law and the concept "falsification of financial statements indicators", which undermines confidence and causes million expenditures of investors and creditors. The article determines the main reasons and factors that lead to the falsification of enterprise’s financial statements. The study suggests the approaches to the classification of risk factors for falsifying financial statements, including those, which have a direct or indirect impact on the reporting. The classification of risk factors for falsifying financial statements is necessary to systematize falsification risks of financial statements in order to minimize them and avoid them during the process of formation of financial reporting indicators.

  8. Independent consultants : fiduciary duties, trade secrets and confidential information

    International Nuclear Information System (INIS)

    Fraser, B.; Wilhelmson, M.

    1999-01-01

    Because of cutbacks and downsizing within the petroleum industry, it has become one of the largest users of contract personnel to provide services that were previously provided by senior levels of management. This paper explored the application of common law fiduciary duties and the duty of confidence to the independent workforce. It examined to what extent fiduciary duties apply to independent consultants and the best way for the employer to protect itself from the potential misuse of confidential information. Part 1 of the paper described fiduciary duties. A fiduciary relationship was described as one that possesses the following three characteristics: (1) the fiduciary has scope for the exercise of some discretion of power, (2) the fiduciary can unilaterally exercise that power to affect the beneficiary's practical interests, and (3) the beneficiary is peculiarly vulnerable to the fiduciary holding the discretion of power. Three examples of how the courts treated some arguments regarding fiduciaries were presented. Part 2 of this paper discussed how trade secrets and confidential information should be handled. It was explained, that regardless of fiduciary duties, the unauthorized use of confidential information by an independent contractor can give rise to liability and an award of damages by the courts. Some examples where the Supreme Court of Canada found breach of confidence by a party were presented. Information communicated from an employer to an employee can be divided into the following three categories: (1) publicly accessible and not confidential, (2) confidential and must be treated as such while an employee is employed, but if learned becomes part of the employees skill and knowledge, and (3) specific confidential trade secrets that cannot lawfully be used for anyone's benefit but the employer's. Issues regarding defining rights and obligations by contract were also discussed

  9. 5 CFR 2634.901 - Policies of confidential financial disclosure reporting.

    Science.gov (United States)

    2010-01-01

    .... (a) The confidential financial reporting system set forth in this subpart is designed to complement... Government duties involve the exercise of significant discretion in certain sensitive areas, report their... apparent conflicts of interest. The confidential financial disclosure system promotes that goal, with...

  10. Analysis of LYSA-calculus with explicit confidentiality annotations

    DEFF Research Database (Denmark)

    Gao, Han; Nielson, Hanne Riis

    2006-01-01

    Recently there has been an increased research interest in applying process calculi in the verification of cryptographic protocols due to their ability to formally model protocols. This work presents LYSA with explicit confidentiality annotations for indicating the expected behavior of target...... malicious activities performed by attackers as specified by the confidentiality annotations. The proposed analysis approach is fully automatic without the need of human intervention and has been applied successfully to a number of protocols....

  11. 5 CFR 1312.26 - Control of secret and confidential material.

    Science.gov (United States)

    2010-01-01

    ... 5 Administrative Personnel 3 2010-01-01 2010-01-01 false Control of secret and confidential... Accountability of Classified Information § 1312.26 Control of secret and confidential material. Classified... Document Control, will be used to establish accountability controls on all Secret material received or...

  12. 48 CFR 1552.235-80 - Access to confidential business information.

    Science.gov (United States)

    2010-10-01

    ... business information. 1552.235-80 Section 1552.235-80 Federal Acquisition Regulations System ENVIRONMENTAL... Clauses 1552.235-80 Access to confidential business information. As prescribed in 1535.007-70(g), insert the following clause. Access to Confidential Business Information (OCT 2000) It is not anticipated...

  13. Confidential Business Information under TSCA

    Science.gov (United States)

    This website informs businesses, policymakers, and the public about the confidential business information (CBI) provisions of § 14 of the Toxic Substances Control Act (TSCA), as amended by the Frank R. Lautenberg Chemical Safety for the 21st Century Act.

  14. 6 CFR 25.10 - Confidentiality and protection of Intellectual Property.

    Science.gov (United States)

    2010-01-01

    ... 6 Domestic Security 1 2010-01-01 2010-01-01 false Confidentiality and protection of Intellectual Property. 25.10 Section 25.10 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY REGULATIONS TO SUPPORT ANTI-TERRORISM BY FOSTERING EFFECTIVE TECHNOLOGIES § 25.10 Confidentiality and...

  15. 42 CFR 405.215 - Confidential commercial and trade secret information.

    Science.gov (United States)

    2010-10-01

    ... 42 Public Health 2 2010-10-01 2010-10-01 false Confidential commercial and trade secret information. 405.215 Section 405.215 Public Health CENTERS FOR MEDICARE & MEDICAID SERVICES, DEPARTMENT OF... trade secret information. To the extent that CMS relies on confidential commercial or trade secret...

  16. 40 CFR 260.2 - Availability of information; confidentiality of information.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 25 2010-07-01 2010-07-01 false Availability of information; confidentiality of information. 260.2 Section 260.2 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) SOLID WASTES (CONTINUED) HAZARDOUS WASTE MANAGEMENT SYSTEM: GENERAL General § 260.2 Availability of information; confidentiality of...

  17. 48 CFR 1552.235-71 - Treatment of confidential business information.

    Science.gov (United States)

    2010-10-01

    ... business information. 1552.235-71 Section 1552.235-71 Federal Acquisition Regulations System ENVIRONMENTAL... Clauses 1552.235-71 Treatment of confidential business information. As prescribed in 1535.007-70(b... determined that in the performance of a contract, EPA may furnish confidential business information to the...

  18. 22 CFR 1101.5 - Security, confidentiality and protection of records.

    Science.gov (United States)

    2010-04-01

    ... 22 Foreign Relations 2 2010-04-01 2010-04-01 true Security, confidentiality and protection of... Bureau of Standard's booklet “Computer Security Guidelines for Implementing the Privacy Act of 1974” (May... STATES AND MEXICO, UNITED STATES SECTION PRIVACY ACT OF 1974 § 1101.5 Security, confidentiality and...

  19. Genetic secrets: Protecting privacy and confidentiality in the genetic era. Final report

    Energy Technology Data Exchange (ETDEWEB)

    Rothstein, M.A. [ed.

    1998-09-01

    Few developments are likely to affect human beings more profoundly in the long run than the discoveries resulting from advances in modern genetics. Although the developments in genetic technology promise to provide many additional benefits, their application to genetic screening poses ethical, social, and legal questions, many of which are rooted in issues of privacy and confidentiality. The ethical, practical, and legal ramifications of these and related questions are explored in depth. The broad range of topics includes: the privacy and confidentiality of genetic information; the challenges to privacy and confidentiality that may be projected to result from the emerging genetic technologies; the role of informed consent in protecting the confidentiality of genetic information in the clinical setting; the potential uses of genetic information by third parties; the implications of changes in the health care delivery system for privacy and confidentiality; relevant national and international developments in public policies, professional standards, and laws; recommendations; and the identification of research needs.

  20. 12 CFR 563g.13 - Public disclosure and confidential treatment.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 5 2010-01-01 2010-01-01 false Public disclosure and confidential treatment. 563g.13 Section 563g.13 Banks and Banking OFFICE OF THRIFT SUPERVISION, DEPARTMENT OF THE TREASURY SECURITIES OFFERINGS § 563g.13 Public disclosure and confidential treatment. (a) Any offering circular...

  1. 21 CFR 821.55 - Confidentiality.

    Science.gov (United States)

    2010-04-01

    ... permission to release, the patient's name, address, telephone number, and social security number, or other... MEDICAL DEVICE TRACKING REQUIREMENTS Records and Inspections § 821.55 Confidentiality. (a) Any patient... identify patient or research subjects shall not be available for public disclosure except as provided in...

  2. Conflicting duties over confidentiality in Argentina and Peru.

    Science.gov (United States)

    Cavallo, Mercedes

    2011-02-01

    The medical duty of confidentiality represents a key element for the provision of reproductive and sexual health services. In some Latin American countries, such as Argentina and Peru, the legal systems impose—or are interpreted as imposing—on health professionals the duty of confidentiality, but also the duty to report the commission of a public order offense that they know about owing to the practicing of their profession. In these countries, the conflicting duties and the criminalization of abortion cause severe public health and human rights problems when health professionals assist their patients for post-abortion treatment. Typically, patients are deterred from seeking prompt medical care, and their privacy, autonomy, and dignity are violated. A 2010 ruling from the Supreme Court of Argentina and a 2004 ruling from the Inter-American Court of Human Rights emerge as important instruments that grant a more adequate protection of medical confidentiality. © 2010 International Federation of Gynecology and Obstetrics. Published by Elsevier Ireland Ltd. All rights reserved.

  3. Confidentiality with Minors: The Need for Policy To Promote and Protect.

    Science.gov (United States)

    Stone, Carolyn; Isaacs, Madelyn L.

    2003-01-01

    Investigated school counselors' attitudes toward breaching confidentiality before and after the 1999 Columbine High School shootings. Surveys of demographically similar counselors indicated that the Columbine shootings affected counselors' predictions about their attitudes and behavior regarding confidentiality. Counselors were more reluctant to…

  4. 42 CFR 93.108 - Confidentiality.

    Science.gov (United States)

    2010-10-01

    ... 42 Public Health 1 2010-10-01 2010-10-01 false Confidentiality. 93.108 Section 93.108 Public Health PUBLIC HEALTH SERVICE, DEPARTMENT OF HEALTH AND HUMAN SERVICES HEALTH ASSESSMENTS AND HEALTH EFFECTS STUDIES OF HAZARDOUS SUBSTANCES RELEASES AND FACILITIES PUBLIC HEALTH SERVICE POLICIES ON RESEARCH...

  5. 40 CFR 710.58 - Confidentiality.

    Science.gov (United States)

    2010-07-01

    ...) Any person submitting information under this subpart may assert a business confidentiality claim for... with reporting under this subpart? How could a competitor use such information? Would the effects of... that your competitors do not know it is being manufactured or imported for a commercial purpose by...

  6. Meaningful Use of a Confidential Adolescent Patient Portal.

    Science.gov (United States)

    Thompson, Lindsay A; Martinko, Thomas; Budd, Pamela; Mercado, Rebeccah; Schentrup, Anzeela M

    2016-02-01

    To design and evaluate the usage of an adolescent patient portal specifically adapted for adolescent health care needs that also satisfied institutional meaningful use guidelines regarding electronic health records. Key stakeholders at one academic health care center adopted an online portal and opted to designate a patient portal specifically for adolescents to maximize confidentiality in compliance with state privacy laws. This study analyzed aggregate electronic health record data of adolescents' (ages 12-17.9 years) uptake, usage, and functionality of this portal and compared it to parent portal usage for younger children (ages 0-11 years). Differences in means were calculated using paired t tests. The portal was used similarly between parents of young children and adolescents, with almost 1,000 enrollees in each group from September 1, 2012 to March 31, 2015. There were no gender differences in enrollment. Adolescents were less likely than parents of younger children to review appointments (73% vs. 85%), laboratory tests (67% vs. 79%), problem lists (40% vs. 78%), or allergies (45% vs. 77%, all p values adolescents sent 1,397 confidential messages. Institutional decisions for implementing meaningful use requirements can align with goals of adolescent health. Patient portals can enhance adolescent health care quality and adolescents readily use a confidential portal. Implementation of meaningful use requirements should be checked against adolescent health care needs to maximize confidentiality and promote health communication. Copyright © 2016 Society for Adolescent Health and Medicine. Published by Elsevier Inc. All rights reserved.

  7. Safeguarding Confidentiality in Electronic Health Records.

    Science.gov (United States)

    Shenoy, Akhil; Appel, Jacob M

    2017-04-01

    Electronic health records (EHRs) offer significant advantages over paper charts, such as ease of portability, facilitated communication, and a decreased risk of medical errors; however, important ethical concerns related to patient confidentiality remain. Although legal protections have been implemented, in practice, EHRs may be still prone to breaches that threaten patient privacy. Potential safeguards are essential, and have been implemented especially in sensitive areas such as mental illness, substance abuse, and sexual health. Features of one institutional model are described that may illustrate the efforts to both ensure adequate transparency and ensure patient confidentiality. Trust and the therapeutic alliance are critical to the provider-patient relationship and quality healthcare services. All of the benefits of an EHR are only possible if patients retain confidence in the security and accuracy of their medical records.

  8. 31 CFR 129.5 - Confidentiality.

    Science.gov (United States)

    2010-07-01

    ... 31 Money and Finance: Treasury 1 2010-07-01 2010-07-01 false Confidentiality. 129.5 Section 129.5 Money and Finance: Treasury Regulations Relating to Money and Finance PORTFOLIO INVESTMENT SURVEY... contain data aggregated in such a way that neither the person supplying the information nor the investor...

  9. 40 CFR 710.38 - Confidentiality.

    Science.gov (United States)

    2010-07-01

    ... submitting information under this part may assert a business confidentiality claim for the information. The... with reporting under this part? How could a competitor use such information? Would the effects of... that your competitors do not know it is being manufactured or imported for a commercial purpose by...

  10. Public expectations concerning confidentiality protection of adolescents' sexual and reproductive health care in Lithuania

    DEFF Research Database (Denmark)

    Jaruseviciene, Lina; Zaborskis, Apolinaras; Lazarus, Jeffrey Victor

    2014-01-01

    OBJECTIVE: An adolescent's right to confidential healthcare is protected by international law and professional consensus. However, parental and social support for confidential sexual and reproductive health (SRH) services, in particular, varies greatly. This study documents Lithuanian residents......' expectations with regard to confidentiality protection for adolescents in this domain, and explores the factors related to the diversity of these expectations. METHODS: Two national surveys of Lithuanian residents completed in 2005 and 2012 using anonymous questionnaires. Participants rated their expectations...... for confidentiality using a five-point Likert scale for eight types of SRH consultations. RESULTS: Public anticipation for confidentiality depended on whether issues related to sexual behaviour or to its consequences were addressed during adolescent consultation. Only younger respondents had higher expectations...

  11. THE PRINCIPLE OF CONFIDENTIALITY IN ARBITRATION. APPLICATION AND LIMITATIONS OF THE PRINCIPLE

    Directory of Open Access Journals (Sweden)

    Bazil Oglindă

    2015-11-01

    Full Text Available Over the years, arbitration has grown to be the preferred means of dispute resolution by commercial entities. One of the benefits that build the attraction for this system of dispute resolution was the principle of confidentiality. One issue that needs to be analyzed is about the reasons why confidentiality is so important in business. Confidentiality is a principle largely embraced in arbitration, but, as we will see, the principle is not an absolute one. There are a set of questions that needs to be answer to, like: Who is bound by the duty of confidentiality? Does this refer only to the parties or does it expands to other actors involved in the arbitral proceedings? What happens with the obligation of confidentiality when issues are brought before a court, taking in account the principle of open justice? We will see that in some countries are procedural laws allowing the courts to order an arbitration claim to be heard in public or in private. Another important aspect that has arisen in the last period is regarding the public policy and the protection of public interest as a limitation to confidentiality of arbitration. This is a sensitive matter especially when one of the parties is a state or a state entity. This study aims to explore the principle of confidentiality in arbitration by focusing on its domain and on its limits, both from the comparative approach and from the Romanian approach. Knowing all this aspects, we will realize the importance of having professional counseling when drafting an arbitration clause and how this can be the missing puzzle piece of your business.

  12. 41 CFR 105-60.405 - Processing requests for confidential commercial information.

    Science.gov (United States)

    2010-07-01

    ... MATERIALS 60.4-Described Records § 105-60.405 Processing requests for confidential commercial information... 41 Public Contracts and Property Management 3 2010-07-01 2010-07-01 false Processing requests for confidential commercial information. 105-60.405 Section 105-60.405 Public Contracts and Property Management...

  13. Privacy and confidentiality: perspectives of mental health consumers and carers in pharmacy settings.

    Science.gov (United States)

    Hattingh, Hendrika Laetitia; Knox, Kathy; Fejzic, Jasmina; McConnell, Denise; Fowler, Jane L; Mey, Amary; Kelly, Fiona; Wheeler, Amanda J

    2015-02-01

    The study aims to explore within the community pharmacy practice context the views of mental health stakeholders on: (1) current and past experiences of privacy, confidentiality and support; and (2) expectations and needs in relation to privacy and confidentiality. In-depth interviews and focus groups were conducted in three states in Australia, namely Queensland, the northern region of New South Wales and Western Australia, between December 2011 and March 2012. There were 98 participants consisting of consumers and carers (n = 74), health professionals (n = 13) and representatives from consumer organisations (n = 11). Participants highlighted a need for improved staff awareness. Consumers indicated a desire to receive information in a way that respects their privacy and confidentiality, in an appropriate space. Areas identified that require improved protection of privacy and confidentiality during pharmacy interactions were the number of staff having access to sensitive information, workflow models causing information exposure and pharmacies' layout not facilitating private discussions. Challenges experienced by carers created feelings of isolation which could impact on care. This study explored mental health stakeholders' experiences and expectations regarding privacy and confidentiality in the Australian community pharmacy context. A need for better pharmacy staff training about the importance of privacy and confidentiality and strategies to enhance compliance with national pharmacy practice requirements was identified. Findings provided insight into privacy and confidentiality needs and will assist in the development of pharmacy staff training material to better support consumers with sensitive conditions. © 2014 Royal Pharmaceutical Society.

  14. The erosion of psychiatrist-patient confidentiality by subpoenas.

    Science.gov (United States)

    Levy, John; Galambos, Gary; Skarbek, Yvonne

    2014-08-01

    We explore the reasons for the prolific use of subpoenas to gain access to psychiatric records in Australia. We examine the applicable legal principles and practices at the New South Wales (NSW) and Commonwealth levels, aiming to develop recommendations for Australian Governments to curb the inappropriate and harmful use of subpoenas. Unfettered legal access to psychiatric records is inconsistent with professional ethical guidelines and risks undermining the provision of quality psychiatric care to the community. The existing legal provisions are failing to protect psychiatrist-patient confidentiality. In NSW, the onus is placed on the psychiatrist and/or patient to make a complicated application to the court, to direct that a subpoena be set aside on the grounds of "Professional Confidential Relationship Privilege." An absence of Commonwealth legislation to protect psychiatrist-patient confidentiality is used by some litigants in family law proceedings to disadvantage patients by stigmatising them, because they have consulted psychiatrists. We recommend that uniform legislation be implemented, giving effect to a primary rule of privilege with exceptions. © The Royal Australian and New Zealand College of Psychiatrists 2014.

  15. Improved Message Authentication and Confidentiality Checking

    International Nuclear Information System (INIS)

    Ismail Jabiullah, M.; Abdullah Al-Shamim, M.; Lutfar Rahman, M.

    2005-01-01

    The most confusing areas of the secured network communications are the message authentication and confidentiality checking. The attacks and the counter measures have become so convoluted that the users in this area begin to account for all contingencies. Two session-key generation techniques are used here to generate two separate session keys K 1 and K 2 ; and both the sender and the reveiver share these keys for higher degree of authentication and confidentiality. For this, the message is first encrypted by the key K 1 , and then the intermediary message authenticatin code (MAC) is generated by encrypting the encrypted message using the key K 2 . Then, the encrypted message and the intermediary MAC is again encrypted by using the K 2 and concatenated with the encrypted message and sent to the destination. At the receiving end, first, the received ciphertext is encrypted by using key K 2 and compared to the received MAC. The received ciphertext again is decrypted by the key K 2 and compared with the first decrypted MAC twice by the key K 2 . The plaintext is obtained by decrypting the received ciphertext first by K 2 and then by K 1 , using the corresponding decryption techniques respectively. The encryption techniques with key K 2 provides the authentication and with key K 1 provides the confidentiality checking of the transmitted message. The developed technique can be applied to both academic and commercial applications in online or offline electronic transactions for security.(authors)

  16. Access control and confidentiality in radiology

    Science.gov (United States)

    Noumeir, Rita; Chafik, Adil

    2005-04-01

    A medical record contains a large amount of data about the patient such as height, weight and blood pressure. It also contains sensitive information such as fertility, abortion, psychiatric data, sexually transmitted diseases and diagnostic results. Access to this information must be carefully controlled. Information technology has greatly improved patient care. The recent extensive deployment of digital medical images made diagnostic images promptly available to healthcare decision makers, regardless of their geographic location. Medical images are digitally archived, transferred on telecommunication networks, and visualized on computer screens. However, with the widespread use of computing and communication technologies in healthcare, the issue of data security has become increasingly important. Most of the work until now has focused on the security of data communication to ensure its integrity, authentication, confidentiality and user accountability. The mechanisms that have been proposed to achieve the security of data communication are not specific to healthcare. Data integrity can be achieved with data signature. Data authentication can be achieved with certificate exchange. Data confidentiality can be achieved with encryption. User accountability can be achieved with audits. Although these mechanisms are essential to ensure data security during its transfer on the network, access control is needed in order to ensure data confidentiality and privacy within the information system application. In this paper, we present and discuss an access control mechanism that takes into account the notion of a care process. Radiology information is categorized and a model to enforce data privacy is proposed.

  17. University Student Expectations of Confidentiality When Disclosing Information to Their Professors

    Science.gov (United States)

    Harris, Gregory E.; Dalton, Stephanie

    2014-01-01

    The purpose of this study was to explore university students' expectations of confidentiality when they make disclosures to their university professors. A secondary purpose was to consider if students have a higher expectation of confidentiality when talking with Psychology professors versus professors in other disciplines. Students were asked to…

  18. 18 CFR 270.506 - Confidentiality.

    Science.gov (United States)

    2010-04-01

    ... 18 Conservation of Power and Water Resources 1 2010-04-01 2010-04-01 false Confidentiality. 270.506 Section 270.506 Conservation of Power and Water Resources FEDERAL ENERGY REGULATORY COMMISSION...) through (9) of 5 U.S.C. 552(b). (b) Upon receipt of a request for disclosure of information treated as...

  19. Privacy and Confidentiality Practices In Adolescent Family Planning Care At Federally Qualified Health Centers.

    Science.gov (United States)

    Beeson, Tishra; Mead, Katherine H; Wood, Susan; Goldberg, Debora Goetz; Shin, Peter; Rosenbaum, Sara

    2016-03-01

    The confidentiality of family planning services remains a high priority to adolescents, but barriers to implementing confidentiality and privacy practices exist in settings designed for teenagers who are medically underserved, including federally qualified health centers (FQHCs). A sample of 423 FQHCs surveyed in 2011 provided information on their use of five selected privacy and confidentiality practices, which were examined separately and combined into an index. Regression modeling was used to assess whether various state policies and organizational characteristics were associated with FQHCs' scores on the index. In-depth case studies of six FQHCs were conducted to provide additional contextual information. Among FQHCs reporting on confidentiality, most reported providing written or verbal information regarding adolescents' rights to confidential care (81%) and limiting access to family planning and medical records to protect adolescents' confidentiality (84%). Far fewer reported maintaining separate medical records for family planning (10%), using a security block on electronic medical records to prevent disclosures (43%) or using separate contact information for communications regarding family planning services (50%). Index scores were higher among FQHCs that received Title X funding than among those that did not (coefficient, 0.70) and among FQHCs with the largest patient volumes than among those with the smallest caseloads (0.43). Case studies highlighted how a lack of guidelines and providers' confusion over relevant laws present a challenge in offering confidential care to adolescents. The organizational practices used to ensure adolescent family planning confidentiality in FQHCs are varied across organizations. Copyright © 2016 by the Guttmacher Institute.

  20. 7 CFR 900.309 - Confidential information.

    Science.gov (United States)

    2010-01-01

    ... Conduct of Referenda To Determine Producer Approval of Milk Marketing Orders To Be Made Effective Pursuant to Agricultural Marketing Agreement Act of 1937, as Amended § 900.309 Confidential information. The... Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (Marketing...

  1. 7 CFR 929.65 - Confidential information.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 8 2010-01-01 2010-01-01 false Confidential information. 929.65 Section 929.65 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (Marketing... position, financial condition, or business operations of the particular handler from whom received, shall...

  2. 7 CFR 930.73 - Confidential information.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 8 2010-01-01 2010-01-01 false Confidential information. 930.73 Section 930.73 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (Marketing... a trade secret or disclosing trade position, financial condition, or business operations of the...

  3. Hinkley Point 'C': a summary of the Environmental Statement

    International Nuclear Information System (INIS)

    1987-08-01

    The Environmental Statement describes the potentially significant environmental effects of the proposed pressurized water reactor station at Hinkley Point in Somerset, and the ways in which the Central Electricity Generating Board (CEGB) intends to avoid, reduce or remedy these effects. It also explains the CEGB's reasons for proposing a PWR at Hinkley Point. The Environmental Statement has been produced to inform local authorities, the public and the Secretary of State for Energy about the CEGB's proposals. The Secretary of State has to decide whether or not consent for construction of Hinkley Point 'C' power station should be given, and in reaching that decision has to consider, amongst other matters, the environmental effects of the project. This summary and the Environmental Statement also describe the CEGB's plans for developing Hinkley Point 'C. Some details are yet to be finalised and may be subject to change, but this will not affect the overall validity of the environmental analysis given in these documents. Greater detail can be found in the full Environmental Statement. (author)

  4. 7 CFR 1150.173 - Confidential treatment.

    Science.gov (United States)

    2010-01-01

    ... reports of the number of persons subject to this subpart or statistical data collected therefrom, which... 7 Agriculture 9 2010-01-01 2009-01-01 true Confidential treatment. 1150.173 Section 1150.173 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (Marketing...

  5. 7 CFR 1218.62 - Confidential treatment.

    Science.gov (United States)

    2010-01-01

    ... of the number of persons subject to this subpart or statistical data collected therefrom, which... 7 Agriculture 10 2010-01-01 2010-01-01 false Confidential treatment. 1218.62 Section 1218.62 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (MARKETING...

  6. 7 CFR 1210.607 - Confidential information.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 10 2010-01-01 2010-01-01 false Confidential information. 1210.607 Section 1210.607 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (MARKETING... contents and all other information or reports furnished to, compiled by, or in possession of, the...

  7. 7 CFR 1210.352 - Confidential treatment.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 10 2010-01-01 2010-01-01 false Confidential treatment. 1210.352 Section 1210.352 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (MARKETING... treatment. (a) All information obtained from the books, records, or reports required to be maintained under...

  8. 7 CFR 984.79 - Confidential information.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 8 2010-01-01 2010-01-01 false Confidential information. 984.79 Section 984.79 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (Marketing... or disclosing the trade position, or financial condition or business operations of the handler shall...

  9. 7 CFR 993.71 - Confidential information.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 8 2010-01-01 2010-01-01 false Confidential information. 993.71 Section 993.71 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (Marketing... information constituting a trade secret or disclosing of the trade position, financial condition, or business...

  10. 7 CFR 932.63 - Confidential information.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 8 2010-01-01 2010-01-01 false Confidential information. 932.63 Section 932.63 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (Marketing... from such reports and records which might affect the trade position, financial condition, or business...

  11. 7 CFR 982.70 - Confidential information.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 8 2010-01-01 2010-01-01 false Confidential information. 982.70 Section 982.70 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (Marketing... trade secret or disclosing of the trade position, financial condition, or business operations of the...

  12. 48 CFR 1552.235-76 - Treatment of Confidential Business Information (APR 1996).

    Science.gov (United States)

    2010-10-01

    ... Business Information (APR 1996). 1552.235-76 Section 1552.235-76 Federal Acquisition Regulations System... Provisions and Clauses 1552.235-76 Treatment of Confidential Business Information (APR 1996). As prescribed in 1535.007-70(c), insert the following clause: Treatment of Confidential Business Information (TSCA...

  13. 48 CFR 1552.235-70 - Screening business information for claims of confidentiality.

    Science.gov (United States)

    2010-10-01

    ... 48 Federal Acquisition Regulations System 6 2010-10-01 2010-10-01 true Screening business... Texts of Provisions and Clauses 1552.235-70 Screening business information for claims of confidentiality... proprietary or confidential by the business that has the right to the information. The following clause...

  14. 7 CFR 1219.63 - Confidential treatment.

    Science.gov (United States)

    2010-01-01

    ... upon the reports of the number of persons subject to this subpart or statistical data collected from... 7 Agriculture 10 2010-01-01 2010-01-01 false Confidential treatment. 1219.63 Section 1219.63 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (MARKETING...

  15. 7 CFR 983.65 - Confidential information.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 8 2010-01-01 2010-01-01 false Confidential information. 983.65 Section 983.65 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (Marketing... the particular handler or their customers shall be received by, and at all times kept in the custody...

  16. 7 CFR 996.72 - Confidential information.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 8 2010-01-01 2010-01-01 false Confidential information. 996.72 Section 996.72 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (Marketing... condition, or business operations of the particular handlers or their customers shall be received by, and at...

  17. Doctor-patient confidentiality - right and duty of a doctor in law regulations

    Directory of Open Access Journals (Sweden)

    Janusz Jaroszyński

    2018-03-01

    Full Text Available Physician’s professional secrecy is one of the most important duties of a doctor and should be provided with confidentiality regarding his or her health. Generally speaking, there is no legal definition of "physician’s professional secrecy" in Poland, although this concept already appears in the oath of Hippocrates: ‘I will keep secret anything I see or hear professionally which ought not to be told’. The issue of medical confidentiality (physician’s professional secrecy has been regulated in several legal acts such as: The Patient Rights and Patients Ombudsman Act, The Constitution of the Republic of Poland, The Medical Profession Act, The Civil Code Act, The Criminal Code Act and Code of Medical Ethics which is not considered as a legal act. The patient has the right to require confidentiality of the information concerning him and the obligation to keep medical confidentiality will apply to every representative of the medical profession, who obtained certain information by various professional activities.

  18. Confidential Declaration of Family Situation (CDFS)

    CERN Document Server

    Human Resources Department

    2005-01-01

    The Confidential Declaration of Family Situation (CDFS) becomes a new computerized EDH form from October 2005 In accordance with Article R IV 1.17 of the Staff Regulations, Staff Members and Fellows, married or separated, must notify any changes in their spouse's income or health insurance cover in writing to CERN, within 30 calendar days of the change. This is necessary for the Organization to determine if a supplementary contribution is payable to the CERN Health Insurance Scheme (CHIS) for the spouse's coverage and, if so, the amount. Until now a paper form called « Confidential Declaration of Family Situation » (CDFS) was used for that purpose.  From early October 2005 the CDFS will be computerized for the whole Organization. Henceforth, any changes in a spouse's income or health insurance cover must be notified using EDH (Electronic Document Handling). Additionally, annual updates of the declaration will be required and will be requested by automatic e-mail. Early October an email will be sent to...

  19. 48 CFR 1552.235-73 - Access to Federal Insecticide, Fungicide, and Rodenticide Act Confidential Business Information...

    Science.gov (United States)

    2010-10-01

    ... Insecticide, Fungicide, and Rodenticide Act Confidential Business Information (APR 1996). 1552.235-73 Section... Insecticide, Fungicide, and Rodenticide Act Confidential Business Information (APR 1996). As prescribed in... Act Confidential Business Information (APR 1996) In order to perform duties under the contract, the...

  20. Audit, Accountability and Confidential Enquiries into Maternal ...

    African Journals Online (AJOL)

    HP

    Time for Action: Audit, Accountability and Confidential Enquiries ... provision of quality maternity services. Having such a ... services are more likely to be sustained if women can find ..... Donabedian A. An introduction to quality assurance in.

  1. 77 FR 63537 - Greenhouse Gas Reporting Program: Proposed Amendments and Confidentiality Determinations for...

    Science.gov (United States)

    2012-10-16

    ... Greenhouse Gas Reporting Program: Proposed Amendments and Confidentiality Determinations for Subpart I...-AR61 Greenhouse Gas Reporting Program: Proposed Amendments and Confidentiality Determinations for... Manufacturing, of the Greenhouse Gas Reporting Rule. Proposed changes include revising certain calculation...

  2. Paternalistic breaches of confidentiality in prison: mental health professionals' attitudes and justifications.

    Science.gov (United States)

    Elger, Bernice Simone; Handtke, Violet; Wangmo, Tenzin

    2015-06-01

    This manuscript presents mental health practitioners' (MHPs) practice, attitudes and justifications for breaching confidentiality when imprisoned patients disclose suicidal thoughts or abuse by others. 24 MHPs working in Swiss prisons shared their experiences regarding confidentiality practices. The data were analysed qualitatively and MHPs' attitudes and course of action were identified. Analysis revealed paternalistic breaches of confidentiality. When patients reported suicidal thoughts and abuse, MHPs believed that forgoing confidentiality is necessary to protect patients, providing several justifications for it. Patients were informed that such information will be transmitted without their consent to medical and non-medical prison personnel. With reference to suicidal attempts, MHPs resorted to methods that may reduce suicidal attempts such as transfer to hospital or internal changes in living arrangements, which would require provision of certain information to prison guards. In cases of abuse, some MHPs convinced patients to accept intervention or sometimes overrode competent patients' refusals to report. Also in the case of abuse, provision of limited information to other prison personnel was seen as an acceptable method to protect patients from further harm. Breaches of confidentiality, whether limited or full, remain unethical, when used for competent patients based solely on paternalistic justifications. Institutionalising ethical and legal procedures to address suicidal and abuse situations would be helpful. Education and training to help both medical and prison personnel to respond to such situations in an appropriate manner that ensures confidentiality and protects patients from suicide and abuse are necessary. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://group.bmj.com/group/rights-licensing/permissions.

  3. 48 CFR 1552.235-75 - Access to Toxic Substances Control Act Confidential Business Information (APR 1996).

    Science.gov (United States)

    2010-10-01

    ... Control Act Confidential Business Information (APR 1996). 1552.235-75 Section 1552.235-75 Federal... Confidential Business Information (APR 1996). As prescribed in 1535.007(b), insert the following provision: Access to Toxic Substances Control Act Confidential Business Information (APR 1996) In order to perform...

  4. 30 CFR 210.40 - Will MMS keep the information I provide confidential?

    Science.gov (United States)

    2010-07-01

    ... 30 Mineral Resources 2 2010-07-01 2010-07-01 false Will MMS keep the information I provide... MINERALS REVENUE MANAGEMENT FORMS AND REPORTS General Provisions § 210.40 Will MMS keep the information I provide confidential? The MMS will treat information obtained under this part as confidential to the...

  5. Security without obscurity a guide to confidentiality, authentication, and integrity

    CERN Document Server

    Stapleton, JJ

    2014-01-01

    The traditional view of information security includes the three cornerstones: confidentiality, integrity, and availability; however the author asserts authentication is the third keystone. As the field continues to grow in complexity, novices and professionals need a reliable reference that clearly outlines the essentials. Security without Obscurity: A Guide to Confidentiality, Authentication, and Integrity fills this need. Rather than focusing on compliance or policies and procedures, this book takes a top-down approach. It shares the author's knowledge, insights, and observations about infor

  6. Attitude of Lithuanian residents to confidentiality of adolescent sexual and reproductive health care

    DEFF Research Database (Denmark)

    Jaruseviciene, Lina; Lazarus, Jeff; Zaborskis, Apolinaras

    2011-01-01

    To assess the attitudes of Lithuanian residents towards the protection of confidentiality in the sexual and reproductive health care of adolescents.......To assess the attitudes of Lithuanian residents towards the protection of confidentiality in the sexual and reproductive health care of adolescents....

  7. 17 CFR 200.83 - Confidential treatment procedures under the Freedom of Information Act.

    Science.gov (United States)

    2010-04-01

    ... SECURITIES AND EXCHANGE COMMISSION ORGANIZATION; CONDUCT AND ETHICS; AND INFORMATION AND REQUESTS Information... first received by the Commission (i) it is supplied segregated from information for which confidential..., 100 F Street, NE., Washington, DC 20549. The person requesting confidential treatment may supply...

  8. Confidentiality, anonymity and amnesty for midwives in distress seeking online support - Ethical?

    Science.gov (United States)

    Pezaro, Sally; Clyne, Wendy; Gerada, Clare

    2018-06-01

    Midwife health is intrinsically linked to the quality of safe patient care. To ensure safe patient care, there is a need to deliver emotional support to midwives. One option that midwives may turn to may be a confidential online intervention, instead of localised, face-to-face support. Following the Realist And MEta-narrative Evidence Syntheses: Evolving Standards publication standards, this realist synthesis approach explores the ethical considerations in permitting confidentiality, anonymity and amnesty in online interventions to support midwives in work-related psychological distress. An iterative search methodology was used to select nine papers for review. To assimilate information, papers were examined for ideas relating to ethical dimensions of online interventions to support midwives in work-related psychological distress. This review takes a narrative approach. Online interventions can support the development of insight, help seeking and open discussion. Additionally, Internet support groups can become morally persuasive in nature. Anonymity and confidentiality are both effective and therapeutic features of online interventions when used in collaboration with effective online moderation. Yet, ethical dilemmas remain where users cannot be identified. Confidentiality and anonymity remain key components of successful online interventions. However, sanctioning the corollary component of amnesty may provoke moral discomfort for those seeking immediate accountability. For others, amnesty is seen as essential for open disclosure and help seeking. Ultimately, the needs of midwives must be balanced with the requirement to protect the public and the professional reputation of midwifery. In supporting midwives online, the principles of anonymity, confidentiality and amnesty may evoke some resistance on ethical grounds. However, without offering identity protection, it may not be possible to create effective online support services for midwives. The authors of this

  9. Attitudes toward medical and genetic confidentiality in the Saudi research biobank: An exploratory survey.

    Science.gov (United States)

    Alahmad, Ghiath; Hifnawy, Tamer; Abbasi, Badaruddin; Dierickx, Kris

    2016-03-01

    Achieving a balance between giving access to information and respecting donors' confidentiality is a crucial issue for any biobank, with its large number of samples and associated information. Despite the existence of much empirical literature on confidentiality, there are too few surveys in the Middle East about the topic, particularly in the Saudi context. A survey was conducted of 200 respondents at King Abdulaziz Medical City in Riyadh, Saudi Arabia, among 5 groups of equal size, comprised of researchers, physicians, medical students, donors and laypersons, respectively. The majority of participants agreed that confidentiality is an important issue and that it is well protected in the Saudi biobank. All 5 groups showed different attitudes toward disclosing information to various third parties. They were in favor of allowing treating physicians, and to a certain extent family members, to have access to medical and genetic results from research. No significant differences were found between views on medical and genetic confidentiality. The majority of respondents agreed that confidentiality might be breached in cases with specific justified reasons. Even considering differences in religion, culture and other factors, the results of the study were consistent with those reported in the literature and research conducted in other countries. We therefore place emphasis on the importance of protecting and promoting patient/donor confidentiality and privacy. Copyright © 2016. Published by Elsevier Ireland Ltd.

  10. WTO confidential: the case of asbestos. World Trade Organization.

    Science.gov (United States)

    Castleman, Barry

    2002-01-01

    The World Trade Organization (WTO), created in 1995, adjudicates "trade disputes" between member nations in cases with great human rights, cultural, environmental, and public health significance. Throughout the process of dispute resolution and even after a case is concluded, very little of what happens is made accessible to the public. However, it is one thing to criticize the WTO for its lack of transparency from outside the process, and another to critically examine what was withheld from disclosure and what dangers that presents. This is the inside story from a scientific adviser to one of the parties in a WTO case, analyzing what happened from a public health point of view. This analysis concludes that the public health justification of banning asbestos was accepted in the end by the economists at the WTO, despite the WTO's bias in favoring the party (Canada) making the free trade challenge (to public health legislation, in this case) in numerous stages of the process, despite the WTO's utter lack of expertise in science, medicine, engineering, and public health, and despite important erroneous statements made to the WTO under the cover of confidentiality. Despite its result, this case illustrates that the WTO's threat to national sovereignty could never withstand the light of day, that the people of the world would reject this dangerous free trade fundamentalism if the limitations and dangers of the process were open for all to see.

  11. METHODS FOR ASSESSING SECURITY THREATS CONFIDENTIAL INFORMATION FOR THE INFORMATION AND TELECOMMUNICATIONS SYSTEMS

    Directory of Open Access Journals (Sweden)

    E. V. Belokurova

    2015-01-01

    Full Text Available The article discusses the different approaches to assessing the safety of confidential information-term for information and telecommunication systems of various pre-appreciable destination in the presence of internal and external threats to its integrity and availability. The difficulty of ensuring the security of confidential information from exposure to information and telecommunication systems of external and internal threats at the present time, is of particular relevance. This problem is confirmed by the analysis of available statistical information on the impact of threats on the security circulating in the information and telecommunications system. Leak confidential information, intellectual property, information, know-how is the result of significant material and moral damage caused to the owner of the restricted information. The paper presents the structure of the indicators and criteria shows that the most promising are analytical criteria. However, their use to assess the level of security of confidential information is difficult due to the lack of appropriate mathematical models. The complexity of the problem is that existing traditional mathematical models are not always appropriate for the stated objectives. Therefore, it is necessary to develop mathematical models designed to assess the security of confidential information and its impact on information and telecommunication system threats.

  12. Novel approach to information security management of confidential ...

    African Journals Online (AJOL)

    Novel approach to information security management of confidential and propriety information ... Journal of Fundamental and Applied Sciences ... valuable information by using steganography it can have a major impact security management.

  13. Analysis of the ethical aspects of professional confidentiality in dental practice

    Directory of Open Access Journals (Sweden)

    Cléa Adas Saliba Garbin

    2008-02-01

    Full Text Available From the point of view of deontological ethics, privacy is a moral right that patients are entitled to and it is bound to professional confidentiality. Otherwise, the information given by patients to health professionals would not be reliable and a trustable relationship could not be established. The aim of the present study was to assess, by means of questionnaires with open and closed questions, the awareness and attitudes of 100 dentists working in the city of Andradina, São Paulo State, Brazil, with respect to professional confidentiality in dental practice. Most dentists (91.43% reported to have instructed their assistants on professional confidentiality. However, 44.29% of the interviewees showed to act contradictorily as reported talking about the clinical cases of their patients to their friends or spouses. The great majority of professionals (98.57% believed that it is important to have classes on Ethics and Bioethics during graduation and, when asked about their knowledge of the penalties imposed for breach of professional confidentiality, only 48.57% of them declared to be aware of it. Only 28.57% of the interviewees affirmed to have exclusive access to the files; 67.14% reported that that files were also accessed by their secretary; 1.43% answered that their spouses also had access, and 2.86% did not answer. From the results of the present survey, it could be observed that, although dentists affirmed to be aware of professional confidentiality, their attitudes did not adhere to ethical and legal requirements. This stand of health professionals has contributed to violate professional ethics and the law itself, bringing problems both to the professional and to the patient.

  14. Analysis of the ethical aspects of professional confidentiality in dental practice.

    Science.gov (United States)

    Garbin, Cléa Adas Saliba; Garbin, Artênio José Isper; Saliba, Nemre Adas; de Lima, Daniela Coelho; de Macedo, Ana Paula Ayala

    2008-01-01

    From the point of view of deontological ethics, privacy is a moral right that patients are entitled to and it is bound to professional confidentiality. Otherwise, the information given by patients to health professionals would not be reliable and a trustable relationship could not be established. The aim of the present study was to assess, by means of questionnaires with open and closed questions, the awareness and attitudes of 100 dentists working in the city of Andradina, São Paulo State, Brazil, with respect to professional confidentiality in dental practice. Most dentists (91.43%) reported to have instructed their assistants on professional confidentiality. However, 44.29% of the interviewees showed to act contradictorily as reported talking about the clinical cases of their patients to their friends or spouses. The great majority of professionals (98.57%) believed that it is important to have classes on Ethics and Bioethics during graduation and, when asked about their knowledge of the penalties imposed for breach of professional confidentiality, only 48.57% of them declared to be aware of it. Only 28.57% of the interviewees affirmed to have exclusive access to the files; 67.14% reported that that files were also accessed by their secretary; 1.43% answered that their spouses also had access, and 2.86% did not answer. From the results of the present survey, it could be observed that, although dentists affirmed to be aware of professional confidentiality, their attitudes did not adhere to ethical and legal requirements. This stand of health professionals has contributed to violate professional ethics and the law itself, bringing problems both to the professional and to the patient.

  15. 38 CFR 1.462 - Confidentiality restrictions.

    Science.gov (United States)

    2010-07-01

    ... Sickle Cell Anemia § 1.462 Confidentiality restrictions. (a) General. The patient records to which §§ 1..., infection with the HIV, or sickle cell anemia may be acknowledged only if the patient's written consent is... with the HIV, or sickle cell anemia. (2) Any answer to a request for a disclosure of patient records...

  16. 42 CFR 2.1 - Statutory authority for confidentiality of drug abuse patient records.

    Science.gov (United States)

    2010-10-01

    ... HUMAN SERVICES GENERAL PROVISIONS CONFIDENTIALITY OF ALCOHOL AND DRUG ABUSE PATIENT RECORDS Introduction § 2.1 Statutory authority for confidentiality of drug abuse patient records. The restrictions of these regulations upon the disclosure and use of drug abuse patient records were initially authorized by section 408...

  17. Having Confidence in Therapeutic Work with Young People: Constraints and Challenges to Confidentiality

    Science.gov (United States)

    Jenkins, Peter

    2010-01-01

    Confidentiality presents particular challenges to practitioners working with young people, on account of the latter's vulnerability and emotional immaturity. Ethical codes place a key importance on confidentiality, from deontological and teleological perspectives. However, young clients may rely on a more pragmatic approach in deciding whether to…

  18. Ombuds’ corner: Open door and confidentiality

    CERN Multimedia

    Vincent Vuillemin

    2013-01-01

    For the Open Days, CERN will be transparent for all visitors. It's also the occasion to remember that the Ombuds' door is fully open every day of the year for all persons working for or on behalf of CERN.   The door is open, but as soon as it's closed for a discussion, the office becomes a place where total confidentiality is preserved. This may appear as a contradiction, no? The Ombuds is available to help everyone in all circumstances, but his clause of confidentiality prevents him from acting without the consent of his “visitors”. How can he possibly resolve the in-house conflicts in groups, or units, if all the parties do not voluntarily participate in its resolution? The answer is clear: the job of the Ombuds is to help the parties resolve their conflict by themselves. He will provide a few rules of communication, a process of mutual respect, suggest some possibilities that the parties may want to follow, and mediate the dispute so that people...

  19. Confidential Declaration of Family Situation (CDFS)

    CERN Multimedia

    Human Resources Department

    2005-01-01

    The Confidential Declaration of Family Situation (CDFS) becomes a new computerized EDH form from October 2005 In accordance with Article R IV 1.17 of the Staff Regulations, Staff Members and Fellows, married or separated, must notify any changes in their spouse's income or health insurance cover in writing to CERN, within 30 calendar days of the change. This is necessary for the Organization to determine if a supplementary contribution is payable to the CERN Health Insurance Scheme (CHIS) for the spouse's coverage and, if so, the amount. Until now a paper form called « Confidential Declaration of Family Situation » (CDFS) was used for that purpose.  From early October 2005 the CDFS will be computerized for the whole Organization. Henceforth, any changes in a spouse's income or health insurance cover must be notified using EDH (Electronic Document Handling). Additionally, annual updates of the declaration will be required and will be requested by automatic e-mail. Early October an email will be...

  20. Confidentiality, 'no blame culture' and whistleblowing, non-physician practice and accountability.

    Science.gov (United States)

    White, Stuart M

    2006-12-01

    Confidentiality is a core tenet of medical professionalism, which enables the maintenance of trust in a doctor-patient relationship. However, both the amount of personal data stored and the number of third parties who might access this data have increased dramatically in the digital age, necessitating the introduction of various national data protection acts. Paradoxically, the Freedom of Information Act 2000 allows United Kingdom citizens to access information held by public bodies, including hospitals. Furthermore, the Public Interest Disclosure Act 1998 actively protects physicians who breach their duty of confidentiality in the name of public interest ('whistleblowing'). This article explores the evolution of the law and ethics in this area, and draws attention to the difficulties in balancing confidentiality against freedom of information. In addition, the role and responsibilities of the non-physician anaesthetist are examined.

  1. Confidentiality and parental involvement in adolescent sexual and reproductive health care

    DEFF Research Database (Denmark)

    Jaruseviciene, Lina; Lazarus, Jeff; Zaborskis, Apolinaras

    2011-01-01

    AIM: We surveyed Lithuanian general practitioners' (GPs) views on the importance of confidentiality for adolescents and on their practices in informing parents about sexual and reproductive health consultations with this age group. METHODS: In this cross-sectional study, a 41-item questionnaire...... was sent to a random sample of 607 Lithuanian GPs. The purpose of this questionnaire was to gain knowledge about current practices of GPs in informing parents on the importance of confidentiality as well as in protecting the privacy of minors. GPs' knowledge of the current legal age limit...... consulting on general sexual issues, more than 70% stated that they would guarantee their minor patients confidentiality. However, when cases involved sexually transmitted infections or pregnancy, nearly the same percentage said they would inform the parents. 62.3% of GPs incorrectly believed that the law...

  2. [Confidentiality in medical oaths: (When the white crow becomes gray...)].

    Science.gov (United States)

    Gelpi, R J; Pérez, M L; Rancich, A M; Mainetti, J A

    2000-01-01

    Confidentiality, together with the ethical principles of beneficence and non-maleficence, is the most important rule in Medical Oaths at the present time. However, the scientific-technical advances in medicine have made this rule one of the most controversial ones because of its exceptions. In consequence, the aim of the present paper is to comparatively analyze the rule of confidentiality in Medical Oaths of different places, times, origins and in different versions of the Hippocratic Oath in order to determine what should be kept a secret and with what degree of commitment (absolute or "prima facie"). Of the thirty six analyzed Oaths, twenty-seven manifest this rule and nine do not. No relation was found between the manifestation of this rule and the place, time, origin and different versions of the Hippocratic Oath. Most pledges suggest not to reveal what has been seen or heard during the medical act, the same as in the Hippocratic Oath. Seven texts point out that confidentiality should be absolute and four give exceptions in connection with beneficence and justice principles and the moral duty of causing no damage to third parties. Two pledges specify protection of privacy. In conclusion, today confidentiality is considered to be a moral duty for the benefit of the patient and out of consideration for his autonomy; however, at the present time in medicine the duty of keeping absolute secrecy is being reconsidered.

  3. 77 FR 1434 - Proposed Confidentiality Determinations for Data Elements Under the Mandatory Reporting of...

    Science.gov (United States)

    2012-01-10

    ... Fluorinated Gas Production....... 325120 Industrial gases manufacturing facilities. Electrical Equipment Use... Proposed Confidentiality Determinations for Data Elements Under the Mandatory Reporting of Greenhouse Gases...-proposes confidentiality determinations for the data elements under the Mandatory Greenhouse Gas Reporting...

  4. 7 CFR 983.9 - Confidential data or information.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 8 2010-01-01 2010-01-01 false Confidential data or information. 983.9 Section 983.9 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (Marketing... customers. ...

  5. Zerber: r-Confidential Indexing for Distributed Documents

    NARCIS (Netherlands)

    Zerr, Sergej; Demidova, Elena; Olmedilla, Daniel; Nejdl, Wolfgang; Winslett, Marianne; Mitra, Soumyadeb

    2008-01-01

    Zerr, S., Demidova, E., Olmedilla, D., Nejdl, W., Winslett, M., & Mitra, S. (2008). Zerber: r-Confidential Indexing for Distributed Documents. In J. Teubner (Eds.), Proceedings of the 11th International Conference on Extending Database Technology (pp. 287-298). March, 25-29, 2008, Nantes, France.

  6. 19 CFR 210.72 - Confidentiality of information.

    Science.gov (United States)

    2010-04-01

    ... 19 Customs Duties 3 2010-04-01 2010-04-01 false Confidentiality of information. 210.72 Section 210.72 Customs Duties UNITED STATES INTERNATIONAL TRADE COMMISSION INVESTIGATIONS OF UNFAIR PRACTICES IN IMPORT TRADE ADJUDICATION AND ENFORCEMENT Enforcement Procedures and Advisory Opinions § 210.72...

  7. ML Confidential : machine learning on encrypted data

    NARCIS (Netherlands)

    Graepel, T.; Lauter, K.; Naehrig, M.

    2012-01-01

    We demonstrate that by using a recently proposed somewhat homomorphic encryption (SHE) scheme it is possible to delegate the execution of a machine learning (ML) algorithm to a compute service while retaining confidentiality of the training and test data. Since the computational complexity of the

  8. Ethics in health care: confidentiality and information technologies

    African Journals Online (AJOL)

    information could result in confidential patient data falling ... Before the advent of the new communication and information technologies (NCITs), patient care was sometimes delayed .... computer system intended to be used and the security.

  9. 78 FR 16298 - Comment Request for Information Collection: Confidentiality and Disclosure of State Unemployment...

    Science.gov (United States)

    2013-03-14

    ... Collection: Confidentiality and Disclosure of State Unemployment Compensation Information Final Rule and... about the regulatory requirements of the Confidentiality and Disclosure of State Unemployment... Administration, Office of Unemployment Insurance, 200 Constitution Avenue NW., Room S4524, Washington, DC 20210...

  10. Ethics in practice: managed care and the changing health care environment: medicine as a profession managed care ethics working group statement.

    Science.gov (United States)

    Povar, Gail J; Blumen, Helen; Daniel, John; Daub, Suzanne; Evans, Lois; Holm, Richard P; Levkovich, Natalie; McCarter, Alice O; Sabin, James; Snyder, Lois; Sulmasy, Daniel; Vaughan, Peter; Wellikson, Laurence D; Campbell, Amy

    2004-07-20

    Cost pressures and changes in the health care environment pose ethical challenges and hard choices for patients, physicians, policymakers, and society. In 2000 and 2001, the American College of Physicians, with the Harvard Pilgrim Health Care Ethics Program, convened a working group of stakeholders--patients, physicians, and managed care representatives, along with medical ethicists--to develop a statement of ethics for managed care. The group explored the impact of a changing health care environment on patient-physician relationships and how to best apply the principles of professionalism in this environment. The statement that emerged offers guidance on preserving the patient-clinician relationship, patient rights and responsibilities, confidentiality and privacy, resource allocation and stewardship, the obligation of health plans to foster an ethical environment for the delivery of care, and the clinician's responsibility to individual patients, the community, and the public health, among other issues.

  11. 77 FR 48072 - Final Confidentiality Determinations for Regulations Under the Mandatory Reporting of Greenhouse...

    Science.gov (United States)

    2012-08-13

    ... Final Confidentiality Determinations for Regulations Under the Mandatory Reporting of Greenhouse Gases... confidentiality determinations for certain data elements in regulations under the Mandatory Greenhouse Gas... Greenhouse Gas Reporting Program Web site at http://www.epa.gov/climatechange/emissions/ghgrulemaking.html...

  12. Confidentiality of Accounting Academics: Consequences of Nonconformity

    Science.gov (United States)

    Amponsah, Emmanuel B.; Boateng, Peter Agyekum; Onuoha, Luke N.

    2016-01-01

    This paper examined ways by which nonconformity to confidentiality among accounting academics could lead to increased-recruitment-and-legal-costs to their employing universities in Ghana that offered accounting degree programmes. With a cross-sectional design, data collected from 1,225 accountants analysed via Cronbach's alpha,…

  13. 16 CFR 312.8 - Confidentiality, security, and integrity of personal information collected from children.

    Science.gov (United States)

    2010-01-01

    ... 16 Commercial Practices 1 2010-01-01 2010-01-01 false Confidentiality, security, and integrity of... COMMISSION REGULATIONS UNDER SPECIFIC ACTS OF CONGRESS CHILDREN'S ONLINE PRIVACY PROTECTION RULE § 312.8 Confidentiality, security, and integrity of personal information collected from children. The operator must...

  14. 15 CFR Supplement No. 1 to Part 718 - Confidential Business Information Declared or Reported *

    Science.gov (United States)

    2010-01-01

    ... 15 Commerce and Foreign Trade 2 2010-01-01 2010-01-01 false Confidential Business Information... Commerce and Foreign Trade (Continued) BUREAU OF INDUSTRY AND SECURITY, DEPARTMENT OF COMMERCE CHEMICAL WEAPONS CONVENTION REGULATIONS CONFIDENTIAL BUSINESS INFORMATION Pt. 718, Supp. 1 Supplement No. 1 to Part...

  15. Rekonstruksi Pengaturan Confidential Principle bagi Komunikasi pada Mediasi Sengketa Perdata di Indonesia: Studi Perbandingan dengan Praktik di Amerika Serikat

    Directory of Open Access Journals (Sweden)

    I Gusti Ngurah Parikesit

    2016-04-01

    Full Text Available Peran mediasi sebagai penyelesaian sengketa alternatif untuk sengketa perdata yang semakin populer digunakan pada praktiknya belum berjalan maksimal. Salah satu penyebabnya adalah kekaburan pengaturan prinsip kerahasiaan confidential principle bagi komunikasi yang terjadi pada proses mediasi. Aturan hukum di Indonesia hanya menjelaskan bahwa mediasi dilangsungkan berdasarkan pada asas tertutup dan mediator berkewajiban menjaga kerahasiaan, baik dalam bentuk perkataan maupun catatan, yang terungkap pada mediasi. Sebagai perbandingan, aturan hukum di Amerika Serikat sudah diatur bahwa segala bentuk komunikasi yang terjadi dan berhubungan dengan pelaksanaan mediasi tunduk pada confidential principle, sehingga proses komunikasi mendapatkan hak istimewa (privilege dengan tidak dapat dijadikan barang bukti dan seluruh pihak yang terlibat dalam mediasi tidak dapat dijadikan saksi pada persidangan berikutnya. Dengan demikian, dibutuhkan rekonstruksi pengaturan terkait ruang lingkup komunikasi pada proses mediasi yang terkualifikasi sebagai confidential principle pengaturan terkait pelepasan hak istimewa komunikasi dari confidential principle; dan pengaturan terkait pengecualian terhadap komunikasi yang terkualifikasi sebagai confidential principle Abstract Although being popular, the role of mediation in resolving civil disputes is yet to be maximalized. One of the reasons is the the vague regulation concerning the confidential principle for communication in mediation. The existing regulation in Indonesia only explains that mediation is undertaken based on closed principle and the mediator is obliged to maintain confidentiality the confidentiality of any communication, either in oral or written forms, revealed during mediation. Whereas in comparison, the regulation in the United States of America stipulates that all forms of communications occured during mediation or is made for purposes of conducting or participating in mediation are subjects to the

  16. 30 CFR 291.111 - How does MMS treat the confidential information I provide?

    Science.gov (United States)

    2010-07-01

    ... 30 Mineral Resources 2 2010-07-01 2010-07-01 false How does MMS treat the confidential information... SHELF LANDS ACT § 291.111 How does MMS treat the confidential information I provide? (a) Any person who provides documents under this part in response to a request by MMS to inform a decision on whether open...

  17. Detached Statements

    Directory of Open Access Journals (Sweden)

    Mark McBride

    2018-04-01

    Full Text Available Joseph Raz has introduced an interesting class of statements —detached statements— into the philosophical lexicon. In brief, such statements are (informa- tive normative statements, yet the speaker does not, in so uttering them, express or convey acceptance of the point of view of the hearer to whom they are addressed (as contrasted with committed statements, where the speaker does express or convey such acceptance. I propose to offer a novel analysis of such statements (and to clear away some confusions about them. In brief, such statements will be analysed as wide-scope normative conditionals.

  18. 40 CFR 370.64 - What information can I claim as trade secret or confidential?

    Science.gov (United States)

    2010-07-01

    ... secret or confidential? 370.64 Section 370.64 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY... secret or confidential? (a) Trade secrets. You may be able to withhold the name of a specific chemical... trade secret. The requirements for withholding trade secret information are set forth in EPCRA section...

  19. A Policy-Based Framework for Preserving Confidentiality in BYOD Environments: A Review of Information Security Perspectives

    Directory of Open Access Journals (Sweden)

    Chalee Vorakulpipat

    2017-01-01

    Full Text Available Today, many organizations allow their employees to bring their own smartphones or tablets to work and to access the corporate network, which is known as a bring your own device (BYOD. However, many such companies overlook potential security risks concerning privacy and confidentiality. This paper provides a review of existing literature concerning the preservation of privacy and confidentiality, with a focus on recent trends in the use of BYOD. This review spans a large spectrum of information security research, ranging from management (risk and policy to technical aspects of privacy and confidentiality in BYOD. Furthermore, this study proposes a policy-based framework for preserving data confidentiality in BYOD. This framework considers a number of aspects of information security and corresponding techniques, such as policy, location privacy, centralized control, cryptography, and operating system level security, which have been omitted in previous studies. The main contribution is to investigate recent trends concerning the preservation of confidentiality in BYOD from the perspective of information security and to analyze the critical and comprehensive factors needed to strengthen data privacy in BYOD. Finally, this paper provides a foundation for developing the concept of preserving confidentiality in BYOD and describes the key technical and organizational challenges faced by BYOD-friendly organizations.

  20. 31 CFR 31.217 - Confidentiality of information.

    Science.gov (United States)

    2010-07-01

    ... 31 Money and Finance: Treasury 1 2010-07-01 2010-07-01 false Confidentiality of information. 31.217 Section 31.217 Money and Finance: Treasury Office of the Secretary of the Treasury TROUBLED ASSET... from a source other than the retained entity. (b) Prohibitions. The retained entity shall not: (1...

  1. 12 CFR 404.7 - Confidential business information.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 4 2010-01-01 2010-01-01 false Confidential business information. 404.7 Section 404.7 Banks and Banking EXPORT-IMPORT BANK OF THE UNITED STATES INFORMATION DISCLOSURE Procedures... involved, a general description of the related U.S. exports, and the country to which such exports are...

  2. Would Tax Evasion and Tax Avoidance Undermine a National Retail Sales Tax?

    OpenAIRE

    Murray, Matthew N.

    1997-01-01

    Argues that shifting to an indirect tax system (a national sales tax) will not necessarily reduce tax avoidance and tax evasion behavior by businesses and individuals, particularly if the tax rate is set high to maintain revenue neutrality. Lack of experience in administering a high-rate, indirect tax system precludes definitive statements regarding the likely extent of tax base erosion under a national sales tax.

  3. Building Trust and Confidentiality in Cloud computing Distributed ...

    African Journals Online (AJOL)

    new technology, this new way of doing business brings with it new challenges, ... In this paper, we looked at data security, described the current state of data ... has the potential to solve many threats concerning confidentiality and adoption of

  4. Effective verification of confidentiality for multi-threaded programs

    NARCIS (Netherlands)

    Ngo, Minh Tri; Stoelinga, Mariëlle Ida Antoinette; Huisman, Marieke

    2014-01-01

    This paper studies how confidentiality properties of multi-threaded programs can be verified efficiently by a combination of newly developed and existing model checking algorithms. In particular, we study the verification of scheduler-specific observational determinism (SSOD), a property that

  5. Privacy Perspectives for Online Searchers: Confidentiality with Confidence?

    Science.gov (United States)

    Duberman, Josh; Beaudet, Michael

    2000-01-01

    Presents issues and questions involved in online privacy from the information professional's perspective. Topics include consumer concerns; query confidentiality; securing computers from intrusion; electronic mail; search engines; patents and intellectual property searches; government's role; Internet service providers; database mining; user…

  6. [Confidentiality in HIV-infection/AIDS--a comment on the Communicable Disease Control Act].

    Science.gov (United States)

    Frich, J C

    1995-05-10

    The new Communicable Diseases Control Act has come into force in Norway. It makes it compulsory for a physician to warn a third party if it is obvious that a HIV-positive patient, with a high degree of certainty, puts the third party at risk of being infected with HIV. Some philosophers characterize medical confidentiality as an intransigent and absolute obligation, others as a prima facie duty. This article supports the latter view, but the author still argues that strict conditions have to be fulfilled before a physician should consider breaking medical confidentiality: The doctor must try repeatedly to gain the consent or co-operation of the patient involved. Possible negative long-term consequences for the preventive HIV-work support strict medical confidentiality.

  7. 19 CFR 201.6 - Confidential business information.

    Science.gov (United States)

    2010-04-01

    ...) of a type for which there is a clear and compelling need to withhold from disclosure. Special rules... the right to appeal to the Commission. (e) Appeals from denial of confidential treatment. (1) For good cause shown, the Commission may grant an appeal from a denial by the Secretary of a request for...

  8. Enhanced Obfuscation Technique for Data Confidentiality in Public Cloud Storage

    Directory of Open Access Journals (Sweden)

    Oli S. Arul

    2016-01-01

    Full Text Available With an advent of cloud computing, data storage has become a boon in information technology. At the same time, data storage in remote places have become important issues. Lot of techniques are available to ensure protection of data confidentiality. These techniques do not completely serve the purpose in protecting data. The Obfuscation techniques come to rescue for protecting data from malicious attacks. This paper proposes an obfuscation technique to encrypt the desired data type on the cloud providing more protection from unknown hackers. The experimental results show that the time taken for obfuscation is low and the confidentiality percentage is high when compared with existing techniques.

  9. 15 CFR 325.16 - Protecting confidentiality of information.

    Science.gov (United States)

    2010-01-01

    ... 15 Commerce and Foreign Trade 2 2010-01-01 2010-01-01 false Protecting confidentiality of information. 325.16 Section 325.16 Commerce and Foreign Trade Regulations Relating to Commerce and Foreign Trade (Continued) INTERNATIONAL TRADE ADMINISTRATION, DEPARTMENT OF COMMERCE MISCELLANEOUS REGULATIONS...

  10. 19 CFR 210.20 - Declassification of confidential information.

    Science.gov (United States)

    2010-04-01

    ... 19 Customs Duties 3 2010-04-01 2010-04-01 false Declassification of confidential information. 210.20 Section 210.20 Customs Duties UNITED STATES INTERNATIONAL TRADE COMMISSION INVESTIGATIONS OF UNFAIR PRACTICES IN IMPORT TRADE ADJUDICATION AND ENFORCEMENT Motions § 210.20 Declassification of...

  11. Medical confidentiality versus disclosure: Ethical and legal dilemmas.

    LENUS (Irish Health Repository)

    Agyapong, V I O

    2009-02-01

    A case is described of a fifty year old single man who made disclosures about criminal sexual practices during a psychiatric assessment. In common practice with other professional men, a doctor is under a duty not to disclose, without the consent of his patient, information which he has gained in his professional capacity other than in exceptional circumstances. We discuss the ethical and legal considerations surrounding issues of medical confidentiality and the dilemma that sometimes face clinicians, when they feel obliged, in the public interest, to disclose information they have gained in confidence. Breach of confidences can have deleterious consequences; particularly for the doctor-patient relationship, but failure to disclose in some situations could have serious implications for the well-being of the wider society. Doctors should be aware of the basic principles of confidentiality and the ethical and legal framework around which they are built.

  12. Privacy, confidentiality and automated health information systems.

    Science.gov (United States)

    Vuori, H

    1977-12-01

    Professor Vuori's paper, first presented at the fourth Medico-legal Conference in Prague in the spring of this year, deals with the problem of the maintenance of confidentiality in computerized health records. Although more and more information is required, the hardware of the computer systems is so sophisticated that it would be very expensive indeed to 'break in' and steal from a modern data bank. Those concerned with programming computers are becoming more aware of their responsibilities concerning confidentiality and privacy, to the extent that a legal code of ethics for programmers is being formulated. They are also aware that the most sensitive of all relationships--the doctor-patient relationship--could be in danger if they failed to maintain high standards of integrity. An area of danger is where administrative boundaries between systems must be crossed--say between those of health and employment. Protection of privacy must be ensured by releasing full information about the type of data being stored, and by maintaining democratic control over the establishment of information systems.

  13. Confidentiality Enhancement of Highly Sensitive Nuclear Data Using Steganography with Chaotic Encryption over OFDM Channel

    International Nuclear Information System (INIS)

    Mahmoud, S.; Ayad, N.; Elsayed, F.; Elbendary, M.

    2016-01-01

    Full text: Due to the widespread usage of the internet and other wired and wireless communication methods, the security of the transmitted data has become a major requirement. Nuclear knowledge is mainly built upon the exchange of nuclear information which is considered highly sensitive information, so its security has to be enhanced by using high level security mechanisms. Data confidentiality is concerned with the achievement of higher protection for confidential information from unauthorized disclosure or access. Cryptography and steganography are famous and widely used techniques that process information in order to achieve its confidentiality, but sometimes, when used individually, they don’t satisfy a required level of security for highly sensitive data. In this paper, cryptography is accompanied with steganography for constituting a multilayer security techniques that can strengthen the level of security of highly confidential nuclear data that are archived or transmitted through different channel types and noise conditions. (author)

  14. The end of medical confidentiality? Patients, physicians and the state in history.

    Science.gov (United States)

    Rieder, Philip; Louis-Courvoisier, Micheline; Huber, Philippe

    2016-09-01

    Medical confidentiality has come under attack in the public sphere. In recent disasters both journalists and politicians have questioned medical confidentiality and claimed that in specific contexts physicians should be compelled to communicate data on their patients' health. The murders of innocent individuals by a suicidal pilot and a Swiss convicted criminal have generated polemical debates on the topic. In this article, historical data on medical confidentiality is used to show that medical practices of secrecy were regularly attacked in the past, and that the nature of medical confidentiality evolved through time depending on physicians' values and judgements. Our demonstration is based on three moments in history. First, at the end of the 16th century, lay authorities put pressure on physicians to disclose the names of patients suffering from syphilis. Second, in the 18th century, physicians faced constant demands for information about patients' health from relatives and friends. Third, employers and insurance companies in the 20th century requested medical data on sick employees. In these three different situations, history reveals that the concept of medical confidentiality was plastic, modelled in the first instance to defend well-to-do patients, in the second instance it was adapted to accommodate the physician's social role and, finally, to defend universal values and public health. Medical secrecy was, and is today, a medical and societal norm that is shaped collectively. Any change in its definition and enforcement was and should be the result of negotiations with all social actors concerned. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://www.bmj.com/company/products-services/rights-and-licensing/

  15. Disasters of endoscopic surgery and how to avoid them: error analysis.

    Science.gov (United States)

    Troidl, H

    1999-08-01

    For every innovation there are two sides to consider. For endoscopic surgery the positive side is more comfort for the patient, and the negative side is new complications, even disasters, such as injuries to organs (e.g., the bowel), vessels, and the common bile duct. These disasters are rare and seldom reported in the scientific world, as at conferences, at symposiums, and in publications. Today there are many methods for testing an innovation (controlled clinical trials, consensus conferences, audits, and confidential inquiries). Reporting "complications," however, does not help to avoid them. We need real methods for avoiding negative failures. The failure analysis is the method of choice in industry. If an airplane crashes, error analysis starts immediately. Humans make errors, and making errors means punishment. Failure analysis means rigorously and objectively investigating a clinical situation to find clinical relevant information for avoiding these negative events in the future. Error analysis has four important steps: (1) What was the clinical situation? (2) What has happened? (3) Most important: Why did it happen? (4) How do we avoid the negative event or disaster in the future. Error analysis has decisive advantages. It is easy to perform; it supplies clinically relevant information to help avoid it; and there is no need for money. It can be done everywhere; and the information is available in a short time. The other side of the coin is that error analysis is of course retrospective, it may not be objective, and most important it will probably have legal consequences. To be more effective in medicine and surgery we must handle our errors using a different approach. According to Sir Karl Popper: "The consituation is that we have to learn from our errors. To cover up failure is therefore the biggest intellectual sin.

  16. Boundaries of confidentiality in nursing care for mother and child in HIV programmes.

    Science.gov (United States)

    Våga, Bodil Bø; Moland, Karen Marie; Blystad, Astrid

    2016-08-01

    Confidentiality lies at the core of medical ethics and is the cornerstone for developing and keeping a trusting relationship between nurses and patients. In the wake of the HIV epidemic, there has been a heightened focus on confidentiality in healthcare contexts. Nurses' follow-up of HIV-positive women and their susceptible HIV-exposed children has proved to be challenging in this regard, but the ethical dilemmas concerning confidentiality that emerge in the process of ensuring HIV-free survival of the third party - the child - have attracted limited attention. The study explores challenges of confidentiality linked to a third party in nurse-patient relationships in a rural Tanzanian HIV/AIDS context. The study was carried out in rural and semi-urban settings of Tanzania where the population is largely agro-pastoral, the formal educational level is low and poverty is rife. The HIV prevalence of 1.5% is low compared to the national prevalence of 5.1%. Data were collected during 9 months of ethnographic fieldwork and consisted of participant observation in clinical settings and during home visits combined with in-depth interviews. The main categories of informants were nurses employed in prevention of mother-to-child transmission of HIV programmes and HIV-positive women enrolled in these programmes. Based on information about the study aims, all informants consented to participate. Ethical approval was granted by ethics review boards in Tanzania and Norway. The material indicates a delicate balance between the nurses' attempt to secure the HIV-free survival of the babies and the mothers' desire to preserve confidentiality. Profound confidentiality-related dilemmas emerged in actual practice, and indications of a lack of thorough consideration of the implication of a patient's restricted disclosure came to light during follow-up of the HIV-positive women and the third party - the child who is at risk of HIV infection through mother's milk. World Health Organization

  17. 7 CFR 1230.82 - Confidential treatment.

    Science.gov (United States)

    2010-01-01

    ... statements based upon the reports of a number of persons subject to this subpart or of statistical data collected therefrom, which statements or data do not identify the information furnished by any person; or (b... Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (MARKETING...

  18. 45 CFR 307.13 - Security and confidentiality for computerized support enforcement systems in operation after...

    Science.gov (United States)

    2010-10-01

    ... ENFORCEMENT SYSTEMS § 307.13 Security and confidentiality for computerized support enforcement systems in... systems in operation after October 1, 1997. (a) Information integrity and security. Have safeguards... 45 Public Welfare 2 2010-10-01 2010-10-01 false Security and confidentiality for computerized...

  19. 40 CFR 85.1415 - Treatment of confidential information.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 18 2010-07-01 2010-07-01 false Treatment of confidential information. 85.1415 Section 85.1415 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) AIR PROGRAMS (CONTINUED) CONTROL OF AIR POLLUTION FROM MOBILE SOURCES Urban Bus Rebuild Requirements § 85.1415...

  20. Usage of internal statements in making consolidated financial statement

    Directory of Open Access Journals (Sweden)

    V.N. Herman

    2016-12-01

    Full Text Available The emergence of the consolidated financial statements is the result of integration processes in the businesses that lead to pooling of different companies. As consolidated financial statements present an aggregated look at the financial position of a parent and its subsidiaries, they let you gauge the overall health of an entire group of companies as opposed to one company’s standalone position. Consolidation of financial statements requires from the participants of joining elaborating their individual statements. The article describes the general scheme of consolidation process and defines the key trends of consolidation adjustments, in particular, financial investments, internal operations, goodwill and exchange rate differences. It is found out that to get information about internal operations and financial investments such data have to be synthesized from internal statements. This approach allows using the same accounting methods to parent and subsidiary entities. The objects, the users and the subject domain of internal statements are determined in order to make consolidation of financial statements of joining.

  1. Privacy and Confidentiality in Exchange of Information Procedures : Some Uncertainties, Many Issues, but Few Solutions

    NARCIS (Netherlands)

    Debelva, F.; Mosquera, Valderrama I.J.

    2017-01-01

    The overall aim of this article is to analyse the taxpayers’ rights to confidentiality and privacy in exchange of information including the new global standard of automatic exchange of information. Section 2 will analyse the state of the art regarding the right to privacy and confidentiality in

  2. 40 CFR 86.615-84 - Treatment of confidential information.

    Science.gov (United States)

    2010-07-01

    ...) Selective Enforcement Auditing of New Light-Duty Vehicles, Light-Duty Trucks, and Heavy-Duty Vehicles § 86... part 2, subpart B. (b) Any claim of confidentiality must accompany the information at the time it is...

  3. Absolutism on Access and Confidentiality: Principled or Irresponsible?

    Science.gov (United States)

    Sheerin, William E.

    1991-01-01

    Discusses issues involved in public access to library materials and facilities and patron confidentiality. Topics discussed include children's access to adult materials; parents' right to know about their children's materials; First and Fourth Amendment protections; the Library Bill of Rights; and American Library Association (ALA) documents that…

  4. 12 CFR 19.181 - Confidentiality of formal investigations.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 1 2010-01-01 2010-01-01 false Confidentiality of formal investigations. 19.181 Section 19.181 Banks and Banking COMPTROLLER OF THE CURRENCY, DEPARTMENT OF THE TREASURY RULES OF... only in accordance with the provisions of part 4 of this chapter. ...

  5. PENGARUH CORPORATE GOVERNANCE TERHADAP TAX AVOIDANCE (Perusahaan Pertambangan yang terdaftar di BEI

    Directory of Open Access Journals (Sweden)

    Sri Mulyani

    2018-05-01

    Full Text Available he purpose of this research is to know the influence of institutional ownership, independent commissioner, audit committee and audit quality to tax avoidance at mining company listed on BEI year 2014-2016. The population of this study is mining companies listed on the BEI 2014-2016 as many as 46 companies. Sampling used in this research purposive sampling method. Data source is secondary data obtained from company website and BEI website (www.idx.co.id. This study uses multiple regression analysis to analyze data with the help of SPSS 21 edition program. The results of this study indicate that the variables of institutional ownership, audit committee and audit quality have significant influence on tax avoidance, while independent commissioner variable has no significant effect on tax avoidance. The results of this study are expected to be an additional consideration of the management in conducting tax avoidance is correct and efficient without violating applicable tax laws, and can provide additional information for users of financial statements in investment decision making.

  6. HIPAA-protecting patient confidentiality or covering something else?

    Directory of Open Access Journals (Sweden)

    Robbins RA

    2013-10-01

    Full Text Available No abstract available. Article truncated at 150 words. A case of a physician fired from the Veterans Administration (VA for violation of the Health Care Portability and Accountability Act of 1996 (HIPAA illustrates a problem with both the law and the VA. Anil Parikh, a VA physician at the Jesse Brown VA in Chicago, was dismissed on a charge of making unauthorized disclosures of confidential patient information on October 19, 2007. On January 3, 2011 the Merit Systems Protection Board (MSPB reversed Dr. Parikh’s removal. Dr. Parikh's initially made disclosures to the VA Office of Inspector General and to Senator Barack Obama and Congressman Luis Gutierrez, in whose district the Jesse Brown VA lies. Dr. Parikh alleged that there were systematic problems within the Jesse Brown VA that resulted in untimely and inadequate patient care. The confidential patient information Parikh disclosed included examples of the misdiagnoses and misdirection of patients within the hospital. Specifically, Dr. Parikh alleged that …

  7. 40 CFR 725.15 - Determining applicability when microorganism identity or use is confidential or uncertain.

    Science.gov (United States)

    2010-07-01

    ... ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) TOXIC SUBSTANCES CONTROL ACT REPORTING REQUIREMENTS AND REVIEW... appear on the public version of the Inventory, in § 725.239 or in subpart M of this part. Instead, it is contained in a confidential version held in EPA's Confidential Business Information Center (CBIC). The...

  8. HIV testing sites' communication about adolescent confidentiality: potential barriers and facilitators to testing.

    Science.gov (United States)

    Hyden, Christel; Allegrante, John P; Cohall, Alwyn T

    2014-03-01

    This study sought to evaluate HIV testing locations in New York City in terms of staff communication of confidentiality policies for adolescent clients. Using the New York State Directory of HIV Counseling and Testing Resources as a sampling frame, this study made telephone contact with 164 public HIV testing locations in New York City and used a semistructured interview to ask questions about confidentiality, parental permission, and parent access to test results. At 48% of locations, either HIV testing was not offered or we were unable to reach a staff member to ask questions about testing options and confidentiality. At the remaining sites, information provided regarding confidentiality, parental consent, and privacy of test results was correct only 69% to 85% of the time. Additionally, 23% of sites successfully contacted offered testing exclusively between 9:00 a.m. and 3:00 p.m. weekdays, when most adolescents are in school. Our findings point to a need for increased training and quality control at the clinical level to ensure that consumers in need of HIV testing are provided with accurate information and accessible services. Furthermore, these results highlight the need for more "patient-centric" sites with enhanced accessibility for potential clients, particularly youth.

  9. Lithuanian general practitioners' knowledge of confidentiality laws in adolescent sexual and reproductive healthcare: a cross-sectional study

    DEFF Research Database (Denmark)

    Lazarus, Jeff; Jaruseviciene, Lina; Liljestrand, Jerker

    2008-01-01

    In Lithuania, the legislation addressing confidentiality in adolescent healthcare is contradictory and vague. Previous studies have also revealed that medico-legal knowledge among physicians is poor, and attitudes play a correspondingly greater role than legal knowledge in ensuring the confidenti......In Lithuania, the legislation addressing confidentiality in adolescent healthcare is contradictory and vague. Previous studies have also revealed that medico-legal knowledge among physicians is poor, and attitudes play a correspondingly greater role than legal knowledge in ensuring...

  10. 40 CFR 303.31 - Assurance of claimant confidentiality.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 27 2010-07-01 2010-07-01 false Assurance of claimant confidentiality. 303.31 Section 303.31 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) SUPERFUND... knowledge, shall be given access to the identity of, or information that would lead to the identity of, a...

  11. 75 FR 75576 - Confidentiality of Suspicious Activity Reports

    Science.gov (United States)

    2010-12-03

    ...-2010-0019] RIN 1557-AD17 Confidentiality of Suspicious Activity Reports AGENCY: The Office of the... suspicious activity report (SAR) to: clarify the scope of the statutory prohibition on the disclosure by a... institutions, including national banks regulated by the OCC, to keep certain records and make certain reports...

  12. Nursing Students' Perceptions of Confidentiality, Accountability, and E-Professionalism in Relation to Facebook.

    Science.gov (United States)

    Barnable, Alexia; Cunning, Glenda; Parcon, Mariel

    This study examined nursing students' perceptions of confidentiality, accountability, and e-professionalism in relation to Facebook. All of the students were aware that posting patients' names and pictures of patients constituted a confidentiality breach. When comparing students based on educational status, there were differing opinions on whether employers should use Facebook profile information for hiring decisions. Nursing programs should provide current education, including clear and up-to-date policies, about social media use.

  13. 18 CFR 1b.9 - Confidentiality of investigations.

    Science.gov (United States)

    2010-04-01

    ... 18 Conservation of Power and Water Resources 1 2010-04-01 2010-04-01 false Confidentiality of investigations. 1b.9 Section 1b.9 Conservation of Power and Water Resources FEDERAL ENERGY REGULATORY COMMISSION... pursuant to subpoena, and all investigative proceedings shall be treated as nonpublic by the Commission and...

  14. THE STATEMENT OF CASH FLOWS USING FINANCIAL STATEMENT EQUATIONS

    OpenAIRE

    Harold Fletcher; Thomas Ulrich

    2010-01-01

    This paper addresses one of the more difficult topics in teaching MBA level financial management, the statement of cash flows. By employing financial statement equations in preparing the statement of cash flows, students: (1) are employing tools that they are more familiar and comfortable with which mitigates their anxiety and enhances their understanding, (2) are better able to understand the logic of the statement of cash flows and the relationships that exist between it and the income stat...

  15. THE POSSIBLE CONFIDENTIALITY: THE PUBLIC ADMINISTRATION AS PARTY IN THE ALTERNATIVE DISPUTE RESOLUTION MECHANISM

    Directory of Open Access Journals (Sweden)

    Carlos Alberto de Salles

    2017-05-01

    Full Text Available This article debates the tension that exists between confidentiality, usual in ADRs, and the publicity principle, that rules the Public Administration in Brazil. As a solution points that the parameter of confidentiality when Public Administration is a party must be the preservation of accountability of the involved agencies, what means, the capacity to answer to its own goals and to obey the public control.

  16. IT Confidentiality Risk Assessment for an Architecture-Based Approach

    NARCIS (Netherlands)

    Morali, A.; Zambon, Emmanuele; Etalle, Sandro; Overbeek, Paul

    2008-01-01

    Information systems require awareness of risks and a good understanding of vulnerabilities and their exploitations. In this paper, we propose a novel approach for the systematic assessment and analysis of confidentiality risks caused by disclosure of operational and functional information. The

  17. Public expectations concerning confidentiality protection of adolescents' sexual and reproductive health care in Lithuania: findings of the surveys conducted in 2005 and 2012.

    Science.gov (United States)

    Jaruseviciene, Lina; Zaborskis, Apolinaras; Lazarus, Jeffrey Victor

    2014-04-01

    An adolescent's right to confidential healthcare is protected by international law and professional consensus. However, parental and social support for confidential sexual and reproductive health (SRH) services, in particular, varies greatly. This study documents Lithuanian residents' expectations with regard to confidentiality protection for adolescents in this domain, and explores the factors related to the diversity of these expectations. Two national surveys of Lithuanian residents completed in 2005 and 2012 using anonymous questionnaires. Participants rated their expectations for confidentiality using a five-point Likert scale for eight types of SRH consultations. Public anticipation for confidentiality depended on whether issues related to sexual behaviour or to its consequences were addressed during adolescent consultation. Only younger respondents had higher expectations for confidentiality in both contexts. Public expectations regarding confidentiality were less demanding in 2012 than in 2005. The expectation of confidentiality protection was greater for topics related to sexual behaviour than for the consequences of sexual behaviour, such as pregnancy, abortion or a sexually transmitted infection. This implies a need for targeted information strategies for the general population and explicit guidance for physicians on when and for whom care should remain confidential.

  18. 49 CFR 40.321 - What is the general confidentiality rule for drug and alcohol test information?

    Science.gov (United States)

    2010-10-01

    ... Transportation PROCEDURES FOR TRANSPORTATION WORKPLACE DRUG AND ALCOHOL TESTING PROGRAMS Confidentiality and Release of Information § 40.321 What is the general confidentiality rule for drug and alcohol test... DOT drug or alcohol testing process, you are prohibited from releasing individual test results or...

  19. The National Environmental Policy Act and DOE's programmatic environmental impact statement

    International Nuclear Information System (INIS)

    Wisenbaker, W.E.

    1991-01-01

    The National Environmental Policy Act (NEPA) of 1969 requires that all agencies of the federal government prepare a detailed statement on any action significantly affecting the quality of the human environment. Such a statement must include the environmental impact of the proposed action, any adverse environmental effects that cannot be avoided should the proposed action be implemented, and alternatives to the proposed action. In requiring environmental statements, NEPA encourages viewing related actions collectively and looking at cumulative impacts. A programmatic environmental impact statement (PEIS) is a broad environmental analysis of a program or policy prepared when actions are connected and may have cumulative environmental impacts. The PEIS benefits include providing input into an agency's planning and decision making, assessing potential environmental consequences of a wide range of alternatives before options have been foreclosed, and allowing consideration of systemwide impacts of various alternatives early in the decision-making process. The US Department of Energy (DOE) will prepare its PEIS on Environmental Restoration and Waste Management program. The PEIS will consider programmatic issues and integrated approaches to the program; address national, program-wide alternatives rather than site-specific actions; and provide for subsequent NEPA documents of narrower scope to be prepared to address site-specific or project-specific actions

  20. 22 CFR 1104.17 - Confidentiality of archaeological resource information.

    Science.gov (United States)

    2010-04-01

    ... 22 Foreign Relations 2 2010-04-01 2010-04-01 true Confidentiality of archaeological resource information. 1104.17 Section 1104.17 Foreign Relations INTERNATIONAL BOUNDARY AND WATER COMMISSION, UNITED... of archaeological resource information. (a) The Commissioner shall not make available to the public...

  1. Decisions about Confidentiality in Medical Student Mental Health Settings.

    Science.gov (United States)

    Lindenthal, Jacob Jay; And Others

    1984-01-01

    Examined responses of psychologists and psychiatrists in medical schools (N=59) to vignettes representing student problems. Results suggested practitioners were generally unwilling to break confidentiality in response to problems involving suicidal tendencies, sexual coercion/seduction, social transgressions, or falsifying data. Only suggestions…

  2. Privacy, confidentiality and abortion statistics: a question of public interest?

    Science.gov (United States)

    McHale, Jean V; Jones, June

    2012-01-01

    The precise nature and scope of healthcare confidentiality has long been the subject of debate. While the obligation of confidentiality is integral to professional ethical codes and is also safeguarded under English law through the equitable remedy of breach of confidence, underpinned by the right to privacy enshrined in Article 8 of the Human Rights Act 1998, it has never been regarded as absolute. But when can and should personal information be made available for statistical and research purposes and what if the information in question is highly sensitive information, such as that relating to the termination of pregnancy after 24 weeks? This article explores the case of In the Matter of an Appeal to the Information Tribunal under section 57 of the Freedom of Information Act 2000, concerning the decision of the Department of Health to withhold some statistical data from the publication of its annual abortion statistics. The specific data being withheld concerned the termination for serious fetal handicap under section 1(1)d of the Abortion Act 1967. The paper explores the implications of this case, which relate both to the nature and scope of personal privacy. It suggests that lessons can be drawn from this case about public interest and use of statistical information and also about general policy issues concerning the legal regulation of confidentiality and privacy in the future.

  3. 18 CFR 401.75 - Protection of trade secrets; Confidential information.

    Science.gov (United States)

    2010-04-01

    ..., confidential statistical data, amount or source of any income, profits, losses, or expenditures of any person... States Code which provides: Whoever, being an officer or employee of the United States or of any...

  4. Denying a patient's final will: public safety vs. medical confidentiality and patient autonomy.

    Science.gov (United States)

    Gaertner, Jan; Vent, Julia; Greinwald, Ralf; Rothschild, Markus A; Ostgathe, Christoph; Kessel, Rene; Voltz, Raymond

    2011-12-01

    Especially when caring for patients approaching the end of life, physicians and nursing staff feel committed to fulfilling as many patient desires as possible. However, sometimes a patient's "final will" may threaten public safety. This can lead to severe conflicts, outweighing the physician's obligation and dedication to care for the patient and to respect his autonomy. Yet, public safety can be threatened if confidentiality is not broken. This article provides a concise summary of the medicolegal and ethical fundamentals concerning this difficult situation. If the patient's and others' health and safety are at risk, physicians may (and in some countries must) break medical confidentiality and disclose confidential patient information to the police and other authorities. Physicians should be able to professionally deal with such a conflict in all patients, not only in patients with advanced illness. Copyright © 2011 U.S. Cancer Pain Relief Committee. Published by Elsevier Inc. All rights reserved.

  5. Ensuring Confidentiality of Geocoded Health Data: Assessing Geographic Masking Strategies for Individual-Level Data.

    Science.gov (United States)

    Zandbergen, Paul A

    2014-01-01

    Public health datasets increasingly use geographic identifiers such as an individual's address. Geocoding these addresses often provides new insights since it becomes possible to examine spatial patterns and associations. Address information is typically considered confidential and is therefore not released or shared with others. Publishing maps with the locations of individuals, however, may also breach confidentiality since addresses and associated identities can be discovered through reverse geocoding. One commonly used technique to protect confidentiality when releasing individual-level geocoded data is geographic masking. This typically consists of applying a certain amount of random perturbation in a systematic manner to reduce the risk of reidentification. A number of geographic masking techniques have been developed as well as methods to quantity the risk of reidentification associated with a particular masking method. This paper presents a review of the current state-of-the-art in geographic masking, summarizing the various methods and their strengths and weaknesses. Despite recent progress, no universally accepted or endorsed geographic masking technique has emerged. Researchers on the other hand are publishing maps using geographic masking of confidential locations. Any researcher publishing such maps is advised to become familiar with the different masking techniques available and their associated reidentification risks.

  6. Ensuring Confidentiality of Geocoded Health Data: Assessing Geographic Masking Strategies for Individual-Level Data

    Directory of Open Access Journals (Sweden)

    Paul A. Zandbergen

    2014-01-01

    Full Text Available Public health datasets increasingly use geographic identifiers such as an individual’s address. Geocoding these addresses often provides new insights since it becomes possible to examine spatial patterns and associations. Address information is typically considered confidential and is therefore not released or shared with others. Publishing maps with the locations of individuals, however, may also breach confidentiality since addresses and associated identities can be discovered through reverse geocoding. One commonly used technique to protect confidentiality when releasing individual-level geocoded data is geographic masking. This typically consists of applying a certain amount of random perturbation in a systematic manner to reduce the risk of reidentification. A number of geographic masking techniques have been developed as well as methods to quantity the risk of reidentification associated with a particular masking method. This paper presents a review of the current state-of-the-art in geographic masking, summarizing the various methods and their strengths and weaknesses. Despite recent progress, no universally accepted or endorsed geographic masking technique has emerged. Researchers on the other hand are publishing maps using geographic masking of confidential locations. Any researcher publishing such maps is advised to become familiar with the different masking techniques available and their associated reidentification risks.

  7. Presentation of Consolidated Statement of Cash Flows under IAS 7, Statement of Cash Flows

    OpenAIRE

    Calota Traian-Ovidiu; Tănase Alin-Eliodor

    2013-01-01

    The consolidated financial statements must includ a specific statement, regarding cash flows from all activities of the entity, called „consolidated statement of cash flow”. Information for preparing cash flow statements can be found in all other components of the financial statements, such as financial position, statement of comprehensive income and statement of changes in equity. The cash flow statement shall report cash flows during the period classified by operating, investing and financi...

  8. 10 CFR Appendix A to Subpart A of... - Format for Presentation of Material in Environmental Impact Statements

    Science.gov (United States)

    2010-01-01

    ... discussed. In the case of nuclear power plant construction or siting, consideration will be given to the.... Affected environment. The environmental impact statement will succinctly describe the environment to be... decisionmaking. The discussion will include any adverse environmental effects which cannot be avoided should the...

  9. Circles of Confidence in Correspondences. : Confidentiality in seventeenth-century knowledge exchange in networks of letters and drawings

    NARCIS (Netherlands)

    van den Heuvel, C.M.J.M.; Weingart, Scott B; Spelt, Nils; Nellen, H.J.M.

    2016-01-01

    Science in the Early Modern World depended on the one hand on openness in scholarly communication, but on the other hand the competition in commerce and trade and the political and religious conflicts required secrecy and confidentiality. This papers analyzes these concepts of confidentiality and

  10. 48 CFR 1552.235-78 - Data Security for Toxic Substances Control Act Confidential Business Information (DEC 1997).

    Science.gov (United States)

    2010-10-01

    ...: Data Security for Toxic Substances Control Act Confidential Business Information (DEC 1997) The... 48 Federal Acquisition Regulations System 6 2010-10-01 2010-10-01 true Data Security for Toxic Substances Control Act Confidential Business Information (DEC 1997). 1552.235-78 Section 1552.235-78 Federal...

  11. Rio 2016 financial statements

    OpenAIRE

    2015-01-01

    These documents include the report from independent auditors balance sheet, the statement of income, the statement of changes in equity, the statement of cash flows and the explanatory notes to the financial statements.

  12. 7 CFR 981.75 - Confidential nature of records and reports.

    Science.gov (United States)

    2010-01-01

    ... Section 981.75 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (Marketing Agreements and Orders; Fruits, Vegetables, Nuts), DEPARTMENT OF AGRICULTURE ALMONDS..., financial condition, or business operations of any handler shall be considered as confidential information...

  13. Labor Tax Avoidance and its Determinants: The Case of Mafia Firms in Italy

    OpenAIRE

    Ravenda, Diego; Argilés Bosch, Josep M.; Valencia Silva, Maika

    2015-01-01

    This paper develops two new measures of labor tax avoidance (LTAV) based on social contribution expenses reported in financial statements and tests them and their determinants within a sample of 224 Italian firms defined as legally registered Mafia firms (LMFs) due to having been confiscated at some point by judicial authorities, in relation to alleged connections with Italian organized crime. Overall, our results reveal that before confiscation LMFs engage more in LTAV than lawful firms do, ...

  14. Time for Action: Audit, Accountability and Confidential Enquiries into ...

    African Journals Online (AJOL)

    Improving the quality of care is essential for achieving reductions in maternal mortality. Audit is one of the methods which can be used to simultaneously assess as well as improve quality. This commentary discusses one type of audit – confidential enquiries into maternal death. We believe that the enthusiasm for ...

  15. Clinical psychology service users' experiences of confidentiality and informed consent: a qualitative analysis.

    Science.gov (United States)

    Martindale, S J; Chambers, E; Thompson, A R

    2009-12-01

    To explore and describe the experience of clinical psychology service users in relation to the processes associated with confidentiality and the generation of informed consent in individual therapy. A qualitative interview-based study employing interpretative phenomenological analysis was conducted with service users. User researchers were active collaborators in the study. A focus group of four users was convened to explore issues related to confidentiality and consent, which then informed the development of the semi-structured interview schedule. Twelve users of community mental health clinical psychology services were interviewed by user researchers. A user researcher and a clinical psychologist undertook joint analysis of the data. A second clinical psychologist facilitated reflexivity and wider consideration of validity issues. Four main themes were identified from the data: being referred; the participant's feelings, mental health difficulties, and their impact; relationships with workers and carers; and autonomy. The meaningfulness of processes of discussing confidentiality, and generating informed consent, can be improved by psychologists placing a greater emphasis on choice, control, autonomy, individual preferences, and actively involving the user in dialogue on repeated occasions.

  16. MEASUREMENT OF APPLICATION OF ISO 27001 OF CUSTOMER CELLULAR CARD CONFIDENTIALITY DATA IN PT. XYZ AREA JAKARTA

    Directory of Open Access Journals (Sweden)

    Krishna Rahadian

    2014-10-01

    Full Text Available The purpose of this study was to evaluate the effects of the process of ISO 27001 with respect to the confidentiality of customer cellular card Jakarta and to improve cellular card customer data confidentiality at PT.XYZ from data leakage of the customer data due to the third party involvement, clean-desk policy, and access right. Recommendation regarding the improvement is provided after reviewing the confidentiality of customer data. The survey in this study is conducted by questionnaire. From the evaluation results of the questionnaire, it is concluded that the larger customer data leaks are mainly caused by the external factors.

  17. 32 CFR 147.30 - Temporary eligibility for access at the confidential and secret levels and temporary eligibility...

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 1 2010-07-01 2010-07-01 false Temporary eligibility for access at the confidential and secret levels and temporary eligibility for âLâ access authorization. 147.30 Section 147.30... Temporary Access § 147.30 Temporary eligibility for access at the confidential and secret levels and...

  18. Resonating Statements

    DEFF Research Database (Denmark)

    Hjelholt, Morten; Jensen, Tina Blegind

    2015-01-01

    IT projects are often complex arrangements of technological components, social actions, and organizational transformation that are difficult to manage in practice. This paper takes an analytical discourse perspective to explore the process of legitimizing IT projects. We introduce the concept...... of resonating statements to highlight how central actors navigate in various discourses over time. Particularly, the statements and actions of an IT project manager are portrayed to show how individuals can legitimize actions by connecting statements to historically produced discourses. The case study...... as part of a feedback loop to re-attach the localized IT project to the broader national discourse. The paper concludes with reflections on how to actively build on resonating statements as a strategic resource for legitimizing IT projects...

  19. Comparison of parental and adolescent views on the confidential interview and adolescent health risk behaviors within the gynecologic setting.

    Science.gov (United States)

    Trotman, Gylynthia E; Mackey, Eleanor; Tefera, Eshetu; Gomez-Lobo, Veronica

    2018-03-23

    To explore parental and adolescent views on the confidential interview in the gynecologic setting and compare adolescent reported risk-taking behaviors with parental perception. Anonymous surveys were administered separately to parents/guardians and adolescents between the ages of 11-17. Information pertaining to the patient's Tanner stage and reason for visit was obtained from the provider. This first phase served as the usual care group. In the second phase of the study, surveys were once again distributed after a brief educational intervention. Linear regression analysis, Wilcoxon rank sum test, and Fisher exact test were used where appropriate. Pediatric and Adolescent Gynecology clinics in two tertiary hospitals INTERVENTION: Brief educational handout on key concepts of the confidential interview MAIN OUTCOME MEASURES: Parental perception of the confidential interview and adolescent risk- taking behaviors RESULTS: A total of 248 surveys were included in the final analysis, which accounts for 62 adolescent and parent/guardian pairs in each group. The majority of parents and adolescents reported perceived benefit to the confidential interview. However, parents were less likely to rate benefits of private time specifically for their own adolescent and less than half of parents believed that adolescents should have access to private time in the gynecologic setting. Both parents/guardians and adolescents feared that the confidential interview would limit the parent's ability to take part in decision-making. The low support for confidential time for their adolescent was not different in the usual care group as compared to the intervention group, although there was a trend toward parental acceptance with increased adolescent age. Adolescents were consistently more likely to report more risk-taking behaviors than their parents perceived. There is a discord between parental perception and adolescent reports of risk taking behaviors. This is coupled with a lack of

  20. [Consent and confidentiality in occupational health practice: balance between legal requirements and ethical values].

    Science.gov (United States)

    Mora, Erika; Franco, G

    2010-01-01

    The recently introduced Italian law on the protection of workers' health states that the occupational health physician (competent physician) is required to act according to the Code of Ethics of the International Commission on Occupational Health (ICOH). This paper aims at examining the articles of legislative decree 81/2008 dealing with informed consent and confidentiality compared with the corresponding points of the ICOH Ethics Code. Analysis of the relationship between articles 25 and 39 (informed consent) and 18, 20 and 39 (confidentiality) of the decree shows that there are some points of disagreement between the legal requirements and the Code of Ethics, in particular concerning prescribed health surveillance, consent based on appropriate information (points 8, 10 and 12 of the Code) and some aspects of confidentiality (points 10, 20, 21, 22 and 23 of the Code). Although the competent physician is required to act according to the law, the decisional process could lead to a violation of workers' autonomy.

  1. 29 CFR 1980.104 - Investigation.

    Science.gov (United States)

    2010-07-01

    ...) PROCEDURES FOR THE HANDLING OF DISCRIMINATION COMPLAINTS UNDER SECTION 806 OF THE CORPORATE AND CRIMINAL... supporting the complaint (redacted to protect the identity of any confidential informants). The Assistant... protect the identity of confidential informants where statements were given in confidence; if the...

  2. 19 CFR 210.39 - In camera treatment of confidential information.

    Science.gov (United States)

    2010-04-01

    ... 19 Customs Duties 3 2010-04-01 2010-04-01 false In camera treatment of confidential information. 210.39 Section 210.39 Customs Duties UNITED STATES INTERNATIONAL TRADE COMMISSION INVESTIGATIONS OF UNFAIR PRACTICES IN IMPORT TRADE ADJUDICATION AND ENFORCEMENT Prehearing Conferences and Hearings § 210...

  3. Data-protection standards and confidentiality of HIV/AIDS status in ...

    African Journals Online (AJOL)

    Also, the article presents a preliminary assessment of the possible impact of professionalisation (and outsourcing) of workplace HIV/AIDS management on ... the development of law governing data protection and HIV/AIDS confidentiality in South Africa) and interviews conducted with workplace health managers and trade ...

  4. Confidentiality Protection of User Data and Adaptive Resource Allocation for Managing Multiple Workflow Performance in Service-Based Systems

    Science.gov (United States)

    An, Ho

    2012-01-01

    In this dissertation, two interrelated problems of service-based systems (SBS) are addressed: protecting users' data confidentiality from service providers, and managing performance of multiple workflows in SBS. Current SBSs pose serious limitations to protecting users' data confidentiality. Since users' sensitive data is sent in…

  5. 21 CFR 1316.23 - Confidentiality of identity of research subjects.

    Science.gov (United States)

    2010-04-01

    ... 21 Food and Drugs 9 2010-04-01 2010-04-01 false Confidentiality of identity of research subjects. 1316.23 Section 1316.23 Food and Drugs DRUG ENFORCEMENT ADMINISTRATION, DEPARTMENT OF JUSTICE ADMINISTRATIVE FUNCTIONS, PRACTICES, AND PROCEDURES Protection of Researchers and Research Subjects § 1316.23...

  6. 75 FR 8330 - Access to Confidential Business Information by Eastern Research Group

    Science.gov (United States)

    2010-02-24

    ... ENVIRONMENTAL PROTECTION AGENCY [EPA-HQ-OPPT-2003-0004; FRL-8812-4] Access to Confidential Business Information by Eastern Research Group AGENCY: Environmental Protection Agency (EPA). ACTION: Notice. [[Page 8331

  7. Financial Statements Analysis

    OpenAIRE

    Tănase Alin-Eliodor

    2014-01-01

    This article focuses on analyzing of a consolidated financial statements of a hypothetically SME. The interpretation of the financial position and performances is based on the more than 40 financial key ratios computed by using financial data from consolidated income statement, consolidated financial position and cash flow. However additional data from notes to financial statements are provided.

  8. Changes in public attitudes towards confidential adolescent sexual and reproductive health services in Lithuania after the introduction of new legislation

    DEFF Research Database (Denmark)

    Jaruseviciene, Lina; Zaborskis, Apolinaras; Sauliune, Skirmante

    2015-01-01

    was employed to estimate absolute differences in prevalence of belief in whether or not adolescents would find confidentiality important when consulting a physician on SRH issues. A log-binomial regression model was fitted to estimate the relative changes (prevalence ratio) of the independent variables......BACKGROUND: In Lithuania, the right to confidentiality in healthcare for adolescents over the age of 16 was guaranteed in 2010 through the adoption of new legislation. This study sets out to explore changes in Lithuanian residents' attitudes towards confidentiality protection in adolescent sexual....... RESULTS: The total number of respondents was 1054 (response rate 83%) in 2005 and 1002 (response rate 80%) in 2012. The proportion of respondents who reported a belief that adolescents would find confidentiality important when seeing a physician for SRH issues increased significantly from 62% in 2005...

  9. Privacy Act System of Records: Confidential Business Information Tracking System, EPA-20

    Science.gov (United States)

    Learn about the Confidential Business Information Tracking System, including who is covered in the system, the purpose of data collection, routine uses for the system's records, and other security procedures.

  10. 40 CFR 1601.26 - Special procedures for confidential business information.

    Science.gov (United States)

    2010-07-01

    ... described in paragraph (c) of this section, the CSB shall, to the extent permitted by law, afford a business... business information. 1601.26 Section 1601.26 Protection of Environment CHEMICAL SAFETY AND HAZARD... Requesting and Disclosing Records § 1601.26 Special procedures for confidential business information. (a) In...

  11. 42 CFR 3.206 - Confidentiality of patient safety work product.

    Science.gov (United States)

    2010-10-01

    ... 42 Public Health 1 2010-10-01 2010-10-01 false Confidentiality of patient safety work product. 3... individually identifiable health information in such patient safety work product, the direct identifiers listed at 45 CFR 164.514(e)(2) have been removed. (5) Disclosure of nonidentifiable patient safety work...

  12. 77 FR 12284 - Access to Confidential Business Information; Protection Strategies Incorporated

    Science.gov (United States)

    2012-02-29

    ... Business Information; Protection Strategies Incorporated AGENCY: Environmental Protection Agency (EPA). ACTION: Notice. SUMMARY: EPA has authorized its contractor, Protection Strategies Incorporated (PSI) of... Business Information (CBI). DATES: Access to the confidential data occurred on or about February 16, 2012...

  13. Confidentiality and its limits: some contributions from Christianity.

    Science.gov (United States)

    Torrance, I R

    2003-02-01

    The issue is whether Christianity, of its nature, would seek to prevent a justifiable breach of confidentiality or could endorse it, under certain circumstances, as the act which is fundamentally more loving or more truthful. The individualistic nature of Western Christianity is noted. The Lutheran theologian Dietrich Bonhoeffer is used to show Christian support for dynamic rather than literal truth telling, and for awareness of the contexts and power relations within which persons stand.

  14. Confidential conversations between supervisor and employee as a means for improving leadership: a quasi-experimental study in hospital wards.

    Science.gov (United States)

    Kivimäki, M

    1996-11-01

    Although yearly confidential conversations between a supervisor and an employee have been recommended as a means for improving leadership, evidence on the actual effects of these conversations has been lacking. The present study therefore investigated whether confidential conversations improve perceptions of goal clarity, sufficiency of feedback and innovativeness, and elicit satisfaction with the supervisor's leadership style within the hospital setting. Nine wards were divided into one experimental group (3 wards) and two control groups (3 + 3 wards). A questionnaire on goal clarity, feedback, innovativeness and satisfaction was administered twice to every group (1st measurement: r = 186, 2nd measurement: n = 163). The experimental group began confidential conversations after the first measurement, control group 1 entered into conversations during both measurements, and control group 2 did not enter into conversations at the time of either measurement. Confidential conversations improved perceived feedback. In both measurements, the sufficiency of feedback was reported to be significantly better in the groups having conversations than in the other groups. In addition, there was a significant positive change in the perceived sufficiency of feedback in the experimental group but not in the other groups. Confidential conversations did not affect the perceptions of goal clarity and innovativeness or elicit satisfaction with the supervisor's management style.

  15. Genetic privacy and confidentiality: why they are so hard to protect.

    Science.gov (United States)

    Rothstein, M A

    1998-01-01

    Author notes that widespread concerns have been raised about protecting genetic privacy and confidentiality in insurance and employment. He argues that effective protections are difficult because complicated issues, such as the right of access to health care, are invariably implicated.

  16. The Confidentiality of Medical Secrets of Patients by the Nursing Staff

    Directory of Open Access Journals (Sweden)

    Chalkias Theodoros

    2010-01-01

    Full Text Available In this article you will find a critical discussion about the significance of confidentiality of "medical secrets" (keeping the secrets of ill people by nurses. Special cases are mentioned regarding the need to keep, or reveal the secret.

  17. Payers' experiences with confidential pharmaceutical price discounts: A survey of public and statutory health systems in North America, Europe, and Australasia.

    Science.gov (United States)

    Morgan, Steven G; Vogler, Sabine; Wagner, Anita K

    2017-04-01

    Institutional payers for pharmaceuticals worldwide appear to be increasingly negotiating confidential discounts off of the official list price of pharmaceuticals purchased in the community setting. We conducted an anonymous survey about experiences with and attitudes toward confidential discounts on patented pharmaceuticals in a sample of high-income countries. Confidential price discounts are now common among the ten health systems that participated in our study, though some had only recently begun to use these pricing arrangements on a routine basis. Several health systems had used a wide variety of discounting schemes in the past two years. The most frequent discount received by participating health systems was between 20% and 29% of official list prices; however, six participants reported their health system received one or more discount over the past two years that was valued at 60% or more of the list prices. On average, participants reported that confidential discounts were more common, complex, and significant for specialty pharmaceuticals than for primary care pharmaceuticals. Participants had a more favorable view of the impact of confidential discount schemes on their health systems than on the global marketplace. Overall, the frequency, complexity, and scale of confidential discounts being routinely negotiated suggest that the list prices for medicines bear limited resemblance to what many institutional payers actually pay. Copyright © 2017 The Authors. Published by Elsevier B.V. All rights reserved.

  18. 22 CFR 212.38 - Predisclosure notification procedures for confidential commercial information.

    Science.gov (United States)

    2010-04-01

    ... 22 Foreign Relations 1 2010-04-01 2010-04-01 false Predisclosure notification procedures for confidential commercial information. 212.38 Section 212.38 Foreign Relations AGENCY FOR INTERNATIONAL DEVELOPMENT PUBLIC INFORMATION Access to Agency Records § 212.38 Predisclosure notification procedures for...

  19. 18 CFR 385.606 - Confidentiality in dispute resolution proceedings (Rule 606).

    Science.gov (United States)

    2010-04-01

    ... be required to disclose, any information concerning any dispute resolution communication or any communication provided in confidence to the neutral, unless: (1) All participants in the dispute resolution... reducing the confidence of participants in future cases that their communications will remain confidential...

  20. Financial Statement Math

    OpenAIRE

    2007-01-01

    game tool Game Tool Interactive Media Element The purpose of this interactive exercise is to help you understand the math in the income statement and balance sheet., Give the proper mathematical computations in order to correctly prepare the income statement and the balance sheet.The exercise is divided into 3 parts: The income Statement, The Balance Sheet - Assets, The Balance Sheet - Liabilities, GB3050 Financial Reporting and Analysis

  1. FORENSIC DNA BANKING LEGISLATION IN DEVELOPING COUNTRIES: PRIVACY AND CONFIDENTIALITY CONCERNS REGARDING A DRAFT FROM TURKISH LEGISLATION.

    Science.gov (United States)

    Ilgili, Önder; Arda, Berna

    This paper presents and analyses, in terms of privacy and confidentiality, the Turkish Draft Law on National DNA Database prepared in 2004, and concerning the use of DNA analysis for forensic objectives and identity verification in Turkey. After a short introduction including related concepts, we evaluate the draft law and provide articles about confidentiality. The evaluation reminded us of some important topics at international level for the developing countries. As a result, the need for sophisticated legislations about DNA databases, for solutions to issues related to the education of employees, and the technological dependency to other countries emerged as main challenges in terms of confidentiality for the developing countries. As seen in the Turkish Draft Law on National DNA Database, the protection of the fundamental rights and freedoms requires more care during the legislative efforts.

  2. Security, privacy, and confidentiality issues on the Internet

    OpenAIRE

    Kelly, Grant; McKenzie, Bruce

    2002-01-01

    We introduce the issues around protecting information about patients and related data sent via the Internet. We begin by reviewing three concepts necessary to any discussion about data security in a healthcare environment: privacy, confidentiality, and consent. We are giving some advice on how to protect local data. Authentication and privacy of e-mail via encryption is offered by Pretty Good Privacy (PGP) and Secure Multipurpose Internet Mail Extensions (S/MIME). The de facto Internet standa...

  3. 75 FR 56096 - Access to Confidential Business Information by Industrial Economics Incorporated

    Science.gov (United States)

    2010-09-15

    ... ENVIRONMENTAL PROTECTION AGENCY [EPA-HQ-OPPT-2003-0004; FRL-8845-1] Access to Confidential Business Information by Industrial Economics Incorporated AGENCY: Environmental Protection Agency (EPA). ACTION: Notice. SUMMARY: EPA has authorized contractor, Industrial Economics Incorporated (IEI) of...

  4. 45 CFR 60.15 - Confidentiality of National Practitioner Data Bank information.

    Science.gov (United States)

    2010-10-01

    ... 45 Public Welfare 1 2010-10-01 2010-10-01 false Confidentiality of National Practitioner Data Bank information. 60.15 Section 60.15 Public Welfare DEPARTMENT OF HEALTH AND HUMAN SERVICES GENERAL ADMINISTRATION NATIONAL PRACTITIONER DATA BANK FOR ADVERSE INFORMATION ON PHYSICIANS AND OTHER HEALTH CARE PRACTITIONERS...

  5. 19 CFR 201.19 - Notification regarding requests for confidential business information.

    Science.gov (United States)

    2010-04-01

    ... business information. 201.19 Section 201.19 Customs Duties UNITED STATES INTERNATIONAL TRADE COMMISSION GENERAL RULES OF GENERAL APPLICATION Availability of Information to the Public Pursuant to 5 U.S.C. 552 § 201.19 Notification regarding requests for confidential business information. (a) In general. Business...

  6. Conversion of invisible metal-organic frameworks to luminescent perovskite nanocrystals for confidential information encryption and decryption.

    Science.gov (United States)

    Zhang, Congyang; Wang, Bo; Li, Wanbin; Huang, Shouqiang; Kong, Long; Li, Zhichun; Li, Liang

    2017-10-31

    Traditional smart fluorescent materials, which have been attracting increasing interest for security protection, are usually visible under either ambient or UV light, making them adverse to the potential application of confidential information protection. Herein, we report an approach to realize confidential information protection and storage based on the conversion of lead-based metal-organic frameworks (MOFs) to luminescent perovskite nanocrystals (NCs). Owing to the invisible and controlled printable characteristics of lead-based MOFs, confidential information can be recorded and encrypted by MOF patterns, which cannot be read through common decryption methods. Through our conversion strategy, highly luminescent perovskite NCs can be formed quickly and simply by using a halide salt trigger that reacts with the MOF, thus promoting effective information decryption. Finally, through polar solvents impregnation and halide salt conversion, the luminescence of the perovskite NCs can be quenched and recovered, leading to reversible on/off switching of the luminescence signal for multiple information encryption and decryption processes.

  7. Biobanks in South Africa: A global perspective on privacy and confidentiality

    Directory of Open Access Journals (Sweden)

    Riaan Rheeder

    2017-05-01

    Full Text Available The Universal Declaration of Bioethics and Human Rights (UDBHR of the United Nations Educational, Scientific and Cultural Organization (UNESCO was adopted unanimously in 2005 by the world community as a universal guideline, according to which members of the global community were accountable to each other. Research results from UNESCO show that the UDBHR has had little or no impact in South Africa (SA. The primary objective of this article is to promote awareness of the UDBHR in SA and Africa by focusing on Article 9 of the Declaration, which accepts the right to privacy and confidentiality. For this objective to be relevant in the SA context, depends on whether the guidelines of the National Department of Health’s Ethics in Health Research: Principles, Processes and Structures of 2015 acknowledge biobanks of the universally accepted ethical guidelines on privacy and confidentiality of autonomous persons and whether these guidelines are broadly in accordance with global bioethical guidelines.

  8. 7 CFR 3052.310 - Financial statements.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 15 2010-01-01 2010-01-01 false Financial statements. 3052.310 Section 3052.310....310 Financial statements. (a) Financial statements. The auditee shall prepare financial statements... appropriate, cash flows for the fiscal year audited. The financial statements shall be for the same...

  9. 21 CFR 720.8 - Confidentiality of statements.

    Science.gov (United States)

    2010-04-01

    ... the ingredient is known outside petitioner's business; (2) The extent to which the identity of the ingredient is known by employees and others involved in petitioner's business; (3) The extent of measures... the identity of the claimed trade secret ingredient to the petitioner and to its competitors; (5) The...

  10. Preliminary statement on general policy for rulemaking to improve nuclear power plant licensing

    International Nuclear Information System (INIS)

    1978-11-01

    In June 1977 an NRC study group seeking to identify ways to improve the effectiveness of NRC nuclear power plant licensing procedures, recommended (among other measures) that rulemaking should be considered for the generic resolution of certain major issues that are presently litigated in individual licensing proceedings (NUREG--0292). In response to a Commission directive, the staff prepared an interim statement of general policy and plans for rulemaking, which the Commission approved for publication n the Federal Register at Affirmation Session 78-7 held on October 26, 1978. This interim policy statement fully supports Executive Order 12044 of March 23, 1978, requesting improvement of existing and future government regulations so as to be as simple and clear as possible and avoid imposing unnecessary burdens on the economy, on individuals, on public and private organizations, or on State and local governments. This NUREG publication includes the full text of the Federal Register notice published concurrently. Also provided are Enclosures A and B which contain more complete information than is presented in the FR notice regarding the selection and discussion of issues proposed by the staff for generic rulemaking. However, the discussion of issues avoids being overly specific about the likely outcome of rulemaking in order to stimulate creative public and industry comments as desirable inputs to shaping the ultimate form of generic rules

  11. 78 FR 54889 - Proposed Information Collection Request; Comment Request; Confidentiality Rules (Renewal)

    Science.gov (United States)

    2013-09-06

    ... received will be included in the public docket without change including any personal information provided, unless the comment includes profanity, threats, or information claimed to be Confidential Business... of appropriate automated electronic, mechanical, or other technological collection techniques or...

  12. The Psychological Competence of Police Officers in Confidential Cooperation with Citizens

    Science.gov (United States)

    Uspanov, Zholdybai T.; Turabayeva, Dana S.; Ermolovich, Vladimir F.

    2016-01-01

    This research studied the psychological aspects of citizens' assistance to law enforcement agencies on a confidential basis. The comprehensive observance of the psychological norms of cooperation is determined by the professional ethics of police officers, the necessity of nondisclosure of investigation secrets by citizens, and the security of the…

  13. 76 FR 69722 - Access to Confidential Business Information by Protection Strategies Incorporated

    Science.gov (United States)

    2011-11-09

    ... Business Information by Protection Strategies Incorporated AGENCY: Environmental Protection Agency (EPA... Control Act (TSCA) confidential business information and to provide notice that this contract has been extended until December 31, 2011. Protection Strategies Incorporated (PSI) has been the owner of Eagle...

  14. 7 CFR 1212.51 - Financial statements.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 10 2010-01-01 2010-01-01 false Financial statements. 1212.51 Section 1212.51... statements. (a) The Board shall prepare and submit financial statements to the Department on a periodic basis. Each such financial statement shall include, but not be limited to, a balance sheet, income statement...

  15. Have personal statements become impersonal? An evaluation of personal statements in anesthesiology residency applications.

    Science.gov (United States)

    Max, Bryan A; Gelfand, Brian; Brooks, Meredith R; Beckerly, Rena; Segal, Scott

    2010-08-01

    To evaluate personal statements submitted to a major academic anesthesiology program to determine the prevalence of common features and overall subjective quality, and to survey anesthesiology program directors as to how they utilized these statements during the resident selection process. Structured analysis of de-identified personal statements and Internet-based survey of program directors. Large academic anesthesiology training program. 670 applicant personal statements and academic anesthesiology program directors. Prevalence of 13 specific essay features and 8 quality ratings were calculated for the essays and correlated with other aspects of the residency application, as abstracted from the Electronic Residency Application Service (ERAS) files. A 6-question survey regarding use of personal statements was collected from program directors. 70 of 131 program directors queried responded to our survey. Interest in physiology and pharmacology, enjoyment of a hands-on specialty, and desire to comfort anxious patients were each mentioned in more than half of the essays. Candidates invited for an interview had essays that received higher quality ratings than essays of those not invited (P = 0.02 to P essay. Only 41% found the personal statement to be very or somewhat important in selecting candidates for interview invitations. However, over 90% stated that they used the statements during actual interviews with invited applicants. The data showed a high prevalence of common features found within personal statements and a general ambivalence amongst those program directors for whom the statements were intended. Copyright 2010 Elsevier Inc. All rights reserved.

  16. Anonymous or confidential HIV counseling and voluntary testing in federally funded testing sites--United States, 1995-1997.

    Science.gov (United States)

    1999-06-25

    Human immunodeficiency virus (HIV) counseling and voluntary testing (CT) programs have been an important part of national HIV prevention efforts since the first HIV antibody tests became available in 1985. In 1995, these programs accounted for approximately 15% of annual HIV antibody testing in the United States, excluding testing for blood donation. CT opportunities are offered to persons at risk for HIV infection at approximately 11,000 sites, including dedicated HIV CT sites, sexually transmitted disease (STD) clinics, drug-treatment centers, hospitals, and prisons. In 39 states, testing can be obtained anonymously, where persons do not have to give their name to get tested. All states provide confidential testing (by name) and have confidentiality laws and regulations to protect this information. This report compares patterns of anonymous and confidential testing in all federally funded CT programs from 1995 through 1997 and documents the importance of both types of testing opportunities.

  17. Reading and understanding financial statements.

    Science.gov (United States)

    White, Joseph P

    2005-01-01

    Feeling comfortable reading and understanding financial statements is critical to the success of healthcare executives and physicians involved in management. Businesses use three primary financial statements: a balance sheet represents the equation, Assets = Liabilities + Equity; an income statement represents the equation, Revenues - Expenses = Net Income; a statement of cash flows reports all sources and uses of cash during the represented period. The balance sheet expresses financial indicators at one particular moment in time, whereas the income statement and the statement of cash flows show activity that occurred over a stretch of time. Additional information is disclosed in attached footnotes and other supplementary materials. There are two ways to prepare financial statements. Cash-basis accounting recognizes revenue when it is received and expenses when they are paid. Accrual-basis accounting recognizes revenue when it is earned and expenses when they are incurred. Although cash-basis is acceptable, periodically using the accrual method reveals important information about receivables and liabilities that could otherwise remain hidden. Become more engaged with your financial statements by spending time reading them, tracking key performance indicators, and asking accountants and financial advisors questions. This will help you better understand your business and build a successful future.

  18. Environmental impact statements: new legal technique for environmental protection

    Energy Technology Data Exchange (ETDEWEB)

    Baldwin, M F

    1975-02-01

    The National Environmental Policy Act (NEPA) has required Federal agencies to re-examine all their programs affecting the environment, to consider alternative policies, to coordinate their actions with other agencies, and to disclose their environmental analyses to the public. In short, it has attempted to change decision processes markedly, in order to respond to wide-spread public concern about a deteriorating natural and human environment. The mandates of the policy are listed, but knowing that these were not sufficient to change existing agency practices, Congress established what has been called an ''action-forcing mechanism.'' Each federal agency must ''include in every recommendation or report on proposals for legislation and other major federal actions significantly affecting the quality of the human environment, a detailed statement by the responsible official.'' This statement must cover the following five points as specified in Section 102(2)(c): the environmental impact of the proposed action; any adverse environmental effects which cannot be avoided should the proposal be implemented; alternatives to the proposed action; the relationship between local and short-term uses of man's environment and the maintenance and enhancement of long-term productivity, and any irreversible and irretrievable commitments of resources which would be involved in the proposed action should it be implemented. Section 102 has been considered the heart of the National Environmental Policy Act. The specific five-point environmental report--known as an environmental impact statement--is the visible evidence of an agency's compliance with the environmental policy articulated by Congress. (MCW)

  19. 75 FR 44951 - Inquiry To Learn Whether Businesses Assert Business Confidentiality Claims

    Science.gov (United States)

    2010-07-30

    ... such treatment. Certain businesses, however, do not meet the definition of ``affected business,'' and... definition of ``affected business,'' and are not covered by today's notice. They consist of any business that... Businesses Assert Business Confidentiality Claims AGENCY: Environmental Protection Agency (EPA). ACTION...

  20. 76 FR 362 - Inquiry To Learn Whether Businesses Assert Business Confidentiality Claims

    Science.gov (United States)

    2011-01-04

    ... claims for such treatment. Certain businesses, however, do not meet the definition of ``affected business.... Certain businesses, however, do not meet the definition of ``affected business,'' and are not covered by... Businesses Assert Business Confidentiality Claims AGENCY: Environmental Protection Agency (EPA). ACTION...

  1. Scheduler-specific Confidentiality for Multi-Threaded Programs and Its Logic-Based Verification

    NARCIS (Netherlands)

    Huisman, Marieke; Ngo, Minh Tri

    2011-01-01

    Observational determinism has been proposed in the literature as a way to ensure confidentiality for multi-threaded programs. Intuitively, a program is observationally deterministic if the behavior of the public variables is deterministic, i.e., independent of the private variables and the

  2. 75 FR 55577 - Clean Water Act; Contractor Access to Confidential Business Information

    Science.gov (United States)

    2010-09-13

    ... ENVIRONMENTAL PROTECTION AGENCY [FRL-9200-8] Clean Water Act; Contractor Access to Confidential... Recovery Act (RCRA). Transfer of the information will allow the contractor and subcontractors to access... contractors and subcontractors over the history of the effluent guidelines program. EPA determined that this...

  3. 77 FR 60962 - Clean Water Act; Contractor Access to Confidential Business Information

    Science.gov (United States)

    2012-10-05

    ... ENVIRONMENTAL PROTECTION AGENCY 40 CFR Part 2 [FRL-9733-8] Clean Water Act; Contractor Access to... transfer of confidential business information to contractor, subcontractors, and consultants. SUMMARY: The... certain industries. We have determined that the contractors listed below require access [[Page 60963

  4. 75 FR 60452 - Clean Water Act; Contractor Access to Confidential Business Information

    Science.gov (United States)

    2010-09-30

    ... ENVIRONMENTAL PROTECTION AGENCY [FRL-9208-9] Clean Water Act; Contractor Access to Confidential... electric industry to a new subcontractor of a contractor, Eastern Research Group (ERG). EPA previously... contractors and subcontractors to access information necessary to support EPA in the planning, development...

  5. Contributory factors in surgical incidents as delineated by a confidential reporting system.

    Science.gov (United States)

    Mushtaq, F; O'Driscoll, C; Smith, Fct; Wilkins, D; Kapur, N; Lawton, R

    2018-05-01

    Background Confidential reporting systems play a key role in capturing information about adverse surgical events. However, the value of these systems is limited if the reports that are generated are not subjected to systematic analysis. The aim of this study was to provide the first systematic analysis of data from a novel surgical confidential reporting system to delineate contributory factors in surgical incidents and document lessons that can be learned. Methods One-hundred and forty-five patient safety incidents submitted to the UK Confidential Reporting System for Surgery over a 10-year period were analysed using an adapted version of the empirically-grounded Yorkshire Contributory Factors Framework. Results The most common factors identified as contributing to reported surgical incidents were cognitive limitations (30.09%), communication failures (16.11%) and a lack of adherence to established policies and procedures (8.81%). The analysis also revealed that adverse events were only rarely related to an isolated, single factor (20.71%) - with the majority of cases involving multiple contributory factors (79.29% of all cases had more than one contributory factor). Examination of active failures - those closest in time and space to the adverse event - pointed to frequent coupling with latent, systems-related contributory factors. Conclusions Specific patterns of errors often underlie surgical adverse events and may therefore be amenable to targeted intervention, including particular forms of training. The findings in this paper confirm the view that surgical errors tend to be multi-factorial in nature, which also necessitates a multi-disciplinary and system-wide approach to bringing about improvements.

  6. Quantum key based burst confidentiality in optical burst switched networks.

    Science.gov (United States)

    Balamurugan, A M; Sivasubramanian, A

    2014-01-01

    The optical burst switching (OBS) is an emergent result to the technology concern that could achieve a feasible network in future. They are endowed with the ability to meet the bandwidth requirement of those applications that require intensive bandwidth. There are more domains opening up in the OBS that evidently shows their advantages and their capability to face the future network traffic. However, the concept of OBS is still far from perfection facing issues in case of security threat. The transfer of optical switching paradigm to optical burst switching faces serious downfall in the fields of burst aggregation, routing, authentication, dispute resolution, and quality of service (QoS). This paper deals with employing RC4 (stream cipher) to encrypt and decrypt bursts thereby ensuring the confidentiality of the burst. Although the use of AES algorithm has already been proposed for the same issue, by contrasting the two algorithms under the parameters of burst encryption and decryption time, end-to-end delay, it was found that RC4 provided better results. This paper looks to provide a better solution for the confidentiality of the burst in OBS networks.

  7. Quantum Key Based Burst Confidentiality in Optical Burst Switched Networks

    Directory of Open Access Journals (Sweden)

    A. M. Balamurugan

    2014-01-01

    Full Text Available The optical burst switching (OBS is an emergent result to the technology concern that could achieve a feasible network in future. They are endowed with the ability to meet the bandwidth requirement of those applications that require intensive bandwidth. There are more domains opening up in the OBS that evidently shows their advantages and their capability to face the future network traffic. However, the concept of OBS is still far from perfection facing issues in case of security threat. The transfer of optical switching paradigm to optical burst switching faces serious downfall in the fields of burst aggregation, routing, authentication, dispute resolution, and quality of service (QoS. This paper deals with employing RC4 (stream cipher to encrypt and decrypt bursts thereby ensuring the confidentiality of the burst. Although the use of AES algorithm has already been proposed for the same issue, by contrasting the two algorithms under the parameters of burst encryption and decryption time, end-to-end delay, it was found that RC4 provided better results. This paper looks to provide a better solution for the confidentiality of the burst in OBS networks.

  8. A Systematic Review on Confidentiality, Disclosure, and Stigma in the United States: Lessons for HIV Care in Pregnancy From Reproductive Genetics.

    Science.gov (United States)

    Wilkinson, Barbara; Arora, Kavita Shah

    2015-01-01

    The fields of HIV care in pregnancy and reproductive genetics have always been 'exceptional' in that patients are highly concerned about the potential for stigma and the corresponding need for privacy and confidentiality. However, the two fields have diverged in how they have addressed these concerns. The systematic review analyzed 61 manuscripts for similarities and differences between the fields of HIV care in pregnancy and reproductive genetics in the United States, with respect to privacy, confidentiality, disclosure, and stigma. The systematic review revealed that the field of HIV care in pregnancy has insufficiently addressed patient concerns about privacy, confidentiality, and stigma compared to the field of reproductive genetics. Failure to adequately protect confidentiality of HIV-positive patients, and failure to reduce stigma associated with HIV testing and treatment are deficiencies in the delivery of care to HIV-positive pregnant woman and barriers to reducing vertical transmission of HIV. Improvements in care and policy should mirror the field of reproductive genetics.

  9. CONSOLIDATED FINANCIAL STATEMENTS UNDER IFRS

    OpenAIRE

    Tănase Alin-Eliodor; Calotă Traian-Ovidiu

    2013-01-01

    This article is focuses on accounting consolidation techniques and the preparation of consolidation worksheets for the components of financial statements (statement of comprehensive income, statement of changes in equity, and financial position). The presented group includes parent company, two subsidiaries (only one fully controlled by the parent company) and a jointly controlled entity. The financial statements are presented under the following standards IFRS 3 Business Combination, IAS 27 ...

  10. Gossip, stories and friendship: confidentiality in midwifery practice.

    Science.gov (United States)

    James, S

    1995-12-01

    Women often seek midwifery care as an alternative to the maternity services that are readily available within the insured health care system in Alberta. Some aspects of community-based, primary care midwifery in Alberta that characterize this alternative are the use of story-telling as a form of knowledge, the development of social connections among women seeking midwifery care, and nonauthoritarian relationships between midwives and women. In this paper, the concept of confidentiality, as it relates to these aspects of midwifery practice, is explored, using traditional, caring and feminist models of ethics.

  11. 75 FR 4812 - Inquiry To Learn Whether Businesses Assert Business Confidentiality Claims

    Science.gov (United States)

    2010-01-29

    ..., however, do not meet the definition of ``affected business,'' and are not covered by today's notice. They.... Certain businesses, however, do not meet the definition of ``affected business,'' and are not covered by... Businesses Assert Business Confidentiality Claims AGENCY: Environmental Protection Agency (EPA). ACTION...

  12. 78 FR 79692 - Clean Water Act; Contractor Access to Confidential Business Information

    Science.gov (United States)

    2013-12-31

    ... ENVIRONMENTAL PROTECTION AGENCY [FRL-9904-94-OW] Clean Water Act; Contractor Access to... Transfer of Confidential Business Information to Contractor, Subcontractors, and Consultants. SUMMARY: The... contractors listed below require access to CBI submitted to EPA under Section 308 of the Clean Water Act (CWA...

  13. 5 CFR 213.3301 - Positions of a confidential or policy-determining nature.

    Science.gov (United States)

    2010-01-01

    ... 5 Administrative Personnel 1 2010-01-01 2010-01-01 false Positions of a confidential or policy-determining nature. 213.3301 Section 213.3301 Administrative Personnel OFFICE OF PERSONNEL MANAGEMENT CIVIL... or policy-determining nature. (a) Upon specific authorization by OPM, agencies may make appointments...

  14. Using and Disclosing Confidential Patient Information and The English Common Law: What are the Information Requirements of a Valid Consent?

    Science.gov (United States)

    Chico, Victoria; Taylor, Mark J

    2018-02-01

    The National Health Service in England and Wales is dependent upon the flow of confidential patient data. In the context of consent to the use of patient health data, insistence on the requirements of an 'informed' consent that are difficult to achieve will drive reliance on alternatives to consent. Here we argue that one can obtain a valid consent to the disclosure of confidential patient data, such that this disclosure would not amount to a breach of the common law duty of confidentiality, having provided less information than would typically be associated with an 'informed consent'. This position protects consent as a practicable legal basis for disclosure from debilitating uncertainty or impracticability and, perhaps counter-intuitively, promotes patient autonomy.

  15. DLP: REDUCED RISK OF LEAKAGE OF CONFIDENTIAL INFORMATION OF THE BANK

    Directory of Open Access Journals (Sweden)

    T. A. Andryianava

    2017-01-01

    Full Text Available Research application of DLP-system for protection of confidential information, a methodology for adapting the DLP-system to the specific activities of the organization, comparative analysis of the results of standard and adapted DLP-systems in the Bank. Developed: a technique for analyzing information security events, algorithm for responding to identified events, methodology and procedures for adapting the standard DLP-system to the specifics of the Bank’s activities. The methodology for adapting a standard DLP-system to the specifics of the Bank’s work consists of the following activities: identification of critical corporate information categories, audit of information systems, description of current risks and their assessment, introduction of rules for Bank’s critical information and setting up a DLP system in accordance with the specifics of the Bank’s work. Modernization of the configuration of a standard DLP-system includes the following procedures: selection of confidential information of the Bank based on membership criteria, setting up detection, creating perimeters and developing an algorithm for responding to identified information security events in the Bank. The algorithm is designed to improve the efficiency of the response of information security officers in cases of incident detection and describes the stages of the subsequent actions. The results of the research prove that using an adapted DLP-system significantly reduces the number of false positives, increasing the accuracy of detecting confidential information and reducing the risk of leakage of critical information outside the corporate network. The application of the adapted DLP-system in the Bank allowed to increase the speed of response of information security specialists to the information security events detected by the DLP-system adapted to the Bank, and also allowed the DLP-system to transition from the copy mode to the blocking mode of illegitimate transfer

  16. Law on consent and confidentiality in India: a need for clarity.

    Science.gov (United States)

    Mathiharan, Karunakaran

    2014-01-01

    The concept of informed consent specific to medical research and treatment is still alien to many medical researchers and practitioners and to millions of Indians. The doctor-patient relationship in India is governed more by trust where the doctor is the authoritative person. Therefore, the benefit of informed consent does not reach all patients in day-to-day medical practice. To complicate the issue, the Indian law is not specific about the age at which a person can give valid consent. The Indian Penal Code is silent about the legal validity of consent given by persons between 12 and 18 years of age. Similarly, the age at which the 'Right to Confidentiality' begins is yet to be defined either by the statute or by the courts. Hence, there is a need for a clear statutory provision to remove the anomalies and ambiguities regarding the age of consent to undergo invasive therapeutic or investigative procedures, participate in clinical trials, as well as define the age at which a person's right to medical confidentiality begins.

  17. Confidentiality Concerns and Sexual and Reproductive Health Care Among Adolescents and Young Adults Aged 15-25.

    Science.gov (United States)

    Copen, Casey E; Dittus, Patricia J; Leichliter, Jami S

    2016-12-01

    Data from the National Survey of Family Growth •About 7% of persons aged 15-25 would not seek sexual or reproductive health care because of concerns that their parents might find out about it. •For females aged 15-17 and 18-25, those who had confidentiality concerns were less likely to receive sexual and reproductive health services in the past year compared with those without these concerns. •Less than one-half of teenagers aged 15-17 (38.1%) spent some time alone in the past year during a visit with a doctor or other health care provider without a parent, relative, or guardian in the room. •Teenagers aged 15-17 who spent some time alone during a visit with a health care provider were more likely to have received sexual or reproductive health services in the past year compared with those who had not. Confidentiality concerns can impact adolescent and young adults' access to sexual and reproductive health services (1-4). Young people who are covered by their parents' private health insurance may be deterred from obtaining these services due to concerns that their parents might find out about it (2). Similarly, confidentiality concerns may arise because youth seeking such services may not have time alone during a visit with a health care provider (4). This report describes two measures related to confidentiality concerns and sexual and reproductive health care. All material appearing in this report is in the public domain and may be reproduced or copied without permission; citation as to source, however, is appreciated.

  18. 38 CFR 41.310 - Financial statements.

    Science.gov (United States)

    2010-07-01

    ... 38 Pensions, Bonuses, and Veterans' Relief 2 2010-07-01 2010-07-01 false Financial statements. 41...) AUDITS OF STATES, LOCAL GOVERNMENTS, AND NON-PROFIT ORGANIZATIONS Auditees § 41.310 Financial statements. (a) Financial statements. The auditee shall prepare financial statements that reflect its financial...

  19. 40 CFR 165.70 - Refillers who are not registrants.

    Science.gov (United States)

    2010-07-01

    ... statement of formula that is required under FIFRA section 3. (e) What requirements must I follow regarding..., significant reduction in material thickness, metal fatigue, damaged threads or closures, or other significant... repackaged to differ from the composition described in its confidential statement of formula that is required...

  20. Assessing subject privacy and data confidentiality in an emerging region for clinical trials: United Arab Emirates.

    Science.gov (United States)

    Nair, Satish Chandrasekhar; Ibrahim, Halah

    2015-01-01

    Pharmaceutical sponsored clinical trials, formerly conducted predominantly in the United States and Europe, have expanded to emerging regions, including the Middle East. Our study explores factors influencing clinical trial privacy and confidentiality in the United Arab Emirates. Factors including concept familiarity, informed consent compliance, data access, and preservation, were analyzed to assess current practices in the Arab world. As the UAE is an emerging region for clinical trials, there is a growing need for regulations related to data confidentiality and subject privacy. Informational and decisional privacy should be viewed within the realms of Arab culture and religious background.

  1. Ethical aspects in tissue research: thematic analysis of ethical statements to the research ethics committee

    Science.gov (United States)

    2012-01-01

    Background Many studies have been published about ethics committees and the clarifications requested about the submitted applications. In Finland, ethics committees require a separate statement on ethical aspects of the research in applications to the ethics committee. However, little is known about how researchers consider the ethical aspects of their own studies. Methods The data were collected from all the applications received by the official regional ethics committee in the Hospital District of Northern Savo during 2004–2009 (n = 688). These included a total of 56 studies involving research on tissue other than blood. The statements by the researchers about the ethics about their own research in these applications were analyzed by thematic content analysis under the following themes: recruitment, informed consent, risks and benefits, confidentiality and societal meaning. Results The researchers tended to describe recruitment and informed consent process very briefly. Usually these descriptions simply stated who the recruiter was and that written consent would be required. There was little information provided on the recruitment situation and on how the study recruiters would be informed. Although most of the studies were clinical, the possibility was hardly ever discussed that patients could fail to distinguish between care and research. Conclusion The written guidelines, available on the webpages of the ethics committee, do not seem to be enough to help researchers achieve this goal. In addition to detailed guidelines for researchers, investigators need to be taught to appreciate the ethical aspects in their own studies. PMID:22873761

  2. 7 CFR 1206.41 - Financial statements.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 10 2010-01-01 2010-01-01 false Financial statements. 1206.41 Section 1206.41... Financial statements. (a) As requested by the Department, the Board shall prepare and submit financial statements to the Department on a periodic basis. Each such financial statement shall include, but not be...

  3. 78 FR 50118 - Policy Statement on Adequacy and Compatibility of Agreement State Programs; Statement of...

    Science.gov (United States)

    2013-08-16

    ... NUCLEAR REGULATORY COMMISSION [NRC-2013-0081] Policy Statement on Adequacy and Compatibility of Agreement State Programs; Statement of Principles and Policy for the Agreement State Program AGENCY: Nuclear Regulatory Commission. ACTION: Policy statements; extension of comment period. SUMMARY: The U.S. Nuclear...

  4. 7 CFR 1218.51 - Financial statements.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 10 2010-01-01 2010-01-01 false Financial statements. 1218.51 Section 1218.51... § 1218.51 Financial statements. (a) As requested by the Secretary, the Council shall prepare and submit financial statements to the Secretary on a periodic basis. Each such financial statement shall include, but...

  5. 42 CFR 2.2 - Statutory authority for confidentiality of alcohol abuse patient records.

    Science.gov (United States)

    2010-10-01

    ... HUMAN SERVICES GENERAL PROVISIONS CONFIDENTIALITY OF ALCOHOL AND DRUG ABUSE PATIENT RECORDS Introduction.... (B) To qualified personnel for the purpose of conducting scientific research, management audits, financial audits, or program evaluation, but such personnel may not identify, directly or indirectly, any...

  6. Objectives of Financial Statements. Report of the Study Group on the Objectives of Financial Statements.

    Science.gov (United States)

    American Inst. of Certified Public Accountants, New York, NY.

    This report discusses the objectives of financial statements. Emphasis is placed on the function of objectives; users, their goals, and their information needs; the primary enterprise goal and earning power; accountability and financial statements; financial statements--reporting on the goal attainment of business enterprises; financial…

  7. Teaching Philosophy Statements

    Science.gov (United States)

    Faryadi, Qais

    2015-01-01

    This article examines the rationale for my teaching philosophy. Using a personal perspective, I explain my objectives, mission, and vision in writing my philosophy of teaching statements. This article also creates a road map and reference points for educators who want to write their own teaching philosophy statements to help them make informed…

  8. Spatial confidentiality and GIS: re-engineering mortality locations from published maps about Hurricane Katrina

    Directory of Open Access Journals (Sweden)

    Leitner Michael

    2006-10-01

    Full Text Available Abstract Background Geographic Information Systems (GIS can provide valuable insight into patterns of human activity. Online spatial display applications, such as Google Earth, can democratise this information by disseminating it to the general public. Although this is a generally positive advance for society, there is a legitimate concern involving the disclosure of confidential information through spatial display. Although guidelines exist for aggregated data, little has been written concerning the display of point level information. The concern is that a map containing points representing cases of cancer or an infectious disease, could be re-engineered back to identify an actual residence. This risk is investigated using point mortality locations from Hurricane Katrina re-engineered from a map published in the Baton Rouge Advocate newspaper, and a field team validating these residences using search and rescue building markings. Results We show that the residence of an individual, visualized as a generalized point covering approximately one and half city blocks on a map, can be re-engineered back to identify the actual house location, or at least a close neighbour, even if the map contains little spatial reference information. The degree of re-engineering success is also shown to depend on the urban characteristic of the neighborhood. Conclusion The results in this paper suggest a need to re-evaluate current guidelines for the display of point (address level data. Examples of other point maps displaying health data extracted from the academic literature are presented where a similar re-engineering approach might cause concern with respect to violating confidentiality. More research is also needed into the role urban structure plays in the accuracy of re-engineering. We suggest that health and spatial scientists should be proactive and suggest a series of point level spatial confidentiality guidelines before governmental decisions are made

  9. Spatial confidentiality and GIS: re-engineering mortality locations from published maps about Hurricane Katrina.

    Science.gov (United States)

    Curtis, Andrew J; Mills, Jacqueline W; Leitner, Michael

    2006-10-10

    Geographic Information Systems (GIS) can provide valuable insight into patterns of human activity. Online spatial display applications, such as Google Earth, can democratise this information by disseminating it to the general public. Although this is a generally positive advance for society, there is a legitimate concern involving the disclosure of confidential information through spatial display. Although guidelines exist for aggregated data, little has been written concerning the display of point level information. The concern is that a map containing points representing cases of cancer or an infectious disease, could be re-engineered back to identify an actual residence. This risk is investigated using point mortality locations from Hurricane Katrina re-engineered from a map published in the Baton Rouge Advocate newspaper, and a field team validating these residences using search and rescue building markings. We show that the residence of an individual, visualized as a generalized point covering approximately one and half city blocks on a map, can be re-engineered back to identify the actual house location, or at least a close neighbour, even if the map contains little spatial reference information. The degree of re-engineering success is also shown to depend on the urban characteristic of the neighborhood. The results in this paper suggest a need to re-evaluate current guidelines for the display of point (address level) data. Examples of other point maps displaying health data extracted from the academic literature are presented where a similar re-engineering approach might cause concern with respect to violating confidentiality. More research is also needed into the role urban structure plays in the accuracy of re-engineering. We suggest that health and spatial scientists should be proactive and suggest a series of point level spatial confidentiality guidelines before governmental decisions are made which may be reactionary toward the threat of revealing

  10. Combined model of 9x9 playfair and RSA for securing confidential ...

    African Journals Online (AJOL)

    Combined model of 9x9 playfair and RSA for securing confidential information. Y.B. Zakariyau, L.J. Muhammad, A.M. Usman, A Garba. Abstract. No Abstract. Keywords: Cryptography, RSA, Playfair Cipher, Public and Secret Key. Full Text: EMAIL FULL TEXT EMAIL FULL TEXT · DOWNLOAD FULL TEXT DOWNLOAD FULL ...

  11. Research Participants' Understanding of and Reactions to Certificates of Confidentiality.

    Science.gov (United States)

    Beskow, Laura M; Check, Devon K; Ammarell, Natalie

    2014-01-01

    Certificates of Confidentiality are intended to facilitate participation in critical public health research by protecting against forced disclosure of identifying data in legal proceedings, but little is known about the effect of Certificate descriptions in consent forms. To gain preliminary insights, we conducted qualitative interviews with 50 HIV-positive individuals in Durham, North Carolina to explore their subjective understanding of Certificate descriptions and whether their reactions differed based on receiving a standard versus simplified description. Most interviewees were neither reassured nor alarmed by Certificate information, and most said it would not influence their willingness to participate or provide truthful information. However, compared with those receiving the simplified description, more who read the standard description said it raised new concerns, that their likelihood of participating would be lower, and that they might be less forthcoming. Most interviewees said they found the Certificate description clear, but standard-group participants often found particular words and phrases confusing, while simplified-group participants more often questioned the information's substance. Valid informed consent requires comprehension and voluntariness. Our findings highlight the importance of developing consent descriptions of Certificates and other confidentiality protections that are simple and accurate. These qualitative results provide rich detail to inform a larger, quantitative study that would permit further rigorous comparisons.

  12. 78 FR 68161 - Greenhouse Gas Reporting Program: Final Amendments and Confidentiality Determinations for...

    Science.gov (United States)

    2013-11-13

    ... 98 Greenhouse Gas Reporting Program: Final Amendments and Confidentiality Determinations for...-HQ-OAR-2011-0028; FRL-9845-6] RIN 2060-AR61 Greenhouse Gas Reporting Program: Final Amendments and... monitoring methodologies for electronics manufacturers covered by the Greenhouse Gas Reporting Rule. These...

  13. 12 CFR 261.20 - Confidential supervisory information made available to supervised financial institutions and...

    Science.gov (United States)

    2010-01-01

    ... available to supervised financial institutions and financial institution supervisory agencies. 261.20... Supervised Institutions, Financial Institution Supervisory Agencies, Law Enforcement Agencies, and Others in... institutions and financial institution supervisory agencies. (a) Disclosure of confidential supervisory...

  14. Teaching Confidentiality through Comics at One Spanish Medical School.

    Science.gov (United States)

    Lalanda, Mónica; Altisent, Rogelio; Delgado-Marroquín, Maria Teresa

    2018-02-01

    At the University of Zaragoza in Spain we developed an innovative way to teach the concept of confidentiality to medical students, which we tested by comparing the use of customized comics with more traditional methods. We proved that using comics is more attractive to students than lectures and class discussions, that it increases class participation and students' self-awareness of learning, and that it maintains the same academic results. We share our experience visually in a two-page comic. © 2018 American Medical Association. All Rights Reserved.

  15. Prior Learning of Relevant Nonaversive Information Is a Boundary Condition for Avoidance Memory Reconsolidation in the Rat Hippocampus.

    Science.gov (United States)

    Radiske, Andressa; Gonzalez, Maria Carolina; Conde-Ocazionez, Sergio A; Feitosa, Anatildes; Köhler, Cristiano A; Bevilaqua, Lia R; Cammarota, Martín

    2017-10-04

    Reactivated memories can be modified during reconsolidation, making this process a potential therapeutic target for posttraumatic stress disorder (PTSD), a mental illness characterized by the recurring avoidance of situations that evoke trauma-related fears. However, avoidance memory reconsolidation depends on a set of still loosely defined boundary conditions, limiting the translational value of basic research. In particular, the involvement of the hippocampus in fear-motivated avoidance memory reconsolidation remains controversial. Combining behavioral and electrophysiological analyses in male Wistar rats, we found that previous learning of relevant nonaversive information is essential to elicit the participation of the hippocampus in avoidance memory reconsolidation, which is associated with an increase in theta- and gamma-oscillation power and cross-frequency coupling in dorsal CA1 during reactivation of the avoidance response. Our results indicate that the hippocampus is involved in memory reconsolidation only when reactivation results in contradictory representations regarding the consequences of avoidance and suggest that robust nesting of hippocampal theta-gamma rhythms at the time of retrieval is a specific reconsolidation marker. SIGNIFICANCE STATEMENT Posttraumatic stress disorder (PTSD) is characterized by maladaptive avoidance responses to stimuli or behaviors that represent or bear resemblance to some aspect of a traumatic experience. Disruption of reconsolidation, the process by which reactivated memories become susceptible to modifications, is a promising approach for treating PTSD patients. However, much of what is known about fear-motivated avoidance memory reconsolidation derives from studies based on fear conditioning instead of avoidance-learning paradigms. Using a step-down inhibitory avoidance task in rats, we found that the hippocampus is involved in memory reconsolidation only when the animals acquired the avoidance response in an

  16. To Tell, or Not to Tell; Confidentiality in an Iranian HIV Positive Patient: A Viewpoint

    Directory of Open Access Journals (Sweden)

    Mahshad Noroozi

    2017-08-01

    Full Text Available Confidentiality is a basic concept in medical ethics and protecting confidentiality is considered as physicians’ duty. In some occasions, this protection is in conflict with the right of the patient’s sexual partner, who should be informed about the possibility of being infected. The sexual partner being pregnant, the situation is going to be more complicated. In this paper, we present a case discussion with special ethical, legal, social, cultural, and religious aspects. According to this informing sexual partner with the patient’s assent, opt-out Human immunodeficiency virus (HIV screening in pregnant women and enhancing psychosocial and family support are highly recommended. Strategic changes in health system policies and regulations seem to be necessary as well.

  17. Fundamentals of Financial Statements Audit

    OpenAIRE

    World Bank

    2011-01-01

    The purpose of an audit is to enhance the degree of confidence of intended users in the financial statements. The objective of an audit of financial statements is to enable an auditor to express an opinion as to whether the financial statements are prepared, in all material respects, in accordance with International Financial Reporting Standards or another identified financial reporting fr...

  18. 45 CFR 61.14 - Confidentiality of Healthcare Integrity and Protection Data Bank information.

    Science.gov (United States)

    2010-10-01

    ... 45 Public Welfare 1 2010-10-01 2010-10-01 false Confidentiality of Healthcare Integrity and Protection Data Bank information. 61.14 Section 61.14 Public Welfare DEPARTMENT OF HEALTH AND HUMAN SERVICES GENERAL ADMINISTRATION HEALTHCARE INTEGRITY AND PROTECTION DATA BANK FOR FINAL ADVERSE INFORMATION ON...

  19. 75 FR 46948 - Medicare Program; Listening Session Regarding Confidential Feedback Reports and the...

    Science.gov (United States)

    2010-08-04

    ...] Medicare Program; Listening Session Regarding Confidential Feedback Reports and the Implementation of a... Services (CMS), HHS. ACTION: Notice of meeting. SUMMARY: This notice announces a listening session being... modifier to the fee- for-service physician fee schedule. The purpose of the listening session is to solicit...

  20. 78 FR 69337 - Greenhouse Gas Reporting Program: Amendments and Confidentiality Determinations for Fluorinated...

    Science.gov (United States)

    2013-11-19

    ...-AR78 Greenhouse Gas Reporting Program: Amendments and Confidentiality Determinations for Fluorinated... Greenhouse Gas Reporting Rule. The proposed changes would reduce the level of detail in which emissions were..., please go to the Greenhouse Gas Reporting Rule Program Web site at http://www.epa.gov/climatechange...

  1. 17 CFR 250.28 - Inconsistent financial statements.

    Science.gov (United States)

    2010-04-01

    ... Accounts § 250.28 Inconsistent financial statements. Except as otherwise authorized or required by the..., financial statements which are inconsistent with the book accounts of such company or financial statements... prevent the distribution or publication of reasonable condensations or of unaudited financial statements...

  2. Meaning of counterfactual statements in quantum physics

    International Nuclear Information System (INIS)

    Stapp, H.P.

    1998-01-01

    David Mermin suggests that my recent proof pertaining to quantum nonlocality is undermined by an essential ambiguity pertaining to the meaning of counterfactual statements in quantum physics. The ambiguity he cites arises from his imposition of a certain criterion for the meaningfulness of such counterfactual statements. That criterion conflates the meaning of a counterfactual statement with the details of a proof of its validity in such a way as to make the meaning of such a statement dependent upon the context in which it occurs. That dependence violates the normal demand in logic that the meaning of a statement be defined by the words in the statement itself, not by the context in which the statement occurs. My proof conforms to that normal requirement. I describe the context-independent meaning within my proof of the counterfactual statements in question. copyright 1998 American Association of Physics Teachers

  3. Enhanced Obfuscation Technique for Data Confidentiality in Public Cloud Storage

    OpenAIRE

    Oli S. Arul; Arockiam L.

    2016-01-01

    With an advent of cloud computing, data storage has become a boon in information technology. At the same time, data storage in remote places have become important issues. Lot of techniques are available to ensure protection of data confidentiality. These techniques do not completely serve the purpose in protecting data. The Obfuscation techniques come to rescue for protecting data from malicious attacks. This paper proposes an obfuscation technique to encrypt the desired data type on the clou...

  4. 48 CFR 52.247-6 - Financial Statement.

    Science.gov (United States)

    2010-10-01

    ... 48 Federal Acquisition Regulations System 2 2010-10-01 2010-10-01 false Financial Statement. 52....247-6 Financial Statement. As prescribed in 47.207-1(e), insert the following provision in... furnish financial statements: Financial Statement (APR 1984) The offeror shall, upon request, promptly...

  5. 75 FR 78238 - Access to Confidential Business Information by Science Applications International Corporation and...

    Science.gov (United States)

    2010-12-15

    ... Business Information by Science Applications International Corporation and Its Identified Subcontractors..., Science Applications International Corporation (SAIC) of San Diego, CA, and Its Identified Subcontractors... Control Act (TSCA). Some of the information may be claimed or determined to be Confidential Business...

  6. 77 FR 76028 - Access to Confidential Business Information by Science Applications International Corporation and...

    Science.gov (United States)

    2012-12-26

    ... Business Information by Science Applications International Corporation and Its Identified Subcontractor...: EPA has authorized its contractor, Science Applications International Corporation (SAIC) of McLean, VA... information may be claimed or determined to be Confidential Business Information (CBI). DATES: Access to the...

  7. 78 FR 66697 - Access to Confidential Business Information by Science Applications International Corporation and...

    Science.gov (United States)

    2013-11-06

    ... Business Information by Science Applications International Corporation and Its Identified Subcontractors..., Science Applications International Corporation (SAIC) of McLean, VA, and its subcontractors to access...). Some of the information may have been claimed or determined to be Confidential Business Information...

  8. 32 CFR 651.23 - Environmental impact statement.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 4 2010-07-01 2010-07-01 true Environmental impact statement. 651.23 Section...) ENVIRONMENTAL QUALITY ENVIRONMENTAL ANALYSIS OF ARMY ACTIONS (AR 200-2) Records and Documents § 651.23 Environmental impact statement. An Environmental Impact statement (EIS) is a detailed written statement required...

  9. 46 CFR 504.7 - Environmental impact statements.

    Science.gov (United States)

    2010-10-01

    ... 46 Shipping 9 2010-10-01 2010-10-01 false Environmental impact statements. 504.7 Section 504.7... POLICY ANALYSIS § 504.7 Environmental impact statements. (a) General. (1) An environmental impact... environmental impact statements. (1) A draft environmental impact statement (DEIS) will initially be prepared in...

  10. 22 CFR 216.7 - Environmental impact statements.

    Science.gov (United States)

    2010-04-01

    ... 22 Foreign Relations 1 2010-04-01 2010-04-01 false Environmental impact statements. 216.7 Section... Environmental impact statements. (a) Applicability. An Environmental Impact Statement shall be prepared when... Environmental Impact Statement relating to paragraph (a)(2) of this section shall comply with the CEQ...

  11. Environmental impact statement law and environmental impact statement administration regulation

    International Nuclear Information System (INIS)

    Feldmann, F.J.

    1991-01-01

    The contribution does not deal with the question - as might be suggested by the heading - that the execution of the environmental impact statement law might be uncertain if there are no further accompanying legal transformatory acts. Putting the environmental impact statements into action is concerned in partiuclar with procedural provisions regarding the Federal Act on Protection against Nuisances and the Atomic Energy Act. The author deals with aspects of the environmental impact statement law and the state-of-the-art achieved so far. He also deals with legislative intent, with further points of putting the law into practice, i.e. the information requirements in the administrative provisions and the integrating aspect, the amalgamating aspect, the requirements made on the state of the environment, and the significance of administrative provisions. Also treated are legal procedures in the Federal Laender and on an international level. (RST) [de

  12. COMPARATIVE FINANCIAL STATEMENTS. CONVERGENCE VERSUS DIVERGENCE

    Directory of Open Access Journals (Sweden)

    Nicolae ECOBICI

    2010-09-01

    Full Text Available In this paper I compared the Romanian financial statements with the US GAAP financial statements in terms of two criteria: first the reference period and secondly the shape, structure and content of financial statements. Nowadays the two accounting systems, the French and Anglo-Saxon, tend to harmonize. I will present the convergences and the divergences between the financial statements of Romania, subject to OMFP 3055/2009, in parallel with the Anglo-Saxon accounting system.

  13. GASB Statement No. 3 Guides Deposits, Investments.

    Science.gov (United States)

    Barker, Linda A.

    1986-01-01

    Discusses an April 1986 Governmental Accounting Standards Board statement concerning disclosures of repurchase and reverse repurchase agreements. The statement tries to help financial statement users assess the risks a goverment entity takes when investing public funds. It is effective for financial statement periods ending after December 15,…

  14. 42 CFR 460.208 - Financial statements.

    Science.gov (United States)

    2010-10-01

    ... 42 Public Health 4 2010-10-01 2010-10-01 false Financial statements. 460.208 Section 460.208... ELDERLY (PACE) Data Collection, Record Maintenance, and Reporting § 460.208 Financial statements. (a... must submit a certified financial statement that includes appropriate footnotes. (2) The financial...

  15. Position Statement on Active Outdoor Play

    Science.gov (United States)

    Tremblay, Mark S.; Gray, Casey; Babcock, Shawna; Barnes, Joel; Costas Bradstreet, Christa; Carr, Dawn; Chabot, Guylaine; Choquette, Louise; Chorney, David; Collyer, Cam; Herrington, Susan; Janson, Katherine; Janssen, Ian; Larouche, Richard; Pickett, William; Power, Marlene; Sandseter, Ellen Beate Hansen; Simon, Brenda; Brussoni, Mariana

    2015-01-01

    A diverse, cross-sectorial group of partners, stakeholders and researchers, collaborated to develop an evidence-informed Position Statement on active outdoor play for children aged 3–12 years. The Position Statement was created in response to practitioner, academic, legal, insurance and public debate, dialogue and disagreement on the relative benefits and harms of active (including risky) outdoor play. The Position Statement development process was informed by two systematic reviews, a critical appraisal of the current literature and existing position statements, engagement of research experts (N = 9) and cross-sectorial individuals/organizations (N = 17), and an extensive stakeholder consultation process (N = 1908). More than 95% of the stakeholders consulted strongly agreed or somewhat agreed with the Position Statement; 14/17 participating individuals/organizations endorsed it; and over 1000 additional individuals and organizations requested their name be listed as a supporter. The final Position Statement on Active Outdoor Play states: “Access to active play in nature and outdoors—with its risks— is essential for healthy child development. We recommend increasing children’s opportunities for self-directed play outdoors in all settings—at home, at school, in child care, the community and nature.” The full Position Statement provides context for the statement, evidence supporting it, and a series of recommendations to increase active outdoor play opportunities to promote healthy child development. PMID:26062040

  16. Position Statement on Active Outdoor Play.

    Science.gov (United States)

    Tremblay, Mark S; Gray, Casey; Babcock, Shawna; Barnes, Joel; Bradstreet, Christa Costas; Carr, Dawn; Chabot, Guylaine; Choquette, Louise; Chorney, David; Collyer, Cam; Herrington, Susan; Janson, Katherine; Janssen, Ian; Larouche, Richard; Pickett, William; Power, Marlene; Sandseter, Ellen Beate Hansen; Simon, Brenda; Brussoni, Mariana

    2015-06-08

    A diverse, cross-sectorial group of partners, stakeholders and researchers, collaborated to develop an evidence-informed Position Statement on active outdoor play for children aged 3-12 years. The Position Statement was created in response to practitioner, academic, legal, insurance and public debate, dialogue and disagreement on the relative benefits and harms of active (including risky) outdoor play. The Position Statement development process was informed by two systematic reviews, a critical appraisal of the current literature and existing position statements, engagement of research experts (N=9) and cross-sectorial individuals/organizations (N=17), and an extensive stakeholder consultation process (N=1908). More than 95% of the stakeholders consulted strongly agreed or somewhat agreed with the Position Statement; 14/17 participating individuals/organizations endorsed it; and over 1000 additional individuals and organizations requested their name be listed as a supporter. The final Position Statement on Active Outdoor Play states: "Access to active play in nature and outdoors--with its risks--is essential for healthy child development. We recommend increasing children's opportunities for self-directed play outdoors in all settings--at home, at school, in child care, the community and nature." The full Position Statement provides context for the statement, evidence supporting it, and a series of recommendations to increase active outdoor play opportunities to promote healthy child development.

  17. Position Statement on Active Outdoor Play

    Directory of Open Access Journals (Sweden)

    Mark S. Tremblay

    2015-06-01

    Full Text Available A diverse, cross-sectorial group of partners, stakeholders and researchers, collaborated to develop an evidence-informed Position Statement on active outdoor play for children aged 3–12 years. The Position Statement was created in response to practitioner, academic, legal, insurance and public debate, dialogue and disagreement on the relative benefits and harms of active (including risky outdoor play. The Position Statement development process was informed by two systematic reviews, a critical appraisal of the current literature and existing position statements, engagement of research experts (N = 9 and cross-sectorial individuals/organizations (N = 17, and an extensive stakeholder consultation process (N = 1908. More than 95% of the stakeholders consulted strongly agreed or somewhat agreed with the Position Statement; 14/17 participating individuals/organizations endorsed it; and over 1000 additional individuals and organizations requested their name be listed as a supporter. The final Position Statement on Active Outdoor Play states: “Access to active play in nature and outdoors—with its risks— is essential for healthy child development. We recommend increasing children’s opportunities for self-directed play outdoors in all settings—at home, at school, in child care, the community and nature.” The full Position Statement provides context for the statement, evidence supporting it, and a series of recommendations to increase active outdoor play opportunities to promote healthy child development.

  18. Improving of the financial statements forms of credit unions under stakeholders information needs

    Directory of Open Access Journals (Sweden)

    O.L. Bilyachenko

    2016-07-01

    Full Text Available The need for a satisfaction of credit union users’ information requests causes necessity to improve procedure of disclosure of financial information in their financial statements. Analysis of statistics on the activities of credit unions in Ukraine has allowed revealing decrease in their number on the background of organizational consolidation. The study of international financial reporting framework, regulatory documents on accounting and reporting in Ukraine provided an opportunity to identify deficiencies of the disclosure of information about credit unions’ business activities. The result of the study is that the balance sheet and a profit and loss statement for the credit union have been added by the items, which will more fully disclose the information on assets and liabilities, business activities income and costs. In addition, these changes will avoid duplication of such information in the specialized reports provided by credit unions to the National Commission for State Regulation of Financial Services Markets. In general, this will help to protect of credit unions members’ rights and will strengthen the depositors’ and creditors’ confidence in the credit unions activities.

  19. Sexual Fears and Avoidant Sexual Behavior in Medical Students.

    Science.gov (United States)

    Popov, Stefan P; Mateva, Nonka G; Iliev, Yanko T; Dechev, Ivan D; Karalilova, Rositsa V

    2015-01-01

    Sexual fears, sometimes in the form of phobias, lead to aversive or sexually avoidant behavior blocking sexual closeness and resulting in deep personal and interpersonal distress. To determine the types of sexual fears and aversive behavior in young people of reproductive age (students) and their degree of markedness as to encourage a further implementation of prevention programs and interventions. The study included 116 fifth-year medical students in Plovdiv Medical University. Of these, 55 men and 61 women were assessed with the Sexual Aversion Scale, a 30-item self-rating questionnaire. The Diagnostic and Statistical Manual of Mental Disorders criteria of sexual aversion were used. The statistical analyses used were descriptive statistics and independent samples t-test. Sexual fears and aversive or blocking behavior are mild to moderate, mean score of 1.54 ± 0.04, without statistically significant gender differences. Both sexes have established fear-related sexual aversive motives of sexual behavior related to the risk of unwanted pregnancy and HIV infection. Women have significantly higher average scores for the following statements: fear of sexual intercourse (1.61 vs 1.25), avoidance of situations in which they may be involved sexually (1.95 vs 1.51), avoidance of genital sexual contact (1.44 vs 1.16), fear of catching a sexually transmitted disease (2.46 vs 2.09 ), fear of pregnancy (2.61 vs 2.15) and concerns what other people think of them (2.34 vs 1.93 ). Sexual fears and aversive or blocking behavior were mild to moderate. In both sexes similar fears--aversive or blocking patterns of sexual behavior were found, mainly associated with the fear of unwanted pregnancy and the risk of HIV infection, more expressed in women.

  20. Predictors of avoiding medical care and reasons for avoidance behavior.

    Science.gov (United States)

    Kannan, Viji Diane; Veazie, Peter J

    2014-04-01

    Delayed medical care has negative health and economic consequences; interventions have focused on appraising symptoms, with limited success in reducing delay. To identify predictors of care avoidance and reasons for avoiding care. Using the Health Information National Trends Survey (2007), we conducted logistic regressions to identify predictors of avoiding medical visits deemed necessary by the respondents; and, we then conducted similar analyses on reasons given for avoidance behavior. Independent variables included geographic, demographic, socioeconomic, personal health, health behavior, health care system, and cognitive characteristics. Approximately one third of adults avoided doctor visits they had deemed necessary. Although unadjusted associations existed, avoiding needed care was not independently associated with geographic, demographic, and socioeconomic characteristics. Avoidance behavior is characterized by low health self-efficacy, less experience with both quality care and getting help with uncertainty about health, having your feelings attended to by your provider, no usual source of care, negative affect, smoking daily, and fatalistic attitude toward cancer. Reasons elicited for avoidance include preference for self-care or alternative care, dislike or distrust of doctors, fear or dislike of medical treatments, time, and money; respondents also endorsed discomfort with body examinations, fear of having a serious illness, and thoughts of dying. Distinct predictors distinguish each of these reasons. Interventions to reduce patient delay could be improved by addressing the health-related behavioral, belief, experiential, and emotional traits associated with delay. Attention should also be directed toward the interpersonal communications between patients and providers.

  1. 76 FR 77816 - Access to Confidential Business Information by Guident Technologies, Inc. and Subcontractor...

    Science.gov (United States)

    2011-12-14

    ... Business Information by Guident Technologies, Inc. and Subcontractor, Impact Innovations Systems, Inc..., Guident Technologies, Inc. of Herndon, VA and subcontractor, Impact Innovations Systems, Inc. of Manassas... Control Act (TSCA). Some of the information may be claimed or determined to be Confidential Business...

  2. 7 CFR 4280.140 - Financial statements.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 15 2010-01-01 2010-01-01 false Financial statements. 4280.140 Section 4280.140... Efficiency Improvements Program Section B. Guaranteed Loans § 4280.140 Financial statements. (a) The... financial statements, at its sole discretion when the Agency is concerned about the applicant's credit risk. ...

  3. 40 CFR 156.68 - First aid statement.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 23 2010-07-01 2010-07-01 false First aid statement. 156.68 Section... aid statement. (a) Product as sold and distributed. Each product must bear a first aid statement if... with water prior to use, the label may also include a statement describing how the first aid measures...

  4. 20 CFR 603.4 - What is the confidentiality requirement of Federal UC law?

    Science.gov (United States)

    2010-04-01

    ... 20 Employees' Benefits 3 2010-04-01 2010-04-01 false What is the confidentiality requirement of Federal UC law? 603.4 Section 603.4 Employees' Benefits EMPLOYMENT AND TRAINING ADMINISTRATION, DEPARTMENT....C. 502(a)), State law must include provision for such methods of administration as are found by the...

  5. 41 CFR 102-75.320 - Does appraisal information need to be kept confidential?

    Science.gov (United States)

    2010-07-01

    ... 41 Public Contracts and Property Management 3 2010-07-01 2010-07-01 false Does appraisal information need to be kept confidential? 102-75.320 Section 102-75.320 Public Contracts and Property Management Federal Property Management Regulations System (Continued) FEDERAL MANAGEMENT REGULATION REAL PROPERTY 75-REAL PROPERTY DISPOSAL Surplus Real...

  6. Consolidated financial statements for fiscal year 1996

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1997-02-01

    The following overview and accompanying audited financial statements have been prepared for Fiscal Year (FY) 1996 to report the financial position and the results of operations of the Department of Energy. These statements include the consolidated Statement of Financial Position and the consolidated Statement of Operations and Changes in Net Position. The statements have been prepared in accordance with the Office of Management and Budget Bulletin No. 94-01, Form and Content for Agency Financial Statements, and were developed in accordance with the hierarchy of accounting standards described therein. The overview provides a narrative on the Department of Energy`s mission, activities, and accomplishments. Utilizing performance measures as the primary vehicle for communicating Departmental accomplishments and results, this overview discusses the most significant measures while others are discussed in the supplemental information to the financial statements.

  7. 21 CFR 801.61 - Statement of identity.

    Science.gov (United States)

    2010-04-01

    ... 21 Food and Drugs 8 2010-04-01 2010-04-01 false Statement of identity. 801.61 Section 801.61 Food... DEVICES LABELING Labeling Requirements for Over-the-Counter Devices § 801.61 Statement of identity. (a... principal features a statement of the identity of the commodity. (b) Such statement of identity shall be in...

  8. 7 CFR 1209.239 - Financial statements.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 10 2010-01-01 2010-01-01 false Financial statements. 1209.239 Section 1209.239..., AND CONSUMER INFORMATION ORDER Rules and Regulations General § 1209.239 Financial statements. (a) As requested by the Secretary, the Council shall prepare and submit financial statements to the Secretary on a...

  9. 7 CFR 29.2 - Policy statement.

    Science.gov (United States)

    2010-01-01

    ... INSPECTION Policy Statement and Regulations Governing the Extension of Tobacco Inspection and Price Support Services to New Markets and to Additional Sales on Designated Markets § 29.2 Policy statement. Inspection... 7 Agriculture 2 2010-01-01 2010-01-01 false Policy statement. 29.2 Section 29.2 Agriculture...

  10. 7 CFR 29.9402 - Policy statement.

    Science.gov (United States)

    2010-01-01

    ... INSPECTION Policy Statement and Regulations Governing Availability of Tobacco Inspection and Price Support Services to Flue-Cured Tobacco on Designated Markets § 29.9402 Policy statement. The sets of inspectors... 7 Agriculture 2 2010-01-01 2010-01-01 false Policy statement. 29.9402 Section 29.9402 Agriculture...

  11. WA10 Working in partnership with people with learning disabilities: academics and people with learning disabilities working together to disseminate the findings of a confidential inquiry into deaths of people with learning disabilities through film.

    Science.gov (United States)

    Russ, Lesley

    2015-04-01

    In England, between 2010-2013, a Confidential Inquiry into premature Deaths of People with Learning Disabilities was commissioned by the Department of Health. This took place in SW England led by Norah Fry Research Centre at Bristol University. Findings from the investigations into 247 deaths included that men with learning disabilities die, on average 13 years sooner and women, on average 20 years sooner, than the general population. Over 1/3 (37%) were found to be avoidable, being amenable to good quality healthcare. A number of key recommendations were made which required understanding by a range of audiences including people with learning disabilities and their carers. This workshop will demonstrate how academics can work with actors with learning disabilities to disseminate research findings about a sensitive subject in a thought provoking and accessible way. Academics worked with the MISFITs theatre company to make a DVD about the findings and recommendations of the Confidential Inquiry. The DVD presents the findings of the Confidential Inquiry through the stories of John, Bill, Karen and Emily. It powerfully illustrates the importance of diagnosing and treating illness of people with learning disabilities in a timely and appropriate manner and highlights the measures that could be taken to reduce premature deaths in this population. The session provides an example of how the voices of people with learning disabilities can communicate research messages effectively to people with learning disabilities, health and social care practitioners and others who support the learning disability population. © 2015, Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://group.bmj.com/group/rights-licensing/permissions.

  12. Mothers' attitudes toward adolescent confidential services: development and validation of scales for use in English- and Spanish-speaking populations.

    Science.gov (United States)

    Tebb, Kathleen P; Pollack, Lance M; Millstein, Shana; Otero-Sabogal, Regina; Wibbelsman, Charles J

    2014-09-01

    To explore parental beliefs and attitudes about confidential services for their teenagers; and to develop an instrument to assess these beliefs and attitudes that could be used among English and Spanish speakers. The long-term goal is to use this research to better understand and evaluate interventions to improve parental knowledge and attitudes toward their adolescent's access and utilization of comprehensive confidential health services. The instrument was developed using an extensive literature review and theoretical framework followed by qualitative data from focus groups and in-depth interviews. It was then pilot tested with a random sample of English- and Spanish-speaking parents and further revised. The final instrument was administered to a random sample of 1,000 mothers. The psychometric properties of the instrument were assessed for Spanish and English speakers. The instrument consisted of 12 scales. Most Cronbach alphas were >.70 for Spanish and English speakers. Fewer items for Spanish speakers "loaded" for the Responsibility and Communication scales. Parental Control of Health Information failed for Spanish speakers. The Parental Attitudes of Adolescent Confidential Health Services Questionnaire (PAACS-Q) contains 12 scales and is a valid and reliable instrument to assess parental knowledge and attitudes toward confidential health services for adolescents among English speakers and all but one scale was applicable for Spanish speakers. More research is needed to understand key constructs with Spanish speakers. Copyright © 2014 Society for Adolescent Health and Medicine. Published by Elsevier Inc. All rights reserved.

  13. 21 CFR 201.61 - Statement of identity.

    Science.gov (United States)

    2010-04-01

    ... 21 Food and Drugs 4 2010-04-01 2010-04-01 false Statement of identity. 201.61 Section 201.61 Food...: GENERAL LABELING Labeling Requirements for Over-the-Counter Drugs § 201.61 Statement of identity. (a) The... features a statement of the identity of the commodity. (b) Such statement of identity shall be in terms of...

  14. Contractual obligations and the sharing of confidential health information in sport.

    Science.gov (United States)

    Anderson, L

    2008-09-01

    As an employee, a sports doctor has obligations to their employer, but also professional and widely accepted obligations of a doctor to the patient (in this case the individual team member). The conflict is evident when sports doctors are asked by an athlete to keep personal health information confidential from the coach and team management, and yet both doctor and athlete have employment contracts specifying that such information shall be shared. Recent research in New Zealand shows that despite the presence of an employment contract, there appears to be a wide range of behaviours among sports doctors when an athlete requests that information about them be kept from team management. Many seem willing to honour requests to keep health information about the athlete confidential, thereby being in breach of the employment contract, while others insist on informing team management against the wishes of the athlete. There are a number of potential solutions to this dilemma from forcing doctors to meet their contractual obligations, to limiting the expectations of the employment contract. This paper suggests that at times it may be appropriate to do both, making the position of the doctor clearer and supporting the ability of this group to resist pressure by coaches and management through having a robust code of ethics.

  15. Confidentiality in participatory research: Challenges from one study.

    Science.gov (United States)

    Petrova, Elmira; Dewing, Jan; Camilleri, Michelle

    2016-06-01

    This article presents key ethical challenges that were encountered when conducting a participatory qualitative research project with a very specific, small group of nurses, in this case with practice development nurses in Malta. With the small number of nurses employed in practice development roles in Malta, there are numerous difficulties of maintaining confidentiality. Poorly constructed interventions by the researcher could have resulted in detrimental effects to research participants and the overall trustworthiness of the research. Generally, ethical guidelines for research exist to reinforce validity of research; however, there is not an established consensus on how these strategies can be utilised in some types of qualitative field work. The researcher used an exploratory case study methodology. The sample consisted of 10 participants who were interviewed twice using face-to-face interviews, over a period of 2 months. The study was ethically reviewed by the University Research Ethics Committee and the Faculty Research Ethics Committee, University of Malta. The participants referred to in this article have been given adequate information about the study and their consent has been obtained. Numerous strategies for ensuring confidentiality during recruitment of the participants, during data collection, during transcription and data analysis and during dissemination of research results assisted the researcher in responding to potential and actual ethical issues. This article emphasises the main strategies that can be used to respond to ethical challenges when researching with a small easily identifiable group. The learning discussed here may be relevant to or even transferable to other similar research studies or research contexts. These methods fostered a greater credibility throughout the research process and predisposed the participants to greater trust, and thus, they disclosed their experiences and speak more freely, thus enhancing the quality of the study

  16. Corporate Information Management Financial Statements

    National Research Council Canada - National Science Library

    Gimble, Thomas

    1995-01-01

    The audit objective was to determine whether the OASD(C31) methods for preparing FY 1996 CIM, general purpose financial statements will result in auditable and complete general purpose financial statements...

  17. Peer conflict avoidance: associations with loneliness, social anxiety, and social avoidance.

    Science.gov (United States)

    Johnson, H D; LaVoie, J C; Spenceri, M C; Mahoney-Wernli, M A

    2001-02-01

    Failure to resolve peer conflict is associated with children's reports of loneliness, social anxiety, and social avoidance. Although these relationships are well established, researchers have not examined the association between the avoidance of peer conflict and various adjustment characteristics. The current study examined the association between avoidance of conflict and measures of loneliness, social anxiety, and social avoidance for 59 pupils in Grade 4 (31 boys and 28 girls) and 47 in Grade 8 (22 boys and 25 girls). Volunteers indicated that conflict avoidance based on autonomy, e.g., independence issues, and interpersonal issues, e.g., closeness and cohesion, was associated with scores on loneliness for boys and girls, respectively. Conflict avoidance for emotional and physical well-being and fear of punishment was associated with increased reports of loneliness and social anxiety for children in Grade 4.

  18. Teaching Journalism Students about Confidential Whistleblower Sources: An Analysis of Introductory News Writing Textbooks

    Science.gov (United States)

    Huxford, John; Moore, Maria A.

    2011-01-01

    Whistleblowers are a key journalistic source for many current news stories. However, reporters pursuing these major stories must navigate the dilemma between transparent full disclosure and protecting their confidential source. Professional journalists begin their journey as students, and students begin their journey in the classroom with a…

  19. 17 CFR 145.9 - Petition for confidential treatment of information submitted to the Commission.

    Science.gov (United States)

    2010-04-01

    ... may summarily reject the submitter's request for confidential treatment with leave to the submitter to... treatment of information submitted to the Commission. 145.9 Section 145.9 Commodity and Securities Exchanges... treatment of information submitted to the Commission. (a) Purpose. This section provides a procedure by...

  20. 76 FR 30781 - Confidentiality Determinations for Data Required Under the Mandatory Greenhouse Gas Reporting...

    Science.gov (United States)

    2011-05-26

    ... this document. BAMM Best Available Monitoring Methods CAA Clean Air Act CBI confidential business information CBP Customs and Border Protection CEMS continuous emission monitoring system(s) CFR Code of... prevent competitors from forcing them to defend data on a case-by-case basis in Agency CBI proceedings...

  1. Be Vigilant on Financial Statements.

    Science.gov (United States)

    Freed, DeBow

    2002-01-01

    Highlights areas on university's financial statements that warrant careful review by trustees and suggests ways they can check to see whether an institution's financial statements are clear and valid indicators of its financial status. (EV)

  2. Practices in security and confidentiality of HIV/AIDS patients' information: A national survey among staff at HIV outpatient clinics in Vietnam.

    Directory of Open Access Journals (Sweden)

    Nguyen Khac Hai

    Full Text Available Breach of confidentiality or invasion of privacy from the collection and use of medical records, particularly those of patients with HIV/AIDS or other diseases sensitive to stigmatization, should be prevented by all related stakeholders in healthcare settings. The main focus of this study was to assess practices regarding security and confidentiality of HIV-related information among staff at HIV outpatient clinics (HIV-OPCs in Vietnam.A descriptive cross-sectional study was conducted at all 312 HIV-OPCs across the country using an online survey technique.In general, the staff practices for securing and protecting patient information were at acceptable levels. Most staff had proper measures and practices for maintaining data security; however, the protection of patient confidentiality, particularly for data access, sharing, and transfer still required improvement. Most HIV-OPC staff had good or moderate knowledge and positive perceptions towards security and confidentiality issues. Staff who were not trained in the practice of security measures differed significantly from those who were trained (OR: 3.74; 95%CI: 1.44-9.67; staff needing improved knowledge levels differed significantly from those with good (OR: 5.20; 95%CI: 2.39-11.32 and moderate knowledge levels (OR: 5.10; 95%CI: 2.36-11.00; and staff needing improved perception levels differed significantly from those with good (i.e., with 100% proper practices and moderate perception levels (OR: 5.67; 95%CI: 2.93-10.95. Staff who were not trained in the protection of data confidentiality differed significantly from those who were trained (OR: 2.18; 95%CI: 1.29-3.65.Training is an important factor to help raise the levels of proper practices regarding confidentiality and security, to improve knowledge and raise awareness about change among staff. The operation and management of HIV treatment and care in Vietnam are currently transitioning from separate healthcare clinics (HIV-OPC into units

  3. Practices in security and confidentiality of HIV/AIDS patients' information: A national survey among staff at HIV outpatient clinics in Vietnam.

    Science.gov (United States)

    Khac Hai, Nguyen; Lawpoolsri, Saranath; Jittamala, Podjanee; Thi Thu Huong, Phan; Kaewkungwal, Jaranit

    2017-01-01

    Breach of confidentiality or invasion of privacy from the collection and use of medical records, particularly those of patients with HIV/AIDS or other diseases sensitive to stigmatization, should be prevented by all related stakeholders in healthcare settings. The main focus of this study was to assess practices regarding security and confidentiality of HIV-related information among staff at HIV outpatient clinics (HIV-OPCs) in Vietnam. A descriptive cross-sectional study was conducted at all 312 HIV-OPCs across the country using an online survey technique. In general, the staff practices for securing and protecting patient information were at acceptable levels. Most staff had proper measures and practices for maintaining data security; however, the protection of patient confidentiality, particularly for data access, sharing, and transfer still required improvement. Most HIV-OPC staff had good or moderate knowledge and positive perceptions towards security and confidentiality issues. Staff who were not trained in the practice of security measures differed significantly from those who were trained (OR: 3.74; 95%CI: 1.44-9.67); staff needing improved knowledge levels differed significantly from those with good (OR: 5.20; 95%CI: 2.39-11.32) and moderate knowledge levels (OR: 5.10; 95%CI: 2.36-11.00); and staff needing improved perception levels differed significantly from those with good (i.e., with 100% proper practices) and moderate perception levels (OR: 5.67; 95%CI: 2.93-10.95). Staff who were not trained in the protection of data confidentiality differed significantly from those who were trained (OR: 2.18; 95%CI: 1.29-3.65). Training is an important factor to help raise the levels of proper practices regarding confidentiality and security, to improve knowledge and raise awareness about change among staff. The operation and management of HIV treatment and care in Vietnam are currently transitioning from separate healthcare clinics (HIV-OPC) into units integrated

  4. Practices in security and confidentiality of HIV/AIDS patients’ information: A national survey among staff at HIV outpatient clinics in Vietnam

    Science.gov (United States)

    Khac Hai, Nguyen; Lawpoolsri, Saranath; Jittamala, Podjanee; Thi Thu Huong, Phan

    2017-01-01

    Introduction Breach of confidentiality or invasion of privacy from the collection and use of medical records, particularly those of patients with HIV/AIDS or other diseases sensitive to stigmatization, should be prevented by all related stakeholders in healthcare settings. The main focus of this study was to assess practices regarding security and confidentiality of HIV-related information among staff at HIV outpatient clinics (HIV-OPCs) in Vietnam. Methods A descriptive cross-sectional study was conducted at all 312 HIV-OPCs across the country using an online survey technique. Results In general, the staff practices for securing and protecting patient information were at acceptable levels. Most staff had proper measures and practices for maintaining data security; however, the protection of patient confidentiality, particularly for data access, sharing, and transfer still required improvement. Most HIV-OPC staff had good or moderate knowledge and positive perceptions towards security and confidentiality issues. Staff who were not trained in the practice of security measures differed significantly from those who were trained (OR: 3.74; 95%CI: 1.44–9.67); staff needing improved knowledge levels differed significantly from those with good (OR: 5.20; 95%CI: 2.39–11.32) and moderate knowledge levels (OR: 5.10; 95%CI: 2.36–11.00); and staff needing improved perception levels differed significantly from those with good (i.e., with 100% proper practices) and moderate perception levels (OR: 5.67; 95%CI: 2.93–10.95). Staff who were not trained in the protection of data confidentiality differed significantly from those who were trained (OR: 2.18; 95%CI: 1.29–3.65). Conclusions Training is an important factor to help raise the levels of proper practices regarding confidentiality and security, to improve knowledge and raise awareness about change among staff. The operation and management of HIV treatment and care in Vietnam are currently transitioning from separate

  5. Confidentiality protections versus collaborative care in the treatment of substance use disorders

    OpenAIRE

    Manuel, Jennifer K; Newville, Howard; Larios, Sandra E; Sorensen, James L

    2013-01-01

    Abstract Practitioners in federally-assisted substance use disorder (SUD) treatment programs are faced with increasingly complex decisions when addressing patient confidentiality issues. Recent policy changes, intended to make treatment more available and accessible, are having an impact on delivery of SUD treatment in the United States. The addition of electronic health records provides opportunity for more rapid and comprehensive communication between patients’ primary and SUD ...

  6. General practitioners' perspectives regarding competence and confidentiality in an adolescent with suspected anorexia nervosa: legal and ethical considerations.

    Science.gov (United States)

    Bartholomew, Terence P; Paxton, Susan J

    2003-02-01

    In Victoria, Australia, the legal position regarding young people's competence to make medical treatment decisions has not been clarified in legislation, and a number of often vague common law decisions must be relied on for guidance. This situation produces a degree of uncertainty about appropriate professional practice, while also potentially impeding young people's rights claims in health care settings. With this in mind, the present research explored general practitioners' competence and confidentiality decisions regarding a 17-year-old female who presented with symptoms of an eating disorder. Questionnaires were sent to a random sample of 500 Victorian general practitioners, of whom 190 responded. After reading a case vignette, general practitioners indicated whether they would find the hypothetical patient competent and if they would maintain her confidentiality. Seventy-three per cent of respondents found the patient competent and most would have maintained confidentiality, at least initially. However, subsequent analysis of the rationales supplied for these decisions revealed a wide diversity in general practitioners' understandings and implementations of extant legal authority. This research highlights the need for general practitioners to be exposed to up-to-date and clinically relevant explanations of contemporary legal positions.

  7. 76 FR 10360 - Access to Confidential Business Information by Guident Technologies Inc. and Its Identified...

    Science.gov (United States)

    2011-02-24

    ... Business Information by Guident Technologies Inc. and Its Identified Subcontractors AGENCY: Environmental Protection Agency (EPA). ACTION: Notice. SUMMARY: EPA has authorized its contractor, Guident Technologies... information may be claimed or determined to be Confidential Business Information (CBI). DATES: Access to the...

  8. 75 FR 57768 - Access to Confidential Business Information by Eastern Research Group and Its Identified...

    Science.gov (United States)

    2010-09-22

    ... Business Information by Eastern Research Group and Its Identified Subcontractor AGENCY: Environmental Protection Agency (EPA). ACTION: Notice. SUMMARY: EPA has authorized its contractor, Eastern Research Group... the information may be claimed or determined to be Confidential Business Information (CBI). DATES...

  9. 10 CFR 51.29 - Scoping-environmental impact statement and supplement to environmental impact statement.

    Science.gov (United States)

    2010-01-01

    ... 10 Energy 2 2010-01-01 2010-01-01 false Scoping-environmental impact statement and supplement to environmental impact statement. 51.29 Section 51.29 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED... Environmental Policy Act-Regulations Implementing Section 102(2) Scoping § 51.29 Scoping-environmental impact...

  10. FINANCIAL STATEMENTS FOR LEGAL PERSONS WITHOUT PATRIMONIAL PURPOSE

    OpenAIRE

    DUMITRU FRANCA; MORARU MARIA

    2012-01-01

    Annual financial statements and annual financial statements that are simplified represent a whole. According to the law of accounting, annual financial statements must be accompanied by a written declaration of assumption of responsibility by the leadership of the legal person for annual financial statements in accordance with Accounting rules for legal persons without patrimonial purpose. Annual financial statements are prepared in a clear manner and should be consistent with the provisions ...

  11. [When the violation of medical confidentiality is imposed by law: Another side effect of Law N° 20.584].

    Science.gov (United States)

    Vega, Jorge; Quintana, María Soledad

    2016-02-01

    A law of rights and duties of patients was recently enacted in Chile (Law N° 20.584). When someone dies, the law allows his inheritors to have access to part or the totality of the medical record. Therefore, they may become acquainted of information that the patient gave in confidence to his physician, protected by "the medical confidentiality". The original bill included the possibility that a doctor could deny information that could cause harm to the former holder of the clinical record, but this precaution was banned by congressmen, seriously damaging the institution of "medical confidentiality", a cornerstone of the medical-patient relationship since the beginning of medicine.

  12. News at Biochemia Medica: research integrity corner, updated guidelines to authors, revised author statement form and adopted ICMJE Conflict-of-Interest Form.

    Science.gov (United States)

    Simundic, Ana-Maria

    2013-01-01

    From the issue 23(1) we have implemented several major changes in the editorial policies and procedures. We hope that those changes will raise awareness of our potential authors and reviewers for research and publication integrity issues as well as to improve the quality of our submissions and published articles. Among those changes is the launch of a special journal section called Research Integrity Corner. In this section we aim to publish educational articles dealing with different research and publication misconduct issues. Moreover, we have done a comprehensive revision of our Instructions to authors. Whereas our former Instructions to authors have mostly been concerned with recommendations for manuscript preparation and submission, the revised document additionally describes the editorial procedure for all submitted articles and provides exact journal policies towards research integrity, authorship, copyright and conflict of interest. By putting these Guidelines into action, we hope that our main ethical policies and requirements are now visible and available to all our potential authors. We have also revised the former Authorship and copyright form which is now called the Author statement form. This form now contains statements on the authorship, originality of work, research ethics, patient privacy and confidentiality, and copyright transfer. Finally, Journal has adopted the ICMJE Form for Disclosure of Potential Conflicts of Interest. From this issue, for each submitted article, authors are requested to fill out the "ICMJE Form for Disclosure of Potential Conflicts of Interest" as well as the Author statement form and upload those forms during the online manuscript submission process. We honestly believe that our authors and readers will appreciate such endeavors. In this Editorial article we briefly explain the background and the nature of those recent major editorial changes.

  13. Management of medical confidentiality in English professional football clubs: some ethical problems and issues.

    Science.gov (United States)

    Waddington, I; Roderick, M

    2002-04-01

    To examine the ways in which confidential matters are dealt with in the context of the relationship between the club doctor (or physiotherapist) and the player as patient in English professional football clubs. Semistructured tape recorded interviews with 12 club doctors, 10 club physiotherapists, and 27 current and former players. A questionnaire was also sent to 90 club doctors; 58 were returned. There is among club doctors and physiotherapists no commonly held code of ethics governing how much and what kind of information about players may properly be passed on to managers; associated with this, there is considerable variation from one club to another in terms of the amount and kind of information passed on to managers. In some clubs, medical staff attempt to operate more or less on the basis of the rules governing confidentiality that apply in general practice, but in other clubs, medical staff are more ready to pass on personal information about players. In some situations, this raises serious ethical questions. Guidelines dealing with confidentiality in practitioner-patient relationships in medical practice have long been available and have recently been restated, specifically in relation to the practice of sports medicine, by the British Olympic Association, the British Medical Association, and the Football Association. This is a welcome first step. However, if the guidelines are to have an impact on practice, detailed consideration needs to be given to ensuring their effective implementation; if this is to be achieved, consideration also needs to be given to identifying those aspects of the culture and organisation of professional football clubs that may hinder the full and effective implementation of those guidelines.

  14. 77 FR 54806 - Adoption of Updated EDGAR Filer Manual

    Science.gov (United States)

    2012-09-06

    ... that qualify either under the JOBS Act or the Division of Corporate Finance's foreign private issuer... Corporation Finance, for questions on Confidential Registration Statement, Form ID, and Forms D contact...

  15. A collision avoidance model for two-pedestrian groups: Considering random avoidance patterns

    Science.gov (United States)

    Zhou, Zhuping; Cai, Yifei; Ke, Ruimin; Yang, Jiwei

    2017-06-01

    Grouping is a common phenomenon in pedestrian crowds and group modeling is still an open challenging problem. When grouping pedestrians avoid each other, different patterns can be observed. Pedestrians can keep close with group members and avoid other groups in cluster. Also, they can avoid other groups separately. Considering this randomness in avoidance patterns, we propose a collision avoidance model for two-pedestrian groups. In our model, the avoidance model is proposed based on velocity obstacle method at first. Then grouping model is established using Distance constrained line (DCL), by transforming DCL into the framework of velocity obstacle, the avoidance model and grouping model are successfully put into one unified calculation structure. Within this structure, an algorithm is developed to solve the problem when solutions of the two models conflict with each other. Two groups of bidirectional pedestrian experiments are designed to verify the model. The accuracy of avoidance behavior and grouping behavior is validated in the microscopic level, while the lane formation phenomenon and fundamental diagrams is validated in the macroscopic level. The experiments results show our model is convincing and has a good expansibility to describe three or more pedestrian groups.

  16. 7 CFR 1775.21 - Audit or financial statements.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 12 2010-01-01 2010-01-01 false Audit or financial statements. 1775.21 Section 1775... Audit or financial statements. The grantee will provide an audit report or financial statements as... year. (b) Grantees expending less than $500,000 will provide annual financial statements covering the...

  17. High-Technology Companies Often Turn to Colleges for Confidential 'Beta Tests' of New Products.

    Science.gov (United States)

    Turner, Judith Axler

    1988-01-01

    Beta testing--the process of trying a product in a real-world setting before releasing it commercially--exploits a natural interface between universities and high-technology industries. High-tech companies need confidential, real-world tests of new products, and universities are eager to get an early look at tomorrow's technology. (MLW)

  18. Opening statements and general statements by delegation

    International Nuclear Information System (INIS)

    1978-01-01

    23 delegations have submitted general reports and statements on the situation and evolution of the nuclear fuel cycle. Each report reflects the particular interests of the country that submitted it. All in all, these reports provide general background information on the subject of the conference

  19. 40 CFR 1508.11 - Environmental impact statement.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 32 2010-07-01 2010-07-01 false Environmental impact statement. 1508.11 Section 1508.11 Protection of Environment COUNCIL ON ENVIRONMENTAL QUALITY TERMINOLOGY AND INDEX § 1508.11 Environmental impact statement. Environmental impact statement means a detailed written...

  20. Final environmental statement for the geothermal leasing program

    Energy Technology Data Exchange (ETDEWEB)

    1973-12-31

    This second of the four volumes of the Geothermal Leasing Program final impact statement contains the individual environmental statements for the leasing of federally owned geothermal resources for development in three specific areas: Clear Lake-Geysers; Mono Lake-Long Valley; and Imperial Valley, all in California. It also includes a summary of the written comments received and departmental responses relative to the Draft Environmental Impact Statement issued in 1971; comments and responses on the Draft Environmental Impact Statement; consultation and coordination in the development of the proposal and in the preparation of the Draft Environmental Statement; and coordination in the review of the Draft Environmental Statement.

  1. Alcohol and cancer: a position statement from Cancer Council Australia.

    Science.gov (United States)

    Winstanley, Margaret H; Pratt, Iain S; Chapman, Kathryn; Griffin, Hayley J; Croager, Emma J; Olver, Ian N; Sinclair, Craig; Slevin, Terry J

    2011-05-02

    The Cancer Council Australia (CCA) Alcohol Working Group has prepared a position statement on alcohol use and cancer. The statement has been reviewed by external experts and endorsed by the CCA Board. Alcohol use is a cause of cancer. Any level of alcohol consumption increases the risk of developing an alcohol-related cancer; the level of risk increases in line with the level of consumption. It is estimated that 5070 cases of cancer (or 5% of all cancers) are attributable to long-term chronic use of alcohol each year in Australia. Together, smoking and alcohol have a synergistic effect on cancer risk, meaning the combined effects of use are significantly greater than the sum of individual risks. Alcohol use may contribute to weight (fat) gain, and greater body fatness is a convincing cause of cancers of the oesophagus, pancreas, bowel, endometrium, kidney and breast (in postmenopausal women). The existing evidence does not justify the promotion of alcohol use to prevent coronary heart disease, as the previously reported role of alcohol in reducing heart disease risk in light-to-moderate drinkers appears to have been overestimated. CCA recommends that to reduce their risk of cancer, people limit their consumption of alcohol, or better still avoid alcohol altogether. For individuals who choose to drink alcohol, CCA recommends that they drink only within the National Health and Medical Research Council guidelines for alcohol consumption.

  2. AICPA allows low-cost options for compiled financial statements.

    Science.gov (United States)

    Reinstein, Alan; Luecke, Randall W

    2002-02-01

    The AICPA Accounting and Review Services Committee's (ARSC) SSARS No. 8, Amendment to Statement on Standards for Accounting and Review Services No. 1, Compilation and Review of Financial Statements, issued in October 2000, allows financial managers to provide plain-paper, compiled financial statements for the exclusive use of management. Such financial statements were disallowed in 1979 when the AICPA issued SSARS No. 1, Compilation and Review of Financial Statements. With the issuance of SSARS No. 8, financial managers can prepare plain-paper, compiled financial statements when third parties are not expected to rely on the financial statements, management acknowledges such restrictions in writing, and management acknowledges its primary responsibility for the adequacy of the financial statements.

  3. 29 CFR 1611.3 - Procedures for requests pertaining to individual records in a record system.

    Science.gov (United States)

    2010-07-01

    ... or be supplied with copies by mail. (b) Requests pertaining to records contained in a system of... Financial Disclosure Reports and Other Ethics Program Records), OGE/GOVT-2 (Confidential Statements of...

  4. Confidentiality considerations for use of social-spatial data on the social determinants of health: Sexual and reproductive health case study.

    Science.gov (United States)

    Haley, Danielle F; Matthews, Stephen A; Cooper, Hannah L F; Haardörfer, Regine; Adimora, Adaora A; Wingood, Gina M; Kramer, Michael R

    2016-10-01

    Understanding whether and how the places where people live, work, and play are associated with health behaviors and health is essential to understanding the social determinants of health. However, social-spatial data which link a person and their attributes to a geographic location (e.g., home address) create potential confidentiality risks. Despite the growing body of literature describing approaches to protect individual confidentiality when utilizing social-spatial data, peer-reviewed manuscripts displaying identifiable individual point data or quasi-identifiers (attributes associated with the individual or disease that narrow identification) in maps persist, suggesting that knowledge has not been effectively translated into public health research practices. Using sexual and reproductive health as a case study, we explore the extent to which maps appearing in recent peer-reviewed publications risk participant confidentiality. Our scoping review of sexual and reproductive health literature published and indexed in PubMed between January 1, 2013 and September 1, 2015 identified 45 manuscripts displaying participant data in maps as points or small-population geographic units, spanning 26 journals and representing studies conducted in 20 countries. Notably, 56% (13/23) of publications presenting point data on maps either did not describe approaches used to mask data or masked data inadequately. Furthermore, 18% (4/22) of publications displaying data using small-population geographic units included at least two quasi-identifiers. These findings highlight the need for heightened education for researchers, reviewers, and editorial teams. We aim to provide readers with a primer on key confidentiality considerations when utilizing linked social-spatial data for visualizing results. Given the widespread availability of place-based data and the ease of creating maps, it is critically important to raise awareness on when social-spatial data constitute protected health

  5. 7 CFR 1794.61 - Environmental impact statement.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 12 2010-01-01 2010-01-01 false Environmental impact statement. 1794.61 Section 1794..., DEPARTMENT OF AGRICULTURE (CONTINUED) ENVIRONMENTAL POLICIES AND PROCEDURES Procedure for Environmental Impact Statements § 1794.61 Environmental impact statement. An EIS shall be prepared in accordance with...

  6. Developing an effective corrective action process : lessons learned from operating a confidential close call reporting system

    Science.gov (United States)

    2013-03-05

    In 2007, the Federal Railroad Administration (FRA) launched : C3RS, the Confidential Close Call Reporting System, as a : demonstration project to learn how to facilitate the effective : reporting and implementation of corrective actions, and assess t...

  7. Financial Statements

    International Development Research Centre (IDRC) Digital Library (Canada)

    Financial Statements and accompanying notes provided on .... to good governance principles. there is the risk that ...... responsibilities of the centre's internal auditor includes reviewing internal controls, including accounting and financial.

  8. Stakeholder Orientation in Cruise Lines’ Mission Statements

    Directory of Open Access Journals (Sweden)

    Lara Penco

    2017-11-01

    Full Text Available Consistent with the extant management literature, mission statements are crucial for the sustainability and growth of any firms and have been considered to be a tool for the strategic management process. Despite the considerable attention awarded to this theme, the role of the mission statement in the strategic management of tourism firms has not been sufficiently highlighted. The present paper tries to bridge this literature gap and aims to (i analyze the content of mission statements; and (ii investigate the stakeholder orientation of cruise line mission statements. We apply a content analysis method to analyze the mission statements of 44 cruise lines, employing three different perspectives: (1 the inclusion of stakeholder groups; (2 mentions of specific “mission” components; (3 reference to four goals usually assigned to mission statements. The analysis was performed using the software package QDA-Miner. The results suggest that it is possible to identify four clusters of firms that present similar content in their mission statements, and that cruise companies tend to reserve a major attention to customers. This contribution presents some valuable research implications mainly useful for researchers and academics, but also maybe of benefit to professionals and investors.

  9. 77 FR 25475 - Inquiry To Learn Whether Businesses Assert Business Confidentiality Claims Regarding Waste Import...

    Science.gov (United States)

    2012-04-30

    ... meet the definition of ``affected business,'' and are not covered by today's notice. They consist of..., however, do not meet the definition of ``affected business,'' and are not covered by today's notice. They... Businesses Assert Business Confidentiality Claims Regarding Waste Import and Export AGENCY: Environmental...

  10. 77 FR 109 - Inquiry To Learn Whether Businesses Assert Business Confidentiality Claims Regarding Waste Import...

    Science.gov (United States)

    2012-01-03

    ... definition of ``affected business,'' and are not covered by today's notice. They consist of any business that.... Certain businesses, however, do not meet the definition of ``affected business,'' and are not covered by... Businesses Assert Business Confidentiality Claims Regarding Waste Import and Export AGENCY: Environmental...

  11. 78 FR 67139 - Access to Confidential Business Information by Eastern Research Group and Its Identified...

    Science.gov (United States)

    2013-11-08

    ... Business Information by Eastern Research Group and Its Identified Subcontractor, Energy Services, Inc..., Eastern Research Group (ERG) of Chantilly, VA, and subcontractor Energy Services, Inc., of Tallahassee, FL... Control Act (TSCA). Some of the information may be claimed or determined to be Confidential Business...

  12. Understanding Financial Statements. Financial Matters. Board Basics.

    Science.gov (United States)

    McCarthy, John H.; Turner, Robert M.

    1998-01-01

    This booklet for trustees of higher education institutions offers guidelines to help trustees understand the institution's financial statements. Individual sections describe the three major financial statements and cover topics such as: (1) standards of the Financial Accounting Standards Board; (2) the "statement of financial position,"…

  13. 40 CFR 6.207 - Environmental impact statements.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 1 2010-07-01 2010-07-01 false Environmental impact statements. 6.207... ACTIONS EPA's NEPA Environmental Review Procedures § 6.207 Environmental impact statements. (a) The Responsible Official will prepare an environmental impact statement (EIS) (see 40 CFR 1508.11) for major...

  14. 39 CFR 775.11 - Environmental impact statements.

    Science.gov (United States)

    2010-07-01

    ... 39 Postal Service 1 2010-07-01 2010-07-01 false Environmental impact statements. 775.11 Section... POLICY ACT PROCEDURES § 775.11 Environmental impact statements. (a) Determining scope. Before an environmental impact statement is prepared, the following procedures must be followed to determine what issues...

  15. Auditing nuclear materials statements

    International Nuclear Information System (INIS)

    Anon.

    1973-01-01

    A standard that may be used as a guide for persons making independent examinations of nuclear materials statements or reports regarding inventory quantities on hand, receipts, production, shipment, losses, etc. is presented. The objective of the examination of nuclear materials statements by the independent auditor is the expression of an opinion on the fairness with which the statements present the nuclear materials position of a nuclear materials facility and the movement of such inventory materials for the period under review. The opinion is based upon an examination made in accordance with auditing criteria, including an evaluation of internal control, a test of recorded transactions, and a review of measured discards and materials unaccounted for (MUF). The standard draws heavily upon financial auditing standards and procedures published by the American Institute of Certified Public Accountants

  16. FEATURES OF CONSOLIDATED FINANCIAL STATEMENTS: FOREIGN EXPERIENCE

    Directory of Open Access Journals (Sweden)

    S. V. KUCHER

    2016-12-01

    Full Text Available The article researches the features of preparation and submission of the consolidated financial statements of the world countries of different systems of accounting standardization in order to identify the areas of accounting improvement for the process of consolidation of financial reporting indicators. The main problems of consolidated financial statements preparation by business entities in Ukraine are determined. The author determines the theoretical and practical problems of consolidation of financial statements of organizational and methodical character. The comparative analysis of the features of standardization process of financial statements consolidation in the world countries is carried out. The main differences in the requirements for the formation of consolidated financial statements indicators of such countries as the French Republic, the Federal Republic of Germany, the Republic of Belarus and the People’s Republic of China are outlined. The main directions of scientific researches on the improvement of accounting and analytical support for the preparation of consolidated financial statements are formed.

  17. 12 CFR 1102.309 - Confidential treatment procedures.

    Science.gov (United States)

    2010-01-01

    ... to the ASC or within ten business days thereafter. Nothing in this section limits the authority of... information would be useful to competitors or would impair sales or similar statements generally will not be... shall provide the submitter with a reasonable opportunity, no longer than ten business days, to submit...

  18. 76 FR 33286 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2011-06-08

    .../GOVT-6 GSA SmartPay Purchase Charge Card Program; GSA/GOVT-8 Excluded Parties List System (EPLS); MSPB... Other Ethics Program Records; OGE/GOVT-2 Confidential Statements of Employment and Financial Interests...

  19. 78 FR 13082 - Draft Environmental Impact Report/Environmental Impact Statement/Environmental Impact Statement...

    Science.gov (United States)

    2013-02-26

    ...The Bureau of Reclamation has made available for public review and comment the draft Environmental Impact Report/Environmental Impact Statement/Environmental Impact Statement (EIR/EIS/EIS) for the Upper Truckee River Restoration and Marsh Restoration Project (Project). The California Tahoe Conservancy and the Tahoe Regional Planning Agency, the other lead agencies for the Project, made the EIR/EIS/EIS available to the public on February 8, 2013.

  20. 40 CFR 123.23 - Attorney General's statement.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 21 2010-07-01 2010-07-01 false Attorney General's statement. 123.23... PROGRAM REQUIREMENTS State Program Submissions § 123.23 Attorney General's statement. (a) Any State that seeks to administer a program under this part shall submit a statement from the State Attorney General...

  1. 40 CFR 233.12 - Attorney General's statement.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 24 2010-07-01 2010-07-01 false Attorney General's statement. 233.12... STATE PROGRAM REGULATIONS Program Approval § 233.12 Attorney General's statement. (a) Any State that seeks to administer a program under this part shall submit a statement from the State Attorney General...

  2. Controls Mitigating the Risk of Confidential Information Disclosure by Facebook: Essential Concern in Auditing Information Security

    Directory of Open Access Journals (Sweden)

    Ivan Ognyanov Kuyumdzhiev

    2014-08-01

    Full Text Available Facebook allows people to easily share information about themselves which in some cases could be classified as confidential or sensitive in the organisation they’re working for. In this paper we discuss the type of data stored by Facebook and the scope of the terms “confidential” and “sensitive data”. The intersection of these areas shows that there is high possibility for confidential data disclosure in organisations with none or ineffective security policy. This paper proposes a strategy for managing the risks of information leakage. We define five levels of controls against posting non-public data on Facebook - security policy, applications installed on employees’ workstations, specific router software or firmware, software in the cloud, Facebook itself. Advantages and disadvantages of every level are evaluated. As a result we propose developing of new control integrated in the social media.

  3. Control of Bank Consolidated Financial Statements Quality

    Directory of Open Access Journals (Sweden)

    Margarita S. Ambarchyan

    2013-01-01

    Full Text Available The author presents the multiple linear regression model of bank consolidated financial statements quality. The article considers six characteristics that can be used to estimate the level of bank consolidated financial statements quality. The multiple linear regression model was developed, using the results of point-based system of consolidated financial statements of thirty European bank and financial groups on the basis of the developed characteristics. The author offers to use the characteristic significance factor in the process of consolidated financial statements appraisal by points. The constructed regression model is checked on accuracy and statistical significance. The model can be used by internal auditors and financial analytics as an instrument for bank and non-bank consolidated financial statements quality control

  4. Position Statement on Active Outdoor Play

    OpenAIRE

    Tremblay, Mark S.; Gray, Casey; Babcock, Shawna; Barnes, Joel; Costas Bradstreet, Christa; Carr, Dawn; Chabot, Guylaine; Choquette, Louise; Chorney, David; Collyer, Cam; Herrington, Susan; Janson, Katherine; Janssen, Ian; Larouche, Richard; Pickett, William

    2015-01-01

    A diverse, cross-sectorial group of partners, stakeholders and researchers, collaborated to develop an evidence-informed Position Statement on active outdoor play for children aged 3–12 years. The Position Statement was created in response to practitioner, academic, legal, insurance and public debate, dialogue and disagreement on the relative benefits and harms of active (including risky) outdoor play. The Position Statement development process was informed by two systematic reviews, a critic...

  5. In Brief: Geoengineering draft statement

    Science.gov (United States)

    Showstack, Randy

    2009-04-01

    The American Meteorological Society (AMS) has prepared a draft policy statement on geoengineering the climate system, which the AMS Council is considering for approval. The statement notes, “Geoengineering will not substitute for either aggressive mitigation or proactive adaptation. It could contribute to a comprehensive risk management strategy to slow climate change and alleviate its negative impacts, but the potential for adverse and unintended consequences implies a need for adequate research, appropriate regulation, and transparent consideration.” The statement, if adopted, indicates that AMS recommends enhanced research on the scientific and technological potential for geoengineering the climate system; additional study of the historical, ethical, legal, political, and societal aspects of the geoengineering issues; and the development and analysis of policy options to promote transparency and international cooperation in exploring geoengineering options along with restrictions on reckless efforts to manipulate the climate system. AMS is accepting comments on the draft statement until 23 April. For more information, visit http://ametsoc.org/policy/draftstatements/index.html#draft.

  6. Private business: the uptake of confidential HIV testing in remote aboriginal communities on the Anangu Pitjantjatjara Lands.

    Science.gov (United States)

    Miller, P J; Torzillo, P J

    1998-10-01

    Despite a concentration of risk factors for HIV transmission, many remote Aboriginal communities in central Australia have a low uptake of HIV testing. We studied the uptake of HIV testing in six clinics in remote Aboriginal communities following the introduction of voluntary confidential testing to assess the impact of the intervention and to determine if the program was reaching people most at risk of HIV infection and transmission. The study was conducted by Nganampa Health Council, an Aboriginal-controlled health service on the Anangu Pitjantjatjara Lands in the far north-west of South Australia. Since the introduction of confidential coded testing in August 1994 the number of HIV tests provided through the remote clinics has increased from 83 tests/year to 592 tests/year. In the 12-month audit period (August 1, 1995, to July 31, 1996) 62.7% of women aged 20-24 years, 44.6% of people aged 12-40 years and 24% of the total population had an HIV test. Fifty per cent of tests were accounted for by the 15-25 year age groups and 60% of tests related to an STD consult. This study shows that a high uptake of HIV testing in high-risk groups can be achieved in remote Aboriginal communities where a high level of confidentiality is maintained.

  7. 17 CFR 210.9-04 - Income statements.

    Science.gov (United States)

    2010-04-01

    ... 17 Commodity and Securities Exchanges 2 2010-04-01 2010-04-01 false Income statements. 210.9-04... the face of the income statement or in the notes thereto. 1. Interest and fees on loans. Include... AND REQUIREMENTS FOR FINANCIAL STATEMENTS, SECURITIES ACT OF 1933, SECURITIES EXCHANGE ACT OF 1934...

  8. A rural/urban comparison of privacy and confidentiality concerns associated with providing sensitive location information in epidemiologic research involving persons who use drugs.

    Science.gov (United States)

    Rudolph, Abby E; Young, April M; Havens, Jennifer R

    2017-11-01

    Analyses that link contextual factors with individual-level data can improve our understanding of the "risk environment"; however, the accuracy of information provided by participants about locations where illegal/stigmatized behaviors occur may be influenced by privacy/confidentiality concerns that may vary by setting and/or data collection approach. We recruited thirty-five persons who use drugs from a rural Appalachian town and a Mid-Atlantic city to participate in in-depth interviews. Through thematic analyses, we identified and compared privacy/confidentiality concerns associated with two survey methods that (1) collect self-reported addresses/cross-streets and (2) use an interactive web-based map to find/confirm locations in rural and urban settings. Concerns differed more by setting than between methods. For example, (1) rural participants valued interviewer rapport and protections provided by the Certificate of Confidentiality more; (2) locations considered to be sensitive differed in rural (i.e., others' homes) and urban (i.e., where drugs were used) settings; and (3) urban participants were more likely to view providing cross-streets as an acceptable alternative to providing exact addresses for sensitive locations and to prefer the web-based map approach. Rural-urban differences in privacy/confidentiality concerns reflect contextual differences (i.e., where drugs are used/purchased, population density, and prior drug-related arrests). Strategies to alleviate concerns include: (1) obtain a Certificate of Confidentiality, (2) collect geographic data at the scale necessary for proposed analyses, and (3) permit participants to provide intersections/landmarks in close proximity to actual locations rather than exact addresses or to skip questions where providing an intersection/landmark would not obfuscate the actual address. Copyright © 2017 Elsevier Ltd. All rights reserved.

  9. Confidentiality Issues and Use of Sexually Transmitted Disease Services Among Sexually Experienced Persons Aged 15-25 Years - United States, 2013-2015.

    Science.gov (United States)

    Leichliter, Jami S; Copen, Casey; Dittus, Patricia J

    2017-03-10

    National-level data are limited regarding confidentiality-related issues and the use of sexually transmitted disease (STD) services for adolescents and young adults. Changes in the U.S. health care system have permitted dependent children to remain on a parent's health insurance plan until the child's 26th birthday and required coverage of certain preventive services, including some STD services, without cost sharing for most plans (1,2). Although these provisions likely facilitate access to the health care system, adolescents and young adults might not seek care or might delay seeking care for certain services because of concerns about confidentiality, including fears that their parents might find out (3,4). Therefore, it is important to examine STD services and confidentiality-related issues among persons aged 15-25 years in the United States. CDC analyzed data from the 2013-2015 National Survey of Family Growth and found that 12.7% of sexually experienced youths (adolescents aged 15-17 years and those young adults aged 18-25 years who were on a parent's insurance plan) would not seek sexual and reproductive health care because of concerns that their parents might find out. Particularly concerned were persons aged 15-17 years (22.6%). Females with confidentiality concerns regarding seeking sexual and reproductive health care reported a lower prevalence of receipt of chlamydia screening (17.1%) than did females who did not cite such concerns (38.7%). More adolescents aged 15-17 years who spent time alone with a health care provider (without a parent in the room) reported receipt of a sexual risk assessment (71.1%) and, among females, chlamydia testing (34.0%), than did those who did not spend time alone (36.6% and 14.9%, respectively). The results indicated that confidentiality-related issues were associated with less reported use of some STD services, especially for younger persons and females. Spending time alone with a provider (i.e., without a parent present

  10. 40 CFR 271.7 - Attorney General's statement.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 26 2010-07-01 2010-07-01 false Attorney General's statement. 271.7... Authorization § 271.7 Attorney General's statement. (a) Any State that seeks to administer a program under this subpart shall submit a statement from the State Attorney General (or the attorney for those State agencies...

  11. 17 CFR 210.7-04 - Income statements.

    Science.gov (United States)

    2010-04-01

    ... 17 Commodity and Securities Exchanges 2 2010-04-01 2010-04-01 false Income statements. 210.7-04... 1940, AND ENERGY POLICY AND CONSERVATION ACT OF 1975 Insurance Companies § 210.7-04 Income statements... face of the income statements and in the notes thereto filed for persons to whom this article pertains...

  12. 14 CFR 21.130 - Statement of conformity.

    Science.gov (United States)

    2010-01-01

    ... 14 Aeronautics and Space 1 2010-01-01 2010-01-01 false Statement of conformity. 21.130 Section 21... conformity. Each holder or licensee of a type certificate only, for a product manufactured in the United... Administrator a statement of conformity (FAA Form 317). This statement must be signed by an authorized person...

  13. Half of Vermont Academic and Public Libraries Lack Written Confidentiality Policies Despite Directors’ Support for Principles of Patron Confidentiality. A Review of: Magi, Trina J., “The Gap between Theory and Practice: A Study of the Prevalence and Strength of Patron Confidentiality Policies in Public and Academic Libraries.” Library & Information Science Research 29 (2007: 455-70.

    Directory of Open Access Journals (Sweden)

    Stephanie Walker

    2008-09-01

    Full Text Available Objectives – To examine the prevalence and strength of patron confidentiality policies and practices at academic and public libraries in Vermont; to examine variances in policies by type and size of library and by qualifications of library directors; and to examine the level of support among Vermont library directors for strengthening state law to clarify that personally identifiable information about library patrons is confidential and should only be released with a court order.Design – Survey (non-randomized of 213 library directors.Setting – Academic and public libraries in Vermont (USA.Subjects – The initial audience was defined to be the directors of the 213 academic and public libraries in Vermont (as the persons to whom the survey was directed. Ultimately, results from 149 returned surveys were used as a basis for analysis. In addition, a written report of the information gathered was provided to the governing bodies of the Vermont Department of Libraries and the Vermont Library Association. The author also anticipates that the results of the survey will be of general interest to academic and public librarians.Methods – A literature review of previous research on library policies and practices regarding patron confidentiality was completed. As well, the author examined the various state and federal laws and library association codes of ethics which address issues of the confidentiality of library patron data. A paper questionnaire was mailed on January 11, 2006, to directors of 188 municipal and incorporated public libraries (including 11 combined public and school libraries and 25 college and university libraries, for a total of 213 libraries targeted. Cover letters explaining the purpose of the study and assuring respondents of the confidentiality of their responses were included in the mailing. The contact information came from a list supplied by the Vermont Department of Libraries. The questionnaire had previously been

  14. Resonating Statements: Discursive acts in IT projects

    DEFF Research Database (Denmark)

    Hjelholt, Morten; Jensen, Tina Blegind

    2015-01-01

    IT projects are often complex arrangements of technological components, social actions, and organizational transformation that are difficult to manage in practice. This paper takes an analytical discourse perspective to explore the process of legitimizing IT projects. We introduce the concept...... of resonating statements to highlight how central actors navigate in various discourses over time. Particularly, the statements and actions of an IT project manager are portrayed to show how individuals can legitimize actions by connecting statements to historically produced discourses. The case study...... of an IT project in a Danish local government spans a two-year time period and demonstrates a double-loop legitimization process. First, resonating statements are produced to localize a national IT initiative to support the specificity of a local government discourse. Second, the resonating statements are used...

  15. Higher threat avoidance costs reduce avoidance behaviour which in turn promotes fear extinction in humans.

    Science.gov (United States)

    Rattel, Julina A; Miedl, Stephan F; Blechert, Jens; Wilhelm, Frank H

    2017-09-01

    Theoretical models specifying the underlying mechanisms of the development and maintenance of anxiety and related disorders state that fear responses acquired through classical Pavlovian conditioning are maintained by repeated avoidance behaviour; thus, it is assumed that avoidance prevents fear extinction. The present study investigated behavioural avoidance decisions as a function of avoidance costs in a naturalistic fear conditioning paradigm. Ecologically valid avoidance costs - manipulated between participant groups - were represented via time-delays during a detour in a gamified computer task. After differential acquisitions of shock-expectancy to a predictive conditioned stimulus (CS+), participants underwent extinction where they could either take a risky shortcut, while anticipating shock signaled by the CS+, or choose a costly avoidance option (lengthy detour); thus, they were faced with an approach-avoidance conflict. Groups with higher avoidance costs (longer detours) showed lower proportions of avoiders. Avoiders gave heightened shock-expectancy ratings post-extinction, demonstrating 'protecting from extinction', i.e. failure to extinguish. Moreover, there was an indirect effect of avoidance costs on protection from extinction through avoidance behaviour. No moderating role of trait-anxiety was found. Theoretical implications of avoidance behaviour are discussed, considering the involvement of instrumental learning in the maintenance of fear responses. Copyright © 2016 Elsevier Ltd. All rights reserved.

  16. Direct Speaker Gaze Promotes Trust in Truth-Ambiguous Statements.

    Science.gov (United States)

    Kreysa, Helene; Kessler, Luise; Schweinberger, Stefan R

    2016-01-01

    A speaker's gaze behaviour can provide perceivers with a multitude of cues which are relevant for communication, thus constituting an important non-verbal interaction channel. The present study investigated whether direct eye gaze of a speaker affects the likelihood of listeners believing truth-ambiguous statements. Participants were presented with videos in which a speaker produced such statements with either direct or averted gaze. The statements were selected through a rating study to ensure that participants were unlikely to know a-priori whether they were true or not (e.g., "sniffer dogs cannot smell the difference between identical twins"). Participants indicated in a forced-choice task whether or not they believed each statement. We found that participants were more likely to believe statements by a speaker looking at them directly, compared to a speaker with averted gaze. Moreover, when participants disagreed with a statement, they were slower to do so when the statement was uttered with direct (compared to averted) gaze, suggesting that the process of rejecting a statement as untrue may be inhibited when that statement is accompanied by direct gaze.

  17. 21 CFR 201.50 - Statement of identity.

    Science.gov (United States)

    2010-04-01

    ... 21 Food and Drugs 4 2010-04-01 2010-04-01 false Statement of identity. 201.50 Section 201.50 Food... identity. (a) The label of prescription and insulin-containing drugs in package form shall bear as one of its principal features a statement of the identity of the drug. (b) Such statement of identity shall...

  18. A Transient Dopamine Signal Represents Avoidance Value and Causally Influences the Demand to Avoid

    Science.gov (United States)

    Pultorak, Katherine J.; Schelp, Scott A.; Isaacs, Dominic P.; Krzystyniak, Gregory

    2018-01-01

    Abstract While an extensive literature supports the notion that mesocorticolimbic dopamine plays a role in negative reinforcement, recent evidence suggests that dopamine exclusively encodes the value of positive reinforcement. In the present study, we employed a behavioral economics approach to investigate whether dopamine plays a role in the valuation of negative reinforcement. Using rats as subjects, we first applied fast-scan cyclic voltammetry (FSCV) to determine that dopamine concentration decreases with the number of lever presses required to avoid electrical footshock (i.e., the economic price of avoidance). Analysis of the rate of decay of avoidance demand curves, which depict an inverse relationship between avoidance and increasing price, allows for inference of the worth an animal places on avoidance outcomes. Rapidly decaying demand curves indicate increased price sensitivity, or low worth placed on avoidance outcomes, while slow rates of decay indicate reduced price sensitivity, or greater worth placed on avoidance outcomes. We therefore used optogenetics to assess how inducing dopamine release causally modifies the demand to avoid electrical footshock in an economic setting. Increasing release at an avoidance predictive cue made animals more sensitive to price, consistent with a negative reward prediction error (i.e., the animal perceives they received a worse outcome than expected). Increasing release at avoidance made animals less sensitive to price, consistent with a positive reward prediction error (i.e., the animal perceives they received a better outcome than expected). These data demonstrate that transient dopamine release events represent the value of avoidance outcomes and can predictably modify the demand to avoid. PMID:29766047

  19. Nuclear safety policy statement in korea

    International Nuclear Information System (INIS)

    Kim, W.S.; Kim, H.J.; Choi, K.S.; Choi, Y.S.; Park, D.K.

    2006-01-01

    Full text: Wide varieties of programs to enhance nuclear safety have been established and implemented by the Korean government in accordance with the Nuclear Safety Policy Statement announced in September 1994. The policy statement was intended to set the long-term policy goals for maintaining and achieving high-level of nuclear safety and also help the public understand the national policy and a strong will of the government toward nuclear safety. It has been recognized as very effective in developing safety culture in nuclear-related organizations and also enhancing nuclear safety in Korea. However, ageing of operating nuclear power plants and increasing of new nuclear facilities have demanded a new comprehensive national safety policy to cover the coming decade, taking the implementation results of the policy statement of 1994 and the changing environment of nuclear industries into consideration. Therefore, the results of safety policy implementation have been reviewed and, considering changing environment and future prospects, a new nuclear safety policy statement as a highest level national policy has been developed. The implementation results of 11 regulatory policy directions such as the use of Probabilistic Safety Assessment, introduction of Periodic Safety Review, strengthening of safety research, introduction of Risk Based Regulation stipulated in the safety policy statement of 1994 were reviewed and measures taken after various symposia on nuclear safety held in Nuclear Safety Days since 1995 were evaluated. The changing international and domestic environment of nuclear industry were analysed and future prospects were explored. Based on the analysis and review results, a draft of new nuclear safety policy statement was developed. The draft was finalized after the review of many prominent experts in Korea. Considering changing environment and future prospects, new policy statement that will show government's persistent will for nuclear safety has been

  20. Consent, competence, and confidentiality related to psychiatric conditions in adolescent medicine practice.

    Science.gov (United States)

    Campbell, Amy T

    2006-02-01

    Health care for adolescents with psychiatric conditions plays out on a complex stage with considerable state variation, based on a mix of statutory and case law. Added to this are less defined factors such as level of trust in community providers, level of cooperation between generalists and specialists, and local regulatory stances toward adolescent health care and mental health care. And, of course, there is the great diversity in diagnosis and maturity level, as well as family cohesion, from patient to patient (and even within a given patient across time). Finally, this situation resides within a larger environment of stigma vis-a-vis mental health care, most notably evident in the United States in disparate insurance coverage of mental versus physical health treatment. With so complex and varied a picture, clinicians should consult with legal counsel to understand applicable state law and local regulatory guidance (if any)and should also seek out ethical consultation when law does not apply or is not decisive, leaving ongoing concerns. And, as with clinical decision-making, in law and ethics "facts matter" [4]. A growing body of law carves out exceptions to general requirements for parental consent, including in mental health care. Ethically informed discussion around capacity determinations, the consent process, and confidentiality can help engage adolescents as "emerging adults"while remaining mindful of risky behavior and "immediate future" orientation that can be hallmarks of adolescence [30]. Respect for the adolescent, parental responsibility toward their child's best interests, and the family unit generally are paramount. Respect--coupled with caution, greater disclosure and cultural sensitivity, and a participatory approach to decision-making that seeks out the least restrictive and coercive options-can help avoid potential legal traps. How best to proceed? It truly depends-with law and ethics the start (not end) of the discussion and analysis.

  1. A Crowd Avoidance Method Using Circular Avoidance Path for Robust Person Following

    Directory of Open Access Journals (Sweden)

    Kohei Morishita

    2017-01-01

    Full Text Available A life-support service robot must avoid both static and dynamic obstacles for working in a real environment. Here, a static obstacle means an obstacle that does not move, and a dynamic obstacle is the one that moves. Assuming the robot is following a target person, we discuss how the robot avoids a crowd through which the target person passes and arrives at the target position. The purpose of this paper is to propose a crowd avoidance method that makes a robot to be able to avoid both static and dynamic obstacles. The method uses the surface points of the obstacles to form an avoidance region, and the robot moves along the edge of the region. We conducted experiments assuming various situations such that the robot was blocked, there was a wide gap in the crowd, or a person in the crowd yielded for the robot to pass through. As an experimental result, it was confirmed the robot could avoid the crowd even when the obstacles were aligned in an “inverted wedge” shape.

  2. Safeguarding critical e-documents implementing a program for securing confidential information assets

    CERN Document Server

    Smallwood, Robert F

    2012-01-01

    Practical, step-by-step guidance for corporations, universities and government agencies to protect and secure confidential documents and business records Managers and public officials are looking for technology and information governance solutions to "information leakage" in an understandable, concise format. Safeguarding Critical E-Documents provides a road map for corporations, governments, financial services firms, hospitals, law firms, universities and other organizations to safeguard their internal electronic documents and private communications.Provides practical, step-by-step guidance o

  3. Airborne Collision Detection and Avoidance for Small UAS Sense and Avoid Systems

    Science.gov (United States)

    Sahawneh, Laith Rasmi

    The increasing demand to integrate unmanned aircraft systems (UAS) into the national airspace is motivated by the rapid growth of the UAS industry, especially small UAS weighing less than 55 pounds. Their use however has been limited by the Federal Aviation Administration regulations due to collision risk they pose, safety and regulatory concerns. Therefore, before civil aviation authorities can approve routine UAS flight operations, UAS must be equipped with sense-and-avoid technology comparable to the see-and-avoid requirements for manned aircraft. The sense-and-avoid problem includes several important aspects including regulatory and system-level requirements, design specifications and performance standards, intruder detecting and tracking, collision risk assessment, and finally path planning and collision avoidance. In this dissertation, our primary focus is on developing an collision detection, risk assessment and avoidance framework that is computationally affordable and suitable to run on-board small UAS. To begin with, we address the minimum sensing range for the sense-and-avoid (SAA) system. We present an approximate close form analytical solution to compute the minimum sensing range to safely avoid an imminent collision. The approach is then demonstrated using a radar sensor prototype that achieves the required minimum sensing range. In the area of collision risk assessment and collision prediction, we present two approaches to estimate the collision risk of an encounter scenario. The first is a deterministic approach similar to those been developed for Traffic Alert and Collision Avoidance (TCAS) in manned aviation. We extend the approach to account for uncertainties of state estimates by deriving an analytic expression to propagate the error variance using Taylor series approximation. To address unanticipated intruders maneuvers, we propose an innovative probabilistic approach to quantify likely intruder trajectories and estimate the probability of

  4. 7 CFR 1980.445 - Periodic financial statements and audits.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 14 2010-01-01 2009-01-01 true Periodic financial statements and audits. 1980.445... Program § 1980.445 Periodic financial statements and audits. All borrowers will be required to submit periodic financial statements to the lender. Lenders must forward copies of the financial statements and...

  5. THE FINANCIAL STATEMENTS OF USER REQUIREMENTS

    Directory of Open Access Journals (Sweden)

    Olga Gandziuk

    2016-11-01

    Full Text Available The aim of the study is to investigate qualitative characteristics of financial reporting in the context of the interests of different groups of users. The subject of research is the financial statements of the enterprise. Methodology. The theoretical base of the study are the provisions of general scientific theory of knowledge studied phenomena and processes, in particular: the methods of induction and deduction (in determining the principles of formation of the financial statements; analysis and synthesis (in establishing the role and importance of reporting to the needs of users comparisons, associations and analogies (the justification of qualitative characteristics of financial statements. The information base for scientific research became scientific papers and publications of domestic and foreign scientists-economists, materials of scientific-practical conferences, legislative and normative documents, the World Bank materials and International Accounting Standards Board. Results of the research showed that in the present conditions of economic activities of Ukrainian enterprises, for the effective functioning of the company, is required to have them control system was adequate to the environment, and this is possible only if the relevant information systems. The financial statement plays a crucial role in the management of the company and is the main source of information about the firm’s financial condition. The basic groups of users of financial statements, depending on the interest that they show to the results of activity of the enterprise: external and internal. External users are classified into direct users and not a direct financial interest. It was determined that the financial statements should meet, first of all, the information needs of users with a direct financial interest, it is this group of users has the most leverage to influence the company. The influence of the quality characteristics of the formation of the real

  6. 78 FR 2669 - Waste Import and Export; Inquiry To Learn Whether Businesses Assert Business Confidentiality Claims

    Science.gov (United States)

    2013-01-14

    ... definition of ``affected business,'' and are not covered by today's notice. They consist of any business that... waste'' is defined at 40 CFR 273.9. Certain businesses, however, do not meet the definition of...; Inquiry To Learn Whether Businesses Assert Business Confidentiality Claims AGENCY: Environmental...

  7. Direct Speaker Gaze Promotes Trust in Truth-Ambiguous Statements.

    Directory of Open Access Journals (Sweden)

    Helene Kreysa

    Full Text Available A speaker's gaze behaviour can provide perceivers with a multitude of cues which are relevant for communication, thus constituting an important non-verbal interaction channel. The present study investigated whether direct eye gaze of a speaker affects the likelihood of listeners believing truth-ambiguous statements. Participants were presented with videos in which a speaker produced such statements with either direct or averted gaze. The statements were selected through a rating study to ensure that participants were unlikely to know a-priori whether they were true or not (e.g., "sniffer dogs cannot smell the difference between identical twins". Participants indicated in a forced-choice task whether or not they believed each statement. We found that participants were more likely to believe statements by a speaker looking at them directly, compared to a speaker with averted gaze. Moreover, when participants disagreed with a statement, they were slower to do so when the statement was uttered with direct (compared to averted gaze, suggesting that the process of rejecting a statement as untrue may be inhibited when that statement is accompanied by direct gaze.

  8. 17 CFR 210.10-01 - Interim financial statements.

    Science.gov (United States)

    2010-04-01

    ... financial statements, such as a statement of significant accounting policies and practices, details of... degree as allowed in this paragraph) and disclosures required by Statement of Financial Accounting... Financial Accounting Standards Board that requires such change. (7) Any material retroactive prior period...

  9. The Interim Financial Statements: The Case of Greece

    OpenAIRE

    Rogdaki, E.I.; Kazantzis, Ch.

    1999-01-01

    The following paper refers to the accounting and auditing issues which emerge in the preparation of the interim financial statements of the companies: Firstly, the interim financial statements are defined as being the financial statements that provide useful information about the financial position and the financial results of a company which are realized and accrued during the fiscal year. The interim financial statements can be prepared on a monthly basis, on a quarterly basis or covering a...

  10. 17 CFR 210.3-12 - Age of financial statements at effective date of registration statement or at mailing date of...

    Science.gov (United States)

    2010-04-01

    ... 17 Commodity and Securities Exchanges 2 2010-04-01 2010-04-01 false Age of financial statements at... FOR FINANCIAL STATEMENTS, SECURITIES ACT OF 1933, SECURITIES EXCHANGE ACT OF 1934, PUBLIC UTILITY... POLICY AND CONSERVATION ACT OF 1975 General Instructions As to Financial Statements § 210.3-12 Age of...

  11. Data-protection standards and confidentiality of HIV/AIDS status in the workplace - a South African case study.

    Science.gov (United States)

    Muskat-Gorska, Zuzanna

    2008-11-01

    The article contextualises an emerging new regime for information privacy in South Africa (i.e. the draft Protection of Personal Information Bill). Subsequently, it discusses the possibility of successful implementation of international data-protection standards in an environment where there is an urgent need to balance HIV/AIDS confidentiality rights with public health requirements. Also, the article presents a preliminary assessment of the possible impact of professionalisation (and outsourcing) of workplace HIV/AIDS management on workplace data-protection practices, and it identifies some spaces for social dialogue on HIV/AIDS-data treatment in South Africa. The study methods comprise an analysis of legal documents (concerning international data-protection standards and the development of law governing data protection and HIV/AIDS confidentiality in South Africa) and interviews conducted with workplace health managers and trade union representatives, in Johannesburg, in 2007.

  12. 17 CFR 210.3-03 - Instructions to income statement requirements.

    Science.gov (United States)

    2010-04-01

    ... Financial Statements § 210.3-03 Instructions to income statement requirements. (a) The statements required... businesses, it may at its option include statements of income and cash flows (which may be unaudited) for the... statements of income and cash flows for the interim periods specified. (c) If a period or periods reported on...

  13. Measuring financial performance: an overview of financial statements.

    Science.gov (United States)

    Dalsted, N L

    1995-07-01

    Financial management has emerged as a critical component in the long-term viability of today's ranches and farms. Proper and timely financial reporting and analysis of financial statements are valuable tools that agricultural producers can use to monitor, coordinate, and plan their operational production and marketing schemes and strategies. A side note to preparation of financial statements. With the concerns over lender liability issues associated with statements either assisted with or prepared by a lending officer, agricultural producers will be responsible for preparing their own statements. The lending institutions may prepare their own statements in their assessment of the financial condition of a business and or individual, but, ultimately, the responsibility of financial statements is the borrower's. Some of the material presented in this article provides important input for use in such analytical programs as the National Cattlemen's Association, Integrated Resource Committees, and Standard Performance Analysis (SPA). SPA techniques and associated software have been or currently are under development for cow-calf, stocker, seedstock, and sheep enterprises. Critical to the analysis is having complete and correct financial statements. These analytical programs build on the financial statements. These analytical programs build on the financial statements as recommended by the FFSTF. Proper financial reporting is critical not only to a SPA assessment but also to the overall financial management of today's farms and ranches. Recognizing the importance of financial management in production agriculture is not enough, taking a proactive stance in one's financial plan is paramount to success. Failure to do so will only enhance the exit rates of producers from production agriculture.

  14. 47 CFR 1.1314 - Environmental impact statements (EISs).

    Science.gov (United States)

    2010-10-01

    ... 47 Telecommunication 1 2010-10-01 2010-10-01 false Environmental impact statements (EISs). 1.1314... Procedures Implementing the National Environmental Policy Act of 1969 § 1.1314 Environmental impact statements (EISs). (a) Draft Environmental Impact Statements (DEISs) (§ 1.1315) and Final Environmental...

  15. 12 CFR 350.5 - Alternative annual disclosure statements.

    Science.gov (United States)

    2010-01-01

    ... bank subsidiary of a holding company which provides only the consolidated financial statements of the... audited financial statements, by copies of the audited financial statements and the certificate or report... the Securities and Exchange Commission or by sections in the holding company's consolidated financial...

  16. Changes in public attitudes towards confidential adolescent sexual and reproductive health services in Lithuania after the introduction of new legislation: findings from the cross-sectional surveys conducted in 2005 and 2012.

    Science.gov (United States)

    Jaruseviciene, Lina; Zaborskis, Apolinaras; Sauliune, Skirmante; Jarusevicius, Gediminas; Lazarus, Jeffrey V

    2015-09-04

    In Lithuania, the right to confidentiality in healthcare for adolescents over the age of 16 was guaranteed in 2010 through the adoption of new legislation. This study sets out to explore changes in Lithuanian residents' attitudes towards confidentiality protection in adolescent sexual and reproductive healthcare (SRH) by comparing data from surveys administered in 2005 and 2012. For both surveys, the participants were random samples of the Lithuanian residents aged 16 to 74. A 23-item questionnaire was used in 2005 and complemented with 2 items in 2012. Linear regression analysis was employed to estimate absolute differences in prevalence of belief in whether or not adolescents would find confidentiality important when consulting a physician on SRH issues. A log-binomial regression model was fitted to estimate the relative changes (prevalence ratio) of the independent variables. The total number of respondents was 1054 (response rate 83%) in 2005 and 1002 (response rate 80%) in 2012. The proportion of respondents who reported a belief that adolescents would find confidentiality important when seeing a physician for SRH issues increased significantly from 62% in 2005 to 73% in 2012. Regardless of their belief in the importance of confidentiality, in 2012 respondents more often indicated positive outcomes on the relations between the physician and the minor patient, such as increased trust of the adolescent in the physician and more frequent visits to physicians. However, study participants who believed that adolescents would find confidentiality important in 2012 were less optimistic about potential positive outcomes of further legal consolidation of adolescents' right to confidentiality than in 2005. Younger respondents were the most optimistic about potential outcomes if laws were enacted to further protect adolescent confidentiality. This study uncovers the dynamics of public attitudes towards the socially and ethically sensitive issue of adolescent SRH. Our

  17. Reconfiguring waveguide-gratings-based M-signature codecs to enhance OCDMA network confidentiality

    Science.gov (United States)

    Huang, Jen-Fa; Chen, Kai-Sheng; Lin, Ying-Chen; Li, Chung-Yu

    2014-02-01

    A reconfiguration scheme based on composite signature codes over waveguide-gratings-based optical code-division multiple-access (OCDMA) network coder/decoders (codecs) is proposed in the paper. By using central control node to monitor network traffic condition and reconfigure the composite signature codes made up of maximal-length sequence (M-sequence) component codes and random changing the signature codes assigned for each user to improve the confidentiality performance in an OCDMA system. The proposed scheme is analyzed with some practical eavesdroppers' attacks.

  18. 48 CFR 1552.235-77 - Data Security for Federal Insecticide, Fungicide and Rodenticide Act Confidential Business...

    Science.gov (United States)

    2010-10-01

    ... 48 Federal Acquisition Regulations System 6 2010-10-01 2010-10-01 true Data Security for Federal Insecticide, Fungicide and Rodenticide Act Confidential Business Information (DEC 1997). 1552.235-77 Section... SOLICITATION PROVISIONS AND CONTRACT CLAUSES Texts of Provisions and Clauses 1552.235-77 Data Security for...

  19. 76 FR 52659 - Access by EPA Contractors to Confidential Business Information (CBI) Related to the Greenhouse...

    Science.gov (United States)

    2011-08-23

    ... Confidential Business Information (CBI) Related to the Greenhouse Gas Reporting Program AGENCY: Environmental... contractors named in this notice to access information that will be submitted to EPA under the Greenhouse Gas...), EPA created the Greenhouse Gas Reporting Program (GHGRP), 40 CFR part 98 (part 98), which requires...

  20. 10 CFR 51.95 - Postconstruction environmental impact statements.

    Science.gov (United States)

    2010-01-01

    ... NRC staff will prepare a supplement to the final environmental impact statement on the construction... 10 Energy 2 2010-01-01 2010-01-01 false Postconstruction environmental impact statements. 51.95... Implementing Section 102(2) Final Environmental Impact Statements-Production and Utilization Facilities § 51.95...

  1. 17 CFR 210.8-03 - Interim financial statements.

    Science.gov (United States)

    2010-04-01

    ... 17 Commodity and Securities Exchanges 2 2010-04-01 2010-04-01 false Interim financial statements... AND CONTENT OF AND REQUIREMENTS FOR FINANCIAL STATEMENTS, SECURITIES ACT OF 1933, SECURITIES EXCHANGE... ADVISERS ACT OF 1940, AND ENERGY POLICY AND CONSERVATION ACT OF 1975 Article 8 Financial Statements of...

  2. 17 CFR 210.8-02 - Annual financial statements.

    Science.gov (United States)

    2010-04-01

    ... 17 Commodity and Securities Exchanges 2 2010-04-01 2010-04-01 false Annual financial statements... AND CONTENT OF AND REQUIREMENTS FOR FINANCIAL STATEMENTS, SECURITIES ACT OF 1933, SECURITIES EXCHANGE... ADVISERS ACT OF 1940, AND ENERGY POLICY AND CONSERVATION ACT OF 1975 Article 8 Financial Statements of...

  3. 16 CFR 1.85 - Final environmental impact statements.

    Science.gov (United States)

    2010-01-01

    ... 16 Commercial Practices 1 2010-01-01 2010-01-01 false Final environmental impact statements. 1.85... Final environmental impact statements. (a) After the close of the comment period, the Bureau responsible for the matter will consider the comments received on the draft environmental impact statement and...

  4. 76 FR 21345 - Environmental Impacts Statements;

    Science.gov (United States)

    2011-04-15

    ... ENVIRONMENTAL PROTECTION AGENCY [ER-FRL-8996-4] Environmental Impacts Statements; Notice of Availability Responsible Agency: Office of Federal Activities, General Information (202) 564-1399 or http://www.epa.gov/compliance/nepa/ Weekly receipt of Environmental Impact Statements Filed 04/04/2011 Through 04...

  5. 78 FR 48672 - Environmental Impacts Statements;

    Science.gov (United States)

    2013-08-09

    ... ENVIRONMENTAL PROTECTION AGENCY [ER-FRL-9010-5] Environmental Impacts Statements; Notice of Availability Responsible Agency: Office of Federal Activities, General Information (202) 564-7146 or http://www.epa.gov/compliance/nepa/ . Weekly receipt of Environmental Impact Statements Filed 07/29/2013 Through...

  6. SOME DISCLOSURE ASPECTS REGARDING CONSOLIDATED FINANCIAL STATEMENTS

    OpenAIRE

    Cirstea Andreea; Baltariu Carmen-Alexandra

    2013-01-01

    The purpose of this article is to analyze the current state of consolidated reporting practice harmonization concerning the choice of presenting the income statement, the changes in equity, the methods used for presenting the cash flow statement, the extant methods for evaluating and reporting goodwill, the extant methods in which jointly controlled entities are accounted in the consolidated financial statements, or the choice for recognizing investments in subsidiaries, jointly controlled en...

  7. Disrupted avoidance learning in functional neurological disorder: Implications for harm avoidance theories

    Directory of Open Access Journals (Sweden)

    Laurel S. Morris

    Full Text Available Background: Functional neurological disorder (FND is an elusive disorder characterized by unexplained neurological symptoms alongside aberrant cognitive processing and negative affect, often associated with amygdala reactivity. Methods: We examined the effect of negative conditioning on cognitive function and amygdala reactivity in 25 FND patients and 20 healthy volunteers (HV. Participants were first conditioned to stimuli paired with negative affective or neutral (CS+/CS− information. During functional MRI, subjects then performed an instrumental associative learning task to avoid monetary losses in the context of the previously conditioned stimuli. We expected that FND patients would be better at learning to avoid losses when faced with negatively conditioned stimuli (increased harm avoidance. Multi-echo resting state fMRI was also collected from the same subjects and a robust denoising method was employed, important for removing motion and physiological artifacts. Results: FND subjects were more sensitive to the negative CS+ compared to HV, demonstrated by a reinforcement learning model. Contrary to expectation, FND patients were generally more impaired at learning to avoid losses under both contexts (CS+/CS−, persisting to choose the option that resulted in a negative outcome demonstrated by both behavioural and computational analyses. FND patients showed enhanced amygdala but reduced dorsolateral prefrontal cortex responses when they received negative feedback. Patients also had increased resting state functional connectivity between these two regions. Conclusions: FND patients had impaired instrumental avoidance learning, findings that parallel previous observations of impaired action-outcome binding. FND patients further show enhanced behavioural and neural sensitivity to negative information. However, this did not translate to improved avoidance learning. Put together, our findings do not support the theory of harm avoidance in FND

  8. Codes of professional responsibility for lawyers: ethics or law?

    Science.gov (United States)

    Lawry, R P

    1984-01-01

    The American Bar Association has three times in this century produced a code of ethics for lawyers. The movement has clearly been from a general, hortatory format to one of a statement of principles of law. In the ABA's latest effort, the problems of client confidentiality loom as the most serious and most difficult to solve. The question of ethics versus law weighs heavily in this context, and the ABA's latest resolutions of the confidentiality problems are found to be unsatisfactory.

  9. 40 CFR 790.99 - Statement of financial responsibility.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 31 2010-07-01 2010-07-01 true Statement of financial responsibility... From Test Rules § 790.99 Statement of financial responsibility. Each applicant for an exemption shall submit the following sworn statement with his or her application: I understand that if this application...

  10. Southwestern Power Administration Combined Financial Statements, 2006-2009

    Energy Technology Data Exchange (ETDEWEB)

    None

    2009-09-01

    We have audited the accompanying combined balance sheets of the Southwestern Federal Power System (SWFPS), as of September 30, 2009, 2008, 2007, and 2006, and the related combined statements of revenues and expenses, changes in capitalization, and cash flows for the years then ended. As described in note 1(a), the combined financial statement presentation includes the hydroelectric generation functions of another Federal agency (hereinafter referred to as the generating agency), for which Southwestern Power Administration (Southwestern) markets and transmits power. These combined financial statements are the responsibility of the management of Southwestern and the generating agency. Our responsibility is to express an opinion on these combined financial statements based on our audits. We conducted our audits in accordance with auditing standards generally accepted in the United States of America. Those standards require that we plan and perform the audits to obtain reasonable assurance about whether the combined financial statements are free of material misstatement. An audit includes consideration of internal control over financial reporting as a basis for designing audit procedures that are appropriate in the circumstances, but not for the purpose of expressing an opinion on the effectiveness of Southwestern and the generating agency’s internal control over financial reporting. Accordingly, we express no such opinion. An audit also includes examining, on a test basis, evidence supporting the amounts and disclosures in the combined financial statements, assessing the accounting principles used and significant estimates made by management, as well as evaluating the overall combined financial statement presentation. We believe that our audits provide a reasonable basis for our opinion. In our opinion, the combined financial statements referred to above present fairly, in all material respects, the respective financial position of the Southwestern Federal Power

  11. Stimulus conflict triggers behavioral avoidance.

    Science.gov (United States)

    Dignath, David; Eder, Andreas B

    2015-12-01

    According to a recent extension of the conflict-monitoring theory, conflict between two competing response tendencies is registered as an aversive event and triggers a motivation to avoid the source of conflict. In the present study, we tested this assumption. Over five experiments, we examined whether conflict is associated with an avoidance motivation and whether stimulus conflict or response conflict triggers an avoidance tendency. Participants first performed a color Stroop task. In a subsequent motivation test, participants responded to Stroop stimuli with approach- and avoidance-related lever movements. These results showed that Stroop-conflict stimuli increased the frequency of avoidance responses in a free-choice motivation test, and also increased the speed of avoidance relative to approach responses in a forced-choice test. High and low proportions of response conflict in the Stroop task had no effect on avoidance in the motivation test. Avoidance of conflict was, however, obtained even with new conflict stimuli that had not been presented before in a Stroop task, and when the Stroop task was replaced with an unrelated filler task. Taken together, these results suggest that stimulus conflict is sufficient to trigger avoidance.

  12. 17 CFR 230.417 - Date of financial statements.

    Science.gov (United States)

    2010-04-01

    ... 17 Commodity and Securities Exchanges 2 2010-04-01 2010-04-01 false Date of financial statements... RULES AND REGULATIONS, SECURITIES ACT OF 1933 General Requirements § 230.417 Date of financial statements. Whenever financial statements of any person are required to be furnished as of a date within a...

  13. Saskatchewan Energy Holdings Ltd. consolidated financial statements

    International Nuclear Information System (INIS)

    1991-01-01

    The consolidated financial statements of Saskatchewan Energy Holdings Ltd. (formerly Saskatchewan Energy Corporation) as of December 31, 1990, and the consolidated statements of earnings and retained earnings and changes in cash position for the year are presented. Data include an inventory of supplies, natural gas in storage, property, plant and equipment. Financial statements are also presented for the year ending December 31, 1989, with comparative figures for the seven months ending December 31, 1988

  14. Genesis and Development of Consolidated Financial Statements

    OpenAIRE

    Kostyantyn Bezverkhiy

    2015-01-01

    In the context of economy globalization it is the mission of consolidated financial statements to meet demands of users for financial information about activities of a company group as one company. The article is devoted to study of genesis and development of consolidated financial statements of companies. Historical prerequisites of genesis of consolidated financial statements are shown as well as factors which conduced to their spreading. The approaches are elucidated to preparation of cons...

  15. Saskatchewan Energy Holdings Ltd. consolidated financial statements

    Energy Technology Data Exchange (ETDEWEB)

    1991-01-01

    The consolidated financial statements of Saskatchewan Energy Holdings Ltd. (formerly Saskatchewan Energy Corporation) as of December 31, 1990, and the consolidated statements of earnings and retained earnings and changes in cash position for the year are presented. Data include an inventory of supplies, natural gas in storage, property, plant and equipment. Financial statements are also presented for the year ending December 31, 1989, with comparative figures for the seven months ending December 31, 1988.

  16. Control of Bank Consolidated Financial Statements Quality

    OpenAIRE

    Margarita S. Ambarchyan

    2013-01-01

    The author presents the multiple linear regression model of bank consolidated financial statements quality. The article considers six characteristics that can be used to estimate the level of bank consolidated financial statements quality. The multiple linear regression model was developed, using the results of point-based system of consolidated financial statements of thirty European bank and financial groups on the basis of the developed characteristics. The author offers to use the charact...

  17. 7 CFR 4279.137 - Financial statements.

    Science.gov (United States)

    2010-01-01

    ... accordance with Generally Accepted Accounting Principles will be required. (b) If specific circumstances... 7 Agriculture 15 2010-01-01 2010-01-01 false Financial statements. 4279.137 Section 4279.137... § 4279.137 Financial statements. (a) The lender will determine the type and frequency of submission of...

  18. 29 CFR 570.101 - Introductory statement.

    Science.gov (United States)

    2010-07-01

    ... Regulations Relating to Labor (Continued) WAGE AND HOUR DIVISION, DEPARTMENT OF LABOR REGULATIONS CHILD LABOR REGULATIONS, ORDERS AND STATEMENTS OF INTERPRETATION General Statements of Interpretation of the Child Labor...) This subpart discusses the meaning and scope of the child labor provisions contained in the Fair Labor...

  19. 7 CFR 400.203 - Financial statement and certification.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 6 2010-01-01 2010-01-01 false Financial statement and certification. 400.203 Section...-Standards for Approval § 400.203 Financial statement and certification. (a) An entity desiring to become or continue as a contractor shall submit to the Corporation a financial statement which is as of a date not...

  20. 46 CFR 403.120 - Notes to financial statements.

    Science.gov (United States)

    2010-10-01

    ... 46 Shipping 8 2010-10-01 2010-10-01 false Notes to financial statements. 403.120 Section 403.120... ACCOUNTING SYSTEM General § 403.120 Notes to financial statements. (a) All matters that are not clearly identified in the body of the financial statements of the Association, but which may materially influence...

  1. 12 CFR 18.5 - Alternative annual disclosure statements.

    Science.gov (United States)

    2010-01-01

    ...'s consolidated financial statements on Form FR Y-9c pursuant to Regulation Y of the Federal Reserve... FINANCIAL AND OTHER INFORMATION BY NATIONAL BANKS § 18.5 Alternative annual disclosure statements. The § 18... to be elected; (b) In the case of a national bank with audited financial statements, by those...

  2. 8 CFR 286.5 - Remittance and statement procedures.

    Science.gov (United States)

    2010-01-01

    ... USER FEE § 286.5 Remittance and statement procedures. (a) The air or sea carrier whose ticket stock or... Commissioner, Financial Management a report from the independent accountant in accordance with the Statement on... 8 Aliens and Nationality 1 2010-01-01 2010-01-01 false Remittance and statement procedures. 286.5...

  3. Mission statements: selling corporate values to employees.

    Science.gov (United States)

    Klemm, M; Sanderson, S; Luffman, G

    1991-06-01

    This article investigates the reasons for the increasing use of the Company Mission Statement. Using information from a survey of U.K. companies in 1989 it looks at the types of statements issued by companies, their content, usage, and value to managers. Of particular interest is whether the mission is primarily used for the motivation of staff, or for external image building. Related issues are the value of the mission drafting process in bringing managers together to agree common objectives and the use of a hierarchy of statements to reconcile internal and external stakeholders' interests. The conclusion is that the Mission, which includes a statement of company values, is an important tool for managers to assert their leadership within the organization.

  4. 40 CFR 1502.19 - Circulation of the environmental impact statement.

    Science.gov (United States)

    2010-07-01

    ... impact statement. 1502.19 Section 1502.19 Protection of Environment COUNCIL ON ENVIRONMENTAL QUALITY ENVIRONMENTAL IMPACT STATEMENT § 1502.19 Circulation of the environmental impact statement. Agencies shall circulate the entire draft and final environmental impact statements except for certain appendices as...

  5. Institute of confidential cooperation in the USA: organizational and juridical aspect

    Directory of Open Access Journals (Sweden)

    Іван Іванович Мусієнко

    2016-01-01

    Full Text Available One of the most efficient measures of crime counteraction is timely reporting law enforcement agencies during which a special role is dedicated to persons (informants. They provide assistance to authorized subjects in the sphere of corruption counteraction by giving operative significant information. Thus the article is aimed at the analysis of law enforcement bodies and special services of the USA experience concerning work with confidential sources. The latest tendencies of the US police activities are concentrated on the attraction of citizens to cooperation with police. Such cooperation is efficient in prevention of most hard crimes due to informants' assistance, i.e. people who display desire to cooperate with police. Scientists D. Sunshine and T. Tyler consider that the nature of relations between police and publicity has a great influence on the efficiency of crime counteraction, local citizens' welfare. The authors draw attention to the importance of establishing benevolent relations between police and local population. The given article also reveals the USA law enforcement agencies experience of institute of confidential cooperation using. Using of operative sources of information remains the most efficient tools for detection, suspension, disclosure and investigation of crimes in the whole world. With the aim of achievement of accuracy in terminology it is conducted the identification of different kinds of informants depending on their role and law enforcement institution they collaborate with. Conclusions. Actions in favor of society are a important element of informationship as social institute. The results of conducted analysis testify that the modern understanding of institute of confidential cooperation in the USA is grounded on the following principles: -        the object of message is information about any abuses, violations, immoral behavior that may cause significant violations of rights and duties of citizens

  6. Financial Statement Fraud Detection using Text Mining

    OpenAIRE

    Rajan Gupta; Nasib Singh Gill

    2013-01-01

    Data mining techniques have been used enormously by the researchers’ community in detecting financial statement fraud. Most of the research in this direction has used the numbers (quantitative information) i.e. financial ratios present in the financial statements for detecting fraud. There is very little or no research on the analysis of text such as auditor’s comments or notes present in published reports. In this study we propose a text mining approach for detecting financial statement frau...

  7. 40 CFR 124.61 - Final environmental impact statement.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 21 2010-07-01 2010-07-01 false Final environmental impact statement... environmental impact statement. No final NPDES permit for a new source shall be issued until at least 30 days after the date of issuance of a final environmental impact statement if one is required under 40 CFR 6...

  8. 12 CFR 226.7 - Periodic statement.

    Science.gov (United States)

    2010-01-01

    ... consumer with a periodic statement that discloses the following items, to the extent applicable: (a... convenience of the user, the revised text is set forth as follows: § 226.7 Periodic statement. (a) Rules... consumers may obtain from the creditor more information about the balance computation method and how...

  9. 75 FR 24688 - Access to Confidential Business Information by Guident Technologies Inc.’s Identified Subcontractor

    Science.gov (United States)

    2010-05-05

    ... to a particular entity, consult the technical person listed under FOR FURTHER INFORMATION CONTACT. B... Information Systems and for Test Confidential Business Information Tracking Systems (CBITS) and (TCBITS). In... materials on a need-to- know basis only. All access to TSCA CBI under this contract will take place at EPA...

  10. 10 CFR 51.81 - Distribution of draft environmental impact statement.

    Science.gov (United States)

    2010-01-01

    ... 10 Energy 2 2010-01-01 2010-01-01 false Distribution of draft environmental impact statement. 51...-Regulations Implementing Section 102(2) Draft Environmental Impact Statements-Materials Licenses § 51.81 Distribution of draft environmental impact statement. Copies of the draft environmental impact statement and...

  11. 10 CFR 51.86 - Distribution of draft environmental impact statement.

    Science.gov (United States)

    2010-01-01

    ... 10 Energy 2 2010-01-01 2010-01-01 false Distribution of draft environmental impact statement. 51...-Regulations Implementing Section 102(2) Draft Environmental Impact Statements-Rulemaking § 51.86 Distribution of draft environmental impact statement. Copies of the draft environmental impact statement and any...

  12. Outsourcing medical data analyses: can technology overcome legal, privacy, and confidentiality issues?

    Science.gov (United States)

    Brumen, Bostjan; Heričko, Marjan; Sevčnikar, Andrej; Završnik, Jernej; Hölbl, Marko

    2013-12-16

    Medical data are gold mines for deriving the knowledge that could change the course of a single patient's life or even the health of the entire population. A data analyst needs to have full access to relevant data, but full access may be denied by privacy and confidentiality of medical data legal regulations, especially when the data analyst is not affiliated with the data owner. Our first objective was to analyze the privacy and confidentiality issues and the associated regulations pertaining to medical data, and to identify technologies to properly address these issues. Our second objective was to develop a procedure to protect medical data in such a way that the outsourced analyst would be capable of doing analyses on protected data and the results would be comparable, if not the same, as if they had been done on the original data. Specifically, our hypothesis was there would not be a difference between the outsourced decision trees built on encrypted data and the ones built on original data. Using formal definitions, we developed an algorithm to protect medical data for outsourced analyses. The algorithm was applied to publicly available datasets (N=30) from the medical and life sciences fields. The analyses were performed on the original and the protected datasets and the results of the analyses were compared. Bootstrapped paired t tests for 2 dependent samples were used to test whether the mean differences in size, number of leaves, and the accuracy of the original and the encrypted decision trees were significantly different. The decision trees built on encrypted data were virtually the same as those built on original data. Out of 30 datasets, 100% of the trees had identical accuracy. The size of a tree and the number of leaves was different only once (1/30, 3%, P=.19). The proposed algorithm encrypts a file with plain text medical data into an encrypted file with the data protected in such a way that external data analyses are still possible. The results

  13. IAS 1 Presentation of Financial Statements - A Closer Look

    OpenAIRE

    Muthupandian, K S

    2008-01-01

    The International Accounting Standards Committee issued the International Accounting Standard 1 Presentation of Financial Statements. The objective of IAS 1 is to prescribe the basis for presentation of general purpose financial statements (GPFS), to ensure comparability both with the entity's financial statements of previous periods and with the financial statements of other entities. The objective of GPFS is to provide information about the financial position, financial performance, and cas...

  14. Myopic Regret Avoidance: Feedback Avoidance and Learning in Repeated Decision Making

    Science.gov (United States)

    Reb, Jochen; Connolly, Terry

    2009-01-01

    Decision makers can become trapped by "myopic regret avoidance" in which rejecting feedback to avoid short-term "outcome regret" (regret associated with counterfactual outcome comparisons) leads to reduced learning and greater long-term regret over continuing poor decisions. In a series of laboratory experiments involving repeated choices among…

  15. 27 CFR 7.54 - Prohibited statements.

    Science.gov (United States)

    2010-04-01

    ... statement of alcoholic content permitted under § 7.71 may be depicted in any advertising media. The... statement of alcoholic content permitted under § 7.71 may be displayed in any advertising media. (d) Class..., DEPARTMENT OF THE TREASURY LIQUORS LABELING AND ADVERTISING OF MALT BEVERAGES Advertising of Malt Beverages...

  16. Toward a Statement of Educational Philosophy.

    Science.gov (United States)

    Rasi, Humberto M.

    2001-01-01

    Describes a 2001 conference by the Education Department of the General Conference of Seventh-day Adventists which involved presentations of papers and focus groups and which convened participants to discuss and approve an updated and expanded Statement of Adventist Philosophy of Education. The statement is included in this theme issue. (SM)

  17. Confidentiality, disclosure and doping in sports medicine.

    Science.gov (United States)

    McNamee, M; Phillips, N

    2011-03-01

    The manner in which healthcare and medical professionals serve their athlete patients is governed by a variety of relevant codes of conduct. A range of codified rules is presented that refer both the welfare of the patient and the maintaining of confidentiality, which is at the heart of trustworthy relations. The 2009 version of the World Anti-Doping Code (WADC), however, appears to oblige all healthcare professionals not to assist athletes if they are known to be engaged in doping behaviours under fear of removal from working with athletes from the respective sports. In contrast, serving the best interests of their athlete patients may oblige healthcare professionals to give advice and guidance, not least in terms of harm minimisation. In so far as the professional conduct of a healthcare professional is guided both by professional code and World Anti-Doping Code, they are obliged to fall foul of one or the other. We call for urgent and pressing inter-professional dialogue with the World Anti-Doping Agency to clarify this situation.

  18. Determining relevant financial statement ratios in Department of Defense service component general fund financial statements

    OpenAIRE

    Koetter, Nicholas J.; Krause, Daniel J.; Liptak, Carl S.

    2014-01-01

    Approved for public release; distribution is unlimited Department of Defense (DOD) service components are dedicating significant financial and human resources toward achieving unqualified opinions on audits of their financial statements. The DOD has endeavored to produce auditable financial statements as mandated in the Chief Financial Officers Act of 1990. In December of 2013, the United States Marine Corps became the first service component to achieve an unqualified audit opinion on its ...

  19. 17 CFR 210.3-17 - Financial statements of natural persons.

    Science.gov (United States)

    2010-04-01

    ... 17 Commodity and Securities Exchanges 2 2010-04-01 2010-04-01 false Financial statements of... COMMISSION FORM AND CONTENT OF AND REQUIREMENTS FOR FINANCIAL STATEMENTS, SECURITIES ACT OF 1933, SECURITIES... Financial Statements § 210.3-17 Financial statements of natural persons. (a) In lieu of the financial...

  20. 77 FR 25782 - Environmental Impact Statement: Madison County, IL

    Science.gov (United States)

    2012-05-01

    ... DEPARTMENT OF TRANSPORTATION Federal Highway Administration Environmental Impact Statement...: The FHWA is issuing this notice of intent to advise the public that an Environmental Impact Statement... the Illinois Department of Transportation (IDOT) will prepare an Environmental Impact Statement (EIS...

  1. CHINESE SMEs' USES OF FINANCIAL STATEMENTS IN DECISION MAKING

    OpenAIRE

    HOWARD VAN AUKEN; KUI YANG

    2014-01-01

    With a sample of 46 Chinese small to medium-sized enterprises (SMEs), this study examines factors that might affect firms' use of financial statements to make decisions. Financial statements contain insightful information about potential risk and return implications of various decisions. A logit analysis shows that owners of Chinese SMEs use financial statements to make decisions according to the frequency of available financial statement information and their ability to interpret the informa...

  2. 29 CFR 99.310 - Financial statements.

    Science.gov (United States)

    2010-07-01

    ... 29 Labor 1 2010-07-01 2010-07-01 true Financial statements. 99.310 Section 99.310 Labor Office of the Secretary of Labor AUDITS OF STATES, LOCAL GOVERNMENTS, AND NON-PROFIT ORGANIZATIONS Auditees § 99... have separate audits in accordance with § 99.500(a) and prepare separate financial statements. (b...

  3. 78 FR 59414 - Environmental Impact Statement; King County, Washington

    Science.gov (United States)

    2013-09-26

    ... DEPARTMENT OF TRANSPORTATION Federal Highway Administration Environmental Impact Statement; King... prepare an environmental impact statement. SUMMARY: The Federal Highway Administration is issuing this notice to advise the public that an Environmental Impact Statement (EIS) will be prepared for a proposed...

  4. 10 CFR 51.85 - Draft environmental impact statement-rulemaking.

    Science.gov (United States)

    2010-01-01

    ... 10 Energy 2 2010-01-01 2010-01-01 false Draft environmental impact statement-rulemaking. 51.85... Implementing Section 102(2) Draft Environmental Impact Statements-Rulemaking § 51.85 Draft environmental impact... Commission has determined to prepare an environmental impact statement. ...

  5. 77 FR 20690 - Environmental Impact Statement: Albuquerque, New Mexico

    Science.gov (United States)

    2012-04-05

    ... DEPARTMENT OF TRANSPORTATION Federal Highway Administration Environmental Impact Statement.... SUMMARY: The FHWA is rescinding the notice of intent to prepare an environmental impact statement for the... rescinding the Notice of Intent to prepare an Environmental Impact Statement (EIS) for the proposed...

  6. 10 CFR 51.72 - Supplement to draft environmental impact statement.

    Science.gov (United States)

    2010-01-01

    ... 10 Energy 2 2010-01-01 2010-01-01 false Supplement to draft environmental impact statement. 51.72... Implementing Section 102(2) Environmental Impact Statements § 51.72 Supplement to draft environmental impact statement. (a) The NRC staff will prepare a supplement to a draft environmental impact statement for which a...

  7. 14 CFR 399.4 - Nature and effect of policy statements.

    Science.gov (United States)

    2010-01-01

    ... 14 Aeronautics and Space 4 2010-01-01 2010-01-01 false Nature and effect of policy statements. 399.4 Section 399.4 Aeronautics and Space OFFICE OF THE SECRETARY, DEPARTMENT OF TRANSPORTATION... Statements § 399.4 Nature and effect of policy statements. Policy statements published in this part will be...

  8. Preparation of Financial Statements for Sme’s in Romania. Interest for Cash-Flow Statement

    Directory of Open Access Journals (Sweden)

    Nicoleta FARCANE

    2012-05-01

    Full Text Available The purpose of this article is to obtain feedback about the transition to IFRS standards and their implementation in the context of small and medium-sized enterprises in Romania in terms of the cashflow situation. Research methodology is based on a quantitative survey carried out in order to verify the importance and usefulness of perception on the cash-flow statement. The investigation based on testing four hypotheses has been carried out within the framework of small and medium-sized enterprises in Western Romania and the categories of respondents to the study were: upper management and accounting specialists. The results highlight the fact that there are differences between the categories of users of the cash-flow statements, fact highlighted and illustrated by our findings. The article ends with the conclusions of the authors regarding the importance and usefulness of the use and implementation of the cash-flow statement of the small and medium enterprises in Western Romania.

  9. Statement of nuclear incidents at nuclear installations

    International Nuclear Information System (INIS)

    2002-07-01

    A statement of nuclear incidents at nuclear installations in Britain during the first quarter of 2002 is published today by the Health and Safety Executive. It covers the period 1 January to 31 March 2002. There are two installations mentioned in the statement: Dungeness B and Heysham 1. The statement is published under arrangements that came into effect from the first quarter of 1993, derived from the Health and Safety Commission's powers under section 11 of the Health and Safety at Work, etc. Act 1974

  10. 76 FR 53531 - Environmental Impact Statement: Hancock County, MS

    Science.gov (United States)

    2011-08-26

    ...)] Environmental Impact Statement: Hancock County, MS AGENCY: Federal Highway Administration (FHWA), Department Of... that an environmental impact statement will be prepared for a proposed highway project in Hancock... an Environmental Impact Statement (EIS) for the proposed widening and/or realignment of State Route...

  11. Ethical Principles of Psychologists and Code of Conduct.

    Science.gov (United States)

    American Psychologist, 2002

    2002-01-01

    Describes the American Psychological Association's Ethical Principles of Psychologists and Code of Conduct, focusing on introduction and applicability; preamble; general principles; and ethical standards (resolving ethical issues, competence, human relations, privacy and confidentiality, advertising and other public statements, record keeping and…

  12. 78 FR 18233 - Medical Devices; Technical Amendment

    Science.gov (United States)

    2013-03-26

    ... human environment. Therefore, neither an environmental assessment nor an environmental impact statement..., Confidential business information, Medical devices, Medical research, Reporting and recordkeeping requirements... revising the second sentence in paragraph (a) to read as follows: Sec. 870.3600 External pacemaker pulse...

  13. Cigarette tax avoidance and evasion.

    Science.gov (United States)

    Stehr, Mark

    2005-03-01

    Variation in state cigarette taxes provides incentives for tax avoidance through smuggling, legal border crossing to low tax jurisdictions, or Internet purchasing. When taxes rise, tax paid sales of cigarettes will decline both because consumption will decrease and because tax avoidance will increase. The key innovation of this paper is to compare cigarette sales data to cigarette consumption data from the Behavioral Risk Factor Surveillance System (BRFSS). I show that after subtracting percent changes in consumption, residual percent changes in sales are associated with state cigarette tax changes implying the existence of tax avoidance. I estimate that the tax avoidance response to tax changes is at least twice the consumption response and that tax avoidance accounted for up to 9.6% of sales between 1985 and 2001. Because of the increase in tax avoidance, tax paid sales data understate the level of smoking and overstate the drop in smoking. I also find that the level of legal border crossing was very low relative to other forms of tax avoidance. If states have strong preferences for smoking control, they must pair high cigarette taxes with effective policies to curb smuggling and other forms of tax avoidance or employ alternative policies such as counter-advertising and smoking restrictions.

  14. 10 CFR 51.91 - Final environmental impact statement-contents.

    Science.gov (United States)

    2010-01-01

    ... 10 Energy 2 2010-01-01 2010-01-01 false Final environmental impact statement-contents. 51.91... Implementing Section 102(2) Final Environmental Impact Statements-General Requirements § 51.91 Final environmental impact statement—contents. (a)(1) The final environmental impact statement will include responses...

  15. 75 FR 4031 - Streamlining Hard-Copy Postage Statement Processing

    Science.gov (United States)

    2010-01-26

    ... finalized postage statements from PostalOne! facilities are available online at the Business Customer...! facilities only. Copies of finalized postage statements are available online at the Business Customer Gateway... postage statements from PostalOne! facilities are available online at the Business Customer Gateway. 2. At...

  16. Security, privacy, and confidentiality issues on the Internet.

    Science.gov (United States)

    Kelly, Grant; McKenzie, Bruce

    2002-01-01

    We introduce the issues around protecting information about patients and related data sent via the Internet. We begin by reviewing three concepts necessary to any discussion about data security in a healthcare environment: privacy, confidentiality, and consent. We are giving some advice on how to protect local data. Authentication and privacy of e-mail via encryption is offered by Pretty Good Privacy (PGP) and Secure Multipurpose Internet Mail Extensions (S/MIME). The de facto Internet standard for encrypting Web-based information interchanges is Secure Sockets Layer (SSL), more recently known as Transport Layer Security or TLS. There is a public key infrastructure process to 'sign' a message whereby the private key of an individual can be used to 'hash' the message. This can then be verified against the sender's public key. This ensures the data's authenticity and origin without conferring privacy, and is called a 'digital signature'. The best protection against viruses is not opening e-mails from unknown sources or those containing unusual message headers.

  17. Medical liability, safety and confidentiality in maritime telemedicine--the MERMAID position on issues of importance.

    Science.gov (United States)

    Ladas, P; Giatagatzidis, P; Anogianakis, G; Maglavera, S

    1997-01-01

    Telemedicine dates to the days of "wireless telegraphy". As an "extraordinary" arrangement for medical services delivered at time of need, telemedicine has thus far escaped the developments that have taken place over the last 50 years in the areas of medical liability, safety and confidentiality. Today, however, telemedicine is also used to increase quality and cost effectiveness of healthcare provision. This trend is set by the U.S. where the U.S. federal government funds telemedicine at an annual rate of more than $100 million i.e., at a rate 30 times or more than what the EU does while state and local agency support and private business investment in telemedicine is 3 to 4 times larger than that of the U.S. federal government. In this respect it must be stressed that technology tends to satisfy the relevant demand for telecommunications. Telemedicine is used in diverse areas such as pathology, surgery, physical therapy, and psychiatry. It is expected to revolutionise health care in the coming decade and, therefore, it will certainly take into account requirements for medical liability, safety and confidentiality in the same way as traditional "establishment" medicine does.

  18. Approach/avoidance in dreams.

    Science.gov (United States)

    Malcolm-Smith, Susan; Koopowitz, Sheri; Pantelis, Eleni; Solms, Mark

    2012-03-01

    The influential threat simulation theory (TST) asserts that dreaming yields adaptive advantage by providing a virtual environment in which threat-avoidance may be safely rehearsed. We have previously found the incidence of biologically threatening dreams to be around 20%, with successful threat avoidance occurring in approximately one-fifth of such dreams. TST asserts that threat avoidance is over-represented relative to other possible dream contents. To begin assessing this issue, we contrasted the incidence of 'avoidance' dreams with that of their opposite: 'approach' dreams. Because TST states that the threat-avoidance function is only fully activated in ecologically valid (biologically threatening) contexts, we also performed this contrast for populations living in both high- and low-threat environments. We find that 'approach' dreams are significantly more prevalent across both contexts. We suggest these results are more consistent with the view that dreaming is generated by reward-seeking systems than by fear-conditioning systems, although reward-seeking is clearly not the only factor determining the content of dreams. Copyright © 2011 Elsevier Inc. All rights reserved.

  19. 49 CFR 805.735-24 - Review of financial statements.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 7 2010-10-01 2010-10-01 false Review of financial statements. 805.735-24 Section... TRANSPORTATION SAFETY BOARD EMPLOYEE RESPONSIBILITIES AND CONDUCT § 805.735-24 Review of financial statements. (a) The Personnel Officer shall review each statement of employment and financial interests submitted...

  20. 7 CFR 1230.115 - Submission of annual financial statements.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 10 2010-01-01 2010-01-01 false Submission of annual financial statements. 1230.115... Submission of annual financial statements. State Pork Producer Associations, as defined in § 1230.25, that... financial statements prepared by State association staff members or individuals who prepare annual financial...