WorldWideScience

Sample records for avoiding confidential statement

  1. 18 CFR 706.410 - Confidentiality of statements.

    Science.gov (United States)

    2010-04-01

    ... use of information on the statements shall be limited to that necessary to carry out the purposes of... EMPLOYEE RESPONSIBILITIES AND CONDUCT Statements of Employment and Financial Interests § 706.410 Confidentiality of statements. Each statement of employment and financial interests, and each supplementary...

  2. 49 CFR 805.735-21 - Confidentiality of statements.

    Science.gov (United States)

    2010-10-01

    ... TRANSPORTATION SAFETY BOARD EMPLOYEE RESPONSIBILITIES AND CONDUCT § 805.735-21 Confidentiality of statements. Subject to the provisions of § 805.735-24 concerning review of employee statements, each statement of... Personnel Officer is personally responsible for the retention of employee statements in confidence and may...

  3. 37 CFR 260.4 - Confidential information and statements of account.

    Science.gov (United States)

    2010-07-01

    ... Confidential information and statements of account. (a) For purposes of this part, confidential information shall include statements of account and any information pertaining to the statements of account... included on the statement of account. (d) Access to the confidential information pertaining to the royalty...

  4. 37 CFR 382.4 - Confidential information and statements of account.

    Science.gov (United States)

    2010-07-01

    ... information and statements of account. (a) For purposes of this subpart, confidential information shall include statements of account and any information pertaining to the statements of account designated as... payments. (c) A statement of account shall include only such information as is necessary to verify the...

  5. 37 CFR 201.29 - Access to, and confidentiality of, Statements of Account, Verification Auditor's Reports, and...

    Science.gov (United States)

    2010-07-01

    ... confidentiality of, Statements of Account, Verification Auditor's Reports, and other verification information... GENERAL PROVISIONS § 201.29 Access to, and confidentiality of, Statements of Account, Verification Auditor... Account, including the Primary Auditor's Reports, filed under 17 U.S.C. 1003(c) and access to a Verifying...

  6. 77 FR 65177 - Swap Data Repositories: Interpretative Statement Regarding the Confidentiality and...

    Science.gov (United States)

    2012-10-25

    ... COMMODITY FUTURES TRADING COMMISSION Swap Data Repositories: Interpretative Statement Regarding...\\ which requires all swaps-- whether cleared or uncleared--to be reported to swap data repositories... of the CEA to add a definition of the term ``swap data repository.'' Pursuant to CEA section 1a(48...

  7. Computer Security: Printing confidentially

    CERN Document Server

    Stefan Lueders, Computer Security Team

    2015-01-01

    Have you ever hesitated to print a confidential document using CERN printers? Or perhaps you have rushed quickly to the printer after hitting the “print” button in order to avoid someone else getting hold of and reading your document? These times are over now with the new printing infrastructure!   Indeed, many of us regularly print out confidential documents like our salary slips, MARS forms, tendering documents and drafts of preliminary papers. The upcoming CERN data protection policy will require all of us to respect the confidentiality of such documents and, as the word “confidential” implies, access to “confidential” or sensitive documents will be tightly controlled. What can we do about the public printers located in many buildings, floors and shared spaces - accessible not only to CERN staff and users but also to visitors and guests? Some printers are located in the vicinity of restaurants, cafeterias or close to paths taken b...

  8. Library Records: A Review of Confidentiality Laws and Policies.

    Science.gov (United States)

    Million, Angela C.; Fisher, Kim N.

    1986-01-01

    Cites the importance of having a state law, knowing what it says, and having a library policy statement regarding the confidentiality of patron records. Discussion covers writing and implementing a policy, the role of automation, existing laws, library records defined, exceptions to confidentiality, and legal liability. Thirty-seven references are…

  9. 7 CFR 1221.127 - Confidential treatment.

    Science.gov (United States)

    2010-01-01

    ... statistical data collected there from, which statements do not identify the information furnished by any... 7 Agriculture 10 2010-01-01 2010-01-01 false Confidential treatment. 1221.127 Section 1221.127 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (MARKETING...

  10. 7 CFR 1160.403 - Confidential treatment.

    Science.gov (United States)

    2010-01-01

    ... statistical data collected from such sources, which statements do not identify the information furnished by... 7 Agriculture 9 2010-01-01 2009-01-01 true Confidential treatment. 1160.403 Section 1160.403 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (Marketing...

  11. 7 CFR 1250.354 - Confidential treatment.

    Science.gov (United States)

    2010-01-01

    ... subject to this subpart or statistical data collected therefrom, which statements do not identify the... 7 Agriculture 10 2010-01-01 2010-01-01 false Confidential treatment. 1250.354 Section 1250.354 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (MARKETING...

  12. 7 CFR 1212.72 - Confidential treatment.

    Science.gov (United States)

    2010-01-01

    ... statements based upon the reports of the number of persons subject to this subpart or statistical data... 7 Agriculture 10 2010-01-01 2010-01-01 false Confidential treatment. 1212.72 Section 1212.72 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (MARKETING...

  13. 7 CFR 1260.203 - Confidential treatment.

    Science.gov (United States)

    2010-01-01

    ... of persons subject to this subpart or statistical data collected therefrom, which statements do not... 7 Agriculture 10 2010-01-01 2010-01-01 false Confidential treatment. 1260.203 Section 1260.203 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (MARKETING...

  14. 7 CFR 1216.62 - Confidential treatment.

    Science.gov (United States)

    2010-01-01

    ... this subpart or statistical data collected therefrom, which statements do not identify the information... 7 Agriculture 10 2010-01-01 2010-01-01 false Confidential treatment. 1216.62 Section 1216.62 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (MARKETING...

  15. 7 CFR 1209.62 - Confidential treatment.

    Science.gov (United States)

    2010-01-01

    ... this subpart or statistical data collected therefrom, which statements do not identify the information... 7 Agriculture 10 2010-01-01 2010-01-01 false Confidential treatment. 1209.62 Section 1209.62 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (MARKETING...

  16. 7 CFR 1206.62 - Confidential treatment.

    Science.gov (United States)

    2010-01-01

    ... statements based upon the reports of the number of persons subject to this subpart or statistical data... 7 Agriculture 10 2010-01-01 2010-01-01 false Confidential treatment. 1206.62 Section 1206.62 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (MARKETING...

  17. 7 CFR 1215.62 - Confidential treatment.

    Science.gov (United States)

    2010-01-01

    ... persons subject to this part or statistical data collected therefrom, which statements do not identify the... 7 Agriculture 10 2010-01-01 2010-01-01 false Confidential treatment. 1215.62 Section 1215.62 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (MARKETING...

  18. 7 CFR 1280.227 - Confidentiality.

    Science.gov (United States)

    2010-01-01

    ... statistical data collected therefrom, which statements do not identify the information furnished by any person... 7 Agriculture 10 2010-01-01 2010-01-01 false Confidentiality. 1280.227 Section 1280.227 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (MARKETING...

  19. Confidentiality and personal integrity.

    Science.gov (United States)

    Edgar, A

    1994-06-01

    This paper uses the social theory of Erving Goffman in order to argue that confidentiality should be understood in relation to the mundane social skills by which individuals present and respect specific self-images of themselves and others during social interaction. The breaching of confidentiality is analysed in terms of one person's capacity to embarrass another, and so to expose that person as incompetent. Respecting confidentiality may at once serve to protect the vulnerable from an unjust society, and yet also protect the guilty from just accusation. Ethical reasoning about confidentiality must therefore recognize the dangers of prejudice and violence inherent in decisions to breach or to respect confidentiality. Case studies are used to illustrate the efficacy of this account, culminating with analyses of three examples from the UKCC document Confidentiality.

  20. Ombuds’ corner: Confidentiality

    CERN Multimedia

    Vincent Vuillemin

    2011-01-01

    In this series, the Bulletin aims to explain the role of the Ombuds at CERN by presenting practical examples of misunderstandings that could have been resolved by the Ombuds if he had been contacted earlier. Please note that, in all the situations we present, the names are fictitious and used only to improve clarity.    Jane* came to the Ombuds to share her concerns about the actions of Mike*, one of her senior colleague supervisors, and insisted on the absolute confidentiality. The Ombuds promised to keep the information confidential following the terms of his mandate. During the discussion it appeared that the whole group was affected by the situation, spending a lot of time discussing how to resolve the problem instead of focusing on their main responsibilities. The risks for the Organization seemed very high and could possibly endanger the safety of the operations.  On one side, the Ombuds believed that it was essential to bring this matter to the attention of senior managem...

  1. 48 CFR 1415.207-71 - Confidentiality of proposal evaluation.

    Science.gov (United States)

    2010-10-01

    ... THE INTERIOR CONTRACTING METHODS AND CONTRACT TYPES CONTRACTING BY NEGOTIATION Solicitation and... evaluators and advisors shall sign a Conflict of Interest Certificate and a Confidentiality Certificate in a... outside the Government shall take into consideration requirements for avoiding individual conflicts of...

  2. Confidential Business Information under TSCA

    Science.gov (United States)

    This website informs businesses, policymakers, and the public about the confidential business information (CBI) provisions of § 14 of the Toxic Substances Control Act (TSCA), as amended by the Frank R. Lautenberg Chemical Safety for the 21st Century Act.

  3. Evaluation in a competitive utility environment: the threat of confidentiality

    International Nuclear Information System (INIS)

    Vine, Edward

    1997-01-01

    information needs and sources and revise existing policies. 2. Review process for handling confidentiality claims and revise existing policies. 3. Monitor restructuring activities. 4. Develop framework and specific guidelines. 5. Develop standards of conduct. 6. Hold workshops on confidentiality. 7. Design and implement a pilot project. 8. Establish and support consumer advocates. 9. Support more research on confidentiality. Utilities will be reluctant to support these activities and develop the new rules of the game. Regulators need to be more proactive and conduct the above activities promptly in order to avoid paralysis and inertia and to maintain the regulatory balance. The lack of a regulatory framework and specific policies for information access may only make existing problems more severe. The issue of confidentiality has broad sociopolitical dimensions. In the next few years, commissions will be asked to create information policies that will demonstrate the degree of their support for public access to utility- held information. These policies will be important since they can ''profoundly affect the manner in which an individual in a society, indeed a society itself, makes political, economic and social choices.'' Finally, in all likelihood, evaluators will need to adapt to an environment where utility data will be more difficult to obtain and disseminate. It is premature to see how increased confidentiality will affect the objectivity, usefulness, validity, and reliability of evaluations. If the evaluation community wishes to maintain the high its work, creative solutions will most needed

  4. 12 CFR 366.13 - What is my obligation regarding confidential information?

    Science.gov (United States)

    2010-01-01

    ... services on your behalf may use or disclose information obtained from us or a third party in connection... general public. (b) The following are examples of when your use of confidential information is... financial information, such as a financial statement to an unauthorized party. ...

  5. Confidentiality and integrity in crowdsourcing systems

    CERN Document Server

    Ranj Bar, Amin

    2014-01-01

    Confidentiality and Integrity in Crowdsourcing Systems focuses on identity, privacy, and security related issues in crowdsourcing systems and in particular the confidentiality and integrity of online data created via crowdsourcing. This book begins with an introduction to crowdsourcing and then covers the privacy and security challenges of Confidentiality. The book examines integrity in these systems and the management and control of crowdsourcing systems.

  6. Participants' safety versus confidentiality: A case study of HIV research.

    Science.gov (United States)

    Leyva-Moral, Juan Manuel; Feijoo-Cid, Maria

    2017-05-01

    Background When conducting qualitative research, participants usually share lots of personal and private information with the researcher. As researchers, we must preserve participants' identity and confidentiality of the data. Objective To critically analyze an ethical conflict encountered regarding confidentiality when doing qualitative research. Research design Case study. Findings and discussion one of the participants in a study aiming to explain the meaning of living with HIV verbalized his imminent intention to commit suicide because of stigma of other social problems arising from living with HIV. Given the life-threatening situation, the commitment related to not disclosing the participant's identity and/or the content of the interview had to be broken. To avoid or prevent suicide, the therapist in charge of the case was properly informed about the participant's intentions. One important question arises from this case: was it ethically appropriate to break the confidentiality commitment? Conclusion confidentiality could be broken if a life-threatening event is identified during data collection and participants must know that. This has to be clearly stated in the informed consent form.

  7. Confidential data in a competitive utility environment: A regulatory perspective

    Energy Technology Data Exchange (ETDEWEB)

    Vine, E.

    1996-08-01

    Historically, the electric utility industry has been regarded as one of the most open industries in the United States in sharing information but their reputation is being challenged by competitive energy providers, the general public, regulators, and other stakeholders. As the prospect of competition among electricity power providers has increased in recent years, many utilities have been requesting that the data they submit to their utility regulatory commissions remain confidential. Withholding utility information from the public is likely to have serious and significant policy implications with respect to: (1) consumer education, the pursuit of truth, mutual respect among parties, and social cooperation; (2) the creation of a fair market for competitive energy services; (3) the regulatory balance; (4) regional and national assessments of energy-savings opportunities; (5) research and development; and (6) evaluations of utility programs, plans, and policies. In a telephone survey of all public utility commissions (PUCs) that regulate electric and gas utilities in the U.S., we found that almost all PUCs have received requests from utility companies for data to be filed as confidential, and confidential data filings appear to have increased (both in scope and in frequency) in those states where utility restructuring is being actively discussed. The most common types of data submitted as confidential by utilities dealt with specific customer data, market data, avoided costs, and utility costs.

  8. 21 CFR 720.8 - Confidentiality of statements.

    Science.gov (United States)

    2010-04-01

    ... the ingredient is known outside petitioner's business; (2) The extent to which the identity of the ingredient is known by employees and others involved in petitioner's business; (3) The extent of measures... the identity of the claimed trade secret ingredient to the petitioner and to its competitors; (5) The...

  9. WTO confidential: the case of asbestos.

    Science.gov (United States)

    Castleman, Barry

    2003-01-01

    The World Trade Organization (WTO), established in 1995, adjudicates "trade disputes" between member nations in cases with human rights, cultural, environmental, and public health significance. Throughout the resolution process and even after a case's conclusion, little of what happens is made accessible to the public. However, it is one thing to criticize the WTO for its lack of transparency from outside the process and another to critically examine what was withheld from disclosure and what dangers that presents. This is the inside story from a scientific adviser to one party in a WTO case, who analyzes what happened from a public health point of view. The analysis concludes that the public health justification for banning asbestos was accepted in the end by WTO economists, despite the WTO's bias in favor of the party (Canada) making the free trade challenge (to public health legislation), despite the WTO's lack of expertise in science, medicine, engineering, and public health, and despite important erroneous statements made to the WTO under the cover of confidentiality. The case nevertheless illustrates that the WTO's threat to national sovereignty could never withstand the light of day if the limitations and dangers of the process were open for all to see.

  10. Confidential patent application with an example of preparation

    Directory of Open Access Journals (Sweden)

    Obrad T. Čabarkapa

    2013-12-01

    is submitted: power of attorney; cofirmation on presenting the invention at an international exhibition; certified copy of the first patent application; statement on the basis of entitlement to file an application; statement by the inventor if he does not want to be mentioned in the patent application; proof of the payment of the patent application fee; statement of a joint representative if there are more applicants. Conclusion In order that a confidential invention receive  patent or petty patent protection, it is necessary to file a patent application. A confidential patent application is a very comprehensive document which has to be compiled with expert knowledge from both the technical field to which the application relates and the field of intellectual property protection. The shown content of the confidential patent application with an example can be useful for inventors in their attempts to draw up their own patent applications. [1] The structure and the content of a confidential patent application  is identical  to the content and the form of a patent application submitted to the Intellectual Property Office,a competent state institution for the protection of intellectual property. 

  11. Detached Statements

    Directory of Open Access Journals (Sweden)

    Mark McBride

    2018-04-01

    Full Text Available Joseph Raz has introduced an interesting class of statements —detached statements— into the philosophical lexicon. In brief, such statements are (informa- tive normative statements, yet the speaker does not, in so uttering them, express or convey acceptance of the point of view of the hearer to whom they are addressed (as contrasted with committed statements, where the speaker does express or convey such acceptance. I propose to offer a novel analysis of such statements (and to clear away some confusions about them. In brief, such statements will be analysed as wide-scope normative conditionals.

  12. Confidentiality and the employee assistance program professional.

    Science.gov (United States)

    Mistretta, E F; Inlow, L B

    1991-02-01

    During the last two decades EAPs have offered employees confidential assessment, counseling, and referral. Many occupational health nurses have taken on the role of EAP professional or function as the liaison between the EAP counselor and the employee. The occupational health nurse involved in any EAP issue must adhere to the standards of confidentiality. The federal and state laws, company policy, and professional codes of ethics regarding these clients must be clearly understood, especially related to the issue of confidentiality.

  13. Confidentiality

    African Journals Online (AJOL)

    jacobien

    essential to the professional ethics of med- ical practitioners. ... promise-keeping and utility (or welfare). Autonomy. Autonomous beings are those that are capable of controlling their own lives.They ... private medical information is lim- ited: the ...

  14. 7 CFR 1280.634 - Confidentiality.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 10 2010-01-01 2010-01-01 false Confidentiality. 1280.634 Section 1280.634 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (MARKETING... persons voting in the referendum and ballots shall be confidential and the contents of the ballots shall...

  15. 7 CFR 1206.107 - Confidential information.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 10 2010-01-01 2010-01-01 false Confidential information. 1206.107 Section 1206.107 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (MARKETING... INFORMATION Referendum Procedures. § 1206.107 Confidential information. The ballots and other information or...

  16. 7 CFR 1150.278 - Confidential treatment.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 9 2010-01-01 2009-01-01 true Confidential treatment. 1150.278 Section 1150.278 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (Marketing... of Milk Producer Organizations § 1150.278 Confidential treatment. All documents and other information...

  17. 7 CFR 1207.352 - Confidential treatment.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 10 2010-01-01 2010-01-01 false Confidential treatment. 1207.352 Section 1207.352 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (MARKETING... PLAN Potato Research and Promotion Plan Reports, Books, and Records § 1207.352 Confidential treatment...

  18. 7 CFR 1205.340 - Confidential treatment.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 10 2010-01-01 2010-01-01 false Confidential treatment. 1205.340 Section 1205.340 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (MARKETING... Cotton Research and Promotion Order Reports, Books, and Records § 1205.340 Confidential treatment. All...

  19. 7 CFR 1220.243 - Confidential treatment.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 10 2010-01-01 2010-01-01 false Confidential treatment. 1220.243 Section 1220.243 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (MARKETING... Confidential treatment. Except as otherwise provided in the Act, financial or commercial information that is...

  20. The Confidentiality of Interlibrary Loan Records.

    Science.gov (United States)

    Nolan, Christopher W.

    1993-01-01

    Discusses potential problems for confidentiality within interlibrary loan requests, outlines legal issues related to confidentiality, and proposes guidelines intended to protect library users' rights to privacy. Interlibrary loan documentation procedures are considered; laws and professional standards are reviewed; and the disposition of…

  1. 40 CFR 716.55 - Confidentiality claims.

    Science.gov (United States)

    2010-07-01

    ... confidential business information, health and safety studies of any substance or mixture that has been offered for commercial distribution (including for test marketing purposes and for use in research and... because disclosure would reveal a confidential process or quantitative mixture composition should briefly...

  2. 15 CFR 806.5 - Confidentiality.

    Science.gov (United States)

    2010-01-01

    ... 15 Commerce and Foreign Trade 3 2010-01-01 2010-01-01 false Confidentiality. 806.5 Section 806.5 Commerce and Foreign Trade Regulations Relating to Commerce and Foreign Trade (Continued) BUREAU OF ECONOMIC ANALYSIS, DEPARTMENT OF COMMERCE DIRECT INVESTMENT SURVEYS § 806.5 Confidentiality. Information...

  3. 31 CFR 9.6 - Confidential information.

    Science.gov (United States)

    2010-07-01

    ... 9.6 Money and Finance: Treasury Office of the Secretary of the Treasury EFFECTS OF IMPORTED ARTICLES ON THE NATIONAL SECURITY § 9.6 Confidential information. Information submitted in confidence which... marked “Business Confidential.” [40 FR 50717, Oct. 31, 1975] ...

  4. 15 CFR 705.6 - Confidential information.

    Science.gov (United States)

    2010-01-01

    ... EFFECT OF IMPORTED ARTICLES ON THE NATIONAL SECURITY § 705.6 Confidential information. (a) Any... the investigation that would disclose national security classified information or business... Security Classified” or “Business Confidential,” as appropriate, marked at the top of each sheet. Any...

  5. A challenge to unqualified medical confidentiality.

    Science.gov (United States)

    Bozzo, Alexander

    2018-04-01

    Medical personnel sometimes face a seeming conflict between a duty to respect patient confidentiality and a duty to warn or protect endangered third parties. The conventional answer to dilemmas of this sort is that, in certain circumstances, medical professionals have an obligation to breach confidentiality. Kenneth Kipnis has argued, however, that the conventional wisdom on the nature of medical confidentiality is mistaken. Kipnis argues that the obligation to respect patient confidentiality is unqualified or absolute, since unqualified policies can save more lives in the long run. In this paper, I identify the form of Kipnis's argument and present a challenge to it. I conclude that, as matters stand now, a qualified confidentiality policy is the more rational choice. © Article author(s) (or their employer(s) unless otherwise stated in the text of the article) 2018. All rights reserved. No commercial use is permitted unless otherwise expressly granted.

  6. Confidentiality in psychological practice: a decrepit concept?

    Science.gov (United States)

    McMahon, M; Knowles, A D

    1995-11-01

    Although the principle of confidentiality in the relationship between psychologists and client has been vaunted, and is emphasised in the Australian Psychological Society's Code of Professional Conduct (the APS code; 1994), the confidentiality of this relationship is circumscribed by the absence of legal protections, the ethical beliefs of psychologists, institutional practices, and the provisions of the APS code itself. Lack of privilege in judicial proceedings, and statutory obligations to report certain types of behaviour, mandate breaches of confidentiality in some circumstances. Ethical beliefs of psychologists may support disclosure, especially where it is believed that there is danger of serious physical harm to the client or others. Multidisciplinary teams and institutional settings require the exchange of information for optimal delivery of services. Recent amendments to the APS code may require disclosure without the client's consent when a client is believed to be suicidal. Such developments, when considered at all, are typically regarded as exceptions to a general obligation of confidentiality. However, discussion of exceptions presupposes agreement on fundamental principle: the significance of, and rationale for, confidentiality in the psychologist-client relationship. It is argued in this paper that the obligation of confidentiality has been assumed rather than vigorously analysed and empirically explored. A critical examination of this obligation is the most appropriate starting point for the rehabilitation of contemporary principles of confidentiality in the psychologist-client relationship.

  7. 7 CFR 1425.5 - Confidentiality.

    Science.gov (United States)

    2010-01-01

    ... AGRICULTURE LOANS, PURCHASES, AND OTHER OPERATIONS COOPERATIVE MARKETING ASSOCIATIONS § 1425.5 Confidentiality. Information submitted to CCC related to trade secrets, financial or commercial operations, or the financial...

  8. Law and ethics in conflict over confidentiality?

    Science.gov (United States)

    Dickens, B M; Cook, R J

    2000-09-01

    Ethical principles that require the preservation of patients' confidential information are reinforced by principles found in several areas of law, such as law on contracts, negligence, defamation and fiduciary duty. However, laws sometimes compel disclosures of medical confidences, and more often may justify or excuse disclosures. Legally contentious issues concern patients' confidences regarding possible unlawful conduct, such as pregnancy termination, and the risk of spread of HIV and other infections. This article reviews the various legal bases of the duty of confidentiality, and legal challenges to the ethical obligation of non-disclosure. It addresses the justifications and limits of exchange of patients' health information among healthcare professionals and trainees, and considers legally recognized limits of confidential duties, and the scope of legitimate disclosure. An underlying theme is how to determine whether physicians are ethically justified in employing the discretion the law sometimes affords them to breach patients' expectations of confidentiality.

  9. Audit, Accountability and Confidential Enquiries into Maternal ...

    African Journals Online (AJOL)

    HP

    Time for Action: Audit, Accountability and Confidential Enquiries ... provision of quality maternity services. Having such a ... services are more likely to be sustained if women can find ..... Donabedian A. An introduction to quality assurance in.

  10. 40 CFR 790.7 - Confidentiality.

    Science.gov (United States)

    2010-07-01

    ... words “confidential business information,” “trade secret,” or another appropriate phrase indicating its... competitor use such information? How substantial would the harmful effects be? What is the causal...

  11. THE INFORMATION CONFIDENTIALITY AND CYBER SECURITY IN MEDICAL INSTITUTIONS

    Directory of Open Access Journals (Sweden)

    SABAU-POPA CLAUDIA DIANA

    2015-07-01

    Full Text Available The information confidentiality and cyber security risk affects the right to confidentiality and privacy of the patient, as regulated in Romania by the Law 46/2002. The manifestation of the cyber security risk event affects the reputation of the healthcare institution and is becoming more and more complex and often due to the: development of network technology, the medical equipment connected to wifi and the electronic databases. The databases containing medical records were implemented due to automation. Thus, transforming data into medical knowledge contribute to a better understanding of the disease. Due to these factors, the measures taken by the hospital management for this type of risk are adapted to the cyber changes. The hospital objectives aim: the implementation of a robust information system, the early threats identifications and the incident reporting. Neglecting this type of risk can generate financial loss, inability to continue providing health care services for a certain period of time, providing an erroneous diagnosis, medical equipment errors etc. Thus, in a digital age the appropriate risk management for the information security and cyber risk represent a necessity. The main concern of hospitals worldwide is to align with international requirements and obtain credentials in terms of data security from the International Organisation for Standardization, which regulates the management of this type of risk. Romania is at the beginning in terms of concerns regarding the management, avoidance and mitigation of information security, the health system being most highly exposed to its manifestation. The present paper examines the concerns of the health system to the confidentiality of information and cyber security risk and its management arrangements. Thus, a set of key risk indicators is implemented and monitored for 2011-2013, using a user interface, a Dashboard, which acts as an early warning system of the manifestation of the

  12. Resonating Statements

    DEFF Research Database (Denmark)

    Hjelholt, Morten; Jensen, Tina Blegind

    2015-01-01

    IT projects are often complex arrangements of technological components, social actions, and organizational transformation that are difficult to manage in practice. This paper takes an analytical discourse perspective to explore the process of legitimizing IT projects. We introduce the concept...... of resonating statements to highlight how central actors navigate in various discourses over time. Particularly, the statements and actions of an IT project manager are portrayed to show how individuals can legitimize actions by connecting statements to historically produced discourses. The case study...... as part of a feedback loop to re-attach the localized IT project to the broader national discourse. The paper concludes with reflections on how to actively build on resonating statements as a strategic resource for legitimizing IT projects...

  13. Financial Statements

    International Development Research Centre (IDRC) Digital Library (Canada)

    Financial Statements and accompanying notes provided on .... to good governance principles. there is the risk that ...... responsibilities of the centre's internal auditor includes reviewing internal controls, including accounting and financial.

  14. 18 CFR 706.405 - Supplementary statements.

    Science.gov (United States)

    2010-04-01

    ... employee shall at all times avoid acquiring a financial interest that could result, or taking an action... EMPLOYEE RESPONSIBILITIES AND CONDUCT Statements of Employment and Financial Interests § 706.405... employment and financial interests shall be reported in a supplementary statement, in the format prescribed...

  15. Confidential benchmarking based on multiparty computation

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre; Damgård, Kasper Lyneborg; Nielsen, Kurt

    We report on the design and implementation of a system that uses multiparty computation to enable banks to benchmark their customers' confidential performance data against a large representative set of confidential performance data from a consultancy house. The system ensures that both the banks......' and the consultancy house's data stays confidential, the banks as clients learn nothing but the computed benchmarking score. In the concrete business application, the developed prototype help Danish banks to find the most efficient customers among a large and challenging group of agricultural customers with too much...... debt. We propose a model based on linear programming for doing the benchmarking and implement it using the SPDZ protocol by Damgård et al., which we modify using a new idea that allows clients to supply data and get output without having to participate in the preprocessing phase and without keeping...

  16. 7 CFR 1210.607 - Confidential information.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 10 2010-01-01 2010-01-01 false Confidential information. 1210.607 Section 1210.607 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (MARKETING... contents and all other information or reports furnished to, compiled by, or in possession of, the...

  17. 7 CFR 1210.352 - Confidential treatment.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 10 2010-01-01 2010-01-01 false Confidential treatment. 1210.352 Section 1210.352 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (MARKETING... treatment. (a) All information obtained from the books, records, or reports required to be maintained under...

  18. ML Confidential : machine learning on encrypted data

    NARCIS (Netherlands)

    Graepel, T.; Lauter, K.; Naehrig, M.

    2012-01-01

    We demonstrate that by using a recently proposed somewhat homomorphic encryption (SHE) scheme it is possible to delegate the execution of a machine learning (ML) algorithm to a compute service while retaining confidentiality of the training and test data. Since the computational complexity of the

  19. 7 CFR 1150.173 - Confidential treatment.

    Science.gov (United States)

    2010-01-01

    ... reports of the number of persons subject to this subpart or statistical data collected therefrom, which... 7 Agriculture 9 2010-01-01 2009-01-01 true Confidential treatment. 1150.173 Section 1150.173 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (Marketing...

  20. 7 CFR 1218.62 - Confidential treatment.

    Science.gov (United States)

    2010-01-01

    ... of the number of persons subject to this subpart or statistical data collected therefrom, which... 7 Agriculture 10 2010-01-01 2010-01-01 false Confidential treatment. 1218.62 Section 1218.62 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (MARKETING...

  1. 7 CFR 1219.63 - Confidential treatment.

    Science.gov (United States)

    2010-01-01

    ... upon the reports of the number of persons subject to this subpart or statistical data collected from... 7 Agriculture 10 2010-01-01 2010-01-01 false Confidential treatment. 1219.63 Section 1219.63 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (MARKETING...

  2. 18 CFR 270.506 - Confidentiality.

    Science.gov (United States)

    2010-04-01

    ... 18 Conservation of Power and Water Resources 1 2010-04-01 2010-04-01 false Confidentiality. 270.506 Section 270.506 Conservation of Power and Water Resources FEDERAL ENERGY REGULATORY COMMISSION...) through (9) of 5 U.S.C. 552(b). (b) Upon receipt of a request for disclosure of information treated as...

  3. 21 CFR 821.55 - Confidentiality.

    Science.gov (United States)

    2010-04-01

    ... permission to release, the patient's name, address, telephone number, and social security number, or other... MEDICAL DEVICE TRACKING REQUIREMENTS Records and Inspections § 821.55 Confidentiality. (a) Any patient... identify patient or research subjects shall not be available for public disclosure except as provided in...

  4. 7 CFR 900.309 - Confidential information.

    Science.gov (United States)

    2010-01-01

    ... Conduct of Referenda To Determine Producer Approval of Milk Marketing Orders To Be Made Effective Pursuant to Agricultural Marketing Agreement Act of 1937, as Amended § 900.309 Confidential information. The... Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (Marketing...

  5. 7 CFR 984.79 - Confidential information.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 8 2010-01-01 2010-01-01 false Confidential information. 984.79 Section 984.79 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (Marketing... or disclosing the trade position, or financial condition or business operations of the handler shall...

  6. 7 CFR 993.71 - Confidential information.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 8 2010-01-01 2010-01-01 false Confidential information. 993.71 Section 993.71 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (Marketing... information constituting a trade secret or disclosing of the trade position, financial condition, or business...

  7. 7 CFR 932.63 - Confidential information.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 8 2010-01-01 2010-01-01 false Confidential information. 932.63 Section 932.63 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (Marketing... from such reports and records which might affect the trade position, financial condition, or business...

  8. 7 CFR 929.65 - Confidential information.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 8 2010-01-01 2010-01-01 false Confidential information. 929.65 Section 929.65 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (Marketing... position, financial condition, or business operations of the particular handler from whom received, shall...

  9. 7 CFR 982.70 - Confidential information.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 8 2010-01-01 2010-01-01 false Confidential information. 982.70 Section 982.70 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (Marketing... trade secret or disclosing of the trade position, financial condition, or business operations of the...

  10. 7 CFR 930.73 - Confidential information.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 8 2010-01-01 2010-01-01 false Confidential information. 930.73 Section 930.73 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (Marketing... a trade secret or disclosing trade position, financial condition, or business operations of the...

  11. Confidentiality of Accounting Academics: Consequences of Nonconformity

    Science.gov (United States)

    Amponsah, Emmanuel B.; Boateng, Peter Agyekum; Onuoha, Luke N.

    2016-01-01

    This paper examined ways by which nonconformity to confidentiality among accounting academics could lead to increased-recruitment-and-legal-costs to their employing universities in Ghana that offered accounting degree programmes. With a cross-sectional design, data collected from 1,225 accountants analysed via Cronbach's alpha,…

  12. 7 CFR 983.65 - Confidential information.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 8 2010-01-01 2010-01-01 false Confidential information. 983.65 Section 983.65 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (Marketing... the particular handler or their customers shall be received by, and at all times kept in the custody...

  13. 7 CFR 996.72 - Confidential information.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 8 2010-01-01 2010-01-01 false Confidential information. 996.72 Section 996.72 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (Marketing... condition, or business operations of the particular handlers or their customers shall be received by, and at...

  14. 31 CFR 129.5 - Confidentiality.

    Science.gov (United States)

    2010-07-01

    ... 31 Money and Finance: Treasury 1 2010-07-01 2010-07-01 false Confidentiality. 129.5 Section 129.5 Money and Finance: Treasury Regulations Relating to Money and Finance PORTFOLIO INVESTMENT SURVEY... contain data aggregated in such a way that neither the person supplying the information nor the investor...

  15. 40 CFR 710.58 - Confidentiality.

    Science.gov (United States)

    2010-07-01

    ...) Any person submitting information under this subpart may assert a business confidentiality claim for... with reporting under this subpart? How could a competitor use such information? Would the effects of... that your competitors do not know it is being manufactured or imported for a commercial purpose by...

  16. 40 CFR 710.38 - Confidentiality.

    Science.gov (United States)

    2010-07-01

    ... submitting information under this part may assert a business confidentiality claim for the information. The... with reporting under this part? How could a competitor use such information? Would the effects of... that your competitors do not know it is being manufactured or imported for a commercial purpose by...

  17. 38 CFR 1.462 - Confidentiality restrictions.

    Science.gov (United States)

    2010-07-01

    ... Sickle Cell Anemia § 1.462 Confidentiality restrictions. (a) General. The patient records to which §§ 1..., infection with the HIV, or sickle cell anemia may be acknowledged only if the patient's written consent is... with the HIV, or sickle cell anemia. (2) Any answer to a request for a disclosure of patient records...

  18. 42 CFR 93.108 - Confidentiality.

    Science.gov (United States)

    2010-10-01

    ... 42 Public Health 1 2010-10-01 2010-10-01 false Confidentiality. 93.108 Section 93.108 Public Health PUBLIC HEALTH SERVICE, DEPARTMENT OF HEALTH AND HUMAN SERVICES HEALTH ASSESSMENTS AND HEALTH EFFECTS STUDIES OF HAZARDOUS SUBSTANCES RELEASES AND FACILITIES PUBLIC HEALTH SERVICE POLICIES ON RESEARCH...

  19. 22 CFR 130.15 - Confidential business information.

    Science.gov (United States)

    2010-04-01

    ..., confidential business information means commercial or financial information which by law is entitled to... 22 Foreign Relations 1 2010-04-01 2010-04-01 false Confidential business information. 130.15... CONTRIBUTIONS, FEES AND COMMISSIONS § 130.15 Confidential business information. (a) Any person who is required...

  20. 15 CFR 718.3 - Disclosure of confidential business information.

    Science.gov (United States)

    2010-01-01

    ... 15 Commerce and Foreign Trade 2 2010-01-01 2010-01-01 false Disclosure of confidential business... (Continued) BUREAU OF INDUSTRY AND SECURITY, DEPARTMENT OF COMMERCE CHEMICAL WEAPONS CONVENTION REGULATIONS CONFIDENTIAL BUSINESS INFORMATION § 718.3 Disclosure of confidential business information. (a) General...

  1. Rio 2016 financial statements

    OpenAIRE

    2015-01-01

    These documents include the report from independent auditors balance sheet, the statement of income, the statement of changes in equity, the statement of cash flows and the explanatory notes to the financial statements.

  2. Parents: Avoid Kids Foot Problems with the Right Shoes

    Science.gov (United States)

    ... Print | Share Avoid Kids Foot Problems with the Right Shoes Before you head to the store to ... College of Foot and Ankle Surgeons (ACFAS), All Rights Reserved. Privacy Statement | Disclaimer | Terms and Conditions | Site ...

  3. 7 CFR 1230.82 - Confidential treatment.

    Science.gov (United States)

    2010-01-01

    ... statements based upon the reports of a number of persons subject to this subpart or of statistical data collected therefrom, which statements or data do not identify the information furnished by any person; or (b... Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (MARKETING...

  4. WTO confidential: the case of asbestos. World Trade Organization.

    Science.gov (United States)

    Castleman, Barry

    2002-01-01

    The World Trade Organization (WTO), created in 1995, adjudicates "trade disputes" between member nations in cases with great human rights, cultural, environmental, and public health significance. Throughout the process of dispute resolution and even after a case is concluded, very little of what happens is made accessible to the public. However, it is one thing to criticize the WTO for its lack of transparency from outside the process, and another to critically examine what was withheld from disclosure and what dangers that presents. This is the inside story from a scientific adviser to one of the parties in a WTO case, analyzing what happened from a public health point of view. This analysis concludes that the public health justification of banning asbestos was accepted in the end by the economists at the WTO, despite the WTO's bias in favoring the party (Canada) making the free trade challenge (to public health legislation, in this case) in numerous stages of the process, despite the WTO's utter lack of expertise in science, medicine, engineering, and public health, and despite important erroneous statements made to the WTO under the cover of confidentiality. Despite its result, this case illustrates that the WTO's threat to national sovereignty could never withstand the light of day, that the people of the world would reject this dangerous free trade fundamentalism if the limitations and dangers of the process were open for all to see.

  5. Safeguarding Confidentiality in Electronic Health Records.

    Science.gov (United States)

    Shenoy, Akhil; Appel, Jacob M

    2017-04-01

    Electronic health records (EHRs) offer significant advantages over paper charts, such as ease of portability, facilitated communication, and a decreased risk of medical errors; however, important ethical concerns related to patient confidentiality remain. Although legal protections have been implemented, in practice, EHRs may be still prone to breaches that threaten patient privacy. Potential safeguards are essential, and have been implemented especially in sensitive areas such as mental illness, substance abuse, and sexual health. Features of one institutional model are described that may illustrate the efforts to both ensure adequate transparency and ensure patient confidentiality. Trust and the therapeutic alliance are critical to the provider-patient relationship and quality healthcare services. All of the benefits of an EHR are only possible if patients retain confidence in the security and accuracy of their medical records.

  6. Improved Message Authentication and Confidentiality Checking

    International Nuclear Information System (INIS)

    Ismail Jabiullah, M.; Abdullah Al-Shamim, M.; Lutfar Rahman, M.

    2005-01-01

    The most confusing areas of the secured network communications are the message authentication and confidentiality checking. The attacks and the counter measures have become so convoluted that the users in this area begin to account for all contingencies. Two session-key generation techniques are used here to generate two separate session keys K 1 and K 2 ; and both the sender and the reveiver share these keys for higher degree of authentication and confidentiality. For this, the message is first encrypted by the key K 1 , and then the intermediary message authenticatin code (MAC) is generated by encrypting the encrypted message using the key K 2 . Then, the encrypted message and the intermediary MAC is again encrypted by using the K 2 and concatenated with the encrypted message and sent to the destination. At the receiving end, first, the received ciphertext is encrypted by using key K 2 and compared to the received MAC. The received ciphertext again is decrypted by the key K 2 and compared with the first decrypted MAC twice by the key K 2 . The plaintext is obtained by decrypting the received ciphertext first by K 2 and then by K 1 , using the corresponding decryption techniques respectively. The encryption techniques with key K 2 provides the authentication and with key K 1 provides the confidentiality checking of the transmitted message. The developed technique can be applied to both academic and commercial applications in online or offline electronic transactions for security.(authors)

  7. Practical State Machine Replication with Confidentiality

    Energy Technology Data Exchange (ETDEWEB)

    Duan, Sisi [ORNL; Zhang, Haibin [University of North Carolina, Chapel Hill

    2016-01-01

    We study how to enable arbitrary randomized algorithms in Byzantine fault-tolerant (BFT) settings. We formalize a randomized BFT protocol and provide a simple and efficient construction that can be built on any existing BFT protocols while adding practically no overhead. We go one step further to revisit a confidential BFT protocol (Yin et al., SOSP '03). We show that their scheme is potentially susceptible to safety and confidentiality attacks. We then present a new protocol that is secure in the stronger model we formalize, by extending the idea of a randomized BFT protocol. Our protocol uses only efficient symmetric cryptography, while Yin et al.'s uses costly threshold signatures. We implemented and evaluated our protocols on microbenchmarks and real-world use cases. We show that our randomized BFT protocol is as efficient as conventional BFT protocols, and our confidential BFT protocol is two to three orders of magnitude faster than Yin et al.'s, which is less secure than ours.

  8. Access control and confidentiality in radiology

    Science.gov (United States)

    Noumeir, Rita; Chafik, Adil

    2005-04-01

    A medical record contains a large amount of data about the patient such as height, weight and blood pressure. It also contains sensitive information such as fertility, abortion, psychiatric data, sexually transmitted diseases and diagnostic results. Access to this information must be carefully controlled. Information technology has greatly improved patient care. The recent extensive deployment of digital medical images made diagnostic images promptly available to healthcare decision makers, regardless of their geographic location. Medical images are digitally archived, transferred on telecommunication networks, and visualized on computer screens. However, with the widespread use of computing and communication technologies in healthcare, the issue of data security has become increasingly important. Most of the work until now has focused on the security of data communication to ensure its integrity, authentication, confidentiality and user accountability. The mechanisms that have been proposed to achieve the security of data communication are not specific to healthcare. Data integrity can be achieved with data signature. Data authentication can be achieved with certificate exchange. Data confidentiality can be achieved with encryption. User accountability can be achieved with audits. Although these mechanisms are essential to ensure data security during its transfer on the network, access control is needed in order to ensure data confidentiality and privacy within the information system application. In this paper, we present and discuss an access control mechanism that takes into account the notion of a care process. Radiology information is categorized and a model to enforce data privacy is proposed.

  9. 13 CFR 120.1060 - Confidentiality of Reports, Risk Ratings and related Confidential Information.

    Science.gov (United States)

    2010-01-01

    ... other than SBA's Lender oversight and SBA's portfolio management purposes. An SBA Lender, Intermediary... conjunction with SBA's Lender Oversight Program and SBA's portfolio management (for purposes of this... 13 Business Credit and Assistance 1 2010-01-01 2010-01-01 false Confidentiality of Reports, Risk...

  10. Pengaruh Ukuran Perusahaan terhadap Aggressive Tax Avoidance di Indonesia

    OpenAIRE

    M. Khoiru Rusydi

    2013-01-01

    This study aims to empirically examine the effect of firm size (Firm Size) against aggressive tax avoidance (aggressive tax avoidance) in Indonesia. The method in use is descriptive quantitative with panel data of financial statements of listed companies on the Stock Exchange in the period 2010-2012 which regresswith Eviews program. The results of this study indicate that company size has no effect on aggressive tax avoidance in Indonesia, which means that the behavior of firms in Indonesia f...

  11. Privacy, confidentiality and automated health information systems.

    Science.gov (United States)

    Vuori, H

    1977-12-01

    Professor Vuori's paper, first presented at the fourth Medico-legal Conference in Prague in the spring of this year, deals with the problem of the maintenance of confidentiality in computerized health records. Although more and more information is required, the hardware of the computer systems is so sophisticated that it would be very expensive indeed to 'break in' and steal from a modern data bank. Those concerned with programming computers are becoming more aware of their responsibilities concerning confidentiality and privacy, to the extent that a legal code of ethics for programmers is being formulated. They are also aware that the most sensitive of all relationships--the doctor-patient relationship--could be in danger if they failed to maintain high standards of integrity. An area of danger is where administrative boundaries between systems must be crossed--say between those of health and employment. Protection of privacy must be ensured by releasing full information about the type of data being stored, and by maintaining democratic control over the establishment of information systems.

  12. Ombuds’ corner: Open door and confidentiality

    CERN Multimedia

    Vincent Vuillemin

    2013-01-01

    For the Open Days, CERN will be transparent for all visitors. It's also the occasion to remember that the Ombuds' door is fully open every day of the year for all persons working for or on behalf of CERN.   The door is open, but as soon as it's closed for a discussion, the office becomes a place where total confidentiality is preserved. This may appear as a contradiction, no? The Ombuds is available to help everyone in all circumstances, but his clause of confidentiality prevents him from acting without the consent of his “visitors”. How can he possibly resolve the in-house conflicts in groups, or units, if all the parties do not voluntarily participate in its resolution? The answer is clear: the job of the Ombuds is to help the parties resolve their conflict by themselves. He will provide a few rules of communication, a process of mutual respect, suggest some possibilities that the parties may want to follow, and mediate the dispute so that people...

  13. Confidential Declaration of Family Situation (CDFS)

    CERN Document Server

    Human Resources Department

    2005-01-01

    The Confidential Declaration of Family Situation (CDFS) becomes a new computerized EDH form from October 2005 In accordance with Article R IV 1.17 of the Staff Regulations, Staff Members and Fellows, married or separated, must notify any changes in their spouse's income or health insurance cover in writing to CERN, within 30 calendar days of the change. This is necessary for the Organization to determine if a supplementary contribution is payable to the CERN Health Insurance Scheme (CHIS) for the spouse's coverage and, if so, the amount. Until now a paper form called « Confidential Declaration of Family Situation » (CDFS) was used for that purpose.  From early October 2005 the CDFS will be computerized for the whole Organization. Henceforth, any changes in a spouse's income or health insurance cover must be notified using EDH (Electronic Document Handling). Additionally, annual updates of the declaration will be required and will be requested by automatic e-mail. Early October an email will be sent to...

  14. Confidential Declaration of Family Situation (CDFS)

    CERN Multimedia

    Human Resources Department

    2005-01-01

    The Confidential Declaration of Family Situation (CDFS) becomes a new computerized EDH form from October 2005 In accordance with Article R IV 1.17 of the Staff Regulations, Staff Members and Fellows, married or separated, must notify any changes in their spouse's income or health insurance cover in writing to CERN, within 30 calendar days of the change. This is necessary for the Organization to determine if a supplementary contribution is payable to the CERN Health Insurance Scheme (CHIS) for the spouse's coverage and, if so, the amount. Until now a paper form called « Confidential Declaration of Family Situation » (CDFS) was used for that purpose.  From early October 2005 the CDFS will be computerized for the whole Organization. Henceforth, any changes in a spouse's income or health insurance cover must be notified using EDH (Electronic Document Handling). Additionally, annual updates of the declaration will be required and will be requested by automatic e-mail. Early October an email will be...

  15. 12 CFR 563g.13 - Public disclosure and confidential treatment.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 5 2010-01-01 2010-01-01 false Public disclosure and confidential treatment. 563g.13 Section 563g.13 Banks and Banking OFFICE OF THRIFT SUPERVISION, DEPARTMENT OF THE TREASURY SECURITIES OFFERINGS § 563g.13 Public disclosure and confidential treatment. (a) Any offering circular...

  16. 7 CFR 1205.540 - Confidential books, records, and reports.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 10 2010-01-01 2010-01-01 false Confidential books, records, and reports. 1205.540 Section 1205.540 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL... Confidential books, records, and reports. All information obtained from the books, records, and reports of...

  17. 19 CFR 210.5 - Confidential business information.

    Science.gov (United States)

    2010-04-01

    ... 19 Customs Duties 3 2010-04-01 2010-04-01 false Confidential business information. 210.5 Section 210.5 Customs Duties UNITED STATES INTERNATIONAL TRADE COMMISSION INVESTIGATIONS OF UNFAIR PRACTICES IN IMPORT TRADE ADJUDICATION AND ENFORCEMENT Rules of General Applicability § 210.5 Confidential...

  18. Client confidentiality: Perspectives of students in a healthcare ...

    African Journals Online (AJOL)

    This moral dilemma is difficult for students to circumvent and therefore this paper presents healthcare students' perspectives of confidentiality. Methods. We aimed to explore healthcare students' views and experiences of confidentiality as an ethical principle by adopting a qualitative explorative approach. Purposeful ...

  19. 29 CFR 4010.13 - Confidentiality of information submitted.

    Science.gov (United States)

    2010-07-01

    ... REPORTING AND DISCLOSURE REQUIREMENTS ANNUAL FINANCIAL AND ACTUARIAL INFORMATION REPORTING § 4010.13 Confidentiality of information submitted. In accordance with § 4901.21(a)(3) of this chapter and ERISA section... 29 Labor 9 2010-07-01 2010-07-01 false Confidentiality of information submitted. 4010.13 Section...

  20. 20 CFR 726.113 - Disclosure of confidential information.

    Science.gov (United States)

    2010-04-01

    ... MINE OPERATOR'S INSURANCE Authorization of Self-Insurers § 726.113 Disclosure of confidential... 20 Employees' Benefits 3 2010-04-01 2010-04-01 false Disclosure of confidential information. 726... authorized self-insurer or applicant for the authorization of self-insurance obtained by the Office shall be...

  1. 15 CFR 718.2 - Identification of confidential business information.

    Science.gov (United States)

    2010-01-01

    ... business information. 718.2 Section 718.2 Commerce and Foreign Trade Regulations Relating to Commerce and Foreign Trade (Continued) BUREAU OF INDUSTRY AND SECURITY, DEPARTMENT OF COMMERCE CHEMICAL WEAPONS CONVENTION REGULATIONS CONFIDENTIAL BUSINESS INFORMATION 718.2 Identification of confidential business...

  2. 19 CFR 181.121 - Maintenance of confidentiality.

    Science.gov (United States)

    2010-04-01

    ... 181.121 Customs Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY; DEPARTMENT OF THE TREASURY (CONTINUED) NORTH AMERICAN FREE TRADE AGREEMENT Confidentiality of Business... possession of confidential business information collected pursuant to this part shall, in accordance with...

  3. 75 FR 75586 - Confidentiality of Suspicious Activity Reports

    Science.gov (United States)

    2010-12-03

    ...] RIN 1550-AC26 Confidentiality of Suspicious Activity Reports AGENCY: The Office of Thrift Supervision... implementing the Bank Secrecy Act (BSA) governing the confidentiality of a suspicious activity report (SAR) to... corporations regulated by the OTS, to keep certain records and make certain reports that have been determined...

  4. Confidentiality: From the Stacks to the Witness Stand.

    Science.gov (United States)

    Lee, Janis M.; Smith, G. Guy

    1988-01-01

    A library director describes her experience of safeguarding the confidentiality of the circulation records of a woman who went on a shooting rampage at a shopping mall. The lawyer who represented the library discusses the legal responsibility of public and school libraries concerning confidentiality. (CLB)

  5. 50 CFR 600.130 - Protection of confidentiality of statistics.

    Science.gov (United States)

    2010-10-01

    ... statistics. 600.130 Section 600.130 Wildlife and Fisheries FISHERY CONSERVATION AND MANAGEMENT, NATIONAL... Fishery Management Councils § 600.130 Protection of confidentiality of statistics. Each Council must establish appropriate procedures for ensuring the confidentiality of the statistics that may be submitted to...

  6. 42 CFR 35.11 - Clinical records; confidential.

    Science.gov (United States)

    2010-10-01

    ... EXAMINATIONS HOSPITAL AND STATION MANAGEMENT General § 35.11 Clinical records; confidential. A complete clinical record shall be maintained for each patient admitted to a station or hospital of the Service. Such... 42 Public Health 1 2010-10-01 2010-10-01 false Clinical records; confidential. 35.11 Section 35.11...

  7. Genetic secrets: Protecting privacy and confidentiality in the genetic era

    Energy Technology Data Exchange (ETDEWEB)

    Rothstein, M.A. [ed.

    1998-07-01

    Few developments are likely to affect human beings more profoundly in the long run than the discoveries resulting from advances in modern genetics. Although the developments in genetic technology promise to provide many additional benefits, their application to genetic screening poses ethical, social, and legal questions, many of which are rooted in issues of privacy and confidentiality. The ethical, practical, and legal ramifications of these and related questions are explored in depth. The broad range of topics includes: the privacy and confidentiality of genetic information; the challenges to privacy and confidentiality that may be projected to result from the emerging genetic technologies; the role of informed consent in protecting the confidentiality of genetic information in the clinical setting; the potential uses of genetic information by third parties; the implications of changes in the health care delivery system for privacy and confidentiality; relevant national and international developments in public policies, professional standards, and laws; recommendations; and the identification of research needs.

  8. 19 CFR 200.735-117 - Supplementary statements.

    Science.gov (United States)

    2010-04-01

    ... under this section, each employee shall at all times avoid acquiring a financial interest that could... CONDUCT Provisions Governing Statements of Employment and Financial Interests § 200.735-117 Supplementary... and financial interests shall be reported in a supplementary statement as of June 30 each year. If no...

  9. 49 CFR 805.735-17 - Supplementary statements.

    Science.gov (United States)

    2010-10-01

    ... SAFETY BOARD EMPLOYEE RESPONSIBILITIES AND CONDUCT § 805.735-17 Supplementary statements. Changes in, or additions to, the information contained in an employee's statement of employment and financial interests.... Notwithstanding the filing of the annual report required by this section, each employee shall at all times avoid...

  10. Physician Knowledge and Attitudes around Confidential Care for Minor Patients.

    Science.gov (United States)

    Riley, Margaret; Ahmed, Sana; Reed, Barbara D; Quint, Elisabeth H

    2015-08-01

    Minor adolescent patients have a legal right to access certain medical services confidentially without parental consent or notification. We sought to assess physicians' knowledge of these laws, attitudes around the provision of confidential care to minors, and barriers to providing confidential care. An anonymous online survey was sent to physicians in the Departments of Family Medicine, Internal Medicine-Pediatrics, Obstetrics/Gynecology, and Pediatrics at the University of Michigan. Response rate was 40% (259/650). The majority of physicians felt comfortable addressing sexual health, mental health, and substance use with adolescent patients. On average, physicians answered just over half of the legal knowledge questions correctly (mean 56.6% ± 16.7%). The majority of physicians approved of laws allowing minors to consent for confidential care (90.8% ± 1.7% approval), while substantially fewer (45.1% ± 4.5%) approved of laws allowing parental notification of this care at the physician's discretion. Most physicians agreed that assured access to confidential care should be a right for adolescents. After taking the survey most physicians (76.6%) felt they needed additional training on confidentiality laws. The provision of confidential care to minors was perceived to be most inhibited by insurance issues, parental concerns/relationships with the family, and issues with the electronic medical record. Physicians are comfortable discussing sensitive issues with adolescents and generally approve of minor consent laws, but lack knowledge about what services a minor can access confidentially. Further research is needed to assess best methods to educate physicians about minors' legal rights to confidential healthcare services. Copyright © 2015 North American Society for Pediatric and Adolescent Gynecology. Published by Elsevier Inc. All rights reserved.

  11. Protecting Privacy and Confidentiality in Environmental Health Research.

    Science.gov (United States)

    Resnik, David B

    2010-01-01

    Environmental health researchers often need to make difficult decisions on how to protect privacy and confidentiality when they conduct research in the home or workplace. These dilemmas are different from those normally encountered in clinical research. Although protecting privacy and confidentiality is one of the most important principles of research involving human subjects, it can be overridden to prevent imminent harm to individuals or if required by law. Investigators should carefully consider the facts and circumstances and use good judgment when deciding whether to breach privacy or confidentiality.

  12. Pengaruh Ukuran Perusahaan terhadap Aggressive Tax Avoidance di Indonesia

    Directory of Open Access Journals (Sweden)

    M. Khoiru Rusydi

    2013-08-01

    Full Text Available This study aims to empirically examine the effect of firm size (Firm Size against aggressive tax avoidance (aggressive tax avoidance in Indonesia. The method in use is descriptive quantitative with panel data of financial statements of listed companies on the Stock Exchange in the period 2010-2012 which regresswith Eviews program. The results of this study indicate that company size has no effect on aggressive tax avoidance in Indonesia, which means that the behavior of firms in Indonesia for more aggressive tax avoidance do not affect the size of the company.

  13. Ethics in health care: confidentiality and information technologies

    African Journals Online (AJOL)

    information could result in confidential patient data falling ... Before the advent of the new communication and information technologies (NCITs), patient care was sometimes delayed .... computer system intended to be used and the security.

  14. Novel approach to information security management of confidential ...

    African Journals Online (AJOL)

    Novel approach to information security management of confidential and propriety information ... Journal of Fundamental and Applied Sciences ... valuable information by using steganography it can have a major impact security management.

  15. Privacy Perspectives for Online Searchers: Confidentiality with Confidence?

    Science.gov (United States)

    Duberman, Josh; Beaudet, Michael

    2000-01-01

    Presents issues and questions involved in online privacy from the information professional's perspective. Topics include consumer concerns; query confidentiality; securing computers from intrusion; electronic mail; search engines; patents and intellectual property searches; government's role; Internet service providers; database mining; user…

  16. 7 CFR 983.9 - Confidential data or information.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 8 2010-01-01 2010-01-01 false Confidential data or information. 983.9 Section 983.9 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (Marketing... customers. ...

  17. 40 CFR 86.615-84 - Treatment of confidential information.

    Science.gov (United States)

    2010-07-01

    ...) Selective Enforcement Auditing of New Light-Duty Vehicles, Light-Duty Trucks, and Heavy-Duty Vehicles § 86... part 2, subpart B. (b) Any claim of confidentiality must accompany the information at the time it is...

  18. Building Trust and Confidentiality in Cloud computing Distributed ...

    African Journals Online (AJOL)

    new technology, this new way of doing business brings with it new challenges, ... In this paper, we looked at data security, described the current state of data ... has the potential to solve many threats concerning confidentiality and adoption of

  19. Confidentiality, disclosure and doping in sports medicine.

    Science.gov (United States)

    McNamee, M; Phillips, N

    2011-03-01

    The manner in which healthcare and medical professionals serve their athlete patients is governed by a variety of relevant codes of conduct. A range of codified rules is presented that refer both the welfare of the patient and the maintaining of confidentiality, which is at the heart of trustworthy relations. The 2009 version of the World Anti-Doping Code (WADC), however, appears to oblige all healthcare professionals not to assist athletes if they are known to be engaged in doping behaviours under fear of removal from working with athletes from the respective sports. In contrast, serving the best interests of their athlete patients may oblige healthcare professionals to give advice and guidance, not least in terms of harm minimisation. In so far as the professional conduct of a healthcare professional is guided both by professional code and World Anti-Doping Code, they are obliged to fall foul of one or the other. We call for urgent and pressing inter-professional dialogue with the World Anti-Doping Agency to clarify this situation.

  20. Security without obscurity a guide to confidentiality, authentication, and integrity

    CERN Document Server

    Stapleton, JJ

    2014-01-01

    The traditional view of information security includes the three cornerstones: confidentiality, integrity, and availability; however the author asserts authentication is the third keystone. As the field continues to grow in complexity, novices and professionals need a reliable reference that clearly outlines the essentials. Security without Obscurity: A Guide to Confidentiality, Authentication, and Integrity fills this need. Rather than focusing on compliance or policies and procedures, this book takes a top-down approach. It shares the author's knowledge, insights, and observations about infor

  1. Analysis of LYSA-calculus with explicit confidentiality annotations

    DEFF Research Database (Denmark)

    Gao, Han; Nielson, Hanne Riis

    2006-01-01

    Recently there has been an increased research interest in applying process calculi in the verification of cryptographic protocols due to their ability to formally model protocols. This work presents LYSA with explicit confidentiality annotations for indicating the expected behavior of target...... malicious activities performed by attackers as specified by the confidentiality annotations. The proposed analysis approach is fully automatic without the need of human intervention and has been applied successfully to a number of protocols....

  2. Financial Statements Analysis

    OpenAIRE

    Tănase Alin-Eliodor

    2014-01-01

    This article focuses on analyzing of a consolidated financial statements of a hypothetically SME. The interpretation of the financial position and performances is based on the more than 40 financial key ratios computed by using financial data from consolidated income statement, consolidated financial position and cash flow. However additional data from notes to financial statements are provided.

  3. Breaching confidentiality: medical mandatory reporting laws in Iran.

    Science.gov (United States)

    Milanifar, Alireza; Larijani, Bagher; Paykarzadeh, Parvaneh; Ashtari, Golanna; Mehdi Akhondi, Mohammad

    2014-01-01

    Medical ethics is a realm where four important subjects of philosophy, medicine, theology and law are covered. Physicians and philosophers cooperation in this area will have great efficiency in the respective ethical rules formation. In addition to respect the autonomy of the patient, physician's obligation is to ensure that the medical intervention has benefit for the patient and the harm is minimal. There is an obvious conflict between duty of confidentiality and duty of mandatory reporting. Professional confidentiality is one of the basic components in building a constant physician-patient relationship which nowadays, beside the novelty, it is the subject of discussion. Legal obligation of confidentiality is not absolute. In physician-patient relationship, keeping patient's secrets and maintaining confidentiality is a legal and ethical duty, and disclosure of such secrets is mainly through specific statutes. Thus, there are a number of situations where breach of confidentiality is permitted in different legal systems. One of the situations where breaching confidentiality is permitted is the medical mandatory reporting to the relevant authority which is in accordance with many countries' legal systems. Some situations are considered in many countries legal systems' such as notification of births and deaths, infectious diseases, child abuse, sport and relevant events, medical errors, drug side effects and dangerous pregnancies. In this paper, we will examine and discuss medical mandatory reporting and its ethical and legal aspects in the judicial and legal system of Iran and few other countries. Finally we will suggest making Medical Mandatory Reporting Law in Iran.

  4. Protecting confidentiality rights: the need for an ethical practice model.

    Science.gov (United States)

    Fisher, Mary Alice

    2008-01-01

    All psychologists must uphold the same ethical standards about confidentiality even though each state imposes different legal limits on their ability to protect clients' confidences. The resulting ethical-legal confusion is exacerbated by legally based confidentiality training that treats legal exceptions as if they were the rule and fosters the impression that attorneys are now the only real experts about this aspect of practice. This article provides an ethics-based confidentiality practice model that clarifies the ethical rule and puts its legal exceptions into ethical perspective. Like the Confidentiality section of the American Psychological Association's (2002) Ethical Principles of Psychologists and Code of Conduct, this outline would apply to all psychologists regardless of state laws, but the details of its implementation would vary according to role and setting. It can be used as a universal training outline, a consultation and supervision tool, a guide to professional practice, and a basis for clearer ongoing conversation about the ethics of "conditional confidentiality." Psychologists can use this practice model to regain their status as experts about the confidentiality ethics of their own profession. PsycINFO Database Record (c) 2008 APA, all rights reserved.

  5. [Cologne Statement for Medical Care of Refugees].

    Science.gov (United States)

    Wiesmüller, G A; Dötsch, J; Weiß, M; Wiater, A; Fätkenheuer, G; Nitschke, H; Bunte, A

    2016-04-01

    The Cologne statement resulted from both regional and nationwide controversial discussions about meaning and purpose of an initial examination for infectious diseases of refugees with respect to limited time, personnel and financial resources. Refugees per se are no increased infection risk factors for the general population as well as aiders, when the aiders comply with general hygiene rules and are vaccinated according to the recommendations of the German Standing Committee on Vaccination (STIKO). This is supported by our own data. Based on individual medical history, refugees need medical care, which is offered purposeful, economic, humanitarian and ethical. In addition to medical confidentiality, the reporting obligation according § 34 Infection Protection Act (IPA) and the examination concerning infectious pulmonary tuberculosis according to § 36 (4) IPA must be considered. © Georg Thieme Verlag KG Stuttgart · New York.

  6. Confidential donation confirmation as an alternative to confidential unit exclusion: 15 months experience of the HEMOMINAS foundation

    Directory of Open Access Journals (Sweden)

    Flávia Cristine Martineli Loureiro

    2011-01-01

    Full Text Available BACKGROUND: Confidential unit exclusion remains a controversial strategy to reduce the residual risk of transfusion-transmitted infections. OBJECTIVE: This study aimed to analyze confidential unit exclusion from its development in a large institution in light of confidential donation confirmation. METHODS: Data of individuals who donated from October 1, 2008 to December 31, 2009 were analyzed in a case-control study. The serological results and sociodemographic characteristics of donors who did not confirm their donations were compared to those who did. Variables with p-values < 0.20 in univariate analysis were included in a logistic multivariate analysis. RESULTS: In the univariate analysis there was a statically significant association between positive serological results and response to confidential donation confirmation of "No". Donation type, (firsttime or return donor - OR 1.69, CI 1.37-2.09, gender (OR 1.66, CI 1.35-2.04, education level (OR 2.82, CI 2.30-3.47 and ethnic background (OR 0.67, CI 0.55-0.82 were included in the final logistic regression model. In all logistic regression models analyzed, the serological suitability and confidential donation confirmation were not found to be statistically associated. The adoption of new measures of clinical classification such as audiovisual touch-screen computer-assisted self-administered interviews might be more effective than confidential unit exclusion in the identification of donor risk behavior. The requirement that transfusion services continue to use confidential unit exclusion needs to be debated in countries where more specific and sensitive clinical and serological screening methods are available. CONCLUSION: Our findings suggest that there are not enough benefits to justify continued use of confidential donation confirmation in the analyzed institution.

  7. Plagiarism in Personal Statements of Anesthesiology Residency Applicants.

    Science.gov (United States)

    Parks, Lance J; Sizemore, Daniel C; Johnstone, Robert E

    2016-02-15

    Plagiarism by residency applicants in their personal statements, as well as sites that sell personal statements, have been described, and led in 2011 to advice to avoid plagiarism and the caution that plagiarism detection software was available. We screened personal statements of 467 anesthesiology residency applicants from 2013-2014 using Viper Plagiarism Scanner software, and studied them for plagiarism. After quotes and commonly used phrases were removed, 82 statements contained unoriginal content of 8 or more consecutive words. After the study, 13.6% of personal statements from non-United States medical school graduates, and 4.0% from United States medical school graduates, contained plagiarized material, a significant difference. Plagiarized content ranged up to 58%. Plagiarism continues to occur in anesthesiology residency personal statements, with a higher incidence among graduates of non-United States medical schools.

  8. Neuromorphic UAS Collision Avoidance

    Data.gov (United States)

    National Aeronautics and Space Administration — Collision avoidance for unmanned aerial systems (UAS) traveling at high relative speeds is a challenging task. It requires both the detection of a possible collision...

  9. Nuclear exports. Parliamentary control and confidentiality

    International Nuclear Information System (INIS)

    Feldmann, Ulrike

    2015-01-01

    With its decision taken on 21. October 2014 (Az.: 2 BvE 5/11) the Federal Constitutional Court (BVerfG) decided during court proceedings between administrative bodies on the scope and limits of the parliamentary right of information. Even though the proceeding did not deal with nuclear exports but arm exports, foreign trade law, however, does not only designate an export licence obligation for military weapons but also for so called dual-use goods meaning goods, which can be used both for friendly as well as for military purposes. The export of these goods requires according to the so-called Dual-Use Regulation (EG) 428/2009 a licence. Annex I category 0 of the regulation (EG) 428/2009 lists a variety of nuclear materials, plants and equipment items for which this licence applies. In the same manner as arm exports, also exports of nuclear dual-use goods are being discussed in a special cabinet committee, the Federal Security Council (BSR), which shall coordinate cross-departmentally the German security and defence policy under consideration of economic interests and which categorises its results, according to the rules of procedure, as confidential. Also legally not regulated but common ''preliminary enquiries'' at the responsible Federal Ministry or rather Federal Office of Economics and Export Control by companies which plan an export and want to affirm the general approval for their export business prior to conclusion of contract take not only place for arm exports but also for nuclear dual-use goods. The decision by the Federal Constitutional Court can be applied to consultations about the authorisation of nuclear dual-use goods.

  10. 77 FR 26709 - Swap Data Repositories: Interpretative Statement Regarding the Confidentiality and...

    Science.gov (United States)

    2012-05-07

    ... COMMODITY FUTURES TRADING COMMISSION 17 CFR Part 49 RIN 3038-AD83 Swap Data Repositories... data repositories (``SDRs'').SDRs are new registered entities created by section 728 of the Dodd-Frank... Act amends section 1a of the CEA to add a definition of the term ``swap data repository.'' Pursuant to...

  11. Reactive Collision Avoidance Algorithm

    Science.gov (United States)

    Scharf, Daniel; Acikmese, Behcet; Ploen, Scott; Hadaegh, Fred

    2010-01-01

    The reactive collision avoidance (RCA) algorithm allows a spacecraft to find a fuel-optimal trajectory for avoiding an arbitrary number of colliding spacecraft in real time while accounting for acceleration limits. In addition to spacecraft, the technology can be used for vehicles that can accelerate in any direction, such as helicopters and submersibles. In contrast to existing, passive algorithms that simultaneously design trajectories for a cluster of vehicles working to achieve a common goal, RCA is implemented onboard spacecraft only when an imminent collision is detected, and then plans a collision avoidance maneuver for only that host vehicle, thus preventing a collision in an off-nominal situation for which passive algorithms cannot. An example scenario for such a situation might be when a spacecraft in the cluster is approaching another one, but enters safe mode and begins to drift. Functionally, the RCA detects colliding spacecraft, plans an evasion trajectory by solving the Evasion Trajectory Problem (ETP), and then recovers after the collision is avoided. A direct optimization approach was used to develop the algorithm so it can run in real time. In this innovation, a parameterized class of avoidance trajectories is specified, and then the optimal trajectory is found by searching over the parameters. The class of trajectories is selected as bang-off-bang as motivated by optimal control theory. That is, an avoiding spacecraft first applies full acceleration in a constant direction, then coasts, and finally applies full acceleration to stop. The parameter optimization problem can be solved offline and stored as a look-up table of values. Using a look-up table allows the algorithm to run in real time. Given a colliding spacecraft, the properties of the collision geometry serve as indices of the look-up table that gives the optimal trajectory. For multiple colliding spacecraft, the set of trajectories that avoid all spacecraft is rapidly searched on

  12. Can you keep a secret? Confidentiality in psychotherapy.

    Science.gov (United States)

    Younggren, Jeffrey N; Harris, Eric A

    2008-05-01

    Confidentiality is the secret-keeping duty that arises from the establishment of the professional relationship psychologists develop with their clients. It is a duty created by the professional relationship, it is set forth in the American Psychological Association's (2002) Ethical Principles and Code of Conduct, and it is codified in many state regulations. However, the difference between confidentiality and legal privilege; how, why, and when it can be violated; and the reasons for so doing are not well understood by many practitioners. While on the surface confidentiality might seem to be an easy concept to apply to professional practice, in fact it is quite complex and filled with exceptions that frequently differ from circumstance to circumstance and from state to state. A lack of respect for and a lack of familiarity with the significance of these exceptions could have dire professional consequences. This article reviews the ethical imperative of confidentiality and then provides examples of legal cases that help to better understand its complexity. Then, we offer strategies designed to help metal health practitioners when they are confronted with questions regarding confidentiality and privilege.

  13. Improving Individual Acceptance of Health Clouds through Confidentiality Assurance.

    Science.gov (United States)

    Ermakova, Tatiana; Fabian, Benjamin; Zarnekow, Rüdiger

    2016-10-26

    Cloud computing promises to essentially improve healthcare delivery performance. However, shifting sensitive medical records to third-party cloud providers could create an adoption hurdle because of security and privacy concerns. This study examines the effect of confidentiality assurance in a cloud-computing environment on individuals' willingness to accept the infrastructure for inter-organizational sharing of medical data. We empirically investigate our research question by a survey with over 260 full responses. For the setting with a high confidentiality assurance, we base on a recent multi-cloud architecture which provides very high confidentiality assurance through a secret-sharing mechanism: Health information is cryptographically encoded and distributed in a way that no single and no small group of cloud providers is able to decode it. Our results indicate the importance of confidentiality assurance in individuals' acceptance of health clouds for sensitive medical data. Specifically, this finding holds for a variety of practically relevant circumstances, i.e., in the absence and despite the presence of conventional offline alternatives and along with pseudonymization. On the other hand, we do not find support for the effect of confidentiality assurance in individuals' acceptance of health clouds for non-sensitive medical data. These results could support the process of privacy engineering for health-cloud solutions.

  14. Financial Statement Math

    OpenAIRE

    2007-01-01

    game tool Game Tool Interactive Media Element The purpose of this interactive exercise is to help you understand the math in the income statement and balance sheet., Give the proper mathematical computations in order to correctly prepare the income statement and the balance sheet.The exercise is divided into 3 parts: The income Statement, The Balance Sheet - Assets, The Balance Sheet - Liabilities, GB3050 Financial Reporting and Analysis

  15. Computer Security: confidentiality is everybody’s business

    CERN Multimedia

    Stefan Lueders, Computer Security Team

    2015-01-01

    Recently, a zip file with confidential information was mistakenly made public on one of CERN’s websites. Although the file was only intended for members of an internal committee, when placing it onto the CERN website, someone made a mistake when setting the access permissions and, thus, made the file accessible to everyone visiting the site!   Unfortunately, this is but one example of such mistakes. We have seen other documents made accessible to a much wider audience than originally intended… CERN takes serious measures to ensure the confidentiality of data. Confidential or “sensitive” documents (following the nomenclature set out in the CERN Data Protection Policy) deserve professional handling and access protections given only to the people who really need to access them. As such, they must not be widely circulated as attachments in e-mails and, most definitely, must not be stored on random public websites for the sole purpose of shari...

  16. Independent consultants : fiduciary duties, trade secrets and confidential information

    International Nuclear Information System (INIS)

    Fraser, B.; Wilhelmson, M.

    1999-01-01

    Because of cutbacks and downsizing within the petroleum industry, it has become one of the largest users of contract personnel to provide services that were previously provided by senior levels of management. This paper explored the application of common law fiduciary duties and the duty of confidence to the independent workforce. It examined to what extent fiduciary duties apply to independent consultants and the best way for the employer to protect itself from the potential misuse of confidential information. Part 1 of the paper described fiduciary duties. A fiduciary relationship was described as one that possesses the following three characteristics: (1) the fiduciary has scope for the exercise of some discretion of power, (2) the fiduciary can unilaterally exercise that power to affect the beneficiary's practical interests, and (3) the beneficiary is peculiarly vulnerable to the fiduciary holding the discretion of power. Three examples of how the courts treated some arguments regarding fiduciaries were presented. Part 2 of this paper discussed how trade secrets and confidential information should be handled. It was explained, that regardless of fiduciary duties, the unauthorized use of confidential information by an independent contractor can give rise to liability and an award of damages by the courts. Some examples where the Supreme Court of Canada found breach of confidence by a party were presented. Information communicated from an employer to an employee can be divided into the following three categories: (1) publicly accessible and not confidential, (2) confidential and must be treated as such while an employee is employed, but if learned becomes part of the employees skill and knowledge, and (3) specific confidential trade secrets that cannot lawfully be used for anyone's benefit but the employer's. Issues regarding defining rights and obligations by contract were also discussed

  17. Avoiding the Flu

    Science.gov (United States)

    ... of this page please turn Javascript on. Feature: Flu Avoiding the Flu Past Issues / Fall 2009 Table of Contents Children ... should still get the 2009 H1N1 vaccine. H1N1 Flu: Who Should Be Vaccinated First The Centers for ...

  18. Helping Students Avoid Plagiarism.

    Science.gov (United States)

    Wilhoit, Stephen

    1994-01-01

    Discusses how and why college students commit plagiarism, suggesting techniques that instructors can use to help student avoid plagiarism. Instructors should define and discuss plagiarism thoroughly; discuss hypothetical cases; review the conventions of quoting and documenting material; require multiple drafts of essays; and offer responses…

  19. Human pathogen avoidance adaptations

    NARCIS (Netherlands)

    Tybur, J.M.; Lieberman, D.

    2016-01-01

    Over the past few decades, researchers have become increasingly interested in the adaptations guiding the avoidance of disease-causing organisms. Here we discuss the latest developments in this area, including a recently developed information-processing model of the adaptations underlying pathogen

  20. Enhanced Obfuscation Technique for Data Confidentiality in Public Cloud Storage

    Directory of Open Access Journals (Sweden)

    Oli S. Arul

    2016-01-01

    Full Text Available With an advent of cloud computing, data storage has become a boon in information technology. At the same time, data storage in remote places have become important issues. Lot of techniques are available to ensure protection of data confidentiality. These techniques do not completely serve the purpose in protecting data. The Obfuscation techniques come to rescue for protecting data from malicious attacks. This paper proposes an obfuscation technique to encrypt the desired data type on the cloud providing more protection from unknown hackers. The experimental results show that the time taken for obfuscation is low and the confidentiality percentage is high when compared with existing techniques.

  1. Teaching Philosophy Statements

    Science.gov (United States)

    Faryadi, Qais

    2015-01-01

    This article examines the rationale for my teaching philosophy. Using a personal perspective, I explain my objectives, mission, and vision in writing my philosophy of teaching statements. This article also creates a road map and reference points for educators who want to write their own teaching philosophy statements to help them make informed…

  2. 78 FR 16298 - Comment Request for Information Collection: Confidentiality and Disclosure of State Unemployment...

    Science.gov (United States)

    2013-03-14

    ... Collection: Confidentiality and Disclosure of State Unemployment Compensation Information Final Rule and... about the regulatory requirements of the Confidentiality and Disclosure of State Unemployment... Administration, Office of Unemployment Insurance, 200 Constitution Avenue NW., Room S4524, Washington, DC 20210...

  3. 77 FR 1434 - Proposed Confidentiality Determinations for Data Elements Under the Mandatory Reporting of...

    Science.gov (United States)

    2012-01-10

    ... Fluorinated Gas Production....... 325120 Industrial gases manufacturing facilities. Electrical Equipment Use... Proposed Confidentiality Determinations for Data Elements Under the Mandatory Reporting of Greenhouse Gases...-proposes confidentiality determinations for the data elements under the Mandatory Greenhouse Gas Reporting...

  4. 77 FR 63537 - Greenhouse Gas Reporting Program: Proposed Amendments and Confidentiality Determinations for...

    Science.gov (United States)

    2012-10-16

    ... Greenhouse Gas Reporting Program: Proposed Amendments and Confidentiality Determinations for Subpart I...-AR61 Greenhouse Gas Reporting Program: Proposed Amendments and Confidentiality Determinations for... Manufacturing, of the Greenhouse Gas Reporting Rule. Proposed changes include revising certain calculation...

  5. Professional Disclosure Statements and Formal Plans for Supervision: Two Strategies for Minimizing the Risk of Ethical Conflicts in Post-Master's Supervision.

    Science.gov (United States)

    Cobia, Debra C.; Boes, Susan R.

    2000-01-01

    Discusses ethical conflicts related to issues of informed consent, due process, competence, confidentiality, and dual relationships in supervision. Proposes two strategies as ways to minimize the potential for ethical conflict in post-master's supervision: the use of professional disclosure statements by supervisors and the development of formal…

  6. Opening statements and general statements by delegation

    International Nuclear Information System (INIS)

    1978-01-01

    23 delegations have submitted general reports and statements on the situation and evolution of the nuclear fuel cycle. Each report reflects the particular interests of the country that submitted it. All in all, these reports provide general background information on the subject of the conference

  7. Effective verification of confidentiality for multi-threaded programs

    NARCIS (Netherlands)

    Ngo, Minh Tri; Stoelinga, Mariëlle Ida Antoinette; Huisman, Marieke

    2014-01-01

    This paper studies how confidentiality properties of multi-threaded programs can be verified efficiently by a combination of newly developed and existing model checking algorithms. In particular, we study the verification of scheduler-specific observational determinism (SSOD), a property that

  8. 15 CFR 325.16 - Protecting confidentiality of information.

    Science.gov (United States)

    2010-01-01

    ... 15 Commerce and Foreign Trade 2 2010-01-01 2010-01-01 false Protecting confidentiality of information. 325.16 Section 325.16 Commerce and Foreign Trade Regulations Relating to Commerce and Foreign Trade (Continued) INTERNATIONAL TRADE ADMINISTRATION, DEPARTMENT OF COMMERCE MISCELLANEOUS REGULATIONS...

  9. Absolutism on Access and Confidentiality: Principled or Irresponsible?

    Science.gov (United States)

    Sheerin, William E.

    1991-01-01

    Discusses issues involved in public access to library materials and facilities and patron confidentiality. Topics discussed include children's access to adult materials; parents' right to know about their children's materials; First and Fourth Amendment protections; the Library Bill of Rights; and American Library Association (ALA) documents that…

  10. 40 CFR 303.31 - Assurance of claimant confidentiality.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 27 2010-07-01 2010-07-01 false Assurance of claimant confidentiality. 303.31 Section 303.31 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) SUPERFUND... knowledge, shall be given access to the identity of, or information that would lead to the identity of, a...

  11. 18 CFR 1b.9 - Confidentiality of investigations.

    Science.gov (United States)

    2010-04-01

    ... 18 Conservation of Power and Water Resources 1 2010-04-01 2010-04-01 false Confidentiality of investigations. 1b.9 Section 1b.9 Conservation of Power and Water Resources FEDERAL ENERGY REGULATORY COMMISSION... pursuant to subpoena, and all investigative proceedings shall be treated as nonpublic by the Commission and...

  12. 22 CFR 1104.17 - Confidentiality of archaeological resource information.

    Science.gov (United States)

    2010-04-01

    ... 22 Foreign Relations 2 2010-04-01 2010-04-01 true Confidentiality of archaeological resource information. 1104.17 Section 1104.17 Foreign Relations INTERNATIONAL BOUNDARY AND WATER COMMISSION, UNITED... of archaeological resource information. (a) The Commissioner shall not make available to the public...

  13. IT Confidentiality Risk Assessment for an Architecture-Based Approach

    NARCIS (Netherlands)

    Morali, A.; Zambon, Emmanuele; Etalle, Sandro; Overbeek, Paul

    2008-01-01

    Information systems require awareness of risks and a good understanding of vulnerabilities and their exploitations. In this paper, we propose a novel approach for the systematic assessment and analysis of confidentiality risks caused by disclosure of operational and functional information. The

  14. 12 CFR 19.181 - Confidentiality of formal investigations.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 1 2010-01-01 2010-01-01 false Confidentiality of formal investigations. 19.181 Section 19.181 Banks and Banking COMPTROLLER OF THE CURRENCY, DEPARTMENT OF THE TREASURY RULES OF... only in accordance with the provisions of part 4 of this chapter. ...

  15. 19 CFR 210.72 - Confidentiality of information.

    Science.gov (United States)

    2010-04-01

    ... 19 Customs Duties 3 2010-04-01 2010-04-01 false Confidentiality of information. 210.72 Section 210.72 Customs Duties UNITED STATES INTERNATIONAL TRADE COMMISSION INVESTIGATIONS OF UNFAIR PRACTICES IN IMPORT TRADE ADJUDICATION AND ENFORCEMENT Enforcement Procedures and Advisory Opinions § 210.72...

  16. 19 CFR 210.20 - Declassification of confidential information.

    Science.gov (United States)

    2010-04-01

    ... 19 Customs Duties 3 2010-04-01 2010-04-01 false Declassification of confidential information. 210.20 Section 210.20 Customs Duties UNITED STATES INTERNATIONAL TRADE COMMISSION INVESTIGATIONS OF UNFAIR PRACTICES IN IMPORT TRADE ADJUDICATION AND ENFORCEMENT Motions § 210.20 Declassification of...

  17. Zerber: r-Confidential Indexing for Distributed Documents

    NARCIS (Netherlands)

    Zerr, Sergej; Demidova, Elena; Olmedilla, Daniel; Nejdl, Wolfgang; Winslett, Marianne; Mitra, Soumyadeb

    2008-01-01

    Zerr, S., Demidova, E., Olmedilla, D., Nejdl, W., Winslett, M., & Mitra, S. (2008). Zerber: r-Confidential Indexing for Distributed Documents. In J. Teubner (Eds.), Proceedings of the 11th International Conference on Extending Database Technology (pp. 287-298). March, 25-29, 2008, Nantes, France.

  18. Meaningful Use of a Confidential Adolescent Patient Portal.

    Science.gov (United States)

    Thompson, Lindsay A; Martinko, Thomas; Budd, Pamela; Mercado, Rebeccah; Schentrup, Anzeela M

    2016-02-01

    To design and evaluate the usage of an adolescent patient portal specifically adapted for adolescent health care needs that also satisfied institutional meaningful use guidelines regarding electronic health records. Key stakeholders at one academic health care center adopted an online portal and opted to designate a patient portal specifically for adolescents to maximize confidentiality in compliance with state privacy laws. This study analyzed aggregate electronic health record data of adolescents' (ages 12-17.9 years) uptake, usage, and functionality of this portal and compared it to parent portal usage for younger children (ages 0-11 years). Differences in means were calculated using paired t tests. The portal was used similarly between parents of young children and adolescents, with almost 1,000 enrollees in each group from September 1, 2012 to March 31, 2015. There were no gender differences in enrollment. Adolescents were less likely than parents of younger children to review appointments (73% vs. 85%), laboratory tests (67% vs. 79%), problem lists (40% vs. 78%), or allergies (45% vs. 77%, all p values adolescents sent 1,397 confidential messages. Institutional decisions for implementing meaningful use requirements can align with goals of adolescent health. Patient portals can enhance adolescent health care quality and adolescents readily use a confidential portal. Implementation of meaningful use requirements should be checked against adolescent health care needs to maximize confidentiality and promote health communication. Copyright © 2016 Society for Adolescent Health and Medicine. Published by Elsevier Inc. All rights reserved.

  19. 31 CFR 31.217 - Confidentiality of information.

    Science.gov (United States)

    2010-07-01

    ... 31 Money and Finance: Treasury 1 2010-07-01 2010-07-01 false Confidentiality of information. 31.217 Section 31.217 Money and Finance: Treasury Office of the Secretary of the Treasury TROUBLED ASSET... from a source other than the retained entity. (b) Prohibitions. The retained entity shall not: (1...

  20. Decisions about Confidentiality in Medical Student Mental Health Settings.

    Science.gov (United States)

    Lindenthal, Jacob Jay; And Others

    1984-01-01

    Examined responses of psychologists and psychiatrists in medical schools (N=59) to vignettes representing student problems. Results suggested practitioners were generally unwilling to break confidentiality in response to problems involving suicidal tendencies, sexual coercion/seduction, social transgressions, or falsifying data. Only suggestions…

  1. 75 FR 75576 - Confidentiality of Suspicious Activity Reports

    Science.gov (United States)

    2010-12-03

    ...-2010-0019] RIN 1557-AD17 Confidentiality of Suspicious Activity Reports AGENCY: The Office of the... suspicious activity report (SAR) to: clarify the scope of the statutory prohibition on the disclosure by a... institutions, including national banks regulated by the OCC, to keep certain records and make certain reports...

  2. 12 CFR 404.7 - Confidential business information.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 4 2010-01-01 2010-01-01 false Confidential business information. 404.7 Section 404.7 Banks and Banking EXPORT-IMPORT BANK OF THE UNITED STATES INFORMATION DISCLOSURE Procedures... involved, a general description of the related U.S. exports, and the country to which such exports are...

  3. [Confidentiality in medical oaths: (When the white crow becomes gray...)].

    Science.gov (United States)

    Gelpi, R J; Pérez, M L; Rancich, A M; Mainetti, J A

    2000-01-01

    Confidentiality, together with the ethical principles of beneficence and non-maleficence, is the most important rule in Medical Oaths at the present time. However, the scientific-technical advances in medicine have made this rule one of the most controversial ones because of its exceptions. In consequence, the aim of the present paper is to comparatively analyze the rule of confidentiality in Medical Oaths of different places, times, origins and in different versions of the Hippocratic Oath in order to determine what should be kept a secret and with what degree of commitment (absolute or "prima facie"). Of the thirty six analyzed Oaths, twenty-seven manifest this rule and nine do not. No relation was found between the manifestation of this rule and the place, time, origin and different versions of the Hippocratic Oath. Most pledges suggest not to reveal what has been seen or heard during the medical act, the same as in the Hippocratic Oath. Seven texts point out that confidentiality should be absolute and four give exceptions in connection with beneficence and justice principles and the moral duty of causing no damage to third parties. Two pledges specify protection of privacy. In conclusion, today confidentiality is considered to be a moral duty for the benefit of the patient and out of consideration for his autonomy; however, at the present time in medicine the duty of keeping absolute secrecy is being reconsidered.

  4. 19 CFR 201.6 - Confidential business information.

    Science.gov (United States)

    2010-04-01

    ...) of a type for which there is a clear and compelling need to withhold from disclosure. Special rules... the right to appeal to the Commission. (e) Appeals from denial of confidential treatment. (1) For good cause shown, the Commission may grant an appeal from a denial by the Secretary of a request for...

  5. 40 CFR 85.1415 - Treatment of confidential information.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 18 2010-07-01 2010-07-01 false Treatment of confidential information. 85.1415 Section 85.1415 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) AIR PROGRAMS (CONTINUED) CONTROL OF AIR POLLUTION FROM MOBILE SOURCES Urban Bus Rebuild Requirements § 85.1415...

  6. Time for Action: Audit, Accountability and Confidential Enquiries into ...

    African Journals Online (AJOL)

    Improving the quality of care is essential for achieving reductions in maternal mortality. Audit is one of the methods which can be used to simultaneously assess as well as improve quality. This commentary discusses one type of audit – confidential enquiries into maternal death. We believe that the enthusiasm for ...

  7. CRAC : Confidentiality risk analysis and IT-architecture comparison of business networks

    NARCIS (Netherlands)

    Morali, A.; Zambon, E.; Etalle, S.; Wieringa, R.J.

    2009-01-01

    The leakage of confidential information (e.g. industrial secrets, patient records and user credentials) is one of the risks that have to be accounted for and mitigated by organizations dealing with confidential data. Unfortunately, assessing confidentiality risk is challenging, particularly in the

  8. Designing a Mobile Game to Teach Conceptual Knowledge of Avoiding 'Phishing Attacks'

    OpenAIRE

    Asanka, Nalin; Love, Steve; Scott, Michael

    2012-01-01

    Phishing is a form of online identity theft, which attempts to appropriate confidential and sensitive information such as usernames and passwords from its victims. To facilitate cyberspace as a secure environment, phishing education needs to be made accessible to home computer users and mobile games enable embedded learning in a natural environment. Previously, we have introduced a mobile game design that aimed to enhance avoidance motivation and behavior to protect against phishing threats. ...

  9. Systematization of falsification risk factors in financial statements: accounting aspect

    Directory of Open Access Journals (Sweden)

    N.О. Mizyakina

    2016-12-01

    Full Text Available The presence of false information in the financial statements significantly undermines the confidence of investors and creditors of a company. This necessitates finding and identifying risk factors for falsifying financial statements. Risk factors for financial statements falsification are various and there are different approaches to their classification. It is found out that there is the problem on the clear separation of the concept "creative accounting" (which allows to present a company in the best light for investors and creditors within the law and the concept "falsification of financial statements indicators", which undermines confidence and causes million expenditures of investors and creditors. The article determines the main reasons and factors that lead to the falsification of enterprise’s financial statements. The study suggests the approaches to the classification of risk factors for falsifying financial statements, including those, which have a direct or indirect impact on the reporting. The classification of risk factors for falsifying financial statements is necessary to systematize falsification risks of financial statements in order to minimize them and avoid them during the process of formation of financial reporting indicators.

  10. Avoidable waste management costs

    Energy Technology Data Exchange (ETDEWEB)

    Hsu, K.; Burns, M.; Priebe, S.; Robinson, P.

    1995-01-01

    This report describes the activity based costing method used to acquire variable (volume dependent or avoidable) waste management cost data for routine operations at Department of Energy (DOE) facilities. Waste volumes from environmental restoration, facility stabilization activities, and legacy waste were specifically excluded from this effort. A core team consisting of Idaho National Engineering Laboratory, Los Alamos National Laboratory, Rocky Flats Environmental Technology Site, and Oak Ridge Reservation developed and piloted the methodology, which can be used to determine avoidable waste management costs. The method developed to gather information was based on activity based costing, which is a common industrial engineering technique. Sites submitted separate flow diagrams that showed the progression of work from activity to activity for each waste type or treatability group. Each activity on a flow diagram was described in a narrative, which detailed the scope of the activity. Labor and material costs based on a unit quantity of waste being processed were then summed to generate a total cost for that flow diagram. Cross-complex values were calculated by determining a weighted average for each waste type or treatability group based on the volume generated. This study will provide DOE and contractors with a better understanding of waste management processes and their associated costs. Other potential benefits include providing cost data for sites to perform consistent cost/benefit analysis of waste minimization and pollution prevention (WMIN/PP) options identified during pollution prevention opportunity assessments and providing a means for prioritizing and allocating limited resources for WMIN/PP.

  11. Avoidable waste management costs

    International Nuclear Information System (INIS)

    Hsu, K.; Burns, M.; Priebe, S.; Robinson, P.

    1995-01-01

    This report describes the activity based costing method used to acquire variable (volume dependent or avoidable) waste management cost data for routine operations at Department of Energy (DOE) facilities. Waste volumes from environmental restoration, facility stabilization activities, and legacy waste were specifically excluded from this effort. A core team consisting of Idaho National Engineering Laboratory, Los Alamos National Laboratory, Rocky Flats Environmental Technology Site, and Oak Ridge Reservation developed and piloted the methodology, which can be used to determine avoidable waste management costs. The method developed to gather information was based on activity based costing, which is a common industrial engineering technique. Sites submitted separate flow diagrams that showed the progression of work from activity to activity for each waste type or treatability group. Each activity on a flow diagram was described in a narrative, which detailed the scope of the activity. Labor and material costs based on a unit quantity of waste being processed were then summed to generate a total cost for that flow diagram. Cross-complex values were calculated by determining a weighted average for each waste type or treatability group based on the volume generated. This study will provide DOE and contractors with a better understanding of waste management processes and their associated costs. Other potential benefits include providing cost data for sites to perform consistent cost/benefit analysis of waste minimization and pollution prevention (WMIN/PP) options identified during pollution prevention opportunity assessments and providing a means for prioritizing and allocating limited resources for WMIN/PP

  12. Environmental impact statement 1987. Umweltgutachten 1987

    Energy Technology Data Exchange (ETDEWEB)

    1988-01-01

    In its third statement after 1974 and 1978 the Council of Environmental Experts describes the state of the environment and points out misdevelopments and ways of avoiding them. The subject's complexity defies the environmental impact statement's completeness. Other than the two preceding ones the 1987 statement focuses but on selected fields and aspects. In view of the fact that the environmental policy of the late eighties and of the nineties to come requires a general, transsectoral and balanced concept the statement puts much care into a comprehensive discussion of the basic traits of a general environmental policy. The characteristics worked out are applicable to any environmental sector and include man's consciousness of the environment and his behaviour towards it, active pollution abatement, economic aspects, and the structure of pollution sources in the Federal Republic of Germany. While the sectors of pollution control include ground and air pollution abatement the selected fields comprise environment and health, energy, transportation, regional planning, and recreation and tourism. (orig./HSCH).

  13. Medical confidentiality versus disclosure: Ethical and legal dilemmas.

    LENUS (Irish Health Repository)

    Agyapong, V I O

    2009-02-01

    A case is described of a fifty year old single man who made disclosures about criminal sexual practices during a psychiatric assessment. In common practice with other professional men, a doctor is under a duty not to disclose, without the consent of his patient, information which he has gained in his professional capacity other than in exceptional circumstances. We discuss the ethical and legal considerations surrounding issues of medical confidentiality and the dilemma that sometimes face clinicians, when they feel obliged, in the public interest, to disclose information they have gained in confidence. Breach of confidences can have deleterious consequences; particularly for the doctor-patient relationship, but failure to disclose in some situations could have serious implications for the well-being of the wider society. Doctors should be aware of the basic principles of confidentiality and the ethical and legal framework around which they are built.

  14. Confidentiality and its limits: some contributions from Christianity.

    Science.gov (United States)

    Torrance, I R

    2003-02-01

    The issue is whether Christianity, of its nature, would seek to prevent a justifiable breach of confidentiality or could endorse it, under certain circumstances, as the act which is fundamentally more loving or more truthful. The individualistic nature of Western Christianity is noted. The Lutheran theologian Dietrich Bonhoeffer is used to show Christian support for dynamic rather than literal truth telling, and for awareness of the contexts and power relations within which persons stand.

  15. Enhanced Obfuscation Technique for Data Confidentiality in Public Cloud Storage

    OpenAIRE

    Oli S. Arul; Arockiam L.

    2016-01-01

    With an advent of cloud computing, data storage has become a boon in information technology. At the same time, data storage in remote places have become important issues. Lot of techniques are available to ensure protection of data confidentiality. These techniques do not completely serve the purpose in protecting data. The Obfuscation techniques come to rescue for protecting data from malicious attacks. This paper proposes an obfuscation technique to encrypt the desired data type on the clou...

  16. Security, privacy, and confidentiality issues on the Internet

    OpenAIRE

    Kelly, Grant; McKenzie, Bruce

    2002-01-01

    We introduce the issues around protecting information about patients and related data sent via the Internet. We begin by reviewing three concepts necessary to any discussion about data security in a healthcare environment: privacy, confidentiality, and consent. We are giving some advice on how to protect local data. Authentication and privacy of e-mail via encryption is offered by Pretty Good Privacy (PGP) and Secure Multipurpose Internet Mail Extensions (S/MIME). The de facto Internet standa...

  17. Privacy, confidentiality and abortion statistics: a question of public interest?

    Science.gov (United States)

    McHale, Jean V; Jones, June

    2012-01-01

    The precise nature and scope of healthcare confidentiality has long been the subject of debate. While the obligation of confidentiality is integral to professional ethical codes and is also safeguarded under English law through the equitable remedy of breach of confidence, underpinned by the right to privacy enshrined in Article 8 of the Human Rights Act 1998, it has never been regarded as absolute. But when can and should personal information be made available for statistical and research purposes and what if the information in question is highly sensitive information, such as that relating to the termination of pregnancy after 24 weeks? This article explores the case of In the Matter of an Appeal to the Information Tribunal under section 57 of the Freedom of Information Act 2000, concerning the decision of the Department of Health to withhold some statistical data from the publication of its annual abortion statistics. The specific data being withheld concerned the termination for serious fetal handicap under section 1(1)d of the Abortion Act 1967. The paper explores the implications of this case, which relate both to the nature and scope of personal privacy. It suggests that lessons can be drawn from this case about public interest and use of statistical information and also about general policy issues concerning the legal regulation of confidentiality and privacy in the future.

  18. The erosion of psychiatrist-patient confidentiality by subpoenas.

    Science.gov (United States)

    Levy, John; Galambos, Gary; Skarbek, Yvonne

    2014-08-01

    We explore the reasons for the prolific use of subpoenas to gain access to psychiatric records in Australia. We examine the applicable legal principles and practices at the New South Wales (NSW) and Commonwealth levels, aiming to develop recommendations for Australian Governments to curb the inappropriate and harmful use of subpoenas. Unfettered legal access to psychiatric records is inconsistent with professional ethical guidelines and risks undermining the provision of quality psychiatric care to the community. The existing legal provisions are failing to protect psychiatrist-patient confidentiality. In NSW, the onus is placed on the psychiatrist and/or patient to make a complicated application to the court, to direct that a subpoena be set aside on the grounds of "Professional Confidential Relationship Privilege." An absence of Commonwealth legislation to protect psychiatrist-patient confidentiality is used by some litigants in family law proceedings to disadvantage patients by stigmatising them, because they have consulted psychiatrists. We recommend that uniform legislation be implemented, giving effect to a primary rule of privilege with exceptions. © The Royal Australian and New Zealand College of Psychiatrists 2014.

  19. Conflicting duties over confidentiality in Argentina and Peru.

    Science.gov (United States)

    Cavallo, Mercedes

    2011-02-01

    The medical duty of confidentiality represents a key element for the provision of reproductive and sexual health services. In some Latin American countries, such as Argentina and Peru, the legal systems impose—or are interpreted as imposing—on health professionals the duty of confidentiality, but also the duty to report the commission of a public order offense that they know about owing to the practicing of their profession. In these countries, the conflicting duties and the criminalization of abortion cause severe public health and human rights problems when health professionals assist their patients for post-abortion treatment. Typically, patients are deterred from seeking prompt medical care, and their privacy, autonomy, and dignity are violated. A 2010 ruling from the Supreme Court of Argentina and a 2004 ruling from the Inter-American Court of Human Rights emerge as important instruments that grant a more adequate protection of medical confidentiality. © 2010 International Federation of Gynecology and Obstetrics. Published by Elsevier Ireland Ltd. All rights reserved.

  20. 26 CFR 1.533-2 - Statement required.

    Science.gov (United States)

    2010-04-01

    ... Internal Revenue INTERNAL REVENUE SERVICE, DEPARTMENT OF THE TREASURY (CONTINUED) INCOME TAX (CONTINUED) INCOME TAXES (CONTINUED) Corporations Used to Avoid Income Tax on Shareholders § 1.533-2 Statement... shareholders, the amounts that would be payable to each of the shareholders if the income of the corporation...

  1. Is patient confidentiality compromised with the electronic health record?: a position paper.

    Science.gov (United States)

    Wallace, Ilse M

    2015-02-01

    In order for electronic health records to fulfill their expected benefits, protection of privacy of patient information is key. Lack of trust in confidentiality can lead to reluctance in disclosing all relevant information, which could have grave consequences. This position paper contemplates whether patient confidentiality is compromised by electronic health records. The position that confidentiality is compromised was supported by the four bioethical principles and argued that despite laws and various safeguards to protect patients' confidentiality, numerous data breaches have occurred. The position that confidentiality is not compromised was supported by virtue ethics and a utilitarian viewpoint and argued that safeguards keep information confidential and the public feels relatively safe with the electronic health record. The article concludes with an ethically superior position that confidentiality is compromised with the electronic health record. Although organizational and governmental ways of enhancing the confidentiality of patient information within the electronic health record facilitate confidentiality, the ultimate responsibility of maintaining confidentiality rests with the individual end-users and their ethical code of conduct. The American Nurses Association Code of Ethics for nurses calls for nurses to be watchful with data security in electronic communications.

  2. Auditing nuclear materials statements

    International Nuclear Information System (INIS)

    Anon.

    1973-01-01

    A standard that may be used as a guide for persons making independent examinations of nuclear materials statements or reports regarding inventory quantities on hand, receipts, production, shipment, losses, etc. is presented. The objective of the examination of nuclear materials statements by the independent auditor is the expression of an opinion on the fairness with which the statements present the nuclear materials position of a nuclear materials facility and the movement of such inventory materials for the period under review. The opinion is based upon an examination made in accordance with auditing criteria, including an evaluation of internal control, a test of recorded transactions, and a review of measured discards and materials unaccounted for (MUF). The standard draws heavily upon financial auditing standards and procedures published by the American Institute of Certified Public Accountants

  3. THE STATEMENT OF CASH FLOWS USING FINANCIAL STATEMENT EQUATIONS

    OpenAIRE

    Harold Fletcher; Thomas Ulrich

    2010-01-01

    This paper addresses one of the more difficult topics in teaching MBA level financial management, the statement of cash flows. By employing financial statement equations in preparing the statement of cash flows, students: (1) are employing tools that they are more familiar and comfortable with which mitigates their anxiety and enhances their understanding, (2) are better able to understand the logic of the statement of cash flows and the relationships that exist between it and the income stat...

  4. Be Vigilant on Financial Statements.

    Science.gov (United States)

    Freed, DeBow

    2002-01-01

    Highlights areas on university's financial statements that warrant careful review by trustees and suggests ways they can check to see whether an institution's financial statements are clear and valid indicators of its financial status. (EV)

  5. Corporate Information Management Financial Statements

    National Research Council Canada - National Science Library

    Gimble, Thomas

    1995-01-01

    The audit objective was to determine whether the OASD(C31) methods for preparing FY 1996 CIM, general purpose financial statements will result in auditable and complete general purpose financial statements...

  6. Understanding financial statements.

    Science.gov (United States)

    Tarantino, D P

    2001-01-01

    In his premier column for The Physician Executive, David Tarantino takes a look at those critical "financials" that can make or break a business. If you're considering a career move, you need to know the financial condition of future employers. Learn how to read the statements and glean valuable information from the numbers.

  7. Sustainability Statement and Policy

    Science.gov (United States)

    Journal of Education for Sustainable Development, 2009

    2009-01-01

    This article presents nine resources that focus on environmental education and sustainability. These include: (1) "Sustainability Statement and Policy," Dalhousie University, Nova Scotia, Canada, 2009, which is available at http://office.sustainability.dal.ca/Governance; (2) "Climate Literacy: The Essential Principles of Climate…

  8. European Respiratory Society statement

    DEFF Research Database (Denmark)

    Miravitlles, Marc; Dirksen, Asger; Ferrarotti, Ilaria

    2017-01-01

    lung disease. A large proportion of individuals affected remain undiagnosed and therefore without access to appropriate care and treatment.The most recent international statement on AATD was published by the American Thoracic Society and the European Respiratory Society in 2003. Since then there has...

  9. Statement on Plagiarism

    Indian Academy of Sciences (India)

    Home; Journals; Resonance – Journal of Science Education; Volume 13; Issue 5. Statement on Plagiarism. S Mahadevan N Mukunda. Editorial Volume 13 Issue 5 May 2008 pp 403-404. Fulltext. Click here to view fulltext PDF. Permanent link: https://www.ias.ac.in/article/fulltext/reso/013/05/0403-0404. Author Affiliations.

  10. Consolidating Financial Statements.

    Science.gov (United States)

    Wood, Marcia R.

    This publication is designed to be a desktop reference and assist financial officers in both public and independent institutions of higher education in the preparation of consolidated financial statements. Chapter 1 covers generally accepted accounting principles and other accounting literature, and summarizes reporting rules of the Financial…

  11. Consolidated financial statements

    OpenAIRE

    Blaha, Miroslav

    2010-01-01

    This work provides basic information about consolidation and consolidated financial statements. In the beginning there are definisions of the members of the group under discussion and their relationship. Hereafter concepts of consolidation, accounting methods and methods of consolidation are discussed. It also compares approach of different accounting systems to consolidation.

  12. CONSOLIDATED FINANCIAL STATEMENTS UNDER IFRS

    OpenAIRE

    Tănase Alin-Eliodor; Calotă Traian-Ovidiu

    2013-01-01

    This article is focuses on accounting consolidation techniques and the preparation of consolidation worksheets for the components of financial statements (statement of comprehensive income, statement of changes in equity, and financial position). The presented group includes parent company, two subsidiaries (only one fully controlled by the parent company) and a jointly controlled entity. The financial statements are presented under the following standards IFRS 3 Business Combination, IAS 27 ...

  13. Fundamentals of Financial Statements Audit

    OpenAIRE

    World Bank

    2011-01-01

    The purpose of an audit is to enhance the degree of confidence of intended users in the financial statements. The objective of an audit of financial statements is to enable an auditor to express an opinion as to whether the financial statements are prepared, in all material respects, in accordance with International Financial Reporting Standards or another identified financial reporting fr...

  14. Determinants of Aggressive Tax Avoidance

    OpenAIRE

    Herbert, Tanja

    2015-01-01

    This thesis consists of three essays examining determinants of aggressive tax avoidance. The first essay “Measuring the Aggressive Part of International Tax Avoidance”, co-authored with Prof. Dr. Michael Overesch, proposes a new measure that isolates the additional or even aggressive part in international tax avoidance and analyzes the determinants of aggressive tax avoidance of multinational enterprises. The second essay “Capital Injections and Aggressive Tax Planning - Can Banks Have It All...

  15. Gossip, stories and friendship: confidentiality in midwifery practice.

    Science.gov (United States)

    James, S

    1995-12-01

    Women often seek midwifery care as an alternative to the maternity services that are readily available within the insured health care system in Alberta. Some aspects of community-based, primary care midwifery in Alberta that characterize this alternative are the use of story-telling as a form of knowledge, the development of social connections among women seeking midwifery care, and nonauthoritarian relationships between midwives and women. In this paper, the concept of confidentiality, as it relates to these aspects of midwifery practice, is explored, using traditional, caring and feminist models of ethics.

  16. Teaching Confidentiality through Comics at One Spanish Medical School.

    Science.gov (United States)

    Lalanda, Mónica; Altisent, Rogelio; Delgado-Marroquín, Maria Teresa

    2018-02-01

    At the University of Zaragoza in Spain we developed an innovative way to teach the concept of confidentiality to medical students, which we tested by comparing the use of customized comics with more traditional methods. We proved that using comics is more attractive to students than lectures and class discussions, that it increases class participation and students' self-awareness of learning, and that it maintains the same academic results. We share our experience visually in a two-page comic. © 2018 American Medical Association. All Rights Reserved.

  17. Predictors of avoiding medical care and reasons for avoidance behavior.

    Science.gov (United States)

    Kannan, Viji Diane; Veazie, Peter J

    2014-04-01

    Delayed medical care has negative health and economic consequences; interventions have focused on appraising symptoms, with limited success in reducing delay. To identify predictors of care avoidance and reasons for avoiding care. Using the Health Information National Trends Survey (2007), we conducted logistic regressions to identify predictors of avoiding medical visits deemed necessary by the respondents; and, we then conducted similar analyses on reasons given for avoidance behavior. Independent variables included geographic, demographic, socioeconomic, personal health, health behavior, health care system, and cognitive characteristics. Approximately one third of adults avoided doctor visits they had deemed necessary. Although unadjusted associations existed, avoiding needed care was not independently associated with geographic, demographic, and socioeconomic characteristics. Avoidance behavior is characterized by low health self-efficacy, less experience with both quality care and getting help with uncertainty about health, having your feelings attended to by your provider, no usual source of care, negative affect, smoking daily, and fatalistic attitude toward cancer. Reasons elicited for avoidance include preference for self-care or alternative care, dislike or distrust of doctors, fear or dislike of medical treatments, time, and money; respondents also endorsed discomfort with body examinations, fear of having a serious illness, and thoughts of dying. Distinct predictors distinguish each of these reasons. Interventions to reduce patient delay could be improved by addressing the health-related behavioral, belief, experiential, and emotional traits associated with delay. Attention should also be directed toward the interpersonal communications between patients and providers.

  18. Stimulus conflict triggers behavioral avoidance.

    Science.gov (United States)

    Dignath, David; Eder, Andreas B

    2015-12-01

    According to a recent extension of the conflict-monitoring theory, conflict between two competing response tendencies is registered as an aversive event and triggers a motivation to avoid the source of conflict. In the present study, we tested this assumption. Over five experiments, we examined whether conflict is associated with an avoidance motivation and whether stimulus conflict or response conflict triggers an avoidance tendency. Participants first performed a color Stroop task. In a subsequent motivation test, participants responded to Stroop stimuli with approach- and avoidance-related lever movements. These results showed that Stroop-conflict stimuli increased the frequency of avoidance responses in a free-choice motivation test, and also increased the speed of avoidance relative to approach responses in a forced-choice test. High and low proportions of response conflict in the Stroop task had no effect on avoidance in the motivation test. Avoidance of conflict was, however, obtained even with new conflict stimuli that had not been presented before in a Stroop task, and when the Stroop task was replaced with an unrelated filler task. Taken together, these results suggest that stimulus conflict is sufficient to trigger avoidance.

  19. Healthcare avoidance: a critical review.

    Science.gov (United States)

    Byrne, Sharon K

    2008-01-01

    The purpose of this study is to provide a critical review and synthesis of theoretical and research literature documenting the impact of avoidance on healthcare behaviors, identify the factors that influence healthcare avoidance and delay in the adult population, and propose a direction for future research. The Theory of Reasoned Action, Theory of Planned Behavior, Theory of Care-Seeking Behavior, the Transtheoretical Model, and the Behavioral Model of Health Services Use/Utilization are utilized to elaborate on the context within which individual intention to engage in healthcare behaviors occurs. Research literature on the concept of healthcare avoidance obtained by using computerized searches of CINAHL, MEDLINE, PSYCH INFO, and HAPI databases, from 1995 to 2007, were reviewed. Studies were organized by professional disciplines. Healthcare avoidance is a common and highly variable experience. Multiple administrative, demographic, personal, and provider factors are related to healthcare avoidance, for example, distrust of providers and/or the science community, health beliefs, insurance status, or socioeconomic/income level. Although the concept is recognized by multiple disciplines, limited research studies address its impact on healthcare decision making. More systematic research is needed to determine correlates of healthcare avoidance. Such studies will help investigators identify patients at risk for avoidant behaviors and provide the basis for health-promoting interventions. Methodological challenges include identification of characteristics of individuals and environments that hinder healthcare behaviors, as well as, the complexity of measuring healthcare avoidance. Studies need to systematically explore the influence of avoidance behaviors on specific healthcare populations at risk.

  20. Conflict Avoidance and University Management.

    Science.gov (United States)

    Tagliacozzo, Daisy M.

    The conditions that intensify conflict avoidance by the central administration in making strategic decisions, and the consequences of such avoidance for the management of college affairs, are discussed. The implication of an emerging decision-making style for adapting the organization to changing environments is also considered. Some of the…

  1. Cigarette tax avoidance and evasion.

    Science.gov (United States)

    Stehr, Mark

    2005-03-01

    Variation in state cigarette taxes provides incentives for tax avoidance through smuggling, legal border crossing to low tax jurisdictions, or Internet purchasing. When taxes rise, tax paid sales of cigarettes will decline both because consumption will decrease and because tax avoidance will increase. The key innovation of this paper is to compare cigarette sales data to cigarette consumption data from the Behavioral Risk Factor Surveillance System (BRFSS). I show that after subtracting percent changes in consumption, residual percent changes in sales are associated with state cigarette tax changes implying the existence of tax avoidance. I estimate that the tax avoidance response to tax changes is at least twice the consumption response and that tax avoidance accounted for up to 9.6% of sales between 1985 and 2001. Because of the increase in tax avoidance, tax paid sales data understate the level of smoking and overstate the drop in smoking. I also find that the level of legal border crossing was very low relative to other forms of tax avoidance. If states have strong preferences for smoking control, they must pair high cigarette taxes with effective policies to curb smuggling and other forms of tax avoidance or employ alternative policies such as counter-advertising and smoking restrictions.

  2. Quantum key based burst confidentiality in optical burst switched networks.

    Science.gov (United States)

    Balamurugan, A M; Sivasubramanian, A

    2014-01-01

    The optical burst switching (OBS) is an emergent result to the technology concern that could achieve a feasible network in future. They are endowed with the ability to meet the bandwidth requirement of those applications that require intensive bandwidth. There are more domains opening up in the OBS that evidently shows their advantages and their capability to face the future network traffic. However, the concept of OBS is still far from perfection facing issues in case of security threat. The transfer of optical switching paradigm to optical burst switching faces serious downfall in the fields of burst aggregation, routing, authentication, dispute resolution, and quality of service (QoS). This paper deals with employing RC4 (stream cipher) to encrypt and decrypt bursts thereby ensuring the confidentiality of the burst. Although the use of AES algorithm has already been proposed for the same issue, by contrasting the two algorithms under the parameters of burst encryption and decryption time, end-to-end delay, it was found that RC4 provided better results. This paper looks to provide a better solution for the confidentiality of the burst in OBS networks.

  3. Quantum Key Based Burst Confidentiality in Optical Burst Switched Networks

    Directory of Open Access Journals (Sweden)

    A. M. Balamurugan

    2014-01-01

    Full Text Available The optical burst switching (OBS is an emergent result to the technology concern that could achieve a feasible network in future. They are endowed with the ability to meet the bandwidth requirement of those applications that require intensive bandwidth. There are more domains opening up in the OBS that evidently shows their advantages and their capability to face the future network traffic. However, the concept of OBS is still far from perfection facing issues in case of security threat. The transfer of optical switching paradigm to optical burst switching faces serious downfall in the fields of burst aggregation, routing, authentication, dispute resolution, and quality of service (QoS. This paper deals with employing RC4 (stream cipher to encrypt and decrypt bursts thereby ensuring the confidentiality of the burst. Although the use of AES algorithm has already been proposed for the same issue, by contrasting the two algorithms under the parameters of burst encryption and decryption time, end-to-end delay, it was found that RC4 provided better results. This paper looks to provide a better solution for the confidentiality of the burst in OBS networks.

  4. HIPAA-protecting patient confidentiality or covering something else?

    Directory of Open Access Journals (Sweden)

    Robbins RA

    2013-10-01

    Full Text Available No abstract available. Article truncated at 150 words. A case of a physician fired from the Veterans Administration (VA for violation of the Health Care Portability and Accountability Act of 1996 (HIPAA illustrates a problem with both the law and the VA. Anil Parikh, a VA physician at the Jesse Brown VA in Chicago, was dismissed on a charge of making unauthorized disclosures of confidential patient information on October 19, 2007. On January 3, 2011 the Merit Systems Protection Board (MSPB reversed Dr. Parikh’s removal. Dr. Parikh's initially made disclosures to the VA Office of Inspector General and to Senator Barack Obama and Congressman Luis Gutierrez, in whose district the Jesse Brown VA lies. Dr. Parikh alleged that there were systematic problems within the Jesse Brown VA that resulted in untimely and inadequate patient care. The confidential patient information Parikh disclosed included examples of the misdiagnoses and misdirection of patients within the hospital. Specifically, Dr. Parikh alleged that …

  5. Research Participants' Understanding of and Reactions to Certificates of Confidentiality.

    Science.gov (United States)

    Beskow, Laura M; Check, Devon K; Ammarell, Natalie

    2014-01-01

    Certificates of Confidentiality are intended to facilitate participation in critical public health research by protecting against forced disclosure of identifying data in legal proceedings, but little is known about the effect of Certificate descriptions in consent forms. To gain preliminary insights, we conducted qualitative interviews with 50 HIV-positive individuals in Durham, North Carolina to explore their subjective understanding of Certificate descriptions and whether their reactions differed based on receiving a standard versus simplified description. Most interviewees were neither reassured nor alarmed by Certificate information, and most said it would not influence their willingness to participate or provide truthful information. However, compared with those receiving the simplified description, more who read the standard description said it raised new concerns, that their likelihood of participating would be lower, and that they might be less forthcoming. Most interviewees said they found the Certificate description clear, but standard-group participants often found particular words and phrases confusing, while simplified-group participants more often questioned the information's substance. Valid informed consent requires comprehension and voluntariness. Our findings highlight the importance of developing consent descriptions of Certificates and other confidentiality protections that are simple and accurate. These qualitative results provide rich detail to inform a larger, quantitative study that would permit further rigorous comparisons.

  6. Translation of Financial Statements

    OpenAIRE

    Dalthan Simas; Otavio De Medeiros

    2005-01-01

    This paper has the purpose of surveying and critically analyzing the effects of accounting procedures which are closely related to groups of companies operating multinationally. These are the methods for translation of financial statements, e.g. the Temporal and the Closing- rate Methods, as far as those methods are embodied in accounting standards which have been either recommended or adopted by countries such as the UK and US. We conclude that with regard to changing prices, General Price L...

  7. Python Switch Statement

    Directory of Open Access Journals (Sweden)

    2008-06-01

    Full Text Available The Python programming language does not have a built in switch/case control structure as found in many other high level programming languages. It is thought by some that this is a deficiency in the language, and the control structure should be added. This paper demonstrates that not only is the control structure not needed, but that the methods available in Python are more expressive than built in case statements in other high level languages.

  8. Privacy and Confidentiality in Exchange of Information Procedures : Some Uncertainties, Many Issues, but Few Solutions

    NARCIS (Netherlands)

    Debelva, F.; Mosquera, Valderrama I.J.

    2017-01-01

    The overall aim of this article is to analyse the taxpayers’ rights to confidentiality and privacy in exchange of information including the new global standard of automatic exchange of information. Section 2 will analyse the state of the art regarding the right to privacy and confidentiality in

  9. 5 CFR 2634.901 - Policies of confidential financial disclosure reporting.

    Science.gov (United States)

    2010-01-01

    .... (a) The confidential financial reporting system set forth in this subpart is designed to complement... Government duties involve the exercise of significant discretion in certain sensitive areas, report their... apparent conflicts of interest. The confidential financial disclosure system promotes that goal, with...

  10. 41 CFR 105-60.405 - Processing requests for confidential commercial information.

    Science.gov (United States)

    2010-07-01

    ... MATERIALS 60.4-Described Records § 105-60.405 Processing requests for confidential commercial information... 41 Public Contracts and Property Management 3 2010-07-01 2010-07-01 false Processing requests for confidential commercial information. 105-60.405 Section 105-60.405 Public Contracts and Property Management...

  11. Attitude of Lithuanian residents to confidentiality of adolescent sexual and reproductive health care

    DEFF Research Database (Denmark)

    Jaruseviciene, Lina; Lazarus, Jeff; Zaborskis, Apolinaras

    2011-01-01

    To assess the attitudes of Lithuanian residents towards the protection of confidentiality in the sexual and reproductive health care of adolescents.......To assess the attitudes of Lithuanian residents towards the protection of confidentiality in the sexual and reproductive health care of adolescents....

  12. University Student Expectations of Confidentiality When Disclosing Information to Their Professors

    Science.gov (United States)

    Harris, Gregory E.; Dalton, Stephanie

    2014-01-01

    The purpose of this study was to explore university students' expectations of confidentiality when they make disclosures to their university professors. A secondary purpose was to consider if students have a higher expectation of confidentiality when talking with Psychology professors versus professors in other disciplines. Students were asked to…

  13. 40 CFR 260.2 - Availability of information; confidentiality of information.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 25 2010-07-01 2010-07-01 false Availability of information; confidentiality of information. 260.2 Section 260.2 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) SOLID WASTES (CONTINUED) HAZARDOUS WASTE MANAGEMENT SYSTEM: GENERAL General § 260.2 Availability of information; confidentiality of...

  14. Privacy and Confidentiality Practices In Adolescent Family Planning Care At Federally Qualified Health Centers.

    Science.gov (United States)

    Beeson, Tishra; Mead, Katherine H; Wood, Susan; Goldberg, Debora Goetz; Shin, Peter; Rosenbaum, Sara

    2016-03-01

    The confidentiality of family planning services remains a high priority to adolescents, but barriers to implementing confidentiality and privacy practices exist in settings designed for teenagers who are medically underserved, including federally qualified health centers (FQHCs). A sample of 423 FQHCs surveyed in 2011 provided information on their use of five selected privacy and confidentiality practices, which were examined separately and combined into an index. Regression modeling was used to assess whether various state policies and organizational characteristics were associated with FQHCs' scores on the index. In-depth case studies of six FQHCs were conducted to provide additional contextual information. Among FQHCs reporting on confidentiality, most reported providing written or verbal information regarding adolescents' rights to confidential care (81%) and limiting access to family planning and medical records to protect adolescents' confidentiality (84%). Far fewer reported maintaining separate medical records for family planning (10%), using a security block on electronic medical records to prevent disclosures (43%) or using separate contact information for communications regarding family planning services (50%). Index scores were higher among FQHCs that received Title X funding than among those that did not (coefficient, 0.70) and among FQHCs with the largest patient volumes than among those with the smallest caseloads (0.43). Case studies highlighted how a lack of guidelines and providers' confusion over relevant laws present a challenge in offering confidential care to adolescents. The organizational practices used to ensure adolescent family planning confidentiality in FQHCs are varied across organizations. Copyright © 2016 by the Guttmacher Institute.

  15. 45 CFR 307.13 - Security and confidentiality for computerized support enforcement systems in operation after...

    Science.gov (United States)

    2010-10-01

    ... ENFORCEMENT SYSTEMS § 307.13 Security and confidentiality for computerized support enforcement systems in... systems in operation after October 1, 1997. (a) Information integrity and security. Have safeguards... 45 Public Welfare 2 2010-10-01 2010-10-01 false Security and confidentiality for computerized...

  16. 6 CFR 25.10 - Confidentiality and protection of Intellectual Property.

    Science.gov (United States)

    2010-01-01

    ... 6 Domestic Security 1 2010-01-01 2010-01-01 false Confidentiality and protection of Intellectual Property. 25.10 Section 25.10 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY REGULATIONS TO SUPPORT ANTI-TERRORISM BY FOSTERING EFFECTIVE TECHNOLOGIES § 25.10 Confidentiality and...

  17. 5 CFR 1312.26 - Control of secret and confidential material.

    Science.gov (United States)

    2010-01-01

    ... 5 Administrative Personnel 3 2010-01-01 2010-01-01 false Control of secret and confidential... Accountability of Classified Information § 1312.26 Control of secret and confidential material. Classified... Document Control, will be used to establish accountability controls on all Secret material received or...

  18. 42 CFR 405.215 - Confidential commercial and trade secret information.

    Science.gov (United States)

    2010-10-01

    ... 42 Public Health 2 2010-10-01 2010-10-01 false Confidential commercial and trade secret information. 405.215 Section 405.215 Public Health CENTERS FOR MEDICARE & MEDICAID SERVICES, DEPARTMENT OF... trade secret information. To the extent that CMS relies on confidential commercial or trade secret...

  19. 40 CFR 370.64 - What information can I claim as trade secret or confidential?

    Science.gov (United States)

    2010-07-01

    ... secret or confidential? 370.64 Section 370.64 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY... secret or confidential? (a) Trade secrets. You may be able to withhold the name of a specific chemical... trade secret. The requirements for withholding trade secret information are set forth in EPCRA section...

  20. 40 CFR 725.15 - Determining applicability when microorganism identity or use is confidential or uncertain.

    Science.gov (United States)

    2010-07-01

    ... ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) TOXIC SUBSTANCES CONTROL ACT REPORTING REQUIREMENTS AND REVIEW... appear on the public version of the Inventory, in § 725.239 or in subpart M of this part. Instead, it is contained in a confidential version held in EPA's Confidential Business Information Center (CBIC). The...

  1. 16 CFR 312.8 - Confidentiality, security, and integrity of personal information collected from children.

    Science.gov (United States)

    2010-01-01

    ... 16 Commercial Practices 1 2010-01-01 2010-01-01 false Confidentiality, security, and integrity of... COMMISSION REGULATIONS UNDER SPECIFIC ACTS OF CONGRESS CHILDREN'S ONLINE PRIVACY PROTECTION RULE § 312.8 Confidentiality, security, and integrity of personal information collected from children. The operator must...

  2. 77 FR 48072 - Final Confidentiality Determinations for Regulations Under the Mandatory Reporting of Greenhouse...

    Science.gov (United States)

    2012-08-13

    ... Final Confidentiality Determinations for Regulations Under the Mandatory Reporting of Greenhouse Gases... confidentiality determinations for certain data elements in regulations under the Mandatory Greenhouse Gas... Greenhouse Gas Reporting Program Web site at http://www.epa.gov/climatechange/emissions/ghgrulemaking.html...

  3. 17 CFR 200.83 - Confidential treatment procedures under the Freedom of Information Act.

    Science.gov (United States)

    2010-04-01

    ... SECURITIES AND EXCHANGE COMMISSION ORGANIZATION; CONDUCT AND ETHICS; AND INFORMATION AND REQUESTS Information... first received by the Commission (i) it is supplied segregated from information for which confidential..., 100 F Street, NE., Washington, DC 20549. The person requesting confidential treatment may supply...

  4. Having Confidence in Therapeutic Work with Young People: Constraints and Challenges to Confidentiality

    Science.gov (United States)

    Jenkins, Peter

    2010-01-01

    Confidentiality presents particular challenges to practitioners working with young people, on account of the latter's vulnerability and emotional immaturity. Ethical codes place a key importance on confidentiality, from deontological and teleological perspectives. However, young clients may rely on a more pragmatic approach in deciding whether to…

  5. 15 CFR Supplement No. 1 to Part 718 - Confidential Business Information Declared or Reported *

    Science.gov (United States)

    2010-01-01

    ... 15 Commerce and Foreign Trade 2 2010-01-01 2010-01-01 false Confidential Business Information... Commerce and Foreign Trade (Continued) BUREAU OF INDUSTRY AND SECURITY, DEPARTMENT OF COMMERCE CHEMICAL WEAPONS CONVENTION REGULATIONS CONFIDENTIAL BUSINESS INFORMATION Pt. 718, Supp. 1 Supplement No. 1 to Part...

  6. 42 CFR 2.1 - Statutory authority for confidentiality of drug abuse patient records.

    Science.gov (United States)

    2010-10-01

    ... HUMAN SERVICES GENERAL PROVISIONS CONFIDENTIALITY OF ALCOHOL AND DRUG ABUSE PATIENT RECORDS Introduction § 2.1 Statutory authority for confidentiality of drug abuse patient records. The restrictions of these regulations upon the disclosure and use of drug abuse patient records were initially authorized by section 408...

  7. 30 CFR 210.40 - Will MMS keep the information I provide confidential?

    Science.gov (United States)

    2010-07-01

    ... 30 Mineral Resources 2 2010-07-01 2010-07-01 false Will MMS keep the information I provide... MINERALS REVENUE MANAGEMENT FORMS AND REPORTS General Provisions § 210.40 Will MMS keep the information I provide confidential? The MMS will treat information obtained under this part as confidential to the...

  8. 30 CFR 291.111 - How does MMS treat the confidential information I provide?

    Science.gov (United States)

    2010-07-01

    ... 30 Mineral Resources 2 2010-07-01 2010-07-01 false How does MMS treat the confidential information... SHELF LANDS ACT § 291.111 How does MMS treat the confidential information I provide? (a) Any person who provides documents under this part in response to a request by MMS to inform a decision on whether open...

  9. 48 CFR 1552.235-71 - Treatment of confidential business information.

    Science.gov (United States)

    2010-10-01

    ... business information. 1552.235-71 Section 1552.235-71 Federal Acquisition Regulations System ENVIRONMENTAL... Clauses 1552.235-71 Treatment of confidential business information. As prescribed in 1535.007-70(b... determined that in the performance of a contract, EPA may furnish confidential business information to the...

  10. 48 CFR 1552.235-80 - Access to confidential business information.

    Science.gov (United States)

    2010-10-01

    ... business information. 1552.235-80 Section 1552.235-80 Federal Acquisition Regulations System ENVIRONMENTAL... Clauses 1552.235-80 Access to confidential business information. As prescribed in 1535.007-70(g), insert the following clause. Access to Confidential Business Information (OCT 2000) It is not anticipated...

  11. 48 CFR 1552.235-76 - Treatment of Confidential Business Information (APR 1996).

    Science.gov (United States)

    2010-10-01

    ... Business Information (APR 1996). 1552.235-76 Section 1552.235-76 Federal Acquisition Regulations System... Provisions and Clauses 1552.235-76 Treatment of Confidential Business Information (APR 1996). As prescribed in 1535.007-70(c), insert the following clause: Treatment of Confidential Business Information (TSCA...

  12. 48 CFR 1552.235-70 - Screening business information for claims of confidentiality.

    Science.gov (United States)

    2010-10-01

    ... 48 Federal Acquisition Regulations System 6 2010-10-01 2010-10-01 true Screening business... Texts of Provisions and Clauses 1552.235-70 Screening business information for claims of confidentiality... proprietary or confidential by the business that has the right to the information. The following clause...

  13. Confidentiality with Minors: The Need for Policy To Promote and Protect.

    Science.gov (United States)

    Stone, Carolyn; Isaacs, Madelyn L.

    2003-01-01

    Investigated school counselors' attitudes toward breaching confidentiality before and after the 1999 Columbine High School shootings. Surveys of demographically similar counselors indicated that the Columbine shootings affected counselors' predictions about their attitudes and behavior regarding confidentiality. Counselors were more reluctant to…

  14. 22 CFR 1101.5 - Security, confidentiality and protection of records.

    Science.gov (United States)

    2010-04-01

    ... 22 Foreign Relations 2 2010-04-01 2010-04-01 true Security, confidentiality and protection of... Bureau of Standard's booklet “Computer Security Guidelines for Implementing the Privacy Act of 1974” (May... STATES AND MEXICO, UNITED STATES SECTION PRIVACY ACT OF 1974 § 1101.5 Security, confidentiality and...

  15. [Statement of the board of directors of the German Sociological Society on the population census].

    Science.gov (United States)

    1983-10-01

    This statement concerning population censuses has been prepared at the request of the board of directors of the German Sociological Society in light of the controversy surrounding the 1983 census in the Federal Republic of Germany. It is suggested that sample surveys cannot replace a census, a census is indispensable as a data source for regional analyses and studies of small population groups, a census must be carried out in a way that preserves the confidentiality of data, and census data must be accessible to scientific research.

  16. Public expectations concerning confidentiality protection of adolescents' sexual and reproductive health care in Lithuania

    DEFF Research Database (Denmark)

    Jaruseviciene, Lina; Zaborskis, Apolinaras; Lazarus, Jeffrey Victor

    2014-01-01

    OBJECTIVE: An adolescent's right to confidential healthcare is protected by international law and professional consensus. However, parental and social support for confidential sexual and reproductive health (SRH) services, in particular, varies greatly. This study documents Lithuanian residents......' expectations with regard to confidentiality protection for adolescents in this domain, and explores the factors related to the diversity of these expectations. METHODS: Two national surveys of Lithuanian residents completed in 2005 and 2012 using anonymous questionnaires. Participants rated their expectations...... for confidentiality using a five-point Likert scale for eight types of SRH consultations. RESULTS: Public anticipation for confidentiality depended on whether issues related to sexual behaviour or to its consequences were addressed during adolescent consultation. Only younger respondents had higher expectations...

  17. Genetic secrets: Protecting privacy and confidentiality in the genetic era. Final report

    Energy Technology Data Exchange (ETDEWEB)

    Rothstein, M.A. [ed.

    1998-09-01

    Few developments are likely to affect human beings more profoundly in the long run than the discoveries resulting from advances in modern genetics. Although the developments in genetic technology promise to provide many additional benefits, their application to genetic screening poses ethical, social, and legal questions, many of which are rooted in issues of privacy and confidentiality. The ethical, practical, and legal ramifications of these and related questions are explored in depth. The broad range of topics includes: the privacy and confidentiality of genetic information; the challenges to privacy and confidentiality that may be projected to result from the emerging genetic technologies; the role of informed consent in protecting the confidentiality of genetic information in the clinical setting; the potential uses of genetic information by third parties; the implications of changes in the health care delivery system for privacy and confidentiality; relevant national and international developments in public policies, professional standards, and laws; recommendations; and the identification of research needs.

  18. Avoided intersections of nodal lines

    International Nuclear Information System (INIS)

    Monastra, Alejandro G; Smilansky, Uzy; Gnutzmann, Sven

    2003-01-01

    We consider real eigenfunctions of the Schroedinger operator in 2D. The nodal lines of separable systems form a regular grid, and the number of nodal crossings equals the number of nodal domains. In contrast, for wavefunctions of non-integrable systems nodal intersections are rare, and for random waves, the expected number of intersections in any finite area vanishes. However, nodal lines display characteristic avoided crossings which we study in this work. We define a measure for the avoidance range and compute its distribution for the random wave ensemble. We show that the avoidance range distribution of wavefunctions of chaotic systems follows the expected random wave distributions, whereas for wavefunctions of classically integrable but quantum non-separable systems, the distribution is quite different. Thus, the study of the avoidance distribution provides more support to the conjecture that nodal structures of chaotic systems are reproduced by the predictions of the random wave ensemble

  19. 12 CFR 1102.309 - Confidential treatment procedures.

    Science.gov (United States)

    2010-01-01

    ... to the ASC or within ten business days thereafter. Nothing in this section limits the authority of... information would be useful to competitors or would impair sales or similar statements generally will not be... shall provide the submitter with a reasonable opportunity, no longer than ten business days, to submit...

  20. Who participates in tax avoidance?

    OpenAIRE

    Alstadsæter, Annette; Jacob, Martin

    2013-01-01

    This paper analyzes the sources of heterogeneity in legal tax avoidance strategies across individuals. Three conditions are required for a taxpayer to participate in tax avoidance: incentive, access, and awareness. Using rich Swedish administrative panel data with a unique link between corporate and individual tax returns, we analyze individual participation in legal tax planning around the 2006 Swedish tax reform. Our results suggest that closely held corporations are utilized to facilitate ...

  1. Predator avoidance in extremophile fish.

    Science.gov (United States)

    Bierbach, David; Schulte, Matthias; Herrmann, Nina; Zimmer, Claudia; Arias-Rodriguez, Lenin; Indy, Jeane Rimber; Riesch, Rüdiger; Plath, Martin

    2013-02-06

    Extreme habitats are often characterized by reduced predation pressures, thus representing refuges for the inhabiting species. The present study was designed to investigate predator avoidance of extremophile populations of Poecilia mexicana and P. sulphuraria that either live in hydrogen sulfide-rich (sulfidic) springs or cave habitats, both of which are known to have impoverished piscine predator regimes. Focal fishes that inhabited sulfidic springs showed slightly weaker avoidance reactions when presented with several naturally occurring predatory cichlids, but strongest differences to populations from non-sulfidic habitats were found in a decreased shoaling tendency with non-predatory swordtail (Xiphophorus hellerii) females. When comparing avoidance reactions between P. mexicana from a sulfidic cave (Cueva del Azufre) and the adjacent sulfidic surface creek (El Azufre), we found only slight differences in predator avoidance, but surface fish reacted much more strongly to the non-predatory cichlid Vieja bifasciata. Our third experiment was designed to disentangle learned from innate effects of predator recognition. We compared laboratory-reared (i.e., predator-naïve) and wild-caught (i.e., predator-experienced) individuals of P. mexicana from a non-sulfidic river and found no differences in their reaction towards the presented predators. Overall, our results indicate (1) that predator avoidance is still functional in extremophile Poecilia spp. and (2) that predator recognition and avoidance reactions have a strong genetic basis.

  2. Predator Avoidance in Extremophile Fish

    Science.gov (United States)

    Bierbach, David; Schulte, Matthias; Herrmann, Nina; Zimmer, Claudia; Arias-Rodriguez, Lenin; Indy, Jeane Rimber; Riesch, Rüdiger; Plath, Martin

    2013-01-01

    Extreme habitats are often characterized by reduced predation pressures, thus representing refuges for the inhabiting species. The present study was designed to investigate predator avoidance of extremophile populations of Poecilia mexicana and P. sulphuraria that either live in hydrogen sulfide-rich (sulfidic) springs or cave habitats, both of which are known to have impoverished piscine predator regimes. Focal fishes that inhabited sulfidic springs showed slightly weaker avoidance reactions when presented with several naturally occurring predatory cichlids, but strongest differences to populations from non-sulfidic habitats were found in a decreased shoaling tendency with non-predatory swordtail (Xiphophorus hellerii) females. When comparing avoidance reactions between P. mexicana from a sulfidic cave (Cueva del Azufre) and the adjacent sulfidic surface creek (El Azufre), we found only slight differences in predator avoidance, but surface fish reacted much more strongly to the non-predatory cichlid Vieja bifasciata. Our third experiment was designed to disentangle learned from innate effects of predator recognition. We compared laboratory-reared (i.e., predator-naïve) and wild-caught (i.e., predator-experienced) individuals of P. mexicana from a non-sulfidic river and found no differences in their reaction towards the presented predators. Overall, our results indicate (1) that predator avoidance is still functional in extremophile Poecilia spp. and (2) that predator recognition and avoidance reactions have a strong genetic basis. PMID:25371337

  3. 48 CFR 1552.235-73 - Access to Federal Insecticide, Fungicide, and Rodenticide Act Confidential Business Information...

    Science.gov (United States)

    2010-10-01

    ... Insecticide, Fungicide, and Rodenticide Act Confidential Business Information (APR 1996). 1552.235-73 Section... Insecticide, Fungicide, and Rodenticide Act Confidential Business Information (APR 1996). As prescribed in... Act Confidential Business Information (APR 1996) In order to perform duties under the contract, the...

  4. 48 CFR 1552.235-75 - Access to Toxic Substances Control Act Confidential Business Information (APR 1996).

    Science.gov (United States)

    2010-10-01

    ... Control Act Confidential Business Information (APR 1996). 1552.235-75 Section 1552.235-75 Federal... Confidential Business Information (APR 1996). As prescribed in 1535.007(b), insert the following provision: Access to Toxic Substances Control Act Confidential Business Information (APR 1996) In order to perform...

  5. Confidentiality in participatory research: Challenges from one study.

    Science.gov (United States)

    Petrova, Elmira; Dewing, Jan; Camilleri, Michelle

    2016-06-01

    This article presents key ethical challenges that were encountered when conducting a participatory qualitative research project with a very specific, small group of nurses, in this case with practice development nurses in Malta. With the small number of nurses employed in practice development roles in Malta, there are numerous difficulties of maintaining confidentiality. Poorly constructed interventions by the researcher could have resulted in detrimental effects to research participants and the overall trustworthiness of the research. Generally, ethical guidelines for research exist to reinforce validity of research; however, there is not an established consensus on how these strategies can be utilised in some types of qualitative field work. The researcher used an exploratory case study methodology. The sample consisted of 10 participants who were interviewed twice using face-to-face interviews, over a period of 2 months. The study was ethically reviewed by the University Research Ethics Committee and the Faculty Research Ethics Committee, University of Malta. The participants referred to in this article have been given adequate information about the study and their consent has been obtained. Numerous strategies for ensuring confidentiality during recruitment of the participants, during data collection, during transcription and data analysis and during dissemination of research results assisted the researcher in responding to potential and actual ethical issues. This article emphasises the main strategies that can be used to respond to ethical challenges when researching with a small easily identifiable group. The learning discussed here may be relevant to or even transferable to other similar research studies or research contexts. These methods fostered a greater credibility throughout the research process and predisposed the participants to greater trust, and thus, they disclosed their experiences and speak more freely, thus enhancing the quality of the study

  6. 7 CFR 1212.51 - Financial statements.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 10 2010-01-01 2010-01-01 false Financial statements. 1212.51 Section 1212.51... statements. (a) The Board shall prepare and submit financial statements to the Department on a periodic basis. Each such financial statement shall include, but not be limited to, a balance sheet, income statement...

  7. 7 CFR 3052.310 - Financial statements.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 15 2010-01-01 2010-01-01 false Financial statements. 3052.310 Section 3052.310....310 Financial statements. (a) Financial statements. The auditee shall prepare financial statements... appropriate, cash flows for the fiscal year audited. The financial statements shall be for the same...

  8. Presentation of Consolidated Statement of Cash Flows under IAS 7, Statement of Cash Flows

    OpenAIRE

    Calota Traian-Ovidiu; Tănase Alin-Eliodor

    2013-01-01

    The consolidated financial statements must includ a specific statement, regarding cash flows from all activities of the entity, called „consolidated statement of cash flow”. Information for preparing cash flow statements can be found in all other components of the financial statements, such as financial position, statement of comprehensive income and statement of changes in equity. The cash flow statement shall report cash flows during the period classified by operating, investing and financi...

  9. Privacy and confidentiality: perspectives of mental health consumers and carers in pharmacy settings.

    Science.gov (United States)

    Hattingh, Hendrika Laetitia; Knox, Kathy; Fejzic, Jasmina; McConnell, Denise; Fowler, Jane L; Mey, Amary; Kelly, Fiona; Wheeler, Amanda J

    2015-02-01

    The study aims to explore within the community pharmacy practice context the views of mental health stakeholders on: (1) current and past experiences of privacy, confidentiality and support; and (2) expectations and needs in relation to privacy and confidentiality. In-depth interviews and focus groups were conducted in three states in Australia, namely Queensland, the northern region of New South Wales and Western Australia, between December 2011 and March 2012. There were 98 participants consisting of consumers and carers (n = 74), health professionals (n = 13) and representatives from consumer organisations (n = 11). Participants highlighted a need for improved staff awareness. Consumers indicated a desire to receive information in a way that respects their privacy and confidentiality, in an appropriate space. Areas identified that require improved protection of privacy and confidentiality during pharmacy interactions were the number of staff having access to sensitive information, workflow models causing information exposure and pharmacies' layout not facilitating private discussions. Challenges experienced by carers created feelings of isolation which could impact on care. This study explored mental health stakeholders' experiences and expectations regarding privacy and confidentiality in the Australian community pharmacy context. A need for better pharmacy staff training about the importance of privacy and confidentiality and strategies to enhance compliance with national pharmacy practice requirements was identified. Findings provided insight into privacy and confidentiality needs and will assist in the development of pharmacy staff training material to better support consumers with sensitive conditions. © 2014 Royal Pharmaceutical Society.

  10. EU Universities’ Mission Statements

    Directory of Open Access Journals (Sweden)

    Liudmila Arcimaviciene

    2015-04-01

    Full Text Available In the last 10 years, a highly productive space of metaphor analysis has been established in the discourse studies of media, politics, business, and education. In the theoretical framework of Conceptual Metaphor Theory and Critical Discourse Analysis, the restored metaphorical patterns are especially valued for their implied ideological value as realized both conceptually and linguistically. By using the analytical framework of Critical Metaphor Analysis and procedurally employing Pragglejaz Group’s Metaphor Identification Procedure, this study aims at analyzing the implied value of the evoked metaphors in the mission statements of the first 20 European Universities, according to the Webometrics ranking. In this article, it is proposed that Universities’ mission statements are based on the positive evaluation of the COMMERCE metaphor, which does not fully correlate with the ideological framework of sustainability education but is rather oriented toward consumerism in both education and society. Despite this overall trend, there are some traceable features of the conceptualization reflecting the sustainability approach to higher education, as related to freedom of speech, tolerance, and environmental concerns. Nonetheless, these are suppressed by the metaphoric usages evoking traditional dogmas of the conservative ideology grounded in the concepts of the transactional approach to relationship, competitiveness for superiority, the importance of self-interest and strength, and quantifiable quality.

  11. Approach/avoidance in dreams.

    Science.gov (United States)

    Malcolm-Smith, Susan; Koopowitz, Sheri; Pantelis, Eleni; Solms, Mark

    2012-03-01

    The influential threat simulation theory (TST) asserts that dreaming yields adaptive advantage by providing a virtual environment in which threat-avoidance may be safely rehearsed. We have previously found the incidence of biologically threatening dreams to be around 20%, with successful threat avoidance occurring in approximately one-fifth of such dreams. TST asserts that threat avoidance is over-represented relative to other possible dream contents. To begin assessing this issue, we contrasted the incidence of 'avoidance' dreams with that of their opposite: 'approach' dreams. Because TST states that the threat-avoidance function is only fully activated in ecologically valid (biologically threatening) contexts, we also performed this contrast for populations living in both high- and low-threat environments. We find that 'approach' dreams are significantly more prevalent across both contexts. We suggest these results are more consistent with the view that dreaming is generated by reward-seeking systems than by fear-conditioning systems, although reward-seeking is clearly not the only factor determining the content of dreams. Copyright © 2011 Elsevier Inc. All rights reserved.

  12. Reading and understanding financial statements.

    Science.gov (United States)

    White, Joseph P

    2005-01-01

    Feeling comfortable reading and understanding financial statements is critical to the success of healthcare executives and physicians involved in management. Businesses use three primary financial statements: a balance sheet represents the equation, Assets = Liabilities + Equity; an income statement represents the equation, Revenues - Expenses = Net Income; a statement of cash flows reports all sources and uses of cash during the represented period. The balance sheet expresses financial indicators at one particular moment in time, whereas the income statement and the statement of cash flows show activity that occurred over a stretch of time. Additional information is disclosed in attached footnotes and other supplementary materials. There are two ways to prepare financial statements. Cash-basis accounting recognizes revenue when it is received and expenses when they are paid. Accrual-basis accounting recognizes revenue when it is earned and expenses when they are incurred. Although cash-basis is acceptable, periodically using the accrual method reveals important information about receivables and liabilities that could otherwise remain hidden. Become more engaged with your financial statements by spending time reading them, tracking key performance indicators, and asking accountants and financial advisors questions. This will help you better understand your business and build a successful future.

  13. Usage of internal statements in making consolidated financial statement

    Directory of Open Access Journals (Sweden)

    V.N. Herman

    2016-12-01

    Full Text Available The emergence of the consolidated financial statements is the result of integration processes in the businesses that lead to pooling of different companies. As consolidated financial statements present an aggregated look at the financial position of a parent and its subsidiaries, they let you gauge the overall health of an entire group of companies as opposed to one company’s standalone position. Consolidation of financial statements requires from the participants of joining elaborating their individual statements. The article describes the general scheme of consolidation process and defines the key trends of consolidation adjustments, in particular, financial investments, internal operations, goodwill and exchange rate differences. It is found out that to get information about internal operations and financial investments such data have to be synthesized from internal statements. This approach allows using the same accounting methods to parent and subsidiary entities. The objects, the users and the subject domain of internal statements are determined in order to make consolidation of financial statements of joining.

  14. Statement on virginity testing.

    Science.gov (United States)

    2015-07-01

    Virginity testing (virginity examination) is a gynecological examination that is intended to correlate the status and appearance of the hymen with previous sexual contact to determine whether a female has had or is habituated to sexual intercourse. Virginity examinations are practiced in many countries, often forcibly, including in detention places; on women who allege rape or are accused of prostitution; and as part of public or social policies to control sexuality. The Independent Forensic Expert Group (IFEG) - thirty-five preeminent independent forensic experts from eighteen countries specialized in evaluating and documenting the physical and psychological effects of torture and ill-treatment - released a statement on the practice in December 2014. In its statement, the IFEG outlines the physical and psychological effects of forcibly conducting virginity examinations on females based on its collective experience. The Group assesses whether, based on the effects, forcibly conducted virginity examinations constitute cruel, inhuman, or degrading treatment or torture. Finally, the IFEG addresses the medical interpretation, relevance, and ethical implications of such examinations. The IFEG concludes that virginity examinations are medically unreliable and have no clinical or scientific value. These examinations are inherently discriminatory and, in almost all instances, when conducted forcibly, result in significant physical and mental pain and suffering, thereby constituting cruel, inhuman and degrading treatment or torture. When virginity examinations are forcibly conducted and involve vaginal penetration, the examination should be considered as sexual assault and rape. Involvement of health professionals in these examinations violates the basic standards and ethics of the professions. Copyright © 2015 Torture. Published by Elsevier Ltd.. All rights reserved.

  15. How to avoid sedation complications

    African Journals Online (AJOL)

    To ensure patient safety, it is crucial that the airway is safeguarded. The single most important responsibility is to protect it. An unobstructed airway, with intact protective reflexes and respiratory drive, is essential to avoid complications. In some procedures, e.g. dental, the airway may need to be shared with the surgeon.

  16. Avoiding plagiarism in academic writing.

    Science.gov (United States)

    Anderson, Irene

    Plagiarism means taking the work of another and presenting it as one's own, resulting in potential upset for the original author and disrepute for the professions involved. This article aims to explore the issue of plagiarism and some mechanisms for detection and avoidance.

  17. Consent, competence, and confidentiality related to psychiatric conditions in adolescent medicine practice.

    Science.gov (United States)

    Campbell, Amy T

    2006-02-01

    Health care for adolescents with psychiatric conditions plays out on a complex stage with considerable state variation, based on a mix of statutory and case law. Added to this are less defined factors such as level of trust in community providers, level of cooperation between generalists and specialists, and local regulatory stances toward adolescent health care and mental health care. And, of course, there is the great diversity in diagnosis and maturity level, as well as family cohesion, from patient to patient (and even within a given patient across time). Finally, this situation resides within a larger environment of stigma vis-a-vis mental health care, most notably evident in the United States in disparate insurance coverage of mental versus physical health treatment. With so complex and varied a picture, clinicians should consult with legal counsel to understand applicable state law and local regulatory guidance (if any)and should also seek out ethical consultation when law does not apply or is not decisive, leaving ongoing concerns. And, as with clinical decision-making, in law and ethics "facts matter" [4]. A growing body of law carves out exceptions to general requirements for parental consent, including in mental health care. Ethically informed discussion around capacity determinations, the consent process, and confidentiality can help engage adolescents as "emerging adults"while remaining mindful of risky behavior and "immediate future" orientation that can be hallmarks of adolescence [30]. Respect for the adolescent, parental responsibility toward their child's best interests, and the family unit generally are paramount. Respect--coupled with caution, greater disclosure and cultural sensitivity, and a participatory approach to decision-making that seeks out the least restrictive and coercive options-can help avoid potential legal traps. How best to proceed? It truly depends-with law and ethics the start (not end) of the discussion and analysis.

  18. 18 CFR 401.75 - Protection of trade secrets; Confidential information.

    Science.gov (United States)

    2010-04-01

    ..., confidential statistical data, amount or source of any income, profits, losses, or expenditures of any person... States Code which provides: Whoever, being an officer or employee of the United States or of any...

  19. 75 FR 56096 - Access to Confidential Business Information by Industrial Economics Incorporated

    Science.gov (United States)

    2010-09-15

    ... ENVIRONMENTAL PROTECTION AGENCY [EPA-HQ-OPPT-2003-0004; FRL-8845-1] Access to Confidential Business Information by Industrial Economics Incorporated AGENCY: Environmental Protection Agency (EPA). ACTION: Notice. SUMMARY: EPA has authorized contractor, Industrial Economics Incorporated (IEI) of...

  20. 75 FR 78238 - Access to Confidential Business Information by Science Applications International Corporation and...

    Science.gov (United States)

    2010-12-15

    ... Business Information by Science Applications International Corporation and Its Identified Subcontractors..., Science Applications International Corporation (SAIC) of San Diego, CA, and Its Identified Subcontractors... Control Act (TSCA). Some of the information may be claimed or determined to be Confidential Business...

  1. Genetic privacy and confidentiality: why they are so hard to protect.

    Science.gov (United States)

    Rothstein, M A

    1998-01-01

    Author notes that widespread concerns have been raised about protecting genetic privacy and confidentiality in insurance and employment. He argues that effective protections are difficult because complicated issues, such as the right of access to health care, are invariably implicated.

  2. Developing an effective corrective action process : lessons learned from operating a confidential close call reporting system

    Science.gov (United States)

    2013-03-05

    In 2007, the Federal Railroad Administration (FRA) launched : C3RS, the Confidential Close Call Reporting System, as a : demonstration project to learn how to facilitate the effective : reporting and implementation of corrective actions, and assess t...

  3. 7 CFR 981.75 - Confidential nature of records and reports.

    Science.gov (United States)

    2010-01-01

    ... Section 981.75 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (Marketing Agreements and Orders; Fruits, Vegetables, Nuts), DEPARTMENT OF AGRICULTURE ALMONDS..., financial condition, or business operations of any handler shall be considered as confidential information...

  4. Confidentiality Enhancement of Highly Sensitive Nuclear Data Using Steganography with Chaotic Encryption over OFDM Channel

    International Nuclear Information System (INIS)

    Mahmoud, S.; Ayad, N.; Elsayed, F.; Elbendary, M.

    2016-01-01

    Full text: Due to the widespread usage of the internet and other wired and wireless communication methods, the security of the transmitted data has become a major requirement. Nuclear knowledge is mainly built upon the exchange of nuclear information which is considered highly sensitive information, so its security has to be enhanced by using high level security mechanisms. Data confidentiality is concerned with the achievement of higher protection for confidential information from unauthorized disclosure or access. Cryptography and steganography are famous and widely used techniques that process information in order to achieve its confidentiality, but sometimes, when used individually, they don’t satisfy a required level of security for highly sensitive data. In this paper, cryptography is accompanied with steganography for constituting a multilayer security techniques that can strengthen the level of security of highly confidential nuclear data that are archived or transmitted through different channel types and noise conditions. (author)

  5. 77 FR 12284 - Access to Confidential Business Information; Protection Strategies Incorporated

    Science.gov (United States)

    2012-02-29

    ... Business Information; Protection Strategies Incorporated AGENCY: Environmental Protection Agency (EPA). ACTION: Notice. SUMMARY: EPA has authorized its contractor, Protection Strategies Incorporated (PSI) of... Business Information (CBI). DATES: Access to the confidential data occurred on or about February 16, 2012...

  6. 75 FR 57768 - Access to Confidential Business Information by Eastern Research Group and Its Identified...

    Science.gov (United States)

    2010-09-22

    ... Business Information by Eastern Research Group and Its Identified Subcontractor AGENCY: Environmental Protection Agency (EPA). ACTION: Notice. SUMMARY: EPA has authorized its contractor, Eastern Research Group... the information may be claimed or determined to be Confidential Business Information (CBI). DATES...

  7. Privacy Act System of Records: Confidential Business Information Tracking System, EPA-20

    Science.gov (United States)

    Learn about the Confidential Business Information Tracking System, including who is covered in the system, the purpose of data collection, routine uses for the system's records, and other security procedures.

  8. 78 FR 54889 - Proposed Information Collection Request; Comment Request; Confidentiality Rules (Renewal)

    Science.gov (United States)

    2013-09-06

    ... received will be included in the public docket without change including any personal information provided, unless the comment includes profanity, threats, or information claimed to be Confidential Business... of appropriate automated electronic, mechanical, or other technological collection techniques or...

  9. 75 FR 8330 - Access to Confidential Business Information by Eastern Research Group

    Science.gov (United States)

    2010-02-24

    ... ENVIRONMENTAL PROTECTION AGENCY [EPA-HQ-OPPT-2003-0004; FRL-8812-4] Access to Confidential Business Information by Eastern Research Group AGENCY: Environmental Protection Agency (EPA). ACTION: Notice. [[Page 8331

  10. 12 CFR 261.20 - Confidential supervisory information made available to supervised financial institutions and...

    Science.gov (United States)

    2010-01-01

    ... available to supervised financial institutions and financial institution supervisory agencies. 261.20... Supervised Institutions, Financial Institution Supervisory Agencies, Law Enforcement Agencies, and Others in... institutions and financial institution supervisory agencies. (a) Disclosure of confidential supervisory...

  11. When security and medicine missions conflict: confidentiality in prison settings.

    Science.gov (United States)

    Allen, Scott A; Aburabi, Raed

    2016-06-13

    Purpose - It is a simple fact that prisons cannot exist - practically, legally, ethically or morally - without the support of physicians and other health professionals. Access to adequate healthcare is one of the fundamental measures of the legitimacy of a jail or prison. At the same time, there is a fundamental tension in the missions of the prison and doctor. The primary mission of the prison is security and often punishment. Reform and rehabilitation have intermittently been stated goals of prisons in the last century, but in practice those humane goals have rarely governed prison administrative culture. The primary mission of the physician is to promote the health and welfare of his or her patient. The paper aims to discuss these issues. Design/methodology/approach - At times, what is required to serve the patient's best interest is at odds with the interests of security. Much of the work of the prison physician does not conflict with the operation of security. Indeed, much of the work of the prison physician is allowed to proceed without much interference from the security regime. But given the fundamental discord in the legitimate missions of security vs medicine, conflict between the doctor and the warden is inevitable. Findings - In this paper, the authors consider the example of patient confidentiality to illustrate this conflict, using case examples inspired by real cases from the experience of the authors. Originality/value - The authors provide an ethical and practical framework for health professionals to employ when confronting these inevitable conflicts in correctional settings.

  12. RESPECTING THE CONFIDENTIALITY AND ANONYMITY IN QUALITATIVE RESEARCH IN SOCIOLOGY

    Directory of Open Access Journals (Sweden)

    Maria OPREA

    2018-06-01

    Full Text Available Ethics, a philosophical discipline, formulates a set of principles that must be followed, in respect of good and truth, fundamental values of humanity. The world of scientific research, of all kinds, also obeys moral imperatives and principles and is called upon to answer to society not only in relation to the discoveries themselves but, above all, in relation to the possible destructive effects on man or his life environment. The researcher in the sphere of social sciences is more involved in the act of responsibility, the more the topic subject of the study is the individual, the social group, the social environment. He must rigorously follow the principles and requirements of fair, honest, objective studies that do not harm the dignity of the human being. In line with the ethical rigors of scientific research, the article aims to highlight some aspects of respecting the principle of confidentiality and anonymity in qualitative research in the field of sociology, with reference to the study of vulnerable groups in Arad County.

  13. Confidentiality Protection of Digital Health Records in Cloud Computing.

    Science.gov (United States)

    Chen, Shyh-Wei; Chiang, Dai Lun; Liu, Chia-Hui; Chen, Tzer-Shyong; Lai, Feipei; Wang, Huihui; Wei, Wei

    2016-05-01

    Electronic medical records containing confidential information were uploaded to the cloud. The cloud allows medical crews to access and manage the data and integration of medical records easily. This data system provides relevant information to medical personnel and facilitates and improve electronic medical record management and data transmission. A structure of cloud-based and patient-centered personal health record (PHR) is proposed in this study. This technique helps patients to manage their health information, such as appointment date with doctor, health reports, and a completed understanding of their own health conditions. It will create patients a positive attitudes to maintain the health. The patients make decision on their own for those whom has access to their records over a specific span of time specified by the patients. Storing data in the cloud environment can reduce costs and enhance the share of information, but the potential threat of information security should be taken into consideration. This study is proposing the cloud-based secure transmission mechanism is suitable for multiple users (like nurse aides, patients, and family members).

  14. Security, privacy, and confidentiality issues on the Internet

    Science.gov (United States)

    Kelly, Grant; McKenzie, Bruce

    2002-01-01

    We introduce the issues around protecting information about patients and related data sent via the Internet. We begin by reviewing three concepts necessary to any discussion about data security in a healthcare environment: privacy, confidentiality, and consent. We are giving some advice on how to protect local data. Authentication and privacy of e-mail via encryption is offered by Pretty Good Privacy (PGP) and Secure Multipurpose Internet Mail Extensions (S/MIME). The de facto Internet standard for encrypting Web-based information interchanges is Secure Sockets Layer (SSL), more recently known as Transport Layer Security or TLS. There is a public key infrastructure process to `sign' a message whereby the private key of an individual can be used to `hash' the message. This can then be verified against the sender's public key. This ensures the data's authenticity and origin without conferring privacy, and is called a `digital signature'. The best protection against viruses is not opening e-mails from unknown sources or those containing unusual message headers. PMID:12554559

  15. Security, privacy, and confidentiality issues on the Internet.

    Science.gov (United States)

    Kelly, Grant; McKenzie, Bruce

    2002-01-01

    We introduce the issues around protecting information about patients and related data sent via the Internet. We begin by reviewing three concepts necessary to any discussion about data security in a healthcare environment: privacy, confidentiality, and consent. We are giving some advice on how to protect local data. Authentication and privacy of e-mail via encryption is offered by Pretty Good Privacy (PGP) and Secure Multipurpose Internet Mail Extensions (S/MIME). The de facto Internet standard for encrypting Web-based information interchanges is Secure Sockets Layer (SSL), more recently known as Transport Layer Security or TLS. There is a public key infrastructure process to 'sign' a message whereby the private key of an individual can be used to 'hash' the message. This can then be verified against the sender's public key. This ensures the data's authenticity and origin without conferring privacy, and is called a 'digital signature'. The best protection against viruses is not opening e-mails from unknown sources or those containing unusual message headers.

  16. Nursing Students' Perceptions of Confidentiality, Accountability, and E-Professionalism in Relation to Facebook.

    Science.gov (United States)

    Barnable, Alexia; Cunning, Glenda; Parcon, Mariel

    This study examined nursing students' perceptions of confidentiality, accountability, and e-professionalism in relation to Facebook. All of the students were aware that posting patients' names and pictures of patients constituted a confidentiality breach. When comparing students based on educational status, there were differing opinions on whether employers should use Facebook profile information for hiring decisions. Nursing programs should provide current education, including clear and up-to-date policies, about social media use.

  17. THE POSSIBLE CONFIDENTIALITY: THE PUBLIC ADMINISTRATION AS PARTY IN THE ALTERNATIVE DISPUTE RESOLUTION MECHANISM

    Directory of Open Access Journals (Sweden)

    Carlos Alberto de Salles

    2017-05-01

    Full Text Available This article debates the tension that exists between confidentiality, usual in ADRs, and the publicity principle, that rules the Public Administration in Brazil. As a solution points that the parameter of confidentiality when Public Administration is a party must be the preservation of accountability of the involved agencies, what means, the capacity to answer to its own goals and to obey the public control.

  18. Attitudes toward medical and genetic confidentiality in the Saudi research biobank: An exploratory survey.

    Science.gov (United States)

    Alahmad, Ghiath; Hifnawy, Tamer; Abbasi, Badaruddin; Dierickx, Kris

    2016-03-01

    Achieving a balance between giving access to information and respecting donors' confidentiality is a crucial issue for any biobank, with its large number of samples and associated information. Despite the existence of much empirical literature on confidentiality, there are too few surveys in the Middle East about the topic, particularly in the Saudi context. A survey was conducted of 200 respondents at King Abdulaziz Medical City in Riyadh, Saudi Arabia, among 5 groups of equal size, comprised of researchers, physicians, medical students, donors and laypersons, respectively. The majority of participants agreed that confidentiality is an important issue and that it is well protected in the Saudi biobank. All 5 groups showed different attitudes toward disclosing information to various third parties. They were in favor of allowing treating physicians, and to a certain extent family members, to have access to medical and genetic results from research. No significant differences were found between views on medical and genetic confidentiality. The majority of respondents agreed that confidentiality might be breached in cases with specific justified reasons. Even considering differences in religion, culture and other factors, the results of the study were consistent with those reported in the literature and research conducted in other countries. We therefore place emphasis on the importance of protecting and promoting patient/donor confidentiality and privacy. Copyright © 2016. Published by Elsevier Ireland Ltd.

  19. Avoiding Complications with MPFL Reconstruction.

    Science.gov (United States)

    Smith, Marvin K; Werner, Brian C; Diduch, David R

    2018-05-12

    To discuss the potentially significant complications associated with medial patellofemoral ligament (MPFL) reconstruction. Additionally, to review the most current and relevant literature with an emphasis on avoiding these potential complications. Multiple cadaveric studies have characterized the anatomy of the MPFL and the related morphologic abnormalities that contribute to recurrent lateral patellar instability. Such abnormalities include patella alta, excessive tibial tubercle to trochlear grove (TT-TG) distance, trochlear dysplasia, and malalignment. Recent studies have evaluated the clinical outcomes associated with the treatment of concomitant pathology in combination with MPFL reconstruction, which is critical in avoiding recurrent instability and complications. Although there remains a lack of consensus regarding various critical aspects of MPFL reconstruction, certain concepts remain imperative. Our preferred methods and rationales for surgical techniques are described. These include appropriate work up, a combination of procedures to address abnormal morphology, anatomical femoral insertion, safe and secure patellar fixation, appropriate graft length fixation, and thoughtful knee flexion during fixation.

  20. Avoidant personality disorder: current insights

    OpenAIRE

    Lampe,Lisa; Malhi,Gin

    2018-01-01

    Lisa Lampe,1 Gin S Malhi2 1Discipline of Psychiatry, University of Newcastle, Newcastle, NSW, Australia; 2Discipline of Psychiatry, University of Sydney, Sydney, NSW, Australia Abstract: Avoidant personality disorder (AVPD) is a relatively common disorder that is associated with significant distress, impairment, and disability. It is a chronic disorder with an early age at onset and a lifelong impact. Yet it is underrecognized and poorly studied. Little is known regarding the most effective t...

  1. Pathogen avoidance by insect predators

    OpenAIRE

    Meyling, Nicolai V.; Ormond, Emma; Roy, Helen E.; Pell, Judith K.

    2008-01-01

    Insects can detect cues related to the risk of attack by their natural enemies. Pathogens are among the natural enemies of insects and entomopathogenic fungi attack a wide array of host species. Evidence documents that social insects in particular have adapted behavioural mechanisms to avoid infection by fungal pathogens. These mechanisms are referred to as 'behavioural resistance'. However, there is little evidence for similar adaptations in non-social insects. We have conducted experime...

  2. Avoidant personality disorder: current insights

    Directory of Open Access Journals (Sweden)

    Lampe L

    2018-03-01

    Full Text Available Lisa Lampe,1 Gin S Malhi2 1Discipline of Psychiatry, University of Newcastle, Newcastle, NSW, Australia; 2Discipline of Psychiatry, University of Sydney, Sydney, NSW, Australia Abstract: Avoidant personality disorder (AVPD is a relatively common disorder that is associated with significant distress, impairment, and disability. It is a chronic disorder with an early age at onset and a lifelong impact. Yet it is underrecognized and poorly studied. Little is known regarding the most effective treatment. The impetus for research into this condition has waxed and waned, possibly due to concerns regarding its distinctiveness from other disorders, especially social anxiety disorder (SAD, schizoid personality disorder, and dependent personality disorder. The prevailing paradigm subscribes to the “severity continuum hypothesis”, in which AVPD is viewed essentially as a severe variant of SAD. However, areas of discontinuity have been described, and there is support for retaining AVPD as a distinct diagnostic category. Recent research has focused on the phenomenology of AVPD, factors of possible etiological significance such as early parenting experiences, attachment style, temperament, and cognitive processing. Self-concept, avoidant behavior, early attachments, and attachment style may represent points of difference from SAD that also have relevance to treatment. Additional areas of research not focused specifically on AVPD, including the literature on social cognition as it relates to attachment and personality style, report findings that are promising for future research aimed at better delineating AVPD and informing treatment. Keywords: avoidant personality disorder, social anxiety disorder, social cognition, psychotherapy, attachment

  3. Avoiding congestion in recommender systems

    International Nuclear Information System (INIS)

    Ren, Xiaolong; Lü, Linyuan; Liu, Runran; Zhang, Jianlin

    2014-01-01

    Recommender systems use the historical activities and personal profiles of users to uncover their preferences and recommend objects. Most of the previous methods are based on objects’ (and/or users’) similarity rather than on their difference. Such approaches are subject to a high risk of increasingly exposing users to a narrowing band of popular objects. As a result, a few objects may be recommended to an enormous number of users, resulting in the problem of recommendation congestion, which is to be avoided, especially when the recommended objects are limited resources. In order to quantitatively measure a recommendation algorithm's ability to avoid congestion, we proposed a new metric inspired by the Gini index, which is used to measure the inequality of the individual wealth distribution in an economy. Besides this, a new recommendation method called directed weighted conduction (DWC) was developed by considering the heat conduction process on a user–object bipartite network with different thermal conductivities. Experimental results obtained for three benchmark data sets showed that the DWC algorithm can effectively avoid system congestion, and greatly improve the novelty and diversity, while retaining relatively high accuracy, in comparison with the state-of-the-art methods. (paper)

  4. Childhood obesity case statement.

    Science.gov (United States)

    Esposito, Paul W; Caskey, Paul; Heaton, Lisa E; Otsuka, Norman

    2013-04-01

    The goal of this publication is to raise awareness of the impact of childhood obesity on the musculoskeletal health of children and its potential long-term implications. Relevant articles dealing with musculoskeletal disorders either caused by or worsened by childhood obesity were reviewed through a Pub Med search. Efforts to recognize and combat the childhood obesity epidemic were also identified through Internet search engines. This case statement was then reviewed by the members of the pediatric specialty group of the US Bone and Joint Initiative, which represents an extensive number of organizations dealing with musculoskeletal health. Multiple musculoskeletal disorders are clearly caused by or worsened by childhood obesity. The review of the literature clearly demonstrates the increased frequency and severity of many childhood musculoskeletal disorders. Concerns about the long-term implications of these childhood onset disorders such as pain and degenerative changes into adulthood are clearly recognized by all the member organizations of the US Bone and Joint Initiative. It is imperative to recognize the long-term implications of musculoskeletal disorders caused by or worsened by childhood obesity. It is also important to recognize that the ability to exercise comfortably is a key factor to developing a healthy lifestyle and maintaining a healthy body weight. Efforts to develop reasonable and acceptable programs to increase physical activity by all facets of society should be supported. Further research into the long-term implications of childhood musculoskeletal disorders related to childhood obesity is necessary. Copyright © 2013 Elsevier Inc. All rights reserved.

  5. Consolidated Financial Statements

    OpenAIRE

    Kolářová, Pavla

    2014-01-01

    Diplomová práce se zabývá problematikou konsolidace účetní závěrky. Práce je členěna na dvě části. První část je zaměřena na sestavení konsolidované účetní závěrky za českou část skupiny podniků. Druhá část se zabývá analýzou výkonnosti sestavené konsolidované účetní závěrky a jednotlivých společností finančními ukazateli. Práce rovněž obsahuje návrhy na zlepšení ekonomické situace holdingu či jednotlivých společností. Master's thesis deals with the consolidation of the financial statement...

  6. 3 CFR - Presidential Signing Statements

    Science.gov (United States)

    2010-01-01

    ... basis of policy disagreements. At the same time, such signing statements serve a legitimate function in... United States, its departments, agencies, or entities, its officers, employees, or agents, or any other...

  7. Basic statements of relativity theory

    Directory of Open Access Journals (Sweden)

    Wolfgang Muschik

    2010-04-01

    Full Text Available Some basic statements of relativity theory, starting out with geometry and observers up to Einstein's field equations, are collected in a systematical order without any proof, to serve as a short survey of tools and results.

  8. Environmental Impact Statement Filing Guidance

    Science.gov (United States)

    Describes how to submit an environmental impact statement through the e-NEPA electronic submission system. Describes how EPA submits a notice of availability in to the Federal Register and how the comment time period if set forth.

  9. 38 CFR 41.310 - Financial statements.

    Science.gov (United States)

    2010-07-01

    ... 38 Pensions, Bonuses, and Veterans' Relief 2 2010-07-01 2010-07-01 false Financial statements. 41...) AUDITS OF STATES, LOCAL GOVERNMENTS, AND NON-PROFIT ORGANIZATIONS Auditees § 41.310 Financial statements. (a) Financial statements. The auditee shall prepare financial statements that reflect its financial...

  10. 7 CFR 1218.51 - Financial statements.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 10 2010-01-01 2010-01-01 false Financial statements. 1218.51 Section 1218.51... § 1218.51 Financial statements. (a) As requested by the Secretary, the Council shall prepare and submit financial statements to the Secretary on a periodic basis. Each such financial statement shall include, but...

  11. 7 CFR 1206.41 - Financial statements.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 10 2010-01-01 2010-01-01 false Financial statements. 1206.41 Section 1206.41... Financial statements. (a) As requested by the Department, the Board shall prepare and submit financial statements to the Department on a periodic basis. Each such financial statement shall include, but not be...

  12. GASB Statement No. 3 Guides Deposits, Investments.

    Science.gov (United States)

    Barker, Linda A.

    1986-01-01

    Discusses an April 1986 Governmental Accounting Standards Board statement concerning disclosures of repurchase and reverse repurchase agreements. The statement tries to help financial statement users assess the risks a goverment entity takes when investing public funds. It is effective for financial statement periods ending after December 15,…

  13. THE PRINCIPLE OF CONFIDENTIALITY IN ARBITRATION. APPLICATION AND LIMITATIONS OF THE PRINCIPLE

    Directory of Open Access Journals (Sweden)

    Bazil Oglindă

    2015-11-01

    Full Text Available Over the years, arbitration has grown to be the preferred means of dispute resolution by commercial entities. One of the benefits that build the attraction for this system of dispute resolution was the principle of confidentiality. One issue that needs to be analyzed is about the reasons why confidentiality is so important in business. Confidentiality is a principle largely embraced in arbitration, but, as we will see, the principle is not an absolute one. There are a set of questions that needs to be answer to, like: Who is bound by the duty of confidentiality? Does this refer only to the parties or does it expands to other actors involved in the arbitral proceedings? What happens with the obligation of confidentiality when issues are brought before a court, taking in account the principle of open justice? We will see that in some countries are procedural laws allowing the courts to order an arbitration claim to be heard in public or in private. Another important aspect that has arisen in the last period is regarding the public policy and the protection of public interest as a limitation to confidentiality of arbitration. This is a sensitive matter especially when one of the parties is a state or a state entity. This study aims to explore the principle of confidentiality in arbitration by focusing on its domain and on its limits, both from the comparative approach and from the Romanian approach. Knowing all this aspects, we will realize the importance of having professional counseling when drafting an arbitration clause and how this can be the missing puzzle piece of your business.

  14. Mechanism of avoiding little rip

    OpenAIRE

    ZHAI Xianghua; XI Ping

    2014-01-01

    The scalar phantom field Φ leads to various catastrophic fates of the universe including big rip,little rip and other future singularity depending on the choice of its potential.For example,little rip stems from a quadratic potential in general relativity.We suggest a new mechanism to avoid little rip in the 1/R gravity.The phantom field with different potentials,including quadratic,cubic and quantic potentials are studied via numerical calculation in the 1/R gravity with R2 correction.T...

  15. Hinkley Point 'C': a summary of the Environmental Statement

    International Nuclear Information System (INIS)

    1987-08-01

    The Environmental Statement describes the potentially significant environmental effects of the proposed pressurized water reactor station at Hinkley Point in Somerset, and the ways in which the Central Electricity Generating Board (CEGB) intends to avoid, reduce or remedy these effects. It also explains the CEGB's reasons for proposing a PWR at Hinkley Point. The Environmental Statement has been produced to inform local authorities, the public and the Secretary of State for Energy about the CEGB's proposals. The Secretary of State has to decide whether or not consent for construction of Hinkley Point 'C' power station should be given, and in reaching that decision has to consider, amongst other matters, the environmental effects of the project. This summary and the Environmental Statement also describe the CEGB's plans for developing Hinkley Point 'C. Some details are yet to be finalised and may be subject to change, but this will not affect the overall validity of the environmental analysis given in these documents. Greater detail can be found in the full Environmental Statement. (author)

  16. Rekonstruksi Pengaturan Confidential Principle bagi Komunikasi pada Mediasi Sengketa Perdata di Indonesia: Studi Perbandingan dengan Praktik di Amerika Serikat

    Directory of Open Access Journals (Sweden)

    I Gusti Ngurah Parikesit

    2016-04-01

    Full Text Available Peran mediasi sebagai penyelesaian sengketa alternatif untuk sengketa perdata yang semakin populer digunakan pada praktiknya belum berjalan maksimal. Salah satu penyebabnya adalah kekaburan pengaturan prinsip kerahasiaan confidential principle bagi komunikasi yang terjadi pada proses mediasi. Aturan hukum di Indonesia hanya menjelaskan bahwa mediasi dilangsungkan berdasarkan pada asas tertutup dan mediator berkewajiban menjaga kerahasiaan, baik dalam bentuk perkataan maupun catatan, yang terungkap pada mediasi. Sebagai perbandingan, aturan hukum di Amerika Serikat sudah diatur bahwa segala bentuk komunikasi yang terjadi dan berhubungan dengan pelaksanaan mediasi tunduk pada confidential principle, sehingga proses komunikasi mendapatkan hak istimewa (privilege dengan tidak dapat dijadikan barang bukti dan seluruh pihak yang terlibat dalam mediasi tidak dapat dijadikan saksi pada persidangan berikutnya. Dengan demikian, dibutuhkan rekonstruksi pengaturan terkait ruang lingkup komunikasi pada proses mediasi yang terkualifikasi sebagai confidential principle pengaturan terkait pelepasan hak istimewa komunikasi dari confidential principle; dan pengaturan terkait pengecualian terhadap komunikasi yang terkualifikasi sebagai confidential principle Abstract Although being popular, the role of mediation in resolving civil disputes is yet to be maximalized. One of the reasons is the the vague regulation concerning the confidential principle for communication in mediation. The existing regulation in Indonesia only explains that mediation is undertaken based on closed principle and the mediator is obliged to maintain confidentiality the confidentiality of any communication, either in oral or written forms, revealed during mediation. Whereas in comparison, the regulation in the United States of America stipulates that all forms of communications occured during mediation or is made for purposes of conducting or participating in mediation are subjects to the

  17. Lithuanian general practitioners' knowledge of confidentiality laws in adolescent sexual and reproductive healthcare: a cross-sectional study

    DEFF Research Database (Denmark)

    Lazarus, Jeff; Jaruseviciene, Lina; Liljestrand, Jerker

    2008-01-01

    In Lithuania, the legislation addressing confidentiality in adolescent healthcare is contradictory and vague. Previous studies have also revealed that medico-legal knowledge among physicians is poor, and attitudes play a correspondingly greater role than legal knowledge in ensuring the confidenti......In Lithuania, the legislation addressing confidentiality in adolescent healthcare is contradictory and vague. Previous studies have also revealed that medico-legal knowledge among physicians is poor, and attitudes play a correspondingly greater role than legal knowledge in ensuring...

  18. Avoidant personality disorder: current insights.

    Science.gov (United States)

    Lampe, Lisa; Malhi, Gin S

    2018-01-01

    Avoidant personality disorder (AVPD) is a relatively common disorder that is associated with significant distress, impairment, and disability. It is a chronic disorder with an early age at onset and a lifelong impact. Yet it is underrecognized and poorly studied. Little is known regarding the most effective treatment. The impetus for research into this condition has waxed and waned, possibly due to concerns regarding its distinctiveness from other disorders, especially social anxiety disorder (SAD), schizoid personality disorder, and dependent personality disorder. The prevailing paradigm subscribes to the "severity continuum hypothesis", in which AVPD is viewed essentially as a severe variant of SAD. However, areas of discontinuity have been described, and there is support for retaining AVPD as a distinct diagnostic category. Recent research has focused on the phenomenology of AVPD, factors of possible etiological significance such as early parenting experiences, attachment style, temperament, and cognitive processing. Self-concept, avoidant behavior, early attachments, and attachment style may represent points of difference from SAD that also have relevance to treatment. Additional areas of research not focused specifically on AVPD, including the literature on social cognition as it relates to attachment and personality style, report findings that are promising for future research aimed at better delineating AVPD and informing treatment.

  19. Avoidant personality disorder: current insights

    Science.gov (United States)

    Lampe, Lisa; Malhi, Gin S

    2018-01-01

    Avoidant personality disorder (AVPD) is a relatively common disorder that is associated with significant distress, impairment, and disability. It is a chronic disorder with an early age at onset and a lifelong impact. Yet it is underrecognized and poorly studied. Little is known regarding the most effective treatment. The impetus for research into this condition has waxed and waned, possibly due to concerns regarding its distinctiveness from other disorders, especially social anxiety disorder (SAD), schizoid personality disorder, and dependent personality disorder. The prevailing paradigm subscribes to the “severity continuum hypothesis”, in which AVPD is viewed essentially as a severe variant of SAD. However, areas of discontinuity have been described, and there is support for retaining AVPD as a distinct diagnostic category. Recent research has focused on the phenomenology of AVPD, factors of possible etiological significance such as early parenting experiences, attachment style, temperament, and cognitive processing. Self-concept, avoidant behavior, early attachments, and attachment style may represent points of difference from SAD that also have relevance to treatment. Additional areas of research not focused specifically on AVPD, including the literature on social cognition as it relates to attachment and personality style, report findings that are promising for future research aimed at better delineating AVPD and informing treatment. PMID:29563846

  20. METHODS FOR ASSESSING SECURITY THREATS CONFIDENTIAL INFORMATION FOR THE INFORMATION AND TELECOMMUNICATIONS SYSTEMS

    Directory of Open Access Journals (Sweden)

    E. V. Belokurova

    2015-01-01

    Full Text Available The article discusses the different approaches to assessing the safety of confidential information-term for information and telecommunication systems of various pre-appreciable destination in the presence of internal and external threats to its integrity and availability. The difficulty of ensuring the security of confidential information from exposure to information and telecommunication systems of external and internal threats at the present time, is of particular relevance. This problem is confirmed by the analysis of available statistical information on the impact of threats on the security circulating in the information and telecommunications system. Leak confidential information, intellectual property, information, know-how is the result of significant material and moral damage caused to the owner of the restricted information. The paper presents the structure of the indicators and criteria shows that the most promising are analytical criteria. However, their use to assess the level of security of confidential information is difficult due to the lack of appropriate mathematical models. The complexity of the problem is that existing traditional mathematical models are not always appropriate for the stated objectives. Therefore, it is necessary to develop mathematical models designed to assess the security of confidential information and its impact on information and telecommunication system threats.

  1. Environmental impact statement law and environmental impact statement administration regulation

    International Nuclear Information System (INIS)

    Feldmann, F.J.

    1991-01-01

    The contribution does not deal with the question - as might be suggested by the heading - that the execution of the environmental impact statement law might be uncertain if there are no further accompanying legal transformatory acts. Putting the environmental impact statements into action is concerned in partiuclar with procedural provisions regarding the Federal Act on Protection against Nuisances and the Atomic Energy Act. The author deals with aspects of the environmental impact statement law and the state-of-the-art achieved so far. He also deals with legislative intent, with further points of putting the law into practice, i.e. the information requirements in the administrative provisions and the integrating aspect, the amalgamating aspect, the requirements made on the state of the environment, and the significance of administrative provisions. Also treated are legal procedures in the Federal Laender and on an international level. (RST) [de

  2. Collision avoidance in robotic environments

    International Nuclear Information System (INIS)

    Kreifeldt, J.G.

    1984-01-01

    A generalized approach to the problem of collision avoidance in robotic environments is presented. This approach transforms the three dimensional but dynamic real-world changing geometric space of the robot in its environment into a multidimensional but static space such that any possible geometric arrangement of the robotic space becomes a point in hyperspace. Major advantages of this approach include clarification of and potential solution to the basic problem of finding optimized, collision free movements from an initial to a final configuration. A major disadvantage of the approach is related to computational and data storage problems. However these latter are technically solvable while the clarification of the control and guidance problem gained through the transformational approach and its general elucidation power remain prime conceptual tools for the problem of robot design and operation

  3. Spanish Consensus Statement

    Science.gov (United States)

    Rey, Guillermo Álvarez; Cuesta, Jordi Ardevol; Loureda, Rafael Arriaza; España, Fernando Ávila; Matas, Ramón Balius; Pazos, Fernando Baró; de Dios Beas Jiménez, Juan; Rosell, Jorge Candel; Fernandez, César Cobián; Ros, Francisco Esparza; Colmenero, Josefina Espejo; de Prado, Jorge Fernández; Cota, Juan José García; González, Jose Ignacio Garrido; Santander, Manuela González; Munilla, Miguel Ángel Herrador; Ruiz, Francisco Ivorra; Díaz, Fernando Jiménez; Marqueta, Pedro Manonelles; Fernandez, Antonio Maestro; Benito, Juan José Muñoz; Vilás, Ramón Olivé; Teres, Xavier Peirau; Amaro, José Peña; Roque, Juan Pérez San; Parenteu, Christophe Ramírez; Serna, Juan Ribas; Álvarez, Mikel Sánchez; Marchori, Carlos Sanchez; Soto, Miguel del Valle; Alonso, José María Villalón; García, Pedro Guillen; de la Iglesia, Nicolas Hugo; Alcorocho, Juan Manuel Lopez

    2015-01-01

    On the 21st of March, 2015, experts met at Clínica CEMTRO in Madrid, Spain, under the patronage of The Spanish Society for Sports Traumatology (SETRADE), The Spanish Federation of Sports Medicine (FEMEDE), The Spanish Association of Medical Services for Football Clubs (AEMEF), and The Spanish Association of Medical Services for Basketball Clubs (AEMB) with the aim of establishing a round table that would allow specialists to consider the most appropriate current general actions to be taken when treating muscle tears in sport, based on proven scientific data described in the medical literature. Each expert received a questionnaire prior to the aforementioned meeting comprising a set of questions concerning therapeutic indications generally applied in the different stages present during muscle repair. The present Consensus Document is the result of the answers to the questionnaire and resulting discussion and consensus over which are the best current indications in the treatment of muscle tears in sport. Avoiding immobilization, not taking nonsteroidal anti-inflammatory drugs (NSAIDs) randomly, fostering early mobilization, increasing vascularization of injured, site and regulating inflammatory mechanisms—without inhibiting these from the early stages of the recovery period—all stood out as main points of the Consensus Document. Additionally, there is controversy concerning cell stimulation techniques and the use of growth factors or cell inhibitors. The decision concerning discharge was unanimous, as was the criteria considered when it came to performing sport techniques without pain. PMID:27213161

  4. Would Tax Evasion and Tax Avoidance Undermine a National Retail Sales Tax?

    OpenAIRE

    Murray, Matthew N.

    1997-01-01

    Argues that shifting to an indirect tax system (a national sales tax) will not necessarily reduce tax avoidance and tax evasion behavior by businesses and individuals, particularly if the tax rate is set high to maintain revenue neutrality. Lack of experience in administering a high-rate, indirect tax system precludes definitive statements regarding the likely extent of tax base erosion under a national sales tax.

  5. Labor Tax Avoidance and its Determinants: The Case of Mafia Firms in Italy

    OpenAIRE

    Ravenda, Diego; Argilés Bosch, Josep M.; Valencia Silva, Maika

    2015-01-01

    This paper develops two new measures of labor tax avoidance (LTAV) based on social contribution expenses reported in financial statements and tests them and their determinants within a sample of 224 Italian firms defined as legally registered Mafia firms (LMFs) due to having been confiscated at some point by judicial authorities, in relation to alleged connections with Italian organized crime. Overall, our results reveal that before confiscation LMFs engage more in LTAV than lawful firms do, ...

  6. [Consent and confidentiality in occupational health practice: balance between legal requirements and ethical values].

    Science.gov (United States)

    Mora, Erika; Franco, G

    2010-01-01

    The recently introduced Italian law on the protection of workers' health states that the occupational health physician (competent physician) is required to act according to the Code of Ethics of the International Commission on Occupational Health (ICOH). This paper aims at examining the articles of legislative decree 81/2008 dealing with informed consent and confidentiality compared with the corresponding points of the ICOH Ethics Code. Analysis of the relationship between articles 25 and 39 (informed consent) and 18, 20 and 39 (confidentiality) of the decree shows that there are some points of disagreement between the legal requirements and the Code of Ethics, in particular concerning prescribed health surveillance, consent based on appropriate information (points 8, 10 and 12 of the Code) and some aspects of confidentiality (points 10, 20, 21, 22 and 23 of the Code). Although the competent physician is required to act according to the law, the decisional process could lead to a violation of workers' autonomy.

  7. Confidentiality and parental involvement in adolescent sexual and reproductive health care

    DEFF Research Database (Denmark)

    Jaruseviciene, Lina; Lazarus, Jeff; Zaborskis, Apolinaras

    2011-01-01

    AIM: We surveyed Lithuanian general practitioners' (GPs) views on the importance of confidentiality for adolescents and on their practices in informing parents about sexual and reproductive health consultations with this age group. METHODS: In this cross-sectional study, a 41-item questionnaire...... was sent to a random sample of 607 Lithuanian GPs. The purpose of this questionnaire was to gain knowledge about current practices of GPs in informing parents on the importance of confidentiality as well as in protecting the privacy of minors. GPs' knowledge of the current legal age limit...... consulting on general sexual issues, more than 70% stated that they would guarantee their minor patients confidentiality. However, when cases involved sexually transmitted infections or pregnancy, nearly the same percentage said they would inform the parents. 62.3% of GPs incorrectly believed that the law...

  8. Denying a patient's final will: public safety vs. medical confidentiality and patient autonomy.

    Science.gov (United States)

    Gaertner, Jan; Vent, Julia; Greinwald, Ralf; Rothschild, Markus A; Ostgathe, Christoph; Kessel, Rene; Voltz, Raymond

    2011-12-01

    Especially when caring for patients approaching the end of life, physicians and nursing staff feel committed to fulfilling as many patient desires as possible. However, sometimes a patient's "final will" may threaten public safety. This can lead to severe conflicts, outweighing the physician's obligation and dedication to care for the patient and to respect his autonomy. Yet, public safety can be threatened if confidentiality is not broken. This article provides a concise summary of the medicolegal and ethical fundamentals concerning this difficult situation. If the patient's and others' health and safety are at risk, physicians may (and in some countries must) break medical confidentiality and disclose confidential patient information to the police and other authorities. Physicians should be able to professionally deal with such a conflict in all patients, not only in patients with advanced illness. Copyright © 2011 U.S. Cancer Pain Relief Committee. Published by Elsevier Inc. All rights reserved.

  9. Confidentiality, 'no blame culture' and whistleblowing, non-physician practice and accountability.

    Science.gov (United States)

    White, Stuart M

    2006-12-01

    Confidentiality is a core tenet of medical professionalism, which enables the maintenance of trust in a doctor-patient relationship. However, both the amount of personal data stored and the number of third parties who might access this data have increased dramatically in the digital age, necessitating the introduction of various national data protection acts. Paradoxically, the Freedom of Information Act 2000 allows United Kingdom citizens to access information held by public bodies, including hospitals. Furthermore, the Public Interest Disclosure Act 1998 actively protects physicians who breach their duty of confidentiality in the name of public interest ('whistleblowing'). This article explores the evolution of the law and ethics in this area, and draws attention to the difficulties in balancing confidentiality against freedom of information. In addition, the role and responsibilities of the non-physician anaesthetist are examined.

  10. [Confidentiality in HIV-infection/AIDS--a comment on the Communicable Disease Control Act].

    Science.gov (United States)

    Frich, J C

    1995-05-10

    The new Communicable Diseases Control Act has come into force in Norway. It makes it compulsory for a physician to warn a third party if it is obvious that a HIV-positive patient, with a high degree of certainty, puts the third party at risk of being infected with HIV. Some philosophers characterize medical confidentiality as an intransigent and absolute obligation, others as a prima facie duty. This article supports the latter view, but the author still argues that strict conditions have to be fulfilled before a physician should consider breaking medical confidentiality: The doctor must try repeatedly to gain the consent or co-operation of the patient involved. Possible negative long-term consequences for the preventive HIV-work support strict medical confidentiality.

  11. Paternalistic breaches of confidentiality in prison: mental health professionals' attitudes and justifications.

    Science.gov (United States)

    Elger, Bernice Simone; Handtke, Violet; Wangmo, Tenzin

    2015-06-01

    This manuscript presents mental health practitioners' (MHPs) practice, attitudes and justifications for breaching confidentiality when imprisoned patients disclose suicidal thoughts or abuse by others. 24 MHPs working in Swiss prisons shared their experiences regarding confidentiality practices. The data were analysed qualitatively and MHPs' attitudes and course of action were identified. Analysis revealed paternalistic breaches of confidentiality. When patients reported suicidal thoughts and abuse, MHPs believed that forgoing confidentiality is necessary to protect patients, providing several justifications for it. Patients were informed that such information will be transmitted without their consent to medical and non-medical prison personnel. With reference to suicidal attempts, MHPs resorted to methods that may reduce suicidal attempts such as transfer to hospital or internal changes in living arrangements, which would require provision of certain information to prison guards. In cases of abuse, some MHPs convinced patients to accept intervention or sometimes overrode competent patients' refusals to report. Also in the case of abuse, provision of limited information to other prison personnel was seen as an acceptable method to protect patients from further harm. Breaches of confidentiality, whether limited or full, remain unethical, when used for competent patients based solely on paternalistic justifications. Institutionalising ethical and legal procedures to address suicidal and abuse situations would be helpful. Education and training to help both medical and prison personnel to respond to such situations in an appropriate manner that ensures confidentiality and protects patients from suicide and abuse are necessary. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://group.bmj.com/group/rights-licensing/permissions.

  12. Confidentiality, anonymity and amnesty for midwives in distress seeking online support - Ethical?

    Science.gov (United States)

    Pezaro, Sally; Clyne, Wendy; Gerada, Clare

    2018-06-01

    Midwife health is intrinsically linked to the quality of safe patient care. To ensure safe patient care, there is a need to deliver emotional support to midwives. One option that midwives may turn to may be a confidential online intervention, instead of localised, face-to-face support. Following the Realist And MEta-narrative Evidence Syntheses: Evolving Standards publication standards, this realist synthesis approach explores the ethical considerations in permitting confidentiality, anonymity and amnesty in online interventions to support midwives in work-related psychological distress. An iterative search methodology was used to select nine papers for review. To assimilate information, papers were examined for ideas relating to ethical dimensions of online interventions to support midwives in work-related psychological distress. This review takes a narrative approach. Online interventions can support the development of insight, help seeking and open discussion. Additionally, Internet support groups can become morally persuasive in nature. Anonymity and confidentiality are both effective and therapeutic features of online interventions when used in collaboration with effective online moderation. Yet, ethical dilemmas remain where users cannot be identified. Confidentiality and anonymity remain key components of successful online interventions. However, sanctioning the corollary component of amnesty may provoke moral discomfort for those seeking immediate accountability. For others, amnesty is seen as essential for open disclosure and help seeking. Ultimately, the needs of midwives must be balanced with the requirement to protect the public and the professional reputation of midwifery. In supporting midwives online, the principles of anonymity, confidentiality and amnesty may evoke some resistance on ethical grounds. However, without offering identity protection, it may not be possible to create effective online support services for midwives. The authors of this

  13. Avoidant/Restrictive Food Intake Disorder

    Science.gov (United States)

    ... Eating Disorder Bulimia Nervosa Pica Rumination Disorder Avoidant/restrictive food intake disorder is characterized by eating very little food and/or avoiding eating certain foods. People with this disorder eat ...

  14. Assessing subject privacy and data confidentiality in an emerging region for clinical trials: United Arab Emirates.

    Science.gov (United States)

    Nair, Satish Chandrasekhar; Ibrahim, Halah

    2015-01-01

    Pharmaceutical sponsored clinical trials, formerly conducted predominantly in the United States and Europe, have expanded to emerging regions, including the Middle East. Our study explores factors influencing clinical trial privacy and confidentiality in the United Arab Emirates. Factors including concept familiarity, informed consent compliance, data access, and preservation, were analyzed to assess current practices in the Arab world. As the UAE is an emerging region for clinical trials, there is a growing need for regulations related to data confidentiality and subject privacy. Informational and decisional privacy should be viewed within the realms of Arab culture and religious background.

  15. The Global Attack on Tax Avoidance

    OpenAIRE

    Franck, Gustav Grønborg; Runchel, Daniel Theis; Mac, Martin Tuannhien; Ahmed, Jahanzeeb; Bang, Lars Seneca

    2015-01-01

    The issue of tax avoidance has been subject for recommended regulations by the G20 countries in collaboration with OECD. We examine the usefulness of market failure theory to explain the economic and political issues of tax avoidance. We test our hypothesis using theory through a deductive approach incorporating content analysis to find convergence(s) between tax avoidance methods identified and the efforts of the G20 BEPS action plan to respond to those methods. The issue of tax avoidance...

  16. Tax Avoidance, Welfare Transfers, and Asset Prices

    OpenAIRE

    Denis Gorea

    2013-01-01

    Does tax avoidance have any implications for financial markets? This paper quantifies the general equilibrium implications of tax avoidance by setting up an incomplete markets production economy model in which households pay capital gains taxes and have access to tax avoidance technologies provided by financial institutions. I find that changes in the level of tax avoidance have disproportionate effects on different groups of agents and generally benefit the old, wealthy and high income house...

  17. Conflict Avoidance in a University Context

    Science.gov (United States)

    Barsky, Allan E.; Wood, Lorinda

    2005-01-01

    This ethnographic study explores patterns of conflict avoidance among university students, professors, administrators and staff. Analysis of their narratives of conflict avoidance suggests that avoidance can be beneficial in some circumstances, depending upon personality issues, cost?benefit analysis, power imbalance, type of work, length of…

  18. 49 CFR 40.321 - What is the general confidentiality rule for drug and alcohol test information?

    Science.gov (United States)

    2010-10-01

    ... Transportation PROCEDURES FOR TRANSPORTATION WORKPLACE DRUG AND ALCOHOL TESTING PROGRAMS Confidentiality and Release of Information § 40.321 What is the general confidentiality rule for drug and alcohol test... DOT drug or alcohol testing process, you are prohibited from releasing individual test results or...

  19. 32 CFR 147.30 - Temporary eligibility for access at the confidential and secret levels and temporary eligibility...

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 1 2010-07-01 2010-07-01 false Temporary eligibility for access at the confidential and secret levels and temporary eligibility for âLâ access authorization. 147.30 Section 147.30... Temporary Access § 147.30 Temporary eligibility for access at the confidential and secret levels and...

  20. Circles of Confidence in Correspondences. : Confidentiality in seventeenth-century knowledge exchange in networks of letters and drawings

    NARCIS (Netherlands)

    van den Heuvel, C.M.J.M.; Weingart, Scott B; Spelt, Nils; Nellen, H.J.M.

    2016-01-01

    Science in the Early Modern World depended on the one hand on openness in scholarly communication, but on the other hand the competition in commerce and trade and the political and religious conflicts required secrecy and confidentiality. This papers analyzes these concepts of confidentiality and

  1. 48 CFR 1552.235-78 - Data Security for Toxic Substances Control Act Confidential Business Information (DEC 1997).

    Science.gov (United States)

    2010-10-01

    ...: Data Security for Toxic Substances Control Act Confidential Business Information (DEC 1997) The... 48 Federal Acquisition Regulations System 6 2010-10-01 2010-10-01 true Data Security for Toxic Substances Control Act Confidential Business Information (DEC 1997). 1552.235-78 Section 1552.235-78 Federal...

  2. Confidentiality Protection of User Data and Adaptive Resource Allocation for Managing Multiple Workflow Performance in Service-Based Systems

    Science.gov (United States)

    An, Ho

    2012-01-01

    In this dissertation, two interrelated problems of service-based systems (SBS) are addressed: protecting users' data confidentiality from service providers, and managing performance of multiple workflows in SBS. Current SBSs pose serious limitations to protecting users' data confidentiality. Since users' sensitive data is sent in…

  3. Population avoidance in aimpoint selection

    International Nuclear Information System (INIS)

    Andre, C.G.

    1978-01-01

    In most past studies of the effectiveness of tactical nuclear weapons vs the amount of collateral damage produced (civilian casualties), civilians have been congregated into idealized shaped towns and cities, and criteria for city avoidance were usually formulated in terms relating to a town's population. This treatment was sufficient in those studies where weapon yields were so large that great numbers of civilians were almost always placed at risk. As further studies developed, demonstrating that real progress could be made in reducing the numbers of civilians potentially placed at risk in tactical nuclear warfare situations, the inadequacies of the present treatment became obvious. The need existed for a more detailed description of the distribution of civilians. The method described determines the number of civilians at risk for a weapon under consideration being detonated at a given point and displays a symbol relating to the numbers at risk on a map or a transparency that overlays a 1:50,000 map of the region. Thus, a weapons planner making the selection of aimpoints for inflicting the necessary military damage required has the means to reduce potential civilian casualties by properly choosing the weapon and aimpoints

  4. Chairperson's concluding statement

    International Nuclear Information System (INIS)

    Bennett, B.G.

    2005-01-01

    Organization and the United Nations Development Programme made substantial, direct contributions to the work of the Forum and the presentations at this conference. After having looked back, let us now go forward together and join in our efforts to transform discussions into actions. He urged cooperation to make concerted efforts to inform the public of the measures still needed to avoid further radiation exposures from radionuclides released by the accident, to formulate reasonable and fair measures to compensate for injuries and disruptions of lives, and utilize our limited resources most effectively for the common good

  5. Meaning of counterfactual statements in quantum physics

    International Nuclear Information System (INIS)

    Stapp, H.P.

    1998-01-01

    David Mermin suggests that my recent proof pertaining to quantum nonlocality is undermined by an essential ambiguity pertaining to the meaning of counterfactual statements in quantum physics. The ambiguity he cites arises from his imposition of a certain criterion for the meaningfulness of such counterfactual statements. That criterion conflates the meaning of a counterfactual statement with the details of a proof of its validity in such a way as to make the meaning of such a statement dependent upon the context in which it occurs. That dependence violates the normal demand in logic that the meaning of a statement be defined by the words in the statement itself, not by the context in which the statement occurs. My proof conforms to that normal requirement. I describe the context-independent meaning within my proof of the counterfactual statements in question. copyright 1998 American Association of Physics Teachers

  6. Accounting Principles and Financial Statements.

    Science.gov (United States)

    Robinson, Daniel D.

    1973-01-01

    This document presents the background and analysis of the American Institute of Certified Public Accountants (AICPA) guide to auditing colleges and universities. Highlights include the approval of the market value option, the treatment of endowment gains, debt services as transfers, the decisions on pledges, the use of financial statements, the…

  7. In Brief: Geoengineering draft statement

    Science.gov (United States)

    Showstack, Randy

    2009-04-01

    The American Meteorological Society (AMS) has prepared a draft policy statement on geoengineering the climate system, which the AMS Council is considering for approval. The statement notes, “Geoengineering will not substitute for either aggressive mitigation or proactive adaptation. It could contribute to a comprehensive risk management strategy to slow climate change and alleviate its negative impacts, but the potential for adverse and unintended consequences implies a need for adequate research, appropriate regulation, and transparent consideration.” The statement, if adopted, indicates that AMS recommends enhanced research on the scientific and technological potential for geoengineering the climate system; additional study of the historical, ethical, legal, political, and societal aspects of the geoengineering issues; and the development and analysis of policy options to promote transparency and international cooperation in exploring geoengineering options along with restrictions on reckless efforts to manipulate the climate system. AMS is accepting comments on the draft statement until 23 April. For more information, visit http://ametsoc.org/policy/draftstatements/index.html#draft.

  8. COMPARATIVE FINANCIAL STATEMENTS. CONVERGENCE VERSUS DIVERGENCE

    Directory of Open Access Journals (Sweden)

    Nicolae ECOBICI

    2010-09-01

    Full Text Available In this paper I compared the Romanian financial statements with the US GAAP financial statements in terms of two criteria: first the reference period and secondly the shape, structure and content of financial statements. Nowadays the two accounting systems, the French and Anglo-Saxon, tend to harmonize. I will present the convergences and the divergences between the financial statements of Romania, subject to OMFP 3055/2009, in parallel with the Anglo-Saxon accounting system.

  9. Earthworm avoidance of silver nanomaterials over time

    DEFF Research Database (Denmark)

    Mariyadas, Jennifer; Amorim, Mónica J B; Jensen, John

    2018-01-01

    Avoidance behaviour offers a highly relevant information as it reveals the ability to avoid (or not) possible toxic compounds in the field, hence it provides information on reasons for the presence/absence in the field. The earthworm Eisenia fetida was used to study avoidance behaviour to four si...... exposure durations and showed a continuous higher avoidance with time (based on EC50 values). The AgNMs avoidance was in the order NM300Ksoil solution fraction that correlated with EC50 across materials....

  10. 7 CFR 29.2 - Policy statement.

    Science.gov (United States)

    2010-01-01

    ... INSPECTION Policy Statement and Regulations Governing the Extension of Tobacco Inspection and Price Support Services to New Markets and to Additional Sales on Designated Markets § 29.2 Policy statement. Inspection... 7 Agriculture 2 2010-01-01 2010-01-01 false Policy statement. 29.2 Section 29.2 Agriculture...

  11. 7 CFR 29.9402 - Policy statement.

    Science.gov (United States)

    2010-01-01

    ... INSPECTION Policy Statement and Regulations Governing Availability of Tobacco Inspection and Price Support Services to Flue-Cured Tobacco on Designated Markets § 29.9402 Policy statement. The sets of inspectors... 7 Agriculture 2 2010-01-01 2010-01-01 false Policy statement. 29.9402 Section 29.9402 Agriculture...

  12. 42 CFR 460.208 - Financial statements.

    Science.gov (United States)

    2010-10-01

    ... 42 Public Health 4 2010-10-01 2010-10-01 false Financial statements. 460.208 Section 460.208... ELDERLY (PACE) Data Collection, Record Maintenance, and Reporting § 460.208 Financial statements. (a... must submit a certified financial statement that includes appropriate footnotes. (2) The financial...

  13. 7 CFR 1209.239 - Financial statements.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 10 2010-01-01 2010-01-01 false Financial statements. 1209.239 Section 1209.239..., AND CONSUMER INFORMATION ORDER Rules and Regulations General § 1209.239 Financial statements. (a) As requested by the Secretary, the Council shall prepare and submit financial statements to the Secretary on a...

  14. Understanding Financial Statements. Financial Matters. Board Basics.

    Science.gov (United States)

    McCarthy, John H.; Turner, Robert M.

    1998-01-01

    This booklet for trustees of higher education institutions offers guidelines to help trustees understand the institution's financial statements. Individual sections describe the three major financial statements and cover topics such as: (1) standards of the Financial Accounting Standards Board; (2) the "statement of financial position,"…

  15. 7 CFR 4280.140 - Financial statements.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 15 2010-01-01 2010-01-01 false Financial statements. 4280.140 Section 4280.140... Efficiency Improvements Program Section B. Guaranteed Loans § 4280.140 Financial statements. (a) The... financial statements, at its sole discretion when the Agency is concerned about the applicant's credit risk. ...

  16. 17 CFR 145.9 - Petition for confidential treatment of information submitted to the Commission.

    Science.gov (United States)

    2010-04-01

    ... may summarily reject the submitter's request for confidential treatment with leave to the submitter to... treatment of information submitted to the Commission. 145.9 Section 145.9 Commodity and Securities Exchanges... treatment of information submitted to the Commission. (a) Purpose. This section provides a procedure by...

  17. 21 CFR 1316.23 - Confidentiality of identity of research subjects.

    Science.gov (United States)

    2010-04-01

    ... 21 Food and Drugs 9 2010-04-01 2010-04-01 false Confidentiality of identity of research subjects. 1316.23 Section 1316.23 Food and Drugs DRUG ENFORCEMENT ADMINISTRATION, DEPARTMENT OF JUSTICE ADMINISTRATIVE FUNCTIONS, PRACTICES, AND PROCEDURES Protection of Researchers and Research Subjects § 1316.23...

  18. 40 CFR 1601.26 - Special procedures for confidential business information.

    Science.gov (United States)

    2010-07-01

    ... described in paragraph (c) of this section, the CSB shall, to the extent permitted by law, afford a business... business information. 1601.26 Section 1601.26 Protection of Environment CHEMICAL SAFETY AND HAZARD... Requesting and Disclosing Records § 1601.26 Special procedures for confidential business information. (a) In...

  19. 76 FR 30781 - Confidentiality Determinations for Data Required Under the Mandatory Greenhouse Gas Reporting...

    Science.gov (United States)

    2011-05-26

    ... this document. BAMM Best Available Monitoring Methods CAA Clean Air Act CBI confidential business information CBP Customs and Border Protection CEMS continuous emission monitoring system(s) CFR Code of... prevent competitors from forcing them to defend data on a case-by-case basis in Agency CBI proceedings...

  20. 45 CFR 61.14 - Confidentiality of Healthcare Integrity and Protection Data Bank information.

    Science.gov (United States)

    2010-10-01

    ... 45 Public Welfare 1 2010-10-01 2010-10-01 false Confidentiality of Healthcare Integrity and Protection Data Bank information. 61.14 Section 61.14 Public Welfare DEPARTMENT OF HEALTH AND HUMAN SERVICES GENERAL ADMINISTRATION HEALTHCARE INTEGRITY AND PROTECTION DATA BANK FOR FINAL ADVERSE INFORMATION ON...

  1. 45 CFR 60.15 - Confidentiality of National Practitioner Data Bank information.

    Science.gov (United States)

    2010-10-01

    ... 45 Public Welfare 1 2010-10-01 2010-10-01 false Confidentiality of National Practitioner Data Bank information. 60.15 Section 60.15 Public Welfare DEPARTMENT OF HEALTH AND HUMAN SERVICES GENERAL ADMINISTRATION NATIONAL PRACTITIONER DATA BANK FOR ADVERSE INFORMATION ON PHYSICIANS AND OTHER HEALTH CARE PRACTITIONERS...

  2. 42 CFR 2.2 - Statutory authority for confidentiality of alcohol abuse patient records.

    Science.gov (United States)

    2010-10-01

    ... HUMAN SERVICES GENERAL PROVISIONS CONFIDENTIALITY OF ALCOHOL AND DRUG ABUSE PATIENT RECORDS Introduction.... (B) To qualified personnel for the purpose of conducting scientific research, management audits, financial audits, or program evaluation, but such personnel may not identify, directly or indirectly, any...

  3. 76 FR 77816 - Access to Confidential Business Information by Guident Technologies, Inc. and Subcontractor...

    Science.gov (United States)

    2011-12-14

    ... Business Information by Guident Technologies, Inc. and Subcontractor, Impact Innovations Systems, Inc..., Guident Technologies, Inc. of Herndon, VA and subcontractor, Impact Innovations Systems, Inc. of Manassas... Control Act (TSCA). Some of the information may be claimed or determined to be Confidential Business...

  4. 76 FR 10360 - Access to Confidential Business Information by Guident Technologies Inc. and Its Identified...

    Science.gov (United States)

    2011-02-24

    ... Business Information by Guident Technologies Inc. and Its Identified Subcontractors AGENCY: Environmental Protection Agency (EPA). ACTION: Notice. SUMMARY: EPA has authorized its contractor, Guident Technologies... information may be claimed or determined to be Confidential Business Information (CBI). DATES: Access to the...

  5. High-Technology Companies Often Turn to Colleges for Confidential 'Beta Tests' of New Products.

    Science.gov (United States)

    Turner, Judith Axler

    1988-01-01

    Beta testing--the process of trying a product in a real-world setting before releasing it commercially--exploits a natural interface between universities and high-technology industries. High-tech companies need confidential, real-world tests of new products, and universities are eager to get an early look at tomorrow's technology. (MLW)

  6. Ensuring Confidentiality of Geocoded Health Data: Assessing Geographic Masking Strategies for Individual-Level Data.

    Science.gov (United States)

    Zandbergen, Paul A

    2014-01-01

    Public health datasets increasingly use geographic identifiers such as an individual's address. Geocoding these addresses often provides new insights since it becomes possible to examine spatial patterns and associations. Address information is typically considered confidential and is therefore not released or shared with others. Publishing maps with the locations of individuals, however, may also breach confidentiality since addresses and associated identities can be discovered through reverse geocoding. One commonly used technique to protect confidentiality when releasing individual-level geocoded data is geographic masking. This typically consists of applying a certain amount of random perturbation in a systematic manner to reduce the risk of reidentification. A number of geographic masking techniques have been developed as well as methods to quantity the risk of reidentification associated with a particular masking method. This paper presents a review of the current state-of-the-art in geographic masking, summarizing the various methods and their strengths and weaknesses. Despite recent progress, no universally accepted or endorsed geographic masking technique has emerged. Researchers on the other hand are publishing maps using geographic masking of confidential locations. Any researcher publishing such maps is advised to become familiar with the different masking techniques available and their associated reidentification risks.

  7. 22 CFR 212.38 - Predisclosure notification procedures for confidential commercial information.

    Science.gov (United States)

    2010-04-01

    ... 22 Foreign Relations 1 2010-04-01 2010-04-01 false Predisclosure notification procedures for confidential commercial information. 212.38 Section 212.38 Foreign Relations AGENCY FOR INTERNATIONAL DEVELOPMENT PUBLIC INFORMATION Access to Agency Records § 212.38 Predisclosure notification procedures for...

  8. 18 CFR 385.606 - Confidentiality in dispute resolution proceedings (Rule 606).

    Science.gov (United States)

    2010-04-01

    ... be required to disclose, any information concerning any dispute resolution communication or any communication provided in confidence to the neutral, unless: (1) All participants in the dispute resolution... reducing the confidence of participants in future cases that their communications will remain confidential...

  9. 19 CFR 210.39 - In camera treatment of confidential information.

    Science.gov (United States)

    2010-04-01

    ... 19 Customs Duties 3 2010-04-01 2010-04-01 false In camera treatment of confidential information. 210.39 Section 210.39 Customs Duties UNITED STATES INTERNATIONAL TRADE COMMISSION INVESTIGATIONS OF UNFAIR PRACTICES IN IMPORT TRADE ADJUDICATION AND ENFORCEMENT Prehearing Conferences and Hearings § 210...

  10. HIV testing sites' communication about adolescent confidentiality: potential barriers and facilitators to testing.

    Science.gov (United States)

    Hyden, Christel; Allegrante, John P; Cohall, Alwyn T

    2014-03-01

    This study sought to evaluate HIV testing locations in New York City in terms of staff communication of confidentiality policies for adolescent clients. Using the New York State Directory of HIV Counseling and Testing Resources as a sampling frame, this study made telephone contact with 164 public HIV testing locations in New York City and used a semistructured interview to ask questions about confidentiality, parental permission, and parent access to test results. At 48% of locations, either HIV testing was not offered or we were unable to reach a staff member to ask questions about testing options and confidentiality. At the remaining sites, information provided regarding confidentiality, parental consent, and privacy of test results was correct only 69% to 85% of the time. Additionally, 23% of sites successfully contacted offered testing exclusively between 9:00 a.m. and 3:00 p.m. weekdays, when most adolescents are in school. Our findings point to a need for increased training and quality control at the clinical level to ensure that consumers in need of HIV testing are provided with accurate information and accessible services. Furthermore, these results highlight the need for more "patient-centric" sites with enhanced accessibility for potential clients, particularly youth.

  11. Ensuring Confidentiality of Geocoded Health Data: Assessing Geographic Masking Strategies for Individual-Level Data

    Directory of Open Access Journals (Sweden)

    Paul A. Zandbergen

    2014-01-01

    Full Text Available Public health datasets increasingly use geographic identifiers such as an individual’s address. Geocoding these addresses often provides new insights since it becomes possible to examine spatial patterns and associations. Address information is typically considered confidential and is therefore not released or shared with others. Publishing maps with the locations of individuals, however, may also breach confidentiality since addresses and associated identities can be discovered through reverse geocoding. One commonly used technique to protect confidentiality when releasing individual-level geocoded data is geographic masking. This typically consists of applying a certain amount of random perturbation in a systematic manner to reduce the risk of reidentification. A number of geographic masking techniques have been developed as well as methods to quantity the risk of reidentification associated with a particular masking method. This paper presents a review of the current state-of-the-art in geographic masking, summarizing the various methods and their strengths and weaknesses. Despite recent progress, no universally accepted or endorsed geographic masking technique has emerged. Researchers on the other hand are publishing maps using geographic masking of confidential locations. Any researcher publishing such maps is advised to become familiar with the different masking techniques available and their associated reidentification risks.

  12. Teaching Journalism Students about Confidential Whistleblower Sources: An Analysis of Introductory News Writing Textbooks

    Science.gov (United States)

    Huxford, John; Moore, Maria A.

    2011-01-01

    Whistleblowers are a key journalistic source for many current news stories. However, reporters pursuing these major stories must navigate the dilemma between transparent full disclosure and protecting their confidential source. Professional journalists begin their journey as students, and students begin their journey in the classroom with a…

  13. 77 FR 76028 - Access to Confidential Business Information by Science Applications International Corporation and...

    Science.gov (United States)

    2012-12-26

    ... Business Information by Science Applications International Corporation and Its Identified Subcontractor...: EPA has authorized its contractor, Science Applications International Corporation (SAIC) of McLean, VA... information may be claimed or determined to be Confidential Business Information (CBI). DATES: Access to the...

  14. 78 FR 66697 - Access to Confidential Business Information by Science Applications International Corporation and...

    Science.gov (United States)

    2013-11-06

    ... Business Information by Science Applications International Corporation and Its Identified Subcontractors..., Science Applications International Corporation (SAIC) of McLean, VA, and its subcontractors to access...). Some of the information may have been claimed or determined to be Confidential Business Information...

  15. Data-protection standards and confidentiality of HIV/AIDS status in ...

    African Journals Online (AJOL)

    Also, the article presents a preliminary assessment of the possible impact of professionalisation (and outsourcing) of workplace HIV/AIDS management on ... the development of law governing data protection and HIV/AIDS confidentiality in South Africa) and interviews conducted with workplace health managers and trade ...

  16. 78 FR 68161 - Greenhouse Gas Reporting Program: Final Amendments and Confidentiality Determinations for...

    Science.gov (United States)

    2013-11-13

    ... 98 Greenhouse Gas Reporting Program: Final Amendments and Confidentiality Determinations for...-HQ-OAR-2011-0028; FRL-9845-6] RIN 2060-AR61 Greenhouse Gas Reporting Program: Final Amendments and... monitoring methodologies for electronics manufacturers covered by the Greenhouse Gas Reporting Rule. These...

  17. 78 FR 69337 - Greenhouse Gas Reporting Program: Amendments and Confidentiality Determinations for Fluorinated...

    Science.gov (United States)

    2013-11-19

    ...-AR78 Greenhouse Gas Reporting Program: Amendments and Confidentiality Determinations for Fluorinated... Greenhouse Gas Reporting Rule. The proposed changes would reduce the level of detail in which emissions were..., please go to the Greenhouse Gas Reporting Rule Program Web site at http://www.epa.gov/climatechange...

  18. 76 FR 52659 - Access by EPA Contractors to Confidential Business Information (CBI) Related to the Greenhouse...

    Science.gov (United States)

    2011-08-23

    ... Confidential Business Information (CBI) Related to the Greenhouse Gas Reporting Program AGENCY: Environmental... contractors named in this notice to access information that will be submitted to EPA under the Greenhouse Gas...), EPA created the Greenhouse Gas Reporting Program (GHGRP), 40 CFR part 98 (part 98), which requires...

  19. The Psychological Competence of Police Officers in Confidential Cooperation with Citizens

    Science.gov (United States)

    Uspanov, Zholdybai T.; Turabayeva, Dana S.; Ermolovich, Vladimir F.

    2016-01-01

    This research studied the psychological aspects of citizens' assistance to law enforcement agencies on a confidential basis. The comprehensive observance of the psychological norms of cooperation is determined by the professional ethics of police officers, the necessity of nondisclosure of investigation secrets by citizens, and the security of the…

  20. 20 CFR 603.4 - What is the confidentiality requirement of Federal UC law?

    Science.gov (United States)

    2010-04-01

    ... 20 Employees' Benefits 3 2010-04-01 2010-04-01 false What is the confidentiality requirement of Federal UC law? 603.4 Section 603.4 Employees' Benefits EMPLOYMENT AND TRAINING ADMINISTRATION, DEPARTMENT....C. 502(a)), State law must include provision for such methods of administration as are found by the...

  1. Scheduler-specific Confidentiality for Multi-Threaded Programs and Its Logic-Based Verification

    NARCIS (Netherlands)

    Huisman, Marieke; Ngo, Minh Tri

    2011-01-01

    Observational determinism has been proposed in the literature as a way to ensure confidentiality for multi-threaded programs. Intuitively, a program is observationally deterministic if the behavior of the public variables is deterministic, i.e., independent of the private variables and the

  2. 75 FR 46948 - Medicare Program; Listening Session Regarding Confidential Feedback Reports and the...

    Science.gov (United States)

    2010-08-04

    ...] Medicare Program; Listening Session Regarding Confidential Feedback Reports and the Implementation of a... Services (CMS), HHS. ACTION: Notice of meeting. SUMMARY: This notice announces a listening session being... modifier to the fee- for-service physician fee schedule. The purpose of the listening session is to solicit...

  3. 77 FR 25475 - Inquiry To Learn Whether Businesses Assert Business Confidentiality Claims Regarding Waste Import...

    Science.gov (United States)

    2012-04-30

    ... meet the definition of ``affected business,'' and are not covered by today's notice. They consist of..., however, do not meet the definition of ``affected business,'' and are not covered by today's notice. They... Businesses Assert Business Confidentiality Claims Regarding Waste Import and Export AGENCY: Environmental...

  4. 77 FR 109 - Inquiry To Learn Whether Businesses Assert Business Confidentiality Claims Regarding Waste Import...

    Science.gov (United States)

    2012-01-03

    ... definition of ``affected business,'' and are not covered by today's notice. They consist of any business that.... Certain businesses, however, do not meet the definition of ``affected business,'' and are not covered by... Businesses Assert Business Confidentiality Claims Regarding Waste Import and Export AGENCY: Environmental...

  5. 75 FR 44951 - Inquiry To Learn Whether Businesses Assert Business Confidentiality Claims

    Science.gov (United States)

    2010-07-30

    ... such treatment. Certain businesses, however, do not meet the definition of ``affected business,'' and... definition of ``affected business,'' and are not covered by today's notice. They consist of any business that... Businesses Assert Business Confidentiality Claims AGENCY: Environmental Protection Agency (EPA). ACTION...

  6. 76 FR 362 - Inquiry To Learn Whether Businesses Assert Business Confidentiality Claims

    Science.gov (United States)

    2011-01-04

    ... claims for such treatment. Certain businesses, however, do not meet the definition of ``affected business.... Certain businesses, however, do not meet the definition of ``affected business,'' and are not covered by... Businesses Assert Business Confidentiality Claims AGENCY: Environmental Protection Agency (EPA). ACTION...

  7. 75 FR 4812 - Inquiry To Learn Whether Businesses Assert Business Confidentiality Claims

    Science.gov (United States)

    2010-01-29

    ..., however, do not meet the definition of ``affected business,'' and are not covered by today's notice. They.... Certain businesses, however, do not meet the definition of ``affected business,'' and are not covered by... Businesses Assert Business Confidentiality Claims AGENCY: Environmental Protection Agency (EPA). ACTION...

  8. 78 FR 2669 - Waste Import and Export; Inquiry To Learn Whether Businesses Assert Business Confidentiality Claims

    Science.gov (United States)

    2013-01-14

    ... definition of ``affected business,'' and are not covered by today's notice. They consist of any business that... waste'' is defined at 40 CFR 273.9. Certain businesses, however, do not meet the definition of...; Inquiry To Learn Whether Businesses Assert Business Confidentiality Claims AGENCY: Environmental...

  9. 76 FR 69722 - Access to Confidential Business Information by Protection Strategies Incorporated

    Science.gov (United States)

    2011-11-09

    ... Business Information by Protection Strategies Incorporated AGENCY: Environmental Protection Agency (EPA... Control Act (TSCA) confidential business information and to provide notice that this contract has been extended until December 31, 2011. Protection Strategies Incorporated (PSI) has been the owner of Eagle...

  10. Combined model of 9x9 playfair and RSA for securing confidential ...

    African Journals Online (AJOL)

    Combined model of 9x9 playfair and RSA for securing confidential information. Y.B. Zakariyau, L.J. Muhammad, A.M. Usman, A Garba. Abstract. No Abstract. Keywords: Cryptography, RSA, Playfair Cipher, Public and Secret Key. Full Text: EMAIL FULL TEXT EMAIL FULL TEXT · DOWNLOAD FULL TEXT DOWNLOAD FULL ...

  11. 75 FR 55577 - Clean Water Act; Contractor Access to Confidential Business Information

    Science.gov (United States)

    2010-09-13

    ... ENVIRONMENTAL PROTECTION AGENCY [FRL-9200-8] Clean Water Act; Contractor Access to Confidential... Recovery Act (RCRA). Transfer of the information will allow the contractor and subcontractors to access... contractors and subcontractors over the history of the effluent guidelines program. EPA determined that this...

  12. 77 FR 60962 - Clean Water Act; Contractor Access to Confidential Business Information

    Science.gov (United States)

    2012-10-05

    ... ENVIRONMENTAL PROTECTION AGENCY 40 CFR Part 2 [FRL-9733-8] Clean Water Act; Contractor Access to... transfer of confidential business information to contractor, subcontractors, and consultants. SUMMARY: The... certain industries. We have determined that the contractors listed below require access [[Page 60963

  13. 75 FR 60452 - Clean Water Act; Contractor Access to Confidential Business Information

    Science.gov (United States)

    2010-09-30

    ... ENVIRONMENTAL PROTECTION AGENCY [FRL-9208-9] Clean Water Act; Contractor Access to Confidential... electric industry to a new subcontractor of a contractor, Eastern Research Group (ERG). EPA previously... contractors and subcontractors to access information necessary to support EPA in the planning, development...

  14. 78 FR 79692 - Clean Water Act; Contractor Access to Confidential Business Information

    Science.gov (United States)

    2013-12-31

    ... ENVIRONMENTAL PROTECTION AGENCY [FRL-9904-94-OW] Clean Water Act; Contractor Access to... Transfer of Confidential Business Information to Contractor, Subcontractors, and Consultants. SUMMARY: The... contractors listed below require access to CBI submitted to EPA under Section 308 of the Clean Water Act (CWA...

  15. 78 FR 67139 - Access to Confidential Business Information by Eastern Research Group and Its Identified...

    Science.gov (United States)

    2013-11-08

    ... Business Information by Eastern Research Group and Its Identified Subcontractor, Energy Services, Inc..., Eastern Research Group (ERG) of Chantilly, VA, and subcontractor Energy Services, Inc., of Tallahassee, FL... Control Act (TSCA). Some of the information may be claimed or determined to be Confidential Business...

  16. The Confidentiality of Medical Secrets of Patients by the Nursing Staff

    Directory of Open Access Journals (Sweden)

    Chalkias Theodoros

    2010-01-01

    Full Text Available In this article you will find a critical discussion about the significance of confidentiality of "medical secrets" (keeping the secrets of ill people by nurses. Special cases are mentioned regarding the need to keep, or reveal the secret.

  17. 5 CFR 213.3301 - Positions of a confidential or policy-determining nature.

    Science.gov (United States)

    2010-01-01

    ... 5 Administrative Personnel 1 2010-01-01 2010-01-01 false Positions of a confidential or policy-determining nature. 213.3301 Section 213.3301 Administrative Personnel OFFICE OF PERSONNEL MANAGEMENT CIVIL... or policy-determining nature. (a) Upon specific authorization by OPM, agencies may make appointments...

  18. 41 CFR 102-75.320 - Does appraisal information need to be kept confidential?

    Science.gov (United States)

    2010-07-01

    ... 41 Public Contracts and Property Management 3 2010-07-01 2010-07-01 false Does appraisal information need to be kept confidential? 102-75.320 Section 102-75.320 Public Contracts and Property Management Federal Property Management Regulations System (Continued) FEDERAL MANAGEMENT REGULATION REAL PROPERTY 75-REAL PROPERTY DISPOSAL Surplus Real...

  19. Doctor-patient confidentiality - right and duty of a doctor in law regulations

    Directory of Open Access Journals (Sweden)

    Janusz Jaroszyński

    2018-03-01

    Full Text Available Physician’s professional secrecy is one of the most important duties of a doctor and should be provided with confidentiality regarding his or her health. Generally speaking, there is no legal definition of "physician’s professional secrecy" in Poland, although this concept already appears in the oath of Hippocrates: ‘I will keep secret anything I see or hear professionally which ought not to be told’. The issue of medical confidentiality (physician’s professional secrecy has been regulated in several legal acts such as: The Patient Rights and Patients Ombudsman Act, The Constitution of the Republic of Poland, The Medical Profession Act, The Civil Code Act, The Criminal Code Act and Code of Medical Ethics which is not considered as a legal act. The patient has the right to require confidentiality of the information concerning him and the obligation to keep medical confidentiality will apply to every representative of the medical profession, who obtained certain information by various professional activities.

  20. 19 CFR 201.19 - Notification regarding requests for confidential business information.

    Science.gov (United States)

    2010-04-01

    ... business information. 201.19 Section 201.19 Customs Duties UNITED STATES INTERNATIONAL TRADE COMMISSION GENERAL RULES OF GENERAL APPLICATION Availability of Information to the Public Pursuant to 5 U.S.C. 552 § 201.19 Notification regarding requests for confidential business information. (a) In general. Business...

  1. 42 CFR 3.206 - Confidentiality of patient safety work product.

    Science.gov (United States)

    2010-10-01

    ... 42 Public Health 1 2010-10-01 2010-10-01 false Confidentiality of patient safety work product. 3... individually identifiable health information in such patient safety work product, the direct identifiers listed at 45 CFR 164.514(e)(2) have been removed. (5) Disclosure of nonidentifiable patient safety work...

  2. Generalization of socially transmitted and instructed avoidance

    Directory of Open Access Journals (Sweden)

    Gemma eCameron

    2015-06-01

    Full Text Available Excessive avoidance behavior, in which an instrumental action prevents an upcoming aversive event, is a defining feature of anxiety disorders. Left unchecked, both fear and avoidance of potentially threatening stimuli may generalize to perceptually related stimuli and situations. The behavioral consequences of generalization mean that aversive learning experiences with specific threats may lead people to infer that classes of related stimuli are threatening, potentially dangerous, and need to be avoided, despite differences in physical form. Little is known about avoidance generalization in humans and the learning pathways by which it may be transmitted. In the present study, we compared two pathways to avoidance, instructions and social observation, on subsequent generalization of avoidance behavior, fear expectancy and physiological arousal. Participants first learned that one cue was a danger cue (conditioned stimulus, CS+ and another was a safety cue (CS-. Groups then were either instructed that a simple avoidance response in the presence of the CS+ cancelled upcoming shock presentations (instructed-learning group or observed a short movie showing a demonstrator performing the avoidance response to prevent shock (observational-learning group. During generalization testing, danger and safety cues were presented along with generalization stimuli that parametrically varied in perceptual similarity to the CS+. Reinstatement of fear and avoidance was also tested. Findings demonstrate, for the first time, generalization of socially transmitted and instructed avoidance: both groups showed comparable generalization gradients in fear expectancy, avoidance behavior and arousal. Return of fear was evident, suggesting that generalized avoidance remains persistent following extinction testing. The utility of the present paradigm for research on avoidance generalization is discussed.

  3. Analysis of the ethical aspects of professional confidentiality in dental practice.

    Science.gov (United States)

    Garbin, Cléa Adas Saliba; Garbin, Artênio José Isper; Saliba, Nemre Adas; de Lima, Daniela Coelho; de Macedo, Ana Paula Ayala

    2008-01-01

    From the point of view of deontological ethics, privacy is a moral right that patients are entitled to and it is bound to professional confidentiality. Otherwise, the information given by patients to health professionals would not be reliable and a trustable relationship could not be established. The aim of the present study was to assess, by means of questionnaires with open and closed questions, the awareness and attitudes of 100 dentists working in the city of Andradina, São Paulo State, Brazil, with respect to professional confidentiality in dental practice. Most dentists (91.43%) reported to have instructed their assistants on professional confidentiality. However, 44.29% of the interviewees showed to act contradictorily as reported talking about the clinical cases of their patients to their friends or spouses. The great majority of professionals (98.57%) believed that it is important to have classes on Ethics and Bioethics during graduation and, when asked about their knowledge of the penalties imposed for breach of professional confidentiality, only 48.57% of them declared to be aware of it. Only 28.57% of the interviewees affirmed to have exclusive access to the files; 67.14% reported that that files were also accessed by their secretary; 1.43% answered that their spouses also had access, and 2.86% did not answer. From the results of the present survey, it could be observed that, although dentists affirmed to be aware of professional confidentiality, their attitudes did not adhere to ethical and legal requirements. This stand of health professionals has contributed to violate professional ethics and the law itself, bringing problems both to the professional and to the patient.

  4. The end of medical confidentiality? Patients, physicians and the state in history.

    Science.gov (United States)

    Rieder, Philip; Louis-Courvoisier, Micheline; Huber, Philippe

    2016-09-01

    Medical confidentiality has come under attack in the public sphere. In recent disasters both journalists and politicians have questioned medical confidentiality and claimed that in specific contexts physicians should be compelled to communicate data on their patients' health. The murders of innocent individuals by a suicidal pilot and a Swiss convicted criminal have generated polemical debates on the topic. In this article, historical data on medical confidentiality is used to show that medical practices of secrecy were regularly attacked in the past, and that the nature of medical confidentiality evolved through time depending on physicians' values and judgements. Our demonstration is based on three moments in history. First, at the end of the 16th century, lay authorities put pressure on physicians to disclose the names of patients suffering from syphilis. Second, in the 18th century, physicians faced constant demands for information about patients' health from relatives and friends. Third, employers and insurance companies in the 20th century requested medical data on sick employees. In these three different situations, history reveals that the concept of medical confidentiality was plastic, modelled in the first instance to defend well-to-do patients, in the second instance it was adapted to accommodate the physician's social role and, finally, to defend universal values and public health. Medical secrecy was, and is today, a medical and societal norm that is shaped collectively. Any change in its definition and enforcement was and should be the result of negotiations with all social actors concerned. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://www.bmj.com/company/products-services/rights-and-licensing/

  5. Analysis of the ethical aspects of professional confidentiality in dental practice

    Directory of Open Access Journals (Sweden)

    Cléa Adas Saliba Garbin

    2008-02-01

    Full Text Available From the point of view of deontological ethics, privacy is a moral right that patients are entitled to and it is bound to professional confidentiality. Otherwise, the information given by patients to health professionals would not be reliable and a trustable relationship could not be established. The aim of the present study was to assess, by means of questionnaires with open and closed questions, the awareness and attitudes of 100 dentists working in the city of Andradina, São Paulo State, Brazil, with respect to professional confidentiality in dental practice. Most dentists (91.43% reported to have instructed their assistants on professional confidentiality. However, 44.29% of the interviewees showed to act contradictorily as reported talking about the clinical cases of their patients to their friends or spouses. The great majority of professionals (98.57% believed that it is important to have classes on Ethics and Bioethics during graduation and, when asked about their knowledge of the penalties imposed for breach of professional confidentiality, only 48.57% of them declared to be aware of it. Only 28.57% of the interviewees affirmed to have exclusive access to the files; 67.14% reported that that files were also accessed by their secretary; 1.43% answered that their spouses also had access, and 2.86% did not answer. From the results of the present survey, it could be observed that, although dentists affirmed to be aware of professional confidentiality, their attitudes did not adhere to ethical and legal requirements. This stand of health professionals has contributed to violate professional ethics and the law itself, bringing problems both to the professional and to the patient.

  6. Sexual Fears and Avoidant Sexual Behavior in Medical Students.

    Science.gov (United States)

    Popov, Stefan P; Mateva, Nonka G; Iliev, Yanko T; Dechev, Ivan D; Karalilova, Rositsa V

    2015-01-01

    Sexual fears, sometimes in the form of phobias, lead to aversive or sexually avoidant behavior blocking sexual closeness and resulting in deep personal and interpersonal distress. To determine the types of sexual fears and aversive behavior in young people of reproductive age (students) and their degree of markedness as to encourage a further implementation of prevention programs and interventions. The study included 116 fifth-year medical students in Plovdiv Medical University. Of these, 55 men and 61 women were assessed with the Sexual Aversion Scale, a 30-item self-rating questionnaire. The Diagnostic and Statistical Manual of Mental Disorders criteria of sexual aversion were used. The statistical analyses used were descriptive statistics and independent samples t-test. Sexual fears and aversive or blocking behavior are mild to moderate, mean score of 1.54 ± 0.04, without statistically significant gender differences. Both sexes have established fear-related sexual aversive motives of sexual behavior related to the risk of unwanted pregnancy and HIV infection. Women have significantly higher average scores for the following statements: fear of sexual intercourse (1.61 vs 1.25), avoidance of situations in which they may be involved sexually (1.95 vs 1.51), avoidance of genital sexual contact (1.44 vs 1.16), fear of catching a sexually transmitted disease (2.46 vs 2.09 ), fear of pregnancy (2.61 vs 2.15) and concerns what other people think of them (2.34 vs 1.93 ). Sexual fears and aversive or blocking behavior were mild to moderate. In both sexes similar fears--aversive or blocking patterns of sexual behavior were found, mainly associated with the fear of unwanted pregnancy and the risk of HIV infection, more expressed in women.

  7. Consolidated financial statements for fiscal year 1996

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1997-02-01

    The following overview and accompanying audited financial statements have been prepared for Fiscal Year (FY) 1996 to report the financial position and the results of operations of the Department of Energy. These statements include the consolidated Statement of Financial Position and the consolidated Statement of Operations and Changes in Net Position. The statements have been prepared in accordance with the Office of Management and Budget Bulletin No. 94-01, Form and Content for Agency Financial Statements, and were developed in accordance with the hierarchy of accounting standards described therein. The overview provides a narrative on the Department of Energy`s mission, activities, and accomplishments. Utilizing performance measures as the primary vehicle for communicating Departmental accomplishments and results, this overview discusses the most significant measures while others are discussed in the supplemental information to the financial statements.

  8. Financial Statements: Disclosures and Presentations.

    Science.gov (United States)

    1985-12-01

    may be rendered when the financial statements are p;eaed in full compliance with GAAP , consistently applied. Inadequate disclosures as well as other...a bond payable. A valuation account would be similar to the following: Equipment $18,000,000 Less accumulated depreciation (1o625,000) $16,375,00010...accounting to depreciation accounting.24 The disclosures required are the nature and justification for the change. The justification is necessary to

  9. Integration of Weather Avoidance and Traffic Separation

    Science.gov (United States)

    Consiglio, Maria C.; Chamberlain, James P.; Wilson, Sara R.

    2011-01-01

    This paper describes a dynamic convective weather avoidance concept that compensates for weather motion uncertainties; the integration of this weather avoidance concept into a prototype 4-D trajectory-based Airborne Separation Assurance System (ASAS) application; and test results from a batch (non-piloted) simulation of the integrated application with high traffic densities and a dynamic convective weather model. The weather model can simulate a number of pseudo-random hazardous weather patterns, such as slow- or fast-moving cells and opening or closing weather gaps, and also allows for modeling of onboard weather radar limitations in range and azimuth. The weather avoidance concept employs nested "core" and "avoid" polygons around convective weather cells, and the simulations assess the effectiveness of various avoid polygon sizes in the presence of different weather patterns, using traffic scenarios representing approximately two times the current traffic density in en-route airspace. Results from the simulation experiment show that the weather avoidance concept is effective over a wide range of weather patterns and cell speeds. Avoid polygons that are only 2-3 miles larger than their core polygons are sufficient to account for weather uncertainties in almost all cases, and traffic separation performance does not appear to degrade with the addition of weather polygon avoidance. Additional "lessons learned" from the batch simulation study are discussed in the paper, along with insights for improving the weather avoidance concept. Introduction

  10. Disasters of endoscopic surgery and how to avoid them: error analysis.

    Science.gov (United States)

    Troidl, H

    1999-08-01

    For every innovation there are two sides to consider. For endoscopic surgery the positive side is more comfort for the patient, and the negative side is new complications, even disasters, such as injuries to organs (e.g., the bowel), vessels, and the common bile duct. These disasters are rare and seldom reported in the scientific world, as at conferences, at symposiums, and in publications. Today there are many methods for testing an innovation (controlled clinical trials, consensus conferences, audits, and confidential inquiries). Reporting "complications," however, does not help to avoid them. We need real methods for avoiding negative failures. The failure analysis is the method of choice in industry. If an airplane crashes, error analysis starts immediately. Humans make errors, and making errors means punishment. Failure analysis means rigorously and objectively investigating a clinical situation to find clinical relevant information for avoiding these negative events in the future. Error analysis has four important steps: (1) What was the clinical situation? (2) What has happened? (3) Most important: Why did it happen? (4) How do we avoid the negative event or disaster in the future. Error analysis has decisive advantages. It is easy to perform; it supplies clinically relevant information to help avoid it; and there is no need for money. It can be done everywhere; and the information is available in a short time. The other side of the coin is that error analysis is of course retrospective, it may not be objective, and most important it will probably have legal consequences. To be more effective in medicine and surgery we must handle our errors using a different approach. According to Sir Karl Popper: "The consituation is that we have to learn from our errors. To cover up failure is therefore the biggest intellectual sin.

  11. MEASUREMENT OF APPLICATION OF ISO 27001 OF CUSTOMER CELLULAR CARD CONFIDENTIALITY DATA IN PT. XYZ AREA JAKARTA

    Directory of Open Access Journals (Sweden)

    Krishna Rahadian

    2014-10-01

    Full Text Available The purpose of this study was to evaluate the effects of the process of ISO 27001 with respect to the confidentiality of customer cellular card Jakarta and to improve cellular card customer data confidentiality at PT.XYZ from data leakage of the customer data due to the third party involvement, clean-desk policy, and access right. Recommendation regarding the improvement is provided after reviewing the confidentiality of customer data. The survey in this study is conducted by questionnaire. From the evaluation results of the questionnaire, it is concluded that the larger customer data leaks are mainly caused by the external factors.

  12. Boundaries of confidentiality in nursing care for mother and child in HIV programmes.

    Science.gov (United States)

    Våga, Bodil Bø; Moland, Karen Marie; Blystad, Astrid

    2016-08-01

    Confidentiality lies at the core of medical ethics and is the cornerstone for developing and keeping a trusting relationship between nurses and patients. In the wake of the HIV epidemic, there has been a heightened focus on confidentiality in healthcare contexts. Nurses' follow-up of HIV-positive women and their susceptible HIV-exposed children has proved to be challenging in this regard, but the ethical dilemmas concerning confidentiality that emerge in the process of ensuring HIV-free survival of the third party - the child - have attracted limited attention. The study explores challenges of confidentiality linked to a third party in nurse-patient relationships in a rural Tanzanian HIV/AIDS context. The study was carried out in rural and semi-urban settings of Tanzania where the population is largely agro-pastoral, the formal educational level is low and poverty is rife. The HIV prevalence of 1.5% is low compared to the national prevalence of 5.1%. Data were collected during 9 months of ethnographic fieldwork and consisted of participant observation in clinical settings and during home visits combined with in-depth interviews. The main categories of informants were nurses employed in prevention of mother-to-child transmission of HIV programmes and HIV-positive women enrolled in these programmes. Based on information about the study aims, all informants consented to participate. Ethical approval was granted by ethics review boards in Tanzania and Norway. The material indicates a delicate balance between the nurses' attempt to secure the HIV-free survival of the babies and the mothers' desire to preserve confidentiality. Profound confidentiality-related dilemmas emerged in actual practice, and indications of a lack of thorough consideration of the implication of a patient's restricted disclosure came to light during follow-up of the HIV-positive women and the third party - the child who is at risk of HIV infection through mother's milk. World Health Organization

  13. A Demonstration of Approach and Avoidance Conflicts

    Science.gov (United States)

    Terry, W. Scott

    2010-01-01

    Choosing between 2 unpleasant alternatives (Would you rather be less intelligent or less attractive?) is more difficult than choosing between two desirable options (Would you rather be more intelligent or more attractive?). Here I describe a classroom demonstration of avoidance-avoidance conflicts. Students make a series of approach-approach and…

  14. Effects of IFRS adoption on tax avoidance

    Directory of Open Access Journals (Sweden)

    Renata Nogueira Braga

    Full Text Available ABSTRACT This study investigates the association between mandatory International Financial Reporting Standards (IFRS adoption and corporate tax avoidance. In this study, tax avoidance is defined as a reduction in the effective corporate income tax rate through tax planning activities, whether these are legal, questionable, or even illegal. Three measures of tax avoidance are used and factors at the country and firm level (that have already been associated with tax avoidance in prior research are controlled. Using samples that range from 9,389 to 15,423 publicly-traded companies from 35 countries, covering 1999 to 2014, it is found that IFRS adoption is associated with higher levels of corporate tax avoidance, even when the level of book-tax conformity required in the countries and the volume of accruals are controlled, both of which are considered potential determinants of this relationship. Furthermore, the results suggest that after IFRS adoption, firms in higher book-tax conformity environments engage more in tax avoidance than firms in lower book-tax conformity environments. It is also identified that engagement in tax avoidance after IFRS adoption derives not only from accruals management, but also from practices that do not involve accruals. The main conclusion is that companies engage more in tax avoidance after mandatory IFRS adoption.

  15. Computer Security: improve software, avoid blunder

    CERN Multimedia

    Computer Security Team

    2014-01-01

    Recently, a severe vulnerability has been made public about how Apple devices are wrongly handling encryption. This vulnerability rendered SSL/TLS protection useless, and permitted attackers checking out a wireless network to capture or modify data in encrypted sessions.   In other words, all confidential data like passwords, banking information, etc. could have been siphoned off by a targeted attack. While Apple has been quick in providing adequate security patches for iOS devices and Macs, it is an excellent example of how small mistakes can lead to big security holes. Here is the corresponding code from Apple’s Open Source repository. Can you spot the issue? 1 static OSStatus 2 SSLVerifySignedServerKeyExchange(SSLContext *ctx, bool isRsa, SSLBuffer signedParams, uint8_t *signature, UInt16 signatureLen) 3 { 4              OSStatus &nb...

  16. Higher threat avoidance costs reduce avoidance behaviour which in turn promotes fear extinction in humans.

    Science.gov (United States)

    Rattel, Julina A; Miedl, Stephan F; Blechert, Jens; Wilhelm, Frank H

    2017-09-01

    Theoretical models specifying the underlying mechanisms of the development and maintenance of anxiety and related disorders state that fear responses acquired through classical Pavlovian conditioning are maintained by repeated avoidance behaviour; thus, it is assumed that avoidance prevents fear extinction. The present study investigated behavioural avoidance decisions as a function of avoidance costs in a naturalistic fear conditioning paradigm. Ecologically valid avoidance costs - manipulated between participant groups - were represented via time-delays during a detour in a gamified computer task. After differential acquisitions of shock-expectancy to a predictive conditioned stimulus (CS+), participants underwent extinction where they could either take a risky shortcut, while anticipating shock signaled by the CS+, or choose a costly avoidance option (lengthy detour); thus, they were faced with an approach-avoidance conflict. Groups with higher avoidance costs (longer detours) showed lower proportions of avoiders. Avoiders gave heightened shock-expectancy ratings post-extinction, demonstrating 'protecting from extinction', i.e. failure to extinguish. Moreover, there was an indirect effect of avoidance costs on protection from extinction through avoidance behaviour. No moderating role of trait-anxiety was found. Theoretical implications of avoidance behaviour are discussed, considering the involvement of instrumental learning in the maintenance of fear responses. Copyright © 2016 Elsevier Ltd. All rights reserved.

  17. FEATURES OF CONSOLIDATED FINANCIAL STATEMENTS: FOREIGN EXPERIENCE

    Directory of Open Access Journals (Sweden)

    S. V. KUCHER

    2016-12-01

    Full Text Available The article researches the features of preparation and submission of the consolidated financial statements of the world countries of different systems of accounting standardization in order to identify the areas of accounting improvement for the process of consolidation of financial reporting indicators. The main problems of consolidated financial statements preparation by business entities in Ukraine are determined. The author determines the theoretical and practical problems of consolidation of financial statements of organizational and methodical character. The comparative analysis of the features of standardization process of financial statements consolidation in the world countries is carried out. The main differences in the requirements for the formation of consolidated financial statements indicators of such countries as the French Republic, the Federal Republic of Germany, the Republic of Belarus and the People’s Republic of China are outlined. The main directions of scientific researches on the improvement of accounting and analytical support for the preparation of consolidated financial statements are formed.

  18. Controls Mitigating the Risk of Confidential Information Disclosure by Facebook: Essential Concern in Auditing Information Security

    Directory of Open Access Journals (Sweden)

    Ivan Ognyanov Kuyumdzhiev

    2014-08-01

    Full Text Available Facebook allows people to easily share information about themselves which in some cases could be classified as confidential or sensitive in the organisation they’re working for. In this paper we discuss the type of data stored by Facebook and the scope of the terms “confidential” and “sensitive data”. The intersection of these areas shows that there is high possibility for confidential data disclosure in organisations with none or ineffective security policy. This paper proposes a strategy for managing the risks of information leakage. We define five levels of controls against posting non-public data on Facebook - security policy, applications installed on employees’ workstations, specific router software or firmware, software in the cloud, Facebook itself. Advantages and disadvantages of every level are evaluated. As a result we propose developing of new control integrated in the social media.

  19. To Tell, or Not to Tell; Confidentiality in an Iranian HIV Positive Patient: A Viewpoint

    Directory of Open Access Journals (Sweden)

    Mahshad Noroozi

    2017-08-01

    Full Text Available Confidentiality is a basic concept in medical ethics and protecting confidentiality is considered as physicians’ duty. In some occasions, this protection is in conflict with the right of the patient’s sexual partner, who should be informed about the possibility of being infected. The sexual partner being pregnant, the situation is going to be more complicated. In this paper, we present a case discussion with special ethical, legal, social, cultural, and religious aspects. According to this informing sexual partner with the patient’s assent, opt-out Human immunodeficiency virus (HIV screening in pregnant women and enhancing psychosocial and family support are highly recommended. Strategic changes in health system policies and regulations seem to be necessary as well.

  20. Biobanks in South Africa: A global perspective on privacy and confidentiality

    Directory of Open Access Journals (Sweden)

    Riaan Rheeder

    2017-05-01

    Full Text Available The Universal Declaration of Bioethics and Human Rights (UDBHR of the United Nations Educational, Scientific and Cultural Organization (UNESCO was adopted unanimously in 2005 by the world community as a universal guideline, according to which members of the global community were accountable to each other. Research results from UNESCO show that the UDBHR has had little or no impact in South Africa (SA. The primary objective of this article is to promote awareness of the UDBHR in SA and Africa by focusing on Article 9 of the Declaration, which accepts the right to privacy and confidentiality. For this objective to be relevant in the SA context, depends on whether the guidelines of the National Department of Health’s Ethics in Health Research: Principles, Processes and Structures of 2015 acknowledge biobanks of the universally accepted ethical guidelines on privacy and confidentiality of autonomous persons and whether these guidelines are broadly in accordance with global bioethical guidelines.

  1. Changes in public attitudes towards confidential adolescent sexual and reproductive health services in Lithuania after the introduction of new legislation

    DEFF Research Database (Denmark)

    Jaruseviciene, Lina; Zaborskis, Apolinaras; Sauliune, Skirmante

    2015-01-01

    was employed to estimate absolute differences in prevalence of belief in whether or not adolescents would find confidentiality important when consulting a physician on SRH issues. A log-binomial regression model was fitted to estimate the relative changes (prevalence ratio) of the independent variables......BACKGROUND: In Lithuania, the right to confidentiality in healthcare for adolescents over the age of 16 was guaranteed in 2010 through the adoption of new legislation. This study sets out to explore changes in Lithuanian residents' attitudes towards confidentiality protection in adolescent sexual....... RESULTS: The total number of respondents was 1054 (response rate 83%) in 2005 and 1002 (response rate 80%) in 2012. The proportion of respondents who reported a belief that adolescents would find confidentiality important when seeing a physician for SRH issues increased significantly from 62% in 2005...

  2. Position Statement on Active Outdoor Play

    OpenAIRE

    Tremblay, Mark S.; Gray, Casey; Babcock, Shawna; Barnes, Joel; Costas Bradstreet, Christa; Carr, Dawn; Chabot, Guylaine; Choquette, Louise; Chorney, David; Collyer, Cam; Herrington, Susan; Janson, Katherine; Janssen, Ian; Larouche, Richard; Pickett, William

    2015-01-01

    A diverse, cross-sectorial group of partners, stakeholders and researchers, collaborated to develop an evidence-informed Position Statement on active outdoor play for children aged 3–12 years. The Position Statement was created in response to practitioner, academic, legal, insurance and public debate, dialogue and disagreement on the relative benefits and harms of active (including risky) outdoor play. The Position Statement development process was informed by two systematic reviews, a critic...

  3. Genesis and Development of Consolidated Financial Statements

    OpenAIRE

    Kostyantyn Bezverkhiy

    2015-01-01

    In the context of economy globalization it is the mission of consolidated financial statements to meet demands of users for financial information about activities of a company group as one company. The article is devoted to study of genesis and development of consolidated financial statements of companies. Historical prerequisites of genesis of consolidated financial statements are shown as well as factors which conduced to their spreading. The approaches are elucidated to preparation of cons...

  4. Financial Statement Fraud Detection using Text Mining

    OpenAIRE

    Rajan Gupta; Nasib Singh Gill

    2013-01-01

    Data mining techniques have been used enormously by the researchers’ community in detecting financial statement fraud. Most of the research in this direction has used the numbers (quantitative information) i.e. financial ratios present in the financial statements for detecting fraud. There is very little or no research on the analysis of text such as auditor’s comments or notes present in published reports. In this study we propose a text mining approach for detecting financial statement frau...

  5. SOME DISCLOSURE ASPECTS REGARDING CONSOLIDATED FINANCIAL STATEMENTS

    OpenAIRE

    Cirstea Andreea; Baltariu Carmen-Alexandra

    2013-01-01

    The purpose of this article is to analyze the current state of consolidated reporting practice harmonization concerning the choice of presenting the income statement, the changes in equity, the methods used for presenting the cash flow statement, the extant methods for evaluating and reporting goodwill, the extant methods in which jointly controlled entities are accounted in the consolidated financial statements, or the choice for recognizing investments in subsidiaries, jointly controlled en...

  6. Saskatchewan Energy Holdings Ltd. consolidated financial statements

    Energy Technology Data Exchange (ETDEWEB)

    1991-01-01

    The consolidated financial statements of Saskatchewan Energy Holdings Ltd. (formerly Saskatchewan Energy Corporation) as of December 31, 1990, and the consolidated statements of earnings and retained earnings and changes in cash position for the year are presented. Data include an inventory of supplies, natural gas in storage, property, plant and equipment. Financial statements are also presented for the year ending December 31, 1989, with comparative figures for the seven months ending December 31, 1988.

  7. Control of Bank Consolidated Financial Statements Quality

    OpenAIRE

    Margarita S. Ambarchyan

    2013-01-01

    The author presents the multiple linear regression model of bank consolidated financial statements quality. The article considers six characteristics that can be used to estimate the level of bank consolidated financial statements quality. The multiple linear regression model was developed, using the results of point-based system of consolidated financial statements of thirty European bank and financial groups on the basis of the developed characteristics. The author offers to use the charact...

  8. Saskatchewan Energy Holdings Ltd. consolidated financial statements

    International Nuclear Information System (INIS)

    1991-01-01

    The consolidated financial statements of Saskatchewan Energy Holdings Ltd. (formerly Saskatchewan Energy Corporation) as of December 31, 1990, and the consolidated statements of earnings and retained earnings and changes in cash position for the year are presented. Data include an inventory of supplies, natural gas in storage, property, plant and equipment. Financial statements are also presented for the year ending December 31, 1989, with comparative figures for the seven months ending December 31, 1988

  9. 10 CFR Appendix A to Subpart A of... - Format for Presentation of Material in Environmental Impact Statements

    Science.gov (United States)

    2010-01-01

    ... discussed. In the case of nuclear power plant construction or siting, consideration will be given to the.... Affected environment. The environmental impact statement will succinctly describe the environment to be... decisionmaking. The discussion will include any adverse environmental effects which cannot be avoided should the...

  10. Safeguarding critical e-documents implementing a program for securing confidential information assets

    CERN Document Server

    Smallwood, Robert F

    2012-01-01

    Practical, step-by-step guidance for corporations, universities and government agencies to protect and secure confidential documents and business records Managers and public officials are looking for technology and information governance solutions to "information leakage" in an understandable, concise format. Safeguarding Critical E-Documents provides a road map for corporations, governments, financial services firms, hospitals, law firms, universities and other organizations to safeguard their internal electronic documents and private communications.Provides practical, step-by-step guidance o

  11. Privacy and confidentiality measures in genetic testing and counselling: arguing on genetic exceptionalism again?

    Science.gov (United States)

    Witt, Magdalena M; Witt, Michał P

    2016-11-01

    Medical confidentiality in clinical genetics poses an important question about its scope, which would be in line with professional ethics and simple honesty. It is already known that the maintenance of absolute anonymity, bearing in mind the current progress of genetic techniques, is virtually impossible. On the other hand, our insight into the information contained in the human genome is increasing. This mini-review presents the authors' standpoint regarding this complex and difficult issue.

  12. Spatial confidentiality and GIS: re-engineering mortality locations from published maps about Hurricane Katrina

    Directory of Open Access Journals (Sweden)

    Leitner Michael

    2006-10-01

    Full Text Available Abstract Background Geographic Information Systems (GIS can provide valuable insight into patterns of human activity. Online spatial display applications, such as Google Earth, can democratise this information by disseminating it to the general public. Although this is a generally positive advance for society, there is a legitimate concern involving the disclosure of confidential information through spatial display. Although guidelines exist for aggregated data, little has been written concerning the display of point level information. The concern is that a map containing points representing cases of cancer or an infectious disease, could be re-engineered back to identify an actual residence. This risk is investigated using point mortality locations from Hurricane Katrina re-engineered from a map published in the Baton Rouge Advocate newspaper, and a field team validating these residences using search and rescue building markings. Results We show that the residence of an individual, visualized as a generalized point covering approximately one and half city blocks on a map, can be re-engineered back to identify the actual house location, or at least a close neighbour, even if the map contains little spatial reference information. The degree of re-engineering success is also shown to depend on the urban characteristic of the neighborhood. Conclusion The results in this paper suggest a need to re-evaluate current guidelines for the display of point (address level data. Examples of other point maps displaying health data extracted from the academic literature are presented where a similar re-engineering approach might cause concern with respect to violating confidentiality. More research is also needed into the role urban structure plays in the accuracy of re-engineering. We suggest that health and spatial scientists should be proactive and suggest a series of point level spatial confidentiality guidelines before governmental decisions are made

  13. Spatial confidentiality and GIS: re-engineering mortality locations from published maps about Hurricane Katrina.

    Science.gov (United States)

    Curtis, Andrew J; Mills, Jacqueline W; Leitner, Michael

    2006-10-10

    Geographic Information Systems (GIS) can provide valuable insight into patterns of human activity. Online spatial display applications, such as Google Earth, can democratise this information by disseminating it to the general public. Although this is a generally positive advance for society, there is a legitimate concern involving the disclosure of confidential information through spatial display. Although guidelines exist for aggregated data, little has been written concerning the display of point level information. The concern is that a map containing points representing cases of cancer or an infectious disease, could be re-engineered back to identify an actual residence. This risk is investigated using point mortality locations from Hurricane Katrina re-engineered from a map published in the Baton Rouge Advocate newspaper, and a field team validating these residences using search and rescue building markings. We show that the residence of an individual, visualized as a generalized point covering approximately one and half city blocks on a map, can be re-engineered back to identify the actual house location, or at least a close neighbour, even if the map contains little spatial reference information. The degree of re-engineering success is also shown to depend on the urban characteristic of the neighborhood. The results in this paper suggest a need to re-evaluate current guidelines for the display of point (address level) data. Examples of other point maps displaying health data extracted from the academic literature are presented where a similar re-engineering approach might cause concern with respect to violating confidentiality. More research is also needed into the role urban structure plays in the accuracy of re-engineering. We suggest that health and spatial scientists should be proactive and suggest a series of point level spatial confidentiality guidelines before governmental decisions are made which may be reactionary toward the threat of revealing

  14. Confidentiality protections versus collaborative care in the treatment of substance use disorders

    OpenAIRE

    Manuel, Jennifer K; Newville, Howard; Larios, Sandra E; Sorensen, James L

    2013-01-01

    Abstract Practitioners in federally-assisted substance use disorder (SUD) treatment programs are faced with increasingly complex decisions when addressing patient confidentiality issues. Recent policy changes, intended to make treatment more available and accessible, are having an impact on delivery of SUD treatment in the United States. The addition of electronic health records provides opportunity for more rapid and comprehensive communication between patients’ primary and SUD ...

  15. New statement of leave format

    CERN Multimedia

    HR Department

    2009-01-01

    Following the communication of the Standing Concertation Committee published in Weekly Bulletin No. 18-19 of 27 April 2009, the current statement of leave on monthly pay slips has been replaced with the EDH Leave Transactions report that displays the up-to-date situation of individual leave balances at all times. The report is available on EDH. Additionally, the layout of the pay slip has been modernised. The new version of the pay slip will be send out from September 2009 onwards. Finance and Purchasing Department, Personnel Accounting Human Resources Department, Organisation and Procedures General Infrastructure Services Department, Administrative Information Services

  16. Statement of the Pugwash council

    International Nuclear Information System (INIS)

    1997-01-01

    In the fiftieth year since the first and only use of nuclear weapons in war, the evidence of actual progress towards the elimination of such weapons is decidedly mixed. The statement of the Pugwash council involves the following issues: agenda for a nuclear-weapon-free world; reduction of proliferation risks; monitoring, control and reducing arms trade, transfer and production; global governance as a cooperative activity of states and non-governmental organisations to address the questions of global security; security in the Asia-Pacific region; and energy-environment-development interactions

  17. Clinical psychology service users' experiences of confidentiality and informed consent: a qualitative analysis.

    Science.gov (United States)

    Martindale, S J; Chambers, E; Thompson, A R

    2009-12-01

    To explore and describe the experience of clinical psychology service users in relation to the processes associated with confidentiality and the generation of informed consent in individual therapy. A qualitative interview-based study employing interpretative phenomenological analysis was conducted with service users. User researchers were active collaborators in the study. A focus group of four users was convened to explore issues related to confidentiality and consent, which then informed the development of the semi-structured interview schedule. Twelve users of community mental health clinical psychology services were interviewed by user researchers. A user researcher and a clinical psychologist undertook joint analysis of the data. A second clinical psychologist facilitated reflexivity and wider consideration of validity issues. Four main themes were identified from the data: being referred; the participant's feelings, mental health difficulties, and their impact; relationships with workers and carers; and autonomy. The meaningfulness of processes of discussing confidentiality, and generating informed consent, can be improved by psychologists placing a greater emphasis on choice, control, autonomy, individual preferences, and actively involving the user in dialogue on repeated occasions.

  18. Ethical aspects in tissue research: thematic analysis of ethical statements to the research ethics committee

    Science.gov (United States)

    2012-01-01

    Background Many studies have been published about ethics committees and the clarifications requested about the submitted applications. In Finland, ethics committees require a separate statement on ethical aspects of the research in applications to the ethics committee. However, little is known about how researchers consider the ethical aspects of their own studies. Methods The data were collected from all the applications received by the official regional ethics committee in the Hospital District of Northern Savo during 2004–2009 (n = 688). These included a total of 56 studies involving research on tissue other than blood. The statements by the researchers about the ethics about their own research in these applications were analyzed by thematic content analysis under the following themes: recruitment, informed consent, risks and benefits, confidentiality and societal meaning. Results The researchers tended to describe recruitment and informed consent process very briefly. Usually these descriptions simply stated who the recruiter was and that written consent would be required. There was little information provided on the recruitment situation and on how the study recruiters would be informed. Although most of the studies were clinical, the possibility was hardly ever discussed that patients could fail to distinguish between care and research. Conclusion The written guidelines, available on the webpages of the ethics committee, do not seem to be enough to help researchers achieve this goal. In addition to detailed guidelines for researchers, investigators need to be taught to appreciate the ethical aspects in their own studies. PMID:22873761

  19. Ecology: avoidance of disease by social lobsters.

    Science.gov (United States)

    Behringer, Donald C; Butler, Mark J; Shields, Jeffrey D

    2006-05-25

    Transmissible pathogens are the bane of social animals, so they have evolved behaviours to decrease the probability of infection. There is no record, however, of social animals avoiding diseased individuals of their own species in the wild. Here we show how healthy, normally gregarious Caribbean spiny lobsters (Panulirus argus) avoid conspecifics that are infected with a lethal virus. Early detection and avoidance of infected, though not yet infectious, individuals by healthy lobsters confers a selective advantage and highlights the importance of host behaviour in disease transmission among natural populations.

  20. A Policy-Based Framework for Preserving Confidentiality in BYOD Environments: A Review of Information Security Perspectives

    Directory of Open Access Journals (Sweden)

    Chalee Vorakulpipat

    2017-01-01

    Full Text Available Today, many organizations allow their employees to bring their own smartphones or tablets to work and to access the corporate network, which is known as a bring your own device (BYOD. However, many such companies overlook potential security risks concerning privacy and confidentiality. This paper provides a review of existing literature concerning the preservation of privacy and confidentiality, with a focus on recent trends in the use of BYOD. This review spans a large spectrum of information security research, ranging from management (risk and policy to technical aspects of privacy and confidentiality in BYOD. Furthermore, this study proposes a policy-based framework for preserving data confidentiality in BYOD. This framework considers a number of aspects of information security and corresponding techniques, such as policy, location privacy, centralized control, cryptography, and operating system level security, which have been omitted in previous studies. The main contribution is to investigate recent trends concerning the preservation of confidentiality in BYOD from the perspective of information security and to analyze the critical and comprehensive factors needed to strengthen data privacy in BYOD. Finally, this paper provides a foundation for developing the concept of preserving confidentiality in BYOD and describes the key technical and organizational challenges faced by BYOD-friendly organizations.

  1. Ethics in practice: managed care and the changing health care environment: medicine as a profession managed care ethics working group statement.

    Science.gov (United States)

    Povar, Gail J; Blumen, Helen; Daniel, John; Daub, Suzanne; Evans, Lois; Holm, Richard P; Levkovich, Natalie; McCarter, Alice O; Sabin, James; Snyder, Lois; Sulmasy, Daniel; Vaughan, Peter; Wellikson, Laurence D; Campbell, Amy

    2004-07-20

    Cost pressures and changes in the health care environment pose ethical challenges and hard choices for patients, physicians, policymakers, and society. In 2000 and 2001, the American College of Physicians, with the Harvard Pilgrim Health Care Ethics Program, convened a working group of stakeholders--patients, physicians, and managed care representatives, along with medical ethicists--to develop a statement of ethics for managed care. The group explored the impact of a changing health care environment on patient-physician relationships and how to best apply the principles of professionalism in this environment. The statement that emerged offers guidance on preserving the patient-clinician relationship, patient rights and responsibilities, confidentiality and privacy, resource allocation and stewardship, the obligation of health plans to foster an ethical environment for the delivery of care, and the clinician's responsibility to individual patients, the community, and the public health, among other issues.

  2. Objectives of Financial Statements. Report of the Study Group on the Objectives of Financial Statements.

    Science.gov (United States)

    American Inst. of Certified Public Accountants, New York, NY.

    This report discusses the objectives of financial statements. Emphasis is placed on the function of objectives; users, their goals, and their information needs; the primary enterprise goal and earning power; accountability and financial statements; financial statements--reporting on the goal attainment of business enterprises; financial…

  3. 78 FR 50118 - Policy Statement on Adequacy and Compatibility of Agreement State Programs; Statement of...

    Science.gov (United States)

    2013-08-16

    ... NUCLEAR REGULATORY COMMISSION [NRC-2013-0081] Policy Statement on Adequacy and Compatibility of Agreement State Programs; Statement of Principles and Policy for the Agreement State Program AGENCY: Nuclear Regulatory Commission. ACTION: Policy statements; extension of comment period. SUMMARY: The U.S. Nuclear...

  4. Toddlers at the Table: Avoiding Power Struggles

    Science.gov (United States)

    ... Search English Español Toddlers at the Table: Avoiding Power Struggles KidsHealth / For Parents / Toddlers at the Table: ... common concerns into opportunities to teach healthy eating habits. Most Toddlers Are Picky Eaters Many toddlers express ...

  5. How to avoid overheating during exercise

    Science.gov (United States)

    ... patientinstructions/000865.htm How to avoid overheating during exercise To use the sharing features on this page, ... condition can get heat illness. Stay Cool During Exercise Try these tips to help prevent heat-related ...

  6. Food Waste Avoidance Actions in Food Retailing

    DEFF Research Database (Denmark)

    Kulikovskaja, Viktorija; Aschemann-Witzel, Jessica

    2017-01-01

    Food waste occurs throughout the entire food supply chain, from production to consumption of food in households. Retailers are in a unique position to contribute to food waste avoidance, not only by minimizing the amount of waste in their distribution channels but also by influencing consumer...... attitudes and behaviors. This explorative study aims to identify which food waste avoidance actions are conducted by retailers in Denmark, to which extent, and how they vary across food categories and supermarket chain. Based on an analysis of secondary and empirical data collected via observations...... at retail stores, the authors identify 22 food waste avoidance actions in Danish retail. The results provide new insights into food waste avoidance in retail. Based on the findings, suggestions for further research directions are developed that should serve to identify the most efficient customer targeted...

  7. Directional Collision Avoidance in Ad Hoc Networks

    National Research Council Canada - National Science Library

    Wang, Yu; Garcia-Luna-Aceves, J. J

    2004-01-01

    This paper analyzes the performance of directional collision avoidance schemes, in which antenna systems are used to direct the transmission and reception of control and data packets in channel access...

  8. Foods to Avoid or Limit during Pregnancy

    Science.gov (United States)

    ... Global Map Premature Birth Report Cards Careers Archives Pregnancy Before or between pregnancies Nutrition, weight & fitness Prenatal ... during pregnancy Foods to avoid or limit during pregnancy E-mail to a friend Please fill in ...

  9. The challenges for scientists in avoiding plagiarism.

    Science.gov (United States)

    Fisher, E R; Partin, K M

    2014-01-01

    Although it might seem to be a simple task for scientists to avoid plagiarism and thereby an allegation of research misconduct, assessment of trainees in the Responsible Conduct of Research and recent findings from the National Science Foundation Office of Inspector General regarding plagiarism suggests otherwise. Our experiences at a land-grant academic institution in assisting researchers in avoiding plagiarism are described. We provide evidence from a university-wide multi-disciplinary course that understanding how to avoid plagiarism in scientific writing is more difficult than it might appear, and that a failure to learn the rules of appropriate citation may cause dire consequences. We suggest that new strategies to provide training in avoiding plagiarism are required.

  10. Dual Eligibles and Potentially Avoidable Hospitalizations

    Data.gov (United States)

    U.S. Department of Health & Human Services — About 25 percent of the hospitalizations for dual eligible beneficiaries in 2005 were potentially avoidable. Medicare and Medicaid spending for those potentially...

  11. Avoiding Anemia: Boost Your Red Blood Cells

    Science.gov (United States)

    ... Issues Subscribe January 2014 Print this issue Avoiding Anemia Boost Your Red Blood Cells En español Send ... Disease When Blood Cells Bend Wise Choices Preventing Anemia To prevent or treat iron-deficiency anemia: Eat ...

  12. ADVERTISING AVOIDANCE PADA IKLAN DI MEDIA TELEVISI

    OpenAIRE

    Indah Dwi Pratama; Ujang Sumarwan; Hari Wijayanto

    2016-01-01

    One factor that can interfere with the absorption rate of viewers on television advertisement is advertising avoidance which shows the difference between the number of viewers who watch advertisement programs and the number of viewers who watch television programs. The factors that affect advertising avoidance include the demography of the viewers (gender, age, area of residence, and social economic status, or SES), advertising attributes (the television stations, order of ads, genre of the p...

  13. Banking deregulation and corporate tax avoidance

    Directory of Open Access Journals (Sweden)

    Bill B. Francis

    2017-06-01

    Full Text Available We investigate whether tax avoidance substitutes for external financing. We exploit interstate banking deregulation as a quasi-external shock to examine whether firms engage in less tax avoidance after banking deregulation, because of cheaper and easier access to credit from banks. We find no empirical evidence to support this substitutive relation, even for firms with higher financial constraints or firms with higher external financing dependence.

  14. Sinkhole Avoidance Routing in Wireless Sensor Networks

    Science.gov (United States)

    2011-05-09

    COVERED (From- To) 09-05-2011 4. TITLE AND SUBTITLE 5a. CONTRACT NUMBER Sinkhole Avoidance Routing in Wireless Sensor Networks 5b . GRANT NUMBER . 5c...reliability of wireless sensor networks. 15. SUBJECT TERMS wireless sensor networks, sinkhole attack, routing protocol 16. SECURITY CLASSIFICATION...Include area code) Standard Form 298 (Rev. 8/98) Prescribed by ANSI Std . Z39.18 1 Sinkhole Avoidance Routing in Wireless Sensor Networks MIDN 1/C

  15. Pathological demand avoidance: Exploring the behavioural profile.

    OpenAIRE

    O Nions, E.; Viding, E.; Greven, C. U.; Ronald, A.; Happé, F.

    2014-01-01

    'Pathological Demand Avoidance' is a term increasingly used by practitioners in the United Kingdom. It was coined to describe a profile of obsessive resistance to everyday demands and requests, with a tendency to resort to 'socially manipulative' behaviour, including outrageous or embarrassing acts. Pathological demand avoidance is thought to share aspects of social impairment with autism spectrum disorders, but autism spectrum disorder-appropriate strategies, such as routine and repetition, ...

  16. 29 CFR 99.310 - Financial statements.

    Science.gov (United States)

    2010-07-01

    ... 29 Labor 1 2010-07-01 2010-07-01 true Financial statements. 99.310 Section 99.310 Labor Office of the Secretary of Labor AUDITS OF STATES, LOCAL GOVERNMENTS, AND NON-PROFIT ORGANIZATIONS Auditees § 99... have separate audits in accordance with § 99.500(a) and prepare separate financial statements. (b...

  17. Position Statement on Active Outdoor Play

    Science.gov (United States)

    Tremblay, Mark S.; Gray, Casey; Babcock, Shawna; Barnes, Joel; Costas Bradstreet, Christa; Carr, Dawn; Chabot, Guylaine; Choquette, Louise; Chorney, David; Collyer, Cam; Herrington, Susan; Janson, Katherine; Janssen, Ian; Larouche, Richard; Pickett, William; Power, Marlene; Sandseter, Ellen Beate Hansen; Simon, Brenda; Brussoni, Mariana

    2015-01-01

    A diverse, cross-sectorial group of partners, stakeholders and researchers, collaborated to develop an evidence-informed Position Statement on active outdoor play for children aged 3–12 years. The Position Statement was created in response to practitioner, academic, legal, insurance and public debate, dialogue and disagreement on the relative benefits and harms of active (including risky) outdoor play. The Position Statement development process was informed by two systematic reviews, a critical appraisal of the current literature and existing position statements, engagement of research experts (N = 9) and cross-sectorial individuals/organizations (N = 17), and an extensive stakeholder consultation process (N = 1908). More than 95% of the stakeholders consulted strongly agreed or somewhat agreed with the Position Statement; 14/17 participating individuals/organizations endorsed it; and over 1000 additional individuals and organizations requested their name be listed as a supporter. The final Position Statement on Active Outdoor Play states: “Access to active play in nature and outdoors—with its risks— is essential for healthy child development. We recommend increasing children’s opportunities for self-directed play outdoors in all settings—at home, at school, in child care, the community and nature.” The full Position Statement provides context for the statement, evidence supporting it, and a series of recommendations to increase active outdoor play opportunities to promote healthy child development. PMID:26062040

  18. Position Statement on Active Outdoor Play.

    Science.gov (United States)

    Tremblay, Mark S; Gray, Casey; Babcock, Shawna; Barnes, Joel; Bradstreet, Christa Costas; Carr, Dawn; Chabot, Guylaine; Choquette, Louise; Chorney, David; Collyer, Cam; Herrington, Susan; Janson, Katherine; Janssen, Ian; Larouche, Richard; Pickett, William; Power, Marlene; Sandseter, Ellen Beate Hansen; Simon, Brenda; Brussoni, Mariana

    2015-06-08

    A diverse, cross-sectorial group of partners, stakeholders and researchers, collaborated to develop an evidence-informed Position Statement on active outdoor play for children aged 3-12 years. The Position Statement was created in response to practitioner, academic, legal, insurance and public debate, dialogue and disagreement on the relative benefits and harms of active (including risky) outdoor play. The Position Statement development process was informed by two systematic reviews, a critical appraisal of the current literature and existing position statements, engagement of research experts (N=9) and cross-sectorial individuals/organizations (N=17), and an extensive stakeholder consultation process (N=1908). More than 95% of the stakeholders consulted strongly agreed or somewhat agreed with the Position Statement; 14/17 participating individuals/organizations endorsed it; and over 1000 additional individuals and organizations requested their name be listed as a supporter. The final Position Statement on Active Outdoor Play states: "Access to active play in nature and outdoors--with its risks--is essential for healthy child development. We recommend increasing children's opportunities for self-directed play outdoors in all settings--at home, at school, in child care, the community and nature." The full Position Statement provides context for the statement, evidence supporting it, and a series of recommendations to increase active outdoor play opportunities to promote healthy child development.

  19. Position Statement on Active Outdoor Play

    Directory of Open Access Journals (Sweden)

    Mark S. Tremblay

    2015-06-01

    Full Text Available A diverse, cross-sectorial group of partners, stakeholders and researchers, collaborated to develop an evidence-informed Position Statement on active outdoor play for children aged 3–12 years. The Position Statement was created in response to practitioner, academic, legal, insurance and public debate, dialogue and disagreement on the relative benefits and harms of active (including risky outdoor play. The Position Statement development process was informed by two systematic reviews, a critical appraisal of the current literature and existing position statements, engagement of research experts (N = 9 and cross-sectorial individuals/organizations (N = 17, and an extensive stakeholder consultation process (N = 1908. More than 95% of the stakeholders consulted strongly agreed or somewhat agreed with the Position Statement; 14/17 participating individuals/organizations endorsed it; and over 1000 additional individuals and organizations requested their name be listed as a supporter. The final Position Statement on Active Outdoor Play states: “Access to active play in nature and outdoors—with its risks— is essential for healthy child development. We recommend increasing children’s opportunities for self-directed play outdoors in all settings—at home, at school, in child care, the community and nature.” The full Position Statement provides context for the statement, evidence supporting it, and a series of recommendations to increase active outdoor play opportunities to promote healthy child development.

  20. 29 CFR 570.101 - Introductory statement.

    Science.gov (United States)

    2010-07-01

    ... Regulations Relating to Labor (Continued) WAGE AND HOUR DIVISION, DEPARTMENT OF LABOR REGULATIONS CHILD LABOR REGULATIONS, ORDERS AND STATEMENTS OF INTERPRETATION General Statements of Interpretation of the Child Labor...) This subpart discusses the meaning and scope of the child labor provisions contained in the Fair Labor...

  1. 27 CFR 7.54 - Prohibited statements.

    Science.gov (United States)

    2010-04-01

    ... statement of alcoholic content permitted under § 7.71 may be depicted in any advertising media. The... statement of alcoholic content permitted under § 7.71 may be displayed in any advertising media. (d) Class..., DEPARTMENT OF THE TREASURY LIQUORS LABELING AND ADVERTISING OF MALT BEVERAGES Advertising of Malt Beverages...

  2. 7 CFR 4279.137 - Financial statements.

    Science.gov (United States)

    2010-01-01

    ... accordance with Generally Accepted Accounting Principles will be required. (b) If specific circumstances... 7 Agriculture 15 2010-01-01 2010-01-01 false Financial statements. 4279.137 Section 4279.137... § 4279.137 Financial statements. (a) The lender will determine the type and frequency of submission of...

  3. 76 FR 21345 - Environmental Impacts Statements;

    Science.gov (United States)

    2011-04-15

    ... ENVIRONMENTAL PROTECTION AGENCY [ER-FRL-8996-4] Environmental Impacts Statements; Notice of Availability Responsible Agency: Office of Federal Activities, General Information (202) 564-1399 or http://www.epa.gov/compliance/nepa/ Weekly receipt of Environmental Impact Statements Filed 04/04/2011 Through 04...

  4. 75 FR 8988 - Environmental Impact Statements; Availability

    Science.gov (United States)

    2010-02-26

    ... DEPARTMENT OF THE INTERIOR Environmental Impact Statements; Availability AGENCY: National Park Service. ACTION: Notice of availability for the Record of Decision on the Final Environmental Impact...) for the final Environmental Impact Statement (EIS) for the disposition of the Bureau of Mines property...

  5. 78 FR 48672 - Environmental Impacts Statements;

    Science.gov (United States)

    2013-08-09

    ... ENVIRONMENTAL PROTECTION AGENCY [ER-FRL-9010-5] Environmental Impacts Statements; Notice of Availability Responsible Agency: Office of Federal Activities, General Information (202) 564-7146 or http://www.epa.gov/compliance/nepa/ . Weekly receipt of Environmental Impact Statements Filed 07/29/2013 Through...

  6. 12 CFR 226.7 - Periodic statement.

    Science.gov (United States)

    2010-01-01

    ... consumer with a periodic statement that discloses the following items, to the extent applicable: (a... convenience of the user, the revised text is set forth as follows: § 226.7 Periodic statement. (a) Rules... consumers may obtain from the creditor more information about the balance computation method and how...

  7. Toward a Statement of Educational Philosophy.

    Science.gov (United States)

    Rasi, Humberto M.

    2001-01-01

    Describes a 2001 conference by the Education Department of the General Conference of Seventh-day Adventists which involved presentations of papers and focus groups and which convened participants to discuss and approve an updated and expanded Statement of Adventist Philosophy of Education. The statement is included in this theme issue. (SM)

  8. 78 FR 59414 - Environmental Impact Statement; King County, Washington

    Science.gov (United States)

    2013-09-26

    ... DEPARTMENT OF TRANSPORTATION Federal Highway Administration Environmental Impact Statement; King... prepare an environmental impact statement. SUMMARY: The Federal Highway Administration is issuing this notice to advise the public that an Environmental Impact Statement (EIS) will be prepared for a proposed...

  9. 77 FR 25782 - Environmental Impact Statement: Madison County, IL

    Science.gov (United States)

    2012-05-01

    ... DEPARTMENT OF TRANSPORTATION Federal Highway Administration Environmental Impact Statement...: The FHWA is issuing this notice of intent to advise the public that an Environmental Impact Statement... the Illinois Department of Transportation (IDOT) will prepare an Environmental Impact Statement (EIS...

  10. Resonating Statements: Discursive acts in IT projects

    DEFF Research Database (Denmark)

    Hjelholt, Morten; Jensen, Tina Blegind

    2015-01-01

    IT projects are often complex arrangements of technological components, social actions, and organizational transformation that are difficult to manage in practice. This paper takes an analytical discourse perspective to explore the process of legitimizing IT projects. We introduce the concept...... of resonating statements to highlight how central actors navigate in various discourses over time. Particularly, the statements and actions of an IT project manager are portrayed to show how individuals can legitimize actions by connecting statements to historically produced discourses. The case study...... of an IT project in a Danish local government spans a two-year time period and demonstrates a double-loop legitimization process. First, resonating statements are produced to localize a national IT initiative to support the specificity of a local government discourse. Second, the resonating statements are used...

  11. Control of Bank Consolidated Financial Statements Quality

    Directory of Open Access Journals (Sweden)

    Margarita S. Ambarchyan

    2013-01-01

    Full Text Available The author presents the multiple linear regression model of bank consolidated financial statements quality. The article considers six characteristics that can be used to estimate the level of bank consolidated financial statements quality. The multiple linear regression model was developed, using the results of point-based system of consolidated financial statements of thirty European bank and financial groups on the basis of the developed characteristics. The author offers to use the characteristic significance factor in the process of consolidated financial statements appraisal by points. The constructed regression model is checked on accuracy and statistical significance. The model can be used by internal auditors and financial analytics as an instrument for bank and non-bank consolidated financial statements quality control

  12. WA10 Working in partnership with people with learning disabilities: academics and people with learning disabilities working together to disseminate the findings of a confidential inquiry into deaths of people with learning disabilities through film.

    Science.gov (United States)

    Russ, Lesley

    2015-04-01

    In England, between 2010-2013, a Confidential Inquiry into premature Deaths of People with Learning Disabilities was commissioned by the Department of Health. This took place in SW England led by Norah Fry Research Centre at Bristol University. Findings from the investigations into 247 deaths included that men with learning disabilities die, on average 13 years sooner and women, on average 20 years sooner, than the general population. Over 1/3 (37%) were found to be avoidable, being amenable to good quality healthcare. A number of key recommendations were made which required understanding by a range of audiences including people with learning disabilities and their carers. This workshop will demonstrate how academics can work with actors with learning disabilities to disseminate research findings about a sensitive subject in a thought provoking and accessible way. Academics worked with the MISFITs theatre company to make a DVD about the findings and recommendations of the Confidential Inquiry. The DVD presents the findings of the Confidential Inquiry through the stories of John, Bill, Karen and Emily. It powerfully illustrates the importance of diagnosing and treating illness of people with learning disabilities in a timely and appropriate manner and highlights the measures that could be taken to reduce premature deaths in this population. The session provides an example of how the voices of people with learning disabilities can communicate research messages effectively to people with learning disabilities, health and social care practitioners and others who support the learning disability population. © 2015, Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://group.bmj.com/group/rights-licensing/permissions.

  13. ADVERTISING AVOIDANCE PADA IKLAN DI MEDIA TELEVISI

    Directory of Open Access Journals (Sweden)

    Indah Dwi Pratama

    2016-01-01

    Full Text Available One factor that can interfere with the absorption rate of viewers on television advertisement is advertising avoidance which shows the difference between the number of viewers who watch advertisement programs and the number of viewers who watch television programs. The factors that affect advertising avoidance include the demography of the viewers (gender, age, area of residence, and social economic status, or SES, advertising attributes (the television stations, order of ads, genre of the program, and advertising sector, and competition (DayPart. The study attempted to measure the level of advertising avoidance in Indonesia and its relation to various factors that influence it by using the secondary data generated by Nielsen Audience Measurement Indonesia through Television Audience Measurement (TAM. The methods utilized consisted of the t-test independent sample, one way ANOVA, Tukey, Kruskal Wallis, and Dunn Bonferoni. The result showed that the level of advertising avoidance in Indonesia reached by 23%, with relatively similar results to the other studies in various countries. The hypothesis test results also showed a significant relationship between the advertising avoidance and demographic variables, advertising attributes, and competitions affecting this avoidance. On one hand, the findings of the study are expected to be useful for the advertisers to plan their advertisements on television so that they become more effective and efficient. On the other hand, television stations can utilize these findings as a development strategy to expand their audience segmentation and to accommodate the needs of the advertisers more optimally.Keywords: advertising avoidance, television advertisement, TAM, ANOVA, Tukey

  14. IAEA Statement After Iran Meeting

    International Nuclear Information System (INIS)

    2012-01-01

    Full text: Senior International Atomic Energy Agency officials met an Iranian delegation in Vienna today to seek agreement on a structured approach document to resolve outstanding issues relating to Iran's nuclear programme. The following is a statement by IAEA Deputy Director General Herman Nackaerts after the meeting: ''As announced by the Director General earlier this week, we met today to discuss the structured approach paper. The Agency team came to the meeting in a constructive spirit with the desire and intention of finalising the paper. We presented a revised draft which addressed Iran's earlier stated concerns. However, there has been no progress and, indeed, Iran raised issues that we have already discussed and added new ones. This is disappointing. A date for a follow-on meeting has yet to be fixed.'' (IAEA)

  15. ILK statement about ATWS requirements

    International Nuclear Information System (INIS)

    2005-01-01

    A controversial debate is going on in Germany about the management of operating transients in case of the failure, additionally assumed, of the scram system (ATWS=Anticipated Transients without Scram). It was triggered by a recommendation by the German Advisory Committee on Reactor Safeguards (RSK) in a statement of May 3, 2001 according to which the demonstration that ATWS events were under control was to deviate from requirements in the RSK Guidelines for pressurized water reactors of 1981 (last amended in 1996) and not to take credit of the effects of one-off measures initiated actively, especially shutdown of the main coolant pumps. ILK therefore expresses its opinion in this Statement about the criteria to be met in demonstrations that ATWS is under control in pressurized water reactors. Also in boiling water reactors, studies of ATWS transients are part of the licensing procedure. However, the assumptions to be made there in demonstrating effective pressure limitation have been unchanged and uncontested long since. ILK included in its considerations especially also practices in the United States, France and Finland. In doing so, the Committee found the basic approach in dealing with ATWS to be the same in Germany, the United States and in France, namely to show that the consequences remain tolerable without the application of aggravating postulates. ILK feels that the approach so far employed in demonstrating safety in ATWS events results in balanced risk mitigation. The initiating event already has a very low probability of occurrence. Reliable measures are in place to manage it. (orig.)

  16. Environmental impact statements: new legal technique for environmental protection

    Energy Technology Data Exchange (ETDEWEB)

    Baldwin, M F

    1975-02-01

    The National Environmental Policy Act (NEPA) has required Federal agencies to re-examine all their programs affecting the environment, to consider alternative policies, to coordinate their actions with other agencies, and to disclose their environmental analyses to the public. In short, it has attempted to change decision processes markedly, in order to respond to wide-spread public concern about a deteriorating natural and human environment. The mandates of the policy are listed, but knowing that these were not sufficient to change existing agency practices, Congress established what has been called an ''action-forcing mechanism.'' Each federal agency must ''include in every recommendation or report on proposals for legislation and other major federal actions significantly affecting the quality of the human environment, a detailed statement by the responsible official.'' This statement must cover the following five points as specified in Section 102(2)(c): the environmental impact of the proposed action; any adverse environmental effects which cannot be avoided should the proposal be implemented; alternatives to the proposed action; the relationship between local and short-term uses of man's environment and the maintenance and enhancement of long-term productivity, and any irreversible and irretrievable commitments of resources which would be involved in the proposed action should it be implemented. Section 102 has been considered the heart of the National Environmental Policy Act. The specific five-point environmental report--known as an environmental impact statement--is the visible evidence of an agency's compliance with the environmental policy articulated by Congress. (MCW)

  17. Key conclusions from AVOID Work Stream One

    Science.gov (United States)

    Warren, Rachel

    2010-05-01

    AVOID work stream (WS1)one has produced emission scenarios that simulate potential future global emission pathways for greenhouse gases during the 21st century. The study explored the influence of three key features of such pathways: (1) the year in which emissions peak globally, (2) the rate of emission reduction, and (3) the minimum level to which emissions are eventually reduced. It examined the resultant climate change, climate change impacts and economic implications using computer simulations. Avoided impacts, carbon taxes and GDP change increase throughout the 21st century in the models. AVOID-WS1 showed that in the absence of climate policy it is very likely that global mean temperatures would exceed 3 degrees and there are evens chances that the temperature would rise by 4 degrees relative to pre-industrial times. Scenarios that peak emissions in 2016 were more effective at constraining temperatures to below 3 degrees than those that peaked in 2030: one ‘2016' scenario achieved a probability of 45% of avoiding breaching of a 2 degree threshold. Scenarios peaking in 2030 were inconsistent with constraining temperatures to below 2 degrees. Correspondingly, scenarios that peak in 2030 are more effective at avoiding climate impacts than scenarios that peak in 2016, for all sectors that we studied. Hence the date at which emissions peak is more important than the rate of subsequent emissions reduction in determining the avoided impacts. Avoided impacts increase with time, being negligible in the 2030s, significant by the 2050s and large by the 2080s. Finally, the choice of GCM influences the magnitude of the avoided impacts strongly, so that the uncertainties in our estimates of avoided impacts for each scenario are larger than the difference between the scenarios. Our economic analysis is based on models which differ greatly in the assumptions that they make, but generally show that the date at which emissions peak is a stronger driver of induced GDP changes

  18. Alcohol and cancer: a position statement from Cancer Council Australia.

    Science.gov (United States)

    Winstanley, Margaret H; Pratt, Iain S; Chapman, Kathryn; Griffin, Hayley J; Croager, Emma J; Olver, Ian N; Sinclair, Craig; Slevin, Terry J

    2011-05-02

    The Cancer Council Australia (CCA) Alcohol Working Group has prepared a position statement on alcohol use and cancer. The statement has been reviewed by external experts and endorsed by the CCA Board. Alcohol use is a cause of cancer. Any level of alcohol consumption increases the risk of developing an alcohol-related cancer; the level of risk increases in line with the level of consumption. It is estimated that 5070 cases of cancer (or 5% of all cancers) are attributable to long-term chronic use of alcohol each year in Australia. Together, smoking and alcohol have a synergistic effect on cancer risk, meaning the combined effects of use are significantly greater than the sum of individual risks. Alcohol use may contribute to weight (fat) gain, and greater body fatness is a convincing cause of cancers of the oesophagus, pancreas, bowel, endometrium, kidney and breast (in postmenopausal women). The existing evidence does not justify the promotion of alcohol use to prevent coronary heart disease, as the previously reported role of alcohol in reducing heart disease risk in light-to-moderate drinkers appears to have been overestimated. CCA recommends that to reduce their risk of cancer, people limit their consumption of alcohol, or better still avoid alcohol altogether. For individuals who choose to drink alcohol, CCA recommends that they drink only within the National Health and Medical Research Council guidelines for alcohol consumption.

  19. Harm avoidance and disability in old age.

    Science.gov (United States)

    Wilson, Robert S; Buchman, Aron S; Arnold, Steven E; Shah, Raj C; Tang, Yuxiao; Bennett, David A

    2006-01-01

    The relation of personality to disability in old age is not well understood. The authors examined the relation of harm avoidance, a trait indicating a tendency to worry, fear uncertainty, be shy, and tire easily, to disability in a group of 474 older persons without dementia. Participants completed the 35-item Harm Avoidance scale. Disability was assessed with the Rosow-Breslau scale, a self-report measure of physical mobility. Performance-based tests of lower limb functions were also administered from which composite measures of gait, balance, and strength were derived. In a logistic regression model controlled for age, sex, education, and lower limb function, persons with high levels of harm avoidance were nearly three times as likely to report mobility limitations as persons with low levels, and these effects largely reflected fatigability and fear of uncertainty. The association of harm avoidance with disability was not explained or modified by frailty, physical activity, depressive symptoms, neuroticism, extraversion, or cognition. The results suggest that harm avoidance is associated with disability in old age.

  20. Rape avoidance behavior among Slovak women.

    Science.gov (United States)

    Prokop, Pavol

    2013-05-28

    Rape has been a recurrent adaptive problem for many species, including humans. Rape is costly to women in terms of disease transmission, partner abandonment, and unwanted pregnancy (among other costs). Therefore, behavioral strategies which allow women to avoid coercive men may have been favored by selection. In line with this evolutionary reasoning, the current research documented that physically stronger women and those in a committed romantic relationship reported more rape avoidance behavior. In addition, virgin women tended to perform more rape avoidance behavior compared with their non-virgin counterparts. Women with high conception risk perceived themselves as physically stronger, which may protect them against a potential rapist. Fear of unwanted pregnancy from rape decreased as age increased, reflecting higher fertility among younger participants. However, older women reported more rape avoidance behavior, which contradicts evolutionary predictions. The results provide some support for evolutionary hypotheses of rape avoidance behavior which suggest that woman's perception of rape is influenced by parental investment and perceived physical condition.

  1. DNA elasticity: topology of self-avoidance

    International Nuclear Information System (INIS)

    Samuel, Joseph; Sinha, Supurna; Ghosh, Abhijit

    2006-01-01

    We present a theoretical treatment of DNA stretching and twisting experiments, in which we discuss global topological subtleties of self-avoiding ribbons and provide an underlying justification for the worm-like rod chain (WLRC) model proposed by Bouchiat and Mezard. Some theoretical points regarding the WLRC model are clarified: the 'local writhe formula' and the use of an adjustable cut-off parameter to 'regularize' the model. Our treatment brings out the precise relation between the worm-like chain (WLC), the paraxial worm-like chain (PWLC) and the WLRC models. We describe the phenomenon of 'topological untwisting' and the resulting collapse of link sectors in the WLC model and note that this leads to a free energy profile periodic in the applied link. This periodicity disappears when one takes into account the topology of self-avoidance or at large stretch forces (paraxial limit). We note that the difficult non-local notion of self-avoidance can be replaced (in an approximation) by the simpler local notion of 'south avoidance'. This gives an explanation for the efficacy of the approach of Bouchiat and Mezard in explaining the 'hat curves' using the WLRC model, which is a south avoiding model. We propose a new class of experiments to probe the continuous transition between the periodic and aperiodic behaviour of the free energy

  2. Peer conflict avoidance: associations with loneliness, social anxiety, and social avoidance.

    Science.gov (United States)

    Johnson, H D; LaVoie, J C; Spenceri, M C; Mahoney-Wernli, M A

    2001-02-01

    Failure to resolve peer conflict is associated with children's reports of loneliness, social anxiety, and social avoidance. Although these relationships are well established, researchers have not examined the association between the avoidance of peer conflict and various adjustment characteristics. The current study examined the association between avoidance of conflict and measures of loneliness, social anxiety, and social avoidance for 59 pupils in Grade 4 (31 boys and 28 girls) and 47 in Grade 8 (22 boys and 25 girls). Volunteers indicated that conflict avoidance based on autonomy, e.g., independence issues, and interpersonal issues, e.g., closeness and cohesion, was associated with scores on loneliness for boys and girls, respectively. Conflict avoidance for emotional and physical well-being and fear of punishment was associated with increased reports of loneliness and social anxiety for children in Grade 4.

  3. Prior Learning of Relevant Nonaversive Information Is a Boundary Condition for Avoidance Memory Reconsolidation in the Rat Hippocampus.

    Science.gov (United States)

    Radiske, Andressa; Gonzalez, Maria Carolina; Conde-Ocazionez, Sergio A; Feitosa, Anatildes; Köhler, Cristiano A; Bevilaqua, Lia R; Cammarota, Martín

    2017-10-04

    Reactivated memories can be modified during reconsolidation, making this process a potential therapeutic target for posttraumatic stress disorder (PTSD), a mental illness characterized by the recurring avoidance of situations that evoke trauma-related fears. However, avoidance memory reconsolidation depends on a set of still loosely defined boundary conditions, limiting the translational value of basic research. In particular, the involvement of the hippocampus in fear-motivated avoidance memory reconsolidation remains controversial. Combining behavioral and electrophysiological analyses in male Wistar rats, we found that previous learning of relevant nonaversive information is essential to elicit the participation of the hippocampus in avoidance memory reconsolidation, which is associated with an increase in theta- and gamma-oscillation power and cross-frequency coupling in dorsal CA1 during reactivation of the avoidance response. Our results indicate that the hippocampus is involved in memory reconsolidation only when reactivation results in contradictory representations regarding the consequences of avoidance and suggest that robust nesting of hippocampal theta-gamma rhythms at the time of retrieval is a specific reconsolidation marker. SIGNIFICANCE STATEMENT Posttraumatic stress disorder (PTSD) is characterized by maladaptive avoidance responses to stimuli or behaviors that represent or bear resemblance to some aspect of a traumatic experience. Disruption of reconsolidation, the process by which reactivated memories become susceptible to modifications, is a promising approach for treating PTSD patients. However, much of what is known about fear-motivated avoidance memory reconsolidation derives from studies based on fear conditioning instead of avoidance-learning paradigms. Using a step-down inhibitory avoidance task in rats, we found that the hippocampus is involved in memory reconsolidation only when the animals acquired the avoidance response in an

  4. A Transient Dopamine Signal Represents Avoidance Value and Causally Influences the Demand to Avoid

    Science.gov (United States)

    Pultorak, Katherine J.; Schelp, Scott A.; Isaacs, Dominic P.; Krzystyniak, Gregory

    2018-01-01

    Abstract While an extensive literature supports the notion that mesocorticolimbic dopamine plays a role in negative reinforcement, recent evidence suggests that dopamine exclusively encodes the value of positive reinforcement. In the present study, we employed a behavioral economics approach to investigate whether dopamine plays a role in the valuation of negative reinforcement. Using rats as subjects, we first applied fast-scan cyclic voltammetry (FSCV) to determine that dopamine concentration decreases with the number of lever presses required to avoid electrical footshock (i.e., the economic price of avoidance). Analysis of the rate of decay of avoidance demand curves, which depict an inverse relationship between avoidance and increasing price, allows for inference of the worth an animal places on avoidance outcomes. Rapidly decaying demand curves indicate increased price sensitivity, or low worth placed on avoidance outcomes, while slow rates of decay indicate reduced price sensitivity, or greater worth placed on avoidance outcomes. We therefore used optogenetics to assess how inducing dopamine release causally modifies the demand to avoid electrical footshock in an economic setting. Increasing release at an avoidance predictive cue made animals more sensitive to price, consistent with a negative reward prediction error (i.e., the animal perceives they received a worse outcome than expected). Increasing release at avoidance made animals less sensitive to price, consistent with a positive reward prediction error (i.e., the animal perceives they received a better outcome than expected). These data demonstrate that transient dopamine release events represent the value of avoidance outcomes and can predictably modify the demand to avoid. PMID:29766047

  5. Public expectations concerning confidentiality protection of adolescents' sexual and reproductive health care in Lithuania: findings of the surveys conducted in 2005 and 2012.

    Science.gov (United States)

    Jaruseviciene, Lina; Zaborskis, Apolinaras; Lazarus, Jeffrey Victor

    2014-04-01

    An adolescent's right to confidential healthcare is protected by international law and professional consensus. However, parental and social support for confidential sexual and reproductive health (SRH) services, in particular, varies greatly. This study documents Lithuanian residents' expectations with regard to confidentiality protection for adolescents in this domain, and explores the factors related to the diversity of these expectations. Two national surveys of Lithuanian residents completed in 2005 and 2012 using anonymous questionnaires. Participants rated their expectations for confidentiality using a five-point Likert scale for eight types of SRH consultations. Public anticipation for confidentiality depended on whether issues related to sexual behaviour or to its consequences were addressed during adolescent consultation. Only younger respondents had higher expectations for confidentiality in both contexts. Public expectations regarding confidentiality were less demanding in 2012 than in 2005. The expectation of confidentiality protection was greater for topics related to sexual behaviour than for the consequences of sexual behaviour, such as pregnancy, abortion or a sexually transmitted infection. This implies a need for targeted information strategies for the general population and explicit guidance for physicians on when and for whom care should remain confidential.

  6. An avoidance layer in hierarchical process control

    International Nuclear Information System (INIS)

    De Callatay, A.

    1994-01-01

    A project of layered software architecture is proposed: a safety-critical real-time non-stop simple kernel system includes a layer avoiding threatening actions from operators or programs in other control systems. Complex process-control applications (such as fuzzy systems) are useful for the smooth operation of the system, optimum productivity, efficient diagnostics, and safe management of degraded modes of operation. Defects in these complex process-control applications do not have an impact on safety if their commands have first to be accepted by a safety-critical module. The development, testing, and certification of complex applications computed in the outside layers can be made simpler and less expensive than for those in the kernel. Avoidance systems use rule-base systems having negative fuzzy conditions and actions. Animal and human behaviour cannot be explained without active avoidance

  7. New apparatus for training the avoidance reaction.

    Science.gov (United States)

    Tikal, K

    1988-01-01

    A new apparatus for active avoidance training in rats consists of a short, wide runway which can be tilted from a horizontal to vertical position. One half of the electrifiable grid floor is covered by a nonconducting sheet. For brightness (black-white) discrimination training a white walled goal box can be inserted into the runway and shifted from left to right during training. Avoidance training of 24 rats (female Wistar SPF) required 14.1 +/- 2.6 (mean +/- SEM) to-criterion trials (9/10) and was completed in less than 4 min. Brightness discrimination training required 21.3 +/- 2.1 to-criterion trials and the time of training did not exceed 12 min. The retention of the acquired responses was very good in both cases. The main advantage of the apparatus is very rapid acquisition of the one-way and discriminated avoidance without the necessity of manual manipulation of the animal.

  8. Engaging Math-Avoidant College Students

    Directory of Open Access Journals (Sweden)

    M. Paul Latiolais

    2009-07-01

    Full Text Available This paper is an informal, personal account of how we, as two college teachers, became interested in math anxiety, decided to explore it amongst students at our institution in order to inform our teaching, and became convinced that the massive problem is math avoidance. We tried discussion groups, but few students attended, although those that did made useful suggestions. Thus informed, we designed an innovative course, Confronting College Mathematics as a Humanities course with the possibility of credit toward the math requirement, but it was undersubscribed in its first offering and had to be canceled. How can we get college students who avoid math to break through the barrier of math avoidance? We have now begun to explore a new approach: Second Life, where students can engage math—and quantitative literacy—virtually, and anonymously.

  9. DLP: REDUCED RISK OF LEAKAGE OF CONFIDENTIAL INFORMATION OF THE BANK

    Directory of Open Access Journals (Sweden)

    T. A. Andryianava

    2017-01-01

    Full Text Available Research application of DLP-system for protection of confidential information, a methodology for adapting the DLP-system to the specific activities of the organization, comparative analysis of the results of standard and adapted DLP-systems in the Bank. Developed: a technique for analyzing information security events, algorithm for responding to identified events, methodology and procedures for adapting the standard DLP-system to the specifics of the Bank’s activities. The methodology for adapting a standard DLP-system to the specifics of the Bank’s work consists of the following activities: identification of critical corporate information categories, audit of information systems, description of current risks and their assessment, introduction of rules for Bank’s critical information and setting up a DLP system in accordance with the specifics of the Bank’s work. Modernization of the configuration of a standard DLP-system includes the following procedures: selection of confidential information of the Bank based on membership criteria, setting up detection, creating perimeters and developing an algorithm for responding to identified information security events in the Bank. The algorithm is designed to improve the efficiency of the response of information security officers in cases of incident detection and describes the stages of the subsequent actions. The results of the research prove that using an adapted DLP-system significantly reduces the number of false positives, increasing the accuracy of detecting confidential information and reducing the risk of leakage of critical information outside the corporate network. The application of the adapted DLP-system in the Bank allowed to increase the speed of response of information security specialists to the information security events detected by the DLP-system adapted to the Bank, and also allowed the DLP-system to transition from the copy mode to the blocking mode of illegitimate transfer

  10. Contributory factors in surgical incidents as delineated by a confidential reporting system.

    Science.gov (United States)

    Mushtaq, F; O'Driscoll, C; Smith, Fct; Wilkins, D; Kapur, N; Lawton, R

    2018-05-01

    Background Confidential reporting systems play a key role in capturing information about adverse surgical events. However, the value of these systems is limited if the reports that are generated are not subjected to systematic analysis. The aim of this study was to provide the first systematic analysis of data from a novel surgical confidential reporting system to delineate contributory factors in surgical incidents and document lessons that can be learned. Methods One-hundred and forty-five patient safety incidents submitted to the UK Confidential Reporting System for Surgery over a 10-year period were analysed using an adapted version of the empirically-grounded Yorkshire Contributory Factors Framework. Results The most common factors identified as contributing to reported surgical incidents were cognitive limitations (30.09%), communication failures (16.11%) and a lack of adherence to established policies and procedures (8.81%). The analysis also revealed that adverse events were only rarely related to an isolated, single factor (20.71%) - with the majority of cases involving multiple contributory factors (79.29% of all cases had more than one contributory factor). Examination of active failures - those closest in time and space to the adverse event - pointed to frequent coupling with latent, systems-related contributory factors. Conclusions Specific patterns of errors often underlie surgical adverse events and may therefore be amenable to targeted intervention, including particular forms of training. The findings in this paper confirm the view that surgical errors tend to be multi-factorial in nature, which also necessitates a multi-disciplinary and system-wide approach to bringing about improvements.

  11. Management of medical confidentiality in English professional football clubs: some ethical problems and issues.

    Science.gov (United States)

    Waddington, I; Roderick, M

    2002-04-01

    To examine the ways in which confidential matters are dealt with in the context of the relationship between the club doctor (or physiotherapist) and the player as patient in English professional football clubs. Semistructured tape recorded interviews with 12 club doctors, 10 club physiotherapists, and 27 current and former players. A questionnaire was also sent to 90 club doctors; 58 were returned. There is among club doctors and physiotherapists no commonly held code of ethics governing how much and what kind of information about players may properly be passed on to managers; associated with this, there is considerable variation from one club to another in terms of the amount and kind of information passed on to managers. In some clubs, medical staff attempt to operate more or less on the basis of the rules governing confidentiality that apply in general practice, but in other clubs, medical staff are more ready to pass on personal information about players. In some situations, this raises serious ethical questions. Guidelines dealing with confidentiality in practitioner-patient relationships in medical practice have long been available and have recently been restated, specifically in relation to the practice of sports medicine, by the British Olympic Association, the British Medical Association, and the Football Association. This is a welcome first step. However, if the guidelines are to have an impact on practice, detailed consideration needs to be given to ensuring their effective implementation; if this is to be achieved, consideration also needs to be given to identifying those aspects of the culture and organisation of professional football clubs that may hinder the full and effective implementation of those guidelines.

  12. Stakeholder Orientation in Cruise Lines’ Mission Statements

    Directory of Open Access Journals (Sweden)

    Lara Penco

    2017-11-01

    Full Text Available Consistent with the extant management literature, mission statements are crucial for the sustainability and growth of any firms and have been considered to be a tool for the strategic management process. Despite the considerable attention awarded to this theme, the role of the mission statement in the strategic management of tourism firms has not been sufficiently highlighted. The present paper tries to bridge this literature gap and aims to (i analyze the content of mission statements; and (ii investigate the stakeholder orientation of cruise line mission statements. We apply a content analysis method to analyze the mission statements of 44 cruise lines, employing three different perspectives: (1 the inclusion of stakeholder groups; (2 mentions of specific “mission” components; (3 reference to four goals usually assigned to mission statements. The analysis was performed using the software package QDA-Miner. The results suggest that it is possible to identify four clusters of firms that present similar content in their mission statements, and that cruise companies tend to reserve a major attention to customers. This contribution presents some valuable research implications mainly useful for researchers and academics, but also maybe of benefit to professionals and investors.

  13. Information Dilemmas and Blame-Avoidance Strategies

    DEFF Research Database (Denmark)

    Erik, Baekkeskov; Rubin, Olivier

    2017-01-01

    from day one about 2009 H1N1 flu. To explore why, this article links crisis information dilemmas to blame avoidance concepts from democratic political theories. We argue that greater Chinese transparency about infectious disease response reflects evolution in blame avoidance, from heavy reliance...... on information control to insulating leaders by using technical experts and agencies as 'lightning rods.' In 2003, the Chinese strategy of information containment and secrecy backfired, and the Chinese leadership eventually received blame at home and internationally for crisis mismanagement. In 2009, China put...... in place public health specialists and institutions as responsible for H1N1 information and responses, thereby insulating the top-tier leadership....

  14. Cyber-Security Challenges with SMEs in Developing Economies: Issues of Confidentiality, Integrity & Availability (CIA)

    DEFF Research Database (Denmark)

    Yeboah-Boateng, Ezer Osei

    The essence of this study is first to highlight the cyber-security challenges confronting SMEs in developing economies, and to model a framework for safeguarding their assets, to ensure continuous optimal business operations, and to participate and compete securely in the ubiquitous cyber......, to develop customer-centric strategies. While connectivity is indispensable for achieving business success, being connected also implies being exposed to a myriad of cyber-security challenges, such as vulnerabilities of confidentiality, integrity and availability (CIA). As vulnerabilities are exploited...... cognitive map (FCM) approach is also used to show the implications of vulnerabilities amongst SMEs asset disposal policies....

  15. Practice points on three aspects of oil and gas property transactions - operatorship, confidentiality and title review

    International Nuclear Information System (INIS)

    Edwards, P.D.

    1999-01-01

    Practice points regarding three aspects of oil and gas property transactions were described. The first topic dealt with purchase and sale transactions and how to determine which party is entitled to act as the Operator following the sale of the Operator's interest. The second topic addressed issues of confidentiality in connection with oil and gas transactions. The final point discussed contractual provisions relating to title defects, along with their many variations and legal consequences. All three of these topics present issues which give rise to a surprising number of disputes, but which frequently receive only cursory attention in the negotiation and documentation of oil and gas transactions

  16. Using Social Networking Sites for Communicable Disease Control: Innovative Contact Tracing or Breach of Confidentiality?

    Science.gov (United States)

    Mandeville, Kate L; Harris, Matthew; Thomas, H Lucy; Chow, Yimmy; Seng, Claude

    2014-04-01

    Social media applications such as Twitter, YouTube and Facebook have attained huge popularity, with more than three billion people and organizations predicted to have a social networking account by 2015. Social media offers a rapid avenue of communication with the public and has potential benefits for communicable disease control and surveillance. However, its application in everyday public health practice raises a number of important issues around confidentiality and autonomy. We report here a case from local level health protection where the friend of an individual with meningococcal septicaemia used a social networking site to notify potential contacts.

  17. Reconfiguring waveguide-gratings-based M-signature codecs to enhance OCDMA network confidentiality

    Science.gov (United States)

    Huang, Jen-Fa; Chen, Kai-Sheng; Lin, Ying-Chen; Li, Chung-Yu

    2014-02-01

    A reconfiguration scheme based on composite signature codes over waveguide-gratings-based optical code-division multiple-access (OCDMA) network coder/decoders (codecs) is proposed in the paper. By using central control node to monitor network traffic condition and reconfigure the composite signature codes made up of maximal-length sequence (M-sequence) component codes and random changing the signature codes assigned for each user to improve the confidentiality performance in an OCDMA system. The proposed scheme is analyzed with some practical eavesdroppers' attacks.

  18. Confidential conversations between supervisor and employee as a means for improving leadership: a quasi-experimental study in hospital wards.

    Science.gov (United States)

    Kivimäki, M

    1996-11-01

    Although yearly confidential conversations between a supervisor and an employee have been recommended as a means for improving leadership, evidence on the actual effects of these conversations has been lacking. The present study therefore investigated whether confidential conversations improve perceptions of goal clarity, sufficiency of feedback and innovativeness, and elicit satisfaction with the supervisor's leadership style within the hospital setting. Nine wards were divided into one experimental group (3 wards) and two control groups (3 + 3 wards). A questionnaire on goal clarity, feedback, innovativeness and satisfaction was administered twice to every group (1st measurement: r = 186, 2nd measurement: n = 163). The experimental group began confidential conversations after the first measurement, control group 1 entered into conversations during both measurements, and control group 2 did not enter into conversations at the time of either measurement. Confidential conversations improved perceived feedback. In both measurements, the sufficiency of feedback was reported to be significantly better in the groups having conversations than in the other groups. In addition, there was a significant positive change in the perceived sufficiency of feedback in the experimental group but not in the other groups. Confidential conversations did not affect the perceptions of goal clarity and innovativeness or elicit satisfaction with the supervisor's management style.

  19. European position statement on lung cancer screening

    DEFF Research Database (Denmark)

    Oudkerk, Matthijs; Devaraj, Anand; Vliegenthart, Rozemarijn

    2017-01-01

    Lung cancer screening with low-dose CT can save lives. This European Union (EU) position statement presents the available evidence and the major issues that need to be addressed to ensure the successful implementation of low-dose CT lung cancer screening in Europe. This statement identified...... specific actions required by the European lung cancer screening community to adopt before the implementation of low-dose CT lung cancer screening. This position statement recommends the following actions: a risk stratification approach should be used for future lung cancer low-dose CT programmes...... need to set a timeline for implementing lung cancer screening....

  20. Statement of nuclear incidents at nuclear installations

    International Nuclear Information System (INIS)

    2002-07-01

    A statement of nuclear incidents at nuclear installations in Britain during the first quarter of 2002 is published today by the Health and Safety Executive. It covers the period 1 January to 31 March 2002. There are two installations mentioned in the statement: Dungeness B and Heysham 1. The statement is published under arrangements that came into effect from the first quarter of 1993, derived from the Health and Safety Commission's powers under section 11 of the Health and Safety at Work, etc. Act 1974

  1. Rewarding peak avoidance: the Dutch 'Spitsmijden' projects

    NARCIS (Netherlands)

    Knockaert, J.; Bakens, J.; Ettema, D.F.; Verhoef, E.

    2011-01-01

    The Dutch road network is becoming increasingly congested. In late 2006, a group of companies, universities and government institutions established the Spitsmijden project. ‘Spitsmijden’ is the Dutch term for ‘avoiding the peak’. This joint initiative aimed to identify and assess a short-term

  2. The Netherlands Bird Avoidance Model, Final Report

    NARCIS (Netherlands)

    Shamoun-Baranes, J.; Bouten, W.; Sierdsema, H.; van Belle, J.; van Gasteren, J.R.; van Loon, E.E.

    2006-01-01

    The NL-BAM was developed as a web-based decision support tool to be used by the bird hazard avoidance experts in the ecology unit of the Royal Netherlands Air Force. The NL-BAM will be used together with the ROBIN 4 radar system to provide BirdTAMS, for real time warnings and flight planning and to

  3. Employer Attitudes towards Peak Hour Avoidance

    NARCIS (Netherlands)

    Vonk Noordegraaf, D.M.; Annema, J.A.

    2012-01-01

    Peak Hour Avoidance is a relatively new Dutch mobility management measure. To reduce congestion frequent car drivers are given a financial reward for reducing the proportion of trips that they make during peak hours on a specific motorway section. Although previous studies show that employers are

  4. Employer attitudes towards peak hour avoidance

    NARCIS (Netherlands)

    Noordegraaf, D.M.V.; Annema, J.A.

    2012-01-01

    Peak Hour Avoidance is a relatively new Dutch mobility management measure. To reduce congestion frequent car drivers are given a financial reward for reducing the proportion of trips that they make during peak hours on a specific motorway section. Although previous studies show that employers are

  5. Avoidance Motivation and Conservation of Energy

    NARCIS (Netherlands)

    Roskes, Marieke; Elliot, Andrew J.; Nijstad, Bernard A.; De Dreu, Carsten K. W.

    Compared to approach motivation, avoidance motivation evokes vigilance, attention to detail, systematic information processing, and the recruitment of cognitive resources. From a conservation of energy perspective it follows that people would be reluctant to engage in the kind of effortful cognitive

  6. Avoidance motivation and conservation of energy

    NARCIS (Netherlands)

    Roskes, Marieke; Elliot, Andrew J.; Nijstad, Bernard A.; De Dreu, Carsten K W

    Compared to approach motivation, avoidance motivation evokes vigilance, attention to detail, systematic information processing, and the recruitment of cognitive resources. From a conservation of energy perspective it follows that people would be reluctant to engage in the kind of effortful cognitive

  7. Pathological Demand Avoidance: Exploring the Behavioural Profile

    Science.gov (United States)

    O'Nions, Elizabeth; Viding, Essi; Greven, Corina U; Ronald, Angelica; Happé, Francesca

    2014-01-01

    "Pathological Demand Avoidance" is a term increasingly used by practitioners in the United Kingdom. It was coined to describe a profile of obsessive resistance to everyday demands and requests, with a tendency to resort to "socially manipulative" behaviour, including outrageous or embarrassing acts. Pathological demand…

  8. ALUMINUM AVOIDANCE BY MUCUNA-PRURIENS

    NARCIS (Netherlands)

    HAIRIAH, K; VANNOORDWIJK, M; STULEN, [No Value; KUIPER, PJC

    The hypothesis was tested that the avoidance of acid subsoil by the velvet bean Mucuna pruriens is based on a mechanism acting on the whole root system rather than on individual roots. In a split-root experiment with circulating nutrient solution the growth of plants with Al-containing (+/+) or

  9. Audit incorporating avoidability and appropriate intervention can ...

    African Journals Online (AJOL)

    Audit incorporating avoidability and appropriate intervention can significantly decrease perinatal mortality. H. R. G. Ward, G. R. Howarth, O. J. N. Jennings,. R. C. Pattinson .... 6 months) and seven interns. The study was .... maternity care notes study: a randomized control trial to assess the effects of giving expectant mothers ...

  10. Hydrofluoric acid on dentin should be avoided.

    NARCIS (Netherlands)

    Loomans, B.A.C.; Mine, A.; Roeters, F.J.M.; Opdam, N.J.M.; Munck, J. De; Huysmans, M.C.D.N.J.M.; Meerbeek, B. Van

    2010-01-01

    Hydrofluoric acid can be used for intra-oral repair of restorations. Contamination of tooth substrate with hydrofluoric acid cannot always be avoided. OBJECTIVES: To investigate the bonding effectiveness to hydrofluoric acid contaminated dentin by, micro-tensile bond strength testing, SEM and TEM.

  11. Women Coping with a Partner's Sexual Avoidance.

    Science.gov (United States)

    Renshaw, Domeena C.

    2001-01-01

    Discusses the complexities of sexual avoidance, or Hypoactive Sexual Desire (HSD), a previously neglected aspect of a couple's relationship. Suggests that learning from a therapist to accept and enjoy other forms of sexual exchange can open up new horizons of physical and emotional intimacy. (Contains 17 references.) (GCP)

  12. Obstacle detection and avoiding of quadcopter

    Science.gov (United States)

    Wang, Dizhong; Lin, Jiajian

    2017-10-01

    Recent years, the flight control technology over quadcopter has been boosted vigorously and acquired the comprehensive application in a variety of industries. However, it is prominent for there to be problems existed in the stable and secure flight with the development of its autonomous flight. Through comparing with the characteristics of ultrasonic ranging and laser Time-of-Flight(abbreviated to ToF) distance as well as vision measurement and its related sensors, the obstacle detection and identification sensors need to be installed in order to effectively enhance the safety flying for aircraft, which is essential for avoiding the dangers around the surroundings. That the major sensors applied to objects perception at present are distance measuring instruments which based on the principle and application of non-contact detection technology . Prior to acknowledging the general principles of flight and obstacle avoiding, the aerodynamics modeling of the quadcopter and its object detection means has been initially determined on this paper. Based on such premise, this article emphasized on describing and analyzing the research on obstacle avoiding technology and its application status, and making an expectation for the trend of its development after analyzing the primary existing problems concerning its accuracy object avoidance.

  13. Traveler's guide to avoiding infectious diseases

    Science.gov (United States)

    ... to-date information, please visit the Centers for Disease Control and Prevention's (CDC) website -- www.cdc.gov/zika . To prevent getting the Zika virus, take steps to avoid mosquito bites. Sexual transmission of the virus can be prevented by using condoms ...

  14. An Examination of Avoided Costs in Utah

    Energy Technology Data Exchange (ETDEWEB)

    Bolinger, Mark; Wiser, Ryan

    2005-01-07

    The Utah Wind Working Group (UWWG) believes there are currently opportunities to encourage wind power development in the state by seeking changes to the avoided cost tariff paid to qualifying facilities (QFs). These opportunities have arisen as a result of a recent renegotiation of Pacificorp's Schedule 37 tariff for wind QFs under 3 MW, as well as an ongoing examination of Pacificorp's Schedule 38 tariff for wind QFs larger than 3 MW. It is expected that decisions made regarding Schedule 38 will also impact Schedule 37. Through the Laboratory Technical Assistance Program (Lab TAP), the UWWG has requested (through the Utah Energy Office) that LBNL provide technical assistance in determining whether an alternative method of calculating avoided costs that has been officially adopted in Idaho would lead to higher QF payments in Utah, and to discuss the pros and cons of this method relative to the methodology recently adopted under Schedule 37 in Utah. To accomplish this scope of work, I begin by summarizing the current method of calculating avoided costs in Utah (per Schedule 37) and Idaho (the ''surrogate avoided resource'' or SAR method). I then compare the two methods both qualitatively and quantitatively. Next I present Pacificorp's four main objections to the use of the SAR method, and discuss the reasonableness of each objection. Finally, I conclude with a few other potential considerations that might add value to wind QFs in Utah.

  15. Approach and avoidance in fear of spiders

    NARCIS (Netherlands)

    Rinck, M.; Becker, E.S.

    2007-01-01

    We examined attitudes towards spiders by employing an Approach-Avoidance Task, in which participants respond to pictures by pulling a joystick towards themselves or by pushing it away from themselves. For spider fearfuls, this stimulus–response assignment is either compatible (push spiders away) or

  16. FORUM Achieving weight loss and avoiding obesity

    African Journals Online (AJOL)

    The efficacy of diets advocating extreme macronutrient manipulation has been reviewed extensively. Studies involving participation for 12 months or longer revealed that diet adherence, length of intervention and level of calorie. ISSUES IN MEDICINE. Achieving weight loss and avoiding obesity. Maria Elizabeth Catsicas.

  17. Learn to Avoid or Overcome Leadership Obstacles

    Science.gov (United States)

    D'Auria, John

    2015-01-01

    Leadership is increasingly recognized as an important factor in moving schools forward, yet we have been relatively random in how we prepare and support them. Four obstacles often block or diminish their effectiveness. Avoiding or overcoming each of these requires an underlying set of skills and knowledge that we believe can be learned and…

  18. PENGARUH CORPORATE GOVERNANCE TERHADAP TAX AVOIDANCE

    Directory of Open Access Journals (Sweden)

    Nuralifmida Ayu Annisa

    2012-05-01

    Full Text Available This study aims to find out how the influence of the corporate governance of tax avoidanceactivity in companies listed on Indonesia Stock Exchange in 2008. The samples are publiclytraded company listed on the Indonesia Stock Exchange in 2008 as many as 200 companies. Thisstudy uses data analysis and regression analysis of the elements of corporate governance and taxavoidance. The results of this study show that the elements of corporate governance that consist ofaudit quality and audit committee significantly influence the activity of tax avoidance as measuredusing proxy book tax gap. Other results show that the tax avoidance activity as measured withproxy book tax gap are not affected significantly by institutional ownership and board ofcommissioners. Limitation of this study is not to use each type of industries as control variable socan’t identify the direct effect from type of industry on tax avoidance. Another limitation of thisstudy is use corporate governance’s proxy separately, so it can’t capture the full effect ofcorporate governance. Keywords:corporate governance, ownership structure, board of commissioners, audit committee,tax avoidance, book tax gap.

  19. Avoidance: From threat encounter to action execution

    NARCIS (Netherlands)

    Arnaudova, I.

    2015-01-01

    Every day we encounter many threats to survival: a car speeding on a small street or an angry neighbor carrying an axe. Mostly, people go through their days not worrying that their chance of survival might be small. They avoid many dangers without even thinking about them (e.g., looking at both

  20. Wake Vortex Avoidance System and Method

    Science.gov (United States)

    Shams, Qamar A. (Inventor); Zuckerwar, Allan J. (Inventor); Knight, Howard K. (Inventor)

    2017-01-01

    A wake vortex avoidance system includes a microphone array configured to detect low frequency sounds. A signal processor determines a geometric mean coherence based on the detected low frequency sounds. A display displays wake vortices based on the determined geometric mean coherence.