WorldWideScience

Sample records for confidential final technical

  1. 77 FR 48072 - Final Confidentiality Determinations for Regulations Under the Mandatory Reporting of Greenhouse...

    Science.gov (United States)

    2012-08-13

    ... Final Confidentiality Determinations for Regulations Under the Mandatory Reporting of Greenhouse Gases... confidentiality determinations for certain data elements in regulations under the Mandatory Greenhouse Gas... Greenhouse Gas Reporting Program Web site at http://www.epa.gov/climatechange/emissions/ghgrulemaking.html...

  2. 78 FR 68161 - Greenhouse Gas Reporting Program: Final Amendments and Confidentiality Determinations for...

    Science.gov (United States)

    2013-11-13

    ... 98 Greenhouse Gas Reporting Program: Final Amendments and Confidentiality Determinations for...-HQ-OAR-2011-0028; FRL-9845-6] RIN 2060-AR61 Greenhouse Gas Reporting Program: Final Amendments and... monitoring methodologies for electronics manufacturers covered by the Greenhouse Gas Reporting Rule. These...

  3. Final Technical Report

    Energy Technology Data Exchange (ETDEWEB)

    Glasser, Alan H. [Fusion Theory and Computation Inc., Kingston, WA (United States)

    2018-02-02

    Final technical report on DE-SC0016106. This is the final technical report for a portion of the multi-institutional CEMM project. This report is centered around 3 publications and a seminar presentation, which have been submitted to E-Link.

  4. Denying a patient's final will: public safety vs. medical confidentiality and patient autonomy.

    Science.gov (United States)

    Gaertner, Jan; Vent, Julia; Greinwald, Ralf; Rothschild, Markus A; Ostgathe, Christoph; Kessel, Rene; Voltz, Raymond

    2011-12-01

    Especially when caring for patients approaching the end of life, physicians and nursing staff feel committed to fulfilling as many patient desires as possible. However, sometimes a patient's "final will" may threaten public safety. This can lead to severe conflicts, outweighing the physician's obligation and dedication to care for the patient and to respect his autonomy. Yet, public safety can be threatened if confidentiality is not broken. This article provides a concise summary of the medicolegal and ethical fundamentals concerning this difficult situation. If the patient's and others' health and safety are at risk, physicians may (and in some countries must) break medical confidentiality and disclose confidential patient information to the police and other authorities. Physicians should be able to professionally deal with such a conflict in all patients, not only in patients with advanced illness. Copyright © 2011 U.S. Cancer Pain Relief Committee. Published by Elsevier Inc. All rights reserved.

  5. A Policy-Based Framework for Preserving Confidentiality in BYOD Environments: A Review of Information Security Perspectives

    Directory of Open Access Journals (Sweden)

    Chalee Vorakulpipat

    2017-01-01

    Full Text Available Today, many organizations allow their employees to bring their own smartphones or tablets to work and to access the corporate network, which is known as a bring your own device (BYOD. However, many such companies overlook potential security risks concerning privacy and confidentiality. This paper provides a review of existing literature concerning the preservation of privacy and confidentiality, with a focus on recent trends in the use of BYOD. This review spans a large spectrum of information security research, ranging from management (risk and policy to technical aspects of privacy and confidentiality in BYOD. Furthermore, this study proposes a policy-based framework for preserving data confidentiality in BYOD. This framework considers a number of aspects of information security and corresponding techniques, such as policy, location privacy, centralized control, cryptography, and operating system level security, which have been omitted in previous studies. The main contribution is to investigate recent trends concerning the preservation of confidentiality in BYOD from the perspective of information security and to analyze the critical and comprehensive factors needed to strengthen data privacy in BYOD. Finally, this paper provides a foundation for developing the concept of preserving confidentiality in BYOD and describes the key technical and organizational challenges faced by BYOD-friendly organizations.

  6. Genetic secrets: Protecting privacy and confidentiality in the genetic era. Final report

    Energy Technology Data Exchange (ETDEWEB)

    Rothstein, M.A. [ed.

    1998-09-01

    Few developments are likely to affect human beings more profoundly in the long run than the discoveries resulting from advances in modern genetics. Although the developments in genetic technology promise to provide many additional benefits, their application to genetic screening poses ethical, social, and legal questions, many of which are rooted in issues of privacy and confidentiality. The ethical, practical, and legal ramifications of these and related questions are explored in depth. The broad range of topics includes: the privacy and confidentiality of genetic information; the challenges to privacy and confidentiality that may be projected to result from the emerging genetic technologies; the role of informed consent in protecting the confidentiality of genetic information in the clinical setting; the potential uses of genetic information by third parties; the implications of changes in the health care delivery system for privacy and confidentiality; relevant national and international developments in public policies, professional standards, and laws; recommendations; and the identification of research needs.

  7. Confidential patent application with an example of preparation

    Directory of Open Access Journals (Sweden)

    Obrad T. Čabarkapa

    2013-12-01

    Full Text Available In order that the invention solving a technical problem receives a patent protection, it is necessary to file a patent application. For the protection of confidential inventions which are important for defense and national security, a confidential patent application[1] must be filed. A confidential patent application is an important and complex document, the parts of which are,  in principle, exposed in an established order. For the preparation of patent applications, it is necessary to engage experts with higher education, primarily in the technical field the invention relates to. The contents of the patent application is a basis for examining whether the application meets the requirements for patentability and whether the right to patent protection is achieved. Besides theoretical discussions on patent application, the paper gives a short version of an example of an application regarding a protected confidential invention. Introduction The basic condition for the exercise of patent protection is filing a patent application, the test procedure and, eventually, depending on the test results - the recognition or rejection of the patent. The paper gives a description of all parts of the patent application on an example of a confidential invention already patented. The content of the confidential patent application The confidential patent application for confidential invention protection consists of the following parts: The application for a patent; description of the invention; the claims (indication of what is new and what is required to be protected by patenting; abstract (short summary of the invention  and a draft of the invention (to which the description and the claims are referred. The application for a patent The application for patent is filed on Form P-1 and a request for the petty patent on Form MP-1. The data entered in the file is, for example: the applicant; the lawyer; the name of the invention in Serbian and English; the inventor

  8. Final Technical Report

    Energy Technology Data Exchange (ETDEWEB)

    John Ross

    2003-04-30

    The Final Technical Report summarizes research accomplishments and Publications in the period of 5/1/99 to 4/30/03 done on the grant. Extensive progress was made in the period covered by this report in the areas of chemical kinetics of non-linear systems; spatial structures, reaction - diffusion systems, and thermodynamic and stochastic theory of electrochemical and general systems.

  9. Confidential donation confirmation as an alternative to confidential unit exclusion: 15 months experience of the HEMOMINAS foundation

    Directory of Open Access Journals (Sweden)

    Flávia Cristine Martineli Loureiro

    2011-01-01

    Full Text Available BACKGROUND: Confidential unit exclusion remains a controversial strategy to reduce the residual risk of transfusion-transmitted infections. OBJECTIVE: This study aimed to analyze confidential unit exclusion from its development in a large institution in light of confidential donation confirmation. METHODS: Data of individuals who donated from October 1, 2008 to December 31, 2009 were analyzed in a case-control study. The serological results and sociodemographic characteristics of donors who did not confirm their donations were compared to those who did. Variables with p-values < 0.20 in univariate analysis were included in a logistic multivariate analysis. RESULTS: In the univariate analysis there was a statically significant association between positive serological results and response to confidential donation confirmation of "No". Donation type, (firsttime or return donor - OR 1.69, CI 1.37-2.09, gender (OR 1.66, CI 1.35-2.04, education level (OR 2.82, CI 2.30-3.47 and ethnic background (OR 0.67, CI 0.55-0.82 were included in the final logistic regression model. In all logistic regression models analyzed, the serological suitability and confidential donation confirmation were not found to be statistically associated. The adoption of new measures of clinical classification such as audiovisual touch-screen computer-assisted self-administered interviews might be more effective than confidential unit exclusion in the identification of donor risk behavior. The requirement that transfusion services continue to use confidential unit exclusion needs to be debated in countries where more specific and sensitive clinical and serological screening methods are available. CONCLUSION: Our findings suggest that there are not enough benefits to justify continued use of confidential donation confirmation in the analyzed institution.

  10. 48 CFR 252.235-7011 - Final scientific or technical report.

    Science.gov (United States)

    2010-10-01

    ... technical report. 252.235-7011 Section 252.235-7011 Federal Acquisition Regulations System DEFENSE... CLAUSES Text of Provisions And Clauses 252.235-7011 Final scientific or technical report. As prescribed in 235.072(d), use the following clause: Final Scientific or Technical Report (NOV 2004) The Contractor...

  11. Guidelines for Preparing Final Technical Reports

    International Development Research Centre (IDRC) Digital Library (Canada)

    fdieudonne

    Prior to submitting the Final Technical Report, any outstanding issues related to dissemination in accordance with ... The report should be an opportunity to reflect on the management of the project from various perspectives: .... of poor quality.

  12. Technical evaluation report of the Fort St. Vrain final draft upgraded technical specifications

    International Nuclear Information System (INIS)

    Kimura, C.Y.

    1989-01-01

    This report is a technical evaluation of the final draft of the Fort St. Vrain (FSV) Upgraded Technical Specifications (UT/S) as issued by Public Service of Colorado (PSC) on May 27, 1988 with subsequent supplemental updates issued on June 15, 1988 and August 5, 1988. It has been compared for consistency, and safety conservatism with the Fort St. Vrain (FSV) Updated Final Safety Analysis Report (FSAR), the FSV Safety Evaluation Report (SER), the Facility Operating License, DPR-34, and all amendments to the Facility Operating License issued as of June 1, 1988, and Appendix A to the Operating License DPR-34, Technical Specifications. Because of the age of the plant, no supplements to the Fort St. Vrain SER have been issued since the original SER was not issued as a WASH or a NUREG report. This made it necessary to review all amendments to the Facility Operating License since they would contain the safety evaluations done to support changes to the Facility Operating License. The upgraded Fort St. Vrain Technical Specifications were also broadly compared with the latest Westinghouse Standard Technical Specifications (WSTS) to assure that what was proposed for Fort St. Vrain was consistent with the latest NRC staff practices for standard technical specifications

  13. 78 FR 16298 - Comment Request for Information Collection: Confidentiality and Disclosure of State Unemployment...

    Science.gov (United States)

    2013-03-14

    ... Collection: Confidentiality and Disclosure of State Unemployment Compensation Information Final Rule and... about the regulatory requirements of the Confidentiality and Disclosure of State Unemployment... Administration, Office of Unemployment Insurance, 200 Constitution Avenue NW., Room S4524, Washington, DC 20210...

  14. Confidentiality and personal integrity.

    Science.gov (United States)

    Edgar, A

    1994-06-01

    This paper uses the social theory of Erving Goffman in order to argue that confidentiality should be understood in relation to the mundane social skills by which individuals present and respect specific self-images of themselves and others during social interaction. The breaching of confidentiality is analysed in terms of one person's capacity to embarrass another, and so to expose that person as incompetent. Respecting confidentiality may at once serve to protect the vulnerable from an unjust society, and yet also protect the guilty from just accusation. Ethical reasoning about confidentiality must therefore recognize the dangers of prejudice and violence inherent in decisions to breach or to respect confidentiality. Case studies are used to illustrate the efficacy of this account, culminating with analyses of three examples from the UKCC document Confidentiality.

  15. Breaching confidentiality: medical mandatory reporting laws in Iran.

    Science.gov (United States)

    Milanifar, Alireza; Larijani, Bagher; Paykarzadeh, Parvaneh; Ashtari, Golanna; Mehdi Akhondi, Mohammad

    2014-01-01

    Medical ethics is a realm where four important subjects of philosophy, medicine, theology and law are covered. Physicians and philosophers cooperation in this area will have great efficiency in the respective ethical rules formation. In addition to respect the autonomy of the patient, physician's obligation is to ensure that the medical intervention has benefit for the patient and the harm is minimal. There is an obvious conflict between duty of confidentiality and duty of mandatory reporting. Professional confidentiality is one of the basic components in building a constant physician-patient relationship which nowadays, beside the novelty, it is the subject of discussion. Legal obligation of confidentiality is not absolute. In physician-patient relationship, keeping patient's secrets and maintaining confidentiality is a legal and ethical duty, and disclosure of such secrets is mainly through specific statutes. Thus, there are a number of situations where breach of confidentiality is permitted in different legal systems. One of the situations where breaching confidentiality is permitted is the medical mandatory reporting to the relevant authority which is in accordance with many countries' legal systems. Some situations are considered in many countries legal systems' such as notification of births and deaths, infectious diseases, child abuse, sport and relevant events, medical errors, drug side effects and dangerous pregnancies. In this paper, we will examine and discuss medical mandatory reporting and its ethical and legal aspects in the judicial and legal system of Iran and few other countries. Finally we will suggest making Medical Mandatory Reporting Law in Iran.

  16. Final technical report

    DEFF Research Database (Denmark)

    Juhl, Thomas Winther; Nielsen, Jakob Skov

    gas jet chamber and laser beam path from the final focusing mirror. The project consists of three phases: Phase 1: Fundamental studies of cutting front mechanisms, beam propagation, nozzle design and chemical reactions in the cut kerf with special emphasize on high laser powers and thick sections...... cutting nozzle which can be adjusted independently to the laser beam has been developed. The position of the focus relative the workpiece can be adjusted to cutting applications with relatively large processing windows, i.e. both mild and stainless steels, and of a broad thickness range. A build-in auto......This project entails research with the goal to extend laser cutting of steel based metals to thickness above 20 mm and laser powers in the 10 kW range, with adequate accuracy and economically viable cutting speeds. The technical approach is to develop mirror based cutting heads with truly coaxial...

  17. Systems study 'Alternative Entsorgung'. Final report. Technical annex 10

    International Nuclear Information System (INIS)

    Hartje, B.; Kronschnabel, H.; Mueller, W.F.W.

    1984-01-01

    There is an investigation whether accessibility can be produced to fuel elements stored in a salt mine. All solutions of the problem were followed up until the technically best one was found. Two conditions must be fulfilled for access to the final storage barrel: - There must be a climate which is suitable for people. The Mining Order is the basis for this. - The pit building must be fixed, in the convergence in the salt mine should not lead to it becoming impossible to reach part of the mine. Due to heat-producing waste, rock temperatures are caused in the salt mine, in which mining is no longer possible. Building on the idea of cooling the whole final storage area using concentric sections, the amount of heat to be removal was first estimated. Cooling of the whole final storage area proved to be technically unjustifiable and uninteresting at present. (orig./HP) [de

  18. [Confidentiality in medical oaths: (When the white crow becomes gray...)].

    Science.gov (United States)

    Gelpi, R J; Pérez, M L; Rancich, A M; Mainetti, J A

    2000-01-01

    Confidentiality, together with the ethical principles of beneficence and non-maleficence, is the most important rule in Medical Oaths at the present time. However, the scientific-technical advances in medicine have made this rule one of the most controversial ones because of its exceptions. In consequence, the aim of the present paper is to comparatively analyze the rule of confidentiality in Medical Oaths of different places, times, origins and in different versions of the Hippocratic Oath in order to determine what should be kept a secret and with what degree of commitment (absolute or "prima facie"). Of the thirty six analyzed Oaths, twenty-seven manifest this rule and nine do not. No relation was found between the manifestation of this rule and the place, time, origin and different versions of the Hippocratic Oath. Most pledges suggest not to reveal what has been seen or heard during the medical act, the same as in the Hippocratic Oath. Seven texts point out that confidentiality should be absolute and four give exceptions in connection with beneficence and justice principles and the moral duty of causing no damage to third parties. Two pledges specify protection of privacy. In conclusion, today confidentiality is considered to be a moral duty for the benefit of the patient and out of consideration for his autonomy; however, at the present time in medicine the duty of keeping absolute secrecy is being reconsidered.

  19. 10 CFR 52.157 - Contents of applications; technical information in final safety analysis report.

    Science.gov (United States)

    2010-01-01

    ...; technical information in final safety analysis report. The application must contain a final safety analysis... 10 Energy 2 2010-01-01 2010-01-01 false Contents of applications; technical information in final safety analysis report. 52.157 Section 52.157 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) LICENSES...

  20. 10 CFR 52.79 - Contents of applications; technical information in final safety analysis report.

    Science.gov (United States)

    2010-01-01

    ...; technical information in final safety analysis report. (a) The application must contain a final safety... 10 Energy 2 2010-01-01 2010-01-01 false Contents of applications; technical information in final safety analysis report. 52.79 Section 52.79 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) LICENSES...

  1. 48 CFR 1852.235-73 - Final Scientific and Technical Reports.

    Science.gov (United States)

    2010-10-01

    ... 48 Federal Acquisition Regulations System 6 2010-10-01 2010-10-01 true Final Scientific and Technical Reports. 1852.235-73 Section 1852.235-73 Federal Acquisition Regulations System NATIONAL..., including recommendations and conclusions based on the experience and results obtained. The final report...

  2. Final Technical Report

    Energy Technology Data Exchange (ETDEWEB)

    Aristos Aristidou Natureworks); Robert Kean (NatureWorks); Tom Schechinger (IronHorse Farms, Mat); Stuart Birrell (Iowa State); Jill Euken (Wallace Foundation & Iowa State)

    2007-10-01

    The two main objectives of this project were: 1) to develop and test technologies to harvest, transport, store, and separate corn stover to supply a clean raw material to the bioproducts industry, and 2) engineer fermentation systems to meet performance targets for lactic acid and ethanol manufacturers. Significant progress was made in testing methods to harvest corn stover in a “single pass” harvest mode (collect corn grain and stover at the same time). This is technically feasible on small scale, but additional equipment refinements will be needed to facilitate cost effective harvest on a larger scale. Transportation models were developed, which indicate that at a corn stover yield of 2.8 tons/acre and purchase price of $35/ton stover, it would be unprofitable to transport stover more than about 25 miles; thus suggesting the development of many regional collection centers. Therefore, collection centers should be located within about 30 miles of the farm, to keep transportation costs to an acceptable level. These collection centers could then potentially do some preprocessing (to fractionate or increase bulk density) and/or ship the biomass by rail or barge to the final customers. Wet storage of stover via ensilage was tested, but no clear economic advantages were evident. Wet storage eliminates fire risk, but increases the complexity of component separation and may result in a small loss of carbohydrate content (fermentation potential). A study of possible supplier-producer relationships, concluded that a “quasi-vertical” integration model would be best suited for new bioproducts industries based on stover. In this model, the relationship would involve a multiyear supply contract (processor with purchase guarantees, producer group with supply guarantees). Price will likely be fixed or calculated based on some formula (possibly a cost plus). Initial quality requirements will be specified (but subject to refinement).Producers would invest in harvest

  3. Evaluation in a competitive utility environment: the threat of confidentiality

    International Nuclear Information System (INIS)

    Vine, Edward

    1997-01-01

    information needs and sources and revise existing policies. 2. Review process for handling confidentiality claims and revise existing policies. 3. Monitor restructuring activities. 4. Develop framework and specific guidelines. 5. Develop standards of conduct. 6. Hold workshops on confidentiality. 7. Design and implement a pilot project. 8. Establish and support consumer advocates. 9. Support more research on confidentiality. Utilities will be reluctant to support these activities and develop the new rules of the game. Regulators need to be more proactive and conduct the above activities promptly in order to avoid paralysis and inertia and to maintain the regulatory balance. The lack of a regulatory framework and specific policies for information access may only make existing problems more severe. The issue of confidentiality has broad sociopolitical dimensions. In the next few years, commissions will be asked to create information policies that will demonstrate the degree of their support for public access to utility- held information. These policies will be important since they can ''profoundly affect the manner in which an individual in a society, indeed a society itself, makes political, economic and social choices.'' Finally, in all likelihood, evaluators will need to adapt to an environment where utility data will be more difficult to obtain and disseminate. It is premature to see how increased confidentiality will affect the objectivity, usefulness, validity, and reliability of evaluations. If the evaluation community wishes to maintain the high its work, creative solutions will most needed

  4. Confidentiality and integrity in crowdsourcing systems

    CERN Document Server

    Ranj Bar, Amin

    2014-01-01

    Confidentiality and Integrity in Crowdsourcing Systems focuses on identity, privacy, and security related issues in crowdsourcing systems and in particular the confidentiality and integrity of online data created via crowdsourcing. This book begins with an introduction to crowdsourcing and then covers the privacy and security challenges of Confidentiality. The book examines integrity in these systems and the management and control of crowdsourcing systems.

  5. A challenge to unqualified medical confidentiality.

    Science.gov (United States)

    Bozzo, Alexander

    2018-04-01

    Medical personnel sometimes face a seeming conflict between a duty to respect patient confidentiality and a duty to warn or protect endangered third parties. The conventional answer to dilemmas of this sort is that, in certain circumstances, medical professionals have an obligation to breach confidentiality. Kenneth Kipnis has argued, however, that the conventional wisdom on the nature of medical confidentiality is mistaken. Kipnis argues that the obligation to respect patient confidentiality is unqualified or absolute, since unqualified policies can save more lives in the long run. In this paper, I identify the form of Kipnis's argument and present a challenge to it. I conclude that, as matters stand now, a qualified confidentiality policy is the more rational choice. © Article author(s) (or their employer(s) unless otherwise stated in the text of the article) 2018. All rights reserved. No commercial use is permitted unless otherwise expressly granted.

  6. DOE final technical report 3/1997 to 2/2005

    International Nuclear Information System (INIS)

    Gross, Franz L.

    2005-01-01

    DOE final technical report 3/1997 to 2/2005 This grant supported basic theoretical research into the derivation (from relativistic field theories) of relativistic equations for few body systems, with practical applications to the properties of 2 and 3 nucleon systems and to the nature of few-quark systems

  7. 77 FR 47495 - Final Priority; Technical Assistance on State Data Collection, Analysis, and Reporting-National...

    Science.gov (United States)

    2012-08-08

    ... Priority; Technical Assistance on State Data Collection, Analysis, and Reporting--National IDEA Technical... 34 CFR Chapter III [CFDA Number 84.373Z] Final Priority; Technical Assistance on State Data Collection, Analysis, and Reporting--National IDEA Technical Assistance Center on Early Childhood...

  8. 22 CFR 130.15 - Confidential business information.

    Science.gov (United States)

    2010-04-01

    ..., confidential business information means commercial or financial information which by law is entitled to... 22 Foreign Relations 1 2010-04-01 2010-04-01 false Confidential business information. 130.15... CONTRIBUTIONS, FEES AND COMMISSIONS § 130.15 Confidential business information. (a) Any person who is required...

  9. Technical area status report for low-level mixed waste final waste forms

    International Nuclear Information System (INIS)

    Mayberry, J.L.; DeWitt, L.M.; Darnell, R.

    1993-08-01

    The Final Waste Forms (FWF) Technical Area Status Report (TASR) Working Group, the Vitrification Working Group (WG), and the Performance Standards Working Group were established as subgroups to the FWF Technical Support Group (TSG). The FWF TASR WG is comprised of technical representatives from most of the major DOE sites, the Nuclear Regulatory Commission (NRC), the EPA Office of Solid Waste, and the EPA's Risk Reduction Engineering Laboratory (RREL). The primary activity of the FWF TASR Working Group was to investigate and report on the current status of FWFs for LLNM in this TASR. The FWF TASR Working Group determined the current status of the development of various waste forms described above by reviewing selected articles and technical reports, summarizing data, and establishing an initial set of FWF characteristics to be used in evaluating candidate FWFS; these characteristics are summarized in Section 2. After an initial review of available information, the FWF TASR Working Group chose to study the following groups of final waste forms: hydraulic cement, sulfur polymer cement, glass, ceramic, and organic binders. The organic binders included polyethylene, bitumen, vinyl ester styrene, epoxy, and urea formaldehyde. Section 3 provides a description of each final waste form. Based on the literature review, the gaps and deficiencies in information were summarized, and conclusions and recommendations were established. The information and data presented in this TASR are intended to assist the FWF Production and Assessment TSG in evaluating the Technical Task Plans (TTPs) submitted to DOE EM-50, and thus provide DOE with the necessary information for their FWF decision-making process. This FWF TASR will also assist the DOE and the MWIP in establishing the most acceptable final waste forms for the various LLMW streams stored at DOE facilities

  10. 7 CFR 1280.634 - Confidentiality.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 10 2010-01-01 2010-01-01 false Confidentiality. 1280.634 Section 1280.634 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (MARKETING... persons voting in the referendum and ballots shall be confidential and the contents of the ballots shall...

  11. 76 FR 18624 - Research, Technical Assistance and Training Programs: Notice of Final Circular

    Science.gov (United States)

    2011-04-04

    ... to FTA Circular 6100.1D, Research and Technical Assistance Training Program: Application Instructions... DEPARTMENT OF TRANSPORTATION Federal Transit Administration Research, Technical Assistance and Training Programs: Notice of Final Circular AGENCY: Federal Transit Administration (FTA), DOT. ACTION...

  12. 75 FR 24688 - Access to Confidential Business Information by Guident Technologies Inc.’s Identified Subcontractor

    Science.gov (United States)

    2010-05-05

    ... to a particular entity, consult the technical person listed under FOR FURTHER INFORMATION CONTACT. B... Information Systems and for Test Confidential Business Information Tracking Systems (CBITS) and (TCBITS). In... materials on a need-to- know basis only. All access to TSCA CBI under this contract will take place at EPA...

  13. 15 CFR 806.5 - Confidentiality.

    Science.gov (United States)

    2010-01-01

    ... 15 Commerce and Foreign Trade 3 2010-01-01 2010-01-01 false Confidentiality. 806.5 Section 806.5 Commerce and Foreign Trade Regulations Relating to Commerce and Foreign Trade (Continued) BUREAU OF ECONOMIC ANALYSIS, DEPARTMENT OF COMMERCE DIRECT INVESTMENT SURVEYS § 806.5 Confidentiality. Information...

  14. AIMES Final Technical Report

    Energy Technology Data Exchange (ETDEWEB)

    Katz, Daniel S [Univ. of Illinois, Urbana-Champaign, IL (United States). National Center for Supercomputing Applications (NCSA); Jha, Shantenu [Rutgers Univ., New Brunswick, NJ (United States); Weissman, Jon [Univ. of Minnesota, Minneapolis, MN (United States); Turilli, Matteo [Rutgers Univ., New Brunswick, NJ (United States)

    2017-01-31

    This is the final technical report for the AIMES project. Many important advances in science and engineering are due to large-scale distributed computing. Notwithstanding this reliance, we are still learning how to design and deploy large-scale production Distributed Computing Infrastructures (DCI). This is evidenced by missing design principles for DCI, and an absence of generally acceptable and usable distributed computing abstractions. The AIMES project was conceived against this backdrop, following on the heels of a comprehensive survey of scientific distributed applications. AIMES laid the foundations to address the tripartite challenge of dynamic resource management, integrating information, and portable and interoperable distributed applications. Four abstractions were defined and implemented: skeleton, resource bundle, pilot, and execution strategy. The four abstractions were implemented into software modules and then aggregated into the AIMES middleware. This middleware successfully integrates information across the application layer (skeletons) and resource layer (Bundles), derives a suitable execution strategy for the given skeleton and enacts its execution by means of pilots on one or more resources, depending on the application requirements, and resource availabilities and capabilities.

  15. NCSU reactor sharing program. Final technical report

    International Nuclear Information System (INIS)

    Perez, P.B.

    1997-01-01

    The Nuclear Reactor Program at North Carolina State University provides the PULSTAR Research Reactor and associated facilities to eligible institutions with support, in part, from the Department of Energy Reactor Sharing Program. Participation in the NCSU Reactor Sharing Program continues to increase steadily with visitors ranging from advance high school physics and chemistry students to Ph.D. level research from neighboring universities. This report is the Final Technical Report for the DOE award reference number DE-FG05-95NE38136 which covers the period September 30, 1995 through September 30, 1996

  16. Confidentiality in psychological practice: a decrepit concept?

    Science.gov (United States)

    McMahon, M; Knowles, A D

    1995-11-01

    Although the principle of confidentiality in the relationship between psychologists and client has been vaunted, and is emphasised in the Australian Psychological Society's Code of Professional Conduct (the APS code; 1994), the confidentiality of this relationship is circumscribed by the absence of legal protections, the ethical beliefs of psychologists, institutional practices, and the provisions of the APS code itself. Lack of privilege in judicial proceedings, and statutory obligations to report certain types of behaviour, mandate breaches of confidentiality in some circumstances. Ethical beliefs of psychologists may support disclosure, especially where it is believed that there is danger of serious physical harm to the client or others. Multidisciplinary teams and institutional settings require the exchange of information for optimal delivery of services. Recent amendments to the APS code may require disclosure without the client's consent when a client is believed to be suicidal. Such developments, when considered at all, are typically regarded as exceptions to a general obligation of confidentiality. However, discussion of exceptions presupposes agreement on fundamental principle: the significance of, and rationale for, confidentiality in the psychologist-client relationship. It is argued in this paper that the obligation of confidentiality has been assumed rather than vigorously analysed and empirically explored. A critical examination of this obligation is the most appropriate starting point for the rehabilitation of contemporary principles of confidentiality in the psychologist-client relationship.

  17. Computer Security: Printing confidentially

    CERN Document Server

    Stefan Lueders, Computer Security Team

    2015-01-01

    Have you ever hesitated to print a confidential document using CERN printers? Or perhaps you have rushed quickly to the printer after hitting the “print” button in order to avoid someone else getting hold of and reading your document? These times are over now with the new printing infrastructure!   Indeed, many of us regularly print out confidential documents like our salary slips, MARS forms, tendering documents and drafts of preliminary papers. The upcoming CERN data protection policy will require all of us to respect the confidentiality of such documents and, as the word “confidential” implies, access to “confidential” or sensitive documents will be tightly controlled. What can we do about the public printers located in many buildings, floors and shared spaces - accessible not only to CERN staff and users but also to visitors and guests? Some printers are located in the vicinity of restaurants, cafeterias or close to paths taken b...

  18. 7 CFR 1150.278 - Confidential treatment.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 9 2010-01-01 2009-01-01 true Confidential treatment. 1150.278 Section 1150.278 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (Marketing... of Milk Producer Organizations § 1150.278 Confidential treatment. All documents and other information...

  19. 40 CFR 716.55 - Confidentiality claims.

    Science.gov (United States)

    2010-07-01

    ... confidential business information, health and safety studies of any substance or mixture that has been offered for commercial distribution (including for test marketing purposes and for use in research and... because disclosure would reveal a confidential process or quantitative mixture composition should briefly...

  20. 7 CFR 1206.107 - Confidential information.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 10 2010-01-01 2010-01-01 false Confidential information. 1206.107 Section 1206.107 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (MARKETING... INFORMATION Referendum Procedures. § 1206.107 Confidential information. The ballots and other information or...

  1. The Confidentiality of Interlibrary Loan Records.

    Science.gov (United States)

    Nolan, Christopher W.

    1993-01-01

    Discusses potential problems for confidentiality within interlibrary loan requests, outlines legal issues related to confidentiality, and proposes guidelines intended to protect library users' rights to privacy. Interlibrary loan documentation procedures are considered; laws and professional standards are reviewed; and the disposition of…

  2. 31 CFR 9.6 - Confidential information.

    Science.gov (United States)

    2010-07-01

    ... 9.6 Money and Finance: Treasury Office of the Secretary of the Treasury EFFECTS OF IMPORTED ARTICLES ON THE NATIONAL SECURITY § 9.6 Confidential information. Information submitted in confidence which... marked “Business Confidential.” [40 FR 50717, Oct. 31, 1975] ...

  3. 15 CFR 705.6 - Confidential information.

    Science.gov (United States)

    2010-01-01

    ... EFFECT OF IMPORTED ARTICLES ON THE NATIONAL SECURITY § 705.6 Confidential information. (a) Any... the investigation that would disclose national security classified information or business... Security Classified” or “Business Confidential,” as appropriate, marked at the top of each sheet. Any...

  4. 45 CFR 61.14 - Confidentiality of Healthcare Integrity and Protection Data Bank information.

    Science.gov (United States)

    2010-10-01

    ... 45 Public Welfare 1 2010-10-01 2010-10-01 false Confidentiality of Healthcare Integrity and Protection Data Bank information. 61.14 Section 61.14 Public Welfare DEPARTMENT OF HEALTH AND HUMAN SERVICES GENERAL ADMINISTRATION HEALTHCARE INTEGRITY AND PROTECTION DATA BANK FOR FINAL ADVERSE INFORMATION ON...

  5. 7 CFR 1207.352 - Confidential treatment.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 10 2010-01-01 2010-01-01 false Confidential treatment. 1207.352 Section 1207.352 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (MARKETING... PLAN Potato Research and Promotion Plan Reports, Books, and Records § 1207.352 Confidential treatment...

  6. 7 CFR 1205.340 - Confidential treatment.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 10 2010-01-01 2010-01-01 false Confidential treatment. 1205.340 Section 1205.340 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (MARKETING... Cotton Research and Promotion Order Reports, Books, and Records § 1205.340 Confidential treatment. All...

  7. 7 CFR 1220.243 - Confidential treatment.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 10 2010-01-01 2010-01-01 false Confidential treatment. 1220.243 Section 1220.243 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (MARKETING... Confidential treatment. Except as otherwise provided in the Act, financial or commercial information that is...

  8. High energy physics research. Final technical report, 1957--1994

    International Nuclear Information System (INIS)

    Williams, H.H.

    1995-01-01

    This is the final technical report to the Department of Energy on High Energy Physics at the University of Pennsylvania. It discusses research conducted in the following areas: neutrino astrophysics and cosmology; string theory; electroweak and collider physics; supergravity; cp violation and baryogenesis; particle cosmology; collider detector at Fermilab; the sudbury neutrino observatory; B-physics; particle physics in nuclei; and advanced electronics and detector development

  9. High energy physics research. Final technical report, 1957--1994

    Energy Technology Data Exchange (ETDEWEB)

    Williams, H.H.

    1995-10-01

    This is the final technical report to the Department of Energy on High Energy Physics at the University of Pennsylvania. It discusses research conducted in the following areas: neutrino astrophysics and cosmology; string theory; electroweak and collider physics; supergravity; cp violation and baryogenesis; particle cosmology; collider detector at Fermilab; the sudbury neutrino observatory; B-physics; particle physics in nuclei; and advanced electronics and detector development.

  10. Technical approach to finalizing sensible soil cleanup levels at the Fernald Environmental Management Project

    International Nuclear Information System (INIS)

    Carr, D.; Hertel, B.; Jewett, M.; Janke, R.; Conner, B.

    1996-01-01

    The remedial strategy for addressing contaminated environmental media was recently finalized for the US Department of Energy's (DOE) Fernald Environmental Management Project (FEMP) following almost 10 years of detailed technical analysis. The FEMP represents one of the first major nuclear facilities to successfully complete the Remedial Investigation/Feasibility Study (RI/FS) phase of the environmental restoration process. A critical element of this success was the establishment of sensible cleanup levels for contaminated soil and groundwater both on and off the FEMP property. These cleanup levels were derived based upon a strict application of Comprehensive Environmental Response, Compensation, and Liability Act (CERCLA) regulations and guidance, coupled with positive input from the regulatory agencies and the local community regarding projected future land uses for the site. The approach for establishing the cleanup levels was based upon a Feasibility Study (FS) strategy that examined a bounding range of viable future land uses for the site. Within each land use, the cost and technical implications of a range of health-protective cleanup levels for the environmental media were analyzed. Technical considerations in driving these cleanup levels included: direct exposure routes to viable human receptors; cross- media impacts to air, surface water, and groundwater; technical practicality of attaining the levels; volume of affected media; impact to sensitive environmental receptors or ecosystems; and cost. This paper will discuss the technical approach used to support the finalization of the cleanup levels for the site. The final cleanup levels provide the last remaining significant piece to the puzzle of establishing a final site-wide remedial strategy for the FEMP, and positions the facility for the expedient completion of site-wide remedial activities

  11. Audit of Wolf Creek Generating Station, Unit 1 technical specifications. Final technical evaluation report

    International Nuclear Information System (INIS)

    Stromberg, H.M.

    1985-07-01

    This document was prepared for the Nuclear Regulatory Commission (NRC) to assist them in determining whether the Wolf Creek Generating Station Unit 1 Technical Specifications (T/S), which govern plant systems configurations and operations, are in conformance with the assumptions of the Final Safety Analysis Report (FSAR) as amended, the requirements of the Safety Evaluation Report (SER) as supplemented, and the Comments and Responses to the Wolf Creek Technical Specification Draft Inspection Report. A comparative audit of the FSAR as amended, the SER as supplemented, and the Draft Inspection Report was performed with the Wolf Creek T/S. Several discrepancies were identified and subsequently resolved through discussions with the cognizant NRC reviewer, NRC staff reviewers and/or utility representatives. The Wolf Creek Generating Station Unit 1 T/S, to the extent reviewed, are in conformance with the FSAR, SER, and Draft Inspection Report

  12. Confidentiality and the employee assistance program professional.

    Science.gov (United States)

    Mistretta, E F; Inlow, L B

    1991-02-01

    During the last two decades EAPs have offered employees confidential assessment, counseling, and referral. Many occupational health nurses have taken on the role of EAP professional or function as the liaison between the EAP counselor and the employee. The occupational health nurse involved in any EAP issue must adhere to the standards of confidentiality. The federal and state laws, company policy, and professional codes of ethics regarding these clients must be clearly understood, especially related to the issue of confidentiality.

  13. 78 FR 12955 - Final Requirements, Definitions, and Selection Criteria-Native American Career and Technical...

    Science.gov (United States)

    2013-02-26

    ... career and technical education programs (20 U.S.C. 2326(e)). This notice does not preclude us from... DEPARTMENT OF EDUCATION 34 CFR Chapter IV [Docket ID ED-2012-OVAE-0053] Final Requirements, Definitions, and Selection Criteria--Native American Career and Technical Education Program (NACTEP) [Catalog...

  14. 15 CFR 718.3 - Disclosure of confidential business information.

    Science.gov (United States)

    2010-01-01

    ... 15 Commerce and Foreign Trade 2 2010-01-01 2010-01-01 false Disclosure of confidential business... (Continued) BUREAU OF INDUSTRY AND SECURITY, DEPARTMENT OF COMMERCE CHEMICAL WEAPONS CONVENTION REGULATIONS CONFIDENTIAL BUSINESS INFORMATION § 718.3 Disclosure of confidential business information. (a) General...

  15. Technical planning activity: Final report

    Energy Technology Data Exchange (ETDEWEB)

    1987-01-01

    In April 1985, the US Department of Energy's (DOE's) Office of Fusion Energy commissioned the Technical Planning Activity (TPA). The purpose of this activity was to develop a technical planning methodology and prepare technical plans in support of the strategic and policy framework of the Magnetic Fusion Program Plan issued by DOE in February 1985. Although this report represents the views of only the US magnetic fusion community, it is international in scope in the sense that the technical plans contained herein describe the full scope of the tasks that are prerequisites for the commercialization of fusion energy. The TPA has developed a well-structured methodology that includes detailed definitions of technical issues, definitions of program areas and elements, statements of research and development objectives, identification of key decision points and milestones, and descriptions of facility requirements.

  16. Technical planning activity: Final report

    International Nuclear Information System (INIS)

    1987-01-01

    In April 1985, the US Department of Energy's (DOE's) Office of Fusion Energy commissioned the Technical Planning Activity (TPA). The purpose of this activity was to develop a technical planning methodology and prepare technical plans in support of the strategic and policy framework of the Magnetic Fusion Program Plan issued by DOE in February 1985. Although this report represents the views of only the US magnetic fusion community, it is international in scope in the sense that the technical plans contained herein describe the full scope of the tasks that are prerequisites for the commercialization of fusion energy. The TPA has developed a well-structured methodology that includes detailed definitions of technical issues, definitions of program areas and elements, statements of research and development objectives, identification of key decision points and milestones, and descriptions of facility requirements

  17. Technical area status report for low-level mixed waste final waste forms. Volume 1

    Energy Technology Data Exchange (ETDEWEB)

    Mayberry, J.L.; DeWitt, L.M. [Science Applications International Corp., Idaho Falls, ID (United States); Darnell, R. [EG and G Idaho, Inc., Idaho Falls, ID (United States)] [and others

    1993-08-01

    The Final Waste Forms (FWF) Technical Area Status Report (TASR) Working Group, the Vitrification Working Group (WG), and the Performance Standards Working Group were established as subgroups to the FWF Technical Support Group (TSG). The FWF TASR WG is comprised of technical representatives from most of the major DOE sites, the Nuclear Regulatory Commission (NRC), the EPA Office of Solid Waste, and the EPA`s Risk Reduction Engineering Laboratory (RREL). The primary activity of the FWF TASR Working Group was to investigate and report on the current status of FWFs for LLNM in this TASR. The FWF TASR Working Group determined the current status of the development of various waste forms described above by reviewing selected articles and technical reports, summarizing data, and establishing an initial set of FWF characteristics to be used in evaluating candidate FWFS; these characteristics are summarized in Section 2. After an initial review of available information, the FWF TASR Working Group chose to study the following groups of final waste forms: hydraulic cement, sulfur polymer cement, glass, ceramic, and organic binders. The organic binders included polyethylene, bitumen, vinyl ester styrene, epoxy, and urea formaldehyde. Section 3 provides a description of each final waste form. Based on the literature review, the gaps and deficiencies in information were summarized, and conclusions and recommendations were established. The information and data presented in this TASR are intended to assist the FWF Production and Assessment TSG in evaluating the Technical Task Plans (TTPs) submitted to DOE EM-50, and thus provide DOE with the necessary information for their FWF decision-making process. This FWF TASR will also assist the DOE and the MWIP in establishing the most acceptable final waste forms for the various LLMW streams stored at DOE facilities.

  18. The end of medical confidentiality? Patients, physicians and the state in history.

    Science.gov (United States)

    Rieder, Philip; Louis-Courvoisier, Micheline; Huber, Philippe

    2016-09-01

    Medical confidentiality has come under attack in the public sphere. In recent disasters both journalists and politicians have questioned medical confidentiality and claimed that in specific contexts physicians should be compelled to communicate data on their patients' health. The murders of innocent individuals by a suicidal pilot and a Swiss convicted criminal have generated polemical debates on the topic. In this article, historical data on medical confidentiality is used to show that medical practices of secrecy were regularly attacked in the past, and that the nature of medical confidentiality evolved through time depending on physicians' values and judgements. Our demonstration is based on three moments in history. First, at the end of the 16th century, lay authorities put pressure on physicians to disclose the names of patients suffering from syphilis. Second, in the 18th century, physicians faced constant demands for information about patients' health from relatives and friends. Third, employers and insurance companies in the 20th century requested medical data on sick employees. In these three different situations, history reveals that the concept of medical confidentiality was plastic, modelled in the first instance to defend well-to-do patients, in the second instance it was adapted to accommodate the physician's social role and, finally, to defend universal values and public health. Medical secrecy was, and is today, a medical and societal norm that is shaped collectively. Any change in its definition and enforcement was and should be the result of negotiations with all social actors concerned. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://www.bmj.com/company/products-services/rights-and-licensing/

  19. 77 FR 30512 - Native American Career and Technical Education Program; Final Waivers and Extension of Project...

    Science.gov (United States)

    2012-05-23

    ... DEPARTMENT OF EDUCATION Native American Career and Technical Education Program; Final Waivers and... American Career and Technical Education Program Catalog of Federal Domestic Assistance (CFDA) Number: 84... and Technical Education Program (NACTEP), the Secretary waives 34 CFR 75.250 and 75.261(c)(2) in order...

  20. 19 CFR 181.121 - Maintenance of confidentiality.

    Science.gov (United States)

    2010-04-01

    ... 181.121 Customs Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY; DEPARTMENT OF THE TREASURY (CONTINUED) NORTH AMERICAN FREE TRADE AGREEMENT Confidentiality of Business... possession of confidential business information collected pursuant to this part shall, in accordance with...

  1. Law and ethics in conflict over confidentiality?

    Science.gov (United States)

    Dickens, B M; Cook, R J

    2000-09-01

    Ethical principles that require the preservation of patients' confidential information are reinforced by principles found in several areas of law, such as law on contracts, negligence, defamation and fiduciary duty. However, laws sometimes compel disclosures of medical confidences, and more often may justify or excuse disclosures. Legally contentious issues concern patients' confidences regarding possible unlawful conduct, such as pregnancy termination, and the risk of spread of HIV and other infections. This article reviews the various legal bases of the duty of confidentiality, and legal challenges to the ethical obligation of non-disclosure. It addresses the justifications and limits of exchange of patients' health information among healthcare professionals and trainees, and considers legally recognized limits of confidential duties, and the scope of legitimate disclosure. An underlying theme is how to determine whether physicians are ethically justified in employing the discretion the law sometimes affords them to breach patients' expectations of confidentiality.

  2. "Type Ia Supernovae: Tools for Studying Dark Energy" Final Technical Report

    Energy Technology Data Exchange (ETDEWEB)

    Woosley, Stan [Lick Observatory, San Jose, CA (United States); Kasen, Dan [Univ. of California, Berkeley, CA (United States)

    2017-05-10

    Final technical report for project "Type Ia Supernovae: Tools for the Study of Dark Energy" awarded jointly to scientists at the University of California, Santa Cruz and Berkeley, for computer modeling, theory and data analysis relevant to the use of Type Ia supernovae as standard candles for cosmology.

  3. 19 CFR 210.5 - Confidential business information.

    Science.gov (United States)

    2010-04-01

    ... 19 Customs Duties 3 2010-04-01 2010-04-01 false Confidential business information. 210.5 Section 210.5 Customs Duties UNITED STATES INTERNATIONAL TRADE COMMISSION INVESTIGATIONS OF UNFAIR PRACTICES IN IMPORT TRADE ADJUDICATION AND ENFORCEMENT Rules of General Applicability § 210.5 Confidential...

  4. Key technical issues associated with a method of pulse compression. Final technical report

    International Nuclear Information System (INIS)

    Hunter, R.O. Jr.

    1980-06-01

    Key technical issues for angular multiplexing as a method of pulse compression in a 100 KJ KrF laser have been studied. Environmental issues studied include seismic vibrations man-made vibrations, air propagation, turbulence, and thermal gradient-induced density fluctuations. These studies have been incorporated in the design of mirror mounts and an alignment system, both of which are reported. A design study and performance analysis of the final amplifier have been undertaken. The pulse compression optical train has been designed and assessed as to its performance. Individual components are described and analytical relationships between the optical component size, surface quality, damage threshold and final focus properties are derived. The optical train primary aberrations are obtained and a method for aberration minimization is presented. Cost algorithms for the mirrors, mounts, and electrical hardware are integrated into a cost model to determine system costs as a function of pulse length, aperture size, and spot size

  5. The Michigan high-level radioactive waste program: Final technical progress report

    International Nuclear Information System (INIS)

    1987-01-01

    This report comprises the state of Michigan's final technical report on the location of a proposed high-level radioactive waste disposal site. Included are a list of Michigan's efforts to review the DOE proposal and a detailed report on the application of geographic information systems analysis techniques to the review process

  6. Final Technical Report, Wind Generator Project (Ann Arbor)

    Energy Technology Data Exchange (ETDEWEB)

    Geisler, Nathan [City of Ann Arbor, MI (United States)

    2017-03-20

    A Final Technical Report (57 pages) describing educational exhibits and devices focused on wind energy, and related outreach activities and programs. Project partnership includes the City of Ann Arbor, MI and the Ann Arbor Hands-on Museum, along with additional sub-recipients, and U.S. Department of Energy/Office of Energy Efficiency and Renewable Energy (EERE). Report relays key milestones and sub-tasks as well as numerous graphics and images of five (5) transportable wind energy demonstration devices and five (5) wind energy exhibits designed and constructed between 2014 and 2016 for transport and use by the Ann Arbor Hands-on Museum.

  7. Iowa Hill Pumped Storage Project Investigations - Final Technical Report

    Energy Technology Data Exchange (ETDEWEB)

    Hanson, David [Sacramento Municipal Unitlity District, Sacramento, CA (United States)

    2016-07-01

    This Final Technical Report is a summary of the activities and outcome of the Department of Energy (DOE) Assistance Agreement DE-EE0005414 with the Sacramento Municipal Utility District (SMUD). The Assistance Agreement was created in 2012 to support investigations into the Iowa Hill Pumped-storage Project (Project), a new development that would add an additional 400 MW of capacity to SMUD’s existing 688MW Upper American River Hydroelectric Project (UARP) in the Sierra Nevada mountains east of Sacramento, California.

  8. Admiralty Inlet Pilot Tidal Project Final Technical Report

    Energy Technology Data Exchange (ETDEWEB)

    Collar, Craig [Public Utility District No. 1 of Snohomish County, Everett, WA (United States)

    2015-09-14

    This document represents the final report for the Admiralty Inlet Pilot Tidal Project, located in Puget Sound, Washington, United States. The Project purpose was to license, permit, and install a grid-connected deep-water tidal turbine array (two turbines) to be used as a platform to gather operational and environmental data on tidal energy generation. The data could then be used to better inform the viability of commercial tidal energy generation from technical, economic, social, and environmental standpoints. This data would serve as a critical step towards the responsible advancement of commercial scale tidal energy in the United States and around the world. In late 2014, Project activities were discontinued due to escalating costs, and the DOE award was terminated in early 2015. Permitting, licensing, and engineering design activities were completed under this award. Final design, deployment, operation, and monitoring were not completed. This report discusses the results and accomplishments achieved under the subject award.

  9. 42 CFR 35.11 - Clinical records; confidential.

    Science.gov (United States)

    2010-10-01

    ... EXAMINATIONS HOSPITAL AND STATION MANAGEMENT General § 35.11 Clinical records; confidential. A complete clinical record shall be maintained for each patient admitted to a station or hospital of the Service. Such... 42 Public Health 1 2010-10-01 2010-10-01 false Clinical records; confidential. 35.11 Section 35.11...

  10. 77 FR 30514 - Native Hawaiian Career and Technical Education Program; Final Waiver and Extension of Project Period

    Science.gov (United States)

    2012-05-23

    ... DEPARTMENT OF EDUCATION Native Hawaiian Career and Technical Education Program; Final Waiver and... Career and Technical Education Program Catalog of Federal Domestic Assistance (CFDA) Number: 84.259A... Technical Education Program (NHCTEP), the Secretary hereby waives 34 CFR 75.261(c)(2) in order to extend the...

  11. Conversion of invisible metal-organic frameworks to luminescent perovskite nanocrystals for confidential information encryption and decryption.

    Science.gov (United States)

    Zhang, Congyang; Wang, Bo; Li, Wanbin; Huang, Shouqiang; Kong, Long; Li, Zhichun; Li, Liang

    2017-10-31

    Traditional smart fluorescent materials, which have been attracting increasing interest for security protection, are usually visible under either ambient or UV light, making them adverse to the potential application of confidential information protection. Herein, we report an approach to realize confidential information protection and storage based on the conversion of lead-based metal-organic frameworks (MOFs) to luminescent perovskite nanocrystals (NCs). Owing to the invisible and controlled printable characteristics of lead-based MOFs, confidential information can be recorded and encrypted by MOF patterns, which cannot be read through common decryption methods. Through our conversion strategy, highly luminescent perovskite NCs can be formed quickly and simply by using a halide salt trigger that reacts with the MOF, thus promoting effective information decryption. Finally, through polar solvents impregnation and halide salt conversion, the luminescence of the perovskite NCs can be quenched and recovered, leading to reversible on/off switching of the luminescence signal for multiple information encryption and decryption processes.

  12. 37 CFR 260.4 - Confidential information and statements of account.

    Science.gov (United States)

    2010-07-01

    ... Confidential information and statements of account. (a) For purposes of this part, confidential information shall include statements of account and any information pertaining to the statements of account... included on the statement of account. (d) Access to the confidential information pertaining to the royalty...

  13. Final Technical Report

    Energy Technology Data Exchange (ETDEWEB)

    Schuur, Edward [Northern Arizona Univ., Flagstaff, AZ (United States); Luo, Yiqi [Univ. of Oklahoma, Norman, OK (United States)

    2016-12-01

    This final grant report is a continuation of the final grant report submitted for DE-SC0006982 as the Principle Investigator (Schuur) relocated from the University of Florida to Northern Arizona University. This report summarizes the original project goals, as well as includes new project activities that were completed in the final period of the project.

  14. Is patient confidentiality compromised with the electronic health record?: a position paper.

    Science.gov (United States)

    Wallace, Ilse M

    2015-02-01

    In order for electronic health records to fulfill their expected benefits, protection of privacy of patient information is key. Lack of trust in confidentiality can lead to reluctance in disclosing all relevant information, which could have grave consequences. This position paper contemplates whether patient confidentiality is compromised by electronic health records. The position that confidentiality is compromised was supported by the four bioethical principles and argued that despite laws and various safeguards to protect patients' confidentiality, numerous data breaches have occurred. The position that confidentiality is not compromised was supported by virtue ethics and a utilitarian viewpoint and argued that safeguards keep information confidential and the public feels relatively safe with the electronic health record. The article concludes with an ethically superior position that confidentiality is compromised with the electronic health record. Although organizational and governmental ways of enhancing the confidentiality of patient information within the electronic health record facilitate confidentiality, the ultimate responsibility of maintaining confidentiality rests with the individual end-users and their ethical code of conduct. The American Nurses Association Code of Ethics for nurses calls for nurses to be watchful with data security in electronic communications.

  15. Characterization of the radon source in North-Central Florida. Final report part 1 -- Final project report; Final report part 2 -- Technical report

    International Nuclear Information System (INIS)

    1997-01-01

    This report contains two separate parts: Characterization of the Radon Source in North-Central Florida (final report part 1 -- final project report); and Characterization of the Radon Source in North-Central Florida (technical report). The objectives were to characterize the radon 222 source in a region having a demonstrated elevated indoor radon potential and having geology, lithology, and climate that are different from those in other regions of the U.S. where radon is being studied. Radon availability and transport in this region were described. Approaches for predicting the radon potential of lands in this region were developed

  16. Can you keep a secret? Confidentiality in psychotherapy.

    Science.gov (United States)

    Younggren, Jeffrey N; Harris, Eric A

    2008-05-01

    Confidentiality is the secret-keeping duty that arises from the establishment of the professional relationship psychologists develop with their clients. It is a duty created by the professional relationship, it is set forth in the American Psychological Association's (2002) Ethical Principles and Code of Conduct, and it is codified in many state regulations. However, the difference between confidentiality and legal privilege; how, why, and when it can be violated; and the reasons for so doing are not well understood by many practitioners. While on the surface confidentiality might seem to be an easy concept to apply to professional practice, in fact it is quite complex and filled with exceptions that frequently differ from circumstance to circumstance and from state to state. A lack of respect for and a lack of familiarity with the significance of these exceptions could have dire professional consequences. This article reviews the ethical imperative of confidentiality and then provides examples of legal cases that help to better understand its complexity. Then, we offer strategies designed to help metal health practitioners when they are confronted with questions regarding confidentiality and privilege.

  17. Protecting Privacy and Confidentiality in Environmental Health Research.

    Science.gov (United States)

    Resnik, David B

    2010-01-01

    Environmental health researchers often need to make difficult decisions on how to protect privacy and confidentiality when they conduct research in the home or workplace. These dilemmas are different from those normally encountered in clinical research. Although protecting privacy and confidentiality is one of the most important principles of research involving human subjects, it can be overridden to prevent imminent harm to individuals or if required by law. Investigators should carefully consider the facts and circumstances and use good judgment when deciding whether to breach privacy or confidentiality.

  18. Clean Energy Works Oregon Final Technical Report

    Energy Technology Data Exchange (ETDEWEB)

    Jacob, Andria [City of Portland; Cyr, Shirley [Clean Energy Works

    2013-12-31

    In April 2010, the City of Portland received a $20 million award from the U.S. Department of Energy, as part of the Energy Efficiency and Conservation Block Grant program. This award was appropriated under the American Recovery and Reinvestment Act (ARRA), passed by President Obama in 2009. DOE’s program became known as the Better Buildings Neighborhood Program (BBNP). The BBNP grant objectives directed the City of Portland Bureau of Planning and Sustainability (BPS) as the primary grantee to expand the BPS-led pilot program, Clean Energy Works Portland, into Clean Energy Works Oregon (CEWO), with the mission to deliver thousands of home energy retrofits, create jobs, save energy and reduce carbon dioxide emissions.The Final Technical Report explores the successes and lessons learned from the first 3 years of program implementation.

  19. Energy Impact Illinois - Final Technical Report

    Energy Technology Data Exchange (ETDEWEB)

    Olson, Daniel [Senior Energy Efficiency Planner; Plagman, Emily [Senior Energy Planner; Silberhorn, Joey-Lin [Energy Efficiency Program Assistant

    2014-02-18

    Energy Impact Illinois (EI2) is an alliance of government organizations, nonprofits, and regional utility companies led by the Chicago Metropolitan Agency for Planning (CMAP) that is dedicated to helping communities in the Chicago metropolitan area become more energy efficient. Originally organized as the Chicago Region Retrofit Ramp-Up (CR3), EI2 became part of the nationwide Better Buildings Neighborhood Program (BBNP) in May 2010 after receiving a $25 million award from the U.S. Department of Energy (DOE) authorized through the American Recovery and Reinvestment Act of 2009 (ARRA). The program’s primary goal was to fund initiatives that mitigate barriers to energy efficiency retrofitting activities across residential, multifamily, and commercial building sectors in the seven-county CMAP region and to help to build a sustainable energy efficiency marketplace. The EI2 Final Technical Report provides a detailed review of the strategies, implementation methods, challenges, lessons learned, and final results of the EI2 program during the initial grant period from 2010-2013. During the program period, EI2 successfully increased direct retrofit activity in the region and was able to make a broader impact on the energy efficiency market in the Chicago region. As the period of performance for the initial grant comes to an end, EI2’s legacy raises the bar for the region in terms of helping homeowners and building owners to take action on the continually complex issue of energy efficiency.

  20. Ombuds’ corner: Confidentiality

    CERN Multimedia

    Vincent Vuillemin

    2011-01-01

    In this series, the Bulletin aims to explain the role of the Ombuds at CERN by presenting practical examples of misunderstandings that could have been resolved by the Ombuds if he had been contacted earlier. Please note that, in all the situations we present, the names are fictitious and used only to improve clarity.    Jane* came to the Ombuds to share her concerns about the actions of Mike*, one of her senior colleague supervisors, and insisted on the absolute confidentiality. The Ombuds promised to keep the information confidential following the terms of his mandate. During the discussion it appeared that the whole group was affected by the situation, spending a lot of time discussing how to resolve the problem instead of focusing on their main responsibilities. The risks for the Organization seemed very high and could possibly endanger the safety of the operations.  On one side, the Ombuds believed that it was essential to bring this matter to the attention of senior managem...

  1. Confidential benchmarking based on multiparty computation

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre; Damgård, Kasper Lyneborg; Nielsen, Kurt

    We report on the design and implementation of a system that uses multiparty computation to enable banks to benchmark their customers' confidential performance data against a large representative set of confidential performance data from a consultancy house. The system ensures that both the banks......' and the consultancy house's data stays confidential, the banks as clients learn nothing but the computed benchmarking score. In the concrete business application, the developed prototype help Danish banks to find the most efficient customers among a large and challenging group of agricultural customers with too much...... debt. We propose a model based on linear programming for doing the benchmarking and implement it using the SPDZ protocol by Damgård et al., which we modify using a new idea that allows clients to supply data and get output without having to participate in the preprocessing phase and without keeping...

  2. Client confidentiality: Perspectives of students in a healthcare ...

    African Journals Online (AJOL)

    This moral dilemma is difficult for students to circumvent and therefore this paper presents healthcare students' perspectives of confidentiality. Methods. We aimed to explore healthcare students' views and experiences of confidentiality as an ethical principle by adopting a qualitative explorative approach. Purposeful ...

  3. Physician Knowledge and Attitudes around Confidential Care for Minor Patients.

    Science.gov (United States)

    Riley, Margaret; Ahmed, Sana; Reed, Barbara D; Quint, Elisabeth H

    2015-08-01

    Minor adolescent patients have a legal right to access certain medical services confidentially without parental consent or notification. We sought to assess physicians' knowledge of these laws, attitudes around the provision of confidential care to minors, and barriers to providing confidential care. An anonymous online survey was sent to physicians in the Departments of Family Medicine, Internal Medicine-Pediatrics, Obstetrics/Gynecology, and Pediatrics at the University of Michigan. Response rate was 40% (259/650). The majority of physicians felt comfortable addressing sexual health, mental health, and substance use with adolescent patients. On average, physicians answered just over half of the legal knowledge questions correctly (mean 56.6% ± 16.7%). The majority of physicians approved of laws allowing minors to consent for confidential care (90.8% ± 1.7% approval), while substantially fewer (45.1% ± 4.5%) approved of laws allowing parental notification of this care at the physician's discretion. Most physicians agreed that assured access to confidential care should be a right for adolescents. After taking the survey most physicians (76.6%) felt they needed additional training on confidentiality laws. The provision of confidential care to minors was perceived to be most inhibited by insurance issues, parental concerns/relationships with the family, and issues with the electronic medical record. Physicians are comfortable discussing sensitive issues with adolescents and generally approve of minor consent laws, but lack knowledge about what services a minor can access confidentially. Further research is needed to assess best methods to educate physicians about minors' legal rights to confidential healthcare services. Copyright © 2015 North American Society for Pediatric and Adolescent Gynecology. Published by Elsevier Inc. All rights reserved.

  4. Confidentiality: From the Stacks to the Witness Stand.

    Science.gov (United States)

    Lee, Janis M.; Smith, G. Guy

    1988-01-01

    A library director describes her experience of safeguarding the confidentiality of the circulation records of a woman who went on a shooting rampage at a shopping mall. The lawyer who represented the library discusses the legal responsibility of public and school libraries concerning confidentiality. (CLB)

  5. Final Technical Report for DE-FG02-98ER45737

    Energy Technology Data Exchange (ETDEWEB)

    Ade, Harald W.

    2018-04-24

    Final Technical Report For DOE Grant No. DE-FG02-98ER45737 Development of a Scanning Transmission X-Ray Microscope Polymer Thin Films and Self Assembled Monolayers: Pattern Formation and Surface Interactions NEXAFS Microscopy and Resonant Scattering of Polymeric Materials Organic Heterojunction Devices: Structure, Composition, and Performance at <20 nm Resolution Fundamental Science of High Open Circuit Voltage Excitonic Solar Cells Control of Interface- and Mesoscopic Structure in High Performance Organic Solar Cells: Towards a Predictive Device Paradigm

  6. 20 CFR 726.113 - Disclosure of confidential information.

    Science.gov (United States)

    2010-04-01

    ... MINE OPERATOR'S INSURANCE Authorization of Self-Insurers § 726.113 Disclosure of confidential... 20 Employees' Benefits 3 2010-04-01 2010-04-01 false Disclosure of confidential information. 726... authorized self-insurer or applicant for the authorization of self-insurance obtained by the Office shall be...

  7. Practical State Machine Replication with Confidentiality

    Energy Technology Data Exchange (ETDEWEB)

    Duan, Sisi [ORNL; Zhang, Haibin [University of North Carolina, Chapel Hill

    2016-01-01

    We study how to enable arbitrary randomized algorithms in Byzantine fault-tolerant (BFT) settings. We formalize a randomized BFT protocol and provide a simple and efficient construction that can be built on any existing BFT protocols while adding practically no overhead. We go one step further to revisit a confidential BFT protocol (Yin et al., SOSP '03). We show that their scheme is potentially susceptible to safety and confidentiality attacks. We then present a new protocol that is secure in the stronger model we formalize, by extending the idea of a randomized BFT protocol. Our protocol uses only efficient symmetric cryptography, while Yin et al.'s uses costly threshold signatures. We implemented and evaluated our protocols on microbenchmarks and real-world use cases. We show that our randomized BFT protocol is as efficient as conventional BFT protocols, and our confidential BFT protocol is two to three orders of magnitude faster than Yin et al.'s, which is less secure than ours.

  8. Summary report of the final technical meeting on 'International Reactor Dosimetry File: IRDF-2002'

    International Nuclear Information System (INIS)

    Griffin, Patrick J.; Paviotti-Corcuera, R.

    2003-10-01

    Presentations, recommendations and conclusions of the Final Technical Meeting on 'International Reactor Dosimetry File: IRDF-2002' are summarized in this report. The main aims of this meeting were to discuss scientific and technical matters related to reactor dosimetry and to assign responsibilities for the preparation of the final version of the IRDF- 2002 library and the associated TECDOC. Tasks were assigned and deadlines were agreed. Participants emphasized that accurate and complete nuclear data for reactor dosimetry are essential to improve the assessment accuracies for reactor pressure vessel service lifetimes in nuclear power plants, as well as for other neutron metrology applications such as boron neutron capture therapy, therapeutic use of medical isotopes, nuclear physics measurements, and reactor safety applications. (author)

  9. CRAC : Confidentiality risk analysis and IT-architecture comparison of business networks

    NARCIS (Netherlands)

    Morali, A.; Zambon, E.; Etalle, S.; Wieringa, R.J.

    2009-01-01

    The leakage of confidential information (e.g. industrial secrets, patient records and user credentials) is one of the risks that have to be accounted for and mitigated by organizations dealing with confidential data. Unfortunately, assessing confidentiality risk is challenging, particularly in the

  10. 29 CFR 4010.13 - Confidentiality of information submitted.

    Science.gov (United States)

    2010-07-01

    ... REPORTING AND DISCLOSURE REQUIREMENTS ANNUAL FINANCIAL AND ACTUARIAL INFORMATION REPORTING § 4010.13 Confidentiality of information submitted. In accordance with § 4901.21(a)(3) of this chapter and ERISA section... 29 Labor 9 2010-07-01 2010-07-01 false Confidentiality of information submitted. 4010.13 Section...

  11. 75 FR 75586 - Confidentiality of Suspicious Activity Reports

    Science.gov (United States)

    2010-12-03

    ...] RIN 1550-AC26 Confidentiality of Suspicious Activity Reports AGENCY: The Office of Thrift Supervision... implementing the Bank Secrecy Act (BSA) governing the confidentiality of a suspicious activity report (SAR) to... corporations regulated by the OTS, to keep certain records and make certain reports that have been determined...

  12. Final Technical Report

    Energy Technology Data Exchange (ETDEWEB)

    Eggeman, Tim [ZeaChem Inc., Lakewood, CO (United States); O' Neill, Brian [ZeaChem Inc., Lakewood, CO (United States)

    2016-08-17

    ZeaChem Inc. and US DOE successfully demonstrated the ZeaChem process for producing sugars and ethanol from high-impact biomass feedstocks. The project was executed over a 5-year period under a $31.25 million cooperative agreement (80:20 Federal:ZeaChem cost share). The project was managed by dividing it into three budget periods. Activities during Budget Period 1 were limited to planning, permitting, and other pre-construction planning. Budget Period 2 activities included engineering, procurement, construction, commissioning, start-up and initial operations through the Independent Engineer Test Runs. The scope of construction was limited to the Chem Frac and Hydrogenolysis units, as the Core Facility was already in place. Construction was complete in December 2012, and the first cellulosic ethanol was produced in February 2013. Additional operational test runs were conducted during Budget Period 3 (completed June 2015) using hybrid poplar, corn stover, and wheat straw feedstocks, resulting in the production of cellulosic ethanol and various other biorefinery intermediates. The research adds to the understanding of the Chem Frac and Hydrogenolysis technologies in that the technical performance of each unit was measured, and the resulting data and operational experience can be used as the basis for engineering designs, thus mitigating risks for deployment in future commercial facilities. The Chem Frac unit was initially designed to be operated as two-stage dilute acid hydrolysis, with first stage conditions selected to remove the hemicellulose fraction of the feedstock, and the second stage conditions selected to remove the cellulose fraction. While the Chem Frac unit met or exceeded the design capacity of 10 ton(dry)/day, the technical effectiveness of the Chem Frac unit was below expectations in its initial two-stage dilute acid configuration. The sugars yields were low, the sugars were dilute, and the sugars had poor fermentability caused by excessive inhibitors

  13. Protecting confidentiality rights: the need for an ethical practice model.

    Science.gov (United States)

    Fisher, Mary Alice

    2008-01-01

    All psychologists must uphold the same ethical standards about confidentiality even though each state imposes different legal limits on their ability to protect clients' confidences. The resulting ethical-legal confusion is exacerbated by legally based confidentiality training that treats legal exceptions as if they were the rule and fosters the impression that attorneys are now the only real experts about this aspect of practice. This article provides an ethics-based confidentiality practice model that clarifies the ethical rule and puts its legal exceptions into ethical perspective. Like the Confidentiality section of the American Psychological Association's (2002) Ethical Principles of Psychologists and Code of Conduct, this outline would apply to all psychologists regardless of state laws, but the details of its implementation would vary according to role and setting. It can be used as a universal training outline, a consultation and supervision tool, a guide to professional practice, and a basis for clearer ongoing conversation about the ethics of "conditional confidentiality." Psychologists can use this practice model to regain their status as experts about the confidentiality ethics of their own profession. PsycINFO Database Record (c) 2008 APA, all rights reserved.

  14. DE-FG02-04ER63746 FinalTechnicalReport

    Energy Technology Data Exchange (ETDEWEB)

    Lidstrom, M.E.

    2009-09-05

    This is the final technical report for a project involving the study of stress response systems in the radiation-resistant bacterium, Deinococcus radiodurans. Three stresses of importance for a mixed waste treatment strain were studied, heat shock, solvent shock, and phosphate starvation. In each case, specific genes involved in the ability to survive the stress were identified using a systems biology approach, and analysis of mutants was used to understand mechanisms. This study has led to increased understanding of the ways in which a potential treatment strain could be manipulated to survive multiple stresses for treatment of mixed wastes.

  15. Genetic secrets: Protecting privacy and confidentiality in the genetic era

    Energy Technology Data Exchange (ETDEWEB)

    Rothstein, M.A. [ed.

    1998-07-01

    Few developments are likely to affect human beings more profoundly in the long run than the discoveries resulting from advances in modern genetics. Although the developments in genetic technology promise to provide many additional benefits, their application to genetic screening poses ethical, social, and legal questions, many of which are rooted in issues of privacy and confidentiality. The ethical, practical, and legal ramifications of these and related questions are explored in depth. The broad range of topics includes: the privacy and confidentiality of genetic information; the challenges to privacy and confidentiality that may be projected to result from the emerging genetic technologies; the role of informed consent in protecting the confidentiality of genetic information in the clinical setting; the potential uses of genetic information by third parties; the implications of changes in the health care delivery system for privacy and confidentiality; relevant national and international developments in public policies, professional standards, and laws; recommendations; and the identification of research needs.

  16. Mathematics Intensive Summer Session (MISS). Final technical report

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1998-11-01

    This final technical report appears in two parts: the report for the 1995 summer MISS program and the report for the 1996 summer MISS program. Copies of the US Department of Energy Pre-Freshman Enrichment Program 1995 Entry Form and 1996 Entry Form completed by all participants were sent to the Oak Ridge Institute for Science and Education in the fall of 1995 and 1996 respectively. Those forms are on file should they be needed. Attached also is a copy of the Summary of ideas for panel discussions, problem-solving sessions, or small group discussions presented at the Department of Energy Oak Ridge Institute for Science and Education Pre-Freshman Enrichment Program Project Directors Meeting held in San Antonio, TX, November 12--14, 1995.

  17. Technical and economic assessment of solar hybrid repowering. Final report

    Energy Technology Data Exchange (ETDEWEB)

    None

    1978-09-01

    Public Service Company of New Mexico (PNM) has performed a Technical and Economic Assessment of Solar Hybrid Repowering under funding by the Department of Energy (DOE), the Electric Power Research Institute (EPRI), Western Energy Supply and Transmission (WEST) Associates, and a number of southwestern utilities. Solar hybrid repowering involves placement of solar hardware adjacent to and connected to existing gas- and oil-fueled electric generation units to displace some of or all the fossil fuel normally used during daylight hours. The subject study assesses the technical economic viability of the solar hybrid repowering concept within the southwestern United States and the PNM system. This document is a final report on the study and its results. The study was divided into the six primary tasks to allow a systematic investigation of the concept: (1) market survey and cost/benefit analysis, (2) study unit selection, (3) conceptual design and cost estimates, (4) unit economic analysis, (5) program planning, future phases, and (6) program management. Reeves Station No. 2 at Albuquerque, New Mexico, was selected for repowering with a design goal of 50 percent (25 MWe). The solar system design is based on the 10 MW solar central receiver pilot plant preliminary design for Barstow, California. SAN--1608-4-2 contains the technical drawings. (WHK)

  18. Comparison of parental and adolescent views on the confidential interview and adolescent health risk behaviors within the gynecologic setting.

    Science.gov (United States)

    Trotman, Gylynthia E; Mackey, Eleanor; Tefera, Eshetu; Gomez-Lobo, Veronica

    2018-03-23

    To explore parental and adolescent views on the confidential interview in the gynecologic setting and compare adolescent reported risk-taking behaviors with parental perception. Anonymous surveys were administered separately to parents/guardians and adolescents between the ages of 11-17. Information pertaining to the patient's Tanner stage and reason for visit was obtained from the provider. This first phase served as the usual care group. In the second phase of the study, surveys were once again distributed after a brief educational intervention. Linear regression analysis, Wilcoxon rank sum test, and Fisher exact test were used where appropriate. Pediatric and Adolescent Gynecology clinics in two tertiary hospitals INTERVENTION: Brief educational handout on key concepts of the confidential interview MAIN OUTCOME MEASURES: Parental perception of the confidential interview and adolescent risk- taking behaviors RESULTS: A total of 248 surveys were included in the final analysis, which accounts for 62 adolescent and parent/guardian pairs in each group. The majority of parents and adolescents reported perceived benefit to the confidential interview. However, parents were less likely to rate benefits of private time specifically for their own adolescent and less than half of parents believed that adolescents should have access to private time in the gynecologic setting. Both parents/guardians and adolescents feared that the confidential interview would limit the parent's ability to take part in decision-making. The low support for confidential time for their adolescent was not different in the usual care group as compared to the intervention group, although there was a trend toward parental acceptance with increased adolescent age. Adolescents were consistently more likely to report more risk-taking behaviors than their parents perceived. There is a discord between parental perception and adolescent reports of risk taking behaviors. This is coupled with a lack of

  19. 15 CFR 718.2 - Identification of confidential business information.

    Science.gov (United States)

    2010-01-01

    ... business information. 718.2 Section 718.2 Commerce and Foreign Trade Regulations Relating to Commerce and Foreign Trade (Continued) BUREAU OF INDUSTRY AND SECURITY, DEPARTMENT OF COMMERCE CHEMICAL WEAPONS CONVENTION REGULATIONS CONFIDENTIAL BUSINESS INFORMATION 718.2 Identification of confidential business...

  20. 7 CFR 1425.5 - Confidentiality.

    Science.gov (United States)

    2010-01-01

    ... AGRICULTURE LOANS, PURCHASES, AND OTHER OPERATIONS COOPERATIVE MARKETING ASSOCIATIONS § 1425.5 Confidentiality. Information submitted to CCC related to trade secrets, financial or commercial operations, or the financial...

  1. University of Maryland component of the Center for Multiscale Plasma Dynamics: Final Technical Report

    Energy Technology Data Exchange (ETDEWEB)

    Dorland, William [University of Maryland

    2014-11-18

    The Center for Multiscale Plasma Dynamics (CMPD) was a five-year Fusion Science Center. The University of Maryland (UMD) and UCLA were the host universities. This final technical report describes the physics results from the UMD CMPD.

  2. 50 CFR 600.130 - Protection of confidentiality of statistics.

    Science.gov (United States)

    2010-10-01

    ... statistics. 600.130 Section 600.130 Wildlife and Fisheries FISHERY CONSERVATION AND MANAGEMENT, NATIONAL... Fishery Management Councils § 600.130 Protection of confidentiality of statistics. Each Council must establish appropriate procedures for ensuring the confidentiality of the statistics that may be submitted to...

  3. 7 CFR 1205.540 - Confidential books, records, and reports.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 10 2010-01-01 2010-01-01 false Confidential books, records, and reports. 1205.540 Section 1205.540 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL... Confidential books, records, and reports. All information obtained from the books, records, and reports of...

  4. Improving Individual Acceptance of Health Clouds through Confidentiality Assurance.

    Science.gov (United States)

    Ermakova, Tatiana; Fabian, Benjamin; Zarnekow, Rüdiger

    2016-10-26

    Cloud computing promises to essentially improve healthcare delivery performance. However, shifting sensitive medical records to third-party cloud providers could create an adoption hurdle because of security and privacy concerns. This study examines the effect of confidentiality assurance in a cloud-computing environment on individuals' willingness to accept the infrastructure for inter-organizational sharing of medical data. We empirically investigate our research question by a survey with over 260 full responses. For the setting with a high confidentiality assurance, we base on a recent multi-cloud architecture which provides very high confidentiality assurance through a secret-sharing mechanism: Health information is cryptographically encoded and distributed in a way that no single and no small group of cloud providers is able to decode it. Our results indicate the importance of confidentiality assurance in individuals' acceptance of health clouds for sensitive medical data. Specifically, this finding holds for a variety of practically relevant circumstances, i.e., in the absence and despite the presence of conventional offline alternatives and along with pseudonymization. On the other hand, we do not find support for the effect of confidentiality assurance in individuals' acceptance of health clouds for non-sensitive medical data. These results could support the process of privacy engineering for health-cloud solutions.

  5. Final Technical Report

    Energy Technology Data Exchange (ETDEWEB)

    Bohdan W. Oppenheim; Rudolf Marloth

    2007-10-26

    Executive Summary The document contains Final Technical Report on the Industrial Assessment Center Program at Loyola Marymount University in Los Angeles, covering the contract period of 9/1/2002 to 11/30/2006, under the contract DE-FC36-02GO 12073. The Report describes six required program tasks, as follows: TASK 1 is a summary of the assessments performed over the life of the award: 77 assessments were performed, 595 AR were recommended, covering a very broad range of manufacturing plants. TASK 2 is a description of the efforts to promote and increase the adoption of assessment recommendations and employ innovative methods to assist in accomplishing these goals. The LMU IAC has been very successful in accomplishing the program goals, including implemented savings of $5,141,895 in energy, $10,045,411 in productivity and $30,719 in waste, for a total of $15,218,025. This represents 44% of the recommended savings of $34,896,392. TASK 3 is a description of the efforts promoting the IAC Program and enhancing recruitment efforts for new clients and expanded geographic coverage. LMU IAC has been very successful recruiting new clients covering Southern California. Every year, the intended number of clients was recruited. TASK 4 describes the educational opportunities, training, and other related activities for IAC students. A total of 38 students graduated from the program, including 2-3 graduate students every semester, and the remainder undergraduate students, mostly from the Mechanical Engineering Department. The students received formal weekly training in energy (75%) and productivity (25). All students underwent extensive safety training. All students praised the IAC experience very highly. TASK 5 describes the coordination and integration of the Center activities with other Center and IAC Program activities, and DOE programs. LMU IAC worked closely with MIT, and SDSU IAC and SFSU IAC, and enthusiastically supported the SEN activities. TASK 6 describes other tasks

  6. 40 CFR 790.7 - Confidentiality.

    Science.gov (United States)

    2010-07-01

    ... words “confidential business information,” “trade secret,” or another appropriate phrase indicating its... competitor use such information? How substantial would the harmful effects be? What is the causal...

  7. 13 CFR 120.1060 - Confidentiality of Reports, Risk Ratings and related Confidential Information.

    Science.gov (United States)

    2010-01-01

    ... other than SBA's Lender oversight and SBA's portfolio management purposes. An SBA Lender, Intermediary... conjunction with SBA's Lender Oversight Program and SBA's portfolio management (for purposes of this... 13 Business Credit and Assistance 1 2010-01-01 2010-01-01 false Confidentiality of Reports, Risk...

  8. Computer Security: confidentiality is everybody’s business

    CERN Multimedia

    Stefan Lueders, Computer Security Team

    2015-01-01

    Recently, a zip file with confidential information was mistakenly made public on one of CERN’s websites. Although the file was only intended for members of an internal committee, when placing it onto the CERN website, someone made a mistake when setting the access permissions and, thus, made the file accessible to everyone visiting the site!   Unfortunately, this is but one example of such mistakes. We have seen other documents made accessible to a much wider audience than originally intended… CERN takes serious measures to ensure the confidentiality of data. Confidential or “sensitive” documents (following the nomenclature set out in the CERN Data Protection Policy) deserve professional handling and access protections given only to the people who really need to access them. As such, they must not be widely circulated as attachments in e-mails and, most definitely, must not be stored on random public websites for the sole purpose of shari...

  9. Library Records: A Review of Confidentiality Laws and Policies.

    Science.gov (United States)

    Million, Angela C.; Fisher, Kim N.

    1986-01-01

    Cites the importance of having a state law, knowing what it says, and having a library policy statement regarding the confidentiality of patron records. Discussion covers writing and implementing a policy, the role of automation, existing laws, library records defined, exceptions to confidentiality, and legal liability. Thirty-seven references are…

  10. Independent consultants : fiduciary duties, trade secrets and confidential information

    International Nuclear Information System (INIS)

    Fraser, B.; Wilhelmson, M.

    1999-01-01

    Because of cutbacks and downsizing within the petroleum industry, it has become one of the largest users of contract personnel to provide services that were previously provided by senior levels of management. This paper explored the application of common law fiduciary duties and the duty of confidence to the independent workforce. It examined to what extent fiduciary duties apply to independent consultants and the best way for the employer to protect itself from the potential misuse of confidential information. Part 1 of the paper described fiduciary duties. A fiduciary relationship was described as one that possesses the following three characteristics: (1) the fiduciary has scope for the exercise of some discretion of power, (2) the fiduciary can unilaterally exercise that power to affect the beneficiary's practical interests, and (3) the beneficiary is peculiarly vulnerable to the fiduciary holding the discretion of power. Three examples of how the courts treated some arguments regarding fiduciaries were presented. Part 2 of this paper discussed how trade secrets and confidential information should be handled. It was explained, that regardless of fiduciary duties, the unauthorized use of confidential information by an independent contractor can give rise to liability and an award of damages by the courts. Some examples where the Supreme Court of Canada found breach of confidence by a party were presented. Information communicated from an employer to an employee can be divided into the following three categories: (1) publicly accessible and not confidential, (2) confidential and must be treated as such while an employee is employed, but if learned becomes part of the employees skill and knowledge, and (3) specific confidential trade secrets that cannot lawfully be used for anyone's benefit but the employer's. Issues regarding defining rights and obligations by contract were also discussed

  11. Evaluation of Routine Atmospheric Sounding Measurements using Unmanned Systems (ERASMUS): Final Technical Report

    Energy Technology Data Exchange (ETDEWEB)

    de Boer, Gijs [Univ. of Colorado, Boulder, CO (United States); Lawrence, Dale [Univ. of Colorado, Boulder, CO (United States); Palo, Scott [Univ. of Colorado, Boulder, CO (United States); Argrow, Brian [Univ. of Colorado, Boulder, CO (United States); LoDolce, Gabriel [Univ. of Colorado, Boulder, CO (United States); Curry, Nathan [Univ. of Colorado, Boulder, CO (United States); Weibel, Douglas [Univ. of Colorado, Boulder, CO (United States); Finamore, William [Univ. of Colorado, Boulder, CO (United States); D' Amore, Phillip [Univ. of Colorado, Boulder, CO (United States); Borenstein, Steven [Univ. of Colorado, Boulder, CO (United States); Nichols, Tevis [Univ. of Colorado, Boulder, CO (United States); Elston, Jack [Blackswift Technologies, Boulder, CO (United States); Ivey, Mark [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Bendure, Albert [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Schmid, Beat [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Long, Charles [Univ. of Colorado, Boulder, CO (United States); Telg, Hagen [Univ. of Colorado, Boulder, CO (United States); Gao, Ru-Shan [National Oceanic and Atmospheric Administration (NOAA), Boulder, CO (United States); Hock, Terry [National Center for Atmospheric Research, Boulder, CO (United States); Bland, Geoff [NASA Ames Research Center (ARC), Moffett Field, Mountain View, CA (United States)

    2017-03-29

    This final technical report details activities undertaken as part of the referenced project. Included is information on the preparation of aircraft for deployment to Alaska, summaries of the three deployments covered under this project, and a brief description of the dataset and science directions pursued. Additionally, we provide information on lessons learned, publications, and presentations resulting from this work.

  12. Final Technical Report for contract number DE-FG02-05ER15670

    Energy Technology Data Exchange (ETDEWEB)

    Glazebrook, Jane [Univ. of Minnesota, Minneapolis, MN (United States)

    2016-02-29

    This is the final technical report for contract number DE-FG02-05ER15670. The project is now complete, and results of the project have been published. Two papers were published based on work done in the last three-year funding period. The DOIs of these papers are included below. The abstracts of the papers, providing summaries of the work, are included in the body of the report.

  13. 5 CFR 2634.901 - Policies of confidential financial disclosure reporting.

    Science.gov (United States)

    2010-01-01

    .... (a) The confidential financial reporting system set forth in this subpart is designed to complement... Government duties involve the exercise of significant discretion in certain sensitive areas, report their... apparent conflicts of interest. The confidential financial disclosure system promotes that goal, with...

  14. Analysis of LYSA-calculus with explicit confidentiality annotations

    DEFF Research Database (Denmark)

    Gao, Han; Nielson, Hanne Riis

    2006-01-01

    Recently there has been an increased research interest in applying process calculi in the verification of cryptographic protocols due to their ability to formally model protocols. This work presents LYSA with explicit confidentiality annotations for indicating the expected behavior of target...... malicious activities performed by attackers as specified by the confidentiality annotations. The proposed analysis approach is fully automatic without the need of human intervention and has been applied successfully to a number of protocols....

  15. 5 CFR 1312.26 - Control of secret and confidential material.

    Science.gov (United States)

    2010-01-01

    ... 5 Administrative Personnel 3 2010-01-01 2010-01-01 false Control of secret and confidential... Accountability of Classified Information § 1312.26 Control of secret and confidential material. Classified... Document Control, will be used to establish accountability controls on all Secret material received or...

  16. 48 CFR 1552.235-80 - Access to confidential business information.

    Science.gov (United States)

    2010-10-01

    ... business information. 1552.235-80 Section 1552.235-80 Federal Acquisition Regulations System ENVIRONMENTAL... Clauses 1552.235-80 Access to confidential business information. As prescribed in 1535.007-70(g), insert the following clause. Access to Confidential Business Information (OCT 2000) It is not anticipated...

  17. Confidential Business Information under TSCA

    Science.gov (United States)

    This website informs businesses, policymakers, and the public about the confidential business information (CBI) provisions of § 14 of the Toxic Substances Control Act (TSCA), as amended by the Frank R. Lautenberg Chemical Safety for the 21st Century Act.

  18. Technical and logistic provisions for the delivery of radioactive wastes in the final repository Konrad

    International Nuclear Information System (INIS)

    Poeppinghaus, Jens

    2013-01-01

    The beginning of radioactive waste delivery to the final repository Konrad is planned for 2019. The main issue for the technical and logistic provisions is the development of a concept for the transport of the licensed radioactive waste containers to the site, including a turning concept for cylindrical waste forms and planning, construction and manufacture of transport equipment. Further issues include a logistic concept considering specific boundary conditions as administrative processes, priorities, special features of the delivering institutions and technical requirements of the repository.

  19. 6 CFR 25.10 - Confidentiality and protection of Intellectual Property.

    Science.gov (United States)

    2010-01-01

    ... 6 Domestic Security 1 2010-01-01 2010-01-01 false Confidentiality and protection of Intellectual Property. 25.10 Section 25.10 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY REGULATIONS TO SUPPORT ANTI-TERRORISM BY FOSTERING EFFECTIVE TECHNOLOGIES § 25.10 Confidentiality and...

  20. 42 CFR 405.215 - Confidential commercial and trade secret information.

    Science.gov (United States)

    2010-10-01

    ... 42 Public Health 2 2010-10-01 2010-10-01 false Confidential commercial and trade secret information. 405.215 Section 405.215 Public Health CENTERS FOR MEDICARE & MEDICAID SERVICES, DEPARTMENT OF... trade secret information. To the extent that CMS relies on confidential commercial or trade secret...

  1. 40 CFR 260.2 - Availability of information; confidentiality of information.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 25 2010-07-01 2010-07-01 false Availability of information; confidentiality of information. 260.2 Section 260.2 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) SOLID WASTES (CONTINUED) HAZARDOUS WASTE MANAGEMENT SYSTEM: GENERAL General § 260.2 Availability of information; confidentiality of...

  2. 48 CFR 1552.235-71 - Treatment of confidential business information.

    Science.gov (United States)

    2010-10-01

    ... business information. 1552.235-71 Section 1552.235-71 Federal Acquisition Regulations System ENVIRONMENTAL... Clauses 1552.235-71 Treatment of confidential business information. As prescribed in 1535.007-70(b... determined that in the performance of a contract, EPA may furnish confidential business information to the...

  3. 7 CFR 1280.227 - Confidentiality.

    Science.gov (United States)

    2010-01-01

    ... statistical data collected therefrom, which statements do not identify the information furnished by any person... 7 Agriculture 10 2010-01-01 2010-01-01 false Confidentiality. 1280.227 Section 1280.227 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (MARKETING...

  4. 22 CFR 1101.5 - Security, confidentiality and protection of records.

    Science.gov (United States)

    2010-04-01

    ... 22 Foreign Relations 2 2010-04-01 2010-04-01 true Security, confidentiality and protection of... Bureau of Standard's booklet “Computer Security Guidelines for Implementing the Privacy Act of 1974” (May... STATES AND MEXICO, UNITED STATES SECTION PRIVACY ACT OF 1974 § 1101.5 Security, confidentiality and...

  5. 77 FR 29935 - 2012 Technical Corrections, Clarifying and Other Amendments to the Greenhouse Gas Reporting Rule...

    Science.gov (United States)

    2012-05-21

    .... Fluorinated Gas Production..... 325120 Industrial gases manufacturing facilities. Industrial Waste Landfills... 2012 Technical Corrections, Clarifying and Other Amendments to the Greenhouse Gas Reporting Rule, and Proposed Confidentiality Determinations for Certain Data Elements of the Fluorinated Gas Source Category...

  6. 12 CFR 563g.13 - Public disclosure and confidential treatment.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 5 2010-01-01 2010-01-01 false Public disclosure and confidential treatment. 563g.13 Section 563g.13 Banks and Banking OFFICE OF THRIFT SUPERVISION, DEPARTMENT OF THE TREASURY SECURITIES OFFERINGS § 563g.13 Public disclosure and confidential treatment. (a) Any offering circular...

  7. 21 CFR 821.55 - Confidentiality.

    Science.gov (United States)

    2010-04-01

    ... permission to release, the patient's name, address, telephone number, and social security number, or other... MEDICAL DEVICE TRACKING REQUIREMENTS Records and Inspections § 821.55 Confidentiality. (a) Any patient... identify patient or research subjects shall not be available for public disclosure except as provided in...

  8. Conflicting duties over confidentiality in Argentina and Peru.

    Science.gov (United States)

    Cavallo, Mercedes

    2011-02-01

    The medical duty of confidentiality represents a key element for the provision of reproductive and sexual health services. In some Latin American countries, such as Argentina and Peru, the legal systems impose—or are interpreted as imposing—on health professionals the duty of confidentiality, but also the duty to report the commission of a public order offense that they know about owing to the practicing of their profession. In these countries, the conflicting duties and the criminalization of abortion cause severe public health and human rights problems when health professionals assist their patients for post-abortion treatment. Typically, patients are deterred from seeking prompt medical care, and their privacy, autonomy, and dignity are violated. A 2010 ruling from the Supreme Court of Argentina and a 2004 ruling from the Inter-American Court of Human Rights emerge as important instruments that grant a more adequate protection of medical confidentiality. © 2010 International Federation of Gynecology and Obstetrics. Published by Elsevier Ireland Ltd. All rights reserved.

  9. Correlated charge-changing uion-atom collisions. Final Technical Report

    International Nuclear Information System (INIS)

    John Tanis

    2005-01-01

    This document comprises the final technical report for atomic collisions research supported by DOE grant No. DE-FG02-87ER13778 from September 1, 2001 through August 31, 2004. The research involved the experimental investigation of excitation and charge-changing processes occurring in ion-atom and ion-molecule collisions. Major emphases of the study were: (1) interference effects resulting from coherent electron emission in H2, (2) production of doubly vacant K-shell (hollow ion) states due to electron correlation, and (3) formation of long-lived metastable states in electron transfer processes. During the period of the grant, this research resulted in 23 publications, 12 invited presentations, and 39 contributed presentations at national and international meetings and other institutions. Brief summaries of the completed research are presented below

  10. FERMI(at)Elettra FEL Design Technical Optimization Final Report

    International Nuclear Information System (INIS)

    Fawley, William; Penn, Gregory; Allaria, Enrico; De Ninno, Giovanni; Graves, William

    2006-01-01

    This is the final report of the FEL Design Group for the Technical Optimization Study for the FERMI(at)ELETTRA project. The FERMI(at)ELETTRA project is based on the principle of harmonic upshifting of an initial ''seed'' signal in a single pass, FEL amplifier employing multiple undulators. There are a number of FEL physics principles which underlie this approach to obtaining short wavelength output: (1) the energy modulation of the electron beam via the resonant interaction with an external laser seed (2) the use of a chromatic dispersive section to then develop a strong density modulation with large harmonic overtones (3) the production of coherent radiation by the microbunched beam in a downstream radiator. Within the context of the FERMI project, we discuss each of these elements in turn

  11. Confidentiality with Minors: The Need for Policy To Promote and Protect.

    Science.gov (United States)

    Stone, Carolyn; Isaacs, Madelyn L.

    2003-01-01

    Investigated school counselors' attitudes toward breaching confidentiality before and after the 1999 Columbine High School shootings. Surveys of demographically similar counselors indicated that the Columbine shootings affected counselors' predictions about their attitudes and behavior regarding confidentiality. Counselors were more reluctant to…

  12. 42 CFR 93.108 - Confidentiality.

    Science.gov (United States)

    2010-10-01

    ... 42 Public Health 1 2010-10-01 2010-10-01 false Confidentiality. 93.108 Section 93.108 Public Health PUBLIC HEALTH SERVICE, DEPARTMENT OF HEALTH AND HUMAN SERVICES HEALTH ASSESSMENTS AND HEALTH EFFECTS STUDIES OF HAZARDOUS SUBSTANCES RELEASES AND FACILITIES PUBLIC HEALTH SERVICE POLICIES ON RESEARCH...

  13. 40 CFR 710.58 - Confidentiality.

    Science.gov (United States)

    2010-07-01

    ...) Any person submitting information under this subpart may assert a business confidentiality claim for... with reporting under this subpart? How could a competitor use such information? Would the effects of... that your competitors do not know it is being manufactured or imported for a commercial purpose by...

  14. SIMS study on statistics and environmental factors in health. Final technical report to Department of Energy

    International Nuclear Information System (INIS)

    1982-07-01

    This final technical report to DOE consists of five individual technical reports and one working paper by members of the SIMS Study at Stanford. Research topics include testing goodness-of-fit for the distribution of errors in regression models, mathematical models of cancer and their use in risk assessment, pollutant standards index (Psi), osteosarcomas among beagles exposed to 239 Plutonium, air pollution and respiratory disease, and models of human exposure to air pollution. Individual summaries of the six reports are indexed separately

  15. Participants' safety versus confidentiality: A case study of HIV research.

    Science.gov (United States)

    Leyva-Moral, Juan Manuel; Feijoo-Cid, Maria

    2017-05-01

    Background When conducting qualitative research, participants usually share lots of personal and private information with the researcher. As researchers, we must preserve participants' identity and confidentiality of the data. Objective To critically analyze an ethical conflict encountered regarding confidentiality when doing qualitative research. Research design Case study. Findings and discussion one of the participants in a study aiming to explain the meaning of living with HIV verbalized his imminent intention to commit suicide because of stigma of other social problems arising from living with HIV. Given the life-threatening situation, the commitment related to not disclosing the participant's identity and/or the content of the interview had to be broken. To avoid or prevent suicide, the therapist in charge of the case was properly informed about the participant's intentions. One important question arises from this case: was it ethically appropriate to break the confidentiality commitment? Conclusion confidentiality could be broken if a life-threatening event is identified during data collection and participants must know that. This has to be clearly stated in the informed consent form.

  16. Final Technical Report DOE/GO/13142-1

    Energy Technology Data Exchange (ETDEWEB)

    Patrick Mulvihill; Quang Nguyen

    2010-09-15

    This research adds to the understanding of the areas of residual starch and biomass conversion to alcohol, by providing data from pilot plant equipment of larger scale than the minimum required to give commercially scalable data. Instrumentation and control is in place to capture the information produced, for economic and technical evaluation. The impact of rheology, recycle streams, and residence time distributions on the technical and economic performance can be assessed. Various processes can be compared technically and economically because the pilot plants are readily modifiable. Several technologies for residual starch yield improvement have been identified, implemented, and patent applications filed. Various biomass-to-ethanol processes have been compared and one selected for technical optimization and commercialization. The technical and economic feasibility of the current simplified biomass conversion process is being confirmed by intensive pilot plant efforts as of this writing. Optimization of the feedstock handling and pretreatment is occurring to increase the alcohol yield above the minimum commercially viable level already demonstrated. Samples of biomass residue and reactor blowdown condensate are being collected to determine the technical and economic performance of the high-water-recycle waste treatment system being considered for the process. The project is of benefit to the public because it is advancing the efforts to achieve low-cost fermentable substrates for conversion to transportation fuels. This process combines the hydrolysis of agricultural residues with novel enzymes and organisms to convert the sugars released to transportation fuels. The process development is taking place at a scale allowing commercial development to proceed at a rapid pace.

  17. Meaningful Use of a Confidential Adolescent Patient Portal.

    Science.gov (United States)

    Thompson, Lindsay A; Martinko, Thomas; Budd, Pamela; Mercado, Rebeccah; Schentrup, Anzeela M

    2016-02-01

    To design and evaluate the usage of an adolescent patient portal specifically adapted for adolescent health care needs that also satisfied institutional meaningful use guidelines regarding electronic health records. Key stakeholders at one academic health care center adopted an online portal and opted to designate a patient portal specifically for adolescents to maximize confidentiality in compliance with state privacy laws. This study analyzed aggregate electronic health record data of adolescents' (ages 12-17.9 years) uptake, usage, and functionality of this portal and compared it to parent portal usage for younger children (ages 0-11 years). Differences in means were calculated using paired t tests. The portal was used similarly between parents of young children and adolescents, with almost 1,000 enrollees in each group from September 1, 2012 to March 31, 2015. There were no gender differences in enrollment. Adolescents were less likely than parents of younger children to review appointments (73% vs. 85%), laboratory tests (67% vs. 79%), problem lists (40% vs. 78%), or allergies (45% vs. 77%, all p values adolescents sent 1,397 confidential messages. Institutional decisions for implementing meaningful use requirements can align with goals of adolescent health. Patient portals can enhance adolescent health care quality and adolescents readily use a confidential portal. Implementation of meaningful use requirements should be checked against adolescent health care needs to maximize confidentiality and promote health communication. Copyright © 2016 Society for Adolescent Health and Medicine. Published by Elsevier Inc. All rights reserved.

  18. Safeguarding Confidentiality in Electronic Health Records.

    Science.gov (United States)

    Shenoy, Akhil; Appel, Jacob M

    2017-04-01

    Electronic health records (EHRs) offer significant advantages over paper charts, such as ease of portability, facilitated communication, and a decreased risk of medical errors; however, important ethical concerns related to patient confidentiality remain. Although legal protections have been implemented, in practice, EHRs may be still prone to breaches that threaten patient privacy. Potential safeguards are essential, and have been implemented especially in sensitive areas such as mental illness, substance abuse, and sexual health. Features of one institutional model are described that may illustrate the efforts to both ensure adequate transparency and ensure patient confidentiality. Trust and the therapeutic alliance are critical to the provider-patient relationship and quality healthcare services. All of the benefits of an EHR are only possible if patients retain confidence in the security and accuracy of their medical records.

  19. 31 CFR 129.5 - Confidentiality.

    Science.gov (United States)

    2010-07-01

    ... 31 Money and Finance: Treasury 1 2010-07-01 2010-07-01 false Confidentiality. 129.5 Section 129.5 Money and Finance: Treasury Regulations Relating to Money and Finance PORTFOLIO INVESTMENT SURVEY... contain data aggregated in such a way that neither the person supplying the information nor the investor...

  20. 40 CFR 710.38 - Confidentiality.

    Science.gov (United States)

    2010-07-01

    ... submitting information under this part may assert a business confidentiality claim for the information. The... with reporting under this part? How could a competitor use such information? Would the effects of... that your competitors do not know it is being manufactured or imported for a commercial purpose by...

  1. Public expectations concerning confidentiality protection of adolescents' sexual and reproductive health care in Lithuania

    DEFF Research Database (Denmark)

    Jaruseviciene, Lina; Zaborskis, Apolinaras; Lazarus, Jeffrey Victor

    2014-01-01

    OBJECTIVE: An adolescent's right to confidential healthcare is protected by international law and professional consensus. However, parental and social support for confidential sexual and reproductive health (SRH) services, in particular, varies greatly. This study documents Lithuanian residents......' expectations with regard to confidentiality protection for adolescents in this domain, and explores the factors related to the diversity of these expectations. METHODS: Two national surveys of Lithuanian residents completed in 2005 and 2012 using anonymous questionnaires. Participants rated their expectations...... for confidentiality using a five-point Likert scale for eight types of SRH consultations. RESULTS: Public anticipation for confidentiality depended on whether issues related to sexual behaviour or to its consequences were addressed during adolescent consultation. Only younger respondents had higher expectations...

  2. THE PRINCIPLE OF CONFIDENTIALITY IN ARBITRATION. APPLICATION AND LIMITATIONS OF THE PRINCIPLE

    Directory of Open Access Journals (Sweden)

    Bazil Oglindă

    2015-11-01

    Full Text Available Over the years, arbitration has grown to be the preferred means of dispute resolution by commercial entities. One of the benefits that build the attraction for this system of dispute resolution was the principle of confidentiality. One issue that needs to be analyzed is about the reasons why confidentiality is so important in business. Confidentiality is a principle largely embraced in arbitration, but, as we will see, the principle is not an absolute one. There are a set of questions that needs to be answer to, like: Who is bound by the duty of confidentiality? Does this refer only to the parties or does it expands to other actors involved in the arbitral proceedings? What happens with the obligation of confidentiality when issues are brought before a court, taking in account the principle of open justice? We will see that in some countries are procedural laws allowing the courts to order an arbitration claim to be heard in public or in private. Another important aspect that has arisen in the last period is regarding the public policy and the protection of public interest as a limitation to confidentiality of arbitration. This is a sensitive matter especially when one of the parties is a state or a state entity. This study aims to explore the principle of confidentiality in arbitration by focusing on its domain and on its limits, both from the comparative approach and from the Romanian approach. Knowing all this aspects, we will realize the importance of having professional counseling when drafting an arbitration clause and how this can be the missing puzzle piece of your business.

  3. 41 CFR 105-60.405 - Processing requests for confidential commercial information.

    Science.gov (United States)

    2010-07-01

    ... MATERIALS 60.4-Described Records § 105-60.405 Processing requests for confidential commercial information... 41 Public Contracts and Property Management 3 2010-07-01 2010-07-01 false Processing requests for confidential commercial information. 105-60.405 Section 105-60.405 Public Contracts and Property Management...

  4. Privacy and confidentiality: perspectives of mental health consumers and carers in pharmacy settings.

    Science.gov (United States)

    Hattingh, Hendrika Laetitia; Knox, Kathy; Fejzic, Jasmina; McConnell, Denise; Fowler, Jane L; Mey, Amary; Kelly, Fiona; Wheeler, Amanda J

    2015-02-01

    The study aims to explore within the community pharmacy practice context the views of mental health stakeholders on: (1) current and past experiences of privacy, confidentiality and support; and (2) expectations and needs in relation to privacy and confidentiality. In-depth interviews and focus groups were conducted in three states in Australia, namely Queensland, the northern region of New South Wales and Western Australia, between December 2011 and March 2012. There were 98 participants consisting of consumers and carers (n = 74), health professionals (n = 13) and representatives from consumer organisations (n = 11). Participants highlighted a need for improved staff awareness. Consumers indicated a desire to receive information in a way that respects their privacy and confidentiality, in an appropriate space. Areas identified that require improved protection of privacy and confidentiality during pharmacy interactions were the number of staff having access to sensitive information, workflow models causing information exposure and pharmacies' layout not facilitating private discussions. Challenges experienced by carers created feelings of isolation which could impact on care. This study explored mental health stakeholders' experiences and expectations regarding privacy and confidentiality in the Australian community pharmacy context. A need for better pharmacy staff training about the importance of privacy and confidentiality and strategies to enhance compliance with national pharmacy practice requirements was identified. Findings provided insight into privacy and confidentiality needs and will assist in the development of pharmacy staff training material to better support consumers with sensitive conditions. © 2014 Royal Pharmaceutical Society.

  5. Mothers' attitudes toward adolescent confidential services: development and validation of scales for use in English- and Spanish-speaking populations.

    Science.gov (United States)

    Tebb, Kathleen P; Pollack, Lance M; Millstein, Shana; Otero-Sabogal, Regina; Wibbelsman, Charles J

    2014-09-01

    To explore parental beliefs and attitudes about confidential services for their teenagers; and to develop an instrument to assess these beliefs and attitudes that could be used among English and Spanish speakers. The long-term goal is to use this research to better understand and evaluate interventions to improve parental knowledge and attitudes toward their adolescent's access and utilization of comprehensive confidential health services. The instrument was developed using an extensive literature review and theoretical framework followed by qualitative data from focus groups and in-depth interviews. It was then pilot tested with a random sample of English- and Spanish-speaking parents and further revised. The final instrument was administered to a random sample of 1,000 mothers. The psychometric properties of the instrument were assessed for Spanish and English speakers. The instrument consisted of 12 scales. Most Cronbach alphas were >.70 for Spanish and English speakers. Fewer items for Spanish speakers "loaded" for the Responsibility and Communication scales. Parental Control of Health Information failed for Spanish speakers. The Parental Attitudes of Adolescent Confidential Health Services Questionnaire (PAACS-Q) contains 12 scales and is a valid and reliable instrument to assess parental knowledge and attitudes toward confidential health services for adolescents among English speakers and all but one scale was applicable for Spanish speakers. More research is needed to understand key constructs with Spanish speakers. Copyright © 2014 Society for Adolescent Health and Medicine. Published by Elsevier Inc. All rights reserved.

  6. The erosion of psychiatrist-patient confidentiality by subpoenas.

    Science.gov (United States)

    Levy, John; Galambos, Gary; Skarbek, Yvonne

    2014-08-01

    We explore the reasons for the prolific use of subpoenas to gain access to psychiatric records in Australia. We examine the applicable legal principles and practices at the New South Wales (NSW) and Commonwealth levels, aiming to develop recommendations for Australian Governments to curb the inappropriate and harmful use of subpoenas. Unfettered legal access to psychiatric records is inconsistent with professional ethical guidelines and risks undermining the provision of quality psychiatric care to the community. The existing legal provisions are failing to protect psychiatrist-patient confidentiality. In NSW, the onus is placed on the psychiatrist and/or patient to make a complicated application to the court, to direct that a subpoena be set aside on the grounds of "Professional Confidential Relationship Privilege." An absence of Commonwealth legislation to protect psychiatrist-patient confidentiality is used by some litigants in family law proceedings to disadvantage patients by stigmatising them, because they have consulted psychiatrists. We recommend that uniform legislation be implemented, giving effect to a primary rule of privilege with exceptions. © The Royal Australian and New Zealand College of Psychiatrists 2014.

  7. Improved Message Authentication and Confidentiality Checking

    International Nuclear Information System (INIS)

    Ismail Jabiullah, M.; Abdullah Al-Shamim, M.; Lutfar Rahman, M.

    2005-01-01

    The most confusing areas of the secured network communications are the message authentication and confidentiality checking. The attacks and the counter measures have become so convoluted that the users in this area begin to account for all contingencies. Two session-key generation techniques are used here to generate two separate session keys K 1 and K 2 ; and both the sender and the reveiver share these keys for higher degree of authentication and confidentiality. For this, the message is first encrypted by the key K 1 , and then the intermediary message authenticatin code (MAC) is generated by encrypting the encrypted message using the key K 2 . Then, the encrypted message and the intermediary MAC is again encrypted by using the K 2 and concatenated with the encrypted message and sent to the destination. At the receiving end, first, the received ciphertext is encrypted by using key K 2 and compared to the received MAC. The received ciphertext again is decrypted by the key K 2 and compared with the first decrypted MAC twice by the key K 2 . The plaintext is obtained by decrypting the received ciphertext first by K 2 and then by K 1 , using the corresponding decryption techniques respectively. The encryption techniques with key K 2 provides the authentication and with key K 1 provides the confidentiality checking of the transmitted message. The developed technique can be applied to both academic and commercial applications in online or offline electronic transactions for security.(authors)

  8. Access control and confidentiality in radiology

    Science.gov (United States)

    Noumeir, Rita; Chafik, Adil

    2005-04-01

    A medical record contains a large amount of data about the patient such as height, weight and blood pressure. It also contains sensitive information such as fertility, abortion, psychiatric data, sexually transmitted diseases and diagnostic results. Access to this information must be carefully controlled. Information technology has greatly improved patient care. The recent extensive deployment of digital medical images made diagnostic images promptly available to healthcare decision makers, regardless of their geographic location. Medical images are digitally archived, transferred on telecommunication networks, and visualized on computer screens. However, with the widespread use of computing and communication technologies in healthcare, the issue of data security has become increasingly important. Most of the work until now has focused on the security of data communication to ensure its integrity, authentication, confidentiality and user accountability. The mechanisms that have been proposed to achieve the security of data communication are not specific to healthcare. Data integrity can be achieved with data signature. Data authentication can be achieved with certificate exchange. Data confidentiality can be achieved with encryption. User accountability can be achieved with audits. Although these mechanisms are essential to ensure data security during its transfer on the network, access control is needed in order to ensure data confidentiality and privacy within the information system application. In this paper, we present and discuss an access control mechanism that takes into account the notion of a care process. Radiology information is categorized and a model to enforce data privacy is proposed.

  9. Technical presentation: Next Generation Oscilloscopes

    CERN Multimedia

    PH Department

    2011-01-01

      Rohde & Schwarz "Next Generation Oscilloscopes" - Introduction and Presentation Agenda: Wednesday 23 March  -  09:30 to 11:30 (open end) Bldg. 13-2-005 Language: English 09.30 Presentation "Next Generation Oscilloscopes" from Rohde & Schwarz RTO / RTM in theory and practice Gerard Walker 10.15 Technical design details from R&D Dr. Markus Freidhof 10.45 Scope and Probe Roadmap (confidential) Guido Schulze 11.00 Open Discussion Feedback, first impression, wishes, needs and requirements from CERN All 11.30 Expert Talks, Hands on All Mr. Dr. Markus Freidhof, Head of R&D Oscilloscopes, Rohde & Schwarz, Germany; Mr. Guido Schulze, ...

  10. University Student Expectations of Confidentiality When Disclosing Information to Their Professors

    Science.gov (United States)

    Harris, Gregory E.; Dalton, Stephanie

    2014-01-01

    The purpose of this study was to explore university students' expectations of confidentiality when they make disclosures to their university professors. A secondary purpose was to consider if students have a higher expectation of confidentiality when talking with Psychology professors versus professors in other disciplines. Students were asked to…

  11. 18 CFR 270.506 - Confidentiality.

    Science.gov (United States)

    2010-04-01

    ... 18 Conservation of Power and Water Resources 1 2010-04-01 2010-04-01 false Confidentiality. 270.506 Section 270.506 Conservation of Power and Water Resources FEDERAL ENERGY REGULATORY COMMISSION...) through (9) of 5 U.S.C. 552(b). (b) Upon receipt of a request for disclosure of information treated as...

  12. Privacy and Confidentiality Practices In Adolescent Family Planning Care At Federally Qualified Health Centers.

    Science.gov (United States)

    Beeson, Tishra; Mead, Katherine H; Wood, Susan; Goldberg, Debora Goetz; Shin, Peter; Rosenbaum, Sara

    2016-03-01

    The confidentiality of family planning services remains a high priority to adolescents, but barriers to implementing confidentiality and privacy practices exist in settings designed for teenagers who are medically underserved, including federally qualified health centers (FQHCs). A sample of 423 FQHCs surveyed in 2011 provided information on their use of five selected privacy and confidentiality practices, which were examined separately and combined into an index. Regression modeling was used to assess whether various state policies and organizational characteristics were associated with FQHCs' scores on the index. In-depth case studies of six FQHCs were conducted to provide additional contextual information. Among FQHCs reporting on confidentiality, most reported providing written or verbal information regarding adolescents' rights to confidential care (81%) and limiting access to family planning and medical records to protect adolescents' confidentiality (84%). Far fewer reported maintaining separate medical records for family planning (10%), using a security block on electronic medical records to prevent disclosures (43%) or using separate contact information for communications regarding family planning services (50%). Index scores were higher among FQHCs that received Title X funding than among those that did not (coefficient, 0.70) and among FQHCs with the largest patient volumes than among those with the smallest caseloads (0.43). Case studies highlighted how a lack of guidelines and providers' confusion over relevant laws present a challenge in offering confidential care to adolescents. The organizational practices used to ensure adolescent family planning confidentiality in FQHCs are varied across organizations. Copyright © 2016 by the Guttmacher Institute.

  13. DOE FINAL TECHNICAL REPORT RP

    Energy Technology Data Exchange (ETDEWEB)

    RUSS PETERMAN

    2012-01-01

    The City of Georgetown Utility Systems (GUS) patnered with the private sector, the American Public Power Association (APPA) and Southwestern University to design, construct, test and monitor a solar co-generation system directly connected to the GUS electric distribution system. This report consists of the Primary Technical Report and 3 attachments.

  14. Technical support document for the surface disposal of sewage sludge. Final report

    International Nuclear Information System (INIS)

    1992-11-01

    The document provides the technical background and justification for the U.S. Environmental Protection Agency's (EPA) final regulation (40 CFR Part 503) covering the surface disposal of sewage sludge. The document summarizes current practices in land application and presents data supporting the risk assessment methodology used to derive human health and environmental risk-based limits for contaminants in sewage sludge placed on surface disposal sites. The management practices associated with surface disposal are outlined and the different pathways by which contaminants reach highly-exposed individuals (HEIs) through surface disposal are discussed

  15. Technical support document for the surface disposal of sewage sludge. Final report

    Energy Technology Data Exchange (ETDEWEB)

    1992-11-01

    The document provides the technical background and justification for the U.S. Environmental Protection Agency's (EPA) final regulation (40 CFR Part 503) covering the surface disposal of sewage sludge. The document summarizes current practices in land application and presents data supporting the risk assessment methodology used to derive human health and environmental risk-based limits for contaminants in sewage sludge placed on surface disposal sites. The management practices associated with surface disposal are outlined and the different pathways by which contaminants reach highly-exposed individuals (HEIs) through surface disposal are discussed.

  16. Technical assistance contractor Management Plan. Final [report

    Energy Technology Data Exchange (ETDEWEB)

    1993-09-01

    The Technical Assistance Contractor (TAC) for the Uranium Mill Tailings Remedial Action (UMTRA) Project comprises Jacobs Engineering Group Inc. (JEG) and its major teaming partners [Roy F. Weston, Inc. (RFW), Sergent, Hauskins & Beckwith Agra, Inc. (SHB Agra), and Geraghty & Miller, Inc. (G&M)]. The first three companies have worked together effectively on the UMTRA Project for more than 10 years. With the initiation of the UMTRA Groundwater Project in April 1991, a need arose to increase the TAC`s groundwater technical breadth and depth, so G&M was brought in to augment the team`s capabilities. The TAC contract`s scope is to provide technical, analytical, environmental, engineering, design, inspection, and management support services to the US Department of Energy (DOE) for both surface and groundwater projects. The TAC team continues to support the DOE in completing surface remedial actions and initiating groundwater remediation work for start-up, characterization, design, construction oversight, and remedial operations. A key feature of the TAC`s management approach is the extensive set of communication systems implemented for the UMTRA Project. These systems assist all functional disciplines in performing UMTRA Project tasks associated with management, technical support, administrative support, and financial/project controls.

  17. 7 CFR 900.309 - Confidential information.

    Science.gov (United States)

    2010-01-01

    ... Conduct of Referenda To Determine Producer Approval of Milk Marketing Orders To Be Made Effective Pursuant to Agricultural Marketing Agreement Act of 1937, as Amended § 900.309 Confidential information. The... Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (Marketing...

  18. 7 CFR 1216.62 - Confidential treatment.

    Science.gov (United States)

    2010-01-01

    ... this subpart or statistical data collected therefrom, which statements do not identify the information... 7 Agriculture 10 2010-01-01 2010-01-01 false Confidential treatment. 1216.62 Section 1216.62 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (MARKETING...

  19. 7 CFR 1209.62 - Confidential treatment.

    Science.gov (United States)

    2010-01-01

    ... this subpart or statistical data collected therefrom, which statements do not identify the information... 7 Agriculture 10 2010-01-01 2010-01-01 false Confidential treatment. 1209.62 Section 1209.62 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (MARKETING...

  20. 7 CFR 929.65 - Confidential information.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 8 2010-01-01 2010-01-01 false Confidential information. 929.65 Section 929.65 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (Marketing... position, financial condition, or business operations of the particular handler from whom received, shall...

  1. 7 CFR 930.73 - Confidential information.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 8 2010-01-01 2010-01-01 false Confidential information. 930.73 Section 930.73 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (Marketing... a trade secret or disclosing trade position, financial condition, or business operations of the...

  2. Experimental Program Final Technical Progress Report: 15 February 2007 to 30 September 2012

    Energy Technology Data Exchange (ETDEWEB)

    Kinney, Edward R. [University of Colorado, Boulder, CO

    2014-09-12

    This is the final technical report of the grant DE-FG02-04ER41301 to the University of Colorado at Boulder entitled "Intermediate Energy Nuclear Physics" and describes the results of our funded activities during the period 15 February 2007 to 30 September 2012. These activities were primarily carried out at Fermilab, RHIC, and the German lab DESY. Significant advances in these experiments were carried out by members of the Colorado group and are described in detail.

  3. Technical Report - FINAL

    Energy Technology Data Exchange (ETDEWEB)

    Barbara Luke, Director, UNLV Engineering Geophysics Laboratory

    2007-04-25

    Improve understanding of the earthquake hazard in the Las Vegas Valley and to assess the state of preparedness of the area's population and structures for the next big earthquake. 1. Enhance the seismic monitoring network in the Las Vegas Valley 2. Improve understanding of deep basin structure through active-source seismic refraction and reflection testing 3. Improve understanding of dynamic response of shallow sediments through seismic testing and correlations with lithology 4. Develop credible earthquake scenarios by laboratory and field studies, literature review and analyses 5. Refine ground motion expectations around the Las Vegas Valley through simulations 6. Assess current building standards in light of improved understanding of hazards 7. Perform risk assessment for structures and infrastructures, with emphasis on lifelines and critical structures 8. Encourage and facilitate broad and open technical interchange regarding earthquake safety in southern Nevada and efforts to inform citizens of earthquake hazards and mitigation opportunities

  4. 7 CFR 1150.173 - Confidential treatment.

    Science.gov (United States)

    2010-01-01

    ... reports of the number of persons subject to this subpart or statistical data collected therefrom, which... 7 Agriculture 9 2010-01-01 2009-01-01 true Confidential treatment. 1150.173 Section 1150.173 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (Marketing...

  5. 7 CFR 1221.127 - Confidential treatment.

    Science.gov (United States)

    2010-01-01

    ... statistical data collected there from, which statements do not identify the information furnished by any... 7 Agriculture 10 2010-01-01 2010-01-01 false Confidential treatment. 1221.127 Section 1221.127 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (MARKETING...

  6. 7 CFR 1160.403 - Confidential treatment.

    Science.gov (United States)

    2010-01-01

    ... statistical data collected from such sources, which statements do not identify the information furnished by... 7 Agriculture 9 2010-01-01 2009-01-01 true Confidential treatment. 1160.403 Section 1160.403 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (Marketing...

  7. 7 CFR 1250.354 - Confidential treatment.

    Science.gov (United States)

    2010-01-01

    ... subject to this subpart or statistical data collected therefrom, which statements do not identify the... 7 Agriculture 10 2010-01-01 2010-01-01 false Confidential treatment. 1250.354 Section 1250.354 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (MARKETING...

  8. 7 CFR 1260.203 - Confidential treatment.

    Science.gov (United States)

    2010-01-01

    ... of persons subject to this subpart or statistical data collected therefrom, which statements do not... 7 Agriculture 10 2010-01-01 2010-01-01 false Confidential treatment. 1260.203 Section 1260.203 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (MARKETING...

  9. 7 CFR 1218.62 - Confidential treatment.

    Science.gov (United States)

    2010-01-01

    ... of the number of persons subject to this subpart or statistical data collected therefrom, which... 7 Agriculture 10 2010-01-01 2010-01-01 false Confidential treatment. 1218.62 Section 1218.62 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (MARKETING...

  10. 7 CFR 1215.62 - Confidential treatment.

    Science.gov (United States)

    2010-01-01

    ... persons subject to this part or statistical data collected therefrom, which statements do not identify the... 7 Agriculture 10 2010-01-01 2010-01-01 false Confidential treatment. 1215.62 Section 1215.62 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (MARKETING...

  11. 7 CFR 1210.607 - Confidential information.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 10 2010-01-01 2010-01-01 false Confidential information. 1210.607 Section 1210.607 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (MARKETING... contents and all other information or reports furnished to, compiled by, or in possession of, the...

  12. 7 CFR 1210.352 - Confidential treatment.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 10 2010-01-01 2010-01-01 false Confidential treatment. 1210.352 Section 1210.352 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (MARKETING... treatment. (a) All information obtained from the books, records, or reports required to be maintained under...

  13. 7 CFR 984.79 - Confidential information.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 8 2010-01-01 2010-01-01 false Confidential information. 984.79 Section 984.79 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (Marketing... or disclosing the trade position, or financial condition or business operations of the handler shall...

  14. 7 CFR 993.71 - Confidential information.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 8 2010-01-01 2010-01-01 false Confidential information. 993.71 Section 993.71 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (Marketing... information constituting a trade secret or disclosing of the trade position, financial condition, or business...

  15. 7 CFR 932.63 - Confidential information.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 8 2010-01-01 2010-01-01 false Confidential information. 932.63 Section 932.63 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (Marketing... from such reports and records which might affect the trade position, financial condition, or business...

  16. 7 CFR 982.70 - Confidential information.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 8 2010-01-01 2010-01-01 false Confidential information. 982.70 Section 982.70 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (Marketing... trade secret or disclosing of the trade position, financial condition, or business operations of the...

  17. 48 CFR 1552.235-76 - Treatment of Confidential Business Information (APR 1996).

    Science.gov (United States)

    2010-10-01

    ... Business Information (APR 1996). 1552.235-76 Section 1552.235-76 Federal Acquisition Regulations System... Provisions and Clauses 1552.235-76 Treatment of Confidential Business Information (APR 1996). As prescribed in 1535.007-70(c), insert the following clause: Treatment of Confidential Business Information (TSCA...

  18. An Approach to Developing Independent Learning and Non-Technical Skills Amongst Final Year Mining Engineering Students

    Science.gov (United States)

    Knobbs, C. G.; Grayson, D. J.

    2012-01-01

    There is mounting evidence to show that engineers need more than technical skills to succeed in industry. This paper describes a curriculum innovation in which so-called "soft" skills, specifically inter-personal and intra-personal skills, were integrated into a final year mining engineering course. The instructional approach was…

  19. Final Technical Report for SISGR: Ultrafast Molecular Scale Chemical Imaging

    Energy Technology Data Exchange (ETDEWEB)

    Hersam, Mark C. [Northwestern Univ., Evanston, IL (United States). Dept. of Materials Science and Engineering; Guest, Jeffrey R. [Argonne National Lab. (ANL), Argonne, IL (United States). Center for Nanoscale Materials; Guisinger, Nathan P. [Argonne National Lab. (ANL), Argonne, IL (United States). Center for Nanoscale Materials; Hla, Saw Wai [Argonne National Lab. (ANL), Argonne, IL (United States). Center for Nanoscale Materials; Schatz, George C. [Northwestern Univ., Evanston, IL (United States). Dept. of Chemistry; Seideman, Tamar [Northwestern Univ., Evanston, IL (United States). Dept. of Chemistry; Van Duyne, Richard P. [Northwestern Univ., Evanston, IL (United States). Dept. of Chemistry

    2017-04-10

    The Northwestern-Argonne SISGR program utilized newly developed instrumentation and techniques including integrated ultra-high vacuum tip-enhanced Raman spectroscopy/scanning tunneling microscopy (UHV-TERS/STM) and surface-enhanced femtosecond stimulated Raman scattering (SE-FSRS) to advance the spatial and temporal resolution of chemical imaging for the study of photoinduced dynamics of molecules on plasmonically active surfaces. An accompanying theory program addressed modeling of charge transfer processes using constrained density functional theory (DFT) in addition to modeling of SE-FSRS, thereby providing a detailed description of the excited state dynamics. This interdisciplinary and highly collaborative research resulted in 62 publications with ~ 48% of them being co-authored by multiple SISGR team members. A summary of the scientific accomplishments from this SISGR program is provided in this final technical report.

  20. 48 CFR 1552.235-70 - Screening business information for claims of confidentiality.

    Science.gov (United States)

    2010-10-01

    ... 48 Federal Acquisition Regulations System 6 2010-10-01 2010-10-01 true Screening business... Texts of Provisions and Clauses 1552.235-70 Screening business information for claims of confidentiality... proprietary or confidential by the business that has the right to the information. The following clause...

  1. 7 CFR 1212.72 - Confidential treatment.

    Science.gov (United States)

    2010-01-01

    ... statements based upon the reports of the number of persons subject to this subpart or statistical data... 7 Agriculture 10 2010-01-01 2010-01-01 false Confidential treatment. 1212.72 Section 1212.72 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (MARKETING...

  2. 7 CFR 1206.62 - Confidential treatment.

    Science.gov (United States)

    2010-01-01

    ... statements based upon the reports of the number of persons subject to this subpart or statistical data... 7 Agriculture 10 2010-01-01 2010-01-01 false Confidential treatment. 1206.62 Section 1206.62 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (MARKETING...

  3. 7 CFR 1219.63 - Confidential treatment.

    Science.gov (United States)

    2010-01-01

    ... upon the reports of the number of persons subject to this subpart or statistical data collected from... 7 Agriculture 10 2010-01-01 2010-01-01 false Confidential treatment. 1219.63 Section 1219.63 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (MARKETING...

  4. 7 CFR 983.65 - Confidential information.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 8 2010-01-01 2010-01-01 false Confidential information. 983.65 Section 983.65 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (Marketing... the particular handler or their customers shall be received by, and at all times kept in the custody...

  5. 7 CFR 996.72 - Confidential information.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 8 2010-01-01 2010-01-01 false Confidential information. 996.72 Section 996.72 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (Marketing... condition, or business operations of the particular handlers or their customers shall be received by, and at...

  6. Doctor-patient confidentiality - right and duty of a doctor in law regulations

    Directory of Open Access Journals (Sweden)

    Janusz Jaroszyński

    2018-03-01

    Full Text Available Physician’s professional secrecy is one of the most important duties of a doctor and should be provided with confidentiality regarding his or her health. Generally speaking, there is no legal definition of "physician’s professional secrecy" in Poland, although this concept already appears in the oath of Hippocrates: ‘I will keep secret anything I see or hear professionally which ought not to be told’. The issue of medical confidentiality (physician’s professional secrecy has been regulated in several legal acts such as: The Patient Rights and Patients Ombudsman Act, The Constitution of the Republic of Poland, The Medical Profession Act, The Civil Code Act, The Criminal Code Act and Code of Medical Ethics which is not considered as a legal act. The patient has the right to require confidentiality of the information concerning him and the obligation to keep medical confidentiality will apply to every representative of the medical profession, who obtained certain information by various professional activities.

  7. Confidential Declaration of Family Situation (CDFS)

    CERN Document Server

    Human Resources Department

    2005-01-01

    The Confidential Declaration of Family Situation (CDFS) becomes a new computerized EDH form from October 2005 In accordance with Article R IV 1.17 of the Staff Regulations, Staff Members and Fellows, married or separated, must notify any changes in their spouse's income or health insurance cover in writing to CERN, within 30 calendar days of the change. This is necessary for the Organization to determine if a supplementary contribution is payable to the CERN Health Insurance Scheme (CHIS) for the spouse's coverage and, if so, the amount. Until now a paper form called « Confidential Declaration of Family Situation » (CDFS) was used for that purpose.  From early October 2005 the CDFS will be computerized for the whole Organization. Henceforth, any changes in a spouse's income or health insurance cover must be notified using EDH (Electronic Document Handling). Additionally, annual updates of the declaration will be required and will be requested by automatic e-mail. Early October an email will be sent to...

  8. 48 CFR 1552.235-73 - Access to Federal Insecticide, Fungicide, and Rodenticide Act Confidential Business Information...

    Science.gov (United States)

    2010-10-01

    ... Insecticide, Fungicide, and Rodenticide Act Confidential Business Information (APR 1996). 1552.235-73 Section... Insecticide, Fungicide, and Rodenticide Act Confidential Business Information (APR 1996). As prescribed in... Act Confidential Business Information (APR 1996) In order to perform duties under the contract, the...

  9. Audit, Accountability and Confidential Enquiries into Maternal ...

    African Journals Online (AJOL)

    HP

    Time for Action: Audit, Accountability and Confidential Enquiries ... provision of quality maternity services. Having such a ... services are more likely to be sustained if women can find ..... Donabedian A. An introduction to quality assurance in.

  10. 77 FR 63537 - Greenhouse Gas Reporting Program: Proposed Amendments and Confidentiality Determinations for...

    Science.gov (United States)

    2012-10-16

    ... Greenhouse Gas Reporting Program: Proposed Amendments and Confidentiality Determinations for Subpart I...-AR61 Greenhouse Gas Reporting Program: Proposed Amendments and Confidentiality Determinations for... Manufacturing, of the Greenhouse Gas Reporting Rule. Proposed changes include revising certain calculation...

  11. Paternalistic breaches of confidentiality in prison: mental health professionals' attitudes and justifications.

    Science.gov (United States)

    Elger, Bernice Simone; Handtke, Violet; Wangmo, Tenzin

    2015-06-01

    This manuscript presents mental health practitioners' (MHPs) practice, attitudes and justifications for breaching confidentiality when imprisoned patients disclose suicidal thoughts or abuse by others. 24 MHPs working in Swiss prisons shared their experiences regarding confidentiality practices. The data were analysed qualitatively and MHPs' attitudes and course of action were identified. Analysis revealed paternalistic breaches of confidentiality. When patients reported suicidal thoughts and abuse, MHPs believed that forgoing confidentiality is necessary to protect patients, providing several justifications for it. Patients were informed that such information will be transmitted without their consent to medical and non-medical prison personnel. With reference to suicidal attempts, MHPs resorted to methods that may reduce suicidal attempts such as transfer to hospital or internal changes in living arrangements, which would require provision of certain information to prison guards. In cases of abuse, some MHPs convinced patients to accept intervention or sometimes overrode competent patients' refusals to report. Also in the case of abuse, provision of limited information to other prison personnel was seen as an acceptable method to protect patients from further harm. Breaches of confidentiality, whether limited or full, remain unethical, when used for competent patients based solely on paternalistic justifications. Institutionalising ethical and legal procedures to address suicidal and abuse situations would be helpful. Education and training to help both medical and prison personnel to respond to such situations in an appropriate manner that ensures confidentiality and protects patients from suicide and abuse are necessary. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://group.bmj.com/group/rights-licensing/permissions.

  12. 48 CFR 1552.235-75 - Access to Toxic Substances Control Act Confidential Business Information (APR 1996).

    Science.gov (United States)

    2010-10-01

    ... Control Act Confidential Business Information (APR 1996). 1552.235-75 Section 1552.235-75 Federal... Confidential Business Information (APR 1996). As prescribed in 1535.007(b), insert the following provision: Access to Toxic Substances Control Act Confidential Business Information (APR 1996) In order to perform...

  13. Encryption for confidentiality of the network and influence of this to the quality of streaming video through network

    Science.gov (United States)

    Sevcik, L.; Uhrin, D.; Frnda, J.; Voznak, M.; Toral-Cruz, Homer; Mikulec, M.; Jakovlev, Sergej

    2015-05-01

    Nowadays, the interest in real-time services, like audio and video, is growing. These services are mostly transmitted over packet networks, which are based on IP protocol. It leads to analyses of these services and their behavior in such networks which are becoming more frequent. Video has become the significant part of all data traffic sent via IP networks. In general, a video service is one-way service (except e.g. video calls) and network delay is not such an important factor as in a voice service. Dominant network factors that influence the final video quality are especially packet loss, delay variation and the capacity of the transmission links. Analysis of video quality concentrates on the resistance of video codecs to packet loss in the network, which causes artefacts in the video. IPsec provides confidentiality in terms of safety, integrity and non-repudiation (using HMAC-SHA1 and 3DES encryption for confidentiality and AES in CBC mode) with an authentication header and ESP (Encapsulating Security Payload). The paper brings a detailed view of the performance of video streaming over an IP-based network. We compared quality of video with packet loss and encryption as well. The measured results demonstrated the relation between the video codec type and bitrate to the final video quality.

  14. 30 CFR 210.40 - Will MMS keep the information I provide confidential?

    Science.gov (United States)

    2010-07-01

    ... 30 Mineral Resources 2 2010-07-01 2010-07-01 false Will MMS keep the information I provide... MINERALS REVENUE MANAGEMENT FORMS AND REPORTS General Provisions § 210.40 Will MMS keep the information I provide confidential? The MMS will treat information obtained under this part as confidential to the...

  15. DIMEC - Final Report

    DEFF Research Database (Denmark)

    Conrad, Finn

    1997-01-01

    Final report of the research project DIMEC - Danish InfoMechatronic Control supported by the Danish Technical Research Council, STVF.......Final report of the research project DIMEC - Danish InfoMechatronic Control supported by the Danish Technical Research Council, STVF....

  16. Confidential data in a competitive utility environment: A regulatory perspective

    Energy Technology Data Exchange (ETDEWEB)

    Vine, E.

    1996-08-01

    Historically, the electric utility industry has been regarded as one of the most open industries in the United States in sharing information but their reputation is being challenged by competitive energy providers, the general public, regulators, and other stakeholders. As the prospect of competition among electricity power providers has increased in recent years, many utilities have been requesting that the data they submit to their utility regulatory commissions remain confidential. Withholding utility information from the public is likely to have serious and significant policy implications with respect to: (1) consumer education, the pursuit of truth, mutual respect among parties, and social cooperation; (2) the creation of a fair market for competitive energy services; (3) the regulatory balance; (4) regional and national assessments of energy-savings opportunities; (5) research and development; and (6) evaluations of utility programs, plans, and policies. In a telephone survey of all public utility commissions (PUCs) that regulate electric and gas utilities in the U.S., we found that almost all PUCs have received requests from utility companies for data to be filed as confidential, and confidential data filings appear to have increased (both in scope and in frequency) in those states where utility restructuring is being actively discussed. The most common types of data submitted as confidential by utilities dealt with specific customer data, market data, avoided costs, and utility costs.

  17. Final Technical Report: Hydrogen Codes and Standards Outreach

    Energy Technology Data Exchange (ETDEWEB)

    Hall, Karen I.

    2007-05-12

    This project contributed significantly to the development of new codes and standards, both domestically and internationally. The NHA collaborated with codes and standards development organizations to identify technical areas of expertise that would be required to produce the codes and standards that industry and DOE felt were required to facilitate commercialization of hydrogen and fuel cell technologies and infrastructure. NHA staff participated directly in technical committees and working groups where issues could be discussed with the appropriate industry groups. In other cases, the NHA recommended specific industry experts to serve on technical committees and working groups where the need for this specific industry expertise would be on-going, and where this approach was likely to contribute to timely completion of the effort. The project also facilitated dialog between codes and standards development organizations, hydrogen and fuel cell experts, the government and national labs, researchers, code officials, industry associations, as well as the public regarding the timeframes for needed codes and standards, industry consensus on technical issues, procedures for implementing changes, and general principles of hydrogen safety. The project facilitated hands-on learning, as participants in several NHA workshops and technical meetings were able to experience hydrogen vehicles, witness hydrogen refueling demonstrations, see metal hydride storage cartridges in operation, and view other hydrogen energy products.

  18. Security without obscurity a guide to confidentiality, authentication, and integrity

    CERN Document Server

    Stapleton, JJ

    2014-01-01

    The traditional view of information security includes the three cornerstones: confidentiality, integrity, and availability; however the author asserts authentication is the third keystone. As the field continues to grow in complexity, novices and professionals need a reliable reference that clearly outlines the essentials. Security without Obscurity: A Guide to Confidentiality, Authentication, and Integrity fills this need. Rather than focusing on compliance or policies and procedures, this book takes a top-down approach. It shares the author's knowledge, insights, and observations about infor

  19. Attitude of Lithuanian residents to confidentiality of adolescent sexual and reproductive health care

    DEFF Research Database (Denmark)

    Jaruseviciene, Lina; Lazarus, Jeff; Zaborskis, Apolinaras

    2011-01-01

    To assess the attitudes of Lithuanian residents towards the protection of confidentiality in the sexual and reproductive health care of adolescents.......To assess the attitudes of Lithuanian residents towards the protection of confidentiality in the sexual and reproductive health care of adolescents....

  20. 17 CFR 200.83 - Confidential treatment procedures under the Freedom of Information Act.

    Science.gov (United States)

    2010-04-01

    ... SECURITIES AND EXCHANGE COMMISSION ORGANIZATION; CONDUCT AND ETHICS; AND INFORMATION AND REQUESTS Information... first received by the Commission (i) it is supplied segregated from information for which confidential..., 100 F Street, NE., Washington, DC 20549. The person requesting confidential treatment may supply...

  1. Confidentiality, anonymity and amnesty for midwives in distress seeking online support - Ethical?

    Science.gov (United States)

    Pezaro, Sally; Clyne, Wendy; Gerada, Clare

    2018-06-01

    Midwife health is intrinsically linked to the quality of safe patient care. To ensure safe patient care, there is a need to deliver emotional support to midwives. One option that midwives may turn to may be a confidential online intervention, instead of localised, face-to-face support. Following the Realist And MEta-narrative Evidence Syntheses: Evolving Standards publication standards, this realist synthesis approach explores the ethical considerations in permitting confidentiality, anonymity and amnesty in online interventions to support midwives in work-related psychological distress. An iterative search methodology was used to select nine papers for review. To assimilate information, papers were examined for ideas relating to ethical dimensions of online interventions to support midwives in work-related psychological distress. This review takes a narrative approach. Online interventions can support the development of insight, help seeking and open discussion. Additionally, Internet support groups can become morally persuasive in nature. Anonymity and confidentiality are both effective and therapeutic features of online interventions when used in collaboration with effective online moderation. Yet, ethical dilemmas remain where users cannot be identified. Confidentiality and anonymity remain key components of successful online interventions. However, sanctioning the corollary component of amnesty may provoke moral discomfort for those seeking immediate accountability. For others, amnesty is seen as essential for open disclosure and help seeking. Ultimately, the needs of midwives must be balanced with the requirement to protect the public and the professional reputation of midwifery. In supporting midwives online, the principles of anonymity, confidentiality and amnesty may evoke some resistance on ethical grounds. However, without offering identity protection, it may not be possible to create effective online support services for midwives. The authors of this

  2. Attitudes toward medical and genetic confidentiality in the Saudi research biobank: An exploratory survey.

    Science.gov (United States)

    Alahmad, Ghiath; Hifnawy, Tamer; Abbasi, Badaruddin; Dierickx, Kris

    2016-03-01

    Achieving a balance between giving access to information and respecting donors' confidentiality is a crucial issue for any biobank, with its large number of samples and associated information. Despite the existence of much empirical literature on confidentiality, there are too few surveys in the Middle East about the topic, particularly in the Saudi context. A survey was conducted of 200 respondents at King Abdulaziz Medical City in Riyadh, Saudi Arabia, among 5 groups of equal size, comprised of researchers, physicians, medical students, donors and laypersons, respectively. The majority of participants agreed that confidentiality is an important issue and that it is well protected in the Saudi biobank. All 5 groups showed different attitudes toward disclosing information to various third parties. They were in favor of allowing treating physicians, and to a certain extent family members, to have access to medical and genetic results from research. No significant differences were found between views on medical and genetic confidentiality. The majority of respondents agreed that confidentiality might be breached in cases with specific justified reasons. Even considering differences in religion, culture and other factors, the results of the study were consistent with those reported in the literature and research conducted in other countries. We therefore place emphasis on the importance of protecting and promoting patient/donor confidentiality and privacy. Copyright © 2016. Published by Elsevier Ireland Ltd.

  3. Technical support document for land application of sewage sludge. Volume 1. Final report

    International Nuclear Information System (INIS)

    Jones, A.; Beyer, L.; Rookwood, M.; Pacenka, J.; Bergin, J.

    1992-11-01

    The document provides the technical background and justification for the U.S. Environmental Protection Agency's (EPA) final regulation (40 CFR Part 503) covering the land application of sewage sludge. The document summarizes current practices in land application and presents data supporting the risk assessment methodology used to derive human health and environmental risk-based limits for contaminants in land applied sewage sludge. The management practices associated with land application are outlined and the different pathways by which contaminants reach highly-exposed individuals (HEIs) through land application are discussed

  4. Protecting safeguards information / Division of technical support

    International Nuclear Information System (INIS)

    2002-01-01

    This DVD contains two films representing the key aspects of the IAEA Department of Safeguards. 'Protecting Safeguards Information' is a narrative/fiction film which presents the Agency's information handling and protection measures. A security representative from a fictional nation receives a briefing on the procedures and methods used by the Department. These techniques will assure member states that the information they provide to the Agency is kept safe and confidential. 'Division of Technical Support' is a non-fiction documentary which presents a detailed look at the technical capabilities and management techniques used by the Agency in nuclear material accountancy. The film covers many aspects of safeguards equipment and techniques including: NDA and DA instruments, seals, surveillance, training, development and maintenance. Taken together, these films provide an introduction and overview to many important aspects of the IAEA Department of Safeguards. (IAEA)

  5. METHODS FOR ASSESSING SECURITY THREATS CONFIDENTIAL INFORMATION FOR THE INFORMATION AND TELECOMMUNICATIONS SYSTEMS

    Directory of Open Access Journals (Sweden)

    E. V. Belokurova

    2015-01-01

    Full Text Available The article discusses the different approaches to assessing the safety of confidential information-term for information and telecommunication systems of various pre-appreciable destination in the presence of internal and external threats to its integrity and availability. The difficulty of ensuring the security of confidential information from exposure to information and telecommunication systems of external and internal threats at the present time, is of particular relevance. This problem is confirmed by the analysis of available statistical information on the impact of threats on the security circulating in the information and telecommunications system. Leak confidential information, intellectual property, information, know-how is the result of significant material and moral damage caused to the owner of the restricted information. The paper presents the structure of the indicators and criteria shows that the most promising are analytical criteria. However, their use to assess the level of security of confidential information is difficult due to the lack of appropriate mathematical models. The complexity of the problem is that existing traditional mathematical models are not always appropriate for the stated objectives. Therefore, it is necessary to develop mathematical models designed to assess the security of confidential information and its impact on information and telecommunication system threats.

  6. Novel approach to information security management of confidential ...

    African Journals Online (AJOL)

    Novel approach to information security management of confidential and propriety information ... Journal of Fundamental and Applied Sciences ... valuable information by using steganography it can have a major impact security management.

  7. Analysis of the ethical aspects of professional confidentiality in dental practice

    Directory of Open Access Journals (Sweden)

    Cléa Adas Saliba Garbin

    2008-02-01

    Full Text Available From the point of view of deontological ethics, privacy is a moral right that patients are entitled to and it is bound to professional confidentiality. Otherwise, the information given by patients to health professionals would not be reliable and a trustable relationship could not be established. The aim of the present study was to assess, by means of questionnaires with open and closed questions, the awareness and attitudes of 100 dentists working in the city of Andradina, São Paulo State, Brazil, with respect to professional confidentiality in dental practice. Most dentists (91.43% reported to have instructed their assistants on professional confidentiality. However, 44.29% of the interviewees showed to act contradictorily as reported talking about the clinical cases of their patients to their friends or spouses. The great majority of professionals (98.57% believed that it is important to have classes on Ethics and Bioethics during graduation and, when asked about their knowledge of the penalties imposed for breach of professional confidentiality, only 48.57% of them declared to be aware of it. Only 28.57% of the interviewees affirmed to have exclusive access to the files; 67.14% reported that that files were also accessed by their secretary; 1.43% answered that their spouses also had access, and 2.86% did not answer. From the results of the present survey, it could be observed that, although dentists affirmed to be aware of professional confidentiality, their attitudes did not adhere to ethical and legal requirements. This stand of health professionals has contributed to violate professional ethics and the law itself, bringing problems both to the professional and to the patient.

  8. Analysis of the ethical aspects of professional confidentiality in dental practice.

    Science.gov (United States)

    Garbin, Cléa Adas Saliba; Garbin, Artênio José Isper; Saliba, Nemre Adas; de Lima, Daniela Coelho; de Macedo, Ana Paula Ayala

    2008-01-01

    From the point of view of deontological ethics, privacy is a moral right that patients are entitled to and it is bound to professional confidentiality. Otherwise, the information given by patients to health professionals would not be reliable and a trustable relationship could not be established. The aim of the present study was to assess, by means of questionnaires with open and closed questions, the awareness and attitudes of 100 dentists working in the city of Andradina, São Paulo State, Brazil, with respect to professional confidentiality in dental practice. Most dentists (91.43%) reported to have instructed their assistants on professional confidentiality. However, 44.29% of the interviewees showed to act contradictorily as reported talking about the clinical cases of their patients to their friends or spouses. The great majority of professionals (98.57%) believed that it is important to have classes on Ethics and Bioethics during graduation and, when asked about their knowledge of the penalties imposed for breach of professional confidentiality, only 48.57% of them declared to be aware of it. Only 28.57% of the interviewees affirmed to have exclusive access to the files; 67.14% reported that that files were also accessed by their secretary; 1.43% answered that their spouses also had access, and 2.86% did not answer. From the results of the present survey, it could be observed that, although dentists affirmed to be aware of professional confidentiality, their attitudes did not adhere to ethical and legal requirements. This stand of health professionals has contributed to violate professional ethics and the law itself, bringing problems both to the professional and to the patient.

  9. 38 CFR 1.462 - Confidentiality restrictions.

    Science.gov (United States)

    2010-07-01

    ... Sickle Cell Anemia § 1.462 Confidentiality restrictions. (a) General. The patient records to which §§ 1..., infection with the HIV, or sickle cell anemia may be acknowledged only if the patient's written consent is... with the HIV, or sickle cell anemia. (2) Any answer to a request for a disclosure of patient records...

  10. 42 CFR 2.1 - Statutory authority for confidentiality of drug abuse patient records.

    Science.gov (United States)

    2010-10-01

    ... HUMAN SERVICES GENERAL PROVISIONS CONFIDENTIALITY OF ALCOHOL AND DRUG ABUSE PATIENT RECORDS Introduction § 2.1 Statutory authority for confidentiality of drug abuse patient records. The restrictions of these regulations upon the disclosure and use of drug abuse patient records were initially authorized by section 408...

  11. Having Confidence in Therapeutic Work with Young People: Constraints and Challenges to Confidentiality

    Science.gov (United States)

    Jenkins, Peter

    2010-01-01

    Confidentiality presents particular challenges to practitioners working with young people, on account of the latter's vulnerability and emotional immaturity. Ethical codes place a key importance on confidentiality, from deontological and teleological perspectives. However, young clients may rely on a more pragmatic approach in deciding whether to…

  12. Ombuds’ corner: Open door and confidentiality

    CERN Multimedia

    Vincent Vuillemin

    2013-01-01

    For the Open Days, CERN will be transparent for all visitors. It's also the occasion to remember that the Ombuds' door is fully open every day of the year for all persons working for or on behalf of CERN.   The door is open, but as soon as it's closed for a discussion, the office becomes a place where total confidentiality is preserved. This may appear as a contradiction, no? The Ombuds is available to help everyone in all circumstances, but his clause of confidentiality prevents him from acting without the consent of his “visitors”. How can he possibly resolve the in-house conflicts in groups, or units, if all the parties do not voluntarily participate in its resolution? The answer is clear: the job of the Ombuds is to help the parties resolve their conflict by themselves. He will provide a few rules of communication, a process of mutual respect, suggest some possibilities that the parties may want to follow, and mediate the dispute so that people...

  13. Confidential Declaration of Family Situation (CDFS)

    CERN Multimedia

    Human Resources Department

    2005-01-01

    The Confidential Declaration of Family Situation (CDFS) becomes a new computerized EDH form from October 2005 In accordance with Article R IV 1.17 of the Staff Regulations, Staff Members and Fellows, married or separated, must notify any changes in their spouse's income or health insurance cover in writing to CERN, within 30 calendar days of the change. This is necessary for the Organization to determine if a supplementary contribution is payable to the CERN Health Insurance Scheme (CHIS) for the spouse's coverage and, if so, the amount. Until now a paper form called « Confidential Declaration of Family Situation » (CDFS) was used for that purpose.  From early October 2005 the CDFS will be computerized for the whole Organization. Henceforth, any changes in a spouse's income or health insurance cover must be notified using EDH (Electronic Document Handling). Additionally, annual updates of the declaration will be required and will be requested by automatic e-mail. Early October an email will be...

  14. Confidentiality, 'no blame culture' and whistleblowing, non-physician practice and accountability.

    Science.gov (United States)

    White, Stuart M

    2006-12-01

    Confidentiality is a core tenet of medical professionalism, which enables the maintenance of trust in a doctor-patient relationship. However, both the amount of personal data stored and the number of third parties who might access this data have increased dramatically in the digital age, necessitating the introduction of various national data protection acts. Paradoxically, the Freedom of Information Act 2000 allows United Kingdom citizens to access information held by public bodies, including hospitals. Furthermore, the Public Interest Disclosure Act 1998 actively protects physicians who breach their duty of confidentiality in the name of public interest ('whistleblowing'). This article explores the evolution of the law and ethics in this area, and draws attention to the difficulties in balancing confidentiality against freedom of information. In addition, the role and responsibilities of the non-physician anaesthetist are examined.

  15. Confidentiality and parental involvement in adolescent sexual and reproductive health care

    DEFF Research Database (Denmark)

    Jaruseviciene, Lina; Lazarus, Jeff; Zaborskis, Apolinaras

    2011-01-01

    AIM: We surveyed Lithuanian general practitioners' (GPs) views on the importance of confidentiality for adolescents and on their practices in informing parents about sexual and reproductive health consultations with this age group. METHODS: In this cross-sectional study, a 41-item questionnaire...... was sent to a random sample of 607 Lithuanian GPs. The purpose of this questionnaire was to gain knowledge about current practices of GPs in informing parents on the importance of confidentiality as well as in protecting the privacy of minors. GPs' knowledge of the current legal age limit...... consulting on general sexual issues, more than 70% stated that they would guarantee their minor patients confidentiality. However, when cases involved sexually transmitted infections or pregnancy, nearly the same percentage said they would inform the parents. 62.3% of GPs incorrectly believed that the law...

  16. 77 FR 1434 - Proposed Confidentiality Determinations for Data Elements Under the Mandatory Reporting of...

    Science.gov (United States)

    2012-01-10

    ... Fluorinated Gas Production....... 325120 Industrial gases manufacturing facilities. Electrical Equipment Use... Proposed Confidentiality Determinations for Data Elements Under the Mandatory Reporting of Greenhouse Gases...-proposes confidentiality determinations for the data elements under the Mandatory Greenhouse Gas Reporting...

  17. 7 CFR 983.9 - Confidential data or information.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 8 2010-01-01 2010-01-01 false Confidential data or information. 983.9 Section 983.9 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (Marketing... customers. ...

  18. 18 CFR 706.410 - Confidentiality of statements.

    Science.gov (United States)

    2010-04-01

    ... use of information on the statements shall be limited to that necessary to carry out the purposes of... EMPLOYEE RESPONSIBILITIES AND CONDUCT Statements of Employment and Financial Interests § 706.410 Confidentiality of statements. Each statement of employment and financial interests, and each supplementary...

  19. Zerber: r-Confidential Indexing for Distributed Documents

    NARCIS (Netherlands)

    Zerr, Sergej; Demidova, Elena; Olmedilla, Daniel; Nejdl, Wolfgang; Winslett, Marianne; Mitra, Soumyadeb

    2008-01-01

    Zerr, S., Demidova, E., Olmedilla, D., Nejdl, W., Winslett, M., & Mitra, S. (2008). Zerber: r-Confidential Indexing for Distributed Documents. In J. Teubner (Eds.), Proceedings of the 11th International Conference on Extending Database Technology (pp. 287-298). March, 25-29, 2008, Nantes, France.

  20. 19 CFR 210.72 - Confidentiality of information.

    Science.gov (United States)

    2010-04-01

    ... 19 Customs Duties 3 2010-04-01 2010-04-01 false Confidentiality of information. 210.72 Section 210.72 Customs Duties UNITED STATES INTERNATIONAL TRADE COMMISSION INVESTIGATIONS OF UNFAIR PRACTICES IN IMPORT TRADE ADJUDICATION AND ENFORCEMENT Enforcement Procedures and Advisory Opinions § 210.72...

  1. ML Confidential : machine learning on encrypted data

    NARCIS (Netherlands)

    Graepel, T.; Lauter, K.; Naehrig, M.

    2012-01-01

    We demonstrate that by using a recently proposed somewhat homomorphic encryption (SHE) scheme it is possible to delegate the execution of a machine learning (ML) algorithm to a compute service while retaining confidentiality of the training and test data. Since the computational complexity of the

  2. Ethics in health care: confidentiality and information technologies

    African Journals Online (AJOL)

    information could result in confidential patient data falling ... Before the advent of the new communication and information technologies (NCITs), patient care was sometimes delayed .... computer system intended to be used and the security.

  3. Final Technical Progress Report: Development of Low-Cost Suspension Heliostat; December 7, 2011 - December 6, 2012

    Energy Technology Data Exchange (ETDEWEB)

    Bender, W.

    2013-01-01

    Final technical progress report of SunShot Incubator Solaflect Energy. The project succeeded in demonstrating that the Solaflect Suspension Heliostat design is viable for large-scale CSP installations. Canting accuracy is acceptable and is continually improving as Solaflect improves its understanding of this design. Cost reduction initiatives were successful, and there are still many opportunities for further development and further cost reduction.

  4. Confidentiality of Accounting Academics: Consequences of Nonconformity

    Science.gov (United States)

    Amponsah, Emmanuel B.; Boateng, Peter Agyekum; Onuoha, Luke N.

    2016-01-01

    This paper examined ways by which nonconformity to confidentiality among accounting academics could lead to increased-recruitment-and-legal-costs to their employing universities in Ghana that offered accounting degree programmes. With a cross-sectional design, data collected from 1,225 accountants analysed via Cronbach's alpha,…

  5. NEET-AMM Final Technical Report on Laser Direct Manufacturing (LDM) for Nuclear Power Components

    International Nuclear Information System (INIS)

    Anderson, Scott; Baca, Georgina; O'Connor, Michael

    2015-01-01

    Final technical report summarizes the program progress and technical accomplishments of the Laser Direct Manufacturing (LDM) for Nuclear Power Components project. A series of experiments varying build process parameters (scan speed and laser power) were conducted at the outset to establish the optimal build conditions for each of the alloys. Fabrication was completed in collaboration with Quad City Manufacturing Laboratory (QCML). The density of all sample specimens was measured and compared to literature values. Optimal build process conditions giving fabricated part densities close to literature values were chosen for making mechanical test coupons. Test coupons whose principal axis is on the x-y plane (perpendicular to build direction) and on the z plane (parallel to build direction) were built and tested as part of the experimental build matrix to understand the impact of the anisotropic nature of the process.. Investigations are described 316L SS, Inconel 600, 718 and 800 and oxide dispersion strengthed 316L SS (Yttria) alloys.

  6. NEET-AMM Final Technical Report on Laser Direct Manufacturing (LDM) for Nuclear Power Components

    Energy Technology Data Exchange (ETDEWEB)

    Anderson, Scott [Lockheed Martin Corporation, Denver, CO (United States). Space Systems Company; Baca, Georgina [Lockheed Martin Corporation, Denver, CO (United States). Space Systems Company; O' Connor, Michael [Lockheed Martin Corporation, Denver, CO (United States). Space Systems Company

    2015-12-31

    Final technical report summarizes the program progress and technical accomplishments of the Laser Direct Manufacturing (LDM) for Nuclear Power Components project. A series of experiments varying build process parameters (scan speed and laser power) were conducted at the outset to establish the optimal build conditions for each of the alloys. Fabrication was completed in collaboration with Quad City Manufacturing Laboratory (QCML). The density of all sample specimens was measured and compared to literature values. Optimal build process conditions giving fabricated part densities close to literature values were chosen for making mechanical test coupons. Test coupons whose principal axis is on the x-y plane (perpendicular to build direction) and on the z plane (parallel to build direction) were built and tested as part of the experimental build matrix to understand the impact of the anisotropic nature of the process.. Investigations are described 316L SS, Inconel 600, 718 and 800 and oxide dispersion strengthed 316L SS (Yttria) alloys.

  7. 16 CFR 312.8 - Confidentiality, security, and integrity of personal information collected from children.

    Science.gov (United States)

    2010-01-01

    ... 16 Commercial Practices 1 2010-01-01 2010-01-01 false Confidentiality, security, and integrity of... COMMISSION REGULATIONS UNDER SPECIFIC ACTS OF CONGRESS CHILDREN'S ONLINE PRIVACY PROTECTION RULE § 312.8 Confidentiality, security, and integrity of personal information collected from children. The operator must...

  8. 15 CFR Supplement No. 1 to Part 718 - Confidential Business Information Declared or Reported *

    Science.gov (United States)

    2010-01-01

    ... 15 Commerce and Foreign Trade 2 2010-01-01 2010-01-01 false Confidential Business Information... Commerce and Foreign Trade (Continued) BUREAU OF INDUSTRY AND SECURITY, DEPARTMENT OF COMMERCE CHEMICAL WEAPONS CONVENTION REGULATIONS CONFIDENTIAL BUSINESS INFORMATION Pt. 718, Supp. 1 Supplement No. 1 to Part...

  9. Rekonstruksi Pengaturan Confidential Principle bagi Komunikasi pada Mediasi Sengketa Perdata di Indonesia: Studi Perbandingan dengan Praktik di Amerika Serikat

    Directory of Open Access Journals (Sweden)

    I Gusti Ngurah Parikesit

    2016-04-01

    Full Text Available Peran mediasi sebagai penyelesaian sengketa alternatif untuk sengketa perdata yang semakin populer digunakan pada praktiknya belum berjalan maksimal. Salah satu penyebabnya adalah kekaburan pengaturan prinsip kerahasiaan confidential principle bagi komunikasi yang terjadi pada proses mediasi. Aturan hukum di Indonesia hanya menjelaskan bahwa mediasi dilangsungkan berdasarkan pada asas tertutup dan mediator berkewajiban menjaga kerahasiaan, baik dalam bentuk perkataan maupun catatan, yang terungkap pada mediasi. Sebagai perbandingan, aturan hukum di Amerika Serikat sudah diatur bahwa segala bentuk komunikasi yang terjadi dan berhubungan dengan pelaksanaan mediasi tunduk pada confidential principle, sehingga proses komunikasi mendapatkan hak istimewa (privilege dengan tidak dapat dijadikan barang bukti dan seluruh pihak yang terlibat dalam mediasi tidak dapat dijadikan saksi pada persidangan berikutnya. Dengan demikian, dibutuhkan rekonstruksi pengaturan terkait ruang lingkup komunikasi pada proses mediasi yang terkualifikasi sebagai confidential principle pengaturan terkait pelepasan hak istimewa komunikasi dari confidential principle; dan pengaturan terkait pengecualian terhadap komunikasi yang terkualifikasi sebagai confidential principle Abstract Although being popular, the role of mediation in resolving civil disputes is yet to be maximalized. One of the reasons is the the vague regulation concerning the confidential principle for communication in mediation. The existing regulation in Indonesia only explains that mediation is undertaken based on closed principle and the mediator is obliged to maintain confidentiality the confidentiality of any communication, either in oral or written forms, revealed during mediation. Whereas in comparison, the regulation in the United States of America stipulates that all forms of communications occured during mediation or is made for purposes of conducting or participating in mediation are subjects to the

  10. 30 CFR 291.111 - How does MMS treat the confidential information I provide?

    Science.gov (United States)

    2010-07-01

    ... 30 Mineral Resources 2 2010-07-01 2010-07-01 false How does MMS treat the confidential information... SHELF LANDS ACT § 291.111 How does MMS treat the confidential information I provide? (a) Any person who provides documents under this part in response to a request by MMS to inform a decision on whether open...

  11. 40 CFR 370.64 - What information can I claim as trade secret or confidential?

    Science.gov (United States)

    2010-07-01

    ... secret or confidential? 370.64 Section 370.64 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY... secret or confidential? (a) Trade secrets. You may be able to withhold the name of a specific chemical... trade secret. The requirements for withholding trade secret information are set forth in EPCRA section...

  12. 31 CFR 31.217 - Confidentiality of information.

    Science.gov (United States)

    2010-07-01

    ... 31 Money and Finance: Treasury 1 2010-07-01 2010-07-01 false Confidentiality of information. 31.217 Section 31.217 Money and Finance: Treasury Office of the Secretary of the Treasury TROUBLED ASSET... from a source other than the retained entity. (b) Prohibitions. The retained entity shall not: (1...

  13. 12 CFR 404.7 - Confidential business information.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 4 2010-01-01 2010-01-01 false Confidential business information. 404.7 Section 404.7 Banks and Banking EXPORT-IMPORT BANK OF THE UNITED STATES INFORMATION DISCLOSURE Procedures... involved, a general description of the related U.S. exports, and the country to which such exports are...

  14. Technical basis for the ITER final design report, cost review and safety analysis (FDR)

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1998-12-01

    The ITER final design report, cost review and safety analysis (FDR) is the 4th major milestone, representing the progress made in the ITER Engineering Design Activities. With the approval of the Detailed Design Report (DDR), the design work was concentrated on the requirements of operation, with only relatively minor changes to design concepts of major components. The FDR is the culmination of almost 6 years collaborative design and supporting technical work by the ITER Joint Central Team and Home Teams under the terms of the ITER EDA Agreement. Refs, figs, tabs

  15. Technical basis for the ITER final design report, cost review and safety analysis (FDR)

    International Nuclear Information System (INIS)

    1998-01-01

    The ITER final design report, cost review and safety analysis (FDR) is the 4th major milestone, representing the progress made in the ITER Engineering Design Activities. With the approval of the Detailed Design Report (DDR), the design work was concentrated on the requirements of operation, with only relatively minor changes to design concepts of major components. The FDR is the culmination of almost 6 years collaborative design and supporting technical work by the ITER Joint Central Team and Home Teams under the terms of the ITER EDA Agreement

  16. Technical review of externalities issues. Final report

    International Nuclear Information System (INIS)

    Niemeyer, V.

    1994-12-01

    Externalities has become the catchword for a major experiment in electric utility regulation. Together with increased competition as a means for economic regulation, this experiment represents a potential revolution in how electric utilities are regulated. It is very important for utilities and policy makers to understand the technical issues and arguments driving the externality experiment. This Technical Review presents four papers covering topics in economics that may play important roles in this revolution. The four papers are: Economic Issues in the Application of Externalities to Electricity Resource Selection; Climate Change, the Marginal Cost of Carbon Dioxide Emissions and the Implications for Carbon Dioxide Emissions Adders; Positive Externalities and Benefits from Electricity; and Socioeconomic Effects of Externality Adders for Electric Utility Emissions

  17. Building Trust and Confidentiality in Cloud computing Distributed ...

    African Journals Online (AJOL)

    new technology, this new way of doing business brings with it new challenges, ... In this paper, we looked at data security, described the current state of data ... has the potential to solve many threats concerning confidentiality and adoption of

  18. Effective verification of confidentiality for multi-threaded programs

    NARCIS (Netherlands)

    Ngo, Minh Tri; Stoelinga, Mariëlle Ida Antoinette; Huisman, Marieke

    2014-01-01

    This paper studies how confidentiality properties of multi-threaded programs can be verified efficiently by a combination of newly developed and existing model checking algorithms. In particular, we study the verification of scheduler-specific observational determinism (SSOD), a property that

  19. Privacy Perspectives for Online Searchers: Confidentiality with Confidence?

    Science.gov (United States)

    Duberman, Josh; Beaudet, Michael

    2000-01-01

    Presents issues and questions involved in online privacy from the information professional's perspective. Topics include consumer concerns; query confidentiality; securing computers from intrusion; electronic mail; search engines; patents and intellectual property searches; government's role; Internet service providers; database mining; user…

  20. [Confidentiality in HIV-infection/AIDS--a comment on the Communicable Disease Control Act].

    Science.gov (United States)

    Frich, J C

    1995-05-10

    The new Communicable Diseases Control Act has come into force in Norway. It makes it compulsory for a physician to warn a third party if it is obvious that a HIV-positive patient, with a high degree of certainty, puts the third party at risk of being infected with HIV. Some philosophers characterize medical confidentiality as an intransigent and absolute obligation, others as a prima facie duty. This article supports the latter view, but the author still argues that strict conditions have to be fulfilled before a physician should consider breaking medical confidentiality: The doctor must try repeatedly to gain the consent or co-operation of the patient involved. Possible negative long-term consequences for the preventive HIV-work support strict medical confidentiality.

  1. 19 CFR 201.6 - Confidential business information.

    Science.gov (United States)

    2010-04-01

    ...) of a type for which there is a clear and compelling need to withhold from disclosure. Special rules... the right to appeal to the Commission. (e) Appeals from denial of confidential treatment. (1) For good cause shown, the Commission may grant an appeal from a denial by the Secretary of a request for...

  2. Technical study gas storage. Final report

    International Nuclear Information System (INIS)

    Borowka, J.; Moeller, A.; Zander, W.; Koischwitz, M.A.

    2001-01-01

    This study will answer the following questions: (a) For what uses was the storage facility designed and for what use is it currently applied? Provide an overview of the technical data per gas storage facility: for instance, what is its capacity, volume, start-up time, etc.; (b) How often has this facility been used during the past 10 years? With what purpose was the facility brought into operation at the time? How much gas was supplied at the time from the storage facility?; (c) Given the characteristics and the use of the storage facility during the past 10 years and projected gas consumption in the future, how will the storage facility be used in the future?; (d) Are there other uses for which the gas storage facility can be deployed, or can a single facility be deployed for numerous uses? What are the technical possibilities in such cases? Questions (a) and (b) are answered separately for every storage facility. Questions (c) and (d) in a single chapter each (Chapter 2 and 3). An overview of the relevant storage data relating to current use, use in the last 10 years and use in future is given in the Annex

  3. Enhanced Obfuscation Technique for Data Confidentiality in Public Cloud Storage

    Directory of Open Access Journals (Sweden)

    Oli S. Arul

    2016-01-01

    Full Text Available With an advent of cloud computing, data storage has become a boon in information technology. At the same time, data storage in remote places have become important issues. Lot of techniques are available to ensure protection of data confidentiality. These techniques do not completely serve the purpose in protecting data. The Obfuscation techniques come to rescue for protecting data from malicious attacks. This paper proposes an obfuscation technique to encrypt the desired data type on the cloud providing more protection from unknown hackers. The experimental results show that the time taken for obfuscation is low and the confidentiality percentage is high when compared with existing techniques.

  4. 15 CFR 325.16 - Protecting confidentiality of information.

    Science.gov (United States)

    2010-01-01

    ... 15 Commerce and Foreign Trade 2 2010-01-01 2010-01-01 false Protecting confidentiality of information. 325.16 Section 325.16 Commerce and Foreign Trade Regulations Relating to Commerce and Foreign Trade (Continued) INTERNATIONAL TRADE ADMINISTRATION, DEPARTMENT OF COMMERCE MISCELLANEOUS REGULATIONS...

  5. 19 CFR 210.20 - Declassification of confidential information.

    Science.gov (United States)

    2010-04-01

    ... 19 Customs Duties 3 2010-04-01 2010-04-01 false Declassification of confidential information. 210.20 Section 210.20 Customs Duties UNITED STATES INTERNATIONAL TRADE COMMISSION INVESTIGATIONS OF UNFAIR PRACTICES IN IMPORT TRADE ADJUDICATION AND ENFORCEMENT Motions § 210.20 Declassification of...

  6. Medical confidentiality versus disclosure: Ethical and legal dilemmas.

    LENUS (Irish Health Repository)

    Agyapong, V I O

    2009-02-01

    A case is described of a fifty year old single man who made disclosures about criminal sexual practices during a psychiatric assessment. In common practice with other professional men, a doctor is under a duty not to disclose, without the consent of his patient, information which he has gained in his professional capacity other than in exceptional circumstances. We discuss the ethical and legal considerations surrounding issues of medical confidentiality and the dilemma that sometimes face clinicians, when they feel obliged, in the public interest, to disclose information they have gained in confidence. Breach of confidences can have deleterious consequences; particularly for the doctor-patient relationship, but failure to disclose in some situations could have serious implications for the well-being of the wider society. Doctors should be aware of the basic principles of confidentiality and the ethical and legal framework around which they are built.

  7. Privacy, confidentiality and automated health information systems.

    Science.gov (United States)

    Vuori, H

    1977-12-01

    Professor Vuori's paper, first presented at the fourth Medico-legal Conference in Prague in the spring of this year, deals with the problem of the maintenance of confidentiality in computerized health records. Although more and more information is required, the hardware of the computer systems is so sophisticated that it would be very expensive indeed to 'break in' and steal from a modern data bank. Those concerned with programming computers are becoming more aware of their responsibilities concerning confidentiality and privacy, to the extent that a legal code of ethics for programmers is being formulated. They are also aware that the most sensitive of all relationships--the doctor-patient relationship--could be in danger if they failed to maintain high standards of integrity. An area of danger is where administrative boundaries between systems must be crossed--say between those of health and employment. Protection of privacy must be ensured by releasing full information about the type of data being stored, and by maintaining democratic control over the establishment of information systems.

  8. Confidentiality Enhancement of Highly Sensitive Nuclear Data Using Steganography with Chaotic Encryption over OFDM Channel

    International Nuclear Information System (INIS)

    Mahmoud, S.; Ayad, N.; Elsayed, F.; Elbendary, M.

    2016-01-01

    Full text: Due to the widespread usage of the internet and other wired and wireless communication methods, the security of the transmitted data has become a major requirement. Nuclear knowledge is mainly built upon the exchange of nuclear information which is considered highly sensitive information, so its security has to be enhanced by using high level security mechanisms. Data confidentiality is concerned with the achievement of higher protection for confidential information from unauthorized disclosure or access. Cryptography and steganography are famous and widely used techniques that process information in order to achieve its confidentiality, but sometimes, when used individually, they don’t satisfy a required level of security for highly sensitive data. In this paper, cryptography is accompanied with steganography for constituting a multilayer security techniques that can strengthen the level of security of highly confidential nuclear data that are archived or transmitted through different channel types and noise conditions. (author)

  9. Boundaries of confidentiality in nursing care for mother and child in HIV programmes.

    Science.gov (United States)

    Våga, Bodil Bø; Moland, Karen Marie; Blystad, Astrid

    2016-08-01

    Confidentiality lies at the core of medical ethics and is the cornerstone for developing and keeping a trusting relationship between nurses and patients. In the wake of the HIV epidemic, there has been a heightened focus on confidentiality in healthcare contexts. Nurses' follow-up of HIV-positive women and their susceptible HIV-exposed children has proved to be challenging in this regard, but the ethical dilemmas concerning confidentiality that emerge in the process of ensuring HIV-free survival of the third party - the child - have attracted limited attention. The study explores challenges of confidentiality linked to a third party in nurse-patient relationships in a rural Tanzanian HIV/AIDS context. The study was carried out in rural and semi-urban settings of Tanzania where the population is largely agro-pastoral, the formal educational level is low and poverty is rife. The HIV prevalence of 1.5% is low compared to the national prevalence of 5.1%. Data were collected during 9 months of ethnographic fieldwork and consisted of participant observation in clinical settings and during home visits combined with in-depth interviews. The main categories of informants were nurses employed in prevention of mother-to-child transmission of HIV programmes and HIV-positive women enrolled in these programmes. Based on information about the study aims, all informants consented to participate. Ethical approval was granted by ethics review boards in Tanzania and Norway. The material indicates a delicate balance between the nurses' attempt to secure the HIV-free survival of the babies and the mothers' desire to preserve confidentiality. Profound confidentiality-related dilemmas emerged in actual practice, and indications of a lack of thorough consideration of the implication of a patient's restricted disclosure came to light during follow-up of the HIV-positive women and the third party - the child who is at risk of HIV infection through mother's milk. World Health Organization

  10. Medical students and personal smartphones in the clinical environment: the impact on confidentiality of personal health information and professionalism.

    Science.gov (United States)

    Tran, Kim; Morra, Dante; Lo, Vivian; Quan, Sherman D; Abrams, Howard; Wu, Robert C

    2014-05-22

    Smartphones are becoming ubiquitous in health care settings. The increased adoption of mobile technology such as smartphones may be attributed to their use as a point-of-care information source and to perceived improvements in clinical communication and efficiency. However, little is known about medical students' use of personal smartphones for clinical work. The intent of the study was to examine final-year medical students' experience with and attitudes toward using personal mobile technology in the clinical environment, with respect to the perceived impact on patient confidentiality and provider professionalism. Cross-sectional surveys were completed by final-year medical students at the University of Toronto. Respondents were asked about the type of personal mobile phone they use, security features on their personal phone, experiences using their personal phone during clinical rotations, and attitudes about using their personal phone for clinical work purposes. The overall response rate was 45.4% (99/218). Smartphone ownership was prevalent (98%, 97/99) with the majority (86%, 85/99) of participants using their personal phones for patient-related communication during clinical rotations. A total of 26% (26/99) of participants reported not having any type of security feature on their personal phone, 94% (90/96) of participants agreed that using their personal phone for clinical work makes them more efficient, and 86% (82/95) agreed that their personal phone allows them to provide better patient care. Although 68% (65/95) of participants believe that the use of personal phones for patient-related communication with colleagues poses a risk to the privacy and confidentiality of patient health information, 22% (21/96) of participants still use their personal phone to text or email identifiable patient data to colleagues. Our findings suggest that the use of personal smartphones for clinical work by medical students is prevalent. There is a need to more fully address

  11. 78 FR 29239 - Final Priority; Technical Assistance To Improve State Data Capacity-National Technical Assistance...

    Science.gov (United States)

    2013-05-20

    ... Assistance To Improve State Data Capacity--National Technical Assistance Center To Improve State Capacity To... Education and Rehabilitative Services announces a priority under the Technical Assistance to Improve State... (FY) 2013 and later years. We take this action to focus attention on an identified national need to...

  12. 45 CFR 307.13 - Security and confidentiality for computerized support enforcement systems in operation after...

    Science.gov (United States)

    2010-10-01

    ... ENFORCEMENT SYSTEMS § 307.13 Security and confidentiality for computerized support enforcement systems in... systems in operation after October 1, 1997. (a) Information integrity and security. Have safeguards... 45 Public Welfare 2 2010-10-01 2010-10-01 false Security and confidentiality for computerized...

  13. 40 CFR 85.1415 - Treatment of confidential information.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 18 2010-07-01 2010-07-01 false Treatment of confidential information. 85.1415 Section 85.1415 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) AIR PROGRAMS (CONTINUED) CONTROL OF AIR POLLUTION FROM MOBILE SOURCES Urban Bus Rebuild Requirements § 85.1415...

  14. Privacy and Confidentiality in Exchange of Information Procedures : Some Uncertainties, Many Issues, but Few Solutions

    NARCIS (Netherlands)

    Debelva, F.; Mosquera, Valderrama I.J.

    2017-01-01

    The overall aim of this article is to analyse the taxpayers’ rights to confidentiality and privacy in exchange of information including the new global standard of automatic exchange of information. Section 2 will analyse the state of the art regarding the right to privacy and confidentiality in

  15. 40 CFR 86.615-84 - Treatment of confidential information.

    Science.gov (United States)

    2010-07-01

    ...) Selective Enforcement Auditing of New Light-Duty Vehicles, Light-Duty Trucks, and Heavy-Duty Vehicles § 86... part 2, subpart B. (b) Any claim of confidentiality must accompany the information at the time it is...

  16. Final waste classification and waste form technical position papers

    International Nuclear Information System (INIS)

    1983-05-01

    The waste classification technical position paper describes overall procedures acceptable to NRC staff which may be used by licensees to determine the presence and concentrations of the radionuclides listed in section 61.55, and thereby classifying waste for near-surface disposal. This technical position paper also provides guidance on the types of information which should be included in shipment manifests accompanying waste shipments to near-surface disposal facilities. The technical position paper on waste form provides guidance to waste generators on test methods and results acceptable to NRC staff for implementing the 10 CFR Part 61 waste form requirements. It can be used as an acceptable approach for demonstrating compliance with the 10 CFR Part 61 waste structural stability criteria. This technical position paper includes guidance on processing waste into an acceptable stable form, designing acceptable high-integrity containers, packaging cartridge filters, and minimizing radiation effects on organic ion-exchange resins. The guidance in the waste form technical position paper may be used by licensees as the basis for qualifying process control programs to meet the waste form stability requirements, including tests which can be used to demonstrate resistance to degradation arising from the effects of compression, moisture, microbial activity, radiation, and chemical changes. Generic test data (e.g., topical reports prepared by vendors who market solidification technology) may be used for process control program qualification where such generic data is applicable to the particular types of waste generated by a licensee

  17. Absolutism on Access and Confidentiality: Principled or Irresponsible?

    Science.gov (United States)

    Sheerin, William E.

    1991-01-01

    Discusses issues involved in public access to library materials and facilities and patron confidentiality. Topics discussed include children's access to adult materials; parents' right to know about their children's materials; First and Fourth Amendment protections; the Library Bill of Rights; and American Library Association (ALA) documents that…

  18. 12 CFR 19.181 - Confidentiality of formal investigations.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 1 2010-01-01 2010-01-01 false Confidentiality of formal investigations. 19.181 Section 19.181 Banks and Banking COMPTROLLER OF THE CURRENCY, DEPARTMENT OF THE TREASURY RULES OF... only in accordance with the provisions of part 4 of this chapter. ...

  19. 49 CFR 805.735-21 - Confidentiality of statements.

    Science.gov (United States)

    2010-10-01

    ... TRANSPORTATION SAFETY BOARD EMPLOYEE RESPONSIBILITIES AND CONDUCT § 805.735-21 Confidentiality of statements. Subject to the provisions of § 805.735-24 concerning review of employee statements, each statement of... Personnel Officer is personally responsible for the retention of employee statements in confidence and may...

  20. HIPAA-protecting patient confidentiality or covering something else?

    Directory of Open Access Journals (Sweden)

    Robbins RA

    2013-10-01

    Full Text Available No abstract available. Article truncated at 150 words. A case of a physician fired from the Veterans Administration (VA for violation of the Health Care Portability and Accountability Act of 1996 (HIPAA illustrates a problem with both the law and the VA. Anil Parikh, a VA physician at the Jesse Brown VA in Chicago, was dismissed on a charge of making unauthorized disclosures of confidential patient information on October 19, 2007. On January 3, 2011 the Merit Systems Protection Board (MSPB reversed Dr. Parikh’s removal. Dr. Parikh's initially made disclosures to the VA Office of Inspector General and to Senator Barack Obama and Congressman Luis Gutierrez, in whose district the Jesse Brown VA lies. Dr. Parikh alleged that there were systematic problems within the Jesse Brown VA that resulted in untimely and inadequate patient care. The confidential patient information Parikh disclosed included examples of the misdiagnoses and misdirection of patients within the hospital. Specifically, Dr. Parikh alleged that …

  1. 40 CFR 725.15 - Determining applicability when microorganism identity or use is confidential or uncertain.

    Science.gov (United States)

    2010-07-01

    ... ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) TOXIC SUBSTANCES CONTROL ACT REPORTING REQUIREMENTS AND REVIEW... appear on the public version of the Inventory, in § 725.239 or in subpart M of this part. Instead, it is contained in a confidential version held in EPA's Confidential Business Information Center (CBIC). The...

  2. HIV testing sites' communication about adolescent confidentiality: potential barriers and facilitators to testing.

    Science.gov (United States)

    Hyden, Christel; Allegrante, John P; Cohall, Alwyn T

    2014-03-01

    This study sought to evaluate HIV testing locations in New York City in terms of staff communication of confidentiality policies for adolescent clients. Using the New York State Directory of HIV Counseling and Testing Resources as a sampling frame, this study made telephone contact with 164 public HIV testing locations in New York City and used a semistructured interview to ask questions about confidentiality, parental permission, and parent access to test results. At 48% of locations, either HIV testing was not offered or we were unable to reach a staff member to ask questions about testing options and confidentiality. At the remaining sites, information provided regarding confidentiality, parental consent, and privacy of test results was correct only 69% to 85% of the time. Additionally, 23% of sites successfully contacted offered testing exclusively between 9:00 a.m. and 3:00 p.m. weekdays, when most adolescents are in school. Our findings point to a need for increased training and quality control at the clinical level to ensure that consumers in need of HIV testing are provided with accurate information and accessible services. Furthermore, these results highlight the need for more "patient-centric" sites with enhanced accessibility for potential clients, particularly youth.

  3. Lithuanian general practitioners' knowledge of confidentiality laws in adolescent sexual and reproductive healthcare: a cross-sectional study

    DEFF Research Database (Denmark)

    Lazarus, Jeff; Jaruseviciene, Lina; Liljestrand, Jerker

    2008-01-01

    In Lithuania, the legislation addressing confidentiality in adolescent healthcare is contradictory and vague. Previous studies have also revealed that medico-legal knowledge among physicians is poor, and attitudes play a correspondingly greater role than legal knowledge in ensuring the confidenti......In Lithuania, the legislation addressing confidentiality in adolescent healthcare is contradictory and vague. Previous studies have also revealed that medico-legal knowledge among physicians is poor, and attitudes play a correspondingly greater role than legal knowledge in ensuring...

  4. 40 CFR 303.31 - Assurance of claimant confidentiality.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 27 2010-07-01 2010-07-01 false Assurance of claimant confidentiality. 303.31 Section 303.31 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) SUPERFUND... knowledge, shall be given access to the identity of, or information that would lead to the identity of, a...

  5. 75 FR 75576 - Confidentiality of Suspicious Activity Reports

    Science.gov (United States)

    2010-12-03

    ...-2010-0019] RIN 1557-AD17 Confidentiality of Suspicious Activity Reports AGENCY: The Office of the... suspicious activity report (SAR) to: clarify the scope of the statutory prohibition on the disclosure by a... institutions, including national banks regulated by the OCC, to keep certain records and make certain reports...

  6. Nursing Students' Perceptions of Confidentiality, Accountability, and E-Professionalism in Relation to Facebook.

    Science.gov (United States)

    Barnable, Alexia; Cunning, Glenda; Parcon, Mariel

    This study examined nursing students' perceptions of confidentiality, accountability, and e-professionalism in relation to Facebook. All of the students were aware that posting patients' names and pictures of patients constituted a confidentiality breach. When comparing students based on educational status, there were differing opinions on whether employers should use Facebook profile information for hiring decisions. Nursing programs should provide current education, including clear and up-to-date policies, about social media use.

  7. Alumina reinforced tetragonal zirconia (TZP) composites. Final technical report, July 1, 1993--December 31, 1996

    International Nuclear Information System (INIS)

    Shetty, D.K.

    1997-01-01

    This final technical report summarizes the significant research results obtained during the period July 1, 1993 through December 31, 1996 in the DOE-supported research project entitled, open-quotes Alumina Reinforced Tetragonal Zirconia (TZP) Compositesclose quotes. The objective of the research was to develop high-strength and high-toughness ceramic composites by combining mechanisms of platelet, whisker or fiber reinforcement with transformation toughening. The approach used included reinforcement of Celia- or yttria-partially-stabilized zirconia (Ce-TZP or Y-TZP) with particulates, platelets, or continuous filaments of alumina

  8. Practice points on three aspects of oil and gas property transactions - operatorship, confidentiality and title review

    International Nuclear Information System (INIS)

    Edwards, P.D.

    1999-01-01

    Practice points regarding three aspects of oil and gas property transactions were described. The first topic dealt with purchase and sale transactions and how to determine which party is entitled to act as the Operator following the sale of the Operator's interest. The second topic addressed issues of confidentiality in connection with oil and gas transactions. The final point discussed contractual provisions relating to title defects, along with their many variations and legal consequences. All three of these topics present issues which give rise to a surprising number of disputes, but which frequently receive only cursory attention in the negotiation and documentation of oil and gas transactions

  9. Final Technical Report

    Energy Technology Data Exchange (ETDEWEB)

    Velasco, Mayda [Northwestern University

    2013-11-01

    This work is focused on the design and construction of novel beam diagnostic and instrumentation for charged particle accelerators required for the next generation of linear colliders. Our main interest is in non-invasive techniques. The Northwestern group of Velasco has been a member of the CLIC Test Facility 3 (CTF3) collaboration since 2003, and the beam instrumentation work is developed mostly at this facility1. This 4 kW electron beam facility has a 25-170 MeV electron LINAC. CTF3 performed a set of dedicated measurements to finalize the development of our RF-Pickup bunch length detectors. The RF-pickup based on mixers was fully commissioned in 2009 and the RF-pickup based on diodes was finished in time for the 2010-11 data taking. The analysis of all the data taken in by the summer of 2010 was finish in time and presented at the main conference of the year, LINAC 2010 in Japan.

  10. 18 CFR 1b.9 - Confidentiality of investigations.

    Science.gov (United States)

    2010-04-01

    ... 18 Conservation of Power and Water Resources 1 2010-04-01 2010-04-01 false Confidentiality of investigations. 1b.9 Section 1b.9 Conservation of Power and Water Resources FEDERAL ENERGY REGULATORY COMMISSION... pursuant to subpoena, and all investigative proceedings shall be treated as nonpublic by the Commission and...

  11. State child health; revisions to the regulations implementing the State Children's Health Insurance Program. Interim final rule with comment period; revisions, delay of effective date, and technical amendments to final rule.

    Science.gov (United States)

    2001-06-25

    Title XXI authorizes the State Children's Health Insurance Program (SCHIP) to assist State efforts to initiate and expand the provision of child health assistance to uninsured, low-income children. On January 11, 2001 we published a final rule in the Federal Register to implement SCHIP that has not gone into effect. This interim final rule further delays the effective date, revises certain provisions and solicits public comment, and makes technical corrections and clarifications to the January 2001 final rule based on further review of the comments received and applicable law. Only the provisions set forth in this document have changed. All other provisions set forth in the January 2001 final rule will be implemented without change.

  12. THE POSSIBLE CONFIDENTIALITY: THE PUBLIC ADMINISTRATION AS PARTY IN THE ALTERNATIVE DISPUTE RESOLUTION MECHANISM

    Directory of Open Access Journals (Sweden)

    Carlos Alberto de Salles

    2017-05-01

    Full Text Available This article debates the tension that exists between confidentiality, usual in ADRs, and the publicity principle, that rules the Public Administration in Brazil. As a solution points that the parameter of confidentiality when Public Administration is a party must be the preservation of accountability of the involved agencies, what means, the capacity to answer to its own goals and to obey the public control.

  13. IT Confidentiality Risk Assessment for an Architecture-Based Approach

    NARCIS (Netherlands)

    Morali, A.; Zambon, Emmanuele; Etalle, Sandro; Overbeek, Paul

    2008-01-01

    Information systems require awareness of risks and a good understanding of vulnerabilities and their exploitations. In this paper, we propose a novel approach for the systematic assessment and analysis of confidentiality risks caused by disclosure of operational and functional information. The

  14. 48 CFR 1415.207-71 - Confidentiality of proposal evaluation.

    Science.gov (United States)

    2010-10-01

    ... THE INTERIOR CONTRACTING METHODS AND CONTRACT TYPES CONTRACTING BY NEGOTIATION Solicitation and... evaluators and advisors shall sign a Conflict of Interest Certificate and a Confidentiality Certificate in a... outside the Government shall take into consideration requirements for avoiding individual conflicts of...

  15. Public expectations concerning confidentiality protection of adolescents' sexual and reproductive health care in Lithuania: findings of the surveys conducted in 2005 and 2012.

    Science.gov (United States)

    Jaruseviciene, Lina; Zaborskis, Apolinaras; Lazarus, Jeffrey Victor

    2014-04-01

    An adolescent's right to confidential healthcare is protected by international law and professional consensus. However, parental and social support for confidential sexual and reproductive health (SRH) services, in particular, varies greatly. This study documents Lithuanian residents' expectations with regard to confidentiality protection for adolescents in this domain, and explores the factors related to the diversity of these expectations. Two national surveys of Lithuanian residents completed in 2005 and 2012 using anonymous questionnaires. Participants rated their expectations for confidentiality using a five-point Likert scale for eight types of SRH consultations. Public anticipation for confidentiality depended on whether issues related to sexual behaviour or to its consequences were addressed during adolescent consultation. Only younger respondents had higher expectations for confidentiality in both contexts. Public expectations regarding confidentiality were less demanding in 2012 than in 2005. The expectation of confidentiality protection was greater for topics related to sexual behaviour than for the consequences of sexual behaviour, such as pregnancy, abortion or a sexually transmitted infection. This implies a need for targeted information strategies for the general population and explicit guidance for physicians on when and for whom care should remain confidential.

  16. 49 CFR 40.321 - What is the general confidentiality rule for drug and alcohol test information?

    Science.gov (United States)

    2010-10-01

    ... Transportation PROCEDURES FOR TRANSPORTATION WORKPLACE DRUG AND ALCOHOL TESTING PROGRAMS Confidentiality and Release of Information § 40.321 What is the general confidentiality rule for drug and alcohol test... DOT drug or alcohol testing process, you are prohibited from releasing individual test results or...

  17. Final priority. Rehabilitation Training: Job-Driven Vocational Rehabilitation Technical Assistance Center. Final priority.

    Science.gov (United States)

    2014-08-19

    The Assistant Secretary for Special Education and Rehabilitative Services announces a priority under the Rehabilitation Training program to establish a Job-Driven Vocational Rehabilitation Technical Assistance Center (JDVRTAC). The Assistant Secretary may use this priority for competitions in fiscal year (FY) 2014 and later years. We take this action to focus on training in an area of national need. Specifically, this priority responds to the Presidential Memorandum to Federal agencies directing them to take action to address job-driven training for the Nation's workers. The JDVRTAC will provide technical assistance (TA) to State vocational rehabilitation (VR) agencies to help them develop for individuals with disabilities training and employment opportunities that meet the needs of today's employers.

  18. Final priority; Technical Assistance on State Data Collection--IDEA Data Management Center. Final priority.

    Science.gov (United States)

    2014-08-05

    The Assistant Secretary for the Office of Special Education and Rehabilitative Services (OSERS) announces a priority under the Technical Assistance on State Data Collection program. The Assistant Secretary may use this priority for competitions in fiscal year (FY) 2014 and later years. We take this action to fund a cooperative agreement to establish and operate an IDEA Data Management Center (Center) that will provide technical assistance (TA) to improve the capacity of States to meet the data collection requirements of the Individuals with Disabilities Education Act (IDEA).

  19. Next Generation Nuclear Plant (NGNP) Prismatic HTGR Conceptual Design Project - Final Technical Report

    Energy Technology Data Exchange (ETDEWEB)

    Saurwein, John

    2011-07-15

    This report is the Final Technical Report for the Next Generation Nuclear Plant (NGNP) Prismatic HTGR Conceptual Design Project conducted by a team led by General Atomics under DOE Award DE-NE0000245. The primary overall objective of the project was to develop and document a conceptual design for the Steam Cycle Modular Helium Reactor (SC-MHR), which is the reactor concept proposed by General Atomics for the NGNP Demonstration Plant. The report summarizes the project activities over the entire funding period, compares the accomplishments with the goals and objectives of the project, and discusses the benefits of the work. The report provides complete listings of the products developed under the award and the key documents delivered to the DOE.

  20. Next Generation Nuclear Plant (NGNP) Prismatic HTGR Conceptual Design Project - Final Technical Report

    International Nuclear Information System (INIS)

    Saurwein, J.

    2011-01-01

    This report is the Final Technical Report for the Next Generation Nuclear Plant (NGNP) Prismatic HTGR Conceptual Design Project conducted by a team led by General Atomics under DOE Award DE-NE0000245. The primary overall objective of the project was to develop and document a conceptual design for the Steam Cycle Modular Helium Reactor (SC-MHR), which is the reactor concept proposed by General Atomics for the NGNP Demonstration Plant. The report summarizes the project activities over the entire funding period, compares the accomplishments with the goals and objectives of the project, and discusses the benefits of the work. The report provides complete listings of the products developed under the award and the key documents delivered to the DOE.

  1. Imagining Technicities

    DEFF Research Database (Denmark)

    Liboriussen, Bjarke; Plesner, Ursula

    2011-01-01

    to the elements of taste and skill. In the final analysis those references were synthesized as five imagined technicities: the architect, the engineer, the client, the Chinese, and the Virtual World native. Because technicities are often assumed and rarely discussed as actants who influence practice, their role......, this article focuses on innovative uses of virtual worlds in architecture. We interviewed architects, industrial designers and other practitioners. Conceptually supported by an understanding of technicity found in Cultural Studies, the interviews were then coded with a focus on interviewees’ references...... in cooperation and development of ICTs seems to pass unnoticed. However, since they are aligned into ICTs, technicities impact innovation....

  2. 37 CFR 201.29 - Access to, and confidentiality of, Statements of Account, Verification Auditor's Reports, and...

    Science.gov (United States)

    2010-07-01

    ... confidentiality of, Statements of Account, Verification Auditor's Reports, and other verification information... GENERAL PROVISIONS § 201.29 Access to, and confidentiality of, Statements of Account, Verification Auditor... Account, including the Primary Auditor's Reports, filed under 17 U.S.C. 1003(c) and access to a Verifying...

  3. 22 CFR 1104.17 - Confidentiality of archaeological resource information.

    Science.gov (United States)

    2010-04-01

    ... 22 Foreign Relations 2 2010-04-01 2010-04-01 true Confidentiality of archaeological resource information. 1104.17 Section 1104.17 Foreign Relations INTERNATIONAL BOUNDARY AND WATER COMMISSION, UNITED... of archaeological resource information. (a) The Commissioner shall not make available to the public...

  4. Decisions about Confidentiality in Medical Student Mental Health Settings.

    Science.gov (United States)

    Lindenthal, Jacob Jay; And Others

    1984-01-01

    Examined responses of psychologists and psychiatrists in medical schools (N=59) to vignettes representing student problems. Results suggested practitioners were generally unwilling to break confidentiality in response to problems involving suicidal tendencies, sexual coercion/seduction, social transgressions, or falsifying data. Only suggestions…

  5. Privacy, confidentiality and abortion statistics: a question of public interest?

    Science.gov (United States)

    McHale, Jean V; Jones, June

    2012-01-01

    The precise nature and scope of healthcare confidentiality has long been the subject of debate. While the obligation of confidentiality is integral to professional ethical codes and is also safeguarded under English law through the equitable remedy of breach of confidence, underpinned by the right to privacy enshrined in Article 8 of the Human Rights Act 1998, it has never been regarded as absolute. But when can and should personal information be made available for statistical and research purposes and what if the information in question is highly sensitive information, such as that relating to the termination of pregnancy after 24 weeks? This article explores the case of In the Matter of an Appeal to the Information Tribunal under section 57 of the Freedom of Information Act 2000, concerning the decision of the Department of Health to withhold some statistical data from the publication of its annual abortion statistics. The specific data being withheld concerned the termination for serious fetal handicap under section 1(1)d of the Abortion Act 1967. The paper explores the implications of this case, which relate both to the nature and scope of personal privacy. It suggests that lessons can be drawn from this case about public interest and use of statistical information and also about general policy issues concerning the legal regulation of confidentiality and privacy in the future.

  6. 18 CFR 401.75 - Protection of trade secrets; Confidential information.

    Science.gov (United States)

    2010-04-01

    ..., confidential statistical data, amount or source of any income, profits, losses, or expenditures of any person... States Code which provides: Whoever, being an officer or employee of the United States or of any...

  7. Ensuring Confidentiality of Geocoded Health Data: Assessing Geographic Masking Strategies for Individual-Level Data.

    Science.gov (United States)

    Zandbergen, Paul A

    2014-01-01

    Public health datasets increasingly use geographic identifiers such as an individual's address. Geocoding these addresses often provides new insights since it becomes possible to examine spatial patterns and associations. Address information is typically considered confidential and is therefore not released or shared with others. Publishing maps with the locations of individuals, however, may also breach confidentiality since addresses and associated identities can be discovered through reverse geocoding. One commonly used technique to protect confidentiality when releasing individual-level geocoded data is geographic masking. This typically consists of applying a certain amount of random perturbation in a systematic manner to reduce the risk of reidentification. A number of geographic masking techniques have been developed as well as methods to quantity the risk of reidentification associated with a particular masking method. This paper presents a review of the current state-of-the-art in geographic masking, summarizing the various methods and their strengths and weaknesses. Despite recent progress, no universally accepted or endorsed geographic masking technique has emerged. Researchers on the other hand are publishing maps using geographic masking of confidential locations. Any researcher publishing such maps is advised to become familiar with the different masking techniques available and their associated reidentification risks.

  8. Ensuring Confidentiality of Geocoded Health Data: Assessing Geographic Masking Strategies for Individual-Level Data

    Directory of Open Access Journals (Sweden)

    Paul A. Zandbergen

    2014-01-01

    Full Text Available Public health datasets increasingly use geographic identifiers such as an individual’s address. Geocoding these addresses often provides new insights since it becomes possible to examine spatial patterns and associations. Address information is typically considered confidential and is therefore not released or shared with others. Publishing maps with the locations of individuals, however, may also breach confidentiality since addresses and associated identities can be discovered through reverse geocoding. One commonly used technique to protect confidentiality when releasing individual-level geocoded data is geographic masking. This typically consists of applying a certain amount of random perturbation in a systematic manner to reduce the risk of reidentification. A number of geographic masking techniques have been developed as well as methods to quantity the risk of reidentification associated with a particular masking method. This paper presents a review of the current state-of-the-art in geographic masking, summarizing the various methods and their strengths and weaknesses. Despite recent progress, no universally accepted or endorsed geographic masking technique has emerged. Researchers on the other hand are publishing maps using geographic masking of confidential locations. Any researcher publishing such maps is advised to become familiar with the different masking techniques available and their associated reidentification risks.

  9. 78 FR 32541 - Technical Amendments

    Science.gov (United States)

    2013-05-31

    .... All information classified ``Top Secret,'' ``Secret,'' and ``Confidential'' shall be delivered to the... information classified ``Top Secret,'' ``Secret,'' and ``Confidential.'' (c) Storage. All classified documents shall be stored in the safe designated by the Executive Director for information classified ``Top Secret...

  10. Circles of Confidence in Correspondences. : Confidentiality in seventeenth-century knowledge exchange in networks of letters and drawings

    NARCIS (Netherlands)

    van den Heuvel, C.M.J.M.; Weingart, Scott B; Spelt, Nils; Nellen, H.J.M.

    2016-01-01

    Science in the Early Modern World depended on the one hand on openness in scholarly communication, but on the other hand the competition in commerce and trade and the political and religious conflicts required secrecy and confidentiality. This papers analyzes these concepts of confidentiality and

  11. Uncertainty Quantification in the Reliability and Risk Assessment of Generation IV Reactors: Final Scientific/Technical Report

    International Nuclear Information System (INIS)

    Vierow, Karen; Aldemir, Tunc

    2009-01-01

    The project entitled, 'Uncertainty Quantification in the Reliability and Risk Assessment of Generation IV Reactors', was conducted as a DOE NERI project collaboration between Texas A and M University and The Ohio State University between March 2006 and June 2009. The overall goal of the proposed project was to develop practical approaches and tools by which dynamic reliability and risk assessment techniques can be used to augment the uncertainty quantification process in probabilistic risk assessment (PRA) methods and PRA applications for Generation IV reactors. This report is the Final Scientific/Technical Report summarizing the project.

  12. Uncertainty Quantification in the Reliability and Risk Assessment of Generation IV Reactors: Final Scientific/Technical Report

    Energy Technology Data Exchange (ETDEWEB)

    Vierow, Karen; Aldemir, Tunc

    2009-09-10

    The project entitled, “Uncertainty Quantification in the Reliability and Risk Assessment of Generation IV Reactors”, was conducted as a DOE NERI project collaboration between Texas A&M University and The Ohio State University between March 2006 and June 2009. The overall goal of the proposed project was to develop practical approaches and tools by which dynamic reliability and risk assessment techniques can be used to augment the uncertainty quantification process in probabilistic risk assessment (PRA) methods and PRA applications for Generation IV reactors. This report is the Final Scientific/Technical Report summarizing the project.

  13. 48 CFR 1552.235-78 - Data Security for Toxic Substances Control Act Confidential Business Information (DEC 1997).

    Science.gov (United States)

    2010-10-01

    ...: Data Security for Toxic Substances Control Act Confidential Business Information (DEC 1997) The... 48 Federal Acquisition Regulations System 6 2010-10-01 2010-10-01 true Data Security for Toxic Substances Control Act Confidential Business Information (DEC 1997). 1552.235-78 Section 1552.235-78 Federal...

  14. 7 CFR 981.75 - Confidential nature of records and reports.

    Science.gov (United States)

    2010-01-01

    ... Section 981.75 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (Marketing Agreements and Orders; Fruits, Vegetables, Nuts), DEPARTMENT OF AGRICULTURE ALMONDS..., financial condition, or business operations of any handler shall be considered as confidential information...

  15. Programs of Study as a State Policy Mandate: A Longitudinal Study of the South Carolina Personal Pathways to Success Initiative. Final Technical Report: Major Findings and Implications

    Science.gov (United States)

    Hammond, Cathy; Drew, Sam F.; Withington, Cairen; Griffith, Cathy; Swiger, Caroline M.; Mobley, Catherine; Sharp, Julia L.; Stringfield, Samuel C.; Stipanovic, Natalie; Daugherty, Lindsay

    2013-01-01

    This is the final technical report from the National Research Center for Career and Technical Education's (NRCCTE's) five-year longitudinal study of South Carolina's Personal Pathway to Success initiative, which was authorized by the state's Education and Economic Development Act (EEDA) in 2005. NRCCTE-affiliated researchers at the National…

  16. Time for Action: Audit, Accountability and Confidential Enquiries into ...

    African Journals Online (AJOL)

    Improving the quality of care is essential for achieving reductions in maternal mortality. Audit is one of the methods which can be used to simultaneously assess as well as improve quality. This commentary discusses one type of audit – confidential enquiries into maternal death. We believe that the enthusiasm for ...

  17. Final Technical Report - Kotzebue Wind Power Project - Volume II

    Energy Technology Data Exchange (ETDEWEB)

    Rana Zucchi, Global Energy Concepts, LLC; Brad Reeve, Kotzebue Electric Association; DOE Project Officer - Doug Hooker

    2007-10-31

    The Kotzebue Wind Power Project is a joint undertaking of the U.S. Department of Energy (DOE); Kotzebue Electric Association (KEA); and the Alaska Energy Authority (AEA). The goal of the project is to develop, construct, and operate a wind power plant interconnected to a small isolated utility grid in an arctic climate in Northwest Alaska. The primary objective of KEA’s wind energy program is to bring more affordable electricity and jobs to remote Alaskan communities. DOE funding has allowed KEA to develop a multi-faceted approach to meet these objectives that includes wind project planning and development, technology transfer, and community outreach. The first wind turbines were installed in the summer of 1997 and the newest turbines were installed in the spring of 2007. The total installed capacity of the KEA wind power project is 1.16 MW with a total of 17 turbines rated between 65 kW and 100 kW. The operation of the wind power plant has resulted in a wind penetration on the utility system in excess of 35% during periods of low loads. This document and referenced attachments are presented as the final technical report for the U.S. Department of Energy (DOE) grant agreement DE-FG36-97GO10199. Interim deliverables previously submitted are also referenced within this document and where reasonable to do so, specific sections are incorporated in the report or attached as appendices.

  18. Energy-related inventions program invention 637. Final technical report

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1997-07-31

    The final technical report for the Pegasus plow, a stalk and root embedding apparatus, describes progress from the development stage to the product support stage. The US Department of Agriculture - Agriculture Research Service (ARS) is now in the second year of a three year study comparing the Pegasus to conventional tillage. So far, no downside has been with the Pegasus and the following benefits have been documented: (1) Energy savings of 65.0 kilowatt hours per hectare over conventional tillage. This is when the Pegasus plow is used to bury whole stalks, and represents a 70% savings over conventional tillage (92.5 kilowatt hours per hectare). (2) Four to seven fewer passes of tillage, depending on the particular situation. This represents a substantial time savings to farmers. (3) So far, no differences in cotton yields. Recent cotton boll counts in one study indicate a higher yield potential with the Pegasus. (4) No disease problems. (5) Significantly higher levels of organic matter in the soil. A hypothesis of the study is that whole stalk burial may reduce plant disease problems. This hypothesis has not yet been proven. (6) Significantly higher levels of nitrate nitrogen. Total nitrogen and ammonia nitrogen trended higher but were not significantly different. This shows that whole stalk burial does not adversely affect the nitrogen cycle in the soil and may actually improve it. The marketing support stage of the project is also described in the report.

  19. Clinical psychology service users' experiences of confidentiality and informed consent: a qualitative analysis.

    Science.gov (United States)

    Martindale, S J; Chambers, E; Thompson, A R

    2009-12-01

    To explore and describe the experience of clinical psychology service users in relation to the processes associated with confidentiality and the generation of informed consent in individual therapy. A qualitative interview-based study employing interpretative phenomenological analysis was conducted with service users. User researchers were active collaborators in the study. A focus group of four users was convened to explore issues related to confidentiality and consent, which then informed the development of the semi-structured interview schedule. Twelve users of community mental health clinical psychology services were interviewed by user researchers. A user researcher and a clinical psychologist undertook joint analysis of the data. A second clinical psychologist facilitated reflexivity and wider consideration of validity issues. Four main themes were identified from the data: being referred; the participant's feelings, mental health difficulties, and their impact; relationships with workers and carers; and autonomy. The meaningfulness of processes of discussing confidentiality, and generating informed consent, can be improved by psychologists placing a greater emphasis on choice, control, autonomy, individual preferences, and actively involving the user in dialogue on repeated occasions.

  20. MEASUREMENT OF APPLICATION OF ISO 27001 OF CUSTOMER CELLULAR CARD CONFIDENTIALITY DATA IN PT. XYZ AREA JAKARTA

    Directory of Open Access Journals (Sweden)

    Krishna Rahadian

    2014-10-01

    Full Text Available The purpose of this study was to evaluate the effects of the process of ISO 27001 with respect to the confidentiality of customer cellular card Jakarta and to improve cellular card customer data confidentiality at PT.XYZ from data leakage of the customer data due to the third party involvement, clean-desk policy, and access right. Recommendation regarding the improvement is provided after reviewing the confidentiality of customer data. The survey in this study is conducted by questionnaire. From the evaluation results of the questionnaire, it is concluded that the larger customer data leaks are mainly caused by the external factors.

  1. 32 CFR 147.30 - Temporary eligibility for access at the confidential and secret levels and temporary eligibility...

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 1 2010-07-01 2010-07-01 false Temporary eligibility for access at the confidential and secret levels and temporary eligibility for âLâ access authorization. 147.30 Section 147.30... Temporary Access § 147.30 Temporary eligibility for access at the confidential and secret levels and...

  2. [Consent and confidentiality in occupational health practice: balance between legal requirements and ethical values].

    Science.gov (United States)

    Mora, Erika; Franco, G

    2010-01-01

    The recently introduced Italian law on the protection of workers' health states that the occupational health physician (competent physician) is required to act according to the Code of Ethics of the International Commission on Occupational Health (ICOH). This paper aims at examining the articles of legislative decree 81/2008 dealing with informed consent and confidentiality compared with the corresponding points of the ICOH Ethics Code. Analysis of the relationship between articles 25 and 39 (informed consent) and 18, 20 and 39 (confidentiality) of the decree shows that there are some points of disagreement between the legal requirements and the Code of Ethics, in particular concerning prescribed health surveillance, consent based on appropriate information (points 8, 10 and 12 of the Code) and some aspects of confidentiality (points 10, 20, 21, 22 and 23 of the Code). Although the competent physician is required to act according to the law, the decisional process could lead to a violation of workers' autonomy.

  3. Technical considerations associated with spent fuel acceptance. Final report

    International Nuclear Information System (INIS)

    Supko, E.M.

    1996-06-01

    This study was initiated by the Electric Power Research Institute (EPRI) to identify technical considerations associated with spent fuel acceptance and implementation of a waste management system that includes the use of transportable storage systems, and to serve as an opening dialogue among Standard Contract Holders and the department of Energy's Office of Civilian Radioactive Waste management (OCRWM) prior to the development of waste acceptance criteria or issuance of a Notice of Proposed Rulemaking by OCRWM to amend the Standard Contract. The original purpose of the Notice of Proposed Rulemaking was to address changes to the Standard Contract to implement a multi-purpose canister based system and to address other issues that were not adequately addressed in the standard contract. Even if DOE does not develop a multi-purpose canister based system for waste acceptance, it will still be necessary to develop waste acceptance criteria in order to accept spent fuel in transportable storage systems that are being deployed for at-reactor storage. In this study, technical issues associated with spent fuel acceptance will be defined and potential options and alternatives for resolution of technical considerations will be explored

  4. Final Technical Report

    Energy Technology Data Exchange (ETDEWEB)

    Held, Isaac [Princeton Univ., NJ (United States); Balaji, V. [Princeton Univ., NJ (United States); Fueglistaler, Stephan [Princeton Univ., NJ (United States)

    2016-09-19

    We have constructed and analyzed a series of idealized models of tropical convection interacting with large-scale circulations, with 25-50km resolution and with 1-2km cloud resolving resolution to set the stage for rigorous tests of convection closure schemes in high resolution global climate models. Much of the focus has been on the climatology of tropical cyclogenesis in rotating systems and the related problem of the spontaneous aggregation of convection in non-rotating systems. The PI (Held) will be delivering the honorary Bjerknes lecture at the Fall 2016 AGU meeting in December on this work. We have also provided new analyses of long-standing issues related to the interaction between convection and the large-scale circulation: Kelvin waves in the upper troposphere and lower stratosphere, water vapor transport into the stratosphere, and upper tropospheric temperature trends. The results of these analyses help to improve our understanding of processes, and provide tests for future high resolution global modeling. Our final goal of testing new convections schemes in next-generation global atmospheric models at GFDL has been left for future work due to the complexity of the idealized model results meant as tests for these models uncovered in this work and to computational resource limitations. 11 papers have been published with support from this grant, 2 are in review, and another major summary paper is in preparation.

  5. THE INFORMATION CONFIDENTIALITY AND CYBER SECURITY IN MEDICAL INSTITUTIONS

    Directory of Open Access Journals (Sweden)

    SABAU-POPA CLAUDIA DIANA

    2015-07-01

    Full Text Available The information confidentiality and cyber security risk affects the right to confidentiality and privacy of the patient, as regulated in Romania by the Law 46/2002. The manifestation of the cyber security risk event affects the reputation of the healthcare institution and is becoming more and more complex and often due to the: development of network technology, the medical equipment connected to wifi and the electronic databases. The databases containing medical records were implemented due to automation. Thus, transforming data into medical knowledge contribute to a better understanding of the disease. Due to these factors, the measures taken by the hospital management for this type of risk are adapted to the cyber changes. The hospital objectives aim: the implementation of a robust information system, the early threats identifications and the incident reporting. Neglecting this type of risk can generate financial loss, inability to continue providing health care services for a certain period of time, providing an erroneous diagnosis, medical equipment errors etc. Thus, in a digital age the appropriate risk management for the information security and cyber risk represent a necessity. The main concern of hospitals worldwide is to align with international requirements and obtain credentials in terms of data security from the International Organisation for Standardization, which regulates the management of this type of risk. Romania is at the beginning in terms of concerns regarding the management, avoidance and mitigation of information security, the health system being most highly exposed to its manifestation. The present paper examines the concerns of the health system to the confidentiality of information and cyber security risk and its management arrangements. Thus, a set of key risk indicators is implemented and monitored for 2011-2013, using a user interface, a Dashboard, which acts as an early warning system of the manifestation of the

  6. 19 CFR 210.39 - In camera treatment of confidential information.

    Science.gov (United States)

    2010-04-01

    ... 19 Customs Duties 3 2010-04-01 2010-04-01 false In camera treatment of confidential information. 210.39 Section 210.39 Customs Duties UNITED STATES INTERNATIONAL TRADE COMMISSION INVESTIGATIONS OF UNFAIR PRACTICES IN IMPORT TRADE ADJUDICATION AND ENFORCEMENT Prehearing Conferences and Hearings § 210...

  7. Data-protection standards and confidentiality of HIV/AIDS status in ...

    African Journals Online (AJOL)

    Also, the article presents a preliminary assessment of the possible impact of professionalisation (and outsourcing) of workplace HIV/AIDS management on ... the development of law governing data protection and HIV/AIDS confidentiality in South Africa) and interviews conducted with workplace health managers and trade ...

  8. Confidentiality Protection of User Data and Adaptive Resource Allocation for Managing Multiple Workflow Performance in Service-Based Systems

    Science.gov (United States)

    An, Ho

    2012-01-01

    In this dissertation, two interrelated problems of service-based systems (SBS) are addressed: protecting users' data confidentiality from service providers, and managing performance of multiple workflows in SBS. Current SBSs pose serious limitations to protecting users' data confidentiality. Since users' sensitive data is sent in…

  9. 21 CFR 1316.23 - Confidentiality of identity of research subjects.

    Science.gov (United States)

    2010-04-01

    ... 21 Food and Drugs 9 2010-04-01 2010-04-01 false Confidentiality of identity of research subjects. 1316.23 Section 1316.23 Food and Drugs DRUG ENFORCEMENT ADMINISTRATION, DEPARTMENT OF JUSTICE ADMINISTRATIVE FUNCTIONS, PRACTICES, AND PROCEDURES Protection of Researchers and Research Subjects § 1316.23...

  10. 37 CFR 382.4 - Confidential information and statements of account.

    Science.gov (United States)

    2010-07-01

    ... information and statements of account. (a) For purposes of this subpart, confidential information shall include statements of account and any information pertaining to the statements of account designated as... payments. (c) A statement of account shall include only such information as is necessary to verify the...

  11. 75 FR 8330 - Access to Confidential Business Information by Eastern Research Group

    Science.gov (United States)

    2010-02-24

    ... ENVIRONMENTAL PROTECTION AGENCY [EPA-HQ-OPPT-2003-0004; FRL-8812-4] Access to Confidential Business Information by Eastern Research Group AGENCY: Environmental Protection Agency (EPA). ACTION: Notice. [[Page 8331

  12. Final technical report; Mercury Release from Organic matter (OM) and OM-Coated Mineral Surfaces

    Energy Technology Data Exchange (ETDEWEB)

    Aiken, George

    2014-10-02

    This document is the final technical report for a project designed to address fundamental processes controlling the release of mercury from flood plain soils associated with East Fork Poplar Creek, Tennessee near the U.S. Department of Energy Oak Ridge facility. The report summarizes the activities, findings, presentations, and publications resulting from an award to the U.S. Geological that were part of a larger overall effort including Kathy Nagy (University of Illinois, Chicago, Ill) and Joseph Ryan (University of Colorado, Boulder, CO). The specific charge for the U.S.G.S. portion of the study was to provide analytical support for the larger group effort (Nagy and Ryan), especially with regard to analyses of Hg and dissolved organic matter, and to provide information about the release of mercury from the floodplain soils.

  13. Changes in public attitudes towards confidential adolescent sexual and reproductive health services in Lithuania after the introduction of new legislation

    DEFF Research Database (Denmark)

    Jaruseviciene, Lina; Zaborskis, Apolinaras; Sauliune, Skirmante

    2015-01-01

    was employed to estimate absolute differences in prevalence of belief in whether or not adolescents would find confidentiality important when consulting a physician on SRH issues. A log-binomial regression model was fitted to estimate the relative changes (prevalence ratio) of the independent variables......BACKGROUND: In Lithuania, the right to confidentiality in healthcare for adolescents over the age of 16 was guaranteed in 2010 through the adoption of new legislation. This study sets out to explore changes in Lithuanian residents' attitudes towards confidentiality protection in adolescent sexual....... RESULTS: The total number of respondents was 1054 (response rate 83%) in 2005 and 1002 (response rate 80%) in 2012. The proportion of respondents who reported a belief that adolescents would find confidentiality important when seeing a physician for SRH issues increased significantly from 62% in 2005...

  14. Privacy Act System of Records: Confidential Business Information Tracking System, EPA-20

    Science.gov (United States)

    Learn about the Confidential Business Information Tracking System, including who is covered in the system, the purpose of data collection, routine uses for the system's records, and other security procedures.

  15. 40 CFR 1601.26 - Special procedures for confidential business information.

    Science.gov (United States)

    2010-07-01

    ... described in paragraph (c) of this section, the CSB shall, to the extent permitted by law, afford a business... business information. 1601.26 Section 1601.26 Protection of Environment CHEMICAL SAFETY AND HAZARD... Requesting and Disclosing Records § 1601.26 Special procedures for confidential business information. (a) In...

  16. 42 CFR 3.206 - Confidentiality of patient safety work product.

    Science.gov (United States)

    2010-10-01

    ... 42 Public Health 1 2010-10-01 2010-10-01 false Confidentiality of patient safety work product. 3... individually identifiable health information in such patient safety work product, the direct identifiers listed at 45 CFR 164.514(e)(2) have been removed. (5) Disclosure of nonidentifiable patient safety work...

  17. 77 FR 12284 - Access to Confidential Business Information; Protection Strategies Incorporated

    Science.gov (United States)

    2012-02-29

    ... Business Information; Protection Strategies Incorporated AGENCY: Environmental Protection Agency (EPA). ACTION: Notice. SUMMARY: EPA has authorized its contractor, Protection Strategies Incorporated (PSI) of... Business Information (CBI). DATES: Access to the confidential data occurred on or about February 16, 2012...

  18. Confidentiality and its limits: some contributions from Christianity.

    Science.gov (United States)

    Torrance, I R

    2003-02-01

    The issue is whether Christianity, of its nature, would seek to prevent a justifiable breach of confidentiality or could endorse it, under certain circumstances, as the act which is fundamentally more loving or more truthful. The individualistic nature of Western Christianity is noted. The Lutheran theologian Dietrich Bonhoeffer is used to show Christian support for dynamic rather than literal truth telling, and for awareness of the contexts and power relations within which persons stand.

  19. Confidential conversations between supervisor and employee as a means for improving leadership: a quasi-experimental study in hospital wards.

    Science.gov (United States)

    Kivimäki, M

    1996-11-01

    Although yearly confidential conversations between a supervisor and an employee have been recommended as a means for improving leadership, evidence on the actual effects of these conversations has been lacking. The present study therefore investigated whether confidential conversations improve perceptions of goal clarity, sufficiency of feedback and innovativeness, and elicit satisfaction with the supervisor's leadership style within the hospital setting. Nine wards were divided into one experimental group (3 wards) and two control groups (3 + 3 wards). A questionnaire on goal clarity, feedback, innovativeness and satisfaction was administered twice to every group (1st measurement: r = 186, 2nd measurement: n = 163). The experimental group began confidential conversations after the first measurement, control group 1 entered into conversations during both measurements, and control group 2 did not enter into conversations at the time of either measurement. Confidential conversations improved perceived feedback. In both measurements, the sufficiency of feedback was reported to be significantly better in the groups having conversations than in the other groups. In addition, there was a significant positive change in the perceived sufficiency of feedback in the experimental group but not in the other groups. Confidential conversations did not affect the perceptions of goal clarity and innovativeness or elicit satisfaction with the supervisor's management style.

  20. Genetic privacy and confidentiality: why they are so hard to protect.

    Science.gov (United States)

    Rothstein, M A

    1998-01-01

    Author notes that widespread concerns have been raised about protecting genetic privacy and confidentiality in insurance and employment. He argues that effective protections are difficult because complicated issues, such as the right of access to health care, are invariably implicated.

  1. The Confidentiality of Medical Secrets of Patients by the Nursing Staff

    Directory of Open Access Journals (Sweden)

    Chalkias Theodoros

    2010-01-01

    Full Text Available In this article you will find a critical discussion about the significance of confidentiality of "medical secrets" (keeping the secrets of ill people by nurses. Special cases are mentioned regarding the need to keep, or reveal the secret.

  2. Microscopic heavy-ion theory. Final technical report, June 1, 1993 - May 31, 1996

    International Nuclear Information System (INIS)

    Ernst, D.J.; Oberacker, V.E.; Umar, A.S.

    1998-01-01

    In this Final Technical Report, the authors summarize the research activities of the three Principal Investigators (Professors Ernst, Oberacker, and Umar) at Vanderbilt University since the last reporting period through the subject award expiration date (Dec. 31, 1996) under contract DE-FG05-87ER40376 with the Department of Energy. The research effort is divided between the following three areas: nuclear structure and astrophysics (microscopic nuclear structure studies and properties of exotic nuclei at HRIBF, supernovae calculations in connection with nuclear astrophysics, and nuclear viscosity studies via muon-induced fission at PSI); pion and kaon interactions with the nucleus at high energies (interaction of pions and kaons with nuclei from low energies to 1 GeV, propagation of excited hadrons in the nuclear medium as probed by pion and electron induced reactions); nuclear physics at high energies (dynamical string-parton model to study multi-particle production at RHIC, electromagnetic lepton pair production at RHIC)

  3. IAEA Technical Meeting on Status of IAEA Fast Reactor Knowledge Preservation Initiative. Presentations

    International Nuclear Information System (INIS)

    2013-01-01

    The objectives of the technical meeting were to: • exchange information between the Member States/International Organizations on national and international initiatives addressing knowledge preservation and data retrieval/collection in the field of fast neutron systems; • present and discuss the Member States’/International Organizations’ policies and conditions for releasing to the IAEA both publicly available and confidential information on fast neutron systems; • collect data on fast neutron systems provided by participating Member States/International Organizations and encourage participants to contribute in data collection; • provide recommendations for further IAEA initiatives in the field of fast reactor knowledge preservation

  4. Head Start Impact Study. Technical Report

    Science.gov (United States)

    Puma, Michael; Bell, Stephen; Cook, Ronna; Heid, Camilla; Shapiro, Gary; Broene, Pam; Jenkins, Frank; Fletcher, Philip; Quinn, Liz; Friedman, Janet; Ciarico, Janet; Rohacek, Monica; Adams, Gina; Spier, Elizabeth

    2010-01-01

    This Technical Report is designed to provide technical detail to support the analysis and findings presented in the "Head Start Impact Study Final Report" (U.S. Department of Health and Human Services, January 2010). Chapter 1 provides an overview of the Head Start Impact Study and its findings. Chapter 2 provides technical information on the…

  5. Payers' experiences with confidential pharmaceutical price discounts: A survey of public and statutory health systems in North America, Europe, and Australasia.

    Science.gov (United States)

    Morgan, Steven G; Vogler, Sabine; Wagner, Anita K

    2017-04-01

    Institutional payers for pharmaceuticals worldwide appear to be increasingly negotiating confidential discounts off of the official list price of pharmaceuticals purchased in the community setting. We conducted an anonymous survey about experiences with and attitudes toward confidential discounts on patented pharmaceuticals in a sample of high-income countries. Confidential price discounts are now common among the ten health systems that participated in our study, though some had only recently begun to use these pricing arrangements on a routine basis. Several health systems had used a wide variety of discounting schemes in the past two years. The most frequent discount received by participating health systems was between 20% and 29% of official list prices; however, six participants reported their health system received one or more discount over the past two years that was valued at 60% or more of the list prices. On average, participants reported that confidential discounts were more common, complex, and significant for specialty pharmaceuticals than for primary care pharmaceuticals. Participants had a more favorable view of the impact of confidential discount schemes on their health systems than on the global marketplace. Overall, the frequency, complexity, and scale of confidential discounts being routinely negotiated suggest that the list prices for medicines bear limited resemblance to what many institutional payers actually pay. Copyright © 2017 The Authors. Published by Elsevier B.V. All rights reserved.

  6. 22 CFR 212.38 - Predisclosure notification procedures for confidential commercial information.

    Science.gov (United States)

    2010-04-01

    ... 22 Foreign Relations 1 2010-04-01 2010-04-01 false Predisclosure notification procedures for confidential commercial information. 212.38 Section 212.38 Foreign Relations AGENCY FOR INTERNATIONAL DEVELOPMENT PUBLIC INFORMATION Access to Agency Records § 212.38 Predisclosure notification procedures for...

  7. 18 CFR 385.606 - Confidentiality in dispute resolution proceedings (Rule 606).

    Science.gov (United States)

    2010-04-01

    ... be required to disclose, any information concerning any dispute resolution communication or any communication provided in confidence to the neutral, unless: (1) All participants in the dispute resolution... reducing the confidence of participants in future cases that their communications will remain confidential...

  8. FORENSIC DNA BANKING LEGISLATION IN DEVELOPING COUNTRIES: PRIVACY AND CONFIDENTIALITY CONCERNS REGARDING A DRAFT FROM TURKISH LEGISLATION.

    Science.gov (United States)

    Ilgili, Önder; Arda, Berna

    This paper presents and analyses, in terms of privacy and confidentiality, the Turkish Draft Law on National DNA Database prepared in 2004, and concerning the use of DNA analysis for forensic objectives and identity verification in Turkey. After a short introduction including related concepts, we evaluate the draft law and provide articles about confidentiality. The evaluation reminded us of some important topics at international level for the developing countries. As a result, the need for sophisticated legislations about DNA databases, for solutions to issues related to the education of employees, and the technological dependency to other countries emerged as main challenges in terms of confidentiality for the developing countries. As seen in the Turkish Draft Law on National DNA Database, the protection of the fundamental rights and freedoms requires more care during the legislative efforts.

  9. Genome privacy: challenges, technical approaches to mitigate risk, and ethical considerations in the United States

    Science.gov (United States)

    Wang, Shuang; Jiang, Xiaoqian; Singh, Siddharth; Marmor, Rebecca; Bonomi, Luca; Fox, Dov; Dow, Michelle; Ohno-Machado, Lucila

    2016-01-01

    Accessing and integrating human genomic data with phenotypes is important for biomedical research. Making genomic data accessible for research purposes, however, must be handled carefully to avoid leakage of sensitive individual information to unauthorized parties and improper use of data. In this article, we focus on data sharing within the scope of data accessibility for research. Current common practices to gain biomedical data access are strictly rule based, without a clear and quantitative measurement of the risk of privacy breaches. In addition, several types of studies require privacy-preserving linkage of genotype and phenotype information across different locations (e.g., genotypes stored in a sequencing facility and phenotypes stored in an electronic health record) to accelerate discoveries. The computer science community has developed a spectrum of techniques for data privacy and confidentiality protection, many of which have yet to be tested on real-world problems. In this article, we discuss clinical, technical, and ethical aspects of genome data privacy and confidentiality in the United States, as well as potential solutions for privacy-preserving genotype–phenotype linkage in biomedical research. PMID:27681358

  10. Security, privacy, and confidentiality issues on the Internet

    OpenAIRE

    Kelly, Grant; McKenzie, Bruce

    2002-01-01

    We introduce the issues around protecting information about patients and related data sent via the Internet. We begin by reviewing three concepts necessary to any discussion about data security in a healthcare environment: privacy, confidentiality, and consent. We are giving some advice on how to protect local data. Authentication and privacy of e-mail via encryption is offered by Pretty Good Privacy (PGP) and Secure Multipurpose Internet Mail Extensions (S/MIME). The de facto Internet standa...

  11. Protecting the confidentiality and security of personal health information in low- and middle-income countries in the era of SDGs and Big Data

    Directory of Open Access Journals (Sweden)

    Eduard J. Beck

    2016-11-01

    success of programs like Universal Health Coverage, under the recently ratified Sustainable Development Goals is also contingent on the availability of personal health information for communicable and non-communicable diseases. Design: Guidance for countries to develop and implement their own guidelines for protecting HIV-information formed the basis of identifying a number of fundamental principles, governing the areas of privacy, confidentiality and security. The use of individual-level data must balance maximizing the benefits from their most effective and fullest use, and minimizing harm resulting from their malicious or inadvertent release. Discussion: These general principles are described in this paper, as along with a bibliography referring to more detailed technical information. A country assessment tool and user's manual, based on these principles, have been developed to support countries to assess the privacy, confidentiality, and security of personal health information at facility, data warehouse/repository, and national levels. The successful development and implementation of national guidance will require strong collaboration at local, regional, and national levels, and this is a pre-condition for the successful implementation of a range of national and global programs. Conclusion: This paper is a call for action for stakeholders in low- and middle-income countries to develop and implement such coherent policies and provides fundamental principles governing the areas of privacy, confidentiality, and security of personal health information being collected in low- and middle-income countries.

  12. Protecting the confidentiality and security of personal health information in low- and middle-income countries in the era of SDGs and Big Data.

    Science.gov (United States)

    Beck, Eduard J; Gill, Wayne; De Lay, Paul R

    2016-01-01

    Universal Health Coverage, under the recently ratified Sustainable Development Goals is also contingent on the availability of personal health information for communicable and non-communicable diseases. Guidance for countries to develop and implement their own guidelines for protecting HIV-information formed the basis of identifying a number of fundamental principles, governing the areas of privacy, confidentiality and security. The use of individual-level data must balance maximizing the benefits from their most effective and fullest use, and minimizing harm resulting from their malicious or inadvertent release. These general principles are described in this paper, as along with a bibliography referring to more detailed technical information. A country assessment tool and user's manual, based on these principles, have been developed to support countries to assess the privacy, confidentiality, and security of personal health information at facility, data warehouse/repository, and national levels. The successful development and implementation of national guidance will require strong collaboration at local, regional, and national levels, and this is a pre-condition for the successful implementation of a range of national and global programs. This paper is a call for action for stakeholders in low- and middle-income countries to develop and implement such coherent policies and provides fundamental principles governing the areas of privacy, confidentiality, and security of personal health information being collected in low- and middle-income countries.

  13. Technical advisory panel for the large acceptance spectrometer: Final report

    International Nuclear Information System (INIS)

    1989-01-01

    The Technical Advisory Panel for the Large Acceptance Spectrometer met on November 17--19, 1988, at CEBAF to perform a second review of the status of this project. The charge to the Panel was ''to provide technical advice to the CEBAF directorate on the design, construction, cost, schedule, and implementation of the Large Acceptance Spectrometer.'' In this written report, an overview of the entire project is given. Specific comments on the major components, data handling and analysis, assembly and installation, and management are presented. The Panel's conclusions are contained in the Executive Summary at the beginning of the report

  14. 12 CFR 366.13 - What is my obligation regarding confidential information?

    Science.gov (United States)

    2010-01-01

    ... services on your behalf may use or disclose information obtained from us or a third party in connection... general public. (b) The following are examples of when your use of confidential information is... financial information, such as a financial statement to an unauthorized party. ...

  15. System-Cost-Optimized Smart EVSE for Residential Application: Final Technical Report including Manufacturing Plan

    Energy Technology Data Exchange (ETDEWEB)

    Zhu, Charles [Delta Products, Triangle Park, NC (United States)

    2015-05-15

    In the 2nd quarter of 2012, a program was formally initiated at Delta Products to develop smart-grid-enabled Electric Vehicle Supply Equipment (EVSE) product for residential use. The project was funded in part by the U.S. Department of Energy (DOE), under award DE-OE0000590. Delta products was the prime contractor to DOE during the three year duration of the project. In addition to Delta Products, several additional supplier-partners were engaged in this research and development (R&D) program, including Detroit Edison DTE, Mercedes Benz Research and Development North America, and kVA. This report summarizes the program and describes the key research outcomes of the program. A technical history of the project activities is provided, which describes the key steps taken in the research and the findings made at successive stages in the multi-stage work. The evolution of an EVSE prototype system is described in detail, culminating in prototypes shipped to Department of Energy Laboratories for final qualification. After the program history is reviewed, the key attributes of the resulting EVSE are described in terms of functionality, performance, and cost. The results clearly demonstrate the ability of this EVSE to meet or exceed DOE's targets for this program, including: construction of a working product-intent prototype of a smart-grid-enabled EVSE, with suitable connectivity to grid management and home-energy management systems, revenue-grade metering, and related technical functions; and cost reduction of 50% or more compared to typical market priced EVSEs at the time of DOE's funding opportunity announcement (FOA), which was released in mid 2011. In addition to meeting all the program goals, the program was completed within the original budget and timeline established at the time of the award. The summary program budget and timeline, comparing plan versus actual values, is provided for reference, along with several supporting explanatory notes. Technical

  16. Final technical evaluation report for the proposed revised reclamation plan for the Atlas Corporation Moab Mill

    International Nuclear Information System (INIS)

    1997-03-01

    This final Technical Evaluation Report (TER) summarizes the US Nuclear Regulatory Commission staff's review of Atlas Corporation's proposed reclamation plan for its uranium mill tailings pile near Moab, Utah. The proposed reclamation would allow Atlas to (1) reclaim the tailings pile for permanent disposal and long-term custodial care by a government agency in its current location on the Moab site, (2) prepare the site for closure, and (3) relinquish responsibility of the site after having its NRC license terminated. The NRC staff concludes that, subject to license conditions identified in the TER, the proposed reclamation plan meets the requirements identified in NRC regulations, which appear primarily in 10 CFR Part 40. 112 refs., 6 figs., 16 tabs

  17. Final Technical Report - SciDAC Cooperative Agreement: Center for Extended Magnetohydrodynamic Modeling/ Transport and Dynamics in Torodial Fusion System

    International Nuclear Information System (INIS)

    Schanck, Dalton D.

    2010-01-01

    Final technical report for research performed by Professor Dalton D. Schnack on SciDAC Cooperative Agreement: Center for Extended MHD Modeling, DE-FC02-06ER54870, for the period 7/1/06 to 2/15/08. Principal results for this period are: 1. Development of a model for computational modeling for the primitive form of the extended MMD equations. This was reported as Phys. Plasmas 13, 058103 (2006). 2. Comparison between the NIMROD and M3D codes for simulation of the nonlinear sawtooth crash in the CDXU tokamak. This was reported in Phys. Plasmas 14, 056105 (2006). 3. Demonstration of 2-fluid and gyroviscous stabilization of interchange modes using computational extended MHD models. This was reported in Phys. Rev. Letters 101, 085005 (2008). Each of these publications is attached as an Appendix of this report. They should be consulted for technical details.

  18. 75 FR 56096 - Access to Confidential Business Information by Industrial Economics Incorporated

    Science.gov (United States)

    2010-09-15

    ... ENVIRONMENTAL PROTECTION AGENCY [EPA-HQ-OPPT-2003-0004; FRL-8845-1] Access to Confidential Business Information by Industrial Economics Incorporated AGENCY: Environmental Protection Agency (EPA). ACTION: Notice. SUMMARY: EPA has authorized contractor, Industrial Economics Incorporated (IEI) of...

  19. 45 CFR 60.15 - Confidentiality of National Practitioner Data Bank information.

    Science.gov (United States)

    2010-10-01

    ... 45 Public Welfare 1 2010-10-01 2010-10-01 false Confidentiality of National Practitioner Data Bank information. 60.15 Section 60.15 Public Welfare DEPARTMENT OF HEALTH AND HUMAN SERVICES GENERAL ADMINISTRATION NATIONAL PRACTITIONER DATA BANK FOR ADVERSE INFORMATION ON PHYSICIANS AND OTHER HEALTH CARE PRACTITIONERS...

  20. 19 CFR 201.19 - Notification regarding requests for confidential business information.

    Science.gov (United States)

    2010-04-01

    ... business information. 201.19 Section 201.19 Customs Duties UNITED STATES INTERNATIONAL TRADE COMMISSION GENERAL RULES OF GENERAL APPLICATION Availability of Information to the Public Pursuant to 5 U.S.C. 552 § 201.19 Notification regarding requests for confidential business information. (a) In general. Business...

  1. Biobanks in South Africa: A global perspective on privacy and confidentiality

    Directory of Open Access Journals (Sweden)

    Riaan Rheeder

    2017-05-01

    Full Text Available The Universal Declaration of Bioethics and Human Rights (UDBHR of the United Nations Educational, Scientific and Cultural Organization (UNESCO was adopted unanimously in 2005 by the world community as a universal guideline, according to which members of the global community were accountable to each other. Research results from UNESCO show that the UDBHR has had little or no impact in South Africa (SA. The primary objective of this article is to promote awareness of the UDBHR in SA and Africa by focusing on Article 9 of the Declaration, which accepts the right to privacy and confidentiality. For this objective to be relevant in the SA context, depends on whether the guidelines of the National Department of Health’s Ethics in Health Research: Principles, Processes and Structures of 2015 acknowledge biobanks of the universally accepted ethical guidelines on privacy and confidentiality of autonomous persons and whether these guidelines are broadly in accordance with global bioethical guidelines.

  2. GPHS-RTGs in support of the Cassini RTG Program. Addendum to the final technical report, May 1--December 31, 1998

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1998-12-01

    This Addendum to the Cassini GPHS-RTG Program Final Technical Progress Report describes activities performed during the period 1 May 1998 through 31 December 1998, including effort reflecting contract modification M058. These activities include Earth Gravity Assist (EGA) reentry and related analyses which are detailed in Part A, and effort related to the installation of CAGO equipment within Lockheed Martin`s Building 100 facility in Valley Forge, PA, which is detailed in Part B.

  3. GPHS-RTGs in support of the Cassini RTG Program. Addendum to the final technical report, May 1-December 31, 1998

    International Nuclear Information System (INIS)

    1998-12-01

    This Addendum to the Cassini GPHS-RTG Program Final Technical Progress Report describes activities performed during the period 1 May 1998 through 31 December 1998, including effort reflecting contract modification M058. These activities include Earth Gravity Assist (EGA) reentry and related analyses which are detailed in Part A, and effort related to the installation of CAGO equipment within Lockheed Martin's Building 100 facility in Valley Forge, PA, which is detailed in Part B

  4. 78 FR 54889 - Proposed Information Collection Request; Comment Request; Confidentiality Rules (Renewal)

    Science.gov (United States)

    2013-09-06

    ... received will be included in the public docket without change including any personal information provided, unless the comment includes profanity, threats, or information claimed to be Confidential Business... of appropriate automated electronic, mechanical, or other technological collection techniques or...

  5. The Psychological Competence of Police Officers in Confidential Cooperation with Citizens

    Science.gov (United States)

    Uspanov, Zholdybai T.; Turabayeva, Dana S.; Ermolovich, Vladimir F.

    2016-01-01

    This research studied the psychological aspects of citizens' assistance to law enforcement agencies on a confidential basis. The comprehensive observance of the psychological norms of cooperation is determined by the professional ethics of police officers, the necessity of nondisclosure of investigation secrets by citizens, and the security of the…

  6. 76 FR 69722 - Access to Confidential Business Information by Protection Strategies Incorporated

    Science.gov (United States)

    2011-11-09

    ... Business Information by Protection Strategies Incorporated AGENCY: Environmental Protection Agency (EPA... Control Act (TSCA) confidential business information and to provide notice that this contract has been extended until December 31, 2011. Protection Strategies Incorporated (PSI) has been the owner of Eagle...

  7. Modular Radioisotope Thermoelectric Generator (RTG) Program. Final technical report

    Energy Technology Data Exchange (ETDEWEB)

    1992-12-31

    Section 2.0 of this report summarizes the MOD-RTG reference flight design, and Section 3.0 discusses the Ground Demonstration System design. Multicouple technology development is discussed in Section 4.0, and Section 5.0 lists all published technical papers prepared during the course of the contract.

  8. Final report on a study of coherence in acceptability criteria for the technical aspects of risks associated with potentially hazardous installations

    International Nuclear Information System (INIS)

    Chicken, J.C.

    1988-01-01

    This report describes the results of the study that was made, under Contract No ECI-1390-B7221-85D, for the European Atomic Energy Community. The aim of the study was to examine and assess the feasibility of developing coherent and uniform criteria for judging the acceptability of the technical aspects of the risks associated with potentially hazardous installations. The report is arranged in five main parts. First the nature of hazardous installations is considered and this provides the basis for examination of the currently-used technical risk acceptability criteria. Next, the possible forms of criteria are explored and then universally consistent partial and overall technical risk acceptability criteria are proposed. Following this the implications of using the criteria proposed at the design, regulatory and operating levels are examined. Then, by testing the criteria against some real decisions, the practical problems of using the proposed criteria are explored. This leads to consideration of possible alternatives to the proposed criteria. Finally the conclusions that appear to be justified are summarized and the need for further work is identified

  9. Anonymous or confidential HIV counseling and voluntary testing in federally funded testing sites--United States, 1995-1997.

    Science.gov (United States)

    1999-06-25

    Human immunodeficiency virus (HIV) counseling and voluntary testing (CT) programs have been an important part of national HIV prevention efforts since the first HIV antibody tests became available in 1985. In 1995, these programs accounted for approximately 15% of annual HIV antibody testing in the United States, excluding testing for blood donation. CT opportunities are offered to persons at risk for HIV infection at approximately 11,000 sites, including dedicated HIV CT sites, sexually transmitted disease (STD) clinics, drug-treatment centers, hospitals, and prisons. In 39 states, testing can be obtained anonymously, where persons do not have to give their name to get tested. All states provide confidential testing (by name) and have confidentiality laws and regulations to protect this information. This report compares patterns of anonymous and confidential testing in all federally funded CT programs from 1995 through 1997 and documents the importance of both types of testing opportunities.

  10. Final Technical Report

    Energy Technology Data Exchange (ETDEWEB)

    Howe, Gary [RTI International, Research Triangle Park, NC (United States); Albritton, John [RTI International, Research Triangle Park, NC (United States); Denton, David [RTI International, Research Triangle Park, NC (United States); Turk, Brian [RTI International, Research Triangle Park, NC (United States); Gupta, Raghubir [RTI International, Research Triangle Park, NC (United States)

    2018-01-31

    technology has great potential to provide clean syngas from coal and petcoke-based gasification at increased efficiency and at significantly lower capital and operating costs than conventional syngas cleanup technologies. However, before the technology can be deemed ready for scale-up to a full commercial-scale demonstration, additional R&D testing is needed at the site to address the following critical technical risks: WDP sorbent stability and performance; Impact of WDP on downstream cleanup and conversion steps; Metallurgy and refractory; Syngas cleanup performance and controllability; Carbon capture performance and additional syngas cleanup The proposed plan to acquire this additional R&D data involves: Operation of the units to achieve an additional 3,000 hours of operation of the system within the performance period, with a target of achieving 1,000 hours of those hours via continuous operation of the entire integrated pre-commercial demonstration system; Rapid turnaround of repairs and/or modifications required as necessary to return any specific unit to operating status with documentation and lessons learned to support technology maturation, and; Proactive performance of maintenance activities during any unplanned outages and if possible while operating.

  11. 75 FR 44951 - Inquiry To Learn Whether Businesses Assert Business Confidentiality Claims

    Science.gov (United States)

    2010-07-30

    ... such treatment. Certain businesses, however, do not meet the definition of ``affected business,'' and... definition of ``affected business,'' and are not covered by today's notice. They consist of any business that... Businesses Assert Business Confidentiality Claims AGENCY: Environmental Protection Agency (EPA). ACTION...

  12. 76 FR 362 - Inquiry To Learn Whether Businesses Assert Business Confidentiality Claims

    Science.gov (United States)

    2011-01-04

    ... claims for such treatment. Certain businesses, however, do not meet the definition of ``affected business.... Certain businesses, however, do not meet the definition of ``affected business,'' and are not covered by... Businesses Assert Business Confidentiality Claims AGENCY: Environmental Protection Agency (EPA). ACTION...

  13. Scheduler-specific Confidentiality for Multi-Threaded Programs and Its Logic-Based Verification

    NARCIS (Netherlands)

    Huisman, Marieke; Ngo, Minh Tri

    2011-01-01

    Observational determinism has been proposed in the literature as a way to ensure confidentiality for multi-threaded programs. Intuitively, a program is observationally deterministic if the behavior of the public variables is deterministic, i.e., independent of the private variables and the

  14. 75 FR 55577 - Clean Water Act; Contractor Access to Confidential Business Information

    Science.gov (United States)

    2010-09-13

    ... ENVIRONMENTAL PROTECTION AGENCY [FRL-9200-8] Clean Water Act; Contractor Access to Confidential... Recovery Act (RCRA). Transfer of the information will allow the contractor and subcontractors to access... contractors and subcontractors over the history of the effluent guidelines program. EPA determined that this...

  15. 77 FR 60962 - Clean Water Act; Contractor Access to Confidential Business Information

    Science.gov (United States)

    2012-10-05

    ... ENVIRONMENTAL PROTECTION AGENCY 40 CFR Part 2 [FRL-9733-8] Clean Water Act; Contractor Access to... transfer of confidential business information to contractor, subcontractors, and consultants. SUMMARY: The... certain industries. We have determined that the contractors listed below require access [[Page 60963

  16. 75 FR 60452 - Clean Water Act; Contractor Access to Confidential Business Information

    Science.gov (United States)

    2010-09-30

    ... ENVIRONMENTAL PROTECTION AGENCY [FRL-9208-9] Clean Water Act; Contractor Access to Confidential... electric industry to a new subcontractor of a contractor, Eastern Research Group (ERG). EPA previously... contractors and subcontractors to access information necessary to support EPA in the planning, development...

  17. NetView technical research

    Science.gov (United States)

    1993-01-01

    This is the Final Technical Report for the NetView Technical Research task. This report is prepared in accordance with Contract Data Requirements List (CDRL) item A002. NetView assistance was provided and details are presented under the following headings: NetView Management Systems (NMS) project tasks; WBAFB IBM 3090; WPAFB AMDAHL; WPAFB IBM 3084; Hill AFB; McClellan AFB AMDAHL; McClellan AFB IBM 3090; and Warner-Robins AFB.

  18. Final technical evaluation report for the proposed revised reclamation plan for the Atlas Corporation Moab Mill

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1997-03-01

    This final Technical Evaluation Report (TER) summarizes the US Nuclear Regulatory Commission staff`s review of Atlas Corporation`s proposed reclamation plan for its uranium mill tailings pile near Moab, Utah. The proposed reclamation would allow Atlas to (1) reclaim the tailings pile for permanent disposal and long-term custodial care by a government agency in its current location on the Moab site, (2) prepare the site for closure, and (3) relinquish responsibility of the site after having its NRC license terminated. The NRC staff concludes that, subject to license conditions identified in the TER, the proposed reclamation plan meets the requirements identified in NRC regulations, which appear primarily in 10 CFR Part 40. 112 refs., 6 figs., 16 tabs.

  19. Engaging Local Stakeholders on Technical Issues: Test Case at the La Hague Reprocessing Plant - 59211

    International Nuclear Information System (INIS)

    Gilli, Ludivine

    2012-01-01

    In 2009 and 2010, the Institute for Nuclear Safety and Radiation Protection (IRSN) lead a pilot action dealing with the decommissioning of a workshop located on the site of Areva's La Hague fuel-reprocessing plant site in Northwestern France. The purpose of the pilot program was to test ways for IRSN and a few local stakeholders (Non-Governmental Organizations (NGOs) members, local elected officials, etc.) to engage in technical discussions. The discussions were intended to enable the local stakeholders to review the operator's decommissioning application and provide input. The pilot program confirmed there is a definite challenge in successfully opening a meaningful dialogue to discuss technical issues. Three factors influence the extent of the challenge: the knowledge gap between experts and local stakeholders, the conflict between transparency and confidentiality which is inherent with technical topics, and the difficulty for an official expertise institute to hold a dialogue with 'outsiders' during an ongoing reviewing process in which it is participating. The pilot program, given its mixed results, also provided valuable lessons for further improvement of stakeholders' involvement. (authors)

  20. A proposed architecture and method of operation for improving the protection of privacy and confidentiality in disease registers

    Directory of Open Access Journals (Sweden)

    Churches Tim

    2003-01-01

    Full Text Available Abstract Background Disease registers aim to collect information about all instances of a disease or condition in a defined population of individuals. Traditionally methods of operating disease registers have required that notifications of cases be identified by unique identifiers such as social security number or national identification number, or by ensembles of non-unique identifying data items, such as name, sex and date of birth. However, growing concern over the privacy and confidentiality aspects of disease registers may hinder their future operation. Technical solutions to these legitimate concerns are needed. Discussion An alternative method of operation is proposed which involves splitting the personal identifiers from the medical details at the source of notification, and separately encrypting each part using asymmetrical (public key cryptographic methods. The identifying information is sent to a single Population Register, and the medical details to the relevant disease register. The Population Register uses probabilistic record linkage to assign a unique personal identification (UPI number to each person notified to it, although not necessarily everyone in the entire population. This UPI is shared only with a single trusted third party whose sole function is to translate between this UPI and separate series of personal identification numbers which are specific to each disease register. Summary The system proposed would significantly improve the protection of privacy and confidentiality, while still allowing the efficient linkage of records between disease registers, under the control and supervision of the trusted third party and independent ethics committees. The proposed architecture could accommodate genetic databases and tissue banks as well as a wide range of other health and social data collections. It is important that proposals such as this are subject to widespread scrutiny by information security experts, researchers and

  1. Report to Advertising Standards Authority, UK

    DEFF Research Database (Denmark)

    Virdi, Kuldeep

    2009-01-01

    The report assesses the claims in an advertisement against technical submisison from competitors. The details are subject to a confidentiality agreement.......The report assesses the claims in an advertisement against technical submisison from competitors. The details are subject to a confidentiality agreement....

  2. Final priority; technical assistance to improve state data capacity--National Technical Assistance Center to improve state capacity to accurately collect and report IDEA data. Final priority.

    Science.gov (United States)

    2013-05-20

    The Assistant Secretary for Special Education and Rehabilitative Services announces a priority under the Technical Assistance to Improve State Data Capacity program. The Assistant Secretary may use this priority for competitions in fiscal year (FY) 2013 and later years. We take this action to focus attention on an identified national need to provide technical assistance (TA) to States to improve their capacity to meet the data collection and reporting requirements of the Individuals with Disabilities Education Act (IDEA). We intend this priority to establish a TA center to improve State capacity to accurately collect and report IDEA data (Data Center).

  3. Contributory factors in surgical incidents as delineated by a confidential reporting system.

    Science.gov (United States)

    Mushtaq, F; O'Driscoll, C; Smith, Fct; Wilkins, D; Kapur, N; Lawton, R

    2018-05-01

    Background Confidential reporting systems play a key role in capturing information about adverse surgical events. However, the value of these systems is limited if the reports that are generated are not subjected to systematic analysis. The aim of this study was to provide the first systematic analysis of data from a novel surgical confidential reporting system to delineate contributory factors in surgical incidents and document lessons that can be learned. Methods One-hundred and forty-five patient safety incidents submitted to the UK Confidential Reporting System for Surgery over a 10-year period were analysed using an adapted version of the empirically-grounded Yorkshire Contributory Factors Framework. Results The most common factors identified as contributing to reported surgical incidents were cognitive limitations (30.09%), communication failures (16.11%) and a lack of adherence to established policies and procedures (8.81%). The analysis also revealed that adverse events were only rarely related to an isolated, single factor (20.71%) - with the majority of cases involving multiple contributory factors (79.29% of all cases had more than one contributory factor). Examination of active failures - those closest in time and space to the adverse event - pointed to frequent coupling with latent, systems-related contributory factors. Conclusions Specific patterns of errors often underlie surgical adverse events and may therefore be amenable to targeted intervention, including particular forms of training. The findings in this paper confirm the view that surgical errors tend to be multi-factorial in nature, which also necessitates a multi-disciplinary and system-wide approach to bringing about improvements.

  4. Quantum key based burst confidentiality in optical burst switched networks.

    Science.gov (United States)

    Balamurugan, A M; Sivasubramanian, A

    2014-01-01

    The optical burst switching (OBS) is an emergent result to the technology concern that could achieve a feasible network in future. They are endowed with the ability to meet the bandwidth requirement of those applications that require intensive bandwidth. There are more domains opening up in the OBS that evidently shows their advantages and their capability to face the future network traffic. However, the concept of OBS is still far from perfection facing issues in case of security threat. The transfer of optical switching paradigm to optical burst switching faces serious downfall in the fields of burst aggregation, routing, authentication, dispute resolution, and quality of service (QoS). This paper deals with employing RC4 (stream cipher) to encrypt and decrypt bursts thereby ensuring the confidentiality of the burst. Although the use of AES algorithm has already been proposed for the same issue, by contrasting the two algorithms under the parameters of burst encryption and decryption time, end-to-end delay, it was found that RC4 provided better results. This paper looks to provide a better solution for the confidentiality of the burst in OBS networks.

  5. Quantum Key Based Burst Confidentiality in Optical Burst Switched Networks

    Directory of Open Access Journals (Sweden)

    A. M. Balamurugan

    2014-01-01

    Full Text Available The optical burst switching (OBS is an emergent result to the technology concern that could achieve a feasible network in future. They are endowed with the ability to meet the bandwidth requirement of those applications that require intensive bandwidth. There are more domains opening up in the OBS that evidently shows their advantages and their capability to face the future network traffic. However, the concept of OBS is still far from perfection facing issues in case of security threat. The transfer of optical switching paradigm to optical burst switching faces serious downfall in the fields of burst aggregation, routing, authentication, dispute resolution, and quality of service (QoS. This paper deals with employing RC4 (stream cipher to encrypt and decrypt bursts thereby ensuring the confidentiality of the burst. Although the use of AES algorithm has already been proposed for the same issue, by contrasting the two algorithms under the parameters of burst encryption and decryption time, end-to-end delay, it was found that RC4 provided better results. This paper looks to provide a better solution for the confidentiality of the burst in OBS networks.

  6. A Systematic Review on Confidentiality, Disclosure, and Stigma in the United States: Lessons for HIV Care in Pregnancy From Reproductive Genetics.

    Science.gov (United States)

    Wilkinson, Barbara; Arora, Kavita Shah

    2015-01-01

    The fields of HIV care in pregnancy and reproductive genetics have always been 'exceptional' in that patients are highly concerned about the potential for stigma and the corresponding need for privacy and confidentiality. However, the two fields have diverged in how they have addressed these concerns. The systematic review analyzed 61 manuscripts for similarities and differences between the fields of HIV care in pregnancy and reproductive genetics in the United States, with respect to privacy, confidentiality, disclosure, and stigma. The systematic review revealed that the field of HIV care in pregnancy has insufficiently addressed patient concerns about privacy, confidentiality, and stigma compared to the field of reproductive genetics. Failure to adequately protect confidentiality of HIV-positive patients, and failure to reduce stigma associated with HIV testing and treatment are deficiencies in the delivery of care to HIV-positive pregnant woman and barriers to reducing vertical transmission of HIV. Improvements in care and policy should mirror the field of reproductive genetics.

  7. Gossip, stories and friendship: confidentiality in midwifery practice.

    Science.gov (United States)

    James, S

    1995-12-01

    Women often seek midwifery care as an alternative to the maternity services that are readily available within the insured health care system in Alberta. Some aspects of community-based, primary care midwifery in Alberta that characterize this alternative are the use of story-telling as a form of knowledge, the development of social connections among women seeking midwifery care, and nonauthoritarian relationships between midwives and women. In this paper, the concept of confidentiality, as it relates to these aspects of midwifery practice, is explored, using traditional, caring and feminist models of ethics.

  8. 75 FR 4812 - Inquiry To Learn Whether Businesses Assert Business Confidentiality Claims

    Science.gov (United States)

    2010-01-29

    ..., however, do not meet the definition of ``affected business,'' and are not covered by today's notice. They.... Certain businesses, however, do not meet the definition of ``affected business,'' and are not covered by... Businesses Assert Business Confidentiality Claims AGENCY: Environmental Protection Agency (EPA). ACTION...

  9. 78 FR 79692 - Clean Water Act; Contractor Access to Confidential Business Information

    Science.gov (United States)

    2013-12-31

    ... ENVIRONMENTAL PROTECTION AGENCY [FRL-9904-94-OW] Clean Water Act; Contractor Access to... Transfer of Confidential Business Information to Contractor, Subcontractors, and Consultants. SUMMARY: The... contractors listed below require access to CBI submitted to EPA under Section 308 of the Clean Water Act (CWA...

  10. 5 CFR 213.3301 - Positions of a confidential or policy-determining nature.

    Science.gov (United States)

    2010-01-01

    ... 5 Administrative Personnel 1 2010-01-01 2010-01-01 false Positions of a confidential or policy-determining nature. 213.3301 Section 213.3301 Administrative Personnel OFFICE OF PERSONNEL MANAGEMENT CIVIL... or policy-determining nature. (a) Upon specific authorization by OPM, agencies may make appointments...

  11. Using and Disclosing Confidential Patient Information and The English Common Law: What are the Information Requirements of a Valid Consent?

    Science.gov (United States)

    Chico, Victoria; Taylor, Mark J

    2018-02-01

    The National Health Service in England and Wales is dependent upon the flow of confidential patient data. In the context of consent to the use of patient health data, insistence on the requirements of an 'informed' consent that are difficult to achieve will drive reliance on alternatives to consent. Here we argue that one can obtain a valid consent to the disclosure of confidential patient data, such that this disclosure would not amount to a breach of the common law duty of confidentiality, having provided less information than would typically be associated with an 'informed consent'. This position protects consent as a practicable legal basis for disclosure from debilitating uncertainty or impracticability and, perhaps counter-intuitively, promotes patient autonomy.

  12. DLP: REDUCED RISK OF LEAKAGE OF CONFIDENTIAL INFORMATION OF THE BANK

    Directory of Open Access Journals (Sweden)

    T. A. Andryianava

    2017-01-01

    Full Text Available Research application of DLP-system for protection of confidential information, a methodology for adapting the DLP-system to the specific activities of the organization, comparative analysis of the results of standard and adapted DLP-systems in the Bank. Developed: a technique for analyzing information security events, algorithm for responding to identified events, methodology and procedures for adapting the standard DLP-system to the specifics of the Bank’s activities. The methodology for adapting a standard DLP-system to the specifics of the Bank’s work consists of the following activities: identification of critical corporate information categories, audit of information systems, description of current risks and their assessment, introduction of rules for Bank’s critical information and setting up a DLP system in accordance with the specifics of the Bank’s work. Modernization of the configuration of a standard DLP-system includes the following procedures: selection of confidential information of the Bank based on membership criteria, setting up detection, creating perimeters and developing an algorithm for responding to identified information security events in the Bank. The algorithm is designed to improve the efficiency of the response of information security officers in cases of incident detection and describes the stages of the subsequent actions. The results of the research prove that using an adapted DLP-system significantly reduces the number of false positives, increasing the accuracy of detecting confidential information and reducing the risk of leakage of critical information outside the corporate network. The application of the adapted DLP-system in the Bank allowed to increase the speed of response of information security specialists to the information security events detected by the DLP-system adapted to the Bank, and also allowed the DLP-system to transition from the copy mode to the blocking mode of illegitimate transfer

  13. Final Environmental Assessment For Proposed Family Campground Expansion Maxwell Air Force Base, Montgomery County, Alabama

    Science.gov (United States)

    2013-03-27

    during Final EA preparation. Providing private address information with your comment is voluntary and such personal information will be kept confidential ...commercially available. 4.2 Commercial kitchen appliances shall be either ENERGY STAR®, FEMP designated or qualified for California Utilities Rebate Program... kitchen pre-rinse spray valves (PRSV) with low flow nozzles) i. Install or convert to only ENERGY STAR® Commercial Dishwashers j. Install or convert to

  14. Law on consent and confidentiality in India: a need for clarity.

    Science.gov (United States)

    Mathiharan, Karunakaran

    2014-01-01

    The concept of informed consent specific to medical research and treatment is still alien to many medical researchers and practitioners and to millions of Indians. The doctor-patient relationship in India is governed more by trust where the doctor is the authoritative person. Therefore, the benefit of informed consent does not reach all patients in day-to-day medical practice. To complicate the issue, the Indian law is not specific about the age at which a person can give valid consent. The Indian Penal Code is silent about the legal validity of consent given by persons between 12 and 18 years of age. Similarly, the age at which the 'Right to Confidentiality' begins is yet to be defined either by the statute or by the courts. Hence, there is a need for a clear statutory provision to remove the anomalies and ambiguities regarding the age of consent to undergo invasive therapeutic or investigative procedures, participate in clinical trials, as well as define the age at which a person's right to medical confidentiality begins.

  15. Confidentiality Concerns and Sexual and Reproductive Health Care Among Adolescents and Young Adults Aged 15-25.

    Science.gov (United States)

    Copen, Casey E; Dittus, Patricia J; Leichliter, Jami S

    2016-12-01

    Data from the National Survey of Family Growth •About 7% of persons aged 15-25 would not seek sexual or reproductive health care because of concerns that their parents might find out about it. •For females aged 15-17 and 18-25, those who had confidentiality concerns were less likely to receive sexual and reproductive health services in the past year compared with those without these concerns. •Less than one-half of teenagers aged 15-17 (38.1%) spent some time alone in the past year during a visit with a doctor or other health care provider without a parent, relative, or guardian in the room. •Teenagers aged 15-17 who spent some time alone during a visit with a health care provider were more likely to have received sexual or reproductive health services in the past year compared with those who had not. Confidentiality concerns can impact adolescent and young adults' access to sexual and reproductive health services (1-4). Young people who are covered by their parents' private health insurance may be deterred from obtaining these services due to concerns that their parents might find out about it (2). Similarly, confidentiality concerns may arise because youth seeking such services may not have time alone during a visit with a health care provider (4). This report describes two measures related to confidentiality concerns and sexual and reproductive health care. All material appearing in this report is in the public domain and may be reproduced or copied without permission; citation as to source, however, is appreciated.

  16. Yucca Mountain Climate Technical Support Representative

    International Nuclear Information System (INIS)

    Sharpe, Saxon E

    2007-01-01

    The primary objective of Project Activity ORD-FY04-012, 'Yucca Mountain Climate Technical Support Representative', was to provide the Office of Civilian Radioactive Waste Management (OCRWM) with expertise on past, present, and future climate scenarios and to support the technical elements of the Yucca Mountain Project (YMP) climate program. The Climate Technical Support Representative was to explain, defend, and interpret the YMP climate program to the various audiences during Site Recommendation and License Application. This technical support representative was to support DOE management in the preparation and review of documents, and to participate in comment response for the Final Environmental Impact Statement, the Site Recommendation Hearings, the NRC Sufficiency Comments, and other forums as designated by DOE management. Because the activity was terminated 12 months early and experience a 27% reduction in budget, it was not possible to complete all components of the tasks as originally envisioned. Activities not completed include the qualification of climate datasets and the production of a qualified technical report. The following final report is an unqualified summary of the activities that were completed given the reduced time and funding

  17. Assessing subject privacy and data confidentiality in an emerging region for clinical trials: United Arab Emirates.

    Science.gov (United States)

    Nair, Satish Chandrasekhar; Ibrahim, Halah

    2015-01-01

    Pharmaceutical sponsored clinical trials, formerly conducted predominantly in the United States and Europe, have expanded to emerging regions, including the Middle East. Our study explores factors influencing clinical trial privacy and confidentiality in the United Arab Emirates. Factors including concept familiarity, informed consent compliance, data access, and preservation, were analyzed to assess current practices in the Arab world. As the UAE is an emerging region for clinical trials, there is a growing need for regulations related to data confidentiality and subject privacy. Informational and decisional privacy should be viewed within the realms of Arab culture and religious background.

  18. Systems study 'Alternative Entsorgung'. Final report. Technical annex 6

    International Nuclear Information System (INIS)

    1984-08-01

    In the conditioning plant, fuel elements which have been stored for ten years are loaded into transport containers, unloaded, identified and welded into a dry storage box. The dry store barrel is introduced into a final storage container, which, after being closed, is packed in lost shielding. This so-called final storage barrel is finally placed in a transport container and leaves the conditioning plant in this form by rail for transport to the final storage mine. The fuel element method of treatment 'packing of three complete fuel elements' was used as the reference process. In addition, the method of treatment 'fuel elements dismantled into fuel rods' was also examined. The handling of fuel elements and secondary waste treatment in the reference process are described in detail. (orig./HP) [de

  19. 42 CFR 2.2 - Statutory authority for confidentiality of alcohol abuse patient records.

    Science.gov (United States)

    2010-10-01

    ... HUMAN SERVICES GENERAL PROVISIONS CONFIDENTIALITY OF ALCOHOL AND DRUG ABUSE PATIENT RECORDS Introduction.... (B) To qualified personnel for the purpose of conducting scientific research, management audits, financial audits, or program evaluation, but such personnel may not identify, directly or indirectly, any...

  20. IRIS Final Technical Progress Report

    Energy Technology Data Exchange (ETDEWEB)

    M. D. Carelli

    2003-11-03

    OAK-B135 This NERI project, originally started as the Secure Transportable Autonomous Light Water Reactor (STAR-LW) and currently known as the International Reactor Innovative and Secure (IRIS) project, had the objective of investigating a novel type of water-cooled reactor to satisfy the Generation IV goals: fuel cycle sustainability, enhanced reliability and safety, and improved economics. The research objectives over the three-year (1999-2002) program were as follows: First year: Assess various design alternatives and establish main characteristics of a point design; Second year: Perform feasibility and engineering assessment of the selected design solutions; Third year: Complete reactor design and performance evaluation, including cost assessment These objectives were fully attained and actually they served to launch IRIS as a full fledged project for eventual commercial deployment. The program did not terminate in 2002 at the end of the NERI program, and has just entered in its fifth year. This has been made possible by the IRIS project participants which have grown from the original four member, two-countries team to the current twenty members, nine countries consortium. All the consortium members work under their own funding and it is estimated that the value of their in-kind contributions over the life of the project has been of the order of $30M. Currently, approximately 100 people worldwide are involved in the project. A very important constituency of the IRIS project is the academia: 7 universities from four countries are members of the consortium and five more US universities are associated via parallel NERI programs. To date, 97 students have worked or are working on IRIS; 59 IRIS-related graduate theses have been prepared or are in preparation, and 41 of these students have already graduated with M.S. (33) or Ph.D. (8) degrees. This ''final'' report (final only as far as the NERI program is concerned) summarizes the work performed

  1. Family Violence Prevention and Services Programs. Final rule.

    Science.gov (United States)

    2016-11-02

    This rule will better prevent and protect survivors of family violence, domestic violence, and dating violence, by clarifying that all survivors must have access to services and programs funded under the Family Violence Prevention and Services Act. More specifically, the rule enhances accessibility and non-discrimination provisions, clarifies confidentiality rules, promotes coordination among community-based organizations, State Domestic Violence Coalitions, States, and Tribes, as well as incorporates new discretionary grant programs. Furthermore, the rule updates existing regulations to reflect statutory changes made to the Family Violence Prevention and Services Act, and updates procedures for soliciting and awarding grants. The rule also increases clarity and reduces potential confusion over statutory and regulatory standards. The rule codifies standards already used by the program in the Funding Opportunity Announcements and awards, in technical assistance, in reporting requirements, and in sub-regulatory guidance.

  2. Spatial confidentiality and GIS: re-engineering mortality locations from published maps about Hurricane Katrina

    Directory of Open Access Journals (Sweden)

    Leitner Michael

    2006-10-01

    Full Text Available Abstract Background Geographic Information Systems (GIS can provide valuable insight into patterns of human activity. Online spatial display applications, such as Google Earth, can democratise this information by disseminating it to the general public. Although this is a generally positive advance for society, there is a legitimate concern involving the disclosure of confidential information through spatial display. Although guidelines exist for aggregated data, little has been written concerning the display of point level information. The concern is that a map containing points representing cases of cancer or an infectious disease, could be re-engineered back to identify an actual residence. This risk is investigated using point mortality locations from Hurricane Katrina re-engineered from a map published in the Baton Rouge Advocate newspaper, and a field team validating these residences using search and rescue building markings. Results We show that the residence of an individual, visualized as a generalized point covering approximately one and half city blocks on a map, can be re-engineered back to identify the actual house location, or at least a close neighbour, even if the map contains little spatial reference information. The degree of re-engineering success is also shown to depend on the urban characteristic of the neighborhood. Conclusion The results in this paper suggest a need to re-evaluate current guidelines for the display of point (address level data. Examples of other point maps displaying health data extracted from the academic literature are presented where a similar re-engineering approach might cause concern with respect to violating confidentiality. More research is also needed into the role urban structure plays in the accuracy of re-engineering. We suggest that health and spatial scientists should be proactive and suggest a series of point level spatial confidentiality guidelines before governmental decisions are made

  3. Spatial confidentiality and GIS: re-engineering mortality locations from published maps about Hurricane Katrina.

    Science.gov (United States)

    Curtis, Andrew J; Mills, Jacqueline W; Leitner, Michael

    2006-10-10

    Geographic Information Systems (GIS) can provide valuable insight into patterns of human activity. Online spatial display applications, such as Google Earth, can democratise this information by disseminating it to the general public. Although this is a generally positive advance for society, there is a legitimate concern involving the disclosure of confidential information through spatial display. Although guidelines exist for aggregated data, little has been written concerning the display of point level information. The concern is that a map containing points representing cases of cancer or an infectious disease, could be re-engineered back to identify an actual residence. This risk is investigated using point mortality locations from Hurricane Katrina re-engineered from a map published in the Baton Rouge Advocate newspaper, and a field team validating these residences using search and rescue building markings. We show that the residence of an individual, visualized as a generalized point covering approximately one and half city blocks on a map, can be re-engineered back to identify the actual house location, or at least a close neighbour, even if the map contains little spatial reference information. The degree of re-engineering success is also shown to depend on the urban characteristic of the neighborhood. The results in this paper suggest a need to re-evaluate current guidelines for the display of point (address level) data. Examples of other point maps displaying health data extracted from the academic literature are presented where a similar re-engineering approach might cause concern with respect to violating confidentiality. More research is also needed into the role urban structure plays in the accuracy of re-engineering. We suggest that health and spatial scientists should be proactive and suggest a series of point level spatial confidentiality guidelines before governmental decisions are made which may be reactionary toward the threat of revealing

  4. Half of Vermont Academic and Public Libraries Lack Written Confidentiality Policies Despite Directors’ Support for Principles of Patron Confidentiality. A Review of: Magi, Trina J., “The Gap between Theory and Practice: A Study of the Prevalence and Strength of Patron Confidentiality Policies in Public and Academic Libraries.” Library & Information Science Research 29 (2007: 455-70.

    Directory of Open Access Journals (Sweden)

    Stephanie Walker

    2008-09-01

    personnel, or years of experience of the library director or the number of paid library personnel, but there were differences when data were analyzed according to whether the library director held an MLS degree or Vermont Department of Libraries’ Certificate of Public Librarianship, or neither qualification. In libraries where the director held one of the above-mentioned qualifications, 93% required presentation of a binding legal document before permittingrelease of patron information; in libraries where the director held neither qualification, this fell to 58%. Fifty-two per cent of libraries with confidentiality policies required that an attorney review the binding legal documents requesting patron information before such information could be released. Libraries which were more likely to include such a provision in their policies includedlibraries in which the director held either an MLS degree or the Vermont Department of Libraries’ Certificate of Public Librarianship(62%, versus only 8% of libraries where the director holds neither qualification, and libraries with larger numbers of paid personnel (20% of libraries with 2 or fewer personnel had provisions requiring attorney review of binding legal documents, versus 79% of libraries with 3-5 paid personnel, 50% of libraries with 6-10 paid personnel,and 61% of libraries with 11 or more paid personnel. Finally, 74% of respondents supported strengthening Vermont law to enhance safeguards to confidentiality of library records. Twenty-five per cent stated that they would need more information before making a decision, and 1% stated that they would not support such changes. There was a statistically significant difference by library type: 83% of academic library directors supported strengthening the lawas described above, as compared to 73% of public library directors. The article also suggested that education and support should be directed at those libraries which have no confidentiality policy.Conclusion – In 2005

  5. Combined model of 9x9 playfair and RSA for securing confidential ...

    African Journals Online (AJOL)

    Combined model of 9x9 playfair and RSA for securing confidential information. Y.B. Zakariyau, L.J. Muhammad, A.M. Usman, A Garba. Abstract. No Abstract. Keywords: Cryptography, RSA, Playfair Cipher, Public and Secret Key. Full Text: EMAIL FULL TEXT EMAIL FULL TEXT · DOWNLOAD FULL TEXT DOWNLOAD FULL ...

  6. Research Participants' Understanding of and Reactions to Certificates of Confidentiality.

    Science.gov (United States)

    Beskow, Laura M; Check, Devon K; Ammarell, Natalie

    2014-01-01

    Certificates of Confidentiality are intended to facilitate participation in critical public health research by protecting against forced disclosure of identifying data in legal proceedings, but little is known about the effect of Certificate descriptions in consent forms. To gain preliminary insights, we conducted qualitative interviews with 50 HIV-positive individuals in Durham, North Carolina to explore their subjective understanding of Certificate descriptions and whether their reactions differed based on receiving a standard versus simplified description. Most interviewees were neither reassured nor alarmed by Certificate information, and most said it would not influence their willingness to participate or provide truthful information. However, compared with those receiving the simplified description, more who read the standard description said it raised new concerns, that their likelihood of participating would be lower, and that they might be less forthcoming. Most interviewees said they found the Certificate description clear, but standard-group participants often found particular words and phrases confusing, while simplified-group participants more often questioned the information's substance. Valid informed consent requires comprehension and voluntariness. Our findings highlight the importance of developing consent descriptions of Certificates and other confidentiality protections that are simple and accurate. These qualitative results provide rich detail to inform a larger, quantitative study that would permit further rigorous comparisons.

  7. 12 CFR 261.20 - Confidential supervisory information made available to supervised financial institutions and...

    Science.gov (United States)

    2010-01-01

    ... available to supervised financial institutions and financial institution supervisory agencies. 261.20... Supervised Institutions, Financial Institution Supervisory Agencies, Law Enforcement Agencies, and Others in... institutions and financial institution supervisory agencies. (a) Disclosure of confidential supervisory...

  8. Technical oversight for installation of TNX piezometers, Final Report

    Energy Technology Data Exchange (ETDEWEB)

    Pidcoe, W.W. Jr. [Westinghouse Savannah River Company, Aiken, SC (United States)

    1997-06-05

    Science Applications International Corporation was tasked under subcontract C002025P to provide technical oversight for the drilling of one pilot borehole, and the drilling and installation of five piezometers in the TNX Area Swamp. The work was performed in accordance with the Statement of Work in Task Order Proposal No. ER39-129 dated August 6, 1996. This report describes the activities associated with the performance of the task.

  9. Teaching Confidentiality through Comics at One Spanish Medical School.

    Science.gov (United States)

    Lalanda, Mónica; Altisent, Rogelio; Delgado-Marroquín, Maria Teresa

    2018-02-01

    At the University of Zaragoza in Spain we developed an innovative way to teach the concept of confidentiality to medical students, which we tested by comparing the use of customized comics with more traditional methods. We proved that using comics is more attractive to students than lectures and class discussions, that it increases class participation and students' self-awareness of learning, and that it maintains the same academic results. We share our experience visually in a two-page comic. © 2018 American Medical Association. All Rights Reserved.

  10. Volatiles combustion in fluidized beds. Final technical report, 4 September 1992--4 June 1995

    Energy Technology Data Exchange (ETDEWEB)

    Pendergrass, R.A. II; Raffensperger, C.; Hesketh, R.P.

    1996-02-29

    The goal of this project is to investigate the conditions in which volatiles will burn within both the dense and freeboard regions of fluidized beds. Experiments using a fluidized bed operated at incipient fluidization are being conducted to characterize the effect of particle surface area, initial fuel concentration, and particle type on the inhibition of volatiles within a fluidized bed. A review of the work conducted under this grant is presented in this Final Technical Report. Both experimental and theoretical work have been conducted to examine the inhibition of the combustion by the fluidized bed material, sand. It has been shown that particulate phase at incipient fluidization inhibits the combustion of propane by free radical destruction at the surface of sand particles within the particulate phase. The implications of these findings is that at bed temperatures lower than the critical temperatures, gas combustion can only occur in the bubble phase or at the top surface of a bubbling fluidized bed. In modeling fluidized bed combustion this inhibition by the particulate phase should be included.

  11. Development of the biosphere code BIOMOD: final report

    International Nuclear Information System (INIS)

    Kane, P.

    1983-05-01

    Final report to DoE on the development of the biosphere code BIOMOD. The work carried out under the contract is itemised. Reference is made to the six documents issued along with the final report. These consist of two technical notes issued as interim consultative documents, a user's guide and a programmer's guide to BIOMOD, a database description, program test document and a technical note entitled ''BIOMOD - preliminary findings''. (author)

  12. A Detector for Combined SPECT/CT. Final Technical Report

    International Nuclear Information System (INIS)

    Vivek Nagarkar

    2006-01-01

    The goal of the Phase I research was to demonstrate the feasibility of developing a high performance SPECT/CT detector module based on a combination of microcolumnar CsI(Tl) scintillator coupled to an EMCCD readout. We are very pleased to report that our Phase I research has demonstrated the technical feasibility of our approach with a very high degree of success. Specifically, we were able to implement a back-thinned EMCCD with a fiberoptic window which was successfully used to demonstrate the feasibility of near simultaneous radionuclide/CT using the proposed concept. Although significantly limited in imaging area (24 x 24 mm 2 ) and pixel resolution (512 x 512), this prototype has shown exceptional capabilities such as a single optical photon sensitivity, very low noise, an intrinsic resolution of 64 (micro)m for radionuclide imaging, and a resolution in excess of 10 lp/mm for x-ray imaging. Furthermore, the combination of newly developed, thick, microcolumnar CsI and an EMCCD has shown to be capable of operating in a photon counting mode, and that the position and energy information obtained from these data can be used to improve resolution in radionuclide imaging. Finally, the prototype system has successfully been employed for near simultaneous SPECT/CT imaging using both, 125 I and 99m Tc radioisotopes. The tomographic reconstruction data obtained using a mouse heart phantom and other phantoms clearly demonstrate the feasibility and efficacy of the detector in small animal research. The following were the objectives specified in the Phase I proposal: (1) In consultation with Professor Hasegawa, develop specifications for the Phase I/Phase II prototype detector; (2) Modify current vapor deposition protocols to fabricate ∼2 mm thick microcolumnar CsI(Tl) scintillators with excellent columnar structure, high light yield, and high spatial resolution; (3) Perform detailed characterization of the film morphology, light output, and spatial resolution, and use

  13. To Tell, or Not to Tell; Confidentiality in an Iranian HIV Positive Patient: A Viewpoint

    Directory of Open Access Journals (Sweden)

    Mahshad Noroozi

    2017-08-01

    Full Text Available Confidentiality is a basic concept in medical ethics and protecting confidentiality is considered as physicians’ duty. In some occasions, this protection is in conflict with the right of the patient’s sexual partner, who should be informed about the possibility of being infected. The sexual partner being pregnant, the situation is going to be more complicated. In this paper, we present a case discussion with special ethical, legal, social, cultural, and religious aspects. According to this informing sexual partner with the patient’s assent, opt-out Human immunodeficiency virus (HIV screening in pregnant women and enhancing psychosocial and family support are highly recommended. Strategic changes in health system policies and regulations seem to be necessary as well.

  14. Final Technical Report: "Representing Endogenous Technological Change in Climate Policy Models: General Equilibrium Approaches"

    Energy Technology Data Exchange (ETDEWEB)

    Ian Sue Wing

    2006-04-18

    The research supported by this award pursued three lines of inquiry: (1) The construction of dynamic general equilibrium models to simulate the accumulation and substitution of knowledge, which has resulted in the preparation and submission of several papers: (a) A submitted pedagogic paper which clarifies the structure and operation of computable general equilibrium (CGE) models (C.2), and a review article in press which develops a taxonomy for understanding the representation of technical change in economic and engineering models for climate policy analysis (B.3). (b) A paper which models knowledge directly as a homogeneous factor, and demonstrates that inter-sectoral reallocation of knowledge is the key margin of adjustment which enables induced technical change to lower the costs of climate policy (C.1). (c) An empirical paper which estimates the contribution of embodied knowledge to aggregate energy intensity in the U.S. (C.3), followed by a companion article which embeds these results within a CGE model to understand the degree to which autonomous energy efficiency improvement (AEEI) is attributable to technical change as opposed to sub-sectoral shifts in industrial composition (C.4) (d) Finally, ongoing theoretical work to characterize the precursors and implications of the response of innovation to emission limits (E.2). (2) Data development and simulation modeling to understand how the characteristics of discrete energy supply technologies determine their succession in response to emission limits when they are embedded within a general equilibrium framework. This work has produced two peer-reviewed articles which are currently in press (B.1 and B.2). (3) Empirical investigation of trade as an avenue for the transmission of technological change to developing countries, and its implications for leakage, which has resulted in an econometric study which is being revised for submission to a journal (E.1). As work commenced on this topic, the U.S. withdrawal

  15. Virginia Solar Pathways Project Final Technical Report

    Energy Technology Data Exchange (ETDEWEB)

    Bond, Katharine; Cosby, Sarah

    2018-03-28

    This Report provides a technical review of the final results of a funding award to Virginia Electric and Power Company (Dominion Energy Virginia (DEV) or the Company) for a project under the U.S. Department of Energy’s Solar Energy Technologies Office. The three-year project was formally known as the Virginia Solar Pathways Project (VSPP or the Project). The purpose of the VSPP was to develop a collaborative utility-administered solar strategy (Solar Strategy) for DEV’s service territory in the Commonwealth that could serve as a replicable model for other states with similar policy environments. The U.S. Department of Energy (DOE) funding award enabled DEV to take a focused approach to developing the Solar Strategy for its Virginia service territory. The structure and funding from the DOE award also facilitated valuable input from a formal stakeholder team convened to serve as advisors (Advisory Team) to the VSPP and contribute their perspectives and expertise to both the analysis and strategy development aspects of the Project. The development of the Solar Strategy involved three main goals: • Establish a policy and program framework that would integrate existing solar programs with new options appropriate for the Commonwealth’s policy environment and broader economic development objectives; • Promote wider deployment of solar within a low retail electric rate environment; and • Serve as a sustainable, utility-administered solar model that could be replicated in other states with similar policy environments, including, but not limited to, the entire Southeast region. In support of the VSPP goals, the Project Team commissioned four studies to support the Solar Strategy development. Two studies, completed by Navigant Consulting, focused on the integration of solar into the electric grid. The first solar integration study focused on integration of solar into the distribution grid where the utility system directly connects to and serves end-use customers

  16. FOREX trading strategy formation using technical analysis

    OpenAIRE

    Klimavičius, Domas

    2010-01-01

    FOREX technical analysis indicators, their characteristics and capabilities are researched in this final master thesis. The main goal of this thesis is to determine if technical analysis indicators can recognise patterns in price movements and if they can predict future price movement. The first part of the thesis presents with FOREX theoretical aspects, its characteristics and participants. In the second part of the thesis FOREX analysis tools are overviewed, focusing on technical analysis. ...

  17. 75 FR 46948 - Medicare Program; Listening Session Regarding Confidential Feedback Reports and the...

    Science.gov (United States)

    2010-08-04

    ...] Medicare Program; Listening Session Regarding Confidential Feedback Reports and the Implementation of a... Services (CMS), HHS. ACTION: Notice of meeting. SUMMARY: This notice announces a listening session being... modifier to the fee- for-service physician fee schedule. The purpose of the listening session is to solicit...

  18. 78 FR 69337 - Greenhouse Gas Reporting Program: Amendments and Confidentiality Determinations for Fluorinated...

    Science.gov (United States)

    2013-11-19

    ...-AR78 Greenhouse Gas Reporting Program: Amendments and Confidentiality Determinations for Fluorinated... Greenhouse Gas Reporting Rule. The proposed changes would reduce the level of detail in which emissions were..., please go to the Greenhouse Gas Reporting Rule Program Web site at http://www.epa.gov/climatechange...

  19. Final Technical Report for Year 5 Early Career Research Project "Viscosity and equation of state of hot and dense QCD matter"

    Energy Technology Data Exchange (ETDEWEB)

    Molnar, Denes [Purdue Univ., West Lafayette, IN (United States)

    2016-05-25

    The Section below summarizes research activities and achievements during the fifth (last) year of the PI’s Early Career Research Project (ECRP). Unlike the first four years of the project, the last year was not funded under the American Recovery and Reinvestment Act (ARRA). The ECRP advanced two main areas: i) radiative 3 ↔ 2 radiative transport, via development of a new computer code MPC/Grid that solves the Boltzmann transport equation in full 6+1D (3X+3V+time); and ii) application of relativistic hydrodynamics, via development of a self-consistent framework to convert viscous fluids to particles. In Year 5 we finalized thermalization studies with radiative gg ↔ ggg transport (Sec. 1.1.1) and used nonlinear covariant transport to assess the accuracy of fluid-to-particle conversion models (Sec. 1.1.2), calculated observables with self-consistent fluid-to-particle conversion from realistic viscous hydrodynamic evolution (Secs. 1.2.1 and 1.2.2), extended the covariant energy loss formulation to heavy quarks (Sec. 1.4.1) and studied energy loss in small systems (Sec. 1.4.2), and also investigated how much of the elliptic flow could have non-hydrodynamic origin (Sec 1.3). Years 1-4 of the ECRP were ARRA-funded and, therefore, they have their own report document ’Final Technical Report for Years 1-4 of the Early Career Research Project “Viscosity and equation of state of hot and dense QCD matter”’ (same award number DE-SC0004035). The PI’s group was also part of the DOE JET Topical Collaboration, a multi-institution project that overlapped in time significantly with the ECRP. Purdue achievements as part of the JET Top- ical Collaboration are in a separate report “Final Technical Report summarizing Purdue research activities as part of the DOE JET Topical Collaboration” (award DE-SC0004077).

  20. Enhanced Obfuscation Technique for Data Confidentiality in Public Cloud Storage

    OpenAIRE

    Oli S. Arul; Arockiam L.

    2016-01-01

    With an advent of cloud computing, data storage has become a boon in information technology. At the same time, data storage in remote places have become important issues. Lot of techniques are available to ensure protection of data confidentiality. These techniques do not completely serve the purpose in protecting data. The Obfuscation techniques come to rescue for protecting data from malicious attacks. This paper proposes an obfuscation technique to encrypt the desired data type on the clou...

  1. 75 FR 33682 - Export Administration Regulations; Technical Amendments

    Science.gov (United States)

    2010-06-15

    ...-01] RIN 0694-AE93 Export Administration Regulations; Technical Amendments AGENCY: Bureau of Industry... Bureau of Industry and Security (BIS) makes a technical amendment to the Export Administration... review of final decisions and orders issued in BIS export control administrative enforcement proceedings...

  2. Health care fraud and abuse data collection program: technical revisions to Healthcare Integrity and Protection Data Bank data collection activities. Final rule.

    Science.gov (United States)

    2004-09-21

    The rule finalizes technical changes to the Healthcare Integrity and Protection Data Bank (HIPDB) data collection reporting requirements by clarifying the types of personal numeric identifiers that may be reported to the data bank in connection with adverse actions. The rule clarifies that in lieu of a Social Security Number (SSN), an individual taxpayer identification number (ITIN) may be reported to the data bank when, in those limited situations, an individual does not have an SSN.

  3. 75 FR 78238 - Access to Confidential Business Information by Science Applications International Corporation and...

    Science.gov (United States)

    2010-12-15

    ... Business Information by Science Applications International Corporation and Its Identified Subcontractors..., Science Applications International Corporation (SAIC) of San Diego, CA, and Its Identified Subcontractors... Control Act (TSCA). Some of the information may be claimed or determined to be Confidential Business...

  4. 77 FR 76028 - Access to Confidential Business Information by Science Applications International Corporation and...

    Science.gov (United States)

    2012-12-26

    ... Business Information by Science Applications International Corporation and Its Identified Subcontractor...: EPA has authorized its contractor, Science Applications International Corporation (SAIC) of McLean, VA... information may be claimed or determined to be Confidential Business Information (CBI). DATES: Access to the...

  5. 78 FR 66697 - Access to Confidential Business Information by Science Applications International Corporation and...

    Science.gov (United States)

    2013-11-06

    ... Business Information by Science Applications International Corporation and Its Identified Subcontractors..., Science Applications International Corporation (SAIC) of McLean, VA, and its subcontractors to access...). Some of the information may have been claimed or determined to be Confidential Business Information...

  6. The evaluation of a framework for measuring the non-technical ward round skills of final year nursing students: An observational study.

    Science.gov (United States)

    Murray, Kara; McKenzie, Karen; Kelleher, Michael

    2016-10-01

    The importance of non-technical skills (NTS) to patient outcomes is increasingly being recognised, however, there is limited research into how such skills can be taught and evaluated in student nurses in relation toward rounds. This pilot study describes an evaluation of a NTS framework that could potentially be used to measure ward round skills of student nurses. The study used an observational design. Potential key NTS were identified from existing literature and NTS taxonomies. The proposed framework was then used to evaluate whether the identified NTS were evident in a series of ward round simulations that final year general nursing students undertook as part of their training. Finally, the views of a small group of qualified nurse educators, qualified nurses and general nursing students were sought about whether the identified NTS were important and relevant to practice. The proposed NTS framework included seven categories: Communication, Decision Making, Situational Awareness, Teamwork and Task Management, Student Initiative and Responsiveness to Patient. All were rated as important and relevant to practice. The pilot study suggests that the proposed NTS framework could be used as a means of evaluating student nurse competencies in respect of many non-technical skills required for a successful ward round. Further work is required to establish the validity of the framework in educational settings and to determine the extent to which it is of use in a non-simulated ward round setting. Copyright © 2016 Elsevier Ltd. All rights reserved.

  7. High-Efficiency Nitride-Based Solid-State Lighting. Final Technical Progress Report

    International Nuclear Information System (INIS)

    Paul T. Fini; Shuji Nakamura

    2005-01-01

    In this final technical progress report we summarize research accomplished during Department of Energy contract DE-FC26-01NT41203, entitled ''High-Efficiency Nitride-Based Solid-State Lighting''. Two teams, from the University of California at Santa Barbara (Principle Investigator: Dr. Shuji Nakamura) and the Lighting Research Center at Rensselaer Polytechnic Institute (led by Dr. N. Narendran), pursued the goals of this contract from thin film growth, characterization, and packaging/luminaire design standpoints. The UCSB team initially pursued the development of blue gallium nitride (GaN)-based vertical-cavity surface-emitting lasers, as well as ultraviolet GaN-based light emitting diodes (LEDs). In Year 2, the emphasis shifted to resonant-cavity light emitting diodes, also known as micro-cavity LEDs when extremely thin device cavities are fabricated. These devices have very directional emission and higher light extraction efficiency than conventional LEDs. Via the optimization of thin-film growth and refinement of device processing, we decreased the total cavity thickness to less than 1 (micro)m, such that micro-cavity effects were clearly observed and a light extraction efficiency of over 10% was reached. We also began the development of photonic crystals for increased light extraction, in particular for so-called ''guided modes'' which would otherwise propagate laterally in the device and be re-absorbed. Finally, we pursued the growth of smooth, high-quality nonpolar a-plane and m-plane GaN films, as well as blue light emitting diodes on these novel films. Initial nonpolar LEDs showed the expected behavior of negligible peak wavelength shift with increasing drive current. M-plane LEDs in particular show promise, as unpackaged devices had unsaturated optical output power of ∼ 3 mW at 200 mA drive current. The LRC's tasks were aimed at developing the subcomponents necessary for packaging UCSB's light emitting diodes, and packaging them to produce a white light

  8. 76 FR 77816 - Access to Confidential Business Information by Guident Technologies, Inc. and Subcontractor...

    Science.gov (United States)

    2011-12-14

    ... Business Information by Guident Technologies, Inc. and Subcontractor, Impact Innovations Systems, Inc..., Guident Technologies, Inc. of Herndon, VA and subcontractor, Impact Innovations Systems, Inc. of Manassas... Control Act (TSCA). Some of the information may be claimed or determined to be Confidential Business...

  9. 20 CFR 603.4 - What is the confidentiality requirement of Federal UC law?

    Science.gov (United States)

    2010-04-01

    ... 20 Employees' Benefits 3 2010-04-01 2010-04-01 false What is the confidentiality requirement of Federal UC law? 603.4 Section 603.4 Employees' Benefits EMPLOYMENT AND TRAINING ADMINISTRATION, DEPARTMENT....C. 502(a)), State law must include provision for such methods of administration as are found by the...

  10. 41 CFR 102-75.320 - Does appraisal information need to be kept confidential?

    Science.gov (United States)

    2010-07-01

    ... 41 Public Contracts and Property Management 3 2010-07-01 2010-07-01 false Does appraisal information need to be kept confidential? 102-75.320 Section 102-75.320 Public Contracts and Property Management Federal Property Management Regulations System (Continued) FEDERAL MANAGEMENT REGULATION REAL PROPERTY 75-REAL PROPERTY DISPOSAL Surplus Real...

  11. Polar source analysis : technical memorandum

    Science.gov (United States)

    2017-09-29

    The following technical memorandum describes the development, testing and analysis of various polar source data sets. The memorandum also includes recommendation for potential inclusion in future releases of AEDT. This memorandum is the final deliver...

  12. Vehicle infrastructure integration proof of concept : technical description--vehicle : final report

    Science.gov (United States)

    2009-05-19

    This report provides the technical description of the VII system developed for the Cooperative Agreement VII Program between the USDOT and the VII Consortium. The basic architectural elements are summarized and detailed descriptions of the hardware a...

  13. Contractual obligations and the sharing of confidential health information in sport.

    Science.gov (United States)

    Anderson, L

    2008-09-01

    As an employee, a sports doctor has obligations to their employer, but also professional and widely accepted obligations of a doctor to the patient (in this case the individual team member). The conflict is evident when sports doctors are asked by an athlete to keep personal health information confidential from the coach and team management, and yet both doctor and athlete have employment contracts specifying that such information shall be shared. Recent research in New Zealand shows that despite the presence of an employment contract, there appears to be a wide range of behaviours among sports doctors when an athlete requests that information about them be kept from team management. Many seem willing to honour requests to keep health information about the athlete confidential, thereby being in breach of the employment contract, while others insist on informing team management against the wishes of the athlete. There are a number of potential solutions to this dilemma from forcing doctors to meet their contractual obligations, to limiting the expectations of the employment contract. This paper suggests that at times it may be appropriate to do both, making the position of the doctor clearer and supporting the ability of this group to resist pressure by coaches and management through having a robust code of ethics.

  14. Confidentiality in participatory research: Challenges from one study.

    Science.gov (United States)

    Petrova, Elmira; Dewing, Jan; Camilleri, Michelle

    2016-06-01

    This article presents key ethical challenges that were encountered when conducting a participatory qualitative research project with a very specific, small group of nurses, in this case with practice development nurses in Malta. With the small number of nurses employed in practice development roles in Malta, there are numerous difficulties of maintaining confidentiality. Poorly constructed interventions by the researcher could have resulted in detrimental effects to research participants and the overall trustworthiness of the research. Generally, ethical guidelines for research exist to reinforce validity of research; however, there is not an established consensus on how these strategies can be utilised in some types of qualitative field work. The researcher used an exploratory case study methodology. The sample consisted of 10 participants who were interviewed twice using face-to-face interviews, over a period of 2 months. The study was ethically reviewed by the University Research Ethics Committee and the Faculty Research Ethics Committee, University of Malta. The participants referred to in this article have been given adequate information about the study and their consent has been obtained. Numerous strategies for ensuring confidentiality during recruitment of the participants, during data collection, during transcription and data analysis and during dissemination of research results assisted the researcher in responding to potential and actual ethical issues. This article emphasises the main strategies that can be used to respond to ethical challenges when researching with a small easily identifiable group. The learning discussed here may be relevant to or even transferable to other similar research studies or research contexts. These methods fostered a greater credibility throughout the research process and predisposed the participants to greater trust, and thus, they disclosed their experiences and speak more freely, thus enhancing the quality of the study

  15. Final Scientific and Technical Report State and Regional Biomass Partnerships

    Energy Technology Data Exchange (ETDEWEB)

    Handley, Rick; Stubbs, Anne D.

    2008-12-29

    The Northeast Regional Biomass Program successfully employed a three pronged approach to build the regional capacity, networks, and reliable information needed to advance biomass and bioenergy technologies and markets. The approach included support for state-based, multi-agency biomass working groups; direct technical assistance to states and private developers; and extensive networking and partnership-building activities to share objective information and best practices.

  16. NUSC Technical Publications Guide.

    Science.gov (United States)

    1985-05-01

    Facility personnel especially that of A. Castelluzzo, E. Deland, J. Gesel , and E. Szlosek (all of Code 4343). Reviewed and Approved: 14 July 1980 D...their technical content and format. Review and approve the manual outline, the review manuscript, and the final camera - reproducible copy. Conduct in

  17. Medium energy measurements of N-N parameters. Final technical report, April 1, 1994--September 30, 1996

    International Nuclear Information System (INIS)

    Ambrose, D.; Betts, W.; Coffey, P.; Glass, G.; McDonough, J.; Riley, P.; Tang, J.L.

    1998-08-01

    This document is a final technical report describing the accomplishments of the medium/high energy nuclear physics research program at the University of Texas at Austin. The research program had four main thrusts, only one of which can be considered as measurements of N-N parameters: (1) finishing the data analyses associated with recent LAMPF and TRIUMPF N-N experiments, whose overall purpose has been the determination of the nucleon-nucleon amplitudes, both for isospin 0 and 1 at medium energies; (2) continuing work on BNL E871, a search for rare decay modes of the K L ; (3) work on the RHIC-STAR project, an experiment to create and study a quark gluon plasma and nuclear matter at high energy density; (4) beginning a new AGS experiment (E896) which will search for the lowest mass state of the predicted strange di-baryons, the Ho, and other exotic states of nuclear matter through nucleus-nucleus collisions

  18. Teaching Journalism Students about Confidential Whistleblower Sources: An Analysis of Introductory News Writing Textbooks

    Science.gov (United States)

    Huxford, John; Moore, Maria A.

    2011-01-01

    Whistleblowers are a key journalistic source for many current news stories. However, reporters pursuing these major stories must navigate the dilemma between transparent full disclosure and protecting their confidential source. Professional journalists begin their journey as students, and students begin their journey in the classroom with a…

  19. 17 CFR 145.9 - Petition for confidential treatment of information submitted to the Commission.

    Science.gov (United States)

    2010-04-01

    ... may summarily reject the submitter's request for confidential treatment with leave to the submitter to... treatment of information submitted to the Commission. 145.9 Section 145.9 Commodity and Securities Exchanges... treatment of information submitted to the Commission. (a) Purpose. This section provides a procedure by...

  20. 76 FR 30781 - Confidentiality Determinations for Data Required Under the Mandatory Greenhouse Gas Reporting...

    Science.gov (United States)

    2011-05-26

    ... this document. BAMM Best Available Monitoring Methods CAA Clean Air Act CBI confidential business information CBP Customs and Border Protection CEMS continuous emission monitoring system(s) CFR Code of... prevent competitors from forcing them to defend data on a case-by-case basis in Agency CBI proceedings...

  1. NTRCI Legacy Engine Research and Development Project Final Technical Report

    Energy Technology Data Exchange (ETDEWEB)

    Smith-Holbert, Connie [National Transportation Research Center, Inc., Knoxville, TN (United States); Petrolino, Joseph [National Transportation Research Center, Inc., Knoxville, TN (United States); Watkins, Bart [Power Source Technologies Inc., Corvallis, OR (United States); Irick, David [Power Source Technologies Inc., Corvallis, OR (United States)

    2011-12-31

    The Legacy engine is a completely new design, transitional diesel engine, replacing the reciprocating engine with a rotary engine. The Legacy engine offers significant advances over conventional internal combustion engines in 1) power to weight ratio; 2) multiple fuel acceptance; 3) fuel economy; and 4) environmental compliance. These advances are achieved through a combination of innovative design geometry, rotary motion, aspiration simplicity, and manufacturing/part simplicity. The key technical challenge to the Legacy engine's commercialization, and the focus of this project, was the development of a viable roton tip seal. The PST concept for the roton tip seal was developed into a manufacturable design. The design was evaluated using a custom designed and fabricated seal test fixture and further refined. This design was incorporated into the GEN2.5A prototype and tested for achievable compression pressure. The Decision Point at the end of Phase 1 of the project (described below) was to further optimize the existing tip seal design. Enhancements to the tip seal design were incorporated into the GEN2.5B prototype and tested and evaluated using the iterative research strategy described below. Compression pressures adequate for compression ignition of diesel fuel were achieved, although not consistently in all combustion volumes. The variation in compression pressures was characterized versus design features. As the roton tip seal performance was improved, results pointed toward inadequate performance of the housing side seals. Enhancement of the housing side seal system was accomplished using a custom designed side seal test fixture. The design enhancements developed with the test fixture were also incorporated into the GEN2.5B prototype and tested and evaluated using the iterative research strategy described below. Finally, to simplify the requirements for the roton tip seals and to enhance the introduction and combustion of fuel, a flush-mount fuel injector

  2. Final Scientific/Technical Report

    Energy Technology Data Exchange (ETDEWEB)

    Brown, R. C.; McCarley, T. M.

    2006-05-04

    . Platform teams organize faculty and students for cross-disciplinary, systems-oriented research and collaborative learning. To date, nine platforms have been developed, although these will most likely be reorganized into a smaller number of broader topics. In the spring of 2004, BRT faculty initiated a regional partnership and collaborative learning program with colleagues at the University of Minnesota, Kansas State University, and South Dakota State University to develop distance education courses in biorenewable resources and technology. As a fledgling graduate program, the BRT graduate program didn’t have the breadth of resources to offer a large number of courses in biorenewables. Other schools faced a similar problem. The academic consortium as first conceived would allow students from the member schools to enroll in biorenewables courses from any of the participating schools, which would assure the necessary enrollment numbers to offer specialized course work. Since its inception, the collaborative curriculum partnership has expanded to include Louisiana State University and the University of Wisconsin. A second international curriculum development campaign was also initiated in the spring of 2004. In particular, several BRT faculty teamed with colleagues at the University of Arkansas, University of Washington, University of Gent (Belgium), National Polytechnic Institute of Toulouse (France), and Technical University of Graz (Austria) to develop an EU-US exchange program in higher education and vocational education/training (entitled “Renewable Resources and Clean Technology”).

  3. Practices in security and confidentiality of HIV/AIDS patients' information: A national survey among staff at HIV outpatient clinics in Vietnam.

    Directory of Open Access Journals (Sweden)

    Nguyen Khac Hai

    Full Text Available Breach of confidentiality or invasion of privacy from the collection and use of medical records, particularly those of patients with HIV/AIDS or other diseases sensitive to stigmatization, should be prevented by all related stakeholders in healthcare settings. The main focus of this study was to assess practices regarding security and confidentiality of HIV-related information among staff at HIV outpatient clinics (HIV-OPCs in Vietnam.A descriptive cross-sectional study was conducted at all 312 HIV-OPCs across the country using an online survey technique.In general, the staff practices for securing and protecting patient information were at acceptable levels. Most staff had proper measures and practices for maintaining data security; however, the protection of patient confidentiality, particularly for data access, sharing, and transfer still required improvement. Most HIV-OPC staff had good or moderate knowledge and positive perceptions towards security and confidentiality issues. Staff who were not trained in the practice of security measures differed significantly from those who were trained (OR: 3.74; 95%CI: 1.44-9.67; staff needing improved knowledge levels differed significantly from those with good (OR: 5.20; 95%CI: 2.39-11.32 and moderate knowledge levels (OR: 5.10; 95%CI: 2.36-11.00; and staff needing improved perception levels differed significantly from those with good (i.e., with 100% proper practices and moderate perception levels (OR: 5.67; 95%CI: 2.93-10.95. Staff who were not trained in the protection of data confidentiality differed significantly from those who were trained (OR: 2.18; 95%CI: 1.29-3.65.Training is an important factor to help raise the levels of proper practices regarding confidentiality and security, to improve knowledge and raise awareness about change among staff. The operation and management of HIV treatment and care in Vietnam are currently transitioning from separate healthcare clinics (HIV-OPC into units

  4. Practices in security and confidentiality of HIV/AIDS patients' information: A national survey among staff at HIV outpatient clinics in Vietnam.

    Science.gov (United States)

    Khac Hai, Nguyen; Lawpoolsri, Saranath; Jittamala, Podjanee; Thi Thu Huong, Phan; Kaewkungwal, Jaranit

    2017-01-01

    Breach of confidentiality or invasion of privacy from the collection and use of medical records, particularly those of patients with HIV/AIDS or other diseases sensitive to stigmatization, should be prevented by all related stakeholders in healthcare settings. The main focus of this study was to assess practices regarding security and confidentiality of HIV-related information among staff at HIV outpatient clinics (HIV-OPCs) in Vietnam. A descriptive cross-sectional study was conducted at all 312 HIV-OPCs across the country using an online survey technique. In general, the staff practices for securing and protecting patient information were at acceptable levels. Most staff had proper measures and practices for maintaining data security; however, the protection of patient confidentiality, particularly for data access, sharing, and transfer still required improvement. Most HIV-OPC staff had good or moderate knowledge and positive perceptions towards security and confidentiality issues. Staff who were not trained in the practice of security measures differed significantly from those who were trained (OR: 3.74; 95%CI: 1.44-9.67); staff needing improved knowledge levels differed significantly from those with good (OR: 5.20; 95%CI: 2.39-11.32) and moderate knowledge levels (OR: 5.10; 95%CI: 2.36-11.00); and staff needing improved perception levels differed significantly from those with good (i.e., with 100% proper practices) and moderate perception levels (OR: 5.67; 95%CI: 2.93-10.95). Staff who were not trained in the protection of data confidentiality differed significantly from those who were trained (OR: 2.18; 95%CI: 1.29-3.65). Training is an important factor to help raise the levels of proper practices regarding confidentiality and security, to improve knowledge and raise awareness about change among staff. The operation and management of HIV treatment and care in Vietnam are currently transitioning from separate healthcare clinics (HIV-OPC) into units integrated

  5. Practices in security and confidentiality of HIV/AIDS patients’ information: A national survey among staff at HIV outpatient clinics in Vietnam

    Science.gov (United States)

    Khac Hai, Nguyen; Lawpoolsri, Saranath; Jittamala, Podjanee; Thi Thu Huong, Phan

    2017-01-01

    Introduction Breach of confidentiality or invasion of privacy from the collection and use of medical records, particularly those of patients with HIV/AIDS or other diseases sensitive to stigmatization, should be prevented by all related stakeholders in healthcare settings. The main focus of this study was to assess practices regarding security and confidentiality of HIV-related information among staff at HIV outpatient clinics (HIV-OPCs) in Vietnam. Methods A descriptive cross-sectional study was conducted at all 312 HIV-OPCs across the country using an online survey technique. Results In general, the staff practices for securing and protecting patient information were at acceptable levels. Most staff had proper measures and practices for maintaining data security; however, the protection of patient confidentiality, particularly for data access, sharing, and transfer still required improvement. Most HIV-OPC staff had good or moderate knowledge and positive perceptions towards security and confidentiality issues. Staff who were not trained in the practice of security measures differed significantly from those who were trained (OR: 3.74; 95%CI: 1.44–9.67); staff needing improved knowledge levels differed significantly from those with good (OR: 5.20; 95%CI: 2.39–11.32) and moderate knowledge levels (OR: 5.10; 95%CI: 2.36–11.00); and staff needing improved perception levels differed significantly from those with good (i.e., with 100% proper practices) and moderate perception levels (OR: 5.67; 95%CI: 2.93–10.95). Staff who were not trained in the protection of data confidentiality differed significantly from those who were trained (OR: 2.18; 95%CI: 1.29–3.65). Conclusions Training is an important factor to help raise the levels of proper practices regarding confidentiality and security, to improve knowledge and raise awareness about change among staff. The operation and management of HIV treatment and care in Vietnam are currently transitioning from separate

  6. Confidentiality protections versus collaborative care in the treatment of substance use disorders

    OpenAIRE

    Manuel, Jennifer K; Newville, Howard; Larios, Sandra E; Sorensen, James L

    2013-01-01

    Abstract Practitioners in federally-assisted substance use disorder (SUD) treatment programs are faced with increasingly complex decisions when addressing patient confidentiality issues. Recent policy changes, intended to make treatment more available and accessible, are having an impact on delivery of SUD treatment in the United States. The addition of electronic health records provides opportunity for more rapid and comprehensive communication between patients’ primary and SUD ...

  7. General practitioners' perspectives regarding competence and confidentiality in an adolescent with suspected anorexia nervosa: legal and ethical considerations.

    Science.gov (United States)

    Bartholomew, Terence P; Paxton, Susan J

    2003-02-01

    In Victoria, Australia, the legal position regarding young people's competence to make medical treatment decisions has not been clarified in legislation, and a number of often vague common law decisions must be relied on for guidance. This situation produces a degree of uncertainty about appropriate professional practice, while also potentially impeding young people's rights claims in health care settings. With this in mind, the present research explored general practitioners' competence and confidentiality decisions regarding a 17-year-old female who presented with symptoms of an eating disorder. Questionnaires were sent to a random sample of 500 Victorian general practitioners, of whom 190 responded. After reading a case vignette, general practitioners indicated whether they would find the hypothetical patient competent and if they would maintain her confidentiality. Seventy-three per cent of respondents found the patient competent and most would have maintained confidentiality, at least initially. However, subsequent analysis of the rationales supplied for these decisions revealed a wide diversity in general practitioners' understandings and implementations of extant legal authority. This research highlights the need for general practitioners to be exposed to up-to-date and clinically relevant explanations of contemporary legal positions.

  8. Technical assistance for Meharry Medical College Energy Efficiency Project. Final project status and technical report

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1996-05-08

    This report presents the results of a program to provide technical assistance to Meharry Medical College. The purpose of the program is to facilitate Meharry`s effort to finance a campus-wide facility retrofit. The US Department of Energy (USDOE) funded the program through a grant to the Tennessee Department of Economic and Community Development (TECD). The University of Memphis-Technology and Energy Services (UM-TES), under contract to TECD, performed program services. The report has three sections: (1) introduction; (2) project definition, financing, and participants; and (3) opportunities for federal participation.

  9. Fundamental studies of the chemical vapor deposition of diamond. Final technical report, April 1, 1988--December 31, 1994

    Energy Technology Data Exchange (ETDEWEB)

    Nix, W.D.

    1995-05-01

    We submit here a final technical report for the research program entitled: Fundamental Studies of the Chemical Vapor Deposition of Diamond, DOE Grant No. DE-FG05-88ER45345-M006. This research program was initiated in 1988 under the direction of the late Professor David A. Stevenson and was renewed in 1992. Unfortunately, at the end of 1992, just as the last phase of this work was getting underway, Professor Stevenson learned that he had developed mesothelioma, a form of cancer based on asbestos. Professor Stevenson died from that disease in February of 1994. Professor William D. Nix, the Chairman of the Materials Science department at Stanford was named the Principal Investigator. Professor Nix has assembled this final technical report. Much of the work of this grant was conducted by Mr. Paul Dennig, a graduate student who will receive his Ph.D. degree from Stanford in a few months. His research findings are described in the chapters of this report and in the papers published over the past few years. The main discovery of this work was that surface topology plays a crucial role in the nucleation of diamond on silicon. Dennig and his collaborators demonstrated this by showing that diamond nucleates preferentially at the tips of asperities on a silicon surface rather than in the re-entrant comers at the base of such asperities. Some of the possible reasons for this effect are described in this report. The published papers listed on the next page of this report also describe this research. Interested persons can obtain copies of these papers from Professor Nix at Stanford. A full account of all of the research results obtained in this work is given in the regular chapters that follow this brief introduction. In addition, interested readers will want to consult Mr. Dennig`s Ph.D. dissertation when it is made available later this year.

  10. 76 FR 10360 - Access to Confidential Business Information by Guident Technologies Inc. and Its Identified...

    Science.gov (United States)

    2011-02-24

    ... Business Information by Guident Technologies Inc. and Its Identified Subcontractors AGENCY: Environmental Protection Agency (EPA). ACTION: Notice. SUMMARY: EPA has authorized its contractor, Guident Technologies... information may be claimed or determined to be Confidential Business Information (CBI). DATES: Access to the...

  11. 75 FR 57768 - Access to Confidential Business Information by Eastern Research Group and Its Identified...

    Science.gov (United States)

    2010-09-22

    ... Business Information by Eastern Research Group and Its Identified Subcontractor AGENCY: Environmental Protection Agency (EPA). ACTION: Notice. SUMMARY: EPA has authorized its contractor, Eastern Research Group... the information may be claimed or determined to be Confidential Business Information (CBI). DATES...

  12. Minutes of the IFMIF technical meeting

    International Nuclear Information System (INIS)

    Nakamura, H.; Takeda, M.; Ida, M.; Maebara, S.; Yutani, T.; Sugimoto, M.

    2004-03-01

    The IFMIF Technical Meeting was held on December 4-5, 2003 at Shiran-kaikan, Kyoto University. The main objectives are 1) to finalize the Comprehensive Design Report (CDR), 2) to discuss IFMIF cost and organization, 3) to review technical status of major systems, transition phase activities and EVEDA plan. This report presents a brief summary of the results of the meeting. Agenda, participants list and presentation materials are attached as Appendix. (author)

  13. [When the violation of medical confidentiality is imposed by law: Another side effect of Law N° 20.584].

    Science.gov (United States)

    Vega, Jorge; Quintana, María Soledad

    2016-02-01

    A law of rights and duties of patients was recently enacted in Chile (Law N° 20.584). When someone dies, the law allows his inheritors to have access to part or the totality of the medical record. Therefore, they may become acquainted of information that the patient gave in confidence to his physician, protected by "the medical confidentiality". The original bill included the possibility that a doctor could deny information that could cause harm to the former holder of the clinical record, but this precaution was banned by congressmen, seriously damaging the institution of "medical confidentiality", a cornerstone of the medical-patient relationship since the beginning of medicine.

  14. Establishment of the International Power Institute. Final technical report

    Energy Technology Data Exchange (ETDEWEB)

    Julius E. Coles

    2000-08-04

    The International Power Institute, in collaboration with American industries, seeks to address technical, political, economic and cultural issues of developing countries in the interest of facilitating profitable transactions in power related infrastructure projects. IPI works with universities, governments and commercial organizations to render project-specific recommendations for private-sector investment considerations. IPI also established the following goals: Facilitate electric power infrastructure transactions between developing countries and the US power industry; Collaborate with developing countries to identify development strategies to achieve energy stability; and Encourage market driven solutions and work collaboratively with other international trade energy, technology and banking organizations.

  15. Management of medical confidentiality in English professional football clubs: some ethical problems and issues.

    Science.gov (United States)

    Waddington, I; Roderick, M

    2002-04-01

    To examine the ways in which confidential matters are dealt with in the context of the relationship between the club doctor (or physiotherapist) and the player as patient in English professional football clubs. Semistructured tape recorded interviews with 12 club doctors, 10 club physiotherapists, and 27 current and former players. A questionnaire was also sent to 90 club doctors; 58 were returned. There is among club doctors and physiotherapists no commonly held code of ethics governing how much and what kind of information about players may properly be passed on to managers; associated with this, there is considerable variation from one club to another in terms of the amount and kind of information passed on to managers. In some clubs, medical staff attempt to operate more or less on the basis of the rules governing confidentiality that apply in general practice, but in other clubs, medical staff are more ready to pass on personal information about players. In some situations, this raises serious ethical questions. Guidelines dealing with confidentiality in practitioner-patient relationships in medical practice have long been available and have recently been restated, specifically in relation to the practice of sports medicine, by the British Olympic Association, the British Medical Association, and the Football Association. This is a welcome first step. However, if the guidelines are to have an impact on practice, detailed consideration needs to be given to ensuring their effective implementation; if this is to be achieved, consideration also needs to be given to identifying those aspects of the culture and organisation of professional football clubs that may hinder the full and effective implementation of those guidelines.

  16. High tracking resolution detectors. Final Technical Report

    International Nuclear Information System (INIS)

    Vasile, Stefan; Li, Zheng

    2010-01-01

    High-resolution tracking detectors based on Active Pixel Sensor (APS) have been valuable tools in Nuclear Physics and High-Energy Physics research, and have contributed to major discoveries. Their integration time, radiation length and readout rate is a limiting factor for the planed luminosity upgrades in nuclear and high-energy physics collider-based experiments. The goal of this program was to demonstrate and develop high-gain, high-resolution tracking detector arrays with faster readout, and shorter radiation length than APS arrays. These arrays may operate as direct charged particle detectors or as readouts of high resolution scintillating fiber arrays. During this program, we developed in CMOS large, high-resolution pixel sensor arrays with integrated readout, and reset at pixel level. Their intrinsic gain, high immunity to surface and moisture damage, will allow operating these detectors with minimal packaging/passivation requirements and will result in radiation length superior to APS. In Phase I, we designed and fabricated arrays with calorimetric output capable of sub-pixel resolution and sub-microsecond readout rate. The technical effort was dedicated to detector and readout structure development, performance verification, as well as to radiation damage and damage annealing.

  17. Expectation and task for constructing the volume reduction system of removed soils. In search of the technical integrity from the intermediate storage to final disposal

    International Nuclear Information System (INIS)

    Mori, Hisaki

    2016-01-01

    The intermediate storage volume of the removed soils and incineration ash in Fukushima is supposed about 22 million cubic meters. Within 30 years after starting the intermediate storage, the final disposal outside Fukushima prefecture to these removed soils and incineration ash is determined by the law. Because these removed soils are the very-very low radio activity, the volume reduction method is most effective to reduce the burden of the final disposal. As the volume reduction technology is the stage of research and development, the possibility of the introduction of the volume reduction technology that has the consistency of the final disposal technology is evaluated from the point of view of cost. Since this business is accompanied by economic and technical risk to implement private companies, this project is considered appropriate to be implemented as a national project. (author)

  18. Scalable data management, analysis and visualization (SDAV) Institute. Final Scientific/Technical Report

    Energy Technology Data Exchange (ETDEWEB)

    Geveci, Berk [Kitware, Inc., Clifton Park, NY (United States)

    2017-03-28

    The purpose of the SDAV institute is to provide tools and expertise in scientific data management, analysis, and visualization to DOE’s application scientists. Our goal is to actively work with application teams to assist them in achieving breakthrough science, and to provide technical solutions in the data management, analysis, and visualization regimes that are broadly used by the computational science community. Over the last 5 years members of our institute worked directly with application scientists and DOE leadership-class facilities to assist them by applying the best tools and technologies at our disposal. We also enhanced our tools based on input from scientists on their needs. Many of the applications we have been working with are based on connections with scientists established in previous years. However, we contacted additional scientists though our outreach activities, as well as engaging application teams running on leading DOE computing systems. Our approach is to employ an evolutionary development and deployment process: first considering the application of existing tools, followed by the customization necessary for each particular application, and then the deployment in real frameworks and infrastructures. The institute is organized into three areas, each with area leaders, who keep track of progress, engagement of application scientists, and results. The areas are: (1) Data Management, (2) Data Analysis, and (3) Visualization. Kitware has been involved in the Visualization area. This report covers Kitware’s contributions over the last 5 years (February 2012 – February 2017). For details on the work performed by the SDAV institute as a whole, please see the SDAV final report.

  19. Medicare and Medicaid programs; salary equivalency guidelines for physical therapy, respiratory therapy, speech language pathology, and occupational therapy services; revised effective date and technical correction--HCFA. Final rule; delay of effective date and correction.

    Science.gov (United States)

    1998-03-31

    This document delays the effective date of the final rule on salary equivalency guidelines, published in the Federal Register (63 FR 5106) on January 30, 1998, from April 1, 1998 to April 10, 1998. In addition, we are making a technical correction in the preamble to the January 30, 1998 final rule.

  20. High-Technology Companies Often Turn to Colleges for Confidential 'Beta Tests' of New Products.

    Science.gov (United States)

    Turner, Judith Axler

    1988-01-01

    Beta testing--the process of trying a product in a real-world setting before releasing it commercially--exploits a natural interface between universities and high-technology industries. High-tech companies need confidential, real-world tests of new products, and universities are eager to get an early look at tomorrow's technology. (MLW)

  1. Summary of the ITER final design report. July 2001

    International Nuclear Information System (INIS)

    2001-01-01

    This document is a summary of the ITER final design report foreseen during the current, Engineering Design Activities (EDA), phase of the ITER project. The report presents the results of collaborative design and supporting technical work undertaken by the ITER Joint Central team (JCT) and the Home Teams (HT) of the parties to the agreement on co-operation in the Engineering Design Activities for ITER (the ITER EDA Agreement). This report marks the achievement of the full technical scope of activities indicated in the ITER EDA Agreement, with a final design which meets the programmatic objective defined in the Agreement and satisfies detailed scientific, technical and costing objectives set by ITER Council in 1998

  2. New usable technical specifications

    International Nuclear Information System (INIS)

    Webster, S.A.; Tomasi, L.T.; Bernier, R.A.

    1989-01-01

    After 2 yr of preparation, 1988 finally saw the nuclear industry writing operator-oriented technical specifications. This effort is a continuation of previous efforts to develop improved and usable standard technical specifications (STSs), and is being conducted by the four nuclear steam supply system vendor owners' groups under the auspices of the Nuclear Management Resources Council. Each participant is currently preparing a set of improved STSs based on a writer's guide that was developed through a combined industry effort. In May of 1987, a Human Factors Improvements to Technical Specifications (HFITS) task group was formed to prepare a writer's guide for improved, industrywide STSs. This task group was composed of two representatives from each owners' group, one with a human factors background and one with some operations background. Two documents were prepared in 6 months, a human factors report laying the groundwork for the considerations to go into technical specifications and a writer's guide for their preparation. This paper reports on the application of this writer's guide to the writing of improved STS

  3. Confidentiality considerations for use of social-spatial data on the social determinants of health: Sexual and reproductive health case study.

    Science.gov (United States)

    Haley, Danielle F; Matthews, Stephen A; Cooper, Hannah L F; Haardörfer, Regine; Adimora, Adaora A; Wingood, Gina M; Kramer, Michael R

    2016-10-01

    Understanding whether and how the places where people live, work, and play are associated with health behaviors and health is essential to understanding the social determinants of health. However, social-spatial data which link a person and their attributes to a geographic location (e.g., home address) create potential confidentiality risks. Despite the growing body of literature describing approaches to protect individual confidentiality when utilizing social-spatial data, peer-reviewed manuscripts displaying identifiable individual point data or quasi-identifiers (attributes associated with the individual or disease that narrow identification) in maps persist, suggesting that knowledge has not been effectively translated into public health research practices. Using sexual and reproductive health as a case study, we explore the extent to which maps appearing in recent peer-reviewed publications risk participant confidentiality. Our scoping review of sexual and reproductive health literature published and indexed in PubMed between January 1, 2013 and September 1, 2015 identified 45 manuscripts displaying participant data in maps as points or small-population geographic units, spanning 26 journals and representing studies conducted in 20 countries. Notably, 56% (13/23) of publications presenting point data on maps either did not describe approaches used to mask data or masked data inadequately. Furthermore, 18% (4/22) of publications displaying data using small-population geographic units included at least two quasi-identifiers. These findings highlight the need for heightened education for researchers, reviewers, and editorial teams. We aim to provide readers with a primer on key confidentiality considerations when utilizing linked social-spatial data for visualizing results. Given the widespread availability of place-based data and the ease of creating maps, it is critically important to raise awareness on when social-spatial data constitute protected health

  4. TADS Final Evaluation Report, 1980-81. Appendix S.

    Science.gov (United States)

    Suarez, Tanya M.; And Others

    The document contains the final report of the Technical Assistance Development System (TADS), a program which provided technical assistance (TA) services to 53 Handicapped Children's Early Education Program (HCEEP) demonstration projects and 13 State Implementation Grants (SIGs). The evaluation report is divided into five sections. Section 1…

  5. Final report. Geothermal Energy Program: Information dissemination, public outreach, and technical analysis activities. April 1, 1999 to December 31, 2001. USDOE Grant No. DE-FG01-99-EE35098

    Energy Technology Data Exchange (ETDEWEB)

    Lund, John W.

    2002-03-22

    This is the final report of the accomplishments of the geothermal energy program: information dissemination, public outreach, and technical analysis activities by the project team consisting of the Geo-Heat Center, Geothermal Resources Council, Geothermal Education Office, Geothermal Energy Association, and the Washington State University Energy Program.

  6. Fifth technical meeting on quality

    International Nuclear Information System (INIS)

    Girard, A.

    1998-01-01

    This article reports on the 5th Technical Meeting on Quality which was held in San Diego on 20-22 October 1997 and which was attended by representatives of the Home and Joint Central Team and of manufacturers currently involved in the Large R and D projects. The meeting made progress towards the finalization of the ITER Quality Manual document for inclusion in the Final Design Report and the definition of the quality necessary for ITER procurement and construction

  7. Developing an effective corrective action process : lessons learned from operating a confidential close call reporting system

    Science.gov (United States)

    2013-03-05

    In 2007, the Federal Railroad Administration (FRA) launched : C3RS, the Confidential Close Call Reporting System, as a : demonstration project to learn how to facilitate the effective : reporting and implementation of corrective actions, and assess t...

  8. 77 FR 25475 - Inquiry To Learn Whether Businesses Assert Business Confidentiality Claims Regarding Waste Import...

    Science.gov (United States)

    2012-04-30

    ... meet the definition of ``affected business,'' and are not covered by today's notice. They consist of..., however, do not meet the definition of ``affected business,'' and are not covered by today's notice. They... Businesses Assert Business Confidentiality Claims Regarding Waste Import and Export AGENCY: Environmental...

  9. 77 FR 109 - Inquiry To Learn Whether Businesses Assert Business Confidentiality Claims Regarding Waste Import...

    Science.gov (United States)

    2012-01-03

    ... definition of ``affected business,'' and are not covered by today's notice. They consist of any business that.... Certain businesses, however, do not meet the definition of ``affected business,'' and are not covered by... Businesses Assert Business Confidentiality Claims Regarding Waste Import and Export AGENCY: Environmental...

  10. 78 FR 67139 - Access to Confidential Business Information by Eastern Research Group and Its Identified...

    Science.gov (United States)

    2013-11-08

    ... Business Information by Eastern Research Group and Its Identified Subcontractor, Energy Services, Inc..., Eastern Research Group (ERG) of Chantilly, VA, and subcontractor Energy Services, Inc., of Tallahassee, FL... Control Act (TSCA). Some of the information may be claimed or determined to be Confidential Business...

  11. Functional criteria for emergency response facilities. Technical report (final)

    International Nuclear Information System (INIS)

    1981-02-01

    This report describes the facilities and systems to be used by nuclear power plant licensees to improve responses to emergency situations. The facilities include the Technical Support Center (TSC), Onsite Operational Support Center (OSC), and Nearsite Emergency Operations Facility (EOF), as well as a brief discussion of the emergency response function of the control room. The data systems described are the Safety Parameter Display System (SPDS) and Nuclear Data Link (NDL). Together, these facilities and systems make up the total Emergency Response Facilities (ERFs). Licensees should follow the guidance provided both in this report and in NUREG-0654 (FEMA-REP-1), Revision 1, for design and implementation of the ERFs

  12. 78 FR 49963 - Heavy-Duty Engine and Vehicle and Nonroad Technical Amendments

    Science.gov (United States)

    2013-08-16

    ... future model year in which your average CO 2 level exceeds the standard. You may trade credits to another..., Confidential business information, Environmental protection, Incorporation by reference, Labeling, Motor... Environmental protection, Administrative practice and procedure, Air pollution control, Confidential business...

  13. Controls Mitigating the Risk of Confidential Information Disclosure by Facebook: Essential Concern in Auditing Information Security

    Directory of Open Access Journals (Sweden)

    Ivan Ognyanov Kuyumdzhiev

    2014-08-01

    Full Text Available Facebook allows people to easily share information about themselves which in some cases could be classified as confidential or sensitive in the organisation they’re working for. In this paper we discuss the type of data stored by Facebook and the scope of the terms “confidential” and “sensitive data”. The intersection of these areas shows that there is high possibility for confidential data disclosure in organisations with none or ineffective security policy. This paper proposes a strategy for managing the risks of information leakage. We define five levels of controls against posting non-public data on Facebook - security policy, applications installed on employees’ workstations, specific router software or firmware, software in the cloud, Facebook itself. Advantages and disadvantages of every level are evaluated. As a result we propose developing of new control integrated in the social media.

  14. Private business: the uptake of confidential HIV testing in remote aboriginal communities on the Anangu Pitjantjatjara Lands.

    Science.gov (United States)

    Miller, P J; Torzillo, P J

    1998-10-01

    Despite a concentration of risk factors for HIV transmission, many remote Aboriginal communities in central Australia have a low uptake of HIV testing. We studied the uptake of HIV testing in six clinics in remote Aboriginal communities following the introduction of voluntary confidential testing to assess the impact of the intervention and to determine if the program was reaching people most at risk of HIV infection and transmission. The study was conducted by Nganampa Health Council, an Aboriginal-controlled health service on the Anangu Pitjantjatjara Lands in the far north-west of South Australia. Since the introduction of confidential coded testing in August 1994 the number of HIV tests provided through the remote clinics has increased from 83 tests/year to 592 tests/year. In the 12-month audit period (August 1, 1995, to July 31, 1996) 62.7% of women aged 20-24 years, 44.6% of people aged 12-40 years and 24% of the total population had an HIV test. Fifty per cent of tests were accounted for by the 15-25 year age groups and 60% of tests related to an STD consult. This study shows that a high uptake of HIV testing in high-risk groups can be achieved in remote Aboriginal communities where a high level of confidentiality is maintained.

  15. A rural/urban comparison of privacy and confidentiality concerns associated with providing sensitive location information in epidemiologic research involving persons who use drugs.

    Science.gov (United States)

    Rudolph, Abby E; Young, April M; Havens, Jennifer R

    2017-11-01

    Analyses that link contextual factors with individual-level data can improve our understanding of the "risk environment"; however, the accuracy of information provided by participants about locations where illegal/stigmatized behaviors occur may be influenced by privacy/confidentiality concerns that may vary by setting and/or data collection approach. We recruited thirty-five persons who use drugs from a rural Appalachian town and a Mid-Atlantic city to participate in in-depth interviews. Through thematic analyses, we identified and compared privacy/confidentiality concerns associated with two survey methods that (1) collect self-reported addresses/cross-streets and (2) use an interactive web-based map to find/confirm locations in rural and urban settings. Concerns differed more by setting than between methods. For example, (1) rural participants valued interviewer rapport and protections provided by the Certificate of Confidentiality more; (2) locations considered to be sensitive differed in rural (i.e., others' homes) and urban (i.e., where drugs were used) settings; and (3) urban participants were more likely to view providing cross-streets as an acceptable alternative to providing exact addresses for sensitive locations and to prefer the web-based map approach. Rural-urban differences in privacy/confidentiality concerns reflect contextual differences (i.e., where drugs are used/purchased, population density, and prior drug-related arrests). Strategies to alleviate concerns include: (1) obtain a Certificate of Confidentiality, (2) collect geographic data at the scale necessary for proposed analyses, and (3) permit participants to provide intersections/landmarks in close proximity to actual locations rather than exact addresses or to skip questions where providing an intersection/landmark would not obfuscate the actual address. Copyright © 2017 Elsevier Ltd. All rights reserved.

  16. Confidentiality Issues and Use of Sexually Transmitted Disease Services Among Sexually Experienced Persons Aged 15-25 Years - United States, 2013-2015.

    Science.gov (United States)

    Leichliter, Jami S; Copen, Casey; Dittus, Patricia J

    2017-03-10

    National-level data are limited regarding confidentiality-related issues and the use of sexually transmitted disease (STD) services for adolescents and young adults. Changes in the U.S. health care system have permitted dependent children to remain on a parent's health insurance plan until the child's 26th birthday and required coverage of certain preventive services, including some STD services, without cost sharing for most plans (1,2). Although these provisions likely facilitate access to the health care system, adolescents and young adults might not seek care or might delay seeking care for certain services because of concerns about confidentiality, including fears that their parents might find out (3,4). Therefore, it is important to examine STD services and confidentiality-related issues among persons aged 15-25 years in the United States. CDC analyzed data from the 2013-2015 National Survey of Family Growth and found that 12.7% of sexually experienced youths (adolescents aged 15-17 years and those young adults aged 18-25 years who were on a parent's insurance plan) would not seek sexual and reproductive health care because of concerns that their parents might find out. Particularly concerned were persons aged 15-17 years (22.6%). Females with confidentiality concerns regarding seeking sexual and reproductive health care reported a lower prevalence of receipt of chlamydia screening (17.1%) than did females who did not cite such concerns (38.7%). More adolescents aged 15-17 years who spent time alone with a health care provider (without a parent in the room) reported receipt of a sexual risk assessment (71.1%) and, among females, chlamydia testing (34.0%), than did those who did not spend time alone (36.6% and 14.9%, respectively). The results indicated that confidentiality-related issues were associated with less reported use of some STD services, especially for younger persons and females. Spending time alone with a provider (i.e., without a parent present

  17. Final Technical Report for Award DESC0011912, "Trimodal Tapping Mode Atomic Force Microscopy: Simultaneous 4D Mapping of Conservative and Dissipative Probe-Sample Interactions of Energy-Relevant Materials”

    Energy Technology Data Exchange (ETDEWEB)

    Solares, Santiago D. [George Washington Univ., Washington, DC (United States)

    2017-09-22

    The final project report covering the period 7/1/14-6/30/17 provides an overview of the technical accomplishments in the areas of (i) fundamental viscoelasticity, (ii) multifrequency atomic force microscopy, and (iii) characterization of energy-relevant materials with atomic force microscopy. A list of publications supported by the project is also provided.

  18. The role of non-technical skills in surgery.

    Science.gov (United States)

    Agha, Riaz A; Fowler, Alexander J; Sevdalis, Nick

    2015-12-01

    Non-technical skills are of increasing importance in surgery and surgical training. A traditional focus on technical skills acquisition and competence is no longer enough for the delivery of a modern, safe surgical practice. This review discusses the importance of non-technical skills and the values that underpin successful modern surgical practice. This narrative review used a number of sources including written and online, there was no specific search strategy of defined databases. Modern surgical practice requires; technical and non-technical skills, evidence-based practice, an emphasis on lifelong learning, monitoring of outcomes and a supportive institutional and health service framework. Finally these requirements need to be combined with a number of personal and professional values including integrity, professionalism and compassionate, patient-centred care.

  19. The role of non-technical skills in surgery

    Science.gov (United States)

    Agha, Riaz A.; Fowler, Alexander J.; Sevdalis, Nick

    2015-01-01

    Non-technical skills are of increasing importance in surgery and surgical training. A traditional focus on technical skills acquisition and competence is no longer enough for the delivery of a modern, safe surgical practice. This review discusses the importance of non-technical skills and the values that underpin successful modern surgical practice. This narrative review used a number of sources including written and online, there was no specific search strategy of defined databases. Modern surgical practice requires; technical and non-technical skills, evidence-based practice, an emphasis on lifelong learning, monitoring of outcomes and a supportive institutional and health service framework. Finally these requirements need to be combined with a number of personal and professional values including integrity, professionalism and compassionate, patient-centred care. PMID:26904193

  20. Final Technical Report - SciDAC Cooperative Agreement: Center for Wave Interactions with Magnetohydrodynamics

    International Nuclear Information System (INIS)

    Schnack, Dalton D.

    2012-01-01

    Final technical report for research performed by Dr. Thomas G. Jenkins in collaboration with Professor Dalton D. Schnack on SciDAC Cooperative Agreement: Center for Wave Interactions with Magnetohydrodyanics, DE-FC02-06ER54899, for the period of 8/15/06 - 8/14/11. This report centers on the Slow MHD physics campaign work performed by Dr. Jenkins while at UW-Madison and then at Tech-X Corporation. To make progress on the problem of RF induced currents affect magnetic island evolution in toroidal plasmas, a set of research approaches are outlined. Three approaches can be addressed in parallel. These are: (1) Analytically prescribed additional term in Ohm's law to model the effect of localized ECCD current drive; (2) Introduce an additional evolution equation for the Ohm's law source term. Establish a RF source 'box' where information from the RF code couples to the fluid evolution; and (3) Carry out a more rigorous analytic calculation treating the additional RF terms in a closure problem. These approaches rely on the necessity of reinvigorating the computation modeling efforts of resistive and neoclassical tearing modes with present day versions of the numerical tools. For the RF community, the relevant action item is - RF ray tracing codes need to be modified so that general three-dimensional spatial information can be obtained. Further, interface efforts between the two codes require work as well as an assessment as to the numerical stability properties of the procedures to be used.

  1. 77 FR 40026 - 36(b)(1) Arms Sales Notification

    Science.gov (United States)

    2012-07-06

    ... and contractor logistics, Quality Assurance Team support services, engineering and technical support... personnel training, U.S. Government and contractor logistics, Quality Assurance Team support services..., maintenance, or training is Confidential. Reverse engineering could reveal Confidential information...

  2. AIPM Final Report

    Energy Technology Data Exchange (ETDEWEB)

    John Mookken

    2006-06-30

    The final AIPM project report consists of six sections. Each section includes information on the original AIPM project and extension work on the high temperature design. The first section (1) provides an overview of the program and highlights the significant targets to meet at the end of the program. The next section (2) summarizes the significant technical accomplishments by the SEMIKRON AIPM team during the course of the project. Greater technical details are provided in a collection of all the quarterly reports which can be found in the appendix. Section three (3) presents some the more significant technical data collected from technology demonstrators. Section four (4) analyzes the manufacturing cost or economic aspects of producing 100,000 units/yr. Section five (5) describes the commercialization efforts of the AIPM technology into the automotive market. The last section (6) recommends follow on work that will build on the efforts and achievements of the AIPM program.

  3. ITER technical advisory committee meeting

    International Nuclear Information System (INIS)

    Fujiwara, M.

    2001-01-01

    The 17th Meeting of the ITER Technical Advisory Committee (TAC-17) was held on February 19-22, the ITER Garching Work Site in Germany. The objective of the meeting was to review the Draft Final Design Report of ITER-FEAT and assess the ability of the self-consistent overall design both to satisfy the technical objectives previously defined and to meet the cost limitations. TAC-17 was also organized to confirm that the design and critical elements, with emphasis on the key recommendations made at previous TAC meetings, are such as to extend the confidence in starting ITER construction. It was also intended to provide the ITER Council, scheduled to meet on 27 and 28 February in Toronto, with a technical assessment and key recommendations of the above mentioned report

  4. Technical specification improvements to containment heat removal and emergency core cooling systems: Final report

    International Nuclear Information System (INIS)

    Sullivan, W.P.; Ha, C.; Pentzien, D.C.; Visweswaran, S.

    1988-07-01

    This report presents the results of an analysis for technical specification improvements to the emergency core cooling systems (ECCS) and containment heat removal systems (EPRI Research Project 2142-3). The objective of this project is to further develop a reliability- and risk-based methodology to provide improvements by considering groups of surveillance test intervals and allowed out-of-service times jointly. This was done for the technical specifications for the ECCS, containment heat removal equipment, and supporting systems of a boiling water reactor plant. The project (1) developed a methodology for optimizing groups of surveillance test intervals and allowed out-of-service times jointly, (2) applied the methodology in a case study of a specific operating plant, Hatch-2, and (3) evaluated benefits of the application. The results of the case study demonstrate that beneficial technical specification improvements can be realized with application of the methodology. By tightening a small group of sensitive surveillance test intervals (STIs) and allowed out-of-service times (AOTs), a larger group of less sensitive STIs and AOTs can be extended resulting in an overall plant operating cost improvement without reducing the plant safety. The reliability- and risk-based methodology and results from this project can be effectively applied for technical specification improvements at other operating plants

  5. ITER EDA technical activities

    International Nuclear Information System (INIS)

    Aymar, R.

    1998-01-01

    Six years of technical work under the ITER EDA Agreement have resulted in a design which constitutes a complete description of the ITER device and of its auxiliary systems and facilities. The ITER Council commented that the Final Design Report provides the first comprehensive design of a fusion reactor based on well established physics and technology

  6. DOE Utility Matching Program Final Technical Report

    International Nuclear Information System (INIS)

    Haghighat, Alireza

    2002-01-01

    This is the Final report for the DOE Match Grant (DE-FG02-99NE38163) awarded to the Nuclear and Radiological Engineering (NRE) Department, University of Florida, for the period of September 1999 to January 2002. This grant has been instrumental for maintaining high-quality graduate and undergraduate education at the NRE department. The grant has been used for supporting student entry and retention and for upgrading nuclear educational facilities, nuclear instrumentation, computer facilities, and computer codes to better enable the incorporation of experimental experiences and computer simulations related to advanced light water fission reactor engineering and other advanced reactor concepts into the nuclear engineering course curricula

  7. Vadose zone microbial community structure and activity in metal/radionuclide contaminated sediments. Final technical report

    Energy Technology Data Exchange (ETDEWEB)

    Balkwill, David L.

    2002-08-17

    This final technical report describes the research carried out during the final two months of the no-cost extension ending 11/14/01. The primary goals of the project were (1) to determine the potential for transformation of Cr(VI) (oxidized, mobile) to Cr(III) (reduced, immobile) under unsaturated conditions as a function of different levels and combinations of (a) chromium, (b) nitrate (co-disposed with Cr), and (c) molasses (inexpensive bioremediation substrate), and (2) to determine population structure and activity in experimental treatments by characterization of the microbial community by signature biomarker analysis and by RT-PCR and terminal restriction fragment length polymorphism (T-RFLP) and 16S ribosomal RNA genes. It was determined early in the one-year no-cost extension period that the T-RFLP approach was problematic in regard to providing information on the identities of microorganisms in the samples examined. As a result, it could not provide the detailed information on microbial community structure that was needed to assess the effects of treatments with chromium, nitrate, and/or molasses. Therefore, we decided to obtain the desired information by amplifying (using TR-PCR, with the same primers used for T-RFLP) and cloning 16S rRNA gene sequences from the same RNA extracts that were used for T-RFLP analysis. We also decided to use a restriction enzyme digest procedure (fingerprinting procedure) to place the clones into types. The primary focus of the research carried out during this report period was twofold: (a) to complete the sequencing of the clones, and (b) to analyze the clone sequences phylogenetically in order to determine the relatedness of the bacteria detected in the samples to each other and to previously described genera and species.

  8. Technical-tactical analysis of youth olympic taekwondo combat.

    Science.gov (United States)

    Tornello, Francesco; Capranica, Laura; Minganti, Carlo; Chiodo, Salvatore; Condello, Giancarlo; Tessitore, Antonio

    2014-04-01

    The purpose of this study was to define the technical and tactical profiles of official youth taekwondo competitions played under the most recent rules of the International Taekwondo Federation. Tactical actions (i.e., attack, defense, and block), technical executions (from 1- to 4-point scores), kicking legs (i.e., front/rear and right/left), and overall technical effectiveness were investigated in relation to match outcome of semifinal and final competitions (n = 50) of youth (aged 13-14 years) black belt athletes during the Italian Taekwondo Cadet Championship. Differences (p technical exchanges showed differences (p technical executions. Winners resulted more efficient (p technical and tactical variables. In general, these findings showed that Cadets tend to adopt an offensive strategy. In considering that the adoption of the new electronic system requires athletes to execute correct technical actions to have a score assigned, coaches should emphasize the effectiveness of scoring techniques and help athletes to effectively improve their defense and counterattack capabilities.

  9. Safeguarding critical e-documents implementing a program for securing confidential information assets

    CERN Document Server

    Smallwood, Robert F

    2012-01-01

    Practical, step-by-step guidance for corporations, universities and government agencies to protect and secure confidential documents and business records Managers and public officials are looking for technology and information governance solutions to "information leakage" in an understandable, concise format. Safeguarding Critical E-Documents provides a road map for corporations, governments, financial services firms, hospitals, law firms, universities and other organizations to safeguard their internal electronic documents and private communications.Provides practical, step-by-step guidance o

  10. Astrobee Periodic Technical Review (PTR) Delta 3

    Science.gov (United States)

    Provencher, Christopher; Smith, Marion F.; Smith, Ernest Everett; Bualat, Maria Gabriele; Barlow, Jonathan Spencer

    2017-01-01

    Astrobee is a free flying robot for the inside of the International Space Station (ISS). The Periodic Technical Review (PTR) delta 3 is the final design review of the system presented to stakeholders.

  11. FINAL TECHNICAL REPORT: 20% Wind by 2030: Overcoming the Challenges

    Energy Technology Data Exchange (ETDEWEB)

    Tom Kaiserski; Dan Lloyd

    2012-02-28

    The funds allocated through the Wind Powering America (WPA) grant were utilized by the State of Montana to support broad outreach activities communicating the benefits and opportunities of increased wind energy and transmission development. The challenges to increased wind development were also clearly communicated with the understanding that a clearer comprehension of the challenges would be beneficial in overcoming the obstacles to further development. The ultimate purpose of these activities was to foster the increased development of Montana's rich wind resources through increased public acceptance and wider dissemination of technical resources.

  12. Final Technical Report for subcontract number B612144

    Energy Technology Data Exchange (ETDEWEB)

    Mayali, X. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Marcu, O. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States)

    2017-09-11

    The original statement of work stipulated that the Subcontractor shall perform bacterial and algal cultivation and manipulation, microbe isolation, preparation of samples for sequencing and isotopic analysis, data analysis, and manuscript preparation. The Subcontractor shall work closely with Dr. Mayali and other LLNL scientists, and shall participate in monthly SFA meetings (either in person or by telephone). The Subcontractor shall deliver a final report at the conclusion of the work.

  13. 78 FR 2669 - Waste Import and Export; Inquiry To Learn Whether Businesses Assert Business Confidentiality Claims

    Science.gov (United States)

    2013-01-14

    ... definition of ``affected business,'' and are not covered by today's notice. They consist of any business that... waste'' is defined at 40 CFR 273.9. Certain businesses, however, do not meet the definition of...; Inquiry To Learn Whether Businesses Assert Business Confidentiality Claims AGENCY: Environmental...

  14. Final Scientific/Technical Report for award DE-FC--07-00AL67053

    International Nuclear Information System (INIS)

    Dixon, Cathy

    2005-01-01

    The project ''Creating an Educational Consortium to Support the Recruitment and Retention of Expertise for the Nuclear Weapons Complex'' was also known as the Advanced Fuel Cycle Initiative (AFCI) University Fellowship Program. Since its inception, the Advanced Fuel Cycle Initiative program and its predecessor, the Advanced Accelerator Applications (AAA) program, have engaged university researchers and students in the sciences necessary to answer technical questions related to reducing high-level waste volumes, optimizing the economics and performance of Yucca Mountain, reducing the technical need for a second repository, reducing the long-term inventories of plutonium in spent fuel, and enabling the proliferation-resistant recovery of the energy contained in spent fuel. The Advanced Fuel Cycle University Fellowship Program is intended to support top students across the nation in a variety of disciplines that will be required to support transmutation research and technology development in the coming decades

  15. Basic concepts for crew resource management and non-technical skills.

    Science.gov (United States)

    Flin, Rhona; Maran, Nikki

    2015-03-01

    In this paper, we explain the conceptual background to non-technical skills and show how they can influence job performance in anaesthesia. We then describe the taxonomy of anaesthetists' non-technical skills (ANTS) and related systems, such as ANTS-AP for anaesthetic practitioners. We discuss the training courses that have been designed to teach these non-technical skills, which are called crew resource management (CRM), crisis resource management (CRM) or crisis avoidance resource management (CARMA). Finally, we discuss the application of non-technical skills assessment systems. Copyright © 2015 Elsevier Ltd. All rights reserved.

  16. Data-protection standards and confidentiality of HIV/AIDS status in the workplace - a South African case study.

    Science.gov (United States)

    Muskat-Gorska, Zuzanna

    2008-11-01

    The article contextualises an emerging new regime for information privacy in South Africa (i.e. the draft Protection of Personal Information Bill). Subsequently, it discusses the possibility of successful implementation of international data-protection standards in an environment where there is an urgent need to balance HIV/AIDS confidentiality rights with public health requirements. Also, the article presents a preliminary assessment of the possible impact of professionalisation (and outsourcing) of workplace HIV/AIDS management on workplace data-protection practices, and it identifies some spaces for social dialogue on HIV/AIDS-data treatment in South Africa. The study methods comprise an analysis of legal documents (concerning international data-protection standards and the development of law governing data protection and HIV/AIDS confidentiality in South Africa) and interviews conducted with workplace health managers and trade union representatives, in Johannesburg, in 2007.

  17. Final Scientific/Technical Report

    Energy Technology Data Exchange (ETDEWEB)

    Reeder, Richard [Stony Brook Univ., NY (United States); Phillips, Brian [Stony Brook Univ., NY (United States)

    2017-10-18

    A variety of calcifying organisms produce a transient or metastable amorphous calcium carbonate (ACC) precursor phase that is assembled and subsequently transformed into a crystalline biomineral, typically calcite or aragonite. The complex shapes, hierarchical structures, and unique physical properties of the biominerals that result from this calcification pathway have stimulated interest in adapting these concepts for the design and creation of bio-inspired functional materials in the laboratory. ACC also forms as a reactive precursor in diverse inorganic systems and is likely to play a much broader role in calcium carbonate formation. Knowledge of the structure, composition, and behavior of this metastable phase is critical for establishing a structural and mechanistic framework for calcium carbonate formation and its role in biogeochemical processes, including carbon cycling. Minor additives, such as magnesium, phosphorus, and organic macromolecules, are known to play important roles in controlling ACC stability, transformation kinetics, and selection of final crystalline polymorph. Molecular water also occurs in many types of ACC and is thought to play a structural role in its stability and transformation behavior. One of the major challenges that remain unresolved is identification of the structural basis for the role of these minor additives and molecular water. The absence of long-range order in ACC, and other amorphous phases, has posed a challenge for study by techniques commonly used for crystalline solids. Preliminary studies in our group show that the combination of two techniques, synchrotron X-ray-based pair distribution function (PDF) analysis and nuclear magnetic resonance (NMR) spectroscopy can provide entirely new insight to structural properties of synthetic ACC over length scales that are most relevant for understanding its transformation properties. Building on preliminary experiments, we propose a systematic study of synthesis, structure, and

  18. Changes in public attitudes towards confidential adolescent sexual and reproductive health services in Lithuania after the introduction of new legislation: findings from the cross-sectional surveys conducted in 2005 and 2012.

    Science.gov (United States)

    Jaruseviciene, Lina; Zaborskis, Apolinaras; Sauliune, Skirmante; Jarusevicius, Gediminas; Lazarus, Jeffrey V

    2015-09-04

    In Lithuania, the right to confidentiality in healthcare for adolescents over the age of 16 was guaranteed in 2010 through the adoption of new legislation. This study sets out to explore changes in Lithuanian residents' attitudes towards confidentiality protection in adolescent sexual and reproductive healthcare (SRH) by comparing data from surveys administered in 2005 and 2012. For both surveys, the participants were random samples of the Lithuanian residents aged 16 to 74. A 23-item questionnaire was used in 2005 and complemented with 2 items in 2012. Linear regression analysis was employed to estimate absolute differences in prevalence of belief in whether or not adolescents would find confidentiality important when consulting a physician on SRH issues. A log-binomial regression model was fitted to estimate the relative changes (prevalence ratio) of the independent variables. The total number of respondents was 1054 (response rate 83%) in 2005 and 1002 (response rate 80%) in 2012. The proportion of respondents who reported a belief that adolescents would find confidentiality important when seeing a physician for SRH issues increased significantly from 62% in 2005 to 73% in 2012. Regardless of their belief in the importance of confidentiality, in 2012 respondents more often indicated positive outcomes on the relations between the physician and the minor patient, such as increased trust of the adolescent in the physician and more frequent visits to physicians. However, study participants who believed that adolescents would find confidentiality important in 2012 were less optimistic about potential positive outcomes of further legal consolidation of adolescents' right to confidentiality than in 2005. Younger respondents were the most optimistic about potential outcomes if laws were enacted to further protect adolescent confidentiality. This study uncovers the dynamics of public attitudes towards the socially and ethically sensitive issue of adolescent SRH. Our

  19. Reconfiguring waveguide-gratings-based M-signature codecs to enhance OCDMA network confidentiality

    Science.gov (United States)

    Huang, Jen-Fa; Chen, Kai-Sheng; Lin, Ying-Chen; Li, Chung-Yu

    2014-02-01

    A reconfiguration scheme based on composite signature codes over waveguide-gratings-based optical code-division multiple-access (OCDMA) network coder/decoders (codecs) is proposed in the paper. By using central control node to monitor network traffic condition and reconfigure the composite signature codes made up of maximal-length sequence (M-sequence) component codes and random changing the signature codes assigned for each user to improve the confidentiality performance in an OCDMA system. The proposed scheme is analyzed with some practical eavesdroppers' attacks.

  20. 48 CFR 1552.235-77 - Data Security for Federal Insecticide, Fungicide and Rodenticide Act Confidential Business...

    Science.gov (United States)

    2010-10-01

    ... 48 Federal Acquisition Regulations System 6 2010-10-01 2010-10-01 true Data Security for Federal Insecticide, Fungicide and Rodenticide Act Confidential Business Information (DEC 1997). 1552.235-77 Section... SOLICITATION PROVISIONS AND CONTRACT CLAUSES Texts of Provisions and Clauses 1552.235-77 Data Security for...

  1. 76 FR 52659 - Access by EPA Contractors to Confidential Business Information (CBI) Related to the Greenhouse...

    Science.gov (United States)

    2011-08-23

    ... Confidential Business Information (CBI) Related to the Greenhouse Gas Reporting Program AGENCY: Environmental... contractors named in this notice to access information that will be submitted to EPA under the Greenhouse Gas...), EPA created the Greenhouse Gas Reporting Program (GHGRP), 40 CFR part 98 (part 98), which requires...

  2. Final Technical Report: "Achieving Regional Energy Efficiency Potential in the Southeast”

    Energy Technology Data Exchange (ETDEWEB)

    Mahoney, Mandy [Southeast Energy Efficiency Alliance (SEEA), Atlanta, GA (United States)

    2018-03-07

    The overall objective of this award was to facilitate sharing of DOE resources and best practices as well as provide technical assistance to key stakeholders to support greater compliance with energy efficiency standards and increased energy savings. The outcomes of this award include greater awareness among key stakeholders on energy efficiency topics, increased deployment and utilization of DOE resources, and effective policies and programs to support energy efficiency in the Southeast.

  3. ITER technical basis

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2002-01-01

    Following on from the Final Report of the EDA(DS/21), and the summary of the ITER Final Design report(DS/22), the technical basis gives further details of the design of ITER. It is in two parts. The first, the Plant Design specification, summarises the main constraints on the plant design and operation from the viewpoint of engineering and physics assumptions, compliance with safety regulations, and siting requirements and assumptions. The second, the Plant Description Document, describes the physics performance and engineering characteristics of the plant design, illustrates the potential operational consequences foe the locality of a generic site, gives the construction, commissioning, exploitation and decommissioning schedule, and reports the estimated lifetime costing based on data from the industry of the EDA parties.

  4. ITER technical basis

    International Nuclear Information System (INIS)

    2002-01-01

    Following on from the Final Report of the EDA(DS/21), and the summary of the ITER Final Design report(DS/22), the technical basis gives further details of the design of ITER. It is in two parts. The first, the Plant Design specification, summarises the main constraints on the plant design and operation from the viewpoint of engineering and physics assumptions, compliance with safety regulations, and siting requirements and assumptions. The second, the Plant Description Document, describes the physics performance and engineering characteristics of the plant design, illustrates the potential operational consequences foe the locality of a generic site, gives the construction, commissioning, exploitation and decommissioning schedule, and reports the estimated lifetime costing based on data from the industry of the EDA parties

  5. Final Scientific/Technical Report Solar America Initiative: Solar Outreach and Communications

    Energy Technology Data Exchange (ETDEWEB)

    Weissman, Jane M

    2011-09-10

    The purpose of the Solar America Initiative: Solar Outreach and Communications grant was to promote better communications among stakeholders; address infrastructure barriers to solar energy; and coordinate with industry, the U.S. Department of Energy, national laboratories, states, cities and counties. The Interstate Renewable Energy Council (IREC), a non-profit organization formed in 1982, approached this grant project by establishing a wide range of communication and outreach activities including newsletters, workshops, webinars, model practices and publications; by advancing easy and fair hook-up rules to the utility grid; and by upgrading training based on industry competency standards. The Connecting to the Grid project and the Solar Codes and Standards Public Hearings project offered communication coupled with technical assistance to overcome interconnection, net metering and other regulatory and program barriers. The Workforce Development Project tackled building a strong workforce through quality training and competency assessment programs. IREC's web site, the semi-monthly state and stakeholder newsletter and the metrics report resulted in better communications among stakeholders. Workshops and phone seminars offered technical assistance and kept stakeholders up-to-date on key issues. All of these activities resulted in implementing sustainable solutions to institutional and market barriers to solar energy and getting the right information to the right people.

  6. FINAL TECHNICAL REPORT Chagas Prevention in Central America

    International Development Research Centre (IDRC) Digital Library (Canada)

    Carlota Monroy

    INFORME FINAL: PROYECTO ID 106531 - 001. CORRESPONDIENTE AL PERIODO DEL 1 DE MARZO 2011 AL 31 DE MARZO 2014. CONTENIDO. 1. Información general ……………………………………………………………1. 2. Resumen del proyecto ………………………………………………………….2. 3. Metas objetivos ...

  7. AISI Direct Steelmaking Program. Final technical report

    Energy Technology Data Exchange (ETDEWEB)

    Aukrust, E.

    1994-08-01

    This final report deals with the results of a 5-yr project for developing a more energy-efficient, environmentally friendly, less costly process for producing hot metal than current coke ovens and blast furnaces. In the process, iron ore pellets are smelted in a foamy slag created by reaction of coal char with molten slag to produce CO. The CO further reacts with oxygen, which also reacts with coal volatile matter, to produce the heat necessary to sustain the endothermic reduction reaction. The uncombusted CO and H{sub 2} from the coal are used to preheat and prereduce hematite pellets for the most efficient use of the energy in the coal. Laboratory programs confirmed that the process steps worked. Pilot plant studies were successful. Economic analysis for a 1 million tpy plant is promising.

  8. National Alliance for Advanced Biofuels and Bio-Products Final Technical Report

    Energy Technology Data Exchange (ETDEWEB)

    Olivares, Jose A. [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Baxter, Ivan [US Dept. of Agriculture (USDA)., Washington, DC (United States); Brown, Judith [Univ. of Arizona, Tucson, AZ (United States); Carleton, Michael [Matrix Genetics, Seattle, WA (United States); Cattolico, Rose Anne [Univ. of Washington, Seattle, WA (United States); Taraka, Dale [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Detter, John C. [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Devarenne, Timothy P. [Texas Agrilife Research, College Station, TX (United States); Dutcher, Susan K. [Washington Univ., St. Louis, MO (United States); Fox, David T. [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Goodenough, Ursula [Washington Univ., St. Louis, MO (United States); Jaworski, Jan [Donald Danforth Plant Science Center, St. Louis, MO (United States); Kramer, David [Michigan State Univ., East Lansing, MI (United States); Lipton, Mary S. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); McCormick, Margaret [Matrix Genetics, Seattle, WA (United States); Merchant, Sabeeha [Univ. of California, Los Angeles, CA (United States); Molnar, Istvan [Univ. of Arizona, Tucson, AZ (United States); Panisko, Ellen A. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Pellegrini, Matteo [Univ. of California, Los Angeles, CA (United States); Polle, Juergen [City Univ. (CUNY), NY (United States). Brooklyn College; Sabarsky, Martin [Cellana, Inc., San Diego, CA (United States); Sayre, Richard T. [New Mexico Consortium, Los Alamos, NM (United States); Starkenburg,, Shawn [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Stormo, Gary [Washington Univ., St. Louis, MO (United States); Twary, Scott N. [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Unkefer, Clifford J. [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Unkefer, Pat J. [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Yuan, Joshua S. [Texas Agrilife Research, College Station, TX (United States); Arnold, Bob [Univ. of Arizona, Tucson, AZ (United States); Bai, Xuemei [Cellana, Inc., San Diego, CA (United States); Boeing, Wiebke [New Mexico State Univ., Las Cruces, NM (United States); Brown, Lois [Texas Agrilife Research, College Station, TX (United States); Gujarathi, Ninad [Reliance Industries Limited, Mumbai (India); Huesemann, Michael [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Lammers, Pete [New Mexico State Univ., Las Cruces, NM (United States); Laur, Paul [Eldorado Biofuels, Santa Fe, NM (United States); Khandan, Nirmala [New Mexico State Univ., Las Cruces, NM (United States); Parsons, Ronald [Solix BioSystems, Fort Collins, CO (United States); Samocha, Tzachi [Texas Agrilife Research, College Station, TX (United States); Thomasson, Alex [Texas Agrilife Research, College Station, TX (United States); Unc, Adrian [New Mexico State Univ., Las Cruces, NM (United States); Waller, Pete [Univ. of Arizona, Tucson, AZ (United States); Bonner, James [Clarkson Univ., Potsdam, NY (United States); Coons, Jim [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Fernando, Sandun [Texas Agrilife Research, College Station, TX (United States); Goodall, Brian [Valicor Renewables, Dexter, MI (United States); Kadam, Kiran [Valicor Renewables, Dexter, MI (United States); Lacey, Ronald [Texas Agrilife Research, College Station, TX (United States); Wei, Liu [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Marrone, Babs [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Nikolov, Zivko [Texas Agrilife Research, College Station, TX (United States); Trewyn, Brian [Colorado School of Mines, Golden, CO (United States); Albrecht, Karl [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Capareda, Sergio [Texas Agrilife Research, College Station, TX (United States); Cheny, Scott [Diversified Energy, Gilbert, AZ (United States); Deng, Shuguang [New Mexico State Univ., Las Cruces, NM (United States); Elliott, Douglas [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Cesar, Granda [Terrabon, LLC, Bryan, TX (United States); Hallen, Richard [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Lupton, Steven [UOP Honeywell Co, LLC, Des Plaines, IL (United States); Lynch, Sharry [UOP Honeywell Co, LLC, Des Plaines, IL (United States); Marchese, Anthony [Colorado State Univ., Fort Collins, CO (United States); Nieweg, Jennifer [Albemarle Catilin, Ames, IA (United States); Ogden, Kimberly [Univ. of Arizona, Tucson, AZ (United States); Oyler, James [Genifuel, Salt Lake City, UT (United States); Reardon, Ken [Colorado State Univ., Fort Collins, CO (United States); Roberts, William [North Carolina State Univ., Raleigh, NC (United States); Sams, David [Albemarle Catilin, Ames, IA (United States); Schaub, Tanner [New Mexico State Univ., Las Cruces, NM (United States); Silks, Pete [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Archibeque, Shawn [Colorado State Univ., Fort Collins, CO (United States); Foster, James [Texas Agrilife Research, College Station, TX (United States); Gaitlan, Delbert [Texas Agrilife Research, College Station, TX (United States); Lawrence, Addison [Texas Agrilife Research, College Station, TX (United States); Lodge-Ivey, Shanna [New Mexico State Univ., Las Cruces, NM (United States); Wickersham, Tyron [Texas Agrilife Research, College Station, TX (United States); Blowers, Paul [Univ. of Arizona, Tucson, AZ (United States); Davis, Ryan [National Renewable Energy Lab. (NREL), Golden, CO (United States); Downes, C. Meghan [New Mexico State Univ., Las Cruces, NM (United States); Dunlop, Eric [Pan Pacific Technologies Pty. Ltd., Adelaide (Australia); Frank, Edward [Argonne National Lab. (ANL), Argonne, IL (United States); Handler, Robert [Michigan Technological Univ., Houghton, MI (United States); Newby, Deborah [Idaho National Lab. (INL), Idaho Falls, ID (United States); Pienkos, Philip [National Renewable Energy Lab. (NREL), Golden, CO (United States); Richardson, James [Texas Agrilife Research, College Station, TX (United States); Seider, Warren [Univ. of Pennsylvania, Philadelphia, PA (United States); Shonnard, David [Michigan Technological Univ., Houghton, MI (United States); Skaggs, Richard [Pacific Northwest National Lab. (PNNL), Richland, WA (United States)

    2014-09-30

    The main objective of NAABB was to combine science, technology, and engineering expertise from across the nation to break down critical technical barriers to commercialization of algae-based biofuels. The approach was to address technology development across the entire value chain of algal biofuels production, from selection of strains to cultivation, harvesting, extraction, fuel conversion, and agricultural coproduct production. Sustainable practices and financial feasibility assessments ununderscored the approach and drove the technology development.

  9. 76 FR 4645 - Hydrogen and Fuel Cell Technical Advisory Committee (HTAC)

    Science.gov (United States)

    2011-01-26

    ... DEPARTMENT OF ENERGY Hydrogen and Fuel Cell Technical Advisory Committee (HTAC) AGENCY: Department...: This notice announces a meeting of the Hydrogen and Fuel Cell Technical Advisory Committee (HTAC). HTAC... Agenda: (Subject to change; updates will be posted on http://hydrogen.energy.gov and copies of the final...

  10. 76 FR 60478 - Hydrogen and Fuel Cell Technical Advisory Committee (HTAC)

    Science.gov (United States)

    2011-09-29

    ... DEPARTMENT OF ENERGY Hydrogen and Fuel Cell Technical Advisory Committee (HTAC) AGENCY: Department...: The Hydrogen and Fuel Cell Technical Advisory Committee (HTAC) was established under section 807 of... website at: http://hydrogen.energy.gov and copies of the final agenda will available the date of the...

  11. International Standards Development for Marine and Hydrokinetic Renewable Energy - Final Report on Technical Status

    Energy Technology Data Exchange (ETDEWEB)

    Rondorf, Neil E.; Busch, Jason; Kimball, Richard

    2011-10-29

    This report summarizes the progress toward development of International Standards for Marine and Hydrokinetic Renewable Energy, as funded by the U.S. Department of Energy (DOE) under the International Electrotechnical Commission (IEC) Technical Committee 114. The project has three main objectives: 1. Provide funding to support participation of key U.S. industry technical experts in 6 (originally 4) international working groups and/or project teams (the primary standards-making committees) and to attend technical meetings to ensure greater U.S. involvement in the development of these standards. 2. Provide a report to DOE and industry stakeholders summarizing the IEC standards development process for marine and hydrokinetic renewable energy, new international standards and their justifications, and provide standards guidance to industry members. 3. Provide a semi-annual (web-based) newsletter to the marine renewable energy community. The newsletter will educate industry members and stakeholders about the processes, progress, and needs of the US efforts to support the international standards development effort. The newsletter is available at www.TC114.us

  12. Final Scientific Technical Report Crowder College MARET Center

    Energy Technology Data Exchange (ETDEWEB)

    Boyt, Art [Crowder College, Neosho, MO (United States); Eberle, Dan [Crowder College, Neosho, MO (United States); Hudson, Pam [Crowder College, Neosho, MO (United States); Hopper, Russ [Crowder College, Neosho, MO (United States)

    2013-06-30

    , exploring and validating new applications of solar and other renewable technologies, the MARET Facility will house a wide variety of programs which will advance implementation of renewable energy throughout the region. These program goals include; Curriculum in renewable energy for pre-engineering transfer programs; Certification and degree programs for technical degrees for Energy Efficiency, Wind, Photovoltaic and Solar Thermal professionals; Short courses and workshops for building management and design professionals; Public education and demonstration projects in renewable energy through conferences and K-12 educational outreach; Technical degree offering in building construction incorporating “best practices” for energy efficiency and renewables; and Business incubators for new renewable energy businesses and new product development The new MARET facility will support the mission of the US Department of Energy (DOE) Solar Program, “to improve America’s security, environmental quality, and economic prosperity through public-private partnerships that bring reliable and affordable solar energy technologies to the marketplace,” through a variety of educational and business assistance programs. Further, technical innovations planned for the MARET facility and its applied research activities will advance the Solar Program strategic goals to “reduce the cost of solar energy to the point it becomes competitive in relevant energy markets (e.g., buildings, power plants) and for solar technology to enable a sustainable solar industry.” Overarching Goals relative to program needs, future expansion, flexibility, quality of materials, and construction and operational costs:; Experimental: The structure and systems of the building operate as an educational resource. The systems are meant to be a source for data collection and study for building users and instructors; Educational: Part of the evolution of this building and its ongoing goals is to use the building as an

  13. The role of non-technical skills in surgery

    Directory of Open Access Journals (Sweden)

    Riaz A. Agha

    2015-12-01

    This narrative review used a number of sources including written and online, there was no specific search strategy of defined databases. Modern surgical practice requires; technical and non-technical skills, evidence-based practice, an emphasis on lifelong learning, monitoring of outcomes and a supportive institutional and health service framework. Finally these requirements need to be combined with a number of personal and professional values including integrity, professionalism and compassionate, patient-centred care.

  14. Institute of confidential cooperation in the USA: organizational and juridical aspect

    Directory of Open Access Journals (Sweden)

    Іван Іванович Мусієнко

    2016-01-01

    Full Text Available One of the most efficient measures of crime counteraction is timely reporting law enforcement agencies during which a special role is dedicated to persons (informants. They provide assistance to authorized subjects in the sphere of corruption counteraction by giving operative significant information. Thus the article is aimed at the analysis of law enforcement bodies and special services of the USA experience concerning work with confidential sources. The latest tendencies of the US police activities are concentrated on the attraction of citizens to cooperation with police. Such cooperation is efficient in prevention of most hard crimes due to informants' assistance, i.e. people who display desire to cooperate with police. Scientists D. Sunshine and T. Tyler consider that the nature of relations between police and publicity has a great influence on the efficiency of crime counteraction, local citizens' welfare. The authors draw attention to the importance of establishing benevolent relations between police and local population. The given article also reveals the USA law enforcement agencies experience of institute of confidential cooperation using. Using of operative sources of information remains the most efficient tools for detection, suspension, disclosure and investigation of crimes in the whole world. With the aim of achievement of accuracy in terminology it is conducted the identification of different kinds of informants depending on their role and law enforcement institution they collaborate with. Conclusions. Actions in favor of society are a important element of informationship as social institute. The results of conducted analysis testify that the modern understanding of institute of confidential cooperation in the USA is grounded on the following principles: -        the object of message is information about any abuses, violations, immoral behavior that may cause significant violations of rights and duties of citizens

  15. Outsourcing medical data analyses: can technology overcome legal, privacy, and confidentiality issues?

    Science.gov (United States)

    Brumen, Bostjan; Heričko, Marjan; Sevčnikar, Andrej; Završnik, Jernej; Hölbl, Marko

    2013-12-16

    Medical data are gold mines for deriving the knowledge that could change the course of a single patient's life or even the health of the entire population. A data analyst needs to have full access to relevant data, but full access may be denied by privacy and confidentiality of medical data legal regulations, especially when the data analyst is not affiliated with the data owner. Our first objective was to analyze the privacy and confidentiality issues and the associated regulations pertaining to medical data, and to identify technologies to properly address these issues. Our second objective was to develop a procedure to protect medical data in such a way that the outsourced analyst would be capable of doing analyses on protected data and the results would be comparable, if not the same, as if they had been done on the original data. Specifically, our hypothesis was there would not be a difference between the outsourced decision trees built on encrypted data and the ones built on original data. Using formal definitions, we developed an algorithm to protect medical data for outsourced analyses. The algorithm was applied to publicly available datasets (N=30) from the medical and life sciences fields. The analyses were performed on the original and the protected datasets and the results of the analyses were compared. Bootstrapped paired t tests for 2 dependent samples were used to test whether the mean differences in size, number of leaves, and the accuracy of the original and the encrypted decision trees were significantly different. The decision trees built on encrypted data were virtually the same as those built on original data. Out of 30 datasets, 100% of the trees had identical accuracy. The size of a tree and the number of leaves was different only once (1/30, 3%, P=.19). The proposed algorithm encrypts a file with plain text medical data into an encrypted file with the data protected in such a way that external data analyses are still possible. The results

  16. Technical program plan for the transitioning, decommissioning, and final disposition focus area

    Energy Technology Data Exchange (ETDEWEB)

    1994-01-01

    Hundreds of aging nuclear materials processing facilities within the Department of Energy`s (DOE) Weapons Complex are now being shut down and deactivated. These facilities, situated throughout the United States, will require a monumental effort to clean up safely and with minimal environmental insult. Current cleanup technologies tend to be labor intensive and expensive, they produce an unacceptably large volume of waste, and they expose workers to radioactive and other hazardous substances. This document describes an emerging program designed to develop and demonstrate new technical approaches to the decontamination and decommissioning (D&D) program for DOE`s nuclear materials processing facilities. Sponsored by the DOE Office of Technology Development within the Office of Environmental Restoration and Waste Management (EM), the program seeks to integrate the strengths of DOE`s technical, managerial, and systems engineering capabilities with those of industry, universities, and other government agencies. Once developed, these technologies will help to provide US industry with a competitive edge in the worldwide market that exists for improved environmental restoration and D&D services.

  17. Final report of the UMTRA independent technical review of TAC audit programs

    International Nuclear Information System (INIS)

    1994-10-01

    This report details the findings of an Independent Technical Review (ITR) of practices and procedures for the Uranium Mill Tailings Remedial Action (UMTRA) Project audit program. The audit program is conducted by Jacobs Engineering Group Inc., the Technical Assistance Contractor (TAC) for the UMTRA Project. The purpose of the ITR was to ensure that the TAC audit program is effective and is conducted efficiently. The ITR was conducted from May 16-20, 1994. A review team observed audit practices in the field, reviewed the TAC audit program's documentation, and discussed the program with TAC staff and management. The format of this report has been developed around EPA guidelines; they comprise most of the major section headings. Each section begins by identifying the criteria that the TAC program is measured against, then describing the approach used by the ITR team to measure each TAC audit program against the criteria. An assessment of each type of audit is then summarized for each component in the following order: Radiological audit summary; Health and safety audit summary; Environmental audit summary; Quality assurance audit summary

  18. Technical program plan for the transitioning, decommissioning, and final disposition focus area

    International Nuclear Information System (INIS)

    1994-01-01

    Hundreds of aging nuclear materials processing facilities within the Department of Energy's (DOE) Weapons Complex are now being shut down and deactivated. These facilities, situated throughout the United States, will require a monumental effort to clean up safely and with minimal environmental insult. Current cleanup technologies tend to be labor intensive and expensive, they produce an unacceptably large volume of waste, and they expose workers to radioactive and other hazardous substances. This document describes an emerging program designed to develop and demonstrate new technical approaches to the decontamination and decommissioning (D ampersand D) program for DOE's nuclear materials processing facilities. Sponsored by the DOE Office of Technology Development within the Office of Environmental Restoration and Waste Management (EM), the program seeks to integrate the strengths of DOE's technical, managerial, and systems engineering capabilities with those of industry, universities, and other government agencies. Once developed, these technologies will help to provide US industry with a competitive edge in the worldwide market that exists for improved environmental restoration and D ampersand D services

  19. Confidentiality, disclosure and doping in sports medicine.

    Science.gov (United States)

    McNamee, M; Phillips, N

    2011-03-01

    The manner in which healthcare and medical professionals serve their athlete patients is governed by a variety of relevant codes of conduct. A range of codified rules is presented that refer both the welfare of the patient and the maintaining of confidentiality, which is at the heart of trustworthy relations. The 2009 version of the World Anti-Doping Code (WADC), however, appears to oblige all healthcare professionals not to assist athletes if they are known to be engaged in doping behaviours under fear of removal from working with athletes from the respective sports. In contrast, serving the best interests of their athlete patients may oblige healthcare professionals to give advice and guidance, not least in terms of harm minimisation. In so far as the professional conduct of a healthcare professional is guided both by professional code and World Anti-Doping Code, they are obliged to fall foul of one or the other. We call for urgent and pressing inter-professional dialogue with the World Anti-Doping Agency to clarify this situation.

  20. Technical writing versus technical writing

    Science.gov (United States)

    Dillingham, J. W.

    1981-01-01

    Two terms, two job categories, 'technical writer' and 'technical author' are discussed in terms of industrial and business requirements and standards. A distinction between 'technical writing' and technical 'writing' is made. The term 'technical editor' is also considered. Problems inherent in the design of programs to prepare and train students for these jobs are discussed. A closer alliance between industry and academia is suggested as a means of preparing students with competent technical communication skills (especially writing and editing skills) and good technical skills.