WorldWideScience

Sample records for confidential mta identifying

  1. 75 FR 57768 - Access to Confidential Business Information by Eastern Research Group and Its Identified...

    Science.gov (United States)

    2010-09-22

    ... Business Information by Eastern Research Group and Its Identified Subcontractor AGENCY: Environmental Protection Agency (EPA). ACTION: Notice. SUMMARY: EPA has authorized its contractor, Eastern Research Group... the information may be claimed or determined to be Confidential Business Information (CBI). DATES...

  2. Novel nanohybrid MTA compositions

    DEFF Research Database (Denmark)

    Lovschall, Henrik; Ranjkesh, Bahram

    Original Mineral Trioxide Aggregate (MTA) has been recommended for various uses in endodontics. MTA is a calcia, silica, alumina containing hydraulic cement with long setting time, calcium hydroxide release, and high pH. It possesses antibacterial and sealing properties. Interestingly, recent...... studies describe hydroxyapatite crystals form over MTA when it comes in contact with simulated physiological tissue fluid. On the basis of available evidence it appears that MTA efficiently develop superior marginal adaptation in humid environments. Observations suggest MTA is suitable material for pulp...... modified calcia-silica-alumina-sulphate composition with soluble fluorides, radiocontrast material, and nanosilicate. iMTA thereby demonstrate a remarkably high compressive strength in comparison to several commonly used dental cements. Reduction of iMTA setting time to 2-10 min with either flowable...

  3. 76 FR 10360 - Access to Confidential Business Information by Guident Technologies Inc. and Its Identified...

    Science.gov (United States)

    2011-02-24

    ... Business Information by Guident Technologies Inc. and Its Identified Subcontractors AGENCY: Environmental Protection Agency (EPA). ACTION: Notice. SUMMARY: EPA has authorized its contractor, Guident Technologies... information may be claimed or determined to be Confidential Business Information (CBI). DATES: Access to the...

  4. 78 FR 67139 - Access to Confidential Business Information by Eastern Research Group and Its Identified...

    Science.gov (United States)

    2013-11-08

    ... Business Information by Eastern Research Group and Its Identified Subcontractor, Energy Services, Inc..., Eastern Research Group (ERG) of Chantilly, VA, and subcontractor Energy Services, Inc., of Tallahassee, FL... Control Act (TSCA). Some of the information may be claimed or determined to be Confidential Business...

  5. 76 FR 37111 - Access to Confidential Business Information by Computer Sciences Corporation and Its Identified...

    Science.gov (United States)

    2011-06-24

    ... Business Information by Computer Sciences Corporation and Its Identified Subcontractors AGENCY: Environmental Protection Agency (EPA). ACTION: Notice. SUMMARY: EPA has authorized its contractor, Computer Sciences Corporation of Chantilly, VA and Its Identified Subcontractors, to access information which has...

  6. MTA Computer Based Evaluation System.

    Science.gov (United States)

    Brenner, Lisa P.; And Others

    The MTA PLATO-based evaluation system, which has been implemented by a consortium of schools of medical technology, is designed to be general-purpose, modular, data-driven, and interactive, and to accommodate other national and local item banks. The system provides a comprehensive interactive item-banking system in conjunction with online student…

  7. 75 FR 24688 - Access to Confidential Business Information by Guident Technologies Inc.’s Identified Subcontractor

    Science.gov (United States)

    2010-05-05

    ... to a particular entity, consult the technical person listed under FOR FURTHER INFORMATION CONTACT. B... Information Systems and for Test Confidential Business Information Tracking Systems (CBITS) and (TCBITS). In... materials on a need-to- know basis only. All access to TSCA CBI under this contract will take place at EPA...

  8. Physicochemical properties of calcium silicate-based formulations MTA Repair HP and MTA Vitalcem.

    Science.gov (United States)

    Guimarães, Bruno Martini; Prati, Carlo; Duarte, Marco Antonio Hungaro; Bramante, Clovis Monteiro; Gandolfi, Maria Giovanna

    2018-04-05

    This study aimed to analyze the following physicochemical properties: radiopacity, final setting time, calcium release, pH change, solubility, water sorption, porosity, surface morphology, and apatite-forming ability of two calcium silicate-based materials. We tested MTA Repair HP and MTA Vitalcem in comparison with conventional MTA, analyzing radiopacity and final setting time. Water absorption, interconnected pores and apparent porosity were measured after 24-h immersion in deionized water at 37°C. Calcium and pH were tested up to 28 d in deionized water. We analyzed data using two-way ANOVA with Student-Newman-Keuls tests (pcalcium release at 28 d (pcalcium phosphate on their surface after 28 d in HBSS. MTA Repair HP and MTA Vitalcem had extended alkalinizing activity and calcium release that favored calcium phosphate nucleation. The presence of the plasticizer in MTA HP might increase its solubility and porosity. The radiopacifier calcium tungstate can be used to replace bismuth oxide.

  9. Studies on the metabolism and toxicological detection of the designer drug 4-methylthioamphetamine (4-MTA) in human urine using gas chromatography-mass spectrometry.

    Science.gov (United States)

    Ewald, Andreas H; Peters, Frank T; Weise, Magdalene; Maurer, Hans H

    2005-09-25

    4-Methylthioamphetamine (4-MTA) is a scheduled designer drug that has appeared on the illicit drug market and led to several non-fatal or even fatal poisonings. Only few data are available on its metabolism. The first aim of this study was to identify the 4-MTA metabolites in human urine and then to study whether the authors' STA procedure is suitable for screening for and identification of 4-MTA and/or its metabolites in urine. After enzymatic cleavage of conjugates, solid-phase extraction (SPE) and acetylation the following metabolites could be identified by full-scan gas chromatography-mass spectrometry (GC-MS): deamino-oxo 4-MTA, deamino-hydroxy 4-MTA, ring hydroxy and beta-hydroxy 4-MTA. 4-MTA sulfoxide could be identified as possible artifact. In urine samples after enzymatic hydrolysis, acidic extraction, and methylation, 4-methylthiobenzoic acid could be identified. The authors' systematical toxicological analysis (STA) procedure using full-scan GC-MS after acid hydrolysis, liquid-liquid extraction (LLE) and acetylation allowed detection of 4-MTA as target analyte plus all the above-mentioned metabolites with the exception of 4-methylthiobenzoic acid. The extraction efficiency of 4-MTA was approximately 70% and the limit of detection (LOD) was 30 ng/ml (S/N 3).

  10. Chemistry and Bioactivity of NeoMTA Plus™ versus MTA Angelus® Root Repair Materials

    Directory of Open Access Journals (Sweden)

    Sawsan T. Abu Zeid

    2017-01-01

    Full Text Available Objectives. To analyse the chemistry and bioactivity of NeoMTA Plus in comparison with the conventional root repair materials. Method and Materials. Unhydrated and hydrated (initial and final sets materials were analysed by Fourier transform infrared (FTIR spectroscopy and X-ray diffraction (XRD. For bioactivity study, small holes of dentin discs were filled with either materials, immersed in PBS for 15 days, and analysed with FTIR and scanning electron microscope with energy dispersive X-ray (SEM/EDX. The calculation of crystallinity and carbonate/phosphate (CO3/PO4 ratio of surface precipitates (from FTIR and calcium/phosphate (Ca/P ratio (from EDX was statistically analysed using t-test or ANOVA, respectively, at 0.05 significance. Results. Both materials are tricalcium silicate-based that finally react to be calcium silicate hydrate. NeoMTA Plus has relatively high aluminium and sulfur content, with tantalum oxide as an opacifier instead of zirconium oxide in MTA Angelus. NeoMTA Plus showed better apatite formation, higher crystallinity and Ca/P but lower CO3/PO4 ratio than MTA Angelus. SEM showed globular structure with a small particle size in NeoMTA Plus while spherical structure with large particle size in MTA Angelus. Conclusion. Due to fast setting, higher crystallinity, and better bioactivity of NeoMTA Plus, it can be used as a pulp and root repair material.

  11. Staining Potential of Neo MTA Plus, MTA Plus, and Biodentine Used for Pulpotomy Procedures.

    Science.gov (United States)

    Camilleri, Josette

    2015-07-01

    Mineral trioxide aggregate (MTA) used for pulpotomy procedures in immature permanent teeth can reduce treatment to 1 session as opposed to classic calcium hydroxide therapy, which necessitates multiple appointments. The main disadvantage of MTA use is crown discoloration after treatment. The aim of this study was to characterize 3 materials that are used for pulpotomy procedures in immature permanent teeth and assess their color stability in the presence of sodium hypochlorite solution. Hydrated Neo MTA Plus (Avalon Biomed Inc, Bradenton, FL), MTA Plus (Avalon Biomed Inc), and Biodentine (Septodont, Saint-Maur-des-Fossés, France) were characterized after immersion in Hank's balanced salt solution for 1 day and 28 days using a combination of scanning electron microscopy, energy-dispersive spectroscopy, and X-ray diffraction analysis. The color stability of the 3 materials in contact with water or sodium hypochlorite was evaluated by photography, spectrophotometry, and X-ray diffraction analysis. All the materials hydrated and produced calcium hydroxide as a by-product of hydration at early age. All materials interacted with synthetic tissue fluid, forming a calcium phosphate phase. MTA Plus exhibited discoloration in contact with sodium hypochlorite. All the materials tested are suitable to be used in the treatment of immature teeth because they all produced calcium hydroxide, which is necessary to induce dentin bridge formation and continued root formation. Neo MTA Plus and Biodentine are suitable alternatives to MTA, and they do not exhibit discoloration. Copyright © 2015 American Association of Endodontists. Published by Elsevier Inc. All rights reserved.

  12. MTA family of coregulators in nuclear receptor biology and pathology

    Science.gov (United States)

    Manavathi, Bramanandam; Singh, Kamini; Kumar, Rakesh

    2007-01-01

    Nuclear receptors (NRs) rely on coregulators (coactivators and corepressors) to modulate the transcription of target genes. By interacting with nucleosome remodeling complexes, NR coactivators potentiate transcription, whereas corepressors inhibit transcription of the target genes. Metastasis-associated proteins (MTA) represent an emerging family of novel NR coregulators. In general, MTA family members form independent nucleosome remodeling and deacetylation (NuRD) complexes and repress the transcription of different genes by recruiting histone deacetylases onto their target genes. However, MTA1 also acts as a coactivator in a promoter-context dependent manner. Recent findings that repression of estrogen receptor transactivation functions by MTA1, MTA1s, and MTA2 and regulation of MTA3 by estrogen signaling have indicated the significance of these proteins in NR signaling. Here, we highlight the action of MTA proteins on NR signaling and their roles in pathophysiological conditions. PMID:18174918

  13. Characterization of a new sealer MTA/HAp

    International Nuclear Information System (INIS)

    Barros, C.M.B.; Oliveira, S.V.; Costa, A.C.F.M.; Dantas, D.C.R.E.; Fontes, L.B.C.; Viana, K.M.S.

    2012-01-01

    Filling materials (cement-based calcium hydroxide, amalgam, glass ionomer and IRM) are often used as sealers. However, none of them meets the desirable characteristics of a suitable sealing material. This study aims to characterize the new sealer, MTA/HAp from the incorporation of 5% by weight of synthetic hydroxyapatite to the MTA and to investigate the influence of the addition of HAp on the characteristic structural, chemical and consistency of the MTA. For this, we used MTA Angelus ® and HAp synthesized in the laboratory. We used the ratio by mass 95%MTA/5%HAp, where the hydroxyapatite added the characteristic of the MTA osteoconduction. The tests were performed: XRD, XRF and consistency. The results showed that both the new cement had the same crystalline phases as the same chemical composition of its precursors, yet having suitable consistency (plastic mass) of a sealer as well as the pure MTA. (author)

  14. Characterization of a new sealer MTA/HAp; Caracterizacao de um novo cimento endodontico MTA/HAp

    Energy Technology Data Exchange (ETDEWEB)

    Barros, C.M.B.; Oliveira, S.V.; Costa, A.C.F.M. [Universidade Federal de Campina Grande (UFCG), PB (Brazil); Dantas, D.C.R.E.; Fontes, L.B.C. [Universidade Estadual da Paraiba (UEPB), PB (Brazil); Viana, K.M.S., E-mail: kalineviana@ect.ufrn.br [Universidade Federal do Rio Grande do Norte (UFRN), Natal, RN (Brazil)

    2012-07-01

    Filling materials (cement-based calcium hydroxide, amalgam, glass ionomer and IRM) are often used as sealers. However, none of them meets the desirable characteristics of a suitable sealing material. This study aims to characterize the new sealer, MTA/HAp from the incorporation of 5% by weight of synthetic hydroxyapatite to the MTA and to investigate the influence of the addition of HAp on the characteristic structural, chemical and consistency of the MTA. For this, we used MTA Angelus ® and HAp synthesized in the laboratory. We used the ratio by mass 95%MTA/5%HAp, where the hydroxyapatite added the characteristic of the MTA osteoconduction. The tests were performed: XRD, XRF and consistency. The results showed that both the new cement had the same crystalline phases as the same chemical composition of its precursors, yet having suitable consistency (plastic mass) of a sealer as well as the pure MTA. (author)

  15. Transcriptome and proteomic analyses reveal multiple differences associated with chloroplast development in the spaceflight-induced wheat albino mutant mta.

    Directory of Open Access Journals (Sweden)

    Kui Shi

    Full Text Available Chloroplast development is an integral part of plant survival and growth, and occurs in parallel with chlorophyll biosynthesis. However, little is known about the mechanisms underlying chloroplast development in hexaploid wheat. Here, we obtained a spaceflight-induced wheat albino mutant mta. Chloroplast ultra-structural observation showed that chloroplasts of mta exhibit abnormal morphology and distribution compared to wild type. Photosynthetic pigments content was also significantly decreased in mta. Transcriptome and chloroplast proteome profiling of mta and wild type were done to identify differentially expressed genes (DEGs and proteins (DEPs, respectively. In total 4,588 DEGs including 1,980 up- and 2,608 down-regulated, and 48 chloroplast DEPs including 15 up- and 33 down-regulated were identified in mta. Classification of DEGs revealed that most were involved in chloroplast development, chlorophyll biosynthesis, or photosynthesis. Besides, transcription factors such as PIF3, GLK and MYB which might participate in those pathways were also identified. The correlation analysis between DEGs and DEPs revealed that the transcript-to-protein in abundance was functioned into photosynthesis and chloroplast relevant groups. Real time qPCR analysis validated that the expression level of genes encoding photosynthetic proteins was significantly decreased in mta. Together, our results suggest that the molecular mechanism for albino leaf color formation in mta is a thoroughly regulated and complicated process. The combined analysis of transcriptome and proteome afford comprehensive information for further research on chloroplast development mechanism in wheat. And spaceflight provides a potential means for mutagenesis in crop breeding.

  16. Evaluation of bacterial leakage of four root- end filling materials: Gray Pro Root MTA, White Pro Root MTA, Root MTA and Portland Cement (type I

    Directory of Open Access Journals (Sweden)

    Zarabian M.

    2005-07-01

    Full Text Available Background and Aim: Today several materials have been used for root- end filling in endodontic surgery. Optimal properties of Pro Root MTA in in-vitro and in-vivo studies has been proven. On the other hand, based on some studies, Root MTA (Iranian Pro Root MTA and Portland cement are similar to Pro Root MTA in physical and biologic properties. The aim of this study was to evaluate bacterial leakage (amount and mean leakage time of four root- end filling materials. Materials and Methods: In this experimental in-vitro study, seventy six extracted single- rooted human teeth were randomly divided into six groups for root-end filling with gray Pro Root MTA, white Pro Root MTA, Root MTA (Iranian Pro Root MTA, Portland Cement (type I and positive and negative control groups. Root canals were instrumented using the step- back technique. Root- end filling materials were placed in 3mm ultra sonic retro preparations. Samples and microleakage model system were sterilized in autoclave. The apical 3-4 mm of the roots were immersed in phenol red with 3% lactose broth culture medium. The coronal access of each specimen was inoculated every 24h with a suspension of Streptococcus sanguis (ATCC 10556. Culture media were observed every 24h for colour change indicating bacterial contamination for 60 days. Statistical analysis was performed using log- rank test with P<0.05 as the limit of significance. Results: At the end of study 50%, 56.25%, 56.25% and 50% of specimens filled with Gray Pro Root MTA, White Pro Root MTA. Root MTA and Portland Cement (type I had evidence of leakage respectively. The mean leakage time was 37.19±6.29, 36.44±5.81, 37.69±5.97 and 34.81±6.67 days respectively. Statistical analysis of data showed no significant difference among the leakage (amount and mean leakage time of the four tested root- end filling materials (P=0.9958. Conclusion: Based on the results of this study, there were no significant differences in leakage among the four

  17. MTA3 regulates CGB5 and Snail genes in trophoblast

    Energy Technology Data Exchange (ETDEWEB)

    Chen, Ying [Department of Obstetrics, Gynecology and Reproductive Biology, Michigan State University, Grand Rapids, MI 49503 (United States); Miyazaki, Jun [Department of Obstetrics and Gynecology, Fujita Health University School of Medicine, Fujita Health University, Toyoake (Japan); Division of Molecular Genetics, Institute for Comprehensive Medical Science, Fujita Health University, Toyoake (Japan); Nishizawa, Haruki [Department of Obstetrics and Gynecology, Fujita Health University School of Medicine, Fujita Health University, Toyoake (Japan); Kurahashi, Hiroki [Division of Molecular Genetics, Institute for Comprehensive Medical Science, Fujita Health University, Toyoake (Japan); Leach, Richard, E-mail: Richard.Leach@hc.msu.edu [Department of Obstetrics, Gynecology and Reproductive Biology, Michigan State University, Grand Rapids, MI 49503 (United States); Department of Obstetrics, Gynecology and Women’s Health, Spectrum Health Medical Group, Grand Rapids, MI 49503 (United States); Wang, Kai, E-mail: Kai.Wang@hc.msu.edu [Department of Obstetrics, Gynecology and Reproductive Biology, Michigan State University, Grand Rapids, MI 49503 (United States)

    2013-04-19

    Highlights: •Impaired MTA3, raised CGB5 and Snail expression are associated with preeclampsia. •Knock-down of MTA3 causes up-regulation of CGB5 and Snail genes in BeWo cells. •MTA3 occupies CGB5 and Snail gene promoters in BeWo cells. -- Abstract: Secreted by the placental trophoblast, human chorionic gonadotropin (hCG) is an important hormone during pregnancy and is required for the maintenance of pregnancy. Previous studies have shown that dys-regulation of hCG expression is associated with preeclampsia. However, the exact relationship between altered hCG levels and development of preeclampsia is unknown. Metastasis associated protein 3 (MTA3), a chromatin remodeling protein, is abundantly expressed in the placental trophoblasts, but its function is unknown. In breast cancer, MTA3 has been shown to repress the expression of Snail and cell migration. However, whether MTA3 acts similarly in the trophoblast has not been investigated. In the present study, we examined the role of MTA3 in regulating the hCG β-subunit gene (gene name: CGB5) and Snail expression in the trophoblast cell line, BeWo, as well as its relevance to the high hCG expression levels seen in preeclampsia. First, we investigated MTA3 expression in preeclamptic placenta as compared to normal control placenta via gene expression microarray and qRT-PCR and found that MTA3 was significantly down-regulated, whereas both CGB5 and Snail were up-regulated in preeclamptic placenta. Secondly, we knocked down MTA3 gene in trophoblast cell line BeWo and found Snail and hCG were both up-regulated, suggesting that MTA3 represses Snail and hCG gene expression in trophoblasts. Next, we cloned the CGB5 and Snail promoters into the pGL3-basic vector individually and found that silencing of MTA3 by siRNA resulted in an increase of both CGB5 and Snail promoter activities. To confirm that this MTA3 inhibition is a direct effect, we performed a chromatin immune-precipitation (ChIP) assay and found that MTA3

  18. MTA3 regulates CGB5 and Snail genes in trophoblast

    International Nuclear Information System (INIS)

    Chen, Ying; Miyazaki, Jun; Nishizawa, Haruki; Kurahashi, Hiroki; Leach, Richard; Wang, Kai

    2013-01-01

    Highlights: •Impaired MTA3, raised CGB5 and Snail expression are associated with preeclampsia. •Knock-down of MTA3 causes up-regulation of CGB5 and Snail genes in BeWo cells. •MTA3 occupies CGB5 and Snail gene promoters in BeWo cells. -- Abstract: Secreted by the placental trophoblast, human chorionic gonadotropin (hCG) is an important hormone during pregnancy and is required for the maintenance of pregnancy. Previous studies have shown that dys-regulation of hCG expression is associated with preeclampsia. However, the exact relationship between altered hCG levels and development of preeclampsia is unknown. Metastasis associated protein 3 (MTA3), a chromatin remodeling protein, is abundantly expressed in the placental trophoblasts, but its function is unknown. In breast cancer, MTA3 has been shown to repress the expression of Snail and cell migration. However, whether MTA3 acts similarly in the trophoblast has not been investigated. In the present study, we examined the role of MTA3 in regulating the hCG β-subunit gene (gene name: CGB5) and Snail expression in the trophoblast cell line, BeWo, as well as its relevance to the high hCG expression levels seen in preeclampsia. First, we investigated MTA3 expression in preeclamptic placenta as compared to normal control placenta via gene expression microarray and qRT-PCR and found that MTA3 was significantly down-regulated, whereas both CGB5 and Snail were up-regulated in preeclamptic placenta. Secondly, we knocked down MTA3 gene in trophoblast cell line BeWo and found Snail and hCG were both up-regulated, suggesting that MTA3 represses Snail and hCG gene expression in trophoblasts. Next, we cloned the CGB5 and Snail promoters into the pGL3-basic vector individually and found that silencing of MTA3 by siRNA resulted in an increase of both CGB5 and Snail promoter activities. To confirm that this MTA3 inhibition is a direct effect, we performed a chromatin immune-precipitation (ChIP) assay and found that MTA3

  19. A challenge to unqualified medical confidentiality.

    Science.gov (United States)

    Bozzo, Alexander

    2018-04-01

    Medical personnel sometimes face a seeming conflict between a duty to respect patient confidentiality and a duty to warn or protect endangered third parties. The conventional answer to dilemmas of this sort is that, in certain circumstances, medical professionals have an obligation to breach confidentiality. Kenneth Kipnis has argued, however, that the conventional wisdom on the nature of medical confidentiality is mistaken. Kipnis argues that the obligation to respect patient confidentiality is unqualified or absolute, since unqualified policies can save more lives in the long run. In this paper, I identify the form of Kipnis's argument and present a challenge to it. I conclude that, as matters stand now, a qualified confidentiality policy is the more rational choice. © Article author(s) (or their employer(s) unless otherwise stated in the text of the article) 2018. All rights reserved. No commercial use is permitted unless otherwise expressly granted.

  20. Confidentiality and personal integrity.

    Science.gov (United States)

    Edgar, A

    1994-06-01

    This paper uses the social theory of Erving Goffman in order to argue that confidentiality should be understood in relation to the mundane social skills by which individuals present and respect specific self-images of themselves and others during social interaction. The breaching of confidentiality is analysed in terms of one person's capacity to embarrass another, and so to expose that person as incompetent. Respecting confidentiality may at once serve to protect the vulnerable from an unjust society, and yet also protect the guilty from just accusation. Ethical reasoning about confidentiality must therefore recognize the dangers of prejudice and violence inherent in decisions to breach or to respect confidentiality. Case studies are used to illustrate the efficacy of this account, culminating with analyses of three examples from the UKCC document Confidentiality.

  1. In vitro cytotoxicity of white MTA, MTA Fillapex® and Portland cement on human periodontal ligament fibroblasts.

    Science.gov (United States)

    Yoshino, Patrícia; Nishiyama, Celso Kenji; Modena, Karin Cristina da Silva; Santos, Carlos Ferreira; Sipert, Carla Renata

    2013-01-01

    The aim of this study was to compare the in vitro cytotoxicity of white mineral trioxide aggregate (MTA), MTA Fillapex® and Portland cement (PC) on human cultured periodontal ligament fibroblasts. Periodontal ligament fibroblast culture was established and the cells were used for cytotoxic tests after the fourth passage. Cell density was set at 1.25 X10 4 cells/well in 96-well plates. Endodontic material extracts were prepared by placing sealer/cement specimens (5x3mm) in 1mL of culture medium for 72 h. The extracts were then serially two-fold diluted and inserted into the cell-seeded wells for 24, 48 and 72 h. MTT assay was employed for analysis of cell viability. Cell supernatants were tested for nitric oxide using the Griess reagent system. MTA presented cytotoxic effect in undiluted extracts at 24 and 72 h. MTA Fillapex® presented the highest cytotoxic levels with important cell viability reduction for pure extracts and at ½ and ¼ dilutions. In this study, PC did not induce alterations in fibroblast viability. Nitric oxide was detected in extract-treated cell supernatants and also in the extracts only, suggesting presence of nitrite in the soluble content of the tested materials. In the present study, MTA Fillapex displayed the highest cytotoxic effect on periodontal ligament fibroblasts followed by white MTA and PC.

  2. Cryogenics for the MuCool Test Area (MTA)

    International Nuclear Information System (INIS)

    Darve, Christine; Norris, Barry; Pei, Liujin

    2006-01-01

    MuCool Test Area (MTA) is a complex of buildings at Fermi National Accelerator Laboratory, which are dedicated to operate components of a cooling cell to be used for Muon Collider and Neutrino Factory R and D. The long-term goal of this facility is to test ionization cooling principles by operating a 25-liter liquid hydrogen (LH2) absorber embedded in a 5 Tesla superconducting solenoid magnet. The MTA solenoid magnet will be used with RF cavities exposed to a high intensity beam. Cryogens used at the MTA include LHe, LN2 and LH2. The latter dictates stringent system design for hazardous locations. The cryogenic plant is a modified Tevatron refrigerator based on the Claude cycle. The implementation of an in-house refrigerator system and two 300 kilowatt screw compressors is under development. The helium refrigeration capacity is 500 W at 14 K. In addition the MTA solenoid magnet will be batch-filled with LHe every 2 days using the same cryo-plant. This paper reviews cryogenic systems used to support the Muon Collider and Neutrino Factory R and D programs and emphasizes the feasibility of handling cryogenic equipment at MTA in a safe manner

  3. MTA1 regulation of ERβ pathway in salivary gland carcinoma cells

    International Nuclear Information System (INIS)

    Ohshiro, Kazufumi; Kumar, Rakesh

    2015-01-01

    Abstracts: Although Metastatic-tumor antigen 1 (MTA1) is differentially expressed in metastatic cancer and coregulates the status and activity of nuclear receptors, its role upon estrogen receptor β (ERβ) – a potent tumor suppressor, remains poorly understood. Here we investigated whether MTA1 regulates the expression and functions of ERβ, an ER isoform predominantly expressed in salivary gland cancer cells. We found that the depletion of the endogenous MTA1 in the HSG and HSY salivary duct carcinoma cell lines enhances the expression of ERβ while MTA1 overexpression augmented the expression of ERβ in salivary duct carcinoma cells. Furthermore, MTA1 knockdown inhibited the proliferations and invasion of HSG and HSY cells. The noted ERβ downregulation by MTA1 overexpression involves the process of proteasomal degradation, as a proteasome inhibitor could block it. In addition, both MTA1 knockdown and ERβ overexpression attenuated the cell migration and inhibited the ERK1/2 signaling in the both cell lines. These findings imply that MTA1 dysregulation in a subset of salivary gland cancer might promote aggressive phenotypes by compromising the tumor suppressor activity of ERβ, and hence, MTA1-ERβ axis might serve a new therapeutic target for the salivary gland cancer. - Highlights: • MTA1 silencing upregulates ERβ expression in salivary gland carcinoma cells. • MTA1 overexpression downregulates ERβ expression via proteasomal degradation. • Upregulation of ERβ expression inhibits cell migration and ERK signaling. • MTA1 knockdown inhibits cell proliferation and invasion

  4. The effect of blood and synthetic tissue fluid on the microhardness of ProRoot MTA, OrthoMTA and RetroMTA

    Directory of Open Access Journals (Sweden)

    Noushin Shokouhinejad

    2017-12-01

    Results: Exposure to blood significantly decreased the microhardness of all materials at all three points of 0.5, 2 and 3.5 mm (P<0.001. At level of 0.5 and 2 mm distant from blood, OrthoMTA showed significantly the least microhardness value; however, at the point of 3.5 mm, the microhardness of RetroMTA was higher than the two other materials (P<0.001. After exposure of samples to distilled water or PBS, no significant difference was found between the materials at any levels of 0.5, 2, and 3.5 mm (P<0.01. Conclusion: Blood exposure resulted in the decrease of microhardness of internal part of the materials.

  5. Computer Security: Printing confidentially

    CERN Document Server

    Stefan Lueders, Computer Security Team

    2015-01-01

    Have you ever hesitated to print a confidential document using CERN printers? Or perhaps you have rushed quickly to the printer after hitting the “print” button in order to avoid someone else getting hold of and reading your document? These times are over now with the new printing infrastructure!   Indeed, many of us regularly print out confidential documents like our salary slips, MARS forms, tendering documents and drafts of preliminary papers. The upcoming CERN data protection policy will require all of us to respect the confidentiality of such documents and, as the word “confidential” implies, access to “confidential” or sensitive documents will be tightly controlled. What can we do about the public printers located in many buildings, floors and shared spaces - accessible not only to CERN staff and users but also to visitors and guests? Some printers are located in the vicinity of restaurants, cafeterias or close to paths taken b...

  6. A Histologic Evaluation on Tissue Reaction to Three Implanted Materials (MTA, Root MTA and Portland Cement Type I in the Mandible of Cats

    Directory of Open Access Journals (Sweden)

    F. Sasani

    2004-09-01

    Full Text Available Statement of Problem: Nowadays Mineral Trioxide aggregate (MTA is widely used for root end fillings, pulp capping, perforation repair and other endodontic treatments.Investigations have shown similar physical and chemical properties for Portland cement and Root MTA with those described for MTA.Purpose: The aim of this in vitro study was to evaluate the tissue reaction to implanted MTA, Portland cement and Root MTA in the mandible of cats.Materials and Methods: Under asepsis condition and general anesthesia, a mucoperiosteal flap, following the application of local anesthesia, was elevated to expose mandibular symphysis. Two small holes in both sides of mandible were drilled. MTA, Portland cement and Root MTA were mixed according to the manufacturers, recommendation and placed in bony cavities. In positive control group, the test material was Zinc oxide powder plus tricresoformalin. In negative control group, the bony cavities were left untreated. After 3,6 and 12 weeks, the animals were sacrificed and the mandibular sections were prepared for histologic examination under light microscope. The presence and thickness of inflammation, presence of fibrosis capsule, the severity of fibrosis and bone formation were investigated. The data were submitted to Exact Fisher test, chi square test and Kruskal-Wallis test for statistical analysis.Results: No statistically significant differences were found in the degree of inflammation,presence of fibrotic capsule, severity of fibrosis and inflammation thickness between Root MTA, Portland cement and MTA (P>0.05. There was no statistical difference in boneformation between MTA and Portland cement (P>0.05. However, bone formation was not found in any of the Root MTA specimens and the observed tissue was exclusively of fibrosis type.Conclusion: The physical and histological results observed with MTA are similar to those of Root MTA and Portland cement. Additionally, all of these three materials are biocompatible

  7. Analysis of marginal seal of ProRoot MTA, MTA Angelus biodentine, and glass ionomer cement as root-end filling materials: An in vitro study

    Directory of Open Access Journals (Sweden)

    Sakshi Malhotra

    2015-01-01

    Conclusion: Microleakage was present in all the samples. Least amount of apical dye microleakage was seen in biodentine with mean value of 0.16 mm followed by ProRoot MTA 0.68 mm, MTA Angelus 0.74 mm, and GIC 1.53 mm. The best sealing ability was seen in biodentine, and this difference was statistically significant.

  8. 7 CFR 1221.127 - Confidential treatment.

    Science.gov (United States)

    2010-01-01

    ... statistical data collected there from, which statements do not identify the information furnished by any... 7 Agriculture 10 2010-01-01 2010-01-01 false Confidential treatment. 1221.127 Section 1221.127 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (MARKETING...

  9. 7 CFR 1160.403 - Confidential treatment.

    Science.gov (United States)

    2010-01-01

    ... statistical data collected from such sources, which statements do not identify the information furnished by... 7 Agriculture 9 2010-01-01 2009-01-01 true Confidential treatment. 1160.403 Section 1160.403 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (Marketing...

  10. 7 CFR 1250.354 - Confidential treatment.

    Science.gov (United States)

    2010-01-01

    ... subject to this subpart or statistical data collected therefrom, which statements do not identify the... 7 Agriculture 10 2010-01-01 2010-01-01 false Confidential treatment. 1250.354 Section 1250.354 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (MARKETING...

  11. 7 CFR 1216.62 - Confidential treatment.

    Science.gov (United States)

    2010-01-01

    ... this subpart or statistical data collected therefrom, which statements do not identify the information... 7 Agriculture 10 2010-01-01 2010-01-01 false Confidential treatment. 1216.62 Section 1216.62 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (MARKETING...

  12. 7 CFR 1209.62 - Confidential treatment.

    Science.gov (United States)

    2010-01-01

    ... this subpart or statistical data collected therefrom, which statements do not identify the information... 7 Agriculture 10 2010-01-01 2010-01-01 false Confidential treatment. 1209.62 Section 1209.62 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (MARKETING...

  13. 7 CFR 1215.62 - Confidential treatment.

    Science.gov (United States)

    2010-01-01

    ... persons subject to this part or statistical data collected therefrom, which statements do not identify the... 7 Agriculture 10 2010-01-01 2010-01-01 false Confidential treatment. 1215.62 Section 1215.62 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (MARKETING...

  14. 7 CFR 1280.227 - Confidentiality.

    Science.gov (United States)

    2010-01-01

    ... statistical data collected therefrom, which statements do not identify the information furnished by any person... 7 Agriculture 10 2010-01-01 2010-01-01 false Confidentiality. 1280.227 Section 1280.227 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (MARKETING...

  15. 21 CFR 821.55 - Confidentiality.

    Science.gov (United States)

    2010-04-01

    ... permission to release, the patient's name, address, telephone number, and social security number, or other... MEDICAL DEVICE TRACKING REQUIREMENTS Records and Inspections § 821.55 Confidentiality. (a) Any patient... identify patient or research subjects shall not be available for public disclosure except as provided in...

  16. A novel, highly conserved metallothionein family in basidiomycete fungi and characterization of two representative SlMTa and SlMTb genes in the ectomycorrhizal fungus Suillus luteus.

    Science.gov (United States)

    Nguyen, Hoai; Rineau, François; Vangronsveld, Jaco; Cuypers, Ann; Colpaert, Jan V; Ruytinx, Joske

    2017-07-01

    The basidiomycete Suillus luteus is an important member of the ectomycorrhizal community that thrives in heavy metal polluted soils covered with pioneer pine forests. This study aimed to identify potential heavy metal chelators in S. luteus. Two metallothionein (MT) coding genes, SlMTa and SlMTb, were identified. When heterologously expressed in yeast, both SlMTa and SlMTb can rescue the Cu sensitive mutant from Cu toxicity. In S. luteus, transcription of both SlMTa and SlMTb is induced by Cu but not Cd or Zn. Several putative Cu-sensing and metal-response elements are present in the promoter sequences. These results indicate that SlMTa and SlMTb function as Cu-thioneins. Homologs of the S. luteus MTs are present in 49 species belonging to 10 different orders of the subphylum Agaricomycotina and are remarkably conserved. The length of the proteins, number and distribution of cysteine residues indicate a novel family of fungal MTs. The ubiquitous and highly conserved features of these MTs suggest that they are important for basic cellular functions in species in the subphylum Agaricomycotina. © 2017 Society for Applied Microbiology and John Wiley & Sons Ltd.

  17. Comparison between visual assessment of MTA and hippocampal volumes in an elderly, non-demented population

    Energy Technology Data Exchange (ETDEWEB)

    Cavallin, Lena; Axelsson, Rimma [CLINTEC, Div. of Medical Imaging and Technology, Karolinska Inst., Karolinska Univ. Hospital, Stockholm (Sweden); Dept. of Radiology, Karolinska Univ. Hospital, Stockholm (Sweden)], e-mail: lena.cavallin@karolinska.se; Bronge, Lena [CLINTEC, Div. of Medical Imaging and Technology, Karolinska Inst., Karolinska Univ. Hospital, Stockholm (Sweden); Aleris Diagnostics, Stockholm (Sweden); Zhang, Yi [NVS, Novum, Karolinska Inst., Karolinska Univ. Hospital, Stockholm (Sweden); Oeksengaard, Anne-Rita [NVS, Novum, Karolinska Inst., Karolinska Univ. Hospital, Stockholm (Sweden); Ulleval Univ. Hospital and Asker and Baerum Hospital, Oslo (Norway); Wahlund, Lars-Olof [NVS, Novum, Karolinska Inst., Karolinska Univ. Hospital, Stockholm (Sweden); Swedish Brain Power, Karolinska Univ. Hospital, Stockholm (Sweden); Fratiglioni, Laura [ARC Karolinska Inst. Stockholm (Sweden)

    2012-06-15

    Background: It is important to have a replicable easy method for monitoring atrophy progression in Alzheimer's disease. Volumetric methods for calculating hippocampal volume are time-consuming and commonly used in research. Visual assessments of medial temporal lobe atrophy (vaMTA) is a rapid method for clinical use. This method has not been tested in a large non-demented population in comparison with volumetry measurements. Since hippocampal volume decreases with time even in normal aging there is also a need to study the normal age differences of medial temporal lobe atrophy. Purpose: To compare visual assessment of medial temporal lobe atrophy (vaMTA) with hippocampal volume in a healthy, non-demented elderly population. To describe normal ageing using vaMTA. Material and Methods: Non-demented individuals aged 60, 66, 72, 78, 81, 84, and {>=}87 years old were recruited from the Swedish National study on Ageing and Care in Kungsholmen (SNAC-K), Sweden. Standard magnetic resonance imaging (MRI) scans, vaMTA, and calculations of hippocampal volumes were performed in 544 subjects. Results: Significant correlation (rs = -0.32, P < 0.001, sin; and rs = -0.26, P < 0.001, dx) was found between hippocampal volume measurements and vaMTA. In normal ageing, almost 95% of {<=}66-year-olds had a medial temporal lobe atrophy (MTA) score {<=}1, with possible scores ranging from 0 to 4. Subjects aged 72, 78, and 81 years scored {<=}2, while the two oldest age groups had scores {<=}3. Conclusion: There was a highly significant correlation between volumetric measurements of the hippocampus and MTA scoring. In normal ageing, there is increasing MTA score. For non-demented elderly individuals {<=}70 years, an MTA score of 0-1 may be considered normal, compared with MTA {<=}2 for 70-80-years and MTA 3 for >80-year-old individuals.

  18. Ombuds’ corner: Confidentiality

    CERN Multimedia

    Vincent Vuillemin

    2011-01-01

    In this series, the Bulletin aims to explain the role of the Ombuds at CERN by presenting practical examples of misunderstandings that could have been resolved by the Ombuds if he had been contacted earlier. Please note that, in all the situations we present, the names are fictitious and used only to improve clarity.    Jane* came to the Ombuds to share her concerns about the actions of Mike*, one of her senior colleague supervisors, and insisted on the absolute confidentiality. The Ombuds promised to keep the information confidential following the terms of his mandate. During the discussion it appeared that the whole group was affected by the situation, spending a lot of time discussing how to resolve the problem instead of focusing on their main responsibilities. The risks for the Organization seemed very high and could possibly endanger the safety of the operations.  On one side, the Ombuds believed that it was essential to bring this matter to the attention of senior managem...

  19. Gerakan Religio-Kultural MTA Dakwah : Mobilisasi dan Tafsir-Tanding

    NARCIS (Netherlands)

    Sunarwoto,

    2012-01-01

    This article investigates the role of Majelis Tafsir Al-Qur’an (MTA), a dakwah movement operating aminly in Central Java. MTA is known as the Muslim purist movement whose mission focuses on the purification of Islam by utilizing the slogan back to the Qur’an and Sunnah. Using the social movement

  20. A comparative histologic study on furcal perforation repair with Root MTA and Pro Root MTA in fully developed teeth in dog

    Directory of Open Access Journals (Sweden)

    Rahimi S.

    2005-07-01

    Full Text Available Background and Aim: The goal of endodontics is to seal the root canal system from the orifice to apical constriction completely and tridimensionally.Hence perforations during root canal therapy, because of caries or resorptions must be sealed and obturated with ideal materials. The aim of this study was to histologically compare two kinds of mineral trioxide aggregate Root MTA and Pro Root MTA for furcal perforation repair in developed teeth in dog. Materials and Methods: In this experimental study, thirty teeth consisting of second, third and fourth mandibular premolars of five German shepherd dogs were selected. Twenty-four teeth were randomly divided into four experimental groups (6 teeth each. One pair of Root MTA and Pro Root MTA groups studied in one month and the other in three months intervals. Positive and negative control groups was each contained three teeth. In positive control group, perforations were not treated and negative control group contained intact teeth. In experimental groups perforations repaired after one week exposure to oral cavity with Root MTA or Pro Root MTA. After time intervals animals were subjected to vital perfusion and 6 m histologic sections were prepared. Inflammation and hard tissue formation were ranked by Cox criteria. Data were analysed using Mann-Whitney and Chi-Square statistical tests with P0.05. Conclusion: Mineral Trioxide Aggregate is an adequate material for furcal perforation repair in dog’s teeth. Root MTA could be a good substitute for Pro Root MTA considering the lower cost and similar characteristics.

  1. Sealing ability of grar MTA AngelusTM, CPM TM and MBPc used as apical plugs.

    Science.gov (United States)

    Orosco, Fernando Accorsi; Bramante, Clovis Monteiro; Garcia, Roberto Brandão; Bernadineli, Norberti; Moraes, Ivaldo Gomes de

    2008-01-01

    This study evaluated the sealing ability of apical plugs fabricated with gray MTA Angelus sealer, CPM TM sealer and MBPc sealer. The root canals of 98 extracted single-rooted human teeth were instrumented with #5 to #1 Gates Glidden drills according to the crown-down technique until the #1 drill could pass through the apical foramen. The specimens were then prepared with K-files, starting with an ISO 50 until an ISO 90 could be visualized 1 mm beyond the apex. After root canal preparation, the external surface of each root was rendered impermeable and roots were assigned to 3 experimental groups (n = 30), which received a 5-mm thick apical plug of gray MTA Angelus, CPM and MBPc, and two control groups (n=4). The remaining portion of the canal in the experimental groups was filled by the lateral condensation technique. The teeth of each group, properly identified, were fixed on utility wax by their crowns and were placed in plastic flasks, leaving the apex free and facing upward. The flasks were filled with 0.2% Rhodamine B solution, pH 7.0, so as to completely cover the root apex of all teeth. The sealing ability was analyzed by measuring 0.2% Rhodamine B leakage after all groups had been maintained in this solution for 48 hours. Data were analyzed statistically by Kruskal-Wallis test and Dunn test with a=5%. The results showed that, among the tested materials used for fabrication of apical plugs, MBPc sealer had the least amount of leakage with statistically significant difference (p<0.05).

  2. Sealing ability of grar MTA AngelusTM, CPM TM and MBPc used as apical plugs

    Directory of Open Access Journals (Sweden)

    Fernando Accorsi Orosco

    2008-02-01

    Full Text Available This study evaluated the sealing ability of apical plugs fabricated with gray MTA AngelusTM sealer, CPM TM sealer and MBPc sealer. The root canals of 98 extracted single-rooted human teeth were instrumented with #5 to #1 Gates Glidden drills according to the crown-down technique until the #1 drill could pass through the apical foramen. The specimens were then prepared with K-files, starting with an ISO 50 until an ISO 90 could be visualized 1 mm beyond the apex. After root canal preparation, the external surface of each root was rendered impermeable and roots were assigned to 3 experimental groups (n = 30, which received a 5-mm thick apical plug of gray MTA AngelusTM, CPM TM and MBPc, and two control groups (n=4. The remaining portion of the canal in the experimental groups was filled by the lateral condensation technique. The teeth of each group, properly identified, were fixed on utility wax by their crowns and were placed in plastic flasks, leaving the apex free and facing upward. The flasks were filled with 0.2% Rhodamine B solution, pH 7.0, so as to completely cover the root apex of all teeth. The sealing ability was analyzed by measuring 0.2% Rhodamine B leakage after all groups had been maintained in this solution for 48 hours. Data were analyzed statistically by Kruskal-Wallis test and Dunn test with a=5%. The results showed that, among the tested materials used for fabrication of apical plugs, MBPc sealer had the least amount of leakage with statistically significant difference (p<0.05.

  3. The effect of MTA application on the affected dentine remineralization after partial caries excavation (in vivo)

    Science.gov (United States)

    Pratiwi, A. R.; Meidyawati, R.; Djauharie, N.

    2017-08-01

    On deep carious lesions, only thin dentine remains, causing a high risk of pulp exposure during the removal of all infected dentine. A minimally invasive technique is required, such as a partial caries excavation method in the infected dentine tissue and the use of bioactive material that can promote (Mineral Trioxide Aggregate) MTA remineralization. To compare the remineralization of deep carious lesion-affected dentine with the removal of some and all the infected dentine after the application of MTA. Subjects were divided into two groups: group I had only some parts of the infected dentine removed before MTA application, while group II had all the infected dentine removed before MTA application. Each group was measured on the pixel grey value before the treatment and again four weeks after the MTA application, and then the results were compared. Furthermore, the enhancement of both groups’ grey values were compared. Remineralization occurred in both groups after the MTA application. There was no significant difference in the remineralization level of the affected dentine in both groups I and II four weeks after the MTA application. Remineralization occurred in the affected dentine in both groups, either by removing only some parts or all the infected dentine in the deep carious lesion.

  4. Presence of arsenic in different types of MTA and white and gray Portland cement.

    Science.gov (United States)

    Monteiro Bramante, Clóvis; Demarchi, Ana Claudia Cardoso Oliveira; de Moraes, Ivaldo Gomes; Bernadineli, Norberti; Garcia, Roberto Brandão; Spångberg, Lars S W; Duarte, Marco Antonio Hungaro

    2008-12-01

    The presence of arsenic in various types of mineral trioxide aggregate (MTA) and Portland cements were evaluated to verify if they comply with the ISO-recommended limit for water-based cements of 2 mg arsenic/kg material. An amount of 5 mL of hydrochloric acid was added to 2 g each of MTA and Portland cement to be analyzed. After 15 minutes, the material was filtered and the volume of supernatant was diluted with reagent-grade water up to 40 mL. Atomic absorption spectrophotometry readings were performed in triplicate. The following mean values were obtained: CPM (Egeo, Buenos Aires, Argentina) 11.06 mg/kg; CPM sealer (Egeo) 10.30 mg/kg; MTA-Obtura (Angelus, Londrina, PR, Brazil) 0.39 mg/kg; Experimental MTA: 10.30 mg/kg; White MTA-Angelus (Angelus) 1.03 mg/kg; Gray MTA-Angelus (Angelus) 5.91 mg/kg; ProRoot-MTA (Dentsply/Tulsa Dental Specialties, Tulsa, OK) 5.25 mg/kg; Gray Portland cement (Votorantim Cimentos, Cubatão, SP, Brazil): 34.27 mg/kg; and White Portland cement (Cimento Rio Branco, Rio de Janeiro, RJ, Brazil) 0.52 mg/kg. All tested materials presented arsenic in their composition. The form of arsenic was not analyzed nor the toxicity of the arsenic found. Only MTA-Obtura, White MTA-Angelus, and White Portland cement presented arsenic levels below the limit set in the ISO 9917-1 standard.

  5. Confidential Business Information under TSCA

    Science.gov (United States)

    This website informs businesses, policymakers, and the public about the confidential business information (CBI) provisions of § 14 of the Toxic Substances Control Act (TSCA), as amended by the Frank R. Lautenberg Chemical Safety for the 21st Century Act.

  6. Portland cement versus MTA as a root-end filling material. A pilot study.

    Science.gov (United States)

    da Silva, Sérgio Ribeiro; da Silva Neto, José Dias; Veiga, Daniela Francescato; Schnaider, Taylor Brandão; Ferreira, Lydia Masako

    2015-02-01

    To assess periradicular lesions clinically and by computed tomography (CT) after endodontic surgery using either Portland cement or mineral trioxide aggregate (MTA) as a root-end filling material. Three patients diagnosed with periradicular lesions by cone-beam CT underwent endodontic surgery with root-end filling. Patient A was treated with MTA as the root-end filling material, patient B was treated with Portland cement and patient C had two teeth treated, one with MTA and the other with Portland cement. Six months after surgery, the patients were assessed clinically and by CT scan and the obtained results were compared. Periradicular tissue regeneration was observed in all cases, with no significant differences in bone formation when comparing the use of MTA and Portland cement as root-end filling materials. Both mineral trioxide aggregate and Portland cement were successful in the treatment of periradicular lesions.

  7. The Qualitative Interview Study of Persistent and Nonpersistent Substance Use in the MTA: Sample Characteristics, Frequent Use, and Reasons for Use.

    Science.gov (United States)

    Swanson, James M; Wigal, Timothy; Jensen, Peter S; Mitchell, John T; Weisner, Thomas S; Murray, Desiree; Arnold, L Eugene; Hechtman, Lily; Molina, Brooke S G; Owens, Elizabeth B; Hinshaw, Stephen P; Belendiuk, Katherine; Howard, Andrea; Wigal, Sharon B; Sorensen, Page; Stehli, Annamarie

    2017-10-01

    To evaluate participants' perceptions about frequent use and reasons for substance use (SU) in the qualitative interview study, an add-on to the multimodal treatment study of ADHD (MTA). Using the longitudinal MTA database, 39 ADHD cases and 19 peers with Persistent SU, and 86 ADHD cases and 39 peers without Persistent SU were identified and recruited. In adulthood, an open-ended interview was administered, and SU excerpts were indexed and classified to create subtopics (frequent use and reasons for use of alcohol, marijuana, and other drugs). For marijuana, the Persistent compared with Nonpersistent SU group had a significantly higher percentage of participants describing frequent use and giving reasons for use, and the ADHD group compared with the group of peers had a significantly higher percentage giving "stability" as a reason for use. Motivations for persistent marijuana use may differ for adults with and without a history of ADHD.

  8. MTA and calcium hydroxide for pulp capping MTA e hidróxido de cálcio para proteção pulpar direta

    Directory of Open Access Journals (Sweden)

    Alexandra Mussolino de Queiroz

    2005-06-01

    Full Text Available This study evaluated the biocompatibility of mineral trioxide aggregate (MTA after direct capping of exposed pulp tissue in dog's teeth. Class I cavities were prepared in 26 teeth from 3 adult dogs. MTA was applied over the exposed pulp in 13 teeth and paste of calcium hydroxide plus distilled water (control was applied in the remaining 13 teeth. After 90 days, the animals were killed; the maxilla and mandible were dissected and sectioned to obtain individual roots. The samples were processed histologically. The pulp and periapical response observed with the use of MTA was similar to that of calcium hydroxide paste. In all specimens, there was a dentin bridge obliterating the exposure, an intact odontoblastic layer, no inflammatory cells, normal connective pulp tissue, normal apical and periapical regions and no bone tissue changes. Similar to calcium hydroxide, MTA presented excellent response when used for direct pulp capping.O objetivo deste trabalho foi avaliar a biocompatibilidade do agregado de trióxido mineral (MTA, após proteção pulpar direta em dentes de cães. Foram preparadas cavidades de Classe I, em 26 dentes de 3 cães adultos. O MTA foi aplicado sobre 13 dentes e a pasta de hidróxido de cálcio (grupo controle foi aplicada sobre os 13 dentes remanescentes. Após 90 dias, os animais foram mortos, a maxila e a mandíbula foram dissecadas e os dentes foram seccionados para obtenção de raízes individualizadas. Os espécimes foram processados histologicamente. A resposta do tecido pulpar e periapical foi semelhante para o MTA e o hidróxido de cálcio. Em todos os espécimes havia ponte de dentina obliterando o local da exposição pulpar, camada odontoblástica íntegra, ausência de células inflamatórias, tecido pulpar normal, e ausência de alterações na região periapical e óssea. Da mesma maneira que o hidróxido de cálcio, o MTA apresentou excelente biocompatibilidade quando usado para proteção pulpar direta.

  9. Interaction of dental pulp stem cells with Biodentine and MTA after exposure to different environments

    Directory of Open Access Journals (Sweden)

    Anastasia Agrafioti

    Full Text Available ABSTRACT Objective: The aim of the present study was to evaluate and compare the cytotoxic effects of Biodentine and MTA on dental pulp stem cells (DPSCs and to assess cell viability and adherence after material exposure to an acidic environment. Material and Methods: DPSCs were cultured either alone or in contact with either: Biodentine; MTA set for 1 hour; or MTA set for 24 hours. After 4 and 7 days, cell viability was measured using the MTT assay. Biodentine and MTA were also prepared and packed into standardized bovine dentin disks and divided into three groups according to the storage media (n=6/group: freshly mixed materials without storage medium (Group A; materials stored in saline (Group B; materials stored in citric acid buffered at pH 5.4 (Group C. After 24 hours, DPSCs were introduced in the wells and cell adherence, viability, and cellular morphology were observed via confocal microscopy after three days of culture. Cell viability was analyzed using repeated-measures analysis of variance test with Tukey's post hoc tests (α=0.05. Results: Biodentine expressed significantly higher cell viability compared with all other groups after 4 days, with no differences after 7 days. Notably, cell viability was significantly greater in 24-hour set MTA compared with 1-hour set MTA and control groups after 7 days. Material exposure to an acidic environment showed an increase in cell adherence and viability in both groups. Conclusions: Biodentine induced a significantly accelerated cell proliferation compared with MTA. Setting of these materials in the presence of citric acid enhanced DPSC viability and adherence.

  10. Confidentiality and integrity in crowdsourcing systems

    CERN Document Server

    Ranj Bar, Amin

    2014-01-01

    Confidentiality and Integrity in Crowdsourcing Systems focuses on identity, privacy, and security related issues in crowdsourcing systems and in particular the confidentiality and integrity of online data created via crowdsourcing. This book begins with an introduction to crowdsourcing and then covers the privacy and security challenges of Confidentiality. The book examines integrity in these systems and the management and control of crowdsourcing systems.

  11. Characterization of un-hydrated and hydrated BioAggregate™ and MTA Angelus™.

    Science.gov (United States)

    Camilleri, J; Sorrentino, F; Damidot, D

    2015-04-01

    BioAggregate™ is a novel material introduced for use as a root-end filling material. It is tricalcium silicate-based, free of aluminium and uses tantalum oxide as radiopacifier. BioAggregate contains additives to enhance the material performance. The purpose of this research was to characterize the un-hydrated and hydrated forms of BioAggregate using a combination of techniques, verify whether the additives if present affect the properties of the set material and compare these properties to those of MTA Angelus™. Un-hydrated and hydrated BioAggregate and MTA Angelus were assessed. Un-hydrated cement was tested for chemical composition, specific surface area, mineralogy and kinetics of hydration. The set material was investigated for mineralogy, microstructure and bioactivity. Scanning electron microscopy, X-ray energy dispersive spectroscopic analysis, X-ray fluorescence spectroscopy, X-ray diffraction and isothermal calorimetry were employed. The specific surface area was investigated using a gas adsorption method with nitrogen as the probe. BioAggregate was composed of tricalcium silicate, tantalum oxide, calcium phosphate and silicon dioxide and was free of aluminium. On hydration, the tricalcium silicate produced calcium silicate hydrate and calcium hydroxide. The former was deposited around the cement grains, while the latter reacted with the silicon dioxide to form additional calcium silicate hydrate. This resulted in reduction of calcium hydroxide in the aged cement. MTA Angelus reacted in a similar fashion; however, since it contained no additives, the calcium hydroxide was still present in the aged cement. Bioactivity was demonstrated by deposition of hydroxyapatite. BioAggregate exhibited a high specific surface area. Nevertheless, the reactivity determined by isothermal calorimetry appeared to be slow compared to MTA Angelus. The tantalum oxide as opposed to bismuth oxide was inert, and tantalum was not leached in solution. BioAggregate exhibited

  12. Sealing ability of mineral trioxide aggregate (MTA) combined with distilled water, chlorhexidine, and doxycycline.

    Science.gov (United States)

    Arruda, Roberta A A; Cunha, Rodrigo S; Miguita, Kenner B; Silveira, Cláudia F M; De Martin, Alexandre S; Pinheiro, Sérgio L; Rocha, Daniel G P; Bueno, Carlos E S

    2012-09-01

    The aim of this study was to evaluate the sealing ability of mineral trioxide aggregate (MTA Bio) combined with different mixing agents (distilled water, chlorhexidine, doxycycline), used as an apical root-end filling material. Forty-two extracted human teeth were divided into three groups (n = 12); six teeth were used as controls. Root-ends were resected at 90 degrees, 3 mm from the apex. Root-end cavities were prepared using ultrasonic tips and filled with MTA Bio plus distilled water, 2% chlorhexidine solution, or 10% doxycycline solution. Apical sealing was assessed by microleakage of 50% silver nitrate solution. Roots were longitudinally sectioned in a buccolingual plane and analyzed using an operating microscope (20× magnification). Depth of dye leakage into the dentinal walls was measured in millimeters. Results were analyzed using ANOVA and Tukey's test (P = 0.05). MTA Bio plus distilled water showed significantly higher mean leakage results (1.06 mm) when compared with MTA Bio plus doxycycline (0.61 mm), and higher, although not significant, results when compared with MTA Bio plus chlorhexidine (0.79 mm). In conclusion, replacing distilled water with two biologically active mixing agents (doxycycline and chlorhexidine) did not alter the sealing properties of MTABio. The antimicrobial properties of these combinations should be further investigated.

  13. Clinical Survey of Successfulness of DPC with MTA and Calcium Hydroxide

    Directory of Open Access Journals (Sweden)

    E.Yasini

    2005-02-01

    Full Text Available Statement of Problem: The pulp may be exposed during remove of caries or by traumatic and iatrogenicinjuries. The material used to DPC, must be biocompatible, scalable and prevent bacterial leakage.Furthermore, it is better to stimulate dentinogenesis. Calcium hydroxide is most usual material for DPC. But itcannot provide a suitablcbiologic seal. Mineral irioxide aggregate (MTA is also a suitable material for DPC.Purpose: The aim of this study was to compare the clinical success of DPC done with MTA or calciumhydroxide cement.Materials and Methods: In this study eighteen posterior teeth without previous spontaneous pain thatinvolved mechanicaly exposure was randomly selected and capped with MTA or calcium hydroxide. These teeth were evaluated by clinical vitality test and radiograph after 3 and 12 months, and patients werequestioned about irritative or spontancus pain in this period. Statistical analysis was carried out by Usher exacttest (a-0.05.Results: This study showed that in calcium hydroxid groud three had irreversible pulpitis and two teeth had symptom and signs of reversible pulpitis. While, In MTA group all cases were normaL and no clinical sign was evident.Conclusion: MTA exhibited better results than calcium hydroxide cement for the capping of the pulp in human

  14. Comparative study of physico-chemical properties of MTA-based and Portland cements.

    Science.gov (United States)

    Borges, Alvaro H; Pedro, Fábio L M; Miranda, Carlos E S; Semenoff-Segundo, Alex; Pécora, Jesus D; Filho, Antônio M Cruz

    2010-01-01

    The purpose of this investigation was to evaluate the physicochemical properties of gray and white structural and nonstructural Portland cement, gray and white ProRoot MTA and MTA BIO. The water/powder ratio, setting time, solubility and pH (hydrogen-ion potential) changes of the materials were evaluated. Tests followed specification #57 from the American National Standard Institute/American Dental Association (2000) for endodontic sealing materials and pH was determined by a digital pH meter. The test results were statistically analyzed by variance analyses for global comparison and by the complementary Tukey's test for pairwise comparisons (5%). Considering the water/powder ratio, no significant difference (p > 0.05) was observed among the cements. MTA BIO (33.10 +/- 2.30) had the lowest setting time (p Portland cement (2.55 +/- 0.08) had the highest solubility (p 0.05) was observed among materials when considering pH evaluation. The pH levels were highly alkaline immediately after immersion in solution, remaining stable throughout the test period. The authors conclude that the cements had similar water/powder proportions. MTA BIO had the shortest setting time and gray ProRoot MTA had the lowest solubility. All cements had similar behavior in the pH analysis.

  15. Pulpotomy of human primary molars with MTA and Portland cement: a randomised controlled trial.

    Science.gov (United States)

    Sakai, Vivien Thiemy; Moretti, A B S; Oliveira, T M; Fornetti, A P C; Santos, C F; Machado, M A A M; Abdo, R C C

    2009-08-08

    This study compared the clinical and radiographic effectiveness of mineral trioxide aggregate (MTA) and Portland cement (PC) as pulp dressing agents in carious primary teeth. Thirty carious primary mandibular molars of children aged 5-9 years old were randomly assigned to MTA or PC groups, and treated by a conventional pulpotomy technique. The teeth were restored with resin modified glass ionomer cement. Clinical and radiographic successes and failures were recorded at 6, 12, 18 and 24-month follow-up. All pulpotomised teeth were clinically and radiographically successful at all follow-up appointments. Six out of 15 teeth in the PC group and five out of 14 teeth in the MTA group exfoliated throughout the follow-up period. No statistically significant difference regarding dentine bridge formation was found between both groups throughout the follow-up period. As far as pulp canal obliteration is concerned, a statistically significant difference was detected at 6-month follow-up (p <0.05), since the beginning of mineralised material deposition could be radiographically detected in 100% and 57.14% of the teeth treated with PC and MTA, respectively. PC may serve as an effective and less expensive MTA substitute in primary molar pulpotomies. Further studies and longer follow-up assessments are needed.

  16. 75 FR 78238 - Access to Confidential Business Information by Science Applications International Corporation and...

    Science.gov (United States)

    2010-12-15

    ... Business Information by Science Applications International Corporation and Its Identified Subcontractors..., Science Applications International Corporation (SAIC) of San Diego, CA, and Its Identified Subcontractors... Control Act (TSCA). Some of the information may be claimed or determined to be Confidential Business...

  17. Composition and microstructure of MTA and Aureoseal Plus: XRF, EDS, XRD and FESEM evaluation.

    Science.gov (United States)

    Cianconi, L; Palopoli, P; Campanella, V; Mancini, M

    2016-12-01

    The aim of this study was to determine the chemical composition and the phases' microstructure of Aureoseal Plus (OGNA, Italy) and ProRoot MTA (Dentsply Tulsa Dental, USA) and to compare their characteristics. Study Design: Comparing Aureoseal Plus and ProRoot MTA microstructure by means of several analyses type. The chemical analysis of the two cements was assessed following the UNI EN ISO 196-2 norm. X-Ray fluorescence (XRF) was used to determine the element composition. The crystalline structure was analysed quantitatively using x-ray diffraction (XRD). Powders morphology was evaluated using a scanning electron microscope (SEM) with backscattering detectors, and a field emission scanning electron microscope (FESEM). Elemental analysis was performed by energy dispersive x-ray analysis (EDS). The semi-quantitative XRF analysis showed the presence of heavy metal oxides in both cements. The XRD spectra of the two cements reported the presence of dicalcium silicate, tricalcium silicate, tricalcium aluminate, tetracalcium aluminoferrite, bismuth oxide and gypsum. SEM analysis showed that ProRoot MTA powder is less coarse and more homogeneous than Aureoseal. Both powders are formed by particles of different shapes: round, prismatic and oblong. The EDS analysis showed that some ProRoot MTA particles, differently from Aureoseal, contain Ca, Si, Al and Fe. Oblong particles in ProRoot and Aureoseal are rich of bismuth. The strong interest in developing new Portland cement-based endodontic sealers will create materials with increased handling characteristics and physicochemical properties. A thorough investigation on two cement powders was carried out by using XRF, XRD, SEM and EDS analysis. To date there was a lack of studies on Aureoseal Plus. This cement is similar in composition to ProRoot MTA. Despite that it has distinctive elements that could improve its characteristics, resulting in a good alternative to MTA.

  18. Histological and histomorphometrical evaluation of furcation perforations filled with MTA, CPM and ZOE.

    Science.gov (United States)

    da Silva, G F; Guerreiro-Tanomaru, J M; Sasso-Cerri, E; Tanomaru-Filho, M; Cerri, P S

    2011-02-01

    To evaluate the biological response of the periodontium adjacent to furcation perforations in rat molars filled with Endo-CPM-Sealer (CPM), MTA-Angelus (MTA) or zinc oxide-eugenol cement (ZOE). The pulp chamber floors of maxillary right first molar teeth were perforated and sealed with CPM, mineral trioxide aggregate (MTA) or ZOE; the left first molars, without any treatment, were used as controls (CG). After 7, 15, 30 and 60 days, fragments of maxilla were fixed, decalcified and embedded in paraffin. Sections were stained with H&E, Masson's trichrome and submitted to tartrate-resistant acid phosphatase (TRAP) reaction, used as an osteoclast marker. The width of the periodontal space, the numerical density of inflammatory cells and the number of TRAP-positive osteoclasts in the bone surface were measured, and statistical analyses were performed using analysis of variance and Tukey test (P ≤ 0.05). In all experimental groups, the greatest number of inflammatory cells was observed at 7 days, especially in the ZOE group. In this group, the intense inflammatory process was related to a significant increase (P ≤ 0.05) in the number of osteoclasts and, thereby, in an increase in the width of the periodontal space. At 60 days, no significant differences in osteoclast numbers amongst CPM, MTA and CG groups occurred; the periodontal space was also significantly reduced in the experimental groups in comparison with the initial periods. However, in the ZOE group, the periodontal space was significantly larger (P ≤ 0.05) in comparison with MTA-based materials. The periodontium adjacent to perforations filled with MTA and CPM exhibited clear evidence of re-establishment and thus better biocompatibility than ZOE. © 2010 International Endodontic Journal.

  19. Orthograde retreatment failure with extruded MTA apical plug in a large periradicular lesion followed by surgical intervention: case report.

    Science.gov (United States)

    Brito-Junior, Manoel; Faria-e-Silva, Andre Luis; Quintino, Alex Carvalho; Moreira-Junior, Gil; Geber, Mauro; Camilo, Carla Cristina; Soares, Janir Alves

    2012-01-01

    Absence of periapical healing after orthograde retreatment using an apical plug with mineral trioxide aggregate (MTA) can require surgical intervention. A patient with a root-filled maxillary central incisor with chronic apical periodontitis and sinus tract was referred for endodontic retreatment. Excessive apical enlargement was verified, indicating an MTA apical plug placement; however, an unintentional extrusion of MTA occurred during this step. The root canal was filled with gutta-percha and sealer, and periodic recalls were scheduled. The sinus tract was observed after six months and the lesion remained unaltered, although the extruded MTA had resorbed; therefore, an apicoectomy and retrograde root-end filling with MTA were performed. Absence of sinus tract, normal clinical aspect, and complete repair of the lesion were observed at the two-year follow-up.

  20. Comparison between visual assessment of MTA and hippocampal volumes in an elderly, non-demented population

    International Nuclear Information System (INIS)

    Cavallin, Lena; Axelsson, Rimma; Bronge, Lena; Zhang, Yi; Oeksengaard, Anne-Rita; Wahlund, Lars-Olof; Fratiglioni, Laura

    2012-01-01

    Background: It is important to have a replicable easy method for monitoring atrophy progression in Alzheimer's disease. Volumetric methods for calculating hippocampal volume are time-consuming and commonly used in research. Visual assessments of medial temporal lobe atrophy (vaMTA) is a rapid method for clinical use. This method has not been tested in a large non-demented population in comparison with volumetry measurements. Since hippocampal volume decreases with time even in normal aging there is also a need to study the normal age differences of medial temporal lobe atrophy. Purpose: To compare visual assessment of medial temporal lobe atrophy (vaMTA) with hippocampal volume in a healthy, non-demented elderly population. To describe normal ageing using vaMTA. Material and Methods: Non-demented individuals aged 60, 66, 72, 78, 81, 84, and ≥87 years old were recruited from the Swedish National study on Ageing and Care in Kungsholmen (SNAC-K), Sweden. Standard magnetic resonance imaging (MRI) scans, vaMTA, and calculations of hippocampal volumes were performed in 544 subjects. Results: Significant correlation (rs = -0.32, P 80-year-old individuals

  1. Effect of MTA and Portland Cement on Fracture Resistance of Dentin

    Directory of Open Access Journals (Sweden)

    Maryam Forghani

    2013-06-01

    Full Text Available Background and aims. It is important to evaluate the effects of endodontic materials on tooth structures to avoid endodontic treatment failure. The aim of the present study was to investigate the effect of mineral trioxide aggregates (MTA and Portland cement (PC on fracture resistance of dentin. Materials and methods. Thirty-six freshly extracted human single-rooted premolar teeth were selected. The crowns were removed and the roots were randomly divided into two experimental groups and one control group. The root samples were longitudinally divided into two halves and a dentin bar (2×2×10 mm was cut from each root section for short-term (2 weeks and long-term (12 weeks evaluations. The root sections in the experimental groups were exposed to MTA or PC, while keeping the control group specimens in physiologic saline. The fracture resistance of each specimen was measured using an Instron testing machine. The results were statistically analyzed using ANOVA, a post hoc Tukey test and paired ttest at 5% significance level. Results. The fracture resistance of MTA-treated specimens significantly increased between 2 and 12 weeks (P0.05. Conclusion. The results showed that MTA increased the fracture resistance of root dentin, while PC had no significant effect on dentin fracture resistance.

  2. [An 18 month evaluation of MM-MTA pulpotomy on primary decayed molars].

    Science.gov (United States)

    Abou Chedid, J C; Mchayleh, N; Khalil, I; Melki, B; Hardan, L S

    2015-12-01

    Pulpotomy is the most performed and controversial therapeutic in pediatric dentistry. Formocresol is known to have a toxic effect on living tissues, a mutagenic and carcinogenic potential with a systemic uptake of formocresol via pulpotomized teeth, other alternative products have been investigated. 40 molars were pulpotomized using Micro Mega Mineral Trioxide Aggregate (MM-MTA), which eliminates the need for the use of formocresol. The effects of this material were evaluated both clinically and radiographically. Post-operative control examinations were performed at 1, 6, 12, and 18 months trying to detect spontaneous or stimulated pain, pathological tooth mobility, abscesses or fistulas, internal or external pathological tooth resorption, periapical bone destruction, or canal obliteration. Pain was absent at 18 months post operatively. Thirty six molar treated with the MM-MTA didn't show any mobility or pain, one molar presented a pathological resorption and one molar presented an abscess without a fistula at 12 month. The observations were compared to others related to formocresol, ferric sulfate, MTA, and laser pulpotomies, using the Chi-square test x2. The abundance of positive result strongly demonstrate that the MM-MTA pulpotomy on carious temporary molars is a promising technique.

  3. Radiopacity evaluation of Portland and MTA-based cements by digital radiographic system.

    Science.gov (United States)

    Borges, Alvaro Henrique; Pedro, Fabio Luiz Miranda; Semanoff-Segundo, Alex; Miranda, Carlos Eduardo Saraiva; Pécora, Jesus Djalma; Cruz Filho, Antônio Miranda

    2011-01-01

    The aim of the present study was to evaluate the radiopacity of Portland and MTA-based cements using the Digora TM digital radiographic system. The performed tests followed specification number 57 from the American National Standard Institute/American Dental Association (2000) for endodontic sealing materials. The materials were placed in 5 acrylic plates, especially designed for this experiment, along with a graduated aluminum stepwedge varying from 1 to 10 mm in thickness. The set was radiographed at a 30 cm focus-object distance and with 0.2 s exposure time. After the radiographs were taken, the optical laser readings of radiographs were performed by Digora TM system. Five radiographic density readings were performed for each studied material and for each step of the aluminum scale. White ProRoot MTA (155.99±8.04), gray ProRoot MTA (155.96±16.30) and MTA BIO (143.13±16.94) presented higher radiopacity values (pPortland (119.76±22.34), gray Portland (109.71±4.90) and white structural Portland (99.59±12.88) presented lower radiopacity values (pcements were the only materials presenting radiopacity within the ANSI/ADA specifications.

  4. Rat subcutaneous tissue response to MTA Fillapex® and Portland cement.

    Science.gov (United States)

    Marques, Nádia Carolina Teixeira; Lourenço Neto, Natalino; Fernandes, Ana Paula; Rodini, Camila de Oliveira; Duarte, Marco Antônio Hungaro; Oliveira, Thais Marchini

    2013-01-01

    The aim of this study was to evaluate the response of rat subcutaneous tissue to MTA Fillapex® (Angelus), an experimental root canal filling material based on Portland cement and propylene glycol (PCPG), and a zinc oxide, eugenol and iodoform (ZOEI) paste. These materials were placed in polyethylene tubes and implanted into the dorsal connective tissue of Wistar rats for 7 and 15 days. The specimens were stained with hematoxylin and eosin, and evaluated regarding inflammatory reaction parameters by optical microscopy. The intensity of inflammatory response against the sealers was analyzed by two blinded and previously calibrated examiners for all experimental periods (kappa=0.96). The histological evaluation showed that all materials caused a moderate inflammatory reaction at 7 days, which subsided with time. A greater inflammatory reaction was observed at 7 days in the tubes filled with ZOEI paste. Tubes filled with MTA Fillapex presented some giant cells, macrophages and lymphocytes after 7 days. At 15 days, the presence of fibroblasts and collagen fibers was observed indicating normal tissue healing. The tubes filled with PCPG showed similar results to those observed in MTA Fillapex. At 15 days, the inflammatory reaction was almost absent at the tissue, with several collagen fibers indicating normal tissue healing. Data were analyzed by the nonparametric Kruskal-Wallis test (α=0.05). Statistically significant difference (p0.05). MTA Fillapex and Portland cement added with propylene glycol had greater tissue compatibility than the PCPG paste.

  5. Physicochemical Properties of MTA and Portland Cement after Addition of Aloe Vera.

    Science.gov (United States)

    Henrique Borges, Alvaro; Aguirre Guedes, Orlando; Evaristo Ricci Volpato, Luiz; Siebert Filho, Gilberto; Meireles Borba, Alexandre; Zina, Omar; Piva, Evandro; Estrela, Carlos

    2017-01-01

    The aim of this in vitro study was to determine the liquid-powder ratio, setting time, solubility, dimensional change, pH, and radiopacity of white structural and non-structural Portland cement, ProRoot MTA and MTA Bio, associated with a 2% glycolic solution containing Aloe Vera, as vehicle. Five samples of each material were used for each test, according to the American National Standards Institute/American Dental Association (ANSI/ADA) specification No. 57. Statistical analyses were performed using ANOVA and Tukey's test at 5% significance. When sample distribution was not normal, non-parametric analysis of variance and the Kruskal-Wallis test were used ( α =0.05). No statistical differences were found in liquid-powder ratios among the tested materials. ProRoot MTA showed the longest setting time. Dimensional change values were acceptable in all groups. Also, no significant differences were found in pH values and pH was alkaline in all samples throughout the experiment. Mean radiopacity results obtained for white Portland cements did not meet ANSI/ADA requirements, and were significantly lower than those obtained for MTA-based cements. Finally, Portland cements showed significantly higher mean solubility values compared to the other samples. The physicochemical properties of the tested materials in association with Aloe Vera were compatible with ANSI/ADA requirements, except for the white Portland cements, which failed to meet the radiopacity specification.

  6. Analysis of metal contents in Portland Type V and MTA-based cements.

    Science.gov (United States)

    Dorileo, Maura Cristiane Gonçales Orçati; Bandeca, Matheus Coelho; Pedro, Fábio Luis Miranda; Volpato, Luiz Evaristo Ricci; Guedes, Orlando Aguirre; Dalla Villa, Ricardo; Tonetto, Mateus Rodrigues; Borges, Alvaro Henrique

    2014-01-01

    The aim of this study was to determine, by Atomic Absorption Spectrometry (AAS), the concentration levels of 11 metals in Type V gray and structural white PC, ProRoot MTA, and MTA Bio. Samples, containing one gram of each tested cement, were prepared and transferred to a 100 mL Teflon tube with a mixture of 7.0 mL of nitric acid and 21 mL of hydrochloric acid. After the reaction, the mixture was filtered and then volumed to 50 mL of distilled water. For each metal, specific patterns were determined from universal standards. Arsenic quantification was performed by hydride generator. The analysis was performed five times and the data were statistically analyzed at 5% level of significance. Only the cadmium presented concentration levels of values lower than the quantification limit of the device. The AAS analysis showed increased levels of calcium, nickel, and zinc in structural white PC. Type V PC presented the greatest concentration levels of arsenic, chromium, copper, iron, lead, and manganese (P cements, and the lowest concentration levels were observed in Portland cements, while the highest were observed in ProRoot MTA. Both PC and MTA-based cements showed evidence of metals inclusion.

  7. Confidentiality and the employee assistance program professional.

    Science.gov (United States)

    Mistretta, E F; Inlow, L B

    1991-02-01

    During the last two decades EAPs have offered employees confidential assessment, counseling, and referral. Many occupational health nurses have taken on the role of EAP professional or function as the liaison between the EAP counselor and the employee. The occupational health nurse involved in any EAP issue must adhere to the standards of confidentiality. The federal and state laws, company policy, and professional codes of ethics regarding these clients must be clearly understood, especially related to the issue of confidentiality.

  8. Histologic evaluation of pulpal response to MTA and capsaicin in cats

    Directory of Open Access Journals (Sweden)

    Zahrasadat Madani

    2012-09-01

    Full Text Available Introduction: In direct pup capping, the exposed pulp is directly capped with a capping material to provoke a dentinal bridge formation to seal the exposed area.The aim of this study was to evaluate the pulpal response to MTA and capsaicin in cats. Methods: The sample for this experimental study consisted of 24 canines of cats, weighed approximately 3-4kg. After sedation, the teeth were cut and exposed at 3mm above cementoenamel junction, then divided into two groups: 1 direct pulp capping with MTA 2 direct pulp capping with Capsaicin. The cavities were filled with glass ionomer cement (Fuji IX. The cats were sacrificed in the first, second, and fourth weeks 4 canine teeth were extracted for the purpose of histologic analysis. 6Serial sections were cut parallel to the longitudinal axis of the canines. The sections were stained with hematoxylin & eosin, and were observed and analyzed using a light microscope. Results: In both groups treated with MTA and capsaicin, the inflammation decreased during weeks1, 2, and 4. Less inflammation was seen in MTA group but there was no statistical difference between the two groups (p=0.22. In the group treated with capsaicin, necrosis was observed in every 12 samples, but in the other group treated with MTA, only 1 pulp necrosis was seen in the first week (p=0.000. There was no significant difference in dentinal barrier formation, inflammatory response, and soft tissue changes between the two groups. Conclusions: The results of this study showed that capsaicin can decrease the severity of inflammation, but it is ineffective in dentinal barrier formation.

  9. Psychotic Symptoms in Attention-Deficit/Hyperactivity Disorder: An Analysis of the MTA Database.

    Science.gov (United States)

    Vitiello, Benedetto; Perez Algorta, Guillermo; Arnold, L Eugene; Howard, Andrea L; Stehli, Annamarie; Molina, Brooke S G

    2017-04-01

    To assess the prevalence of psychotic symptoms among youths (14-25 years of age) with a childhood diagnosis of attention-deficit/hyperactivity disorder (ADHD) combined type. Participants in the Multimodal Treatment Study of Children with ADHD (MTA) and a local normative comparison group (LNCG) were systematically assessed 6, 8, 10, 12, 14, and 16 years after the original enrollment at a mean age of 8.5 years. Trained research assistants administered a psychosis screener, and positive screens were referred to study clinicians to confirm or exclude psychosis. Possible associations between screening positive and alcohol or substance use were assessed. Data were available from 509 MTA participants (88% of original MTA sample; mean age 25.1 years) and 276 LNCG participants (96% of original sample; mean age 24.6 years) at year 16. Twenty-six MTA participants (5%; 95% CI 3-7) and 11 LNCG participants (4%; 95% CI 2-6) screened positive for at least 1 psychotic symptom (p = .60). Most psychotic symptoms were transient. The prevalence of clinician-confirmed psychotic symptoms was 1.1% (95% CI 0.2-2.1) in the MTA group and 0.7% (0-1.7) in the LNCG (p = .72). Greater cannabis use was reported by those who screened positive (p ADHD increased the risk for psychotic symptoms. In the ADHD and normative comparison groups, more frequent cannabis use was associated with a greater likelihood of experiencing psychotic symptoms, thus supporting the recommendation that youth should not use cannabis. Published by Elsevier Inc.

  10. Confidentiality

    African Journals Online (AJOL)

    jacobien

    essential to the professional ethics of med- ical practitioners. ... promise-keeping and utility (or welfare). Autonomy. Autonomous beings are those that are capable of controlling their own lives.They ... private medical information is lim- ited: the ...

  11. Participants' safety versus confidentiality: A case study of HIV research.

    Science.gov (United States)

    Leyva-Moral, Juan Manuel; Feijoo-Cid, Maria

    2017-05-01

    Background When conducting qualitative research, participants usually share lots of personal and private information with the researcher. As researchers, we must preserve participants' identity and confidentiality of the data. Objective To critically analyze an ethical conflict encountered regarding confidentiality when doing qualitative research. Research design Case study. Findings and discussion one of the participants in a study aiming to explain the meaning of living with HIV verbalized his imminent intention to commit suicide because of stigma of other social problems arising from living with HIV. Given the life-threatening situation, the commitment related to not disclosing the participant's identity and/or the content of the interview had to be broken. To avoid or prevent suicide, the therapist in charge of the case was properly informed about the participant's intentions. One important question arises from this case: was it ethically appropriate to break the confidentiality commitment? Conclusion confidentiality could be broken if a life-threatening event is identified during data collection and participants must know that. This has to be clearly stated in the informed consent form.

  12. Privacy and confidentiality: perspectives of mental health consumers and carers in pharmacy settings.

    Science.gov (United States)

    Hattingh, Hendrika Laetitia; Knox, Kathy; Fejzic, Jasmina; McConnell, Denise; Fowler, Jane L; Mey, Amary; Kelly, Fiona; Wheeler, Amanda J

    2015-02-01

    The study aims to explore within the community pharmacy practice context the views of mental health stakeholders on: (1) current and past experiences of privacy, confidentiality and support; and (2) expectations and needs in relation to privacy and confidentiality. In-depth interviews and focus groups were conducted in three states in Australia, namely Queensland, the northern region of New South Wales and Western Australia, between December 2011 and March 2012. There were 98 participants consisting of consumers and carers (n = 74), health professionals (n = 13) and representatives from consumer organisations (n = 11). Participants highlighted a need for improved staff awareness. Consumers indicated a desire to receive information in a way that respects their privacy and confidentiality, in an appropriate space. Areas identified that require improved protection of privacy and confidentiality during pharmacy interactions were the number of staff having access to sensitive information, workflow models causing information exposure and pharmacies' layout not facilitating private discussions. Challenges experienced by carers created feelings of isolation which could impact on care. This study explored mental health stakeholders' experiences and expectations regarding privacy and confidentiality in the Australian community pharmacy context. A need for better pharmacy staff training about the importance of privacy and confidentiality and strategies to enhance compliance with national pharmacy practice requirements was identified. Findings provided insight into privacy and confidentiality needs and will assist in the development of pharmacy staff training material to better support consumers with sensitive conditions. © 2014 Royal Pharmaceutical Society.

  13. 7 CFR 1280.634 - Confidentiality.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 10 2010-01-01 2010-01-01 false Confidentiality. 1280.634 Section 1280.634 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (MARKETING... persons voting in the referendum and ballots shall be confidential and the contents of the ballots shall...

  14. 7 CFR 1206.107 - Confidential information.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 10 2010-01-01 2010-01-01 false Confidential information. 1206.107 Section 1206.107 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (MARKETING... INFORMATION Referendum Procedures. § 1206.107 Confidential information. The ballots and other information or...

  15. 7 CFR 1150.278 - Confidential treatment.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 9 2010-01-01 2009-01-01 true Confidential treatment. 1150.278 Section 1150.278 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (Marketing... of Milk Producer Organizations § 1150.278 Confidential treatment. All documents and other information...

  16. 7 CFR 1207.352 - Confidential treatment.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 10 2010-01-01 2010-01-01 false Confidential treatment. 1207.352 Section 1207.352 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (MARKETING... PLAN Potato Research and Promotion Plan Reports, Books, and Records § 1207.352 Confidential treatment...

  17. 7 CFR 1205.340 - Confidential treatment.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 10 2010-01-01 2010-01-01 false Confidential treatment. 1205.340 Section 1205.340 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (MARKETING... Cotton Research and Promotion Order Reports, Books, and Records § 1205.340 Confidential treatment. All...

  18. 7 CFR 1220.243 - Confidential treatment.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 10 2010-01-01 2010-01-01 false Confidential treatment. 1220.243 Section 1220.243 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (MARKETING... Confidential treatment. Except as otherwise provided in the Act, financial or commercial information that is...

  19. The Confidentiality of Interlibrary Loan Records.

    Science.gov (United States)

    Nolan, Christopher W.

    1993-01-01

    Discusses potential problems for confidentiality within interlibrary loan requests, outlines legal issues related to confidentiality, and proposes guidelines intended to protect library users' rights to privacy. Interlibrary loan documentation procedures are considered; laws and professional standards are reviewed; and the disposition of…

  20. 40 CFR 716.55 - Confidentiality claims.

    Science.gov (United States)

    2010-07-01

    ... confidential business information, health and safety studies of any substance or mixture that has been offered for commercial distribution (including for test marketing purposes and for use in research and... because disclosure would reveal a confidential process or quantitative mixture composition should briefly...

  1. 15 CFR 806.5 - Confidentiality.

    Science.gov (United States)

    2010-01-01

    ... 15 Commerce and Foreign Trade 3 2010-01-01 2010-01-01 false Confidentiality. 806.5 Section 806.5 Commerce and Foreign Trade Regulations Relating to Commerce and Foreign Trade (Continued) BUREAU OF ECONOMIC ANALYSIS, DEPARTMENT OF COMMERCE DIRECT INVESTMENT SURVEYS § 806.5 Confidentiality. Information...

  2. 31 CFR 9.6 - Confidential information.

    Science.gov (United States)

    2010-07-01

    ... 9.6 Money and Finance: Treasury Office of the Secretary of the Treasury EFFECTS OF IMPORTED ARTICLES ON THE NATIONAL SECURITY § 9.6 Confidential information. Information submitted in confidence which... marked “Business Confidential.” [40 FR 50717, Oct. 31, 1975] ...

  3. 15 CFR 705.6 - Confidential information.

    Science.gov (United States)

    2010-01-01

    ... EFFECT OF IMPORTED ARTICLES ON THE NATIONAL SECURITY § 705.6 Confidential information. (a) Any... the investigation that would disclose national security classified information or business... Security Classified” or “Business Confidential,” as appropriate, marked at the top of each sheet. Any...

  4. Las koerad hauguvad, karavan liigub ikka edasi ehk Maanteeamet ja MTA "ruulivad" vaatamata Riigikohtu juhistele edasi / Vahur Kivistik, Janar Urres

    Index Scriptorium Estoniae

    Kivistik, Vahur

    2016-01-01

    Riigikohtu lahendist 3-3-1-69-15 seoses Maksu- ja Tolliameti (MTA) ja Maanteeameti (MNT) koostööga eesmärgiga pidurdada 2009. a toodetud ja uuemate autode maaletoomisel toimuvaid käibemaksupettusi

  5. Efficacy of MTA and CEM Cement with Collagen Membranes for Treatment of Class II Furcation Defects.

    Directory of Open Access Journals (Sweden)

    Habib Ollah Ghanbari

    2014-06-01

    Full Text Available This study aimed to compare the efficacy of MTA and CEM cement in Class II furcation defects in human mandibular molars.Forty furcation defects were treated in 16 patients with chronic periodontitis. The clinical parameters of probing depth (PD, vertical and horizontal clinical attachment levels (VCAL and HCAL, open vertical and horizontal furcation depths (OVFD and OHFD, and gingival margin level (GML were measured at baseline and at 3- and 6-month (re-entry surgery postoperatively. Data were analyzed at a significance level of P<0.05.Use of MTA and CEM caused significant decreases in PD, VCAL, HCAL, OVFD and OHFD at re-entry, with no statistically significant differences between the two treatment options in soft and hard tissue parameters.Both treatment modalities caused significant gains in attachment levels and bone fills, proving efficacy for treatment of Class II furcation involvements.

  6. Confidentiality in psychological practice: a decrepit concept?

    Science.gov (United States)

    McMahon, M; Knowles, A D

    1995-11-01

    Although the principle of confidentiality in the relationship between psychologists and client has been vaunted, and is emphasised in the Australian Psychological Society's Code of Professional Conduct (the APS code; 1994), the confidentiality of this relationship is circumscribed by the absence of legal protections, the ethical beliefs of psychologists, institutional practices, and the provisions of the APS code itself. Lack of privilege in judicial proceedings, and statutory obligations to report certain types of behaviour, mandate breaches of confidentiality in some circumstances. Ethical beliefs of psychologists may support disclosure, especially where it is believed that there is danger of serious physical harm to the client or others. Multidisciplinary teams and institutional settings require the exchange of information for optimal delivery of services. Recent amendments to the APS code may require disclosure without the client's consent when a client is believed to be suicidal. Such developments, when considered at all, are typically regarded as exceptions to a general obligation of confidentiality. However, discussion of exceptions presupposes agreement on fundamental principle: the significance of, and rationale for, confidentiality in the psychologist-client relationship. It is argued in this paper that the obligation of confidentiality has been assumed rather than vigorously analysed and empirically explored. A critical examination of this obligation is the most appropriate starting point for the rehabilitation of contemporary principles of confidentiality in the psychologist-client relationship.

  7. Effect of MTA-based sealer on the healing of periapical lesions

    Directory of Open Access Journals (Sweden)

    Joao Eduardo GOMES-FILHO

    2013-06-01

    Full Text Available Some manufacturers have recently added specific components to improve the ease of handling and insertion material properties of MTA in order to create MTA-based sealers. Objective The aim of this study was to evaluate the healing of periapical lesions in canine teeth after a single session of endodontic treatment with MTA Fillapex® compared with Sealapex® or Endo-CPM-Sealer®. Material and Methods Sixty-two root canals were performed on two 1-year-old male dogs. After coronal access and pulp extirpation, the canals were exposed to the oral cavity for 6 months in order to induce periapical lesions. The root canals were prepared, irrigated with a solution of 2.5% sodium hypochlorite and filled with gutta-percha and different sealers, according to the following groups: 1 Sealapex®; 2 Endo-CPM-Sealer®; and 3 MTA Fillapex®. Some teeth with periapical lesions were left untreated for use as positive controls. Healthy teeth were used as negative controls. After 6 months, the animals were sacrificed and serial sections from the roots were prepared for histomorphologic analysis and stained with hematoxylin and eosin and the Brown and Brenn technique. The lesions were scored according to pre-established histomorphologic parameters and the scores statistically analyzed using the Kruskal-Wallis test. Results All 3 materials produced similar patterns of healing (p>0.05; in particular, persistent inflammation and absence of complete periapical tissue healing were consistently noted. Conclusions Preparation of the infected root canals followed by filling with the materials studied was insufficient to provide complete healing of the periapical tissues.

  8. Effect of MTA-based sealer on the healing of periapical lesions.

    Science.gov (United States)

    Gomes-Filho, João Eduardo; Watanabe, Simone; Cintra, Luciano Tavares Angelo; Nery, Mauro Juvenal; Dezan-Júnior, Eloi; Queiroz, India Olinta Azevedo; Lodi, Carolina Simonetti; Basso, Maria Daniela

    2013-01-01

    Some manufacturers have recently added specific components to improve the ease of handling and insertion material properties of MTA in order to create MTA-based sealers. The aim of this study was to evaluate the healing of periapical lesions in canine teeth after a single session of endodontic treatment with MTA Fillapex® compared with Sealapex® or Endo-CPM-Sealer®. Sixty-two root canals were performed on two 1-year-old male dogs. After coronal access and pulp extirpation, the canals were exposed to the oral cavity for 6 months in order to induce periapical lesions. The root canals were prepared, irrigated with a solution of 2.5% sodium hypochlorite and filled with gutta-percha and different sealers, according to the following groups: 1) Sealapex®; 2) Endo-CPM-Sealer®; and 3) MTA Fillapex®. Some teeth with periapical lesions were left untreated for use as positive controls. Healthy teeth were used as negative controls. After 6 months, the animals were sacrificed and serial sections from the roots were prepared for histomorphologic analysis and stained with hematoxylin and eosin and the Brown and Brenn technique. The lesions were scored according to pre-established histomorphologic parameters and the scores statistically analyzed using the Kruskal-Wallis test. All 3 materials produced similar patterns of healing (p>0.05); in particular, persistent inflammation and absence of complete periapical tissue healing were consistently noted. Preparation of the infected root canals followed by filling with the materials studied was insufficient to provide complete healing of the periapical tissues.

  9. Photo-Induced depopulation of the 180mTa isomer

    Science.gov (United States)

    Bhike, Megha; Krishichayan, Fnu; Tornow, W.

    2015-10-01

    The 180mTa nucleus is the rarest isotope in the universe, existing only in an isomeric state at 77.2 keV (Jπ = 9-) with half-life of greater than 7.1 ×1015 years. The stellar production of this high-spin isomer has been a challenging astrophysical problem. Cross-section measurements for the depopulation of the 180mTa isomer with monoenergetic photon beams of energies 2.5 and 3.1 MeV have been carried out at the HI γS facility. The activated Ta foils of natural abundance and containing 14.4 mg of 180mTa were γ-ray counted at TUNL's low background facility using a 13% planar HPGe detector. A 8'' ×12'' NaI detector in combination with the standard HI γS scintillator paddle system was employed for absolute photon-flux determination. Preliminary results will be discussed, and measurements at lower energies are planned. This work was supported by the U.S. DOE under Grant NO. DE-FG02-97ER41033.

  10. Evaluation of physico-chemical properties of Portland cements and MTA

    Directory of Open Access Journals (Sweden)

    Jorge Luis Gonçalves

    2010-09-01

    Full Text Available The purpose of this study was to evaluate the hydrogenionic potential and electrical conductivity of Portland cements and MTA, as well as the amount of arsenic and calcium released from these materials. In Teflon molds, samples of each material were agitated and added to plastic flasks containing distilled water for 3, 24, 72 and 168 h. The results were analyzed with a Kruskal-Wallis non-parametric test for global comparisons and a Dunn-Tukey test for pairwise comparisons. The results revealed no significant differences in the pH of the materials (p > 0.05. The electrical conductivity of the cements were not statistically different (p > 0.05. White non-structural cement and MTA BIO released the largest amount of calcium ions into solution (p 0.05. The results indicated that the physico-chemical properties of Portland cements and MTA were similar. Furthermore, all materials produced an alkaline environment and can be considered safe for clinical use because arsenic was not released. The electrical conductivity and the amount of calcium ions released into solution increased over time.

  11. Evaluation of the tissue reaction to fast endodontic cement (CER) and Angelus MTA.

    Science.gov (United States)

    Gomes-Filho, João Eduardo; Rodrigues, Guilherme; Watanabe, Simone; Estrada Bernabé, Pedro Felício; Lodi, Carolina Simonett; Gomes, Alessandra Cristina; Faria, Max Doulgas; Domingos Dos Santos, Alailson; Silos Moraes, João Carlos

    2009-10-01

    A new cement (CER; Cimento Endodôntico Rápido or fast endodontic cement) has been developed to improve handling properties. It is a formulation that has Portland cement in gel. However, there had not yet been any study evaluating its biologic properties. The purpose of this study was to evaluate the rat subcutaneous tissue response to CER and Angelus MTA. The materials were placed in polyethylene tubes and implanted into dorsal connective tissue of Wistar rats for 7, 30, and 60 days. The specimens were prepared to be stained with hematoxylin-eosin or von Kossa or not stained for polarized light. The presence of inflammation, predominant cell type, calcification, and thickness of fibrous connective tissue were recorded. Scores were defined as follows: 0, none or few inflammatory cells, no reaction; 1, 125 cells, severe reaction. Fibrous capsule was categorized as thin when thickness was 150 mum. Necrosis and formation of calcification were both recorded. Both materials Angelus MTA and CER caused moderate reactions at 7 days, which decreased with time. The response was similar to the control at 30 and 60 days with Angelus MTA and CER, characterized by organized connective tissue and presence of some chronic inflammatory cells. Mineralization and granulations birefringent to polarized light were observed with both materials. It was possible to conclude that CER was biocompatible and stimulated mineralization.

  12. Evaluation of physico-chemical properties of Portland cements and MTA.

    Science.gov (United States)

    Gonçalves, Jorge Luis; Viapiana, Raqueli; Miranda, Carlos Eduardo Saraiva; Borges, Alvaro Henrique; Cruz Filho, Antônio Miranda da

    2010-01-01

    The purpose of this study was to evaluate the hydrogenionic potential and electrical conductivity of Portland cements and MTA, as well as the amount of arsenic and calcium released from these materials. In Teflon molds, samples of each material were agitated and added to plastic flasks containing distilled water for 3, 24, 72 and 168 h. The results were analyzed with a Kruskal-Wallis non-parametric test for global comparisons and a Dunn-Tukey test for pairwise comparisons. The results revealed no significant differences in the pH of the materials (p > 0.05). The electrical conductivity of the cements were not statistically different (p > 0.05). White non-structural cement and MTA BIO released the largest amount of calcium ions into solution (p 0.05). The results indicated that the physico-chemical properties of Portland cements and MTA were similar. Furthermore, all materials produced an alkaline environment and can be considered safe for clinical use because arsenic was not released. The electrical conductivity and the amount of calcium ions released into solution increased over time.

  13. Bioactivity, physical and chemical properties of MTA mixed with propylene glycol

    Directory of Open Access Journals (Sweden)

    Vaishali Prakash NATU

    2015-08-01

    Full Text Available AbstractObjective To investigate the physical (setting time, hardness, flowability, microstructure and chemical (pH change, calcium release, crystallinity properties and the biological outcomes (cell survival and differentiation of mineral trioxide aggregate (MTA mixed using different proportions of propylene glycol (PG and water.Material and Methods White MTA was mixed with different water/PG ratios (100/0, 80/20 and 50/50. Composition (XRD, microstructure (SEM, setting time (ASTM C266-13, flowability (ANSI/ADA 57-2000, Knoop hardness (100 g/10 s and chemical characteristics (pH change and Ca2+ release for 7 days were evaluated. Cell proliferation, osteo/odontoblastic gene expression and mineralization induced by MTA mixed with PG were evaluated. MTA discs (5 mm in diameter, 2 mm thick were prepared and soaked in culture medium for 7 days. Next, the discs were removed and the medium used to culture dental pulp stem cells (DPSC for 28 days. Cells survival was evaluated using MTS assay (24, 72 and 120 h and differentiation with RT-PCR (ALP, OCN, Runx2, DSPP and MEPE and alizarin red staining (7 and 14 days. Data were analysed using one-way ANOVA and Tukey’s post-hoc analysis (a=0.05.Results The addition of PG significantly increased setting time, flowability and Ca2+ release, but it compromised the hardness of the material. SEM showed that 50/50 group resulted porous material after setting due to the incomplete setting reaction, as shown by XRD analysis. The addition of PG (80/20 and 50/50 was not capable to improve cell proliferation or to enhance gene expression, and mineralized deposition of DPSC after 7 and 14 days as compared to the 100/0.Conclusion Except for flowability, the addition of PG did not promote further improvements on the chemical and physical properties evaluated, and it was not capable of enhancing the bioactivity of the MTA.

  14. Efectividad del M.T.A en el manejo no quirúrgico de perforaciones apicales

    Directory of Open Access Journals (Sweden)

    José Elias Flórez Ariza

    2013-11-01

    Full Text Available Title: MTA effectiveness in not surgical treatment of apical perforations.ResumenLas perforaciones endodónticas son aperturas artificiales que resultan en la comunicación del sistema de conductos radiculares con los tejidos perirradicularres o con la cavidad bucal. Estas son complicaciones indeseables que pueden ocurrir durante cualquier etapa del tratamiento de conductos, o durante la preparación del espacio para perno. Aún cuando también pueden ser producto de caries o procesos resortivos, la mayoría de las perforaciones son realizadas de forma iatrogénica. El manejo terapéutico de perforaciones radiculares a lo largo de la historia es un punto crítico y centro de investigaciones constantes en busca del desarrollo de los materiales idóneos para el sellado de las mismas, pero es el Mineral Trióxido Agregado (MTA el material que por sus propiedades físicas y bioquímicas, tales como biocompatibilidad, y regenerativo de hueso, cemento y de ligamento periodontal, el mayormente utilizado como garantía de éxito en dichos procedimientos. El presente caso muestra el éxito no quirúrgico obtenido a partir del sellado de una perforación apical contaminada, utilizando MTA en la zona de la afección y el relleno complementario con gutapercha termoplástica en un diente antero superior. (DUAZARY 2013 No. 1, 56 - 61.AbstractThe Endodontic perforations are artificial openings that result in the communication of the root canal system with the perirradicular tissues or oral cavity. These are undesirable complications that can occur during any stage of root canal treatment, or during the preparation of the space for the bolt. Although they can be produced by cavities or resorptive processes, the majority of the perforations are made iatrogenically. The therapeutic management of root perforations throughout history has been a critical and ongoing investigation topic in search of the development of suitable materials for their sealing, but the

  15. 7 CFR 1425.5 - Confidentiality.

    Science.gov (United States)

    2010-01-01

    ... AGRICULTURE LOANS, PURCHASES, AND OTHER OPERATIONS COOPERATIVE MARKETING ASSOCIATIONS § 1425.5 Confidentiality. Information submitted to CCC related to trade secrets, financial or commercial operations, or the financial...

  16. Law and ethics in conflict over confidentiality?

    Science.gov (United States)

    Dickens, B M; Cook, R J

    2000-09-01

    Ethical principles that require the preservation of patients' confidential information are reinforced by principles found in several areas of law, such as law on contracts, negligence, defamation and fiduciary duty. However, laws sometimes compel disclosures of medical confidences, and more often may justify or excuse disclosures. Legally contentious issues concern patients' confidences regarding possible unlawful conduct, such as pregnancy termination, and the risk of spread of HIV and other infections. This article reviews the various legal bases of the duty of confidentiality, and legal challenges to the ethical obligation of non-disclosure. It addresses the justifications and limits of exchange of patients' health information among healthcare professionals and trainees, and considers legally recognized limits of confidential duties, and the scope of legitimate disclosure. An underlying theme is how to determine whether physicians are ethically justified in employing the discretion the law sometimes affords them to breach patients' expectations of confidentiality.

  17. Audit, Accountability and Confidential Enquiries into Maternal ...

    African Journals Online (AJOL)

    HP

    Time for Action: Audit, Accountability and Confidential Enquiries ... provision of quality maternity services. Having such a ... services are more likely to be sustained if women can find ..... Donabedian A. An introduction to quality assurance in.

  18. 40 CFR 790.7 - Confidentiality.

    Science.gov (United States)

    2010-07-01

    ... words “confidential business information,” “trade secret,” or another appropriate phrase indicating its... competitor use such information? How substantial would the harmful effects be? What is the causal...

  19. Cytotoxicity and Initial Biocompatibility of Endodontic Biomaterials (MTA and Biodentine™) Used as Root-End Filling Materials.

    Science.gov (United States)

    Escobar-García, Diana María; Aguirre-López, Eva; Méndez-González, Verónica; Pozos-Guillén, Amaury

    2016-01-01

    Objective. The aim of this study was to evaluate the cytotoxicity and cellular adhesion of Mineral Trioxide Aggregate (MTA) and Biodentine (BD) on periodontal ligament fibroblasts (PDL). Methods. PDL cells were obtained from nonerupted third molars and cultured; MTS cellular profusion test was carried out in two groups: MTA and BD, with respective controls at different time periods. Also, the LIVE/DEAD assay was performed at 24 h. For evaluation of cellular adhesion, immunocytochemistry was conducted to discern the expression of Integrin β1 and Vinculin at 12 h and 24 h. Statistical analysis was performed by the Kruskal-Wallis and Mann-Whitney U tests. Results. MTA and BD exhibited living cells up to 7 days. More expressions of Integrin β1 and Vinculin were demonstrated in the control group, followed by BD and MTA, which also showed cellular loss and morphological changes. There was a significant difference in the experimental groups cultured for 5 and 7 days compared with the control, but there was no significant statistical difference between both cements. Conclusions. Neither material was cytotoxic during the time evaluated. There was an increase of cell adhesion through the expression of focal contacts observed in the case of BD, followed by MTA, but not significantly.

  20. Clinical and radiographic evaluation of indirect pulp treatment with MTA and calcium hydroxide in primary teeth (in-vivo study

    Directory of Open Access Journals (Sweden)

    Vimi George

    2015-01-01

    Full Text Available Objectives: Clinical and radiographic effects of mineral trioxide aggregate (white MTA and calcium hydroxide (Dycal in indirect pulp treatment (IPT of primary teeth over a period of 6 months. Materials and Methods: A clinical trial with sample size of 40 primary molars between the age group of 5-9 years, of which, 20 teeth were considered, each for MTA and Dycal. Measurements on the digitized radiographs were performed at baseline, third and sixth month, increase in dentin was then measured using Corel Draw software. Result: Independent t-test had indicated that at the end of 3 months and 6 months, a statistically significant increase in dentin thickness with both MTA and Dycal (P-value ≤ 0.001 was found. Within the MTA group, the thickness of dentin formed was 0.089 mm ± 0.031 mm at first 3 months and 0.055 ± 0.022 mm at the second 3 months, (P ≤ 0.001 evaluated using paired t-test. In the Dycal group, increment in dentin deposited was 0.068 mm at the first 3 months and second 3 months, it was 0.030 mm (P-value ≤ 0.001. Conclusion: Clinically and radiographically, MTA is superior to Dycal as a good IPT medicament in primary teeth.

  1. Clinical and radiographic evaluation of indirect pulp treatment with MTA and calcium hydroxide in primary teeth (in-vivo study).

    Science.gov (United States)

    George, Vimi; Janardhanan, Suresh Kumar; Varma, Balagopal; Kumaran, Parvathy; Xavier, Arun Mamachan

    2015-01-01

    Clinical and radiographic effects of mineral trioxide aggregate (white MTA) and calcium hydroxide (Dycal) in indirect pulp treatment (IPT) of primary teeth over a period of 6 months. A clinical trial with sample size of 40 primary molars between the age group of 5-9 years, of which, 20 teeth were considered, each for MTA and Dycal. Measurements on the digitized radiographs were performed at baseline, third and sixth month, increase in dentin was then measured using Corel Draw software. Independent t-test had indicated that at the end of 3 months and 6 months, a statistically significant increase in dentin thickness with both MTA and Dycal (P-value ≤ 0.001) was found. Within the MTA group, the thickness of dentin formed was 0.089 mm ± 0.031 mm at first 3 months and 0.055 ± 0.022 mm at the second 3 months, (P ≤ 0.001) evaluated using paired t-test. In the Dycal group, increment in dentin deposited was 0.068 mm at the first 3 months and second 3 months, it was 0.030 mm (P-value ≤ 0.001). Clinically and radiographically, MTA is superior to Dycal as a good IPT medicament in primary teeth.

  2. "MTA"-an Hydraulic Silicate Cement: review update and setting reaction.

    Science.gov (United States)

    Darvell, B W; Wu, R C T

    2011-05-01

    To review the current status and understanding of Portland cement-like endodontic materials commonly referred to by the trade designation "MTA" (alias "Mineral Trioxide Aggregate"), and to present an outline setting reaction scheme, hitherto unattempted. The literature was searched using on-line tools, overlapping an earlier substantial review to pick up any omissions, including that in respect of ordinary Portland cement (OPC), with which MTA shares much. The search was conducted for the period January 2005 to December 2009 using 'MTA', 'GMTA', 'WMTA', and 'mineral AND trioxide AND aggregate' as keywords, with various on-line search engines including ScienceDirect (http://www.sciencedirect.com), SAGE Journals Online (http://online.sagepub.com), Wiley Online Library (http://onlinelibrary.wiley.com), SciELO Scientific electronic library online (http://www.scielo.br/scielo.php), JSTOR (http://www.jstor.org), and Scopus (http://www.scopus.com). References of articles found were cross-checked where appropriate for missed publications. Manufacturers' and related websites were searched with Google Search (http://www.google.com.hk). A generic name for this class of materials, Hydraulic Silicate Cement (HSC), is proposed, and an outline reaction scheme has been deduced. HSC has distinct advantages apparent, including sealing, sterilizing, mineralizing, dentinogenic and osteogenic capacities, which research continues to demonstrate. However, ad hoc modifications have little supporting justification. While HSC has a definite place in dentistry, with few of the drawbacks associated with other materials, some improvements in handling and other properties are highly desirable, as are studies of the mechanisms of the several beneficial physiological effects. Reference to the extensive, but complex, literature on OPC may provide the necessary insight. Copyright © 2011 Academy of Dental Materials. Published by Elsevier Ltd. All rights reserved.

  3. Mineral Trioxide Aggregate (MTA direct pulp capping: 10 years clinical results

    Directory of Open Access Journals (Sweden)

    Lucio Daniele

    2017-06-01

    After 10-years follow-up period, 6 out of 80 teeth required an endodontic treatment, we did not find an increase of pulp calcifications, root resorptions, endodontic lesions. All teeth still alive have responded positively to the cold-temperature test. The three lesions had disappeared at the last X-ray control. All four symptomatic teeth preserved their pulp vitality. The successful treatment rate was 92.5%. Direct pulp capping with MTA can be considered an effective treatment of exposure due to tooth decay and can be considered a valid treatment option for teeth with a diagnosis of not-severe reversible pulpitis.

  4. Comparative evaluation of antimicrobial action of MTA, calcium hydroxide and Portland cement Avaliação comparativa da ação antimicrobiana do MTA, hidróxido de cálcio e cimento Portland

    Directory of Open Access Journals (Sweden)

    Caroline Sousa Ribeiro

    2006-10-01

    Full Text Available The present study aimed to evaluate and compare the antimicrobial effect of MTA Dentsply, MTA Angelus, Calcium Hydroxide and Portland cement. Four reference bacterial strains were used: Pseudomonas aeruginosa, Escherichia coli, Bacteroides fragilis, and Enterococcus faecalis. Plates containing Mueller-Hinton agar supplemented with 5% sheep blood, hemin, and menadione were inoculated with the bacterial suspensions. Subsequently, wells were prepared and immediately filled with materials and incubated at 37ºC for 48 hours under anaerobic conditions, except P. aeruginosa. The diameters of inhibition zones were measured, and data analyzed using ANOVA and the Tukey test with 1% level of significance. MTA Dentsply, MTA Angelus and Portland cement inhibited the growth of P. aeruginosa. Calcium Hydroxide was effective against P. aeruginosa and B. fragillis. Under anaerobic conditions, which may hamper the formation of reactive oxygen species, the materials failed to inhibit E. faecalis, and E. coli.O objetivo do presente trabalho foi avaliar e comparar o efeito antimicrobiano do MTA Dentsply, MTA Angelus, hidróxido de cálcio e cimento Portland sobre quatro cepas bacterianas: Pseudomonas aeruginosa, Escherichia coli, Bacteroides fragilis, e Enterococcus faecalis. Placas contendo agar Muller-Hinton suplementadas com 5% de sangue de carneiro, hemina e menadiona foram inoculadas com as suspensões bacterianas. Poços foram confeccionados com auxílio de perfuradores e imediatamente preenchidos com os materiais, e incubados a 37ºC por 48 horas em atmosfera de anaerobiose, exceto P. aeruginosa. O diâmetro dos halos de inibição foi medido e os dados analisados usando o teste estatístico ANOVA e o de Tukey com nível de significância de 1%. O MTA Dentsply, MTA Angelus e Cimento Portland inibiram o crescimento da P.aeruginosa. O hidróxido de cálcio foi efetivo contra P. aeruginosa e B. fragillis. Sob atmosfera de anaerobiose, condição que pode

  5. Analysis of heavy metal contents in gray and white MTA and 2 kinds of Portland cement: a preliminary study.

    Science.gov (United States)

    Chang, Seok Woo; Shon, Won Jun; Lee, WooCheol; Kum, Kee Yeon; Baek, Seung Ho; Bae, Kwang Shik

    2010-04-01

    The levels of 10 heavy metals (arsenic, bismuth, cadmium, chromium, copper, iron, lead, manganese, nickel, and zinc) in gray Portland cement (GPC), white Portland cement (WPC), gray MTA (GMTA), and white MTA (WMTA) were analyzed by inductively coupled plasma-atomic emission spectrometry (ICP-AES). One gram of each material was digested with 80 degrees C "aqua-regia" (7 mL of 60% HNO3 and 21 mL of 35% HCl), filtered, and analyzed by ICP-AES. The analysis was performed 6 times and the data were analyzed statistically. Arsenic and lead concentrations were the highest in GPC (P cements (P Portland cement versus MTA, the differences in purity may be considered. Copyright 2010 Mosby, Inc. All rights reserved.

  6. Sealing ability of MTA, CPM, and MBPc as root-end filling materials: a bacterial leakage study.

    Science.gov (United States)

    Medeiros, Paulo Leal; Bernardineli, Norberti; Cavenago, Bruno Cavalini; Torres, Sérgio Aparecido; Duarte, Marco Antonio Hungaro; Bramante, Clovis Monteiro; Marciano, Marina Angélica

    2016-04-01

    Objectives To evaluate the sealing ability of three root-end filling materials (white MTA, CPM, and MBPc) using an Enterococcus faecalis leakage model. Material and Methods Seventy single-root extracted human teeth were instrumented and root-ends were resected to prepare 3 mm depth cavities. Root-end preparations were filled with white MTA, CPM, and MBPc cements. Enterococcus faecalis was coronally introduced and the apical portion was immersed in BHI culture medium with phenol red indicator. The bacterial leakage was monitored every 24 h for 4 weeks. The statistical analysis was performed using the Wilcoxon-Gehan test (pCPM and the other groups. Conclusions The epoxy resin-based cement MBPc had lower bacterial leakage compared with the calcium silicate-based cements MTA and CPM.

  7. Confidential benchmarking based on multiparty computation

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre; Damgård, Kasper Lyneborg; Nielsen, Kurt

    We report on the design and implementation of a system that uses multiparty computation to enable banks to benchmark their customers' confidential performance data against a large representative set of confidential performance data from a consultancy house. The system ensures that both the banks......' and the consultancy house's data stays confidential, the banks as clients learn nothing but the computed benchmarking score. In the concrete business application, the developed prototype help Danish banks to find the most efficient customers among a large and challenging group of agricultural customers with too much...... debt. We propose a model based on linear programming for doing the benchmarking and implement it using the SPDZ protocol by Damgård et al., which we modify using a new idea that allows clients to supply data and get output without having to participate in the preprocessing phase and without keeping...

  8. Avaliação comparativa da citotoxicidade dos cimentos MTA Fillapex e AH Plus: revisão integrativa

    OpenAIRE

    Marinho, Jéssica Cristina Soares; Cunha, Ludmila de Almeida; Lacerda, Mariane Floriano Lopes Santos; Lacerda, Gabriel Pinheiro; Coelho, Renato Girelli; Girelli, Caroline Felipe Magalhães

    2017-01-01

    Objetivo: O objetivo deste estudo foi realizar uma revisão integrativa comparando a citotoxicidade dos cimentos MTA Fillapex e AH Plus aos tecidos periapicais. Métodos: Foram utilizados artigos na íntegra, nos idiomas português e inglês, publicados durante os períodos de 2010 a 2017, selecionados na base de dados Scielo e Pubmed, utilizando os seguintes descritores: AH Plus, MTA Fillapex e citotoxicidade. Foram excluídos, os trabalhos no idioma não inglês, artigos sem resumo, trabalhos realiz...

  9. Comparison of the physical and mechanical properties of MTA and portland cement.

    Science.gov (United States)

    Islam, Intekhab; Chng, Hui Kheng; Yap, Adrian U Jin

    2006-03-01

    This study evaluated and compared the pH, radiopacity, setting time, solubility, dimensional change, and compressive strength of ProRoot MTA (PMTA), ProRoot MTA (tooth colored formula) (WMTA), white Portland cement (WP), and ordinary Portland cement (OP). The results showed that PMTA and Portland cement have very similar physical properties. However, the radiopacity of Portland cement is much lower than that of PMTA. The compressive strength of PMTA was greater than Portland cement at 28 days. The major constituent of PMTA is Portland cement. Given the low cost of Portland cement and similar properties when compared to PMTA, it is reasonable to consider Portland cement as a possible substitute for PMTA in endodontic applications. However, industrially manufactured Portland cement is not approved currently for use in the United States and therefore no clinical recommendation can be made for its use in the human body. Further in vitro and in vivo tests, especially with regards its biocompatibility, should be conducted to ascertain if it meets the FDA requirements for use as a medical device.

  10. Radiopacity evaluation of root canal sealers containing calcium hydroxide and MTA

    Directory of Open Access Journals (Sweden)

    Juliane Maria Guerreiro- Tanomaru

    2009-06-01

    Full Text Available The purpose of this study was to evaluate the radiopacity of root canal sealers containing calcium hydroxide and MTA (Acroseal, Sealer 26, Sealapex, Endo CPM Sealer, Epiphany and Intrafill. Five disc-shaped specimens (10 x 1 mm were fabricated from each material, according to the ISO 6876/2001 standard. After setting of the materials, radiographs were taken using occlusal film and a graduated aluminum stepwedge varying from 2 to 16 mm in thickness. The dental X-ray unit (GE1000 was set at 50 kVp, 10 mA, 18 pulses/s and distance of 33.5 cm. The radiographs were digitized and the radiopacity compared to that of the aluminum stepwedge using VIXWIN-2000 software (Gendex. The data (mmAl were analyzed statistically by ANOVA and Tukey's test at the 5% significance level. Epiphany and Intrafill presented the highest radiopacity values (8.3 mmAl and 7.5 mmAl respectively, p < 0.05 followed by Sealer 26 (6.3 mmAl, Sealapex (6.1 mmAl and Endo CPM Sealer (6 mmAl. Acroseal was the least radiopaque material (4 mmAl, p < 0.05. In conclusion, the calcium hydroxide- and MTA-containing root canal sealers had different radiopacities. However, all materials presented radiopacity values above the minimum recommended by the ISO standard.

  11. Effects of LED or laser phototherapy on bone defects grafted with MTA and irradiated with laser or LED light: a comparative Raman spectroscopic study

    Science.gov (United States)

    Pinheiro, Antonio L. B.; Soares, Luiz G. P.; Barbosa, Artur Felipe S.; Silveira, Landulfo, Jr.

    2012-03-01

    We studied peaks of calcium hydroxyapatite - CHA on defects grafted with MTA, treated or not with Light Emitting Diode - LED or IR Laser. 54 rats were divided in 6 groups each subdivided into 3 subgroups (15,21,30d). LED (λ850 +/- 10nm) or IR Laser (λ850 nm) was applied over (LED) or in 4 points around the defect at 48 h intervals for 15 days. Raman readings were taken at the surface of the defect. The smaller overall intensity of the peak was found in Group MTA + Laser (1510.2 +/- 274.1) and the highest on Group LED (2322 +/- 715). There were no statistically significant differences between non-irradiated subjects on regards the CHA peaks. On the other hand, there were statistically significant differences between the Group Clot and LED, Clot and Laser, and Clot and MTA + Laser (p =0.01, p = 0.02, p = 0.003). There were no significant differences between Group MTA and MTA + LED (p=0.2) but significant differences were seen between Groups MTA and MTA + Laser (p=0.01). Significant differences were also observed between Groups LED and Laser (p <0.001) and between Groups MTA + LED and MTA + Laser (p=0.009). MTA, due to its characteristics, seemed to be directly affected by the light. However, the use of either phototherapy positively affected bone healing similarly as observed on different studies using other biomaterials. The overall analysis of our results indicated that the use of either light source resulted in a better, more advanced, and of quality bone repair.

  12. 42 CFR 3.206 - Confidentiality of patient safety work product.

    Science.gov (United States)

    2010-10-01

    ... 42 Public Health 1 2010-10-01 2010-10-01 false Confidentiality of patient safety work product. 3... individually identifiable health information in such patient safety work product, the direct identifiers listed at 45 CFR 164.514(e)(2) have been removed. (5) Disclosure of nonidentifiable patient safety work...

  13. 7 CFR 1210.607 - Confidential information.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 10 2010-01-01 2010-01-01 false Confidential information. 1210.607 Section 1210.607 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (MARKETING... contents and all other information or reports furnished to, compiled by, or in possession of, the...

  14. 7 CFR 1210.352 - Confidential treatment.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 10 2010-01-01 2010-01-01 false Confidential treatment. 1210.352 Section 1210.352 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (MARKETING... treatment. (a) All information obtained from the books, records, or reports required to be maintained under...

  15. ML Confidential : machine learning on encrypted data

    NARCIS (Netherlands)

    Graepel, T.; Lauter, K.; Naehrig, M.

    2012-01-01

    We demonstrate that by using a recently proposed somewhat homomorphic encryption (SHE) scheme it is possible to delegate the execution of a machine learning (ML) algorithm to a compute service while retaining confidentiality of the training and test data. Since the computational complexity of the

  16. 7 CFR 1150.173 - Confidential treatment.

    Science.gov (United States)

    2010-01-01

    ... reports of the number of persons subject to this subpart or statistical data collected therefrom, which... 7 Agriculture 9 2010-01-01 2009-01-01 true Confidential treatment. 1150.173 Section 1150.173 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (Marketing...

  17. 7 CFR 1212.72 - Confidential treatment.

    Science.gov (United States)

    2010-01-01

    ... statements based upon the reports of the number of persons subject to this subpart or statistical data... 7 Agriculture 10 2010-01-01 2010-01-01 false Confidential treatment. 1212.72 Section 1212.72 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (MARKETING...

  18. 7 CFR 1260.203 - Confidential treatment.

    Science.gov (United States)

    2010-01-01

    ... of persons subject to this subpart or statistical data collected therefrom, which statements do not... 7 Agriculture 10 2010-01-01 2010-01-01 false Confidential treatment. 1260.203 Section 1260.203 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (MARKETING...

  19. 7 CFR 1206.62 - Confidential treatment.

    Science.gov (United States)

    2010-01-01

    ... statements based upon the reports of the number of persons subject to this subpart or statistical data... 7 Agriculture 10 2010-01-01 2010-01-01 false Confidential treatment. 1206.62 Section 1206.62 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (MARKETING...

  20. 7 CFR 1218.62 - Confidential treatment.

    Science.gov (United States)

    2010-01-01

    ... of the number of persons subject to this subpart or statistical data collected therefrom, which... 7 Agriculture 10 2010-01-01 2010-01-01 false Confidential treatment. 1218.62 Section 1218.62 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (MARKETING...

  1. 7 CFR 1219.63 - Confidential treatment.

    Science.gov (United States)

    2010-01-01

    ... upon the reports of the number of persons subject to this subpart or statistical data collected from... 7 Agriculture 10 2010-01-01 2010-01-01 false Confidential treatment. 1219.63 Section 1219.63 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (MARKETING...

  2. 18 CFR 270.506 - Confidentiality.

    Science.gov (United States)

    2010-04-01

    ... 18 Conservation of Power and Water Resources 1 2010-04-01 2010-04-01 false Confidentiality. 270.506 Section 270.506 Conservation of Power and Water Resources FEDERAL ENERGY REGULATORY COMMISSION...) through (9) of 5 U.S.C. 552(b). (b) Upon receipt of a request for disclosure of information treated as...

  3. 7 CFR 900.309 - Confidential information.

    Science.gov (United States)

    2010-01-01

    ... Conduct of Referenda To Determine Producer Approval of Milk Marketing Orders To Be Made Effective Pursuant to Agricultural Marketing Agreement Act of 1937, as Amended § 900.309 Confidential information. The... Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (Marketing...

  4. 7 CFR 984.79 - Confidential information.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 8 2010-01-01 2010-01-01 false Confidential information. 984.79 Section 984.79 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (Marketing... or disclosing the trade position, or financial condition or business operations of the handler shall...

  5. 7 CFR 993.71 - Confidential information.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 8 2010-01-01 2010-01-01 false Confidential information. 993.71 Section 993.71 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (Marketing... information constituting a trade secret or disclosing of the trade position, financial condition, or business...

  6. 7 CFR 932.63 - Confidential information.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 8 2010-01-01 2010-01-01 false Confidential information. 932.63 Section 932.63 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (Marketing... from such reports and records which might affect the trade position, financial condition, or business...

  7. 7 CFR 929.65 - Confidential information.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 8 2010-01-01 2010-01-01 false Confidential information. 929.65 Section 929.65 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (Marketing... position, financial condition, or business operations of the particular handler from whom received, shall...

  8. 7 CFR 982.70 - Confidential information.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 8 2010-01-01 2010-01-01 false Confidential information. 982.70 Section 982.70 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (Marketing... trade secret or disclosing of the trade position, financial condition, or business operations of the...

  9. 7 CFR 930.73 - Confidential information.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 8 2010-01-01 2010-01-01 false Confidential information. 930.73 Section 930.73 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (Marketing... a trade secret or disclosing trade position, financial condition, or business operations of the...

  10. Confidentiality of Accounting Academics: Consequences of Nonconformity

    Science.gov (United States)

    Amponsah, Emmanuel B.; Boateng, Peter Agyekum; Onuoha, Luke N.

    2016-01-01

    This paper examined ways by which nonconformity to confidentiality among accounting academics could lead to increased-recruitment-and-legal-costs to their employing universities in Ghana that offered accounting degree programmes. With a cross-sectional design, data collected from 1,225 accountants analysed via Cronbach's alpha,…

  11. 7 CFR 983.65 - Confidential information.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 8 2010-01-01 2010-01-01 false Confidential information. 983.65 Section 983.65 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (Marketing... the particular handler or their customers shall be received by, and at all times kept in the custody...

  12. 7 CFR 996.72 - Confidential information.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 8 2010-01-01 2010-01-01 false Confidential information. 996.72 Section 996.72 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (Marketing... condition, or business operations of the particular handlers or their customers shall be received by, and at...

  13. 31 CFR 129.5 - Confidentiality.

    Science.gov (United States)

    2010-07-01

    ... 31 Money and Finance: Treasury 1 2010-07-01 2010-07-01 false Confidentiality. 129.5 Section 129.5 Money and Finance: Treasury Regulations Relating to Money and Finance PORTFOLIO INVESTMENT SURVEY... contain data aggregated in such a way that neither the person supplying the information nor the investor...

  14. 40 CFR 710.58 - Confidentiality.

    Science.gov (United States)

    2010-07-01

    ...) Any person submitting information under this subpart may assert a business confidentiality claim for... with reporting under this subpart? How could a competitor use such information? Would the effects of... that your competitors do not know it is being manufactured or imported for a commercial purpose by...

  15. 40 CFR 710.38 - Confidentiality.

    Science.gov (United States)

    2010-07-01

    ... submitting information under this part may assert a business confidentiality claim for the information. The... with reporting under this part? How could a competitor use such information? Would the effects of... that your competitors do not know it is being manufactured or imported for a commercial purpose by...

  16. 38 CFR 1.462 - Confidentiality restrictions.

    Science.gov (United States)

    2010-07-01

    ... Sickle Cell Anemia § 1.462 Confidentiality restrictions. (a) General. The patient records to which §§ 1..., infection with the HIV, or sickle cell anemia may be acknowledged only if the patient's written consent is... with the HIV, or sickle cell anemia. (2) Any answer to a request for a disclosure of patient records...

  17. 42 CFR 93.108 - Confidentiality.

    Science.gov (United States)

    2010-10-01

    ... 42 Public Health 1 2010-10-01 2010-10-01 false Confidentiality. 93.108 Section 93.108 Public Health PUBLIC HEALTH SERVICE, DEPARTMENT OF HEALTH AND HUMAN SERVICES HEALTH ASSESSMENTS AND HEALTH EFFECTS STUDIES OF HAZARDOUS SUBSTANCES RELEASES AND FACILITIES PUBLIC HEALTH SERVICE POLICIES ON RESEARCH...

  18. 22 CFR 130.15 - Confidential business information.

    Science.gov (United States)

    2010-04-01

    ..., confidential business information means commercial or financial information which by law is entitled to... 22 Foreign Relations 1 2010-04-01 2010-04-01 false Confidential business information. 130.15... CONTRIBUTIONS, FEES AND COMMISSIONS § 130.15 Confidential business information. (a) Any person who is required...

  19. 15 CFR 718.3 - Disclosure of confidential business information.

    Science.gov (United States)

    2010-01-01

    ... 15 Commerce and Foreign Trade 2 2010-01-01 2010-01-01 false Disclosure of confidential business... (Continued) BUREAU OF INDUSTRY AND SECURITY, DEPARTMENT OF COMMERCE CHEMICAL WEAPONS CONVENTION REGULATIONS CONFIDENTIAL BUSINESS INFORMATION § 718.3 Disclosure of confidential business information. (a) General...

  20. Influence of phototherapies on the outcome of complete tibial fractures grafted or not with MTA: Raman spectroscopic study on rabbits

    Science.gov (United States)

    Pinheiro, Antônio L. B.; Soares, Luiz G. P.; da Silva, Aline C. P.; Santos, Nicole R. S.; da Silva, Anna Paula L. T.; Neves, Bruno Luiz R. C.; Soares, Amanda P.; Silveira, Landulfo

    2018-02-01

    The aim of the present study was to assess, by means of Raman spectroscopy, the repair of complete surgical tibial fractures fixed with wire osteosynthesis or miniplates treated or not with infrared laser (λ780 nm) or infrared LED (λ850 +/- 10 nm) lights, 142.8 J/cm2 per treatment, associated or not to the use of mineral trioxide aggregate (MTA) cement. Surgical fractures were created on 36 rabbits and fixed with WO or miniplates and some groups were grafted with MTA. Irradiated groups received lights at every other day for 15 days and sacrifice occurred after 30 days. The results showed that only irradiation with either laser or LED influenced the peaks of phosphate ( 960 cm-1) and carbonated ( 1,070 cm-1) hydroxyapatite. Collagen peak (1,450 cm-1) was influenced by both the use of MTA and irradiation with either laser or LED. It is concluded that the use of either laser or LED phototherapy associated to MTA cement was efficacious on improving the repair of complete tibial fractures treated with wire osteosynthesis or miniplates.

  1. Insight into the architecture of the NuRD complex: structure of the RbAp48-MTA1 subcomplex.

    Science.gov (United States)

    Alqarni, Saad S M; Murthy, Andal; Zhang, Wei; Przewloka, Marcin R; Silva, Ana P G; Watson, Aleksandra A; Lejon, Sara; Pei, Xue Y; Smits, Arne H; Kloet, Susan L; Wang, Hongxin; Shepherd, Nicholas E; Stokes, Philippa H; Blobel, Gerd A; Vermeulen, Michiel; Glover, David M; Mackay, Joel P; Laue, Ernest D

    2014-08-08

    The nucleosome remodeling and deacetylase (NuRD) complex is a widely conserved transcriptional co-regulator that harbors both nucleosome remodeling and histone deacetylase activities. It plays a critical role in the early stages of ES cell differentiation and the reprogramming of somatic to induced pluripotent stem cells. Abnormalities in several NuRD proteins are associated with cancer and aging. We have investigated the architecture of NuRD by determining the structure of a subcomplex comprising RbAp48 and MTA1. Surprisingly, RbAp48 recognizes MTA1 using the same site that it uses to bind histone H4, showing that assembly into NuRD modulates RbAp46/48 interactions with histones. Taken together with other results, our data show that the MTA proteins act as scaffolds for NuRD complex assembly. We further show that the RbAp48-MTA1 interaction is essential for the in vivo integration of RbAp46/48 into the NuRD complex. © 2014 by The American Society for Biochemistry and Molecular Biology, Inc.

  2. The iMTA Productivity Cost Questionnaire: A Standardized Instrument for Measuring and Valuing Health-Related Productivity Losses.

    Science.gov (United States)

    Bouwmans, Clazien; Krol, Marieke; Severens, Hans; Koopmanschap, Marc; Brouwer, Werner; Hakkaart-van Roijen, Leona

    2015-09-01

    Productivity losses often contribute significantly to the total costs in economic evaluations adopting a societal perspective. Currently, no consensus exists on the measurement and valuation of productivity losses. We aimed to develop a standardized instrument for measuring and valuing productivity losses. A group of researchers with extensive experience in measuring and valuing productivity losses designed an instrument suitable for self-completion, building on preknowledge and evidence on validity. The instrument was designed to cover all domains of productivity losses, thus allowing quantification and valuation of all productivity losses. A feasibility study was performed to check the questionnaire's consistency and intelligibility. The iMTA Productivity Cost Questionnaire (iPCQ) includes three modules measuring productivity losses of paid work due to 1) absenteeism and 2) presenteeism and productivity losses related to 3) unpaid work. Questions for measuring absenteeism and presenteeism were derived from existing validated questionnaires. Because validated measures of losses of unpaid work are scarce, the questions of this module were newly developed. To enhance the instrument's feasibility, simple language was used. The feasibility study included 195 respondents (response rate 80%) older than 18 years. Seven percent (n = 13) identified problems while filling in the iPCQ, including problems with the questionnaire's instructions and routing (n = 6) and wording (n = 2). Five respondents experienced difficulties in estimating the time that would be needed for other people to make up for lost unpaid work. Most modules of the iPCQ are based on validated questions derived from previously available instruments. The instrument is understandable for most of the general public. Copyright © 2015 International Society for Pharmacoeconomics and Outcomes Research (ISPOR). Published by Elsevier Inc. All rights reserved.

  3. Antimicrobial activity and pH of a endodontic sealer containing MTA

    DEFF Research Database (Denmark)

    Maliza, Amanda GA; de Andrade, Flaviana Bombarda; Arias, Marcela C

    Objective: To investigate the antimicrobial activity, calcium release, and pH of a new mineral trioxide aggregate endodontic sealer when compared to endodontic sealers containing calcium hydroxide and/or epoxy resin. Method: Specimens were fabricated from MTA Fillapex, Sealer 26, Sealapex, and AH...... Plus immediately, 24 or 48 hours prior to the tests. The antimicrobial activity against Enterococcus faecalis and Candida albicans was evaluated by the direct contact and the agar diffusion methods. Calcium release was determined by atomic absorption spectrometry. The pH from solutions containing...... in solution with an alkaline pH. Conclusion: The new mineral trioxide aggregate endodontic sealer presented higher antimicrobial activity when compared to the sealers containing calcium hydroxide and/or epoxy resin. As for pH and calcium release, the sealers containing calcium hydroxide resulted in presented...

  4. Progress Report on Nuclear Structure and Decay Data Activities at MTA Atomki

    Energy Technology Data Exchange (ETDEWEB)

    Timar, J.; Elekes, Z. [Atomki, Debrecen (Hungary)

    2013-08-15

    The center at the Institute for Nuclear Research (MTA Atomki) consists of two evaluators who devote altogether 0.5 FTE to mass-chain evaluation work. We have been working on mass-chain evaluation since 2009. Until now we have been working on mass chains that were temporarily assigned to us. Now we have permanent responsibilities, which are the A=101-105 mass chains. Our evaluation work is funded mainly by MTA Atomki, but we have also received considerable financial support from IAEA through Research Contract No. 15902/R0, and from the McMaster University. Besides financial supports, we received great help from Balraj Singh to start and build up our evaluation work. Mass-chain evaluation in the 2011-2012 period: In the covered period, we evaluated the A=128, A=129 and A=46 mass chains. 1) The evaluation of the A=129 mass chain had started in the previous period, however due to appearance of new important published and unpublished data after the review of the NDS manuscript, we decided to include them into the new evaluation. It is in post review status. 2) The evaluation of the A=128 mass chain has been finished, and it has been submitted to NNDC. It is in pre review status. 3) The evaluation of the A=46 mass chain is still in progress, but it is close to be finished and to be submitted to NNDC. Plans for the next period: The group plans to continue the mass-chain evaluation on a basis of about one mass chain per year. For the next period we plan to finish and publish the A=129, 128 and 46 mass chains. Also, as the mass chains of A=105 and A=101, from our permanently assigned mass chains, has been updated last in 2004 and 2006, respectively, we plan to evaluate these two mass chains starting with A=105.

  5. 42 CFR 2.2 - Statutory authority for confidentiality of alcohol abuse patient records.

    Science.gov (United States)

    2010-10-01

    ... HUMAN SERVICES GENERAL PROVISIONS CONFIDENTIALITY OF ALCOHOL AND DRUG ABUSE PATIENT RECORDS Introduction.... (B) To qualified personnel for the purpose of conducting scientific research, management audits, financial audits, or program evaluation, but such personnel may not identify, directly or indirectly, any...

  6. 77 FR 76028 - Access to Confidential Business Information by Science Applications International Corporation and...

    Science.gov (United States)

    2012-12-26

    ... Business Information by Science Applications International Corporation and Its Identified Subcontractor...: EPA has authorized its contractor, Science Applications International Corporation (SAIC) of McLean, VA... information may be claimed or determined to be Confidential Business Information (CBI). DATES: Access to the...

  7. 78 FR 66697 - Access to Confidential Business Information by Science Applications International Corporation and...

    Science.gov (United States)

    2013-11-06

    ... Business Information by Science Applications International Corporation and Its Identified Subcontractors..., Science Applications International Corporation (SAIC) of McLean, VA, and its subcontractors to access...). Some of the information may have been claimed or determined to be Confidential Business Information...

  8. Safeguarding Confidentiality in Electronic Health Records.

    Science.gov (United States)

    Shenoy, Akhil; Appel, Jacob M

    2017-04-01

    Electronic health records (EHRs) offer significant advantages over paper charts, such as ease of portability, facilitated communication, and a decreased risk of medical errors; however, important ethical concerns related to patient confidentiality remain. Although legal protections have been implemented, in practice, EHRs may be still prone to breaches that threaten patient privacy. Potential safeguards are essential, and have been implemented especially in sensitive areas such as mental illness, substance abuse, and sexual health. Features of one institutional model are described that may illustrate the efforts to both ensure adequate transparency and ensure patient confidentiality. Trust and the therapeutic alliance are critical to the provider-patient relationship and quality healthcare services. All of the benefits of an EHR are only possible if patients retain confidence in the security and accuracy of their medical records.

  9. Improved Message Authentication and Confidentiality Checking

    International Nuclear Information System (INIS)

    Ismail Jabiullah, M.; Abdullah Al-Shamim, M.; Lutfar Rahman, M.

    2005-01-01

    The most confusing areas of the secured network communications are the message authentication and confidentiality checking. The attacks and the counter measures have become so convoluted that the users in this area begin to account for all contingencies. Two session-key generation techniques are used here to generate two separate session keys K 1 and K 2 ; and both the sender and the reveiver share these keys for higher degree of authentication and confidentiality. For this, the message is first encrypted by the key K 1 , and then the intermediary message authenticatin code (MAC) is generated by encrypting the encrypted message using the key K 2 . Then, the encrypted message and the intermediary MAC is again encrypted by using the K 2 and concatenated with the encrypted message and sent to the destination. At the receiving end, first, the received ciphertext is encrypted by using key K 2 and compared to the received MAC. The received ciphertext again is decrypted by the key K 2 and compared with the first decrypted MAC twice by the key K 2 . The plaintext is obtained by decrypting the received ciphertext first by K 2 and then by K 1 , using the corresponding decryption techniques respectively. The encryption techniques with key K 2 provides the authentication and with key K 1 provides the confidentiality checking of the transmitted message. The developed technique can be applied to both academic and commercial applications in online or offline electronic transactions for security.(authors)

  10. Practical State Machine Replication with Confidentiality

    Energy Technology Data Exchange (ETDEWEB)

    Duan, Sisi [ORNL; Zhang, Haibin [University of North Carolina, Chapel Hill

    2016-01-01

    We study how to enable arbitrary randomized algorithms in Byzantine fault-tolerant (BFT) settings. We formalize a randomized BFT protocol and provide a simple and efficient construction that can be built on any existing BFT protocols while adding practically no overhead. We go one step further to revisit a confidential BFT protocol (Yin et al., SOSP '03). We show that their scheme is potentially susceptible to safety and confidentiality attacks. We then present a new protocol that is secure in the stronger model we formalize, by extending the idea of a randomized BFT protocol. Our protocol uses only efficient symmetric cryptography, while Yin et al.'s uses costly threshold signatures. We implemented and evaluated our protocols on microbenchmarks and real-world use cases. We show that our randomized BFT protocol is as efficient as conventional BFT protocols, and our confidential BFT protocol is two to three orders of magnitude faster than Yin et al.'s, which is less secure than ours.

  11. Access control and confidentiality in radiology

    Science.gov (United States)

    Noumeir, Rita; Chafik, Adil

    2005-04-01

    A medical record contains a large amount of data about the patient such as height, weight and blood pressure. It also contains sensitive information such as fertility, abortion, psychiatric data, sexually transmitted diseases and diagnostic results. Access to this information must be carefully controlled. Information technology has greatly improved patient care. The recent extensive deployment of digital medical images made diagnostic images promptly available to healthcare decision makers, regardless of their geographic location. Medical images are digitally archived, transferred on telecommunication networks, and visualized on computer screens. However, with the widespread use of computing and communication technologies in healthcare, the issue of data security has become increasingly important. Most of the work until now has focused on the security of data communication to ensure its integrity, authentication, confidentiality and user accountability. The mechanisms that have been proposed to achieve the security of data communication are not specific to healthcare. Data integrity can be achieved with data signature. Data authentication can be achieved with certificate exchange. Data confidentiality can be achieved with encryption. User accountability can be achieved with audits. Although these mechanisms are essential to ensure data security during its transfer on the network, access control is needed in order to ensure data confidentiality and privacy within the information system application. In this paper, we present and discuss an access control mechanism that takes into account the notion of a care process. Radiology information is categorized and a model to enforce data privacy is proposed.

  12. Research Participants' Understanding of and Reactions to Certificates of Confidentiality.

    Science.gov (United States)

    Beskow, Laura M; Check, Devon K; Ammarell, Natalie

    2014-01-01

    Certificates of Confidentiality are intended to facilitate participation in critical public health research by protecting against forced disclosure of identifying data in legal proceedings, but little is known about the effect of Certificate descriptions in consent forms. To gain preliminary insights, we conducted qualitative interviews with 50 HIV-positive individuals in Durham, North Carolina to explore their subjective understanding of Certificate descriptions and whether their reactions differed based on receiving a standard versus simplified description. Most interviewees were neither reassured nor alarmed by Certificate information, and most said it would not influence their willingness to participate or provide truthful information. However, compared with those receiving the simplified description, more who read the standard description said it raised new concerns, that their likelihood of participating would be lower, and that they might be less forthcoming. Most interviewees said they found the Certificate description clear, but standard-group participants often found particular words and phrases confusing, while simplified-group participants more often questioned the information's substance. Valid informed consent requires comprehension and voluntariness. Our findings highlight the importance of developing consent descriptions of Certificates and other confidentiality protections that are simple and accurate. These qualitative results provide rich detail to inform a larger, quantitative study that would permit further rigorous comparisons.

  13. Ex vivo assessment of genotoxicity and cytotoxicity in murine fibroblasts exposed to white MTA or white Portland cement with 15% bismuth oxide.

    Science.gov (United States)

    Zeferino, E G; Bueno, C E S; Oyama, L M; Ribeiro, D A

    2010-10-01

    To evaluate whether white mineral trioxide aggregate (MTA) or white Portland cement with 15% bismuth oxide were able to induce genetic damage and cellular death ex vivo. Aliquots of 1 × 10(4) murine fibroblasts were incubated at 37 °C for 3 h with MTA (white) or white Portland cement with 15% bismuth oxide, at final concentrations ranging from 10 to 1000 μg mL(-1) individually. Data of three independent repeats from the comet assay and the trypan blue exclusion test were assessed by the one-way anova followed by Tukey's test. Mineral trioxide aggregate or Portland cement containing bismuth oxide did not produce genotoxic effects with respect to the single-cell gel (comet) assay data for all concentrations evaluated. Furthermore, no cytotoxicity was observed for MTA or Portland cement. White MTA or white Portland cement containing 15% bismuth oxide were not genotoxic and cytotoxic. © 2010 International Endodontic Journal.

  14. Effect of diode laser irradiation on the apical sealing of MTA retrofillings Efeito da irradiação de laser de diodo no selamento apical em retrobturações com MTA

    Directory of Open Access Journals (Sweden)

    Eliana Barbosa de Souza

    2006-09-01

    Full Text Available Apical sealing is essential for the success of paraendodontic surgery, so any procedure that may favor an adequate sealing of the apical remainder should be performed. The purpose of this study was to evaluate the influence of diode laser irradiation on the apical sealing of root-end cavities with MTA retrofillings. Root canals in twenty extracted human teeth were shaped with K-files and filled with gutta-percha. The apexes were cut off and root-end preparations were performed. The roots were divided randomly in 2 groups. Group 1 (ten specimens was retrofilled with MTA. Group 2 was irradiated with diode laser, with 1 W for 20 seconds, on the apical surface and root end cavity before retrofilling with MTA. The specimens had their external surfaces impermeabilized with cyanoacrylate, except for the apical surface, and were then immersed in 1% rhodamine B dye for 72 h and placed in plaster stone. After that, the specimens were submitted to longitudinal abrasion until half of the root remained. The linear dye leakage was observed in these mid-roots between the root canal wall and retrofilling. The linear dye leakage was measured with Image Lab software, and the results were statistically analyzed with Student's t test. There were no statistically significant differences between the two groups (p > 0.05. The diode laser irradiation did not improve the apical sealing of MTA retrofillings under the conditions of this in vitro study.O selamento apical é fundamental para o sucesso da cirurgia parendodôntica. Assim, procedimentos que melhorem o selamento do remanescente apical devem ser utilizados. O objetivo deste estudo foi verificar se a irradiação de laser de diodo poderia aumentar o selamento apical em cavidades retrógradas obturadas com MTA. Foram utilizadas 20 raízes de dentes humanos extraídos que, após preparo com lima tipo K, tiveram seus canais obturados com guta-percha. Os ápices foram cortados e sofreram preparo de cavidades retr

  15. Paternalistic breaches of confidentiality in prison: mental health professionals' attitudes and justifications.

    Science.gov (United States)

    Elger, Bernice Simone; Handtke, Violet; Wangmo, Tenzin

    2015-06-01

    This manuscript presents mental health practitioners' (MHPs) practice, attitudes and justifications for breaching confidentiality when imprisoned patients disclose suicidal thoughts or abuse by others. 24 MHPs working in Swiss prisons shared their experiences regarding confidentiality practices. The data were analysed qualitatively and MHPs' attitudes and course of action were identified. Analysis revealed paternalistic breaches of confidentiality. When patients reported suicidal thoughts and abuse, MHPs believed that forgoing confidentiality is necessary to protect patients, providing several justifications for it. Patients were informed that such information will be transmitted without their consent to medical and non-medical prison personnel. With reference to suicidal attempts, MHPs resorted to methods that may reduce suicidal attempts such as transfer to hospital or internal changes in living arrangements, which would require provision of certain information to prison guards. In cases of abuse, some MHPs convinced patients to accept intervention or sometimes overrode competent patients' refusals to report. Also in the case of abuse, provision of limited information to other prison personnel was seen as an acceptable method to protect patients from further harm. Breaches of confidentiality, whether limited or full, remain unethical, when used for competent patients based solely on paternalistic justifications. Institutionalising ethical and legal procedures to address suicidal and abuse situations would be helpful. Education and training to help both medical and prison personnel to respond to such situations in an appropriate manner that ensures confidentiality and protects patients from suicide and abuse are necessary. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://group.bmj.com/group/rights-licensing/permissions.

  16. Confidentiality, anonymity and amnesty for midwives in distress seeking online support - Ethical?

    Science.gov (United States)

    Pezaro, Sally; Clyne, Wendy; Gerada, Clare

    2018-06-01

    Midwife health is intrinsically linked to the quality of safe patient care. To ensure safe patient care, there is a need to deliver emotional support to midwives. One option that midwives may turn to may be a confidential online intervention, instead of localised, face-to-face support. Following the Realist And MEta-narrative Evidence Syntheses: Evolving Standards publication standards, this realist synthesis approach explores the ethical considerations in permitting confidentiality, anonymity and amnesty in online interventions to support midwives in work-related psychological distress. An iterative search methodology was used to select nine papers for review. To assimilate information, papers were examined for ideas relating to ethical dimensions of online interventions to support midwives in work-related psychological distress. This review takes a narrative approach. Online interventions can support the development of insight, help seeking and open discussion. Additionally, Internet support groups can become morally persuasive in nature. Anonymity and confidentiality are both effective and therapeutic features of online interventions when used in collaboration with effective online moderation. Yet, ethical dilemmas remain where users cannot be identified. Confidentiality and anonymity remain key components of successful online interventions. However, sanctioning the corollary component of amnesty may provoke moral discomfort for those seeking immediate accountability. For others, amnesty is seen as essential for open disclosure and help seeking. Ultimately, the needs of midwives must be balanced with the requirement to protect the public and the professional reputation of midwifery. In supporting midwives online, the principles of anonymity, confidentiality and amnesty may evoke some resistance on ethical grounds. However, without offering identity protection, it may not be possible to create effective online support services for midwives. The authors of this

  17. Dental Stem Cell Migration on Pulp Ceiling Cavities Filled with MTA, Dentin Chips, or Bio-Oss

    Directory of Open Access Journals (Sweden)

    Stefania Lymperi

    2015-01-01

    Full Text Available MTA, Bio-Oss, and dentin chips have been successfully used in endodontics. The aim of this study was to assess the adhesion and migration of dental stem cells on human pulp ceiling cavities filled with these endodontic materials in an experimental model, which mimics the clinical conditions of regenerative endodontics. Cavities were formed, by a homemade mold, on untouched third molars, filled with endodontic materials, and observed with electron microscopy. Cells were seeded on cavities’ surface and their morphology and number were analysed. The phenomenon of tropism was assessed in a migration assay. All three materials demonstrated appropriate microstructures for cell attachment. Cells grew on all reagents, but they showed a differential morphology. Moreover, variations were observed when comparing cells numbers on cavity’s filling versus the surrounding dentine disc. The highest number of cells was recorded on dentin chips whereas the opposite was true for Bio-Oss. This was confirmed in the migration assay where a statistically significant lower number of cells migrated towards Bio-Oss as compared to MTA and dentin chips. This study highlights that MTA and dentin chips have a greater potential compared to Bio-Oss regarding the attraction of dental stem cells and are good candidates for bioengineered pulp regeneration.

  18. Microbial leakage of MTA, Portland cement, Sealapex and zinc oxide-eugenol as root-end filling materials.

    Science.gov (United States)

    Estrela, Carlos; Estrada-Bernabé, Pedro-Felício; de Almeida-Decurcio, Daniel; Almeida-Silva, Julio; Rodrigues-Araújo-Estrela, Cyntia; Poli-Figueiredo, José-Antonio

    2011-05-01

    The aim of this study was to compare the microbial leakage of mineral trioxide aggregate (MTA), Portland cement (PC), Sealapex and zinc oxide-eugenol (ZOE) as root-end filling materials. An in vitro microbial leakage test (MLT) with a split chamber was used in this study. A mixture of facultative bacteria and one yeast (S. aureus+E. faecalis+P. aeruginosa+B. subtilis+C. albicans) was placed in the upper chamber and it could only reach the lower chamber containing Brain Heart Infusion broth by way of leakage through the root-end filling. Microbial leakage was observed daily for 60 days. Sixty maxillary anterior human teeth were randomly assigned to different groups--MTA and PC (gray and white), Sealapex+zinc oxide and ZOE, control groups and subgroups to evaluate the influence of EDTA for smear layer removal. These materials were further evaluated by an agar diffusion test (ADT) to verify their antimicrobial efficacy. Data were analyzed statistically by Kruskal-Wallis and Mann-Whitney test. In the MLT, Sealapex+zinc oxide and ZOE did not show evidence of microbial leakage over the 60-day experimental period. The other materials showed leakage from the 15th day. The presence of smear layer influenced microbial leakage. Microbial inhibition zones were not observed in all samples tested by ADT. Sealapex+zinc oxide and ZOE did not show microbial leakage over the experimental period, whereas it was verified within 15 to 45 days in MTA and Portland cement.

  19. Periradicular Tissue Responses to Biologically Active Molecules or MTA When Applied in Furcal Perforation of Dogs' Teeth

    Directory of Open Access Journals (Sweden)

    Anna Zairi

    2012-01-01

    Full Text Available The aim of this study was the comparative evaluation of inflammatory reactions and tissue responses to four growth factors, or mineral trioxide aggregate (MTA, or a zinc-oxide-eugenol-based cement (IRM as controls, when used for the repair of furcal perforations in dogs’ teeth. Results showed significantly higher inflammatory cell response in the transforming growth factorβ1 (TGFβ1 and zinc-oxide-eugenol-based cement (IRM groups and higher rates of epithelial proliferation in the TGFβ1, basic fibroblast growth factor (bFGF, and insulin growth factor-I (IGF-I groups compared to the MTA. Significantly higher rates of bone formation were found in the control groups compared to the osteogenic protein-1 (OP-1. Significantly higher rates of cementum formation were observed in the IGF-I and bFGF groups compared to the IRM. None of the biologically active molecules can be suggested for repairing furcal perforations, despite the fact that growth factors exerted a clear stimulatory effect on cementum formation and inhibited collagen capsule formation. MTA exhibited better results than the growth factors.

  20. Biocompatibility and setting time of CPM-MTA and white Portland cement clinker with or without calcium sulfate.

    Science.gov (United States)

    Bramante, Clovis Monteiro; Kato, Marcia Magro; Assis, Gerson Francisco de; Duarte, Marco Antonio Hungaro; Bernardineli, Norberti; Moraes, Ivaldo Gomes de; Garcia, Roberto Brandão; Ordinola-Zapata, Ronald; Bramante, Alexandre Silva

    2013-01-01

    To evaluate the biocompatibility and the setting time of Portland cement clinker with or without 2% or 5% calcium sulfate and MTA-CPM. Twenty-four mice (Rattus norvegicus) received subcutaneously polyethylene tubes filled with Portland cement clinker with or without 2% or 5% calcium sulfate and MTA. After 15, 30 and 60 days of implantation, the animals were killed and specimens were prepared for microscopic analysis. For evaluation of the setting time, each material was analyzed using Gilmore needles weighing 113.5 g and 456.5 g, according to the ASTM specification Number C266-08 guideline. Data were analyzed by ANOVA and Tukey's test for setting time and Kruskal-Wallis and Dunn test for biocompatibility at 5% significance level. Histologic observation showed no statistically significant difference of biocompatibility (p>0.05) among the materials in the subcutaneous tissues. For the setting time, clinker without calcium sulfate showed the shortest initial and final setting times (6.18 s/21.48 s), followed by clinker with 2% calcium sulfate (9.22 s/25.33 s), clinker with 5% calcium sulfate (10.06 s/42.46 s) and MTA (15.01 s/42.46 s). All the tested materials showed biocompatibility and the calcium sulfate absence shortened the initial and final setting times of the white Portland cement clinker.

  1. 13 CFR 120.1060 - Confidentiality of Reports, Risk Ratings and related Confidential Information.

    Science.gov (United States)

    2010-01-01

    ... other than SBA's Lender oversight and SBA's portfolio management purposes. An SBA Lender, Intermediary... conjunction with SBA's Lender Oversight Program and SBA's portfolio management (for purposes of this... 13 Business Credit and Assistance 1 2010-01-01 2010-01-01 false Confidentiality of Reports, Risk...

  2. A Comparative Study of Apical Healing of Open Apices Using MTA and Ca(OH2 Apical Plugs in Cats

    Directory of Open Access Journals (Sweden)

    M. H. Zarrabi

    2005-06-01

    Full Text Available Statement of problem: Endodontic treatment of necrotic teeth with open apices is a challenge. After ruling out surgery as a treatment scheme and introduction of the multivisit apexification which in turn had its disadvantages, apical plug seems to be a suitable substitute treatment plan for such cases. Apical plug makes the treatment through formation of a barrier against the obturating material in a single visit.Purpose: The purpose of this study was to compare histologically the periapical healing using MTA and calcium hydroxide apical plugs after intervals of 4 and 12 weeks in cats.Materials and Methods: In this clinical trial study 64 canines of 16 healthy and mature cats were divided into 3 groups after a periapical lesion formation by over instrumentation in the apical area with files up to no.120. The first group included 24 teeth on which MTA apical plug was applied. The second group included 24 teeth on which Ca (OH 2 apical plug was applied. In both groups the canals were filled with gutta percha and sealer. The third group included 16 control teeth whose canals were left empty after instrumentation and debridement. The access cavities of all teeth were sealed with varnish and amalgam and the vital perfusion of cats was performed in 4 and 12 week intervals. Statistical analysis was established by χ2 and independence test.Results: After 4 weeks, periapical healing in the first group was 90%, in the second group 80% and in the third group, it was only 12.5 %. After 12 weeks, periapical healing occurred in 100% of the MTA group, while it was 57.1% in the second and 40%in the third group .Generally, in the study of histological parameters of healing, no statistical significant difference was observed between the 2 experimental groups,although the MTA group results were much better than the Ca (OH 2 group especially at 12 weeks.Conclusion: The use of MTA apical plug is more effective than Ca (OH 2 in treatment of necrotic teeth with open

  3. Enzyme characteristics of aminotransferase FumI of Sphingopyxis sp. MTA144 for deamination of hydrolyzed fumonisin B₁.

    Science.gov (United States)

    Hartinger, Doris; Schwartz, Heidi; Hametner, Christian; Schatzmayr, Gerd; Haltrich, Dietmar; Moll, Wulf-Dieter

    2011-08-01

    Fumonisins are carcinogenic mycotoxins that are frequently found as natural contaminants in maize from warm climate regions around the world. The aminotransferase FumI is encoded as part of a gene cluster of Sphingopyxis sp. MTA144, which enables this bacterial strain to degrade fumonisin B(1) and related fumonisins. FumI catalyzes the deamination of the first intermediate of the catabolic pathway, hydrolyzed fumonisin B(1). We used a preparation of purified, His-tagged FumI, produced recombinantly in Escherichia coli in soluble form, for enzyme characterization. The structure of the reaction product was studied by NMR and identified as 2-keto hydrolyzed fumonisin B(1). Pyruvate was found to be the preferred co-substrate and amino group receptor (K (M) = 490 μM at 10 μM hydrolyzed fumonisin B(1)) of FumI, but other α-keto acids were also accepted as co-substrates. Addition of the co-enzyme pyridoxal phosphate to the enzyme preparation enhanced activity, and saturation was already reached at the lowest tested concentration of 10 μM. The enzyme showed activity in the range of pH 6 to 10 with an optimum at pH 8.5, and in the range of 6°C to 50°C with an optimum at 35°C. The aminotransferase worked best at low salt concentration. FumI activity could be recovered after preincubation at pH 4.0 or higher, but not lower. The aminotransferase was denatured after preincubation at 60°C for 1 h, and the residual activity was also reduced after preincubation at lower temperatures. At optimum conditions, the kinetic parameters K (M) = 1.1 μM and k (cat) = 104/min were determined with 5 mM pyruvate as co-substrate. Based on the enzyme characteristics, a technological application of FumI, in combination with the fumonisin carboxylesterase FumD for hydrolysis of fumonisins, for deamination and detoxification of hydrolyzed fumonisins seems possible, if the enzyme properties are considered.

  4. Privacy, confidentiality and automated health information systems.

    Science.gov (United States)

    Vuori, H

    1977-12-01

    Professor Vuori's paper, first presented at the fourth Medico-legal Conference in Prague in the spring of this year, deals with the problem of the maintenance of confidentiality in computerized health records. Although more and more information is required, the hardware of the computer systems is so sophisticated that it would be very expensive indeed to 'break in' and steal from a modern data bank. Those concerned with programming computers are becoming more aware of their responsibilities concerning confidentiality and privacy, to the extent that a legal code of ethics for programmers is being formulated. They are also aware that the most sensitive of all relationships--the doctor-patient relationship--could be in danger if they failed to maintain high standards of integrity. An area of danger is where administrative boundaries between systems must be crossed--say between those of health and employment. Protection of privacy must be ensured by releasing full information about the type of data being stored, and by maintaining democratic control over the establishment of information systems.

  5. Ombuds’ corner: Open door and confidentiality

    CERN Multimedia

    Vincent Vuillemin

    2013-01-01

    For the Open Days, CERN will be transparent for all visitors. It's also the occasion to remember that the Ombuds' door is fully open every day of the year for all persons working for or on behalf of CERN.   The door is open, but as soon as it's closed for a discussion, the office becomes a place where total confidentiality is preserved. This may appear as a contradiction, no? The Ombuds is available to help everyone in all circumstances, but his clause of confidentiality prevents him from acting without the consent of his “visitors”. How can he possibly resolve the in-house conflicts in groups, or units, if all the parties do not voluntarily participate in its resolution? The answer is clear: the job of the Ombuds is to help the parties resolve their conflict by themselves. He will provide a few rules of communication, a process of mutual respect, suggest some possibilities that the parties may want to follow, and mediate the dispute so that people...

  6. Confidential Declaration of Family Situation (CDFS)

    CERN Document Server

    Human Resources Department

    2005-01-01

    The Confidential Declaration of Family Situation (CDFS) becomes a new computerized EDH form from October 2005 In accordance with Article R IV 1.17 of the Staff Regulations, Staff Members and Fellows, married or separated, must notify any changes in their spouse's income or health insurance cover in writing to CERN, within 30 calendar days of the change. This is necessary for the Organization to determine if a supplementary contribution is payable to the CERN Health Insurance Scheme (CHIS) for the spouse's coverage and, if so, the amount. Until now a paper form called « Confidential Declaration of Family Situation » (CDFS) was used for that purpose.  From early October 2005 the CDFS will be computerized for the whole Organization. Henceforth, any changes in a spouse's income or health insurance cover must be notified using EDH (Electronic Document Handling). Additionally, annual updates of the declaration will be required and will be requested by automatic e-mail. Early October an email will be sent to...

  7. Confidential Declaration of Family Situation (CDFS)

    CERN Multimedia

    Human Resources Department

    2005-01-01

    The Confidential Declaration of Family Situation (CDFS) becomes a new computerized EDH form from October 2005 In accordance with Article R IV 1.17 of the Staff Regulations, Staff Members and Fellows, married or separated, must notify any changes in their spouse's income or health insurance cover in writing to CERN, within 30 calendar days of the change. This is necessary for the Organization to determine if a supplementary contribution is payable to the CERN Health Insurance Scheme (CHIS) for the spouse's coverage and, if so, the amount. Until now a paper form called « Confidential Declaration of Family Situation » (CDFS) was used for that purpose.  From early October 2005 the CDFS will be computerized for the whole Organization. Henceforth, any changes in a spouse's income or health insurance cover must be notified using EDH (Electronic Document Handling). Additionally, annual updates of the declaration will be required and will be requested by automatic e-mail. Early October an email will be...

  8. Ensuring Confidentiality of Geocoded Health Data: Assessing Geographic Masking Strategies for Individual-Level Data.

    Science.gov (United States)

    Zandbergen, Paul A

    2014-01-01

    Public health datasets increasingly use geographic identifiers such as an individual's address. Geocoding these addresses often provides new insights since it becomes possible to examine spatial patterns and associations. Address information is typically considered confidential and is therefore not released or shared with others. Publishing maps with the locations of individuals, however, may also breach confidentiality since addresses and associated identities can be discovered through reverse geocoding. One commonly used technique to protect confidentiality when releasing individual-level geocoded data is geographic masking. This typically consists of applying a certain amount of random perturbation in a systematic manner to reduce the risk of reidentification. A number of geographic masking techniques have been developed as well as methods to quantity the risk of reidentification associated with a particular masking method. This paper presents a review of the current state-of-the-art in geographic masking, summarizing the various methods and their strengths and weaknesses. Despite recent progress, no universally accepted or endorsed geographic masking technique has emerged. Researchers on the other hand are publishing maps using geographic masking of confidential locations. Any researcher publishing such maps is advised to become familiar with the different masking techniques available and their associated reidentification risks.

  9. Ensuring Confidentiality of Geocoded Health Data: Assessing Geographic Masking Strategies for Individual-Level Data

    Directory of Open Access Journals (Sweden)

    Paul A. Zandbergen

    2014-01-01

    Full Text Available Public health datasets increasingly use geographic identifiers such as an individual’s address. Geocoding these addresses often provides new insights since it becomes possible to examine spatial patterns and associations. Address information is typically considered confidential and is therefore not released or shared with others. Publishing maps with the locations of individuals, however, may also breach confidentiality since addresses and associated identities can be discovered through reverse geocoding. One commonly used technique to protect confidentiality when releasing individual-level geocoded data is geographic masking. This typically consists of applying a certain amount of random perturbation in a systematic manner to reduce the risk of reidentification. A number of geographic masking techniques have been developed as well as methods to quantity the risk of reidentification associated with a particular masking method. This paper presents a review of the current state-of-the-art in geographic masking, summarizing the various methods and their strengths and weaknesses. Despite recent progress, no universally accepted or endorsed geographic masking technique has emerged. Researchers on the other hand are publishing maps using geographic masking of confidential locations. Any researcher publishing such maps is advised to become familiar with the different masking techniques available and their associated reidentification risks.

  10. A comparative study of BioAggregate and ProRoot MTA on adhesion, migration, and attachment of human dental pulp cells.

    Science.gov (United States)

    Zhu, Lingxin; Yang, Jingwen; Zhang, Jie; Peng, Bin

    2014-08-01

    The aim of the present study was to evaluate the effects of a novel bioceramic nanoparticular cement, BioAggregate (Innovative Bioceramix, Vancouver, BC, Canada), on the adhesion, migration, and attachment of human dental pulp cells (HDPCs) and to compare its performance with that of ProRoot mineral trioxide aggregate (MTA) (Dentsply, Tulsa, OK). Primary cultured HDPCs were treated with various dilutions of BioAggregate and MTA extracts to assess the cell viability using the Cell Counting Kit-8 (Dojindo, Kumamoto, Japan). Cell adhesion assay was performed using type I collagen-coated plates. An in vitro scratch wound healing model was used to determine cell migration. Focal adhesion formation and cytoskeleton organization were further examined by double immunofluorescence labeling for vinculin and fibrous actin. To assess cell attachment, HDPCs were directly seeded onto the material surfaces and observed by scanning electron microscopy. HDPCs exposed to BioAggregate extracts showed the highest viabilities at all extract concentrations at 24 and 48 hours, whereas cells exposed to original MTA extracts displayed suppressed viabilities at 72 hours compared with the control. Treatment with BioAggregate extracts enhanced cellular adhesion and migration of HDPCs in a concentration-dependent manner, which was superior to the effects induced by MTA extracts. Immunofluorescence staining indicated that both BioAggregate and MTA optimized focal adhesion formation and stress fiber assembly. Furthermore, scanning electron microscopic analysis revealed that HDPCs attached onto BioAggregate were more flattened and exhibited better spreading than cells on MTA. BioAggregate is able to promote cellular adhesion, migration, and attachment of HDPCs, indicating its excellent cytocompatibility. Therefore, BioAggregate appears to be a possible alternative to MTA for pulp capping. Copyright © 2014 American Association of Endodontists. Published by Elsevier Inc. All rights reserved.

  11. 12 CFR 563g.13 - Public disclosure and confidential treatment.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 5 2010-01-01 2010-01-01 false Public disclosure and confidential treatment. 563g.13 Section 563g.13 Banks and Banking OFFICE OF THRIFT SUPERVISION, DEPARTMENT OF THE TREASURY SECURITIES OFFERINGS § 563g.13 Public disclosure and confidential treatment. (a) Any offering circular...

  12. 7 CFR 1205.540 - Confidential books, records, and reports.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 10 2010-01-01 2010-01-01 false Confidential books, records, and reports. 1205.540 Section 1205.540 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL... Confidential books, records, and reports. All information obtained from the books, records, and reports of...

  13. 19 CFR 210.5 - Confidential business information.

    Science.gov (United States)

    2010-04-01

    ... 19 Customs Duties 3 2010-04-01 2010-04-01 false Confidential business information. 210.5 Section 210.5 Customs Duties UNITED STATES INTERNATIONAL TRADE COMMISSION INVESTIGATIONS OF UNFAIR PRACTICES IN IMPORT TRADE ADJUDICATION AND ENFORCEMENT Rules of General Applicability § 210.5 Confidential...

  14. Client confidentiality: Perspectives of students in a healthcare ...

    African Journals Online (AJOL)

    This moral dilemma is difficult for students to circumvent and therefore this paper presents healthcare students' perspectives of confidentiality. Methods. We aimed to explore healthcare students' views and experiences of confidentiality as an ethical principle by adopting a qualitative explorative approach. Purposeful ...

  15. Library Records: A Review of Confidentiality Laws and Policies.

    Science.gov (United States)

    Million, Angela C.; Fisher, Kim N.

    1986-01-01

    Cites the importance of having a state law, knowing what it says, and having a library policy statement regarding the confidentiality of patron records. Discussion covers writing and implementing a policy, the role of automation, existing laws, library records defined, exceptions to confidentiality, and legal liability. Thirty-seven references are…

  16. 29 CFR 4010.13 - Confidentiality of information submitted.

    Science.gov (United States)

    2010-07-01

    ... REPORTING AND DISCLOSURE REQUIREMENTS ANNUAL FINANCIAL AND ACTUARIAL INFORMATION REPORTING § 4010.13 Confidentiality of information submitted. In accordance with § 4901.21(a)(3) of this chapter and ERISA section... 29 Labor 9 2010-07-01 2010-07-01 false Confidentiality of information submitted. 4010.13 Section...

  17. 20 CFR 726.113 - Disclosure of confidential information.

    Science.gov (United States)

    2010-04-01

    ... MINE OPERATOR'S INSURANCE Authorization of Self-Insurers § 726.113 Disclosure of confidential... 20 Employees' Benefits 3 2010-04-01 2010-04-01 false Disclosure of confidential information. 726... authorized self-insurer or applicant for the authorization of self-insurance obtained by the Office shall be...

  18. 15 CFR 718.2 - Identification of confidential business information.

    Science.gov (United States)

    2010-01-01

    ... business information. 718.2 Section 718.2 Commerce and Foreign Trade Regulations Relating to Commerce and Foreign Trade (Continued) BUREAU OF INDUSTRY AND SECURITY, DEPARTMENT OF COMMERCE CHEMICAL WEAPONS CONVENTION REGULATIONS CONFIDENTIAL BUSINESS INFORMATION 718.2 Identification of confidential business...

  19. 19 CFR 181.121 - Maintenance of confidentiality.

    Science.gov (United States)

    2010-04-01

    ... 181.121 Customs Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY; DEPARTMENT OF THE TREASURY (CONTINUED) NORTH AMERICAN FREE TRADE AGREEMENT Confidentiality of Business... possession of confidential business information collected pursuant to this part shall, in accordance with...

  20. 75 FR 75586 - Confidentiality of Suspicious Activity Reports

    Science.gov (United States)

    2010-12-03

    ...] RIN 1550-AC26 Confidentiality of Suspicious Activity Reports AGENCY: The Office of Thrift Supervision... implementing the Bank Secrecy Act (BSA) governing the confidentiality of a suspicious activity report (SAR) to... corporations regulated by the OTS, to keep certain records and make certain reports that have been determined...

  1. Confidentiality: From the Stacks to the Witness Stand.

    Science.gov (United States)

    Lee, Janis M.; Smith, G. Guy

    1988-01-01

    A library director describes her experience of safeguarding the confidentiality of the circulation records of a woman who went on a shooting rampage at a shopping mall. The lawyer who represented the library discusses the legal responsibility of public and school libraries concerning confidentiality. (CLB)

  2. 50 CFR 600.130 - Protection of confidentiality of statistics.

    Science.gov (United States)

    2010-10-01

    ... statistics. 600.130 Section 600.130 Wildlife and Fisheries FISHERY CONSERVATION AND MANAGEMENT, NATIONAL... Fishery Management Councils § 600.130 Protection of confidentiality of statistics. Each Council must establish appropriate procedures for ensuring the confidentiality of the statistics that may be submitted to...

  3. 42 CFR 35.11 - Clinical records; confidential.

    Science.gov (United States)

    2010-10-01

    ... EXAMINATIONS HOSPITAL AND STATION MANAGEMENT General § 35.11 Clinical records; confidential. A complete clinical record shall be maintained for each patient admitted to a station or hospital of the Service. Such... 42 Public Health 1 2010-10-01 2010-10-01 false Clinical records; confidential. 35.11 Section 35.11...

  4. Genetic secrets: Protecting privacy and confidentiality in the genetic era

    Energy Technology Data Exchange (ETDEWEB)

    Rothstein, M.A. [ed.

    1998-07-01

    Few developments are likely to affect human beings more profoundly in the long run than the discoveries resulting from advances in modern genetics. Although the developments in genetic technology promise to provide many additional benefits, their application to genetic screening poses ethical, social, and legal questions, many of which are rooted in issues of privacy and confidentiality. The ethical, practical, and legal ramifications of these and related questions are explored in depth. The broad range of topics includes: the privacy and confidentiality of genetic information; the challenges to privacy and confidentiality that may be projected to result from the emerging genetic technologies; the role of informed consent in protecting the confidentiality of genetic information in the clinical setting; the potential uses of genetic information by third parties; the implications of changes in the health care delivery system for privacy and confidentiality; relevant national and international developments in public policies, professional standards, and laws; recommendations; and the identification of research needs.

  5. Confidentiality in participatory research: Challenges from one study.

    Science.gov (United States)

    Petrova, Elmira; Dewing, Jan; Camilleri, Michelle

    2016-06-01

    This article presents key ethical challenges that were encountered when conducting a participatory qualitative research project with a very specific, small group of nurses, in this case with practice development nurses in Malta. With the small number of nurses employed in practice development roles in Malta, there are numerous difficulties of maintaining confidentiality. Poorly constructed interventions by the researcher could have resulted in detrimental effects to research participants and the overall trustworthiness of the research. Generally, ethical guidelines for research exist to reinforce validity of research; however, there is not an established consensus on how these strategies can be utilised in some types of qualitative field work. The researcher used an exploratory case study methodology. The sample consisted of 10 participants who were interviewed twice using face-to-face interviews, over a period of 2 months. The study was ethically reviewed by the University Research Ethics Committee and the Faculty Research Ethics Committee, University of Malta. The participants referred to in this article have been given adequate information about the study and their consent has been obtained. Numerous strategies for ensuring confidentiality during recruitment of the participants, during data collection, during transcription and data analysis and during dissemination of research results assisted the researcher in responding to potential and actual ethical issues. This article emphasises the main strategies that can be used to respond to ethical challenges when researching with a small easily identifiable group. The learning discussed here may be relevant to or even transferable to other similar research studies or research contexts. These methods fostered a greater credibility throughout the research process and predisposed the participants to greater trust, and thus, they disclosed their experiences and speak more freely, thus enhancing the quality of the study

  6. Ex vivo analysis of marginal apical sealing ability of a mta Fillapex® = Avaliação ex vivo do selamento apical marginal do mta Fillapex®

    Directory of Open Access Journals (Sweden)

    Pinto, Nilce Mendes Faria

    2015-01-01

    Full Text Available Objetivos: O presente estudo teve como objetivo avaliar ex vivo a capacidade de selamento apical do cimento endodôntico MTA FILLAPEX® comparando com Sealapex, Pulp Canal Sealer e AH26. Metodologia: Foi avaliada a capacidade deste cimento em prevenir a infiltração de uma cultura de Enterococcus Faecalis através da obturação do canal radicular. Foram utilizados 48 dentes unirradiculados de humanos, que depois de instrumentados e obturados pela técnica da condensação vertical da guta-percha aquecida, foram divididos em 4 grupos experimentais (n=10, um grupo controle positivo (n=4, ou um grupo controle negativo (n=4. A inoculação microbiana foi realizada a cada três dias, sempre com cultura de 24 horas, durante um período de 60 dias. Os dados foram tabulados e analisados estatisticamente por Análise de Sobrevivência, onde se comparou o desempenho dos quatro cimentos, utilizando o Teste Log-Rank Resultados: Os resultados mostraram que o grupo obturado com MTA FILLAPEX®, apresentou todas as amostras infiltradas. Os cimentos Sealapex e Pulp Canal Sealer apresentaram 90 e 80 e 30% de amostras infiltradas respectivamente. O cimento AH26 foi significativamente mais eficiente em retardar a infiltração, embora com 30% das amostras infiltradas. Conclusão: O cimento MTA FILLAPEX® quando comparado aos outros cimentos avaliados, apresentou a maior infiltração frente a uma cultura de Enterococcus Faecalis

  7. Physician Knowledge and Attitudes around Confidential Care for Minor Patients.

    Science.gov (United States)

    Riley, Margaret; Ahmed, Sana; Reed, Barbara D; Quint, Elisabeth H

    2015-08-01

    Minor adolescent patients have a legal right to access certain medical services confidentially without parental consent or notification. We sought to assess physicians' knowledge of these laws, attitudes around the provision of confidential care to minors, and barriers to providing confidential care. An anonymous online survey was sent to physicians in the Departments of Family Medicine, Internal Medicine-Pediatrics, Obstetrics/Gynecology, and Pediatrics at the University of Michigan. Response rate was 40% (259/650). The majority of physicians felt comfortable addressing sexual health, mental health, and substance use with adolescent patients. On average, physicians answered just over half of the legal knowledge questions correctly (mean 56.6% ± 16.7%). The majority of physicians approved of laws allowing minors to consent for confidential care (90.8% ± 1.7% approval), while substantially fewer (45.1% ± 4.5%) approved of laws allowing parental notification of this care at the physician's discretion. Most physicians agreed that assured access to confidential care should be a right for adolescents. After taking the survey most physicians (76.6%) felt they needed additional training on confidentiality laws. The provision of confidential care to minors was perceived to be most inhibited by insurance issues, parental concerns/relationships with the family, and issues with the electronic medical record. Physicians are comfortable discussing sensitive issues with adolescents and generally approve of minor consent laws, but lack knowledge about what services a minor can access confidentially. Further research is needed to assess best methods to educate physicians about minors' legal rights to confidential healthcare services. Copyright © 2015 North American Society for Pediatric and Adolescent Gynecology. Published by Elsevier Inc. All rights reserved.

  8. Protecting Privacy and Confidentiality in Environmental Health Research.

    Science.gov (United States)

    Resnik, David B

    2010-01-01

    Environmental health researchers often need to make difficult decisions on how to protect privacy and confidentiality when they conduct research in the home or workplace. These dilemmas are different from those normally encountered in clinical research. Although protecting privacy and confidentiality is one of the most important principles of research involving human subjects, it can be overridden to prevent imminent harm to individuals or if required by law. Investigators should carefully consider the facts and circumstances and use good judgment when deciding whether to breach privacy or confidentiality.

  9. Ethics in health care: confidentiality and information technologies

    African Journals Online (AJOL)

    information could result in confidential patient data falling ... Before the advent of the new communication and information technologies (NCITs), patient care was sometimes delayed .... computer system intended to be used and the security.

  10. Novel approach to information security management of confidential ...

    African Journals Online (AJOL)

    Novel approach to information security management of confidential and propriety information ... Journal of Fundamental and Applied Sciences ... valuable information by using steganography it can have a major impact security management.

  11. Privacy Perspectives for Online Searchers: Confidentiality with Confidence?

    Science.gov (United States)

    Duberman, Josh; Beaudet, Michael

    2000-01-01

    Presents issues and questions involved in online privacy from the information professional's perspective. Topics include consumer concerns; query confidentiality; securing computers from intrusion; electronic mail; search engines; patents and intellectual property searches; government's role; Internet service providers; database mining; user…

  12. 7 CFR 983.9 - Confidential data or information.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 8 2010-01-01 2010-01-01 false Confidential data or information. 983.9 Section 983.9 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (Marketing... customers. ...

  13. 40 CFR 86.615-84 - Treatment of confidential information.

    Science.gov (United States)

    2010-07-01

    ...) Selective Enforcement Auditing of New Light-Duty Vehicles, Light-Duty Trucks, and Heavy-Duty Vehicles § 86... part 2, subpart B. (b) Any claim of confidentiality must accompany the information at the time it is...

  14. Building Trust and Confidentiality in Cloud computing Distributed ...

    African Journals Online (AJOL)

    new technology, this new way of doing business brings with it new challenges, ... In this paper, we looked at data security, described the current state of data ... has the potential to solve many threats concerning confidentiality and adoption of

  15. A randomized clinical trial on the use of medical Portland cement, MTA and calcium hydroxide in indirect pulp treatment.

    Science.gov (United States)

    Petrou, Marina Agathi; Alhamoui, Fadi Alhaddad; Welk, Alexander; Altarabulsi, Mohammed Basel; Alkilzy, Mohammed; H Splieth, Christian

    2014-01-01

    Studies on indirect pulp treatment (IPT) show varying success rates of 73 to 97 %. The necessity of re-opening the cavity and the question of the optimal capping material is still under debate. The aim of this prospective in vivo study was to compare the clinical and microbiological outcomes of mineral trioxide aggregate (MTA), medical Portland cement, and calcium hydroxide on the dentin-pulp complex of permanent and primary teeth treated with two-step IPT. In 86 regular patients (51 % men; 49 % women; age 17.2 years ±13.8), one deep carious lesion each was treated with incomplete caries removal, randomly selected capping with either calcium hydroxide (n = 31), medical Portland cement (29) or white MTA (26), and re-entry (6.3 months ±1.0). Clinical (color, humidity, and consistency of dentin) and microbiological (Lactobacilli/Mutans Strep. counts) parameters were recorded at the first and second treatment. The IPT had a high success rate of 90.3 % regardless of the material used (p = 0.72). The arrested lesions showed consistently darker, dry, and therefore, sclerotic dentine (p Portland cement. The findings of this study could promote the improvement of the IPT as a one-step treatment of deep carious lesions when the remaining demineralized dentin would be sealed with durable restorations.

  16. Comparative evaluation of antimicrobial activity of three cements: new endodontic cement (NEC), mineral trioxide aggregate (MTA) and Portland.

    Science.gov (United States)

    Hasan Zarrabi, Mohammad; Javidi, Maryam; Naderinasab, Mahboube; Gharechahi, Maryam

    2009-09-01

    Using the agar diffusion method, we conducted an in vitro study to evaluate the antimicrobial activity of mineral trioxide aggregate (MTA), new endodontic cement (NEC) and Portland cement at different concentrations against five different microorganisms. A base layer was made using Muller-Hinton agar for Escherichia coli (ATCC 10538) and Candida (ATCC 10231). For Actinomyces viscosus (ATCC 15987), Enterococcus faecalis (ATCC 10541) and Streptococcus mutans (ATCC 25175) blood agar medium was used. Wells were formed by removing the agar, and the materials were placed in the well immediately after manipulation. The plates were kept at room temperature for 2 h for prediffusion, and then incubated at 37 degrees C for 72 h. The inhibition zones were then measured. The data were analyzed using ANOVA and the Tukey test to compare the differences among the three cements at different concentrations. The positive controls showed bacterial growth, while the negative controls showed no bacterial growth. All materials showed antimicrobial activity against the tested strains except for Enterococcus faecalis. NEC created larger inhibition zones than MTA and Portland cement. This difference was significant for Portland cement (P 0.05). Among the examined microorganisms, the largest inhibition zone was observed for Actinomyces group (P < 0.05). The antimicrobial activity of the materials increased with time and concentration (P < 0.05). It was concluded that NEC is a potent inhibitor of microorganism growth.

  17. Similar expression of through-and-through fluid movement along orthograde apical plugs of MTA Bio and white Portland cement.

    Science.gov (United States)

    De-Deus, G; Audi, C; Murad, C; Fidel, S; Fidel, R

    2008-12-01

    To compare the sealing ability of four hydraulic cements when used as an apical plug in teeth with wide-open apices. A sample of 70 maxillary central incisors were divided into four groups (n = 15) and a further 10 teeth served as controls. An artificial open apex was created in the teeth using Gates Glidden drills numbers 6-1 in a crown-down manner until the size 1 bur passed through the foramen. A divergent open apex was prepared to a size of 1.24 mm at the foramen by retrograde apical transportation using a number 8 (0.60) Profile Series 29 0.4 taper instrument inserted to the length of the cutting blade. In G1, the open apices were repaired with WMTA Angelus whilst in G2, G3 and G4 MTA Bio, Pro-Root MTA and Portland cement was employed respectively. Each root was assembled in a hermetic cell to allow the evaluation of fluid filtration. Leakage was measured by the movement of an air bubble travelling within a pipette connected to the teeth. Measurements of the air bubble movement were made after 10 min at a constant pressure of 50 cm H(2)O. The Kruskal-Wallis H-test was applied to the fluid flow data to detect differences between the experimental groups (P 0.05). Fluid movement through teeth with open apices and filled with four hydraulic cements was similar. All cements allowed fluid movement.

  18. Confidentiality, disclosure and doping in sports medicine.

    Science.gov (United States)

    McNamee, M; Phillips, N

    2011-03-01

    The manner in which healthcare and medical professionals serve their athlete patients is governed by a variety of relevant codes of conduct. A range of codified rules is presented that refer both the welfare of the patient and the maintaining of confidentiality, which is at the heart of trustworthy relations. The 2009 version of the World Anti-Doping Code (WADC), however, appears to oblige all healthcare professionals not to assist athletes if they are known to be engaged in doping behaviours under fear of removal from working with athletes from the respective sports. In contrast, serving the best interests of their athlete patients may oblige healthcare professionals to give advice and guidance, not least in terms of harm minimisation. In so far as the professional conduct of a healthcare professional is guided both by professional code and World Anti-Doping Code, they are obliged to fall foul of one or the other. We call for urgent and pressing inter-professional dialogue with the World Anti-Doping Agency to clarify this situation.

  19. WTO confidential: the case of asbestos.

    Science.gov (United States)

    Castleman, Barry

    2003-01-01

    The World Trade Organization (WTO), established in 1995, adjudicates "trade disputes" between member nations in cases with human rights, cultural, environmental, and public health significance. Throughout the resolution process and even after a case's conclusion, little of what happens is made accessible to the public. However, it is one thing to criticize the WTO for its lack of transparency from outside the process and another to critically examine what was withheld from disclosure and what dangers that presents. This is the inside story from a scientific adviser to one party in a WTO case, who analyzes what happened from a public health point of view. The analysis concludes that the public health justification for banning asbestos was accepted in the end by WTO economists, despite the WTO's bias in favor of the party (Canada) making the free trade challenge (to public health legislation), despite the WTO's lack of expertise in science, medicine, engineering, and public health, and despite important erroneous statements made to the WTO under the cover of confidentiality. The case nevertheless illustrates that the WTO's threat to national sovereignty could never withstand the light of day if the limitations and dangers of the process were open for all to see.

  20. Security without obscurity a guide to confidentiality, authentication, and integrity

    CERN Document Server

    Stapleton, JJ

    2014-01-01

    The traditional view of information security includes the three cornerstones: confidentiality, integrity, and availability; however the author asserts authentication is the third keystone. As the field continues to grow in complexity, novices and professionals need a reliable reference that clearly outlines the essentials. Security without Obscurity: A Guide to Confidentiality, Authentication, and Integrity fills this need. Rather than focusing on compliance or policies and procedures, this book takes a top-down approach. It shares the author's knowledge, insights, and observations about infor

  1. Analysis of LYSA-calculus with explicit confidentiality annotations

    DEFF Research Database (Denmark)

    Gao, Han; Nielson, Hanne Riis

    2006-01-01

    Recently there has been an increased research interest in applying process calculi in the verification of cryptographic protocols due to their ability to formally model protocols. This work presents LYSA with explicit confidentiality annotations for indicating the expected behavior of target...... malicious activities performed by attackers as specified by the confidentiality annotations. The proposed analysis approach is fully automatic without the need of human intervention and has been applied successfully to a number of protocols....

  2. Spatial confidentiality and GIS: re-engineering mortality locations from published maps about Hurricane Katrina

    Directory of Open Access Journals (Sweden)

    Leitner Michael

    2006-10-01

    Full Text Available Abstract Background Geographic Information Systems (GIS can provide valuable insight into patterns of human activity. Online spatial display applications, such as Google Earth, can democratise this information by disseminating it to the general public. Although this is a generally positive advance for society, there is a legitimate concern involving the disclosure of confidential information through spatial display. Although guidelines exist for aggregated data, little has been written concerning the display of point level information. The concern is that a map containing points representing cases of cancer or an infectious disease, could be re-engineered back to identify an actual residence. This risk is investigated using point mortality locations from Hurricane Katrina re-engineered from a map published in the Baton Rouge Advocate newspaper, and a field team validating these residences using search and rescue building markings. Results We show that the residence of an individual, visualized as a generalized point covering approximately one and half city blocks on a map, can be re-engineered back to identify the actual house location, or at least a close neighbour, even if the map contains little spatial reference information. The degree of re-engineering success is also shown to depend on the urban characteristic of the neighborhood. Conclusion The results in this paper suggest a need to re-evaluate current guidelines for the display of point (address level data. Examples of other point maps displaying health data extracted from the academic literature are presented where a similar re-engineering approach might cause concern with respect to violating confidentiality. More research is also needed into the role urban structure plays in the accuracy of re-engineering. We suggest that health and spatial scientists should be proactive and suggest a series of point level spatial confidentiality guidelines before governmental decisions are made

  3. Spatial confidentiality and GIS: re-engineering mortality locations from published maps about Hurricane Katrina.

    Science.gov (United States)

    Curtis, Andrew J; Mills, Jacqueline W; Leitner, Michael

    2006-10-10

    Geographic Information Systems (GIS) can provide valuable insight into patterns of human activity. Online spatial display applications, such as Google Earth, can democratise this information by disseminating it to the general public. Although this is a generally positive advance for society, there is a legitimate concern involving the disclosure of confidential information through spatial display. Although guidelines exist for aggregated data, little has been written concerning the display of point level information. The concern is that a map containing points representing cases of cancer or an infectious disease, could be re-engineered back to identify an actual residence. This risk is investigated using point mortality locations from Hurricane Katrina re-engineered from a map published in the Baton Rouge Advocate newspaper, and a field team validating these residences using search and rescue building markings. We show that the residence of an individual, visualized as a generalized point covering approximately one and half city blocks on a map, can be re-engineered back to identify the actual house location, or at least a close neighbour, even if the map contains little spatial reference information. The degree of re-engineering success is also shown to depend on the urban characteristic of the neighborhood. The results in this paper suggest a need to re-evaluate current guidelines for the display of point (address level) data. Examples of other point maps displaying health data extracted from the academic literature are presented where a similar re-engineering approach might cause concern with respect to violating confidentiality. More research is also needed into the role urban structure plays in the accuracy of re-engineering. We suggest that health and spatial scientists should be proactive and suggest a series of point level spatial confidentiality guidelines before governmental decisions are made which may be reactionary toward the threat of revealing

  4. Breaching confidentiality: medical mandatory reporting laws in Iran.

    Science.gov (United States)

    Milanifar, Alireza; Larijani, Bagher; Paykarzadeh, Parvaneh; Ashtari, Golanna; Mehdi Akhondi, Mohammad

    2014-01-01

    Medical ethics is a realm where four important subjects of philosophy, medicine, theology and law are covered. Physicians and philosophers cooperation in this area will have great efficiency in the respective ethical rules formation. In addition to respect the autonomy of the patient, physician's obligation is to ensure that the medical intervention has benefit for the patient and the harm is minimal. There is an obvious conflict between duty of confidentiality and duty of mandatory reporting. Professional confidentiality is one of the basic components in building a constant physician-patient relationship which nowadays, beside the novelty, it is the subject of discussion. Legal obligation of confidentiality is not absolute. In physician-patient relationship, keeping patient's secrets and maintaining confidentiality is a legal and ethical duty, and disclosure of such secrets is mainly through specific statutes. Thus, there are a number of situations where breach of confidentiality is permitted in different legal systems. One of the situations where breaching confidentiality is permitted is the medical mandatory reporting to the relevant authority which is in accordance with many countries' legal systems. Some situations are considered in many countries legal systems' such as notification of births and deaths, infectious diseases, child abuse, sport and relevant events, medical errors, drug side effects and dangerous pregnancies. In this paper, we will examine and discuss medical mandatory reporting and its ethical and legal aspects in the judicial and legal system of Iran and few other countries. Finally we will suggest making Medical Mandatory Reporting Law in Iran.

  5. Protecting confidentiality rights: the need for an ethical practice model.

    Science.gov (United States)

    Fisher, Mary Alice

    2008-01-01

    All psychologists must uphold the same ethical standards about confidentiality even though each state imposes different legal limits on their ability to protect clients' confidences. The resulting ethical-legal confusion is exacerbated by legally based confidentiality training that treats legal exceptions as if they were the rule and fosters the impression that attorneys are now the only real experts about this aspect of practice. This article provides an ethics-based confidentiality practice model that clarifies the ethical rule and puts its legal exceptions into ethical perspective. Like the Confidentiality section of the American Psychological Association's (2002) Ethical Principles of Psychologists and Code of Conduct, this outline would apply to all psychologists regardless of state laws, but the details of its implementation would vary according to role and setting. It can be used as a universal training outline, a consultation and supervision tool, a guide to professional practice, and a basis for clearer ongoing conversation about the ethics of "conditional confidentiality." Psychologists can use this practice model to regain their status as experts about the confidentiality ethics of their own profession. PsycINFO Database Record (c) 2008 APA, all rights reserved.

  6. Confidential donation confirmation as an alternative to confidential unit exclusion: 15 months experience of the HEMOMINAS foundation

    Directory of Open Access Journals (Sweden)

    Flávia Cristine Martineli Loureiro

    2011-01-01

    Full Text Available BACKGROUND: Confidential unit exclusion remains a controversial strategy to reduce the residual risk of transfusion-transmitted infections. OBJECTIVE: This study aimed to analyze confidential unit exclusion from its development in a large institution in light of confidential donation confirmation. METHODS: Data of individuals who donated from October 1, 2008 to December 31, 2009 were analyzed in a case-control study. The serological results and sociodemographic characteristics of donors who did not confirm their donations were compared to those who did. Variables with p-values < 0.20 in univariate analysis were included in a logistic multivariate analysis. RESULTS: In the univariate analysis there was a statically significant association between positive serological results and response to confidential donation confirmation of "No". Donation type, (firsttime or return donor - OR 1.69, CI 1.37-2.09, gender (OR 1.66, CI 1.35-2.04, education level (OR 2.82, CI 2.30-3.47 and ethnic background (OR 0.67, CI 0.55-0.82 were included in the final logistic regression model. In all logistic regression models analyzed, the serological suitability and confidential donation confirmation were not found to be statistically associated. The adoption of new measures of clinical classification such as audiovisual touch-screen computer-assisted self-administered interviews might be more effective than confidential unit exclusion in the identification of donor risk behavior. The requirement that transfusion services continue to use confidential unit exclusion needs to be debated in countries where more specific and sensitive clinical and serological screening methods are available. CONCLUSION: Our findings suggest that there are not enough benefits to justify continued use of confidential donation confirmation in the analyzed institution.

  7. Nuclear exports. Parliamentary control and confidentiality

    International Nuclear Information System (INIS)

    Feldmann, Ulrike

    2015-01-01

    With its decision taken on 21. October 2014 (Az.: 2 BvE 5/11) the Federal Constitutional Court (BVerfG) decided during court proceedings between administrative bodies on the scope and limits of the parliamentary right of information. Even though the proceeding did not deal with nuclear exports but arm exports, foreign trade law, however, does not only designate an export licence obligation for military weapons but also for so called dual-use goods meaning goods, which can be used both for friendly as well as for military purposes. The export of these goods requires according to the so-called Dual-Use Regulation (EG) 428/2009 a licence. Annex I category 0 of the regulation (EG) 428/2009 lists a variety of nuclear materials, plants and equipment items for which this licence applies. In the same manner as arm exports, also exports of nuclear dual-use goods are being discussed in a special cabinet committee, the Federal Security Council (BSR), which shall coordinate cross-departmentally the German security and defence policy under consideration of economic interests and which categorises its results, according to the rules of procedure, as confidential. Also legally not regulated but common ''preliminary enquiries'' at the responsible Federal Ministry or rather Federal Office of Economics and Export Control by companies which plan an export and want to affirm the general approval for their export business prior to conclusion of contract take not only place for arm exports but also for nuclear dual-use goods. The decision by the Federal Constitutional Court can be applied to consultations about the authorisation of nuclear dual-use goods.

  8. Clinical psychology service users' experiences of confidentiality and informed consent: a qualitative analysis.

    Science.gov (United States)

    Martindale, S J; Chambers, E; Thompson, A R

    2009-12-01

    To explore and describe the experience of clinical psychology service users in relation to the processes associated with confidentiality and the generation of informed consent in individual therapy. A qualitative interview-based study employing interpretative phenomenological analysis was conducted with service users. User researchers were active collaborators in the study. A focus group of four users was convened to explore issues related to confidentiality and consent, which then informed the development of the semi-structured interview schedule. Twelve users of community mental health clinical psychology services were interviewed by user researchers. A user researcher and a clinical psychologist undertook joint analysis of the data. A second clinical psychologist facilitated reflexivity and wider consideration of validity issues. Four main themes were identified from the data: being referred; the participant's feelings, mental health difficulties, and their impact; relationships with workers and carers; and autonomy. The meaningfulness of processes of discussing confidentiality, and generating informed consent, can be improved by psychologists placing a greater emphasis on choice, control, autonomy, individual preferences, and actively involving the user in dialogue on repeated occasions.

  9. Evaluation in a competitive utility environment: the threat of confidentiality

    International Nuclear Information System (INIS)

    Vine, Edward

    1997-01-01

    Utilities have become concerned that their competitors will desire access to energy-related data--including energy-efficiency data collected by utilities from their energy- efficiency programs--that they may regard as proprietary or confidential. In the future, disputes about confidentiality may focus more on costs and market information (as well as energy use and load data) than on energy-efficiency data per se. So far, the discussion has been limited to ratepayer-funded data. Consequently, many utilities are now requesting that the data (including evaluation data) they submit to their utility regulatory commissions remain confidential. Withholding utility information from the public is likely to harm the evaluation community that depends on the free flow of information for improving the practice of evaluation as well as for disseminating the lessons learned from particular program evaluations. Confidentiality will also have significant policy implications. In response to these concerns, in late 1995 and early 1996, we conducted a survey of state public utility commissions (PUCs) in the U.S. to assess: (1) the relative importance of the issue of confidential data in the regulatory arena; (2) the regulatory response to utility requests for confidentiality (e.g., formal policies, guidelines, rules and procedures, and decisions); and (3) the type of data filed as confidential with PUCS. We focus on the first two objectives of this study. In addition to our interviews, we reviewed selected state statutes, judicial and PUC decisions, rules and procedures, protective orders, and interim policy documents. Evaluators need to understand the context of confidentiality as well as the response of the regulatory commissions to confidentiality, because evaluators will need to adapt to a new environment where energy-related data and information may be harder to obtain and distribute. We propose that regulators conduct the following activities as soon as possible: 1. Assess

  10. Adolescent substance use in the multimodal treatment study of attention-deficit/hyperactivity disorder (ADHD) (MTA) as a function of childhood ADHD, random assignment to childhood treatments, and subsequent medication.

    Science.gov (United States)

    Molina, Brooke S G; Hinshaw, Stephen P; Eugene Arnold, L; Swanson, James M; Pelham, William E; Hechtman, Lily; Hoza, Betsy; Epstein, Jeffery N; Wigal, Timothy; Abikoff, Howard B; Greenhill, Laurence L; Jensen, Peter S; Wells, Karen C; Vitiello, Benedetto; Gibbons, Robert D; Howard, Andrea; Houck, Patricia R; Hur, Kwan; Lu, Bo; Marcus, Sue

    2013-03-01

    To determine long-term effects on substance use and substance use disorder (SUD), up to 8 years after childhood enrollment, of the randomly assigned 14-month treatments in the multisite Multimodal Treatment Study of Children with Attention-Deficit/Hyperactivity Disorder (MTA; n = 436); to test whether medication at follow-up, cumulative psychostimulant treatment over time, or both relate to substance use/SUD; and to compare substance use/SUD in the ADHD sample to the non-ADHD childhood classmate comparison group (n = 261). Mixed-effects regression models with planned contrasts were used for all tests except the important cumulative stimulant treatment question, for which propensity score matching analysis was used. The originally randomized treatment groups did not differ significantly on substance use/SUD by the 8-year follow-up or earlier (mean age = 17 years). Neither medication at follow-up (mostly stimulants) nor cumulative stimulant treatment was associated with adolescent substance use/SUD. Substance use at all time points, including use of two or more substances and SUD, were each greater in the ADHD than in the non-ADHD samples, regardless of sex. Medication for ADHD did not protect from, or contribute to, visible risk of substance use or SUD by adolescence, whether analyzed as randomized treatment assignment in childhood, as medication at follow-up, or as cumulative stimulant treatment over an 8-year follow-up from childhood. These results suggest the need to identify alternative or adjunctive adolescent-focused approaches to substance abuse prevention and treatment for boys and girls with ADHD, especially given their increased risk for use and abuse of multiple substances that is not improved with stimulant medication. Clinical trial registration information-Multimodal Treatment Study of Children With Attention Deficit and Hyperactivity Disorder (MTA); http://clinical trials.gov/; NCT00000388. Copyright © 2013 American Academy of Child and Adolescent

  11. Effects of the addition of nanoparticulate calcium carbonate on setting time, dimensional change, compressive strength, solubility and pH of MTA.

    Science.gov (United States)

    Bernardi, A; Bortoluzzi, E A; Felippe, W T; Felippe, M C S; Wan, W S; Teixeira, C S

    2017-01-01

    To evaluate nanoparticulate calcium carbonate (NPCC) using transmission electron microscopy and the effects of NPCC addition to MTA in regard to the setting time, dimensional change, compressive strength, solubility and pH. The experimental groups were G1 (MTA), G2 (MTA with 5% NPCC) and G3 (MTA with 10% NPCC). The tests followed ISO and ADA standards. The specimens in the dimensional change and compressive strength tests were measured immediately after setting, after 24 h and after 30 days. In the solubility test, rings filled with cement were weighed after setting and after 30 days. The pH was measured after 24 h and 30 days. The data were analysed with the ANOVA, Tukey's and Kruskal-Wallis tests (α = 5%). The setting time was reduced (P  G2 > G3). The solubility test revealed a difference amongst the groups when the specimens were hydrated: G2 > G1 > G3 and dehydrated: G3 > G2 > G1. The pH of the groups was similar at 24 h with higher values in each group after 30 days (P calcium carbonate had a cubic morphology with few impurities. The addition of nanoparticulate calcium carbonate to MTA accelerated the setting time, decreased compressive strength and, after 30 days, resulted in lower dimensional change (G2), higher solubility and a higher pH. © 2015 International Endodontic Journal. Published by John Wiley & Sons Ltd.

  12. Can you keep a secret? Confidentiality in psychotherapy.

    Science.gov (United States)

    Younggren, Jeffrey N; Harris, Eric A

    2008-05-01

    Confidentiality is the secret-keeping duty that arises from the establishment of the professional relationship psychologists develop with their clients. It is a duty created by the professional relationship, it is set forth in the American Psychological Association's (2002) Ethical Principles and Code of Conduct, and it is codified in many state regulations. However, the difference between confidentiality and legal privilege; how, why, and when it can be violated; and the reasons for so doing are not well understood by many practitioners. While on the surface confidentiality might seem to be an easy concept to apply to professional practice, in fact it is quite complex and filled with exceptions that frequently differ from circumstance to circumstance and from state to state. A lack of respect for and a lack of familiarity with the significance of these exceptions could have dire professional consequences. This article reviews the ethical imperative of confidentiality and then provides examples of legal cases that help to better understand its complexity. Then, we offer strategies designed to help metal health practitioners when they are confronted with questions regarding confidentiality and privilege.

  13. Improving Individual Acceptance of Health Clouds through Confidentiality Assurance.

    Science.gov (United States)

    Ermakova, Tatiana; Fabian, Benjamin; Zarnekow, Rüdiger

    2016-10-26

    Cloud computing promises to essentially improve healthcare delivery performance. However, shifting sensitive medical records to third-party cloud providers could create an adoption hurdle because of security and privacy concerns. This study examines the effect of confidentiality assurance in a cloud-computing environment on individuals' willingness to accept the infrastructure for inter-organizational sharing of medical data. We empirically investigate our research question by a survey with over 260 full responses. For the setting with a high confidentiality assurance, we base on a recent multi-cloud architecture which provides very high confidentiality assurance through a secret-sharing mechanism: Health information is cryptographically encoded and distributed in a way that no single and no small group of cloud providers is able to decode it. Our results indicate the importance of confidentiality assurance in individuals' acceptance of health clouds for sensitive medical data. Specifically, this finding holds for a variety of practically relevant circumstances, i.e., in the absence and despite the presence of conventional offline alternatives and along with pseudonymization. On the other hand, we do not find support for the effect of confidentiality assurance in individuals' acceptance of health clouds for non-sensitive medical data. These results could support the process of privacy engineering for health-cloud solutions.

  14. Childhood Predictors of Adult Functional Outcomes in the Multimodal Treatment Study of Attention-Deficit/Hyperactivity Disorder (MTA).

    Science.gov (United States)

    Roy, Arunima; Hechtman, Lily; Arnold, L Eugene; Swanson, James M; Molina, Brooke S G; Sibley, Margaret H; Howard, Andrea L

    2017-08-01

    Recent results from the Multimodal Treatment Study of Attention-Deficit/Hyperactivity Disorder (ADHD; MTA) have demonstrated impairments in several functioning domains in adults with childhood ADHD. The childhood predictors of these adult functional outcomes are not adequately understood. The objective of the present study was to determine the effects of childhood demographic, clinical, and family factors on adult functional outcomes in individuals with and without childhood ADHD from the MTA cohort. Regressions were used to determine associations of childhood factors (age range 7-10 years) of family income, IQ, comorbidity (internalizing, externalizing, and total number of non-ADHD diagnoses), parenting styles, parental education, number of household members, parental marital problems, parent-child relationships, and ADHD symptom severity with adult outcomes (mean age 25 years) of occupational functioning, educational attainment, emotional functioning, sexual behavior, and justice involvement in participants with (n = 579) and without (n = 258) ADHD. Predictors of adult functional outcomes in ADHD included clinical factors such as baseline ADHD severity, IQ, and comorbidity; demographic factors such as family income, number of household members and parental education; and family factors such as parental monitoring and parental marital problems. Predictors of adult outcomes were generally comparable for children with and without ADHD. Childhood ADHD symptoms, IQ, and household income levels are important predictors of adult functional outcomes. Management of these areas early on, through timely treatments for ADHD symptoms, and providing additional support to children with lower IQ and from households with low incomes, could assist in improving adult functioning. Copyright © 2017 American Academy of Child and Adolescent Psychiatry. Published by Elsevier Inc. All rights reserved.

  15. Computer Security: confidentiality is everybody’s business

    CERN Multimedia

    Stefan Lueders, Computer Security Team

    2015-01-01

    Recently, a zip file with confidential information was mistakenly made public on one of CERN’s websites. Although the file was only intended for members of an internal committee, when placing it onto the CERN website, someone made a mistake when setting the access permissions and, thus, made the file accessible to everyone visiting the site!   Unfortunately, this is but one example of such mistakes. We have seen other documents made accessible to a much wider audience than originally intended… CERN takes serious measures to ensure the confidentiality of data. Confidential or “sensitive” documents (following the nomenclature set out in the CERN Data Protection Policy) deserve professional handling and access protections given only to the people who really need to access them. As such, they must not be widely circulated as attachments in e-mails and, most definitely, must not be stored on random public websites for the sole purpose of shari...

  16. Independent consultants : fiduciary duties, trade secrets and confidential information

    International Nuclear Information System (INIS)

    Fraser, B.; Wilhelmson, M.

    1999-01-01

    Because of cutbacks and downsizing within the petroleum industry, it has become one of the largest users of contract personnel to provide services that were previously provided by senior levels of management. This paper explored the application of common law fiduciary duties and the duty of confidence to the independent workforce. It examined to what extent fiduciary duties apply to independent consultants and the best way for the employer to protect itself from the potential misuse of confidential information. Part 1 of the paper described fiduciary duties. A fiduciary relationship was described as one that possesses the following three characteristics: (1) the fiduciary has scope for the exercise of some discretion of power, (2) the fiduciary can unilaterally exercise that power to affect the beneficiary's practical interests, and (3) the beneficiary is peculiarly vulnerable to the fiduciary holding the discretion of power. Three examples of how the courts treated some arguments regarding fiduciaries were presented. Part 2 of this paper discussed how trade secrets and confidential information should be handled. It was explained, that regardless of fiduciary duties, the unauthorized use of confidential information by an independent contractor can give rise to liability and an award of damages by the courts. Some examples where the Supreme Court of Canada found breach of confidence by a party were presented. Information communicated from an employer to an employee can be divided into the following three categories: (1) publicly accessible and not confidential, (2) confidential and must be treated as such while an employee is employed, but if learned becomes part of the employees skill and knowledge, and (3) specific confidential trade secrets that cannot lawfully be used for anyone's benefit but the employer's. Issues regarding defining rights and obligations by contract were also discussed

  17. Enhanced Obfuscation Technique for Data Confidentiality in Public Cloud Storage

    Directory of Open Access Journals (Sweden)

    Oli S. Arul

    2016-01-01

    Full Text Available With an advent of cloud computing, data storage has become a boon in information technology. At the same time, data storage in remote places have become important issues. Lot of techniques are available to ensure protection of data confidentiality. These techniques do not completely serve the purpose in protecting data. The Obfuscation techniques come to rescue for protecting data from malicious attacks. This paper proposes an obfuscation technique to encrypt the desired data type on the cloud providing more protection from unknown hackers. The experimental results show that the time taken for obfuscation is low and the confidentiality percentage is high when compared with existing techniques.

  18. Development of the foremost light-curable calcium-silicate MTA cement as root-end in oral surgery. Chemical-physical properties, bioactivity and biological behavior.

    Science.gov (United States)

    Gandolfi, Maria Giovanna; Taddei, Paola; Siboni, Francesco; Modena, Enrico; Ciapetti, Gabriela; Prati, Carlo

    2011-07-01

    An innovative light-curable calcium-silicate cement containing a HEMA-TEGDMA-based resin (lc-MTA) was designed to obtain a bioactive fast setting root-end filling and root repair material. lc-MTA was tested for setting time, solubility, water absorption, calcium release, alkalinizing activity (pH of soaking water), bioactivity (apatite-forming ability) and cell growth-proliferation. The apatite-forming ability was investigated by micro-Raman, ATR-FTIR and ESEM/EDX after immersion at 37°C for 1-28 days in DPBS or DMEM+FBS. The marginal adaptation of cement in root-end cavities of extracted teeth was assessed by ESEM/EDX, and the viability of Saos-2 cell on cements was evaluated. lc-MTA demonstrated a rapid setting time (2min), low solubility, high calcium release (150-200ppm) and alkalinizing power (pH 10-12). lc-MTA proved the formation of bone-like apatite spherulites just after 1 day. Apatite precipitates completely filled the interface porosities and created a perfect marginal adaptation. lc-MTA allowed Saos-2 cell viability and growth and no compromising toxicity was exerted. HEMA-TEGDMA creates a polymeric network able to stabilize the outer surface of the cement and a hydrophilic matrix permeable enough to allow water absorption. SiO(-)/Si-OH groups from the mineral particles induce heterogeneous nucleation of apatite by sorption of calcium and phosphate ions. Oxygen-containing groups from poly-HEMA-TEGDMA provide additional apatite nucleating sites through the formation of calcium chelates. The strong novelty was that the combination of a hydraulic calcium-silicate powder and a poly-HEMA-TEGDMA hydrophilic resin creates the conditions (calcium release and functional groups able to chelate Ca ions) for a bioactive fast setting light-curable material for clinical applications in dental and maxillofacial surgery. The first and unique/exclusive light-curable calcium-silicate MTA cement for endodontics and root-end application was created, with a potential

  19. 78 FR 16298 - Comment Request for Information Collection: Confidentiality and Disclosure of State Unemployment...

    Science.gov (United States)

    2013-03-14

    ... Collection: Confidentiality and Disclosure of State Unemployment Compensation Information Final Rule and... about the regulatory requirements of the Confidentiality and Disclosure of State Unemployment... Administration, Office of Unemployment Insurance, 200 Constitution Avenue NW., Room S4524, Washington, DC 20210...

  20. 77 FR 1434 - Proposed Confidentiality Determinations for Data Elements Under the Mandatory Reporting of...

    Science.gov (United States)

    2012-01-10

    ... Fluorinated Gas Production....... 325120 Industrial gases manufacturing facilities. Electrical Equipment Use... Proposed Confidentiality Determinations for Data Elements Under the Mandatory Reporting of Greenhouse Gases...-proposes confidentiality determinations for the data elements under the Mandatory Greenhouse Gas Reporting...

  1. 77 FR 63537 - Greenhouse Gas Reporting Program: Proposed Amendments and Confidentiality Determinations for...

    Science.gov (United States)

    2012-10-16

    ... Greenhouse Gas Reporting Program: Proposed Amendments and Confidentiality Determinations for Subpart I...-AR61 Greenhouse Gas Reporting Program: Proposed Amendments and Confidentiality Determinations for... Manufacturing, of the Greenhouse Gas Reporting Rule. Proposed changes include revising certain calculation...

  2. DLP: REDUCED RISK OF LEAKAGE OF CONFIDENTIAL INFORMATION OF THE BANK

    Directory of Open Access Journals (Sweden)

    T. A. Andryianava

    2017-01-01

    Full Text Available Research application of DLP-system for protection of confidential information, a methodology for adapting the DLP-system to the specific activities of the organization, comparative analysis of the results of standard and adapted DLP-systems in the Bank. Developed: a technique for analyzing information security events, algorithm for responding to identified events, methodology and procedures for adapting the standard DLP-system to the specifics of the Bank’s activities. The methodology for adapting a standard DLP-system to the specifics of the Bank’s work consists of the following activities: identification of critical corporate information categories, audit of information systems, description of current risks and their assessment, introduction of rules for Bank’s critical information and setting up a DLP system in accordance with the specifics of the Bank’s work. Modernization of the configuration of a standard DLP-system includes the following procedures: selection of confidential information of the Bank based on membership criteria, setting up detection, creating perimeters and developing an algorithm for responding to identified information security events in the Bank. The algorithm is designed to improve the efficiency of the response of information security officers in cases of incident detection and describes the stages of the subsequent actions. The results of the research prove that using an adapted DLP-system significantly reduces the number of false positives, increasing the accuracy of detecting confidential information and reducing the risk of leakage of critical information outside the corporate network. The application of the adapted DLP-system in the Bank allowed to increase the speed of response of information security specialists to the information security events detected by the DLP-system adapted to the Bank, and also allowed the DLP-system to transition from the copy mode to the blocking mode of illegitimate transfer

  3. 18 CFR 706.410 - Confidentiality of statements.

    Science.gov (United States)

    2010-04-01

    ... use of information on the statements shall be limited to that necessary to carry out the purposes of... EMPLOYEE RESPONSIBILITIES AND CONDUCT Statements of Employment and Financial Interests § 706.410 Confidentiality of statements. Each statement of employment and financial interests, and each supplementary...

  4. Effective verification of confidentiality for multi-threaded programs

    NARCIS (Netherlands)

    Ngo, Minh Tri; Stoelinga, Mariëlle Ida Antoinette; Huisman, Marieke

    2014-01-01

    This paper studies how confidentiality properties of multi-threaded programs can be verified efficiently by a combination of newly developed and existing model checking algorithms. In particular, we study the verification of scheduler-specific observational determinism (SSOD), a property that

  5. 15 CFR 325.16 - Protecting confidentiality of information.

    Science.gov (United States)

    2010-01-01

    ... 15 Commerce and Foreign Trade 2 2010-01-01 2010-01-01 false Protecting confidentiality of information. 325.16 Section 325.16 Commerce and Foreign Trade Regulations Relating to Commerce and Foreign Trade (Continued) INTERNATIONAL TRADE ADMINISTRATION, DEPARTMENT OF COMMERCE MISCELLANEOUS REGULATIONS...

  6. 48 CFR 1415.207-71 - Confidentiality of proposal evaluation.

    Science.gov (United States)

    2010-10-01

    ... THE INTERIOR CONTRACTING METHODS AND CONTRACT TYPES CONTRACTING BY NEGOTIATION Solicitation and... evaluators and advisors shall sign a Conflict of Interest Certificate and a Confidentiality Certificate in a... outside the Government shall take into consideration requirements for avoiding individual conflicts of...

  7. Absolutism on Access and Confidentiality: Principled or Irresponsible?

    Science.gov (United States)

    Sheerin, William E.

    1991-01-01

    Discusses issues involved in public access to library materials and facilities and patron confidentiality. Topics discussed include children's access to adult materials; parents' right to know about their children's materials; First and Fourth Amendment protections; the Library Bill of Rights; and American Library Association (ALA) documents that…

  8. 40 CFR 303.31 - Assurance of claimant confidentiality.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 27 2010-07-01 2010-07-01 false Assurance of claimant confidentiality. 303.31 Section 303.31 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) SUPERFUND... knowledge, shall be given access to the identity of, or information that would lead to the identity of, a...

  9. 18 CFR 1b.9 - Confidentiality of investigations.

    Science.gov (United States)

    2010-04-01

    ... 18 Conservation of Power and Water Resources 1 2010-04-01 2010-04-01 false Confidentiality of investigations. 1b.9 Section 1b.9 Conservation of Power and Water Resources FEDERAL ENERGY REGULATORY COMMISSION... pursuant to subpoena, and all investigative proceedings shall be treated as nonpublic by the Commission and...

  10. 22 CFR 1104.17 - Confidentiality of archaeological resource information.

    Science.gov (United States)

    2010-04-01

    ... 22 Foreign Relations 2 2010-04-01 2010-04-01 true Confidentiality of archaeological resource information. 1104.17 Section 1104.17 Foreign Relations INTERNATIONAL BOUNDARY AND WATER COMMISSION, UNITED... of archaeological resource information. (a) The Commissioner shall not make available to the public...

  11. IT Confidentiality Risk Assessment for an Architecture-Based Approach

    NARCIS (Netherlands)

    Morali, A.; Zambon, Emmanuele; Etalle, Sandro; Overbeek, Paul

    2008-01-01

    Information systems require awareness of risks and a good understanding of vulnerabilities and their exploitations. In this paper, we propose a novel approach for the systematic assessment and analysis of confidentiality risks caused by disclosure of operational and functional information. The

  12. 12 CFR 19.181 - Confidentiality of formal investigations.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 1 2010-01-01 2010-01-01 false Confidentiality of formal investigations. 19.181 Section 19.181 Banks and Banking COMPTROLLER OF THE CURRENCY, DEPARTMENT OF THE TREASURY RULES OF... only in accordance with the provisions of part 4 of this chapter. ...

  13. 19 CFR 210.72 - Confidentiality of information.

    Science.gov (United States)

    2010-04-01

    ... 19 Customs Duties 3 2010-04-01 2010-04-01 false Confidentiality of information. 210.72 Section 210.72 Customs Duties UNITED STATES INTERNATIONAL TRADE COMMISSION INVESTIGATIONS OF UNFAIR PRACTICES IN IMPORT TRADE ADJUDICATION AND ENFORCEMENT Enforcement Procedures and Advisory Opinions § 210.72...

  14. 19 CFR 210.20 - Declassification of confidential information.

    Science.gov (United States)

    2010-04-01

    ... 19 Customs Duties 3 2010-04-01 2010-04-01 false Declassification of confidential information. 210.20 Section 210.20 Customs Duties UNITED STATES INTERNATIONAL TRADE COMMISSION INVESTIGATIONS OF UNFAIR PRACTICES IN IMPORT TRADE ADJUDICATION AND ENFORCEMENT Motions § 210.20 Declassification of...

  15. Zerber: r-Confidential Indexing for Distributed Documents

    NARCIS (Netherlands)

    Zerr, Sergej; Demidova, Elena; Olmedilla, Daniel; Nejdl, Wolfgang; Winslett, Marianne; Mitra, Soumyadeb

    2008-01-01

    Zerr, S., Demidova, E., Olmedilla, D., Nejdl, W., Winslett, M., & Mitra, S. (2008). Zerber: r-Confidential Indexing for Distributed Documents. In J. Teubner (Eds.), Proceedings of the 11th International Conference on Extending Database Technology (pp. 287-298). March, 25-29, 2008, Nantes, France.

  16. Meaningful Use of a Confidential Adolescent Patient Portal.

    Science.gov (United States)

    Thompson, Lindsay A; Martinko, Thomas; Budd, Pamela; Mercado, Rebeccah; Schentrup, Anzeela M

    2016-02-01

    To design and evaluate the usage of an adolescent patient portal specifically adapted for adolescent health care needs that also satisfied institutional meaningful use guidelines regarding electronic health records. Key stakeholders at one academic health care center adopted an online portal and opted to designate a patient portal specifically for adolescents to maximize confidentiality in compliance with state privacy laws. This study analyzed aggregate electronic health record data of adolescents' (ages 12-17.9 years) uptake, usage, and functionality of this portal and compared it to parent portal usage for younger children (ages 0-11 years). Differences in means were calculated using paired t tests. The portal was used similarly between parents of young children and adolescents, with almost 1,000 enrollees in each group from September 1, 2012 to March 31, 2015. There were no gender differences in enrollment. Adolescents were less likely than parents of younger children to review appointments (73% vs. 85%), laboratory tests (67% vs. 79%), problem lists (40% vs. 78%), or allergies (45% vs. 77%, all p values adolescents sent 1,397 confidential messages. Institutional decisions for implementing meaningful use requirements can align with goals of adolescent health. Patient portals can enhance adolescent health care quality and adolescents readily use a confidential portal. Implementation of meaningful use requirements should be checked against adolescent health care needs to maximize confidentiality and promote health communication. Copyright © 2016 Society for Adolescent Health and Medicine. Published by Elsevier Inc. All rights reserved.

  17. 31 CFR 31.217 - Confidentiality of information.

    Science.gov (United States)

    2010-07-01

    ... 31 Money and Finance: Treasury 1 2010-07-01 2010-07-01 false Confidentiality of information. 31.217 Section 31.217 Money and Finance: Treasury Office of the Secretary of the Treasury TROUBLED ASSET... from a source other than the retained entity. (b) Prohibitions. The retained entity shall not: (1...

  18. Decisions about Confidentiality in Medical Student Mental Health Settings.

    Science.gov (United States)

    Lindenthal, Jacob Jay; And Others

    1984-01-01

    Examined responses of psychologists and psychiatrists in medical schools (N=59) to vignettes representing student problems. Results suggested practitioners were generally unwilling to break confidentiality in response to problems involving suicidal tendencies, sexual coercion/seduction, social transgressions, or falsifying data. Only suggestions…

  19. 75 FR 75576 - Confidentiality of Suspicious Activity Reports

    Science.gov (United States)

    2010-12-03

    ...-2010-0019] RIN 1557-AD17 Confidentiality of Suspicious Activity Reports AGENCY: The Office of the... suspicious activity report (SAR) to: clarify the scope of the statutory prohibition on the disclosure by a... institutions, including national banks regulated by the OCC, to keep certain records and make certain reports...

  20. 12 CFR 404.7 - Confidential business information.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 4 2010-01-01 2010-01-01 false Confidential business information. 404.7 Section 404.7 Banks and Banking EXPORT-IMPORT BANK OF THE UNITED STATES INFORMATION DISCLOSURE Procedures... involved, a general description of the related U.S. exports, and the country to which such exports are...

  1. [Confidentiality in medical oaths: (When the white crow becomes gray...)].

    Science.gov (United States)

    Gelpi, R J; Pérez, M L; Rancich, A M; Mainetti, J A

    2000-01-01

    Confidentiality, together with the ethical principles of beneficence and non-maleficence, is the most important rule in Medical Oaths at the present time. However, the scientific-technical advances in medicine have made this rule one of the most controversial ones because of its exceptions. In consequence, the aim of the present paper is to comparatively analyze the rule of confidentiality in Medical Oaths of different places, times, origins and in different versions of the Hippocratic Oath in order to determine what should be kept a secret and with what degree of commitment (absolute or "prima facie"). Of the thirty six analyzed Oaths, twenty-seven manifest this rule and nine do not. No relation was found between the manifestation of this rule and the place, time, origin and different versions of the Hippocratic Oath. Most pledges suggest not to reveal what has been seen or heard during the medical act, the same as in the Hippocratic Oath. Seven texts point out that confidentiality should be absolute and four give exceptions in connection with beneficence and justice principles and the moral duty of causing no damage to third parties. Two pledges specify protection of privacy. In conclusion, today confidentiality is considered to be a moral duty for the benefit of the patient and out of consideration for his autonomy; however, at the present time in medicine the duty of keeping absolute secrecy is being reconsidered.

  2. 49 CFR 805.735-21 - Confidentiality of statements.

    Science.gov (United States)

    2010-10-01

    ... TRANSPORTATION SAFETY BOARD EMPLOYEE RESPONSIBILITIES AND CONDUCT § 805.735-21 Confidentiality of statements. Subject to the provisions of § 805.735-24 concerning review of employee statements, each statement of... Personnel Officer is personally responsible for the retention of employee statements in confidence and may...

  3. 19 CFR 201.6 - Confidential business information.

    Science.gov (United States)

    2010-04-01

    ...) of a type for which there is a clear and compelling need to withhold from disclosure. Special rules... the right to appeal to the Commission. (e) Appeals from denial of confidential treatment. (1) For good cause shown, the Commission may grant an appeal from a denial by the Secretary of a request for...

  4. Confidential data in a competitive utility environment: A regulatory perspective

    Energy Technology Data Exchange (ETDEWEB)

    Vine, E.

    1996-08-01

    Historically, the electric utility industry has been regarded as one of the most open industries in the United States in sharing information but their reputation is being challenged by competitive energy providers, the general public, regulators, and other stakeholders. As the prospect of competition among electricity power providers has increased in recent years, many utilities have been requesting that the data they submit to their utility regulatory commissions remain confidential. Withholding utility information from the public is likely to have serious and significant policy implications with respect to: (1) consumer education, the pursuit of truth, mutual respect among parties, and social cooperation; (2) the creation of a fair market for competitive energy services; (3) the regulatory balance; (4) regional and national assessments of energy-savings opportunities; (5) research and development; and (6) evaluations of utility programs, plans, and policies. In a telephone survey of all public utility commissions (PUCs) that regulate electric and gas utilities in the U.S., we found that almost all PUCs have received requests from utility companies for data to be filed as confidential, and confidential data filings appear to have increased (both in scope and in frequency) in those states where utility restructuring is being actively discussed. The most common types of data submitted as confidential by utilities dealt with specific customer data, market data, avoided costs, and utility costs.

  5. 40 CFR 85.1415 - Treatment of confidential information.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 18 2010-07-01 2010-07-01 false Treatment of confidential information. 85.1415 Section 85.1415 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) AIR PROGRAMS (CONTINUED) CONTROL OF AIR POLLUTION FROM MOBILE SOURCES Urban Bus Rebuild Requirements § 85.1415...

  6. Time for Action: Audit, Accountability and Confidential Enquiries into ...

    African Journals Online (AJOL)

    Improving the quality of care is essential for achieving reductions in maternal mortality. Audit is one of the methods which can be used to simultaneously assess as well as improve quality. This commentary discusses one type of audit – confidential enquiries into maternal death. We believe that the enthusiasm for ...

  7. CRAC : Confidentiality risk analysis and IT-architecture comparison of business networks

    NARCIS (Netherlands)

    Morali, A.; Zambon, E.; Etalle, S.; Wieringa, R.J.

    2009-01-01

    The leakage of confidential information (e.g. industrial secrets, patient records and user credentials) is one of the risks that have to be accounted for and mitigated by organizations dealing with confidential data. Unfortunately, assessing confidentiality risk is challenging, particularly in the

  8. 37 CFR 260.4 - Confidential information and statements of account.

    Science.gov (United States)

    2010-07-01

    ... Confidential information and statements of account. (a) For purposes of this part, confidential information shall include statements of account and any information pertaining to the statements of account... included on the statement of account. (d) Access to the confidential information pertaining to the royalty...

  9. Treatment of children with attention-deficit/hyperactivity disorder (ADHD) and irritability: results from the multimodal treatment study of children with ADHD (MTA).

    Science.gov (United States)

    Fernández de la Cruz, Lorena; Simonoff, Emily; McGough, James J; Halperin, Jeffrey M; Arnold, L Eugene; Stringaris, Argyris

    2015-01-01

    Clinically impairing irritability affects 25% to 45% of children with attention-deficit/hyperactivity disorder (ADHD); yet, we know little about what interventions are effective in treating children with ADHD and co-occurring irritability. We used data from the Multimodal Treatment Study of Children With ADHD (MTA) to address 3 aims: to establish whether irritability in children with ADHD can be distinguished from other symptoms of oppositional defiant disorder (ODD); to examine whether ADHD treatment is effective in treating irritability; and to examine how irritability influences ADHD treatment outcomes. Secondary analyses of data from the MTA included multivariate analyses, and intent-to-treat random-effects regression models were used. Irritability was separable from other ODD symptoms. For treating irritability, systematic stimulant treatment was superior to behavioral management but not to routine community care; a combination of stimulants and behavioral treatment was superior to community care and to behavioral treatment alone, but not to medication alone. Irritability did not moderate the impact of treatment on parent- and teacher-reported ADHD symptoms in any of the 4 treatment groups. Treatments targeting ADHD symptoms are helpful for improving irritability in children with ADHD. Moreover, irritability does not appear to influence the response to treatment of ADHD. Multimodal Treatment Study of Children With Attention Deficit and Hyperactivity Disorder (MTA); http://www.clinicaltrials.gov; NCT00000388. Copyright © 2015 American Academy of Child & Adolescent Psychaitry. Published by Elsevier Inc. All rights reserved.

  10. Curcumin increases the sensitivity of Paclitaxel-resistant NSCLC cells to Paclitaxel through microRNA-30c-mediated MTA1 reduction.

    Science.gov (United States)

    Lu, Yimin; Wang, Jun; Liu, Lei; Yu, Lequn; Zhao, Nian; Zhou, Xingju; Lu, Xudong

    2017-04-01

    Non-small-cell lung cancer is one of the most lethal cancers in the worldwide. Although Paclitaxel-based combinational therapies have long been used as a standard treatment in aggressive non-small-cell lung cancers, Paclitaxel resistance emerges as a major clinical problem. It has been demonstrated that Curcumin from Curcuma longa as a traditional Chinese medicine can inhibit cancer cell proliferation. However, the role of Curcumin in Paclitaxel-resistant non-small-cell lung cancer cells is not clear. In this study, we investigated the effect of Curcumin on the Paclitaxel-resistant non-small-cell lung cancer cells and found that Curcumin treatment markedly increased the sensitivity of Paclitaxel-resistant non-small-cell lung cancer cells to Paclitaxel. Mechanically, the study revealed that Curcumin could reduce the expression of metastasis-associated gene 1 (MTA1) gene through upregulation of microRNA-30c in Paclitaxel-resistant non-small-cell lung cancer cells. During the course, MTA1 reduction sensitized Paclitaxel-resistant non-small-cell lung cancer cells and enhanced the effect of Paclitaxel. Taken together, our studies indicate that Curcumin increases the sensitivity of Paclitaxel-resistant non-small-cell lung cancer cells to Paclitaxel through microRNA-30c-mediated MTA1 reduction. Curcumin might be a potential adjuvant for non-small-cell lung cancer patients during Paclitaxel treatment.

  11. Novel use of platelet-rich fibrin matrix and MTA as an apical barrier in the management of a failed revascularization case.

    Science.gov (United States)

    Yadav, Pankaj; Pruthi, Preeti Jain; Naval, Ruchika Roongta; Talwar, Sangeeta; Verma, Mahesh

    2015-08-01

    We report management of a failed revascularization/revitalization case, which could be due to inadequate removal of biofilm and bacteria in dentinal tubules. The use of an apical matrix barrier in form of a platelet-rich fibrin (PRF) membrane for stabilization of MTA in root end apexification procedure is described. The canal was cleansed of old MTA present in the cervical third using H files, irrigated using saline and finally irrigated with 2.5% NaOCl and saline. To obtain canal disinfection, calcium hydroxide paste was temporized in the canal. In subsequent appointments, PRF was placed at the root tip followed by 5-mm apical plug with mineral trioxide aggregate. One week later, the root canal was obturated with thermoplasticized gutta-percha. A 6-month and a 2-year follow ups showed reduction of periapical radiolucency and adequately functional tooth. One-visit apexification techniques provide an alternative treatment for failed revascularization cases. Follow up confirmed complete healing periradicularly. Apexification in one step using an apical barrier of PRF and a plug of MTA can be considered a predictable treatment and may be an alternative to long-term revascularization failures. © 2015 John Wiley & Sons A/S. Published by John Wiley & Sons Ltd.

  12. Effect of ProRoot MTA, Portland cement, and amalgam on the expression of fibronectin, collagen I, and TGFβ by human periodontal ligament fibroblasts in vitro.

    Science.gov (United States)

    Fayazi, Sara; Ostad, Seyed Nasser; Razmi, Hasan

    2011-01-01

    Today many materials have been introduced for root-end filling materials. One of them is mineral trioxide aggregate (MTA) that is mentioned as a gold standard. The purpose of this in vitro study was to evaluate the reaction of human periodontal ligament fibroblasts to the root-end filling materials, such as ProRoot MTA, Portland cement, and amalgam. Eight impacted teeth were extracted in aseptic condition. The tissues around the roots were used to obtain fibroblast cells. After cell proliferation, they were cultured in the chamber slides and the extracts of the materials were added to the wells. Immunocytochemical method for measuring the expression of Fibronectin, collagen I and transforming growth factor beta (TGF®) was performed by Olysia Bioreport Imaging Software. The results were analyzed by SPSS 13.0 and Tukey post hoc test with PPortland cement group showed the most expression of collagen significantly and after 1 week, Portland cement and MTA groups had the most expression of collagen but there was no significant difference between these 2 groups. After 1 week, the Portland cement group demonstrated a higher amount of TGF® and fibronectin. The results suggest that Portland cement can be used as a less expensive root filling material with low toxicity. It has better effects than amalgam on the fibroblasts.

  13. Contributory factors in surgical incidents as delineated by a confidential reporting system.

    Science.gov (United States)

    Mushtaq, F; O'Driscoll, C; Smith, Fct; Wilkins, D; Kapur, N; Lawton, R

    2018-05-01

    Background Confidential reporting systems play a key role in capturing information about adverse surgical events. However, the value of these systems is limited if the reports that are generated are not subjected to systematic analysis. The aim of this study was to provide the first systematic analysis of data from a novel surgical confidential reporting system to delineate contributory factors in surgical incidents and document lessons that can be learned. Methods One-hundred and forty-five patient safety incidents submitted to the UK Confidential Reporting System for Surgery over a 10-year period were analysed using an adapted version of the empirically-grounded Yorkshire Contributory Factors Framework. Results The most common factors identified as contributing to reported surgical incidents were cognitive limitations (30.09%), communication failures (16.11%) and a lack of adherence to established policies and procedures (8.81%). The analysis also revealed that adverse events were only rarely related to an isolated, single factor (20.71%) - with the majority of cases involving multiple contributory factors (79.29% of all cases had more than one contributory factor). Examination of active failures - those closest in time and space to the adverse event - pointed to frequent coupling with latent, systems-related contributory factors. Conclusions Specific patterns of errors often underlie surgical adverse events and may therefore be amenable to targeted intervention, including particular forms of training. The findings in this paper confirm the view that surgical errors tend to be multi-factorial in nature, which also necessitates a multi-disciplinary and system-wide approach to bringing about improvements.

  14. Management of medical confidentiality in English professional football clubs: some ethical problems and issues.

    Science.gov (United States)

    Waddington, I; Roderick, M

    2002-04-01

    To examine the ways in which confidential matters are dealt with in the context of the relationship between the club doctor (or physiotherapist) and the player as patient in English professional football clubs. Semistructured tape recorded interviews with 12 club doctors, 10 club physiotherapists, and 27 current and former players. A questionnaire was also sent to 90 club doctors; 58 were returned. There is among club doctors and physiotherapists no commonly held code of ethics governing how much and what kind of information about players may properly be passed on to managers; associated with this, there is considerable variation from one club to another in terms of the amount and kind of information passed on to managers. In some clubs, medical staff attempt to operate more or less on the basis of the rules governing confidentiality that apply in general practice, but in other clubs, medical staff are more ready to pass on personal information about players. In some situations, this raises serious ethical questions. Guidelines dealing with confidentiality in practitioner-patient relationships in medical practice have long been available and have recently been restated, specifically in relation to the practice of sports medicine, by the British Olympic Association, the British Medical Association, and the Football Association. This is a welcome first step. However, if the guidelines are to have an impact on practice, detailed consideration needs to be given to ensuring their effective implementation; if this is to be achieved, consideration also needs to be given to identifying those aspects of the culture and organisation of professional football clubs that may hinder the full and effective implementation of those guidelines.

  15. 7 CFR 1230.82 - Confidential treatment.

    Science.gov (United States)

    2010-01-01

    ... statements based upon the reports of a number of persons subject to this subpart or of statistical data collected therefrom, which statements or data do not identify the information furnished by any person; or (b... Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (MARKETING...

  16. Evaluation of the effect of blood contamination on the compressive strength of MTA modified with hydration accelerators

    Directory of Open Access Journals (Sweden)

    Kaveh Oloomi

    2013-08-01

    Full Text Available Objectives This study was performed to evaluate the effect of blood contamination on the compressive strength (CS of Root MTA (RMTA modified with Calcium chloride (CaCl2 and Disodium hydrogen phosphate (Na2HPO4 as setting accelerators over time. Materials and Methods A total of 110 cylindrical specimens of RMTA were divided into 6 experimental groups as follows: Group1, RMTA; Group 2, RMTA modified with CaCl2 (RMTA-C; Group 3, RMTA modified with Na2HPO4 (RMTA-N; Group 4, RMTA contaminated with blood; Group 5, RMTA-C contaminated with blood; Group 6, RMTA-N contaminated with blood. The CS of specimens in all groups was evaluated after 3 hr, 24 hr, and 1 wk. In the modified groups (groups 2, 3, 5, and 6 the CS of five specimens per group was also evaluated after 1 hr. Results Blood contamination significantly reduced the CS of all materials at all time intervals (p < 0.05. After 3 hr, the CS of specimens in the RMTA groups (with and without blood contamination was significantly lower than those in the RMTA-C and RMTA-N groups (p < 0.05. The CS values were not significantly different at the other time intervals. In all groups, the CS of specimens significantly increased over time (p < 0.05. Conclusions Blood contamination decreased the CS of both original and accelerated RMTA.

  17. Data-protection standards and confidentiality of HIV/AIDS status in the workplace - a South African case study.

    Science.gov (United States)

    Muskat-Gorska, Zuzanna

    2008-11-01

    The article contextualises an emerging new regime for information privacy in South Africa (i.e. the draft Protection of Personal Information Bill). Subsequently, it discusses the possibility of successful implementation of international data-protection standards in an environment where there is an urgent need to balance HIV/AIDS confidentiality rights with public health requirements. Also, the article presents a preliminary assessment of the possible impact of professionalisation (and outsourcing) of workplace HIV/AIDS management on workplace data-protection practices, and it identifies some spaces for social dialogue on HIV/AIDS-data treatment in South Africa. The study methods comprise an analysis of legal documents (concerning international data-protection standards and the development of law governing data protection and HIV/AIDS confidentiality in South Africa) and interviews conducted with workplace health managers and trade union representatives, in Johannesburg, in 2007.

  18. Medical confidentiality versus disclosure: Ethical and legal dilemmas.

    LENUS (Irish Health Repository)

    Agyapong, V I O

    2009-02-01

    A case is described of a fifty year old single man who made disclosures about criminal sexual practices during a psychiatric assessment. In common practice with other professional men, a doctor is under a duty not to disclose, without the consent of his patient, information which he has gained in his professional capacity other than in exceptional circumstances. We discuss the ethical and legal considerations surrounding issues of medical confidentiality and the dilemma that sometimes face clinicians, when they feel obliged, in the public interest, to disclose information they have gained in confidence. Breach of confidences can have deleterious consequences; particularly for the doctor-patient relationship, but failure to disclose in some situations could have serious implications for the well-being of the wider society. Doctors should be aware of the basic principles of confidentiality and the ethical and legal framework around which they are built.

  19. Confidentiality and its limits: some contributions from Christianity.

    Science.gov (United States)

    Torrance, I R

    2003-02-01

    The issue is whether Christianity, of its nature, would seek to prevent a justifiable breach of confidentiality or could endorse it, under certain circumstances, as the act which is fundamentally more loving or more truthful. The individualistic nature of Western Christianity is noted. The Lutheran theologian Dietrich Bonhoeffer is used to show Christian support for dynamic rather than literal truth telling, and for awareness of the contexts and power relations within which persons stand.

  20. Enhanced Obfuscation Technique for Data Confidentiality in Public Cloud Storage

    OpenAIRE

    Oli S. Arul; Arockiam L.

    2016-01-01

    With an advent of cloud computing, data storage has become a boon in information technology. At the same time, data storage in remote places have become important issues. Lot of techniques are available to ensure protection of data confidentiality. These techniques do not completely serve the purpose in protecting data. The Obfuscation techniques come to rescue for protecting data from malicious attacks. This paper proposes an obfuscation technique to encrypt the desired data type on the clou...

  1. Security, privacy, and confidentiality issues on the Internet

    OpenAIRE

    Kelly, Grant; McKenzie, Bruce

    2002-01-01

    We introduce the issues around protecting information about patients and related data sent via the Internet. We begin by reviewing three concepts necessary to any discussion about data security in a healthcare environment: privacy, confidentiality, and consent. We are giving some advice on how to protect local data. Authentication and privacy of e-mail via encryption is offered by Pretty Good Privacy (PGP) and Secure Multipurpose Internet Mail Extensions (S/MIME). The de facto Internet standa...

  2. Confidential patent application with an example of preparation

    Directory of Open Access Journals (Sweden)

    Obrad T. Čabarkapa

    2013-12-01

    Full Text Available In order that the invention solving a technical problem receives a patent protection, it is necessary to file a patent application. For the protection of confidential inventions which are important for defense and national security, a confidential patent application[1] must be filed. A confidential patent application is an important and complex document, the parts of which are,  in principle, exposed in an established order. For the preparation of patent applications, it is necessary to engage experts with higher education, primarily in the technical field the invention relates to. The contents of the patent application is a basis for examining whether the application meets the requirements for patentability and whether the right to patent protection is achieved. Besides theoretical discussions on patent application, the paper gives a short version of an example of an application regarding a protected confidential invention. Introduction The basic condition for the exercise of patent protection is filing a patent application, the test procedure and, eventually, depending on the test results - the recognition or rejection of the patent. The paper gives a description of all parts of the patent application on an example of a confidential invention already patented. The content of the confidential patent application The confidential patent application for confidential invention protection consists of the following parts: The application for a patent; description of the invention; the claims (indication of what is new and what is required to be protected by patenting; abstract (short summary of the invention  and a draft of the invention (to which the description and the claims are referred. The application for a patent The application for patent is filed on Form P-1 and a request for the petty patent on Form MP-1. The data entered in the file is, for example: the applicant; the lawyer; the name of the invention in Serbian and English; the inventor

  3. Privacy, confidentiality and abortion statistics: a question of public interest?

    Science.gov (United States)

    McHale, Jean V; Jones, June

    2012-01-01

    The precise nature and scope of healthcare confidentiality has long been the subject of debate. While the obligation of confidentiality is integral to professional ethical codes and is also safeguarded under English law through the equitable remedy of breach of confidence, underpinned by the right to privacy enshrined in Article 8 of the Human Rights Act 1998, it has never been regarded as absolute. But when can and should personal information be made available for statistical and research purposes and what if the information in question is highly sensitive information, such as that relating to the termination of pregnancy after 24 weeks? This article explores the case of In the Matter of an Appeal to the Information Tribunal under section 57 of the Freedom of Information Act 2000, concerning the decision of the Department of Health to withhold some statistical data from the publication of its annual abortion statistics. The specific data being withheld concerned the termination for serious fetal handicap under section 1(1)d of the Abortion Act 1967. The paper explores the implications of this case, which relate both to the nature and scope of personal privacy. It suggests that lessons can be drawn from this case about public interest and use of statistical information and also about general policy issues concerning the legal regulation of confidentiality and privacy in the future.

  4. The erosion of psychiatrist-patient confidentiality by subpoenas.

    Science.gov (United States)

    Levy, John; Galambos, Gary; Skarbek, Yvonne

    2014-08-01

    We explore the reasons for the prolific use of subpoenas to gain access to psychiatric records in Australia. We examine the applicable legal principles and practices at the New South Wales (NSW) and Commonwealth levels, aiming to develop recommendations for Australian Governments to curb the inappropriate and harmful use of subpoenas. Unfettered legal access to psychiatric records is inconsistent with professional ethical guidelines and risks undermining the provision of quality psychiatric care to the community. The existing legal provisions are failing to protect psychiatrist-patient confidentiality. In NSW, the onus is placed on the psychiatrist and/or patient to make a complicated application to the court, to direct that a subpoena be set aside on the grounds of "Professional Confidential Relationship Privilege." An absence of Commonwealth legislation to protect psychiatrist-patient confidentiality is used by some litigants in family law proceedings to disadvantage patients by stigmatising them, because they have consulted psychiatrists. We recommend that uniform legislation be implemented, giving effect to a primary rule of privilege with exceptions. © The Royal Australian and New Zealand College of Psychiatrists 2014.

  5. Conflicting duties over confidentiality in Argentina and Peru.

    Science.gov (United States)

    Cavallo, Mercedes

    2011-02-01

    The medical duty of confidentiality represents a key element for the provision of reproductive and sexual health services. In some Latin American countries, such as Argentina and Peru, the legal systems impose—or are interpreted as imposing—on health professionals the duty of confidentiality, but also the duty to report the commission of a public order offense that they know about owing to the practicing of their profession. In these countries, the conflicting duties and the criminalization of abortion cause severe public health and human rights problems when health professionals assist their patients for post-abortion treatment. Typically, patients are deterred from seeking prompt medical care, and their privacy, autonomy, and dignity are violated. A 2010 ruling from the Supreme Court of Argentina and a 2004 ruling from the Inter-American Court of Human Rights emerge as important instruments that grant a more adequate protection of medical confidentiality. © 2010 International Federation of Gynecology and Obstetrics. Published by Elsevier Ireland Ltd. All rights reserved.

  6. Is patient confidentiality compromised with the electronic health record?: a position paper.

    Science.gov (United States)

    Wallace, Ilse M

    2015-02-01

    In order for electronic health records to fulfill their expected benefits, protection of privacy of patient information is key. Lack of trust in confidentiality can lead to reluctance in disclosing all relevant information, which could have grave consequences. This position paper contemplates whether patient confidentiality is compromised by electronic health records. The position that confidentiality is compromised was supported by the four bioethical principles and argued that despite laws and various safeguards to protect patients' confidentiality, numerous data breaches have occurred. The position that confidentiality is not compromised was supported by virtue ethics and a utilitarian viewpoint and argued that safeguards keep information confidential and the public feels relatively safe with the electronic health record. The article concludes with an ethically superior position that confidentiality is compromised with the electronic health record. Although organizational and governmental ways of enhancing the confidentiality of patient information within the electronic health record facilitate confidentiality, the ultimate responsibility of maintaining confidentiality rests with the individual end-users and their ethical code of conduct. The American Nurses Association Code of Ethics for nurses calls for nurses to be watchful with data security in electronic communications.

  7. Privacy and confidentiality in pragmatic clinical trials.

    Science.gov (United States)

    McGraw, Deven; Greene, Sarah M; Miner, Caroline S; Staman, Karen L; Welch, Mary Jane; Rubel, Alan

    2015-10-01

    With pragmatic clinical trials, an opportunity exists to answer important questions about the relative risks, burdens, and benefits of therapeutic interventions. However, concerns about protecting the privacy of this information are significant and must be balanced with the imperative to learn from the data gathered in routine clinical practice. Traditional privacy protections for research uses of identifiable information rely disproportionately on informed consent or authorizations, based on a presumption that this is necessary to fulfill ethical principles of respect for persons. But frequently, the ideal of informed consent is not realized in its implementation. Moreover, the principle of respect for persons—which encompasses their interests in health information privacy—can be honored through other mechanisms. Data anonymization also plays a role in protecting privacy but is not suitable for all research, particularly pragmatic clinical trials. In this article, we explore both the ethical foundation and regulatory framework intended to protect privacy in pragmatic clinical trials. We then review examples of novel approaches to respecting persons in research that may have the added benefit of honoring patient privacy considerations. © The Author(s) 2015.

  8. 75 FR 3232 - Access to Confidential Business Information by Versar Inc. and Its Identified Subcontractor

    Science.gov (United States)

    2010-01-20

    ... manufacture, process or distribute industrial chemicals. Since other entities may also be interested, the..., 6, and 8 of the Toxic Substances Control Act (TSCA). Some of the information may be claimed or... evaluating the exposure of new chemical substances, including microorganisms and nanomaterials. They will...

  9. 77 FR 24697 - Access to Confidential Business Information by CGI Federal Inc. and Its Identified Subcontractor...

    Science.gov (United States)

    2012-04-25

    ... support for two operations security management areas: 1. Security Technical Operations, including the operations and maintenance of EPA's network security infrastructure devices and 2. Operations Security... reporting, security assessment and consulting and security audits support for the Wide Area Network (WAN...

  10. 75 FR 70672 - Access to Confidential Business Information by Computer Sciences Corporation and Its Identified...

    Science.gov (United States)

    2010-11-18

    ... Management Systems of 691 N. High Street, 2nd Floor, Columbus, OH; KForce of 950 Herndon Parkway, Suite 360...) in routine system administration (SA) and database administration (DBA) as required to support OPPT... configuration changes; assistance in backups/restoration of data; installation of operating system maintenance...

  11. THE INFORMATION CONFIDENTIALITY AND CYBER SECURITY IN MEDICAL INSTITUTIONS

    Directory of Open Access Journals (Sweden)

    SABAU-POPA CLAUDIA DIANA

    2015-07-01

    Full Text Available The information confidentiality and cyber security risk affects the right to confidentiality and privacy of the patient, as regulated in Romania by the Law 46/2002. The manifestation of the cyber security risk event affects the reputation of the healthcare institution and is becoming more and more complex and often due to the: development of network technology, the medical equipment connected to wifi and the electronic databases. The databases containing medical records were implemented due to automation. Thus, transforming data into medical knowledge contribute to a better understanding of the disease. Due to these factors, the measures taken by the hospital management for this type of risk are adapted to the cyber changes. The hospital objectives aim: the implementation of a robust information system, the early threats identifications and the incident reporting. Neglecting this type of risk can generate financial loss, inability to continue providing health care services for a certain period of time, providing an erroneous diagnosis, medical equipment errors etc. Thus, in a digital age the appropriate risk management for the information security and cyber risk represent a necessity. The main concern of hospitals worldwide is to align with international requirements and obtain credentials in terms of data security from the International Organisation for Standardization, which regulates the management of this type of risk. Romania is at the beginning in terms of concerns regarding the management, avoidance and mitigation of information security, the health system being most highly exposed to its manifestation. The present paper examines the concerns of the health system to the confidentiality of information and cyber security risk and its management arrangements. Thus, a set of key risk indicators is implemented and monitored for 2011-2013, using a user interface, a Dashboard, which acts as an early warning system of the manifestation of the

  12. Gossip, stories and friendship: confidentiality in midwifery practice.

    Science.gov (United States)

    James, S

    1995-12-01

    Women often seek midwifery care as an alternative to the maternity services that are readily available within the insured health care system in Alberta. Some aspects of community-based, primary care midwifery in Alberta that characterize this alternative are the use of story-telling as a form of knowledge, the development of social connections among women seeking midwifery care, and nonauthoritarian relationships between midwives and women. In this paper, the concept of confidentiality, as it relates to these aspects of midwifery practice, is explored, using traditional, caring and feminist models of ethics.

  13. Teaching Confidentiality through Comics at One Spanish Medical School.

    Science.gov (United States)

    Lalanda, Mónica; Altisent, Rogelio; Delgado-Marroquín, Maria Teresa

    2018-02-01

    At the University of Zaragoza in Spain we developed an innovative way to teach the concept of confidentiality to medical students, which we tested by comparing the use of customized comics with more traditional methods. We proved that using comics is more attractive to students than lectures and class discussions, that it increases class participation and students' self-awareness of learning, and that it maintains the same academic results. We share our experience visually in a two-page comic. © 2018 American Medical Association. All Rights Reserved.

  14. Quantum key based burst confidentiality in optical burst switched networks.

    Science.gov (United States)

    Balamurugan, A M; Sivasubramanian, A

    2014-01-01

    The optical burst switching (OBS) is an emergent result to the technology concern that could achieve a feasible network in future. They are endowed with the ability to meet the bandwidth requirement of those applications that require intensive bandwidth. There are more domains opening up in the OBS that evidently shows their advantages and their capability to face the future network traffic. However, the concept of OBS is still far from perfection facing issues in case of security threat. The transfer of optical switching paradigm to optical burst switching faces serious downfall in the fields of burst aggregation, routing, authentication, dispute resolution, and quality of service (QoS). This paper deals with employing RC4 (stream cipher) to encrypt and decrypt bursts thereby ensuring the confidentiality of the burst. Although the use of AES algorithm has already been proposed for the same issue, by contrasting the two algorithms under the parameters of burst encryption and decryption time, end-to-end delay, it was found that RC4 provided better results. This paper looks to provide a better solution for the confidentiality of the burst in OBS networks.

  15. Quantum Key Based Burst Confidentiality in Optical Burst Switched Networks

    Directory of Open Access Journals (Sweden)

    A. M. Balamurugan

    2014-01-01

    Full Text Available The optical burst switching (OBS is an emergent result to the technology concern that could achieve a feasible network in future. They are endowed with the ability to meet the bandwidth requirement of those applications that require intensive bandwidth. There are more domains opening up in the OBS that evidently shows their advantages and their capability to face the future network traffic. However, the concept of OBS is still far from perfection facing issues in case of security threat. The transfer of optical switching paradigm to optical burst switching faces serious downfall in the fields of burst aggregation, routing, authentication, dispute resolution, and quality of service (QoS. This paper deals with employing RC4 (stream cipher to encrypt and decrypt bursts thereby ensuring the confidentiality of the burst. Although the use of AES algorithm has already been proposed for the same issue, by contrasting the two algorithms under the parameters of burst encryption and decryption time, end-to-end delay, it was found that RC4 provided better results. This paper looks to provide a better solution for the confidentiality of the burst in OBS networks.

  16. HIPAA-protecting patient confidentiality or covering something else?

    Directory of Open Access Journals (Sweden)

    Robbins RA

    2013-10-01

    Full Text Available No abstract available. Article truncated at 150 words. A case of a physician fired from the Veterans Administration (VA for violation of the Health Care Portability and Accountability Act of 1996 (HIPAA illustrates a problem with both the law and the VA. Anil Parikh, a VA physician at the Jesse Brown VA in Chicago, was dismissed on a charge of making unauthorized disclosures of confidential patient information on October 19, 2007. On January 3, 2011 the Merit Systems Protection Board (MSPB reversed Dr. Parikh’s removal. Dr. Parikh's initially made disclosures to the VA Office of Inspector General and to Senator Barack Obama and Congressman Luis Gutierrez, in whose district the Jesse Brown VA lies. Dr. Parikh alleged that there were systematic problems within the Jesse Brown VA that resulted in untimely and inadequate patient care. The confidential patient information Parikh disclosed included examples of the misdiagnoses and misdirection of patients within the hospital. Specifically, Dr. Parikh alleged that …

  17. The outcome of apical microsurgery using MTA as the root-end filling material: 2- to 6-year follow-up study.

    Science.gov (United States)

    Çalışkan, M K; Tekin, U; Kaval, M E; Solmaz, M C

    2016-03-01

    To evaluate the influence of various predictors on the healing outcome 2-6 years after apical microsurgery (AMS) using MTA as the root-end filling material. A total of 90 anterior teeth with asymptomatic persistent periradicular periodontitis of strictly endodontic origin that failed after either nonsurgical or surgical treatment were included. Surgery was completed under local anaesthesia using a standardized clinical protocol. Clinical and radiographic measures as well as the follow-up period were used to determine the healing outcome. For statistical analysis of the predictors, the outcome was dichotomized into healed cases and nonhealed cases. Odds ratios were calculated, and Pearson chi-square or Fisher's exact tests were used to analyse the data. Clinical and radiographic assessment of AMS revealed that 80% were healed, 14.4% were nonhealed, whilst 5.6% were judged to be uncertain. None of the various predictors investigated had a significant influence on the outcome of AMS. The results of this clinical study demonstrated that 80% of cases that received apical microsurgery healed when using MTA as the root-end filling material. © 2015 International Endodontic Journal. Published by John Wiley & Sons Ltd.

  18. Effects of LED phototherapy on bone defects grafted with MTA, bone morphogenetic proteins and guided bone regeneration: a Raman spectroscopic study.

    Science.gov (United States)

    Pinheiro, Antonio L B; Soares, Luiz G P; Cangussú, Maria Cristina T; Santos, Nicole R S; Barbosa, Artur Felipe S; Silveira Júnior, Landulfo

    2012-09-01

    We studied peaks of calcium hydroxyapatite (CHA) and protein and lipid CH groups in defects grafted with mineral trioxide aggregate (MTA) treated or not with LED irradiation, bone morphogenetic proteins and guided bone regeneration. A total of 90 rats were divided into ten groups each of which was subdivided into three subgroups (evaluated at 15, 21 and 30 days after surgery). Defects were irradiated with LED light (wavelength 850 ± 10 nm) at 48-h intervals for 15 days. Raman readings were taken at the surface of the defects. There were no statistically significant differences in the CHA peaks among the nonirradiated defects at any of the experimental time-points. On the other hand, there were significant differences between the defects filled with blood clot and the irradiated defects at all time-points (p Raman spectral analysis indicate that infrared LED light irradiation improves the deposition of CHA in healing bone grafted or not with MTA.

  19. Outsourcing medical data analyses: can technology overcome legal, privacy, and confidentiality issues?

    Science.gov (United States)

    Brumen, Bostjan; Heričko, Marjan; Sevčnikar, Andrej; Završnik, Jernej; Hölbl, Marko

    2013-12-16

    Medical data are gold mines for deriving the knowledge that could change the course of a single patient's life or even the health of the entire population. A data analyst needs to have full access to relevant data, but full access may be denied by privacy and confidentiality of medical data legal regulations, especially when the data analyst is not affiliated with the data owner. Our first objective was to analyze the privacy and confidentiality issues and the associated regulations pertaining to medical data, and to identify technologies to properly address these issues. Our second objective was to develop a procedure to protect medical data in such a way that the outsourced analyst would be capable of doing analyses on protected data and the results would be comparable, if not the same, as if they had been done on the original data. Specifically, our hypothesis was there would not be a difference between the outsourced decision trees built on encrypted data and the ones built on original data. Using formal definitions, we developed an algorithm to protect medical data for outsourced analyses. The algorithm was applied to publicly available datasets (N=30) from the medical and life sciences fields. The analyses were performed on the original and the protected datasets and the results of the analyses were compared. Bootstrapped paired t tests for 2 dependent samples were used to test whether the mean differences in size, number of leaves, and the accuracy of the original and the encrypted decision trees were significantly different. The decision trees built on encrypted data were virtually the same as those built on original data. Out of 30 datasets, 100% of the trees had identical accuracy. The size of a tree and the number of leaves was different only once (1/30, 3%, P=.19). The proposed algorithm encrypts a file with plain text medical data into an encrypted file with the data protected in such a way that external data analyses are still possible. The results

  20. Privacy and Confidentiality in Exchange of Information Procedures : Some Uncertainties, Many Issues, but Few Solutions

    NARCIS (Netherlands)

    Debelva, F.; Mosquera, Valderrama I.J.

    2017-01-01

    The overall aim of this article is to analyse the taxpayers’ rights to confidentiality and privacy in exchange of information including the new global standard of automatic exchange of information. Section 2 will analyse the state of the art regarding the right to privacy and confidentiality in

  1. 5 CFR 2634.901 - Policies of confidential financial disclosure reporting.

    Science.gov (United States)

    2010-01-01

    .... (a) The confidential financial reporting system set forth in this subpart is designed to complement... Government duties involve the exercise of significant discretion in certain sensitive areas, report their... apparent conflicts of interest. The confidential financial disclosure system promotes that goal, with...

  2. 41 CFR 105-60.405 - Processing requests for confidential commercial information.

    Science.gov (United States)

    2010-07-01

    ... MATERIALS 60.4-Described Records § 105-60.405 Processing requests for confidential commercial information... 41 Public Contracts and Property Management 3 2010-07-01 2010-07-01 false Processing requests for confidential commercial information. 105-60.405 Section 105-60.405 Public Contracts and Property Management...

  3. Attitude of Lithuanian residents to confidentiality of adolescent sexual and reproductive health care

    DEFF Research Database (Denmark)

    Jaruseviciene, Lina; Lazarus, Jeff; Zaborskis, Apolinaras

    2011-01-01

    To assess the attitudes of Lithuanian residents towards the protection of confidentiality in the sexual and reproductive health care of adolescents.......To assess the attitudes of Lithuanian residents towards the protection of confidentiality in the sexual and reproductive health care of adolescents....

  4. University Student Expectations of Confidentiality When Disclosing Information to Their Professors

    Science.gov (United States)

    Harris, Gregory E.; Dalton, Stephanie

    2014-01-01

    The purpose of this study was to explore university students' expectations of confidentiality when they make disclosures to their university professors. A secondary purpose was to consider if students have a higher expectation of confidentiality when talking with Psychology professors versus professors in other disciplines. Students were asked to…

  5. 40 CFR 260.2 - Availability of information; confidentiality of information.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 25 2010-07-01 2010-07-01 false Availability of information; confidentiality of information. 260.2 Section 260.2 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) SOLID WASTES (CONTINUED) HAZARDOUS WASTE MANAGEMENT SYSTEM: GENERAL General § 260.2 Availability of information; confidentiality of...

  6. Privacy and Confidentiality Practices In Adolescent Family Planning Care At Federally Qualified Health Centers.

    Science.gov (United States)

    Beeson, Tishra; Mead, Katherine H; Wood, Susan; Goldberg, Debora Goetz; Shin, Peter; Rosenbaum, Sara

    2016-03-01

    The confidentiality of family planning services remains a high priority to adolescents, but barriers to implementing confidentiality and privacy practices exist in settings designed for teenagers who are medically underserved, including federally qualified health centers (FQHCs). A sample of 423 FQHCs surveyed in 2011 provided information on their use of five selected privacy and confidentiality practices, which were examined separately and combined into an index. Regression modeling was used to assess whether various state policies and organizational characteristics were associated with FQHCs' scores on the index. In-depth case studies of six FQHCs were conducted to provide additional contextual information. Among FQHCs reporting on confidentiality, most reported providing written or verbal information regarding adolescents' rights to confidential care (81%) and limiting access to family planning and medical records to protect adolescents' confidentiality (84%). Far fewer reported maintaining separate medical records for family planning (10%), using a security block on electronic medical records to prevent disclosures (43%) or using separate contact information for communications regarding family planning services (50%). Index scores were higher among FQHCs that received Title X funding than among those that did not (coefficient, 0.70) and among FQHCs with the largest patient volumes than among those with the smallest caseloads (0.43). Case studies highlighted how a lack of guidelines and providers' confusion over relevant laws present a challenge in offering confidential care to adolescents. The organizational practices used to ensure adolescent family planning confidentiality in FQHCs are varied across organizations. Copyright © 2016 by the Guttmacher Institute.

  7. 45 CFR 307.13 - Security and confidentiality for computerized support enforcement systems in operation after...

    Science.gov (United States)

    2010-10-01

    ... ENFORCEMENT SYSTEMS § 307.13 Security and confidentiality for computerized support enforcement systems in... systems in operation after October 1, 1997. (a) Information integrity and security. Have safeguards... 45 Public Welfare 2 2010-10-01 2010-10-01 false Security and confidentiality for computerized...

  8. 6 CFR 25.10 - Confidentiality and protection of Intellectual Property.

    Science.gov (United States)

    2010-01-01

    ... 6 Domestic Security 1 2010-01-01 2010-01-01 false Confidentiality and protection of Intellectual Property. 25.10 Section 25.10 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY REGULATIONS TO SUPPORT ANTI-TERRORISM BY FOSTERING EFFECTIVE TECHNOLOGIES § 25.10 Confidentiality and...

  9. 5 CFR 1312.26 - Control of secret and confidential material.

    Science.gov (United States)

    2010-01-01

    ... 5 Administrative Personnel 3 2010-01-01 2010-01-01 false Control of secret and confidential... Accountability of Classified Information § 1312.26 Control of secret and confidential material. Classified... Document Control, will be used to establish accountability controls on all Secret material received or...

  10. 42 CFR 405.215 - Confidential commercial and trade secret information.

    Science.gov (United States)

    2010-10-01

    ... 42 Public Health 2 2010-10-01 2010-10-01 false Confidential commercial and trade secret information. 405.215 Section 405.215 Public Health CENTERS FOR MEDICARE & MEDICAID SERVICES, DEPARTMENT OF... trade secret information. To the extent that CMS relies on confidential commercial or trade secret...

  11. 40 CFR 370.64 - What information can I claim as trade secret or confidential?

    Science.gov (United States)

    2010-07-01

    ... secret or confidential? 370.64 Section 370.64 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY... secret or confidential? (a) Trade secrets. You may be able to withhold the name of a specific chemical... trade secret. The requirements for withholding trade secret information are set forth in EPCRA section...

  12. 40 CFR 725.15 - Determining applicability when microorganism identity or use is confidential or uncertain.

    Science.gov (United States)

    2010-07-01

    ... ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) TOXIC SUBSTANCES CONTROL ACT REPORTING REQUIREMENTS AND REVIEW... appear on the public version of the Inventory, in § 725.239 or in subpart M of this part. Instead, it is contained in a confidential version held in EPA's Confidential Business Information Center (CBIC). The...

  13. 16 CFR 312.8 - Confidentiality, security, and integrity of personal information collected from children.

    Science.gov (United States)

    2010-01-01

    ... 16 Commercial Practices 1 2010-01-01 2010-01-01 false Confidentiality, security, and integrity of... COMMISSION REGULATIONS UNDER SPECIFIC ACTS OF CONGRESS CHILDREN'S ONLINE PRIVACY PROTECTION RULE § 312.8 Confidentiality, security, and integrity of personal information collected from children. The operator must...

  14. 77 FR 48072 - Final Confidentiality Determinations for Regulations Under the Mandatory Reporting of Greenhouse...

    Science.gov (United States)

    2012-08-13

    ... Final Confidentiality Determinations for Regulations Under the Mandatory Reporting of Greenhouse Gases... confidentiality determinations for certain data elements in regulations under the Mandatory Greenhouse Gas... Greenhouse Gas Reporting Program Web site at http://www.epa.gov/climatechange/emissions/ghgrulemaking.html...

  15. 17 CFR 200.83 - Confidential treatment procedures under the Freedom of Information Act.

    Science.gov (United States)

    2010-04-01

    ... SECURITIES AND EXCHANGE COMMISSION ORGANIZATION; CONDUCT AND ETHICS; AND INFORMATION AND REQUESTS Information... first received by the Commission (i) it is supplied segregated from information for which confidential..., 100 F Street, NE., Washington, DC 20549. The person requesting confidential treatment may supply...

  16. Having Confidence in Therapeutic Work with Young People: Constraints and Challenges to Confidentiality

    Science.gov (United States)

    Jenkins, Peter

    2010-01-01

    Confidentiality presents particular challenges to practitioners working with young people, on account of the latter's vulnerability and emotional immaturity. Ethical codes place a key importance on confidentiality, from deontological and teleological perspectives. However, young clients may rely on a more pragmatic approach in deciding whether to…

  17. 15 CFR Supplement No. 1 to Part 718 - Confidential Business Information Declared or Reported *

    Science.gov (United States)

    2010-01-01

    ... 15 Commerce and Foreign Trade 2 2010-01-01 2010-01-01 false Confidential Business Information... Commerce and Foreign Trade (Continued) BUREAU OF INDUSTRY AND SECURITY, DEPARTMENT OF COMMERCE CHEMICAL WEAPONS CONVENTION REGULATIONS CONFIDENTIAL BUSINESS INFORMATION Pt. 718, Supp. 1 Supplement No. 1 to Part...

  18. 42 CFR 2.1 - Statutory authority for confidentiality of drug abuse patient records.

    Science.gov (United States)

    2010-10-01

    ... HUMAN SERVICES GENERAL PROVISIONS CONFIDENTIALITY OF ALCOHOL AND DRUG ABUSE PATIENT RECORDS Introduction § 2.1 Statutory authority for confidentiality of drug abuse patient records. The restrictions of these regulations upon the disclosure and use of drug abuse patient records were initially authorized by section 408...

  19. 30 CFR 210.40 - Will MMS keep the information I provide confidential?

    Science.gov (United States)

    2010-07-01

    ... 30 Mineral Resources 2 2010-07-01 2010-07-01 false Will MMS keep the information I provide... MINERALS REVENUE MANAGEMENT FORMS AND REPORTS General Provisions § 210.40 Will MMS keep the information I provide confidential? The MMS will treat information obtained under this part as confidential to the...

  20. 30 CFR 291.111 - How does MMS treat the confidential information I provide?

    Science.gov (United States)

    2010-07-01

    ... 30 Mineral Resources 2 2010-07-01 2010-07-01 false How does MMS treat the confidential information... SHELF LANDS ACT § 291.111 How does MMS treat the confidential information I provide? (a) Any person who provides documents under this part in response to a request by MMS to inform a decision on whether open...

  1. 48 CFR 1552.235-71 - Treatment of confidential business information.

    Science.gov (United States)

    2010-10-01

    ... business information. 1552.235-71 Section 1552.235-71 Federal Acquisition Regulations System ENVIRONMENTAL... Clauses 1552.235-71 Treatment of confidential business information. As prescribed in 1535.007-70(b... determined that in the performance of a contract, EPA may furnish confidential business information to the...

  2. 48 CFR 1552.235-80 - Access to confidential business information.

    Science.gov (United States)

    2010-10-01

    ... business information. 1552.235-80 Section 1552.235-80 Federal Acquisition Regulations System ENVIRONMENTAL... Clauses 1552.235-80 Access to confidential business information. As prescribed in 1535.007-70(g), insert the following clause. Access to Confidential Business Information (OCT 2000) It is not anticipated...

  3. 48 CFR 1552.235-76 - Treatment of Confidential Business Information (APR 1996).

    Science.gov (United States)

    2010-10-01

    ... Business Information (APR 1996). 1552.235-76 Section 1552.235-76 Federal Acquisition Regulations System... Provisions and Clauses 1552.235-76 Treatment of Confidential Business Information (APR 1996). As prescribed in 1535.007-70(c), insert the following clause: Treatment of Confidential Business Information (TSCA...

  4. 48 CFR 1552.235-70 - Screening business information for claims of confidentiality.

    Science.gov (United States)

    2010-10-01

    ... 48 Federal Acquisition Regulations System 6 2010-10-01 2010-10-01 true Screening business... Texts of Provisions and Clauses 1552.235-70 Screening business information for claims of confidentiality... proprietary or confidential by the business that has the right to the information. The following clause...

  5. Confidentiality with Minors: The Need for Policy To Promote and Protect.

    Science.gov (United States)

    Stone, Carolyn; Isaacs, Madelyn L.

    2003-01-01

    Investigated school counselors' attitudes toward breaching confidentiality before and after the 1999 Columbine High School shootings. Surveys of demographically similar counselors indicated that the Columbine shootings affected counselors' predictions about their attitudes and behavior regarding confidentiality. Counselors were more reluctant to…

  6. 22 CFR 1101.5 - Security, confidentiality and protection of records.

    Science.gov (United States)

    2010-04-01

    ... 22 Foreign Relations 2 2010-04-01 2010-04-01 true Security, confidentiality and protection of... Bureau of Standard's booklet “Computer Security Guidelines for Implementing the Privacy Act of 1974” (May... STATES AND MEXICO, UNITED STATES SECTION PRIVACY ACT OF 1974 § 1101.5 Security, confidentiality and...

  7. Public expectations concerning confidentiality protection of adolescents' sexual and reproductive health care in Lithuania

    DEFF Research Database (Denmark)

    Jaruseviciene, Lina; Zaborskis, Apolinaras; Lazarus, Jeffrey Victor

    2014-01-01

    OBJECTIVE: An adolescent's right to confidential healthcare is protected by international law and professional consensus. However, parental and social support for confidential sexual and reproductive health (SRH) services, in particular, varies greatly. This study documents Lithuanian residents......' expectations with regard to confidentiality protection for adolescents in this domain, and explores the factors related to the diversity of these expectations. METHODS: Two national surveys of Lithuanian residents completed in 2005 and 2012 using anonymous questionnaires. Participants rated their expectations...... for confidentiality using a five-point Likert scale for eight types of SRH consultations. RESULTS: Public anticipation for confidentiality depended on whether issues related to sexual behaviour or to its consequences were addressed during adolescent consultation. Only younger respondents had higher expectations...

  8. Genetic secrets: Protecting privacy and confidentiality in the genetic era. Final report

    Energy Technology Data Exchange (ETDEWEB)

    Rothstein, M.A. [ed.

    1998-09-01

    Few developments are likely to affect human beings more profoundly in the long run than the discoveries resulting from advances in modern genetics. Although the developments in genetic technology promise to provide many additional benefits, their application to genetic screening poses ethical, social, and legal questions, many of which are rooted in issues of privacy and confidentiality. The ethical, practical, and legal ramifications of these and related questions are explored in depth. The broad range of topics includes: the privacy and confidentiality of genetic information; the challenges to privacy and confidentiality that may be projected to result from the emerging genetic technologies; the role of informed consent in protecting the confidentiality of genetic information in the clinical setting; the potential uses of genetic information by third parties; the implications of changes in the health care delivery system for privacy and confidentiality; relevant national and international developments in public policies, professional standards, and laws; recommendations; and the identification of research needs.

  9. A rural/urban comparison of privacy and confidentiality concerns associated with providing sensitive location information in epidemiologic research involving persons who use drugs.

    Science.gov (United States)

    Rudolph, Abby E; Young, April M; Havens, Jennifer R

    2017-11-01

    Analyses that link contextual factors with individual-level data can improve our understanding of the "risk environment"; however, the accuracy of information provided by participants about locations where illegal/stigmatized behaviors occur may be influenced by privacy/confidentiality concerns that may vary by setting and/or data collection approach. We recruited thirty-five persons who use drugs from a rural Appalachian town and a Mid-Atlantic city to participate in in-depth interviews. Through thematic analyses, we identified and compared privacy/confidentiality concerns associated with two survey methods that (1) collect self-reported addresses/cross-streets and (2) use an interactive web-based map to find/confirm locations in rural and urban settings. Concerns differed more by setting than between methods. For example, (1) rural participants valued interviewer rapport and protections provided by the Certificate of Confidentiality more; (2) locations considered to be sensitive differed in rural (i.e., others' homes) and urban (i.e., where drugs were used) settings; and (3) urban participants were more likely to view providing cross-streets as an acceptable alternative to providing exact addresses for sensitive locations and to prefer the web-based map approach. Rural-urban differences in privacy/confidentiality concerns reflect contextual differences (i.e., where drugs are used/purchased, population density, and prior drug-related arrests). Strategies to alleviate concerns include: (1) obtain a Certificate of Confidentiality, (2) collect geographic data at the scale necessary for proposed analyses, and (3) permit participants to provide intersections/landmarks in close proximity to actual locations rather than exact addresses or to skip questions where providing an intersection/landmark would not obfuscate the actual address. Copyright © 2017 Elsevier Ltd. All rights reserved.

  10. 48 CFR 1552.235-73 - Access to Federal Insecticide, Fungicide, and Rodenticide Act Confidential Business Information...

    Science.gov (United States)

    2010-10-01

    ... Insecticide, Fungicide, and Rodenticide Act Confidential Business Information (APR 1996). 1552.235-73 Section... Insecticide, Fungicide, and Rodenticide Act Confidential Business Information (APR 1996). As prescribed in... Act Confidential Business Information (APR 1996) In order to perform duties under the contract, the...

  11. 48 CFR 1552.235-75 - Access to Toxic Substances Control Act Confidential Business Information (APR 1996).

    Science.gov (United States)

    2010-10-01

    ... Control Act Confidential Business Information (APR 1996). 1552.235-75 Section 1552.235-75 Federal... Confidential Business Information (APR 1996). As prescribed in 1535.007(b), insert the following provision: Access to Toxic Substances Control Act Confidential Business Information (APR 1996) In order to perform...

  12. Dentin penetrability evaluation of three different dyes in root-end cavities filled with mineral trioxide aggregate (MTA Avaliação da penetração dentinária de três diferentes corantes em retrocavidades obturadas com agregado trióxido mineral (MTA

    Directory of Open Access Journals (Sweden)

    Beatriz Farias Vogt

    2006-04-01

    Full Text Available The purpose of this study was to evaluate the penetration of three dyes in MTA root-end fillings. In 30 single-rooted teeth, cavities for retrofilling were prepared with an ultrasound appliance and filled with MTA. The specimens were randomly assigned to three groups (n = 10 and immersed in the following solutions: 2% methylene blue (MET, 50% silver nitrate (NIT and 0.2% rhodamine B (ROD. Two transversal slices (1 mm of the retrofilling region were obtained and evaluated using the Image Tool 3.0 software to obtain a quantitative evaluation (in mm² of the dye penetration around the retrofillings. Data were submitted to statistical analysis using Student’s t-test. The lowest degree of dye penetration was observed for the NIT group, in both slices (p A proposta deste trabalho foi avaliar a penetração de três corantes em retrocavidades obturadas com MTA. As retrocavidades foram confeccionadas com aparelho de ultra-som em 30 dentes unirradiculares e obturadas com MTA. Os espécimes foram divididos aleatoriamente em três grupos (n = 10 e imersos nas seguintes soluções corantes: azul de metileno a 2% (MET, nitrato de prata a 50% (NIT e rodamina B a 0,2% (ROD. Duas fatias transversais (1 mm da região retrobturada foram obtidas e avaliadas através do software Image Tool 3.0, objetivando quantificar a área (em mm² de penetração do corante ao redor das retrobturações. Os dados foram submetidos à análise estatística, utilizando o teste t de Student. A menor área de penetração foi observada no grupo NIT, nas duas fatias (p < 0.05. A penetração de corante foi significativamente maior no grupo ROD quando comparado ao grupo NIT, nas duas fatias (p < 0.05, e ao grupo MET, somente na fatia 1 (p < 0.05. Dentro das limitações desta pesquisa, concluiu-se que a escolha da solução corante pode influenciar a avaliação da penetração em estudos sobre retrobturações e que o grupo NIT teve a menor capacidade de penetração na dentina

  13. Estudio analítico de MTA-Angelus® y Biodentine® con técnicas SPME-GCMS y AFM

    OpenAIRE

    Díaz-Flores García, Víctor; Martínez Pérez, Lucía; Escribano Otero, Amparo; Kayali Sayadi, Nour

    2016-01-01

    Introducción: El objetivo del estudio fue obtener información analítica sobre la pureza química y homogeneidad de los materiales de uso endodóntico MTA-Angelus® y Biodentine®. Material y métodos: Se analizaron ambos materiales mediante la técnica de microextracción en fase sólida (SPME), combinada con cromatografía de gases acoplada a espectrómetro de masas (GC-MS) para separar e identificar los compuestos orgánicos volátiles (COVs) contenidos. Por otro lado, utilizando microscopía de f...

  14. Half of Vermont Academic and Public Libraries Lack Written Confidentiality Policies Despite Directors’ Support for Principles of Patron Confidentiality. A Review of: Magi, Trina J., “The Gap between Theory and Practice: A Study of the Prevalence and Strength of Patron Confidentiality Policies in Public and Academic Libraries.” Library & Information Science Research 29 (2007: 455-70.

    Directory of Open Access Journals (Sweden)

    Stephanie Walker

    2008-09-01

    Full Text Available Objectives – To examine the prevalence and strength of patron confidentiality policies and practices at academic and public libraries in Vermont; to examine variances in policies by type and size of library and by qualifications of library directors; and to examine the level of support among Vermont library directors for strengthening state law to clarify that personally identifiable information about library patrons is confidential and should only be released with a court order.Design – Survey (non-randomized of 213 library directors.Setting – Academic and public libraries in Vermont (USA.Subjects – The initial audience was defined to be the directors of the 213 academic and public libraries in Vermont (as the persons to whom the survey was directed. Ultimately, results from 149 returned surveys were used as a basis for analysis. In addition, a written report of the information gathered was provided to the governing bodies of the Vermont Department of Libraries and the Vermont Library Association. The author also anticipates that the results of the survey will be of general interest to academic and public librarians.Methods – A literature review of previous research on library policies and practices regarding patron confidentiality was completed. As well, the author examined the various state and federal laws and library association codes of ethics which address issues of the confidentiality of library patron data. A paper questionnaire was mailed on January 11, 2006, to directors of 188 municipal and incorporated public libraries (including 11 combined public and school libraries and 25 college and university libraries, for a total of 213 libraries targeted. Cover letters explaining the purpose of the study and assuring respondents of the confidentiality of their responses were included in the mailing. The contact information came from a list supplied by the Vermont Department of Libraries. The questionnaire had previously been

  15. Evaluation of the reinforcement effect on teeth with different apical foramen diameters of retrograde or orthograde MTA application with internal matrix

    Directory of Open Access Journals (Sweden)

    Emre Bayram

    2016-01-01

    Full Text Available OBJECTIVE: The aim of this study was to determine the effect of the apical foramen diameter and different application methods of Mineral Trioxide Aggregate (MTA on the fracture resistance of simulated immature teeth using a Universal Testing Machine. MATERIALS AND METHOD: Ninety extracted human teeth were used for the fracture resistance test. The apical foramen was prepared to a diameter of 1.0 mm or 1.4 mm to simulate the open apex of immature teeth. MTA was mixed according to manufacturer's recommendations and placed into the root canals with different apical foramen diameter by four different root filling techniques: retrograde, two-phased orthograde, and ortograde with or without internal matrix. Prepared roots were marked 2 mm below the cemento-enamel junction and embedded in transparent acrylic resin in cylinder moulds. Vertical force was applied along the long axis of the tooth at a speed of 5 mm/min, and the maximum resistance to fracture for each tooth was determined in Newton. A software package was used for the statistical analysis. The data were analyzed by using one-way ANOVA and post-hoc Tukey tests. RESULTS: A statistically significant difference could not be observed between the groups (p>0.05 whereas statistically significant differences were found between the test groups and the control groups (p<0.05. CONCLUSION: There was no significant difference between different vertical root filling techniques in increasing the fracture strength of the teeth. The diameter of the apical foramen did not have a significant effect on the fracture resistance.

  16. Childhood Factors Affecting Persistence and Desistence of Attention-Deficit/Hyperactivity Disorder Symptoms in Adulthood: Results From the MTA.

    Science.gov (United States)

    Roy, Arunima; Hechtman, Lily; Arnold, L Eugene; Sibley, Margaret H; Molina, Brooke S G; Swanson, James M; Howard, Andrea L

    2016-11-01

    To determine childhood factors that predict attention-deficit/hyperactivity disorder (ADHD) persistence and desistence in adulthood. Regression analyses were used to determine associations between childhood factors and adult ADHD symptom persistence in 453 participants (mean age, 25 years) from the Multimodal Treatment Study of Children with ADHD (MTA). Childhood IQ, total number of comorbidities, child-perceived parenting practices, child-perceived parent-child relationships, parental mental health problems, marital problems of parents, household income levels, and parental education were assessed at a mean age of 8 years in all participants. Adult ADHD persistence was defined using DSM-5 symptom counts either with or without impairment, as well as mean ADHD symptom scores on the Conners' Adult ADHD Rating Scale (CAARS). Age, sex, MTA site, and childhood ADHD symptoms were covaried. The most important childhood predictors of adult ADHD symptom persistence were initial ADHD symptom severity (odds ratio [OR] = 1.89, standard error [SE] = 0.28, p = .025), comorbidities (OR = 1.19, SE = 0.07, p = .018), and parental mental health problems (OR = 1.30, SE = 0.09, p = .003). Childhood IQ, socioeconomic status, parental education, and parent-child relationships showed no associations with adult ADHD symptom persistence. Initial ADHD symptom severity, parental mental health, and childhood comorbidity affect persistence of ADHD symptoms into adulthood. Addressing these areas early may assist in reducing adult ADHD persistence and functioning problems. Copyright © 2016 American Academy of Child and Adolescent Psychiatry. Published by Elsevier Inc. All rights reserved.

  17. 18 CFR 401.75 - Protection of trade secrets; Confidential information.

    Science.gov (United States)

    2010-04-01

    ..., confidential statistical data, amount or source of any income, profits, losses, or expenditures of any person... States Code which provides: Whoever, being an officer or employee of the United States or of any...

  18. 75 FR 56096 - Access to Confidential Business Information by Industrial Economics Incorporated

    Science.gov (United States)

    2010-09-15

    ... ENVIRONMENTAL PROTECTION AGENCY [EPA-HQ-OPPT-2003-0004; FRL-8845-1] Access to Confidential Business Information by Industrial Economics Incorporated AGENCY: Environmental Protection Agency (EPA). ACTION: Notice. SUMMARY: EPA has authorized contractor, Industrial Economics Incorporated (IEI) of...

  19. Genetic privacy and confidentiality: why they are so hard to protect.

    Science.gov (United States)

    Rothstein, M A

    1998-01-01

    Author notes that widespread concerns have been raised about protecting genetic privacy and confidentiality in insurance and employment. He argues that effective protections are difficult because complicated issues, such as the right of access to health care, are invariably implicated.

  20. Developing an effective corrective action process : lessons learned from operating a confidential close call reporting system

    Science.gov (United States)

    2013-03-05

    In 2007, the Federal Railroad Administration (FRA) launched : C3RS, the Confidential Close Call Reporting System, as a : demonstration project to learn how to facilitate the effective : reporting and implementation of corrective actions, and assess t...

  1. 7 CFR 981.75 - Confidential nature of records and reports.

    Science.gov (United States)

    2010-01-01

    ... Section 981.75 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (Marketing Agreements and Orders; Fruits, Vegetables, Nuts), DEPARTMENT OF AGRICULTURE ALMONDS..., financial condition, or business operations of any handler shall be considered as confidential information...

  2. Confidentiality Enhancement of Highly Sensitive Nuclear Data Using Steganography with Chaotic Encryption over OFDM Channel

    International Nuclear Information System (INIS)

    Mahmoud, S.; Ayad, N.; Elsayed, F.; Elbendary, M.

    2016-01-01

    Full text: Due to the widespread usage of the internet and other wired and wireless communication methods, the security of the transmitted data has become a major requirement. Nuclear knowledge is mainly built upon the exchange of nuclear information which is considered highly sensitive information, so its security has to be enhanced by using high level security mechanisms. Data confidentiality is concerned with the achievement of higher protection for confidential information from unauthorized disclosure or access. Cryptography and steganography are famous and widely used techniques that process information in order to achieve its confidentiality, but sometimes, when used individually, they don’t satisfy a required level of security for highly sensitive data. In this paper, cryptography is accompanied with steganography for constituting a multilayer security techniques that can strengthen the level of security of highly confidential nuclear data that are archived or transmitted through different channel types and noise conditions. (author)

  3. 77 FR 12284 - Access to Confidential Business Information; Protection Strategies Incorporated

    Science.gov (United States)

    2012-02-29

    ... Business Information; Protection Strategies Incorporated AGENCY: Environmental Protection Agency (EPA). ACTION: Notice. SUMMARY: EPA has authorized its contractor, Protection Strategies Incorporated (PSI) of... Business Information (CBI). DATES: Access to the confidential data occurred on or about February 16, 2012...

  4. Privacy Act System of Records: Confidential Business Information Tracking System, EPA-20

    Science.gov (United States)

    Learn about the Confidential Business Information Tracking System, including who is covered in the system, the purpose of data collection, routine uses for the system's records, and other security procedures.

  5. 78 FR 54889 - Proposed Information Collection Request; Comment Request; Confidentiality Rules (Renewal)

    Science.gov (United States)

    2013-09-06

    ... received will be included in the public docket without change including any personal information provided, unless the comment includes profanity, threats, or information claimed to be Confidential Business... of appropriate automated electronic, mechanical, or other technological collection techniques or...

  6. 75 FR 8330 - Access to Confidential Business Information by Eastern Research Group

    Science.gov (United States)

    2010-02-24

    ... ENVIRONMENTAL PROTECTION AGENCY [EPA-HQ-OPPT-2003-0004; FRL-8812-4] Access to Confidential Business Information by Eastern Research Group AGENCY: Environmental Protection Agency (EPA). ACTION: Notice. [[Page 8331

  7. 12 CFR 261.20 - Confidential supervisory information made available to supervised financial institutions and...

    Science.gov (United States)

    2010-01-01

    ... available to supervised financial institutions and financial institution supervisory agencies. 261.20... Supervised Institutions, Financial Institution Supervisory Agencies, Law Enforcement Agencies, and Others in... institutions and financial institution supervisory agencies. (a) Disclosure of confidential supervisory...

  8. Confidentiality considerations for use of social-spatial data on the social determinants of health: Sexual and reproductive health case study.

    Science.gov (United States)

    Haley, Danielle F; Matthews, Stephen A; Cooper, Hannah L F; Haardörfer, Regine; Adimora, Adaora A; Wingood, Gina M; Kramer, Michael R

    2016-10-01

    Understanding whether and how the places where people live, work, and play are associated with health behaviors and health is essential to understanding the social determinants of health. However, social-spatial data which link a person and their attributes to a geographic location (e.g., home address) create potential confidentiality risks. Despite the growing body of literature describing approaches to protect individual confidentiality when utilizing social-spatial data, peer-reviewed manuscripts displaying identifiable individual point data or quasi-identifiers (attributes associated with the individual or disease that narrow identification) in maps persist, suggesting that knowledge has not been effectively translated into public health research practices. Using sexual and reproductive health as a case study, we explore the extent to which maps appearing in recent peer-reviewed publications risk participant confidentiality. Our scoping review of sexual and reproductive health literature published and indexed in PubMed between January 1, 2013 and September 1, 2015 identified 45 manuscripts displaying participant data in maps as points or small-population geographic units, spanning 26 journals and representing studies conducted in 20 countries. Notably, 56% (13/23) of publications presenting point data on maps either did not describe approaches used to mask data or masked data inadequately. Furthermore, 18% (4/22) of publications displaying data using small-population geographic units included at least two quasi-identifiers. These findings highlight the need for heightened education for researchers, reviewers, and editorial teams. We aim to provide readers with a primer on key confidentiality considerations when utilizing linked social-spatial data for visualizing results. Given the widespread availability of place-based data and the ease of creating maps, it is critically important to raise awareness on when social-spatial data constitute protected health

  9. When security and medicine missions conflict: confidentiality in prison settings.

    Science.gov (United States)

    Allen, Scott A; Aburabi, Raed

    2016-06-13

    Purpose - It is a simple fact that prisons cannot exist - practically, legally, ethically or morally - without the support of physicians and other health professionals. Access to adequate healthcare is one of the fundamental measures of the legitimacy of a jail or prison. At the same time, there is a fundamental tension in the missions of the prison and doctor. The primary mission of the prison is security and often punishment. Reform and rehabilitation have intermittently been stated goals of prisons in the last century, but in practice those humane goals have rarely governed prison administrative culture. The primary mission of the physician is to promote the health and welfare of his or her patient. The paper aims to discuss these issues. Design/methodology/approach - At times, what is required to serve the patient's best interest is at odds with the interests of security. Much of the work of the prison physician does not conflict with the operation of security. Indeed, much of the work of the prison physician is allowed to proceed without much interference from the security regime. But given the fundamental discord in the legitimate missions of security vs medicine, conflict between the doctor and the warden is inevitable. Findings - In this paper, the authors consider the example of patient confidentiality to illustrate this conflict, using case examples inspired by real cases from the experience of the authors. Originality/value - The authors provide an ethical and practical framework for health professionals to employ when confronting these inevitable conflicts in correctional settings.

  10. RESPECTING THE CONFIDENTIALITY AND ANONYMITY IN QUALITATIVE RESEARCH IN SOCIOLOGY

    Directory of Open Access Journals (Sweden)

    Maria OPREA

    2018-06-01

    Full Text Available Ethics, a philosophical discipline, formulates a set of principles that must be followed, in respect of good and truth, fundamental values of humanity. The world of scientific research, of all kinds, also obeys moral imperatives and principles and is called upon to answer to society not only in relation to the discoveries themselves but, above all, in relation to the possible destructive effects on man or his life environment. The researcher in the sphere of social sciences is more involved in the act of responsibility, the more the topic subject of the study is the individual, the social group, the social environment. He must rigorously follow the principles and requirements of fair, honest, objective studies that do not harm the dignity of the human being. In line with the ethical rigors of scientific research, the article aims to highlight some aspects of respecting the principle of confidentiality and anonymity in qualitative research in the field of sociology, with reference to the study of vulnerable groups in Arad County.

  11. Confidentiality Protection of Digital Health Records in Cloud Computing.

    Science.gov (United States)

    Chen, Shyh-Wei; Chiang, Dai Lun; Liu, Chia-Hui; Chen, Tzer-Shyong; Lai, Feipei; Wang, Huihui; Wei, Wei

    2016-05-01

    Electronic medical records containing confidential information were uploaded to the cloud. The cloud allows medical crews to access and manage the data and integration of medical records easily. This data system provides relevant information to medical personnel and facilitates and improve electronic medical record management and data transmission. A structure of cloud-based and patient-centered personal health record (PHR) is proposed in this study. This technique helps patients to manage their health information, such as appointment date with doctor, health reports, and a completed understanding of their own health conditions. It will create patients a positive attitudes to maintain the health. The patients make decision on their own for those whom has access to their records over a specific span of time specified by the patients. Storing data in the cloud environment can reduce costs and enhance the share of information, but the potential threat of information security should be taken into consideration. This study is proposing the cloud-based secure transmission mechanism is suitable for multiple users (like nurse aides, patients, and family members).

  12. WTO confidential: the case of asbestos. World Trade Organization.

    Science.gov (United States)

    Castleman, Barry

    2002-01-01

    The World Trade Organization (WTO), created in 1995, adjudicates "trade disputes" between member nations in cases with great human rights, cultural, environmental, and public health significance. Throughout the process of dispute resolution and even after a case is concluded, very little of what happens is made accessible to the public. However, it is one thing to criticize the WTO for its lack of transparency from outside the process, and another to critically examine what was withheld from disclosure and what dangers that presents. This is the inside story from a scientific adviser to one of the parties in a WTO case, analyzing what happened from a public health point of view. This analysis concludes that the public health justification of banning asbestos was accepted in the end by the economists at the WTO, despite the WTO's bias in favoring the party (Canada) making the free trade challenge (to public health legislation, in this case) in numerous stages of the process, despite the WTO's utter lack of expertise in science, medicine, engineering, and public health, and despite important erroneous statements made to the WTO under the cover of confidentiality. Despite its result, this case illustrates that the WTO's threat to national sovereignty could never withstand the light of day, that the people of the world would reject this dangerous free trade fundamentalism if the limitations and dangers of the process were open for all to see.

  13. Security, privacy, and confidentiality issues on the Internet

    Science.gov (United States)

    Kelly, Grant; McKenzie, Bruce

    2002-01-01

    We introduce the issues around protecting information about patients and related data sent via the Internet. We begin by reviewing three concepts necessary to any discussion about data security in a healthcare environment: privacy, confidentiality, and consent. We are giving some advice on how to protect local data. Authentication and privacy of e-mail via encryption is offered by Pretty Good Privacy (PGP) and Secure Multipurpose Internet Mail Extensions (S/MIME). The de facto Internet standard for encrypting Web-based information interchanges is Secure Sockets Layer (SSL), more recently known as Transport Layer Security or TLS. There is a public key infrastructure process to `sign' a message whereby the private key of an individual can be used to `hash' the message. This can then be verified against the sender's public key. This ensures the data's authenticity and origin without conferring privacy, and is called a `digital signature'. The best protection against viruses is not opening e-mails from unknown sources or those containing unusual message headers. PMID:12554559

  14. Security, privacy, and confidentiality issues on the Internet.

    Science.gov (United States)

    Kelly, Grant; McKenzie, Bruce

    2002-01-01

    We introduce the issues around protecting information about patients and related data sent via the Internet. We begin by reviewing three concepts necessary to any discussion about data security in a healthcare environment: privacy, confidentiality, and consent. We are giving some advice on how to protect local data. Authentication and privacy of e-mail via encryption is offered by Pretty Good Privacy (PGP) and Secure Multipurpose Internet Mail Extensions (S/MIME). The de facto Internet standard for encrypting Web-based information interchanges is Secure Sockets Layer (SSL), more recently known as Transport Layer Security or TLS. There is a public key infrastructure process to 'sign' a message whereby the private key of an individual can be used to 'hash' the message. This can then be verified against the sender's public key. This ensures the data's authenticity and origin without conferring privacy, and is called a 'digital signature'. The best protection against viruses is not opening e-mails from unknown sources or those containing unusual message headers.

  15. Nursing Students' Perceptions of Confidentiality, Accountability, and E-Professionalism in Relation to Facebook.

    Science.gov (United States)

    Barnable, Alexia; Cunning, Glenda; Parcon, Mariel

    This study examined nursing students' perceptions of confidentiality, accountability, and e-professionalism in relation to Facebook. All of the students were aware that posting patients' names and pictures of patients constituted a confidentiality breach. When comparing students based on educational status, there were differing opinions on whether employers should use Facebook profile information for hiring decisions. Nursing programs should provide current education, including clear and up-to-date policies, about social media use.

  16. THE POSSIBLE CONFIDENTIALITY: THE PUBLIC ADMINISTRATION AS PARTY IN THE ALTERNATIVE DISPUTE RESOLUTION MECHANISM

    Directory of Open Access Journals (Sweden)

    Carlos Alberto de Salles

    2017-05-01

    Full Text Available This article debates the tension that exists between confidentiality, usual in ADRs, and the publicity principle, that rules the Public Administration in Brazil. As a solution points that the parameter of confidentiality when Public Administration is a party must be the preservation of accountability of the involved agencies, what means, the capacity to answer to its own goals and to obey the public control.

  17. Dating and Sexual Violence Research in the Schools: Balancing Protection of Confidentiality with Supporting the Welfare of Survivors.

    Science.gov (United States)

    Sharkey, Jill D; Reed, Lauren A; Felix, Erika D

    2017-12-01

    Rigorous research and program evaluation are needed to understand the experience of dating and sexual violence among youth and the impact of prevention and intervention efforts. Our dilemma in doing this work occurred when youth disclosed dating and sexual violence on a research survey. What responsibility do researchers have to protect survivors' confidentiality as a research participant versus taking steps to ensure the student has the opportunity to access help? In our evaluation of a pilot dating violence prevention program, our protocols employed widely used procedures for providing resources to participants upon their completion of the survey and de-identifying survey data. Upon reviewing preliminary survey results, we became concerned that these established procedures were not sufficient to support research participants who were adolescent survivors of dating and sexual violence. We followed a structured ethical decision-making process to examine legal and ethical considerations, consult with colleagues, consider impacts and alternative solutions, and ultimately find a solution. Through this process, we developed procedures that balance participant confidentiality and the desire to support the welfare of survivors, which other researchers may want to employ when conducting youth sexual and dating violence research in school and community settings. © Society for Community Research and Action 2017.

  18. Attitudes toward medical and genetic confidentiality in the Saudi research biobank: An exploratory survey.

    Science.gov (United States)

    Alahmad, Ghiath; Hifnawy, Tamer; Abbasi, Badaruddin; Dierickx, Kris

    2016-03-01

    Achieving a balance between giving access to information and respecting donors' confidentiality is a crucial issue for any biobank, with its large number of samples and associated information. Despite the existence of much empirical literature on confidentiality, there are too few surveys in the Middle East about the topic, particularly in the Saudi context. A survey was conducted of 200 respondents at King Abdulaziz Medical City in Riyadh, Saudi Arabia, among 5 groups of equal size, comprised of researchers, physicians, medical students, donors and laypersons, respectively. The majority of participants agreed that confidentiality is an important issue and that it is well protected in the Saudi biobank. All 5 groups showed different attitudes toward disclosing information to various third parties. They were in favor of allowing treating physicians, and to a certain extent family members, to have access to medical and genetic results from research. No significant differences were found between views on medical and genetic confidentiality. The majority of respondents agreed that confidentiality might be breached in cases with specific justified reasons. Even considering differences in religion, culture and other factors, the results of the study were consistent with those reported in the literature and research conducted in other countries. We therefore place emphasis on the importance of protecting and promoting patient/donor confidentiality and privacy. Copyright © 2016. Published by Elsevier Ireland Ltd.

  19. A proposed architecture and method of operation for improving the protection of privacy and confidentiality in disease registers

    Directory of Open Access Journals (Sweden)

    Churches Tim

    2003-01-01

    Full Text Available Abstract Background Disease registers aim to collect information about all instances of a disease or condition in a defined population of individuals. Traditionally methods of operating disease registers have required that notifications of cases be identified by unique identifiers such as social security number or national identification number, or by ensembles of non-unique identifying data items, such as name, sex and date of birth. However, growing concern over the privacy and confidentiality aspects of disease registers may hinder their future operation. Technical solutions to these legitimate concerns are needed. Discussion An alternative method of operation is proposed which involves splitting the personal identifiers from the medical details at the source of notification, and separately encrypting each part using asymmetrical (public key cryptographic methods. The identifying information is sent to a single Population Register, and the medical details to the relevant disease register. The Population Register uses probabilistic record linkage to assign a unique personal identification (UPI number to each person notified to it, although not necessarily everyone in the entire population. This UPI is shared only with a single trusted third party whose sole function is to translate between this UPI and separate series of personal identification numbers which are specific to each disease register. Summary The system proposed would significantly improve the protection of privacy and confidentiality, while still allowing the efficient linkage of records between disease registers, under the control and supervision of the trusted third party and independent ethics committees. The proposed architecture could accommodate genetic databases and tissue banks as well as a wide range of other health and social data collections. It is important that proposals such as this are subject to widespread scrutiny by information security experts, researchers and

  20. 'Is this knowledge mine and nobody else's? I don't feel that.' Patient views about consent, confidentiality and information-sharing in genetic medicine.

    Science.gov (United States)

    Dheensa, Sandi; Fenwick, Angela; Lucassen, Anneke

    2016-03-01

    In genetic medicine, a patient's diagnosis can mean their family members are also at risk, raising a question about how consent and confidentiality should function in clinical genetics. This question is particularly pressing when it is unclear whether a patient has shared information. Conventionally, healthcare professionals view confidentiality at an individual level and 'disclosure without consent' as the exception, not the rule. The relational joint account model, by contrast, conceptualises genetic information as confidential at the familial level and encourages professionals to take disclosure as the default position. In this study, we interviewed 33 patients about consent and confidentiality and analysed data thematically. Our first theme showed that although participants thought of certain aspects of genetic conditions--for example, the way they affect day-to-day health--as somewhat personal, they perceived genetic information--for example, the mutation in isolation--as familial. Most thought these elements were separable and thought family members had a right to know the latter, identifying a broad range of harms that would justify disclosure. Our second theme illustrated that participants nonetheless had some concerns about what, if any, implications there would be of professionals treating such information as familial and they emphasised the importance of being informed about the way their information would be shared. Based on these results, we recommend that professionals take disclosure as the default position, but make clear that they will treat genetic information as familial during initial consultations and address any concerns therein. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://www.bmj.com/company/products-services/rights-and-licensing/

  1. THE PRINCIPLE OF CONFIDENTIALITY IN ARBITRATION. APPLICATION AND LIMITATIONS OF THE PRINCIPLE

    Directory of Open Access Journals (Sweden)

    Bazil Oglindă

    2015-11-01

    Full Text Available Over the years, arbitration has grown to be the preferred means of dispute resolution by commercial entities. One of the benefits that build the attraction for this system of dispute resolution was the principle of confidentiality. One issue that needs to be analyzed is about the reasons why confidentiality is so important in business. Confidentiality is a principle largely embraced in arbitration, but, as we will see, the principle is not an absolute one. There are a set of questions that needs to be answer to, like: Who is bound by the duty of confidentiality? Does this refer only to the parties or does it expands to other actors involved in the arbitral proceedings? What happens with the obligation of confidentiality when issues are brought before a court, taking in account the principle of open justice? We will see that in some countries are procedural laws allowing the courts to order an arbitration claim to be heard in public or in private. Another important aspect that has arisen in the last period is regarding the public policy and the protection of public interest as a limitation to confidentiality of arbitration. This is a sensitive matter especially when one of the parties is a state or a state entity. This study aims to explore the principle of confidentiality in arbitration by focusing on its domain and on its limits, both from the comparative approach and from the Romanian approach. Knowing all this aspects, we will realize the importance of having professional counseling when drafting an arbitration clause and how this can be the missing puzzle piece of your business.

  2. Rekonstruksi Pengaturan Confidential Principle bagi Komunikasi pada Mediasi Sengketa Perdata di Indonesia: Studi Perbandingan dengan Praktik di Amerika Serikat

    Directory of Open Access Journals (Sweden)

    I Gusti Ngurah Parikesit

    2016-04-01

    Full Text Available Peran mediasi sebagai penyelesaian sengketa alternatif untuk sengketa perdata yang semakin populer digunakan pada praktiknya belum berjalan maksimal. Salah satu penyebabnya adalah kekaburan pengaturan prinsip kerahasiaan confidential principle bagi komunikasi yang terjadi pada proses mediasi. Aturan hukum di Indonesia hanya menjelaskan bahwa mediasi dilangsungkan berdasarkan pada asas tertutup dan mediator berkewajiban menjaga kerahasiaan, baik dalam bentuk perkataan maupun catatan, yang terungkap pada mediasi. Sebagai perbandingan, aturan hukum di Amerika Serikat sudah diatur bahwa segala bentuk komunikasi yang terjadi dan berhubungan dengan pelaksanaan mediasi tunduk pada confidential principle, sehingga proses komunikasi mendapatkan hak istimewa (privilege dengan tidak dapat dijadikan barang bukti dan seluruh pihak yang terlibat dalam mediasi tidak dapat dijadikan saksi pada persidangan berikutnya. Dengan demikian, dibutuhkan rekonstruksi pengaturan terkait ruang lingkup komunikasi pada proses mediasi yang terkualifikasi sebagai confidential principle pengaturan terkait pelepasan hak istimewa komunikasi dari confidential principle; dan pengaturan terkait pengecualian terhadap komunikasi yang terkualifikasi sebagai confidential principle Abstract Although being popular, the role of mediation in resolving civil disputes is yet to be maximalized. One of the reasons is the the vague regulation concerning the confidential principle for communication in mediation. The existing regulation in Indonesia only explains that mediation is undertaken based on closed principle and the mediator is obliged to maintain confidentiality the confidentiality of any communication, either in oral or written forms, revealed during mediation. Whereas in comparison, the regulation in the United States of America stipulates that all forms of communications occured during mediation or is made for purposes of conducting or participating in mediation are subjects to the

  3. Lithuanian general practitioners' knowledge of confidentiality laws in adolescent sexual and reproductive healthcare: a cross-sectional study

    DEFF Research Database (Denmark)

    Lazarus, Jeff; Jaruseviciene, Lina; Liljestrand, Jerker

    2008-01-01

    In Lithuania, the legislation addressing confidentiality in adolescent healthcare is contradictory and vague. Previous studies have also revealed that medico-legal knowledge among physicians is poor, and attitudes play a correspondingly greater role than legal knowledge in ensuring the confidenti......In Lithuania, the legislation addressing confidentiality in adolescent healthcare is contradictory and vague. Previous studies have also revealed that medico-legal knowledge among physicians is poor, and attitudes play a correspondingly greater role than legal knowledge in ensuring...

  4. METHODS FOR ASSESSING SECURITY THREATS CONFIDENTIAL INFORMATION FOR THE INFORMATION AND TELECOMMUNICATIONS SYSTEMS

    Directory of Open Access Journals (Sweden)

    E. V. Belokurova

    2015-01-01

    Full Text Available The article discusses the different approaches to assessing the safety of confidential information-term for information and telecommunication systems of various pre-appreciable destination in the presence of internal and external threats to its integrity and availability. The difficulty of ensuring the security of confidential information from exposure to information and telecommunication systems of external and internal threats at the present time, is of particular relevance. This problem is confirmed by the analysis of available statistical information on the impact of threats on the security circulating in the information and telecommunications system. Leak confidential information, intellectual property, information, know-how is the result of significant material and moral damage caused to the owner of the restricted information. The paper presents the structure of the indicators and criteria shows that the most promising are analytical criteria. However, their use to assess the level of security of confidential information is difficult due to the lack of appropriate mathematical models. The complexity of the problem is that existing traditional mathematical models are not always appropriate for the stated objectives. Therefore, it is necessary to develop mathematical models designed to assess the security of confidential information and its impact on information and telecommunication system threats.

  5. [Consent and confidentiality in occupational health practice: balance between legal requirements and ethical values].

    Science.gov (United States)

    Mora, Erika; Franco, G

    2010-01-01

    The recently introduced Italian law on the protection of workers' health states that the occupational health physician (competent physician) is required to act according to the Code of Ethics of the International Commission on Occupational Health (ICOH). This paper aims at examining the articles of legislative decree 81/2008 dealing with informed consent and confidentiality compared with the corresponding points of the ICOH Ethics Code. Analysis of the relationship between articles 25 and 39 (informed consent) and 18, 20 and 39 (confidentiality) of the decree shows that there are some points of disagreement between the legal requirements and the Code of Ethics, in particular concerning prescribed health surveillance, consent based on appropriate information (points 8, 10 and 12 of the Code) and some aspects of confidentiality (points 10, 20, 21, 22 and 23 of the Code). Although the competent physician is required to act according to the law, the decisional process could lead to a violation of workers' autonomy.

  6. Confidentiality and parental involvement in adolescent sexual and reproductive health care

    DEFF Research Database (Denmark)

    Jaruseviciene, Lina; Lazarus, Jeff; Zaborskis, Apolinaras

    2011-01-01

    AIM: We surveyed Lithuanian general practitioners' (GPs) views on the importance of confidentiality for adolescents and on their practices in informing parents about sexual and reproductive health consultations with this age group. METHODS: In this cross-sectional study, a 41-item questionnaire...... was sent to a random sample of 607 Lithuanian GPs. The purpose of this questionnaire was to gain knowledge about current practices of GPs in informing parents on the importance of confidentiality as well as in protecting the privacy of minors. GPs' knowledge of the current legal age limit...... consulting on general sexual issues, more than 70% stated that they would guarantee their minor patients confidentiality. However, when cases involved sexually transmitted infections or pregnancy, nearly the same percentage said they would inform the parents. 62.3% of GPs incorrectly believed that the law...

  7. Denying a patient's final will: public safety vs. medical confidentiality and patient autonomy.

    Science.gov (United States)

    Gaertner, Jan; Vent, Julia; Greinwald, Ralf; Rothschild, Markus A; Ostgathe, Christoph; Kessel, Rene; Voltz, Raymond

    2011-12-01

    Especially when caring for patients approaching the end of life, physicians and nursing staff feel committed to fulfilling as many patient desires as possible. However, sometimes a patient's "final will" may threaten public safety. This can lead to severe conflicts, outweighing the physician's obligation and dedication to care for the patient and to respect his autonomy. Yet, public safety can be threatened if confidentiality is not broken. This article provides a concise summary of the medicolegal and ethical fundamentals concerning this difficult situation. If the patient's and others' health and safety are at risk, physicians may (and in some countries must) break medical confidentiality and disclose confidential patient information to the police and other authorities. Physicians should be able to professionally deal with such a conflict in all patients, not only in patients with advanced illness. Copyright © 2011 U.S. Cancer Pain Relief Committee. Published by Elsevier Inc. All rights reserved.

  8. Confidentiality, 'no blame culture' and whistleblowing, non-physician practice and accountability.

    Science.gov (United States)

    White, Stuart M

    2006-12-01

    Confidentiality is a core tenet of medical professionalism, which enables the maintenance of trust in a doctor-patient relationship. However, both the amount of personal data stored and the number of third parties who might access this data have increased dramatically in the digital age, necessitating the introduction of various national data protection acts. Paradoxically, the Freedom of Information Act 2000 allows United Kingdom citizens to access information held by public bodies, including hospitals. Furthermore, the Public Interest Disclosure Act 1998 actively protects physicians who breach their duty of confidentiality in the name of public interest ('whistleblowing'). This article explores the evolution of the law and ethics in this area, and draws attention to the difficulties in balancing confidentiality against freedom of information. In addition, the role and responsibilities of the non-physician anaesthetist are examined.

  9. [Confidentiality in HIV-infection/AIDS--a comment on the Communicable Disease Control Act].

    Science.gov (United States)

    Frich, J C

    1995-05-10

    The new Communicable Diseases Control Act has come into force in Norway. It makes it compulsory for a physician to warn a third party if it is obvious that a HIV-positive patient, with a high degree of certainty, puts the third party at risk of being infected with HIV. Some philosophers characterize medical confidentiality as an intransigent and absolute obligation, others as a prima facie duty. This article supports the latter view, but the author still argues that strict conditions have to be fulfilled before a physician should consider breaking medical confidentiality: The doctor must try repeatedly to gain the consent or co-operation of the patient involved. Possible negative long-term consequences for the preventive HIV-work support strict medical confidentiality.

  10. Medical students and personal smartphones in the clinical environment: the impact on confidentiality of personal health information and professionalism.

    Science.gov (United States)

    Tran, Kim; Morra, Dante; Lo, Vivian; Quan, Sherman D; Abrams, Howard; Wu, Robert C

    2014-05-22

    Smartphones are becoming ubiquitous in health care settings. The increased adoption of mobile technology such as smartphones may be attributed to their use as a point-of-care information source and to perceived improvements in clinical communication and efficiency. However, little is known about medical students' use of personal smartphones for clinical work. The intent of the study was to examine final-year medical students' experience with and attitudes toward using personal mobile technology in the clinical environment, with respect to the perceived impact on patient confidentiality and provider professionalism. Cross-sectional surveys were completed by final-year medical students at the University of Toronto. Respondents were asked about the type of personal mobile phone they use, security features on their personal phone, experiences using their personal phone during clinical rotations, and attitudes about using their personal phone for clinical work purposes. The overall response rate was 45.4% (99/218). Smartphone ownership was prevalent (98%, 97/99) with the majority (86%, 85/99) of participants using their personal phones for patient-related communication during clinical rotations. A total of 26% (26/99) of participants reported not having any type of security feature on their personal phone, 94% (90/96) of participants agreed that using their personal phone for clinical work makes them more efficient, and 86% (82/95) agreed that their personal phone allows them to provide better patient care. Although 68% (65/95) of participants believe that the use of personal phones for patient-related communication with colleagues poses a risk to the privacy and confidentiality of patient health information, 22% (21/96) of participants still use their personal phone to text or email identifiable patient data to colleagues. Our findings suggest that the use of personal smartphones for clinical work by medical students is prevalent. There is a need to more fully address

  11. Assessing subject privacy and data confidentiality in an emerging region for clinical trials: United Arab Emirates.

    Science.gov (United States)

    Nair, Satish Chandrasekhar; Ibrahim, Halah

    2015-01-01

    Pharmaceutical sponsored clinical trials, formerly conducted predominantly in the United States and Europe, have expanded to emerging regions, including the Middle East. Our study explores factors influencing clinical trial privacy and confidentiality in the United Arab Emirates. Factors including concept familiarity, informed consent compliance, data access, and preservation, were analyzed to assess current practices in the Arab world. As the UAE is an emerging region for clinical trials, there is a growing need for regulations related to data confidentiality and subject privacy. Informational and decisional privacy should be viewed within the realms of Arab culture and religious background.

  12. 49 CFR 40.321 - What is the general confidentiality rule for drug and alcohol test information?

    Science.gov (United States)

    2010-10-01

    ... Transportation PROCEDURES FOR TRANSPORTATION WORKPLACE DRUG AND ALCOHOL TESTING PROGRAMS Confidentiality and Release of Information § 40.321 What is the general confidentiality rule for drug and alcohol test... DOT drug or alcohol testing process, you are prohibited from releasing individual test results or...

  13. 32 CFR 147.30 - Temporary eligibility for access at the confidential and secret levels and temporary eligibility...

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 1 2010-07-01 2010-07-01 false Temporary eligibility for access at the confidential and secret levels and temporary eligibility for âLâ access authorization. 147.30 Section 147.30... Temporary Access § 147.30 Temporary eligibility for access at the confidential and secret levels and...

  14. Circles of Confidence in Correspondences. : Confidentiality in seventeenth-century knowledge exchange in networks of letters and drawings

    NARCIS (Netherlands)

    van den Heuvel, C.M.J.M.; Weingart, Scott B; Spelt, Nils; Nellen, H.J.M.

    2016-01-01

    Science in the Early Modern World depended on the one hand on openness in scholarly communication, but on the other hand the competition in commerce and trade and the political and religious conflicts required secrecy and confidentiality. This papers analyzes these concepts of confidentiality and

  15. 48 CFR 1552.235-78 - Data Security for Toxic Substances Control Act Confidential Business Information (DEC 1997).

    Science.gov (United States)

    2010-10-01

    ...: Data Security for Toxic Substances Control Act Confidential Business Information (DEC 1997) The... 48 Federal Acquisition Regulations System 6 2010-10-01 2010-10-01 true Data Security for Toxic Substances Control Act Confidential Business Information (DEC 1997). 1552.235-78 Section 1552.235-78 Federal...

  16. Confidentiality Protection of User Data and Adaptive Resource Allocation for Managing Multiple Workflow Performance in Service-Based Systems

    Science.gov (United States)

    An, Ho

    2012-01-01

    In this dissertation, two interrelated problems of service-based systems (SBS) are addressed: protecting users' data confidentiality from service providers, and managing performance of multiple workflows in SBS. Current SBSs pose serious limitations to protecting users' data confidentiality. Since users' sensitive data is sent in…

  17. 37 CFR 201.29 - Access to, and confidentiality of, Statements of Account, Verification Auditor's Reports, and...

    Science.gov (United States)

    2010-07-01

    ... confidentiality of, Statements of Account, Verification Auditor's Reports, and other verification information... GENERAL PROVISIONS § 201.29 Access to, and confidentiality of, Statements of Account, Verification Auditor... Account, including the Primary Auditor's Reports, filed under 17 U.S.C. 1003(c) and access to a Verifying...

  18. Mineral trioxide aggregate as root canal filing material: comparative study of physical properties = MTA como cimento endodôntico: estudo comparativo de propriedades físicas

    Directory of Open Access Journals (Sweden)

    Silva, Wander José da

    2010-01-01

    Full Text Available Objetivo: Este estudo avaliou as propriedades físicas de dois cimentos MTA disponíveis comercialmente. Metodologia: A resistência a compressão (CS dos materiais avaliados foi realizada após 21 horas e 14 dias de imersão em água. A avaliação da radiopacidade (RD dos materiais foi mensurada em função de espessura de alumínio. Com relação à propriedade de tempo de presa (ST, tanto os tempos de presa inicial e final foram mensurados. A solubilidade foi calculada em função da percentagem de massa perdida após armazenamento em água. Os valores de pH foram mensurados em três diferentes tempos (inicial, 1 e 24 horas de armazenamento em água. Todos os testes foram realizados de acordo com a norma ISO 6876-2: 2001. Resultados: Ambos os materiais apresentaram valores de CS e pH em acordo com os valores da norma ISO. Os dois cimentos apresentaram RD superiores ao limite de 3 mm de alumínio. Ambos os materiais mostraram resultados de SB inferiores ao limite de 3%. ST e pH também estão de acordo com a norma ISO 6876-2: 2001. Adicionalmente foram avaliadas as superfícies dos materiais por MEV, e ambos apresentaram fases estruturais amorfas e cristalinas. Conclusão: Concluiu-se que ambos os materiais avaliados estão de acordo com as normas ISO, permitindo o seu uso como material de preenchimento de canais radiculares

  19. Nerve growth factor alters microtubule targeting agent-induced neurotransmitter release but not MTA-induced neurite retraction in sensory neurons.

    Science.gov (United States)

    Pittman, Sherry K; Gracias, Neilia G; Fehrenbacher, Jill C

    2016-05-01

    Peripheral neuropathy is a dose-limiting side effect of anticancer treatment with the microtubule-targeted agents (MTAs), paclitaxel and epothilone B (EpoB); however, the mechanisms by which the MTAs alter neuronal function and morphology are unknown. We previously demonstrated that paclitaxel alters neuronal sensitivity, in vitro, in the presence of nerve growth factor (NGF). Evidence in the literature suggests that NGF may modulate the neurotoxic effects of paclitaxel. Here, we examine whether NGF modulates changes in neuronal sensitivity and morphology induced by paclitaxel and EpoB. Neuronal sensitivity was assessed using the stimulated release of calcitonin gene-related peptide (CGRP), whereas morphology of established neurites was evaluated using a high content screening system. Dorsal root ganglion cultures, maintained in the absence or presence of NGF, were treated from day 7 to day 12 in culture with paclitaxel (300nM) or EpoB (30nM). Following treatment, the release of CGRP was stimulated using capsaicin or high extracellular potassium. In the presence of NGF, EpoB mimicked the effects of paclitaxel: capsaicin-stimulated release was attenuated, potassium-stimulated release was slightly enhanced and the total peptide content was unchanged. In the absence of NGF, both paclitaxel and EpoB decreased capsaicin- and potassium-stimulated release and the total peptide content, suggesting that NGF may reverse MTA-induced hyposensitivity. Paclitaxel and EpoB both decreased neurite length and branching, and this attenuation was unaffected by NGF in the growth media. These differential effects of NGF on neuronal sensitivity and morphology suggest that neurite retraction is not a causative factor to alter neuronal sensitivity. Copyright © 2016 Elsevier Inc. All rights reserved.

  20. Cytotoxicity of accelerated white MTA and Malaysian white Portland cement on stem cells from human exfoliated deciduous teeth (SHED): An in vitro study.

    Science.gov (United States)

    Ong, Ren Ming; Luddin, Norhayati; Ahmed, Hany Mohamed Aly; Omar, Nor Shamsuria

    2012-12-01

    The aim of this study was to compare the cytotoxicity of accelerated-set white MTA (AWMTA) and accelerated-set Malaysian white PC (AMWPC) on stem cells from human exfoliated deciduous teeth (SHED). The test materials were introduced into paraffin wax moulds after mixing with calcium chloride dihydrate and sterile distilled water. Subsequently, the set cement specimens were sterilized, incubated in a prepared Dulbecco's modified Eagle medium (DMEM) for seven days. The biomarker CD166 was used for characterization of SHED using flow cytometry. The material extracts were diluted at five different concentrations and incubated for 72h with SHED. The cell viability was evaluated using Dimethylthiazol diphenyltetrazolium bromide (MTT) assay, and the data was analysed using Mann-Whitney test (P<0.05). The results showed that AWMTA revealed significantly greater cell viability at 25 and 12.5mg/ml concentrations (P<0.05). Concomitantly, AMWPC exhibited greater cell viability at concentrations <12.5mg/ml and the results were significant at 1.563mg/ml (P<0.05). Both materials demonstrated moderate cytotoxicity at 25mg/ml and slight cytotoxicity at 6.25 and 3.125mg/ml. At 1.563mg/ml, no cytotoxic activity was merely observed with AMWPC. In conclusion, AMWPC exhibited favourable and comparable cell viability to that of AWMTA, and has the potential to be used as an alternative and less costly material in dental applications. Copyright © 2012. Published by Elsevier B.V.

  1. 17 CFR 145.9 - Petition for confidential treatment of information submitted to the Commission.

    Science.gov (United States)

    2010-04-01

    ... may summarily reject the submitter's request for confidential treatment with leave to the submitter to... treatment of information submitted to the Commission. 145.9 Section 145.9 Commodity and Securities Exchanges... treatment of information submitted to the Commission. (a) Purpose. This section provides a procedure by...

  2. 21 CFR 1316.23 - Confidentiality of identity of research subjects.

    Science.gov (United States)

    2010-04-01

    ... 21 Food and Drugs 9 2010-04-01 2010-04-01 false Confidentiality of identity of research subjects. 1316.23 Section 1316.23 Food and Drugs DRUG ENFORCEMENT ADMINISTRATION, DEPARTMENT OF JUSTICE ADMINISTRATIVE FUNCTIONS, PRACTICES, AND PROCEDURES Protection of Researchers and Research Subjects § 1316.23...

  3. 12 CFR 366.13 - What is my obligation regarding confidential information?

    Science.gov (United States)

    2010-01-01

    ... services on your behalf may use or disclose information obtained from us or a third party in connection... general public. (b) The following are examples of when your use of confidential information is... financial information, such as a financial statement to an unauthorized party. ...

  4. 40 CFR 1601.26 - Special procedures for confidential business information.

    Science.gov (United States)

    2010-07-01

    ... described in paragraph (c) of this section, the CSB shall, to the extent permitted by law, afford a business... business information. 1601.26 Section 1601.26 Protection of Environment CHEMICAL SAFETY AND HAZARD... Requesting and Disclosing Records § 1601.26 Special procedures for confidential business information. (a) In...

  5. 76 FR 30781 - Confidentiality Determinations for Data Required Under the Mandatory Greenhouse Gas Reporting...

    Science.gov (United States)

    2011-05-26

    ... this document. BAMM Best Available Monitoring Methods CAA Clean Air Act CBI confidential business information CBP Customs and Border Protection CEMS continuous emission monitoring system(s) CFR Code of... prevent competitors from forcing them to defend data on a case-by-case basis in Agency CBI proceedings...

  6. 45 CFR 61.14 - Confidentiality of Healthcare Integrity and Protection Data Bank information.

    Science.gov (United States)

    2010-10-01

    ... 45 Public Welfare 1 2010-10-01 2010-10-01 false Confidentiality of Healthcare Integrity and Protection Data Bank information. 61.14 Section 61.14 Public Welfare DEPARTMENT OF HEALTH AND HUMAN SERVICES GENERAL ADMINISTRATION HEALTHCARE INTEGRITY AND PROTECTION DATA BANK FOR FINAL ADVERSE INFORMATION ON...

  7. 45 CFR 60.15 - Confidentiality of National Practitioner Data Bank information.

    Science.gov (United States)

    2010-10-01

    ... 45 Public Welfare 1 2010-10-01 2010-10-01 false Confidentiality of National Practitioner Data Bank information. 60.15 Section 60.15 Public Welfare DEPARTMENT OF HEALTH AND HUMAN SERVICES GENERAL ADMINISTRATION NATIONAL PRACTITIONER DATA BANK FOR ADVERSE INFORMATION ON PHYSICIANS AND OTHER HEALTH CARE PRACTITIONERS...

  8. 76 FR 77816 - Access to Confidential Business Information by Guident Technologies, Inc. and Subcontractor...

    Science.gov (United States)

    2011-12-14

    ... Business Information by Guident Technologies, Inc. and Subcontractor, Impact Innovations Systems, Inc..., Guident Technologies, Inc. of Herndon, VA and subcontractor, Impact Innovations Systems, Inc. of Manassas... Control Act (TSCA). Some of the information may be claimed or determined to be Confidential Business...

  9. High-Technology Companies Often Turn to Colleges for Confidential 'Beta Tests' of New Products.

    Science.gov (United States)

    Turner, Judith Axler

    1988-01-01

    Beta testing--the process of trying a product in a real-world setting before releasing it commercially--exploits a natural interface between universities and high-technology industries. High-tech companies need confidential, real-world tests of new products, and universities are eager to get an early look at tomorrow's technology. (MLW)

  10. 22 CFR 212.38 - Predisclosure notification procedures for confidential commercial information.

    Science.gov (United States)

    2010-04-01

    ... 22 Foreign Relations 1 2010-04-01 2010-04-01 false Predisclosure notification procedures for confidential commercial information. 212.38 Section 212.38 Foreign Relations AGENCY FOR INTERNATIONAL DEVELOPMENT PUBLIC INFORMATION Access to Agency Records § 212.38 Predisclosure notification procedures for...

  11. 18 CFR 385.606 - Confidentiality in dispute resolution proceedings (Rule 606).

    Science.gov (United States)

    2010-04-01

    ... be required to disclose, any information concerning any dispute resolution communication or any communication provided in confidence to the neutral, unless: (1) All participants in the dispute resolution... reducing the confidence of participants in future cases that their communications will remain confidential...

  12. 19 CFR 210.39 - In camera treatment of confidential information.

    Science.gov (United States)

    2010-04-01

    ... 19 Customs Duties 3 2010-04-01 2010-04-01 false In camera treatment of confidential information. 210.39 Section 210.39 Customs Duties UNITED STATES INTERNATIONAL TRADE COMMISSION INVESTIGATIONS OF UNFAIR PRACTICES IN IMPORT TRADE ADJUDICATION AND ENFORCEMENT Prehearing Conferences and Hearings § 210...

  13. HIV testing sites' communication about adolescent confidentiality: potential barriers and facilitators to testing.

    Science.gov (United States)

    Hyden, Christel; Allegrante, John P; Cohall, Alwyn T

    2014-03-01

    This study sought to evaluate HIV testing locations in New York City in terms of staff communication of confidentiality policies for adolescent clients. Using the New York State Directory of HIV Counseling and Testing Resources as a sampling frame, this study made telephone contact with 164 public HIV testing locations in New York City and used a semistructured interview to ask questions about confidentiality, parental permission, and parent access to test results. At 48% of locations, either HIV testing was not offered or we were unable to reach a staff member to ask questions about testing options and confidentiality. At the remaining sites, information provided regarding confidentiality, parental consent, and privacy of test results was correct only 69% to 85% of the time. Additionally, 23% of sites successfully contacted offered testing exclusively between 9:00 a.m. and 3:00 p.m. weekdays, when most adolescents are in school. Our findings point to a need for increased training and quality control at the clinical level to ensure that consumers in need of HIV testing are provided with accurate information and accessible services. Furthermore, these results highlight the need for more "patient-centric" sites with enhanced accessibility for potential clients, particularly youth.

  14. Teaching Journalism Students about Confidential Whistleblower Sources: An Analysis of Introductory News Writing Textbooks

    Science.gov (United States)

    Huxford, John; Moore, Maria A.

    2011-01-01

    Whistleblowers are a key journalistic source for many current news stories. However, reporters pursuing these major stories must navigate the dilemma between transparent full disclosure and protecting their confidential source. Professional journalists begin their journey as students, and students begin their journey in the classroom with a…

  15. Data-protection standards and confidentiality of HIV/AIDS status in ...

    African Journals Online (AJOL)

    Also, the article presents a preliminary assessment of the possible impact of professionalisation (and outsourcing) of workplace HIV/AIDS management on ... the development of law governing data protection and HIV/AIDS confidentiality in South Africa) and interviews conducted with workplace health managers and trade ...

  16. 78 FR 68161 - Greenhouse Gas Reporting Program: Final Amendments and Confidentiality Determinations for...

    Science.gov (United States)

    2013-11-13

    ... 98 Greenhouse Gas Reporting Program: Final Amendments and Confidentiality Determinations for...-HQ-OAR-2011-0028; FRL-9845-6] RIN 2060-AR61 Greenhouse Gas Reporting Program: Final Amendments and... monitoring methodologies for electronics manufacturers covered by the Greenhouse Gas Reporting Rule. These...

  17. 78 FR 69337 - Greenhouse Gas Reporting Program: Amendments and Confidentiality Determinations for Fluorinated...

    Science.gov (United States)

    2013-11-19

    ...-AR78 Greenhouse Gas Reporting Program: Amendments and Confidentiality Determinations for Fluorinated... Greenhouse Gas Reporting Rule. The proposed changes would reduce the level of detail in which emissions were..., please go to the Greenhouse Gas Reporting Rule Program Web site at http://www.epa.gov/climatechange...

  18. 76 FR 52659 - Access by EPA Contractors to Confidential Business Information (CBI) Related to the Greenhouse...

    Science.gov (United States)

    2011-08-23

    ... Confidential Business Information (CBI) Related to the Greenhouse Gas Reporting Program AGENCY: Environmental... contractors named in this notice to access information that will be submitted to EPA under the Greenhouse Gas...), EPA created the Greenhouse Gas Reporting Program (GHGRP), 40 CFR part 98 (part 98), which requires...

  19. The Psychological Competence of Police Officers in Confidential Cooperation with Citizens

    Science.gov (United States)

    Uspanov, Zholdybai T.; Turabayeva, Dana S.; Ermolovich, Vladimir F.

    2016-01-01

    This research studied the psychological aspects of citizens' assistance to law enforcement agencies on a confidential basis. The comprehensive observance of the psychological norms of cooperation is determined by the professional ethics of police officers, the necessity of nondisclosure of investigation secrets by citizens, and the security of the…

  20. 20 CFR 603.4 - What is the confidentiality requirement of Federal UC law?

    Science.gov (United States)

    2010-04-01

    ... 20 Employees' Benefits 3 2010-04-01 2010-04-01 false What is the confidentiality requirement of Federal UC law? 603.4 Section 603.4 Employees' Benefits EMPLOYMENT AND TRAINING ADMINISTRATION, DEPARTMENT....C. 502(a)), State law must include provision for such methods of administration as are found by the...

  1. Scheduler-specific Confidentiality for Multi-Threaded Programs and Its Logic-Based Verification

    NARCIS (Netherlands)

    Huisman, Marieke; Ngo, Minh Tri

    2011-01-01

    Observational determinism has been proposed in the literature as a way to ensure confidentiality for multi-threaded programs. Intuitively, a program is observationally deterministic if the behavior of the public variables is deterministic, i.e., independent of the private variables and the

  2. 75 FR 46948 - Medicare Program; Listening Session Regarding Confidential Feedback Reports and the...

    Science.gov (United States)

    2010-08-04

    ...] Medicare Program; Listening Session Regarding Confidential Feedback Reports and the Implementation of a... Services (CMS), HHS. ACTION: Notice of meeting. SUMMARY: This notice announces a listening session being... modifier to the fee- for-service physician fee schedule. The purpose of the listening session is to solicit...

  3. 77 FR 25475 - Inquiry To Learn Whether Businesses Assert Business Confidentiality Claims Regarding Waste Import...

    Science.gov (United States)

    2012-04-30

    ... meet the definition of ``affected business,'' and are not covered by today's notice. They consist of..., however, do not meet the definition of ``affected business,'' and are not covered by today's notice. They... Businesses Assert Business Confidentiality Claims Regarding Waste Import and Export AGENCY: Environmental...

  4. 77 FR 109 - Inquiry To Learn Whether Businesses Assert Business Confidentiality Claims Regarding Waste Import...

    Science.gov (United States)

    2012-01-03

    ... definition of ``affected business,'' and are not covered by today's notice. They consist of any business that.... Certain businesses, however, do not meet the definition of ``affected business,'' and are not covered by... Businesses Assert Business Confidentiality Claims Regarding Waste Import and Export AGENCY: Environmental...

  5. 75 FR 44951 - Inquiry To Learn Whether Businesses Assert Business Confidentiality Claims

    Science.gov (United States)

    2010-07-30

    ... such treatment. Certain businesses, however, do not meet the definition of ``affected business,'' and... definition of ``affected business,'' and are not covered by today's notice. They consist of any business that... Businesses Assert Business Confidentiality Claims AGENCY: Environmental Protection Agency (EPA). ACTION...

  6. 76 FR 362 - Inquiry To Learn Whether Businesses Assert Business Confidentiality Claims

    Science.gov (United States)

    2011-01-04

    ... claims for such treatment. Certain businesses, however, do not meet the definition of ``affected business.... Certain businesses, however, do not meet the definition of ``affected business,'' and are not covered by... Businesses Assert Business Confidentiality Claims AGENCY: Environmental Protection Agency (EPA). ACTION...

  7. 75 FR 4812 - Inquiry To Learn Whether Businesses Assert Business Confidentiality Claims

    Science.gov (United States)

    2010-01-29

    ..., however, do not meet the definition of ``affected business,'' and are not covered by today's notice. They.... Certain businesses, however, do not meet the definition of ``affected business,'' and are not covered by... Businesses Assert Business Confidentiality Claims AGENCY: Environmental Protection Agency (EPA). ACTION...

  8. 78 FR 2669 - Waste Import and Export; Inquiry To Learn Whether Businesses Assert Business Confidentiality Claims

    Science.gov (United States)

    2013-01-14

    ... definition of ``affected business,'' and are not covered by today's notice. They consist of any business that... waste'' is defined at 40 CFR 273.9. Certain businesses, however, do not meet the definition of...; Inquiry To Learn Whether Businesses Assert Business Confidentiality Claims AGENCY: Environmental...

  9. 76 FR 69722 - Access to Confidential Business Information by Protection Strategies Incorporated

    Science.gov (United States)

    2011-11-09

    ... Business Information by Protection Strategies Incorporated AGENCY: Environmental Protection Agency (EPA... Control Act (TSCA) confidential business information and to provide notice that this contract has been extended until December 31, 2011. Protection Strategies Incorporated (PSI) has been the owner of Eagle...

  10. Combined model of 9x9 playfair and RSA for securing confidential ...

    African Journals Online (AJOL)

    Combined model of 9x9 playfair and RSA for securing confidential information. Y.B. Zakariyau, L.J. Muhammad, A.M. Usman, A Garba. Abstract. No Abstract. Keywords: Cryptography, RSA, Playfair Cipher, Public and Secret Key. Full Text: EMAIL FULL TEXT EMAIL FULL TEXT · DOWNLOAD FULL TEXT DOWNLOAD FULL ...

  11. 75 FR 55577 - Clean Water Act; Contractor Access to Confidential Business Information

    Science.gov (United States)

    2010-09-13

    ... ENVIRONMENTAL PROTECTION AGENCY [FRL-9200-8] Clean Water Act; Contractor Access to Confidential... Recovery Act (RCRA). Transfer of the information will allow the contractor and subcontractors to access... contractors and subcontractors over the history of the effluent guidelines program. EPA determined that this...

  12. 77 FR 60962 - Clean Water Act; Contractor Access to Confidential Business Information

    Science.gov (United States)

    2012-10-05

    ... ENVIRONMENTAL PROTECTION AGENCY 40 CFR Part 2 [FRL-9733-8] Clean Water Act; Contractor Access to... transfer of confidential business information to contractor, subcontractors, and consultants. SUMMARY: The... certain industries. We have determined that the contractors listed below require access [[Page 60963

  13. 75 FR 60452 - Clean Water Act; Contractor Access to Confidential Business Information

    Science.gov (United States)

    2010-09-30

    ... ENVIRONMENTAL PROTECTION AGENCY [FRL-9208-9] Clean Water Act; Contractor Access to Confidential... electric industry to a new subcontractor of a contractor, Eastern Research Group (ERG). EPA previously... contractors and subcontractors to access information necessary to support EPA in the planning, development...

  14. 78 FR 79692 - Clean Water Act; Contractor Access to Confidential Business Information

    Science.gov (United States)

    2013-12-31

    ... ENVIRONMENTAL PROTECTION AGENCY [FRL-9904-94-OW] Clean Water Act; Contractor Access to... Transfer of Confidential Business Information to Contractor, Subcontractors, and Consultants. SUMMARY: The... contractors listed below require access to CBI submitted to EPA under Section 308 of the Clean Water Act (CWA...

  15. The Confidentiality of Medical Secrets of Patients by the Nursing Staff

    Directory of Open Access Journals (Sweden)

    Chalkias Theodoros

    2010-01-01

    Full Text Available In this article you will find a critical discussion about the significance of confidentiality of "medical secrets" (keeping the secrets of ill people by nurses. Special cases are mentioned regarding the need to keep, or reveal the secret.

  16. 5 CFR 213.3301 - Positions of a confidential or policy-determining nature.

    Science.gov (United States)

    2010-01-01

    ... 5 Administrative Personnel 1 2010-01-01 2010-01-01 false Positions of a confidential or policy-determining nature. 213.3301 Section 213.3301 Administrative Personnel OFFICE OF PERSONNEL MANAGEMENT CIVIL... or policy-determining nature. (a) Upon specific authorization by OPM, agencies may make appointments...

  17. 41 CFR 102-75.320 - Does appraisal information need to be kept confidential?

    Science.gov (United States)

    2010-07-01

    ... 41 Public Contracts and Property Management 3 2010-07-01 2010-07-01 false Does appraisal information need to be kept confidential? 102-75.320 Section 102-75.320 Public Contracts and Property Management Federal Property Management Regulations System (Continued) FEDERAL MANAGEMENT REGULATION REAL PROPERTY 75-REAL PROPERTY DISPOSAL Surplus Real...

  18. Doctor-patient confidentiality - right and duty of a doctor in law regulations

    Directory of Open Access Journals (Sweden)

    Janusz Jaroszyński

    2018-03-01

    Full Text Available Physician’s professional secrecy is one of the most important duties of a doctor and should be provided with confidentiality regarding his or her health. Generally speaking, there is no legal definition of "physician’s professional secrecy" in Poland, although this concept already appears in the oath of Hippocrates: ‘I will keep secret anything I see or hear professionally which ought not to be told’. The issue of medical confidentiality (physician’s professional secrecy has been regulated in several legal acts such as: The Patient Rights and Patients Ombudsman Act, The Constitution of the Republic of Poland, The Medical Profession Act, The Civil Code Act, The Criminal Code Act and Code of Medical Ethics which is not considered as a legal act. The patient has the right to require confidentiality of the information concerning him and the obligation to keep medical confidentiality will apply to every representative of the medical profession, who obtained certain information by various professional activities.

  19. 19 CFR 201.19 - Notification regarding requests for confidential business information.

    Science.gov (United States)

    2010-04-01

    ... business information. 201.19 Section 201.19 Customs Duties UNITED STATES INTERNATIONAL TRADE COMMISSION GENERAL RULES OF GENERAL APPLICATION Availability of Information to the Public Pursuant to 5 U.S.C. 552 § 201.19 Notification regarding requests for confidential business information. (a) In general. Business...

  20. 37 CFR 382.4 - Confidential information and statements of account.

    Science.gov (United States)

    2010-07-01

    ... information and statements of account. (a) For purposes of this subpart, confidential information shall include statements of account and any information pertaining to the statements of account designated as... payments. (c) A statement of account shall include only such information as is necessary to verify the...

  1. Analysis of the ethical aspects of professional confidentiality in dental practice.

    Science.gov (United States)

    Garbin, Cléa Adas Saliba; Garbin, Artênio José Isper; Saliba, Nemre Adas; de Lima, Daniela Coelho; de Macedo, Ana Paula Ayala

    2008-01-01

    From the point of view of deontological ethics, privacy is a moral right that patients are entitled to and it is bound to professional confidentiality. Otherwise, the information given by patients to health professionals would not be reliable and a trustable relationship could not be established. The aim of the present study was to assess, by means of questionnaires with open and closed questions, the awareness and attitudes of 100 dentists working in the city of Andradina, São Paulo State, Brazil, with respect to professional confidentiality in dental practice. Most dentists (91.43%) reported to have instructed their assistants on professional confidentiality. However, 44.29% of the interviewees showed to act contradictorily as reported talking about the clinical cases of their patients to their friends or spouses. The great majority of professionals (98.57%) believed that it is important to have classes on Ethics and Bioethics during graduation and, when asked about their knowledge of the penalties imposed for breach of professional confidentiality, only 48.57% of them declared to be aware of it. Only 28.57% of the interviewees affirmed to have exclusive access to the files; 67.14% reported that that files were also accessed by their secretary; 1.43% answered that their spouses also had access, and 2.86% did not answer. From the results of the present survey, it could be observed that, although dentists affirmed to be aware of professional confidentiality, their attitudes did not adhere to ethical and legal requirements. This stand of health professionals has contributed to violate professional ethics and the law itself, bringing problems both to the professional and to the patient.

  2. The end of medical confidentiality? Patients, physicians and the state in history.

    Science.gov (United States)

    Rieder, Philip; Louis-Courvoisier, Micheline; Huber, Philippe

    2016-09-01

    Medical confidentiality has come under attack in the public sphere. In recent disasters both journalists and politicians have questioned medical confidentiality and claimed that in specific contexts physicians should be compelled to communicate data on their patients' health. The murders of innocent individuals by a suicidal pilot and a Swiss convicted criminal have generated polemical debates on the topic. In this article, historical data on medical confidentiality is used to show that medical practices of secrecy were regularly attacked in the past, and that the nature of medical confidentiality evolved through time depending on physicians' values and judgements. Our demonstration is based on three moments in history. First, at the end of the 16th century, lay authorities put pressure on physicians to disclose the names of patients suffering from syphilis. Second, in the 18th century, physicians faced constant demands for information about patients' health from relatives and friends. Third, employers and insurance companies in the 20th century requested medical data on sick employees. In these three different situations, history reveals that the concept of medical confidentiality was plastic, modelled in the first instance to defend well-to-do patients, in the second instance it was adapted to accommodate the physician's social role and, finally, to defend universal values and public health. Medical secrecy was, and is today, a medical and societal norm that is shaped collectively. Any change in its definition and enforcement was and should be the result of negotiations with all social actors concerned. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://www.bmj.com/company/products-services/rights-and-licensing/

  3. Analysis of the ethical aspects of professional confidentiality in dental practice

    Directory of Open Access Journals (Sweden)

    Cléa Adas Saliba Garbin

    2008-02-01

    Full Text Available From the point of view of deontological ethics, privacy is a moral right that patients are entitled to and it is bound to professional confidentiality. Otherwise, the information given by patients to health professionals would not be reliable and a trustable relationship could not be established. The aim of the present study was to assess, by means of questionnaires with open and closed questions, the awareness and attitudes of 100 dentists working in the city of Andradina, São Paulo State, Brazil, with respect to professional confidentiality in dental practice. Most dentists (91.43% reported to have instructed their assistants on professional confidentiality. However, 44.29% of the interviewees showed to act contradictorily as reported talking about the clinical cases of their patients to their friends or spouses. The great majority of professionals (98.57% believed that it is important to have classes on Ethics and Bioethics during graduation and, when asked about their knowledge of the penalties imposed for breach of professional confidentiality, only 48.57% of them declared to be aware of it. Only 28.57% of the interviewees affirmed to have exclusive access to the files; 67.14% reported that that files were also accessed by their secretary; 1.43% answered that their spouses also had access, and 2.86% did not answer. From the results of the present survey, it could be observed that, although dentists affirmed to be aware of professional confidentiality, their attitudes did not adhere to ethical and legal requirements. This stand of health professionals has contributed to violate professional ethics and the law itself, bringing problems both to the professional and to the patient.

  4. MEASUREMENT OF APPLICATION OF ISO 27001 OF CUSTOMER CELLULAR CARD CONFIDENTIALITY DATA IN PT. XYZ AREA JAKARTA

    Directory of Open Access Journals (Sweden)

    Krishna Rahadian

    2014-10-01

    Full Text Available The purpose of this study was to evaluate the effects of the process of ISO 27001 with respect to the confidentiality of customer cellular card Jakarta and to improve cellular card customer data confidentiality at PT.XYZ from data leakage of the customer data due to the third party involvement, clean-desk policy, and access right. Recommendation regarding the improvement is provided after reviewing the confidentiality of customer data. The survey in this study is conducted by questionnaire. From the evaluation results of the questionnaire, it is concluded that the larger customer data leaks are mainly caused by the external factors.

  5. Boundaries of confidentiality in nursing care for mother and child in HIV programmes.

    Science.gov (United States)

    Våga, Bodil Bø; Moland, Karen Marie; Blystad, Astrid

    2016-08-01

    Confidentiality lies at the core of medical ethics and is the cornerstone for developing and keeping a trusting relationship between nurses and patients. In the wake of the HIV epidemic, there has been a heightened focus on confidentiality in healthcare contexts. Nurses' follow-up of HIV-positive women and their susceptible HIV-exposed children has proved to be challenging in this regard, but the ethical dilemmas concerning confidentiality that emerge in the process of ensuring HIV-free survival of the third party - the child - have attracted limited attention. The study explores challenges of confidentiality linked to a third party in nurse-patient relationships in a rural Tanzanian HIV/AIDS context. The study was carried out in rural and semi-urban settings of Tanzania where the population is largely agro-pastoral, the formal educational level is low and poverty is rife. The HIV prevalence of 1.5% is low compared to the national prevalence of 5.1%. Data were collected during 9 months of ethnographic fieldwork and consisted of participant observation in clinical settings and during home visits combined with in-depth interviews. The main categories of informants were nurses employed in prevention of mother-to-child transmission of HIV programmes and HIV-positive women enrolled in these programmes. Based on information about the study aims, all informants consented to participate. Ethical approval was granted by ethics review boards in Tanzania and Norway. The material indicates a delicate balance between the nurses' attempt to secure the HIV-free survival of the babies and the mothers' desire to preserve confidentiality. Profound confidentiality-related dilemmas emerged in actual practice, and indications of a lack of thorough consideration of the implication of a patient's restricted disclosure came to light during follow-up of the HIV-positive women and the third party - the child who is at risk of HIV infection through mother's milk. World Health Organization

  6. Enhancement of solubility in Escherichia coli and purification of an aminotransferase from Sphingopyxis sp. MTA144 for deamination of hydrolyzed fumonisin B1

    Directory of Open Access Journals (Sweden)

    Hartinger Doris

    2010-08-01

    Full Text Available Abstract Background Fumonisin B1 is a cancerogenic mycotoxin produced by Fusarium verticillioides and other fungi. Sphingopyxis sp. MTA144 can degrade fumonisin B1, and a key enzyme in the catabolic pathway is an aminotransferase which removes the C2-amino group from hydrolyzed fumonisin B1. In order to study this aminotransferase with respect to a possible future application in enzymatic fumonisin detoxification, we attempted expression of the corresponding fumI gene in E. coli and purification of the enzyme. Since the aminotransferase initially accumulated in inclusion bodies, we compared the effects of induction level, host strain, expression temperature, solubility enhancers and a fusion partner on enzyme solubility and activity. Results When expressed from a T7 promoter at 30°C, the aminotransferase accumulated invariably in inclusion bodies in DE3 lysogens of the E. coli strains BL21, HMS174, Rosetta 2, Origami 2, or Rosetta-gami. Omission of the isopropyl-beta-D-thiogalactopyranoside (IPTG used for induction caused a reduction of expression level, but no enhancement of solubility. Likewise, protein production but not solubility correlated with the IPTG concentration in E. coli Tuner(DE3. Addition of the solubility enhancers betaine and sorbitol or the co-enzyme pyridoxal phosphate showed no effect. Maltose-binding protein, used as an N-terminal fusion partner, promoted solubility at 30°C or less, but not at 37°C. Low enzyme activity and subsequent aggregation in the course of purification and cleavage indicated that the soluble fusion protein contained incorrectly folded aminotransferase. Expression in E. coli ArcticExpress(DE3, which co-expresses two cold-adapted chaperonins, at 11°C finally resulted in production of appreciable amounts of active enzyme. Since His tag-mediated affinity purification from this strain was hindered by co-elution of chaperonin, two steps of chromatography with optimized imidazole concentration in the

  7. Protecting the confidentiality and security of personal health information in low- and middle-income countries in the era of SDGs and Big Data

    Directory of Open Access Journals (Sweden)

    Eduard J. Beck

    2016-11-01

    success of programs like Universal Health Coverage, under the recently ratified Sustainable Development Goals is also contingent on the availability of personal health information for communicable and non-communicable diseases. Design: Guidance for countries to develop and implement their own guidelines for protecting HIV-information formed the basis of identifying a number of fundamental principles, governing the areas of privacy, confidentiality and security. The use of individual-level data must balance maximizing the benefits from their most effective and fullest use, and minimizing harm resulting from their malicious or inadvertent release. Discussion: These general principles are described in this paper, as along with a bibliography referring to more detailed technical information. A country assessment tool and user's manual, based on these principles, have been developed to support countries to assess the privacy, confidentiality, and security of personal health information at facility, data warehouse/repository, and national levels. The successful development and implementation of national guidance will require strong collaboration at local, regional, and national levels, and this is a pre-condition for the successful implementation of a range of national and global programs. Conclusion: This paper is a call for action for stakeholders in low- and middle-income countries to develop and implement such coherent policies and provides fundamental principles governing the areas of privacy, confidentiality, and security of personal health information being collected in low- and middle-income countries.

  8. Protecting the confidentiality and security of personal health information in low- and middle-income countries in the era of SDGs and Big Data.

    Science.gov (United States)

    Beck, Eduard J; Gill, Wayne; De Lay, Paul R

    2016-01-01

    Universal Health Coverage, under the recently ratified Sustainable Development Goals is also contingent on the availability of personal health information for communicable and non-communicable diseases. Guidance for countries to develop and implement their own guidelines for protecting HIV-information formed the basis of identifying a number of fundamental principles, governing the areas of privacy, confidentiality and security. The use of individual-level data must balance maximizing the benefits from their most effective and fullest use, and minimizing harm resulting from their malicious or inadvertent release. These general principles are described in this paper, as along with a bibliography referring to more detailed technical information. A country assessment tool and user's manual, based on these principles, have been developed to support countries to assess the privacy, confidentiality, and security of personal health information at facility, data warehouse/repository, and national levels. The successful development and implementation of national guidance will require strong collaboration at local, regional, and national levels, and this is a pre-condition for the successful implementation of a range of national and global programs. This paper is a call for action for stakeholders in low- and middle-income countries to develop and implement such coherent policies and provides fundamental principles governing the areas of privacy, confidentiality, and security of personal health information being collected in low- and middle-income countries.

  9. DFT study on the crystal, electronic and magnetic structures of tantalum based double perovskite oxides Ba2MTaO6 (M = Cr, Mn, Fe) via GGA and GGA + U

    Science.gov (United States)

    Saad, H.-E.; Musa, M.; Elhag, Ahmed

    2018-06-01

    In this paper, we study the crystal, electronic and magnetic structures of three tantalum based double perovskite oxides Ba2MTaO6 (M = Cr, Mn, Fe). All calculations were performed using the full-potential linear augmented plane-wave (PF-LAPW) method based on the first-principles density functional theory (DFT). For the exchange correlation potential, the generalized gradient approximation (GGA) and GGA plus on-site Coulomb parameter (GGA + U) were employed. The structural optimization reveals that the three compounds are stable in cubic structure (space group Fm-3m; tilt system a0a0a0). The band structure, density of states (DOS), charge density and spin magnetic moments were calculated and analyzed in details. By analysis the band structure and DOS, Ba2MTaO6 exhibits an insulating behavior (M = Cr, Fe) and a half-metallic (HM) nature (M = Mn). GGA + U method yields quite accurate results for the band-gap (Eg) as compared with GGA. We found that all three compounds have stable ferromagnetic (FM) ground state within GGA and GGA + U calculations. The M3+ (3d) ions contribute the majority in the total spin magnetic-moments, while, the empty T5+ (5d) ions carry very small induced magnetic moment via the M (3d)-O (2p)-Ta (5d) hybridization.

  10. Implementation of a confidential helpline for men having sex with men in India.

    Science.gov (United States)

    Agarwal, Ashok; Hamdallah, Myriam; Swain, Suvakanta N; Mukherjee, Sonali; Singh, Neetu; Mahapatra, Sudip; King, Elizabeth J; Pulerwitz, Julie; Thior, Ibou

    2015-02-11

    In India, men who have sex with men (MSM) often face physical violence and harassment from police and the general society. Many MSM may not openly disclose their sexual identity, especially if they are married to women and have families. Due to pervasive stigma and discrimination, human immunodeficiency virus (HIV) prevention programs are unable to reach many MSM effectively. The objective of this paper was to describe the design, operations, and monitoring of the Sahaay helpline, a mHealth intervention for the MSM population of India. We established the "Sahaay" mHealth intervention in 2013; a MSM-dedicated helpline whose main goal was to increase access to comprehensive, community-based HIV prevention services and improve knowledge, attitudes, and behaviors of MSM towards HIV and sexually transmitted infections (STI) in three states of India (Chhattisgarh, Delhi, and Maharashtra). The helpline provided a 24x7 confidential and easy to use interactive voice response system (IVRS) to callers. IVRS function was monitored through an online dashboard of indicators. The system also provided real-time reporting on callers and services provided. The helpline received more than 100,000 calls from 39,800 callers during the first nine months of operation. The helpline maintained an operational uptime of 99.81% (6450/6462 hours); and answered more than 81.33% (83,050/102,115) of all calls. More than three-fourths of the calls came between 9:00 am-12:00 pm. The most successful promotional activity was "interpersonal communication" (reported by 70.05%, 27,880/39,800, of the callers). Nearly three-fourths of the callers self-identified as MSM, including 17.05% (6786/39,800) as rural MSM and 5.03% (2001/39,800) as a married MSM. Most callers (93.10%, 37,055/39,800) requested information, while some (27.01%, 10,750/39,800) requested counseling on HIV/acquired immune deficiency syndrome (AIDS), STIs, and other health and nonhealth issues. There were 38.97% (15,509/39,800) of the

  11. Controls Mitigating the Risk of Confidential Information Disclosure by Facebook: Essential Concern in Auditing Information Security

    Directory of Open Access Journals (Sweden)

    Ivan Ognyanov Kuyumdzhiev

    2014-08-01

    Full Text Available Facebook allows people to easily share information about themselves which in some cases could be classified as confidential or sensitive in the organisation they’re working for. In this paper we discuss the type of data stored by Facebook and the scope of the terms “confidential” and “sensitive data”. The intersection of these areas shows that there is high possibility for confidential data disclosure in organisations with none or ineffective security policy. This paper proposes a strategy for managing the risks of information leakage. We define five levels of controls against posting non-public data on Facebook - security policy, applications installed on employees’ workstations, specific router software or firmware, software in the cloud, Facebook itself. Advantages and disadvantages of every level are evaluated. As a result we propose developing of new control integrated in the social media.

  12. To Tell, or Not to Tell; Confidentiality in an Iranian HIV Positive Patient: A Viewpoint

    Directory of Open Access Journals (Sweden)

    Mahshad Noroozi

    2017-08-01

    Full Text Available Confidentiality is a basic concept in medical ethics and protecting confidentiality is considered as physicians’ duty. In some occasions, this protection is in conflict with the right of the patient’s sexual partner, who should be informed about the possibility of being infected. The sexual partner being pregnant, the situation is going to be more complicated. In this paper, we present a case discussion with special ethical, legal, social, cultural, and religious aspects. According to this informing sexual partner with the patient’s assent, opt-out Human immunodeficiency virus (HIV screening in pregnant women and enhancing psychosocial and family support are highly recommended. Strategic changes in health system policies and regulations seem to be necessary as well.

  13. Biobanks in South Africa: A global perspective on privacy and confidentiality

    Directory of Open Access Journals (Sweden)

    Riaan Rheeder

    2017-05-01

    Full Text Available The Universal Declaration of Bioethics and Human Rights (UDBHR of the United Nations Educational, Scientific and Cultural Organization (UNESCO was adopted unanimously in 2005 by the world community as a universal guideline, according to which members of the global community were accountable to each other. Research results from UNESCO show that the UDBHR has had little or no impact in South Africa (SA. The primary objective of this article is to promote awareness of the UDBHR in SA and Africa by focusing on Article 9 of the Declaration, which accepts the right to privacy and confidentiality. For this objective to be relevant in the SA context, depends on whether the guidelines of the National Department of Health’s Ethics in Health Research: Principles, Processes and Structures of 2015 acknowledge biobanks of the universally accepted ethical guidelines on privacy and confidentiality of autonomous persons and whether these guidelines are broadly in accordance with global bioethical guidelines.

  14. Changes in public attitudes towards confidential adolescent sexual and reproductive health services in Lithuania after the introduction of new legislation

    DEFF Research Database (Denmark)

    Jaruseviciene, Lina; Zaborskis, Apolinaras; Sauliune, Skirmante

    2015-01-01

    was employed to estimate absolute differences in prevalence of belief in whether or not adolescents would find confidentiality important when consulting a physician on SRH issues. A log-binomial regression model was fitted to estimate the relative changes (prevalence ratio) of the independent variables......BACKGROUND: In Lithuania, the right to confidentiality in healthcare for adolescents over the age of 16 was guaranteed in 2010 through the adoption of new legislation. This study sets out to explore changes in Lithuanian residents' attitudes towards confidentiality protection in adolescent sexual....... RESULTS: The total number of respondents was 1054 (response rate 83%) in 2005 and 1002 (response rate 80%) in 2012. The proportion of respondents who reported a belief that adolescents would find confidentiality important when seeing a physician for SRH issues increased significantly from 62% in 2005...

  15. Safeguarding critical e-documents implementing a program for securing confidential information assets

    CERN Document Server

    Smallwood, Robert F

    2012-01-01

    Practical, step-by-step guidance for corporations, universities and government agencies to protect and secure confidential documents and business records Managers and public officials are looking for technology and information governance solutions to "information leakage" in an understandable, concise format. Safeguarding Critical E-Documents provides a road map for corporations, governments, financial services firms, hospitals, law firms, universities and other organizations to safeguard their internal electronic documents and private communications.Provides practical, step-by-step guidance o

  16. Privacy and confidentiality measures in genetic testing and counselling: arguing on genetic exceptionalism again?

    Science.gov (United States)

    Witt, Magdalena M; Witt, Michał P

    2016-11-01

    Medical confidentiality in clinical genetics poses an important question about its scope, which would be in line with professional ethics and simple honesty. It is already known that the maintenance of absolute anonymity, bearing in mind the current progress of genetic techniques, is virtually impossible. On the other hand, our insight into the information contained in the human genome is increasing. This mini-review presents the authors' standpoint regarding this complex and difficult issue.

  17. Confidentiality protections versus collaborative care in the treatment of substance use disorders

    OpenAIRE

    Manuel, Jennifer K; Newville, Howard; Larios, Sandra E; Sorensen, James L

    2013-01-01

    Abstract Practitioners in federally-assisted substance use disorder (SUD) treatment programs are faced with increasingly complex decisions when addressing patient confidentiality issues. Recent policy changes, intended to make treatment more available and accessible, are having an impact on delivery of SUD treatment in the United States. The addition of electronic health records provides opportunity for more rapid and comprehensive communication between patients’ primary and SUD ...

  18. A Policy-Based Framework for Preserving Confidentiality in BYOD Environments: A Review of Information Security Perspectives

    Directory of Open Access Journals (Sweden)

    Chalee Vorakulpipat

    2017-01-01

    Full Text Available Today, many organizations allow their employees to bring their own smartphones or tablets to work and to access the corporate network, which is known as a bring your own device (BYOD. However, many such companies overlook potential security risks concerning privacy and confidentiality. This paper provides a review of existing literature concerning the preservation of privacy and confidentiality, with a focus on recent trends in the use of BYOD. This review spans a large spectrum of information security research, ranging from management (risk and policy to technical aspects of privacy and confidentiality in BYOD. Furthermore, this study proposes a policy-based framework for preserving data confidentiality in BYOD. This framework considers a number of aspects of information security and corresponding techniques, such as policy, location privacy, centralized control, cryptography, and operating system level security, which have been omitted in previous studies. The main contribution is to investigate recent trends concerning the preservation of confidentiality in BYOD from the perspective of information security and to analyze the critical and comprehensive factors needed to strengthen data privacy in BYOD. Finally, this paper provides a foundation for developing the concept of preserving confidentiality in BYOD and describes the key technical and organizational challenges faced by BYOD-friendly organizations.

  19. Using a genetic test result in the care of family members: how does the duty of confidentiality apply?

    Science.gov (United States)

    Parker, Michael; Lucassen, Anneke

    2018-04-27

    The use of genetic and genomic testing is becoming more widespread in healthcare and more inherited explanations for family history of diseases or conditions are being uncovered. Currently, relevant genetic information is not always used in the care of family members who might benefit from it, because of health professionals' fears of inappropriately breaching another family member's confidence. Such examples are likely to increase as testing possibilities expand. Here we present the case for use of familial information in the care and treatment of family members. We argue that whilst a clinical diagnosis in person A is confidential, the discovery of a familial factor that led to this diagnosis should be available for use in depersonalised form by health professionals to inform the testing and clinical care of other family members. The possibility of such use should be made clear in clinical practice at the time of initial testing, but should not require consent from the person in whom the familial factor was first identified. We call for further debate on these questions in the wake of high profile non-disclosure of genetic information cases, and forthcoming Data Protection legislation changes.

  20. Public expectations concerning confidentiality protection of adolescents' sexual and reproductive health care in Lithuania: findings of the surveys conducted in 2005 and 2012.

    Science.gov (United States)

    Jaruseviciene, Lina; Zaborskis, Apolinaras; Lazarus, Jeffrey Victor

    2014-04-01

    An adolescent's right to confidential healthcare is protected by international law and professional consensus. However, parental and social support for confidential sexual and reproductive health (SRH) services, in particular, varies greatly. This study documents Lithuanian residents' expectations with regard to confidentiality protection for adolescents in this domain, and explores the factors related to the diversity of these expectations. Two national surveys of Lithuanian residents completed in 2005 and 2012 using anonymous questionnaires. Participants rated their expectations for confidentiality using a five-point Likert scale for eight types of SRH consultations. Public anticipation for confidentiality depended on whether issues related to sexual behaviour or to its consequences were addressed during adolescent consultation. Only younger respondents had higher expectations for confidentiality in both contexts. Public expectations regarding confidentiality were less demanding in 2012 than in 2005. The expectation of confidentiality protection was greater for topics related to sexual behaviour than for the consequences of sexual behaviour, such as pregnancy, abortion or a sexually transmitted infection. This implies a need for targeted information strategies for the general population and explicit guidance for physicians on when and for whom care should remain confidential.

  1. Cyber-Security Challenges with SMEs in Developing Economies: Issues of Confidentiality, Integrity & Availability (CIA)

    DEFF Research Database (Denmark)

    Yeboah-Boateng, Ezer Osei

    The essence of this study is first to highlight the cyber-security challenges confronting SMEs in developing economies, and to model a framework for safeguarding their assets, to ensure continuous optimal business operations, and to participate and compete securely in the ubiquitous cyber......, to develop customer-centric strategies. While connectivity is indispensable for achieving business success, being connected also implies being exposed to a myriad of cyber-security challenges, such as vulnerabilities of confidentiality, integrity and availability (CIA). As vulnerabilities are exploited...... cognitive map (FCM) approach is also used to show the implications of vulnerabilities amongst SMEs asset disposal policies....

  2. Practice points on three aspects of oil and gas property transactions - operatorship, confidentiality and title review

    International Nuclear Information System (INIS)

    Edwards, P.D.

    1999-01-01

    Practice points regarding three aspects of oil and gas property transactions were described. The first topic dealt with purchase and sale transactions and how to determine which party is entitled to act as the Operator following the sale of the Operator's interest. The second topic addressed issues of confidentiality in connection with oil and gas transactions. The final point discussed contractual provisions relating to title defects, along with their many variations and legal consequences. All three of these topics present issues which give rise to a surprising number of disputes, but which frequently receive only cursory attention in the negotiation and documentation of oil and gas transactions

  3. Using Social Networking Sites for Communicable Disease Control: Innovative Contact Tracing or Breach of Confidentiality?

    Science.gov (United States)

    Mandeville, Kate L; Harris, Matthew; Thomas, H Lucy; Chow, Yimmy; Seng, Claude

    2014-04-01

    Social media applications such as Twitter, YouTube and Facebook have attained huge popularity, with more than three billion people and organizations predicted to have a social networking account by 2015. Social media offers a rapid avenue of communication with the public and has potential benefits for communicable disease control and surveillance. However, its application in everyday public health practice raises a number of important issues around confidentiality and autonomy. We report here a case from local level health protection where the friend of an individual with meningococcal septicaemia used a social networking site to notify potential contacts.

  4. Reconfiguring waveguide-gratings-based M-signature codecs to enhance OCDMA network confidentiality

    Science.gov (United States)

    Huang, Jen-Fa; Chen, Kai-Sheng; Lin, Ying-Chen; Li, Chung-Yu

    2014-02-01

    A reconfiguration scheme based on composite signature codes over waveguide-gratings-based optical code-division multiple-access (OCDMA) network coder/decoders (codecs) is proposed in the paper. By using central control node to monitor network traffic condition and reconfigure the composite signature codes made up of maximal-length sequence (M-sequence) component codes and random changing the signature codes assigned for each user to improve the confidentiality performance in an OCDMA system. The proposed scheme is analyzed with some practical eavesdroppers' attacks.

  5. Confidential conversations between supervisor and employee as a means for improving leadership: a quasi-experimental study in hospital wards.

    Science.gov (United States)

    Kivimäki, M

    1996-11-01

    Although yearly confidential conversations between a supervisor and an employee have been recommended as a means for improving leadership, evidence on the actual effects of these conversations has been lacking. The present study therefore investigated whether confidential conversations improve perceptions of goal clarity, sufficiency of feedback and innovativeness, and elicit satisfaction with the supervisor's leadership style within the hospital setting. Nine wards were divided into one experimental group (3 wards) and two control groups (3 + 3 wards). A questionnaire on goal clarity, feedback, innovativeness and satisfaction was administered twice to every group (1st measurement: r = 186, 2nd measurement: n = 163). The experimental group began confidential conversations after the first measurement, control group 1 entered into conversations during both measurements, and control group 2 did not enter into conversations at the time of either measurement. Confidential conversations improved perceived feedback. In both measurements, the sufficiency of feedback was reported to be significantly better in the groups having conversations than in the other groups. In addition, there was a significant positive change in the perceived sufficiency of feedback in the experimental group but not in the other groups. Confidential conversations did not affect the perceptions of goal clarity and innovativeness or elicit satisfaction with the supervisor's management style.

  6. Conversion of invisible metal-organic frameworks to luminescent perovskite nanocrystals for confidential information encryption and decryption.

    Science.gov (United States)

    Zhang, Congyang; Wang, Bo; Li, Wanbin; Huang, Shouqiang; Kong, Long; Li, Zhichun; Li, Liang

    2017-10-31

    Traditional smart fluorescent materials, which have been attracting increasing interest for security protection, are usually visible under either ambient or UV light, making them adverse to the potential application of confidential information protection. Herein, we report an approach to realize confidential information protection and storage based on the conversion of lead-based metal-organic frameworks (MOFs) to luminescent perovskite nanocrystals (NCs). Owing to the invisible and controlled printable characteristics of lead-based MOFs, confidential information can be recorded and encrypted by MOF patterns, which cannot be read through common decryption methods. Through our conversion strategy, highly luminescent perovskite NCs can be formed quickly and simply by using a halide salt trigger that reacts with the MOF, thus promoting effective information decryption. Finally, through polar solvents impregnation and halide salt conversion, the luminescence of the perovskite NCs can be quenched and recovered, leading to reversible on/off switching of the luminescence signal for multiple information encryption and decryption processes.

  7. Using and Disclosing Confidential Patient Information and The English Common Law: What are the Information Requirements of a Valid Consent?

    Science.gov (United States)

    Chico, Victoria; Taylor, Mark J

    2018-02-01

    The National Health Service in England and Wales is dependent upon the flow of confidential patient data. In the context of consent to the use of patient health data, insistence on the requirements of an 'informed' consent that are difficult to achieve will drive reliance on alternatives to consent. Here we argue that one can obtain a valid consent to the disclosure of confidential patient data, such that this disclosure would not amount to a breach of the common law duty of confidentiality, having provided less information than would typically be associated with an 'informed consent'. This position protects consent as a practicable legal basis for disclosure from debilitating uncertainty or impracticability and, perhaps counter-intuitively, promotes patient autonomy.

  8. Anonymous or confidential HIV counseling and voluntary testing in federally funded testing sites--United States, 1995-1997.

    Science.gov (United States)

    1999-06-25

    Human immunodeficiency virus (HIV) counseling and voluntary testing (CT) programs have been an important part of national HIV prevention efforts since the first HIV antibody tests became available in 1985. In 1995, these programs accounted for approximately 15% of annual HIV antibody testing in the United States, excluding testing for blood donation. CT opportunities are offered to persons at risk for HIV infection at approximately 11,000 sites, including dedicated HIV CT sites, sexually transmitted disease (STD) clinics, drug-treatment centers, hospitals, and prisons. In 39 states, testing can be obtained anonymously, where persons do not have to give their name to get tested. All states provide confidential testing (by name) and have confidentiality laws and regulations to protect this information. This report compares patterns of anonymous and confidential testing in all federally funded CT programs from 1995 through 1997 and documents the importance of both types of testing opportunities.

  9. FORENSIC DNA BANKING LEGISLATION IN DEVELOPING COUNTRIES: PRIVACY AND CONFIDENTIALITY CONCERNS REGARDING A DRAFT FROM TURKISH LEGISLATION.

    Science.gov (United States)

    Ilgili, Önder; Arda, Berna

    This paper presents and analyses, in terms of privacy and confidentiality, the Turkish Draft Law on National DNA Database prepared in 2004, and concerning the use of DNA analysis for forensic objectives and identity verification in Turkey. After a short introduction including related concepts, we evaluate the draft law and provide articles about confidentiality. The evaluation reminded us of some important topics at international level for the developing countries. As a result, the need for sophisticated legislations about DNA databases, for solutions to issues related to the education of employees, and the technological dependency to other countries emerged as main challenges in terms of confidentiality for the developing countries. As seen in the Turkish Draft Law on National DNA Database, the protection of the fundamental rights and freedoms requires more care during the legislative efforts.

  10. Law on consent and confidentiality in India: a need for clarity.

    Science.gov (United States)

    Mathiharan, Karunakaran

    2014-01-01

    The concept of informed consent specific to medical research and treatment is still alien to many medical researchers and practitioners and to millions of Indians. The doctor-patient relationship in India is governed more by trust where the doctor is the authoritative person. Therefore, the benefit of informed consent does not reach all patients in day-to-day medical practice. To complicate the issue, the Indian law is not specific about the age at which a person can give valid consent. The Indian Penal Code is silent about the legal validity of consent given by persons between 12 and 18 years of age. Similarly, the age at which the 'Right to Confidentiality' begins is yet to be defined either by the statute or by the courts. Hence, there is a need for a clear statutory provision to remove the anomalies and ambiguities regarding the age of consent to undergo invasive therapeutic or investigative procedures, participate in clinical trials, as well as define the age at which a person's right to medical confidentiality begins.

  11. Medical liability, safety and confidentiality in maritime telemedicine--the MERMAID position on issues of importance.

    Science.gov (United States)

    Ladas, P; Giatagatzidis, P; Anogianakis, G; Maglavera, S

    1997-01-01

    Telemedicine dates to the days of "wireless telegraphy". As an "extraordinary" arrangement for medical services delivered at time of need, telemedicine has thus far escaped the developments that have taken place over the last 50 years in the areas of medical liability, safety and confidentiality. Today, however, telemedicine is also used to increase quality and cost effectiveness of healthcare provision. This trend is set by the U.S. where the U.S. federal government funds telemedicine at an annual rate of more than $100 million i.e., at a rate 30 times or more than what the EU does while state and local agency support and private business investment in telemedicine is 3 to 4 times larger than that of the U.S. federal government. In this respect it must be stressed that technology tends to satisfy the relevant demand for telecommunications. Telemedicine is used in diverse areas such as pathology, surgery, physical therapy, and psychiatry. It is expected to revolutionise health care in the coming decade and, therefore, it will certainly take into account requirements for medical liability, safety and confidentiality in the same way as traditional "establishment" medicine does.

  12. Contractual obligations and the sharing of confidential health information in sport.

    Science.gov (United States)

    Anderson, L

    2008-09-01

    As an employee, a sports doctor has obligations to their employer, but also professional and widely accepted obligations of a doctor to the patient (in this case the individual team member). The conflict is evident when sports doctors are asked by an athlete to keep personal health information confidential from the coach and team management, and yet both doctor and athlete have employment contracts specifying that such information shall be shared. Recent research in New Zealand shows that despite the presence of an employment contract, there appears to be a wide range of behaviours among sports doctors when an athlete requests that information about them be kept from team management. Many seem willing to honour requests to keep health information about the athlete confidential, thereby being in breach of the employment contract, while others insist on informing team management against the wishes of the athlete. There are a number of potential solutions to this dilemma from forcing doctors to meet their contractual obligations, to limiting the expectations of the employment contract. This paper suggests that at times it may be appropriate to do both, making the position of the doctor clearer and supporting the ability of this group to resist pressure by coaches and management through having a robust code of ethics.

  13. Comparison of parental and adolescent views on the confidential interview and adolescent health risk behaviors within the gynecologic setting.

    Science.gov (United States)

    Trotman, Gylynthia E; Mackey, Eleanor; Tefera, Eshetu; Gomez-Lobo, Veronica

    2018-03-23

    To explore parental and adolescent views on the confidential interview in the gynecologic setting and compare adolescent reported risk-taking behaviors with parental perception. Anonymous surveys were administered separately to parents/guardians and adolescents between the ages of 11-17. Information pertaining to the patient's Tanner stage and reason for visit was obtained from the provider. This first phase served as the usual care group. In the second phase of the study, surveys were once again distributed after a brief educational intervention. Linear regression analysis, Wilcoxon rank sum test, and Fisher exact test were used where appropriate. Pediatric and Adolescent Gynecology clinics in two tertiary hospitals INTERVENTION: Brief educational handout on key concepts of the confidential interview MAIN OUTCOME MEASURES: Parental perception of the confidential interview and adolescent risk- taking behaviors RESULTS: A total of 248 surveys were included in the final analysis, which accounts for 62 adolescent and parent/guardian pairs in each group. The majority of parents and adolescents reported perceived benefit to the confidential interview. However, parents were less likely to rate benefits of private time specifically for their own adolescent and less than half of parents believed that adolescents should have access to private time in the gynecologic setting. Both parents/guardians and adolescents feared that the confidential interview would limit the parent's ability to take part in decision-making. The low support for confidential time for their adolescent was not different in the usual care group as compared to the intervention group, although there was a trend toward parental acceptance with increased adolescent age. Adolescents were consistently more likely to report more risk-taking behaviors than their parents perceived. There is a discord between parental perception and adolescent reports of risk taking behaviors. This is coupled with a lack of

  14. [When the violation of medical confidentiality is imposed by law: Another side effect of Law N° 20.584].

    Science.gov (United States)

    Vega, Jorge; Quintana, María Soledad

    2016-02-01

    A law of rights and duties of patients was recently enacted in Chile (Law N° 20.584). When someone dies, the law allows his inheritors to have access to part or the totality of the medical record. Therefore, they may become acquainted of information that the patient gave in confidence to his physician, protected by "the medical confidentiality". The original bill included the possibility that a doctor could deny information that could cause harm to the former holder of the clinical record, but this precaution was banned by congressmen, seriously damaging the institution of "medical confidentiality", a cornerstone of the medical-patient relationship since the beginning of medicine.

  15. Institute of confidential cooperation in the USA: organizational and juridical aspect

    Directory of Open Access Journals (Sweden)

    Іван Іванович Мусієнко

    2016-01-01

    Full Text Available One of the most efficient measures of crime counteraction is timely reporting law enforcement agencies during which a special role is dedicated to persons (informants. They provide assistance to authorized subjects in the sphere of corruption counteraction by giving operative significant information. Thus the article is aimed at the analysis of law enforcement bodies and special services of the USA experience concerning work with confidential sources. The latest tendencies of the US police activities are concentrated on the attraction of citizens to cooperation with police. Such cooperation is efficient in prevention of most hard crimes due to informants' assistance, i.e. people who display desire to cooperate with police. Scientists D. Sunshine and T. Tyler consider that the nature of relations between police and publicity has a great influence on the efficiency of crime counteraction, local citizens' welfare. The authors draw attention to the importance of establishing benevolent relations between police and local population. The given article also reveals the USA law enforcement agencies experience of institute of confidential cooperation using. Using of operative sources of information remains the most efficient tools for detection, suspension, disclosure and investigation of crimes in the whole world. With the aim of achievement of accuracy in terminology it is conducted the identification of different kinds of informants depending on their role and law enforcement institution they collaborate with. Conclusions. Actions in favor of society are a important element of informationship as social institute. The results of conducted analysis testify that the modern understanding of institute of confidential cooperation in the USA is grounded on the following principles: -        the object of message is information about any abuses, violations, immoral behavior that may cause significant violations of rights and duties of citizens

  16. Mothers' attitudes toward adolescent confidential services: development and validation of scales for use in English- and Spanish-speaking populations.

    Science.gov (United States)

    Tebb, Kathleen P; Pollack, Lance M; Millstein, Shana; Otero-Sabogal, Regina; Wibbelsman, Charles J

    2014-09-01

    To explore parental beliefs and attitudes about confidential services for their teenagers; and to develop an instrument to assess these beliefs and attitudes that could be used among English and Spanish speakers. The long-term goal is to use this research to better understand and evaluate interventions to improve parental knowledge and attitudes toward their adolescent's access and utilization of comprehensive confidential health services. The instrument was developed using an extensive literature review and theoretical framework followed by qualitative data from focus groups and in-depth interviews. It was then pilot tested with a random sample of English- and Spanish-speaking parents and further revised. The final instrument was administered to a random sample of 1,000 mothers. The psychometric properties of the instrument were assessed for Spanish and English speakers. The instrument consisted of 12 scales. Most Cronbach alphas were >.70 for Spanish and English speakers. Fewer items for Spanish speakers "loaded" for the Responsibility and Communication scales. Parental Control of Health Information failed for Spanish speakers. The Parental Attitudes of Adolescent Confidential Health Services Questionnaire (PAACS-Q) contains 12 scales and is a valid and reliable instrument to assess parental knowledge and attitudes toward confidential health services for adolescents among English speakers and all but one scale was applicable for Spanish speakers. More research is needed to understand key constructs with Spanish speakers. Copyright © 2014 Society for Adolescent Health and Medicine. Published by Elsevier Inc. All rights reserved.

  17. 48 CFR 1552.235-77 - Data Security for Federal Insecticide, Fungicide and Rodenticide Act Confidential Business...

    Science.gov (United States)

    2010-10-01

    ... 48 Federal Acquisition Regulations System 6 2010-10-01 2010-10-01 true Data Security for Federal Insecticide, Fungicide and Rodenticide Act Confidential Business Information (DEC 1997). 1552.235-77 Section... SOLICITATION PROVISIONS AND CONTRACT CLAUSES Texts of Provisions and Clauses 1552.235-77 Data Security for...

  18. The disinfection of flexible fibre-optic nasendoscopes out-of-hours: confidential telephone survey of ENT units in England

    NARCIS (Netherlands)

    Kanagalingam, J.; Zainal, A.; Georgalas, C.; Paun, S.; Tolley, N. S.

    2002-01-01

    We present the results of a confidential telephone survey of ENT units in England on the disinfection of flexible fibre-optic nasendoscopes out-of-hours. The on-call residents of 124 units were contacted and questioned. In 35.1 per cent of units surveyed, the on-call resident was primarily

  19. Maintaining confidentiality in prospective studies: anonymous repeated measurements via email (ARME) procedure.

    Science.gov (United States)

    Carli, Vladimir; Hadlaczky, Gergö; Wasserman, Camilla; Stingelin-Giles, Nicola; Reiter-Theil, Stella; Wasserman, Danuta

    2012-02-01

    Respecting and protecting the confidentiality of data and the privacy of individuals regarding the information that they have given as participants in a research project is a cornerstone of complying with accepted research standards. However, in longitudinal studies, establishing and maintaining privacy is often challenging because of the necessity of repeated contact with participants. A novel internet-based solution is introduced here, which maintains privacy while at the same time ensures linkage of data to individual participants in a repeated measures design. With the use of the anonymous repeated measurements via email (ARME) procedure, two separate one-way communication systems are established through ad hoc email accounts and a secure study website. Strengths and limitations of the approach are discussed.

  20. Replication and meta-analysis of common variants identifies a genome-wide significant locus in migraine

    DEFF Research Database (Denmark)

    Esserlind, A-L; Christensen, A F; Le, H

    2013-01-01

    Genetic factors contribute to the aetiology of the prevalent form of migraine without aura (MO) and migraine with typical aura (MTA). Due to the complex inheritance of MO and MTA, the genetic background is still not fully established. In a population-based genome-wide association study by Chasman...

  1. Taxpayers' confidentiality and privacy rights in the international exchange of tax information

    Directory of Open Access Journals (Sweden)

    Anđelković Mileva

    2014-01-01

    Full Text Available The exchange of tax information is a distinctive feature of international tax cooperation processes. The trend of intensive communication between the national tax administrations has been a political priority in economically developed countries. This area of international tax law has been subject to significant changes in the past few years. Countries are prompted to pursue the automatic exchange of tax information by entering into multilateral treaties on the exchange of tax information rather than engage in international exchange of tax information upon request by entering into bilateral agreements. These processes are promptly expedited owing to the incredible development of information and communication technologies. These developments are basically aimed at preventing different forms of international tax fraud which generate significant financial losses in the circumstances of current economic crisis. Such efforts may be justifiable regarding the interests of the countries of residence; but, what about the legal status of ordinary taxpayers who are now subject to a comprehensive and far-reaching control? The new concept may be appropriate for tracking tax fraud or embezzlement but what are its implications for law-abiding taxpayers? The national legislatures are obliged to provide for the protection of confidentiality of exchanged tax information but many states have not fully recognized the importance of providing adequate legal protection of sensitive personal and financial data. There are only a few countries whose legislations explicitly prescribe the taxpayers' right to be informed, the right to consult tax administration and the right to seek tax administration intervention as a form of legal protection in international exchange of tax information. The Serbian tax legislation does not envisage the obligation of tax authorities to notify the taxpayers about the request submitted by foreign tax authorities to provide some tax

  2. A Systematic Review on Confidentiality, Disclosure, and Stigma in the United States: Lessons for HIV Care in Pregnancy From Reproductive Genetics.

    Science.gov (United States)

    Wilkinson, Barbara; Arora, Kavita Shah

    2015-01-01

    The fields of HIV care in pregnancy and reproductive genetics have always been 'exceptional' in that patients are highly concerned about the potential for stigma and the corresponding need for privacy and confidentiality. However, the two fields have diverged in how they have addressed these concerns. The systematic review analyzed 61 manuscripts for similarities and differences between the fields of HIV care in pregnancy and reproductive genetics in the United States, with respect to privacy, confidentiality, disclosure, and stigma. The systematic review revealed that the field of HIV care in pregnancy has insufficiently addressed patient concerns about privacy, confidentiality, and stigma compared to the field of reproductive genetics. Failure to adequately protect confidentiality of HIV-positive patients, and failure to reduce stigma associated with HIV testing and treatment are deficiencies in the delivery of care to HIV-positive pregnant woman and barriers to reducing vertical transmission of HIV. Improvements in care and policy should mirror the field of reproductive genetics.

  3. Confidentiality Concerns and Sexual and Reproductive Health Care Among Adolescents and Young Adults Aged 15-25.

    Science.gov (United States)

    Copen, Casey E; Dittus, Patricia J; Leichliter, Jami S

    2016-12-01

    Data from the National Survey of Family Growth •About 7% of persons aged 15-25 would not seek sexual or reproductive health care because of concerns that their parents might find out about it. •For females aged 15-17 and 18-25, those who had confidentiality concerns were less likely to receive sexual and reproductive health services in the past year compared with those without these concerns. •Less than one-half of teenagers aged 15-17 (38.1%) spent some time alone in the past year during a visit with a doctor or other health care provider without a parent, relative, or guardian in the room. •Teenagers aged 15-17 who spent some time alone during a visit with a health care provider were more likely to have received sexual or reproductive health services in the past year compared with those who had not. Confidentiality concerns can impact adolescent and young adults' access to sexual and reproductive health services (1-4). Young people who are covered by their parents' private health insurance may be deterred from obtaining these services due to concerns that their parents might find out about it (2). Similarly, confidentiality concerns may arise because youth seeking such services may not have time alone during a visit with a health care provider (4). This report describes two measures related to confidentiality concerns and sexual and reproductive health care. All material appearing in this report is in the public domain and may be reproduced or copied without permission; citation as to source, however, is appreciated.

  4. Context, confidentiality, and consent in tailored health communications: a cautionary note.

    Science.gov (United States)

    Orleans, C T

    1999-01-01

    This article highlights key contextual factors that emerge when the evolution of tailored health communications is viewed against the backdrop of dynamic changes in the nation's health care system--including the shift from fee-for-service medicine to managed care and the proliferation of direct-to-consumer and tailored marketing strategies in the pharmaceutical industry. It focuses on contextual variables with potential to significantly mediate the impact of personally tailored health advice--including those related to confidentiality, privacy, and informed consent and to the perceived aims, intents, and sources of tailored health messages. To protect the future of tailored health messages, more research attention must be given to defining these contextual factors and understanding the roles that they play and the ways in which they can be controlled to assure the best outcomes. Such research could point the way towards a set of empirical and ethical "best practices" based on a scientific understanding of how to maximize the benefits, and minimize the potential harms, of the widescale use of tailored health communications.

  5. Design and implementation of a simulation exercise for teaching confidentiality of patient information.

    Science.gov (United States)

    Snyder, J R

    1982-05-01

    Allied health students, making the transition from a purely academic to a professional school setting, are suddenly faced with judgment decisions about disclosure of medical information. Obscure guidelines and new interpersonal relationships with other members of the health care team complicate this transition and pose a threat to confidentiality of patient information. This article describes the design and implementation of a simulation exercise to reinforce lecture guidelines specifying disclosure of medical information without risk to the patient or student. The simulation is comprised of 10 critical incidents calling for responses ranging from logical to judgmental. Although written primarily for medical technologists, with emphasis on limitations governing release of patient laboratory data, the simulation approach is presented here as a model for other allied health professions. The use of a latent image format provides learners with positive or negative reinforcement as they learn the consequences of their decisions. The simulation activity described is easily adapted to small group discussion or computer-assisted instruction. While the simulation appears to be an accurate representation of reality, peer and real-life pressures could not be totally simulated.

  6. Navigating the legal and ethical foundations of informed consent and confidentiality in integrated primary care.

    Science.gov (United States)

    Hudgins, Cathy; Rose, Sandra; Fifield, Peter Y; Arnault, Steve

    2013-03-01

    This article describes findings from ongoing research and analysis of current literature in addition to discussions with leaders in the field, communications with lawyers and administrators of advocacy and government agencies pertaining to integrated primary care (IPC). Standards of care are established based on a myriad of factors, including professional codes of ethics, case law, state and federal laws, professional standards, existing best practices, current professional guidelines, administrative rules and regulations, and licensing board regulations. Regulations may differ for behavioral health and medical providers, posing challenges in IPC settings. This article provides a review of these regulations, particularly 42CFR Part 2, a federal law governing confidentiality for substance abuse programs, Health Insurance Portability and Accountability Act (HIPAA), and state laws relevant to patient care in IPC settings. On the basis of findings from the study, the authors make recommendations related to patient care practices concerning informed consent and release of information procedures, treatment and warm hand-off protocols, documentation and electronic record keeping, agreements with other providers, and billing. (PsycINFO Database Record (c) 2013 APA, all rights reserved).

  7. Pluto confidential an insider account of the ongoing battles over the status of Pluto

    CERN Document Server

    Maran, Stephen

    2014-01-01

    When the International Astronomical Union (IAU) adopted a new definition of a "planet" in August 2006, Pluto became a dwarf planet, drawing a divisive line in science and public opinions. The controversy of whether Pluto is a planet continues years later, and passion about the decision remains, pitting scientist against scientist and invoking sentiments and nostalgia from the rest of the world. With the IAU definition, the future of space objects is forever changed. Learn how this resolution came to be and what it means for astronomy, who implemented it and who is against it, and whether it's the first or millionth time the world's view of astronomy has rotated on its axis. Written by an astronomer and educator who voted for the IAU resolution—Laurence A. Marschall—and a NASA scientist who supported the opposing petition that resulted—Stephen P. Maran—Pluto Confidential leaves no perspective out and no asteroid unturned in the Pluto debate. A telescopic look inside the book: History of planetary disputes,...

  8. Increasing the acceptability of HIV counseling and testing with three C's: convenience, confidentiality and credibility.

    Science.gov (United States)

    Angotti, Nicole; Bula, Agatha; Gaydosh, Lauren; Kimchi, Eitan Zeev; Thornton, Rebecca L; Yeatman, Sara E

    2009-06-01

    Agencies engaged in humanitarian efforts to prevent the further spread of HIV have emphasized the importance of voluntary counseling and testing (VCT), and most high-prevalence countries now have facilities that offer testing free of charge. The utilization of these services is disappointingly low, however, despite high numbers reporting that they would like to be tested. Explanations of this discrepancy typically rely on responses to hypothetical questions posed in terms of psychological or social barriers; often, the explanation is that people fear learning that they are infected with a disease that they understand to be fatal and stigmatizing. Yet when we offered door-to-door rapid blood testing for HIV as part of a longitudinal study in rural Malawi, the overwhelming majority agreed to be tested and to receive their results immediately. Thus, in this paper, we ask: why are more people not getting tested? Using an explanatory research design, we find that rural Malawians are responsive to door-to-door HIV testing for the following reasons: it is convenient, confidential, and the rapid blood test is credible. Our study suggests that attention to these factors in VCT strategies may mitigate the fear of HIV testing, and ultimately increase uptake in rural African settings.

  9. Parental acceptability of contraceptive methods offered to their teen during a confidential health care visit.

    Science.gov (United States)

    Hartman, Lauren B; Shafer, Mary-Ann; Pollack, Lance M; Wibbelsman, Charles; Chang, Fay; Tebb, Kathleen P

    2013-02-01

    To examine parental acceptability of contraceptive methods offered confidentially to their adolescent daughter. A random sample of 261 parents/guardians with a daughter aged 12-17 years completed a telephone survey examining the relationship between parental acceptability of seven contraceptive methods and adolescents' likelihood to have sex, parenting beliefs, parents' sexual health as teens, sexually transmitted infection knowledge, and demographic factors. Acceptability was highest for oral contraceptive pills (59%) and lowest for intrauterine device (18%). Parental acceptance of teens' autonomy was significantly associated with increased acceptability of all methods. Parental knowledge of sexually transmitted infections was poor, and 51% found it acceptable for clinicians to provide their sexually active teen with condoms. Parents were more accepting of oral contraceptive pills and condoms compared with intrauterine devices and implants. Parental recognition of their teen's autonomy was associated with greater parental acceptability of clinicians providing their adolescent with contraceptives (regardless of the specific type of method being offered). Copyright © 2013 Society for Adolescent Health and Medicine. Published by Elsevier Inc. All rights reserved.

  10. Access to Confidential Alcohol Industry Documents: From ‘Big Tobacco’ to ‘Big Booze’

    Directory of Open Access Journals (Sweden)

    Ms Laura Bond

    2009-03-01

    Full Text Available BACKGROUND:Internal tobacco industry document searches have led to the discovery of hitherto unpublisheddocuments that provide insights into the drinks industry. The documents uncover key concerns andstrategies for the drinks industry with focus on the Miller Brewing Company and the Beer Institute.METHODS:The identification of the Philip Morris 1996 CEO Issues Book from the tobacco document archives led to asystematic search for alcohol-related documents. The search was conducted by entering alcohol-relatedterms into search fields of tobacco document archive sites available on the World Wide WebRESULTS:Key areas of concern for the Miller Brewing Company, the Beer Institute, and more broadly, the alcoholindustry include developments of legislative and regulatory controls such as tax increases, advertisingrestrictions and blood alcohol content lowering and public perceptions of harms relating to drunk driving,binge drinking and underage alcohol consumption. Strategies proposed by the Miller Brewing Companyand the Beer Institute to combat these concerns include ally development and maintenance and thepromotion of personal responsibility.CONCLUSIONS:These once confidential internal documents provide new evidence on the drinks industry’s concernsabout possible alcohol control measures and the strategies used to help overcome these concerns. The document findings justify the public health community’s cynicism about the alcohol industry whileproviding a new source of information to assist development in the regulation and control of the drinksindustry.

  11. Private business: the uptake of confidential HIV testing in remote aboriginal communities on the Anangu Pitjantjatjara Lands.

    Science.gov (United States)

    Miller, P J; Torzillo, P J

    1998-10-01

    Despite a concentration of risk factors for HIV transmission, many remote Aboriginal communities in central Australia have a low uptake of HIV testing. We studied the uptake of HIV testing in six clinics in remote Aboriginal communities following the introduction of voluntary confidential testing to assess the impact of the intervention and to determine if the program was reaching people most at risk of HIV infection and transmission. The study was conducted by Nganampa Health Council, an Aboriginal-controlled health service on the Anangu Pitjantjatjara Lands in the far north-west of South Australia. Since the introduction of confidential coded testing in August 1994 the number of HIV tests provided through the remote clinics has increased from 83 tests/year to 592 tests/year. In the 12-month audit period (August 1, 1995, to July 31, 1996) 62.7% of women aged 20-24 years, 44.6% of people aged 12-40 years and 24% of the total population had an HIV test. Fifty per cent of tests were accounted for by the 15-25 year age groups and 60% of tests related to an STD consult. This study shows that a high uptake of HIV testing in high-risk groups can be achieved in remote Aboriginal communities where a high level of confidentiality is maintained.

  12. General practitioners' perspectives regarding competence and confidentiality in an adolescent with suspected anorexia nervosa: legal and ethical considerations.

    Science.gov (United States)

    Bartholomew, Terence P; Paxton, Susan J

    2003-02-01

    In Victoria, Australia, the legal position regarding young people's competence to make medical treatment decisions has not been clarified in legislation, and a number of often vague common law decisions must be relied on for guidance. This situation produces a degree of uncertainty about appropriate professional practice, while also potentially impeding young people's rights claims in health care settings. With this in mind, the present research explored general practitioners' competence and confidentiality decisions regarding a 17-year-old female who presented with symptoms of an eating disorder. Questionnaires were sent to a random sample of 500 Victorian general practitioners, of whom 190 responded. After reading a case vignette, general practitioners indicated whether they would find the hypothetical patient competent and if they would maintain her confidentiality. Seventy-three per cent of respondents found the patient competent and most would have maintained confidentiality, at least initially. However, subsequent analysis of the rationales supplied for these decisions revealed a wide diversity in general practitioners' understandings and implementations of extant legal authority. This research highlights the need for general practitioners to be exposed to up-to-date and clinically relevant explanations of contemporary legal positions.

  13. Payers' experiences with confidential pharmaceutical price discounts: A survey of public and statutory health systems in North America, Europe, and Australasia.

    Science.gov (United States)

    Morgan, Steven G; Vogler, Sabine; Wagner, Anita K

    2017-04-01

    Institutional payers for pharmaceuticals worldwide appear to be increasingly negotiating confidential discounts off of the official list price of pharmaceuticals purchased in the community setting. We conducted an anonymous survey about experiences with and attitudes toward confidential discounts on patented pharmaceuticals in a sample of high-income countries. Confidential price discounts are now common among the ten health systems that participated in our study, though some had only recently begun to use these pricing arrangements on a routine basis. Several health systems had used a wide variety of discounting schemes in the past two years. The most frequent discount received by participating health systems was between 20% and 29% of official list prices; however, six participants reported their health system received one or more discount over the past two years that was valued at 60% or more of the list prices. On average, participants reported that confidential discounts were more common, complex, and significant for specialty pharmaceuticals than for primary care pharmaceuticals. Participants had a more favorable view of the impact of confidential discount schemes on their health systems than on the global marketplace. Overall, the frequency, complexity, and scale of confidential discounts being routinely negotiated suggest that the list prices for medicines bear limited resemblance to what many institutional payers actually pay. Copyright © 2017 The Authors. Published by Elsevier B.V. All rights reserved.

  14. THE CONFIDENTIALITY OF THE MEDICAL ACT IN THE DEPRIVATION OF LIBERTY ENVIRONMENT

    Directory of Open Access Journals (Sweden)

    Laurenţia Florentina GĂIŞTEANU (ŞTEFAN

    2018-05-01

    Full Text Available Respecting the medical secrecy is one of the essential conditions underlying the protection of private life. Medical information obtained from patients in the context of a physician - patient relationship should be protected by confidentiality. Disclosure of personal health care data without the agreement of the person is a touch brought to private life. One particular feature of the health care system is the healthcare provided to patients in detention. Even though the doctor-patient relationship in the penitentiary environment has a number of peculiarities, it is coordinated according to the same ethical principles as in the public one. The penitentiary physician's duty is not limited to consultation and treatment, he often becomes the prisoner's personal physician, and the means of relationship must respect the fundamental rights of the patient, regardless of his or her status. In the penitentiary system, there are also many dilemmas arising from the duties of the medical staff, the first of the detainee's personal physician and the second of the penitentiary administration's counselor. The medical specialist in a penitentiary must take into account that communicating with the patient is essential in the doctor-patient relationship and she must be sincere. In determining the attitude of the patient towards the doctor and the medical act, the context of the first contact with the doctor, the way in which the first medical consultation takes place, is of great importance. Trust is gradually gaining, and medical staff must strive to demonstrate that they can ensure the protection of prisoners' medical records.

  15. Consent, competence, and confidentiality related to psychiatric conditions in adolescent medicine practice.

    Science.gov (United States)

    Campbell, Amy T

    2006-02-01

    Health care for adolescents with psychiatric conditions plays out on a complex stage with considerable state variation, based on a mix of statutory and case law. Added to this are less defined factors such as level of trust in community providers, level of cooperation between generalists and specialists, and local regulatory stances toward adolescent health care and mental health care. And, of course, there is the great diversity in diagnosis and maturity level, as well as family cohesion, from patient to patient (and even within a given patient across time). Finally, this situation resides within a larger environment of stigma vis-a-vis mental health care, most notably evident in the United States in disparate insurance coverage of mental versus physical health treatment. With so complex and varied a picture, clinicians should consult with legal counsel to understand applicable state law and local regulatory guidance (if any)and should also seek out ethical consultation when law does not apply or is not decisive, leaving ongoing concerns. And, as with clinical decision-making, in law and ethics "facts matter" [4]. A growing body of law carves out exceptions to general requirements for parental consent, including in mental health care. Ethically informed discussion around capacity determinations, the consent process, and confidentiality can help engage adolescents as "emerging adults"while remaining mindful of risky behavior and "immediate future" orientation that can be hallmarks of adolescence [30]. Respect for the adolescent, parental responsibility toward their child's best interests, and the family unit generally are paramount. Respect--coupled with caution, greater disclosure and cultural sensitivity, and a participatory approach to decision-making that seeks out the least restrictive and coercive options-can help avoid potential legal traps. How best to proceed? It truly depends-with law and ethics the start (not end) of the discussion and analysis.

  16. Análisis fisicoquímico del MTA Angelus ® y Biodentine ® mediante difracción de rayos X, espectrometría de energía dispersiva, fluorescencia de rayos X, microscopio electrónico de barrido y espectroscopía de rayos infrarrojos

    OpenAIRE

    Rodríguez Rocha, Alejandra Citlalli; Hernández Padrón, Genoveva; García Garduño, Margarita V.; García Aranda, Raúl Luis

    2015-01-01

    El propósito de este estudio fue caracterizar los componentes de los cementos comerciales para uso en odontología MTA Angelus ® Blanco (Angelus, Lodrina, Paraná Brasil) y de Biodentine TM (Septodont, Saint-Maur-des Fosses, Francia) mediante Microscopia Electrónica de Barrido, difracción de rayos X, fluorescencia de rayos X, espectrometría de dispersión de electrones y espectroscopia infrarroja. Los dos cementos se mezclaron según las indicaciones del fabricante. Se les practicó un estudio de ...

  17. Saving Mothers' Lives: Reviewing maternal deaths to make motherhood safer: 2006-2008. The Eighth Report of the Confidential Enquiries into Maternal Deaths in the United Kingdom.

    LENUS (Irish Health Repository)

    Cantwell, Roch

    2011-03-01

    In the triennium 2006-2008, 261 women in the UK died directly or indirectly related to pregnancy. The overall maternal mortality rate was 11.39 per 100,000 maternities. Direct deaths decreased from 6.24 per 100,000 maternities in 2003-2005 to 4.67 per 100,000 maternities in 2006–2008 (p = 0.02). This decline is predominantly due to the reduction in deaths from thromboembolism and, to a lesser extent, haemorrhage. For the first time there has been a reduction in the inequalities gap, with a significant decrease in maternal mortality rates among those living in the most deprived areas and those in the lowest socio-economic group. Despite a decline in the overall UK maternal mortality rate, there has been an increase in deaths related to genital tract sepsis, particularly from community acquired Group A streptococcal disease. The mortality rate related to sepsis increased from 0.85 deaths per 100,000 maternities in 2003-2005 to 1.13 deaths in 2006-2008, and sepsis is now the most common cause of Direct maternal death. Cardiac disease is the most common cause of Indirect death; the Indirect maternal mortality rate has not changed significantly since 2003-2005. This Confidential Enquiry identified substandard care in 70% of Direct deaths and 55% of Indirect deaths. Many of the identified avoidable factors remain the same as those identified in previous Enquiries. Recommendations for improving care have been developed and are highlighted in this report. Implementing the Top ten recommendations should be prioritised in order to ensure the overall UK maternal mortality rate continues to decline.

  18. Poultry Houses, WI Livestock Consortium Livestock Premises; confidentiality protected by law; use for animal health emergencies only; some aggregated county data, Published in 2009, 1:24000 (1in=2000ft) scale, Wisconsin Department of Agriculture, Trade & Consumer Protection.

    Data.gov (United States)

    NSGIC State | GIS Inventory — Poultry Houses dataset current as of 2009. WI Livestock Consortium Livestock Premises; confidentiality protected by law; use for animal health emergencies only; some...

  19. The "GeneTrustee": a universal identification system that ensures privacy and confidentiality for human genetic databases.

    Science.gov (United States)

    Burnett, Leslie; Barlow-Stewart, Kris; Proos, Anné L; Aizenberg, Harry

    2003-05-01

    This article describes a generic model for access to samples and information in human genetic databases. The model utilises a "GeneTrustee", a third-party intermediary independent of the subjects and of the investigators or database custodians. The GeneTrustee model has been implemented successfully in various community genetics screening programs and has facilitated research access to genetic databases while protecting the privacy and confidentiality of research subjects. The GeneTrustee model could also be applied to various types of non-conventional genetic databases, including neonatal screening Guthrie card collections, and to forensic DNA samples.

  20. Privacy preserving probabilistic record linkage (P3RL): a novel method for linking existing health-related data and maintaining participant confidentiality.

    Science.gov (United States)

    Schmidlin, Kurt; Clough-Gorr, Kerri M; Spoerri, Adrian

    2015-05-30

    preserve privacy of persons in the study. Privacy Preserving Probabilistic Record linkage expands record linkage facilities in settings where a unique identifier is unavailable and/or regulations restrict access to the non-unique person identifiable information needed to link existing health-related data sets. Automated pre-processing and encryption fully protect sensitive information ensuring participant confidentiality. This method is suitable not just for epidemiological research but also for any setting with similar challenges.

  1. Encryption for confidentiality of the network and influence of this to the quality of streaming video through network

    Science.gov (United States)

    Sevcik, L.; Uhrin, D.; Frnda, J.; Voznak, M.; Toral-Cruz, Homer; Mikulec, M.; Jakovlev, Sergej

    2015-05-01

    Nowadays, the interest in real-time services, like audio and video, is growing. These services are mostly transmitted over packet networks, which are based on IP protocol. It leads to analyses of these services and their behavior in such networks which are becoming more frequent. Video has become the significant part of all data traffic sent via IP networks. In general, a video service is one-way service (except e.g. video calls) and network delay is not such an important factor as in a voice service. Dominant network factors that influence the final video quality are especially packet loss, delay variation and the capacity of the transmission links. Analysis of video quality concentrates on the resistance of video codecs to packet loss in the network, which causes artefacts in the video. IPsec provides confidentiality in terms of safety, integrity and non-repudiation (using HMAC-SHA1 and 3DES encryption for confidentiality and AES in CBC mode) with an authentication header and ESP (Encapsulating Security Payload). The paper brings a detailed view of the performance of video streaming over an IP-based network. We compared quality of video with packet loss and encryption as well. The measured results demonstrated the relation between the video codec type and bitrate to the final video quality.

  2. A Novel QKD-based Secure Edge Router Architecture Design for Burst Confidentiality in Optical Burst Switched Networks

    Science.gov (United States)

    Balamurugan, A. M.; Sivasubramanian, A.

    2014-06-01

    The Optical Burst Switching (OBS) is an emergent result to the technology issue that could achieve a viable network in future. They have the ability to meet the bandwidth requisite of those applications that call for intensive bandwidth. The field of optical transmission has undergone numerous advancements and is still being researched mainly due to the fact that optical data transmission can be done at enormous speeds. The concept of OBS is still far from perfection facing issues in case of security threat. The transfer of optical switching paradigm to optical burst switching faces serious downfall in the fields of burst aggregation, routing, authentication, dispute resolution and quality of service (QoS). This paper proposes a framework based on QKD based secure edge router architecture design to provide burst confidentiality. The QKD protocol offers high level of confidentiality as it is indestructible. The design architecture was implemented in FPGA using diverse models and the results were taken. The results show that the proposed model is suitable for real time secure routing applications of the Optical burst switched networks.

  3. Thoughts on identifiers

    CERN Multimedia

    CERN. Geneva

    2005-01-01

    As business processes and information transactions have become an inextricably intertwined with the Web, the importance of assignment, registration, discovery, and maintenance of identifiers has increased. In spite of this, integrated frameworks for managing identifiers have been slow to emerge. Instead, identification systems arise (quite naturally) from immediate business needs without consideration for how they fit into larger information architectures. In addition, many legacy identifier systems further complicate the landscape, making it difficult for content managers to select and deploy identifier systems that meet both the business case and long term information management objectives. This presentation will outline a model for evaluating identifier applications and the functional requirements of the systems necessary to support them. The model is based on a layered analysis of the characteristics of identifier systems, including: * Functional characteristics * Technology * Policy * Business * Social T...

  4. Identifiability in stochastic models

    CERN Document Server

    1992-01-01

    The problem of identifiability is basic to all statistical methods and data analysis, occurring in such diverse areas as Reliability Theory, Survival Analysis, and Econometrics, where stochastic modeling is widely used. Mathematics dealing with identifiability per se is closely related to the so-called branch of ""characterization problems"" in Probability Theory. This book brings together relevant material on identifiability as it occurs in these diverse fields.

  5. Material Transfer Agreement (MTA) | FNLCR Staging

    Science.gov (United States)

    Material Transfer Agreements are appropriate for exchange of materials into or out of the Frederick National Labfor research or testing purposes, with no collaborative research by parties involving the materials.

  6. Identifying Strategic Scientific Opportunities

    Science.gov (United States)

    As NCI's central scientific strategy office, CRS collaborates with the institute's divisions, offices, and centers to identify research opportunities to advance NCI's vision for the future of cancer research.

  7. Identifying Breast Cancer Oncogenes

    Science.gov (United States)

    2011-10-01

    cells we observed that it promoted transformation of HMLE cells, suggesting a tumor suppressive role of Merlin in breast cancer (Figure 4B). A...08-1-0767 TITLE: Identifying Breast Cancer Oncogenes PRINCIPAL INVESTIGATOR: Yashaswi Shrestha...Standard Form 298 (Rev. 8-98) Prescribed by ANSI Std. Z39.18 W81XWH-08-1-0767 Identifying Breast Cancer Oncogenes Yashaswi Shrestha Dana-Farber

  8. With Due Consideration: Australian Human Service Practitioners' Understandings of Confidentiality and Disclosure Obligations in Regard to Cases Concerning Gambling-Related Theft

    Science.gov (United States)

    Patford, Janet; Tranent, Peter

    2013-01-01

    Preserving confidentiality is problematic for human service practitioners if they know that a client is seriously harming a third party or could do so in the future. The present study concerned financial harm, as generated by gambling-related theft. Clients who disclose gambling-related theft potentially create a dilemma for practitioners, who may…

  9. Measurement Errors Arising When Using Distances in Microeconometric Modelling and the Individuals’ Position Is Geo-Masked for Confidentiality

    Directory of Open Access Journals (Sweden)

    Giuseppe Arbia

    2015-10-01

    Full Text Available In many microeconometric models we use distances. For instance, in modelling the individual behavior in labor economics or in health studies, the distance from a relevant point of interest (such as a hospital or a workplace is often used as a predictor in a regression framework. However, in order to preserve confidentiality, spatial micro-data are often geo-masked, thus reducing their quality and dramatically distorting the inferential conclusions. In particular in this case, a measurement error is introduced in the independent variable which negatively affects the properties of the estimators. This paper studies these negative effects, discusses their consequences, and suggests possible interpretations and directions to data producers, end users, and practitioners.

  10. Medical records confidentiality and public health research: two values at stake? An italian survey focus on individual preferences

    Directory of Open Access Journals (Sweden)

    Virgilia Toccaceli

    2015-02-01

    Full Text Available In a time when Europe is preparing to introduce new regulations on privacy protection, we conducted a survey among 1700 twins enrolled in the Italian Twin Register about the access and use of their medical records for public health research without explicit informed consent. A great majority of respondents would refuse or are doubtful about the access and use of hospital discharge records or clinical data without their explicit consent. Young and female individuals represent the modal profile of these careful people. As information retrieved from medical records is crucial for progressing knowledge, it is important to promote a better understanding of the value of public health research activities among the general population. Furthermore, public opinions are relevant to policy making, and concerns and preferences about privacy and confidentiality in research can contribute to the design of procedures to exploit medical records effectively and customize the protection of individuals’ medical data.

  11. How do clinical genetics consent forms address the familial approach to confidentiality and incidental findings? A mixed-methods study.

    Science.gov (United States)

    Dheensa, Sandi; Crawford, Gillian; Salter, Claire; Parker, Michael; Fenwick, Angela; Lucassen, Anneke

    2018-01-01

    Genetic test results can be relevant to patients and their relatives. Questions thus arise around whether clinicians regard genetic information as confidential to individuals or to families, and about how they broach this and other issues, including the potential for incidental findings, in consent (forms) for genetic testing. We conducted a content analysis of UK-wide genetic testing consent forms and interviewed 128 clinicians/laboratory scientists. We found that almost all genetic services offered patients multiple, sometimes unworkable, choices on forms, including an option to veto the use of familial genetic information to benefit relatives. Participants worried that documented choices were overriding professional judgement and cautioned against any future forms dictating practice around incidental findings. We conclude that 'tick-box' forms, which do little to enhance autonomy, are masking valid consent processes in clinical practice. As genome-wide testing becomes commonplace, we must re-consider consent processes, so that they protects patients'-and relatives'-interests.

  12. Ethical reflection on multi-disciplinarity and confidentiality of information in medical imaging through new information and communication technologies

    International Nuclear Information System (INIS)

    Beranger, J.; Le Coz, P.

    2012-01-01

    Technological advances in medical imaging has resulted in the exponential increase of the number of images per examination, caused the irreversible decline of the silver film and imposed digital imaging. This digitization is a concept whose levels of development are multiple, reflecting the complexity of this process of technological change. Under these conditions, the use of medical information via new information and communication technologies is at the crossroads of several scientific approaches and several disciplines (medicine, ethics, law, economics, psychology, etc.) surrounding the information systems in health, doctor-patient relationship and concepts that are associated. Each day, these new information and communication technologies open up new horizons and the space of possibilities, spectacularly developing access to information and knowledge. In this perspective of digital technology emergence impacting the multidisciplinary use of health information systems, the ethical questions are numerous, especially on the preservation of privacy, confidentiality and security of medical data, and their accessibility and integrity. (authors)

  13. Practices in security and confidentiality of HIV/AIDS patients' information: A national survey among staff at HIV outpatient clinics in Vietnam.

    Directory of Open Access Journals (Sweden)

    Nguyen Khac Hai

    Full Text Available Breach of confidentiality or invasion of privacy from the collection and use of medical records, particularly those of patients with HIV/AIDS or other diseases sensitive to stigmatization, should be prevented by all related stakeholders in healthcare settings. The main focus of this study was to assess practices regarding security and confidentiality of HIV-related information among staff at HIV outpatient clinics (HIV-OPCs in Vietnam.A descriptive cross-sectional study was conducted at all 312 HIV-OPCs across the country using an online survey technique.In general, the staff practices for securing and protecting patient information were at acceptable levels. Most staff had proper measures and practices for maintaining data security; however, the protection of patient confidentiality, particularly for data access, sharing, and transfer still required improvement. Most HIV-OPC staff had good or moderate knowledge and positive perceptions towards security and confidentiality issues. Staff who were not trained in the practice of security measures differed significantly from those who were trained (OR: 3.74; 95%CI: 1.44-9.67; staff needing improved knowledge levels differed significantly from those with good (OR: 5.20; 95%CI: 2.39-11.32 and moderate knowledge levels (OR: 5.10; 95%CI: 2.36-11.00; and staff needing improved perception levels differed significantly from those with good (i.e., with 100% proper practices and moderate perception levels (OR: 5.67; 95%CI: 2.93-10.95. Staff who were not trained in the protection of data confidentiality differed significantly from those who were trained (OR: 2.18; 95%CI: 1.29-3.65.Training is an important factor to help raise the levels of proper practices regarding confidentiality and security, to improve knowledge and raise awareness about change among staff. The operation and management of HIV treatment and care in Vietnam are currently transitioning from separate healthcare clinics (HIV-OPC into units

  14. Practices in security and confidentiality of HIV/AIDS patients' information: A national survey among staff at HIV outpatient clinics in Vietnam.

    Science.gov (United States)

    Khac Hai, Nguyen; Lawpoolsri, Saranath; Jittamala, Podjanee; Thi Thu Huong, Phan; Kaewkungwal, Jaranit

    2017-01-01

    Breach of confidentiality or invasion of privacy from the collection and use of medical records, particularly those of patients with HIV/AIDS or other diseases sensitive to stigmatization, should be prevented by all related stakeholders in healthcare settings. The main focus of this study was to assess practices regarding security and confidentiality of HIV-related information among staff at HIV outpatient clinics (HIV-OPCs) in Vietnam. A descriptive cross-sectional study was conducted at all 312 HIV-OPCs across the country using an online survey technique. In general, the staff practices for securing and protecting patient information were at acceptable levels. Most staff had proper measures and practices for maintaining data security; however, the protection of patient confidentiality, particularly for data access, sharing, and transfer still required improvement. Most HIV-OPC staff had good or moderate knowledge and positive perceptions towards security and confidentiality issues. Staff who were not trained in the practice of security measures differed significantly from those who were trained (OR: 3.74; 95%CI: 1.44-9.67); staff needing improved knowledge levels differed significantly from those with good (OR: 5.20; 95%CI: 2.39-11.32) and moderate knowledge levels (OR: 5.10; 95%CI: 2.36-11.00); and staff needing improved perception levels differed significantly from those with good (i.e., with 100% proper practices) and moderate perception levels (OR: 5.67; 95%CI: 2.93-10.95). Staff who were not trained in the protection of data confidentiality differed significantly from those who were trained (OR: 2.18; 95%CI: 1.29-3.65). Training is an important factor to help raise the levels of proper practices regarding confidentiality and security, to improve knowledge and raise awareness about change among staff. The operation and management of HIV treatment and care in Vietnam are currently transitioning from separate healthcare clinics (HIV-OPC) into units integrated

  15. Practices in security and confidentiality of HIV/AIDS patients’ information: A national survey among staff at HIV outpatient clinics in Vietnam

    Science.gov (United States)

    Khac Hai, Nguyen; Lawpoolsri, Saranath; Jittamala, Podjanee; Thi Thu Huong, Phan

    2017-01-01

    Introduction Breach of confidentiality or invasion of privacy from the collection and use of medical records, particularly those of patients with HIV/AIDS or other diseases sensitive to stigmatization, should be prevented by all related stakeholders in healthcare settings. The main focus of this study was to assess practices regarding security and confidentiality of HIV-related information among staff at HIV outpatient clinics (HIV-OPCs) in Vietnam. Methods A descriptive cross-sectional study was conducted at all 312 HIV-OPCs across the country using an online survey technique. Results In general, the staff practices for securing and protecting patient information were at acceptable levels. Most staff had proper measures and practices for maintaining data security; however, the protection of patient confidentiality, particularly for data access, sharing, and transfer still required improvement. Most HIV-OPC staff had good or moderate knowledge and positive perceptions towards security and confidentiality issues. Staff who were not trained in the practice of security measures differed significantly from those who were trained (OR: 3.74; 95%CI: 1.44–9.67); staff needing improved knowledge levels differed significantly from those with good (OR: 5.20; 95%CI: 2.39–11.32) and moderate knowledge levels (OR: 5.10; 95%CI: 2.36–11.00); and staff needing improved perception levels differed significantly from those with good (i.e., with 100% proper practices) and moderate perception levels (OR: 5.67; 95%CI: 2.93–10.95). Staff who were not trained in the protection of data confidentiality differed significantly from those who were trained (OR: 2.18; 95%CI: 1.29–3.65). Conclusions Training is an important factor to help raise the levels of proper practices regarding confidentiality and security, to improve knowledge and raise awareness about change among staff. The operation and management of HIV treatment and care in Vietnam are currently transitioning from separate

  16. Identifying Knowledge and Communication

    Directory of Open Access Journals (Sweden)

    Eduardo Coutinho Lourenço de Lima

    2006-12-01

    Full Text Available In this paper, I discuss how the principle of identifying knowledge which Strawson advances in ‘Singular Terms and Predication’ (1961, and in ‘Identifying Reference and Truth-Values’ (1964 turns out to constrain communication. The principle states that a speaker’s use of a referring expression should invoke identifying knowledge on the part of the hearer, if the hearer is to understand what the speaker is saying, and also that, in so referring, speakers are attentive to hearers’ epistemic states. In contrasting it with Russell’s Principle (Evans 1982, as well as with the principle of identifying descriptions (Donnellan 1970, I try to show that the principle of identifying knowledge, ultimately a condition for understanding, makes sense only in a situation of conversation. This allows me to conclude that the cooperative feature of communication (Grice 1975 and reference (Clark andWilkes-Gibbs 1986 holds also at the understanding level. Finally, I discuss where Strawson’s views seem to be unsatisfactory, and suggest how they might be improved.

  17. Identifying and Managing Risk.

    Science.gov (United States)

    Abraham, Janice M.

    1999-01-01

    The role of the college or university chief financial officer in institutional risk management is (1) to identify risk (physical, casualty, fiscal, business, reputational, workplace safety, legal liability, employment practices, general liability), (2) to develop a campus plan to reduce and control risk, (3) to transfer risk, and (4) to track and…

  18. Internally readable identifying tag

    International Nuclear Information System (INIS)

    Jefferts, K.B.; Jefferts, E.R.

    1980-01-01

    A method of identifying non-metallic objects by means of X-ray equipment is described in detail. A small metal pin with a number of grooves cut in a pre-determined equi-spaced pattern is implanted into the non-metallic object and by decoding the groove patterns using X-ray equipment, the object is uniquely identified. A specific example of such an application is in studying the migratory habits of fish. The pin inserted into the snout of the fish is 0.010 inch in diameter, 0.040 inch in length with 8 possible positions for grooves if spaced 0.005 inch apart. With 6 of the groove positions available for data, the capacity is 2 6 or 64 combinations; clearly longer pins would increase the data capacity. This method of identification is a major advance over previous techniques which necessitated destruction of the fish in order to recover the identification tag. (UK)

  19. Identifying Breast Cancer Oncogenes

    Science.gov (United States)

    2010-10-01

    tyrosine kinases with an SH3, SH2 and catalytic domain, it lacks a native myristylation signal shared by most members of this class [14], [38]. The...therapeutics and consequently, improve clinical outcomes. We aim to identify novel drivers of breast oncogenesis. We hypothesize that a kinase gain-of...human mammary epithelial cells. A pBabe-Puro-Myr-Flag kinase open reading frame (ORF) library was screened in immortalized human mammary epithelial

  20. Rock disposal problems identified

    Energy Technology Data Exchange (ETDEWEB)

    Knox, R

    1978-06-01

    Mathematical models are the only way of examining the return of radioactivity from nuclear waste to the environment over long periods of time. Work in Britain has helped identify areas where more basic data is required, but initial results look very promising for final disposal of high level waste in hard rock repositories. A report by the National Radiological Protection Board of a recent study, is examined.

  1. The risk of re-identification versus the need to identify individuals in rare disease research.

    Science.gov (United States)

    Hansson, Mats G; Lochmüller, Hanns; Riess, Olaf; Schaefer, Franz; Orth, Michael; Rubinstein, Yaffa; Molster, Caron; Dawkins, Hugh; Taruscio, Domenica; Posada, Manuel; Woods, Simon

    2016-11-01

    There is a growing concern in the ethics literature and among policy makers that de-identification or coding of personal data and biospecimens is not sufficient for protecting research subjects from privacy invasions and possible breaches of confidentiality due to the possibility of unauthorized re-identification. At the same time, there is a need in medical science to be able to identify individual patients. In particular for rare disease research there is a special and well-documented need for research collaboration so that data and biosamples from multiple independent studies can be shared across borders. In this article, we identify the needs and arguments related to de-identification and re-identification of patients and research subjects and suggest how the different needs may be balanced within a framework of using unique encrypted identifiers.

  2. Identifying the substance abuse treatment needs of caregivers involved with child welfare.

    Science.gov (United States)

    Chuang, Emmeline; Wells, Rebecca; Bellettiere, John; Cross, Theodore P

    2013-07-01

    Parental substance use significantly increases risk of child maltreatment, but is often under-identified by child protective services. This study examined how agency use of standardized substance use assessments and child welfare investigative caseworker education, experience, and caseload affected caseworkers' identification of parental substance abuse treatment needs. Data are from a national probability sample of permanent, primary caregivers involved with child protective services whose children initially remained at home and whose confidential responses on two validated instruments indicated harmful substance use or dependence. Investigative caseworkers reported use of a formal assessment in over two thirds of cases in which substance use was accurately identified. However, weighted logistic regression indicated that agency provision of standardized assessment instruments was not associated with caseworker identification of caregiver needs. Caseworkers were also less likely to identify substance abuse when their caseloads were high and when caregivers were fathers. Implications for agency practice are discussed. Copyright © 2013 Elsevier Inc. All rights reserved.

  3. Identifying phenomenal consciousness.

    Science.gov (United States)

    Schier, Elizabeth

    2009-03-01

    This paper examines the possibility of finding evidence that phenomenal consciousness is independent of access. The suggestion reviewed is that we should look for isomorphisms between phenomenal and neural activation spaces. It is argued that the fact that phenomenal spaces are mapped via verbal report is no problem for this methodology. The fact that activation and phenomenal space are mapped via different means does not mean that they cannot be identified. The paper finishes by examining how data addressing this theoretical question could be obtained.

  4. Confidentiality Issues and Use of Sexually Transmitted Disease Services Among Sexually Experienced Persons Aged 15-25 Years - United States, 2013-2015.

    Science.gov (United States)

    Leichliter, Jami S; Copen, Casey; Dittus, Patricia J

    2017-03-10

    National-level data are limited regarding confidentiality-related issues and the use of sexually transmitted disease (STD) services for adolescents and young adults. Changes in the U.S. health care system have permitted dependent children to remain on a parent's health insurance plan until the child's 26th birthday and required coverage of certain preventive services, including some STD services, without cost sharing for most plans (1,2). Although these provisions likely facilitate access to the health care system, adolescents and young adults might not seek care or might delay seeking care for certain services because of concerns about confidentiality, including fears that their parents might find out (3,4). Therefore, it is important to examine STD services and confidentiality-related issues among persons aged 15-25 years in the United States. CDC analyzed data from the 2013-2015 National Survey of Family Growth and found that 12.7% of sexually experienced youths (adolescents aged 15-17 years and those young adults aged 18-25 years who were on a parent's insurance plan) would not seek sexual and reproductive health care because of concerns that their parents might find out. Particularly concerned were persons aged 15-17 years (22.6%). Females with confidentiality concerns regarding seeking sexual and reproductive health care reported a lower prevalence of receipt of chlamydia screening (17.1%) than did females who did not cite such concerns (38.7%). More adolescents aged 15-17 years who spent time alone with a health care provider (without a parent in the room) reported receipt of a sexual risk assessment (71.1%) and, among females, chlamydia testing (34.0%), than did those who did not spend time alone (36.6% and 14.9%, respectively). The results indicated that confidentiality-related issues were associated with less reported use of some STD services, especially for younger persons and females. Spending time alone with a provider (i.e., without a parent present

  5. 77 FR 10434 - Mandatory Reporting of Greenhouse Gases Rule: Confidentiality Determinations and Best Available...

    Science.gov (United States)

    2012-02-22

    ..., thereby undercutting the competitive advantage that the facility has built by achieving a higher level of... competitive advantage, by replicating it at less expense. Therefore, the EPA finds that releasing the report... position and to identify sources of competitive advantage (or disadvantage) in the industry. This could...

  6. Associations between mode of HIV testing and consent, confidentiality, and referral: a comparative analysis in four African countries.

    Directory of Open Access Journals (Sweden)

    Carla Makhlouf Obermeyer

    Full Text Available Recommendations about scaling up HIV testing and counseling highlight the need to provide key services and to protect clients' rights, but it is unclear to what extent different modes of testing differ in this respect. This paper examines whether practices regarding consent, confidentiality, and referral vary depending on whether testing is provided through voluntary counseling and testing (VCT or provider-initiated testing.The MATCH (Multi-Country African Testing and Counseling for HIV study was carried out in Burkina Faso, Kenya, Malawi, and Uganda. Surveys were conducted at selected facilities. We defined eight outcome measures related to pre- and post-test counseling, consent, confidentiality, satisfactory interactions with providers, and (for HIV-positive respondents referral for care. These were compared across three types of facilities: integrated facilities, where testing is provided along with medical care; stand-alone VCT facilities; and prevention of mother-to-child transmission (PMTCT facilities, where testing is part of PMTCT services. Tests of bivariate associations and modified Poisson regression were used to assess significance and estimate the unadjusted and adjusted associations between modes of testing and outcome measures. In total, 2,116 respondents tested in 2007 or later reported on their testing experience. High percentages of clients across countries and modes of testing reported receiving recommended services and being satisfied. In the unadjusted analyses, integrated testers were less likely to meet with a counselor before testing (83% compared with 95% of VCT testers; p<0.001, but those who had a pre-test meeting were more likely to have completed consent procedures (89% compared with 83% among VCT testers; p<0.001 and pre-test counseling (78% compared with 73% among VCT testers; p = 0.015. Both integrated and PMTCT testers were more likely to receive complete post-test counseling than were VCT testers (59% among

  7. Associations between mode of HIV testing and consent, confidentiality, and referral: a comparative analysis in four African countries.

    Science.gov (United States)

    Obermeyer, Carla Makhlouf; Neuman, Melissa; Desclaux, Alice; Wanyenze, Rhoda; Ky-Zerbo, Odette; Cherutich, Peter; Namakhoma, Ireen; Hardon, Anita

    2012-01-01

    Recommendations about scaling up HIV testing and counseling highlight the need to provide key services and to protect clients' rights, but it is unclear to what extent different modes of testing differ in this respect. This paper examines whether practices regarding consent, confidentiality, and referral vary depending on whether testing is provided through voluntary counseling and testing (VCT) or provider-initiated testing. The MATCH (Multi-Country African Testing and Counseling for HIV) study was carried out in Burkina Faso, Kenya, Malawi, and Uganda. Surveys were conducted at selected facilities. We defined eight outcome measures related to pre- and post-test counseling, consent, confidentiality, satisfactory interactions with providers, and (for HIV-positive respondents) referral for care. These were compared across three types of facilities: integrated facilities, where testing is provided along with medical care; stand-alone VCT facilities; and prevention of mother-to-child transmission (PMTCT) facilities, where testing is part of PMTCT services. Tests of bivariate associations and modified Poisson regression were used to assess significance and estimate the unadjusted and adjusted associations between modes of testing and outcome measures. In total, 2,116 respondents tested in 2007 or later reported on their testing experience. High percentages of clients across countries and modes of testing reported receiving recommended services and being satisfied. In the unadjusted analyses, integrated testers were less likely to meet with a counselor before testing (83% compared with 95% of VCT testers; p<0.001), but those who had a pre-test meeting were more likely to have completed consent procedures (89% compared with 83% among VCT testers; p<0.001) and pre-test counseling (78% compared with 73% among VCT testers; p = 0.015). Both integrated and PMTCT testers were more likely to receive complete post-test counseling than were VCT testers (59% among both PMTCT

  8. List identifies threatened ecosystems

    Science.gov (United States)

    Showstack, Randy

    2012-09-01

    The International Union for Conservation of Nature (IUCN) announced on 9 September that it will develop a new Red List of Ecosystems that will identify which ecosystems are vulnerable or endangered. The list, which is modeled on the group's Red List of Threatened Species™, could help to guide conservation activities and influence policy processes such as the Convention on Biological Diversity, according to the group. “We will assess the status of marine, terrestrial, freshwater, and subterranean ecosystems at local, regional, and global levels,” stated Jon Paul Rodriguez, leader of IUCN's Ecosystems Red List Thematic Group. “The assessment can then form the basis for concerted implementation action so that we can manage them sustainably if their risk of collapse is low or restore them if they are threatened and then monitor their recovery.”

  9. Global Microbial Identifier

    DEFF Research Database (Denmark)

    Wielinga, Peter; Hendriksen, Rene S.; Aarestrup, Frank Møller

    2017-01-01

    ) will likely also enable a much better understanding of the pathogenesis of the infection and the molecular basis of the host response to infection. But the full potential of these advances will only transpire if the data in this area become transferable and thereby comparable, preferably in open-source...... of microorganisms, for the identification of relevant genes and for the comparison of genomes to detect outbreaks and emerging pathogens. To harness the full potential of WGS, a shared global database of genomes linked to relevant metadata and the necessary software tools needs to be generated, hence the global...... microbial identifier (GMI) initiative. This tool will ideally be used in amongst others in the diagnosis of infectious diseases in humans and animals, in the identification of microorganisms in food and environment, and to track and trace microbial agents in all arenas globally. This will require...

  10. Challenging Medical-Legal Norms: The Role of Autonomy, Confidentiality and Privacy in Protecting Individual and Familial Group Rights in Genetic Information

    OpenAIRE

    Laurie, Graeme

    2001-01-01

    In this article, Laurie discusses the impact of generating genetic information, and what the consequences are of this for individuals, and family members, whose familial genetic information is shared. The authors considers who controls access to such information, the rights and interests that arise from a group claim to familial data. The competing "right to know" versus "the right not to know" are examined in relation to genetic data, along with the role of confidentiality and autonomy. Fi...

  11. Radiograph identifying means

    International Nuclear Information System (INIS)

    Sheldon, A.D.

    1983-01-01

    A flexible character-indentable plastics embossing tape is backed by and bonded to a lead strip, not more than 0.025 inches thick, to form a tape suitable for identifying radiographs. The lead strip is itself backed by a relatively thin and flimsy plastics or fabric strip which, when removed, allows the lead plastic tape to be pressure-bonded to the surface to be radiographed. A conventional tape-embossing gun is used to indent the desired characters in succession into the lead-backed tape, without necessarily severing the lead; and then the backing strip is peeled away to expose the layer of adhesive which pressure-bonds the indented tape to the object to be radiographed. X-rays incident on the embossed tape will cause the raised characters to show up dark on the subsequently-developed film, whilst the raised side areas will show up white. Each character will thus stand out on the developed film. (author)

  12. [Ethical reflection on multidisciplinarity and confidentiality of information in medical imaging through new information and communication technologies].

    Science.gov (United States)

    Béranger, J; Le Coz, P

    2012-05-01

    Technological advances in medical imaging has resulted in the exponential increase of the number of images per examination, caused the irreversible decline of the silver film and imposed digital imaging. This digitization is a concept whose levels of development are multiple, reflecting the complexity of this process of technological change. Under these conditions, the use of medical information via new information and communication technologies is at the crossroads of several scientific approaches and several disciplines (medicine, ethics, law, economics, psychology, etc.) surrounding the information systems in health, doctor-patient relationship and concepts that are associated. Each day, these new information and communication technologies open up new horizons and the space of possibilities, spectacularly developing access to information and knowledge. In this perspective of digital technology emergence impacting the multidisciplinary use of health information systems, the ethical questions are numerous, especially on the preservation of privacy, confidentiality and security of medical data, and their accessibility and integrity. Copyright © 2012 Société française de radiothérapie oncologique (SFRO). Published by Elsevier SAS. All rights reserved.

  13. Changes in public attitudes towards confidential adolescent sexual and reproductive health services in Lithuania after the introduction of new legislation: findings from the cross-sectional surveys conducted in 2005 and 2012.

    Science.gov (United States)

    Jaruseviciene, Lina; Zaborskis, Apolinaras; Sauliune, Skirmante; Jarusevicius, Gediminas; Lazarus, Jeffrey V

    2015-09-04

    In Lithuania, the right to confidentiality in healthcare for adolescents over the age of 16 was guaranteed in 2010 through the adoption of new legislation. This study sets out to explore changes in Lithuanian residents' attitudes towards confidentiality protection in adolescent sexual and reproductive healthcare (SRH) by comparing data from surveys administered in 2005 and 2012. For both surveys, the participants were random samples of the Lithuanian residents aged 16 to 74. A 23-item questionnaire was used in 2005 and complemented with 2 items in 2012. Linear regression analysis was employed to estimate absolute differences in prevalence of belief in whether or not adolescents would find confidentiality important when consulting a physician on SRH issues. A log-binomial regression model was fitted to estimate the relative changes (prevalence ratio) of the independent variables. The total number of respondents was 1054 (response rate 83%) in 2005 and 1002 (response rate 80%) in 2012. The proportion of respondents who reported a belief that adolescents would find confidentiality important when seeing a physician for SRH issues increased significantly from 62% in 2005 to 73% in 2012. Regardless of their belief in the importance of confidentiality, in 2012 respondents more often indicated positive outcomes on the relations between the physician and the minor patient, such as increased trust of the adolescent in the physician and more frequent visits to physicians. However, study participants who believed that adolescents would find confidentiality important in 2012 were less optimistic about potential positive outcomes of further legal consolidation of adolescents' right to confidentiality than in 2005. Younger respondents were the most optimistic about potential outcomes if laws were enacted to further protect adolescent confidentiality. This study uncovers the dynamics of public attitudes towards the socially and ethically sensitive issue of adolescent SRH. Our

  14. Substandard emergency obstetric care - a confidential enquiry into maternal deaths at a regional hospital in Tanzania

    DEFF Research Database (Denmark)

    Sorensen, Bjarke Lund; Elsass, Peter; Nielsen, Brigitte Bruun

    2010-01-01

    for major substandard care. Hospital based maternal deaths between 2006 and 2008 (35 months) were included. Of 68 registered maternal deaths sufficient information for reviewing was retrieved for 62 cases (91%). As a supplement, in-depth interviews with staff about the underlying causes of substandard care...... in 46 (74%) of the 62 cases reviewed. During the same time period MDA identified substandard care in 18 cases. Staff perceived poor organization of work and lack of training as important causes for substandard care. Local MDA was considered useful although time-consuming and sometimes threatening......, and staff dedication to the process was questioned. CONCLUSION: Quality assurance of emergency obstetric care might be strengthened by supplementing internal MDA with external CE....

  15. Woodrow Wilson's hidden stroke of 1919: the impact of patient-physician confidentiality on United States foreign policy.

    Science.gov (United States)

    Menger, Richard P; Storey, Christopher M; Guthikonda, Bharat; Missios, Symeon; Nanda, Anil; Cooper, John M

    2015-07-01

    World War I catapulted the United States from traditional isolationism to international involvement in a major European conflict. Woodrow Wilson envisaged a permanent American imprint on democracy in world affairs through participation in the League of Nations. Amid these defining events, Wilson suffered a major ischemic stroke on October 2, 1919, which left him incapacitated. What was probably his fourth and most devastating stroke was diagnosed and treated by his friend and personal physician, Admiral Cary Grayson. Grayson, who had tremendous personal and professional loyalty to Wilson, kept the severity of the stroke hidden from Congress, the American people, and even the president himself. During a cabinet briefing, Grayson formally refused to sign a document of disability and was reluctant to address the subject of presidential succession. Wilson was essentially incapacitated and hemiplegic, yet he remained an active president and all messages were relayed directly through his wife, Edith. Patient-physician confidentiality superseded national security amid the backdrop of friendship and political power on the eve of a pivotal juncture in the history of American foreign policy. It was in part because of the absence of Woodrow Wilson's vocal and unwavering support that the United States did not join the League of Nations and distanced itself from the international stage. The League of Nations would later prove powerless without American support and was unable to thwart the rise and advance of Adolf Hitler. Only after World War II did the United States assume its global leadership role and realize Wilson's visionary, yet contentious, groundwork for a Pax Americana. The authors describe Woodrow Wilson's stroke, the historical implications of his health decline, and its impact on United States foreign policy.

  16. Nuclear exports. Parliamentary control and confidentiality; Parlamentarische Kontrolle und Geheimhaltungsbeduerftigkeit bei Nuklearexporten. Zum Urteil des Bundesverfassungsgerichts vom 21. Oktober 2014

    Energy Technology Data Exchange (ETDEWEB)

    Feldmann, Ulrike

    2015-03-15

    With its decision taken on 21. October 2014 (Az.: 2 BvE 5/11) the Federal Constitutional Court (BVerfG) decided during court proceedings between administrative bodies on the scope and limits of the parliamentary right of information. Even though the proceeding did not deal with nuclear exports but arm exports, foreign trade law, however, does not only designate an export licence obligation for military weapons but also for so called dual-use goods meaning goods, which can be used both for friendly as well as for military purposes. The export of these goods requires according to the so-called Dual-Use Regulation (EG) 428/2009 a licence. Annex I category 0 of the regulation (EG) 428/2009 lists a variety of nuclear materials, plants and equipment items for which this licence applies. In the same manner as arm exports, also exports of nuclear dual-use goods are being discussed in a special cabinet committee, the Federal Security Council (BSR), which shall coordinate cross-departmentally the German security and defence policy under consideration of economic interests and which categorises its results, according to the rules of procedure, as confidential. Also legally not regulated but common ''preliminary enquiries'' at the responsible Federal Ministry or rather Federal Office of Economics and Export Control by companies which plan an export and want to affirm the general approval for their export business prior to conclusion of contract take not only place for arm exports but also for nuclear dual-use goods. The decision by the Federal Constitutional Court can be applied to consultations about the authorisation of nuclear dual-use goods.

  17. HIV prevalence, attitudes and behaviour in clients of a confidential HIV testing and counselling centre in Uganda.

    Science.gov (United States)

    Müller, O; Barugahare, L; Schwartländer, B; Byaruhanga, E; Kataaha, P; Kyeyune, D; Heckmann, W; Ankrah, M

    1992-08-01

    To describe clients, operation and impact of an African public HIV testing and counselling centre. Analysis of samples from clients attending the AIDS Information Centre (AIC) in Kampala, Uganda in early 1991. HIV-1-positive and HIV-negative consecutive clients (250 of each), 86 consecutive couples, and 200 consecutive clients who were HIV-negative in 1990 and were attending for their repeat test. HIV seroprevalence rates, attitudes, behaviour and behaviour change. HIV-1 prevalence was 28% overall, 24% in men and 35% in women. Reasons for taking the HIV test were a planned marriage or a new relationship (27%; 84% in couples), to plan for the future (35%), distrust of sexual partner (14%) and illness or disease/death (not HIV-specific) of partner (20%). The majority of the reported intentions in response to a positive or a negative HIV test result were positive, demonstrating the ability to cope with this information. Of repeat clients, two (1%) had become HIV-1-positive. The majority of repeat clients reported one sexual partner only (67%) or sexual abstinence (25%). Compared with pre-test information from AIC clients attending for the first time, repeat clients reported casual sexual contacts less often (6 versus 25%) and, of those, the majority used condoms. Our study demonstrates the demand for and the feasibility of confidential HIV testing and counseling services in Uganda, and illustrates the value of these services in achieving behaviour changes. Such services should be considered an additional approach for the reduction of HIV transmission in Africa, especially in areas with high HIV seroprevalence rates.

  18. Attitudes towards informed consent, confidentiality, and substitute treatment decisions in southern African medical students: a case study from Zimbabwe.

    Science.gov (United States)

    Hipshman, L

    1999-08-01

    This study explored the attitudes of biomedical science students (medical students) in a non-Western setting towards three medical ethics concepts that are based on fundamental Western culture ethical principles. A dichotomous (agree/disagree) response questionnaire was constructed using Western ethnocentric culture (WEC) based perspectives of informed consent, confidentiality, and substitute decision-making. Hypothesized WEC-Biased responses were assigned to the questionnaire's questions or propositions. A number of useful responses (169) were obtained from a large, cross-sectional, convenience sample of the MBChB students at the University of Zimbabwe Medical School. Statistical analysis described the differences in response patterns between the student's responses compared to the hypothesized WEC-Biased response. The effect of the nine independent variables on selected dependent variables (responses to certain questionnaire questions) was analyzed by stepwise logistic regression. Students concurred with the hypothesized WEC-Biased responses for two-thirds of the questionnaire items. This agreement included support for the role of legal advocacy in the substitute decision-making process. The students disagreed with the hypothesized WEC-Biased responses in several important medical ethics aspects. Most notably, the students indicated that persons with mental dysfunctions, as a class, were properly considered incompetent to make treatment decisions. None of the studied independent variables was often associated with students' responses, but training year was more frequently implicated than either ethnicity or gender. In order to develop internationally and culturally relevant medical ethics standards, non-Western perspectives ought to be acknowledged and incorporated. Two main areas for further efforts include: curriculum development in ethics reasoning and related clinical (medico-legal) decision-making processes that would be relevant to medical students from

  19. Incorporating the Last Four Digits of Social Security Numbers Substantially Improves Linking Patient Data from De-identified Hospital Claims Databases.

    Science.gov (United States)

    Naessens, James M; Visscher, Sue L; Peterson, Stephanie M; Swanson, Kristi M; Johnson, Matthew G; Rahman, Parvez A; Schindler, Joe; Sonneborn, Mark; Fry, Donald E; Pine, Michael

    2015-08-01

    Assess algorithms for linking patients across de-identified databases without compromising confidentiality. Hospital discharges from 11 Mayo Clinic hospitals during January 2008-September 2012 (assessment and validation data). Minnesota death certificates and hospital discharges from 2009 to 2012 for entire state (application data). Cross-sectional assessment of sensitivity and positive predictive value (PPV) for four linking algorithms tested by identifying readmissions and posthospital mortality on the assessment data with application to statewide data. De-identified claims included patient gender, birthdate, and zip code. Assessment records were matched with institutional sources containing unique identifiers and the last four digits of Social Security number (SSNL4). Gender, birthdate, and five-digit zip code identified readmissions with a sensitivity of 98.0 percent and a PPV of 97.7 percent and identified postdischarge mortality with 84.4 percent sensitivity and 98.9 percent PPV. Inclusion of SSNL4 produced nearly perfect identification of readmissions and deaths. When applied statewide, regions bordering states with unavailable hospital discharge data had lower rates. Addition of SSNL4 to administrative data, accompanied by appropriate data use and data release policies, can enable trusted repositories to link data with nearly perfect accuracy without compromising patient confidentiality. States maintaining centralized de-identified databases should add SSNL4 to data specifications. © Health Research and Educational Trust.

  20. SPARQL-enabled identifier conversion with Identifiers.org

    Science.gov (United States)

    Wimalaratne, Sarala M.; Bolleman, Jerven; Juty, Nick; Katayama, Toshiaki; Dumontier, Michel; Redaschi, Nicole; Le Novère, Nicolas; Hermjakob, Henning; Laibe, Camille

    2015-01-01

    Motivation: On the semantic web, in life sciences in particular, data is often distributed via multiple resources. Each of these sources is likely to use their own International Resource Identifier for conceptually the same resource or database record. The lack of correspondence between identifiers introduces a barrier when executing federated SPARQL queries across life science data. Results: We introduce a novel SPARQL-based service to enable on-the-fly integration of life science data. This service uses the identifier patterns defined in the Identifiers.org Registry to generate a plurality of identifier variants, which can then be used to match source identifiers with target identifiers. We demonstrate the utility of this identifier integration approach by answering queries across major producers of life science Linked Data. Availability and implementation: The SPARQL-based identifier conversion service is available without restriction at http://identifiers.org/services/sparql. Contact: sarala@ebi.ac.uk PMID:25638809