WorldWideScience

Sample records for confidentiality concerns raised

  1. Medical Students Raising Concerns.

    Science.gov (United States)

    Druce, Maralyn R; Hickey, Andrea; Warrens, Anthony N; Westwood, Olwyn M R

    2016-09-16

    After a number of high-profile incidents and national reports, it has become clear that all health professionals and all medical students must be able to raise concerns about a colleague's behavior if this behavior puts patients, colleagues, or themselves at risk.Detailed evidence from medical students about their confidence to raise concerns is limited, together with examples of barriers, which impair their ability to do so. We describe a questionnaire survey of medical students in a single-center, examining self-reported confidence about raising concerns in a number of possible scenarios. Thematic analysis was applied to comments about barriers identified.Although 80% of respondents felt confident to report a patient safety issue, students were less confident around issues of probity, attitude, and conduct. This needs to be addressed to create clear mechanisms to raise concerns, as well as support for students during the process.

  2. Confidentiality Concerns and Sexual and Reproductive Health Care Among Adolescents and Young Adults Aged 15-25.

    Science.gov (United States)

    Copen, Casey E; Dittus, Patricia J; Leichliter, Jami S

    2016-12-01

    Data from the National Survey of Family Growth •About 7% of persons aged 15-25 would not seek sexual or reproductive health care because of concerns that their parents might find out about it. •For females aged 15-17 and 18-25, those who had confidentiality concerns were less likely to receive sexual and reproductive health services in the past year compared with those without these concerns. •Less than one-half of teenagers aged 15-17 (38.1%) spent some time alone in the past year during a visit with a doctor or other health care provider without a parent, relative, or guardian in the room. •Teenagers aged 15-17 who spent some time alone during a visit with a health care provider were more likely to have received sexual or reproductive health services in the past year compared with those who had not. Confidentiality concerns can impact adolescent and young adults' access to sexual and reproductive health services (1-4). Young people who are covered by their parents' private health insurance may be deterred from obtaining these services due to concerns that their parents might find out about it (2). Similarly, confidentiality concerns may arise because youth seeking such services may not have time alone during a visit with a health care provider (4). This report describes two measures related to confidentiality concerns and sexual and reproductive health care. All material appearing in this report is in the public domain and may be reproduced or copied without permission; citation as to source, however, is appreciated.

  3. Genetic privacy and confidentiality: why they are so hard to protect.

    Science.gov (United States)

    Rothstein, M A

    1998-01-01

    Author notes that widespread concerns have been raised about protecting genetic privacy and confidentiality in insurance and employment. He argues that effective protections are difficult because complicated issues, such as the right of access to health care, are invariably implicated.

  4. FORENSIC DNA BANKING LEGISLATION IN DEVELOPING COUNTRIES: PRIVACY AND CONFIDENTIALITY CONCERNS REGARDING A DRAFT FROM TURKISH LEGISLATION.

    Science.gov (United States)

    Ilgili, Önder; Arda, Berna

    This paper presents and analyses, in terms of privacy and confidentiality, the Turkish Draft Law on National DNA Database prepared in 2004, and concerning the use of DNA analysis for forensic objectives and identity verification in Turkey. After a short introduction including related concepts, we evaluate the draft law and provide articles about confidentiality. The evaluation reminded us of some important topics at international level for the developing countries. As a result, the need for sophisticated legislations about DNA databases, for solutions to issues related to the education of employees, and the technological dependency to other countries emerged as main challenges in terms of confidentiality for the developing countries. As seen in the Turkish Draft Law on National DNA Database, the protection of the fundamental rights and freedoms requires more care during the legislative efforts.

  5. A rural/urban comparison of privacy and confidentiality concerns associated with providing sensitive location information in epidemiologic research involving persons who use drugs.

    Science.gov (United States)

    Rudolph, Abby E; Young, April M; Havens, Jennifer R

    2017-11-01

    Analyses that link contextual factors with individual-level data can improve our understanding of the "risk environment"; however, the accuracy of information provided by participants about locations where illegal/stigmatized behaviors occur may be influenced by privacy/confidentiality concerns that may vary by setting and/or data collection approach. We recruited thirty-five persons who use drugs from a rural Appalachian town and a Mid-Atlantic city to participate in in-depth interviews. Through thematic analyses, we identified and compared privacy/confidentiality concerns associated with two survey methods that (1) collect self-reported addresses/cross-streets and (2) use an interactive web-based map to find/confirm locations in rural and urban settings. Concerns differed more by setting than between methods. For example, (1) rural participants valued interviewer rapport and protections provided by the Certificate of Confidentiality more; (2) locations considered to be sensitive differed in rural (i.e., others' homes) and urban (i.e., where drugs were used) settings; and (3) urban participants were more likely to view providing cross-streets as an acceptable alternative to providing exact addresses for sensitive locations and to prefer the web-based map approach. Rural-urban differences in privacy/confidentiality concerns reflect contextual differences (i.e., where drugs are used/purchased, population density, and prior drug-related arrests). Strategies to alleviate concerns include: (1) obtain a Certificate of Confidentiality, (2) collect geographic data at the scale necessary for proposed analyses, and (3) permit participants to provide intersections/landmarks in close proximity to actual locations rather than exact addresses or to skip questions where providing an intersection/landmark would not obfuscate the actual address. Copyright © 2017 Elsevier Ltd. All rights reserved.

  6. A study on a systematic method for evaluating values of raised concerns

    International Nuclear Information System (INIS)

    Sawada, T.; Morimoto, T.; Iida, N.; Nishimura, T.; Soda, Y.; Itoh, K.; Tanaka, H.

    2006-01-01

    The objective of this study is to develop a methodology that can externalise potential concerns and evaluate the values of the concerns raised in corporations. By implementing this methodology into corporate governance, it is expected to improve the work environment and enhance the capability for the corporate governance through supporting the internal autonomic purification. This study comprises of: case studies of past wrongdoings in corporations such as JCO and Tokyo Electric Power Company (TEPCO); identifying the viewpoints for evaluating values of raised concerns; developing a model to evaluate the values. (author)

  7. Public expectations concerning confidentiality protection of adolescents' sexual and reproductive health care in Lithuania

    DEFF Research Database (Denmark)

    Jaruseviciene, Lina; Zaborskis, Apolinaras; Lazarus, Jeffrey Victor

    2014-01-01

    OBJECTIVE: An adolescent's right to confidential healthcare is protected by international law and professional consensus. However, parental and social support for confidential sexual and reproductive health (SRH) services, in particular, varies greatly. This study documents Lithuanian residents......' expectations with regard to confidentiality protection for adolescents in this domain, and explores the factors related to the diversity of these expectations. METHODS: Two national surveys of Lithuanian residents completed in 2005 and 2012 using anonymous questionnaires. Participants rated their expectations...... for confidentiality using a five-point Likert scale for eight types of SRH consultations. RESULTS: Public anticipation for confidentiality depended on whether issues related to sexual behaviour or to its consequences were addressed during adolescent consultation. Only younger respondents had higher expectations...

  8. Confidentiality: From the Stacks to the Witness Stand.

    Science.gov (United States)

    Lee, Janis M.; Smith, G. Guy

    1988-01-01

    A library director describes her experience of safeguarding the confidentiality of the circulation records of a woman who went on a shooting rampage at a shopping mall. The lawyer who represented the library discusses the legal responsibility of public and school libraries concerning confidentiality. (CLB)

  9. With Due Consideration: Australian Human Service Practitioners' Understandings of Confidentiality and Disclosure Obligations in Regard to Cases Concerning Gambling-Related Theft

    Science.gov (United States)

    Patford, Janet; Tranent, Peter

    2013-01-01

    Preserving confidentiality is problematic for human service practitioners if they know that a client is seriously harming a third party or could do so in the future. The present study concerned financial harm, as generated by gambling-related theft. Clients who disclose gambling-related theft potentially create a dilemma for practitioners, who may…

  10. Study Raises Concerns about Mobile Phones%对手机多些关注

    Institute of Scientific and Technical Information of China (English)

    陈平

    2003-01-01

    @@ Italian scientists have raised new health concerns about the safety of using mobile phones, with research showing radio waves from the handsets( 手机) makes cancerous cells grow more aggressively.

  11. Law and ethics in conflict over confidentiality?

    Science.gov (United States)

    Dickens, B M; Cook, R J

    2000-09-01

    Ethical principles that require the preservation of patients' confidential information are reinforced by principles found in several areas of law, such as law on contracts, negligence, defamation and fiduciary duty. However, laws sometimes compel disclosures of medical confidences, and more often may justify or excuse disclosures. Legally contentious issues concern patients' confidences regarding possible unlawful conduct, such as pregnancy termination, and the risk of spread of HIV and other infections. This article reviews the various legal bases of the duty of confidentiality, and legal challenges to the ethical obligation of non-disclosure. It addresses the justifications and limits of exchange of patients' health information among healthcare professionals and trainees, and considers legally recognized limits of confidential duties, and the scope of legitimate disclosure. An underlying theme is how to determine whether physicians are ethically justified in employing the discretion the law sometimes affords them to breach patients' expectations of confidentiality.

  12. Electronic Health Records: VAs Efforts Raise Concerns about Interoperability Goals and Measures, Duplication with DOD, and Future Plans

    Science.gov (United States)

    2016-07-13

    ELECTRONIC HEALTH RECORDS VA’s Efforts Raise Concerns about Interoperability Goals and Measures, Duplication with DOD...Agencies, Committee on Appropriations, U.S. Senate July 13, 2016 ELECTRONIC HEALTH RECORDS VA’s Efforts Raise Concerns about Interoperability Goals...initiatives with the Department of Defense (DOD) that were intended to advance the ability of the two departments to share electronic health records ,

  13. Research Participants' Understanding of and Reactions to Certificates of Confidentiality.

    Science.gov (United States)

    Beskow, Laura M; Check, Devon K; Ammarell, Natalie

    2014-01-01

    Certificates of Confidentiality are intended to facilitate participation in critical public health research by protecting against forced disclosure of identifying data in legal proceedings, but little is known about the effect of Certificate descriptions in consent forms. To gain preliminary insights, we conducted qualitative interviews with 50 HIV-positive individuals in Durham, North Carolina to explore their subjective understanding of Certificate descriptions and whether their reactions differed based on receiving a standard versus simplified description. Most interviewees were neither reassured nor alarmed by Certificate information, and most said it would not influence their willingness to participate or provide truthful information. However, compared with those receiving the simplified description, more who read the standard description said it raised new concerns, that their likelihood of participating would be lower, and that they might be less forthcoming. Most interviewees said they found the Certificate description clear, but standard-group participants often found particular words and phrases confusing, while simplified-group participants more often questioned the information's substance. Valid informed consent requires comprehension and voluntariness. Our findings highlight the importance of developing consent descriptions of Certificates and other confidentiality protections that are simple and accurate. These qualitative results provide rich detail to inform a larger, quantitative study that would permit further rigorous comparisons.

  14. Ombuds’ corner: Confidentiality

    CERN Multimedia

    Vincent Vuillemin

    2011-01-01

    In this series, the Bulletin aims to explain the role of the Ombuds at CERN by presenting practical examples of misunderstandings that could have been resolved by the Ombuds if he had been contacted earlier. Please note that, in all the situations we present, the names are fictitious and used only to improve clarity.    Jane* came to the Ombuds to share her concerns about the actions of Mike*, one of her senior colleague supervisors, and insisted on the absolute confidentiality. The Ombuds promised to keep the information confidential following the terms of his mandate. During the discussion it appeared that the whole group was affected by the situation, spending a lot of time discussing how to resolve the problem instead of focusing on their main responsibilities. The risks for the Organization seemed very high and could possibly endanger the safety of the operations.  On one side, the Ombuds believed that it was essential to bring this matter to the attention of senior managem...

  15. A Policy-Based Framework for Preserving Confidentiality in BYOD Environments: A Review of Information Security Perspectives

    Directory of Open Access Journals (Sweden)

    Chalee Vorakulpipat

    2017-01-01

    Full Text Available Today, many organizations allow their employees to bring their own smartphones or tablets to work and to access the corporate network, which is known as a bring your own device (BYOD. However, many such companies overlook potential security risks concerning privacy and confidentiality. This paper provides a review of existing literature concerning the preservation of privacy and confidentiality, with a focus on recent trends in the use of BYOD. This review spans a large spectrum of information security research, ranging from management (risk and policy to technical aspects of privacy and confidentiality in BYOD. Furthermore, this study proposes a policy-based framework for preserving data confidentiality in BYOD. This framework considers a number of aspects of information security and corresponding techniques, such as policy, location privacy, centralized control, cryptography, and operating system level security, which have been omitted in previous studies. The main contribution is to investigate recent trends concerning the preservation of confidentiality in BYOD from the perspective of information security and to analyze the critical and comprehensive factors needed to strengthen data privacy in BYOD. Finally, this paper provides a foundation for developing the concept of preserving confidentiality in BYOD and describes the key technical and organizational challenges faced by BYOD-friendly organizations.

  16. Building Trust and Confidentiality in Cloud computing Distributed ...

    African Journals Online (AJOL)

    new technology, this new way of doing business brings with it new challenges, ... In this paper, we looked at data security, described the current state of data ... has the potential to solve many threats concerning confidentiality and adoption of

  17. 'Is this knowledge mine and nobody else's? I don't feel that.' Patient views about consent, confidentiality and information-sharing in genetic medicine.

    Science.gov (United States)

    Dheensa, Sandi; Fenwick, Angela; Lucassen, Anneke

    2016-03-01

    In genetic medicine, a patient's diagnosis can mean their family members are also at risk, raising a question about how consent and confidentiality should function in clinical genetics. This question is particularly pressing when it is unclear whether a patient has shared information. Conventionally, healthcare professionals view confidentiality at an individual level and 'disclosure without consent' as the exception, not the rule. The relational joint account model, by contrast, conceptualises genetic information as confidential at the familial level and encourages professionals to take disclosure as the default position. In this study, we interviewed 33 patients about consent and confidentiality and analysed data thematically. Our first theme showed that although participants thought of certain aspects of genetic conditions--for example, the way they affect day-to-day health--as somewhat personal, they perceived genetic information--for example, the mutation in isolation--as familial. Most thought these elements were separable and thought family members had a right to know the latter, identifying a broad range of harms that would justify disclosure. Our second theme illustrated that participants nonetheless had some concerns about what, if any, implications there would be of professionals treating such information as familial and they emphasised the importance of being informed about the way their information would be shared. Based on these results, we recommend that professionals take disclosure as the default position, but make clear that they will treat genetic information as familial during initial consultations and address any concerns therein. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://www.bmj.com/company/products-services/rights-and-licensing/

  18. Privacy Perspectives for Online Searchers: Confidentiality with Confidence?

    Science.gov (United States)

    Duberman, Josh; Beaudet, Michael

    2000-01-01

    Presents issues and questions involved in online privacy from the information professional's perspective. Topics include consumer concerns; query confidentiality; securing computers from intrusion; electronic mail; search engines; patents and intellectual property searches; government's role; Internet service providers; database mining; user…

  19. Public expectations concerning confidentiality protection of adolescents' sexual and reproductive health care in Lithuania: findings of the surveys conducted in 2005 and 2012.

    Science.gov (United States)

    Jaruseviciene, Lina; Zaborskis, Apolinaras; Lazarus, Jeffrey Victor

    2014-04-01

    An adolescent's right to confidential healthcare is protected by international law and professional consensus. However, parental and social support for confidential sexual and reproductive health (SRH) services, in particular, varies greatly. This study documents Lithuanian residents' expectations with regard to confidentiality protection for adolescents in this domain, and explores the factors related to the diversity of these expectations. Two national surveys of Lithuanian residents completed in 2005 and 2012 using anonymous questionnaires. Participants rated their expectations for confidentiality using a five-point Likert scale for eight types of SRH consultations. Public anticipation for confidentiality depended on whether issues related to sexual behaviour or to its consequences were addressed during adolescent consultation. Only younger respondents had higher expectations for confidentiality in both contexts. Public expectations regarding confidentiality were less demanding in 2012 than in 2005. The expectation of confidentiality protection was greater for topics related to sexual behaviour than for the consequences of sexual behaviour, such as pregnancy, abortion or a sexually transmitted infection. This implies a need for targeted information strategies for the general population and explicit guidance for physicians on when and for whom care should remain confidential.

  20. Safeguarding Confidentiality in Electronic Health Records.

    Science.gov (United States)

    Shenoy, Akhil; Appel, Jacob M

    2017-04-01

    Electronic health records (EHRs) offer significant advantages over paper charts, such as ease of portability, facilitated communication, and a decreased risk of medical errors; however, important ethical concerns related to patient confidentiality remain. Although legal protections have been implemented, in practice, EHRs may be still prone to breaches that threaten patient privacy. Potential safeguards are essential, and have been implemented especially in sensitive areas such as mental illness, substance abuse, and sexual health. Features of one institutional model are described that may illustrate the efforts to both ensure adequate transparency and ensure patient confidentiality. Trust and the therapeutic alliance are critical to the provider-patient relationship and quality healthcare services. All of the benefits of an EHR are only possible if patients retain confidence in the security and accuracy of their medical records.

  1. Improving Individual Acceptance of Health Clouds through Confidentiality Assurance.

    Science.gov (United States)

    Ermakova, Tatiana; Fabian, Benjamin; Zarnekow, Rüdiger

    2016-10-26

    Cloud computing promises to essentially improve healthcare delivery performance. However, shifting sensitive medical records to third-party cloud providers could create an adoption hurdle because of security and privacy concerns. This study examines the effect of confidentiality assurance in a cloud-computing environment on individuals' willingness to accept the infrastructure for inter-organizational sharing of medical data. We empirically investigate our research question by a survey with over 260 full responses. For the setting with a high confidentiality assurance, we base on a recent multi-cloud architecture which provides very high confidentiality assurance through a secret-sharing mechanism: Health information is cryptographically encoded and distributed in a way that no single and no small group of cloud providers is able to decode it. Our results indicate the importance of confidentiality assurance in individuals' acceptance of health clouds for sensitive medical data. Specifically, this finding holds for a variety of practically relevant circumstances, i.e., in the absence and despite the presence of conventional offline alternatives and along with pseudonymization. On the other hand, we do not find support for the effect of confidentiality assurance in individuals' acceptance of health clouds for non-sensitive medical data. These results could support the process of privacy engineering for health-cloud solutions.

  2. Confidentiality and personal integrity.

    Science.gov (United States)

    Edgar, A

    1994-06-01

    This paper uses the social theory of Erving Goffman in order to argue that confidentiality should be understood in relation to the mundane social skills by which individuals present and respect specific self-images of themselves and others during social interaction. The breaching of confidentiality is analysed in terms of one person's capacity to embarrass another, and so to expose that person as incompetent. Respecting confidentiality may at once serve to protect the vulnerable from an unjust society, and yet also protect the guilty from just accusation. Ethical reasoning about confidentiality must therefore recognize the dangers of prejudice and violence inherent in decisions to breach or to respect confidentiality. Case studies are used to illustrate the efficacy of this account, culminating with analyses of three examples from the UKCC document Confidentiality.

  3. Physician Knowledge and Attitudes around Confidential Care for Minor Patients.

    Science.gov (United States)

    Riley, Margaret; Ahmed, Sana; Reed, Barbara D; Quint, Elisabeth H

    2015-08-01

    Minor adolescent patients have a legal right to access certain medical services confidentially without parental consent or notification. We sought to assess physicians' knowledge of these laws, attitudes around the provision of confidential care to minors, and barriers to providing confidential care. An anonymous online survey was sent to physicians in the Departments of Family Medicine, Internal Medicine-Pediatrics, Obstetrics/Gynecology, and Pediatrics at the University of Michigan. Response rate was 40% (259/650). The majority of physicians felt comfortable addressing sexual health, mental health, and substance use with adolescent patients. On average, physicians answered just over half of the legal knowledge questions correctly (mean 56.6% ± 16.7%). The majority of physicians approved of laws allowing minors to consent for confidential care (90.8% ± 1.7% approval), while substantially fewer (45.1% ± 4.5%) approved of laws allowing parental notification of this care at the physician's discretion. Most physicians agreed that assured access to confidential care should be a right for adolescents. After taking the survey most physicians (76.6%) felt they needed additional training on confidentiality laws. The provision of confidential care to minors was perceived to be most inhibited by insurance issues, parental concerns/relationships with the family, and issues with the electronic medical record. Physicians are comfortable discussing sensitive issues with adolescents and generally approve of minor consent laws, but lack knowledge about what services a minor can access confidentially. Further research is needed to assess best methods to educate physicians about minors' legal rights to confidential healthcare services. Copyright © 2015 North American Society for Pediatric and Adolescent Gynecology. Published by Elsevier Inc. All rights reserved.

  4. Evaluation in a competitive utility environment: the threat of confidentiality

    International Nuclear Information System (INIS)

    Vine, Edward

    1997-01-01

    Utilities have become concerned that their competitors will desire access to energy-related data--including energy-efficiency data collected by utilities from their energy- efficiency programs--that they may regard as proprietary or confidential. In the future, disputes about confidentiality may focus more on costs and market information (as well as energy use and load data) than on energy-efficiency data per se. So far, the discussion has been limited to ratepayer-funded data. Consequently, many utilities are now requesting that the data (including evaluation data) they submit to their utility regulatory commissions remain confidential. Withholding utility information from the public is likely to harm the evaluation community that depends on the free flow of information for improving the practice of evaluation as well as for disseminating the lessons learned from particular program evaluations. Confidentiality will also have significant policy implications. In response to these concerns, in late 1995 and early 1996, we conducted a survey of state public utility commissions (PUCs) in the U.S. to assess: (1) the relative importance of the issue of confidential data in the regulatory arena; (2) the regulatory response to utility requests for confidentiality (e.g., formal policies, guidelines, rules and procedures, and decisions); and (3) the type of data filed as confidential with PUCS. We focus on the first two objectives of this study. In addition to our interviews, we reviewed selected state statutes, judicial and PUC decisions, rules and procedures, protective orders, and interim policy documents. Evaluators need to understand the context of confidentiality as well as the response of the regulatory commissions to confidentiality, because evaluators will need to adapt to a new environment where energy-related data and information may be harder to obtain and distribute. We propose that regulators conduct the following activities as soon as possible: 1. Assess

  5. Privacy, confidentiality and abortion statistics: a question of public interest?

    Science.gov (United States)

    McHale, Jean V; Jones, June

    2012-01-01

    The precise nature and scope of healthcare confidentiality has long been the subject of debate. While the obligation of confidentiality is integral to professional ethical codes and is also safeguarded under English law through the equitable remedy of breach of confidence, underpinned by the right to privacy enshrined in Article 8 of the Human Rights Act 1998, it has never been regarded as absolute. But when can and should personal information be made available for statistical and research purposes and what if the information in question is highly sensitive information, such as that relating to the termination of pregnancy after 24 weeks? This article explores the case of In the Matter of an Appeal to the Information Tribunal under section 57 of the Freedom of Information Act 2000, concerning the decision of the Department of Health to withhold some statistical data from the publication of its annual abortion statistics. The specific data being withheld concerned the termination for serious fetal handicap under section 1(1)d of the Abortion Act 1967. The paper explores the implications of this case, which relate both to the nature and scope of personal privacy. It suggests that lessons can be drawn from this case about public interest and use of statistical information and also about general policy issues concerning the legal regulation of confidentiality and privacy in the future.

  6. 49 CFR 805.735-21 - Confidentiality of statements.

    Science.gov (United States)

    2010-10-01

    ... TRANSPORTATION SAFETY BOARD EMPLOYEE RESPONSIBILITIES AND CONDUCT § 805.735-21 Confidentiality of statements. Subject to the provisions of § 805.735-24 concerning review of employee statements, each statement of... Personnel Officer is personally responsible for the retention of employee statements in confidence and may...

  7. Privacy, confidentiality and automated health information systems.

    Science.gov (United States)

    Vuori, H

    1977-12-01

    Professor Vuori's paper, first presented at the fourth Medico-legal Conference in Prague in the spring of this year, deals with the problem of the maintenance of confidentiality in computerized health records. Although more and more information is required, the hardware of the computer systems is so sophisticated that it would be very expensive indeed to 'break in' and steal from a modern data bank. Those concerned with programming computers are becoming more aware of their responsibilities concerning confidentiality and privacy, to the extent that a legal code of ethics for programmers is being formulated. They are also aware that the most sensitive of all relationships--the doctor-patient relationship--could be in danger if they failed to maintain high standards of integrity. An area of danger is where administrative boundaries between systems must be crossed--say between those of health and employment. Protection of privacy must be ensured by releasing full information about the type of data being stored, and by maintaining democratic control over the establishment of information systems.

  8. The Role of Employee Whistleblowing and Raising Concerns in an Organizational Learning Culture – Elusive and Laudable?

    Science.gov (United States)

    Jones, Aled

    2016-01-01

    It is inevitable that healthcare workers throughout their careers will witness actual or potential threats to patient safety in the course of their work. Some of these threats will result in serious harm occurring to others, whilst at other times such threats will result in minimal harm, or a ‘near miss’ where harm is avoided at the last minute. Despite organizations encouraging employees to ‘speak up’ about such threats, healthcare systems globally struggle to engage their staff to do so. Even when staff do raise concerns they are often ignored by those with a responsibility to listen and act. Learning how to create the conditions where employees continuously raise and respond to concerns is essential in creating a continuous and responsive learning culture that cherishes keeping patients and employees safe. Workplace culture is a real barrier to the creation of such a learning system but examples in healthcare exist from which we can learn. PMID:26673654

  9. Doctor-patient confidentiality - right and duty of a doctor in law regulations

    Directory of Open Access Journals (Sweden)

    Janusz Jaroszyński

    2018-03-01

    Full Text Available Physician’s professional secrecy is one of the most important duties of a doctor and should be provided with confidentiality regarding his or her health. Generally speaking, there is no legal definition of "physician’s professional secrecy" in Poland, although this concept already appears in the oath of Hippocrates: ‘I will keep secret anything I see or hear professionally which ought not to be told’. The issue of medical confidentiality (physician’s professional secrecy has been regulated in several legal acts such as: The Patient Rights and Patients Ombudsman Act, The Constitution of the Republic of Poland, The Medical Profession Act, The Civil Code Act, The Criminal Code Act and Code of Medical Ethics which is not considered as a legal act. The patient has the right to require confidentiality of the information concerning him and the obligation to keep medical confidentiality will apply to every representative of the medical profession, who obtained certain information by various professional activities.

  10. A Systematic Review on Confidentiality, Disclosure, and Stigma in the United States: Lessons for HIV Care in Pregnancy From Reproductive Genetics.

    Science.gov (United States)

    Wilkinson, Barbara; Arora, Kavita Shah

    2015-01-01

    The fields of HIV care in pregnancy and reproductive genetics have always been 'exceptional' in that patients are highly concerned about the potential for stigma and the corresponding need for privacy and confidentiality. However, the two fields have diverged in how they have addressed these concerns. The systematic review analyzed 61 manuscripts for similarities and differences between the fields of HIV care in pregnancy and reproductive genetics in the United States, with respect to privacy, confidentiality, disclosure, and stigma. The systematic review revealed that the field of HIV care in pregnancy has insufficiently addressed patient concerns about privacy, confidentiality, and stigma compared to the field of reproductive genetics. Failure to adequately protect confidentiality of HIV-positive patients, and failure to reduce stigma associated with HIV testing and treatment are deficiencies in the delivery of care to HIV-positive pregnant woman and barriers to reducing vertical transmission of HIV. Improvements in care and policy should mirror the field of reproductive genetics.

  11. 78 FR 17975 - Self-Regulatory Organizations; Financial Industry Regulatory Authority, Inc.; Notice of Filing of...

    Science.gov (United States)

    2013-03-25

    ... confidential customer information or information that raises personal safety or privacy concerns is released to... identities, or information that raises significant identity theft, personal safety, or privacy concerns that... privacy concerns that are not outweighed by investor protection concerns). Similarly, the proposed rule...

  12. Controls Mitigating the Risk of Confidential Information Disclosure by Facebook: Essential Concern in Auditing Information Security

    Directory of Open Access Journals (Sweden)

    Ivan Ognyanov Kuyumdzhiev

    2014-08-01

    Full Text Available Facebook allows people to easily share information about themselves which in some cases could be classified as confidential or sensitive in the organisation they’re working for. In this paper we discuss the type of data stored by Facebook and the scope of the terms “confidential” and “sensitive data”. The intersection of these areas shows that there is high possibility for confidential data disclosure in organisations with none or ineffective security policy. This paper proposes a strategy for managing the risks of information leakage. We define five levels of controls against posting non-public data on Facebook - security policy, applications installed on employees’ workstations, specific router software or firmware, software in the cloud, Facebook itself. Advantages and disadvantages of every level are evaluated. As a result we propose developing of new control integrated in the social media.

  13. THE INFORMATION CONFIDENTIALITY AND CYBER SECURITY IN MEDICAL INSTITUTIONS

    Directory of Open Access Journals (Sweden)

    SABAU-POPA CLAUDIA DIANA

    2015-07-01

    Full Text Available The information confidentiality and cyber security risk affects the right to confidentiality and privacy of the patient, as regulated in Romania by the Law 46/2002. The manifestation of the cyber security risk event affects the reputation of the healthcare institution and is becoming more and more complex and often due to the: development of network technology, the medical equipment connected to wifi and the electronic databases. The databases containing medical records were implemented due to automation. Thus, transforming data into medical knowledge contribute to a better understanding of the disease. Due to these factors, the measures taken by the hospital management for this type of risk are adapted to the cyber changes. The hospital objectives aim: the implementation of a robust information system, the early threats identifications and the incident reporting. Neglecting this type of risk can generate financial loss, inability to continue providing health care services for a certain period of time, providing an erroneous diagnosis, medical equipment errors etc. Thus, in a digital age the appropriate risk management for the information security and cyber risk represent a necessity. The main concern of hospitals worldwide is to align with international requirements and obtain credentials in terms of data security from the International Organisation for Standardization, which regulates the management of this type of risk. Romania is at the beginning in terms of concerns regarding the management, avoidance and mitigation of information security, the health system being most highly exposed to its manifestation. The present paper examines the concerns of the health system to the confidentiality of information and cyber security risk and its management arrangements. Thus, a set of key risk indicators is implemented and monitored for 2011-2013, using a user interface, a Dashboard, which acts as an early warning system of the manifestation of the

  14. Jana: Confidential Communications on Social Networks

    Science.gov (United States)

    2017-08-09

    consuming phone resources and privacy leakage ?” We address this challenge via an extensive user study. Next, we ask “How can we detect background apps...not support secret group communications. Furthermore, access to such social networks via mobile platforms raises a series of concerns like leakage of...not support secret group communications. Furthermore, access to such social networks via mobile platforms raises a series of concerns like leakage of

  15. 18 CFR 385.606 - Confidentiality in dispute resolution proceedings (Rule 606).

    Science.gov (United States)

    2010-04-01

    ... be required to disclose, any information concerning any dispute resolution communication or any communication provided in confidence to the neutral, unless: (1) All participants in the dispute resolution... reducing the confidence of participants in future cases that their communications will remain confidential...

  16. Ombuds’ corner: Confidentiality concerning boards

    CERN Multimedia

    Vincent Vuillemin

    2011-01-01

    In this series, the Bulletin aims to explain the role of the Ombuds at CERN by presenting practical examples of misunderstandings that could have been resolved by the Ombuds if he had been contacted earlier. Please note that, in all the situations we present, the names are fictitious and used only to improve clarity.   Phil* was a candidate for a position in a different group from the one he had been working for. After his board had taken place, Phil asked for an appointment with the Ombuds. In his opinion, the interview went reasonably well. However Phil had some concerns as he had heard that there was no point in him applying as another candidate will get the position. He had decided to apply anyway, encouraged by other people, with the hope that he would get a good rating that could help him get a position in the future, if he didn't get present one. During the interview he was asked some questions that could only have been answered by candidates with  experience related ...

  17. Confidentiality Enhancement of Highly Sensitive Nuclear Data Using Steganography with Chaotic Encryption over OFDM Channel

    International Nuclear Information System (INIS)

    Mahmoud, S.; Ayad, N.; Elsayed, F.; Elbendary, M.

    2016-01-01

    Full text: Due to the widespread usage of the internet and other wired and wireless communication methods, the security of the transmitted data has become a major requirement. Nuclear knowledge is mainly built upon the exchange of nuclear information which is considered highly sensitive information, so its security has to be enhanced by using high level security mechanisms. Data confidentiality is concerned with the achievement of higher protection for confidential information from unauthorized disclosure or access. Cryptography and steganography are famous and widely used techniques that process information in order to achieve its confidentiality, but sometimes, when used individually, they don’t satisfy a required level of security for highly sensitive data. In this paper, cryptography is accompanied with steganography for constituting a multilayer security techniques that can strengthen the level of security of highly confidential nuclear data that are archived or transmitted through different channel types and noise conditions. (author)

  18. Spatial confidentiality and GIS: re-engineering mortality locations from published maps about Hurricane Katrina

    Directory of Open Access Journals (Sweden)

    Leitner Michael

    2006-10-01

    Full Text Available Abstract Background Geographic Information Systems (GIS can provide valuable insight into patterns of human activity. Online spatial display applications, such as Google Earth, can democratise this information by disseminating it to the general public. Although this is a generally positive advance for society, there is a legitimate concern involving the disclosure of confidential information through spatial display. Although guidelines exist for aggregated data, little has been written concerning the display of point level information. The concern is that a map containing points representing cases of cancer or an infectious disease, could be re-engineered back to identify an actual residence. This risk is investigated using point mortality locations from Hurricane Katrina re-engineered from a map published in the Baton Rouge Advocate newspaper, and a field team validating these residences using search and rescue building markings. Results We show that the residence of an individual, visualized as a generalized point covering approximately one and half city blocks on a map, can be re-engineered back to identify the actual house location, or at least a close neighbour, even if the map contains little spatial reference information. The degree of re-engineering success is also shown to depend on the urban characteristic of the neighborhood. Conclusion The results in this paper suggest a need to re-evaluate current guidelines for the display of point (address level data. Examples of other point maps displaying health data extracted from the academic literature are presented where a similar re-engineering approach might cause concern with respect to violating confidentiality. More research is also needed into the role urban structure plays in the accuracy of re-engineering. We suggest that health and spatial scientists should be proactive and suggest a series of point level spatial confidentiality guidelines before governmental decisions are made

  19. Spatial confidentiality and GIS: re-engineering mortality locations from published maps about Hurricane Katrina.

    Science.gov (United States)

    Curtis, Andrew J; Mills, Jacqueline W; Leitner, Michael

    2006-10-10

    Geographic Information Systems (GIS) can provide valuable insight into patterns of human activity. Online spatial display applications, such as Google Earth, can democratise this information by disseminating it to the general public. Although this is a generally positive advance for society, there is a legitimate concern involving the disclosure of confidential information through spatial display. Although guidelines exist for aggregated data, little has been written concerning the display of point level information. The concern is that a map containing points representing cases of cancer or an infectious disease, could be re-engineered back to identify an actual residence. This risk is investigated using point mortality locations from Hurricane Katrina re-engineered from a map published in the Baton Rouge Advocate newspaper, and a field team validating these residences using search and rescue building markings. We show that the residence of an individual, visualized as a generalized point covering approximately one and half city blocks on a map, can be re-engineered back to identify the actual house location, or at least a close neighbour, even if the map contains little spatial reference information. The degree of re-engineering success is also shown to depend on the urban characteristic of the neighborhood. The results in this paper suggest a need to re-evaluate current guidelines for the display of point (address level) data. Examples of other point maps displaying health data extracted from the academic literature are presented where a similar re-engineering approach might cause concern with respect to violating confidentiality. More research is also needed into the role urban structure plays in the accuracy of re-engineering. We suggest that health and spatial scientists should be proactive and suggest a series of point level spatial confidentiality guidelines before governmental decisions are made which may be reactionary toward the threat of revealing

  20. Confidentiality and integrity in crowdsourcing systems

    CERN Document Server

    Ranj Bar, Amin

    2014-01-01

    Confidentiality and Integrity in Crowdsourcing Systems focuses on identity, privacy, and security related issues in crowdsourcing systems and in particular the confidentiality and integrity of online data created via crowdsourcing. This book begins with an introduction to crowdsourcing and then covers the privacy and security challenges of Confidentiality. The book examines integrity in these systems and the management and control of crowdsourcing systems.

  1. A challenge to unqualified medical confidentiality.

    Science.gov (United States)

    Bozzo, Alexander

    2018-04-01

    Medical personnel sometimes face a seeming conflict between a duty to respect patient confidentiality and a duty to warn or protect endangered third parties. The conventional answer to dilemmas of this sort is that, in certain circumstances, medical professionals have an obligation to breach confidentiality. Kenneth Kipnis has argued, however, that the conventional wisdom on the nature of medical confidentiality is mistaken. Kipnis argues that the obligation to respect patient confidentiality is unqualified or absolute, since unqualified policies can save more lives in the long run. In this paper, I identify the form of Kipnis's argument and present a challenge to it. I conclude that, as matters stand now, a qualified confidentiality policy is the more rational choice. © Article author(s) (or their employer(s) unless otherwise stated in the text of the article) 2018. All rights reserved. No commercial use is permitted unless otherwise expressly granted.

  2. Confidential donation confirmation as an alternative to confidential unit exclusion: 15 months experience of the HEMOMINAS foundation

    Directory of Open Access Journals (Sweden)

    Flávia Cristine Martineli Loureiro

    2011-01-01

    Full Text Available BACKGROUND: Confidential unit exclusion remains a controversial strategy to reduce the residual risk of transfusion-transmitted infections. OBJECTIVE: This study aimed to analyze confidential unit exclusion from its development in a large institution in light of confidential donation confirmation. METHODS: Data of individuals who donated from October 1, 2008 to December 31, 2009 were analyzed in a case-control study. The serological results and sociodemographic characteristics of donors who did not confirm their donations were compared to those who did. Variables with p-values < 0.20 in univariate analysis were included in a logistic multivariate analysis. RESULTS: In the univariate analysis there was a statically significant association between positive serological results and response to confidential donation confirmation of "No". Donation type, (firsttime or return donor - OR 1.69, CI 1.37-2.09, gender (OR 1.66, CI 1.35-2.04, education level (OR 2.82, CI 2.30-3.47 and ethnic background (OR 0.67, CI 0.55-0.82 were included in the final logistic regression model. In all logistic regression models analyzed, the serological suitability and confidential donation confirmation were not found to be statistically associated. The adoption of new measures of clinical classification such as audiovisual touch-screen computer-assisted self-administered interviews might be more effective than confidential unit exclusion in the identification of donor risk behavior. The requirement that transfusion services continue to use confidential unit exclusion needs to be debated in countries where more specific and sensitive clinical and serological screening methods are available. CONCLUSION: Our findings suggest that there are not enough benefits to justify continued use of confidential donation confirmation in the analyzed institution.

  3. 22 CFR 130.15 - Confidential business information.

    Science.gov (United States)

    2010-04-01

    ..., confidential business information means commercial or financial information which by law is entitled to... 22 Foreign Relations 1 2010-04-01 2010-04-01 false Confidential business information. 130.15... CONTRIBUTIONS, FEES AND COMMISSIONS § 130.15 Confidential business information. (a) Any person who is required...

  4. 7 CFR 1280.634 - Confidentiality.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 10 2010-01-01 2010-01-01 false Confidentiality. 1280.634 Section 1280.634 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (MARKETING... persons voting in the referendum and ballots shall be confidential and the contents of the ballots shall...

  5. Denying a patient's final will: public safety vs. medical confidentiality and patient autonomy.

    Science.gov (United States)

    Gaertner, Jan; Vent, Julia; Greinwald, Ralf; Rothschild, Markus A; Ostgathe, Christoph; Kessel, Rene; Voltz, Raymond

    2011-12-01

    Especially when caring for patients approaching the end of life, physicians and nursing staff feel committed to fulfilling as many patient desires as possible. However, sometimes a patient's "final will" may threaten public safety. This can lead to severe conflicts, outweighing the physician's obligation and dedication to care for the patient and to respect his autonomy. Yet, public safety can be threatened if confidentiality is not broken. This article provides a concise summary of the medicolegal and ethical fundamentals concerning this difficult situation. If the patient's and others' health and safety are at risk, physicians may (and in some countries must) break medical confidentiality and disclose confidential patient information to the police and other authorities. Physicians should be able to professionally deal with such a conflict in all patients, not only in patients with advanced illness. Copyright © 2011 U.S. Cancer Pain Relief Committee. Published by Elsevier Inc. All rights reserved.

  6. 15 CFR 806.5 - Confidentiality.

    Science.gov (United States)

    2010-01-01

    ... 15 Commerce and Foreign Trade 3 2010-01-01 2010-01-01 false Confidentiality. 806.5 Section 806.5 Commerce and Foreign Trade Regulations Relating to Commerce and Foreign Trade (Continued) BUREAU OF ECONOMIC ANALYSIS, DEPARTMENT OF COMMERCE DIRECT INVESTMENT SURVEYS § 806.5 Confidentiality. Information...

  7. Confidentiality in psychological practice: a decrepit concept?

    Science.gov (United States)

    McMahon, M; Knowles, A D

    1995-11-01

    Although the principle of confidentiality in the relationship between psychologists and client has been vaunted, and is emphasised in the Australian Psychological Society's Code of Professional Conduct (the APS code; 1994), the confidentiality of this relationship is circumscribed by the absence of legal protections, the ethical beliefs of psychologists, institutional practices, and the provisions of the APS code itself. Lack of privilege in judicial proceedings, and statutory obligations to report certain types of behaviour, mandate breaches of confidentiality in some circumstances. Ethical beliefs of psychologists may support disclosure, especially where it is believed that there is danger of serious physical harm to the client or others. Multidisciplinary teams and institutional settings require the exchange of information for optimal delivery of services. Recent amendments to the APS code may require disclosure without the client's consent when a client is believed to be suicidal. Such developments, when considered at all, are typically regarded as exceptions to a general obligation of confidentiality. However, discussion of exceptions presupposes agreement on fundamental principle: the significance of, and rationale for, confidentiality in the psychologist-client relationship. It is argued in this paper that the obligation of confidentiality has been assumed rather than vigorously analysed and empirically explored. A critical examination of this obligation is the most appropriate starting point for the rehabilitation of contemporary principles of confidentiality in the psychologist-client relationship.

  8. Confidentiality Issues and Use of Sexually Transmitted Disease Services Among Sexually Experienced Persons Aged 15-25 Years - United States, 2013-2015.

    Science.gov (United States)

    Leichliter, Jami S; Copen, Casey; Dittus, Patricia J

    2017-03-10

    National-level data are limited regarding confidentiality-related issues and the use of sexually transmitted disease (STD) services for adolescents and young adults. Changes in the U.S. health care system have permitted dependent children to remain on a parent's health insurance plan until the child's 26th birthday and required coverage of certain preventive services, including some STD services, without cost sharing for most plans (1,2). Although these provisions likely facilitate access to the health care system, adolescents and young adults might not seek care or might delay seeking care for certain services because of concerns about confidentiality, including fears that their parents might find out (3,4). Therefore, it is important to examine STD services and confidentiality-related issues among persons aged 15-25 years in the United States. CDC analyzed data from the 2013-2015 National Survey of Family Growth and found that 12.7% of sexually experienced youths (adolescents aged 15-17 years and those young adults aged 18-25 years who were on a parent's insurance plan) would not seek sexual and reproductive health care because of concerns that their parents might find out. Particularly concerned were persons aged 15-17 years (22.6%). Females with confidentiality concerns regarding seeking sexual and reproductive health care reported a lower prevalence of receipt of chlamydia screening (17.1%) than did females who did not cite such concerns (38.7%). More adolescents aged 15-17 years who spent time alone with a health care provider (without a parent in the room) reported receipt of a sexual risk assessment (71.1%) and, among females, chlamydia testing (34.0%), than did those who did not spend time alone (36.6% and 14.9%, respectively). The results indicated that confidentiality-related issues were associated with less reported use of some STD services, especially for younger persons and females. Spending time alone with a provider (i.e., without a parent present

  9. [Consent and confidentiality in occupational health practice: balance between legal requirements and ethical values].

    Science.gov (United States)

    Mora, Erika; Franco, G

    2010-01-01

    The recently introduced Italian law on the protection of workers' health states that the occupational health physician (competent physician) is required to act according to the Code of Ethics of the International Commission on Occupational Health (ICOH). This paper aims at examining the articles of legislative decree 81/2008 dealing with informed consent and confidentiality compared with the corresponding points of the ICOH Ethics Code. Analysis of the relationship between articles 25 and 39 (informed consent) and 18, 20 and 39 (confidentiality) of the decree shows that there are some points of disagreement between the legal requirements and the Code of Ethics, in particular concerning prescribed health surveillance, consent based on appropriate information (points 8, 10 and 12 of the Code) and some aspects of confidentiality (points 10, 20, 21, 22 and 23 of the Code). Although the competent physician is required to act according to the law, the decisional process could lead to a violation of workers' autonomy.

  10. Computer Security: Printing confidentially

    CERN Document Server

    Stefan Lueders, Computer Security Team

    2015-01-01

    Have you ever hesitated to print a confidential document using CERN printers? Or perhaps you have rushed quickly to the printer after hitting the “print” button in order to avoid someone else getting hold of and reading your document? These times are over now with the new printing infrastructure!   Indeed, many of us regularly print out confidential documents like our salary slips, MARS forms, tendering documents and drafts of preliminary papers. The upcoming CERN data protection policy will require all of us to respect the confidentiality of such documents and, as the word “confidential” implies, access to “confidential” or sensitive documents will be tightly controlled. What can we do about the public printers located in many buildings, floors and shared spaces - accessible not only to CERN staff and users but also to visitors and guests? Some printers are located in the vicinity of restaurants, cafeterias or close to paths taken b...

  11. 7 CFR 1150.278 - Confidential treatment.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 9 2010-01-01 2009-01-01 true Confidential treatment. 1150.278 Section 1150.278 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (Marketing... of Milk Producer Organizations § 1150.278 Confidential treatment. All documents and other information...

  12. 40 CFR 716.55 - Confidentiality claims.

    Science.gov (United States)

    2010-07-01

    ... confidential business information, health and safety studies of any substance or mixture that has been offered for commercial distribution (including for test marketing purposes and for use in research and... because disclosure would reveal a confidential process or quantitative mixture composition should briefly...

  13. 7 CFR 1206.107 - Confidential information.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 10 2010-01-01 2010-01-01 false Confidential information. 1206.107 Section 1206.107 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (MARKETING... INFORMATION Referendum Procedures. § 1206.107 Confidential information. The ballots and other information or...

  14. The Confidentiality of Interlibrary Loan Records.

    Science.gov (United States)

    Nolan, Christopher W.

    1993-01-01

    Discusses potential problems for confidentiality within interlibrary loan requests, outlines legal issues related to confidentiality, and proposes guidelines intended to protect library users' rights to privacy. Interlibrary loan documentation procedures are considered; laws and professional standards are reviewed; and the disposition of…

  15. 31 CFR 9.6 - Confidential information.

    Science.gov (United States)

    2010-07-01

    ... 9.6 Money and Finance: Treasury Office of the Secretary of the Treasury EFFECTS OF IMPORTED ARTICLES ON THE NATIONAL SECURITY § 9.6 Confidential information. Information submitted in confidence which... marked “Business Confidential.” [40 FR 50717, Oct. 31, 1975] ...

  16. 15 CFR 705.6 - Confidential information.

    Science.gov (United States)

    2010-01-01

    ... EFFECT OF IMPORTED ARTICLES ON THE NATIONAL SECURITY § 705.6 Confidential information. (a) Any... the investigation that would disclose national security classified information or business... Security Classified” or “Business Confidential,” as appropriate, marked at the top of each sheet. Any...

  17. Confidentiality Concerns Raised by DNA-Based Tests in the Market-Driven Managed Care Setting

    Energy Technology Data Exchange (ETDEWEB)

    Kotval, Jeroo S.

    2006-07-28

    In a policy climate where incentives to cherry pick are minimized, Managed Care Organizations can implement practices that safeguard medical privacy to the extent that data is protected from falling into the hands of third parties who could misuse it to discriminate. To the extent that these practices have been codified into the regulatory Network of the Health Insurance Portability and Accountability Act (HIPAA) Consumers may be able to rest easy about their genetic data being revealed to third parties who may discriminate. However, there are limitations to the use of policy instruments to prevent the discrimination of an entire genre of clients by market driven managed care organizations. Policy measures, to assure that knowledge of genetic conditions and their future costs would not be used by market driven managed care organizations to implement institutional policies and products that would implicitly discriminate against a genre of clients with genetic conditions, present difficulties.

  18. 7 CFR 1207.352 - Confidential treatment.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 10 2010-01-01 2010-01-01 false Confidential treatment. 1207.352 Section 1207.352 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (MARKETING... PLAN Potato Research and Promotion Plan Reports, Books, and Records § 1207.352 Confidential treatment...

  19. 7 CFR 1205.340 - Confidential treatment.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 10 2010-01-01 2010-01-01 false Confidential treatment. 1205.340 Section 1205.340 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (MARKETING... Cotton Research and Promotion Order Reports, Books, and Records § 1205.340 Confidential treatment. All...

  20. 7 CFR 1220.243 - Confidential treatment.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 10 2010-01-01 2010-01-01 false Confidential treatment. 1220.243 Section 1220.243 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (MARKETING... Confidential treatment. Except as otherwise provided in the Act, financial or commercial information that is...

  1. Rekonstruksi Pengaturan Confidential Principle bagi Komunikasi pada Mediasi Sengketa Perdata di Indonesia: Studi Perbandingan dengan Praktik di Amerika Serikat

    Directory of Open Access Journals (Sweden)

    I Gusti Ngurah Parikesit

    2016-04-01

    Full Text Available Peran mediasi sebagai penyelesaian sengketa alternatif untuk sengketa perdata yang semakin populer digunakan pada praktiknya belum berjalan maksimal. Salah satu penyebabnya adalah kekaburan pengaturan prinsip kerahasiaan confidential principle bagi komunikasi yang terjadi pada proses mediasi. Aturan hukum di Indonesia hanya menjelaskan bahwa mediasi dilangsungkan berdasarkan pada asas tertutup dan mediator berkewajiban menjaga kerahasiaan, baik dalam bentuk perkataan maupun catatan, yang terungkap pada mediasi. Sebagai perbandingan, aturan hukum di Amerika Serikat sudah diatur bahwa segala bentuk komunikasi yang terjadi dan berhubungan dengan pelaksanaan mediasi tunduk pada confidential principle, sehingga proses komunikasi mendapatkan hak istimewa (privilege dengan tidak dapat dijadikan barang bukti dan seluruh pihak yang terlibat dalam mediasi tidak dapat dijadikan saksi pada persidangan berikutnya. Dengan demikian, dibutuhkan rekonstruksi pengaturan terkait ruang lingkup komunikasi pada proses mediasi yang terkualifikasi sebagai confidential principle pengaturan terkait pelepasan hak istimewa komunikasi dari confidential principle; dan pengaturan terkait pengecualian terhadap komunikasi yang terkualifikasi sebagai confidential principle Abstract Although being popular, the role of mediation in resolving civil disputes is yet to be maximalized. One of the reasons is the the vague regulation concerning the confidential principle for communication in mediation. The existing regulation in Indonesia only explains that mediation is undertaken based on closed principle and the mediator is obliged to maintain confidentiality the confidentiality of any communication, either in oral or written forms, revealed during mediation. Whereas in comparison, the regulation in the United States of America stipulates that all forms of communications occured during mediation or is made for purposes of conducting or participating in mediation are subjects to the

  2. The end of medical confidentiality? Patients, physicians and the state in history.

    Science.gov (United States)

    Rieder, Philip; Louis-Courvoisier, Micheline; Huber, Philippe

    2016-09-01

    Medical confidentiality has come under attack in the public sphere. In recent disasters both journalists and politicians have questioned medical confidentiality and claimed that in specific contexts physicians should be compelled to communicate data on their patients' health. The murders of innocent individuals by a suicidal pilot and a Swiss convicted criminal have generated polemical debates on the topic. In this article, historical data on medical confidentiality is used to show that medical practices of secrecy were regularly attacked in the past, and that the nature of medical confidentiality evolved through time depending on physicians' values and judgements. Our demonstration is based on three moments in history. First, at the end of the 16th century, lay authorities put pressure on physicians to disclose the names of patients suffering from syphilis. Second, in the 18th century, physicians faced constant demands for information about patients' health from relatives and friends. Third, employers and insurance companies in the 20th century requested medical data on sick employees. In these three different situations, history reveals that the concept of medical confidentiality was plastic, modelled in the first instance to defend well-to-do patients, in the second instance it was adapted to accommodate the physician's social role and, finally, to defend universal values and public health. Medical secrecy was, and is today, a medical and societal norm that is shaped collectively. Any change in its definition and enforcement was and should be the result of negotiations with all social actors concerned. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://www.bmj.com/company/products-services/rights-and-licensing/

  3. Confidentiality and the employee assistance program professional.

    Science.gov (United States)

    Mistretta, E F; Inlow, L B

    1991-02-01

    During the last two decades EAPs have offered employees confidential assessment, counseling, and referral. Many occupational health nurses have taken on the role of EAP professional or function as the liaison between the EAP counselor and the employee. The occupational health nurse involved in any EAP issue must adhere to the standards of confidentiality. The federal and state laws, company policy, and professional codes of ethics regarding these clients must be clearly understood, especially related to the issue of confidentiality.

  4. Practices in security and confidentiality of HIV/AIDS patients' information: A national survey among staff at HIV outpatient clinics in Vietnam.

    Directory of Open Access Journals (Sweden)

    Nguyen Khac Hai

    Full Text Available Breach of confidentiality or invasion of privacy from the collection and use of medical records, particularly those of patients with HIV/AIDS or other diseases sensitive to stigmatization, should be prevented by all related stakeholders in healthcare settings. The main focus of this study was to assess practices regarding security and confidentiality of HIV-related information among staff at HIV outpatient clinics (HIV-OPCs in Vietnam.A descriptive cross-sectional study was conducted at all 312 HIV-OPCs across the country using an online survey technique.In general, the staff practices for securing and protecting patient information were at acceptable levels. Most staff had proper measures and practices for maintaining data security; however, the protection of patient confidentiality, particularly for data access, sharing, and transfer still required improvement. Most HIV-OPC staff had good or moderate knowledge and positive perceptions towards security and confidentiality issues. Staff who were not trained in the practice of security measures differed significantly from those who were trained (OR: 3.74; 95%CI: 1.44-9.67; staff needing improved knowledge levels differed significantly from those with good (OR: 5.20; 95%CI: 2.39-11.32 and moderate knowledge levels (OR: 5.10; 95%CI: 2.36-11.00; and staff needing improved perception levels differed significantly from those with good (i.e., with 100% proper practices and moderate perception levels (OR: 5.67; 95%CI: 2.93-10.95. Staff who were not trained in the protection of data confidentiality differed significantly from those who were trained (OR: 2.18; 95%CI: 1.29-3.65.Training is an important factor to help raise the levels of proper practices regarding confidentiality and security, to improve knowledge and raise awareness about change among staff. The operation and management of HIV treatment and care in Vietnam are currently transitioning from separate healthcare clinics (HIV-OPC into units

  5. Practices in security and confidentiality of HIV/AIDS patients' information: A national survey among staff at HIV outpatient clinics in Vietnam.

    Science.gov (United States)

    Khac Hai, Nguyen; Lawpoolsri, Saranath; Jittamala, Podjanee; Thi Thu Huong, Phan; Kaewkungwal, Jaranit

    2017-01-01

    Breach of confidentiality or invasion of privacy from the collection and use of medical records, particularly those of patients with HIV/AIDS or other diseases sensitive to stigmatization, should be prevented by all related stakeholders in healthcare settings. The main focus of this study was to assess practices regarding security and confidentiality of HIV-related information among staff at HIV outpatient clinics (HIV-OPCs) in Vietnam. A descriptive cross-sectional study was conducted at all 312 HIV-OPCs across the country using an online survey technique. In general, the staff practices for securing and protecting patient information were at acceptable levels. Most staff had proper measures and practices for maintaining data security; however, the protection of patient confidentiality, particularly for data access, sharing, and transfer still required improvement. Most HIV-OPC staff had good or moderate knowledge and positive perceptions towards security and confidentiality issues. Staff who were not trained in the practice of security measures differed significantly from those who were trained (OR: 3.74; 95%CI: 1.44-9.67); staff needing improved knowledge levels differed significantly from those with good (OR: 5.20; 95%CI: 2.39-11.32) and moderate knowledge levels (OR: 5.10; 95%CI: 2.36-11.00); and staff needing improved perception levels differed significantly from those with good (i.e., with 100% proper practices) and moderate perception levels (OR: 5.67; 95%CI: 2.93-10.95). Staff who were not trained in the protection of data confidentiality differed significantly from those who were trained (OR: 2.18; 95%CI: 1.29-3.65). Training is an important factor to help raise the levels of proper practices regarding confidentiality and security, to improve knowledge and raise awareness about change among staff. The operation and management of HIV treatment and care in Vietnam are currently transitioning from separate healthcare clinics (HIV-OPC) into units integrated

  6. Practices in security and confidentiality of HIV/AIDS patients’ information: A national survey among staff at HIV outpatient clinics in Vietnam

    Science.gov (United States)

    Khac Hai, Nguyen; Lawpoolsri, Saranath; Jittamala, Podjanee; Thi Thu Huong, Phan

    2017-01-01

    Introduction Breach of confidentiality or invasion of privacy from the collection and use of medical records, particularly those of patients with HIV/AIDS or other diseases sensitive to stigmatization, should be prevented by all related stakeholders in healthcare settings. The main focus of this study was to assess practices regarding security and confidentiality of HIV-related information among staff at HIV outpatient clinics (HIV-OPCs) in Vietnam. Methods A descriptive cross-sectional study was conducted at all 312 HIV-OPCs across the country using an online survey technique. Results In general, the staff practices for securing and protecting patient information were at acceptable levels. Most staff had proper measures and practices for maintaining data security; however, the protection of patient confidentiality, particularly for data access, sharing, and transfer still required improvement. Most HIV-OPC staff had good or moderate knowledge and positive perceptions towards security and confidentiality issues. Staff who were not trained in the practice of security measures differed significantly from those who were trained (OR: 3.74; 95%CI: 1.44–9.67); staff needing improved knowledge levels differed significantly from those with good (OR: 5.20; 95%CI: 2.39–11.32) and moderate knowledge levels (OR: 5.10; 95%CI: 2.36–11.00); and staff needing improved perception levels differed significantly from those with good (i.e., with 100% proper practices) and moderate perception levels (OR: 5.67; 95%CI: 2.93–10.95). Staff who were not trained in the protection of data confidentiality differed significantly from those who were trained (OR: 2.18; 95%CI: 1.29–3.65). Conclusions Training is an important factor to help raise the levels of proper practices regarding confidentiality and security, to improve knowledge and raise awareness about change among staff. The operation and management of HIV treatment and care in Vietnam are currently transitioning from separate

  7. 15 CFR 718.3 - Disclosure of confidential business information.

    Science.gov (United States)

    2010-01-01

    ... 15 Commerce and Foreign Trade 2 2010-01-01 2010-01-01 false Disclosure of confidential business... (Continued) BUREAU OF INDUSTRY AND SECURITY, DEPARTMENT OF COMMERCE CHEMICAL WEAPONS CONVENTION REGULATIONS CONFIDENTIAL BUSINESS INFORMATION § 718.3 Disclosure of confidential business information. (a) General...

  8. Boundaries of confidentiality in nursing care for mother and child in HIV programmes.

    Science.gov (United States)

    Våga, Bodil Bø; Moland, Karen Marie; Blystad, Astrid

    2016-08-01

    Confidentiality lies at the core of medical ethics and is the cornerstone for developing and keeping a trusting relationship between nurses and patients. In the wake of the HIV epidemic, there has been a heightened focus on confidentiality in healthcare contexts. Nurses' follow-up of HIV-positive women and their susceptible HIV-exposed children has proved to be challenging in this regard, but the ethical dilemmas concerning confidentiality that emerge in the process of ensuring HIV-free survival of the third party - the child - have attracted limited attention. The study explores challenges of confidentiality linked to a third party in nurse-patient relationships in a rural Tanzanian HIV/AIDS context. The study was carried out in rural and semi-urban settings of Tanzania where the population is largely agro-pastoral, the formal educational level is low and poverty is rife. The HIV prevalence of 1.5% is low compared to the national prevalence of 5.1%. Data were collected during 9 months of ethnographic fieldwork and consisted of participant observation in clinical settings and during home visits combined with in-depth interviews. The main categories of informants were nurses employed in prevention of mother-to-child transmission of HIV programmes and HIV-positive women enrolled in these programmes. Based on information about the study aims, all informants consented to participate. Ethical approval was granted by ethics review boards in Tanzania and Norway. The material indicates a delicate balance between the nurses' attempt to secure the HIV-free survival of the babies and the mothers' desire to preserve confidentiality. Profound confidentiality-related dilemmas emerged in actual practice, and indications of a lack of thorough consideration of the implication of a patient's restricted disclosure came to light during follow-up of the HIV-positive women and the third party - the child who is at risk of HIV infection through mother's milk. World Health Organization

  9. 19 CFR 181.121 - Maintenance of confidentiality.

    Science.gov (United States)

    2010-04-01

    ... 181.121 Customs Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY; DEPARTMENT OF THE TREASURY (CONTINUED) NORTH AMERICAN FREE TRADE AGREEMENT Confidentiality of Business... possession of confidential business information collected pursuant to this part shall, in accordance with...

  10. 19 CFR 210.5 - Confidential business information.

    Science.gov (United States)

    2010-04-01

    ... 19 Customs Duties 3 2010-04-01 2010-04-01 false Confidential business information. 210.5 Section 210.5 Customs Duties UNITED STATES INTERNATIONAL TRADE COMMISSION INVESTIGATIONS OF UNFAIR PRACTICES IN IMPORT TRADE ADJUDICATION AND ENFORCEMENT Rules of General Applicability § 210.5 Confidential...

  11. Mycobacterium bovis in a European bison (Bison bonasus) raises concerns about tuberculosis in Brazilian captive wildlife populations: a case report.

    Science.gov (United States)

    Zimpel, Cristina Kraemer; Brum, Juliana Sperotto; de Souza Filho, Antônio Francisco; Biondo, Alexander Welker; Perotta, João Henrique; Dib, Cristina Corsi; Bonat, Marcelo; Neto, José Soares Ferreira; Brandão, Paulo Eduardo; Heinemann, Marcos Bryan; Guimaraes, Ana Marcia Sa

    2017-02-10

    Tuberculosis caused by Mycobacterium bovis is an important worldwide zoonosis and has been reported to cause clinical disease in several animal species, including captive wildlife. This report describes a case of M. bovis infection in a European bison from a Brazilian zoo and compiles a number of literature reports that raise concern regarding tuberculosis among captive wildlife in Brazil. A 13 year-old captive-born male bison (Bison bonasus) from a Brazilian zoo began presenting weight loss, diarrhea and respiratory symptoms, which inevitably led to his death. At the animal's necropsy, inspection of the thoracic and abdominal cavities revealed multiple enlarged lymph nodes, ranging from 4 to 10 cm, and pulmonary nodules containing caseous masses with firm white materials consistent with mineralization. Histopathology findings showed a significant amount of acid-alcohol resistant bacilli compatible with Mycobacterium spp. Specimens from lymph nodes and lungs were cultured on Petragnani and Stonebrink media, and specific PCR assays of the bacterial isolate identified it as M. bovis. The European bison reported herein died from a severe form of disseminated tuberculosis caused by M. bovis. A review of the available literature indicates possible widespread occurrence of clinical disease caused by M. bovis or M. tuberculosis affecting multiple animal species in Brazilian wildlife-related institutions. These likely underestimated numbers raise concern regarding the control of the disease in captive animal populations from Brazil.

  12. Confidentiality concerning HIV/AIDS status - the implications of the ...

    African Journals Online (AJOL)

    The Appellate Division recently overturned a Supreme Court judgement concerning the disclosure of a patient's HIV status by his general practitioner to another general practitioner and a dentist. This article examines the content of both judgements with particular reference to its implication for the medical profession, and ...

  13. 42 CFR 35.11 - Clinical records; confidential.

    Science.gov (United States)

    2010-10-01

    ... EXAMINATIONS HOSPITAL AND STATION MANAGEMENT General § 35.11 Clinical records; confidential. A complete clinical record shall be maintained for each patient admitted to a station or hospital of the Service. Such... 42 Public Health 1 2010-10-01 2010-10-01 false Clinical records; confidential. 35.11 Section 35.11...

  14. 37 CFR 260.4 - Confidential information and statements of account.

    Science.gov (United States)

    2010-07-01

    ... Confidential information and statements of account. (a) For purposes of this part, confidential information shall include statements of account and any information pertaining to the statements of account... included on the statement of account. (d) Access to the confidential information pertaining to the royalty...

  15. Is patient confidentiality compromised with the electronic health record?: a position paper.

    Science.gov (United States)

    Wallace, Ilse M

    2015-02-01

    In order for electronic health records to fulfill their expected benefits, protection of privacy of patient information is key. Lack of trust in confidentiality can lead to reluctance in disclosing all relevant information, which could have grave consequences. This position paper contemplates whether patient confidentiality is compromised by electronic health records. The position that confidentiality is compromised was supported by the four bioethical principles and argued that despite laws and various safeguards to protect patients' confidentiality, numerous data breaches have occurred. The position that confidentiality is not compromised was supported by virtue ethics and a utilitarian viewpoint and argued that safeguards keep information confidential and the public feels relatively safe with the electronic health record. The article concludes with an ethically superior position that confidentiality is compromised with the electronic health record. Although organizational and governmental ways of enhancing the confidentiality of patient information within the electronic health record facilitate confidentiality, the ultimate responsibility of maintaining confidentiality rests with the individual end-users and their ethical code of conduct. The American Nurses Association Code of Ethics for nurses calls for nurses to be watchful with data security in electronic communications.

  16. Can you keep a secret? Confidentiality in psychotherapy.

    Science.gov (United States)

    Younggren, Jeffrey N; Harris, Eric A

    2008-05-01

    Confidentiality is the secret-keeping duty that arises from the establishment of the professional relationship psychologists develop with their clients. It is a duty created by the professional relationship, it is set forth in the American Psychological Association's (2002) Ethical Principles and Code of Conduct, and it is codified in many state regulations. However, the difference between confidentiality and legal privilege; how, why, and when it can be violated; and the reasons for so doing are not well understood by many practitioners. While on the surface confidentiality might seem to be an easy concept to apply to professional practice, in fact it is quite complex and filled with exceptions that frequently differ from circumstance to circumstance and from state to state. A lack of respect for and a lack of familiarity with the significance of these exceptions could have dire professional consequences. This article reviews the ethical imperative of confidentiality and then provides examples of legal cases that help to better understand its complexity. Then, we offer strategies designed to help metal health practitioners when they are confronted with questions regarding confidentiality and privilege.

  17. Protecting Privacy and Confidentiality in Environmental Health Research.

    Science.gov (United States)

    Resnik, David B

    2010-01-01

    Environmental health researchers often need to make difficult decisions on how to protect privacy and confidentiality when they conduct research in the home or workplace. These dilemmas are different from those normally encountered in clinical research. Although protecting privacy and confidentiality is one of the most important principles of research involving human subjects, it can be overridden to prevent imminent harm to individuals or if required by law. Investigators should carefully consider the facts and circumstances and use good judgment when deciding whether to breach privacy or confidentiality.

  18. Confidential benchmarking based on multiparty computation

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre; Damgård, Kasper Lyneborg; Nielsen, Kurt

    We report on the design and implementation of a system that uses multiparty computation to enable banks to benchmark their customers' confidential performance data against a large representative set of confidential performance data from a consultancy house. The system ensures that both the banks......' and the consultancy house's data stays confidential, the banks as clients learn nothing but the computed benchmarking score. In the concrete business application, the developed prototype help Danish banks to find the most efficient customers among a large and challenging group of agricultural customers with too much...... debt. We propose a model based on linear programming for doing the benchmarking and implement it using the SPDZ protocol by Damgård et al., which we modify using a new idea that allows clients to supply data and get output without having to participate in the preprocessing phase and without keeping...

  19. Client confidentiality: Perspectives of students in a healthcare ...

    African Journals Online (AJOL)

    This moral dilemma is difficult for students to circumvent and therefore this paper presents healthcare students' perspectives of confidentiality. Methods. We aimed to explore healthcare students' views and experiences of confidentiality as an ethical principle by adopting a qualitative explorative approach. Purposeful ...

  20. Using Social Networking Sites for Communicable Disease Control: Innovative Contact Tracing or Breach of Confidentiality?

    Science.gov (United States)

    Mandeville, Kate L; Harris, Matthew; Thomas, H Lucy; Chow, Yimmy; Seng, Claude

    2014-04-01

    Social media applications such as Twitter, YouTube and Facebook have attained huge popularity, with more than three billion people and organizations predicted to have a social networking account by 2015. Social media offers a rapid avenue of communication with the public and has potential benefits for communicable disease control and surveillance. However, its application in everyday public health practice raises a number of important issues around confidentiality and autonomy. We report here a case from local level health protection where the friend of an individual with meningococcal septicaemia used a social networking site to notify potential contacts.

  1. Breaching confidentiality: medical mandatory reporting laws in Iran.

    Science.gov (United States)

    Milanifar, Alireza; Larijani, Bagher; Paykarzadeh, Parvaneh; Ashtari, Golanna; Mehdi Akhondi, Mohammad

    2014-01-01

    Medical ethics is a realm where four important subjects of philosophy, medicine, theology and law are covered. Physicians and philosophers cooperation in this area will have great efficiency in the respective ethical rules formation. In addition to respect the autonomy of the patient, physician's obligation is to ensure that the medical intervention has benefit for the patient and the harm is minimal. There is an obvious conflict between duty of confidentiality and duty of mandatory reporting. Professional confidentiality is one of the basic components in building a constant physician-patient relationship which nowadays, beside the novelty, it is the subject of discussion. Legal obligation of confidentiality is not absolute. In physician-patient relationship, keeping patient's secrets and maintaining confidentiality is a legal and ethical duty, and disclosure of such secrets is mainly through specific statutes. Thus, there are a number of situations where breach of confidentiality is permitted in different legal systems. One of the situations where breaching confidentiality is permitted is the medical mandatory reporting to the relevant authority which is in accordance with many countries' legal systems. Some situations are considered in many countries legal systems' such as notification of births and deaths, infectious diseases, child abuse, sport and relevant events, medical errors, drug side effects and dangerous pregnancies. In this paper, we will examine and discuss medical mandatory reporting and its ethical and legal aspects in the judicial and legal system of Iran and few other countries. Finally we will suggest making Medical Mandatory Reporting Law in Iran.

  2. Quantum key based burst confidentiality in optical burst switched networks.

    Science.gov (United States)

    Balamurugan, A M; Sivasubramanian, A

    2014-01-01

    The optical burst switching (OBS) is an emergent result to the technology concern that could achieve a feasible network in future. They are endowed with the ability to meet the bandwidth requirement of those applications that require intensive bandwidth. There are more domains opening up in the OBS that evidently shows their advantages and their capability to face the future network traffic. However, the concept of OBS is still far from perfection facing issues in case of security threat. The transfer of optical switching paradigm to optical burst switching faces serious downfall in the fields of burst aggregation, routing, authentication, dispute resolution, and quality of service (QoS). This paper deals with employing RC4 (stream cipher) to encrypt and decrypt bursts thereby ensuring the confidentiality of the burst. Although the use of AES algorithm has already been proposed for the same issue, by contrasting the two algorithms under the parameters of burst encryption and decryption time, end-to-end delay, it was found that RC4 provided better results. This paper looks to provide a better solution for the confidentiality of the burst in OBS networks.

  3. Quantum Key Based Burst Confidentiality in Optical Burst Switched Networks

    Directory of Open Access Journals (Sweden)

    A. M. Balamurugan

    2014-01-01

    Full Text Available The optical burst switching (OBS is an emergent result to the technology concern that could achieve a feasible network in future. They are endowed with the ability to meet the bandwidth requirement of those applications that require intensive bandwidth. There are more domains opening up in the OBS that evidently shows their advantages and their capability to face the future network traffic. However, the concept of OBS is still far from perfection facing issues in case of security threat. The transfer of optical switching paradigm to optical burst switching faces serious downfall in the fields of burst aggregation, routing, authentication, dispute resolution, and quality of service (QoS. This paper deals with employing RC4 (stream cipher to encrypt and decrypt bursts thereby ensuring the confidentiality of the burst. Although the use of AES algorithm has already been proposed for the same issue, by contrasting the two algorithms under the parameters of burst encryption and decryption time, end-to-end delay, it was found that RC4 provided better results. This paper looks to provide a better solution for the confidentiality of the burst in OBS networks.

  4. 20 CFR 726.113 - Disclosure of confidential information.

    Science.gov (United States)

    2010-04-01

    ... MINE OPERATOR'S INSURANCE Authorization of Self-Insurers § 726.113 Disclosure of confidential... 20 Employees' Benefits 3 2010-04-01 2010-04-01 false Disclosure of confidential information. 726... authorized self-insurer or applicant for the authorization of self-insurance obtained by the Office shall be...

  5. Practical State Machine Replication with Confidentiality

    Energy Technology Data Exchange (ETDEWEB)

    Duan, Sisi [ORNL; Zhang, Haibin [University of North Carolina, Chapel Hill

    2016-01-01

    We study how to enable arbitrary randomized algorithms in Byzantine fault-tolerant (BFT) settings. We formalize a randomized BFT protocol and provide a simple and efficient construction that can be built on any existing BFT protocols while adding practically no overhead. We go one step further to revisit a confidential BFT protocol (Yin et al., SOSP '03). We show that their scheme is potentially susceptible to safety and confidentiality attacks. We then present a new protocol that is secure in the stronger model we formalize, by extending the idea of a randomized BFT protocol. Our protocol uses only efficient symmetric cryptography, while Yin et al.'s uses costly threshold signatures. We implemented and evaluated our protocols on microbenchmarks and real-world use cases. We show that our randomized BFT protocol is as efficient as conventional BFT protocols, and our confidential BFT protocol is two to three orders of magnitude faster than Yin et al.'s, which is less secure than ours.

  6. CRAC : Confidentiality risk analysis and IT-architecture comparison of business networks

    NARCIS (Netherlands)

    Morali, A.; Zambon, E.; Etalle, S.; Wieringa, R.J.

    2009-01-01

    The leakage of confidential information (e.g. industrial secrets, patient records and user credentials) is one of the risks that have to be accounted for and mitigated by organizations dealing with confidential data. Unfortunately, assessing confidentiality risk is challenging, particularly in the

  7. 29 CFR 4010.13 - Confidentiality of information submitted.

    Science.gov (United States)

    2010-07-01

    ... REPORTING AND DISCLOSURE REQUIREMENTS ANNUAL FINANCIAL AND ACTUARIAL INFORMATION REPORTING § 4010.13 Confidentiality of information submitted. In accordance with § 4901.21(a)(3) of this chapter and ERISA section... 29 Labor 9 2010-07-01 2010-07-01 false Confidentiality of information submitted. 4010.13 Section...

  8. 75 FR 75586 - Confidentiality of Suspicious Activity Reports

    Science.gov (United States)

    2010-12-03

    ...] RIN 1550-AC26 Confidentiality of Suspicious Activity Reports AGENCY: The Office of Thrift Supervision... implementing the Bank Secrecy Act (BSA) governing the confidentiality of a suspicious activity report (SAR) to... corporations regulated by the OTS, to keep certain records and make certain reports that have been determined...

  9. Protecting confidentiality rights: the need for an ethical practice model.

    Science.gov (United States)

    Fisher, Mary Alice

    2008-01-01

    All psychologists must uphold the same ethical standards about confidentiality even though each state imposes different legal limits on their ability to protect clients' confidences. The resulting ethical-legal confusion is exacerbated by legally based confidentiality training that treats legal exceptions as if they were the rule and fosters the impression that attorneys are now the only real experts about this aspect of practice. This article provides an ethics-based confidentiality practice model that clarifies the ethical rule and puts its legal exceptions into ethical perspective. Like the Confidentiality section of the American Psychological Association's (2002) Ethical Principles of Psychologists and Code of Conduct, this outline would apply to all psychologists regardless of state laws, but the details of its implementation would vary according to role and setting. It can be used as a universal training outline, a consultation and supervision tool, a guide to professional practice, and a basis for clearer ongoing conversation about the ethics of "conditional confidentiality." Psychologists can use this practice model to regain their status as experts about the confidentiality ethics of their own profession. PsycINFO Database Record (c) 2008 APA, all rights reserved.

  10. Genetic secrets: Protecting privacy and confidentiality in the genetic era

    Energy Technology Data Exchange (ETDEWEB)

    Rothstein, M.A. [ed.

    1998-07-01

    Few developments are likely to affect human beings more profoundly in the long run than the discoveries resulting from advances in modern genetics. Although the developments in genetic technology promise to provide many additional benefits, their application to genetic screening poses ethical, social, and legal questions, many of which are rooted in issues of privacy and confidentiality. The ethical, practical, and legal ramifications of these and related questions are explored in depth. The broad range of topics includes: the privacy and confidentiality of genetic information; the challenges to privacy and confidentiality that may be projected to result from the emerging genetic technologies; the role of informed consent in protecting the confidentiality of genetic information in the clinical setting; the potential uses of genetic information by third parties; the implications of changes in the health care delivery system for privacy and confidentiality; relevant national and international developments in public policies, professional standards, and laws; recommendations; and the identification of research needs.

  11. Management of medical confidentiality in English professional football clubs: some ethical problems and issues.

    Science.gov (United States)

    Waddington, I; Roderick, M

    2002-04-01

    To examine the ways in which confidential matters are dealt with in the context of the relationship between the club doctor (or physiotherapist) and the player as patient in English professional football clubs. Semistructured tape recorded interviews with 12 club doctors, 10 club physiotherapists, and 27 current and former players. A questionnaire was also sent to 90 club doctors; 58 were returned. There is among club doctors and physiotherapists no commonly held code of ethics governing how much and what kind of information about players may properly be passed on to managers; associated with this, there is considerable variation from one club to another in terms of the amount and kind of information passed on to managers. In some clubs, medical staff attempt to operate more or less on the basis of the rules governing confidentiality that apply in general practice, but in other clubs, medical staff are more ready to pass on personal information about players. In some situations, this raises serious ethical questions. Guidelines dealing with confidentiality in practitioner-patient relationships in medical practice have long been available and have recently been restated, specifically in relation to the practice of sports medicine, by the British Olympic Association, the British Medical Association, and the Football Association. This is a welcome first step. However, if the guidelines are to have an impact on practice, detailed consideration needs to be given to ensuring their effective implementation; if this is to be achieved, consideration also needs to be given to identifying those aspects of the culture and organisation of professional football clubs that may hinder the full and effective implementation of those guidelines.

  12. 15 CFR 718.2 - Identification of confidential business information.

    Science.gov (United States)

    2010-01-01

    ... business information. 718.2 Section 718.2 Commerce and Foreign Trade Regulations Relating to Commerce and Foreign Trade (Continued) BUREAU OF INDUSTRY AND SECURITY, DEPARTMENT OF COMMERCE CHEMICAL WEAPONS CONVENTION REGULATIONS CONFIDENTIAL BUSINESS INFORMATION 718.2 Identification of confidential business...

  13. 7 CFR 1425.5 - Confidentiality.

    Science.gov (United States)

    2010-01-01

    ... AGRICULTURE LOANS, PURCHASES, AND OTHER OPERATIONS COOPERATIVE MARKETING ASSOCIATIONS § 1425.5 Confidentiality. Information submitted to CCC related to trade secrets, financial or commercial operations, or the financial...

  14. 50 CFR 600.130 - Protection of confidentiality of statistics.

    Science.gov (United States)

    2010-10-01

    ... statistics. 600.130 Section 600.130 Wildlife and Fisheries FISHERY CONSERVATION AND MANAGEMENT, NATIONAL... Fishery Management Councils § 600.130 Protection of confidentiality of statistics. Each Council must establish appropriate procedures for ensuring the confidentiality of the statistics that may be submitted to...

  15. 7 CFR 1205.540 - Confidential books, records, and reports.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 10 2010-01-01 2010-01-01 false Confidential books, records, and reports. 1205.540 Section 1205.540 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL... Confidential books, records, and reports. All information obtained from the books, records, and reports of...

  16. 40 CFR 790.7 - Confidentiality.

    Science.gov (United States)

    2010-07-01

    ... words “confidential business information,” “trade secret,” or another appropriate phrase indicating its... competitor use such information? How substantial would the harmful effects be? What is the causal...

  17. 13 CFR 120.1060 - Confidentiality of Reports, Risk Ratings and related Confidential Information.

    Science.gov (United States)

    2010-01-01

    ... other than SBA's Lender oversight and SBA's portfolio management purposes. An SBA Lender, Intermediary... conjunction with SBA's Lender Oversight Program and SBA's portfolio management (for purposes of this... 13 Business Credit and Assistance 1 2010-01-01 2010-01-01 false Confidentiality of Reports, Risk...

  18. Computer Security: confidentiality is everybody’s business

    CERN Multimedia

    Stefan Lueders, Computer Security Team

    2015-01-01

    Recently, a zip file with confidential information was mistakenly made public on one of CERN’s websites. Although the file was only intended for members of an internal committee, when placing it onto the CERN website, someone made a mistake when setting the access permissions and, thus, made the file accessible to everyone visiting the site!   Unfortunately, this is but one example of such mistakes. We have seen other documents made accessible to a much wider audience than originally intended… CERN takes serious measures to ensure the confidentiality of data. Confidential or “sensitive” documents (following the nomenclature set out in the CERN Data Protection Policy) deserve professional handling and access protections given only to the people who really need to access them. As such, they must not be widely circulated as attachments in e-mails and, most definitely, must not be stored on random public websites for the sole purpose of shari...

  19. Library Records: A Review of Confidentiality Laws and Policies.

    Science.gov (United States)

    Million, Angela C.; Fisher, Kim N.

    1986-01-01

    Cites the importance of having a state law, knowing what it says, and having a library policy statement regarding the confidentiality of patron records. Discussion covers writing and implementing a policy, the role of automation, existing laws, library records defined, exceptions to confidentiality, and legal liability. Thirty-seven references are…

  20. Respect, trust, and the management of sickle cell disease pain in hospital: comparative analysis of concern-raising behaviors, preliminary model, and agenda for international collaborative research to inform practice

    Science.gov (United States)

    Elander, James; Beach, Mary Catherine; Haywood, Carlton

    2011-01-01

    Background/objectives Qualitative interview studies suggest that adult patients’ experiences of hospital treatment for sickle cell disease (SCD) pain reflect an absence of respect by providers for patients, and an absence or breakdown of trust. Systematic comparisons between treatment settings could help identify contextual influences on respect and trust. Design Quantitative comparison of concern-raising behaviors (pain treatment outcomes indicating breakdowns of trust) among adult SCD patients in Baltimore, Maryland, USA, and London, UK, followed by analysis of potential explanations for differences, including socio-cultural and behavioral factors, with a preliminary model of the processes leading to concern-raising behaviors. Results Rates of concern-raising behaviors were significantly higher in Baltimore than London. The model identifies respect and trust as key factors which could be targeted in efforts to improve the quality of SCD pain management in hospital. Conclusion An agenda for international, interdisciplinary research to improve the treatment of SCD pain in hospital should include: comparative analyses between countries and treatment settings of factors that could influence respect and trust; research to test hypotheses derived from models about the roles of respect and trust in the treatment of pain; studies of the impact of healthcare structures and policy on patients’ experiences of care; research focusing on developmental and interpersonal processes related to respect and trust; applications of attribution and other social psychology theories; and development and evaluation of interventions to improve the hospital treatment of SCD pain by increasing respect and trust. PMID:21797726

  1. Independent consultants : fiduciary duties, trade secrets and confidential information

    International Nuclear Information System (INIS)

    Fraser, B.; Wilhelmson, M.

    1999-01-01

    Because of cutbacks and downsizing within the petroleum industry, it has become one of the largest users of contract personnel to provide services that were previously provided by senior levels of management. This paper explored the application of common law fiduciary duties and the duty of confidence to the independent workforce. It examined to what extent fiduciary duties apply to independent consultants and the best way for the employer to protect itself from the potential misuse of confidential information. Part 1 of the paper described fiduciary duties. A fiduciary relationship was described as one that possesses the following three characteristics: (1) the fiduciary has scope for the exercise of some discretion of power, (2) the fiduciary can unilaterally exercise that power to affect the beneficiary's practical interests, and (3) the beneficiary is peculiarly vulnerable to the fiduciary holding the discretion of power. Three examples of how the courts treated some arguments regarding fiduciaries were presented. Part 2 of this paper discussed how trade secrets and confidential information should be handled. It was explained, that regardless of fiduciary duties, the unauthorized use of confidential information by an independent contractor can give rise to liability and an award of damages by the courts. Some examples where the Supreme Court of Canada found breach of confidence by a party were presented. Information communicated from an employer to an employee can be divided into the following three categories: (1) publicly accessible and not confidential, (2) confidential and must be treated as such while an employee is employed, but if learned becomes part of the employees skill and knowledge, and (3) specific confidential trade secrets that cannot lawfully be used for anyone's benefit but the employer's. Issues regarding defining rights and obligations by contract were also discussed

  2. ESPOON$_{{ERBAC}}$: Enforcing Security Policies In Outsourced Environments

    OpenAIRE

    Asghar, Muhammad Rizwan; Ion, Mihaela; Russello, Giovanni; Crispo, Bruno

    2013-01-01

    Data outsourcing is a growing business model offering services to individuals and enterprises for processing and storing a huge amount of data. It is not only economical but also promises higher availability, scalability, and more effective quality of service than in-house solutions. Despite all its benefits, data outsourcing raises serious security concerns for preserving data confidentiality. There are solutions for preserving confidentiality of data while supporting search on the data stor...

  3. Confidentiality considerations for use of social-spatial data on the social determinants of health: Sexual and reproductive health case study.

    Science.gov (United States)

    Haley, Danielle F; Matthews, Stephen A; Cooper, Hannah L F; Haardörfer, Regine; Adimora, Adaora A; Wingood, Gina M; Kramer, Michael R

    2016-10-01

    Understanding whether and how the places where people live, work, and play are associated with health behaviors and health is essential to understanding the social determinants of health. However, social-spatial data which link a person and their attributes to a geographic location (e.g., home address) create potential confidentiality risks. Despite the growing body of literature describing approaches to protect individual confidentiality when utilizing social-spatial data, peer-reviewed manuscripts displaying identifiable individual point data or quasi-identifiers (attributes associated with the individual or disease that narrow identification) in maps persist, suggesting that knowledge has not been effectively translated into public health research practices. Using sexual and reproductive health as a case study, we explore the extent to which maps appearing in recent peer-reviewed publications risk participant confidentiality. Our scoping review of sexual and reproductive health literature published and indexed in PubMed between January 1, 2013 and September 1, 2015 identified 45 manuscripts displaying participant data in maps as points or small-population geographic units, spanning 26 journals and representing studies conducted in 20 countries. Notably, 56% (13/23) of publications presenting point data on maps either did not describe approaches used to mask data or masked data inadequately. Furthermore, 18% (4/22) of publications displaying data using small-population geographic units included at least two quasi-identifiers. These findings highlight the need for heightened education for researchers, reviewers, and editorial teams. We aim to provide readers with a primer on key confidentiality considerations when utilizing linked social-spatial data for visualizing results. Given the widespread availability of place-based data and the ease of creating maps, it is critically important to raise awareness on when social-spatial data constitute protected health

  4. Issues Raised in Relation to Radioactive Waste Management

    International Nuclear Information System (INIS)

    Atherton, Elizabeth

    2003-01-01

    Nirex has undertaken various consultations with different stakeholders to identify their issues and concerns about radioactive waste management in general and specific aspects of Nirex's work. This paper will outline what dialogue techniques Nirex has undertaken and the issues and concerns that people have raised during the events. It will outline some of the work that Nirex is undertaking to address stakeholders' issues and concerns. Nirex has used a variety of dialogue techniques co-ordinated under the Nirex Involvement Programme to engage with stakeholders about the work we undertake. We are now trying to address the issues, concerns, scenarios and questions raised in our work programme. Key lessons that we have learned in undertaking the dialogues include: The importance of appropriate facilitation and organisation of meetings; The need for a clear purpose for meetings; Being flexible to the needs of the attendees and the issues they raise; Providing feedback to those who participate and following up issues. Through engaging with the public Nirex has learned that: Radioactive waste is not an everyday concern for people; The public can, will and want to engage with the issue of radioactive waste management. This includes engaging with the ethical debate. To facilitate this Nirex and others need to: Provide information in a neutral form outlining the pros and cons and including various people's opinions; Use proactive techniques to allow access and space for people to discuss the issues; Demonstrate how people's opinions have been taken into account. People understand the issues very differently to the way institutions understand them. There is a need for institutions to learn to understand public concerns and the ways in which the public understand issues, as well as for the public to understand the institutional positions better. We are using these insights to develop our future work in this area

  5. Data-protection standards and confidentiality of HIV/AIDS status in the workplace - a South African case study.

    Science.gov (United States)

    Muskat-Gorska, Zuzanna

    2008-11-01

    The article contextualises an emerging new regime for information privacy in South Africa (i.e. the draft Protection of Personal Information Bill). Subsequently, it discusses the possibility of successful implementation of international data-protection standards in an environment where there is an urgent need to balance HIV/AIDS confidentiality rights with public health requirements. Also, the article presents a preliminary assessment of the possible impact of professionalisation (and outsourcing) of workplace HIV/AIDS management on workplace data-protection practices, and it identifies some spaces for social dialogue on HIV/AIDS-data treatment in South Africa. The study methods comprise an analysis of legal documents (concerning international data-protection standards and the development of law governing data protection and HIV/AIDS confidentiality in South Africa) and interviews conducted with workplace health managers and trade union representatives, in Johannesburg, in 2007.

  6. 5 CFR 2634.901 - Policies of confidential financial disclosure reporting.

    Science.gov (United States)

    2010-01-01

    .... (a) The confidential financial reporting system set forth in this subpart is designed to complement... Government duties involve the exercise of significant discretion in certain sensitive areas, report their... apparent conflicts of interest. The confidential financial disclosure system promotes that goal, with...

  7. Analysis of LYSA-calculus with explicit confidentiality annotations

    DEFF Research Database (Denmark)

    Gao, Han; Nielson, Hanne Riis

    2006-01-01

    Recently there has been an increased research interest in applying process calculi in the verification of cryptographic protocols due to their ability to formally model protocols. This work presents LYSA with explicit confidentiality annotations for indicating the expected behavior of target...... malicious activities performed by attackers as specified by the confidentiality annotations. The proposed analysis approach is fully automatic without the need of human intervention and has been applied successfully to a number of protocols....

  8. 5 CFR 1312.26 - Control of secret and confidential material.

    Science.gov (United States)

    2010-01-01

    ... 5 Administrative Personnel 3 2010-01-01 2010-01-01 false Control of secret and confidential... Accountability of Classified Information § 1312.26 Control of secret and confidential material. Classified... Document Control, will be used to establish accountability controls on all Secret material received or...

  9. 48 CFR 1552.235-80 - Access to confidential business information.

    Science.gov (United States)

    2010-10-01

    ... business information. 1552.235-80 Section 1552.235-80 Federal Acquisition Regulations System ENVIRONMENTAL... Clauses 1552.235-80 Access to confidential business information. As prescribed in 1535.007-70(g), insert the following clause. Access to Confidential Business Information (OCT 2000) It is not anticipated...

  10. Confidential Business Information under TSCA

    Science.gov (United States)

    This website informs businesses, policymakers, and the public about the confidential business information (CBI) provisions of § 14 of the Toxic Substances Control Act (TSCA), as amended by the Frank R. Lautenberg Chemical Safety for the 21st Century Act.

  11. 6 CFR 25.10 - Confidentiality and protection of Intellectual Property.

    Science.gov (United States)

    2010-01-01

    ... 6 Domestic Security 1 2010-01-01 2010-01-01 false Confidentiality and protection of Intellectual Property. 25.10 Section 25.10 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY REGULATIONS TO SUPPORT ANTI-TERRORISM BY FOSTERING EFFECTIVE TECHNOLOGIES § 25.10 Confidentiality and...

  12. 42 CFR 405.215 - Confidential commercial and trade secret information.

    Science.gov (United States)

    2010-10-01

    ... 42 Public Health 2 2010-10-01 2010-10-01 false Confidential commercial and trade secret information. 405.215 Section 405.215 Public Health CENTERS FOR MEDICARE & MEDICAID SERVICES, DEPARTMENT OF... trade secret information. To the extent that CMS relies on confidential commercial or trade secret...

  13. 40 CFR 260.2 - Availability of information; confidentiality of information.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 25 2010-07-01 2010-07-01 false Availability of information; confidentiality of information. 260.2 Section 260.2 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) SOLID WASTES (CONTINUED) HAZARDOUS WASTE MANAGEMENT SYSTEM: GENERAL General § 260.2 Availability of information; confidentiality of...

  14. 48 CFR 1552.235-71 - Treatment of confidential business information.

    Science.gov (United States)

    2010-10-01

    ... business information. 1552.235-71 Section 1552.235-71 Federal Acquisition Regulations System ENVIRONMENTAL... Clauses 1552.235-71 Treatment of confidential business information. As prescribed in 1535.007-70(b... determined that in the performance of a contract, EPA may furnish confidential business information to the...

  15. 7 CFR 1280.227 - Confidentiality.

    Science.gov (United States)

    2010-01-01

    ... statistical data collected therefrom, which statements do not identify the information furnished by any person... 7 Agriculture 10 2010-01-01 2010-01-01 false Confidentiality. 1280.227 Section 1280.227 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (MARKETING...

  16. 22 CFR 1101.5 - Security, confidentiality and protection of records.

    Science.gov (United States)

    2010-04-01

    ... 22 Foreign Relations 2 2010-04-01 2010-04-01 true Security, confidentiality and protection of... Bureau of Standard's booklet “Computer Security Guidelines for Implementing the Privacy Act of 1974” (May... STATES AND MEXICO, UNITED STATES SECTION PRIVACY ACT OF 1974 § 1101.5 Security, confidentiality and...

  17. Genetic secrets: Protecting privacy and confidentiality in the genetic era. Final report

    Energy Technology Data Exchange (ETDEWEB)

    Rothstein, M.A. [ed.

    1998-09-01

    Few developments are likely to affect human beings more profoundly in the long run than the discoveries resulting from advances in modern genetics. Although the developments in genetic technology promise to provide many additional benefits, their application to genetic screening poses ethical, social, and legal questions, many of which are rooted in issues of privacy and confidentiality. The ethical, practical, and legal ramifications of these and related questions are explored in depth. The broad range of topics includes: the privacy and confidentiality of genetic information; the challenges to privacy and confidentiality that may be projected to result from the emerging genetic technologies; the role of informed consent in protecting the confidentiality of genetic information in the clinical setting; the potential uses of genetic information by third parties; the implications of changes in the health care delivery system for privacy and confidentiality; relevant national and international developments in public policies, professional standards, and laws; recommendations; and the identification of research needs.

  18. REMARKS ON A GENERALIZATION OF A QUESTION RAISED BY PÁL ERDOS CONCERNING A GEOMETRIC INEQUALITY IN ˝ ACUTE TRIANGLES

    Directory of Open Access Journals (Sweden)

    Béla FINTA

    2017-12-01

    Full Text Available The purpose of this paper is to give a negative answer to a possible generalization of an open question raised by Pál Erd˝os, concerning an inequality in acute triangles. We prove here that from a < b < c does not follow a 2k + l 2k a < b2k + l 2k b < c2k + l 2k c in every acute triangle ABC, nor the opposite chain of inequalities, where k ∈ N, k ≥ 2, and a, b, c denotes the length of the triangles sites , while la, lb, lc denotes the length of the interior angle bisectors, as usual. We achieve this by constructing effectively two counterexamples, one for each type of inequalities

  19. 12 CFR 563g.13 - Public disclosure and confidential treatment.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 5 2010-01-01 2010-01-01 false Public disclosure and confidential treatment. 563g.13 Section 563g.13 Banks and Banking OFFICE OF THRIFT SUPERVISION, DEPARTMENT OF THE TREASURY SECURITIES OFFERINGS § 563g.13 Public disclosure and confidential treatment. (a) Any offering circular...

  20. 21 CFR 821.55 - Confidentiality.

    Science.gov (United States)

    2010-04-01

    ... permission to release, the patient's name, address, telephone number, and social security number, or other... MEDICAL DEVICE TRACKING REQUIREMENTS Records and Inspections § 821.55 Confidentiality. (a) Any patient... identify patient or research subjects shall not be available for public disclosure except as provided in...

  1. Conflicting duties over confidentiality in Argentina and Peru.

    Science.gov (United States)

    Cavallo, Mercedes

    2011-02-01

    The medical duty of confidentiality represents a key element for the provision of reproductive and sexual health services. In some Latin American countries, such as Argentina and Peru, the legal systems impose—or are interpreted as imposing—on health professionals the duty of confidentiality, but also the duty to report the commission of a public order offense that they know about owing to the practicing of their profession. In these countries, the conflicting duties and the criminalization of abortion cause severe public health and human rights problems when health professionals assist their patients for post-abortion treatment. Typically, patients are deterred from seeking prompt medical care, and their privacy, autonomy, and dignity are violated. A 2010 ruling from the Supreme Court of Argentina and a 2004 ruling from the Inter-American Court of Human Rights emerge as important instruments that grant a more adequate protection of medical confidentiality. © 2010 International Federation of Gynecology and Obstetrics. Published by Elsevier Ireland Ltd. All rights reserved.

  2. Confidential patent application with an example of preparation

    Directory of Open Access Journals (Sweden)

    Obrad T. Čabarkapa

    2013-12-01

    Full Text Available In order that the invention solving a technical problem receives a patent protection, it is necessary to file a patent application. For the protection of confidential inventions which are important for defense and national security, a confidential patent application[1] must be filed. A confidential patent application is an important and complex document, the parts of which are,  in principle, exposed in an established order. For the preparation of patent applications, it is necessary to engage experts with higher education, primarily in the technical field the invention relates to. The contents of the patent application is a basis for examining whether the application meets the requirements for patentability and whether the right to patent protection is achieved. Besides theoretical discussions on patent application, the paper gives a short version of an example of an application regarding a protected confidential invention. Introduction The basic condition for the exercise of patent protection is filing a patent application, the test procedure and, eventually, depending on the test results - the recognition or rejection of the patent. The paper gives a description of all parts of the patent application on an example of a confidential invention already patented. The content of the confidential patent application The confidential patent application for confidential invention protection consists of the following parts: The application for a patent; description of the invention; the claims (indication of what is new and what is required to be protected by patenting; abstract (short summary of the invention  and a draft of the invention (to which the description and the claims are referred. The application for a patent The application for patent is filed on Form P-1 and a request for the petty patent on Form MP-1. The data entered in the file is, for example: the applicant; the lawyer; the name of the invention in Serbian and English; the inventor

  3. Confidentiality with Minors: The Need for Policy To Promote and Protect.

    Science.gov (United States)

    Stone, Carolyn; Isaacs, Madelyn L.

    2003-01-01

    Investigated school counselors' attitudes toward breaching confidentiality before and after the 1999 Columbine High School shootings. Surveys of demographically similar counselors indicated that the Columbine shootings affected counselors' predictions about their attitudes and behavior regarding confidentiality. Counselors were more reluctant to…

  4. 42 CFR 93.108 - Confidentiality.

    Science.gov (United States)

    2010-10-01

    ... 42 Public Health 1 2010-10-01 2010-10-01 false Confidentiality. 93.108 Section 93.108 Public Health PUBLIC HEALTH SERVICE, DEPARTMENT OF HEALTH AND HUMAN SERVICES HEALTH ASSESSMENTS AND HEALTH EFFECTS STUDIES OF HAZARDOUS SUBSTANCES RELEASES AND FACILITIES PUBLIC HEALTH SERVICE POLICIES ON RESEARCH...

  5. 40 CFR 710.58 - Confidentiality.

    Science.gov (United States)

    2010-07-01

    ...) Any person submitting information under this subpart may assert a business confidentiality claim for... with reporting under this subpart? How could a competitor use such information? Would the effects of... that your competitors do not know it is being manufactured or imported for a commercial purpose by...

  6. Participants' safety versus confidentiality: A case study of HIV research.

    Science.gov (United States)

    Leyva-Moral, Juan Manuel; Feijoo-Cid, Maria

    2017-05-01

    Background When conducting qualitative research, participants usually share lots of personal and private information with the researcher. As researchers, we must preserve participants' identity and confidentiality of the data. Objective To critically analyze an ethical conflict encountered regarding confidentiality when doing qualitative research. Research design Case study. Findings and discussion one of the participants in a study aiming to explain the meaning of living with HIV verbalized his imminent intention to commit suicide because of stigma of other social problems arising from living with HIV. Given the life-threatening situation, the commitment related to not disclosing the participant's identity and/or the content of the interview had to be broken. To avoid or prevent suicide, the therapist in charge of the case was properly informed about the participant's intentions. One important question arises from this case: was it ethically appropriate to break the confidentiality commitment? Conclusion confidentiality could be broken if a life-threatening event is identified during data collection and participants must know that. This has to be clearly stated in the informed consent form.

  7. Meaningful Use of a Confidential Adolescent Patient Portal.

    Science.gov (United States)

    Thompson, Lindsay A; Martinko, Thomas; Budd, Pamela; Mercado, Rebeccah; Schentrup, Anzeela M

    2016-02-01

    To design and evaluate the usage of an adolescent patient portal specifically adapted for adolescent health care needs that also satisfied institutional meaningful use guidelines regarding electronic health records. Key stakeholders at one academic health care center adopted an online portal and opted to designate a patient portal specifically for adolescents to maximize confidentiality in compliance with state privacy laws. This study analyzed aggregate electronic health record data of adolescents' (ages 12-17.9 years) uptake, usage, and functionality of this portal and compared it to parent portal usage for younger children (ages 0-11 years). Differences in means were calculated using paired t tests. The portal was used similarly between parents of young children and adolescents, with almost 1,000 enrollees in each group from September 1, 2012 to March 31, 2015. There were no gender differences in enrollment. Adolescents were less likely than parents of younger children to review appointments (73% vs. 85%), laboratory tests (67% vs. 79%), problem lists (40% vs. 78%), or allergies (45% vs. 77%, all p values adolescents sent 1,397 confidential messages. Institutional decisions for implementing meaningful use requirements can align with goals of adolescent health. Patient portals can enhance adolescent health care quality and adolescents readily use a confidential portal. Implementation of meaningful use requirements should be checked against adolescent health care needs to maximize confidentiality and promote health communication. Copyright © 2016 Society for Adolescent Health and Medicine. Published by Elsevier Inc. All rights reserved.

  8. 31 CFR 129.5 - Confidentiality.

    Science.gov (United States)

    2010-07-01

    ... 31 Money and Finance: Treasury 1 2010-07-01 2010-07-01 false Confidentiality. 129.5 Section 129.5 Money and Finance: Treasury Regulations Relating to Money and Finance PORTFOLIO INVESTMENT SURVEY... contain data aggregated in such a way that neither the person supplying the information nor the investor...

  9. 40 CFR 710.38 - Confidentiality.

    Science.gov (United States)

    2010-07-01

    ... submitting information under this part may assert a business confidentiality claim for the information. The... with reporting under this part? How could a competitor use such information? Would the effects of... that your competitors do not know it is being manufactured or imported for a commercial purpose by...

  10. THE PRINCIPLE OF CONFIDENTIALITY IN ARBITRATION. APPLICATION AND LIMITATIONS OF THE PRINCIPLE

    Directory of Open Access Journals (Sweden)

    Bazil Oglindă

    2015-11-01

    Full Text Available Over the years, arbitration has grown to be the preferred means of dispute resolution by commercial entities. One of the benefits that build the attraction for this system of dispute resolution was the principle of confidentiality. One issue that needs to be analyzed is about the reasons why confidentiality is so important in business. Confidentiality is a principle largely embraced in arbitration, but, as we will see, the principle is not an absolute one. There are a set of questions that needs to be answer to, like: Who is bound by the duty of confidentiality? Does this refer only to the parties or does it expands to other actors involved in the arbitral proceedings? What happens with the obligation of confidentiality when issues are brought before a court, taking in account the principle of open justice? We will see that in some countries are procedural laws allowing the courts to order an arbitration claim to be heard in public or in private. Another important aspect that has arisen in the last period is regarding the public policy and the protection of public interest as a limitation to confidentiality of arbitration. This is a sensitive matter especially when one of the parties is a state or a state entity. This study aims to explore the principle of confidentiality in arbitration by focusing on its domain and on its limits, both from the comparative approach and from the Romanian approach. Knowing all this aspects, we will realize the importance of having professional counseling when drafting an arbitration clause and how this can be the missing puzzle piece of your business.

  11. Balancing Scientific Publication and National Security Concerns: Issues for Congress

    Science.gov (United States)

    2003-07-09

    10 Rick Weiss, “Polio-Causing Virus Created in N.Y. Lab: Made-From-Scratch Pathogen Prompts Concerns About Bioethics , Terrorism,” The Washington...Human Services or with the Department of Agriculture , depending on the nature of the select agent. Most universities generally reconcile their dual roles...economic, human, financial, industrial, agricultural , technological, and law enforcement information, as well as the privacy or confidentiality of

  12. 41 CFR 105-60.405 - Processing requests for confidential commercial information.

    Science.gov (United States)

    2010-07-01

    ... MATERIALS 60.4-Described Records § 105-60.405 Processing requests for confidential commercial information... 41 Public Contracts and Property Management 3 2010-07-01 2010-07-01 false Processing requests for confidential commercial information. 105-60.405 Section 105-60.405 Public Contracts and Property Management...

  13. Privacy and confidentiality: perspectives of mental health consumers and carers in pharmacy settings.

    Science.gov (United States)

    Hattingh, Hendrika Laetitia; Knox, Kathy; Fejzic, Jasmina; McConnell, Denise; Fowler, Jane L; Mey, Amary; Kelly, Fiona; Wheeler, Amanda J

    2015-02-01

    The study aims to explore within the community pharmacy practice context the views of mental health stakeholders on: (1) current and past experiences of privacy, confidentiality and support; and (2) expectations and needs in relation to privacy and confidentiality. In-depth interviews and focus groups were conducted in three states in Australia, namely Queensland, the northern region of New South Wales and Western Australia, between December 2011 and March 2012. There were 98 participants consisting of consumers and carers (n = 74), health professionals (n = 13) and representatives from consumer organisations (n = 11). Participants highlighted a need for improved staff awareness. Consumers indicated a desire to receive information in a way that respects their privacy and confidentiality, in an appropriate space. Areas identified that require improved protection of privacy and confidentiality during pharmacy interactions were the number of staff having access to sensitive information, workflow models causing information exposure and pharmacies' layout not facilitating private discussions. Challenges experienced by carers created feelings of isolation which could impact on care. This study explored mental health stakeholders' experiences and expectations regarding privacy and confidentiality in the Australian community pharmacy context. A need for better pharmacy staff training about the importance of privacy and confidentiality and strategies to enhance compliance with national pharmacy practice requirements was identified. Findings provided insight into privacy and confidentiality needs and will assist in the development of pharmacy staff training material to better support consumers with sensitive conditions. © 2014 Royal Pharmaceutical Society.

  14. The erosion of psychiatrist-patient confidentiality by subpoenas.

    Science.gov (United States)

    Levy, John; Galambos, Gary; Skarbek, Yvonne

    2014-08-01

    We explore the reasons for the prolific use of subpoenas to gain access to psychiatric records in Australia. We examine the applicable legal principles and practices at the New South Wales (NSW) and Commonwealth levels, aiming to develop recommendations for Australian Governments to curb the inappropriate and harmful use of subpoenas. Unfettered legal access to psychiatric records is inconsistent with professional ethical guidelines and risks undermining the provision of quality psychiatric care to the community. The existing legal provisions are failing to protect psychiatrist-patient confidentiality. In NSW, the onus is placed on the psychiatrist and/or patient to make a complicated application to the court, to direct that a subpoena be set aside on the grounds of "Professional Confidential Relationship Privilege." An absence of Commonwealth legislation to protect psychiatrist-patient confidentiality is used by some litigants in family law proceedings to disadvantage patients by stigmatising them, because they have consulted psychiatrists. We recommend that uniform legislation be implemented, giving effect to a primary rule of privilege with exceptions. © The Royal Australian and New Zealand College of Psychiatrists 2014.

  15. Improved Message Authentication and Confidentiality Checking

    International Nuclear Information System (INIS)

    Ismail Jabiullah, M.; Abdullah Al-Shamim, M.; Lutfar Rahman, M.

    2005-01-01

    The most confusing areas of the secured network communications are the message authentication and confidentiality checking. The attacks and the counter measures have become so convoluted that the users in this area begin to account for all contingencies. Two session-key generation techniques are used here to generate two separate session keys K 1 and K 2 ; and both the sender and the reveiver share these keys for higher degree of authentication and confidentiality. For this, the message is first encrypted by the key K 1 , and then the intermediary message authenticatin code (MAC) is generated by encrypting the encrypted message using the key K 2 . Then, the encrypted message and the intermediary MAC is again encrypted by using the K 2 and concatenated with the encrypted message and sent to the destination. At the receiving end, first, the received ciphertext is encrypted by using key K 2 and compared to the received MAC. The received ciphertext again is decrypted by the key K 2 and compared with the first decrypted MAC twice by the key K 2 . The plaintext is obtained by decrypting the received ciphertext first by K 2 and then by K 1 , using the corresponding decryption techniques respectively. The encryption techniques with key K 2 provides the authentication and with key K 1 provides the confidentiality checking of the transmitted message. The developed technique can be applied to both academic and commercial applications in online or offline electronic transactions for security.(authors)

  16. Access control and confidentiality in radiology

    Science.gov (United States)

    Noumeir, Rita; Chafik, Adil

    2005-04-01

    A medical record contains a large amount of data about the patient such as height, weight and blood pressure. It also contains sensitive information such as fertility, abortion, psychiatric data, sexually transmitted diseases and diagnostic results. Access to this information must be carefully controlled. Information technology has greatly improved patient care. The recent extensive deployment of digital medical images made diagnostic images promptly available to healthcare decision makers, regardless of their geographic location. Medical images are digitally archived, transferred on telecommunication networks, and visualized on computer screens. However, with the widespread use of computing and communication technologies in healthcare, the issue of data security has become increasingly important. Most of the work until now has focused on the security of data communication to ensure its integrity, authentication, confidentiality and user accountability. The mechanisms that have been proposed to achieve the security of data communication are not specific to healthcare. Data integrity can be achieved with data signature. Data authentication can be achieved with certificate exchange. Data confidentiality can be achieved with encryption. User accountability can be achieved with audits. Although these mechanisms are essential to ensure data security during its transfer on the network, access control is needed in order to ensure data confidentiality and privacy within the information system application. In this paper, we present and discuss an access control mechanism that takes into account the notion of a care process. Radiology information is categorized and a model to enforce data privacy is proposed.

  17. University Student Expectations of Confidentiality When Disclosing Information to Their Professors

    Science.gov (United States)

    Harris, Gregory E.; Dalton, Stephanie

    2014-01-01

    The purpose of this study was to explore university students' expectations of confidentiality when they make disclosures to their university professors. A secondary purpose was to consider if students have a higher expectation of confidentiality when talking with Psychology professors versus professors in other disciplines. Students were asked to…

  18. 18 CFR 270.506 - Confidentiality.

    Science.gov (United States)

    2010-04-01

    ... 18 Conservation of Power and Water Resources 1 2010-04-01 2010-04-01 false Confidentiality. 270.506 Section 270.506 Conservation of Power and Water Resources FEDERAL ENERGY REGULATORY COMMISSION...) through (9) of 5 U.S.C. 552(b). (b) Upon receipt of a request for disclosure of information treated as...

  19. Privacy and Confidentiality Practices In Adolescent Family Planning Care At Federally Qualified Health Centers.

    Science.gov (United States)

    Beeson, Tishra; Mead, Katherine H; Wood, Susan; Goldberg, Debora Goetz; Shin, Peter; Rosenbaum, Sara

    2016-03-01

    The confidentiality of family planning services remains a high priority to adolescents, but barriers to implementing confidentiality and privacy practices exist in settings designed for teenagers who are medically underserved, including federally qualified health centers (FQHCs). A sample of 423 FQHCs surveyed in 2011 provided information on their use of five selected privacy and confidentiality practices, which were examined separately and combined into an index. Regression modeling was used to assess whether various state policies and organizational characteristics were associated with FQHCs' scores on the index. In-depth case studies of six FQHCs were conducted to provide additional contextual information. Among FQHCs reporting on confidentiality, most reported providing written or verbal information regarding adolescents' rights to confidential care (81%) and limiting access to family planning and medical records to protect adolescents' confidentiality (84%). Far fewer reported maintaining separate medical records for family planning (10%), using a security block on electronic medical records to prevent disclosures (43%) or using separate contact information for communications regarding family planning services (50%). Index scores were higher among FQHCs that received Title X funding than among those that did not (coefficient, 0.70) and among FQHCs with the largest patient volumes than among those with the smallest caseloads (0.43). Case studies highlighted how a lack of guidelines and providers' confusion over relevant laws present a challenge in offering confidential care to adolescents. The organizational practices used to ensure adolescent family planning confidentiality in FQHCs are varied across organizations. Copyright © 2016 by the Guttmacher Institute.

  20. 7 CFR 900.309 - Confidential information.

    Science.gov (United States)

    2010-01-01

    ... Conduct of Referenda To Determine Producer Approval of Milk Marketing Orders To Be Made Effective Pursuant to Agricultural Marketing Agreement Act of 1937, as Amended § 900.309 Confidential information. The... Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (Marketing...

  1. 7 CFR 1216.62 - Confidential treatment.

    Science.gov (United States)

    2010-01-01

    ... this subpart or statistical data collected therefrom, which statements do not identify the information... 7 Agriculture 10 2010-01-01 2010-01-01 false Confidential treatment. 1216.62 Section 1216.62 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (MARKETING...

  2. 7 CFR 1209.62 - Confidential treatment.

    Science.gov (United States)

    2010-01-01

    ... this subpart or statistical data collected therefrom, which statements do not identify the information... 7 Agriculture 10 2010-01-01 2010-01-01 false Confidential treatment. 1209.62 Section 1209.62 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (MARKETING...

  3. 7 CFR 929.65 - Confidential information.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 8 2010-01-01 2010-01-01 false Confidential information. 929.65 Section 929.65 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (Marketing... position, financial condition, or business operations of the particular handler from whom received, shall...

  4. 7 CFR 930.73 - Confidential information.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 8 2010-01-01 2010-01-01 false Confidential information. 930.73 Section 930.73 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (Marketing... a trade secret or disclosing trade position, financial condition, or business operations of the...

  5. The case of H.S.: the ethics of reporting alcohol dependence in a bus driver.

    Science.gov (United States)

    Karol, David E; Schuermeyer, Isabel N; Brooker, Craig A

    2007-01-01

    The physician's duty to preserve patient confidentiality is challenged when doing so may endanger third parties. We present the case of a bus driver whose alcohol dependence raised concerns of a risk not only to his own health and safety, but to public safety as well. We first examine the legal and ethical obligations to report his alcohol use to his employer and then stress the importance of weighing the potential harm of violating patient-physician confidentiality against the severity of risk to the general public.

  6. 7 CFR 1150.173 - Confidential treatment.

    Science.gov (United States)

    2010-01-01

    ... reports of the number of persons subject to this subpart or statistical data collected therefrom, which... 7 Agriculture 9 2010-01-01 2009-01-01 true Confidential treatment. 1150.173 Section 1150.173 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (Marketing...

  7. 7 CFR 1221.127 - Confidential treatment.

    Science.gov (United States)

    2010-01-01

    ... statistical data collected there from, which statements do not identify the information furnished by any... 7 Agriculture 10 2010-01-01 2010-01-01 false Confidential treatment. 1221.127 Section 1221.127 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (MARKETING...

  8. 7 CFR 1160.403 - Confidential treatment.

    Science.gov (United States)

    2010-01-01

    ... statistical data collected from such sources, which statements do not identify the information furnished by... 7 Agriculture 9 2010-01-01 2009-01-01 true Confidential treatment. 1160.403 Section 1160.403 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (Marketing...

  9. 7 CFR 1250.354 - Confidential treatment.

    Science.gov (United States)

    2010-01-01

    ... subject to this subpart or statistical data collected therefrom, which statements do not identify the... 7 Agriculture 10 2010-01-01 2010-01-01 false Confidential treatment. 1250.354 Section 1250.354 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (MARKETING...

  10. 7 CFR 1260.203 - Confidential treatment.

    Science.gov (United States)

    2010-01-01

    ... of persons subject to this subpart or statistical data collected therefrom, which statements do not... 7 Agriculture 10 2010-01-01 2010-01-01 false Confidential treatment. 1260.203 Section 1260.203 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (MARKETING...

  11. 7 CFR 1218.62 - Confidential treatment.

    Science.gov (United States)

    2010-01-01

    ... of the number of persons subject to this subpart or statistical data collected therefrom, which... 7 Agriculture 10 2010-01-01 2010-01-01 false Confidential treatment. 1218.62 Section 1218.62 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (MARKETING...

  12. 7 CFR 1215.62 - Confidential treatment.

    Science.gov (United States)

    2010-01-01

    ... persons subject to this part or statistical data collected therefrom, which statements do not identify the... 7 Agriculture 10 2010-01-01 2010-01-01 false Confidential treatment. 1215.62 Section 1215.62 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (MARKETING...

  13. 7 CFR 1210.607 - Confidential information.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 10 2010-01-01 2010-01-01 false Confidential information. 1210.607 Section 1210.607 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (MARKETING... contents and all other information or reports furnished to, compiled by, or in possession of, the...

  14. 7 CFR 1210.352 - Confidential treatment.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 10 2010-01-01 2010-01-01 false Confidential treatment. 1210.352 Section 1210.352 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (MARKETING... treatment. (a) All information obtained from the books, records, or reports required to be maintained under...

  15. 7 CFR 984.79 - Confidential information.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 8 2010-01-01 2010-01-01 false Confidential information. 984.79 Section 984.79 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (Marketing... or disclosing the trade position, or financial condition or business operations of the handler shall...

  16. 7 CFR 993.71 - Confidential information.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 8 2010-01-01 2010-01-01 false Confidential information. 993.71 Section 993.71 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (Marketing... information constituting a trade secret or disclosing of the trade position, financial condition, or business...

  17. 7 CFR 932.63 - Confidential information.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 8 2010-01-01 2010-01-01 false Confidential information. 932.63 Section 932.63 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (Marketing... from such reports and records which might affect the trade position, financial condition, or business...

  18. 7 CFR 982.70 - Confidential information.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 8 2010-01-01 2010-01-01 false Confidential information. 982.70 Section 982.70 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (Marketing... trade secret or disclosing of the trade position, financial condition, or business operations of the...

  19. 48 CFR 1552.235-76 - Treatment of Confidential Business Information (APR 1996).

    Science.gov (United States)

    2010-10-01

    ... Business Information (APR 1996). 1552.235-76 Section 1552.235-76 Federal Acquisition Regulations System... Provisions and Clauses 1552.235-76 Treatment of Confidential Business Information (APR 1996). As prescribed in 1535.007-70(c), insert the following clause: Treatment of Confidential Business Information (TSCA...

  20. 48 CFR 1552.235-70 - Screening business information for claims of confidentiality.

    Science.gov (United States)

    2010-10-01

    ... 48 Federal Acquisition Regulations System 6 2010-10-01 2010-10-01 true Screening business... Texts of Provisions and Clauses 1552.235-70 Screening business information for claims of confidentiality... proprietary or confidential by the business that has the right to the information. The following clause...

  1. 7 CFR 1212.72 - Confidential treatment.

    Science.gov (United States)

    2010-01-01

    ... statements based upon the reports of the number of persons subject to this subpart or statistical data... 7 Agriculture 10 2010-01-01 2010-01-01 false Confidential treatment. 1212.72 Section 1212.72 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (MARKETING...

  2. 7 CFR 1206.62 - Confidential treatment.

    Science.gov (United States)

    2010-01-01

    ... statements based upon the reports of the number of persons subject to this subpart or statistical data... 7 Agriculture 10 2010-01-01 2010-01-01 false Confidential treatment. 1206.62 Section 1206.62 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (MARKETING...

  3. 7 CFR 1219.63 - Confidential treatment.

    Science.gov (United States)

    2010-01-01

    ... upon the reports of the number of persons subject to this subpart or statistical data collected from... 7 Agriculture 10 2010-01-01 2010-01-01 false Confidential treatment. 1219.63 Section 1219.63 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (MARKETING...

  4. 7 CFR 983.65 - Confidential information.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 8 2010-01-01 2010-01-01 false Confidential information. 983.65 Section 983.65 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (Marketing... the particular handler or their customers shall be received by, and at all times kept in the custody...

  5. 7 CFR 996.72 - Confidential information.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 8 2010-01-01 2010-01-01 false Confidential information. 996.72 Section 996.72 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (Marketing... condition, or business operations of the particular handlers or their customers shall be received by, and at...

  6. Confidential Declaration of Family Situation (CDFS)

    CERN Document Server

    Human Resources Department

    2005-01-01

    The Confidential Declaration of Family Situation (CDFS) becomes a new computerized EDH form from October 2005 In accordance with Article R IV 1.17 of the Staff Regulations, Staff Members and Fellows, married or separated, must notify any changes in their spouse's income or health insurance cover in writing to CERN, within 30 calendar days of the change. This is necessary for the Organization to determine if a supplementary contribution is payable to the CERN Health Insurance Scheme (CHIS) for the spouse's coverage and, if so, the amount. Until now a paper form called « Confidential Declaration of Family Situation » (CDFS) was used for that purpose.  From early October 2005 the CDFS will be computerized for the whole Organization. Henceforth, any changes in a spouse's income or health insurance cover must be notified using EDH (Electronic Document Handling). Additionally, annual updates of the declaration will be required and will be requested by automatic e-mail. Early October an email will be sent to...

  7. 48 CFR 1552.235-73 - Access to Federal Insecticide, Fungicide, and Rodenticide Act Confidential Business Information...

    Science.gov (United States)

    2010-10-01

    ... Insecticide, Fungicide, and Rodenticide Act Confidential Business Information (APR 1996). 1552.235-73 Section... Insecticide, Fungicide, and Rodenticide Act Confidential Business Information (APR 1996). As prescribed in... Act Confidential Business Information (APR 1996) In order to perform duties under the contract, the...

  8. Audit, Accountability and Confidential Enquiries into Maternal ...

    African Journals Online (AJOL)

    HP

    Time for Action: Audit, Accountability and Confidential Enquiries ... provision of quality maternity services. Having such a ... services are more likely to be sustained if women can find ..... Donabedian A. An introduction to quality assurance in.

  9. 77 FR 63537 - Greenhouse Gas Reporting Program: Proposed Amendments and Confidentiality Determinations for...

    Science.gov (United States)

    2012-10-16

    ... Greenhouse Gas Reporting Program: Proposed Amendments and Confidentiality Determinations for Subpart I...-AR61 Greenhouse Gas Reporting Program: Proposed Amendments and Confidentiality Determinations for... Manufacturing, of the Greenhouse Gas Reporting Rule. Proposed changes include revising certain calculation...

  10. Paternalistic breaches of confidentiality in prison: mental health professionals' attitudes and justifications.

    Science.gov (United States)

    Elger, Bernice Simone; Handtke, Violet; Wangmo, Tenzin

    2015-06-01

    This manuscript presents mental health practitioners' (MHPs) practice, attitudes and justifications for breaching confidentiality when imprisoned patients disclose suicidal thoughts or abuse by others. 24 MHPs working in Swiss prisons shared their experiences regarding confidentiality practices. The data were analysed qualitatively and MHPs' attitudes and course of action were identified. Analysis revealed paternalistic breaches of confidentiality. When patients reported suicidal thoughts and abuse, MHPs believed that forgoing confidentiality is necessary to protect patients, providing several justifications for it. Patients were informed that such information will be transmitted without their consent to medical and non-medical prison personnel. With reference to suicidal attempts, MHPs resorted to methods that may reduce suicidal attempts such as transfer to hospital or internal changes in living arrangements, which would require provision of certain information to prison guards. In cases of abuse, some MHPs convinced patients to accept intervention or sometimes overrode competent patients' refusals to report. Also in the case of abuse, provision of limited information to other prison personnel was seen as an acceptable method to protect patients from further harm. Breaches of confidentiality, whether limited or full, remain unethical, when used for competent patients based solely on paternalistic justifications. Institutionalising ethical and legal procedures to address suicidal and abuse situations would be helpful. Education and training to help both medical and prison personnel to respond to such situations in an appropriate manner that ensures confidentiality and protects patients from suicide and abuse are necessary. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://group.bmj.com/group/rights-licensing/permissions.

  11. 48 CFR 1552.235-75 - Access to Toxic Substances Control Act Confidential Business Information (APR 1996).

    Science.gov (United States)

    2010-10-01

    ... Control Act Confidential Business Information (APR 1996). 1552.235-75 Section 1552.235-75 Federal... Confidential Business Information (APR 1996). As prescribed in 1535.007(b), insert the following provision: Access to Toxic Substances Control Act Confidential Business Information (APR 1996) In order to perform...

  12. How often do head and neck cancer patients raise concerns related to intimacy and sexuality in routine follow-up clinics?

    Science.gov (United States)

    Rogers, S N; Hazeldine, P; O'Brien, K; Lowe, D; Roe, B

    2015-01-01

    Intimacy and sexuality problems are underreported in head and neck cancer patients. The aim of this study was to collate the various prompts available in a routine follow-up clinic through the use of an intimacy screening question and Patient's Concerns Inventory (PCI), and to identify how often these problems were raised by patients and what possible actions took place as a consequence. 177 patients completed the intimacy screening question, PCI and UW-QOLv.4 at follow-up clinics, from October 2008 to January 2011. Case note review identified if intimacy was mentioned in clinic letters and if referral for support was made. On the intimacy screening question, 15 % (26) reported problems of considerable/some concern (24) or selected intimacy/sexuality on the PCI (2). The PCI identified that 9 of the 24 reporting the worst problems wanted the topic discussed in clinic, and clinic letters suggested that 5 of these discussed the issue in clinic with 4 being referred on, 3 to a clinical psychologist and 1 to a clinical nurse specialist. Intimacy problems are underreported in clinic reviews. It is a difficult subject to discuss. It will remain a potential unmet need unless attempts are made to advance the opportunities for patient screening, information leaflets, staff training on how to talk about such sensitive issues and referral for counselling.

  13. 30 CFR 210.40 - Will MMS keep the information I provide confidential?

    Science.gov (United States)

    2010-07-01

    ... 30 Mineral Resources 2 2010-07-01 2010-07-01 false Will MMS keep the information I provide... MINERALS REVENUE MANAGEMENT FORMS AND REPORTS General Provisions § 210.40 Will MMS keep the information I provide confidential? The MMS will treat information obtained under this part as confidential to the...

  14. The Role of Employee Whistleblowing and Raising Concerns in an Organizational Learning Culture - Elusive and Laudable?: Comment on "Cultures of Silence and Cultures of Voice: The Role of Whistleblowing in Healthcare Organisations".

    Science.gov (United States)

    Jones, Aled

    2015-10-05

    It is inevitable that healthcare workers throughout their careers will witness actual or potential threats to patient safety in the course of their work. Some of these threats will result in serious harm occurring to others, whilst at other times such threats will result in minimal harm, or a 'near miss' where harm is avoided at the last minute. Despite organizations encouraging employees to 'speak up' about such threats, healthcare systems globally struggle to engage their staff to do so. Even when staff do raise concerns they are often ignored by those with a responsibility to listen and act. Learning how to create the conditions where employees continuously raise and respond to concerns is essential in creating a continuous and responsive learning culture that cherishes keeping patients and employees safe. Workplace culture is a real barrier to the creation of such a learning system but examples in healthcare exist from which we can learn. © 2016 by Kerman University of Medical Sciences.

  15. Confidential data in a competitive utility environment: A regulatory perspective

    Energy Technology Data Exchange (ETDEWEB)

    Vine, E.

    1996-08-01

    Historically, the electric utility industry has been regarded as one of the most open industries in the United States in sharing information but their reputation is being challenged by competitive energy providers, the general public, regulators, and other stakeholders. As the prospect of competition among electricity power providers has increased in recent years, many utilities have been requesting that the data they submit to their utility regulatory commissions remain confidential. Withholding utility information from the public is likely to have serious and significant policy implications with respect to: (1) consumer education, the pursuit of truth, mutual respect among parties, and social cooperation; (2) the creation of a fair market for competitive energy services; (3) the regulatory balance; (4) regional and national assessments of energy-savings opportunities; (5) research and development; and (6) evaluations of utility programs, plans, and policies. In a telephone survey of all public utility commissions (PUCs) that regulate electric and gas utilities in the U.S., we found that almost all PUCs have received requests from utility companies for data to be filed as confidential, and confidential data filings appear to have increased (both in scope and in frequency) in those states where utility restructuring is being actively discussed. The most common types of data submitted as confidential by utilities dealt with specific customer data, market data, avoided costs, and utility costs.

  16. Security without obscurity a guide to confidentiality, authentication, and integrity

    CERN Document Server

    Stapleton, JJ

    2014-01-01

    The traditional view of information security includes the three cornerstones: confidentiality, integrity, and availability; however the author asserts authentication is the third keystone. As the field continues to grow in complexity, novices and professionals need a reliable reference that clearly outlines the essentials. Security without Obscurity: A Guide to Confidentiality, Authentication, and Integrity fills this need. Rather than focusing on compliance or policies and procedures, this book takes a top-down approach. It shares the author's knowledge, insights, and observations about infor

  17. Attitude of Lithuanian residents to confidentiality of adolescent sexual and reproductive health care

    DEFF Research Database (Denmark)

    Jaruseviciene, Lina; Lazarus, Jeff; Zaborskis, Apolinaras

    2011-01-01

    To assess the attitudes of Lithuanian residents towards the protection of confidentiality in the sexual and reproductive health care of adolescents.......To assess the attitudes of Lithuanian residents towards the protection of confidentiality in the sexual and reproductive health care of adolescents....

  18. 17 CFR 200.83 - Confidential treatment procedures under the Freedom of Information Act.

    Science.gov (United States)

    2010-04-01

    ... SECURITIES AND EXCHANGE COMMISSION ORGANIZATION; CONDUCT AND ETHICS; AND INFORMATION AND REQUESTS Information... first received by the Commission (i) it is supplied segregated from information for which confidential..., 100 F Street, NE., Washington, DC 20549. The person requesting confidential treatment may supply...

  19. Confidentiality, anonymity and amnesty for midwives in distress seeking online support - Ethical?

    Science.gov (United States)

    Pezaro, Sally; Clyne, Wendy; Gerada, Clare

    2018-06-01

    Midwife health is intrinsically linked to the quality of safe patient care. To ensure safe patient care, there is a need to deliver emotional support to midwives. One option that midwives may turn to may be a confidential online intervention, instead of localised, face-to-face support. Following the Realist And MEta-narrative Evidence Syntheses: Evolving Standards publication standards, this realist synthesis approach explores the ethical considerations in permitting confidentiality, anonymity and amnesty in online interventions to support midwives in work-related psychological distress. An iterative search methodology was used to select nine papers for review. To assimilate information, papers were examined for ideas relating to ethical dimensions of online interventions to support midwives in work-related psychological distress. This review takes a narrative approach. Online interventions can support the development of insight, help seeking and open discussion. Additionally, Internet support groups can become morally persuasive in nature. Anonymity and confidentiality are both effective and therapeutic features of online interventions when used in collaboration with effective online moderation. Yet, ethical dilemmas remain where users cannot be identified. Confidentiality and anonymity remain key components of successful online interventions. However, sanctioning the corollary component of amnesty may provoke moral discomfort for those seeking immediate accountability. For others, amnesty is seen as essential for open disclosure and help seeking. Ultimately, the needs of midwives must be balanced with the requirement to protect the public and the professional reputation of midwifery. In supporting midwives online, the principles of anonymity, confidentiality and amnesty may evoke some resistance on ethical grounds. However, without offering identity protection, it may not be possible to create effective online support services for midwives. The authors of this

  20. Attitudes toward medical and genetic confidentiality in the Saudi research biobank: An exploratory survey.

    Science.gov (United States)

    Alahmad, Ghiath; Hifnawy, Tamer; Abbasi, Badaruddin; Dierickx, Kris

    2016-03-01

    Achieving a balance between giving access to information and respecting donors' confidentiality is a crucial issue for any biobank, with its large number of samples and associated information. Despite the existence of much empirical literature on confidentiality, there are too few surveys in the Middle East about the topic, particularly in the Saudi context. A survey was conducted of 200 respondents at King Abdulaziz Medical City in Riyadh, Saudi Arabia, among 5 groups of equal size, comprised of researchers, physicians, medical students, donors and laypersons, respectively. The majority of participants agreed that confidentiality is an important issue and that it is well protected in the Saudi biobank. All 5 groups showed different attitudes toward disclosing information to various third parties. They were in favor of allowing treating physicians, and to a certain extent family members, to have access to medical and genetic results from research. No significant differences were found between views on medical and genetic confidentiality. The majority of respondents agreed that confidentiality might be breached in cases with specific justified reasons. Even considering differences in religion, culture and other factors, the results of the study were consistent with those reported in the literature and research conducted in other countries. We therefore place emphasis on the importance of protecting and promoting patient/donor confidentiality and privacy. Copyright © 2016. Published by Elsevier Ireland Ltd.

  1. THE EXCEPTION OF UNCONSTITUTIONALITY RAISED BEFORE AN INTERNATIONAL ARBITRAL TRIBUNAL

    OpenAIRE

    Eugen HURUBÃ; Luminita GABURA

    2014-01-01

    The main aim of the paper work is to determine whether the Constitutional Court of Romania could be notified by international tribunals in relation to cases tried under Romanian law. On 5 March 2013 the Constitutional Court of Romania decided, for the first time, on a case concerning an exception of unconstitutionality raised before an international tribunal of commercial arbitration. The exception of unconstitutionality of a Government Emergency Ordinance was raised in an arbitration case pe...

  2. Concerns Over the Expansion of Artificial Intelligence in the Legal Field

    OpenAIRE

    Einhouse, Ben

    2018-01-01

    Cornell Law School J.D. Student Research Papers. 38 Advances in technology have surely made the practice of law more efficient, but looming advances in artificial intelligence should raise some concern about the price of this efficiency. Artificial intelligence programs already exhibit the capacity to replace the daily activities of some lawyers, which should raise some concern in the legal community, especially regarding legal ethics. Despite these concerns, the access to knowledge that arti...

  3. METHODS FOR ASSESSING SECURITY THREATS CONFIDENTIAL INFORMATION FOR THE INFORMATION AND TELECOMMUNICATIONS SYSTEMS

    Directory of Open Access Journals (Sweden)

    E. V. Belokurova

    2015-01-01

    Full Text Available The article discusses the different approaches to assessing the safety of confidential information-term for information and telecommunication systems of various pre-appreciable destination in the presence of internal and external threats to its integrity and availability. The difficulty of ensuring the security of confidential information from exposure to information and telecommunication systems of external and internal threats at the present time, is of particular relevance. This problem is confirmed by the analysis of available statistical information on the impact of threats on the security circulating in the information and telecommunications system. Leak confidential information, intellectual property, information, know-how is the result of significant material and moral damage caused to the owner of the restricted information. The paper presents the structure of the indicators and criteria shows that the most promising are analytical criteria. However, their use to assess the level of security of confidential information is difficult due to the lack of appropriate mathematical models. The complexity of the problem is that existing traditional mathematical models are not always appropriate for the stated objectives. Therefore, it is necessary to develop mathematical models designed to assess the security of confidential information and its impact on information and telecommunication system threats.

  4. Novel approach to information security management of confidential ...

    African Journals Online (AJOL)

    Novel approach to information security management of confidential and propriety information ... Journal of Fundamental and Applied Sciences ... valuable information by using steganography it can have a major impact security management.

  5. Analysis of the ethical aspects of professional confidentiality in dental practice

    Directory of Open Access Journals (Sweden)

    Cléa Adas Saliba Garbin

    2008-02-01

    Full Text Available From the point of view of deontological ethics, privacy is a moral right that patients are entitled to and it is bound to professional confidentiality. Otherwise, the information given by patients to health professionals would not be reliable and a trustable relationship could not be established. The aim of the present study was to assess, by means of questionnaires with open and closed questions, the awareness and attitudes of 100 dentists working in the city of Andradina, São Paulo State, Brazil, with respect to professional confidentiality in dental practice. Most dentists (91.43% reported to have instructed their assistants on professional confidentiality. However, 44.29% of the interviewees showed to act contradictorily as reported talking about the clinical cases of their patients to their friends or spouses. The great majority of professionals (98.57% believed that it is important to have classes on Ethics and Bioethics during graduation and, when asked about their knowledge of the penalties imposed for breach of professional confidentiality, only 48.57% of them declared to be aware of it. Only 28.57% of the interviewees affirmed to have exclusive access to the files; 67.14% reported that that files were also accessed by their secretary; 1.43% answered that their spouses also had access, and 2.86% did not answer. From the results of the present survey, it could be observed that, although dentists affirmed to be aware of professional confidentiality, their attitudes did not adhere to ethical and legal requirements. This stand of health professionals has contributed to violate professional ethics and the law itself, bringing problems both to the professional and to the patient.

  6. Analysis of the ethical aspects of professional confidentiality in dental practice.

    Science.gov (United States)

    Garbin, Cléa Adas Saliba; Garbin, Artênio José Isper; Saliba, Nemre Adas; de Lima, Daniela Coelho; de Macedo, Ana Paula Ayala

    2008-01-01

    From the point of view of deontological ethics, privacy is a moral right that patients are entitled to and it is bound to professional confidentiality. Otherwise, the information given by patients to health professionals would not be reliable and a trustable relationship could not be established. The aim of the present study was to assess, by means of questionnaires with open and closed questions, the awareness and attitudes of 100 dentists working in the city of Andradina, São Paulo State, Brazil, with respect to professional confidentiality in dental practice. Most dentists (91.43%) reported to have instructed their assistants on professional confidentiality. However, 44.29% of the interviewees showed to act contradictorily as reported talking about the clinical cases of their patients to their friends or spouses. The great majority of professionals (98.57%) believed that it is important to have classes on Ethics and Bioethics during graduation and, when asked about their knowledge of the penalties imposed for breach of professional confidentiality, only 48.57% of them declared to be aware of it. Only 28.57% of the interviewees affirmed to have exclusive access to the files; 67.14% reported that that files were also accessed by their secretary; 1.43% answered that their spouses also had access, and 2.86% did not answer. From the results of the present survey, it could be observed that, although dentists affirmed to be aware of professional confidentiality, their attitudes did not adhere to ethical and legal requirements. This stand of health professionals has contributed to violate professional ethics and the law itself, bringing problems both to the professional and to the patient.

  7. 38 CFR 1.462 - Confidentiality restrictions.

    Science.gov (United States)

    2010-07-01

    ... Sickle Cell Anemia § 1.462 Confidentiality restrictions. (a) General. The patient records to which §§ 1..., infection with the HIV, or sickle cell anemia may be acknowledged only if the patient's written consent is... with the HIV, or sickle cell anemia. (2) Any answer to a request for a disclosure of patient records...

  8. Remarks on a Generalization of a Question Raised by Pál Erdős Concerning a Geometric Inequality in Acute Triangles II

    Directory of Open Access Journals (Sweden)

    Béla FINTA

    2018-06-01

    Full Text Available The purpose of this paper is to give a negative answer to a possible generalization of an open question raised by Pál Erd ˝os, concerning an inequality in acute triangles. We prove here that from a < b < c does not follow a 2k+1 + (la 2k+1 < b2k+1 + l 2k+1 b < c 2k+1 + l 2k+1 c in every acute triangle ABC, nor the opposite chain of inequalities, where k ∈ N, k ≥ 2, and a, b, c denotes the length of the triangles sites, while la, lb, lc denotes the length of the interior angle bisectors, as usual. We achieve this by constructing effectively two counterexamples, one for each type of inequalities.

  9. 42 CFR 2.1 - Statutory authority for confidentiality of drug abuse patient records.

    Science.gov (United States)

    2010-10-01

    ... HUMAN SERVICES GENERAL PROVISIONS CONFIDENTIALITY OF ALCOHOL AND DRUG ABUSE PATIENT RECORDS Introduction § 2.1 Statutory authority for confidentiality of drug abuse patient records. The restrictions of these regulations upon the disclosure and use of drug abuse patient records were initially authorized by section 408...

  10. Having Confidence in Therapeutic Work with Young People: Constraints and Challenges to Confidentiality

    Science.gov (United States)

    Jenkins, Peter

    2010-01-01

    Confidentiality presents particular challenges to practitioners working with young people, on account of the latter's vulnerability and emotional immaturity. Ethical codes place a key importance on confidentiality, from deontological and teleological perspectives. However, young clients may rely on a more pragmatic approach in deciding whether to…

  11. Ombuds’ corner: Open door and confidentiality

    CERN Multimedia

    Vincent Vuillemin

    2013-01-01

    For the Open Days, CERN will be transparent for all visitors. It's also the occasion to remember that the Ombuds' door is fully open every day of the year for all persons working for or on behalf of CERN.   The door is open, but as soon as it's closed for a discussion, the office becomes a place where total confidentiality is preserved. This may appear as a contradiction, no? The Ombuds is available to help everyone in all circumstances, but his clause of confidentiality prevents him from acting without the consent of his “visitors”. How can he possibly resolve the in-house conflicts in groups, or units, if all the parties do not voluntarily participate in its resolution? The answer is clear: the job of the Ombuds is to help the parties resolve their conflict by themselves. He will provide a few rules of communication, a process of mutual respect, suggest some possibilities that the parties may want to follow, and mediate the dispute so that people...

  12. Confidential Declaration of Family Situation (CDFS)

    CERN Multimedia

    Human Resources Department

    2005-01-01

    The Confidential Declaration of Family Situation (CDFS) becomes a new computerized EDH form from October 2005 In accordance with Article R IV 1.17 of the Staff Regulations, Staff Members and Fellows, married or separated, must notify any changes in their spouse's income or health insurance cover in writing to CERN, within 30 calendar days of the change. This is necessary for the Organization to determine if a supplementary contribution is payable to the CERN Health Insurance Scheme (CHIS) for the spouse's coverage and, if so, the amount. Until now a paper form called « Confidential Declaration of Family Situation » (CDFS) was used for that purpose.  From early October 2005 the CDFS will be computerized for the whole Organization. Henceforth, any changes in a spouse's income or health insurance cover must be notified using EDH (Electronic Document Handling). Additionally, annual updates of the declaration will be required and will be requested by automatic e-mail. Early October an email will be...

  13. Confidentiality, 'no blame culture' and whistleblowing, non-physician practice and accountability.

    Science.gov (United States)

    White, Stuart M

    2006-12-01

    Confidentiality is a core tenet of medical professionalism, which enables the maintenance of trust in a doctor-patient relationship. However, both the amount of personal data stored and the number of third parties who might access this data have increased dramatically in the digital age, necessitating the introduction of various national data protection acts. Paradoxically, the Freedom of Information Act 2000 allows United Kingdom citizens to access information held by public bodies, including hospitals. Furthermore, the Public Interest Disclosure Act 1998 actively protects physicians who breach their duty of confidentiality in the name of public interest ('whistleblowing'). This article explores the evolution of the law and ethics in this area, and draws attention to the difficulties in balancing confidentiality against freedom of information. In addition, the role and responsibilities of the non-physician anaesthetist are examined.

  14. Confidentiality and parental involvement in adolescent sexual and reproductive health care

    DEFF Research Database (Denmark)

    Jaruseviciene, Lina; Lazarus, Jeff; Zaborskis, Apolinaras

    2011-01-01

    AIM: We surveyed Lithuanian general practitioners' (GPs) views on the importance of confidentiality for adolescents and on their practices in informing parents about sexual and reproductive health consultations with this age group. METHODS: In this cross-sectional study, a 41-item questionnaire...... was sent to a random sample of 607 Lithuanian GPs. The purpose of this questionnaire was to gain knowledge about current practices of GPs in informing parents on the importance of confidentiality as well as in protecting the privacy of minors. GPs' knowledge of the current legal age limit...... consulting on general sexual issues, more than 70% stated that they would guarantee their minor patients confidentiality. However, when cases involved sexually transmitted infections or pregnancy, nearly the same percentage said they would inform the parents. 62.3% of GPs incorrectly believed that the law...

  15. [Confidentiality in medical oaths: (When the white crow becomes gray...)].

    Science.gov (United States)

    Gelpi, R J; Pérez, M L; Rancich, A M; Mainetti, J A

    2000-01-01

    Confidentiality, together with the ethical principles of beneficence and non-maleficence, is the most important rule in Medical Oaths at the present time. However, the scientific-technical advances in medicine have made this rule one of the most controversial ones because of its exceptions. In consequence, the aim of the present paper is to comparatively analyze the rule of confidentiality in Medical Oaths of different places, times, origins and in different versions of the Hippocratic Oath in order to determine what should be kept a secret and with what degree of commitment (absolute or "prima facie"). Of the thirty six analyzed Oaths, twenty-seven manifest this rule and nine do not. No relation was found between the manifestation of this rule and the place, time, origin and different versions of the Hippocratic Oath. Most pledges suggest not to reveal what has been seen or heard during the medical act, the same as in the Hippocratic Oath. Seven texts point out that confidentiality should be absolute and four give exceptions in connection with beneficence and justice principles and the moral duty of causing no damage to third parties. Two pledges specify protection of privacy. In conclusion, today confidentiality is considered to be a moral duty for the benefit of the patient and out of consideration for his autonomy; however, at the present time in medicine the duty of keeping absolute secrecy is being reconsidered.

  16. 77 FR 1434 - Proposed Confidentiality Determinations for Data Elements Under the Mandatory Reporting of...

    Science.gov (United States)

    2012-01-10

    ... Fluorinated Gas Production....... 325120 Industrial gases manufacturing facilities. Electrical Equipment Use... Proposed Confidentiality Determinations for Data Elements Under the Mandatory Reporting of Greenhouse Gases...-proposes confidentiality determinations for the data elements under the Mandatory Greenhouse Gas Reporting...

  17. 7 CFR 983.9 - Confidential data or information.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 8 2010-01-01 2010-01-01 false Confidential data or information. 983.9 Section 983.9 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (Marketing... customers. ...

  18. 18 CFR 706.410 - Confidentiality of statements.

    Science.gov (United States)

    2010-04-01

    ... use of information on the statements shall be limited to that necessary to carry out the purposes of... EMPLOYEE RESPONSIBILITIES AND CONDUCT Statements of Employment and Financial Interests § 706.410 Confidentiality of statements. Each statement of employment and financial interests, and each supplementary...

  19. Zerber: r-Confidential Indexing for Distributed Documents

    NARCIS (Netherlands)

    Zerr, Sergej; Demidova, Elena; Olmedilla, Daniel; Nejdl, Wolfgang; Winslett, Marianne; Mitra, Soumyadeb

    2008-01-01

    Zerr, S., Demidova, E., Olmedilla, D., Nejdl, W., Winslett, M., & Mitra, S. (2008). Zerber: r-Confidential Indexing for Distributed Documents. In J. Teubner (Eds.), Proceedings of the 11th International Conference on Extending Database Technology (pp. 287-298). March, 25-29, 2008, Nantes, France.

  20. 19 CFR 210.72 - Confidentiality of information.

    Science.gov (United States)

    2010-04-01

    ... 19 Customs Duties 3 2010-04-01 2010-04-01 false Confidentiality of information. 210.72 Section 210.72 Customs Duties UNITED STATES INTERNATIONAL TRADE COMMISSION INVESTIGATIONS OF UNFAIR PRACTICES IN IMPORT TRADE ADJUDICATION AND ENFORCEMENT Enforcement Procedures and Advisory Opinions § 210.72...

  1. ML Confidential : machine learning on encrypted data

    NARCIS (Netherlands)

    Graepel, T.; Lauter, K.; Naehrig, M.

    2012-01-01

    We demonstrate that by using a recently proposed somewhat homomorphic encryption (SHE) scheme it is possible to delegate the execution of a machine learning (ML) algorithm to a compute service while retaining confidentiality of the training and test data. Since the computational complexity of the

  2. Ethics in health care: confidentiality and information technologies

    African Journals Online (AJOL)

    information could result in confidential patient data falling ... Before the advent of the new communication and information technologies (NCITs), patient care was sometimes delayed .... computer system intended to be used and the security.

  3. 78 FR 16298 - Comment Request for Information Collection: Confidentiality and Disclosure of State Unemployment...

    Science.gov (United States)

    2013-03-14

    ... Collection: Confidentiality and Disclosure of State Unemployment Compensation Information Final Rule and... about the regulatory requirements of the Confidentiality and Disclosure of State Unemployment... Administration, Office of Unemployment Insurance, 200 Constitution Avenue NW., Room S4524, Washington, DC 20210...

  4. 77 FR 48072 - Final Confidentiality Determinations for Regulations Under the Mandatory Reporting of Greenhouse...

    Science.gov (United States)

    2012-08-13

    ... Final Confidentiality Determinations for Regulations Under the Mandatory Reporting of Greenhouse Gases... confidentiality determinations for certain data elements in regulations under the Mandatory Greenhouse Gas... Greenhouse Gas Reporting Program Web site at http://www.epa.gov/climatechange/emissions/ghgrulemaking.html...

  5. Confronting the Ubiquity of Electronic Communication and Social Media: Ethical and Legal Considerations for Psychoeducational Practice

    Science.gov (United States)

    Demers, Joseph A.; Sullivan, Amanda L.

    2016-01-01

    Most U.S. children and adults use computers and the Internet on a daily basis. The pervasiveness of electronic communication in a variety of contexts, including home and school, raises ethical and legal concerns for school psychologists and those in related fields of practice, because of the risks to privacy and confidentiality, boundaries,…

  6. Confidentiality of Accounting Academics: Consequences of Nonconformity

    Science.gov (United States)

    Amponsah, Emmanuel B.; Boateng, Peter Agyekum; Onuoha, Luke N.

    2016-01-01

    This paper examined ways by which nonconformity to confidentiality among accounting academics could lead to increased-recruitment-and-legal-costs to their employing universities in Ghana that offered accounting degree programmes. With a cross-sectional design, data collected from 1,225 accountants analysed via Cronbach's alpha,…

  7. The Role of Employee Whistleblowing and Raising Concerns in an Organizational Learning Culture – Elusive and Laudable?; Comment on “Cultures of Silence and Cultures of Voice: The Role of Whistleblowing in Healthcare Organisations”

    Directory of Open Access Journals (Sweden)

    Aled Jones

    2016-01-01

    Full Text Available It is inevitable that healthcare workers throughout their careers will witness actual or potential threats to patient safety in the course of their work. Some of these threats will result in serious harm occurring to others, whilst at other times such threats will result in minimal harm, or a ‘near miss’ where harm is avoided at the last minute. Despite organizations encouraging employees to ‘speak up’ about such threats, healthcare systems globally struggle to engage their staff to do so. Even when staff do raise concerns they are often ignored by those with a responsibility to listen and act. Learning how to create the conditions where employees continuously raise and respond to concerns is essential in creating a continuous and responsive learning culture that cherishes keeping patients and employees safe. Workplace culture is a real barrier to the creation of such a learning system but examples in healthcare exist from which we can learn.

  8. 16 CFR 312.8 - Confidentiality, security, and integrity of personal information collected from children.

    Science.gov (United States)

    2010-01-01

    ... 16 Commercial Practices 1 2010-01-01 2010-01-01 false Confidentiality, security, and integrity of... COMMISSION REGULATIONS UNDER SPECIFIC ACTS OF CONGRESS CHILDREN'S ONLINE PRIVACY PROTECTION RULE § 312.8 Confidentiality, security, and integrity of personal information collected from children. The operator must...

  9. 15 CFR Supplement No. 1 to Part 718 - Confidential Business Information Declared or Reported *

    Science.gov (United States)

    2010-01-01

    ... 15 Commerce and Foreign Trade 2 2010-01-01 2010-01-01 false Confidential Business Information... Commerce and Foreign Trade (Continued) BUREAU OF INDUSTRY AND SECURITY, DEPARTMENT OF COMMERCE CHEMICAL WEAPONS CONVENTION REGULATIONS CONFIDENTIAL BUSINESS INFORMATION Pt. 718, Supp. 1 Supplement No. 1 to Part...

  10. 30 CFR 291.111 - How does MMS treat the confidential information I provide?

    Science.gov (United States)

    2010-07-01

    ... 30 Mineral Resources 2 2010-07-01 2010-07-01 false How does MMS treat the confidential information... SHELF LANDS ACT § 291.111 How does MMS treat the confidential information I provide? (a) Any person who provides documents under this part in response to a request by MMS to inform a decision on whether open...

  11. 40 CFR 370.64 - What information can I claim as trade secret or confidential?

    Science.gov (United States)

    2010-07-01

    ... secret or confidential? 370.64 Section 370.64 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY... secret or confidential? (a) Trade secrets. You may be able to withhold the name of a specific chemical... trade secret. The requirements for withholding trade secret information are set forth in EPCRA section...

  12. 31 CFR 31.217 - Confidentiality of information.

    Science.gov (United States)

    2010-07-01

    ... 31 Money and Finance: Treasury 1 2010-07-01 2010-07-01 false Confidentiality of information. 31.217 Section 31.217 Money and Finance: Treasury Office of the Secretary of the Treasury TROUBLED ASSET... from a source other than the retained entity. (b) Prohibitions. The retained entity shall not: (1...

  13. 12 CFR 404.7 - Confidential business information.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 4 2010-01-01 2010-01-01 false Confidential business information. 404.7 Section 404.7 Banks and Banking EXPORT-IMPORT BANK OF THE UNITED STATES INFORMATION DISCLOSURE Procedures... involved, a general description of the related U.S. exports, and the country to which such exports are...

  14. Effective verification of confidentiality for multi-threaded programs

    NARCIS (Netherlands)

    Ngo, Minh Tri; Stoelinga, Mariëlle Ida Antoinette; Huisman, Marieke

    2014-01-01

    This paper studies how confidentiality properties of multi-threaded programs can be verified efficiently by a combination of newly developed and existing model checking algorithms. In particular, we study the verification of scheduler-specific observational determinism (SSOD), a property that

  15. [Confidentiality in HIV-infection/AIDS--a comment on the Communicable Disease Control Act].

    Science.gov (United States)

    Frich, J C

    1995-05-10

    The new Communicable Diseases Control Act has come into force in Norway. It makes it compulsory for a physician to warn a third party if it is obvious that a HIV-positive patient, with a high degree of certainty, puts the third party at risk of being infected with HIV. Some philosophers characterize medical confidentiality as an intransigent and absolute obligation, others as a prima facie duty. This article supports the latter view, but the author still argues that strict conditions have to be fulfilled before a physician should consider breaking medical confidentiality: The doctor must try repeatedly to gain the consent or co-operation of the patient involved. Possible negative long-term consequences for the preventive HIV-work support strict medical confidentiality.

  16. 19 CFR 201.6 - Confidential business information.

    Science.gov (United States)

    2010-04-01

    ...) of a type for which there is a clear and compelling need to withhold from disclosure. Special rules... the right to appeal to the Commission. (e) Appeals from denial of confidential treatment. (1) For good cause shown, the Commission may grant an appeal from a denial by the Secretary of a request for...

  17. Do Privacy Concerns Matter for Millennials?

    DEFF Research Database (Denmark)

    Fodor, Mark; Brem, Alexander

    2015-01-01

    data have raised the question, if location data are considered as sensitive data by users. Thus, we use two privacy concern models, namely Concern for Information Privacy (CFIP) and Internet Users’ Information Privacy Concerns (IUIPC) to find out. Our sample comprises of 235 individuals between 18...... and 34 years (Generation C) from Germany. The results of this study indicate that the second-order factor IUIPC showed better fit for the underlying data than CFIP did. Overall privacy concerns have been found to have an impact on behavioral intentions of users for LBS adoption. Furthermore, other risk...

  18. Access to Confidential Alcohol Industry Documents: From ‘Big Tobacco’ to ‘Big Booze’

    Directory of Open Access Journals (Sweden)

    Ms Laura Bond

    2009-03-01

    Full Text Available BACKGROUND:Internal tobacco industry document searches have led to the discovery of hitherto unpublisheddocuments that provide insights into the drinks industry. The documents uncover key concerns andstrategies for the drinks industry with focus on the Miller Brewing Company and the Beer Institute.METHODS:The identification of the Philip Morris 1996 CEO Issues Book from the tobacco document archives led to asystematic search for alcohol-related documents. The search was conducted by entering alcohol-relatedterms into search fields of tobacco document archive sites available on the World Wide WebRESULTS:Key areas of concern for the Miller Brewing Company, the Beer Institute, and more broadly, the alcoholindustry include developments of legislative and regulatory controls such as tax increases, advertisingrestrictions and blood alcohol content lowering and public perceptions of harms relating to drunk driving,binge drinking and underage alcohol consumption. Strategies proposed by the Miller Brewing Companyand the Beer Institute to combat these concerns include ally development and maintenance and thepromotion of personal responsibility.CONCLUSIONS:These once confidential internal documents provide new evidence on the drinks industry’s concernsabout possible alcohol control measures and the strategies used to help overcome these concerns. The document findings justify the public health community’s cynicism about the alcohol industry whileproviding a new source of information to assist development in the regulation and control of the drinksindustry.

  19. Enhanced Obfuscation Technique for Data Confidentiality in Public Cloud Storage

    Directory of Open Access Journals (Sweden)

    Oli S. Arul

    2016-01-01

    Full Text Available With an advent of cloud computing, data storage has become a boon in information technology. At the same time, data storage in remote places have become important issues. Lot of techniques are available to ensure protection of data confidentiality. These techniques do not completely serve the purpose in protecting data. The Obfuscation techniques come to rescue for protecting data from malicious attacks. This paper proposes an obfuscation technique to encrypt the desired data type on the cloud providing more protection from unknown hackers. The experimental results show that the time taken for obfuscation is low and the confidentiality percentage is high when compared with existing techniques.

  20. 15 CFR 325.16 - Protecting confidentiality of information.

    Science.gov (United States)

    2010-01-01

    ... 15 Commerce and Foreign Trade 2 2010-01-01 2010-01-01 false Protecting confidentiality of information. 325.16 Section 325.16 Commerce and Foreign Trade Regulations Relating to Commerce and Foreign Trade (Continued) INTERNATIONAL TRADE ADMINISTRATION, DEPARTMENT OF COMMERCE MISCELLANEOUS REGULATIONS...

  1. 19 CFR 210.20 - Declassification of confidential information.

    Science.gov (United States)

    2010-04-01

    ... 19 Customs Duties 3 2010-04-01 2010-04-01 false Declassification of confidential information. 210.20 Section 210.20 Customs Duties UNITED STATES INTERNATIONAL TRADE COMMISSION INVESTIGATIONS OF UNFAIR PRACTICES IN IMPORT TRADE ADJUDICATION AND ENFORCEMENT Motions § 210.20 Declassification of...

  2. Medical confidentiality versus disclosure: Ethical and legal dilemmas.

    LENUS (Irish Health Repository)

    Agyapong, V I O

    2009-02-01

    A case is described of a fifty year old single man who made disclosures about criminal sexual practices during a psychiatric assessment. In common practice with other professional men, a doctor is under a duty not to disclose, without the consent of his patient, information which he has gained in his professional capacity other than in exceptional circumstances. We discuss the ethical and legal considerations surrounding issues of medical confidentiality and the dilemma that sometimes face clinicians, when they feel obliged, in the public interest, to disclose information they have gained in confidence. Breach of confidences can have deleterious consequences; particularly for the doctor-patient relationship, but failure to disclose in some situations could have serious implications for the well-being of the wider society. Doctors should be aware of the basic principles of confidentiality and the ethical and legal framework around which they are built.

  3. 45 CFR 307.13 - Security and confidentiality for computerized support enforcement systems in operation after...

    Science.gov (United States)

    2010-10-01

    ... ENFORCEMENT SYSTEMS § 307.13 Security and confidentiality for computerized support enforcement systems in... systems in operation after October 1, 1997. (a) Information integrity and security. Have safeguards... 45 Public Welfare 2 2010-10-01 2010-10-01 false Security and confidentiality for computerized...

  4. 40 CFR 85.1415 - Treatment of confidential information.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 18 2010-07-01 2010-07-01 false Treatment of confidential information. 85.1415 Section 85.1415 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) AIR PROGRAMS (CONTINUED) CONTROL OF AIR POLLUTION FROM MOBILE SOURCES Urban Bus Rebuild Requirements § 85.1415...

  5. Privacy and Confidentiality in Exchange of Information Procedures : Some Uncertainties, Many Issues, but Few Solutions

    NARCIS (Netherlands)

    Debelva, F.; Mosquera, Valderrama I.J.

    2017-01-01

    The overall aim of this article is to analyse the taxpayers’ rights to confidentiality and privacy in exchange of information including the new global standard of automatic exchange of information. Section 2 will analyse the state of the art regarding the right to privacy and confidentiality in

  6. 40 CFR 86.615-84 - Treatment of confidential information.

    Science.gov (United States)

    2010-07-01

    ...) Selective Enforcement Auditing of New Light-Duty Vehicles, Light-Duty Trucks, and Heavy-Duty Vehicles § 86... part 2, subpart B. (b) Any claim of confidentiality must accompany the information at the time it is...

  7. Absolutism on Access and Confidentiality: Principled or Irresponsible?

    Science.gov (United States)

    Sheerin, William E.

    1991-01-01

    Discusses issues involved in public access to library materials and facilities and patron confidentiality. Topics discussed include children's access to adult materials; parents' right to know about their children's materials; First and Fourth Amendment protections; the Library Bill of Rights; and American Library Association (ALA) documents that…

  8. 12 CFR 19.181 - Confidentiality of formal investigations.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 1 2010-01-01 2010-01-01 false Confidentiality of formal investigations. 19.181 Section 19.181 Banks and Banking COMPTROLLER OF THE CURRENCY, DEPARTMENT OF THE TREASURY RULES OF... only in accordance with the provisions of part 4 of this chapter. ...

  9. HIPAA-protecting patient confidentiality or covering something else?

    Directory of Open Access Journals (Sweden)

    Robbins RA

    2013-10-01

    Full Text Available No abstract available. Article truncated at 150 words. A case of a physician fired from the Veterans Administration (VA for violation of the Health Care Portability and Accountability Act of 1996 (HIPAA illustrates a problem with both the law and the VA. Anil Parikh, a VA physician at the Jesse Brown VA in Chicago, was dismissed on a charge of making unauthorized disclosures of confidential patient information on October 19, 2007. On January 3, 2011 the Merit Systems Protection Board (MSPB reversed Dr. Parikh’s removal. Dr. Parikh's initially made disclosures to the VA Office of Inspector General and to Senator Barack Obama and Congressman Luis Gutierrez, in whose district the Jesse Brown VA lies. Dr. Parikh alleged that there were systematic problems within the Jesse Brown VA that resulted in untimely and inadequate patient care. The confidential patient information Parikh disclosed included examples of the misdiagnoses and misdirection of patients within the hospital. Specifically, Dr. Parikh alleged that …

  10. 40 CFR 725.15 - Determining applicability when microorganism identity or use is confidential or uncertain.

    Science.gov (United States)

    2010-07-01

    ... ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) TOXIC SUBSTANCES CONTROL ACT REPORTING REQUIREMENTS AND REVIEW... appear on the public version of the Inventory, in § 725.239 or in subpart M of this part. Instead, it is contained in a confidential version held in EPA's Confidential Business Information Center (CBIC). The...

  11. HIV testing sites' communication about adolescent confidentiality: potential barriers and facilitators to testing.

    Science.gov (United States)

    Hyden, Christel; Allegrante, John P; Cohall, Alwyn T

    2014-03-01

    This study sought to evaluate HIV testing locations in New York City in terms of staff communication of confidentiality policies for adolescent clients. Using the New York State Directory of HIV Counseling and Testing Resources as a sampling frame, this study made telephone contact with 164 public HIV testing locations in New York City and used a semistructured interview to ask questions about confidentiality, parental permission, and parent access to test results. At 48% of locations, either HIV testing was not offered or we were unable to reach a staff member to ask questions about testing options and confidentiality. At the remaining sites, information provided regarding confidentiality, parental consent, and privacy of test results was correct only 69% to 85% of the time. Additionally, 23% of sites successfully contacted offered testing exclusively between 9:00 a.m. and 3:00 p.m. weekdays, when most adolescents are in school. Our findings point to a need for increased training and quality control at the clinical level to ensure that consumers in need of HIV testing are provided with accurate information and accessible services. Furthermore, these results highlight the need for more "patient-centric" sites with enhanced accessibility for potential clients, particularly youth.

  12. Raising Emotionally Intelligent Teenagers: Parenting with Love, Laughter, and Limits.

    Science.gov (United States)

    Elias, Maurice J.; Tobias, Steven E.; Friedlander, Brian S.

    Based on the formula of love, laughter, limits, and linkages, this book presents practical, parent-tested ways parents can help their adolescent children become emotionally intelligent. The book is presented in three parts. Part 1 concerns parent preparation for raising an emotionally intelligent teenager, discusses the importance of parenting by…

  13. Lithuanian general practitioners' knowledge of confidentiality laws in adolescent sexual and reproductive healthcare: a cross-sectional study

    DEFF Research Database (Denmark)

    Lazarus, Jeff; Jaruseviciene, Lina; Liljestrand, Jerker

    2008-01-01

    In Lithuania, the legislation addressing confidentiality in adolescent healthcare is contradictory and vague. Previous studies have also revealed that medico-legal knowledge among physicians is poor, and attitudes play a correspondingly greater role than legal knowledge in ensuring the confidenti......In Lithuania, the legislation addressing confidentiality in adolescent healthcare is contradictory and vague. Previous studies have also revealed that medico-legal knowledge among physicians is poor, and attitudes play a correspondingly greater role than legal knowledge in ensuring...

  14. 40 CFR 303.31 - Assurance of claimant confidentiality.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 27 2010-07-01 2010-07-01 false Assurance of claimant confidentiality. 303.31 Section 303.31 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) SUPERFUND... knowledge, shall be given access to the identity of, or information that would lead to the identity of, a...

  15. 75 FR 75576 - Confidentiality of Suspicious Activity Reports

    Science.gov (United States)

    2010-12-03

    ...-2010-0019] RIN 1557-AD17 Confidentiality of Suspicious Activity Reports AGENCY: The Office of the... suspicious activity report (SAR) to: clarify the scope of the statutory prohibition on the disclosure by a... institutions, including national banks regulated by the OCC, to keep certain records and make certain reports...

  16. Nursing Students' Perceptions of Confidentiality, Accountability, and E-Professionalism in Relation to Facebook.

    Science.gov (United States)

    Barnable, Alexia; Cunning, Glenda; Parcon, Mariel

    This study examined nursing students' perceptions of confidentiality, accountability, and e-professionalism in relation to Facebook. All of the students were aware that posting patients' names and pictures of patients constituted a confidentiality breach. When comparing students based on educational status, there were differing opinions on whether employers should use Facebook profile information for hiring decisions. Nursing programs should provide current education, including clear and up-to-date policies, about social media use.

  17. 18 CFR 1b.9 - Confidentiality of investigations.

    Science.gov (United States)

    2010-04-01

    ... 18 Conservation of Power and Water Resources 1 2010-04-01 2010-04-01 false Confidentiality of investigations. 1b.9 Section 1b.9 Conservation of Power and Water Resources FEDERAL ENERGY REGULATORY COMMISSION... pursuant to subpoena, and all investigative proceedings shall be treated as nonpublic by the Commission and...

  18. THE POSSIBLE CONFIDENTIALITY: THE PUBLIC ADMINISTRATION AS PARTY IN THE ALTERNATIVE DISPUTE RESOLUTION MECHANISM

    Directory of Open Access Journals (Sweden)

    Carlos Alberto de Salles

    2017-05-01

    Full Text Available This article debates the tension that exists between confidentiality, usual in ADRs, and the publicity principle, that rules the Public Administration in Brazil. As a solution points that the parameter of confidentiality when Public Administration is a party must be the preservation of accountability of the involved agencies, what means, the capacity to answer to its own goals and to obey the public control.

  19. IT Confidentiality Risk Assessment for an Architecture-Based Approach

    NARCIS (Netherlands)

    Morali, A.; Zambon, Emmanuele; Etalle, Sandro; Overbeek, Paul

    2008-01-01

    Information systems require awareness of risks and a good understanding of vulnerabilities and their exploitations. In this paper, we propose a novel approach for the systematic assessment and analysis of confidentiality risks caused by disclosure of operational and functional information. The

  20. 48 CFR 1415.207-71 - Confidentiality of proposal evaluation.

    Science.gov (United States)

    2010-10-01

    ... THE INTERIOR CONTRACTING METHODS AND CONTRACT TYPES CONTRACTING BY NEGOTIATION Solicitation and... evaluators and advisors shall sign a Conflict of Interest Certificate and a Confidentiality Certificate in a... outside the Government shall take into consideration requirements for avoiding individual conflicts of...

  1. 49 CFR 40.321 - What is the general confidentiality rule for drug and alcohol test information?

    Science.gov (United States)

    2010-10-01

    ... Transportation PROCEDURES FOR TRANSPORTATION WORKPLACE DRUG AND ALCOHOL TESTING PROGRAMS Confidentiality and Release of Information § 40.321 What is the general confidentiality rule for drug and alcohol test... DOT drug or alcohol testing process, you are prohibited from releasing individual test results or...

  2. 50 CFR 14.23 - Live farm-raised fish and farm-raised fish eggs.

    Science.gov (United States)

    2010-10-01

    ... 50 Wildlife and Fisheries 1 2010-10-01 2010-10-01 false Live farm-raised fish and farm-raised fish eggs. 14.23 Section 14.23 Wildlife and Fisheries UNITED STATES FISH AND WILDLIFE SERVICE, DEPARTMENT OF... Exportation at Designated Ports § 14.23 Live farm-raised fish and farm-raised fish eggs. Live farm-raised fish...

  3. Institute of confidential cooperation in the USA: organizational and juridical aspect

    Directory of Open Access Journals (Sweden)

    Іван Іванович Мусієнко

    2016-01-01

    Full Text Available One of the most efficient measures of crime counteraction is timely reporting law enforcement agencies during which a special role is dedicated to persons (informants. They provide assistance to authorized subjects in the sphere of corruption counteraction by giving operative significant information. Thus the article is aimed at the analysis of law enforcement bodies and special services of the USA experience concerning work with confidential sources. The latest tendencies of the US police activities are concentrated on the attraction of citizens to cooperation with police. Such cooperation is efficient in prevention of most hard crimes due to informants' assistance, i.e. people who display desire to cooperate with police. Scientists D. Sunshine and T. Tyler consider that the nature of relations between police and publicity has a great influence on the efficiency of crime counteraction, local citizens' welfare. The authors draw attention to the importance of establishing benevolent relations between police and local population. The given article also reveals the USA law enforcement agencies experience of institute of confidential cooperation using. Using of operative sources of information remains the most efficient tools for detection, suspension, disclosure and investigation of crimes in the whole world. With the aim of achievement of accuracy in terminology it is conducted the identification of different kinds of informants depending on their role and law enforcement institution they collaborate with. Conclusions. Actions in favor of society are a important element of informationship as social institute. The results of conducted analysis testify that the modern understanding of institute of confidential cooperation in the USA is grounded on the following principles: -        the object of message is information about any abuses, violations, immoral behavior that may cause significant violations of rights and duties of citizens

  4. Raising the topic of weight in general practice: perspectives of GPs and primary care nurses.

    Science.gov (United States)

    Blackburn, Maxine; Stathi, Afroditi; Keogh, Edmund; Eccleston, Christopher

    2015-08-07

    To explore general practitioners' (GPs) and primary care nurses' perceived barriers to raising the topic of weight in general practice. A qualitative study using the Theoretical Domains Framework (TDF). 34 semistructured interviews were conducted to explore views, opinions and experiences of initiating a discussion about weight. Content and thematic analyses were used to analyse the interview transcripts. General practices located in one primary care trust in the South West of England. 17 GPs and 17 nurses aged between 32 and 66 years. The modal age range for GPs was 30-39 years and for nurses, 40-49 years. Barriers were synthesised into three main themes: (1) limited understanding about obesity care, (2) concern about negative consequences, and (3) having time and resources to raise a sensitive topic. Most barriers were related to raising the topic in more routine settings, rather than when dealing with an associated medical condition. GPs were particularly worried about damaging their relationship with patients and emphasised the need to follow their patient's agenda. Uncertainty about obesity, concerns about alienating patients and feeling unable to raise the topic within the constraints of a 10 min consultation, is adding to the reluctance of GPs and nurses to broach the topic of weight. Addressing these concerns through training or by providing evidence of effective interventions that are feasible to deliver within consultations may lead to greater practitioner engagement and willingness to raise the topic. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://group.bmj.com/group/rights-licensing/permissions.

  5. 37 CFR 201.29 - Access to, and confidentiality of, Statements of Account, Verification Auditor's Reports, and...

    Science.gov (United States)

    2010-07-01

    ... confidentiality of, Statements of Account, Verification Auditor's Reports, and other verification information... GENERAL PROVISIONS § 201.29 Access to, and confidentiality of, Statements of Account, Verification Auditor... Account, including the Primary Auditor's Reports, filed under 17 U.S.C. 1003(c) and access to a Verifying...

  6. Raising Awareness in Science Education for Women (RAISE-W)

    Science.gov (United States)

    Faherty, Jacqueline K.; Holford, M.

    2014-01-01

    Raising Awareness in Science Education for Women (RAISE-W) is a 501c non profit corporation whose mission is to aid in increasing and retaining the number of women - especially underrepresented females - engaged in scientific teaching and research. Initiated by a Protein Chemist and an Astronomer, our ultimate goal has been to develop informational tools and create innovative outreach programs for women across all STEM fields. At present RAISE-W is recruiting women at the undergraduate, graduate, and early career stages to participate in a unique, 1-year, executive coaching program modeled after those used in the business sector.

  7. 22 CFR 1104.17 - Confidentiality of archaeological resource information.

    Science.gov (United States)

    2010-04-01

    ... 22 Foreign Relations 2 2010-04-01 2010-04-01 true Confidentiality of archaeological resource information. 1104.17 Section 1104.17 Foreign Relations INTERNATIONAL BOUNDARY AND WATER COMMISSION, UNITED... of archaeological resource information. (a) The Commissioner shall not make available to the public...

  8. Decisions about Confidentiality in Medical Student Mental Health Settings.

    Science.gov (United States)

    Lindenthal, Jacob Jay; And Others

    1984-01-01

    Examined responses of psychologists and psychiatrists in medical schools (N=59) to vignettes representing student problems. Results suggested practitioners were generally unwilling to break confidentiality in response to problems involving suicidal tendencies, sexual coercion/seduction, social transgressions, or falsifying data. Only suggestions…

  9. Performance of dairy calves raised under two breeding systems

    Directory of Open Access Journals (Sweden)

    Reinaldo Henrique Borger

    2017-05-01

    Full Text Available Increasing concern about some animal production systems has placed considerable value on humanitarian breeding systems, aimed at ensuring animal welfare and comfort. Raising calves is one of the most important stages in a milk production system. This study aimed to evaluate and compare the performance of Holstein dairy calves raised by two farming systems: conventional individual (CI and collective with automatic calf feeder (CACF. Fourteen, 15-day-old Holstein dairy calves having an average initial body weight of 40 kg, were used. The animals were distributed in a completely randomized design with seven animals per treatment. The variables evaluated were the milk and feed intake, body weight, hip height, thoracic circumference and daily weight gain. The average milk intake was lower in the CACF (3.5 L animal-1 day-1 than CI (5.1 L animal-1 day-1 system. However, the feed intake was higher in the CACF (1.205 kg animal-1 day-1 compared to CI (0.910 kg animal-1 day-1 system. Body weight, thoracic circumference, hip height and daily weight gain were similar between the two systems. The CACF raised calves had a higher concentrate intake and lower milk intake than the calves raised under the CI system.

  10. Dating and Sexual Violence Research in the Schools: Balancing Protection of Confidentiality with Supporting the Welfare of Survivors.

    Science.gov (United States)

    Sharkey, Jill D; Reed, Lauren A; Felix, Erika D

    2017-12-01

    Rigorous research and program evaluation are needed to understand the experience of dating and sexual violence among youth and the impact of prevention and intervention efforts. Our dilemma in doing this work occurred when youth disclosed dating and sexual violence on a research survey. What responsibility do researchers have to protect survivors' confidentiality as a research participant versus taking steps to ensure the student has the opportunity to access help? In our evaluation of a pilot dating violence prevention program, our protocols employed widely used procedures for providing resources to participants upon their completion of the survey and de-identifying survey data. Upon reviewing preliminary survey results, we became concerned that these established procedures were not sufficient to support research participants who were adolescent survivors of dating and sexual violence. We followed a structured ethical decision-making process to examine legal and ethical considerations, consult with colleagues, consider impacts and alternative solutions, and ultimately find a solution. Through this process, we developed procedures that balance participant confidentiality and the desire to support the welfare of survivors, which other researchers may want to employ when conducting youth sexual and dating violence research in school and community settings. © Society for Community Research and Action 2017.

  11. Reply by the Federal Government to a question concerning new primary energy sources raised in the Bundestag

    Energy Technology Data Exchange (ETDEWEB)

    Matthoefer, H [Bundesministerium fuer Forschung und Technologie, Bonn (F.R. Germany)

    1976-06-01

    A question raised in the Bundestag concerning new primary energy sources was answered by the Federal Minister for Science and Technology in his letter dated June 2, 1976; the letter called attention to the Federal Government's energy program of September 1973 which, instead of promoting research almost exclusively on the nuclear sector as used to be the case, aims at a purposeful and comprehensive promotion by the state of non-nuclear energy research as well in the FRG. Solar energy seems to have the best chance in the FRG of being utilized in an industrial way, applying low-temperature collectors to recover heat for heating and hot water preparation; 28 million DM have been invested so far. Despite the fact that the technical potential of wind power in the FRG would cover almost 75% of the present electricity demand, only plants with a small kW range are being developed at the moment as the question of energy storage is still open; 0.3 million DM have been granted so far. The utilization of geothermal power can only be of interest for the FRG on the basis of the hot-dry-rock method; drilling work is carried out in the Eifel district investigating geothermal gradients: 1.25 million DM have been granted so far. In 1976 the projects mentioned above have been allotted research funds amounting to 20 million DM. Energy from running/tidal waters is utilized in the FRG to 90% so far, but this only accounts for 6.7% of the gross electricity generation. Therefore, its importance for the energy supply of the FRG will decrease when the energy demand increases.

  12. 18 CFR 401.75 - Protection of trade secrets; Confidential information.

    Science.gov (United States)

    2010-04-01

    ..., confidential statistical data, amount or source of any income, profits, losses, or expenditures of any person... States Code which provides: Whoever, being an officer or employee of the United States or of any...

  13. Ensuring Confidentiality of Geocoded Health Data: Assessing Geographic Masking Strategies for Individual-Level Data.

    Science.gov (United States)

    Zandbergen, Paul A

    2014-01-01

    Public health datasets increasingly use geographic identifiers such as an individual's address. Geocoding these addresses often provides new insights since it becomes possible to examine spatial patterns and associations. Address information is typically considered confidential and is therefore not released or shared with others. Publishing maps with the locations of individuals, however, may also breach confidentiality since addresses and associated identities can be discovered through reverse geocoding. One commonly used technique to protect confidentiality when releasing individual-level geocoded data is geographic masking. This typically consists of applying a certain amount of random perturbation in a systematic manner to reduce the risk of reidentification. A number of geographic masking techniques have been developed as well as methods to quantity the risk of reidentification associated with a particular masking method. This paper presents a review of the current state-of-the-art in geographic masking, summarizing the various methods and their strengths and weaknesses. Despite recent progress, no universally accepted or endorsed geographic masking technique has emerged. Researchers on the other hand are publishing maps using geographic masking of confidential locations. Any researcher publishing such maps is advised to become familiar with the different masking techniques available and their associated reidentification risks.

  14. Ensuring Confidentiality of Geocoded Health Data: Assessing Geographic Masking Strategies for Individual-Level Data

    Directory of Open Access Journals (Sweden)

    Paul A. Zandbergen

    2014-01-01

    Full Text Available Public health datasets increasingly use geographic identifiers such as an individual’s address. Geocoding these addresses often provides new insights since it becomes possible to examine spatial patterns and associations. Address information is typically considered confidential and is therefore not released or shared with others. Publishing maps with the locations of individuals, however, may also breach confidentiality since addresses and associated identities can be discovered through reverse geocoding. One commonly used technique to protect confidentiality when releasing individual-level geocoded data is geographic masking. This typically consists of applying a certain amount of random perturbation in a systematic manner to reduce the risk of reidentification. A number of geographic masking techniques have been developed as well as methods to quantity the risk of reidentification associated with a particular masking method. This paper presents a review of the current state-of-the-art in geographic masking, summarizing the various methods and their strengths and weaknesses. Despite recent progress, no universally accepted or endorsed geographic masking technique has emerged. Researchers on the other hand are publishing maps using geographic masking of confidential locations. Any researcher publishing such maps is advised to become familiar with the different masking techniques available and their associated reidentification risks.

  15. Bridgman's concern

    International Nuclear Information System (INIS)

    Graham, R.A.

    1993-01-01

    In 1956 P.W. Bridgman published a letter to the editor in the Journal of Applied Physics reporting results of electrical resistance measurements on iron under static high pressure. The work was undertaken to verify the existence of a polymorphic phase transition at 130 kbar (13 GPa) reported in the same journal and year by the Los Alamos authors, Bancroft, Peterson and Minshall for high pressure, shock-compression loading. In his letter, Bridgman reported that he failed to find any evidence for the transition. Further, he raised some fundamental concerns as to the state of knowledge of shock-compression processes in solids. Later it was determined that Bridgman's static pressure scale was in error, and the shock observations became the basis for calibration of pressure values in static high pressure apparatuses. In spite of the error in pressure scales, Bridgman's concerns on descriptions of shock-compression processes were perceptive and have provided the basis for subsequent fundamental studies of shock-compressed solids. The present paper, written in response to receipt of the 1993 American Physical Society Shock-Compression Science Award, provides a brief contemporary assessment of those shock-compression issues which were the basis of Bridgman's 1956 concerns

  16. Circles of Confidence in Correspondences. : Confidentiality in seventeenth-century knowledge exchange in networks of letters and drawings

    NARCIS (Netherlands)

    van den Heuvel, C.M.J.M.; Weingart, Scott B; Spelt, Nils; Nellen, H.J.M.

    2016-01-01

    Science in the Early Modern World depended on the one hand on openness in scholarly communication, but on the other hand the competition in commerce and trade and the political and religious conflicts required secrecy and confidentiality. This papers analyzes these concepts of confidentiality and

  17. [Hygienic evaluation of health risk for female workers of stock-raising enterprise].

    Science.gov (United States)

    Iusupova, N Z; Shamsiiarov, N N; Dautov, F F

    2012-01-01

    The article presents results of study concerning work conditions of female workers engaged into stock-raising enterprises of Tatarstan Republic. Findings are that major occupational hazards in the female workers are unfavorable microclimate, chemical hazards contaminating ambient air of workplace and high noise level.

  18. Electronic health records

    DEFF Research Database (Denmark)

    Kierkegaard, Patrick

    2011-01-01

    that a centralised European health record system will become a reality even before 2020. However, the concept of a centralised supranational central server raises concern about storing electronic medical records in a central location. The privacy threat posed by a supranational network is a key concern. Cross......-border and Interoperable electronic health record systems make confidential data more easily and rapidly accessible to a wider audience and increase the risk that personal data concerning health could be accidentally exposed or easily distributed to unauthorised parties by enabling greater access to a compilation...... of the personal data concerning health, from different sources, and throughout a lifetime....

  19. 48 CFR 1552.235-78 - Data Security for Toxic Substances Control Act Confidential Business Information (DEC 1997).

    Science.gov (United States)

    2010-10-01

    ...: Data Security for Toxic Substances Control Act Confidential Business Information (DEC 1997) The... 48 Federal Acquisition Regulations System 6 2010-10-01 2010-10-01 true Data Security for Toxic Substances Control Act Confidential Business Information (DEC 1997). 1552.235-78 Section 1552.235-78 Federal...

  20. Synthesis of common management concerns associated with dam removal

    Science.gov (United States)

    Tullos, Desiree D.; Collins, Mathias J.; Bellmore, J. Ryan; Bountry, Jennifer A.; Connolly, Patrick J.; Shafroth, Patrick B.; Wilcox, Andrew C.

    2016-01-01

    Managers make decisions regarding if and how to remove dams in spite of uncertainty surrounding physical and ecological responses, and stakeholders often raise concerns about certain negative effects, regardless of whether or not these concerns are warranted at a particular site. We used a dam-removal science database supplemented with other information sources to explore seven frequently-raised concerns, herein Common Management Concerns (CMCs). We investigate the occurrence of these concerns and the contributing biophysical controls. The CMCs addressed are: degree and rate of reservoir sediment erosion, excessive channel incision upstream of reservoirs, downstream sediment aggradation, elevated downstream turbidity, drawdown impacts on local water infrastructure, colonization of reservoir sediments by non-native plants, and expansion of invasive fish. Biophysical controls emerged for some of the concerns, providing managers with information to assess whether a given concern is likely to occur at a site. To fully assess CMC risk, managers should concurrently evaluate site conditions and identify the ecosystem or human uses that will be negatively affected if the biophysical phenomenon producing the CMC occurs. We show how many CMCs have one or more controls in common, facilitating the identification of multiple risks at a site, and demonstrate why CMC risks should be considered in the context of other factors like natural watershed variability and disturbance history.

  1. A proposed architecture and method of operation for improving the protection of privacy and confidentiality in disease registers

    Directory of Open Access Journals (Sweden)

    Churches Tim

    2003-01-01

    Full Text Available Abstract Background Disease registers aim to collect information about all instances of a disease or condition in a defined population of individuals. Traditionally methods of operating disease registers have required that notifications of cases be identified by unique identifiers such as social security number or national identification number, or by ensembles of non-unique identifying data items, such as name, sex and date of birth. However, growing concern over the privacy and confidentiality aspects of disease registers may hinder their future operation. Technical solutions to these legitimate concerns are needed. Discussion An alternative method of operation is proposed which involves splitting the personal identifiers from the medical details at the source of notification, and separately encrypting each part using asymmetrical (public key cryptographic methods. The identifying information is sent to a single Population Register, and the medical details to the relevant disease register. The Population Register uses probabilistic record linkage to assign a unique personal identification (UPI number to each person notified to it, although not necessarily everyone in the entire population. This UPI is shared only with a single trusted third party whose sole function is to translate between this UPI and separate series of personal identification numbers which are specific to each disease register. Summary The system proposed would significantly improve the protection of privacy and confidentiality, while still allowing the efficient linkage of records between disease registers, under the control and supervision of the trusted third party and independent ethics committees. The proposed architecture could accommodate genetic databases and tissue banks as well as a wide range of other health and social data collections. It is important that proposals such as this are subject to widespread scrutiny by information security experts, researchers and

  2. 7 CFR 981.75 - Confidential nature of records and reports.

    Science.gov (United States)

    2010-01-01

    ... Section 981.75 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (Marketing Agreements and Orders; Fruits, Vegetables, Nuts), DEPARTMENT OF AGRICULTURE ALMONDS..., financial condition, or business operations of any handler shall be considered as confidential information...

  3. Time for Action: Audit, Accountability and Confidential Enquiries into ...

    African Journals Online (AJOL)

    Improving the quality of care is essential for achieving reductions in maternal mortality. Audit is one of the methods which can be used to simultaneously assess as well as improve quality. This commentary discusses one type of audit – confidential enquiries into maternal death. We believe that the enthusiasm for ...

  4. Clinical psychology service users' experiences of confidentiality and informed consent: a qualitative analysis.

    Science.gov (United States)

    Martindale, S J; Chambers, E; Thompson, A R

    2009-12-01

    To explore and describe the experience of clinical psychology service users in relation to the processes associated with confidentiality and the generation of informed consent in individual therapy. A qualitative interview-based study employing interpretative phenomenological analysis was conducted with service users. User researchers were active collaborators in the study. A focus group of four users was convened to explore issues related to confidentiality and consent, which then informed the development of the semi-structured interview schedule. Twelve users of community mental health clinical psychology services were interviewed by user researchers. A user researcher and a clinical psychologist undertook joint analysis of the data. A second clinical psychologist facilitated reflexivity and wider consideration of validity issues. Four main themes were identified from the data: being referred; the participant's feelings, mental health difficulties, and their impact; relationships with workers and carers; and autonomy. The meaningfulness of processes of discussing confidentiality, and generating informed consent, can be improved by psychologists placing a greater emphasis on choice, control, autonomy, individual preferences, and actively involving the user in dialogue on repeated occasions.

  5. MEASUREMENT OF APPLICATION OF ISO 27001 OF CUSTOMER CELLULAR CARD CONFIDENTIALITY DATA IN PT. XYZ AREA JAKARTA

    Directory of Open Access Journals (Sweden)

    Krishna Rahadian

    2014-10-01

    Full Text Available The purpose of this study was to evaluate the effects of the process of ISO 27001 with respect to the confidentiality of customer cellular card Jakarta and to improve cellular card customer data confidentiality at PT.XYZ from data leakage of the customer data due to the third party involvement, clean-desk policy, and access right. Recommendation regarding the improvement is provided after reviewing the confidentiality of customer data. The survey in this study is conducted by questionnaire. From the evaluation results of the questionnaire, it is concluded that the larger customer data leaks are mainly caused by the external factors.

  6. 32 CFR 147.30 - Temporary eligibility for access at the confidential and secret levels and temporary eligibility...

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 1 2010-07-01 2010-07-01 false Temporary eligibility for access at the confidential and secret levels and temporary eligibility for âLâ access authorization. 147.30 Section 147.30... Temporary Access § 147.30 Temporary eligibility for access at the confidential and secret levels and...

  7. Comparison of parental and adolescent views on the confidential interview and adolescent health risk behaviors within the gynecologic setting.

    Science.gov (United States)

    Trotman, Gylynthia E; Mackey, Eleanor; Tefera, Eshetu; Gomez-Lobo, Veronica

    2018-03-23

    To explore parental and adolescent views on the confidential interview in the gynecologic setting and compare adolescent reported risk-taking behaviors with parental perception. Anonymous surveys were administered separately to parents/guardians and adolescents between the ages of 11-17. Information pertaining to the patient's Tanner stage and reason for visit was obtained from the provider. This first phase served as the usual care group. In the second phase of the study, surveys were once again distributed after a brief educational intervention. Linear regression analysis, Wilcoxon rank sum test, and Fisher exact test were used where appropriate. Pediatric and Adolescent Gynecology clinics in two tertiary hospitals INTERVENTION: Brief educational handout on key concepts of the confidential interview MAIN OUTCOME MEASURES: Parental perception of the confidential interview and adolescent risk- taking behaviors RESULTS: A total of 248 surveys were included in the final analysis, which accounts for 62 adolescent and parent/guardian pairs in each group. The majority of parents and adolescents reported perceived benefit to the confidential interview. However, parents were less likely to rate benefits of private time specifically for their own adolescent and less than half of parents believed that adolescents should have access to private time in the gynecologic setting. Both parents/guardians and adolescents feared that the confidential interview would limit the parent's ability to take part in decision-making. The low support for confidential time for their adolescent was not different in the usual care group as compared to the intervention group, although there was a trend toward parental acceptance with increased adolescent age. Adolescents were consistently more likely to report more risk-taking behaviors than their parents perceived. There is a discord between parental perception and adolescent reports of risk taking behaviors. This is coupled with a lack of

  8. Murder-suicide involving BC doctor raises troubling questions about euthanasia.

    Science.gov (United States)

    Wilson, V

    1995-01-01

    The deaths last September of a British Columbia physician and his wife have raised troubling questions about euthanasia and Alzheimer's disease. Police described the deaths of Dr. Tom Powell and his wife Dr. Lorraine Miles, a retired dentist, as a murder-suicide. Friends of the couple wonder if more lenient laws concerning euthanasia and assisted suicide might have saved Miles' life. Images p1856-a PMID:7773902

  9. Exposure ethics: does HIV pre-exposure prophylaxis raise ethical problems for the health care provider and policy maker?

    Science.gov (United States)

    Venter, Francois; Allais, Lucy; Richter, Marlise

    2014-07-01

    The last few years have seen dramatic progress in the development of HIV pre-exposure prophylaxis (PrEP). These developments have been met by ethical concerns. HIV interventions are often thought to be ethically difficult. In a context which includes disagreements over human rights, controversies over testing policies, and questions about sexual morality and individual responsibility, PrEP has been seen as an ethically complex intervention. We argue that this is mistaken, and that in fact, PrEP does not raise new ethical concerns. Some of the questions posed by PrEP are not specific to HIV prophylaxis, but simply standard public health considerations about resource allocation and striking a balance between individual benefit and public good. We consider sexual disinhibition in the context of private prescriptions, and conclude that only unjustified AIDS-exceptionalism or inappropriate moralism about sex supports thinking that PrEP raises new ethical problems. This negative conclusion is significant in a context where supposed ethical concerns about PrEP have been raised, and in the context of HIV exceptionalism. © 2013 John Wiley & Sons Ltd.

  10. Raising Confident Kids

    Science.gov (United States)

    ... First Aid & Safety Doctors & Hospitals Videos Recipes for Kids Kids site Sitio para niños How the Body ... Videos for Educators Search English Español Raising Confident Kids KidsHealth / For Parents / Raising Confident Kids What's in ...

  11. 19 CFR 210.39 - In camera treatment of confidential information.

    Science.gov (United States)

    2010-04-01

    ... 19 Customs Duties 3 2010-04-01 2010-04-01 false In camera treatment of confidential information. 210.39 Section 210.39 Customs Duties UNITED STATES INTERNATIONAL TRADE COMMISSION INVESTIGATIONS OF UNFAIR PRACTICES IN IMPORT TRADE ADJUDICATION AND ENFORCEMENT Prehearing Conferences and Hearings § 210...

  12. Data-protection standards and confidentiality of HIV/AIDS status in ...

    African Journals Online (AJOL)

    Also, the article presents a preliminary assessment of the possible impact of professionalisation (and outsourcing) of workplace HIV/AIDS management on ... the development of law governing data protection and HIV/AIDS confidentiality in South Africa) and interviews conducted with workplace health managers and trade ...

  13. Ethics of social media research: common concerns and practical considerations.

    Science.gov (United States)

    Moreno, Megan A; Goniu, Natalie; Moreno, Peter S; Diekema, Douglas

    2013-09-01

    Social media Websites (SMWs) are increasingly popular research tools. These sites provide new opportunities for researchers, but raise new challenges for Institutional Review Boards (IRBs) that review these research protocols. As of yet, there is little-to-no guidance regarding how an IRB should review the studies involving SMWs. The purpose of this article was to review the common risks inherent in social media research and consider how researchers can consider these risks when writing research protocols. We focused this article on three common research approaches: observational research, interactive research, and survey/interview research. Concomitant with these research approaches, we gave particular attention to the issues pertinent to SMW research, including privacy, consent, and confidentiality. After considering these challenges, we outlined key considerations for both researchers and reviewers when creating or reviewing SMW IRB protocols. Our goal in this article was to provide a detailed examination of relevant ethics and regulatory issues for both researchers and those who review their protocols.

  14. Ethics of Social Media Research: Common Concerns and Practical Considerations

    Science.gov (United States)

    Goniu, Natalie; Moreno, Peter S.; Diekema, Douglas

    2013-01-01

    Abstract Social media Websites (SMWs) are increasingly popular research tools. These sites provide new opportunities for researchers, but raise new challenges for Institutional Review Boards (IRBs) that review these research protocols. As of yet, there is little-to-no guidance regarding how an IRB should review the studies involving SMWs. The purpose of this article was to review the common risks inherent in social media research and consider how researchers can consider these risks when writing research protocols. We focused this article on three common research approaches: observational research, interactive research, and survey/interview research. Concomitant with these research approaches, we gave particular attention to the issues pertinent to SMW research, including privacy, consent, and confidentiality. After considering these challenges, we outlined key considerations for both researchers and reviewers when creating or reviewing SMW IRB protocols. Our goal in this article was to provide a detailed examination of relevant ethics and regulatory issues for both researchers and those who review their protocols. PMID:23679571

  15. Confidentiality Protection of User Data and Adaptive Resource Allocation for Managing Multiple Workflow Performance in Service-Based Systems

    Science.gov (United States)

    An, Ho

    2012-01-01

    In this dissertation, two interrelated problems of service-based systems (SBS) are addressed: protecting users' data confidentiality from service providers, and managing performance of multiple workflows in SBS. Current SBSs pose serious limitations to protecting users' data confidentiality. Since users' sensitive data is sent in…

  16. 21 CFR 1316.23 - Confidentiality of identity of research subjects.

    Science.gov (United States)

    2010-04-01

    ... 21 Food and Drugs 9 2010-04-01 2010-04-01 false Confidentiality of identity of research subjects. 1316.23 Section 1316.23 Food and Drugs DRUG ENFORCEMENT ADMINISTRATION, DEPARTMENT OF JUSTICE ADMINISTRATIVE FUNCTIONS, PRACTICES, AND PROCEDURES Protection of Researchers and Research Subjects § 1316.23...

  17. 37 CFR 382.4 - Confidential information and statements of account.

    Science.gov (United States)

    2010-07-01

    ... information and statements of account. (a) For purposes of this subpart, confidential information shall include statements of account and any information pertaining to the statements of account designated as... payments. (c) A statement of account shall include only such information as is necessary to verify the...

  18. Raised intracranial pressure

    African Journals Online (AJOL)

    is article presents an approach to raised intracranial pressure (ICP) constructed in a question-answer fashion. ..... Given that raised ICP is a serious and potentially life-threatening emergency, fast and reliable referral and transfer mechanisms should be established to ensure patients with this condition are effectively treated.

  19. 75 FR 8330 - Access to Confidential Business Information by Eastern Research Group

    Science.gov (United States)

    2010-02-24

    ... ENVIRONMENTAL PROTECTION AGENCY [EPA-HQ-OPPT-2003-0004; FRL-8812-4] Access to Confidential Business Information by Eastern Research Group AGENCY: Environmental Protection Agency (EPA). ACTION: Notice. [[Page 8331

  20. [Ethical considerations in genomic cohort study].

    Science.gov (United States)

    Choi, Eun Kyung; Kim, Ock-Joo

    2007-03-01

    During the last decade, genomic cohort study has been developed in many countries by linking health data and genetic data in stored samples. Genomic cohort study is expected to find key genetic components that contribute to common diseases, thereby promising great advance in genome medicine. While many countries endeavor to build biobank systems, biobank-based genome research has raised important ethical concerns including genetic privacy, confidentiality, discrimination, and informed consent. Informed consent for biobank poses an important question: whether true informed consent is possible in population-based genomic cohort research where the nature of future studies is unforeseeable when consent is obtained. Due to the sensitive character of genetic information, protecting privacy and keeping confidentiality become important topics. To minimize ethical problems and achieve scientific goals to its maximum degree, each country strives to build population-based genomic cohort research project, by organizing public consultation, trying public and expert consensus in research, and providing safeguards to protect privacy and confidentiality.

  1. Changes in public attitudes towards confidential adolescent sexual and reproductive health services in Lithuania after the introduction of new legislation

    DEFF Research Database (Denmark)

    Jaruseviciene, Lina; Zaborskis, Apolinaras; Sauliune, Skirmante

    2015-01-01

    was employed to estimate absolute differences in prevalence of belief in whether or not adolescents would find confidentiality important when consulting a physician on SRH issues. A log-binomial regression model was fitted to estimate the relative changes (prevalence ratio) of the independent variables......BACKGROUND: In Lithuania, the right to confidentiality in healthcare for adolescents over the age of 16 was guaranteed in 2010 through the adoption of new legislation. This study sets out to explore changes in Lithuanian residents' attitudes towards confidentiality protection in adolescent sexual....... RESULTS: The total number of respondents was 1054 (response rate 83%) in 2005 and 1002 (response rate 80%) in 2012. The proportion of respondents who reported a belief that adolescents would find confidentiality important when seeing a physician for SRH issues increased significantly from 62% in 2005...

  2. Privacy Act System of Records: Confidential Business Information Tracking System, EPA-20

    Science.gov (United States)

    Learn about the Confidential Business Information Tracking System, including who is covered in the system, the purpose of data collection, routine uses for the system's records, and other security procedures.

  3. 40 CFR 1601.26 - Special procedures for confidential business information.

    Science.gov (United States)

    2010-07-01

    ... described in paragraph (c) of this section, the CSB shall, to the extent permitted by law, afford a business... business information. 1601.26 Section 1601.26 Protection of Environment CHEMICAL SAFETY AND HAZARD... Requesting and Disclosing Records § 1601.26 Special procedures for confidential business information. (a) In...

  4. 42 CFR 3.206 - Confidentiality of patient safety work product.

    Science.gov (United States)

    2010-10-01

    ... 42 Public Health 1 2010-10-01 2010-10-01 false Confidentiality of patient safety work product. 3... individually identifiable health information in such patient safety work product, the direct identifiers listed at 45 CFR 164.514(e)(2) have been removed. (5) Disclosure of nonidentifiable patient safety work...

  5. 77 FR 12284 - Access to Confidential Business Information; Protection Strategies Incorporated

    Science.gov (United States)

    2012-02-29

    ... Business Information; Protection Strategies Incorporated AGENCY: Environmental Protection Agency (EPA). ACTION: Notice. SUMMARY: EPA has authorized its contractor, Protection Strategies Incorporated (PSI) of... Business Information (CBI). DATES: Access to the confidential data occurred on or about February 16, 2012...

  6. Health and fracking: Should the medical profession be concerned ...

    African Journals Online (AJOL)

    fracking) may reduce carbon emissions relative to the use of coal and have substantial economic benefits for South Africa. However, concerns have been raised regarding the health and environmental impacts. The drilling and fracking processes ...

  7. Confidentiality and its limits: some contributions from Christianity.

    Science.gov (United States)

    Torrance, I R

    2003-02-01

    The issue is whether Christianity, of its nature, would seek to prevent a justifiable breach of confidentiality or could endorse it, under certain circumstances, as the act which is fundamentally more loving or more truthful. The individualistic nature of Western Christianity is noted. The Lutheran theologian Dietrich Bonhoeffer is used to show Christian support for dynamic rather than literal truth telling, and for awareness of the contexts and power relations within which persons stand.

  8. Confidential conversations between supervisor and employee as a means for improving leadership: a quasi-experimental study in hospital wards.

    Science.gov (United States)

    Kivimäki, M

    1996-11-01

    Although yearly confidential conversations between a supervisor and an employee have been recommended as a means for improving leadership, evidence on the actual effects of these conversations has been lacking. The present study therefore investigated whether confidential conversations improve perceptions of goal clarity, sufficiency of feedback and innovativeness, and elicit satisfaction with the supervisor's leadership style within the hospital setting. Nine wards were divided into one experimental group (3 wards) and two control groups (3 + 3 wards). A questionnaire on goal clarity, feedback, innovativeness and satisfaction was administered twice to every group (1st measurement: r = 186, 2nd measurement: n = 163). The experimental group began confidential conversations after the first measurement, control group 1 entered into conversations during both measurements, and control group 2 did not enter into conversations at the time of either measurement. Confidential conversations improved perceived feedback. In both measurements, the sufficiency of feedback was reported to be significantly better in the groups having conversations than in the other groups. In addition, there was a significant positive change in the perceived sufficiency of feedback in the experimental group but not in the other groups. Confidential conversations did not affect the perceptions of goal clarity and innovativeness or elicit satisfaction with the supervisor's management style.

  9. The Confidentiality of Medical Secrets of Patients by the Nursing Staff

    Directory of Open Access Journals (Sweden)

    Chalkias Theodoros

    2010-01-01

    Full Text Available In this article you will find a critical discussion about the significance of confidentiality of "medical secrets" (keeping the secrets of ill people by nurses. Special cases are mentioned regarding the need to keep, or reveal the secret.

  10. Critics raise moral objections to Federal AIDS education classes.

    Science.gov (United States)

    1995-07-28

    Lawmakers and a handful of government employees have objected to the Federal government's programs to educate its employees about AIDS. At the June 22, 1995 hearing of the civil service subcommittee of the House Government Reform and Oversight Committee, protests were raised on religious or moral grounds. Thomas Herron, a supervisory logistics manager at the Naval Air Technical Services Facility in Philadelphia found the training to be against the principles of his faith. Rep. Robert K. Dornan (R-Calif) said his office was flooded with calls and letters from employees who raised concern that the training is being used to advance a redefinition of the family and is a blatant pro-homosexual agenda. Robert L. Maginnis, policy analyst for the conservative Family Research Council, faulted the training, saying it does little to change behavior that puts people at risk for HIV infection. Clinton administration officials testified at the meeting that the program is necessary to ensure both the safety of the workforce and employees' freedom from discrimination and harassment. Individual departments and agencies are responsible for developing their own AIDS training programs. According to Alan Heuerman, associate director for human resource systems service with the Office of Personnel Management, relatively few objections have been raised about the training.

  11. Raising the standards of the calf-raise test: a systematic review.

    Science.gov (United States)

    Hébert-Losier, Kim; Newsham-West, Richard J; Schneiders, Anthony G; Sullivan, S John

    2009-11-01

    The calf-raise test is used by clinicians and researchers in sports medicine to assess properties of the calf muscle-tendon unit. The test generally involves repetitive concentric-eccentric muscle action of the plantar-flexors in unipedal stance and is quantified by the number of raises performed. Although the calf-raise test appears to have acceptable reliability and face validity, and is commonly used for medical assessment and rehabilitation of injuries, no universally acceptable test parameters have been published to date. A systematic review of the existing literature was conducted to investigate the consistency as well as universal acceptance of the evaluation purposes, test parameters, outcome measurements and psychometric properties of the calf-raise test. Nine electronic databases were searched during the period May 30th to September 21st 2008. Forty-nine articles met the inclusion criteria and were quality assessed. Information on study characteristics and calf-raise test parameters, as well as quantitative data, were extracted; tabulated; and statistically analysed. The average quality score of the reviewed articles was 70.4+/-12.2% (range 44-90%). Articles provided various test parameters; however, a consensus was not ascertained. Key testing parameters varied, were often unstated, and few studies reported reliability or validity values, including sensitivity and specificity. No definitive normative values could be established and the utility of the test in subjects with pathologies remained unclear. Although adapted for use in several disciplines and traditionally recommended for clinical assessment, there is no uniform description of the calf-raise test in the literature. Further investigation is recommended to ensure consistent use and interpretation of the test by researchers and clinicians.

  12. Sibling cooperative and externalizing behaviors in families raising children with disabilities.

    Science.gov (United States)

    Platt, Christine; Roper, Susanne Olsen; Mandleco, Barbara; Freeborn, Donna

    2014-01-01

    Raising a child with a disability (CWD) in the home is increasing across the globe. Because of caregiver burden and the complexity of care, there is growing concern for typically developing sibling (TDS) outcomes. The aim of the study was to examine whether caregiver burden, parenting style, and sibling relationships in families raising a CWD are associated with cooperative and externalizing behaviors in TDS. This correlational study included 189 families raising both a CWD and a TDS. Multilevel modeling was used to identify which variables were most predictive of TDS outcomes and if there were parent gender effects. Authoritative parenting was positively associated with cooperative behaviors. Authoritarian parenting was positively associated with externalizing behaviors. Multilevel modeling revealed caregiver burden was a significant predictor of sibling behaviors in the first model. When parenting style was added as a predictor, it was also significant. When sibling relationships were added as predictors, they were significant predictors for both cooperative and externalizing TDS behaviors; however, caregiver burden was no longer significant. Authoritarian parenting significantly predicted externalizing behaviors, and authoritative parenting was significantly related to cooperative behaviors. In families raising a CWD, positive sibling relationships may help negate the effects of caregiver burden and are more predictive of TDS outcomes than some parenting practices.

  13. General Practitioners' Concerns About Online Patient Feedback: Findings From a Descriptive Exploratory Qualitative Study in England.

    Science.gov (United States)

    Patel, Salma; Cain, Rebecca; Neailey, Kevin; Hooberman, Lucy

    2015-12-08

    The growth in the volume of online patient feedback, including online patient ratings and comments, suggests that patients are embracing the opportunity to review online their experience of receiving health care. Very little is known about health care professionals' attitudes toward online patient feedback and whether health care professionals are comfortable with the public nature of the feedback. The aim of the overall study was to explore and describe general practitioners' attitudes toward online patient feedback. This paper reports on the findings of one of the aims of the study, which was to explore and understand the concerns that general practitioners (GPs) in England have about online patient feedback. This could then be used to improve online patient feedback platforms and help to increase usage of online patient feedback by GPs and, by extension, their patients. A descriptive qualitative approach using face-to-face semistructured interviews was used in this study. A topic guide was developed following a literature review and discussions with key stakeholders. GPs (N=20) were recruited from Cambridgeshire, London, and Northwest England through probability and snowball sampling. Interviews were transcribed verbatim and analyzed in NVivo using the framework method, a form of thematic analysis. Most participants in this study had concerns about online patient feedback. They questioned the validity of online patient feedback because of data and user biases and lack of representativeness, the usability of online patient feedback due to the feedback being anonymous, the transparency of online patient feedback because of the risk of false allegations and breaching confidentiality, and the resulting impact of all those factors on them, their professional practice, and their relationship with their patients. The majority of GPs interviewed had reservations and concerns about online patient feedback and questioned its validity and usefulness among other things

  14. Noise, What Noise? Raising Awareness of Auditory Health among Future Primary-School Teachers

    Science.gov (United States)

    Jimenez-Tejada, M. -P.; Hodar, J. A.; Gonzalez-Garcia, F.

    2012-01-01

    We study the perception of acoustic contamination and its deleterious effects on students preparing to become school teachers and analyse their acoustic habits, with the aim of raising their awareness concerning this problem. We designed a number of activities, applied during a practical lesson, in which students evaluated some of their…

  15. Payers' experiences with confidential pharmaceutical price discounts: A survey of public and statutory health systems in North America, Europe, and Australasia.

    Science.gov (United States)

    Morgan, Steven G; Vogler, Sabine; Wagner, Anita K

    2017-04-01

    Institutional payers for pharmaceuticals worldwide appear to be increasingly negotiating confidential discounts off of the official list price of pharmaceuticals purchased in the community setting. We conducted an anonymous survey about experiences with and attitudes toward confidential discounts on patented pharmaceuticals in a sample of high-income countries. Confidential price discounts are now common among the ten health systems that participated in our study, though some had only recently begun to use these pricing arrangements on a routine basis. Several health systems had used a wide variety of discounting schemes in the past two years. The most frequent discount received by participating health systems was between 20% and 29% of official list prices; however, six participants reported their health system received one or more discount over the past two years that was valued at 60% or more of the list prices. On average, participants reported that confidential discounts were more common, complex, and significant for specialty pharmaceuticals than for primary care pharmaceuticals. Participants had a more favorable view of the impact of confidential discount schemes on their health systems than on the global marketplace. Overall, the frequency, complexity, and scale of confidential discounts being routinely negotiated suggest that the list prices for medicines bear limited resemblance to what many institutional payers actually pay. Copyright © 2017 The Authors. Published by Elsevier B.V. All rights reserved.

  16. 22 CFR 212.38 - Predisclosure notification procedures for confidential commercial information.

    Science.gov (United States)

    2010-04-01

    ... 22 Foreign Relations 1 2010-04-01 2010-04-01 false Predisclosure notification procedures for confidential commercial information. 212.38 Section 212.38 Foreign Relations AGENCY FOR INTERNATIONAL DEVELOPMENT PUBLIC INFORMATION Access to Agency Records § 212.38 Predisclosure notification procedures for...

  17. Security, privacy, and confidentiality issues on the Internet

    OpenAIRE

    Kelly, Grant; McKenzie, Bruce

    2002-01-01

    We introduce the issues around protecting information about patients and related data sent via the Internet. We begin by reviewing three concepts necessary to any discussion about data security in a healthcare environment: privacy, confidentiality, and consent. We are giving some advice on how to protect local data. Authentication and privacy of e-mail via encryption is offered by Pretty Good Privacy (PGP) and Secure Multipurpose Internet Mail Extensions (S/MIME). The de facto Internet standa...

  18. 12 CFR 366.13 - What is my obligation regarding confidential information?

    Science.gov (United States)

    2010-01-01

    ... services on your behalf may use or disclose information obtained from us or a third party in connection... general public. (b) The following are examples of when your use of confidential information is... financial information, such as a financial statement to an unauthorized party. ...

  19. Macroeconomic Conditions and Capital Raising

    OpenAIRE

    Isil Erel; Brandon Julio; Woojin Kim; Michael S. Weisbach

    2011-01-01

    Do macroeconomic conditions affect firms' abilities to raise capital? If so, how do they affect the manner in which the capital is raised? We address these questions using a large sample of publicly-traded debt issues, seasoned equity offers, bank loans and private placements of equity and debt. Our results suggest that a borrower's credit quality significantly affects its ability to raise capital during macroeconomic downturns. For noninvestment-grade borrowers, capital raising tends to be p...

  20. 75 FR 56096 - Access to Confidential Business Information by Industrial Economics Incorporated

    Science.gov (United States)

    2010-09-15

    ... ENVIRONMENTAL PROTECTION AGENCY [EPA-HQ-OPPT-2003-0004; FRL-8845-1] Access to Confidential Business Information by Industrial Economics Incorporated AGENCY: Environmental Protection Agency (EPA). ACTION: Notice. SUMMARY: EPA has authorized contractor, Industrial Economics Incorporated (IEI) of...

  1. 45 CFR 60.15 - Confidentiality of National Practitioner Data Bank information.

    Science.gov (United States)

    2010-10-01

    ... 45 Public Welfare 1 2010-10-01 2010-10-01 false Confidentiality of National Practitioner Data Bank information. 60.15 Section 60.15 Public Welfare DEPARTMENT OF HEALTH AND HUMAN SERVICES GENERAL ADMINISTRATION NATIONAL PRACTITIONER DATA BANK FOR ADVERSE INFORMATION ON PHYSICIANS AND OTHER HEALTH CARE PRACTITIONERS...

  2. 19 CFR 201.19 - Notification regarding requests for confidential business information.

    Science.gov (United States)

    2010-04-01

    ... business information. 201.19 Section 201.19 Customs Duties UNITED STATES INTERNATIONAL TRADE COMMISSION GENERAL RULES OF GENERAL APPLICATION Availability of Information to the Public Pursuant to 5 U.S.C. 552 § 201.19 Notification regarding requests for confidential business information. (a) In general. Business...

  3. Conversion of invisible metal-organic frameworks to luminescent perovskite nanocrystals for confidential information encryption and decryption.

    Science.gov (United States)

    Zhang, Congyang; Wang, Bo; Li, Wanbin; Huang, Shouqiang; Kong, Long; Li, Zhichun; Li, Liang

    2017-10-31

    Traditional smart fluorescent materials, which have been attracting increasing interest for security protection, are usually visible under either ambient or UV light, making them adverse to the potential application of confidential information protection. Herein, we report an approach to realize confidential information protection and storage based on the conversion of lead-based metal-organic frameworks (MOFs) to luminescent perovskite nanocrystals (NCs). Owing to the invisible and controlled printable characteristics of lead-based MOFs, confidential information can be recorded and encrypted by MOF patterns, which cannot be read through common decryption methods. Through our conversion strategy, highly luminescent perovskite NCs can be formed quickly and simply by using a halide salt trigger that reacts with the MOF, thus promoting effective information decryption. Finally, through polar solvents impregnation and halide salt conversion, the luminescence of the perovskite NCs can be quenched and recovered, leading to reversible on/off switching of the luminescence signal for multiple information encryption and decryption processes.

  4. Biobanks in South Africa: A global perspective on privacy and confidentiality

    Directory of Open Access Journals (Sweden)

    Riaan Rheeder

    2017-05-01

    Full Text Available The Universal Declaration of Bioethics and Human Rights (UDBHR of the United Nations Educational, Scientific and Cultural Organization (UNESCO was adopted unanimously in 2005 by the world community as a universal guideline, according to which members of the global community were accountable to each other. Research results from UNESCO show that the UDBHR has had little or no impact in South Africa (SA. The primary objective of this article is to promote awareness of the UDBHR in SA and Africa by focusing on Article 9 of the Declaration, which accepts the right to privacy and confidentiality. For this objective to be relevant in the SA context, depends on whether the guidelines of the National Department of Health’s Ethics in Health Research: Principles, Processes and Structures of 2015 acknowledge biobanks of the universally accepted ethical guidelines on privacy and confidentiality of autonomous persons and whether these guidelines are broadly in accordance with global bioethical guidelines.

  5. Are Australians concerned about nanoparticles? A comparative analysis with established and emerging environmental health issues.

    Science.gov (United States)

    Capon, Adam; Rolfe, Margaret; Gillespie, James; Smith, Wayne

    2015-02-01

    Introducing new technologies into society raises considerable public concern. We determine the public concern about nanoparticles, and compare this concern to other environmental health issues such as wind farms and coal seam gas production. A repeat cross sectional survey examining views on environmental health issues, risk, chemicals and trust was undertaken in more than 1,300 Australian residents in 2000 and 2013. Logistic regression and principal component analysis was used to investigate predictors of nanoparticle concern and identify a component structure for environmental health issues that could explain a trend of future nanoparticle concern. Australians have a relatively low level of concern about the risks of nanoparticles to health when compared to their concerns about other environmental health issues. Items associated with concern included gender, a general wish to avoid chemicals and possibly trust in politicians. Concern over nanoparticles clustered with similar views on technological risks. Current public concern over the risks of nanoparticles is low. However, a reframing of the issue towards 'chemicals' is likely to have a negative effect on risk perceptions. This paper raises questions about appropriate channels for the effective communication of risk. © 2015 Public Health Association of Australia.

  6. Addressing issues raised by stakeholders: experiences of eight organisations

    International Nuclear Information System (INIS)

    Vari, Anna

    2004-01-01

    Demand for stakeholder involvement has become imperative in the field of radioactive waste management. Providing for fair and competent stakeholder involvement, however, raises several questions of practice, for example: How to address issues raised by stakeholders? How to take stakeholders' views into consideration if they are divergent or conflicting? This paper reviews eight case studies prepared for the Topical Session on Addressing Issues Raised by Stakeholders, aimed at analysing the impacts of stakeholder involvement on decisions in RWM organisations. The studies outline the experiences of the following organisations: Canadian Nuclear Safety Commission (CNSC); Canadian Nuclear Waste Management Organization (NWMO); Nuclear Waste Management Organisation of Japan (NUMO); Posiva, Finland; Radioactive Waste Repository Authority, Czech Republic (RAWRA); Swedish Radiation Protection Authority (SSI); United Kingdom Environment Agency; United States Environmental Protection Agency (EPA). Case study reports are included in the Annex of this volume. The paper outlines the main trends and lessons learned from the above case studies. The first section focuses on impacts of stakeholder involvement on specific RWM decisions regarding policy and process. Examples presented in the second section illustrate how stakeholders' concerns may influence general decision-making practices and organisational behaviour. In the third section various approaches to handling divergent stakeholder views are introduced. The paper concludes with recommendations extracted and derived from the eight reports. (author)

  7. 78 FR 54889 - Proposed Information Collection Request; Comment Request; Confidentiality Rules (Renewal)

    Science.gov (United States)

    2013-09-06

    ... received will be included in the public docket without change including any personal information provided, unless the comment includes profanity, threats, or information claimed to be Confidential Business... of appropriate automated electronic, mechanical, or other technological collection techniques or...

  8. The Psychological Competence of Police Officers in Confidential Cooperation with Citizens

    Science.gov (United States)

    Uspanov, Zholdybai T.; Turabayeva, Dana S.; Ermolovich, Vladimir F.

    2016-01-01

    This research studied the psychological aspects of citizens' assistance to law enforcement agencies on a confidential basis. The comprehensive observance of the psychological norms of cooperation is determined by the professional ethics of police officers, the necessity of nondisclosure of investigation secrets by citizens, and the security of the…

  9. 76 FR 69722 - Access to Confidential Business Information by Protection Strategies Incorporated

    Science.gov (United States)

    2011-11-09

    ... Business Information by Protection Strategies Incorporated AGENCY: Environmental Protection Agency (EPA... Control Act (TSCA) confidential business information and to provide notice that this contract has been extended until December 31, 2011. Protection Strategies Incorporated (PSI) has been the owner of Eagle...

  10. Training Concerns for an Online Public Access Catalog.

    Science.gov (United States)

    Rockman, Ilene F.; Adalian, Paul T., Jr.

    This report is designed to raise issues and concerns which will affect the successful implementation of an education and training program once an online public access catalog (OLPAC) has been installed in the Kennedy Library at California Polytechnic State University (Cal Poly), San Luis Obispo. Information presented in the document was gathered…

  11. Anonymous or confidential HIV counseling and voluntary testing in federally funded testing sites--United States, 1995-1997.

    Science.gov (United States)

    1999-06-25

    Human immunodeficiency virus (HIV) counseling and voluntary testing (CT) programs have been an important part of national HIV prevention efforts since the first HIV antibody tests became available in 1985. In 1995, these programs accounted for approximately 15% of annual HIV antibody testing in the United States, excluding testing for blood donation. CT opportunities are offered to persons at risk for HIV infection at approximately 11,000 sites, including dedicated HIV CT sites, sexually transmitted disease (STD) clinics, drug-treatment centers, hospitals, and prisons. In 39 states, testing can be obtained anonymously, where persons do not have to give their name to get tested. All states provide confidential testing (by name) and have confidentiality laws and regulations to protect this information. This report compares patterns of anonymous and confidential testing in all federally funded CT programs from 1995 through 1997 and documents the importance of both types of testing opportunities.

  12. Radiation protection issues raised in Korea since Fukushima accident

    International Nuclear Information System (INIS)

    Kim, Byeongsoo

    2014-01-01

    For the past 3 years since Fukushima accident, various issues related to nuclear safety and radiation safety were raised in Korea. This presentation focuses radiation protection (RP) issues among the various issues and has the purpose to share experiences and lessons-learned related to the RP issues. Special safety inspections on NPPs in Korea were performed immediately after Fukushima accident and 50 follow-up measures were established in May, 2011 to improve the nuclear safety. Some of them were related to radiation protection and emergency responses. Recently, in March, 2014, additional follow-up measures were decided to be taken in additionally strengthening safety-related equipment and emergency response organization. The 50 Fukushima-accident-follow-up measures include radiation protection for members of the public in emergency responses. Based on the follow-up measures, expansion of emergency planning zone (EPZ) is to be made according to the approval of legislation by National Assembly on May 2, 2014. For the past 3 years, the degree of the public concerns on radiation risk has been the highest. Spontaneous activities for radiation monitoring happened in the public. Some members of the public found some contaminated paved roads in November, 2011 and a contaminated kitchen ware in January, 2012. These findings suggest the importance of the management of recycled metal scraps imported from other countries. Fukushima accident gave much impact on Korean society all. The public gets very sensitive to issues about nuclear safety and radiation safety. Most parts of RP issues raised are related to the public. The lessons-learned are that as an issue is raised, it has a chance to be solved. However, RP issues related to radiation workers in accident conditions in NPPs are difficult to be raised enough to confirm and improve the robustness of radiation protection programs in accident conditions. It is necessary to share RP issues raised in each country as well as

  13. Cancer surveillance and information: balancing public health with privacy and confidentiality concerns (United States).

    Science.gov (United States)

    Deapen, Dennis

    2006-06-01

    Rapid advances in informatics and communication technologies are greatly expanding the capacity for information capture and transportation. While these tools can be used for great good, they also offer new opportunities for those who seek to obtain and use information for improper purposes. While issues related to identity theft for financial gain garner the most attention, protection of privacy in public health endeavors such as cancer surveillance is also a significant concern. Some efforts to protect health-related information have had unintended consequences detrimental to health research and public health practice. Achieving a proper balance between measures to protect privacy and the ability to guard and improve public health requires careful consideration and development of appropriate policies, regulations and use of technology.

  14. 75 FR 44951 - Inquiry To Learn Whether Businesses Assert Business Confidentiality Claims

    Science.gov (United States)

    2010-07-30

    ... such treatment. Certain businesses, however, do not meet the definition of ``affected business,'' and... definition of ``affected business,'' and are not covered by today's notice. They consist of any business that... Businesses Assert Business Confidentiality Claims AGENCY: Environmental Protection Agency (EPA). ACTION...

  15. 76 FR 362 - Inquiry To Learn Whether Businesses Assert Business Confidentiality Claims

    Science.gov (United States)

    2011-01-04

    ... claims for such treatment. Certain businesses, however, do not meet the definition of ``affected business.... Certain businesses, however, do not meet the definition of ``affected business,'' and are not covered by... Businesses Assert Business Confidentiality Claims AGENCY: Environmental Protection Agency (EPA). ACTION...

  16. Scheduler-specific Confidentiality for Multi-Threaded Programs and Its Logic-Based Verification

    NARCIS (Netherlands)

    Huisman, Marieke; Ngo, Minh Tri

    2011-01-01

    Observational determinism has been proposed in the literature as a way to ensure confidentiality for multi-threaded programs. Intuitively, a program is observationally deterministic if the behavior of the public variables is deterministic, i.e., independent of the private variables and the

  17. 75 FR 55577 - Clean Water Act; Contractor Access to Confidential Business Information

    Science.gov (United States)

    2010-09-13

    ... ENVIRONMENTAL PROTECTION AGENCY [FRL-9200-8] Clean Water Act; Contractor Access to Confidential... Recovery Act (RCRA). Transfer of the information will allow the contractor and subcontractors to access... contractors and subcontractors over the history of the effluent guidelines program. EPA determined that this...

  18. 77 FR 60962 - Clean Water Act; Contractor Access to Confidential Business Information

    Science.gov (United States)

    2012-10-05

    ... ENVIRONMENTAL PROTECTION AGENCY 40 CFR Part 2 [FRL-9733-8] Clean Water Act; Contractor Access to... transfer of confidential business information to contractor, subcontractors, and consultants. SUMMARY: The... certain industries. We have determined that the contractors listed below require access [[Page 60963

  19. 75 FR 60452 - Clean Water Act; Contractor Access to Confidential Business Information

    Science.gov (United States)

    2010-09-30

    ... ENVIRONMENTAL PROTECTION AGENCY [FRL-9208-9] Clean Water Act; Contractor Access to Confidential... electric industry to a new subcontractor of a contractor, Eastern Research Group (ERG). EPA previously... contractors and subcontractors to access information necessary to support EPA in the planning, development...

  20. Contributory factors in surgical incidents as delineated by a confidential reporting system.

    Science.gov (United States)

    Mushtaq, F; O'Driscoll, C; Smith, Fct; Wilkins, D; Kapur, N; Lawton, R

    2018-05-01

    Background Confidential reporting systems play a key role in capturing information about adverse surgical events. However, the value of these systems is limited if the reports that are generated are not subjected to systematic analysis. The aim of this study was to provide the first systematic analysis of data from a novel surgical confidential reporting system to delineate contributory factors in surgical incidents and document lessons that can be learned. Methods One-hundred and forty-five patient safety incidents submitted to the UK Confidential Reporting System for Surgery over a 10-year period were analysed using an adapted version of the empirically-grounded Yorkshire Contributory Factors Framework. Results The most common factors identified as contributing to reported surgical incidents were cognitive limitations (30.09%), communication failures (16.11%) and a lack of adherence to established policies and procedures (8.81%). The analysis also revealed that adverse events were only rarely related to an isolated, single factor (20.71%) - with the majority of cases involving multiple contributory factors (79.29% of all cases had more than one contributory factor). Examination of active failures - those closest in time and space to the adverse event - pointed to frequent coupling with latent, systems-related contributory factors. Conclusions Specific patterns of errors often underlie surgical adverse events and may therefore be amenable to targeted intervention, including particular forms of training. The findings in this paper confirm the view that surgical errors tend to be multi-factorial in nature, which also necessitates a multi-disciplinary and system-wide approach to bringing about improvements.

  1. Raising the Bar for Reproducible Science at the US Environmental Protection Agency Office of Research and Development

    Science.gov (United States)

    Considerable concern has been raised regarding research reproducibility both within and outside the scientific community. Several factors possibly contribute to a lack of reproducibility, including a failure to adequately employ statistical considerations during study design, bia...

  2. Raising the bar (6)

    NARCIS (Netherlands)

    Elhorst, Paul; Abreu, Maria; Amaral, Pedro; Bhattacharjee, Arnab; Corrado, Luisa; Doran, Justin; Fingleton, Bernard; Fuerst, Franz; Garretsen, Harry; Igliori, Danilo; Le Gallo, Julie; McCann, Philip; Monastiriotis, Vassilis; Quatraro, Francesco; Yu, Jihai

    2017-01-01

    Raising the bar (6). Spatial Economic Analysis. This editorial summarizes and comments on the papers published in issue 12(4) so as to raise the bar in applied spatial economic research and highlight new trends. The first paper addresses the question of whether 'jobs follow people' or 'people follow

  3. ACOG Committee Opinion No. 409: Direct-to-consumer marketing of genetic testing.

    Science.gov (United States)

    2008-06-01

    Marketing of genetic testing, although similar to direct-to-consumer advertising of prescription drugs, raises additional concerns and considerations. These include issues of limited knowledge among patients and health care providers of available genetic tests, difficulty in interpretation of genetic testing results, lack of federal oversight of companies offering genetic testing, and issues of privacy and confidentiality. Until all of these considerations are addressed, direct or home genetic testing should be discouraged because of the potential harm of a misinterpreted or inaccurate result.

  4. Gossip, stories and friendship: confidentiality in midwifery practice.

    Science.gov (United States)

    James, S

    1995-12-01

    Women often seek midwifery care as an alternative to the maternity services that are readily available within the insured health care system in Alberta. Some aspects of community-based, primary care midwifery in Alberta that characterize this alternative are the use of story-telling as a form of knowledge, the development of social connections among women seeking midwifery care, and nonauthoritarian relationships between midwives and women. In this paper, the concept of confidentiality, as it relates to these aspects of midwifery practice, is explored, using traditional, caring and feminist models of ethics.

  5. 75 FR 4812 - Inquiry To Learn Whether Businesses Assert Business Confidentiality Claims

    Science.gov (United States)

    2010-01-29

    ..., however, do not meet the definition of ``affected business,'' and are not covered by today's notice. They.... Certain businesses, however, do not meet the definition of ``affected business,'' and are not covered by... Businesses Assert Business Confidentiality Claims AGENCY: Environmental Protection Agency (EPA). ACTION...

  6. 78 FR 79692 - Clean Water Act; Contractor Access to Confidential Business Information

    Science.gov (United States)

    2013-12-31

    ... ENVIRONMENTAL PROTECTION AGENCY [FRL-9904-94-OW] Clean Water Act; Contractor Access to... Transfer of Confidential Business Information to Contractor, Subcontractors, and Consultants. SUMMARY: The... contractors listed below require access to CBI submitted to EPA under Section 308 of the Clean Water Act (CWA...

  7. 5 CFR 213.3301 - Positions of a confidential or policy-determining nature.

    Science.gov (United States)

    2010-01-01

    ... 5 Administrative Personnel 1 2010-01-01 2010-01-01 false Positions of a confidential or policy-determining nature. 213.3301 Section 213.3301 Administrative Personnel OFFICE OF PERSONNEL MANAGEMENT CIVIL... or policy-determining nature. (a) Upon specific authorization by OPM, agencies may make appointments...

  8. Using and Disclosing Confidential Patient Information and The English Common Law: What are the Information Requirements of a Valid Consent?

    Science.gov (United States)

    Chico, Victoria; Taylor, Mark J

    2018-02-01

    The National Health Service in England and Wales is dependent upon the flow of confidential patient data. In the context of consent to the use of patient health data, insistence on the requirements of an 'informed' consent that are difficult to achieve will drive reliance on alternatives to consent. Here we argue that one can obtain a valid consent to the disclosure of confidential patient data, such that this disclosure would not amount to a breach of the common law duty of confidentiality, having provided less information than would typically be associated with an 'informed consent'. This position protects consent as a practicable legal basis for disclosure from debilitating uncertainty or impracticability and, perhaps counter-intuitively, promotes patient autonomy.

  9. DLP: REDUCED RISK OF LEAKAGE OF CONFIDENTIAL INFORMATION OF THE BANK

    Directory of Open Access Journals (Sweden)

    T. A. Andryianava

    2017-01-01

    Full Text Available Research application of DLP-system for protection of confidential information, a methodology for adapting the DLP-system to the specific activities of the organization, comparative analysis of the results of standard and adapted DLP-systems in the Bank. Developed: a technique for analyzing information security events, algorithm for responding to identified events, methodology and procedures for adapting the standard DLP-system to the specifics of the Bank’s activities. The methodology for adapting a standard DLP-system to the specifics of the Bank’s work consists of the following activities: identification of critical corporate information categories, audit of information systems, description of current risks and their assessment, introduction of rules for Bank’s critical information and setting up a DLP system in accordance with the specifics of the Bank’s work. Modernization of the configuration of a standard DLP-system includes the following procedures: selection of confidential information of the Bank based on membership criteria, setting up detection, creating perimeters and developing an algorithm for responding to identified information security events in the Bank. The algorithm is designed to improve the efficiency of the response of information security officers in cases of incident detection and describes the stages of the subsequent actions. The results of the research prove that using an adapted DLP-system significantly reduces the number of false positives, increasing the accuracy of detecting confidential information and reducing the risk of leakage of critical information outside the corporate network. The application of the adapted DLP-system in the Bank allowed to increase the speed of response of information security specialists to the information security events detected by the DLP-system adapted to the Bank, and also allowed the DLP-system to transition from the copy mode to the blocking mode of illegitimate transfer

  10. Law on consent and confidentiality in India: a need for clarity.

    Science.gov (United States)

    Mathiharan, Karunakaran

    2014-01-01

    The concept of informed consent specific to medical research and treatment is still alien to many medical researchers and practitioners and to millions of Indians. The doctor-patient relationship in India is governed more by trust where the doctor is the authoritative person. Therefore, the benefit of informed consent does not reach all patients in day-to-day medical practice. To complicate the issue, the Indian law is not specific about the age at which a person can give valid consent. The Indian Penal Code is silent about the legal validity of consent given by persons between 12 and 18 years of age. Similarly, the age at which the 'Right to Confidentiality' begins is yet to be defined either by the statute or by the courts. Hence, there is a need for a clear statutory provision to remove the anomalies and ambiguities regarding the age of consent to undergo invasive therapeutic or investigative procedures, participate in clinical trials, as well as define the age at which a person's right to medical confidentiality begins.

  11. Concerns raised over new EPA members

    Science.gov (United States)

    Gwynne, Peter

    2017-12-01

    The Trump administration has nominated three new members of the Environmental Protection Agency (EPA) who critics say are undermining laws and “pampering” the industries they are supposed to regulate.

  12. Assessing subject privacy and data confidentiality in an emerging region for clinical trials: United Arab Emirates.

    Science.gov (United States)

    Nair, Satish Chandrasekhar; Ibrahim, Halah

    2015-01-01

    Pharmaceutical sponsored clinical trials, formerly conducted predominantly in the United States and Europe, have expanded to emerging regions, including the Middle East. Our study explores factors influencing clinical trial privacy and confidentiality in the United Arab Emirates. Factors including concept familiarity, informed consent compliance, data access, and preservation, were analyzed to assess current practices in the Arab world. As the UAE is an emerging region for clinical trials, there is a growing need for regulations related to data confidentiality and subject privacy. Informational and decisional privacy should be viewed within the realms of Arab culture and religious background.

  13. 42 CFR 2.2 - Statutory authority for confidentiality of alcohol abuse patient records.

    Science.gov (United States)

    2010-10-01

    ... HUMAN SERVICES GENERAL PROVISIONS CONFIDENTIALITY OF ALCOHOL AND DRUG ABUSE PATIENT RECORDS Introduction.... (B) To qualified personnel for the purpose of conducting scientific research, management audits, financial audits, or program evaluation, but such personnel may not identify, directly or indirectly, any...

  14. The social and ecological integration of captive-raised adolescent male African elephants (Loxodonta africana into a wild population.

    Directory of Open Access Journals (Sweden)

    Kate Evans

    Full Text Available BACKGROUND: A rapid rise in the number of captive African elephants (Loxodonta africana used in the tourism industry in southern Africa and orphaned elephants in human care has led to concerns about their long-term management, particularly males. One solution is to release them into the wild at adolescence, when young males naturally leave their herd. However, this raises significant welfare concerns: little is known about how well released elephants integrate into wild populations and whether they pose a greater threat to humans than wild elephants. We document the release of three captive-raised adolescent male African elephants in the Okavango Delta, Botswana. METHODOLOGY/PRINCIPAL FINDINGS: Despite having been part of a herd of working elephants for at least eight years, the three males progressively integrated into the complex fission-fusion society of wild bull elephants. In the three years following release, they showed no tendency to be closer to human habitation, and there were no significant differences between wild and captive-raised adolescent males in the total number of social interactions, size of ranges and habitat use. However, the captive-raised elephants sparred less and vocalised more, and spent more time alone and in smaller social groups. Thereafter the released elephants continued to expand their ranges and interact with both mixed-sex herds and males. One male was shot by farmers 94 months after release, along with ten wild elephants, on a ranch outside the protected area. CONCLUSIONS/SIGNIFICANCE: We show that captive-raised adolescent male elephants can integrate into a wild population. Long-term studies are required to determine the longevity, breeding success, and eventual fate of released male elephants, but we identified no significant short-term welfare problems for the released elephants or recipient population. Release of captive-raised mammals with complex social systems is a husbandry option that should be

  15. [Teletransmission, health care and deontology].

    Science.gov (United States)

    Lousson, J P

    1995-01-01

    EDI is the technique the most frequently used by Chemists to relay their daily orders to their suppliers. Three out of four Chemists in France are computerised using various forms of computer hardware and software. The Health Care organisations propose that Chemists use the EDI to relay to the CETELIC all the items of information concerning their invoicing. This means handing over administrative information identifying the patient, the doctor ... as well as financial and confidential data such as the CIP code of the prescribed and delivered medicine. The law of the 4th January 1993 was instigated to control the rising expenses of the Health Care organisations and it mandates the Caisse Primaire d'Assurance Maladie (the French social security organisations) to retrieve and analyse the information thus gathered from all of the medical professionals involved. However, the accumulation of all these items of computerised information constitutes in effect a confidential medical file on each patient. This raises the following issues: Who does this confidential data belong to? Who should the Chemists give it to? What is to be done with it? Who will be responsible for its analysis in respect of the confidentiality problem? (Another medical professional bound by oath?) And how can we insure against subsequent abuse of this material?

  16. Combined model of 9x9 playfair and RSA for securing confidential ...

    African Journals Online (AJOL)

    Combined model of 9x9 playfair and RSA for securing confidential information. Y.B. Zakariyau, L.J. Muhammad, A.M. Usman, A Garba. Abstract. No Abstract. Keywords: Cryptography, RSA, Playfair Cipher, Public and Secret Key. Full Text: EMAIL FULL TEXT EMAIL FULL TEXT · DOWNLOAD FULL TEXT DOWNLOAD FULL ...

  17. 78 FR 68161 - Greenhouse Gas Reporting Program: Final Amendments and Confidentiality Determinations for...

    Science.gov (United States)

    2013-11-13

    ... 98 Greenhouse Gas Reporting Program: Final Amendments and Confidentiality Determinations for...-HQ-OAR-2011-0028; FRL-9845-6] RIN 2060-AR61 Greenhouse Gas Reporting Program: Final Amendments and... monitoring methodologies for electronics manufacturers covered by the Greenhouse Gas Reporting Rule. These...

  18. Meeting Ethical Demands in a Multi-Agent Project

    Directory of Open Access Journals (Sweden)

    Joe Thomas

    2002-05-01

    Full Text Available Various health service and voluntary sector agencies dealing with drug misusers in a large city in the North of England have set up a task group to co-ordinate their assessment and referral process. An IT solution to their needs was believed to be desirable but raises serious issues concerning confidentiality, and the suitability of an IT solution to the particular information problem. The approach is informed by Social Informatics and utilises Soft Systems Methodology within the framework of Joint Application Development.

  19. Navigating the legal and ethical foundations of informed consent and confidentiality in integrated primary care.

    Science.gov (United States)

    Hudgins, Cathy; Rose, Sandra; Fifield, Peter Y; Arnault, Steve

    2013-03-01

    This article describes findings from ongoing research and analysis of current literature in addition to discussions with leaders in the field, communications with lawyers and administrators of advocacy and government agencies pertaining to integrated primary care (IPC). Standards of care are established based on a myriad of factors, including professional codes of ethics, case law, state and federal laws, professional standards, existing best practices, current professional guidelines, administrative rules and regulations, and licensing board regulations. Regulations may differ for behavioral health and medical providers, posing challenges in IPC settings. This article provides a review of these regulations, particularly 42CFR Part 2, a federal law governing confidentiality for substance abuse programs, Health Insurance Portability and Accountability Act (HIPAA), and state laws relevant to patient care in IPC settings. On the basis of findings from the study, the authors make recommendations related to patient care practices concerning informed consent and release of information procedures, treatment and warm hand-off protocols, documentation and electronic record keeping, agreements with other providers, and billing. (PsycINFO Database Record (c) 2013 APA, all rights reserved).

  20. 12 CFR 261.20 - Confidential supervisory information made available to supervised financial institutions and...

    Science.gov (United States)

    2010-01-01

    ... available to supervised financial institutions and financial institution supervisory agencies. 261.20... Supervised Institutions, Financial Institution Supervisory Agencies, Law Enforcement Agencies, and Others in... institutions and financial institution supervisory agencies. (a) Disclosure of confidential supervisory...

  1. Distracted Driving Raises Crash Risk

    Science.gov (United States)

    ... this issue Health Capsule Distracted Driving Raises Crash Risk En español Send us your comments Video technology ... distracted driving, especially among new drivers, raises the risk for car crashes and near crashes. The study ...

  2. Teaching Confidentiality through Comics at One Spanish Medical School.

    Science.gov (United States)

    Lalanda, Mónica; Altisent, Rogelio; Delgado-Marroquín, Maria Teresa

    2018-02-01

    At the University of Zaragoza in Spain we developed an innovative way to teach the concept of confidentiality to medical students, which we tested by comparing the use of customized comics with more traditional methods. We proved that using comics is more attractive to students than lectures and class discussions, that it increases class participation and students' self-awareness of learning, and that it maintains the same academic results. We share our experience visually in a two-page comic. © 2018 American Medical Association. All Rights Reserved.

  3. To Tell, or Not to Tell; Confidentiality in an Iranian HIV Positive Patient: A Viewpoint

    Directory of Open Access Journals (Sweden)

    Mahshad Noroozi

    2017-08-01

    Full Text Available Confidentiality is a basic concept in medical ethics and protecting confidentiality is considered as physicians’ duty. In some occasions, this protection is in conflict with the right of the patient’s sexual partner, who should be informed about the possibility of being infected. The sexual partner being pregnant, the situation is going to be more complicated. In this paper, we present a case discussion with special ethical, legal, social, cultural, and religious aspects. According to this informing sexual partner with the patient’s assent, opt-out Human immunodeficiency virus (HIV screening in pregnant women and enhancing psychosocial and family support are highly recommended. Strategic changes in health system policies and regulations seem to be necessary as well.

  4. 29 CFR 780.123 - Raising of bees.

    Science.gov (United States)

    2010-07-01

    ... 29 Labor 3 2010-07-01 2010-07-01 false Raising of bees. 780.123 Section 780.123 Labor Regulations... Raising of Livestock, Bees, Fur-Bearing Animals, Or Poultry § 780.123 Raising of bees. The term “raising of * * * bees” refers to all of those activities customarily performed in connection with the...

  5. Phytotoxins: environmental micropollutants of concern?

    Science.gov (United States)

    Bucheli, Thomas D

    2014-11-18

    Natural toxins such as mycotoxins or phytotoxins (bioactive compounds from fungi and plants, respectively) have been widely studied in food and feed, where they are stated to out-compete synthetic chemicals in their overall human and animal toxicological risk. A similar perception and awareness is yet largely missing for environmental safety. This article attempts to raise concern in this regard, by providing (circumstantial) evidence that phytotoxins in particular can be emitted into the environment, where they may contribute to the complex mixture of organic micropollutants. Exposures can be orders-of-magnitude higher in anthropogenically managed/affected (agro-)ecosystems than in the pristine environment.

  6. 45 CFR 61.14 - Confidentiality of Healthcare Integrity and Protection Data Bank information.

    Science.gov (United States)

    2010-10-01

    ... 45 Public Welfare 1 2010-10-01 2010-10-01 false Confidentiality of Healthcare Integrity and Protection Data Bank information. 61.14 Section 61.14 Public Welfare DEPARTMENT OF HEALTH AND HUMAN SERVICES GENERAL ADMINISTRATION HEALTHCARE INTEGRITY AND PROTECTION DATA BANK FOR FINAL ADVERSE INFORMATION ON...

  7. 75 FR 46948 - Medicare Program; Listening Session Regarding Confidential Feedback Reports and the...

    Science.gov (United States)

    2010-08-04

    ...] Medicare Program; Listening Session Regarding Confidential Feedback Reports and the Implementation of a... Services (CMS), HHS. ACTION: Notice of meeting. SUMMARY: This notice announces a listening session being... modifier to the fee- for-service physician fee schedule. The purpose of the listening session is to solicit...

  8. 78 FR 69337 - Greenhouse Gas Reporting Program: Amendments and Confidentiality Determinations for Fluorinated...

    Science.gov (United States)

    2013-11-19

    ...-AR78 Greenhouse Gas Reporting Program: Amendments and Confidentiality Determinations for Fluorinated... Greenhouse Gas Reporting Rule. The proposed changes would reduce the level of detail in which emissions were..., please go to the Greenhouse Gas Reporting Rule Program Web site at http://www.epa.gov/climatechange...

  9. Live weight and body measurements of male and female native ducks raised in different raising systems

    Directory of Open Access Journals (Sweden)

    Kadir Önk

    2018-05-01

    Full Text Available ABSTRACT The purpose of this study was to determine live weight and body measurements of male and female native ducks raised in different raising systems. One hundred and twenty native ducks (60 males, 60 females were used in the study. The ducks were raised in deep litter floor and cage systems. Live weight and body values were measured every two weeks, until they were 56 days old. Three-parameter logistic regression and Gompertz model were used to determine growth model of male and female ducks. Interactions of time-raising system and time-sex were statistically significant in terms of live weight. At the end of eight weeks, live weights of ducks raised in deep litter floor were higher than ducks raised in cage system. In addition, live weights of male ducks were higher than female ducks. Consequently, deep litter floor is more appropriate for live weight in native ducks. Accuracy rate of Three-parameter Logistic and Gompertz models for estimation of growth in ducks was between 0.91-0.95 and similar results were obtained from both models. The Gompertz model is appropriate for the data structure of this study because it contains fewer iterations than the Three-Parameter Logistic model.

  10. Enhanced Obfuscation Technique for Data Confidentiality in Public Cloud Storage

    OpenAIRE

    Oli S. Arul; Arockiam L.

    2016-01-01

    With an advent of cloud computing, data storage has become a boon in information technology. At the same time, data storage in remote places have become important issues. Lot of techniques are available to ensure protection of data confidentiality. These techniques do not completely serve the purpose in protecting data. The Obfuscation techniques come to rescue for protecting data from malicious attacks. This paper proposes an obfuscation technique to encrypt the desired data type on the clou...

  11. 75 FR 78238 - Access to Confidential Business Information by Science Applications International Corporation and...

    Science.gov (United States)

    2010-12-15

    ... Business Information by Science Applications International Corporation and Its Identified Subcontractors..., Science Applications International Corporation (SAIC) of San Diego, CA, and Its Identified Subcontractors... Control Act (TSCA). Some of the information may be claimed or determined to be Confidential Business...

  12. 77 FR 76028 - Access to Confidential Business Information by Science Applications International Corporation and...

    Science.gov (United States)

    2012-12-26

    ... Business Information by Science Applications International Corporation and Its Identified Subcontractor...: EPA has authorized its contractor, Science Applications International Corporation (SAIC) of McLean, VA... information may be claimed or determined to be Confidential Business Information (CBI). DATES: Access to the...

  13. 78 FR 66697 - Access to Confidential Business Information by Science Applications International Corporation and...

    Science.gov (United States)

    2013-11-06

    ... Business Information by Science Applications International Corporation and Its Identified Subcontractors..., Science Applications International Corporation (SAIC) of McLean, VA, and its subcontractors to access...). Some of the information may have been claimed or determined to be Confidential Business Information...

  14. Biomedical databases: protecting privacy and promoting research.

    Science.gov (United States)

    Wylie, Jean E; Mineau, Geraldine P

    2003-03-01

    When combined with medical information, large electronic databases of information that identify individuals provide superlative resources for genetic, epidemiology and other biomedical research. Such research resources increasingly need to balance the protection of privacy and confidentiality with the promotion of research. Models that do not allow the use of such individual-identifying information constrain research; models that involve commercial interests raise concerns about what type of access is acceptable. Researchers, individuals representing the public interest and those developing regulatory guidelines must be involved in an ongoing dialogue to identify practical models.

  15. Ethical Obligations in the Face of Dilemmas Concerning Patient Privacy and Public Interests: The Sasebo Schoolgirl Murder Case.

    Science.gov (United States)

    Kadooka, Yasuhiro; Okita, Taketoshi; Asai, Atsushi

    2016-09-01

    A murder case that had some features in common with the Tarasoff case occurred in Sasebo City, Japan, in 2014. A 15-year-old high school girl was murdered and her 16-year-old classmate was arrested on suspicion of homicide. One and a half months before the murder, a psychiatrist who had been examining the girl called a prefectural child consultation centre to warn that she might commit murder, but he did not reveal her name, considering it his professional duty to keep it confidential. Article 134 of the Japanese Criminal Law states that doctors should not disclose patient information obtained in clinical practice without a legitimate reason, but the Japanese Supreme Court has not specified what constitutes a legitimate reason. Mass media and commentators suggested that the murder could have been prevented if the psychiatrist had disclosed the girl's name to the authorities or had isolated her coercively in a psychiatric ward. However, the authors disagree with such claims. This article discusses obligations imposed on concerned individuals and third party members in cases involving ethical dilemmas regarding patient confidentiality and information disclosure. It is concluded that everyone should fulfill their obligations to prevent such tragedies and one should judge the appropriateness of others' actions based not on the consequences of their actions, but on the processes used to decide on a course of action and their commitment. It is necessary for us to establish a society in which concerned parties can do what they think is ethically best without fearing ungrounded charges. © 2016 John Wiley & Sons Ltd.

  16. Medical records confidentiality and public health research: two values at stake? An italian survey focus on individual preferences

    Directory of Open Access Journals (Sweden)

    Virgilia Toccaceli

    2015-02-01

    Full Text Available In a time when Europe is preparing to introduce new regulations on privacy protection, we conducted a survey among 1700 twins enrolled in the Italian Twin Register about the access and use of their medical records for public health research without explicit informed consent. A great majority of respondents would refuse or are doubtful about the access and use of hospital discharge records or clinical data without their explicit consent. Young and female individuals represent the modal profile of these careful people. As information retrieved from medical records is crucial for progressing knowledge, it is important to promote a better understanding of the value of public health research activities among the general population. Furthermore, public opinions are relevant to policy making, and concerns and preferences about privacy and confidentiality in research can contribute to the design of procedures to exploit medical records effectively and customize the protection of individuals’ medical data.

  17. Ethical considerations in malaria research proposal review: empirical evidence from 114 proposals submitted to an Ethics Committee in Thailand.

    Science.gov (United States)

    Adams, Pornpimon; Prakobtham, Sukanya; Limphattharacharoen, Chanthima; Vutikes, Pitchapa; Khusmith, Srisin; Pengsaa, Krisana; Wilairatana, Polrat; Kaewkungwal, Jaranit

    2015-09-14

    Malaria research is typically conducted in developing countries in areas of endemic disease. This raises specific ethical issues, including those related to local cultural concepts of health and disease, the educational background of study subjects, and principles of justice at the community and country level. Research Ethics Committees (RECs) are responsible for regulating the ethical conduct of research, but questions have been raised whether RECs facilitate or impede research, and about the quality of REC review itself. This study examines the review process for malaria research proposals submitted to the Ethics Committee of the Faculty of Tropical Medicine at Mahidol University, Thailand. Proposals for all studies submitted for review from January 2010 to December 2014 were included. Individual REC members' reviewing forms were evaluated. Ethical issues (e.g., scientific merit, risk-benefit, sample size, or informed-consent) raised in the forms were counted and analysed according to characteristics, including study classification/design, use of specimens, study site, and study population. All 114 proposals submitted during the study period were analysed, comprising biomedical studies (17 %), drug trials (13 %), laboratory studies (24 %) and epidemiological studies (46 %). They included multi-site (13 %) and international studies (4 %), and those involving minority populations (28 %), children (17 %) and pregnant women (7 %). Drug trials had the highest proportion of questions raised for most ethical issues, while issues concerning privacy and confidentiality tended to be highest for laboratory and epidemiology studies. Clarifications on ethical issues were requested by the ethics committee more for proposals involving new specimen collection. Studies involving stored data and specimens tended to attract more issues around privacy and confidentiality. Proposals involving minority populations were more likely to raise issues than those that did not

  18. 76 FR 77816 - Access to Confidential Business Information by Guident Technologies, Inc. and Subcontractor...

    Science.gov (United States)

    2011-12-14

    ... Business Information by Guident Technologies, Inc. and Subcontractor, Impact Innovations Systems, Inc..., Guident Technologies, Inc. of Herndon, VA and subcontractor, Impact Innovations Systems, Inc. of Manassas... Control Act (TSCA). Some of the information may be claimed or determined to be Confidential Business...

  19. 20 CFR 603.4 - What is the confidentiality requirement of Federal UC law?

    Science.gov (United States)

    2010-04-01

    ... 20 Employees' Benefits 3 2010-04-01 2010-04-01 false What is the confidentiality requirement of Federal UC law? 603.4 Section 603.4 Employees' Benefits EMPLOYMENT AND TRAINING ADMINISTRATION, DEPARTMENT....C. 502(a)), State law must include provision for such methods of administration as are found by the...

  20. 41 CFR 102-75.320 - Does appraisal information need to be kept confidential?

    Science.gov (United States)

    2010-07-01

    ... 41 Public Contracts and Property Management 3 2010-07-01 2010-07-01 false Does appraisal information need to be kept confidential? 102-75.320 Section 102-75.320 Public Contracts and Property Management Federal Property Management Regulations System (Continued) FEDERAL MANAGEMENT REGULATION REAL PROPERTY 75-REAL PROPERTY DISPOSAL Surplus Real...

  1. Concepts of trust among patients with serious illness.

    Science.gov (United States)

    Mechanic, D; Meyer, S

    2000-09-01

    This paper examines conceptions of trust among three groups of respondents diagnosed with either breast cancer, Lyme disease or mental illness. Interviews were carried out using an open-ended interview guide to explore how patients made assessments of trust in their doctors and health care plans. The guide followed a conceptual approach that asked questions about competence, agency/fiduciary responsibility, control, disclosure and confidentiality. Respondents were given ample opportunity to raise other areas of concern. The data were organized using the NUDIST software package for the analysis of non-numerical and unstructured qualitative data. Patients viewed trust as an iterative process and commonly tested their physicians against their knowledge and expectations. Interpersonal competence, involving caring, concern and compassion, was the most common aspect of trust reported, with listening as a central focus. Most patient comments referred to learnable skills and not simply to personality characteristics. Technical competence also received high priority but was often assessed by reputation or interpersonal cues. Patients were much concerned that doctors be their agents and fight for their interests with health care plans. Disclosure and confidentiality were less common concerns; most patients anticipated that doctors would be honest with them and respect their confidences. Patients' responses also appeared to vary by their disease, their socio-demographic characteristics, their involvement with self-help groups, and how their illness conditions unfolded.

  2. Mothers' attitudes toward adolescent confidential services: development and validation of scales for use in English- and Spanish-speaking populations.

    Science.gov (United States)

    Tebb, Kathleen P; Pollack, Lance M; Millstein, Shana; Otero-Sabogal, Regina; Wibbelsman, Charles J

    2014-09-01

    To explore parental beliefs and attitudes about confidential services for their teenagers; and to develop an instrument to assess these beliefs and attitudes that could be used among English and Spanish speakers. The long-term goal is to use this research to better understand and evaluate interventions to improve parental knowledge and attitudes toward their adolescent's access and utilization of comprehensive confidential health services. The instrument was developed using an extensive literature review and theoretical framework followed by qualitative data from focus groups and in-depth interviews. It was then pilot tested with a random sample of English- and Spanish-speaking parents and further revised. The final instrument was administered to a random sample of 1,000 mothers. The psychometric properties of the instrument were assessed for Spanish and English speakers. The instrument consisted of 12 scales. Most Cronbach alphas were >.70 for Spanish and English speakers. Fewer items for Spanish speakers "loaded" for the Responsibility and Communication scales. Parental Control of Health Information failed for Spanish speakers. The Parental Attitudes of Adolescent Confidential Health Services Questionnaire (PAACS-Q) contains 12 scales and is a valid and reliable instrument to assess parental knowledge and attitudes toward confidential health services for adolescents among English speakers and all but one scale was applicable for Spanish speakers. More research is needed to understand key constructs with Spanish speakers. Copyright © 2014 Society for Adolescent Health and Medicine. Published by Elsevier Inc. All rights reserved.

  3. Contractual obligations and the sharing of confidential health information in sport.

    Science.gov (United States)

    Anderson, L

    2008-09-01

    As an employee, a sports doctor has obligations to their employer, but also professional and widely accepted obligations of a doctor to the patient (in this case the individual team member). The conflict is evident when sports doctors are asked by an athlete to keep personal health information confidential from the coach and team management, and yet both doctor and athlete have employment contracts specifying that such information shall be shared. Recent research in New Zealand shows that despite the presence of an employment contract, there appears to be a wide range of behaviours among sports doctors when an athlete requests that information about them be kept from team management. Many seem willing to honour requests to keep health information about the athlete confidential, thereby being in breach of the employment contract, while others insist on informing team management against the wishes of the athlete. There are a number of potential solutions to this dilemma from forcing doctors to meet their contractual obligations, to limiting the expectations of the employment contract. This paper suggests that at times it may be appropriate to do both, making the position of the doctor clearer and supporting the ability of this group to resist pressure by coaches and management through having a robust code of ethics.

  4. Confidentiality in participatory research: Challenges from one study.

    Science.gov (United States)

    Petrova, Elmira; Dewing, Jan; Camilleri, Michelle

    2016-06-01

    This article presents key ethical challenges that were encountered when conducting a participatory qualitative research project with a very specific, small group of nurses, in this case with practice development nurses in Malta. With the small number of nurses employed in practice development roles in Malta, there are numerous difficulties of maintaining confidentiality. Poorly constructed interventions by the researcher could have resulted in detrimental effects to research participants and the overall trustworthiness of the research. Generally, ethical guidelines for research exist to reinforce validity of research; however, there is not an established consensus on how these strategies can be utilised in some types of qualitative field work. The researcher used an exploratory case study methodology. The sample consisted of 10 participants who were interviewed twice using face-to-face interviews, over a period of 2 months. The study was ethically reviewed by the University Research Ethics Committee and the Faculty Research Ethics Committee, University of Malta. The participants referred to in this article have been given adequate information about the study and their consent has been obtained. Numerous strategies for ensuring confidentiality during recruitment of the participants, during data collection, during transcription and data analysis and during dissemination of research results assisted the researcher in responding to potential and actual ethical issues. This article emphasises the main strategies that can be used to respond to ethical challenges when researching with a small easily identifiable group. The learning discussed here may be relevant to or even transferable to other similar research studies or research contexts. These methods fostered a greater credibility throughout the research process and predisposed the participants to greater trust, and thus, they disclosed their experiences and speak more freely, thus enhancing the quality of the study

  5. Raising HDL cholesterol in women

    Directory of Open Access Journals (Sweden)

    Danny J Eapen

    2009-11-01

    Full Text Available Danny J Eapen1, Girish L Kalra1, Luay Rifai1, Christina A Eapen2, Nadya Merchant1, Bobby V Khan11Emory University School of Medicine, Atlanta, GA, USA; 2University of South Florida School of Medicine, Tampa, FL, USAAbstract: High-density lipoprotein cholesterol (HDL-C concentration is essential in the determination of coronary heart disease (CHD risk in women. This is especially true in the postmenopausal state, where lipid profiles and CHD risk mimic that of age-matched men. Thus, interventions designed to reduce CHD risk by raising HDL-C levels may have particular significance during the transition to menopause. This review discusses HDL-C-raising therapies and the role of HDL in the primary prevention of CHD in women. Lifestyle-based interventions such as dietary change, aerobic exercise regimens, and smoking cessation are initial steps that are effective in raising HDL-C, and available data suggest women respond similarly to men with these interventions. When combined with pharmacotherapy, the effects of these lifestyle alterations are further amplified. Though studies demonstrating gender-specific differences in therapy are limited, niacin continues to be the most effective agent in raising HDL-C levels, especially when used in combination with fibrate or statin therapy. Emerging treatments such as HDL mimetic therapy show much promise in further raising HDL-C levels and improving cardiovascular outcomes.Keywords: high-density lipoprotein, HDL, women, cholesterol, heart disease

  6. Domestic Violence and Sexual Assault Services: Historical Concerns and Contemporary Challenges

    Science.gov (United States)

    Macy, Rebecca J.; Giattina, Mary C.; Parish, Susan L.; Crosby, Carmen

    2010-01-01

    More than 20 years ago, concerns were raised about whether domestic violence and sexual assault agencies need for stable funding would conflict with the values that initiated these respective movements. Since then, the movements have evolved considerably. Therefore, it is timely to investigate the challenges domestic violence and sexual assault…

  7. Teaching Journalism Students about Confidential Whistleblower Sources: An Analysis of Introductory News Writing Textbooks

    Science.gov (United States)

    Huxford, John; Moore, Maria A.

    2011-01-01

    Whistleblowers are a key journalistic source for many current news stories. However, reporters pursuing these major stories must navigate the dilemma between transparent full disclosure and protecting their confidential source. Professional journalists begin their journey as students, and students begin their journey in the classroom with a…

  8. 17 CFR 145.9 - Petition for confidential treatment of information submitted to the Commission.

    Science.gov (United States)

    2010-04-01

    ... may summarily reject the submitter's request for confidential treatment with leave to the submitter to... treatment of information submitted to the Commission. 145.9 Section 145.9 Commodity and Securities Exchanges... treatment of information submitted to the Commission. (a) Purpose. This section provides a procedure by...

  9. 76 FR 30781 - Confidentiality Determinations for Data Required Under the Mandatory Greenhouse Gas Reporting...

    Science.gov (United States)

    2011-05-26

    ... this document. BAMM Best Available Monitoring Methods CAA Clean Air Act CBI confidential business information CBP Customs and Border Protection CEMS continuous emission monitoring system(s) CFR Code of... prevent competitors from forcing them to defend data on a case-by-case basis in Agency CBI proceedings...

  10. Toward raising the higher level of radiological nursing

    International Nuclear Information System (INIS)

    Kusama, Tomoko; Ban, Nobuhiko; Ono, Koji

    2013-01-01

    The role and purpose of nursing in the radiological field are discussed with essentials of radiological nursing for raising its higher level and needed fundamental education. The discussion is from the thought that, at Fukushima Nuclear Power Plant Accident (Mar. 2011), general medical staff including nurses are rather insufficient of radiological knowledge like the exposure, radiation effect and risk. In the medical radiological field, nurses are expected to play roles of arranging the circumstance for patient's ease like explanation about health effect/risk, appropriate nursing of them after radiological diagnosis, radiation protection of nurses themselves, and of environment. At such an emergency as the Accident, care for the acutely exposed victims, their decontamination and responding to patient's concern are necessary. At the later phase, also needed are nursing of victims undergoing health management done by authorities and of radiological workers concerned as well as the third item above. Therefore, fundamentals of radiological knowledge such as physics, exposure, health effects, protection, contamination, legal rules and risk communication are required in the education of nurses. Otherwise, this education can be conducted as a part of safety security and physical assessment. The Accident also gives us the importance of radiological risk communication with its victims. (T.T.)

  11. Confidentiality protections versus collaborative care in the treatment of substance use disorders

    OpenAIRE

    Manuel, Jennifer K; Newville, Howard; Larios, Sandra E; Sorensen, James L

    2013-01-01

    Abstract Practitioners in federally-assisted substance use disorder (SUD) treatment programs are faced with increasingly complex decisions when addressing patient confidentiality issues. Recent policy changes, intended to make treatment more available and accessible, are having an impact on delivery of SUD treatment in the United States. The addition of electronic health records provides opportunity for more rapid and comprehensive communication between patients’ primary and SUD ...

  12. Raising the Titanic.

    Science.gov (United States)

    Baker, Romona

    1990-01-01

    Described is an activity in which groups of students investigate engineering principles by writing a feasibility study to raise the luxury liner, Titanic. The problem statement and directions, and suggestions for problem solutions are included. (CW)

  13. General practitioners' perspectives regarding competence and confidentiality in an adolescent with suspected anorexia nervosa: legal and ethical considerations.

    Science.gov (United States)

    Bartholomew, Terence P; Paxton, Susan J

    2003-02-01

    In Victoria, Australia, the legal position regarding young people's competence to make medical treatment decisions has not been clarified in legislation, and a number of often vague common law decisions must be relied on for guidance. This situation produces a degree of uncertainty about appropriate professional practice, while also potentially impeding young people's rights claims in health care settings. With this in mind, the present research explored general practitioners' competence and confidentiality decisions regarding a 17-year-old female who presented with symptoms of an eating disorder. Questionnaires were sent to a random sample of 500 Victorian general practitioners, of whom 190 responded. After reading a case vignette, general practitioners indicated whether they would find the hypothetical patient competent and if they would maintain her confidentiality. Seventy-three per cent of respondents found the patient competent and most would have maintained confidentiality, at least initially. However, subsequent analysis of the rationales supplied for these decisions revealed a wide diversity in general practitioners' understandings and implementations of extant legal authority. This research highlights the need for general practitioners to be exposed to up-to-date and clinically relevant explanations of contemporary legal positions.

  14. 76 FR 10360 - Access to Confidential Business Information by Guident Technologies Inc. and Its Identified...

    Science.gov (United States)

    2011-02-24

    ... Business Information by Guident Technologies Inc. and Its Identified Subcontractors AGENCY: Environmental Protection Agency (EPA). ACTION: Notice. SUMMARY: EPA has authorized its contractor, Guident Technologies... information may be claimed or determined to be Confidential Business Information (CBI). DATES: Access to the...

  15. 75 FR 57768 - Access to Confidential Business Information by Eastern Research Group and Its Identified...

    Science.gov (United States)

    2010-09-22

    ... Business Information by Eastern Research Group and Its Identified Subcontractor AGENCY: Environmental Protection Agency (EPA). ACTION: Notice. SUMMARY: EPA has authorized its contractor, Eastern Research Group... the information may be claimed or determined to be Confidential Business Information (CBI). DATES...

  16. [When the violation of medical confidentiality is imposed by law: Another side effect of Law N° 20.584].

    Science.gov (United States)

    Vega, Jorge; Quintana, María Soledad

    2016-02-01

    A law of rights and duties of patients was recently enacted in Chile (Law N° 20.584). When someone dies, the law allows his inheritors to have access to part or the totality of the medical record. Therefore, they may become acquainted of information that the patient gave in confidence to his physician, protected by "the medical confidentiality". The original bill included the possibility that a doctor could deny information that could cause harm to the former holder of the clinical record, but this precaution was banned by congressmen, seriously damaging the institution of "medical confidentiality", a cornerstone of the medical-patient relationship since the beginning of medicine.

  17. High-Technology Companies Often Turn to Colleges for Confidential 'Beta Tests' of New Products.

    Science.gov (United States)

    Turner, Judith Axler

    1988-01-01

    Beta testing--the process of trying a product in a real-world setting before releasing it commercially--exploits a natural interface between universities and high-technology industries. High-tech companies need confidential, real-world tests of new products, and universities are eager to get an early look at tomorrow's technology. (MLW)

  18. Marine environmental contamination: public awareness, concern and perceived effectiveness in five European countries.

    Science.gov (United States)

    Jacobs, Silke; Sioen, Isabelle; De Henauw, Stefaan; Rosseel, Yves; Calis, Tanja; Tediosi, Alice; Nadal, Martí; Marques, António; Verbeke, Wim

    2015-11-01

    Given the potential of Perceived Consumer Effectiveness (PCE) in shaping pro-environmental behavior, the relationships between PCE, awareness of causes of contaminants in the marine environment, and concern about marine environmental contamination were investigated using Structural Equation Modeling (SEM). PCE is the belief that an individual has in being able to make a difference when acting alone. A web-based survey was performed in one western European country (Belgium), one northern European country (Ireland) and three southern European countries (Italy, Portugal and Spain), resulting in a total sample size of 2824 participants. The analyses confirm that European citizens are concerned about marine environmental problems. Participants from the southern countries reported the highest concern. In addition, the study participants did not have a strong belief in themselves in being capable of making a difference in tackling marine environmental problems. However, a higher awareness, which was associated with a higher degree of concern, enhanced the belief that an individual can make a difference in tackling marine environmental problems, though only when a concrete action was proposed. Consequently, information campaigns focusing on pro-environmental behavior are recommended to raise public awareness about marine environmental problems and at the same time explicitly refer to concrete possible actions. The findings indicate that when only awareness and concern are raised without mentioning a concrete action, PCE might even decrease and render the communication effort ineffective. Copyright © 2015 Elsevier Inc. All rights reserved.

  19. "School Shooter" Web Video Game Raises Concerns

    Science.gov (United States)

    Rhen, Brad

    2011-01-01

    A new video game in which the player stalks and shoots fellow students and teachers in school settings is drawing fire from school district officials. "School Shooter: North American Tour 2012" is a first-person game that allows the player to move around a school and collect points by killing defenseless students and teachers. The game,…

  20. [Obesity in children. Current concerns].

    Science.gov (United States)

    Casado de Frías, Enrique

    2006-01-01

    In the last years there has been a growing interest in chilhood obesity in all developed countries. There is a great concern that is prevalence has raised 2-3 fold during the last 20 years. In the spanish chilhood population the obesity prevalence is estimated around 13%. Of note also, a number of other pathologies develop concomitantly with obesity during chilhood. These include type 2 diabetes, a range of respiratory problems, a metabolic syndrome, liver steatosis and seudotumor cerebri among others. Taking for granted that chilhood obesity in its roots is an exogenous disorder, preventive interventions should focus on modifying those ethiologies, improving the ways and nature of chilhood nutrition and its social and ludic behaviours.

  1. Developing an effective corrective action process : lessons learned from operating a confidential close call reporting system

    Science.gov (United States)

    2013-03-05

    In 2007, the Federal Railroad Administration (FRA) launched : C3RS, the Confidential Close Call Reporting System, as a : demonstration project to learn how to facilitate the effective : reporting and implementation of corrective actions, and assess t...

  2. 77 FR 25475 - Inquiry To Learn Whether Businesses Assert Business Confidentiality Claims Regarding Waste Import...

    Science.gov (United States)

    2012-04-30

    ... meet the definition of ``affected business,'' and are not covered by today's notice. They consist of..., however, do not meet the definition of ``affected business,'' and are not covered by today's notice. They... Businesses Assert Business Confidentiality Claims Regarding Waste Import and Export AGENCY: Environmental...

  3. 77 FR 109 - Inquiry To Learn Whether Businesses Assert Business Confidentiality Claims Regarding Waste Import...

    Science.gov (United States)

    2012-01-03

    ... definition of ``affected business,'' and are not covered by today's notice. They consist of any business that.... Certain businesses, however, do not meet the definition of ``affected business,'' and are not covered by... Businesses Assert Business Confidentiality Claims Regarding Waste Import and Export AGENCY: Environmental...

  4. 78 FR 67139 - Access to Confidential Business Information by Eastern Research Group and Its Identified...

    Science.gov (United States)

    2013-11-08

    ... Business Information by Eastern Research Group and Its Identified Subcontractor, Energy Services, Inc..., Eastern Research Group (ERG) of Chantilly, VA, and subcontractor Energy Services, Inc., of Tallahassee, FL... Control Act (TSCA). Some of the information may be claimed or determined to be Confidential Business...

  5. Private business: the uptake of confidential HIV testing in remote aboriginal communities on the Anangu Pitjantjatjara Lands.

    Science.gov (United States)

    Miller, P J; Torzillo, P J

    1998-10-01

    Despite a concentration of risk factors for HIV transmission, many remote Aboriginal communities in central Australia have a low uptake of HIV testing. We studied the uptake of HIV testing in six clinics in remote Aboriginal communities following the introduction of voluntary confidential testing to assess the impact of the intervention and to determine if the program was reaching people most at risk of HIV infection and transmission. The study was conducted by Nganampa Health Council, an Aboriginal-controlled health service on the Anangu Pitjantjatjara Lands in the far north-west of South Australia. Since the introduction of confidential coded testing in August 1994 the number of HIV tests provided through the remote clinics has increased from 83 tests/year to 592 tests/year. In the 12-month audit period (August 1, 1995, to July 31, 1996) 62.7% of women aged 20-24 years, 44.6% of people aged 12-40 years and 24% of the total population had an HIV test. Fifty per cent of tests were accounted for by the 15-25 year age groups and 60% of tests related to an STD consult. This study shows that a high uptake of HIV testing in high-risk groups can be achieved in remote Aboriginal communities where a high level of confidentiality is maintained.

  6. Concerns of patients actively contemplating total knee replacement: differences by race and gender.

    Science.gov (United States)

    Chang, Huan J; Mehta, Priya S; Rosenberg, Aaron; Scrimshaw, Susan C

    2004-02-15

    To examine differences by race/ethnicity and gender in patients' concerns regarding total knee replacement (TKR). Focus groups of patients actively considering TKR were conducted. Discussion included patients' questions and concerns regarding TKR. The software ATLAS.ti was used to tabulate themes by race/ethnicity and gender. Concerns raised by focus group participants were compared with thematic content from patient joint replacement information materials. This comparison used patient literature from 3 high-volume academic TKR centers, the Arthritis Foundation, and the American Academy of Orthopedic Surgeons. All groups shared similar concerns. However, some issues were more prevalent among certain gender and racial groups. For instance, concerns regarding anesthesia were more important to white Americans and concerns regarding recovery were more important to women. Some of these concerns were not addressed in the available patient literature. Different gender and racial subgroups focus on different concerns when considering TKR. These differences may contribute to gender and race/ethnicity disparity seen in TKR use.

  7. 76 FR 76981 - Request for Public Comments Concerning U.S.-Canada Action Plan for Perimeter Security and...

    Science.gov (United States)

    2011-12-09

    ... Jobs; Integrated Cross-Border Law Enforcement; and Critical Infrastructure and Cybersecurity. Progress... comments submitted electronically containing business confidential information, the file name of the business confidential version should begin with the characters ``BC''. The top of any page containing...

  8. Half of Vermont Academic and Public Libraries Lack Written Confidentiality Policies Despite Directors’ Support for Principles of Patron Confidentiality. A Review of: Magi, Trina J., “The Gap between Theory and Practice: A Study of the Prevalence and Strength of Patron Confidentiality Policies in Public and Academic Libraries.” Library & Information Science Research 29 (2007: 455-70.

    Directory of Open Access Journals (Sweden)

    Stephanie Walker

    2008-09-01

    Full Text Available Objectives – To examine the prevalence and strength of patron confidentiality policies and practices at academic and public libraries in Vermont; to examine variances in policies by type and size of library and by qualifications of library directors; and to examine the level of support among Vermont library directors for strengthening state law to clarify that personally identifiable information about library patrons is confidential and should only be released with a court order.Design – Survey (non-randomized of 213 library directors.Setting – Academic and public libraries in Vermont (USA.Subjects – The initial audience was defined to be the directors of the 213 academic and public libraries in Vermont (as the persons to whom the survey was directed. Ultimately, results from 149 returned surveys were used as a basis for analysis. In addition, a written report of the information gathered was provided to the governing bodies of the Vermont Department of Libraries and the Vermont Library Association. The author also anticipates that the results of the survey will be of general interest to academic and public librarians.Methods – A literature review of previous research on library policies and practices regarding patron confidentiality was completed. As well, the author examined the various state and federal laws and library association codes of ethics which address issues of the confidentiality of library patron data. A paper questionnaire was mailed on January 11, 2006, to directors of 188 municipal and incorporated public libraries (including 11 combined public and school libraries and 25 college and university libraries, for a total of 213 libraries targeted. Cover letters explaining the purpose of the study and assuring respondents of the confidentiality of their responses were included in the mailing. The contact information came from a list supplied by the Vermont Department of Libraries. The questionnaire had previously been

  9. Key technologies of drilling process with raise boring method

    Directory of Open Access Journals (Sweden)

    Zhiqiang Liu

    2015-08-01

    Full Text Available This study presents the concept of shaft constructed by raise boring in underground mines, and the idea of inverse construction can be extended to other fields of underground engineering. The conventional raise boring methods, such as the wood support method, the hanging cage method, the creeping cage method, and the deep-hole blasting method, are analyzed and compared. In addition, the raise boring machines are classified into different types and the characteristics of each type are described. The components of a raise boring machine including the drill rig, the drill string and the auxiliary system are also presented. Based on the analysis of the raise boring method, the rock mechanics problems during the raise boring process are put forward, including rock fragmentation, removal of cuttings, shaft wall stability, and borehole deviation control. Finally, the development trends of raise boring technology are described as follows: (i improvement of rock-breaking modes to raise drilling efficiency, (ii development of an intelligent control technique, and (iii development of technology and equipment for nonlinear raise boring.

  10. Raising Public Awareness of Mathematics

    CERN Document Server

    Behrends, Ehrhard; Rodrigues, José Francisco

    2012-01-01

    This collective book aims to encourage and inspire actions directed towards raising public awareness of the importance of mathematical sciences for our contemporary society in a cultural and historical perspective. Mathematical societies, in Europe and around the world, can find ideas, blueprints and suggestions for activities - including concerted actions with other international organizations - directed towards raising public awareness of science, technology and other fields where mathematics plays a strong role. The material is divided into four parts: * National experiences * Exhibitions /

  11. The Digital Fingerprinting Analysis Concerning Google Calendar under Ubiquitous Mobile Computing Era

    Directory of Open Access Journals (Sweden)

    Hai-Cheng Chu

    2015-04-01

    Full Text Available Internet Communication Technologies (ICTs are making progress day by day, driven by the relentless need to utilize them for everything from leisure to business. This inevitable trend has dramatically changed contemporary digital behavior in all aspects. Undoubtedly, digital fingerprints will be at some point unwarily left on crime scenes creating digital information security incidents. On the other hand, corporates in the private sector or governments are on the edge of being exploited in terms of confidential digital information leakages. Some digital fingerprinting is volatile by its nature. Alternatively, once the power of computing devices is no longer sustainable, these digital traces could disappear forever. Due to the pervasive usage of Google Calendar and Safari browser among network communities, digital fingerprinting could be disclosed if forensics is carried out in a sound manner, which could be admitted in a court of law as probative evidences concerning certain cybercrime incidents.

  12. Romania's flag raised at CERN

    CERN Multimedia

    Corinne Pralavorio

    2016-01-01

    A ceremony was held for the raising of the Romanian flag alongside the flags of CERN’s 21 other Member States.   The Romanian flag is raised alongside the flags of CERN’s other Member States, in the presence of the Romanian President, CERN’s Director-General, the President of the CERN Council and a large Romanian delegation. (Image: Maximilien Brice/ Sophia Bennett/CERN) On Monday, 5 September, the Romanian flag was raised in front of CERN for the first time, marking the country’s accession to Membership of the Organization. The blue, yellow and red flag joined those of the other 21 Member States of CERN in a ceremony attended by the President of Romania, Klaus Iohannis, the Romanian Minister for Education and Scientific Research, Mircea Dumitru, and several other members of the President’s office, the government and academia in Romania. The country officially became a CERN Member State on 17 July 2016, after 25 years of collaboration between the...

  13. RAISED BOGS ON THE NORTH-EAST OF EUROPE

    Directory of Open Access Journals (Sweden)

    T. K. YURKOVSKAYA

    2004-01-01

    Full Text Available In the Northeastern Europe 2 types of raised bogs are distinguished: coastal (Southern White Sea raised hogs and continental (Pechora-Onega raised bogs. They have been compared as to their flora, prevailing syntaxa, characteristics of their complexes, structure of mire massifs and composition of peat deposits.

  14. Safeguarding critical e-documents implementing a program for securing confidential information assets

    CERN Document Server

    Smallwood, Robert F

    2012-01-01

    Practical, step-by-step guidance for corporations, universities and government agencies to protect and secure confidential documents and business records Managers and public officials are looking for technology and information governance solutions to "information leakage" in an understandable, concise format. Safeguarding Critical E-Documents provides a road map for corporations, governments, financial services firms, hospitals, law firms, universities and other organizations to safeguard their internal electronic documents and private communications.Provides practical, step-by-step guidance o

  15. 78 FR 2669 - Waste Import and Export; Inquiry To Learn Whether Businesses Assert Business Confidentiality Claims

    Science.gov (United States)

    2013-01-14

    ... definition of ``affected business,'' and are not covered by today's notice. They consist of any business that... waste'' is defined at 40 CFR 273.9. Certain businesses, however, do not meet the definition of...; Inquiry To Learn Whether Businesses Assert Business Confidentiality Claims AGENCY: Environmental...

  16. Writing lives in sport

    DEFF Research Database (Denmark)

    Christensen, Mette Krogh

    dealing with anonymous individuals, whose anonymity results from the confidentiality requirements of a social scientific research methodology, to those leaning more towards the literary-historical traditions of 'conventional' biographical writing. However, these examples are polar extremes and none...... in the academis world of sport studies. It does not set out to be a methodological treatise but through the writing of lives in sports does raise questions of method. Each essay in this collection deals with problems of writing sports-people's lives. These essays could be said to fall along a spectrum from those......Writing lives in sport is a book of stories about sports-persons. The people concerned include sports stars, sports people who are not quite so famous, and relatively unknown physical education teachers and sports scientists.Writing lives in sport raises questions about writing biographies...

  17. Changes in public attitudes towards confidential adolescent sexual and reproductive health services in Lithuania after the introduction of new legislation: findings from the cross-sectional surveys conducted in 2005 and 2012.

    Science.gov (United States)

    Jaruseviciene, Lina; Zaborskis, Apolinaras; Sauliune, Skirmante; Jarusevicius, Gediminas; Lazarus, Jeffrey V

    2015-09-04

    In Lithuania, the right to confidentiality in healthcare for adolescents over the age of 16 was guaranteed in 2010 through the adoption of new legislation. This study sets out to explore changes in Lithuanian residents' attitudes towards confidentiality protection in adolescent sexual and reproductive healthcare (SRH) by comparing data from surveys administered in 2005 and 2012. For both surveys, the participants were random samples of the Lithuanian residents aged 16 to 74. A 23-item questionnaire was used in 2005 and complemented with 2 items in 2012. Linear regression analysis was employed to estimate absolute differences in prevalence of belief in whether or not adolescents would find confidentiality important when consulting a physician on SRH issues. A log-binomial regression model was fitted to estimate the relative changes (prevalence ratio) of the independent variables. The total number of respondents was 1054 (response rate 83%) in 2005 and 1002 (response rate 80%) in 2012. The proportion of respondents who reported a belief that adolescents would find confidentiality important when seeing a physician for SRH issues increased significantly from 62% in 2005 to 73% in 2012. Regardless of their belief in the importance of confidentiality, in 2012 respondents more often indicated positive outcomes on the relations between the physician and the minor patient, such as increased trust of the adolescent in the physician and more frequent visits to physicians. However, study participants who believed that adolescents would find confidentiality important in 2012 were less optimistic about potential positive outcomes of further legal consolidation of adolescents' right to confidentiality than in 2005. Younger respondents were the most optimistic about potential outcomes if laws were enacted to further protect adolescent confidentiality. This study uncovers the dynamics of public attitudes towards the socially and ethically sensitive issue of adolescent SRH. Our

  18. Reconfiguring waveguide-gratings-based M-signature codecs to enhance OCDMA network confidentiality

    Science.gov (United States)

    Huang, Jen-Fa; Chen, Kai-Sheng; Lin, Ying-Chen; Li, Chung-Yu

    2014-02-01

    A reconfiguration scheme based on composite signature codes over waveguide-gratings-based optical code-division multiple-access (OCDMA) network coder/decoders (codecs) is proposed in the paper. By using central control node to monitor network traffic condition and reconfigure the composite signature codes made up of maximal-length sequence (M-sequence) component codes and random changing the signature codes assigned for each user to improve the confidentiality performance in an OCDMA system. The proposed scheme is analyzed with some practical eavesdroppers' attacks.

  19. 48 CFR 1552.235-77 - Data Security for Federal Insecticide, Fungicide and Rodenticide Act Confidential Business...

    Science.gov (United States)

    2010-10-01

    ... 48 Federal Acquisition Regulations System 6 2010-10-01 2010-10-01 true Data Security for Federal Insecticide, Fungicide and Rodenticide Act Confidential Business Information (DEC 1997). 1552.235-77 Section... SOLICITATION PROVISIONS AND CONTRACT CLAUSES Texts of Provisions and Clauses 1552.235-77 Data Security for...

  20. 76 FR 52659 - Access by EPA Contractors to Confidential Business Information (CBI) Related to the Greenhouse...

    Science.gov (United States)

    2011-08-23

    ... Confidential Business Information (CBI) Related to the Greenhouse Gas Reporting Program AGENCY: Environmental... contractors named in this notice to access information that will be submitted to EPA under the Greenhouse Gas...), EPA created the Greenhouse Gas Reporting Program (GHGRP), 40 CFR part 98 (part 98), which requires...

  1. Weight and its relationship to adolescent perceptions of their providers (WRAP): a qualitative and quantitative assessment of teen weight-related preferences and concerns.

    Science.gov (United States)

    Cohen, Marc L; Tanofsky-Kraff, Marian; Young-Hyman, Deborah; Yanovski, Jack A

    2005-08-01

    To examine the relationship of body weight to satisfaction with care in adolescents, and to obtain qualitative data on preferences for general and weight-related medical care in normal weight and overweight adolescents. The Weight and its Relationship to Adolescent Perceptions of their Providers survey, a 4-page questionnaire containing previously validated satisfaction scales and open-ended qualitative questions regarding health care preferences, was administered to 62 severely overweight (body mass index [BMI] 38.9 +/- 8.4 kg/m2) and 29 normal weight (BMI 22.5 +/- 4.0 kg/m2) adolescents (age 13.9 +/- 1.7 years; 57% female; 50% Caucasian, 47% African-American, 3% Hispanic). The affective subscale of the medical satisfaction scale was negatively correlated with BMI standard deviation score (r = -.22, p teens. Seventy-nine percent of overweight adolescents stated their health care provider discussed their weight with them; however, only 41% of overweight adolescents desired to discuss their weight. Compared to normal-weight adolescents, overweight teens were more likely to report that their provider raised topics of weight (p teens expressed concerns regarding the public location of their provider's office scale. Satisfaction with affective aspects of the provider-patient relationship is negatively correlated with BMI standard deviation score. Length of experience with one's provider is also a strong predictor of teen satisfaction with their medical care. Teens prefer the term "overweight" for those with high body weight. Sensitivity to confidentiality, privacy, and embarrassment regarding physical examination and weight are important for teen satisfaction.

  2. Weight and its relationship to adolescent perceptions of their providers (WRAP): A qualitative and quantitative assessment of teen weight-related preferences and concerns

    Science.gov (United States)

    Cohen, Marc L.; Tanofsky-Kraff, Marian; Young-Hyman, Deborah; Yanovski, Jack A.

    2008-01-01

    Purpose To examine the relationship of body weight to satisfaction with care in adolescents, and to obtain qualitative data on preferences for general and weight-related medical care in normal weight and overweight adolescents. Methods The Weight and its Relationship to Adolescent Perceptions of their Providers survey, a 4-page questionnaire containing previously validated satisfaction scales and open-ended qualitative questions regarding health care preferences, was administered to 62 severely overweight (body mass index [BMI] 38.9 ± 8.4 kg/m2) and 29 normal weight (BMI 22.5 ± 4.0 kg/m2) adolescents (age 13.9 ± 1.7 years; 57% female; 50% Caucasian, 47% African-American, 3% Hispanic). Results The affective subscale of the medical satisfaction scale was negatively correlated with BMI standard deviation score (r = −.22, p teens. Seventy-nine percent of overweight adolescents stated their health care provider discussed their weight with them; however, only 41% of overweight adolescents desired to discuss their weight. Compared to normal-weight adolescents, overweight teens were more likely to report that their provider raised topics of weight (p teens expressed concerns regarding the public location of their provider’s office scale. Conclusions Satisfaction with affective aspects of the provider-patient relationship is negatively correlated with BMI standard deviation score. Length of experience with one’s provider is also a strong predictor of teen satisfaction with their medical care. Teens prefer the term “overweight” for those with high body weight. Sensitivity to confidentiality, privacy, and embarrassment regarding physical examination and weight are important for teen satisfaction. PMID:16026727

  3. A systematic study on activating the employee concerns' system for the improvement of governance in utility companies

    International Nuclear Information System (INIS)

    Sawada, Tetsuo; Morimoto, Toshio; Iida, Nobuharu; Nishimura, Takeshi; Itoh, Kunio; Tanaka, Hiroji

    2008-01-01

    The objective of this study is to develop a systematic methodology that can externalize potential concerns of employee and evaluate the values of the concerns raised in corporations and other organizations. By implementing this methodology into corporate/organization governance regime, we can expect to improve the work environment and enhance the capability for the corporate/organization governance through enhancing internal autonomic purification compatibility. (author)

  4. The Logic of the RAISE Specification Language

    DEFF Research Database (Denmark)

    George, Chris; Haxthausen, Anne Elisabeth

    2008-01-01

    This chapter describes the logic of the RAISE Specification Language, RSL. It explains the particular logic chosen for RAISE, and motivates this choice as suitable for a wide spectrum language to be used for designs as well as initial specifications, and supporting imperative and concurrent...

  5. The Logic of the RAISE Specification Language

    DEFF Research Database (Denmark)

    George, Chris; Haxthausen, Anne Elisabeth

    2003-01-01

    This paper describes the logic of the RAISE Specification Language, RSL. It explains the particular logic chosen for RAISE, and motivates this choice as suitable for a wide spectrum language to be used for designs as well as initial specifications, and supporting imperative and concurrent...

  6. Human Papillomavirus Vaccine Increases High-Risk Sexual Behaviors: A Myth or Valid Concern

    Science.gov (United States)

    Ratanasiripong, Nop T.

    2014-01-01

    In 2006, the first human pappilomavirus (HPV) vaccine was approved for females aged 9 to 26. However, the national HPV vaccination rate among young women has been low. Public concerns were raised in regard to the fact that HPV vaccination might encourage unsafe sex. This cross-sectional study examined the differences in sexual practices between…

  7. Surrogate mothers: aboriginal grandmothers raising grandchildren in Taiwan.

    Science.gov (United States)

    Chang, Yu-Ting; Hayter, Mark

    2011-05-01

    The purpose of this qualitative study was to understand the experiences of Taiwanese aboriginal grandmothers when raising their grandchildren. Adopting a phenomenological approach, interviews were conducted with 15 Taiwanese aboriginal grandmothers who served as primary caregiver to a grandchild or grandchildren. Data were analyzed using Giorgi's phenomenological method. Four themes emerged from the data analysis, reflecting the parenting experience of grandmothers: using aged bodies to do energetic work: represented the physical effects of raising grandchildren; conflicting emotions: reflected the psychological effects of raising grandchildren; lifelong and privative obligation: described the cultural and societal beliefs of raising grandchildren; and coping strategies for raising grandchildren outlined methods the grandmothers used to cope with parenting their grandchildren. The results of this study offers insights into surrogate parenting within an underresearched group in Taiwan and will enable health care providers to be more aware of the physical, emotional, and social effects of the role of grandparent parenting.

  8. Will you accept the government's friend request? Social networks and privacy concerns.

    Science.gov (United States)

    Siegel, David A

    2013-01-01

    Participating in social network websites entails voluntarily sharing private information, and the explosive growth of social network websites over the last decade suggests shifting views on privacy. Concurrently, new anti-terrorism laws, such as the USA Patriot Act, ask citizens to surrender substantial claim to privacy in the name of greater security. I address two important questions regarding individuals' views on privacy raised by these trends. First, how does prompting individuals to consider security concerns affect their views on government actions that jeopardize privacy? Second, does the use of social network websites alter the effect of prompted security concerns? I posit that prompting individuals to consider security concerns does lead to an increased willingness to accept government actions that jeopardize privacy, but that frequent users of websites like Facebook are less likely to be swayed by prompted security concerns. An embedded survey experiment provides support for both parts of my claim.

  9. 75 FR 24688 - Access to Confidential Business Information by Guident Technologies Inc.’s Identified Subcontractor

    Science.gov (United States)

    2010-05-05

    ... to a particular entity, consult the technical person listed under FOR FURTHER INFORMATION CONTACT. B... Information Systems and for Test Confidential Business Information Tracking Systems (CBITS) and (TCBITS). In... materials on a need-to- know basis only. All access to TSCA CBI under this contract will take place at EPA...

  10. Against Raising Hope of Raising the Dead: Contra Moody and Kubler-Ross.

    Science.gov (United States)

    Vicchio, Stephen J.; And Others

    1979-01-01

    Kubler-Ross and Moody have made assertions about survival after death. They argued that the subjects were not dead, but in the process of dying. An alternative explanation to this "glimpse of the afterlife" approach is offered. Other theological objections are raised to the Moody/Kubler-Ross approach. (Author)

  11. Communicating adaptation with emotions : the role of intense experiences for concern about extreme weather

    NARCIS (Netherlands)

    Vasileiadou, E.; Botzen, W.

    2014-01-01

    Adaptation to extreme weather is often considered as having a low urgency and being a low priority governance option, even though the intensity of extreme weather events is expected to increase as a result of climate change. An important issue is how to raise an adequate level of concern among

  12. Outsourcing medical data analyses: can technology overcome legal, privacy, and confidentiality issues?

    Science.gov (United States)

    Brumen, Bostjan; Heričko, Marjan; Sevčnikar, Andrej; Završnik, Jernej; Hölbl, Marko

    2013-12-16

    Medical data are gold mines for deriving the knowledge that could change the course of a single patient's life or even the health of the entire population. A data analyst needs to have full access to relevant data, but full access may be denied by privacy and confidentiality of medical data legal regulations, especially when the data analyst is not affiliated with the data owner. Our first objective was to analyze the privacy and confidentiality issues and the associated regulations pertaining to medical data, and to identify technologies to properly address these issues. Our second objective was to develop a procedure to protect medical data in such a way that the outsourced analyst would be capable of doing analyses on protected data and the results would be comparable, if not the same, as if they had been done on the original data. Specifically, our hypothesis was there would not be a difference between the outsourced decision trees built on encrypted data and the ones built on original data. Using formal definitions, we developed an algorithm to protect medical data for outsourced analyses. The algorithm was applied to publicly available datasets (N=30) from the medical and life sciences fields. The analyses were performed on the original and the protected datasets and the results of the analyses were compared. Bootstrapped paired t tests for 2 dependent samples were used to test whether the mean differences in size, number of leaves, and the accuracy of the original and the encrypted decision trees were significantly different. The decision trees built on encrypted data were virtually the same as those built on original data. Out of 30 datasets, 100% of the trees had identical accuracy. The size of a tree and the number of leaves was different only once (1/30, 3%, P=.19). The proposed algorithm encrypts a file with plain text medical data into an encrypted file with the data protected in such a way that external data analyses are still possible. The results

  13. Technology Addiction Survey: An Emerging Concern for Raising Awareness and Promotion of Healthy Use of Technology.

    Science.gov (United States)

    Sharma, Manoj Kumar; Rao, Girish N; Benegal, Vivek; Thennarasu, K; Thomas, Divya

    2017-01-01

    Technology use has shown an impact of users' lifestyle. The use has been attributed to psychosocial reasons. This usage manifests as excessive to addictive use of technology. There is a need to explore its addictive potential on large sample study as well as its association with psychosocial variables. It is one of its kind study on wider age group. The present work assessed the magnitude, burden, and sociodemographic correlates of technology addiction in an urban community. A total of 2755 individuals (1392 males and 1363 females) in the age group of 18-65 years were approached for screening internet addiction and mobile overuse, using house-to-house survey methodology. The survey indicated the presence of addiction for 1.3% for internet (2% males and 0.6% females) and mobile phone overuse (4.1%-2.5% males and 1.5% females). It was more common among males. Significant differences were observed in relation to family status for internet and mobile phone use more commonly among single/nuclear families. Technology addictions were found to be more common among single families and lesser in nuclear and joint families. Mobile phone users had psychiatric distress in comparison to users with internet addiction. The study showed negative correlation of age, years of marriage, and numbers of family members with internet addiction and mobile overuse. It has implication for raising awareness about addictive potential of technology and its impact on one's lifestyle.

  14. Microbicide research in developing countries: have we given the ethical concerns due consideration?

    Science.gov (United States)

    Moodley, Keymanthri

    2007-09-19

    HIV prevention research has been fraught with ethical concerns since its inception. These concerns were highlighted during HIV vaccine research and have been elaborated in microbicide research. A host of unique ethical concerns pervade the microbicide research process from trial design to post-trial microbicide availability. Given the urgency of research and development in the face of the devastating HIV pandemic, these ethical concerns represent an enormous challenge for investigators, sponsors and Research Ethics Committees (RECs) both locally and internationally. Ethical concerns relating to safety in microbicide research are a major international concern. However, in the urgency to develop a medically efficacious microbicide, some of these concerns may not have been anticipated. In the risk-benefit assessment of research protocols, both medical and psycho-social risk must be considered. In this paper four main areas that have a potential for medical and/or psycho-social harm are examined. Male partner involvement is controversial in the setting of covert use of microbicides. However, given the long-term exposure of men to experimental products, this may be methodologically, ethically and legally important. Covert use of microbicides may impact negatively on relationship dynamics leading to psychosocial harm to varying extents. The unexpectedly high rates of pregnancy during clinical trials raise important methodological and ethical concerns. Enrollment of adolescents without parental consent generates ethical and legal concerns that must be carefully considered by RECs and trial sites. Finally, paradoxical outcomes in recent trials internationally have advanced the debate on the nature of informed consent and responsibility of researchers to participants who become HIV positive during or after trials. Phase 3 microbicide trials are an undisputed research and ethical priority in developing countries. However, such trials must be conducted with attention to both

  15. Confidentiality concerning HIV/AIDS status - the implications of the ...

    African Journals Online (AJOL)

    His evidence justifying his disclosure was that he was. Department of Orthodontics, University of the Witwatersrand,. Johannesburg. J. T. Dancaster. BD.S. Department of Business Administration, University of Natal, Durban ... Supreme Court judgement, the Appeal judgement notes that not only did Kruger not seek to obtain ...

  16. 29 CFR 780.615 - Raising of livestock.

    Science.gov (United States)

    2010-07-01

    ... 29 Labor 3 2010-07-01 2010-07-01 false Raising of livestock. 780.615 Section 780.615 Labor... Agriculture and Livestock Auction Operations Under the Section 13(b)(13) Exemption Requirements for Exemption § 780.615 Raising of livestock. Livestock auction operations are within the 13(b)(13) exemption only...

  17. Confidentiality, disclosure and doping in sports medicine.

    Science.gov (United States)

    McNamee, M; Phillips, N

    2011-03-01

    The manner in which healthcare and medical professionals serve their athlete patients is governed by a variety of relevant codes of conduct. A range of codified rules is presented that refer both the welfare of the patient and the maintaining of confidentiality, which is at the heart of trustworthy relations. The 2009 version of the World Anti-Doping Code (WADC), however, appears to oblige all healthcare professionals not to assist athletes if they are known to be engaged in doping behaviours under fear of removal from working with athletes from the respective sports. In contrast, serving the best interests of their athlete patients may oblige healthcare professionals to give advice and guidance, not least in terms of harm minimisation. In so far as the professional conduct of a healthcare professional is guided both by professional code and World Anti-Doping Code, they are obliged to fall foul of one or the other. We call for urgent and pressing inter-professional dialogue with the World Anti-Doping Agency to clarify this situation.

  18. 29 CFR 780.126 - Contract arrangements for raising poultry.

    Science.gov (United States)

    2010-07-01

    ... 29 Labor 3 2010-07-01 2010-07-01 false Contract arrangements for raising poultry. 780.126 Section... General Scope of Agriculture Raising of Livestock, Bees, Fur-Bearing Animals, Or Poultry § 780.126 Contract arrangements for raising poultry. Feed dealers and processors sometimes enter into contractual...

  19. 29 CFR 780.616 - Operations included in raising livestock.

    Science.gov (United States)

    2010-07-01

    ... 29 Labor 3 2010-07-01 2010-07-01 false Operations included in raising livestock. 780.616 Section... Employment in Agriculture and Livestock Auction Operations Under the Section 13(b)(13) Exemption Requirements for Exemption § 780.616 Operations included in raising livestock. Raising livestock includes such...

  20. Communicating with the coroner: how religion, culture, and family concerns may influence autopsy decision making.

    Science.gov (United States)

    Carpenter, Belinda; Adkins, Glenda; Barnes, Michael; Naylor, Charles; Begum, Nelufa

    2011-04-01

    Based on coronial data gathered in the state of Queensland in 2004, this article reviews how a change in legislation may have impacted autopsy decision making by coroners. More specifically, the authors evaluated whether the requirement that coronial autopsy orders specify the level of invasiveness of an autopsy to be performed by a pathologist was affected by the further requirement that coroners take into consideration a known religion, culture, and/or raised family concern before making such an order. Preliminary data reveal that the cultural status of the deceased did not affect coronial autopsy decision making. However, a known religion with a proscription against autopsy and a raised family concern appeared to be taken into account by coroners when making autopsy decisions and tended to decrease the invasiveness of the autopsy ordered from a full internal examination to either a partial internal examination or an external-only examination of the body. The impact of these findings is briefly discussed.

  1. Maritime security : progress made in implementing Maritime Transportation Security Act, but concerns remain : statement of Margaret Wrightson, Director, Homeland Security and Justice Issues

    Science.gov (United States)

    2003-09-09

    After the events of September 11, 2001, concerns were raised over the security of U.S. ports and waterways. In response to the concerns over port security, Congress passed the Maritime Transportation Security Act in November 2002. The act created a b...

  2. Raising with long boreholes in Uranium Mines, Hamr

    International Nuclear Information System (INIS)

    Kubista, A.; Svoboda, M.; Mohyla, Z.

    1984-01-01

    The technology is described of raising with long boreholes which was used in uranium mines for breaking 15 raises to the end of 1983. Also described is the method of computing the needed charge. The described technology has the following advantages as compared with usual driving methods: 1. it secures greater work safety, 2. it allows driving atypical profiles, 3. smooth breaking secures good stability and longer life of raises, 4. allows higher productivity, 5. reduces capital costs. (Ha)

  3. WTO confidential: the case of asbestos.

    Science.gov (United States)

    Castleman, Barry

    2003-01-01

    The World Trade Organization (WTO), established in 1995, adjudicates "trade disputes" between member nations in cases with human rights, cultural, environmental, and public health significance. Throughout the resolution process and even after a case's conclusion, little of what happens is made accessible to the public. However, it is one thing to criticize the WTO for its lack of transparency from outside the process and another to critically examine what was withheld from disclosure and what dangers that presents. This is the inside story from a scientific adviser to one party in a WTO case, who analyzes what happened from a public health point of view. The analysis concludes that the public health justification for banning asbestos was accepted in the end by WTO economists, despite the WTO's bias in favor of the party (Canada) making the free trade challenge (to public health legislation), despite the WTO's lack of expertise in science, medicine, engineering, and public health, and despite important erroneous statements made to the WTO under the cover of confidentiality. The case nevertheless illustrates that the WTO's threat to national sovereignty could never withstand the light of day if the limitations and dangers of the process were open for all to see.

  4. Will you accept the government's friend request? Social networks and privacy concerns.

    Directory of Open Access Journals (Sweden)

    David A Siegel

    Full Text Available Participating in social network websites entails voluntarily sharing private information, and the explosive growth of social network websites over the last decade suggests shifting views on privacy. Concurrently, new anti-terrorism laws, such as the USA Patriot Act, ask citizens to surrender substantial claim to privacy in the name of greater security. I address two important questions regarding individuals' views on privacy raised by these trends. First, how does prompting individuals to consider security concerns affect their views on government actions that jeopardize privacy? Second, does the use of social network websites alter the effect of prompted security concerns? I posit that prompting individuals to consider security concerns does lead to an increased willingness to accept government actions that jeopardize privacy, but that frequent users of websites like Facebook are less likely to be swayed by prompted security concerns. An embedded survey experiment provides support for both parts of my claim.

  5. The College President's Role in Fund Raising.

    Science.gov (United States)

    Miller, Michael T.

    The role of the college president as one of the chief actors in academic fund raising is examined against the background of today's period of financial caution and increased competition for philanthropic support. The paper first provides an overview of the state of the art of fund raising and some ways in which college and universities have…

  6. Security, privacy, and confidentiality issues on the Internet.

    Science.gov (United States)

    Kelly, Grant; McKenzie, Bruce

    2002-01-01

    We introduce the issues around protecting information about patients and related data sent via the Internet. We begin by reviewing three concepts necessary to any discussion about data security in a healthcare environment: privacy, confidentiality, and consent. We are giving some advice on how to protect local data. Authentication and privacy of e-mail via encryption is offered by Pretty Good Privacy (PGP) and Secure Multipurpose Internet Mail Extensions (S/MIME). The de facto Internet standard for encrypting Web-based information interchanges is Secure Sockets Layer (SSL), more recently known as Transport Layer Security or TLS. There is a public key infrastructure process to 'sign' a message whereby the private key of an individual can be used to 'hash' the message. This can then be verified against the sender's public key. This ensures the data's authenticity and origin without conferring privacy, and is called a 'digital signature'. The best protection against viruses is not opening e-mails from unknown sources or those containing unusual message headers.

  7. Medical liability, safety and confidentiality in maritime telemedicine--the MERMAID position on issues of importance.

    Science.gov (United States)

    Ladas, P; Giatagatzidis, P; Anogianakis, G; Maglavera, S

    1997-01-01

    Telemedicine dates to the days of "wireless telegraphy". As an "extraordinary" arrangement for medical services delivered at time of need, telemedicine has thus far escaped the developments that have taken place over the last 50 years in the areas of medical liability, safety and confidentiality. Today, however, telemedicine is also used to increase quality and cost effectiveness of healthcare provision. This trend is set by the U.S. where the U.S. federal government funds telemedicine at an annual rate of more than $100 million i.e., at a rate 30 times or more than what the EU does while state and local agency support and private business investment in telemedicine is 3 to 4 times larger than that of the U.S. federal government. In this respect it must be stressed that technology tends to satisfy the relevant demand for telecommunications. Telemedicine is used in diverse areas such as pathology, surgery, physical therapy, and psychiatry. It is expected to revolutionise health care in the coming decade and, therefore, it will certainly take into account requirements for medical liability, safety and confidentiality in the same way as traditional "establishment" medicine does.

  8. Nutrition labelling is a trade policy issue: lessons from an analysis of specific trade concerns at the World Trade Organization.

    Science.gov (United States)

    Thow, Anne Marie; Jones, Alexandra; Hawkes, Corinna; Ali, Iqra; Labonté, Ronald

    2017-01-12

    Interpretive nutrition labels provide simplified nutrient-specific text and/or symbols on the front of pre-packaged foods, to encourage and enable consumers to make healthier choices. This type of labelling has been proposed as part of a comprehensive policy response to the global epidemic of non-communicable diseases. However, regulation of nutrition labelling falls under the remit of not just the health sector but also trade. Specific Trade Concerns have been raised at the World Trade Organization's Technical Barriers to Trade Committee regarding interpretive nutrition labelling initiatives in Thailand, Chile, Indonesia, Peru and Ecuador. This paper presents an analysis of the discussions of these concerns. Although nutrition labelling was identified as a legitimate policy objective, queries were raised regarding the justification of the specific labelling measures proposed, and the scientific evidence for effectiveness of such measures. Concerns were also raised regarding the consistency of the measures with international standards. Drawing on policy learning theory, we identified four lessons for public health policy makers, including: strategic framing of nutrition labelling policy objectives; pro-active policy engagement between trade and health to identify potential trade issues; identifying ways to minimize potential 'practical' trade concerns; and engagement with the Codex Alimentarius Commission to develop international guidance on interpretative labelling. This analysis indicates that while there is potential for trade sector concerns to stifle innovation in nutrition labelling policy, care in how interpretive nutrition labelling measures are crafted in light of trade commitments can minimize such a risk and help ensure that trade policy is coherent with nutrition action. © The Author 2017. Published by Oxford University Press. All rights reserved. For Permissions, please email: journals.permissions@oup.com.

  9. Raising the bar (7)

    NARCIS (Netherlands)

    Elhorst, Paul; Abreu, Maria; Amaral, Pedro; Bhattacharjee, Arnab; Corrado, Luisa; Doran, Justin; Fingleton, Bernard; Fuerst, Franz; Garretsen, Harry; Igliori, Danilo; Gallo, Julie Le; McCann, Philip; Monastiriotis, Vassilis; Quatraro, Francesco; Yu, Jihai

    2018-01-01

    This editorial summarises the papers published in issue 13.1 so as to raise the bar in applied spatial economic research and highlight new trends. The first paper adopts a scale neutral approach to investigate the spatial mechanisms that cause regional innovation and growth. The second paper claims

  10. Raising the Bar (3)

    NARCIS (Netherlands)

    Elhorst, Paul; Abreu, M.; Amaral, P.; Bhattacharjee, A.; Corrado, L.; Fingleton, B.; Fuerst, F.; Garretsen, H.; Igliori, D.; Le Gallo, J.; McCann, P.; Monastiriotis, V.; Pryce, G.; Yu, J.

    This editorial summarizes and comments on the papers published in issue 11(3) so as to raise the bar in applied spatial economic research and highlight new trends. The first paper proposes spatial and a-spatial indicators to describe the networks of airline companies around the world. The second

  11. Ethical dilemmas experienced by clinical psychology trainee therapists.

    Science.gov (United States)

    Bhola, Poornima; Sinha, Ananya; Sonkar, Suruchi; Raguram, Ahalya

    2015-01-01

    Ethical dilemmas are inevitable during psychotherapeutic interactions, and these complexities and challenges may be magnified during the training phase. The experience of ethical dilemmas in the arena of therapy and the methods of resolving these dilemmas were examined among 35 clinical psychologists in training, through an anonymous and confidential online survey. The trainees' responses to four open-ended questions on any one ethical dilemma encountered during therapy were analysed, using thematic content analysis. The results highlighted that the salient ethical dilemmas related to confidentiality and boundary issues. The trainees also raised ethical questions regarding therapist competence, the beneficence and non-maleficence of therapeutic actions, and client autonomy. Fifty-seven per cent of the trainees reported that the dilemmas were resolved adequately, the prominent methods of resolution being supervision or consultation and guidance from professional ethical guidelines. The trainees felt that the professional codes had certain limitations as far as the effective resolution of ethical dilemmas was concerned. The findings indicate the need to strengthen training and supervision methodologies and professional ethics codes for psychotherapists and counsellors in India.

  12. Privacy and confidentiality measures in genetic testing and counselling: arguing on genetic exceptionalism again?

    Science.gov (United States)

    Witt, Magdalena M; Witt, Michał P

    2016-11-01

    Medical confidentiality in clinical genetics poses an important question about its scope, which would be in line with professional ethics and simple honesty. It is already known that the maintenance of absolute anonymity, bearing in mind the current progress of genetic techniques, is virtually impossible. On the other hand, our insight into the information contained in the human genome is increasing. This mini-review presents the authors' standpoint regarding this complex and difficult issue.

  13. 29 CFR 780.124 - Raising of fur-bearing animals.

    Science.gov (United States)

    2010-07-01

    ... 29 Labor 3 2010-07-01 2010-07-01 false Raising of fur-bearing animals. 780.124 Section 780.124... General Scope of Agriculture Raising of Livestock, Bees, Fur-Bearing Animals, Or Poultry § 780.124 Raising of fur-bearing animals. (a) The term “fur-bearing animals” has reference to animals which bear fur of...

  14. Oil company mergers raise concern among some geoscientists

    Science.gov (United States)

    Showstack, Randy

    With the blessings of the antitrust regulatory agencies and the ghost of John D. Rockefeller, the proposed marriage between Exxon and Mobil would create the world's largest energy company and corporation of any type. This merger also would reunite the two biggest pieces of Rockefeller's Standard Oil Company, which the U.S. Supreme Court ordered dismantled in 1911 in an antitrust case.Exxon, Mobil, and financial analysts say the merger is driven by the need to operate more efficiently in a tough, competitive environment. The price of oil, after all, recently has been scraping near bottom of the barrel at about $11 per barrel, and companies often need to muster significant capital resources to develop more remote reservoirs.

  15. Report: Paksas scandal raises privacy concerns / Steven Paulikas

    Index Scriptorium Estoniae

    Paulikas, Steven

    2004-01-01

    Inimõiguste ekspertide uuring näitab, et nii Leedu presidendi Rolandas Paksase administratsiooni töötajad, presidendi tegevuse uurijad kui ka Leedu ajakirjandus rikkusid mitmeid inimõigusi, eelkõige aga õigust privaatsusele

  16. Capital raising of aerospace companies: equities or debts?

    Science.gov (United States)

    Hui-Shan, L.; Taw-Onn, Y.; Wai-Mun, H.

    2016-10-01

    Aerospace products enhance national and economic activities, thus maintaining the sustainability of aerospace industry is crucial. One of the perspectives in ensuring sustainability of aerospace companies is expansion of firms by raising funds for research and development in order to provide a reasonable profitability to the firms. This study comprises a sample of 47 aerospace companies from 2009 to 2015 to analyze the impact of raising fund by equities or debts to the profitability of the firms. The result indicates that capital raising through equities is preferable than debts. Moreover, the study also identifies that the profit of aerospace industry is volatile and there is cyclical reduction of the net income in the first quarter of the year. The management needs to make wise decisions in raising fund to ensure a healthy growth of the aerospace company.

  17. [Design and application of medical electric leg-raising machine].

    Science.gov (United States)

    Liang, Jintang; Chen, Jinyuan; Zhao, Zixian; Lin, Jinfeng; Li, Juanhong; Zhong, Jingliang

    2017-08-01

    Passive leg raising is widely used in clinic, but it lacks of specialized mechanical raise equipment. It requires medical staff to raise leg by hand or requires a multi-functional bed to raise leg, which takes time and effort. Therefore we have developed a new medical electric leg-raising machine. The equipment has the following characteristics: simple structure, stable performance, easy operation, fast and effective, safe and comfortable. The height range of the lifter is 50-120 cm, the range of the angle of raising leg is 10degree angle-80degree angle, the maximum supporting weight is 40 kg. Because of raising the height of the lower limbs and making precise angle, this equipment can completely replace the traditional manner of lifting leg by hand with multi-functional bed to lift patients' leg and can reduce the physical exhaustion and time consumption of medical staff. It can change the settings at any time to meet the needs of the patient; can be applied to the testing of PLR and dynamically assessing the hemodynamics; can prevent deep vein thrombosis and some related complications of staying in bed; and the machine is easy to be cleaned and disinfected, which can effectively avoid hospital acquired infection and cross infection; and can also be applied to emergency rescue of various disasters and emergencies.

  18. Ethical Issues Raised by Private Practice Physiotherapy Are More Diverse than First Meets the Eye: Recommendations from a Literature Review

    Science.gov (United States)

    Drolet, Marie-Josée; Williams-Jones, Bryn

    2015-01-01

    ABSTRACT Purpose: Physiotherapy in private practice differs from physiotherapy practised in a public setting in several ways, the most evident of which is the for-profit nature of private physiotherapy clinics; these differences can generate distinct and challenging ethical issues. The objectives of this article are to identify ethical issues encountered by physiotherapists in private practice settings and to identify potential solutions and recommendations to address these issues. Method: After a literature search of eight databases, 39 studies addressing ethical issues in a private practice context were analyzed. Results: A total of 25 ethical issues emerging from the included studies were classified into three main categories: (1) business and economic issues (e.g., conflicts of interests, inequity in a managed care context, lack of time affecting quality of care); (2) professional issues (e.g., professional autonomy, clinical judgment, treatment effectiveness, professional conduct); and (3) patients' rights and welfare issues (e.g., confidentiality, power asymmetries, paternalism vs. patient autonomy, informed consent). Recommendations as to how physiotherapists could better manage these issues were then identified and categorized. Conclusions: The physiotherapy community should reflect on the challenges raised by private practice so that professionals can be supported—through education, research, and good governance—in providing the best possible care for their patients. PMID:25931663

  19. Ethical issues raised by private practice physiotherapy are more diverse than first meets the eye: recommendations from a literature review.

    Science.gov (United States)

    Hudon, Anne; Drolet, Marie-Josée; Williams-Jones, Bryn

    2015-01-01

    Physiotherapy in private practice differs from physiotherapy practised in a public setting in several ways, the most evident of which is the for-profit nature of private physiotherapy clinics; these differences can generate distinct and challenging ethical issues. The objectives of this article are to identify ethical issues encountered by physiotherapists in private practice settings and to identify potential solutions and recommendations to address these issues. After a literature search of eight databases, 39 studies addressing ethical issues in a private practice context were analyzed. A total of 25 ethical issues emerging from the included studies were classified into three main categories: (1) business and economic issues (e.g., conflicts of interests, inequity in a managed care context, lack of time affecting quality of care); (2) professional issues (e.g., professional autonomy, clinical judgment, treatment effectiveness, professional conduct); and (3) patients' rights and welfare issues (e.g., confidentiality, power asymmetries, paternalism vs. patient autonomy, informed consent). Recommendations as to how physiotherapists could better manage these issues were then identified and categorized. The physiotherapy community should reflect on the challenges raised by private practice so that professionals can be supported-through education, research, and good governance-in providing the best possible care for their patients.

  20. Message design strategies to raise public awareness of social determinants of health and population health disparities.

    Science.gov (United States)

    Niederdeppe, Jeff; Bu, Q Lisa; Borah, Porismita; Kindig, David A; Robert, Stephanie A

    2008-09-01

    Raising public awareness of the importance of social determinants of health (SDH) and health disparities presents formidable communication challenges. This article reviews three message strategies that could be used to raise awareness of SDH and health disparities: message framing, narratives, and visual imagery. Although few studies have directly tested message strategies for raising awareness of SDH and health disparities, the accumulated evidence from other domains suggests that population health advocates should frame messages to acknowledge a role for individual decisions about behavior but emphasize SDH. These messages might use narratives to provide examples of individuals facing structural barriers (unsafe working conditions, neighborhood safety concerns, lack of civic opportunities) in efforts to avoid poverty, unemployment, racial discrimination, and other social determinants. Evocative visual images that invite generalizations, suggest causal interpretations, highlight contrasts, and create analogies could accompany these narratives. These narratives and images should not distract attention from SDH and population health disparities, activate negative stereotypes, or provoke counterproductive emotional responses directed at the source of the message. The field of communication science offers valuable insights into ways that population health advocates and researchers might develop better messages to shape public opinion and debate about the social conditions that shape the health and well-being of populations. The time has arrived to begin thinking systematically about issues in communicating about SDH and health disparities. This article offers a broad framework for these efforts and concludes with an agenda for future research to refine message strategies to raise awareness of SDH and health disparities.

  1. Addressing concerns about the agricultural impacts of siting a nuclear waste repository in Texas

    International Nuclear Information System (INIS)

    Boryczka, M.; Darrough, B.

    1986-01-01

    Public concerns related to the siting of a nuclear repository have included the potential impacts to specific economic sectors. In Texas, local residents have expressed concern about how a repository will affect agriculture. Several major questions have arisen with respect to this issue including: 1) how will a repository's requirements for land and water affect agriculture, 2) how will a repository affect agricultural land values, and 3) how will actual or perceived contamination of locally grown products affect their marketability? This paper describes the concerns raised by local residents and discusses the approach to analyzing the concerns identified. An evaluation of agricultural impacts has been prepared for the Department of Energy's Enviromental Assessment (EA) documents. In addition, activities needed to further evaluate these impacts are planned for site characterization. Both the current analysis and planned activities are described

  2. Lipid lowering and HDL raising gene transfer increase endothelial progenitor cells, enhance myocardial vascularity, and improve diastolic function.

    Directory of Open Access Journals (Sweden)

    Stephanie C Gordts

    Full Text Available BACKGROUND: Hypercholesterolemia and low high density lipoprotein (HDL cholesterol contribute to coronary heart disease but little is known about their direct effects on myocardial function. Low HDL and raised non-HDL cholesterol levels carried increased risk for heart failure development in the Framingham study, independent of any association with myocardial infarction. The objective of this study was to test the hypothesis that increased endothelial progenitor cell (EPC number and function after lipid lowering or HDL raising gene transfer in C57BL/6 low density lipoprotein receptor deficient (LDLr(-/- mice may be associated with an enhanced relative vascularity in the myocardium and an improved cardiac function. METHODOLOGY/PRINCIPAL FINDINGS: Lipid lowering and HDL raising gene transfer were performed using the E1E3E4-deleted LDLr expressing adenoviral vector AdLDLr and the human apolipoprotein A-I expressing vector AdA-I, respectively. AdLDLr transfer in C57BL/6 LDLr(-/- mice resulted in a 2.0-fold (p<0.05 increase of the circulating number of EPCs and in an improvement of EPC function as assessed by ex vivo EPC migration and EPC adhesion. Capillary density and relative vascularity in the myocardium were 28% (p<0.01 and 22% (p<0.05 higher, respectively, in AdLDLr mice compared to control mice. The peak rate of isovolumetric relaxation was increased by 12% (p<0.05 and the time constant of isovolumetric relaxation was decreased by 14% (p<0.05 after AdLDLr transfer. Similarly, HDL raising gene transfer increased EPC number and function and raised both capillary density and relative vascularity in the myocardium by 24% (p<0.05. The peak rate of isovolumetric relaxation was increased by 16% (p<0.05 in AdA-I mice compared to control mice. CONCLUSIONS/SIGNIFICANCE: Both lipid lowering and HDL raising gene transfer have beneficial effects on EPC biology, relative myocardial vascularity, and diastolic function. These findings raise concerns over the

  3. Gasoline prices and the public interest

    International Nuclear Information System (INIS)

    1997-12-01

    The concerns that have been raised about gasoline prices in Newfoundland were addressed and the reasons why they differ significantly from one part of Newfoundland to another were examined. A research and investigation program was established to identify the factors contributing to the price of, and price variation in gasoline sold in the province. Companies directly involved in the gasoline retail business in the province were invited to answer an extensive questionnaire which asked detailed, confidential information concerning the company's operations. This report contains the results of the analysis of the responses, and provides a comprehensive picture of the operation of the petroleum industry. It also contains a series of recommendations for the government with respect to monitoring price fluctuations, gathering data about the industry, and constructing an independently owned and operated terminal storage facility. The report recommends against direct regulation. tabs., figs

  4. An innovative approach to using both cellphones and the radio to identify young people's sexual concerns in Kinshasa, Democratic Republic of Congo.

    Science.gov (United States)

    Nsakala, Gabriel Vodiena; Coppieters, Yves; Kayembe, Patrick Kalambayi

    2014-01-01

    As teenagers have easy access to both radio programs and cell phones, the current study used these tools so that young people could anonymously identify questions about sex and other related concerns in the urban environment of the Democratic Republic of Congo. The purpose of this healthcare intervention was to identify and address concerns raised by young people, which are related to sexual health, and which promote youth health. This healthcare intervention was conducted over a six month period and consisted of a survey carried out in Kinshasa. This focused on 14 to 24 old young people using phone calls on a radio program raising concerns related to sexuality. The radio program was jointly run by a journalist and a health professional who were required to reply immediately to questions from young people. All sexual health concerns were recorded and analyzed. Forty programs were broadcast in six months and 1,250 messages and calls were recorded: 880 (70%) from girls and 370 (30%) from boys, which represents an average of 32 interventions (of which 10 calls and 22 messages) per broadcast. Most questions came from 15-19- and 20-24-year-old girls and boys. Focus of girls' questions: menstrual cycle calculation and related concerns accounted for the majority (24%); sexual practices (16%), love relationships (15%) and virginity (14%). Boys' concerns are masturbation (and its consequences) (22%), sexual practices (19%), love relationships (18%) and worries about penis size (10%). Infections (genital and STI) and topics regarding HIV represent 9% and 4% of the questions asked by girls against 7% and 10% by boys. Concerns were mainly related to knowledge, attitudes and competences to be developed. Concerns and sexual practices raised by teens about their sexual and emotional life have inspired the design of a practical guide for youth self-training and have steered the second phase of this interactive program towards supporting their responsible sexuality.

  5. A Novel QKD-based Secure Edge Router Architecture Design for Burst Confidentiality in Optical Burst Switched Networks

    Science.gov (United States)

    Balamurugan, A. M.; Sivasubramanian, A.

    2014-06-01

    The Optical Burst Switching (OBS) is an emergent result to the technology issue that could achieve a viable network in future. They have the ability to meet the bandwidth requisite of those applications that call for intensive bandwidth. The field of optical transmission has undergone numerous advancements and is still being researched mainly due to the fact that optical data transmission can be done at enormous speeds. The concept of OBS is still far from perfection facing issues in case of security threat. The transfer of optical switching paradigm to optical burst switching faces serious downfall in the fields of burst aggregation, routing, authentication, dispute resolution and quality of service (QoS). This paper proposes a framework based on QKD based secure edge router architecture design to provide burst confidentiality. The QKD protocol offers high level of confidentiality as it is indestructible. The design architecture was implemented in FPGA using diverse models and the results were taken. The results show that the proposed model is suitable for real time secure routing applications of the Optical burst switched networks.

  6. Investigation and management of a raised serum ferritin.

    Science.gov (United States)

    Cullis, Jonathan O; Fitzsimons, Edward J; Griffiths, William Jh; Tsochatzis, Emmanouil; Thomas, D Wayne

    2018-05-01

    Serum ferritin level is one of the most commonly requested investigations in both primary and secondary care. Whilst low serum ferritin levels invariably indicate reduced iron stores, raised serum ferritin levels can be due to multiple different aetiologies, including iron overload, inflammation, liver or renal disease, malignancy, and the recently described metabolic syndrome. A key test in the further investigation of an unexpected raised serum ferritin is the serum transferrin saturation. This guideline reviews the investigation and management of a raised serum ferritin level. The investigation and management of genetic haemochromatosis is not dealt with however and is the subject of a separate guideline. © 2018 John Wiley & Sons Ltd.

  7. Ethical Concerns About Human Genetic Enhancement in the Malay Science Fiction Novels.

    Science.gov (United States)

    Isa, Noor Munirah; Hj Safian Shuri, Muhammad Fakhruddin

    2018-02-01

    Advancements in science and technology have not only brought hope to humankind to produce disease-free offspring, but also offer possibilities to genetically enhance the next generation's traits and capacities. Human genetic enhancement, however, raises complex ethical questions, such as to what extent should it be allowed? It has been a great challenge for humankind to develop robust ethical guidelines for human genetic enhancement that address both public concerns and needs. We believe that research about public concerns is necessary prior to developing such guidelines, yet the issues have not been thoroughly investigated in many countries, including Malaysia. Since the novel often functions as a medium for the public to express their concerns, this paper explores ethical concerns about human genetic enhancement expressed in four Malay science fiction novels namely Klon, Leksikon Ledang, Transgenesis Bisikan Rimba and Transgenik Sifar. Religion has a strong influence on the worldview of the Malays therefore some concerns such as playing God are obviously religious. Association of the negative image of scientists as well as the private research companies with the research on human genetic enhancement reflects the authors' concerns about the main motivations for conducting such research and the extent to which such research will benefit society.

  8. Security, privacy, and confidentiality issues on the Internet

    Science.gov (United States)

    Kelly, Grant; McKenzie, Bruce

    2002-01-01

    We introduce the issues around protecting information about patients and related data sent via the Internet. We begin by reviewing three concepts necessary to any discussion about data security in a healthcare environment: privacy, confidentiality, and consent. We are giving some advice on how to protect local data. Authentication and privacy of e-mail via encryption is offered by Pretty Good Privacy (PGP) and Secure Multipurpose Internet Mail Extensions (S/MIME). The de facto Internet standard for encrypting Web-based information interchanges is Secure Sockets Layer (SSL), more recently known as Transport Layer Security or TLS. There is a public key infrastructure process to `sign' a message whereby the private key of an individual can be used to `hash' the message. This can then be verified against the sender's public key. This ensures the data's authenticity and origin without conferring privacy, and is called a `digital signature'. The best protection against viruses is not opening e-mails from unknown sources or those containing unusual message headers. PMID:12554559

  9. The disinfection of flexible fibre-optic nasendoscopes out-of-hours: confidential telephone survey of ENT units in England

    NARCIS (Netherlands)

    Kanagalingam, J.; Zainal, A.; Georgalas, C.; Paun, S.; Tolley, N. S.

    2002-01-01

    We present the results of a confidential telephone survey of ENT units in England on the disinfection of flexible fibre-optic nasendoscopes out-of-hours. The on-call residents of 124 units were contacted and questioned. In 35.1 per cent of units surveyed, the on-call resident was primarily

  10. Consent, competence, and confidentiality related to psychiatric conditions in adolescent medicine practice.

    Science.gov (United States)

    Campbell, Amy T

    2006-02-01

    Health care for adolescents with psychiatric conditions plays out on a complex stage with considerable state variation, based on a mix of statutory and case law. Added to this are less defined factors such as level of trust in community providers, level of cooperation between generalists and specialists, and local regulatory stances toward adolescent health care and mental health care. And, of course, there is the great diversity in diagnosis and maturity level, as well as family cohesion, from patient to patient (and even within a given patient across time). Finally, this situation resides within a larger environment of stigma vis-a-vis mental health care, most notably evident in the United States in disparate insurance coverage of mental versus physical health treatment. With so complex and varied a picture, clinicians should consult with legal counsel to understand applicable state law and local regulatory guidance (if any)and should also seek out ethical consultation when law does not apply or is not decisive, leaving ongoing concerns. And, as with clinical decision-making, in law and ethics "facts matter" [4]. A growing body of law carves out exceptions to general requirements for parental consent, including in mental health care. Ethically informed discussion around capacity determinations, the consent process, and confidentiality can help engage adolescents as "emerging adults"while remaining mindful of risky behavior and "immediate future" orientation that can be hallmarks of adolescence [30]. Respect for the adolescent, parental responsibility toward their child's best interests, and the family unit generally are paramount. Respect--coupled with caution, greater disclosure and cultural sensitivity, and a participatory approach to decision-making that seeks out the least restrictive and coercive options-can help avoid potential legal traps. How best to proceed? It truly depends-with law and ethics the start (not end) of the discussion and analysis.

  11. Energy, economy and development (EED) triangle: Concerns for India

    International Nuclear Information System (INIS)

    Chaturvedi, A.; Samdarshi, S.K.

    2011-01-01

    In this paper we discuss issues involving energy security with economic growth and development that brings out (i) the dimension of physical security alternative, (ii) framework for a pan South East Asian platform to support energy security and (iii) requirement of promoting regional energy cooperation and specific energy peace initiatives. Sustaining projected economic growth rate coupled with energy security in future is a concern for all developing countries like India. The energy security of these nations is threatened by the disruption of energy supplies by ongoing energy terrorism and geopolitical conflicts in the region. India's geo-strategic position and increasing energy dependence raises concerns for its energy security. We discuss energy security, examine factors and approaches to attempt the energy security in the light of economic growth and development. - Highlights: → India's perspective on evolving energy security concepts and risks analysed. → Model in the form of EED triangle proposed. → New potential energy security alternatives proposed in the light of the model.

  12. Energy, economy and development (EED) triangle: Concerns for India

    Energy Technology Data Exchange (ETDEWEB)

    Chaturvedi, A. [Department of Energy, Tezpur University, Tezpur 784028, Assam (India); Samdarshi, S.K., E-mail: drsksamdarshi@rediffmail.com [Department of Energy, Tezpur University, Tezpur 784028, Assam (India)

    2011-08-15

    In this paper we discuss issues involving energy security with economic growth and development that brings out (i) the dimension of physical security alternative, (ii) framework for a pan South East Asian platform to support energy security and (iii) requirement of promoting regional energy cooperation and specific energy peace initiatives. Sustaining projected economic growth rate coupled with energy security in future is a concern for all developing countries like India. The energy security of these nations is threatened by the disruption of energy supplies by ongoing energy terrorism and geopolitical conflicts in the region. India's geo-strategic position and increasing energy dependence raises concerns for its energy security. We discuss energy security, examine factors and approaches to attempt the energy security in the light of economic growth and development. - Highlights: > India's perspective on evolving energy security concepts and risks analysed. > Model in the form of EED triangle proposed. > New potential energy security alternatives proposed in the light of the model.

  13. Healing The Operational Environment: Encouraging Mental Health Help-Seeking Behavior

    Science.gov (United States)

    2016-02-10

    environment, also referred to as work place environment. When combined with the existing commander’s mental health “ toolkit ” these changes will...self-image when asking for help and the military’s cultural image of the “warrior ethos,” concerns over impact to career , command climate, and the...confidentiality and career impacts are a significant concern for service members as well. Confidentiality and career impacts are concerns for Airmen who may

  14. An innovative approach to using both cellphones and the radio to identify young people’s sexual concerns in Kinshasa, Democratic Republic of Congo

    Science.gov (United States)

    2014-01-01

    Background As teenagers have easy access to both radio programs and cell phones, the current study used these tools so that young people could anonymously identify questions about sex and other related concerns in the urban environment of the Democratic Republic of Congo. The purpose of this healthcare intervention was to identify and address concerns raised by young people, which are related to sexual health, and which promote youth health. Methods This healthcare intervention was conducted over a six month period and consisted of a survey carried out in Kinshasa. This focused on 14 to 24 old young people using phone calls on a radio program raising concerns related to sexuality. The radio program was jointly run by a journalist and a health professional who were required to reply immediately to questions from young people. All sexual health concerns were recorded and analyzed. Results Forty programs were broadcast in six months and 1,250 messages and calls were recorded: 880 (70%) from girls and 370 (30%) from boys, which represents an average of 32 interventions (of which 10 calls and 22 messages) per broadcast. Most questions came from 15-19- and 20-24-year-old girls and boys. Focus of girls’ questions: menstrual cycle calculation and related concerns accounted for the majority (24%); sexual practices (16%), love relationships (15%) and virginity (14%). Boys’ concerns are masturbation (and its consequences) (22%), sexual practices (19%), love relationships (18%) and worries about penis size (10%). Infections (genital and STI) and topics regarding HIV represent 9% and 4% of the questions asked by girls against 7% and 10% by boys. Concerns were mainly related to knowledge, attitudes and competences to be developed. Conclusions Concerns and sexual practices raised by teens about their sexual and emotional life have inspired the design of a practical guide for youth self-training and have steered the second phase of this interactive program towards supporting

  15. Genetic Testing Accounts of Autonomy, Responsibility and Blame

    DEFF Research Database (Denmark)

    Arribas-Ayllon, M.; Sarangi, Srikant; Clarke, Angus

    Advances in molecular genetics have led to the increasing availability of genetic testing for a variety of inherited disorders. While this new knowledge presents many obvious health benefits to prospective individuals and their families it also raises complex ethical and moral dilemmas for famili......, the assessment of competence and maturity, the ability to engage in shared decision-making through acts of disclosure and choice, are just some of the issues that are examined in detail....... as well as genetic professionals. This book explores the ways in which genetic testing generates not only probabilities of potential futures, but also enjoys new forms of social, individual and professional responsibility. Concerns about confidentiality and informed consent involving children...

  16. The Campus Green: Fund Raising in Higher Education. ERIC Digest.

    Science.gov (United States)

    Brittingham, Barbara E.; Pezzullo, Thomas R.

    This digest summarizes issues raised in a research report on fund raising in higher education. The following questions are addressed: What are the changes and trends since the early days of educational fund raising? What are the implications? What is known about spending? What is known about donor behavior? What are the major ethical issues? What…

  17. 48 CFR 6101.21 - Hearing procedures [Rule 21].

    Science.gov (United States)

    2010-10-01

    ...) Nature and conduct of hearings. (1) Except when necessary to maintain the confidentiality of protected... subpoena pursuant to 6101.16(h) (Rule 16(h)). (h) Issues not raised by pleadings. If evidence is objected to at a hearing on the ground that it is not within the issues raised by the pleadings, it may...

  18. 7 CFR 8.9 - Use in 4-H fund raising.

    Science.gov (United States)

    2010-01-01

    ... Office of the Secretary of Agriculture 4-H CLUB NAME AND EMBLEM § 8.9 Use in 4-H fund raising. (a) Fund-raising programs using the 4-H Name or Emblem may be carried out for specific educational purposes. Such fund-raising programs and use of the 4-H name and emblem on, or associated with, products, and services...

  19. Existing Smog in Lahore, Pakistan: An Alarming Public Health Concern.

    Science.gov (United States)

    Riaz, Ramsha; Hamid, Khizar

    2018-01-25

    Lahore, the second-largest and most polluted city in Pakistan, has been plagued by a heavy blanket of smog recently. The ever-growing urbanization and industrialization have contributed to the worsening air quality of the city. Smog, being hazardous to health, is leading to a rapid sprout in multiple health-related problems, as well as raising concerns about the long-term deleterious effects on public health. The current situation is expected to worsen due to the lack of an active action plan from the government's side and a failure of concerned authorities to take note of the urgency of the situation. Hence, we aim to highlight this pressing issue in the light of previously published articles, to alert the relevant authorities regarding the detrimental consequences smog can have on public health and urge them to take immediate action to avoid further damage.

  20. Dynamics of bisphenol A (BPA) and bisphenol S (BPS) in the European paper cycle: Need for concern?

    DEFF Research Database (Denmark)

    Pivnenko, Kostyantyn; Laner, David; Astrup, Thomas Fruergaard

    2018-01-01

    in toxicological profiles have raised concerns that the use of bisphenol S (BPS) as a substitute for BPA may result in yet another situation of a problematic chemical being distributed in consumer products. This study provides a comprehensive evaluation of the current knowledge of BPA and BPS use in thermal paper...

  1. Williston Reservoir raising - environmental overview

    Energy Technology Data Exchange (ETDEWEB)

    1988-07-01

    This preliminary environmental overview report was prepared by B.C. Hydro in June 1987 and revised in July 1988 as an initial assessment of a possible 1.5 m (5 ft.) raise in the Williston Reservoir maximum normal level. The enviromental overview study and the associated engineering and property studies were undertaken to provide information for a decision on whether to initiate more detailed studies. Overview studies are based mainly on available reports, mapping and field data, supplemented by limited site reconnaissance and, in this case, input from key agencies and groups. The lack of adequate mapping of areas which could be affected by reservoir raising did not permit definitive conclusion to be reached. This mapping will be done over the next year to complete the overview assessment. This document covers the impact assessment of socio-economic factors, forestry, reservoir clearing, heritage, recreation, aquatic resources, and wilflife. Further studies in each of these areas are also included. 54 refs., 11 figs., 8 tabs.

  2. Ethics of medical records and professional communications.

    Science.gov (United States)

    Recupero, Patricia R

    2008-01-01

    In child and adolescent psychiatry, medical records and professional communications raise important ethical concerns for the treating or consulting clinician. Although a distinction may be drawn between internal records (eg, medical records and psychotherapy notes) and external communications (eg, consultation reports and correspondence with pediatricians), several ethical principles apply to both types of documentation; however, specific considerations may vary, depending upon the context in which the records or communications were produced. Special care is due with regard to thoroughness and honesty, collaboration and cooperation, autonomy and dignity of the patient, confidentiality of the patient and family members, maintaining objectivity and neutrality, electronic communications media, and professional activities (eg, political advocacy). This article reviews relevant ethical concerns for child and adolescent psychiatrists with respect to medical records and professional communications, drawing heavily from forensic and legal sources, and offers additional recommendations for further reading for clarification and direction on ethical dilemmas.

  3. Biobanks for non-clinical purposes and the new law on forensic biobanks: does the Italian context protect the rights of minors?

    Science.gov (United States)

    Tozzo, Pamela; Pegoraro, Renzo; Caenazzo, Luciana

    2010-12-01

    Biobanks are an important resource for medical research. Genetic research on biological material from minors can yield valuable information that can improve our understanding of genetic-environmental interactions and the genesis and development of early onset genetic disorders. The major ethical concerns relating to biobanks concern consent, privacy, confidentiality, commercialisation, and the right to know or not to know. However, research on paediatric data raises specific governance and ethical questions with regard to consent and privacy. We have considered the Italian normative context focusing on what is mentioned in each document on the ethical and legal requirements that guarantee the rights of minors. We found out that there is no systematic reflection on the ethical and policy issues arising from the participation of minors in biobank research. Moreover, we have focused on the same aspects for the new Italian Law on the National Forensic Biobank.

  4. What We Know about the Public’s Level of Concern for Farm Animal Welfare in Food Production in Developed Countries

    Science.gov (United States)

    Cornish, Amelia; Raubenheimer, David; McGreevy, Paul

    2016-01-01

    Simple Summary The production of food from animals poses many ethical challenges. This review explores what we know about different levels of concern for animal welfare in food production by such stakeholders as veterinarians, farmers, and the general public. Despite the general public’s level of concern for animal welfare in food production being high, their understanding and knowledge is poor. Thus, it is suggested that through widespread consciousness raising we can encourage the public to accurately translate their concerns into market drivers, in turn improving the welfare of billions of animals. Abstract Population growth and rising consumption of meat, dairy, eggs and fish are forcing the world to face the intersecting challenges of how to sustainably feed a population expected to exceed 9 billion by 2050, while also controlling the impact of food production on the planet, on people and on animals. This review acknowledges the absence of a globally accepted definition of animal welfare and then explores the literature regarding different levels of concern for animal welfare in food production by such stakeholders as veterinarians, farmers, and the general public. It focuses on the evidence that the general public’s level of concern for animal welfare is linked to various demographic and personal characteristics, such as age, gender, religion, location, meat eating, and knowledge of animal welfare. Certain animals have characteristics that influence concern for their welfare, with those species that are considered more intelligent being afforded more concern. There is compelling evidence that the general public’s understanding of animal welfare in food production is poor. Acknowledging that public concern can be a driving force to change current production methods, the authors suggest widespread consciousness raising to redefine socially acceptable methods of food production from animals and to ensure that it remains in step with societal concerns. PMID

  5. Consideration on the current status and issues of sensitive information management concerning the physical protection of nuclear material and nuclear facilities

    International Nuclear Information System (INIS)

    Inamura, Tomoaki; Madarame, Haruki

    2009-01-01

    The confidentiality system concerning the physical protection of nuclear materials and nuclear facilities was enacted by revision of the Nuclear Reactor Regulation Law in 2005. We made a comparative analysis with the information security in governmental agencies or financial sectors, in order to consider the way the sensitive information management concerning the physical protection of nuclear materials and nuclear facilities should be. The considerations in this paper are as follows. (1) In order to secure a suitable level of security, close cooperation should be achieved among related governmental agencies. (2) A cycle that continuously evaluates whether suitable management is performed should be established. (3) Excessive secretiveness should be eliminated. (4) An information-sharing system among the related persons beyond the frame of governmental agencies and electricity companies should be established. (5) Improvement in the social acceptability of the sensitive information management is important. (6) Although it is important to perform evaluation by the consideration of suitable balance with information disclosure, it is also important that it is positively shown to society. (author)

  6. Answering human papillomavirus vaccine concerns; a matter of science and time.

    Science.gov (United States)

    Hawkes, David; Lea, Candice E; Berryman, Matthew J

    2013-06-12

    Since the introduction of the HPV vaccine, questions have been asked about its efficacy in preventing cancer linked with HPV. Concerns about the HPV vaccine safety profile have also been raised. This paper highlights the rapidly growing body of evidence (including clinical trials and post-marketing surveillance) illustrating both the safety of the HPV vaccine, through a detailed investigation of reported adverse events, and its efficacy in reducing both HPV infections rates and the resulting drop in cervical lesions, which have been demonstrated to be good predictors of cervical cancer risk.

  7. Addressing EO-1 Spacecraft Pulsed Plasma Thruster EMI Concerns

    Science.gov (United States)

    Zakrzwski, C. M.; Davis, Mitch; Sarmiento, Charles; Bauer, Frank H. (Technical Monitor)

    2001-01-01

    The Pulsed Plasma Thruster (PPT) Experiment on the Earth Observing One (EO-1) spacecraft has been designed to demonstrate the capability of a new generation PPT to perform spacecraft attitude control. Results from PPT unit level radiated electromagnetic interference (EMI) tests led to concerns about potential interference problems with other spacecraft subsystems. Initial plans to address these concerns included firing the PPT at the spacecraft level both in atmosphere, with special ground support equipment. and in vacuum. During the spacecraft level tests, additional concerns where raised about potential harm to the Advanced Land Imager (ALI). The inadequacy of standard radiated emission test protocol to address pulsed electromagnetic discharges and the lack of resources required to perform compatibility tests between the PPT and an ALI test unit led to changes in the spacecraft level validation plan. An EMI shield box for the PPT was constructed and validated for spacecraft level ambient testing. Spacecraft level vacuum tests of the PPT were deleted. Implementation of the shield box allowed for successful spacecraft level testing of the PPT while eliminating any risk to the ALI. The ALI demonstration will precede the PPT demonstration to eliminate any possible risk of damage of ALI from PPT operation.

  8. Notice of the Electric Power Control Commission at the 1 february 2001 on the decree concerning the information confidentiality held by the public networks of transportation or electric power distribution, taking into account for the application of the 16 and 20 sections of the law number 2000-108 of the 20 february 2000 related to the modernization and the development of the electrical utilities; Avis de la Commission de regulation de l'electricite en date du 1 fevrier 2001 sur le decret relatif a la confidentialite des informations detenues par les gestionnaires de reseaux publics de transport ou de distribution d'electricite pris pour l'application des articles 16 et 20 de la loi no 2000-108 du 20 fevrier 2000 relative a la modernisation et au developpement du service public de l'electricite

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2001-07-01

    This document presents the decree concerning the information confidentiality held by the public networks of transportation or electric power distribution, taking into account for the application of the 16 and 20 sections of the law number 2000-108 of the 20 february 2000 related to the modernization and the development of the electrical utilities and a comment of this decree by J. Syrota. (A.L.B.)

  9. Parental access to minors' health records in the South African health care context: concerns and recommendations

    Directory of Open Access Journals (Sweden)

    MN Slabbert

    2004-10-01

    Full Text Available Privacy and confidentiality have long been recognized as essential elements of the doctor-patient relationship. Patients should feel free to disclose the most intimate and private medical facts about themselves to their physicians in order to facilitate optimal patient care. Medical records, whether hand-written or electronic, also play an important role in other contexts, such as medical research, health care management and financial audit. In South Africa there is little consistency in approaches to patient confidentiality. There are also no national standards or policies on patient confidentiality, apart from specific ethical rules, some ad hoc statutory provisions and general constitutional provisions not directly related to the intricacies of the doctor-patient relationship. A closer look at the relevant statutory provisions reveal the existence of conflicting standards, most notably in respect of parental access to a minors' health records. The purpose of this paper is to examine the discrepancies and contradictory provisions relating to the access to and disclosure of health information, in particular parental access to health records of minors. In the final instance, some recommendations will be suggested.

  10. Eavesdropping-aware routing and spectrum allocation based on multi-flow virtual concatenation for confidential information service in elastic optical networks

    Science.gov (United States)

    Bai, Wei; Yang, Hui; Yu, Ao; Xiao, Hongyun; He, Linkuan; Feng, Lei; Zhang, Jie

    2018-01-01

    The leakage of confidential information is one of important issues in the network security area. Elastic Optical Networks (EON) as a promising technology in the optical transport network is under threat from eavesdropping attacks. It is a great demand to support confidential information service (CIS) and design efficient security strategy against the eavesdropping attacks. In this paper, we propose a solution to cope with the eavesdropping attacks in routing and spectrum allocation. Firstly, we introduce probability theory to describe eavesdropping issue and achieve awareness of eavesdropping attacks. Then we propose an eavesdropping-aware routing and spectrum allocation (ES-RSA) algorithm to guarantee information security. For further improving security and network performance, we employ multi-flow virtual concatenation (MFVC) and propose an eavesdropping-aware MFVC-based secure routing and spectrum allocation (MES-RSA) algorithm. The presented simulation results show that the proposed two RSA algorithms can both achieve greater security against the eavesdropping attacks and MES-RSA can also improve the network performance efficiently.

  11. Fund Raising: An International Feast.

    Science.gov (United States)

    Babb, Valorie; Marshall, Gene

    The procedure for planning an international dinner to raise funds and publicize foreign language study is described. The project, which netted several hundred dollars for a high school in North Dakota, involves careful planning over a period of months. Publicity and facilities are discussed, and the various culinary and other jobs to be…

  12. Raising venture capital in the biopharma industry.

    Science.gov (United States)

    Leytes, Lev J

    2002-11-15

    Raising venture capital (VC) is both an art and a science. Future entrepreneurs should carefully consider the various issues of VC financing that have a strong impact on the success of their business. In addition to attracting the best venture capital firms, these issues include such subtle but important points as the timing of financing (especially of the first round), external support sources, desirable qualities of a VC firm, amount to be raised, establishing a productive interface between the founders and the venture capitalists, and most importantly the effects of well-executed VC funding on hiring senior executives and scientific leaders.

  13. Class Restricted Clustering and Micro-Perturbation for Data Privacy.

    Science.gov (United States)

    Li, Xiao-Bai; Sarkar, Sumit

    2013-04-01

    The extensive use of information technologies by organizations to collect and share personal data has raised strong privacy concerns. To respond to the public's demand for data privacy, a class of clustering-based data masking techniques is increasingly being used for privacy-preserving data sharing and analytics. Traditional clustering-based approaches for masking numeric attributes, while addressing re-identification risks, typically do not consider the disclosure risk of categorical confidential attributes. We propose a new approach to deal with this problem. The proposed method clusters data such that the data points within a group are similar in the non-confidential attribute values whereas the confidential attribute values within a group are well distributed . To accomplish this, the clustering method, which is based on a minimum spanning tree (MST) technique, uses two risk-utility tradeoff measures in the growing and pruning stages of the MST technique respectively. As part of our approach we also propose a novel cluster-level micro-perturbation method for masking data that overcomes a common problem of traditional clustering-based methods for data masking, which is their inability to preserve important statistical properties such as the variance of attributes and the covariance across attributes. We show that the mean vector and the covariance matrix of the masked data generated using the micro-perturbation method are unbiased estimates of the original mean vector and covariance matrix. An experimental study on several real-world datasets demonstrates the effectiveness of the proposed approach.

  14. Parenting Skills: Tips for Raising Teens

    Science.gov (United States)

    ... adult is no small task. Understand the parenting skills you need to help guide your teen. By ... teen and encourage responsible behavior. Use these parenting skills to deal with the challenges of raising a ...

  15. Head raising analysis and case revaluation

    Directory of Open Access Journals (Sweden)

    Ager Gondra

    2015-12-01

    Full Text Available This paper shows that Basque relative clause construction follows the Head Raising Analysis: the CP of the relative clause is a complement to the external D and the Head of the relative clause, base-generated inside the TP, moves to the specifier position of the CP. This analysis predicts that the raised DPwill show a TP-internal Case. However, this is not the case, and the DP manifests the Case associated with the main clause. In order to address these Case inconsistencies, Precariousness Condition is proposed. This condition states that a DCase valued u-feature is precarious until it is sent to Spell-Out and therefore, the value is visible for further targeting by a c-commanding Probe.  Evidence for this multiple Agree operation comes from a DP long distance extraction.

  16. Problems raised by applying the recommendations of the International Commission on Radiological Protection

    International Nuclear Information System (INIS)

    Jammet, H.; Mechali, D.

    1977-01-01

    The International Commission on Radiological Protection regularly issues recommendations on the basic concepts of radiation protection and the general principles governing their application in the field of occupational exposure, medical and other types of population exposure. Among these recommendations some, such as those concerning dose limits applied to individuals of the population, can be directly taken up in national regulations, yet this is not the usual case and the practical application of protection principles will sometimes raise a number of problems difficult to solve. In particular, this is the case with the principle stating that all exposures shall be kept as low as is reasonably achievable, taking into account economic and social factors. This problem is especially important as it governs the determination of authorized limits. Various approaches for solving it are examined. (author)

  17. Ethical concerns and dilemmas of Finnish and Dutch health professionals.

    Science.gov (United States)

    Hopia, Hanna; Lottes, Ilsa; Kanne, Mariël

    2016-09-01

    Healthcare professionals encounter ethical dilemmas and concerns in their practice. More research is needed to understand these ethical problems and to know how to educate professionals to respond to them. To describe ethical dilemmas and concerns at work from the perspectives of Finnish and Dutch healthcare professionals studying at the master's level. Exploratory, qualitative study that used the text of student online discussions of ethical dilemmas at work as data. Participants' online discussions were analyzed using inductive content analysis. The sample consisted of 49 students at master's level enrolled in professional ethics courses at universities in Finland and the Netherlands. Permission for conducting the study was granted from both universities of applied sciences. All students provided their informed consent for the use of their assignments as research data. Participants described 51 problematic work situations. Among these, 16 were found to be ethical dilemmas, and the remaining were work issues with an ethical concern and did not meet criteria of a dilemma. The most common problems resulted from concerns about quality care, safety of healthcare professionals, patients' rights, and working with too few staff and inadequate resources. The results indicated that participants were concerned about providing quality of care and raised numerous questions about how to provide it in challenging situations. The results show that it was difficult for students to differentiate ethical dilemmas from other ethical work concerns. Online discussions among healthcare providers give them an opportunity to relate ethical principles to real ethical dilemmas and problems in their work as well as to critically analyze ethical issues. We found that discussions with descriptions of ethical dilemmas and concerns by health professionals provide important information and recommendations not only for education and practice but also for health policy. © The Author(s) 2015.

  18. Parvovirus transmission by blood products - a cause for concern?

    Science.gov (United States)

    Norja, Päivi; Lassila, Riitta; Makris, Mike

    2012-11-01

    The introduction of dual viral inactivation of clotting factor concentrates has practically eliminated infections by viruses associated with significant pathogenicity over the last 20 years. Despite this, theoretical concerns about transmission of infection have remained, as it is known that currently available viral inactivation methods are unable to eliminate parvovirus B19 or prions from these products. Recently, concern has been raised following the identification of the new parvoviruses, human parvovirus 4 (PARV4) and new genotypes of parvovirus B19, in blood products. Parvoviruses do not cause chronic pathogenicity similar to human immunodeficiency virus or hepatitis C virus, but nevertheless may cause clinical manifestations, especially in immunosuppressed patients. Manufacturers should institute measures, such as minipool polymerase chain reaction testing, to ensure that their products contain no known viruses. So far, human bocavirus, another new genus of parvovirus, has not been detected in fractionated blood products, and unless their presence can be demonstrated, routine testing during manufacture is not essential. Continued surveillance of the patients and of the safety of blood products remains an important ongoing issue. © 2012 Blackwell Publishing Ltd.

  19. Health and fracking: should the medical profession be concerned?

    Science.gov (United States)

    Mash, Rachel; Minnaar, Jolynn; Mash, Bob

    2014-02-26

    The use of natural gas that is obtained from high-volume hydraulic fracturing (fracking) may reduce carbon emissions relative to the use of coal and have substantial economic benefits for South Africa. However, concerns have been raised regarding the health and environmental impacts. The drilling and fracking processes use hundreds of chemicals as well as silica sand. Additional elements are either released from or formed in the shale during drilling. These substances can enter the environment in various ways: through failures in the well casing; via alternative underground pathways; as wastewater, spills and leaks on the wellpad; through transportation accidents; and as air pollution. Although many of these chemicals and elements have known adverse health effects, there is little evidence available on the health impacts of fracking. These health concerns have not yet been fully addressed in policy making, and the authors recommend that the voice of health professionals should be part of the public debate on fracking and that a full health impact assessment be required before companies are given the go-ahead to drill. 

  20. Strategic and policy issues raised by the transition from thermal to fast nuclear systems

    International Nuclear Information System (INIS)

    2009-01-01

    The renewed interest in nuclear energy triggered by concerns about global climate change and security of supply, which could lead to substantial growth in nuclear electricity generation, enhances the attractiveness of fast neutron reactors with closed fuel cycles. Moving from the current fleet of thermal neutron reactors to fast neutron systems will require many decades and extensive RD-D efforts. This book identifies and analyses key strategic and policy issues raised by such a transition, aiming at providing guidance to decision makers on the best approaches for implementing transition scenarios. The topics covered in this book will be of interest to government and nuclear industry policy makers as well as to specialists working on nuclear energy system analyses and advanced fuel cycle issues. (author)

  1. Are participants concerned about privacy and security when using short message service to report product adherence in a rectal microbicide trial?

    Science.gov (United States)

    Giguere, Rebecca; Brown, William; Balán, Ivan C; Dolezal, Curtis; Ho, Titcha; Sheinfil, Alan; Ibitoye, Mobolaji; Lama, Javier R; McGowan, Ian; Cranston, Ross D; Carballo-Diéguez, Alex

    2018-04-01

    During a Phase 2 rectal microbicide trial, men who have sex with men and transgender women (n = 187) in 4 countries (Peru, South Africa, Thailand, United States) reported product use daily via short message service (SMS). To prevent disclosure of study participation, the SMS system program included privacy and security features. We evaluated participants' perceptions of privacy while using the system and acceptability of privacy/security features. To protect privacy, the SMS system: (1) confirmed participant availability before sending the study questions, (2) required a password, and (3) did not reveal product name or study participation. To ensure security, the system reminded participants to lock phone/delete messages. A computer-assisted self-interview (CASI), administered at the final visit, measured burden of privacy and security features and SMS privacy concerns. A subsample of 33 participants underwent an in-depth interview (IDI). Based on CASI, 85% had no privacy concerns; only 5% were very concerned. Most were not bothered by the need for a password (73%) or instructions to delete messages (82%). Based on IDI, reasons for low privacy concerns included sending SMS in private or feeling that texting would not draw attention. A few IDI participants found the password unnecessary and more than half did not delete messages. Most participants were not concerned that the SMS system would compromise their confidentiality. SMS privacy and security features were effective and not burdensome. Short ID-related passwords, ambiguous language, and reminders to implement privacy and security-enhancing behaviors are recommended for SMS systems.

  2. Confidentiality Protection of Digital Health Records in Cloud Computing.

    Science.gov (United States)

    Chen, Shyh-Wei; Chiang, Dai Lun; Liu, Chia-Hui; Chen, Tzer-Shyong; Lai, Feipei; Wang, Huihui; Wei, Wei

    2016-05-01

    Electronic medical records containing confidential information were uploaded to the cloud. The cloud allows medical crews to access and manage the data and integration of medical records easily. This data system provides relevant information to medical personnel and facilitates and improve electronic medical record management and data transmission. A structure of cloud-based and patient-centered personal health record (PHR) is proposed in this study. This technique helps patients to manage their health information, such as appointment date with doctor, health reports, and a completed understanding of their own health conditions. It will create patients a positive attitudes to maintain the health. The patients make decision on their own for those whom has access to their records over a specific span of time specified by the patients. Storing data in the cloud environment can reduce costs and enhance the share of information, but the potential threat of information security should be taken into consideration. This study is proposing the cloud-based secure transmission mechanism is suitable for multiple users (like nurse aides, patients, and family members).

  3. Perceived coping & concern predict terrorism preparedness in Australia.

    Science.gov (United States)

    Stevens, Garry; Agho, Kingsley; Taylor, Melanie; Jones, Alison L; Barr, Margo; Raphael, Beverley

    2012-12-27

    In the aftermath of major terrorist incidents research shows population shifts towards protective behaviours, including specific preparedness and avoidance responses. Less is known about individual preparedness in populations with high assumed threat but limited direct exposure, such as Australia. In this study we aimed to determine whether individuals with high perceived coping and higher concern would show greater preparedness to respond to terrorism threats. Adults in New South Wales (NSW) completed terrorism perception and response questions as part of computer assisted telephone interviews (CATI) in 2010 (N=2038). Responses were weighted against the NSW population. Multiple logistic regression analyses were conducted to evaluate the relationship between personal coping/concern factors and terrorism-related preparedness and avoidance behaviours, and to control for potential confounders such as socio-demographic and threat perception factors. Increased vigilance for suspicious behaviours was the most commonly reported behavioural response to perceived terrorism threat. Multivariate analyses showed that the factor combination of high perceived coping and higher concern was the most consistent predictor of terrorism preparedness behaviours and evacuation intentions, including increased vigilance (Adjusted Odd Ratios (AOR)=2.07, p=0.001) learning evacuation plans (AOR=1.61, p=0.05), establishing emergency contact plans (AOR=2.73, pterrorism preparedness behaviours are strongly associated with perceived high coping but that this relationship is also mediated by personal concerns relating to this threat. Cognitive variables such as coping self-efficacy are increasingly targeted as part of natural hazard preparedness and are a viable intervention target for terrorism preparedness initiatives. Raising individual coping perceptions may promote greater general and incident-specific preparedness and could form an integral element of community resilience strategies

  4. Raising the Bar for Teaching

    Science.gov (United States)

    Mehta, Jal; Doctor, Joe

    2013-01-01

    The past year has seen the emergence of a broad consensus on raising the standards for entering the teaching profession. The NEA, AFT, and Council of Chief State School Officers all have said they want higher entry standards. Such an exam would be modeled after other professions and is a potential game changer. If sufficiently rigorous, the exam…

  5. Aspects concerning power distribution networks planning using artificial intelligence

    Energy Technology Data Exchange (ETDEWEB)

    Georgescu, Gh.; Gavrilas, M.; Cartina, Gh. [Gh. Asachi Technical Univ. of Iasi, Iasi (Romania)

    1997-12-31

    This paper presents the application of AI tools for the on-line identification of load structure in distribution networks. The authors have considered Artificial Neural Networks (ANN) which are known as valuable and fast tools for pattern identification or completion. This approach to the load model allows a more detailed analysis directed towards the optimization of system structure and working conditions. Traditional methods produce good results but raise the processing time problem, especially when applied to large systems. For such cases another approach appeal to the Genetic Algorithms, which are frequently referenced in the literature concerned with PDS (reconfiguration of open loop radial networks, optimal var-sources distribution, optimal selection of transformer tap position). (author)

  6. Why the Immune System Should Be Concerned by Nanomaterials?

    Directory of Open Access Journals (Sweden)

    Marc J. Pallardy

    2017-05-01

    Full Text Available Particles possess huge specific surface area and therefore nanomaterials exhibit unique characteristics, such as special physical properties and chemical hyper-reactivity, which make them particularly attractive but also raise numerous questions concerning their safety. Interactions of nanomaterials with the immune system can potentially lead to immunosuppression, hypersensitivity (allergy, immunogenicity and autoimmunity, involving both innate and adaptive immune responses. Inherent physical and chemical NP characteristics may influence their immunotoxicity, i.e., the adverse effects that can result from exposure. This review will focus on the possible interaction of nanomaterials including protein aggregates with the innate immune system with specific emphasis on antigen-presenting cells, i.e., dendritic cells, macrophages and monocytes.

  7. Raising students and educators awareness of radioactive materials transport through creative classroom materials and exhibits

    International Nuclear Information System (INIS)

    Holm, J.; Sandoz, C.; Dickenson, J.; Lee, J.C.; Smith, A.M.

    1994-01-01

    The public is concerned about how the shipping and handling of radioactive materials affects them and their environment. Through exhibit showings doing professional education conferences and smaller, focussed workshops, the United States Department of Energy (DOE) has found teachers and students to be an especially interested audience for hazardous and radioactive materials transportation information. DOE recognizes the importance of presenting educational opportunities to students about scientific and societal issues associated with planning for and safely transporting these types of materials. Raising students' and educators' awareness of hazardous and radioactive materials transport through creative classroom materials and exhibits may help them make informed decisions as adults about this often controversial and difficult issue

  8. Protecting the confidentiality and security of personal health information in low- and middle-income countries in the era of SDGs and Big Data

    Directory of Open Access Journals (Sweden)

    Eduard J. Beck

    2016-11-01

    Full Text Available Background: As increasing amounts of personal information are being collected through a plethora of electronic modalities by statutory and non-statutory organizations, ensuring the confidentiality and security of such information has become a major issue globally. While the use of many of these media can be beneficial to individuals or populations, they can also be open to abuse by individuals or statutory and non-statutory organizations. Recent examples include collection of personal information by national security systems and the development of national programs like the Chinese Social Credit System. In many low- and middle-income countries, an increasing amount of personal health information is being collected. The collection of personal health information is necessary, in order to develop longitudinal medical records and to monitor and evaluate the use, cost, outcome, and impact of health services at facility, sub-national, and national levels. However, if personal health information is not held confidentially and securely, individuals with communicable or non-communicable diseases (NCDs may be reluctant to use preventive or therapeutic health services, due to fear of being stigmatized or discriminated against. While policymakers and other stakeholders in these countries recognize the need to develop and implement policies for protecting the privacy, confidentiality and security of personal health information, to date few of these countries have developed, let alone implemented, coherent policies. The global HIV response continues to emphasize the importance of collecting HIV-health information, recently re-iterated by the Fast Track to End AIDS by 2030 program and the recent changes in the Guidelines on When to Start Antiretroviral Therapy and on Pre-exposure Prophylaxis for HIV. The success of developing HIV treatment cascades in low- and middle-income countries will require the development of National Health Identification Systems. The

  9. Protecting the confidentiality and security of personal health information in low- and middle-income countries in the era of SDGs and Big Data.

    Science.gov (United States)

    Beck, Eduard J; Gill, Wayne; De Lay, Paul R

    2016-01-01

    As increasing amounts of personal information are being collected through a plethora of electronic modalities by statutory and non-statutory organizations, ensuring the confidentiality and security of such information has become a major issue globally. While the use of many of these media can be beneficial to individuals or populations, they can also be open to abuse by individuals or statutory and non-statutory organizations. Recent examples include collection of personal information by national security systems and the development of national programs like the Chinese Social Credit System. In many low- and middle-income countries, an increasing amount of personal health information is being collected. The collection of personal health information is necessary, in order to develop longitudinal medical records and to monitor and evaluate the use, cost, outcome, and impact of health services at facility, sub-national, and national levels. However, if personal health information is not held confidentially and securely, individuals with communicable or non-communicable diseases (NCDs) may be reluctant to use preventive or therapeutic health services, due to fear of being stigmatized or discriminated against. While policymakers and other stakeholders in these countries recognize the need to develop and implement policies for protecting the privacy, confidentiality and security of personal health information, to date few of these countries have developed, let alone implemented, coherent policies. The global HIV response continues to emphasize the importance of collecting HIV-health information, recently re-iterated by the Fast Track to End AIDS by 2030 program and the recent changes in the Guidelines on When to Start Antiretroviral Therapy and on Pre-exposure Prophylaxis for HIV . The success of developing HIV treatment cascades in low- and middle-income countries will require the development of National Health Identification Systems. The success of programs like

  10. Cyber-Security Challenges with SMEs in Developing Economies: Issues of Confidentiality, Integrity & Availability (CIA)

    DEFF Research Database (Denmark)

    Yeboah-Boateng, Ezer Osei

    The essence of this study is first to highlight the cyber-security challenges confronting SMEs in developing economies, and to model a framework for safeguarding their assets, to ensure continuous optimal business operations, and to participate and compete securely in the ubiquitous cyber......, to develop customer-centric strategies. While connectivity is indispensable for achieving business success, being connected also implies being exposed to a myriad of cyber-security challenges, such as vulnerabilities of confidentiality, integrity and availability (CIA). As vulnerabilities are exploited...... cognitive map (FCM) approach is also used to show the implications of vulnerabilities amongst SMEs asset disposal policies....

  11. OPINI AUDIT GOING CONCERN: KAJIAN BERDASARKAN MODEL PREDIKSI KEBANGKRUTAN, PERTUMBUHAN PERUSAHAAN, LEVERAGE, DAN REPUTASI AUDITOR

    Directory of Open Access Journals (Sweden)

    ARRY PRATAMA RUDYAWAN

    2009-07-01

    Full Text Available The cases of accounting data manipulation that involve big firms, such as Enron and WorldCom, have affected auditor reputation. Enron and 95 other firms received unqualified opinion in the year prior to bankruptcy. This fact raises questions why firms receiving unqualified opinion stop operating. The assessment of going concern has to be delivered by auditor and added into audit opinion.  An auditor is responsible to evaluate whether there is substantial doubt about the entity’s ability to continue its operation for a reasonable period of time. This research aims to investigate the effect of bankruptcy prediction model, firm growth, leverage, and auditor reputation on going concern audit opinion. The result shows that bankruptcy prediction model affects the accuracy of going concern opinion issue. However, the firm growth, leverage, and auditor reputation do not do so.

  12. Maintaining confidentiality in prospective studies: anonymous repeated measurements via email (ARME) procedure.

    Science.gov (United States)

    Carli, Vladimir; Hadlaczky, Gergö; Wasserman, Camilla; Stingelin-Giles, Nicola; Reiter-Theil, Stella; Wasserman, Danuta

    2012-02-01

    Respecting and protecting the confidentiality of data and the privacy of individuals regarding the information that they have given as participants in a research project is a cornerstone of complying with accepted research standards. However, in longitudinal studies, establishing and maintaining privacy is often challenging because of the necessity of repeated contact with participants. A novel internet-based solution is introduced here, which maintains privacy while at the same time ensures linkage of data to individual participants in a repeated measures design. With the use of the anonymous repeated measurements via email (ARME) procedure, two separate one-way communication systems are established through ad hoc email accounts and a secure study website. Strengths and limitations of the approach are discussed.

  13. Raising Public Awareness of Clinical Trials: Development of Messages for a National Health Communication Campaign.

    Science.gov (United States)

    Massett, Holly A; Dilts, David M; Bailey, Robert; Berktold, Jennifer; Ledsky, Rebecca; Atkinson, Nancy L; Mishkin, Grace; Denicoff, Andrea; Padberg, Rose Mary; Allen, Marin P; Silver, Karen; Carrington, Kelli; Johnson, Lenora E

    2017-05-01

    Clinical trials are essential for developing new and effective treatments and improving patient quality of life; however, many trials cannot answer their primary research questions because they fall short of their recruitment goals. This article reports the results of formative research conducted in two populations, the public and primary care physicians, to identify messages that may raise awareness and increase interest in clinical trials and be used in a national communication campaign. Results suggested that participants were primarily motivated to participate in clinical trials out of a self-interest to help themselves first. Messages illustrated that current treatments were tested via clinical trials, helped normalize trials as routine practices, and reduced concerns over trying something new first. Participants wanted messages that portray trials as state-of-the-art choices that offer some hope, show people like themselves, and are described in a clear, concise manner with actionable steps for them to take. The study revealed some differences in message salience, with healthy audiences exhibiting lower levels of interest. Our results suggest that targeted messages are needed, and that communication with primary health-care providers is an important and necessary component in raising patient awareness of the importance of clinical trials.

  14. Year 2000 commercial issues

    International Nuclear Information System (INIS)

    Kratz, M.P.J.; Booth, R.T.

    1998-01-01

    This presentation focused on commercial aspects of the Y2K including: (1) special communication issues, (2) outsourcing transactions, (3) joint ventures and the significance for the oil and gas industry, and (4) contingency planning. Communication issues involve interaction with suppliers and vendors of critical systems, liability for Y2K communications (misrepresentation, defamation, promissory estoppel, statutory liability), securities disclosure (Canadian and US SEC requirements), protected communications, protection for Year 2000 statements. Outsourcing problems highlighted include resistance of suppliers to assume responsibility for Y2K problem remediation, factors which support and negate supplier responsibility, scope of suppliers' obligation, and warranties in respect of third party software. Regarding joint ventures, questions concerning limitations on liability, supply warranties, stand-by arrangements, stockpiling inventory, indemnities, confidentiality, operator compensation versus operator risk, and insurance were raised and addressed. Among contingency planning issues the questions of Y2K legal audit, and disclosure aspects of contingency planning were the featured concerns. figs

  15. Year 2000 commercial issues

    Energy Technology Data Exchange (ETDEWEB)

    Kratz, M.P.J.; Booth, R.T. [Bennett Jones, Calgary, AB (Canada)

    1998-12-31

    This presentation focused on commercial aspects of the Y2K including: (1) special communication issues, (2) outsourcing transactions, (3) joint ventures and the significance for the oil and gas industry, and (4) contingency planning. Communication issues involve interaction with suppliers and vendors of critical systems, liability for Y2K communications (misrepresentation, defamation, promissory estoppel, statutory liability), securities disclosure (Canadian and US SEC requirements), protected communications, protection for Year 2000 statements. Outsourcing problems highlighted include resistance of suppliers to assume responsibility for Y2K problem remediation, factors which support and negate supplier responsibility, scope of suppliers` obligation, and warranties in respect of third party software. Regarding joint ventures, questions concerning limitations on liability, supply warranties, stand-by arrangements, stockpiling inventory, indemnities, confidentiality, operator compensation versus operator risk, and insurance were raised and addressed. Among contingency planning issues the questions of Y2K legal audit, and disclosure aspects of contingency planning were the featured concerns. figs.

  16. HAPPINESS ORIENTATIONS AMONG ADOLESCENTS RAISED IN URBAN AND RURAL AREAS

    Directory of Open Access Journals (Sweden)

    Anisti Anggraeny

    2016-08-01

    Full Text Available Researcher takes particular interest to discover the respondents’ orientation towards happiness based on where the respondent was raised. The study involves 467 senior high school students with ages ranging from 14-17 years old. The data is analyzed using an adapted society psychological approach. The results shows that adolescents raised in rural areas are consider the family to be a factor that contributes to their happiness. Second, achievement is also a factor that leads to happiness. However for the category, to love and be loved, adolescents growing in urban areas place this as a factor that leads to happiness. Similar with spirituality, friends and leisure time are factors that make adolescents raised in urban areas to become happy. Nevertheless, the results of cross tabulation with Pearson chi square test scoring demonstrates that no correlations exist between adolescent happiness raised from urban or rural areas.

  17. Nuclear exports. Parliamentary control and confidentiality

    International Nuclear Information System (INIS)

    Feldmann, Ulrike

    2015-01-01

    With its decision taken on 21. October 2014 (Az.: 2 BvE 5/11) the Federal Constitutional Court (BVerfG) decided during court proceedings between administrative bodies on the scope and limits of the parliamentary right of information. Even though the proceeding did not deal with nuclear exports but arm exports, foreign trade law, however, does not only designate an export licence obligation for military weapons but also for so called dual-use goods meaning goods, which can be used both for friendly as well as for military purposes. The export of these goods requires according to the so-called Dual-Use Regulation (EG) 428/2009 a licence. Annex I category 0 of the regulation (EG) 428/2009 lists a variety of nuclear materials, plants and equipment items for which this licence applies. In the same manner as arm exports, also exports of nuclear dual-use goods are being discussed in a special cabinet committee, the Federal Security Council (BSR), which shall coordinate cross-departmentally the German security and defence policy under consideration of economic interests and which categorises its results, according to the rules of procedure, as confidential. Also legally not regulated but common ''preliminary enquiries'' at the responsible Federal Ministry or rather Federal Office of Economics and Export Control by companies which plan an export and want to affirm the general approval for their export business prior to conclusion of contract take not only place for arm exports but also for nuclear dual-use goods. The decision by the Federal Constitutional Court can be applied to consultations about the authorisation of nuclear dual-use goods.

  18. Raising Butterflies from Your Own Garden.

    Science.gov (United States)

    Howley-Pfeifer, Patricia

    2002-01-01

    Describes how raising monarch, black swallowtail, and mourning cloak butterflies in a kindergarten class garden can provide opportunities for observation experiences. Includes detailed steps for instruction and describes stages of growth. Excerpts children's journal dictations to illustrate ways to support the discovery process. Describes related…

  19. Issues on raising a bilingual child in Costa Rica: a myth or a reality?

    Directory of Open Access Journals (Sweden)

    Allen Quesada Pacheco

    2011-01-01

    Full Text Available This article deals with main issues concerning bilingualism and bilingual first language acquisition (BFLA. A review of the literature is presented on how children learn languages. In addition, this paper summarizes what bilingualism is and addresses how the One-parent One-language (OPOL and the Minority Language at Home (ML@H methods work. The paper includes sample testimonies of Itzel, a three-year-old child, raised with these methods. It also illustrates samples of her code-switching and code-mixing as part of her evolution in bilingual first language acquisition. Based on this evolution, there is some evidence that a child can become bilingual under foreign language conditions. Finally, the article reflects on the decisive role that dedication, consistency and effort have as crucial components to accomplish BFLA.

  20. Perceived coping & concern predict terrorism preparedness in Australia

    Directory of Open Access Journals (Sweden)

    Stevens Garry

    2012-12-01

    Full Text Available Abstract Background In the aftermath of major terrorist incidents research shows population shifts towards protective behaviours, including specific preparedness and avoidance responses. Less is known about individual preparedness in populations with high assumed threat but limited direct exposure, such as Australia. In this study we aimed to determine whether individuals with high perceived coping and higher concern would show greater preparedness to respond to terrorism threats. Methods Adults in New South Wales (NSW completed terrorism perception and response questions as part of computer assisted telephone interviews (CATI in 2010 (N=2038. Responses were weighted against the NSW population. Multiple logistic regression analyses were conducted to evaluate the relationship between personal coping/concern factors and terrorism-related preparedness and avoidance behaviours, and to control for potential confounders such as socio-demographic and threat perception factors. Results Increased vigilance for suspicious behaviours was the most commonly reported behavioural response to perceived terrorism threat. Multivariate analyses showed that the factor combination of high perceived coping and higher concern was the most consistent predictor of terrorism preparedness behaviours and evacuation intentions, including increased vigilance (Adjusted Odd Ratios (AOR=2.07, p=0.001 learning evacuation plans (AOR=1.61, p=0.05, establishing emergency contact plans (AOR=2.73, p Conclusion The findings of this study suggest that terrorism preparedness behaviours are strongly associated with perceived high coping but that this relationship is also mediated by personal concerns relating to this threat. Cognitive variables such as coping self-efficacy are increasingly targeted as part of natural hazard preparedness and are a viable intervention target for terrorism preparedness initiatives. Raising individual coping perceptions may promote greater general and