WorldWideScience

Sample records for defense privacy program

  1. 32 CFR 701.101 - Privacy program terms and definitions.

    Science.gov (United States)

    2010-07-01

    ... from a project on privacy issues, identifying and resolving the privacy risks, and approval by a... 32 National Defense 5 2010-07-01 2010-07-01 false Privacy program terms and definitions. 701.101... DEPARTMENT OF THE NAVY DOCUMENTS AFFECTING THE PUBLIC DON Privacy Program § 701.101 Privacy program terms and...

  2. Privacy Training Program

    Science.gov (United States)

    Recognizing that training and awareness are critical to protecting agency Personally Identifiable Information (PII), the EPA is developing online training for privacy contacts in its programs and regions.

  3. DEFENSE PROGRAMS RISK MANAGEMENT FRAMEWORK

    Directory of Open Access Journals (Sweden)

    Constantin PREDA

    2012-01-01

    Full Text Available For the past years defense programs have faced delays in delivering defense capabilities and budget overruns. Stakeholders are looking for ways to improve program management and the decision making process given the very fluid and uncertain economic and political environment. Consequently, they have increasingly resorted to risk management as the main management tool for achieving defense programs objectives and for delivering the defense capabilities strongly needed for the soldiers on the ground on time and within limited defense budgets. Following a risk management based decision-making approach the stakeholders are expected not only to protect program objectives against a wide range of risks but, at the same time, to take advantage of the opportunities to increase the likelihood of program success. The prerequisite for making risk management the main tool for achieving defense programs objectives is the design and implementation of a strong risk management framework as a foundation providing an efficient and effective application of the best risk management practices. The aim of this paper is to examine the risk management framework for defense programs based on the ISO 31000:2009 standard, best risk management practices and the defense programs’ needs and particularities. For the purposes of this article, the term of defense programs refers to joint defense programs.

  4. Defense Treaty Inspection Readiness Program

    International Nuclear Information System (INIS)

    Cronin, J.J.; Kohen, M.D.; Rivers, J.D.

    1996-01-01

    The Defense Treaty Inspection Readiness Program (DTIRP) was established by the Department of Defense in 1990 to assist defense facilities in preparing for treaty verification activities. Led by the On-Site Inspection Agency (OSIA), an element of the Department of Defense, DTIRP''s membership includes representatives from other Department of Defense agencies, the Department of Energy (DOE), the Central Intelligence Agency, the Federal Bureau of Investigation, the Department of Commerce, and others. The Office of Safeguards and Security has a significant interest in this program, due to the number of national defense facilities within its purview that are candidates for future inspections. As a result, the Office of Safeguards and Security has taken a very active role in DTIRP. This paper discusses the Office of Safeguards and Security''s increasing involvement in various elements of the DTIRP, ranging from facility assessments to training development and implementation

  5. Defense Meteorological Satellite Program (DMSP)

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — The Defense Meteorological Satellite Program (DMSP) satellites collect visible and infrared cloud imagery as well as monitoring the atmospheric, oceanographic,...

  6. 32 CFR 311.7 - OSD/JS Privacy Office Processes.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 2 2010-07-01 2010-07-01 false OSD/JS Privacy Office Processes. 311.7 Section...) PRIVACY PROGRAM OFFICE OF THE SECRETARY OF DEFENSE AND JOINT STAFF PRIVACY PROGRAM § 311.7 OSD/JS Privacy Office Processes. The OSD/JS Privacy Office shall: (a) Exercise oversight and administrative control of...

  7. 78 FR 15732 - Privacy Act of 1974; Computer Matching Program

    Science.gov (United States)

    2013-03-12

    ... 1974; Computer Matching Program AGENCY: Department of Homeland Security/U.S. Citizenship and... Privacy Act of 1974 (5 U.S.C. 552a), as amended by the Computer Matching and Privacy Protection Act of 1988 (Pub. L. 100-503) and the Computer Matching and Privacy Protection Amendments of 1990 (Pub. L. 101...

  8. Defense Programs Transportation Risk Assessment

    International Nuclear Information System (INIS)

    Clauss, D.B.

    1994-01-01

    This paper provides an overview of the methodology used in a probabilistic transportation risk assessment conducted to assess the probabilities and consequences of inadvertent dispersal of radioactive materials arising from severe transportation accidents. The model was developed for the Defense Program Transportation Risk Assessment (DPTRA) study. The analysis incorporates several enhancements relative to previous risk assessments of hazardous materials transportation including newly-developed statistics on the frequencies and severities of tractor semitrailer accidents and detailed route characterization using the 1990 Census data

  9. Defense program pushes microchip frontiers

    Science.gov (United States)

    Julian, K.

    1985-05-01

    The very-high-speed integrated circuit (VHSIC) program of the Department of Defense will have a significant effect on the expansion of integrated circuit technology. This program, which is to cost several hundred million dollars, is accelerating the trend toward higher-speed, denser circuitry for microchips through innovative design and fabrication techniques. Teams in six different American companies are to design and fabricate a military useful 'brassboard' system which would employ chips developed in the first phase of the VHSIC program. Military objectives envisaged include automatic monitoring of displays in tactical aircraft by means of an artificial intelligence system, a brassboard used in airborne electronic warfare system, and antisubmarine warfare applications. After a fivefold improvement in performance achieved in the first phase, the second phase is concerned with a further 20-fold increase. The entire VHSIC program is, therefore, to produce a 100-fold gain over the state of the art found when the program started.

  10. 78 FR 38724 - Privacy Act of 1974; Computer Matching Program

    Science.gov (United States)

    2013-06-27

    ... 1974; Computer Matching Program AGENCY: Department of Homeland Security/U.S. Citizenship and... Agreement that establishes a computer matching program between the Department of Homeland Security/U.S... and Privacy Protection Act of 1988 (Pub. L. 100-503) and the Computer Matching and Privacy Protection...

  11. 78 FR 15731 - Privacy Act of 1974; Computer Matching Program

    Science.gov (United States)

    2013-03-12

    ... DEPARTMENT OF HOMELAND SECURITY Office of the Secretary [Docket No. DHS-2013-0011] Privacy Act of 1974; Computer Matching Program AGENCY: Department of Homeland Security/U.S. Citizenship and... amended by the Computer Matching and Privacy Protection Act of 1988 (Pub. L. 100-503) and the Computer...

  12. 78 FR 1275 - Privacy Act of 1974; Computer Matching Program

    Science.gov (United States)

    2013-01-08

    ... Social Security Administration (Computer Matching Agreement 1071). SUMMARY: In accordance with the Privacy Act of 1974 (5 U.S.C. 552a), as amended by the Computer Matching and Privacy Protection Act of... of its new computer matching program with the Social Security Administration (SSA). DATES: OPM will...

  13. A Game-Theoretic Taxonomy and Survey of Defensive Deception for Cybersecurity and Privacy

    OpenAIRE

    Pawlick, Jeffrey; Colbert, Edward; Zhu, Quanyan

    2017-01-01

    Cyber attacks on both databases and critical infrastructure have threatened public and private sectors. Meanwhile, ubiquitous tracking and wearable computing have infringed upon privacy. Advocates and engineers have recently proposed using defensive deception as a means to leverage the information asymmetry typically enjoyed by attackers as a tool for defenders. The term deception, however, has been employed broadly and with a variety of meanings. In this paper, we survey 24 articles from 200...

  14. Defense Transuranic Waste Program Strategy Document

    International Nuclear Information System (INIS)

    1984-01-01

    The Defense Transuranic Waste Program (DTWP) Strategy Document presents the general strategy for managing transuranic (TRU) waste materials generated during defense and research activities regulated by the US Department of Energy. The Strategy Document includes discussion of objectives and activities relating to the entire Defense Transuranic Waste Program. However, the primary focus is on the specific management responsibilities of the Transuranic Waste Lead Organization (TLO). The document also includes an updated summary of progress on TLO-managed activities over the past year

  15. Defense Programs and Budget Risk

    National Research Council Canada - National Science Library

    Troutman, Mark D

    2006-01-01

    .... Therefore the Defense Department has set before itself a requirement to modernize a large conventional force structure engaged in ongoing combat operations while simultaneously developing deeper...

  16. 32 CFR 806b.30 - Evaluating information systems for Privacy Act compliance.

    Science.gov (United States)

    2010-07-01

    ... privacy issues are unchanged. (d) The depth and content of the Privacy Impact Assessment should be... 32 National Defense 6 2010-07-01 2010-07-01 false Evaluating information systems for Privacy Act... FORCE ADMINISTRATION PRIVACY ACT PROGRAM Privacy Impact Assessments § 806b.30 Evaluating information...

  17. Defense Meteorological Satellite Program (DMSP) Film

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — The United States Air Force Defense Meteorological Satellite Program (DMSP) Operational Linescan System (OLS) is a polar orbiting meteorological sensor with two...

  18. 78 FR 15734 - Privacy Act of 1974; Computer Matching Program

    Science.gov (United States)

    2013-03-12

    ... 1974; Computer Matching Program AGENCY: Department of Homeland Security/U.S. Citizenship and... computer matching program between the Department of Homeland Security/U.S. Citizenship and Immigration... Protection Act of 1988 (Pub. L. 100-503) and the Computer Matching and Privacy Protection Amendments of 1990...

  19. 78 FR 15733 - Privacy Act of 1974; Computer Matching Program

    Science.gov (United States)

    2013-03-12

    ... 1974; Computer Matching Program AGENCY: Department of Homeland Security/U.S. Citizenship and... computer matching program between the Department of Homeland Security/U.S. Citizenship and Immigration... Protection Act of 1988 (Pub. L. 100-503) and the Computer Matching and Privacy Protection Amendments of 1990...

  20. Review of defense display research programs

    Science.gov (United States)

    Tulis, Robert W.; Hopper, Darrel G.; Morton, David C.; Shashidhar, Ranganathan

    2001-09-01

    Display research has comprised a substantial portion of the defense investment in new technology for national security for the past 13 years. These investments have been made by the separate service departments and, especially, via several Defense Research Projects Agency (DARPA) programs, known collectively as the High Definition Systems (HDS) Program (which ended in 2001) and via the Office of the Secretary of Defense (OSD) Defense Production Act (DPA) Title III Program (efforts ended in 2000). Using input from the Army, Navy, and Air Force to focus research and identify insertion opportunities, DARPA and the Title III Program Office have made investments to develop the national technology base and manufacturing infrastructure necessary to meet the twin challenge of providing affordable displays in current systems and enabling the DoD strategy of winning future conflicts by getting more information to all participants during the battle. These completed DARPA and DPA research and infrastructure programs are reviewed. Service investments have been and are being made to transition display technology; examples are described. Display science and technology (S&T) visions are documented for each service to assist the identification of areas meriting consideration for future defense research.

  1. Defense Finance and Accounting Service Commercial Activities Program

    National Research Council Canada - National Science Library

    1999-01-01

    .... This report evaluated the Defense Finance and Accounting Service competitive sourcing process and reviewed the adequacy of the Defense Finance and Accounting Service management control program...

  2. 77 FR 75499 - Privacy Act of 1974: Computer Matching Program

    Science.gov (United States)

    2012-12-20

    ... DEPARTMENT OF VETERANS AFFAIRS Privacy Act of 1974: Computer Matching Program AGENCY: Department...: This match will commence on or about January 22, 2013 or 40 days after the Office of Management and... of 18 months after the commencing date, the Departments may renew the agreement for another 12 months...

  3. Analysis of Defense Industry Consolidation Effects on Program Acquisition Costs

    National Research Council Canada - National Science Library

    Hoff, Russell V

    2007-01-01

    .... This thesis examines whether cost changes are evident following consolidation within the defense industry by conducting a regression analysis of Major Defense Acquisition Programs across 13 broad defense market sectors...

  4. Defense Coastal/Estuarine Research Program (DCERP)

    Science.gov (United States)

    2007-09-19

    activities, splash points and Landing Craft Air Cushion (LCAC) operations) and non-military Base activities (e.g., sewage treatment , storm water runoff and...We will measure the metabolism of benthic microalgae, the water column, eelgrass, and any dominant macroalgae by developing series of photosynthesis...activities (storm water control and sewage treatment ). Defense Coastal/Estuarine Research Program (DCERP) Research Plan DCERP Research Plan 32 September 19

  5. 78 FR 18932 - Public Meeting: Unmanned Aircraft Systems Test Site Program; Privacy Approach

    Science.gov (United States)

    2013-03-28

    ... discussion about which privacy issues are raised by UAS operations and how law, public policy, and the...-0061] Public Meeting: Unmanned Aircraft Systems Test Site Program; Privacy Approach AGENCY: Federal... a public engagement session on Wednesday, April 3, 2013, on the proposed privacy policy approach for...

  6. 32 CFR 701.109 - Privacy Act (PA) appeals.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 5 2010-07-01 2010-07-01 false Privacy Act (PA) appeals. 701.109 Section 701... OF THE NAVY DOCUMENTS AFFECTING THE PUBLIC DON Privacy Program § 701.109 Privacy Act (PA) appeals. (a... commence when the appeal reaches the office of the review authority having jurisdiction over the record...

  7. 32 CFR 505.3 - Privacy Act systems of records.

    Science.gov (United States)

    2010-07-01

    ... anticipated threats or hazards to the security or integrity of data, which could result in substantial harm... 32 National Defense 3 2010-07-01 2010-07-01 true Privacy Act systems of records. 505.3 Section 505... AND PUBLIC RELATIONS ARMY PRIVACY ACT PROGRAM § 505.3 Privacy Act systems of records. (a) Systems of...

  8. 32 CFR 701.119 - Privacy and the web.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 5 2010-07-01 2010-07-01 false Privacy and the web. 701.119 Section 701.119... THE NAVY DOCUMENTS AFFECTING THE PUBLIC DON Privacy Program § 701.119 Privacy and the web. DON activities shall consult SECNAVINST 5720.47B for guidance on what may be posted on a Navy Web site. ...

  9. 78 FR 41918 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2013-07-12

    ... Finance and Accounting Service, Freedom of Information/Privacy Act Program Manager, Corporate.... SUMMARY: The Defense Finance and Accounting Service proposes to alter a system of records, T7905, entitled...: Mr. Gregory L. Outlaw, Defense Finance and Accounting Service, Freedom of Information/Privacy Act...

  10. Rock mechanics contributions from defense programs

    International Nuclear Information System (INIS)

    Heuze, F.E.

    1992-02-01

    An attempt is made at illustrating the many contributions to rock mechanics from US defense programs, over the past 30-plus years. Large advances have been achieved in the technology-base area covering instrumentation, material properties, physical modeling, constitutive relations and numerical simulations. In the applications field, much progress has been made in understanding and being able to predict rock mass behavior related to underground explosions, cratering, projectile penetration, and defense nuclear waste storage. All these activities stand on their own merit as benefits to national security. But their impact is even broader, because they have found widespread applications in the non-defense sector; to name a few: the prediction of the response of underground structures to major earthquakes, the physics of the earth's interior at great depths, instrumentation for monitoring mine blasting, thermo-mechanical instrumentation useful for civilian nuclear waste repositories, dynamic properties of earthquake faults, and transient large-strain numerical modeling of geological processes, such as diapirism. There is not pretense that this summary is exhaustive. It is meant to highlight success stories representative of DOE and DOD geotechnical activities, and to point to remaining challenges

  11. Second Line of Defense Spares Program Assessment

    Energy Technology Data Exchange (ETDEWEB)

    Henderson, Dale L.; Muller, George; Mercier, Theresa M.; Brigantic, Robert T.; Perkins, Casey J.; Cooley, Scott K.

    2012-11-20

    The Office of the Second Line of Defense (SLD) is part of the Department of Energy‘s (DOE) National Nuclear Security Administration (NNSA). The SLD Program accomplishes its critical global security mission by forming cooperative relationships with partner countries to install passive radiation detection systems that augment traditional inspection and law enforcement measures by alerting border officials to the presence of special nuclear or other radiological materials in cross-border traffic. An important tenet of the program is to work collaboratively with these countries to establish the necessary processes, procedures, infrastructure and conditions that will enable them to fully assume the financial and technical responsibilities for operating the equipment. As the number of operational deployments grows, the SLD Program faces an increasingly complex logistics process to promote the timely and efficient supply of spare parts.

  12. Second Line of Defense Spares Program

    Energy Technology Data Exchange (ETDEWEB)

    Henderson, Dale L.; Holmes, Aimee E.; Muller, George; Mercier, Theresa M.; Brigantic, Robert T.; Perkins, Casey J.; Cooley, Scott K.; Thorsen, Darlene E.

    2012-11-20

    During Fiscal Year 2012, a team from the Pacific Northwest National Laboratory (PNNL) conducted an assessment and analysis of the Second Line of Defense (SLD) Sustainability spare parts program. Spare parts management touches many aspects of the SLD Sustainability Program including contracting and integration of Local Maintenance Providers (LMP), equipment vendors, analyses and metrics on program performance, system state of health, and maintenance practices. Standardized spares management will provide better data for decisions during site transition phase and will facilitate transition to host country sustainability ownership. The effort was coordinated with related SLD Sustainability Program initiatives, including a configuration items baselining initiative, a metrics initiative, and a maintenance initiative. The spares study has also led to pilot programs for sourcing alternatives that include regional intermediate inventories and partnering agreements that leverage existing supply chains. Many partners from the SLD Sustainability program contributed to and were consulted in the course of the study. This document provides a description of the findings, recommendations, and implemented solutions that have resulted from the study.

  13. 78 FR 25853 - Defense Logistics Agency Privacy Program

    Science.gov (United States)

    2013-05-03

    ... 5 U.S.C. 552a(c)(3) and (d), when access to accounting disclosures and access to or amendment of...: (i) From subsection (c)(3), as to grant access to an accounting of disclosures as required by the... U.S.C. 552a(c)(3), because to grant access to the accounting for each disclosure as required by the...

  14. 77 FR 46653 - Defense Logistics Agency Privacy Program

    Science.gov (United States)

    2012-08-06

    ... information permits more informed decision-making by the Department when making required suitability.... 552a(k)(2) and (k)(5). (4) Reasons: (i) From 5 U.S.C. 552a(c)(3), as granting access to the accounting... witnesses or making witnesses reluctant to cooperate; and lead to suppression, alteration, or destruction of...

  15. 76 FR 11435 - Privacy Act of 1974; Computer Matching Program

    Science.gov (United States)

    2011-03-02

    ... Security Administration. SUMMARY: Pursuant to the Computer Matching and Privacy Protection Act of 1988, Public Law 100-503, the Computer Matching and Privacy Protections Amendments of 1990, Pub. L. 101-508... Interpreting the Provisions of Public Law 100-503, the Computer Matching and Privacy Protection Act of 1988...

  16. Federal Aviation Administration's behavioral research program for defense against hijackings.

    Science.gov (United States)

    Dailey, J T; Pickrel, E W

    1975-04-01

    Behavioral research has been significant contributions to the government's successful program for defense against hijackers. Today's boarding gate defenses have a leading role in that program, but they were rejected until creation of the behavioral profile made selective search feasible. Metal detectors now make search of all travelers practical but with increasing involvement of boarding gate employees, so a behavioral program is used to monitor their performance. Experience shows that some persons have penetrated boarding gate defenses, so another requirement was in-flight defenses. Flightpersonnel had defeated some past hijackers, so a behavioral analysis of past hijackings was used to identify tactics for in-flight defense. These were incorporated into training programs and distributed to all U.S. airlines, many government organizations, and foreign carriers. Research continues for updating these and developing new courses for special needs, such as defense against gangs.

  17. DOE Defense Program (DP) safety programs. Final report, Task 003

    International Nuclear Information System (INIS)

    1998-01-01

    The overall objective of the work on Task 003 of Subcontract 9-X52-W7423-1 was to provide LANL with support to the DOE Defense Program (DP) Safety Programs. The effort included the identification of appropriate safety requirements, the refinement of a DP-specific Safety Analysis Report (SAR) Format and Content Guide (FCG) and Comprehensive Review Plan (CRP), incorporation of graded approach instructions into the guidance, and the development of a safety analysis methodologies document. All tasks which were assigned under this Task Order were completed. Descriptions of the objectives of each task and effort performed to complete each objective is provided here

  18. Defense transuranic waste program strategy document

    International Nuclear Information System (INIS)

    1982-07-01

    This document summarizes the strategy for managing transuranic (TRU) wastes generated in defense and research activities regulated by the US Department of Energy. It supercedes a document issued in July 1980. In addition to showing how current strategies of the Defense Transuranic Waste Program (DTWP) are consistent with the national objective of isolating radioactive wastes from the biosphere, this document includes information about the activities of the Transuranic Lead Organization (TLO). To explain how the DTWP strategy is implemented, this document also discusses how the TLO coordinates and integrates the six separate elements of the DTWP: (1) Waste Generation Site Activities, (2) Storage Site Activities, (3) Burial Site Activities, (4) Technology Development, (5) Transportation Development, and (6) Permanent Disposal. Storage practices for TRU wastes do not pose short-term hazards to public health and safety or to the environment. Isolation of TRU wastes in a deep-mined geologic repository is considered the most promising of the waste disposal alternatives available. This assessment is supported by the DOE Record of Decision to proceed with research and development work at the Waste Isolation Pilot Plant (WIPP) in southeastern New Mexico - a deep-mined geologic research and development project. In support of the WIPP research project and the permanent disposal of TRU waste, the DTWP strategy for the near term will concentrate on completion of procedures and the design and construction of all facilities necessary to certify newly-generated (NG) and stored TRU wastes for emplacement in the WIPP. In addition, the strategy involves evaluating alternatives for disposing of some transuranic wastes by methods which may allow for on-site disposal of these wastes and yet preserve adequate margins of safety to protect public health and the environment

  19. Spying on the Smart Home: Privacy Attacks and Defenses on Encrypted IoT Traffic

    OpenAIRE

    Apthorpe, Noah; Reisman, Dillon; Sundaresan, Srikanth; Narayanan, Arvind; Feamster, Nick

    2017-01-01

    The growing market for smart home IoT devices promises new conveniences for consumers while presenting new challenges for preserving privacy within the home. Many smart home devices have always-on sensors that capture users' offline activities in their living spaces and transmit information about these activities on the Internet. In this paper, we demonstrate that an ISP or other network observer can infer privacy sensitive in-home activities by analyzing Internet traffic from smart homes con...

  20. Study of the Department of Defense Student Testing Program

    National Research Council Canada - National Science Library

    Davidson, Lance G

    2005-01-01

    ...) Career Exploration Program (CEP) and its contributions to Navy recruiting. The ASVAB-CEP is a Department of Defense program created in 1968, operating in 12,598 high schools throughout the nation as of 2004...

  1. 77 FR 13388 - Treasury Inspector General for Tax Administration; Privacy Act of 1974: Computer Matching Program

    Science.gov (United States)

    2012-03-06

    ... DEPARTMENT OF THE TREASURY Treasury Inspector General for Tax Administration; Privacy Act of 1974...: Notice. SUMMARY: Pursuant to 5 U.S.C. 552a, the Privacy Act of 1974, as amended, notice is hereby given... Administration. Beginning and Completion Dates: This program of computer matches is expected to commence on March...

  2. 77 FR 43639 - Privacy Act of 1974, as Amended; Computer Matching Program (Social Security Administration (SSA...

    Science.gov (United States)

    2012-07-25

    ... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA 2011-0090] Privacy Act of 1974, as Amended; Computer Matching Program (Social Security Administration (SSA)/Department of Veterans Affairs (VA.... SUPPLEMENTARY INFORMATION: A. General The Computer Matching and Privacy Protection Act of 1988 (Pub. L. 100-503...

  3. 77 FR 54943 - Privacy Act of 1974, as Amended; Computer Matching Program (Social Security Administration (SSA...

    Science.gov (United States)

    2012-09-06

    ... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA 2012-0016] Privacy Act of 1974, as Amended; Computer Matching Program (Social Security Administration (SSA)/Department of Veterans Affairs (VA.... SUPPLEMENTARY INFORMATION: A. General The Computer Matching and Privacy Protection Act of 1988 (Pub. L. 100-503...

  4. 75 FR 5166 - Privacy Act of 1974, as Amended; Computer Matching Program (Social Security Administration...

    Science.gov (United States)

    2010-02-01

    ... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA 2009-0043] Privacy Act of 1974, as Amended; Computer Matching Program (Social Security Administration/Railroad Retirement Board (SSA/RRB))-- Match... INFORMATION: A. General The Computer Matching and Privacy Protection Act of 1988 Public Law (Pub. L.) 100-503...

  5. 76 FR 3098 - Privacy Act of 1974; Systems of Records

    Science.gov (United States)

    2011-01-19

    ... requests and/or records have been referred to the National Security Agency/Central Security Service (NSA..., Department of Defense Privacy Program; NSA/CSS Policy 1-5; NSA/CSS Freedom of Information Act Program; NSA/CSS Policy 1-34; Implementation of the Privacy Act of 1974; NSA/CSS Policy 1-15, Mandatory...

  6. 32 CFR 310.9 - Privacy boards and office, composition and responsibilities.

    Science.gov (United States)

    2010-07-01

    ... involving the DoD Privacy Program, meeting as necessary, to address issues of common concern so as to ensure... privacy issues relating to the Department's collection, maintenance, use, or dissemination of personal... 32 National Defense 2 2010-07-01 2010-07-01 false Privacy boards and office, composition and...

  7. Defense programs beryllium good practice guide

    International Nuclear Information System (INIS)

    Herr, M.

    1997-07-01

    Within the DOE, it has recently become apparent that some contractor employees who have worked (or are currently working) with and around beryllium have developed chronic beryllium disease (CBD), an occupational granulomatous lung disorder. Respiratory exposure to aerosolized beryllium, in susceptible individuals, causes an immunological reaction that can result in granulomatous scarring of the lung parenchyma, shortness of breath, cough, fatigue, weight loss, and, ultimately, respiratory failure. Beryllium disease was originally identified in the 1940s, largely in the fluorescent light industry. In 1950, the Atomic Energy Commission (AEC) introduced strict exposure standards that generally curtailed both the acute and chronic forms of the disease. Beginning in 1984, with the identification of a CBD case in a DOE contractor worker, there was increased scrutiny of both industrial hygiene practices and individuals in this workforce. To date, over 100 additional cases of beryllium-specific sensitization and/or CBD have been identified. Thus, a disease previously thought to be largely eliminated by the adoption of permissible exposure standards 45 years ago is still a health risk in certain workforces. This good practice guide forms the basis of an acceptable program for controlling workplace exposure to beryllium. It provides (1) Guidance for minimizing worker exposure to beryllium in Defense Programs facilities during all phases of beryllium-related work, including the decontamination and decommissioning (D ampersand D) of facilities. (2) Recommended controls to be applied to the handling of metallic beryllium and beryllium alloys, beryllium oxide, and other beryllium compounds. (3) Recommendations for medical monitoring and surveillance of workers exposed (or potentially exposed) to beryllium, based on the best current understanding of beryllium disease and medical diagnostic tests available. (4) Site-specific safety procedures for all processes of beryllium that is

  8. 78 FR 41916 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2013-07-12

    ... Defense Finance and Accounting Service, Freedom of Information/Privacy Act Program Manager, Corporate...; System of Records AGENCY: Defense Finance and Accounting Service, DoD. ACTION: Notice to alter a System of Records. SUMMARY: The Defense Finance and Accounting Service proposes to alter a system of records...

  9. 77 FR 69444 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2012-11-19

    ..., Defense Finance and Accounting Service, Freedom of Information/Privacy Act Program Manager, Corporate...; System of Records AGENCY: Defense Finance and Accounting Service, DoD. ACTION: Notice to amend a system of records. SUMMARY: The Defense Finance and Accounting Service is amending a system of records...

  10. Defense programs beryllium good practice guide

    Energy Technology Data Exchange (ETDEWEB)

    Herr, M.

    1997-07-01

    Within the DOE, it has recently become apparent that some contractor employees who have worked (or are currently working) with and around beryllium have developed chronic beryllium disease (CBD), an occupational granulomatous lung disorder. Respiratory exposure to aerosolized beryllium, in susceptible individuals, causes an immunological reaction that can result in granulomatous scarring of the lung parenchyma, shortness of breath, cough, fatigue, weight loss, and, ultimately, respiratory failure. Beryllium disease was originally identified in the 1940s, largely in the fluorescent light industry. In 1950, the Atomic Energy Commission (AEC) introduced strict exposure standards that generally curtailed both the acute and chronic forms of the disease. Beginning in 1984, with the identification of a CBD case in a DOE contractor worker, there was increased scrutiny of both industrial hygiene practices and individuals in this workforce. To date, over 100 additional cases of beryllium-specific sensitization and/or CBD have been identified. Thus, a disease previously thought to be largely eliminated by the adoption of permissible exposure standards 45 years ago is still a health risk in certain workforces. This good practice guide forms the basis of an acceptable program for controlling workplace exposure to beryllium. It provides (1) Guidance for minimizing worker exposure to beryllium in Defense Programs facilities during all phases of beryllium-related work, including the decontamination and decommissioning (D&D) of facilities. (2) Recommended controls to be applied to the handling of metallic beryllium and beryllium alloys, beryllium oxide, and other beryllium compounds. (3) Recommendations for medical monitoring and surveillance of workers exposed (or potentially exposed) to beryllium, based on the best current understanding of beryllium disease and medical diagnostic tests available. (4) Site-specific safety procedures for all processes of beryllium that is likely to

  11. Major Management Challenges and Program Risks Department of Defense

    National Research Council Canada - National Science Library

    1999-01-01

    .... The report also addresses corrective actions that DOD has taken or initiated on these issues- including DOD'S blueprint for a strategy-based, balanced, and affordable defense program as outlined...

  12. Defense Meteorological Satellite Program (DMSP) - Space Weather Sensors

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — The Defense Meteorological Satellite Program (DMSP) maintains a constellation of sun-synchronous, near-polar orbiting satellites. The orbital period is 101 minutes...

  13. 75 FR 7648 - Privacy Act of 1974, as Amended; Computer Matching Program (SSA/Department of Veterans Affairs...

    Science.gov (United States)

    2010-02-22

    ... Computer Matching and Privacy Protection Act of 1988 (Public Law (Pub. L.) 100-503), amended the Privacy... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA 2010-0006] Privacy Act of 1974, as Amended; Computer Matching Program (SSA/ Department of Veterans Affairs/Veterans Benefits Administration (VA/ VBA...

  14. 76 FR 71417 - Privacy Act of 1974, as Amended; Computer Matching Program (SSA/Law Enforcement Agencies (LEA...

    Science.gov (United States)

    2011-11-17

    ...; Computer Matching Program (SSA/ Law Enforcement Agencies (LEA)) Match Number 5001 AGENCY: Social Security... protections for such persons. The Privacy Act, as amended, regulates the use of computer matching by Federal... accordance with the Privacy Act of 1974, as amended by the Computer Matching and Privacy Protection Act of...

  15. Department of Energy Defense Programs Environmental Restoration Program update

    International Nuclear Information System (INIS)

    Lehr, J.C.; Eyman, L.D.; Thompson, W.W. Jr.

    1989-01-01

    Federal facilities are under increasing pressure to remediate inactive hazardous waste sites and associated off-site areas. The Superfund Amendments and Reauthorization Act federal facilities provision requires that the Environmental Protection Agency establish a public docket to list all federal sites contaminated by hazardous wastes or substances and to monitor the progress of investigations and cleanups against an established schedule. In addition, the Resource Conservation and Recovery Act requires that operating permits for hazardous waste treatment, storage, and disposal facilities be issued only upon binding agreements that identify specific schedules for corrective action for all hazardous waste releases that have or are occurring at the facility. Defense Programs (DP) must make remedial actions integral to its mission. Environmental cleanups are given increased emphasis with the new regulations/laws providing the right to private citizens and the states to sue to enforce these statutes and schedule commitments. 1 fig., 2 tabs

  16. 32 CFR 806b.51 - Privacy and the Web.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 6 2010-07-01 2010-07-01 false Privacy and the Web. 806b.51 Section 806b.51... PROGRAM Disclosing Records to Third Parties § 806b.51 Privacy and the Web. Do not post personal information on publicly accessible DoD web sites unless clearly authorized by law and implementing regulation...

  17. Department of Defense high power laser program guidance

    Science.gov (United States)

    Muller, Clifford H.

    1994-06-01

    The DoD investment of nominally $200 million per year is focused on four high power laser (HPL) concepts: Space-Based Laser (SBL), a Ballistic Missile Defense Organization effort that addresses boost-phase intercept for Theater Missile Defense and National Missile Defense; Airborne Laser (ABL), an Air Force effort that addresses boost-phase intercept for Theater Missile Defense; Ground-Based Laser (GBL), an Air Force effort addressing space control; and Anti-Ship Missile Defense (ASMD), a Navy effort addressing ship-based defense. Each organization is also supporting technology development with the goal of achieving less expensive, brighter, and lighter high power laser systems. These activities represent the building blocks of the DoD program to exploit the compelling characteristics of the high power laser. Even though DoD's HPL program are focused and moderately strong, additional emphasis in a few technical areas could help reduce risk in these programs. In addition, a number of options are available for continuing to use the High-Energy Laser System Test Facility (HELSTF) at White Sands Missile Range. This report provides a brief overview and guidance for the five efforts which comprise the DoD HPL program (SBL, ABL, GBL, ASMD, HELSTF).

  18. Assessment of Accelerated Acquisition of Defense Programs

    Science.gov (United States)

    2016-09-01

    Quadrennial Defense Review explicitly called for doubling production rates of ISR UAVs, including Global Hawk. By 2009, Global Hawks had logged over 25,000...Honeywell (Formerly AlliedSignal) turboprop engine, compared to the Predator’s 115 hp (86 kW) piston engine. The power increase allows the Reaper...on basic requirements subsequently translated into costs at least double initial estimates and years of schedule slippage. In other words a classic

  19. 78 FR 52117 - DoD Privacy Program

    Science.gov (United States)

    2013-08-22

    ... how the action will meet that need. An individual's privacy is a fundamental legal right that must be... and place of birth, mother's maiden name, biometric records, home phone numbers, other demographic... a photograph. (y) Risk assessment. An analysis considering information sensitivity, vulnerabilities...

  20. Future Years Defense Program (FYDP) Structure

    Science.gov (United States)

    2004-04-01

    computer miniframe . Intelligence Telecommunications Page E-330 of 1748DoD 7045.7-H, March, 2004 03 Command, Control, Comm, Intel, & SpaceProgram...communications programs, i.e., STARCOM, NAVCOM, and AIRCOM. Costs of equipment - computer miniframes , peripheral devices, communications processors...the general service communications programs, i.e., STARCOM, NAVCOM, and AIRCOM. Costs of equipment - computer miniframes , peripheral devices

  1. Overview: Defense high-level waste technology program

    International Nuclear Information System (INIS)

    Shupe, M.W.; Turner, D.A.

    1987-01-01

    Defense high-level waste generated by atomic energy defense activities is stored on an interim basis at three U.S. Department of Energy (DOE) operating locations; the Savannah River Plant in South Carolina, the Hanford Site in Washington, and the Idaho National Engineering Laboratory in Idaho. Responsibility for the permanent disposal of this waste resides with DOE's Office of Defense Waste and Transportation Management. The objective of the Defense High-Level Wast Technology Program is to develop the technology for ending interim storage and achieving permanent disposal of all U.S. defense high-level waste. New and readily retrievable high-level waste are immobilized for disposal in a geologic repository. Other high-level waste will be stabilized in-place if, after completion of the National Environmental Policy Act (NEPA) process, it is determined, on a site-specific basis, that this option is safe, cost effective and environmentally sound. The immediate program focus is on implementing the waste disposal strategy selected in compliance with the NEPA process at Savannah River, while continuing progress toward development of final waste disposal strategies at Hanford and Idaho. This paper presents an overview of the technology development program which supports these waste management activities and an assessment of the impact that recent and anticipated legal and institutional developments are expected to have on the program

  2. Civil Defense, U. S. A.: A Programmed Orientation to Civil Defense. Unit 4. Warning, Emergency Operations, and Support Programs.

    Science.gov (United States)

    Defense Civil Preparedness Agency (DOD), Battle Creek, MI.

    The need for, and a description of, emergency functions required to save lives and protect property in nuclear or natural disasters are presented. Topics discussed include: (1) The Civil Defense Warning System, (2) Introduction to the Emergency Operations Program, (3) Five subprograms of the Emergency Operations Program, (4) Emergency Operations…

  3. Defense Acquisitions: Assessments of Selected Weapon Programs

    Science.gov (United States)

    2017-03-01

    Figure 17: Examples of Knowledge Scorecards 61 Page vi GAO-17-333SP Assessments of Selected Weapon Programs...programs. Page 61 GAO-17-333SP Assessments of Selected Weapon Programs Figure 17: Examples of Knowledge Scorecards Pursuant to a...had direct access to the USD AT&L and other senior acquisition officials, and some approval authorities were delegated to lower levels. For example

  4. 77 FR 62469 - Defense Logistics Agency Freedom of Information Act Program

    Science.gov (United States)

    2012-10-15

    ... DEPARTMENT OF DEFENSE Office of the Secretary 32 CFR Part 300 Defense Logistics Agency 32 CFR Part 1285 RIN 0790-AI87 [Docket ID: DOD-2012-OS-0019] Defense Logistics Agency Freedom of Information Act Program AGENCY: Defense Logistics Agency, DoD. ACTION: Proposed rule. SUMMARY: The Defense Logistics...

  5. 76 FR 50460 - Privacy Act of 1974; Notice of a Computer Matching Program

    Science.gov (United States)

    2011-08-15

    ... records will be disclosed for the purpose of this computer match are as follows: OPM will use the system... entitled to health care under TRS and TRR.'' E. Description of Computer Matching Program: Under the terms...; Notice of a Computer Matching Program AGENCY: Defense Manpower Data Center, Department of Defense (DoD...

  6. Defense Leadership and Management Program (DLAMP)

    National Research Council Canada - National Science Library

    Ramp, S

    1997-01-01

    This Directive, under Chapters 23, 33, 41, and 71 of title 5, United States Code, establishes policy and assigns responsibilities for a program of civilian leader training, education, and development...

  7. Defense Nanotechnology Research and Development Program

    National Research Council Canada - National Science Library

    2007-01-01

    ...), Army Research Office (ARO) and the Air Force Office of Scientific Research (AFOSR)initiated numerous research and development programs focusing on advancing science and technology below one micron in size...

  8. Improving Defense Health Program Medical Research Processes

    Science.gov (United States)

    2017-08-08

    research , including a Business Cell; 87 Research Development, 88 Research Oversight, 89 and Research Compliance offices;90 and the Center...needed for DHP medical research , such as the Army’s Clinical and Translational Research Program Office, 38 the Navy’s Research Methods Training Program... research stated, “key infrastructure for a learning health system will encompass three core elements: data networks, methods , and workforce.” 221

  9. 77 FR 3455 - Privacy Act of 1974; System of Records-Migrant Education Bypass Program Student Database

    Science.gov (United States)

    2012-01-24

    ... DEPARTMENT OF EDUCATION Privacy Act of 1974; System of Records--Migrant Education Bypass Program... (Privacy Act), the Department of Education (Department) publishes this notice of a new system of records... called a ``system of records.'' The Migrant Education Program (MEP) is authorized under Title I, Part C...

  10. 78 FR 3474 - Privacy Act of 1974; Computer Matching Program Between the Office Of Personnel Management and...

    Science.gov (United States)

    2013-01-16

    ... amended by the Computer Matching and Privacy Protection Act of 1988 (Pub. L. 100-503), Office of... Security benefit information to OPM via direct computer link for the administration of certain programs by... OFFICE OF PERSONNEL MANAGEMENT Privacy Act of 1974; Computer Matching Program Between the Office...

  11. 75 FR 53004 - Privacy Act of 1974, as Amended; Notice of Computer-Matching Program (Railroad Retirement Board...

    Science.gov (United States)

    2010-08-30

    ... report of this computer-matching program with the Committee on Homeland Security and Governmental Affairs... INFORMATION: A. General The Computer-Matching and Privacy Protection Act of 1988, (Pub. L. 100-503), amended... RAILROAD RETIREMENT BOARD Privacy Act of 1974, as Amended; Notice of Computer-Matching Program...

  12. 78 FR 34678 - Privacy Act of 1974, as Amended; Notice of Computer Matching Program (Railroad Retirement Board...

    Science.gov (United States)

    2013-06-10

    ... notice of its renewal of an ongoing computer-matching program with the Social Security Administration... computer-matching program with the Committee on Homeland Security and Governmental Affairs of the Senate... Computer Matching and Privacy Protection Act of 1988, (Pub. L. 100-503), amended by the Privacy Act of 1974...

  13. 78 FR 70971 - Privacy Act of 1974, as Amended; Notice of Computer Matching Program (Railroad Retirement Board...

    Science.gov (United States)

    2013-11-27

    ... will file a report of this computer-matching program with the Committee on Homeland Security and... . SUPPLEMENTARY INFORMATION: A. General The Computer Matching and Privacy Protection Act of 1988, (Pub. L. 100-503... RAILROAD RETIREMENT BOARD Privacy Act of 1974, as Amended; Notice of Computer Matching Program...

  14. Developing the strategic plan for pollution prevention in defense programs

    International Nuclear Information System (INIS)

    Marchetti, John A.; Betschart, James F.; Suffern, J. Samuel

    1992-01-01

    In order to provide effective leadership and to ensure a consistent pollution prevention effort in all of its production facilities and laboratories, Defense Programs (DP) Headquarters, in close cooperation with the Field, has developed a strategic plan for its Pollution Prevention Program. The strategic plan is built upon the history of waste minimization, waste reduction, and pollution prevention activity to date, and articulates both long- and short-term strategies to ensure program initiation, growth, and stability. The organization of the program, including Headquarters staffing and linkages to the Geld, is described. Life-cycle analysis of program barriers and bottlenecks, along with associated initiatives and action plans are discussed. (author)

  15. Defense Acquisitions: Assessments of Selected Weapon Programs

    Science.gov (United States)

    2015-03-01

    is designed to detect, acquire, intercept , and destroy a range of airborne threats. Block II includes hardware and software upgrades intended to... moisture intrusion and degraded performance. Additionally, the program has made changes to the Global Positioning System (GPS) receivers, due to a...preliminary design review in fiscal year 2017. An Independent Review Team identified three critical technologies, advanced inlet particle separator

  16. 78 FR 5784 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2013-01-28

    ... records. SUMMARY: The Defense Finance and Accounting Service proposes to alter a system of records in its.... FOR FURTHER INFORMATION CONTACT: Mr. Gregory Outlaw, Defense Finance and Accounting Service, Freedom of Information/Privacy Act Program Manager, Corporate Communications, DFAS-HKC/IN, 8899 E. 56th...

  17. 78 FR 37799 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2013-06-24

    ... Finance and Accounting Service, Freedom of Information/Privacy Act Program Manager, Corporate...; System of Records AGENCY: Defense Finance and Accounting Service, DoD. ACTION: Notice to amend a System of Records. SUMMARY: The Defense Finance and Accounting Service is amending a system of records...

  18. 78 FR 14280 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2013-03-05

    ... Records. SUMMARY: The Defense Finance and Accounting Service proposes to alter a system of records notice... information. FOR FURTHER INFORMATION CONTACT: Mr. Gregory L. Outlaw, Defense Finance and Accounting Service, Freedom of Information/Privacy Act Program Manager, Corporate Communications, DFAS-HKC/IN, 8899 E. 56th...

  19. 78 FR 41919 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2013-07-12

    .... SUMMARY: The Defense Finance and Accounting Service proposes to alter a system of records, T7340c... identifiers or contact information. FOR FURTHER INFORMATION CONTACT: Mr. Gregory L. Outlaw, Defense Finance and Accounting Service, Freedom of Information/Privacy Act Program Manager, Corporate Communications...

  20. 77 FR 58106 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2012-09-19

    ... Finance and Accounting Service, Freedom of Information/Privacy Act Program Manager, Corporate...; System of Records AGENCY: Defense Finance and Accounting Service, DoD. ACTION: Notice to amend two Systems of Records. SUMMARY: The Defense Finance and Accounting Service is amending two systems of records...

  1. 78 FR 14281 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2013-03-05

    ... Finance and Accounting Service, Freedom of Information/Privacy Act Program Manager, Corporate... Records. SUMMARY: The Defense Finance and Accounting Service proposes to amend a system of records in its.... FOR FURTHER INFORMATION CONTACT: Mr. Gregory L. Outlaw, Defense Finance and Accounting Service...

  2. 78 FR 14286 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2013-03-05

    ... Records. SUMMARY: The Defense Finance and Accounting Service proposes to amend a system of records in its... information. FOR FURTHER INFORMATION CONTACT: Mr. Gregory L. Outlaw, Defense Finance and Accounting Service, Freedom of Information/Privacy Act Program Manager, Corporate Communications, DFAS-HKC/IN, 8899 E. 56th...

  3. 78 FR 52518 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2013-08-23

    ... Finance and Accounting Service, Freedom of Information/Privacy Act Program Manager, Corporate...; System of Records AGENCY: Defense Finance and Accounting Service, DoD. ACTION: Notice to amend a System of Records. SUMMARY: The Defense Finance and Accounting Service is amending a system of records...

  4. 78 FR 14285 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2013-03-05

    ... Records. SUMMARY: The Defense Finance and Accounting Service proposes to alter a system of records in its.... FOR FURTHER INFORMATION CONTACT: Mr. Gregory L. Outlaw, Defense Finance and Accounting Service, Freedom of Information/Privacy Act Program Manager, Corporate Communications, DFAS-HKC/IN, 8899 E. 56th...

  5. 78 FR 14283 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2013-03-05

    ... Finance and Accounting Service, Freedom of Information/Privacy Act Program Manager, Corporate... a system of records. SUMMARY: The Defense Finance and Accounting Service proposes to alter a system... identifiers or contact information. FOR FURTHER INFORMATION CONTACT: Mr. Gregory L. Outlaw, Defense Finance...

  6. Defense Acquisitions: Assessments of Selected Weapon Programs

    Science.gov (United States)

    2017-03-01

    decision out to the third quarter of fiscal year 2018. In the fiscal year 2017 budget , the Marine Corps funded ACV Increment 1.1 to the level identified...option. The program noted the Air Force will need to make a preliminary decision on an Increment 2 by summer 2017 for budgeting purposes, though the...Armored Multi-Purpose Vehicle (AMPV) 67 Common Infrared Countermeasure (CIRCM) 69 Indirect Fire Protection Capability Increment 2-Intercept Block 1

  7. FY 1972-1976 Defense Program and the 1972 Defense Budget.

    Science.gov (United States)

    1971-03-01

    Thai Government. This assessment was given me by Thai officials during my recent visit there. Insurgents along the Thai/ Malaysian border are under the...Development and Initial Procurement of Maverick Air-to-Ground Missile 31 87 Air Superiority and Air Defense Continued Procurement of F-4 Air Force Fighter... MAVERICK . The MAVERICK is another program that is of importance in providing increased capabilities for support of troops on the battlefield. MAVERICK is

  8. 77 FR 74913 - Privacy Act of 1974, as Amended; Computer Matching Program (Social Security Administration (SSA...

    Science.gov (United States)

    2012-12-18

    ...; Computer Matching Program (Social Security Administration (SSA)/Office of Personnel Management (OPM.... SUPPLEMENTARY INFORMATION: A. General The Computer Matching and Privacy Protection Act of 1988 (Public Law (Pub... computer matching involving the Federal government could be performed and adding certain protections for...

  9. 75 FR 62623 - Privacy Act of 1974, as Amended; Computer Matching Program (SSA/Internal Revenue Service (IRS...

    Science.gov (United States)

    2010-10-12

    ... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA 2010-0015] Privacy Act of 1974, as Amended; Computer Matching Program (SSA/ Internal Revenue Service (IRS))--Match Number 1016 AGENCY: Social Security... regarding protections for such persons. The Privacy Act, as amended, regulates the use of computer matching...

  10. 77 FR 33547 - Privacy Act of 1974, as Amended; Computer Matching Program (SSA/Centers for Medicare and Medicaid...

    Science.gov (United States)

    2012-06-06

    ...: Social Security Administration (SSA). ACTION: Notice of a new computer matching program that will expire... protections for such persons. The Privacy Act, as amended, regulates the use of computer matching by Federal... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA 2012-0015] Privacy Act of 1974, as Amended...

  11. 77 FR 24757 - Privacy Act of 1974, as Amended; Computer Matching Program (SSA/Department of Labor (DOL))-Match...

    Science.gov (United States)

    2012-04-25

    ... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA 2011-0083] Privacy Act of 1974, as Amended; Computer Matching Program (SSA/ Department of Labor (DOL))--Match Number 1015 AGENCY: Social Security... regarding protections for such persons. The Privacy Act, as amended, regulates the use of computer matching...

  12. 77 FR 38880 - Privacy Act of 1974, as Amended; Computer Matching Program (SSA/Railroad Retirement Board (SSA...

    Science.gov (United States)

    2012-06-29

    ... Security Administration (SSA). ACTION: Notice of a renewal of an existing computer matching program that... regarding protections for such persons. The Privacy Act, as amended, regulates the use of computer matching... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA 2012-0002] Privacy Act of 1974, as Amended...

  13. 76 FR 12398 - Privacy Act of 1974, as Amended; Computer Matching Program (SSA/Bureau of the Public Debt (BPD...

    Science.gov (United States)

    2011-03-07

    ... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA 2010-0034] Privacy Act of 1974, as Amended; Computer Matching Program (SSA/ Bureau of the Public Debt (BPD))--Match Number 1304 AGENCY: Social Security... as shown above. SUPPLEMENTARY INFORMATION: A. General The Computer Matching and Privacy Protection...

  14. 75 FR 43579 - Privacy Act of 1974; Computer Matching Program Between the Office of Personnel Management and...

    Science.gov (United States)

    2010-07-26

    ... the Computer Matching and Privacy Protection Act of 1988 (Pub. L. 100-503), Office of Management and... safeguards for disclosure of Social Security benefit information to OPM via direct computer link for the... OFFICE OF PERSONNEL MANAGEMENT Privacy Act of 1974; Computer Matching Program Between the Office...

  15. 78 FR 69925 - Privacy Act of 1974, as Amended; Computer Matching Program (SSA/Bureau of the Fiscal Service...

    Science.gov (United States)

    2013-11-21

    ... regarding protections for such persons. The Privacy Act, as amended, regulates the use of computer matching... savings securities. C. Authority for Conducting the Matching Program This computer matching agreement sets... amended by the Computer Matching and Privacy Protection Act of 1988, as amended, and the regulations and...

  16. 75 FR 9012 - Privacy Act of 1974, as Amended; Computer Matching Program (SSA/U.S. Department of Health and...

    Science.gov (United States)

    2010-02-26

    ... INFORMATION: A. General The Computer Matching and Privacy Protection Act of 1988 (Pub. L. 100-503), amended... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA-2009-0052] Privacy Act of 1974, as Amended; Computer Matching Program (SSA/ U.S. Department of Health and Human Services (HHS), Administration for...

  17. 78 FR 12128 - Privacy Act of 1974; Computer Matching Program (SSA/Department of the Treasury, Internal Revenue...

    Science.gov (United States)

    2013-02-21

    ... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA 2012-0067] Privacy Act of 1974; Computer Matching... Security Administration (SSA). ACTION: Notice of a renewal of an existing computer matching program... INFORMATION: A. General The Computer Matching and Privacy Protection Act of 1988 (Public Law (Pub. L.) 100-503...

  18. 77 FR 6620 - Privacy Act of 1974, as Amended; Computer Matching Program (SSA/the States); Match 6000 and 6003

    Science.gov (United States)

    2012-02-08

    ... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA 2011-0102] Privacy Act of 1974, as Amended; Computer Matching Program (SSA/ the States); Match 6000 and 6003 AGENCY: Social Security Administration..., as shown above. SUPPLEMENTARY INFORMATION: A. General The Computer Matching and Privacy Protection...

  19. 75 FR 68396 - Privacy Act of 1974, as Amended; Computer Matching Program (SSA/Department of Labor (DOL))-Match...

    Science.gov (United States)

    2010-11-05

    ... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA 2010-0052] Privacy Act of 1974, as Amended; Computer Matching Program (SSA/ Department of Labor (DOL))--Match Number 1003 AGENCY: Social Security... as shown above. SUPPLEMENTARY INFORMATION: A. General The Computer Matching and Privacy Protection...

  20. 76 FR 5235 - Privacy Act of 1974, as Amended; Computer Matching Program (SSA Internal Match)-Match Number 1014

    Science.gov (United States)

    2011-01-28

    ...; Computer Matching Program (SSA Internal Match)--Match Number 1014 AGENCY: Social Security Administration... regarding protections for such persons. The Privacy Act, as amended, regulates the use of computer matching....C. 552a, as amended, and the provisions of the Computer Matching and Privacy Protection Act of 1988...

  1. 75 FR 18251 - Privacy Act of 1974, as Amended; Computer Matching Program (SSA/Internal Revenue Service (IRS...

    Science.gov (United States)

    2010-04-09

    ... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA-2009-0066] Privacy Act of 1974, as Amended; Computer Matching Program (SSA/ Internal Revenue Service (IRS))--Match 1305 AGENCY: Social Security... INFORMATION: A. General The Computer Matching and Privacy Protection Act of 1988 (Public Law (Pub. L.) 100-503...

  2. 75 FR 32833 - Privacy Act of 1974, as Amended; Computer Matching Program (SSA/Office of Personnel Management...

    Science.gov (United States)

    2010-06-09

    ... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA-2009-0077] Privacy Act of 1974, as Amended; Computer Matching Program (SSA/ Office of Personnel Management (OPM))--Match 1307 AGENCY: Social Security... INFORMATION: A. General The Computer Matching and Privacy Protection Act of 1988 (Public Law (Pub. L.) 100-503...

  3. 75 FR 59780 - Privacy Act of 1974, as Amended; Computer Matching Program (SSA/Railroad Retirement Board (RRB...

    Science.gov (United States)

    2010-09-28

    ... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA 2010-0040] Privacy Act of 1974, as Amended; Computer Matching Program (SSA/ Railroad Retirement Board (RRB))--Match Number 1006 AGENCY: Social Security...: A. General The Computer Matching and Privacy Protection Act of 1988 (Pub. L.) 100-503), amended the...

  4. 77 FR 24756 - Privacy Act of 1974, as Amended; Computer Matching Program (SSA/Department of Labor (DOL))-Match...

    Science.gov (United States)

    2012-04-25

    ... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA 2011-0084] Privacy Act of 1974, as Amended; Computer Matching Program (SSA/ Department of Labor (DOL))--Match Number 1003 AGENCY: Social Security... above. SUPPLEMENTARY INFORMATION: A. General The Computer Matching and Privacy Protection Act of 1988...

  5. Quality Assurance Program description, Defense Waste Processing Facility (DWPF)

    International Nuclear Information System (INIS)

    Maslar, S.R.

    1992-01-01

    This document describes the Westinghouse Savannah River Company's (WSRC) Quality Assurance Program for Defense Waste Processing at the Savannah River Site (SRS). WSRC is the operating contractor for the US Department of Energy (DOE) at the SRS. The following objectives are achieved through developing and implementing the Quality Assurance Program: (1) Ensure that the attainment of quality (in accomplishing defense high-level waste processing objectives at the SRS) is at a level commensurate with the government's responsibility for protecting public health and safety, the environment, the public investment, and for efficiently and effectively using national resources. (2) Ensure that high-level waste from qualification and production activities conform to requirements defined by OCRWM. These activities include production processes, equipment, and services; and products that are planned, designed, procured, fabricated, installed, tested, operated, maintained, modified, or produced

  6. Defense Coastal/Estuarine Research Program 2 (DCERP2)

    Science.gov (United States)

    2013-05-01

    Assessing TMDL effectiveness using flow-adjusted concentrations:  A case study of the Neuse River , North Carolina. Environmental Science & Technology 37...activities, and data collection in the NRE Basin and New River by local stakeholder groups. Defense Coastal/Estuarine Research Program (DCERP) Monitoring...relationships between light penetration and solids/chl a levels. ArcGIS and spatial statistics will be used to estimate average bathymetric areas

  7. Defense Coastal/Estuarine Research Program (DCERP) Strategic Plan

    Science.gov (United States)

    2007-09-01

    availability to phytoplankton in the water column, as well as to benthic microalgae, macroalgae , and seagrasses in bottom waters (Gallegos et al., 2005...further another of MCBCL’s key management objectives for meeting the requirements of the CWA. How wetlands may be utilized for water treatment ...Regulations Appendix B Prioritized list of MCBCL’s conservation and water quality needs Defense Coastal/Estuarine Research Program (DCERP) Strategic

  8. Implementing Effective Affordability Constraints for Defense Acquisition Programs

    Science.gov (United States)

    2014-03-01

    version that appears in the Pentagon Digital Library at http://www.whs.mil/library/mildoc/DODD.html. See also Joe Ferrara , “DOD’s 5000 Documents...costs.16 E. MIDS MIDS is a multinational (United States, France, Germany, Italy , Spain) cooperative development program with U.S. Joint Service...Congressional Research Service, 15 January 2014. Ferrara , Joe. “DOD’s 5000 Documents: Evolution and Change in Defense Acquisition Policy.” Acquisition

  9. Defense Infrastructure: Continuing Challenges in Managing DOD Lodging Programs as Army Moves to Privatize Its Program

    National Research Council Canada - National Science Library

    Holman, Barry W; Kennedy, Michael; Dickey, Claudia; Lenane, Kate; Sarapu, Leslie; Silvers, Julie; Weissman, Cheryl

    2006-01-01

    The Department of Defense (DoD) transient lodging programs were established to provide quality temporary facilities for authorized personnel, and to reduce travel costs through lower rates than commercial hotels...

  10. FY85 Program plan for the Defense Transuranic Waste Program (DTWP)

    International Nuclear Information System (INIS)

    1984-11-01

    The Defense TRU Waste Program (DTWP) is the focal point for the Department of Energy in national planning, integration, and technical development for TRU waste management. The scope of this program extends from the point of TRU waste generation through delivery to a permanent repository. The TRU program maintains a close interface with repository development to ensure program compatibility and coordination. The defense TRU program does not directly address commercial activities that generate TRU waste. Instead, it is concerned with providing alternatives to manage existing and future defense TRU wastes. The FY85 Program Plan is consistent with the Defense TRU Waste Program goals and objectives stated in the Defense Transuranic Waste Program Strategy Document, January 1984. The roles of participants, the responsibilities and authorities for Research and Development (R and D), the organizational interfaces and communication channels for R and D and the establishment of procedures for planning, reporting, and budgeting of all R and D activities meet requirements stated in the Technical Management Plan for the Transuranic Waste Management Program. The Program Plan is revised as needed. The work breakdown structure is reflected graphically immediately following the Administration section and is described in the subsequent narrative. Detailed budget planning (i.e., programmatic funding and capital equipment) is presented for FY85; outyear budget projections are presented for future years

  11. Programmed cell death for defense against anomaly and tumor formation

    International Nuclear Information System (INIS)

    Kondo, Sohei; Norimura, Toshiyuki; Nomura, Taisei

    1995-01-01

    Cell death after exposure to low-level radiation is often considered evidence that radiation is poisonous, however small the dose. Evidence has been accumulating to support the notion that cell death after low-level exposure to radiation results from activation of suicidal genes open-quote programmed cell death close-quote or open-quote apoptosis close-quote - for the health of the whole body. This paper gives experimental evidence that embryos of fruit flies and mouse fetuses have potent defense mechanisms against teratogenic or tumorigenic injury caused by radiation and carcinogens, which function through programmed cell death

  12. 75 FR 12226 - Privacy Act of 1974; Computer Matching Program

    Science.gov (United States)

    2010-03-15

    ... Naturalization Service. SUMMARY: Pursuant to the Office of Management and Budget (OMB) Final Guidance... and Mathematics Access to Retain Talent Grant Program; the Iraq and Afghanistan Service Grant Program... met. 6. Address for Receipt of Public Comments or Inquires. Mr. Leroy Everett, Management and Program...

  13. Review of flat panel display programs and defense applications

    Science.gov (United States)

    Gnade, Bruce; Schulze, Raymond; Henderson, Girardeau L.; Hopper, Darrel G.

    1997-07-01

    Flat panel display research has comprised a substantial portion of the national investment in new technology for economic and national security for the past nine years. These investments have ben made principally via several Defense Advanced Research Projects Agency (DARPA) programs, known collectively as the continuing High Definition Systems Program, and the Office of the Secretary of Defense Production Act Title III Program. Using input from the Army, Navy, and Air Force to focus research and identify insertion opportunities, DARPA and the Title III Program Office have made investments to develop the national technology base and manufacturing infrastructure necessary to meet the twin challenge of providing affordable displays in current systems and enabling the DoD strategy of winning future conflicts by getting more information to all participants during the battle. These research programs are reviewed and opportunities for applications are described. Future technology development, transfer, and transition requirements are identified. Strategy and vision are documented to assist the identification of areas meriting further consideration.

  14. Strategic Defense Initiative Organization adaptive structures program overview

    Science.gov (United States)

    Obal, Michael; Sater, Janet M.

    In the currently envisioned architecture none of the Strategic Defense System (SDS) elements to be deployed will receive scheduled maintenance. Assessments of performance capability due to changes caused by the uncertain effects of environments will be difficult, at best. In addition, the system will have limited ability to adjust in order to maintain its required performance levels. The Materials and Structures Office of the Strategic Defense Initiative Organization (SDIO) has begun to address solutions to these potential difficulties via an adaptive structures technology program that combines health and environment monitoring with static and dynamic structural control. Conceivable system benefits include improved target tracking and hit-to-kill performance, on-orbit system health monitoring and reporting, and threat attack warning and assessment.

  15. Searching the Skies: the Legacy of the United States Cold War Defense Radar Program

    National Research Council Canada - National Science Library

    Winkler, David

    1997-01-01

    The Department of Defense (DOD) Legacy Resource Management Program was established under the Defense Appropriations Act of 1991 to determine how to better integrate the conservation of irreplaceable biological, cultural...

  16. Defense Special Weapons Agency Advisory Panel on the Nuclear Weapon Effects Program

    National Research Council Canada - National Science Library

    1998-01-01

    We performed the audit in response to allegations made to the Defense Hotline concerning conflicts of interest among members of the Defense Special Weapons Agency Advisory Panel on the Nuclear Weapon Effects Program...

  17. U.S. Department of Energy defense waste management program implementation plan

    International Nuclear Information System (INIS)

    Jordan, E.A.

    1988-01-01

    The Program Implementation Plan describes the Department of Energy's current approach to managing its defense high-level, low-level, and transuranic radioactive waste. It documents implementation of the policies described in the 1983 Defense Waste Management Plan

  18. Future directions of defense programs high-level waste technology programs

    International Nuclear Information System (INIS)

    Chee, T.C.; Shupe, M.W.; Turner, D.A.; Campbell, M.H.

    1987-01-01

    The Department of Energy has been managing high-level waste from the production of nuclear materials for defense activities over the last forty years. An objective for the Defense Waste and Transportation Management program is to develop technology which ensures the safe, permanent disposal of all defense radioactive wastes. Technology programs are underway to address the long-term strategy for permanent disposal of high-level waste generated at each Department of Energy site. Technology is being developed for assessing the hazards, environmental impacts, and costs of each long-term disposal alternative for selection and implementation. This paper addresses key technology development areas, and consideration of recent regulatory requirements associated with the long-term management of defense radioactive high-level waste

  19. Privacy Impact Assessment for the Wellness Program Medical Records

    Science.gov (United States)

    The Wellness Program Medical Records System collects contact information and other Personally Identifiable Information (PII). Learn how this data is collected, used, accessed, the purpose of data collection, and record retention policies.

  20. Transportation System Risk Assessment on DOE Defense Program shipments

    International Nuclear Information System (INIS)

    Brumburgh, G.P.; Kimura, C.Y.; Alesso, H.P.; Prassinos, P.G.

    1992-01-01

    Substantial effort has been expended concerning the level of safety provided to persons, property, and the environment from the hazards associated with transporting radioactive material. This work provided an impetus for the Department of Energy to investigate the use of probabilistic risk assessment techniques to supplement the deterministic approach to transportation safety. The DOE recently decided to incorporate the methodologies associated with PRAs in the process for authorizing the transportation of nuclear components, special assemblies, and radioactive materials affiliated with the DOE Defense Program. Accordingly, the LLNL, sponsored by the DOE/AL, is tasked with developing a safety guide series to provide guidance to preparers performing a transportation system risk assessment

  1. 78 FR 45513 - Privacy Act of 1974; Computer Matching Program

    Science.gov (United States)

    2013-07-29

    ... Responsibilities for Maintaining Records about Individuals'', dated February 8, 1996 (February 20, 1996, 61 FR 6427... purpose of this matching program is to provide the SPAAs with data from DoD military and civilian pay files, the military retired pay files, survivor pay files and the OPM civilian retired and survivor pay...

  2. 78 FR 15730 - Privacy Act of 1974; Computer Matching Program

    Science.gov (United States)

    2013-03-12

    ... the New York Department of Labor. SUMMARY: This document provides notice of the existence of a...), requires DHS to establish a system for the verification of immigration status of alien applicants for, or... order to prevent the issuance of benefits to alien applicants who are not entitled to program benefits...

  3. 76 FR 50198 - Privacy Act of 1974; Computer Matching Program

    Science.gov (United States)

    2011-08-12

    ... Management (OPM) (source agency). This matching program will become effective as explained in this notice. In... between ED and OPM is to assist ED in detecting improper disbursements or overpayments of need- based... underreport family income on the Free Application for Federal Student Aid (FAFSA). Financial need is...

  4. 75 FR 47797 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2010-08-09

    ... Officer, Department of Defense. Deletion: S330.40 CAHS System name: Employee Assistance Program Records (August 27, 1999; 64 FR 46889). Reason: This collection is covered under the existing DHHS/FOH EAP Privacy notice 09-90-0010, entitled ``Employee Assistance Program (EAP) Records, HHS/OS/ASAM/OHR.'' [FR Doc. 2010...

  5. Defense Health Program Financial Reporting of General Property, Plant, and Equipment

    National Research Council Canada - National Science Library

    Lane, F

    2000-01-01

    .... The Defense Health Program funds the operations of the Military Departments' medical treatment facilities, the development of DoD medical systems software, and congressionally directed research...

  6. Defense High-Level Waste Leaching Mechanisms Program. Final report

    International Nuclear Information System (INIS)

    Mendel, J.E.

    1984-08-01

    The Defense High-Level Waste Leaching Mechanisms Program brought six major US laboratories together for three years of cooperative research. The participants reached a consensus that solubility of the leached glass species, particularly solubility in the altered surface layer, is the dominant factor controlling the leaching behavior of defense waste glass in a system in which the flow of leachant is constrained, as it will be in a deep geologic repository. Also, once the surface of waste glass is contacted by ground water, the kinetics of establishing solubility control are relatively rapid. The concentrations of leached species reach saturation, or steady-state concentrations, within a few months to a year at 70 to 90 0 C. Thus, reaction kinetics, which were the main subject of earlier leaching mechanisms studies, are now shown to assume much less importance. The dominance of solubility means that the leach rate is, in fact, directly proportional to ground water flow rate. Doubling the flow rate doubles the effective leach rate. This relationship is expected to obtain in most, if not all, repository situations

  7. Defense High-Level Waste Leaching Mechanisms Program. Final report

    Energy Technology Data Exchange (ETDEWEB)

    Mendel, J.E. (compiler)

    1984-08-01

    The Defense High-Level Waste Leaching Mechanisms Program brought six major US laboratories together for three years of cooperative research. The participants reached a consensus that solubility of the leached glass species, particularly solubility in the altered surface layer, is the dominant factor controlling the leaching behavior of defense waste glass in a system in which the flow of leachant is constrained, as it will be in a deep geologic repository. Also, once the surface of waste glass is contacted by ground water, the kinetics of establishing solubility control are relatively rapid. The concentrations of leached species reach saturation, or steady-state concentrations, within a few months to a year at 70 to 90/sup 0/C. Thus, reaction kinetics, which were the main subject of earlier leaching mechanisms studies, are now shown to assume much less importance. The dominance of solubility means that the leach rate is, in fact, directly proportional to ground water flow rate. Doubling the flow rate doubles the effective leach rate. This relationship is expected to obtain in most, if not all, repository situations.

  8. 78 FR 73195 - Privacy Act of 1974: CMS Computer Matching Program Match No. 2013-01; HHS Computer Matching...

    Science.gov (United States)

    2013-12-05

    ... 1974: CMS Computer Matching Program Match No. 2013-01; HHS Computer Matching Program Match No. 1312 AGENCY: Centers for Medicare & Medicaid Services (CMS), Department of Health and Human Services (HHS... Privacy Act of 1974 (5 U.S.C. 552a), as amended, this notice announces the renewal of a CMP that CMS plans...

  9. 77 FR 32709 - Privacy Act of 1974, as Amended; Computer Matching Program (SSA/Department of Homeland Security...

    Science.gov (United States)

    2012-06-01

    ...; Computer Matching Program (SSA/ Department of Homeland Security (DHS))--Match Number 1010 AGENCY: Social Security Administration (SSA). ACTION: Notice of a renewal of an existing computer matching program that... amended by the Computer Matching and Privacy Protection Act of 1988, as amended, and the regulations and...

  10. 75 FR 53005 - Privacy Act of 1974, as amended; Notice of Computer Matching Program (Railroad Retirement Board...

    Science.gov (United States)

    2010-08-30

    ... notice of its renewal of an ongoing computer-matching program with the Social Security Administration... computer-matching program with the Committee on Homeland Security and Governmental Affairs of the Senate.... General The Computer Matching and Privacy Protection Act of 1988, (Pub. L. 100-503), amended by the...

  11. 77 FR 11367 - Defense Federal Acquisition Regulation Supplement; Extension of the Test Program for Negotiation...

    Science.gov (United States)

    2012-02-24

    ...DoD is issuing a final rule amending the Defense Federal Acquisition Regulation Supplement to extend the program period for the DoD Test Program for Negotiation of Comprehensive Small Business Subcontracting Plans.

  12. FY 1987 program summary document: Office of Defense Waste and Transportation Management

    International Nuclear Information System (INIS)

    1987-04-01

    This document describes the Office of Defense Waste and Transportation Management (DWTM) Program as supported by the President's Fiscal Year (FY) 1987 Budget Request to Congress. It specifically addresses the program's organization, objectives, strategies, and plans for FY 1987

  13. Defense programs business practices re-engineering QFD exercise

    International Nuclear Information System (INIS)

    Murray, C.; Halbleib, L.

    1996-03-01

    The end of the cold war has resulted in many changes for the Nuclear Weapons Complex (NWC). We now work in a smaller complex, with reduced resources, a smaller stockpile, and no new phase 3 weapons development programs. This new environment demands that we re-evaluate the way we design and produce nuclear weapons. The Defense Program (DP) Business Practices Re-engineering activity was initiated to improve the design and production efficiency of the DP Sector. The activity had six goals: (1) to identify DP business practices that are exercised by the Product Realization Process (PRP); (2) to determine the impact (positive, negative, or none) of these practices on defined, prioritized customer criteria; (3) to identify business practices that are candidates for elimination or re-engineering; (4) to select two or three business practices for re-engineering; (5) to re-engineer the selected business practices; and (6) to exercise the re-engineered practices on three pilot development projects. Business practices include technical and well as administrative procedures that are exercised by the PRP. A QFD exercise was performed to address (1)-(4). The customer that identified, defined, and prioritized the criteria to rate the business practices was the Block Change Advisory Group. Five criteria were identified: cycle time, flexibility, cost, product performance/quality, and best practices. Forty-nine business practices were identified and rated per the criteria. From this analysis, the group made preliminary recommendations as to which practices would be addressed in the re-engineering activity. Sixteen practices will be addressed in the re-engineering activity. These practices will then be piloted on three projects: (1) the Electronic Component Assembly (ECA)/Radar Project, (2) the B61 Mod 11, and (3) Warhead Protection Program (WPP)

  14. 32 CFR 806b.4 - Privacy Act complaints.

    Science.gov (United States)

    2010-07-01

    ... be identified, the local Privacy Act officer will assume these duties. Issues that cannot be resolved... 32 National Defense 6 2010-07-01 2010-07-01 false Privacy Act complaints. 806b.4 Section 806b.4 National Defense Department of Defense (Continued) DEPARTMENT OF THE AIR FORCE ADMINISTRATION PRIVACY ACT...

  15. Defense Logistics Agency Disposition Services Needs to Improve Demilitarization Program Self-Assessment Evaluations - Redacted

    Science.gov (United States)

    2016-12-20

    from mandatory disclosure under the Freedom of Information Act. Defense Logistics Agency Disposition Services Needs to Improve Demilitarization...Project No. D2016-D000RD-0057.000) │ i Results in Brief Defense Logistics Agency Disposition Services Needs to Improve Demilitarization Program Self...Assessment Evaluations Visit us at www.dodig.mil December 20, 2016 Objective Our audit objective was to determine whether the Defense Logistics Agency

  16. 75 FR 35847 - Privacy Act of 1974, Computer Matching Program-U.S. Small Business Administration and U.S...

    Science.gov (United States)

    2010-06-23

    ... ID Number, Product (Home/Business) and Registration Occupant Social Security Number to create a New... SMALL BUSINESS ADMINISTRATION Privacy Act of 1974, Computer Matching Program--U.S. Small Business Administration and U.S. Department of Homeland Security, Federal Emergency Management Agency AGENCY: Small...

  17. 78 FR 4968 - Privacy Act of 1974, Computer Matching Program-U.S. Small Business Administration and U.S...

    Science.gov (United States)

    2013-01-23

    ... Small Business Administration (SBA) and the Department of Homeland Security, Federal Emergency... Security Officer, Office of the Chief Information Officer, Small Business Administration. Eric Won, Chief... SMALL BUSINESS ADMINISTRATION Privacy Act of 1974, Computer Matching Program--U.S. Small Business...

  18. 76 FR 12397 - Privacy Act of 1974, as Amended; Computer Matching Program (SSA/Bureau of the Public Debt (BPD...

    Science.gov (United States)

    2011-03-07

    ...; Computer Matching Program (SSA/ Bureau of the Public Debt (BPD))--Match Number 1038 AGENCY: Social Security... as shown above. SUPPLEMENTARY INFORMATION: A. General The Computer Matching and Privacy Protection... containing SSNs extracted from the Supplemental Security Record database. Exchanges for this computer...

  19. U.S. Department of Energy, defense waste management program implementation plan

    International Nuclear Information System (INIS)

    Chee, T.

    1988-01-01

    This paper reports that the program implementation plan describes the Department of Energy's current approach to managing its defense high-level, low-level, and transuranic radioactive waste. It documents implementation of the policies described in the 1983 Defense Waste Management Plan

  20. Audit of Major Defense Acquisition Programs Cycle Time

    National Research Council Canada - National Science Library

    Ugone, Mary

    2001-01-01

    ... (GPRA) as indicated in the FY 2000 Annual Report of the Secretary of Defense. Specifically, we assessed whether the process and factors, used to establish the metric goal of MDAP cycle time, were valid...

  1. Department of Defense Joint Chemical and Biological Defense Program 2009 Annual Report to Congress

    Science.gov (United States)

    2009-03-27

    private sector all partner with the DoD CBDP to fulfill its mission to provide CBRN defense capabilities in support of the National Military Strategies...Venezuelan, and Eastern Equine Encephalitis) delivered by electroporation which showed high efficacy in non-human primates. Developed five technology

  2. Who Pays for National Defense? Financing Defense Programs in the United States, 1947-2007

    Science.gov (United States)

    Heo, Uk; Bohte, John

    2012-01-01

    Past studies on military expenditures in the United States have primarily focused on the extent to which guns versus butter trade-offs are prevalent without examining this relationship in the context of how other fiscal policy tools are used to pay for defense. Using annual data from 1947-2007, this study examines the relative importance of…

  3. Massachusetts Institute of Technology Defense & Arms Control Studies Program

    Science.gov (United States)

    1996-01-01

    security of the nation. The unicorn is the obvious symbol for this box. Even with a two percent of GDP or less defense budget, we will maintain our nuclear...systems is not going away. There are some unicorns in the defense herd and this would be a time to claim to be one. ACTIVITIES AND PERSONNEL Looking...macroeconomics and public finance is advisable. The subjects in the Forces and Force Analysis section will provide sufficient review of the technical

  4. Long-Term Implications of the Fiscal Year 2009 Future Years Defense Program

    National Research Council Canada - National Science Library

    Talaber, Adam; Arthur, David; Bass, Elizabeth; Bennett, Michael; Eveker, Kevin; Frisk, Daniel; Labs, Eric J; Lussier, Frances; Percy, Allison; Hall, Raymond; Newman, David; Regan, Dawn S; Schmit, Matthew; Wheelock, Jason; Kelley, Kate

    2009-01-01

    ...) has published a series of reports about its projections of the resources that might be needed over the long term to carry out the Bush Administration's plans as expressed in the Future Years Defense Program (FYDP...

  5. CHEMICAL AND BIOLOGICAL DEFENSE: Program Planning and Evaluation Should Follow Results Act Framework

    National Research Council Canada - National Science Library

    1999-01-01

    As you requested, we examined the extent to which DOD has applied the Results Act's outcome-oriented principles to the CB Defense Program, focusing in particular on research, development, testing, and evaluation (RDT&E...

  6. The Department of Defense FY 1998 Small Business Innovation Research (SBIR) Program. Program Solicitation 98.2

    National Research Council Canada - National Science Library

    1998-01-01

    ...), and Office of the Secretary of Defense (OSD), hereafter referred to as DoD Components, invite small business firms to submit proposals under this solicitation for the Small Business Innovation Research (SBIR) program...

  7. Overview of the Defense Programs Research and Technology Development Program for fiscal year 1993. Appendix II research laboratories and facilities

    Energy Technology Data Exchange (ETDEWEB)

    1993-09-30

    This document contains summaries of the research facilities that support the Defense Programs Research and Technology Development Program for FY 1993. The nine program elements are aggregated into three program clusters as follows: (1) Advanced materials sciences and technologies; chemistry and materials, explosives, special nuclear materials (SNM), and tritium. (2) Design sciences and advanced computation; physics, conceptual design and assessment, and computation and modeling. (3) Advanced manufacturing technologies and capabilities; system engineering science and technology, and electronics, photonics, sensors, and mechanical components. Section I gives a brief summary of 23 major defense program (DP) research and technology facilities and shows how these major facilities are organized by program elements. Section II gives a more detailed breakdown of the over 200 research and technology facilities being used at the Laboratories to support the Defense Programs mission.

  8. Defense Contract Management Command Support to System Acquisition Program Managers

    National Research Council Canada - National Science Library

    1999-01-01

    .... This report discusses the planning of contract administration office support to system acquisition program managers through the program integration process and the customer support outreach program...

  9. SDI (Strategic Defense Initiative) Software Technology Program Plan

    Science.gov (United States)

    1987-06-01

    station control, and defense. c. Simulation Display Generator ( SDG ) [Patterson 83] I0 SDG supports the creation, display, modification, storage, and...34 Proceedings Trends and Applications 1981, IEEE, (May 28, 1981). [Parnas 86] Parnas, D.L., "When can Software be Trustworthy?" Keynote Address to Compass 󈨚

  10. Review of the President's Fiscal Year 2009 Budget Request for the Defense Health Program's Private Sector Care Budget Activity Group

    National Research Council Canada - National Science Library

    Fantone, Denise M; Pickup, Sharon

    2008-01-01

    The Conference Report accompanying the Fiscal Year 2008 Department of Defense Appropriations bill directed us to review the President's fiscal year 2009 budget request for the Defense Health Program's...

  11. Materials evaluation programs at the Defense Waste Processing Facility

    International Nuclear Information System (INIS)

    Gee, J.T.; Iverson, D.C.; Bickford, D.F.

    1992-01-01

    The Savannah River Site (SRS) has been operating a nuclear fuel cycle since the 1950s to produce nuclear materials in support of the national defense effort. About 83 million gallons of high-level waste produced since operations began has been consolidated by evaporation into 33 million gallons at the waste tank farm. The Department of Energy authorized the construction of the Defense Waste Processing Facility (DWPF), the function of which is to immobilize the waste as a durable borosilicate glass contained in stainless steel canisters prior to the placement of the canisters in a federal repository. The DWPF is now mechanically complete and is undergoing commissioning and run-in activities. A brief description of the DWPF process is provided

  12. Defense Coastal/Estuarine Research Program (DCERP) Baseline Monitoring Plan

    Science.gov (United States)

    2007-09-19

    climatological stress (e.g., temperature, drought) and shorter-term air pollutant stress (oxidants and metals ). Heavy metals of fine PM have been...speciation of the fine and coarse PM fractions will allow distinction between different PM sources such as wind blown soil dust, including dust...emitting 12% of the total PM2.5 mass (U.S. EPA, 2004b). Source apportionment modeling of PM2.5 mass concentrations from 24 Speciation Defense Coastal

  13. FY10 Defense Environmental Programs Annual Report to Congress

    Science.gov (United States)

    2011-07-01

    7,412- 2019  AIR FORCE ALPENA COUNTY REGIONAL AIRPORT / MI557282890300 17 2 $6,363 $0 $862 $1,9462012 2018  FORMERLY USED DEFENSE SITES ASH FIELD...Through FY10 ($000) IRP MMRPMMRPIRP Michigan ALPENA AAF / MI59799F231100 $001 $23 ALPENA NGTR / MI59799F228900 $610 $0 ANN ARBOR NGTR / MI59799F228800

  14. Privacy Policy

    Science.gov (United States)

    ... Home → NLM Privacy Policy URL of this page: https://medlineplus.gov/privacy.html NLM Privacy Policy To ... out of cookies in the most popular browsers, http://www.usa.gov/optout_instructions.shtml. Please note ...

  15. A linear programming model for preserving privacy when disclosing patient spatial information for secondary purposes.

    Science.gov (United States)

    Jung, Ho-Won; El Emam, Khaled

    2014-05-29

    A linear programming (LP) model was proposed to create de-identified data sets that maximally include spatial detail (e.g., geocodes such as ZIP or postal codes, census blocks, and locations on maps) while complying with the HIPAA Privacy Rule's Expert Determination method, i.e., ensuring that the risk of re-identification is very small. The LP model determines the transition probability from an original location of a patient to a new randomized location. However, it has a limitation for the cases of areas with a small population (e.g., median of 10 people in a ZIP code). We extend the previous LP model to accommodate the cases of a smaller population in some locations, while creating de-identified patient spatial data sets which ensure the risk of re-identification is very small. Our LP model was applied to a data set of 11,740 postal codes in the City of Ottawa, Canada. On this data set we demonstrated the limitations of the previous LP model, in that it produces improbable results, and showed how our extensions to deal with small areas allows the de-identification of the whole data set. The LP model described in this study can be used to de-identify geospatial information for areas with small populations with minimal distortion to postal codes. Our LP model can be extended to include other information, such as age and gender.

  16. An Efficient Context-Aware Privacy Preserving Approach for Smartphones

    Directory of Open Access Journals (Sweden)

    Lichen Zhang

    2017-01-01

    Full Text Available With the proliferation of smartphones and the usage of the smartphone apps, privacy preservation has become an important issue. The existing privacy preservation approaches for smartphones usually have less efficiency due to the absent consideration of the active defense policies and temporal correlations between contexts related to users. In this paper, through modeling the temporal correlations among contexts, we formalize the privacy preservation problem to an optimization problem and prove its correctness and the optimality through theoretical analysis. To further speed up the running time, we transform the original optimization problem to an approximate optimal problem, a linear programming problem. By resolving the linear programming problem, an efficient context-aware privacy preserving algorithm (CAPP is designed, which adopts active defense policy and decides how to release the current context of a user to maximize the level of quality of service (QoS of context-aware apps with privacy preservation. The conducted extensive simulations on real dataset demonstrate the improved performance of CAPP over other traditional approaches.

  17. Defense Threat Reduction Agency > Careers > Onboarding > Special Programs

    Science.gov (United States)

    Development Work/Life Programs Onboarding Onboarding Overview Before You Report Sponsor Program Getting Here , programs, and practices to help our employees and Service members balance work and family responsibilities . We have put in place family-friendly Work/Life programs and policies designed to create a more

  18. Defense Acquisitions: Department of Defense Actions on Program Manager Empowerment and Accountability

    National Research Council Canada - National Science Library

    2007-01-01

    .... In addition, as part of a new strategy for program manager empowerment and accountability, DOD plans a variety of actions to enhance development opportunities, provide more incentives, and arrange...

  19. Acquisition Program Teamwork and Performance Seen Anew: Exposing the Interplay of Architecture and Behaviors in Complex Defense Programs

    Science.gov (United States)

    2016-04-30

    created an organizational crisis, spurring what is arguably the most successful acquisition reform effort in U.S. defense industry history. Diagnosis and...programs as sociotechnical systems with program performance driven by interpersonal and inter- organizational dynamics as well as technical system...interdependencies are acknowledged in traditional organizational /management literature, they are seldom defined at the level of specificity that is required

  20. 2010 Department of Defense (DoD) Chemical and Biological Defense Program (CBDP) Portfolio

    Science.gov (United States)

    2010-03-01

    26 FW OT&E MBU-25/26 FW When integrated with antigravity (anti-G) equipment, the MBU-25 and MBU-26 each provide simultaneous CB protection and anti...Analysis of Materiel Approaches anti-G .............. Antigravity APB .................Acquisition Program Baseline APG

  1. Identifying Enterprise Leverage Points in Defense Acquisition Program Performance

    Science.gov (United States)

    2009-09-01

    differentiated . [108] Table 1: Table of Validation and Approval Authority5 Beyond the major categories used for programs as noted above, there is also a...impossible to identify which “ uber -portfolio” a system should belong to as many “portfolios” claim a system as an integral part of the larger portfolio...to differentiate between programs. DOD 5002, Enclosure E states “A technology project or acquisition program shall be categorized based on its

  2. Department of Defense Chemical and Biological Defense Program. Annual Report to Congress

    Science.gov (United States)

    2008-05-01

    medical therapies that are active against a broad spectrum of CB threats. CPRC Interagency executive committee that reports on activities and programs...Qtr. FY 2012 Multivalent Equine Encephalitis * 1st Qtr. FY 2012 Plague Vaccine October 28, 2004 n Ricin Vaccine * 3rd Qtr. FY 2009 n Th er ap eu tic s...physiological and psychological side effects when used alone (that is, in absence of nerve agent poisoning). Neurologic Therapeutics.• Develop

  3. Department of Defense: Observations on the National Industrial Security Program

    National Research Council Canada - National Science Library

    Barr, Ann C; Denomme, Thomas J; Booth, Brandon; Krump, John; Sloan, Karen; Slodkowski, Lillian; Sterling, Suzanne

    2008-01-01

    .... In terms of facility oversight, DSS maintained files on contractor facilities security programs and their security violations, but it did not analyze this information to determine, for example...

  4. Central American Environmental Defense Program in the Mesoamerican Biological Corridor

    National Research Council Canada - National Science Library

    Griffard, Bernie

    2002-01-01

    .... Crossing eight national borders this program aims to protect existing ecosystems, while at the same time promoting sustainable development projects that help to alleviate poverty in the region...

  5. Implementation and Sustainability of the Russian Federation Ministry of Defense Nuclear Personnel Reliability Program

    International Nuclear Information System (INIS)

    Lata, Vasiliy; Coates, Cameron W.

    2010-01-01

    Through a cooperative effort between the US Department of Energy and the Russian Federation (RF) Ministry of Defense (MOD) a Personnel Reliability Program (PRP) for the nuclear handlers within the RF MOD is at the stage of implementation. Sustaining the program is of major significance for long term success. This paper will discuss the elements of the RF PRP and the equipment needs for implementation. Program requirements, documentation needs, training, and assurances of appropriate equipment use will be addressed.

  6. PRIVACY AS A CULTURAL PHENOMENON

    Directory of Open Access Journals (Sweden)

    Garfield Benjamin

    2017-07-01

    Full Text Available Privacy remains both contentious and ever more pertinent in contemporary society. Yet it persists as an ill-defined term, not only within specific fields but in its various uses and implications between and across technical, legal and political contexts. This article offers a new critical review of the history of privacy in terms of two dominant strands of thinking: freedom and property. These two conceptions of privacy can be seen as successive historical epochs brought together under digital technologies, yielding increasingly complex socio-technical dilemmas. By simplifying the taxonomy to its socio-cultural function, the article provides a generalisable, interdisciplinary approach to privacy. Drawing on new technologies, historical trends, sociological studies and political philosophy, the article presents a discussion of the value of privacy as a term, before proposing a defense of the term cyber security as a mode of scalable cognitive privacy that integrates the relative needs of individuals, governments and corporations.

  7. AV-8B Remanufacture Program as Part of the Audit of the Defense Acquisition Board Review Process - FY 1994

    Science.gov (United States)

    1994-06-03

    wft*:¥A:ft:i:ft& OFFICE OF THE INSPECTOR GENERAL AV-8B REMANUFACTURE PROGRAM AS PART OF THE AUDIT OF THE DEFENSE ACQUISITION BOARD...Part of the Audit of the Defense Acquisition Board Review Process - FY 1994 B. DATE Report Downloaded From the Internet: 03/23/99 C. Report’s Point...NAVY FOR RESEARCH DEVELOPMENT AND ACQUISITION SUBJECT: Audit Report on the AV-8B Remanufacture Program as Part of the Audit of the Defense

  8. Reflecting on 20+ Years of “Executive Program in Defense Decision Making” Curriculum

    OpenAIRE

    2017-01-01

    CCMR News Article CCMR hosted a version of its biannual “Executive Program in Defense Decision Making” offering for 21 international military and civilian participants, from November 6-17, 2017. Often described as CCMR’s “flagship” course, this curriculum has been offered at the Naval Postgraduate School (NPS) in Monterey, California for over 20 years.

  9. Early Warning: Brought to you by the DoD Chem-Bio Defense Program

    Science.gov (United States)

    Security Robots Lasers RSS Feed Early Warning: Brought to you by the DoD Chem-Bio Defense Program help warfighters prevent, protect against, respond to or recover from chem-bio threats and effects . Hassell said he and his team don't monitor the world for chem-bio threats, they develop the tools that

  10. 77 FR 48199 - Privacy Act; System of Records: State-35, Information Access Programs Records

    Science.gov (United States)

    2012-08-13

    ..., the Privacy Act, the Ethics in Government Act, the access provisions of Executive Order 13526 or a...; requester's name and requester's mailing and email address; Social Security number (if provided by the...: Hard copy and electronic media. RETRIEVABILITY: Individual name, case number. SAFEGUARDS: All users are...

  11. Defense Small Business Innovation Research Program (SBIR) FY 1984.

    Science.gov (United States)

    1984-01-12

    Intelligence (AI) Software Program Development Aids DESCRIPTION: The technology of aritificial intelligence (AI) has evolved to the point that...advanced rotor/control concepts. 10. TITLE: Artificial Intelligence Techniques for Tactical Decision Aids DESCRIPTION: Current and planned C3 systems...application to intelligence , VISTA targeting, and responsive countermeasure activation. 16. TITLE: Research in Support of Electronic Warfare DESCRIPTION

  12. Review of the Fiscal Year 2014 (FY14) Defense Environmental International Cooperation (DEIC) Program

    Science.gov (United States)

    2015-05-01

    advanced by the U.S. team, and embraced by the participants, was to retrain approximately 20 percent of the military force to address ecologically ...the lead for the State Partnership Program with Chile . Discussions focused on environmental programs in both countries, as well as working group...sessions to develop collaborative plans for the next three to five years under the U.S.- Chile Defense Consultative Commission (DCC) in the areas of

  13. The US Department of Defense Hemorrhage and Resuscitation Research and Development Program.

    Science.gov (United States)

    Pusateri, Anthony E; Dubick, Michael A

    2015-08-01

    Data from recent conflicts demonstrate the continuing need for research and development focusing on hemorrhage control, fluid resuscitation, blood products, transfusion, and pathophysiologic responses to traumatic hemorrhage. The US Department of Defense Hemorrhage and Resuscitation Research and Development Program brings together US Department of Defense efforts and is coordinated with efforts of our other federal government, industry, international, and university-based partners. Military medical research has led to advances in both military and civilian trauma care. A sustained effort will be required to continue to advance the care of severely injured trauma patients.

  14. Dr. John H. Hopps Jr. Defense Research Scholars Program

    Science.gov (United States)

    2014-12-16

    Aparecio Peggins (Psychology) Past Research Experience • Attachment Styles in Romantic Relationships, University of New Hampshire (Summer 2011...2014 at the Ray Charles Performing Arts Center on the campus of Morehouse College. The banquet consisted of a reception and dinner for parents...auditorium of the Ray Charles Performing Arts Center, highlighting the graduates’ majors, honors/awards and their acceptance to a graduate program. The

  15. Maternal programming of defensive responses through sustained effects on gene expression.

    Science.gov (United States)

    Zhang, Tie-Yuan; Bagot, Rose; Parent, Carine; Nesbitt, Cathy; Bredy, Timothy W; Caldji, Christian; Fish, Eric; Anisman, Hymie; Szyf, Moshe; Meaney, Michael J

    2006-07-01

    There are profound maternal effects on individual differences in defensive responses and reproductive strategies in species ranging literally from plants to insects to birds. Maternal effects commonly reflect the quality of the environment and are most likely mediated by the quality of the maternal provision (egg, propagule, etc.), which in turn determines growth rates and adult phenotype. In this paper we review data from the rat that suggest comparable forms of maternal effects on defensive responses stress, which are mediated by the effects of variations in maternal behavior on gene expression. Under conditions of environmental adversity maternal effects enhance the capacity for defensive responses in the offspring. In mammals, these effects appear to 'program' emotional, cognitive and endocrine systems towards increased sensitivity to adversity. In environments with an increased level of adversity, such effects can be considered adaptive, enhancing the probability of offspring survival to sexual maturity; the cost is that of an increased risk for multiple forms of pathology in later life.

  16. Defense waste cyclone incinerator demonstration program: April-September 1980

    International Nuclear Information System (INIS)

    Klingler, L.M.

    1981-01-01

    An improved offgas system is being designed. The new system will improve gas cleaning and will also provide for improved offgas sampling and mass balance data collection. Continuous solid feed burning experiments were delayed pending delivery of shredding equipment. Liquid burning experiments were in progress at fiscal year end. Burn data indicate that the incinerator will work well for combustible liquids. Improved data on incinerator performance will be generated upon completion of system changes and utilization of new sampling and analysis equipment. Mound Facility received advanced guidance from the Transuranic Waste Systems Office that this program will be cancelled in FY-1981 because of reductions in funding levels

  17. Information privacy fundamentals for librarians and information professionals

    CERN Document Server

    Givens, Cherie L

    2014-01-01

    This book introduces library and information professionals to information privacy, provides an overview of information privacy in the library and information science context, U.S. privacy laws by sector, information privacy policy, and key considerations when planning and creating a privacy program.

  18. Privacy policies

    NARCIS (Netherlands)

    Dekker, M.A.C.; Etalle, S.; Hartog, den J.I.; Petkovic, M.; Jonker, W.

    2007-01-01

    Privacy is a prime concern in today’s information society. To protect the privacy of individuals, enterprises must follow certain privacy practices while collecting or processing personal data. In this chapter we look at the setting where an enterprise collects private data on its website, processes

  19. Privacy Policies

    NARCIS (Netherlands)

    Dekker, M.A.C.; Etalle, Sandro; den Hartog, Jeremy; Petkovic, M.; Jonker, W.; Jonker, Willem

    2007-01-01

    Privacy is a prime concern in today's information society. To protect the privacy of individuals, enterprises must follow certain privacy practices, while collecting or processing personal data. In this chapter we look at the setting where an enterprise collects private data on its website,

  20. Development of fusion fuel cycles: Large deviations from US defense program systems

    Energy Technology Data Exchange (ETDEWEB)

    Klein, James Edward, E-mail: james.klein@srnl.doe.gov; Poore, Anita Sue; Babineau, David W.

    2015-10-15

    Highlights: • All tritium fuel cycles start with a “Tritium Process.” All have similar tritium processing steps. • Fusion tritium fuel cycles minimize process tritium inventories for various reasons. • US defense program facility designs did not minimize in-process inventories. • Reduced inventory tritium facilities will lower public risk. - Abstract: Fusion energy research is dominated by plasma physics and materials technology development needs with smaller levels of effort and funding dedicated to tritium fuel cycle development. The fuel cycle is necessary to supply and recycle tritium at the required throughput rate; additionally, tritium confinement throughout the facility is needed to meet regulatory and environmental release limits. Small fuel cycle development efforts are sometimes rationalized by stating that tritium processing technology has already been developed by nuclear weapons programs and these existing processes only need rescaling or engineering design to meet the needs of fusion fuel cycles. This paper compares and contrasts features of tritium fusion fuel cycles to United States Cold War era defense program tritium systems. It is concluded that further tritium fuel cycle development activities are needed to provide technology development beneficial to both fusion and defense programs tritium systems.

  1. A Management Case Analysis of the Department of Defense Contractor Risk Assessment Guide Program

    Science.gov (United States)

    1990-12-01

    ORGANIZATION ......... 17 1. Past Government Organization Problems... 17 2. Current Government Organization ......... 17 3. The Contractor’s Organizatin ...Program and urged CODSIA to take a leadership role in encouraging its members to participate. The DCAA [Ref ll:p. 45] informed defense contractors in...conferences, and through the leadership of officials including the Under Secretary of the Navy for Acquisition, DOD Comptroller General, DOD Inspector General

  2. 39 CFR 262.5 - Systems (Privacy).

    Science.gov (United States)

    2010-07-01

    ... 39 Postal Service 1 2010-07-01 2010-07-01 false Systems (Privacy). 262.5 Section 262.5 Postal... DEFINITIONS § 262.5 Systems (Privacy). (a) Privacy Act system of records. A Postal Service system containing... individual. (c) Computer matching program. A “matching program,” as defined in the Privacy Act, 5 U.S.C. 552a...

  3. Genetic privacy.

    Science.gov (United States)

    Sankar, Pamela

    2003-01-01

    During the past 10 years, the number of genetic tests performed more than tripled, and public concern about genetic privacy emerged. The majority of states and the U.S. government have passed regulations protecting genetic information. However, research has shown that concerns about genetic privacy are disproportionate to known instances of information misuse. Beliefs in genetic determinacy explain some of the heightened concern about genetic privacy. Discussion of the debate over genetic testing within families illustrates the most recent response to genetic privacy concerns.

  4. 78 FR 44931 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2013-07-25

    ...), as amended. This system will provide DLA installations with the ability to rapidly and effectively... Defense Privacy and Civil Liberties Web site at http://dpclo.defense.gov/privacy/SORNs/component/dla/index...: First name, last name, work email, work phone number, mobile phone number, short message service (SMS...

  5. 76 FR 67155 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2011-10-31

    ... inventory of record systems subject to the Privacy Act of 1974 (5 U.S.C. 552a), as amended. DATES: The... Federal Register Liaison Officer, Department of Defense. N05000-1 System name: OPNAV Headquarters Web... DEPARTMENT OF DEFENSE Department of the Navy [Docket ID USN-2011-0015] Privacy Act of 1974; System...

  6. 76 FR 52320 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2011-08-22

    ... & Privacy, and DoD Information Assurance Regulations. Auditing: Audit trail records from all available.../JS Privacy Office, Freedom of Information Directorate, Washington Headquarters Services, 1155 Defense... Defense. DHA 23 System name: Pharmacy Data Transaction Service (PDTS). System location: Primary: Emdeon...

  7. 78 FR 69076 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2013-11-18

    ... Medical Human Resources System internet (DMHRSi). DHA 12 EDHA 12 Third Party Collection System. DHA 16 DoD... DEPARTMENT OF DEFENSE Office of the Secretary [Docket ID: DoD-2013-OS-0216] Privacy Act of 1974... Defense Health Agency's compilation of Privacy Act SORNS. The realignment of the nineteen system...

  8. 75 FR 77849 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2010-12-14

    ... Agency, Defense Threat Reduction Agency, Missile Defense Organization, Pentagon Force Protection Agency... DEPARTMENT OF DEFENSE Office of the Secretary [Docket ID: DOD-2010-OS-0160] Privacy Act of 1974; System of Records AGENCY: Office of the Secretary of Defense, DoD. ACTION: Notice to add a system of...

  9. 76 FR 63896 - Federal Acquisition Regulation; Privacy Training, 2010-013

    Science.gov (United States)

    2011-10-14

    ... should a breach occur; and (7) Any agency-specific privacy training requirements. (d) The contractor is... Acquisition Regulation; Privacy Training, 2010-013 AGENCY: Department of Defense (DoD), General Services... contractors to complete training that addresses the protection of privacy, in accordance with the Privacy Act...

  10. Defense Health Program Financial Reporting of General Property, Plant, and Equipment

    National Research Council Canada - National Science Library

    Lane, F

    2000-01-01

    .... The DoD Agency Wide financial statements include financial statements for a reporting entity called "Other Defense Organizations," a consolidation of financial information from various Defense...

  11. Civil Defense, U. S. A.: A Programmed Orientation to Civil Defense. Unit 2. Nuclear Weapons Effects and Shelter.

    Science.gov (United States)

    Defense Civil Preparedness Agency (DOD), Battle Creek, MI.

    Basic information about nuclear weapons is presented so that their effects can be meaningfully related to the defensive countermeasures which will be most effective against them. Major topics include: (1) Explosive power of nuclear weapons, (2) Major effects of nuclear explosions, (3) Two basic types of nuclear explosions, (4) Contrast between air…

  12. The WIPP research and development program: providing the technical basis for defense waste disposal

    International Nuclear Information System (INIS)

    Hunter, Th.O.

    1983-01-01

    The Waste Isolation Pilot Plant (WIPP), located in southeastern New Mexico, is being developed by the US Department of Energy as a research and development facility to demonstrate the safe disposal of radioactive wastes from the defense programs of the United States. Underground workings are at a depth of 660 in a bedded-salt formation. Site investigations began in the early 1970s and are culminating with the completion of the Site and Preliminary Design Validation (SPDV) program in 1983 in which two shafts and several thousand feet of underground drifts are being constructed. The underground facility will be used for in situ tests and demonstrations that address technical issues associated with the disposal of transuranic and defense high-level wastes (DHLW) in bedded salt. These tests are based on several years of laboratory tests, field tests in mines, and analytical modeling studies. They primarily address repository development in bedded salt, including thermal-structural interactions plugging and sealing, and facility operations; and waste package interactions, including the effects of the waste on local rock salt and the evaluation of waste package materials. In situ testing began in the WIPP with the initiation of the SPDV program in 1981. In 1983, a major series of tests will begin to investigate the response of the rock salt without the use of any radioactivity

  13. 77 FR 27108 - Privacy Act of 1974, as Amended; Computer Matching Program (SSA/Office of Child Support...

    Science.gov (United States)

    2012-05-08

    ...: Social Security Administration (SSA). ACTION: Notice of a renewal of an existing computer matching... protections for such persons. The Privacy Act, as amended, regulates the use of computer matching by Federal... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA 2012-0010] Privacy Act of 1974, as Amended...

  14. 78 FR 12127 - Privacy Act of 1974, as Amended; Computer Matching Program (SSA/Department of the Treasury...

    Science.gov (United States)

    2013-02-21

    ... 1310 AGENCY: Social Security Administration (SSA). ACTION: Notice of a renewal of an existing computer..., as shown above. SUPPLEMENTARY INFORMATION: A. General The Computer Matching and Privacy Protection... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA 2013-0007] Privacy Act of 1974, as Amended...

  15. 75 FR 51154 - Privacy Act of 1974, as Amended; Computer Matching Program (SSA/Department of the Treasury...

    Science.gov (United States)

    2010-08-18

    ... 1310 AGENCY: Social Security Administration (SSA) ACTION: Notice of a renewal of an existing computer..., as shown above. SUPPLEMENTARY INFORMATION: A. General The Computer Matching and Privacy Protection... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA 2010-0035] Privacy Act of 1974, as Amended...

  16. 77 FR 49849 - Privacy Act of 1974, as Amended; Computer Matching Program (SSA/Office of Child Support...

    Science.gov (United States)

    2012-08-17

    ...: Social Security Administration (SSA). ACTION: Notice of a renewal of an existing computer-matching... INFORMATION: A. General The Computer Matching and Privacy Protection Act of 1988 (Public Law (Pub. L.) 100-503... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA 2012-0021] Privacy Act of 1974, as Amended...

  17. 78 FR 51264 - Privacy Act of 1974, as Amended; Computer Matching Program (SSA/Department of the Treasury...

    Science.gov (United States)

    2013-08-20

    ... 1016 AGENCY: Social Security Administration (SSA). ACTION: Notice of a renewal of an existing computer... above. SUPPLEMENTARY INFORMATION: A. General The Computer Matching and Privacy Protection Act of 1988... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA 2013-0022] Privacy Act of 1974, as Amended...

  18. 76 FR 21091 - Privacy Act of 1974, as Amended; Computer Matching Program (SSA/Centers for Medicare & Medicaid...

    Science.gov (United States)

    2011-04-14

    ...: Social Security Administration (SSA). ACTION: Notice of a renewal of an existing computer matching...: A. General The Computer Matching and Privacy Protection Act of 1988 (Public Law (Pub. L.) 100-503...), as amended, (Pub. L. 100-503, the Computer Matching and Privacy Protection Act (CMPPA) of 1988), the...

  19. 78 FR 69926 - Privacy Act of 1974, as Amended; Computer Matching Program (SSA/Centers for Medicare & Medicaid...

    Science.gov (United States)

    2013-11-21

    ...: Social Security Administration (SSA). ACTION: Notice of a renewal of an existing computer matching... INFORMATION: A. General The Computer Matching and Privacy Protection Act of 1988 (Pub. L 100-503), amended the... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA 2013-0059] Privacy Act of 1974, as Amended...

  20. 78 FR 16564 - Privacy Act of 1974, as Amended; Computer Matching Program (SSA/Office of Personnel Management...

    Science.gov (United States)

    2013-03-15

    ... 1021 AGENCY: Social Security Administration (SSA). ACTION: Notice of a renewal of existing computer... above. SUPPLEMENTARY INFORMATION: A. General The Computer Matching and Privacy Protection Act of 1988... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA 2012-0073] Privacy Act of 1974, as Amended...

  1. Programs that support non-proliferation and defense conversion funded by the US Government

    International Nuclear Information System (INIS)

    Rutkowski, H.L.

    1994-08-01

    The proliferation of nuclear, chemical, and biological weapons is a serious problem for international security. Consequently the U.S. government has established an array of programs to fund activities that will inhibit this activity. The problem of proliferation and defense conversion, in general, is quite complicated. The most immediate concern is the actual diversion of weapons materials. In the long term; however, weapons of mass destruction must be destroyed in a safe and environmentally sound manner. Ultimately the solution of the proliferation problem lies in the redirection of the intellectual skills of weapons scientists and engineers to peaceful commercial activities. At the present time the economic conditions in the New Independent States create severe pressure on people with critical weapons knowledge to sell their skills to political entities that are dangerous. There are four programs to be discussed in this paper. The first is the open-quotes Nunn-Lugarclose quotes program which is the largest and is administered by the Department of Defense. Between FY92 and FY94 Congress authorized $1.2B for this activity which is aimed at weapons destruction, storage, and safeguards. The second is the International Science and Technology Center in Moscow and the Science Center about to open in Ukraine. These are joint efforts involving the U.S., the European Community, and Japan to fund projects to prevent proliferation and foster commercial technological activity in Russia, Georgia, and Ukraine. The New Independent States - Industrial Partnering Program is a $35M (FY94) program jointly administered by the Department of Energy and the Department of State

  2. 78 FR 31955 - Privacy Act of 1974; Department of Homeland Security National Protection and Programs Directorate...

    Science.gov (United States)

    2013-05-28

    ... 1974; Department of Homeland Security National Protection and Programs Directorate--001 Arrival and... of records titled Department of Homeland Security/National Protection and Programs Directorate--001... of 1974, 5 U.S.C. 552a, the Department of Homeland Security (DHS) National Protection and Programs...

  3. Study of flood defense structural measures priorities using Compromise Programming technique

    Science.gov (United States)

    Lim, D.; Jeong, S.

    2017-12-01

    Recent climate change of global warming has led to the frequent occurrence of heavy regional rainfalls. As such, inundation vulnerability increases in urban areas with high population density due to the low runoff carrying capacity. This study selects a sample area (Janghang-eup, the Republic of Korea), which is one of the most vulnerable areas to flooding, analyzing the urban flood runoff model (XP-SWMM) and using the MCDM (Multi-Criteria Decision Making) technique to establish flood protection structural measures. To this end, we compare the alternatives and choose the optimal flood defense measure: our model is utilized with three flood prevention structural measures; (i) drainage pipe construction; (ii) water detention; and (iii) flood pumping station. Dividing the target area into three small basins, we propose flood evaluations for an inundation decrease by studying the flooded area, the maximum inundation depth, the damaged residential area, and the construction cost. In addition, Compromise Programming determines the priority of the alternatives. As a consequent, this study suggests flood pumping station for Zone 1 and drainage pipe construction for Zone 2 and Zone 3, respectively, as the optimal flood defense alternative. Keywords : MCDM; Compromise Programming; Urban Flood Prevention; This research was supported by a grant [MPSS-DP-2013-62] through the Disaster and Safety Management Institute funded by Ministry of Public Safety and Security of Korean government.

  4. Safe shutdown of Defense Program facilities at the Mound Plant, Miamisburg, Ohio

    International Nuclear Information System (INIS)

    Anderson, H.F.; Bantz, P.D.; Luthy, D.F.

    1996-01-01

    The Mound Plant was one of several production sites in the US Department of Energy's Defense Programs (DP) Weapons Complex. As a result of the downsizing of the weapons program, certain operations at Mound are being transferred to other DOE sites and the DP buildings at Mound are being shutdown. The objectives of the program are to reduce the hazardous and financial liabilities to DOE and to foster the reuse of facilities for economic development. The overall program is described. The process began with the categorization of excess DP buildings into three groups depending on their anticipated future use. The draft DOE/EM-60 Acceptance Criteria were used to develop a detailed shutdown checklist as the foundation of the process. The overall program budget, schedule, ad options for disposition of materials and components is presented. Accomplishments in FY94 and FY95 are described. By the end of FY95, all excess energetic materials and components, all excess chemicals (from non-radiation areas) and significant amounts of radioactive materials have been removed from the site. By the end of FY95, 47 of the 72 buildings in the program have been taken through all ten of the draft EM-60 acceptance criteria. Lessons learned, based on experience at Mound to date, are summarized

  5. 32 CFR 701.125 - Computer matching program.

    Science.gov (United States)

    2010-07-01

    ... counterintelligence matches done in the course of performing a background check for security clearances of Federal... 32 National Defense 5 2010-07-01 2010-07-01 false Computer matching program. 701.125 Section 701... OF THE NAVY DOCUMENTS AFFECTING THE PUBLIC DON Privacy Program § 701.125 Computer matching program...

  6. Privacy Act

    Science.gov (United States)

    Learn about the Privacy Act of 1974, the Electronic Government Act of 2002, the Federal Information Security Management Act, and other information about the Environmental Protection Agency maintains its records.

  7. Privacy Act System of Records: Employee Counseling and Assistance Program Records, EPA-27

    Science.gov (United States)

    Learn about the Employee Counseling and Assistance Program Records System, including who is covered in the system, the purpose of data collection, routine uses for the system's records, and other security procedures.

  8. Concentrated Differential Privacy

    OpenAIRE

    Dwork, Cynthia; Rothblum, Guy N.

    2016-01-01

    We introduce Concentrated Differential Privacy, a relaxation of Differential Privacy enjoying better accuracy than both pure differential privacy and its popular "(epsilon,delta)" relaxation without compromising on cumulative privacy loss over multiple computations.

  9. Overview of the Defense Programs Research and Technology Development Program for Fiscal Year 1993

    Energy Technology Data Exchange (ETDEWEB)

    1993-09-30

    This documents presents a programmatic overview and program element plan summaries for conceptual design and assessment; physics; computation and modeling; system engineering science and technology; electronics, photonics, sensors, and mechanical components; chemistry and materials; special nuclear materials, tritium, and explosives.

  10. Defense Small Business Innovation Research Program (SBIR). Volume 4. Defense Agencies Abstracts of Phase 1 Awards. 1990

    Science.gov (United States)

    1990-01-01

    RI 02871 Program Manager: T. DEEGAN Contract #: Title: LF DETECTION OF AIRCRAFT Topic #: DARPA90-049 Office: ID #: 50506 TECHNICAL ABSTRACT - COMBAT...INNOVATION RESEARCH PROGRAM - PHASE I SDIO Solicitation 90.1 TORRANCE, CA 90505 Program Manager: JAMES E CRAIG Contract #: Title: NONINTRUSIVE OPTICAL

  11. 78 FR 29786 - Computer Matching and Privacy Protection Act of 1988; Report of Matching Program: RRB and State...

    Science.gov (United States)

    2013-05-21

    ... required by the Privacy Act of 1974, as amended, the RRB is issuing a public notice in the Federal Register... benefits under the Railroad Retirement Act that the RRB plans to share this computer matching data with...

  12. NATO and U.S. Ballistic Missile Defense Programs: Divergent or Convergent Paths?

    National Research Council Canada - National Science Library

    Toms, Kevin E

    2008-01-01

    ...) information network to support the Theater Missile Defense (TMD) capabilities of specific Allies for the protection of forward deployed troops, and studies of the feasibility and political-military implications of Ballistic Missile Defense (BMD...

  13. DHS Office of Health Affairs Chemical Defense Program Analyzes Subway Safety Against Chemical Terrorist Threats

    OpenAIRE

    Center for Homeland Defense and Security

    2012-01-01

    Center for Homeland Defense and Security, OUT OF THE CLASSROOM In an article for the journal Domestic Preparedness, Joselito Ignacio examines how to protect subway riders from chemical attacks. Ignacio graduated from the Center for Homeland Defense and Security in...

  14. The Role of the Army Reserve in the Weapons of Mass Destruction/Homeland Defense Program

    National Research Council Canada - National Science Library

    Smith, Joseph

    2000-01-01

    ... attack. Given these increasing threats to the territory, population, and infrastructure of the United States, the Army Reserve should have an expanded role in providing homeland defense capabilities. The Army Reserve is well suited to homeland defense missions.

  15. 77 FR 35432 - Privacy Act of 1974, Computer Matching Program: United States Postal Service and the Defense...

    Science.gov (United States)

    2012-06-13

    ... system for permanent employees in a current pay status. USPS will validate the identification of the RC... the USPS Payroll reply file where inconsistencies exist. Any discrepancies as furnished by USPS...

  16. Online Privacy as a Corporate Social Responsibility

    DEFF Research Database (Denmark)

    Pollach, Irene

    2011-01-01

    Information technology and the Internet have added a new stakeholder concern to the corporate social responsibility agenda: online privacy. While theory suggests that online privacy is a corporate social responsibility, only very few studies in the business ethics literature have connected...... of the companies have comprehensive privacy programs, although more than half of them voice moral or relational motives for addressing online privacy. The privacy measures they have taken are primarily compliance measures, while measures that stimulate a stakeholder dialogue are rare. Overall, a wide variety...

  17. An Analysis of the Relationship Between the Professionalism of Defense Acquisition Program Managers and Program Outcomes

    Science.gov (United States)

    2011-11-30

    concerns with profitability (Bartel, 2000; Phillips, 1996) or by HR specialists’ concerns to justify their budgets ( Geber , 1996; Institute of...Program, Naval Postgraduate School, Monterey, CA. Geber , B. (1996). Does training make a difference? Prove it! Training, 32(3), 27–34. General Accounting

  18. 76 FR 114 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2011-01-03

    ...; System of Records AGENCY: Defense Contract Audit Agency, DoD. ACTION: Notice to amend a system of records. SUMMARY: The Defense Contract Audit Agency is proposing to amend a system of records notice in its... INFORMATION: The Defense Contract Audit Agency systems of records notices subject to the Privacy Act of 1974...

  19. 77 FR 75621 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2012-12-21

    ...; System of Records AGENCY: Defense Contract Audit Agency, DoD. ACTION: Notice to amend a System of Records. SUMMARY: The Defense Contract Audit Agency is amending a system of records notice in its existing.... SUPPLEMENTARY INFORMATION: The Defense Contract Audit Agency systems of records notices subject to the Privacy...

  20. 76 FR 115 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2011-01-03

    ...; System of Records AGENCY: Defense Contract Audit Agency, DoD. ACTION: Notice to amend a system of records. SUMMARY: The Defense Contract Audit Agency is proposing to amend a system of records notice in its... INFORMATION: The Defense Contract Audit Agency systems of records notices subject to the Privacy Act of 1974...

  1. 77 FR 77048 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2012-12-31

    ...; System of Records AGENCY: Defense Contract Audit Agency, DoD. ACTION: Notice to amend a System of Records. SUMMARY: The Defense Contract Audit Agency is amending a system of records notice in its existing.... SUPPLEMENTARY INFORMATION: The Defense Contract Audit Agency systems of records notices subject to the Privacy...

  2. 78 FR 79412 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2013-12-30

    ... Defense Finance and Accounting Service proposes to alter a system of records, T7205, General Accounting... transaction-driven financial statements in support of Defense Finance and Accounting Service financial mission... INFORMATION: The Defense Finance and Accounting Service notices for systems of records subject to the Privacy...

  3. 78 FR 27195 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2013-05-09

    ...; System of Records AGENCY: Defense Finance and Accounting Service, DoD. ACTION: Notice to delete two Systems of Records. SUMMARY: The Defense Finance and Accounting Service is deleting two systems of records...: The Defense Finance and Accounting Service systems of records notices subject to the Privacy Act of...

  4. 78 FR 27194 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2013-05-09

    ...; System of Records AGENCY: Defense Finance and Accounting Service, DoD. ACTION: Notice to delete two Systems of Records. SUMMARY: The Defense Finance and Accounting Service is deleting two systems of records...: The Defense Finance and Accounting Service systems of records notices subject to the Privacy Act of...

  5. 78 FR 69392 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2013-11-19

    ...; System of Records AGENCY: Defense Finance and Accounting Service, DoD. ACTION: Notice to delete a system of records. SUMMARY: The Defense Finance and Accounting Service is deleting a system of records... INFORMATION: The Defense Finance and Accounting Service systems of records notices subject to the Privacy Act...

  6. 78 FR 47309 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2013-08-05

    ...; System of Records AGENCY: Defense Finance and Accounting Service, DoD. ACTION: Notice to amend a System of Records. SUMMARY: The Defense Finance and Accounting Service proposes to alter a system of records... Defense Finance and Accounting Service systems of records notices subject to the Privacy Act of 1974 (5 U...

  7. A Failure to "Do No Harm" -- India's Aadhaar biometric ID program and its inability to protect privacy in relation to measures in Europe and the U.S.

    Science.gov (United States)

    Dixon, Pam

    2017-01-01

    It is important that digital biometric identity systems be used by governments with a Do no Harm mandate, and the establishment of regulatory, enforcement and restorative frameworks ensuring data protection and privacy needs to transpire prior to the implementation of technological programs and services. However, when, and where large government bureaucracies are involved, the proper planning and execution of public service programs very often result in ungainly outcomes, and are often qualitatively not guaranteeable. Several important factors, such as the strength of the political and legal systems, may affect such cases as the implementation of a national digital identity system. Digital identity policy development, as well as technical deployment of biometric technologies and enrollment processes, may all differ markedly, and could depend in some part at least, on the overall economic development of the country in question, or political jurisdiction, among other factors. This article focuses on the Republic of India's national digital biometric identity system, the Aadhaar , for its development, data protection and privacy policies, and impact. Two additional political jurisdictions, the European Union, and the United States are also situationally analyzed as they may be germane to data protection and privacy policies originated to safeguard biometric identities. Since biometrics are foundational elements in modern digital identity systems, expression of data protection policies that orient and direct how biometrics are to be utilized as unique identifiers are the focus of this analysis. As more of the world's economies create and elaborate capacities, capabilities and functionalities within their respective digital ambits, it is not enough to simply install suitable digital identity technologies; much, much more - is durably required. For example, both vigorous and descriptive means of data protection should be well situated within any jurisdictionally relevant

  8. Advanced research in data privacy

    CERN Document Server

    Torra, Vicenç

    2015-01-01

    This book provides an overview of the research work on data privacy and privacy enhancing technologies carried by the participants of the ARES project. ARES (Advanced Research in Privacy an Security, CSD2007-00004) has been one of the most important research projects funded by the Spanish Government in the fields of computer security and privacy. It is part of the now extinct CONSOLIDER INGENIO 2010 program, a highly competitive program which aimed to advance knowledge and open new research lines among top Spanish research groups. The project started in 2007 and will finish this 2014. Composed by 6 research groups from 6 different institutions, it has gathered an important number of researchers during its lifetime. Among the work produced by the ARES project, one specific work package has been related to privacy. This books gathers works produced by members of the project related to data privacy and privacy enhancing technologies. The presented works not only summarize important research carried in the proje...

  9. Program Manager: Journal of the Defense Systems Management College. Volume 22, Number 3, May-June 1993

    Science.gov (United States)

    1993-06-01

    lr __________ r onM eth S()4 Greg Caruth _________________ William J. Perry, Typography and Design DEPSECDEF 43 Paula Croisetlere 3 Program Manager...the DSMC Press to be such a link to the govern- for publication consideration in either the brand ment and private sector defense acquisition com- new

  10. THE PLANNING, PROGRAMING, BUDGETING SYSTEM AND ITS IMPLEMENTATION IN THE SERBIAN MINISTRY OF DEFENSE

    Directory of Open Access Journals (Sweden)

    Sasa RADUSKI

    2010-01-01

    Full Text Available The main purpose of introducing the PPBES to the Serbian Ministry of Defense and the Serbian Armed Forces is to provide a rational management of resources and to maintain and build capacity of the Ministry and the Serbian Armed Forces in order to achieve their goals, objectives and missions.Expected results of implementation of the PPBES are reflected in increasing the efficiency and rationalization of the defense planning to a higher level, ensuring compatibility with defense planning and budgeting system of the state and developing a foundation for the effective management of defense resources.

  11. 78 FR 21600 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2013-04-11

    ... DEPARTMENT OF DEFENSE Office of the Secretary [Docket ID: DoD-2013-OS-0050] Privacy Act of 1974... notice in its existing inventory of record systems subject to the Privacy Act of 1974 (5 U.S.C. 552a), as... members of the public is to make these submissions available for public viewing on the Internet at http...

  12. 75 FR 22569 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2010-04-29

    ... DEPARTMENT OF DEFENSE Department of the Air Force [Docket ID: USAF-2010-0014] Privacy Act of 1974... inventory of record systems subject to the Privacy Act of 1974, (5 U.S.C. 552a), as amended. DATES: This... Internet at http://www.regulations.gov as they are received without change, including any personal...

  13. 76 FR 10010 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2011-02-23

    ... DEPARTMENT OF DEFENSE Office of the Secretary [Docket ID: DOD-2011-OS-0020] Privacy Act of 1974... inventory of records systems subject to the Privacy Act of 1974 (5 U.S.C. 552a), as amended. DATES: This... the public is to make these submissions available for public viewing on the Internet at http://www...

  14. 78 FR 52517 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2013-08-23

    ... DEPARTMENT OF DEFENSE Office of the Secretary [Docket ID DoD-2013-OS-0183] Privacy Act of 1974... systems subject to the Privacy Act of 1974 (5 U.S.C. 552a), as amended. DATES: This proposed action will... public is to make these submissions available for public viewing on the Internet at http://www...

  15. 75 FR 22570 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2010-04-29

    ... DEPARTMENT OF DEFENSE Department of the Air Force [Docket ID: USAF-2010-0012] Privacy Act of 1974... inventory of record systems subject to the Privacy Act of 1974, (5 U.S.C. 552a), as amended. DATES: This... on the Internet at http://www.regulations.gov as they are received without change, including any...

  16. 76 FR 53420 - Privacy Act of 1974; Systems of Records

    Science.gov (United States)

    2011-08-26

    ... DEPARTMENT OF DEFENSE Office of the Secretary [Docket ID: DOD-2011-OS-0097] Privacy Act of 1974... notice in its existing inventory of records systems subject to the Privacy Act of 1974, (5 U.S.C. 552a... submissions available for public viewing on the Internet at http://www.regulations.gov as they are [[Page...

  17. 76 FR 11213 - Privacy Act of 1974; Systems of Records

    Science.gov (United States)

    2011-03-01

    ... DEPARTMENT OF DEFENSE Office of the Secretary [Docket ID DOD-2011-OS-0017] Privacy Act of 1974... inventory of records systems subject to the Privacy Act of 1974 (5 U.S.C. 552a), as amended. DATES: This... public is of make these submissions available for public viewing on the Internet at http://www...

  18. 77 FR 37002 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2012-06-20

    ... DEPARTMENT OF DEFENSE Office of the Secretary [Docket ID: DOD-2012-OS-0072] Privacy Act of 1974... inventory of record systems subject to the Privacy Act of 1974 (5 U.S.C. 552a), as amended. DATES: This... available for public viewing on the Internet at http://www.regulations.gov as they are received without...

  19. 76 FR 63611 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2011-10-13

    ... DEPARTMENT OF DEFENSE Department of the Army [Docket ID: USA-2011-0025] Privacy Act of 1974... existing inventory of record systems subject to the Privacy Act of 1974, (5 U.S.C. 552a), as amended. DATES... submissions available for public viewing on the Internet at http:// [[Page 63612

  20. 76 FR 43993 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2011-07-22

    ... DEPARTMENT OF DEFENSE Office of the Secretary [Docket ID: DOD-2011-OS-0081] Privacy Act of 1974... the Privacy Act of 1974, (5 U.S.C. 552a), as amended. DATES: This proposed action would be effective... the public is to make these submissions available for public viewing on the Internet at http://www...

  1. 75 FR 39921 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2010-07-13

    ... DEPARTMENT OF DEFENSE Office of the Secretary [Docket ID: DOD-2010-OS-0102] Privacy Act of 1974... inventory of records systems subject to the Privacy Act of 1974, (5 U.S.C. 552a), as amended. DATES: This... on the Internet at http://www.regulations.gov as they are received without change, including any...

  2. 78 FR 43869 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2013-07-22

    ... DEPARTMENT OF DEFENSE Department of the Navy [Docket ID USN-2013-0025] Privacy Act of 1974; System... systems subject to the Privacy Act of 1974 (5 U.S.C. 552a), as amended. DATES: This proposed action will... submissions available for public viewing on the Internet at http://www.regulations.gov as they are received...

  3. 75 FR 17910 - Privacy Act of 1974; Systems of Records

    Science.gov (United States)

    2010-04-08

    ... DEPARTMENT OF DEFENSE Office of the Secretary [Docket ID: DOD-2010-OS-0040] Privacy Act of 1974... inventory of records systems subject to the Privacy Act of 1974, (5 U.S.C. 552a), as amended. DATES: This... viewing on the Internet at http://www.regulations.gov as they are received without change, including any...

  4. 76 FR 10008 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2011-02-23

    ... DEPARTMENT OF DEFENSE Office of the Secretary [Docket ID: DOD-2011-OS-0023] Privacy Act of 1974... inventory of record systems subject to the Privacy Act of 1974, (5 U.S.C. 552a), as amended. DATES: This... from members of the public is to make these submissions available for public viewing on the Internet at...

  5. 76 FR 66698 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2011-10-27

    ... DEPARTMENT OF DEFENSE Office of the Secretary [Docket ID: DOD-2011-OS-0117] Privacy Act of 1974... notice from its existing inventory of record systems subject to the Privacy Act of 1974, (5 U.S.C. 552a... submissions available for public viewing on the Internet at http://www.regulations.gov as they are received...

  6. 75 FR 52517 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2010-08-26

    ... DEPARTMENT OF DEFENSE Office of the Secretary [Docket ID DOD-2010-OS-0117] Privacy Act of 1974... existing inventory of record systems subject to the Privacy Act of 1974, (5 U.S.C. 552a), as amended. DATES... available for public viewing on the Internet at http://www.regulations.gov as they are received without...

  7. 75 FR 33789 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2010-06-15

    ... DEPARTMENT OF DEFENSE Office of the Secretary [Docket ID: DOD-2010-OS-0078] Privacy Act of 1974... existing inventory of record systems subject to the Privacy Act of 1974, (5 U.S.C. 552a), as amended. DATES... on the Internet at http://www.regulations.gov as they are received without change, including any...

  8. 78 FR 31905 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2013-05-28

    ... DEPARTMENT OF DEFENSE Office of the Secretary [Docket ID: DoD-2013-OS-0110] Privacy Act of 1974... notice in its existing inventory of record systems subject to the Privacy Act of 1974 (5 U.S.C. 552a), as... members of the public is to make these submissions available for public viewing on the Internet at http...

  9. 76 FR 45543 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2011-07-29

    ... DEPARTMENT OF DEFENSE Office of the Secretary [Docket ID: DOD-2011-OS-0082] Privacy Act of 1974... subject to the Privacy Act of 1974, (5 U.S.C. 552a), as amended. DATES: This proposed action will be... the public is to make these submissions available for public viewing on the Internet at http://www...

  10. 77 FR 65539 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2012-10-29

    ... DEPARTMENT OF DEFENSE Office of the Secretary [Docket ID: DoD-2012-OS-0132] Privacy Act of 1974... existing inventory of record systems subject to the Privacy Act of 1974 (5 U.S.C. 552a), as amended. [[Page... Internet at http://www.regulations.gov as they are received without change, including any personal...

  11. 75 FR 67703 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2010-11-03

    ... DEPARTMENT OF DEFENSE Department of the Army [Docket ID USA-2010-0024] Privacy Act of 1974; System... record systems subject to the Privacy Act of 1974, (5 U.S.C. 552a), as amended. DATES: This proposed... the public is to make these submissions available for public viewing on the Internet at http://www...

  12. 77 FR 60412 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2012-10-03

    ... DEPARTMENT OF DEFENSE Department of the Army [Docket ID USA-2012-0012] Privacy Act of 1974; System... systems subject to the Privacy Act of 1974, (5 U.S.C. 552a), as amended. DATES: This proposed action will... submissions available for public viewing on the Internet at http://www.regulations.gov as they are received...

  13. 76 FR 70428 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2011-11-14

    ... DEPARTMENT OF DEFENSE Office of the Secretary [Docket ID: DOD-2011-OS-0120] Privacy Act of 1974... notice from its existing inventory of record systems subject to the Privacy Act of 1974, (5 U.S.C. 552a... submissions available for public viewing on the Internet at http://www.regulations.gov as they are received...

  14. 76 FR 62394 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2011-10-07

    ... DEPARTMENT OF DEFENSE Office of the Secretary [Docket ID: DOD-2011-OS-0109] Privacy Act of 1974... notice from its existing inventory of record systems subject to the Privacy Act of 1974 (5 U.S.C. 552a... public is to make these submissions available for public viewing on the Internet at http://www...

  15. 75 FR 10476 - Privacy Act of 1974; Systems of Records

    Science.gov (United States)

    2010-03-08

    ... DEPARTMENT OF DEFENSE Office of the Secretary [Docket ID DOD-2010-OS-0021] Privacy Act of 1974... inventory of records systems subject to the Privacy Act of 1974, (5 U.S.C. 552a), as amended. DATES: This... on the Internet at http://www.regulations.gov as they are received without change, including any...

  16. 76 FR 37329 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2011-06-27

    ... DEPARTMENT OF DEFENSE Department of the Air Force [Docket ID: USAF-2011-0018] Privacy Act of 1974... of record systems subject to the Privacy Act of 1974 (5 U.S.C. 552a), as amended. DATES: This... public is to make these submissions available for public viewing on the Internet at http://www...

  17. 76 FR 1409 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2011-01-10

    ... DEPARTMENT OF DEFENSE Office of the Secretary [Docket ID: DOD-2011-OS-0001] Privacy Act of 1974... inventory of record systems subject to the Privacy Act of 1974, (5 U.S.C. 552a), as amended. DATES: This... from members of the public is to make these submissions available for public viewing on the Internet at...

  18. 75 FR 81247 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2010-12-27

    ... DEPARTMENT OF DEFENSE Office of the Secretary [Docket ID DOD-2010-OS-0168] Privacy Act of 1974... inventory of records systems subject to the Privacy Act of 1974, (5 U.S.C. 552a), as amended. DATES: This... public is to make these submissions available for public viewing on the Internet at http://www...

  19. 76 FR 22682 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2011-04-22

    ... DEPARTMENT OF DEFENSE Office of the Secretary [Docket ID DOD-2011-OS-0044] Privacy Act of 1974... inventory of record systems subject to the Privacy Act of 1974, (5 U.S.C. 552a), as amended. DATES: This... from members of the public is to make these submissions available for public viewing on the Internet at...

  20. 78 FR 73511 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2013-12-06

    ... DEPARTMENT OF DEFENSE [Docket ID: USN-2013-0046] Privacy Act of 1974; System of Records AGENCY... Privacy Act of 1974, as amended. The system being deleted is N01500-8, System Name: Personnel and Training... Internet at http://www.regulations.gov as they are received without change, including any personal...

  1. 75 FR 29728 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2010-05-27

    ... DEPARTMENT OF DEFENSE Office of the Secretary [Docket ID: DOD-2010-OS-0067] Privacy Act of 1974... existing inventory of record systems subject to the Privacy Act of 1974, (5 U.S.C. 552a), as amended. DATES... on the Internet at http://www.regulations.gov as they are received without change, including any...

  2. 76 FR 1411 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2011-01-10

    ... DEPARTMENT OF DEFENSE Department of the Air Force [Docket ID: USAF-2011-0001] Privacy Act of 1974... of record systems subject to the Privacy Act of 1974, (5 U.S.C. 552a), as amended. DATES: This... the public is to make these submissions available for public viewing on the Internet at http://www...

  3. 78 FR 6078 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2013-01-29

    ... DEPARTMENT OF DEFENSE Office of the Secretary [Docket ID: DoD-2013-OS-0011] Privacy Act of 1974... record systems subject to the Privacy Act of 1974 (5 U.S.C. 552a), as amended. DATES: This proposed... public is to make these submissions available for public viewing on the Internet at http:// [[Page 6079...

  4. 77 FR 37885 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2012-06-25

    ... DEPARTMENT OF DEFENSE Office of the Secretary [Docket ID DOD-2012-OS-0074] Privacy Act of 1974... existing inventory of record systems subject to the Privacy Act of 1974 (5 U.S.C. 552a), as amended. DATES... available for public viewing on the Internet at http://www.regulations.gov as they are received without...

  5. 78 FR 60265 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2013-10-01

    ... DEPARTMENT OF DEFENSE Office of the Secretary [Docket ID DoD-2013-OS-0201] Privacy Act of 1974... inventory of record systems subject to the Privacy Act of 1974, as amended. DATES: This proposed action will... submissions available for public viewing on the Internet at http://www.regulations.gov as they are received...

  6. 76 FR 60008 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2011-09-28

    ... DEPARTMENT OF DEFENSE Department of the Army [Docket ID USA-2011-0023] Privacy Act of 1974; System... existing inventory of record systems subject to the Privacy Act of 1974, (5 U.S.C. 552a), as amended... submissions available for public viewing on the Internet at http://www.regulations.gov as they are received...

  7. 76 FR 82286 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2011-12-30

    ... DEPARTMENT OF DEFENSE Department of the Army [Docket ID USA-2011-0028] Privacy Act of 1974; System... record systems subject to the Privacy Act of 1974 (5 U.S.C. 552a), as amended. DATES: This proposed... available for public viewing on the Internet at http://www.regulations.gov as they are received without...

  8. 75 FR 16760 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2010-04-02

    ... DEPARTMENT OF DEFENSE Office of the Secretary [Docket ID: DOD-2010-OS-0037] Privacy Act of 1974... inventory of record systems subject to the Privacy Act of 1974 (5 U.S.C. 552a), as amended. DATES: This... on the Internet at http://www.regulations.gov as they are received without change, including any...

  9. 75 FR 17910 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2010-04-08

    ... DEPARTMENT OF DEFENSE Department of the Navy [Docket ID: USN-2010-0007] Privacy Act of 1974... inventory of record systems subject to the Privacy Act of 1974, (5 U.S.C. 552a), as amended. DATES: This... viewing on the Internet at http://www.regulations.gov as they are received without change, including any...

  10. 78 FR 5788 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2013-01-28

    ... DEPARTMENT OF DEFENSE Office of the Secretary [Docket ID: DoD-2013-OS-0005] Privacy Act of 1974... of record systems subject to the Privacy Act of 1974 (5 U.S.C. 552a), as amended. DATES: This... of the public is to make these submissions available for public viewing on the Internet at http://www...

  11. 77 FR 60400 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2012-10-03

    ... DEPARTMENT OF DEFENSE Office of the Secretary [Docket ID DOD-2012-OS-0119] Privacy Act of 1974... inventory of record systems subject to the Privacy Act of 1974, (5 U.S.C. 552a(r)), as amended. DATES: This... public is to make these submissions available for public viewing on the Internet at http://www...

  12. 75 FR 33788 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2010-06-15

    ... DEPARTMENT OF DEFENSE Office of the Secretary [Docket ID: DOD-2010-OS-0077] Privacy Act of 1974... existing inventory of record systems subject to the Privacy Act of 1974, (5 U.S.C. 552a), as amended. DATES... on the Internet at http:// [[Page 33789

  13. 75 FR 63824 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2010-10-18

    ... DEPARTMENT OF DEFENSE Department of the Air Force [Docket ID: USAF-2010-0026] Privacy Act of 1974... inventory of record systems subject to the Privacy Act of 1974, (5 U.S.C. 552a), as amended. DATES: This... for public viewing on the Internet at http://www.regulations.gov as they are received without change...

  14. 75 FR 33794 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2010-06-15

    ... DEPARTMENT OF DEFENSE Department of the Army [Docket ID: USA-2010-0013] Privacy Act of 1974... inventory of record systems subject to the Privacy Act of 1974, (5 U.S.C. 552a), as amended. DATES: This... on the Internet at http://www.regulations.gov as they are received without change, including any...

  15. 75 FR 15694 - Privacy Act of 1974; Systems of Records

    Science.gov (United States)

    2010-03-30

    ... DEPARTMENT OF DEFENSE Office of the Secretary [Docket ID: DOD-2010-OS-0035] Privacy Act of 1974... inventory of records systems subject to the Privacy Act of 1974, (5 U.S.C. 552a), as amended. DATES: This... on the Internet at http://www.regulations.gov as they are received without change, including any...

  16. 75 FR 65456 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2010-10-25

    ... DEPARTMENT OF DEFENSE Office of the Secretary [Docket ID: DOD-2010-OS-0147] Privacy Act of 1974... existing inventory of record systems subject to the Privacy Act of 1974 (5 U.S.C. 552a), as amended. [[Page... available for public viewing on the Internet at http://www.regulations.gov as they are received without...

  17. 77 FR 26260 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2012-05-03

    ... DEPARTMENT OF DEFENSE Office of the Secretary [Docket ID DoD-2012-OS-0030] Privacy Act of 1974... inventory of records systems subject to the Privacy Act of 1974, (5 U.S.C. 552a), as amended. DATES: This... make these submissions available for public viewing on the Internet at http://www.regulations.gov as...

  18. 77 FR 66442 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2012-11-05

    ... DEPARTMENT OF DEFENSE Office of the Secretary [Docket ID: DoD-2012-OS-0133] Privacy Act of 1974... existing inventory of record systems subject to the Privacy Act of 1974 (5 U.S.C. 552a), as amended. DATES... Internet at http://www.regulations.gov as they are received without change, including any personal...

  19. 78 FR 14279 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2013-03-05

    ... DEPARTMENT OF DEFENSE Office of the Secretary [Docket ID DoD-2013-OS-0040] Privacy Act of 1974... of record systems subject to the Privacy Act of 1974 (5 U.S.C. 552a), as amended. DATES: This... of the public is to make these submissions available for public viewing on the Internet at http://www...

  20. 78 FR 14273 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2013-03-05

    ... DEPARTMENT OF DEFENSE Office of the Secretary [Docket ID DoD-2013-OS-0019] Privacy Act of 1974... record systems subject to the Privacy Act of 1974 (5 U.S.C. 552a), as amended. DATES: This proposed... public is to make these submissions available for public viewing on the Internet at http://www...

  1. 75 FR 3714 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2010-01-22

    ... DEPARTMENT OF DEFENSE Office of the Secretary [Docket ID: DOD-2010-OS-0004] Privacy Act of 1974... its existing inventory of record systems subject to the Privacy Act of 1974, (5 U.S.C. 552a), as... available for public viewing on the Internet at http://www.regulations.gov as they are received without...

  2. 76 FR 28002 - Privacy Act of 1974; Systems of Records

    Science.gov (United States)

    2011-05-13

    ... DEPARTMENT OF DEFENSE Office of the Secretary [Docket ID: DOD-2011-OS-0052] Privacy Act of 1974... existing inventory of records systems subject to the Privacy Act of 1974 (5 U.S.C. 552a), as amended. DATES... the public is to make these submissions available for public viewing on the Internet at http://www...

  3. 76 FR 39394 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2011-07-06

    ... DEPARTMENT OF DEFENSE Department of the Navy [Docket ID USN-2011-0010] Privacy Act of 1974; System... systems subject to the Privacy Act of 1974, (5 U.S.C. 552a), as amended. DATES: This proposed action will... submissions available for public viewing on the Internet at http://www.regulations.gov as they are received...

  4. 77 FR 35945 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2012-06-15

    ... DEPARTMENT OF DEFENSE Office of the Secretary [Docket ID: DOD-2012-OS-0067] Privacy Act of 1974... systems subject to the Privacy Act of 1974 (5 U.S.C. 552a), as amended. DATES: The proposed action will be... Internet at http://www.regulations.gov as they are received without change, including any personal...

  5. 75 FR 69650 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2010-11-15

    ... DEPARTMENT OF DEFENSE Department of the Army [Docket ID: USA-2010-0026] Privacy Act of 1974... record systems subject to the Privacy Act of 1974, (5 U.S.C. 552a), as amended. DATES: This proposed... from members of the public is to make these submissions available for public viewing on the Internet at...

  6. 78 FR 44102 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2013-07-23

    ... DEPARTMENT OF DEFENSE Department of the Army [Docket ID: USA-2013-0027] Privacy Act of 1974... of record systems subject to the Privacy Act of 1974 (5 U.S.C. 552a), as amended. DATES: This... of the public is to make these submissions available for public viewing on the Internet at http://www...

  7. 75 FR 62111 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2010-10-07

    ... DEPARTMENT OF DEFENSE Office of the Secretary [Docket ID: DOD-2010-OS-0140] Privacy Act of 1974... records notices in its existing inventory of record systems subject to the Privacy Act of 1974, (5 U.S.C... submissions available for public viewing on the Internet at http://www.regulations.gov as they are received...

  8. 78 FR 22525 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2013-04-16

    ... DEPARTMENT OF DEFENSE Office of the Secretary [Docket ID: DoD-2013-0057] Privacy Act of 1974... systems subject to the Privacy Act of 1974 (5 U.S.C. 552a), as amended. DATES: This proposed action will... submissions available for public viewing on the Internet at http://www.regulations.gov as they are received...

  9. 78 FR 37875 - Privacy Act of 1974, as Amended; Computer Matching Program (SSA/Bureau of the Fiscal Service...

    Science.gov (United States)

    2013-06-24

    ...: Social Security Administration (SSA). ACTION: Notice of a renewal of an existing computer matching... above. SUPPLEMENTARY INFORMATION: A. General The Computer Matching and Privacy Protection Act of 1988... computer matching involving the Federal government could be performed and adding certain protections for...

  10. 75 FR 54213 - Privacy Act of 1974, as Amended; Computer Matching Program (SSA/Office of Personnel Management...

    Science.gov (United States)

    2010-09-03

    ... 1021 AGENCY: Social Security Administration (SSA). ACTION: Notice of a renewal of an existing computer.... SUPPLEMENTARY INFORMATION: A. General The Computer Matching and Privacy Protection Act of 1988 (Public Law (Pub... computer matching involving the Federal government could be performed and adding certain protections for...

  11. Privacy transparency patterns

    NARCIS (Netherlands)

    Siljee B.I.J.

    2015-01-01

    This paper describes two privacy patterns for creating privacy transparency: the Personal Data Table pattern and the Privacy Policy Icons pattern, as well as a full overview of privacy transparency patterns. It is a first step in creating a full set of privacy design patterns, which will aid

  12. 78 FR 69861 - Privacy Act of 1974; Department of Homeland Security, Federal Emergency Management Agency...

    Science.gov (United States)

    2013-11-21

    ... Homeland Security, Washington, DC 20478. For privacy issues, please contact: Karen L. Neuman, (202) 343... DEPARTMENT OF HOMELAND SECURITY Office of the Secretary [DHS-2013-0073] Privacy Act of 1974... Defense Executive Reserve System of Records AGENCY: Department of Homeland Security, Privacy Office...

  13. Defense by-products production and utilization program: noble metal recovery screening experiments

    International Nuclear Information System (INIS)

    Hazelton, R.F.; Jensen, G.A.; Raney, P.J.

    1986-03-01

    Isotopes of the platinum metals (rutheium, rhodium, and palladium) are produced during uranium fuel fission in nuclear reactors. The strategic values of these noble metals warrant considering their recovery from spent fuel should the spent fuel be processed after reactor discharge. A program to evaluate methods for ruthenium, rhodium, and palladium recovery from spent fuel reprocessing liquids was conducted at Pacific Northwest Laboratory (PNL). The purpose of the work reported in this docuent was to evaluate several recovery processes revealed in the patent and technical literature. Beaker-scale screening tests were initiated for three potential recovery processes: precipitation during sugar denitration of nitric acid reprocessing solutions after plutonium-uranium solvent extraction, adsorption using nobe metal selective chelates on active carbon, and reduction forming solid noble metal deposits on an amine-borane reductive resin. Simulated reprocessing plant solutions representing typical nitric acid liquids from defense (PUREX) or commercial fuel reprocessing facilities were formulated and used for evaluation of the three processes. 9 refs., 3 figs., 9 tabs

  14. Second line of defense program overview LA-UR-00-5161

    International Nuclear Information System (INIS)

    Knepper, P.L.; Martin, D.D.W.

    2001-01-01

    Full text: The illicit trafficking of nuclear material is a major concern for non-proliferation and global stability. The nuclear Material Protection, Control and Accounting (MPC and A) program provides the first line of defense in protecting nuclear materials within Russia by upgrading safeguards and security measures at Russian nuclear facilities. Second Line of Defense (SLD) is a cooperative program between the Russian Federation State Customs Committee (RF SCC) and the United States Department of Energy (US DOE) to minimize illicit trafficking of restricted nuclear materials through Russian border control points. This partnership was solidified with the signing of a protocol between DOE and the RF SCC in June 1998. The relationship will soon be formalized in a Memorandum of Understanding that will outline the working relationships and commitments to successful implementation of the SLD Program. The Russians first acknowledged the threat of nuclear smuggling at a Nuclear Safety Summit in Moscow in April 1996. Nikolai Kravehenko, head of the Regional Information and Technical Customs Department of the RF SCC, subsequently stated in a July 1998 interview, 'In order to stop trafficking and illegal shipment to other countries we [also] have to tighten security at the facilities and equip our borders with reliable technology.' At the September 1998 U.S.-Russia Presidential Summit, the then Chairman of the RF SCC, Valery Draganov, highlighted the illicit trafficking challenge confronting Russia and requested U.S. assistance. Since 1991, a myriad of cases associated with the diversion and recovery of nuclear materials appear to be linked to the FSU. In the majority of cases, the material's origin was attributed to Russia. With more than 20,000 km of border contiguous to fourteen other countries, and more than 350 customs and border sites, addressing the threat posed by nuclear smuggling in Russia is not only an urgent but also an expansive problem requiring joint U

  15. From Data Privacy to Location Privacy

    Science.gov (United States)

    Wang, Ting; Liu, Ling

    Over the past decade, the research on data privacy has achieved considerable advancement in the following two aspects: First, a variety of privacy threat models and privacy principles have been proposed, aiming at providing sufficient protection against different types of inference attacks; Second, a plethora of algorithms and methods have been developed to implement the proposed privacy principles, while attempting to optimize the utility of the resulting data. The first part of the chapter presents an overview of data privacy research by taking a close examination at the achievements from the above two aspects, with the objective of pinpointing individual research efforts on the grand map of data privacy protection. As a special form of data privacy, location privacy possesses its unique characteristics. In the second part of the chapter, we examine the research challenges and opportunities of location privacy protection, in a perspective analogous to data privacy. Our discussion attempts to answer the following three questions: (1) Is it sufficient to apply the data privacy models and algorithms developed to date for protecting location privacy? (2) What is the current state of the research on location privacy? (3) What are the open issues and technical challenges that demand further investigation? Through answering these questions, we intend to provide a comprehensive review of the state of the art in location privacy research.

  16. When public health and genetic privacy collide: positive and normative theories explaining how ACA's expansion of corporate wellness programs conflicts with GINA's privacy rules.

    Science.gov (United States)

    Bard, Jennifer S

    2011-01-01

    The Patient Protection and Affordable Care Act of 2010 (ACA) contains many provisions intended to increase access to and lower the cost of health care by adopting public health measures. One of these promotes the use of at-work wellness programs by both providing employers with grants to develop these programs and also increasing their ability to tie the price employees pay for health insurance for participating in these programs and meeting specific health goals. Yet despite ACA's specific alteration of three different statues which had in the past shielded employees from having to contribute to the cost of their health insurance based on their achieving employer-designated health markers, it chose to leave alone recently enacted rules implementing the Genetic Non-Discrimination Act (GINA), which prohibits employers from asking employees about their family health history in any context, including assessing their risk for setting wellness targets. This article reviews how both the changes made by ACA and the restrictions recently put place by GINA will affect the way employers are likely to structure Wellness Programs. It also considers how these changes reflect the competing social goals of both ACA, which seeks to expand access to the population by lowering costs, and GINA, which seeks to protect individuals from discrimination. It does so by analyzing both positive theories about how these new laws will function and normative theories explaining the likelihood of future friction between the interests of the population of the United States as a whole who are in need of increased and affordable access to health care, and of the individuals living in this country who risk discrimination, as science and medicine continue to make advances in linking genetic make-up to risk of future illness. © 2011 American Society of Law, Medicine & Ethics, Inc.

  17. Knockout of Arabidopsis accelerated-cell-death11 encoding a sphingosine transfer protein causes activation of programmed cell death and defense

    DEFF Research Database (Denmark)

    Brodersen, Peter; Petersen, Morten; Pike, Helen M

    2002-01-01

    by avirulent pathogens. Global transcriptional changes during programmed cell death (PCD) and defense activation in acd11 were monitored by cDNA microarray hybridization. The PCD and defense pathways activated in acd11 are salicylic acid (SA) dependent, but do not require intact jasmonic acid or ethylene...

  18. Prepublication Review of Government Employee Speech: A Case Study of the Department of Defense and United States Air Force Security/Policy Review Programs.

    Science.gov (United States)

    Warden, Michael L.

    Since 1957 the Department of Defense has subjected all forms of speech of U.S. military personnel meant for publication to prepublication review based on security and policy criteria. The historical development of the Defense Department's prepublication review program and its specific implementation by the U.S. Air Force lead to questions of First…

  19. 77 FR 2653 - Defense Federal Acquisition Regulation Supplement; Pilot Program for Acquisition of Military...

    Science.gov (United States)

    2012-01-19

    ... entity referred to in the interim rule is, in essence, the legal entity that signs the contract with the... contractors as defined within the rule and section 866 of the National Defense Authorization Act for Fiscal...

  20. Semantic Security: Privacy Definitions Revisited

    OpenAIRE

    Jinfei Liu; Li Xiong; Jun Luo

    2013-01-01

    In this paper we illustrate a privacy framework named Indistinguishabley Privacy. Indistinguishable privacy could be deemed as the formalization of the existing privacy definitions in privacy preserving data publishing as well as secure multi-party computation. We introduce three representative privacy notions in the literature, Bayes-optimal privacy for privacy preserving data publishing, differential privacy for statistical data release, and privacy w.r.t. semi-honest behavior in the secure...

  1. Integrating the commercial and defense high level waste programs - A utility perspective

    International Nuclear Information System (INIS)

    Tomonto, J.R.

    1986-01-01

    The Nuclear Waste Policy Act of 1982 provided that disposal of high-level wastes resulting from defense activities be included in the authorized repository unless the President determined that separate facilities are required. President Reagan approved commingling of defense and civilian wastes on April 30, 1985. The impacts of this decision on the repository schedule, civilian spent fuel acceptance rates, and cost sharing are reviewed and recommendations for resolving these issues are presented

  2. Influences on the Timing and Frequency of Cancellations and Truncations of Major Defense Acquisition Programs

    Science.gov (United States)

    2017-03-01

    TPP) when it was judged to be practicable and, when not, a Fixed Price Incentive Fee (FPIF) or Cost Plus Incentive Fee (CPIF) contract. By 1966...left off, he ruled out the use of TPP and discouraged the use of FPIF for development contracts in favor of CPIF. ( Cost Plus Award Fee may not have...CPIF Cost Plus Incentive Fee CY Calendar Year DAB Defense Acquisition Board DAMIR Defense Acquisition Management Information Retrieval DCP

  3. Just in Time Research: Privacy Practices

    Science.gov (United States)

    Grama, Joanna Lyn

    2014-01-01

    The January 2014 edition of the ECAR Update subscriber newsletter included an informal poll on information privacy practices. The poll was intended to collect a quick snapshot of the higher education community's thoughts on this important topic during Data Privacy Month. Results of the poll will be used to inform EDUCAUSE research, programs,…

  4. Preserving Employee Privacy in Wellness.

    Science.gov (United States)

    Terry, Paul E

    2017-07-01

    The proposed "Preserving Employee Wellness Programs Act" states that the collection of information about the manifested disease or disorder of a family member shall not be considered an unlawful acquisition of genetic information. The bill recognizes employee privacy protections that are already in place and includes specific language relating to nondiscrimination based on illness. Why did legislation expressly intending to "preserve wellness programs" generate such antipathy about wellness among journalists? This article argues that those who are committed to preserving employee wellness must be equally committed to preserving employee privacy. Related to this, we should better parse between discussions and rules about commonplace health screenings versus much less common genetic testing.

  5. The antimicrobial resistance monitoring and research (ARMoR) program: the US Department of Defense response to escalating antimicrobial resistance.

    Science.gov (United States)

    Lesho, Emil P; Waterman, Paige E; Chukwuma, Uzo; McAuliffe, Kathryn; Neumann, Charlotte; Julius, Michael D; Crouch, Helen; Chandrasekera, Ruvani; English, Judith F; Clifford, Robert J; Kester, Kent E

    2014-08-01

    Responding to escalating antimicrobial resistance (AMR), the US Department of Defense implemented an enterprise-wide collaboration, the Antimicrobial Resistance Monitoring and Research Program, to aid in infection prevention and control. It consists of a network of epidemiologists, bioinformaticists, microbiology researchers, policy makers, hospital-based infection preventionists, and healthcare providers who collaborate to collect relevant AMR data, conduct centralized molecular characterization, and use AMR characterization feedback to implement appropriate infection prevention and control measures and influence policy. A particularly concerning type of AMR, carbapenem-resistant Enterobacteriaceae, significantly declined after the program was launched. Similarly, there have been no further reports or outbreaks of another concerning type of AMR, colistin resistance in Acinetobacter, in the Department of Defense since the program was initiated. However, bacteria containing AMR-encoding genes are increasing. To update program stakeholders and other healthcare systems facing such challenges, we describe the processes and impact of the program. Published by Oxford University Press on behalf of the Infectious Diseases Society of America 2014. This work is written by (a) US Government employee(s) and is in the public domain in the US.

  6. Report from Dagstuhl Seminar 12331 Mobility Data Mining and Privacy

    OpenAIRE

    Clifton, Christopher W.; Kuijpers, Bart; Morik, Katharina; Saygin, Yucel

    2012-01-01

    This report documents the program and the outcomes of Dagstuhl Seminar 12331 “Mobility Data Mining and Privacy”. Mobility data mining aims to extract knowledge from movement behaviour of people, but this data also poses novel privacy risks. This seminar gathered a multidisciplinary team for a conversation on how to balance the value in mining mobility data with privacy issues. The seminar focused on four key issues: Privacy in vehicular data, in cellular data, context- dependent privacy, and ...

  7. Privacy og selvbeskrivelse

    DEFF Research Database (Denmark)

    Rosengaard, Hans Ulrik

    2015-01-01

    En beskrivelse af feltet for forskning i Privacy med særligt henblik på privacys betydning for muligheden for at styre sin egen selvbeskrivelse......En beskrivelse af feltet for forskning i Privacy med særligt henblik på privacys betydning for muligheden for at styre sin egen selvbeskrivelse...

  8. Risk assessment of DOE defense program packages in a beyond 10 CFR 71.73 transportation accident environment

    International Nuclear Information System (INIS)

    Sandquist, G.M.; Bennion, J.S.; Moore, J.E.

    1992-01-01

    A comprehensive program is being conducted by the DOE to determine the risks related to the domestic transportation of radioactive and hazardous materials associated with nuclear weapons. The program is designed to identify, quantify and manage potential risks to public health and safety including potential radiological and toxicological health consequences which may exceed the 10 CFR 71.73 transportation accident environment A major objective of this program being performed by the Lawrence Livermore National Laboratory (LLNL) and the University of Utah is to provide the DOE with the methodology and bases for evaluating highway transportation activities by DOE contractors. This paper describes the approach and the HITRA model which is based upon probabilistic risk assessment (PRA) methodology and route specific data associated with the proposed transportation activity. The model is capable of providing detailed, location and time specific data for assessing projected risks to public health and safety from DOE defense program materials shipments

  9. Privacy vs security

    CERN Document Server

    Stalla-Bourdillon, Sophie; Ryan, Mark D

    2014-01-01

    Securing privacy in the current environment is one of the great challenges of today's democracies. Privacy vs. Security explores the issues of privacy and security and their complicated interplay, from a legal and a technical point of view. Sophie Stalla-Bourdillon provides a thorough account of the legal underpinnings of the European approach to privacy and examines their implementation through privacy, data protection and data retention laws. Joshua Philips and Mark D. Ryan focus on the technological aspects of privacy, in particular, on today's attacks on privacy by the simple use of today'

  10. 78 FR 45913 - Privacy Act of 1974; Systems of Records

    Science.gov (United States)

    2013-07-30

    ... at http://dpclo.defense.gov/privacy/SORNs/component/nsa/index.html . The proposed system report, as... Register Liaison Officer, Department of Defense. GNSA 14 System Name: NSA/CSS Library Patron File Control....'' Categories of individuals covered by the system: Delete entry and replace with ``NSA civilian employees...

  11. Defense Small Business Innovation Research Program (SBIR). Volume 2. Navy Abstracts of Phase 1 Awards. 1990

    Science.gov (United States)

    1990-01-01

    ENVIRONMENTAL SAMPLES. THE INNOVATIVE SYSTEM UTILIZES AN ENCLOSED APPARATUS AND DRY CHEMISTRY ALLOWING FOR PROTECTION OF THE USER AND LONG-TERM...ADVANCED TACTICAL AIR RECONNAISSANCE SYSTEM ( ATARS ) CURRENTLY UNDER DEVELOPMENT BY THE DEPARTMENT OF DEFENSE. THROUGH THE UNIQUE INTEGRATION OF THE... ATARS COMPONENTS AND A COMMERCIALLY AVAILABLE SILICON GRAPHICS WORKSTATION, A LOW DEVELOPMENT RISK, LOW COST, HIGH PERFORMANCE DIGITAL IMAGE

  12. 76 FR 18954 - Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security Federal...

    Science.gov (United States)

    2011-04-06

    ... issues please contact: Mary Ellen Callahan (703-235- 0780), Chief Privacy Officer, Privacy Office...] Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security Federal Emergency Management Agency DHS/FEMA-011 Training and Exercise Program Records System of Records AGENCY: Privacy Office...

  13. 77 FR 43100 - Privacy Act of 1974; Department of Homeland Security, Federal Emergency Management Agency-009...

    Science.gov (United States)

    2012-07-23

    ... Homeland Security, Washington, DC 20478. For privacy issues, please contact: Mary Ellen Callahan (703) 235... DEPARTMENT OF HOMELAND SECURITY Office of the Secretary [Docket No. DHS-2011-0097] Privacy Act of... Assistance Grant Programs System of Records AGENCY: Privacy Office, DHS. ACTION: Notice of Privacy Act system...

  14. Program Management at the National Nuclear Security Administration Office of Defense Nuclear Security: A Review of Program Management Documents and Underlying Processes

    International Nuclear Information System (INIS)

    Madden, Michael S.

    2010-01-01

    The scope of this paper is to review the National Nuclear Security Administration Office of Defense Nuclear Security (DNS) program management documents and to examine the underlying processes. The purpose is to identify recommendations for improvement and to influence the rewrite of the DNS Program Management Plan (PMP) and the documentation supporting it. As a part of this process, over 40 documents required by DNS or its stakeholders were reviewed. In addition, approximately 12 other documents produced outside of DNS and its stakeholders were reviewed in an effort to identify best practices. The complete list of documents reviewed is provided as an attachment to this paper.

  15. Standing Up a Narcotic Confirmation Laboratory for the Russian Federation Ministry of Defense Nuclear Personnel Reliability Program

    International Nuclear Information System (INIS)

    Lukyanenko, Victor; Eisele, Gerhard R.; Coates, Cameron W.

    2010-01-01

    Through a cooperative effort between the U. S. Department of Energy and the Russian Federation (RF) Ministry of Defense (MOD) a Personnel Reliability Program (PRP) for the nuclear handlers within the RF MOD has been implemented. A key element in the RF MOD PRP is the detection and confirmation of narcotic use in subject military and civilian personnel. This paper describes the process of narcotics screening and testing in the RF MOD and explains the confirmation process once screening has shown a positive result. Issues of laboratory certification, employee certification, employee training, sample chain-of-custody, and equipment needs will be addressed.

  16. The Myth of Jointness in Department of Defense Requirements and Major Acquisition Programs

    Science.gov (United States)

    2013-06-01

    19 Lawrence S., Kaplan , Ronald D. Landa, and Edward J. Drea, History of the Office of the Secretary of...Present,” 8-9. 19 M1 possessed the most advanced armor in the world, was turbine engine powered, and had an advanced gun system. Within 20 years...14 Kaplan , Landa, and Drea, History of the Office of the Secretary of Defense. vol. 5, The McNamara Ascendency, 1961-1965, 454. 15 Ibid

  17. FY 1978 Budget, FY 1979 Authorization Request and FY 1978-1982 Defense Programs,

    Science.gov (United States)

    1977-01-17

    timely inteligence to decision-makers for supporting national and Defense policies and decisions is increasing. 3 On the other hand, appropriation... artificially constrained by the lack of parts. This will increase materiel readiness and make the maintenance effort more efficient by reducing the backlog of...already too high, may in fact be artificially deflated. Chart VII-3 shows that cannibalization rates in the Navy and Air Force have been steadily

  18. Redefining The U.S.-Japan Alliance: Tokyo’s National Defense Program

    Science.gov (United States)

    1994-11-01

    affairs to a member of the National Diet , a Fulbright Fellow at Tokyo University, a reporter for Defense News and the Iwate Nippo, and Tokyo...process of introducing electoral reform in the Diet has already split the LDP and led to the recent series of coalitions. The process of implementing this...what Malaysian Prime Minister Mahathir Mohamad told Japanese Prime Minister Murayama in August 1994. See "Mahathir to Japan: ’Drop War Apologies, Join

  19. Post Milestone B Funding Climate and Cost Growth in Major Defense Acquisition Programs

    Science.gov (United States)

    2017-03-01

    passed MS B in bust periods than it was for those that passed in boom periods. This observation was reported by the first paper in this series...5. iii did not experience a boom funding climate after passing MS B. That would require far more resources than were available for this paper ...acquisition policy and process. The paper employs three acquisition policy and process bins: • McNamara-Clifford (Fiscal Year (FY) 1964–FY 1969) • Defense

  20. Patriot/Medium Extended Air Defense System Combined Aggregate Program (Patriot/MEADS CAP)

    Science.gov (United States)

    2013-12-01

    SPONSOR/MONITOR’S REPORT NUMBER(S) 12. DISTRIBUTION /AVAILABILITY STATEMENT Approved for public release; distribution unlimited 13. SUPPLEMENTARY...States, Germany, and Italy to replace the U.S. Patriot air defense systems, Patriot and Hawk systems in Germany, and the Nike system in Italy. The MEADS...combat demonstrated capability against these threats. MEADS will employ a netted distributed architecture with modular components to increase

  1. Analysis of System Training Impact for Major Defense Acquisition Programs (MDAPs): Training Systems Acquisition

    Science.gov (United States)

    2012-07-01

    Training Systems Acquisition IDA Document D-4648 Log: H 12-001032 July 2012 Approved for public release; distribution is unlimited...Background The Patriot system began because of the need to replace an aging and limited air defense system in the 1970s, the Nike -Hercules, and...simulation technology, embedded training and distributed learning (DoD Instruction 1322.26), and instrumentation systems that provide “anytime, anyplace

  2. 75 FR 66686 - Defense Federal Acquisition Regulation Supplement; Balance of Payments Program Exemption for...

    Science.gov (United States)

    2010-10-29

    ... Federal Acquisition Regulation Supplement; Balance of Payments Program Exemption for Commercial... Balance of Payments Program for construction material that is commercial information technology. DATES... the Balance of Payments Program for commercial information technology to be used in overseas...

  3. SITREP: The NPS Maritime Defense and Security Research Program Newsletter ; v. 48 (July-August 2010)

    OpenAIRE

    2010-01-01

    This issue of The NPS Maritime Domain Protection Newsletter includes information on The Technology Cooperation Program (TTCP) Maritime (MAR), RAND Corporation Maritime Programs, Librarians Corner, and Future Events.

  4. Is Electronic Privacy Achievable?

    National Research Council Canada - National Science Library

    Irvine, Cynthia E; Levin, Timothy E

    2000-01-01

    ... individuals. The purpose of this panel was to focus on how new technologies are affecting privacy. Technologies that might adversely affect privacy were identified by Rein Turn at previous symposia...

  5. Privacy and Innovation

    OpenAIRE

    Avi Goldfarb; Catherine Tucker

    2011-01-01

    Information and communication technology now enables firms to collect detailed and potentially intrusive data about their customers both easily and cheaply. This means that privacy concerns are no longer limited to government surveillance and public figures' private lives. The empirical literature on privacy regulation shows that privacy regulation may affect the extent and direction of data-based innovation. We also show that the impact of privacy regulation can be extremely heterogeneous. T...

  6. Neuroethics and Brain Privacy

    DEFF Research Database (Denmark)

    Ryberg, Jesper

    2017-01-01

    An introduction is presented in which editor discusses various articles within the issue on topics including ethical challenges with importance of privacy for well-being, impact of brain-reading on mind privacy and neurotechnology.......An introduction is presented in which editor discusses various articles within the issue on topics including ethical challenges with importance of privacy for well-being, impact of brain-reading on mind privacy and neurotechnology....

  7. Privacy and internet services

    OpenAIRE

    Samec, Marek

    2010-01-01

    This thesis is focused on internet services user privacy. Goal of this thesis is to determine level of user awareness of how is their privacy approached while using internet services. Then suggest procedure to improve this awareness, or that will lead to better control of individual privacy. In theoretical part I analyze general and legislative approach to privacy, followed by analysis of behaviour of internet service users and providers. Part of this analysis deals with usage of web cookies ...

  8. Internet and Privacy

    OpenAIRE

    Al-Fadhli, Meshal Shehab

    2007-01-01

    The concept of privacy is hard to understand and is not easy to define, because this concept is linked with several dimensions. Internet Privacy is associated with the use of the Internet and most likely appointed under communications privacy, involving the user of the Internet’s personal information and activities, and the disclosure of them online. This essay is going to present the meaning of privacy and the implications of it for Internet users. Also, this essay will demonstrate some of t...

  9. Privacy and Library Records

    Science.gov (United States)

    Bowers, Stacey L.

    2006-01-01

    This paper summarizes the history of privacy as it relates to library records. It commences with a discussion of how the concept of privacy first originated through case law and follows the concept of privacy as it has affected library records through current day and the "USA PATRIOT Act."

  10. Privacy Verification Using Ontologies

    NARCIS (Netherlands)

    Kost, Martin; Freytag, Johann-Christoph; Kargl, Frank; Kung, Antonio

    2011-01-01

    As information systems extensively exchange information between participants, privacy concerns may arise from its potential misuse. A Privacy by Design (PbD) approach considers privacy requirements of different stakeholders during the design and the implementation of a system. Currently, a

  11. 76 FR 34732 - Privacy Act of 1974; Department of Homeland Security/National Protection and Programs Directorate...

    Science.gov (United States)

    2011-06-14

    ... 1974; Department of Homeland Security/National Protection and Programs Directorate--002 Chemical... Homeland Security/National Protection and Programs Directorate--002 Chemical Facility Anti-Terrorism.... 552a, the Department of Homeland Security (DHS)/National Protection and Programs Directorate (NPPD...

  12. 75 FR 77607 - Privacy Act of 1974; Proposed New System of Records; Veterinary Medicine Loan Repayment Program

    Science.gov (United States)

    2010-12-13

    ...; Proposed New System of Records; Veterinary Medicine Loan Repayment Program AGENCY: National Institute of..., ``Veterinary Medicine Loan Repayment Program Records System, USDA/NIFA-1.'' This newly established system will... Sherman; National Program Leader, Veterinary Science; National Institute of Food and Agriculture...

  13. A Goal Programming R&D (Research and Development) Project Funding Model of the U.S. Army Strategic Defense Command Using the Analytic Hierarchy Process.

    Science.gov (United States)

    1987-09-01

    A187 899 A GOAL PROGRANNIN R&D (RESEARCH AND DEVELOPMENT) 1/2 PROJECT FUNDING MODEL 0 (U) NAVAL POSTGRADUATE SCHOOL MONTEREY CA S M ANDERSON SEP 87...PROGRAMMING R&D PROJECT FUNDING MODEL OF THE U.S. ARMY STRATEGIC DEFENSE COMMAND USING THE ANALYTIC HIERARCHY PROCESS by Steven M. Anderson September 1987...jACCESSION NO TITI E (Influde Securt ClauAIcatsrn) A Goal Programming R&D Project Funding Model of the U.S. Army Strategic Defense Command Using the

  14. An Assessment of Early Competitive Prototyping for Major Defense Acquisition Programs

    Science.gov (United States)

    2016-04-30

    Executive ( CAE ). The MDA determines when programs move from one acquisition phase to the next by reviewing program accomplishments at the various...the M113 family of vehicles. The AMPV will come in five variants: general purpose, medical evacuation, medical treatment , mortar carrier and...System (EPS) Program Control and Planning Segment (CAPS). EPS will provide extremely high frequency, jam-resistant, and secure satellite communications

  15. Proceedings of the second Department Of Energy Defense Programs waste reduction workshop

    International Nuclear Information System (INIS)

    1989-04-01

    The second waste reduction workshop was held at the Rocky Flats Plant (RFP). The objective of this workshop was to exchange specific information (successes and failures) on education and training programs for waste reduction. Each facility was asked to provide a description of their programs to include information on formal, informal, and planned employee training programs; employee incentive programs; pamphlets, posters, books, magazines, communications, and publicity; procurement control and awareness in minimizing hazardous materials; housekeeping successes; waste minimization surveys; and implementation successes and failures. This document contains copies of the demonstrations and not the text of the presentations

  16. Privacy encounters in Teledialogue

    DEFF Research Database (Denmark)

    Andersen, Lars Bo; Bøge, Ask Risom; Danholt, Peter

    2017-01-01

    Privacy is a major concern when new technologies are introduced between public authorities and private citizens. What is meant by privacy, however, is often unclear and contested. Accordingly, this article utilises grounded theory to study privacy empirically in the research and design project...... Teledialogue aimed at introducing new ways for public case managers and placed children to communicate through IT. The resulting argument is that privacy can be understood as an encounter, that is, as something that arises between implicated actors and entails some degree of friction and negotiation....... An argument which is further qualified through the philosophy of Gilles Deleuze. The article opens with a review of privacy literature before continuing to present privacy as an encounter with five different foci: what technologies bring into the encounter; who is related to privacy by implication; what...

  17. Defense Small Business Innovation Research Program (SBIR). Volume 1. Army Abstracts of Phase 1 Awards 1990

    Science.gov (United States)

    1990-01-01

    94025 Program Manager: WILSON SMART Contract #: Title: DIAMOND HEAT PUPES FOR EFFICIENT COOLING OF HIGH POWER DENSITY DEVICES Topic #: A90-034 Office...PARK, CA 94025 Program Manager: WILSON SMART Contract #: Title: DOPED DIAMOND QUANTUM WELLS FOR FIELD EFFECT TRANSISTORS Topic #: A90-111 Office: ETDL ID

  18. Defense Small Business Innovation Research Program (SBIR). Volume 3. Air Force Abstracts of Phase 1 Awards

    Science.gov (United States)

    1990-01-01

    APPLICATION. CRYSTALLUME 125 CONSTITUTION DR MENLO PARK, CA 94025 Program Manager: WILSON SMART Contract #: Title: DIAMOND WAVEGUIDES FOR THE LONG WAVELENGTH...MENLO PARK, CA 94025 Program Manager: WILSON SMART Contract #: Title: DIAMOND COATINGS FOR INFRARED MATERIAL Topic #: AF90-019 Office: MSD/PMR ID

  19. An effective suicide prevention program in the Israeli Defense Forces: A cohort study.

    Science.gov (United States)

    Shelef, L; Tatsa-Laur, L; Derazne, E; Mann, J J; Fruchter, E

    2016-01-01

    To evaluate the effectiveness of the IDF Suicide Prevention Program, implemented since 2006. Quasi-experimental (before and after) cohort study. Two cohorts of IDF mandatory service soldiers: the first inducted prior to (1992-2005, n=766,107) and the second subsequent to (2006-2012, n=405,252) the launching of the intervention program. The IDF Suicide Prevention Program is a population-based program, incorporating: reducing weapon availability, de-stigmatizing help-seeking behavior, integrating mental health officers into service units, and training commanders and soldiers to recognize suicide risk factors and warning signs. Suicide rate and time to suicide in cohorts before and after exposure to the Suicide Prevention Program. Trend analysis showed lower suicide rates in the cohort after intervention. The hazard ratio for the intervention effect on time to suicide was 0.44 (95% CI=0.34-0.56, Psuicide rate following the administration of the IDF Suicide Prevention Program. The effect of the intervention appears to be related to use of a weapon, and being able to benefit from improved help-seeking and de-stigmatization. Future efforts should seek to extend the program's prevention reach to other demographic groups of soldiers. The success of the IDF program may inform suicide prevention in other military organizations and in the civilian sector. Copyright © 2015 Elsevier Masson SAS. All rights reserved.

  20. Digital privacy in Asia: Setting the agenda | CRDI - Centre de ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    9 juin 2016 ... ... Identification Number (UID) program by arguing for privacy provisions to be part of both the design of the program and the proposed legal framework. UID proposes to collect biometric data of all Indian citizens and residents;. The report, published by Privacy International, highlights the rapid development ...

  1. Choose Privacy Week: Educate Your Students (and Yourself) about Privacy

    Science.gov (United States)

    Adams, Helen R.

    2016-01-01

    The purpose of "Choose Privacy Week" is to encourage a national conversation to raise awareness of the growing threats to personal privacy online and in day-to-day life. The 2016 Choose Privacy Week theme is "respecting individuals' privacy," with an emphasis on minors' privacy. A plethora of issues relating to minors' privacy…

  2. 75 FR 63703 - Privacy Act of 1974; Privacy Act Regulation

    Science.gov (United States)

    2010-10-18

    ... FEDERAL RESERVE SYSTEM 12 CFR Part 261a [Docket No. R-1313] Privacy Act of 1974; Privacy Act... implementing the Privacy Act of 1974 (Privacy Act). The primary changes concern the waiver of copying fees... records under the Privacy Act; the amendment of special procedures for the release of medical records to...

  3. A Taxonomy of Privacy Constructs for Privacy-Sensitive Robotics

    OpenAIRE

    Rueben, Matthew; Grimm, Cindy M.; Bernieri, Frank J.; Smart, William D.

    2017-01-01

    The introduction of robots into our society will also introduce new concerns about personal privacy. In order to study these concerns, we must do human-subject experiments that involve measuring privacy-relevant constructs. This paper presents a taxonomy of privacy constructs based on a review of the privacy literature. Future work in operationalizing privacy constructs for HRI studies is also discussed.

  4. 78 FR 47336 - Privacy Act of 1974; Computer Matching Program Between the Department of Housing and Urban...

    Science.gov (United States)

    2013-08-05

    ...) (Pub. L. 111-204); 2. Presidential Memorandum on Enhancing Payment Accuracy Through a ``Do Not Pay List... operating Public Housing programs may now offer tenants the option to pay a flat rent, or an income-based..., program administrators will resolve income discrepancies in consultation with tenants. Additionally...

  5. 76 FR 579 - Privacy Act of 1974; Computer Matching Program Between the Department of Housing and Urban...

    Science.gov (United States)

    2011-01-05

    ... Payment Accuracy Through a ``Do Not Pay List'' (June 18, 2010); 3. Office of Management and Budget M-10-13... operating Public Housing programs may now offer tenants the option to pay a flat rent, or an income-based... all cases, program administrators will resolve income discrepancies in consultation with tenants...

  6. Intellectual Freedom and Privacy: Comments on a National Program for Library and Information Services. Related Paper No. 10.

    Science.gov (United States)

    Molz, R. Kathleen

    The civil libertarian aspects of the National Program for Library and Information Science are analyzed. The five assumptions on which the program is based are closely examined for their references to the word "right." Details are given of the historic development of the library profession's increasing concern for the protection of…

  7. Comprehensive implementation plan for the DOE defense buried TRU- contaminated waste program

    International Nuclear Information System (INIS)

    Everette, S.E.; Detamore, J.A.; Raudenbush, M.H.; Thieme, R.E.

    1988-02-01

    In 1970, the US Atomic Energy Commission established a ''transuranic'' (TRU) waste classification. Waste disposed of prior to the decision to retrievably store the waste and which may contain TRU contamination is referred to as ''buried transuranic-contaminated waste'' (BTW). The DOE reference plan for BTW, stated in the Defense Waste Management Plan, is to monitor it, to take such remedial actions as may be necessary, and to re-evaluate its safety as necessary or in about 10-year periods. Responsibility for management of radioactive waste and byproducts generated by DOE belongs to the Secretary of Energy. Regulatory control for these sites containing mixed waste is exercised by both DOE (radionuclides) and EPA (hazardous constituents). Each DOE Operations Office is responsible for developing and implementing plans for long-term management of its radioactive and hazardous waste sites. This comprehensive plan includes site-by-site long-range plans, site characteristics, site costs, and schedules at each site. 13 figs., 15 tabs

  8. Defense Acquisitions: 2009 Review of Future Combat System Is Critical to Program's Direction

    National Research Council Canada - National Science Library

    Francis, Paul L

    2008-01-01

    The Future Combat System (FCS) program which comprises 14 integrated weapon systems and an advanced information network is the centerpiece of the Army's effort to transition to a lighter, more agile, and more capable combat force...

  9. Companies Participating in the Department of Defense Subcontracting Program: First Half Fiscal Year 1997

    National Research Council Canada - National Science Library

    1997-01-01

    ...). Public Law (P.L.) 95-507, as amended requires that these contractors establish a small business subcontracting program and report to DoD semiannually, using standard 295, on subcontract awards. As required by P.I...

  10. Internal Controls over the Department of Defense Transit Subsidy Program within the National Capital Region

    National Research Council Canada - National Science Library

    Granetto, Paul J; Marsh, Patricia A; Pfeil, Lorin T; Gaich, Walter J; Lawrence, Demetria; Hart, Marcia T; Dickison, Ralph W; Varner, Pamela; Foth, Suellen

    2007-01-01

    DoD personnel with oversight responsibility and personnel working within the DoD transit subsidy program for the National Capital Region should read this report to obtain information about internal...

  11. Overcoming Resistance to Change: An Analysis to the Department of Defense's Anthrax Vaccine Immunization Program

    National Research Council Canada - National Science Library

    Johnson, Irene

    2004-01-01

    The goal of this research was to investigate the impact of change on organizations, in the absence of a preparedness program and to develop strategies for overcoming resistance to change, in the midst...

  12. 76 FR 49500 - Privacy Act of 1974; Department of Homeland Security United States Coast Guard-020 Substance...

    Science.gov (United States)

    2011-08-10

    ... 7101 Washington, DC 20593. For privacy issues please contact: Mary Ellen Callahan (703-235-0780), Chief... DEPARTMENT OF HOMELAND SECURITY Office of the Secretary [Docket No. DHS-2011-0053] Privacy Act of... Treatment Program System of Records AGENCY: Privacy Office, DHS. ACTION: Notice of Privacy Act system of...

  13. Development of an Intellectual Property Strategy: Research Notes to Support Department of Defense Programs

    Science.gov (United States)

    2014-10-01

    Patent and Trademark Office by Carnegie Mellon University. DM-0001665 CMU/SEI-2014-SR-036 | i Table of Contents Acknowledgments vii...property categories and associated rights to educate program managers on the role of program execution. The content also explains implications of...pictures, and other audiovisual works  display the work publicly, in the case of literary, musical, dramatic, and choreographic works, pantomimes, and

  14. Department of Defense (DOD) renewables and energy efficiency planning (REEP) program manual

    Energy Technology Data Exchange (ETDEWEB)

    Nemeth, R.J.; Fournier, D.; Debaillie, L.; Edgar, L.; Stroot, P.; Beasley, R.; Edgar, D.; McMillen, L.; Marren, M.

    1995-08-01

    The Renewables and Energy Efficiency Planning (REEP) program was developed at the US Army Construction Engineering Research Laboratories (USACERL). This program allows for the analysis of 78 energy and water conservation opportunities at 239 major DOD installations. REEP uses a series of algorithms in conjunction with installation specific data to estimate the energy and water conservation potential for entire installations. The program provides the energy, financial, pollution, and social benefits of conservation initiatives. The open architecture of the program allows for simple modification of energy and water conservation variables, and installation database values to allow for individualized analysis. The program is essentially a high-level screening tool that can be used to help identify and focus preliminary conservation studies. The REEP program requires an IBM PC or compatible with a 80386 or 80486 microprocessor. It also requires approximately 4 megabytes of disk space and at least 8 megabytes of RAM. The system was developed for a Windows environment and requires Microsoft Windows 3.1{trademark} or higher to run properly.

  15. The Department of Defense FY 1999 Small Business Innovation Research (SBIR) Program. Program Solicitation 99.2

    National Research Council Canada - National Science Library

    1999-01-01

    .... Special Operations Command (SOCOM), hereafter referred to as DoD Components, invite small business firms to submit proposals under this solicitation for the Small Business Innovation Research (SBIR) program...

  16. The Department of Defense FY 2000 Small Business Innovation Research (SBIR) Program: Program Solicitation 00.1

    National Research Council Canada - National Science Library

    2000-01-01

    ... (NIMA), and U.S. Special Operations Command (SOCOM), hereafter referred to as DoD Components, invite small business firms to submit proposals under this solicitation for the Small Business Innovation Research (SBIR) program...

  17. Exploring Effects of Organizational Culture upon Implementation of Information Security Awareness and Training Programs within the Defense Industry Located in the Tennessee Valley Region

    Science.gov (United States)

    Grant, Robert Luther

    2017-01-01

    Data breaches due to social engineering attacks and employee negligence are on the rise. The only known defense against social engineering attacks and employee negligence is information security awareness and training. However, implementation of awareness and training programs within organizations are lagging in priority. This research used the…

  18. Designing Privacy for You : A User Centric Approach For Privacy

    OpenAIRE

    Senarath, Awanthika; Arachchilage, Nalin A. G.; Slay, Jill

    2017-01-01

    Privacy directly concerns the user as the data owner (data- subject) and hence privacy in systems should be implemented in a manner which concerns the user (user-centered). There are many concepts and guidelines that support development of privacy and embedding privacy into systems. However, none of them approaches privacy in a user- centered manner. Through this research we propose a framework that would enable developers and designers to grasp privacy in a user-centered manner and implement...

  19. National Defense Education Program (NDEP) - Science, Technology, Engineering, and Mathematics (STEM) Education

    Science.gov (United States)

    2013-09-01

    inquiry and scientific pedagogy . 2.0 PROGRAM OBJECTIVES The DoD selected AFRL/XPPD, Domestic Partnering Branch, as the NDEP coordinator at...users access to LabTV, STEM career videos , STEM Education Quality Framework and Curriculum developed by the Dayton Regional STEM Center. In October

  20. Defense Small Business Innovation Research Program (SBIR). Abstracts of Phase 2 Awards, 1984.

    Science.gov (United States)

    165 proposals for funding in Phase II of the Small Business Innovation Research (SBIR) Program. These proposals were selected from those submitted by... small research and development firms awarded Phase I contracts from the FY 1984 solicitation. In order to make information available on the technical

  1. Identifying Procurement Fraud in Defense Agencies: An Analysis of the Government Purchase Card Program

    Science.gov (United States)

    2011-04-30

    fielding, contracting, interoperability, organizational behavior, risk management , cost estimating, and many others. Approaches range from... COSO ), (Whittington & Pany, 2012). In addition, the Federal Financial Management Improvement Act of 1996 identified internal control as an...fraud indicators within the DoD Government Purchase Card Programs and provides recommendations for improving the management of Government Purchase

  2. Defense Small Business Innovation Research Program (SBIR). Abstracts of Phase II Awards. 1985.

    Science.gov (United States)

    1985-01-01

    OFFICE: AFBMOiPMX THE INTEGR ATE-DRILL-LOADLSHUOT (IDLS) C’ NCv " , A CONTINUOUS DRILL 04 ’e SMALL BUSINESS INNOVATION RESEARCH (SBIR) PROGRAM - PHASE 2...WORK WAS TO DEMONSTRATE THAT THE COMPONENTS OF THE -.’ WBGI INDEX ( WEB BULB, DRY BULB AND BLACK GLOBE TEMPERATURE) CAN BE DE- RIVED FROM SATELLITE DATA

  3. Regulating Online Data Privacy

    OpenAIRE

    Paul Reid

    2004-01-01

    With existing data protection laws proving inadequate in the fight to protect online data privacy and with the offline law of privacy in a state of change and uncertainty, the search for an alternative solution to the important problem of online data privacy should commence. With the inherent problem of jurisdiction that the Internet presents, such a solution is best coming from a multi-national body with the power to approximate laws in as many jurisdictions as possible, with a recognised au...

  4. Protecting genetic privacy.

    Science.gov (United States)

    Roche, P A; Annas, G J

    2001-05-01

    This article outlines the arguments for and against new rules to protect genetic privacy. We explain why genetic information is different to other sensitive medical information, why researchers and biotechnology companies have opposed new rules to protect genetic privacy (and favour anti-discrimination laws instead), and discuss what can be done to protect privacy in relation to genetic-sequence information and to DNA samples themselves.

  5. Privacy driven internet ecosystem

    OpenAIRE

    Trinh, Tuan Anh; Gyarmati, Laszlo

    2012-01-01

    The dominant business model of today's Internet is built upon advertisements; users can access Internet services while the providers show ads to them. Although significant efforts have been made to model and analyze the economic aspects of this ecosystem, the heart of the current status quo, namely privacy, has not received the attention of the research community yet. Accordingly, we propose an economic model of the privacy driven Internet ecosystem where privacy is handled as an asset that c...

  6. 76 FR 56781 - Privacy Act of 1974; Notice of a Computer Matching Program Between the Department of Housing and...

    Science.gov (United States)

    2011-09-14

    ... require additional verification to identify inappropriate or inaccurate rental assistance, and may provide... Affordable Housing Act, the Native American Housing Assistance and Self-Determination Act of 1996, and the... matching activities. The computer matching program will also provide for the verification of social...

  7. Privacy in domestic environments

    OpenAIRE

    Radics, Peter J; Gracanin, Denis

    2011-01-01

    non-peer-reviewed While there is a growing body of research on privacy,most of the work puts the focus on information privacy. Physical and psychological privacy issues receive little to no attention. However, the introduction of technology into our lives can cause problems with regard to these aspects of privacy. This is especially true when it comes to our homes, both as nodes of our social life and places for relaxation. This paper presents the results of a study intended to captu...

  8. Practical Privacy Assessment

    DEFF Research Database (Denmark)

    Peen, Søren; Jansen, Thejs Willem; Jensen, Christian D.

    2008-01-01

    This chapter proposes a privacy assessment model called the Operational Privacy Assessment Model that includes organizational, operational and technical factors for the protection of personal data stored in an IT system. The factors can be evaluated in a simple scale so that not only the resulting...... graphical depiction can be easily created for an IT system, but graphical comparisons across multiple IT systems are also possible. Examples of factors presented in a Kiviat graph are also presented. This assessment tool may be used to standardize privacy assessment criteria, making it less painful...... for the management to assess privacy risks on their systems....

  9. Defense Transportation; The Army

    National Research Council Canada - National Science Library

    1998-01-01

    .... The statement of managers in the conference report on the Department of Defense Appropriations Act, 1997, directed us to validate the results and savings achieved from this and any other personal property pilot program...

  10. Joint Service Chemical and Biological Defense Program: FY 06-07 Overview

    Science.gov (United States)

    2006-01-01

    Performers Molecular model of human plasma-derived butyryl Electronmicrograph of bacillus spores adhering to cell membrane processes 38866_BATT_TX 11...agents, and radioactive fallout. CPS is integrated with the ship’s Heating, Ventilation, and Air-Conditioning ( HVAC ) systems and provides filtered air...molecules for intervention against protein NTA. • Identify and evaluate effectiveness of spore germination inhibitors. • Expand drug discovery program

  11. Defense Small Business Innovation Research Program (SBIR) Volume 2. Navy Abstracts of Phase 1 Awards, 1987

    Science.gov (United States)

    1988-04-01

    LOSS OF POWER TO THE COMPRESSOR SYS- TEM. COMPLETE EFFICIENCY OF THIS DEHYDRATOR WILL RESUME WITHIN A FEW SECONDS FOLLOWING RESTORATION OF POWER...NAVY SUBMITTED BY THIS PHASE I PROGRAM IS DIRECTED TOWARD THE DEVELOPMENT OF A CHARGE- ENHANCED MICROFILTRATION MEMBRANE SYSTEM FOR REMOVAL OF SUSPENDED...THAT A SINGLE 10V " RESTORE " PULSE RETURNS THE KNO(3) MEMORIES TO A STATE VERY NEAR THAT OF VIRGIN DEVICES. RE- LATED ELECTRICAL REMEDIES FOR FATIGUE

  12. Supply Inventory Management: Evaluation of the Defense Supply Center Columbus Qualified Products List and Qualified Manufacturers List Program

    National Research Council Canada - National Science Library

    2002-01-01

    ... was transitioned from the Military Departments. The Defense Supply Center Columbus currently has management responsibility for over 300 Qualified Products Lists and 4 Qualified Manufacturers Lists...

  13. Balancing Privacy and Professionalism: A Survey of General Surgery Program Directors on Social Media and Surgical Education.

    Science.gov (United States)

    Langenfeld, Sean J; Vargo, Daniel J; Schenarts, Paul J

    Unprofessional behavior is common among surgical residents and faculty surgeons on Facebook. Usage of social media outlets such as Facebook and Twitter is growing at exponential rates, so it is imperative that surgery program directors (PDs) focus on professionalism within social media, and develop guidelines for their trainees and surgical colleagues. Our study focuses on the surgery PDs current approach to online professionalism within surgical education. An online survey of general surgery PDs was conducted in October 2015 through the Association for Program Directors in Surgery listserv. Baseline PD demographics, usage and approach to popular social media outlets, existing institutional policies, and formal curricula were assessed. A total of 110 PDs responded to the survey (110/259, 42.5% response rate). Social media usage was high among PDs (Facebook 68% and Twitter 40%). PDs frequently viewed the social media profiles of students, residents, and faculty. Overall, 11% of PDs reported lowering the rank or completely removing a residency applicant from the rank order list because of online behavior, and 10% reported formal disciplinary action against a surgical resident because of online behavior. Overall, 68% of respondents agreed that online professionalism is important, and that residents should receive instruction on the safe use of social media. However, most programs did not have formal didactics or known institutional policies in place. Use of social media is high among PDs, and they often view the online behavior of residency applicants, surgical residents, and faculty surgeons. Within surgical education, there needs to be an increased focus on institutional policies and standardized curricula to help educate physicians on social media and online professionalism. Copyright © 2016 Association of Program Directors in Surgery. Published by Elsevier Inc. All rights reserved.

  14. Defense Small Business Innovation Research Program (SBIR). Abstracts of Phase 2 Awards 1992

    Science.gov (United States)

    1992-01-01

    into diamond. 2 ARMY SBIR PHASE II AWARDS Transition metals were alloyed at relatively low temperatures to form a thin layer of silicides which lowered...structures. D~uring the phase I program. lDamaskos . Intc. succCssfullN delltonstratet! a cs stpssiol loter :,1I formed by depositinig alte rnat intg layers ...Heights Drive Office: CRI)FC Aica. fiI 96701 Co ntract #: 1)AAA 1 5-93-C-0002if Phonie: 1808)l 486-5381 Ill: Dr, T- J, G. Rasbould Title: Urease -Linked

  15. Department of energy defense programs perspectives on safeguards, security, and classification

    International Nuclear Information System (INIS)

    Eyck, E.Q.T.

    1989-01-01

    This paper discusses why national and international safeguards and the protection of sensitive information are important to the United States and to other nations. It demonstrates that while the opposite consequence appears logical these functions will probably become even more important if the major powers agree on further arms reductions. Some of the steps taken by the U.S. Department of Energy to improve the effectiveness of its safeguards, security, and classification programs are reviewed. The valuable contributions in these areas since 1968 and 1976, respectively by the Technical Support Organization and the International Safeguards Project Offoce at Brookhaven are noted

  16. Department of Defense need for a micro-electromechanical systems (MEMS) reliability assessment program

    Science.gov (United States)

    Zunino, James L., III; Skelton, Donald

    2005-01-01

    As the United States (U.S.) Army transforms into a lighter, more lethal, and more agile force, the technologies that support both legacy and emerging weapon systems must decrease in size while increasing in intelligence. Micro-electromechanical systems (MEMS) are one such technology that the Army as well as entire DOD will heavily rely on in achieving these objectives. Current and future military applications of MEMS devices include safety and arming devices, guidance systems, sensors/detectors, inertial measurement units, tracking devices, radio frequency devices, wireless radio frequency identification (RFID), etc. Even though the reliance on MEMS devices has been increasing, there have been no studies performed to determine their reliability and failure mechanisms. Furthermore, no standardized test protocols exist for assessing reliability. Accordingly, the U.S. Army Corrosion Office at Picatinny, NJ has initiated the MEMS Reliability Assessment Program to address this issue.

  17. Sandia National Laboratories: National Security Missions: Defense Systems

    Science.gov (United States)

    ; Technology Defense Systems & Assessments About Defense Systems & Assessments Program Areas Audit Sandia's Economic Impact Licensing & Technology Transfer Browse Technology Portfolios ; Culture Work-Life Balance Special Programs Nuclear Weapons Defense Systems Global Security Energy Facebook

  18. Privacy enhanced recommender system

    NARCIS (Netherlands)

    Erkin, Zekeriya; Erkin, Zekeriya; Beye, Michael; Veugen, Thijs; Lagendijk, Reginald L.

    2010-01-01

    Recommender systems are widely used in online applications since they enable personalized service to the users. The underlying collaborative filtering techniques work on user’s data which are mostly privacy sensitive and can be misused by the service provider. To protect the privacy of the users, we

  19. Information Privacy Revealed

    Science.gov (United States)

    Lavagnino, Merri Beth

    2013-01-01

    Why is Information Privacy the focus of the January-February 2013 issue of "EDUCAUSE Review" and "EDUCAUSE Review Online"? Results from the 2012 annual survey of the International Association of Privacy Professionals (IAPP) indicate that "meeting regulatory compliance requirements continues to be the top perceived driver…

  20. Privacy Metrics and Boundaries

    NARCIS (Netherlands)

    L-F. Pau (Louis-François)

    2005-01-01

    textabstractThis paper aims at defining a set of privacy metrics (quantitative and qualitative) in the case of the relation between a privacy protector ,and an information gatherer .The aims with such metrics are: -to allow to assess and compare different user scenarios and their differences; for

  1. 75 FR 67700 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2010-11-03

    ... DEPARTMENT OF DEFENSE Department of the Army [Docket ID USA-2010-0023] Privacy Act of 1974; System... Medical Examination with supporting documentation, the Report of Medical History, and any other reporting... Report of Medical Examination with supporting documentation, the Report of Medical History, and any other...

  2. 76 FR 26714 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2011-05-09

    ... DEPARTMENT OF DEFENSE Department of the Army [Docket ID USA-2011-0010] Privacy Act of 1974; System... specialty, credit hours accumulated, examination and lesson course completion status, assignment history... history, student academic status, curricula, course description, scheduling, testing, academic, graduation...

  3. 75 FR 36644 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2010-06-28

    ... DEPARTMENT OF DEFENSE Department of the Army [Docket ID: USA-2010-0014] Privacy Act of 1974... prisoner, mail records; personal history records; individual prisoner utilization records; requests for... recommendations; request to transfer prisoner; social history; clemency and parole actions; psychologist's report...

  4. 76 FR 46767 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2011-08-03

    ...: The Department of the Army proposes to add a system of records to its inventory of record systems... provides a student management system that integrates Web-enabled courseware to support online certification... DEPARTMENT OF DEFENSE Department of the Army [Docket ID USA-2011-0019] Privacy Act of 1974; System...

  5. 75 FR 39500 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2010-07-09

    ... from the address above. The proposed system report, as required by 5 U.S.C. 552a(r) of the Privacy Act... location: Add to entry as last paragraph ``Defense Information Systems Agency (DISA) Mega Center, Building... plate number, drivers license number, vehicle make, model, year, color, drivers identification...

  6. 78 FR 69393 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2013-11-19

    ... Liberties Web site at http://dpclo.defense.gov/privacy/SORNs/component/ngia/index.html . The proposed system... the system: Current and former NGA employees, military personnel, contractors, employed by or assigned... certify, verify, or state) under penalty of perjury under the laws of the United States of America that...

  7. 78 FR 41920 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2013-07-12

    ... Civil Liberties Office Web site at http://dpclo.defense.gov/privacy/SORNs/component/army/index.html... systems of records notices. Individual should provide full name, SSN and/or DoD ID number and military... penalty of perjury under the laws of the United States of America that the foregoing is true and correct...

  8. 77 FR 60131 - DHS Data Privacy and Integrity Advisory Committee

    Science.gov (United States)

    2012-10-02

    .... to 5 p.m. Please note that the meeting may end early if the Committee has completed its business... privacy protections for the collection and use of biometrics and for cybersecurity pilot programs. These... meeting may end early if all business is completed. Privacy Act Statement: DHS's Use of Your Information...

  9. Transforming Defense

    National Research Council Canada - National Science Library

    Lamb, Christopher J; Bunn, M. E; Lutes, Charles; Cavoli, Christopher

    2005-01-01

    .... Despite the resources and attention consumed by the war on terror, and recent decisions by the White House to curtail the growth of defense spending, the senior leadership of the Department of Defense (DoD...

  10. Privacy under construction : A developmental perspective on privacy perception

    NARCIS (Netherlands)

    Steijn, W.M.P.; Vedder, A.H.

    2015-01-01

    We present a developmental perspective regarding the difference in perceptions toward privacy between young and old. Here, we introduce the notion of privacy conceptions, that is, the specific ideas that individuals have regarding what privacy actually is. The differences in privacy concerns often

  11. 75 FR 7978 - Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security Transportation...

    Science.gov (United States)

    2010-02-23

    ... Security Administration, 601 South 12th Street, Arlington, VA 20598-6036. For privacy issues please contact... Secretary 6 CFR Part 5 [Docket No. DHS-2009-0137] Privacy Act of 1974: Implementation of Exemptions... Program System of Records AGENCY: Privacy Office, DHS. ACTION: Notice of proposed rulemaking. SUMMARY: The...

  12. Proceedings of the Department of Energy Defense Programs hazardous and mixed waste minimization workshop: Hazardous Waste Remedial Actions Program

    International Nuclear Information System (INIS)

    1988-09-01

    The first workshop on hazardous and mixed waste minimization was held in Las Vegas, Nevada, on July 26--28, 1988. The objective of this workshop was to establish an interchange between DOE headquarters (DOE-HQ) DP, Operations Offices, and contractors of waste minimization strategies and successes. The first day of the workshop began with presentations stressing the importance of establishing a waste minimization program at each site as required by RCRA, the land ban restrictions, and the decrease in potential liabilities associated with waste disposal. Discussions were also centered on pending legislation which would create an Office of Waste Reduction in the Environmental Protection Agency (EPA). The Waste Minimization and Avoidance Study was initiated by DOE as an addition to the long-term productivity study to address the issues of evolving requirements facing RCRA waste management activities at the DP sites, to determine how major operations will be affected by these requirements, and to determine the available strategies and options for waste minimization and avoidance. Waste minimization was defined in this study as source reduction and recycling

  13. Developing a Comprehensive and Integrated Vulnerability Assessment Methodology for the Defense Department's Critical Infrastructure Protection (CIP) Program. A Report Supporting CIP Program Outread and Education

    National Research Council Canada - National Science Library

    2003-01-01

    ...) strategy for Outreach, Education, and Training. It seeks to help those interested in understanding the Defense Department's current concepts and plans for developing CIP-specific vulnerability assessments...

  14. 76 FR 58788 - Privacy Act of 1974; Systems of Records

    Science.gov (United States)

    2011-09-22

    ... Manager, Corporate Communications, Defense Finance and Accounting Service, DFAS-HKC/IN, 8899 E. 56th... inquires to FOIA/PA Program Manager, Corporate Communications, Defense Finance and Accounting Service, DFAS...; Systems of Records AGENCY: Defense Finance and Accounting Service, Department of Defense, (DoD). ACTION...

  15. Security and privacy for implantable medical devices

    CERN Document Server

    Carrara, Sandro

    2014-01-01

     This book presents a systematic approach to analyzing the challenging engineering problems posed by the need for security and privacy in implantable medical devices (IMD).  It describes in detail new issues termed as lightweight security, due to the associated constraints on metrics such as available power, energy, computing ability, area, execution time, and memory requirements. Coverage includes vulnerabilities and defense across multiple levels, with basic abstractions of cryptographic services and primitives such as public key cryptography, block ciphers and digital signatures. Experts from engineering introduce to some IMD systems that have  recently been proposed and developed. Experts from Computer Security and Cryptography present new research, which shows vulnerabilities in existing IMDs and proposes solutions. Experts from Privacy Technology and Policy will discuss the societal, legal and ethical challenges surrounding IMD security as well as technological solutions that build on the latest in C...

  16. Proceedings, Conference on the Defense Planning, Programming, and Budgeting System (PPBS): Past, Present, and Future Held at Washington, DC on 4-6 November 1982

    Science.gov (United States)

    1982-11-06

    They are reviewed by the Deputy Chief of Staff for Installations and Logistics to de - The DC/S for manpower then goes on to a termine the logistica ...analyses have manages its programming process. concentrated on such innovations as the De - fense Resources Board and Defense Guidance. * Discussions of... transport that fighting force to the every student of any kind of management at all beach or into battle, then all of General would say that if you

  17. Buying Program of the Standard Automated Materiel Management System. Automated Small Purchase System: Defense Supply Center Philadelphia

    National Research Council Canada - National Science Library

    2001-01-01

    The Standard Automated Materiel Management System Automated Small Purchase System is a fully automated micro-purchases system used by the General and Industrial Directorate at the Defense Supply Center Philadelphia...

  18. Protecting patron privacy

    CERN Document Server

    Beckstrom, Matthew

    2015-01-01

    In a world where almost anyone with computer savvy can hack, track, and record the online activities of others, your library can serve as a protected haven for your visitors who rely on the Internet to conduct research-if you take the necessary steps to safeguard their privacy. This book shows you how to protect patrons' privacy while using the technology that your library provides, including public computers, Internet access, wireless networks, and other devices. Logically organized into two major sections, the first part of the book discusses why the privacy of your users is of paramount

  19. Web Security, Privacy & Commerce

    CERN Document Server

    Garfinkel, Simson

    2011-01-01

    Since the first edition of this classic reference was published, World Wide Web use has exploded and e-commerce has become a daily part of business and personal life. As Web use has grown, so have the threats to our security and privacy--from credit card fraud to routine invasions of privacy by marketers to web site defacements to attacks that shut down popular web sites. Web Security, Privacy & Commerce goes behind the headlines, examines the major security risks facing us today, and explains how we can minimize them. It describes risks for Windows and Unix, Microsoft Internet Exp

  20. Privacy in Social Networks

    CERN Document Server

    Zheleva, Elena

    2012-01-01

    This synthesis lecture provides a survey of work on privacy in online social networks (OSNs). This work encompasses concerns of users as well as service providers and third parties. Our goal is to approach such concerns from a computer-science perspective, and building upon existing work on privacy, security, statistical modeling and databases to provide an overview of the technical and algorithmic issues related to privacy in OSNs. We start our survey by introducing a simple OSN data model and describe common statistical-inference techniques that can be used to infer potentially sensitive inf

  1. Biological Defense Research Program

    Science.gov (United States)

    1989-04-01

    difference between life and death. Some recent examples are: BDRP developed VEE vaccine used in Central America, Mexico , and Texas (1969- 1971.) and Rift...Complex, is adn area owned by the Bureau of Land Management, which is available for grazina, and with specific permission, for use by DPG. 2.3...2.01 A Large European Laboratory, 1944-1950 50.00 Tuberculosis Laboratory 4 Technicians, Canada, 1947-1954 19.00 Research Institutes, 1930-1950 4.10

  2. National Privacy Research Strategy

    Data.gov (United States)

    Networking and Information Technology Research and Development, Executive Office of the President — On July 1, NITRD released the National Privacy Research Strategy. Research agencies across government participated in the development of the strategy, reviewing...

  3. Cybersecurity and Privacy

    DEFF Research Database (Denmark)

    he huge potential in future connected services has as a precondition that privacy and security needs are dealt with in order for new services to be accepted. This issue is increasingly on the agenda both at the company and at individual level. Cybersecurity and Privacy – bridging the gap addresses...... two very complex fields of the digital world, i.e., Cybersecurity and Privacy. These multifaceted, multidisciplinary and complex issues are usually understood and valued differently by different individuals, data holders and legal bodies. But a change in one field immediately affects the others....... Policies, frameworks, strategies, laws, tools, techniques, and technologies – all of these are tightly interwoven when it comes to security and privacy. This book is another attempt to bridge the gap between the industry and academia. The book addresses the views from academia and industry on the subject...

  4. Privacy for Sale?

    DEFF Research Database (Denmark)

    Sørensen, Lene Tolstrup; Sørensen, Jannick Kirk; Khajuria, Samant

    Data brokers have become central players in the collection online of private user data. Data brokers’ activities are however not very transparent or even known by users. Many users regard privacy a central element when they use online services. Based on 12 short interviews with users, this paper...... analyses how users perceive the concept of online privacy in respect to data brokers col- lection of private data, and particularly novel services that offer users the possi- bility to sell their private data. Two groups of users are identified: Those who are considering selling their data under specific...... conditions, and those who reject the idea completely. Based on the literature we identify two positions to privacy either as an instrumental good, or as an intrinsic good. The paper positions vari- ous user perceptions on privacy that are relevant for future service develop- ment....

  5. Certificate Transparency with Privacy

    Directory of Open Access Journals (Sweden)

    Eskandarian Saba

    2017-10-01

    Full Text Available Certificate transparency (CT is an elegant mechanism designed to detect when a certificate authority (CA has issued a certificate incorrectly. Many CAs now support CT and it is being actively deployed in browsers. However, a number of privacy-related challenges remain. In this paper we propose practical solutions to two issues. First, we develop a mechanism that enables web browsers to audit a CT log without violating user privacy. Second, we extend CT to support non-public subdomains.

  6. 75 FR 20298 - Privacy Act Regulations

    Science.gov (United States)

    2010-04-19

    ... prevent and detect fraud, waste, and abuse and perform its other authorized duties and activities relating...--RATB Investigative Files'' and ``RATB--12--RATB Fraud Hotline Program Files,'' pursuant to the Privacy... 5 U.S.C. 552a: (1) From subsection (c)(3) because the release of accounting of disclosure would...

  7. Stratospheric Transparency: Perspectives on Internet Privacy

    Science.gov (United States)

    Hauck, Rita M.

    2009-01-01

    As a parent of teenagers in the 1980s, I recall a concern of the intrusion by MTV into our home. After futile attempts to block the program, my spouse and I set out to convince our sons of its intrusion. Our challenge was miniscule when compared to the Internet privacy issues of today. This paper addresses such challenges and proposes some…

  8. Report of Secretary of Defense, Harold Brown, to the Congress on the FY 1982 Budget, FY 1983 Authorization Request and FY 1982-1986 Defense Programs

    Science.gov (United States)

    1981-01-19

    installation compliance with environmental and OSHA standards, and NATO infrastructure facilities funds. 1. Military Construction Program a. European...investment effort (research and development, procurement, and military construction ) and the pattern of increases. The former trend is important because it...SPAIN MANGANESE U GABON, BRAZI SOUR AFICA TANTAIAU 97 THAILAND, CANADA. MALAYSIA . BRAI COBALT 97 ZAIJRE, B LG.-UX.. ZAMBIA. FINIANO SAM~T & ALUIMINA

  9. 78 FR 34354 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2013-06-07

    ...(r) of the Privacy Act of 1974, as amended, was submitted on May 14, 2013, to the House Committee on... replace with ``System contains personnel data to support enlisted assignment, planning, programming...

  10. 78 FR 65620 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2013-11-01

    ..., as required by 5 U.S.C. 552a(r) of the Privacy Act of 1974, as amended, was submitted on March 18... support officer assignment, planning, programming, accounting, promotions, career development, and...

  11. 77 FR 29616 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2012-05-18

    .... DCIO 01 System name: Defense Industrial Base (DIB) Cyber Security/Information Assurance Records. System location: Director, Defense Industrial Base (DIB) Cyber Security/Information Assurance (CS/IA) Program... Infrastructure Program (DCIP) Management; and DoDI 5205.13, Defense Industrial Base (DIB) Cyber Security...

  12. The Effect of a 12-Week Moderate Intensity Interval Training Program on the Antioxidant Defense Capability and Lipid Profile in Men Smoking Cigarettes or Hookah: A Cohort Study

    Directory of Open Access Journals (Sweden)

    Abdessalem Koubaa

    2015-01-01

    Full Text Available Aim. To examine the impact of interval training program on the antioxidant defense capability and lipid profile in men smoking cigarettes or hookah unable or unwilling to quit smoking. Methods. Thirty-five participants performed an interval training (2 : 1 work : rest ratio 3 times a week for 12 weeks at an intensity of 70% of VO2max. All subjects were subjected to a biochemical test session before and after the training program. Results. The increase of total antioxidant status (TAS, glutathione peroxidase (GPx, and α-tocopherol, is significant only for cigarette smokers (CS and hookah smokers (HS groups. The decrease of malondialdehyde (MDA and the increase of glutathione reductase (GR are more pronounced in smokers groups compared to those of nonsmokers (NS. Superoxide dismutase (SOD increases in NS, CS, and HS groups by 10.1%, 19.5%, and 13.3%, respectively (P<0.001. Likewise, a significant improvement of high-density lipoprotein cholesterol (HDL-C and TC/HDL-C ratio was observed in CS and HS groups (P<0.05. Conclusion. Although the interval training program does not have a significant effect on blood lipid levels, it seems to be very beneficial in the defense and prevention programs of oxidative stress.

  13. Fusion connection: contributions to industry, defense, and basic science resulting from scientific advances made in the Magnetic Fusion Energy Program

    International Nuclear Information System (INIS)

    Finn, T.; Woo, J.; Temkin, R.

    1985-10-01

    Fusion research has led to significant contributions in many different areas of industry, defense, and basic science. This diversity is represented visually in the introductory figure which shows both a radio galaxy, and a microchip produced by plasma etching. Some of these spin-off technologies are discussed

  14. An informational theory of privacy

    NARCIS (Netherlands)

    Schottmuller, C.; Jann, Ole

    2016-01-01

    We develop a theory that explains how and when privacy can increase welfare. Without privacy, some individuals misrepresent their preferences, because they will otherwise be statistically discriminated against. This "chilling effect" hurts them individually, and impairs information aggregation. The

  15. Sperm Donation and the Right to Privacy.

    Science.gov (United States)

    Hallich, Oliver

    2017-07-01

    Sperm donation is an increasingly common method of assisted reproduction. In the debate on sperm donation, the right to privacy - construed as a right that refers to the limits of the realm of information to which others have access - plays a pivotal role with regard to two questions. The first question is whether the sperm donor's right to privacy implies his right to retain his anonymity, the second is whether the gamete recipients' right to privacy entitles them to withhold information about the circumstances of their conception from their donor-conceived offspring. In this contribution, I tackle these two interrelated questions. In part (1), I defend the view that there is a prima facie right of sperm donors to remain anonymous. Part (2) widens the perspective by taking into consideration the welfare of donor-conceived offspring. I argue that anonymity may harm the child only if the gametes' recipients decide to disclose information about the circumstances of her birth to the child. Non-disclosure of these circumstances, however, is morally problematic because it may not necessarily harm, but wrong the child. In section (3), I attempt to rebut some arguments in defense of non-disclosure. In part (4), I defend the view that the best practice of sperm donation would be 'direct donation', i.e. that the identity of the donor is known from the time of conception. Part (5) concludes.

  16. Privacy in social networking sites

    OpenAIRE

    Λεονάρδος, Γεώργιος; Leonardos, Giorgos

    2016-01-01

    The purpose of this study is to explore the aspects of privacy over the use of social networks web sites. More specific, we will show the types of social networks, their privacy mechanisms that are different in each social network site, their privacy options that are offered to users. We will report some serious privacy violations incidents of the most popular social networks sites such as Facebook, Twitter, LinkedIn. Also, we will report some important surveys about social networks and pr...

  17. 77 FR 31371 - Public Workshop: Privacy Compliance Workshop

    Science.gov (United States)

    2012-05-25

    ... presentations, including the privacy compliance fundamentals, privacy and data security, and the privacy... DEPARTMENT OF HOMELAND SECURITY Office of the Secretary Public Workshop: Privacy Compliance... Homeland Security Privacy Office will host a public workshop, ``Privacy Compliance Workshop.'' DATES: The...

  18. Privacy and Open Government

    Directory of Open Access Journals (Sweden)

    Teresa Scassa

    2014-06-01

    Full Text Available The public-oriented goals of the open government movement promise increased transparency and accountability of governments, enhanced citizen engagement and participation, improved service delivery, economic development and the stimulation of innovation. In part, these goals are to be achieved by making more and more government information public in reusable formats and under open licences. This paper identifies three broad privacy challenges raised by open government. The first is how to balance privacy with transparency and accountability in the context of “public” personal information. The second challenge flows from the disruption of traditional approaches to privacy based on a collapse of the distinctions between public and private sector actors. The third challenge is that of the potential for open government data—even if anonymized—to contribute to the big data environment in which citizens and their activities are increasingly monitored and profiled.

  19. Advertising and Invasion of Privacy.

    Science.gov (United States)

    Rohrer, Daniel Morgan

    The right of privacy as it relates to advertising and the use of a person's name or likeness is discussed in this paper. After an introduction that traces some of the history of invasion of privacy in court decisions, the paper examines cases involving issues such as public figures and newsworthy items, right of privacy waived, right of privacy…

  20. Privacy in an Ambient World

    NARCIS (Netherlands)

    Dekker, M.A.C.; Etalle, Sandro; den Hartog, Jeremy

    Privacy is a prime concern in today's information society. To protect the privacy of individuals, enterprises must follow certain privacy practices, while collecting or processing personal data. In this chapter we look at the setting where an enterprise collects private data on its website,

  1. 76 FR 59073 - Privacy Act

    Science.gov (United States)

    2011-09-23

    ... CENTRAL INTELLIGENCE AGENCY 32 CFR Part 1901 Privacy Act AGENCY: Central Intelligence Agency. ACTION: Proposed rule. SUMMARY: Consistent with the Privacy Act (PA), the Central Intelligence Agency...-1379. SUPPLEMENTARY INFORMATION: Consistent with the Privacy Act (PA), the CIA has undertaken and...

  2. Privacy Expectations in Online Contexts

    Science.gov (United States)

    Pure, Rebekah Abigail

    2013-01-01

    Advances in digital networked communication technology over the last two decades have brought the issue of personal privacy into sharper focus within contemporary public discourse. In this dissertation, I explain the Fourth Amendment and the role that privacy expectations play in the constitutional protection of personal privacy generally, and…

  3. Designing Privacy-by-Design

    NARCIS (Netherlands)

    Rest, J.H.C. van; Boonstra, D.; Everts, M.H.; Rijn, M. van; Paassen, R.J.G. van

    2014-01-01

    The proposal for a new privacy regulation d.d. January 25th 2012 introduces sanctions of up to 2% of the annual turnover of enterprises. This elevates the importance of mitigation of privacy risks. This paper makes Privacy by Design more concrete, and positions it as the mechanism to mitigate these

  4. What was privacy?

    Science.gov (United States)

    McCreary, Lew

    2008-10-01

    Why is that question in the past tense? Because individuals can no longer feel confident that the details of their lives--from identifying numbers to cultural preferences--will be treated with discretion rather than exploited. Even as Facebook users happily share the names of their favorite books, movies, songs, and brands, they often regard marketers' use of that information as an invasion of privacy. In this wide-ranging essay, McCreary, a senior editor at HBR, examines numerous facets of the privacy issue, from Google searches, public shaming on the internet, and cell phone etiquette to passenger screening devices, public surveillance cameras, and corporate chief privacy officers. He notes that IBM has been a leader on privacy; its policy forswearing the use of employees' genetic information in hiring and benefits decisions predated the federal Genetic Information Nondiscrimination Act by three years. Now IBM is involved in an open-source project known as Higgins to provide users with transportable, potentially anonymous online presences. Craigslist, whose CEO calls it "as close to 100% user driven as you can get," has taken an extremely conservative position on privacy--perhaps easier for a company with a declared lack of interest in maximizing revenue. But TJX and other corporate victims of security breaches have discovered that retaining consumers' transaction information can be both costly and risky. Companies that underestimate the importance of privacy to their customers or fail to protect it may eventually face harsh regulation, reputational damage, or both. The best thing they can do, says the author, is negotiate directly with those customers over where to draw the line.

  5. Defense Acquisitions Acronyms and Terms

    Science.gov (United States)

    2012-12-01

    DR Decision Review DRMO Defense Reutilization Marketing Office DRPM Direct Reporting Program Manager DSAA Defense Security Assistance Agency...STE Special Test Equipment STEP Simulation, Test, and Evaluation Process STLDD Software Top Level Design Document STP Software Test Plan STPR...established catalog or market prices for specific tasks under standard commercial terms and conditions; this does not include services sold based

  6. Program Manager: Journal of the Defense Systems Management College. Volume 18, Number 3, May-June 1989

    Science.gov (United States)

    1989-06-01

    default. Slavery to a cost-discount rate options and, therefore, his ability to project F would cost $109.99 in year 2. can well lead a decision-maker to a...at hand. of recent allegations allegations and indictments for Symbiotic interaction of "knowing" unethical and unlawful individual con- professionals...contractor crease productivity substantially in unethical and managers. defense acquisition jobs and tasks. Productive acquisition management Background

  7. Planetary Defense

    Science.gov (United States)

    2016-05-01

    4 Abstract Planetary defense against asteroids should be a major concern for every government in the world . Millions of asteroids and...helps make Planetary Defense viable because defending the Earth against asteroids benefits from all the above technologies. So if our planet security...information about their physical characteristics so we can employ the right strategies. It is a crucial difference if asteroids are made up of metal

  8. Privacy Bridges: EU and US Privacy Experts In Search of Transatlantic Privacy Solutions

    NARCIS (Netherlands)

    Abramatic, J.-F.; Bellamy, B.; Callahan, M.E.; Cate, F.; van Eecke, P.; van Eijk, N.; Guild, E.; de Hert, P.; Hustinx, P.; Kuner, C.; Mulligan, D.; O'Connor, N.; Reidenberg, J.; Rubinstein, I.; Schaar, P.; Shadbolt, N.; Spiekermann, S.; Vladeck, D.; Weitzner, D.J.; Zuiderveen Borgesius, F.; Hagenauw, D.; Hijmans, H.

    2015-01-01

    The EU and US share a common commitment to privacy protection as a cornerstone of democracy. Following the Treaty of Lisbon, data privacy is a fundamental right that the European Union must proactively guarantee. In the United States, data privacy derives from constitutional protections in the

  9. Biometrics and privacy

    NARCIS (Netherlands)

    Grijpink, J.H.A.M.

    2001-01-01

    Biometrics offers many alternatives for protecting our privacy and preventing us from falling victim to crime. Biometrics can even serve as a solid basis for safe anonymous and semi-anonymous legal transactions. In this article Jan Grijpink clarifies which concepts and practical applications this

  10. Reconciling privacy and security

    NARCIS (Netherlands)

    Lieshout, M.J. van; Friedewald, M.; Wright, D.; Gutwirth, S.

    2013-01-01

    This paper considers the relationship between privacy and security and, in particular, the traditional "trade-off" paradigm. The issue is this: how, in a democracy, can one reconcile the trend towards increasing security (for example, as manifested by increasing surveillance) with the fundamental

  11. Privacy Policy | FNLCR Staging

    Science.gov (United States)

    The privacy of our users is of utmost importance to Frederick National Lab. The policy outlined below establishes how Frederick National Lab will use the information we gather about you from your visit to our website. We may collect and store

  12. Methods for estimating costs of transporting spent fuel and defense high-level radioactive waste for the civilian radioactive waste management program

    International Nuclear Information System (INIS)

    Darrough, M.E.; Lilly, M.J.

    1989-01-01

    The US Department of Energy (DOE), through the Office of Civilian Radioactive Waste Management, is planning and developing a transportation program for the shipment of spent fuel and defense high-level waste from current storage locations to the site of the mined geologic repository. In addition to its responsibility for providing a safe transportation system, the DOE will assure that the transportation program will function with the other system components to create an integrated waste management system. In meeting these objectives, the DOE will use private industry to the maximum extent practicable and in a manner that is cost effective. This paper discusses various methodologies used for estimating costs for the national radioactive waste transportation system. Estimating these transportation costs is a complex effort, as the high-level radioactive waste transportation system, itself, will be complex. Spent fuel and high-level waste will be transported from more than 100 nuclear power plants and defense sites across the continental US, using multiple transport modes (truck, rail, and barge/rail) and varying sizes and types of casks. Advance notification to corridor states will be given and scheduling will need to be coordinated with utilities, carriers, state and local officials, and the DOE waste acceptance facilities. Additionally, the waste forms will vary in terms of reactor type, size, weight, age, radioactivity, and temperature

  13. 08471 Report -- Geographic Privacy-Aware Knowledge Discovery and Delivery

    OpenAIRE

    Kuijpers, Bart; Pedreschi, Dino; Saygin, Yucel; Spaccapietra, Stefano

    2009-01-01

    The Dagstuhl-Seminar on Geographic Privacy-Aware Knowledge Discovery and Delivery was held during 16 - 21 November, 2008, with 37 participants registered from various countries from Europe, as well as other parts of the world such as United States, Canada, Argentina, and Brazil. Issues in the newly emerging area of geographic knowledge discovery with a privacy perspective were discussed in a week to consolidate some of the research questions. The Dagstuhl program included...

  14. 76 FR 61675 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2011-10-05

    ... Register Liaison Officer, Department of Defense. DODEA 29 System Name: Department of Defense Education Activity Non-DoD Schools Program. System Location: Department of Defense Education Activity (DoDEA..., Benefits for Certain Employees Assigned Outside the United States; and E.O. 9397 (SSN), as amended. Purpose...

  15. 75 FR 17906 - Privacy Act of 1974; Systems of Records

    Science.gov (United States)

    2010-04-08

    ... ``Program Manager, Law Enforcement Operations, Headquarters, Defense Logistics Agency, Office of Public... Manager, Law Enforcement Operations, Headquarters, Defense Logistics Agency, Office of Public Safety, 8725...; Systems of Records AGENCY: Defense Logistics Agency, DoD. ACTION: Notice to amend a system of records...

  16. Defense Health Care. Reimbursement of Hospitals Not Meeting CHAMPUS (Civilian Health and Medical Program of the Uniformed Services) Copayment Requirements.

    Science.gov (United States)

    1988-06-01

    8217JntedState* General AccouýLg Office __ Rteport to Congmesoa Commitee A,""FILE COPYAD-A197 876 DF7-EANSE HEF.ALTHl L’W Reimbur emen--t Of I...Secretary of Defense grant a waiver from CHAMPUS copayment requirements and be approved, tuader certain criteria, to be reimbursed for care to...that a provider waives patient copayments, it denies the provider’s claim for reimbursement . . In fiscal year 1987, cHAmpus payments to civilian

  17. Evaluation Policy Alternatives for the Reengineering of the Department of Defense Personal Property Shipment and Storage Program - A Stakeholder Approach

    National Research Council Canada - National Science Library

    Lepson, Michael

    1999-01-01

    ...) to evaluate the personal property pilot programs as part of Management Reform Memorandum # 6. This thesis evaluates the policy alternatives for reengineering the DOD personal property program using a stakeholder approach...

  18. Towards Territorial Privacy in Smart Environments

    NARCIS (Netherlands)

    Könings, Bastian; Schaub, Florian; Weber, M.; Kargl, Frank

    Territorial privacy is an old concept for privacy of the personal space dating back to the 19th century. Despite its former relevance, territorial privacy has been neglected in recent years, while privacy research and legislation mainly focused on the issue of information privacy. However, with the

  19. Privacy Awareness: A Means to Solve the Privacy Paradox?

    Science.gov (United States)

    Pötzsch, Stefanie

    People are limited in their resources, i.e. they have limited memory capabilities, cannot pay attention to too many things at the same time, and forget much information after a while; computers do not suffer from these limitations. Thus, revealing personal data in electronic communication environments and being completely unaware of the impact of privacy might cause a lot of privacy issues later. Even if people are privacy aware in general, the so-called privacy paradox shows that they do not behave according to their stated attitudes. This paper discusses explanations for the existing dichotomy between the intentions of people towards disclosure of personal data and their behaviour. We present requirements on tools for privacy-awareness support in order to counteract the privacy paradox.

  20. Defense Business Board

    Science.gov (United States)

    Skip to main content (Press Enter). Toggle navigation Defense Business Board Search Search Defense Business Board: Search Search Defense Business Board: Search Defense Business Board Business Excellence in Defense of the Nation Defense Business Board Home Charter Members Meetings Studies Contact Us The Defense

  1. The Art and Science of Defense Logistics

    Science.gov (United States)

    1995-04-01

    The Art And Science Of Defense Logistics CSC 1995 SUBJECT AREA - Logistics THE ART AND SCIENCE OF DEFENSE LOGISTICS...Government EXECUTIVE SUMMARY Title: The Art and Science of Defense Logistics Author: Major S. I. Schuler, USMC Research Questions: 1...00-1995 4. TITLE AND SUBTITLE The Art And Science Of Defense Logistics 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6

  2. Gaussian operations and privacy

    International Nuclear Information System (INIS)

    Navascues, Miguel; Acin, Antonio

    2005-01-01

    We consider the possibilities offered by Gaussian states and operations for two honest parties, Alice and Bob, to obtain privacy against a third eavesdropping party, Eve. We first extend the security analysis of the protocol proposed in [Navascues et al. Phys. Rev. Lett. 94, 010502 (2005)]. Then, we prove that a generalized version of this protocol does not allow one to distill a secret key out of bound entangled Gaussian states

  3. Privacy 2.0

    Directory of Open Access Journals (Sweden)

    Stylianos Papathanassopoulos

    2015-04-01

    Full Text Available We live in the era of change. In this world, privacy is not a static concept, but instead has a dynamic component. Overall, it becomes clear that the public and private are not defined in the same manner as in the past and as in the actual world, while our personal information has become a commodity that can raise our visibility in the social media driven world.

  4. Location Privacy in RFID Applications

    Science.gov (United States)

    Sadeghi, Ahmad-Reza; Visconti, Ivan; Wachsmann, Christian

    RFID-enabled systems allow fully automatic wireless identification of objects and are rapidly becoming a pervasive technology with various applications. However, despite their benefits, RFID-based systems also pose challenging risks, in particular concerning user privacy. Indeed, improvident use of RFID can disclose sensitive information about users and their locations allowing detailed user profiles. Hence, it is crucial to identify and to enforce appropriate security and privacy requirements of RFID applications (that are also compliant to legislation). This chapter first discusses security and privacy requirements for RFID-enabled systems, focusing in particular on location privacy issues. Then it explores the advances in RFID applications, stressing the security and privacy shortcomings of existing proposals. Finally, it presents new promising directions for privacy-preserving RFID systems, where as a case study we focus electronic tickets (e-tickets) for public transportation.

  5. The privacy implications of Bluetooth

    OpenAIRE

    Kostakos, Vassilis

    2008-01-01

    A substantial amount of research, as well as media hype, has surrounded RFID technology and its privacy implications. Currently, researchers and the media focus on the privacy threats posed by RFID, while consumer groups choose to boycott products bearing RFID tags. At the same, however, a very similar technology has quietly become part of our everyday lives: Bluetooth. In this paper we highlight the fact that Bluetooth is a widespread technology that has real privacy implications. Furthermor...

  6. Cognitive Privacy for Personal Clouds

    Directory of Open Access Journals (Sweden)

    Milena Radenkovic

    2016-01-01

    Full Text Available This paper proposes a novel Cognitive Privacy (CogPriv framework that improves privacy of data sharing between Personal Clouds for different application types and across heterogeneous networks. Depending on the behaviour of neighbouring network nodes, their estimated privacy levels, resource availability, and social network connectivity, each Personal Cloud may decide to use different transmission network for different types of data and privacy requirements. CogPriv is fully distributed, uses complex graph contacts analytics and multiple implicit novel heuristics, and combines these with smart probing to identify presence and behaviour of privacy compromising nodes in the network. Based on sensed local context and through cooperation with remote nodes in the network, CogPriv is able to transparently and on-the-fly change the network in order to avoid transmissions when privacy may be compromised. We show that CogPriv achieves higher end-to-end privacy levels compared to both noncognitive cellular network communication and state-of-the-art strategies based on privacy-aware adaptive social mobile networks routing for a range of experiment scenarios based on real-world user and network traces. CogPriv is able to adapt to varying network connectivity and maintain high quality of service while managing to keep low data exposure for a wide range of privacy leakage levels in the infrastructure.

  7. U.S. Department of Energy Space and Defense Power Systems Program Ten-Year Strategic Plan, Volume 1 and Volume 2

    Energy Technology Data Exchange (ETDEWEB)

    Dwight, Carla

    2013-06-01

    The Department of Energy's Space and Defense Power Systems program provides a unique capability for supplying power systems that function in remote or hostile environments. This capability has been functioning since the early 1960s and counts the National Aeronautics and Space Administration as one of its most prominent customers. This enabling technology has assisted the exploration of our solar system including the planets Jupiter, Saturn, Mars, Neptune, and soon Pluto. This capability is one-of-kind in the world in terms of its experience (over five decades), breadth of power systems flown (over two dozen to date) and range of power levels (watts to hundreds of watts). This document describes the various components of that infrastructure, work scope, funding needs, and its strategic plans going forward.

  8. Data privacy for the smart grid

    CERN Document Server

    Herold, Rebecca

    2015-01-01

    The Smart Grid and PrivacyWhat Is the Smart Grid? Changes from Traditional Energy Delivery Smart Grid Possibilities Business Model Transformations Emerging Privacy Risks The Need for Privacy PoliciesPrivacy Laws, Regulations, and Standards Privacy-Enhancing Technologies New Privacy Challenges IOT Big Data What Is the Smart Grid?Market and Regulatory OverviewTraditional Electricity Business SectorThe Electricity Open Market Classifications of Utilities Rate-Making ProcessesElectricity Consumer

  9. A Survey of Privacy on Data Integration

    OpenAIRE

    Do Son, Thanh

    2015-01-01

    This survey is an integrated view of other surveys on privacy preserving for data integration. First, we review the database context and challenges and research questions. Second, we formulate the privacy problems for schema matching and data matching. Next, we introduce the elements of privacy models. Then, we summarize the existing privacy techniques and the analysis (proofs) of privacy guarantees. Finally, we describe the privacy frameworks and their applications.

  10. Technical Privacy Metrics: a Systematic Survey

    OpenAIRE

    Wagner, Isabel; Eckhoff, David

    2018-01-01

    The file attached to this record is the author's final peer reviewed version The goal of privacy metrics is to measure the degree of privacy enjoyed by users in a system and the amount of protection offered by privacy-enhancing technologies. In this way, privacy metrics contribute to improving user privacy in the digital world. The diversity and complexity of privacy metrics in the literature makes an informed choice of metrics challenging. As a result, instead of using existing metrics, n...

  11. Program Manager: Journal of the Defense Systems Management College. Volume 23, Number 1, January-February 1994

    Science.gov (United States)

    1994-02-01

    Jones, Jr. PROGRAM MANAGER Managing Editor Esther M. Farria Art Director Greg Caruth Typography and Design Paula Croisetlere Program Manager (ISSN 0199...Company bombers to implement the strategic organization - President Clayton 1. Brukner commu- bombing doctrine. This would take all brand -new cre

  12. Hanford Waste Vitrification Plant Quality Assurance Program description for defense high-level waste form development and qualification

    International Nuclear Information System (INIS)

    Hand, R.L.

    1992-01-01

    This document describes the quality assurance (QA) program of the Hanford Waste Vitrification Plant (HWVP) Project. The purpose of the QA program is to control project activities in such a manner as to achieve the mission of the HWVP Project in a safe and reliable manner. A major aspect of the HWVP Project QA program is the control of activities that relate to high-level waste (HLW) form development and qualification. This document describes the program and planned actions the Westinghouse Hanford Company (Westinghouse Hanford) will implement to demonstrate and ensure that the HWVP Project meets the US Department of Energy (DOE) and ASME regulations. The actions for meeting the requirements of the Waste Acceptance Preliminary Specifications (WAPS) will be implemented under the HWVP product qualification program with the objective of ensuring that the HWVP and its processes comply with the WAPS established by the federal repository

  13. Defense waste management plan

    International Nuclear Information System (INIS)

    1983-06-01

    Defense high-level waste (HLW) and defense transuranic (TRU) waste are in interim storage at three sites, namely: at the Savannah River Plant, in South Carolina; at the Hanford Reservation, in Washington; and at the Idaho National Engineering Laboratory, in Idaho. Defense TRU waste is also in interim storage at the Oak Ridge National Laboratory, in Tennessee; at the Los Alamos National Laboratory, in New Mexico; and at the Nevada Test Site, in Nevada. (Figure E-2). This document describes a workable approach for the permanent disposal of high-level and transuranic waste from atomic energy defense activities. The plan does not address the disposal of suspect waste which has been conservatively considered to be high-level or transuranic waste but which can be shown to be low-level waste. This material will be processed and disposed of in accordance with low-level waste practices. The primary goal of this program is to utilize or dispose of high-level and transuranic waste routinely, safely, and effectively. This goal will include the disposal of the backlog of stored defense waste. A Reference Plan for each of the sites describes the sequence of steps leading to permanent disposal. No technological breakthroughs are required to implement the reference plan. Not all final decisions concerning the activities described in this document have been made. These decisions will depend on: completion of the National Environmental Policy Act process, authorization and appropriation of funds, agreements with states as appropriate, and in some cases, the results of pilot plant experiments and operational experience. The major elements of the reference plan for permanent disposal of defense high-level and transuranic waste are summarized

  14. REMOTE IN-CELL SAMPLING IMPROVEMENTS PROGRAM AT THESAVANNAH RIVER SITE (SRS) DEFENSE WASTE PROCESSING FACILITY (DWPF)

    International Nuclear Information System (INIS)

    Marzolf, A

    2007-01-01

    Remote Systems Engineering (RSE) of the Savannah River National Lab (SRNL) in combination with the Defense Waste Processing Facility(DWPF) Engineering and Operations has evaluated the existing equipment and processes used in the facility sample cells for 'pulling' samples from the radioactive waste stream and performing equipment in-cell repairs/replacements. RSE has designed and tested equipment for improving remote in-cell sampling evolutions and reducing the time required for in-cell maintenance of existing equipment. The equipment within the present process tank sampling system has been in constant use since the facility start-up over 17 years ago. At present, the method for taking samples within the sample cells produces excessive maintenance and downtime due to frequent failures relative to the sampling station equipment and manipulator. Location and orientation of many sampling stations within the sample cells is not conducive to manipulator operation. The overextension of manipulators required to perform many in-cell operations is a major cause of manipulator failures. To improve sampling operations and reduce downtime due to equipment maintenance, a Portable Sampling Station (PSS), wireless in-cell cameras, and new commercially available sampling technology has been designed, developed and/or adapted and tested. The uniqueness of the design(s), the results of the scoping tests, and the benefits relative to in-cell operation and reduction of waste are presented

  15. The Privacy Coach: Supporting customer privacy in the Internet of Things

    OpenAIRE

    Broenink, Gerben; Hoepman, Jaap-Henk; Hof, Christian van 't; van Kranenburg, Rob; Smits, David; Wisman, Tijmen

    2010-01-01

    The Privacy Coach is an application running on a mobile phone that supports customers in making privacy decisions when confronted with RFID tags. The approach we take to increase customer privacy is a radical departure from the mainstream research efforts that focus on implementing privacy enhancing technologies on the RFID tags themselves. Instead the Privacy Coach functions as a mediator between customer privacy preferences and corporate privacy policies, trying to find a match between the ...

  16. Quadrennial Defense Review Report

    Science.gov (United States)

    2010-02-01

    medicine , and computer network operations. While we continue to employ a mix of programs and incentives to recruit quality personnel, we are also...Lithuania* Singapore Australia Finland Luxembourg* Slovakia* Austria France* Macedonia Slovenia* Azerbaijan Georgia Montenegro Spain* Belgium...20,000 positions by 2015. We will continue to significantly enhance Secretary of Defense Robert M. Gates meets with plant workers during a tour of an

  17. Involvement of the US Department of Defense in Civilian Assistance, Part I: a quantitative description of the projects funded by the Overseas Humanitarian, Disaster, and Civic Aid Program.

    Science.gov (United States)

    Bourdeaux, Margaret Ellis; Lawry, Lynn; Bonventre, Eugene V; Burkle, Frederick M

    2010-03-01

    To review the history and goals of the US Department of Defense's largest civilian assistance program, the Overseas Humanitarian, Disaster and Civic Aid Program and to describe the number, geographic regions, years, key words, countries, and types of projects carried out under this program since 2001. Using the program's central database, we reviewed all approved projects since 2001 and tabulated them by year, combatant command, country, and key word. We also reviewed the project descriptions of projects funded between January 1, 2006, and February 9, 2008, and examined how their activities varied by combatant command and year. Of the 5395 projects in the database, 2097 were funded. Projects took place in more than 90 countries, with Southern, Pacific, and Africa Command hosting the greatest number. The most common types of projects were school, health, disaster response, and water infrastructure construction, and disaster-response training. The "global war on terror" was the key word most frequently tagged to project descriptions. Project descriptions lacked stated goals as well as implementation and coordination strategies with potential partners, and did not report outcome or impact indicators. The geographic reach of the program is vast and projects take place in a wide variety of public sectors. Yet their security and civilian assistance value remains unclear given the lack of stated project goals, implementation strategies, or measures of effectiveness. To facilitate transparency and policy discussion, we recommend project proposals include hypotheses as to how they will enhance US security, their relevance to the public sector they address, and outcome and impact indicators that can assess their value and effectiveness.

  18. Privacy Law and Print Photojournalism.

    Science.gov (United States)

    Dykhouse, Caroline Dow

    Reviews of publications about privacy law, of recent court actions, and of interviews with newspaper photographers and attorneys indicate that torts of privacy often conflict with the freedoms to publish and to gather news. Although some guidelines have already been established (about running distorted pictures, "stealing" pictures, taking…

  19. Story Lab: Student Data Privacy

    Science.gov (United States)

    Herold, Benjamin

    2015-01-01

    Student data privacy is an increasingly high-profile--and controversial--issue that touches schools and families across the country. There are stories to tell in virtually every community. About three dozen states have passed legislation addressing student data privacy in the past two years, and eight different proposals were floating around…

  20. 78 FR 18565 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2013-03-27

    ... Defense. A0600o AHRC System name: Army Career and Alumni Program (ACAP XXI). System location: Primary..., VA 22332-0476. Secondary locations: Army Career and Alumni Program Centers. A complete list of ACAP..., Washington, DC 20307-5001. Secondary location: Defense Finance and Accounting Service, 8899 East 56th Street...

  1. 42 CFR 403.812 - HIPAA privacy, security, administrative data standards, and national identifiers.

    Science.gov (United States)

    2010-10-01

    ... 42 Public Health 2 2010-10-01 2010-10-01 false HIPAA privacy, security, administrative data... Prescription Drug Discount Card and Transitional Assistance Program § 403.812 HIPAA privacy, security, administrative data standards, and national identifiers. (a) HIPAA covered entities. An endorsed sponsor is a...

  2. Privacy and Big Data

    CERN Document Server

    Craig, Terence

    2011-01-01

    Much of what constitutes Big Data is information about us. Through our online activities, we leave an easy-to-follow trail of digital footprints that reveal who we are, what we buy, where we go, and much more. This eye-opening book explores the raging privacy debate over the use of personal data, with one undeniable conclusion: once data's been collected, we have absolutely no control over who uses it or how it is used. Personal data is the hottest commodity on the market today-truly more valuable than gold. We are the asset that every company, industry, non-profit, and government wants. Pri

  3. Speech Privacy Problems

    Science.gov (United States)

    1945-08-18

    eondwious, «ach AnvoWnc either one or tiro staple m^aSattoa processes. The British teo -dimensioaai privacy system eUiissd both ire- oasaay ana time...of the 884 gas tube and ground showed that the tubs did not re- main fired throughout the duration of the 4- kc puls.e. Instead, the tube fired on...ouri’ent through the relay circuit was not sufficient to: permit its firm operation, especially when the amplitude of the 4~ kc pulse was low. This

  4. Defense radioactive waste management

    International Nuclear Information System (INIS)

    Hindman, T.B. Jr.

    1988-01-01

    The Office of Defense Programs (DP), U.S. Department of Energy, is responsible for the production of nuclear weapons and materials for national defense. Pursuant to this mission, DP operates a large industrial complex that employs over 60,000 people at various installations across the country. As a byproduct of their activities, these installations generate radioactive, hazardous, or mixed wastes that must be managed in a safe and cost-effective manner in compliance with all applicable Federal and STate environmental requirements. At the Federal level such requirements derive primarily from the Atomic Energy Act, the Resource Conservation and Recovery Act (RCRA), the comprehensive Environmental Response, Compensation, and Liability Act (CERCLA) and the Superfund Amendments and Reauthorization Act (SARA). Responsibility for DP activities in connection with the disposal of defense wastes is consolidated within the Office of Defense Waste and Transportation Management (DWTM). This paper discusses these activities which consist of five principal elements: the environmental restoration of inactive DP facilities and sites, the processing storage and disposal of wastes associated with ongoing operations at active DP facilities, research and development directed toward the long-term disposal of radioactive, hazardous, mixed wastes, technology development directly supporting regulatory compliance, and the development of policies, procedures, and technologies for assuring the safe transportation of radioactive and hazardous materials

  5. User Privacy in RFID Networks

    Science.gov (United States)

    Singelée, Dave; Seys, Stefaan

    Wireless RFID networks are getting deployed at a rapid pace and have already entered the public space on a massive scale: public transport cards, the biometric passport, office ID tokens, customer loyalty cards, etc. Although RFID technology offers interesting services to customers and retailers, it could also endanger the privacy of the end-users. The lack of protection mechanisms being deployed could potentially result in a privacy leakage of personal data. Furthermore, there is the emerging threat of location privacy. In this paper, we will show some practical attack scenarios and illustrates some of them with cases that have received press coverage. We will present the main challenges of enhancing privacy in RFID networks and evaluate some solutions proposed in literature. The main advantages and shortcomings will be briefly discussed. Finally, we will give an overview of some academic and industrial research initiatives on RFID privacy.

  6. Hanford Waste Vitrification Plant quality assurance program description for defense high-level waste form development and qualification

    International Nuclear Information System (INIS)

    Hand, R.L.

    1990-12-01

    The US Department of Energy-Office of Civilian Radioactive Waste Management has been designated the national high-level waste repository licensee and the recipient for the canistered waste forms. The Office of Waste Operations executes overall responsibility for producing the canistered waste form. The Hanford Waste Vitrification Plant Project, as part of the waste form producer organization, consists of a vertical relationship. Overall control is provided by the US Department of Energy-Environmental Restoration and Waste Management Headquarters; with the US Department of Energy-Office of Waste Operations; the US Department of Energy- Headquarters/Vitrification Project Branch; the US Department of Energy-Richland Operations Office/Vitrification Project Office; and the Westinghouse Hanford Company, operations and engineering contractor. This document has been prepared in response to direction from the US Department of Energy-Office of Civilian Radioactive Waste Management through the US Department of Energy-Richland Operations Office for a quality assurance program that meets the requirements of the US Department of Energy. This document provides guidance and direction for implementing a quality assurance program that applies to the Hanford Waste Vitrification Plant Project. The Hanford Waste Vitrification Plant Project management commits to implementing the quality assurance program activities; reviewing the program periodically, and revising it as necessary to keep it current and effective. 12 refs., 6 figs., 1 tab

  7. United States Food and Drug Administration and Department of Defense shelf-life extension program of pharmaceutical products: progress and promise.

    Science.gov (United States)

    Khan, Saeed R; Kona, Ravikanth; Faustino, Patrick J; Gupta, Abhay; Taylor, Jeb S; Porter, Donna A; Khan, Mansoor

    2014-05-01

    The Department of Defense (DoD)-United States Food and Drug Administration (FDA) shelf-life extension program (SLEP) was established in 1986 through an intra-agency agreement between the DoD and the FDA to extend the shelf life of product nearing expiry. During the early stages of development, special attention was paid to program operation, labeling requirements, and the cost benefits associated with this program. In addition to the substantial cost benefits, the program also provides the FDA's Center for Drug Evaluation and Research with significant scientific understanding and pharmaceutical resource. As a result of this unique resource, numerous regulatory research opportunities to improve public health present themselves from this distinctive scientific database, which includes examples of products shelf life, their long-term stability issues, and various physical and chemical tests to identify such failures. The database also serves as a scientific resource for mechanistic understanding and identification of test failures leading to the development of new formulations or more robust packaging. It has been recognized that SLEP is very important in maintaining both national security and public welfare by confirming that the stockpiled pharmaceutical products meet quality standards after the "expiration date" assigned by the sponsor. SLEP research is an example of regulatory science that is needed to best ensure product performance past the original shelf life. The objective of this article is to provide a brief history and background and most importantly the public health benefits of the SLEP. © 2014 Wiley Periodicals, Inc. and the American Pharmacists Association.

  8. A Generic Privacy Quantification Framework for Privacy-Preserving Data Publishing

    Science.gov (United States)

    Zhu, Zutao

    2010-01-01

    In recent years, the concerns about the privacy for the electronic data collected by government agencies, organizations, and industries are increasing. They include individual privacy and knowledge privacy. Privacy-preserving data publishing is a research branch that preserves the privacy while, at the same time, withholding useful information in…

  9. 76 FR 64115 - Privacy Act of 1974; Privacy Act System of Records

    Science.gov (United States)

    2011-10-17

    ... NATIONAL AERONAUTICS AND SPACE ADMINISTRATION [Notice (11-092)] Privacy Act of 1974; Privacy Act... retirement of one Privacy Act system of records notice. SUMMARY: In accordance with the Privacy Act of 1974, NASA is giving notice that it proposes to cancel the following Privacy Act system of records notice...

  10. 48 CFR 39.105 - Privacy.

    Science.gov (United States)

    2010-10-01

    ... 48 Federal Acquisition Regulations System 1 2010-10-01 2010-10-01 false Privacy. 39.105 Section 39... CONTRACTING ACQUISITION OF INFORMATION TECHNOLOGY General 39.105 Privacy. Agencies shall ensure that contracts for information technology address protection of privacy in accordance with the Privacy Act (5 U.S.C...

  11. Program Manager. The Journal of the Defense Systems Management College. Volume 13, Number 4, July-August 1984,

    Science.gov (United States)

    1984-08-01

    entrepreneurship -’team made up of J. Stanley programs for people (incentives, and innovation; stern disciplinarians; Baumgartner, Calvin Brown, training, hoopla...they let them know that they were Autonomy and Entrepreneurship important to the success of the pro- Simultaneous Loose-Tight ". ,. Every PM we talked to...account hand, managing a fast-food franchise $40,000 which is now his tax base. "-" (IRA) concept. These refreshing de- is a job that can easily be

  12. Annual Systems Engineering Conference (9th): Focusing on Improving Performance of Defense Systems Programs. Volume 3. Wednesday

    Science.gov (United States)

    2006-10-26

    Bubble and Requirements Management by Mr. Jimmy Thai Cost Efficient Risk Management Through Integrated T&E Throughout the Systems Engineering Life-Cycle...ACSG/ Miller Seven Steps of an Effective Lessons Learned Process by Mr. Jimmy Thai Lessons Learned from a Mature DMSMS Program by SQNLDR P.D.Weeding...Aircraft AAR-47 Missile Warning System (MWS) GTRI_B-9 Lessons Learned with System Integration - 9 Theatre Airborne Reconnaissance System (TARS

  13. A Study of the Establishment of Cost and Schedule Variance Thresholds on Department of Defense Major Program Contracts

    Science.gov (United States)

    1993-09-01

    to C/SCSC. Chicago IL: Probus Publishing Company, 1992. Foster, George and Horngren , Charles T. Cost Accounting , A Managerial Emphasis (Seventh Edition...Bayesian Approach to Statistical Decision," The Journal of Business 34:471-489 (October, 1961). Horngren , Charles T. and George Foster. Cost Accounting ...increases for 20 major weapons programs, many of which have had tecnical problems and huge cost overruns, according to the draft of a General Account Office

  14. 10th Annual Systems Engineering Conference - Focusing on Improving Performance of Defense Systems Programs. Volume 1. Tuesday Presentations

    Science.gov (United States)

    2007-10-25

    Architecture needed to see Big Picture – Consistent Definition at Beginner /Intermediate/Expert Levels – Simple to Complex Program Guidance – Domain...Metric i i i Risk Management Process Figure 3.1. Risk Management Flowchart YES NO Review Requirements Correlation Matrix Para 2.1.2 Periodic RMT...Para 2.1.11 Document Lessons Learned Para 2.1.14 Figure 1. Flowchart for Risk Management Process RMT Closes/ Downgrades Risk Para 2.1.9 Implement Risk

  15. Defense Waste Processing Facility (DWPF), Modular CSSX Unit (CSSX), and Waste Transfer Line System of Salt Processing Program (U)

    International Nuclear Information System (INIS)

    CHANG, ROBERT

    2006-01-01

    All of the waste streams from ARP, MCU, and SWPF processes will be sent to DWPF for vitrification. The impact these new waste streams will have on DWPF's ability to meet its canister production goal and its ability to support the Salt Processing Program (ARP, MCU, and SWPF) throughput needed to be evaluated. DWPF Engineering and Operations requested OBU Systems Engineering to evaluate DWPF operations and determine how the process could be optimized. The ultimate goal will be to evaluate all of the Liquid Radioactive Waste (LRW) System by developing process modules to cover all facilities/projects which are relevant to the LRW Program and to link the modules together to: (1) study the interfaces issues, (2) identify bottlenecks, and (3) determine the most cost effective way to eliminate them. The results from the evaluation can be used to assist DWPF in identifying improvement opportunities, to assist CBU in LRW strategic planning/tank space management, and to determine the project completion date for the Salt Processing Program

  16. Analysis of environment, safety, and health (ES{ampersand}H) management systems for Department of Energy (DOE) Defense Programs (DP) facilities

    Energy Technology Data Exchange (ETDEWEB)

    Neglia, A. V., LLNL

    1998-03-01

    The purpose of this paper is to provide a summary analysis and comparison of various environment, safety, and health (ES&H) management systems required of, or suggested for use by, the Departrnent of Energy Defense Programs` sites. The summary analysis is provided by means of a comparison matrix, a set of Vean diagrams that highlights the focus of the systems, and an `End Gate` filter diagram that integrates the three Vean diagrams. It is intended that this paper will act as a starting point for implementing a particular system or in establishing a comprehensive site-wide integrated ES&H management system. Obviously, the source documents for each system would need to be reviewed to assure proper implementation of a particular system. The matrix compares nine ES&H management systems against a list of elements generated by identifying the unique elements of all the systems. To simplify the matrix, the elements are listed by means of a brief title. An explanation of the matrix elements is provided in Attachment 2 entitled, `Description of System Elements.` The elements are categorized under the Total Quality Management (TQM) `Plan, Do, Check, Act` framework with the added category of `Policy`. (The TQM concept is explained in the `DOE Quality Management implementation Guidelines,` July 1997 (DOE/QM- 0008)). The matrix provides a series of columns and rows to compare the unique elements found in each of the management systems. A `V` is marked if the element is explicitly identified as part of the particular ES&H management system. An `X` is marked if the element is not found in the particular ES&H management system, or if it is considered to be inadequately addressed. A `?` is marked if incorporation of the element is not clear. Attachment I provides additional background information which explains the justification for the marks in the matrix cells. Through the Vean diagrams and the `End Gate` filter in Section 3, the paper attempts to pictorially display the focus of

  17. Defense Human Resources Activity > PERSEREC

    Science.gov (United States)

    Skip to main content (Press Enter). Toggle navigation Defense Human Resources Activity Search Search Defense Human Resources Activity: Search Search Defense Human Resources Activity: Search Defense Human Resources Activity U.S. Department of Defense Defense Human Resources Activity Overview

  18. The Protection of the Image and Privacy in France

    Directory of Open Access Journals (Sweden)

    Leonardo Estevam de Assis Zanini

    2018-03-01

    Full Text Available This article analyzes the emergence and development of the protection of the image and privacy in France. It emphasizes that initially the defense of these rights was only work of the courts, that created rules applicable to the concrete cases. The courts used the general clause of civil liability, because there was no developed doctrine on personality rights. Subsequently the matter also began to be object of study of the French doctrinators. Unlike Germany, which granted protection very early, France only regulated these rights with the promulgation of the Law 70-643, of 17th July 1970, which introduced the right to privacy in the article 9 of the French Civil Code. This norm reinforced the protection of the personality, but it remains to be seen whether there has also been an improvement in the protection of the image in France, which we will study in this article.

  19. Towards Privacy Managment of Information Systems

    OpenAIRE

    Drageide, Vidar

    2009-01-01

    This masters thesis provides insight into the concept of privacy. It argues why privacy is important, and why developers and system owners should keep privacy in mind when developing and maintaining systems containing personal information. Following this, a strategy for evaluating the overall level of privacy in a system is defined. The strategy is then applied to parts of the cellphone system in an attempt to evaluate the privacy of traffic and location data in this system.

  20. An Alternative View of Privacy on Facebook

    OpenAIRE

    Christian Fuchs

    2011-01-01

    The predominant analysis of privacy on Facebook focuses on personal information revelation. This paper is critical of this kind of research and introduces an alternative analytical framework for studying privacy on Facebook, social networking sites and web 2.0. This framework is connecting the phenomenon of online privacy to the political economy of capitalism—a focus that has thus far been rather neglected in research literature about Internet and web 2.0 privacy. Liberal privacy philosophy ...

  1. Effective online privacy mechanisms with persuasive communication

    OpenAIRE

    Coopamootoo, P L

    2016-01-01

    This thesis contributes to research by taking a social psychological perspective to managing privacy online. The thesis proposes to support the effort to form a mental model that is required to evaluate a context with regards to privacy attitudes or to ease the effort by biasing activation of privacy attitudes. Privacy being a behavioural concept, the human-computer interaction design plays a major role in supporting and contributing to end users’ ability to manage their privacy online. Howev...

  2. Adding query privacy to robust DHTs

    DEFF Research Database (Denmark)

    Backes, Michael; Goldberg, Ian; Kate, Aniket

    2012-01-01

    intermediate peers that (help to) route the queries towards their destinations. In this paper, we satisfy this requirement by presenting an approach for providing privacy for the keys in DHT queries. We use the concept of oblivious transfer (OT) in communication over DHTs to preserve query privacy without...... privacy over robust DHTs. Finally, we compare the performance of our privacy-preserving protocols with their more privacy-invasive counterparts. We observe that there is no increase in the message complexity...

  3. Trajectory data privacy protection based on differential privacy mechanism

    Science.gov (United States)

    Gu, Ke; Yang, Lihao; Liu, Yongzhi; Liao, Niandong

    2018-05-01

    In this paper, we propose a trajectory data privacy protection scheme based on differential privacy mechanism. In the proposed scheme, the algorithm first selects the protected points from the user’s trajectory data; secondly, the algorithm forms the polygon according to the protected points and the adjacent and high frequent accessed points that are selected from the accessing point database, then the algorithm calculates the polygon centroids; finally, the noises are added to the polygon centroids by the differential privacy method, and the polygon centroids replace the protected points, and then the algorithm constructs and issues the new trajectory data. The experiments show that the running time of the proposed algorithms is fast, the privacy protection of the scheme is effective and the data usability of the scheme is higher.

  4. Privacy and CHI : methodologies for studying privacy issues

    NARCIS (Netherlands)

    Patil, S.; Romero, N.A.; Karat, J.

    2006-01-01

    This workshop aims to reflect on methodologies to empirically study privacy issues related to advanced technology. The goal is to address methodological concerns by drawing upon both theoretical perspectives as well as practical experiences.

  5. When Differential Privacy Meets Randomized Perturbation: A Hybrid Approach for Privacy-Preserving Recommender System

    KAUST Repository

    Liu, Xiao; Liu, An; Zhang, Xiangliang; Li, Zhixu; Liu, Guanfeng; Zhao, Lei; Zhou, Xiaofang

    2017-01-01

    result. However, none is designed for both hiding users’ private data and preventing privacy inference. To achieve this goal, we propose in this paper a hybrid approach for privacy-preserving recommender systems by combining differential privacy (DP

  6. Performing privacy in schools

    DEFF Research Database (Denmark)

    Lauritsen, Peter; Bøge, Ask Risom; Andersen, Lars Bo

    with technologies is carried out as well as observation is conducted. We obtain and present new knowledge about how surveillance is practiced in the interpersonal relations of students and teachers. References: Monahan, T., & Torres, R. D. (2009). Schools Under Surveillance: Cultures of Control in Public Education....... Rutgers University Press. Selwyn, N. (2010). Schools and Schooling in the Digital Age: A Critical Analysis. Routledge. Taylor, E. (2013). Surveillance Schools: Security, Discipline and Control in Contemporary Education. Palgrave Macmillan UK. Taylor, E., & Rooney, T. (2016). Surveillance Futures: Social......In this presentation we pursue the question: How is privacy performed and perceived in schools by children? Our aim is to investigate how the boundaries between public and private spheres are continuously performed in the formal setting of the classroom as well as in the social lives of students...

  7. Parasiteware: Unlocking Personal Privacy

    Directory of Open Access Journals (Sweden)

    Daniel B. Garrie

    2006-09-01

    Full Text Available Spyware presents a threat of privacy infringement to unassuming internet users irrespective of their country of citizenship. European legislation attempts to protect end-users from unethical processing of their personal data. Spyware technologies, however, skirts these laws and often break them in their entirety. Outlawing the spyware and strengthening the legal consent requirement to mine data are statutory solutions that can prevent spyware users from skirting the law. An internationally standardized technology education system for the judiciaries in Europe and the U.S. can help ensure that when spyware users do break the law, they cannot hide by escaping from one nation to another without being held accountable. Transnational improvements are necessary to remedy the global spyware epidemic.

  8. Status of defense radioactive waste disposal activities

    International Nuclear Information System (INIS)

    Wade, T.W.

    1988-01-01

    The Office of Defense Programs, U.S. Department of Energy, is responsible for the production of nuclear weapons and materials for national defense. As a byproduct to their activities, nuclear production facilities have generated, and will continue to generate, certain radioactive, hazardous, or mixed wastes that must be managed and disposed of in a safe and cost-effective manner. Compliance with all applicable Federal and State regulations is required. This paper describes the principal elements that comprise Defense Programs' approach to waste management and disposal. The status of high-level, transuranic, and low-level radioactive waste disposal is set forth. Defense Programs' activities in connection with the environmental restoration of inactive facilities and with the safe transport of waste materials are summarized. Finally, the principal challenges to realizing the goals set for the defense waste program are discussed in terms of regulatory, public acceptance, technical, and budget issues

  9. Survey of US Department of Defense Manufacturing Technology Program activities applicable to civilian manufacturing industries. Final report

    Energy Technology Data Exchange (ETDEWEB)

    Azimi, S.A.; Conrad, J.L.; Reed, J.E.

    1985-03-01

    Intent of the survey was to identify and characterize activities potentially applicable to improving energy efficiency and overall productivity in the civilian manufacturing industries. The civilian industries emphasized were the general manufacturing industries (including fabricated metals, glass, machinery, paper, plastic, textile, and transportation equipment manufacturing) and the primary metals industries (including primary aluminum, copper, steel, and zinc production). The principal steps in the survey were to: develop overview taxonomies of the general manufacturing and primary metals industries as well as specific industry taxonomies; identify needs and opportunities for improving process energy efficiency and productivity in the industries included; identify federal programs, capabilities, and special technical expertise that might be relevant to industry's needs and opportunities; contact federal laboratories/facilities, through visits and other forms of inquiry; prepare formatted profiles (descriptions) potentially applicable work efforts; review findings with industry; and compile and evaluate industry responses.

  10. Genetic privacy in sports: clearing the hurdles.

    Science.gov (United States)

    Callier, Shawneequa

    2012-12-01

    As genomic medicine continues to advance and inform clinical care, knowledge gained is likely to influence sports medicine and training practices. Susceptibility to injury, sudden cardiac failure, and other serious conditions may one day be tackled on a subclinical level through genetic testing programs. In addition, athletes may increasingly consider using genetic testing services to maximize their performance potential. This paper assesses the role of privacy and genetic discrimination laws that would apply to athletes who engage in genetic testing and the limits of these protections.

  11. Privacy Preserving Distributed Data Mining

    Data.gov (United States)

    National Aeronautics and Space Administration — Distributed data mining from privacy-sensitive multi-party data is likely to play an important role in the next generation of integrated vehicle health monitoring...

  12. Distributed privacy preserving data collection

    KAUST Repository

    Xue, Mingqiang; Papadimitriou, Panagiotis D.; Raï ssi, Chedy; Kalnis, Panos; Pung, Hungkeng

    2011-01-01

    an anonymized table by generalization of quasi-identifier attributes. The protocol employs cryptographic techniques such as homomorphic encryption, private information retrieval and secure multiparty computation to ensure the privacy goal in the process of data

  13. Privacy and the Connected Society

    DEFF Research Database (Denmark)

    Sørensen, Lene Tolstrup; Khajuria, Samant; Skouby, Knud Erik

    The Vision of the 5G enabled connected society is highly based on the evolution and implementation of Internet of Things. This involves, amongst others, a significant raise in devices, sensors and communication in pervasive interconnections as well as cooperation amongst devices and entities across...... the society. Enabling the vision of the connected society, researchers point in the direction of security and privacy as areas to challenge the vision. By use of the Internet of Things reference model as well as the vision of the connected society, this paper identifies privacy of the individual with respect...... to three selected areas: Shopping, connected cars and online gaming. The paper concludes that privacy is a complexity within the connected society vision and that thee is a need for more privacy use cases to shed light on the challenge....

  14. Librarians, Civil Liberties and Privacy.

    Science.gov (United States)

    Fielding, Derek

    1978-01-01

    A comparison of current civil liberties issues in Australia with the status of similar issues in Britain and the United States. Included are political affiliation of government employees, censorship, rights of the individual, privacy, and freedom of information. (JAB)

  15. Privacy Impact Assessment (PIA) Repository

    Data.gov (United States)

    Department of Veterans Affairs — This repository contains Privacy Impact Assessments (PIA) that have been vetted/approved. Section 208 of the Electronic Government Act of 2002 (E-Gov Act) requires...

  16. Factors and Predictors of Online Security and Privacy Behavior

    Directory of Open Access Journals (Sweden)

    Goran Bubaš

    2008-12-01

    Full Text Available Assumptions and habits regarding computer and Internet use are among the major factors which influence online privacy and security of Internet users. In our study a survey was performed on 312 subjects (college students who are Internet users with IT skills that investigated how assumptions and habits of Internet users are related to their online security and privacy. The following four factors of online security and privacy related behaviors were revealed in factor analysis: F1 – conscientiousness in the maintenance of the operating system, upgrading of the Internet browser and use of antivirus and antispyware programs; F2 –engagement in risky and careless online activities with lack of concern for personal online privacy; F3 – disbelief that privacy violations and security threats represent possible problems; F4 – lack of fear regarding potential privacy and security threats with no need for change in personal online behavior. Statistically significant correlations were found between some of the discovered factors on the one side, and criteria variables occurrence of malicious code (C1 and data loss on the home computer (C2 on the other. In addition, a regression analysis was performed which revealed that the potentially risky online behaviors of Internet users were associated with the two criteria variables. To properly interpret the results of correlation and regression analyses a conceptual model was developed of the potential causal relationships between the behavior of Internet users and their experiences with online security threats. An additional study was also performed which partly confirmed the conceptual model, as well as the factors of online security and privacy related behaviors.

  17. Acquisition: Acquisition of Targets at the Missile Defense Agency

    National Research Council Canada - National Science Library

    Ugone, Mary L; Meling, John E; James, Harold C; Haynes, Christine L; Heller, Brad M; Pomietto, Kenneth M; Bobbio, Jaime; Chang, Bill; Pugh, Jacqueline

    2005-01-01

    Who Should Read This Report and Why? Missile Defense Agency program managers who are responsible for the acquisition and management of targets used to test the Ballistic Missile Defense System should be interested in this report...

  18. Privacy-preserving Identity Management

    OpenAIRE

    Milutinovic, Milica

    2015-01-01

    With the technological advances and the evolution of online services, user privacy is becoming a crucial issue in the modern day society. Privacy in the general sense refers to individuals’ ability to protect information about themselves and selectively present it to other entities. This concept is nowadays strongly affected by everyday practices that assume personal data disclosure, such as online shopping and participation in loyalty schemes. This makes it difficult for an individual to con...

  19. PRIVACY CONCERNS IN FACEBOOK SITE

    OpenAIRE

    Vandana Singh

    2014-01-01

    Today social networking sites play an important role and inexpensive way to maintain existing relationships and present oneself. However, the increasing use of online sites give rise to privacy concerns and risks. All Internet sites are also under attack from phishers, fraudsters, and spammers. They aim to steal user information and expose users to unwanted spam. They have so many resources at their disposal.This paper studies the awareness of college students regarding the privacy in Faceboo...

  20. Security and privacy in biometrics

    CERN Document Server

    Campisi, Patrizio

    2013-01-01

    This important text/reference presents the latest secure and privacy-compliant techniques in automatic human recognition. Featuring viewpoints from an international selection of experts in the field, the comprehensive coverage spans both theory and practical implementations, taking into consideration all ethical and legal issues. Topics and features: presents a unique focus on novel approaches and new architectures for unimodal and multimodal template protection; examines signal processing techniques in the encrypted domain, security and privacy leakage assessment, and aspects of standardizati