WorldWideScience

Sample records for departmental offices privacy

  1. 76 FR 45336 - Departmental Offices; Privacy Act of 1974, as Amended; Systems of Records

    Science.gov (United States)

    2011-07-28

    ... Inspector General.'' * * * * * Purpose(s): Description of change: The period ``.'' at the end of the... 510, Washington, DC 20220. For records provided by the general public concerning financial instrument... Records AGENCY: Office of Inspector General, Treasury. ACTION: Notice of Alteration to a Privacy Act...

  2. 75 FR 38608 - Departmental Offices: Privacy Act of 1974, as Amended

    Science.gov (United States)

    2010-07-02

    ... Justice (``DOJ'') and the Federal financial regulators who supervise and regulate financial institutions...: Theodore R. Kowalsky, Manager, Data & Information Technology, Office of Financial Agents, Department of the.... Additionally, the Bank of New York Mellon (``BNYM'') has been designated as another Financial Agent for the...

  3. 31 CFR Appendix A to Subpart C of... - Departmental Offices

    Science.gov (United States)

    2010-07-01

    ... requests to amend records for records maintained by the Departmental Offices will be made by the head of... Treasury, Room 3000, Main Treasury Building, 1500 Pennsylvania Avenue, NW., Washington, DC 20220. 7. Annual... guardian of any individual will be required to provide adequate proof of legal relationship before such...

  4. 49 CFR 10.13 - Privacy Officer.

    Science.gov (United States)

    2010-10-01

    ... INDIVIDUALS General § 10.13 Privacy Officer. (a) To assist with implementation, evaluation, and administration issues, the Chief Information Officer appoints a principal coordinating official with the title Privacy... 49 Transportation 1 2010-10-01 2010-10-01 false Privacy Officer. 10.13 Section 10.13...

  5. 76 FR 69797 - Senior Executive Service Departmental Offices Performance Review Board.

    Science.gov (United States)

    2011-11-09

    ... DEPARTMENT OF THE TREASURY Senior Executive Service Departmental Offices Performance Review Board. AGENCY: Treasury Department. ACTION: Notice of members of the Departmental Offices Performances Review Board. SUMMARY: Pursuant to 5 U.S.C. 4314(c)(4), this notice announces the appointment of members of the...

  6. 75 FR 18569 - Departmental Offices; Proposed Collection; Comment Request

    Science.gov (United States)

    2010-04-12

    ..., the Office of Financial Stability (OFS) is soliciting comments concerning the banks and thrifts, banks and thrifts exchange, and credit union applications for the Community Development Capital Initiative... participation in the CDCI. Eligible institutions include bank holding companies, financial holding companies...

  7. 75 FR 62447 - Departmental Offices; Proposed Collections; Comment Requests

    Science.gov (United States)

    2010-10-08

    ... Management and Budget. The Office of International Affairs of the Department of the Treasury is soliciting... the formulation of international financial and monetary policies and for the preparation of the U.S... Statistical Reports section of the Introduction) will be revised by adding a paragraph on the proposed new SLT...

  8. Commentary: Mentoring the mentor: executive coaching for clinical departmental executive officers.

    Science.gov (United States)

    Geist, Lois J; Cohen, Michael B

    2010-01-01

    Departmental executive officers (DEOs), department chairs, and department heads in medical schools are often hired on the basis of their accomplishments in research as well as their skills in administration, management, and leadership. These individuals are also expected to be expert in multiple areas, including negotiation, finance and budgeting, mentoring, and personnel management. At the same time, they are expected to maintain and perhaps even enhance their personal academic standing for the purposes of raising the level of departmental and institutional prestige and for recruiting the next generation of physicians and scientists. In the corporate world, employers understand the importance of training new leaders in requisite skill enhancement that will lead to success in their new positions. These individuals are often provided with extensive executive training to develop the necessary competencies to make them successful leaders. Among the tools employed for this purpose are the use of personal coaches or executive training courses. The authors propose that the use of executive coaching in academic medicine may be of benefit for new DEOs. Experience using an executive coach suggests that this was a valuable growth experience for new leaders in the institution.

  9. How Well Are We Respecting Patient Privacy in Medical Imaging? Lessons Learnt From a Departmental Audit.

    Science.gov (United States)

    Dilauro, Marc; Thornhill, Rebecca; Fasih, Najla

    2016-11-01

    Preservation of patient privacy and dignity are basic requirements for all patients visiting a hospital. The purpose of this study was to perform an audit of patients' satisfaction with privacy whilst in the Department of Medical Imaging (MI) at the Civic Campus of the Ottawa Hospital. Outpatients who underwent magnetic resonance imaging (MRI), computed tomography (CT), ultrasonography (US), and plain film (XR) examinations were provided with a survey on patient privacy. The survey asked participants to rank (on a 6-point scale ranging from 6 = excellent to 1 = no privacy) whether their privacy was respected in 5 key locations within the Department of MI. The survey was conducted over a consecutive 5-day period. A total of 502 surveys were completed. The survey response rate for each imaging modality was: 55% MRI, 42% CT, 45% US, and 47% XR. For each imaging modality, the total percentage of privacy scores greater than or equal to 5 were: 98% MRI, 96% CT, 94% US, and 92% XR. Privacy ratings for the MRI reception and waiting room areas were significantly higher in comparison to the other imaging modalities (P = .0025 and P = .0227, respectively). Overall, patient privacy was well respected within the Department of MI. Copyright © 2016 Canadian Association of Radiologists. Published by Elsevier Inc. All rights reserved.

  10. 32 CFR 311.7 - OSD/JS Privacy Office Processes.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 2 2010-07-01 2010-07-01 false OSD/JS Privacy Office Processes. 311.7 Section...) PRIVACY PROGRAM OFFICE OF THE SECRETARY OF DEFENSE AND JOINT STAFF PRIVACY PROGRAM § 311.7 OSD/JS Privacy Office Processes. The OSD/JS Privacy Office shall: (a) Exercise oversight and administrative control of...

  11. Perceived Speech Privacy in Computer Simulated Open-plan Offices

    DEFF Research Database (Denmark)

    Pop, Claudiu B.; Rindel, Jens Holger

    2005-01-01

    In open plan offices the lack of speech privacy between the workstations is one of the major acoustic problems. Improving the speech privacy in an open plan design is therefore the main concern for a successful open plan environment. The project described in this paper aimed to find an objective...... parameter that correlates well with the perceived degree of speech privacy and to derive a clear method for evaluating the acoustic conditions in open plan offices. Acoustic measurements were carried out in an open plan office, followed by data analysis at the Acoustic Department, DTU. A computer model...

  12. 76 FR 12745 - Privacy Act of 1974; Department of Homeland Security Office of Operations Coordination and...

    Science.gov (United States)

    2011-03-08

    ... 20528. For privacy issues please contact: Mary Ellen Callahan (703-235-0780), Chief Privacy Officer... DEPARTMENT OF HOMELAND SECURITY Office of the Secretary [Docket No. DHS-2010-0055] Privacy Act of... Operations Center Tracker and Senior Watch Officer Logs System of Records AGENCY: Privacy Office, DHS. ACTION...

  13. 76 FR 12609 - Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security Office of...

    Science.gov (United States)

    2011-03-08

    ... 20528. For privacy issues please contact: Mary Ellen Callahan (703-235-0780), Chief Privacy Officer... Secretary 6 CFR Part 5 [Docket No. DHS-2010-0051] Privacy Act of 1974: Implementation of Exemptions... Center Tracker and Senior Watch Officer Logs System of Records AGENCY: Privacy Office, DHS. ACTION...

  14. 75 FR 69604 - Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security Office of...

    Science.gov (United States)

    2010-11-15

    ... Security, Washington, DC 20528. For privacy issues please contact: Mary Ellen Callahan (703-235- [[Page...] Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security Office of Operations... System of Records AGENCY: Privacy Office, DHS. ACTION: Notice of proposed rulemaking. SUMMARY: The...

  15. 78 FR 75447 - Senior Executive Service; Departmental Offices Performance Review Board

    Science.gov (United States)

    2013-12-11

    ... Offices PRB: The Board shall consist of at least three members. In the case of an appraisal of a career appointee, more than half the members shall consist of career appointees. The names and titles of the Board... P., Deputy Assistant Secretary for Mid-East and Africa Banks, Carol, Director, Office of Accounting...

  16. 78 FR 59082 - Privacy Act of 1974; Department of Transportation, Federal Motor Carrier Safety Administration...

    Science.gov (United States)

    2013-09-25

    ..., [email protected] . For privacy issues please contact: Claire W. Barrett, Departmental Chief... DEPARTMENT OF TRANSPORTATION Office of the Secretary [Docket No. FMCSA-2013-0306] Privacy Act of... Administration (FMCSA), DOT. ACTION: Notice to amend a system of records. SUMMARY: In accordance with the Privacy...

  17. 77 FR 12641 - Privacy Act of 1974; System of Records Notice

    Science.gov (United States)

    2012-03-01

    ..., DC 20590. For privacy issues, please contact: Claire W. Barrett (202-366-8135), Departmental Chief... DEPARTMENT OF TRANSPORTATION Office of the Secretary [Docket No. DOT-RITA-2012-0001] Privacy Act... the Privacy Act of 1974, the Department of Transportation proposes to add a new system of records...

  18. 76 FR 39978 - Departmental Offices; Privacy Act of 1974, as Amended

    Science.gov (United States)

    2011-07-07

    ... financial law, and, among other powers, will have authority to protect consumers from unfair, deceptive, and abusive practices when obtaining consumer financial products or services. The Act grants Treasury certain...

  19. 75 FR 82427 - Departmental Offices; Privacy Act of 1974, as Amended

    Science.gov (United States)

    2010-12-30

    ... laws, and, among other powers, will have authority to protect consumers from unfair, deceptive, and abusive practices when obtaining consumer financial products or services. The Act grants Treasury certain...

  20. 76 FR 1507 - Departmental Offices; Privacy Act of 1974, as Amended

    Science.gov (United States)

    2011-01-10

    ... laws, and, among other powers, will have authority to protect consumers from unfair, deceptive, and abusive practices when obtaining consumer financial products or services. The Act grants Treasury certain...

  1. 75 FR 2188 - Departmental Offices; Privacy Act of 1974, as Amended

    Science.gov (United States)

    2010-01-14

    ... electronic media. RETRIEVABILITY: By name, Social Security Number, and/or case number. SAFEGUARDS: The... public record and subject to public disclosure. You should submit only information that you wish to make..., Tribal or other public authorities or self-regulatory organizations responsible for investigating or...

  2. 76 FR 39980 - Departmental Offices; Privacy Act of 1974, as Amended

    Science.gov (United States)

    2011-07-07

    ... and electronic media. Retrievability: By taxpayer name and Taxpayer Identification Number, social...) is conducting a pilot project funded by the Partnership Fund for Program Integrity Innovation (Partnership Fund). The Partnership Fund was established by the Consolidated Appropriations Act, 2010 (Pub. L...

  3. 76 FR 8843 - Departmental Offices; Privacy Act of 1974, as Amended

    Science.gov (United States)

    2011-02-15

    ..., account numbers, address, phone number, e-mail address, and date of birth. Authority for maintenance of... the U.S. Department of Agriculture; (2) National, State or local income security and retirement... number, date of birth, or by some combination thereof. Safeguards: Access to electronic records is...

  4. Streamlining cross departmental interactions of back office processes in financial services

    NARCIS (Netherlands)

    Rutte, C.R.

    2011-01-01

    Due to the increased competitive environment in the retail banking industry, customer satisfaction and efficient back office processes have become more important. Lean Six Sigma (LSS) is a management style that is focused on improving processes and increasing customer satisfaction. Discrete-Event

  5. 77 FR 63416 - Senior Executive Service; Departmental Offices Performance Review Board Members

    Science.gov (United States)

    2012-10-16

    ... Secretary for Human Resources and Chief Human Capital Officer Bynum, Nicole, Chief of Management Operations... CONTACT: Mario R. Minor, Senior Human Resources Specialist, 1500 Pennsylvania Avenue NW., ATTN: Room 6W529... career appointee, more than half the members shall consist of career appointees. The names and titles of...

  6. 32 CFR 310.9 - Privacy boards and office, composition and responsibilities.

    Science.gov (United States)

    2010-07-01

    ... involving the DoD Privacy Program, meeting as necessary, to address issues of common concern so as to ensure... privacy issues relating to the Department's collection, maintenance, use, or dissemination of personal... 32 National Defense 2 2010-07-01 2010-07-01 false Privacy boards and office, composition and...

  7. Employees' satisfaction as influenced by acoustic and visual privacy in the open office environment

    Science.gov (United States)

    Soules, Maureen Jeanette

    The purpose of this study was to examine the relationship between employees' acoustic and visual privacy issues and their perceived satisfaction in their open office work environments while in focus work mode. The study examined the Science Teaching Student Services Building at the University of Minnesota Minneapolis. The building houses instructional classrooms and administrative offices that service UMN students. The Sustainable Post-Occupancy Evaluation Survey was used to collect data on overall privacy conditions, acoustic and visual privacy conditions, and employees' perceived privacy conditions while in their primary workplace. Paired T-tests were used to analyze the relationships between privacy conditions and employees' perceptions of privacy. All hypotheses are supported indicating that the privacy variables are correlated to the employees' perception of satisfaction within the primary workplace. The findings are important because they can be used to inform business leaders, designers, educators and future research in the field of office design.

  8. 76 FR 21768 - Privacy Act of 1974; Department of Homeland Security/Office of Health Affairs-001 Contractor...

    Science.gov (United States)

    2011-04-18

    ... Homeland Security, Washington, DC 20520. For privacy issues please contact: Mary Ellen Callahan (703-235... DEPARTMENT OF HOMELAND SECURITY Office of the Secretary [Docket No. DHS-2011-0013] Privacy Act of... Immunization Records System of Records AGENCY: Privacy Office, DHS. ACTION: Notice of Privacy Act system of...

  9. 75 FR 43579 - Privacy Act of 1974; Computer Matching Program Between the Office of Personnel Management and...

    Science.gov (United States)

    2010-07-26

    ... the Computer Matching and Privacy Protection Act of 1988 (Pub. L. 100-503), Office of Management and... safeguards for disclosure of Social Security benefit information to OPM via direct computer link for the... OFFICE OF PERSONNEL MANAGEMENT Privacy Act of 1974; Computer Matching Program Between the Office...

  10. 78 FR 3474 - Privacy Act of 1974; Computer Matching Program Between the Office Of Personnel Management and...

    Science.gov (United States)

    2013-01-16

    ... amended by the Computer Matching and Privacy Protection Act of 1988 (Pub. L. 100-503), Office of... Security benefit information to OPM via direct computer link for the administration of certain programs by... OFFICE OF PERSONNEL MANAGEMENT Privacy Act of 1974; Computer Matching Program Between the Office...

  11. 77 FR 38363 - Office of Privacy, Records, and Disclosure; Privacy Act of 1974, as Amended

    Science.gov (United States)

    2012-06-27

    ... delinquencies; final determinations of appeals; name/ title of officials responsible for denial of records; and... FOIA and the Privacy Act. Also used to produce statistical reports; and as a data source for management...

  12. Office layout affecting privacy, interaction, and acoustic quality in LEED-certified buildings

    Energy Technology Data Exchange (ETDEWEB)

    Lee, Young S. [School of Planning, Design, and Construction, Michigan State University, East Lansing, MI 48823 (United States)

    2010-07-15

    The study investigated differences in worker satisfaction and perceived job performance regarding privacy, interaction, and acoustic quality issues in personal workspaces between five office types in LEED-certified buildings. It finds that people in high cubicles showed significantly lower satisfaction and job performance in relation to visual privacy and interaction with co-workers than both enclosed private and enclosed shared office types. They also showed significantly lower satisfaction with noise level and sound privacy and lower job performance perceived by acoustic quality than enclosed private, enclosed shared, and bullpen types. The bullpen type, open-plan office without partitions, presented significantly higher satisfaction with noise level and higher performance perceived by acoustic quality than both high and low cubicles. Considering the bullpen type also showed higher satisfaction with sound privacy than the high cubicle type, high partitions don't seem to contribute to creating workspaces where people can have a secure conversation. The bullpen type didn't show any difference from the enclosed shared type in all privacy, interaction, and acoustic quality questions, indicating it may be a good option for a small office space instead of the enclosed shared type. (author)

  13. Privacy Impact Assessment for the Claims Office Master Files

    Science.gov (United States)

    The Claims Office Master Files System collects information on companies in debt to the EPA. Learn how this data is collected, how it will be used, access to the data, the purpose of data collection, and record retention policies for this data.

  14. 78 FR 9721 - Privacy Act of 1974; New System of Records, Office of General Counsel E-Discovery Management...

    Science.gov (United States)

    2013-02-11

    ... DEPARTMENT OF HOUSING AND URBAN DEVELOPMENT [Docket No. FR-5613-N-06-C] Privacy Act of 1974; New System of Records, Office of General Counsel E-Discovery Management System: Republication of System.... SUMMARY: Pursuant to the provision of the Privacy Act of 1974, HUD is providing notice of its formal...

  15. 75 FR 32833 - Privacy Act of 1974, as Amended; Computer Matching Program (SSA/Office of Personnel Management...

    Science.gov (United States)

    2010-06-09

    ... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA-2009-0077] Privacy Act of 1974, as Amended; Computer Matching Program (SSA/ Office of Personnel Management (OPM))--Match 1307 AGENCY: Social Security... INFORMATION: A. General The Computer Matching and Privacy Protection Act of 1988 (Public Law (Pub. L.) 100-503...

  16. 77 FR 57639 - Privacy Act; System of Records: Records of the Office of White House Liaison, State-34

    Science.gov (United States)

    2012-09-18

    ..., background and security clearance information received from Executive Offices and Bureau of Human Resources... the provisions of the Privacy Act of 1974, as amended (5 U.S.C.552a) and Office of Management and... Liaison Office for the consideration, review, clearance and appointment of an individual to a non-career...

  17. 77 FR 41997 - Privacy Act of 1974; Notice of a New System of Records, Office of General Counsel E-Discovery...

    Science.gov (United States)

    2012-07-17

    ... DEPARTMENT OF HOUSING AND URBAN DEVELOPMENT [Docket No. FR-5613-N-06] Privacy Act of 1974; Notice of a New System of Records, Office of General Counsel E-Discovery Management System AGENCY: Office of the Chief Information Officer. ACTION: Notification of New Privacy Act System of Records, E-Discovery...

  18. DEPARTMENTALIZATION IN ELEMENTARY SCHOOLS.

    Science.gov (United States)

    American Association of School Administrators, Washington, DC.

    THE RESULTS OF A SURVEY CONCERNED WITH DEPARTMENTALIZATION IN ELEMENTARY SCHOOLS ARE REPORTED IN STATISTICAL TABLES WHICH ARE ACCOMPANIED BY DESCRIPTIVE COMMENTARY. FOR THE PURPOSE OF THE SURVEY, THE DEFINITION OF DEPARTMENTALIZATION IS RESTRICTED TO INCLUDE ONLY THOSE SITUATIONS IN WHICH STUDENTS RECEIVE INSTRUCTION IN THE VARIOUS ACADEMIC…

  19. 77 FR 31371 - Public Workshop: Privacy Compliance Workshop

    Science.gov (United States)

    2012-05-25

    ... presentations, including the privacy compliance fundamentals, privacy and data security, and the privacy... DEPARTMENT OF HOMELAND SECURITY Office of the Secretary Public Workshop: Privacy Compliance... Homeland Security Privacy Office will host a public workshop, ``Privacy Compliance Workshop.'' DATES: The...

  20. 75 FR 68668 - Senior Executive Service; Departmental Performance Review Board

    Science.gov (United States)

    2010-11-08

    ... DEPARTMENT OF THE TREASURY Senior Executive Service; Departmental Performance Review Board AGENCY: Treasury Department. ACTION: Notice of members of the Departmental Offices Performances Review Board. SUMMARY: Pursuant to 5 U.S.C. 4314(c)(4), this notice announces the appointment of members of the...

  1. Departmental Appeals Board Decisions

    Data.gov (United States)

    U.S. Department of Health & Human Services — Decisions issued by the Chair and Board Members of the Departmental Appeals Board concerning determinations in discretionary, project grant programs, including...

  2. 77 FR 49011 - Privacy Act of 1974; New System of Records, Office of General Counsel E-Discovery Management...

    Science.gov (United States)

    2012-08-15

    ... DEPARTMENT OF HOUSING AND URBAN DEVELOPMENT [Docket No. FR-5613-N-06-A] Privacy Act of 1974; New System of Records, Office of General Counsel E-Discovery Management System--Change in Final Effective... the OGC E-Discovery Management System until after the opportunity for further comment is provided to...

  3. 75 FR 42453 - Office of Child Support Enforcement; Privacy Act of 1974; System of Records

    Science.gov (United States)

    2010-07-21

    ... Deimeke, Director, Division of Federal Systems, Office of Automation and Program Operations, Office of... Systems, Office of Automation and Program Operations, Office of Child Support Enforcement, Administration... complete; (4) indicate what corrective action is sought; and (5) include supporting justification or...

  4. 76 FR 5603 - Privacy Act of 1974; Department of Homeland Security Office of Operations Coordination and...

    Science.gov (United States)

    2011-02-01

    ... on social media sites. However, OPS is permitted to establish user names and passwords to form profiles and follow relevant government, media, and subject matter experts on social media sites in order... Available Social Media Monitoring and Situational Awareness Initiative System of Records AGENCY: Privacy...

  5. 75 FR 29774 - Office of Child Support Enforcement; Privacy Act of 1974; Computer Matching Agreement

    Science.gov (United States)

    2010-05-27

    ... of Federal Systems, Office of Automation and Program Operations, Office of Child Support Enforcement... INFORMATION CONTACT: Linda Deimeke, Director, Division of Federal Systems, Office of Automation and Program..., home addresses, and employment information. E. Inclusive Dates of the Matching Program The computer...

  6. 75 FR 82042 - Office of Inspector General; Privacy Act of 1974; Notification of the Office of Inspector General...

    Science.gov (United States)

    2010-12-29

    ...) Independent Auditor Monitoring Files of the Office of Inspector General (HUD/OIG-4); (5) Auto Audit of the... auditor has been notified that the OIG is contemplating disclosure of its findings to an appropriate State board of accountancy, and the independent auditor has been provided with an opportunity to respond in...

  7. 78 FR 42149 - Privacy Act; System of Records: State-53, Office of Inspector General Investigation Management...

    Science.gov (United States)

    2013-07-15

    ... media. RETRIEVABILITY: Name, Social Security number or case number. SAFEGUARDS: All Office of Inspector... may contain names, dates of birth, passport numbers, Social Security numbers, account numbers and... response to a subpoena issued by an independent Federal agency having the power to subpoena records of...

  8. Privacy Impact Assessment for the Mailing System for the Office of Public Affairs

    Science.gov (United States)

    The Mailing System for the Office of Public Affairs collects contact and geographic information. Learn how this data will be collected in the system, how it will be used, access to the data, the purpose of data collection, and record retention policies.

  9. Self-Evaluation for the Departmental Chairperson

    Science.gov (United States)

    Oliverio, Mary Ellen

    1976-01-01

    The importance of a candid evaluation of the departmental chairperson's own performance is discussed. Questions are provided as an aid in probing some of the critical concerns of a departmental staff. (HD)

  10. 77 FR 27108 - Privacy Act of 1974, as Amended; Computer Matching Program (SSA/Office of Child Support...

    Science.gov (United States)

    2012-05-08

    ...: Social Security Administration (SSA). ACTION: Notice of a renewal of an existing computer matching... protections for such persons. The Privacy Act, as amended, regulates the use of computer matching by Federal... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA 2012-0010] Privacy Act of 1974, as Amended...

  11. 77 FR 49849 - Privacy Act of 1974, as Amended; Computer Matching Program (SSA/Office of Child Support...

    Science.gov (United States)

    2012-08-17

    ...: Social Security Administration (SSA). ACTION: Notice of a renewal of an existing computer-matching... INFORMATION: A. General The Computer Matching and Privacy Protection Act of 1988 (Public Law (Pub. L.) 100-503... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA 2012-0021] Privacy Act of 1974, as Amended...

  12. 78 FR 16564 - Privacy Act of 1974, as Amended; Computer Matching Program (SSA/Office of Personnel Management...

    Science.gov (United States)

    2013-03-15

    ... 1021 AGENCY: Social Security Administration (SSA). ACTION: Notice of a renewal of existing computer... above. SUPPLEMENTARY INFORMATION: A. General The Computer Matching and Privacy Protection Act of 1988... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA 2012-0073] Privacy Act of 1974, as Amended...

  13. Research activities in radiation protection. Programme report 1997. Report on the departmental research programme of the Federal Ministry for Environment, Nature Conservation and Reactor Safety (BMU), performed under the scientific and administrative project management of the Federal Office for Radiation Protection (BfS)

    International Nuclear Information System (INIS)

    Schmitt-Hannig, A.; Goedde, R.; Thieme, M.

    1998-03-01

    On behalf of the Federal Ministry for Environment, Nature Conservation and Nuclear Safety (BMU), the Federal Office for Radiation Protection (BfS) is placing research and study contracts in the field of radiation protection. The results of these projects are used for developing radiation protection rules and to fulfill the special radiation protection tasks of the BMU, required by law. Planning, expert and administrative management, placing, assistance as well as expert evaluation of the results from these research projects lies within the responsibility of the Federal Office for Radiation Protection. This report provides information on preliminary and final results of radiation protection projects within the BMU Departmental Research Programme of the year 1997. (orig.) [de

  14. Departmentality

    DEFF Research Database (Denmark)

    Harste, Gorm

    2008-01-01

    a focus on semantic forms in chancellor H.-F. d'Aguesseau's and Fredrick the Great's self-description of power. The overall aim is to study the legacy and the strength of functional differentiation in state formation. How did the separated powers of functional differentiation emerge and how did...

  15. 75 FR 81205 - Privacy Act: Revision of Privacy Act Systems of Records

    Science.gov (United States)

    2010-12-27

    ... DEPARTMENT OF AGRICULTURE Office of the Secretary Privacy Act: Revision of Privacy Act Systems of Records AGENCY: Office of the Secretary, USDA. ACTION: Notice to Revise Privacy Act Systems of Records... two Privacy Act Systems of Records entitled ``Information on Persons Disqualified from the...

  16. 18 CFR 367.26 - Departmental classification.

    Science.gov (United States)

    2010-04-01

    ... 18 Conservation of Power and Water Resources 1 2010-04-01 2010-04-01 false Departmental classification. 367.26 Section 367.26 Conservation of Power and Water Resources FEDERAL ENERGY REGULATORY... ACT General Instructions § 367.26 Departmental classification. Salaries and wages and all other costs...

  17. 75 FR 54213 - Privacy Act of 1974, as Amended; Computer Matching Program (SSA/Office of Personnel Management...

    Science.gov (United States)

    2010-09-03

    ... 1021 AGENCY: Social Security Administration (SSA). ACTION: Notice of a renewal of an existing computer.... SUPPLEMENTARY INFORMATION: A. General The Computer Matching and Privacy Protection Act of 1988 (Public Law (Pub... computer matching involving the Federal government could be performed and adding certain protections for...

  18. 76 FR 30952 - Published Privacy Impact Assessments on the Web

    Science.gov (United States)

    2011-05-27

    ... DEPARTMENT OF HOMELAND SECURITY Office of the Secretary Published Privacy Impact Assessments on... the Department. These assessments were approved and published on the Privacy Office's web site between..., 2011 and March 31, 2011, the Chief Privacy Officer of the DHS approved and published sixteen Privacy...

  19. 76 FR 58814 - Published Privacy Impact Assessments on the Web

    Science.gov (United States)

    2011-09-22

    ... DEPARTMENT OF HOMELAND SECURITY Office of the Secretary Published Privacy Impact Assessments on... DHS. These assessments were approved and published on the Privacy Office's Web site between June 1... 31, 2011, the Chief Privacy Officer of the DHS approved and published twenty-six Privacy Impact...

  20. 76 FR 78934 - Published Privacy Impact Assessments on the Web

    Science.gov (United States)

    2011-12-20

    ... DEPARTMENT OF HOMELAND SECURITY Office of the Secretary Published Privacy Impact Assessments on.... These assessments were approved and published on the Privacy Office's web site between September 1, 2011... November 30, 2011, the Chief Privacy Officer of the DHS approved and published seven Privacy Impact...

  1. 77 FR 46100 - Published Privacy Impact Assessments on the Web

    Science.gov (United States)

    2012-08-02

    ... DEPARTMENT OF HOMELAND SECURITY Office of the Secretary Published Privacy Impact Assessments on... published on the Privacy Office's Web site between March 1, 2012 and May 31, 2012. DATES: The PIAs will be... approved and published fifteen Privacy Impact Assessments (PIAs) on the DHS Privacy Office Web site, www...

  2. 76 FR 37823 - Published Privacy Impact Assessments on the Web

    Science.gov (United States)

    2011-06-28

    ... DEPARTMENT OF HOMELAND SECURITY Office of the Secretary Published Privacy Impact Assessments on... Department. These assessments were approved and published on the Privacy Office's Web site between March 31... 31, 2011, the Chief Privacy Officer of the DHS approved and published ten Privacy Impact Assessments...

  3. 75 FR 28051 - Public Workshop: Pieces of Privacy

    Science.gov (United States)

    2010-05-19

    ... DEPARTMENT OF HOMELAND SECURITY Office of the Secretary Public Workshop: Pieces of Privacy AGENCY: Privacy Office, DHS. ACTION: Notice announcing public workshop. SUMMARY: The Department of Homeland Security Privacy Office will host a public workshop, ``Pieces of Privacy.'' DATES: The workshop will be...

  4. National Privacy Research Strategy

    Data.gov (United States)

    Networking and Information Technology Research and Development, Executive Office of the President — On July 1, NITRD released the National Privacy Research Strategy. Research agencies across government participated in the development of the strategy, reviewing...

  5. 75 FR 16853 - Office of the Director of National Intelligence; Privacy Act of 1974; System of Records

    Science.gov (United States)

    2010-04-02

    ... system can range from UNCLASSIFIED to TOP SECRET. SYSTEM LOCATION: Office of the Director of National... of records in this system can range from UNCLASSIFIED to TOP SECRET. SYSTEM LOCATION: Office of the... UNCLASSIFIED to TOP SECRET. SYSTEM LOCATION: Office of the Director of National Intelligence, Washington, DC...

  6. 6 CFR Appendix A to Part 5 - FOIA/Privacy Act Offices of the Department of Homeland Security

    Science.gov (United States)

    2010-01-01

    ... of the Secretary Office of the Deputy Secretary Office of the Under Secretary for Management B Office... Hazard Information System of the National Oceanic and Atmospheric Administration), National Oceanic and... Preparedness d. Strategic National Stockpile 2. Centers for Disease Control and Agency for Toxic Substances and...

  7. 77 FR 19666 - Office of Financial Resources; Statement of Organization, Functions, and Delegations of Authority

    Science.gov (United States)

    2012-04-02

    ... Departmental Chief Financial Officer (CFO), Chief Acquisition Officer (CAO) and Performance Improvement Officer... their policy role in resource allocation and decisions affecting financial, grants and procurement... DEPARTMENT OF HEALTH AND HUMAN SERVICES Office of the Secretary Office of Financial Resources...

  8. Privacy Policy

    Science.gov (United States)

    ... Home → NLM Privacy Policy URL of this page: https://medlineplus.gov/privacy.html NLM Privacy Policy To ... out of cookies in the most popular browsers, http://www.usa.gov/optout_instructions.shtml. Please note ...

  9. The effect of room acoustics on the measured speech privacy in two typical European open plan offices

    NARCIS (Netherlands)

    Wenmaekers, R.H.C.; Hout, van N.H.A.M.; Luxemburg, van L.C.J.; Hak, C.C.J.M.

    2009-01-01

    The reverberation time and the background noise level are often used as the most important design parameters in European open plan offices to achieve a comfortable acoustic climate and to control speech intelligibility. Good speech intelligibility is desired for people working together, but bad

  10. 78 FR 26845 - Privacy Act of 1974; Department of Transportation, Office of the Secretary of Transportation; DOT...

    Science.gov (United States)

    2013-05-08

    ... for speeches and other events and meetings, and to provide information to the media and public about... with 5 U.S.C. 552a(r), DOT has provided a report of this system of records to the Office of Management.... In addition you should provide the following: An explanation of why you believe the Department would...

  11. 75 FR 38526 - Office of Consumer Information and Insurance Oversight: Privacy Act of 1974; Report of a New...

    Science.gov (United States)

    2010-07-02

    .... Office of Personnel Management, the U.S. Department of Agriculture's National Finance Center (NFC), and... birth, Social Security Number (SSN), gender, state of residence, information about prior coverage... residential address (if different than the mailing address), date of birth, Social Security Number (if the...

  12. Current developments in departmental PACS for ultrasound.

    Science.gov (United States)

    Grenier, L E; Eng, P

    1995-01-01

    1. INTRODUCTION TO DEPARTMENTAL PACS. Full or partial Departmental PACS is generally taken to mean an image management system focused on serving the needs of a specific modality or modality application. It will provide a modality specific means of image acquisition, specialized redisplay of images, distribution, and local long term storage of images. A Departmental PACS can be considered in isolation or as a component in a distributed Radiology PACS which consists of one or more departmental work groups on a back bone, potentially with shared resources. 2. DEPARTMENTAL PACS Issues Implementation of a Departmental PACS requires an in-depth knowledge of departmental clinical practice and work flow in all affected areas in the department, including patient intake, image collection, data routing, retrieval of previous image data, reporting, and long term data management and storage. Optimization of modality specific image display systems requires significant involvement from representative physician users. System architectures and user interfaces must be flexible enough to support the span of variation in clinical practice encountered in the site. A departmental PACS should offer a variety of "open" communications interfaces, both local and wide area, recognizing that outreach efforts are often driven by specific imaging departments. Interfaces to other departmental PAC systems and other information systems must be considered in order to facilitate institutions developing "Best of Breed" PACS systems. As hospitals move toward the integrated electronic medical record, means need to exist for a client process launched from a physician desktop to acquire images and/or reports from a departmental system. At minimum, HIS/RIS interfaces need to be considered to minimize re-keying of data and reduce data entry errors. 3. DESIGN OBJECTIVES FOR ALI ULTRAPACS. The key objectives were to design a product which could function either as a free standing PACS or as a departmental

  13. 75 FR 7979 - Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security/ALL-027 The...

    Science.gov (United States)

    2010-02-23

    ... privacy issues please contact: Mary Ellen Callahan (703-235-0780), Chief Privacy Officer, Privacy Office...] Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security/ALL-027 The History of the Department of Homeland Security System of Records AGENCY: Privacy Office, DHS. ACTION: Notice of...

  14. 77 FR 70796 - Privacy Act of 1974; Retirement of Department of Homeland Security Transportation Security...

    Science.gov (United States)

    2012-11-27

    ... privacy issues, please contact: Jonathan Cantor, (202-343-1717), Acting Chief Privacy Officer, Privacy... DEPARTMENT OF HOMELAND SECURITY Office of the Secretary Privacy Act of 1974; Retirement of Department of Homeland Security Transportation Security Administration System of Records AGENCY: Privacy...

  15. Departmentalization and Twenty-First Century Skills

    Science.gov (United States)

    Watts, Toy Coles

    2012-01-01

    The purpose of this study was to investigate the relationship between school organizational style and student outcomes. The research questions that guided this study were, "Is there a difference in mathematical performance of fourth graders who receive departmentalized instruction as compared to fourth grade students who receive…

  16. The Departmentalization of the ESL Program.

    Science.gov (United States)

    Bolton, John K.

    A review of prevailing patterns of sponsorship of college and university English as a second language (ESL) programs indicates that in community colleges, they tend to be housed in English departments. In four-year institutions they are generally in semi-autonomous units or institutes. The argument for departmental sponsorship is based on data…

  17. A Departmental Cost-Effectiveness Model.

    Science.gov (United States)

    Holleman, Thomas, Jr.

    In establishing a departmental cost-effectiveness model, the traditional cost-effectiveness model was discussed and equipped with a distant and deflation equation for both benefits and costs. Next, the economics of costing was examined and program costing procedures developed. Then, the model construct was described as it was structured around the…

  18. DEPARTMENTALIZATION OF READING IN ELEMENTARY AND SECONDARY SCHOOLS.

    Science.gov (United States)

    STOWE, ELAINE H.

    DEPARTMENTALIZATION IS A FORM OF GROUPING FOR INSTRUCTION, AN ADMINISTRATIVE METHOD FOR ASSIGNING PUPILS TO TEACHERS IN SOME PLANNED MANNER. SOME PRECEDENTS FOR THE RECENT REVIVAL OF DEPARTMENTALIZATION IN THE ELEMENTARY GRADES ARE CITED. THE FOLLOWING EXAMPLES OF DEPARTMENTALIZATION ORGANIZATION ARE DISCUSSED IN DETAIL--A PROGRAM INVOLVING…

  19. Evaluating the Impact of Departmentalization on Elementary School Students

    Science.gov (United States)

    Chang, Florence C.; Muñoz, Marco A.; Koshewa, Sheila

    2008-01-01

    The increasing accountability demands are leading some districts to departmentalize or consider departmentalizing at the elementary school level (Delviscio & Muffs, 2007). Departmentalization allows teachers to specialize and teach one content area in-depth which may, in turn, lead to higher accountability test scores. Although, due to…

  20. 78 FR 75447 - Senior Executive Service; Departmental Performance Review Board

    Science.gov (United States)

    2013-12-11

    ... DEPARTMENT OF THE TREASURY Senior Executive Service; Departmental Performance Review Board AGENCY: Treasury Department. ACTION: Notice of members of the Departmental Performance Review Board (PRB). SUMMARY: Pursuant to 5 U.S.C. 4314(c)(4), this notice announces the appointment of members of the Departmental PRB...

  1. 76 FR 69798 - Senior Executive Service; Departmental Performance Review Board

    Science.gov (United States)

    2011-11-09

    ... DEPARTMENT OF THE TREASURY Senior Executive Service; Departmental Performance Review Board AGENCY: Treasury Department. ACTION: Notice of members of the Departmental Performance Review Board (PRB). SUMMARY: Pursuant to 5 U.S.C. 4314(c)(4), this notice announces the appointment of members of the Departmental PRB...

  2. 76 FR 18954 - Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security Federal...

    Science.gov (United States)

    2011-04-06

    ... issues please contact: Mary Ellen Callahan (703-235- 0780), Chief Privacy Officer, Privacy Office...] Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security Federal Emergency Management Agency DHS/FEMA-011 Training and Exercise Program Records System of Records AGENCY: Privacy Office...

  3. 75 FR 11191 - Privacy Act of 1974; Retirement of Department of Homeland Security Federal Emergency Management...

    Science.gov (United States)

    2010-03-10

    ... 20472. For privacy issues please contact: Mary Ellen Callahan (703-235- 0780), Chief Privacy Officer... DEPARTMENT OF HOMELAND SECURITY Office of the Secretary Privacy Act of 1974; Retirement of Department of Homeland Security Federal Emergency Management Agency System of Records AGENCY: Privacy Office...

  4. 43 CFR 2.47 - Records subject to Privacy Act.

    Science.gov (United States)

    2010-10-01

    ... 43 Public Lands: Interior 1 2010-10-01 2010-10-01 false Records subject to Privacy Act. 2.47 Section 2.47 Public Lands: Interior Office of the Secretary of the Interior RECORDS AND TESTIMONY; FREEDOM OF INFORMATION ACT Privacy Act § 2.47 Records subject to Privacy Act. The Privacy Act applies to all...

  5. 76 FR 5250 - Departmental Offices; Proposed Collection; Comment Request

    Science.gov (United States)

    2011-01-28

    ...: Notice and request for comments. SUMMARY: The Department of the Treasury, as part of its continuing... soliciting comments concerning Extension of Foreign Currency Form FC-1 (OMB No. 1505-0012) Weekly Consolidated Foreign Currency Report of Major Market Participants, Extension of Form FC-2 (OMB No. 1505-0010...

  6. 75 FR 51166 - Departmental Offices; Proposed Collections; Comment Requests

    Science.gov (United States)

    2010-08-18

    .... ADDRESSES: Direct all written comments to Dwight Wolkow, International Portfolio Investment Data Systems...-investor. Securities held as part of a direct investment relationship should not be reported. (c) Form SLT... concerning Treasury International Capital Form SLT, Report of U.S. and Foreign Resident Aggregate Holdings of...

  7. 76 FR 13018 - Departmental Offices Proposed Collections; Comment Requests

    Science.gov (United States)

    2011-03-09

    ... U.S.C. 3506(c)(2)(A)). The Consumer Financial Protection Bureau implementation team is soliciting... consideration. ADDRESSES: Direct all written comments to Andrew Trueblood, Consumer Financial Protection Bureau... additional information should be directed to Andrew Trueblood in writing at Consumer Financial Protection...

  8. 75 FR 3279 - Departmental Offices; Debt Management Advisory Committee Meeting

    Science.gov (United States)

    2010-01-20

    ... scheduled meeting held at the Hay-Adams Hotel, 16th Street and Pennsylvania Avenue, NW., Washington, DC, on... Advisory Committee of The Securities, Industry and Financial Markets Association, was previously scheduled...

  9. 76 FR 5249 - Departmental Offices; Proposed Collection; Comment Request

    Science.gov (United States)

    2011-01-28

    ..., including Selected Money Market Instruments. The next such collection is to be conducted as of June 30, 2011... Selected Money Market Instruments. OMB Number: 1505-0123. Abstract: These forms are used to conduct annual...

  10. 75 FR 18259 - Departmental Offices; Debt Management Advisory Committee Meeting

    Science.gov (United States)

    2010-04-09

    ... decisions on major financing operations. Historically, this advice has been offered by debt management... Treasury's final announcement of financing plans may not reflect the recommendations provided in reports of... and financing estimates. This briefing will give the press an opportunity to ask questions about...

  11. 76 FR 20819 - Departmental Offices; Debt Management Advisory Committee Meeting

    Science.gov (United States)

    2011-04-13

    ... prior to making its final decisions on major financing operations. Historically, this advice has been.... 2, Sec. 3. Although the Treasury's final announcement of financing plans may not reflect the... statement of economic conditions and financing estimates. This briefing will give the press an opportunity...

  12. 76 FR 2952 - Departmental Offices; Debt Management Advisory Committee Meeting

    Science.gov (United States)

    2011-01-18

    ... decisions on major financing operations. Historically, this advice has been offered by debt management... Treasury's final announcement of financing plans may not reflect the recommendations provided in reports of... and financing estimates. This briefing will give the press an opportunity to ask questions about...

  13. 75 FR 1839 - Departmental Offices; Debt Management Advisory Committee Meeting

    Science.gov (United States)

    2010-01-13

    ... decisions on major financing operations. Historically, this advice has been offered by debt management... Treasury's final announcement of financing plans may not reflect the recommendations provided in reports of..., financing estimates and technical charts. This briefing will give the press an opportunity to ask questions...

  14. 77 FR 41476 - Departmental Offices; Debt Management Advisory Committee Meeting

    Science.gov (United States)

    2012-07-13

    ... decisions on major financing operations. Historically, this advice has been offered by debt management... Treasury's final announcement of financing plans may not reflect the recommendations provided in reports of... and financing estimates. This briefing will give the press an opportunity to ask questions about...

  15. 75 FR 63541 - Departmental Offices; Debt Management Advisory Committee Meeting

    Science.gov (United States)

    2010-10-15

    ... decisions on major financing operations. Historically, this advice has been offered by debt management... Treasury's final announcement of financing plans may not reflect the recommendations provided in reports of... and financing estimates. This briefing will give the press an opportunity to ask questions about...

  16. 78 FR 41832 - Departmental Offices; Debt Management Advisory Committee Meeting

    Science.gov (United States)

    2013-07-11

    ... making its final decisions on major financing operations. Historically, this advice has been offered by.... 2, Sec. 3. Although the Treasury's final announcement of financing plans may not reflect the... statement of economic conditions and financing estimates. This briefing will give the press an opportunity...

  17. 75 FR 39729 - Departmental Offices; Debt Management Advisory Committee Meeting

    Science.gov (United States)

    2010-07-12

    ... final decisions on major financing operations. Historically, this advice has been offered by debt.... Although the Treasury's final announcement of financing plans may not reflect the recommendations provided... economic conditions and financing estimates. This briefing will give the press an opportunity to ask...

  18. 76 FR 26337 - Departmental Offices; Proposed Collection; Comment Request

    Science.gov (United States)

    2011-05-06

    ... assumptions used; (c) ways to enhance the quality, utility, and clarity of the information to be collected; (d) ways to minimize the burden of the collection of information on those who are to respond, including the... agencies use the funds to make subawards to finance the construction or acquisition and rehabilitation of...

  19. 77 FR 33761 - Privacy Act of 1974; Notification to Update an Existing Privacy Act System of Records, “Grievance...

    Science.gov (United States)

    2012-06-07

    ... of a data breach. (See also on HUD's privacy Web site, Appendix I for other ways that the Privacy Act... DEPARTMENT OF HOUSING AND URBAN DEVELOPMENT [Docket No. FR-5613-N-04] Privacy Act of 1974; Notification to Update an Existing Privacy Act System of Records, ``Grievance Records'' AGENCY: Office of the...

  20. Privacy policies

    NARCIS (Netherlands)

    Dekker, M.A.C.; Etalle, S.; Hartog, den J.I.; Petkovic, M.; Jonker, W.

    2007-01-01

    Privacy is a prime concern in today’s information society. To protect the privacy of individuals, enterprises must follow certain privacy practices while collecting or processing personal data. In this chapter we look at the setting where an enterprise collects private data on its website, processes

  1. Privacy Policies

    NARCIS (Netherlands)

    Dekker, M.A.C.; Etalle, Sandro; den Hartog, Jeremy; Petkovic, M.; Jonker, W.; Jonker, Willem

    2007-01-01

    Privacy is a prime concern in today's information society. To protect the privacy of individuals, enterprises must follow certain privacy practices, while collecting or processing personal data. In this chapter we look at the setting where an enterprise collects private data on its website,

  2. 78 FR 69858 - Privacy Act of 1974; Department of Homeland Security/Federal Emergency Management Agency-001...

    Science.gov (United States)

    2013-11-21

    ... Emergency Management Agency, 500 C Street SW., Washington, DC 20475. For privacy issues please contact... DEPARTMENT OF HOMELAND SECURITY Office of the Secretary [Docket No. DHS-2013-0077] Privacy Act of..., Privacy Office. ACTION: Notice of Privacy Act System of Records. SUMMARY: In accordance with the Privacy...

  3. 75 FR 69603 - Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security National...

    Science.gov (United States)

    2010-11-15

    ... 20528. For privacy issues please contact: Mary Ellen Callahan (703-235- 0780), Chief Privacy Officer... Secretary 6 CFR Part 5 [Docket No. DHS-2010-0085] Privacy Act of 1974: Implementation of Exemptions... Coordinating Center Records System of Records AGENCY: Privacy Office, DHS. ACTION: Notice of proposed...

  4. 77 FR 43100 - Privacy Act of 1974; Department of Homeland Security, Federal Emergency Management Agency-009...

    Science.gov (United States)

    2012-07-23

    ... Homeland Security, Washington, DC 20478. For privacy issues, please contact: Mary Ellen Callahan (703) 235... DEPARTMENT OF HOMELAND SECURITY Office of the Secretary [Docket No. DHS-2011-0097] Privacy Act of... Assistance Grant Programs System of Records AGENCY: Privacy Office, DHS. ACTION: Notice of Privacy Act system...

  5. Genetic privacy.

    Science.gov (United States)

    Sankar, Pamela

    2003-01-01

    During the past 10 years, the number of genetic tests performed more than tripled, and public concern about genetic privacy emerged. The majority of states and the U.S. government have passed regulations protecting genetic information. However, research has shown that concerns about genetic privacy are disproportionate to known instances of information misuse. Beliefs in genetic determinacy explain some of the heightened concern about genetic privacy. Discussion of the debate over genetic testing within families illustrates the most recent response to genetic privacy concerns.

  6. 76 FR 53421 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2011-08-26

    ..., Air Force Privacy Act Office, Office of Warfighting Integration and Chief Information Officer, ATTN...: Name, signatures, personal contact information, individual's employer and institutional, organizational..., Historical Products, Services, and Requirements; Air Force Instruction 84-105, Organizational Lineage, Honors...

  7. User Privacy in RFID Networks

    Science.gov (United States)

    Singelée, Dave; Seys, Stefaan

    Wireless RFID networks are getting deployed at a rapid pace and have already entered the public space on a massive scale: public transport cards, the biometric passport, office ID tokens, customer loyalty cards, etc. Although RFID technology offers interesting services to customers and retailers, it could also endanger the privacy of the end-users. The lack of protection mechanisms being deployed could potentially result in a privacy leakage of personal data. Furthermore, there is the emerging threat of location privacy. In this paper, we will show some practical attack scenarios and illustrates some of them with cases that have received press coverage. We will present the main challenges of enhancing privacy in RFID networks and evaluate some solutions proposed in literature. The main advantages and shortcomings will be briefly discussed. Finally, we will give an overview of some academic and industrial research initiatives on RFID privacy.

  8. 76 FR 67472 - Order of Succession for the Office of the Chief Information Officer

    Science.gov (United States)

    2011-11-01

    ...: Juanita Galbreath, Deputy Chief Information Officer for Cyber Security and Privacy, Office of the Chief...) Deputy Chief Information Officer, for IT Operations; (3) Deputy Chief Information Officer, for Cyber Security and Privacy; (4) Deputy Chief Information Officer, for Business and IT Modernization. These...

  9. Self-Contained to Departmentalized: How Reading Habits Changed

    Science.gov (United States)

    Lamme, Linda Leonard

    1976-01-01

    Examined the reading habits of four 4th grade classes before and after a changeover from self-contained to departmentalized instruction. Results indicated a slightly lower mean number of books read and far less variation among classes in the number of books read after departmentalization. (JMB)

  10. 75 FR 68669 - Senior Executive Service; Departmental Performance Review Board

    Science.gov (United States)

    2010-11-08

    ... DEPARTMENT OF THE TREASURY Senior Executive Service; Departmental Performance Review Board AGENCY: Treasury Department. ACTION: Notice. SUMMARY: Pursuant to 5 U.S.C. 4314(c)(4), this notice announces the appointment of members of the Departmental PRB. The purpose of this PRB is to review and make recommendations...

  11. Enterprise imaging and multi-departmental PACS

    International Nuclear Information System (INIS)

    Bergh, Bjoern

    2006-01-01

    The aim of this review is to present the status of digital image acquisition and archiving outside of radiology and to describe the technical concepts and possibilities of how a ''radiology'' Picture Archiving and Communication System (PACS) can become a multi-departmental (MD-)PACS. First the principles of system integration technology are explained and illustrated by the description of a typical radiology system integration. Then four types of modality integration approaches are defined: the direct modality integration (Type-I), the integration via DICOM acquisition software (Type-II) the integration via specialised systems either with (Type-III) or without PACS connection (Type-IV). The last section is dedicated to the presentation of the PACS requirements of selected interdisciplinary modality types [Endoscopy, Ultrasound and Electrocardiography (ECG)] and clinical disciplines (Pathology, Dermatology, Ophthalmology and Cardiology), which are then compared with the technical possibilities of a MD-PACS. (orig.)

  12. What was privacy?

    Science.gov (United States)

    McCreary, Lew

    2008-10-01

    Why is that question in the past tense? Because individuals can no longer feel confident that the details of their lives--from identifying numbers to cultural preferences--will be treated with discretion rather than exploited. Even as Facebook users happily share the names of their favorite books, movies, songs, and brands, they often regard marketers' use of that information as an invasion of privacy. In this wide-ranging essay, McCreary, a senior editor at HBR, examines numerous facets of the privacy issue, from Google searches, public shaming on the internet, and cell phone etiquette to passenger screening devices, public surveillance cameras, and corporate chief privacy officers. He notes that IBM has been a leader on privacy; its policy forswearing the use of employees' genetic information in hiring and benefits decisions predated the federal Genetic Information Nondiscrimination Act by three years. Now IBM is involved in an open-source project known as Higgins to provide users with transportable, potentially anonymous online presences. Craigslist, whose CEO calls it "as close to 100% user driven as you can get," has taken an extremely conservative position on privacy--perhaps easier for a company with a declared lack of interest in maximizing revenue. But TJX and other corporate victims of security breaches have discovered that retaining consumers' transaction information can be both costly and risky. Companies that underestimate the importance of privacy to their customers or fail to protect it may eventually face harsh regulation, reputational damage, or both. The best thing they can do, says the author, is negotiate directly with those customers over where to draw the line.

  13. Implementation of a departmental picture archiving and communication system: a productivity and cost analysis.

    Science.gov (United States)

    Macyszyn, Luke; Lega, Brad; Bohman, Leif-Erik; Latefi, Ahmad; Smith, Michelle J; Malhotra, Neil R; Welch, William; Grady, Sean M

    2013-09-01

    Digital radiology enhances productivity and results in long-term cost savings. However, the viewing, storage, and sharing of outside imaging studies on compact discs at ambulatory offices and hospitals pose a number of unique challenges to a surgeon's efficiency and clinical workflow. To improve the efficiency and clinical workflow of an academic neurosurgical practice when evaluating patients with outside radiological studies. Open-source software and commercial hardware were used to design and implement a departmental picture archiving and communications system (PACS). The implementation of a departmental PACS system significantly improved productivity and enhanced collaboration in a variety of clinical settings. Using published data on the rate of information technology problems associated with outside studies on compact discs, this system produced a cost savings ranging from $6250 to $33600 and from $43200 to $72000 for 2 cohorts, urgent transfer and spine clinic patients, respectively, therefore justifying the costs of the system in less than a year. The implementation of a departmental PACS system using open-source software is straightforward and cost-effective and results in significant gains in surgeon productivity when evaluating patients with outside imaging studies.

  14. Privacy Act

    Science.gov (United States)

    Learn about the Privacy Act of 1974, the Electronic Government Act of 2002, the Federal Information Security Management Act, and other information about the Environmental Protection Agency maintains its records.

  15. 32 CFR 701.109 - Privacy Act (PA) appeals.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 5 2010-07-01 2010-07-01 false Privacy Act (PA) appeals. 701.109 Section 701... OF THE NAVY DOCUMENTS AFFECTING THE PUBLIC DON Privacy Program § 701.109 Privacy Act (PA) appeals. (a... commence when the appeal reaches the office of the review authority having jurisdiction over the record...

  16. 77 FR 32111 - Privacy Act System of Records

    Science.gov (United States)

    2012-05-31

    ... contacted in order to obtain that office's advice regarding obligations under the Privacy Act; 8. Breach... FEDERAL COMMUNICATIONS COMMISSION Privacy Act System of Records AGENCY: Federal Communications Commission. ACTION: Notice; one new Privacy Act system of records. SUMMARY: Pursuant to subsection (e)(4) of...

  17. 10 CFR 1304.103 - Privacy Act inquiries.

    Science.gov (United States)

    2010-01-01

    ... writing may be sent to: Privacy Act Officer, U.S. Nuclear Waste Technical Review Board, 2300 Clarendon... NUCLEAR WASTE TECHNICAL REVIEW BOARD PRIVACY ACT OF 1974 § 1304.103 Privacy Act inquiries. (a) Requests... contains a record pertaining to him or her may file a request in person or in writing, via the internet, or...

  18. 37 CFR 251.23 - FOIA and Privacy Act.

    Science.gov (United States)

    2010-07-01

    ... 37 Patents, Trademarks, and Copyrights 1 2010-07-01 2010-07-01 false FOIA and Privacy Act. 251.23 Section 251.23 Patents, Trademarks, and Copyrights COPYRIGHT OFFICE, LIBRARY OF CONGRESS COPYRIGHT... Access to and Inspection of Records § 251.23 FOIA and Privacy Act. Freedom of Information Act and Privacy...

  19. 48 CFR 352.224-70 - Privacy Act.

    Science.gov (United States)

    2010-10-01

    ... 48 Federal Acquisition Regulations System 4 2010-10-01 2010-10-01 false Privacy Act. 352.224-70... SOLICITATION PROVISIONS AND CONTRACT CLAUSES Texts of Provisions and Clauses 352.224-70 Privacy Act. As prescribed in 324.103(b)(2), the Contracting Officer shall insert the following clause: Privacy Act (January...

  20. 36 CFR 902.56 - Protection of personal privacy.

    Science.gov (United States)

    2010-07-01

    ... privacy. 902.56 Section 902.56 Parks, Forests, and Public Property PENNSYLVANIA AVENUE DEVELOPMENT... Protection of personal privacy. (a) Any of the following personnel, medical, or similar records is within the... invasion of his personal privacy: (1) Personnel and background records personal to any officer or employee...

  1. 32 CFR 806b.4 - Privacy Act complaints.

    Science.gov (United States)

    2010-07-01

    ... be identified, the local Privacy Act officer will assume these duties. Issues that cannot be resolved... 32 National Defense 6 2010-07-01 2010-07-01 false Privacy Act complaints. 806b.4 Section 806b.4 National Defense Department of Defense (Continued) DEPARTMENT OF THE AIR FORCE ADMINISTRATION PRIVACY ACT...

  2. 75 FR 8092 - Privacy Act of 1974; Department of Homeland Security/ALL-027 The History of the Department of...

    Science.gov (United States)

    2010-02-23

    ... Policy, U.S. Department of Homeland Security, Washington, DC 20528. For privacy issues please contact... DEPARTMENT OF HOMELAND SECURITY Office of the Secretary [Docket No. DHS-2009-0040] Privacy Act of... System of Records AGENCY: Privacy Office, DHS. ACTION: Notice of Privacy Act system of records. SUMMARY...

  3. 75 FR 39184 - Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security/ALL-029 Civil...

    Science.gov (United States)

    2010-07-08

    ... questions and privacy issues please contact: Mary Ellen Callahan (703-235-0780), Chief Privacy Officer... Secretary 6 CFR Part 5 [Docket No. DHS-2010-0034] Privacy Act of 1974: Implementation of Exemptions...: Privacy Office, DHS. ACTION: Notice of proposed rulemaking. SUMMARY: The Department of Homeland Security...

  4. 76 FR 49500 - Privacy Act of 1974; Department of Homeland Security United States Coast Guard-020 Substance...

    Science.gov (United States)

    2011-08-10

    ... 7101 Washington, DC 20593. For privacy issues please contact: Mary Ellen Callahan (703-235-0780), Chief... DEPARTMENT OF HOMELAND SECURITY Office of the Secretary [Docket No. DHS-2011-0053] Privacy Act of... Treatment Program System of Records AGENCY: Privacy Office, DHS. ACTION: Notice of Privacy Act system of...

  5. Concentrated Differential Privacy

    OpenAIRE

    Dwork, Cynthia; Rothblum, Guy N.

    2016-01-01

    We introduce Concentrated Differential Privacy, a relaxation of Differential Privacy enjoying better accuracy than both pure differential privacy and its popular "(epsilon,delta)" relaxation without compromising on cumulative privacy loss over multiple computations.

  6. 76 FR 27847 - Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security/U.S. Coast...

    Science.gov (United States)

    2011-05-13

    ... issues please contact: Mary Ellen Callahan (703-235- 0780), Chief Privacy Officer, Privacy Office, U.S...;Prices of new books are listed in the first FEDERAL REGISTER issue of each #0;week. #0; #0; #0; #0;#0...

  7. 76 FR 50721 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2011-08-16

    ... . Follow the instructions for submitting comments. Mail: Federal Docket Management System Office, 1160... of the Army, Privacy Office, U.S. Army Records Management and Declassification Agency, 7701 Telegraph...; laboratory reports, polygraph reports, documentary evidence, physical evidence, summary and administrative...

  8. 75 FR 65007 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2010-10-21

    ... Officer, P.O. Box 2218, Waldorf, MD 20604-2218. Individuals should complete AFOSI's Certification of... of Information/Privacy Act Officer, P.O. Box 2218, Waldorf, MD 20604-2218. Individuals should...

  9. Defense Departmental Reporting Systems - Audited Financial Statements

    National Research Council Canada - National Science Library

    Granetto, Paul

    2001-01-01

    .... The Chief Financial Officers Act requires the Inspector General, DoD, to audit the financial statements of DoD organizations in accordance with generally accepted Government auditing standards...

  10. 75 FR 54662 - Privacy Act of 1974: Systems of Records

    Science.gov (United States)

    2010-09-08

    ..., Chief Privacy Officer, Office of Information Technology, 202-551-7209. In the Federal Register of August... SECURITIES AND EXCHANGE COMMISSION [Release No. PA-44A; File No. S7-17-10] Privacy Act of 1974: Systems of Records AGENCY: Securities and Exchange Commission. ACTION: Notice to establish systems of...

  11. 78 FR 64230 - DHS Data Privacy and Integrity Advisory Committee

    Science.gov (United States)

    2013-10-28

    ... DEPARTMENT OF HOMELAND SECURITY Office of the Secretary [Docket No. DHS-2013-0056] DHS Data...; Request for Applicants for Appointment to the DHS Data Privacy and Integrity Advisory Committee--EXTENSION. SUMMARY: The Department of Homeland Security Privacy Office is seeking applicants for appointment to the...

  12. 76 FR 39406 - DHS Data Privacy and Integrity Advisory Committee

    Science.gov (United States)

    2011-07-06

    ... DEPARTMENT OF HOMELAND SECURITY Office of the Secretary [Docket No. DHS-2011-0052] DHS Data...; Request for Applicants for Appointment to the DHS Data Privacy and Integrity Advisory Committee. SUMMARY: The Department of Homeland Security Privacy Office is seeking applicants for appointment to the DHS...

  13. 78 FR 55088 - DHS Data Privacy and Integrity Advisory Committee

    Science.gov (United States)

    2013-09-09

    ... Federal Officer, DHS Data Privacy and Integrity Advisory Committee, Department of Homeland Security... DEPARTMENT OF HOMELAND SECURITY Office of the Secretary [Docket No. DHS-2013-0056] DHS Data...; Request for Applicants for Appointment to the DHS Data Privacy and Integrity Advisory Committee. SUMMARY...

  14. 77 FR 32655 - DHS Data Privacy and Integrity Advisory Committee

    Science.gov (United States)

    2012-06-01

    ... Officer, Data Privacy and Integrity Advisory Committee, Department of Homeland Security, 245 Murray Lane..., DHS Data Privacy and Integrity Advisory Committee, Department of Homeland Security, 245 Murray Lane SW... DEPARTMENT OF HOMELAND SECURITY Office of the Secretary [Docket No. DHS-2012-0029] DHS Data...

  15. 78 FR 51197 - DHS Data Privacy and Integrity Advisory Committee

    Science.gov (United States)

    2013-08-20

    ... Officer, Data Privacy and Integrity Advisory Committee, Department of Homeland Security, 245 Murray Lane... ``Department of Homeland Security Data Privacy and Integrity Advisory Committee'' and the Docket Number (DHS... DEPARTMENT OF HOMELAND SECURITY Office of the Secretary [Docket No. DHS-2013-0055] DHS Data...

  16. 77 FR 37685 - DHS Data Privacy and Integrity Advisory Committee

    Science.gov (United States)

    2012-06-22

    ... DEPARTMENT OF HOMELAND SECURITY Office of the Secretary [Docket No. DHS-2012-0032] DHS Data...; Request for Applicants for Appointment to the DHS Data Privacy and Integrity Advisory Committee. SUMMARY: The Department of Homeland Security Privacy Office is seeking applicants for appointment to the DHS...

  17. 75 FR 28042 - Privacy Act of 1974: System of Records; Department of Homeland Security Transportation Security...

    Science.gov (United States)

    2010-05-19

    ..., VA 20598-6036 or [email protected] . For privacy issues please contact: Mary Ellen Callahan (703-235... DEPARTMENT OF HOMELAND SECURITY Office of the Secretary [Docket No. DHS-2010-0013] Privacy Act of..., Transportation Security Enforcement Record System, System of Records AGENCY: Privacy Office, DHS. ACTION: Notice...

  18. 78 FR 69861 - Privacy Act of 1974; Department of Homeland Security, Federal Emergency Management Agency...

    Science.gov (United States)

    2013-11-21

    ... Homeland Security, Washington, DC 20478. For privacy issues, please contact: Karen L. Neuman, (202) 343... DEPARTMENT OF HOMELAND SECURITY Office of the Secretary [DHS-2013-0073] Privacy Act of 1974... Defense Executive Reserve System of Records AGENCY: Department of Homeland Security, Privacy Office...

  19. 75 FR 18863 - Privacy Act of 1974; Department of Homeland Security Transportation Security Administration-006...

    Science.gov (United States)

    2010-04-13

    ... 12th Street, Arlington, VA, 20598-6036. For privacy issues please contact: Mary Ellen Callahan (703-235... DEPARTMENT OF HOMELAND SECURITY Office of the Secretary [Docket No. DHS-2010-0015] Privacy Act of... Matters Tracking Records AGENCY: Privacy Office, DHS. [[Page 18864

  20. The Privacy Officer: A Critical Success Factor in the Implementation and Maintenance of HIPAA Legislation in DoD Medical Treatment Facilities

    Science.gov (United States)

    2002-05-21

    don’t mind having such records available for public viewing in the dank basement of a city hall building, observers have noted, because it takes time...Officer: The battle for trust among customers in the emerging digital economy is just getting started. The commitment of executive attention to the matter

  1. Privacy transparency patterns

    NARCIS (Netherlands)

    Siljee B.I.J.

    2015-01-01

    This paper describes two privacy patterns for creating privacy transparency: the Personal Data Table pattern and the Privacy Policy Icons pattern, as well as a full overview of privacy transparency patterns. It is a first step in creating a full set of privacy design patterns, which will aid

  2. 76 FR 67755 - Privacy Act of 1974; Department of Homeland Security U.S. Customs and Border Protection DHS/CBP...

    Science.gov (United States)

    2011-11-02

    ... DEPARTMENT OF HOMELAND SECURITY Office of the Secretary [Docket No. DHS-2011-0102] Privacy Act of... Data System of Records AGENCY: Privacy Office, DHS. ACTION: Notice of Privacy Act system of records. SUMMARY: In accordance with the Privacy Act of 1974 the Department of Homeland Security proposes to...

  3. From Data Privacy to Location Privacy

    Science.gov (United States)

    Wang, Ting; Liu, Ling

    Over the past decade, the research on data privacy has achieved considerable advancement in the following two aspects: First, a variety of privacy threat models and privacy principles have been proposed, aiming at providing sufficient protection against different types of inference attacks; Second, a plethora of algorithms and methods have been developed to implement the proposed privacy principles, while attempting to optimize the utility of the resulting data. The first part of the chapter presents an overview of data privacy research by taking a close examination at the achievements from the above two aspects, with the objective of pinpointing individual research efforts on the grand map of data privacy protection. As a special form of data privacy, location privacy possesses its unique characteristics. In the second part of the chapter, we examine the research challenges and opportunities of location privacy protection, in a perspective analogous to data privacy. Our discussion attempts to answer the following three questions: (1) Is it sufficient to apply the data privacy models and algorithms developed to date for protecting location privacy? (2) What is the current state of the research on location privacy? (3) What are the open issues and technical challenges that demand further investigation? Through answering these questions, we intend to provide a comprehensive review of the state of the art in location privacy research.

  4. 77 FR 56194 - Notice of Proposed Information Collection Requests; Office of the Secretary; Education Jobs...

    Science.gov (United States)

    2012-09-12

    ... Director, Information Collection Clearance Division, Privacy, Information and Records Management Services, Office of Management, publishes this notice containing proposed information collection requests at the... Division, Privacy, Information and Records Management Services, Office of Management. [FR Doc. 2012-22454...

  5. 75 FR 82132 - Privacy Act of 1974; System of Records; Statement of General Routine Uses; Notice of...

    Science.gov (United States)

    2010-12-29

    ...: Send written comments on the two new general routine uses to Habib Azarsina, Departmental Privacy... Avenue, SE., Washington, DC 20590 or habib[email protected] . FOR FURTHER INFORMATION CONTACT: Habib... Transportation, 1200 New Jersey Avenue, SE., Washington, DC 20590 or habib[email protected] or (202) 366-1965...

  6. 76 FR 67599 - Privacy Act of 1974: Implementation

    Science.gov (United States)

    2011-11-02

    ...: Background On July 19, 2011, the Office of the Director of National Intelligence (ODNI) published notice of... OFFICE OF THE DIRECTOR OF NATIONAL INTELLIGENCE 32 CFR Part 1701 Privacy Act of 1974: Implementation AGENCY: Office of the Director of National Intelligence. ACTION: Final rule. SUMMARY: The Office...

  7. Semantic Security: Privacy Definitions Revisited

    OpenAIRE

    Jinfei Liu; Li Xiong; Jun Luo

    2013-01-01

    In this paper we illustrate a privacy framework named Indistinguishabley Privacy. Indistinguishable privacy could be deemed as the formalization of the existing privacy definitions in privacy preserving data publishing as well as secure multi-party computation. We introduce three representative privacy notions in the literature, Bayes-optimal privacy for privacy preserving data publishing, differential privacy for statistical data release, and privacy w.r.t. semi-honest behavior in the secure...

  8. The Role of Departmental Leadership for Professional Learning Communities

    Science.gov (United States)

    Vanblaere, Bénédicte; Devos, Geert

    2018-01-01

    Purpose: Department heads play a pivotal role in the functioning of departments in secondary schools. However, quantitative research about the role of departmental leadership for the development of professional learning communities (PLCs) in subject departments in secondary schools remains scarce. As PLCs are seen as promising contexts for…

  9. Elementary School Organization: Self-Contained and Departmentalized Classroom Structures.

    Science.gov (United States)

    Des Moines Public Schools, IA.

    Surveys were conducted to investigate contemporary thought regarding organizational practices at the elementary level, with particular attention to identifying the extent to which departmentalization was supported by research and actually employed in 24 elementary schools in the Midwest and in 41 Des Moines elementary schools. Four committees…

  10. Pre-Service Teachers' Perceptions of Departmentalization of Elementary Schools

    Science.gov (United States)

    Liu, Fuchang

    2011-01-01

    This paper discusses the advantages and disadvantages of departmentalization of elementary schools, with an emphasis on teaching mathematics, as perceived by preservice teachers who shared their opinions through online discussion. Advantages include teachers' enthusiasm about and focused attention on the specialized area and students' easier…

  11. Interdisciplinary Team Teaching versus Departmentalization in Middle Schools.

    Science.gov (United States)

    Alspaugh, John W.; Harting, Roger D.

    1998-01-01

    Studied the effects of interdisciplinary teaming versus departmentalization on student achievement in middle schools. Found no significant differences for reading, math, science, and social studies achievement. Results suggest that team teaching merits further investigation as a potential strategy for mediating the student achievement loss…

  12. Faculty Agency: Departmental Contexts That Matter in Faculty Careers

    Science.gov (United States)

    Campbell, Corbin M.; O'Meara, KerryAnn

    2014-01-01

    In a modern context of constrained resources and high demands, faculty exert agency to strategically navigate their careers (Baez 2000a; Neumann et al. 2006). Guided by the O'Meara et al. (2011) framework on agency in faculty professional lives, this study used Structural Equation Modeling to investigate which departmental factors…

  13. Institutional and Departmental Cultures: The Relationship Between Teaching and Research.

    Science.gov (United States)

    Austin, Ann E.

    1996-01-01

    The influence of institutional and departmental cultures on the relationship between college teaching and research is discussed, and suggestions for assessing these factors and nurturing a positive relationship between them are made. Approaches include making reward systems more equitable, strengthening administrative leadership, encouraging…

  14. 76 FR 67621 - Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security U.S. Customs...

    Science.gov (United States)

    2011-11-02

    ...., Washington, DC 20229. For privacy issues please contact: Mary Ellen Callahan (703) 235-0780), Chief Privacy... Secretary 6 CFR Part 5 [Docket No. DHS-2011-0103] Privacy Act of 1974: Implementation of Exemptions... of Records AGENCY: Privacy Office, DHS. ACTION: Notice of proposed rulemaking. SUMMARY: The...

  15. 75 FR 50846 - Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security/ALL-001...

    Science.gov (United States)

    2010-08-18

    ... INFORMATION CONTACT: For general questions and privacy issues please contact: Mary Ellen Callahan (703-235...] Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security/ALL--001 Freedom of Information Act and Privacy Act Records System of Records AGENCY: Privacy Office, DHS. ACTION: Final rule...

  16. Comparison of two speech privacy measurements, articulation index (AI) and speech privacy noise isolation class (NIC'), in open workplaces

    Science.gov (United States)

    Yoon, Heakyung C.; Loftness, Vivian

    2002-05-01

    Lack of speech privacy has been reported to be the main dissatisfaction among occupants in open workplaces, according to workplace surveys. Two speech privacy measurements, Articulation Index (AI), standardized by the American National Standards Institute in 1969, and Speech Privacy Noise Isolation Class (NIC', Noise Isolation Class Prime), adapted from Noise Isolation Class (NIC) by U. S. General Services Administration (GSA) in 1979, have been claimed as objective tools to measure speech privacy in open offices. To evaluate which of them, normal privacy for AI or satisfied privacy for NIC', is a better tool in terms of speech privacy in a dynamic open office environment, measurements were taken in the field. AIs and NIC's in the different partition heights and workplace configurations have been measured following ASTM E1130 (Standard Test Method for Objective Measurement of Speech Privacy in Open Offices Using Articulation Index) and GSA test PBS-C.1 (Method for the Direct Measurement of Speech-Privacy Potential (SPP) Based on Subjective Judgments) and PBS-C.2 (Public Building Service Standard Method of Test Method for the Sufficient Verification of Speech-Privacy Potential (SPP) Based on Objective Measurements Including Methods for the Rating of Functional Interzone Attenuation and NC-Background), respectively.

  17. 76 FR 24489 - Privacy Act of 1974; Amendment to System of Records

    Science.gov (United States)

    2011-05-02

    ... message). Fax: 202-482-9237, Attention: Elaine Newton, Privacy Officer. Mail, Hand Delivery/Courier...: Elaine Newton, Privacy Officer. FOR FURTHER INFORMATION CONTACT: Ms. Newton at the Office of Government... 4685 (Jan. 26, 2009); and in support of this Administration's core principles of the business of...

  18. Privacy og selvbeskrivelse

    DEFF Research Database (Denmark)

    Rosengaard, Hans Ulrik

    2015-01-01

    En beskrivelse af feltet for forskning i Privacy med særligt henblik på privacys betydning for muligheden for at styre sin egen selvbeskrivelse......En beskrivelse af feltet for forskning i Privacy med særligt henblik på privacys betydning for muligheden for at styre sin egen selvbeskrivelse...

  19. 77 FR 41173 - Notice of Proposed Information Collection Requests; Office of Postsecondary Education; Survey of...

    Science.gov (United States)

    2012-07-12

    ... Records Management Services, Office of Management, publishes this notice containing proposed information... Collection Clearance Division, Privacy, Information and Records Management Services, Office of Management...

  20. 77 FR 59597 - Notice of Proposed Information Collection Requests; Office of Elementary and Secondary Education...

    Science.gov (United States)

    2012-09-28

    ... Records Management Services, Office of Management, publishes this notice containing proposed information... Division, Privacy, Information and Records Management Services, Office of Management. [FR Doc. 2012-23849...

  1. 77 FR 32612 - Notice of Proposed Information Collection Requests; Office of Postsecondary Education; Assessing...

    Science.gov (United States)

    2012-06-01

    ... Records Management Services, Office of Management, publishes this notice containing proposed information... Clearance Division, Privacy, Information and Records Management Services, Office of Management. [FR Doc...

  2. Privacy vs security

    CERN Document Server

    Stalla-Bourdillon, Sophie; Ryan, Mark D

    2014-01-01

    Securing privacy in the current environment is one of the great challenges of today's democracies. Privacy vs. Security explores the issues of privacy and security and their complicated interplay, from a legal and a technical point of view. Sophie Stalla-Bourdillon provides a thorough account of the legal underpinnings of the European approach to privacy and examines their implementation through privacy, data protection and data retention laws. Joshua Philips and Mark D. Ryan focus on the technological aspects of privacy, in particular, on today's attacks on privacy by the simple use of today'

  3. Research into radiation protection. 1994 Programme report. Report on radiation departmental research programme on radiation protection, sponsored by the Federal Ministry for the Environment, Nature Conservation and Reactor Safety, and placed under the administrative and subject competence of the Federal Radiation Protection Office

    International Nuclear Information System (INIS)

    Goedde, R.; Schmitt-Hannig, A.; Thieme, M.

    1994-10-01

    On behalf of the Ministery for Environment, Nature Conservation and Nuclear Safety (BMU), the Federal Office for Radiation Protection is placing research and study contracts in the field of radiation protection. The results of these projects are used for developing radiation protection rules and to fulfill the special radiation protection tasks of the BMU, required by law. Planning, expert and administrative management, placing, assistance as well as expert evaluation of the results from these research projects lies within the responsibility of the Federal Office for Radiation Protection. This report provides information on preliminary and final results of radiation protection projects within the BMU Department Research Programme of the year 1994. (orig.) [de

  4. Research activities in radiation protection. Programme report 1996. Report on the departmental research programme of the Federal Ministry for Environment, Nature Conservation and Reactor Safety (BMU), performed under the scientific and administrative project management of the Federal Office for Radiation Protection (BfS)

    International Nuclear Information System (INIS)

    Schmitt-Hannig, A.; Thieme, M.; Goedde, R.

    1997-02-01

    On behalf of the Ministry for Environment, Nature Conservation and Nuclear Safety (BMU), the Federal Office for Radiation Protection is placing research and study contracts in the field of radiation protection. The results of these projects are used for developing radiation protection rules and to fulfill the special radiation protection tasks of the BMU, required by law. Planning, expert and administrative management, placing, assistance as well as expert evaluation of the results from these research projects lies within the responsibility of the Federal Office for Radiation Protection. This report provides information on preliminary and final results of radiation protection projects within the BMU Department Research Programme of the year 1996. (orig.) [de

  5. Research into radiation protection. 1995 Programme report. Report on radiation departmental research programme on radiation protection, sponsored by the Federal Ministry for the Environment, Nature Conservation and Reactor Safety, and placed under the administrative and subject competence of the Federal Radiation Protection Office

    International Nuclear Information System (INIS)

    Thieme, M.; Goedde, R.; Schmitt-Hannig, A.

    1996-01-01

    On behalf of the Ministry for Environment, Nature Conservation and Nuclear Safety (BMU), the Federal Office for Radiation Protection is placing research and study contracts in the field of radiation protection. The results of these projects are used for developing radiation protection rules and to fulfill the special radiation protection tasks of the BMU, required by law. Planning, expert and administrative management, placing, assistance as well as expert evaluation of the results from these research projects lies within the responsibility of the Federal Office for Radiation Protection. This report provides information on preliminary and final results of radiation protection projects within the BMU Department Research Programme of the year 1995. (orig.) [de

  6. 76 FR 67155 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2011-10-31

    ... inventory of record systems subject to the Privacy Act of 1974 (5 U.S.C. 552a), as amended. DATES: The... Federal Register Liaison Officer, Department of Defense. N05000-1 System name: OPNAV Headquarters Web... DEPARTMENT OF DEFENSE Department of the Navy [Docket ID USN-2011-0015] Privacy Act of 1974; System...

  7. 75 FR 52769 - DHS Data Privacy and Integrity Advisory Committee

    Science.gov (United States)

    2010-08-27

    ... ``Department of Homeland Security Data Privacy and Integrity Advisory Committee'' and the Docket Number (DHS... DEPARTMENT OF HOMELAND SECURITY Office of the Secretary [Docket No. DHS-2010-0060] DHS Data... Committee meeting. SUMMARY: The DHS Data Privacy and Integrity Advisory Committee will meet on September 28...

  8. 76 FR 25361 - DHS Data Privacy and Integrity Advisory Committee

    Science.gov (United States)

    2011-05-04

    ..., Executive Director, Data Privacy and Integrity Advisory Committee, Department of Homeland Security... DEPARTMENT OF HOMELAND SECURITY Office of the Secretary [Docket No. DHS-2011-0022] DHS Data... of Federal Advisory Committee Meeting SUMMARY: The DHS Data Privacy and Integrity Advisory Committee...

  9. 75 FR 25870 - DHS Data Privacy and Integrity Advisory Committee

    Science.gov (United States)

    2010-05-10

    ... submissions must include the words ``Department of Homeland Security Data Privacy and Integrity Advisory..., DHS Data Privacy and Integrity Advisory Committee, Department of Homeland Security, Washington, DC... DEPARTMENT OF HOMELAND SECURITY Office of the Secretary [Docket No. DHS-2010-0035] DHS Data...

  10. 75 FR 8087 - DHS Data Privacy and Integrity Advisory Committee

    Science.gov (United States)

    2010-02-23

    ... the words ``Department of Homeland Security Data Privacy and Integrity Advisory Committee'' and the... DEPARTMENT OF HOMELAND SECURITY Office of the Secretary [Docket No. DHS-2010-0009] DHS Data... Committee Meeting. SUMMARY: The DHS Data Privacy and Integrity Advisory Committee will meet on March 18...

  11. 78 FR 75930 - DHS Data Privacy and Integrity Advisory Committee

    Science.gov (United States)

    2013-12-13

    ... DEPARTMENT OF HOMELAND SECURITY Office of the Secretary [Docket No. DHS-2013-0080] DHS Data... of Federal Advisory Committee Meeting. SUMMARY: The DHS Data Privacy and Integrity Advisory Committee... DHS Data Privacy and Integrity Advisory Committee will meet on Thursday, January 30, 2014, from 2:00 p...

  12. 76 FR 58524 - DHS Data Privacy and Integrity Advisory Committee

    Science.gov (United States)

    2011-09-21

    ... ``Department of Homeland Security Data Privacy and Integrity Advisory Committee'' and the Docket Number (DHS... DEPARTMENT OF HOMELAND SECURITY Office of the Secretary [Docket No. DHS-2011-0076] DHS Data... of Federal Advisory Committee Meeting. SUMMARY: The DHS Data Privacy and Integrity Advisory Committee...

  13. 76 FR 35459 - DHS Data Privacy and Integrity Advisory Committee

    Science.gov (United States)

    2011-06-17

    ... of Homeland Security Data Privacy and Integrity Advisory Committee'' and the Docket Number (DHS-2011... DEPARTMENT OF HOMELAND SECURITY Office of the Secretary [Docket No. DHS-2011-0046] DHS Data... of Federal Advisory Committee Meeting. SUMMARY: The DHS Data Privacy and Integrity Advisory Committee...

  14. 76 FR 70464 - DHS Data Privacy and Integrity Advisory Committee

    Science.gov (United States)

    2011-11-14

    ... of Homeland Security Data Privacy and Integrity Advisory Committee'' and the Docket Number (DHS-2011... DEPARTMENT OF HOMELAND SECURITY Office of the Secretary [Docket No. DHS-2011-0105] DHS Data... of Federal Advisory Committee Meeting. SUMMARY: The DHS Data Privacy and Integrity Advisory Committee...

  15. 76 FR 52320 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2011-08-22

    ... & Privacy, and DoD Information Assurance Regulations. Auditing: Audit trail records from all available.../JS Privacy Office, Freedom of Information Directorate, Washington Headquarters Services, 1155 Defense... Defense. DHA 23 System name: Pharmacy Data Transaction Service (PDTS). System location: Primary: Emdeon...

  16. 78 FR 21600 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2013-04-11

    ... DEPARTMENT OF DEFENSE Office of the Secretary [Docket ID: DoD-2013-OS-0050] Privacy Act of 1974... notice in its existing inventory of record systems subject to the Privacy Act of 1974 (5 U.S.C. 552a), as... members of the public is to make these submissions available for public viewing on the Internet at http...

  17. 76 FR 10010 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2011-02-23

    ... DEPARTMENT OF DEFENSE Office of the Secretary [Docket ID: DOD-2011-OS-0020] Privacy Act of 1974... inventory of records systems subject to the Privacy Act of 1974 (5 U.S.C. 552a), as amended. DATES: This... the public is to make these submissions available for public viewing on the Internet at http://www...

  18. 78 FR 52517 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2013-08-23

    ... DEPARTMENT OF DEFENSE Office of the Secretary [Docket ID DoD-2013-OS-0183] Privacy Act of 1974... systems subject to the Privacy Act of 1974 (5 U.S.C. 552a), as amended. DATES: This proposed action will... public is to make these submissions available for public viewing on the Internet at http://www...

  19. 76 FR 53420 - Privacy Act of 1974; Systems of Records

    Science.gov (United States)

    2011-08-26

    ... DEPARTMENT OF DEFENSE Office of the Secretary [Docket ID: DOD-2011-OS-0097] Privacy Act of 1974... notice in its existing inventory of records systems subject to the Privacy Act of 1974, (5 U.S.C. 552a... submissions available for public viewing on the Internet at http://www.regulations.gov as they are [[Page...

  20. 76 FR 11213 - Privacy Act of 1974; Systems of Records

    Science.gov (United States)

    2011-03-01

    ... DEPARTMENT OF DEFENSE Office of the Secretary [Docket ID DOD-2011-OS-0017] Privacy Act of 1974... inventory of records systems subject to the Privacy Act of 1974 (5 U.S.C. 552a), as amended. DATES: This... public is of make these submissions available for public viewing on the Internet at http://www...

  1. 77 FR 37002 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2012-06-20

    ... DEPARTMENT OF DEFENSE Office of the Secretary [Docket ID: DOD-2012-OS-0072] Privacy Act of 1974... inventory of record systems subject to the Privacy Act of 1974 (5 U.S.C. 552a), as amended. DATES: This... available for public viewing on the Internet at http://www.regulations.gov as they are received without...

  2. 76 FR 43993 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2011-07-22

    ... DEPARTMENT OF DEFENSE Office of the Secretary [Docket ID: DOD-2011-OS-0081] Privacy Act of 1974... the Privacy Act of 1974, (5 U.S.C. 552a), as amended. DATES: This proposed action would be effective... the public is to make these submissions available for public viewing on the Internet at http://www...

  3. 75 FR 39921 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2010-07-13

    ... DEPARTMENT OF DEFENSE Office of the Secretary [Docket ID: DOD-2010-OS-0102] Privacy Act of 1974... inventory of records systems subject to the Privacy Act of 1974, (5 U.S.C. 552a), as amended. DATES: This... on the Internet at http://www.regulations.gov as they are received without change, including any...

  4. 75 FR 17910 - Privacy Act of 1974; Systems of Records

    Science.gov (United States)

    2010-04-08

    ... DEPARTMENT OF DEFENSE Office of the Secretary [Docket ID: DOD-2010-OS-0040] Privacy Act of 1974... inventory of records systems subject to the Privacy Act of 1974, (5 U.S.C. 552a), as amended. DATES: This... viewing on the Internet at http://www.regulations.gov as they are received without change, including any...

  5. 76 FR 10008 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2011-02-23

    ... DEPARTMENT OF DEFENSE Office of the Secretary [Docket ID: DOD-2011-OS-0023] Privacy Act of 1974... inventory of record systems subject to the Privacy Act of 1974, (5 U.S.C. 552a), as amended. DATES: This... from members of the public is to make these submissions available for public viewing on the Internet at...

  6. 76 FR 66698 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2011-10-27

    ... DEPARTMENT OF DEFENSE Office of the Secretary [Docket ID: DOD-2011-OS-0117] Privacy Act of 1974... notice from its existing inventory of record systems subject to the Privacy Act of 1974, (5 U.S.C. 552a... submissions available for public viewing on the Internet at http://www.regulations.gov as they are received...

  7. 75 FR 52517 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2010-08-26

    ... DEPARTMENT OF DEFENSE Office of the Secretary [Docket ID DOD-2010-OS-0117] Privacy Act of 1974... existing inventory of record systems subject to the Privacy Act of 1974, (5 U.S.C. 552a), as amended. DATES... available for public viewing on the Internet at http://www.regulations.gov as they are received without...

  8. 75 FR 33789 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2010-06-15

    ... DEPARTMENT OF DEFENSE Office of the Secretary [Docket ID: DOD-2010-OS-0078] Privacy Act of 1974... existing inventory of record systems subject to the Privacy Act of 1974, (5 U.S.C. 552a), as amended. DATES... on the Internet at http://www.regulations.gov as they are received without change, including any...

  9. 78 FR 31905 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2013-05-28

    ... DEPARTMENT OF DEFENSE Office of the Secretary [Docket ID: DoD-2013-OS-0110] Privacy Act of 1974... notice in its existing inventory of record systems subject to the Privacy Act of 1974 (5 U.S.C. 552a), as... members of the public is to make these submissions available for public viewing on the Internet at http...

  10. 76 FR 45543 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2011-07-29

    ... DEPARTMENT OF DEFENSE Office of the Secretary [Docket ID: DOD-2011-OS-0082] Privacy Act of 1974... subject to the Privacy Act of 1974, (5 U.S.C. 552a), as amended. DATES: This proposed action will be... the public is to make these submissions available for public viewing on the Internet at http://www...

  11. 77 FR 65539 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2012-10-29

    ... DEPARTMENT OF DEFENSE Office of the Secretary [Docket ID: DoD-2012-OS-0132] Privacy Act of 1974... existing inventory of record systems subject to the Privacy Act of 1974 (5 U.S.C. 552a), as amended. [[Page... Internet at http://www.regulations.gov as they are received without change, including any personal...

  12. 76 FR 70428 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2011-11-14

    ... DEPARTMENT OF DEFENSE Office of the Secretary [Docket ID: DOD-2011-OS-0120] Privacy Act of 1974... notice from its existing inventory of record systems subject to the Privacy Act of 1974, (5 U.S.C. 552a... submissions available for public viewing on the Internet at http://www.regulations.gov as they are received...

  13. 76 FR 62394 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2011-10-07

    ... DEPARTMENT OF DEFENSE Office of the Secretary [Docket ID: DOD-2011-OS-0109] Privacy Act of 1974... notice from its existing inventory of record systems subject to the Privacy Act of 1974 (5 U.S.C. 552a... public is to make these submissions available for public viewing on the Internet at http://www...

  14. 75 FR 10476 - Privacy Act of 1974; Systems of Records

    Science.gov (United States)

    2010-03-08

    ... DEPARTMENT OF DEFENSE Office of the Secretary [Docket ID DOD-2010-OS-0021] Privacy Act of 1974... inventory of records systems subject to the Privacy Act of 1974, (5 U.S.C. 552a), as amended. DATES: This... on the Internet at http://www.regulations.gov as they are received without change, including any...

  15. 76 FR 1409 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2011-01-10

    ... DEPARTMENT OF DEFENSE Office of the Secretary [Docket ID: DOD-2011-OS-0001] Privacy Act of 1974... inventory of record systems subject to the Privacy Act of 1974, (5 U.S.C. 552a), as amended. DATES: This... from members of the public is to make these submissions available for public viewing on the Internet at...

  16. 75 FR 81247 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2010-12-27

    ... DEPARTMENT OF DEFENSE Office of the Secretary [Docket ID DOD-2010-OS-0168] Privacy Act of 1974... inventory of records systems subject to the Privacy Act of 1974, (5 U.S.C. 552a), as amended. DATES: This... public is to make these submissions available for public viewing on the Internet at http://www...

  17. 76 FR 22682 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2011-04-22

    ... DEPARTMENT OF DEFENSE Office of the Secretary [Docket ID DOD-2011-OS-0044] Privacy Act of 1974... inventory of record systems subject to the Privacy Act of 1974, (5 U.S.C. 552a), as amended. DATES: This... from members of the public is to make these submissions available for public viewing on the Internet at...

  18. 75 FR 29728 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2010-05-27

    ... DEPARTMENT OF DEFENSE Office of the Secretary [Docket ID: DOD-2010-OS-0067] Privacy Act of 1974... existing inventory of record systems subject to the Privacy Act of 1974, (5 U.S.C. 552a), as amended. DATES... on the Internet at http://www.regulations.gov as they are received without change, including any...

  19. 78 FR 6078 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2013-01-29

    ... DEPARTMENT OF DEFENSE Office of the Secretary [Docket ID: DoD-2013-OS-0011] Privacy Act of 1974... record systems subject to the Privacy Act of 1974 (5 U.S.C. 552a), as amended. DATES: This proposed... public is to make these submissions available for public viewing on the Internet at http:// [[Page 6079...

  20. 77 FR 37885 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2012-06-25

    ... DEPARTMENT OF DEFENSE Office of the Secretary [Docket ID DOD-2012-OS-0074] Privacy Act of 1974... existing inventory of record systems subject to the Privacy Act of 1974 (5 U.S.C. 552a), as amended. DATES... available for public viewing on the Internet at http://www.regulations.gov as they are received without...

  1. 78 FR 60265 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2013-10-01

    ... DEPARTMENT OF DEFENSE Office of the Secretary [Docket ID DoD-2013-OS-0201] Privacy Act of 1974... inventory of record systems subject to the Privacy Act of 1974, as amended. DATES: This proposed action will... submissions available for public viewing on the Internet at http://www.regulations.gov as they are received...

  2. 75 FR 16760 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2010-04-02

    ... DEPARTMENT OF DEFENSE Office of the Secretary [Docket ID: DOD-2010-OS-0037] Privacy Act of 1974... inventory of record systems subject to the Privacy Act of 1974 (5 U.S.C. 552a), as amended. DATES: This... on the Internet at http://www.regulations.gov as they are received without change, including any...

  3. 78 FR 5788 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2013-01-28

    ... DEPARTMENT OF DEFENSE Office of the Secretary [Docket ID: DoD-2013-OS-0005] Privacy Act of 1974... of record systems subject to the Privacy Act of 1974 (5 U.S.C. 552a), as amended. DATES: This... of the public is to make these submissions available for public viewing on the Internet at http://www...

  4. 77 FR 60400 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2012-10-03

    ... DEPARTMENT OF DEFENSE Office of the Secretary [Docket ID DOD-2012-OS-0119] Privacy Act of 1974... inventory of record systems subject to the Privacy Act of 1974, (5 U.S.C. 552a(r)), as amended. DATES: This... public is to make these submissions available for public viewing on the Internet at http://www...

  5. 75 FR 33788 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2010-06-15

    ... DEPARTMENT OF DEFENSE Office of the Secretary [Docket ID: DOD-2010-OS-0077] Privacy Act of 1974... existing inventory of record systems subject to the Privacy Act of 1974, (5 U.S.C. 552a), as amended. DATES... on the Internet at http:// [[Page 33789

  6. 75 FR 15694 - Privacy Act of 1974; Systems of Records

    Science.gov (United States)

    2010-03-30

    ... DEPARTMENT OF DEFENSE Office of the Secretary [Docket ID: DOD-2010-OS-0035] Privacy Act of 1974... inventory of records systems subject to the Privacy Act of 1974, (5 U.S.C. 552a), as amended. DATES: This... on the Internet at http://www.regulations.gov as they are received without change, including any...

  7. 75 FR 65456 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2010-10-25

    ... DEPARTMENT OF DEFENSE Office of the Secretary [Docket ID: DOD-2010-OS-0147] Privacy Act of 1974... existing inventory of record systems subject to the Privacy Act of 1974 (5 U.S.C. 552a), as amended. [[Page... available for public viewing on the Internet at http://www.regulations.gov as they are received without...

  8. 77 FR 26260 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2012-05-03

    ... DEPARTMENT OF DEFENSE Office of the Secretary [Docket ID DoD-2012-OS-0030] Privacy Act of 1974... inventory of records systems subject to the Privacy Act of 1974, (5 U.S.C. 552a), as amended. DATES: This... make these submissions available for public viewing on the Internet at http://www.regulations.gov as...

  9. 77 FR 66442 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2012-11-05

    ... DEPARTMENT OF DEFENSE Office of the Secretary [Docket ID: DoD-2012-OS-0133] Privacy Act of 1974... existing inventory of record systems subject to the Privacy Act of 1974 (5 U.S.C. 552a), as amended. DATES... Internet at http://www.regulations.gov as they are received without change, including any personal...

  10. 78 FR 14279 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2013-03-05

    ... DEPARTMENT OF DEFENSE Office of the Secretary [Docket ID DoD-2013-OS-0040] Privacy Act of 1974... of record systems subject to the Privacy Act of 1974 (5 U.S.C. 552a), as amended. DATES: This... of the public is to make these submissions available for public viewing on the Internet at http://www...

  11. 78 FR 14273 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2013-03-05

    ... DEPARTMENT OF DEFENSE Office of the Secretary [Docket ID DoD-2013-OS-0019] Privacy Act of 1974... record systems subject to the Privacy Act of 1974 (5 U.S.C. 552a), as amended. DATES: This proposed... public is to make these submissions available for public viewing on the Internet at http://www...

  12. 75 FR 3714 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2010-01-22

    ... DEPARTMENT OF DEFENSE Office of the Secretary [Docket ID: DOD-2010-OS-0004] Privacy Act of 1974... its existing inventory of record systems subject to the Privacy Act of 1974, (5 U.S.C. 552a), as... available for public viewing on the Internet at http://www.regulations.gov as they are received without...

  13. 76 FR 28002 - Privacy Act of 1974; Systems of Records

    Science.gov (United States)

    2011-05-13

    ... DEPARTMENT OF DEFENSE Office of the Secretary [Docket ID: DOD-2011-OS-0052] Privacy Act of 1974... existing inventory of records systems subject to the Privacy Act of 1974 (5 U.S.C. 552a), as amended. DATES... the public is to make these submissions available for public viewing on the Internet at http://www...

  14. 77 FR 35945 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2012-06-15

    ... DEPARTMENT OF DEFENSE Office of the Secretary [Docket ID: DOD-2012-OS-0067] Privacy Act of 1974... systems subject to the Privacy Act of 1974 (5 U.S.C. 552a), as amended. DATES: The proposed action will be... Internet at http://www.regulations.gov as they are received without change, including any personal...

  15. 75 FR 62111 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2010-10-07

    ... DEPARTMENT OF DEFENSE Office of the Secretary [Docket ID: DOD-2010-OS-0140] Privacy Act of 1974... records notices in its existing inventory of record systems subject to the Privacy Act of 1974, (5 U.S.C... submissions available for public viewing on the Internet at http://www.regulations.gov as they are received...

  16. 78 FR 22525 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2013-04-16

    ... DEPARTMENT OF DEFENSE Office of the Secretary [Docket ID: DoD-2013-0057] Privacy Act of 1974... systems subject to the Privacy Act of 1974 (5 U.S.C. 552a), as amended. DATES: This proposed action will... submissions available for public viewing on the Internet at http://www.regulations.gov as they are received...

  17. 78 FR 69076 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2013-11-18

    ... Medical Human Resources System internet (DMHRSi). DHA 12 EDHA 12 Third Party Collection System. DHA 16 DoD... DEPARTMENT OF DEFENSE Office of the Secretary [Docket ID: DoD-2013-OS-0216] Privacy Act of 1974... Defense Health Agency's compilation of Privacy Act SORNS. The realignment of the nineteen system...

  18. 46 CFR 14.105 - Disclosure and privacy.

    Science.gov (United States)

    2010-10-01

    ... 46 Shipping 1 2010-10-01 2010-10-01 false Disclosure and privacy. 14.105 Section 14.105 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY MERCHANT MARINE OFFICERS AND SEAMEN SHIPMENT AND DISCHARGE OF MERCHANT MARINERS General § 14.105 Disclosure and privacy. The Coast Guard makes information...

  19. 78 FR 15731 - Privacy Act of 1974; Computer Matching Program

    Science.gov (United States)

    2013-03-12

    ... DEPARTMENT OF HOMELAND SECURITY Office of the Secretary [Docket No. DHS-2013-0011] Privacy Act of 1974; Computer Matching Program AGENCY: Department of Homeland Security/U.S. Citizenship and... amended by the Computer Matching and Privacy Protection Act of 1988 (Pub. L. 100-503) and the Computer...

  20. 77 FR 61402 - Notice of Submission for OMB Review; Office of Postsecondary Education; Survey of Post-Graduate...

    Science.gov (United States)

    2012-10-09

    ... Collection Clearance Division, Privacy, Information and Records Management Services, Office of Management, publishes this notice containing proposed information collection requests at the beginning of the... Division, Privacy, Information and Records Management Services, Office of Management. [FR Doc. 2012-24789...

  1. 75 FR 36535 - Freedom of Information Act, Privacy Act of 1974; Implementation

    Science.gov (United States)

    2010-06-28

    ... DEPARTMENT OF THE TREASURY Office of the Secretary 31 CFR Part 1 Freedom of Information Act... Freedom of Information Act (FOIA) and its regulations concerning the Privacy Act of 1974 (Privacy Act). It... correct those errors. List of Subjects in 31 CFR Part 1 Freedom of Information; Privacy. 0 Accordingly...

  2. 75 FR 68852 - Privacy Act of 1974; System of Records Notice

    Science.gov (United States)

    2010-11-09

    ...., Washington, DC 20590 or [email protected] . FOR FURTHER INFORMATION CONTACT: For privacy issues please... DEPARTMENT OF TRANSPORTATION Office of the Secretary Privacy Act of 1974; System of Records Notice... Secretary of Transportation (DOT/OST) proposes to establish a DOT-wide system of records under the Privacy...

  3. 77 FR 70795 - Privacy Act of 1974; Retirement of Department of Homeland Security Transportation Security...

    Science.gov (United States)

    2012-11-27

    ... 20598-6036; email: [email protected] . For privacy issues please contact: Jonathan Cantor, (202-343... DEPARTMENT OF HOMELAND SECURITY Office of the Secretary Privacy Act of 1974; Retirement of Department of Homeland Security Transportation Security Administration System of Records AGENCY: Privacy...

  4. 77 FR 25686 - Announcing an Open Meeting of the Information Security and Privacy Advisory Board

    Science.gov (United States)

    2012-05-01

    ... Director of the Office of Management and Budget, and the Director of NIST on security and privacy issues... of the Information Security and Privacy Advisory Board AGENCY: National Institute of Standards and Technology, Commerce. ACTION: Notice. SUMMARY: The Information Security and Privacy Advisory Board (ISPAB...

  5. 77 FR 30433 - Privacy Act of 1974: Implementation of Exemptions; Automated Targeting System

    Science.gov (United States)

    2012-05-23

    ... Border Protection, Mint Annex, 799 Ninth Street NW., Washington, DC 20229. For privacy issues please... Secretary 6 CFR Part 5 [Docket No. DHS-2012-0020] Privacy Act of 1974: Implementation of Exemptions; Automated Targeting System AGENCY: Privacy Office, DHS. ACTION: Notice of proposed rulemaking. SUMMARY: The...

  6. 77 FR 70792 - Privacy Act of 1974; Retirement of Department of Homeland Security Transportation Security...

    Science.gov (United States)

    2012-11-27

    ..., VA 20598-6036; email: [email protected] . For privacy issues please contact: Jonathan R. Cantor... DEPARTMENT OF HOMELAND SECURITY Office of the Secretary Privacy Act of 1974; Retirement of Department of Homeland Security Transportation Security Administration System of Records AGENCY: Privacy...

  7. 75 FR 7978 - Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security Transportation...

    Science.gov (United States)

    2010-02-23

    ... Security Administration, 601 South 12th Street, Arlington, VA 20598-6036. For privacy issues please contact... Secretary 6 CFR Part 5 [Docket No. DHS-2009-0137] Privacy Act of 1974: Implementation of Exemptions... Program System of Records AGENCY: Privacy Office, DHS. ACTION: Notice of proposed rulemaking. SUMMARY: The...

  8. 77 FR 61571 - Membership of the Departmental Performance Review Board

    Science.gov (United States)

    2012-10-10

    ... Geovette E. Washington, Deputy General Counsel Office of the Chief Financial Officer and Assistant..., Chief Financial Officer and Director for Administration Economics and Development Administration Thomas Guevara, Deputy Assistant Secretary for Regional Affairs Sandra Walters, Chief Financial Officer and...

  9. 78 FR 69367 - Membership of the Departmental Performance Review Board

    Science.gov (United States)

    2013-11-19

    ..., Chief Counsel for Economic Affairs Office of the Chief Financial Officer and Assistant Secretary for..., Associate Director for Administration and Chief Financial Officer Economics and Development Administration... Telecommunications and Information Administration Leonard M. Bechtel, Chief Financial Officer and Director for...

  10. 77 FR 77049 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2012-12-31

    ..., Air Force Privacy Act Office, Office of Warfighting Integration and Chief Information officer, ATTN... of 1974 (5 U.S.C. 552a), as amended, which requires the submission of a new or altered system report...). Reason The Innovative Development through Employee Awareness (IDEA) Program Data System (IPDS) has been...

  11. 75 FR 54331 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2010-09-07

    ... Administrator of the Office of Information and Regulatory Affairs, Office of Management and Budget (OMB), on..., Academic Competitiveness Grants (ACG), National Science and Mathematics Access to Retain Talent (National... Privacy Act Advice Disclosure. The Department may disclose records to the DOJ or the Office of Management...

  12. 78 FR 65620 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2013-11-01

    ..., as required by 5 U.S.C. 552a(r) of the Privacy Act of 1974, as amended, was submitted on March 18... support officer assignment, planning, programming, accounting, promotions, career development, and...

  13. 78 FR 38303 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2013-06-26

    .... FOR FURTHER INFORMATION CONTACT: Mr. Leroy Jones, Department of the Army, Privacy Office, U.S. Army.../army/index.html . The Department of the Army proposes to amend two systems of records notices in its...

  14. Is Electronic Privacy Achievable?

    National Research Council Canada - National Science Library

    Irvine, Cynthia E; Levin, Timothy E

    2000-01-01

    ... individuals. The purpose of this panel was to focus on how new technologies are affecting privacy. Technologies that might adversely affect privacy were identified by Rein Turn at previous symposia...

  15. Privacy and Innovation

    OpenAIRE

    Avi Goldfarb; Catherine Tucker

    2011-01-01

    Information and communication technology now enables firms to collect detailed and potentially intrusive data about their customers both easily and cheaply. This means that privacy concerns are no longer limited to government surveillance and public figures' private lives. The empirical literature on privacy regulation shows that privacy regulation may affect the extent and direction of data-based innovation. We also show that the impact of privacy regulation can be extremely heterogeneous. T...

  16. Neuroethics and Brain Privacy

    DEFF Research Database (Denmark)

    Ryberg, Jesper

    2017-01-01

    An introduction is presented in which editor discusses various articles within the issue on topics including ethical challenges with importance of privacy for well-being, impact of brain-reading on mind privacy and neurotechnology.......An introduction is presented in which editor discusses various articles within the issue on topics including ethical challenges with importance of privacy for well-being, impact of brain-reading on mind privacy and neurotechnology....

  17. Privacy and internet services

    OpenAIRE

    Samec, Marek

    2010-01-01

    This thesis is focused on internet services user privacy. Goal of this thesis is to determine level of user awareness of how is their privacy approached while using internet services. Then suggest procedure to improve this awareness, or that will lead to better control of individual privacy. In theoretical part I analyze general and legislative approach to privacy, followed by analysis of behaviour of internet service users and providers. Part of this analysis deals with usage of web cookies ...

  18. Internet and Privacy

    OpenAIRE

    Al-Fadhli, Meshal Shehab

    2007-01-01

    The concept of privacy is hard to understand and is not easy to define, because this concept is linked with several dimensions. Internet Privacy is associated with the use of the Internet and most likely appointed under communications privacy, involving the user of the Internet’s personal information and activities, and the disclosure of them online. This essay is going to present the meaning of privacy and the implications of it for Internet users. Also, this essay will demonstrate some of t...

  19. Privacy and Library Records

    Science.gov (United States)

    Bowers, Stacey L.

    2006-01-01

    This paper summarizes the history of privacy as it relates to library records. It commences with a discussion of how the concept of privacy first originated through case law and follows the concept of privacy as it has affected library records through current day and the "USA PATRIOT Act."

  20. Privacy Verification Using Ontologies

    NARCIS (Netherlands)

    Kost, Martin; Freytag, Johann-Christoph; Kargl, Frank; Kung, Antonio

    2011-01-01

    As information systems extensively exchange information between participants, privacy concerns may arise from its potential misuse. A Privacy by Design (PbD) approach considers privacy requirements of different stakeholders during the design and the implementation of a system. Currently, a

  1. 75 FR 56503 - Membership of the Departmental Performance Review Board

    Science.gov (United States)

    2010-09-16

    .... Washington, Deputy General Counsel Chief Financial Officer and Assistant Secretary for Administration... Walters, Chief Financial Officer and Director of Administration International Trade Administration... National Oceanic and Atmospheric Administration: Robert J. Byrd, Chief Financial Officer/Chief...

  2. Privacy encounters in Teledialogue

    DEFF Research Database (Denmark)

    Andersen, Lars Bo; Bøge, Ask Risom; Danholt, Peter

    2017-01-01

    Privacy is a major concern when new technologies are introduced between public authorities and private citizens. What is meant by privacy, however, is often unclear and contested. Accordingly, this article utilises grounded theory to study privacy empirically in the research and design project...... Teledialogue aimed at introducing new ways for public case managers and placed children to communicate through IT. The resulting argument is that privacy can be understood as an encounter, that is, as something that arises between implicated actors and entails some degree of friction and negotiation....... An argument which is further qualified through the philosophy of Gilles Deleuze. The article opens with a review of privacy literature before continuing to present privacy as an encounter with five different foci: what technologies bring into the encounter; who is related to privacy by implication; what...

  3. Choose Privacy Week: Educate Your Students (and Yourself) about Privacy

    Science.gov (United States)

    Adams, Helen R.

    2016-01-01

    The purpose of "Choose Privacy Week" is to encourage a national conversation to raise awareness of the growing threats to personal privacy online and in day-to-day life. The 2016 Choose Privacy Week theme is "respecting individuals' privacy," with an emphasis on minors' privacy. A plethora of issues relating to minors' privacy…

  4. 75 FR 63703 - Privacy Act of 1974; Privacy Act Regulation

    Science.gov (United States)

    2010-10-18

    ... FEDERAL RESERVE SYSTEM 12 CFR Part 261a [Docket No. R-1313] Privacy Act of 1974; Privacy Act... implementing the Privacy Act of 1974 (Privacy Act). The primary changes concern the waiver of copying fees... records under the Privacy Act; the amendment of special procedures for the release of medical records to...

  5. A Taxonomy of Privacy Constructs for Privacy-Sensitive Robotics

    OpenAIRE

    Rueben, Matthew; Grimm, Cindy M.; Bernieri, Frank J.; Smart, William D.

    2017-01-01

    The introduction of robots into our society will also introduce new concerns about personal privacy. In order to study these concerns, we must do human-subject experiments that involve measuring privacy-relevant constructs. This paper presents a taxonomy of privacy constructs based on a review of the privacy literature. Future work in operationalizing privacy constructs for HRI studies is also discussed.

  6. 76 FR 54196 - Membership of the Departmental Performance Review Board

    Science.gov (United States)

    2011-08-31

    .... Chief Financial Officer and Assistant Secretary for Administration, William J. Fleming, Director for... Assistant Secretary for Regional Affairs, Sandra Walters, Chief Financial Officer and Director of..., Robert J. Byrd, Chief Financial Officer/Chief Administrative Officer, NWS, Joseph, F. Klimavicz, Chief...

  7. Elementary Teachers' Experiences of Departmentalized Instruction and Its Impact on Student Affect

    Science.gov (United States)

    Minott, Robert Charles

    2016-01-01

    The purpose of this qualitative dissertation was to explore the lived experiences of departmentalized elementary teachers, Grades 1-3, and how they addressed their students' affective needs. The main research question of the study was how do elementary school teachers perceive departmentalized instruction and describe their experiences of this…

  8. The Effect of Departmentalization on the Reading Achievement of Sixth-Grade Students.

    Science.gov (United States)

    Harris, Mary B.

    A study examined whether departmentalization affected the reading achievement of sixth-grade students attending a Chicago public school. A random sample of 30 students was chosen from a group of 53 who received instruction in a departmentalized program. A second random sample of 30 was selected from a total of 54 students who received instruction…

  9. Elementary Teachers' Experiences and Perceptions of Departmentalized Instruction: A Case Study

    Science.gov (United States)

    Strohl, Alecia; Schmertzing, Lorraine; Schmertzing, Richard

    2014-01-01

    This case study investigated elementary teachers' experiences and perceptions during a trial year of departmentalized instruction in a rural south Georgia elementary school. To inform their decision about whole-school departmentalization for the future, school administrators appointed twelve first through third grade teachers to pilot the…

  10. The Benefits of Departmentalization in Upper Elementary Grades for Students and Teachers

    Science.gov (United States)

    Johnson, Malissa Lee

    2013-01-01

    This study addressed the benefits of departmentalization in upper elementary grades for students and teachers. The variables of gender and classroom structure (departmentalized versus self-contained) were considered for student participants (n = 125). Results for students were evaluated on pre-test and post-test data using the following measures:…

  11. 22 CFR 161.12 - Environmental effects abroad of major departmental actions.

    Science.gov (United States)

    2010-04-01

    ... 22 Foreign Relations 1 2010-04-01 2010-04-01 false Environmental effects abroad of major... Requirements of NEPA § 161.12 Environmental effects abroad of major departmental actions. Departmental officials shall analyze actions under their cognizance with due regard for the environmental effects in the...

  12. 41 CFR 128-1.5007 - Reproduction of departmental and bureau seals.

    Science.gov (United States)

    2010-07-01

    ... 41 Public Contracts and Property Management 3 2010-07-01 2010-07-01 false Reproduction of departmental and bureau seals. 128-1.5007 Section 128-1.5007 Public Contracts and Property Management Federal... and Responsibilities for Personal Property Management § 128-1.5007 Reproduction of departmental and...

  13. 76 FR 65196 - Privacy Act of 1974; Report of a New Routine Use for Selected CMS System of Records

    Science.gov (United States)

    2011-10-20

    ... and privacy requirements included. A Data Use Agreement (DUA) (CMS Form 0235) must be completed by the...: CMS Privacy Officer, Division of Information Security & Privacy Management, Enterprise Architecture... requirements that she may specify for QEs to meet, such as ensuring the security of data. The Medicare claims...

  14. 76 FR 72428 - Privacy Act of 1974; Department of Homeland Security/ALL-017 General Legal Records System of Records

    Science.gov (United States)

    2011-11-23

    ... http://www.regulations.gov . FOR FURTHER INFORMATION CONTACT: For general questions and privacy issues... DEPARTMENT OF HOMELAND SECURITY Office of the Secretary [Docket No. DHS-2011-0094] Privacy Act of 1974; Department of Homeland Security/ALL--017 General Legal Records System of Records AGENCY: Privacy...

  15. 78 FR 4079 - Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security U.S. Customs...

    Science.gov (United States)

    2013-01-18

    ... Ninth Street NW., Washington, DC 20229. For privacy issues please contact: Jonathan R. Cantor (202-343... Secretary 6 CFR Part 5 [Docket No. DHS 2012-0076] Privacy Act of 1974: Implementation of Exemptions...), System of Records AGENCY: Privacy Office, DHS. ACTION: Notice of proposed rulemaking. SUMMARY: The...

  16. Flexibility First, Then Standardize: A Strategy for Growing Inter-Departmental Systems.

    Science.gov (United States)

    á Torkilsheyggi, Arnvør

    2015-01-01

    Any attempt to use IT to standardize work practices faces the challenge of finding a balance between standardization and flexibility. In implementing electronic whiteboards with the goal of standardizing inter-departmental practices, a hospital in Denmark chose to follow the strategy of "flexibility first, then standardization." To improve the local grounding of the system, they first focused on flexibility by configuring the whiteboards to support intra-departmental practices. Subsequently, they focused on standardization by using the white-boards to negotiate standardization of inter-departmental practices. This paper investigates the chosen strategy and finds: that super users on many wards managed to configure the whiteboard to support intra-departmental practices; that initiatives to standardize inter-departmental practices improved coordination of certain processes; and that the chosen strategy posed a challenge for finding the right time and manner to shift the balance from flexibility to standardization.

  17. Designing Privacy for You : A User Centric Approach For Privacy

    OpenAIRE

    Senarath, Awanthika; Arachchilage, Nalin A. G.; Slay, Jill

    2017-01-01

    Privacy directly concerns the user as the data owner (data- subject) and hence privacy in systems should be implemented in a manner which concerns the user (user-centered). There are many concepts and guidelines that support development of privacy and embedding privacy into systems. However, none of them approaches privacy in a user- centered manner. Through this research we propose a framework that would enable developers and designers to grasp privacy in a user-centered manner and implement...

  18. 77 FR 41774 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2012-07-16

    ... DEPARTMENT OF EDUCATION Privacy Act of 1974; System of Records AGENCY: Office of Management...-19176 (April 12, 2004). Electronic Access to This Document: The official version of this document is the... Assistant Secretary of the Office of Management deletes the following system of records: System No. System...

  19. 76 FR 61761 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2011-10-05

    ... locations to grocery or drug stores, office supply stores, retail chains, and self-service kiosks. By... and to the Office of Management and Budget for their evaluation. The Postal Service does not expect this amended notice to have any adverse effect on individual privacy rights. The Postal Service...

  20. 75 FR 77849 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2010-12-14

    ... Agency, Defense Threat Reduction Agency, Missile Defense Organization, Pentagon Force Protection Agency... DEPARTMENT OF DEFENSE Office of the Secretary [Docket ID: DOD-2010-OS-0160] Privacy Act of 1974; System of Records AGENCY: Office of the Secretary of Defense, DoD. ACTION: Notice to add a system of...

  1. 77 FR 31606 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2012-05-29

    ... DEPARTMENT OF EDUCATION Privacy Act of 1974; System of Records AGENCY: Office of English Language Acquisition, Language Enhancement and Academic Achievement for Limited English Proficient Students, Department... Secretary of the Office of English Language Acquisition deletes the following system of records: System...

  2. 78 FR 74122 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2013-12-10

    .... Shedrick, Department of the Air Force, Air Force Privacy Office, Office of Warfighting Integration and... funds employees who are required to operate a government motor vehicle on or off post.'' Categories of... adding new driver's information to the database or updating existing records in the performance of their...

  3. 76 FR 81910 - Abolishment of Privacy Act System of Records

    Science.gov (United States)

    2011-12-29

    ... Program Manager, USDA, Forest Service, Office of Safety and Occupational and Health, 1400 Independence... Management Handbook (FSH) 6209.11. This system is abolished and removed from the inventory of the USDA System... DEPARTMENT OF AGRICULTURE Office of the Secretary Abolishment of Privacy Act System of Records...

  4. Regulating Online Data Privacy

    OpenAIRE

    Paul Reid

    2004-01-01

    With existing data protection laws proving inadequate in the fight to protect online data privacy and with the offline law of privacy in a state of change and uncertainty, the search for an alternative solution to the important problem of online data privacy should commence. With the inherent problem of jurisdiction that the Internet presents, such a solution is best coming from a multi-national body with the power to approximate laws in as many jurisdictions as possible, with a recognised au...

  5. Protecting genetic privacy.

    Science.gov (United States)

    Roche, P A; Annas, G J

    2001-05-01

    This article outlines the arguments for and against new rules to protect genetic privacy. We explain why genetic information is different to other sensitive medical information, why researchers and biotechnology companies have opposed new rules to protect genetic privacy (and favour anti-discrimination laws instead), and discuss what can be done to protect privacy in relation to genetic-sequence information and to DNA samples themselves.

  6. Privacy driven internet ecosystem

    OpenAIRE

    Trinh, Tuan Anh; Gyarmati, Laszlo

    2012-01-01

    The dominant business model of today's Internet is built upon advertisements; users can access Internet services while the providers show ads to them. Although significant efforts have been made to model and analyze the economic aspects of this ecosystem, the heart of the current status quo, namely privacy, has not received the attention of the research community yet. Accordingly, we propose an economic model of the privacy driven Internet ecosystem where privacy is handled as an asset that c...

  7. Privacy in domestic environments

    OpenAIRE

    Radics, Peter J; Gracanin, Denis

    2011-01-01

    non-peer-reviewed While there is a growing body of research on privacy,most of the work puts the focus on information privacy. Physical and psychological privacy issues receive little to no attention. However, the introduction of technology into our lives can cause problems with regard to these aspects of privacy. This is especially true when it comes to our homes, both as nodes of our social life and places for relaxation. This paper presents the results of a study intended to captu...

  8. Privacy Training Program

    Science.gov (United States)

    Recognizing that training and awareness are critical to protecting agency Personally Identifiable Information (PII), the EPA is developing online training for privacy contacts in its programs and regions.

  9. Practical Privacy Assessment

    DEFF Research Database (Denmark)

    Peen, Søren; Jansen, Thejs Willem; Jensen, Christian D.

    2008-01-01

    This chapter proposes a privacy assessment model called the Operational Privacy Assessment Model that includes organizational, operational and technical factors for the protection of personal data stored in an IT system. The factors can be evaluated in a simple scale so that not only the resulting...... graphical depiction can be easily created for an IT system, but graphical comparisons across multiple IT systems are also possible. Examples of factors presented in a Kiviat graph are also presented. This assessment tool may be used to standardize privacy assessment criteria, making it less painful...... for the management to assess privacy risks on their systems....

  10. Privacy enhanced recommender system

    NARCIS (Netherlands)

    Erkin, Zekeriya; Erkin, Zekeriya; Beye, Michael; Veugen, Thijs; Lagendijk, Reginald L.

    2010-01-01

    Recommender systems are widely used in online applications since they enable personalized service to the users. The underlying collaborative filtering techniques work on user’s data which are mostly privacy sensitive and can be misused by the service provider. To protect the privacy of the users, we

  11. Information Privacy Revealed

    Science.gov (United States)

    Lavagnino, Merri Beth

    2013-01-01

    Why is Information Privacy the focus of the January-February 2013 issue of "EDUCAUSE Review" and "EDUCAUSE Review Online"? Results from the 2012 annual survey of the International Association of Privacy Professionals (IAPP) indicate that "meeting regulatory compliance requirements continues to be the top perceived driver…

  12. Privacy Metrics and Boundaries

    NARCIS (Netherlands)

    L-F. Pau (Louis-François)

    2005-01-01

    textabstractThis paper aims at defining a set of privacy metrics (quantitative and qualitative) in the case of the relation between a privacy protector ,and an information gatherer .The aims with such metrics are: -to allow to assess and compare different user scenarios and their differences; for

  13. 49 CFR 1.70 - Delegations to the Director of the Departmental Office of Civil Rights.

    Science.gov (United States)

    2010-10-01

    ...) (codified at 42 U.S.C. 12101-121213). (h) Equal Pay Act of 1963 (enacted as section 6(d) of the Fair Labor... Reorganization Act, 42 U.S.C. 290dd(b). (j) 29 CFR Parts 1600 through 1691 (Equal Employment Opportunity...' enforcement of these authorities. These authorities include: (a) Title VII of the Civil Rights Act of 1964, as...

  14. 77 FR 12842 - Office of the Secretary; Departmental Appeals Board; Statement of Organization, Functions and...

    Science.gov (United States)

    2012-03-02

    ... workplace disputes; oversight of the Sharing Neutrals Program (a mediator exchange for local federal agencies), and training in conflict management techniques. The Division is headed by a Director who is a...

  15. 77 FR 4626 - Departmental Offices; Submission for OMB Review, Comment Request

    Science.gov (United States)

    2012-01-30

    ... United States Bureau of Engraving and Printing (BEP) and as part of its continuing effort to reduce... currency. The second generic clearance will allow the BEP to engage in scientific studies that will help... currency using various, tactile features currently being evaluated. DATES: Written comments should be...

  16. 77 FR 4083 - Departmental Offices; Submission for OMB Review, Comment Request

    Science.gov (United States)

    2012-01-26

    ... United States Bureau of Engraving and Printing (BEP) and as part of its continuing effort to reduce... of Partial Destruction of Mutilated Currency.'' The current information collection is assigned OMB Number 1520-0001. The information collection requests owners of partially destroyed U.S. currency to...

  17. 76 FR 36567 - Delegation of Authority for the Office of Departmental Equal Employment Opportunity

    Science.gov (United States)

    2011-06-22

    ...'s EEO program be organized and structured to maintain a workplace that is free from discrimination... public's expectations of fair housing without discrimination, but also to HUD's employment of a workforce...

  18. 76 FR 38458 - Departmental Offices; Submission for OMB Review, Comment Request

    Science.gov (United States)

    2011-06-30

    ...: 30-Day Notice of Information Collection Under Review: Consumer Financial Protection Bureau Consumer..., Consumer Financial Protection Bureau, Consumer Response, 1801 L Street, NW., Washington, DC 20036, by...: Consumer Financial Protection Bureau Consumer Response Intake Fields. OMB Control Number: New. Abstract...

  19. Privacy under construction : A developmental perspective on privacy perception

    NARCIS (Netherlands)

    Steijn, W.M.P.; Vedder, A.H.

    2015-01-01

    We present a developmental perspective regarding the difference in perceptions toward privacy between young and old. Here, we introduce the notion of privacy conceptions, that is, the specific ideas that individuals have regarding what privacy actually is. The differences in privacy concerns often

  20. 76 FR 53921 - Privacy Act of 1974; Department of Homeland Security ALL-034 Emergency Care Medical Records...

    Science.gov (United States)

    2011-08-30

    ... AGENCY: Privacy Office, DHS. ACTION: Notice of Privacy Act system of records. SUMMARY: In accordance with... Security Office of Health Affairs to collect and maintain records on individuals who receive emergency care... consistent, quality medical care. To support MQM, OHA operates the electronic Patient Care Record (ePCR), an...

  1. Space in Space: Designing for Privacy in the Workplace

    Science.gov (United States)

    Akin, Jonie

    2015-01-01

    Privacy is cultural, socially embedded in the spatial, temporal, and material aspects of the lived experience. Definitions of privacy are as varied among scholars as they are among those who fight for their personal rights in the home and the workplace. Privacy in the workplace has become a topic of interest in recent years, as evident in discussions on Big Data as well as the shrinking office spaces in which people work. An article in The New York Times published in February of this year noted that "many companies are looking to cut costs, and one way to do that is by trimming personal space". Increasingly, organizations ranging from tech start-ups to large corporations are downsizing square footage and opting for open-office floorplans hoping to trim the budget and spark creative, productive communication among their employees. The question of how much is too much to trim when it comes to privacy, is one that is being actively addressed by the National Aeronautics and Space Administration (NASA) as they explore habitat designs for future space missions. NASA recognizes privacy as a design-related stressor impacting human health and performance. Given the challenges of sustaining life in an isolated, confined, and extreme environment such as Mars, NASA deems it necessary to determine the acceptable minimal amount for habitable volume for activities requiring at least some level of privacy in order to support optimal crew performance. Ethnographic research was conducted in 2013 to explore perceptions of privacy and privacy needs among astronauts living and working in space as part of a long-distance, long-duration mission. The allocation of space, or habitable volume, becomes an increasingly complex issue in outer space due to the costs associated with maintaining an artificial, confined environment bounded by limitations of mass while located in an extreme environment. Privacy in space, or space in space, provides a unique case study of the complex notions of

  2. The Association of Departmental Quality Infrastructure and Positive Change

    Directory of Open Access Journals (Sweden)

    Jody E. Hooper MD

    2018-01-01

    Full Text Available A vertically and horizontally well-integrated quality improvement team is essential for effective quality data collection and implementation of improvement measures. We outline the quality structure of a large academic pathology department and describe successful projects across multiple divisions made possible by this tightly integrated structure. The physician vice chair for quality organizes departmental quality efforts and provides representation at the hospital level. The department has an independent continuous quality improvement unit and each laboratory of the department has a staff quality improvement representative. Faculty and staff experts have interacted to produce improvements such as accurate container labeling, efficient triage of specimens, and reduction of unnecessary testing. Specialized task forces such as the Courier Task Force are producing concrete recommendations for process improvement. All phases of pathology patient care are represented by faculty and staff who are trained in quality improvement, and each position touches and communicates actively with levels above and below itself. The key to the department’s approach has been the daily attention to quality efforts in all of its activities and the close association of faculty and staff to accomplish the goals of greater efficiency, safety, and cost savings.

  3. Protecting patron privacy

    CERN Document Server

    Beckstrom, Matthew

    2015-01-01

    In a world where almost anyone with computer savvy can hack, track, and record the online activities of others, your library can serve as a protected haven for your visitors who rely on the Internet to conduct research-if you take the necessary steps to safeguard their privacy. This book shows you how to protect patrons' privacy while using the technology that your library provides, including public computers, Internet access, wireless networks, and other devices. Logically organized into two major sections, the first part of the book discusses why the privacy of your users is of paramount

  4. Web Security, Privacy & Commerce

    CERN Document Server

    Garfinkel, Simson

    2011-01-01

    Since the first edition of this classic reference was published, World Wide Web use has exploded and e-commerce has become a daily part of business and personal life. As Web use has grown, so have the threats to our security and privacy--from credit card fraud to routine invasions of privacy by marketers to web site defacements to attacks that shut down popular web sites. Web Security, Privacy & Commerce goes behind the headlines, examines the major security risks facing us today, and explains how we can minimize them. It describes risks for Windows and Unix, Microsoft Internet Exp

  5. Privacy in Social Networks

    CERN Document Server

    Zheleva, Elena

    2012-01-01

    This synthesis lecture provides a survey of work on privacy in online social networks (OSNs). This work encompasses concerns of users as well as service providers and third parties. Our goal is to approach such concerns from a computer-science perspective, and building upon existing work on privacy, security, statistical modeling and databases to provide an overview of the technical and algorithmic issues related to privacy in OSNs. We start our survey by introducing a simple OSN data model and describe common statistical-inference techniques that can be used to infer potentially sensitive inf

  6. 76 FR 58007 - Privacy Act of 1974; Report of a New System of Records

    Science.gov (United States)

    2011-09-19

    ..., Division of Information Security & Privacy Management, Enterprise Architecture and Strategy Group, Office... system contain Protected Health Information (PHI) as defined by HHS regulation ``Standards for Privacy of... such PHI that are otherwise authorized by these routine uses may only be made if, and as, permitted or...

  7. Cybersecurity and Privacy

    DEFF Research Database (Denmark)

    he huge potential in future connected services has as a precondition that privacy and security needs are dealt with in order for new services to be accepted. This issue is increasingly on the agenda both at the company and at individual level. Cybersecurity and Privacy – bridging the gap addresses...... two very complex fields of the digital world, i.e., Cybersecurity and Privacy. These multifaceted, multidisciplinary and complex issues are usually understood and valued differently by different individuals, data holders and legal bodies. But a change in one field immediately affects the others....... Policies, frameworks, strategies, laws, tools, techniques, and technologies – all of these are tightly interwoven when it comes to security and privacy. This book is another attempt to bridge the gap between the industry and academia. The book addresses the views from academia and industry on the subject...

  8. Privacy for Sale?

    DEFF Research Database (Denmark)

    Sørensen, Lene Tolstrup; Sørensen, Jannick Kirk; Khajuria, Samant

    Data brokers have become central players in the collection online of private user data. Data brokers’ activities are however not very transparent or even known by users. Many users regard privacy a central element when they use online services. Based on 12 short interviews with users, this paper...... analyses how users perceive the concept of online privacy in respect to data brokers col- lection of private data, and particularly novel services that offer users the possi- bility to sell their private data. Two groups of users are identified: Those who are considering selling their data under specific...... conditions, and those who reject the idea completely. Based on the literature we identify two positions to privacy either as an instrumental good, or as an intrinsic good. The paper positions vari- ous user perceptions on privacy that are relevant for future service develop- ment....

  9. Certificate Transparency with Privacy

    Directory of Open Access Journals (Sweden)

    Eskandarian Saba

    2017-10-01

    Full Text Available Certificate transparency (CT is an elegant mechanism designed to detect when a certificate authority (CA has issued a certificate incorrectly. Many CAs now support CT and it is being actively deployed in browsers. However, a number of privacy-related challenges remain. In this paper we propose practical solutions to two issues. First, we develop a mechanism that enables web browsers to audit a CT log without violating user privacy. Second, we extend CT to support non-public subdomains.

  10. 76 FR 4436 - Privacy Act of 1974; Report of Modified or Altered System of Records

    Science.gov (United States)

    2011-01-25

    ... DEPARTMENT OF HEALTH AND HUMAN SERVICES Centers for Disease Control and Prevention Privacy Act of... following Breach Response Routine Use Language to comply with the Office of Management and Budget [[Page 4437

  11. An informational theory of privacy

    NARCIS (Netherlands)

    Schottmuller, C.; Jann, Ole

    2016-01-01

    We develop a theory that explains how and when privacy can increase welfare. Without privacy, some individuals misrepresent their preferences, because they will otherwise be statistically discriminated against. This "chilling effect" hurts them individually, and impairs information aggregation. The

  12. Privacy in social networking sites

    OpenAIRE

    Λεονάρδος, Γεώργιος; Leonardos, Giorgos

    2016-01-01

    The purpose of this study is to explore the aspects of privacy over the use of social networks web sites. More specific, we will show the types of social networks, their privacy mechanisms that are different in each social network site, their privacy options that are offered to users. We will report some serious privacy violations incidents of the most popular social networks sites such as Facebook, Twitter, LinkedIn. Also, we will report some important surveys about social networks and pr...

  13. 5 CFR 297.206 - Fees charged by the Office.

    Science.gov (United States)

    2010-01-01

    ... 5 Administrative Personnel 1 2010-01-01 2010-01-01 false Fees charged by the Office. 297.206 Section 297.206 Administrative Personnel OFFICE OF PERSONNEL MANAGEMENT CIVIL SERVICE REGULATIONS PRIVACY PROCEDURES FOR PERSONNEL RECORDS Request for Access § 297.206 Fees charged by the Office. (a) No fees will be charged for search and review time...

  14. Privacy and Open Government

    Directory of Open Access Journals (Sweden)

    Teresa Scassa

    2014-06-01

    Full Text Available The public-oriented goals of the open government movement promise increased transparency and accountability of governments, enhanced citizen engagement and participation, improved service delivery, economic development and the stimulation of innovation. In part, these goals are to be achieved by making more and more government information public in reusable formats and under open licences. This paper identifies three broad privacy challenges raised by open government. The first is how to balance privacy with transparency and accountability in the context of “public” personal information. The second challenge flows from the disruption of traditional approaches to privacy based on a collapse of the distinctions between public and private sector actors. The third challenge is that of the potential for open government data—even if anonymized—to contribute to the big data environment in which citizens and their activities are increasingly monitored and profiled.

  15. 77 FR 75499 - Privacy Act of 1974: Computer Matching Program

    Science.gov (United States)

    2012-12-20

    ... DEPARTMENT OF VETERANS AFFAIRS Privacy Act of 1974: Computer Matching Program AGENCY: Department...: This match will commence on or about January 22, 2013 or 40 days after the Office of Management and... of 18 months after the commencing date, the Departments may renew the agreement for another 12 months...

  16. Mum's the Word: Feds Are Serious About Protecting Patients' Privacy.

    Science.gov (United States)

    Conde, Crystal

    2010-08-01

    The Health Information Technology for Economic and Clinical Health (HITECH) Act significantly changes HIPAA privacy and security policies that affect physicians. Chief among the changes are the new breach notification regulations, developed by the U.S. Department of Health and Human Services Office for Civil Rights. The Texas Medical Association has developed resources to help physicians comply with the new HIPAA regulations.

  17. 76 FR 39392 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2011-07-06

    ....regulations.gov . Follow the instructions for submitting comments. Mail: Federal Docket Management System...: Mr. Leroy Jones, Department of the Army, Privacy Office, U.S. Army Records Management and... address, counselor's phone number and email, documentary evidence, affidavits, information from individual...

  18. 76 FR 44888 - Privacy Act of 1974, System of Records

    Science.gov (United States)

    2011-07-27

    ... Privacy Act of 1974 (5 U.S.C. 552a), as amended, entitled ``USAID-30, Google Apps Business Edition''. This... . SUPPLEMENTARY INFORMATION: The Google Apps Business Edition is being established as an Agency-wide system of...'') cloud computing model. The suite is composed of Gmail for e-mail, Google Docs for office productivity...

  19. 76 FR 65535 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2011-10-21

    ... the FBI BRUs expressly as part of this system notice because the entire notice is being republished. While the FBI BRUs provide necessary flexibility in disseminating records from the system, FBI notes...: Elizabeth Withnell, Supervisory Attorney-Advisor, Privacy and Civil Liberties Unit, Office of the General...

  20. 78 FR 41920 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2013-07-12

    ... Civil Liberties Office Web site at http://dpclo.defense.gov/privacy/SORNs/component/army/index.html... systems of records notices. Individual should provide full name, SSN and/or DoD ID number and military... penalty of perjury under the laws of the United States of America that the foregoing is true and correct...

  1. 77 FR 34943 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2012-06-12

    ... DEPARTMENT OF EDUCATION Privacy Act of 1974; System of Records AGENCY: Office of Planning..., 2012. FOR FURTHER INFORMATION CONTACT: Carmel Martin, Assistant Secretary for Planning, Evaluation and... 20202- 4500. Telephone: (202) 401-3676. If you use a telecommunications device for the deaf (TDD) or a...

  2. 75 FR 47797 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2010-08-09

    ... Officer, Department of Defense. Deletion: S330.40 CAHS System name: Employee Assistance Program Records (August 27, 1999; 64 FR 46889). Reason: This collection is covered under the existing DHHS/FOH EAP Privacy notice 09-90-0010, entitled ``Employee Assistance Program (EAP) Records, HHS/OS/ASAM/OHR.'' [FR Doc. 2010...

  3. 77 FR 56628 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2012-09-13

    .../Central Security Service (NSA/CSS), Freedom of Information Act and Privacy Act Office, 9800 Savage Road... Agencies of Government who wrote to NSA on behalf of the constituent and who use it to respond to the.... The DoD Blanket Routine Uses published at the beginning of the NSA/ CSS's compilation of record...

  4. 78 FR 45913 - Privacy Act of 1974; Systems of Records

    Science.gov (United States)

    2013-07-30

    ... at http://dpclo.defense.gov/privacy/SORNs/component/nsa/index.html . The proposed system report, as... Register Liaison Officer, Department of Defense. GNSA 14 System Name: NSA/CSS Library Patron File Control....'' Categories of individuals covered by the system: Delete entry and replace with ``NSA civilian employees...

  5. Advertising and Invasion of Privacy.

    Science.gov (United States)

    Rohrer, Daniel Morgan

    The right of privacy as it relates to advertising and the use of a person's name or likeness is discussed in this paper. After an introduction that traces some of the history of invasion of privacy in court decisions, the paper examines cases involving issues such as public figures and newsworthy items, right of privacy waived, right of privacy…

  6. Privacy in an Ambient World

    NARCIS (Netherlands)

    Dekker, M.A.C.; Etalle, Sandro; den Hartog, Jeremy

    Privacy is a prime concern in today's information society. To protect the privacy of individuals, enterprises must follow certain privacy practices, while collecting or processing personal data. In this chapter we look at the setting where an enterprise collects private data on its website,

  7. 76 FR 59073 - Privacy Act

    Science.gov (United States)

    2011-09-23

    ... CENTRAL INTELLIGENCE AGENCY 32 CFR Part 1901 Privacy Act AGENCY: Central Intelligence Agency. ACTION: Proposed rule. SUMMARY: Consistent with the Privacy Act (PA), the Central Intelligence Agency...-1379. SUPPLEMENTARY INFORMATION: Consistent with the Privacy Act (PA), the CIA has undertaken and...

  8. Privacy Expectations in Online Contexts

    Science.gov (United States)

    Pure, Rebekah Abigail

    2013-01-01

    Advances in digital networked communication technology over the last two decades have brought the issue of personal privacy into sharper focus within contemporary public discourse. In this dissertation, I explain the Fourth Amendment and the role that privacy expectations play in the constitutional protection of personal privacy generally, and…

  9. Designing Privacy-by-Design

    NARCIS (Netherlands)

    Rest, J.H.C. van; Boonstra, D.; Everts, M.H.; Rijn, M. van; Paassen, R.J.G. van

    2014-01-01

    The proposal for a new privacy regulation d.d. January 25th 2012 introduces sanctions of up to 2% of the annual turnover of enterprises. This elevates the importance of mitigation of privacy risks. This paper makes Privacy by Design more concrete, and positions it as the mechanism to mitigate these

  10. Departmentalization and Organizational Context: The Experience of the University of Guadalajara

    Directory of Open Access Journals (Sweden)

    Adrián Acosta Silva

    2005-05-01

    Full Text Available This work consists of an evaluation of the experience of organizational reform and academic departmentalization at a Mexican public university, the University of Guadalajara (U. of G., occurred in the period of 1994-2005. It is a research carried out from the perspective of the institutional change analysis, which obeys the interest of carrying out a rigorous evaluation of the process, after 11 years of its institutional operation. From a reconstruction of the context that gave origin and sense to the reform proposal and to the idea of academic departmentalization, some of the results and conditions in which the academic departments of the U. of G operate are analyzed. Finally, some of the problems and challenges that face the departmental structure in this institutional experience are identified.

  11. 78 FR 19510 - Privacy Act of 1974; Republication To Delete and Update Privacy Act System of Records...

    Science.gov (United States)

    2013-04-01

    ... reported under that notice. FOR FURTHER INFORMATION CONTACT: The Chief Privacy Officer, 451 Seventh Street...). (This is not a toll-free number.) A telecommunication device for hearing- and speech-impaired... of General Routine Uses inadvertently reported repeated information that HUD proposes to exclude from...

  12. Managerial span of control: a pilot study comparing departmental complexity and number of direct reports.

    Science.gov (United States)

    Merrill, Katreena Collette; Pepper, Ginette; Blegen, Mary

    2013-09-01

    Nurse managers play pivotal roles in hospitals. However, restructuring has resulted in nurse managers having wider span of control and reduced visibility. The purpose of this pilot study was to compare two methods of measuring span of control: departmental complexity and number of direct reports. Forty-one nurse managers across nine hospitals completed The Ottawa Hospital Clinical Manager Span of Control Tool (TOH-SOC) and a demographic survey. A moderate positive relationship between number of direct reports and departmental complexity score was identified (r=.49, p=managers' responsibility. Copyright © 2013 Longwoods Publishing.

  13. Privacy Bridges: EU and US Privacy Experts In Search of Transatlantic Privacy Solutions

    NARCIS (Netherlands)

    Abramatic, J.-F.; Bellamy, B.; Callahan, M.E.; Cate, F.; van Eecke, P.; van Eijk, N.; Guild, E.; de Hert, P.; Hustinx, P.; Kuner, C.; Mulligan, D.; O'Connor, N.; Reidenberg, J.; Rubinstein, I.; Schaar, P.; Shadbolt, N.; Spiekermann, S.; Vladeck, D.; Weitzner, D.J.; Zuiderveen Borgesius, F.; Hagenauw, D.; Hijmans, H.

    2015-01-01

    The EU and US share a common commitment to privacy protection as a cornerstone of democracy. Following the Treaty of Lisbon, data privacy is a fundamental right that the European Union must proactively guarantee. In the United States, data privacy derives from constitutional protections in the

  14. Biometrics and privacy

    NARCIS (Netherlands)

    Grijpink, J.H.A.M.

    2001-01-01

    Biometrics offers many alternatives for protecting our privacy and preventing us from falling victim to crime. Biometrics can even serve as a solid basis for safe anonymous and semi-anonymous legal transactions. In this article Jan Grijpink clarifies which concepts and practical applications this

  15. Reconciling privacy and security

    NARCIS (Netherlands)

    Lieshout, M.J. van; Friedewald, M.; Wright, D.; Gutwirth, S.

    2013-01-01

    This paper considers the relationship between privacy and security and, in particular, the traditional "trade-off" paradigm. The issue is this: how, in a democracy, can one reconcile the trend towards increasing security (for example, as manifested by increasing surveillance) with the fundamental

  16. Privacy Policy | FNLCR Staging

    Science.gov (United States)

    The privacy of our users is of utmost importance to Frederick National Lab. The policy outlined below establishes how Frederick National Lab will use the information we gather about you from your visit to our website. We may collect and store

  17. The Relationship between Academic Performance and Elementary Student and Teacher Attitudes towards Departmentalizing

    Science.gov (United States)

    Freiberg, Elizabeth J.

    2014-01-01

    In response to the continued pressure placed on American public schools to increase academic achievement, some schools have begun to reorganize instructional environments in an effort to improve student outcomes. The current study examined one such elementary school that implemented a departmentalized model of instruction in fourth and fifth-grade…

  18. Sociological Stratification: Change and Continuity in the Distribution of Departmental Prestige, 1965-2007

    Science.gov (United States)

    Weakliem, David L.; Gauchat, Gordon; Wright, Bradley R. E.

    2012-01-01

    Previous research has found that there is a good deal of stability in departmental prestige, but has not considered its long-term dynamics. This paper investigates a hypothesis implied by some accounts in the sociology of science and organizational theory: that there will be a permanent component of prestige associated with the department or…

  19. The Woman Engineering Academic: An Investigation of Departmental and Institutional Environments. ASHE Annual Meeting Paper.

    Science.gov (United States)

    Benson, Sherron D.

    This study used grounded theory methodology to investigate the institutional and departmental climates of women engineering faculty. Seven female engineering faculty from two universities completed semi-structured interviews that were coded for common themes. All the participants indicated that they had had a natural interest or talent for science…

  20. The Woman Engineering Academic: An Investigation of Departmental and Institutional Environments.

    Science.gov (United States)

    McKendall, Sherron Benson

    2000-01-01

    Interviewed women engineering faculty at two universities to determine their experiences and perceptions of departmental and institutional environments. Most participants had experienced some type of isolation or singling out due to gender. Some questioned whether they were overreacting. Many had difficulty balancing home and work lives.…

  1. Telling Our Story: A Case Study of a Collaborative Departmental Blog at Syracuse University Libraries

    Science.gov (United States)

    Rauh, Anne E.; McReynolds, Stephanie J. H.

    2016-01-01

    This case study will take readers through the planning and publication process of a collaborative departmental library blog at Syracuse University, which is a large private, non-profit research intensive university located in central New York State. It will provide an overview of the history of the project and the mission of the blog. It will…

  2. 76 FR 39245 - Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security/U.S. Coast...

    Science.gov (United States)

    2011-07-06

    ... Marilyn Scott-Perez (202-475-3515), Privacy Officer, U.S. Coast Guard. For privacy issues please contact...;Prices of new books are listed in the first FEDERAL REGISTER issue of each #0;week. #0; #0; #0; #0;#0...

  3. Towards Territorial Privacy in Smart Environments

    NARCIS (Netherlands)

    Könings, Bastian; Schaub, Florian; Weber, M.; Kargl, Frank

    Territorial privacy is an old concept for privacy of the personal space dating back to the 19th century. Despite its former relevance, territorial privacy has been neglected in recent years, while privacy research and legislation mainly focused on the issue of information privacy. However, with the

  4. Privacy Awareness: A Means to Solve the Privacy Paradox?

    Science.gov (United States)

    Pötzsch, Stefanie

    People are limited in their resources, i.e. they have limited memory capabilities, cannot pay attention to too many things at the same time, and forget much information after a while; computers do not suffer from these limitations. Thus, revealing personal data in electronic communication environments and being completely unaware of the impact of privacy might cause a lot of privacy issues later. Even if people are privacy aware in general, the so-called privacy paradox shows that they do not behave according to their stated attitudes. This paper discusses explanations for the existing dichotomy between the intentions of people towards disclosure of personal data and their behaviour. We present requirements on tools for privacy-awareness support in order to counteract the privacy paradox.

  5. 77 FR 77185 - Proposed Collection; Comment Request; Office of Small and Disadvantaged Business Utilization

    Science.gov (United States)

    2012-12-31

    ...) estimates of capital or start-up costs and costs of operation, maintenance, and purchase of services to... Business Utilization AGENCY: Departmental Offices, Department of Treasury. ACTION: Notice and request for... Capability Statement will be used by firms that wish to do business with the Department of the Treasury. The...

  6. Gaussian operations and privacy

    International Nuclear Information System (INIS)

    Navascues, Miguel; Acin, Antonio

    2005-01-01

    We consider the possibilities offered by Gaussian states and operations for two honest parties, Alice and Bob, to obtain privacy against a third eavesdropping party, Eve. We first extend the security analysis of the protocol proposed in [Navascues et al. Phys. Rev. Lett. 94, 010502 (2005)]. Then, we prove that a generalized version of this protocol does not allow one to distill a secret key out of bound entangled Gaussian states

  7. Privacy 2.0

    Directory of Open Access Journals (Sweden)

    Stylianos Papathanassopoulos

    2015-04-01

    Full Text Available We live in the era of change. In this world, privacy is not a static concept, but instead has a dynamic component. Overall, it becomes clear that the public and private are not defined in the same manner as in the past and as in the actual world, while our personal information has become a commodity that can raise our visibility in the social media driven world.

  8. Location Privacy in RFID Applications

    Science.gov (United States)

    Sadeghi, Ahmad-Reza; Visconti, Ivan; Wachsmann, Christian

    RFID-enabled systems allow fully automatic wireless identification of objects and are rapidly becoming a pervasive technology with various applications. However, despite their benefits, RFID-based systems also pose challenging risks, in particular concerning user privacy. Indeed, improvident use of RFID can disclose sensitive information about users and their locations allowing detailed user profiles. Hence, it is crucial to identify and to enforce appropriate security and privacy requirements of RFID applications (that are also compliant to legislation). This chapter first discusses security and privacy requirements for RFID-enabled systems, focusing in particular on location privacy issues. Then it explores the advances in RFID applications, stressing the security and privacy shortcomings of existing proposals. Finally, it presents new promising directions for privacy-preserving RFID systems, where as a case study we focus electronic tickets (e-tickets) for public transportation.

  9. PRIVACY AS A CULTURAL PHENOMENON

    Directory of Open Access Journals (Sweden)

    Garfield Benjamin

    2017-07-01

    Full Text Available Privacy remains both contentious and ever more pertinent in contemporary society. Yet it persists as an ill-defined term, not only within specific fields but in its various uses and implications between and across technical, legal and political contexts. This article offers a new critical review of the history of privacy in terms of two dominant strands of thinking: freedom and property. These two conceptions of privacy can be seen as successive historical epochs brought together under digital technologies, yielding increasingly complex socio-technical dilemmas. By simplifying the taxonomy to its socio-cultural function, the article provides a generalisable, interdisciplinary approach to privacy. Drawing on new technologies, historical trends, sociological studies and political philosophy, the article presents a discussion of the value of privacy as a term, before proposing a defense of the term cyber security as a mode of scalable cognitive privacy that integrates the relative needs of individuals, governments and corporations.

  10. 78 FR 4968 - Privacy Act of 1974, Computer Matching Program-U.S. Small Business Administration and U.S...

    Science.gov (United States)

    2013-01-23

    ... Small Business Administration (SBA) and the Department of Homeland Security, Federal Emergency... Security Officer, Office of the Chief Information Officer, Small Business Administration. Eric Won, Chief... SMALL BUSINESS ADMINISTRATION Privacy Act of 1974, Computer Matching Program--U.S. Small Business...

  11. 78 FR 8963 - Update of Existing Privacy Act-NASA Regulations

    Science.gov (United States)

    2013-02-07

    ... FR 60622] inadvertently omits the responsibility of NASA's Freedom of Information Act (FOIA) Office..., this correction adds responsibility of the FOIA Office. This corrections also corrects the title to Sec... appropriate system manager, or, if unknown, to the Center Privacy Manager or Freedom of Information Act (FOIA...

  12. Privacy, Security, & Compliance: Strange Bedfellows or a Marriage Made in Heaven?

    Science.gov (United States)

    Corn, Michael; Rosenthal, Jane

    2013-01-01

    Where does privacy belong in the college/university ecosystem, and what should its relationship be with security and compliance? Are the three areas best kept separate and distinct? Should there be some overlap? Or would a single office, officer, and/or reporting line enable a big picture of the whole? This article examines several of the campus…

  13. 78 FR 65011 - Privacy Act of 1974: New System of Records

    Science.gov (United States)

    2013-10-30

    ... Program under section 1334 of the Affordable Care Act (42 U.S.C. 18054). PURPOSE: OPM operates this system... password- protected computers and systems. Computer firewalls will be maintained to prevent access by... OFFICE OF PERSONNEL MANAGEMENT Privacy Act of 1974: New System of Records AGENCY: U.S. Office of...

  14. The privacy implications of Bluetooth

    OpenAIRE

    Kostakos, Vassilis

    2008-01-01

    A substantial amount of research, as well as media hype, has surrounded RFID technology and its privacy implications. Currently, researchers and the media focus on the privacy threats posed by RFID, while consumer groups choose to boycott products bearing RFID tags. At the same, however, a very similar technology has quietly become part of our everyday lives: Bluetooth. In this paper we highlight the fact that Bluetooth is a widespread technology that has real privacy implications. Furthermor...

  15. Cognitive Privacy for Personal Clouds

    Directory of Open Access Journals (Sweden)

    Milena Radenkovic

    2016-01-01

    Full Text Available This paper proposes a novel Cognitive Privacy (CogPriv framework that improves privacy of data sharing between Personal Clouds for different application types and across heterogeneous networks. Depending on the behaviour of neighbouring network nodes, their estimated privacy levels, resource availability, and social network connectivity, each Personal Cloud may decide to use different transmission network for different types of data and privacy requirements. CogPriv is fully distributed, uses complex graph contacts analytics and multiple implicit novel heuristics, and combines these with smart probing to identify presence and behaviour of privacy compromising nodes in the network. Based on sensed local context and through cooperation with remote nodes in the network, CogPriv is able to transparently and on-the-fly change the network in order to avoid transmissions when privacy may be compromised. We show that CogPriv achieves higher end-to-end privacy levels compared to both noncognitive cellular network communication and state-of-the-art strategies based on privacy-aware adaptive social mobile networks routing for a range of experiment scenarios based on real-world user and network traces. CogPriv is able to adapt to varying network connectivity and maintain high quality of service while managing to keep low data exposure for a wide range of privacy leakage levels in the infrastructure.

  16. Data privacy for the smart grid

    CERN Document Server

    Herold, Rebecca

    2015-01-01

    The Smart Grid and PrivacyWhat Is the Smart Grid? Changes from Traditional Energy Delivery Smart Grid Possibilities Business Model Transformations Emerging Privacy Risks The Need for Privacy PoliciesPrivacy Laws, Regulations, and Standards Privacy-Enhancing Technologies New Privacy Challenges IOT Big Data What Is the Smart Grid?Market and Regulatory OverviewTraditional Electricity Business SectorThe Electricity Open Market Classifications of Utilities Rate-Making ProcessesElectricity Consumer

  17. A Survey of Privacy on Data Integration

    OpenAIRE

    Do Son, Thanh

    2015-01-01

    This survey is an integrated view of other surveys on privacy preserving for data integration. First, we review the database context and challenges and research questions. Second, we formulate the privacy problems for schema matching and data matching. Next, we introduce the elements of privacy models. Then, we summarize the existing privacy techniques and the analysis (proofs) of privacy guarantees. Finally, we describe the privacy frameworks and their applications.

  18. Technical Privacy Metrics: a Systematic Survey

    OpenAIRE

    Wagner, Isabel; Eckhoff, David

    2018-01-01

    The file attached to this record is the author's final peer reviewed version The goal of privacy metrics is to measure the degree of privacy enjoyed by users in a system and the amount of protection offered by privacy-enhancing technologies. In this way, privacy metrics contribute to improving user privacy in the digital world. The diversity and complexity of privacy metrics in the literature makes an informed choice of metrics challenging. As a result, instead of using existing metrics, n...

  19. The Privacy Coach: Supporting customer privacy in the Internet of Things

    OpenAIRE

    Broenink, Gerben; Hoepman, Jaap-Henk; Hof, Christian van 't; van Kranenburg, Rob; Smits, David; Wisman, Tijmen

    2010-01-01

    The Privacy Coach is an application running on a mobile phone that supports customers in making privacy decisions when confronted with RFID tags. The approach we take to increase customer privacy is a radical departure from the mainstream research efforts that focus on implementing privacy enhancing technologies on the RFID tags themselves. Instead the Privacy Coach functions as a mediator between customer privacy preferences and corporate privacy policies, trying to find a match between the ...

  20. TRACKING AND MONITORING OF TAGGED OBJECTS EMPLOYING PARTICLE SWARM OPTIMIZATION ALGORITHM IN A DEPARTMENTAL STORE

    Directory of Open Access Journals (Sweden)

    Indrajit Bhattacharya

    2011-05-01

    Full Text Available The present paper proposes a departmental store automation system based on Radio Frequency Identification (RFID technology and Particle Swarm Optimization (PSO algorithm. The items in the departmental store spanned over different sections and in multiple floors, are tagged with passive RFID tags. The floor is divided into number of zones depending on different types of items that are placed in their respective racks. Each of the zones is placed with one RFID reader, which constantly monitors the items in their zone and periodically sends that information to the application. The problem of systematic periodic monitoring of the store is addressed in this application so that the locations, distributions and demands of every item in the store can be invigilated with intelligence. The proposed application is successfully demonstrated on a simulated case study.

  1. Privacy Law and Print Photojournalism.

    Science.gov (United States)

    Dykhouse, Caroline Dow

    Reviews of publications about privacy law, of recent court actions, and of interviews with newspaper photographers and attorneys indicate that torts of privacy often conflict with the freedoms to publish and to gather news. Although some guidelines have already been established (about running distorted pictures, "stealing" pictures, taking…

  2. Story Lab: Student Data Privacy

    Science.gov (United States)

    Herold, Benjamin

    2015-01-01

    Student data privacy is an increasingly high-profile--and controversial--issue that touches schools and families across the country. There are stories to tell in virtually every community. About three dozen states have passed legislation addressing student data privacy in the past two years, and eight different proposals were floating around…

  3. Privacy and Big Data

    CERN Document Server

    Craig, Terence

    2011-01-01

    Much of what constitutes Big Data is information about us. Through our online activities, we leave an easy-to-follow trail of digital footprints that reveal who we are, what we buy, where we go, and much more. This eye-opening book explores the raging privacy debate over the use of personal data, with one undeniable conclusion: once data's been collected, we have absolutely no control over who uses it or how it is used. Personal data is the hottest commodity on the market today-truly more valuable than gold. We are the asset that every company, industry, non-profit, and government wants. Pri

  4. Speech Privacy Problems

    Science.gov (United States)

    1945-08-18

    eondwious, «ach AnvoWnc either one or tiro staple m^aSattoa processes. The British teo -dimensioaai privacy system eUiissd both ire- oasaay ana time...of the 884 gas tube and ground showed that the tubs did not re- main fired throughout the duration of the 4- kc puls.e. Instead, the tube fired on...ouri’ent through the relay circuit was not sufficient to: permit its firm operation, especially when the amplitude of the 4~ kc pulse was low. This

  5. Departmentalization and Organizational Context: The Experience of the University of Guadalajara

    OpenAIRE

    Adrián Acosta Silva

    2005-01-01

    This work consists of an evaluation of the experience of organizational reform and academic departmentalization at a Mexican public university, the University of Guadalajara (U. of G.), occurred in the period of 1994-2005. It is a research carried out from the perspective of the institutional change analysis, which obeys the interest of carrying out a rigorous evaluation of the process, after 11 years of its institutional operation. From a reconstruction of the context that gave origin and se...

  6. Radioecology-related health physics and radiological protection. Departmental research programme of the BMU. Colloquium proceedings

    International Nuclear Information System (INIS)

    Wirth, E.; Pohl, H.

    1999-08-01

    The conference report covers the full texts of the 18 papers presented at the conference, as well as the contributions to the discussions. Except for two of the 18 papers, which set out the objectives and subjects of the departmental research programmes of the BMU, subject analysis and indexing has been done for individual retrieval of the papers from the database. (orig./CB) [de

  7. [A study on the departmental distribution of mortality by cause: some evidence concerning two populations].

    Science.gov (United States)

    Damiani, P; Masse, H; Aubenque, M

    1984-01-01

    The distributions of proportions of deaths by cause are analyzed for each department of France by sex for the age group 45 to 64. The data are official French departmental data on causes of death for the period 1968-1970. The authors conclude that these distributions are the sum of two log-normal distributions. They also identify the existence of two populations according to whether the cause of death was endogenous or exogenous. (summary in ENG)

  8. Prospects offered by the departmental plans inspection; Les perspectives offertes par la revision des plans departementaux

    Energy Technology Data Exchange (ETDEWEB)

    Thauvin, Ph.

    2000-07-01

    In the framework of the departmental plans inspection, a detailed document is presented on the domestic and industrial wastes management. These plans forecast an increase of the recycling facing the incineration, a mastership of the costs, a better application of the regulations and a campaign of public information. The indicators of control and the main points of these plans are discussed, supported by tables and definitions. (A.L.B.)

  9. Performance, labour flexibility and migrant workers in hotels: An establishment and departmental level analysis

    OpenAIRE

    Yaduma, N; Williams, A; Lockwood, A; Park, S

    2015-01-01

    © 2015. This paper analyses flexible working, and the employment of migrants, as determinants of performance in hotels, utilising a highly disaggregated data set of actual hours worked and outputs, on a monthly basis, over an 8 year period for 25 establishments within a single firm. It examines not only inter-establishment, but also intra-establishment (departmental) variations in performance. The analysis also systematically compares the findings based on financial versus physical measures, ...

  10. 34 CFR 99.60 - What functions has the Secretary delegated to the Office and to the Office of Administrative Law...

    Science.gov (United States)

    2010-07-01

    ... 34 Education 1 2010-07-01 2010-07-01 false What functions has the Secretary delegated to the Office and to the Office of Administrative Law Judges? 99.60 Section 99.60 Education Office of the Secretary, Department of Education FAMILY EDUCATIONAL RIGHTS AND PRIVACY What Are the Enforcement Procedures? § 99.60 What functions has the Secretary...

  11. IT services in a completely digitized radiological department: value and benefit of an in-house departmental IT group

    International Nuclear Information System (INIS)

    Treitl, M.; Wirth, S.; Lucke, A.; Rieger, J.; Pfeifer, K.J.; Reiser, M.; Villain, S.

    2005-01-01

    To analyze the benefit of a departmental IT group in comparison to support by hospital IT groups or system manufacturers in a completely digitized radiological department. The departmental IT group comprises a fulltime IT specialist, two student assistants and four clinical employees participating 1 day/week. For 18 months IT problems were quantified and specified according to urgency, responsibility and affected system by use of an intranet-based reporting system. For each IT service provider the performance and duration of problem solution was evaluated. In 18 months 3,234 IT problems emerged. 88.7% were solved by the departmental IT group. In 474 cases (14.7%) a solution within 2 h was required. The departmental IT group solved 35.8% within 30 min, system manufacturers needed 18 h 38 min in mean. The departmental IT group solved 90.2% of the problems within a time limit. System manufacturers met the limit in 60.1% with a mean duration of 7 days 21 h. In 6.7% of the cases, support by system manufacturers was indispensable. A considerable proportion of IT problems in completely digitized radiological departments can be solved by a departmental IT group, providing a fast and cost-efficient first-level IT support with effective prevention of major breaks in the workflow. In a small number of cases support by system manufacturers remains necessary. (orig.)

  12. The Office of Safeguards and Security Nonproliferation Support Program

    International Nuclear Information System (INIS)

    Desmond, W.J.

    1996-01-01

    The Nonproliferation Support Program was established in the Department of Energy, Office of Safeguards and Security on october 1, 1995. its mission includes providing assistance to Departmental efforts for improved international material protection, control and accounting programs by coordinating and leveraging domestic safeguards and security policy, practice and experience into the international arena. A major objective of the program is to balance US national security requirements with global support of the nonproliferation objectives. This paper describes the organization of the Office of Safeguards and Security and the Nonproliferation Support Program role and responsibility, and presents some of the current areas of program emphasis and activity

  13. A Generic Privacy Quantification Framework for Privacy-Preserving Data Publishing

    Science.gov (United States)

    Zhu, Zutao

    2010-01-01

    In recent years, the concerns about the privacy for the electronic data collected by government agencies, organizations, and industries are increasing. They include individual privacy and knowledge privacy. Privacy-preserving data publishing is a research branch that preserves the privacy while, at the same time, withholding useful information in…

  14. 76 FR 64115 - Privacy Act of 1974; Privacy Act System of Records

    Science.gov (United States)

    2011-10-17

    ... NATIONAL AERONAUTICS AND SPACE ADMINISTRATION [Notice (11-092)] Privacy Act of 1974; Privacy Act... retirement of one Privacy Act system of records notice. SUMMARY: In accordance with the Privacy Act of 1974, NASA is giving notice that it proposes to cancel the following Privacy Act system of records notice...

  15. 48 CFR 39.105 - Privacy.

    Science.gov (United States)

    2010-10-01

    ... 48 Federal Acquisition Regulations System 1 2010-10-01 2010-10-01 false Privacy. 39.105 Section 39... CONTRACTING ACQUISITION OF INFORMATION TECHNOLOGY General 39.105 Privacy. Agencies shall ensure that contracts for information technology address protection of privacy in accordance with the Privacy Act (5 U.S.C...

  16. Advanced research in data privacy

    CERN Document Server

    Torra, Vicenç

    2015-01-01

    This book provides an overview of the research work on data privacy and privacy enhancing technologies carried by the participants of the ARES project. ARES (Advanced Research in Privacy an Security, CSD2007-00004) has been one of the most important research projects funded by the Spanish Government in the fields of computer security and privacy. It is part of the now extinct CONSOLIDER INGENIO 2010 program, a highly competitive program which aimed to advance knowledge and open new research lines among top Spanish research groups. The project started in 2007 and will finish this 2014. Composed by 6 research groups from 6 different institutions, it has gathered an important number of researchers during its lifetime. Among the work produced by the ARES project, one specific work package has been related to privacy. This books gathers works produced by members of the project related to data privacy and privacy enhancing technologies. The presented works not only summarize important research carried in the proje...

  17. Towards Privacy Managment of Information Systems

    OpenAIRE

    Drageide, Vidar

    2009-01-01

    This masters thesis provides insight into the concept of privacy. It argues why privacy is important, and why developers and system owners should keep privacy in mind when developing and maintaining systems containing personal information. Following this, a strategy for evaluating the overall level of privacy in a system is defined. The strategy is then applied to parts of the cellphone system in an attempt to evaluate the privacy of traffic and location data in this system.

  18. An Alternative View of Privacy on Facebook

    OpenAIRE

    Christian Fuchs

    2011-01-01

    The predominant analysis of privacy on Facebook focuses on personal information revelation. This paper is critical of this kind of research and introduces an alternative analytical framework for studying privacy on Facebook, social networking sites and web 2.0. This framework is connecting the phenomenon of online privacy to the political economy of capitalism—a focus that has thus far been rather neglected in research literature about Internet and web 2.0 privacy. Liberal privacy philosophy ...

  19. Effective online privacy mechanisms with persuasive communication

    OpenAIRE

    Coopamootoo, P L

    2016-01-01

    This thesis contributes to research by taking a social psychological perspective to managing privacy online. The thesis proposes to support the effort to form a mental model that is required to evaluate a context with regards to privacy attitudes or to ease the effort by biasing activation of privacy attitudes. Privacy being a behavioural concept, the human-computer interaction design plays a major role in supporting and contributing to end users’ ability to manage their privacy online. Howev...

  20. Adding query privacy to robust DHTs

    DEFF Research Database (Denmark)

    Backes, Michael; Goldberg, Ian; Kate, Aniket

    2012-01-01

    intermediate peers that (help to) route the queries towards their destinations. In this paper, we satisfy this requirement by presenting an approach for providing privacy for the keys in DHT queries. We use the concept of oblivious transfer (OT) in communication over DHTs to preserve query privacy without...... privacy over robust DHTs. Finally, we compare the performance of our privacy-preserving protocols with their more privacy-invasive counterparts. We observe that there is no increase in the message complexity...

  1. Trajectory data privacy protection based on differential privacy mechanism

    Science.gov (United States)

    Gu, Ke; Yang, Lihao; Liu, Yongzhi; Liao, Niandong

    2018-05-01

    In this paper, we propose a trajectory data privacy protection scheme based on differential privacy mechanism. In the proposed scheme, the algorithm first selects the protected points from the user’s trajectory data; secondly, the algorithm forms the polygon according to the protected points and the adjacent and high frequent accessed points that are selected from the accessing point database, then the algorithm calculates the polygon centroids; finally, the noises are added to the polygon centroids by the differential privacy method, and the polygon centroids replace the protected points, and then the algorithm constructs and issues the new trajectory data. The experiments show that the running time of the proposed algorithms is fast, the privacy protection of the scheme is effective and the data usability of the scheme is higher.

  2. Privacy and CHI : methodologies for studying privacy issues

    NARCIS (Netherlands)

    Patil, S.; Romero, N.A.; Karat, J.

    2006-01-01

    This workshop aims to reflect on methodologies to empirically study privacy issues related to advanced technology. The goal is to address methodological concerns by drawing upon both theoretical perspectives as well as practical experiences.

  3. When Differential Privacy Meets Randomized Perturbation: A Hybrid Approach for Privacy-Preserving Recommender System

    KAUST Repository

    Liu, Xiao; Liu, An; Zhang, Xiangliang; Li, Zhixu; Liu, Guanfeng; Zhao, Lei; Zhou, Xiaofang

    2017-01-01

    result. However, none is designed for both hiding users’ private data and preventing privacy inference. To achieve this goal, we propose in this paper a hybrid approach for privacy-preserving recommender systems by combining differential privacy (DP

  4. Performing privacy in schools

    DEFF Research Database (Denmark)

    Lauritsen, Peter; Bøge, Ask Risom; Andersen, Lars Bo

    with technologies is carried out as well as observation is conducted. We obtain and present new knowledge about how surveillance is practiced in the interpersonal relations of students and teachers. References: Monahan, T., & Torres, R. D. (2009). Schools Under Surveillance: Cultures of Control in Public Education....... Rutgers University Press. Selwyn, N. (2010). Schools and Schooling in the Digital Age: A Critical Analysis. Routledge. Taylor, E. (2013). Surveillance Schools: Security, Discipline and Control in Contemporary Education. Palgrave Macmillan UK. Taylor, E., & Rooney, T. (2016). Surveillance Futures: Social......In this presentation we pursue the question: How is privacy performed and perceived in schools by children? Our aim is to investigate how the boundaries between public and private spheres are continuously performed in the formal setting of the classroom as well as in the social lives of students...

  5. Parasiteware: Unlocking Personal Privacy

    Directory of Open Access Journals (Sweden)

    Daniel B. Garrie

    2006-09-01

    Full Text Available Spyware presents a threat of privacy infringement to unassuming internet users irrespective of their country of citizenship. European legislation attempts to protect end-users from unethical processing of their personal data. Spyware technologies, however, skirts these laws and often break them in their entirety. Outlawing the spyware and strengthening the legal consent requirement to mine data are statutory solutions that can prevent spyware users from skirting the law. An internationally standardized technology education system for the judiciaries in Europe and the U.S. can help ensure that when spyware users do break the law, they cannot hide by escaping from one nation to another without being held accountable. Transnational improvements are necessary to remedy the global spyware epidemic.

  6. 77 FR 33753 - Privacy Act of 1974; Department of Homeland Security, U.S. Customs and Border Protection, DHS/CBP...

    Science.gov (United States)

    2012-06-07

    ... of finished intelligence products within DHS and tracks sharing outside of DHS. Two principal types.... Two principal types of users will access AFI: DHS analysts and DHS finished intelligence product users... Framework for Intelligence (AFI) System of Records AGENCY: Privacy Office, DHS. ACTION: Notice of Privacy...

  7. 78 FR 3015 - Privacy Act of 1974; U.S. Customs and Border Protection; DHS/CBP-004-Intellectual Property Rights...

    Science.gov (United States)

    2013-01-15

    ... Search Systems, System of Records AGENCY: Department of Homeland Security, Privacy Office. ACTION: Notice... and Border Protection, Mint Annex, 799 9th Street NW., Washington, DC 20229-1177. For privacy issues... Property Rights Internal Search (IPRiS) system. IPRS provides a web-based search engine for the public to...

  8. Privacy Preserving Distributed Data Mining

    Data.gov (United States)

    National Aeronautics and Space Administration — Distributed data mining from privacy-sensitive multi-party data is likely to play an important role in the next generation of integrated vehicle health monitoring...

  9. Distributed privacy preserving data collection

    KAUST Repository

    Xue, Mingqiang; Papadimitriou, Panagiotis D.; Raï ssi, Chedy; Kalnis, Panos; Pung, Hungkeng

    2011-01-01

    an anonymized table by generalization of quasi-identifier attributes. The protocol employs cryptographic techniques such as homomorphic encryption, private information retrieval and secure multiparty computation to ensure the privacy goal in the process of data

  10. Privacy and the Connected Society

    DEFF Research Database (Denmark)

    Sørensen, Lene Tolstrup; Khajuria, Samant; Skouby, Knud Erik

    The Vision of the 5G enabled connected society is highly based on the evolution and implementation of Internet of Things. This involves, amongst others, a significant raise in devices, sensors and communication in pervasive interconnections as well as cooperation amongst devices and entities across...... the society. Enabling the vision of the connected society, researchers point in the direction of security and privacy as areas to challenge the vision. By use of the Internet of Things reference model as well as the vision of the connected society, this paper identifies privacy of the individual with respect...... to three selected areas: Shopping, connected cars and online gaming. The paper concludes that privacy is a complexity within the connected society vision and that thee is a need for more privacy use cases to shed light on the challenge....

  11. Librarians, Civil Liberties and Privacy.

    Science.gov (United States)

    Fielding, Derek

    1978-01-01

    A comparison of current civil liberties issues in Australia with the status of similar issues in Britain and the United States. Included are political affiliation of government employees, censorship, rights of the individual, privacy, and freedom of information. (JAB)

  12. Privacy Impact Assessment (PIA) Repository

    Data.gov (United States)

    Department of Veterans Affairs — This repository contains Privacy Impact Assessments (PIA) that have been vetted/approved. Section 208 of the Electronic Government Act of 2002 (E-Gov Act) requires...

  13. Office Hysteroscopy

    OpenAIRE

    Hikmet Hassa; Basar Tekin; H. Mete Tanir; Bulent Cakmak

    2007-01-01

    Although hysteroscopy has evolved in recent years, its use in the office setting was not made practical until early 1980s with the introduction of small caliber hysteroscopes of less than 5- mm outer diameter.This innovation simplifies ambulatory uterine exploration and the office evaluation of patients with abnormal uterine bleeding. This article reviews current trends in office hysteroscopy and its areas of application in different forms of gynecological problems.

  14. Office Hysteroscopy

    Directory of Open Access Journals (Sweden)

    Hikmet Hassa

    2007-06-01

    Full Text Available Although hysteroscopy has evolved in recent years, its use in the office setting was not made practical until early 1980s with the introduction of small caliber hysteroscopes of less than 5- mm outer diameter.This innovation simplifies ambulatory uterine exploration and the office evaluation of patients with abnormal uterine bleeding. This article reviews current trends in office hysteroscopy and its areas of application in different forms of gynecological problems.

  15. 31 CFR Appendix J to Subpart C of... - Office of the Comptroller of the Currency

    Science.gov (United States)

    2010-07-01

    ... 31 Money and Finance: Treasury 1 2010-07-01 2010-07-01 false Office of the Comptroller of the Currency J Appendix J to Subpart C of Part 1 Money and Finance: Treasury Office of the Secretary of the Treasury DISCLOSURE OF RECORDS Privacy Act Pt. 1, Subpt. C, App. J Appendix J to Subpart C of Part 1—Office...

  16. Privacy-preserving Identity Management

    OpenAIRE

    Milutinovic, Milica

    2015-01-01

    With the technological advances and the evolution of online services, user privacy is becoming a crucial issue in the modern day society. Privacy in the general sense refers to individuals’ ability to protect information about themselves and selectively present it to other entities. This concept is nowadays strongly affected by everyday practices that assume personal data disclosure, such as online shopping and participation in loyalty schemes. This makes it difficult for an individual to con...

  17. PRIVACY CONCERNS IN FACEBOOK SITE

    OpenAIRE

    Vandana Singh

    2014-01-01

    Today social networking sites play an important role and inexpensive way to maintain existing relationships and present oneself. However, the increasing use of online sites give rise to privacy concerns and risks. All Internet sites are also under attack from phishers, fraudsters, and spammers. They aim to steal user information and expose users to unwanted spam. They have so many resources at their disposal.This paper studies the awareness of college students regarding the privacy in Faceboo...

  18. Security and privacy in biometrics

    CERN Document Server

    Campisi, Patrizio

    2013-01-01

    This important text/reference presents the latest secure and privacy-compliant techniques in automatic human recognition. Featuring viewpoints from an international selection of experts in the field, the comprehensive coverage spans both theory and practical implementations, taking into consideration all ethical and legal issues. Topics and features: presents a unique focus on novel approaches and new architectures for unimodal and multimodal template protection; examines signal processing techniques in the encrypted domain, security and privacy leakage assessment, and aspects of standardizati

  19. Hacking Facebook Privacy and Security

    Science.gov (United States)

    2012-08-28

    REPORT Hacking Facebook Privacy and Security 14. ABSTRACT 16. SECURITY CLASSIFICATION OF: When people talk about hacking and social networks , they’re...12211 Research Triangle Park, NC 27709-2211 15. SUBJECT TERMS Facebook , Privacy, Security, Social Network Dr. Jeff Duffany (Advisor), Omar Galban...transmit personal information that many people that they dare not do it personally. FACEBOOK PLATFORM Facebook is a popular social networking

  20. Privacy concerns in smart cities

    OpenAIRE

    van Zoonen, Liesbet

    2016-01-01

    textabstractIn this paper a framework is constructed to hypothesize if and how smart city technologies and urban big data produce privacy concerns among the people in these cities (as inhabitants, workers, visitors, and otherwise). The framework is built on the basis of two recurring dimensions in research about people's concerns about privacy: one dimensions represents that people perceive particular data as more personal and sensitive than others, the other dimension represents that people'...

  1. Measurable improvement in patient safety culture: A departmental experience with incident learning.

    Science.gov (United States)

    Kusano, Aaron S; Nyflot, Matthew J; Zeng, Jing; Sponseller, Patricia A; Ermoian, Ralph; Jordan, Loucille; Carlson, Joshua; Novak, Avrey; Kane, Gabrielle; Ford, Eric C

    2015-01-01

    Rigorous use of departmental incident learning is integral to improving patient safety and quality of care. The goal of this study was to quantify the impact of a high-volume, departmental incident learning system on patient safety culture. A prospective, voluntary, electronic incident learning system was implemented in February 2012 with the intent of tracking near-miss/no-harm incidents. All incident reports were reviewed weekly by a multiprofessional team with regular department-wide feedback. Patient safety culture was measured at baseline with validated patient safety culture survey questions. A repeat survey was conducted after 1 and 2 years of departmental incident learning. Proportional changes were compared by χ(2) or Fisher exact test, where appropriate. Between 2012 and 2014, a total of 1897 error/near-miss incidents were reported, representing an average of 1 near-miss report per patient treated. Reports were filed by a cross section of staff, with the majority of incidents reported by therapists, dosimetrists, and physicists. Survey response rates at baseline and 1 and 2 years were 78%, 80%, and 80%, respectively. Statistically significant and sustained improvements were noted in several safety metrics, including belief that the department was openly discussing ways to improve safety, the sense that reports were being used for safety improvement, and the sense that changes were being evaluated for effectiveness. None of the surveyed dimensions of patient safety culture worsened. Fewer punitive concerns were noted, with statistically significant decreases in the worry of embarrassment in front of colleagues and fear of getting colleagues in trouble. A comprehensive incident learning system can identify many areas for improvement and is associated with significant and sustained improvements in patient safety culture. These data provide valuable guidance as incident learning systems become more widely used in radiation oncology. Copyright © 2015

  2. Financial Management: U.S. Army Corps of Engineers Financial Information Imported Into the Defense Departmental Reporting System - Audited Financial Statements

    National Research Council Canada - National Science Library

    Granetto, Paul J; Peek, Marvin L; Armstrong, Jack L; Wenzel, Paul C; Furey, Kathleen A; Zimmerman, Craig W

    2004-01-01

    ... are: the Corps of Engineers Financial Management System, the Corps of Engineers Enterprise Management Information System, and the Defense Departmental Reporting System - Audited Financial Statements...

  3. The Effect of Agile Workspace and Remote Working on Experiences of Privacy, Crowding and Satisfaction

    Directory of Open Access Journals (Sweden)

    Trevor Keeling

    2015-08-01

    Full Text Available Occupant density is an important and basic metric of space use efficiency. It affects user experience of privacy, crowding and satisfaction. The effect of agile working has been two fold. Firstly, offices have an increasing range of workspace settings such as break out space, collaborative space and contemplative space in contrast to the traditional workspace settings of assigned desks and formal meeting rooms. Secondly, office workers have become increasingly mobile as they are able to work from a greater variety of locations both in and out of their main place of work. This study asks whether workers who occupy agile workspaces and those with greater mobility experience privacy differently from workers with more conventional offices and work patterns. The experience of privacy can be considered in terms of retreat from people, control of information flow and control of interactions. Our results show that agile workspaces improve the ability to control information compared with open plan offices. It was also found that highly mobile workers are more sensitive to the negative effects of interacting with people. From this a taxonomy of offices is defined in terms of the features that contribute to the experience of privacy.

  4. A Computer-Aided Bibliometrics System for Journal Citation Analysis and Departmental Core Journal Ranking List Generation

    Directory of Open Access Journals (Sweden)

    Yih-Chearng Shiue

    2004-12-01

    Full Text Available Due to the tremendous increase and variation in serial publications, faculties in department of university are finding it difficult to generate and update their departmental core journal list regularly and accurately, and libraries are finding it difficult to maintain their current serial collection for different departments. Therefore, the evaluation of a departmental core journal list is an important task for departmental faculties and librarians. A departmental core journal list not only helps departments understand research performances of faculties and students, but also helps librarians make decisions about which journals to retain and which to cancel. In this study, a Computer-Aided Bibliometrics System was implemented and two methodologies (JCDF and LibJF were proposed in order to generate a departmental core journal ranking list and make the journal citation analysis. Six departments were taken as examples, with MIS as the major one. One journal citation pattern was found and the ratio of Turning point-to-No. journal was always around 0.07 among the 10 journals and 6 departments. After comparing with four methodologies via overlapping rate and standard deviation distances, the two proposed methodologies were shown to be better than questionnaire and library subscription method.

  5. Privacy in the Genomic Era.

    Science.gov (United States)

    Naveed, Muhammad; Ayday, Erman; Clayton, Ellen W; Fellay, Jacques; Gunter, Carl A; Hubaux, Jean-Pierre; Malin, Bradley A; Wang, Xiaofeng

    2015-09-01

    Genome sequencing technology has advanced at a rapid pace and it is now possible to generate highly-detailed genotypes inexpensively. The collection and analysis of such data has the potential to support various applications, including personalized medical services. While the benefits of the genomics revolution are trumpeted by the biomedical community, the increased availability of such data has major implications for personal privacy; notably because the genome has certain essential features, which include (but are not limited to) (i) an association with traits and certain diseases, (ii) identification capability (e.g., forensics), and (iii) revelation of family relationships. Moreover, direct-to-consumer DNA testing increases the likelihood that genome data will be made available in less regulated environments, such as the Internet and for-profit companies. The problem of genome data privacy thus resides at the crossroads of computer science, medicine, and public policy. While the computer scientists have addressed data privacy for various data types, there has been less attention dedicated to genomic data. Thus, the goal of this paper is to provide a systematization of knowledge for the computer science community. In doing so, we address some of the (sometimes erroneous) beliefs of this field and we report on a survey we conducted about genome data privacy with biomedical specialists. Then, after characterizing the genome privacy problem, we review the state-of-the-art regarding privacy attacks on genomic data and strategies for mitigating such attacks, as well as contextualizing these attacks from the perspective of medicine and public policy. This paper concludes with an enumeration of the challenges for genome data privacy and presents a framework to systematize the analysis of threats and the design of countermeasures as the field moves forward.

  6. Privacy in the Genomic Era

    Science.gov (United States)

    NAVEED, MUHAMMAD; AYDAY, ERMAN; CLAYTON, ELLEN W.; FELLAY, JACQUES; GUNTER, CARL A.; HUBAUX, JEAN-PIERRE; MALIN, BRADLEY A.; WANG, XIAOFENG

    2015-01-01

    Genome sequencing technology has advanced at a rapid pace and it is now possible to generate highly-detailed genotypes inexpensively. The collection and analysis of such data has the potential to support various applications, including personalized medical services. While the benefits of the genomics revolution are trumpeted by the biomedical community, the increased availability of such data has major implications for personal privacy; notably because the genome has certain essential features, which include (but are not limited to) (i) an association with traits and certain diseases, (ii) identification capability (e.g., forensics), and (iii) revelation of family relationships. Moreover, direct-to-consumer DNA testing increases the likelihood that genome data will be made available in less regulated environments, such as the Internet and for-profit companies. The problem of genome data privacy thus resides at the crossroads of computer science, medicine, and public policy. While the computer scientists have addressed data privacy for various data types, there has been less attention dedicated to genomic data. Thus, the goal of this paper is to provide a systematization of knowledge for the computer science community. In doing so, we address some of the (sometimes erroneous) beliefs of this field and we report on a survey we conducted about genome data privacy with biomedical specialists. Then, after characterizing the genome privacy problem, we review the state-of-the-art regarding privacy attacks on genomic data and strategies for mitigating such attacks, as well as contextualizing these attacks from the perspective of medicine and public policy. This paper concludes with an enumeration of the challenges for genome data privacy and presents a framework to systematize the analysis of threats and the design of countermeasures as the field moves forward. PMID:26640318

  7. 1996: BMBF expenditures for energy resrearch. Draft of the departmental federal budget 30

    International Nuclear Information System (INIS)

    Anon.

    1995-01-01

    Departmental budget 30 of the 1996 draft federal budget covers the activities of the German Federal Ministry for Education, Science, Research, and Technology (BMBF). The Ministry is the result of an amalgamation, in 1994, of the former Ministry for Education and Science (BMBW) and the former Ministry for Research and Technology (BMFT). For this reason, the total budget as indicated in the figures for 1995 and 1996 cannot be compared directly. The 1996 departmental budget No. 30 comprises a total of DM 15.62 (1995: 15.53) billion. Nuclear technology and nuclear research have desappeared almost completely as budgetary items and can be found only under the headings of Safety Research (DM 81/78 million) and Decommissioning (DM 259/232 million). A similar development was observed in recent years also with the change in names of German national research centers. However, this does not mean that the BMBF has completely withdrawn from nuclear research. These activities are now covered under more general items, such as 'Renewable Energies, Economical Use of Energy, Conversion and Combustion Technologies', for which expenditures of DM 290 (285) million have been earmarked in 1996. The BMBF makes available approx. DM 303 (290) million for investments into research centers, and approx. DM 1.32 (1.31) billion DM to cover their operating costs. The nuclear research share in these funds decreases steadily. DM 467 (472) million have been earmarked for basic research. (orig.) [de

  8. 77 FR 38218 - Office of Privacy, Records, and Disclosure; Privacy Act of 1974; Proposed Implementation

    Science.gov (United States)

    2012-06-27

    ... Executive or military departments may prescribe regulations governing the conduct of its employees and the..., and to provide a copy of the individual's statement of disagreement with the agency's refusal to amend... individual's statement of disagreement with the agency's refusal to amend a record to persons or other...

  9. 77 FR 22626 - Office of Privacy, Records, and Disclosure; Privacy Act of 1974, as Amended

    Science.gov (United States)

    2012-04-16

    ..., criminal, or regulatory in nature, and whether arising by general statute or particular program pursuant.... To the tribunals, counsel, other parties, witnesses, and the public (in publicly available pleadings... regulatory in nature, and whether arising by general statute or particular program pursuant thereto. 3. For...

  10. 77 FR 46551 - Office of Privacy, Records, and Disclosure; Privacy Act of 1974, as Amended

    Science.gov (United States)

    2012-08-03

    ... National Defense Authorization Act for Fiscal Year 2008 (Pub. L. 110-181), which created the Special... custody, use, and preservation of the department's records, papers, and property. To facilitate SIGAR's... any information they post, as with any other information passing through or stored on SIGAR equipment...

  11. The privacy coach: Supporting customer privacy in the internet of things

    NARCIS (Netherlands)

    Broenink, E.G.; Hoepman, J.H.; Hof, C. van 't; Kranenburg, R. van; Smits, D.; Wisman, T.

    2010-01-01

    The Privacy Coach is an application running on a mobile phone that supports customers in making privacy decisions when confronted with RFID tags. The approach we take to increase customer privacy is a radical departure from the mainstream research efforts that focus on implementing privacy enhancing

  12. 76 FR 67763 - Privacy Act of 1974; Privacy Act System of Records

    Science.gov (United States)

    2011-11-02

    ... NATIONAL AERONAUTICS AND SPACE ADMINISTRATION [Notice (11-109)] Privacy Act of 1974; Privacy Act... proposed revisions to an existing Privacy Act system of records. SUMMARY: Pursuant to the provisions of the Privacy Act of 1974 (5 U.S.C. 552a), the National Aeronautics and Space Administration is issuing public...

  13. 76 FR 64114 - Privacy Act of 1974; Privacy Act System of Records

    Science.gov (United States)

    2011-10-17

    ... NATIONAL AERONAUTICS AND SPACE ADMINISTRATION [Notice (11-093)] Privacy Act of 1974; Privacy Act... proposed revisions to an existing Privacy Act system of records. SUMMARY: Pursuant to the provisions of the Privacy Act of 1974 (5 U.S.C. 552a), the National Aeronautics and Space Administration is issuing public...

  14. 76 FR 64112 - Privacy Act of 1974; Privacy Act System of Records Appendices

    Science.gov (United States)

    2011-10-17

    ... NATIONAL AERONAUTICS AND SPACE ADMINISTRATION [Notice (11-091)] Privacy Act of 1974; Privacy Act...: Revisions of NASA Appendices to Privacy Act System of Records. SUMMARY: Notice is hereby given that NASA is... Privacy Act of 1974. This notice publishes those amendments as set forth below under the caption...

  15. 78 FR 40515 - Privacy Act of 1974; Privacy Act System of Records

    Science.gov (United States)

    2013-07-05

    ... NATIONAL AERONAUTICS AND SPACE ADMINISTRATION [Notice 13-071] Privacy Act of 1974; Privacy Act System of Records AGENCY: National Aeronautics and Space Administration (NASA). ACTION: Notice of Privacy Act system of records. SUMMARY: Each Federal agency is required by the Privacy Act of 1974 to publish...

  16. 78 FR 77503 - Privacy Act of 1974; Privacy Act System of Records

    Science.gov (United States)

    2013-12-23

    ... NATIONAL AERONAUTICS AND SPACE ADMINISTRATION [Notice 13-149] Privacy Act of 1974; Privacy Act... proposed revisions to existing Privacy Act systems of records. SUMMARY: Pursuant to the provisions of the Privacy Act of 1974 (5 U.S.C. 552a), the National Aeronautics and Space Administration is issuing public...

  17. 77 FR 69898 - Privacy Act of 1974; Privacy Act System of Records

    Science.gov (United States)

    2012-11-21

    ... NATIONAL AERONAUTICS AND SPACE ADMINISTRATION [Notice 12-100] Privacy Act of 1974; Privacy Act... proposed revisions to an existing Privacy Act system of records. SUMMARY: Pursuant to the provisions of the Privacy Act of 1974 (5 U.S.C. 552a), the National Aeronautics and Space Administration is issuing public...

  18. Privacy Implications of Surveillance Systems

    DEFF Research Database (Denmark)

    Thommesen, Jacob; Andersen, Henning Boje

    2009-01-01

    This paper presents a model for assessing the privacy „cost‟ of a surveillance system. Surveillance systems collect and provide personal information or observations of people by means of surveillance technologies such as databases, video or location tracking. Such systems can be designed for vari......This paper presents a model for assessing the privacy „cost‟ of a surveillance system. Surveillance systems collect and provide personal information or observations of people by means of surveillance technologies such as databases, video or location tracking. Such systems can be designed...... for various purposes, even as a service for those being observed, but in any case they will to some degree invade their privacy. The model provided here can indicate how invasive any particular system may be – and be used to compare the invasiveness of different systems. Applying a functional approach......, the model is established by first considering the social function of privacy in everyday life, which in turn lets us determine which different domains will be considered as private, and finally identify the different types of privacy invasion. This underlying model (function – domain – invasion) then serves...

  19. Internet privacy options for adequate realisation

    CERN Document Server

    2013-01-01

    A thorough multidisciplinary analysis of various perspectives on internet privacy was published as the first volume of a study, revealing the results of the achatech project "Internet Privacy - A Culture of Privacy and Trust on the Internet." The second publication from this project presents integrated, interdisciplinary options for improving privacy on the Internet utilising a normative, value-oriented approach. The ways in which privacy promotes and preconditions fundamental societal values and how privacy violations endanger the flourishing of said values are exemplified. The conditions which must be fulfilled in order to achieve a culture of privacy and trust on the internet are illuminated. This volume presents options for policy-makers, educators, businesses and technology experts how to facilitate solutions for more privacy on the Internet and identifies further research requirements in this area.

  20. CARAVAN: Providing Location Privacy for VANET

    National Research Council Canada - National Science Library

    Sampigethaya, Krishna; Huang, Leping; Li, Mingyan; Poovendran, Radha; Matsuura, Kanta; Sezaki, Kaoru

    2005-01-01

    .... This type of tracking leads to threats on the location privacy of the vehicle's user. In this paper, we study the problem of providing location privacy in VANET by allowing vehicles to prevent tracking of their broadcast communications...

  1. SIED, a Data Privacy Engineering Framework

    OpenAIRE

    Mivule, Kato

    2013-01-01

    While a number of data privacy techniques have been proposed in the recent years, a few frameworks have been suggested for the implementation of the data privacy process. Most of the proposed approaches are tailored towards implementing a specific data privacy algorithm but not the overall data privacy engineering and design process. Therefore, as a contribution, this study proposes SIED (Specification, Implementation, Evaluation, and Dissemination), a conceptual framework that takes a holist...

  2. Privacy and Data-Based Research

    OpenAIRE

    Ori Heffetz; Katrina Ligett

    2013-01-01

    What can we, as users of microdata, formally guarantee to the individuals (or firms) in our dataset, regarding their privacy? We retell a few stories, well-known in data-privacy circles, of failed anonymization attempts in publicly released datasets. We then provide a mostly informal introduction to several ideas from the literature on differential privacy, an active literature in computer science that studies formal approaches to preserving the privacy of individuals in statistical databases...

  3. PriBots: Conversational Privacy with Chatbots

    OpenAIRE

    Harkous, Hamza; Fawaz, Kassem; Shin, Kang G.; Aberer, Karl

    2016-01-01

    Traditional mechanisms for delivering notice and enabling choice have so far failed to protect users’ privacy. Users are continuously frustrated by complex privacy policies, unreachable privacy settings, and a multitude of emerging standards. The miniaturization trend of smart devices and the emergence of the Internet of Things (IoTs) will exacerbate this problem further. In this paper, we propose Conversational Privacy Bots (PriBots) as a new way of delivering notice and choice through a two...

  4. 39 CFR 262.5 - Systems (Privacy).

    Science.gov (United States)

    2010-07-01

    ... 39 Postal Service 1 2010-07-01 2010-07-01 false Systems (Privacy). 262.5 Section 262.5 Postal... DEFINITIONS § 262.5 Systems (Privacy). (a) Privacy Act system of records. A Postal Service system containing... individual. (c) Computer matching program. A “matching program,” as defined in the Privacy Act, 5 U.S.C. 552a...

  5. Privacy-Preserving Trajectory Collection

    DEFF Research Database (Denmark)

    Gidofalvi, Gyozo; Xuegang, Huang; Pedersen, Torben Bach

    2008-01-01

    In order to provide context--aware Location--Based Services, real location data of mobile users must be collected and analyzed by spatio--temporal data mining methods. However, the data mining methods need precise location data, while the mobile users want to protect their location privacy....... To remedy this situation, this paper first formally defines novel location privacy requirements. Then, it briefly presents a system for privacy--preserving trajectory collection that meets these requirements. The system is composed of an untrusted server and clients communicating in a P2P network. Location...... data is anonymized in the system using data cloaking and data swapping techniques. Finally, the paper empirically demonstrates that the proposed system is effective and feasible....

  6. Privacy-preserving distributed clustering

    DEFF Research Database (Denmark)

    Erkin, Zekeriya; Veugen, Thijs; Toft, Tomas

    2013-01-01

    with any other entity, including the service provider. Such privacy concerns lead to trust issues between entities, which clearly damages the functioning of the service and even blocks cooperation between entities with similar data sets. To enable joint efforts with private data, we propose a protocol......, or in some cases, information from different databases is pooled to enrich the data so that the merged database can improve the clustering effort. However, in either case, the content of the database may be privacy sensitive and/or commercially valuable such that the owners may not want to share their data...... provider with computations. Experimental results clearly indicate that the work we present is an efficient way of deploying a privacy-preserving clustering algorithm in a distributed manner....

  7. Privacy in the Sharing Economy

    DEFF Research Database (Denmark)

    Ranzini, Giulia; Etter, Michael; Lutz, Christoph

    ’s digital services through providing recommendations to Europe’s institutions. The initial stage of this research project involves a set of three literature reviews of the state of research on three core topics in relation to the sharing economy: participation (1), privacy (2), and power (3). This piece...... is a literature review on the topic of privacy. It addresses key privacy challenges for different stakeholders in the sharing economy. Throughout, we use the term "consumers" to refer to users on the receiving end (e.g., Airbnb guests, Uber passengers), "providers" to refer to users on the providing end (e.......g., Airbnb hosts, Uber drivers) and "platforms" to refer to the mediating sites, apps and infrastructures matching consumers and providers (e.g., Airbnb, Uber)....

  8. 78 FR 54445 - Privacy Act Systems of Records; Phytosanitary Certificate Issuance and Tracking System

    Science.gov (United States)

    2013-09-04

    ... INFORMATION CONTACT: Mr. Christian B. Dellis, Export Services, Plant Health Programs, Plant Protection and... DEPARTMENT OF AGRICULTURE Office of the Secretary [Docket No. APHIS-2012-0104] Privacy Act Systems of Records; Phytosanitary Certificate Issuance and Tracking System AGENCY: Animal and Plant Health...

  9. 34 CFR 98.4 - Protection of students' privacy in examination, testing, or treatment.

    Science.gov (United States)

    2010-07-01

    ... 34 Education 1 2010-07-01 2010-07-01 false Protection of students' privacy in examination, testing, or treatment. 98.4 Section 98.4 Education Office of the Secretary, Department of Education STUDENT... are not directly related to academic instruction and that is designed to affect behavioral, emotional...

  10. 76 FR 4440 - Privacy Act of 1974; Report of Modified or Altered System of Records

    Science.gov (United States)

    2011-01-25

    ... DEPARTMENT OF HEALTH AND HUMAN SERVICES Centers for Disease Control and Prevention Privacy Act of....'' HHS is proposing to add the following Breach Response Routine Use Language to comply with the Office of Management and Budget (OMB) Memoranda (M) 07-16, Safeguarding Against and responding to the Breach...

  11. 76 FR 4460 - Privacy Act of 1974; Report of Modified or Altered System of Records

    Science.gov (United States)

    2011-01-25

    ... DEPARTMENT OF HEALTH AND HUMAN SERVICES Centers for Disease Control and Prevention Privacy Act of... the following Breach Response Routine Use Language to comply with the Office of Management and Budget (OMB) Memoranda (M) 07- 16, Safeguarding Against and responding to the Breach of Personally...

  12. 76 FR 4462 - Privacy Act of 1974; Report of Modified or Altered System of Records

    Science.gov (United States)

    2011-01-25

    ... DEPARTMENT OF HEALTH AND HUMAN SERVICES Centers for Disease Control and Prevention Privacy Act of... add the following Breach Response Routine Use Language to comply with the Office of Management and Budget (OMB) Memoranda (M) 07-16, Safeguarding Against and responding to the Breach of Personally...

  13. 76 FR 4474 - Privacy Act of 1974; Report of Modified or Altered System of Records

    Science.gov (United States)

    2011-01-25

    ... DEPARTMENT OF HEALTH AND HUMAN SERVICES Centers for Disease Control and Prevention Privacy Act of... Breach Response Routine Use Language to comply with the Office of Management and Budget (OMB) Memoranda (M) 07-16, Safeguarding Against and responding to the Breach of Personally Identifiable Information...

  14. 76 FR 4458 - Privacy Act of 1974; Report of Modified or Altered System of Records

    Science.gov (United States)

    2011-01-25

    ... DEPARTMENT OF HEALTH AND HUMAN SERVICES Centers for Disease Control and Prevention Privacy Act of... proposing to add the following Breach Response Routine Use Language to comply with the Office of Management and Budget (OMB) Memoranda (M) 07-16, Safeguarding Against and Responding to the Breach of Personally...

  15. 76 FR 4446 - Privacy Act of 1974; Report of Modified or Altered System of Records

    Science.gov (United States)

    2011-01-25

    ... DEPARTMENT OF HEALTH AND HUMAN SERVICES Centers for Disease Control and Prevention Privacy Act of... to add the following Breach Response Routine Use Language to comply with the Office of Management and Budget (OMB) Memoranda (M) 07-16, Safeguarding Against and responding to the Breach of Personally...

  16. 76 FR 4438 - Privacy Act of 1974; Report of Modified or Altered System of Records

    Science.gov (United States)

    2011-01-25

    ... DEPARTMENT OF HEALTH AND HUMAN SERVICES Centers for Disease Control and Prevention Privacy Act of... the following Breach Response Routine Use Language to comply with the Office of Management and Budget (OMB) Memoranda (M) 07-16, Safeguarding Against and responding to the Breach of Personally Identifiable...

  17. 76 FR 4449 - Privacy Act of 1974; Report of Modified or Altered System of Records

    Science.gov (United States)

    2011-01-25

    ... DEPARTMENT OF HEALTH AND HUMAN SERVICES Centers for Disease Control and Prevention Privacy Act of... Breach Response Routine Use Language to comply with the Office of Management and Budget (OMB) Memoranda (M) 07-16, Safeguarding Against and responding to the Breach of Personally Identifiable Information...

  18. 76 FR 31350 - Public Workshop; Privacy Compliance Basics and 2011 Developments

    Science.gov (United States)

    2011-05-31

    ... Privacy Act of 1974, as amended, the E-Government Act of 2002, Office of Management and Budget memoranda... telephone 703-235-0780; by facsimile 703-235-0442; or by e-mail at [email protected] . SUPPLEMENTARY INFORMATION... send an e-mail to [email protected] , with ``PRIVComplianceWorkshop'' in the subject line, and your full name...

  19. 75 FR 23274 - Privacy Act of 1974; Department of Homeland Security United States Immigration Customs and...

    Science.gov (United States)

    2010-05-03

    ... 1974; Department of Homeland Security United States Immigration Customs and Enforcement--011 Immigration and Enforcement Operational Records System of Records AGENCY: Privacy Office, DHS. ACTION: Notice... the Department of Homeland Security U.S. Immigration and Customs Enforcement is updating an existing...

  20. 75 FR 9238 - Privacy Act of 1974; Department of Homeland Security United States Immigration Customs and...

    Science.gov (United States)

    2010-03-01

    ... 1974; Department of Homeland Security United States Immigration Customs and Enforcement--011 Immigration and Enforcement Operational Records System of Records AGENCY: Privacy Office, DHS. ACTION: Notice... the Department of Homeland Security U.S. Immigration and Customs Enforcement is updating an existing...

  1. 78 FR 37775 - Privacy Act Systems of Records; Phytosanitary Certificate Issuance and Tracking System

    Science.gov (United States)

    2013-06-24

    ... DEPARTMENT OF AGRICULTURE Office of the Secretary [Docket No. APHIS-2012-0104] Privacy Act Systems of Records; Phytosanitary Certificate Issuance and Tracking System AGENCY: Animal and Plant Health... Health Inspection Service proposes to add a system of records to its inventory of records systems subject...

  2. 5 CFR 2606.106 - OGE employee Privacy Act rules of conduct and responsibilities.

    Science.gov (United States)

    2010-01-01

    ... 5 Administrative Personnel 3 2010-01-01 2010-01-01 false OGE employee Privacy Act rules of conduct and responsibilities. 2606.106 Section 2606.106 Administrative Personnel OFFICE OF GOVERNMENT ETHICS... requirement to inform each individual asked to supply information to be maintained in a system of records the...

  3. 78 FR 43890 - Privacy Act of 1974; Department of Homeland Security, Federal Emergency Management Agency-006...

    Science.gov (United States)

    2013-07-22

    ... titled, ``Department of Homeland Security/Federal Emergency Management Agency--006 Citizen Corps Database... DEPARTMENT OF HOMELAND SECURITY Office of the Secretary [Docket No. DHS-2013-0049] Privacy Act of 1974; Department of Homeland Security, Federal Emergency Management Agency--006 Citizen Corps Program...

  4. 78 FR 22522 - Privacy Act of 1974: New System of Records

    Science.gov (United States)

    2013-04-16

    ... System cannot access records through the biometric hand reader technology. RETENTION AND DISPOSAL: The... Privacy Act of 1974 (5 U.S.C. 552a), as amended, titled ``Biometric Verification System (CSOSA-20).'' This... Biometric Verification System allows individuals under supervision to electronically check-in for office...

  5. 77 FR 74913 - Privacy Act of 1974, as Amended; Computer Matching Program (Social Security Administration (SSA...

    Science.gov (United States)

    2012-12-18

    ...; Computer Matching Program (Social Security Administration (SSA)/Office of Personnel Management (OPM.... SUPPLEMENTARY INFORMATION: A. General The Computer Matching and Privacy Protection Act of 1988 (Public Law (Pub... computer matching involving the Federal government could be performed and adding certain protections for...

  6. Context-Aware Generative Adversarial Privacy

    Directory of Open Access Journals (Sweden)

    Chong Huang

    2017-12-01

    Full Text Available Preserving the utility of published datasets while simultaneously providing provable privacy guarantees is a well-known challenge. On the one hand, context-free privacy solutions, such as differential privacy, provide strong privacy guarantees, but often lead to a significant reduction in utility. On the other hand, context-aware privacy solutions, such as information theoretic privacy, achieve an improved privacy-utility tradeoff, but assume that the data holder has access to dataset statistics. We circumvent these limitations by introducing a novel context-aware privacy framework called generative adversarial privacy (GAP. GAP leverages recent advancements in generative adversarial networks (GANs to allow the data holder to learn privatization schemes from the dataset itself. Under GAP, learning the privacy mechanism is formulated as a constrained minimax game between two players: a privatizer that sanitizes the dataset in a way that limits the risk of inference attacks on the individuals’ private variables, and an adversary that tries to infer the private variables from the sanitized dataset. To evaluate GAP’s performance, we investigate two simple (yet canonical statistical dataset models: (a the binary data model; and (b the binary Gaussian mixture model. For both models, we derive game-theoretically optimal minimax privacy mechanisms, and show that the privacy mechanisms learned from data (in a generative adversarial fashion match the theoretically optimal ones. This demonstrates that our framework can be easily applied in practice, even in the absence of dataset statistics.

  7. Sexiled: Privacy Acquisition Strategies of College Roommates

    Science.gov (United States)

    Erlandson, Karen

    2014-01-01

    This study sought to understand how roommates make privacy bids in college residence halls. The results indicate that privacy for sexual activity is a problem for students living in college residence halls, as almost all participants (82%) reported having dealt with this issue. Two sets of responses were collected and analyzed: privacy acquisition…

  8. 31 CFR 0.216 - Privacy Act.

    Science.gov (United States)

    2010-07-01

    ... 31 Money and Finance: Treasury 1 2010-07-01 2010-07-01 false Privacy Act. 0.216 Section 0.216... RULES OF CONDUCT Rules of Conduct § 0.216 Privacy Act. Employees involved in the design, development, operation, or maintenance of any system of records or in maintaining records subject to the Privacy Act of...

  9. 24 CFR 3280.107 - Interior privacy.

    Science.gov (United States)

    2010-04-01

    ... 24 Housing and Urban Development 5 2010-04-01 2010-04-01 false Interior privacy. 3280.107 Section 3280.107 Housing and Urban Development Regulations Relating to Housing and Urban Development (Continued... privacy. Bathroom and toilet compartment doors shall be equipped with a privacy lock. ...

  10. Context-Aware Generative Adversarial Privacy

    Science.gov (United States)

    Huang, Chong; Kairouz, Peter; Chen, Xiao; Sankar, Lalitha; Rajagopal, Ram

    2017-12-01

    Preserving the utility of published datasets while simultaneously providing provable privacy guarantees is a well-known challenge. On the one hand, context-free privacy solutions, such as differential privacy, provide strong privacy guarantees, but often lead to a significant reduction in utility. On the other hand, context-aware privacy solutions, such as information theoretic privacy, achieve an improved privacy-utility tradeoff, but assume that the data holder has access to dataset statistics. We circumvent these limitations by introducing a novel context-aware privacy framework called generative adversarial privacy (GAP). GAP leverages recent advancements in generative adversarial networks (GANs) to allow the data holder to learn privatization schemes from the dataset itself. Under GAP, learning the privacy mechanism is formulated as a constrained minimax game between two players: a privatizer that sanitizes the dataset in a way that limits the risk of inference attacks on the individuals' private variables, and an adversary that tries to infer the private variables from the sanitized dataset. To evaluate GAP's performance, we investigate two simple (yet canonical) statistical dataset models: (a) the binary data model, and (b) the binary Gaussian mixture model. For both models, we derive game-theoretically optimal minimax privacy mechanisms, and show that the privacy mechanisms learned from data (in a generative adversarial fashion) match the theoretically optimal ones. This demonstrates that our framework can be easily applied in practice, even in the absence of dataset statistics.

  11. Enhancing Privacy for Digital Rights Management

    NARCIS (Netherlands)

    Petkovic, M.; Conrado, C.; Schrijen, G.J.; Jonker, Willem

    2007-01-01

    This chapter addresses privacy issues in DRM systems. These systems provide a means of protecting digital content, but may violate the privacy of users in that the content they purchase and their actions in the system can be linked to specific users. The chapter proposes a privacy-preserving DRM

  12. Access to Information and Privacy | IDRC - International ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    As a Crown corporation, IDRC is subject to Canada's laws on access to information and privacy protection. The following resources will help you learn more about IDRC and the access to information and privacy acts, including instructions for submitting an access to information or privacy act (ATIP) request. IDRC and ATIP ...

  13. Smartdata privacy meets evolutionary robotics

    CERN Document Server

    Harvey, Inman; Tomko, George

    2013-01-01

    Privacy by Design and the Promise of SmartData.- SmartData: the Need, the Goal and the Challenge.- Perspectives on Artificial Intelligence.- Context dependent information processing entails scale-free dynamics.- Philosophy and SmartData.- Relevance Realization and the Neurodynamics and Neural Connectivity of General Intelligence.- What Matters: Real Bodies and Virtual Worlds.- The development of autonomous virtual agents.- Patterns of Attractors in the "Brain"".- A Privacy-Enabled Mobile Computing Model Using Intelligent Cloud-Based Services.- Unconstraint the Population: the Benefits of Horiz

  14. Preserving Employee Privacy in Wellness.

    Science.gov (United States)

    Terry, Paul E

    2017-07-01

    The proposed "Preserving Employee Wellness Programs Act" states that the collection of information about the manifested disease or disorder of a family member shall not be considered an unlawful acquisition of genetic information. The bill recognizes employee privacy protections that are already in place and includes specific language relating to nondiscrimination based on illness. Why did legislation expressly intending to "preserve wellness programs" generate such antipathy about wellness among journalists? This article argues that those who are committed to preserving employee wellness must be equally committed to preserving employee privacy. Related to this, we should better parse between discussions and rules about commonplace health screenings versus much less common genetic testing.

  15. Location Privacy with Randomness Consistency

    Directory of Open Access Journals (Sweden)

    Wu Hao

    2016-10-01

    Full Text Available Location-Based Social Network (LBSN applications that support geo-location-based posting and queries to provide location-relevant information to mobile users are increasingly popular, but pose a location-privacy risk to posts. We investigated existing LBSNs and location privacy mechanisms, and found a powerful potential attack that can accurately locate users with relatively few queries, even when location data is well secured and location noise is applied. Our technique defeats previously proposed solutions including fake-location detection and query rate limits.

  16. Origin and evolution of the Office of Environmental Restoration and Waste Management programmatic environmental impact statement

    International Nuclear Information System (INIS)

    Strider, P.; Huizenga, D.

    1993-01-01

    Prior to November 1989, the diverse environmental restoration and waste management activities of the U.S. Department of Energy (DOE) were the responsibility of the various line organizations, which had the primary missions of weapons production, research, and related departmental activities. At that time, Secretary of Energy Admiral James Watkins saw the need to establish the Office of Environmental Restoration and Waste Management (EM), which consolidated those activities under a single management structure

  17. Privacy context model for dynamic privacy adaptation in ubiquitous computing

    NARCIS (Netherlands)

    Schaub, Florian; Koenings, Bastian; Dietzel, Stefan; Weber, M.; Kargl, Frank

    Ubiquitous computing is characterized by the merger of physical and virtual worlds as physical artifacts gain digital sensing, processing, and communication capabilities. Maintaining an appropriate level of privacy in the face of such complex and often highly dynamic systems is challenging. We argue

  18. Nuclear safeguards surveys as performed by the Albuquerque operations office

    International Nuclear Information System (INIS)

    Jewell, D.

    1987-01-01

    The nuclear safeguards survey program as administered by the Albuquerque Operations Office (AL) is comprehensive in scope and evaluates the facility's safeguards program for an entire appraisal period. The survey program focuses on both the integrated and graded safeguards concepts and includes both compliance and performance evaluations. The program utilizes independent measurement support to verify facility inventory values and measurement system capabilities. The AL survey program is oriented towards facility development and management as opposed to development and management by numerous detailed departmental directives

  19. The benefits, risks and costs of privacy: patient preferences and willingness to pay.

    Science.gov (United States)

    Trachtenbarg, David E; Asche, Carl; Ramsahai, Shweta; Duling, Joy; Ren, Jinma

    2017-05-01

    Multiple surveys show that patients want medical privacy; however, there are costs to maintaining privacy. There are also risks if information is not shared. A review of previous surveys found that most surveys asked questions about patient's privacy concerns and willingness to share their medical information. We found only one study that asked about sharing medical information for better care and no survey that asked patients about the risk, cost or comparison between medical privacy and privacy in other areas. To fill this gap, we designed a survey to: (1) compare medical privacy preferences to privacy preferences in other areas; (2) measure willingness to pay the cost of additional privacy measures; and (3) measure willingness to accept the risks of not sharing information. A total of 834 patients attending physician offices at 14 sites completed all or part of an anonymous questionnaire. Over 95% of patients were willing to share all their medical information with their treating physicians. There was no difference in willingness to share between primary care and specialty sites including psychiatry and an HIV clinic. In our survey, there was no difference in sharing preference between standard medical information and information with additional legal protections including genetic testing, drug/alcohol treatment and HIV results. Medical privacy was ranked lower than sharing social security and credit card numbers, but was deemed more private than other information including tax returns and handgun purchases. There was no statistical difference for any questions by site except for HIV/AIDS clinic patients ranking privacy of the medical record more important than reducing high medical costs and risk of medical errors (p risks to keep medical information hidden. Patients were very willing to share medical information with their providers. They were able to see the importance of sharing medical information to provide the best possible care. They were unwilling to

  20. Online Privacy as a Corporate Social Responsibility

    DEFF Research Database (Denmark)

    Pollach, Irene

    2011-01-01

    Information technology and the Internet have added a new stakeholder concern to the corporate social responsibility agenda: online privacy. While theory suggests that online privacy is a corporate social responsibility, only very few studies in the business ethics literature have connected...... of the companies have comprehensive privacy programs, although more than half of them voice moral or relational motives for addressing online privacy. The privacy measures they have taken are primarily compliance measures, while measures that stimulate a stakeholder dialogue are rare. Overall, a wide variety...

  1. The Regulatory Framework for Privacy and Security

    Science.gov (United States)

    Hiller, Janine S.

    The internet enables the easy collection of massive amounts of personally identifiable information. Unregulated data collection causes distrust and conflicts with widely accepted principles of privacy. The regulatory framework in the United States for ensuring privacy and security in the online environment consists of federal, state, and self-regulatory elements. New laws have been passed to address technological and internet practices that conflict with privacy protecting policies. The United States and the European Union approaches to privacy differ significantly, and the global internet environment will likely cause regulators to face the challenge of balancing privacy interests with data collection for many years to come.

  2. Adding Query Privacy to Robust DHTs

    DEFF Research Database (Denmark)

    Backes, Michael; Goldberg, Ian; Kate, Aniket

    2011-01-01

    intermediate peers that (help to) route the queries towards their destinations. In this paper, we satisfy this requirement by presenting an approach for providing privacy for the keys in DHT queries. We use the concept of oblivious transfer (OT) in communication over DHTs to preserve query privacy without...... of obtaining query privacy over robust DHTs. Finally, we compare the performance of our privacy-preserving protocols with their more privacy-invasive counterparts. We observe that there is no increase in the message complexity and only a small overhead in the computational complexity....

  3. Fostering Change from Within: Influencing Teaching Practices of Departmental Colleagues by Science Faculty with Education Specialties.

    Science.gov (United States)

    Bush, Seth D; Rudd, James A; Stevens, Michael T; Tanner, Kimberly D; Williams, Kathy S

    2016-01-01

    Globally, calls for the improvement of science education are frequent and fervent. In parallel, the phenomenon of having Science Faculty with Education Specialties (SFES) within science departments appears to have grown in recent decades. In the context of an interview study of a randomized, stratified sample of SFES from across the United States, we discovered that most SFES interviewed (82%) perceived having professional impacts in the realm of improving undergraduate science education, more so than in research in science education or K-12 science education. While SFES reported a rich variety of efforts towards improving undergraduate science education, the most prevalent reported impact by far was influencing the teaching practices of their departmental colleagues. Since college and university science faculty continue to be hired with little to no training in effective science teaching, the seeding of science departments with science education specialists holds promise for fostering change in science education from within biology, chemistry, geoscience, and physics departments.

  4. 1998: BMBF expenditures for energy research. Draft of the departmental federal budget No. 30

    International Nuclear Information System (INIS)

    Anon.

    1997-01-01

    Departmental budget No. 30 in the 1998 draft federal budget covers the activities of the Federal Ministry for Education, Science, Research and Technology (BMBF). Its level of DM 14 950 million represents a 0,9% increase from the funds earmarked for the current year of 1997. DM 70 million is to be spent on safety research for nuclear plants, and DM 228 million has been planned for decommissioning and demolition of nuclear experimental and demonstration plants. The operation of, and investments into, the research centers are funded to the tune of DM 1307 million and DM 339 million, respectively. Institutions of basic research will receive DM 434 million, and renewable energies, economical energy uses, conversion and combustion technologies will be funded in the amount of DM 238 million. (orig.) [de

  5. Laying a Foundation for Comparing Departmental Structures between Reference and Instructional Services: Analysis of a Nationwide Survey.

    Science.gov (United States)

    Johnson, Kristin; Fountain, Kathleen Carlisle

    2002-01-01

    Describes a survey of midsized academic libraries that measured the departmental relationship between librarians who provide reference services and librarians who provide instructional services. Discusses satisfaction levels with various organizational arrangements as well as pros and cons of integrated or separate reference and instruction…

  6. Departmentalized, Self-Contained, or Somewhere in Between: Understanding Elementary Grade-Level Organizational Decision-Making

    Science.gov (United States)

    Parker, Audra; Rakes, Lori; Arndt, Katie

    2017-01-01

    Recent trends indicate a move away from self-contained classrooms and toward content-focused departmentalization in elementary schools. This study takes a snapshot of the existing organizational structures used in elementary schools in one district and explores administrators' beliefs and practices regarding this phenomenon. Our findings suggest…

  7. Self-Contained versus Departmentalized Settings in Urban Elementary Schools: An Analysis of Fifth-Grade Student Mathematics Performance

    Science.gov (United States)

    Jack, Diamond Marie

    2014-01-01

    Student achievement in mathematics, particularly in urban areas, is a consistent concern in the United States. Research suggests that teachers either are under qualified or have a negative perception of themselves as mathematics teachers. Departmentalization on the elementary level is an organizational structure that may benefit urban students and…

  8. The association of departmental leadership gender with that of faculty and residents in radiology.

    Science.gov (United States)

    Shah, Anand; Braga, Larissa; Braga-Baiak, Andresa; Jacobs, Danny O; Pietrobon, Ricardo

    2007-08-01

    Although the number of women graduating from medical school continues to increase, their representation in radiology residency programs has not increased over the past 10 years. We examined whether the gender of radiology faculty and residents differed according to the gender of the departmental leadership. We issued an anonymous Web-based survey via e-mail to all 188 radiology residency program directors listed in the Fellowship and Residency Electronic Interactive Database (FREIDA Online). Data regarding the gender of the department chairperson, residency program director, faculty, and residents were collected. The institutional review board granted a waiver for this study, and all subjects provided informed consent. Of the 84 program directors who responded, 9 (10.7%) were chaired by females and 75 (89.3%) by males; residency program director positions were held by 36 (42.9%) females and 48 (57.1%) males. More programs were located in the northeastern United States (n = 31, 36.9%) than in any other region, and more were self-described as academic (n = 36, 42.9%) than any other practice type. Programs that were led by a male chairperson had a similar proportion of female faculty (25.2% versus 27.3%; P = .322) and residents (26.2% versus 27.4%; P = .065) compared with those led by a female. Similarly, radiology departments with a male residency program director had a similar proportion of female residents (24.8% versus 28.7%; P = .055) compared with programs with a female residency program director. The gender composition of radiology faculty and residents does not differ significantly according to the gender of the departmental chairperson or residency program director. Nevertheless, there continues to be a disparity in the representation of women among radiology faculty and residents.

  9. Determining the privacy policy deficiencies of health ICT applications through semi-formal modelling.

    Science.gov (United States)

    Croll, Peter R

    2011-02-01

    To ensure that patient confidentiality is securely maintained, health ICT applications that contain sensitive personal information demand comprehensive privacy policies. Determining the adequacy of these policies to meet legal conformity together with clinical users and patient expectation is demanding in practice. Organisations and agencies looking to analyse their Privacy and Security policies can benefit from guidance provided by outside entities such as the Privacy Office of their State or Government together with law firms and ICT specialists. The advice given is not uniform and often open to different interpretations. Of greater concern is the possibility of overlooking any important aspects that later result in a data breach. Based on three case studies, this paper considers whether a more formal approach to privacy analysis could be taken that would help identify the full coverage of a Privacy Impact Analysis and determine the deficiencies with an organisation's current policies and approach. A diagrammatic model showing the relationships between Confidentiality, Privacy, Trust, Security and Safety is introduced. First the validity of this model is determined by mapping it against the real-world case studies taken from three healthcare services that depend on ICT. Then, by using software engineering methods, a formal mapping of the relationships is undertaken to identify a full set of policies needed to satisfy the model. How effective this approach may prove as a generic method for deriving a comprehensive set of policies in health ICT applications is finally discussed. Copyright © 2010 Elsevier Ireland Ltd. All rights reserved.

  10. Student Data Privacy Communications Toolkit

    Science.gov (United States)

    Foundation for Excellence in Education, 2016

    2016-01-01

    Parents expect school districts and schools to keep their children safe while they are in school. That expectation of safety and security also extends to the protection of their children's learning data. Therefore, it is critical that school districts and schools are open and transparent about their student data privacy practices, and that those…

  11. Privacy proof in the cloud

    NARCIS (Netherlands)

    Jessen, Veerle; Weigand, Hans; Mouratidis, Haris

    Cloud computing has been a frequently researched subject as it brings many advantages, such as the ability to store data remotely and scale rapidly, but also comes with several issues, including privacy, trust and security. The decision whether it is best to go `into the cloud' or to `stay inside'

  12. Patient privacy and social media.

    Science.gov (United States)

    Hader, Amy L; Brown, Evan D

    2010-08-01

    Healthcare providers using social media must remain mindful of professional boundaries and patients' privacy rights. Facebook and other online postings must comply with the Health Insurance Portability and Accountability Act of 1996 (HIPAA), applicable facility policy, state law, and AANA's Code of Ethics.

  13. Facebook: When Education Meets Privacy

    Science.gov (United States)

    Bruneel, Steven; De Wit, Kurt; Verhoeven, Jef C.; Elen, Jan

    2013-01-01

    The use of social networking sites (SNSs) has become commonplace amongst students. In this research, we aim to shed light upon the educational use and privacy issues on Facebook from the perspective of role theory and reference group theory. 15 bachelor students of the University of Leuven (KU Leuven) in Flanders, Belgium, were interviewed in…

  14. Privacy and Security: A Bibliography.

    Science.gov (United States)

    Computer and Business Equipment Manufacturers Association, Washington, DC.

    Compiled at random from many sources, this bibliography attempts to cite as many publications concerning privacy and security as are available. The entries are organized under seven headings: (1) systems security, technical security, clearance of personnel, (2) corporate physical security, (3) administrative security, (4) miscellaneous--privacy…

  15. Privacy in Online Social Networks

    NARCIS (Netherlands)

    Beye, Michael; Jeckmans, Arjan; Erkin, Zekeriya; Erkin, Zekeriya; Hartel, Pieter H.; Lagendijk, Reginald; Tang, Qiang; Abraham, A.

    Online Social Networks (OSNs) have become part of daily life for millions of users. Users building explicit networks that represent their social relationships and often share a wealth of personal information to their own benefit. The potential privacy risks of such behavior are often underestimated

  16. The European Approach to Privacy

    NARCIS (Netherlands)

    van Hoboken, J.

    2014-01-01

    This paper critically assesses the character of European (Union’s) privacy law and policy in the field of online media and electronic communications. Contrary to current understanding, this field of law is more fragmented and ill-developed than is often assumed, in particular by those discussing

  17. Biobanking and Privacy in India.

    Science.gov (United States)

    Chaturvedi, Sachin; Srinivas, Krishna Ravi; Muthuswamy, Vasantha

    2016-03-01

    Biobank-based research is not specifically addressed in Indian statutory law and therefore Indian Council for Medical Research guidelines are the primary regulators of biobank research in India. The guidelines allow for broad consent and for any level of identification of specimens. Although privacy is a fundamental right under the Indian Constitution, courts have limited this right when it conflicts with other rights or with the public interest. Furthermore, there is no established privacy test or actionable privacy right in the common law of India. In order to facilitate biobank-based research, both of these lacunae should be addressed by statutory law specifically addressing biobanking and more directly addressing the accompanying privacy concerns. A biobank-specific law should be written with international guidelines in mind, but harmonization with other laws should not be attempted until after India has created a law addressing biobank research within the unique legal and cultural environment of India. © 2016 American Society of Law, Medicine & Ethics.

  18. 78 FR 46256 - Privacy Act

    Science.gov (United States)

    2013-07-31

    ... FEDERAL ELECTION COMMISSION 11 CFR Part 1 Privacy Act CFR Correction In Title 11 of the Code of Federal Regulations, revised as of January 1, 2012, on page 5, in Sec. 1.2, the words ``95 and 96 of the Internal Revenue Code of 1954.'' are added at the end of the definition of Act. [FR Doc. 2013-18535 Filed 7...

  19. Privacy concerns in smart cities

    NARCIS (Netherlands)

    E.A. van Zoonen (Liesbet)

    2016-01-01

    textabstractIn this paper a framework is constructed to hypothesize if and how smart city technologies and urban big data produce privacy concerns among the people in these cities (as inhabitants, workers, visitors, and otherwise). The framework is built on the basis of two recurring dimensions in

  20. Protecting Your Child's Privacy Online

    Science.gov (United States)

    ... Keeping Up With Kids' Apps infographic Kids and Computer Security Kids and Mobile Phones Kids and Socializing Online ... email Looking for business guidance on privacy and ... The Federal Trade Commission (FTC) is the nation’s consumer protection agency. The FTC works to prevent fraudulent, deceptive ...

  1. Bridging the transatlantic divide in privacy

    Directory of Open Access Journals (Sweden)

    Paula Kift

    2013-08-01

    Full Text Available In the context of the US National Security Agency surveillance scandal, the transatlantic privacy divide has come back to the fore. In the United States, the right to privacy is primarily understood as a right to physical privacy, thus the protection from unwarranted government searches and seizures. In Germany on the other hand, it is also understood as a right to spiritual privacy, thus the right of citizens to develop into autonomous moral agents. The following article will discuss the different constitutional assumptions that underlie American and German attitudes towards privacy, namely privacy as an aspect of liberty or as an aspect of dignity. As data flows defy jurisdictional boundaries, however, policymakers across the Atlantic are faced with a conundrum: how can German and American privacy cultures be reconciled?

  2. Privacy information management for video surveillance

    Science.gov (United States)

    Luo, Ying; Cheung, Sen-ching S.

    2013-05-01

    The widespread deployment of surveillance cameras has raised serious privacy concerns. Many privacy-enhancing schemes have been proposed to automatically redact images of trusted individuals in the surveillance video. To identify these individuals for protection, the most reliable approach is to use biometric signals such as iris patterns as they are immutable and highly discriminative. In this paper, we propose a privacy data management system to be used in a privacy-aware video surveillance system. The privacy status of a subject is anonymously determined based on her iris pattern. For a trusted subject, the surveillance video is redacted and the original imagery is considered to be the privacy information. Our proposed system allows a subject to access her privacy information via the same biometric signal for privacy status determination. Two secure protocols, one for privacy information encryption and the other for privacy information retrieval are proposed. Error control coding is used to cope with the variability in iris patterns and efficient implementation is achieved using surrogate data records. Experimental results on a public iris biometric database demonstrate the validity of our framework.

  3. Information privacy fundamentals for librarians and information professionals

    CERN Document Server

    Givens, Cherie L

    2014-01-01

    This book introduces library and information professionals to information privacy, provides an overview of information privacy in the library and information science context, U.S. privacy laws by sector, information privacy policy, and key considerations when planning and creating a privacy program.

  4. 16 CFR 313.2 - Model privacy form and examples.

    Science.gov (United States)

    2010-01-01

    ... 16 Commercial Practices 1 2010-01-01 2010-01-01 false Model privacy form and examples. 313.2... PRIVACY OF CONSUMER FINANCIAL INFORMATION § 313.2 Model privacy form and examples. (a) Model privacy form..., although use of the model privacy form is not required. (b) Examples. The examples in this part are not...

  5. 12 CFR 716.2 - Model privacy form and examples.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 6 2010-01-01 2010-01-01 false Model privacy form and examples. 716.2 Section... PRIVACY OF CONSUMER FINANCIAL INFORMATION § 716.2 Model privacy form and examples. (a) Model privacy form..., although use of the model privacy form is not required. (b) Examples. The examples in this part are not...

  6. Location-Related Privacy in Geo-Social Networks

    DEFF Research Database (Denmark)

    Ruiz Vicente, Carmen; Freni, Dario; Bettini, Claudio

    2011-01-01

    -ins." However, this ability to reveal users' locations causes new privacy threats, which in turn call for new privacy-protection methods. The authors study four privacy aspects central to these social networks - location, absence, co-location, and identity privacy - and describe possible means of protecting...... privacy in these circumstances....

  7. 32 CFR 701.101 - Privacy program terms and definitions.

    Science.gov (United States)

    2010-07-01

    ... from a project on privacy issues, identifying and resolving the privacy risks, and approval by a... 32 National Defense 5 2010-07-01 2010-07-01 false Privacy program terms and definitions. 701.101... DEPARTMENT OF THE NAVY DOCUMENTS AFFECTING THE PUBLIC DON Privacy Program § 701.101 Privacy program terms and...

  8. 77 FR 57563 - Notice of Submission for OMB Review; Office of Planning, Evaluation and Policy Development...

    Science.gov (United States)

    2012-09-18

    ... Records Management Services, Office of Management, publishes this notice containing proposed information..., Director, Information Collection Clearance Division, Privacy, Information and Records Management Services, Office of Management. [FR Doc. 2012-22967 Filed 9-17-12; 8:45 am] BILLING CODE 4000-01-P ...

  9. 77 FR 28860 - Notice of Submission for OMB Review; Office of Elementary and Secondary Education; Application...

    Science.gov (United States)

    2012-05-16

    ... Records Management Services, Office of Management, publishes this notice containing proposed information... comment period notice will be the only public comment notice published for this information collection..., Privacy, Information and Records Management Services, Office of Management. [FR Doc. 2012-11821 Filed 5-15...

  10. 78 FR 56903 - Office of the Director, National Institutes of Health; Notice of Closed Meetings

    Science.gov (United States)

    2013-09-16

    ... clearly unwarranted invasion of personal privacy. Name of Committee: Office of Research Infrastructure Programs Special Emphasis Panel; Stem Cell SEP. Date: October 8-9, 2013. Time: 8:00 a.m. to 5:00 p.m...-0811, [email protected] . Name of Committee: Office of Research Infrastructure Programs Special...

  11. 5 CFR 297.402 - Disclosure pursuant to a compulsory legal process served on the Office.

    Science.gov (United States)

    2010-01-01

    ... 5 Administrative Personnel 1 2010-01-01 2010-01-01 false Disclosure pursuant to a compulsory legal process served on the Office. 297.402 Section 297.402 Administrative Personnel OFFICE OF PERSONNEL MANAGEMENT CIVIL SERVICE REGULATIONS PRIVACY PROCEDURES FOR PERSONNEL RECORDS Disclosure of Records § 297.402 Disclosure pursuant to a compulsory...

  12. 78 FR 68429 - Agency Information Collection Activities; Submission to the Office of Management and Budget for...

    Science.gov (United States)

    2013-11-14

    ...; Submission to the Office of Management and Budget for Review and Approval; Comment Request; Jacob K. Javits... undertake graduate study in selected fields in the arts, humanities, and social sciences leading to a... Collection Clearance Division, Privacy, Information and Records Management Services, Office of Management...

  13. Mail Office

    CERN Multimedia

    GS Department

    2009-01-01

    The Mail Office wishes to remind users that the CERN mail service is exclusively reserved for official CERN mail. All external official mail must be sent to the Mail Office in an unstamped envelope on which your name and Department must be clearly indicated below the official CERN address (see example) to help us to find you in the event that it cannot be delivered. If you wish to send private mail from the CERN site you must use the post offices at Meyrin (63-R-011) or Prévessin (866-R-C02). Please use "PRIORITY" envelopes only in the case of urgent mail. Any mail containing merchandise (i.e. anything other than documents) must be sent using an EDH shipping request form. INTERNAL MAIL Please remember to include the recipient’s MAILBOX number on the internal mail envelopes, either in the relevant box (new envelopes) or next to the name (old envelopes). This information, which can be found in the CERN PHONEBOOK, simplifies our t...

  14. Tales from the dark side: Privacy dark strategies and privacy dark patterns

    DEFF Research Database (Denmark)

    Bösch, Christoph; Erb, Benjamin; Kargl, Frank

    2016-01-01

    Privacy strategies and privacy patterns are fundamental concepts of the privacy-by-design engineering approach. While they support a privacy-aware development process for IT systems, the concepts used by malicious, privacy-threatening parties are generally less understood and known. We argue...... that understanding the “dark side”, namely how personal data is abused, is of equal importance. In this paper, we introduce the concept of privacy dark strategies and privacy dark patterns and present a framework that collects, documents, and analyzes such malicious concepts. In addition, we investigate from...... a psychological perspective why privacy dark strategies are effective. The resulting framework allows for a better understanding of these dark concepts, fosters awareness, and supports the development of countermeasures. We aim to contribute to an easier detection and successive removal of such approaches from...

  15. Privacy Protection: Mandating New Arrangements to Implement and Assess Federal Privacy Policy and Practice

    National Research Council Canada - National Science Library

    Relyea, Harold C

    2004-01-01

    When Congress enacted the Privacy Act of 1974, it established a temporary national study commission to conduct a comprehensive assessment of privacy policy and practice in both the public and private...

  16. Privacy and security in teleradiology

    International Nuclear Information System (INIS)

    Ruotsalainen, Pekka

    2010-01-01

    Teleradiology is probably the most successful eHealth service available today. Its business model is based on the remote transmission of radiological images (e.g. X-ray and CT-images) over electronic networks, and on the interpretation of the transmitted images for diagnostic purpose. Two basic service models are commonly used teleradiology today. The most common approach is based on the message paradigm (off-line model), but more developed teleradiology systems are based on the interactive use of PACS/RIS systems. Modern teleradiology is also more and more cross-organisational or even cross-border service between service providers having different jurisdictions and security policies. This paper defines the requirements needed to make different teleradiology models trusted. Those requirements include a common security policy that covers all partners and entities, common security and privacy protection principles and requirements, controlled contracts between partners, and the use of security controls and tools that supporting the common security policy. The security and privacy protection of any teleradiology system must be planned in advance, and the necessary security and privacy enhancing tools should be selected (e.g. strong authentication, data encryption, non-repudiation services and audit-logs) based on the risk analysis and requirements set by the legislation. In any case the teleradiology system should fulfil ethical and regulatory requirements. Certification of the whole teleradiology service system including security and privacy is also proposed. In the future, teleradiology services will be an integrated part of pervasive eHealth. Security requirements for this environment including dynamic and context aware security services are also discussed in this paper.

  17. Trust and Privacy in Healthcare

    Science.gov (United States)

    Singleton, Peter; Kalra, Dipak

    This paper considers issues of trust and privacy in healthcare around increased data-sharing through Electronic Health Records (EHRs). It uses a model structured around different aspects of trust in the healthcare organisation’s reasons for greater data-sharing and their ability to execute EHR projects, particularly any associated confidentiality controls. It reflects the individual’s personal circumstances and attitude to use of health records.

  18. Privacy and security in teleradiology

    Energy Technology Data Exchange (ETDEWEB)

    Ruotsalainen, Pekka [National Institute for Health and Welfare, Helsinki (Finland)], E-mail: pekka.ruotsalainen@THL.fi

    2010-01-15

    Teleradiology is probably the most successful eHealth service available today. Its business model is based on the remote transmission of radiological images (e.g. X-ray and CT-images) over electronic networks, and on the interpretation of the transmitted images for diagnostic purpose. Two basic service models are commonly used teleradiology today. The most common approach is based on the message paradigm (off-line model), but more developed teleradiology systems are based on the interactive use of PACS/RIS systems. Modern teleradiology is also more and more cross-organisational or even cross-border service between service providers having different jurisdictions and security policies. This paper defines the requirements needed to make different teleradiology models trusted. Those requirements include a common security policy that covers all partners and entities, common security and privacy protection principles and requirements, controlled contracts between partners, and the use of security controls and tools that supporting the common security policy. The security and privacy protection of any teleradiology system must be planned in advance, and the necessary security and privacy enhancing tools should be selected (e.g. strong authentication, data encryption, non-repudiation services and audit-logs) based on the risk analysis and requirements set by the legislation. In any case the teleradiology system should fulfil ethical and regulatory requirements. Certification of the whole teleradiology service system including security and privacy is also proposed. In the future, teleradiology services will be an integrated part of pervasive eHealth. Security requirements for this environment including dynamic and context aware security services are also discussed in this paper.

  19. Fictional privacy among Facebook users.

    Science.gov (United States)

    Lemieux, Robert

    2012-08-01

    The current study involved the creation of a fictional Facebook account with limited information and was designed to assess whether participants would accept the friendship of an ambiguous, unknown person. Results indicated that 325 Facebook members (72% of the sample) willingly accepted the friendship of the unknown individual. Results are discussed in relation to privacy concerns, norms of reciprocity, and allowing access to potentially embarrassing information and/or pictures.

  20. Privacy and security in teleradiology.

    Science.gov (United States)

    Ruotsalainen, Pekka

    2010-01-01

    Teleradiology is probably the most successful eHealth service available today. Its business model is based on the remote transmission of radiological images (e.g. X-ray and CT-images) over electronic networks, and on the interpretation of the transmitted images for diagnostic purpose. Two basic service models are commonly used teleradiology today. The most common approach is based on the message paradigm (off-line model), but more developed teleradiology systems are based on the interactive use of PACS/RIS systems. Modern teleradiology is also more and more cross-organisational or even cross-border service between service providers having different jurisdictions and security policies. This paper defines the requirements needed to make different teleradiology models trusted. Those requirements include a common security policy that covers all partners and entities, common security and privacy protection principles and requirements, controlled contracts between partners, and the use of security controls and tools that supporting the common security policy. The security and privacy protection of any teleradiology system must be planned in advance, and the necessary security and privacy enhancing tools should be selected (e.g. strong authentication, data encryption, non-repudiation services and audit-logs) based on the risk analysis and requirements set by the legislation. In any case the teleradiology system should fulfil ethical and regulatory requirements. Certification of the whole teleradiology service system including security and privacy is also proposed. In the future, teleradiology services will be an integrated part of pervasive eHealth. Security requirements for this environment including dynamic and context aware security services are also discussed in this paper. Copyright (c) 2009 Elsevier Ireland Ltd. All rights reserved.

  1. Online Tracking Technologies and Web Privacy:Technologieën voor Online volgen en Web Privacy

    OpenAIRE

    Acar, Mustafa Gunes Can

    2017-01-01

    In my PhD thesis, I would like to study the problem of online privacy with a focus on Web and mobile applications. Key research questions to be addressed by my study are the following: How can we formalize and quantify web tracking? What are the threats presented against privacy by different tracking techniques such as browser fingerprinting and cookie based tracking? What kind of privacy enhancing technologies (PET) can be used to ensure privacy without degrading service quality? The stud...

  2. Gender and online privacy among teens: risk perception, privacy concerns, and protection behaviors.

    Science.gov (United States)

    Youn, Seounmi; Hall, Kimberly

    2008-12-01

    Survey data from 395 high school students revealed that girls perceive more privacy risks and have a higher level of privacy concerns than boys. Regarding privacy protection behaviors, boys tended to read unsolicited e-mail and register for Web sites while directly sending complaints in response to unsolicited e-mail. This study found girls to provide inaccurate information as their privacy concerns increased. Boys, however, refrained from registering to Web sites as their concerns increased.

  3. Portrait of a Privacy Invasion

    Directory of Open Access Journals (Sweden)

    Shoshitaishvili Yan

    2015-04-01

    Full Text Available The popularity of online social networks has changed the way in which we share personal thoughts, political views, and pictures. Pictures have a particularly important role in the privacy of users, as they can convey substantial information (e.g., a person was attending an event, or has met with another person. Moreover, because of the nature of social networks, it has become increasingly difficult to control who has access to which content. Therefore, when a substantial amount of pictures are accessible to one party, there is a very serious potential for violations of the privacy of users. In this paper, we demonstrate a novel technique that, given a large corpus of pictures shared on a social network, automatically determines who is dating whom, with reasonable precision. More specifically, our approach combines facial recognition, spatial analysis, and machine learning techniques to determine pairs that are dating. To the best of our knowledge, this is the first privacy attack of this kind performed on social networks. We implemented our approach in a tool, called Creepic, and evaluated it on two real-world datasets. The results show that it is possible to automatically extract non-obvious, and nondisclosed, relationships between people represented in a group of pictures, even when the people involved are not directly part of a connected social clique.

  4. Distributed privacy preserving data collection

    KAUST Repository

    Xue, Mingqiang

    2011-01-01

    We study the distributed privacy preserving data collection problem: an untrusted data collector (e.g., a medical research institute) wishes to collect data (e.g., medical records) from a group of respondents (e.g., patients). Each respondent owns a multi-attributed record which contains both non-sensitive (e.g., quasi-identifiers) and sensitive information (e.g., a particular disease), and submits it to the data collector. Assuming T is the table formed by all the respondent data records, we say that the data collection process is privacy preserving if it allows the data collector to obtain a k-anonymized or l-diversified version of T without revealing the original records to the adversary. We propose a distributed data collection protocol that outputs an anonymized table by generalization of quasi-identifier attributes. The protocol employs cryptographic techniques such as homomorphic encryption, private information retrieval and secure multiparty computation to ensure the privacy goal in the process of data collection. Meanwhile, the protocol is designed to leak limited but non-critical information to achieve practicability and efficiency. Experiments show that the utility of the anonymized table derived by our protocol is in par with the utility achieved by traditional anonymization techniques. © 2011 Springer-Verlag.

  5. PRIVACY PROTECTION PROBLEMS IN SOCIAL NETWORKS

    OpenAIRE

    OKUR, M. Cudi

    2011-01-01

    Protecting privacy has become a major concern for most social network users because of increased difficulties of controlling the online data. This article presents an assessment of the common privacy related risks of social networking sites. Open and hidden privacy risks of active and passive online profiles are examined and increasing share of social networking in these phenomena is discussed. Inadequacy of available legal and institutional protection is demonstrated and the effectiveness of...

  6. Facebook: Personality and privacy on profiles

    OpenAIRE

    Casado Riera, Carla; Oberst, Ursula; Carbonell, Xavier

    2015-01-01

    The aim of this study was to study the possible relationship between the privacy settings in Facebook profiles and two personality dimensions, extraversion and neuroticism, in relation to gender. The Privacy on Facebook Questionnaire and the Eysenck Personality Inventory was applied to a sample of 92 womenand 70 men, all users of Facebook. No significant relationship was found between extraversion or neuroticism and the privacy settings of Facebook profiles, but the results showed significant...

  7. Toward sensitive document release with privacy guarantees

    OpenAIRE

    David Sánchez; Montserrat Batet

    2017-01-01

    Toward sensitive document release with privacy guarantees DOI: 10.1016/j.engappai.2016.12.013 URL: http://www.sciencedirect.com/science/article/pii/S0952197616302408 Filiació URV: SI Inclòs a la memòria: SI Privacy has become a serious concern for modern Information Societies. The sensitive nature of much of the data that are daily exchanged or released to untrusted parties requires that responsible organizations undertake appropriate privacy protection measures. Nowadays, much...

  8. An Alternative View of Privacy on Facebook

    Directory of Open Access Journals (Sweden)

    Christian Fuchs

    2011-02-01

    Full Text Available The predominant analysis of privacy on Facebook focuses on personal information revelation. This paper is critical of this kind of research and introduces an alternative analytical framework for studying privacy on Facebook, social networking sites and web 2.0. This framework is connecting the phenomenon of online privacy to the political economy of capitalism—a focus that has thus far been rather neglected in research literature about Internet and web 2.0 privacy. Liberal privacy philosophy tends to ignore the political economy of privacy in capitalism that can mask socio-economic inequality and protect capital and the rich from public accountability. Facebook is in this paper analyzed with the help of an approach, in which privacy for dominant groups, in regard to the ability of keeping wealth and power secret from the public, is seen as problematic, whereas privacy at the bottom of the power pyramid for consumers and normal citizens is seen as a protection from dominant interests. Facebook’s privacy concept is based on an understanding that stresses self-regulation and on an individualistic understanding of privacy. The theoretical analysis of the political economy of privacy on Facebook in this paper is based on the political theories of Karl Marx, Hannah Arendt and Jürgen Habermas. Based on the political economist Dallas Smythe’s concept of audience commodification, the process of prosumer commodification on Facebook is analyzed. The political economy of privacy on Facebook is analyzed with the help of a theory of drives that is grounded in Herbert Marcuse’s interpretation of Sigmund Freud, which allows to analyze Facebook based on the concept of play labor (= the convergence of play and labor.

  9. Security measures required for HIPAA privacy.

    Science.gov (United States)

    Amatayakul, M

    2000-01-01

    HIPAA security requirements include administrative, physical, and technical services and mechanisms to safeguard confidentiality, availability, and integrity of health information. Security measures, however, must be implemented in the context of an organization's privacy policies. Because HIPAA's proposed privacy rules are flexible and scalable to account for the nature of each organization's business, size, and resources, each organization will be determining its own privacy policies within the context of the HIPAA requirements and its security capabilities. Security measures cannot be implemented in a vacuum.

  10. A Model-Based Privacy Compliance Checker

    OpenAIRE

    Siani Pearson; Damien Allison

    2009-01-01

    Increasingly, e-business organisations are coming under pressure to be compliant to a range of privacy legislation, policies and best practice. There is a clear need for high-level management and administrators to be able to assess in a dynamic, customisable way the degree to which their enterprise complies with these. We outline a solution to this problem in the form of a model-driven automated privacy process analysis and configuration checking system. This system models privacy compliance ...

  11. Privacy Preservation in Distributed Subgradient Optimization Algorithms

    OpenAIRE

    Lou, Youcheng; Yu, Lean; Wang, Shouyang

    2015-01-01

    Privacy preservation is becoming an increasingly important issue in data mining and machine learning. In this paper, we consider the privacy preserving features of distributed subgradient optimization algorithms. We first show that a well-known distributed subgradient synchronous optimization algorithm, in which all agents make their optimization updates simultaneously at all times, is not privacy preserving in the sense that the malicious agent can learn other agents' subgradients asymptotic...

  12. Negotiating privacy in surveillant welfare relations

    DEFF Research Database (Denmark)

    Andersen, Lars Bo; Lauritsen, Peter; Bøge, Ask Risom

    . However, while privacy is central to debates of surveillance, it has proven less productive as an analytical resource for studying surveillance in practice. Consequently, this paper reviews different conceptualisations of privacy in relation to welfare and surveillance and argues for strengthening...... the analytical capacity of the concept by rendering it a situated and relational concept. The argument is developed through a research and design project called Teledialogue meant to improve the relation between case managers and children placed at institutions or in foster families. Privacy in Teledialogue...... notion of privacy are discussed in relation to both research- and public debates on surveillance in a welfare setting....

  13. Analysis of Privacy on Social Networks

    OpenAIRE

    Tomandl, Luboš

    2015-01-01

    This thesis deals with a question of privacy in a context of social networks. The main substance of these services is the users' option to share an information about their lives. This alone can be a problem for privacy. In the first part of this thesis concentrates on the meaning of privacy as well as its value for both individuals and the society. In the next part the privacy threats on social networks, namely Facebook, are discussed. These threats are disclosed on four levels according to f...

  14. Privacy Protection Research of Mobile RFID

    Institute of Scientific and Technical Information of China (English)

    2007-01-01

    Radio Frequency Identification is one of the most controversial technologies at present.It is very difficult to detect who reads a tag incorporated into products owned by a person,a significant concern to privacy threats in RFID system arises from this reason.User privacy problem is prior considersion for mobile RFID service,because most mobile RFID service based on end-user service.Propose a solution for user privacy protection,which is a modification of EPC Class 1 Generation 2 protocol,and introduce a privacy protection scenario for mobile RFID service using this method.

  15. Location privacy protection in mobile networks

    CERN Document Server

    Liu, Xinxin

    2013-01-01

    This SpringerBrief analyzes the potential privacy threats in wireless and mobile network environments, and reviews some existing works. It proposes multiple privacy preserving techniques against several types of privacy threats that are targeting users in a mobile network environment. Depending on the network architecture, different approaches can be adopted. The first proposed approach considers a three-party system architecture where there is a trusted central authority that can be used to protect users? privacy. The second approach considers a totally distributed environment where users per

  16. Customer privacy on UK healthcare websites.

    Science.gov (United States)

    Mundy, Darren P

    2006-09-01

    Privacy has been and continues to be one of the key challenges of an age devoted to the accumulation, processing, and mining of electronic information. In particular, privacy of healthcare-related information is seen as a key issue as health organizations move towards the electronic provision of services. The aim of the research detailed in this paper has been to analyse privacy policies on popular UK healthcare-related websites to determine the extent to which consumer privacy is protected. The author has combined approaches (such as approaches focused on usability, policy content, and policy quality) used in studies by other researchers on e-commerce and US healthcare websites to provide a comprehensive analysis of UK healthcare privacy policies. The author identifies a wide range of issues related to the protection of consumer privacy through his research analysis using quantitative results. The main outcomes from the author's research are that only 61% of healthcare-related websites in their sample group posted privacy policies. In addition, most of the posted privacy policies had poor readability standards and included a variety of privacy vulnerability statements. Overall, the author's findings represent significant current issues in relation to healthcare information protection on the Internet. The hope is that raising awareness of these results will drive forward changes in the industry, similar to those experienced with information quality.

  17. Extending SQL to Support Privacy Policies

    Science.gov (United States)

    Ghazinour, Kambiz; Pun, Sampson; Majedi, Maryam; Chinaci, Amir H.; Barker, Ken

    Increasing concerns over Internet applications that violate user privacy by exploiting (back-end) database vulnerabilities must be addressed to protect both customer privacy and to ensure corporate strategic assets remain trustworthy. This chapter describes an extension onto database catalogues and Structured Query Language (SQL) for supporting privacy in Internet applications, such as in social networks, e-health, e-governmcnt, etc. The idea is to introduce new predicates to SQL commands to capture common privacy requirements, such as purpose, visibility, generalization, and retention for both mandatory and discretionary access control policies. The contribution is that corporations, when creating the underlying databases, will be able to define what their mandatory privacy policies arc with which all application users have to comply. Furthermore, each application user, when providing their own data, will be able to define their own privacy policies with which other users have to comply. The extension is supported with underlying catalogues and algorithms. The experiments demonstrate a very reasonable overhead for the extension. The result is a low-cost mechanism to create new systems that arc privacy aware and also to transform legacy databases to their privacy-preserving equivalents. Although the examples arc from social networks, one can apply the results to data security and user privacy of other enterprises as well.

  18. Toward Privacy-Preserving Personalized Recommendation Services

    Directory of Open Access Journals (Sweden)

    Cong Wang

    2018-02-01

    Full Text Available Recommendation systems are crucially important for the delivery of personalized services to users. With personalized recommendation services, users can enjoy a variety of targeted recommendations such as movies, books, ads, restaurants, and more. In addition, personalized recommendation services have become extremely effective revenue drivers for online business. Despite the great benefits, deploying personalized recommendation services typically requires the collection of users’ personal data for processing and analytics, which undesirably makes users susceptible to serious privacy violation issues. Therefore, it is of paramount importance to develop practical privacy-preserving techniques to maintain the intelligence of personalized recommendation services while respecting user privacy. In this paper, we provide a comprehensive survey of the literature related to personalized recommendation services with privacy protection. We present the general architecture of personalized recommendation systems, the privacy issues therein, and existing works that focus on privacy-preserving personalized recommendation services. We classify the existing works according to their underlying techniques for personalized recommendation and privacy protection, and thoroughly discuss and compare their merits and demerits, especially in terms of privacy and recommendation accuracy. We also identity some future research directions. Keywords: Privacy protection, Personalized recommendation services, Targeted delivery, Collaborative filtering, Machine learning

  19. Do Privacy Concerns Matter for Millennials?

    DEFF Research Database (Denmark)

    Fodor, Mark; Brem, Alexander

    2015-01-01

    data have raised the question, if location data are considered as sensitive data by users. Thus, we use two privacy concern models, namely Concern for Information Privacy (CFIP) and Internet Users’ Information Privacy Concerns (IUIPC) to find out. Our sample comprises of 235 individuals between 18...... and 34 years (Generation C) from Germany. The results of this study indicate that the second-order factor IUIPC showed better fit for the underlying data than CFIP did. Overall privacy concerns have been found to have an impact on behavioral intentions of users for LBS adoption. Furthermore, other risk...

  20. Vehicular ad hoc network security and privacy

    CERN Document Server

    Lin, X

    2015-01-01

    Unlike any other book in this area, this book provides innovative solutions to security issues, making this book a must read for anyone working with or studying security measures. Vehicular Ad Hoc Network Security and Privacy mainly focuses on security and privacy issues related to vehicular communication systems. It begins with a comprehensive introduction to vehicular ad hoc network and its unique security threats and privacy concerns and then illustrates how to address those challenges in highly dynamic and large size wireless network environments from multiple perspectives. This book is richly illustrated with detailed designs and results for approaching security and privacy threats.