WorldWideScience

Sample records for departmental offices privacy

  1. 76 FR 45336 - Departmental Offices; Privacy Act of 1974, as Amended; Systems of Records

    Science.gov (United States)

    2011-07-28

    ... notice of alterations to its Privacy Act systems of records entitled ``Treasury/DO .191--Human Resources... Resources and Administrative Records system,'' follow: Treasury/DO .191 System Name: Human Resources and... information is retrieved; designation of a new system manager and address; and new record source category......

  2. 75 FR 2188 - Departmental Offices; Privacy Act of 1974, as Amended

    Science.gov (United States)

    2010-01-14

    ... indication of a potential violation of civil or criminal law or regulation; (2) Disclose information to a... connection with criminal law proceedings; (3) Provide information to a congressional office in response to an... indication of a violation or potential violation of civil or criminal law or regulation; (2)...

  3. 75 FR 82427 - Departmental Offices; Privacy Act of 1974, as Amended

    Science.gov (United States)

    2010-12-30

    ... on Homeland Security and Governmental Affairs of the Senate, and the Office of Management and Budget... confirmed that the security or confidentiality of information in the system of records has been compromised... this system of records, or seeking to contest its content, may inquire in writing in accordance...

  4. 76 FR 64098 - Order of Succession for the Office of Departmental Operations and Coordination

    Science.gov (United States)

    2011-10-17

    ... URBAN DEVELOPMENT Order of Succession for the Office of Departmental Operations and Coordination AGENCY: Office of Departmental Operations and Coordination, HUD. ACTION: Notice of order of succession. SUMMARY: In this notice, the Director, Office of Departmental Operations and Coordination, Department...

  5. 31 CFR Appendix A to Subpart A of... - Departmental Offices

    Science.gov (United States)

    2010-07-01

    ... Offices 1. In general. This appendix applies to the Departmental Offices as defined in 31 CFR 1.1(a)(1). 2.... Requests for records. Initial determinations under 31 CFR 1.5(h) as to whether to grant requests for... to deny records. (i) Appellate determinations under 31 CFR 1.5(i) with respect to records of...

  6. 76 FR 64098 - Delegation of Authority for the Office of Departmental Operations and Coordination

    Science.gov (United States)

    2011-10-17

    ... notice, the Secretary delegates to the Director of Departmental Operations and Coordination authority and.... SUPPLEMENTARY INFORMATION: Section A. Authority Delegated The Secretary hereby delegates to the Director of... URBAN DEVELOPMENT Delegation of Authority for the Office of Departmental Operations and Coordination...

  7. 76 FR 36567 - Delegation of Authority for the Office of Departmental Equal Employment Opportunity

    Science.gov (United States)

    2011-06-22

    ..., the Secretary of HUD delegates concurrent authority to the Director and Deputy Director, Office of.... Authority Delegated The Secretary hereby delegates to the Director and Deputy Director, ODEEO concurrent... URBAN DEVELOPMENT Delegation of Authority for the Office of Departmental Equal Employment Opportunity...

  8. 76 FR 5250 - Departmental Offices; Proposed Collection; Comment Request

    Science.gov (United States)

    2011-01-28

    ... Wolkow, Office of International Monetary and Financial Policy, Department of the Treasury, Room 5422... International Monetary and Financial Policy. BILLING CODE 4810-25-P ... extension approval by the Office of Management and Budget. The Office of International Monetary and...

  9. 77 FR 42364 - Departmental Offices; Proposed Collection; Comment Request

    Science.gov (United States)

    2012-07-18

    ... collection that is due for extension approval by the Office of Management and Budget. The Terrorism Risk... currently approved data collection. Affected Public: Business/Financial Institutions. Estimated Number of... or by mail (if hard copy, preferably an original and two copies) to: Terrorism Risk Insurance Program...

  10. 77 FR 42363 - Departmental Offices; Proposed Collection; Comment Request

    Science.gov (United States)

    2012-07-18

    ... collection that is due for extension approval by the Office of Management and Budget. The Terrorism Risk.... Affected Public: Business/Financial Institutions. Estimated Number of Respondents: 24,200. Estimated....treas.gov or by mail (if hard copy, preferably an original and two copies) to: Terrorism Risk Insurance...

  11. 75 FR 18569 - Departmental Offices; Proposed Collection; Comment Request

    Science.gov (United States)

    2010-04-12

    ..., Public Law 104-13 (44 U.S.C. 3506(c)(2)(A)). Currently, the Office of Financial Stability (OFS) is... include bank holding companies, financial holding companies, insured depository institutions, credit... permissible for financial holding companies under relevant law. To qualify, the applicant must be...

  12. Design of Student Information Management Database Application System for Office and Departmental Target Responsibility System

    Science.gov (United States)

    Zhou, Hui

    It is the inevitable outcome of higher education reform to carry out office and departmental target responsibility system, in which statistical processing of student's information is an important part of student's performance review. On the basis of the analysis of the student's evaluation, the student information management database application system is designed by using relational database management system software in this paper. In order to implement the function of student information management, the functional requirement, overall structure, data sheets and fields, data sheet Association and software codes are designed in details.

  13. How Well Are We Respecting Patient Privacy in Medical Imaging? Lessons Learnt From a Departmental Audit.

    Science.gov (United States)

    Dilauro, Marc; Thornhill, Rebecca; Fasih, Najla

    2016-11-01

    Preservation of patient privacy and dignity are basic requirements for all patients visiting a hospital. The purpose of this study was to perform an audit of patients' satisfaction with privacy whilst in the Department of Medical Imaging (MI) at the Civic Campus of the Ottawa Hospital. Outpatients who underwent magnetic resonance imaging (MRI), computed tomography (CT), ultrasonography (US), and plain film (XR) examinations were provided with a survey on patient privacy. The survey asked participants to rank (on a 6-point scale ranging from 6 = excellent to 1 = no privacy) whether their privacy was respected in 5 key locations within the Department of MI. The survey was conducted over a consecutive 5-day period. A total of 502 surveys were completed. The survey response rate for each imaging modality was: 55% MRI, 42% CT, 45% US, and 47% XR. For each imaging modality, the total percentage of privacy scores greater than or equal to 5 were: 98% MRI, 96% CT, 94% US, and 92% XR. Privacy ratings for the MRI reception and waiting room areas were significantly higher in comparison to the other imaging modalities (P = .0025 and P = .0227, respectively). Overall, patient privacy was well respected within the Department of MI. Copyright © 2016 Canadian Association of Radiologists. Published by Elsevier Inc. All rights reserved.

  14. Perceived Speech Privacy in Computer Simulated Open-plan Offices

    DEFF Research Database (Denmark)

    Pop, Claudiu B.; Rindel, Jens Holger

    2005-01-01

    parameter that correlates well with the perceived degree of speech privacy and to derive a clear method for evaluating the acoustic conditions in open plan offices. Acoustic measurements were carried out in an open plan office, followed by data analysis at the Acoustic Department, DTU. A computer model......In open plan offices the lack of speech privacy between the workstations is one of the major acoustic problems. Improving the speech privacy in an open plan design is therefore the main concern for a successful open plan environment. The project described in this paper aimed to find an objective...... of the actual office was developed using the ODEON room acoustic software, and this allowed a systematic investigation of the possible influence of various acoustic conditions on the speech privacy. Four different versions of acoustic treatment of the office were used and three different distances from...

  15. Commentary: Mentoring the mentor: executive coaching for clinical departmental executive officers.

    Science.gov (United States)

    Geist, Lois J; Cohen, Michael B

    2010-01-01

    Departmental executive officers (DEOs), department chairs, and department heads in medical schools are often hired on the basis of their accomplishments in research as well as their skills in administration, management, and leadership. These individuals are also expected to be expert in multiple areas, including negotiation, finance and budgeting, mentoring, and personnel management. At the same time, they are expected to maintain and perhaps even enhance their personal academic standing for the purposes of raising the level of departmental and institutional prestige and for recruiting the next generation of physicians and scientists. In the corporate world, employers understand the importance of training new leaders in requisite skill enhancement that will lead to success in their new positions. These individuals are often provided with extensive executive training to develop the necessary competencies to make them successful leaders. Among the tools employed for this purpose are the use of personal coaches or executive training courses. The authors propose that the use of executive coaching in academic medicine may be of benefit for new DEOs. Experience using an executive coach suggests that this was a valuable growth experience for new leaders in the institution.

  16. Assessment of language impact to speech privacy in closed offices

    Science.gov (United States)

    Ma, Yong Ma; Caswell, Daryl J.; Dai, Liming; Goodchild, Jim T.

    2002-11-01

    Speech privacy is the opposite concept of speech intelligibility and can be assessed by the predictors of speech intelligibility. Based on the existing standards and the research to date, most objective assessments for speech privacy and speech intelligibility, such as articulation index (AI) or speech intelligibility index (SII), speech transmission index (STI), and sound early-to-late ratio (C50), are evaluated by the subjective measurements. However, these subject measurements are based on the studies of English or the other Western languages. The language impact to speech privacy has been overseen. It is therefore necessary to study the impact of different languages and accents in multiculturalism environments to speech privacy. In this study, subjective measurements were conducted in closed office environments by using English and a tonal language, Mandarin. Detailed investigations on the language impact to speech privacy were carried out with the two languages. The results of this study reveal the significant evaluation variations in speech privacy when different languages are used. The subjective measurement results obtained in this study were also compared with the objective measurement employing articulation indices.

  17. 5 CFR 293.202 - Records subject to Office or agency Privacy Act regulations.

    Science.gov (United States)

    2010-01-01

    ... Privacy Act regulations. 293.202 Section 293.202 Administrative Personnel OFFICE OF PERSONNEL MANAGEMENT... Records subject to Office or agency Privacy Act regulations. When the Office of Personnel Management publishes in the Federal Register a notice of system of records for personnel records which are...

  18. 76 FR 12745 - Privacy Act of 1974; Department of Homeland Security Office of Operations Coordination and...

    Science.gov (United States)

    2011-03-08

    ... and hair color; Distinguishing marks including scars, marks, and tattoos; Automobile registration... obtain forms for this purpose from the Chief Privacy Officer and Chief Freedom of Information Act...

  19. 76 FR 54190 - Proposed Privacy Act System of Records

    Science.gov (United States)

    2011-08-31

    ... Officer (OCIO), Departmental Management (DM). ACTION: Notice of Proposed Privacy Act System of Records... of Agriculture (USDA), OCIO gives notice of a new Privacy Act System of Records. DATES: This notice... Section (e)(4)(A). Purpose(s): The purpose of this system of records is to permit the USDA's OCIO...

  20. Employees' satisfaction as influenced by acoustic and visual privacy in the open office environment

    Science.gov (United States)

    Soules, Maureen Jeanette

    The purpose of this study was to examine the relationship between employees' acoustic and visual privacy issues and their perceived satisfaction in their open office work environments while in focus work mode. The study examined the Science Teaching Student Services Building at the University of Minnesota Minneapolis. The building houses instructional classrooms and administrative offices that service UMN students. The Sustainable Post-Occupancy Evaluation Survey was used to collect data on overall privacy conditions, acoustic and visual privacy conditions, and employees' perceived privacy conditions while in their primary workplace. Paired T-tests were used to analyze the relationships between privacy conditions and employees' perceptions of privacy. All hypotheses are supported indicating that the privacy variables are correlated to the employees' perception of satisfaction within the primary workplace. The findings are important because they can be used to inform business leaders, designers, educators and future research in the field of office design.

  1. 76 FR 560 - Office of Child Support Enforcement Privacy Act of 1974; System of Records

    Science.gov (United States)

    2011-01-05

    ... HUMAN SERVICES Administration for Children and Families Office of Child Support Enforcement Privacy Act... requirements of the Privacy Act of 1974 (5 U.S.C. 552a), as amended, the Office of Child Support Enforcement (OCSE) is publishing notice that it will rescind a notice of a system of records entitled ``Location...

  2. 76 FR 39978 - Departmental Offices; Privacy Act of 1974, as Amended

    Science.gov (United States)

    2011-07-07

    ..., there is a risk of harm to economic or property interests, identity theft or fraud, or harm to the... released for the purpose of its introduction to a grand jury, where the subpoena or request has been...

  3. 77 FR 8954 - Departmental Offices; Privacy Act of 1974, System of Records

    Science.gov (United States)

    2012-02-15

    ... a potential violation of civil or criminal law or regulation, rule or order. (2) These records may... becomes aware of an indication of a potential violation of civil or criminal law or regulation, rule...

  4. 76 FR 1507 - Departmental Offices; Privacy Act of 1974, as Amended

    Science.gov (United States)

    2011-01-10

    ... created of verbal communications by or with complainants or other individuals; (4) information regarding... identifying the entity that is subject to the complaint or inquiry; (6) communication with or by the entity... been issued non-transferrable access codes and passwords. Other records are maintained in locked...

  5. 77 FR 63416 - Senior Executive Service; Departmental Offices Performance Review Board Members

    Science.gov (United States)

    2012-10-16

    ... concerning proposed performance appraisals, ratings, bonuses and other appropriate personnel actions for... Resources and Chief Human Capital Officer Bynum, Nicole, Chief of Management Operations for the Office of.... Minor, Senior Human Resources Specialist, 1500 Pennsylvania Avenue NW., ATTN: Room 6W529, 6th...

  6. 76 FR 69797 - Senior Executive Service Departmental Offices Performance Review Board.

    Science.gov (United States)

    2011-11-09

    ... consist of at least three members. In the case of an appraisal of a career appointee, more than half the members shall consist of career appointees. The names and titles of the Board members are as follows..., Mark Anthony, Deputy Assistant Secretary for Accounting Policy Roth, Dorrice, Director, Office...

  7. Streamlining cross departmental interactions of back office processes in financial services

    NARCIS (Netherlands)

    Rutte, C.R.

    2011-01-01

    Due to the increased competitive environment in the retail banking industry, customer satisfaction and efficient back office processes have become more important. Lean Six Sigma (LSS) is a management style that is focused on improving processes and increasing customer satisfaction. Discrete-Event

  8. 78 FR 75447 - Senior Executive Service; Departmental Offices Performance Review Board

    Science.gov (United States)

    2013-12-11

    ... Secretary for Mid-East and Africa Banks, Carol, Director, Office of Accounting and Internal Controls Berry...., Deputy Assistant Secretary for Investment Security Kershbaum, Sharon, Deputy Assistant Secretary for..., Luyen, Director, Mid-East and North Africa DATES: Effective Date: Membership is effective on the date...

  9. Streamlining cross departmental interactions of back office processes in financial services

    NARCIS (Netherlands)

    Rutte, C.R.

    2011-01-01

    Due to the increased competitive environment in the retail banking industry, customer satisfaction and efficient back office processes have become more important. Lean Six Sigma (LSS) is a management style that is focused on improving processes and increasing customer satisfaction. Discrete-Event Si

  10. 76 FR 62035 - Privacy Act of 1974: Notice of Proposed Privacy Act System of Records Revision

    Science.gov (United States)

    2011-10-06

    ...In accordance with the requirements of the Privacy Act of 1974, as amended, the U.S. Department of Agriculture (USDA), Departmental Management (DM), Office of Homeland Security and Emergency Coordination (OHSEC), is giving notice of a system of records that is maintained for the purpose of the Radiation Safety Management System (RSMS). The RSMS was developed by the Radiation Safety Division, a......

  11. 75 FR 12557 - Office of Family Assistance; Privacy Act of 1974; System of Records

    Science.gov (United States)

    2010-03-16

    ... parties to submit written comments on the proposed system until April 14, 2010. As required by the Privacy...: Interested parties may submit written comment on this notice by writing to Robin Y. McDonald, Office of... Partnerships to provide supporting parties with information to promote a national discourse on...

  12. Privacy Impact Assessment for the Claims Office Master Files

    Science.gov (United States)

    The Claims Office Master Files System collects information on companies in debt to the EPA. Learn how this data is collected, how it will be used, access to the data, the purpose of data collection, and record retention policies for this data.

  13. 77 FR 22626 - Office of Privacy, Records, and Disclosure; Privacy Act of 1974, as Amended

    Science.gov (United States)

    2012-04-16

    ... Procurement Management Regulation requirements; to maintain a record of location of emergency equipment; to... Security and Governmental Affairs of the Senate, and the Office of Management and Budget, pursuant to... the suspected or confirmed compromise there is a risk of harm to economic or property...

  14. 75 FR 69689 - Privacy Act of 1974; Department of Homeland Security Office of Operations Coordination and...

    Science.gov (United States)

    2010-11-15

    ... or has taken place; Individuals participating with or involved in emergency management and first responder operations, with Departmental implications, and where activity is planned or has taken place...

  15. 6 CFR Appendix A to Part 5 - FOIA/Privacy Act Offices of the Department of Homeland Security

    Science.gov (United States)

    2010-01-01

    ... Security Administration, TSA-1, FOIA Division, 400 Seventh Street, SW., Washington, DC 20590 3. United... 6 Domestic Security 1 2010-01-01 2010-01-01 false FOIA/Privacy Act Offices of the Department of... follows: A. Former components of the Department of Agriculture: 1. Animal and Plant Health...

  16. 41 CFR 114-51.100 - Departmental Quarters Handbook.

    Science.gov (United States)

    2010-07-01

    ... Handbook. 114-51.100 Section 114-51.100 Public Contracts and Property Management Federal Property...-General § 114-51.100 Departmental Quarters Handbook. The Office of Acquisition and Property Management (PAM) has prepared the Departmental Quarters Handbook (DQH), 400 DM, which provides detailed guidelines...

  17. 75 FR 18837 - Office of Public Health and Science, Office of Minority Health; Privacy Act of 1974; Report of a...

    Science.gov (United States)

    2010-04-13

    ... HUMAN SERVICES Office of the Secretary Office of Public Health and Science, Office of Minority Health..., Office of the Secretary, Office of Public Health and Science, Office of Minority Health. ACTION: Notice... minority health information to public and professional audiences. In support of this purpose, this...

  18. Departmental Appeals Board Decisions

    Data.gov (United States)

    U.S. Department of Health & Human Services — Decisions issued by the Chair and Board Members of the Departmental Appeals Board concerning determinations in discretionary, project grant programs, including...

  19. 5 CFR 3801.103 - Designation of separate Departmental components.

    Science.gov (United States)

    2010-01-01

    ..., Inc.) Civil Division Civil Rights Division Community Relations Service Criminal Division Drug... Center Justice Management Division Office of Information and Privacy Office of Intelligence Policy and... Attorney Office of Policy Development Offices of the United States Attorney (94) (Each Office of the...

  20. 78 FR 42149 - Privacy Act; System of Records: State-53, Office of Inspector General Investigation Management...

    Science.gov (United States)

    2013-07-15

    ..., affidavits, banking and other financial records, medical records, and personnel and other employment-related... statutes, Executive Orders and the Code of Federal Regulations. These records may be disclosed as follows... Office of Inspector General Investigation Management System, State-53. POLICIES AND PRACTICES FOR STORING...

  1. 76 FR 67472 - Order of Succession for the Office of the Chief Information Officer

    Science.gov (United States)

    2011-11-01

    ... Cyber Security and Privacy, Office of the Chief Information Officer, Department of Housing and Urban... Operations; (3) Deputy Chief Information Officer, for Cyber Security and Privacy; (4) Deputy...

  2. Measures for assessing architectural speech security (privacy) of closed offices and meeting rooms

    Science.gov (United States)

    Gover, Bradford N.; Bradley, John S.

    2004-12-01

    Objective measures were investigated as predictors of the speech security of closed offices and rooms. A new signal-to-noise type measure is shown to be a superior indicator for security than existing measures such as the Articulation Index, the Speech Intelligibility Index, the ratio of the loudness of speech to that of noise, and the A-weighted level difference of speech and noise. This new measure is a weighted sum of clipped one-third-octave-band signal-to-noise ratios; various weightings and clipping levels are explored. Listening tests had 19 subjects rate the audibility and intelligibility of 500 English sentences, filtered to simulate transmission through various wall constructions, and presented along with background noise. The results of the tests indicate that the new measure is highly correlated with sentence intelligibility scores and also with three security thresholds: the threshold of intelligibility (below which speech is unintelligible), the threshold of cadence (below which the cadence of speech is inaudible), and the threshold of audibility (below which speech is inaudible). The ratio of the loudness of speech to that of noise, and simple A-weighted level differences are both shown to be well correlated with these latter two thresholds (cadence and audibility), but not well correlated with intelligibility. .

  3. 75 FR 81205 - Privacy Act: Revision of Privacy Act Systems of Records

    Science.gov (United States)

    2010-12-27

    ... Office of the Secretary Privacy Act: Revision of Privacy Act Systems of Records AGENCY: Office of the Secretary, USDA. ACTION: Notice to Revise Privacy Act Systems of Records. SUMMARY: Notice is hereby given that the United States Department of Agriculture (USDA) proposes to revise two Privacy Act Systems of...

  4. Departmental Excellence: Constituencies in Tension.

    Science.gov (United States)

    Arnett, Ronald C.; Fritz, Janie M. Harden

    1999-01-01

    Places the question of departmental excellence within "the winds of historicity and temporality" and the political demands of multiple constituencies. Concludes that the task for every department that wants to pursue excellence is to know, understand, and operate within the hidden curriculum of a campus that socializes faculty to the…

  5. 75 FR 28051 - Public Workshop: Pieces of Privacy

    Science.gov (United States)

    2010-05-19

    ... SECURITY Office of the Secretary Public Workshop: Pieces of Privacy AGENCY: Privacy Office, DHS. ACTION: Notice announcing public workshop. SUMMARY: The Department of Homeland Security Privacy Office will host a public workshop, ``Pieces of Privacy.'' DATES: The workshop will be held on June 10, 2010, from 8...

  6. National Privacy Research Strategy

    Data.gov (United States)

    Networking and Information Technology Research and Development, Executive Office of the President — On July 1, NITRD released the National Privacy Research Strategy. Research agencies across government participated in the development of the strategy, reviewing...

  7. EGRP Privacy Policy & Disclaimers

    Science.gov (United States)

    The Epidemiology and Genomics Research Program complies with requirements for privacy and security established by the Office of Management and Budget, Department of Health and Human Services, the National Institutes of Health, and the National Cancer Institute.

  8. EGRP Privacy Policy & Disclaimers

    Science.gov (United States)

    The Epidemiology and Genomics Research Program complies with requirements for privacy and security established by the Office of Management and Budget, Department of Health and Human Services, the National Institutes of Health, and the National Cancer Institute.

  9. 78 FR 62605 - Privacy Act of 1974; System of Records-Office of Hearings and Appeals (OHA) Records System

    Science.gov (United States)

    2013-10-22

    ...), toll free, at 1-800-877-8339. SUPPLEMENTARY INFORMATION: Introduction The Privacy Act requires the... Resolution (ADR) Disclosures. (a) Introduction. In the event that one of the parties listed in this paragraph... compromise, there is a risk of harm to economic or property interests, identity theft or fraud, or harm to...

  10. 28 CFR 0.39c - Relationship to other departmental units.

    Science.gov (United States)

    2010-07-01

    ... JUSTICE 2-Office of Professional Responsibility § 0.39c Relationship to other departmental units. (a) Primary responsibility for assuring the maintenance of the highest standards of professional responsibility by Department employees rests with the heads of the offices, divisions, bureaus, and boards of the...

  11. 32 CFR 806b.4 - Privacy Act complaints.

    Science.gov (United States)

    2010-07-01

    ... unique system complaints through the respective component chain of command. (b) For Privacy Act... complaints or allegations of Privacy Act violations through the appropriate base or Major Command Privacy Act office, to the local systems manager. The base or Major Command Privacy Act officer directs the...

  12. Departmentality

    DEFF Research Database (Denmark)

    Harste, Gorm

    2008-01-01

      Niklas Luhmann's system theory outlines a methodology that focuses empirical problems in depth. This is possible by means of an abductive use of an overwhelmingly accessibility to theoretical observations. However, this theory is itself a result of historical developments. It origins in a path...

  13. Departmentality

    DEFF Research Database (Denmark)

    Harste, Gorm

    2008-01-01

    of self-descriptive communications studied by Luhmann as semantic transformations. The paper goes back to Immanuel Kant's theory of systems and traces its origins on the basis of an evolution of a subdifferentiated legal system. Especially the semantic differentiation of forms is followed and takes...

  14. 18 CFR 367.26 - Departmental classification.

    Science.gov (United States)

    2010-04-01

    ... 18 Conservation of Power and Water Resources 1 2010-04-01 2010-04-01 false Departmental classification. 367.26 Section 367.26 Conservation of Power and Water Resources FEDERAL ENERGY REGULATORY... ACT General Instructions § 367.26 Departmental classification. Salaries and wages and all other...

  15. 75 FR 16853 - Office of the Director of National Intelligence; Privacy Act of 1974; System of Records

    Science.gov (United States)

    2010-04-02

    ... records or produced by the ODNI concerning ODNI or IC activities. EXEMPTIONS CLAIMED FOR THE SYSTEM... Legislative Affairs (OLA), members of Congress, Congressional staff, constituents, other ODNI offices and/or...

  16. 77 FR 41885 - Privacy Act of 1974: Implementation of Exemptions; Export-Import Bank of the United States Office...

    Science.gov (United States)

    2012-07-17

    ... Investigative Records. (a) Criminal Law Enforcement--(1) Exemption. Under the authority granted by 5 U.S.C. 552a... information pertaining to the enforcement of criminal laws. ``EIB-35--Office of Inspector General...)(3) could discourage the free flow of information in a criminal law enforcement inquiry. (v)...

  17. 77 FR 27140 - Privacy Act of 1974: Implementation of Exemptions; Export-Import Bank of the United States Office...

    Science.gov (United States)

    2012-05-09

    ... processing allegations of violation of criminal, civil, and administrative laws and regulations relating to... General Investigative Records (a) Criminal Law Enforcement. (1) Exemption. Under the authority granted by... information pertaining to the enforcement of criminal laws. ``EIB-35--Office of Inspector...

  18. 77 FR 68140 - Privacy Act of 1974; New System of Records, Office of General Counsel E-Discovery Management...

    Science.gov (United States)

    2012-11-15

    ... new system of records for the Office of General Counsel (OGC) E- Discovery Management System (EDMS). EDMS was first announced and described in a July 17, 2012, Federal Register notice, in which HUD solicited comment. Based on comment received, this notice makes certain revisions to the description of...

  19. 43 CFR 2.47 - Records subject to Privacy Act.

    Science.gov (United States)

    2010-10-01

    ... 43 Public Lands: Interior 1 2010-10-01 2010-10-01 false Records subject to Privacy Act. 2.47 Section 2.47 Public Lands: Interior Office of the Secretary of the Interior RECORDS AND TESTIMONY; FREEDOM OF INFORMATION ACT Privacy Act § 2.47 Records subject to Privacy Act. The Privacy Act applies to all...

  20. 25 CFR 700.259 - Records subject to Privacy Act.

    Science.gov (United States)

    2010-04-01

    ... 25 Indians 2 2010-04-01 2010-04-01 false Records subject to Privacy Act. 700.259 Section 700.259 Indians THE OFFICE OF NAVAJO AND HOPI INDIAN RELOCATION COMMISSION OPERATIONS AND RELOCATION PROCEDURES Privacy Act § 700.259 Records subject to Privacy Act. The Privacy Act applies to all “records” as...

  1. 77 FR 65206 - Privacy Act of 1974; Amendment of Privacy Act System of Records

    Science.gov (United States)

    2012-10-25

    ... BOARD Privacy Act of 1974; Amendment of Privacy Act System of Records AGENCY: Merit Systems Protection... maintains subject to the Privacy Act of 1974 (5 U.S.C. 552a). MSPB/ GOVT-1, ``Appeals and Case Records,'' is being amended to reflect that its location is in the Office of the Clerk of the Board. Also, the...

  2. Location Privacy

    Science.gov (United States)

    Meng, Xiaofeng; Chen, Jidong

    With rapid development of sensor and wireless mobile devices, it is easy to access mobile users' location information anytime and anywhere. On one hand, LBS is becoming more and more valuable and important. On the other hand, location privacy issues raised by such applications have also gained more attention. However, due to the specificity of location information, traditional privacy-preserving techniques in data publishing cannot be used. In this chapter, we will introduce location privacy, and analyze the challenges of location privacy-preserving, and give a survey of existing work including the system architecture, location anonymity and query processing.

  3. 78 FR 69861 - Privacy Act of 1974; Department of Homeland Security, Federal Emergency Management Agency...

    Science.gov (United States)

    2013-11-21

    ... SECURITY Office of the Secretary Privacy Act of 1974; Department of Homeland Security, Federal Emergency...: Department of Homeland Security, Privacy Office. ACTION: Notice of Privacy Act System of Records. SUMMARY: In accordance with the Privacy Act of 1974, the Department of Homeland Security proposes to update and reissue...

  4. Departmentalization and Twenty-First Century Skills

    Science.gov (United States)

    Watts, Toy Coles

    2012-01-01

    The purpose of this study was to investigate the relationship between school organizational style and student outcomes. The research questions that guided this study were, "Is there a difference in mathematical performance of fourth graders who receive departmentalized instruction as compared to fourth grade students who receive…

  5. A Departmental Cost-Effectiveness Model.

    Science.gov (United States)

    Holleman, Thomas, Jr.

    In establishing a departmental cost-effectiveness model, the traditional cost-effectiveness model was discussed and equipped with a distant and deflation equation for both benefits and costs. Next, the economics of costing was examined and program costing procedures developed. Then, the model construct was described as it was structured around the…

  6. Departmental Assessment: Productive Endeavor or Painful Encounter.

    Science.gov (United States)

    Roberts, Elizabeth A.

    The spring of 1995 brought the onus of assessment to the Department of Communication Arts at Ohio Northern University (ONU). Often seen as a painful process, departmental assessments can become productive endeavors. Although, as a private institution, ONU is not subject to the dictates for assessment from the State Board of Education, assessment…

  7. User Privacy in RFID Networks

    Science.gov (United States)

    Singelée, Dave; Seys, Stefaan

    Wireless RFID networks are getting deployed at a rapid pace and have already entered the public space on a massive scale: public transport cards, the biometric passport, office ID tokens, customer loyalty cards, etc. Although RFID technology offers interesting services to customers and retailers, it could also endanger the privacy of the end-users. The lack of protection mechanisms being deployed could potentially result in a privacy leakage of personal data. Furthermore, there is the emerging threat of location privacy. In this paper, we will show some practical attack scenarios and illustrates some of them with cases that have received press coverage. We will present the main challenges of enhancing privacy in RFID networks and evaluate some solutions proposed in literature. The main advantages and shortcomings will be briefly discussed. Finally, we will give an overview of some academic and industrial research initiatives on RFID privacy.

  8. 75 FR 62447 - Departmental Offices; Proposed Collections; Comment Requests

    Science.gov (United States)

    2010-10-08

    .../forms.html . Requests for additional information should be directed to Mr. Wolkow. SUPPLEMENTARY INFORMATION: Title: Treasury International Capital Form S, Purchases and Sales of Long-term Securities by... costs of operation, maintenance and purchase of services to provide information. Dwight Wolkow...

  9. 77 FR 41476 - Departmental Offices; Debt Management Advisory Committee Meeting

    Science.gov (United States)

    2012-07-13

    .... App. 2, Sec. 10(a)(2), that a meeting will be held at the Hay-Adams Hotel, 16th Street and... advisory committee: Treasury Borrowing Advisory Committee of The Securities Industry and Financial Markets...

  10. 75 FR 1839 - Departmental Offices; Debt Management Advisory Committee Meeting

    Science.gov (United States)

    2010-01-13

    .... App. 2, Sec. 10(a)(2), that a meeting will be held at the Hay-Adams Hotel, 16th Street and... advisory committee: Treasury Borrowing Advisory Committee of The Securities Industry and Financial Markets...

  11. 75 FR 63541 - Departmental Offices; Debt Management Advisory Committee Meeting

    Science.gov (United States)

    2010-10-15

    .... App. 2, Sec. 10(a)(2), that a meeting will be held at the Hay-Adams Hotel, 16th Street and... advisory committee: Treasury Borrowing Advisory Committee of The Securities Industry and Financial Markets...

  12. 75 FR 51166 - Departmental Offices; Proposed Collections; Comment Requests

    Science.gov (United States)

    2010-08-18

    ..., and U.S.-resident end-investors in foreign securities, where for each reporting entity, the... billion. This consolidated total includes amounts held for a reporting entity's own account and for customers. The reporting entity should include reportable securities for all U.S.-resident parts of...

  13. SOA approach for integration of departmental systems.

    Science.gov (United States)

    Itälä, Timo; Ukkola, Jari; Virtanen, Aino; Mykkänen, Juha

    2008-01-01

    In this paper a unified method for integration of departmental systems into the main systems of a healthcare organization is described. The approach is based on combining Business Process Modeling (BPM) and Service Oriented Architecture (SOA) methods and technologies. A top-down approach is used for modeling the care process and supporting care services which in turn are decomposed down to such a level of granularity that they can be described and implemented as web services described with Web Services Description Language (WSDL) documents. Then a bottom-up approach is used for wrapping the existing departmental systems and their interfaces into web services using Enterprise Service Bus (ESB). Finally the orchestration of the services is described using executable Business Process Execution Language (BPEL) code.

  14. What was privacy?

    Science.gov (United States)

    McCreary, Lew

    2008-10-01

    Why is that question in the past tense? Because individuals can no longer feel confident that the details of their lives--from identifying numbers to cultural preferences--will be treated with discretion rather than exploited. Even as Facebook users happily share the names of their favorite books, movies, songs, and brands, they often regard marketers' use of that information as an invasion of privacy. In this wide-ranging essay, McCreary, a senior editor at HBR, examines numerous facets of the privacy issue, from Google searches, public shaming on the internet, and cell phone etiquette to passenger screening devices, public surveillance cameras, and corporate chief privacy officers. He notes that IBM has been a leader on privacy; its policy forswearing the use of employees' genetic information in hiring and benefits decisions predated the federal Genetic Information Nondiscrimination Act by three years. Now IBM is involved in an open-source project known as Higgins to provide users with transportable, potentially anonymous online presences. Craigslist, whose CEO calls it "as close to 100% user driven as you can get," has taken an extremely conservative position on privacy--perhaps easier for a company with a declared lack of interest in maximizing revenue. But TJX and other corporate victims of security breaches have discovered that retaining consumers' transaction information can be both costly and risky. Companies that underestimate the importance of privacy to their customers or fail to protect it may eventually face harsh regulation, reputational damage, or both. The best thing they can do, says the author, is negotiate directly with those customers over where to draw the line.

  15. Privacy Act

    Science.gov (United States)

    Learn about the Privacy Act of 1974, the Electronic Government Act of 2002, the Federal Information Security Management Act, and other information about the Environmental Protection Agency maintains its records.

  16. 77 FR 2729 - Office of the Secretary, Office of the Assistant Secretary for Administration; Statement of...

    Science.gov (United States)

    2012-01-19

    ..., information resources management, security, counterintelligence, strategic information, logistics, and travel... Business Management and Transformation (AJJ) Office of Security and Strategic Information (AJS) Program... Departmental liaison to central management agencies on related matters. OHR also provides leadership...

  17. Concentrated Differential Privacy

    OpenAIRE

    Dwork, Cynthia; Rothblum, Guy N.

    2016-01-01

    We introduce Concentrated Differential Privacy, a relaxation of Differential Privacy enjoying better accuracy than both pure differential privacy and its popular "(epsilon,delta)" relaxation without compromising on cumulative privacy loss over multiple computations.

  18. 36 CFR 902.56 - Protection of personal privacy.

    Science.gov (United States)

    2010-07-01

    ... privacy. 902.56 Section 902.56 Parks, Forests, and Public Property PENNSYLVANIA AVENUE DEVELOPMENT... Protection of personal privacy. (a) Any of the following personnel, medical, or similar records is within the... invasion of his personal privacy: (1) Personnel and background records personal to any officer or employee...

  19. 37 CFR 251.23 - FOIA and Privacy Act.

    Science.gov (United States)

    2010-07-01

    ... 37 Patents, Trademarks, and Copyrights 1 2010-07-01 2010-07-01 false FOIA and Privacy Act. 251.23 Section 251.23 Patents, Trademarks, and Copyrights COPYRIGHT OFFICE, LIBRARY OF CONGRESS COPYRIGHT... Access to and Inspection of Records § 251.23 FOIA and Privacy Act. Freedom of Information Act and Privacy...

  20. 48 CFR 352.224-70 - Privacy Act.

    Science.gov (United States)

    2010-10-01

    ... 48 Federal Acquisition Regulations System 4 2010-10-01 2010-10-01 false Privacy Act. 352.224-70... SOLICITATION PROVISIONS AND CONTRACT CLAUSES Texts of Provisions and Clauses 352.224-70 Privacy Act. As prescribed in 324.103(b)(2), the Contracting Officer shall insert the following clause: Privacy Act (January...

  1. 78 FR 63458 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2013-10-24

    ... of the Secretary Privacy Act of 1974; System of Records AGENCY: Office of the Secretary of Defense... Research Approval Process'', in its inventory of record systems subject to the Privacy Act of 1974, as... of the Secretary of Defense notices for systems of records subject to the Privacy Act of 1974 (5...

  2. 75 FR 55335 - Privacy Act of 1974; Privacy Act of 1974: Department of Homeland Security/ALL-031 Information...

    Science.gov (United States)

    2010-09-10

    ... private sector. Additionally, the Department of Homeland Security is issuing a Notice of Proposed... SECURITY Office of the Secretary Privacy Act of 1974; Privacy Act of 1974: Department of Homeland Security... the Privacy Act of 1974, the Department of Homeland Security proposes to establish a new Department...

  3. 78 FR 69753 - Exemption of Records Systems Under the Privacy Act

    Science.gov (United States)

    2013-11-21

    ... Part 16 Exemption of Records Systems Under the Privacy Act AGENCY: Executive Office for Organized Crime... Department of Justice (the Department or DOJ) amends its Privacy Act regulations for two Privacy Act systems... Criminal Division, these systems were exempted from certain provisions of the Privacy Act of 1974...

  4. 78 FR 46256 - Privacy Act

    Science.gov (United States)

    2013-07-31

    ... From the Federal Register Online via the Government Publishing Office FEDERAL ELECTION COMMISSION 11 CFR Part 1 Privacy Act CFR Correction In Title 11 of the Code of Federal Regulations, revised as of January 1, 2012, on page 5, in Sec. 1.2, the words ``95 and 96 of the Internal Revenue Code of...

  5. 28 CFR 0.32 - Applicability of existing departmental regulations.

    Science.gov (United States)

    2010-07-01

    ... 28 Judicial Administration 1 2010-07-01 2010-07-01 false Applicability of existing departmental regulations. 0.32 Section 0.32 Judicial Administration DEPARTMENT OF JUSTICE ORGANIZATION OF THE DEPARTMENT OF JUSTICE Community Relations Service § 0.32 Applicability of existing departmental...

  6. 17 CFR 256.01-6 - Departmental classification required.

    Science.gov (United States)

    2010-04-01

    ... (CONTINUED) UNIFORM SYSTEM OF ACCOUNTS FOR MUTUAL SERVICE COMPANIES AND SUBSIDIARY SERVICE COMPANIES, PUBLIC UTILITY HOLDING COMPANY ACT OF 1935 General Instructions § 256.01-6 Departmental classification required... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Departmental...

  7. 77 FR 31606 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2012-05-29

    ... Privacy Act of 1974; System of Records AGENCY: Office of English Language Acquisition, Language..., Office of English Language Acquisition, Language Enhancement and Academic Achievement for Limited English..., Assistant Deputy Secretary and Director for English Language Acquisition, Language Enhancement and Academic...

  8. Privacy transparency patterns

    NARCIS (Netherlands)

    Siljee B.I.J.

    2015-01-01

    This paper describes two privacy patterns for creating privacy transparency: the Personal Data Table pattern and the Privacy Policy Icons pattern, as well as a full overview of privacy transparency patterns. It is a first step in creating a full set of privacy design patterns, which will aid

  9. Privacy transparency patterns

    NARCIS (Netherlands)

    Siljee B.I.J.

    2015-01-01

    This paper describes two privacy patterns for creating privacy transparency: the Personal Data Table pattern and the Privacy Policy Icons pattern, as well as a full overview of privacy transparency patterns. It is a first step in creating a full set of privacy design patterns, which will aid softwar

  10. 77 FR 24187 - Notice of Submission for OMB Review; Office of Elementary and Secondary Education; State...

    Science.gov (United States)

    2012-04-23

    ... From the Federal Register Online via the Government Publishing Office DEPARTMENT OF EDUCATION Notice of Submission for OMB Review; Office of Elementary and Secondary Education; State Educational... Departmental review of the information collection. The Department of Education is especially interested...

  11. Enterprise imaging and multi-departmental PACS

    Energy Technology Data Exchange (ETDEWEB)

    Bergh, Bjoern [Universitaetsklinikum Heidelberg, Director of Information Technology and Medical Engineering, Heidelberg (Germany)

    2006-12-15

    The aim of this review is to present the status of digital image acquisition and archiving outside of radiology and to describe the technical concepts and possibilities of how a ''radiology'' Picture Archiving and Communication System (PACS) can become a multi-departmental (MD-)PACS. First the principles of system integration technology are explained and illustrated by the description of a typical radiology system integration. Then four types of modality integration approaches are defined: the direct modality integration (Type-I), the integration via DICOM acquisition software (Type-II) the integration via specialised systems either with (Type-III) or without PACS connection (Type-IV). The last section is dedicated to the presentation of the PACS requirements of selected interdisciplinary modality types [Endoscopy, Ultrasound and Electrocardiography (ECG)] and clinical disciplines (Pathology, Dermatology, Ophthalmology and Cardiology), which are then compared with the technical possibilities of a MD-PACS. (orig.)

  12. From Data Privacy to Location Privacy

    Science.gov (United States)

    Wang, Ting; Liu, Ling

    Over the past decade, the research on data privacy has achieved considerable advancement in the following two aspects: First, a variety of privacy threat models and privacy principles have been proposed, aiming at providing sufficient protection against different types of inference attacks; Second, a plethora of algorithms and methods have been developed to implement the proposed privacy principles, while attempting to optimize the utility of the resulting data. The first part of the chapter presents an overview of data privacy research by taking a close examination at the achievements from the above two aspects, with the objective of pinpointing individual research efforts on the grand map of data privacy protection. As a special form of data privacy, location privacy possesses its unique characteristics. In the second part of the chapter, we examine the research challenges and opportunities of location privacy protection, in a perspective analogous to data privacy. Our discussion attempts to answer the following three questions: (1) Is it sufficient to apply the data privacy models and algorithms developed to date for protecting location privacy? (2) What is the current state of the research on location privacy? (3) What are the open issues and technical challenges that demand further investigation? Through answering these questions, we intend to provide a comprehensive review of the state of the art in location privacy research.

  13. 12 CFR 792.69 - Training and employee standards of conduct with regard to privacy.

    Science.gov (United States)

    2010-01-01

    ... privacy. (a) The Director of the Office of Human Resources, with advice from the Senior Privacy Act... identifier. (7) Maintain an accounting, in the prescribed form, of all dissemination of personal...

  14. Common Privacy Myths

    Science.gov (United States)

    ... Health Information home > privacy + phrs > common privacy myths Common Privacy Myths With the new federal laws protecting ... Here are the truths to some of the common myths: Health information cannot be faxed – FALSE Your ...

  15. Semantic Security: Privacy Definitions Revisited

    OpenAIRE

    Jinfei Liu; Li Xiong; Jun Luo

    2013-01-01

    In this paper we illustrate a privacy framework named Indistinguishabley Privacy. Indistinguishable privacy could be deemed as the formalization of the existing privacy definitions in privacy preserving data publishing as well as secure multi-party computation. We introduce three representative privacy notions in the literature, Bayes-optimal privacy for privacy preserving data publishing, differential privacy for statistical data release, and privacy w.r.t. semi-honest behavior in the secure...

  16. 22 CFR 161.6 - Responsibilities of departmental officials.

    Science.gov (United States)

    2010-04-01

    ... Secretary for Congressional Relations in the preparation of environmental documents relating to legislation....6 Section 161.6 Foreign Relations DEPARTMENT OF STATE ENVIRONMENTAL PROTECTION REGULATIONS FOR IMPLEMENTATION OF THE NATIONAL ENVIRONMENTAL POLICY ACT (NEPA) NEPA and Departmental Decisionmaking §...

  17. Privacy og selvbeskrivelse

    DEFF Research Database (Denmark)

    Rosengaard, Hans Ulrik

    2015-01-01

    En beskrivelse af feltet for forskning i Privacy med særligt henblik på privacys betydning for muligheden for at styre sin egen selvbeskrivelse......En beskrivelse af feltet for forskning i Privacy med særligt henblik på privacys betydning for muligheden for at styre sin egen selvbeskrivelse...

  18. 77 FR 43817 - Notice of Submission for OMB Review; Office of Postsecondary Education; Talent Search (TS) Annual...

    Science.gov (United States)

    2012-07-26

    ... From the Federal Register Online via the Government Publishing Office DEPARTMENT OF EDUCATION Notice of Submission for OMB Review; Office of Postsecondary Education; Talent Search (TS) Annual... Departmental review of the information collection. The Department of Education is especially interested...

  19. Privacy vs security

    CERN Document Server

    Stalla-Bourdillon, Sophie; Ryan, Mark D

    2014-01-01

    Securing privacy in the current environment is one of the great challenges of today's democracies. Privacy vs. Security explores the issues of privacy and security and their complicated interplay, from a legal and a technical point of view. Sophie Stalla-Bourdillon provides a thorough account of the legal underpinnings of the European approach to privacy and examines their implementation through privacy, data protection and data retention laws. Joshua Philips and Mark D. Ryan focus on the technological aspects of privacy, in particular, on today's attacks on privacy by the simple use of today'

  20. Department of Health and Human Services, Office for Civil Rights

    Science.gov (United States)

    ... Z Index About Us Filing with OCR Civil Rights Health Information Privacy Newsroom HHS Home > Office for Civil ... Civil Rights Filing with OCR File a civil rights or health information privacy complaint. Newsroom Read the latest OCR ...

  1. 76 FR 35052 - Privacy Act of 1974: New System of Records

    Science.gov (United States)

    2011-06-15

    ... MANAGEMENT Privacy Act of 1974: New System of Records AGENCY: U.S. Office of Personnel Management. ACTION: Notice of a new system of records. SUMMARY: The U.S. Office of Personnel Management (OPM), Office of the... Data Warehouse to its inventory of records systems subject to the Privacy Act of 1974 (5 U.S.C....

  2. 78 FR 9678 - Multi-stakeholder Process To Develop a Voluntary Code of Conduct for Smart Grid Data Privacy

    Science.gov (United States)

    2013-02-11

    ...-stakeholder Process To Develop a Voluntary Code of Conduct for Smart Grid Data Privacy AGENCY: Office of... convene the first meeting of the smart grid data privacy multistakeholder process concerning the..., Office of Electricity Delivery and Energy Reliability (DOE OE) hosted the Smart Grid Privacy Workshop \\1...

  3. 75 FR 69693 - Privacy Act of 1974; Department of Homeland Security National Protection and Programs Directorate...

    Science.gov (United States)

    2010-11-15

    ... including scars, marks, and tattoos; Automobile registration information; Watch list information; Medical... obtain forms for this purpose from the Chief Privacy Officer and Chief Freedom of Information Act...

  4. 78 FR 15730 - Privacy Act of 1974; Computer Matching Program

    Science.gov (United States)

    2013-03-12

    ... SECURITY Office of the Secretary Privacy Act of 1974; Computer Matching Program AGENCY: U.S. Citizenship...: Privacy Act of 1974; Computer Matching Program between the Department of Homeland Security, U.S... notice of the existence of a computer matching program between the Department of Homeland Security,...

  5. 46 CFR 14.105 - Disclosure and privacy.

    Science.gov (United States)

    2010-10-01

    ... 46 Shipping 1 2010-10-01 2010-10-01 false Disclosure and privacy. 14.105 Section 14.105 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY MERCHANT MARINE OFFICERS AND SEAMEN SHIPMENT AND DISCHARGE OF MERCHANT MARINERS General § 14.105 Disclosure and privacy. The Coast Guard makes information...

  6. 75 FR 27051 - Privacy Act of 1974: System of Records

    Science.gov (United States)

    2010-05-13

    ... Office of the Secretary Privacy Act of 1974: System of Records AGENCY: Federal Motor Carrier Safety... records under the Privacy Act of 1974. The system is FMCSA's National Consumer Complaint Database (NCCDB), which is being modified to reflect: (1) The new name; (2) changes to the system location; (3)...

  7. 75 FR 8731 - Privacy Act of 1974, as Amended; Revisions to the Existing System of Records

    Science.gov (United States)

    2010-02-25

    ... Office of the Secretary Privacy Act of 1974, as Amended; Revisions to the Existing System of Records... Privacy Act System of Records Notice in its inventory of records systems subject to the Privacy Act of...) database and related files, as well as add their system owner and system location to the existing...

  8. 77 FR 38598 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2012-06-28

    ... Officer, Department of Defense. CIG-23 System Name: Public Affairs Files (August 7, 2006, 71 FR 44667) Changes: * * * * * System name: Delete entry and replace with ``SCOUT and Public Affairs Files.'' System... Office of the Secretary Privacy Act of 1974; System of Records AGENCY: Office of the Inspector...

  9. 78 FR 65644 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2013-11-01

    ... computer system that is managed and administered by Microsoft/Office 365.'' 2. The ``retention and disposal... From the Federal Register Online via the Government Publishing Office FEDERAL HOUSING FINANCE AGENCY Privacy Act of 1974; System of Records AGENCY: Office of Inspector General, Federal...

  10. 76 FR 44888 - Privacy Act of 1974, System of Records

    Science.gov (United States)

    2011-07-27

    ...'') cloud computing model. The suite is composed of Gmail for e-mail, Google Docs for office productivity... Information Security Officer--Chief Privacy Officer. USAID-30 System name: Google Apps Business Edition. Security classification: Sensitive But Unclassified. System location(s): United States Agency...

  11. A typology of privacy

    NARCIS (Netherlands)

    Koops, Bert Jaap; Newell, Bryce; Timan, Tjerk; Skorvánek, Ivan; Chokrevski, Tomislav; Galič, Maša

    2017-01-01

    Despite the difficulty of capturing the nature and boundaries of privacy, it is important to conceptualize it. Some scholars develop unitary theories of privacy in the form of a unified conceptual core; others offer classifications of privacy that make meaningful distinctions between different types

  12. Privacy and Social Interaction

    NARCIS (Netherlands)

    B. Roessler; D. Mokrosinska

    2013-01-01

    This article joins in and extends the contemporary debate on the right to privacy. We bring together two strands of the contemporary discourse on privacy. While we endorse the prevailing claim that norms of informational privacy protect the autonomy of individual subjects, we supplement it with an a

  13. 78 FR 5561 - Proposed Collection; Comment Request; Office of the Fiscal Assistant Secretary

    Science.gov (United States)

    2013-01-25

    ... From the Federal Register Online via the Government Publishing Office DEPARTMENT OF THE TREASURY Proposed Collection; Comment Request; Office of the Fiscal Assistant Secretary AGENCY: Departmental Offices...)). Currently, the Office of the Fiscal Assistant Secretary (OFAS), within the Department of the Treasury, is...

  14. 18 CFR 16.14 - Departmental recommendation for takeover.

    Science.gov (United States)

    2010-04-01

    ... recommendation for takeover. 16.14 Section 16.14 Conservation of Power and Water Resources FEDERAL ENERGY... 15 of the Federal Power Act § 16.14 Departmental recommendation for takeover. (a) A Federal department or agency may file a recommendation that the United States exercise its right to take over...

  15. Teaching Graduate and Undergraduate Research Methods: A Multipronged Departmental Initiative

    Science.gov (United States)

    Shostak, Sara; Girouard, Jennifer; Cunningham, David; Cadge, Wendy

    2010-01-01

    This article describes a departmental initiative designed to integrate the teaching of graduate and undergraduate sociology through research methodology and the completion of actual research projects. The goal was to develop a multilevel team approach within which faculty, graduate students, and undergraduates would view their work as part of a…

  16. 42 CFR 93.207 - Departmental Appeals Board or DAB.

    Science.gov (United States)

    2010-10-01

    ... 42 Public Health 1 2010-10-01 2010-10-01 false Departmental Appeals Board or DAB. 93.207 Section 93.207 Public Health PUBLIC HEALTH SERVICE, DEPARTMENT OF HEALTH AND HUMAN SERVICES HEALTH ASSESSMENTS AND HEALTH EFFECTS STUDIES OF HAZARDOUS SUBSTANCES RELEASES AND FACILITIES PUBLIC HEALTH...

  17. Elementary School Organization: Self-Contained and Departmentalized Classroom Structures.

    Science.gov (United States)

    Des Moines Public Schools, IA.

    Surveys were conducted to investigate contemporary thought regarding organizational practices at the elementary level, with particular attention to identifying the extent to which departmentalization was supported by research and actually employed in 24 elementary schools in the Midwest and in 41 Des Moines elementary schools. Four committees…

  18. Pre-Service Teachers' Perceptions of Departmentalization of Elementary Schools

    Science.gov (United States)

    Liu, Fuchang

    2011-01-01

    This paper discusses the advantages and disadvantages of departmentalization of elementary schools, with an emphasis on teaching mathematics, as perceived by preservice teachers who shared their opinions through online discussion. Advantages include teachers' enthusiasm about and focused attention on the specialized area and students' easier…

  19. 75 FR 20977 - Departmental Management; Advisory Committee on Minority Farmers

    Science.gov (United States)

    2010-04-22

    ... maximizing the participation of minority farmers and ranchers in USDA programs; and (3) civil rights... organizations with a history of working with minority farmers and ranchers; (3) not less than two civil rights...; ] DEPARTMENT OF AGRICULTURE Departmental Management; Advisory Committee on Minority Farmers AGENCY:...

  20. Departmental Differences in Student Perceptions of 'Ideal' Teaching.

    Science.gov (United States)

    Kaufman, Brian J.

    Departmental differences in student perceptions of teaching effectiveness were measured using behaviorally anchored rating scales (BARS). The 495 college students were taking junior and senior level courses in art, business, computer science, French, psychology, and sociology. Each subject completed either the BARS or a simple summated scale, both…

  1. Faculty Agency: Departmental Contexts That Matter in Faculty Careers

    Science.gov (United States)

    Campbell, Corbin M.; O'Meara, KerryAnn

    2014-01-01

    In a modern context of constrained resources and high demands, faculty exert agency to strategically navigate their careers (Baez 2000a; Neumann et al. 2006). Guided by the O'Meara et al. (2011) framework on agency in faculty professional lives, this study used Structural Equation Modeling to investigate which departmental factors…

  2. Departmental h-Index: Evidence for Publishing Less?

    Science.gov (United States)

    Tyrrell, Pascal N; Moody, Alan R; Moody, J Oscar C; Ghiam, Neda

    2017-02-01

    The h-index is an established method for determining an individual faculty member's impact on the scientific literature. The purpose of this study was to measure and describe over time the combined h-index of a large university medical imaging department. All faculty members from the Department of Medical Imaging, University of Toronto, were identified from administrative records for 6 separate years between 2000-2014. Individual members' and the departmental h-index were calculated using citation data from the Scopus database. Descriptive univariate statistics were reported. Factors contributing to the change in departmental h-index over time were assessed using linear regression analysis. The number of faculty members increased from 117 in 2000 to 186 in 2014. The departmental h-index increased from 48 in 2000 to 142 in 2014. During this time period, the median h-index for faculty members increased from 4 (interquartile range 2-8) to 10 (interquartile range 5-19). Regression analysis revealed that for every additional staff member, the departmental h-index increased by 1.4 (standard error = 0.1, P h-index of members by 1 the departmental h-index increased by 15.7 (standard error = 0.6, P h-index, it is important to foster impactful research from within the faculty ranks of the department. The h-index of academic radiology departments is a meaningful tool that allows for evaluation from within and against other academic centres. Copyright © 2016 Canadian Association of Radiologists. Published by Elsevier Inc. All rights reserved.

  3. Privacy encounters in Teledialogue

    DEFF Research Database (Denmark)

    Andersen, Lars Bo; Bøge, Ask Risom; Danholt, Peter

    2016-01-01

    Privacy is a major concern when new technologies are introduced between public authorities and private citizens. What is meant by privacy, however, is often unclear and contested. Accordingly, this article utilises grounded theory to study privacy empirically in the research and design project...... Teledialogue aimed at introducing new ways for public case managers and placed children to communicate through IT. The resulting argument is that privacy can be understood as an encounter, that is, as something that arises between implicated actors and entails some degree of friction and negotiation....... An argument which is further qualified through the philosophy of Gilles Deleuze. The article opens with a review of privacy literature before continuing to present privacy as an encounter with five different foci: what technologies bring into the encounter; who is related to privacy by implication; what...

  4. 77 FR 74913 - Privacy Act of 1974, as Amended; Computer Matching Program (Social Security Administration (SSA...

    Science.gov (United States)

    2012-12-18

    ... From the Federal Register Online via the Government Publishing Office SOCIAL SECURITY ADMINISTRATION Privacy Act of 1974, as Amended; Computer Matching Program (Social Security Administration (SSA)/Office of Personnel Management (OPM))--Match Number 1307 AGENCY: Social Security Administration....

  5. 76 FR 4478 - Privacy Act of 1974; Report of Modified or Altered System of Records

    Science.gov (United States)

    2011-01-25

    ...--M/ S: F-35, Chamblee, GA 30341. Hand Delivery/Courier: HHS/CDC Senior Official for Privacy (SOP), Office of the Chief Information Security Officer (OCISO), 4770 Buford Highway--M/S: F-35, Chamblee,...

  6. 76 FR 4436 - Privacy Act of 1974; Report of Modified or Altered System of Records

    Science.gov (United States)

    2011-01-25

    ... Highway--M/ S: F-35, Chamblee, GA 30341 Hand Delivery/Courier: HHS/CDC Senior Official for Privacy (SOP), Office of the Chief Information Security Officer (OCISO), 4770 Buford Highway--M/S: F-35, Chamblee,...

  7. 76 FR 4460 - Privacy Act of 1974; Report of Modified or Altered System of Records

    Science.gov (United States)

    2011-01-25

    ...: F-35, Chamblee, GA 30341. Hand Delivery/Courier: HHS/CDC Senior Official for Privacy (SOP), Office of the Chief Information Security Officer (OCISO), 4770 Buford Highway--M/S: F-35, Chamblee, GA...

  8. 76 FR 4469 - Privacy Act of 1974; Report of Modified or Altered System of Records

    Science.gov (United States)

    2011-01-25

    ... Highway--M/ S: F-35, Chamblee, GA 30341. Hand Delivery/Courier: HHS/CDC Senior Official for Privacy (SOP), Office of the Chief Information Security Officer (OCISO), 4770 Buford Highway--M/S: F-35, Chamblee,...

  9. 76 FR 4456 - Privacy Act of 1974; Report of Modified or Altered System of Records

    Science.gov (United States)

    2011-01-25

    ... Highway--M/ S: F-35, Chamblee, GA 30341 Hand Delivery/Courier: HHS/CDC Senior Official for Privacy (SOP), Office of the Chief Information Security Officer (OCISO), 4770 Buford Highway--M/S: F-35, Chamblee,...

  10. 76 FR 4474 - Privacy Act of 1974; Report of Modified or Altered System of Records

    Science.gov (United States)

    2011-01-25

    ...--M/ S: F-35, Chamblee, GA 30341. Hand Delivery/Courier: HHS/CDC Senior Official for Privacy (SOP), Office of the Chief Information Security Officer (OCISO), 4770 Buford Highway--M/S: F-35, Chamblee,...

  11. 76 FR 4454 - Privacy Act of 1974; Report of Modified or Altered System of Records

    Science.gov (United States)

    2011-01-25

    ...), 4770 Buford Highway--M/ S: F-35, Chamblee, GA 30341. Hand Delivery/Courier: HHS/CDC Senior Official for Privacy (SOP), Office of the Chief Information Security Officer (OCISO), 4770 Buford Highway--M/S:...

  12. 76 FR 4466 - Privacy Act of 1974; Report of Modified or Altered System of Records

    Science.gov (United States)

    2011-01-25

    ... Highway--M/ S: F-35, Chamblee, GA 30341. Hand Delivery/Courier: HHS/CDC Senior Official for Privacy (SOP), Office of the Chief Information Security Officer (OCISO), 4770 Buford Highway--M/S: F-35, Chamblee,...

  13. 76 FR 4445 - Privacy Act of 1974; Report of Modified or Altered System of Records

    Science.gov (United States)

    2011-01-25

    ... Highway--M/ S: F-35, Chamblee, GA 30341. Hand Delivery/Courier: HHS/CDC Senior Official for Privacy (SOP), Office of the Chief Information Security Officer (OCISO), 4770 Buford Highway--M/S: F-35, Chamblee,...

  14. 76 FR 4452 - Privacy Act of 1974; Report of Modified or Altered System of Records

    Science.gov (United States)

    2011-01-25

    ...: F-35, Chamblee, GA 30341. Hand Delivery/Courier: HHS/CDC Senior Official for Privacy (SOP), Office of the Chief Information Security Officer (OCISO), 4770 Buford Highway--M/S: F-35, Chamblee, GA...

  15. 75 FR 63703 - Privacy Act of 1974; Privacy Act Regulation

    Science.gov (United States)

    2010-10-18

    ... CFR Part 261a Privacy Act of 1974; Privacy Act Regulation AGENCY: Board of Governors of the Federal...) is issuing a final rule to amend its regulation implementing the Privacy Act of 1974 (Privacy Act..., and applicants for Board employment, for access to their records under the Privacy Act; the amendment...

  16. Choose Privacy Week: Educate Your Students (and Yourself) about Privacy

    Science.gov (United States)

    Adams, Helen R.

    2016-01-01

    The purpose of "Choose Privacy Week" is to encourage a national conversation to raise awareness of the growing threats to personal privacy online and in day-to-day life. The 2016 Choose Privacy Week theme is "respecting individuals' privacy," with an emphasis on minors' privacy. A plethora of issues relating to minors' privacy…

  17. 76 FR 58007 - Privacy Act of 1974; Report of a New System of Records

    Science.gov (United States)

    2011-09-19

    ... should send comments to: CMS Privacy Officer, Division of Information Security & Privacy Management, Enterprise Architecture and Strategy Group, Office of Information Services, CMS, Room N1-24-08, 7500 Security... disclosed. SYSTEM NUMBER: 09-70-0598 SYSTEM NAME: ACO Database System HHS/CMS/CM and HHS/CMS/CMMI....

  18. 76 FR 70730 - Privacy Act of 1974; Department of Homeland Security/U.S. Citizenship and Immigration Services...

    Science.gov (United States)

    2011-11-15

    ... sexual contact, limiting or denying others religious beliefs; service in military or other armed groups... concerning him or her, the individual may submit the request to the Chief Privacy Officer and Chief Freedom... this purpose from the Chief Privacy Officer and Chief Freedom of Information Act Officer, http://www...

  19. 78 FR 52553 - Privacy Act of 1974; Department of Homeland Security/ALL-035 Common Entity Index Prototype System...

    Science.gov (United States)

    2013-08-23

    ... privacy, civil rights and civil liberties, and other legal protections, DHS personnel requesting such... DHS Privacy Office, Office for Civil Rights and Civil Liberties, Office of the General Counsel, and... contained in the CEI Prototype relates to refugees, asylum seekers, and asylees, such information may not be...

  20. Participatory Privacy: Enabling Privacy in Participatory Sensing

    CERN Document Server

    De Cristofaro, Emiliano

    2012-01-01

    Participatory Sensing is an emerging computing paradigm that enables the distributed collection of data by self-selected participants. It allows the increasing number of mobile phone users to share local knowledge acquired by their sensor-equipped devices, e.g., to monitor temperature, pollution level or consumer pricing information. While research initiatives and prototypes proliferate, their real-world impact is often bounded to comprehensive user participation. If users have no incentive, or feel that their privacy might be endangered, it is likely that they will not participate. In this article, we focus on privacy protection in Participatory Sensing and introduce a suitable privacy-enhanced infrastructure. First, we provide a set of definitions of privacy requirements for both data producers (i.e., users providing sensed information) and consumers (i.e., applications accessing the data). Then, we propose an efficient solution designed for mobile phone users, which incurs very low overhead. Finally, we di...

  1. 36 CFR 1202.8 - How does NARA handle records that are in Government-wide Privacy Act systems?

    Science.gov (United States)

    2010-07-01

    ... that are in Government-wide Privacy Act systems? 1202.8 Section 1202.8 Parks, Forests, and Public... in Government-wide Privacy Act systems? Records in the custody of NARA in a Government-wide Privacy Act system are the primary responsibility of another agency, e.g., the Office of Personnel...

  2. Privacy, Democracy and Surveillance

    OpenAIRE

    Lever, Annabelle

    2013-01-01

    How should we think about our claims to privacy and their relationship to security? Must we suppose that privacy should give way before the demands of security whenever the two cannot both be fully protected? This is the position presented by Sir David Omand on numerous occasions and, most recently, in his response to the revelations of Edward Snowden. However, this article shows, Omand's reasoning and conclusions are both problematic, as the protection of privacy is necessary to a democratic...

  3. Privacy Training Program

    Science.gov (United States)

    Recognizing that training and awareness are critical to protecting agency Personally Identifiable Information (PII), the EPA is developing online training for privacy contacts in its programs and regions.

  4. Practical Privacy Assessment

    DEFF Research Database (Denmark)

    Peen, Søren; Jansen, Thejs Willem; Jensen, Christian D.

    2008-01-01

    This chapter proposes a privacy assessment model called the Operational Privacy Assessment Model that includes organizational, operational and technical factors for the protection of personal data stored in an IT system. The factors can be evaluated in a simple scale so that not only the resulting...... graphical depiction can be easily created for an IT system, but graphical comparisons across multiple IT systems are also possible. Examples of factors presented in a Kiviat graph are also presented. This assessment tool may be used to standardize privacy assessment criteria, making it less painful...... for the management to assess privacy risks on their systems....

  5. Practical Privacy Assessment

    DEFF Research Database (Denmark)

    Peen, Søren; Jansen, Thejs Willem; Jensen, Christian D.

    2008-01-01

    This chapter proposes a privacy assessment model called the Operational Privacy Assessment Model that includes organizational, operational and technical factors for the protection of personal data stored in an IT system. The factors can be evaluated in a simple scale so that not only the resulting...... graphical depiction can be easily created for an IT system, but graphical comparisons across multiple IT systems are also possible. Examples of factors presented in a Kiviat graph are also presented. This assessment tool may be used to standardize privacy assessment criteria, making it less painful...... for the management to assess privacy risks on their systems....

  6. 75 FR 70924 - Office of the National Coordinator for Health Information Technology; HIT Policy Committee's...

    Science.gov (United States)

    2010-11-19

    ... Policy Committee's Workgroups: Meaningful Use, Privacy & Security Tiger Team, Enrollment, Governance..., privacy and security, enrollment, governance, or adoption/ certification. If background materials are... HUMAN SERVICES Office of the National Coordinator for Health Information Technology; HIT...

  7. 75 FR 65485 - Office of the National Coordinator for Health Information Technology; HIT Policy Committee's...

    Science.gov (United States)

    2010-10-25

    ... Policy Committee's Workgroups: Meaningful Use, Privacy & Security Tiger Team, Enrollment, Governance... exchange, privacy and security, enrollment, governance, or adoption/ certification. If background materials... HUMAN SERVICES Office of the National Coordinator for Health Information Technology; HIT...

  8. 76 FR 9782 - Office of the National Coordinator for Health Information Technology; HIT Policy Committee's...

    Science.gov (United States)

    2011-02-22

    ...., meaningful use, information exchange, privacy and security, enrollment, governance, or adoption... Policy Committee's Workgroups: Meaningful Use, Privacy & Security Tiger Team, Enrollment, Governance... HUMAN SERVICES Office of the National Coordinator for Health Information Technology; HIT...

  9. 78 FR 70020 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2013-11-22

    ... Human Resources and Office of Security and Safety. Safeguards: Records are located in secured rooms with... to disciplinary action and prosecution. Retention and disposal: Records retention and disposal is in... Trademark Office, Commerce. ACTION: Notice of proposed new Privacy Act system of records. SUMMARY: In...

  10. 77 FR 26261 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2012-05-03

    ... of the Secretary Privacy Act of 1974; System of Records AGENCY: Office of the Defense Logistics Agency, DoD. ACTION: Notice to alter a system of records. SUMMARY: The Defense Logistics Agency proposes... Management System Office, 4800 Mark Center Drive, East Tower, 2nd Floor, Suite 02G09, Alexandria, VA...

  11. 78 FR 63311 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2013-10-23

    ... (414) 336-1910 or Jean Hayes, Privacy Officer, Office of Human Resources Management, 810 Vermont Avenue... of records titled ``Human Resources Information Systems Shared Service Center (HRIS SSC)--VA....regulations.gov . FOR FURTHER INFORMATION CONTACT: Terese A. Bell, Human Resources Specialist, Human Resources...

  12. 78 FR 35610 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2013-06-13

    ... information. FOR FURTHER INFORMATION CONTACT: Ms. Robin Patterson, Head, PA/FOIA Office (DNS-36), Department... formulate response letters may contain name, Social Security Number (SSN), business or company name, home..., Department of Navy Privacy/ Freedom of Information Act Office, Chief of Naval Operations (DNS-36), 2000...

  13. 76 FR 66752 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2011-10-27

    ... Privacy Act of 1974; System of Records AGENCY: Office of Professional Responsibility, United States... Professional Responsibility (``OPR''), proposes to amend the system of records entitled ``Office of Professional Responsibility Record Index,'' JUSTICE/OPR-001, last published in the Federal Register on December...

  14. Information Privacy Revealed

    Science.gov (United States)

    Lavagnino, Merri Beth

    2013-01-01

    Why is Information Privacy the focus of the January-February 2013 issue of "EDUCAUSE Review" and "EDUCAUSE Review Online"? Results from the 2012 annual survey of the International Association of Privacy Professionals (IAPP) indicate that "meeting regulatory compliance requirements continues to be the top perceived driver…

  15. Privacy and Publicity

    DEFF Research Database (Denmark)

    2013-01-01

    An account and critical discussion of the European Court of Human Right's approach to the balancing of protecting publicity and privacy......An account and critical discussion of the European Court of Human Right's approach to the balancing of protecting publicity and privacy...

  16. Privacy for Sale?

    DEFF Research Database (Denmark)

    Sørensen, Lene Tolstrup; Sørensen, Jannick Kirk; Khajuria, Samant

    conditions, and those who reject the idea completely. Based on the literature we identify two positions to privacy either as an instrumental good, or as an intrinsic good. The paper positions vari- ous user perceptions on privacy that are relevant for future service develop- ment....

  17. Information Privacy Revealed

    Science.gov (United States)

    Lavagnino, Merri Beth

    2013-01-01

    Why is Information Privacy the focus of the January-February 2013 issue of "EDUCAUSE Review" and "EDUCAUSE Review Online"? Results from the 2012 annual survey of the International Association of Privacy Professionals (IAPP) indicate that "meeting regulatory compliance requirements continues to be the top perceived driver…

  18. Privacy and Publicity

    DEFF Research Database (Denmark)

    Schaumburg-Müller, Sten

    2013-01-01

    An account and critical discussion of the European Court of Human Right's approach to the balancing of protecting publicity and privacy......An account and critical discussion of the European Court of Human Right's approach to the balancing of protecting publicity and privacy...

  19. Privacy Metrics and Boundaries

    NARCIS (Netherlands)

    L-F. Pau (Louis-François)

    2005-01-01

    textabstractThis paper aims at defining a set of privacy metrics (quantitative and qualitative) in the case of the relation between a privacy protector ,and an information gatherer .The aims with such metrics are: -to allow to assess and compare different user scenarios and their differences; for ex

  20. 75 FR 44803 - Privacy Act of 1974; Notice of a New Privacy Act System of Records (SORN), Ginnie Mae Master...

    Science.gov (United States)

    2010-07-29

    ... Master Subservicer System AGENCY: Office of the Chief Information Officer, HUD. ACTION: Notice of a New... Privacy Act of 1974 (5 U.S.C. 552a), as amended. The Ginne Mae Master Subservicer System will be used to... amended, notice is given of a new system of records, Ginnie Mae Master Subservicer System. Title 5...

  1. Identity And Privacy Services

    Directory of Open Access Journals (Sweden)

    Harry Katzan, Jr.

    2010-12-01

    Full Text Available Personal identity and privacy are important topics in information systems in general and data analytics in particular.  Normally associated with digital security, the scope of identity and privacy is much greater and affects most aspects of everyday life.  Related subjects are behavioral tracking, personal-identifiable information (PII, privacy data relevance, data repurposing, identity theft, and homeland security.  Identity and Privacy Services is an admixture of the major issues in the area of personal identity and privacy and the security of individual rights in a complex societal environment.  This is a general paper on this important subject, intended to give exposure to the constituent topics.

  2. Privacy under construction : A developmental perspective on privacy perception

    NARCIS (Netherlands)

    Steijn, W.M.P.; Vedder, A.H.

    2015-01-01

    We present a developmental perspective regarding the difference in perceptions toward privacy between young and old. Here, we introduce the notion of privacy conceptions, that is, the specific ideas that individuals have regarding what privacy actually is. The differences in privacy concerns often f

  3. Space in Space: Designing for Privacy in the Workplace

    Science.gov (United States)

    Akin, Jonie

    2015-01-01

    Privacy is cultural, socially embedded in the spatial, temporal, and material aspects of the lived experience. Definitions of privacy are as varied among scholars as they are among those who fight for their personal rights in the home and the workplace. Privacy in the workplace has become a topic of interest in recent years, as evident in discussions on Big Data as well as the shrinking office spaces in which people work. An article in The New York Times published in February of this year noted that "many companies are looking to cut costs, and one way to do that is by trimming personal space". Increasingly, organizations ranging from tech start-ups to large corporations are downsizing square footage and opting for open-office floorplans hoping to trim the budget and spark creative, productive communication among their employees. The question of how much is too much to trim when it comes to privacy, is one that is being actively addressed by the National Aeronautics and Space Administration (NASA) as they explore habitat designs for future space missions. NASA recognizes privacy as a design-related stressor impacting human health and performance. Given the challenges of sustaining life in an isolated, confined, and extreme environment such as Mars, NASA deems it necessary to determine the acceptable minimal amount for habitable volume for activities requiring at least some level of privacy in order to support optimal crew performance. Ethnographic research was conducted in 2013 to explore perceptions of privacy and privacy needs among astronauts living and working in space as part of a long-distance, long-duration mission. The allocation of space, or habitable volume, becomes an increasingly complex issue in outer space due to the costs associated with maintaining an artificial, confined environment bounded by limitations of mass while located in an extreme environment. Privacy in space, or space in space, provides a unique case study of the complex notions of

  4. Protecting patron privacy

    CERN Document Server

    Beckstrom, Matthew

    2015-01-01

    In a world where almost anyone with computer savvy can hack, track, and record the online activities of others, your library can serve as a protected haven for your visitors who rely on the Internet to conduct research-if you take the necessary steps to safeguard their privacy. This book shows you how to protect patrons' privacy while using the technology that your library provides, including public computers, Internet access, wireless networks, and other devices. Logically organized into two major sections, the first part of the book discusses why the privacy of your users is of paramount

  5. Web Security, Privacy & Commerce

    CERN Document Server

    Garfinkel, Simson

    2011-01-01

    Since the first edition of this classic reference was published, World Wide Web use has exploded and e-commerce has become a daily part of business and personal life. As Web use has grown, so have the threats to our security and privacy--from credit card fraud to routine invasions of privacy by marketers to web site defacements to attacks that shut down popular web sites. Web Security, Privacy & Commerce goes behind the headlines, examines the major security risks facing us today, and explains how we can minimize them. It describes risks for Windows and Unix, Microsoft Internet Exp

  6. Privacy in Social Networks

    CERN Document Server

    Zheleva, Elena

    2012-01-01

    This synthesis lecture provides a survey of work on privacy in online social networks (OSNs). This work encompasses concerns of users as well as service providers and third parties. Our goal is to approach such concerns from a computer-science perspective, and building upon existing work on privacy, security, statistical modeling and databases to provide an overview of the technical and algorithmic issues related to privacy in OSNs. We start our survey by introducing a simple OSN data model and describe common statistical-inference techniques that can be used to infer potentially sensitive inf

  7. Privacy for Sale?

    DEFF Research Database (Denmark)

    Sørensen, Lene Tolstrup; Sørensen, Jannick Kirk; Khajuria, Samant

    Data brokers have become central players in the collection online of private user data. Data brokers’ activities are however not very transparent or even known by users. Many users regard privacy a central element when they use online services. Based on 12 short interviews with users, this paper...... analyses how users perceive the concept of online privacy in respect to data brokers col- lection of private data, and particularly novel services that offer users the possi- bility to sell their private data. Two groups of users are identified: Those who are considering selling their data under specific...... conditions, and those who reject the idea completely. Based on the literature we identify two positions to privacy either as an instrumental good, or as an intrinsic good. The paper positions vari- ous user perceptions on privacy that are relevant for future service develop- ment....

  8. Legal Protections for Privacy

    Science.gov (United States)

    Leslie, David W.

    1977-01-01

    Individual interest in privacy is a multiple legal issue, roughly divided into four parts according to different types of law: constitutional, statutory, administrative, and common law. Policy implications of this issue for institutions are discussed. (Editor/LBH)

  9. 22 CFR 161.12 - Environmental effects abroad of major departmental actions.

    Science.gov (United States)

    2010-04-01

    ... analysis shall be prepared in accordance with separate Departmental procedures (Foreign Affairs Manual... 22 Foreign Relations 1 2010-04-01 2010-04-01 false Environmental effects abroad of major departmental actions. 161.12 Section 161.12 Foreign Relations DEPARTMENT OF STATE ENVIRONMENTAL PROTECTION...

  10. Average Tenure of Academic Department Heads: The Effects of Paradigm, Size, and Departmental Demography.

    Science.gov (United States)

    Pfeffer, Jeffrey; Moore, William L.

    1980-01-01

    The average tenure of academic department heads was found to be positively related to the level of paradigm development characterizing the department, negatively related to departmental size, and related to interactions of the level of paradigm development with the seniority mix of the faculty and with the departmental size. (Author/IRT)

  11. Elementary Teachers' Experiences and Perceptions of Departmentalized Instruction: A Case Study

    Science.gov (United States)

    Strohl, Alecia; Schmertzing, Lorraine; Schmertzing, Richard

    2014-01-01

    This case study investigated elementary teachers' experiences and perceptions during a trial year of departmentalized instruction in a rural south Georgia elementary school. To inform their decision about whole-school departmentalization for the future, school administrators appointed twelve first through third grade teachers to pilot the…

  12. 75 FR 75546 - Financial Management Service; Privacy Act of 1974, as Amended; System of Records

    Science.gov (United States)

    2010-12-03

    ... Financial Management Service; Privacy Act of 1974, as Amended; System of Records AGENCY: Financial... the Privacy Act of 1974, as amended, the Financial Management Service gives notice of a proposed new... send your comments to Peter Genova, Deputy Chief Information Officer, Financial Management Service, 401...

  13. 76 FR 35050 - Privacy Act of 1974: New System of Records

    Science.gov (United States)

    2011-06-15

    ... MANAGEMENT Privacy Act of 1974: New System of Records AGENCY: U.S. Office of Personnel Management (OPM... Data Warehouse, to its inventory of records systems subject to the Privacy Act of 1974 (5 U.S.C. 552a...(e)(4). OPM first published a system of records notice pertaining to the Health Claims Data...

  14. 75 FR 45674 - Privacy Act of 1974, as Amended; System of Records Notices

    Science.gov (United States)

    2010-08-03

    ...: The OGIS case files are maintained in the National Archives and Records Administration, Office of... RECORDS ADMINISTRATION Privacy Act of 1974, as Amended; System of Records Notices AGENCY: National Archives and Records Administration . ACTION: Notice of the establishment of new privacy system of...

  15. 78 FR 62640 - Office of the Director, National Institutes of Health; Notice of Closed Meeting

    Science.gov (United States)

    2013-10-22

    ... personal privacy. Name of Committee: Office of Research Infrastructure Programs Special Emphasis Panel... Institutes of Health, 6701 Democracy Blvd., Democracy 1, Room 1082, Bethesda, MD 20892-4874,...

  16. Transforming The Munitions And Missile Maintenance Officer Career Field

    Science.gov (United States)

    2016-04-01

    boards and inquiries.2 However, even with the assimilation of these immense organizational changes, the USAF nuclear enterprise continues to be...before resulting in a major organizational failure.50 CRITICAL ASSESSMENT There is no doubt of the importance of the munitions officer to the... Departmental Level waiver approval (MAJCOM Commander and concurring HAF publication approving official) required for anything lower. Additionally

  17. 77 FR 37890 - Submission for OMB Review; Office of Postsecondary Education; Graduate Assistance in Areas of...

    Science.gov (United States)

    2012-06-25

    ... From the Federal Register Online via the Government Publishing Office DEPARTMENT OF EDUCATION Submission for OMB Review; Office of Postsecondary Education; Graduate Assistance in Areas of National Need... Departmental review of the information collection. The Department of Education is especially interested...

  18. 75 FR 5166 - Privacy Act of 1974, as Amended; Computer Matching Program (Social Security Administration...

    Science.gov (United States)

    2010-02-01

    ... From the Federal Register Online via the Government Publishing Office SOCIAL SECURITY ADMINISTRATION Privacy Act of 1974, as Amended; Computer Matching Program (Social Security Administration/Railroad Retirement Board (SSA/RRB))-- Match Number 1308 AGENCY: Social Security Administration...

  19. 75 FR 23274 - Privacy Act of 1974; Department of Homeland Security United States Immigration Customs and...

    Science.gov (United States)

    2010-05-03

    ... use in the enforcement Federal firearms laws (e.g., Brady Act). BB. To Federal, State, local, tribal... facility. HH. To the news media and the public, with the approval of the Chief Privacy Officer in...

  20. 77 FR 68123 - Privacy Act of 1974; System of Records Notice

    Science.gov (United States)

    2012-11-15

    ...In accordance with the requirements of the Privacy Act of 1974, the Office of Minority Health, Office of the Assistant Secretary for Health, Office of the Secretary of Health and Human Services (HHS/ OS/OASH/OMH) is establishing a new system of records, ``Think Cultural Health,'' to support its Think Cultural Health Web site Program. The system will provide educational information, training,......

  1. Inequalities for the quantum privacy

    Science.gov (United States)

    Trindade, M. A. S.; Pinto, E.

    2016-02-01

    In this work, we investigate the asymptotic behavior related to the quantum privacy for multipartite systems. In this context, an inequality for quantum privacy was obtained by exploiting of quantum entropy properties. Subsequently, we derive a lower limit for the quantum privacy through the entanglement fidelity. In particular, we show that there is an interval where an increase in entanglement fidelity implies a decrease in quantum privacy.

  2. Security and Privacy of Electronic Banking

    Directory of Open Access Journals (Sweden)

    Zachary Bosire Omariba

    2012-07-01

    Full Text Available The internet has played a key role in changing how we interact with other people and how we do business today. As a result of the internet, electronic commerce has emerged, allowing business to more effectively interact with their customers and other corporations inside and outside their industries. One industry that is using this new communication channel to reach its customers is the banking industry. The e-banking system addresses several emerging trends: customers demand for anytime, anywhere service, product time-to-market imperatives and increasingly complex back-office integration challenges. The challenges that oppose electronic banking are concerns of security and privacy of information. This paper will first discuss the drivers of e-banking; secondly, it will talk about the concerns about e-banking from various perspectives. Thirdly, the security and privacy issues will also be discussed, and fourthly the attacks of e-banking with their solutions are discussed.

  3. Privacy and Open Government

    Directory of Open Access Journals (Sweden)

    Teresa Scassa

    2014-06-01

    Full Text Available The public-oriented goals of the open government movement promise increased transparency and accountability of governments, enhanced citizen engagement and participation, improved service delivery, economic development and the stimulation of innovation. In part, these goals are to be achieved by making more and more government information public in reusable formats and under open licences. This paper identifies three broad privacy challenges raised by open government. The first is how to balance privacy with transparency and accountability in the context of “public” personal information. The second challenge flows from the disruption of traditional approaches to privacy based on a collapse of the distinctions between public and private sector actors. The third challenge is that of the potential for open government data—even if anonymized—to contribute to the big data environment in which citizens and their activities are increasingly monitored and profiled.

  4. 78 FR 73466 - Privacy Act

    Science.gov (United States)

    2013-12-06

    ... CORPORATION 22 CFR Part 707 Privacy Act AGENCY: Overseas Private Investment Corporation. ACTION: Notice of... (``OPIC'') Privacy Act (``PA'') regulations by making substantive and administrative changes. These... procedure, Privacy. For the reasons stated in the preamble the Overseas Private Investment Corporation...

  5. Privacy Expectations in Online Contexts

    Science.gov (United States)

    Pure, Rebekah Abigail

    2013-01-01

    Advances in digital networked communication technology over the last two decades have brought the issue of personal privacy into sharper focus within contemporary public discourse. In this dissertation, I explain the Fourth Amendment and the role that privacy expectations play in the constitutional protection of personal privacy generally, and…

  6. Advertising and Invasion of Privacy.

    Science.gov (United States)

    Rohrer, Daniel Morgan

    The right of privacy as it relates to advertising and the use of a person's name or likeness is discussed in this paper. After an introduction that traces some of the history of invasion of privacy in court decisions, the paper examines cases involving issues such as public figures and newsworthy items, right of privacy waived, right of privacy…

  7. Designing Privacy-by-Design

    NARCIS (Netherlands)

    Rest, J.H.C. van; Boonstra, D.; Everts, M.H.; Rijn, M. van; Paassen, R.J.G. van

    2014-01-01

    The proposal for a new privacy regulation d.d. January 25th 2012 introduces sanctions of up to 2% of the annual turnover of enterprises. This elevates the importance of mitigation of privacy risks. This paper makes Privacy by Design more concrete, and positions it as the mechanism to mitigate these

  8. Privacy Expectations in Online Contexts

    Science.gov (United States)

    Pure, Rebekah Abigail

    2013-01-01

    Advances in digital networked communication technology over the last two decades have brought the issue of personal privacy into sharper focus within contemporary public discourse. In this dissertation, I explain the Fourth Amendment and the role that privacy expectations play in the constitutional protection of personal privacy generally, and…

  9. 78 FR 69367 - Membership of the Departmental Performance Review Board

    Science.gov (United States)

    2013-11-19

    ... members of the DPRB will expire December 31, 2015. DATES: Effective Date: The effective date of service of... Secretary Theodore C.Z. Johnston, Director, Office of White House Liaison Office of General Counsel...

  10. 76 FR 38458 - Departmental Offices; Submission for OMB Review, Comment Request

    Science.gov (United States)

    2011-06-30

    ... Collection Under Review: Consumer Financial Protection Bureau Consumer Response Intake Fields. SUMMARY: The Department of the Treasury, on behalf of itself and the Consumer Financial Protection Bureau (CFPB), will... review and approval in accordance with the Paperwork Reduction Act of 1995, Public Law 104-13 (44...

  11. 77 FR 12842 - Office of the Secretary; Departmental Appeals Board; Statement of Organization, Functions and...

    Science.gov (United States)

    2012-03-02

    ... greater flexibility and better reflects the current work environment and priorities within the... amended at 60 FR 52403- 52405, dated October 6, 1995, as follows: I. Under Section AH.10 Organization, add... the remaining list. Under Section AH.10 Organization, add Paragraph F, The Operations Division...

  12. 75 FR 5614 - Privacy Act of 1974; Department of Homeland Security/ALL-025 Law Enforcement Authority in Support...

    Science.gov (United States)

    2010-02-03

    ... marks such as tattoos, scars, etc; Height and weight; Eye and hair color; Biometric data; ] Home address... individual may submit the request to the Chief Privacy Officer and Chief Freedom of Information Act Officer... Officer and Chief Freedom of Information Act Officer, http://www.dhs.gov or 1-866-431-0486. In...

  13. 77 FR 51949 - Privacy Act, Exempt Record System

    Science.gov (United States)

    2012-08-28

    ... of Criminal Investigations, HHS Office of Inspector General, the Department of Justice, or other... of civil or criminal law. FDA's new system of records will be modeled after the system of records... rule. Under the Privacy Act (5 U.S.C. 552a), individuals have a right of access to...

  14. Police in the Dorms: Student Safety or Privacy Infringement?

    Science.gov (United States)

    Hoover, Eric

    2008-01-01

    Since 1970, officers on the Seattle campus have regularly patrolled the hallways of dormitories of the University of Washington. It is a community-policing strategy, a low-key way to engage students. However, the practice might cease this fall. In June, the state's Court of Appeals ruled that students have the same right to privacy in dormitory…

  15. 77 FR 72336 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2012-12-05

    ... Liaison Officer, Department of Defense. Deletion: A0215-2a CFSC System name: Army Club Membership Files... Centers or at clubs in the Army; therefore, the A0215-2a CFSC, Army Club Membership Files system of... Department of the Army Privacy Act of 1974; System of Records AGENCY: Department of the Army, DoD....

  16. 76 FR 20341 - Privacy Act of 1974; Systems of Records

    Science.gov (United States)

    2011-04-12

    ... Liaison Officer, Department of Defense. S190.24 System name: Biography File (May 26, 2009, 74 FR 24831....24 System name: Biography File. System location: Headquarters, Defense Logistics Agency (DLA), Public... of the Secretary Privacy Act of 1974; Systems of Records AGENCY: Defense Logistics Agency,...

  17. 75 FR 26201 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2010-05-11

    ... Information Files (October 13, 2009; 74 FR 52464) Changes: * * * * * Notification procedure: Delete entry and... address and telephone number.'' * * * * * LDIA 0011 System name: Student Information Files. System... Office of the Secretary Privacy Act of 1974; System of Records AGENCY: Defense Intelligence Agency,...

  18. 77 FR 67802 - Privacy Act of 1974, as Amended

    Science.gov (United States)

    2012-11-14

    ... costs, risks, and benefits of such products or services, and consumer behavior with respect to such... From the Federal Register Online via the Government Publishing Office BUREAU OF CONSUMER FINANCIAL PROTECTION Privacy Act of 1974, as Amended AGENCY: Bureau of Consumer Financial Protection ACTION: Notice of...

  19. 77 FR 26256 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2012-05-03

    ... Management System Office, 4800 Mark Center Drive, East Tower, Suite 02G09, Alexandria, VA 22350-3100... and leave and earnings statements.'' Authority for maintenance of the system: Delete entry and replace... of the Secretary Privacy Act of 1974; System of Records AGENCY: Defense Intelligence Agency,...

  20. 78 FR 14295 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2013-03-05

    ... submitting comments. * Mail: Federal Docket Management System Office, 4800 Mark Center Drive East Tower, 2nd... have been identified as being absent without leave or deserter.'' Categories of records in the system... Department of the Air Force Privacy Act of 1974; System of Records AGENCY: Department of the Air Force,...

  1. 77 FR 75621 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2012-12-21

    ... submitting comments. Mail: Federal Docket Management System Office, 4800 Mark Center Drive, East Tower, 2nd... maintenance of the system: Delete and replace with ``5 U.S.C. 6331 et seq., Leave; 10 U.S.C. 136, Assistant... of the Secretary Privacy Act of 1974; System of Records AGENCY: Defense Contract Audit Agency,...

  2. 78 FR 65976 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2013-11-04

    ... of the Secretary Privacy Act of 1974; System of Records AGENCY: Defense Logistics Agency, DoD. ACTION: Notice to add a new System of Records. SUMMARY: The Defense Logistics Agency proposes to add a new system.... * Mail: Federal Docket Management System Office, 4800 Mark Center Drive, East Tower, 2nd Floor,...

  3. 75 FR 28242 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2010-05-20

    ... of the Secretary Privacy Act of 1974; System of Records AGENCY: Defense Logistics Agency, DoD. ACTION: Notice to amend a system of records. SUMMARY: The Defense Logistics Agency is proposing to amend a system...: Federal Docket Management System Office, 1160 Defense Pentagon, Washington, DC 20301-1160....

  4. 77 FR 21755 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2012-04-11

    ... of the Secretary Privacy Act of 1974; System of Records AGENCY: Defense Logistics Agency, DoD. ACTION: Notice to amend a system of records. SUMMARY: The Defense Logistics Agency is proposing to amend a system... the instructions for submitting comments. Mail: Federal Docket Management System Office, 4800...

  5. 78 FR 22854 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2013-04-17

    ... of the Secretary Privacy Act of 1974; System of Records AGENCY: Defense Logistics Agency, DoD. ACTION: Notice to alter a System of Records. SUMMARY: The Defense Logistics Agency proposes to alter a system of...: Federal Docket Management System Office, 4800 Mark Center Drive, East Tower, 2nd Floor, Suite...

  6. 75 FR 10473 - Privacy Act of 1974; Systems of Records

    Science.gov (United States)

    2010-03-08

    ... of the Secretary Privacy Act of 1974; Systems of Records AGENCY: Defense Logistics Agency, DoD. ACTION: Notice to amend a system of records. SUMMARY: The Defense Logistics Agency proposes to amend a...: Federal Docket Management System Office, 1160 Defense Pentagon, Washington, DC 20301-1160....

  7. 76 FR 72691 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2011-11-25

    ... of the Secretary Privacy Act of 1974; System of Records AGENCY: Defense Logistics Agency, Department of Defense (DoD). ACTION: Notice to amend a system of records. SUMMARY: The Defense Logistics Agency... submitting comments. Mail: Federal Docket Management System Office, 4800 Mark Center Drive, East Tower,...

  8. 76 FR 76149 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2011-12-06

    ... of the Secretary Privacy Act of 1974; System of Records AGENCY: Defense Logistics Agency, DoD. ACTION: Notice to Amend a System of Records. SUMMARY: The Defense Logistics Agency is proposing to amend a system.... * Mail: Federal Docket Management System Office, 4800 Mark Center Drive, East Tower, 2nd Floor,...

  9. 78 FR 17386 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2013-03-21

    ... of the Secretary Privacy Act of 1974; System of Records AGENCY: Defense Logistics Agency, DoD. ACTION: Notice to alter a System of Records. SUMMARY: The Defense Logistics Agency proposes to alter a system of...: Federal Docket Management System Office, 4800 Mark Center Drive, East Tower, 2nd Floor, Suite...

  10. 77 FR 26260 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2012-05-03

    ... of the Secretary Privacy Act of 1974; System of Records AGENCY: Defense Logistics Agency, DoD. ACTION: Notice to alter a system of records. SUMMARY: The Defense Logistics Agency proposes to alter a system of... the instructions for submitting comments. * Mail: Federal Docket Management System Office, 4800...

  11. 75 FR 17910 - Privacy Act of 1974; Systems of Records

    Science.gov (United States)

    2010-04-08

    ... of the Secretary Privacy Act of 1974; Systems of Records AGENCY: Defense Logistics Agency, DoD. ACTION: Notice to delete a system of records. SUMMARY: The Defense Logistics Agency proposes to delete a...: Federal Docket Management System Office, 1160 Defense Pentagon, Washington, DC 20301-1160....

  12. 77 FR 3238 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2012-01-23

    ...-0008] Privacy Act of 1974; System of Records AGENCY: Defense Logistics Agency, DoD. ACTION: Notice To Amend a System of Records. SUMMARY: The Defense Logistics Agency is proposing to amend a system of... the instructions for submitting comments. * Mail: Federal Docket Management System Office, 4800...

  13. 76 FR 65185 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2011-10-20

    ... of the Secretary Privacy Act of 1974; System of Records AGENCY: Defense Logistics Agency, Department of Defense. ACTION: Notice to amend a system of records. SUMMARY: The Defense Logistics Agency is... submitting comments. * Mail: Federal Docket Management System Office, 4800 Mark Center Drive, East Tower,...

  14. 78 FR 6078 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2013-01-29

    ... of the Secretary Privacy Act of 1974; System of Records AGENCY: Defense Logistics Agency, DoD. ACTION: Notice to delete a System of Records. SUMMARY: The Defense Logistics Agency is deleting a system of.... * Mail: Federal Docket Management System Office, 4800 Mark Center Drive, East Tower, 2nd Floor,...

  15. 75 FR 48655 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2010-08-11

    ... of the Secretary Privacy Act of 1974; System of Records AGENCY: Defense Logistics Agency, DoD. ACTION: Notice to amend a system of records. SUMMARY: The Defense Logistics Agency is proposing to amend a system.... Mail: Federal Docket Management System Office, Room 3C843 Pentagon, 1160 Defense Pentagon,...

  16. 78 FR 17385 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2013-03-21

    ... of the Secretary Privacy Act of 1974; System of Records AGENCY: Defense Logistics Agency, DoD. ACTION: Notice to amend a System of Records. SUMMARY: The Defense Logistics Agency is amending a system of.... * Mail: Federal Docket Management System Office, 4800 Mark Center Drive, East Tower, 2nd Floor,...

  17. 76 FR 12076 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2011-03-04

    ... of the Secretary Privacy Act of 1974; System of Records AGENCY: Defense Logistics Agency, DoD. ACTION: Notice to amend a system of records. SUMMARY: The Defense Logistics Agency is proposing to amend a system... instructions for submitting comments. * Mail: Federal Docket Management System Office, 1160 Defense...

  18. 75 FR 6000 - Privacy Act of 1974; Systems of Records

    Science.gov (United States)

    2010-02-05

    ... of the Secretary Privacy Act of 1974; Systems of Records AGENCY: Defense Logistics Agency, DoD. ACTION: Notice to delete a system of records. SUMMARY: The Defense Logistics Agency proposes to delete a...: Federal Docket Management System Office, 1160 Defense Pentagon, Washington, DC 20301-1160....

  19. 75 FR 37842 - Privacy Act of 1974; Systems of Records

    Science.gov (United States)

    2010-06-30

    ... appeal of the benefit determination under 29 CFR 4003.51. PBGC will notify the participant of the... From the Federal Register Online via the Government Publishing Office PENSION BENEFIT GUARANTY CORPORATION Privacy Act of 1974; Systems of Records AGENCY: Pension Benefit Guaranty Corporation....

  20. 77 FR 58816 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2012-09-24

    ... Agency is deleting five systems of records notices from its existing inventory of record systems subject... proposes to delete five systems of records from its inventory of record systems subject to the Privacy Act... Accounting Service system of records notice, T-7340d, Defense Military Pay Office Input and Reporting...

  1. 77 FR 65370 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2012-10-26

    ... Office of the Secretary Privacy Act of 1974; System of Records AGENCY: Defense Finance and Accounting Service, DoD. ACTION: Notice to delete a Systems of Records. SUMMARY: The Defense Finance and Accounting Service is deleting a system of records notice in its existing inventory of record systems subject to...

  2. Report on Virginia Tech Shootings Urges Clarification of Privacy Laws

    Science.gov (United States)

    Fischer, Karin

    2007-01-01

    Educators, mental-health officials, and law-enforcement officers often do not share information about troubled students because they are confused by what they can disclose under complex and overlapping privacy laws, according to a report on the Virginia Tech shootings. Attorney General Alberto R. Gonzales and two other Bush cabinet secretaries…

  3. 77 FR 60382 - Privacy Act of 1974, as Amended

    Science.gov (United States)

    2012-10-03

    ... benefits of consumer financial products or services, (b) consumer behavior with respect to consumer... From the Federal Register Online via the Government Publishing Office BUREAU OF CONSUMER FINANCIAL PROTECTION Privacy Act of 1974, as Amended AGENCY: Bureau of Consumer Financial Protection. ACTION: Notice...

  4. Privacy in the family

    NARCIS (Netherlands)

    Newell, Bryce; Metoyer, Cheryl A.; Moore, Adam D.

    2015-01-01

    Popular access to increasingly sophisticated forms of electronic surveillance technologies has altered the dynamics of family relationships. Monitoring, mediated and facilitated by practices of both covert and overt electronic surveillance, has changed the nature of privacy within the family. In thi

  5. Formal Methods for Privacy

    Science.gov (United States)

    2009-09-01

    Shuchi Chawla, Cynthia Dwork, Frank McSherry, Adam Smith , and Hoeteck Wee. Toward privacy in public databases. In 2nd Theory of Cryptography Conference...Dwork, Frank McSherry, Kobbi Nissim, and Adam Smith . Calibrating noise to sensitivity in private data analysis. In In Proceedings of the 3rd Theory of

  6. Biometrics and privacy

    NARCIS (Netherlands)

    Grijpink, J.H.A.M.

    2001-01-01

    Biometrics offers many alternatives for protecting our privacy and preventing us from falling victim to crime. Biometrics can even serve as a solid basis for safe anonymous and semi-anonymous legal transactions. In this article Jan Grijpink clarifies which concepts and practical applications this

  7. Privacy Policy | FNLCR

    Science.gov (United States)

    The privacy of our users is of utmost importance to Frederick National Lab. The policy outlined below establishes how Frederick National Lab will use the information we gather about you from your visit to our website. We may collect and store

  8. Collaborative Privacy - A Community-Based Privacy Infrastructure

    Science.gov (United States)

    Kolter, Jan; Kernchen, Thomas; Pernul, Günther

    The landscape of the World Wide Web with all its versatile services heavily relies on the disclosure of private user information. Service providers collecting more and more of these personal user data pose a growing privacy threat for users. Addressing user concerns privacy-enhancing technologies emerged. One goal of these technologies is to enable users to improve the control over their personal data. A famous representative is the PRIME project that aims for a holistic privacy-enhancing identity management system. However, approaches like the PRIME privacy architecture require service providers to change their server infrastructure and add specific privacy-enhancing components. In the near future, service providers are not expected to alter internal processes. In this paper, we introduce a collaborative privacy community that allows the open exchange of privacy-related information. We lay out the privacy community’s functions and potentials within a user-centric, provider-independent privacy architecture that will help foster the usage and acceptance of privacy-enhancing technologies.

  9. 76 FR 67751 - Privacy Act of 1974; Department of Homeland Security, U.S. Customs and Border Protection, DHS/CBP...

    Science.gov (United States)

    2011-11-02

    ... From the Federal Register Online via the Government Publishing Office DEPARTMENT OF HOMELAND... Border Protection, DHS/CBP-009--Electronic System for Travel Authorization (ESTA) System of Records AGENCY: Privacy Office, DHS. ACTION: Notice of Privacy Act system of records. SUMMARY: In accordance...

  10. Department of Justice, Office on Violence Against Women

    Science.gov (United States)

    ... and the entire Obama Administration’s – commitment to inclusive criminal justice reform efforts. For example, last month the ... No FEAR Act Information Quality Privacy Policy Legal Policies & Disclaimers Right Column Social Media For Employees Office of the ...

  11. 76 FR 54196 - Membership of the Departmental Performance Review Board

    Science.gov (United States)

    2011-08-31

    ..., Joanne Buenzli Crane, Chief Financial Officer and Director for Administration. Economics and Development... Secretary for International Trade, Stephen P. Jacobs, Deputy Assistant Secretary for Market Access and...

  12. 77 FR 61571 - Membership of the Departmental Performance Review Board

    Science.gov (United States)

    2012-10-10

    ... Officer and Assistant Secretary for Administration Frederick E. Stephens, Deputy Assistant Secretary for... Statistics Administration Kenneth A. Arnold, Associate Under Secretary for Management Joanne Buenzli Crane...

  13. 75 FR 68669 - Senior Executive Service; Departmental Performance Review Board

    Science.gov (United States)

    2010-11-08

    ... Network. David A. Lebryk, Commissioner, Financial Management Service. Wanda J. Rogers, Deputy Commissioner.... Harvey, Acting Deputy Assistant Secretary for Human Resources and Chief Human Capital Officer....

  14. Privacy Awareness: A Means to Solve the Privacy Paradox?

    Science.gov (United States)

    Pötzsch, Stefanie

    People are limited in their resources, i.e. they have limited memory capabilities, cannot pay attention to too many things at the same time, and forget much information after a while; computers do not suffer from these limitations. Thus, revealing personal data in electronic communication environments and being completely unaware of the impact of privacy might cause a lot of privacy issues later. Even if people are privacy aware in general, the so-called privacy paradox shows that they do not behave according to their stated attitudes. This paper discusses explanations for the existing dichotomy between the intentions of people towards disclosure of personal data and their behaviour. We present requirements on tools for privacy-awareness support in order to counteract the privacy paradox.

  15. Acoustical quality in office workstations, as assed by occupant surveys

    DEFF Research Database (Denmark)

    Jensen, Kasper Lynge

    2005-01-01

    We analyzed acoustic satisfaction in office environments in buildings surveyed by The Center For The Built Environment (CBE). A total of 23,450 respondents from 142 buildings were included in the analysis. Acoustic satisfaction in the CBE survey is a function of satisfaction with both noise...... and speech privacy. In the database people are significantly more dissatisfied with speech privacy than noise level (P offices are significantly more satisfied with the acoustics than occupants in cubicles (P...

  16. Privacy and Facebook

    Directory of Open Access Journals (Sweden)

    Ronan Comer

    2012-09-01

    Full Text Available Social Networking is continually growing and showing more possibilities. Facebook the leading social network site is approaching 1 billion members. Facebook guarantees more than friend requests and also acts as an excellent marketing tool for businesses. Social media is a technology allowing the nation to publish instantly and economically on the internet. It encourages live discussion on a huge range of topics, with not only friends, but businesses and consumers. Facebook serves 120 billion hits per day, stored 60 billion photos and generated 150TB (Terabytes of logs every day. Privacy - or lack of it - however has provoked outrage at various times in the media. This paper seeks to examine the ramifications of poor privacy management by Facebook.

  17. Performing privacy in schools

    DEFF Research Database (Denmark)

    Bøge, Ask Risom; Albrechtslund, Anders; Andersen, Lars Bo

    2017-01-01

    In this presentation we pursue the question: How is privacy performed and perceived in schools by children? Our aim is to investigate how the boundaries between public and private spheres are continuously performed in the formal setting of the classroom as well as in the social lives of students....... School life involves a wide range of technologies, including smartphones, online communication platforms between teachers and parents, and social media. These and other surveillance-enabling services all contribute to the tracking of and by school children and shape their perceptions of privacy (Monahan...... and Torres, 2009; Selwyn, 2010; Taylor, 2013; Taylor & Rooney, 2016). The presentation reports findings from a qualitative study in which teachers and students between 12-16 from two Danish schools are interviewed. In addition, the teachers and students participate in workshops where experiments...

  18. 76 FR 39245 - Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security/U.S. Coast...

    Science.gov (United States)

    2011-07-06

    ....S. Coast Guard--008 Courts Martial Case Files System of Records; Correction AGENCY: Privacy Office.../U.S. Coast Guard--008 Courts Martial Case Files System of Records'' from certain provisions of the... Files System of Records'' from certain provisions of the Privacy Act. Specifically, the...

  19. 75 FR 9233 - Privacy Act of 1974; U.S. Immigration and Customs Enforcement-006 Intelligence Records System of...

    Science.gov (United States)

    2010-03-01

    ... Intelligence Records System of Records AGENCY: Privacy Office, DHS. ACTION: Notice of Privacy Act system of... modifying an existing system of records titled the Immigration and Customs Enforcement-006 Intelligence... Immigration and Customs Enforcement Intelligence Records system of records notice to more clearly explain...

  20. 75 FR 8088 - Privacy Act of 1974; Department of Homeland Security/ALL-023 Personnel Security Management System...

    Science.gov (United States)

    2010-02-23

    ... Security Management System of Records AGENCY: Privacy Office; DHS. ACTION: Notice of Privacy Act system of... to update and reissue Department of Homeland Security/ALL--023 Personnel Security Management System... routine uses of this system have been reviewed and updated to reflect the personnel security...

  1. Approximate Privacy: Foundations and Quantification

    CERN Document Server

    Feigenbaum, Joan; Schapira, Michael

    2009-01-01

    Increasing use of computers and networks in business, government, recreation, and almost all aspects of daily life has led to a proliferation of online sensitive data about individuals and organizations. Consequently, concern about the privacy of these data has become a top priority, particularly those data that are created and used in electronic commerce. There have been many formulations of privacy and, unfortunately, many negative results about the feasibility of maintaining privacy of sensitive data in realistic networked environments. We formulate communication-complexity-based definitions, both worst-case and average-case, of a problem's privacy-approximation ratio. We use our definitions to investigate the extent to which approximate privacy is achievable in two standard problems: the second-price Vickrey auction and the millionaires problem of Yao. For both the second-price Vickrey auction and the millionaires problem, we show that not only is perfect privacy impossible or infeasibly costly to achieve...

  2. Location Privacy in RFID Applications

    Science.gov (United States)

    Sadeghi, Ahmad-Reza; Visconti, Ivan; Wachsmann, Christian

    RFID-enabled systems allow fully automatic wireless identification of objects and are rapidly becoming a pervasive technology with various applications. However, despite their benefits, RFID-based systems also pose challenging risks, in particular concerning user privacy. Indeed, improvident use of RFID can disclose sensitive information about users and their locations allowing detailed user profiles. Hence, it is crucial to identify and to enforce appropriate security and privacy requirements of RFID applications (that are also compliant to legislation). This chapter first discusses security and privacy requirements for RFID-enabled systems, focusing in particular on location privacy issues. Then it explores the advances in RFID applications, stressing the security and privacy shortcomings of existing proposals. Finally, it presents new promising directions for privacy-preserving RFID systems, where as a case study we focus electronic tickets (e-tickets) for public transportation.

  3. On quantum and approximate privacy

    CERN Document Server

    Klauck, H

    2001-01-01

    This paper studies privacy in communication complexity. The focus is on quantum versions of the model and on protocols with only approximate privacy against honest players. We show that the privacy loss (the minimum divulged information) in computing a function can be decreased exponentially by using quantum protocols, while the class of privately computable functions (i.e., those with privacy loss 0) is not increased by quantum protocols. Quantum communication combined with small information leakage on the other hand makes certain functions computable (almost) privately which are not computable using quantum communication without leakage or using classical communication with leakage. We also give an example of an exponential reduction of the communication complexity of a function by allowing a privacy loss of o(1) instead of privacy loss 0.

  4. Privacy 2.0

    Directory of Open Access Journals (Sweden)

    Stylianos Papathanassopoulos

    2015-04-01

    Full Text Available We live in the era of change. In this world, privacy is not a static concept, but instead has a dynamic component. Overall, it becomes clear that the public and private are not defined in the same manner as in the past and as in the actual world, while our personal information has become a commodity that can raise our visibility in the social media driven world.

  5. Cognitive Privacy for Personal Clouds

    Directory of Open Access Journals (Sweden)

    Milena Radenkovic

    2016-01-01

    Full Text Available This paper proposes a novel Cognitive Privacy (CogPriv framework that improves privacy of data sharing between Personal Clouds for different application types and across heterogeneous networks. Depending on the behaviour of neighbouring network nodes, their estimated privacy levels, resource availability, and social network connectivity, each Personal Cloud may decide to use different transmission network for different types of data and privacy requirements. CogPriv is fully distributed, uses complex graph contacts analytics and multiple implicit novel heuristics, and combines these with smart probing to identify presence and behaviour of privacy compromising nodes in the network. Based on sensed local context and through cooperation with remote nodes in the network, CogPriv is able to transparently and on-the-fly change the network in order to avoid transmissions when privacy may be compromised. We show that CogPriv achieves higher end-to-end privacy levels compared to both noncognitive cellular network communication and state-of-the-art strategies based on privacy-aware adaptive social mobile networks routing for a range of experiment scenarios based on real-world user and network traces. CogPriv is able to adapt to varying network connectivity and maintain high quality of service while managing to keep low data exposure for a wide range of privacy leakage levels in the infrastructure.

  6. Privacy and the Connected Society

    DEFF Research Database (Denmark)

    Sørensen, Lene Tolstrup; Khajuria, Samant; Skouby, Knud Erik

    the society. Enabling the vision of the connected society, researchers point in the direction of security and privacy as areas to challenge the vision. By use of the Internet of Things reference model as well as the vision of the connected society, this paper identifies privacy of the individual with respect...... to three selected areas: Shopping, connected cars and online gaming. The paper concludes that privacy is a complexity within the connected society vision and that thee is a need for more privacy use cases to shed light on the challenge....

  7. Parametric analysis of open plan offices

    Science.gov (United States)

    Nogueira, Flavia F.; Viveiros, Elvira B.

    2002-11-01

    The workspace has been undergoing many changes. Open plan offices are being favored instead of ones of traditional design. In such offices, workstations are separated by partial height barriers, which allow a certain degree of visual privacy and some sound insulation. The challenge in these offices is to provide acoustic privacy for the workstations. Computer simulation was used as a tool for this investigation. Two simple models were generated and their results compared to experimental data measured in two real offices. After validating the approach, models with increasing complexity were generated. Lastly, an ideal office with 64 workstations was created and a parametric survey performed. Nine design parameters were taken as variables and the results are discussed in terms of sound pressure level, in octave bands, and intelligibility index.

  8. Data privacy for the smart grid

    CERN Document Server

    Herold, Rebecca

    2015-01-01

    The Smart Grid and PrivacyWhat Is the Smart Grid? Changes from Traditional Energy Delivery Smart Grid Possibilities Business Model Transformations Emerging Privacy Risks The Need for Privacy PoliciesPrivacy Laws, Regulations, and Standards Privacy-Enhancing Technologies New Privacy Challenges IOT Big Data What Is the Smart Grid?Market and Regulatory OverviewTraditional Electricity Business SectorThe Electricity Open Market Classifications of Utilities Rate-Making ProcessesElectricity Consumer

  9. 75 FR 56503 - Membership of the Departmental Performance Review Board

    Science.gov (United States)

    2010-09-16

    ... Secretary: ] John C. Connor, Director, Office of White House Liaison Tene A. Dolphin, Director, Executive... Secretary for Market Access and Compliance Theodore C.Z. Johnston, Chief of Staff for ITA Minority Business...

  10. Privacy, Security, & Compliance: Strange Bedfellows or a Marriage Made in Heaven?

    Science.gov (United States)

    Corn, Michael; Rosenthal, Jane

    2013-01-01

    Where does privacy belong in the college/university ecosystem, and what should its relationship be with security and compliance? Are the three areas best kept separate and distinct? Should there be some overlap? Or would a single office, officer, and/or reporting line enable a big picture of the whole? This article examines several of the campus…

  11. 77 FR 15024 - Privacy Act of 1974; Revised System of Records

    Science.gov (United States)

    2012-03-14

    ...) 295-5168. Mail: Chris North, Enterprise Applications Services Director, eAuthentication, 2150 Centre...: Ravoyne Payton, Chief Privacy Officer, Technology Planning, Architecture and E-Government, Office of the... follows: 1. To external Web applications integrated with the government's federated architecture...

  12. 76 FR 44033 - Privacy Act of 1974, as Amended; Notice of a New System of Records

    Science.gov (United States)

    2011-07-22

    ... Privacy Act Officer. SYSTEM OF RECORDS: DOI-08 SYSTEM NAME: DOI Social Networks. SYSTEM CLASSIFICATION... Elden Street, Herndon, Virginia 20170. (8) Office of Surface Mining Reclamation and Enforcement, 1951..., videos, and images, which may include tags, geotags or geographical metadata. Depending on...

  13. 78 FR 23313 - Privacy Act of 1974: New System of Records

    Science.gov (United States)

    2013-04-18

    ... subject to the Privacy Act of 1974 (5 U.S.C. 552a) to reflect the fact that the Office of Planning and.... SUPPLEMENTARY INFORMATION: The Office of Planning and Policy Analysis, in cooperation with the OPM/Chief... Warehouse (HCDW) system, also provides a ``hot site'' disaster recovery capability should the...

  14. Privacy, Security, & Compliance: Strange Bedfellows or a Marriage Made in Heaven?

    Science.gov (United States)

    Corn, Michael; Rosenthal, Jane

    2013-01-01

    Where does privacy belong in the college/university ecosystem, and what should its relationship be with security and compliance? Are the three areas best kept separate and distinct? Should there be some overlap? Or would a single office, officer, and/or reporting line enable a big picture of the whole? This article examines several of the campus…

  15. 77 FR 1728 - Privacy Act of 1974; Publication of Five New Systems of Records; Amendments to Five Existing...

    Science.gov (United States)

    2012-01-11

    ... or who owe a payment for back wages as a result of the enforcement of the Fair Labor Standards Act... CONTACT: Joseph J. Plick, Counsel for FOIA/ FACA/Privacy Act, Office of the Solicitor, Department of Labor...-agencies: the Office of Federal Contract Compliance Programs, the Office of Labor Management Standards, the...

  16. Privacy-Preserving Trajectory Collection

    DEFF Research Database (Denmark)

    Gidofalvi, Gyozo; Xuegang, Huang; Pedersen, Torben Bach

    2008-01-01

    . To remedy this situation, this paper first formally defines novel location privacy requirements. Then, it briefly presents a system for privacy--preserving trajectory collection that meets these requirements. The system is composed of an untrusted server and clients communicating in a P2P network. Location...

  17. Privacy and Big Data

    CERN Document Server

    Craig, Terence

    2011-01-01

    Much of what constitutes Big Data is information about us. Through our online activities, we leave an easy-to-follow trail of digital footprints that reveal who we are, what we buy, where we go, and much more. This eye-opening book explores the raging privacy debate over the use of personal data, with one undeniable conclusion: once data's been collected, we have absolutely no control over who uses it or how it is used. Personal data is the hottest commodity on the market today-truly more valuable than gold. We are the asset that every company, industry, non-profit, and government wants. Pri

  18. Departmentalization and Organizational Context: The Experience of the University of Guadalajara

    Directory of Open Access Journals (Sweden)

    Adrián Acosta Silva

    2005-05-01

    Full Text Available This work consists of an evaluation of the experience of organizational reform and academic departmentalization at a Mexican public university, the University of Guadalajara (U. of G., occurred in the period of 1994-2005. It is a research carried out from the perspective of the institutional change analysis, which obeys the interest of carrying out a rigorous evaluation of the process, after 11 years of its institutional operation. From a reconstruction of the context that gave origin and sense to the reform proposal and to the idea of academic departmentalization, some of the results and conditions in which the academic departments of the U. of G operate are analyzed. Finally, some of the problems and challenges that face the departmental structure in this institutional experience are identified.

  19. Preserving Privacy of Agents in Participatory-Sensing Schemes for Traffic Estimation

    OpenAIRE

    Farokhi, Farhad; Shames, Iman

    2016-01-01

    A measure of privacy infringement for agents (or participants) travelling across a transportation network in participatory-sensing schemes for traffic estimation is introduced. The measure is defined to be the conditional probability that an external observer assigns to the private nodes in the transportation network, e.g., location of home or office, given all the position measurements that it broadcasts over time. An algorithm for finding an optimal trade-off between the measure of privacy ...

  20. HIV-positive status and preservation of privacy: a recent decision from the Italian Data Protection Authority on the procedure of gathering personal patient data in the dental office.

    Science.gov (United States)

    Conti, Adelaide; Delbon, Paola; Laffranchi, Laura; Paganelli, Corrado; De Ferrari, Francesco

    2012-06-01

    The processing of sensitive information in the health field is subject to rigorous standards that guarantee the protection of information confidentiality. Recently, the Italian Data Protection Authority (Garante per la Protezione dei Dati Personali) stated their formal opinion on a standard procedure in dental offices involving the submission of a questionnaire that includes the patient's health status. HIV infection status is included on the form. The Authority has stated that all health data collection must be in accordance with the current Italian normative framework for personal data protection and respect the patient's freedom. This freedom allows the patient to decide, in a conscious and responsible way, whether to share health information with health personnel without experiencing any prejudice in the provision of healthcare requested. Moreover, data collection must be relevant and cannot exceed the principles of treatment goals with reference to the specific care of the concerned person. However, the need for recording information regarding HIV infection at the first appointment, regardless of the clinical intervention or therapeutic plan that needs to be conducted, should not alter the standard protection measures of the healthcare staff. In fact, these measures are adopted for every patient.

  1. A Generic Privacy Quantification Framework for Privacy-Preserving Data Publishing

    Science.gov (United States)

    Zhu, Zutao

    2010-01-01

    In recent years, the concerns about the privacy for the electronic data collected by government agencies, organizations, and industries are increasing. They include individual privacy and knowledge privacy. Privacy-preserving data publishing is a research branch that preserves the privacy while, at the same time, withholding useful information in…

  2. A Generic Privacy Quantification Framework for Privacy-Preserving Data Publishing

    Science.gov (United States)

    Zhu, Zutao

    2010-01-01

    In recent years, the concerns about the privacy for the electronic data collected by government agencies, organizations, and industries are increasing. They include individual privacy and knowledge privacy. Privacy-preserving data publishing is a research branch that preserves the privacy while, at the same time, withholding useful information in…

  3. Managerial span of control: a pilot study comparing departmental complexity and number of direct reports.

    Science.gov (United States)

    Merrill, Katreena Collette; Pepper, Ginette; Blegen, Mary

    2013-09-01

    Nurse managers play pivotal roles in hospitals. However, restructuring has resulted in nurse managers having wider span of control and reduced visibility. The purpose of this pilot study was to compare two methods of measuring span of control: departmental complexity and number of direct reports. Forty-one nurse managers across nine hospitals completed The Ottawa Hospital Clinical Manager Span of Control Tool (TOH-SOC) and a demographic survey. A moderate positive relationship between number of direct reports and departmental complexity score was identified (r=.49, p=managers' responsibility. Copyright © 2013 Longwoods Publishing.

  4. Departmental role and scope in infection control: use of a template that meets Joint Commission requirements.

    Science.gov (United States)

    Pearson, A; Becker, L; Almaraz, J

    1996-02-01

    Since its inception in 1990, departmental role and scope in the infection control program have developed into the five important aspects currently defined by the Joint Commission. Each health care worker needs to understand his or her role in infection prevention and control, integrate it into daily activities, and articulate this role to others. This strategy for complying with Joint Commission standards meets customer needs and can easily be adapted for use in other medical centers. The process of defining departmental roles in the infection control program will continue to evolve with increased awareness of customer needs and emphasis on continuous quality improvement.

  5. Predicting Results of the Research Excellence Framework using Departmental h-Index -- Revisited

    CERN Document Server

    Mryglod, O; Holovatch, Yu; Berche, B

    2015-01-01

    We revisit our recent study [Predicting results of the Research Excellence Framework using departmental h-index, Scientometrics, 2014, 1-16; arXiv:1411.1996] in which we attempted to predict outcomes of the UK's Research Excellence Framework (REF~2014) using the so-called departmental $h$-index. Here we report that our predictions failed to anticipate with any accuracy either overall REF outcomes or movements of individual institutions in the rankings relative to their positions in the previous Research Assessment Exercise (RAE~2008).

  6. 42 CFR 498.80 - Right to request Departmental Appeals Board review of Administrative Law Judge's decision or...

    Science.gov (United States)

    2010-10-01

    ... Appeals Board Review § 498.80 Right to request Departmental Appeals Board review of Administrative Law... 42 Public Health 5 2010-10-01 2010-10-01 false Right to request Departmental Appeals Board review of Administrative Law Judge's decision or dismissal. 498.80 Section 498.80 Public Health CENTERS...

  7. 48 CFR 39.105 - Privacy.

    Science.gov (United States)

    2010-10-01

    ... 48 Federal Acquisition Regulations System 1 2010-10-01 2010-10-01 false Privacy. 39.105 Section 39... CONTRACTING ACQUISITION OF INFORMATION TECHNOLOGY General 39.105 Privacy. Agencies shall ensure that contracts for information technology address protection of privacy in accordance with the Privacy Act (5 U.S.C...

  8. Employee Privacy Rights: A Management Guide.

    Science.gov (United States)

    Shepard, Ira Michael; Olsen, Harry

    Employee privacy rights are considered, along with practical problems and permissible parameters of employer activity. Included is a state-by-state analysis of the status of workplace privacy. Definitions are offered of "invasion of privacy," with attention to four types of privacy invasions: (1) placing someone in a "false light," (2) the public…

  9. Advanced research in data privacy

    CERN Document Server

    Torra, Vicenç

    2015-01-01

    This book provides an overview of the research work on data privacy and privacy enhancing technologies carried by the participants of the ARES project. ARES (Advanced Research in Privacy an Security, CSD2007-00004) has been one of the most important research projects funded by the Spanish Government in the fields of computer security and privacy. It is part of the now extinct CONSOLIDER INGENIO 2010 program, a highly competitive program which aimed to advance knowledge and open new research lines among top Spanish research groups. The project started in 2007 and will finish this 2014. Composed by 6 research groups from 6 different institutions, it has gathered an important number of researchers during its lifetime. Among the work produced by the ARES project, one specific work package has been related to privacy. This books gathers works produced by members of the project related to data privacy and privacy enhancing technologies. The presented works not only summarize important research carried in the proje...

  10. Nursing professional facing patient privacy

    Directory of Open Access Journals (Sweden)

    Fidel López Espuela

    2010-05-01

    Full Text Available Privacy of patients admitted to the hospital is played down in favour of other needs considered more basic by the healthcare system and more related to the disease than to patients themselves. Situations and factors where privacy is damaged are frequent, but it is known that when these are avoided by professionals’ attitude, through strategies and different mechanisms, it becomes one of the most satisfactory elements to patients.Objectives: To identify and analyze situations and factors which affect privacy in hospital environment as well as the adaptation capacity of patients to them.Methodology: Phenomenological, qualitative research. By means of discussion groups with professionals, the following questions where answered: ‘What do professionals understand by privacy? Which situations and factors jeopardize it during the hospital stay? How do they think patients get adapted?Results: The concept of privacy is complex, personal and non-transferable. Situations in which it is jeopardized were divided in 5 main areas. Numerous behaviors regarding adaptation of patients to these were collected.Discussion: Although there is little nursery research referring to privacy and its defense in the professional-patient relationship field, concern about this aspect always shown by nursery staff stands out.As a conclussion, we observe the need to complement this research with the perception patients have about these same questions, establishing the importance they give to privacy.

  11. Meeting the privacy requirements for the development of a multi-centre patient registry in Canada: the Rick Hansen Spinal Cord Injury Registry.

    Science.gov (United States)

    Noonan, Vanessa K; Thorogood, Nancy P; Joshi, Phalgun B; Fehlings, Michael G; Craven, B Catharine; Linassi, Gary; Fourney, Daryl R; Kwon, Brian K; Bailey, Christopher S; Tsai, Eve C; Drew, Brian M; Ahn, Henry; Tsui, Deborah; Dvorak, Marcel F

    2013-05-01

    Privacy legislation addresses concerns regarding the privacy of personal information; however, its interpretation by research ethics boards has resulted in significant challenges to the collection, management, use and disclosure of personal health information for multi-centre research studies. This paper describes the strategy used to develop the national Rick Hansen Spinal Cord Injury Registry (RHSCIR) in accordance with privacy statutes and benchmarked against best practices. An analysis of the regional and national privacy legislation was conducted to determine the requirements for each of the 31 local RHSCIR sites and the national RHSCIR office. A national privacy and security framework was created for RHSCIR that includes a governance structure, standard operating procedures, training processes, physical and technical security and privacy impact assessments. The framework meets a high-water mark in ensuring privacy and security of personal health information nationally and may assist in the development of other national or international research initiatives.

  12. Meeting the Privacy Requirements for the Development of a Multi-Centre Patient Registry in Canada: The Rick Hansen Spinal Cord Injury Registry

    Science.gov (United States)

    Noonan, Vanessa K.; Thorogood, Nancy P.; Joshi, Phalgun B.; Fehlings, Michael G.; Craven, B. Catharine; Linassi, Gary; Fourney, Daryl R.; Kwon, Brian K.; Bailey, Christopher S.; Tsai, Eve C.; Drew, Brian M.; Ahn, Henry; Tsui, Deborah; Dvorak, Marcel F.

    2013-01-01

    Privacy legislation addresses concerns regarding the privacy of personal information; however, its interpretation by research ethics boards has resulted in significant challenges to the collection, management, use and disclosure of personal health information for multi-centre research studies. This paper describes the strategy used to develop the national Rick Hansen Spinal Cord Injury Registry (RHSCIR) in accordance with privacy statutes and benchmarked against best practices. An analysis of the regional and national privacy legislation was conducted to determine the requirements for each of the 31 local RHSCIR sites and the national RHSCIR office. A national privacy and security framework was created for RHSCIR that includes a governance structure, standard operating procedures, training processes, physical and technical security and privacy impact assessments. The framework meets a high-water mark in ensuring privacy and security of personal health information nationally and may assist in the development of other national or international research initiatives. PMID:23968640

  13. Towards Privacy Managment of Information Systems

    OpenAIRE

    Drageide, Vidar

    2009-01-01

    This masters thesis provides insight into the concept of privacy. It argues why privacy is important, and why developers and system owners should keep privacy in mind when developing and maintaining systems containing personal information. Following this, a strategy for evaluating the overall level of privacy in a system is defined. The strategy is then applied to parts of the cellphone system in an attempt to evaluate the privacy of traffic and location data in this system.

  14. A Privacy Manager for Cloud Computing

    Science.gov (United States)

    Pearson, Siani; Shen, Yun; Mowbray, Miranda

    We describe a privacy manager for cloud computing, which reduces the risk to the cloud computing user of their private data being stolen or misused, and also assists the cloud computing provider to conform to privacy law. We describe different possible architectures for privacy management in cloud computing; give an algebraic description of obfuscation, one of the features of the privacy manager; and describe how the privacy manager might be used to protect private metadata of online photos.

  15. Privacy-Preserving Trajectory Collection

    DEFF Research Database (Denmark)

    Gidofalvi, Gyozo; Xuegang, Huang; Pedersen, Torben Bach

    2008-01-01

    In order to provide context--aware Location--Based Services, real location data of mobile users must be collected and analyzed by spatio--temporal data mining methods. However, the data mining methods need precise location data, while the mobile users want to protect their location privacy....... To remedy this situation, this paper first formally defines novel location privacy requirements. Then, it briefly presents a system for privacy--preserving trajectory collection that meets these requirements. The system is composed of an untrusted server and clients communicating in a P2P network. Location...

  16. User Privacy and Empowerment:

    DEFF Research Database (Denmark)

    Dhotre, Prashant Shantaram; Olesen, Henning; Khajuria, Samant

    2017-01-01

    of personal information and its manage-ment. Thus, empowering users and enhancing awareness are essential to compre-hending the value of secrecy. This paper also introduced latest advances in the domain of privacy issues like User Managed Access (UMA) can state suitable requirements for user empowerment...... and will cater to redefine the trustworthy relationship between service providers and users. Subsequently, this paper con-cludes with suggestions for providing empowerment to the user and developing user-centric, transparent business models.......Today, the service providers are capable of assembling a huge measure of user information using Big data techniques. For service providers, user infor-mation has become a vital asset. The present business models are attentive to collect extensive users’ information to extract useful knowledge...

  17. 28 CFR 0.29e - Relationship to other departmental units.

    Science.gov (United States)

    2010-07-01

    ... the ethics, competence, or integrity of a Department attorney for appropriate action by DOJ-OPR. (d... 28 Judicial Administration 1 2010-07-01 2010-07-01 false Relationship to other departmental units. 0.29e Section 0.29e Judicial Administration DEPARTMENT OF JUSTICE ORGANIZATION OF THE DEPARTMENT...

  18. "Departmental Climate and Student Experiences in Geography Graduate Programs": Research for Enhancing Departments and Graduate Education

    Science.gov (United States)

    Solem, Michael N.; Lee, Jenny; Schlemper, M. Beth

    2011-01-01

    This article reports the authors' research which combined quantitative and qualitative methods to analyze a rather intangible phenomenon of interest to higher education researchers and administrators, that being "departmental climate" (often referred to as "academic climate"). This investigation required the authors to develop a method by which…

  19. Telling Our Story: A Case Study of a Collaborative Departmental Blog at Syracuse University Libraries

    Science.gov (United States)

    Rauh, Anne E.; McReynolds, Stephanie J. H.

    2016-01-01

    This case study will take readers through the planning and publication process of a collaborative departmental library blog at Syracuse University, which is a large private, non-profit research intensive university located in central New York State. It will provide an overview of the history of the project and the mission of the blog. It will…

  20. The Departmental Script as an Ongoing Conversation into the Phronesis of Teaching Science as Inquiry

    Science.gov (United States)

    Melville, Wayne; Campbell, Todd; Fazio, Xavier; Bartley, Anthony

    2012-01-01

    This article investigates the extent to which a science department script supports the teaching and learning of science as inquiry and how this script is translated into individual teachers' classrooms. This study was completed at one school in Canada which, since 2000, has developed a departmental script supportive of teaching and learning of…

  1. Privacy Preserving Distributed Data Mining

    Data.gov (United States)

    National Aeronautics and Space Administration — Distributed data mining from privacy-sensitive multi-party data is likely to play an important role in the next generation of integrated vehicle health monitoring...

  2. Privacy Impact Assessment (PIA) Repository

    Data.gov (United States)

    Department of Veterans Affairs — This repository contains Privacy Impact Assessments (PIA) that have been vetted/approved. Section 208 of the Electronic Government Act of 2002 (E-Gov Act) requires...

  3. Preserving Privacy in Transparency Logging

    OpenAIRE

    Pulls, Tobias

    2015-01-01

    The subject of this dissertation is the construction of privacy-enhancing technologies (PETs) for transparency logging, a technology at the intersection of privacy, transparency, and accountability. Transparency logging facilitates the transportation of data from service providers to users of services and is therefore a key enabler for ex-post transparency-enhancing tools (TETs). Ex-post transparency provides information to users about how their personal data have been processed by service pr...

  4. Security and privacy in biometrics

    CERN Document Server

    Campisi, Patrizio

    2013-01-01

    This important text/reference presents the latest secure and privacy-compliant techniques in automatic human recognition. Featuring viewpoints from an international selection of experts in the field, the comprehensive coverage spans both theory and practical implementations, taking into consideration all ethical and legal issues. Topics and features: presents a unique focus on novel approaches and new architectures for unimodal and multimodal template protection; examines signal processing techniques in the encrypted domain, security and privacy leakage assessment, and aspects of standardizati

  5. The benefits, risks and costs of privacy: patient preferences and willingness to pay.

    Science.gov (United States)

    Trachtenbarg, David E; Asche, Carl; Ramsahai, Shweta; Duling, Joy; Ren, Jinma

    2017-05-01

    Multiple surveys show that patients want medical privacy; however, there are costs to maintaining privacy. There are also risks if information is not shared. A review of previous surveys found that most surveys asked questions about patient's privacy concerns and willingness to share their medical information. We found only one study that asked about sharing medical information for better care and no survey that asked patients about the risk, cost or comparison between medical privacy and privacy in other areas. To fill this gap, we designed a survey to: (1) compare medical privacy preferences to privacy preferences in other areas; (2) measure willingness to pay the cost of additional privacy measures; and (3) measure willingness to accept the risks of not sharing information. A total of 834 patients attending physician offices at 14 sites completed all or part of an anonymous questionnaire. Over 95% of patients were willing to share all their medical information with their treating physicians. There was no difference in willingness to share between primary care and specialty sites including psychiatry and an HIV clinic. In our survey, there was no difference in sharing preference between standard medical information and information with additional legal protections including genetic testing, drug/alcohol treatment and HIV results. Medical privacy was ranked lower than sharing social security and credit card numbers, but was deemed more private than other information including tax returns and handgun purchases. There was no statistical difference for any questions by site except for HIV/AIDS clinic patients ranking privacy of the medical record more important than reducing high medical costs and risk of medical errors (p privacy, but few were willing to pay more for additional medical privacy. Most patients were unwilling to take on additional risks to keep medical information hidden. Patients were very willing to share medical information with their providers

  6. Police officer perceptions of the impact of Crisis Intervention Team (CIT) programs.

    Science.gov (United States)

    Bonfine, Natalie; Ritter, Christian; Munetz, Mark R

    2014-01-01

    The Crisis Intervention Team (CIT) program is an approach for law enforcement officers to safely response to individuals who are experiencing a mental health crisis. Research must identify the components of CIT that are instrumental to the overall effectiveness of the program. For instance, recent studies report that CIT may have a transformative effect on officers' attitudes by increasing exposure to and familiarity with mental illness. This study explores this possibility further by examining 57 CIT officers' experiences with mental illness and attitudes about CIT. Specifically, we assessed how personal and professional exposure to mental illness associates with officers' perceptions about CIT generally, as well as with opinions about the officers' confidence in their abilities and the perceived effectiveness of the police department in responding to individuals in mental health crisis. Our findings indicate that CIT is rated very positively by officers. We found that officers' attitudes about the impact of CIT on improving overall safety, accessibility of services, officer skills and techniques, and the preparedness of officers to handle calls involving persons with mental illness are positively associated with officers' confidence in their abilities or with officers' perceptions of overall departmental effectiveness. There is further evidence that personal contact with individuals with mental illness affects the relationship between attitudes that CIT impacts overall safety and perceived departmental effectiveness. The results of this exploratory study underscore the importance of CIT officers' perceptions of key elements of CIT and the role of exposure to mental illness in examining program effectiveness.

  7. 76 FR 67755 - Privacy Act of 1974; Department of Homeland Security U.S. Customs and Border Protection DHS/CBP...

    Science.gov (United States)

    2011-11-02

    ... Border Protection DHS/CBP-003 Credit/Debit Card Data System of Records AGENCY: Privacy Office, DHS... Data System of Records.'' This system allows U.S. Customs and Border Protection to collect, use, and... Privacy Act protections to all individuals where systems of records maintain information on U.S. citizens...

  8. Privacy and the Right to Information Act, 2005

    Science.gov (United States)

    MISHRA, N N; PARKER, LISA S; NIMGAONKAR, V L; DESHPANDE, S N

    2017-01-01

    Privacy is a key component of individual autonomy, and a voluminous literature has established both its practical value in healthcare contexts and its status as a fundamental, but not absolute ethical right. Because the Right to Information Act (2005) permits citizens to gain information under government control, it might be thought to threaten the privacy of patients and research subjects, especially those in government institutions. It is important for clinicians, administrators, information officers, patients, and research subjects to understand that the RTI Act generally does not require or permit disclosure of personal health information to third parties. Only under unusual circumstances when the larger public interest is properly certified to warrant it, would information shared or created within the fiduciary relationships of clinical care or research be required to be disclosed. Against this background concerning the right to privacy and the RTI Act, we consider a 2007 legal case that used the RTI Act to expose patient information of a public official and argue that the “public interest” claimed in this case did not justify disclosure of the official’s private health information. We conclude that the provisions of the RTI Act, when properly interpreted, are compatible with the important value of safeguarding patient privacy. PMID:18988373

  9. 75 FR 33811 - Office of the National Coordinator for Health Information Technology; HIT Policy Committee's...

    Science.gov (United States)

    2010-06-15

    ... Committee's Privacy & Security Tiger Team Meeting; Notice of Meeting AGENCY: Office of the National... Policy Committee's Privacy & Security Tiger Team. General Function of the Committee: To provide....blsmeetings.net/consumerchoicetechnologyhearing . Seating is limited at the location, and ONC will make every...

  10. Privacy in the Genomic Era

    Science.gov (United States)

    NAVEED, MUHAMMAD; AYDAY, ERMAN; CLAYTON, ELLEN W.; FELLAY, JACQUES; GUNTER, CARL A.; HUBAUX, JEAN-PIERRE; MALIN, BRADLEY A.; WANG, XIAOFENG

    2015-01-01

    Genome sequencing technology has advanced at a rapid pace and it is now possible to generate highly-detailed genotypes inexpensively. The collection and analysis of such data has the potential to support various applications, including personalized medical services. While the benefits of the genomics revolution are trumpeted by the biomedical community, the increased availability of such data has major implications for personal privacy; notably because the genome has certain essential features, which include (but are not limited to) (i) an association with traits and certain diseases, (ii) identification capability (e.g., forensics), and (iii) revelation of family relationships. Moreover, direct-to-consumer DNA testing increases the likelihood that genome data will be made available in less regulated environments, such as the Internet and for-profit companies. The problem of genome data privacy thus resides at the crossroads of computer science, medicine, and public policy. While the computer scientists have addressed data privacy for various data types, there has been less attention dedicated to genomic data. Thus, the goal of this paper is to provide a systematization of knowledge for the computer science community. In doing so, we address some of the (sometimes erroneous) beliefs of this field and we report on a survey we conducted about genome data privacy with biomedical specialists. Then, after characterizing the genome privacy problem, we review the state-of-the-art regarding privacy attacks on genomic data and strategies for mitigating such attacks, as well as contextualizing these attacks from the perspective of medicine and public policy. This paper concludes with an enumeration of the challenges for genome data privacy and presents a framework to systematize the analysis of threats and the design of countermeasures as the field moves forward. PMID:26640318

  11. Officer Training

    Data.gov (United States)

    Allegheny County / City of Pittsburgh / Western PA Regional Data Center — This dataset shows the time spent by currently active Pittsburgh Police Officers in professional development training. Officers who are no longer employed in the...

  12. The Effect of Agile Workspace and Remote Working on Experiences of Privacy, Crowding and Satisfaction

    Directory of Open Access Journals (Sweden)

    Trevor Keeling

    2015-08-01

    Full Text Available Occupant density is an important and basic metric of space use efficiency. It affects user experience of privacy, crowding and satisfaction. The effect of agile working has been two fold. Firstly, offices have an increasing range of workspace settings such as break out space, collaborative space and contemplative space in contrast to the traditional workspace settings of assigned desks and formal meeting rooms. Secondly, office workers have become increasingly mobile as they are able to work from a greater variety of locations both in and out of their main place of work. This study asks whether workers who occupy agile workspaces and those with greater mobility experience privacy differently from workers with more conventional offices and work patterns. The experience of privacy can be considered in terms of retreat from people, control of information flow and control of interactions. Our results show that agile workspaces improve the ability to control information compared with open plan offices. It was also found that highly mobile workers are more sensitive to the negative effects of interacting with people. From this a taxonomy of offices is defined in terms of the features that contribute to the experience of privacy.

  13. Effects of acoustic environment on work in private office rooms and open-plan offices - longitudinal study during relocation.

    Science.gov (United States)

    Kaarlela-Tuomaala, A; Helenius, R; Keskinen, E; Hongisto, V

    2009-11-01

    The aim was to determine how the perceived work environment, especially acoustic environment, and its effects differed in private office rooms and in open-plan offices. The subjects consisted of 31 workers who moved from private office rooms to open-plan offices and who answered the questionnaire before and after the relocation. Private office rooms were occupied only by one person while open-plan offices were occupied by more than 20 persons. Room acoustical descriptors showed a significant reduction in speech privacy after relocation. The noise level averaged over the whole work day did not change but the variability of noise level reduced significantly. Negative effects of acoustic environment increased significantly, including increased distraction, reduced privacy, increased concentration difficulties and increased use of coping strategies. Self-rated loss of work performance because of noise doubled. Cognitively demanding work and phone conversations were most distracted by noise. The benefits that are often associated with open-plan offices did not appear: cooperation became less pleasant and direct and information flow did not change. Nowadays, most office workers, independent of job type, are located in open-plan offices without the individual needs of privacy, concentration and interaction being analysed. This intervention study consisted of professional workers. Their work tasks mainly required individual efforts, and interaction between other workers was not of primary concern, although necessary. The results suggest that the open-plan office is not recommended for professional workers. Similar intervention studies should also be made for other job types.

  14. 76 FR 67763 - Privacy Act of 1974; Privacy Act System of Records

    Science.gov (United States)

    2011-11-02

    ... SPACE ADMINISTRATION Privacy Act of 1974; Privacy Act System of Records AGENCY: National Aeronautics and Space Administration (NASA). ACTION: Notice of proposed revisions to an existing Privacy Act system of records. SUMMARY: Pursuant to the provisions of the Privacy Act of 1974 (5 U.S.C. 552a), the National...

  15. The privacy coach: Supporting customer privacy in the internet of things

    NARCIS (Netherlands)

    Broenink, E.G.; Hoepman, J.H.; Hof, C. van 't; Kranenburg, R. van; Smits, D.; Wisman, T.

    2010-01-01

    The Privacy Coach is an application running on a mobile phone that supports customers in making privacy decisions when confronted with RFID tags. The approach we take to increase customer privacy is a radical departure from the mainstream research efforts that focus on implementing privacy enhancing

  16. 78 FR 77719 - Privacy Act of 1974; Privacy Act System of Records

    Science.gov (United States)

    2013-12-24

    ... SPACE ADMINISTRATION Privacy Act of 1974; Privacy Act System of Records AGENCY: National Aeronautics and Space Administration (NASA). ACTION: Notice of Privacy Act system of records. SUMMARY: Pursuant to the provisions of the Privacy Act of 1974 (5 U.S.C. 552a), the National Aeronautics and Space Administration is...

  17. 76 FR 64115 - Privacy Act of 1974; Privacy Act System of Records

    Science.gov (United States)

    2011-10-17

    ... SPACE ADMINISTRATION Privacy Act of 1974; Privacy Act System of Records AGENCY: National Aeronautics and Space Administration (NASA). ACTION: Notice of the retirement of one Privacy Act system of records notice. SUMMARY: In accordance with the Privacy Act of 1974, NASA is giving notice that it proposes to...

  18. 76 FR 64114 - Privacy Act of 1974; Privacy Act System of Records

    Science.gov (United States)

    2011-10-17

    ... SPACE ADMINISTRATION Privacy Act of 1974; Privacy Act System of Records AGENCY: National Aeronautics and Space Administration (NASA). ACTION: Notice of proposed revisions to an existing Privacy Act system of records. SUMMARY: Pursuant to the provisions of the Privacy Act of 1974 (5 U.S.C. 552a), the National...

  19. 76 FR 64112 - Privacy Act of 1974; Privacy Act System of Records Appendices

    Science.gov (United States)

    2011-10-17

    ... SPACE ADMINISTRATION Privacy Act of 1974; Privacy Act System of Records Appendices AGENCY: National Aeronautics and Space Administration (NASA). ACTION: Revisions of NASA Appendices to Privacy Act System of... publishes with the Agency's systems of records under the Privacy Act of 1974. This notice publishes those...

  20. The privacy coach: Supporting customer privacy in the internet of things

    NARCIS (Netherlands)

    Broenink, E.G.; Hoepman, J.H.; Hof, C. van 't; Kranenburg, R. van; Smits, D.; Wisman, T.

    2010-01-01

    The Privacy Coach is an application running on a mobile phone that supports customers in making privacy decisions when confronted with RFID tags. The approach we take to increase customer privacy is a radical departure from the mainstream research efforts that focus on implementing privacy enhancing

  1. Internet privacy options for adequate realisation

    CERN Document Server

    2013-01-01

    A thorough multidisciplinary analysis of various perspectives on internet privacy was published as the first volume of a study, revealing the results of the achatech project "Internet Privacy - A Culture of Privacy and Trust on the Internet." The second publication from this project presents integrated, interdisciplinary options for improving privacy on the Internet utilising a normative, value-oriented approach. The ways in which privacy promotes and preconditions fundamental societal values and how privacy violations endanger the flourishing of said values are exemplified. The conditions which must be fulfilled in order to achieve a culture of privacy and trust on the internet are illuminated. This volume presents options for policy-makers, educators, businesses and technology experts how to facilitate solutions for more privacy on the Internet and identifies further research requirements in this area.

  2. 78 FR 16859 - Office of the Director, National Institutes of Health; Notice of Closed Meeting

    Science.gov (United States)

    2013-03-19

    ... personal privacy. Name of Committee: Office of Research Infrastructure Programs Special Emphasis Panel... review and evaluate grant applications. Place: National Ctr. for Translational Sciences, Democracy 1, 6701 Democracy Blvd., Bethesda, MD 20892 (Virtual Meeting). Contact Person: Carol Lambert,...

  3. 78 FR 27409 - Office of the Director, National Institutes of Health; Notice of Closed Meetings

    Science.gov (United States)

    2013-05-10

    ... personal privacy. Name of Committee: Office of Research Infrastructure Programs Special Emphasis Panel... evaluate grant applications. Place: National Institutes of Health, Room 1082, 6701 Democracy Blvd... (NCATS), National Institutes of Health, 6701 Democracy Blvd., Democracy 1, Room 1082, Bethesda, MD...

  4. 39 CFR 262.5 - Systems (Privacy).

    Science.gov (United States)

    2010-07-01

    ... 39 Postal Service 1 2010-07-01 2010-07-01 false Systems (Privacy). 262.5 Section 262.5 Postal... DEFINITIONS § 262.5 Systems (Privacy). (a) Privacy Act system of records. A Postal Service system containing... individual. (c) Computer matching program. A “matching program,” as defined in the Privacy Act, 5 U.S.C. 552a...

  5. TRACKING AND MONITORING OF TAGGED OBJECTS EMPLOYING PARTICLE SWARM OPTIMIZATION ALGORITHM IN A DEPARTMENTAL STORE

    Directory of Open Access Journals (Sweden)

    Indrajit Bhattacharya

    2011-05-01

    Full Text Available The present paper proposes a departmental store automation system based on Radio Frequency Identification (RFID technology and Particle Swarm Optimization (PSO algorithm. The items in the departmental store spanned over different sections and in multiple floors, are tagged with passive RFID tags. The floor is divided into number of zones depending on different types of items that are placed in their respective racks. Each of the zones is placed with one RFID reader, which constantly monitors the items in their zone and periodically sends that information to the application. The problem of systematic periodic monitoring of the store is addressed in this application so that the locations, distributions and demands of every item in the store can be invigilated with intelligence. The proposed application is successfully demonstrated on a simulated case study.

  6. Sustainable Change: A Model for Transforming Departmental Culture to Support STEM Education Innovation

    CERN Document Server

    Corbo, Joel C; Dancy, Melissa H; Deetz, Stanley; Finkelstein, Noah

    2014-01-01

    This paper describes a strategic effort to improve teaching and learning in STEM departments at the University of Colorado Boulder. In contrast to many other higher education STEM change efforts that focus primarily on disseminating practices, our two synergistic change strategies focus on explicit cultural change that integrates interventions across the entire university system, impacting faculty members, administrators, and, most importantly, whole departments. Our outside-in strategy works with both faculty and administrators to create changes that will combine to influence departmental culture, and our middle-out strategy works directly with departments to enact a large-scale cultural change process. Both of these strategies aim to align departmental cultures with six core cultural commitments that are emblematic of highly productive departments. We argue that this holistic approach to shifting culture is required to foster and sustain meaningful change. Additionally, our strategies are grounded in change...

  7. Fetal privacy and confidentiality.

    Science.gov (United States)

    Botkin, J R

    1995-01-01

    With the advent of new and better contraceptive methods and the ability to facilitate and manipulate fertilization and gestation, couples will gain greater control over their fertility. Once a pregnancy has been established or an in vitro embryo created, the ability to evaluate the embryo and fetus will increase dramatically with progress in human genetic research. Preconception and preimplantation genetic testing and screening are now possible, and the technology to perform prenatal screening early in gestation is advancing rapidly. Nonsurgical methods facilitate induced abortion with a relatively lower degree of trauma upon the woman undergoing the procedure. These capabilities may all be used to enable and even encourage the genetic selection of future children. Despite the ethical concerns associated with prenatal testing and abortion, these services will continue to be an integral aspect of reproductive medicine. As technology advances, however, it will be possible to test and screen for conditions which do not produce serious defects. Genetic conditions which produce relatively mild impacts upon health will be identifiable in the embryo or fetus, while late-onset conditions and genetic factors which have only a probability of affecting health will also be located in the fetal genome. Prospective parents may therefore soon have the capability of selecting their most desirable embryo in vitro, or terminating all undesirable fetuses in vivo until the preferred child is delivered. The medical profession must take some responsibility for establishing guidelines on the use of reproductive technology. The standards of practice for the medical profession must reflect the results of a broad social debate over competing moral values. The author develops an argument for legal and ethical limitations on the application of prenatal testing and screening technology, suggesting that for some medical conditions, respect for the privacy and confidentiality of the fetus

  8. Back office to box office

    DEFF Research Database (Denmark)

    Haigh, Matthew

    sees a mounting unsecured debt where its members see practical value. Between the two, a steward who may not profit from its office delegates it to back-office agents whose fiduciary management is engendered by box office-sized bonuses. Standard theorisation has foundered. The architecture...

  9. On genomics, kin, and privacy.

    Science.gov (United States)

    Telenti, Amalio; Ayday, Erman; Hubaux, Jean Pierre

    2014-01-01

    The storage of greater numbers of exomes or genomes raises the question of loss of privacy for the individual and for families if genomic data are not properly protected. Access to genome data may result from a personal decision to disclose, or from gaps in protection. In either case, revealing genome data has consequences beyond the individual, as it compromises the privacy of family members. Increasing availability of genome data linked or linkable to metadata through online social networks and services adds one additional layer of complexity to the protection of genome privacy.  The field of computer science and information technology offers solutions to secure genomic data so that individuals, medical personnel or researchers can access only the subset of genomic information required for healthcare or dedicated studies.

  10. Departmentalization and Organizational Context: The Experience of the University of Guadalajara

    OpenAIRE

    Adrián Acosta Silva

    2005-01-01

    This work consists of an evaluation of the experience of organizational reform and academic departmentalization at a Mexican public university, the University of Guadalajara (U. of G.), occurred in the period of 1994-2005. It is a research carried out from the perspective of the institutional change analysis, which obeys the interest of carrying out a rigorous evaluation of the process, after 11 years of its institutional operation. From a reconstruction of the context that gave origin and se...

  11. 24 CFR 3280.107 - Interior privacy.

    Science.gov (United States)

    2010-04-01

    ... 24 Housing and Urban Development 5 2010-04-01 2010-04-01 false Interior privacy. 3280.107 Section 3280.107 Housing and Urban Development Regulations Relating to Housing and Urban Development (Continued... privacy. Bathroom and toilet compartment doors shall be equipped with a privacy lock. ...

  12. 31 CFR 0.216 - Privacy Act.

    Science.gov (United States)

    2010-07-01

    ... 31 Money and Finance: Treasury 1 2010-07-01 2010-07-01 false Privacy Act. 0.216 Section 0.216... RULES OF CONDUCT Rules of Conduct § 0.216 Privacy Act. Employees involved in the design, development, operation, or maintenance of any system of records or in maintaining records subject to the Privacy Act of...

  13. Sexiled: Privacy Acquisition Strategies of College Roommates

    Science.gov (United States)

    Erlandson, Karen

    2014-01-01

    This study sought to understand how roommates make privacy bids in college residence halls. The results indicate that privacy for sexual activity is a problem for students living in college residence halls, as almost all participants (82%) reported having dealt with this issue. Two sets of responses were collected and analyzed: privacy acquisition…

  14. Video Surveillance: Privacy Issues and Legal Compliance

    DEFF Research Database (Denmark)

    Mahmood Rajpoot, Qasim; Jensen, Christian D.

    2015-01-01

    . There is a need to balance the usage of video surveillance against its negative impact on privacy. This chapter aims to highlight the privacy issues in video surveillance and provides a model to help identify the privacy requirements in a video surveillance system. The authors make a step in the direction...

  15. Sexiled: Privacy Acquisition Strategies of College Roommates

    Science.gov (United States)

    Erlandson, Karen

    2014-01-01

    This study sought to understand how roommates make privacy bids in college residence halls. The results indicate that privacy for sexual activity is a problem for students living in college residence halls, as almost all participants (82%) reported having dealt with this issue. Two sets of responses were collected and analyzed: privacy acquisition…

  16. Enhancing Privacy for Digital Rights Management

    NARCIS (Netherlands)

    Petkovic, M.; Conrado, C.; Schrijen, G.J.; Jonker, W.

    2007-01-01

    This chapter addresses privacy issues in DRM systems. These systems provide a means of protecting digital content, but may violate the privacy of users in that the content they purchase and their actions in the system can be linked to specific users. The chapter proposes a privacy-preserving DRM sys

  17. A Model for the Departmental Quality Management Infrastructure Within an Academic Health System.

    Science.gov (United States)

    Mathews, Simon C; Demski, Renee; Hooper, Jody E; Biddison, Lee Daugherty; Berry, Stephen A; Petty, Brent G; Chen, Allen R; Hill, Peter M; Miller, Marlene R; Witter, Frank R; Allen, Lisa; Wick, Elizabeth C; Stierer, Tracey S; Paine, Lori; Puttgen, Hans A; Tamargo, Rafael J; Pronovost, Peter J

    2016-09-06

    As quality improvement and patient safety come to play a larger role in health care, academic medical centers and health systems are poised to take a leadership role in addressing these issues. Academic medical centers can leverage their large integrated footprint and have the ability to innovate in this field. However, a robust quality management infrastructure is needed to support these efforts. In this context, quality and safety are often described at the executive level and at the unit level. Yet, the role of individual departments, which are often the dominant functional unit within a hospital, in realizing health system quality and safety goals has not been addressed. Developing a departmental quality management infrastructure is challenging because departments are diverse in composition, size, resources, and needs.In this article, the authors describe the model of departmental quality management infrastructure that has been implemented at the Johns Hopkins Hospital. This model leverages the fractal approach, linking departments horizontally to support peer and organizational learning and connecting departments vertically to support accountability to the hospital, health system, and board of trustees. This model also provides both structure and flexibility to meet individual departmental needs, recognizing that independence and interdependence are needed for large academic medical centers. The authors describe the structure, function, and support system for this model as well as the practical and essential steps for its implementation. They also provide examples of its early success.

  18. 77 FR 38218 - Office of Privacy, Records, and Disclosure; Privacy Act of 1974; Proposed Implementation

    Science.gov (United States)

    2012-06-27

    ... of this kind to individuals who are the subjects of protective interest may well lead to violence... information-gathering and analysis systems and permit violators to take steps to avoid detection or... jurisdiction of SIGAR when that information comes to SIGAR's attention during the collation and analysis of...

  19. 77 FR 38363 - Office of Privacy, Records, and Disclosure; Privacy Act of 1974, as Amended

    Science.gov (United States)

    2012-06-27

    ... entities suspected of having committed illegal or unethical acts. The records are also used in any... suspected of having committed illegal or unethical acts. The records are also used in any resulting...

  20. 77 FR 46551 - Office of Privacy, Records, and Disclosure; Privacy Act of 1974, as Amended

    Science.gov (United States)

    2012-08-03

    ... SIGAR system of records titled, SIGAR-11: Social Media Records, and SIGAR-12: Internal Electronic Collaboration Tools. The Social Media system will assist SIGAR by providing new ways to connect and share... social media tools within the Internet. DATES: Comments must be received no later than September 4,...

  1. Smartdata privacy meets evolutionary robotics

    CERN Document Server

    Harvey, Inman; Tomko, George

    2013-01-01

    Privacy by Design and the Promise of SmartData.- SmartData: the Need, the Goal and the Challenge.- Perspectives on Artificial Intelligence.- Context dependent information processing entails scale-free dynamics.- Philosophy and SmartData.- Relevance Realization and the Neurodynamics and Neural Connectivity of General Intelligence.- What Matters: Real Bodies and Virtual Worlds.- The development of autonomous virtual agents.- Patterns of Attractors in the "Brain"".- A Privacy-Enabled Mobile Computing Model Using Intelligent Cloud-Based Services.- Unconstraint the Population: the Benefits of Horiz

  2. 78 FR 60245 - Privacy Act Systems of Records; LabWare Laboratory Information Management System

    Science.gov (United States)

    2013-10-01

    ... Office of the Secretary Privacy Act Systems of Records; LabWare Laboratory Information Management System... Regulatory Affairs, OMB. Thomas J. Vilsack, Secretary. SYSTEM NAME: LabWare Laboratory Information Management... employee's supervisor must identify what functional roles an employee needs in the LabWare LIMS. Once the...

  3. 77 FR 43639 - Privacy Act of 1974, as Amended; Computer Matching Program (Social Security Administration (SSA...

    Science.gov (United States)

    2012-07-25

    ... From the Federal Register Online via the Government Publishing Office SOCIAL SECURITY ADMINISTRATION Privacy Act of 1974, as Amended; Computer Matching Program (Social Security Administration (SSA.... ACTION: Notice of a renewal of an existing computer matching program that expired on May 10,...

  4. 77 FR 54943 - Privacy Act of 1974, as Amended; Computer Matching Program (Social Security Administration (SSA...

    Science.gov (United States)

    2012-09-06

    ... From the Federal Register Online via the Government Publishing Office SOCIAL SECURITY ADMINISTRATION Privacy Act of 1974, as Amended; Computer Matching Program (Social Security Administration (SSA.... ACTION: Notice of a renewal of an existing computer matching program that will expire on October 1,...

  5. 75 FR 11191 - Privacy Act of 1974; Retirement of Department of Homeland Security Federal Emergency Management...

    Science.gov (United States)

    2010-03-10

    ... Stamp Act of 2001 System of Records (70 FR 43218, July 26, 2005). ] This system was originally... File System, records are transferred to NARA one year and six months after the closure of the file. All... Emergency Management Agency System of Records AGENCY: Privacy Office, DHS. ACTION: Notice of retirement of...

  6. 77 FR 25152 - Privacy Act of 1974; System of Records-National Longitudinal Transitions Study-2012

    Science.gov (United States)

    2012-04-27

    ..., Office of Management and Budget (OMB) on April 24, 2012. This system of records will become effective at... of the probable effect of the proposal on the privacy rights of individuals. Electronic Access to... information on the students' employment and earnings can be obtained, the students' SSNs are needed...

  7. 75 FR 409 - Privacy Act of 1974; United States Citizenship and Immigration Services-010 Asylum Information...

    Science.gov (United States)

    2010-01-05

    ...--010 Asylum Information and Pre-Screening System of Records AGENCY: Privacy Office; DHS. ACTION: Notice... Security's inventory, entitled Unites States Citizenship and Immigration Services-010 Asylum Information... systems: The Refugees, Asylum, and Parole System and the Asylum Pre-Screening System. Refugees,...

  8. 78 FR 40542 - Privacy Act of 1974, As Amended: Proposed New Routine Use

    Science.gov (United States)

    2013-07-05

    ... eligibility, benefit amounts, or other matters of benefit status in a Social Security program to DHHS/CMS for... From the Federal Register Online via the Government Publishing Office SOCIAL SECURITY ADMINISTRATION Privacy Act of 1974, As Amended: Proposed New Routine Use AGENCY: Social Security...

  9. 78 FR 43890 - Privacy Act of 1974; Department of Homeland Security, Federal Emergency Management Agency-006...

    Science.gov (United States)

    2013-07-22

    ... Management Agency--006 Citizen Corps Database'' and retitle it ``Department of Homeland Security/ Federal... System name: DHS/FEMA--006 Citizen Corps Program Security classification: Unclassified. System location... SECURITY Office of the Secretary Privacy Act of 1974; Department of Homeland Security, Federal...

  10. 76 FR 52341 - Privacy Act of 1974, as amended; Notice of a New System of Records

    Science.gov (United States)

    2011-08-22

    ...Pursuant to the provisions of the Privacy Act of 1974, as amended, the Department of the Interior is issuing a public notice of its intent to create the Office of the Secretary ``Debarment and Suspension Program'' system of records. The system contains information including, but not limited to, names and addresses of business entities, organizations and individuals covered by the system of......

  11. 24 CFR 5.212 - Compliance with the Privacy Act and other requirements.

    Science.gov (United States)

    2010-04-01

    ... 24 Housing and Urban Development 1 2010-04-01 2010-04-01 false Compliance with the Privacy Act and other requirements. 5.212 Section 5.212 Housing and Urban Development Office of the Secretary, Department of Housing and Urban Development GENERAL HUD PROGRAM REQUIREMENTS; WAIVERS Disclosure...

  12. 77 FR 15555 - Freedom of Information Act and Privacy Act Procedures

    Science.gov (United States)

    2012-03-16

    ... individual declared to be incompetent due to physical or mental incapacity or age by a court of competent... preparation of a request to amend a record should contact the Privacy Officer at the address cited above. (iii... necessary, and upon request of, the individual making the request in the preparation of the appeal. (v)...

  13. 77 FR 70796 - Privacy Act of 1974; Retirement of Department of Homeland Security Transportation Security...

    Science.gov (United States)

    2012-11-27

    ... Administration-015 Registered Traveler Operations Files (November 8, 2005, 69 FR 67735), which was written to...)-015 Registered Traveler (RT) Operations File Files (November 8, 2005, 69 FR 67735), which was written... Transportation Security Administration System of Records AGENCY: Privacy Office, Department of Homeland...

  14. 78 FR 25254 - Announcing an Open Meeting of the Information Security and Privacy Advisory Board

    Science.gov (United States)

    2013-04-30

    ... National Institute of Standards and Technology Announcing an Open Meeting of the Information Security and.... SUMMARY: The Information Security and Privacy Advisory Board (ISPAB) will meet Wednesday, June 12, 2013... Director of the Office of Management and Budget, and the Director of NIST on information security...

  15. 76 FR 39466 - Privacy Act; System of Records Notice: State-26, Passport Records

    Science.gov (United States)

    2011-07-06

    ... From the Federal Register Online via the Government Publishing Office DEPARTMENT OF STATE Privacy.... Department of State; (k) Public and private employers seeking to confirm the authenticity of the U.S... security requirements, including the rules of behavior for handling PII and the potential consequences...

  16. Privacy Preserving Linear Regression on Distributed Databases

    Directory of Open Access Journals (Sweden)

    Fida K. Dankar

    2015-04-01

    Full Text Available Studies that combine data from multiple sources can tremendously improve the outcome of the statistical analysis. However, combining data from these various sources for analysis poses privacy risks. A number of protocols have been proposed in the literature to address the privacy concerns; however they do not fully deliver on either privacy or complexity. In this paper, we present a (theoretical privacy preserving linear regression model for the analysis of data owned by several sources. The protocol uses a semi-trusted third party and delivers on privacy and complexity.

  17. Adding Query Privacy to Robust DHTs

    DEFF Research Database (Denmark)

    Backes, Michael; Goldberg, Ian; Kate, Aniket

    2011-01-01

    of obtaining query privacy over robust DHTs. Finally, we compare the performance of our privacy-preserving protocols with their more privacy-invasive counterparts. We observe that there is no increase in the message complexity and only a small overhead in the computational complexity....... intermediate peers that (help to) route the queries towards their destinations. In this paper, we satisfy this requirement by presenting an approach for providing privacy for the keys in DHT queries. We use the concept of oblivious transfer (OT) in communication over DHTs to preserve query privacy without...

  18. The European Approach to Privacy

    NARCIS (Netherlands)

    van Hoboken, J.

    2014-01-01

    This paper critically assesses the character of European (Union’s) privacy law and policy in the field of online media and electronic communications. Contrary to current understanding, this field of law is more fragmented and ill-developed than is often assumed, in particular by those discussing pri

  19. Panel: RFID Security and Privacy

    Science.gov (United States)

    Fu, Kevin

    The panel on RFID security and privacy included Ross Anderson, Jon Callas, Yvo Desmedt, and Kevin Fu. Topics for discussion included the "chip and PIN" EMV payment systems, e-Passports, "mafia" attacks, and RFID-enabled credit cards. Position papers by the panelists appear in the following pages, and the RFID-enabled credit card work appears separately in these proceedings.

  20. Patient privacy and social media.

    Science.gov (United States)

    Hader, Amy L; Brown, Evan D

    2010-08-01

    Healthcare providers using social media must remain mindful of professional boundaries and patients' privacy rights. Facebook and other online postings must comply with the Health Insurance Portability and Accountability Act of 1996 (HIPAA), applicable facility policy, state law, and AANA's Code of Ethics.

  1. Privacy is an essentially contested concept: a multi-dimensional analytic for mapping privacy.

    Science.gov (United States)

    Mulligan, Deirdre K; Koopman, Colin; Doty, Nick

    2016-12-28

    The meaning of privacy has been much disputed throughout its history in response to wave after wave of new technological capabilities and social configurations. The current round of disputes over privacy fuelled by data science has been a cause of despair for many commentators and a death knell for privacy itself for others. We argue that privacy's disputes are neither an accidental feature of the concept nor a lamentable condition of its applicability. Privacy is essentially contested. Because it is, privacy is transformable according to changing technological and social conditions. To make productive use of privacy's essential contestability, we argue for a new approach to privacy research and practical design, focused on the development of conceptual analytics that facilitate dissecting privacy's multiple uses across multiple contexts.This article is part of the themed issue 'The ethical impact of data science'. © 2016 The Author(s).

  2. Determining the privacy policy deficiencies of health ICT applications through semi-formal modelling.

    Science.gov (United States)

    Croll, Peter R

    2011-02-01

    To ensure that patient confidentiality is securely maintained, health ICT applications that contain sensitive personal information demand comprehensive privacy policies. Determining the adequacy of these policies to meet legal conformity together with clinical users and patient expectation is demanding in practice. Organisations and agencies looking to analyse their Privacy and Security policies can benefit from guidance provided by outside entities such as the Privacy Office of their State or Government together with law firms and ICT specialists. The advice given is not uniform and often open to different interpretations. Of greater concern is the possibility of overlooking any important aspects that later result in a data breach. Based on three case studies, this paper considers whether a more formal approach to privacy analysis could be taken that would help identify the full coverage of a Privacy Impact Analysis and determine the deficiencies with an organisation's current policies and approach. A diagrammatic model showing the relationships between Confidentiality, Privacy, Trust, Security and Safety is introduced. First the validity of this model is determined by mapping it against the real-world case studies taken from three healthcare services that depend on ICT. Then, by using software engineering methods, a formal mapping of the relationships is undertaken to identify a full set of policies needed to satisfy the model. How effective this approach may prove as a generic method for deriving a comprehensive set of policies in health ICT applications is finally discussed.

  3. Location-Related Privacy in Geo-Social Networks

    DEFF Research Database (Denmark)

    Ruiz Vicente, Carmen; Freni, Dario; Bettini, Claudio

    2011-01-01

    -ins." However, this ability to reveal users' locations causes new privacy threats, which in turn call for new privacy-protection methods. The authors study four privacy aspects central to these social networks - location, absence, co-location, and identity privacy - and describe possible means of protecting...... privacy in these circumstances....

  4. Information privacy fundamentals for librarians and information professionals

    CERN Document Server

    Givens, Cherie L

    2014-01-01

    This book introduces library and information professionals to information privacy, provides an overview of information privacy in the library and information science context, U.S. privacy laws by sector, information privacy policy, and key considerations when planning and creating a privacy program.

  5. Location-Related Privacy in Geo-Social Networks

    DEFF Research Database (Denmark)

    Ruiz Vicente, Carmen; Freni, Dario; Bettini, Claudio

    2011-01-01

    -ins." However, this ability to reveal users' locations causes new privacy threats, which in turn call for new privacy-protection methods. The authors study four privacy aspects central to these social networks - location, absence, co-location, and identity privacy - and describe possible means of protecting...... privacy in these circumstances....

  6. Quantifying Differential Privacy under Temporal Correlations

    Science.gov (United States)

    Cao, Yang; Yoshikawa, Masatoshi; Xiao, Yonghui; Xiong, Li

    2017-01-01

    Differential Privacy (DP) has received increasing attention as a rigorous privacy framework. Many existing studies employ traditional DP mechanisms (e.g., the Laplace mechanism) as primitives, which assume that the data are independent, or that adversaries do not have knowledge of the data correlations. However, continuous generated data in the real world tend to be temporally correlated, and such correlations can be acquired by adversaries. In this paper, we investigate the potential privacy loss of a traditional DP mechanism under temporal correlations in the context of continuous data release. First, we model the temporal correlations using Markov model and analyze the privacy leakage of a DP mechanism when adversaries have knowledge of such temporal correlations. Our analysis reveals that the privacy loss of a DP mechanism may accumulate and increase over time. We call it temporal privacy leakage. Second, to measure such privacy loss, we design an efficient algorithm for calculating it in polynomial time. Although the temporal privacy leakage may increase over time, we also show that its supremum may exist in some cases. Third, to bound the privacy loss, we propose mechanisms that convert any existing DP mechanism into one against temporal privacy leakage. Experiments with synthetic data confirm that our approach is efficient and effective. PMID:28883711

  7. Privacy Preserving Content Protection (Privacy behoud content protection)

    OpenAIRE

    Deng, Mina

    2010-01-01

    De vooruitgang van informatie- en communicatietechnologie in de laatste decennia heeft de manier waarop informatie wordt verzameld en verwerkt grondig beїnvloed. Dit roept echter ook vraagtekens op rond de manier waarop met privacy wordt omgegaan. De komst van digitale technologieën, het gemak waarmee ongeoorloofde kopieën kunnen worden geproduceerd, en de toegang tot digitale inhoud -- leidend tot commerciële inbreuken -- motiveren de nood om content protection (inhoudsbeschermende) te...

  8. A Computer-Aided Bibliometrics System for Journal Citation Analysis and Departmental Core Journal Ranking List Generation

    Directory of Open Access Journals (Sweden)

    Yih-Chearng Shiue

    2004-12-01

    Full Text Available Due to the tremendous increase and variation in serial publications, faculties in department of university are finding it difficult to generate and update their departmental core journal list regularly and accurately, and libraries are finding it difficult to maintain their current serial collection for different departments. Therefore, the evaluation of a departmental core journal list is an important task for departmental faculties and librarians. A departmental core journal list not only helps departments understand research performances of faculties and students, but also helps librarians make decisions about which journals to retain and which to cancel. In this study, a Computer-Aided Bibliometrics System was implemented and two methodologies (JCDF and LibJF were proposed in order to generate a departmental core journal ranking list and make the journal citation analysis. Six departments were taken as examples, with MIS as the major one. One journal citation pattern was found and the ratio of Turning point-to-No. journal was always around 0.07 among the 10 journals and 6 departments. After comparing with four methodologies via overlapping rate and standard deviation distances, the two proposed methodologies were shown to be better than questionnaire and library subscription method.

  9. Measurable improvement in patient safety culture: A departmental experience with incident learning.

    Science.gov (United States)

    Kusano, Aaron S; Nyflot, Matthew J; Zeng, Jing; Sponseller, Patricia A; Ermoian, Ralph; Jordan, Loucille; Carlson, Joshua; Novak, Avrey; Kane, Gabrielle; Ford, Eric C

    2015-01-01

    Rigorous use of departmental incident learning is integral to improving patient safety and quality of care. The goal of this study was to quantify the impact of a high-volume, departmental incident learning system on patient safety culture. A prospective, voluntary, electronic incident learning system was implemented in February 2012 with the intent of tracking near-miss/no-harm incidents. All incident reports were reviewed weekly by a multiprofessional team with regular department-wide feedback. Patient safety culture was measured at baseline with validated patient safety culture survey questions. A repeat survey was conducted after 1 and 2 years of departmental incident learning. Proportional changes were compared by χ(2) or Fisher exact test, where appropriate. Between 2012 and 2014, a total of 1897 error/near-miss incidents were reported, representing an average of 1 near-miss report per patient treated. Reports were filed by a cross section of staff, with the majority of incidents reported by therapists, dosimetrists, and physicists. Survey response rates at baseline and 1 and 2 years were 78%, 80%, and 80%, respectively. Statistically significant and sustained improvements were noted in several safety metrics, including belief that the department was openly discussing ways to improve safety, the sense that reports were being used for safety improvement, and the sense that changes were being evaluated for effectiveness. None of the surveyed dimensions of patient safety culture worsened. Fewer punitive concerns were noted, with statistically significant decreases in the worry of embarrassment in front of colleagues and fear of getting colleagues in trouble. A comprehensive incident learning system can identify many areas for improvement and is associated with significant and sustained improvements in patient safety culture. These data provide valuable guidance as incident learning systems become more widely used in radiation oncology. Copyright © 2015

  10. Mail office

    CERN Multimedia

    2006-01-01

    Members of the personnel are kindly requested to empty their mail boxes. Any mail remaining in mail boxes will be collected and resorted by Mail Office staff on 6 April. Only specifically addressed mail will be re-delivered.

  11. Mail Office

    CERN Multimedia

    2006-01-01

    Members of the personnel are kindly requested to empty their mail boxes. Any mail remaining in mail boxes will be collected and resorted by Mail Office staff on 1st June. Only specifically addressed mail will be re-delivered.

  12. Supporting Hospital Inter-departmental Coordination of work with Electronic Whiteboards

    DEFF Research Database (Denmark)

    Lassen, Jens Vejrup; Simonsen, Jesper

    We present an ethnographic study of the organizational aspects of the use of an electronic whiteboard (EW) system implemented in a Danish hospital located in Nykøbing Falster (NFH) . The EW system had originally been developed for the emergency department (ED), but had later been extended...... to the entire hospital, and the study was conducted about 10 months after that time. The study focuses on coordination regarding inter-departmental ordering of surgical operations via the EW system. The research question asked whether clinicians experienced impacts or consequences, and the challenges...... and demonstrate the complexity of organizing cooperative work using artifacts and technology across organizational units....

  13. Privacy im Social Semantic Web

    Science.gov (United States)

    Nagenborg, Michael

    Der Schwerpunkt dieses Beitrages liegt auf dem Design von Infrastrukturen, welche es ermöglichen sollen, private Daten kontrolliert preiszugeben und auszutauschen. Zunächst wird daran erinnert, dass rechtliche und technische Maßnahmen zum Datenschutz stets auch dazu dienen, den Austausch von Daten zu ermöglichen. Die grundlegende Herausforderung besteht darin, der sozialen und politischen Bedeutung des Privaten Rechnung zu tragen. Privatheit wird aus der Perspektive der Informationsethik dabei als ein normatives, handlungsleitendes Konzept verstanden. Als Maßstab für die Gestaltung der entsprechenden Infrastrukturen wird auf Helen Nissenbaums Konzept der privacy as contextual integrity" zurückgegriffen, um u. a. die Ansätze der end-to-end information accountability" [38] und des Privacy Identity Management for Europe"- Projektes zu diskutieren.

  14. Genetic privacy: orthodoxy or oxymoron?

    Science.gov (United States)

    Sommerville, A; English, V

    1999-01-01

    In this paper we question whether the concept of "genetic privacy" is a contradiction in terms. And, if so, whether the implications of such a conclusion, inevitably impact on how society comes to perceive privacy and responsibility generally. Current law and ethical discourse place a high value on self-determination and the rights of individuals. In the medical sphere, the recognition of patient "rights" has resulted in health professionals being given clear duties of candour and frankness. Dilemmas arise, however, when patients decline to know relevant information or, knowing it, refuse to share it with others who may also need to know. This paper considers the notions of interconnectedness and responsibility to others which are brought to the fore in the genetic sphere and which challenge the primacy afforded to personal autonomy. It also explores the extent to which an individual's perceived moral obligations can or should be enforced. PMID:10226920

  15. Privacy Implications of Surveillance Systems

    DEFF Research Database (Denmark)

    Thommesen, Jacob; Andersen, Henning Boje

    2009-01-01

    This paper presents a model for assessing the privacy „cost‟ of a surveillance system. Surveillance systems collect and provide personal information or observations of people by means of surveillance technologies such as databases, video or location tracking. Such systems can be designed...... by analyzing a location-based system for airport passengers developed for a Copenhagen Airport, and the dimensions are used to explain user reactions to different services offered by the system....... for various purposes, even as a service for those being observed, but in any case they will to some degree invade their privacy. The model provided here can indicate how invasive any particular system may be – and be used to compare the invasiveness of different systems. Applying a functional approach...

  16. Online Privacy as a Corporate Social Responsibility

    DEFF Research Database (Denmark)

    Pollach, Irene

    2011-01-01

    Information technology and the Internet have added a new stakeholder concern to the corporate social responsibility agenda: online privacy. While theory suggests that online privacy is a corporate social responsibility, only very few studies in the business ethics literature have connected...... these two. Based on a study of corporate social responsibility disclosures, this article contributes to the existing literature by exploring whether and how the largest IT companies embrace online privacy as a corporate social responsibility. The findings indicate that only a small proportion...... of approaches to addressing privacy was found, which suggests that no institutionalization of privacy practices has taken place yet. The study therefore indicates that online privacy is rather new on the corporate social responsibility agenda, currently playing only a minor role....

  17. Privacy and security in teleradiology.

    Science.gov (United States)

    Ruotsalainen, Pekka

    2010-01-01

    Teleradiology is probably the most successful eHealth service available today. Its business model is based on the remote transmission of radiological images (e.g. X-ray and CT-images) over electronic networks, and on the interpretation of the transmitted images for diagnostic purpose. Two basic service models are commonly used teleradiology today. The most common approach is based on the message paradigm (off-line model), but more developed teleradiology systems are based on the interactive use of PACS/RIS systems. Modern teleradiology is also more and more cross-organisational or even cross-border service between service providers having different jurisdictions and security policies. This paper defines the requirements needed to make different teleradiology models trusted. Those requirements include a common security policy that covers all partners and entities, common security and privacy protection principles and requirements, controlled contracts between partners, and the use of security controls and tools that supporting the common security policy. The security and privacy protection of any teleradiology system must be planned in advance, and the necessary security and privacy enhancing tools should be selected (e.g. strong authentication, data encryption, non-repudiation services and audit-logs) based on the risk analysis and requirements set by the legislation. In any case the teleradiology system should fulfil ethical and regulatory requirements. Certification of the whole teleradiology service system including security and privacy is also proposed. In the future, teleradiology services will be an integrated part of pervasive eHealth. Security requirements for this environment including dynamic and context aware security services are also discussed in this paper.

  18. Privacy-preserving distributed clustering

    DEFF Research Database (Denmark)

    Erkin, Zekeriya; Veugen, Thijs; Toft, Tomas

    2013-01-01

    by taking the distributed structure of the system into account and improving the efficiency in terms of computation and communication by data packing. While our construction can be easily adjusted to a centralized or a distributed computing model, we rely on a set of particular users that help the service...... provider with computations. Experimental results clearly indicate that the work we present is an efficient way of deploying a privacy-preserving clustering algorithm in a distributed manner....

  19. Fictional privacy among Facebook users.

    Science.gov (United States)

    Lemieux, Robert

    2012-08-01

    The current study involved the creation of a fictional Facebook account with limited information and was designed to assess whether participants would accept the friendship of an ambiguous, unknown person. Results indicated that 325 Facebook members (72% of the sample) willingly accepted the friendship of the unknown individual. Results are discussed in relation to privacy concerns, norms of reciprocity, and allowing access to potentially embarrassing information and/or pictures.

  20. Online Tracking Technologies and Web Privacy:Technologieën voor Online volgen en Web Privacy

    OpenAIRE

    Acar, Mustafa Gunes Can

    2017-01-01

    In my PhD thesis, I would like to study the problem of online privacy with a focus on Web and mobile applications. Key research questions to be addressed by my study are the following: How can we formalize and quantify web tracking? What are the threats presented against privacy by different tracking techniques such as browser fingerprinting and cookie based tracking? What kind of privacy enhancing technologies (PET) can be used to ensure privacy without degrading service quality? The stud...

  1. Privacy-shake”: a haptic interface for managing privacy settings in mobile location sharing applications

    OpenAIRE

    Jedrzejczyk, Lukasz; Price, Blaine; Bandara, Arosha; Nuseibeh, Bashar

    2010-01-01

    peer-reviewed We describe the ???Privacy-Shake???, a novel interface for managing coarse grained privacy settings. We built a prototype that enables users of Buddy Tracker, an example location sharing application, to change their privacy preferences by shaking their phone. Users can enable or disable location sharing and change the level of granularity of disclosed location by shaking and sweeping their phone. In this poster we present and motivate our work on Privacy-Shake and report on a...

  2. Addressing the Privacy Paradox by Expanded Privacy Awareness - The Example of Context-Aware Services

    OpenAIRE

    Deuker, André

    2010-01-01

    International audience; When interacting with applications, users are less restrictive in disclosing their personal data than if asked in an application-independent context. On a more general level this behavior is termed as privacy paradox. The creation of privacy awareness can assist users in dealing with context-aware services without harming their privacy unintentionally, thereby addressing the privacy paradox. The paper in hand provides a research approach towards the integration of priv...

  3. "I am Spartacus":Privacy Enhancing Technologies, Collaborative Obfuscation and Privacy as a Public Good

    OpenAIRE

    Kwecka, Z.; Buchanan, W.; Schafer, B; Rauhofer, J.

    2014-01-01

    The paper introduces an approach to privacy enhancing technologies that sees privacy not merely as an individual right, but as a public good. This idea finds its correspondence in our approach to privacy protection through obfuscation, where everybody in a group takes a small privacy risk to protect the anonymity of fellow group members. We show how these ideas can be computationally realised in an Investigative Data Acquisition Platform (IDAP). IDAP is an efficient symmetric Private Informat...

  4. Privacy Preserving Moving KNN Queries

    CERN Document Server

    Hashem, Tanzima; Zhang, Rui

    2011-01-01

    We present a novel approach that protects trajectory privacy of users who access location-based services through a moving k nearest neighbor (MkNN) query. An MkNN query continuously returns the k nearest data objects for a moving user (query point). Simply updating a user's imprecise location such as a region instead of the exact position to a location-based service provider (LSP) cannot ensure privacy of the user for an MkNN query: continuous disclosure of regions enables the LSP to follow a user's trajectory. We identify the problem of trajectory privacy that arises from the overlap of consecutive regions while requesting an MkNN query and provide the first solution to this problem. Our approach allows a user to specify the confidence level that represents a bound of how much more the user may need to travel than the actual kth nearest data object. By hiding a user's required confidence level and the required number of nearest data objects from an LSP, we develop a technique to prevent the LSP from tracking...

  5. Distributed privacy preserving data collection

    KAUST Repository

    Xue, Mingqiang

    2011-01-01

    We study the distributed privacy preserving data collection problem: an untrusted data collector (e.g., a medical research institute) wishes to collect data (e.g., medical records) from a group of respondents (e.g., patients). Each respondent owns a multi-attributed record which contains both non-sensitive (e.g., quasi-identifiers) and sensitive information (e.g., a particular disease), and submits it to the data collector. Assuming T is the table formed by all the respondent data records, we say that the data collection process is privacy preserving if it allows the data collector to obtain a k-anonymized or l-diversified version of T without revealing the original records to the adversary. We propose a distributed data collection protocol that outputs an anonymized table by generalization of quasi-identifier attributes. The protocol employs cryptographic techniques such as homomorphic encryption, private information retrieval and secure multiparty computation to ensure the privacy goal in the process of data collection. Meanwhile, the protocol is designed to leak limited but non-critical information to achieve practicability and efficiency. Experiments show that the utility of the anonymized table derived by our protocol is in par with the utility achieved by traditional anonymization techniques. © 2011 Springer-Verlag.

  6. Portrait of a Privacy Invasion

    Directory of Open Access Journals (Sweden)

    Shoshitaishvili Yan

    2015-04-01

    Full Text Available The popularity of online social networks has changed the way in which we share personal thoughts, political views, and pictures. Pictures have a particularly important role in the privacy of users, as they can convey substantial information (e.g., a person was attending an event, or has met with another person. Moreover, because of the nature of social networks, it has become increasingly difficult to control who has access to which content. Therefore, when a substantial amount of pictures are accessible to one party, there is a very serious potential for violations of the privacy of users. In this paper, we demonstrate a novel technique that, given a large corpus of pictures shared on a social network, automatically determines who is dating whom, with reasonable precision. More specifically, our approach combines facial recognition, spatial analysis, and machine learning techniques to determine pairs that are dating. To the best of our knowledge, this is the first privacy attack of this kind performed on social networks. We implemented our approach in a tool, called Creepic, and evaluated it on two real-world datasets. The results show that it is possible to automatically extract non-obvious, and nondisclosed, relationships between people represented in a group of pictures, even when the people involved are not directly part of a connected social clique.

  7. The Infopriv model for information privacy

    OpenAIRE

    2012-01-01

    D.Phil. (Computer Science) The privacy of personal information is crucial in today's information systems. Traditional security models are mainly concerned with the protection of information inside a computer system. These models assume that the users of a computer system are trustworthy and will not disclose information to unauthorised parties. However, this assumption does not always apply to information privacy since people are the major cause of privacy violations. Alternative models ar...

  8. Trust and Privacy in Our Networked World

    OpenAIRE

    Tavani, Herman T.; Dieter Arnold

    2011-01-01

    Remarking on the relationship between the concepts of trust and privacy, Charles Fried (1990, p. 56) [1] writes: Trust is the attitude of expectation that another will behave according to the constraints of morality… There can be no trust where there is no possibility of error. More specifically, man cannot know that he is trusted unless he has the right to act without constant surveillance so that he knows he can betray the trust. Privacy confers that essential right… Without privacy and the...

  9. An Alternative View of Privacy on Facebook

    Directory of Open Access Journals (Sweden)

    Christian Fuchs

    2011-02-01

    Full Text Available The predominant analysis of privacy on Facebook focuses on personal information revelation. This paper is critical of this kind of research and introduces an alternative analytical framework for studying privacy on Facebook, social networking sites and web 2.0. This framework is connecting the phenomenon of online privacy to the political economy of capitalism—a focus that has thus far been rather neglected in research literature about Internet and web 2.0 privacy. Liberal privacy philosophy tends to ignore the political economy of privacy in capitalism that can mask socio-economic inequality and protect capital and the rich from public accountability. Facebook is in this paper analyzed with the help of an approach, in which privacy for dominant groups, in regard to the ability of keeping wealth and power secret from the public, is seen as problematic, whereas privacy at the bottom of the power pyramid for consumers and normal citizens is seen as a protection from dominant interests. Facebook’s privacy concept is based on an understanding that stresses self-regulation and on an individualistic understanding of privacy. The theoretical analysis of the political economy of privacy on Facebook in this paper is based on the political theories of Karl Marx, Hannah Arendt and Jürgen Habermas. Based on the political economist Dallas Smythe’s concept of audience commodification, the process of prosumer commodification on Facebook is analyzed. The political economy of privacy on Facebook is analyzed with the help of a theory of drives that is grounded in Herbert Marcuse’s interpretation of Sigmund Freud, which allows to analyze Facebook based on the concept of play labor (= the convergence of play and labor.

  10. Predicting Privacy Attitudes Using Phone Metadata

    OpenAIRE

    2016-01-01

    With the increasing usage of smartphones, there is a corresponding increase in the phone metadata generated by individuals using these devices. Managing the privacy of personal information on these devices can be a complex task. Recent research has suggested the use of social and behavioral data for automatically recommending privacy settings. This paper is the first effort to connect users' phone use metadata with their privacy attitudes. Based on a 10-week long field study involving phone m...

  11. 77 FR 59386 - Privacy Act of 1974, as Amended

    Science.gov (United States)

    2012-09-27

    ...] Privacy Act of 1974, as Amended AGENCY: Bureau of Consumer Financial Protection. ACTION: Notice of a Revised Privacy Act System of Records. SUMMARY: In accordance with the Privacy Act of 1974, as amended, the Bureau of Consumer Financial [[Page 59387

  12. Vehicular ad hoc network security and privacy

    CERN Document Server

    Lin, X

    2015-01-01

    Unlike any other book in this area, this book provides innovative solutions to security issues, making this book a must read for anyone working with or studying security measures. Vehicular Ad Hoc Network Security and Privacy mainly focuses on security and privacy issues related to vehicular communication systems. It begins with a comprehensive introduction to vehicular ad hoc network and its unique security threats and privacy concerns and then illustrates how to address those challenges in highly dynamic and large size wireless network environments from multiple perspectives. This book is richly illustrated with detailed designs and results for approaching security and privacy threats.

  13. Customer privacy on UK healthcare websites.

    Science.gov (United States)

    Mundy, Darren P

    2006-09-01

    Privacy has been and continues to be one of the key challenges of an age devoted to the accumulation, processing, and mining of electronic information. In particular, privacy of healthcare-related information is seen as a key issue as health organizations move towards the electronic provision of services. The aim of the research detailed in this paper has been to analyse privacy policies on popular UK healthcare-related websites to determine the extent to which consumer privacy is protected. The author has combined approaches (such as approaches focused on usability, policy content, and policy quality) used in studies by other researchers on e-commerce and US healthcare websites to provide a comprehensive analysis of UK healthcare privacy policies. The author identifies a wide range of issues related to the protection of consumer privacy through his research analysis using quantitative results. The main outcomes from the author's research are that only 61% of healthcare-related websites in their sample group posted privacy policies. In addition, most of the posted privacy policies had poor readability standards and included a variety of privacy vulnerability statements. Overall, the author's findings represent significant current issues in relation to healthcare information protection on the Internet. The hope is that raising awareness of these results will drive forward changes in the industry, similar to those experienced with information quality.

  14. Privacy Protection Research of Mobile RFID

    Institute of Scientific and Technical Information of China (English)

    2007-01-01

    Radio Frequency Identification is one of the most controversial technologies at present.It is very difficult to detect who reads a tag incorporated into products owned by a person,a significant concern to privacy threats in RFID system arises from this reason.User privacy problem is prior considersion for mobile RFID service,because most mobile RFID service based on end-user service.Propose a solution for user privacy protection,which is a modification of EPC Class 1 Generation 2 protocol,and introduce a privacy protection scenario for mobile RFID service using this method.

  15. Location privacy protection in mobile networks

    CERN Document Server

    Liu, Xinxin

    2013-01-01

    This SpringerBrief analyzes the potential privacy threats in wireless and mobile network environments, and reviews some existing works. It proposes multiple privacy preserving techniques against several types of privacy threats that are targeting users in a mobile network environment. Depending on the network architecture, different approaches can be adopted. The first proposed approach considers a three-party system architecture where there is a trusted central authority that can be used to protect users? privacy. The second approach considers a totally distributed environment where users per

  16. Privacy Preserving Data Publishing: A Classification Perspective

    Directory of Open Access Journals (Sweden)

    A N K Zaman

    2014-09-01

    Full Text Available The concept of privacy is expressed as release of information in a controlled way. Privacy could also be defined as privacy decides what type of personal information should be released and which group or person can access and use it. Privacy Preserving Data Publishing (PPDP is a way to allow one to share anonymous data to ensure protection against identity disclosure of an individual. Data anonymization is a technique for PPDP, which makes sure the published data, is practically useful for processing (mining while preserving individuals sensitive information. Most works reported in literature on privacy preserving data publishing for classification task handle numerical data. However, most real life data contains both numerical and non-numerical data. Another shortcoming is that use of distributed model called Secure Multiparty Computation (SMC. For this research, a centralized model is used for independent data publication by a single data owner. The key challenge for PPDP is to ensure privacy as well as to keep the data usable for research. Differential privacy is a technique that ensures the highest level of privacy for a record owner while providing actual information of the data set. The aim of this research is to develop a framework that satisfies differential privacy standards and to ensure maximum data usability for a classification tasks such as patient data classification in terms of blood pressure.

  17. 75 FR 81276 - Office of Inspector General; Delegation of Authorities

    Science.gov (United States)

    2010-12-27

    ... delegates two authorities of the Inspector General, Office of Inspector General for the Federal Housing... enforcement activity. This notice delegates this authority to request records protected by the Privacy Act for... Inspector General delegates the following authorities: Section A. Authority Delegated: The Inspector General...

  18. Annual report, Office of the Inspector General

    Energy Technology Data Exchange (ETDEWEB)

    Mansfield, J.K.

    1979-03-01

    The law which created the Department of Energy (DOE) also established within the Department an Office of Inspector General (IG). This office has statutory responsibilities relating to the promotion of efficiency and economy and the prevention or detection of fraud and abuse in the programs and operations of the Department. The first sections of this report take note of the relatively short time that the current senior IG officials have been on the job, and describe the office organizational structure that the new management team created in the last half of 1978. The next section discusses in some detail the most critical problem, the lack of sufficient staff to discharge the full range of statutory responsibilities. Subsequent sections deal with the activities of audits, investigations, and inspections units during 1978. Examples of significant problems encountered and corrective actions taken are given. The question of what is needed for IG to play a true leadership role in the Department's overall audit effort is also addressed. Then Departmental compliance with IG recommendations and the DOE program areas of unusually high vulnerability are discussed. Next, staff training efforts and a legal challenge to the subpoena power of the IG office are described. Finally, advance planning and some important IG goals for the coming year are addressed. (RWR)

  19. Research of the Relationship between Government Comprehensive Statistics and Departmental Statistics%政府综合统计与部门统计关系

    Institute of Scientific and Technical Information of China (English)

    叶长法

    2005-01-01

    The paper reviews the history of foundation of governmental statistics of China, analyzes the main problems of governmental statistics and the causes of the problems, and forwards some policy suggestions to rationalize the relationship of governmental comprehensive statistics and governmental departmental statistics and strengthen the departmental statistics administration.

  20. Mail Office

    CERN Document Server

    2012-01-01

    Members of the personnel are kindly requested to empty their mail boxes. Any mail remaining in mail boxes will be collected and re-sorted by Mail Office staff on Wednesday 31st of October. Only specifically addressed mail will be re-delivered.

  1. Mail Office

    CERN Multimedia

    GS Department

    2009-01-01

    Members of the personnel are kindly requested to empty their mail boxes. Any mail remaining in mail boxes will be collected and resorted by Mail Office staff on Thursday 8 October 2009. Only specifically addressed mail will be re-delivered.

  2. 78 FR 9709 - Office of the Director, National Institutes of Health; Notice of Closed Meeting

    Science.gov (United States)

    2013-02-11

    ... personal privacy. Name of Committee: Office of Research Infrastructure Programs Special Emphasis Panel; NIH..., 6701 Democracy Blvd., Bethesda, MD 20892. Contact Person: Mohan Viswanathan, Deputy Director, Office of...), National Institutes of Health, 6701 Democracy Blvd., Democracy 1, Room 1084, Bethesda, MD 20892-4874,...

  3. 78 FR 56903 - Office of the Director, National Institutes of Health; Notice of Closed Meetings

    Science.gov (United States)

    2013-09-16

    ... personal privacy. Name of Committee: Office of Research Infrastructure Programs Special Emphasis Panel... Democracy Blvd., Democracy 1, Room 1082, Bethesda, MD 20892, 301-435-0811, hildsa@mail.nih.gov . Name of Committee: Office of Research Infrastructure Programs Special Emphasis Panel; Comparative Medicine...

  4. 78 FR 38065 - Office of the Director, National Institutes of Health; Notice of Closed Meetings

    Science.gov (United States)

    2013-06-25

    ... personal privacy. Name of Committee: Office of Research Infrastructure Programs Special Emphasis Panel... Health, 6701 Democracy Blvd., Democracy 1, Room 1080, Bethesda, MD 20892-4874, 301-435-0806, nelsonbj... limitations imposed by the review and funding cycle. Name of Committee: Office of Research...

  5. 75 FR 22577 - Proposed Privacy Policy Statement

    Science.gov (United States)

    2010-04-29

    ... request for public comment on Proposed Privacy Policy Statement. SUMMARY: The U.S. Election Assistance Commission (EAC) seeks public comment on the Proposed Privacy Policy Statement. OMB Memorandum M-99- 18.... These statements are intended to inform the public of government- wide policies and how each...

  6. Differential privacy in intelligent transportation systems

    NARCIS (Netherlands)

    Kargl, Frank; Friedman, Arik; Boreli, Roksana

    2013-01-01

    In this paper, we investigate how the concept of differential privacy can be applied to Intelligent Transportation Systems (ITS), focusing on protection of Floating Car Data (FCD) stored and processed in central Traffic Data Centers (TDC). We illustrate an integration of differential privacy with

  7. Privacy-Preserving Location-Based Services

    Science.gov (United States)

    Chow, Chi Yin

    2010-01-01

    Location-based services (LBS for short) providers require users' current locations to answer their location-based queries, e.g., range and nearest-neighbor queries. Revealing personal location information to potentially untrusted service providers could create privacy risks for users. To this end, our objective is to design a privacy-preserving…

  8. Contemporary Privacy Theory Contributions to Learning Analytics

    Science.gov (United States)

    Heath, Jennifer

    2014-01-01

    With the continued adoption of learning analytics in higher education institutions, vast volumes of data are generated and "big data" related issues, including privacy, emerge. Privacy is an ill-defined concept and subject to various interpretations and perspectives, including those of philosophers, lawyers, and information systems…

  9. Just in Time Research: Privacy Practices

    Science.gov (United States)

    Grama, Joanna Lyn

    2014-01-01

    The January 2014 edition of the ECAR Update subscriber newsletter included an informal poll on information privacy practices. The poll was intended to collect a quick snapshot of the higher education community's thoughts on this important topic during Data Privacy Month. Results of the poll will be used to inform EDUCAUSE research, programs,…

  10. Online privacy: overview and preliminary research

    Directory of Open Access Journals (Sweden)

    Renata Mekovec

    2010-12-01

    Full Text Available Normal 0 21 false false false HR X-NONE X-NONE MicrosoftInternetExplorer4 Over the last decade using the Internet for online shopping, information browsing and searching as well as for online communication has become part of everyday life. Although the Internet technology has a lot of benefits for users, one of the most important disadvantages is related to the increasing capacity for users’ online activity surveillance. However, the users are increasingly becoming aware of online surveillance methods, which results in their increased concern for privacy protection. Numerous factors influence the way in which individuals perceive the level of privacy protection when they are online. This article provides a review of factors that influence the privacy perception of Internet users. Previous online privacy research related to e-business was predominantly focused on the dimension of information privacy and concerned with the way users’ personal information is collected, saved and used by an online company. This article’s main aim is to provide an overview of numerous Internet users’ privacy perception elements across various privacy dimensions as well as their potential categorization. In addition, considering that e-banking and online shopping are one of the most widely used e-services, an examination of online privacy perception of e-banking/online shopping users was performed. 

  11. Privacy and Ethics in Undergraduate GIS Curricula

    Science.gov (United States)

    Scull, Peter; Burnett, Adam; Dolfi, Emmalee; Goldfarb, Ali; Baum, Peter

    2016-01-01

    The development of location-aware technologies, such as smartphones, raises serious questions regarding locational privacy and the ethical use of geographic data. The degree to which these concepts are taught in undergraduate geographic information science (GISci) courses is unknown. A survey of GISci educators shows that issues of privacy and…

  12. Differential privacy in intelligent transportation systems

    NARCIS (Netherlands)

    Kargl, Frank; Friedman, Arik; Boreli, Roksana

    2013-01-01

    In this paper, we investigate how the concept of differential privacy can be applied to Intelligent Transportation Systems (ITS), focusing on protection of Floating Car Data (FCD) stored and processed in central Traffic Data Centers (TDC). We illustrate an integration of differential privacy with pr

  13. A Deontological View of the Privacy Debate.

    Science.gov (United States)

    Wilson, Alan

    The mass media are at odds with the public on issues concerning privacy, i.e., issues concerning whether private information about a person should be printed in a newspaper or magazine. In a 1982 survey, one journalist/respondent said his or her newspaper "almost always" favored the public's right to know over a person's right to privacy.…

  14. Privacy-Preserving Location-Based Services

    Science.gov (United States)

    Chow, Chi Yin

    2010-01-01

    Location-based services (LBS for short) providers require users' current locations to answer their location-based queries, e.g., range and nearest-neighbor queries. Revealing personal location information to potentially untrusted service providers could create privacy risks for users. To this end, our objective is to design a privacy-preserving…

  15. The Press, Privacy, and Community Mores.

    Science.gov (United States)

    Glasser, Theodore L.

    Because of judicial indifference and legislative inaction, the conflict between the right of privacy and the freedom of the press is no closer to a resolution than it was a century ago. William Prosser's reduction of the common law of privacy into four separate torts has not solved the problem. The concept of "newsworthiness" has not been helpful…

  16. Virtue, Privacy and Self-Determination

    DEFF Research Database (Denmark)

    Stamatellos, Giannis

    2011-01-01

    The ethical problem of privacy lies at the core of computer ethics and cyber ethics discussions. The extensive use of personal data in digital networks poses a serious threat to the user’s right of privacy not only at the level of a user’s data integrity and security but also at the level of a user...

  17. Privacy Preserving Mapping Schemes Supporting Comparison

    NARCIS (Netherlands)

    Tang, Qiang

    2010-01-01

    To cater to the privacy requirements in cloud computing, we introduce a new primitive, namely Privacy Preserving Mapping (PPM) schemes supporting comparison. An PPM scheme enables a user to map data items into images in such a way that, with a set of images, any entity can determine the $<, =, >$ re

  18. Privacy Preserving Mapping Schemes Supporting Comparison

    NARCIS (Netherlands)

    Tang, Qiang

    2010-01-01

    To cater to the privacy requirements in cloud computing, we introduce a new primitive, namely Privacy Preserving Mapping (PPM) schemes supporting comparison. An PPM scheme enables a user to map data items into images in such a way that, with a set of images, any entity can determine the <, =, >

  19. Protecting privacy in data release

    CERN Document Server

    Livraga, Giovanni

    2015-01-01

    This book presents a comprehensive approach to protecting sensitive information when large data collections are released by their owners. It addresses three key requirements of data privacy: the protection of data explicitly released, the protection of information not explicitly released but potentially vulnerable due to a release of other data, and the enforcement of owner-defined access restrictions to the released data. It is also the first book with a complete examination of how to enforce dynamic read and write access authorizations on released data, applicable to the emerging data outsou

  20. Defining Privacy Is Supposed to Be Easy

    DEFF Research Database (Denmark)

    Mödersheim, Sebastian Alexander; Gross, Thomas; Viganò, Luca

    2013-01-01

    Formally specifying privacy goals is not trivial. The most widely used approach in formal methods is based on the static equivalence of frames in the applied pi-calculus, basically asking whether or not the intruder is able to distinguish two given worlds. A subtle question is how we can be sure...... that we have specified all pairs of worlds to properly reflect our intuitive privacy goal. To address this problem, we introduce in this paper a novel and declarative way to specify privacy goals, called α-β privacy, and relate it to static equivalence. This new approach is based on specifying two...... formulae α and β in first-order logic with Herbrand universes, where α reflects the intentionally released information and β includes the actual cryptographic (“technical”) messages the intruder can see. Then α-β privacy means that the intruder cannot derive any “non-technical” statement from β that he...

  1. Protecting privacy in a clinical data warehouse.

    Science.gov (United States)

    Kong, Guilan; Xiao, Zhichun

    2015-06-01

    Peking University has several prestigious teaching hospitals in China. To make secondary use of massive medical data for research purposes, construction of a clinical data warehouse is imperative in Peking University. However, a big concern for clinical data warehouse construction is how to protect patient privacy. In this project, we propose to use a combination of symmetric block ciphers, asymmetric ciphers, and cryptographic hashing algorithms to protect patient privacy information. The novelty of our privacy protection approach lies in message-level data encryption, the key caching system, and the cryptographic key management system. The proposed privacy protection approach is scalable to clinical data warehouse construction with any size of medical data. With the composite privacy protection approach, the clinical data warehouse can be secure enough to keep the confidential data from leaking to the outside world. © The Author(s) 2014.

  2. Departmentalized, Self-Contained, or Somewhere in Between: Understanding Elementary Grade-Level Organizational Decision-Making

    Science.gov (United States)

    Parker, Audra; Rakes, Lori; Arndt, Katie

    2017-01-01

    Recent trends indicate a move away from self-contained classrooms and toward content-focused departmentalization in elementary schools. This study takes a snapshot of the existing organizational structures used in elementary schools in one district and explores administrators' beliefs and practices regarding this phenomenon. Our findings suggest…

  3. 42 CFR 422.1074 - Right to request Departmental Appeals Board review of Administrative Law Judge's decision or...

    Science.gov (United States)

    2010-10-01

    ... 42 Public Health 3 2010-10-01 2010-10-01 false Right to request Departmental Appeals Board review of Administrative Law Judge's decision or dismissal. 422.1074 Section 422.1074 Public Health CENTERS... MEDICARE ADVANTAGE PROGRAM Appeal procedures for Civil Money Penalties § 422.1074 Right to...

  4. 42 CFR 423.1074 - Right to request Departmental Appeals Board review of Administrative Law Judge's decision or...

    Science.gov (United States)

    2010-10-01

    ... 42 Public Health 3 2010-10-01 2010-10-01 false Right to request Departmental Appeals Board review of Administrative Law Judge's decision or dismissal. 423.1074 Section 423.1074 Public Health CENTERS... VOLUNTARY MEDICARE PRESCRIPTION DRUG BENEFIT Appeal Procedures for Civil Money Penalties § 423.1074 Right...

  5. The Relationship between Departmental Power and Faculty Careers on Two Campuses: The Case for Structural Effects on Faculty Salaries.

    Science.gov (United States)

    Moore, William L.; Pfeffer, Jeffrey

    1980-01-01

    The rate of faculty advancement through steps within ranks were examined in a sample of 40 departments on two campuses of a large state university system. The proportion of departmental faculty moving through steps faster than normal was correlated with the political power of the department on the campus. (Author/MLW)

  6. Self-Contained versus Departmentalized Settings in Urban Elementary Schools: An Analysis of Fifth-Grade Student Mathematics Performance

    Science.gov (United States)

    Jack, Diamond Marie

    2014-01-01

    Student achievement in mathematics, particularly in urban areas, is a consistent concern in the United States. Research suggests that teachers either are under qualified or have a negative perception of themselves as mathematics teachers. Departmentalization on the elementary level is an organizational structure that may benefit urban students and…

  7. Mail Office

    CERN Document Server

    GS Department

    2009-01-01

    The Mail Office wishes to remind users that the CERN mail service is exclusively reserved for official CERN mail. All external official mail must be sent to the Mail Office in an unstamped envelope on which your name and Department must be clearly indicated below the official CERN address (see example) to help us to find you in the event that it cannot be delivered. If you wish to send private mail from the CERN site you must use the post offices at Meyrin (63-R-011) or Prévessin (866-R-C02). Please use "PRIORITY" envelopes only in the case of urgent mail. Any mail containing merchandise (i.e. anything other than documents) must be sent using an EDH shipping request form. INTERNAL MAIL Please remember to include the recipient’s MAILBOX number on the internal mail envelopes, either in the relevant box (new envelopes) or next to the name (old envelopes). This information, which can be found in the CERN PHONEBOOK, simplifies our t...

  8. 76 FR 27847 - Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security/U.S. Coast...

    Science.gov (United States)

    2011-05-13

    ....S. Coast Guard--008 Courts Martial Case Files System of Records AGENCY: Privacy Office, DHS. ACTION..., ``Department of Homeland Security/U.S. Coast Guard--008 Courts Martial Case Files System of Records'' from... Homeland Security/U.S. Coast Guard--008 Courts Martial Case Files System of Records from one or...

  9. 76 FR 60070 - Privacy Act of 1974; Department of Homeland Security/U.S. Citizenship and Immigration Services...

    Science.gov (United States)

    2011-09-28

    ... news media and the public, with the approval of the Chief Privacy Officer in consultation with counsel..., address, organization, e-mail, phone number, relation, paid/unpaid). Signature (electronic or scanned..., debts, encumbrances, etc.). Social Security Number (SSN), if applicable. Supporting documentation...

  10. 78 FR 31958 - Privacy Act of 1974; Department of Homeland Security U.S. Customs and Border Protection-007...

    Science.gov (United States)

    2013-05-28

    ...) carriers who submit information in advance of travel through the Advance Passenger Information System (APIS) (DHS/CBP-005--Advance Passenger Information System (November 18, 2008, (73 FR 68435)); (3) information... Border Protection-007-Border Crossing Information System of Records AGENCY: Privacy Office, Department of...

  11. 75 FR 8092 - Privacy Act of 1974; Department of Homeland Security/ALL-027 The History of the Department of...

    Science.gov (United States)

    2010-02-23

    ... and future leadership, employees, and the public about the history of the Department. DHS is... SECURITY Office of the Secretary Privacy Act of 1974; Department of Homeland Security/ALL--027 The History..., Department of Homeland Security-2004- 0004 Oral History Program: The History of the Department of Homeland...

  12. 75 FR 77607 - Privacy Act of 1974; Proposed New System of Records; Veterinary Medicine Loan Repayment Program

    Science.gov (United States)

    2010-12-13

    ... Office of the Secretary Privacy Act of 1974; Proposed New System of Records; Veterinary Medicine Loan... of Agriculture system of records notice titled, ``Veterinary Medicine Loan Repayment Program Records... select applicants for the Veterinary Medicine Loan Repayment Program (VMLRP); (2) monitor loan...

  13. 78 FR 44583 - Implementation of the Privacy Act of 1974, as Amended; Action To Modify and Terminate an Existing...

    Science.gov (United States)

    2013-07-24

    ... URBAN DEVELOPMENT Implementation of the Privacy Act of 1974, as Amended; Action To Modify and Terminate... Housing and Urban Development (HUD), Office of Assets Sales provides notice that it wishes to alter the... system will continue to be utilized in the marketing of housing assets, to identify qualified...

  14. 5 CFR Appendix C to Part 2634 - Privacy Act and Paperwork Reduction Act Notices for Appendixes A and B

    Science.gov (United States)

    2010-01-01

    ... Appendixes A and B Privacy Act Statement Section 102(f) of the Ethics in Government Act of 1978 as amended (the “Ethics Act”) (5 U.S.C. App.) and subpart D of 5 CFR part 2634 of the regulations of the Office of... under the Ethics Act. The primary use of the information on this certificate is for review by...

  15. 76 FR 67621 - Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security U.S. Customs...

    Science.gov (United States)

    2011-11-02

    ... Protection-003 Credit/Debit Care Data System of Records'' and this proposed rulemaking. In this proposed...; ] DEPARTMENT OF HOMELAND SECURITY Office of the Secretary 6 CFR Part 5 Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security U.S. Customs and Border Protection DHS/CBP-003 Credit/Debit Care...

  16. Public privacy: Reciprocity and Silence

    Directory of Open Access Journals (Sweden)

    Jenny Kennedy

    2014-10-01

    Full Text Available In his 1958 poem 'Dedication to my Wife' TS Eliot proclaims "these are private words addressed to you in public". Simultaneously written for his wife, Valerie Fletcher, and to the implied you of a discourse network, Eliot's poem helps to illustrate the narrative voices and silences that are constitutive of an intimate public sphere. This paper situates reciprocity as a condition of possibility for public privacy. It shows how reciprocity is enabled by systems of code operating through material and symbolic registers. Code promises to control communication, to produce neutral, systemic forms of meaning. Yet such automation is challenged by uneven and fragmented patterns of reciprocity. Moreover, examining the media of public privacy reveals historical trajectories important for understanding contemporary socio­technical platforms of reciprocity. To explore the implicit requirement of reciprocity in publicly private practices, three sites of communication are investigated framed by a media archaeology perspective: postal networks, the mail­art project PostSecret and the anonymous zine 'You'.

  17. Advanced course for doctors as Departmental IT Network Administrators in anesthesia and intensive care units.

    Science.gov (United States)

    Lanza, Vincenzo; Huang, Chun-Hsi

    2006-10-01

    The design and administration of a departmental computer network (Local Area Network) in anesthesiology and intensive care offer the opportunity to manage clinical information and control the work-flow. To improve the local network, after basic design, intelligence is necessary to maintain its efficiency. For this reason the role of a medical administrator of the network is fundamental because he is a qualified figure who recognizes the most important characteristics that a network must have, knows the users of the system, represents a valid consultant for the technician that has to build the network, and is able to face possible breakdowns. This paper illustrates the structure of a course to train a medical network administrator in anesthesiology and critical care.

  18. Predicting Results of the Research Excellence Framework using departmental h-Index

    CERN Document Server

    Mryglod, Olesya; Holovatch, Yurij; Berche, Bertrand

    2014-01-01

    We compare estimates for past institutional research performances coming from two bibliometric indicators to the results of the UK's Research Assessment Exercise which last took place in 2008. We demonstrate that a version of the departmental h-index is better correlated with the actual results of that peer-review exercise than a competing metric known as the normalised citation-based indicator. We then determine the corresponding h-indices for 2008-2013, the period examined in the UK's Research Excellence Framework (REF) 2014. We place herewith the resulting predictions on the arXiv in advance of the REF results being published (December 2014). These may be considered as unbiased predictions of relative performances in that exercise. We will revisit this paper after the REF results are available and comment on the reliability or otherwise of these bibliometrics as compared with peer review.

  19. Fostering Change from Within: Influencing Teaching Practices of Departmental Colleagues by Science Faculty with Education Specialties.

    Science.gov (United States)

    Bush, Seth D; Rudd, James A; Stevens, Michael T; Tanner, Kimberly D; Williams, Kathy S

    2016-01-01

    Globally, calls for the improvement of science education are frequent and fervent. In parallel, the phenomenon of having Science Faculty with Education Specialties (SFES) within science departments appears to have grown in recent decades. In the context of an interview study of a randomized, stratified sample of SFES from across the United States, we discovered that most SFES interviewed (82%) perceived having professional impacts in the realm of improving undergraduate science education, more so than in research in science education or K-12 science education. While SFES reported a rich variety of efforts towards improving undergraduate science education, the most prevalent reported impact by far was influencing the teaching practices of their departmental colleagues. Since college and university science faculty continue to be hired with little to no training in effective science teaching, the seeding of science departments with science education specialists holds promise for fostering change in science education from within biology, chemistry, geoscience, and physics departments.

  20. 48 CFR 52.224-2 - Privacy Act.

    Science.gov (United States)

    2010-10-01

    ... 48 Federal Acquisition Regulations System 2 2010-10-01 2010-10-01 false Privacy Act. 52.224-2... AND FORMS SOLICITATION PROVISIONS AND CONTRACT CLAUSES Text of Provisions and Clauses 52.224-2 Privacy... agency function: Privacy Act (APR 1984) (a) The Contractor agrees to— (1) Comply with the Privacy Act of...

  1. 45 CFR 503.2 - General policies-Privacy Act.

    Science.gov (United States)

    2010-10-01

    ... 45 Public Welfare 3 2010-10-01 2010-10-01 false General policies-Privacy Act. 503.2 Section 503.2... THE UNITED STATES, DEPARTMENT OF JUSTICE RULES OF PRACTICE PRIVACY ACT AND GOVERNMENT IN THE SUNSHINE REGULATIONS Privacy Act Regulations § 503.2 General policies—Privacy Act. The Commission will protect the...

  2. 45 CFR 503.1 - Definitions-Privacy Act.

    Science.gov (United States)

    2010-10-01

    ... 45 Public Welfare 3 2010-10-01 2010-10-01 false Definitions-Privacy Act. 503.1 Section 503.1... THE UNITED STATES, DEPARTMENT OF JUSTICE RULES OF PRACTICE PRIVACY ACT AND GOVERNMENT IN THE SUNSHINE REGULATIONS Privacy Act Regulations § 503.1 Definitions—Privacy Act. For the purpose of this part: Agency...

  3. Privacy Issues of a National Research and Education Network.

    Science.gov (United States)

    Katz, James E.; Graveman, Richard F.

    1991-01-01

    Discussion of the right to privacy of communications focuses on privacy expectations within a National Research and Education Network (NREN). Highlights include privacy needs in scientific and education communications; academic and research networks; network security and privacy concerns; protection strategies; and consequences of privacy…

  4. Digital Privacy: Toward a New Politics and Discursive Practice.

    Science.gov (United States)

    Doty, Philip

    2001-01-01

    Discussion of privacy focuses on digital environments and a more inclusive understanding of privacy. Highlights include legal and policy conceptions; legislation protecting privacy; relevant Supreme Court cases; torts and privacy; European and other efforts; surveillance and social control; information entrepreneurialism; Jurgen Habermas; free…

  5. Data privacy foundations, new developments and the big data challenge

    CERN Document Server

    Torra, Vicenç

    2017-01-01

    This book offers a broad, cohesive overview of the field of data privacy. It discusses, from a technological perspective, the problems and solutions of the three main communities working on data privacy: statistical disclosure control (those with a statistical background), privacy-preserving data mining (those working with data bases and data mining), and privacy-enhancing technologies (those involved in communications and security) communities. Presenting different approaches, the book describes alternative privacy models and disclosure risk measures as well as data protection procedures for respondent, holder and user privacy. It also discusses specific data privacy problems and solutions for readers who need to deal with big data.

  6. Digital privacy in the marketplace perspectives on the information exchange

    CERN Document Server

    Milne, George

    2015-01-01

    Digital Privacy in the Marketplace focuses on the data ex-changes between marketers and consumers, with special ttention to the privacy challenges that are brought about by new information technologies. The purpose of this book is to provide a background source to help the reader think more deeply about the impact of privacy issues on both consumers and marketers. It covers topics such as: why privacy is needed, the technological, historical and academic theories of privacy, how market exchange af-fects privacy, what are the privacy harms and protections available, and what is the likely futur

  7. Privacy by design in personal health monitoring.

    Science.gov (United States)

    Nordgren, Anders

    2015-06-01

    The concept of privacy by design is becoming increasingly popular among regulators of information and communications technologies. This paper aims at analysing and discussing the ethical implications of this concept for personal health monitoring. I assume a privacy theory of restricted access and limited control. On the basis of this theory, I suggest a version of the concept of privacy by design that constitutes a middle road between what I call broad privacy by design and narrow privacy by design. The key feature of this approach is that it attempts to balance automated privacy protection and autonomously chosen privacy protection in a way that is context-sensitive. In personal health monitoring, this approach implies that in some contexts like medication assistance and monitoring of specific health parameters one single automatic option is legitimate, while in some other contexts, for example monitoring in which relatives are receivers of health-relevant information rather than health care professionals, a multi-choice approach stressing autonomy is warranted.

  8. Privacy-preserving heterogeneous health data sharing.

    Science.gov (United States)

    Mohammed, Noman; Jiang, Xiaoqian; Chen, Rui; Fung, Benjamin C M; Ohno-Machado, Lucila

    2013-05-01

    Privacy-preserving data publishing addresses the problem of disclosing sensitive data when mining for useful information. Among existing privacy models, ε-differential privacy provides one of the strongest privacy guarantees and makes no assumptions about an adversary's background knowledge. All existing solutions that ensure ε-differential privacy handle the problem of disclosing relational and set-valued data in a privacy-preserving manner separately. In this paper, we propose an algorithm that considers both relational and set-valued data in differentially private disclosure of healthcare data. The proposed approach makes a simple yet fundamental switch in differentially private algorithm design: instead of listing all possible records (ie, a contingency table) for noise addition, records are generalized before noise addition. The algorithm first generalizes the raw data in a probabilistic way, and then adds noise to guarantee ε-differential privacy. We showed that the disclosed data could be used effectively to build a decision tree induction classifier. Experimental results demonstrated that the proposed algorithm is scalable and performs better than existing solutions for classification analysis. The resulting utility may degrade when the output domain size is very large, making it potentially inappropriate to generate synthetic data for large health databases. Unlike existing techniques, the proposed algorithm allows the disclosure of health data containing both relational and set-valued data in a differentially private manner, and can retain essential information for discriminative analysis.

  9. New threats to health data privacy.

    Science.gov (United States)

    Li, Fengjun; Zou, Xukai; Liu, Peng; Chen, Jake Y

    2011-11-24

    Along with the rapid digitalization of health data (e.g. Electronic Health Records), there is an increasing concern on maintaining data privacy while garnering the benefits, especially when the data are required to be published for secondary use. Most of the current research on protecting health data privacy is centered around data de-identification and data anonymization, which removes the identifiable information from the published health data to prevent an adversary from reasoning about the privacy of the patients. However, published health data is not the only source that the adversaries can count on: with a large amount of information that people voluntarily share on the Web, sophisticated attacks that join disparate information pieces from multiple sources against health data privacy become practical. Limited efforts have been devoted to studying these attacks yet. We study how patient privacy could be compromised with the help of today's information technologies. In particular, we show that private healthcare information could be collected by aggregating and associating disparate pieces of information from multiple online data sources including online social networks, public records and search engine results. We demonstrate a real-world case study to show user identity and privacy are highly vulnerable to the attribution, inference and aggregation attacks. We also show that people are highly identifiable to adversaries even with inaccurate information pieces about the target, with real data analysis. We claim that too much information has been made available electronic and available online that people are very vulnerable without effective privacy protection.

  10. Kids Sell: Celebrity Kids’ Right to Privacy

    Directory of Open Access Journals (Sweden)

    Seong Choul Hong

    2016-04-01

    Full Text Available The lives of celebrities are often spotlighted in the media because of their newsworthiness; however, many celebrities argue that their right to privacy is often infringed upon. Concerns about celebrity privacy are not limited to the celebrities themselves and often expand to their children. As a result of their popularity, public interest has pushed paparazzi and journalists to pursue trivial and private details about the lives of both celebrities and their children. This paper investigates conflicting areas where the right to privacy and the right to know collide when dealing with the children of celebrities. In general, the courts have been unsympathetic to celebrity privacy claims, noting their newsworthiness and self-promoted characteristic. Unless the press violates news-gathering ethics or torts, the courts will often rule in favor of the media. However, the story becomes quite different when related to an infringement on the privacy of celebrities’ children. This paper argues that all children have a right to protect their privacy regardless of their parents’ social status. Children of celebrities should not be exempt to principles of privacy just because their parents are a celebrity. Furthermore, they should not be exposed by the media without the voluntary consent of their legal patrons. That is, the right of the media to publish and the newsworthiness of children of celebrities must be restrictedly acknowledged.

  11. 76 FR 66917 - Privacy Act of 1974; Notice To Amend an Existing System of Records

    Science.gov (United States)

    2011-10-28

    ...As required by the Privacy Act of 1974, 5 U.S.C. 552a, and the Office of Management and Budget (OMB) Circular A-130, the Department of Energy (DOE) is publishing notice of a proposed amendment to an existing system of records. DOE proposes to amend the system of records DOE-43 ``Personnel Security Files.'' This notice will create a new routine use to permit the disclosure of certain......

  12. Security and privacy threats in RFID traceability network

    Institute of Scientific and Technical Information of China (English)

    Chu; Chao-Hsien

    2008-01-01

    To address security and privacy issues in radio frequency identification (RFID) traceability networks, a multi-layer privacy and security framework is proposed, which includes four facets: a security model, a communication protocol, access permission and privacy preservation. According to the security requirements that are needed in an RFID system, a security model that incorporates security requirements that include privacy of tag data, privacy of ownership, and availability of tag identity is introduced. ...

  13. Privacy-Preserving Restricted Boltzmann Machine

    Science.gov (United States)

    Li, Yu

    2014-01-01

    With the arrival of the big data era, it is predicted that distributed data mining will lead to an information technology revolution. To motivate different institutes to collaborate with each other, the crucial issue is to eliminate their concerns regarding data privacy. In this paper, we propose a privacy-preserving method for training a restricted boltzmann machine (RBM). The RBM can be got without revealing their private data to each other when using our privacy-preserving method. We provide a correctness and efficiency analysis of our algorithms. The comparative experiment shows that the accuracy is very close to the original RBM model. PMID:25101139

  14. 5G Visions of User Privacy

    DEFF Research Database (Denmark)

    Sørensen, Lene Tolstrup; Khajuria, Samant; Skouby, Knud Erik

    2015-01-01

    Currently, the discussions are going on the elements and definition of 5G networks. One of the elements in this discussion is how to provide for user controlled privacy for securing users' digital interaction. The purpose of this paper is to present elements of user controlled privacy needed...... for the future 5G networks. The paper concludes that an ecosystem consisting of Trusted Third Party between the end user and the service providers as a distributed system could be integrated to secure the perspective of user controlled privacy for future systems...

  15. Privacy and Intercultural Communication——Causes Behind Different Privacy of the Chinese and the American

    Institute of Scientific and Technical Information of China (English)

    侯彩虹; 潘建虎

    2012-01-01

    Chinese culture is featured by its “togethemess”,collectivism,and its agricultural tradition;while American culture is featured by its “apartness”,individualism and its industrial tradition.The three dominant features determine the two cultures' different privacy rules.This paper puts the focus on the analysis of the causes behind the two different privacy.What's more,the globalization influences the privacy rules of the two cultures,people are more adaptive and have changed a lot.

  16. Privacy issues in mobile advertising

    DEFF Research Database (Denmark)

    Cleff, Evelyne Beatrix

    The emergence of the wired Internet and mobile telecommunication networks is creating new opportunities for advertisers to generate new revenue streams through mobile users. As consumer adoption of mobile technology continues to increase, it is only a question of time when mobile advertising...... becomes an important part of marketing strategies. The development of mobile advertising, however, will be dependent on acceptance and usability issues in order to ensure permission-based advertising. Growing concerns about the protection of the users' privacy have been raised since mobile advertising may...... become extremely intrusive practices in an intimate personal space. This article focuses on the evaluation of legal problems raised by this novel form of advertising. It is assumed that a technological design, which is in line with the legal framework, will ensure that the benefits of mobile advertising...

  17. Privacy issues in mobile advertising

    DEFF Research Database (Denmark)

    Cleff, Evelyne Beatrix

    2007-01-01

    The emergence of the wired Internet and mobile telecommunication networks is creating new opportunities for advertisers to generate new revenue streams through mobile users. As consumer adoption of mobile technology continues to increase, it is only a question of time when mobile advertising...... becomes an important part of marketing strategies. The development of mobile advertising, however, will be dependent on acceptance and usability issues in order to ensure permission-based advertising. Growing concerns about the protection of the users' privacy have been raised since mobile advertising may...... become extremely intrusive practices in an intimate personal space. This article focuses on the evaluation of legal problems raised by this novel form of advertising. It is assumed that a technological design, which is in line with the legal framework, will ensure that the benefits of mobile advertising...

  18. Privacy issues in mobile advertising

    DEFF Research Database (Denmark)

    Cleff, Evelyne Beatrix

    2007-01-01

    The emergence of the wired Internet and mobile telecommunication networks is creating new opportunities for advertisers to generate new revenue streams through mobile users. As consumer adoption of mobile technology continues to increase, it is only a question of time when mobile advertising...... become extremely intrusive practices in an intimate personal space. This article focuses on the evaluation of legal problems raised by this novel form of advertising. It is assumed that a technological design, which is in line with the legal framework, will ensure that the benefits of mobile advertising...... becomes an important part of marketing strategies. The development of mobile advertising, however, will be dependent on acceptance and usability issues in order to ensure permission-based advertising. Growing concerns about the protection of the users' privacy have been raised since mobile advertising may...

  19. Privacy issues in mobile advertising

    DEFF Research Database (Denmark)

    Cleff, Evelyne Beatrix

    The emergence of the wired Internet and mobile telecommunication networks is creating new opportunities for advertisers to generate new revenue streams through mobile users. As consumer adoption of mobile technology continues to increase, it is only a question of time when mobile advertising...... become extremely intrusive practices in an intimate personal space. This article focuses on the evaluation of legal problems raised by this novel form of advertising. It is assumed that a technological design, which is in line with the legal framework, will ensure that the benefits of mobile advertising...... becomes an important part of marketing strategies. The development of mobile advertising, however, will be dependent on acceptance and usability issues in order to ensure permission-based advertising. Growing concerns about the protection of the users' privacy have been raised since mobile advertising may...

  20. 78 FR 8538 - Privacy Act of 1974

    Science.gov (United States)

    2013-02-06

    ... information outside the agency, and how individual record subjects can exercise their rights under the Privacy... subject individual's name (woman's maiden name, if applicable), and SSN (furnishing the SSN is voluntary...

  1. An overview of human genetic privacy.

    Science.gov (United States)

    Shi, Xinghua; Wu, Xintao

    2017-01-01

    The study of human genomics is becoming a Big Data science, owing to recent biotechnological advances leading to availability of millions of personal genome sequences, which can be combined with biometric measurements from mobile apps and fitness trackers, and of human behavior data monitored from mobile devices and social media. With increasing research opportunities for integrative genomic studies through data sharing, genetic privacy emerges as a legitimate yet challenging concern that needs to be carefully addressed, not only for individuals but also for their families. In this paper, we present potential genetic privacy risks and relevant ethics and regulations for sharing and protecting human genomics data. We also describe the techniques for protecting human genetic privacy from three broad perspectives: controlled access, differential privacy, and cryptographic solutions. © 2016 New York Academy of Sciences.

  2. Cybersecurity and Privacy - bridging the gap

    DEFF Research Database (Denmark)

    he huge potential in future connected services has as a precondition that privacy and security needs are dealt with in order for new services to be accepted. This issue is increasingly on the agenda both at the company and at individual level. Cybersecurity and Privacy – bridging the gap addresses...... two very complex fields of the digital world, i.e., Cybersecurity and Privacy. These multifaceted, multidisciplinary and complex issues are usually understood and valued differently by different individuals, data holders and legal bodies. But a change in one field immediately affects the others....... Policies, frameworks, strategies, laws, tools, techniques, and technologies – all of these are tightly interwoven when it comes to security and privacy. This book is another attempt to bridge the gap between the industry and academia. The book addresses the views from academia and industry on the subject...

  3. SWIFT Privacy: Data Processor Becomes Data Controller

    Directory of Open Access Journals (Sweden)

    Edwin Jacobs

    2007-04-01

    Full Text Available Last month, SWIFT emphasised the urgent need for a solution to compliance with US Treasury subpoenas that provides legal certainty for the financial industry as well as for SWIFT. SWIFT will continue its activities to adhere to the Safe Harbor framework of the European data privacy legislation. Safe Harbor is a framework negotiated by the EU and US in 2000 to provide a way for companies in Europe, with operations in the US, to conform to EU data privacy regulations. This seems to conclude a complex privacy case, widely covered by the US and European media. A fundamental question in this case was who is a data controller and who is a mere data processor. Both the Belgian and the European privacy authorities considered SWIFT, jointly with the banks, as a data controller whereas SWIFT had considered itself as a mere data processor that processed financial data for banks. The difference between controller and processor has far reaching consequences.

  4. Security with Privacy - Opportunities and Challenges

    OpenAIRE

    Bertino, Elisa

    2014-01-01

    This paper summarizes opportunities and challenges concerning how we can achieve security while still ensuring privacy. It identifies research directions and includes a number of questions that have been debated by the panel.

  5. Data Security and Privacy in Cloud Computing

    OpenAIRE

    Yunchuan Sun; Junsheng Zhang; Yongping Xiong; Guangyu Zhu

    2014-01-01

    Data security has consistently been a major issue in information technology. In the cloud computing environment, it becomes particularly serious because the data is located in different places even in all the globe. Data security and privacy protection are the two main factors of user’s concerns about the cloud technology. Though many techniques on the topics in cloud computing have been investigated in both academics and industries, data security and privacy protection are becoming more impo...

  6. Privacy: The Small and Large of It

    Energy Technology Data Exchange (ETDEWEB)

    NUSBAUM,ANNA W.

    1999-10-22

    The topic of Privacy is complex, multi-faceted, and often emotionally laden. This paper will cover the following topics, in an effort to further understanding of federal regulations and activities, the balancing act that necessarily occurs in business, and what role a records manager can play. The topics are: Definitions; The Privacy Act; ''Private'' companies; Potential areas of concern; Expectations; Corporate responsibilities; Case studies; and Records Manager's role.

  7. Privacy Preserving Recommendation System Based on Groups

    OpenAIRE

    Shang, Shang; Hui, Yuk; Hui, Pan; Cuff, Paul; Kulkarni, Sanjeev

    2013-01-01

    Recommendation systems have received considerable attention in the recent decades. Yet with the development of information technology and social media, the risk in revealing private data to service providers has been a growing concern to more and more users. Trade-offs between quality and privacy in recommendation systems naturally arise. In this paper, we present a privacy preserving recommendation framework based on groups. The main idea is to use groups as a natural middleware to preserve ...

  8. Privacy policies for health social networking sites

    OpenAIRE

    2013-01-01

    Health social networking sites (HSNS), virtual communities where users connect with each other around common problems and share relevant health data, have been increasingly adopted by medical professionals and patients. The growing use of HSNS like Sermo and PatientsLikeMe has prompted public concerns about the risks that such online data-sharing platforms pose to the privacy and security of personal health data. This paper articulates a set of privacy risks introduced by social networking in...

  9. Privacy and legal issues in cloud computing

    CERN Document Server

    Weber, Rolf H

    2015-01-01

    Adopting a multi-disciplinary and comparative approach, this book focuses on emerging and innovative attempts to tackle privacy and legal issues in cloud computing, such as personal data privacy, security and intellectual property protection. Leading international academics and practitioners in the fields of law and computer science examine the specific legal implications of cloud computing pertaining to jurisdiction, biomedical practice and information ownership. This collection offers original and critical responses to the rising challenges posed by cloud computing.

  10. Location Privacy Issues in Wireless Sensor Networks

    Science.gov (United States)

    Kůr, Jiří; Stetsko, Andriy

    We discuss location privacy issues in wireless sensor networks. We consider sensor nodes with more responsible roles and the need to protect locations of such nodes. Available countermeasures against various types of traffic analysis attacks are examined and their problems are identified. We do not propose new traffic analysis resistance technique. Instead, we draw attention to blanks in current situation and identify several open questions, which should be answered in order to ensure location privacy of nodes.

  11. Game Theory Meets Network Security and Privacy

    OpenAIRE

    Manshaei, Mohammadhossein; Zhu, Quanyan; Alpcan, Tansu; Basar, Tamer; Hubaux, Jean-Pierre

    2012-01-01

    This survey provides a structured and comprehensive overview of the research contributions that analyze and solve security and privacy problems in computer networks by game-theoretic approaches. A selected set of works are presented to highlight the application of game theory in order to address different forms of security and privacy problems in computer networks and mobile applications. The presented works are classified into six main categories based on their topics: security of the physic...

  12. Preliminary Analysis of Google+'s Privacy

    OpenAIRE

    2011-01-01

    In this paper we provide a preliminary analysis of Google+ privacy. We identified that Google+ shares photo metadata with users who can access the photograph and discuss its potential impact on privacy. We also identified that Google+ encourages the provision of other names including maiden name, which may help criminals performing identity theft. We show that Facebook lists are a superset of Google+ circles, both functionally and logically, even though Google+ provides a better user interfac...

  13. Evaluating the privacy properties of telephone metadata

    OpenAIRE

    2016-01-01

    Privacy protections against government surveillance are often scoped to communications content and exclude communications metadata. In the United States, the National Security Agency operated a particularly controversial program, collecting bulk telephone metadata nationwide. We investigate the privacy properties of telephone metadata to assess the impact of policies that distinguish between content and metadata. We find that telephone metadata is densely interconnected, can trivially be reid...

  14. 77 FR 4798 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2012-01-31

    ..., Departmental Regulations. ] Purpose(s): To maintain a record of individuals and corporate entities who wish to... current military and political developments which may impact U.S. strategy and doctrine. Routine uses of...

  15. Trust and Privacy in Our Networked World

    Directory of Open Access Journals (Sweden)

    Herman T. Tavani

    2011-10-01

    Full Text Available Remarking on the relationship between the concepts of trust and privacy, Charles Fried (1990, p. 56 [1] writes: Trust is the attitude of expectation that another will behave according to the constraints of morality… There can be no trust where there is no possibility of error. More specifically, man cannot know that he is trusted unless he has the right to act without constant surveillance so that he knows he can betray the trust. Privacy confers that essential right… Without privacy and the possibility of error which it protects that aspect of his humanity is denied to him. The important relationship between trust and privacy that Fried describes is often overlooked in the contemporary literature on privacy, as well in the recent publications that focus on trust and trust-related topics. The six essays included in this special issue of Information, however, give us some additional insights into certain conceptual and practical connections involving the notions of trust and privacy. In this respect, the contributing authors expand upon the insight in Fried’s classic work on the interconnection between the two concepts.[...

  16. Privacy in Online Social Networking Sites

    Directory of Open Access Journals (Sweden)

    M.Ida Evones

    2015-11-01

    Full Text Available There are more than 192 act ive social networking websites. Bringing every kind of social group together in one place and letting them interact is really a big thing indeed .Huge amount of information process in the sites each day, end up making it vulnerable to attack. There is no systematic framework taking into account the importance of privacy. Increased privacy settings don’t always guarantee privacy when there is a loop hole in the applications. Lack of user education results is over sharing. Privacy settings to limit access to some data are available, but these settings are never the default. Only a tiny minority make use of these. Online social network does not provide any demarcation line between private and public information. The personal informat ion shared in online social networks can harm the user in often unexpected ways. Private data is available in plenty. The major privacy problems are due to complicated privacy model, implementation errors and economic pressure. Until recently, not much work was done in this area. The recent papers, which I have collected is a Testimony to state that lot of work needs to be done in this area.

  17. Social networking and privacy attitudes among

    Directory of Open Access Journals (Sweden)

    Kristen A. Carruth

    2014-11-01

    Full Text Available Daily use of social networking sites (SNS such as Facebook has become routine for millions of Internet users. Facebook is currently still the most popular social media site. Social networking has been rapidly adopted by societies around the world. In particular, social media like Facebook provide sites where users can personalize a profile with their information, pictures, and videos that can be shared with other users. This information can be used in ways that may violate users’ privacy with or without their knowledge. The hypotheses were that use of Facebook, user self-efficacy for social media and users’ general attitudes about privacy expectations are predictors of specific attitudes towards Facebook social media privacy, among a sample of 284, mostly white female, undergraduate college students in their twenties. Facebook self-efficacy and Facebook personal privacy violations were significant determinants of general Internet social media privacy concerns. However, Facebook use was not a significant factor for general Internet social media privacy concerns. Perceived benefits of Facebook generally appear to outweigh risks of disclosing personal information.

  18. Users or Students? Privacy in University MOOCS.

    Science.gov (United States)

    Jones, Meg Leta; Regner, Lucas

    2016-10-01

    Two terms, student privacy and Massive Open Online Courses, have received a significant amount of attention recently. Both represent interesting sites of change in entrenched structures, one educational and one legal. MOOCs represent something college courses have never been able to provide: universal access. Universities not wanting to miss the MOOC wave have started to build MOOC courses and integrate them into the university system in various ways. However, the design and scale of university MOOCs create tension for privacy laws intended to regulate information practices exercised by educational institutions. Are MOOCs part of the educational institutions these laws and policies aim to regulate? Are MOOC users students whose data are protected by aforementioned laws and policies? Many university researchers and faculty members are asked to participate as designers and instructors in MOOCs but may not know how to approach the issues proposed. While recent scholarship has addressed the disruptive nature of MOOCs, student privacy generally, and data privacy in the K-12 system, we provide an in-depth description and analysis of the MOOC phenomenon and the privacy laws and policies that guide and regulate educational institutions today. We offer privacy case studies of three major MOOC providers active in the market today to reveal inconsistencies among MOOC platform and the level and type of legal uncertainty surrounding them. Finally, we provide a list of organizational questions to pose internally to navigate the uncertainty presented to university MOOC teams.

  19. Privacy and Security in Multi-User Health Kiosks.

    Science.gov (United States)

    Takyi, Harold; Watzlaf, Valerie; Matthews, Judith Tabolt; Zhou, Leming; Dealmeida, Dilhari

    2017-01-01

    Enforcement of the Health Insurance Portability and Accountability Act (HIPAA) and the Health Information Technology for Economic and Clinical Health Act (HITECH) has gotten stricter and penalties have become more severe in response to a significant increase in computer-related information breaches in recent years. With health information said to be worth twice as much as other forms of information on the underground market, making preservation of privacy and security an integral part of health technology development, rather than an afterthought, not only mitigates risks but also helps to ensure HIPAA and HITECH compliance. This paper provides a guide, based on the Office for Civil Rights (OCR) audit protocol, for creating and maintaining an audit checklist for multi-user health kiosks. Implementation of selected audit elements for a multi-user health kiosk designed for use by community-residing older adults illustrates how the guide can be applied.

  20. THE OFFICE WORKSPACE

    African Journals Online (AJOL)

    The environments in which people work affect their performance. Persons ... Privacy, image of the workplace, and overall environmental comfort are ... ment may increase work efficiency as well as ..... est motivation to work on the average day.

  1. Office of Child Care

    Science.gov (United States)

    ... for Children & Families Office of Child Care By Office Administration for Native Americans (ANA) Administration on Children, ... Care Partnerships. Review the profiles. > What is the Office of Child Care (OCC)? The Office of Child ...

  2. Office of Child Care

    Science.gov (United States)

    ... for Children & Families Office of Child Care By Office Administration for Native Americans (ANA) Administration on Children, ... Learn more about this project > What is the Office of Child Care (OCC)? The Office of Child ...

  3. The Privacy Problem: Although School Librarians Seldom Discuss It, Students' Privacy Rights Are under Attack

    Science.gov (United States)

    Adams, Helen R.

    2011-01-01

    Every day in school libraries nationwide, students' privacy rights are under attack, but many principals, teachers, parents, and community members do not know much about these rights. Even though school librarians are among the strongest proponents of privacy, the subject is rarely discussed, probably because state and federal laws can be…

  4. The Preference for Privacy: In Search of the Social Locations of Privacy Orientations.

    Science.gov (United States)

    Gandy, Oscar H., Jr.

    A study was conducted to develop some understanding of how social experience might be related to public expectations of rights to privacy. A telephone questionnaire was developed which sought information about respondent knowledge, attitudes, and behavior regarding privacy and personal information. A national survey of adults over the age of 18…

  5. The Privacy Problem: Although School Librarians Seldom Discuss It, Students' Privacy Rights Are under Attack

    Science.gov (United States)

    Adams, Helen R.

    2011-01-01

    Every day in school libraries nationwide, students' privacy rights are under attack, but many principals, teachers, parents, and community members do not know much about these rights. Even though school librarians are among the strongest proponents of privacy, the subject is rarely discussed, probably because state and federal laws can be…

  6. Privacy by Design: An alternative to existing practice in safeguarding privacy

    NARCIS (Netherlands)

    Lieshout, M.J. van; Kool, L.; Schoonhoven, B. van; Jonge, M. de

    2011-01-01

    Purpose: The purpose of this paper is to develop/elaborate the concept Privacy by Design (PbD) and to explore the validity of the PbD framework. Design/methodology/approach: Attention for alternative concepts, such as PbD, which might offer surplus value in safeguarding privacy, is growing. Using

  7. Privacy and Security of Criminal History Information. An Analysis of Privacy Issues.

    Science.gov (United States)

    Trubow, George B.

    Policies and issues associated with the privacy and security of criminal history information are presented. The first chapter discusses general concepts regarding privacy and security of criminal justice information, including definitions of basic terms, considerations of interests requiring attention when developing policy, relevance of fair…

  8. Privacy Issues: Journalists Should Balance Need for Privacy with Need to Cover News.

    Science.gov (United States)

    Plopper, Bruce

    1998-01-01

    Notes that journalists have to balance their desire to print the news with personal rights to privacy. Argues that a working knowledge of ethics and law helps journalism students resolve such issues. Discusses ethical issues; legal aspects of privacy; and "training" administrators. Offers a list of questions to ask, six notable court cases and…

  9. Privacy-Enhanced and Multifunctional Health Data Aggregation under Differential Privacy Guarantees

    Science.gov (United States)

    Ren, Hao; Li, Hongwei; Liang, Xiaohui; He, Shibo; Dai, Yuanshun; Zhao, Lian

    2016-01-01

    With the rapid growth of the health data scale, the limited storage and computation resources of wireless body area sensor networks (WBANs) is becoming a barrier to their development. Therefore, outsourcing the encrypted health data to the cloud has been an appealing strategy. However, date aggregation will become difficult. Some recently-proposed schemes try to address this problem. However, there are still some functions and privacy issues that are not discussed. In this paper, we propose a privacy-enhanced and multifunctional health data aggregation scheme (PMHA-DP) under differential privacy. Specifically, we achieve a new aggregation function, weighted average (WAAS), and design a privacy-enhanced aggregation scheme (PAAS) to protect the aggregated data from cloud servers. Besides, a histogram aggregation scheme with high accuracy is proposed. PMHA-DP supports fault tolerance while preserving data privacy. The performance evaluation shows that the proposal leads to less communication overhead than the existing one. PMID:27626417

  10. Privacy-Enhanced and Multifunctional Health Data Aggregation under Differential Privacy Guarantees.

    Science.gov (United States)

    Ren, Hao; Li, Hongwei; Liang, Xiaohui; He, Shibo; Dai, Yuanshun; Zhao, Lian

    2016-09-10

    With the rapid growth of the health data scale, the limited storage and computation resources of wireless body area sensor networks (WBANs) is becoming a barrier to their development. Therefore, outsourcing the encrypted health data to the cloud has been an appealing strategy. However, date aggregation will become difficult. Some recently-proposed schemes try to address this problem. However, there are still some functions and privacy issues that are not discussed. In this paper, we propose a privacy-enhanced and multifunctional health data aggregation scheme (PMHA-DP) under differential privacy. Specifically, we achieve a new aggregation function, weighted average (WAAS), and design a privacy-enhanced aggregation scheme (PAAS) to protect the aggregated data from cloud servers. Besides, a histogram aggregation scheme with high accuracy is proposed. PMHA-DP supports fault tolerance while preserving data privacy. The performance evaluation shows that the proposal leads to less communication overhead than the existing one.

  11. Privacy and confidentiality in pragmatic clinical trials.

    Science.gov (United States)

    McGraw, Deven; Greene, Sarah M; Miner, Caroline S; Staman, Karen L; Welch, Mary Jane; Rubel, Alan

    2015-10-01

    With pragmatic clinical trials, an opportunity exists to answer important questions about the relative risks, burdens, and benefits of therapeutic interventions. However, concerns about protecting the privacy of this information are significant and must be balanced with the imperative to learn from the data gathered in routine clinical practice. Traditional privacy protections for research uses of identifiable information rely disproportionately on informed consent or authorizations, based on a presumption that this is necessary to fulfill ethical principles of respect for persons. But frequently, the ideal of informed consent is not realized in its implementation. Moreover, the principle of respect for persons—which encompasses their interests in health information privacy—can be honored through other mechanisms. Data anonymization also plays a role in protecting privacy but is not suitable for all research, particularly pragmatic clinical trials. In this article, we explore both the ethical foundation and regulatory framework intended to protect privacy in pragmatic clinical trials. We then review examples of novel approaches to respecting persons in research that may have the added benefit of honoring patient privacy considerations.

  12. Complete Bipartite Anonymity for Location Privacy

    Institute of Scientific and Technical Information of China (English)

    董恺; 顾涛; 陶先平; 吕建

    2014-01-01

    Users are vulnerable to privacy risks when providing their location information to location-based services (LBS). Existing work sacrifices the quality of LBS by degrading spatial and temporal accuracy for ensuring user privacy. In this paper, we propose a novel approach, Complete Bipartite Anonymity (CBA), aiming to achieve both user privacy and quality of service. The theoretical basis of CBA is that: if the bipartite graph of k nearby users’ paths can be transformed into a complete bipartite graph, then these users achieve k-anonymity since the set of “end points connecting to a specific start point in a graph”is an equivalence class. To achieve CBA, we design a Collaborative Path Confusion (CPC) protocol which enables nearby users to discover and authenticate each other without knowing their real identities or accurate locations, predict the encounter location using users’ moving pattern information, and generate fake traces obfuscating the real ones. We evaluate CBA using a real-world dataset, and compare its privacy performance with existing path confusion approach. The results show that CBA enhances location privacy by increasing the chance for a user confusing his/her path with others by 4 to 16 times in low user density areas. We also demonstrate that CBA is secure under the trace identification attack.

  13. Fuzzy Privacy Decision for Context-Aware Access Personal Information

    Institute of Scientific and Technical Information of China (English)

    ZHANG Qingsheng; QI Yong; ZHAO Jizhong; HOU Di; NIU Yujie

    2007-01-01

    A context-aware privacy protection framework was designed for context-aware services and privacy control methods about access personal information in pervasive environment. In the process of user's privacy decision, it can produce fuzzy privacy decision as the change of personal information sensitivity and personal information receiver trust. The uncertain privacy decision model was proposed about personal information disclosure based on the change of personal information receiver trust and personal information sensitivity. A fuzzy privacy decision information system was designed according to this model. Personal privacy control policies can be extracted from this information system by using rough set theory. It also solves the problem about learning privacy control policies of personal information disclosure.

  14. Differences in Privacy Between Chinese and Western Cultures

    Institute of Scientific and Technical Information of China (English)

    叶爽

    2015-01-01

    Privacy means different in both cultures.In modern information society,it deverses more attention from us.Privacy in oriental culture is quite distinctive from that in western culture. And the reasons are also not the same.

  15. Differences in Privacy Between Chinese and Western Cultures

    Institute of Scientific and Technical Information of China (English)

    叶爽

    2015-01-01

    Privacy means different in both cultures.In modern information society,it deverses more attention from us.Privacy in oriental culture is quite distinctive from that in western culture.And the reasons are also not the same.

  16. Will the new Australian health privacy law provide adequate protection?

    Science.gov (United States)

    Bomba, David; Hallit, George

    2002-01-01

    Amendments to the original Privacy Act (1988) come at a key point in time, as a national medical record system looms on the Australian horizon. Changes to The Privacy Act have the potential to define a level of information privacy prior to the implementation of such a system. We have therefore collected expert opinions on the ability of the Health Privacy Guidelines (enacted in December 2001 under The Privacy Act and hereafter more specifically known as Health Privacy Legislation) to ensure the privacy and security of patient information. We conclude that the legislation is flawed in its capacity to withstand an increasingly corporatised health sector. Deficiencies in consent requirements, together with feeble enforcement capabilities, mean The Legislation cannot effectively ensure that personally identifiable information will not end up in corporate third party hands. To significantly bolster the new legislation, we argue that it should be supplemented with explicit health data legislation and privacy auditing.

  17. Data Privacy in Electronic Commerce: Analysing Legal Provisions in Iran

    Directory of Open Access Journals (Sweden)

    Hassan KH

    2016-04-01

    Full Text Available This article discusses the legal protection of data privacy in electronic commerce in Iran. Currently, there is a gap in respect of data privacy protection in Iran as there is no specific privacy legislation in force. Consequently, e-consumers dealing in internet commerce are less protected. However there are rules and regulations in the laws in Iran such as the Islamic Republic (IR of Iran Constitution, Computer Crimes Act, Penal Code, and Civil Liability Act which relate to privacy in general, although not directly related to data privacy in e-commerce. The Electronic Commerce Law (ECL is the main legislation in Iran which contains some provisions on personal data privacy. This article discusses the relevant provisions in the ECL pertaining to data messages and privacy and interprets its various meanings to determine whether they are in line with well-established principles found in good data privacy protection measures.

  18. Big data privacy: The datafication of personal information

    DEFF Research Database (Denmark)

    Mai, Jens-Erik

    2016-01-01

    In the age of big data we need to think differently about privacy. We need to shift our thinking from definitions of privacy (characteristics of privacy) to models of privacy (how privacy works). Moreover, in addition to the existing models of privacy—the surveillance model and capture model......—we need to also consider a new model: the datafication model presented in this article, wherein new personal information is deduced by employing predictive analytics on already-gathered data. These three models of privacy supplement each other; they are not competing understandings of privacy....... This broadened approach will take our thinking beyond current preoccupation with whether or not individuals’ consent was secured for data collection to privacy issues arising from the development of new information on individuals' likely behavior through analysis of already collected data—this new information...

  19. 77 FR 31371 - Public Workshop: Privacy Compliance Workshop

    Science.gov (United States)

    2012-05-25

    ... compliance fundamentals, privacy and data security, and the privacy compliance life cycle. A learning lunch..., with both the training rooms and restrooms situated on the ground floor. Mary Ellen Callahan,...

  20. Social Networking and Online Privacy: Facebook Users' Perceptions

    National Research Council Canada - National Science Library

    Deirdre O'Brien; Ann M Torres

    2012-01-01

    This study investigates Facebook users' perceptions of online privacy, exploring their awareness of privacy issues and how their behaviour is influenced by this awareness, as well as the role of trust...

  1. PREDICT: Privacy and Security Enhancing Dynamic Information Monitoring

    Science.gov (United States)

    2015-08-03

    AFRL-OSR-VA-TR-2015-0217 PREDICT Privacy and Security Enhancing Dynamic Information Monitoring VAIDY S SUNDERAM EMORY UNIVERSITY Final Report 08/03...TITLE AND SUBTITLE PREDICT: Privacy and Security Enhancing Dynamic Information Monitoring 5a. CONTRACT NUMBER 5b. GRANT NUMBER FA9550-12-1-0240 5c...SUPPLEMENTARY NOTES 14. ABSTRACT The PREDICT project incorporates security and privacy in DDDAS systems to deliver provable guarantees of privacy and

  2. A Secure and Privacy-Preserving Targeted Ad-System

    Science.gov (United States)

    Androulaki, Elli; Bellovin, Steven M.

    Thanks to its low product-promotion cost and its efficiency, targeted online advertising has become very popular. Unfortunately, being profile-based, online advertising methods violate consumers' privacy, which has engendered resistance to the ads. However, protecting privacy through anonymity seems to encourage click-fraud. In this paper, we define consumer's privacy and present a privacy-preserving, targeted ad system (PPOAd) which is resistant towards click fraud. Our scheme is structured to provide financial incentives to all entities involved.

  3. The Privacy Attitude Questionnaire (PAQ): Initial Development and Validation

    OpenAIRE

    Chignell, Mark H; Quan-Haase, Anabel; Gwizdka, Jacek

    2003-01-01

    Privacy has been identified as a key issue in a variety of domains, including electronic commerce and public policy. While there are many discussions of privacy issues from a legal and policy perspective, there is little information on the structure of privacy as a psychometric construct. Our goal is to develop a method for measuring attitudes towards privacy that can guide the design and personalization of services. This paper reports on the development of an initial version of the PAQ. Four...

  4. Towards Self-Organized Location Privacy in Mobile Networks

    OpenAIRE

    Freudiger, Julien; Raya, Maxim; Hubaux, Jean-Pierre

    2008-01-01

    Pervasive communications bring along new privacy challenges, fueled by the capability of mobile devices to communicate with, and thus ``sniff on", each other directly. We design a new mechanism to achieve location privacy in these forthcoming mobile networks, whereby mobile nodes collect the pseudonyms of the nodes they encounter to generate their own privacy cloaks. Thus, privacy emerges from the mobile network and users gain control over the disclosure of their locations. We call this new p...

  5. Universally Optimal Privacy Mechanisms for Minimax Agents

    CERN Document Server

    Gupte, Mangesh

    2010-01-01

    A scheme that publishes aggregate information about sensitive data must resolve the trade-off between utility to information consumers and privacy of the database participants. Differential privacy is a well-established definition of privacy--this is a universal guarantee against all attackers, whatever their side-information or intent. In this paper, we present a universal treatment of utility based on the standard minimax rule from decision theory (in contrast to the utility model in, which is Bayesian). In our model, information consumers are minimax (risk-averse) agents, each possessing some side-information about the query, and each endowed with a loss-function which models their tolerance to inaccuracies. Further, information consumers are rational in the sense that they actively combine information from the mechanism with their side-information in a way that minimizes their loss. Under this assumption of rational behavior, we show that for every fixed count query, a certain geometric mechanism is unive...

  6. Privacy policies for health social networking sites.

    Science.gov (United States)

    Li, Jingquan

    2013-01-01

    Health social networking sites (HSNS), virtual communities where users connect with each other around common problems and share relevant health data, have been increasingly adopted by medical professionals and patients. The growing use of HSNS like Sermo and PatientsLikeMe has prompted public concerns about the risks that such online data-sharing platforms pose to the privacy and security of personal health data. This paper articulates a set of privacy risks introduced by social networking in health care and presents a practical example that demonstrates how the risks might be intrinsic to some HSNS. The aim of this study is to identify and sketch the policy implications of using HSNS and how policy makers and stakeholders should elaborate upon them to protect the privacy of online health data.

  7. Control use of data to protect privacy.

    Science.gov (United States)

    Landau, Susan

    2015-01-30

    Massive data collection by businesses and governments calls into question traditional methods for protecting privacy, underpinned by two core principles: (i) notice, that there should be no data collection system whose existence is secret, and (ii) consent, that data collected for one purpose not be used for another without user permission. But notice, designated as a fundamental privacy principle in a different era, makes little sense in situations where collection consists of lots and lots of small amounts of information, whereas consent is no longer realistic, given the complexity and number of decisions that must be made. Thus, efforts to protect privacy by controlling use of data are gaining more attention. I discuss relevant technology, policy, and law, as well as some examples that can illuminate the way. Copyright © 2015, American Association for the Advancement of Science.

  8. PRIVACY IN CLOUD COMPUTING: A SURVEY

    Directory of Open Access Journals (Sweden)

    Arockiam L

    2012-07-01

    Full Text Available Various cloud computing models are used to increase the profit of an organization. Cloud provides a convenient environment and more advantages to business organizations to run their business. But, it has some issues related to the privacy of data. User’s data are stored and maintained out of user’s premises. The failure of data protection causes many issues like data theft which affects the individual organization. The cloud users may be satisfied, if their data are protected properly from unauthorized access. This paper presents a survey on different privacy issues involved in the cloud service. It also provides some suggestions to the cloud users to select their suitable cloud services by knowing their privacy policies.

  9. Privacy Analysis in Mobile Social Networks

    DEFF Research Database (Denmark)

    Sapuppo, Antonio

    2012-01-01

    Nowadays, mobile social networks are capable of promoting social networking benefits during physical meetings, in order to leverage interpersonal affinities not only among acquaintances, but also between strangers. Due to their foundation on automated sharing of personal data in the physical...... factors: inquirer, purpose of disclosure, access & control of the disclosed information, location familiarity and current activity of the user. This research can serve as relevant input for the design of privacy management models in mobile social networks....... surroundings of the user, these networks are subject to crucial privacy threats. Privacy management systems must be capable of accurate selection of data disclosure according to human data sensitivity evaluation. Therefore, it is crucial to research and comprehend an individual's personal information...

  10. Non-Interactive Differential Privacy: a Survey

    CERN Document Server

    Leoni, David

    2012-01-01

    OpenData movement around the globe is demanding more access to information which lies locked in public or private servers. As recently reported by a McKinsey publication, this data has significant economic value, yet its release has potential to blatantly conflict with people privacy. Recent UK government inquires have shown concern from various parties about publication of anonymized databases, as there is concrete possibility of user identification by means of linkage attacks. Differential privacy stands out as a model that provides strong formal guarantees about the anonymity of the participants in a sanitized database. Only recent results demonstrated its applicability on real-life datasets, though. This paper covers such breakthrough discoveries, by reviewing applications of differential privacy for non-interactive publication of anonymized real-life datasets. Theory, utility and a data-aware comparison are discussed on a variety of principles and concrete applications.

  11. Patient privacy in the genomic era.

    Science.gov (United States)

    Raisaro, Jean Louis; Ayday, Erman; Hubaux, Jean-Pierre

    2014-05-07

    According to many scientists and clinicians, genomics is taking on a key role in the field of medicine. Impressive advances in genome sequencing have opened the way to a variety of revolutionary applications in modern healthcare. In particular, the increasing understanding of the human genome, and of its relation to diseases and response to treatments brings promise of improvements in better preventive and personalized medicine. However, this progress raises important privacy and ethical concerns that need to be addressed. Indeed, each genome is the ultimate identifier of its owner and, due to its nature, it contains highly personal and privacy-sensitive data. In this article, after summarizing recent advances in genomics, we discuss some important privacy issues associated with human genomic information and methods put in place to address them.

  12. Valuating Privacy with Option Pricing Theory

    Science.gov (United States)

    Berthold, Stefan; Böhme, Rainer

    One of the key challenges in the information society is responsible handling of personal data. An often-cited reason why people fail to make rational decisions regarding their own informational privacy is the high uncertainty about future consequences of information disclosures today. This chapter builds an analogy to financial options and draws on principles of option pricing to account for this uncertainty in the valuation of privacy. For this purpose, the development of a data subject's personal attributes over time and the development of the attribute distribution in the population are modeled as two stochastic processes, which fit into the Binomial Option Pricing Model (BOPM). Possible applications of such valuation methods to guide decision support in future privacy-enhancing technologies (PETs) are sketched.

  13. Effective Privacy-Preserving Online Route Planning

    DEFF Research Database (Denmark)

    Vicente, Carmen Ruiz; Assent, Ira; Jensen, Christian S.

    2011-01-01

    An online Route Planning Service (RPS) computes a route from one location to another. Current RPSs such as Google Maps require the use of precise locations. However, some users may not want to disclose their source and destination locations due to privacy concerns. An approach that supplies fake...... privacy. The solution re-uses a standard online RPS rather than replicate this functionality, and it needs no trusted third party. The solution is able to compute the exact results without leaking of the exact locations to the RPS or un-trusted parties. In addition, we provide heuristics that reduce...... the number of times that the RPS needs to be queried, and we also describe how the accuracy and privacy requirements can be relaxed to achieve better performance. An empirical study offers insight into key properties of the approach....

  14. 49 CFR 801.56 - Unwarranted invasion of personal privacy.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 7 2010-10-01 2010-10-01 false Unwarranted invasion of personal privacy. 801.56... Unwarranted invasion of personal privacy. Pursuant to 5 U.S.C. 552(b)(6), any personal, medical, or similar... a clearly unwarranted invasion of the person's personal privacy. ...

  15. Privacy Concerns: The Effects of the Latest FERPA Changes

    Science.gov (United States)

    Cossler, Christine

    2010-01-01

    Privacy, something once taken for granted, has again become top-of-mind for public school districts thanks to technology's increasing reach, as well as new changes to privacy laws governing student information. Recently, educators have had to face important changes to the Family Educational Rights and Privacy Act (FERPA), originally signed into…

  16. 22 CFR 212.22 - Protection of personal privacy.

    Science.gov (United States)

    2010-04-01

    ... 22 Foreign Relations 1 2010-04-01 2010-04-01 false Protection of personal privacy. 212.22 Section... Information for Public Inspection and Copying § 212.22 Protection of personal privacy. To the extent required to prevent a clearly unwarranted invasion of personal privacy, USAID may delete identifying details...

  17. Privacy Management Contracts And Economics, Using Service Level Agreements (Sla)

    NARCIS (Netherlands)

    L-F. Pau (Louis-François)

    2005-01-01

    textabstractRecognizing the importance of privacy management as a business process and a business support process, this paper proposes the use of service level agreements around privacy features, including qualitative and quantitative ones. It also casts privacy management into a business

  18. 76 FR 77472 - Privacy Act of 1974, as Amended

    Science.gov (United States)

    2011-12-13

    ... PROTECTION Privacy Act of 1974, as Amended AGENCY: Bureau of Consumer Financial Protection. ACTION: Notice of Proposed Privacy Act System of Records. SUMMARY: In accordance with the Privacy Act of 1974, as amended, the Bureau of Consumer Financial Protection, hereinto referred to as the Consumer Financial...

  19. 77 FR 35359 - Privacy Act of 1974, as Amended

    Science.gov (United States)

    2012-06-13

    ... PROTECTION Privacy Act of 1974, as Amended AGENCY: Bureau of Consumer Financial Protection. ACTION: Notice of proposed Privacy Act System of Records. SUMMARY: In accordance with the Privacy Act of 1974, as amended, the Bureau of Consumer Financial Protection, hereinto referred to as the Consumer Financial...

  20. Somali asylum seekers' perceptions of privacy in healthcare.

    Science.gov (United States)

    Eklöf, Niina; Abdulkarim, Hibag; Hupli, Maija; Leino-Kilpi, Helena

    2016-08-01

    Privacy has been recognized as a basic human right and a part of quality of care. However, little is known about the privacy of Somali asylum seekers in healthcare, even though they are one of the largest asylum seeker groups in the world. The aim of the study was to describe the content and importance of privacy and its importance in healthcare from the perspective of Somali asylum seekers. The data of this explorative qualitative study were collected by four focus group interviews with 18 Somali asylum seekers with the help of an interpreter. The data were analysed by inductive content analysis. Research permissions were obtained from the director of the reception centre and from the Department of Social Services. Ethical approval was obtained from the Ethics Committee of Turku University. The content of privacy includes visual privacy, physical privacy and informational privacy. All contents can be shared with healthcare professionals. The importance of privacy includes respect, dignity and freedom. Privacy is strongly connected to the collectivism of Somali culture and religion. Unlike the Western cultures, privacy is not important only for the individual; most of all, it is seen to support collectivism. Even though all contents of privacy can be shared with healthcare professionals, it is important to recognize the cultural aspect of privacy especially when using interpreters with Somali background. © The Author(s) 2015.