WorldWideScience

Sample records for fr07jy10p proposed confidentiality

  1. Confidentiality

    African Journals Online (AJOL)

    jacobien

    essential to the professional ethics of med- ical practitioners. As important ... guish four such values: autonomy, privacy, promise-keeping and utility ... value their privacy. Confidentiality obvi- ously fosters privacy by preventing the spread of privileged information that would violate privacy. Promise-keeping. Given that doctors ...

  2. 77 FR 69585 - Greenhouse Gas Reporting Program: Proposed Amendments and Confidentiality Determinations for...

    Science.gov (United States)

    2012-11-20

    ... AGENCY 40 CFR Part 98 Greenhouse Gas Reporting Program: Proposed Amendments and Confidentiality... rule titled ``Greenhouse Gas Reporting Program: Proposed Amendments and Confidentiality Determinations....gov . For technical questions, please see the ] Greenhouse Gas Reporting Program Web site http://www...

  3. 77 FR 1434 - Proposed Confidentiality Determinations for Data Elements Under the Mandatory Reporting of...

    Science.gov (United States)

    2012-01-10

    ... cause substantial harm to the business's competitive position. See 40 CFR 2.208(e)(1). Consistent with... competitive harm if released and therefore will be protected as confidential business information. EPA finds... advantage at the expense of the reporter's competitive advantage. Therefore...

  4. A proposed architecture and method of operation for improving the protection of privacy and confidentiality in disease registers

    Directory of Open Access Journals (Sweden)

    Churches Tim

    2003-01-01

    Full Text Available Abstract Background Disease registers aim to collect information about all instances of a disease or condition in a defined population of individuals. Traditionally methods of operating disease registers have required that notifications of cases be identified by unique identifiers such as social security number or national identification number, or by ensembles of non-unique identifying data items, such as name, sex and date of birth. However, growing concern over the privacy and confidentiality aspects of disease registers may hinder their future operation. Technical solutions to these legitimate concerns are needed. Discussion An alternative method of operation is proposed which involves splitting the personal identifiers from the medical details at the source of notification, and separately encrypting each part using asymmetrical (public key cryptographic methods. The identifying information is sent to a single Population Register, and the medical details to the relevant disease register. The Population Register uses probabilistic record linkage to assign a unique personal identification (UPI number to each person notified to it, although not necessarily everyone in the entire population. This UPI is shared only with a single trusted third party whose sole function is to translate between this UPI and separate series of personal identification numbers which are specific to each disease register. Summary The system proposed would significantly improve the protection of privacy and confidentiality, while still allowing the efficient linkage of records between disease registers, under the control and supervision of the trusted third party and independent ethics committees. The proposed architecture could accommodate genetic databases and tissue banks as well as a wide range of other health and social data collections. It is important that proposals such as this are subject to widespread scrutiny by information security experts, researchers and

  5. 14 CFR 414.13 - Confidentiality.

    Science.gov (United States)

    2010-01-01

    ... application that trade secrets or proprietary commercial or financial data be treated as confidential, and...,” “Proprietary Commercial Information,” “Trade Secret,” or “Confidential Treatment Requested.” Where this marking... proposed criteria for evaluating a safety approval is secret, as classified by the U.S. Government, or the...

  6. The Security Council’s 1267/1989 Targeted Sanctions Regime and the Use of Confidential Information: A Proposal for Decentralization of Review

    NARCIS (Netherlands)

    Hollenberg, S.

    2015-01-01

    From a due process perspective, the essential problem with the UN Security Council's targeted sanctions regime is the persistent lack of sufficient access to confidential material relied upon for the designation of targeted individuals. Despite the Security Council's efforts to amend the procedures

  7. Confidentiality in gamete donation

    Directory of Open Access Journals (Sweden)

    Neda Yavari

    2006-03-01

    Full Text Available During recent decades, the third person intervention in human artificial insemination has created new hopes for infertile couples. However these new progresses have propounded new ethical and legal concerns for families. One of them is confidentiality regarding gamete donor's identity, and its disclosure to the future child and others. Of course, negligence to this ethical issue would produce a big barrier for efficient health care services."nFor compiling this article we searched different websites including Pubmed, Ovid, Elsevier, Google and etc and the resulting articles were investigated carefully. "nIn this article, the history of gamete donation in different countries is reviewed initially and the mentioned reasons for anonymity with that of disclosure are compared. "nBecause of the different cultures and values of various societies, it is not justifiable to propose a unique method regarding this issue; however, there have to be clear rules in this regard, in each country. In order to facilitate this process, pretreatment counseling courses should be established to explain different aspects of this issue for the recipients.

  8. Computer Security: Printing confidentially

    CERN Multimedia

    Stefan Lueders, Computer Security Team

    2015-01-01

    Have you ever hesitated to print a confidential document using CERN printers? Or perhaps you have rushed quickly to the printer after hitting the “print” button in order to avoid someone else getting hold of and reading your document? These times are over now with the new printing infrastructure!   Indeed, many of us regularly print out confidential documents like our salary slips, MARS forms, tendering documents and drafts of preliminary papers. The upcoming CERN data protection policy will require all of us to respect the confidentiality of such documents and, as the word “confidential” implies, access to “confidential” or sensitive documents will be tightly controlled. What can we do about the public printers located in many buildings, floors and shared spaces - accessible not only to CERN staff and users but also to visitors and guests? Some printers are located in the vicinity of restaurants, cafeterias or close to paths taken b...

  9. Confidential benchmarking based on multiparty computation

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre; Damgård, Kasper Lyneborg; Nielsen, Kurt

    We report on the design and implementation of a system that uses multiparty computation to enable banks to benchmark their customers' confidential performance data against a large representative set of confidential performance data from a consultancy house. The system ensures that both the banks'...... state during the computation. We ran the system with two servers doing the secure computation using a database with information on about 2500 users. Answers arrived in about 25 seconds.......We report on the design and implementation of a system that uses multiparty computation to enable banks to benchmark their customers' confidential performance data against a large representative set of confidential performance data from a consultancy house. The system ensures that both the banks...... debt. We propose a model based on linear programming for doing the benchmarking and implement it using the SPDZ protocol by Damgård et al., which we modify using a new idea that allows clients to supply data and get output without having to participate in the preprocessing phase and without keeping...

  10. Ombuds’ corner: Confidentiality

    CERN Multimedia

    Vincent Vuillemin

    2011-01-01

    In this series, the Bulletin aims to explain the role of the Ombuds at CERN by presenting practical examples of misunderstandings that could have been resolved by the Ombuds if he had been contacted earlier. Please note that, in all the situations we present, the names are fictitious and used only to improve clarity.    Jane* came to the Ombuds to share her concerns about the actions of Mike*, one of her senior colleague supervisors, and insisted on the absolute confidentiality. The Ombuds promised to keep the information confidential following the terms of his mandate. During the discussion it appeared that the whole group was affected by the situation, spending a lot of time discussing how to resolve the problem instead of focusing on their main responsibilities. The risks for the Organization seemed very high and could possibly endanger the safety of the operations.  On one side, the Ombuds believed that it was essential to bring this matter to the attention of senior managem...

  11. Analysis of LYSA-calculus with explicit confidentiality annotations

    DEFF Research Database (Denmark)

    Gao, Han; Nielson, Hanne Riis

    2006-01-01

    Recently there has been an increased research interest in applying process calculi in the verification of cryptographic protocols due to their ability to formally model protocols. This work presents LYSA with explicit confidentiality annotations for indicating the expected behavior of target...... malicious activities performed by attackers as specified by the confidentiality annotations. The proposed analysis approach is fully automatic without the need of human intervention and has been applied successfully to a number of protocols....

  12. Confidentiality and Security in Medical Information Systems

    Directory of Open Access Journals (Sweden)

    Victor Papanaga

    2008-11-01

    Full Text Available Behind the technologies Medical System contains different types of information including patient information also. The patient data is classified as confidential and is one of the patient rights based on World Health Organization declaration. There are several compromises in solutions selection based on hardware and software requirements, performance, usability, portability. This article presents the investigation results and proposes the secured solution principles for the medical system that deal with patient data.

  13. Confidentiality and the adolescent patient

    African Journals Online (AJOL)

    the patient's explicit authorisation.1. Without assurances of confidentiality patients may be unwilling to give doctors the information they need to provide good care. This article examines the scope and limits of confidentiality in the case of ado- lescent patients. Suggestions that adolescents should be allowed to make medical ...

  14. Access control and confidentiality in radiology

    Science.gov (United States)

    Noumeir, Rita; Chafik, Adil

    2005-04-01

    A medical record contains a large amount of data about the patient such as height, weight and blood pressure. It also contains sensitive information such as fertility, abortion, psychiatric data, sexually transmitted diseases and diagnostic results. Access to this information must be carefully controlled. Information technology has greatly improved patient care. The recent extensive deployment of digital medical images made diagnostic images promptly available to healthcare decision makers, regardless of their geographic location. Medical images are digitally archived, transferred on telecommunication networks, and visualized on computer screens. However, with the widespread use of computing and communication technologies in healthcare, the issue of data security has become increasingly important. Most of the work until now has focused on the security of data communication to ensure its integrity, authentication, confidentiality and user accountability. The mechanisms that have been proposed to achieve the security of data communication are not specific to healthcare. Data integrity can be achieved with data signature. Data authentication can be achieved with certificate exchange. Data confidentiality can be achieved with encryption. User accountability can be achieved with audits. Although these mechanisms are essential to ensure data security during its transfer on the network, access control is needed in order to ensure data confidentiality and privacy within the information system application. In this paper, we present and discuss an access control mechanism that takes into account the notion of a care process. Radiology information is categorized and a model to enforce data privacy is proposed.

  15. Confidential Business Information under TSCA

    Science.gov (United States)

    This website informs businesses, policymakers, and the public about the confidential business information (CBI) provisions of § 14 of the Toxic Substances Control Act (TSCA), as amended by the Frank R. Lautenberg Chemical Safety for the 21st Century Act.

  16. Evaluation in a competitive utility environment: the threat of confidentiality

    International Nuclear Information System (INIS)

    Vine, Edward

    1997-01-01

    Utilities have become concerned that their competitors will desire access to energy-related data--including energy-efficiency data collected by utilities from their energy- efficiency programs--that they may regard as proprietary or confidential. In the future, disputes about confidentiality may focus more on costs and market information (as well as energy use and load data) than on energy-efficiency data per se. So far, the discussion has been limited to ratepayer-funded data. Consequently, many utilities are now requesting that the data (including evaluation data) they submit to their utility regulatory commissions remain confidential. Withholding utility information from the public is likely to harm the evaluation community that depends on the free flow of information for improving the practice of evaluation as well as for disseminating the lessons learned from particular program evaluations. Confidentiality will also have significant policy implications. In response to these concerns, in late 1995 and early 1996, we conducted a survey of state public utility commissions (PUCs) in the U.S. to assess: (1) the relative importance of the issue of confidential data in the regulatory arena; (2) the regulatory response to utility requests for confidentiality (e.g., formal policies, guidelines, rules and procedures, and decisions); and (3) the type of data filed as confidential with PUCS. We focus on the first two objectives of this study. In addition to our interviews, we reviewed selected state statutes, judicial and PUC decisions, rules and procedures, protective orders, and interim policy documents. Evaluators need to understand the context of confidentiality as well as the response of the regulatory commissions to confidentiality, because evaluators will need to adapt to a new environment where energy-related data and information may be harder to obtain and distribute. We propose that regulators conduct the following activities as soon as possible: 1. Assess

  17. Enhanced Obfuscation Technique for Data Confidentiality in Public Cloud Storage

    Directory of Open Access Journals (Sweden)

    Oli S. Arul

    2016-01-01

    Full Text Available With an advent of cloud computing, data storage has become a boon in information technology. At the same time, data storage in remote places have become important issues. Lot of techniques are available to ensure protection of data confidentiality. These techniques do not completely serve the purpose in protecting data. The Obfuscation techniques come to rescue for protecting data from malicious attacks. This paper proposes an obfuscation technique to encrypt the desired data type on the cloud providing more protection from unknown hackers. The experimental results show that the time taken for obfuscation is low and the confidentiality percentage is high when compared with existing techniques.

  18. IT Confidentiality Risk Assessment for an Architecture-Based Approach

    NARCIS (Netherlands)

    Morali, A.; Zambon, Emmanuele; Etalle, Sandro; Overbeek, Paul

    2008-01-01

    Information systems require awareness of risks and a good understanding of vulnerabilities and their exploitations. In this paper, we propose a novel approach for the systematic assessment and analysis of confidentiality risks caused by disclosure of operational and functional information. The

  19. 37 CFR 384.5 - Confidential information.

    Science.gov (United States)

    2010-07-01

    ... 37 Patents, Trademarks, and Copyrights 1 2010-07-01 2010-07-01 false Confidential information. 384... BUSINESS ESTABLISHMENT SERVICES § 384.5 Confidential information. (a) Definition. For purposes of this part, “Confidential Information” shall include the statements of account, any information contained therein, including...

  20. 37 CFR 261.5 - Confidential information.

    Science.gov (United States)

    2010-07-01

    ... 37 Patents, Trademarks, and Copyrights 1 2010-07-01 2010-07-01 false Confidential information. 261... THE MAKING OF EPHEMERAL REPRODUCTIONS § 261.5 Confidential information. (a) For purposes of this part, “Confidential Information” shall include the statements of account, any information contained therein, including...

  1. 7 CFR 983.65 - Confidential information.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 8 2010-01-01 2010-01-01 false Confidential information. 983.65 Section 983.65..., ARIZONA, AND NEW MEXICO Reports, Books and Records § 983.65 Confidential information. All reports and records furnished or submitted by handlers to the committee which include confidential data or information...

  2. 37 CFR 382.14 - Confidential information.

    Science.gov (United States)

    2010-07-01

    ... 37 Patents, Trademarks, and Copyrights 1 2010-07-01 2010-07-01 false Confidential information. 382... Confidential information. (a) Definition. For purposes of this subpart, “Confidential Information” shall include the statements of account and any information contained therein, including the amount of royalty...

  3. Confidentiality and integrity in crowdsourcing systems

    CERN Document Server

    Ranj Bar, Amin

    2014-01-01

    Confidentiality and Integrity in Crowdsourcing Systems focuses on identity, privacy, and security related issues in crowdsourcing systems and in particular the confidentiality and integrity of online data created via crowdsourcing. This book begins with an introduction to crowdsourcing and then covers the privacy and security challenges of Confidentiality. The book examines integrity in these systems and the management and control of crowdsourcing systems.

  4. Critical Care Nurses' Knowledge of Confidentiality Legislation.

    Science.gov (United States)

    Newman, Angela B; Kjervik, Diane K

    2016-05-01

    Health care legislation can be difficult to understand and apply in critical situations where patients may not be physically capable of autonomous control of confidential health information. Nurses are often the first to encounter confidential information about patients. To explore critical care nurses' knowledge of federal and North Carolina state legislation regarding confidentiality. This descriptive, qualitative study included 12 critical care nurses who were asked to describe their knowledge of federal confidentiality legislation and specific knowledge of North Carolina's confidentiality legislation. Critical care nurses were knowledgeable about federal confidentiality laws but demonstrated a need for further education about state-specific legislation. Nurses' application of confidentiality legislation demonstrates their knowledge of confidentiality legislation. To continue the trusting relationship that nurses have traditionally held with patients and patients' families, it is imperative for nurses to remain current about confidentiality legislation. Through education both before and after licensure, correct application of legislation can be achieved. Further research can aid in exploring the intersection between health care legislation and ethics. ©2016 American Association of Critical-Care Nurses.

  5. 7 CFR 930.73 - Confidential information.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 8 2010-01-01 2010-01-01 false Confidential information. 930.73 Section 930.73... Handling Reports and Records § 930.73 Confidential information. All reports and records furnished or submitted by handlers to the Board and its authorized agents which include data or information constituting...

  6. 37 CFR 262.5 - Confidential information.

    Science.gov (United States)

    2010-07-01

    ... 37 Patents, Trademarks, and Copyrights 1 2010-07-01 2010-07-01 false Confidential information. 262... information. (a) Definition. For purposes of this part, “Confidential Information” shall include the statements of account, any information contained therein, including the amount of royalty payments, and any...

  7. 7 CFR 28.960 - Confidential information.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 2 2010-01-01 2010-01-01 false Confidential information. 28.960 Section 28.960 Agriculture Regulations of the Department of Agriculture AGRICULTURAL MARKETING SERVICE (Standards... Tests § 28.960 Confidential information. No information concerning individual tests under the...

  8. 7 CFR 996.72 - Confidential information.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 8 2010-01-01 2010-01-01 false Confidential information. 996.72 Section 996.72... Confidential information. All reports and records furnished or submitted by handlers and importers to USDA which include data or information constituting a trade secret or disclosing a trade position, financial...

  9. 7 CFR 993.71 - Confidential information.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 8 2010-01-01 2010-01-01 false Confidential information. 993.71 Section 993.71... CALIFORNIA Order Regulating Handling Reports and Books and Other Records § 993.71 Confidential information... information constituting a trade secret or disclosing of the trade position, financial condition, or business...

  10. 7 CFR 929.65 - Confidential information.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 8 2010-01-01 2010-01-01 false Confidential information. 929.65 Section 929.65... Confidential information. All reports and records furnished or submitted by handlers to the committee and its authorized agents which include data or information constituting a trade secret or disclosing the trade...

  11. 37 CFR 380.5 - Confidential information.

    Science.gov (United States)

    2010-07-01

    ... 37 Patents, Trademarks, and Copyrights 1 2010-07-01 2010-07-01 false Confidential information. 380... information. (a) Definition. For purposes of this part, “Confidential Information” shall include the statements of account and any information contained therein, including the amount of royalty payments, and...

  12. 7 CFR 932.63 - Confidential information.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 8 2010-01-01 2010-01-01 false Confidential information. 932.63 Section 932.63... Regulating Handling Reports and Records § 932.63 Confidential information. All reports and information... any person, other than the Secretary upon request therefor, data, or information obtained or extracted...

  13. 7 CFR 989.75 - Confidential information.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 8 2010-01-01 2010-01-01 false Confidential information. 989.75 Section 989.75... GROWN IN CALIFORNIA Order Regulating Handling Reports and Records § 989.75 Confidential information. All... to no person, except the Secretary upon request therefor, data or information obtained or extracted...

  14. 7 CFR 982.70 - Confidential information.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 8 2010-01-01 2010-01-01 false Confidential information. 982.70 Section 982.70... WASHINGTON Order Regulating Handling Records and Reports § 982.70 Confidential information. All reports and records furnished or submitted by handlers to the Board, which include data or information constituting a...

  15. 7 CFR 900.309 - Confidential information.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 8 2010-01-01 2010-01-01 false Confidential information. 900.309 Section 900.309... to Agricultural Marketing Agreement Act of 1937, as Amended § 900.309 Confidential information. The... information furnished to, compiled by, or in the possession of the referendum agent, shall be regarded as...

  16. 49 CFR 537.12 - Confidential information.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 6 2010-10-01 2010-10-01 false Confidential information. 537.12 Section 537.12... ADMINISTRATION, DEPARTMENT OF TRANSPORTATION AUTOMOTIVE FUEL ECONOMY REPORTS § 537.12 Confidential information. (a) Information made available under § 537.11 for public inspection does not include information for...

  17. 7 CFR 900.407 - Confidential information.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 8 2010-01-01 2010-01-01 false Confidential information. 900.407 Section 900.407... to the Agricultural Marketing Agreement Act of 1937, as Amended § 900.407 Confidential information... voted or the manner in which any person voted) and all information furnished to, compiled by, or in...

  18. 7 CFR 900.352 - Confidential information.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 8 2010-01-01 2010-01-01 false Confidential information. 900.352 Section 900.352... Determining the Qualification of Cooperative Milk Marketing Associations § 900.352 Confidential information. The documents and other information submitted by an applicant association and otherwise obtained by...

  19. 42 CFR 2.13 - Confidentiality restrictions.

    Science.gov (United States)

    2010-10-01

    ... CONFIDENTIALITY OF ALCOHOL AND DRUG ABUSE PATIENT RECORDS General Provisions § 2.13 Confidentiality restrictions..., administrative, or legislative proceedings conducted by any Federal, State, or local authority. Any disclosure... place where only alcohol or drug abuse diagnosis, treatment, or referral is provided may be acknowledged...

  20. 10 CFR 430.75 - Confidentiality.

    Science.gov (United States)

    2010-01-01

    ... 10 Energy 3 2010-01-01 2010-01-01 false Confidentiality. 430.75 Section 430.75 Energy DEPARTMENT OF ENERGY ENERGY CONSERVATION ENERGY CONSERVATION PROGRAM FOR CONSUMER PRODUCTS Certification and... information or data which the person believes to be confidential and exempt law from public disclosure should...

  1. An efficient steganography method for hiding patient confidential information.

    Science.gov (United States)

    Al-Dmour, Hayat; Al-Ani, Ahmed; Nguyen, Hung

    2014-01-01

    This paper deals with the important issue of security and confidentiality of patient information when exchanging or storing medical images. Steganography has recently been viewed as an alternative or complement to cryptography, as existing cryptographic systems are not perfect due to their vulnerability to certain types of attack. We propose in this paper a new steganography algorithm for hiding patient confidential information. It utilizes Pixel Value Differencing (PVD) to identify contrast regions in the image and a Hamming code that embeds 3 secret message bits into 4 bits of the cover image. In order to preserve the content of the region of interest (ROI), the embedding is only performed using the Region of Non-Interest (RONI).

  2. 7 CFR 1425.5 - Confidentiality.

    Science.gov (United States)

    2010-01-01

    ... AGRICULTURE LOANS, PURCHASES, AND OTHER OPERATIONS COOPERATIVE MARKETING ASSOCIATIONS § 1425.5 Confidentiality. Information submitted to CCC related to trade secrets, financial or commercial operations, or the financial...

  3. 7 CFR 1220.624 - Confidentiality.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 10 2010-01-01 2010-01-01 false Confidentiality. 1220.624 Section 1220.624 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (MARKETING... Secretary may direct. ...

  4. 7 CFR 1210.352 - Confidential treatment.

    Science.gov (United States)

    2010-01-01

    ... PROMOTION PLAN Watermelon Research and Promotion Plan Reports, Books, and Records § 1210.352 Confidential... a suit or administrative hearing brought at the direction, or on the request, of the Secretary, or...

  5. 7 CFR 54.1033 - Confidential treatment.

    Science.gov (United States)

    2010-01-01

    ... Sanitary Design and Fabrication of Equipment Used in the Slaughter, Processing, and Packaging of Livestock and Poultry Products § 54.1033 Confidential treatment. Every design review specialist providing...

  6. Biosafety data as confidential business information.

    Science.gov (United States)

    Nielsen, Kaare M

    2013-01-01

    Removal of confidentiality claims on biosafety data is necessary to adhere to standard scientific procedures of quality assurance, to increase transparency, to minimize impacts of conflicts of interests, and ultimately to improve public confidence in GMOs.

  7. Confidentiality versus transparency in contemporary tax law

    OpenAIRE

    Anđelković, Mileva

    2017-01-01

    Dilemma with regard to defining limit between tax confidentiality and tax transparency is particulary expressed in contemporary tax law. International tax relations indicate that countries tend towards fostering tax transparency with the expect of better collection of taxes and fair distribution of tax burden. The right to secrecy and confidentiality of personal data, as one of the basic rights, guarantees taxpayers that data collected about them shall be used only for the purpose of taxation...

  8. Chaos-based encryption keys and neural key-store for cloud-hosted data confidentiality

    CSIR Research Space (South Africa)

    Mosola, NN

    2017-09-01

    Full Text Available towards gaining unauthorised access to cloud-bound or cloud-hosted data. This paper proposes a client-end encryption and key management system to curb attacks that targets compromising the confidentiality of cloud-hosted data. The proposed system uses...

  9. Navigating ethics of physician-patient confidentiality: a communication privacy management analysis.

    Science.gov (United States)

    Petronio, Sandra; Dicorcia, Mark J; Duggan, Ashley

    2012-01-01

    The ethics of physician-patient confidentiality is often fraught with contradictions. Privacy boundaries are not always clear, and patients can leave an interaction with their physicians feeling uncomfortable about the security of their private medical information. The best way to meet confidentiality and privacy management expectations that patients have may not be readily apparent. Without realizing it, a physician may communicate a patient's information in ways that are inconsistent with that person's perceptions of how his/her medical information should be treated. A proposed model is presented as a tool for physicians to better serve the privacy and confidentiality needs of their patients. This model depends on the communication privacy management (CPM) perspective that emerged from a 35-year research program investigating how people regulate and control information they consider private and confidential. A physician's use of this model enables the ability to establish a confidentiality pledge that can address issues in understanding the best way to communicate about privacy management with patients and more likely overcome potential negative outcomes.

  10. 12 CFR 978.6 - Access to confidential information.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 7 2010-01-01 2010-01-01 false Access to confidential information. 978.6... OPERATIONS AND AUTHORITIES BANK REQUESTS FOR INFORMATION § 978.6 Access to confidential information. Each Bank shall ensure that access to the confidential information stored at its facility is limited to...

  11. 22 CFR 130.15 - Confidential business information.

    Science.gov (United States)

    2010-04-01

    ..., confidential business information means commercial or financial information which by law is entitled to... 22 Foreign Relations 1 2010-04-01 2010-04-01 false Confidential business information. 130.15... CONTRIBUTIONS, FEES AND COMMISSIONS § 130.15 Confidential business information. (a) Any person who is required...

  12. CRAC: Confidentiality Risk Assessment and IT-Infrastructure Comparison

    NARCIS (Netherlands)

    Morali, A.; Zambon, Emmanuele; Etalle, Sandro; Wieringa, Roelf J.

    In this paper we present CRAC, an IT infrastructure-based method for assessing and comparing confidentiality risks of IT based collaborations. The method determines confidentiality risks by taking into account the effects of the leakage of confidential information (e.g. industrial secrets and user

  13. 29 CFR 2704.204 - Confidential financial information.

    Science.gov (United States)

    2010-07-01

    ... 29 Labor 9 2010-07-01 2010-07-01 false Confidential financial information. 2704.204 Section 2704... § 2704.204 Confidential financial information. Ordinarily, the net-worth and annual-receipts exhibits... administrative law judge in a sealed envelope labeled “Confidential Financial Information,” accompanied by a...

  14. 7 CFR 987.67 - Confidential information.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 8 2010-01-01 2010-01-01 false Confidential information. 987.67 Section 987.67... information. All data or other information constituting a trade secret or disclosing a trade position or... the Committee and information which would reveal the circumstances of a single handler shall be...

  15. 42 CFR 136.57 - Confidentiality.

    Science.gov (United States)

    2010-10-01

    ... 42 Public Health 1 2010-10-01 2010-10-01 false Confidentiality. 136.57 Section 136.57 Public Health PUBLIC HEALTH SERVICE, DEPARTMENT OF HEALTH AND HUMAN SERVICES INDIAN HEALTH SERVICE, DEPARTMENT OF HEALTH AND HUMAN SERVICES INDIAN HEALTH Abortions and Related Medical Services in Indian Health...

  16. 42 CFR 136a.57 - Confidentiality.

    Science.gov (United States)

    2010-10-01

    ... 42 Public Health 1 2010-10-01 2010-10-01 false Confidentiality. 136a.57 Section 136a.57 Public Health PUBLIC HEALTH SERVICE, DEPARTMENT OF HEALTH AND HUMAN SERVICES INDIAN HEALTH SERVICE, DEPARTMENT OF HEALTH AND HUMAN SERVICES INDIAN HEALTH Abortions and Related Medical Services in Indian Health...

  17. 42 CFR 50.310 - Confidentiality.

    Science.gov (United States)

    2010-10-01

    ... 42 Public Health 1 2010-10-01 2010-10-01 false Confidentiality. 50.310 Section 50.310 Public Health PUBLIC HEALTH SERVICE, DEPARTMENT OF HEALTH AND HUMAN SERVICES GRANTS POLICIES OF GENERAL APPLICABILITY Abortions and Related Medical Services in Federally Assisted Programs of the Public Health Service...

  18. 40 CFR 716.55 - Confidentiality claims.

    Science.gov (United States)

    2010-07-01

    ... for company name or address, financial statistics, and product codes used by a company. This... than company name or address, financial statistics, and product codes used by a company, which is... brief statement for the basis of the claim as well as a label such as “confidential,” “proprietary,” or...

  19. 7 CFR 1207.352 - Confidential treatment.

    Science.gov (United States)

    2010-01-01

    ... AGREEMENTS AND ORDERS; MISCELLANEOUS COMMODITIES), DEPARTMENT OF AGRICULTURE POTATO RESEARCH AND PROMOTION PLAN Potato Research and Promotion Plan Reports, Books, and Records § 1207.352 Confidential treatment... relevant shall be disclosed by them, and then only in a suit or administrative hearing brought at the...

  20. 7 CFR 1205.340 - Confidential treatment.

    Science.gov (United States)

    2010-01-01

    ... AGREEMENTS AND ORDERS; MISCELLANEOUS COMMODITIES), DEPARTMENT OF AGRICULTURE COTTON RESEARCH AND PROMOTION Cotton Research and Promotion Order Reports, Books, and Records § 1205.340 Confidential treatment. All... administrative hearing brought at the direction, or upon the request, of the Secretary of Agriculture, or to...

  1. 15 CFR 705.6 - Confidential information.

    Science.gov (United States)

    2010-01-01

    ... 15 Commerce and Foreign Trade 2 2010-01-01 2010-01-01 false Confidential information. 705.6 Section 705.6 Commerce and Foreign Trade Regulations Relating to Commerce and Foreign Trade (Continued) BUREAU OF INDUSTRY AND SECURITY, DEPARTMENT OF COMMERCE NATIONAL SECURITY INDUSTRIAL BASE REGULATIONS...

  2. Audit, Accountability and Confidential Enquiries into Maternal ...

    African Journals Online (AJOL)

    HP

    Improving the quality of care is essential for achieving reductions in maternal mortality. Audit is one of the methods which can be used to simultaneously assess as well as improve quality. This commentary discusses one type of audit. – confidential enquiries into maternal death. We believe that the enthusiasm for ...

  3. 7 CFR 1212.107 - Confidential information.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 10 2010-01-01 2010-01-01 false Confidential information. 1212.107 Section 1212.107 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (MARKETING... RESEARCH, PROMOTION, CONSUMER EDUCATION AND INDUSTRY INFORMATION ORDER Referendum Procedures § 1212.107...

  4. 8 CFR 1003.108 - Confidentiality.

    Science.gov (United States)

    2010-01-01

    ... preliminary inquiry. The EOIR disciplinary counsel, in the exercise of discretion, may disclose documents and... of Intent to Discipline. Resolutions, such as warning letters, admonitions, and agreements in lieu of discipline, reached prior to the issuance of a Notice of Intent to Discipline, will remain confidential...

  5. Confidentiality of Accounting Academics: Consequences of Nonconformity

    Science.gov (United States)

    Amponsah, Emmanuel B.; Boateng, Peter Agyekum; Onuoha, Luke N.

    2016-01-01

    This paper examined ways by which nonconformity to confidentiality among accounting academics could lead to increased-recruitment-and-legal-costs to their employing universities in Ghana that offered accounting degree programmes. With a cross-sectional design, data collected from 1,225 accountants analysed via Cronbach's alpha,…

  6. 42 CFR 93.108 - Confidentiality.

    Science.gov (United States)

    2010-10-01

    ... 42 Public Health 1 2010-10-01 2010-10-01 false Confidentiality. 93.108 Section 93.108 Public Health PUBLIC HEALTH SERVICE, DEPARTMENT OF HEALTH AND HUMAN SERVICES HEALTH ASSESSMENTS AND HEALTH EFFECTS STUDIES OF HAZARDOUS SUBSTANCES RELEASES AND FACILITIES PUBLIC HEALTH SERVICE POLICIES ON RESEARCH...

  7. 38 CFR 1.462 - Confidentiality restrictions.

    Science.gov (United States)

    2010-07-01

    ... Sickle Cell Anemia § 1.462 Confidentiality restrictions. (a) General. The patient records to which §§ 1..., infection with the HIV, or sickle cell anemia may be acknowledged only if the patient's written consent is... with the HIV, or sickle cell anemia. (2) Any answer to a request for a disclosure of patient records...

  8. Wavelet-Based ECG Steganography for Protecting Patient Confidential Information in Point-of-Care Systems.

    Science.gov (United States)

    Ibaida, Ayman; Khalil, Ibrahim

    2013-12-01

    With the growing number of aging population and a significant portion of that suffering from cardiac diseases, it is conceivable that remote ECG patient monitoring systems are expected to be widely used as point-of-care (PoC) applications in hospitals around the world. Therefore, huge amount of ECG signal collected by body sensor networks from remote patients at homes will be transmitted along with other physiological readings such as blood pressure, temperature, glucose level, etc., and diagnosed by those remote patient monitoring systems. It is utterly important that patient confidentiality is protected while data are being transmitted over the public network as well as when they are stored in hospital servers used by remote monitoring systems. In this paper, a wavelet-based steganography technique has been introduced which combines encryption and scrambling technique to protect patient confidential data. The proposed method allows ECG signal to hide its corresponding patient confidential data and other physiological information thus guaranteeing the integration between ECG and the rest. To evaluate the effectiveness of the proposed technique on the ECG signal, two distortion measurement metrics have been used: the percentage residual difference and the wavelet weighted PRD. It is found that the proposed technique provides high-security protection for patients data with low (less than 1%) distortion and ECG data remain diagnosable after watermarking (i.e., hiding patient confidential data) and as well as after watermarks (i.e., hidden data) are removed from the watermarked data.

  9. Using software agents to preserve individual health data confidentiality in micro-scale geographical analyses.

    Science.gov (United States)

    Kamel Boulos, Maged N; Cai, Qiang; Padget, Julian A; Rushton, Gerard

    2006-04-01

    Confidentiality constraints often preclude the release of disaggregate data about individuals, which limits the types and accuracy of the results of geographical health analyses that could be done. Access to individually geocoded (disaggregate) data often involves lengthy and cumbersome procedures through review boards and committees for approval (and sometimes is not possible). Moreover, current data confidentiality-preserving solutions compatible with fine-level spatial analyses either lack flexibility or yield less than optimal results (because of confidentiality-preserving changes they introduce to disaggregate data), or both. In this paper, we present a simulation case study to illustrate how some analyses cannot be (or will suffer if) done on aggregate data. We then quickly review some existing data confidentiality-preserving techniques, and move on to explore a solution based on software agents with the potential of providing flexible, controlled (software-only) access to unmodified confidential disaggregate data and returning only results that do not expose any person-identifiable details. The solution is thus appropriate for micro-scale geographical analyses where no person-identifiable details are required in the final results (i.e., only aggregate results are needed). Our proposed software agent technique also enables post-coordinated analyses to be designed and carried out on the confidential database(s), as needed, compared to a more conventional solution based on the Web Services model that would only support a rigid, pre-coordinated (pre-determined) and rather limited set of analyses. The paper also provides an exploratory discussion of mobility, security, and trust issues associated with software agents, as well as possible directions/solutions to address these issues, including the use of virtual organizations. Successful partnerships between stakeholder organizations, proper collaboration agreements, clear policies, and unambiguous interpretations

  10. Providing integrity, authenticity, and confidentiality for header and pixel data of DICOM images.

    Science.gov (United States)

    Al-Haj, Ali

    2015-04-01

    Exchange of medical images over public networks is subjected to different types of security threats. This has triggered persisting demands for secured telemedicine implementations that will provide confidentiality, authenticity, and integrity for the transmitted images. The medical image exchange standard (DICOM) offers mechanisms to provide confidentiality for the header data of the image but not for the pixel data. On the other hand, it offers mechanisms to achieve authenticity and integrity for the pixel data but not for the header data. In this paper, we propose a crypto-based algorithm that provides confidentially, authenticity, and integrity for the pixel data, as well as for the header data. This is achieved by applying strong cryptographic primitives utilizing internally generated security data, such as encryption keys, hashing codes, and digital signatures. The security data are generated internally from the header and the pixel data, thus a strong bond is established between the DICOM data and the corresponding security data. The proposed algorithm has been evaluated extensively using DICOM images of different modalities. Simulation experiments show that confidentiality, authenticity, and integrity have been achieved as reflected by the results we obtained for normalized correlation, entropy, PSNR, histogram analysis, and robustness.

  11. Confidentiality in crisis counseling: a philosophical perspective.

    Science.gov (United States)

    Mayo, D J

    1984-01-01

    Crisis interventionists frequently confront a moral dilemma when violating client trust seems necessary if self-destructive behavior is to be prevented. Two fundamental moral values conflict in such cases: concern for client welfare and respect for client rights and autonomy. Each of these values is grounded in one of two important Western ethical traditions: Utilitarianism and Kantian Formalism, respectively. Following critical examination of each of these theories, attention is given to a series of hypothetical cases involving the confidentiality dilemma.

  12. A Policy-Based Framework for Preserving Confidentiality in BYOD Environments: A Review of Information Security Perspectives

    Directory of Open Access Journals (Sweden)

    Chalee Vorakulpipat

    2017-01-01

    Full Text Available Today, many organizations allow their employees to bring their own smartphones or tablets to work and to access the corporate network, which is known as a bring your own device (BYOD. However, many such companies overlook potential security risks concerning privacy and confidentiality. This paper provides a review of existing literature concerning the preservation of privacy and confidentiality, with a focus on recent trends in the use of BYOD. This review spans a large spectrum of information security research, ranging from management (risk and policy to technical aspects of privacy and confidentiality in BYOD. Furthermore, this study proposes a policy-based framework for preserving data confidentiality in BYOD. This framework considers a number of aspects of information security and corresponding techniques, such as policy, location privacy, centralized control, cryptography, and operating system level security, which have been omitted in previous studies. The main contribution is to investigate recent trends concerning the preservation of confidentiality in BYOD from the perspective of information security and to analyze the critical and comprehensive factors needed to strengthen data privacy in BYOD. Finally, this paper provides a foundation for developing the concept of preserving confidentiality in BYOD and describes the key technical and organizational challenges faced by BYOD-friendly organizations.

  13. Patient confidentiality, ethics and licensing in telemedicine.

    Science.gov (United States)

    Yadav, H; Lin, W Y

    2001-01-01

    Telemedicine is fast becoming popular in many countries in the world. It has several advantages such as being cost saving and providing better access to health care in the remote areas in many parts of the world. However, it has some disadvantages as well. One of the major problems is the problem of patients' rights and confidentiality in the use of telemedicine. There are no standard guidelines and procedures in the practice of telemedicine as yet. Both the patient and the physician are unsure of the standard of practice and how to maintain confidentiality. The patient is uncertain as to how to protect her/his rights in the use of telemedicine. The issue of litigation is also unclear as to where the physician is practicing when he/she uses telemedicine. Is she/he practicing in the country where the patient is or is the physician practicing in the country of her/his origin? These issues need to be addressed urgently so that telemedicine will have standards of ethical practice and the patient's rights and confidentiality will be protected.

  14. Practical State Machine Replication with Confidentiality

    Energy Technology Data Exchange (ETDEWEB)

    Duan, Sisi [ORNL; Zhang, Haibin [University of North Carolina, Chapel Hill

    2016-01-01

    We study how to enable arbitrary randomized algorithms in Byzantine fault-tolerant (BFT) settings. We formalize a randomized BFT protocol and provide a simple and efficient construction that can be built on any existing BFT protocols while adding practically no overhead. We go one step further to revisit a confidential BFT protocol (Yin et al., SOSP '03). We show that their scheme is potentially susceptible to safety and confidentiality attacks. We then present a new protocol that is secure in the stronger model we formalize, by extending the idea of a randomized BFT protocol. Our protocol uses only efficient symmetric cryptography, while Yin et al.'s uses costly threshold signatures. We implemented and evaluated our protocols on microbenchmarks and real-world use cases. We show that our randomized BFT protocol is as efficient as conventional BFT protocols, and our confidential BFT protocol is two to three orders of magnitude faster than Yin et al.'s, which is less secure than ours.

  15. Patient confidentiality and mental health. Part 2: dilemmas of disclosure.

    Science.gov (United States)

    McHale, Jean

    The article is the second in the series examining some of the issues relating to patient confidentiality and mental health. It explores the situations in which confidential patient information may be disclosed by nurses. First, disclosure with consent is considered. Second, disclosure where it is in 'the public interest' is explored. Third, those situations in which disclosure may be required by statute are discussed. The article concludes by suggesting that the whole area of confidentiality is ripe for reconsideration and perhaps statutory reform.

  16. 40 CFR 94.517 - Treatment of confidential information.

    Science.gov (United States)

    2010-07-01

    ... PROGRAMS (CONTINUED) CONTROL OF EMISSIONS FROM MARINE COMPRESSION-IGNITION ENGINES Manufacturer Production Line Testing Programs § 94.517 Treatment of confidential information. Except for information required...

  17. 13 CFR 120.1060 - Confidentiality of Reports, Risk Ratings and related Confidential Information.

    Science.gov (United States)

    2010-01-01

    ... SMALL BUSINESS ADMINISTRATION BUSINESS LOANS Risk-Based Lender Oversight Supervision § 120.1060... Lender, Intermediary, or NTAP for its confidential use only. The Reports, Risk Ratings, and related... written permission. An SBA Lender, Intermediary, and NTAP may use the Report, Risk Rating, and...

  18. Controls Mitigating the Risk of Confidential Information Disclosure by Facebook: Essential Concern in Auditing Information Security

    Directory of Open Access Journals (Sweden)

    Ivan Ognyanov Kuyumdzhiev

    2014-08-01

    Full Text Available Facebook allows people to easily share information about themselves which in some cases could be classified as confidential or sensitive in the organisation they’re working for. In this paper we discuss the type of data stored by Facebook and the scope of the terms “confidential” and “sensitive data”. The intersection of these areas shows that there is high possibility for confidential data disclosure in organisations with none or ineffective security policy. This paper proposes a strategy for managing the risks of information leakage. We define five levels of controls against posting non-public data on Facebook - security policy, applications installed on employees’ workstations, specific router software or firmware, software in the cloud, Facebook itself. Advantages and disadvantages of every level are evaluated. As a result we propose developing of new control integrated in the social media.

  19. 12 CFR 261.20 - Confidential supervisory information made available to supervised financial institutions and...

    Science.gov (United States)

    2010-01-01

    ... Certain Circumstances § 261.20 Confidential supervisory information made available to supervised financial... information to supervised financial institutions. Confidential supervisory information concerning a supervised...) Disclosure of confidential supervisory information by supervised financial institution—(1) Parent bank...

  20. Confidential Declaration of Family Situation (CDFS)

    CERN Multimedia

    Human Resources Department

    2005-01-01

    The Confidential Declaration of Family Situation (CDFS) becomes a new computerized EDH form from October 2005 In accordance with Article R IV 1.17 of the Staff Regulations, Staff Members and Fellows, married or separated, must notify any changes in their spouse's income or health insurance cover in writing to CERN, within 30 calendar days of the change. This is necessary for the Organization to determine if a supplementary contribution is payable to the CERN Health Insurance Scheme (CHIS) for the spouse's coverage and, if so, the amount. Until now a paper form called « Confidential Declaration of Family Situation » (CDFS) was used for that purpose.  From early October 2005 the CDFS will be computerized for the whole Organization. Henceforth, any changes in a spouse's income or health insurance cover must be notified using EDH (Electronic Document Handling). Additionally, annual updates of the declaration will be required and will be requested by automatic e-mail. Early October an email will be...

  1. Confidential Declaration of Family Situation (CDFS)

    CERN Multimedia

    Human Resources Department

    2005-01-01

    The Confidential Declaration of Family Situation (CDFS) becomes a new computerized EDH form from October 2005 In accordance with Article R IV 1.17 of the Staff Regulations, Staff Members and Fellows, married or separated, must notify any changes in their spouse's income or health insurance cover in writing to CERN, within 30 calendar days of the change. This is necessary for the Organization to determine if a supplementary contribution is payable to the CERN Health Insurance Scheme (CHIS) for the spouse's coverage and, if so, the amount. Until now a paper form called « Confidential Declaration of Family Situation » (CDFS) was used for that purpose.  From early October 2005 the CDFS will be computerized for the whole Organization. Henceforth, any changes in a spouse's income or health insurance cover must be notified using EDH (Electronic Document Handling). Additionally, annual updates of the declaration will be required and will be requested by automatic e-mail. Early October an email will be sent to...

  2. Privacy, confidentiality and automated health information systems.

    Science.gov (United States)

    Vuori, H

    1977-12-01

    Professor Vuori's paper, first presented at the fourth Medico-legal Conference in Prague in the spring of this year, deals with the problem of the maintenance of confidentiality in computerized health records. Although more and more information is required, the hardware of the computer systems is so sophisticated that it would be very expensive indeed to 'break in' and steal from a modern data bank. Those concerned with programming computers are becoming more aware of their responsibilities concerning confidentiality and privacy, to the extent that a legal code of ethics for programmers is being formulated. They are also aware that the most sensitive of all relationships--the doctor-patient relationship--could be in danger if they failed to maintain high standards of integrity. An area of danger is where administrative boundaries between systems must be crossed--say between those of health and employment. Protection of privacy must be ensured by releasing full information about the type of data being stored, and by maintaining democratic control over the establishment of information systems.

  3. Ombuds’ corner: Open door and confidentiality

    CERN Multimedia

    Vincent Vuillemin

    2013-01-01

    For the Open Days, CERN will be transparent for all visitors. It's also the occasion to remember that the Ombuds' door is fully open every day of the year for all persons working for or on behalf of CERN.   The door is open, but as soon as it's closed for a discussion, the office becomes a place where total confidentiality is preserved. This may appear as a contradiction, no? The Ombuds is available to help everyone in all circumstances, but his clause of confidentiality prevents him from acting without the consent of his “visitors”. How can he possibly resolve the in-house conflicts in groups, or units, if all the parties do not voluntarily participate in its resolution? The answer is clear: the job of the Ombuds is to help the parties resolve their conflict by themselves. He will provide a few rules of communication, a process of mutual respect, suggest some possibilities that the parties may want to follow, and mediate the dispute so that people...

  4. 50 CFR 600.130 - Protection of confidentiality of statistics.

    Science.gov (United States)

    2010-10-01

    ... statistics. 600.130 Section 600.130 Wildlife and Fisheries FISHERY CONSERVATION AND MANAGEMENT, NATIONAL... Fishery Management Councils § 600.130 Protection of confidentiality of statistics. Each Council must establish appropriate procedures for ensuring the confidentiality of the statistics that may be submitted to...

  5. the internet, virtual communities and threats to confidentiality

    African Journals Online (AJOL)

    privacy and confidentiality in this use of the Internet, and to suggest ways in ... especially privacy and confidentiality on the one hand and .... Wired Digital Ine. We pledge that Wired Digital Ine. will not release your personal data to anyone else without your consent. - period. You may change the status of whether you wish to.

  6. 75 FR 65013 - Access in Litigation to Confidential Business Information

    Science.gov (United States)

    2010-10-21

    ... AGENCY Access in Litigation to Confidential Business Information AGENCY: Environmental Protection Agency (``EPA''). ACTION: Notice of Transfer of Information Claimed as Confidential Business Information to the... New York (the ``Litigation''), information which has been submitted to EPA by its contractors that is...

  7. Client confidentiality: Perspectives of students in a healthcare ...

    African Journals Online (AJOL)

    This moral dilemma is difficult for students to circumvent and therefore this paper presents healthcare students' perspectives of confidentiality. Methods. We aimed to explore healthcare students' views and experiences of confidentiality as an ethical principle by adopting a qualitative explorative approach. Purposeful ...

  8. 29 CFR 4010.13 - Confidentiality of information submitted.

    Science.gov (United States)

    2010-07-01

    ... REPORTING AND DISCLOSURE REQUIREMENTS ANNUAL FINANCIAL AND ACTUARIAL INFORMATION REPORTING § 4010.13 Confidentiality of information submitted. In accordance with § 4901.21(a)(3) of this chapter and ERISA section... 29 Labor 9 2010-07-01 2010-07-01 false Confidentiality of information submitted. 4010.13 Section...

  9. 5 CFR 3902.104 - Confidentiality of employees' statements.

    Science.gov (United States)

    2010-01-01

    ... Confidentiality of employees' statements. Each supplemental statement of employment and financial interests shall... carry out the purpose of this part or as otherwise required by law. Information from these statements... 5 Administrative Personnel 3 2010-01-01 2010-01-01 false Confidentiality of employees' statements...

  10. 19 CFR 210.5 - Confidential business information.

    Science.gov (United States)

    2010-04-01

    ... administrative law judge shall decide whether information in a document addressed to the administrative law judge... confidential treatment. The administrative law judge shall also decide, with respect to all orders, initial... law judge, or another section of this part states otherwise, confidential business information shall...

  11. 7 CFR 1210.532 - Confidential books, records, and reports.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 10 2010-01-01 2010-01-01 false Confidential books, records, and reports. 1210.532... WATERMELON RESEARCH AND PROMOTION PLAN Rules and Regulations Records § 1210.532 Confidential books, records, and reports. All information obtained from the books, records, and reports of handlers and importers...

  12. 7 CFR 1205.540 - Confidential books, records, and reports.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 10 2010-01-01 2010-01-01 false Confidential books, records, and reports. 1205.540 Section 1205.540 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL... Confidential books, records, and reports. All information obtained from the books, records, and reports of...

  13. 38 CFR 17.501 - Confidential and privileged documents.

    Science.gov (United States)

    2010-07-01

    ... AFFAIRS MEDICAL Confidentiality of Healthcare Quality Assurance Review Records § 17.501 Confidential and... healthcare quality assurance reviews with examples are: (1) Monitoring and evaluation reviews conducted by a... and the regulations in §§ 17.500 through 17.511; and (4) Contracted external reviews of care...

  14. 20 CFR 726.113 - Disclosure of confidential information.

    Science.gov (United States)

    2010-04-01

    ... MINE OPERATOR'S INSURANCE Authorization of Self-Insurers § 726.113 Disclosure of confidential... 20 Employees' Benefits 3 2010-04-01 2010-04-01 false Disclosure of confidential information. 726... authorized self-insurer or applicant for the authorization of self-insurance obtained by the Office shall be...

  15. Ethics in health care: confidentiality and information technologies

    African Journals Online (AJOL)

    Ethics CPD Supplement: Ethics in health care: confidentiality and information technologies. S3. Vol 56 No 1 ... Before the advent of the new communication and information technologies (NCITs), patient care was sometimes delayed because of the lengthy time it ... confidentiality. Instead of receiving vintage sports car news,.

  16. 37 CFR 404.14 - Confidentiality of information.

    Science.gov (United States)

    2010-07-01

    ... 37 Patents, Trademarks, and Copyrights 1 2010-07-01 2010-07-01 false Confidentiality of information. 404.14 Section 404.14 Patents, Trademarks, and Copyrights ASSISTANT SECRETARY FOR TECHNOLOGY POLICY, DEPARTMENT OF COMMERCE LICENSING OF GOVERNMENT OWNED INVENTIONS § 404.14 Confidentiality of...

  17. 48 CFR 1415.207-70 - Department of the Interior proposal and information handling procedures.

    Science.gov (United States)

    2010-10-01

    ... used in addition to those prescribed in FAR 15.207, for the use and disclosure of trade secret...) Marking of solicited proposals. A solicited proposal may contain trade secrets or confidential commercial... Government of trade secrets and confidential commercial or financial information contained in a proposal...

  18. Genetic secrets: Protecting privacy and confidentiality in the genetic era

    Energy Technology Data Exchange (ETDEWEB)

    Rothstein, M.A. [ed.

    1998-07-01

    Few developments are likely to affect human beings more profoundly in the long run than the discoveries resulting from advances in modern genetics. Although the developments in genetic technology promise to provide many additional benefits, their application to genetic screening poses ethical, social, and legal questions, many of which are rooted in issues of privacy and confidentiality. The ethical, practical, and legal ramifications of these and related questions are explored in depth. The broad range of topics includes: the privacy and confidentiality of genetic information; the challenges to privacy and confidentiality that may be projected to result from the emerging genetic technologies; the role of informed consent in protecting the confidentiality of genetic information in the clinical setting; the potential uses of genetic information by third parties; the implications of changes in the health care delivery system for privacy and confidentiality; relevant national and international developments in public policies, professional standards, and laws; recommendations; and the identification of research needs.

  19. Confidentiality Protection of Digital Health Records in Cloud Computing.

    Science.gov (United States)

    Chen, Shyh-Wei; Chiang, Dai Lun; Liu, Chia-Hui; Chen, Tzer-Shyong; Lai, Feipei; Wang, Huihui; Wei, Wei

    2016-05-01

    Electronic medical records containing confidential information were uploaded to the cloud. The cloud allows medical crews to access and manage the data and integration of medical records easily. This data system provides relevant information to medical personnel and facilitates and improve electronic medical record management and data transmission. A structure of cloud-based and patient-centered personal health record (PHR) is proposed in this study. This technique helps patients to manage their health information, such as appointment date with doctor, health reports, and a completed understanding of their own health conditions. It will create patients a positive attitudes to maintain the health. The patients make decision on their own for those whom has access to their records over a specific span of time specified by the patients. Storing data in the cloud environment can reduce costs and enhance the share of information, but the potential threat of information security should be taken into consideration. This study is proposing the cloud-based secure transmission mechanism is suitable for multiple users (like nurse aides, patients, and family members).

  20. 5 CFR 2634.901 - Policies of confidential financial disclosure reporting.

    Science.gov (United States)

    2010-01-01

    ... Confidential Financial Disclosure Reports § 2634.901 Policies of confidential financial disclosure reporting. (a) The confidential financial reporting system set forth in this subpart is designed to complement... confidential basis, additional information from persons who are already subject to the public reporting...

  1. Reconfiguring waveguide-gratings-based M-signature codecs to enhance OCDMA network confidentiality

    Science.gov (United States)

    Huang, Jen-Fa; Chen, Kai-Sheng; Lin, Ying-Chen; Li, Chung-Yu

    2014-02-01

    A reconfiguration scheme based on composite signature codes over waveguide-gratings-based optical code-division multiple-access (OCDMA) network coder/decoders (codecs) is proposed in the paper. By using central control node to monitor network traffic condition and reconfigure the composite signature codes made up of maximal-length sequence (M-sequence) component codes and random changing the signature codes assigned for each user to improve the confidentiality performance in an OCDMA system. The proposed scheme is analyzed with some practical eavesdroppers' attacks.

  2. 40 CFR 704.7 - Confidential business information claims.

    Science.gov (United States)

    2010-07-01

    ... by marking the specific information on each page with a label such as “confidential”, “proprietary... concerning all information which is claimed confidential: (1) My company has taken measures to protect the...

  3. Confidential close call reporting system : preliminary evaluation findings.

    Science.gov (United States)

    2008-12-01

    The Federal Railroad Administration (FRA) is implementing a collaborative problem-solving approach to improving safety. The Confidential Close Call Reporting System (C3RS) is a human factors-based approach that is designed to reduce the accident rate...

  4. 40 CFR 86.615-84 - Treatment of confidential information.

    Science.gov (United States)

    2010-07-01

    ...) Selective Enforcement Auditing of New Light-Duty Vehicles, Light-Duty Trucks, and Heavy-Duty Vehicles § 86... part 2, subpart B. (b) Any claim of confidentiality must accompany the information at the time it is...

  5. WTO confidential: the case of asbestos.

    Science.gov (United States)

    Castleman, Barry

    2003-01-01

    The World Trade Organization (WTO), established in 1995, adjudicates "trade disputes" between member nations in cases with human rights, cultural, environmental, and public health significance. Throughout the resolution process and even after a case's conclusion, little of what happens is made accessible to the public. However, it is one thing to criticize the WTO for its lack of transparency from outside the process and another to critically examine what was withheld from disclosure and what dangers that presents. This is the inside story from a scientific adviser to one party in a WTO case, who analyzes what happened from a public health point of view. The analysis concludes that the public health justification for banning asbestos was accepted in the end by WTO economists, despite the WTO's bias in favor of the party (Canada) making the free trade challenge (to public health legislation), despite the WTO's lack of expertise in science, medicine, engineering, and public health, and despite important erroneous statements made to the WTO under the cover of confidentiality. The case nevertheless illustrates that the WTO's threat to national sovereignty could never withstand the light of day if the limitations and dangers of the process were open for all to see.

  6. Nuclear exports. Parliamentary control and confidentiality

    International Nuclear Information System (INIS)

    Feldmann, Ulrike

    2015-01-01

    With its decision taken on 21. October 2014 (Az.: 2 BvE 5/11) the Federal Constitutional Court (BVerfG) decided during court proceedings between administrative bodies on the scope and limits of the parliamentary right of information. Even though the proceeding did not deal with nuclear exports but arm exports, foreign trade law, however, does not only designate an export licence obligation for military weapons but also for so called dual-use goods meaning goods, which can be used both for friendly as well as for military purposes. The export of these goods requires according to the so-called Dual-Use Regulation (EG) 428/2009 a licence. Annex I category 0 of the regulation (EG) 428/2009 lists a variety of nuclear materials, plants and equipment items for which this licence applies. In the same manner as arm exports, also exports of nuclear dual-use goods are being discussed in a special cabinet committee, the Federal Security Council (BSR), which shall coordinate cross-departmentally the German security and defence policy under consideration of economic interests and which categorises its results, according to the rules of procedure, as confidential. Also legally not regulated but common ''preliminary enquiries'' at the responsible Federal Ministry or rather Federal Office of Economics and Export Control by companies which plan an export and want to affirm the general approval for their export business prior to conclusion of contract take not only place for arm exports but also for nuclear dual-use goods. The decision by the Federal Constitutional Court can be applied to consultations about the authorisation of nuclear dual-use goods.

  7. Improving Individual Acceptance of Health Clouds through Confidentiality Assurance.

    Science.gov (United States)

    Ermakova, Tatiana; Fabian, Benjamin; Zarnekow, Rüdiger

    2016-10-26

    Cloud computing promises to essentially improve healthcare delivery performance. However, shifting sensitive medical records to third-party cloud providers could create an adoption hurdle because of security and privacy concerns. This study examines the effect of confidentiality assurance in a cloud-computing environment on individuals' willingness to accept the infrastructure for inter-organizational sharing of medical data. We empirically investigate our research question by a survey with over 260 full responses. For the setting with a high confidentiality assurance, we base on a recent multi-cloud architecture which provides very high confidentiality assurance through a secret-sharing mechanism: Health information is cryptographically encoded and distributed in a way that no single and no small group of cloud providers is able to decode it. Our results indicate the importance of confidentiality assurance in individuals' acceptance of health clouds for sensitive medical data. Specifically, this finding holds for a variety of practically relevant circumstances, i.e., in the absence and despite the presence of conventional offline alternatives and along with pseudonymization. On the other hand, we do not find support for the effect of confidentiality assurance in individuals' acceptance of health clouds for non-sensitive medical data. These results could support the process of privacy engineering for health-cloud solutions.

  8. Computer Security: confidentiality is everybody’s business

    CERN Multimedia

    Stefan Lueders, Computer Security Team

    2015-01-01

    Recently, a zip file with confidential information was mistakenly made public on one of CERN’s websites. Although the file was only intended for members of an internal committee, when placing it onto the CERN website, someone made a mistake when setting the access permissions and, thus, made the file accessible to everyone visiting the site!   Unfortunately, this is but one example of such mistakes. We have seen other documents made accessible to a much wider audience than originally intended… CERN takes serious measures to ensure the confidentiality of data. Confidential or “sensitive” documents (following the nomenclature set out in the CERN Data Protection Policy) deserve professional handling and access protections given only to the people who really need to access them. As such, they must not be widely circulated as attachments in e-mails and, most definitely, must not be stored on random public websites for the sole purpose of shari...

  9. Independent consultants : fiduciary duties, trade secrets and confidential information

    International Nuclear Information System (INIS)

    Fraser, B.; Wilhelmson, M.

    1999-01-01

    Because of cutbacks and downsizing within the petroleum industry, it has become one of the largest users of contract personnel to provide services that were previously provided by senior levels of management. This paper explored the application of common law fiduciary duties and the duty of confidence to the independent workforce. It examined to what extent fiduciary duties apply to independent consultants and the best way for the employer to protect itself from the potential misuse of confidential information. Part 1 of the paper described fiduciary duties. A fiduciary relationship was described as one that possesses the following three characteristics: (1) the fiduciary has scope for the exercise of some discretion of power, (2) the fiduciary can unilaterally exercise that power to affect the beneficiary's practical interests, and (3) the beneficiary is peculiarly vulnerable to the fiduciary holding the discretion of power. Three examples of how the courts treated some arguments regarding fiduciaries were presented. Part 2 of this paper discussed how trade secrets and confidential information should be handled. It was explained, that regardless of fiduciary duties, the unauthorized use of confidential information by an independent contractor can give rise to liability and an award of damages by the courts. Some examples where the Supreme Court of Canada found breach of confidence by a party were presented. Information communicated from an employer to an employee can be divided into the following three categories: (1) publicly accessible and not confidential, (2) confidential and must be treated as such while an employee is employed, but if learned becomes part of the employees skill and knowledge, and (3) specific confidential trade secrets that cannot lawfully be used for anyone's benefit but the employer's. Issues regarding defining rights and obligations by contract were also discussed

  10. Clinical confidentiality in the extradition proceedings relating to Senator Pinochet.

    Science.gov (United States)

    Hughes, C G

    2001-01-01

    The extradition proceedings relating to Senator Pinochet were ultimately resolved by the decision of the Secretary of State on the basis of medical evidence as to the Senator's competence to participate in a criminal trial. In considering the decision-making of the Secretary of State the court considered whether a confidential medical report, which dealt with matters of fact and opinion, could be disclosed to interested parties. The interests of justice in a significant, novel and complex case over-rode Senator Pinochet's expectations of confidentiality and his right to respect for private life under Article 8(1) of the European Convention on Human Rights (ECHR).

  11. 75 FR 55577 - Clean Water Act; Contractor Access to Confidential Business Information

    Science.gov (United States)

    2010-09-13

    ... mining; construction and development; drinking water treatment; industrial container and drum cleaning... ENVIRONMENTAL PROTECTION AGENCY [FRL-9200-8] Clean Water Act; Contractor Access to Confidential... Environmental Protection Agency's (EPA) Office of Water intends to transfer confidential business information...

  12. 40 CFR 53.15 - Trade secrets and confidential or privileged information.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 5 2010-07-01 2010-07-01 false Trade secrets and confidential or... Provisions § 53.15 Trade secrets and confidential or privileged information. Any information submitted under this part that is claimed to be a trade secret or confidential or privileged information shall be...

  13. 75 FR 3232 - Access to Confidential Business Information by Versar Inc. and Its Identified Subcontractor

    Science.gov (United States)

    2010-01-20

    ... AGENCY Access to Confidential Business Information by Versar Inc. and Its Identified Subcontractor AGENCY... North Springfield, VA and its subcontractor, to access information which has been submitted to EPA under... or determined to be Confidential Business Information (CBI). DATES: Access to the confidential data...

  14. 48 CFR 1552.235-80 - Access to confidential business information.

    Science.gov (United States)

    2010-10-01

    ... Clauses 1552.235-80 Access to confidential business information. As prescribed in 1535.007-70(g), insert the following clause. Access to Confidential Business Information (OCT 2000) It is not anticipated that it will be necessary for the contractor to have access to confidential business information (CBI...

  15. 10 CFR 9.28 - Predisclosure notification procedures for information containing trade secrets or confidential...

    Science.gov (United States)

    2010-01-01

    ... containing trade secrets or confidential commercial or financial information. 9.28 Section 9.28 Energy... notification procedures for information containing trade secrets or confidential commercial or financial... such trade secrets or confidential commercial or financial information, the NRC will give the submitter...

  16. 78 FR 44622 - Agency Information Collection; Activity Under OMB Review; Confidential Close Call Reporting System

    Science.gov (United States)

    2013-07-24

    ... Technology Administration (RITA), Bureau of Transportation Statistics (BTS), DOT. ACTION: Notice. SUMMARY: In... Confidentiality Provisions: The confidentiality of Close Call data is protected under the BTS confidentiality... statistical and non-identifying data will be made publicly available through reports. BTS will not release to...

  17. Confidentiality concerning HIV/AIDS status - the implications of the ...

    African Journals Online (AJOL)

    Department of Business Administration, University of Natal, Durban. L. A. Dancaster. B. CaM. HONS. LLB.• LLM. ... Heerden's wife was a business partner of McGeary, and Van. Heerden claimed that this was why Kruger ..... fundamental principles regarding confidentiality and the HIV patient. It is important for both the legal ...

  18. 22 CFR 1203.735-409 - Confidentiality of employees' statements.

    Science.gov (United States)

    2010-04-01

    ... 22 Foreign Relations 2 2010-04-01 2010-04-01 true Confidentiality of employees' statements. 1203.735-409 Section 1203.735-409 Foreign Relations UNITED STATES INTERNATIONAL DEVELOPMENT COOPERATION AGENCY EMPLOYEE RESPONSIBILITIES AND CONDUCT Statements of Employment and Financial Interests § 1203.735...

  19. Confidentiality with respect to third parties: a psychoanalytic view.

    Science.gov (United States)

    Furlong, Allannah

    2005-04-01

    It is assumed that confidentiality is not one singular ethical entity but a conglomerate of quite different issues depending upon clinical context and the sector of information sharing at stake. The focus here is on how to think psychoanalytically about requests for information from third parties (payers, courts, public security). Defining confidentiality as a promise to 'never tell anything' outside of the relationship omits evaluation of the impact of the third's listening on the combined freedom of thought and freedom of speech in analyst and analysand. Circulation of information outside the dyad need not be toxic, need not disrupt the analytic couple's openness to new meaning. Key to contamination and inhibition of analytic work is whether or not disclosure serves an analytic end. Current defense of confidentiality relies heavily on the models of protection of privacy and professional secrecy, which, though useful and relevant, fail to encompass the transitional, intersubjective space engendered by the analytic process. Suggestions are made for alternate sources of paradigms better suited to represent the latter. Offered for discussion is a draft of a confidentiality policy with respect to third parties that is informed by psychoanalytic theory and clinical practice rather than by local legal jurisdiction or original disciplines' ethics codes.

  20. 19 CFR 201.6 - Confidential business information.

    Science.gov (United States)

    2010-04-01

    ..., or apparatus, or to the production, sales, shipments, purchases, transfers, identification of... business information (e.g., discussion of trends) will be treated as confidential business information only...) day period for filing an appeal shall be tolled on the filing of an amended request and a new twenty...

  1. Zerber: r-Confidential Indexing for Distributed Documents

    NARCIS (Netherlands)

    Zerr, Sergej; Demidova, Elena; Olmedilla, Daniel; Nejdl, Wolfgang; Winslett, Marianne; Mitra, Soumyadeb

    2008-01-01

    Zerr, S., Demidova, E., Olmedilla, D., Nejdl, W., Winslett, M., & Mitra, S. (2008). Zerber: r-Confidential Indexing for Distributed Documents. In J. Teubner (Eds.), Proceedings of the 11th International Conference on Extending Database Technology (pp. 287-298). March, 25-29, 2008, Nantes, France.

  2. 19 CFR 200.735-121 - Confidentiality of employees' statements.

    Science.gov (United States)

    2010-04-01

    ... RESPONSIBILITIES AND CONDUCT Provisions Governing Statements of Employment and Financial Interests § 200.735-121 Confidentiality of employees' statements. Each statement of employment and financial interests, and each... carry out the purpose of this part. The Deputy DAEO may not disclose information from the statement...

  3. The internet, virtual communities and threats to confidentiality ...

    African Journals Online (AJOL)

    Objectives. To describe the role of the Internet in building virtual communities of doctors, to identify threats to privacy and confidentiality in this use of the Internet, and to suggest ways in which this threat can be managed. Summary. The Internet is revolutionising the medical profession. The doctor's role as medical expert is ...

  4. 40 CFR 763.179 - Confidential business information claims.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 30 2010-07-01 2010-07-01 false Confidential business information claims. 763.179 Section 763.179 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED... for your product? Consider in your answer such constraints as capital and marketing cost, specialized...

  5. 22 CFR 1104.17 - Confidentiality of archaeological resource information.

    Science.gov (United States)

    2010-04-01

    ... 22 Foreign Relations 2 2010-04-01 2010-04-01 true Confidentiality of archaeological resource information. 1104.17 Section 1104.17 Foreign Relations INTERNATIONAL BOUNDARY AND WATER COMMISSION, UNITED... of archaeological resource information. (a) The Commissioner shall not make available to the public...

  6. 30 CFR 47.85 - Confidentiality agreement and remedies.

    Science.gov (United States)

    2010-07-01

    ... TRAINING HAZARD COMMUNICATION (HazCom) Trade Secret Hazardous Chemical § 47.85 Confidentiality agreement... trade secret chemical identity to the health purposes indicated in the written statement of need; (2... designated representative, or the health professional to disclose the trade secret chemical identity to MSHA...

  7. Effective verification of confidentiality for multi-threaded programs

    NARCIS (Netherlands)

    Ngo, Minh Tri; Stoelinga, Mariëlle Ida Antoinette; Huisman, Marieke

    2014-01-01

    This paper studies how confidentiality properties of multi-threaded programs can be verified efficiently by a combination of newly developed and existing model checking algorithms. In particular, we study the verification of scheduler-specific observational determinism (SSOD), a property that

  8. Confidential data in a competitive utility environment: A regulatory perspective

    Energy Technology Data Exchange (ETDEWEB)

    Vine, E.

    1996-08-01

    Historically, the electric utility industry has been regarded as one of the most open industries in the United States in sharing information but their reputation is being challenged by competitive energy providers, the general public, regulators, and other stakeholders. As the prospect of competition among electricity power providers has increased in recent years, many utilities have been requesting that the data they submit to their utility regulatory commissions remain confidential. Withholding utility information from the public is likely to have serious and significant policy implications with respect to: (1) consumer education, the pursuit of truth, mutual respect among parties, and social cooperation; (2) the creation of a fair market for competitive energy services; (3) the regulatory balance; (4) regional and national assessments of energy-savings opportunities; (5) research and development; and (6) evaluations of utility programs, plans, and policies. In a telephone survey of all public utility commissions (PUCs) that regulate electric and gas utilities in the U.S., we found that almost all PUCs have received requests from utility companies for data to be filed as confidential, and confidential data filings appear to have increased (both in scope and in frequency) in those states where utility restructuring is being actively discussed. The most common types of data submitted as confidential by utilities dealt with specific customer data, market data, avoided costs, and utility costs.

  9. 18 CFR 706.410 - Confidentiality of statements.

    Science.gov (United States)

    2010-04-01

    ... use of information on the statements shall be limited to that necessary to carry out the purposes of... EMPLOYEE RESPONSIBILITIES AND CONDUCT Statements of Employment and Financial Interests § 706.410 Confidentiality of statements. Each statement of employment and financial interests, and each supplementary...

  10. 15 CFR 295.9 - Protection of confidential information.

    Science.gov (United States)

    2010-01-01

    ... confidential basis in connection with the activities of any business or joint research and development venture...) Information on the business operation of any member of the business or joint venture; (2) Trade secrets possessed by any business or any member of the joint venture. ...

  11. 7 CFR 1207.540 - Confidential books, records, and reports.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 10 2010-01-01 2010-01-01 false Confidential books, records, and reports. 1207.540 Section 1207.540 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL... books, records, and reports. All information obtained from the books, records, and reports of handler...

  12. 40 CFR 91.516 - Treatment of confidential information.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 20 2010-07-01 2010-07-01 false Treatment of confidential information. 91.516 Section 91.516 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) AIR PROGRAMS (CONTINUED) CONTROL OF EMISSIONS FROM MARINE SPARK-IGNITION ENGINES Manufacturer Production Line...

  13. 48 CFR 9903.202-4 - Privileged and confidential information.

    Science.gov (United States)

    2010-10-01

    ... confidential information. 9903.202-4 Section 9903.202-4 Federal Acquisition Regulations System COST ACCOUNTING... Statement contains trade secrets and commercial or financial information, which is privileged and... AND COST ACCOUNTING STANDARDS CONTRACT COVERAGE CAS Program Requirements 9903.202-4 Privileged and...

  14. 40 CFR 303.31 - Assurance of claimant confidentiality.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 27 2010-07-01 2010-07-01 false Assurance of claimant confidentiality. 303.31 Section 303.31 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) SUPERFUND, EMERGENCY PLANNING, AND COMMUNITY RIGHT-TO-KNOW PROGRAMS CITIZEN AWARDS FOR INFORMATION ON CRIMINAL...

  15. 40 CFR 85.1415 - Treatment of confidential information.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 18 2010-07-01 2010-07-01 false Treatment of confidential information. 85.1415 Section 85.1415 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) AIR PROGRAMS (CONTINUED) CONTROL OF AIR POLLUTION FROM MOBILE SOURCES Urban Bus Rebuild Requirements § 85.1415...

  16. 12 CFR 19.181 - Confidentiality of formal investigations.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 1 2010-01-01 2010-01-01 false Confidentiality of formal investigations. 19.181 Section 19.181 Banks and Banking COMPTROLLER OF THE CURRENCY, DEPARTMENT OF THE TREASURY RULES OF... only in accordance with the provisions of part 4 of this chapter. ...

  17. 45 CFR 1321.51 - Confidentiality and disclosure of information.

    Science.gov (United States)

    2010-10-01

    ... 45 Public Welfare 4 2010-10-01 2010-10-01 false Confidentiality and disclosure of information. 1321.51 Section 1321.51 Public Welfare Regulations Relating to Public Welfare (Continued) OFFICE OF... AMERICANS PROGRAMS GRANTS TO STATE AND COMMUNITY PROGRAMS ON AGING State Agency Responsibilities § 1321.51...

  18. Time for Action: Audit, Accountability and Confidential Enquiries into ...

    African Journals Online (AJOL)

    Improving the quality of care is essential for achieving reductions in maternal mortality. Audit is one of the methods which can be used to simultaneously assess as well as improve quality. This commentary discusses one type of audit – confidential enquiries into maternal death. We believe that the enthusiasm for ...

  19. 15 CFR 325.16 - Protecting confidentiality of information.

    Science.gov (United States)

    2010-01-01

    ... 15 Commerce and Foreign Trade 2 2010-01-01 2010-01-01 false Protecting confidentiality of information. 325.16 Section 325.16 Commerce and Foreign Trade Regulations Relating to Commerce and Foreign Trade (Continued) INTERNATIONAL TRADE ADMINISTRATION, DEPARTMENT OF COMMERCE MISCELLANEOUS REGULATIONS...

  20. Meaningful Use of a Confidential Adolescent Patient Portal.

    Science.gov (United States)

    Thompson, Lindsay A; Martinko, Thomas; Budd, Pamela; Mercado, Rebeccah; Schentrup, Anzeela M

    2016-02-01

    To design and evaluate the usage of an adolescent patient portal specifically adapted for adolescent health care needs that also satisfied institutional meaningful use guidelines regarding electronic health records. Key stakeholders at one academic health care center adopted an online portal and opted to designate a patient portal specifically for adolescents to maximize confidentiality in compliance with state privacy laws. This study analyzed aggregate electronic health record data of adolescents' (ages 12-17.9 years) uptake, usage, and functionality of this portal and compared it to parent portal usage for younger children (ages 0-11 years). Differences in means were calculated using paired t tests. The portal was used similarly between parents of young children and adolescents, with almost 1,000 enrollees in each group from September 1, 2012 to March 31, 2015. There were no gender differences in enrollment. Adolescents were less likely than parents of younger children to review appointments (73% vs. 85%), laboratory tests (67% vs. 79%), problem lists (40% vs. 78%), or allergies (45% vs. 77%, all p values adolescents sent 1,397 confidential messages. Institutional decisions for implementing meaningful use requirements can align with goals of adolescent health. Patient portals can enhance adolescent health care quality and adolescents readily use a confidential portal. Implementation of meaningful use requirements should be checked against adolescent health care needs to maximize confidentiality and promote health communication. Copyright © 2016 Society for Adolescent Health and Medicine. Published by Elsevier Inc. All rights reserved.

  1. Public expectations concerning confidentiality protection of adolescents' sexual and reproductive health care in Lithuania

    DEFF Research Database (Denmark)

    Jaruseviciene, Lina; Zaborskis, Apolinaras; Lazarus, Jeffrey Victor

    2014-01-01

    for confidentiality using a five-point Likert scale for eight types of SRH consultations. RESULTS: Public anticipation for confidentiality depended on whether issues related to sexual behaviour or to its consequences were addressed during adolescent consultation. Only younger respondents had higher expectations......OBJECTIVE: An adolescent's right to confidential healthcare is protected by international law and professional consensus. However, parental and social support for confidential sexual and reproductive health (SRH) services, in particular, varies greatly. This study documents Lithuanian residents...... for confidentiality in both contexts. Public expectations regarding confidentiality were less demanding in 2012 than in 2005. CONCLUSIONS: The expectation of confidentiality protection was greater for topics related to sexual behaviour than for the consequences of sexual behaviour, such as pregnancy, abortion...

  2. Composing security protocols: from confidentiality to privacy

    OpenAIRE

    Arapinis, Myrto; Cheval, Vincent; Delaune, Stéphanie

    2015-01-01

    Security protocols are used in many of our daily-life applications, and our privacy largely depends on their design. Formal verification techniques have proved their usefulness to analyse these protocols, but they become so complex that modular techniques have to be developed. We propose several results to safely compose security protocols. We consider arbitrary primitives modeled using an equational theory, and a rich process algebra close to the applied pi calculus. Relying on these composi...

  3. Medical confidentiality versus disclosure: Ethical and legal dilemmas.

    LENUS (Irish Health Repository)

    Agyapong, V I O

    2009-02-01

    A case is described of a fifty year old single man who made disclosures about criminal sexual practices during a psychiatric assessment. In common practice with other professional men, a doctor is under a duty not to disclose, without the consent of his patient, information which he has gained in his professional capacity other than in exceptional circumstances. We discuss the ethical and legal considerations surrounding issues of medical confidentiality and the dilemma that sometimes face clinicians, when they feel obliged, in the public interest, to disclose information they have gained in confidence. Breach of confidences can have deleterious consequences; particularly for the doctor-patient relationship, but failure to disclose in some situations could have serious implications for the well-being of the wider society. Doctors should be aware of the basic principles of confidentiality and the ethical and legal framework around which they are built.

  4. [Ethics in pediatric emergencies: Care access, communication, and confidentiality].

    Science.gov (United States)

    Benoit, J; Berdah, L; Carlier-Gonod, A; Guillou, T; Kouche, C; Patte, M; Schneider, M; Talcone, S; Chappuy, H

    2015-05-01

    Children suffer most from today's increasing precariousness. In France, access to care is available for all children through various structures and existing measures. The support for foreign children is overseen by specific legislation often unfamiliar to caregivers. Pediatric emergencies, their location, organization, actors, and patient flow are a particular environment that is not always suitable to communication and may lead to situations of abuse. Communication should not be forgotten because of the urgency of the situation. The place of the child in the dialogue is often forgotten. Considering the triangular relationship, listening to the child and involving the parents in care are the basis for a good therapeutic alliance. Privacy and medical confidentiality in pediatric emergencies are governed by law. However, changes in treatments and medical practices along with the variety of actors involved imply both individual and collective limitations, to the detriment of medical confidentiality. Copyright © 2015 Elsevier Masson SAS. All rights reserved.

  5. Confidentiality and its limits: some contributions from Christianity.

    Science.gov (United States)

    Torrance, I R

    2003-02-01

    The issue is whether Christianity, of its nature, would seek to prevent a justifiable breach of confidentiality or could endorse it, under certain circumstances, as the act which is fundamentally more loving or more truthful. The individualistic nature of Western Christianity is noted. The Lutheran theologian Dietrich Bonhoeffer is used to show Christian support for dynamic rather than literal truth telling, and for awareness of the contexts and power relations within which persons stand.

  6. Privacy, confidentiality and abortion statistics: a question of public interest?

    Science.gov (United States)

    McHale, Jean V; Jones, June

    2012-01-01

    The precise nature and scope of healthcare confidentiality has long been the subject of debate. While the obligation of confidentiality is integral to professional ethical codes and is also safeguarded under English law through the equitable remedy of breach of confidence, underpinned by the right to privacy enshrined in Article 8 of the Human Rights Act 1998, it has never been regarded as absolute. But when can and should personal information be made available for statistical and research purposes and what if the information in question is highly sensitive information, such as that relating to the termination of pregnancy after 24 weeks? This article explores the case of In the Matter of an Appeal to the Information Tribunal under section 57 of the Freedom of Information Act 2000, concerning the decision of the Department of Health to withhold some statistical data from the publication of its annual abortion statistics. The specific data being withheld concerned the termination for serious fetal handicap under section 1(1)d of the Abortion Act 1967. The paper explores the implications of this case, which relate both to the nature and scope of personal privacy. It suggests that lessons can be drawn from this case about public interest and use of statistical information and also about general policy issues concerning the legal regulation of confidentiality and privacy in the future.

  7. Conflicting duties over confidentiality in Argentina and Peru.

    Science.gov (United States)

    Cavallo, Mercedes

    2011-02-01

    The medical duty of confidentiality represents a key element for the provision of reproductive and sexual health services. In some Latin American countries, such as Argentina and Peru, the legal systems impose—or are interpreted as imposing—on health professionals the duty of confidentiality, but also the duty to report the commission of a public order offense that they know about owing to the practicing of their profession. In these countries, the conflicting duties and the criminalization of abortion cause severe public health and human rights problems when health professionals assist their patients for post-abortion treatment. Typically, patients are deterred from seeking prompt medical care, and their privacy, autonomy, and dignity are violated. A 2010 ruling from the Supreme Court of Argentina and a 2004 ruling from the Inter-American Court of Human Rights emerge as important instruments that grant a more adequate protection of medical confidentiality. © 2010 International Federation of Gynecology and Obstetrics. Published by Elsevier Ireland Ltd. All rights reserved.

  8. Confidential patent application with an example of preparation

    Directory of Open Access Journals (Sweden)

    Obrad T. Čabarkapa

    2013-12-01

    Full Text Available In order that the invention solving a technical problem receives a patent protection, it is necessary to file a patent application. For the protection of confidential inventions which are important for defense and national security, a confidential patent application[1] must be filed. A confidential patent application is an important and complex document, the parts of which are,  in principle, exposed in an established order. For the preparation of patent applications, it is necessary to engage experts with higher education, primarily in the technical field the invention relates to. The contents of the patent application is a basis for examining whether the application meets the requirements for patentability and whether the right to patent protection is achieved. Besides theoretical discussions on patent application, the paper gives a short version of an example of an application regarding a protected confidential invention. Introduction The basic condition for the exercise of patent protection is filing a patent application, the test procedure and, eventually, depending on the test results - the recognition or rejection of the patent. The paper gives a description of all parts of the patent application on an example of a confidential invention already patented. The content of the confidential patent application The confidential patent application for confidential invention protection consists of the following parts: The application for a patent; description of the invention; the claims (indication of what is new and what is required to be protected by patenting; abstract (short summary of the invention  and a draft of the invention (to which the description and the claims are referred. The application for a patent The application for patent is filed on Form P-1 and a request for the petty patent on Form MP-1. The data entered in the file is, for example: the applicant; the lawyer; the name of the invention in Serbian and English; the inventor

  9. 78 FR 16265 - Agency Information Collection Activities; Proposed Collection; Comment Request; Extension

    Science.gov (United States)

    2013-03-14

    ... collection requirements in its regulation ``Duties of Furnishers of Information to Consumer Reporting... secret or any commercial or financial information which is * * * privileged or confidential'' as provided... FEDERAL TRADE COMMISSION Agency Information Collection Activities; Proposed Collection; Comment...

  10. Is patient confidentiality compromised with the electronic health record?: a position paper.

    Science.gov (United States)

    Wallace, Ilse M

    2015-02-01

    In order for electronic health records to fulfill their expected benefits, protection of privacy of patient information is key. Lack of trust in confidentiality can lead to reluctance in disclosing all relevant information, which could have grave consequences. This position paper contemplates whether patient confidentiality is compromised by electronic health records. The position that confidentiality is compromised was supported by the four bioethical principles and argued that despite laws and various safeguards to protect patients' confidentiality, numerous data breaches have occurred. The position that confidentiality is not compromised was supported by virtue ethics and a utilitarian viewpoint and argued that safeguards keep information confidential and the public feels relatively safe with the electronic health record. The article concludes with an ethically superior position that confidentiality is compromised with the electronic health record. Although organizational and governmental ways of enhancing the confidentiality of patient information within the electronic health record facilitate confidentiality, the ultimate responsibility of maintaining confidentiality rests with the individual end-users and their ethical code of conduct. The American Nurses Association Code of Ethics for nurses calls for nurses to be watchful with data security in electronic communications.

  11. Patient data confidentiality and patient rights.

    Science.gov (United States)

    Sadan, B

    2001-06-01

    There has been a recent trend to gather and record more comprehensive and more detailed personal medical information in computerized databases. Retrieval and access are much easier from electronic records than from hard copies stored in the archives of care-providing institutions. The Institute of Medicine voiced concern that these developments raised numerous problematic issues, the most disturbing of which is a much more widespread and systematic violation of privacy via what they called 'authorized abuse', i.e. authorized users abusing their access privileges. Other worries stemmed from the sharing of patient information among different entities. Multitudes of organizations receive information about patients' health records, often without their knowledge or consent. These include care providers, insurers, pharmacists, employers, life insurance companies and marketing firms. This article addresses the issues of medical data ownership and some health data-recording problems to which we propose co-ownership and co-documentation as part of the solution. We believe that a cooperative approach will help to maintain greater accuracy of personal medical data, written in language that can be shared and understood by the consumers and not one couched in terminology understandable only to professional personnel and to delegate the power to the patient to decide when and to whom to give authorization for its use by a third party and for research.

  12. Confidentiality in genetic testing: legal and ethical issues in an international context.

    Science.gov (United States)

    Knoppers, B M

    1993-01-01

    This comparative legal study on confidentiality in genetic testing examines three levels of communication of genetic information: the personal; the familial; and the institutional third parties. At the first two levels, it is argued that the approach is one that recognizes genetic individuality and reciprocity within the physician-patient relationship without legislative interference. This stands in contrast to the possible use of genetic information by economic third parties or, even, that of the state with respect to the DNA profiling of the genetic identity of criminals, the approach for both areas being the promulgation of 'genetic-specific' or human rights legislation with the hope of preventing discrimination. This rush to constrain the impact of genetic information through legislation is criticized since it may well lead to further stigmatization. The author proposes the promotion of the concept of genetic privacy within the broader rubric of informational self-determination.

  13. 76 FR 72403 - Access to Confidential Business Information by Primus Solutions, Inc.

    Science.gov (United States)

    2011-11-23

    ...] Access to Confidential Business Information by Primus Solutions, Inc. AGENCY: Environmental Protection Agency (EPA). ACTION: Notice. SUMMARY: EPA has authorized its contractor, Primus Solutions, Inc., (Primus...

  14. THE INFORMATION CONFIDENTIALITY AND CYBER SECURITY IN MEDICAL INSTITUTIONS

    Directory of Open Access Journals (Sweden)

    SABAU-POPA CLAUDIA DIANA

    2015-07-01

    Full Text Available The information confidentiality and cyber security risk affects the right to confidentiality and privacy of the patient, as regulated in Romania by the Law 46/2002. The manifestation of the cyber security risk event affects the reputation of the healthcare institution and is becoming more and more complex and often due to the: development of network technology, the medical equipment connected to wifi and the electronic databases. The databases containing medical records were implemented due to automation. Thus, transforming data into medical knowledge contribute to a better understanding of the disease. Due to these factors, the measures taken by the hospital management for this type of risk are adapted to the cyber changes. The hospital objectives aim: the implementation of a robust information system, the early threats identifications and the incident reporting. Neglecting this type of risk can generate financial loss, inability to continue providing health care services for a certain period of time, providing an erroneous diagnosis, medical equipment errors etc. Thus, in a digital age the appropriate risk management for the information security and cyber risk represent a necessity. The main concern of hospitals worldwide is to align with international requirements and obtain credentials in terms of data security from the International Organisation for Standardization, which regulates the management of this type of risk. Romania is at the beginning in terms of concerns regarding the management, avoidance and mitigation of information security, the health system being most highly exposed to its manifestation. The present paper examines the concerns of the health system to the confidentiality of information and cyber security risk and its management arrangements. Thus, a set of key risk indicators is implemented and monitored for 2011-2013, using a user interface, a Dashboard, which acts as an early warning system of the manifestation of the

  15. Teaching Confidentiality through Comics at One Spanish Medical School.

    Science.gov (United States)

    Lalanda, Mónica; Altisent, Rogelio; Delgado-Marroquín, Maria Teresa

    2018-02-01

    At the University of Zaragoza in Spain we developed an innovative way to teach the concept of confidentiality to medical students, which we tested by comparing the use of customized comics with more traditional methods. We proved that using comics is more attractive to students than lectures and class discussions, that it increases class participation and students' self-awareness of learning, and that it maintains the same academic results. We share our experience visually in a two-page comic. © 2018 American Medical Association. All Rights Reserved.

  16. Outsourcing medical data analyses: can technology overcome legal, privacy, and confidentiality issues?

    Science.gov (United States)

    Brumen, Bostjan; Heričko, Marjan; Sevčnikar, Andrej; Završnik, Jernej; Hölbl, Marko

    2013-12-16

    Medical data are gold mines for deriving the knowledge that could change the course of a single patient's life or even the health of the entire population. A data analyst needs to have full access to relevant data, but full access may be denied by privacy and confidentiality of medical data legal regulations, especially when the data analyst is not affiliated with the data owner. Our first objective was to analyze the privacy and confidentiality issues and the associated regulations pertaining to medical data, and to identify technologies to properly address these issues. Our second objective was to develop a procedure to protect medical data in such a way that the outsourced analyst would be capable of doing analyses on protected data and the results would be comparable, if not the same, as if they had been done on the original data. Specifically, our hypothesis was there would not be a difference between the outsourced decision trees built on encrypted data and the ones built on original data. Using formal definitions, we developed an algorithm to protect medical data for outsourced analyses. The algorithm was applied to publicly available datasets (N=30) from the medical and life sciences fields. The analyses were performed on the original and the protected datasets and the results of the analyses were compared. Bootstrapped paired t tests for 2 dependent samples were used to test whether the mean differences in size, number of leaves, and the accuracy of the original and the encrypted decision trees were significantly different. The decision trees built on encrypted data were virtually the same as those built on original data. Out of 30 datasets, 100% of the trees had identical accuracy. The size of a tree and the number of leaves was different only once (1/30, 3%, P=.19). The proposed algorithm encrypts a file with plain text medical data into an encrypted file with the data protected in such a way that external data analyses are still possible. The results

  17. HIPAA-protecting patient confidentiality or covering something else?

    Directory of Open Access Journals (Sweden)

    Robbins RA

    2013-10-01

    Full Text Available No abstract available. Article truncated at 150 words. A case of a physician fired from the Veterans Administration (VA for violation of the Health Care Portability and Accountability Act of 1996 (HIPAA illustrates a problem with both the law and the VA. Anil Parikh, a VA physician at the Jesse Brown VA in Chicago, was dismissed on a charge of making unauthorized disclosures of confidential patient information on October 19, 2007. On January 3, 2011 the Merit Systems Protection Board (MSPB reversed Dr. Parikh’s removal. Dr. Parikh's initially made disclosures to the VA Office of Inspector General and to Senator Barack Obama and Congressman Luis Gutierrez, in whose district the Jesse Brown VA lies. Dr. Parikh alleged that there were systematic problems within the Jesse Brown VA that resulted in untimely and inadequate patient care. The confidential patient information Parikh disclosed included examples of the misdiagnoses and misdirection of patients within the hospital. Specifically, Dr. Parikh alleged that …

  18. 41 CFR 105-60.405 - Processing requests for confidential commercial information.

    Science.gov (United States)

    2010-07-01

    ... MATERIALS 60.4-Described Records § 105-60.405 Processing requests for confidential commercial information... 41 Public Contracts and Property Management 3 2010-07-01 2010-07-01 false Processing requests for confidential commercial information. 105-60.405 Section 105-60.405 Public Contracts and Property Management...

  19. 40 CFR 2.208 - Substantive criteria for use in confidentiality determinations.

    Science.gov (United States)

    2010-07-01

    ... nor withdrawn; (b) The business has satisfactorily shown that it has taken reasonable measures to... GENERAL PUBLIC INFORMATION Confidentiality of Business Information § 2.208 Substantive criteria for use in confidentiality determinations. Determinations issued under §§ 2.204 through 2.207 shall hold that business...

  20. 75 FR 81266 - Access by EPA Contractors to Information Claimed as Confidential Business Information (CBI...

    Science.gov (United States)

    2010-12-27

    ... AGENCY Access by EPA Contractors to Information Claimed as Confidential Business Information (CBI... determined to be, confidential business information (CBI). Contractor access to this information, which is... information by the contractor and the contractor must require its personnel who require access to information...

  1. 77 FR 10506 - Access to Confidential Business Information by Syracuse Research Corporation, Inc., and Its...

    Science.gov (United States)

    2012-02-22

    ... AGENCY Access to Confidential Business Information by Syracuse Research Corporation, Inc., and Its... Syracuse, NY, and its identified subcontractor BeakerTree Corporation to access information which has been... information may be claimed or determined to be Confidential Business Information (CBI). DATES: Access to the...

  2. 5 CFR 1204.14 - Requests for access to confidential commercial information.

    Science.gov (United States)

    2010-01-01

    ... Freedom of Information Act § 1204.14 Requests for access to confidential commercial information. (a... 5 Administrative Personnel 3 2010-01-01 2010-01-01 false Requests for access to confidential commercial information. 1204.14 Section 1204.14 Administrative Personnel MERIT SYSTEMS PROTECTION BOARD...

  3. 76 FR 7559 - Access in Litigation to Confidential Business Information; Transfer of Information Claimed as...

    Science.gov (United States)

    2011-02-10

    ... AGENCY Access in Litigation to Confidential Business Information; Transfer of Information Claimed as Confidential Business Information to the United States Department of Justice and Parties to Certain Litigation... Litigation''), information which has been submitted to EPA by its contractors that is claimed to be, or has...

  4. 49 CFR Appendix A to Part 512 - Certificate in Support of Request for Confidentiality

    Science.gov (United States)

    2010-10-01

    ..., state as follows: (1) I am (official's name, title) and I am authorized by (company) to execute this... confidential and proprietary data and is being submitted with the claim that it is entitled to confidential... information provided by the responsible (company) personnel who have authority in the normal course of...

  5. 5 CFR 2634.604 - Custody of and denial of public access to confidential reports.

    Science.gov (United States)

    2010-01-01

    ... 5 Administrative Personnel 3 2010-01-01 2010-01-01 false Custody of and denial of public access to confidential reports. 2634.604 Section 2634.604 Administrative Personnel OFFICE OF GOVERNMENT ETHICS GOVERNMENT... § 2634.604 Custody of and denial of public access to confidential reports. (a) Any report filed with an...

  6. Having Confidence in Therapeutic Work with Young People: Constraints and Challenges to Confidentiality

    Science.gov (United States)

    Jenkins, Peter

    2010-01-01

    Confidentiality presents particular challenges to practitioners working with young people, on account of the latter's vulnerability and emotional immaturity. Ethical codes place a key importance on confidentiality, from deontological and teleological perspectives. However, young clients may rely on a more pragmatic approach in deciding whether to…

  7. 48 CFR 1552.235-71 - Treatment of confidential business information.

    Science.gov (United States)

    2010-10-01

    ... determined that in the performance of a contract, EPA may furnish confidential business information to the... Contractor: Treatment of Confidential Business Information (APR 1984) (a) The Contracting Officer, after a... without the prior written approval of the Assistant General Counsel for Contracts and Information Law; and...

  8. 16 CFR 1702.6 - Trade secrets and other confidential information.

    Science.gov (United States)

    2010-01-01

    ... 16 Commercial Practices 2 2010-01-01 2010-01-01 false Trade secrets and other confidential information. 1702.6 Section 1702.6 Commercial Practices CONSUMER PRODUCT SAFETY COMMISSION POISON PREVENTION...; PETITION PROCEDURES AND REQUIREMENTS § 1702.6 Trade secrets and other confidential information. Where a...

  9. 42 CFR 405.215 - Confidential commercial and trade secret information.

    Science.gov (United States)

    2010-10-01

    ... 42 Public Health 2 2010-10-01 2010-10-01 false Confidential commercial and trade secret information. 405.215 Section 405.215 Public Health CENTERS FOR MEDICARE & MEDICAID SERVICES, DEPARTMENT OF... trade secret information. To the extent that CMS relies on confidential commercial or trade secret...

  10. 42 CFR 2.1 - Statutory authority for confidentiality of drug abuse patient records.

    Science.gov (United States)

    2010-10-01

    ... HUMAN SERVICES GENERAL PROVISIONS CONFIDENTIALITY OF ALCOHOL AND DRUG ABUSE PATIENT RECORDS Introduction § 2.1 Statutory authority for confidentiality of drug abuse patient records. The restrictions of these regulations upon the disclosure and use of drug abuse patient records were initially authorized by section 408...

  11. 42 CFR 51.45 - Confidentiality of protection and advocacy system records.

    Science.gov (United States)

    2010-10-01

    ... 42 Public Health 1 2010-10-01 2010-10-01 false Confidentiality of protection and advocacy system... GRANTS REQUIREMENTS APPLICABLE TO THE PROTECTION AND ADVOCACY FOR INDIVIDUALS WITH MENTAL ILLNESS PROGRAM Access to Records, Facilities and Individuals § 51.45 Confidentiality of protection and advocacy system...

  12. 30 CFR 210.40 - Will MMS keep the information I provide confidential?

    Science.gov (United States)

    2010-07-01

    ... 30 Mineral Resources 2 2010-07-01 2010-07-01 false Will MMS keep the information I provide... MINERALS REVENUE MANAGEMENT FORMS AND REPORTS General Provisions § 210.40 Will MMS keep the information I provide confidential? The MMS will treat information obtained under this part as confidential to the...

  13. 30 CFR 291.111 - How does MMS treat the confidential information I provide?

    Science.gov (United States)

    2010-07-01

    ... 30 Mineral Resources 2 2010-07-01 2010-07-01 false How does MMS treat the confidential information... SHELF LANDS ACT § 291.111 How does MMS treat the confidential information I provide? (a) Any person who provides documents under this part in response to a request by MMS to inform a decision on whether open...

  14. 12 CFR 261.16 - Request for access to confidential commercial or financial information.

    Science.gov (United States)

    2010-01-01

    ... or financial information. 261.16 Section 261.16 Banks and Banking FEDERAL RESERVE SYSTEM (CONTINUED) BOARD OF GOVERNORS OF THE FEDERAL RESERVE SYSTEM RULES REGARDING AVAILABILITY OF INFORMATION Published... confidential commercial or financial information. (a) Request for confidential information. A request by a...

  15. 24 CFR 15.108 - What are HUD's policies concerning designating confidential commercial or financial information...

    Science.gov (United States)

    2010-04-01

    ... designating confidential commercial or financial information under Exemption 4 of the FOIA and responding to... financial information. Except as provided in this section or otherwise required by law, HUD officers and employees may not disclose business information which is considered as confidential commercial or financial...

  16. 19 CFR 206.7 - Confidential business information; furnishing of nonconfidential summaries thereof.

    Science.gov (United States)

    2010-04-01

    ... 19 Customs Duties 3 2010-04-01 2010-04-01 false Confidential business information; furnishing of... NONADJUDICATIVE INVESTIGATIONS INVESTIGATIONS RELATING TO GLOBAL AND BILATERAL SAFEGUARD ACTIONS, MARKET DISRUPTION, TRADE DIVERSION, AND REVIEW OF RELIEF ACTIONS General § 206.7 Confidential business information...

  17. 40 CFR 725.15 - Determining applicability when microorganism identity or use is confidential or uncertain.

    Science.gov (United States)

    2010-07-01

    ... ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) TOXIC SUBSTANCES CONTROL ACT REPORTING REQUIREMENTS AND REVIEW... appear on the public version of the Inventory, in § 725.239 or in subpart M of this part. Instead, it is contained in a confidential version held in EPA's Confidential Business Information Center (CBIC). The...

  18. 49 CFR 512.6 - How should I prepare documents when submitting a claim for confidentiality?

    Science.gov (United States)

    2010-10-01

    ... “Confidential Bus Info” appears in the file name or, if that is not practicable, the characters “Conf Bus Info... consecutive page numbers or sequential identifiers so that any page can be identified and located using the... page can be identified and located using the file name and page number. Confidential portions of...

  19. 75 FR 39093 - Proposed Confidentiality Determinations for Data Required Under the Mandatory Greenhouse Gas...

    Science.gov (United States)

    2010-07-07

    ... Ethylene dichloride manufacturing facilities. 325199 Acrylonitrile, ethylene oxide, methanol manufacturing... information collected under Part 98 that are emission data or non-CBI is important because it ensures... information collected under Part 98 that are emission data or non-CBI is important because it ensures...

  20. 78 FR 19801 - 2013 Revisions to the Greenhouse Gas Reporting Rule and Proposed Confidentiality Determinations...

    Science.gov (United States)

    2013-04-02

    ..., 326, 339 Manufacturers of rubber and miscellaneous plastic products. 331 Steel works, blast furnaces... values adopted for usage by EPA after a regulatory process and will be consistent with those values used...).\\11\\ The EPA reviewed available production and usage data for existing and newly synthesized gases and...

  1. 75 FR 43889 - Proposed Confidentiality Determinations for Data Required Under the Mandatory Greenhouse Gas...

    Science.gov (United States)

    2010-07-27

    ..., Ammonia Manufacturing; Subpart V, Nitric Acid Production; Subpart X, Petrochemical Production; Subpart Y... reporting facility to gain insights and develop market strategies that would harm the reporter's competitive...

  2. 77 FR 11039 - Proposed Confidentiality Determinations for the Petroleum and Natural Gas Systems Source Category...

    Science.gov (United States)

    2012-02-24

    ... municipally-owned distribution system). For a summary of the source category definitions for subpart W, which..., amended data reporting requirements, clarified terms and definitions, and made technical corrections. This... separate hydrocarbons separator with oil into liquid and gas phases. Separators are throughput greater than...

  3. 77 FR 63537 - Greenhouse Gas Reporting Program: Proposed Amendments and Confidentiality Determinations for...

    Science.gov (United States)

    2012-10-16

    ... potential HTF heat transfer fluid ICR Information Collection Request IPCC Intergovernmental Panel on Climate... systems (MEMS), liquid crystal displays (LCDs), or photovoltaic (PV) cells. Because we are planning an... manufacturing facilities. 334413 Semiconductor, photovoltaic (solid- state) device manufacturing facilities...

  4. 78 FR 55993 - Revisions to Reporting and Recordkeeping Requirements, and Proposed Confidentiality...

    Science.gov (United States)

    2013-09-11

    ... 331112 Ferroalloys manufacturing facilities. Fluorinated GHG Production 325120 Industrial gases..., including direct measurement, mass balance, and the use of emission factors. Reporters not using direct... Natural Gas Systems), subpart II (Industrial Wastewater Treatment), and subpart C (only certain combustion...

  5. Genetic secrets: Protecting privacy and confidentiality in the genetic era. Final report

    Energy Technology Data Exchange (ETDEWEB)

    Rothstein, M.A. [ed.

    1998-09-01

    Few developments are likely to affect human beings more profoundly in the long run than the discoveries resulting from advances in modern genetics. Although the developments in genetic technology promise to provide many additional benefits, their application to genetic screening poses ethical, social, and legal questions, many of which are rooted in issues of privacy and confidentiality. The ethical, practical, and legal ramifications of these and related questions are explored in depth. The broad range of topics includes: the privacy and confidentiality of genetic information; the challenges to privacy and confidentiality that may be projected to result from the emerging genetic technologies; the role of informed consent in protecting the confidentiality of genetic information in the clinical setting; the potential uses of genetic information by third parties; the implications of changes in the health care delivery system for privacy and confidentiality; relevant national and international developments in public policies, professional standards, and laws; recommendations; and the identification of research needs.

  6. The Adolescent's Right to Confidential Care When Considering Abortion.

    Science.gov (United States)

    2017-02-01

    In this statement, the American Academy of Pediatrics reaffirms its position that the rights of adolescents to confidential care when considering abortion should be protected. Adolescents should be encouraged to involve their parents and other trusted adults in decisions regarding pregnancy termination, and most do so voluntarily. The majority of states require that minors have parental consent for an abortion. However, legislation mandating parental involvement does not achieve the intended benefit of promoting family communication, and it increases the risk of harm to the adolescent by delaying access to appropriate medical care. This statement presents a summary of pertinent current information related to the benefits and risks of legislation requiring mandatory parental involvement in an adolescent's decision to obtain an abortion. Copyright © 2017 by the American Academy of Pediatrics.

  7. Lightweight and confidential data discovery and dissemination for wireless body area networks.

    Science.gov (United States)

    He, Daojing; Chan, Sammy; Zhang, Yan; Yang, Haomiao

    2014-03-01

    As a special sensor network, a wireless body area network (WBAN) provides an economical solution to real-time monitoring and reporting of patients' physiological data. After a WBAN is deployed, it is sometimes necessary to disseminate data into the network through wireless links to adjust configuration parameters of body sensors or distribute management commands and queries to sensors. A number of such protocols have been proposed recently, but they all focus on how to ensure reliability and overlook security vulnerabilities. Taking into account the unique features and application requirements of a WBAN, this paper presents the design, implementation, and evaluation of a secure, lightweight, confidential, and denial-of-service-resistant data discovery and dissemination protocol for WBANs to ensure the data items disseminated are not altered or tampered. Based on multiple one-way key hash chains, our protocol provides instantaneous authentication and can tolerate node compromise. Besides the theoretical analysis that demonstrates the security and performance of the proposed protocol, this paper also reports the experimental evaluation of our protocol in a network of resource-limited sensor nodes, which shows its efficiency in practice. In particular, extensive security analysis shows that our protocol is provably secure.

  8. Disclosure of past crimes: an analysis of mental health professionals' attitudes towards breaching confidentiality.

    Science.gov (United States)

    Wangmo, Tenzin; Handtke, Violet; Elger, Bernice Simone

    2014-09-01

    Ensuring confidentiality is the cornerstone of trust within the doctor-patient relationship. However, health care providers have an obligation to serve not only their patient's interests but also those of potential victims and society, resulting in circumstances where confidentiality must be breached. This article describes the attitudes of mental health professionals (MHPs) when patients disclose past crimes unknown to the justice system. Twenty-four MHPs working in Swiss prisons were interviewed. They shared their experiences concerning confidentiality practices and attitudes towards breaching confidentiality in prison. Qualitative analysis revealed that MHPs study different factors before deciding whether a past crime should be disclosed, including: (1) the type of therapy the prisoner-patient was seeking (i.e., whether it was court-ordered or voluntary), (2) the type of crime that is revealed (e.g., a serious crime, a crime of a similar nature to the original crime, or a minor crime), and (3) the danger posed by the prisoner-patient. Based on this study's findings, risk assessment of dangerousness was one of the most important factors determining disclosures of past crimes, taking into consideration both the type of therapy and the crime involved. Attitudes of MHPs varied with regard to confidentiality rules and when to breach confidentiality, and there was thus a lack of consensus as to when and whether past crimes should be reported. Hence, legal and ethical requirements concerning confidentiality breaches must be made clear and known to physicians in order to guide them with difficult cases.

  9. Privacy and confidentiality: perspectives of mental health consumers and carers in pharmacy settings.

    Science.gov (United States)

    Hattingh, Hendrika Laetitia; Knox, Kathy; Fejzic, Jasmina; McConnell, Denise; Fowler, Jane L; Mey, Amary; Kelly, Fiona; Wheeler, Amanda J

    2015-02-01

    The study aims to explore within the community pharmacy practice context the views of mental health stakeholders on: (1) current and past experiences of privacy, confidentiality and support; and (2) expectations and needs in relation to privacy and confidentiality. In-depth interviews and focus groups were conducted in three states in Australia, namely Queensland, the northern region of New South Wales and Western Australia, between December 2011 and March 2012. There were 98 participants consisting of consumers and carers (n = 74), health professionals (n = 13) and representatives from consumer organisations (n = 11). Participants highlighted a need for improved staff awareness. Consumers indicated a desire to receive information in a way that respects their privacy and confidentiality, in an appropriate space. Areas identified that require improved protection of privacy and confidentiality during pharmacy interactions were the number of staff having access to sensitive information, workflow models causing information exposure and pharmacies' layout not facilitating private discussions. Challenges experienced by carers created feelings of isolation which could impact on care. This study explored mental health stakeholders' experiences and expectations regarding privacy and confidentiality in the Australian community pharmacy context. A need for better pharmacy staff training about the importance of privacy and confidentiality and strategies to enhance compliance with national pharmacy practice requirements was identified. Findings provided insight into privacy and confidentiality needs and will assist in the development of pharmacy staff training material to better support consumers with sensitive conditions. © 2014 Royal Pharmaceutical Society.

  10. Confidentiality Enhancement of Highly Sensitive Nuclear Data Using Steganography with Chaotic Encryption over OFDM Channel

    International Nuclear Information System (INIS)

    Mahmoud, S.; Ayad, N.; Elsayed, F.; Elbendary, M.

    2016-01-01

    Full text: Due to the widespread usage of the internet and other wired and wireless communication methods, the security of the transmitted data has become a major requirement. Nuclear knowledge is mainly built upon the exchange of nuclear information which is considered highly sensitive information, so its security has to be enhanced by using high level security mechanisms. Data confidentiality is concerned with the achievement of higher protection for confidential information from unauthorized disclosure or access. Cryptography and steganography are famous and widely used techniques that process information in order to achieve its confidentiality, but sometimes, when used individually, they don’t satisfy a required level of security for highly sensitive data. In this paper, cryptography is accompanied with steganography for constituting a multilayer security techniques that can strengthen the level of security of highly confidential nuclear data that are archived or transmitted through different channel types and noise conditions. (author)

  11. 19 CFR 206.47 - Limited disclosure of certain confidential business information under administrative protective...

    Science.gov (United States)

    2010-04-01

    ... business information under administrative protective order. 206.47 Section 206.47 Customs Duties UNITED STATES INTERNATIONAL TRADE COMMISSION NONADJUDICATIVE INVESTIGATIONS INVESTIGATIONS RELATING TO GLOBAL... Trade Act, the Secretary shall make confidential business information available to authorized applicants...

  12. Confidentiality and parental involvement in adolescent sexual and reproductive health care

    DEFF Research Database (Denmark)

    Jaruseviciene, Lina; Lazarus, Jeff; Zaborskis, Apolinaras

    2011-01-01

    AIM: We surveyed Lithuanian general practitioners' (GPs) views on the importance of confidentiality for adolescents and on their practices in informing parents about sexual and reproductive health consultations with this age group. METHODS: In this cross-sectional study, a 41-item questionnaire...... was sent to a random sample of 607 Lithuanian GPs. The purpose of this questionnaire was to gain knowledge about current practices of GPs in informing parents on the importance of confidentiality as well as in protecting the privacy of minors. GPs' knowledge of the current legal age limit...... of confidentiality protection in patient-provider settings was also assessed. RESULTS: Although 67.5% of the responding GPs (response rate 73.5%) stated that they inform the parents or guardians of adolescent patients about the importance of confidentiality, 82.9% of them only did so if the opportunity arose. When...

  13. 21 CFR 822.23 - Is the information in my submission considered confidential?

    Science.gov (United States)

    2010-04-01

    ... with the Freedom of Information Act. We will continue to protect trade secret and confidential... patients. You may wish to indicate in your submission which information you consider trade secret or...

  14. Confidentiality Protections for Adolescents and Young Adults in the Health Care Billing and Insurance Claims Process.

    Science.gov (United States)

    2016-03-01

    The importance of protecting confidential health care for adolescents and young adults is well documented. State and federal confidentiality protections exist for both minors and young adults, although the laws vary among states, particularly for minors. However, such confidentiality is potentially violated by billing practices and in the processing of health insurance claims. To address this problem, policies and procedures should be established so that health care billing and insurance claims processes do not impede the ability of providers to deliver essential health care services on a confidential basis to adolescents and young adults covered as dependents on a family's health insurance plan. Copyright © 2016 Society for Adolescent Health and Medicine. Published by Elsevier Inc. All rights reserved.

  15. Confidential close call reporting system (C3RS) lessons learned team baseline phase report.

    Science.gov (United States)

    2015-05-01

    The Federal Railroad Administration (FRA) has established a program called the Confidential Close Call Reporting System : (C3 : RS), which allows events to be reported anonymously and dealt with non-punitively and without fear or reprisal through : s...

  16. Confidential close call reporting system (C3RS) lessons learned team baseline phased report

    Science.gov (United States)

    2015-05-08

    The Federal Railroad Administration (FRA) has established a program called the Confidential Close Call Reporting System : (C3RS), which allows events to be reported anonymously and dealt with non-punitively and without fear or reprisal through : stru...

  17. Developing an effective corrective action process : lessons learned from operating a confidential close call reporting system

    Science.gov (United States)

    2013-03-05

    In 2007, the Federal Railroad Administration (FRA) launched : C3RS, the Confidential Close Call Reporting System, as a : demonstration project to learn how to facilitate the effective : reporting and implementation of corrective actions, and assess t...

  18. 76 FR 77224 - Access to Confidential Business Information by Primus Solutions, Inc.

    Science.gov (United States)

    2011-12-12

    ... From the Federal Register Online via the Government Publishing Office ENVIRONMENTAL PROTECTION AGENCY Access to Confidential Business Information by Primus Solutions, Inc. AGENCY: Environmental Protection Agency (EPA). ACTION: Notice. SUMMARY: EPA has authorized its contractor, Primus Solutions, Inc...

  19. 75 FR 78238 - Access to Confidential Business Information by Science Applications International Corporation and...

    Science.gov (United States)

    2010-12-15

    ... Business Information by Science Applications International Corporation and Its Identified Subcontractors..., Science Applications International Corporation (SAIC) of San Diego, CA, and Its Identified Subcontractors... Control Act (TSCA). Some of the information may be claimed or determined to be Confidential Business...

  20. Design and realization of confidential data management system RFID-based

    Science.gov (United States)

    Huang, Wei; Wang, Zhong; Wang, Xin

    2017-03-01

    This paper introduces the composition of RFID system, and then analyzes the hardware design and software design systems, and finally summarizes the realization and application of the confidential data management system RFID-based.

  1. 75 FR 56096 - Access to Confidential Business Information by Industrial Economics Incorporated

    Science.gov (United States)

    2010-09-15

    ... ENVIRONMENTAL PROTECTION AGENCY [EPA-HQ-OPPT-2003-0004; FRL-8845-1] Access to Confidential Business Information by Industrial Economics Incorporated AGENCY: Environmental Protection Agency (EPA). ACTION: Notice. SUMMARY: EPA has authorized contractor, Industrial Economics Incorporated (IEI) of...

  2. Contractual Protection of Confidential Business Information: In Norwegian Employment- and Business Contracts

    OpenAIRE

    Coates, Sarah Lea

    2013-01-01

    Confidential information can be one of the most valuable assets in a business. By avoiding the disclosure of such information, companies are able to maintain their competitive advantage. The main purpose of this thesis is to establish how and to what extent companies can protect confidential business information by contractual regulations according to Norwegian law. This thesis was written with a scholarship from the research project "Nordic Restatement of Contract Law".

  3. THE POSSIBLE CONFIDENTIALITY: THE PUBLIC ADMINISTRATION AS PARTY IN THE ALTERNATIVE DISPUTE RESOLUTION MECHANISM

    Directory of Open Access Journals (Sweden)

    Carlos Alberto de Salles

    2017-05-01

    Full Text Available This article debates the tension that exists between confidentiality, usual in ADRs, and the publicity principle, that rules the Public Administration in Brazil. As a solution points that the parameter of confidentiality when Public Administration is a party must be the preservation of accountability of the involved agencies, what means, the capacity to answer to its own goals and to obey the public control.

  4. Nursing Students' Perceptions of Confidentiality, Accountability, and E-Professionalism in Relation to Facebook.

    Science.gov (United States)

    Barnable, Alexia; Cunning, Glenda; Parcon, Mariel

    This study examined nursing students' perceptions of confidentiality, accountability, and e-professionalism in relation to Facebook. All of the students were aware that posting patients' names and pictures of patients constituted a confidentiality breach. When comparing students based on educational status, there were differing opinions on whether employers should use Facebook profile information for hiring decisions. Nursing programs should provide current education, including clear and up-to-date policies, about social media use.

  5. Access to Confidential Alcohol Industry Documents: From ‘Big Tobacco’ to ‘Big Booze’

    Directory of Open Access Journals (Sweden)

    Ms Laura Bond

    2009-03-01

    Full Text Available BACKGROUND:Internal tobacco industry document searches have led to the discovery of hitherto unpublisheddocuments that provide insights into the drinks industry. The documents uncover key concerns andstrategies for the drinks industry with focus on the Miller Brewing Company and the Beer Institute.METHODS:The identification of the Philip Morris 1996 CEO Issues Book from the tobacco document archives led to asystematic search for alcohol-related documents. The search was conducted by entering alcohol-relatedterms into search fields of tobacco document archive sites available on the World Wide WebRESULTS:Key areas of concern for the Miller Brewing Company, the Beer Institute, and more broadly, the alcoholindustry include developments of legislative and regulatory controls such as tax increases, advertisingrestrictions and blood alcohol content lowering and public perceptions of harms relating to drunk driving,binge drinking and underage alcohol consumption. Strategies proposed by the Miller Brewing Companyand the Beer Institute to combat these concerns include ally development and maintenance and thepromotion of personal responsibility.CONCLUSIONS:These once confidential internal documents provide new evidence on the drinks industry’s concernsabout possible alcohol control measures and the strategies used to help overcome these concerns. The document findings justify the public health community’s cynicism about the alcohol industry whileproviding a new source of information to assist development in the regulation and control of the drinksindustry.

  6. When security and medicine missions conflict: confidentiality in prison settings.

    Science.gov (United States)

    Allen, Scott A; Aburabi, Raed

    2016-06-13

    Purpose - It is a simple fact that prisons cannot exist - practically, legally, ethically or morally - without the support of physicians and other health professionals. Access to adequate healthcare is one of the fundamental measures of the legitimacy of a jail or prison. At the same time, there is a fundamental tension in the missions of the prison and doctor. The primary mission of the prison is security and often punishment. Reform and rehabilitation have intermittently been stated goals of prisons in the last century, but in practice those humane goals have rarely governed prison administrative culture. The primary mission of the physician is to promote the health and welfare of his or her patient. The paper aims to discuss these issues. Design/methodology/approach - At times, what is required to serve the patient's best interest is at odds with the interests of security. Much of the work of the prison physician does not conflict with the operation of security. Indeed, much of the work of the prison physician is allowed to proceed without much interference from the security regime. But given the fundamental discord in the legitimate missions of security vs medicine, conflict between the doctor and the warden is inevitable. Findings - In this paper, the authors consider the example of patient confidentiality to illustrate this conflict, using case examples inspired by real cases from the experience of the authors. Originality/value - The authors provide an ethical and practical framework for health professionals to employ when confronting these inevitable conflicts in correctional settings.

  7. WTO confidential: the case of asbestos. World Trade Organization.

    Science.gov (United States)

    Castleman, Barry

    2002-01-01

    The World Trade Organization (WTO), created in 1995, adjudicates "trade disputes" between member nations in cases with great human rights, cultural, environmental, and public health significance. Throughout the process of dispute resolution and even after a case is concluded, very little of what happens is made accessible to the public. However, it is one thing to criticize the WTO for its lack of transparency from outside the process, and another to critically examine what was withheld from disclosure and what dangers that presents. This is the inside story from a scientific adviser to one of the parties in a WTO case, analyzing what happened from a public health point of view. This analysis concludes that the public health justification of banning asbestos was accepted in the end by the economists at the WTO, despite the WTO's bias in favoring the party (Canada) making the free trade challenge (to public health legislation, in this case) in numerous stages of the process, despite the WTO's utter lack of expertise in science, medicine, engineering, and public health, and despite important erroneous statements made to the WTO under the cover of confidentiality. Despite its result, this case illustrates that the WTO's threat to national sovereignty could never withstand the light of day, that the people of the world would reject this dangerous free trade fundamentalism if the limitations and dangers of the process were open for all to see.

  8. Assessment of Geographic Information Systems and Data Confidentiality Guidelines in STD Programs.

    Science.gov (United States)

    Bissette, Jennifer M; Stover, Jeffrey A; Newman, Lori M; Delcher, Philip Christopher; Bernstein, Kyle T; Matthews, Lindsey

    2009-01-01

    Advancements in technology, such as geographic information systems (GIS), expand sexually transmitted disease (STD) program capacity for data analysis and visualization, and introduce additional confidentiality considerations. We developed a survey to examine GIS use among STD programs and to better understand existing data confidentiality practices. A Web-based survey of eight to 22 questions, depending on program-specific GIS capacity, was e-mailed to all STD program directors through the National Coalition of STD Directors in November 2004. Survey responses were accepted until April 15, 2005. Eighty-five percent of the 65 currently funded STD programs responded to the survey. Of those, 58% used GIS and 54% used geocoding. STD programs that did not use GIS (42%) identified lack of training and insufficient staff as primary barriers. Mapping, spatial analyses, and targeting program interventions were the main reasons for geocoding data. Nineteen of the 25 programs that responded to questions related to statistical disclosure rules employed a numerator rule, and 56% of those used a variation of the "Rule of 5." Of the 28 programs that responded to questions pertaining to confidentiality guidelines, 82% addressed confidentiality of GIS data informally. Survey findings showed the increasing use of GIS and highlighted the struggles STD programs face in employing GIS and protecting confidentiality. Guidance related to data confidentiality and additional access to GIS software and training could assist programs in optimizing use of spatial data.

  9. THE PRINCIPLE OF CONFIDENTIALITY IN ARBITRATION. APPLICATION AND LIMITATIONS OF THE PRINCIPLE

    Directory of Open Access Journals (Sweden)

    Bazil Oglindă

    2015-11-01

    Full Text Available Over the years, arbitration has grown to be the preferred means of dispute resolution by commercial entities. One of the benefits that build the attraction for this system of dispute resolution was the principle of confidentiality. One issue that needs to be analyzed is about the reasons why confidentiality is so important in business. Confidentiality is a principle largely embraced in arbitration, but, as we will see, the principle is not an absolute one. There are a set of questions that needs to be answer to, like: Who is bound by the duty of confidentiality? Does this refer only to the parties or does it expands to other actors involved in the arbitral proceedings? What happens with the obligation of confidentiality when issues are brought before a court, taking in account the principle of open justice? We will see that in some countries are procedural laws allowing the courts to order an arbitration claim to be heard in public or in private. Another important aspect that has arisen in the last period is regarding the public policy and the protection of public interest as a limitation to confidentiality of arbitration. This is a sensitive matter especially when one of the parties is a state or a state entity. This study aims to explore the principle of confidentiality in arbitration by focusing on its domain and on its limits, both from the comparative approach and from the Romanian approach. Knowing all this aspects, we will realize the importance of having professional counseling when drafting an arbitration clause and how this can be the missing puzzle piece of your business.

  10. Eavesdropping-aware routing and spectrum allocation based on multi-flow virtual concatenation for confidential information service in elastic optical networks

    Science.gov (United States)

    Bai, Wei; Yang, Hui; Yu, Ao; Xiao, Hongyun; He, Linkuan; Feng, Lei; Zhang, Jie

    2018-01-01

    The leakage of confidential information is one of important issues in the network security area. Elastic Optical Networks (EON) as a promising technology in the optical transport network is under threat from eavesdropping attacks. It is a great demand to support confidential information service (CIS) and design efficient security strategy against the eavesdropping attacks. In this paper, we propose a solution to cope with the eavesdropping attacks in routing and spectrum allocation. Firstly, we introduce probability theory to describe eavesdropping issue and achieve awareness of eavesdropping attacks. Then we propose an eavesdropping-aware routing and spectrum allocation (ES-RSA) algorithm to guarantee information security. For further improving security and network performance, we employ multi-flow virtual concatenation (MFVC) and propose an eavesdropping-aware MFVC-based secure routing and spectrum allocation (MES-RSA) algorithm. The presented simulation results show that the proposed two RSA algorithms can both achieve greater security against the eavesdropping attacks and MES-RSA can also improve the network performance efficiently.

  11. METHODS FOR ASSESSING SECURITY THREATS CONFIDENTIAL INFORMATION FOR THE INFORMATION AND TELECOMMUNICATIONS SYSTEMS

    Directory of Open Access Journals (Sweden)

    E. V. Belokurova

    2015-01-01

    Full Text Available The article discusses the different approaches to assessing the safety of confidential information-term for information and telecommunication systems of various pre-appreciable destination in the presence of internal and external threats to its integrity and availability. The difficulty of ensuring the security of confidential information from exposure to information and telecommunication systems of external and internal threats at the present time, is of particular relevance. This problem is confirmed by the analysis of available statistical information on the impact of threats on the security circulating in the information and telecommunications system. Leak confidential information, intellectual property, information, know-how is the result of significant material and moral damage caused to the owner of the restricted information. The paper presents the structure of the indicators and criteria shows that the most promising are analytical criteria. However, their use to assess the level of security of confidential information is difficult due to the lack of appropriate mathematical models. The complexity of the problem is that existing traditional mathematical models are not always appropriate for the stated objectives. Therefore, it is necessary to develop mathematical models designed to assess the security of confidential information and its impact on information and telecommunication system threats.

  12. Confidentiality, 'no blame culture' and whistleblowing, non-physician practice and accountability.

    Science.gov (United States)

    White, Stuart M

    2006-12-01

    Confidentiality is a core tenet of medical professionalism, which enables the maintenance of trust in a doctor-patient relationship. However, both the amount of personal data stored and the number of third parties who might access this data have increased dramatically in the digital age, necessitating the introduction of various national data protection acts. Paradoxically, the Freedom of Information Act 2000 allows United Kingdom citizens to access information held by public bodies, including hospitals. Furthermore, the Public Interest Disclosure Act 1998 actively protects physicians who breach their duty of confidentiality in the name of public interest ('whistleblowing'). This article explores the evolution of the law and ethics in this area, and draws attention to the difficulties in balancing confidentiality against freedom of information. In addition, the role and responsibilities of the non-physician anaesthetist are examined.

  13. Paternalistic breaches of confidentiality in prison: mental health professionals' attitudes and justifications.

    Science.gov (United States)

    Elger, Bernice Simone; Handtke, Violet; Wangmo, Tenzin

    2015-06-01

    This manuscript presents mental health practitioners' (MHPs) practice, attitudes and justifications for breaching confidentiality when imprisoned patients disclose suicidal thoughts or abuse by others. 24 MHPs working in Swiss prisons shared their experiences regarding confidentiality practices. The data were analysed qualitatively and MHPs' attitudes and course of action were identified. Analysis revealed paternalistic breaches of confidentiality. When patients reported suicidal thoughts and abuse, MHPs believed that forgoing confidentiality is necessary to protect patients, providing several justifications for it. Patients were informed that such information will be transmitted without their consent to medical and non-medical prison personnel. With reference to suicidal attempts, MHPs resorted to methods that may reduce suicidal attempts such as transfer to hospital or internal changes in living arrangements, which would require provision of certain information to prison guards. In cases of abuse, some MHPs convinced patients to accept intervention or sometimes overrode competent patients' refusals to report. Also in the case of abuse, provision of limited information to other prison personnel was seen as an acceptable method to protect patients from further harm. Breaches of confidentiality, whether limited or full, remain unethical, when used for competent patients based solely on paternalistic justifications. Institutionalising ethical and legal procedures to address suicidal and abuse situations would be helpful. Education and training to help both medical and prison personnel to respond to such situations in an appropriate manner that ensures confidentiality and protects patients from suicide and abuse are necessary. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://group.bmj.com/group/rights-licensing/permissions.

  14. 48 CFR 1552.235-75 - Access to Toxic Substances Control Act Confidential Business Information (APR 1996).

    Science.gov (United States)

    2010-10-01

    ...: Access to Toxic Substances Control Act Confidential Business Information (APR 1996) In order to perform... 48 Federal Acquisition Regulations System 6 2010-10-01 2010-10-01 true Access to Toxic Substances Control Act Confidential Business Information (APR 1996). 1552.235-75 Section 1552.235-75 Federal...

  15. Confidentiality Protection of User Data and Adaptive Resource Allocation for Managing Multiple Workflow Performance in Service-Based Systems

    Science.gov (United States)

    An, Ho

    2012-01-01

    In this dissertation, two interrelated problems of service-based systems (SBS) are addressed: protecting users' data confidentiality from service providers, and managing performance of multiple workflows in SBS. Current SBSs pose serious limitations to protecting users' data confidentiality. Since users' sensitive data is sent in…

  16. 21 CFR 860.5 - Confidentiality and use of data and information submitted in connection with classification and...

    Science.gov (United States)

    2010-04-01

    ... 21 Food and Drugs 8 2010-04-01 2010-04-01 false Confidentiality and use of data and information... DEVICE CLASSIFICATION PROCEDURES General § 860.5 Confidentiality and use of data and information... for public disclosure and the use by the Commissioner of data and information submitted to...

  17. 20 CFR 402.90 - Exemption four for withholding records: Trade secrets and confidential commercial or financial...

    Science.gov (United States)

    2010-04-01

    ... four for withholding records: Trade secrets and confidential commercial or financial information. We will withhold trade secrets and commercial or financial information that is obtained from a person and is privileged or confidential. (a) Trade secrets. A trade secret is a secret, commercially valuable...

  18. 36 CFR 902.54 - Trade secrets and commercial or financial information that is privileged or confidential.

    Science.gov (United States)

    2010-07-01

    ... or financial information that is privileged or confidential. 902.54 Section 902.54 Parks, Forests... information that is privileged or confidential. (a) Trade secrets and commercial or financial information that... within the statutory exemption. This includes the following: (1) Commercial or financial information not...

  19. 21 CFR 20.61 - Trade secrets and commercial or financial information which is privileged or confidential.

    Science.gov (United States)

    2010-04-01

    ... secrets and commercial or financial information which is privileged or confidential. (a) A trade secret... the productive process. (b) Commercial or financial information that is privileged or confidential... 21 Food and Drugs 1 2010-04-01 2010-04-01 false Trade secrets and commercial or financial...

  20. 29 CFR 4901.24 - Special rules for trade secrets and confidential commercial or financial information submitted to...

    Science.gov (United States)

    2010-07-01

    ... or financial information submitted to the PBGC. 4901.24 Section 4901.24 Labor Regulations Relating to... Special rules for trade secrets and confidential commercial or financial information submitted to the PBGC... secret or is commercial or financial information that is privileged or confidential. Facts asserted...

  1. Lithuanian general practitioners' knowledge of confidentiality laws in adolescent sexual and reproductive healthcare: a cross-sectional study

    DEFF Research Database (Denmark)

    Lazarus, Jeff; Jaruseviciene, Lina; Liljestrand, Jerker

    2008-01-01

    In Lithuania, the legislation addressing confidentiality in adolescent healthcare is contradictory and vague. Previous studies have also revealed that medico-legal knowledge among physicians is poor, and attitudes play a correspondingly greater role than legal knowledge in ensuring the confidenti...

  2. 49 CFR 40.321 - What is the general confidentiality rule for drug and alcohol test information?

    Science.gov (United States)

    2010-10-01

    ... Transportation PROCEDURES FOR TRANSPORTATION WORKPLACE DRUG AND ALCOHOL TESTING PROGRAMS Confidentiality and Release of Information § 40.321 What is the general confidentiality rule for drug and alcohol test... DOT drug or alcohol testing process, you are prohibited from releasing individual test results or...

  3. 76 FR 9012 - Access to Confidential Business Information by Electronic Consulting Services, Inc.

    Science.gov (United States)

    2011-02-16

    ...EPA has authorized its contractor, Electronic Consulting Services, Inc. (ECS) of Fairfax, VA, to access information which has been submitted to EPA under all sections of the Toxic Substances Control Act (TSCA). Some of the information may be claimed or determined to be Confidential Business Information (CBI).

  4. 20 CFR 603.4 - What is the confidentiality requirement of Federal UC law?

    Science.gov (United States)

    2010-04-01

    ... 20 Employees' Benefits 3 2010-04-01 2010-04-01 false What is the confidentiality requirement of Federal UC law? 603.4 Section 603.4 Employees' Benefits EMPLOYMENT AND TRAINING ADMINISTRATION, DEPARTMENT....C. 502(a)), State law must include provision for such methods of administration as are found by the...

  5. Canadian policy makers' views on pharmaceutical reimbursement contracts involving confidential discounts from drug manufacturers.

    Science.gov (United States)

    Morgan, Steven G; Thomson, Paige A; Daw, Jamie R; Friesen, Melissa K

    2013-10-01

    Pharmaceutical policy makers are increasingly negotiating reimbursement contracts that include confidential price terms that may be affected by drug utilization volumes, patterns, or outcomes. Though such contracts may offer a variety of benefits, including the ability to tie payment to the actual performance of a product, they may also create potential policy challenges. Through telephone interviews about this type of contract, we studied the views of officials in nine of ten Canadian provinces. Use of reimbursement contracts involving confidential discounts is new in Canada and ideas about power and equity emerged as cross-cutting themes in our interviews. Though confidential rebates can lower prices and thereby increase coverage of new medicines, several policy makers felt they had little power in the decision to negotiate rebates. Study participants explained that the recent rise in the use of rebates had been driven by manufacturers' pricing tactics and precedent set by other jurisdictions. Several policy makers expressed concerns that confidential rebates could result in inter-jurisdictional inequities in drug pricing and coverage. Policy makers also noted un-insured and under-insured patients must pay inflated "list prices" even if rebates are negotiated by drug plans. The establishment of policies for disciplined negotiations, inter-jurisdictional cooperation, and provision of drug coverage for all citizens are potential solutions to the challenges created by this new pharmaceutical pricing paradigm. Copyright © 2013 The Authors. Published by Elsevier Ireland Ltd.. All rights reserved.

  6. 77 FR 66977 - Access by EPA Contractors to Information Claimed as Confidential Business Information (CBI...

    Science.gov (United States)

    2012-11-08

    ... AGENCY Access by EPA Contractors to Information Claimed as Confidential Business Information (CBI... authorize various contractors to access information which will be submitted to EPA under Title II of the...). Access to this information, which is related to 40 CFR Part 79; 40 CFR Part 80; and 40 CFR Part 98...

  7. 75 FR 60452 - Clean Water Act; Contractor Access to Confidential Business Information

    Science.gov (United States)

    2010-09-30

    ... AGENCY Clean Water Act; Contractor Access to Confidential Business Information AGENCY: Environmental... CWA. Transfer of the information will allow the contractors and subcontractors to access information... its personnel who require access to information claimed as CBI to sign written non-disclosure...

  8. Cyber-Security Challenges with SMEs in Developing Economies: Issues of Confidentiality, Integrity & Availability (CIA)

    DEFF Research Database (Denmark)

    Yeboah-Boateng, Ezer Osei

    , to develop customer-centric strategies. While connectivity is indispensable for achieving business success, being connected also implies being exposed to a myriad of cyber-security challenges, such as vulnerabilities of confidentiality, integrity and availability (CIA). As vulnerabilities are exploited...

  9. 49 CFR 659.11 - Confidentiality of investigation reports and security plans.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 7 2010-10-01 2010-10-01 false Confidentiality of investigation reports and security plans. 659.11 Section 659.11 Transportation Other Regulations Relating to Transportation (Continued) FEDERAL TRANSIT ADMINISTRATION, DEPARTMENT OF TRANSPORTATION RAIL FIXED GUIDEWAY SYSTEMS; STATE...

  10. Ensuring Confidentiality of Geocoded Health Data: Assessing Geographic Masking Strategies for Individual-Level Data

    Directory of Open Access Journals (Sweden)

    Paul A. Zandbergen

    2014-01-01

    Full Text Available Public health datasets increasingly use geographic identifiers such as an individual’s address. Geocoding these addresses often provides new insights since it becomes possible to examine spatial patterns and associations. Address information is typically considered confidential and is therefore not released or shared with others. Publishing maps with the locations of individuals, however, may also breach confidentiality since addresses and associated identities can be discovered through reverse geocoding. One commonly used technique to protect confidentiality when releasing individual-level geocoded data is geographic masking. This typically consists of applying a certain amount of random perturbation in a systematic manner to reduce the risk of reidentification. A number of geographic masking techniques have been developed as well as methods to quantity the risk of reidentification associated with a particular masking method. This paper presents a review of the current state-of-the-art in geographic masking, summarizing the various methods and their strengths and weaknesses. Despite recent progress, no universally accepted or endorsed geographic masking technique has emerged. Researchers on the other hand are publishing maps using geographic masking of confidential locations. Any researcher publishing such maps is advised to become familiar with the different masking techniques available and their associated reidentification risks.

  11. Ensuring Confidentiality of Geocoded Health Data: Assessing Geographic Masking Strategies for Individual-Level Data.

    Science.gov (United States)

    Zandbergen, Paul A

    2014-01-01

    Public health datasets increasingly use geographic identifiers such as an individual's address. Geocoding these addresses often provides new insights since it becomes possible to examine spatial patterns and associations. Address information is typically considered confidential and is therefore not released or shared with others. Publishing maps with the locations of individuals, however, may also breach confidentiality since addresses and associated identities can be discovered through reverse geocoding. One commonly used technique to protect confidentiality when releasing individual-level geocoded data is geographic masking. This typically consists of applying a certain amount of random perturbation in a systematic manner to reduce the risk of reidentification. A number of geographic masking techniques have been developed as well as methods to quantity the risk of reidentification associated with a particular masking method. This paper presents a review of the current state-of-the-art in geographic masking, summarizing the various methods and their strengths and weaknesses. Despite recent progress, no universally accepted or endorsed geographic masking technique has emerged. Researchers on the other hand are publishing maps using geographic masking of confidential locations. Any researcher publishing such maps is advised to become familiar with the different masking techniques available and their associated reidentification risks.

  12. 40 CFR 1601.26 - Special procedures for confidential business information.

    Science.gov (United States)

    2010-07-01

    ... described in paragraph (c) of this section, the CSB shall, to the extent permitted by law, afford a business... business information. 1601.26 Section 1601.26 Protection of Environment CHEMICAL SAFETY AND HAZARD... Requesting and Disclosing Records § 1601.26 Special procedures for confidential business information. (a) In...

  13. 22 CFR 1101.5 - Security, confidentiality and protection of records.

    Science.gov (United States)

    2010-04-01

    ... records. 1101.5 Section 1101.5 Foreign Relations INTERNATIONAL BOUNDARY AND WATER COMMISSION, UNITED... administrative, technical and physical safeguards to ensure the security and confidentiality of records and to... maintained. (b) When maintained in manual form (typed, printed, handwritten, etc.) records shall be...

  14. HIV testing sites' communication about adolescent confidentiality: potential barriers and facilitators to testing.

    Science.gov (United States)

    Hyden, Christel; Allegrante, John P; Cohall, Alwyn T

    2014-03-01

    This study sought to evaluate HIV testing locations in New York City in terms of staff communication of confidentiality policies for adolescent clients. Using the New York State Directory of HIV Counseling and Testing Resources as a sampling frame, this study made telephone contact with 164 public HIV testing locations in New York City and used a semistructured interview to ask questions about confidentiality, parental permission, and parent access to test results. At 48% of locations, either HIV testing was not offered or we were unable to reach a staff member to ask questions about testing options and confidentiality. At the remaining sites, information provided regarding confidentiality, parental consent, and privacy of test results was correct only 69% to 85% of the time. Additionally, 23% of sites successfully contacted offered testing exclusively between 9:00 a.m. and 3:00 p.m. weekdays, when most adolescents are in school. Our findings point to a need for increased training and quality control at the clinical level to ensure that consumers in need of HIV testing are provided with accurate information and accessible services. Furthermore, these results highlight the need for more "patient-centric" sites with enhanced accessibility for potential clients, particularly youth.

  15. 19 CFR 206.66 - Limited disclosure of certain confidential business information under administrative protective...

    Science.gov (United States)

    2010-04-01

    ... business information under administrative protective order. 206.66 Section 206.66 Customs Duties UNITED STATES INTERNATIONAL TRADE COMMISSION NONADJUDICATIVE INVESTIGATIONS INVESTIGATIONS RELATING TO GLOBAL... section 422(b) of the Trade Act, the Secretary shall make confidential business information available to...

  16. 77 FR 13124 - Disclosure of Confidential Business Information Obtained Under the Comprehensive Environmental...

    Science.gov (United States)

    2012-03-05

    ... the agency, or (ii) Each affected business is informed of those disclosures under this paragraph (h)(3... will provide adequate protection to the interests of affected businesses. Pursuant to 40 CFR 2.310(h)(4... AGENCY Disclosure of Confidential Business Information Obtained Under the Comprehensive Environmental...

  17. The Psychological Competence of Police Officers in Confidential Cooperation with Citizens

    Science.gov (United States)

    Uspanov, Zholdybai T.; Turabayeva, Dana S.; Ermolovich, Vladimir F.

    2016-01-01

    This research studied the psychological aspects of citizens' assistance to law enforcement agencies on a confidential basis. The comprehensive observance of the psychological norms of cooperation is determined by the professional ethics of police officers, the necessity of nondisclosure of investigation secrets by citizens, and the security of the…

  18. The Confidentiality of Medical Secrets of Patients by the Nursing Staff

    Directory of Open Access Journals (Sweden)

    Chalkias Theodoros

    2010-01-01

    Full Text Available In this article you will find a critical discussion about the significance of confidentiality of "medical secrets" (keeping the secrets of ill people by nurses. Special cases are mentioned regarding the need to keep, or reveal the secret.

  19. 75 FR 46948 - Medicare Program; Listening Session Regarding Confidential Feedback Reports and the...

    Science.gov (United States)

    2010-08-04

    ...] Medicare Program; Listening Session Regarding Confidential Feedback Reports and the Implementation of a... Services (CMS), HHS. ACTION: Notice of meeting. SUMMARY: This notice announces a listening session being... modifier to the fee- for-service physician fee schedule. The purpose of the listening session is to solicit...

  20. 22 CFR 212.38 - Predisclosure notification procedures for confidential commercial information.

    Science.gov (United States)

    2010-04-01

    ... 22 Foreign Relations 1 2010-04-01 2010-04-01 false Predisclosure notification procedures for confidential commercial information. 212.38 Section 212.38 Foreign Relations AGENCY FOR INTERNATIONAL DEVELOPMENT PUBLIC INFORMATION Access to Agency Records § 212.38 Predisclosure notification procedures for...

  1. Teaching Journalism Students about Confidential Whistleblower Sources: An Analysis of Introductory News Writing Textbooks

    Science.gov (United States)

    Huxford, John; Moore, Maria A.

    2011-01-01

    Whistleblowers are a key journalistic source for many current news stories. However, reporters pursuing these major stories must navigate the dilemma between transparent full disclosure and protecting their confidential source. Professional journalists begin their journey as students, and students begin their journey in the classroom with a…

  2. 40 CFR 370.64 - What information can I claim as trade secret or confidential?

    Science.gov (United States)

    2010-07-01

    ... secret or confidential? (a) Trade secrets. You may be able to withhold the name of a specific chemical... trade secret. The requirements for withholding trade secret information are set forth in EPCRA section... trade secret in accordance with trade secrecy requirements, you must report the generic class or...

  3. 18 CFR 401.75 - Protection of trade secrets; Confidential information.

    Science.gov (United States)

    2010-04-01

    ... to Decisions of the Executive Director in Water Qualtity Cases § 401.75 Protection of trade secrets; Confidential information. No person shall be required in such report to divulge trade secrets or secret... relates to the trade secrets, processes, operations, style of work, or apparatus, or to the identity...

  4. 5 CFR 213.3301 - Positions of a confidential or policy-determining nature.

    Science.gov (United States)

    2010-01-01

    ... 5 Administrative Personnel 1 2010-01-01 2010-01-01 false Positions of a confidential or policy-determining nature. 213.3301 Section 213.3301 Administrative Personnel OFFICE OF PERSONNEL MANAGEMENT CIVIL... or policy-determining nature. (a) Upon specific authorization by OPM, agencies may make appointments...

  5. 42 CFR 2.2 - Statutory authority for confidentiality of alcohol abuse patient records.

    Science.gov (United States)

    2010-10-01

    ... by section 333 of the Comprehensive Alcohol Abuse and Alcoholism Prevention, Treatment, and... connection with the performance of any program or activity relating to alcoholism or alcohol abuse education... 42 Public Health 1 2010-10-01 2010-10-01 false Statutory authority for confidentiality of alcohol...

  6. 12 CFR 366.13 - What is my obligation regarding confidential information?

    Science.gov (United States)

    2010-01-01

    ... services on your behalf may use or disclose information obtained from us or a third party in connection... general public. (b) The following are examples of when your use of confidential information is... financial information, such as a financial statement to an unauthorized party. ...

  7. 21 CFR 20.55 - Indexing trade secrets and confidential commercial or financial information.

    Science.gov (United States)

    2010-04-01

    ... or financial information. 20.55 Section 20.55 Food and Drugs FOOD AND DRUG ADMINISTRATION, DEPARTMENT OF HEALTH AND HUMAN SERVICES GENERAL PUBLIC INFORMATION Procedures and Fees § 20.55 Indexing trade secrets and confidential commercial or financial information. Whenever the Food and Drug Administration...

  8. 75 FR 29754 - Claims of Confidentiality of Certain Chemical Identities Contained in Health and Safety Studies...

    Science.gov (United States)

    2010-05-27

    ... Submitted Under the Toxic Substances Control Act AGENCY: Environmental Protection Agency (EPA). ACTION... Toxic Substances Control Act (TSCA) in accordance with Agency regulations at 40 CFR part 2, subpart B... on similar efforts regarding confidentiality of chemical identities listed on the public version of...

  9. 77 FR 76028 - Access to Confidential Business Information by Science Applications International Corporation and...

    Science.gov (United States)

    2012-12-26

    ... Business Information by Science Applications International Corporation and Its Identified Subcontractor...: EPA has authorized its contractor, Science Applications International Corporation (SAIC) of McLean, VA... information may be claimed or determined to be Confidential Business Information (CBI). DATES: Access to the...

  10. 78 FR 66697 - Access to Confidential Business Information by Science Applications International Corporation and...

    Science.gov (United States)

    2013-11-06

    ... Business Information by Science Applications International Corporation and Its Identified Subcontractors..., Science Applications International Corporation (SAIC) of McLean, VA, and its subcontractors to access...). Some of the information may have been claimed or determined to be Confidential Business Information...

  11. 17 CFR 145.9 - Petition for confidential treatment of information submitted to the Commission.

    Science.gov (United States)

    2010-04-01

    ... may summarily reject the submitter's request for confidential treatment with leave to the submitter to... treatment of information submitted to the Commission. 145.9 Section 145.9 Commodity and Securities Exchanges... treatment of information submitted to the Commission. (a) Purpose. This section provides a procedure by...

  12. 21 CFR 1316.23 - Confidentiality of identity of research subjects.

    Science.gov (United States)

    2010-04-01

    ... 21 Food and Drugs 9 2010-04-01 2010-04-01 false Confidentiality of identity of research subjects. 1316.23 Section 1316.23 Food and Drugs DRUG ENFORCEMENT ADMINISTRATION, DEPARTMENT OF JUSTICE ADMINISTRATIVE FUNCTIONS, PRACTICES, AND PROCEDURES Protection of Researchers and Research Subjects § 1316.23...

  13. 6 CFR 25.10 - Confidentiality and protection of Intellectual Property.

    Science.gov (United States)

    2010-01-01

    ... protection of Intellectual Property. (a) General. The Secretary, in consultation with the Office of... 6 Domestic Security 1 2010-01-01 2010-01-01 false Confidentiality and protection of Intellectual Property. 25.10 Section 25.10 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY...

  14. 77 FR 109 - Inquiry To Learn Whether Businesses Assert Business Confidentiality Claims Regarding Waste Import...

    Science.gov (United States)

    2012-01-03

    ... definition of ``affected business,'' and are not covered by today's notice. They consist of any business that... today's notice. They consist of any business that actually submitted information responsive to a FOIA... Businesses Assert Business Confidentiality Claims Regarding Waste Import and Export AGENCY: Environmental...

  15. 75 FR 44951 - Inquiry To Learn Whether Businesses Assert Business Confidentiality Claims

    Science.gov (United States)

    2010-07-30

    ... are not covered by today's notice. They consist of any business that actually submitted to EPA any... definition of ``affected business,'' and are not covered by today's notice. They consist of any business that... Businesses Assert Business Confidentiality Claims AGENCY: Environmental Protection Agency (EPA). ACTION...

  16. 76 FR 362 - Inquiry To Learn Whether Businesses Assert Business Confidentiality Claims

    Science.gov (United States)

    2011-01-04

    ...,'' and are not covered by today's notice. They consist of any business that actually submitted to EPA any... today's notice. They consist of any business that actually submitted information responsive to a FOIA... Businesses Assert Business Confidentiality Claims AGENCY: Environmental Protection Agency (EPA). ACTION...

  17. 77 FR 25475 - Inquiry To Learn Whether Businesses Assert Business Confidentiality Claims Regarding Waste Import...

    Science.gov (United States)

    2012-04-30

    ... meet the definition of ``affected business,'' and are not covered by today's notice. They consist of..., however, do not meet the definition of ``affected business,'' and are not covered by today's notice. They... Businesses Assert Business Confidentiality Claims Regarding Waste Import and Export AGENCY: Environmental...

  18. 78 FR 2669 - Waste Import and Export; Inquiry To Learn Whether Businesses Assert Business Confidentiality Claims

    Science.gov (United States)

    2013-01-14

    ... definition of ``affected business,'' and are not covered by today's notice. They consist of any business that... ``affected business,'' and are not covered by today's notice. They consist of any business that actually...; Inquiry To Learn Whether Businesses Assert Business Confidentiality Claims AGENCY: Environmental...

  19. 75 FR 4812 - Inquiry To Learn Whether Businesses Assert Business Confidentiality Claims

    Science.gov (United States)

    2010-01-29

    ..., however, do not meet the definition of ``affected business,'' and are not covered by today's notice. They... today's notice. They consist of any business that actually submitted information responsive to a FOIA... Businesses Assert Business Confidentiality Claims AGENCY: Environmental Protection Agency (EPA). ACTION...

  20. Adolescents' and Young Adults' Reports of Barriers to Confidential Health Care and Receipt of Contraceptive Services.

    Science.gov (United States)

    Fuentes, Liza; Ingerick, Meghan; Jones, Rachel; Lindberg, Laura

    2018-01-01

    The purpose of this study was to describe adolescents' and young adults' concerns about confidential reproductive health care and experience with time alone with a provider, and examine the association of these confidentiality issues with receipt of contraceptive services. Data from the 2013 to 2015 National Survey of Family Growth were analyzed using Poisson regression to describe 15- to 25-year-olds' confidential reproductive health-care concerns and time alone with a provider at last health-care visit according to sociodemographic characteristics. We also assessed whether confidentiality issues were associated with obtaining contraceptive services among females. Concerns about confidential reproductive health care were less common among 15- to 17-year-olds who were covered by Medicaid compared to their parents' private insurance (adjusted risk ratio [ARR] = .61, confidence interval [CI] .41-.91) and had high-school graduate mothers compared to college-graduate mothers (ARR = .68, CI .47-.99), and were more common among those who lived with neither parent compared to living with both parents (ARR = 2.0, CI 1.27-3.16). Time alone with a provider was more common among black girls than white girls (ARR = 1.57, CI 1.11-2.22) and less common among girls covered by Medicaid than those with parents' private insurance (ARR = .72, CI .56-.92). Time alone was less common among boys living with neither parent compared to living with two parents (ARR = .48, CI .25-.91) and with high-school graduate mothers compared to college-graduate mothers (ARR = .59, CI .42-.84). Among sexually experienced girls and women, confidentiality concerns were associated with a reduced likelihood of having received a contraceptive service in the past year. Greater efforts are needed to support young Americans in receiving confidential care. Copyright © 2017 The Society for Adolescent Health and Medicine. Published by Elsevier Inc. All rights reserved.

  1. 48 CFR 1452.215-71 - Use and Disclosure of Proposal Information-Department of the Interior.

    Science.gov (United States)

    2010-10-01

    ... Text of Provisions and Clauses 1452.215-71 Use and Disclosure of Proposal Information—Department of the... trade commodities. (2) “Confidential commercial or financial information” means any business information... information contained in proposals include exemption (4), which covers “commercial and financial information...

  2. Analysis of the ethical aspects of professional confidentiality in dental practice

    Directory of Open Access Journals (Sweden)

    Cléa Adas Saliba Garbin

    2008-02-01

    Full Text Available From the point of view of deontological ethics, privacy is a moral right that patients are entitled to and it is bound to professional confidentiality. Otherwise, the information given by patients to health professionals would not be reliable and a trustable relationship could not be established. The aim of the present study was to assess, by means of questionnaires with open and closed questions, the awareness and attitudes of 100 dentists working in the city of Andradina, São Paulo State, Brazil, with respect to professional confidentiality in dental practice. Most dentists (91.43% reported to have instructed their assistants on professional confidentiality. However, 44.29% of the interviewees showed to act contradictorily as reported talking about the clinical cases of their patients to their friends or spouses. The great majority of professionals (98.57% believed that it is important to have classes on Ethics and Bioethics during graduation and, when asked about their knowledge of the penalties imposed for breach of professional confidentiality, only 48.57% of them declared to be aware of it. Only 28.57% of the interviewees affirmed to have exclusive access to the files; 67.14% reported that that files were also accessed by their secretary; 1.43% answered that their spouses also had access, and 2.86% did not answer. From the results of the present survey, it could be observed that, although dentists affirmed to be aware of professional confidentiality, their attitudes did not adhere to ethical and legal requirements. This stand of health professionals has contributed to violate professional ethics and the law itself, bringing problems both to the professional and to the patient.

  3. Knowledge and Perceptions of Health Workers' Training on Ethics, Confidentiality and Medico-Legal Issues.

    Science.gov (United States)

    Barnie, Bernard Asamoah; Forson, Paa Kobina; Opare-Addo, Mercy Naa Aduele; Appiah-Poku, John; Rhule, Gyikua Plange; Oduro, George; Adu-Sarkodie, Yaw; Donkor, Peter

    2015-02-01

    Health care delivery in recent times has become more complicated, as patients expect health personnel to not only provide professional services but be accountable as well. It is thus imperative that health personnel are aware of their responsibility to the patient and also sensitive to medico legal issues if quality health care is to be assured. The aim of the study was to assess the knowledge and perception of health care workers on their training in ethics, confidentiality and medico-legal issues. It was expected that the results would inform policy on the training of the health workers. A cross-sectional survey was conducted among some categories of health workers (Doctors, Nurses and Health care assistants) at the Accident and Emergency directorate of Komfo Anokye Teaching Hospital, Ghana. A self-administered questionnaire was used to elicit information on ethics, confidentiality and medico- legal issues. Data collected was analyzed using SPSS version 16. A total of 103 health care workers were enrolled on the study representing 96% response rate. The study revealed that 74% had knowledge on ethics, confidentiality and medico- legal concepts; and 35.4% of the respondents indicated that health workers attitudes to ethics, confidentiality and medico- legal concepts was inadequate. About 28.3% indicated that their attitudes were good while 26.3% indicated attitudes were adequate with only 2% indicating that attitudes were very good. Nearly, 49% of the respondents also indicated that training on medico-legal issues should be taught during formal training and also on-the-job. Knowledge of health workers on ethics confidentiality and medico-legal issues is high and their perceptions are positive. However, regular training to update their knowledge will be necessary in order to ensure continuous improvement of the quality of health care delivery.

  4. Analysis of the ethical aspects of professional confidentiality in dental practice.

    Science.gov (United States)

    Garbin, Cléa Adas Saliba; Garbin, Artênio José Isper; Saliba, Nemre Adas; de Lima, Daniela Coelho; de Macedo, Ana Paula Ayala

    2008-01-01

    From the point of view of deontological ethics, privacy is a moral right that patients are entitled to and it is bound to professional confidentiality. Otherwise, the information given by patients to health professionals would not be reliable and a trustable relationship could not be established. The aim of the present study was to assess, by means of questionnaires with open and closed questions, the awareness and attitudes of 100 dentists working in the city of Andradina, São Paulo State, Brazil, with respect to professional confidentiality in dental practice. Most dentists (91.43%) reported to have instructed their assistants on professional confidentiality. However, 44.29% of the interviewees showed to act contradictorily as reported talking about the clinical cases of their patients to their friends or spouses. The great majority of professionals (98.57%) believed that it is important to have classes on Ethics and Bioethics during graduation and, when asked about their knowledge of the penalties imposed for breach of professional confidentiality, only 48.57% of them declared to be aware of it. Only 28.57% of the interviewees affirmed to have exclusive access to the files; 67.14% reported that that files were also accessed by their secretary; 1.43% answered that their spouses also had access, and 2.86% did not answer. From the results of the present survey, it could be observed that, although dentists affirmed to be aware of professional confidentiality, their attitudes did not adhere to ethical and legal requirements. This stand of health professionals has contributed to violate professional ethics and the law itself, bringing problems both to the professional and to the patient.

  5. 5 CFR 2634.904 - Confidential filer defined.

    Science.gov (United States)

    2010-01-01

    ... Section 2634.904 Administrative Personnel OFFICE OF GOVERNMENT ETHICS GOVERNMENT ETHICS EXECUTIVE BRANCH... officer or employee in any other position determined by the designated agency ethics official to be of... requests for proposals for data processing equipment of significant value which is to be purchased by his...

  6. MEASUREMENT OF APPLICATION OF ISO 27001 OF CUSTOMER CELLULAR CARD CONFIDENTIALITY DATA IN PT. XYZ AREA JAKARTA

    Directory of Open Access Journals (Sweden)

    Krishna Rahadian

    2014-10-01

    Full Text Available The purpose of this study was to evaluate the effects of the process of ISO 27001 with respect to the confidentiality of customer cellular card Jakarta and to improve cellular card customer data confidentiality at PT.XYZ from data leakage of the customer data due to the third party involvement, clean-desk policy, and access right. Recommendation regarding the improvement is provided after reviewing the confidentiality of customer data. The survey in this study is conducted by questionnaire. From the evaluation results of the questionnaire, it is concluded that the larger customer data leaks are mainly caused by the external factors.

  7. To Tell, or Not to Tell; Confidentiality in an Iranian HIV Positive Patient: A Viewpoint

    Directory of Open Access Journals (Sweden)

    Mahshad Noroozi

    2017-08-01

    Full Text Available Confidentiality is a basic concept in medical ethics and protecting confidentiality is considered as physicians’ duty. In some occasions, this protection is in conflict with the right of the patient’s sexual partner, who should be informed about the possibility of being infected. The sexual partner being pregnant, the situation is going to be more complicated. In this paper, we present a case discussion with special ethical, legal, social, cultural, and religious aspects. According to this informing sexual partner with the patient’s assent, opt-out Human immunodeficiency virus (HIV screening in pregnant women and enhancing psychosocial and family support are highly recommended. Strategic changes in health system policies and regulations seem to be necessary as well.

  8. Biobanks in South Africa: A global perspective on privacy and confidentiality

    Directory of Open Access Journals (Sweden)

    Riaan Rheeder

    2017-05-01

    Full Text Available The Universal Declaration of Bioethics and Human Rights (UDBHR of the United Nations Educational, Scientific and Cultural Organization (UNESCO was adopted unanimously in 2005 by the world community as a universal guideline, according to which members of the global community were accountable to each other. Research results from UNESCO show that the UDBHR has had little or no impact in South Africa (SA. The primary objective of this article is to promote awareness of the UDBHR in SA and Africa by focusing on Article 9 of the Declaration, which accepts the right to privacy and confidentiality. For this objective to be relevant in the SA context, depends on whether the guidelines of the National Department of Health’s Ethics in Health Research: Principles, Processes and Structures of 2015 acknowledge biobanks of the universally accepted ethical guidelines on privacy and confidentiality of autonomous persons and whether these guidelines are broadly in accordance with global bioethical guidelines.

  9. Knowledge, attitudes and practice of confidentiality of patients' health records among health care professionals at Federal Medical Centre, Bida.

    Science.gov (United States)

    Adeleke, I T; Adekanye, A O; Adefemi, S A; Onawola, K A; Okuku, A G; Sheshi, E U; James-Adeniran, J A; Francis, M; Elegbe, T R O; Ayeni, A M; Tume, A A

    2011-01-01

    The quality of information shared with health care professionals depends on their ability to keep it confidential especially in this information technology age when unguided access is imminent. In view ofthis, the study described knowledge, attitude and practice of confidentiality of patients' health records amongst health care professionals at Federal Medical Centre Bida, Nigeria. A semi-structured self-administered.questionnaire on the subject was administered to 313 health professionals chosen by stratified random sampling in the hospital. Majority (161, 66.8%) of the participants were less than ten years in practice. Virtually, all (232, 96.3%) have heard about confidentiality mostly from schools (134, 55.6%), on-the-job (61, 25.3%) and from multiple sources (18, 7.5%). On responsibility for confidentiality; only 35 (14.5%) knew it is the responsibility of every health professional, while the majority; 117 (48.5%) felt it was exclusively meant for health information management professionals. Responses to issues on confidentiality range from 58.1% (revelation of documented next of kin to relatives of dead patients by staff) to 94.2% (employing the service of untrained interpreter). Very few (28, 11.6%) argued that confidentiality and privacy are not synonymous. Recommendations given to improve the practice of confidentiality include among others, observance of good health records practice by all professionals/stakeholders, continuing sensitisation of all staffandsanction against erring staff. Although, most professionals were aware of confidentiality, there appears a gap of in-depth knowledge and lack of awareness of respective responsibility towards it. However, they will do better if given the enabling environment and continuing education on the subject.

  10. Spatial confidentiality and GIS: re-engineering mortality locations from published maps about Hurricane Katrina

    Directory of Open Access Journals (Sweden)

    Leitner Michael

    2006-10-01

    Full Text Available Abstract Background Geographic Information Systems (GIS can provide valuable insight into patterns of human activity. Online spatial display applications, such as Google Earth, can democratise this information by disseminating it to the general public. Although this is a generally positive advance for society, there is a legitimate concern involving the disclosure of confidential information through spatial display. Although guidelines exist for aggregated data, little has been written concerning the display of point level information. The concern is that a map containing points representing cases of cancer or an infectious disease, could be re-engineered back to identify an actual residence. This risk is investigated using point mortality locations from Hurricane Katrina re-engineered from a map published in the Baton Rouge Advocate newspaper, and a field team validating these residences using search and rescue building markings. Results We show that the residence of an individual, visualized as a generalized point covering approximately one and half city blocks on a map, can be re-engineered back to identify the actual house location, or at least a close neighbour, even if the map contains little spatial reference information. The degree of re-engineering success is also shown to depend on the urban characteristic of the neighborhood. Conclusion The results in this paper suggest a need to re-evaluate current guidelines for the display of point (address level data. Examples of other point maps displaying health data extracted from the academic literature are presented where a similar re-engineering approach might cause concern with respect to violating confidentiality. More research is also needed into the role urban structure plays in the accuracy of re-engineering. We suggest that health and spatial scientists should be proactive and suggest a series of point level spatial confidentiality guidelines before governmental decisions are made

  11. Safeguarding critical e-documents implementing a program for securing confidential information assets

    CERN Document Server

    Smallwood, Robert F

    2012-01-01

    Practical, step-by-step guidance for corporations, universities and government agencies to protect and secure confidential documents and business records Managers and public officials are looking for technology and information governance solutions to "information leakage" in an understandable, concise format. Safeguarding Critical E-Documents provides a road map for corporations, governments, financial services firms, hospitals, law firms, universities and other organizations to safeguard their internal electronic documents and private communications.Provides practical, step-by-step guidance o

  12. Approaching confidentiality at a familial level in genomic medicine: a focus group study with healthcare professionals.

    Science.gov (United States)

    Dheensa, Sandi; Fenwick, Angela; Lucassen, Anneke

    2017-02-03

    Clinical genetics guidelines from 2011 conceptualise genetic information as confidential to families, not individuals. The normative consequence of this is that the family's interest is the primary consideration and genetic information is shared unless there are good reasons not to do so. We investigated healthcare professionals' (HCPs') views about, and reasoning around, individual and familial approaches to confidentiality and how such views influenced their practice. 16 focus groups with 80 HCPs working in/with clinical genetics services were analysed, drawing on grounded theory. Participants raised seven problems with, and arguments against, going beyond the individual approach to confidentiality. These problems fell into two overlapping categories: 'relationships' and 'structures'. Most participants had never considered ways to-or thought it was impossible to-treat familial genetic information and personal information differently. They worried that putting the familial approach into practice could disrupt family dynamics and erode patient trust in the health service. They also thought they had insufficient resources to share information and feared that sharing might change the standard of care and make them more vulnerable to liability. A familial approach to confidentiality has not been accepted or adopted as a standard, but wider research suggests that some of the problems HCPs perceived are surmountable and sharing in the interest of the family can be achieved. However, further research is needed to explore how personal and familial genetic information can be separated in practice. Our findings are relevant to HCPs across health services who are starting to use genome tests as part of their routine investigations. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://www.bmj.com/company/products-services/rights-and-licensing/.

  13. Confidentiality protections versus collaborative care in the treatment of substance use disorders

    OpenAIRE

    Manuel, Jennifer K; Newville, Howard; Larios, Sandra E; Sorensen, James L

    2013-01-01

    Abstract Practitioners in federally-assisted substance use disorder (SUD) treatment programs are faced with increasingly complex decisions when addressing patient confidentiality issues. Recent policy changes, intended to make treatment more available and accessible, are having an impact on delivery of SUD treatment in the United States. The addition of electronic health records provides opportunity for more rapid and comprehensive communication between patients’ primary and SUD ...

  14. Legislative Bans Analysis of the Confidential Citizens’ Assistance to the ORA According to the Contract

    Directory of Open Access Journals (Sweden)

    Tambovtsev A. I.

    2013-05-01

    Full Text Available The article deals with the research of legislative bans on drawing the citizens to confidential assistance according to the contract provided for by Article 17 “On operational search activity”. The author analyses different scientific standpoints concerning the reasons of such legislative restrictions, gives the legal and terminological evaluation of the notions used in the norm considered, offers his own approaches to the decision of some problems revealed

  15. A right to confidentiality or a duty to disclose? Ethical guidance for conducting prevention research with children and adolescents.

    Science.gov (United States)

    Hiriscau, Ioana E; Stingelin-Giles, Nicola; Stadler, Christina; Schmeck, Klaus; Reiter-Theil, Stella

    2014-06-01

    Conducting prevention research with children and adolescents raises ethical challenges especially regarding confidentiality. Research with children and adolescents often applies methodologies which aims at the disclosure of sensitive information about practices that impact on adolescent mental and physical health such as sexual activity, smoking, alcohol consumption, illegal drug use, self-damaging and suicidal behaviour (ideation and attempts). The scope of the article is to review normative documents that cover topics relevant for confidentiality when conducting research with children and adolescents. A systematic literature search in MEDLINE was performed to identify relevant international and European guidelines and codes of ethics that cover health, behavioural and social science research. Additionally, the European Research Ethics website was consulted for double check. However, none of the documents aimed at biomedical, behavioural or social research offers concrete support in resolving practical research ethics problems regarding confidentiality. The codes show a lack of clarity in any circumstances in which the researcher might have an obligation to breach confidentiality by disclosing sensitive information. Only little information is given on what kind of disclosed information, if disclosed, might justify breaching confidentiality. The findings prove a need for normative documents to address the ethical questions regarding confidentiality arising in research practice explicitly and specifically. Moreover, further forms of ethical guidance should be developed to support ethical research with children and adolescents.

  16. Thesis Proposal

    DEFF Research Database (Denmark)

    Sloth, Erik

    2010-01-01

    de konkrete forskningsprojekter. Denne ’omvendte’ argumentationsgang er begrundet i det faktum at ph.d. afhandlingens kerne netop er de forskningsbaserede artikler. Den teoretiske gennemgang fungerer således som en kontekstualisering af forskningsprojekterne. I den teoretiske gennemgang starter jeg......Strukturen i Thesis proposal er følgende: Først præsenteres mine konkrete empiriske forskningsprojekter som skal munde ud i afhandlingens artikler. Jeg præsenterer herefter de teoretiske overvejelser omkring oplevelsesbegrebet og forbrugerkulturteori som danner baggrund for at jeg er nået frem til...

  17. Public expectations concerning confidentiality protection of adolescents' sexual and reproductive health care in Lithuania: findings of the surveys conducted in 2005 and 2012.

    Science.gov (United States)

    Jaruseviciene, Lina; Zaborskis, Apolinaras; Lazarus, Jeffrey Victor

    2014-04-01

    An adolescent's right to confidential healthcare is protected by international law and professional consensus. However, parental and social support for confidential sexual and reproductive health (SRH) services, in particular, varies greatly. This study documents Lithuanian residents' expectations with regard to confidentiality protection for adolescents in this domain, and explores the factors related to the diversity of these expectations. Two national surveys of Lithuanian residents completed in 2005 and 2012 using anonymous questionnaires. Participants rated their expectations for confidentiality using a five-point Likert scale for eight types of SRH consultations. Public anticipation for confidentiality depended on whether issues related to sexual behaviour or to its consequences were addressed during adolescent consultation. Only younger respondents had higher expectations for confidentiality in both contexts. Public expectations regarding confidentiality were less demanding in 2012 than in 2005. The expectation of confidentiality protection was greater for topics related to sexual behaviour than for the consequences of sexual behaviour, such as pregnancy, abortion or a sexually transmitted infection. This implies a need for targeted information strategies for the general population and explicit guidance for physicians on when and for whom care should remain confidential.

  18. DLP: REDUCED RISK OF LEAKAGE OF CONFIDENTIAL INFORMATION OF THE BANK

    Directory of Open Access Journals (Sweden)

    T. A. Andryianava

    2017-01-01

    Full Text Available Research application of DLP-system for protection of confidential information, a methodology for adapting the DLP-system to the specific activities of the organization, comparative analysis of the results of standard and adapted DLP-systems in the Bank. Developed: a technique for analyzing information security events, algorithm for responding to identified events, methodology and procedures for adapting the standard DLP-system to the specifics of the Bank’s activities. The methodology for adapting a standard DLP-system to the specifics of the Bank’s work consists of the following activities: identification of critical corporate information categories, audit of information systems, description of current risks and their assessment, introduction of rules for Bank’s critical information and setting up a DLP system in accordance with the specifics of the Bank’s work. Modernization of the configuration of a standard DLP-system includes the following procedures: selection of confidential information of the Bank based on membership criteria, setting up detection, creating perimeters and developing an algorithm for responding to identified information security events in the Bank. The algorithm is designed to improve the efficiency of the response of information security officers in cases of incident detection and describes the stages of the subsequent actions. The results of the research prove that using an adapted DLP-system significantly reduces the number of false positives, increasing the accuracy of detecting confidential information and reducing the risk of leakage of critical information outside the corporate network. The application of the adapted DLP-system in the Bank allowed to increase the speed of response of information security specialists to the information security events detected by the DLP-system adapted to the Bank, and also allowed the DLP-system to transition from the copy mode to the blocking mode of illegitimate transfer

  19. Child deaths: confidential enquiry into the role and quality of UK primary care.

    Science.gov (United States)

    Harnden, Anthony; Mayon-White, Richard; Mant, David; Kelly, Deirdre; Pearson, Gale

    2009-11-01

    In 2006 the Confidential Enquiry into Maternal and Perinatal Deaths was extended to pilot a collection of child deaths. This helped optimise data collection for local safeguarding children's boards, which, since April 2008, have a statutory responsibility to review all child deaths. Reviewing primary care records may highlight areas in which systems, skills, and care could be improved. To review the role and quality of primary care in child deaths. Confidential enquiry into child deaths. Five regions of the UK: North-East, South-West and West Midlands, Wales, and Northern Ireland. The confidential enquiry collected core data for all child deaths (age range 28 days to 17 years) and an age-stratified sample was assessed by multidisciplinary panels for avoidable factors. An independent detailed review was conducted of the primary care records on all children in the North-East region and all children who were reviewed by panel in the other four regions. Primary care records were reviewed for 168 child deaths. There were 25 (15%) deaths from acute infection, 22 (13%) from cancer, and 11 (7%) from asthma or epilepsy. Fifty-nine (35%) deaths were sudden: sudden unexplained death in infancy, suicides, and assaults. Of 149 with immunisation records, only 88 (59%) had been fully vaccinated on time. One or more primary care professionals were involved in the management of 90 (54%) children. Avoidable primary care factors were identified in 18 (20%) of these deaths. Avoidable primary care factors included failure in the recognition and management of serious infection, failure to vaccinate, and inadequate management of asthma and epilepsy. Decisions made about diagnosis and management in primary care may affect the cause, time, and circumstances of a child's death. Maintaining skills in assessing the acutely ill child remains an essential part of good clinical practice.

  20. Practice points on three aspects of oil and gas property transactions - operatorship, confidentiality and title review

    International Nuclear Information System (INIS)

    Edwards, P.D.

    1999-01-01

    Practice points regarding three aspects of oil and gas property transactions were described. The first topic dealt with purchase and sale transactions and how to determine which party is entitled to act as the Operator following the sale of the Operator's interest. The second topic addressed issues of confidentiality in connection with oil and gas transactions. The final point discussed contractual provisions relating to title defects, along with their many variations and legal consequences. All three of these topics present issues which give rise to a surprising number of disputes, but which frequently receive only cursory attention in the negotiation and documentation of oil and gas transactions

  1. Using and Disclosing Confidential Patient Information and The English Common Law: What are the Information Requirements of a Valid Consent?

    Science.gov (United States)

    Chico, Victoria; Taylor, Mark J

    2018-02-01

    The National Health Service in England and Wales is dependent upon the flow of confidential patient data. In the context of consent to the use of patient health data, insistence on the requirements of an 'informed' consent that are difficult to achieve will drive reliance on alternatives to consent. Here we argue that one can obtain a valid consent to the disclosure of confidential patient data, such that this disclosure would not amount to a breach of the common law duty of confidentiality, having provided less information than would typically be associated with an 'informed consent'. This position protects consent as a practicable legal basis for disclosure from debilitating uncertainty or impracticability and, perhaps counter-intuitively, promotes patient autonomy.

  2. Medical liability, safety and confidentiality in maritime telemedicine--the MERMAID position on issues of importance.

    Science.gov (United States)

    Ladas, P; Giatagatzidis, P; Anogianakis, G; Maglavera, S

    1997-01-01

    Telemedicine dates to the days of "wireless telegraphy". As an "extraordinary" arrangement for medical services delivered at time of need, telemedicine has thus far escaped the developments that have taken place over the last 50 years in the areas of medical liability, safety and confidentiality. Today, however, telemedicine is also used to increase quality and cost effectiveness of healthcare provision. This trend is set by the U.S. where the U.S. federal government funds telemedicine at an annual rate of more than $100 million i.e., at a rate 30 times or more than what the EU does while state and local agency support and private business investment in telemedicine is 3 to 4 times larger than that of the U.S. federal government. In this respect it must be stressed that technology tends to satisfy the relevant demand for telecommunications. Telemedicine is used in diverse areas such as pathology, surgery, physical therapy, and psychiatry. It is expected to revolutionise health care in the coming decade and, therefore, it will certainly take into account requirements for medical liability, safety and confidentiality in the same way as traditional "establishment" medicine does.

  3. Biobanks in South Africa: A global perspective on privacy and confidentiality.

    Science.gov (United States)

    Rheeder, Riaan

    2017-04-25

    The Universal Declaration of Bioethics and Human Rights (UDBHR) of the United Nations Educational, Scientific and Cultural Organization (UNESCO) was adopted unanimously in 2005 by the world community as a universal guideline, according to which members of the global community were accountable to each other. Research results from UNESCO show that the UDBHR has had little or no impact in South Africa (SA). The primary objective of this article is to promote awareness of the UDBHR in SA and Africa by focusing on Article 9 of the Declaration, which accepts the right to privacy and confidentiality. For this objective to be relevant in the SA context, depends on whether the guidelines of the National Department of Health's Ethics in Health Research: Principles, Processes and Structures of 2015 acknowledge biobanks of the universally accepted ethical guidelines on privacy and confidentiality of autonomous persons and whether these guidelines are broadly in accordance with global bioethical guidelines.

  4. Chuukese Patients, Dual Role Interpreters, and Confidentiality: Exploring Clinic Interpretation Services for Reproductive Health Patients.

    Science.gov (United States)

    Smith, Sarah A

    2018-04-01

    This exploratory study analyzes limited English proficient (LEP) Chuukese patients' perspectives on dual-role interpreters in Guam and Chuuk. Methods included ethnographic observations of encounters with health care workers (HCWs) and 225 female Chuukese patients seeking reproductive healthcare in community health clinics: 126 women in Guam and 99 women in Chuuk. Ethnographic observations were supplemented by semi-structured interviews with 26 HCWs, and life history interviews with 15 Chuukese transnational migrant women. Notes from interview transcripts and observations were analyzed using critical interpretive and grounded theory. Findings demonstrated that Chuukese LEP patients need and at times want interpreters in order to understand their healthcare visits. In the absence of professional interpreters, ad-hoc interpreters (family interpreters and employees of the clinic) are an important resource. However, social and cultural concerns with community confidentiality influenced patient trust of staff interpreters. This lack of trust can limit access to health care overall, as some patients may avoid seeking care to prevent their confidential health information being disclosed. These complexities in interpretation must be considered in order for clinics to provide optimal care for the communities they serve.

  5. Contractual obligations and the sharing of confidential health information in sport.

    Science.gov (United States)

    Anderson, L

    2008-09-01

    As an employee, a sports doctor has obligations to their employer, but also professional and widely accepted obligations of a doctor to the patient (in this case the individual team member). The conflict is evident when sports doctors are asked by an athlete to keep personal health information confidential from the coach and team management, and yet both doctor and athlete have employment contracts specifying that such information shall be shared. Recent research in New Zealand shows that despite the presence of an employment contract, there appears to be a wide range of behaviours among sports doctors when an athlete requests that information about them be kept from team management. Many seem willing to honour requests to keep health information about the athlete confidential, thereby being in breach of the employment contract, while others insist on informing team management against the wishes of the athlete. There are a number of potential solutions to this dilemma from forcing doctors to meet their contractual obligations, to limiting the expectations of the employment contract. This paper suggests that at times it may be appropriate to do both, making the position of the doctor clearer and supporting the ability of this group to resist pressure by coaches and management through having a robust code of ethics.

  6. 78 FR 29753 - Agency Information Collection Activities; Proposed Collection; Comment Request for an Unmodified...

    Science.gov (United States)

    2013-05-21

    ... Request for an Unmodified OGE Form 450 Executive Branch Confidential Financial Disclosure Report AGENCY... Executive Branch Confidential Financial Disclosure Report to the Office of Management and Budget (OMB) for... Mr. Ledvina. SUPPLEMENTARY INFORMATION: Title: Executive Branch Confidential Financial Disclosure...

  7. Adolescent Substance Abuse in Mexico, Puerto Rico and The United States: Effect of Anonymous versus Confidential Survey Formats

    Science.gov (United States)

    Latimer, William W.; O'Brien, Megan S.; Vasquez, Marco A.; Medina-Mora, Maria Elena; Rios-Bedoya, Carlos F.; Floyd, Leah J.

    2006-01-01

    Anonymous surveys have been widely used worldwide to describe adolescent substance use yet cannot elucidate causal drug abuse predictors. Studies in the U.S. have generally found that anonymous and confidential surveys yield comparable levels of self-reported substance use, yet the effect of survey format on youth self-report has not been…

  8. 48 CFR 1552.235-73 - Access to Federal Insecticide, Fungicide, and Rodenticide Act Confidential Business Information...

    Science.gov (United States)

    2010-10-01

    ... 48 Federal Acquisition Regulations System 6 2010-10-01 2010-10-01 true Access to Federal Insecticide, Fungicide, and Rodenticide Act Confidential Business Information (APR 1996). 1552.235-73 Section... SOLICITATION PROVISIONS AND CONTRACT CLAUSES Texts of Provisions and Clauses 1552.235-73 Access to Federal...

  9. Tissue banking, patient rights, and confidentiality: tensions in law and policy.

    Science.gov (United States)

    Caulfield, T

    2004-01-01

    The collection, storage and analysis of tissue samples, including genetic data, has become an increasingly common part of biomedical research. Though there are many scientific justifications for the creation of tissue and DNA databanks, the storage and use of human tissue continues to create legal dilemmas. In this paper, the impact and relevance of existing common law principles are reviewed. It is noted that the Canadian common law rules covering consent and confidentiality may create challenges for the research community. Emerging health information legislation does, however, create a somewhat more lenient research environment, largely because these laws allow, in some circumstances, research on identifiable health information without consent. Nevertheless, conflicts between existing common law, research ethics policy and new health information legislation illustrate profound policy dilemmas created by research involving storage and use of tissue and genetic material.

  10. Taxpayers' confidentiality and privacy rights in the international exchange of tax information

    Directory of Open Access Journals (Sweden)

    Anđelković Mileva

    2014-01-01

    Full Text Available The exchange of tax information is a distinctive feature of international tax cooperation processes. The trend of intensive communication between the national tax administrations has been a political priority in economically developed countries. This area of international tax law has been subject to significant changes in the past few years. Countries are prompted to pursue the automatic exchange of tax information by entering into multilateral treaties on the exchange of tax information rather than engage in international exchange of tax information upon request by entering into bilateral agreements. These processes are promptly expedited owing to the incredible development of information and communication technologies. These developments are basically aimed at preventing different forms of international tax fraud which generate significant financial losses in the circumstances of current economic crisis. Such efforts may be justifiable regarding the interests of the countries of residence; but, what about the legal status of ordinary taxpayers who are now subject to a comprehensive and far-reaching control? The new concept may be appropriate for tracking tax fraud or embezzlement but what are its implications for law-abiding taxpayers? The national legislatures are obliged to provide for the protection of confidentiality of exchanged tax information but many states have not fully recognized the importance of providing adequate legal protection of sensitive personal and financial data. There are only a few countries whose legislations explicitly prescribe the taxpayers' right to be informed, the right to consult tax administration and the right to seek tax administration intervention as a form of legal protection in international exchange of tax information. The Serbian tax legislation does not envisage the obligation of tax authorities to notify the taxpayers about the request submitted by foreign tax authorities to provide some tax

  11. A Systematic Review on Confidentiality, Disclosure, and Stigma in the United States: Lessons for HIV Care in Pregnancy From Reproductive Genetics.

    Science.gov (United States)

    Wilkinson, Barbara; Arora, Kavita Shah

    2015-01-01

    The fields of HIV care in pregnancy and reproductive genetics have always been 'exceptional' in that patients are highly concerned about the potential for stigma and the corresponding need for privacy and confidentiality. However, the two fields have diverged in how they have addressed these concerns. The systematic review analyzed 61 manuscripts for similarities and differences between the fields of HIV care in pregnancy and reproductive genetics in the United States, with respect to privacy, confidentiality, disclosure, and stigma. The systematic review revealed that the field of HIV care in pregnancy has insufficiently addressed patient concerns about privacy, confidentiality, and stigma compared to the field of reproductive genetics. Failure to adequately protect confidentiality of HIV-positive patients, and failure to reduce stigma associated with HIV testing and treatment are deficiencies in the delivery of care to HIV-positive pregnant woman and barriers to reducing vertical transmission of HIV. Improvements in care and policy should mirror the field of reproductive genetics.

  12. Confidentiality Concerns and Sexual and Reproductive Health Care Among Adolescents and Young Adults Aged 15-25.

    Science.gov (United States)

    Copen, Casey E; Dittus, Patricia J; Leichliter, Jami S

    2016-12-01

    Data from the National Survey of Family Growth •About 7% of persons aged 15-25 would not seek sexual or reproductive health care because of concerns that their parents might find out about it. •For females aged 15-17 and 18-25, those who had confidentiality concerns were less likely to receive sexual and reproductive health services in the past year compared with those without these concerns. •Less than one-half of teenagers aged 15-17 (38.1%) spent some time alone in the past year during a visit with a doctor or other health care provider without a parent, relative, or guardian in the room. •Teenagers aged 15-17 who spent some time alone during a visit with a health care provider were more likely to have received sexual or reproductive health services in the past year compared with those who had not. Confidentiality concerns can impact adolescent and young adults' access to sexual and reproductive health services (1-4). Young people who are covered by their parents' private health insurance may be deterred from obtaining these services due to concerns that their parents might find out about it (2). Similarly, confidentiality concerns may arise because youth seeking such services may not have time alone during a visit with a health care provider (4). This report describes two measures related to confidentiality concerns and sexual and reproductive health care. All material appearing in this report is in the public domain and may be reproduced or copied without permission; citation as to source, however, is appreciated.

  13. A Framework for Sharing Confidential Research Data, Applied to Investigating Differential Pay by Race in the U. S. Government

    OpenAIRE

    Barrientos, Andrés F.; Bolton, Alexander; Balmat, Tom; Reiter, Jerome P.; de Figueiredo, John M.; Machanavajjhala, Ashwin; Chen, Yan; Kneifel, Charley; DeLong, Mark

    2017-01-01

    Data stewards seeking to provide access to large-scale social science data face a difficult challenge. They have to share data in ways that protect privacy and confidentiality, are informative for many analyses and purposes, and are relatively straightforward to use by data analysts. We present a framework for addressing this challenge. The framework uses an integrated system that includes fully synthetic data intended for wide access, coupled with means for approved users to access the confi...

  14. General practitioners' perspectives regarding competence and confidentiality in an adolescent with suspected anorexia nervosa: legal and ethical considerations.

    Science.gov (United States)

    Bartholomew, Terence P; Paxton, Susan J

    2003-02-01

    In Victoria, Australia, the legal position regarding young people's competence to make medical treatment decisions has not been clarified in legislation, and a number of often vague common law decisions must be relied on for guidance. This situation produces a degree of uncertainty about appropriate professional practice, while also potentially impeding young people's rights claims in health care settings. With this in mind, the present research explored general practitioners' competence and confidentiality decisions regarding a 17-year-old female who presented with symptoms of an eating disorder. Questionnaires were sent to a random sample of 500 Victorian general practitioners, of whom 190 responded. After reading a case vignette, general practitioners indicated whether they would find the hypothetical patient competent and if they would maintain her confidentiality. Seventy-three per cent of respondents found the patient competent and most would have maintained confidentiality, at least initially. However, subsequent analysis of the rationales supplied for these decisions revealed a wide diversity in general practitioners' understandings and implementations of extant legal authority. This research highlights the need for general practitioners to be exposed to up-to-date and clinically relevant explanations of contemporary legal positions.

  15. Issues in balancing teenage clients' confidentiality and reporting statutory rape among Kansas Title X clinic staff.

    Science.gov (United States)

    Miller, C; Miller, H L; Kenney, L; Tasheff, J

    1999-10-01

    Through Federal welfare reform, Congress directed states to aggressively enforce statutory rape laws. Family planning professionals deal with many adolescent clients, and their support for such enforcement or willingness to report is unclear. The authors of this study examined current attitudes and practices of family planning program managers (FPPMs) about statutory rape law enforcement, including current reporting practices. In 1997, all 77 local Kansas Title X FPPMs were surveyed. Structured telephone interviews were conducted with 10 FPPMs to add detail to quantitative responses. Sixty-eight FPPMs responded to the written survey (88%). Of these, 79% supported aggressive enforcement, and 43% thought enforcement would reduce adolescent pregnancy rates. With increased enforcement, 38% believed teenagers would be discouraged from seeking reproductive health care, compared to 41% who believed they would not. Among key informants, all of whom were FPPMs, willingness to report cases was mixed, with those who would report wanting the flexibility to judge on a case-by-case basis. For those not reporting cases, confidentiality concerns overrode beliefs in any positive outcome of enforcement. Kansas Title X FPPMs strongly supported aggressive enforcement, but had mixed beliefs about negative consequences. Among those interviewed, there were also mixed beliefs and practices about reporting. Reporting from FPPMs will be sporadic and arbitrary unless protocols are developed and laws are clarified.

  16. Pluto confidential an insider account of the ongoing battles over the status of pluto

    CERN Document Server

    Maran, Stephen

    2014-01-01

    When the International Astronomical Union (IAU) adopted a new definition of a "planet" in August 2006, Pluto became a dwarf planet, drawing a divisive line in science and public opinions. The controversy of whether Pluto is a planet continues years later, and passion about the decision remains, pitting scientist against scientist and invoking sentiments and nostalgia from the rest of the world. With the IAU definition, the future of space objects is forever changed. Learn how this resolution came to be and what it means for astronomy, who implemented it and who is against it, and whether it's the first or millionth time the world's view of astronomy has rotated on its axis. Written by an astronomer and educator who voted for the IAU resolution—Laurence A. Marschall—and a NASA scientist who supported the opposing petition that resulted—Stephen P. Maran—Pluto Confidential leaves no perspective out and no asteroid unturned in the Pluto debate. A telescopic look inside the book: History of planetary disputes,...

  17. Integrating Remote Sensing Data with Socioeconomic Data: Sensitivity, Confidentiality, Privacy, and Intellectual Property Challenges

    Science.gov (United States)

    Downs, R. R.; Adamo, S. B.

    2014-12-01

    The integration of remote sensing data with socioeconomic data presents new opportunities for scientific discovery and analysis that can improve understanding of the environmental sustainability issues that society faces today. Such integrated data products and services can be used to study interdisciplinary issues by investigators representing various disciplines. In addition to the scientific benefits that can be attained by integrating remote sensing data with socioeconomic data, the integration of these data also present challenges that reflect the complex issues that arise when sharing and integrating different types of science data. When integrating one or more datasets that contain sensitive information, data producers need to be aware of the limitations that have been placed upon the data to protect private property, species or other inhabitants that reside on the property, or restricted information about a particular location. Similarly, confidentiality and privacy issues are a concern for data that have been collected about individual humans and families who have volunteered to serve as human research subjects or whose personal information may have been collected without their knowledge. In addition, intellectual property rights that are associated with a particular dataset may prevent integration with other data or pose constraints on the use of the resulting data products or services. These challenges will be described along with approaches that can be applied to address them when planning projects that involve the integration of remote sensing data with socioeconomic data.

  18. Pluto confidential an insider account of the ongoing battles over the status of Pluto

    CERN Document Server

    Maran, Stephen

    2014-01-01

    When the International Astronomical Union (IAU) adopted a new definition of a "planet" in August 2006, Pluto became a dwarf planet, drawing a divisive line in science and public opinions. The controversy of whether Pluto is a planet continues years later, and passion about the decision remains, pitting scientist against scientist and invoking sentiments and nostalgia from the rest of the world. With the IAU definition, the future of space objects is forever changed. Learn how this resolution came to be and what it means for astronomy, who implemented it and who is against it, and whether it's the first or millionth time the world's view of astronomy has rotated on its axis. Written by an astronomer and educator who voted for the IAU resolution—Laurence A. Marschall—and a NASA scientist who supported the opposing petition that resulted—Stephen P. Maran—Pluto Confidential leaves no perspective out and no asteroid unturned in the Pluto debate. A telescopic look inside the book: History of planetary disputes,...

  19. Payers' experiences with confidential pharmaceutical price discounts: A survey of public and statutory health systems in North America, Europe, and Australasia.

    Science.gov (United States)

    Morgan, Steven G; Vogler, Sabine; Wagner, Anita K

    2017-04-01

    Institutional payers for pharmaceuticals worldwide appear to be increasingly negotiating confidential discounts off of the official list price of pharmaceuticals purchased in the community setting. We conducted an anonymous survey about experiences with and attitudes toward confidential discounts on patented pharmaceuticals in a sample of high-income countries. Confidential price discounts are now common among the ten health systems that participated in our study, though some had only recently begun to use these pricing arrangements on a routine basis. Several health systems had used a wide variety of discounting schemes in the past two years. The most frequent discount received by participating health systems was between 20% and 29% of official list prices; however, six participants reported their health system received one or more discount over the past two years that was valued at 60% or more of the list prices. On average, participants reported that confidential discounts were more common, complex, and significant for specialty pharmaceuticals than for primary care pharmaceuticals. Participants had a more favorable view of the impact of confidential discount schemes on their health systems than on the global marketplace. Overall, the frequency, complexity, and scale of confidential discounts being routinely negotiated suggest that the list prices for medicines bear limited resemblance to what many institutional payers actually pay. Copyright © 2017 The Authors. Published by Elsevier B.V. All rights reserved.

  20. Poultry Houses, WI Livestock Consortium Livestock Premises; confidentiality protected by law; use for animal health emergencies only; some aggregated county data, Published in 2009, 1:24000 (1in=2000ft) scale, Wisconsin Department of Agriculture, Trade & Consumer Protection.

    Data.gov (United States)

    NSGIC State | GIS Inventory — Poultry Houses dataset current as of 2009. WI Livestock Consortium Livestock Premises; confidentiality protected by law; use for animal health emergencies only; some...

  1. Changes in public attitudes towards confidential adolescent sexual and reproductive health services in Lithuania after the introduction of new legislation

    DEFF Research Database (Denmark)

    Jaruseviciene, Lina; Zaborskis, Apolinaras; Sauliune, Skirmante

    2015-01-01

    and reproductive healthcare (SRH) by comparing data from surveys administered in 2005 and 2012. METHODS: For both surveys, the participants were random samples of the Lithuanian residents aged 16 to 74. A 23-item questionnaire was used in 2005 and complemented with 2 items in 2012. Linear regression analysis...... was employed to estimate absolute differences in prevalence of belief in whether or not adolescents would find confidentiality important when consulting a physician on SRH issues. A log-binomial regression model was fitted to estimate the relative changes (prevalence ratio) of the independent variables...

  2. Half of Vermont Academic and Public Libraries Lack Written Confidentiality Policies Despite Directors’ Support for Principles of Patron Confidentiality. A Review of: Magi, Trina J., “The Gap between Theory and Practice: A Study of the Prevalence and Strength of Patron Confidentiality Policies in Public and Academic Libraries.” Library & Information Science Research 29 (2007: 455-70.

    Directory of Open Access Journals (Sweden)

    Stephanie Walker

    2008-09-01

    Full Text Available Objectives – To examine the prevalence and strength of patron confidentiality policies and practices at academic and public libraries in Vermont; to examine variances in policies by type and size of library and by qualifications of library directors; and to examine the level of support among Vermont library directors for strengthening state law to clarify that personally identifiable information about library patrons is confidential and should only be released with a court order.Design – Survey (non-randomized of 213 library directors.Setting – Academic and public libraries in Vermont (USA.Subjects – The initial audience was defined to be the directors of the 213 academic and public libraries in Vermont (as the persons to whom the survey was directed. Ultimately, results from 149 returned surveys were used as a basis for analysis. In addition, a written report of the information gathered was provided to the governing bodies of the Vermont Department of Libraries and the Vermont Library Association. The author also anticipates that the results of the survey will be of general interest to academic and public librarians.Methods – A literature review of previous research on library policies and practices regarding patron confidentiality was completed. As well, the author examined the various state and federal laws and library association codes of ethics which address issues of the confidentiality of library patron data. A paper questionnaire was mailed on January 11, 2006, to directors of 188 municipal and incorporated public libraries (including 11 combined public and school libraries and 25 college and university libraries, for a total of 213 libraries targeted. Cover letters explaining the purpose of the study and assuring respondents of the confidentiality of their responses were included in the mailing. The contact information came from a list supplied by the Vermont Department of Libraries. The questionnaire had previously been

  3. Implementation of a confidential helpline for men having sex with men in India.

    Science.gov (United States)

    Agarwal, Ashok; Hamdallah, Myriam; Swain, Suvakanta N; Mukherjee, Sonali; Singh, Neetu; Mahapatra, Sudip; King, Elizabeth J; Pulerwitz, Julie; Thior, Ibou

    2015-02-11

    In India, men who have sex with men (MSM) often face physical violence and harassment from police and the general society. Many MSM may not openly disclose their sexual identity, especially if they are married to women and have families. Due to pervasive stigma and discrimination, human immunodeficiency virus (HIV) prevention programs are unable to reach many MSM effectively. The objective of this paper was to describe the design, operations, and monitoring of the Sahaay helpline, a mHealth intervention for the MSM population of India. We established the "Sahaay" mHealth intervention in 2013; a MSM-dedicated helpline whose main goal was to increase access to comprehensive, community-based HIV prevention services and improve knowledge, attitudes, and behaviors of MSM towards HIV and sexually transmitted infections (STI) in three states of India (Chhattisgarh, Delhi, and Maharashtra). The helpline provided a 24x7 confidential and easy to use interactive voice response system (IVRS) to callers. IVRS function was monitored through an online dashboard of indicators. The system also provided real-time reporting on callers and services provided. The helpline received more than 100,000 calls from 39,800 callers during the first nine months of operation. The helpline maintained an operational uptime of 99.81% (6450/6462 hours); and answered more than 81.33% (83,050/102,115) of all calls. More than three-fourths of the calls came between 9:00 am-12:00 pm. The most successful promotional activity was "interpersonal communication" (reported by 70.05%, 27,880/39,800, of the callers). Nearly three-fourths of the callers self-identified as MSM, including 17.05% (6786/39,800) as rural MSM and 5.03% (2001/39,800) as a married MSM. Most callers (93.10%, 37,055/39,800) requested information, while some (27.01%, 10,750/39,800) requested counseling on HIV/acquired immune deficiency syndrome (AIDS), STIs, and other health and nonhealth issues. There were 38.97% (15,509/39,800) of the

  4. The risk of death: the confidential enquiry into perioperative small animal fatalities.

    Science.gov (United States)

    Brodbelt, David C; Blissitt, Karen J; Hammond, Richard A; Neath, Prue J; Young, Lestey E; Pfeiffer, Dirk U; Wood, James L N

    2008-09-01

    To estimate the risks of anaesthetic and sedation-related mortality in companion animals in the UK. (The Confidential Enquiry into Perioperative Small Animal Fatalities, CEPSAF). A prospective cohort study with nested case-control study. All small animals anaesthetized and sedated at participating centres between June 2002 and June 2004. Patient outcomes at 48 hours (alive, dead and killed) were recorded. Anaesthetic and sedation-related death was defined as death where surgical or pre-existing medical causes did not solely cause death. Species-specific risks of anaesthetic-related death and 95% confidence intervals (95% CI) were calculated. Risks were also estimated in the sub-sets of dogs, cats and rabbits that were either healthy or sick (ASA 1-2 and 3-5, respectively). One hundred and seventeen veterinary practices participated in the study and 98 036 dogs, 79 178 cats and 8209 rabbits were anaesthetized and sedated. Overall risks of anaesthetic and sedation-related death in dogs were 0.17% (1 in 601, 95% CI 0.14-0.19%), in cats 0.24% (1 in 419, 95% CI 0.20-0.27%) and in rabbits 1.39% (1 in 72, 95% CI 1.14-1.64%) within 48 hours of the procedure. In healthy dogs, cats and rabbits, the risks were estimated to be 0.05% (1 in 1849, 95% CI 0.04-0.07%), 0.11%, (1 in 895, 95% CI 0.09-0.14%) and 0.73% (1 in 137, 95% CI 0.54-0.93%), respectively. In sick dogs, cats and rabbits, the risks were 1.33%, (1 in 75, 95% CI 1.07-1.60%), 1.40% (1 in 71, 95% CI 1.12-1.68%) and 7.37% (1 in 14, 95% CI 5.20-9.54%), respectively. Postoperative deaths accounted for 47% of deaths in dogs, 61% in cats and 64% in rabbits. Most other small animal species had higher mortality risks. Small animal anaesthesia appears to be increasingly safe. Greater patient care in the postoperative period could reduce fatalities.

  5. A proposed security technique based on watermarking and encryption for digital imaging and communications in medicine

    Directory of Open Access Journals (Sweden)

    Mohamed M. Abd-Eldayem

    2013-03-01

    Full Text Available Nowadays; modern Hospital Data Management Systems (HDMSs are applied in a computer network; in addition medicinal equipments produce medical images in a digital form. HDMS must store and exchange these images in a secured environment to provide image integrity and patient privacy. The reversible watermarking techniques can be used to provide the integrity and the privacy. In this paper, a security technique based on watermarking and encryption is proposed to be used for Digital Imaging and Communications in Medicine (DICOM. It provides patient authentication, information confidentiality and integrity based on reversible watermark. To achieve integrity service at the sender side; a hash value based on encrypted MD5 is determined from the image. And to satisfy the reversible feature; R–S-Vector is determined from the image and is compressed based on a Huffman compression algorithm. After that to provide confidentiality and authentication services: the compressed R–S-Vector, the hash value and patient ID are concatenated to form a watermark then this watermark is encrypted using AES encryption technique, finally the watermark is embedded inside the medical image. Experimental results prove that the proposed technique can provide patient authentication services, image integrity service and information confidentiality service with excellent efficiency. Concluded results for all tested DICOM medical images and natural images show the following: BER equals 0, both of SNR and PSNR are consistent and have large values, and MSE has low value; the average values of SNR, PSNR and MSE are 52 dB, 57 dB and 0.12 respectively. Therefore, watermarked images have high imperceptibility, invisibility and transparency. In addition, the watermark extracted from the image at the receiver side is identical to the watermark embedded into the image in the sender side; as a result, the proposed technique is totally reversible, and the embedded watermark does not

  6. 76 FR 30781 - Confidentiality Determinations for Data Required Under the Mandatory Greenhouse Gas Reporting...

    Science.gov (United States)

    2011-05-26

    ........ 32511 Ethylene dichloride manufacturing facilities. 325199 Acrylonitrile, ethylene oxide, and methanol... proposal and stated that transparency was important for building public confidence in the accuracy of the...

  7. HIV testing preferences in Tanzania: a qualitative exploration of the importance of confidentiality, accessibility, and quality of service.

    Science.gov (United States)

    Njau, Bernard; Ostermann, Jan; Brown, Derek; Mühlbacher, Axel; Reddy, Elizabeth; Thielman, Nathan

    2014-08-12

    HIV counseling and testing (HCT), an effective preventive strategy and an entry point for care, remains under-utilized in Tanzania. Limited uptake of HCT, despite the widespread availability of varied testing options, suggests that existing options may not align well with population preferences for testing. Between October and December 2011, we conducted an exploratory study in the Kilimanjaro Region to develop a conceptual framework for understanding which characteristics of HIV testing are associated with preferences for testing. Forty individuals (55% women, 53% never having tested) participated in in-depth interviews and focus groups to identify factors that influence whether and where people test for HIV. A variety of discrete characteristics of testing venues, test providers, and testing procedures (e.g. distance to testing, counselor experience, type of HIV test, and availability of antiretroviral therapy) mapped conceptually to three domains: confidentiality of testing and test results, quality of HCT, and accessibility and availability of ancillary services. We noted heterogeneous preferences and demonstrate that while some test characteristics overlap and reinforce across multiple domains, others demand clients to make trade-offs between domains. Testing decisions appear to be influenced by an array of often inter-linked factors across multiple domains, including quality, confidentiality, and accessibility; perceptions of these factors varied greatly across participants and across available testing options. HCT interventions that jointly target barriers spanning the three domains have the potential to increase uptake of HIV testing and deserve further exploration.

  8. Encryption for confidentiality of the network and influence of this to the quality of streaming video through network

    Science.gov (United States)

    Sevcik, L.; Uhrin, D.; Frnda, J.; Voznak, M.; Toral-Cruz, Homer; Mikulec, M.; Jakovlev, Sergej

    2015-05-01

    Nowadays, the interest in real-time services, like audio and video, is growing. These services are mostly transmitted over packet networks, which are based on IP protocol. It leads to analyses of these services and their behavior in such networks which are becoming more frequent. Video has become the significant part of all data traffic sent via IP networks. In general, a video service is one-way service (except e.g. video calls) and network delay is not such an important factor as in a voice service. Dominant network factors that influence the final video quality are especially packet loss, delay variation and the capacity of the transmission links. Analysis of video quality concentrates on the resistance of video codecs to packet loss in the network, which causes artefacts in the video. IPsec provides confidentiality in terms of safety, integrity and non-repudiation (using HMAC-SHA1 and 3DES encryption for confidentiality and AES in CBC mode) with an authentication header and ESP (Encapsulating Security Payload). The paper brings a detailed view of the performance of video streaming over an IP-based network. We compared quality of video with packet loss and encryption as well. The measured results demonstrated the relation between the video codec type and bitrate to the final video quality.

  9. LEGAL BASES FOR DISCLOSING CONFIDENTIAL PATIENT INFORMATION FOR PUBLIC HEALTH: DISTINGUISHING BETWEEN HEALTH PROTECTION AND HEALTH IMPROVEMENT.

    Science.gov (United States)

    Taylor, Mark J

    2015-01-01

    The disclosure of confidential patient data without an individual's explicit consent should be for purposes that persons have reason to both expect and accept. We do not currently have the required level of clarity or consistency in understanding regarding the disclosure of confidential patient information for public health purposes to support effective public dialogue. The Health Service (Control of Patient Information) Regulations 2002 establish a legal basis in England and Wales for data to be disclosed for public health purposes without patient consent. Under the Regulations, there is more than one potential route towards lawful processing: Data may be processed for public health purposes under both Regulations 3 and 5. The alternatives have different safeguards and conditions attached, and their respective applicability to processing for purposes of public health improvement is currently unclear and subject to review. Beyond the need for clarity regarding the safeguards applicable to processing for particular public health purposes, there are reasons to prefer recognition that Regulation 5 is the most appropriate legal basis for disclosure when the purpose is public health improvement rather than public health protection. Where health improvement, rather than protection, is the aim, there is no justification for discarding the additional safeguards associated with processing under Regulation 5. © The Author 2015. Published by Oxford University Press.

  10. 77 FR 30486 - Confidentiality of Information; Magnuson-Stevens Fishery Conservation and Management...

    Science.gov (United States)

    2012-05-23

    ... the aggregation and summarization provision. NMFS presents these changes in the following order: First... Summarization Exception NMFS proposes regulatory definitions to ensure protection for business information. The... comment on the proposed definitional changes and other potential options to aggregation and summarization...

  11. Ethical considerations in malaria research proposal review: empirical evidence from 114 proposals submitted to an Ethics Committee in Thailand.

    Science.gov (United States)

    Adams, Pornpimon; Prakobtham, Sukanya; Limphattharacharoen, Chanthima; Vutikes, Pitchapa; Khusmith, Srisin; Pengsaa, Krisana; Wilairatana, Polrat; Kaewkungwal, Jaranit

    2015-09-14

    Malaria research is typically conducted in developing countries in areas of endemic disease. This raises specific ethical issues, including those related to local cultural concepts of health and disease, the educational background of study subjects, and principles of justice at the community and country level. Research Ethics Committees (RECs) are responsible for regulating the ethical conduct of research, but questions have been raised whether RECs facilitate or impede research, and about the quality of REC review itself. This study examines the review process for malaria research proposals submitted to the Ethics Committee of the Faculty of Tropical Medicine at Mahidol University, Thailand. Proposals for all studies submitted for review from January 2010 to December 2014 were included. Individual REC members' reviewing forms were evaluated. Ethical issues (e.g., scientific merit, risk-benefit, sample size, or informed-consent) raised in the forms were counted and analysed according to characteristics, including study classification/design, use of specimens, study site, and study population. All 114 proposals submitted during the study period were analysed, comprising biomedical studies (17 %), drug trials (13 %), laboratory studies (24 %) and epidemiological studies (46 %). They included multi-site (13 %) and international studies (4 %), and those involving minority populations (28 %), children (17 %) and pregnant women (7 %). Drug trials had the highest proportion of questions raised for most ethical issues, while issues concerning privacy and confidentiality tended to be highest for laboratory and epidemiology studies. Clarifications on ethical issues were requested by the ethics committee more for proposals involving new specimen collection. Studies involving stored data and specimens tended to attract more issues around privacy and confidentiality. Proposals involving minority populations were more likely to raise issues than those that did not

  12. REQUEST FOR PROPOSAL (RFP)

    International Development Research Centre (IDRC) Digital Library (Canada)

    test

    2013-07-17

    Jul 17, 2013 ... Each applicant must submit a comprehensive and detailed proposal in one, two, or three areas of study (public health, agriculture, or food security), indicating the area(s) for which they are submitting a proposal. Each proposal must include a separate implementation plan and budget for each of the area(s) ...

  13. Medical Students and Personal Smartphones in the Clinical Environment: The Impact on Confidentiality of Personal Health Information and Professionalism

    Science.gov (United States)

    Morra, Dante; Lo, Vivian; Quan, Sherman D; Abrams, Howard; Wu, Robert C

    2014-01-01

    Background Smartphones are becoming ubiquitous in health care settings. The increased adoption of mobile technology such as smartphones may be attributed to their use as a point-of-care information source and to perceived improvements in clinical communication and efficiency. However, little is known about medical students’ use of personal smartphones for clinical work. Objective The intent of the study was to examine final-year medical students’ experience with and attitudes toward using personal mobile technology in the clinical environment, with respect to the perceived impact on patient confidentiality and provider professionalism. Methods Cross-sectional surveys were completed by final-year medical students at the University of Toronto. Respondents were asked about the type of personal mobile phone they use, security features on their personal phone, experiences using their personal phone during clinical rotations, and attitudes about using their personal phone for clinical work purposes. Results The overall response rate was 45.4% (99/218). Smartphone ownership was prevalent (98%, 97/99) with the majority (86%, 85/99) of participants using their personal phones for patient-related communication during clinical rotations. A total of 26% (26/99) of participants reported not having any type of security feature on their personal phone, 94% (90/96) of participants agreed that using their personal phone for clinical work makes them more efficient, and 86% (82/95) agreed that their personal phone allows them to provide better patient care. Although 68% (65/95) of participants believe that the use of personal phones for patient-related communication with colleagues poses a risk to the privacy and confidentiality of patient health information, 22% (21/96) of participants still use their personal phone to text or email identifiable patient data to colleagues. Conclusions Our findings suggest that the use of personal smartphones for clinical work by medical students

  14. With Due Consideration: Australian Human Service Practitioners' Understandings of Confidentiality and Disclosure Obligations in Regard to Cases Concerning Gambling-Related Theft

    Science.gov (United States)

    Patford, Janet; Tranent, Peter

    2013-01-01

    Preserving confidentiality is problematic for human service practitioners if they know that a client is seriously harming a third party or could do so in the future. The present study concerned financial harm, as generated by gambling-related theft. Clients who disclose gambling-related theft potentially create a dilemma for practitioners, who may…

  15. 75 FR 16809 - Agency Information Collection Activities; Submission for OMB Review; Proposed Collection; Comment...

    Science.gov (United States)

    2010-04-02

    ... Form 450 Executive Branch Confidential Financial Disclosure Report to the Office of Management and...: Title: Executive Branch Confidential Financial Disclosure Report. Agency Form Number: OGE Form 450. OMB... OFFICE OF GOVERNMENT ETHICS Agency Information Collection Activities; Submission for OMB Review...

  16. Practices in security and confidentiality of HIV/AIDS patients' information: A national survey among staff at HIV outpatient clinics in Vietnam.

    Directory of Open Access Journals (Sweden)

    Nguyen Khac Hai

    Full Text Available Breach of confidentiality or invasion of privacy from the collection and use of medical records, particularly those of patients with HIV/AIDS or other diseases sensitive to stigmatization, should be prevented by all related stakeholders in healthcare settings. The main focus of this study was to assess practices regarding security and confidentiality of HIV-related information among staff at HIV outpatient clinics (HIV-OPCs in Vietnam.A descriptive cross-sectional study was conducted at all 312 HIV-OPCs across the country using an online survey technique.In general, the staff practices for securing and protecting patient information were at acceptable levels. Most staff had proper measures and practices for maintaining data security; however, the protection of patient confidentiality, particularly for data access, sharing, and transfer still required improvement. Most HIV-OPC staff had good or moderate knowledge and positive perceptions towards security and confidentiality issues. Staff who were not trained in the practice of security measures differed significantly from those who were trained (OR: 3.74; 95%CI: 1.44-9.67; staff needing improved knowledge levels differed significantly from those with good (OR: 5.20; 95%CI: 2.39-11.32 and moderate knowledge levels (OR: 5.10; 95%CI: 2.36-11.00; and staff needing improved perception levels differed significantly from those with good (i.e., with 100% proper practices and moderate perception levels (OR: 5.67; 95%CI: 2.93-10.95. Staff who were not trained in the protection of data confidentiality differed significantly from those who were trained (OR: 2.18; 95%CI: 1.29-3.65.Training is an important factor to help raise the levels of proper practices regarding confidentiality and security, to improve knowledge and raise awareness about change among staff. The operation and management of HIV treatment and care in Vietnam are currently transitioning from separate healthcare clinics (HIV-OPC into units

  17. Measurement Errors Arising When Using Distances in Microeconometric Modelling and the Individuals’ Position Is Geo-Masked for Confidentiality

    Directory of Open Access Journals (Sweden)

    Giuseppe Arbia

    2015-10-01

    Full Text Available In many microeconometric models we use distances. For instance, in modelling the individual behavior in labor economics or in health studies, the distance from a relevant point of interest (such as a hospital or a workplace is often used as a predictor in a regression framework. However, in order to preserve confidentiality, spatial micro-data are often geo-masked, thus reducing their quality and dramatically distorting the inferential conclusions. In particular in this case, a measurement error is introduced in the independent variable which negatively affects the properties of the estimators. This paper studies these negative effects, discusses their consequences, and suggests possible interpretations and directions to data producers, end users, and practitioners.

  18. Ethical reflection on multi-disciplinarity and confidentiality of information in medical imaging through new information and communication technologies

    International Nuclear Information System (INIS)

    Beranger, J.; Le Coz, P.

    2012-01-01

    Technological advances in medical imaging has resulted in the exponential increase of the number of images per examination, caused the irreversible decline of the silver film and imposed digital imaging. This digitization is a concept whose levels of development are multiple, reflecting the complexity of this process of technological change. Under these conditions, the use of medical information via new information and communication technologies is at the crossroads of several scientific approaches and several disciplines (medicine, ethics, law, economics, psychology, etc.) surrounding the information systems in health, doctor-patient relationship and concepts that are associated. Each day, these new information and communication technologies open up new horizons and the space of possibilities, spectacularly developing access to information and knowledge. In this perspective of digital technology emergence impacting the multidisciplinary use of health information systems, the ethical questions are numerous, especially on the preservation of privacy, confidentiality and security of medical data, and their accessibility and integrity. (authors)

  19. Faculty Development Proposal.

    Science.gov (United States)

    Jones, Kelsey A.

    An integrative approach to departmental design proposed for the Department of Criminal Justice at the University of the District of Columbia is described. The proposed curriculum classification framework for faculty assignment consists of three matrices: social behavior and humanities courses, technical courses, and philosophical courses. For the…

  20. 75 FR 28070 - Comment Request for Information Collection: “Confidentiality & Disclosure of State Unemployment...

    Science.gov (United States)

    2010-05-19

    ... Provisions of the Deficit Reduction Act of 1984; OMB Control No. 1205-0238;'' Extension Without Change AGENCY... program to provide the general public and federal agencies with an opportunity to comment on proposed and...) provisions of the Deficit Reduction Act of 1984 (current expiration date is August 31, 2010). A copy of the...

  1. COMPASS-II Proposal

    CERN Document Server

    Gautheron, F; Koivuniemi, J; Meyer, W; Reicherz, G; Bisplinghoff, J; Eversheim, D; Hinterberger, F; Jahn, R; Joosten, R; Negrini, T; Barth, J; Klein, F; Goertz, S; Panknin, R; Pretz, J; Windmolders, R; Srnka, A; Dasgupta, S; Dhara, L; Sarkara, S; Sinha, L; Alexakhin, V Yu; Alexeev, G D; Anosov, V A; Antonov, A; Efremov, A; Gavrichtchouk, O P; Guskov, A; Ivanshin, Yu; Ivanov, O; Kisselev, Yu; Kouznetsov, O; Kroumchtein, Z; Meshcheryakov, G V; Nagaytsev, A; Olshevski, A; Peshekhonov, D V; Pontecorvo, G; Rossiyskaya, N; Sapozhnikov, M G; Savin, I A; Shevchenko, O Yu; Sissakian, A N; Smirnov, G I; Teryaev, O V; Tkatchev, L G; Vlassov, N V; Zemlyanichkina, E; Adolph, Ch; Braun, Ch; Eyrich, W; Lehmann, A; Richter, A; Fischer, H; Heinsius, F-H; Herrmann, F; Guthörl, T; Lauser, L; Königsmann, K; Nerling, F; Schill, Ch; Wollny, H; Schmidt, K; Schopferer, S; Mallot, G K; Nowak, W-D; Schönning, K; Schott, M; Sulc, M; Bordalo, P; Franco, C; Nunes, A S; Quintans, C; Ramos, S; Silva, L; Stolarski, M; Bernhard, J; Chaberny, D; du Fresne von Hohenesche, N; von Harrach, D; Jasinski, P; Kabuß, E M; Kang, D-H; Ostrick, M; Pochodzalla, J; Alexandrov, Yu; Zavertyaev, M; Böhmer, F; Dørheim, S; Friedrich, J M; Gerassimov, S; Grabmüller, S; Grube, B; Haas, F; Höppner, Ch; Ketzer, B; Konorov, I; Krämer, M; Mann, A; Nagel, T; Neubert, S; Paul, S; Schmitt, L; Uhl, S; Bettinelli, M; Dünnweber, W; Faessler, M A; Geyer, R; Rajotte, J-F; Schlüter, T; Uman, I; Zvyagin, A; Finger, M; Finger jr, M; Slunecka, M; Jary, V; Virius, M; Donskov, S V; Filin, A; Khaustov, G V; Khokhlov, Yu; Kolosov, V; Konstantinov, V; Lednev, A A; Mikhailov, Yu V; Nikolaenko, V I; Polyakov, V A; Ryabchikov, D; Samoylenko, V D; Bedfer, Y; Burtin, E; Ferrero, A; d’Hose, N; Kunne, F; Magnon, A; Makke, N; Marchand, C; Morreale, A; Neyret, D; Platchkov, S; Vandenbroucke, M; Lichtenstadt, J; Moinester, M A; Birsa, R; Bradamante, F; Bressan, A; Dalla Torre, S; Duic, V; Elia, C; Giorgi, M; Gobbo, B; Levorato, S; Martin, A; Pesaro, G; Rocco, E; Sbrizzai, G; Schiavon, P; Sozzi, F; Tessaro, S; Tessarotto, F; Alexeev, M G; Amoroso, A; Balestra, F; Bertini, R; Chiosso, M; Denisov, O; Garfagnini, R; Gnesi, I; Grasso, A; Kotzinian, A; Maggiora, A; Melis, S; Panzieri, D; Parsamyan, B; Piragino, G; Sosio, S; Takekawa, S; Badelek, B; Brona, G; Gazda, R; Klimaszewski, K; Kurek, K; Rondio, E; Sandacz, A; Sznajder, P; Wislicki, W; Marzec, J; Dziewiecki, M; Sulej, R; Zaremba, K; Ziembicki, M; Doshita, N; Iwata, T; Ishimoto, S; Horikawa, N; Kondo, K; Matsuda, T; Miyachi, Y

    2010-01-01

    The proposed new measurements comprise a Generalised Parton Distributions programme, an unpolarised PDF and FF programme, a transverse momentum dependent PDF programme and a programme for tests of chiral perturbation theory.

  2. Draft Legislative Proposals

    DEFF Research Database (Denmark)

    Turcan, Romeo V.; Bugaian, Larisa; Niculita, Angela

    2015-01-01

    the objectives of the legislative proposals; discusses risks and challenges that HE in Moldova faces today and in the next 10-15 years; identifies expected outcomes; identifies basic principles on which the process will be founded; proposes a new structure for the HE sector; offers an example...... and responsibilities; suggests a distinct separation between governance and management; suggests teaching and research funding formulae based on inputs and outputs; and outlines a new National Qualifications Framework....

  3. The qualitative research proposal

    OpenAIRE

    Klopper, Hester

    2008-01-01

    Qualitative research in the health sciences has had to overcome many prejudices and a number of misunderstandings, but today qualitative research is as acceptable as quantitative research designs and is widely funded and published. Writing the proposal of a qualitative study, however, can be a challenging feat, due to the emergent nature of the qualitative research design and the description of the methodology as a process. Even today, many sub-standard proposals at post-graduate evaluation c...

  4. Confidentiality Issues and Use of Sexually Transmitted Disease Services Among Sexually Experienced Persons Aged 15-25 Years - United States, 2013-2015.

    Science.gov (United States)

    Leichliter, Jami S; Copen, Casey; Dittus, Patricia J

    2017-03-10

    National-level data are limited regarding confidentiality-related issues and the use of sexually transmitted disease (STD) services for adolescents and young adults. Changes in the U.S. health care system have permitted dependent children to remain on a parent's health insurance plan until the child's 26th birthday and required coverage of certain preventive services, including some STD services, without cost sharing for most plans (1,2). Although these provisions likely facilitate access to the health care system, adolescents and young adults might not seek care or might delay seeking care for certain services because of concerns about confidentiality, including fears that their parents might find out (3,4). Therefore, it is important to examine STD services and confidentiality-related issues among persons aged 15-25 years in the United States. CDC analyzed data from the 2013-2015 National Survey of Family Growth and found that 12.7% of sexually experienced youths (adolescents aged 15-17 years and those young adults aged 18-25 years who were on a parent's insurance plan) would not seek sexual and reproductive health care because of concerns that their parents might find out. Particularly concerned were persons aged 15-17 years (22.6%). Females with confidentiality concerns regarding seeking sexual and reproductive health care reported a lower prevalence of receipt of chlamydia screening (17.1%) than did females who did not cite such concerns (38.7%). More adolescents aged 15-17 years who spent time alone with a health care provider (without a parent in the room) reported receipt of a sexual risk assessment (71.1%) and, among females, chlamydia testing (34.0%), than did those who did not spend time alone (36.6% and 14.9%, respectively). The results indicated that confidentiality-related issues were associated with less reported use of some STD services, especially for younger persons and females. Spending time alone with a provider (i.e., without a parent present

  5. Intimacy, Confidentiality, and Power: Kiss and Tell as a Feminist Critique of Privacy Law

    OpenAIRE

    Naomh Gibson

    2015-01-01

    The current principle of privacy and its enactment in law and policy is presented as a reified, universal value that is gender-neutral. However this article contends this presumption, and advances that privacy is an inconsistent area of law that has allowed for the oppression of women’s rights and interests. It will be proposed that the narrative of ‘kiss and tell’ stories offers access to substantive justice and equality by subverting legal and gender norms and deconstructing the concept of ...

  6. Proposal Improvements That Work

    Science.gov (United States)

    Dunn, F.

    1998-01-01

    Rocketdyne Propulsion and Power, an operating location of Boeing in Canoga Park, California is under contract with NASA's Marshall Space Flight Center (MSFC) in Huntsville, Alabama for design, development, production, and mission support of Space Shuttle Main Engines (SSMEs). The contract was restructured in 1996 to emphasize a mission contracting environment under which Rocketdyne supports the Space Transportation System launch manifest of seven flights a year without the need for a detailed list of contract deliverables such as nozzles, turbopumps, and combustion devices. This contract structure is in line with the overall Space Shuttle program goals established by the NASA to fly safely, meet the flight manifest, and reduce cost. Rocketdyne's Contracts, Pricing, and Estimating team has worked for the past several years with representatives from MSFC, the local Defense Contract Management Command, and the DCAA to improve the quality of cost proposals to MSFC for contract changes on the SSME. The contract changes on the program result primarily from engineering change proposals for product enhancements to improve safety, maintainability, or operability in the space environment. This continuous improvement team effort has been successful in improving proposal quality, reducing cycle time, and reducing cost. Some of the principal lessons learned are highlighted here to show how proposal improvements can be implemented to enhance customer satisfaction and ensure cost proposals can be evaluated easily by external customers.

  7. OSQAR-CHASE Proposal

    CERN Document Server

    (Pugnat, P; (Sulc, M

    2015-01-01

    For 2015, the OSQAR collaboration will focus on a new proposal for the search of chameleon, a hypothetical scalar particle postulated as a dark energy candidate with an environment-dependant mass. The required experimental set-up has been successfully tested and validated in 2014 at the SM-18 experimental hall. This proposal will focus on the sensitivity that can be reached during the OSQAR chameleon run in 2015 as well as to possible upgrade phases of the experiment for the coming years.

  8. A hardenability test proposal

    Energy Technology Data Exchange (ETDEWEB)

    Murthy, N.V.S.N. [Ingersoll-Rand (I) Ltd., Bangalore (India)

    1996-12-31

    A new approach for hardenability evaluation and its application to heat treatable steels will be discussed. This will include an overview and deficiencies of the current methods and discussion on the necessity for a new approach. Hardenability terminology will be expanded to avoid ambiguity and over-simplification as encountered with the current system. A new hardenability definition is proposed. Hardenability specification methods are simplified and rationalized. The new hardenability evaluation system proposed here utilizes a test specimen with varying diameter as an alternative to the cylindrical Jominy hardenability test specimen and is readily applicable to the evaluation of a wide variety of steels with different cross-section sizes.

  9. Changes in public attitudes towards confidential adolescent sexual and reproductive health services in Lithuania after the introduction of new legislation: findings from the cross-sectional surveys conducted in 2005 and 2012.

    Science.gov (United States)

    Jaruseviciene, Lina; Zaborskis, Apolinaras; Sauliune, Skirmante; Jarusevicius, Gediminas; Lazarus, Jeffrey V

    2015-09-04

    In Lithuania, the right to confidentiality in healthcare for adolescents over the age of 16 was guaranteed in 2010 through the adoption of new legislation. This study sets out to explore changes in Lithuanian residents' attitudes towards confidentiality protection in adolescent sexual and reproductive healthcare (SRH) by comparing data from surveys administered in 2005 and 2012. For both surveys, the participants were random samples of the Lithuanian residents aged 16 to 74. A 23-item questionnaire was used in 2005 and complemented with 2 items in 2012. Linear regression analysis was employed to estimate absolute differences in prevalence of belief in whether or not adolescents would find confidentiality important when consulting a physician on SRH issues. A log-binomial regression model was fitted to estimate the relative changes (prevalence ratio) of the independent variables. The total number of respondents was 1054 (response rate 83%) in 2005 and 1002 (response rate 80%) in 2012. The proportion of respondents who reported a belief that adolescents would find confidentiality important when seeing a physician for SRH issues increased significantly from 62% in 2005 to 73% in 2012. Regardless of their belief in the importance of confidentiality, in 2012 respondents more often indicated positive outcomes on the relations between the physician and the minor patient, such as increased trust of the adolescent in the physician and more frequent visits to physicians. However, study participants who believed that adolescents would find confidentiality important in 2012 were less optimistic about potential positive outcomes of further legal consolidation of adolescents' right to confidentiality than in 2005. Younger respondents were the most optimistic about potential outcomes if laws were enacted to further protect adolescent confidentiality. This study uncovers the dynamics of public attitudes towards the socially and ethically sensitive issue of adolescent SRH. Our

  10. 'Is this knowledge mine and nobody else's? I don't feel that.' Patient views about consent, confidentiality and information-sharing in genetic medicine.

    Science.gov (United States)

    Dheensa, Sandi; Fenwick, Angela; Lucassen, Anneke

    2016-03-01

    In genetic medicine, a patient's diagnosis can mean their family members are also at risk, raising a question about how consent and confidentiality should function in clinical genetics. This question is particularly pressing when it is unclear whether a patient has shared information. Conventionally, healthcare professionals view confidentiality at an individual level and 'disclosure without consent' as the exception, not the rule. The relational joint account model, by contrast, conceptualises genetic information as confidential at the familial level and encourages professionals to take disclosure as the default position. In this study, we interviewed 33 patients about consent and confidentiality and analysed data thematically. Our first theme showed that although participants thought of certain aspects of genetic conditions--for example, the way they affect day-to-day health--as somewhat personal, they perceived genetic information--for example, the mutation in isolation--as familial. Most thought these elements were separable and thought family members had a right to know the latter, identifying a broad range of harms that would justify disclosure. Our second theme illustrated that participants nonetheless had some concerns about what, if any, implications there would be of professionals treating such information as familial and they emphasised the importance of being informed about the way their information would be shared. Based on these results, we recommend that professionals take disclosure as the default position, but make clear that they will treat genetic information as familial during initial consultations and address any concerns therein. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://www.bmj.com/company/products-services/rights-and-licensing/

  11. "Escola Familia": A Proposal

    Science.gov (United States)

    Carani, George; Carani, José; Strong-Wilson, Teresa

    2014-01-01

    "Alphabetização" (literacy) of young children involves a school exclusively devoted to the early years, parental participation, and teachers specialized in early literacy. This is the basis of José Carani's proposal for an "escola familia" in the municipality of Cambé (Brazil). This "Note from the Field," based on our…

  12. Proposed definition for IUPAC

    Indian Academy of Sciences (India)

    First page Back Continue Last page Overview Graphics. Proposed definition for IUPAC. The hydrogen bond is an attractive interaction between the hydrogen from a group X–H and an atom or a group of atoms Y, in the same or different molecule(s), where there is evidence of a partial bond formation. A list of criteria for the ...

  13. Proposed Darlington generating station

    International Nuclear Information System (INIS)

    1975-05-01

    The proposed Darlington GS A project, consisting of four 850 MW CANDU-type reactors, is described. Construction and operation will cause environmental changes with regard to air, water, aquatic life, the site area, safety and noise, and the predicted changes are described. (E.C.B.)

  14. CALL FOR PROPOSALS

    International Development Research Centre (IDRC) Digital Library (Canada)

    Charles

    economic growth and job creation. In spite of the importance of women workers and entrepreneurs to growth and the economic ... strategies and perceptions of entrepreneurial aspirations. Sound policies and .... Submission Guidelines: Proposals must be submitted by email only to the Project Leader, Dr. Charles Ackah, at.

  15. Data Confidentiality and Integrity Issues and Role of Information Security Management Standard, Policies and Practices - An Empirical Study of Telecommunication Industry in Pakistan

    Science.gov (United States)

    Nabi, Syed Irfan; Nabi, Syed Waqar; Tipu, Syed Awais Ahmed; Haqqi, Bushra; Abid, Zahra; Alghathbar, Khaled

    The amount of data communications is increasing each day and with it comes the issues of assuring its security. This research paper explores the information security management issues with respect to confidentiality and integrity and the impact of Information Security Management Standards, Policies and Practices (ISMSPP) on information security. This research has been conducted on the telecommunication industry of Pakistan that was ranked 9th globally in 2009 in terms of subscription. The research methodology was case study based in which perceptions were gathered as well as thematic analysis of the interviews was done. The research focus is on breach of data integrity and confidentiality by the internal users in the industry and the perception of improvement, if any, of the data security due to implementation of security management policies and controls. The results show that information security measure are perceived to have a positive impact on reducing data confidentiality and integrity breaches but still falls short of what is required. It concludes that security policies might improve the situation provided, firstly, that the top managements takes information security seriously, and secondly, the non-technical human aspects of the issues are taken into consideration.

  16. [Ethical reflection on multidisciplinarity and confidentiality of information in medical imaging through new information and communication technologies].

    Science.gov (United States)

    Béranger, J; Le Coz, P

    2012-05-01

    Technological advances in medical imaging has resulted in the exponential increase of the number of images per examination, caused the irreversible decline of the silver film and imposed digital imaging. This digitization is a concept whose levels of development are multiple, reflecting the complexity of this process of technological change. Under these conditions, the use of medical information via new information and communication technologies is at the crossroads of several scientific approaches and several disciplines (medicine, ethics, law, economics, psychology, etc.) surrounding the information systems in health, doctor-patient relationship and concepts that are associated. Each day, these new information and communication technologies open up new horizons and the space of possibilities, spectacularly developing access to information and knowledge. In this perspective of digital technology emergence impacting the multidisciplinary use of health information systems, the ethical questions are numerous, especially on the preservation of privacy, confidentiality and security of medical data, and their accessibility and integrity. Copyright © 2012 Société française de radiothérapie oncologique (SFRO). Published by Elsevier SAS. All rights reserved.

  17. Sudbury neutrino observatory proposal

    International Nuclear Information System (INIS)

    Ewan, G.T.; Evans, H.C.; Lee, H.W.

    1987-10-01

    This report is a proposal by the Sudbury Neutrino Observatory (SNO) collaboration to develop a world class laboratory for neutrino astrophysics. This observatory would contain a large volume heavy water detector which would have the potential to measure both the electron-neutrino flux from the sun and the total solar neutrino flux independent of neutrino type. It will therefore be possible to test models of solar energy generation and, independently, to search for neutrino oscillations with a sensitivity many orders of magnitude greater than that of terrestrial experiments. It will also be possible to search for spectral distortion produced by neutrino oscillations in the dense matter of the sun. Finally the proposed detector would be sensitive to neutrinos from a stellar collapse and would detect neutrinos of all types thus providing detailed information on the masses of muon- and tau-neutrinos. The neutrino detector would contain 1000 tons of D20 and would be located more than 2000 m below ground in the Creighton mine near Sudbury. The operation and performance of the proposed detector are described and the laboratory design is presented. Construction schedules and responsibilities and the planned program of technical studies by the SNO collaboration are outlined. Finally, the total capital cost is estimated to be $35M Canadian and the annual operating cost, after construction, would be $1.8 M Canadian, including the insurance costs of the heavy water

  18. 78 FR 28020 - Proposed Collection: Comment Request for Form 5498.

    Science.gov (United States)

    2013-05-13

    ... collection of information displays a valid OMB control number. Books or records relating to a collection of... internal revenue law. Generally, tax returns and tax return information are confidential, as required by 26...

  19. 77 FR 71481 - Proposed Collection; Comment Request for Form 8911

    Science.gov (United States)

    2012-11-30

    ... the collection of information displays a valid OMB control number. Books or records relating to a... administration of any internal revenue law. Generally, tax returns and tax return information are confidential...

  20. 76 FR 77325 - Proposed Collection; Comment Request for Form 13997

    Science.gov (United States)

    2011-12-12

    .... residence. This form will be an attachment to Letter 4318 to inform the individual about the IRC provisions... internal revenue law. Generally, tax returns and tax return information are confidential, as required by 26...

  1. 78 FR 70398 - Proposed Agency Information Collection Activities; Comment Request

    Science.gov (United States)

    2013-11-25

    ... sustainability evaluation to determine how C\\3\\RS can continue after the test period is over. The evaluation is...-disclosure agreement that prohibits disclosure of company confidential information without the carrier's...

  2. Intimacy, Confidentiality, and Power: Kiss and Tell as a Feminist Critique of Privacy Law

    Directory of Open Access Journals (Sweden)

    Naomh Gibson

    2015-12-01

    Full Text Available The current principle of privacy and its enactment in law and policy is presented as a reified, universal value that is gender-neutral. However this article contends this presumption, and advances that privacy is an inconsistent area of law that has allowed for the oppression of women’s rights and interests. It will be proposed that the narrative of ‘kiss and tell’ stories offers access to substantive justice and equality by subverting legal and gender norms and deconstructing the concept of privacy. Using the tools of feminist legal theory and theoretical commentary, this argument forms four sections. Firstly, it will be introduced that privacy is a value which is nebulous at best, and the reasons for critiquing privacy law using a perspective from feminist legal theory will be explored. Following this, the injustices perpetrated against women by the current state of privacy law will be outlined – particularly in the area of sexual information and sexuality. Using examples from both the UK and American jurisdictions, it will be submitted that privacy law is mired in patriarchal values. Thirdly, the jurisprudence underpinning privacy law decisions on sexual relationships and the legal concepts of confidence and intimacy will be critically examined and deconstructed. Finally, drawing upon investigative research, anecdotal evidence, and critical analysis, it will be submitted that ‘kiss and tell’ narratives are the way forward to reconceptualise privacy. It will be recommended that kiss and tell stories have value in social communication and present a chance for women to engage in relevant public discourse, and more widely, gives law an opportunity to reach a new understanding of privacy appropriate in the modern age.

  3. Proposed TFTR electrical system

    International Nuclear Information System (INIS)

    Bronner, G.; Murray, J.

    1975-01-01

    The development of controlled thermonuclear fusion has progressed to the stage where the present facilities and energy available for future devices are not sufficient and must be increased by about a factor of ten. This report describes the proposed TFTR ac utility power distribution system, an energy storage motor generator flywheel facility, and the rectifier conversion equipment for the Toroidal Field Confining System (TF), Ohmic Heating System (OH), Equilibrium Field System (EF) and the Neutral Beam Heating System (NB). The general requirements are described and the special design considerations identified

  4. The proposed flatland radar

    Science.gov (United States)

    Green, J. L.; Gage, K. S.; Vanzandt, T. E.; Nastrom, G. D.

    1986-01-01

    A flexible very high frequency (VHF) stratosphere-troposphere (ST) radar configured for meteorological research is to be constructed near Urbana, Illinois. Measurement of small vertical velocities associated with synoptic-scale meteorology can be performed. A large Doppler microwave radar (CHILL) is located a few km from the site of the proposed ST radar. Since the microwave radar can measure the location and velocity of hydrometeors and the VHF ST radar can measure clear (or cloudy) air velocities, simultaneous observations by these two radars of stratiform or convective weather systems would provide valuable meteorological information.

  5. Woodrow Wilson's hidden stroke of 1919: the impact of patient-physician confidentiality on United States foreign policy.

    Science.gov (United States)

    Menger, Richard P; Storey, Christopher M; Guthikonda, Bharat; Missios, Symeon; Nanda, Anil; Cooper, John M

    2015-07-01

    World War I catapulted the United States from traditional isolationism to international involvement in a major European conflict. Woodrow Wilson envisaged a permanent American imprint on democracy in world affairs through participation in the League of Nations. Amid these defining events, Wilson suffered a major ischemic stroke on October 2, 1919, which left him incapacitated. What was probably his fourth and most devastating stroke was diagnosed and treated by his friend and personal physician, Admiral Cary Grayson. Grayson, who had tremendous personal and professional loyalty to Wilson, kept the severity of the stroke hidden from Congress, the American people, and even the president himself. During a cabinet briefing, Grayson formally refused to sign a document of disability and was reluctant to address the subject of presidential succession. Wilson was essentially incapacitated and hemiplegic, yet he remained an active president and all messages were relayed directly through his wife, Edith. Patient-physician confidentiality superseded national security amid the backdrop of friendship and political power on the eve of a pivotal juncture in the history of American foreign policy. It was in part because of the absence of Woodrow Wilson's vocal and unwavering support that the United States did not join the League of Nations and distanced itself from the international stage. The League of Nations would later prove powerless without American support and was unable to thwart the rise and advance of Adolf Hitler. Only after World War II did the United States assume its global leadership role and realize Wilson's visionary, yet contentious, groundwork for a Pax Americana. The authors describe Woodrow Wilson's stroke, the historical implications of his health decline, and its impact on United States foreign policy.

  6. Proposal of Carbon Nanotube Inductors

    National Research Council Canada - National Science Library

    Tsubaki, K; Nakajima, Y; Hanajiri, T; Yamaguchi, H

    2006-01-01

    The inductors made of carbon Nanotube (CNT) have been proposed. Though the fabrication of the proposed inductor is still challenging and has many problems, merits of the proposed inductor are following...

  7. Stress: a naturalistic proposal

    Directory of Open Access Journals (Sweden)

    María de Lourdes Rodríguez Campuzano

    2013-08-01

    Full Text Available Some of the stress related topics, especially from the conceptual framework of Lazarus and Folkman are reviewed on this work. It is sustained that this approach is dualistic and that the research made from this view is made on the basis of morphological criteria that don’t allow studying important elements of this kind of behavior. From an interbehavioral approach three functional criteria are proposed to study this phenomenon: the functional nature of situations, aptitude levels of behavior, and its three dimensions. Emphasis is made on the singular and individual nature of stress reactions. Finally it is suggested to take into account these functional criteria to develop a generic situational taxonomy to study these reactions as parts of complex behavioral patterns.

  8. A gravitational entropy proposal

    International Nuclear Information System (INIS)

    Clifton, Timothy; Tavakol, Reza; Ellis, George F R

    2013-01-01

    We propose a thermodynamically motivated measure of gravitational entropy based on the Bel–Robinson tensor, which has a natural interpretation as the effective super-energy–momentum tensor of free gravitational fields. The specific form of this measure differs depending on whether the gravitational field is Coulomb-like or wave-like, and reduces to the Bekenstein–Hawking value when integrated over the interior of a Schwarzschild black hole. For scalar perturbations of a Robertson–Walker geometry we find that the entropy goes like the Hubble weighted anisotropy of the gravitational field, and therefore increases as structure formation occurs. This is in keeping with our expectations for the behaviour of gravitational entropy in cosmology, and provides a thermodynamically motivated arrow of time for cosmological solutions of Einstein’s field equations. It is also in keeping with Penrose’s Weyl curvature hypothesis. (paper)

  9. Willingness of Mentally Ill Individuals to Sign Up for a Novel Proposal to Prevent Firearm Suicide.

    Science.gov (United States)

    Vars, Fredrick E; McCullumsmith, Cheryl B; Shelton, Richard C; Cropsey, Karen L

    2017-08-01

    The study goal was to determine whether a significant number of high suicide risk individuals would confidentially put their own names onto a list to prevent future gun purchases. An anonymous written survey was administered in an inpatient psychiatric unit and two outpatient psychiatric clinics at an academic medical center. Two hundred forty individuals were approached to fill out the survey, of whom 200 (83.3%) did so. Forty-six percent of participants stated that they would put their own name onto the list. This novel suicide prevention proposal, a Do-Not-Sell List, would appeal to many people at high risk for suicide. © 2016 The American Association of Suicidology.

  10. Protecting the confidentiality and security of personal health information in low- and middle-income countries in the era of SDGs and Big Data

    Directory of Open Access Journals (Sweden)

    Eduard J. Beck

    2016-11-01

    Full Text Available Background: As increasing amounts of personal information are being collected through a plethora of electronic modalities by statutory and non-statutory organizations, ensuring the confidentiality and security of such information has become a major issue globally. While the use of many of these media can be beneficial to individuals or populations, they can also be open to abuse by individuals or statutory and non-statutory organizations. Recent examples include collection of personal information by national security systems and the development of national programs like the Chinese Social Credit System. In many low- and middle-income countries, an increasing amount of personal health information is being collected. The collection of personal health information is necessary, in order to develop longitudinal medical records and to monitor and evaluate the use, cost, outcome, and impact of health services at facility, sub-national, and national levels. However, if personal health information is not held confidentially and securely, individuals with communicable or non-communicable diseases (NCDs may be reluctant to use preventive or therapeutic health services, due to fear of being stigmatized or discriminated against. While policymakers and other stakeholders in these countries recognize the need to develop and implement policies for protecting the privacy, confidentiality and security of personal health information, to date few of these countries have developed, let alone implemented, coherent policies. The global HIV response continues to emphasize the importance of collecting HIV-health information, recently re-iterated by the Fast Track to End AIDS by 2030 program and the recent changes in the Guidelines on When to Start Antiretroviral Therapy and on Pre-exposure Prophylaxis for HIV. The success of developing HIV treatment cascades in low- and middle-income countries will require the development of National Health Identification Systems. The

  11. Protecting the confidentiality and security of personal health information in low- and middle-income countries in the era of SDGs and Big Data.

    Science.gov (United States)

    Beck, Eduard J; Gill, Wayne; De Lay, Paul R

    2016-01-01

    As increasing amounts of personal information are being collected through a plethora of electronic modalities by statutory and non-statutory organizations, ensuring the confidentiality and security of such information has become a major issue globally. While the use of many of these media can be beneficial to individuals or populations, they can also be open to abuse by individuals or statutory and non-statutory organizations. Recent examples include collection of personal information by national security systems and the development of national programs like the Chinese Social Credit System. In many low- and middle-income countries, an increasing amount of personal health information is being collected. The collection of personal health information is necessary, in order to develop longitudinal medical records and to monitor and evaluate the use, cost, outcome, and impact of health services at facility, sub-national, and national levels. However, if personal health information is not held confidentially and securely, individuals with communicable or non-communicable diseases (NCDs) may be reluctant to use preventive or therapeutic health services, due to fear of being stigmatized or discriminated against. While policymakers and other stakeholders in these countries recognize the need to develop and implement policies for protecting the privacy, confidentiality and security of personal health information, to date few of these countries have developed, let alone implemented, coherent policies. The global HIV response continues to emphasize the importance of collecting HIV-health information, recently re-iterated by the Fast Track to End AIDS by 2030 program and the recent changes in the Guidelines on When to Start Antiretroviral Therapy and on Pre-exposure Prophylaxis for HIV . The success of developing HIV treatment cascades in low- and middle-income countries will require the development of National Health Identification Systems. The success of programs like

  12. Is the Annual Confidential Report system effective? A study of the government appraisal system in Gujarat, India.

    Science.gov (United States)

    Purohit, Bhaskar; Martineau, Tim

    2016-06-02

    Effective performance appraisal systems can not only motivate employees to improve performance but also be important for the performance of organizations. However, the appraisal systems in civil services called the Annual Confidential Report (ACR) systems can be ineffective and do not contribute to employees' learning and development. With this background, the current study aimed at understanding the ACR system and assessing its effectiveness. The research aims to contribute in filling the knowledge gap in the existing literature on the need as to why the ACR system in civil services is an important human resource management (HRM) function. The analysis is based on policy review to understand the extant appraisal-related rules and policies. Nineteen in-depth interviews with medical officers (MOs) working with the government health department of Gujarat, India, were conducted. The main objective of the research was to assess the effectiveness of the actual appraisal system called or referred to as the ACR as perceived by MOs. Thematic framework approach was used to analyze qualitative data using NVIVO 9. Themes were built around five features of an effective appraisal system, i.e., purpose, source, feedback quality, link of the ACR system with other human resource functions, and administrative effectiveness. The five features of the effective appraisal system studied in the current research (purpose, source, feedback quality, link of ACR system with other HRM functions, and administrative effectiveness) indicate that the overall appraisal system is ineffective. The overall appraisal system was perceived to be subjective and one directional in character by the study respondents. Furthermore, respondents perceived the appraisal system to be a ritual and where MOs hardly got to know about their performance, especially good performance. Hence, the feedback loop, an important feature for an effective appraisal system, was absent. The overall ACR system functions in

  13. 77 FR 24228 - Proposal Review Panel for Social and Economic Sciences; Notice of Meeting

    Science.gov (United States)

    2012-04-23

    ... following meeting: Name: Site visit review of the Nanoscale Science and Engineering Center (NSEC) at... proprietary or confidential nature, including technical information; financial data, such as salaries and...

  14. 78 FR 19535 - Proposal Review Panel for Materials Research; Notice of Meeting

    Science.gov (United States)

    2013-04-01

    ... Science and Engineering Centers Program, Division of Materials Research, Room 1065, National Science... proprietary or confidential nature, including technical information; financial data, such as salaries and...

  15. Ring Confidential Transactions

    Directory of Open Access Journals (Sweden)

    Shen Noether

    2016-12-01

    Full Text Available This article introduces a method of hiding transaction amounts in the strongly decentralized anonymous cryptocurrency Monero. Similar to Bitcoin, Monero is a cryptocurrency which is distributed through a proof-of-work “mining” process having no central party or trusted setup. The original Monero protocol was based on CryptoNote, which uses ring signatures and one-time keys to hide the destination and origin of transactions. Recently the technique of using a commitment scheme to hide the amount of a transaction has been discussed and implemented by Bitcoin Core developer Gregory Maxwell. In this article, a new type of ring signature, A Multilayered Linkable Spontaneous Anonymous Group signature is described which allows one to include a Pedersen Commitment in a ring signature. This construction results in a digital currency with hidden amounts, origins and destinations of transactions with reasonable efficiency and verifiable, trustless coin generation. The author would like to note that early drafts of this were publicized in the Monero Community and on the #bitcoin-wizards IRC channel. Blockchain hashed drafts are available showing that this work was started in Summer 2015, and completed in early October 2015. An eprint is also available at http://eprint.iacr.org/2015/1098.

  16. Comic Book Confidential

    Science.gov (United States)

    Osterer, Irv

    2012-01-01

    The author remembers as a youngster poring over DC and Marvel comics, wondering if any of his heroes would reach TV or movie theaters. Today, with the blue-screen techniques and computer-generated imagery (CGI), it seems not a week goes by without seeing one of these characters being featured in a film. "Spiderman" has even reached Broadway! None…

  17. Protection of confidential information and countermeasures against insider threat in nuclear industry. Some practices in U.S. nuclear industry and their implication for Japan

    International Nuclear Information System (INIS)

    Tanabe, Tomoyuki

    2008-01-01

    In Japan, after law amendment of the Law for the Regulation of Nuclear Source Material, Nuclear Fuel Material and Reactors was implemented aiming for reinforcement of physical protection in 2005, there still remain a number of practical issues of how the nuclear administration applies the regulations in detail and how nuclear undertakers cope with the regulations. This report looks at how protection of confidential information and countermeasures against insider threat are regulated and handled in the United States civil nuclear energy industry, and extracts its implications for Japanese regulations and practical business affairs. This report points our four characteristics of protection of confidential information and countermeasures against insider threat in the United States commercial power industry: (1) regulatory contents are prescribed in detail within a specific scope, (2) private bureaucracy such as NEI provides support of compliance programs of nuclear undertakers, (3) strict protection and management system about Safeguards Information (SGI) has been developed in both sides of regulations and compliance programs, and (4) employee private information of a broad content including sensitive data such as financial status or the criminal record is acquired and used at the aim of security clearance by nuclear undertakers. These characteristics, especially point (2) serve as a reference in regulation enforcement in Japan while careful attentions should be paid in harmonizing with existing legislation. (author)

  18. 78 FR 54466 - Agency Information Collection Activities; Submission for OMB Review; Proposed Collection; Comment...

    Science.gov (United States)

    2013-09-04

    ... Form 450 Executive Branch Confidential Financial Disclosure Report to the Office of Management and... Financial Disclosure Report. Agency Form Number: OGE Form 450. OMB Control Number: 3209-0006. Type of... Branch Confidential Financial Disclosure Report. See 78 FR 29753 (May 21, 2013). OGE received two...

  19. 78 FR 57319 - Children's Online Privacy Protection Rule Safe Harbor Proposed Self-Regulatory Guidelines...

    Science.gov (United States)

    2013-09-18

    ... continuing assessments of operators' fitness for membership in its program in light of its business model and... treatment, you must file it in paper form, with a request for confidential treatment, and follow the... the public interest. \\9\\ In particular, the written request for confidential treatment that...

  20. Application of Barcoding to Reduce Error of Patient Identification and to Increase Patient's Information Confidentiality of Test Tube Labelling in a Psychiatric Teaching Hospital.

    Science.gov (United States)

    Liu, Hsiu-Chu; Li, Hsing; Chang, Hsin-Fei; Lu, Mei-Rou; Chen, Feng-Chuan

    2015-01-01

    Learning from the experience of another medical center in Taiwan, Kaohsiung Municipal Kai-Suan Psychiatric Hospital has changed the nursing informatics system step by step in the past year and a half . We considered ethics in the original idea of implementing barcodes on the test tube labels to process the identification of the psychiatric patients. The main aims of this project are to maintain the confidential information and to transport the sample effectively. The primary nurses had been using different work sheets for this project to ensure the acceptance of the new barcode system. In the past two years the errors in the blood testing process were as high as 11,000 in 14,000 events per year, resulting in wastage of resources. The actions taken by the nurses and the new barcode system implementation can improve the clinical nursing care quality, safety of the patients, and efficiency, while decreasing the cost due to the human error.

  1. Proposals for Iterated Hash Functions

    DEFF Research Database (Denmark)

    Knudsen, Lars Ramkilde; Thomsen, Søren Steffen

    2008-01-01

    some generic attacks. We also give a concrete proposal for a new hash function construction, given a secure compression function which, unlike in typical existing constructions, is not required to be resistant to all types of collisions. Finally, we show how members of the SHA-family can be turned...... into constructions of our proposed type....

  2. Proposals for iterated hash functions

    DEFF Research Database (Denmark)

    Knudsen, Lars Ramkilde; Thomsen, Søren Steffen

    2006-01-01

    some generic attacks. We also give a concrete proposal for a new hash function construction, given a secure compression function which, unlike in typical existing constructions, is not required to be resistant to all types of collisions. Finally, we show how members of the SHA-family can be turned...... into constructions of our proposed type....

  3. 76 FR 55742 - Proposed Collection

    Science.gov (United States)

    2011-09-08

    ... Internal Revenue Service Proposed Collection AGENCY: Internal Revenue Service (IRS), Treasury. ACTION... to take this opportunity to comment on proposed and/or continuing information collections, as... approved collection. Affected Public: Business or other for-profit organizations. Estimated Number of...

  4. 76 FR 74117 - Proposed Collection; Comment Request for Form 4810

    Science.gov (United States)

    2011-11-30

    ... dissolving corporation or a decedent's estate may request a prompt assessment of tax under Internal Revenue... displays a valid OMB control number. Books or records relating to a collection of information must be.... Generally, tax returns and tax return information are confidential, as required by 26 U.S.C. 6103. Request...

  5. 75 FR 38184 - Proposed Collection; Comment Request for Regulation Project

    Science.gov (United States)

    2010-07-01

    ... comments concerning an existing final regulation, REG-251703-96 (TD 8813), Residence of Trusts and Estates...-3634, or through the Internet at [email protected] . SUPPLEMENTARY INFORMATION: Title: Residence... administration of any internal revenue law. Generally, tax returns and tax return information are confidential...

  6. 76 FR 44661 - Proposed Collection; Comment Request for Regulation Project

    Science.gov (United States)

    2011-07-26

    ... information collection requirements related to residence rulings involving U.S. possessions. DATES: Written..., at [email protected] . SUPPLEMENTARY INFORMATION: Title: Residence Rulings Involving U.S... revenue law. Generally, tax returns and tax return information are confidential, as required by 26 U.S.C...

  7. 75 FR 70919 - Proposed Agency Information Collection Activities; Comment Request

    Science.gov (United States)

    2010-11-19

    ...: Report title: Recordkeeping Requirements Associated with the Real Estate Lending Standards Regulation for... adopt and maintain a written real estate lending policy. Also, banks must identify their loans in excess... by the Federal Reserve, no issue of confidentiality under the Freedom of Information Act (FOIA...

  8. 76 FR 54190 - Proposed Privacy Act System of Records

    Science.gov (United States)

    2011-08-31

    ... confirmed compromise there is a risk of harm to economic or property interests, identity theft or fraud, or... confidentiality requirements of the USDA Office of the Chief Information Officer (OCIO) Cyber Security Manuals and..., specific USDA security requirements are adhered to through the USDA Cyber Security Manuals, including, but...

  9. 78 FR 28704 - Proposed Collection; Comment Request for Regulation Project

    Science.gov (United States)

    2013-05-15

    ... in which the payer corporation's debt-equity ratio is 1.5 to 1 or less. Regulation section Sec. 1.163... purchase. This rule allows the taxpayer, in computing its debt-equity ratio, to elect to write off the.... Generally, tax returns and tax return information are confidential, as required by 26 U.S.C. 6103. Request...

  10. Proposed Coastal Critical Habitat Areas

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — When a species is proposed for listing as endangered or threatened under the Endangered Species Act, NOAA National Marine Fisheries Service and the U.S. Fish &...

  11. Proposal and realization advertising campaign

    OpenAIRE

    RYCHLÁ, Marie

    2008-01-01

    The Bachelor Paper contains proposal and realization advertising campaign, including make charge for cost amount. The advertising campaign is made for chosen product of firm. Advertising campaign is planning by the medium of broadsheet and advertising on the Internet.

  12. Deconstructing (2,0) proposals

    Science.gov (United States)

    Lambert, N.; Papageorgakis, C.; Schmidt-Sommerfeld, M.

    2013-07-01

    We examine the relationships between three proposals for the six-dimensional (2,0) theory: the discrete light-cone quantization (DLCQ) of Aharony et al. [Adv. Theor. Math. Phys. 1, 148 (1998); Adv. Theor. Math. Phys. 2, 119 (1998)], the deconstruction prescription of Arkani-Hamed et al. [J. High Energy Phys. 01 (2003) 083], and the five-dimensional maximally supersymmetric Yang-Mills proposal of Douglas and Lambert et al. [J. High Energy Phys. 02 (2011) 011; J. High Energy Phys. 01 (2011) 083]. We show that Arkani-Hamed et al. gives a deconstruction of five-dimensional maximally supersymmetric Yang-Mills. The proposal of Aharony et al. uses a subset of the degrees of freedom of five-dimensional Yang-Mills, and we show that compactification of it on a circle of finite radius agrees with the DLCQ arising from the proposal of Douglas and Lambert et al. or from the deconstruction proposal of Arkani-Hamed et al.

  13. Torness: proposed nuclear power station

    International Nuclear Information System (INIS)

    Anon.

    1979-01-01

    The need for and desirability of nuclear power, and in particular the proposed nuclear power station at Torness in Scotland, are questioned. Questions are asked, and answered, on the following topics: position, appearance and cost of the proposed Torness plant, and whether necessary; present availability of electricity, and forecast of future needs, in Scotland; energy conservation and alternative energy sources; radiation hazards from nuclear power stations (outside, inside, and in case of an accident); transport of spent fuel from Torness to Windscale; radioactive waste management; possibility of terrorists making a bomb with radioactive fuel from a nuclear power station; cost of electricity from nuclear power; how to stop Torness. (U.K.)

  14. Proposed superscreened cables and connectors

    International Nuclear Information System (INIS)

    Fowler, E.P.

    1975-11-01

    The paper summarises the present availability of superscreened cables and proposes the specification of a family of cables to meet the foreseeable needs of the nuclear power industry. The cable numbering system is described, special tests outlined and important details given for the chosen cables. Appropriate connectors are also discussed and listed with an outline of their required screening performance. (author)

  15. 77 FR 19747 - Proposed Cancelation

    Science.gov (United States)

    2012-04-02

    ... DEPARTMENT OF TRANSPORTATION Office of the Secretary [Order 2012-3-7; Docket DOT-OST-2012-0022] Proposed Cancelation of the Air Taxi Authority Of VIH Cougar Helicopters, Inc. AGENCY: Department of... order finding that VIH Cougar Helicopters, Inc. is not a U.S. citizen as defined in 49 U.S.C. 40102(a...

  16. REQUEST FOR PROPOSAL (RFP) Amendment

    International Development Research Centre (IDRC) Digital Library (Canada)

    Jayne Bassett

    2013-08-01

    Aug 1, 2013 ... HEAD OFFICE / SIÈGE : 150 Kent Street / 150, rue Kent PO Box / CP 8500 Ottawa ON Canada K1G 3H9. Phone / Tél. : +1 613 236 6163 Email / Courriel : info@idrc.ca / info@crdi.ca idrc.ca | crdi.ca. REQUEST FOR PROPOSAL (RFP). Amendment. RFP Title: Consultancy on Improving Development ...

  17. Proposals for iterated hash functions

    DEFF Research Database (Denmark)

    Knudsen, Lars Ramkilde; Thomsen, Søren Steffen

    2006-01-01

    some generic attacks. We also give a concrete proposal for a new hash function construction, given a secure compression function which, unlike in typical existing constructions, is not required to be resistant to all types of collisions. Finally, we show how members of the SHA-family can be turned...

  18. Total synthesis of proposed auranthine.

    Science.gov (United States)

    Kshirsagar, Umesh A; Puranik, Vedavati G; Argade, Narshinha P

    2010-04-16

    Starting from CBz-protected glutamic anhydride and Boc-protected o-aminobenzyl amine, the first total synthesis of proposed structure of auranthine has been reported. An intramolecular aza-Wittig reaction involving a lactam carbonyl group that delivered the diazepine core unit was the key step in the synthesis.

  19. (including travel dates) Proposed itinerary

    Indian Academy of Sciences (India)

    Ashok

    31 July to 22 August 2012 (including travel dates). Proposed itinerary: Arrival in Bangalore on 1 August. 1-5 August: Bangalore, Karnataka. Suggested institutions: Indian Institute of Science, Bangalore. St Johns Medical College & Hospital, Bangalore. Jawaharlal Nehru Centre, Bangalore. 6-8 August: Chennai, TN.

  20. A proposal for experimental homework

    Science.gov (United States)

    Rodríguez, Eduardo E.

    1998-10-01

    Homework in Physics courses usually deal with conceptual inquiries or numerical solution of theoretical problems. However, experimental homework is rather uncommon. I propose that certain physical situations properly simulated may be useful to encourage students to seek a solution behind the steps of the "experimental method."

  1. Proposed Hydro-Quebec development plan, 1993: Proposal

    International Nuclear Information System (INIS)

    1992-01-01

    The Quebec government now requires Hydro-Quebec to submit a development plan every three years instead of annually, in order to permit more in-depth studies and a broader consultation with interested parties. In the first of such three-year plans, a series of plan proposals is presented which was developed after a year of consultation with various groups on four fundamental matters: energy efficiency, means of generation, electro-intensive industries, and electricity exports. Options for meeting future demand at Hydro-Quebec are assessed, including the construction of new generation and transmission facilities, rehabilitation of existing facilities, improving electrical energy efficiency, and conservation strategies. These options are considered while applying the principle of sustainable development that respects the environment. Hydroelectricity will continue to be emphasized as the main source of generation since hydroelectric facilities offer distinct advantages in terms of costs, environmental impacts, and economic spinoffs. The proposed plan also presents objectives and strategies for improving the quality of service and internal operations. Financial forecasts for Hydro-Quebec are proposed which take into account the forecast changes in the utility's cost and revenue factors and its self-financing requirements. 5 figs., 15 tabs

  2. The Impact of Varying Levels of Confidentiality on Disclosure of Suicidal Thoughts in a Sample of United States National Guard Personnel.

    Science.gov (United States)

    Anestis, Michael D; Green, Bradley A

    2015-10-01

    Increasing rates of suicide in the military indicate current assessment approaches are not yielding accurate determinations of risk. Concern that endorsement of suicidal ideation may result in obstacles to career advancement may be resulting in nondisclosure. To test this, we recruited a sample of US National Guard personnel (n = 789; 81.7% male; 63.2% white) and administered two measures of current thoughts of suicide. One measure was integrated into our risk assessment protocol and soldiers were thus aware that answers could result in referral to on site military mental health professionals. The other measure was not integrated into the risk assessment protocol and soldiers were thus aware that results would not be reported to on site military mental health professionals. As hypothesized, a higher proportion of individuals reported current thoughts of suicide on the measure not integrated into the risk protocol (9.4%) than on the measure that was (6.0%). Also as hypothesized, a higher proportion of those willing to endorse current thoughts of suicide on the measure not integrated into the risk protocol denied current thoughts of suicide on the one that was (61.5%) than vice versa (39.0%). Limitations include cross-sectional self-report data and a lack of counter-balancing of measures. The results indicate that increasing the confidentiality of risk assessments within the National Guard increases the likelihood of reporting of current thoughts of suicide. © 2015 Wiley Periodicals, Inc.

  3. The JET Project (Design proposal)

    International Nuclear Information System (INIS)

    1976-01-01

    This proposal describes a large Tokamak experiment, which aims to study plasma behavior in conditions and dimensions approaching those required in a fusion reactor. The maximum plasma minor radius (a) is 1.25 m and the major radius R 0 is 2.96 m. An important feature is the flexibility to study, for plasma currents in the 1→3 MA range, a wide range of aspect ratios R 0 /a=2.37→5), toroidal magnetic fields (up to 3.6T), minor radii (0.6→1.25 m) and elongation ratios (b/a=1→3.5). The cost of the apparatus, power supplies, plasma heating equipment and specific diagnostics is estimated as 70.1 Muc (March 1975 prices, 1 uc=50 FB). The total construction phase cost including commissioning, buildings and staff is 135 Muc. These figures include an average overall contingency of 30%. The construction time for the project is estimated at 5 years and requires 370 professional man years of effort in the construction organisation with additional effort deployed by the Associated Laboratories in such areas as diagnostics and plasma heating. This design proposal is arranged as follows: The preface gives an introduction to the field of fusion research and relates JET to the European and international programmes. Chapter I is a concise summary of the design proposal, it describes the objectives of research with JET, and gives a brief description of: the apparatus; the cost and construction schedules; the proposed experimental programme and the possible modes of operation of the device. A detailed account of the project is given in the rest of the report of which Chapters IV and VII comprise the engineering design and the staff and cost estimates respectively

  4. Proposed Lucas Heights tandem accelerator

    International Nuclear Information System (INIS)

    1985-01-01

    An 8 million volt tandem accelerator (LHTA - Lucas Heights Tandem Accelerator) is proposed to be installed at the Australian Atomic Energy Commission's Lucas Heights Research Laboratories. The new facility is expected to cost $6 million and will have applications such as ultrasensitive trace element analysis for management of groundwater resources, salinity in soil, soil erosion and Antarctic research. Applied physics applications include nuclear safeguards, energy sources, study of material surfaces, archaeology, archaeometry and occupational health

  5. PROPOSAL OF NEW OPTICAL ELEMENTS

    Directory of Open Access Journals (Sweden)

    Goce Chadzitaskos

    2013-10-01

    Full Text Available A overview of our patented proposals of new optical elements is presented. The elements are suitable for laser pulse analysis, telescopy, X-ray microscopy and X-ray telescopy. They are based on the interference properties of light: a special grating for a double slit pattern, parabolic strip imaging for a telescope, and Bragg’s condition for X-ray scattering on a slice of a single crystal for X-raymicroscopy and X-ray telescopy.

  6. The JET project (design proposal)

    International Nuclear Information System (INIS)

    1976-03-01

    This proposal describes a large Tokamak experiment, which aims to study plasma behavior in conditions and dimensions approaching those required in a fusion reactor. The maximum plasma minor radius (a) is 1.25m and the major radius (R 0 ) is 2.96m. An important feature is the flexibility to study, for plasma currents in the 1→3MA range, a wide range of aspect ratios (R 0 /a=2.37→5), toroidal magnetic fields (up to 3.6T), minor radii (0.6→1.25m) and elongation ratios (b/a=1→3.5). The cost of the apparatus, power supplies, plasma heating equipment and specific diagnostics is estimated as 70.1Muc (march 1975 prices, 1uc=50FB). The total construction phase cost including commissioning, buildings and staff is 135Muc. These figures include an average overall contingency of 30%. The construction time for the project is estimated at 5 years and requires 370 professional man years of effort in the construction organisation with additional effort deployed by the Associated Laboratories in such areas as diagnostics and plasma heating. This design proposal is arranged as follows: an introduction to the field of fusion research is given and relates JET to the European and international programmes; a concise summary of the design proposal describes the objectives of research with JET, and gives a brief description of the apparatus, the cost and construction schedules, the proposed experimental programme and the possible modes of operation of the device. A detailed account of the engineering design and the staff and cost estimates is presented

  7. ATF2 Proposal v. 2

    CERN Document Server

    Grishanov, B I; Alabau-Pons, M; Angal-Kalinin, Deepa; Appleby, R; Araki, S; Bailey, I; Bambade, P; Bane, Karl Leopold Freitag; Barlow, R; Blair, G A; Bolzon, B; Boorman, G; Bosco, A; Brachmann, A; Braun, Hans Heinrich; Burrows, P N; Carter, J; Choi, J; Christian, Glenn B; Clarke, C; Dabiri-Khah, A; Dadoun, O; Danagulyan, S; Delerue, N; Dixit, S; Driouichi, C; Elsen E; Gao, J; Geffroy, N; Gronberg, J; Hartin, Anthony F; Hayano, H; Higashi, Y; Himel, T; Honda, Y; Howell, D; Huang, J Y; Iwashita, Y; Jenner, L; Jones, J; Jones, R; Jérémie, A; Kalinin, A; Kanazawa, K; Kang, H S; Karyotakis, Yu; Kim, E S; Kim, S; Komamiya, S; Kourevlev, German Yu; Kubo, K; Kumada, M; Kume, T; Kuriki, M; Kuroda, S; Liu, W; Logatchev, P V; Lyapin, A; Malton, S; Markiewicz, T W; Masuzawa, M; Mihara, T; Miller, D J; Molloy, S; Mtingwa, S; Naito, T; Nan-Phinney, Y; Napoly, O; Nelson, J; Okugi, T; Payet, J; Pei, G X; Pivi, M T F; Podgorny, F; Price, M; Raubenheimer, T O; Reichold, A; Ross, M; Sanuki, T; Schulte, Daniel; Seryi, R A; Solyak, N; Soo Ko In; Spencer, C M; Suehara, T; Sugahara, R; Takahashi, T; Takashi-Boogert, S; Tauchi, T; Telnov, Valery I; Tenenbaum, P G; Terunuma, N; Toge, N; Torrence, E; Urakawa, J; Urner, D; Vogel, V; Walker, N; Wang, J Q; Wendt, M; White, G; Wing, M; Wolski, A; Woodley, M; Yamaoka, H; Yokoya, K; Zimmermann, Frank

    2006-01-01

    For achieving the high luminosity required at the International Linear Collider (ILC), it is critical to focus the beams to nanometer size with the ILC Beam Delivery System (BDS), and to maintain the beam collision with a nanometer-scale stability. To establish the technologies associated with this ultra-high precision beam handling, it has been proposed to implement an ILC-like final focus optics in an extension of the existing extraction beamline of ATF at KEK. The ATF is considered to be the best platform for this exercise, since it provides an adequate ultra-low emittance electron beam in a manner dedicated to the development of ILC. The two major goals for this facility, called ATF2, are : (A) Achievement of a 37 nm beam size, and (B) control of beam position down to 2 nm level. The scientific justification for the ATF2 project and its technical design have been described in Volume 1 of the ATF2 Proposal [1]. We present here Volume 2 of the ATF2 Proposal, in which we present specifics of the construction...

  8. 76 FR 76414 - Proposed Data Collections Submitted for Public Comment and Recommendations

    Science.gov (United States)

    2011-12-07

    ..., Division of Reproductive Health (DRH). Participation is completely voluntary and confidential. NHANES was... Annualized Burden Hours Number of Average burden Type of respondent Form Number of responses per per response...

  9. 78 FR 43002 - Proposed Collection; Comment Request for Revenue Procedure 2004-29

    Science.gov (United States)

    2013-07-18

    ... information displays a valid OMB control number. Books or records relating to a collection of information must... revenue law. Generally, tax returns and tax return information are confidential, as required by 26 U.S.C...

  10. 78 FR 48772 - Proposed Collection; Comment Request for Form 8874-B

    Science.gov (United States)

    2013-08-09

    ... information displays a valid OMB control number. Books or records relating to a collection of information must... revenue law. Generally, tax returns and tax return information are confidential, as required by 26 U.S.C...

  11. 77 FR 6861 - Proposed Collection; Comment Request for Form 5498-ESA

    Science.gov (United States)

    2012-02-09

    ... displays a valid OMB control number. Books or records relating to a collection of information must be.... Generally, tax returns and tax return information are confidential, as required by 26 U.S.C. 6103. Request...

  12. 78 FR 43001 - Proposed Collection; Comment Request for Revenue Procedure 2007-48

    Science.gov (United States)

    2013-07-18

    ... displays a valid OMB control number. Books or records relating to a collection of information must be.... Generally, tax returns and tax return information are confidential, as required by 26 U.S.C. 6103. Request...

  13. 78 FR 30342 - Proposal Review Panel for Materials Research; Notice of Meeting

    Science.gov (United States)

    2013-05-22

    ...: Name: Site visit review of the Materials Research Science and Engineering Center (MRSEC) at Duke.... Jones, Program Director, Materials Research Science and Engineering Centers Program, Division of... confidential nature, including technical information; financial data, such as salaries and personal information...

  14. 78 FR 40519 - Proposal Review Panel for Materials Research; Notice of Meeting

    Science.gov (United States)

    2013-07-05

    ...: Name: Site visit review of the Materials Research Science and Engineering Center (MRSEC) at the.... Charles Ying, Program Director, Materials Research Science and Engineering Centers Program, Division of... a proprietary or confidential nature, including technical information; financial data, such as...

  15. 75 FR 14479 - Request for Comments Concerning an Environmental Review of the Proposed Trans-Pacific Partnership...

    Science.gov (United States)

    2010-03-25

    ... Partnership countries (Singapore, Chile, New Zealand, Brunei Darussalam, Australia, Peru and Vietnam) with the... for the U.S.-Singapore FTA, the U.S.-Chile FTA, the U.S.-Australia FTA and the U.S.-Peru Trade... containing business confidential information, the file name of the business confidential version should begin...

  16. Trump proposes initial healthcare agenda

    Directory of Open Access Journals (Sweden)

    Robbins RA

    2016-11-01

    Full Text Available No abstract available. Article truncated at 150 words. On Friday, November 11, President-elect Trump proposed a healthcare agenda on his website greatagain.gov (1. Yesterday, November 12, he gave an interview on 60 Minutes clarifying his positions (2. Trump said that he wanted to focus on healthcare and has proposed to: •Repeal all of the Affordable Care Act; •Allow the sale of health insurance across state lines; •Make the purchase of health insurance fully tax deductible; •Expand access to the health savings accounts;•Increase price transparency; •Block grant Medicaid; •Lower entrance barriers to new producers of drugs. In his 60 Minutes interview Trump reiterated that two provisions of the ACA – prohibition of pre-existing conditions exclusion and ability for adult children to stay on parents insurance plans until age 26 – have his support (2. Other aspects of the ACA that might receive his support were not discussed. On the Department of Veterans’ Affairs ...

  17. Lidar instruments proposed for Eos

    Science.gov (United States)

    Grant, William B.; Browell, Edward V.

    1990-01-01

    Lidar, an acronym for light detection and ranging, represents a class of instruments that utilize lasers to send probe beams into the atmosphere or onto the surface of the Earth and detect the backscattered return in order to measure properties of the atmosphere or surface. The associated technology has matured to the point where two lidar facilities, Geodynamics Laser Ranging System (GLRS), and Laser Atmospheric Wind Sensor (LAWS) were accepted for Phase 2 studies for Eos. A third lidar facility Laser Atmospheric Sounder and Altimeter (LASA), with the lidar experiment EAGLE (Eos Atmospheric Global Lidar Experiment) was proposed for Eos. The generic lidar system has a number of components. They include controlling electronics, laser transmitters, collimating optics, a receiving telescope, spectral filters, detectors, signal chain electronics, and a data system. Lidar systems that measure atmospheric constituents or meteorological parameters record the signal versus time as the beam propagates through the atmosphere. The backscatter arises from molecular (Rayleigh) and aerosol (Mie) scattering, while attenuation arises from molecular and aerosol scattering and absorption. Lidar systems that measure distance to the Earth's surface or retroreflectors in a ranging mode record signals with high temporal resolution over a short time period. The overall characteristics and measurements objectives of the three lidar systems proposed for Eos are given.

  18. Riverland expedited response action proposal

    International Nuclear Information System (INIS)

    1993-04-01

    The US Environmental Protection Agency (EPA) and Washington Department of Ecology (Ecology) recommended that the US Department of Energy (DOE) prepare an expedited response action (ERA) for the Riverland Railroad Car Wash Pit and the 600 Area Army Munitions Burial Site. A non-time-critical ERA proposal includes preparation of an engineering evaluation/cost analysis (EE/CA) section. The EE/CA is a rapid, focused evaluation of available technologies using specific screening factors to assess feasibility, appropriateness, and cost. The ERA proposal will undergo reviews by Westinghouse Hanford Company (WHC), DOE, EPA, Ecology, and the public. Ecology and EPA will issue an Action Agreement Memorandum after resolution of all review comments. The, memorandum will authorize remediation activities. The ERA goal is to reduce the potential for any contaminant migration to the soil column, groundwater, and Columbia River. The ERA may be the final remediation of the 100-IU-1 Operable Unit. A No Action Record of Decision may be issued after cleanup completion

  19. Errors in anti-D immunoglobulin administration: retrospective analysis of 15 years of reports to the UK confidential haemovigilance scheme.

    Science.gov (United States)

    Bolton-Maggs, P H B; Davies, T; Poles, D; Cohen, H

    2013-06-01

    To highlight the errors associated with the use of anti-D immunoglobulin in RhD antigen-negative women, and their resultant clinical impact during and after pregnancy, and to suggest strategies to reduce these errors. Retrospective review of cumulative reporting to the UK confidential haemovigilance scheme, Serious Hazards of Transfusion (SHOT), between 1996 and 2011. Obstetric departments in the UK. Mothers who require anti-D immunoglobulin to prevent RhD sensitisation during pregnancy or after birth. Hospital transfusion teams reported adverse events to the SHOT database. Reported number of events and their causes, and morbidity and mortality associated with errors. In 15 years of reporting, SHOT haemovigilance has shown a total of 1211 errors related to the administration of anti-D immunoglobulin, particularly regarding omission or late administration (157/249 or 63% reported in 2011). Anti-D immunoglobulin errors comprised 13.7% (249/1815) of all SHOT reports in 2011. Failure to recognise women who already have RhD sensitisation occurred in 19 cases, and was followed by suboptimal monitoring of the pregnancy. Nine of the infants suffered haemolytic disease of the fetus and newborn (HDFN): one resulted in neonatal death and three required red cell transfusion. Babies as well as their mothers remain at risk from avoidable errors. More active attention at national and local levels to further education and training, particularly for midwives, is an absolute necessity. We recommend the use of a SHOT-devised anti-D administration flowchart, adapted locally into a checklist, to help reduce errors. © 2013 The Authors BJOG An International Journal of Obstetrics and Gynaecology © 2013 RCOG.

  20. Saving Mothers' Lives: Reviewing maternal deaths to make motherhood safer: 2006-2008. The Eighth Report of the Confidential Enquiries into Maternal Deaths in the United Kingdom.

    LENUS (Irish Health Repository)

    Cantwell, Roch

    2011-03-01

    In the triennium 2006-2008, 261 women in the UK died directly or indirectly related to pregnancy. The overall maternal mortality rate was 11.39 per 100,000 maternities. Direct deaths decreased from 6.24 per 100,000 maternities in 2003-2005 to 4.67 per 100,000 maternities in 2006–2008 (p = 0.02). This decline is predominantly due to the reduction in deaths from thromboembolism and, to a lesser extent, haemorrhage. For the first time there has been a reduction in the inequalities gap, with a significant decrease in maternal mortality rates among those living in the most deprived areas and those in the lowest socio-economic group. Despite a decline in the overall UK maternal mortality rate, there has been an increase in deaths related to genital tract sepsis, particularly from community acquired Group A streptococcal disease. The mortality rate related to sepsis increased from 0.85 deaths per 100,000 maternities in 2003-2005 to 1.13 deaths in 2006-2008, and sepsis is now the most common cause of Direct maternal death. Cardiac disease is the most common cause of Indirect death; the Indirect maternal mortality rate has not changed significantly since 2003-2005. This Confidential Enquiry identified substandard care in 70% of Direct deaths and 55% of Indirect deaths. Many of the identified avoidable factors remain the same as those identified in previous Enquiries. Recommendations for improving care have been developed and are highlighted in this report. Implementing the Top ten recommendations should be prioritised in order to ensure the overall UK maternal mortality rate continues to decline.

  1. Redesigning Introductory Biology: A Proposal

    Directory of Open Access Journals (Sweden)

    Eileen Gregory

    2011-03-01

    Full Text Available With the increasing complexity and expansion of the biological sciences, there has been a corresponding increase in content in the first-year introductory biology course sequence for majors. In general this has resulted in courses that introduce students to large amounts of material and leave little time for practicing investigative science or skill development. Based on our analysis of data compiled from 742 biology faculty at a variety of institutions across the United States, we verified that there is strong agreement on the content appropriate for introductory biology courses for majors. Therefore, we propose that faculty teaching these courses focus primarily on the topics identified in this study, and redesign their courses to incorporate active learning strategies that emphasize the investigative nature of biology and provide opportunities for skill development.

  2. Planned and proposed pipeline regulations

    International Nuclear Information System (INIS)

    De Leon, C.

    1992-01-01

    The Research and Special Programs Administration administers the Natural Gas Pipeline Safety Act of 1968 (NGPSA) and the Hazardous Liquid Pipeline Safety Act of 1979 (HLPSA). The RSPA issues and enforces design, construction, operation and maintenance regulations for natural gas pipelines and hazardous liquid pipelines. This paper discusses a number of proposed and pending safety regulations and legislative initiatives currently being considered by the RSPA and the US Congress. Some new regulations have been enacted. The next few years will see a great deal of regulatory activity regarding natural gas and hazardous liquid pipelines, much of it resulting from legislative requirements. The office of Pipeline Safety is currently conducting a study to streamline its operations. This study is analyzing the office's business, social and technical operations with the goal of improving overall efficiency, effectiveness, productivity and job satisfaction to meet the challenges of the future

  3. CAST Physics Proposal to SPSC

    CERN Document Server

    CAST, Collaboration

    2011-01-01

    The CAST experiment has the potential to search for solar axions (dark matter particle candidates) or other particles with similar coupling. E.g., paraphtons (Hidden Sector), chameleons (dark energy), while considering the possibility whether CAST could be transformed to an antenna for relic axions with rest mass up to 0.1 to 1meV. While axion searches suggest detectors with lower background, paraphoton and chameleon searches require detectors with sub-keV threshold energy and the use of transparent windows in front of the Micromegas detectors, which cover 3 out of the 4 CAST magnet exits. Ongoing theoretical estimates and experimental investigations will define the priorities of the suggested 4 physics items of this proposal for the period 2012-2014.

  4. XMM-Newton Proposal 02010304

    Science.gov (United States)

    Chu, You-Hua

    2003-03-01

    Supergiant shells with diameters approaching 1000 pc may break through the gaseous disk of their host galaxy, and transfer energy and mass into the galactic halo. The Large Magellanic Cloud contains several supergiant shells, among which LMC2 has the most spectacular filamentary shell structure and the brightest diffuse X-ray emission. The X-ray emission exists within the optical shell boundary and extends beyond the southern shell rim. We propose to use the XMM-Newton EPIC cameras to map LMC2 and its southern extension in order to study the physical structure of LMC2 and the role it plays in the global structure of the interstellar medium. This program was awarded time in AO1, but ~60% of the observations were corrupted by high background. We request make-up time to complete our program.

  5. Medical heavy ion accelerator proposals

    International Nuclear Information System (INIS)

    Gough, R.A.

    1985-05-01

    For several decades, accelerators designed primarily for research in nuclear and high energy physics have been adapted for biomedical research including radiotherapeutic treatment of human diseases such as pituitary disorders, cancer, and more recently, arteriovascular malformations. The particles used in these treatments include pions, protons and heavier ions such as carbon, neon, silicon and argon. Maximum beam energies must be available to penetrate into an equivalent of about 30 cm of water, requiring treatment beams of 250 to 1000 MeV/nucleon. Certain special treatments of superficial melanoma, however, require that beam energies as low as 70 MeV/nucleon also be available. Intensities must be adequate to complete a 100 rad treatment fraction in about 1 minute. For most heavy ion treatments, this corresponds to 10 7 -10 9 ions/second at the patient. Because this research is best conducted in a dedicated, hospital-based facility, and because of the clinical need for ultra-high reliability, the construction of new and dedicated facilities has been proposed. Heavy ion accelerators can provide a variety of ions and energies, permitting treatment plans that exploit the properties of the ion best suited to each individual treatment, and that employ radioactive beams (such as 11 C and 19 Ne) to precisely confirm the dose localization. The favored technical approach in these proposals utilizes a conventional, strong-focusing synchrotron capable of fast switching between ions and energies, and servicing multiple treatment rooms. Specialized techniques for shaping the dose to conform to irregularly-shaped target volumes, while simultaneously sparing surrounding, healthy tissue and critical structures, are employed in each treatment room, together with the sophisticated dosimetry necessary for verification, monitoring, and patient safety. 3 refs., 8 figs

  6. CERN Pensions: A constructive proposal

    CERN Multimedia

    Staff Association

    2014-01-01

      A new endangering of the Pension Fund   In 2010 and 2011 Council adopted a package of measures (see Echo 195 for background information) that commits staff, retirees and the Organization to all contribute to the balancing of the Pension Fund by 2041. In particular, CERN’s Member States agreed to pay a special contribution of 60 MCHF per year for 30 years or until full funding is achieved, if this arrives sooner. Today, less than four years later, some Member States already want to find ways to come back on their commitment. The fact that one of the parties that accepted the package wants to change its commitment unilaterally is in evident disagreement with the 2011 Council resolution(1)  and therefore unacceptable. Nevertheless to be helpful we put forward a constructive proposal. Special contribution or...   Currently the Fund has a yearly outflow of around 300 MCHF to pay pension benefits of which some 60 MCHF (approximately 20% of pensions received) a...

  7. WA10 Working in partnership with people with learning disabilities: academics and people with learning disabilities working together to disseminate the findings of a confidential inquiry into deaths of people with learning disabilities through film.

    Science.gov (United States)

    Russ, Lesley

    2015-04-01

    In England, between 2010-2013, a Confidential Inquiry into premature Deaths of People with Learning Disabilities was commissioned by the Department of Health. This took place in SW England led by Norah Fry Research Centre at Bristol University. Findings from the investigations into 247 deaths included that men with learning disabilities die, on average 13 years sooner and women, on average 20 years sooner, than the general population. Over 1/3 (37%) were found to be avoidable, being amenable to good quality healthcare. A number of key recommendations were made which required understanding by a range of audiences including people with learning disabilities and their carers. This workshop will demonstrate how academics can work with actors with learning disabilities to disseminate research findings about a sensitive subject in a thought provoking and accessible way. Academics worked with the MISFITs theatre company to make a DVD about the findings and recommendations of the Confidential Inquiry. The DVD presents the findings of the Confidential Inquiry through the stories of John, Bill, Karen and Emily. It powerfully illustrates the importance of diagnosing and treating illness of people with learning disabilities in a timely and appropriate manner and highlights the measures that could be taken to reduce premature deaths in this population. The session provides an example of how the voices of people with learning disabilities can communicate research messages effectively to people with learning disabilities, health and social care practitioners and others who support the learning disability population. © 2015, Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://group.bmj.com/group/rights-licensing/permissions.

  8. Privacy preserving probabilistic record linkage (P3RL): a novel method for linking existing health-related data and maintaining participant confidentiality.

    Science.gov (United States)

    Schmidlin, Kurt; Clough-Gorr, Kerri M; Spoerri, Adrian

    2015-05-30

    preserve privacy of persons in the study. Privacy Preserving Probabilistic Record linkage expands record linkage facilities in settings where a unique identifier is unavailable and/or regulations restrict access to the non-unique person identifiable information needed to link existing health-related data sets. Automated pre-processing and encryption fully protect sensitive information ensuring participant confidentiality. This method is suitable not just for epidemiological research but also for any setting with similar challenges.

  9. Ombuds’ corner: Confidentiality concerning boards

    CERN Multimedia

    Vincent Vuillemin

    2011-01-01

    In this series, the Bulletin aims to explain the role of the Ombuds at CERN by presenting practical examples of misunderstandings that could have been resolved by the Ombuds if he had been contacted earlier. Please note that, in all the situations we present, the names are fictitious and used only to improve clarity.   Phil* was a candidate for a position in a different group from the one he had been working for. After his board had taken place, Phil asked for an appointment with the Ombuds. In his opinion, the interview went reasonably well. However Phil had some concerns as he had heard that there was no point in him applying as another candidate will get the position. He had decided to apply anyway, encouraged by other people, with the hope that he would get a good rating that could help him get a position in the future, if he didn't get present one. During the interview he was asked some questions that could only have been answered by candidates with  experience related ...

  10. Confidentiality | Benatar | Continuing Medical Education

    African Journals Online (AJOL)

    Continuing Medical Education. Journal Home · ABOUT THIS JOURNAL · Advanced Search · Current Issue · Archives · Journal Home > Vol 21, No 1 (2003) >. Log in or Register to get access to full text downloads.

  11. Viewpoint on proposed radiation-protection standards

    International Nuclear Information System (INIS)

    Auxier, J.A.

    1982-01-01

    The proposed revision of 10CFR20 is discussed from a personal perspective. A brief historical review of the development of radiation standards is presented, and arguments against the proposed de minimis level elaborated upon

  12. Proposed Food (Control of Irradiation) Regulations 1990

    International Nuclear Information System (INIS)

    1990-08-01

    The paper summarizes proposals UK Ministry of Agriculture, Fisheries and Food Proposals for part of a comprehensive range of controls applying to premises using sources of ionising radiation in the processing of food. (UK)

  13. Proposed changes in intermediate pipe break criteria

    International Nuclear Information System (INIS)

    Schmitz, R.P.

    1984-01-01

    Bechtel Power Corporation proposed to the US NRC in 1983 that the NRC eliminate from their criteria all intermediate breaks. Bechtel's rationale for the proposal and support for their position are presented

  14. Return on investment (ROI) proposal preparation guide

    International Nuclear Information System (INIS)

    Valero, O.J.

    1998-01-01

    The ROI Proposal Preparation Guide is a tool to assist Hanford waste generators in preparing ROI proposal forms for submittal to Department of Energy, Richland Operations Office (DOE/RL) for funding. The guide describes the requirements for submitting an ROI proposal and provides examples of completed ROI forms. The intent is to assist waste generators in identifying projects that meet the criteria, provide information necessary to complete the ROI forms, and submit a proposal that is eligible to receive funding

  15. 75 FR 2510 - Procurement List: Proposed Additions

    Science.gov (United States)

    2010-01-15

    ... PEOPLE WHO ARE BLIND OR SEVERELY DISABLED Procurement List: Proposed Additions AGENCY: Committee for Purchase From People Who Are Blind or Severely Disabled. ACTION: Proposed Additions to Procurement List. SUMMARY: The Committee is proposing to add to the Procurement List services to be provided by nonprofit...

  16. 78 FR 7412 - Procurement List; Proposed Additions

    Science.gov (United States)

    2013-02-01

    ... PEOPLE WHO ARE BLIND OR SEVERELY DISABLED Procurement List; Proposed Additions AGENCY: Committee for Purchase From People Who Are Blind or Severely Disabled. ACTION: Proposed Additions to the Procurement List. SUMMARY: The Committee is proposing to add products to the Procurement List that will be furnished by the...

  17. 76 FR 9555 - Procurement List; Proposed Deletions

    Science.gov (United States)

    2011-02-18

    ... PEOPLE WHO ARE BLIND OR SEVERELY DISABLED Procurement List; Proposed Deletions AGENCY: Committee for Purchase From People Who Are Blind or Severely Disabled. ACTION: Proposed deletions from the Procurement...'Day Act (41 U.S.C. 46- 48c) in connection with the products proposed for deletion from the Procurement...

  18. 78 FR 5423 - Procurement List; Proposed Additions

    Science.gov (United States)

    2013-01-25

    ... FROM PEOPLE WHO ARE BLIND OR SEVERELY DISABLED Procurement List; Proposed Additions AGENCY: Committee... Procurement List. SUMMARY: The Committee is proposing to add products to the Procurement List that will be... have other severe disabilities. The following products are proposed for addition to the Procurement...

  19. 77 FR 2048 - Procurement List Proposed Additions

    Science.gov (United States)

    2012-01-13

    ... PEOPLE WHO ARE BLIND OR SEVERELY DISABLED Procurement List Proposed Additions AGENCY: Committee for Purchase From People Who Are Blind or Severely Disabled. ACTION: Proposed Additions to the Procurement List. SUMMARY: The Committee is proposing to add services to the Procurement List that will be provided by the...

  20. 75 FR 57910 - Proposed Agency Information Collection

    Science.gov (United States)

    2010-09-23

    ... Preservation Act (NHPA). Comments are invited on: (a) Whether the proposed collection of information is... DEPARTMENT OF ENERGY Proposed Agency Information Collection AGENCY: U.S. Department of Energy... information under the provisions of the Paperwork Reduction Act of 1995. The proposed collection will collect...

  1. Sustainable Energy. Alternative proposals to Mercosur

    International Nuclear Information System (INIS)

    Honty, G.

    2002-01-01

    After a brief assessment of the Mercosur energy sector (Mercosur is a regional trade agreement subscribed to by Argentina, Brazil, Paraguay and Uruguay) an overview is given of proposals for a sustainable energy integration in the Mercosur: general proposals by sector, specific proposals for the larger economies (Argentina and Brazil), and means of implementation

  2. 7 CFR 3403.10 - Proposal review.

    Science.gov (United States)

    2010-01-01

    ... will be judged on its own merit. USDA is under no obligation to fund any proposal or any specific number of proposals in a given topic. It also may elect to fund several or none of the proposed... organizations. If possible, USDA intends that peer review groups shall be balanced with minority and female...

  3. Comment on a few nomenclatural congress proposals

    NARCIS (Netherlands)

    NN,

    1959-01-01

    In the Synopsis of Proposals for the Botanical Congress at Montreal Dr Lanjouw has in his capacity of Rapporteur général given his well-considered opinion on each proposal, except for that on nomina specifica conservanda where he found fit to postpone his comment. There are three proposals on which

  4. Fitness for detention in police custody: a practical proposal for improving the format of medical opinion.

    Science.gov (United States)

    Chariot, Patrick; Briffa, Hugo; Lepresle, Aude; Lefèvre, Thomas; Boraud, Cyril

    2013-11-01

    Health issues among arrestees are a worldwide concern for which only local policies have been established. Physicians attending detainees in police custody are expected to decide whether the detainee's health status is compatible with detention in a police station and make any useful observations. A high degree of heterogeneity in the information collected by the physician and transmitted to the police has been observed. We analyzed the content and limitations of available documents and developed a model that could serve as a guide for any attending physician. The document presented here has been used in France on over 50,000 occasions since June 2010. We developed a two-page template consisting of (1) a standard medical certificate to be sent to the authority who requested the doctor's attendance and (2) a confidential medical record, not sent to the requesting authority. We evaluated perceived health by the three global health indicators of the Minimum European Health Module and used DSM IV criteria for the evaluation of addictive disorders. In the case of recent traumatic injuries, the certificate has also included the collection of data on traumatic injuries and the contexts of their occurrence. The proposed certificate achieved several goals, by protecting the interests of the person examined, in case of poor conditions of arrest or detention, protecting doctors in cases of legal proceedings, and allowing epidemiological data to be collected. The certificate may also contribute to an international awareness of medical care for detainees in police custody. Copyright © 2013 Elsevier Ltd and Faculty of Forensic and Legal Medicine. All rights reserved.

  5. Animal testing and alternative approaches for the human health risk assessment under the proposed new European chemicals regulation.

    Science.gov (United States)

    Höfer, Thomas; Gerner, Ingrid; Gundert-Remy, Ursula; Liebsch, Manfred; Schulte, Agnes; Spielmann, Horst; Vogel, Richard; Wettig, Klaus

    2004-10-01

    During the past 20 years the EU legislation for the notification of chemicals has focussed on new chemicals and at the same time failed to cover the evaluation of existing chemicals in Europe. Therefore, in a new EU chemicals policy (REACH, Registration, Evaluation and Authorization of Chemicals) the European Commission proposes to evaluate 30,000 chemicals within a period of 15 years. We are providing estimates of the testing requirements based on our personal experiences during the past 20 years. A realistic scenario based on an in-depth discussion of potential toxicological developments and an optimised "tailor-made" testing strategy shows that to meet the goals of the REACH policy, animal numbers may be significantly reduced below 10 million if industry would use in-house data from toxicity testing, which are confidential, if non-animal tests would be used, and if information from quantitative structure activity relationships (QSARs) would be applied in substance-tailored testing schemes. The procedures for evaluating the reproductive toxicity of chemicals have the strongest impact on the total number of animals bred for testing under REACH. We are assuming both an active collaboration with our colleagues in industry and substantial funding of the development and validation of advanced non-animal methods by the EU Commission, specifically in reproductive and developmental toxicity.

  6. Depression, anxiety, and suicidal ideation among Vietnamese secondary school students and proposed solutions: a cross-sectional study

    Science.gov (United States)

    2013-01-01

    Background There is a rapidly growing public awareness of mental health problems among Vietnamese secondary school students. This study aims to determine the prevalence of anxiety, depression, and suicidal ideation, to identify related risk factors, and to explore students’ own proposals for improving their mental health. Methods A cross-sectional study was conducted among 1161 secondary students in Can Tho City, Vietnam during September through December, 2011. A structured questionnaire was used to assess anxiety, depression, suicidal ideation and proposed solutions. Depression was measured using the Center for Epidemiology Studies Depression Scale. Results The prevalence estimates of symptoms reaching a threshold comparable to a diagnosis of anxiety and depression were 22.8% and 41.1%, respectively. Suicide had been seriously considered by 26.3% of the students, while 12.9% had made a suicide plan and 3.8% had attempted suicide. Major risk factors related to anxiety and depression were physical or emotional abuse by the family, and high educational stress. As proposed solutions, nearly 80% of students suggested that the academic workload should be reduced and that confidential counselors should be appointed at schools. About half the students stated that the attitudes of their parents and teachers needed to change. A significant majority said that they would visit a website that provided mental health support for students. Conclusions Anxiety, depression, and suicidal ideation are common among Vietnamese secondary school students. There are strong associations with physical and emotional abuse in the family and high educational stress. Academic curricula and attitudes of parents and teachers need to be changed from a punitive to a more supportive approach to reduce the risk of poor mental health. An internet-based mental health intervention could be a feasible and effective first step to improve students’ mental health. PMID:24341792

  7. 48 CFR 915.305 - Proposal evaluation.

    Science.gov (United States)

    2010-10-01

    ... AND CONTRACT TYPES CONTRACTING BY NEGOTIATION Source Selection 915.305 Proposal evaluation. (d... personnel will be required to comply with DOE conflict of interest and nondisclosure requirements. ...

  8. Industry Raps OSHA's Proposed Cancer Policy

    Science.gov (United States)

    Chemical and Engineering News, 1978

    1978-01-01

    Presents the response of the American Industrial Health Council (AIHC) to the Occupational Safety and Health Administration's (OSHA's) genetic proposal for regulating chemical carcinogens in industry. (HM)

  9. 50 CFR 402.48 - Conference on proposed species or proposed critical habitat.

    Science.gov (United States)

    2010-10-01

    ... critical habitat. 402.48 Section 402.48 Wildlife and Fisheries JOINT REGULATIONS (UNITED STATES FISH AND... Act § 402.48 Conference on proposed species or proposed critical habitat. EPA may employ the procedures described in § 402.10 to confer on any species proposed for listing or any habitat proposed for...

  10. 75 FR 78212 - Proposed Information Collection; Comment Request; Center for Economic Studies Research Proposal...

    Science.gov (United States)

    2010-12-15

    ... proposal submission process. There are two distinct steps to submit a research proposal. The first step is... Proposal Process Persons wishing to conduct research at a Research Data Center must submit a research... Census Bureau Proposed Information Collection; Comment Request; Center for Economic Studies Research...

  11. PACMan to Help Sort Hubble Proposals

    Science.gov (United States)

    Kohler, Susanna

    2017-04-01

    Every year, astronomers submit over a thousand proposals requesting time on the Hubble Space Telescope (HST). Currently, humans must sort through each of these proposals by hand before sending them off for review. Could this burden be shifted to computers?A Problem of VolumeAstronomer Molly Peeples gathered stats on the HST submissions sent in last week for the upcoming HST Cycle 25 (the deadline was Friday night), relative to previous years. This years proposal round broke the record, with over 1200 proposals submitted in total for Cycle 25. [Molly Peeples]Each proposal cycle for HST time attracts on the order of 1100 proposals accounting for far more HST time than is available. The proposals are therefore carefully reviewed by around 150 international members of the astronomy community during a six-month process to select those with the highest scientific merit.Ideally, each proposal will be read by reviewers that have scientific expertise relevant to the proposal topic: if a proposal requests HST time to study star formation, for instance, then the reviewers assigned to it should have research expertise in star formation.How does this matching of proposals to reviewers occur? The current method relies on self-reported categorization of the submitted proposals. This is unreliable, however; proposals are often mis-categorized by submitters due to misunderstanding or ambiguous cases.As a result, the Science Policies Group at the Space Telescope Science Institute (STScI) which oversees the review of HST proposals must go through each of the proposals by hand and re-categorize them. The proposals are then matched to reviewers with self-declared expertise in the same category.With the number of HST proposals on the rise and the expectation that the upcoming James Webb Space Telescope (JWST) will elicit even more proposals for time than Hubble scientists at STScI and NASA are now asking: could the human hours necessary for this task be spared? Could a computer program

  12. Process-based project proposal risk management

    Directory of Open Access Journals (Sweden)

    Alok Kumar

    2016-12-01

    Full Text Available We all are aware of the organizational omnipresence. Projects within the organizations are ubiquitous too. Projects achieve their goals successfully if they are planned, scheduled, controlled and implemented well. The project lifecycle of initiating, planning, scheduling, controlling and implementing are very well-planned by project managers and the organizations. Successful projects have well-developed risk management plans to deal with situations impacting projects. Like any other organisation, a university does try to access funds for different purposes too. For such organisations, running a project is not the issue, rather getting a project proposal approved to fund a project is the key. Project proposal processing is done by the nodal office in every organisation. Usually, these nodal offices help in administration and submission of a project proposal for accessing funds. Seldom are these nodal project offices within the organizations facilitate a project proposal approval by proactively reaching out to the project managers. And as project managers prepare project proposals, little or no attention is made to prepare a project proposal risk plan so as to maximise project acquisition. Risk plans are submitted while preparing proposals but these risk plans cater to a requirement to address actual projects upon approval. Hence, a risk management plan for project proposal is either missing or very little effort is made to treat the risks inherent in project acquisition. This paper is an integral attempt to highlight the importance of risk treatment for project proposal stage as an extremely important step to preparing the risk management plan made for projects corresponding to their lifecycle phases. Several tools and techniques have been proposed in the paper to help and guide either the project owner (proposer or the main organisational unit responsible for project management. Development of tools and techniques to further enhance project

  13. 75 FR 47552 - Proposed Collection; Comment Request

    Science.gov (United States)

    2010-08-06

    ... the proposed collection of information is necessary for the proper performance of the functions of the... estimate of the burden of the proposed information collection; ways to enhance the quality, utility, and...; Associated Form; and OMB Number: Defense Centers of Excellence for Psychological Health and Traumatic Brain...

  14. Corporate Social Responsibility and Shareholder Proposals

    NARCIS (Netherlands)

    Eding, Erwin; Scholtens, Bert

    2017-01-01

    We study how corporate social responsibility relates to investors, firms, and shareholder proposals. We examine shareholder proposals on environmental, social, and governance issues at the annual general meeting of shareholders with US Fortune 250 firms during 2011-2014. We find that the probability

  15. 75 FR 22577 - Proposed Privacy Policy Statement

    Science.gov (United States)

    2010-04-29

    ... request for public comment on Proposed Privacy Policy Statement. SUMMARY: The U.S. Election Assistance Commission (EAC) seeks public comment on the Proposed Privacy Policy Statement. OMB Memorandum M-99- 18.... These statements are intended to inform the public of government- wide policies and how each agency...

  16. Proposals for regional cooperation in Africa

    International Nuclear Information System (INIS)

    Diaco, T.

    1999-01-01

    This presentation includes proposals for regional cooperation in Africa in the field of seismic monitoring and proposes future actions for establishing this cooperation. It emphasises the benefits of regional cooperation meaning scientific benefit from an established data base, as well as benefit in the field of geology, meteorology, geophysics and in unified budgets and logistics

  17. 76 FR 34064 - Procurement List; Proposed Additions

    Science.gov (United States)

    2011-06-10

    ... COMMITTEE FOR PURCHASE FROM PEOPLE WHO ARE BLIND OR SEVERELY DISABLED Procurement List; Proposed Additions AGENCY: Committee for Purchase From People Who Are Blind or Severely Disabled. ACTION: Proposed..., Party, Birthday, Sports-Theme, 8pc. NPA: Winston-Salem Industries for the Blind, Inc., Winston-Salem, NC...

  18. Shareholder activism through proposals : The European perspective

    NARCIS (Netherlands)

    Renneboog, Luc; Szilagyi, P.G.; Cziraki, Peter; Bratton, W.; McCahery, J.

    This paper is the first to investigate the corporate governance role of shareholderinitiated proxy proposals in European firms. While proposals in the US are nonbinding even if they pass the shareholder vote, they are legally binding in the UK and most of Continental Europe. Nonetheless, submissions

  19. 75 FR 60433 - Proposed Collection; Comment Request

    Science.gov (United States)

    2010-09-30

    ... Department of Navy Proposed Collection; Comment Request AGENCY: Marine Corps Recruiting Command, Marine Corps... Reduction Act of 1995, the U.S. Marine Corps announces a proposed extension of a public information..., including whether the information shall have practical utility; (b) the accuracy of the agency's estimate of...

  20. 78 FR 43185 - Proposed Collection; Comment Request

    Science.gov (United States)

    2013-07-19

    ... have practical utility; (b) the accuracy of the agency's estimate of the burden of the proposed... of the proposal and associated collection instruments, please write to the Marine Corps Marathon Office, Attn: Angela Huff, P.O. Box 188, Quantico, VA 22134, or call the Marine Corps Marathon Office at...

  1. Research Proposal for Distributed Deep Web Search

    NARCIS (Netherlands)

    Tjin-Kam-Jet, Kien

    2010-01-01

    This proposal identifies two main problems related to deep web search, and proposes a step by step solution for each of them. The first problem is about searching deep web content by means of a simple free-text interface (with just one input field, instead of a complex interface with many input

  2. 76 FR 62098 - Proposed Collection; Comment Request

    Science.gov (United States)

    2011-10-06

    ... public comment on new or revised data collections, the Railroad Retirement Board (RRB) will publish periodic summaries of proposed data collections. Comments are invited on: (a) Whether the proposed... that the information provided is correct and the applicant's agreement to sign the form by proxy. The...

  3. 76 FR 60593 - Title VI; Proposed Circular

    Science.gov (United States)

    2011-09-29

    ... recommends. In addition, we propose changing the format to make this Circular consistent with the style of... cross-referencing information related to Title VI that FTA and FHWA jointly assess and evaluate during... Title VI reporting requirements for each of these roles. We also propose cross-referencing information...

  4. 78 FR 21116 - Proposed Collection; Comment Request

    Science.gov (United States)

    2013-04-09

    ... 12829, ``National Industrial Security Program (NISP)'' Section 202(a) stipulates that the Secretary of... Office of the Secretary Proposed Collection; Comment Request AGENCY: Defense Security Service, DoD... Defense Security Service (DSS) announces the proposed extension of a public information collection and...

  5. 76 FR 70976 - Proposed Collection; Comment Request

    Science.gov (United States)

    2011-11-16

    ... Uses: Executive Order (EO) 12829, ``National Industrial Security Program (NISP),'' stipulates that the... of the Secretary Proposed Collection; Comment Request AGENCY: Defense Security Service, DoD. ACTION... Defense Security Service (DSS) announces the proposed extension of a public information collection and...

  6. A DIALOGIC PROPOSAL TO LITERARY LITERACY

    Directory of Open Access Journals (Sweden)

    Helio Castelo Branco Ramos

    2016-07-01

    Full Text Available Based on Bakhtin’s Circle’ studies, we reflect about a proposal of literary literacy on which teachers can teach abilities on orality, writing, reading and linguistic aspects reflection to their students in an integrated way. Therefore, our proposal of literary literacy is combined with the pragmatic discourse genres literacy, such as news found in digital sphere.

  7. Proposals for radium therapy in 1903

    International Nuclear Information System (INIS)

    Mould, R. F.; Litten, F.S.; Bruggmoser, G.; Aronowitz, J. N.

    2007-01-01

    'Proposals for Radium Therapy' has been published by Hermann Strebel (1868-1943) in 1903. Tis paper was the first proposal of afterloading and crossfire principles being till now an essence of modern brachytherapy. Below, the first Polish translation of the original (in German) Strebel's text is presented

  8. 50 CFR 424.16 - Proposed rules.

    Science.gov (United States)

    2010-10-01

    ... 50 Wildlife and Fisheries 7 2010-10-01 2010-10-01 false Proposed rules. 424.16 Section 424.16... OF COMMERCE); ENDANGERED SPECIES COMMITTEE REGULATIONS SUBCHAPTER A LISTING ENDANGERED AND THREATENED SPECIES AND DESIGNATING CRITICAL HABITAT Revision of the Lists § 424.16 Proposed rules. (a) General. Based...

  9. 78 FR 44160 - Proposed Collection, Comment Request

    Science.gov (United States)

    2013-07-23

    ... Contracted Annual Refiling Survey (CARS). Under CARS, BLS effectively utilizes the commercial advantages... comments concerning the proposed revision of the Annual Refiling Survey (ARS). A copy of the proposed..., the Annual Refiling Survey (ARS) is used in conjunction with the UI tax reporting system in each State...

  10. How to write reports and proposals

    CERN Document Server

    Forsyth, Patrick

    2016-01-01

    How to Write Reports and Proposals is essential reading for achieving effective writing techniques. Getting a message across on paper and presenting a proposal in a clear and persuasive form are vital skills for anyone in business. How to Write Reports and Proposals provides practical advice on how to impress, convince and persuade your colleagues or clients. It will help you: improve your writing skills; think constructively before writing; create a good report; produce persuasive proposals; use clear and distinctive language; present numbers, graphs and charts effectively. Full of checklists, exercises and real life examples, this new edition also contains content on how to write succinctly and with impact across different mediums. How to Write Reports and Proposals will help you to put over a good case with style.

  11. Return on investment (ROI) proposal preparation guide

    International Nuclear Information System (INIS)

    BOOM, R.J.

    1999-01-01

    Section I: Background Return on Investment (ROI) Proposal Preparation Guide-- Over $1.9M is available to fund fiscal year (FY) 2000 waste minimization projects on the Hanford Site. This money was allocated by the US. Department of Energy Headquarters (DOE-HQ). The U.S. Department of Energy, Richland Operations (RL) and the U.S. Department of Energy, Office of River Protection (ORP) are currently seeking pollution prevention proposals from across the Hanford Site that provide a high return-on-investment (ROI) by reducing waste and associated management costs. Purpose of ROI Training The ROI Proposal Preparation Guide is a tool to assist Hanford waste generators in preparing ROI proposal forms for submittal to RL for funding. The guide describes the requirements for submitting an ROI proposal and provides examples of completed ROI forms. The intent is to assist waste generators in identifying projects that meet the criteria, provide information necessary to complete the ROI forms, and submit a proposal that is eligible to receive funding. This guide accompanies the one-hour training workshop on how to prepare and submit an ROI proposal

  12. The Ontario Energy Board's proposed new mandate

    International Nuclear Information System (INIS)

    Laughren, F.

    1998-01-01

    The Ontario Energy Board's proposed new mandate was reviewed. The role of the Board will be to regulate the monopoly delivery components of the electricity and natural gas industry and to smooth the transition to competition. The Board will monitor market performance and will encourage electricity and natural gas monopoly services to be compatible where possible. The Board will also assist local restructuring efforts when called upon do so and ensure that the marketplace operates efficiently and effectively. Gas marketers' licensing is scheduled to begin in early 1999. Licenses will also apply to the electric industry. The objectives of the proposed licensing, the regulatory requirements and the proposed regulatory approach are described

  13. Allowance System: Proposed acid-rain rule

    International Nuclear Information System (INIS)

    1991-12-01

    The U.S. Environmental Protection Agency (EPA) has proposed four rules containing the core acid rain requirements: the Permits Rule (40 CFR Part 72), the Allowance System Rule (40 CFR Part 73), the Continuous Emission Monitoring Rule (40 CFR Part 75), and the Excess Emissions Rule (40 CFR Part 77). EPA will also propose additional rules at a future date. These rules will include requirements for facilities that elect to opt into the Acid Rain Program (40 CFR Part 74) and for the nitrogen oxide (NOx) control program (40 CFR Part 76). The fact sheet summarizes the key components of EPA's proposed Allowance System

  14. Environmental assessment, proposed generating station for Darlington

    International Nuclear Information System (INIS)

    1975-04-01

    This document indicates the intention of Ontario Hydro to seek approval from the Provincial Government for its plan to construct and operate a 3400 MWe nuclear generating station at the Darlington site, west of Bowmanville. This preliminary proposal also contains the environmental assessment. The environmental section of this proposal describes and assesses the existing environment and the environmental influences which would occur due to the construction and operation of a nuclear generating station, consisting of four 850 MW units, at the Darlington site. This proposed station is similar to the Bruce GS A station presently under construction. (author)

  15. Proposal of a "Checklist" for endodontic treatment

    OpenAIRE

    Díaz-Flores García, Victor; Perea Pérez, Bernardo; Labajo González, María Elena; Santiago Sáez, Andrés; Cisneros Cabello, Rafael

    2014-01-01

    Objectives: On the basis of the “Surgical Checklist” proposed by the WHO, we propose a new Checklist model adapted to the procedures of endodontic treatment. Study Design: The proposed document contains 21 items which are broken down into two groups: those which must be verified before beginning the treatment, and those which must be verified after completing it, but before the patient leaves the dentist’s office. Results: The Checklist is an easy-to-use tool that requires little time but pro...

  16. 75 FR 2929 - Proposed Collection; Comment Request for Form 13614-NR

    Science.gov (United States)

    2010-01-19

    ... volunteer tax return preparers receive quality training and tools, form 13614-NR ensures they consistently... displays a valid OMB control number. Books or records relating to a collection of information must be.... Generally, tax returns and tax return information are confidential, as required by 26 U.S.C. 6103. Request...

  17. 78 FR 37277 - Proposed Collection: Comment Request for Form 1099-S

    Science.gov (United States)

    2013-06-20

    ... number. Books or records relating to a collection of information must be retained as long as their contents may become material in the administration of any internal revenue law. Generally, tax returns and tax return information are confidential, as required by 26 U.S.C. 6103. Request for Comments: Comments...

  18. 77 FR 6860 - Proposed Collection; Comment Request for Revenue Procedure 2009-14

    Science.gov (United States)

    2012-02-09

    ... resolution of specific issues relating to tax returns. The resolution of such issues under the program will... the collection of information displays a valid OMB control number. Books or records relating to a... administration of any internal revenue law. Generally, tax returns and tax return information are confidential...

  19. 78 FR 36638 - Proposed Collection; Comment Request for Form 8916-A

    Science.gov (United States)

    2013-06-18

    ... information displays a valid OMB control number. Books or records relating to a collection of information must... revenue law. Generally, tax returns and tax return information are confidential, as required by 26 U.S.C..., maintenance, and purchase of services to provide information. Approved: May 29, 2013. Allan M. Hopkins, Tax...

  20. 78 FR 2722 - Proposed Collection; Comment Request for Form 13920 and 13930

    Science.gov (United States)

    2013-01-14

    ... on certain payments of Non Resident Aliens (NRAs). Section 1.1441-4(b)(3) of the Income Tax... displays a valid OMB control number. Books or records relating to a collection of information must be.... Generally, tax returns and tax return information are confidential, as required by 26 U.S.C. 6103. Request...

  1. 75 FR 2933 - Proposed Collection; Comment Request for Form 8879-S

    Science.gov (United States)

    2010-01-19

    ... personal identification number (PIN) to electronically sign a corporation's electronic income tax return... collection of information displays a valid OMB control number. Books or records relating to a collection of... internal revenue law. Generally, tax returns and tax return information are confidential, as required by 26...

  2. 75 FR 61840 - Proposed Collection; Comment Request for Form 5300 and Schedule Q (Form 5300)

    Science.gov (United States)

    2010-10-06

    ... trusts and the tax exempt status of these trusts. Form 5300 is used to request a determination letter... information displays a valid OMB control number. Books or records relating to a collection of information must... revenue law. Generally, tax returns and ] tax return information are confidential, as required by 26 U.S.C...

  3. 77 FR 6858 - Proposed Collection; Comment Request for Notice 2011-87

    Science.gov (United States)

    2012-02-09

    ... number. Books or records relating to a collection of information must be retained as long as their contents may become material in the administration of any internal revenue law. Generally, tax returns and tax return information are confidential, as required by 26 U.S.C. 6103. Request for Comments: Comments...

  4. 75 FR 26751 - Agency Information Collection Activities; Proposed Collection; Comment Request; Internet Survey...

    Science.gov (United States)

    2010-05-12

    ... fuel economy values are calculated to better reflect typical real-world driving patterns and provide... information claimed to be Confidential Business Information (CBI) or other information whose disclosure is... better informing consumers about the fuel consumption, fuel costs, and environmental impacts associated...

  5. 77 FR 25382 - Proposed Amendment to the Standards of Identity for Distilled Spirits

    Science.gov (United States)

    2012-04-30

    ... require that the class and type of distilled spirits appear on the product's brand label. See 27 CFR 5.32... hold a public hearing. Confidentiality All submitted comments and attachments are part of the public... omit voluminous attachments or material that we consider unsuitable for posting. You also may view...

  6. 78 FR 24815 - Proposed Collection; Comment Request for Revenue Procedure 2012-25

    Science.gov (United States)

    2013-04-26

    ... average purchase prices for residences located in the United States, and (2) average area purchase price safe harbors for residences located in statistical areas in each state, the District of Columbia... administration of any internal revenue law. Generally, tax returns and tax return information are confidential...

  7. 75 FR 21151 - Proposed Collection; Comment Request for Revenue Procedure 2004-18

    Science.gov (United States)

    2010-04-22

    ...) nationwide average purchase prices for residences located in the United States, and (2) average area purchase price safe harbors for residences located in statistical areas in each State, the District of Columbia... administration of any internal revenue law. Generally, tax returns and tax return information are confidential...

  8. 76 FR 44582 - Agency Information Collection Activities; Proposed Collection; Comment Request; Community Right...

    Science.gov (United States)

    2011-07-26

    ... subject to OSHA Hazard Communication Standard to submit a list of chemicals or Material Safety Data Sheet... prepare or have available a material safety data sheet for any hazardous chemical under the OSHA Hazard... copyrighted material, confidential business information (CBI), or other information whose public disclosure is...

  9. 48 CFR 15.201 - Exchanges with industry before receipt of proposals.

    Science.gov (United States)

    2010-10-01

    ..., in order to avoid creating an unfair competitive advantage. Information provided to a potential... early exchanges of information are— (1) Industry or small business conferences; (2) Public hearings; (3... confidential business strategy, and is protected under 3.104 or subpart 24.2. When conducting a presolicitation...

  10. 78 FR 53457 - Phoebe Putney Health System, Inc., et al.; Analysis of Proposed Agreement Containing Consent...

    Science.gov (United States)

    2013-08-29

    ... commercial or financial information which . . . is privileged or confidential,'' as discussed in Section 6(f... provision of inpatient general acute-care hospital services sold to commercial health plans in Albany and... the Clayton Act, 15 U.S.C. 26, in the U.S. District Court for the Middle District of Georgia. On June...

  11. 78 FR 23944 - Agency Information Collection Activities: Proposed Collection; Comment Request

    Science.gov (United States)

    2013-04-23

    ... funded alcohol and drug facilities from SAMHSA's 2011 National Survey of Substance Abuse Treatment... and Drug Abuse Patient Records--(OMB No. 0930-0092)--Revision Statute (42 U.S.C. 290dd-2) and... and drug abuse programs to keep alcohol and drug abuse patient records confidential. Information...

  12. 77 FR 53843 - Proposed Information Collection; Comment Request; Interim Procedures for Considering Requests and...

    Science.gov (United States)

    2012-09-04

    ... deleted from public versions, and substituted with an adequate public summary. III. Data OMB Control... both a public and a confidential version of their submissions. If the submissions are accepted, the public submissions or public versions of submissions will be posted on the dedicated commercial...

  13. 75 FR 5861 - Proposed Collection; Comment Request for Notice 2003-75

    Science.gov (United States)

    2010-02-04

    .... Abstract: Notice 2003-75 announces an alternative, simplified reporting regime for the owners of certain... administration of any internal revenue law. Generally, tax returns and tax return information are confidential...: January 15, 2010. R. Joseph Durbala, IRS Supervisory Tax Analyst. [FR Doc. 2010-2354 Filed 2-3-10; 8:45 am...

  14. 78 FR 21952 - Submission for OMB Review; Proposed Collection; Comment Request; General Services Administration...

    Science.gov (United States)

    2013-04-12

    ... military federal workforce in both classified and unclassified environments) or external (e.g., individual....regulations.gov , including any personal and/or business confidential information provided. FOR FURTHER... several things: Conduct research to understand the customer's business, needs and desires; ``make content...

  15. 77 FR 74191 - Information Collection; Proposed Collection; Comment Request; General Services Administration...

    Science.gov (United States)

    2012-12-13

    ... workforce in both classified and unclassified environments) or external (e.g., individual citizens....regulations.gov , including any personal and/or business confidential information provided. FOR FURTHER... research to understand the customer's business, needs and desires; ``make content more broadly available...

  16. 76 FR 21744 - Agency Information Collection Activities: Proposed Collection; Comment Request

    Science.gov (United States)

    2011-04-18

    ... a Safer Health System. The goal of the statute is to improve patient safety by providing an... management for and support of the enforcement of the confidentiality protections of the Patient Safety Act... Healthcare Research and Quality (AHRQ) to request that the Office of Management and Budget (OMB) approve the...

  17. 77 FR 6826 - Proposal Review Panel for Materials Research; Notice of Meeting

    Science.gov (United States)

    2012-02-09

    ...: Name: Site visit review of the Materials Research Science and Engineering Center (MRSEC) at the... and Engineering Centers Program, Division of Materials Research, Room 1065, National Science... information of a proprietary or confidential nature, including technical information; financial data, such as...

  18. 77 FR 20852 - Proposal Review Panel for Materials Research; Notice of Meeting

    Science.gov (United States)

    2012-04-06

    ...: Name: Site visit review of the Nanoscale Science and Engineering Center (NSEC) at the University of... Research Science and Engineering Centers Program, Division of Materials Research, Room 1065, National... proprietary or confidential nature, including technical information; financial data, such as salaries and...

  19. 75 FR 4876 - Proposal Review Panel for Materials Research; Notice of Meeting

    Science.gov (United States)

    2010-01-29

    ...: Name: Site visit review of the Materials Research Science and Engineering Center (MRSEC) at the Georgia... Person: Dr. Thomas Rieker, Program Director, Materials Research Science and Engineering Centers Program... confidential nature, including technical information; financial data, such as salaries and personal information...

  20. 77 FR 57161 - Proposal Review Panel for Materials Research; Notice of Meeting

    Science.gov (United States)

    2012-09-17

    ...: Name: Site visit review of the Materials Research Science and Engineering Center (MRSEC) at Brandeis.... Contact Person: Dr. Mary E. Galvin, Program Director, Materials Research Science and Engineering Centers... proprietary or confidential nature, including technical information; financial data, such as salaries and...

  1. 77 FR 57162 - Proposal Review Panel for Materials Research; Notice of Meeting

    Science.gov (United States)

    2012-09-17

    ...: Name: Site visit review of the Materials Research Science and Engineering Center (MRSEC) at The Ohio... Science and Engineering Centers Program, Division of Materials Research, Room 1065, National Science... include information of a proprietary or confidential nature, including technical information; financial...

  2. 75 FR 18240 - Proposal Review Panel for Materials Research Notice of Meeting

    Science.gov (United States)

    2010-04-09

    ...: Name: Site visit review of the Materials Research Science and Engineering Center (MRSEC) at Brandeis...: Thomas Rieker, Program Director, Materials Research Science and Engineering Centers Program, Division of... confidential nature, including technical information; financial data, such as salaries and personal information...

  3. 77 FR 61433 - Proposal Review Panel for Materials Research; Notice of Meeting

    Science.gov (United States)

    2012-10-09

    ...: Name: Site visit review of the Materials Research Science and Engineering Center (MRSEC) at the... Research Science and Engineering Centers Program, Division of Materials Research, Room 1065, National... proprietary or confidential nature, including technical information; financial data, such as salaries and...

  4. SST: Single-Stream Temporal Action Proposals

    KAUST Repository

    Buch, Shyamal

    2017-11-09

    Our paper presents a new approach for temporal detection of human actions in long, untrimmed video sequences. We introduce Single-Stream Temporal Action Proposals (SST), a new effective and efficient deep architecture for the generation of temporal action proposals. Our network can run continuously in a single stream over very long input video sequences, without the need to divide input into short overlapping clips or temporal windows for batch processing. We demonstrate empirically that our model outperforms the state-of-the-art on the task of temporal action proposal generation, while achieving some of the fastest processing speeds in the literature. Finally, we demonstrate that using SST proposals in conjunction with existing action classifiers results in improved state-of-the-art temporal action detection performance.

  5. 77 FR 57080 - Proposed Agency Information Collection

    Science.gov (United States)

    2012-09-17

    ...-0149: Existing; (2) Information Collection Request Title: Evaluation of the Financial Reporting System... existing data collection, the Financial Reporting System, EIA-28. This is not a request to collect data... DEPARTMENT OF ENERGY Energy Information Administration Proposed Agency Information Collection...

  6. 78 FR 76600 - Proposed Subsequent Arrangement

    Science.gov (United States)

    2013-12-18

    ... of computer science, including but not limited to survey, monitor, control, and protection systems; H... International Security, Department of Energy. ACTION: Proposed Subsequent Arrangement. SUMMARY: The Department... INFORMATION CONTACT: Ms. Katie Strangis, Office of Nonproliferation and International Security, National...

  7. 77 FR 54620 - Proposed Collection; Comment Request

    Science.gov (United States)

    2012-09-05

    ... prepared by the company. Written comments are invited on: (a) Whether this proposed collection of information is necessary for the proper performance of the functions of the agency, including whether the...

  8. 78 FR 75391 - Proposed Collection; Comment Request

    Science.gov (United States)

    2013-12-11

    ... controls the company, or holds five percent or more of the company's outstanding voting securities) to... on: (a) Whether the proposed collection of information is necessary for the proper performance of the...

  9. 78 FR 79714 - Proposed Collection; Comment Request

    Science.gov (United States)

    2013-12-31

    ... that 25% of the 2 hours per response (0.5 hours) is prepared by the company for a total annual...) Whether the proposed collection of information is necessary for the proper performance of the functions of...

  10. 75 FR 22874 - Proposed Collection; Comment Request

    Science.gov (United States)

    2010-04-30

    ... that 75% of the 30 hours per response (22.5 hours) is prepared by the company for a total annual... on: (a) Whether this proposed collection of information is necessary for the proper performance of...

  11. 77 FR 14572 - Proposed Collection; Comment Request

    Science.gov (United States)

    2012-03-12

    ... et seq.). If all the filing conditions of the form are satisfied, the company is granted an automatic... proposed collection of information is necessary for the proper performance of the functions of the agency...

  12. 76 FR 8386 - Proposed Collection; Comment Request

    Science.gov (United States)

    2011-02-14

    ... estimate that 25% of the 1.3 burden hours per response (0.32 hours) is prepared by the company for total...: (a) Whether this proposed collection of information is necessary for the performance of the functions...

  13. 76 FR 61070 - Proposed Flood Elevation Determinations

    Science.gov (United States)

    2011-10-03

    ... In proposed rule document 2010-31549 appearing on pages 78664-78666 in the issue of December 16, 2010..., immediately beneath the sentence ``Maps are available for inspection at the Meeker County Courthouse, 325...

  14. 6 Source Categories - Boilers (Proposed Action)

    Science.gov (United States)

    EPA is proposing options to simplify the Clean Air Act permitting process for certain smaller sources of air pollution commonly found in Indian country. This action would ensure that air quality in Indian country is protected.

  15. Environmental impacts of proposed Monitored Retrievable Storage

    Energy Technology Data Exchange (ETDEWEB)

    Scharber, Wayne K.; Macintire, H. A.; Davis, Paul E.; Cothron, Terry K.; Stephens, Barry K.; Travis, Norman; Walter, George; Mobley, Mike

    1985-12-17

    This report describes environmental impacts from a proposed monitored retrievable storage facility for spent fuels to be located in Tennessee. Areas investigated include: water supply, ground water, air quality, solid waste management, and health hazards. (CBS)

  16. DAPs: Deep Action Proposals for Action Understanding

    KAUST Repository

    Escorcia, Victor

    2016-09-17

    Object proposals have contributed significantly to recent advances in object understanding in images. Inspired by the success of this approach, we introduce Deep Action Proposals (DAPs), an effective and efficient algorithm for generating temporal action proposals from long videos. We show how to take advantage of the vast capacity of deep learning models and memory cells to retrieve from untrimmed videos temporal segments, which are likely to contain actions. A comprehensive evaluation indicates that our approach outperforms previous work on a large scale action benchmark, runs at 134 FPS making it practical for large-scale scenarios, and exhibits an appealing ability to generalize, i.e. to retrieve good quality temporal proposals of actions unseen in training.

  17. 75 FR 9561 - Proposed Flood Elevation Determinations

    Science.gov (United States)

    2010-03-03

    ... INFORMATION: The Federal Emergency Management Agency (FEMA) proposes to make determinations of BFEs and.... Approximately 0.6 mile +523 +524 upstream of Ortho Road. Soap Creek Just upstream of the +503 +500 City of...

  18. 77 FR 45535 - Aldicarb; Proposed Tolerance Actions

    Science.gov (United States)

    2012-08-01

    ..., in follow-up to voluntary requests from a registrant, EPA amended an aldicarb registration to delete... follow-up to voluntary requests from a registrant, EPA amended an aldicarb registration to delete... proposing to [[Page 45537

  19. Rosebud Casino and Hotel NPDES Proposed Permit

    Science.gov (United States)

    Indian Country, Minor Permit, proposed permit SD-0034584, Rosebud Casino and Hotel, South Dakota, is authorized to discharge from its wastewater treatment facility in Todd County, South Dakota to an unnamed drainageway(s) tributary to Rock Creek.

  20. 76 FR 45651 - Proposed Collection; Comment Request

    Science.gov (United States)

    2011-07-29

    ... capital within their respective target markets for community development finance purposes. In order to be... DEPARTMENT OF THE TREASURY Community Development Financial Institutions Fund Proposed Collection...)). Currently, the Community Development Financial Institutions Fund (the ``CDFI Fund'') within the Department...