WorldWideScience

Sample records for lessons assuring confidentiality

  1. Improving Individual Acceptance of Health Clouds through Confidentiality Assurance.

    Science.gov (United States)

    Ermakova, Tatiana; Fabian, Benjamin; Zarnekow, Rüdiger

    2016-10-26

    Cloud computing promises to essentially improve healthcare delivery performance. However, shifting sensitive medical records to third-party cloud providers could create an adoption hurdle because of security and privacy concerns. This study examines the effect of confidentiality assurance in a cloud-computing environment on individuals' willingness to accept the infrastructure for inter-organizational sharing of medical data. We empirically investigate our research question by a survey with over 260 full responses. For the setting with a high confidentiality assurance, we base on a recent multi-cloud architecture which provides very high confidentiality assurance through a secret-sharing mechanism: Health information is cryptographically encoded and distributed in a way that no single and no small group of cloud providers is able to decode it. Our results indicate the importance of confidentiality assurance in individuals' acceptance of health clouds for sensitive medical data. Specifically, this finding holds for a variety of practically relevant circumstances, i.e., in the absence and despite the presence of conventional offline alternatives and along with pseudonymization. On the other hand, we do not find support for the effect of confidentiality assurance in individuals' acceptance of health clouds for non-sensitive medical data. These results could support the process of privacy engineering for health-cloud solutions.

  2. 40 CFR 303.31 - Assurance of claimant confidentiality.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 27 2010-07-01 2010-07-01 false Assurance of claimant confidentiality. 303.31 Section 303.31 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) SUPERFUND... knowledge, shall be given access to the identity of, or information that would lead to the identity of, a...

  3. Risk management and lessons learned solutions for satellite product assurance

    Science.gov (United States)

    Larrère, Jean-Luc

    2004-08-01

    The historic trend of the space industry towards lower cost programmes and more generally a better economic efficiency raises a difficult question to the quality assurance community: how to achieve the same—or better—mission success rate while drastically reducing the cost of programmes, hence the cost and level of quality assurance activities. EADS Astrium Earth Observation and Science (France) Business Unit have experimented Risk Management and Lessons Learned on their satellite programmes to achieve this goal. Risk analysis and management are deployed from the programme proposal phase through the development and operations phases. Results of the analysis and the corresponding risk mitigation actions are used to tailor the product assurance programme and activities. Lessons learned have been deployed as a systematic process to collect positive and negative experience from past and on-going programmes and feed them into new programmes. Monitoring and justification of their implementation in programmes is done under supervision from the BU quality assurance function. Control of the system is ensured by the company internal review system. Deployment of these methods has shown that the quality assurance function becomes more integrated in the programme team and development process and that its tasks gain focus and efficiency while minimising the risks associated with new space programmes.

  4. Safety and Mission Assurance for In-House Design Lessons Learned from Ares I Upper Stage

    Science.gov (United States)

    Anderson, Joel M.

    2011-01-01

    This viewgraph presentation identifies lessons learned in the course of the Ares I Upper Stage design and in-house development effort. The contents include: 1) Constellation Organization; 2) Upper Stage Organization; 3) Presentation Structure; 4) Lesson-Importance of Systems Engineering/Integration; 5) Lesson-Importance of Early S&MA Involvement; 6) Lesson-Importance of Appropriate Staffing Levels; 7) Lesson-Importance S&MA Team Deployment; 8) Lesson-Understanding of S&MA In-Line Engineering versus Assurance; 9) Lesson-Importance of Close Coordination between Supportability and Reliability/Maintainability; 10) Lesson-Importance of Engineering Data Systems; 11) Lesson-Importance of Early Development of Supporting Databases; 12) Lesson-Importance of Coordination with Safety Assessment/Review Panels; 13) Lesson-Implementation of Software Reliability; 14) Lesson-Implementation of S&MA Technical Authority/Chief S&MA Officer; 15) Lesson-Importance of S&MA Evaluation of Project Risks; 16) Lesson-Implementation of Critical Items List and Government Mandatory Inspections; 17) Lesson-Implementation of Critical Items List Mandatory Inspections; 18) Lesson-Implementation of Test Article Safety Analysis; and 19) Lesson-Importance of Procurement Quality.

  5. Audit, Accountability and Confidential Enquiries into Maternal ...

    African Journals Online (AJOL)

    HP

    Time for Action: Audit, Accountability and Confidential Enquiries ... provision of quality maternity services. Having such a ... services are more likely to be sustained if women can find ..... Donabedian A. An introduction to quality assurance in.

  6. Physician Knowledge and Attitudes around Confidential Care for Minor Patients.

    Science.gov (United States)

    Riley, Margaret; Ahmed, Sana; Reed, Barbara D; Quint, Elisabeth H

    2015-08-01

    Minor adolescent patients have a legal right to access certain medical services confidentially without parental consent or notification. We sought to assess physicians' knowledge of these laws, attitudes around the provision of confidential care to minors, and barriers to providing confidential care. An anonymous online survey was sent to physicians in the Departments of Family Medicine, Internal Medicine-Pediatrics, Obstetrics/Gynecology, and Pediatrics at the University of Michigan. Response rate was 40% (259/650). The majority of physicians felt comfortable addressing sexual health, mental health, and substance use with adolescent patients. On average, physicians answered just over half of the legal knowledge questions correctly (mean 56.6% ± 16.7%). The majority of physicians approved of laws allowing minors to consent for confidential care (90.8% ± 1.7% approval), while substantially fewer (45.1% ± 4.5%) approved of laws allowing parental notification of this care at the physician's discretion. Most physicians agreed that assured access to confidential care should be a right for adolescents. After taking the survey most physicians (76.6%) felt they needed additional training on confidentiality laws. The provision of confidential care to minors was perceived to be most inhibited by insurance issues, parental concerns/relationships with the family, and issues with the electronic medical record. Physicians are comfortable discussing sensitive issues with adolescents and generally approve of minor consent laws, but lack knowledge about what services a minor can access confidentially. Further research is needed to assess best methods to educate physicians about minors' legal rights to confidential healthcare services. Copyright © 2015 North American Society for Pediatric and Adolescent Gynecology. Published by Elsevier Inc. All rights reserved.

  7. Printed Circuit Board Quality Assurance

    Science.gov (United States)

    Sood, Bhanu

    2016-01-01

    PCB Assurance Summary: PCB assurance actives are informed by risk in context of the Project. Lessons are being applied across Projects for continuous improvements. Newer component technologies, smaller/high pitch devices: tighter and more demanding PCB designs: Identifying new research areas. New materials, designs, structures and test methods.

  8. Lesson Learning at JPL

    Science.gov (United States)

    Oberhettinger, David

    2011-01-01

    A lessons learned system is a hallmark of a mature engineering organization A formal lessons learned process can help assure that valuable lessons get written and published, that they are well-written, and that the essential information is "infused" into institutional practice. Requires high-level institutional commitment, and everyone's participation in gathering, disseminating, and using the lessons

  9. Effective information management and assurance for a modern organisation during a crisis.

    Science.gov (United States)

    MacLeod, Andrew

    2015-01-01

    During a crisis, organisations face a major unpredictable event with potentially negative consequences. Effective information management and assurance can assist the organisation in making sure that they have the correct information in a secure format to make decisions to recover their operations. The main elements of effective information management and assurance are confidentiality, integrity and availability, combined with non-repudiation. Should an element of effective information management or assurance be removed it can have a detrimental effect on the other elements and render the information management and assurance practices of the organisation ineffectual.

  10. HOW TO INCREASE THE INFORMATION ASSURANCE IN THE INFORMATION AGE

    Directory of Open Access Journals (Sweden)

    Artur Sosin

    2018-04-01

    Full Text Available The competitive world we live in today is characterized by an environment where the advancement of technology has increased the number of complex vulnerabilities and sophisticated attacks. Organizations around the globe are facing now the same challenges of implementing data protection and securing information assurance. The purpose of this paper is to prove that Information Assurance has become one of the most important tools in creating and maintaining a competitive advantage in today’s competitive and global marketplace. This paper also presents the relationship between information assurance and cybersecurity, and their connection with confidentiality, integrity, availability (CIA triad. Furthermore, assuring information and providing security is a life cycle process which needs a comprehensive understanding, skills, and experience in order to protect today’s risk management challenges. The author concludes the paper with the importance of information assurance policies which are the fundamental guidelines for protecting information assets and fulfilling information assurance objectives of an organization.

  11. Confidentiality and personal integrity.

    Science.gov (United States)

    Edgar, A

    1994-06-01

    This paper uses the social theory of Erving Goffman in order to argue that confidentiality should be understood in relation to the mundane social skills by which individuals present and respect specific self-images of themselves and others during social interaction. The breaching of confidentiality is analysed in terms of one person's capacity to embarrass another, and so to expose that person as incompetent. Respecting confidentiality may at once serve to protect the vulnerable from an unjust society, and yet also protect the guilty from just accusation. Ethical reasoning about confidentiality must therefore recognize the dangers of prejudice and violence inherent in decisions to breach or to respect confidentiality. Case studies are used to illustrate the efficacy of this account, culminating with analyses of three examples from the UKCC document Confidentiality.

  12. Evaluation in a competitive utility environment: the threat of confidentiality

    International Nuclear Information System (INIS)

    Vine, Edward

    1997-01-01

    Utilities have become concerned that their competitors will desire access to energy-related data--including energy-efficiency data collected by utilities from their energy- efficiency programs--that they may regard as proprietary or confidential. In the future, disputes about confidentiality may focus more on costs and market information (as well as energy use and load data) than on energy-efficiency data per se. So far, the discussion has been limited to ratepayer-funded data. Consequently, many utilities are now requesting that the data (including evaluation data) they submit to their utility regulatory commissions remain confidential. Withholding utility information from the public is likely to harm the evaluation community that depends on the free flow of information for improving the practice of evaluation as well as for disseminating the lessons learned from particular program evaluations. Confidentiality will also have significant policy implications. In response to these concerns, in late 1995 and early 1996, we conducted a survey of state public utility commissions (PUCs) in the U.S. to assess: (1) the relative importance of the issue of confidential data in the regulatory arena; (2) the regulatory response to utility requests for confidentiality (e.g., formal policies, guidelines, rules and procedures, and decisions); and (3) the type of data filed as confidential with PUCS. We focus on the first two objectives of this study. In addition to our interviews, we reviewed selected state statutes, judicial and PUC decisions, rules and procedures, protective orders, and interim policy documents. Evaluators need to understand the context of confidentiality as well as the response of the regulatory commissions to confidentiality, because evaluators will need to adapt to a new environment where energy-related data and information may be harder to obtain and distribute. We propose that regulators conduct the following activities as soon as possible: 1. Assess

  13. Privacy, confidentiality and abortion statistics: a question of public interest?

    Science.gov (United States)

    McHale, Jean V; Jones, June

    2012-01-01

    The precise nature and scope of healthcare confidentiality has long been the subject of debate. While the obligation of confidentiality is integral to professional ethical codes and is also safeguarded under English law through the equitable remedy of breach of confidence, underpinned by the right to privacy enshrined in Article 8 of the Human Rights Act 1998, it has never been regarded as absolute. But when can and should personal information be made available for statistical and research purposes and what if the information in question is highly sensitive information, such as that relating to the termination of pregnancy after 24 weeks? This article explores the case of In the Matter of an Appeal to the Information Tribunal under section 57 of the Freedom of Information Act 2000, concerning the decision of the Department of Health to withhold some statistical data from the publication of its annual abortion statistics. The specific data being withheld concerned the termination for serious fetal handicap under section 1(1)d of the Abortion Act 1967. The paper explores the implications of this case, which relate both to the nature and scope of personal privacy. It suggests that lessons can be drawn from this case about public interest and use of statistical information and also about general policy issues concerning the legal regulation of confidentiality and privacy in the future.

  14. Lessons learned from accidents investigations

    Energy Technology Data Exchange (ETDEWEB)

    Zuniga-Bello, P. [Consejo Nacional de Ciencia y Tecnologia (CONACYT), Mexico City (Mexico); Croft, J. [National Radiological Protection Board (United Kingdom); Glenn, J

    1997-12-31

    Accidents from three main practices: medical applications, industrial radiography and industrial irradiators are used to illustrate some common causes of accidents and the main lessons to be learned. A brief description of some of these accidents is given. Lessons learned from the described accidents are approached by subjects covering: safety culture, quality assurance, human factors, good engineering practice, defence in depth, security of sources, safety assessment and monitoring and verification compliance. (author)

  15. Lessons learned from accident investigations

    International Nuclear Information System (INIS)

    Zuniga-Bello, P.; Croft, J.R.; Glenn, J.

    1998-01-01

    Accidents in three main practices - medical applications, industrial radiography and industrial irradiators - are used to illustrate some common causes of accidents and the main lessons to be learned from them. A brief description of some of these accidents is given. Lessons learned from the accidents described are approached bearing in mind: safety culture, quality assurance, human factors, good engineering practice, defence in depth, security of sources, safety assessment and monitoring and verification compliance. (author)

  16. The role of quality assurance in the nuclear industry

    International Nuclear Information System (INIS)

    1985-01-01

    The paper reports on the proceedings of a one day conference on ''the role of quality assurance in the nuclear industry'', presented by the British Nuclear Forum Working Group on Quality Assurance, 1985. The conference reviews the application and effectiveness of the British Standards in the light of experience with the AGR programme, and considers the lessons learned that will benefit future projects. Seven papers are presented at the conference, of which five deal with the AGR experience with respect to quality assurance in design and manufacture. The remaining two papers examine quality assurance in computing software and building on the AGR experience. All seven papers are selected for INIS and indexed separately. (U.K.)

  17. How to apply Y2K lessons to patient confidentiality.

    Science.gov (United States)

    2001-04-01

    Despite current debate over the details of implementing the privacy portion of the Health Insurance Portability and Accountability Act (HIPAA) of 1996, experts say quality managers should continue their planning to comply with the new law. One way to prepare for the sweeping new mandates is to apply the lessons of Y2K to HIPAA.

  18. A Systematic Review on Confidentiality, Disclosure, and Stigma in the United States: Lessons for HIV Care in Pregnancy From Reproductive Genetics.

    Science.gov (United States)

    Wilkinson, Barbara; Arora, Kavita Shah

    2015-01-01

    The fields of HIV care in pregnancy and reproductive genetics have always been 'exceptional' in that patients are highly concerned about the potential for stigma and the corresponding need for privacy and confidentiality. However, the two fields have diverged in how they have addressed these concerns. The systematic review analyzed 61 manuscripts for similarities and differences between the fields of HIV care in pregnancy and reproductive genetics in the United States, with respect to privacy, confidentiality, disclosure, and stigma. The systematic review revealed that the field of HIV care in pregnancy has insufficiently addressed patient concerns about privacy, confidentiality, and stigma compared to the field of reproductive genetics. Failure to adequately protect confidentiality of HIV-positive patients, and failure to reduce stigma associated with HIV testing and treatment are deficiencies in the delivery of care to HIV-positive pregnant woman and barriers to reducing vertical transmission of HIV. Improvements in care and policy should mirror the field of reproductive genetics.

  19. Developing an effective corrective action process : lessons learned from operating a confidential close call reporting system

    Science.gov (United States)

    2013-03-05

    In 2007, the Federal Railroad Administration (FRA) launched : C3RS, the Confidential Close Call Reporting System, as a : demonstration project to learn how to facilitate the effective : reporting and implementation of corrective actions, and assess t...

  20. The Effects of a Computer-Assisted Teaching Material, Designed According to the ASSURE Instructional Design and the ARCS Model of Motivation, on Students' Achievement Levels in a Mathematics Lesson and Their Resulting Attitudes

    Science.gov (United States)

    Karakis, Hilal; Karamete, Aysen; Okçu, Aydin

    2016-01-01

    This study examined the effects that computer-assisted instruction had on students' attitudes toward a mathematics lesson and toward learning mathematics with computer-assisted instruction. The computer software we used was based on the ASSURE Instructional Systems Design and the ARCS Model of Motivation, and the software was designed to teach…

  1. Confidentiality and integrity in crowdsourcing systems

    CERN Document Server

    Ranj Bar, Amin

    2014-01-01

    Confidentiality and Integrity in Crowdsourcing Systems focuses on identity, privacy, and security related issues in crowdsourcing systems and in particular the confidentiality and integrity of online data created via crowdsourcing. This book begins with an introduction to crowdsourcing and then covers the privacy and security challenges of Confidentiality. The book examines integrity in these systems and the management and control of crowdsourcing systems.

  2. Contributory factors in surgical incidents as delineated by a confidential reporting system.

    Science.gov (United States)

    Mushtaq, F; O'Driscoll, C; Smith, Fct; Wilkins, D; Kapur, N; Lawton, R

    2018-05-01

    Background Confidential reporting systems play a key role in capturing information about adverse surgical events. However, the value of these systems is limited if the reports that are generated are not subjected to systematic analysis. The aim of this study was to provide the first systematic analysis of data from a novel surgical confidential reporting system to delineate contributory factors in surgical incidents and document lessons that can be learned. Methods One-hundred and forty-five patient safety incidents submitted to the UK Confidential Reporting System for Surgery over a 10-year period were analysed using an adapted version of the empirically-grounded Yorkshire Contributory Factors Framework. Results The most common factors identified as contributing to reported surgical incidents were cognitive limitations (30.09%), communication failures (16.11%) and a lack of adherence to established policies and procedures (8.81%). The analysis also revealed that adverse events were only rarely related to an isolated, single factor (20.71%) - with the majority of cases involving multiple contributory factors (79.29% of all cases had more than one contributory factor). Examination of active failures - those closest in time and space to the adverse event - pointed to frequent coupling with latent, systems-related contributory factors. Conclusions Specific patterns of errors often underlie surgical adverse events and may therefore be amenable to targeted intervention, including particular forms of training. The findings in this paper confirm the view that surgical errors tend to be multi-factorial in nature, which also necessitates a multi-disciplinary and system-wide approach to bringing about improvements.

  3. A challenge to unqualified medical confidentiality.

    Science.gov (United States)

    Bozzo, Alexander

    2018-04-01

    Medical personnel sometimes face a seeming conflict between a duty to respect patient confidentiality and a duty to warn or protect endangered third parties. The conventional answer to dilemmas of this sort is that, in certain circumstances, medical professionals have an obligation to breach confidentiality. Kenneth Kipnis has argued, however, that the conventional wisdom on the nature of medical confidentiality is mistaken. Kipnis argues that the obligation to respect patient confidentiality is unqualified or absolute, since unqualified policies can save more lives in the long run. In this paper, I identify the form of Kipnis's argument and present a challenge to it. I conclude that, as matters stand now, a qualified confidentiality policy is the more rational choice. © Article author(s) (or their employer(s) unless otherwise stated in the text of the article) 2018. All rights reserved. No commercial use is permitted unless otherwise expressly granted.

  4. Safety and Mission Assurance Knowledge Management Retention: Managing Knowledge for Successful Mission Operations

    Science.gov (United States)

    Johnson, Teresa A.

    2006-01-01

    Knowledge Management is a proactive pursuit for the future success of any large organization faced with the imminent possibility that their senior managers/engineers with gained experiences and lessons learned plan to retire in the near term. Safety and Mission Assurance (S&MA) is proactively pursuing unique mechanism to ensure knowledge learned is retained and lessons learned captured and documented. Knowledge Capture Event/Activities/Management helps to provide a gateway between future retirees and our next generation of managers/engineers. S&MA hosted two Knowledge Capture Events during 2005 featuring three of its retiring fellows (Axel Larsen, Dave Whittle and Gary Johnson). The first Knowledge Capture Event February 24, 2005 focused on two Safety and Mission Assurance Safety Panels (Space Shuttle System Safety Review Panel (SSRP); Payload Safety Review Panel (PSRP) and the latter event December 15, 2005 featured lessons learned during Apollo, Skylab, and Space Shuttle which could be applicable in the newly created Crew Exploration Vehicle (CEV)/Constellation development program. Gemini, Apollo, Skylab and the Space Shuttle promised and delivered exciting human advances in space and benefits of space in people s everyday lives on earth. Johnson Space Center's Safety & Mission Assurance team work over the last 20 years has been mostly focused on operations we are now beginning the Exploration development program. S&MA will promote an atmosphere of knowledge sharing in its formal and informal cultures and work processes, and reward the open dissemination and sharing of information; we are asking "Why embrace relearning the "lessons learned" in the past?" On the Exploration program the focus will be on Design, Development, Test, & Evaluation (DDT&E); therefore, it is critical to understand the lessons from these past programs during the DDT&E phase.

  5. Confidential donation confirmation as an alternative to confidential unit exclusion: 15 months experience of the HEMOMINAS foundation

    Directory of Open Access Journals (Sweden)

    Flávia Cristine Martineli Loureiro

    2011-01-01

    Full Text Available BACKGROUND: Confidential unit exclusion remains a controversial strategy to reduce the residual risk of transfusion-transmitted infections. OBJECTIVE: This study aimed to analyze confidential unit exclusion from its development in a large institution in light of confidential donation confirmation. METHODS: Data of individuals who donated from October 1, 2008 to December 31, 2009 were analyzed in a case-control study. The serological results and sociodemographic characteristics of donors who did not confirm their donations were compared to those who did. Variables with p-values < 0.20 in univariate analysis were included in a logistic multivariate analysis. RESULTS: In the univariate analysis there was a statically significant association between positive serological results and response to confidential donation confirmation of "No". Donation type, (firsttime or return donor - OR 1.69, CI 1.37-2.09, gender (OR 1.66, CI 1.35-2.04, education level (OR 2.82, CI 2.30-3.47 and ethnic background (OR 0.67, CI 0.55-0.82 were included in the final logistic regression model. In all logistic regression models analyzed, the serological suitability and confidential donation confirmation were not found to be statistically associated. The adoption of new measures of clinical classification such as audiovisual touch-screen computer-assisted self-administered interviews might be more effective than confidential unit exclusion in the identification of donor risk behavior. The requirement that transfusion services continue to use confidential unit exclusion needs to be debated in countries where more specific and sensitive clinical and serological screening methods are available. CONCLUSION: Our findings suggest that there are not enough benefits to justify continued use of confidential donation confirmation in the analyzed institution.

  6. Waste Management Quality Assurance Plan

    International Nuclear Information System (INIS)

    2006-01-01

    The WMG QAP is an integral part of a management system designed to ensure that WMG activities are planned, performed, documented, and verified in a manner that assures a quality product. A quality product is one that meets all waste acceptance criteria, conforms to all permit and regulatory requirements, and is accepted at the offsite treatment, storage, and disposal facility. In addition to internal processes, this QA Plan identifies WMG processes providing oversight and assurance to line management that waste is managed according to all federal, state, and local requirements for waste generator areas. A variety of quality assurance activities are integral to managing waste. These QA functions have been identified in the relevant procedures and in subsequent sections of this plan. The WMG QAP defines the requirements of the WMG quality assurance program. These requirements are derived from Department of Energy (DOE) Order 414.1C, Quality Assurance, Contractor Requirements Document, the LBNL Operating and Assurance Program Plan (OAP), and other applicable environmental compliance documents. The QAP and all associated WMG policies and procedures are periodically reviewed and revised, as necessary, to implement corrective actions, and to reflect changes that have occurred in regulations, requirements, or practices as a result of feedback on work performed or lessons learned from other organizations. The provisions of this QAP and its implementing documents apply to quality-affecting activities performed by the WMG; WMG personnel, contractors, and vendors; and personnel from other associated LBNL organizations, except where such contractors, vendors, or organizations are governed by their own WMG-approved QA programs

  7. 22 CFR 130.15 - Confidential business information.

    Science.gov (United States)

    2010-04-01

    ..., confidential business information means commercial or financial information which by law is entitled to... 22 Foreign Relations 1 2010-04-01 2010-04-01 false Confidential business information. 130.15... CONTRIBUTIONS, FEES AND COMMISSIONS § 130.15 Confidential business information. (a) Any person who is required...

  8. 7 CFR 1280.634 - Confidentiality.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 10 2010-01-01 2010-01-01 false Confidentiality. 1280.634 Section 1280.634 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (MARKETING... persons voting in the referendum and ballots shall be confidential and the contents of the ballots shall...

  9. How much quality assurance?

    International Nuclear Information System (INIS)

    Beatty, R.A.; Talboy, J.H.

    1988-01-01

    This paper describes the approach used at Argonne National Laboratory to apply the techniques of quality assurance to research and development activities. The discussion includes the approach, the reasons that it is gaining acceptance, and its wide applicability. This approach is founded on the lessons learned in management of quality at Argonne National Laboratory over a period of more than 15 years. The discussion is confined to the practices at the Illinois site of the Laboratory where more than 3000 researchers and support personnel conduct basic and technology-directed research

  10. 15 CFR 806.5 - Confidentiality.

    Science.gov (United States)

    2010-01-01

    ... 15 Commerce and Foreign Trade 3 2010-01-01 2010-01-01 false Confidentiality. 806.5 Section 806.5 Commerce and Foreign Trade Regulations Relating to Commerce and Foreign Trade (Continued) BUREAU OF ECONOMIC ANALYSIS, DEPARTMENT OF COMMERCE DIRECT INVESTMENT SURVEYS § 806.5 Confidentiality. Information...

  11. Confidentiality in psychological practice: a decrepit concept?

    Science.gov (United States)

    McMahon, M; Knowles, A D

    1995-11-01

    Although the principle of confidentiality in the relationship between psychologists and client has been vaunted, and is emphasised in the Australian Psychological Society's Code of Professional Conduct (the APS code; 1994), the confidentiality of this relationship is circumscribed by the absence of legal protections, the ethical beliefs of psychologists, institutional practices, and the provisions of the APS code itself. Lack of privilege in judicial proceedings, and statutory obligations to report certain types of behaviour, mandate breaches of confidentiality in some circumstances. Ethical beliefs of psychologists may support disclosure, especially where it is believed that there is danger of serious physical harm to the client or others. Multidisciplinary teams and institutional settings require the exchange of information for optimal delivery of services. Recent amendments to the APS code may require disclosure without the client's consent when a client is believed to be suicidal. Such developments, when considered at all, are typically regarded as exceptions to a general obligation of confidentiality. However, discussion of exceptions presupposes agreement on fundamental principle: the significance of, and rationale for, confidentiality in the psychologist-client relationship. It is argued in this paper that the obligation of confidentiality has been assumed rather than vigorously analysed and empirically explored. A critical examination of this obligation is the most appropriate starting point for the rehabilitation of contemporary principles of confidentiality in the psychologist-client relationship.

  12. Computer Security: Printing confidentially

    CERN Document Server

    Stefan Lueders, Computer Security Team

    2015-01-01

    Have you ever hesitated to print a confidential document using CERN printers? Or perhaps you have rushed quickly to the printer after hitting the “print” button in order to avoid someone else getting hold of and reading your document? These times are over now with the new printing infrastructure!   Indeed, many of us regularly print out confidential documents like our salary slips, MARS forms, tendering documents and drafts of preliminary papers. The upcoming CERN data protection policy will require all of us to respect the confidentiality of such documents and, as the word “confidential” implies, access to “confidential” or sensitive documents will be tightly controlled. What can we do about the public printers located in many buildings, floors and shared spaces - accessible not only to CERN staff and users but also to visitors and guests? Some printers are located in the vicinity of restaurants, cafeterias or close to paths taken b...

  13. 7 CFR 1150.278 - Confidential treatment.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 9 2010-01-01 2009-01-01 true Confidential treatment. 1150.278 Section 1150.278 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (Marketing... of Milk Producer Organizations § 1150.278 Confidential treatment. All documents and other information...

  14. 40 CFR 716.55 - Confidentiality claims.

    Science.gov (United States)

    2010-07-01

    ... confidential business information, health and safety studies of any substance or mixture that has been offered for commercial distribution (including for test marketing purposes and for use in research and... because disclosure would reveal a confidential process or quantitative mixture composition should briefly...

  15. 7 CFR 1206.107 - Confidential information.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 10 2010-01-01 2010-01-01 false Confidential information. 1206.107 Section 1206.107 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (MARKETING... INFORMATION Referendum Procedures. § 1206.107 Confidential information. The ballots and other information or...

  16. The Confidentiality of Interlibrary Loan Records.

    Science.gov (United States)

    Nolan, Christopher W.

    1993-01-01

    Discusses potential problems for confidentiality within interlibrary loan requests, outlines legal issues related to confidentiality, and proposes guidelines intended to protect library users' rights to privacy. Interlibrary loan documentation procedures are considered; laws and professional standards are reviewed; and the disposition of…

  17. 31 CFR 9.6 - Confidential information.

    Science.gov (United States)

    2010-07-01

    ... 9.6 Money and Finance: Treasury Office of the Secretary of the Treasury EFFECTS OF IMPORTED ARTICLES ON THE NATIONAL SECURITY § 9.6 Confidential information. Information submitted in confidence which... marked “Business Confidential.” [40 FR 50717, Oct. 31, 1975] ...

  18. 15 CFR 705.6 - Confidential information.

    Science.gov (United States)

    2010-01-01

    ... EFFECT OF IMPORTED ARTICLES ON THE NATIONAL SECURITY § 705.6 Confidential information. (a) Any... the investigation that would disclose national security classified information or business... Security Classified” or “Business Confidential,” as appropriate, marked at the top of each sheet. Any...

  19. 7 CFR 1207.352 - Confidential treatment.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 10 2010-01-01 2010-01-01 false Confidential treatment. 1207.352 Section 1207.352 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (MARKETING... PLAN Potato Research and Promotion Plan Reports, Books, and Records § 1207.352 Confidential treatment...

  20. 7 CFR 1205.340 - Confidential treatment.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 10 2010-01-01 2010-01-01 false Confidential treatment. 1205.340 Section 1205.340 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (MARKETING... Cotton Research and Promotion Order Reports, Books, and Records § 1205.340 Confidential treatment. All...

  1. 7 CFR 1220.243 - Confidential treatment.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 10 2010-01-01 2010-01-01 false Confidential treatment. 1220.243 Section 1220.243 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (MARKETING... Confidential treatment. Except as otherwise provided in the Act, financial or commercial information that is...

  2. A summary of lessons learned activities conducted at the OECD Halden Reactor Project

    International Nuclear Information System (INIS)

    Hallbert, B.P.

    1997-01-01

    A series of lessons learned studies have been conducted at the OECD Halden Reactor Project. The purpose of these lessons learned reports are to summarize knowledge and experience gained across a number of research project. This paper presents a summary of main issues addressed in four of these lessons learned projects. These are concerned with software development and quality assurance, software reliability, methods for test and evaluation of developed systems, and the evaluation of system design features

  3. Confidentiality and the employee assistance program professional.

    Science.gov (United States)

    Mistretta, E F; Inlow, L B

    1991-02-01

    During the last two decades EAPs have offered employees confidential assessment, counseling, and referral. Many occupational health nurses have taken on the role of EAP professional or function as the liaison between the EAP counselor and the employee. The occupational health nurse involved in any EAP issue must adhere to the standards of confidentiality. The federal and state laws, company policy, and professional codes of ethics regarding these clients must be clearly understood, especially related to the issue of confidentiality.

  4. 15 CFR 718.3 - Disclosure of confidential business information.

    Science.gov (United States)

    2010-01-01

    ... 15 Commerce and Foreign Trade 2 2010-01-01 2010-01-01 false Disclosure of confidential business... (Continued) BUREAU OF INDUSTRY AND SECURITY, DEPARTMENT OF COMMERCE CHEMICAL WEAPONS CONVENTION REGULATIONS CONFIDENTIAL BUSINESS INFORMATION § 718.3 Disclosure of confidential business information. (a) General...

  5. QA lessons learned for parameter control from the WIPP Project

    International Nuclear Information System (INIS)

    Richards, R.R.

    1998-01-01

    This paper provides a summary of lessons learned from experiences on the Waste Isolation Pilot Plant (WJPP) Project in implementation of quality assurance controls surrounding inputs for performance assessment analysis. Since the performance assessment (PA) process is inherent in compliance determination for any waste repository, these lessons-learned are intended to be useful to investigators, analysts, and Quality Assurance (QA) practitioners working on high level waste disposal projects. On the WIPP Project, PA analyses for regulatory-compliance determination utilized several inter-related computer programs (codes) that mathematically modeled phenomena such as radionuclide release, retardation, and transport. The input information for those codes are the parameters that are the subject of this paper. Parameters were maintained in a computer database, which was then queried electronically by the PA codes whenever input was needed as the analyses were run

  6. 19 CFR 181.121 - Maintenance of confidentiality.

    Science.gov (United States)

    2010-04-01

    ... 181.121 Customs Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY; DEPARTMENT OF THE TREASURY (CONTINUED) NORTH AMERICAN FREE TRADE AGREEMENT Confidentiality of Business... possession of confidential business information collected pursuant to this part shall, in accordance with...

  7. The Effects of a Computer-Assisted Teaching Material, Designed According to the ASSURE Instructional Design and the ARCS Model of Motivation, on Students’ Achievement Levels in a Mathematics Lesson and Their Resulting Attitudes

    OpenAIRE

    Hilal Karakış; Ayşen Karamete; Aydın Okçu

    2016-01-01

    This study examined the effects that computer-assisted instruction had on students’ attitudes toward a mathematics lesson and toward learning mathematics with computer-assisted instruction. The computer software we used was based on the ASSURE Instructional Systems Design and the ARCS Model of Motivation, and the software was designed to teach fractions to fourth-grade students. The skill levels of these students were gauged before and after receiving the computer-assisted instruction. We str...

  8. Law and ethics in conflict over confidentiality?

    Science.gov (United States)

    Dickens, B M; Cook, R J

    2000-09-01

    Ethical principles that require the preservation of patients' confidential information are reinforced by principles found in several areas of law, such as law on contracts, negligence, defamation and fiduciary duty. However, laws sometimes compel disclosures of medical confidences, and more often may justify or excuse disclosures. Legally contentious issues concern patients' confidences regarding possible unlawful conduct, such as pregnancy termination, and the risk of spread of HIV and other infections. This article reviews the various legal bases of the duty of confidentiality, and legal challenges to the ethical obligation of non-disclosure. It addresses the justifications and limits of exchange of patients' health information among healthcare professionals and trainees, and considers legally recognized limits of confidential duties, and the scope of legitimate disclosure. An underlying theme is how to determine whether physicians are ethically justified in employing the discretion the law sometimes affords them to breach patients' expectations of confidentiality.

  9. 19 CFR 210.5 - Confidential business information.

    Science.gov (United States)

    2010-04-01

    ... 19 Customs Duties 3 2010-04-01 2010-04-01 false Confidential business information. 210.5 Section 210.5 Customs Duties UNITED STATES INTERNATIONAL TRADE COMMISSION INVESTIGATIONS OF UNFAIR PRACTICES IN IMPORT TRADE ADJUDICATION AND ENFORCEMENT Rules of General Applicability § 210.5 Confidential...

  10. Balancing compliance and cost when implementing a Quality Assurance program

    International Nuclear Information System (INIS)

    Pickering, S.Y.

    1997-12-01

    When implementing a Quality Assurance (QA) program, compliance and cost must be balanced. A QA program must be developed that hits the mark in terms of adequate control and documentation, but does not unnecessarily expand resources. As the Waste Isolation Pilot Plant (WIPP) has moved towards certification, Sandia National Laboratories has learned much about balancing compliance and costs. Some of these lessons are summarized here

  11. 42 CFR 35.11 - Clinical records; confidential.

    Science.gov (United States)

    2010-10-01

    ... EXAMINATIONS HOSPITAL AND STATION MANAGEMENT General § 35.11 Clinical records; confidential. A complete clinical record shall be maintained for each patient admitted to a station or hospital of the Service. Such... 42 Public Health 1 2010-10-01 2010-10-01 false Clinical records; confidential. 35.11 Section 35.11...

  12. 37 CFR 260.4 - Confidential information and statements of account.

    Science.gov (United States)

    2010-07-01

    ... Confidential information and statements of account. (a) For purposes of this part, confidential information shall include statements of account and any information pertaining to the statements of account... included on the statement of account. (d) Access to the confidential information pertaining to the royalty...

  13. Is patient confidentiality compromised with the electronic health record?: a position paper.

    Science.gov (United States)

    Wallace, Ilse M

    2015-02-01

    In order for electronic health records to fulfill their expected benefits, protection of privacy of patient information is key. Lack of trust in confidentiality can lead to reluctance in disclosing all relevant information, which could have grave consequences. This position paper contemplates whether patient confidentiality is compromised by electronic health records. The position that confidentiality is compromised was supported by the four bioethical principles and argued that despite laws and various safeguards to protect patients' confidentiality, numerous data breaches have occurred. The position that confidentiality is not compromised was supported by virtue ethics and a utilitarian viewpoint and argued that safeguards keep information confidential and the public feels relatively safe with the electronic health record. The article concludes with an ethically superior position that confidentiality is compromised with the electronic health record. Although organizational and governmental ways of enhancing the confidentiality of patient information within the electronic health record facilitate confidentiality, the ultimate responsibility of maintaining confidentiality rests with the individual end-users and their ethical code of conduct. The American Nurses Association Code of Ethics for nurses calls for nurses to be watchful with data security in electronic communications.

  14. Can you keep a secret? Confidentiality in psychotherapy.

    Science.gov (United States)

    Younggren, Jeffrey N; Harris, Eric A

    2008-05-01

    Confidentiality is the secret-keeping duty that arises from the establishment of the professional relationship psychologists develop with their clients. It is a duty created by the professional relationship, it is set forth in the American Psychological Association's (2002) Ethical Principles and Code of Conduct, and it is codified in many state regulations. However, the difference between confidentiality and legal privilege; how, why, and when it can be violated; and the reasons for so doing are not well understood by many practitioners. While on the surface confidentiality might seem to be an easy concept to apply to professional practice, in fact it is quite complex and filled with exceptions that frequently differ from circumstance to circumstance and from state to state. A lack of respect for and a lack of familiarity with the significance of these exceptions could have dire professional consequences. This article reviews the ethical imperative of confidentiality and then provides examples of legal cases that help to better understand its complexity. Then, we offer strategies designed to help metal health practitioners when they are confronted with questions regarding confidentiality and privilege.

  15. Protecting Privacy and Confidentiality in Environmental Health Research.

    Science.gov (United States)

    Resnik, David B

    2010-01-01

    Environmental health researchers often need to make difficult decisions on how to protect privacy and confidentiality when they conduct research in the home or workplace. These dilemmas are different from those normally encountered in clinical research. Although protecting privacy and confidentiality is one of the most important principles of research involving human subjects, it can be overridden to prevent imminent harm to individuals or if required by law. Investigators should carefully consider the facts and circumstances and use good judgment when deciding whether to breach privacy or confidentiality.

  16. Joint degrees and engaging with a Europe of Knowledge: lessons ...

    African Journals Online (AJOL)

    This case study of staff perspectives and quality assurance assessment of joint degrees offers insights into the challenges and the lessons that can be learned and the lived reality of this type of international curriculum development from the practitioner perspective. Keywords: international joint degrees, international ...

  17. Ombuds’ corner: Confidentiality

    CERN Multimedia

    Vincent Vuillemin

    2011-01-01

    In this series, the Bulletin aims to explain the role of the Ombuds at CERN by presenting practical examples of misunderstandings that could have been resolved by the Ombuds if he had been contacted earlier. Please note that, in all the situations we present, the names are fictitious and used only to improve clarity.    Jane* came to the Ombuds to share her concerns about the actions of Mike*, one of her senior colleague supervisors, and insisted on the absolute confidentiality. The Ombuds promised to keep the information confidential following the terms of his mandate. During the discussion it appeared that the whole group was affected by the situation, spending a lot of time discussing how to resolve the problem instead of focusing on their main responsibilities. The risks for the Organization seemed very high and could possibly endanger the safety of the operations.  On one side, the Ombuds believed that it was essential to bring this matter to the attention of senior managem...

  18. Confidential benchmarking based on multiparty computation

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre; Damgård, Kasper Lyneborg; Nielsen, Kurt

    We report on the design and implementation of a system that uses multiparty computation to enable banks to benchmark their customers' confidential performance data against a large representative set of confidential performance data from a consultancy house. The system ensures that both the banks......' and the consultancy house's data stays confidential, the banks as clients learn nothing but the computed benchmarking score. In the concrete business application, the developed prototype help Danish banks to find the most efficient customers among a large and challenging group of agricultural customers with too much...... debt. We propose a model based on linear programming for doing the benchmarking and implement it using the SPDZ protocol by Damgård et al., which we modify using a new idea that allows clients to supply data and get output without having to participate in the preprocessing phase and without keeping...

  19. Client confidentiality: Perspectives of students in a healthcare ...

    African Journals Online (AJOL)

    This moral dilemma is difficult for students to circumvent and therefore this paper presents healthcare students' perspectives of confidentiality. Methods. We aimed to explore healthcare students' views and experiences of confidentiality as an ethical principle by adopting a qualitative explorative approach. Purposeful ...

  20. Breaching confidentiality: medical mandatory reporting laws in Iran.

    Science.gov (United States)

    Milanifar, Alireza; Larijani, Bagher; Paykarzadeh, Parvaneh; Ashtari, Golanna; Mehdi Akhondi, Mohammad

    2014-01-01

    Medical ethics is a realm where four important subjects of philosophy, medicine, theology and law are covered. Physicians and philosophers cooperation in this area will have great efficiency in the respective ethical rules formation. In addition to respect the autonomy of the patient, physician's obligation is to ensure that the medical intervention has benefit for the patient and the harm is minimal. There is an obvious conflict between duty of confidentiality and duty of mandatory reporting. Professional confidentiality is one of the basic components in building a constant physician-patient relationship which nowadays, beside the novelty, it is the subject of discussion. Legal obligation of confidentiality is not absolute. In physician-patient relationship, keeping patient's secrets and maintaining confidentiality is a legal and ethical duty, and disclosure of such secrets is mainly through specific statutes. Thus, there are a number of situations where breach of confidentiality is permitted in different legal systems. One of the situations where breaching confidentiality is permitted is the medical mandatory reporting to the relevant authority which is in accordance with many countries' legal systems. Some situations are considered in many countries legal systems' such as notification of births and deaths, infectious diseases, child abuse, sport and relevant events, medical errors, drug side effects and dangerous pregnancies. In this paper, we will examine and discuss medical mandatory reporting and its ethical and legal aspects in the judicial and legal system of Iran and few other countries. Finally we will suggest making Medical Mandatory Reporting Law in Iran.

  1. Confidentiality: From the Stacks to the Witness Stand.

    Science.gov (United States)

    Lee, Janis M.; Smith, G. Guy

    1988-01-01

    A library director describes her experience of safeguarding the confidentiality of the circulation records of a woman who went on a shooting rampage at a shopping mall. The lawyer who represented the library discusses the legal responsibility of public and school libraries concerning confidentiality. (CLB)

  2. Licence renewal in the United States - enhancing the process through lessons learned

    International Nuclear Information System (INIS)

    Walters, D.J.

    2000-01-01

    The Nuclear Energy Institute (NEI) is the Washington based policy organisation representing the broad and varied interests of the diverse nuclear energy industry. It comprises nearly 300 corporate members in 15 countries with a budget last year of about USD 26.5 million. It has been working for 10 years with the Nuclear Regulatory Commission (NRC), colleagues in the industry and others to demonstrate that license renewal is a safe and workable process. The first renewed license was issued on 24 March to BGE for the the Calvert Cliffs plant. One month later the NRC issued the renewed license for the Ocoenne plant. By 'Enhancing the process through lessons learned', we mean reducing the uncertainty in the license renewal process. This is achieved through lessons learned from the net wave of applicants and the reviews of the Calvert Cliffs and Ocoenne applications. Three areas will be covered: - Incentive for minimising uncertainty as industry interest in license renewal is growing dramatically. - Rigorous reviews by Nuclear Regulatory Commission assure continued safety: process put in place by the Nuclear Regulatory Commission to assure safety throughout the license renewal term, specifically areas where the lessons learned suggest improvements can be made. - Lessons learned have identified enhancements to the process: numerous benefits associated with renewal of nuclear power plant licenses for consumers of electricity, the environment, the nuclear operating companies and the nation. (author)

  3. 20 CFR 726.113 - Disclosure of confidential information.

    Science.gov (United States)

    2010-04-01

    ... MINE OPERATOR'S INSURANCE Authorization of Self-Insurers § 726.113 Disclosure of confidential... 20 Employees' Benefits 3 2010-04-01 2010-04-01 false Disclosure of confidential information. 726... authorized self-insurer or applicant for the authorization of self-insurance obtained by the Office shall be...

  4. Practical State Machine Replication with Confidentiality

    Energy Technology Data Exchange (ETDEWEB)

    Duan, Sisi [ORNL; Zhang, Haibin [University of North Carolina, Chapel Hill

    2016-01-01

    We study how to enable arbitrary randomized algorithms in Byzantine fault-tolerant (BFT) settings. We formalize a randomized BFT protocol and provide a simple and efficient construction that can be built on any existing BFT protocols while adding practically no overhead. We go one step further to revisit a confidential BFT protocol (Yin et al., SOSP '03). We show that their scheme is potentially susceptible to safety and confidentiality attacks. We then present a new protocol that is secure in the stronger model we formalize, by extending the idea of a randomized BFT protocol. Our protocol uses only efficient symmetric cryptography, while Yin et al.'s uses costly threshold signatures. We implemented and evaluated our protocols on microbenchmarks and real-world use cases. We show that our randomized BFT protocol is as efficient as conventional BFT protocols, and our confidential BFT protocol is two to three orders of magnitude faster than Yin et al.'s, which is less secure than ours.

  5. CRAC : Confidentiality risk analysis and IT-architecture comparison of business networks

    NARCIS (Netherlands)

    Morali, A.; Zambon, E.; Etalle, S.; Wieringa, R.J.

    2009-01-01

    The leakage of confidential information (e.g. industrial secrets, patient records and user credentials) is one of the risks that have to be accounted for and mitigated by organizations dealing with confidential data. Unfortunately, assessing confidentiality risk is challenging, particularly in the

  6. 29 CFR 4010.13 - Confidentiality of information submitted.

    Science.gov (United States)

    2010-07-01

    ... REPORTING AND DISCLOSURE REQUIREMENTS ANNUAL FINANCIAL AND ACTUARIAL INFORMATION REPORTING § 4010.13 Confidentiality of information submitted. In accordance with § 4901.21(a)(3) of this chapter and ERISA section... 29 Labor 9 2010-07-01 2010-07-01 false Confidentiality of information submitted. 4010.13 Section...

  7. 75 FR 75586 - Confidentiality of Suspicious Activity Reports

    Science.gov (United States)

    2010-12-03

    ...] RIN 1550-AC26 Confidentiality of Suspicious Activity Reports AGENCY: The Office of Thrift Supervision... implementing the Bank Secrecy Act (BSA) governing the confidentiality of a suspicious activity report (SAR) to... corporations regulated by the OTS, to keep certain records and make certain reports that have been determined...

  8. Protecting confidentiality rights: the need for an ethical practice model.

    Science.gov (United States)

    Fisher, Mary Alice

    2008-01-01

    All psychologists must uphold the same ethical standards about confidentiality even though each state imposes different legal limits on their ability to protect clients' confidences. The resulting ethical-legal confusion is exacerbated by legally based confidentiality training that treats legal exceptions as if they were the rule and fosters the impression that attorneys are now the only real experts about this aspect of practice. This article provides an ethics-based confidentiality practice model that clarifies the ethical rule and puts its legal exceptions into ethical perspective. Like the Confidentiality section of the American Psychological Association's (2002) Ethical Principles of Psychologists and Code of Conduct, this outline would apply to all psychologists regardless of state laws, but the details of its implementation would vary according to role and setting. It can be used as a universal training outline, a consultation and supervision tool, a guide to professional practice, and a basis for clearer ongoing conversation about the ethics of "conditional confidentiality." Psychologists can use this practice model to regain their status as experts about the confidentiality ethics of their own profession. PsycINFO Database Record (c) 2008 APA, all rights reserved.

  9. The development of quality assurance and quality management in civil engineering

    International Nuclear Information System (INIS)

    Haste, N.D.

    1991-01-01

    The paper describes the development of Quality Assurance and Quality Management during construction at the Sizewell-B power plant from the lead provided in the Client's documentation. The hard lessons learnt from dealing with major suppliers and sub-contractors are explained. The paper concludes by describing the ways in which total Quality Management is now addressed within Laings Civil Engineering following the experiences at Sizewell and elsewhere. (author)

  10. Genetic secrets: Protecting privacy and confidentiality in the genetic era

    Energy Technology Data Exchange (ETDEWEB)

    Rothstein, M.A. [ed.

    1998-07-01

    Few developments are likely to affect human beings more profoundly in the long run than the discoveries resulting from advances in modern genetics. Although the developments in genetic technology promise to provide many additional benefits, their application to genetic screening poses ethical, social, and legal questions, many of which are rooted in issues of privacy and confidentiality. The ethical, practical, and legal ramifications of these and related questions are explored in depth. The broad range of topics includes: the privacy and confidentiality of genetic information; the challenges to privacy and confidentiality that may be projected to result from the emerging genetic technologies; the role of informed consent in protecting the confidentiality of genetic information in the clinical setting; the potential uses of genetic information by third parties; the implications of changes in the health care delivery system for privacy and confidentiality; relevant national and international developments in public policies, professional standards, and laws; recommendations; and the identification of research needs.

  11. 15 CFR 718.2 - Identification of confidential business information.

    Science.gov (United States)

    2010-01-01

    ... business information. 718.2 Section 718.2 Commerce and Foreign Trade Regulations Relating to Commerce and Foreign Trade (Continued) BUREAU OF INDUSTRY AND SECURITY, DEPARTMENT OF COMMERCE CHEMICAL WEAPONS CONVENTION REGULATIONS CONFIDENTIAL BUSINESS INFORMATION 718.2 Identification of confidential business...

  12. 7 CFR 1425.5 - Confidentiality.

    Science.gov (United States)

    2010-01-01

    ... AGRICULTURE LOANS, PURCHASES, AND OTHER OPERATIONS COOPERATIVE MARKETING ASSOCIATIONS § 1425.5 Confidentiality. Information submitted to CCC related to trade secrets, financial or commercial operations, or the financial...

  13. 50 CFR 600.130 - Protection of confidentiality of statistics.

    Science.gov (United States)

    2010-10-01

    ... statistics. 600.130 Section 600.130 Wildlife and Fisheries FISHERY CONSERVATION AND MANAGEMENT, NATIONAL... Fishery Management Councils § 600.130 Protection of confidentiality of statistics. Each Council must establish appropriate procedures for ensuring the confidentiality of the statistics that may be submitted to...

  14. 7 CFR 1205.540 - Confidential books, records, and reports.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 10 2010-01-01 2010-01-01 false Confidential books, records, and reports. 1205.540 Section 1205.540 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL... Confidential books, records, and reports. All information obtained from the books, records, and reports of...

  15. 40 CFR 790.7 - Confidentiality.

    Science.gov (United States)

    2010-07-01

    ... words “confidential business information,” “trade secret,” or another appropriate phrase indicating its... competitor use such information? How substantial would the harmful effects be? What is the causal...

  16. 13 CFR 120.1060 - Confidentiality of Reports, Risk Ratings and related Confidential Information.

    Science.gov (United States)

    2010-01-01

    ... other than SBA's Lender oversight and SBA's portfolio management purposes. An SBA Lender, Intermediary... conjunction with SBA's Lender Oversight Program and SBA's portfolio management (for purposes of this... 13 Business Credit and Assistance 1 2010-01-01 2010-01-01 false Confidentiality of Reports, Risk...

  17. Using measures to guide the continuous improvement journey: a partnership between quality assurance and toxicology.

    Science.gov (United States)

    Gentry, P E; Sites, D L

    1994-03-01

    It has been said that you cannot improve what you cannot measure. At Eli Lilly and Company, measurement is one of the five pillars of Total Quality. Quality Assurance and Toxicology have partnered in the use of measures to drive improvements in both areas. Quality Assurance and Toxicology have embarked on a journey in Total Quality to achieve customer satisfaction and drive continuous improvement. Measurement in the research and development world has traditionally not been well received. Contrary to popular belief, we have found that many processes can be measured in the research and development environment. Measurement is critical to the continuous improvement of processes because improvements are made using data. In Quality Assurance and Toxicology, the initial measures were put in place to gather baseline data. As we learned from our measures, we customized them to align with all of our processes. This article describes the journey of measuring Quality Assurance and Toxicology, including highlights of implementation strategies and lessons learned along the way.

  18. Quality assurance grading of conventional equipment at nuclear power station

    International Nuclear Information System (INIS)

    Li Ping; Li Shichang

    2006-01-01

    Equipment QA grading with the systematic and standardized approach will benefit the concerned organizations by effective allocating of limited resources to guarantee the quality of essential equipment. This paper presents a new quality assurance grading system for the convention systems/equipment of nuclear power station, which is operative and at the same time could help the owner to allot resource reasonably through the analysis of the purpose of grading and the experience and lessons of LINGAO Phase I project. (authors)

  19. Computer Security: confidentiality is everybody’s business

    CERN Multimedia

    Stefan Lueders, Computer Security Team

    2015-01-01

    Recently, a zip file with confidential information was mistakenly made public on one of CERN’s websites. Although the file was only intended for members of an internal committee, when placing it onto the CERN website, someone made a mistake when setting the access permissions and, thus, made the file accessible to everyone visiting the site!   Unfortunately, this is but one example of such mistakes. We have seen other documents made accessible to a much wider audience than originally intended… CERN takes serious measures to ensure the confidentiality of data. Confidential or “sensitive” documents (following the nomenclature set out in the CERN Data Protection Policy) deserve professional handling and access protections given only to the people who really need to access them. As such, they must not be widely circulated as attachments in e-mails and, most definitely, must not be stored on random public websites for the sole purpose of shari...

  20. Library Records: A Review of Confidentiality Laws and Policies.

    Science.gov (United States)

    Million, Angela C.; Fisher, Kim N.

    1986-01-01

    Cites the importance of having a state law, knowing what it says, and having a library policy statement regarding the confidentiality of patron records. Discussion covers writing and implementing a policy, the role of automation, existing laws, library records defined, exceptions to confidentiality, and legal liability. Thirty-seven references are…

  1. Context, confidentiality, and consent in tailored health communications: a cautionary note.

    Science.gov (United States)

    Orleans, C T

    1999-01-01

    This article highlights key contextual factors that emerge when the evolution of tailored health communications is viewed against the backdrop of dynamic changes in the nation's health care system--including the shift from fee-for-service medicine to managed care and the proliferation of direct-to-consumer and tailored marketing strategies in the pharmaceutical industry. It focuses on contextual variables with potential to significantly mediate the impact of personally tailored health advice--including those related to confidentiality, privacy, and informed consent and to the perceived aims, intents, and sources of tailored health messages. To protect the future of tailored health messages, more research attention must be given to defining these contextual factors and understanding the roles that they play and the ways in which they can be controlled to assure the best outcomes. Such research could point the way towards a set of empirical and ethical "best practices" based on a scientific understanding of how to maximize the benefits, and minimize the potential harms, of the widescale use of tailored health communications.

  2. Organizing safety: conditions for successful information assurance programs.

    Science.gov (United States)

    Collmann, Jeff; Coleman, Johnathan; Sostrom, Kristen; Wright, Willie

    2004-01-01

    Organizations must continuously seek safety. When considering computerized health information systems, "safety" includes protecting the integrity, confidentiality, and availability of information assets such as patient information, key components of the technical information system, and critical personnel. "High Reliability Theory" (HRT) argues that organizations with strong leadership support, continuous training, redundant safety mechanisms, and "cultures of high reliability" can deploy and safely manage complex, risky technologies such as nuclear weapons systems or computerized health information systems. In preparation for the Health Insurance Portability and Accountability Act (HIPAA) of 1996, the Office of the Assistant Secretary of Defense (Health Affairs), the Offices of the Surgeons General of the United States Army, Navy and Air Force, and the Telemedicine and Advanced Technology Research Center (TATRC), US Army Medical Research and Materiel Command sponsored organizational, doctrinal, and technical projects that individually and collectively promote conditions for a "culture of information assurance." These efforts include sponsoring the "P3 Working Group" (P3WG), an interdisciplinary, tri-service taskforce that reviewed all relevant Department of Defense (DoD), Miliary Health System (MHS), Army, Navy and Air Force policies for compliance with the HIPAA medical privacy and data security regulations; supporting development, training, and deployment of OCTAVE(sm), a self-directed information security risk assessment process; and sponsoring development of the Risk Information Management Resource (RIMR), a Web-enabled enterprise portal about health information assurance.

  3. Independent consultants : fiduciary duties, trade secrets and confidential information

    International Nuclear Information System (INIS)

    Fraser, B.; Wilhelmson, M.

    1999-01-01

    Because of cutbacks and downsizing within the petroleum industry, it has become one of the largest users of contract personnel to provide services that were previously provided by senior levels of management. This paper explored the application of common law fiduciary duties and the duty of confidence to the independent workforce. It examined to what extent fiduciary duties apply to independent consultants and the best way for the employer to protect itself from the potential misuse of confidential information. Part 1 of the paper described fiduciary duties. A fiduciary relationship was described as one that possesses the following three characteristics: (1) the fiduciary has scope for the exercise of some discretion of power, (2) the fiduciary can unilaterally exercise that power to affect the beneficiary's practical interests, and (3) the beneficiary is peculiarly vulnerable to the fiduciary holding the discretion of power. Three examples of how the courts treated some arguments regarding fiduciaries were presented. Part 2 of this paper discussed how trade secrets and confidential information should be handled. It was explained, that regardless of fiduciary duties, the unauthorized use of confidential information by an independent contractor can give rise to liability and an award of damages by the courts. Some examples where the Supreme Court of Canada found breach of confidence by a party were presented. Information communicated from an employer to an employee can be divided into the following three categories: (1) publicly accessible and not confidential, (2) confidential and must be treated as such while an employee is employed, but if learned becomes part of the employees skill and knowledge, and (3) specific confidential trade secrets that cannot lawfully be used for anyone's benefit but the employer's. Issues regarding defining rights and obligations by contract were also discussed

  4. 5 CFR 2634.901 - Policies of confidential financial disclosure reporting.

    Science.gov (United States)

    2010-01-01

    .... (a) The confidential financial reporting system set forth in this subpart is designed to complement... Government duties involve the exercise of significant discretion in certain sensitive areas, report their... apparent conflicts of interest. The confidential financial disclosure system promotes that goal, with...

  5. Analysis of LYSA-calculus with explicit confidentiality annotations

    DEFF Research Database (Denmark)

    Gao, Han; Nielson, Hanne Riis

    2006-01-01

    Recently there has been an increased research interest in applying process calculi in the verification of cryptographic protocols due to their ability to formally model protocols. This work presents LYSA with explicit confidentiality annotations for indicating the expected behavior of target...... malicious activities performed by attackers as specified by the confidentiality annotations. The proposed analysis approach is fully automatic without the need of human intervention and has been applied successfully to a number of protocols....

  6. 5 CFR 1312.26 - Control of secret and confidential material.

    Science.gov (United States)

    2010-01-01

    ... 5 Administrative Personnel 3 2010-01-01 2010-01-01 false Control of secret and confidential... Accountability of Classified Information § 1312.26 Control of secret and confidential material. Classified... Document Control, will be used to establish accountability controls on all Secret material received or...

  7. 48 CFR 1552.235-80 - Access to confidential business information.

    Science.gov (United States)

    2010-10-01

    ... business information. 1552.235-80 Section 1552.235-80 Federal Acquisition Regulations System ENVIRONMENTAL... Clauses 1552.235-80 Access to confidential business information. As prescribed in 1535.007-70(g), insert the following clause. Access to Confidential Business Information (OCT 2000) It is not anticipated...

  8. Confidential Business Information under TSCA

    Science.gov (United States)

    This website informs businesses, policymakers, and the public about the confidential business information (CBI) provisions of § 14 of the Toxic Substances Control Act (TSCA), as amended by the Frank R. Lautenberg Chemical Safety for the 21st Century Act.

  9. Accidents in radiotherapy: Lack of quality assurance?

    International Nuclear Information System (INIS)

    Novotny, J.

    1997-01-01

    About 150 radiological accidents, involving more than 3000 patients with adverse effects, 15 patient's fatalities and about 5000 staff and public exposures have been collected and analysed. Out of 67 analysed accidents in external beam therapy 22% has been caused by wrong calculation of the exposure time or monitor units, 13% by inadequate review of patient's chart, 12% by mistakes in the anatomical area to be treated. The remaining 35% can be attributed to 17 different causes. The most common mistakes in brachytherapy were wrong activities of sources used for treatment (20%), inadequate procedures for placement of sources applicators (14%), mistakes in calculating the treatment time (12%), etc. The direct and contributing causes of radiological accidents have been deduced from each event, when it was possible and categorized into 9 categories: mistakes in procedures (30%), professional mistakes (17%), communication mistakes (15%), lack of training (8.5%), interpretation mistakes (7%), lack of supervision (6%), mistakes in judgement (6%), hardware failures (5%), software and other mistakes (5.5%). Three types of direct and contributing causes responsible for almost 62% of all accidents are directly connected to the quality assurance of treatment. The lessons learnt from the accidents are related to frequencies of direct and contributing factors and show that most of the accident are caused by lack, non-application of quality assurance (QA) procedures or by underestimating of QA procedures. The international system for collection of accidents and dissemination of lessons learnt from the different accidents, proposed by IAEA, can contribute to better practice in many radiotherapy departments. Most of the accidents could have been avoided, had a comprehensive QA programme been established and properly applied in all radiotherapy departments, whatever the size. (author)

  10. Lessons learned from development and quality assurance of software systems at the Halden Project

    International Nuclear Information System (INIS)

    Bjorlo, T.J.; Berg, O.; Pehrsen, M.; Dahll, G.; Sivertsen, T.

    1996-01-01

    The OECD Halden Reactor Project has developed a number of software systems within the research programmes. These programmes have comprised a wide range of topics, like studies of software for safety-critical applications, development of different operator support systems, and software systems for building and implementing graphical user interfaces. The systems have ranged from simple prototypes to installations in process plants. In the development of these software systems, Halden has gained much experience in quality assurance of different types of software. This paper summarises the accumulated experience at the Halden Project in quality assurance of software systems. The different software systems being developed at the Halden Project may be grouped into three categories. These are plant-specific software systems (one-of-a-kind deliveries), generic software products, and safety-critical software systems. This classification has been found convenient as the categories have different requirements to the quality assurance process. In addition, the experience from use of software development tools and proprietary software systems at Halden, is addressed. The paper also focuses on the experience gained from the complete software life cycle, starting with the software planning phase and ending with software operation and maintenance

  11. 6 CFR 25.10 - Confidentiality and protection of Intellectual Property.

    Science.gov (United States)

    2010-01-01

    ... 6 Domestic Security 1 2010-01-01 2010-01-01 false Confidentiality and protection of Intellectual Property. 25.10 Section 25.10 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY REGULATIONS TO SUPPORT ANTI-TERRORISM BY FOSTERING EFFECTIVE TECHNOLOGIES § 25.10 Confidentiality and...

  12. 42 CFR 405.215 - Confidential commercial and trade secret information.

    Science.gov (United States)

    2010-10-01

    ... 42 Public Health 2 2010-10-01 2010-10-01 false Confidential commercial and trade secret information. 405.215 Section 405.215 Public Health CENTERS FOR MEDICARE & MEDICAID SERVICES, DEPARTMENT OF... trade secret information. To the extent that CMS relies on confidential commercial or trade secret...

  13. 40 CFR 260.2 - Availability of information; confidentiality of information.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 25 2010-07-01 2010-07-01 false Availability of information; confidentiality of information. 260.2 Section 260.2 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) SOLID WASTES (CONTINUED) HAZARDOUS WASTE MANAGEMENT SYSTEM: GENERAL General § 260.2 Availability of information; confidentiality of...

  14. 48 CFR 1552.235-71 - Treatment of confidential business information.

    Science.gov (United States)

    2010-10-01

    ... business information. 1552.235-71 Section 1552.235-71 Federal Acquisition Regulations System ENVIRONMENTAL... Clauses 1552.235-71 Treatment of confidential business information. As prescribed in 1535.007-70(b... determined that in the performance of a contract, EPA may furnish confidential business information to the...

  15. 7 CFR 1280.227 - Confidentiality.

    Science.gov (United States)

    2010-01-01

    ... statistical data collected therefrom, which statements do not identify the information furnished by any person... 7 Agriculture 10 2010-01-01 2010-01-01 false Confidentiality. 1280.227 Section 1280.227 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (MARKETING...

  16. 22 CFR 1101.5 - Security, confidentiality and protection of records.

    Science.gov (United States)

    2010-04-01

    ... 22 Foreign Relations 2 2010-04-01 2010-04-01 true Security, confidentiality and protection of... Bureau of Standard's booklet “Computer Security Guidelines for Implementing the Privacy Act of 1974” (May... STATES AND MEXICO, UNITED STATES SECTION PRIVACY ACT OF 1974 § 1101.5 Security, confidentiality and...

  17. 77 FR 40026 - 36(b)(1) Arms Sales Notification

    Science.gov (United States)

    2012-07-06

    ... and contractor logistics, Quality Assurance Team support services, engineering and technical support... personnel training, U.S. Government and contractor logistics, Quality Assurance Team support services..., maintenance, or training is Confidential. Reverse engineering could reveal Confidential information...

  18. Workshop on measurement quality assurance for ionizing radiation: Proceedings

    Energy Technology Data Exchange (ETDEWEB)

    Heath, J.A.; Swinth, K.L. [comps.

    1993-12-31

    This workshop was held to review the status of secondary level calibration accreditation programs, review related measurement accreditation programs, document lessons learned, and to present changes in programs due to new national priorities involving radioactivity measurements. Contents include: fundamentals of measurement quality assurance (MQA), standards for MQA programs; perspectives and policies; complete MQA programs; future MQA programs; QA/QC programs--radioactivity; QA/QC programs--dosimetry; laboratory procedures for QA/QC; in-house control of reference dosimetry laboratories; in-house controls of radioactivity laboratories; and poster session. Selected papers are indexed separately for inclusion in the Energy Science and Technology Database.

  19. Workshop on measurement quality assurance for ionizing radiation: Proceedings

    International Nuclear Information System (INIS)

    Heath, J.A.; Swinth, K.L.

    1993-01-01

    This workshop was held to review the status of secondary level calibration accreditation programs, review related measurement accreditation programs, document lessons learned, and to present changes in programs due to new national priorities involving radioactivity measurements. Contents include: fundamentals of measurement quality assurance (MQA), standards for MQA programs; perspectives and policies; complete MQA programs; future MQA programs; QA/QC programs--radioactivity; QA/QC programs--dosimetry; laboratory procedures for QA/QC; in-house control of reference dosimetry laboratories; in-house controls of radioactivity laboratories; and poster session. Selected papers are indexed separately for inclusion in the Energy Science and Technology Database

  20. Genetic secrets: Protecting privacy and confidentiality in the genetic era. Final report

    Energy Technology Data Exchange (ETDEWEB)

    Rothstein, M.A. [ed.

    1998-09-01

    Few developments are likely to affect human beings more profoundly in the long run than the discoveries resulting from advances in modern genetics. Although the developments in genetic technology promise to provide many additional benefits, their application to genetic screening poses ethical, social, and legal questions, many of which are rooted in issues of privacy and confidentiality. The ethical, practical, and legal ramifications of these and related questions are explored in depth. The broad range of topics includes: the privacy and confidentiality of genetic information; the challenges to privacy and confidentiality that may be projected to result from the emerging genetic technologies; the role of informed consent in protecting the confidentiality of genetic information in the clinical setting; the potential uses of genetic information by third parties; the implications of changes in the health care delivery system for privacy and confidentiality; relevant national and international developments in public policies, professional standards, and laws; recommendations; and the identification of research needs.

  1. 12 CFR 563g.13 - Public disclosure and confidential treatment.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 5 2010-01-01 2010-01-01 false Public disclosure and confidential treatment. 563g.13 Section 563g.13 Banks and Banking OFFICE OF THRIFT SUPERVISION, DEPARTMENT OF THE TREASURY SECURITIES OFFERINGS § 563g.13 Public disclosure and confidential treatment. (a) Any offering circular...

  2. 21 CFR 821.55 - Confidentiality.

    Science.gov (United States)

    2010-04-01

    ... permission to release, the patient's name, address, telephone number, and social security number, or other... MEDICAL DEVICE TRACKING REQUIREMENTS Records and Inspections § 821.55 Confidentiality. (a) Any patient... identify patient or research subjects shall not be available for public disclosure except as provided in...

  3. Asset Analysis and Operational Concepts for Separation Assurance Flight Testing at Dryden Flight Research Center

    Science.gov (United States)

    Costa, Guillermo J.; Arteaga, Ricardo A.

    2011-01-01

    A preliminary survey of existing separation assurance and collision avoidance advancements, technologies, and efforts has been conducted in order to develop a concept of operations for flight testing autonomous separation assurance at Dryden Flight Research Center. This effort was part of the Unmanned Aerial Systems in the National Airspace System project. The survey focused primarily on separation assurance projects validated through flight testing (including lessons learned), however current forays into the field were also examined. Comparisons between current Dryden flight and range assets were conducted using House of Quality matrices in order to allow project management to make determinations regarding asset utilization for future flight tests. This was conducted in order to establish a body of knowledge of the current collision avoidance landscape, and thus focus Dryden s efforts more effectively towards the providing of assets and test ranges for future flight testing within this research field.

  4. Conflicting duties over confidentiality in Argentina and Peru.

    Science.gov (United States)

    Cavallo, Mercedes

    2011-02-01

    The medical duty of confidentiality represents a key element for the provision of reproductive and sexual health services. In some Latin American countries, such as Argentina and Peru, the legal systems impose—or are interpreted as imposing—on health professionals the duty of confidentiality, but also the duty to report the commission of a public order offense that they know about owing to the practicing of their profession. In these countries, the conflicting duties and the criminalization of abortion cause severe public health and human rights problems when health professionals assist their patients for post-abortion treatment. Typically, patients are deterred from seeking prompt medical care, and their privacy, autonomy, and dignity are violated. A 2010 ruling from the Supreme Court of Argentina and a 2004 ruling from the Inter-American Court of Human Rights emerge as important instruments that grant a more adequate protection of medical confidentiality. © 2010 International Federation of Gynecology and Obstetrics. Published by Elsevier Ireland Ltd. All rights reserved.

  5. Confidential patent application with an example of preparation

    Directory of Open Access Journals (Sweden)

    Obrad T. Čabarkapa

    2013-12-01

    Full Text Available In order that the invention solving a technical problem receives a patent protection, it is necessary to file a patent application. For the protection of confidential inventions which are important for defense and national security, a confidential patent application[1] must be filed. A confidential patent application is an important and complex document, the parts of which are,  in principle, exposed in an established order. For the preparation of patent applications, it is necessary to engage experts with higher education, primarily in the technical field the invention relates to. The contents of the patent application is a basis for examining whether the application meets the requirements for patentability and whether the right to patent protection is achieved. Besides theoretical discussions on patent application, the paper gives a short version of an example of an application regarding a protected confidential invention. Introduction The basic condition for the exercise of patent protection is filing a patent application, the test procedure and, eventually, depending on the test results - the recognition or rejection of the patent. The paper gives a description of all parts of the patent application on an example of a confidential invention already patented. The content of the confidential patent application The confidential patent application for confidential invention protection consists of the following parts: The application for a patent; description of the invention; the claims (indication of what is new and what is required to be protected by patenting; abstract (short summary of the invention  and a draft of the invention (to which the description and the claims are referred. The application for a patent The application for patent is filed on Form P-1 and a request for the petty patent on Form MP-1. The data entered in the file is, for example: the applicant; the lawyer; the name of the invention in Serbian and English; the inventor

  6. Confidentiality with Minors: The Need for Policy To Promote and Protect.

    Science.gov (United States)

    Stone, Carolyn; Isaacs, Madelyn L.

    2003-01-01

    Investigated school counselors' attitudes toward breaching confidentiality before and after the 1999 Columbine High School shootings. Surveys of demographically similar counselors indicated that the Columbine shootings affected counselors' predictions about their attitudes and behavior regarding confidentiality. Counselors were more reluctant to…

  7. 42 CFR 93.108 - Confidentiality.

    Science.gov (United States)

    2010-10-01

    ... 42 Public Health 1 2010-10-01 2010-10-01 false Confidentiality. 93.108 Section 93.108 Public Health PUBLIC HEALTH SERVICE, DEPARTMENT OF HEALTH AND HUMAN SERVICES HEALTH ASSESSMENTS AND HEALTH EFFECTS STUDIES OF HAZARDOUS SUBSTANCES RELEASES AND FACILITIES PUBLIC HEALTH SERVICE POLICIES ON RESEARCH...

  8. 40 CFR 710.58 - Confidentiality.

    Science.gov (United States)

    2010-07-01

    ...) Any person submitting information under this subpart may assert a business confidentiality claim for... with reporting under this subpart? How could a competitor use such information? Would the effects of... that your competitors do not know it is being manufactured or imported for a commercial purpose by...

  9. Participants' safety versus confidentiality: A case study of HIV research.

    Science.gov (United States)

    Leyva-Moral, Juan Manuel; Feijoo-Cid, Maria

    2017-05-01

    Background When conducting qualitative research, participants usually share lots of personal and private information with the researcher. As researchers, we must preserve participants' identity and confidentiality of the data. Objective To critically analyze an ethical conflict encountered regarding confidentiality when doing qualitative research. Research design Case study. Findings and discussion one of the participants in a study aiming to explain the meaning of living with HIV verbalized his imminent intention to commit suicide because of stigma of other social problems arising from living with HIV. Given the life-threatening situation, the commitment related to not disclosing the participant's identity and/or the content of the interview had to be broken. To avoid or prevent suicide, the therapist in charge of the case was properly informed about the participant's intentions. One important question arises from this case: was it ethically appropriate to break the confidentiality commitment? Conclusion confidentiality could be broken if a life-threatening event is identified during data collection and participants must know that. This has to be clearly stated in the informed consent form.

  10. Meaningful Use of a Confidential Adolescent Patient Portal.

    Science.gov (United States)

    Thompson, Lindsay A; Martinko, Thomas; Budd, Pamela; Mercado, Rebeccah; Schentrup, Anzeela M

    2016-02-01

    To design and evaluate the usage of an adolescent patient portal specifically adapted for adolescent health care needs that also satisfied institutional meaningful use guidelines regarding electronic health records. Key stakeholders at one academic health care center adopted an online portal and opted to designate a patient portal specifically for adolescents to maximize confidentiality in compliance with state privacy laws. This study analyzed aggregate electronic health record data of adolescents' (ages 12-17.9 years) uptake, usage, and functionality of this portal and compared it to parent portal usage for younger children (ages 0-11 years). Differences in means were calculated using paired t tests. The portal was used similarly between parents of young children and adolescents, with almost 1,000 enrollees in each group from September 1, 2012 to March 31, 2015. There were no gender differences in enrollment. Adolescents were less likely than parents of younger children to review appointments (73% vs. 85%), laboratory tests (67% vs. 79%), problem lists (40% vs. 78%), or allergies (45% vs. 77%, all p values adolescents sent 1,397 confidential messages. Institutional decisions for implementing meaningful use requirements can align with goals of adolescent health. Patient portals can enhance adolescent health care quality and adolescents readily use a confidential portal. Implementation of meaningful use requirements should be checked against adolescent health care needs to maximize confidentiality and promote health communication. Copyright © 2016 Society for Adolescent Health and Medicine. Published by Elsevier Inc. All rights reserved.

  11. Safeguarding Confidentiality in Electronic Health Records.

    Science.gov (United States)

    Shenoy, Akhil; Appel, Jacob M

    2017-04-01

    Electronic health records (EHRs) offer significant advantages over paper charts, such as ease of portability, facilitated communication, and a decreased risk of medical errors; however, important ethical concerns related to patient confidentiality remain. Although legal protections have been implemented, in practice, EHRs may be still prone to breaches that threaten patient privacy. Potential safeguards are essential, and have been implemented especially in sensitive areas such as mental illness, substance abuse, and sexual health. Features of one institutional model are described that may illustrate the efforts to both ensure adequate transparency and ensure patient confidentiality. Trust and the therapeutic alliance are critical to the provider-patient relationship and quality healthcare services. All of the benefits of an EHR are only possible if patients retain confidence in the security and accuracy of their medical records.

  12. 31 CFR 129.5 - Confidentiality.

    Science.gov (United States)

    2010-07-01

    ... 31 Money and Finance: Treasury 1 2010-07-01 2010-07-01 false Confidentiality. 129.5 Section 129.5 Money and Finance: Treasury Regulations Relating to Money and Finance PORTFOLIO INVESTMENT SURVEY... contain data aggregated in such a way that neither the person supplying the information nor the investor...

  13. 40 CFR 710.38 - Confidentiality.

    Science.gov (United States)

    2010-07-01

    ... submitting information under this part may assert a business confidentiality claim for the information. The... with reporting under this part? How could a competitor use such information? Would the effects of... that your competitors do not know it is being manufactured or imported for a commercial purpose by...

  14. Lessons Learned from Past and Ongoing Construction Projects

    International Nuclear Information System (INIS)

    Tabatabai, Omid

    2011-01-01

    Full text of publication follows: The nuclear industry in the U.S. faced many construction quality and design issues in the 1970's and 1980's. In 1984, the NRC issued NUREG-1055, 'Improving Quality and the Assurance of Quality in the Design and Construction of Nuclear Power Plants,' to document the lessons learned from nuclear power plant (NPP) construction in the U.S. In recent years, several countries have begun either planning for or actually constructing new NPPs. For instance, in the U.S., the nuclear industry has submitted several combined license and design certification applications to the NRC for licensing reviews and approval to build 30+ new NPP units. Latest construction experience from countries that are currently building new NPPs indicate that these countries are dealing with challenges that are similar to those issues that caused major quality assurance problems, delays, or even termination of several projects in U.S. in the 70's and 80's. The U.S. NRC is pro-actively taking measures to improve its regulatory programs as well as construction oversight activities before new NPPs construction begin in the U.S. In late 2007, the U.S. NRC's Office of New Reactors established a construction experience program (ConE) to obtain and evaluate construction and operating experience events and to identify the lessons learned from these events. In March 2009, the NRC published an Office Instruction to provide a process for incorporating the lessons learned and insights from the design, construction, and operation of the international and domestic NPPs into the licensing reviews, inspections, and construction of new reactors in the U.S. Additionally, the ConE program staff developed a Web-enabled database to store, manage, and make construction experience information available to all NRC technical reviewers as well as inspectors. Because this database contains information from other countries' regulators that are considered

  15. Public expectations concerning confidentiality protection of adolescents' sexual and reproductive health care in Lithuania

    DEFF Research Database (Denmark)

    Jaruseviciene, Lina; Zaborskis, Apolinaras; Lazarus, Jeffrey Victor

    2014-01-01

    OBJECTIVE: An adolescent's right to confidential healthcare is protected by international law and professional consensus. However, parental and social support for confidential sexual and reproductive health (SRH) services, in particular, varies greatly. This study documents Lithuanian residents......' expectations with regard to confidentiality protection for adolescents in this domain, and explores the factors related to the diversity of these expectations. METHODS: Two national surveys of Lithuanian residents completed in 2005 and 2012 using anonymous questionnaires. Participants rated their expectations...... for confidentiality using a five-point Likert scale for eight types of SRH consultations. RESULTS: Public anticipation for confidentiality depended on whether issues related to sexual behaviour or to its consequences were addressed during adolescent consultation. Only younger respondents had higher expectations...

  16. THE PRINCIPLE OF CONFIDENTIALITY IN ARBITRATION. APPLICATION AND LIMITATIONS OF THE PRINCIPLE

    Directory of Open Access Journals (Sweden)

    Bazil Oglindă

    2015-11-01

    Full Text Available Over the years, arbitration has grown to be the preferred means of dispute resolution by commercial entities. One of the benefits that build the attraction for this system of dispute resolution was the principle of confidentiality. One issue that needs to be analyzed is about the reasons why confidentiality is so important in business. Confidentiality is a principle largely embraced in arbitration, but, as we will see, the principle is not an absolute one. There are a set of questions that needs to be answer to, like: Who is bound by the duty of confidentiality? Does this refer only to the parties or does it expands to other actors involved in the arbitral proceedings? What happens with the obligation of confidentiality when issues are brought before a court, taking in account the principle of open justice? We will see that in some countries are procedural laws allowing the courts to order an arbitration claim to be heard in public or in private. Another important aspect that has arisen in the last period is regarding the public policy and the protection of public interest as a limitation to confidentiality of arbitration. This is a sensitive matter especially when one of the parties is a state or a state entity. This study aims to explore the principle of confidentiality in arbitration by focusing on its domain and on its limits, both from the comparative approach and from the Romanian approach. Knowing all this aspects, we will realize the importance of having professional counseling when drafting an arbitration clause and how this can be the missing puzzle piece of your business.

  17. 41 CFR 105-60.405 - Processing requests for confidential commercial information.

    Science.gov (United States)

    2010-07-01

    ... MATERIALS 60.4-Described Records § 105-60.405 Processing requests for confidential commercial information... 41 Public Contracts and Property Management 3 2010-07-01 2010-07-01 false Processing requests for confidential commercial information. 105-60.405 Section 105-60.405 Public Contracts and Property Management...

  18. Privacy and confidentiality: perspectives of mental health consumers and carers in pharmacy settings.

    Science.gov (United States)

    Hattingh, Hendrika Laetitia; Knox, Kathy; Fejzic, Jasmina; McConnell, Denise; Fowler, Jane L; Mey, Amary; Kelly, Fiona; Wheeler, Amanda J

    2015-02-01

    The study aims to explore within the community pharmacy practice context the views of mental health stakeholders on: (1) current and past experiences of privacy, confidentiality and support; and (2) expectations and needs in relation to privacy and confidentiality. In-depth interviews and focus groups were conducted in three states in Australia, namely Queensland, the northern region of New South Wales and Western Australia, between December 2011 and March 2012. There were 98 participants consisting of consumers and carers (n = 74), health professionals (n = 13) and representatives from consumer organisations (n = 11). Participants highlighted a need for improved staff awareness. Consumers indicated a desire to receive information in a way that respects their privacy and confidentiality, in an appropriate space. Areas identified that require improved protection of privacy and confidentiality during pharmacy interactions were the number of staff having access to sensitive information, workflow models causing information exposure and pharmacies' layout not facilitating private discussions. Challenges experienced by carers created feelings of isolation which could impact on care. This study explored mental health stakeholders' experiences and expectations regarding privacy and confidentiality in the Australian community pharmacy context. A need for better pharmacy staff training about the importance of privacy and confidentiality and strategies to enhance compliance with national pharmacy practice requirements was identified. Findings provided insight into privacy and confidentiality needs and will assist in the development of pharmacy staff training material to better support consumers with sensitive conditions. © 2014 Royal Pharmaceutical Society.

  19. The erosion of psychiatrist-patient confidentiality by subpoenas.

    Science.gov (United States)

    Levy, John; Galambos, Gary; Skarbek, Yvonne

    2014-08-01

    We explore the reasons for the prolific use of subpoenas to gain access to psychiatric records in Australia. We examine the applicable legal principles and practices at the New South Wales (NSW) and Commonwealth levels, aiming to develop recommendations for Australian Governments to curb the inappropriate and harmful use of subpoenas. Unfettered legal access to psychiatric records is inconsistent with professional ethical guidelines and risks undermining the provision of quality psychiatric care to the community. The existing legal provisions are failing to protect psychiatrist-patient confidentiality. In NSW, the onus is placed on the psychiatrist and/or patient to make a complicated application to the court, to direct that a subpoena be set aside on the grounds of "Professional Confidential Relationship Privilege." An absence of Commonwealth legislation to protect psychiatrist-patient confidentiality is used by some litigants in family law proceedings to disadvantage patients by stigmatising them, because they have consulted psychiatrists. We recommend that uniform legislation be implemented, giving effect to a primary rule of privilege with exceptions. © The Royal Australian and New Zealand College of Psychiatrists 2014.

  20. Improved Message Authentication and Confidentiality Checking

    International Nuclear Information System (INIS)

    Ismail Jabiullah, M.; Abdullah Al-Shamim, M.; Lutfar Rahman, M.

    2005-01-01

    The most confusing areas of the secured network communications are the message authentication and confidentiality checking. The attacks and the counter measures have become so convoluted that the users in this area begin to account for all contingencies. Two session-key generation techniques are used here to generate two separate session keys K 1 and K 2 ; and both the sender and the reveiver share these keys for higher degree of authentication and confidentiality. For this, the message is first encrypted by the key K 1 , and then the intermediary message authenticatin code (MAC) is generated by encrypting the encrypted message using the key K 2 . Then, the encrypted message and the intermediary MAC is again encrypted by using the K 2 and concatenated with the encrypted message and sent to the destination. At the receiving end, first, the received ciphertext is encrypted by using key K 2 and compared to the received MAC. The received ciphertext again is decrypted by the key K 2 and compared with the first decrypted MAC twice by the key K 2 . The plaintext is obtained by decrypting the received ciphertext first by K 2 and then by K 1 , using the corresponding decryption techniques respectively. The encryption techniques with key K 2 provides the authentication and with key K 1 provides the confidentiality checking of the transmitted message. The developed technique can be applied to both academic and commercial applications in online or offline electronic transactions for security.(authors)

  1. Access control and confidentiality in radiology

    Science.gov (United States)

    Noumeir, Rita; Chafik, Adil

    2005-04-01

    A medical record contains a large amount of data about the patient such as height, weight and blood pressure. It also contains sensitive information such as fertility, abortion, psychiatric data, sexually transmitted diseases and diagnostic results. Access to this information must be carefully controlled. Information technology has greatly improved patient care. The recent extensive deployment of digital medical images made diagnostic images promptly available to healthcare decision makers, regardless of their geographic location. Medical images are digitally archived, transferred on telecommunication networks, and visualized on computer screens. However, with the widespread use of computing and communication technologies in healthcare, the issue of data security has become increasingly important. Most of the work until now has focused on the security of data communication to ensure its integrity, authentication, confidentiality and user accountability. The mechanisms that have been proposed to achieve the security of data communication are not specific to healthcare. Data integrity can be achieved with data signature. Data authentication can be achieved with certificate exchange. Data confidentiality can be achieved with encryption. User accountability can be achieved with audits. Although these mechanisms are essential to ensure data security during its transfer on the network, access control is needed in order to ensure data confidentiality and privacy within the information system application. In this paper, we present and discuss an access control mechanism that takes into account the notion of a care process. Radiology information is categorized and a model to enforce data privacy is proposed.

  2. University Student Expectations of Confidentiality When Disclosing Information to Their Professors

    Science.gov (United States)

    Harris, Gregory E.; Dalton, Stephanie

    2014-01-01

    The purpose of this study was to explore university students' expectations of confidentiality when they make disclosures to their university professors. A secondary purpose was to consider if students have a higher expectation of confidentiality when talking with Psychology professors versus professors in other disciplines. Students were asked to…

  3. 18 CFR 270.506 - Confidentiality.

    Science.gov (United States)

    2010-04-01

    ... 18 Conservation of Power and Water Resources 1 2010-04-01 2010-04-01 false Confidentiality. 270.506 Section 270.506 Conservation of Power and Water Resources FEDERAL ENERGY REGULATORY COMMISSION...) through (9) of 5 U.S.C. 552(b). (b) Upon receipt of a request for disclosure of information treated as...

  4. Privacy and Confidentiality Practices In Adolescent Family Planning Care At Federally Qualified Health Centers.

    Science.gov (United States)

    Beeson, Tishra; Mead, Katherine H; Wood, Susan; Goldberg, Debora Goetz; Shin, Peter; Rosenbaum, Sara

    2016-03-01

    The confidentiality of family planning services remains a high priority to adolescents, but barriers to implementing confidentiality and privacy practices exist in settings designed for teenagers who are medically underserved, including federally qualified health centers (FQHCs). A sample of 423 FQHCs surveyed in 2011 provided information on their use of five selected privacy and confidentiality practices, which were examined separately and combined into an index. Regression modeling was used to assess whether various state policies and organizational characteristics were associated with FQHCs' scores on the index. In-depth case studies of six FQHCs were conducted to provide additional contextual information. Among FQHCs reporting on confidentiality, most reported providing written or verbal information regarding adolescents' rights to confidential care (81%) and limiting access to family planning and medical records to protect adolescents' confidentiality (84%). Far fewer reported maintaining separate medical records for family planning (10%), using a security block on electronic medical records to prevent disclosures (43%) or using separate contact information for communications regarding family planning services (50%). Index scores were higher among FQHCs that received Title X funding than among those that did not (coefficient, 0.70) and among FQHCs with the largest patient volumes than among those with the smallest caseloads (0.43). Case studies highlighted how a lack of guidelines and providers' confusion over relevant laws present a challenge in offering confidential care to adolescents. The organizational practices used to ensure adolescent family planning confidentiality in FQHCs are varied across organizations. Copyright © 2016 by the Guttmacher Institute.

  5. 7 CFR 900.309 - Confidential information.

    Science.gov (United States)

    2010-01-01

    ... Conduct of Referenda To Determine Producer Approval of Milk Marketing Orders To Be Made Effective Pursuant to Agricultural Marketing Agreement Act of 1937, as Amended § 900.309 Confidential information. The... Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (Marketing...

  6. 7 CFR 1216.62 - Confidential treatment.

    Science.gov (United States)

    2010-01-01

    ... this subpart or statistical data collected therefrom, which statements do not identify the information... 7 Agriculture 10 2010-01-01 2010-01-01 false Confidential treatment. 1216.62 Section 1216.62 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (MARKETING...

  7. 7 CFR 1209.62 - Confidential treatment.

    Science.gov (United States)

    2010-01-01

    ... this subpart or statistical data collected therefrom, which statements do not identify the information... 7 Agriculture 10 2010-01-01 2010-01-01 false Confidential treatment. 1209.62 Section 1209.62 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (MARKETING...

  8. 7 CFR 929.65 - Confidential information.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 8 2010-01-01 2010-01-01 false Confidential information. 929.65 Section 929.65 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (Marketing... position, financial condition, or business operations of the particular handler from whom received, shall...

  9. 7 CFR 930.73 - Confidential information.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 8 2010-01-01 2010-01-01 false Confidential information. 930.73 Section 930.73 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (Marketing... a trade secret or disclosing trade position, financial condition, or business operations of the...

  10. The quality assurance liaison: Combined technical and quality assurance support

    International Nuclear Information System (INIS)

    Bolivar, S.L.; Day, J.L.

    1993-01-01

    This paper describes the role of the quality assurance liaison, the responsibilities of this position, and the evolutionary changes in duties over the last six years. The role of the quality assurance liaison has had a very positive impact on the Los Alamos Yucca Mountain Site Characterization (YW) quality assurance program. Having both technical and quality assurance expertise, the quality assurance liaisons are able to facilitate communications with scientists on quality assurance issues and requirements, thereby generating greater productivity in scientific investigations. The quality assurance liaisons help ensure that the scientific community knows and implements existing requirements, is aware of new or changing regulations, and is able to conduct scientific work within Project requirements. The influence of the role of the quality assurance liaison can be measured by an overall improvement in attitude of the staff regarding quality assurance requirements and improved job performance, as well as a decrease in deficiencies identified during both internal and external audits and surveillances. This has resulted in a more effective implementation of quality assurance requirements

  11. 7 CFR 1150.173 - Confidential treatment.

    Science.gov (United States)

    2010-01-01

    ... reports of the number of persons subject to this subpart or statistical data collected therefrom, which... 7 Agriculture 9 2010-01-01 2009-01-01 true Confidential treatment. 1150.173 Section 1150.173 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (Marketing...

  12. 7 CFR 1221.127 - Confidential treatment.

    Science.gov (United States)

    2010-01-01

    ... statistical data collected there from, which statements do not identify the information furnished by any... 7 Agriculture 10 2010-01-01 2010-01-01 false Confidential treatment. 1221.127 Section 1221.127 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (MARKETING...

  13. 7 CFR 1160.403 - Confidential treatment.

    Science.gov (United States)

    2010-01-01

    ... statistical data collected from such sources, which statements do not identify the information furnished by... 7 Agriculture 9 2010-01-01 2009-01-01 true Confidential treatment. 1160.403 Section 1160.403 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (Marketing...

  14. 7 CFR 1250.354 - Confidential treatment.

    Science.gov (United States)

    2010-01-01

    ... subject to this subpart or statistical data collected therefrom, which statements do not identify the... 7 Agriculture 10 2010-01-01 2010-01-01 false Confidential treatment. 1250.354 Section 1250.354 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (MARKETING...

  15. 7 CFR 1260.203 - Confidential treatment.

    Science.gov (United States)

    2010-01-01

    ... of persons subject to this subpart or statistical data collected therefrom, which statements do not... 7 Agriculture 10 2010-01-01 2010-01-01 false Confidential treatment. 1260.203 Section 1260.203 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (MARKETING...

  16. 7 CFR 1218.62 - Confidential treatment.

    Science.gov (United States)

    2010-01-01

    ... of the number of persons subject to this subpart or statistical data collected therefrom, which... 7 Agriculture 10 2010-01-01 2010-01-01 false Confidential treatment. 1218.62 Section 1218.62 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (MARKETING...

  17. 7 CFR 1215.62 - Confidential treatment.

    Science.gov (United States)

    2010-01-01

    ... persons subject to this part or statistical data collected therefrom, which statements do not identify the... 7 Agriculture 10 2010-01-01 2010-01-01 false Confidential treatment. 1215.62 Section 1215.62 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (MARKETING...

  18. 7 CFR 1210.607 - Confidential information.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 10 2010-01-01 2010-01-01 false Confidential information. 1210.607 Section 1210.607 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (MARKETING... contents and all other information or reports furnished to, compiled by, or in possession of, the...

  19. 7 CFR 1210.352 - Confidential treatment.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 10 2010-01-01 2010-01-01 false Confidential treatment. 1210.352 Section 1210.352 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (MARKETING... treatment. (a) All information obtained from the books, records, or reports required to be maintained under...

  20. 7 CFR 984.79 - Confidential information.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 8 2010-01-01 2010-01-01 false Confidential information. 984.79 Section 984.79 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (Marketing... or disclosing the trade position, or financial condition or business operations of the handler shall...

  1. 7 CFR 993.71 - Confidential information.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 8 2010-01-01 2010-01-01 false Confidential information. 993.71 Section 993.71 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (Marketing... information constituting a trade secret or disclosing of the trade position, financial condition, or business...

  2. 7 CFR 932.63 - Confidential information.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 8 2010-01-01 2010-01-01 false Confidential information. 932.63 Section 932.63 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (Marketing... from such reports and records which might affect the trade position, financial condition, or business...

  3. 7 CFR 982.70 - Confidential information.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 8 2010-01-01 2010-01-01 false Confidential information. 982.70 Section 982.70 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (Marketing... trade secret or disclosing of the trade position, financial condition, or business operations of the...

  4. 48 CFR 1552.235-76 - Treatment of Confidential Business Information (APR 1996).

    Science.gov (United States)

    2010-10-01

    ... Business Information (APR 1996). 1552.235-76 Section 1552.235-76 Federal Acquisition Regulations System... Provisions and Clauses 1552.235-76 Treatment of Confidential Business Information (APR 1996). As prescribed in 1535.007-70(c), insert the following clause: Treatment of Confidential Business Information (TSCA...

  5. 48 CFR 1552.235-70 - Screening business information for claims of confidentiality.

    Science.gov (United States)

    2010-10-01

    ... 48 Federal Acquisition Regulations System 6 2010-10-01 2010-10-01 true Screening business... Texts of Provisions and Clauses 1552.235-70 Screening business information for claims of confidentiality... proprietary or confidential by the business that has the right to the information. The following clause...

  6. 7 CFR 1212.72 - Confidential treatment.

    Science.gov (United States)

    2010-01-01

    ... statements based upon the reports of the number of persons subject to this subpart or statistical data... 7 Agriculture 10 2010-01-01 2010-01-01 false Confidential treatment. 1212.72 Section 1212.72 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (MARKETING...

  7. 7 CFR 1206.62 - Confidential treatment.

    Science.gov (United States)

    2010-01-01

    ... statements based upon the reports of the number of persons subject to this subpart or statistical data... 7 Agriculture 10 2010-01-01 2010-01-01 false Confidential treatment. 1206.62 Section 1206.62 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (MARKETING...

  8. 7 CFR 1219.63 - Confidential treatment.

    Science.gov (United States)

    2010-01-01

    ... upon the reports of the number of persons subject to this subpart or statistical data collected from... 7 Agriculture 10 2010-01-01 2010-01-01 false Confidential treatment. 1219.63 Section 1219.63 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (MARKETING...

  9. 7 CFR 983.65 - Confidential information.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 8 2010-01-01 2010-01-01 false Confidential information. 983.65 Section 983.65 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (Marketing... the particular handler or their customers shall be received by, and at all times kept in the custody...

  10. 7 CFR 996.72 - Confidential information.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 8 2010-01-01 2010-01-01 false Confidential information. 996.72 Section 996.72 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (Marketing... condition, or business operations of the particular handlers or their customers shall be received by, and at...

  11. Methods of Software Quality Assurance under a Nuclear Quality Assurance Program

    International Nuclear Information System (INIS)

    Kim, Jang Yeol; Lee, Young Jun; Cha, Kyung Ho; Cheon, Se Woo; Lee, Jang Soo; Kwon, Kee Choon

    2005-01-01

    This paper addresses a substantial implementation of a software quality assurance under a nuclear quality assurance program. The relationship of the responsibility between a top-level nuclear quality assurance program such as ASME/NQA-1 and its lower level software quality assurance is described. Software quality assurance activities and software quality assurance procedures during the software development life cycle are also described

  12. Doctor-patient confidentiality - right and duty of a doctor in law regulations

    Directory of Open Access Journals (Sweden)

    Janusz Jaroszyński

    2018-03-01

    Full Text Available Physician’s professional secrecy is one of the most important duties of a doctor and should be provided with confidentiality regarding his or her health. Generally speaking, there is no legal definition of "physician’s professional secrecy" in Poland, although this concept already appears in the oath of Hippocrates: ‘I will keep secret anything I see or hear professionally which ought not to be told’. The issue of medical confidentiality (physician’s professional secrecy has been regulated in several legal acts such as: The Patient Rights and Patients Ombudsman Act, The Constitution of the Republic of Poland, The Medical Profession Act, The Civil Code Act, The Criminal Code Act and Code of Medical Ethics which is not considered as a legal act. The patient has the right to require confidentiality of the information concerning him and the obligation to keep medical confidentiality will apply to every representative of the medical profession, who obtained certain information by various professional activities.

  13. Confidential Declaration of Family Situation (CDFS)

    CERN Document Server

    Human Resources Department

    2005-01-01

    The Confidential Declaration of Family Situation (CDFS) becomes a new computerized EDH form from October 2005 In accordance with Article R IV 1.17 of the Staff Regulations, Staff Members and Fellows, married or separated, must notify any changes in their spouse's income or health insurance cover in writing to CERN, within 30 calendar days of the change. This is necessary for the Organization to determine if a supplementary contribution is payable to the CERN Health Insurance Scheme (CHIS) for the spouse's coverage and, if so, the amount. Until now a paper form called « Confidential Declaration of Family Situation » (CDFS) was used for that purpose.  From early October 2005 the CDFS will be computerized for the whole Organization. Henceforth, any changes in a spouse's income or health insurance cover must be notified using EDH (Electronic Document Handling). Additionally, annual updates of the declaration will be required and will be requested by automatic e-mail. Early October an email will be sent to...

  14. 48 CFR 1552.235-73 - Access to Federal Insecticide, Fungicide, and Rodenticide Act Confidential Business Information...

    Science.gov (United States)

    2010-10-01

    ... Insecticide, Fungicide, and Rodenticide Act Confidential Business Information (APR 1996). 1552.235-73 Section... Insecticide, Fungicide, and Rodenticide Act Confidential Business Information (APR 1996). As prescribed in... Act Confidential Business Information (APR 1996) In order to perform duties under the contract, the...

  15. 77 FR 63537 - Greenhouse Gas Reporting Program: Proposed Amendments and Confidentiality Determinations for...

    Science.gov (United States)

    2012-10-16

    ... Greenhouse Gas Reporting Program: Proposed Amendments and Confidentiality Determinations for Subpart I...-AR61 Greenhouse Gas Reporting Program: Proposed Amendments and Confidentiality Determinations for... Manufacturing, of the Greenhouse Gas Reporting Rule. Proposed changes include revising certain calculation...

  16. Paternalistic breaches of confidentiality in prison: mental health professionals' attitudes and justifications.

    Science.gov (United States)

    Elger, Bernice Simone; Handtke, Violet; Wangmo, Tenzin

    2015-06-01

    This manuscript presents mental health practitioners' (MHPs) practice, attitudes and justifications for breaching confidentiality when imprisoned patients disclose suicidal thoughts or abuse by others. 24 MHPs working in Swiss prisons shared their experiences regarding confidentiality practices. The data were analysed qualitatively and MHPs' attitudes and course of action were identified. Analysis revealed paternalistic breaches of confidentiality. When patients reported suicidal thoughts and abuse, MHPs believed that forgoing confidentiality is necessary to protect patients, providing several justifications for it. Patients were informed that such information will be transmitted without their consent to medical and non-medical prison personnel. With reference to suicidal attempts, MHPs resorted to methods that may reduce suicidal attempts such as transfer to hospital or internal changes in living arrangements, which would require provision of certain information to prison guards. In cases of abuse, some MHPs convinced patients to accept intervention or sometimes overrode competent patients' refusals to report. Also in the case of abuse, provision of limited information to other prison personnel was seen as an acceptable method to protect patients from further harm. Breaches of confidentiality, whether limited or full, remain unethical, when used for competent patients based solely on paternalistic justifications. Institutionalising ethical and legal procedures to address suicidal and abuse situations would be helpful. Education and training to help both medical and prison personnel to respond to such situations in an appropriate manner that ensures confidentiality and protects patients from suicide and abuse are necessary. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://group.bmj.com/group/rights-licensing/permissions.

  17. 48 CFR 1552.235-75 - Access to Toxic Substances Control Act Confidential Business Information (APR 1996).

    Science.gov (United States)

    2010-10-01

    ... Control Act Confidential Business Information (APR 1996). 1552.235-75 Section 1552.235-75 Federal... Confidential Business Information (APR 1996). As prescribed in 1535.007(b), insert the following provision: Access to Toxic Substances Control Act Confidential Business Information (APR 1996) In order to perform...

  18. 30 CFR 210.40 - Will MMS keep the information I provide confidential?

    Science.gov (United States)

    2010-07-01

    ... 30 Mineral Resources 2 2010-07-01 2010-07-01 false Will MMS keep the information I provide... MINERALS REVENUE MANAGEMENT FORMS AND REPORTS General Provisions § 210.40 Will MMS keep the information I provide confidential? The MMS will treat information obtained under this part as confidential to the...

  19. Confidential data in a competitive utility environment: A regulatory perspective

    Energy Technology Data Exchange (ETDEWEB)

    Vine, E.

    1996-08-01

    Historically, the electric utility industry has been regarded as one of the most open industries in the United States in sharing information but their reputation is being challenged by competitive energy providers, the general public, regulators, and other stakeholders. As the prospect of competition among electricity power providers has increased in recent years, many utilities have been requesting that the data they submit to their utility regulatory commissions remain confidential. Withholding utility information from the public is likely to have serious and significant policy implications with respect to: (1) consumer education, the pursuit of truth, mutual respect among parties, and social cooperation; (2) the creation of a fair market for competitive energy services; (3) the regulatory balance; (4) regional and national assessments of energy-savings opportunities; (5) research and development; and (6) evaluations of utility programs, plans, and policies. In a telephone survey of all public utility commissions (PUCs) that regulate electric and gas utilities in the U.S., we found that almost all PUCs have received requests from utility companies for data to be filed as confidential, and confidential data filings appear to have increased (both in scope and in frequency) in those states where utility restructuring is being actively discussed. The most common types of data submitted as confidential by utilities dealt with specific customer data, market data, avoided costs, and utility costs.

  20. Critical Thinking Skills of Students through Mathematics Learning with ASSURE Model Assisted by Software Autograph

    Science.gov (United States)

    Kristianti, Y.; Prabawanto, S.; Suhendra, S.

    2017-09-01

    This study aims to examine the ability of critical thinking and students who attain learning mathematics with learning model ASSURE assisted Autograph software. The design of this study was experimental group with pre-test and post-test control group. The experimental group obtained a mathematics learning with ASSURE-assisted model Autograph software and the control group acquired the mathematics learning with the conventional model. The data are obtained from the research results through critical thinking skills tests. This research was conducted at junior high school level with research population in one of junior high school student in Subang Regency of Lesson Year 2016/2017 and research sample of class VIII student in one of junior high school in Subang Regency for 2 classes. Analysis of research data is administered quantitatively. Quantitative data analysis was performed on the normalized gain level between the two sample groups using a one-way anova test. The results show that mathematics learning with ASSURE assisted model Autograph software can improve the critical thinking ability of junior high school students. Mathematical learning using ASSURE-assisted model Autograph software is significantly better in improving the critical thinking skills of junior high school students compared with conventional models.

  1. Security without obscurity a guide to confidentiality, authentication, and integrity

    CERN Document Server

    Stapleton, JJ

    2014-01-01

    The traditional view of information security includes the three cornerstones: confidentiality, integrity, and availability; however the author asserts authentication is the third keystone. As the field continues to grow in complexity, novices and professionals need a reliable reference that clearly outlines the essentials. Security without Obscurity: A Guide to Confidentiality, Authentication, and Integrity fills this need. Rather than focusing on compliance or policies and procedures, this book takes a top-down approach. It shares the author's knowledge, insights, and observations about infor

  2. Attitude of Lithuanian residents to confidentiality of adolescent sexual and reproductive health care

    DEFF Research Database (Denmark)

    Jaruseviciene, Lina; Lazarus, Jeff; Zaborskis, Apolinaras

    2011-01-01

    To assess the attitudes of Lithuanian residents towards the protection of confidentiality in the sexual and reproductive health care of adolescents.......To assess the attitudes of Lithuanian residents towards the protection of confidentiality in the sexual and reproductive health care of adolescents....

  3. 17 CFR 200.83 - Confidential treatment procedures under the Freedom of Information Act.

    Science.gov (United States)

    2010-04-01

    ... SECURITIES AND EXCHANGE COMMISSION ORGANIZATION; CONDUCT AND ETHICS; AND INFORMATION AND REQUESTS Information... first received by the Commission (i) it is supplied segregated from information for which confidential..., 100 F Street, NE., Washington, DC 20549. The person requesting confidential treatment may supply...

  4. Confidentiality, anonymity and amnesty for midwives in distress seeking online support - Ethical?

    Science.gov (United States)

    Pezaro, Sally; Clyne, Wendy; Gerada, Clare

    2018-06-01

    Midwife health is intrinsically linked to the quality of safe patient care. To ensure safe patient care, there is a need to deliver emotional support to midwives. One option that midwives may turn to may be a confidential online intervention, instead of localised, face-to-face support. Following the Realist And MEta-narrative Evidence Syntheses: Evolving Standards publication standards, this realist synthesis approach explores the ethical considerations in permitting confidentiality, anonymity and amnesty in online interventions to support midwives in work-related psychological distress. An iterative search methodology was used to select nine papers for review. To assimilate information, papers were examined for ideas relating to ethical dimensions of online interventions to support midwives in work-related psychological distress. This review takes a narrative approach. Online interventions can support the development of insight, help seeking and open discussion. Additionally, Internet support groups can become morally persuasive in nature. Anonymity and confidentiality are both effective and therapeutic features of online interventions when used in collaboration with effective online moderation. Yet, ethical dilemmas remain where users cannot be identified. Confidentiality and anonymity remain key components of successful online interventions. However, sanctioning the corollary component of amnesty may provoke moral discomfort for those seeking immediate accountability. For others, amnesty is seen as essential for open disclosure and help seeking. Ultimately, the needs of midwives must be balanced with the requirement to protect the public and the professional reputation of midwifery. In supporting midwives online, the principles of anonymity, confidentiality and amnesty may evoke some resistance on ethical grounds. However, without offering identity protection, it may not be possible to create effective online support services for midwives. The authors of this

  5. Attitudes toward medical and genetic confidentiality in the Saudi research biobank: An exploratory survey.

    Science.gov (United States)

    Alahmad, Ghiath; Hifnawy, Tamer; Abbasi, Badaruddin; Dierickx, Kris

    2016-03-01

    Achieving a balance between giving access to information and respecting donors' confidentiality is a crucial issue for any biobank, with its large number of samples and associated information. Despite the existence of much empirical literature on confidentiality, there are too few surveys in the Middle East about the topic, particularly in the Saudi context. A survey was conducted of 200 respondents at King Abdulaziz Medical City in Riyadh, Saudi Arabia, among 5 groups of equal size, comprised of researchers, physicians, medical students, donors and laypersons, respectively. The majority of participants agreed that confidentiality is an important issue and that it is well protected in the Saudi biobank. All 5 groups showed different attitudes toward disclosing information to various third parties. They were in favor of allowing treating physicians, and to a certain extent family members, to have access to medical and genetic results from research. No significant differences were found between views on medical and genetic confidentiality. The majority of respondents agreed that confidentiality might be breached in cases with specific justified reasons. Even considering differences in religion, culture and other factors, the results of the study were consistent with those reported in the literature and research conducted in other countries. We therefore place emphasis on the importance of protecting and promoting patient/donor confidentiality and privacy. Copyright © 2016. Published by Elsevier Ireland Ltd.

  6. METHODS FOR ASSESSING SECURITY THREATS CONFIDENTIAL INFORMATION FOR THE INFORMATION AND TELECOMMUNICATIONS SYSTEMS

    Directory of Open Access Journals (Sweden)

    E. V. Belokurova

    2015-01-01

    Full Text Available The article discusses the different approaches to assessing the safety of confidential information-term for information and telecommunication systems of various pre-appreciable destination in the presence of internal and external threats to its integrity and availability. The difficulty of ensuring the security of confidential information from exposure to information and telecommunication systems of external and internal threats at the present time, is of particular relevance. This problem is confirmed by the analysis of available statistical information on the impact of threats on the security circulating in the information and telecommunications system. Leak confidential information, intellectual property, information, know-how is the result of significant material and moral damage caused to the owner of the restricted information. The paper presents the structure of the indicators and criteria shows that the most promising are analytical criteria. However, their use to assess the level of security of confidential information is difficult due to the lack of appropriate mathematical models. The complexity of the problem is that existing traditional mathematical models are not always appropriate for the stated objectives. Therefore, it is necessary to develop mathematical models designed to assess the security of confidential information and its impact on information and telecommunication system threats.

  7. Novel approach to information security management of confidential ...

    African Journals Online (AJOL)

    Novel approach to information security management of confidential and propriety information ... Journal of Fundamental and Applied Sciences ... valuable information by using steganography it can have a major impact security management.

  8. Reducing the risk of failure: Software Quality assurance standards and methods

    International Nuclear Information System (INIS)

    Elphick, J.; Cope, H.

    1992-01-01

    An effective Software Quality Assurance (SQA) program provides an overall approach to software engineering and the establishment of proven methods for the production of reliable software. And, in the authors experience, the overall costs for the software life are diminished with the application of quality methods. In their experience, the issues for implementing quality standards and practices are many. This paper addresses those issues as well as the lessons learned from developing and implementing a number of software quality assurance programs. Their experience includes the development and implementation of their own NRC accepted SQA program and an SQA program for an engineering software developer, as well as developing SQA procedures, standards, and methods for utilities, medical and commercial clients. Some of the issues addressed in this paper are: setting goals and defining quality; applying the software life cycle; addressing organizational issues; providing flexibility and increasing productivity; producing effective documentation; maintaining quality records; Imposing software configuration management; conducting reviews, audits, and controls; verification and validation; and controlling software procurement

  9. Quality Assurance - Construction

    DEFF Research Database (Denmark)

    Gaarslev, Axel

    1996-01-01

    Gives contains three main chapters:1. Quality Assurance initiated by external demands2. Quality Assurance initiated by internal company goals3. Innovation strategies......Gives contains three main chapters:1. Quality Assurance initiated by external demands2. Quality Assurance initiated by internal company goals3. Innovation strategies...

  10. Analysis of the ethical aspects of professional confidentiality in dental practice

    Directory of Open Access Journals (Sweden)

    Cléa Adas Saliba Garbin

    2008-02-01

    Full Text Available From the point of view of deontological ethics, privacy is a moral right that patients are entitled to and it is bound to professional confidentiality. Otherwise, the information given by patients to health professionals would not be reliable and a trustable relationship could not be established. The aim of the present study was to assess, by means of questionnaires with open and closed questions, the awareness and attitudes of 100 dentists working in the city of Andradina, São Paulo State, Brazil, with respect to professional confidentiality in dental practice. Most dentists (91.43% reported to have instructed their assistants on professional confidentiality. However, 44.29% of the interviewees showed to act contradictorily as reported talking about the clinical cases of their patients to their friends or spouses. The great majority of professionals (98.57% believed that it is important to have classes on Ethics and Bioethics during graduation and, when asked about their knowledge of the penalties imposed for breach of professional confidentiality, only 48.57% of them declared to be aware of it. Only 28.57% of the interviewees affirmed to have exclusive access to the files; 67.14% reported that that files were also accessed by their secretary; 1.43% answered that their spouses also had access, and 2.86% did not answer. From the results of the present survey, it could be observed that, although dentists affirmed to be aware of professional confidentiality, their attitudes did not adhere to ethical and legal requirements. This stand of health professionals has contributed to violate professional ethics and the law itself, bringing problems both to the professional and to the patient.

  11. Analysis of the ethical aspects of professional confidentiality in dental practice.

    Science.gov (United States)

    Garbin, Cléa Adas Saliba; Garbin, Artênio José Isper; Saliba, Nemre Adas; de Lima, Daniela Coelho; de Macedo, Ana Paula Ayala

    2008-01-01

    From the point of view of deontological ethics, privacy is a moral right that patients are entitled to and it is bound to professional confidentiality. Otherwise, the information given by patients to health professionals would not be reliable and a trustable relationship could not be established. The aim of the present study was to assess, by means of questionnaires with open and closed questions, the awareness and attitudes of 100 dentists working in the city of Andradina, São Paulo State, Brazil, with respect to professional confidentiality in dental practice. Most dentists (91.43%) reported to have instructed their assistants on professional confidentiality. However, 44.29% of the interviewees showed to act contradictorily as reported talking about the clinical cases of their patients to their friends or spouses. The great majority of professionals (98.57%) believed that it is important to have classes on Ethics and Bioethics during graduation and, when asked about their knowledge of the penalties imposed for breach of professional confidentiality, only 48.57% of them declared to be aware of it. Only 28.57% of the interviewees affirmed to have exclusive access to the files; 67.14% reported that that files were also accessed by their secretary; 1.43% answered that their spouses also had access, and 2.86% did not answer. From the results of the present survey, it could be observed that, although dentists affirmed to be aware of professional confidentiality, their attitudes did not adhere to ethical and legal requirements. This stand of health professionals has contributed to violate professional ethics and the law itself, bringing problems both to the professional and to the patient.

  12. 38 CFR 1.462 - Confidentiality restrictions.

    Science.gov (United States)

    2010-07-01

    ... Sickle Cell Anemia § 1.462 Confidentiality restrictions. (a) General. The patient records to which §§ 1..., infection with the HIV, or sickle cell anemia may be acknowledged only if the patient's written consent is... with the HIV, or sickle cell anemia. (2) Any answer to a request for a disclosure of patient records...

  13. Software quality assurance in the 1996 performance assessment for the Waste Isolation Pilot Plant

    International Nuclear Information System (INIS)

    Froehlich, G.K.; Ogden, H.C.; Byle, K.A.

    2000-01-01

    The US Department of Energy (DOE) Waste Isolation Pilot Plant (WIPP), located in southeast New Mexico, is a deep geologic repository for the permanent disposal of transuranic waste generated by DOE defense-related activities. Sandia National Laboratories (SNL), in its role as scientific advisor to the DOE, is responsible for evaluating the long-term performance of the WIPP. This risk-based Performance Assessment (PA) is accomplished in part through the use of numerous scientific modeling codes, which rely for some of their inputs on data gathered during characterization of the site. The PA is subject to formal requirements set forth in federal regulations. In particular, the components of the calculation fall under the configuration management and software quality assurance aegis of the American Society of Mechanical Engineers (ASME) Nuclear Quality Assurance (NQA) requirements. This paper describes SNL's implementation of the NQA requirements regarding software quality assurance (SQA). The description of the implementation of SQA for a PA calculation addresses not only the interpretation of the NQA requirements, it also discusses roles, deliverables, and the resources necessary for effective implementation. Finally, examples are given which illustrate the effectiveness of SNL's SQA program, followed by a detailed discussion of lessons learned

  14. Software quality assurance in the 1996 performance assessment for the Waste Isolation Pilot Plant

    International Nuclear Information System (INIS)

    Froehlich, Gary K.; Ogden, Harvey C.; Byle, Kathleen A.

    2000-01-01

    The US Department of Energy (DOE) Waste Isolation Pilot Plant (WIPP), located in southeast New Mexico, is a deep geologic repository for the permanent disposal of transuranic waste generated by DOE defense-related activities. Sandia National Laboratories (SNL), in its role as scientific advisor to the DOE, is responsible for evaluating the long-term performance of the WIPP. This risk-based Performance Assessment (PA) is accomplished in part through the use of numerous scientific modeling codes, which rely for some of their inputs on data gathered during characterization of the site. The PA is subject to formal requirements set forth in federal regulations. In particular, the components of the calculation fall under the configuration management and software quality assurance aegis of the American Society of Mechanical Engineers(ASME) Nuclear Quality Assurance (NQA) requirements. This paper describes SNL's implementation of the NQA requirements regarding software quality assurance (SQA). The description of the implementation of SQA for a PA calculation addresses not only the interpretation of the NQA requirements, it also discusses roles, deliverables, and the resources necessary for effective implementation. Finally, examples are given which illustrate the effectiveness of SNL's SQA program, followed by a detailed discussion of lessons learned

  15. 42 CFR 2.1 - Statutory authority for confidentiality of drug abuse patient records.

    Science.gov (United States)

    2010-10-01

    ... HUMAN SERVICES GENERAL PROVISIONS CONFIDENTIALITY OF ALCOHOL AND DRUG ABUSE PATIENT RECORDS Introduction § 2.1 Statutory authority for confidentiality of drug abuse patient records. The restrictions of these regulations upon the disclosure and use of drug abuse patient records were initially authorized by section 408...

  16. Having Confidence in Therapeutic Work with Young People: Constraints and Challenges to Confidentiality

    Science.gov (United States)

    Jenkins, Peter

    2010-01-01

    Confidentiality presents particular challenges to practitioners working with young people, on account of the latter's vulnerability and emotional immaturity. Ethical codes place a key importance on confidentiality, from deontological and teleological perspectives. However, young clients may rely on a more pragmatic approach in deciding whether to…

  17. Ombuds’ corner: Open door and confidentiality

    CERN Multimedia

    Vincent Vuillemin

    2013-01-01

    For the Open Days, CERN will be transparent for all visitors. It's also the occasion to remember that the Ombuds' door is fully open every day of the year for all persons working for or on behalf of CERN.   The door is open, but as soon as it's closed for a discussion, the office becomes a place where total confidentiality is preserved. This may appear as a contradiction, no? The Ombuds is available to help everyone in all circumstances, but his clause of confidentiality prevents him from acting without the consent of his “visitors”. How can he possibly resolve the in-house conflicts in groups, or units, if all the parties do not voluntarily participate in its resolution? The answer is clear: the job of the Ombuds is to help the parties resolve their conflict by themselves. He will provide a few rules of communication, a process of mutual respect, suggest some possibilities that the parties may want to follow, and mediate the dispute so that people...

  18. Confidential Declaration of Family Situation (CDFS)

    CERN Multimedia

    Human Resources Department

    2005-01-01

    The Confidential Declaration of Family Situation (CDFS) becomes a new computerized EDH form from October 2005 In accordance with Article R IV 1.17 of the Staff Regulations, Staff Members and Fellows, married or separated, must notify any changes in their spouse's income or health insurance cover in writing to CERN, within 30 calendar days of the change. This is necessary for the Organization to determine if a supplementary contribution is payable to the CERN Health Insurance Scheme (CHIS) for the spouse's coverage and, if so, the amount. Until now a paper form called « Confidential Declaration of Family Situation » (CDFS) was used for that purpose.  From early October 2005 the CDFS will be computerized for the whole Organization. Henceforth, any changes in a spouse's income or health insurance cover must be notified using EDH (Electronic Document Handling). Additionally, annual updates of the declaration will be required and will be requested by automatic e-mail. Early October an email will be...

  19. Confidentiality, 'no blame culture' and whistleblowing, non-physician practice and accountability.

    Science.gov (United States)

    White, Stuart M

    2006-12-01

    Confidentiality is a core tenet of medical professionalism, which enables the maintenance of trust in a doctor-patient relationship. However, both the amount of personal data stored and the number of third parties who might access this data have increased dramatically in the digital age, necessitating the introduction of various national data protection acts. Paradoxically, the Freedom of Information Act 2000 allows United Kingdom citizens to access information held by public bodies, including hospitals. Furthermore, the Public Interest Disclosure Act 1998 actively protects physicians who breach their duty of confidentiality in the name of public interest ('whistleblowing'). This article explores the evolution of the law and ethics in this area, and draws attention to the difficulties in balancing confidentiality against freedom of information. In addition, the role and responsibilities of the non-physician anaesthetist are examined.

  20. Confidentiality and parental involvement in adolescent sexual and reproductive health care

    DEFF Research Database (Denmark)

    Jaruseviciene, Lina; Lazarus, Jeff; Zaborskis, Apolinaras

    2011-01-01

    AIM: We surveyed Lithuanian general practitioners' (GPs) views on the importance of confidentiality for adolescents and on their practices in informing parents about sexual and reproductive health consultations with this age group. METHODS: In this cross-sectional study, a 41-item questionnaire...... was sent to a random sample of 607 Lithuanian GPs. The purpose of this questionnaire was to gain knowledge about current practices of GPs in informing parents on the importance of confidentiality as well as in protecting the privacy of minors. GPs' knowledge of the current legal age limit...... consulting on general sexual issues, more than 70% stated that they would guarantee their minor patients confidentiality. However, when cases involved sexually transmitted infections or pregnancy, nearly the same percentage said they would inform the parents. 62.3% of GPs incorrectly believed that the law...

  1. [Confidentiality in medical oaths: (When the white crow becomes gray...)].

    Science.gov (United States)

    Gelpi, R J; Pérez, M L; Rancich, A M; Mainetti, J A

    2000-01-01

    Confidentiality, together with the ethical principles of beneficence and non-maleficence, is the most important rule in Medical Oaths at the present time. However, the scientific-technical advances in medicine have made this rule one of the most controversial ones because of its exceptions. In consequence, the aim of the present paper is to comparatively analyze the rule of confidentiality in Medical Oaths of different places, times, origins and in different versions of the Hippocratic Oath in order to determine what should be kept a secret and with what degree of commitment (absolute or "prima facie"). Of the thirty six analyzed Oaths, twenty-seven manifest this rule and nine do not. No relation was found between the manifestation of this rule and the place, time, origin and different versions of the Hippocratic Oath. Most pledges suggest not to reveal what has been seen or heard during the medical act, the same as in the Hippocratic Oath. Seven texts point out that confidentiality should be absolute and four give exceptions in connection with beneficence and justice principles and the moral duty of causing no damage to third parties. Two pledges specify protection of privacy. In conclusion, today confidentiality is considered to be a moral duty for the benefit of the patient and out of consideration for his autonomy; however, at the present time in medicine the duty of keeping absolute secrecy is being reconsidered.

  2. Creating Quality Assurance and International Transparency for Quality Assurance Agencies

    DEFF Research Database (Denmark)

    Kristoffersen, Dorte; Lindeberg, Tobias

    2004-01-01

    , on the one hand, to advance internationalisation of quality assurance of higher education, and on the other hand, allow for the differences in the national approaches to quality assurance. The paper will focus on two issues: first, the strength and weaknesses of the method employed and of the use of the ENQA......The paper presents the experiences gained in the pilot project on mutual recognition conducted by the quality assurance agencies in the Nordic countries and the future perspective for international quality assurance of national quality assurance agencies. The background of the project was the need...

  3. 77 FR 1434 - Proposed Confidentiality Determinations for Data Elements Under the Mandatory Reporting of...

    Science.gov (United States)

    2012-01-10

    ... Fluorinated Gas Production....... 325120 Industrial gases manufacturing facilities. Electrical Equipment Use... Proposed Confidentiality Determinations for Data Elements Under the Mandatory Reporting of Greenhouse Gases...-proposes confidentiality determinations for the data elements under the Mandatory Greenhouse Gas Reporting...

  4. 7 CFR 983.9 - Confidential data or information.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 8 2010-01-01 2010-01-01 false Confidential data or information. 983.9 Section 983.9 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (Marketing... customers. ...

  5. NASA Astronauts on Soyuz: Experience and Lessons for the Future

    Science.gov (United States)

    2010-01-01

    The U. S., Russia, and, China have each addressed the question of human-rating spacecraft. NASA's operational experience with human-rating primarily resides with Mercury, Gemini, Apollo, Space Shuttle, and International Space Station. NASA s latest developmental experience includes Constellation, X38, X33, and the Orbital Space Plane. If domestic commercial crew vehicles are used to transport astronauts to and from space, Soyuz is another example of methods that could be used to human-rate a spacecraft and to work with commercial spacecraft providers. For Soyuz, NASA's normal assurance practices were adapted. Building on NASA's Soyuz experience, this report contends all past, present, and future vehicles rely on a range of methods and techniques for human-rating assurance, the components of which include: requirements, conceptual development, prototype evaluations, configuration management, formal development reviews (safety, design, operations), component/system ground-testing, integrated flight tests, independent assessments, and launch readiness reviews. When constraints (cost, schedule, international) limit the depth/breadth of one or more preferred assurance means, ways are found to bolster the remaining areas. This report provides information exemplifying the above safety assurance model for consideration with commercial or foreign-government-designed spacecraft. Topics addressed include: U.S./Soviet-Russian government/agency agreements and engineering/safety assessments performed with lessons learned in historic U.S./Russian joint space ventures

  6. 18 CFR 706.410 - Confidentiality of statements.

    Science.gov (United States)

    2010-04-01

    ... use of information on the statements shall be limited to that necessary to carry out the purposes of... EMPLOYEE RESPONSIBILITIES AND CONDUCT Statements of Employment and Financial Interests § 706.410 Confidentiality of statements. Each statement of employment and financial interests, and each supplementary...

  7. Zerber: r-Confidential Indexing for Distributed Documents

    NARCIS (Netherlands)

    Zerr, Sergej; Demidova, Elena; Olmedilla, Daniel; Nejdl, Wolfgang; Winslett, Marianne; Mitra, Soumyadeb

    2008-01-01

    Zerr, S., Demidova, E., Olmedilla, D., Nejdl, W., Winslett, M., & Mitra, S. (2008). Zerber: r-Confidential Indexing for Distributed Documents. In J. Teubner (Eds.), Proceedings of the 11th International Conference on Extending Database Technology (pp. 287-298). March, 25-29, 2008, Nantes, France.

  8. 19 CFR 210.72 - Confidentiality of information.

    Science.gov (United States)

    2010-04-01

    ... 19 Customs Duties 3 2010-04-01 2010-04-01 false Confidentiality of information. 210.72 Section 210.72 Customs Duties UNITED STATES INTERNATIONAL TRADE COMMISSION INVESTIGATIONS OF UNFAIR PRACTICES IN IMPORT TRADE ADJUDICATION AND ENFORCEMENT Enforcement Procedures and Advisory Opinions § 210.72...

  9. ML Confidential : machine learning on encrypted data

    NARCIS (Netherlands)

    Graepel, T.; Lauter, K.; Naehrig, M.

    2012-01-01

    We demonstrate that by using a recently proposed somewhat homomorphic encryption (SHE) scheme it is possible to delegate the execution of a machine learning (ML) algorithm to a compute service while retaining confidentiality of the training and test data. Since the computational complexity of the

  10. Ethics in health care: confidentiality and information technologies

    African Journals Online (AJOL)

    information could result in confidential patient data falling ... Before the advent of the new communication and information technologies (NCITs), patient care was sometimes delayed .... computer system intended to be used and the security.

  11. 78 FR 16298 - Comment Request for Information Collection: Confidentiality and Disclosure of State Unemployment...

    Science.gov (United States)

    2013-03-14

    ... Collection: Confidentiality and Disclosure of State Unemployment Compensation Information Final Rule and... about the regulatory requirements of the Confidentiality and Disclosure of State Unemployment... Administration, Office of Unemployment Insurance, 200 Constitution Avenue NW., Room S4524, Washington, DC 20210...

  12. Quality assurance

    International Nuclear Information System (INIS)

    1996-01-01

    The main efforts of Nuclear Regulatory Authority of the Slovak Republic (NRA SR) was focused on support of quality assurance programmes development at responsible organizations Bohunice V-1 and V-v and Mochovce NPPs and their inspection. Development of the level two documentation of a partial quality assurance programme for NPP operation continued at Mochovce NPP. Most of documentation has been submitted to NRA SR for comments and approval. NRA SR invited a mission of French experts to Mochovce NPP to review preparation and performance of internal audits that would be beneficial for improvement in this kind activities at the NPP. Bohunice NPP continued in development of a partial quality assurance programme for operation. The Quality Assurance Programme submitted to NRA SR for approval. Based on a request of Bohunice NPPs, NRA SR consulted the draft quality assurance programme developed by Siemens for stage of the 'Basic Design' of V-1 NPP upgrading. The programme had not been submitted for approval to NRA SR prior to completion of works by Siemens. Based on an internal audit that had been performed, corrective measures were proposed to meet requirements on review and approval of suppliers quality assurance programmes. Requirements related to the quality assurance at nuclear installations were prepared to be incorporated into principles of a act on peaceful use of nuclear power in Slovak Republic

  13. 77 FR 48072 - Final Confidentiality Determinations for Regulations Under the Mandatory Reporting of Greenhouse...

    Science.gov (United States)

    2012-08-13

    ... Final Confidentiality Determinations for Regulations Under the Mandatory Reporting of Greenhouse Gases... confidentiality determinations for certain data elements in regulations under the Mandatory Greenhouse Gas... Greenhouse Gas Reporting Program Web site at http://www.epa.gov/climatechange/emissions/ghgrulemaking.html...

  14. High assurance SPIRAL

    Science.gov (United States)

    Franchetti, Franz; Sandryhaila, Aliaksei; Johnson, Jeremy R.

    2014-06-01

    In this paper we introduce High Assurance SPIRAL to solve the last mile problem for the synthesis of high assurance implementations of controllers for vehicular systems that are executed in today's and future embedded and high performance embedded system processors. High Assurance SPIRAL is a scalable methodology to translate a high level specification of a high assurance controller into a highly resource-efficient, platform-adapted, verified control software implementation for a given platform in a language like C or C++. High Assurance SPIRAL proves that the implementation is equivalent to the specification written in the control engineer's domain language. Our approach scales to problems involving floating-point calculations and provides highly optimized synthesized code. It is possible to estimate the available headroom to enable assurance/performance trade-offs under real-time constraints, and enables the synthesis of multiple implementation variants to make attacks harder. At the core of High Assurance SPIRAL is the Hybrid Control Operator Language (HCOL) that leverages advanced mathematical constructs expressing the controller specification to provide high quality translation capabilities. Combined with a verified/certified compiler, High Assurance SPIRAL provides a comprehensive complete solution to the efficient synthesis of verifiable high assurance controllers. We demonstrate High Assurance SPIRALs capability by co-synthesizing proofs and implementations for attack detection and sensor spoofing algorithms and deploy the code as ROS nodes on the Landshark unmanned ground vehicle and on a Synthetic Car in a real-time simulator.

  15. Confidentiality of Accounting Academics: Consequences of Nonconformity

    Science.gov (United States)

    Amponsah, Emmanuel B.; Boateng, Peter Agyekum; Onuoha, Luke N.

    2016-01-01

    This paper examined ways by which nonconformity to confidentiality among accounting academics could lead to increased-recruitment-and-legal-costs to their employing universities in Ghana that offered accounting degree programmes. With a cross-sectional design, data collected from 1,225 accountants analysed via Cronbach's alpha,…

  16. Creating Quality Assurance and International Transparency for Quality Assurance Agencies

    DEFF Research Database (Denmark)

    Kristoffersen, Dorte; Lindeberg, Tobias

    2004-01-01

    The paper presents the experiences gained in the pilot project on mutual recognition conducted by the quality assurance agencies in the Nordic countries and the future perspective for international quality assurance of national quality assurance agencies. The background of the project was the nee...

  17. 16 CFR 312.8 - Confidentiality, security, and integrity of personal information collected from children.

    Science.gov (United States)

    2010-01-01

    ... 16 Commercial Practices 1 2010-01-01 2010-01-01 false Confidentiality, security, and integrity of... COMMISSION REGULATIONS UNDER SPECIFIC ACTS OF CONGRESS CHILDREN'S ONLINE PRIVACY PROTECTION RULE § 312.8 Confidentiality, security, and integrity of personal information collected from children. The operator must...

  18. 15 CFR Supplement No. 1 to Part 718 - Confidential Business Information Declared or Reported *

    Science.gov (United States)

    2010-01-01

    ... 15 Commerce and Foreign Trade 2 2010-01-01 2010-01-01 false Confidential Business Information... Commerce and Foreign Trade (Continued) BUREAU OF INDUSTRY AND SECURITY, DEPARTMENT OF COMMERCE CHEMICAL WEAPONS CONVENTION REGULATIONS CONFIDENTIAL BUSINESS INFORMATION Pt. 718, Supp. 1 Supplement No. 1 to Part...

  19. Rekonstruksi Pengaturan Confidential Principle bagi Komunikasi pada Mediasi Sengketa Perdata di Indonesia: Studi Perbandingan dengan Praktik di Amerika Serikat

    Directory of Open Access Journals (Sweden)

    I Gusti Ngurah Parikesit

    2016-04-01

    Full Text Available Peran mediasi sebagai penyelesaian sengketa alternatif untuk sengketa perdata yang semakin populer digunakan pada praktiknya belum berjalan maksimal. Salah satu penyebabnya adalah kekaburan pengaturan prinsip kerahasiaan confidential principle bagi komunikasi yang terjadi pada proses mediasi. Aturan hukum di Indonesia hanya menjelaskan bahwa mediasi dilangsungkan berdasarkan pada asas tertutup dan mediator berkewajiban menjaga kerahasiaan, baik dalam bentuk perkataan maupun catatan, yang terungkap pada mediasi. Sebagai perbandingan, aturan hukum di Amerika Serikat sudah diatur bahwa segala bentuk komunikasi yang terjadi dan berhubungan dengan pelaksanaan mediasi tunduk pada confidential principle, sehingga proses komunikasi mendapatkan hak istimewa (privilege dengan tidak dapat dijadikan barang bukti dan seluruh pihak yang terlibat dalam mediasi tidak dapat dijadikan saksi pada persidangan berikutnya. Dengan demikian, dibutuhkan rekonstruksi pengaturan terkait ruang lingkup komunikasi pada proses mediasi yang terkualifikasi sebagai confidential principle pengaturan terkait pelepasan hak istimewa komunikasi dari confidential principle; dan pengaturan terkait pengecualian terhadap komunikasi yang terkualifikasi sebagai confidential principle Abstract Although being popular, the role of mediation in resolving civil disputes is yet to be maximalized. One of the reasons is the the vague regulation concerning the confidential principle for communication in mediation. The existing regulation in Indonesia only explains that mediation is undertaken based on closed principle and the mediator is obliged to maintain confidentiality the confidentiality of any communication, either in oral or written forms, revealed during mediation. Whereas in comparison, the regulation in the United States of America stipulates that all forms of communications occured during mediation or is made for purposes of conducting or participating in mediation are subjects to the

  20. 30 CFR 291.111 - How does MMS treat the confidential information I provide?

    Science.gov (United States)

    2010-07-01

    ... 30 Mineral Resources 2 2010-07-01 2010-07-01 false How does MMS treat the confidential information... SHELF LANDS ACT § 291.111 How does MMS treat the confidential information I provide? (a) Any person who provides documents under this part in response to a request by MMS to inform a decision on whether open...

  1. 40 CFR 370.64 - What information can I claim as trade secret or confidential?

    Science.gov (United States)

    2010-07-01

    ... secret or confidential? 370.64 Section 370.64 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY... secret or confidential? (a) Trade secrets. You may be able to withhold the name of a specific chemical... trade secret. The requirements for withholding trade secret information are set forth in EPCRA section...

  2. A Policy-Based Framework for Preserving Confidentiality in BYOD Environments: A Review of Information Security Perspectives

    Directory of Open Access Journals (Sweden)

    Chalee Vorakulpipat

    2017-01-01

    Full Text Available Today, many organizations allow their employees to bring their own smartphones or tablets to work and to access the corporate network, which is known as a bring your own device (BYOD. However, many such companies overlook potential security risks concerning privacy and confidentiality. This paper provides a review of existing literature concerning the preservation of privacy and confidentiality, with a focus on recent trends in the use of BYOD. This review spans a large spectrum of information security research, ranging from management (risk and policy to technical aspects of privacy and confidentiality in BYOD. Furthermore, this study proposes a policy-based framework for preserving data confidentiality in BYOD. This framework considers a number of aspects of information security and corresponding techniques, such as policy, location privacy, centralized control, cryptography, and operating system level security, which have been omitted in previous studies. The main contribution is to investigate recent trends concerning the preservation of confidentiality in BYOD from the perspective of information security and to analyze the critical and comprehensive factors needed to strengthen data privacy in BYOD. Finally, this paper provides a foundation for developing the concept of preserving confidentiality in BYOD and describes the key technical and organizational challenges faced by BYOD-friendly organizations.

  3. 31 CFR 31.217 - Confidentiality of information.

    Science.gov (United States)

    2010-07-01

    ... 31 Money and Finance: Treasury 1 2010-07-01 2010-07-01 false Confidentiality of information. 31.217 Section 31.217 Money and Finance: Treasury Office of the Secretary of the Treasury TROUBLED ASSET... from a source other than the retained entity. (b) Prohibitions. The retained entity shall not: (1...

  4. 12 CFR 404.7 - Confidential business information.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 4 2010-01-01 2010-01-01 false Confidential business information. 404.7 Section 404.7 Banks and Banking EXPORT-IMPORT BANK OF THE UNITED STATES INFORMATION DISCLOSURE Procedures... involved, a general description of the related U.S. exports, and the country to which such exports are...

  5. Building Trust and Confidentiality in Cloud computing Distributed ...

    African Journals Online (AJOL)

    new technology, this new way of doing business brings with it new challenges, ... In this paper, we looked at data security, described the current state of data ... has the potential to solve many threats concerning confidentiality and adoption of

  6. Effective verification of confidentiality for multi-threaded programs

    NARCIS (Netherlands)

    Ngo, Minh Tri; Stoelinga, Mariëlle Ida Antoinette; Huisman, Marieke

    2014-01-01

    This paper studies how confidentiality properties of multi-threaded programs can be verified efficiently by a combination of newly developed and existing model checking algorithms. In particular, we study the verification of scheduler-specific observational determinism (SSOD), a property that

  7. Privacy Perspectives for Online Searchers: Confidentiality with Confidence?

    Science.gov (United States)

    Duberman, Josh; Beaudet, Michael

    2000-01-01

    Presents issues and questions involved in online privacy from the information professional's perspective. Topics include consumer concerns; query confidentiality; securing computers from intrusion; electronic mail; search engines; patents and intellectual property searches; government's role; Internet service providers; database mining; user…

  8. Revitalizing quality assurance

    International Nuclear Information System (INIS)

    Hawkins, F.C.

    1998-01-01

    The image of someone inspecting or auditing often comes to mind when people hear the term quality assurance. Although partially correct, this image is not the complete picture. The person doing the inspecting or auditing is probably part of a traditional quality assurance organization, but that organization is only one aspect of a properly conceived and effectively implemented quality assurance system whose goal is improved facility safety and reliability. This paper introduces the underlying philosophies and basic concepts of the International Atomic Energy Agency's new quality assurance initiative that began in 1991 as part of a broad Agency-wide program to enhance nuclear safety. The first product of that initiative was publication in 1996 of a new Quality Assurance Code 50-C/SG-Q and fourteen related Safety Guides. This new suite of documents provide the technical and philosophical foundation upon which Member States can base their quality assurance programs. (author)

  9. [Confidentiality in HIV-infection/AIDS--a comment on the Communicable Disease Control Act].

    Science.gov (United States)

    Frich, J C

    1995-05-10

    The new Communicable Diseases Control Act has come into force in Norway. It makes it compulsory for a physician to warn a third party if it is obvious that a HIV-positive patient, with a high degree of certainty, puts the third party at risk of being infected with HIV. Some philosophers characterize medical confidentiality as an intransigent and absolute obligation, others as a prima facie duty. This article supports the latter view, but the author still argues that strict conditions have to be fulfilled before a physician should consider breaking medical confidentiality: The doctor must try repeatedly to gain the consent or co-operation of the patient involved. Possible negative long-term consequences for the preventive HIV-work support strict medical confidentiality.

  10. 19 CFR 201.6 - Confidential business information.

    Science.gov (United States)

    2010-04-01

    ...) of a type for which there is a clear and compelling need to withhold from disclosure. Special rules... the right to appeal to the Commission. (e) Appeals from denial of confidential treatment. (1) For good cause shown, the Commission may grant an appeal from a denial by the Secretary of a request for...

  11. Introduction to quality assurance

    International Nuclear Information System (INIS)

    Kaden, W.

    1980-01-01

    In today's interpretation 'quality assurance' means 'good management'. Quality assurance has to cover all phases of a work, but all quality assurance measures must be adapted to the relevance and complexity of the actual task. Examples are given for the preparation of quality classes, the organization of quality assurance during design and manufacturing and for auditing. Finally, efficiency and limits of quality assurance systems are described. (orig.)

  12. Quality assurance

    International Nuclear Information System (INIS)

    Kunich, M.P.; Vieth, D.L.

    1989-01-01

    This paper provides a point/counterpoint view of a quality assurance director and a project manager. It presents numerous aspects of quality assurance requirements along with analyses as to the value of each

  13. Quality Assurance Issues in Conducting Multi-Institutional Advanced Technology Clinical Trials

    International Nuclear Information System (INIS)

    Purdy, James A.

    2008-01-01

    The National Cancer Institute-sponsored Advanced Technology Quality Assurance (QA) Consortium, which consisted of the Image-Guided Therapy QA Center, Radiation Therapy Oncology Group, Radiological Physics Center, Quality Assurance Review Center, and Resource Center for Emerging Technologies, has pioneered the development of an infrastructure and QA method for advanced technology clinical trials that requires volumetric digital data submission of a protocol patient's treatment plan and verification data. In particular, the Image-Guided Therapy QA Center has nearly 15 years experience in facilitating QA review for Radiation Therapy Oncology Group advanced technology clinical trials. This QA process includes (1) a data integrity review for completeness of protocol required elements, the format of data, and possible data corruption, and recalculation of dose-volume histograms; (2) a review of compliance with target volume and organ-at-risk contours by study chairs; and (3) a review of dose prescription and dose heterogeneity compliance by the Radiation Therapy Oncology Group Headquarters Dosimetry Group or the Radiological Physics Center dosimetrists (for brachytherapy protocols). This report reviews the lessons learned and the QA challenges presented by the use of advanced treatment modalities in clinical trials requiring volumetric digital data submission

  14. Enhanced Obfuscation Technique for Data Confidentiality in Public Cloud Storage

    Directory of Open Access Journals (Sweden)

    Oli S. Arul

    2016-01-01

    Full Text Available With an advent of cloud computing, data storage has become a boon in information technology. At the same time, data storage in remote places have become important issues. Lot of techniques are available to ensure protection of data confidentiality. These techniques do not completely serve the purpose in protecting data. The Obfuscation techniques come to rescue for protecting data from malicious attacks. This paper proposes an obfuscation technique to encrypt the desired data type on the cloud providing more protection from unknown hackers. The experimental results show that the time taken for obfuscation is low and the confidentiality percentage is high when compared with existing techniques.

  15. 15 CFR 325.16 - Protecting confidentiality of information.

    Science.gov (United States)

    2010-01-01

    ... 15 Commerce and Foreign Trade 2 2010-01-01 2010-01-01 false Protecting confidentiality of information. 325.16 Section 325.16 Commerce and Foreign Trade Regulations Relating to Commerce and Foreign Trade (Continued) INTERNATIONAL TRADE ADMINISTRATION, DEPARTMENT OF COMMERCE MISCELLANEOUS REGULATIONS...

  16. 19 CFR 210.20 - Declassification of confidential information.

    Science.gov (United States)

    2010-04-01

    ... 19 Customs Duties 3 2010-04-01 2010-04-01 false Declassification of confidential information. 210.20 Section 210.20 Customs Duties UNITED STATES INTERNATIONAL TRADE COMMISSION INVESTIGATIONS OF UNFAIR PRACTICES IN IMPORT TRADE ADJUDICATION AND ENFORCEMENT Motions § 210.20 Declassification of...

  17. Medical confidentiality versus disclosure: Ethical and legal dilemmas.

    LENUS (Irish Health Repository)

    Agyapong, V I O

    2009-02-01

    A case is described of a fifty year old single man who made disclosures about criminal sexual practices during a psychiatric assessment. In common practice with other professional men, a doctor is under a duty not to disclose, without the consent of his patient, information which he has gained in his professional capacity other than in exceptional circumstances. We discuss the ethical and legal considerations surrounding issues of medical confidentiality and the dilemma that sometimes face clinicians, when they feel obliged, in the public interest, to disclose information they have gained in confidence. Breach of confidences can have deleterious consequences; particularly for the doctor-patient relationship, but failure to disclose in some situations could have serious implications for the well-being of the wider society. Doctors should be aware of the basic principles of confidentiality and the ethical and legal framework around which they are built.

  18. Multinational Quality Assurance

    Science.gov (United States)

    Kinser, Kevin

    2011-01-01

    Multinational colleges and universities pose numerous challenges to the traditional models of quality assurance that are designed to validate domestic higher education. When institutions cross international borders, at least two quality assurance protocols are involved. To guard against fraud and abuse, quality assurance in the host country is…

  19. Privacy, confidentiality and automated health information systems.

    Science.gov (United States)

    Vuori, H

    1977-12-01

    Professor Vuori's paper, first presented at the fourth Medico-legal Conference in Prague in the spring of this year, deals with the problem of the maintenance of confidentiality in computerized health records. Although more and more information is required, the hardware of the computer systems is so sophisticated that it would be very expensive indeed to 'break in' and steal from a modern data bank. Those concerned with programming computers are becoming more aware of their responsibilities concerning confidentiality and privacy, to the extent that a legal code of ethics for programmers is being formulated. They are also aware that the most sensitive of all relationships--the doctor-patient relationship--could be in danger if they failed to maintain high standards of integrity. An area of danger is where administrative boundaries between systems must be crossed--say between those of health and employment. Protection of privacy must be ensured by releasing full information about the type of data being stored, and by maintaining democratic control over the establishment of information systems.

  20. Confidentiality Enhancement of Highly Sensitive Nuclear Data Using Steganography with Chaotic Encryption over OFDM Channel

    International Nuclear Information System (INIS)

    Mahmoud, S.; Ayad, N.; Elsayed, F.; Elbendary, M.

    2016-01-01

    Full text: Due to the widespread usage of the internet and other wired and wireless communication methods, the security of the transmitted data has become a major requirement. Nuclear knowledge is mainly built upon the exchange of nuclear information which is considered highly sensitive information, so its security has to be enhanced by using high level security mechanisms. Data confidentiality is concerned with the achievement of higher protection for confidential information from unauthorized disclosure or access. Cryptography and steganography are famous and widely used techniques that process information in order to achieve its confidentiality, but sometimes, when used individually, they don’t satisfy a required level of security for highly sensitive data. In this paper, cryptography is accompanied with steganography for constituting a multilayer security techniques that can strengthen the level of security of highly confidential nuclear data that are archived or transmitted through different channel types and noise conditions. (author)

  1. The end of medical confidentiality? Patients, physicians and the state in history.

    Science.gov (United States)

    Rieder, Philip; Louis-Courvoisier, Micheline; Huber, Philippe

    2016-09-01

    Medical confidentiality has come under attack in the public sphere. In recent disasters both journalists and politicians have questioned medical confidentiality and claimed that in specific contexts physicians should be compelled to communicate data on their patients' health. The murders of innocent individuals by a suicidal pilot and a Swiss convicted criminal have generated polemical debates on the topic. In this article, historical data on medical confidentiality is used to show that medical practices of secrecy were regularly attacked in the past, and that the nature of medical confidentiality evolved through time depending on physicians' values and judgements. Our demonstration is based on three moments in history. First, at the end of the 16th century, lay authorities put pressure on physicians to disclose the names of patients suffering from syphilis. Second, in the 18th century, physicians faced constant demands for information about patients' health from relatives and friends. Third, employers and insurance companies in the 20th century requested medical data on sick employees. In these three different situations, history reveals that the concept of medical confidentiality was plastic, modelled in the first instance to defend well-to-do patients, in the second instance it was adapted to accommodate the physician's social role and, finally, to defend universal values and public health. Medical secrecy was, and is today, a medical and societal norm that is shaped collectively. Any change in its definition and enforcement was and should be the result of negotiations with all social actors concerned. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://www.bmj.com/company/products-services/rights-and-licensing/

  2. Boundaries of confidentiality in nursing care for mother and child in HIV programmes.

    Science.gov (United States)

    Våga, Bodil Bø; Moland, Karen Marie; Blystad, Astrid

    2016-08-01

    Confidentiality lies at the core of medical ethics and is the cornerstone for developing and keeping a trusting relationship between nurses and patients. In the wake of the HIV epidemic, there has been a heightened focus on confidentiality in healthcare contexts. Nurses' follow-up of HIV-positive women and their susceptible HIV-exposed children has proved to be challenging in this regard, but the ethical dilemmas concerning confidentiality that emerge in the process of ensuring HIV-free survival of the third party - the child - have attracted limited attention. The study explores challenges of confidentiality linked to a third party in nurse-patient relationships in a rural Tanzanian HIV/AIDS context. The study was carried out in rural and semi-urban settings of Tanzania where the population is largely agro-pastoral, the formal educational level is low and poverty is rife. The HIV prevalence of 1.5% is low compared to the national prevalence of 5.1%. Data were collected during 9 months of ethnographic fieldwork and consisted of participant observation in clinical settings and during home visits combined with in-depth interviews. The main categories of informants were nurses employed in prevention of mother-to-child transmission of HIV programmes and HIV-positive women enrolled in these programmes. Based on information about the study aims, all informants consented to participate. Ethical approval was granted by ethics review boards in Tanzania and Norway. The material indicates a delicate balance between the nurses' attempt to secure the HIV-free survival of the babies and the mothers' desire to preserve confidentiality. Profound confidentiality-related dilemmas emerged in actual practice, and indications of a lack of thorough consideration of the implication of a patient's restricted disclosure came to light during follow-up of the HIV-positive women and the third party - the child who is at risk of HIV infection through mother's milk. World Health Organization

  3. Quality assurance of nuclear energy

    International Nuclear Information System (INIS)

    1994-12-01

    It consists of 14 chapters, which are outline of quality assurance of nuclear energy, standard of quality assurance, business quality assurance, design quality assurance, purchase quality assurance, production quality assurance, a test warranty operation warranty, maintenance warranty, manufacture of nuclear power fuel warranty, computer software warranty, research and development warranty and quality audit.

  4. 45 CFR 307.13 - Security and confidentiality for computerized support enforcement systems in operation after...

    Science.gov (United States)

    2010-10-01

    ... ENFORCEMENT SYSTEMS § 307.13 Security and confidentiality for computerized support enforcement systems in... systems in operation after October 1, 1997. (a) Information integrity and security. Have safeguards... 45 Public Welfare 2 2010-10-01 2010-10-01 false Security and confidentiality for computerized...

  5. 40 CFR 85.1415 - Treatment of confidential information.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 18 2010-07-01 2010-07-01 false Treatment of confidential information. 85.1415 Section 85.1415 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) AIR PROGRAMS (CONTINUED) CONTROL OF AIR POLLUTION FROM MOBILE SOURCES Urban Bus Rebuild Requirements § 85.1415...

  6. Achievements and Lessons Learned from Vietnam's Higher Education Quality Assurance System after a Decade of Establishment

    Science.gov (United States)

    Nguyen, Huu Cuong; Ta, Thi Thu Hien; Nguyen, Thi Thu Huong

    2017-01-01

    Higher education quality assurance and accreditation were officially implemented in Vietnam over twelve years ago. From a totally centralized model, Vietnam's accreditation system has been becoming more independent, especially with the establishment of accrediting agencies. The first accreditation certificates were also awarded to universities…

  7. The application of quality assurance

    International Nuclear Information System (INIS)

    Lovatt, G.B.

    1988-01-01

    The paper concerns the application of quality assurance to structures, systems and components for the design, construction and operation of nuclear power plant and fuel reprocessing plant. A description is given of:- the requirements for quality assurance, the establishment of quality assurance arrangements, quality assurance documents structure, and quality assurance manuals and programmes. Quality assurance procedures and auditing are also discussed. (U.K.)

  8. Privacy and Confidentiality in Exchange of Information Procedures : Some Uncertainties, Many Issues, but Few Solutions

    NARCIS (Netherlands)

    Debelva, F.; Mosquera, Valderrama I.J.

    2017-01-01

    The overall aim of this article is to analyse the taxpayers’ rights to confidentiality and privacy in exchange of information including the new global standard of automatic exchange of information. Section 2 will analyse the state of the art regarding the right to privacy and confidentiality in

  9. 40 CFR 86.615-84 - Treatment of confidential information.

    Science.gov (United States)

    2010-07-01

    ...) Selective Enforcement Auditing of New Light-Duty Vehicles, Light-Duty Trucks, and Heavy-Duty Vehicles § 86... part 2, subpart B. (b) Any claim of confidentiality must accompany the information at the time it is...

  10. Absolutism on Access and Confidentiality: Principled or Irresponsible?

    Science.gov (United States)

    Sheerin, William E.

    1991-01-01

    Discusses issues involved in public access to library materials and facilities and patron confidentiality. Topics discussed include children's access to adult materials; parents' right to know about their children's materials; First and Fourth Amendment protections; the Library Bill of Rights; and American Library Association (ALA) documents that…

  11. 12 CFR 19.181 - Confidentiality of formal investigations.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 1 2010-01-01 2010-01-01 false Confidentiality of formal investigations. 19.181 Section 19.181 Banks and Banking COMPTROLLER OF THE CURRENCY, DEPARTMENT OF THE TREASURY RULES OF... only in accordance with the provisions of part 4 of this chapter. ...

  12. 49 CFR 805.735-21 - Confidentiality of statements.

    Science.gov (United States)

    2010-10-01

    ... TRANSPORTATION SAFETY BOARD EMPLOYEE RESPONSIBILITIES AND CONDUCT § 805.735-21 Confidentiality of statements. Subject to the provisions of § 805.735-24 concerning review of employee statements, each statement of... Personnel Officer is personally responsible for the retention of employee statements in confidence and may...

  13. HIPAA-protecting patient confidentiality or covering something else?

    Directory of Open Access Journals (Sweden)

    Robbins RA

    2013-10-01

    Full Text Available No abstract available. Article truncated at 150 words. A case of a physician fired from the Veterans Administration (VA for violation of the Health Care Portability and Accountability Act of 1996 (HIPAA illustrates a problem with both the law and the VA. Anil Parikh, a VA physician at the Jesse Brown VA in Chicago, was dismissed on a charge of making unauthorized disclosures of confidential patient information on October 19, 2007. On January 3, 2011 the Merit Systems Protection Board (MSPB reversed Dr. Parikh’s removal. Dr. Parikh's initially made disclosures to the VA Office of Inspector General and to Senator Barack Obama and Congressman Luis Gutierrez, in whose district the Jesse Brown VA lies. Dr. Parikh alleged that there were systematic problems within the Jesse Brown VA that resulted in untimely and inadequate patient care. The confidential patient information Parikh disclosed included examples of the misdiagnoses and misdirection of patients within the hospital. Specifically, Dr. Parikh alleged that …

  14. 40 CFR 725.15 - Determining applicability when microorganism identity or use is confidential or uncertain.

    Science.gov (United States)

    2010-07-01

    ... ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) TOXIC SUBSTANCES CONTROL ACT REPORTING REQUIREMENTS AND REVIEW... appear on the public version of the Inventory, in § 725.239 or in subpart M of this part. Instead, it is contained in a confidential version held in EPA's Confidential Business Information Center (CBIC). The...

  15. HIV testing sites' communication about adolescent confidentiality: potential barriers and facilitators to testing.

    Science.gov (United States)

    Hyden, Christel; Allegrante, John P; Cohall, Alwyn T

    2014-03-01

    This study sought to evaluate HIV testing locations in New York City in terms of staff communication of confidentiality policies for adolescent clients. Using the New York State Directory of HIV Counseling and Testing Resources as a sampling frame, this study made telephone contact with 164 public HIV testing locations in New York City and used a semistructured interview to ask questions about confidentiality, parental permission, and parent access to test results. At 48% of locations, either HIV testing was not offered or we were unable to reach a staff member to ask questions about testing options and confidentiality. At the remaining sites, information provided regarding confidentiality, parental consent, and privacy of test results was correct only 69% to 85% of the time. Additionally, 23% of sites successfully contacted offered testing exclusively between 9:00 a.m. and 3:00 p.m. weekdays, when most adolescents are in school. Our findings point to a need for increased training and quality control at the clinical level to ensure that consumers in need of HIV testing are provided with accurate information and accessible services. Furthermore, these results highlight the need for more "patient-centric" sites with enhanced accessibility for potential clients, particularly youth.

  16. Lithuanian general practitioners' knowledge of confidentiality laws in adolescent sexual and reproductive healthcare: a cross-sectional study

    DEFF Research Database (Denmark)

    Lazarus, Jeff; Jaruseviciene, Lina; Liljestrand, Jerker

    2008-01-01

    In Lithuania, the legislation addressing confidentiality in adolescent healthcare is contradictory and vague. Previous studies have also revealed that medico-legal knowledge among physicians is poor, and attitudes play a correspondingly greater role than legal knowledge in ensuring the confidenti......In Lithuania, the legislation addressing confidentiality in adolescent healthcare is contradictory and vague. Previous studies have also revealed that medico-legal knowledge among physicians is poor, and attitudes play a correspondingly greater role than legal knowledge in ensuring...

  17. Financial assurances

    International Nuclear Information System (INIS)

    Paton, R.F.

    1990-01-01

    US Ecology is a full service waste management company. The company operates two of the nation's three existing low-level radioactive waste (LLRW) disposal facilities and has prepared and submitted license applications for two new LLRW disposal facilities in California and Nebraska. The issue of financial assurances is an important aspect of site development and operation. Proper financial assurances help to insure that uninterrupted operation, closure and monitoring of a facility will be maintained throughout the project's life. Unfortunately, this aspect of licensing is not like others where you can gauge acceptance by examining approved computer codes, site performance standards or applying specific technical formulas. There is not a standard financial assurance plan. Each site should develop its requirements based upon the conditions of the site, type of design, existing state or federal controls, and realistic assessments of future financial needs. Financial assurances at U.S. Ecology's existing sites in Richland, Washington, and Beatty, Nevada, have been in place for several years and are accomplished in a variety of ways by the use of corporate guarantees, corporate capital funds, third party liability insurance, and post closure/long-term care funds. In addressing financial assurances, one can divide the issue into three areas: Site development/operations, third party damages, and long-term care/cleanup

  18. 75 FR 75576 - Confidentiality of Suspicious Activity Reports

    Science.gov (United States)

    2010-12-03

    ...-2010-0019] RIN 1557-AD17 Confidentiality of Suspicious Activity Reports AGENCY: The Office of the... suspicious activity report (SAR) to: clarify the scope of the statutory prohibition on the disclosure by a... institutions, including national banks regulated by the OCC, to keep certain records and make certain reports...

  19. Nursing Students' Perceptions of Confidentiality, Accountability, and E-Professionalism in Relation to Facebook.

    Science.gov (United States)

    Barnable, Alexia; Cunning, Glenda; Parcon, Mariel

    This study examined nursing students' perceptions of confidentiality, accountability, and e-professionalism in relation to Facebook. All of the students were aware that posting patients' names and pictures of patients constituted a confidentiality breach. When comparing students based on educational status, there were differing opinions on whether employers should use Facebook profile information for hiring decisions. Nursing programs should provide current education, including clear and up-to-date policies, about social media use.

  20. 18 CFR 1b.9 - Confidentiality of investigations.

    Science.gov (United States)

    2010-04-01

    ... 18 Conservation of Power and Water Resources 1 2010-04-01 2010-04-01 false Confidentiality of investigations. 1b.9 Section 1b.9 Conservation of Power and Water Resources FEDERAL ENERGY REGULATORY COMMISSION... pursuant to subpoena, and all investigative proceedings shall be treated as nonpublic by the Commission and...

  1. Nova laser assurance-management system

    International Nuclear Information System (INIS)

    Levy, A.J.

    1983-01-01

    In a well managed project, Quality Assurance is an integral part of the management activities performed on a daily basis. Management assures successful performance within budget and on schedule by using all the good business, scientific, engineering, quality assurance, and safety practices available. Quality assurance and safety practices employed on Nova are put in perspective by integrating them into the overall function of good project management. The Nova assurance management system was developed using the quality assurance (QA) approach first implemented at LLNL in early 1978. The LLNL QA program is described as an introduction to the Nova assurance management system. The Nova system is described pictorially through the Nova configuration, subsystems and major components, interjecting the QA techniques which are being pragmatically used to assure the successful completion of the project

  2. THE POSSIBLE CONFIDENTIALITY: THE PUBLIC ADMINISTRATION AS PARTY IN THE ALTERNATIVE DISPUTE RESOLUTION MECHANISM

    Directory of Open Access Journals (Sweden)

    Carlos Alberto de Salles

    2017-05-01

    Full Text Available This article debates the tension that exists between confidentiality, usual in ADRs, and the publicity principle, that rules the Public Administration in Brazil. As a solution points that the parameter of confidentiality when Public Administration is a party must be the preservation of accountability of the involved agencies, what means, the capacity to answer to its own goals and to obey the public control.

  3. Laboratory quality assurance

    International Nuclear Information System (INIS)

    Delvin, W.L.

    1977-01-01

    The elements (principles) of quality assurance can be applied to the operation of the analytical chemistry laboratory to provide an effective tool for indicating the competence of the laboratory and for helping to upgrade competence if necessary. When used, those elements establish the planned and systematic actions necessary to provide adequate confidence in each analytical result reported by the laboratory (the definition of laboratory quality assurance). The elements, as used at the Hanford Engineering Development Laboratory (HEDL), are discussed and they are qualification of analysts, written methods, sample receiving and storage, quality control, audit, and documentation. To establish a laboratory quality assurance program, a laboratory QA program plan is prepared to specify how the elements are to be implemented into laboratory operation. Benefits that can be obtained from using laboratory quality assurance are given. Experience at HEDL has shown that laboratory quality assurance is not a burden, but it is a useful and valuable tool for the analytical chemistry laboratory

  4. IT Confidentiality Risk Assessment for an Architecture-Based Approach

    NARCIS (Netherlands)

    Morali, A.; Zambon, Emmanuele; Etalle, Sandro; Overbeek, Paul

    2008-01-01

    Information systems require awareness of risks and a good understanding of vulnerabilities and their exploitations. In this paper, we propose a novel approach for the systematic assessment and analysis of confidentiality risks caused by disclosure of operational and functional information. The

  5. 48 CFR 1415.207-71 - Confidentiality of proposal evaluation.

    Science.gov (United States)

    2010-10-01

    ... THE INTERIOR CONTRACTING METHODS AND CONTRACT TYPES CONTRACTING BY NEGOTIATION Solicitation and... evaluators and advisors shall sign a Conflict of Interest Certificate and a Confidentiality Certificate in a... outside the Government shall take into consideration requirements for avoiding individual conflicts of...

  6. Public expectations concerning confidentiality protection of adolescents' sexual and reproductive health care in Lithuania: findings of the surveys conducted in 2005 and 2012.

    Science.gov (United States)

    Jaruseviciene, Lina; Zaborskis, Apolinaras; Lazarus, Jeffrey Victor

    2014-04-01

    An adolescent's right to confidential healthcare is protected by international law and professional consensus. However, parental and social support for confidential sexual and reproductive health (SRH) services, in particular, varies greatly. This study documents Lithuanian residents' expectations with regard to confidentiality protection for adolescents in this domain, and explores the factors related to the diversity of these expectations. Two national surveys of Lithuanian residents completed in 2005 and 2012 using anonymous questionnaires. Participants rated their expectations for confidentiality using a five-point Likert scale for eight types of SRH consultations. Public anticipation for confidentiality depended on whether issues related to sexual behaviour or to its consequences were addressed during adolescent consultation. Only younger respondents had higher expectations for confidentiality in both contexts. Public expectations regarding confidentiality were less demanding in 2012 than in 2005. The expectation of confidentiality protection was greater for topics related to sexual behaviour than for the consequences of sexual behaviour, such as pregnancy, abortion or a sexually transmitted infection. This implies a need for targeted information strategies for the general population and explicit guidance for physicians on when and for whom care should remain confidential.

  7. 49 CFR 40.321 - What is the general confidentiality rule for drug and alcohol test information?

    Science.gov (United States)

    2010-10-01

    ... Transportation PROCEDURES FOR TRANSPORTATION WORKPLACE DRUG AND ALCOHOL TESTING PROGRAMS Confidentiality and Release of Information § 40.321 What is the general confidentiality rule for drug and alcohol test... DOT drug or alcohol testing process, you are prohibited from releasing individual test results or...

  8. Lessons learned on stakeholder issues in decommissioning

    International Nuclear Information System (INIS)

    O'Sullivan, P.; Pescatore, C.

    2008-01-01

    Issues of public concern during decommissioning and dismantling (D and D) are partly the same and partly different from those of the preceding phases (planning, construction and operation). While in the course of construction and operation the main challenges include meeting expectations of a higher quality of life, accommodating a growing population, mitigating construction nuisances, and assuring the safe operation of the facility, the main concerns in the D and D phase are decreasing employment rate, the eventual reduction of revenues for the municipality, the future use of the affected land and negative social impacts (e.g., out-migration). The decommissioning phase is characterised by heterogeneity of stakeholder interests and values, difficulties of reaching consensus or compromise, and difficulties in connection with the harmonization of energy production, environmental protection and sustainable socio-economic development considerations. Typically, there might also be tensions between local and regional decisions. As in other phases, the building of trust between stakeholder is crucial from the point of view of conflict management, and social lessons learnt from the siting and developments of nuclear facilities are widely applicable in the field of D and D as well. A review is presented of major lessons to be learnt from NEA activities in the field of decommissioning and stakeholder involvement. (author)

  9. Lessons learned on stakeholder issues in decommissioning

    Energy Technology Data Exchange (ETDEWEB)

    O' Sullivan, P.; Pescatore, C. [OECD Nuclear Energy Agency, 92 - Issy les Moulineaux (France)

    2008-07-01

    Issues of public concern during decommissioning and dismantling (D and D) are partly the same and partly different from those of the preceding phases (planning, construction and operation). While in the course of construction and operation the main challenges include meeting expectations of a higher quality of life, accommodating a growing population, mitigating construction nuisances, and assuring the safe operation of the facility, the main concerns in the D and D phase are decreasing employment rate, the eventual reduction of revenues for the municipality, the future use of the affected land and negative social impacts (e.g., out-migration). The decommissioning phase is characterised by heterogeneity of stakeholder interests and values, difficulties of reaching consensus or compromise, and difficulties in connection with the harmonization of energy production, environmental protection and sustainable socio-economic development considerations. Typically, there might also be tensions between local and regional decisions. As in other phases, the building of trust between stakeholder is crucial from the point of view of conflict management, and social lessons learnt from the siting and developments of nuclear facilities are widely applicable in the field of D and D as well. A review is presented of major lessons to be learnt from NEA activities in the field of decommissioning and stakeholder involvement. (author)

  10. A Discussion of the Software Quality Assurance Role

    Science.gov (United States)

    Kandt, Ronald Kirk

    2010-01-01

    The basic idea underlying this paper is that the conventional understanding of the role of a Software Quality Assurance (SQA) engineer is unduly limited. This is because few have asked who the customers of a SQA engineer are. Once you do this, you can better define what tasks a SQA engineer should perform, as well as identify the knowledge and skills that such a person should have. The consequence of doing this is that a SQA engineer can provide greater value to his or her customers. It is the position of this paper that a SQA engineer providing significant value to his or her customers must not only assume the role of an auditor, but also that of a software and systems engineer. This is because software engineers and their managers particularly value contributions that directly impact products and their development. These ideas are summarized as lessons learned, based on my experience at Jet Propulsion Laboratory (JPL).

  11. Quality assurance for geologic investigations

    International Nuclear Information System (INIS)

    Delvin, W.L.; Gustafson, L.D.

    1983-01-01

    A quality assurance handbook was written to provide guidance in the application of quality assurance to geologic work activities associated with the National Waste Terminal Storage (NWTS) Program. It is intended to help geoscientists and NWTS program managers in applying quality assurance to their work activities and projects by showing how technical and quality assurance practices are integrated to provide control within those activities and projects. The use of the guidance found in this handbook should help provide consistency in the interpretation of quality assurance requirements across the various geologic activities wihtin the NWTS Program. This handbook also can assist quality assurance personnel in understanding the relationships between technical and quality assurance practices. This paper describes the handbook

  12. Quality assurance for geologic investigations

    International Nuclear Information System (INIS)

    Delvin, W.L.; Gustafson, L.D.

    1983-01-01

    A quality assurance handbook was written to provide guidance in the application of quality assurance to geologic work activities associated with the National Waste Terminal Storage (NWTS) Program. It is intended to help geoscientists and NWTS program managers in applying quality assurance to their work activitie and projects by showing how technical and quality assurance practices are integrated to provide control within those activities and projects. The use of the guidance found in this handbook should help provide consistency in the interpretation of quality assurance requirements across the various geologic activities within the NWTS Program. This handbook also can assist quality assurance personnel in understanding the relationships between technical and quality assurance practices. This paper describes the handbook

  13. 37 CFR 201.29 - Access to, and confidentiality of, Statements of Account, Verification Auditor's Reports, and...

    Science.gov (United States)

    2010-07-01

    ... confidentiality of, Statements of Account, Verification Auditor's Reports, and other verification information... GENERAL PROVISIONS § 201.29 Access to, and confidentiality of, Statements of Account, Verification Auditor... Account, including the Primary Auditor's Reports, filed under 17 U.S.C. 1003(c) and access to a Verifying...

  14. 22 CFR 1104.17 - Confidentiality of archaeological resource information.

    Science.gov (United States)

    2010-04-01

    ... 22 Foreign Relations 2 2010-04-01 2010-04-01 true Confidentiality of archaeological resource information. 1104.17 Section 1104.17 Foreign Relations INTERNATIONAL BOUNDARY AND WATER COMMISSION, UNITED... of archaeological resource information. (a) The Commissioner shall not make available to the public...

  15. Decisions about Confidentiality in Medical Student Mental Health Settings.

    Science.gov (United States)

    Lindenthal, Jacob Jay; And Others

    1984-01-01

    Examined responses of psychologists and psychiatrists in medical schools (N=59) to vignettes representing student problems. Results suggested practitioners were generally unwilling to break confidentiality in response to problems involving suicidal tendencies, sexual coercion/seduction, social transgressions, or falsifying data. Only suggestions…

  16. Quality assurance program application during the decommissioning phase of the Shoreham Nuclear Plant

    International Nuclear Information System (INIS)

    Patch, R.L.

    1993-01-01

    The application of Quality Assurance (QA) requirements for operating nuclear power plants has evolved over the last 30 years. QA programs started as good management practices and evolved to a process that is implemented integral to very detailed Probabilistic Risk Assessments (PRAs). QA programs for controlling activities during decommissioning of nuclear power plants are still in their infancy. Regulatory guidance is currently being developed, and much of what exists is in the form of draft guidance documents. In determining where to apply QA controls during decommissioning, a series of questions must be asked: Is there an existing regulatory commitment? (Safety related or safety significant activity); Are there any postulated accidents which need to be prevented or mitigated; What are the unacceptable risks; Are there other key factors, such as human performance issues and Industrial Safety Programs, to be considered? Which QA controls are needed and to what extent they should be applied must be evaluated on a case by case basis. How much QA to apply is usually a risk evaluation in itself. Can you afford not to apply a specific control? Can you afford to apply costly and rigorous quality control programs? These questions had to be answered at the Shoreham Nuclear Power Station (SNPS) in order to develop and implement an acceptable and effective Quality Assurance program. Exploring the SNPS open-quotes lessons learnedclose quotes on how to apply a quality assurance program during decommissioning is what the following discussion is about

  17. 18 CFR 401.75 - Protection of trade secrets; Confidential information.

    Science.gov (United States)

    2010-04-01

    ..., confidential statistical data, amount or source of any income, profits, losses, or expenditures of any person... States Code which provides: Whoever, being an officer or employee of the United States or of any...

  18. Low-grade squamous intraepithelial lesion, cannot exclude high-grade squamous intraepithelial lesion: a category with an increased outcome of high-grade lesions: use as a quality assurance measure.

    Science.gov (United States)

    Nishino, Ha T; Wilbur, David C; Tambouret, Rosemary H

    2012-08-01

    "Low-grade squamous intraepithelial lesion (LSIL), cannot exclude high-grade squamous intraepithelial lesion" (LSIL-H) is an increasingly used, equivocal interpretive category in gynecologic cytology. In an effort to evaluate its potential usefulness as a measure of quality assurance, we studied patterns of use of the LSIL-H diagnosis compared with "LSIL" and "high-grade squamous intraepithelial lesion" (HSIL) with corresponding histologic outcomes for 10 cytopathologists in our practice. In our laboratory, while the overall rate of associated cervical intraepithelial neoplasia 2 or greater on histologic follow-up for LSIL-H was intermediate between that of LSIL and HSIL, the outcomes for individual cytopathologists varied widely. Monitoring this particular utilization-outcome data with periodic confidential feedback to individual cytopathologists offers an opportunity for practice improvement within a laboratory and serves as an additional measure of quality assurance. These data may be useful for establishing and/or realigning the diagnostic criteria for this equivocal cytologic interpretation endorsed by a pathology practice.

  19. Quality assurance handbook for measurement laboratories

    International Nuclear Information System (INIS)

    Delvin, W.L.

    1984-10-01

    This handbook provides guidance in the application of quality assurance to measurement activities. It is intended to help those persons making measurements in applying quality assurance to their work activities by showing how laboratory practices and quality assurance requirements are integrated to provide control within those activities. The use of the guidance found in this handbook should help provide consistency in the interpretation of quality assurance requirements across all types of measurement laboratories. This handbook also can assist quality assurance personnel in understanding the relationships between laboratory practices and quality assurance requirements. The handbook is composed of three chapters and several appendices. Basic guidance is provided by the three chapters. In Chapter 1, the role of quality assurance in obtaining quality data and the importance of such data are discussed. Chapter 2 presents the elements of laboratory quality assurance in terms of practices that can be used in controlling work activities to assure the acquisition of quality data. Chapter 3 discusses the implementation of laboratory quality assurance. The appendices provide supplemental information to give the users a better understanding of the following: what is quality assurance; why quality assurance is required; where quality assurance requirements come from; how those requirements are interpreted for application to laboratory operations; how the elements of laboratory quality assurance relate to various laboratory activities; and how a quality assurance program can be developed

  20. Designing a database for performance assessment: Lessons learned from WIPP

    International Nuclear Information System (INIS)

    Martell, M.A.; Schenker, A.

    1997-01-01

    The Waste Isolation Pilot Plant (WIPP) Compliance Certification Application (CCA) Performance Assessment (PA) used a relational database that was originally designed only to supply the input parameters required for implementation of the PA codes. Reviewers used the database as a point of entry to audit quality assurance measures for control, traceability, and retrievability of input information used for analysis, and output/work products. During these audits it became apparent that modifications to the architecture and scope of the database would benefit the EPA regulator and other stakeholders when reviewing the recertification application. This paper contains a discussion of the WPP PA CCA database and lessons learned for designing a database

  1. Quality assurance of metabolomics.

    Science.gov (United States)

    Bouhifd, Mounir; Beger, Richard; Flynn, Thomas; Guo, Lining; Harris, Georgina; Hogberg, Helena; Kaddurah-Daouk, Rima; Kamp, Hennicke; Kleensang, Andre; Maertens, Alexandra; Odwin-DaCosta, Shelly; Pamies, David; Robertson, Donald; Smirnova, Lena; Sun, Jinchun; Zhao, Liang; Hartung, Thomas

    2015-01-01

    Metabolomics promises a holistic phenotypic characterization of biological responses to toxicants. This technology is based on advanced chemical analytical tools with reasonable throughput, including mass-spectroscopy and NMR. Quality assurance, however - from experimental design, sample preparation, metabolite identification, to bioinformatics data-mining - is urgently needed to assure both quality of metabolomics data and reproducibility of biological models. In contrast to microarray-based transcriptomics, where consensus on quality assurance and reporting standards has been fostered over the last two decades, quality assurance of metabolomics is only now emerging. Regulatory use in safety sciences, and even proper scientific use of these technologies, demand quality assurance. In an effort to promote this discussion, an expert workshop discussed the quality assurance needs of metabolomics. The goals for this workshop were 1) to consider the challenges associated with metabolomics as an emerging science, with an emphasis on its application in toxicology and 2) to identify the key issues to be addressed in order to establish and implement quality assurance procedures in metabolomics-based toxicology. Consensus has still to be achieved regarding best practices to make sure sound, useful, and relevant information is derived from these new tools.

  2. Quality assurance

    International Nuclear Information System (INIS)

    Cante; Feger; Genevray; Hennion; Moneyron; Monneyron; Normand; Rastoin; Silberstein; Vaujour.

    1976-01-01

    The general principles of quality assurance and their applications within the French industrial and commercial regulations are presented. The conditions for the practical application of quality assurance to the different stages of the life of a nuclear power station (design, development, operation) are considered and a special mention is made of nuclear fuels and liquid sodium cooled reactors [fr

  3. Denying a patient's final will: public safety vs. medical confidentiality and patient autonomy.

    Science.gov (United States)

    Gaertner, Jan; Vent, Julia; Greinwald, Ralf; Rothschild, Markus A; Ostgathe, Christoph; Kessel, Rene; Voltz, Raymond

    2011-12-01

    Especially when caring for patients approaching the end of life, physicians and nursing staff feel committed to fulfilling as many patient desires as possible. However, sometimes a patient's "final will" may threaten public safety. This can lead to severe conflicts, outweighing the physician's obligation and dedication to care for the patient and to respect his autonomy. Yet, public safety can be threatened if confidentiality is not broken. This article provides a concise summary of the medicolegal and ethical fundamentals concerning this difficult situation. If the patient's and others' health and safety are at risk, physicians may (and in some countries must) break medical confidentiality and disclose confidential patient information to the police and other authorities. Physicians should be able to professionally deal with such a conflict in all patients, not only in patients with advanced illness. Copyright © 2011 U.S. Cancer Pain Relief Committee. Published by Elsevier Inc. All rights reserved.

  4. The case of sustainability assurance: constructing a new assurance service

    NARCIS (Netherlands)

    O'Dwyer, B.

    2011-01-01

    This paper presents an in-depth longitudinal case study examining the processes through which practitioners in two Big 4 professional services firms have attempted to construct sustainability assurance (independent assurance on sustainability reports). Power’s (1996, 1997, 1999, 2003) theorization

  5. Ensuring Confidentiality of Geocoded Health Data: Assessing Geographic Masking Strategies for Individual-Level Data.

    Science.gov (United States)

    Zandbergen, Paul A

    2014-01-01

    Public health datasets increasingly use geographic identifiers such as an individual's address. Geocoding these addresses often provides new insights since it becomes possible to examine spatial patterns and associations. Address information is typically considered confidential and is therefore not released or shared with others. Publishing maps with the locations of individuals, however, may also breach confidentiality since addresses and associated identities can be discovered through reverse geocoding. One commonly used technique to protect confidentiality when releasing individual-level geocoded data is geographic masking. This typically consists of applying a certain amount of random perturbation in a systematic manner to reduce the risk of reidentification. A number of geographic masking techniques have been developed as well as methods to quantity the risk of reidentification associated with a particular masking method. This paper presents a review of the current state-of-the-art in geographic masking, summarizing the various methods and their strengths and weaknesses. Despite recent progress, no universally accepted or endorsed geographic masking technique has emerged. Researchers on the other hand are publishing maps using geographic masking of confidential locations. Any researcher publishing such maps is advised to become familiar with the different masking techniques available and their associated reidentification risks.

  6. Ensuring Confidentiality of Geocoded Health Data: Assessing Geographic Masking Strategies for Individual-Level Data

    Directory of Open Access Journals (Sweden)

    Paul A. Zandbergen

    2014-01-01

    Full Text Available Public health datasets increasingly use geographic identifiers such as an individual’s address. Geocoding these addresses often provides new insights since it becomes possible to examine spatial patterns and associations. Address information is typically considered confidential and is therefore not released or shared with others. Publishing maps with the locations of individuals, however, may also breach confidentiality since addresses and associated identities can be discovered through reverse geocoding. One commonly used technique to protect confidentiality when releasing individual-level geocoded data is geographic masking. This typically consists of applying a certain amount of random perturbation in a systematic manner to reduce the risk of reidentification. A number of geographic masking techniques have been developed as well as methods to quantity the risk of reidentification associated with a particular masking method. This paper presents a review of the current state-of-the-art in geographic masking, summarizing the various methods and their strengths and weaknesses. Despite recent progress, no universally accepted or endorsed geographic masking technique has emerged. Researchers on the other hand are publishing maps using geographic masking of confidential locations. Any researcher publishing such maps is advised to become familiar with the different masking techniques available and their associated reidentification risks.

  7. Pollution prevention program for new projects -- Lessons learned

    Energy Technology Data Exchange (ETDEWEB)

    Lum, J. [Dept. of Energy, Washington, DC (United States)

    1993-03-01

    The purpose of this presentation is to relay the experience of the Office of New Production Reactors (NP) in developing and implementing its pollution prevention program. NP was established to plan, design, and construct a new safe and environmentally acceptable nuclear reactor capacity necessary to provide an assured supply of tritium to maintain the nation`s long-term deterrent capability. The Program offered the Department of Energy an opportunity to demonstrate its commitment to environmental protection via minimization of environmental releases; new design offers the best opportunity for pollution prevention. The NP pollution prevention program was never fully implemented because NP`s tritium production design activity was recovery terminated. The information in this paper represented lessons learned from the last three years of NP operation.

  8. The Assembly of the LHC Short Straight Sections at CERN Work Organization, Quality Assurance and Lessons Learned

    CERN Document Server

    Bourcey, N; López, R; Poncet, A; Parma, V

    2007-01-01

    After 4 years of activity, the assembly of approximately 500 Short Straight Sections (SSS) for the LHC has come to an end at the beginning of 2007. This activity, which was initially foreseen in European industry, was in-sourced at CERN because of the insolvency of the prime contractor. While the quadrupole cold masses were produced in industry, the assembly within their cryostats was transferred to CERN and executed by an external company under a result-oriented contract. CERN procured cryostat components, set up a dedicated 2000 m2 assembly hall with all the specific assembly equipment and tooling and defined the assembly and testing procedures. The contractor took up responsibility for the delivery, on time, of assemblies according to the required quality. A dedicated CERN production and quality assurance team was constituted. A specific quality assurance plan was set up involving 2 additional contractors responsible for weld inspections on a total of about 20'000 assembly welds and the execution of about ...

  9. Circles of Confidence in Correspondences. : Confidentiality in seventeenth-century knowledge exchange in networks of letters and drawings

    NARCIS (Netherlands)

    van den Heuvel, C.M.J.M.; Weingart, Scott B; Spelt, Nils; Nellen, H.J.M.

    2016-01-01

    Science in the Early Modern World depended on the one hand on openness in scholarly communication, but on the other hand the competition in commerce and trade and the political and religious conflicts required secrecy and confidentiality. This papers analyzes these concepts of confidentiality and

  10. Computer software quality assurance

    International Nuclear Information System (INIS)

    Ives, K.A.

    1986-06-01

    The author defines some criteria for the evaluation of software quality assurance elements for applicability to the regulation of the nuclear industry. The author then analyses a number of software quality assurance (SQA) standards. The major extracted SQA elements are then discussed, and finally specific software quality assurance recommendations are made for the nuclear industry

  11. Initial Startup and Testing of the Fort St. Vrain HTGR - Lessons Learned which May Be Useful to the HTR-PM

    International Nuclear Information System (INIS)

    Brey, Larry H.

    2014-01-01

    Lessons Learned: Although the HTR-PM and FSV incorporate significant differences in their designs, there are lessons to be learned that are applicable to both plants. This is especially important for key systems that incorporate first-of-a-kind equipment. Basically, these lessons are just an application of common sense. • Complexity Breeds Unavailability. Incorporate system/components that are ruggedly simple in design with a history of reliable operation and minimal maintenance. • Assure Strong Expertise and Funding for this First HTR-PM. Quite likely, the successful startup and operation of this plant will require a level of support considerably greater than a typical nuclear plant. • Be Very Attentive to the Design Aspects of first-of-a-kind Components in the Class 1, Safety-Related Portions of the Plant. For example; a generic metallurgical failure could easily lead to a very long plant shutdown in order to redesign the failed component, re-license, manufacture, install and test prior to plant resuming plant operation. • Where Possible, Test all Key Systems/Components Prior to Installation using Actual Plant Configuration & Operating Characteristics This will help assure operational capability prior to application of nuclear heat. • Never Attempt to Start an Innovative Nuclear Power Plant Without First Having the Proper Regulatory Guides and Criteria in Place. FSV was licensed as a Research Facility. There was no Standard Review Plan or Regulatory Guides in place for the NRC (or PSC) to utilize in regulating this HTGR. • Do Not Be Reluctant to Incorporate a Generous Over-Build Capability into Systems/Components. It is significantly easier to design extra margin into the original compressors, pumps and motors than to be required to backfit into larger units after plant start-up. • Assure All Safety Documents Reflect the Actual Capability of the Plant to Respond to Accidents Described in the Safety Analysis. FSV was limited to 82% power during the

  12. Application of quality assurance to the design, procurement and construction of the fast flux test facility

    International Nuclear Information System (INIS)

    Garland, D.L.; Glasscock, R.B.

    1978-01-01

    Experience has clearly demonstrated the need for effective quality assurance programmes throughout the design, procurement and construction phases of the Fast Flux Test Facility (FFTF). Formal quality assurance programmes for FFTF have contributed significantly to the achievement of project objectives thus far in a safe, reliable and predictable manner. Quality assurance programmes empolyed by major FFTF Project participants are based on the requirements of RDT Standard F 2-2, one of the first and most comprehensive standards of its kind. RDT F 2-2 is similar in its basic requirements to ANSI N45.2 and other quality assurance programme standards but differs in its degree of specificity, particularly in its coverage of development activities. RDT F 2-2 is widely applied to a variety of large and small nuclear energy development projects and technology programmes. Full implementation of RDT F 2-2 across the FFTF Project has had its problems and rewards. Problems have been encountered involving misinterpretation or overapplication of requirements. In some instances the problems pointed to the need for more specific requirements, and so the standard was amended to rectify the shortcomings. One valuable lesson learned is that feedback of use experience is essential to the development of a living, viable standard which can be beneficially applied to other projects. Benefits and cost savings have accrued from the preventive aspects of RDT F 2-2. Some examples of experiences and resulting amendments to RDT F 2-2, and their favourable impact on facility costs and schedule, are discussed in this paper. (author)

  13. 48 CFR 1552.235-78 - Data Security for Toxic Substances Control Act Confidential Business Information (DEC 1997).

    Science.gov (United States)

    2010-10-01

    ...: Data Security for Toxic Substances Control Act Confidential Business Information (DEC 1997) The... 48 Federal Acquisition Regulations System 6 2010-10-01 2010-10-01 true Data Security for Toxic Substances Control Act Confidential Business Information (DEC 1997). 1552.235-78 Section 1552.235-78 Federal...

  14. Software Quality Assurance Audits Guidebooks

    Science.gov (United States)

    1990-01-01

    The growth in cost and importance of software to NASA has caused NASA to address the improvement of software development across the agency. One of the products of this program is a series of guidebooks that define a NASA concept of the assurance processes that are used in software development. The Software Assurance Guidebook, NASA-GB-A201, issued in September, 1989, provides an overall picture of the NASA concepts and practices in software assurance. Second level guidebooks focus on specific activities that fall within the software assurance discipline, and provide more detailed information for the manager and/or practitioner. This is the second level Software Quality Assurance Audits Guidebook that describes software quality assurance audits in a way that is compatible with practices at NASA Centers.

  15. 7 CFR 981.75 - Confidential nature of records and reports.

    Science.gov (United States)

    2010-01-01

    ... Section 981.75 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (Marketing Agreements and Orders; Fruits, Vegetables, Nuts), DEPARTMENT OF AGRICULTURE ALMONDS..., financial condition, or business operations of any handler shall be considered as confidential information...

  16. Data Quality Assurance Governance

    OpenAIRE

    Montserrat Gonzalez; Stephanie Suhr

    2016-01-01

    This deliverable describes the ELIXIR-EXCELERATE Quality Management Strategy, addressing EXCELERATE Ethics requirement no. 5 on Data Quality Assurance Governance. The strategy describes the essential procedures and practices within ELIXIR-EXCELERATE concerning planning of quality management, performing quality assurance and controlling quality. It also depicts the overall organisation of ELIXIR with emphasis on authority and specific responsibilities related to quality assurance.

  17. Quality assurance program

    International Nuclear Information System (INIS)

    Brooks, G.L.

    The concept of levels of quality assurance as applied to CANDU-type nuclear power plant components, i.e. maintaining an appropriate cost/benefit ratio, is introduced. The design process itself has quality assurance features by virtue of multi-level review. (E.C.B.)

  18. Time for Action: Audit, Accountability and Confidential Enquiries into ...

    African Journals Online (AJOL)

    Improving the quality of care is essential for achieving reductions in maternal mortality. Audit is one of the methods which can be used to simultaneously assess as well as improve quality. This commentary discusses one type of audit – confidential enquiries into maternal death. We believe that the enthusiasm for ...

  19. Clinical psychology service users' experiences of confidentiality and informed consent: a qualitative analysis.

    Science.gov (United States)

    Martindale, S J; Chambers, E; Thompson, A R

    2009-12-01

    To explore and describe the experience of clinical psychology service users in relation to the processes associated with confidentiality and the generation of informed consent in individual therapy. A qualitative interview-based study employing interpretative phenomenological analysis was conducted with service users. User researchers were active collaborators in the study. A focus group of four users was convened to explore issues related to confidentiality and consent, which then informed the development of the semi-structured interview schedule. Twelve users of community mental health clinical psychology services were interviewed by user researchers. A user researcher and a clinical psychologist undertook joint analysis of the data. A second clinical psychologist facilitated reflexivity and wider consideration of validity issues. Four main themes were identified from the data: being referred; the participant's feelings, mental health difficulties, and their impact; relationships with workers and carers; and autonomy. The meaningfulness of processes of discussing confidentiality, and generating informed consent, can be improved by psychologists placing a greater emphasis on choice, control, autonomy, individual preferences, and actively involving the user in dialogue on repeated occasions.

  20. Quality assurance in NDT

    International Nuclear Information System (INIS)

    Krishnamoorthy, K.

    2010-01-01

    The importance of Nondestructive Testing (NDT) as a Quality Control/Quality Assurance tool in the industrial domain cannot be over-emphasized. With the rapid advancement in research and technology, the NDT field is becoming larger and more sophisticated day by day. Innovative research in materials science and digital technology is paving the way for more and more new methods in NDT technology. Although the NDT technology has improved over the years, the basic 'human factor' underlying the success of the NDT field remains the same. There are two major factors that influence the 'Quality Assurance in NDT'. First, knowledgeable and skilled NDT Operators are the most important factor in assuring the reliable test results. Second, the Management oversight of the NDT operations plays a major role in assuring the overall quality of NDT. Management responsibilities include the implementation of a Quality Management System (QMS) that focuses on the NDT operations and apply all the elements of Quality Assurance relevant to NDT. Whether the NDT operations are performed in-house or by a contractor, periodic Management Self-assessments should include the following question: How can the Management assess and improve the 'Quality Assurance in NDT'? This paper attempts to answer the above question. Some practical examples are provided to illustrate the potential quality incidents that could lead to costly failures, and the role of NDT Operator and the Management in preventing such quality incidents. Also, some guidelines are provided on how the Management can apply the elements of Quality Assurance to NDT in order to assess and improve the 'Quality Assurance in NDT'. (author)

  1. MEASUREMENT OF APPLICATION OF ISO 27001 OF CUSTOMER CELLULAR CARD CONFIDENTIALITY DATA IN PT. XYZ AREA JAKARTA

    Directory of Open Access Journals (Sweden)

    Krishna Rahadian

    2014-10-01

    Full Text Available The purpose of this study was to evaluate the effects of the process of ISO 27001 with respect to the confidentiality of customer cellular card Jakarta and to improve cellular card customer data confidentiality at PT.XYZ from data leakage of the customer data due to the third party involvement, clean-desk policy, and access right. Recommendation regarding the improvement is provided after reviewing the confidentiality of customer data. The survey in this study is conducted by questionnaire. From the evaluation results of the questionnaire, it is concluded that the larger customer data leaks are mainly caused by the external factors.

  2. 32 CFR 147.30 - Temporary eligibility for access at the confidential and secret levels and temporary eligibility...

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 1 2010-07-01 2010-07-01 false Temporary eligibility for access at the confidential and secret levels and temporary eligibility for âLâ access authorization. 147.30 Section 147.30... Temporary Access § 147.30 Temporary eligibility for access at the confidential and secret levels and...

  3. Using American sign language interpreters to facilitate research among deaf adults: lessons learned.

    Science.gov (United States)

    Sheppard, Kate

    2011-04-01

    Health care providers commonly discuss depressive symptoms with clients, enabling earlier intervention. Such discussions rarely occur between providers and Deaf clients. Most culturally Deaf adults experience early-onset hearing loss, self-identify as part of a unique culture, and communicate in the visual language of American Sign Language (ASL). Communication barriers abound, and depression screening instruments may be unreliable. To train and use ASL interpreters for a qualitative study describing depressive symptoms among Deaf adults. Training included research versus community interpreting. During data collection, interpreters translated to and from voiced English and ASL. Training eliminated potential problems during data collection. Unexpected issues included participants asking for "my interpreter" and worrying about confidentiality or friendship in a small community. Lessons learned included the value of careful training of interpreters prior to initiating data collection, including resolution of possible role conflicts and ensuring conceptual equivalence in real-time interpreting.

  4. Comparison of parental and adolescent views on the confidential interview and adolescent health risk behaviors within the gynecologic setting.

    Science.gov (United States)

    Trotman, Gylynthia E; Mackey, Eleanor; Tefera, Eshetu; Gomez-Lobo, Veronica

    2018-03-23

    To explore parental and adolescent views on the confidential interview in the gynecologic setting and compare adolescent reported risk-taking behaviors with parental perception. Anonymous surveys were administered separately to parents/guardians and adolescents between the ages of 11-17. Information pertaining to the patient's Tanner stage and reason for visit was obtained from the provider. This first phase served as the usual care group. In the second phase of the study, surveys were once again distributed after a brief educational intervention. Linear regression analysis, Wilcoxon rank sum test, and Fisher exact test were used where appropriate. Pediatric and Adolescent Gynecology clinics in two tertiary hospitals INTERVENTION: Brief educational handout on key concepts of the confidential interview MAIN OUTCOME MEASURES: Parental perception of the confidential interview and adolescent risk- taking behaviors RESULTS: A total of 248 surveys were included in the final analysis, which accounts for 62 adolescent and parent/guardian pairs in each group. The majority of parents and adolescents reported perceived benefit to the confidential interview. However, parents were less likely to rate benefits of private time specifically for their own adolescent and less than half of parents believed that adolescents should have access to private time in the gynecologic setting. Both parents/guardians and adolescents feared that the confidential interview would limit the parent's ability to take part in decision-making. The low support for confidential time for their adolescent was not different in the usual care group as compared to the intervention group, although there was a trend toward parental acceptance with increased adolescent age. Adolescents were consistently more likely to report more risk-taking behaviors than their parents perceived. There is a discord between parental perception and adolescent reports of risk taking behaviors. This is coupled with a lack of

  5. [Consent and confidentiality in occupational health practice: balance between legal requirements and ethical values].

    Science.gov (United States)

    Mora, Erika; Franco, G

    2010-01-01

    The recently introduced Italian law on the protection of workers' health states that the occupational health physician (competent physician) is required to act according to the Code of Ethics of the International Commission on Occupational Health (ICOH). This paper aims at examining the articles of legislative decree 81/2008 dealing with informed consent and confidentiality compared with the corresponding points of the ICOH Ethics Code. Analysis of the relationship between articles 25 and 39 (informed consent) and 18, 20 and 39 (confidentiality) of the decree shows that there are some points of disagreement between the legal requirements and the Code of Ethics, in particular concerning prescribed health surveillance, consent based on appropriate information (points 8, 10 and 12 of the Code) and some aspects of confidentiality (points 10, 20, 21, 22 and 23 of the Code). Although the competent physician is required to act according to the law, the decisional process could lead to a violation of workers' autonomy.

  6. Quality assurance

    OpenAIRE

    Cauchi, Maurice A.M.

    1993-01-01

    The concept of quality assurance refers more specifically to the process of objectifying and clearly enunciating goals, and providing means of assessing the outcomes. In this article the author mentions four fundamental elements of quality assurance which should be applied in the medical profession in Malta. These elements should relate to professional performance, resource utilisation, risk management and patient satisfaction. The aim of the medical professionals in Malta is to provide the b...

  7. DOE financial assurance presentation

    International Nuclear Information System (INIS)

    Huck, R.

    1990-01-01

    The presentation topic is California's approach to license application review in meeting financial assurances for the proposed Ward Valley site. The purpose of the presentation is to provide information on specific financial assurance provisions contained in 10 CFR Part 61 and how California intends to satisfy those requirements. Also, as rate setter, California intends to demonstrate how it will assure allowable costs to the rate base though a financial prudency review. The key provisions of financial assurance are: 10 CFR Section 61.61 - This provision requires an applicant to demonstrate its ability to finance licensed activities; 10 CFR Section 61.62 - This provision requires an applicant to provide assurance that sufficient funds will be available for site closure and stabilization; and 10 CFR Section 61.63 - This provision requires an applicant to provide 'a copy of a binding arrangement, such as a lease, between the applicant and the disposal site owner, so that sufficient funds will be available to cover the costs of the institutional control period.' To assist California in its determination of financial assurance compliance to be demonstrated by the applicant for Part 61 requirements, is NUREG guidance document 1199 'Standard Format and Content of a License Application for a Low-Level Radioactive Waste (LLRW) Disposal Facility.' The detailed financial assurance provisions of NUREG 1199 are then embodied in NUREG 1200, 'Standard Review Plant for the Review of a License Application for a LLRW Disposal Facility.'

  8. Specified assurance level sampling procedure

    International Nuclear Information System (INIS)

    Willner, O.

    1980-11-01

    In the nuclear industry design specifications for certain quality characteristics require that the final product be inspected by a sampling plan which can demonstrate product conformance to stated assurance levels. The Specified Assurance Level (SAL) Sampling Procedure has been developed to permit the direct selection of attribute sampling plans which can meet commonly used assurance levels. The SAL procedure contains sampling plans which yield the minimum sample size at stated assurance levels. The SAL procedure also provides sampling plans with acceptance numbers ranging from 0 to 10, thus, making available to the user a wide choice of plans all designed to comply with a stated assurance level

  9. THE INFORMATION CONFIDENTIALITY AND CYBER SECURITY IN MEDICAL INSTITUTIONS

    Directory of Open Access Journals (Sweden)

    SABAU-POPA CLAUDIA DIANA

    2015-07-01

    Full Text Available The information confidentiality and cyber security risk affects the right to confidentiality and privacy of the patient, as regulated in Romania by the Law 46/2002. The manifestation of the cyber security risk event affects the reputation of the healthcare institution and is becoming more and more complex and often due to the: development of network technology, the medical equipment connected to wifi and the electronic databases. The databases containing medical records were implemented due to automation. Thus, transforming data into medical knowledge contribute to a better understanding of the disease. Due to these factors, the measures taken by the hospital management for this type of risk are adapted to the cyber changes. The hospital objectives aim: the implementation of a robust information system, the early threats identifications and the incident reporting. Neglecting this type of risk can generate financial loss, inability to continue providing health care services for a certain period of time, providing an erroneous diagnosis, medical equipment errors etc. Thus, in a digital age the appropriate risk management for the information security and cyber risk represent a necessity. The main concern of hospitals worldwide is to align with international requirements and obtain credentials in terms of data security from the International Organisation for Standardization, which regulates the management of this type of risk. Romania is at the beginning in terms of concerns regarding the management, avoidance and mitigation of information security, the health system being most highly exposed to its manifestation. The present paper examines the concerns of the health system to the confidentiality of information and cyber security risk and its management arrangements. Thus, a set of key risk indicators is implemented and monitored for 2011-2013, using a user interface, a Dashboard, which acts as an early warning system of the manifestation of the

  10. 77 FR 60432 - Information Collection Being Reviewed by the Federal Communications Commission Under Delegated...

    Science.gov (United States)

    2012-10-03

    ... Confidentiality: There is no assurance of confidentiality provided to respondents. Privacy Impact Assessment: No... quality, utility, and clarity of the information collected; ways to minimize the burden of the collection... INFORMATION: OMB Control Number: 3060-1033. Title: Multi-Channel Video Program Distributor EEO Program Annual...

  11. 19 CFR 210.39 - In camera treatment of confidential information.

    Science.gov (United States)

    2010-04-01

    ... 19 Customs Duties 3 2010-04-01 2010-04-01 false In camera treatment of confidential information. 210.39 Section 210.39 Customs Duties UNITED STATES INTERNATIONAL TRADE COMMISSION INVESTIGATIONS OF UNFAIR PRACTICES IN IMPORT TRADE ADJUDICATION AND ENFORCEMENT Prehearing Conferences and Hearings § 210...

  12. Data-protection standards and confidentiality of HIV/AIDS status in ...

    African Journals Online (AJOL)

    Also, the article presents a preliminary assessment of the possible impact of professionalisation (and outsourcing) of workplace HIV/AIDS management on ... the development of law governing data protection and HIV/AIDS confidentiality in South Africa) and interviews conducted with workplace health managers and trade ...

  13. 10 CFR 71.37 - Quality assurance.

    Science.gov (United States)

    2010-01-01

    ... 10 Energy 2 2010-01-01 2010-01-01 false Quality assurance. 71.37 Section 71.37 Energy NUCLEAR... Package Approval § 71.37 Quality assurance. (a) The applicant shall describe the quality assurance program... quality assurance program that are applicable to the particular package design under consideration...

  14. Confidentiality Protection of User Data and Adaptive Resource Allocation for Managing Multiple Workflow Performance in Service-Based Systems

    Science.gov (United States)

    An, Ho

    2012-01-01

    In this dissertation, two interrelated problems of service-based systems (SBS) are addressed: protecting users' data confidentiality from service providers, and managing performance of multiple workflows in SBS. Current SBSs pose serious limitations to protecting users' data confidentiality. Since users' sensitive data is sent in…

  15. 21 CFR 1316.23 - Confidentiality of identity of research subjects.

    Science.gov (United States)

    2010-04-01

    ... 21 Food and Drugs 9 2010-04-01 2010-04-01 false Confidentiality of identity of research subjects. 1316.23 Section 1316.23 Food and Drugs DRUG ENFORCEMENT ADMINISTRATION, DEPARTMENT OF JUSTICE ADMINISTRATIVE FUNCTIONS, PRACTICES, AND PROCEDURES Protection of Researchers and Research Subjects § 1316.23...

  16. 37 CFR 382.4 - Confidential information and statements of account.

    Science.gov (United States)

    2010-07-01

    ... information and statements of account. (a) For purposes of this subpart, confidential information shall include statements of account and any information pertaining to the statements of account designated as... payments. (c) A statement of account shall include only such information as is necessary to verify the...

  17. Quality-Assurance Program Plan

    International Nuclear Information System (INIS)

    Kettell, R.A.

    1981-05-01

    This Quality Assurance Program Plan (QAPP) is provided to describe the Quality Assurance Program which is applied to the waste management activities conducted by AESD-Nevada Operations at the E-MAD Facility located in Area 25 of the Nevada Test Site. The AESD-Nevada Operations QAPP provides the necessary systematic and administrative controls to assure activities that affect quality, safety, reliability, and maintainability during design, procurement, fabrication, inspection, shipments, tests, and storage are conducted in accordance with established requirements

  18. 75 FR 8330 - Access to Confidential Business Information by Eastern Research Group

    Science.gov (United States)

    2010-02-24

    ... ENVIRONMENTAL PROTECTION AGENCY [EPA-HQ-OPPT-2003-0004; FRL-8812-4] Access to Confidential Business Information by Eastern Research Group AGENCY: Environmental Protection Agency (EPA). ACTION: Notice. [[Page 8331

  19. Lessons learned bulletin

    International Nuclear Information System (INIS)

    1994-05-01

    During the past four years, the Department of Energy -- Savannah River Operations Office and the Westinghouse Savannah River Company (WSRC) Environmental Restoration (ER) Program completed various activities ranging from waste site investigations to closure and post closure projects. Critiques for lessons learned regarding project activities are performed at the completion of each project milestone, and this critique interval allows for frequent recognition of lessons learned. In addition to project related lessons learned, ER also performs lessons learned critiques. T'he Savannah River Site (SRS) also obtains lessons learned information from general industry, commercial nuclear industry, naval nuclear programs, and other DOE sites within the complex. Procedures are approved to administer the lessons learned program, and a database is available to catalog applicable lessons learned regarding environmental remediation, restoration, and administrative activities. ER will continue to use this database as a source of information available to SRS personnel

  20. Changes in public attitudes towards confidential adolescent sexual and reproductive health services in Lithuania after the introduction of new legislation

    DEFF Research Database (Denmark)

    Jaruseviciene, Lina; Zaborskis, Apolinaras; Sauliune, Skirmante

    2015-01-01

    was employed to estimate absolute differences in prevalence of belief in whether or not adolescents would find confidentiality important when consulting a physician on SRH issues. A log-binomial regression model was fitted to estimate the relative changes (prevalence ratio) of the independent variables......BACKGROUND: In Lithuania, the right to confidentiality in healthcare for adolescents over the age of 16 was guaranteed in 2010 through the adoption of new legislation. This study sets out to explore changes in Lithuanian residents' attitudes towards confidentiality protection in adolescent sexual....... RESULTS: The total number of respondents was 1054 (response rate 83%) in 2005 and 1002 (response rate 80%) in 2012. The proportion of respondents who reported a belief that adolescents would find confidentiality important when seeing a physician for SRH issues increased significantly from 62% in 2005...

  1. Privacy Act System of Records: Confidential Business Information Tracking System, EPA-20

    Science.gov (United States)

    Learn about the Confidential Business Information Tracking System, including who is covered in the system, the purpose of data collection, routine uses for the system's records, and other security procedures.

  2. Training, Quality Assurance Factors, and Tools Investigation: a Work Report and Suggestions on Software Quality Assurance

    Science.gov (United States)

    Lee, Pen-Nan

    1991-01-01

    Previously, several research tasks have been conducted, some observations were obtained, and several possible suggestions have been contemplated involving software quality assurance engineering at NASA Johnson. These research tasks are briefly described. Also, a brief discussion is given on the role of software quality assurance in software engineering along with some observations and suggestions. A brief discussion on a training program for software quality assurance engineers is provided. A list of assurance factors as well as quality factors are also included. Finally, a process model which can be used for searching and collecting software quality assurance tools is presented.

  3. 40 CFR 1601.26 - Special procedures for confidential business information.

    Science.gov (United States)

    2010-07-01

    ... described in paragraph (c) of this section, the CSB shall, to the extent permitted by law, afford a business... business information. 1601.26 Section 1601.26 Protection of Environment CHEMICAL SAFETY AND HAZARD... Requesting and Disclosing Records § 1601.26 Special procedures for confidential business information. (a) In...

  4. 42 CFR 3.206 - Confidentiality of patient safety work product.

    Science.gov (United States)

    2010-10-01

    ... 42 Public Health 1 2010-10-01 2010-10-01 false Confidentiality of patient safety work product. 3... individually identifiable health information in such patient safety work product, the direct identifiers listed at 45 CFR 164.514(e)(2) have been removed. (5) Disclosure of nonidentifiable patient safety work...

  5. 77 FR 12284 - Access to Confidential Business Information; Protection Strategies Incorporated

    Science.gov (United States)

    2012-02-29

    ... Business Information; Protection Strategies Incorporated AGENCY: Environmental Protection Agency (EPA). ACTION: Notice. SUMMARY: EPA has authorized its contractor, Protection Strategies Incorporated (PSI) of... Business Information (CBI). DATES: Access to the confidential data occurred on or about February 16, 2012...

  6. Quality assurance during site construction

    International Nuclear Information System (INIS)

    Dommke, J.; Jurgutat, H.

    1980-01-01

    During the time of planing and construction of a nuclear power plant, the following proceeding is approved: - the deliverer of a nuclear power plant provides the reports fixing the quality assurance program, it means that he is responsible to write the safety analysis report, the specifications for the erection of the components, the working manuals and specifications for testing (eg nondestr. testing) - the manufacturing of components or systems will be controlled by an own independent quality assurance group, provided that this group was checked by the quality assurance group of the applicant - the TUeV with its independent assessors will fix the requirements relating to quality assurance in its assessment. On this basis the examination of the applicants specifications, working manuals, testing specifications will be done. The efficiency of quality assurance at the manufacturer and at the applicant will be checked by the TUeV specialists by considering specifications of modifications, repairs or tolerances. A mean point of the quality assurance in Germany is the dynamic adjustment, of an action on the latest state of engineering or science. If there exists a change of rules or guidelines, the quality assurance requirements have to be fit on this state in so far as it is feasible from the technical point of view. (orig./RW)

  7. Confidentiality and its limits: some contributions from Christianity.

    Science.gov (United States)

    Torrance, I R

    2003-02-01

    The issue is whether Christianity, of its nature, would seek to prevent a justifiable breach of confidentiality or could endorse it, under certain circumstances, as the act which is fundamentally more loving or more truthful. The individualistic nature of Western Christianity is noted. The Lutheran theologian Dietrich Bonhoeffer is used to show Christian support for dynamic rather than literal truth telling, and for awareness of the contexts and power relations within which persons stand.

  8. Confidential conversations between supervisor and employee as a means for improving leadership: a quasi-experimental study in hospital wards.

    Science.gov (United States)

    Kivimäki, M

    1996-11-01

    Although yearly confidential conversations between a supervisor and an employee have been recommended as a means for improving leadership, evidence on the actual effects of these conversations has been lacking. The present study therefore investigated whether confidential conversations improve perceptions of goal clarity, sufficiency of feedback and innovativeness, and elicit satisfaction with the supervisor's leadership style within the hospital setting. Nine wards were divided into one experimental group (3 wards) and two control groups (3 + 3 wards). A questionnaire on goal clarity, feedback, innovativeness and satisfaction was administered twice to every group (1st measurement: r = 186, 2nd measurement: n = 163). The experimental group began confidential conversations after the first measurement, control group 1 entered into conversations during both measurements, and control group 2 did not enter into conversations at the time of either measurement. Confidential conversations improved perceived feedback. In both measurements, the sufficiency of feedback was reported to be significantly better in the groups having conversations than in the other groups. In addition, there was a significant positive change in the perceived sufficiency of feedback in the experimental group but not in the other groups. Confidential conversations did not affect the perceptions of goal clarity and innovativeness or elicit satisfaction with the supervisor's management style.

  9. Genetic privacy and confidentiality: why they are so hard to protect.

    Science.gov (United States)

    Rothstein, M A

    1998-01-01

    Author notes that widespread concerns have been raised about protecting genetic privacy and confidentiality in insurance and employment. He argues that effective protections are difficult because complicated issues, such as the right of access to health care, are invariably implicated.

  10. The Confidentiality of Medical Secrets of Patients by the Nursing Staff

    Directory of Open Access Journals (Sweden)

    Chalkias Theodoros

    2010-01-01

    Full Text Available In this article you will find a critical discussion about the significance of confidentiality of "medical secrets" (keeping the secrets of ill people by nurses. Special cases are mentioned regarding the need to keep, or reveal the secret.

  11. 77 FR 19284 - Information Collection Being Reviewed by the Federal Communications Commission

    Science.gov (United States)

    2012-03-30

    ... to the SORN. Nature and Extent of Confidentiality: Some assurances of confidentiality are being... captioning of IP-delivered video programming would be economically burdensome: (i) the nature and cost of the... electronically file its petition for exemption, and all subsequent pleadings related to the petition. 47 CFR 79.4...

  12. Authentication Assurance Levels

    International Nuclear Information System (INIS)

    Kouzes, Richard T.; Cash, James R.; Devaney, David M.; Geelhood, Bruce D.; Hansen, Randy R.; Melton, Ronald B.; Pitts, W. Karl

    2002-01-01

    This Common Criteria approach has been applied to create a definition of Authentication Assurance Levels that can quantify the level of assurance reached for a system subject to a set of authentication procedures. The arms-control authentication application of the Common Criteria expands on more typical information security evaluations in that it must contend with information barriers and preclude sophisticated intentional subversion attempts.

  13. Metrology's role in quality assurance

    International Nuclear Information System (INIS)

    Zeederberg, L.B.

    1982-01-01

    Metrology, the science of measurement, is playing an increasing role in modern industry as part of an on-going quality assurance programme. At Escom, quality assurance was critical during the construction of the Koeberg nuclear facility, and also a function in controlling services provided by Escom. This article deals with the role metrology plays in quality assurance

  14. Quality assurance of fuel elements

    International Nuclear Information System (INIS)

    Hoerber, J.

    1980-01-01

    The quality assurance activities for reactor fuel elements are based on a quality assurance system which implies the requirements resulting from the specifications, regulations of the authorities, national standards and international rules and regulations. The quality assurance related to production of reactor fuel will be shown for PWR fuel elements in all typical fabrication steps as conversion into UO 2 -powder, pelletizing, rodmanufacture and assembling. A wide range of destructive and nondestructive techniques is applied. Quality assurance is not only verified by testing techniques but also by process monitoring by means of parameter control in production and testing procedures. (RW)

  15. Implementing hospital quality assurance policies in Iran: balancing licensing, annual evaluation, inspections and quality management systems.

    Science.gov (United States)

    Aghaei Hashjin, Asgar; Delgoshaei, Bahram; Kringos, Dionne S; Tabibi, Seyed Jamaladin; Manouchehri, Jila; Klazinga, Niek S

    2015-01-01

    The purpose of this paper is to provide an overview of applied hospital quality assurance (QA) policies in Iran. A mixed method (quantitative data and qualitative document analysis) study was carried out between 1996 and 2010. The QA policy cycle forms a tight monitoring system to assure hospital quality by combining mandatory and voluntary methods in Iran. The licensing, annual evaluation and grading, and regulatory inspections statutorily implemented by the government as a national package to assure and improve hospital care quality, while implementing quality management systems (QMS) was voluntary for hospitals. The government's strong QA policy legislation role and support has been an important factor for successful QA implementation in Iran, though it may affected QA assessment independency and validity. Increased hospital evaluation independency and repositioning, updating standards, professional involvement and effectiveness studies could increase QA policy impact and maturity. The study highlights the current QA policy implementation cycle in Iranian hospitals. It provides a basis for further quality strategy development in Iranian hospitals and elsewhere. It also raises attention about finding the optimal balance between different QA policies, which is topical for many countries. This paper describes experiences when implementing a unique approach, combining mandatory and voluntary QA policies simultaneously in a developing country, which has invested considerably over time to improve hospital quality. The experiences with a mixed obligatory/voluntary approach and comprehensive policies in Iran may contain lessons for policy makers in developing and developed countries.

  16. Software quality assurance handbook

    Energy Technology Data Exchange (ETDEWEB)

    1990-09-01

    There are two important reasons for Software Quality Assurance (SQA) at Allied-Signal Inc., Kansas City Division (KCD): First, the benefits from SQA make good business sense. Second, the Department of Energy has requested SQA. This handbook is one of the first steps in a plant-wide implementation of Software Quality Assurance at KCD. The handbook has two main purposes. The first is to provide information that you will need to perform software quality assurance activities. The second is to provide a common thread to unify the approach to SQA at KCD. 2 figs.

  17. Payers' experiences with confidential pharmaceutical price discounts: A survey of public and statutory health systems in North America, Europe, and Australasia.

    Science.gov (United States)

    Morgan, Steven G; Vogler, Sabine; Wagner, Anita K

    2017-04-01

    Institutional payers for pharmaceuticals worldwide appear to be increasingly negotiating confidential discounts off of the official list price of pharmaceuticals purchased in the community setting. We conducted an anonymous survey about experiences with and attitudes toward confidential discounts on patented pharmaceuticals in a sample of high-income countries. Confidential price discounts are now common among the ten health systems that participated in our study, though some had only recently begun to use these pricing arrangements on a routine basis. Several health systems had used a wide variety of discounting schemes in the past two years. The most frequent discount received by participating health systems was between 20% and 29% of official list prices; however, six participants reported their health system received one or more discount over the past two years that was valued at 60% or more of the list prices. On average, participants reported that confidential discounts were more common, complex, and significant for specialty pharmaceuticals than for primary care pharmaceuticals. Participants had a more favorable view of the impact of confidential discount schemes on their health systems than on the global marketplace. Overall, the frequency, complexity, and scale of confidential discounts being routinely negotiated suggest that the list prices for medicines bear limited resemblance to what many institutional payers actually pay. Copyright © 2017 The Authors. Published by Elsevier B.V. All rights reserved.

  18. 76 FR 55914 - Request for Comments on Research Across Borders: Proceedings of the International Research Panel...

    Science.gov (United States)

    2011-09-09

    ... identify and promote policies and practices that assure ethically responsible conduct of scientific... assurance ``that current rules for research participants protect people from harm or unethical treatment... personally identifiable or confidential business information that they contain. Trade secrets should not be...

  19. 22 CFR 212.38 - Predisclosure notification procedures for confidential commercial information.

    Science.gov (United States)

    2010-04-01

    ... 22 Foreign Relations 1 2010-04-01 2010-04-01 false Predisclosure notification procedures for confidential commercial information. 212.38 Section 212.38 Foreign Relations AGENCY FOR INTERNATIONAL DEVELOPMENT PUBLIC INFORMATION Access to Agency Records § 212.38 Predisclosure notification procedures for...

  20. 18 CFR 385.606 - Confidentiality in dispute resolution proceedings (Rule 606).

    Science.gov (United States)

    2010-04-01

    ... be required to disclose, any information concerning any dispute resolution communication or any communication provided in confidence to the neutral, unless: (1) All participants in the dispute resolution... reducing the confidence of participants in future cases that their communications will remain confidential...

  1. FORENSIC DNA BANKING LEGISLATION IN DEVELOPING COUNTRIES: PRIVACY AND CONFIDENTIALITY CONCERNS REGARDING A DRAFT FROM TURKISH LEGISLATION.

    Science.gov (United States)

    Ilgili, Önder; Arda, Berna

    This paper presents and analyses, in terms of privacy and confidentiality, the Turkish Draft Law on National DNA Database prepared in 2004, and concerning the use of DNA analysis for forensic objectives and identity verification in Turkey. After a short introduction including related concepts, we evaluate the draft law and provide articles about confidentiality. The evaluation reminded us of some important topics at international level for the developing countries. As a result, the need for sophisticated legislations about DNA databases, for solutions to issues related to the education of employees, and the technological dependency to other countries emerged as main challenges in terms of confidentiality for the developing countries. As seen in the Turkish Draft Law on National DNA Database, the protection of the fundamental rights and freedoms requires more care during the legislative efforts.

  2. Breathing Life into Engineering: A Lesson Study Life Science Lesson

    Science.gov (United States)

    Lawrence, Maria; Yang, Li-Ling; Briggs, May; Hession, Alicia; Koussa, Anita; Wagoner, Lisa

    2016-01-01

    A fifth grade life science lesson was implemented through a lesson study approach in two fifth grade classrooms. The research lesson was designed by a team of four elementary school teachers with the goal of emphasizing engineering practices consistent with the "Next Generation Science Standards" (NGSS) (Achieve Inc. 2013). The fifth…

  3. Security, privacy, and confidentiality issues on the Internet

    OpenAIRE

    Kelly, Grant; McKenzie, Bruce

    2002-01-01

    We introduce the issues around protecting information about patients and related data sent via the Internet. We begin by reviewing three concepts necessary to any discussion about data security in a healthcare environment: privacy, confidentiality, and consent. We are giving some advice on how to protect local data. Authentication and privacy of e-mail via encryption is offered by Pretty Good Privacy (PGP) and Secure Multipurpose Internet Mail Extensions (S/MIME). The de facto Internet standa...

  4. Half of Vermont Academic and Public Libraries Lack Written Confidentiality Policies Despite Directors’ Support for Principles of Patron Confidentiality. A Review of: Magi, Trina J., “The Gap between Theory and Practice: A Study of the Prevalence and Strength of Patron Confidentiality Policies in Public and Academic Libraries.” Library & Information Science Research 29 (2007: 455-70.

    Directory of Open Access Journals (Sweden)

    Stephanie Walker

    2008-09-01

    Full Text Available Objectives – To examine the prevalence and strength of patron confidentiality policies and practices at academic and public libraries in Vermont; to examine variances in policies by type and size of library and by qualifications of library directors; and to examine the level of support among Vermont library directors for strengthening state law to clarify that personally identifiable information about library patrons is confidential and should only be released with a court order.Design – Survey (non-randomized of 213 library directors.Setting – Academic and public libraries in Vermont (USA.Subjects – The initial audience was defined to be the directors of the 213 academic and public libraries in Vermont (as the persons to whom the survey was directed. Ultimately, results from 149 returned surveys were used as a basis for analysis. In addition, a written report of the information gathered was provided to the governing bodies of the Vermont Department of Libraries and the Vermont Library Association. The author also anticipates that the results of the survey will be of general interest to academic and public librarians.Methods – A literature review of previous research on library policies and practices regarding patron confidentiality was completed. As well, the author examined the various state and federal laws and library association codes of ethics which address issues of the confidentiality of library patron data. A paper questionnaire was mailed on January 11, 2006, to directors of 188 municipal and incorporated public libraries (including 11 combined public and school libraries and 25 college and university libraries, for a total of 213 libraries targeted. Cover letters explaining the purpose of the study and assuring respondents of the confidentiality of their responses were included in the mailing. The contact information came from a list supplied by the Vermont Department of Libraries. The questionnaire had previously been

  5. Applying failure mode effects and criticality analysis in radiotherapy: Lessons learned and perspectives of enhancement

    International Nuclear Information System (INIS)

    Scorsetti, Marta; Signori, Chiara; Lattuada, Paola; Urso, Gaetano; Bignardi, Mario; Navarria, Pierina; Castiglioni, Simona; Mancosu, Pietro; Trucco, Paolo

    2010-01-01

    Introduction: The radiation oncology process along with its unique therapeutic properties is also potentially dangerous for the patient, and thus it should be delivered under a systematic risk control. To this aim incident reporting and analysis are not sufficient for assuring patient safety and proactive risk assessment should also be implemented. The paper accounts for some methodological solutions, lessons learned and opportunities for improvement, starting from the systematic application of the failure mode effects and criticality analysis (FMECA) technique to the radiotherapy process of an Italian hospital. Materials and methods: The analysis, performed by a working group made of experts of the radiotherapy unit, was organised into the following steps: (1) complete and detailed analysis of the process (integration definition for function modelling); (2) identification of possible failure modes (FM) of the process, representing sources of adverse events for the patient; (3) qualitative risk assessment of FMs, aimed at identifying priorities of intervention; (4) identification and planning of corrective actions. Results: Organisational and procedural corrective measures were implemented; a set of safety indexes for the process was integrated within the traditional quality assurance indicators measured by the unit. A strong commitment of all the professionals involved was observed and the study revealed to be a powerful 'tool' for dissemination of patient safety culture. Conclusion: The feasibility of FMECA in fostering radiotherapy safety was proven; nevertheless, some lessons learned as well as weaknesses of current practices in risk management open to future research for the integration of retrospective methods (e.g. incident reporting or root cause analysis) and risk assessment.

  6. 12 CFR 366.13 - What is my obligation regarding confidential information?

    Science.gov (United States)

    2010-01-01

    ... services on your behalf may use or disclose information obtained from us or a third party in connection... general public. (b) The following are examples of when your use of confidential information is... financial information, such as a financial statement to an unauthorized party. ...

  7. Seeking legitimacy for new assurance forms: The case of assurance on sustainability reporting

    NARCIS (Netherlands)

    O'Dwyer, B.; Owen, D.; Unerman, J.

    2011-01-01

    Based on the development of a more refined conception of legitimacy than has been used in prior audit/assurance and sustainability accounting research, this paper analyses how the legitimation processes adopted by sustainability assurance practitioners in a large professional services firm have

  8. An investigative analysis of information assurance issues associated with the GIG's P&P architecture

    Science.gov (United States)

    Farroha, B. S.; Cole, R. G.; Farroha, D. L.; DeSimone, A.

    2007-04-01

    The Global Information Grid (GIG) is a collection of systems, programs and initiatives aimed at building a secure network and set of information capabilities modeled after the Internet. The GIG is expected to facilitate DoD's transformation by allowing warfighters, policy makers and support personnel to engage in rapid decision making. The roadmap is designed to take advantage of converged services of voice, data, video, and imagery over common data links. The vision is to have commanders identify threats more effectively, make informed decisions, and respond with greater precision and lethality. The information advantage gained through the GIG and network-centric warfare (NCW) allows a warfighting force to achieve dramatically improved information positions, in the form of common operational pictures that provide the basis for shared situational awareness and knowledge, and a resulting increase in combat power. The GIG Precedence and Preemption (P&P) requirements stem from the need to utilize scarce resources at critical times in the most effective way in support of national security, the intelligence community and the war-fighter. Information Assurance (IA) enables all information and data to be available end-to-end to support any mission without delay in accordance to the sensitivity of the task. Together, P&P and IA ensure data availability integrity, authentication, confidentiality, and non-repudiation. This study addresses and analyzes the QoS and P & P requirements and architecture for the GIG. Threat scenarios are presented and used to evaluate the reference architectures. The goal of the study is to assess the Information Assurance concerns associated with implementing Precedence and Preemption within the GIG and to guarantee an acceptable minimum level of security and protection for DoD networks.

  9. The Knitting Lesson.

    Science.gov (United States)

    Smith, Pamela

    1987-01-01

    Based on Jean-Francois Millet's 1869 painting, "The Knitting Lesson," this lesson's goal is to introduce students in grades seven through nine to genre (everyday life) painting the nineteenth century. The lesson is also designed to show that some aspects of genre may be timeless. (BSR)

  10. 75 FR 56096 - Access to Confidential Business Information by Industrial Economics Incorporated

    Science.gov (United States)

    2010-09-15

    ... ENVIRONMENTAL PROTECTION AGENCY [EPA-HQ-OPPT-2003-0004; FRL-8845-1] Access to Confidential Business Information by Industrial Economics Incorporated AGENCY: Environmental Protection Agency (EPA). ACTION: Notice. SUMMARY: EPA has authorized contractor, Industrial Economics Incorporated (IEI) of...

  11. 45 CFR 60.15 - Confidentiality of National Practitioner Data Bank information.

    Science.gov (United States)

    2010-10-01

    ... 45 Public Welfare 1 2010-10-01 2010-10-01 false Confidentiality of National Practitioner Data Bank information. 60.15 Section 60.15 Public Welfare DEPARTMENT OF HEALTH AND HUMAN SERVICES GENERAL ADMINISTRATION NATIONAL PRACTITIONER DATA BANK FOR ADVERSE INFORMATION ON PHYSICIANS AND OTHER HEALTH CARE PRACTITIONERS...

  12. 19 CFR 201.19 - Notification regarding requests for confidential business information.

    Science.gov (United States)

    2010-04-01

    ... business information. 201.19 Section 201.19 Customs Duties UNITED STATES INTERNATIONAL TRADE COMMISSION GENERAL RULES OF GENERAL APPLICATION Availability of Information to the Public Pursuant to 5 U.S.C. 552 § 201.19 Notification regarding requests for confidential business information. (a) In general. Business...

  13. Conversion of invisible metal-organic frameworks to luminescent perovskite nanocrystals for confidential information encryption and decryption.

    Science.gov (United States)

    Zhang, Congyang; Wang, Bo; Li, Wanbin; Huang, Shouqiang; Kong, Long; Li, Zhichun; Li, Liang

    2017-10-31

    Traditional smart fluorescent materials, which have been attracting increasing interest for security protection, are usually visible under either ambient or UV light, making them adverse to the potential application of confidential information protection. Herein, we report an approach to realize confidential information protection and storage based on the conversion of lead-based metal-organic frameworks (MOFs) to luminescent perovskite nanocrystals (NCs). Owing to the invisible and controlled printable characteristics of lead-based MOFs, confidential information can be recorded and encrypted by MOF patterns, which cannot be read through common decryption methods. Through our conversion strategy, highly luminescent perovskite NCs can be formed quickly and simply by using a halide salt trigger that reacts with the MOF, thus promoting effective information decryption. Finally, through polar solvents impregnation and halide salt conversion, the luminescence of the perovskite NCs can be quenched and recovered, leading to reversible on/off switching of the luminescence signal for multiple information encryption and decryption processes.

  14. Biobanks in South Africa: A global perspective on privacy and confidentiality

    Directory of Open Access Journals (Sweden)

    Riaan Rheeder

    2017-05-01

    Full Text Available The Universal Declaration of Bioethics and Human Rights (UDBHR of the United Nations Educational, Scientific and Cultural Organization (UNESCO was adopted unanimously in 2005 by the world community as a universal guideline, according to which members of the global community were accountable to each other. Research results from UNESCO show that the UDBHR has had little or no impact in South Africa (SA. The primary objective of this article is to promote awareness of the UDBHR in SA and Africa by focusing on Article 9 of the Declaration, which accepts the right to privacy and confidentiality. For this objective to be relevant in the SA context, depends on whether the guidelines of the National Department of Health’s Ethics in Health Research: Principles, Processes and Structures of 2015 acknowledge biobanks of the universally accepted ethical guidelines on privacy and confidentiality of autonomous persons and whether these guidelines are broadly in accordance with global bioethical guidelines.

  15. 42 CFR 422.210 - Assurances to CMS.

    Science.gov (United States)

    2010-10-01

    ... 42 Public Health 3 2010-10-01 2010-10-01 false Assurances to CMS. 422.210 Section 422.210 Public...) MEDICARE PROGRAM MEDICARE ADVANTAGE PROGRAM Relationships With Providers § 422.210 Assurances to CMS. (a) Assurances to CMS. Each organization will provide assurance satisfactory to the Secretary that the...

  16. 40 CFR 31.45 - Quality assurance.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 1 2010-07-01 2010-07-01 false Quality assurance. 31.45 Section 31.45... Requirements Reports, Records, Retention, and Enforcement § 31.45 Quality assurance. If the grantee's project... quality assurance practices consisting of policies, procedures, specifications, standards, and...

  17. The successful Chief Executive Officer understands quality assurance

    International Nuclear Information System (INIS)

    Hedges, D.

    1984-01-01

    The successful Chief Executive Officer (CEO) will have recognized the benefits of, and have implemented, a total quality assurance program. The quality assurance program will be adequately defined in policies and procedures such that managers and supervisors of each organizational element understand their primary and supporting roles in carrying out an effective quality assurance program. The traditional practice of having all quality assurance activities reside in a quality assurance organization will have been cast aside. Instead, the quality assurance activities necessary to achieve and assure the quality of the desired end product will have been defined and assigned to responsible organization elements. The quality assurance organization's primary role will be to define the total quality assurance program, insure that the achieving and assuring functions are assigned in policies and procedures, conduct training necessary to have management and supervisors understand the total quality assurance program, measure the effectiveness of the program and feedback measurement data for improvements in the program. The successful CEO will have implemented a quality assurance program that provides for a graded approach for application of the program based upon the importance of the intended use of the product or service. The successful CEO will rely heavily on the scheduled progress reports and assessments to measure the pulse of his organization's successes and improvement needs. This paper will describe suggested approaches for the Quality Assurance Manager to implement a quality assurance program which results in his corporation's CEO being a supporter of and a driving force in the implementation of the quality assurance program

  18. 40 CFR 160.35 - Quality assurance unit.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 23 2010-07-01 2010-07-01 false Quality assurance unit. 160.35 Section... LABORATORY PRACTICE STANDARDS Organization and Personnel § 160.35 Quality assurance unit. (a) A testing facility shall have a quality assurance unit which shall be responsible for monitoring each study to assure...

  19. 10 CFR 63.142 - Quality assurance criteria.

    Science.gov (United States)

    2010-01-01

    ... planned and periodic audits to verify compliance with all aspects of the quality assurance program and to... 10 Energy 2 2010-01-01 2010-01-01 false Quality assurance criteria. 63.142 Section 63.142 Energy... REPOSITORY AT YUCCA MOUNTAIN, NEVADA Quality Assurance § 63.142 Quality assurance criteria. (a) Introduction...

  20. Nuclear fuel quality assurance

    International Nuclear Information System (INIS)

    1976-01-01

    Full text: Quality assurance is used extensively in the design, construction and operation of nuclear power plants. This methodology is applied to all activities affecting the quality of a nuclear power plant in order to obtain confidence that an item or a facility will perform satisfactorily in service. Although the achievement of quality is the responsibility of all parties participating in a nuclear power project, establishment and implementation of the quality assurance programme for the whole plant is a main responsibility of the plant owner. For the plant owner, the main concern is to achieve control over the quality of purchased products or services through contractual arrangements with the vendors. In the case of purchase of nuclear fuel, the application of quality assurance might be faced with several difficulties because of the lack of standardization in nuclear fuel and the proprietary information of the fuel manufacturers on fuel design specifications and fuel manufacturing procedures. The problems of quality assurance for purchase of nuclear fuel were discussed in detail during the seminar. Due to the lack of generally acceptable standards, the successful application of the quality assurance concept to the procurement of fuel depends on how much information can be provided by the fuel manufacturer to the utility which is purchasing fuel, and in what form and how early this information can be provided. The extent of information transfer is basically set out in the individual vendor-utility contracts, with some indirect influence from the requirements of regulatory bodies. Any conflict that exists appears to come from utilities which desire more extensive control over the product they are buying. There is a reluctance on the part of vendors to permit close insight of the purchasers into their design and manufacturing procedures, but there nevertheless seems to be an increasing trend towards release of more information to the purchasers. It appears that

  1. 7 CFR 652.7 - Quality assurance.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 6 2010-01-01 2010-01-01 false Quality assurance. 652.7 Section 652.7 Agriculture... assurance. (a) NRCS will review, in consultation with the Farm Service Agency, as appropriate, the quality... information obtained through its quality assurance process, documentation submitted by the technical service...

  2. 10 CFR 76.93 - Quality assurance.

    Science.gov (United States)

    2010-01-01

    ... 10 Energy 2 2010-01-01 2010-01-01 false Quality assurance. 76.93 Section 76.93 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) CERTIFICATION OF GASEOUS DIFFUSION PLANTS Safety § 76.93 Quality assurance. The Corporation shall establish, maintain, and execute a quality assurance program satisfying each of...

  3. The history of a lesson

    DEFF Research Database (Denmark)

    Rasmussen, Mikkel Vedby

    2003-01-01

    and emphasises the need to study the history of lessons rather than the lessons of history. This approach shows that Munich is the end point of a constitutive history that begins in the failure of the Versailles treaty to create a durable European order following the First World War. The Munich lesson is thus......The article investigates the concept of lessons in IR. By means of a constructivist critique of the 'lessons literature', the article analyses one of the most important of IR lessons: that of Munich. Examining how the Munich lesson came about, the article shows the praxeological nature of lessons...... one element of the lesson of Versailles, which is a praxeology that defines how the West is to make peace, and against whom peace must be defended. The lesson of Versailles has been, at least in part, constitutive of the outbreak of the Cold War, and it continues to define the Western conception...

  4. 78 FR 54889 - Proposed Information Collection Request; Comment Request; Confidentiality Rules (Renewal)

    Science.gov (United States)

    2013-09-06

    ... received will be included in the public docket without change including any personal information provided, unless the comment includes profanity, threats, or information claimed to be Confidential Business... of appropriate automated electronic, mechanical, or other technological collection techniques or...

  5. Advances in global development and deployment of small modular reactors and incorporating lessons learned from the Fukushima Daiichi accident into the designs of engineered safety features of advanced reactors

    International Nuclear Information System (INIS)

    Hadid Subki, M.; )

    2014-01-01

    The IAEA has been facilitating the Member States in incorporating the lessons-learned from the Fukushima Dai-ichi Accident into the designs of engineered safety features of advanced reactors, including small modular reactors. An extended assessment is required to address challenges for advancing reactor safety in the new evolving generation of SMR plants to preserve the historic lessons in safety, through: assuring the diversity in emergency core cooling systems following loss of onsite AC power; ensuring diversity in reactor depressurization following a transient or accident; confirming independence in reactor trip and safety systems for sensors, power supplies and actuation systems, and finally diversity in maintaining containment integrity following a severe accident

  6. Quality assurance in radiodiagnosis

    International Nuclear Information System (INIS)

    Ghilardi Netto, T.; Sao Paulo Univ., Ribeirao Preto

    1983-01-01

    The following topics are dealt with: 1) the importance of the application of a quality assurance program in radiodiagnosis, with its main consequences : improvement of imaging quality, reduction of the patient expossure rate, cost reduction and 2) how to introduce the quality assurance control in the radiodiagnostic area. (M.A.) [pt

  7. The Psychological Competence of Police Officers in Confidential Cooperation with Citizens

    Science.gov (United States)

    Uspanov, Zholdybai T.; Turabayeva, Dana S.; Ermolovich, Vladimir F.

    2016-01-01

    This research studied the psychological aspects of citizens' assistance to law enforcement agencies on a confidential basis. The comprehensive observance of the psychological norms of cooperation is determined by the professional ethics of police officers, the necessity of nondisclosure of investigation secrets by citizens, and the security of the…

  8. 30 CFR 74.9 - Quality assurance.

    Science.gov (United States)

    2010-07-01

    ... 30 Mineral Resources 1 2010-07-01 2010-07-01 false Quality assurance. 74.9 Section 74.9 Mineral... DUST SAMPLING DEVICES Requirements for Continuous Personal Dust Monitors § 74.9 Quality assurance. (a) General requirements. The applicant shall establish and maintain a quality control system that assures...

  9. 40 CFR 30.54 - Quality assurance.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 1 2010-07-01 2010-07-01 false Quality assurance. 30.54 Section 30.54... NON-PROFIT ORGANIZATIONS Post-Award Requirements Reports and Records § 30.54 Quality assurance. If the... data generation, the grantee shall develop and implement quality assurance practices consisting of...

  10. Quality assurance in nuclear medicine

    International Nuclear Information System (INIS)

    Kaul, A.

    1986-01-01

    'Quality Assurance in Nuclear Medicine' is the title of the English language original that has been translated into German. The manual very extensively deals with quality control of nuclear medical equipment. Tests are explained for checking radioactivity measuring devices, manual and automatic in-vitro sample measuring systems, in-vivo measuring systems with single or multiple detectors, rectlinear scanners, and gamma cameras, including the phantoms required for the methods. Other chapters discuss the quality control of radiopharmaceuticals, or the quality assurance in data recording and evaluation of results. Helpful comments on the organisation of quality assurance programms are given. The book is intended as a practical guide for introducing quality assurance principles in nuclear medicine in the Federal Republic of Germany. With 13 figs., 22 tabs [de

  11. Quality assurance in individual monitoring: A summary of the EURADOS survey 2012

    International Nuclear Information System (INIS)

    Gilvin, P.; Alves, J.G.; Cherestes, C.; Dijk, J.W.E. van; Lehtinen, M.; Rossi, F.; Vekic, B.

    2014-01-01

    EURADOS Working Group 2 (WG2) on Harmonization of Individual Monitoring is a network of individual monitoring services (IMSs) that aims to promote quality, technical excellence and good practice in European Member States. To help to improve quality, in 2012 EURADOS WG2 carried out a survey of IMSs in Europe. The survey was sent to about 170 IMS and included questions on: the use of formal quality assurance (QA) standards, QA in dosimetry, matters of practice, and common sources of error. The present paper summarises the main findings of the survey, and compares them with those of an earlier study (2003). The survey found that profile of QA is high amongst the responding IMSs, and that most are following good practice. A majority of services comply with formal quality standards and good attention is paid to traceability, method validation and proficiency testing. There are some areas where lessons can be learned, for example in the assessment of measurement uncertainty; and it remains very instructive to see what the main causes of error are for IMSs in general. - Highlights: • EURADOS has surveyed QA practice amongst European dosimetry services. • The survey was comprehensive, covering most of the monitored workers in Europe. • The profile of QA among IMS is reassuringly high. • Many services follow formal QA standards, e.g. ISO 17025. • But there are still some lessons that can be learned

  12. 76 FR 69722 - Access to Confidential Business Information by Protection Strategies Incorporated

    Science.gov (United States)

    2011-11-09

    ... Business Information by Protection Strategies Incorporated AGENCY: Environmental Protection Agency (EPA... Control Act (TSCA) confidential business information and to provide notice that this contract has been extended until December 31, 2011. Protection Strategies Incorporated (PSI) has been the owner of Eagle...

  13. BYU Food Quality Assurance Laboratory

    Data.gov (United States)

    Federal Laboratory Consortium — The Quality Assurance Lab is located in the Eyring Science Center in the department of Nutrition, Dietetics, and Food Science. The Quality Assurance Lab has about 10...

  14. [Quality assurance in human genetic testing].

    Science.gov (United States)

    Stuhrmann-Spangenberg, Manfred

    2015-02-01

    Advances in technical developments of genetic diagnostics for more than 50 years, as well as the fact that human genetic testing is usually performed only once in a lifetime, with additional impact for blood relatives, are determining the extraordinary importance of quality assurance in human genetic testing. Abidance of laws, directives, and guidelines plays a major role. This article aims to present the major laws, directives, and guidelines with respect to quality assurance of human genetic testing, paying careful attention to internal and external quality assurance. The information on quality assurance of human genetic testing was obtained through a web-based search of the web pages that are referred to in this article. Further information was retrieved from publications in the German Society of Human Genetics and through a PubMed-search using term quality + assurance + genetic + diagnostics. The most important laws, directives, and guidelines for quality assurance of human genetic testing are the gene diagnostics law (GenDG), the directive of the Federal Medical Council for quality control of clinical laboratory analysis (RiliBÄK), and the S2K guideline for human genetic diagnostics and counselling. In addition, voluntary accreditation under DIN EN ISO 15189:2013 offers a most recommended contribution towards quality assurance of human genetic testing. Legal restraints on quality assurance of human genetic testing as mentioned in § 5 GenDG are fulfilled once RiliBÄK requirements are followed.

  15. Thoughts on Internal and External Quality Assurance

    Science.gov (United States)

    Zhang, Jianxin

    2012-01-01

    Quality assurance of higher education is made up of two parts: internal quality assurance (IQA) and external quality assurance (EQA). Both belong to a union of the coexistence and balance of yin and yang. But in reality there exists a paradox of "confusion of quality assurance (QA) subject consciousness, singularity of social QA and lack of QA…

  16. Concepts of nuclear quality assurance

    International Nuclear Information System (INIS)

    Randers, G.; Morris, P.A.; Pomeroy, D.

    1976-01-01

    While the safety record of the nuclear industry continues to be excellent, the forced outage rates for recent years continue to be 15% or more. Quality assurance, therefore, needs to be applied not only to nuclear safety matters, but to the goals of increased productivity and reduced construction and operating costs. Broadening the application of the general concept of quality assurance in this way leads to the introduction of reliability technology. The total activity might better be called reliability assurance. That effective quality assurance systems do pay off is described by examples from the utility industry, from a manufacturer of instruments and systems and from the experience of Westinghouse Electric Company's manufacturing divisions. The special situation of applying quality assurance to nuclear fuel is discussed. Problems include the lack of a fully developed regulatory policy in this area, incomplete understanding of the mechanism for pellet-clad interaction failures, incomplete access to manufacturers design and process information, inability to make desirable changes on a timely basis and inadequate feedback of irradiation experience. (author)

  17. Anonymous or confidential HIV counseling and voluntary testing in federally funded testing sites--United States, 1995-1997.

    Science.gov (United States)

    1999-06-25

    Human immunodeficiency virus (HIV) counseling and voluntary testing (CT) programs have been an important part of national HIV prevention efforts since the first HIV antibody tests became available in 1985. In 1995, these programs accounted for approximately 15% of annual HIV antibody testing in the United States, excluding testing for blood donation. CT opportunities are offered to persons at risk for HIV infection at approximately 11,000 sites, including dedicated HIV CT sites, sexually transmitted disease (STD) clinics, drug-treatment centers, hospitals, and prisons. In 39 states, testing can be obtained anonymously, where persons do not have to give their name to get tested. All states provide confidential testing (by name) and have confidentiality laws and regulations to protect this information. This report compares patterns of anonymous and confidential testing in all federally funded CT programs from 1995 through 1997 and documents the importance of both types of testing opportunities.

  18. Quality assurance in plant engineering

    International Nuclear Information System (INIS)

    Ohsumi, Morimichi

    1977-01-01

    Quality assurance is defined as the intentional and systematic activity carried out to obtain such reliability that the functions of nuclear power generating plants are demonstrated during the plant operation, and the section in charge has the role to organize, adjust and communicate so that the related sections can work smoothly. There are many documents concerning the quality assurance, such as quality assurance basic program, quality assurance manual, quality control plan and its manual and many specifications, etc. The content of the quality assurance is different for every step of plant planning such as at inquiry and order receiving, and prior to manufacturing, for example, inspection specification being decided for the material and the welded parts of classified pipings at the step of order receiving. Document management, engineering schedule and the custody of quality records are also quality assurance activities. Design management is controlled step by step; plant planning including safety analysis, overall layout plan, conceptual design of buildings, aseismatic design guide, heat balance and so on, system design mainly with system description, piping design including piping specification, standard dimensions of edge preparation, piping and valve lists, inspection manual, etc., detailed design, standardization of piping and design review, etc. are explained. The management of the intermediate between soft and hard parts consists of the quality check for material manufacturers and shipment inspection, etc. (Nakai, Y.)

  19. 75 FR 44951 - Inquiry To Learn Whether Businesses Assert Business Confidentiality Claims

    Science.gov (United States)

    2010-07-30

    ... such treatment. Certain businesses, however, do not meet the definition of ``affected business,'' and... definition of ``affected business,'' and are not covered by today's notice. They consist of any business that... Businesses Assert Business Confidentiality Claims AGENCY: Environmental Protection Agency (EPA). ACTION...

  20. 76 FR 362 - Inquiry To Learn Whether Businesses Assert Business Confidentiality Claims

    Science.gov (United States)

    2011-01-04

    ... claims for such treatment. Certain businesses, however, do not meet the definition of ``affected business.... Certain businesses, however, do not meet the definition of ``affected business,'' and are not covered by... Businesses Assert Business Confidentiality Claims AGENCY: Environmental Protection Agency (EPA). ACTION...

  1. Scheduler-specific Confidentiality for Multi-Threaded Programs and Its Logic-Based Verification

    NARCIS (Netherlands)

    Huisman, Marieke; Ngo, Minh Tri

    2011-01-01

    Observational determinism has been proposed in the literature as a way to ensure confidentiality for multi-threaded programs. Intuitively, a program is observationally deterministic if the behavior of the public variables is deterministic, i.e., independent of the private variables and the

  2. 75 FR 55577 - Clean Water Act; Contractor Access to Confidential Business Information

    Science.gov (United States)

    2010-09-13

    ... ENVIRONMENTAL PROTECTION AGENCY [FRL-9200-8] Clean Water Act; Contractor Access to Confidential... Recovery Act (RCRA). Transfer of the information will allow the contractor and subcontractors to access... contractors and subcontractors over the history of the effluent guidelines program. EPA determined that this...

  3. 77 FR 60962 - Clean Water Act; Contractor Access to Confidential Business Information

    Science.gov (United States)

    2012-10-05

    ... ENVIRONMENTAL PROTECTION AGENCY 40 CFR Part 2 [FRL-9733-8] Clean Water Act; Contractor Access to... transfer of confidential business information to contractor, subcontractors, and consultants. SUMMARY: The... certain industries. We have determined that the contractors listed below require access [[Page 60963

  4. 75 FR 60452 - Clean Water Act; Contractor Access to Confidential Business Information

    Science.gov (United States)

    2010-09-30

    ... ENVIRONMENTAL PROTECTION AGENCY [FRL-9208-9] Clean Water Act; Contractor Access to Confidential... electric industry to a new subcontractor of a contractor, Eastern Research Group (ERG). EPA previously... contractors and subcontractors to access information necessary to support EPA in the planning, development...

  5. Quality assurance management policies and requirements

    International Nuclear Information System (INIS)

    1985-10-01

    The purpose of this document is to: set forth overall, integrated quality assurance management policies and requirements for the entire Civilian Radioactive Waste Management Program; define management responsibilities for assuring quality; and provide a general framework for the development of more detailed quality assurance management policies and requirements by program, project, and contractor organizations

  6. Quality assurance in the nuclear industry

    International Nuclear Information System (INIS)

    Knoedler, D.

    1978-01-01

    Quality assurance is the sum of all activities systematically planned, practiced, and controlled with the aim to assure the quality of deliveries and performances. This assurance today covers all phases of activities, from the planning (including a determination of the required and necessary quality characteristics) to the start-up of a plant. (orig./RW) [de

  7. Chapter 8: Quality assurance

    International Nuclear Information System (INIS)

    2001-01-01

    The main efforts of Nuclear Regulatory Authority of the Slovak Republic (UJD) have been focused on inspection of quality assurance programmes of Slovak Power Stations, plc. and its daughter companies at Bohunice and Mochovce. Two quality assurance inspections in the area of periodical in service inspections (V-2 units) and tests of selected equipment (NPP V-2 units) and operation control (V-1 units) has been performed at NPPs Bohunice. One violation of decree on quality assurance of selected equipment has been found in the area of documentation archiving. The inspection concerning the implementation of quality assurance programme for operation of NPP Mochovce in the area of operation control has been performed focused on safety aspects of operation, operational procedures, control of operational events and feedback from operational experience. The results of this inspection were positive. Inspection of implementation of quality assurance programme for operation of radioactive waste repository (RU RAW) at the Mochovce location has been performed focused on receiving of containers, with radioactive wastes, containers handling, radiation monitoring, activities of documentation control and radiation protection at the repository site. No serious deficiencies have been found out. Also one inspection of experimental nuclear installations of VUJE Trnava at Jaslovske Bohunice site has been performed focused on procurement control, quality audits, documentation and quality records control when performing activities at experimental nuclear installations. The activity on development of internal quality assurance system continued. The implementation of this system will assure quality and effective fulfilment enlarged tasks of UJD with limited resources for its activity. The analyses of possible use of existing internal administrative control documentation as a basis for future quality system procedures was performed in co-operation with an external specialised organisation. The

  8. Basic Study of Establishment of Quality Assurance Processes to Develop an Integrated Quality Assurance System for Nuclear Power Plant Construction

    International Nuclear Information System (INIS)

    Lim, Byungki; Moon, Byeongsuk; Lee, Jae Kyoung

    2014-01-01

    An integrated quality assurance system has necessitated carrying out quality assurance programs in a systematic manner because the opportunities to expand business in overseas markets have increased since the export of a nuclear power plant to UAE in 2009. In this study, we use PDCA method to systematically analyze the quality assurance procedures that were used in previous projects for constructing nuclear power plants. We reached a classification system of quality assurance processes at each phase of nuclear power plant construction by integrating similar work related to quality such as planning, design, equipment manufacturing, construction and start-up. We also established a hierarchy of quality assurance processes to develop an integrated quality assurance system as a technology goal to be developed later. To obtain most updated quality assurance activities, a quality assurance process is structured by integrating similar works analyzed from quality assurance procedures through PDCA cycle method. At the implementation phase of Hierarchy of quality processes and sequence of processes for constructing nuclear power plant are established in this study. Integrated quality assurance system is to be developed by connecting organizations as well as stakeholders such as owners, Architect engineering, suppliers, contractors, and sub-contractors to carry out assigned work efficiently

  9. Basic Study of Establishment of Quality Assurance Processes to Develop an Integrated Quality Assurance System for Nuclear Power Plant Construction

    Energy Technology Data Exchange (ETDEWEB)

    Lim, Byungki; Moon, Byeongsuk; Lee, Jae Kyoung [Korea Hydro and Nuclear Power Co. Ltd., Daejeon (Korea, Republic of)

    2014-05-15

    An integrated quality assurance system has necessitated carrying out quality assurance programs in a systematic manner because the opportunities to expand business in overseas markets have increased since the export of a nuclear power plant to UAE in 2009. In this study, we use PDCA method to systematically analyze the quality assurance procedures that were used in previous projects for constructing nuclear power plants. We reached a classification system of quality assurance processes at each phase of nuclear power plant construction by integrating similar work related to quality such as planning, design, equipment manufacturing, construction and start-up. We also established a hierarchy of quality assurance processes to develop an integrated quality assurance system as a technology goal to be developed later. To obtain most updated quality assurance activities, a quality assurance process is structured by integrating similar works analyzed from quality assurance procedures through PDCA cycle method. At the implementation phase of Hierarchy of quality processes and sequence of processes for constructing nuclear power plant are established in this study. Integrated quality assurance system is to be developed by connecting organizations as well as stakeholders such as owners, Architect engineering, suppliers, contractors, and sub-contractors to carry out assigned work efficiently.

  10. Tool Use Within NASA Software Quality Assurance

    Science.gov (United States)

    Shigeta, Denise; Port, Dan; Nikora, Allen P.; Wilf, Joel

    2013-01-01

    As space mission software systems become larger and more complex, it is increasingly important for the software assurance effort to have the ability to effectively assess both the artifacts produced during software system development and the development process itself. Conceptually, assurance is a straightforward idea - it is the result of activities carried out by an organization independent of the software developers to better inform project management of potential technical and programmatic risks, and thus increase management's confidence in the decisions they ultimately make. In practice, effective assurance for large, complex systems often entails assessing large, complex software artifacts (e.g., requirements specifications, architectural descriptions) as well as substantial amounts of unstructured information (e.g., anomaly reports resulting from testing activities during development). In such an environment, assurance engineers can benefit greatly from appropriate tool support. In order to do so, an assurance organization will need accurate and timely information on the tool support available for various types of assurance activities. In this paper, we investigate the current use of tool support for assurance organizations within NASA, and describe on-going work at JPL for providing assurance organizations with the information about tools they need to use them effectively.

  11. Quantum key based burst confidentiality in optical burst switched networks.

    Science.gov (United States)

    Balamurugan, A M; Sivasubramanian, A

    2014-01-01

    The optical burst switching (OBS) is an emergent result to the technology concern that could achieve a feasible network in future. They are endowed with the ability to meet the bandwidth requirement of those applications that require intensive bandwidth. There are more domains opening up in the OBS that evidently shows their advantages and their capability to face the future network traffic. However, the concept of OBS is still far from perfection facing issues in case of security threat. The transfer of optical switching paradigm to optical burst switching faces serious downfall in the fields of burst aggregation, routing, authentication, dispute resolution, and quality of service (QoS). This paper deals with employing RC4 (stream cipher) to encrypt and decrypt bursts thereby ensuring the confidentiality of the burst. Although the use of AES algorithm has already been proposed for the same issue, by contrasting the two algorithms under the parameters of burst encryption and decryption time, end-to-end delay, it was found that RC4 provided better results. This paper looks to provide a better solution for the confidentiality of the burst in OBS networks.

  12. Quantum Key Based Burst Confidentiality in Optical Burst Switched Networks

    Directory of Open Access Journals (Sweden)

    A. M. Balamurugan

    2014-01-01

    Full Text Available The optical burst switching (OBS is an emergent result to the technology concern that could achieve a feasible network in future. They are endowed with the ability to meet the bandwidth requirement of those applications that require intensive bandwidth. There are more domains opening up in the OBS that evidently shows their advantages and their capability to face the future network traffic. However, the concept of OBS is still far from perfection facing issues in case of security threat. The transfer of optical switching paradigm to optical burst switching faces serious downfall in the fields of burst aggregation, routing, authentication, dispute resolution, and quality of service (QoS. This paper deals with employing RC4 (stream cipher to encrypt and decrypt bursts thereby ensuring the confidentiality of the burst. Although the use of AES algorithm has already been proposed for the same issue, by contrasting the two algorithms under the parameters of burst encryption and decryption time, end-to-end delay, it was found that RC4 provided better results. This paper looks to provide a better solution for the confidentiality of the burst in OBS networks.

  13. Software quality assurance - seven years experience

    International Nuclear Information System (INIS)

    Malsbury, J.A.

    1987-01-01

    This paper describes seven years experience with software quality assurance at PPPL. It covers the early attempts of 1980 and 1981 to establish software quality assurance; the first attempt of 1982 to develop a complete software quality assurance plan; the significant modifications of this plan in 1985; and the future. In addition, the paper describes the role of the Quality Assurance organization within each plan. The scope of this paper is limited to discussions of the software development procedures used in the seven year period. Other software quality topics, such as configuration control or problem identification and resolution, are not discussed

  14. Gossip, stories and friendship: confidentiality in midwifery practice.

    Science.gov (United States)

    James, S

    1995-12-01

    Women often seek midwifery care as an alternative to the maternity services that are readily available within the insured health care system in Alberta. Some aspects of community-based, primary care midwifery in Alberta that characterize this alternative are the use of story-telling as a form of knowledge, the development of social connections among women seeking midwifery care, and nonauthoritarian relationships between midwives and women. In this paper, the concept of confidentiality, as it relates to these aspects of midwifery practice, is explored, using traditional, caring and feminist models of ethics.

  15. Software quality assurance

    CERN Document Server

    Laporte, Claude Y

    2018-01-01

    This book introduces Software Quality Assurance (SQA) and provides an overview of standards used to implement SQA. It defines ways to assess the effectiveness of how one approaches software quality across key industry sectors such as telecommunications, transport, defense, and aerospace. * Includes supplementary website with an instructor's guide and solutions * Applies IEEE software standards as well as the Capability Maturity Model Integration for Development (CMMI) * Illustrates the application of software quality assurance practices through the use of practical examples, quotes from experts, and tips from the authors

  16. 75 FR 4812 - Inquiry To Learn Whether Businesses Assert Business Confidentiality Claims

    Science.gov (United States)

    2010-01-29

    ..., however, do not meet the definition of ``affected business,'' and are not covered by today's notice. They.... Certain businesses, however, do not meet the definition of ``affected business,'' and are not covered by... Businesses Assert Business Confidentiality Claims AGENCY: Environmental Protection Agency (EPA). ACTION...

  17. 78 FR 79692 - Clean Water Act; Contractor Access to Confidential Business Information

    Science.gov (United States)

    2013-12-31

    ... ENVIRONMENTAL PROTECTION AGENCY [FRL-9904-94-OW] Clean Water Act; Contractor Access to... Transfer of Confidential Business Information to Contractor, Subcontractors, and Consultants. SUMMARY: The... contractors listed below require access to CBI submitted to EPA under Section 308 of the Clean Water Act (CWA...

  18. 5 CFR 213.3301 - Positions of a confidential or policy-determining nature.

    Science.gov (United States)

    2010-01-01

    ... 5 Administrative Personnel 1 2010-01-01 2010-01-01 false Positions of a confidential or policy-determining nature. 213.3301 Section 213.3301 Administrative Personnel OFFICE OF PERSONNEL MANAGEMENT CIVIL... or policy-determining nature. (a) Upon specific authorization by OPM, agencies may make appointments...

  19. Using and Disclosing Confidential Patient Information and The English Common Law: What are the Information Requirements of a Valid Consent?

    Science.gov (United States)

    Chico, Victoria; Taylor, Mark J

    2018-02-01

    The National Health Service in England and Wales is dependent upon the flow of confidential patient data. In the context of consent to the use of patient health data, insistence on the requirements of an 'informed' consent that are difficult to achieve will drive reliance on alternatives to consent. Here we argue that one can obtain a valid consent to the disclosure of confidential patient data, such that this disclosure would not amount to a breach of the common law duty of confidentiality, having provided less information than would typically be associated with an 'informed consent'. This position protects consent as a practicable legal basis for disclosure from debilitating uncertainty or impracticability and, perhaps counter-intuitively, promotes patient autonomy.

  20. An approach to total quality assurance

    International Nuclear Information System (INIS)

    Archer, L.G.

    1976-01-01

    Total Quality Assurance must be based on amalgamating three quality functions: effective quality control, competent inspection, and regularly audited Quality Assurance programmes. In applying these functions the fuel supplier must regard each of his sub-contractors as part of his own works and ensure a common policy of motivated Quality Assurance throughout his own works and those of his suppliers. (author)

  1. Quality assurance of polymer concrete

    International Nuclear Information System (INIS)

    Schulz, H.

    1984-01-01

    With polymer concrete, a whole range of organisational and functional measures have to be met in order to assure the required quality with an economic expenditure. Quality assurance begins in the design and does not end in the production, rather includes all fields of the enterprise. The following deals with a particular range of the total complex, the inspection methods for assuring the quality of machine components of polymer concrete, particularly machine tool bases, this being through the control of the raw material, the production and the finished product. (orig.) [de

  2. Managerial attitude toward quality assurance

    International Nuclear Information System (INIS)

    Kirschenmann, H.J.

    1983-01-01

    This paper will present what relationships exist between the attitude toward quality assurance and the variables of training and experience on the part of managers within the nuclear power industry. Managerial attitude toward quality assurance was measured via questionnaires submitted to managers within architect-engineering, nuclear steam supplier, and constructor firms throughout the United States. The data from the completed questionnaires were statistically analyzed using the chi-square test and conclusions were drawn. Additional study results related to major factors for positive and negative attitudes toward quality assurance will be presented

  3. DLP: REDUCED RISK OF LEAKAGE OF CONFIDENTIAL INFORMATION OF THE BANK

    Directory of Open Access Journals (Sweden)

    T. A. Andryianava

    2017-01-01

    Full Text Available Research application of DLP-system for protection of confidential information, a methodology for adapting the DLP-system to the specific activities of the organization, comparative analysis of the results of standard and adapted DLP-systems in the Bank. Developed: a technique for analyzing information security events, algorithm for responding to identified events, methodology and procedures for adapting the standard DLP-system to the specifics of the Bank’s activities. The methodology for adapting a standard DLP-system to the specifics of the Bank’s work consists of the following activities: identification of critical corporate information categories, audit of information systems, description of current risks and their assessment, introduction of rules for Bank’s critical information and setting up a DLP system in accordance with the specifics of the Bank’s work. Modernization of the configuration of a standard DLP-system includes the following procedures: selection of confidential information of the Bank based on membership criteria, setting up detection, creating perimeters and developing an algorithm for responding to identified information security events in the Bank. The algorithm is designed to improve the efficiency of the response of information security officers in cases of incident detection and describes the stages of the subsequent actions. The results of the research prove that using an adapted DLP-system significantly reduces the number of false positives, increasing the accuracy of detecting confidential information and reducing the risk of leakage of critical information outside the corporate network. The application of the adapted DLP-system in the Bank allowed to increase the speed of response of information security specialists to the information security events detected by the DLP-system adapted to the Bank, and also allowed the DLP-system to transition from the copy mode to the blocking mode of illegitimate transfer

  4. [Integrated quality assurance].

    Science.gov (United States)

    Bögel, K; Stöhr, K

    1994-07-01

    The definition of terms and connotation of "Quality", "Quality Assurance" and "Integration" lead to an analysis and understanding of inhibiting and fostering factors of the "Health Triad" of people, animals and environment. Although "Quality" is largely or ultimately determined by the consumer, there are considerable differences as this term is applied by (a) the individual consumer, (b) the dynamic producer defending or gaining markets, (c) those engaged in traditional product manufacturing, or (d) governments setting (minimum) requirements for the sake of free trade. "Quality Assurance" offers cooperation of partners all along the food chain from "pasture to table". The managerial process turned into a continuum of responsibility and agreement on processes and product characteristics. This overcomes the disadvantages of strategies stressing distinct defense barriers. In practice this philosophy of a predominant role of defence barriers proved largely partnership destructive, in that it permitted to shift responsibilities for failures and to claim administrative competence according to momentary situations and interests. "Integrated Quality Assurance" means mutual agreement of two or more partners along the food chain (e. g. feed producers, farmers, animal health industry, veterinarians and food processors) on product characteristics and production methods. It involves essential system elements including facilities, materials, manpower, information, transport, management etc. Different principles and procedures of quality assurance have been introduced in practice, including agriculture and food processing. These different approaches are not mutually exclusive but largely of complementary nature.(ABSTRACT TRUNCATED AT 250 WORDS)

  5. Law on consent and confidentiality in India: a need for clarity.

    Science.gov (United States)

    Mathiharan, Karunakaran

    2014-01-01

    The concept of informed consent specific to medical research and treatment is still alien to many medical researchers and practitioners and to millions of Indians. The doctor-patient relationship in India is governed more by trust where the doctor is the authoritative person. Therefore, the benefit of informed consent does not reach all patients in day-to-day medical practice. To complicate the issue, the Indian law is not specific about the age at which a person can give valid consent. The Indian Penal Code is silent about the legal validity of consent given by persons between 12 and 18 years of age. Similarly, the age at which the 'Right to Confidentiality' begins is yet to be defined either by the statute or by the courts. Hence, there is a need for a clear statutory provision to remove the anomalies and ambiguities regarding the age of consent to undergo invasive therapeutic or investigative procedures, participate in clinical trials, as well as define the age at which a person's right to medical confidentiality begins.

  6. Confidentiality Concerns and Sexual and Reproductive Health Care Among Adolescents and Young Adults Aged 15-25.

    Science.gov (United States)

    Copen, Casey E; Dittus, Patricia J; Leichliter, Jami S

    2016-12-01

    Data from the National Survey of Family Growth •About 7% of persons aged 15-25 would not seek sexual or reproductive health care because of concerns that their parents might find out about it. •For females aged 15-17 and 18-25, those who had confidentiality concerns were less likely to receive sexual and reproductive health services in the past year compared with those without these concerns. •Less than one-half of teenagers aged 15-17 (38.1%) spent some time alone in the past year during a visit with a doctor or other health care provider without a parent, relative, or guardian in the room. •Teenagers aged 15-17 who spent some time alone during a visit with a health care provider were more likely to have received sexual or reproductive health services in the past year compared with those who had not. Confidentiality concerns can impact adolescent and young adults' access to sexual and reproductive health services (1-4). Young people who are covered by their parents' private health insurance may be deterred from obtaining these services due to concerns that their parents might find out about it (2). Similarly, confidentiality concerns may arise because youth seeking such services may not have time alone during a visit with a health care provider (4). This report describes two measures related to confidentiality concerns and sexual and reproductive health care. All material appearing in this report is in the public domain and may be reproduced or copied without permission; citation as to source, however, is appreciated.

  7. Quality assurance considerations in nuclear waste management

    International Nuclear Information System (INIS)

    Delvin, W.L.

    1982-01-01

    Proper use of quality assurance will provide the basis for an effective management control system for nuclear waste management programs. Control is essential for achieving successful programs free from costly losses and failures and for assuring the public and regulators that the environment and health and safety are being protected. The essence of quality assurance is the conscientious use of planned and systematic actions, based on selecting and applying appropriate requirements from an established quality assurance standard. Developing a quality assurance program consists of using knowledge of the technical and managerial aspects of a project to identify and evaluate risks of loss and failure and then to select appropriate quality assurance requirements that will minimize the risks. Those requirements are integrated into the project planning documents and are carried out as specific actions during the life of the project

  8. 2. Product quality control and assurance system

    International Nuclear Information System (INIS)

    1990-01-01

    Product quality control and assurance are dealt with in relation to reliability in nuclear power engineering. The topics treated include product quality control in nuclear power engineering, product quality assurance of nuclear power plant equipment, quality assurance programs, classification of selected nuclear power equipment, and standards relating to quality control and assurance and to nuclear power engineering. Particular attention is paid to Czechoslovak and CMEA standards. (P.A.). 2 figs., 1 tab., 12 refs

  9. GSFC Safety and Mission Assurance Organization

    Science.gov (United States)

    Kelly, Michael P.

    2010-01-01

    This viewgraph presentation reviews NASA Goddard Space Flight Center's approach to safety and mission assurance. The contents include: 1) NASA GSFC Background; 2) Safety and Mission Assurance Directorate; 3) The Role of SMA-D and the Technical Authority; 4) GSFC Mission assurance Requirements; 5) GSFC Systems Review Office (SRO); 6) GSFC Supply Chain Management Program; and 7) GSFC ISO9001/AS9100 Status Brief.

  10. Assessing subject privacy and data confidentiality in an emerging region for clinical trials: United Arab Emirates.

    Science.gov (United States)

    Nair, Satish Chandrasekhar; Ibrahim, Halah

    2015-01-01

    Pharmaceutical sponsored clinical trials, formerly conducted predominantly in the United States and Europe, have expanded to emerging regions, including the Middle East. Our study explores factors influencing clinical trial privacy and confidentiality in the United Arab Emirates. Factors including concept familiarity, informed consent compliance, data access, and preservation, were analyzed to assess current practices in the Arab world. As the UAE is an emerging region for clinical trials, there is a growing need for regulations related to data confidentiality and subject privacy. Informational and decisional privacy should be viewed within the realms of Arab culture and religious background.

  11. Improving patient safety through quality assurance.

    Science.gov (United States)

    Raab, Stephen S

    2006-05-01

    Anatomic pathology laboratories use several quality assurance tools to detect errors and to improve patient safety. To review some of the anatomic pathology laboratory patient safety quality assurance practices. Different standards and measures in anatomic pathology quality assurance and patient safety were reviewed. Frequency of anatomic pathology laboratory error, variability in the use of specific quality assurance practices, and use of data for error reduction initiatives. Anatomic pathology error frequencies vary according to the detection method used. Based on secondary review, a College of American Pathologists Q-Probes study showed that the mean laboratory error frequency was 6.7%. A College of American Pathologists Q-Tracks study measuring frozen section discrepancy found that laboratories improved the longer they monitored and shared data. There is a lack of standardization across laboratories even for governmentally mandated quality assurance practices, such as cytologic-histologic correlation. The National Institutes of Health funded a consortium of laboratories to benchmark laboratory error frequencies, perform root cause analysis, and design error reduction initiatives, using quality assurance data. Based on the cytologic-histologic correlation process, these laboratories found an aggregate nongynecologic error frequency of 10.8%. Based on gynecologic error data, the laboratory at my institution used Toyota production system processes to lower gynecologic error frequencies and to improve Papanicolaou test metrics. Laboratory quality assurance practices have been used to track error rates, and laboratories are starting to use these data for error reduction initiatives.

  12. 222-S Laboratory Quality Assurance Plan. Revision 1

    International Nuclear Information System (INIS)

    Meznarich, H.K.

    1995-01-01

    This Quality Assurance Plan provides,quality assurance (QA) guidance, regulatory QA requirements (e.g., 10 CFR 830.120), and quality control (QC) specifications for analytical service. This document follows the U.S Department of Energy (DOE) issued Hanford Analytical Services Quality Assurance Plan (HASQAP). In addition, this document meets the objectives of the Quality Assurance Program provided in the WHC-CM-4-2, Section 2.1. Quality assurance elements required in the Guidelines and Specifications for Preparing Quality Assurance Program Plans (QAMS-004) and Interim Guidelines and Specifications for Preparing Quality Assurance Project Plans (QAMS-005) from the US Environmental Protection Agency (EPA) are covered throughout this document. A quality assurance index is provided in the Appendix A. This document also provides and/or identifies the procedural information that governs laboratory operations. The personnel of the 222-S Laboratory and the Standards Laboratory including managers, analysts, QA/QC staff, auditors, and support staff shall use this document as guidance and instructions for their operational and quality assurance activities. Other organizations that conduct activities described in this document for the 222-S Laboratory shall follow this QA/QC document

  13. R D software quality assurance

    Energy Technology Data Exchange (ETDEWEB)

    Hood, F.C.

    1991-10-01

    Research software quality assurance (QA) requirements must be adequate to strengthen development or modification objectives, but flexible enough not to restrict creativity. Application guidelines are needed for the different kinds of research and development (R D) software activities to assure project objectives are achieved.

  14. Project Specific Quality Assurance Plan

    International Nuclear Information System (INIS)

    Pedersen, K.S.

    1995-01-01

    This Quality Assurance Project Plan (QAPP) identifies the Westinghouse Hanford Co. (WHC) Quality Assurance (QA) program requirements for all contractors involved in the planning and execution of the design, construction, testing and inspection of the 200 Area Effluent BAT/AKART Implementation, Project W-291

  15. 48 CFR 12.208 - Contract quality assurance.

    Science.gov (United States)

    2010-10-01

    ... 48 Federal Acquisition Regulations System 1 2010-10-01 2010-10-01 false Contract quality assurance... Items 12.208 Contract quality assurance. Contracts for commercial items shall rely on contractors' existing quality assurance systems as a substitute for Government inspection and testing before tender for...

  16. 42 CFR 2.2 - Statutory authority for confidentiality of alcohol abuse patient records.

    Science.gov (United States)

    2010-10-01

    ... HUMAN SERVICES GENERAL PROVISIONS CONFIDENTIALITY OF ALCOHOL AND DRUG ABUSE PATIENT RECORDS Introduction.... (B) To qualified personnel for the purpose of conducting scientific research, management audits, financial audits, or program evaluation, but such personnel may not identify, directly or indirectly, any...

  17. Integrating quality assurance and research and development

    International Nuclear Information System (INIS)

    Dronkers, J.J.

    1985-01-01

    Quality assurance programs cannot be transferred from one organization to another without attention to existing cultures and traditions. Introduction of quality assurance programs constitutes a significant change and represents a significant impact on the organizational structure and operational mode. Quality assurance professionals are change agents, but do not know how to be effective ones. Quality assurance as a body of knowledge and experience can only become accepted when its practitioners become familiar with their role as change agents. 8 references

  18. Quality assurance within regulatory bodies

    International Nuclear Information System (INIS)

    1999-06-01

    The IAEA directed extensive efforts during the years 1991 to 1995 to the integral revision of all NUSS quality assurance publications, which were approved and issued as Safety Series No.50-C/SG-Q, Quality Assurance for Safety in Nuclear Power Plants and other Nuclear Installations (1996). When these quality assurance publications were developed, their prime focus was on requirements against which work performed by the licensees could be measured and assessed by the regulatory bodies. In this way, they only helped to facilitate the functions of regulators. No requirements or recommendations were provided on how the regulators should ensure the effective implementation of their own activities. The present publication is a first attempt to collect, integrate and offer available experience to directly support performance of regulatory activities. It presents a comprehensive compilation on the application of quality assurance principles and methods by regulatory bodies to their activities. The aim is consistent good performance of regulatory activities through a systematic approach

  19. Spatial confidentiality and GIS: re-engineering mortality locations from published maps about Hurricane Katrina

    Directory of Open Access Journals (Sweden)

    Leitner Michael

    2006-10-01

    Full Text Available Abstract Background Geographic Information Systems (GIS can provide valuable insight into patterns of human activity. Online spatial display applications, such as Google Earth, can democratise this information by disseminating it to the general public. Although this is a generally positive advance for society, there is a legitimate concern involving the disclosure of confidential information through spatial display. Although guidelines exist for aggregated data, little has been written concerning the display of point level information. The concern is that a map containing points representing cases of cancer or an infectious disease, could be re-engineered back to identify an actual residence. This risk is investigated using point mortality locations from Hurricane Katrina re-engineered from a map published in the Baton Rouge Advocate newspaper, and a field team validating these residences using search and rescue building markings. Results We show that the residence of an individual, visualized as a generalized point covering approximately one and half city blocks on a map, can be re-engineered back to identify the actual house location, or at least a close neighbour, even if the map contains little spatial reference information. The degree of re-engineering success is also shown to depend on the urban characteristic of the neighborhood. Conclusion The results in this paper suggest a need to re-evaluate current guidelines for the display of point (address level data. Examples of other point maps displaying health data extracted from the academic literature are presented where a similar re-engineering approach might cause concern with respect to violating confidentiality. More research is also needed into the role urban structure plays in the accuracy of re-engineering. We suggest that health and spatial scientists should be proactive and suggest a series of point level spatial confidentiality guidelines before governmental decisions are made

  20. Spatial confidentiality and GIS: re-engineering mortality locations from published maps about Hurricane Katrina.

    Science.gov (United States)

    Curtis, Andrew J; Mills, Jacqueline W; Leitner, Michael

    2006-10-10

    Geographic Information Systems (GIS) can provide valuable insight into patterns of human activity. Online spatial display applications, such as Google Earth, can democratise this information by disseminating it to the general public. Although this is a generally positive advance for society, there is a legitimate concern involving the disclosure of confidential information through spatial display. Although guidelines exist for aggregated data, little has been written concerning the display of point level information. The concern is that a map containing points representing cases of cancer or an infectious disease, could be re-engineered back to identify an actual residence. This risk is investigated using point mortality locations from Hurricane Katrina re-engineered from a map published in the Baton Rouge Advocate newspaper, and a field team validating these residences using search and rescue building markings. We show that the residence of an individual, visualized as a generalized point covering approximately one and half city blocks on a map, can be re-engineered back to identify the actual house location, or at least a close neighbour, even if the map contains little spatial reference information. The degree of re-engineering success is also shown to depend on the urban characteristic of the neighborhood. The results in this paper suggest a need to re-evaluate current guidelines for the display of point (address level) data. Examples of other point maps displaying health data extracted from the academic literature are presented where a similar re-engineering approach might cause concern with respect to violating confidentiality. More research is also needed into the role urban structure plays in the accuracy of re-engineering. We suggest that health and spatial scientists should be proactive and suggest a series of point level spatial confidentiality guidelines before governmental decisions are made which may be reactionary toward the threat of revealing

  1. Quality assurance techniques for activation analysis

    International Nuclear Information System (INIS)

    Becker, D.A.

    1984-01-01

    The principles and techniques of quality assurance are applied to the measurement method of activation analysis. Quality assurance is defined to include quality control and quality assessment. Plans for quality assurance include consideration of: personnel; facilities; analytical design; sampling and sample preparation; the measurement process; standards; and documentation. Activation analysis concerns include: irradiation; chemical separation; counting/detection; data collection, and analysis; and calibration. Types of standards discussed include calibration materials and quality assessment materials

  2. Reinforcing Quality Assurance in Romanian Higher Education

    Directory of Open Access Journals (Sweden)

    Ana-Maria Dima

    2010-07-01

    Full Text Available Since 1993, the quality assurance system in Romania has gained considerable experience. This experience was recently recognized in 2008 by the ENQA: European Association for Quality Assurance in Higher Education through the admission of ARACIS as a full member of EQAR: the European Quality Assurance Register. The Board of ENQA agreed to grant ARACIS’s full membership of ENQA for five years from 2 June 2009. This article explores the benefits of membership for the Romanian Agency for Quality Assurance in Higher Education – ARACIS, comparing to other regional and global quality assurance agencies networks. The common features and differences between ARACIS and other European agencies are questioned through the frameworks of ENQA and INQAAHE as a case study.

  3. Combined model of 9x9 playfair and RSA for securing confidential ...

    African Journals Online (AJOL)

    Combined model of 9x9 playfair and RSA for securing confidential information. Y.B. Zakariyau, L.J. Muhammad, A.M. Usman, A Garba. Abstract. No Abstract. Keywords: Cryptography, RSA, Playfair Cipher, Public and Secret Key. Full Text: EMAIL FULL TEXT EMAIL FULL TEXT · DOWNLOAD FULL TEXT DOWNLOAD FULL ...

  4. Research Participants' Understanding of and Reactions to Certificates of Confidentiality.

    Science.gov (United States)

    Beskow, Laura M; Check, Devon K; Ammarell, Natalie

    2014-01-01

    Certificates of Confidentiality are intended to facilitate participation in critical public health research by protecting against forced disclosure of identifying data in legal proceedings, but little is known about the effect of Certificate descriptions in consent forms. To gain preliminary insights, we conducted qualitative interviews with 50 HIV-positive individuals in Durham, North Carolina to explore their subjective understanding of Certificate descriptions and whether their reactions differed based on receiving a standard versus simplified description. Most interviewees were neither reassured nor alarmed by Certificate information, and most said it would not influence their willingness to participate or provide truthful information. However, compared with those receiving the simplified description, more who read the standard description said it raised new concerns, that their likelihood of participating would be lower, and that they might be less forthcoming. Most interviewees said they found the Certificate description clear, but standard-group participants often found particular words and phrases confusing, while simplified-group participants more often questioned the information's substance. Valid informed consent requires comprehension and voluntariness. Our findings highlight the importance of developing consent descriptions of Certificates and other confidentiality protections that are simple and accurate. These qualitative results provide rich detail to inform a larger, quantitative study that would permit further rigorous comparisons.

  5. 78 FR 68161 - Greenhouse Gas Reporting Program: Final Amendments and Confidentiality Determinations for...

    Science.gov (United States)

    2013-11-13

    ... 98 Greenhouse Gas Reporting Program: Final Amendments and Confidentiality Determinations for...-HQ-OAR-2011-0028; FRL-9845-6] RIN 2060-AR61 Greenhouse Gas Reporting Program: Final Amendments and... monitoring methodologies for electronics manufacturers covered by the Greenhouse Gas Reporting Rule. These...

  6. 21 CFR 58.35 - Quality assurance unit.

    Science.gov (United States)

    2010-04-01

    ... 21 Food and Drugs 1 2010-04-01 2010-04-01 false Quality assurance unit. 58.35 Section 58.35 Food... LABORATORY PRACTICE FOR NONCLINICAL LABORATORY STUDIES Organization and Personnel § 58.35 Quality assurance unit. (a) A testing facility shall have a quality assurance unit which shall be responsible for...

  7. Quality assurance in radiotherapy

    International Nuclear Information System (INIS)

    Groth, S.; Meghzifene, A.; Tatsuzaki, H.; Levin, V.; Izewska, J.

    2001-01-01

    Quality assurance in the management of a patient receiving radiation therapy and the role of the radiation oncologist and medical physicist in this process is described. The constraints on available personnel are recognised and the need for further education resources and IAEA activities in education for both groups described. IAEA activities in the clinical and dosimetric aspects and the resultant publications and education have contributed to a culture of quality assurance. (author)

  8. 12 CFR 261.20 - Confidential supervisory information made available to supervised financial institutions and...

    Science.gov (United States)

    2010-01-01

    ... available to supervised financial institutions and financial institution supervisory agencies. 261.20... Supervised Institutions, Financial Institution Supervisory Agencies, Law Enforcement Agencies, and Others in... institutions and financial institution supervisory agencies. (a) Disclosure of confidential supervisory...

  9. Teaching Confidentiality through Comics at One Spanish Medical School.

    Science.gov (United States)

    Lalanda, Mónica; Altisent, Rogelio; Delgado-Marroquín, Maria Teresa

    2018-02-01

    At the University of Zaragoza in Spain we developed an innovative way to teach the concept of confidentiality to medical students, which we tested by comparing the use of customized comics with more traditional methods. We proved that using comics is more attractive to students than lectures and class discussions, that it increases class participation and students' self-awareness of learning, and that it maintains the same academic results. We share our experience visually in a two-page comic. © 2018 American Medical Association. All Rights Reserved.

  10. Qualtity assurance in nuclear technology

    International Nuclear Information System (INIS)

    Roesler, U.

    1977-01-01

    The demand for safety in nuclear power plants is rooted in the Atomic Energy Act of the Federal Republic of Germany, under which 'preplanned safety' is a licensing condition. Moreover, the safety of nuclear power plants is outlined in more precise terms in the guidelines of the German Advisory Committee for Reactor Safeguards (Reaktorsicherheitskommission). The usual approach taken in this country, i.e., to establish quality assurance for each specific product, with supplementary quality assurance measures geared to systems requirements being implemented by industry, has proved to work satisfactorily. Product-based quality assurance mainly stems from the classical quality control concept, whereas systems-based quality assurance primarily is to ensure that both manufacturers and systems suppliers take all measures in advance which are needed for the satisfactory processing of an order and to achieve the quality level required. The special features and the advantages of the joint action of manufacturers, systems suppliers and experts, which are characteristic of the German approach, very clearly emerge from a comparison with practices in the United States. In the further refinement of the quality assurance concept as practised in Germany, qhich will have a particularly great impact on costs and schedules because of the manpower requirement involved, it should be carefully weighed where there are exaggerations and unnecessary complications which can no longer be justified by the demand for more safety. (orig.) [de

  11. Quality assurance program plan for Building 324

    International Nuclear Information System (INIS)

    Tanke, J.M.

    1997-01-01

    This Quality Assurance Program Plan (QAPP) provides an overview of the quality assurance program for Building 324. This plan supersedes the PNNL Nuclear Facilities Quality Management System Description, PNL-NF-QMSD, Revision 2, dated March 1996. The program applies to the facility safety structures, systems, and components and to activities that could affect safety structures, systems, and components. Adherence to the quality assurance program ensures the following: US Department of Energy missions and objectives are effectively accomplished; Products and services are safe, reliable, and meet or exceed the requirements and expectations of the user; Hazards to the public, to Hanford Site and facility workers, and to the environment are minimized. The format of this Quality Assurance Program Plan is structured to parallel that of 10 CFR 83 0.120, Quality Assurance Requirements

  12. Measurement quality assurance

    International Nuclear Information System (INIS)

    Eisenhower, E.H.

    1988-01-01

    The quality of a radiation protection program can be no better than the quality of the measurements made to support it. In many cases, that quality is unknown and is merely implied on the basis of a calibration of a measuring instrument. If that calibration is inappropriate or is performed improperly, the measurement result will be inaccurate and misleading. Assurance of measurement quality can be achieved if appropriate procedures are followed, including periodic quality control actions that demonstrate adequate performance. Several national measurement quality assurance (MQA) programs are operational or under development in specific areas. They employ secondary standards laboratories that provide a high-quality link between the National Bureau of Standards and measurements made at the field use level. The procedures followed by these secondary laboratories to achieve MQA will be described, as well as plans for similar future programs. A growing general national interest in quality assurance, combined with strong specific motivations for MQA in the area of ionizing radiation, will provide continued demand for appropriate national programs. Such programs must, however, employ procedures that are cost effective and must be developed with participation by all affected parties

  13. RAVEN Quality Assurance Activities

    Energy Technology Data Exchange (ETDEWEB)

    Cogliati, Joshua Joseph [Idaho National Lab. (INL), Idaho Falls, ID (United States)

    2015-09-01

    This report discusses the quality assurance activities needed to raise the Quality Level of Risk Analysis in a Virtual Environment (RAVEN) from Quality Level 3 to Quality Level 2. This report also describes the general RAVEN quality assurance activities. For improving the quality, reviews of code changes have been instituted, more parts of testing have been automated, and improved packaging has been created. For upgrading the quality level, requirements have been created and the workflow has been improved.

  14. Has quality assurance outlived its usefulness

    International Nuclear Information System (INIS)

    Goldenberg, N.

    1989-01-01

    This paper explores the impact that better management and increased productivity will have on the need for, and role of, quality assurance in the future. The author discusses criticisms of existing quality assurance programs

  15. To Tell, or Not to Tell; Confidentiality in an Iranian HIV Positive Patient: A Viewpoint

    Directory of Open Access Journals (Sweden)

    Mahshad Noroozi

    2017-08-01

    Full Text Available Confidentiality is a basic concept in medical ethics and protecting confidentiality is considered as physicians’ duty. In some occasions, this protection is in conflict with the right of the patient’s sexual partner, who should be informed about the possibility of being infected. The sexual partner being pregnant, the situation is going to be more complicated. In this paper, we present a case discussion with special ethical, legal, social, cultural, and religious aspects. According to this informing sexual partner with the patient’s assent, opt-out Human immunodeficiency virus (HIV screening in pregnant women and enhancing psychosocial and family support are highly recommended. Strategic changes in health system policies and regulations seem to be necessary as well.

  16. Recent Trends in Quality Assurance

    Science.gov (United States)

    Amaral, Alberto; Rosa, Maria Joao

    2010-01-01

    In this paper we present a brief description of the evolution of quality assurance in Europe, paying particular attention to its relationship to the rising loss of trust in higher education institutions. We finalise by analysing the role of the European Commission in the setting up of new quality assurance mechanisms that tend to promote…

  17. Redefining and expanding quality assurance.

    Science.gov (United States)

    Robins, J L

    1992-12-01

    To meet the current standards of excellence necessary for blood establishments, we have learned from industry that a movement toward organization-wide quality assurance/total quality management must be made. Everyone in the organization must accept responsibility for participating in providing the highest quality products and services. Quality must be built into processes and design systems to support these quality processes. Quality assurance has been redefined to include a quality planning function described as the most effective way of designing quality into processes. A formalized quality planning process must be part of quality assurance. Continuous quality improvement has been identified as the strategy every blood establishment must support while striving for error-free processing as the long-term objective. The auditing process has been realigned to support and facilitate this same objective. Implementing organization-wide quality assurance/total quality management is one proven plan for guaranteeing the quality of the 20 million products that are transfused into 4 million patients each year and for moving toward the new order.

  18. Regulatory viewpoint on nuclear fuel quality assurance

    International Nuclear Information System (INIS)

    Tripp, L.E.

    1976-01-01

    Considerations of the importance of fuel quality and performance to nuclear safety, ''as low reasonably achievable'' release of radioactive materials in reactor effluents, and past fuel performance problems demonstrate the need for strong regulatory input, review and inspection of nuclear fuel quality assurance programs at all levels. Such a regulatory program is being applied in the United States of America by the US Nuclear Regulatory Commission. Quality assurance requirements are contained within government regulations. Guidance on acceptable methods of implementing portions of the quality assurance program is contained within Regulatory Guides and other NRC documents. Fuel supplier quality assurance program descriptions are reviewed as a part of the reactor licensing process. Inspections of reactor licensee control of their fuel vendors as well as direct inspections of fuel vendor quality assurance programs are conducted on a regularly scheduled basis. (author)

  19. Network and Database Security: Regulatory Compliance, Network, and Database Security - A Unified Process and Goal

    OpenAIRE

    Errol A. Blake

    2007-01-01

    Database security has evolved; data security professionals have developed numerous techniques and approaches to assure data confidentiality, integrity, and availability. This paper will show that the Traditional Database Security, which has focused primarily on creating user accounts and managing user privileges to database objects are not enough to protect data confidentiality, integrity, and availability. This paper is a compilation of different journals, articles and classroom discussions ...

  20. Lessons learned form high-flux isotope reactor restart efforts

    International Nuclear Information System (INIS)

    Dahl, T.L.

    1989-01-01

    When the high-flux isotope reactor's (HFIR's) pressure vessel irradiation surveillance specimens were examined in December 1986, unexpected embrittlement was found. The resulting investigation disclosed widespread deficiencies in quality assurance and management practices. On March 24, 1987, the US Department of Energy (DOE) mandated a shutdown of all five Oak Ridge National Laboratory (ORNL) research reactors. Since the beginning of 1987, 18 different formal review groups have evaluated the management and operations of the HFIR. The root cause of the identified deficiencies in the HFIR program was defined as a lack of rigor in management practices and complacency built on twenty years of trouble-free operation. A number of lessons can be learned from the HFIR experience. Particular insight can be gained by comparing the HFIR organization prior to the shutdown with the organization that exists today. Key elements in such a comparison include staffing, funding, discipline, and formality in operations, maintenance, and management

  1. 45 CFR 61.14 - Confidentiality of Healthcare Integrity and Protection Data Bank information.

    Science.gov (United States)

    2010-10-01

    ... 45 Public Welfare 1 2010-10-01 2010-10-01 false Confidentiality of Healthcare Integrity and Protection Data Bank information. 61.14 Section 61.14 Public Welfare DEPARTMENT OF HEALTH AND HUMAN SERVICES GENERAL ADMINISTRATION HEALTHCARE INTEGRITY AND PROTECTION DATA BANK FOR FINAL ADVERSE INFORMATION ON...

  2. 75 FR 46948 - Medicare Program; Listening Session Regarding Confidential Feedback Reports and the...

    Science.gov (United States)

    2010-08-04

    ...] Medicare Program; Listening Session Regarding Confidential Feedback Reports and the Implementation of a... Services (CMS), HHS. ACTION: Notice of meeting. SUMMARY: This notice announces a listening session being... modifier to the fee- for-service physician fee schedule. The purpose of the listening session is to solicit...

  3. 78 FR 69337 - Greenhouse Gas Reporting Program: Amendments and Confidentiality Determinations for Fluorinated...

    Science.gov (United States)

    2013-11-19

    ...-AR78 Greenhouse Gas Reporting Program: Amendments and Confidentiality Determinations for Fluorinated... Greenhouse Gas Reporting Rule. The proposed changes would reduce the level of detail in which emissions were..., please go to the Greenhouse Gas Reporting Rule Program Web site at http://www.epa.gov/climatechange...

  4. Quality assurance of operating instructions

    International Nuclear Information System (INIS)

    Asmuss, G.

    1992-01-01

    It is pointed out that the quality assurance at nuclear power stations must be supported by national and international regulations. Quality assurance is explained using the example of the design of a pressurised water reactor. The operating and emergency manuals are discussed and examples for their structure put forward. The significance of updating is emphasised. 15 figs., 19 refs

  5. Benchmarking Software Assurance Implementation

    Science.gov (United States)

    2011-05-18

    product The chicken#. (a.k.a. Process Focused Assessment ) – Management Systems ( ISO 9001, ISO 27001 , ISO 2000) – Capability Maturity Models (CMMI...Assurance PRM, RMM, Assurance for CMMI)) – Lifecycle Processes ( ISO /IEEE 15288, ISO /IEEE 12207) – COBIT, ITIL, MS SDL, OSAMM, BSIMM 5 The egg...a.k.a Product Focused Assessments) – SCAP - NIST-SCAP – ISO /OMG W3C – KDM, BPMN, RIF, XMI, RDF – OWASP Top 10 – SANS TOP 25 – Secure Code Check Lists

  6. QAM: PROPOSED MODEL FOR QUALITY ASSURANCE IN CBSS

    Directory of Open Access Journals (Sweden)

    Latika Kharb

    2015-08-01

    Full Text Available Component-based software engineering (CBSE / Component-Based Development (CBD lays emphasis on decomposition of the engineered systems into functional or logical components with well-defined interfaces used for communication across the components. Component-based software development approach is based on the idea to develop software systems by selecting appropriate off-the-shelf components and then to assemble them with a well-defined software architecture. Because the new software development paradigm is much different from the traditional approach, quality assurance for component-based software development is a new topic in the software engineering research community. Because component-based software systems are developed on an underlying process different from that of the traditional software, their quality assurance model should address both the process of components and the process of the overall system. Quality assurance for component-based software systems during the life cycle is used to analyze the components for achievement of high quality component-based software systems. Although some Quality assurance techniques and component based approach to software engineering have been studied, there is still no clear and well-defined standard or guidelines for component-based software systems. Therefore, identification of the quality assurance characteristics, quality assurance models, quality assurance tools and quality assurance metrics, are under urgent need. As a major contribution in this paper, I have proposed QAM: Quality Assurance Model for component-based software development, which covers component requirement analysis, component development, component certification, component architecture design, integration, testing, and maintenance.

  7. Enhanced Obfuscation Technique for Data Confidentiality in Public Cloud Storage

    OpenAIRE

    Oli S. Arul; Arockiam L.

    2016-01-01

    With an advent of cloud computing, data storage has become a boon in information technology. At the same time, data storage in remote places have become important issues. Lot of techniques are available to ensure protection of data confidentiality. These techniques do not completely serve the purpose in protecting data. The Obfuscation techniques come to rescue for protecting data from malicious attacks. This paper proposes an obfuscation technique to encrypt the desired data type on the clou...

  8. Opinion of gastroenterologists towards quality assurance in endoscopy.

    Science.gov (United States)

    de Jonge, Vincent; Kuipers, Ernst J; van Leerdam, Monique E

    2011-03-01

    Quality assurance has become an important issue. Many societies are adopting quality assurance programs in order to monitor and improve quality of care. To assess the opinion of gastroenterologists towards quality assurance on the endoscopy department. A survey was sent to all gastroenterologists (n=319) in the Netherlands. It assessed their opinion on a quality assurance program for endoscopy units, including its design, logistics, and content. 200 gastroenterologists (63%) completed the questionnaire. 95% had a positive opinion towards quality assurance and 67% supposed an increase in quality. 28% assumed a negative impact on the time available for patient contact by introducing a quality assurance program and 35% that the capacity would decrease. A negative attitude towards disclosure of results to insurance companies (23%) and media (53%) was reported. Female gastroenterologists were less positive to share the results with other stakeholders (pquality measurements were assessment of complications (97%), standardised reporting (96%), and adequate patient information (95%). Gastroenterologists have a positive attitude towards quality assurance. However, concerns do exist about time investment and disclosure of results to others. Information provision and procedure characteristics were considered the most important aspects of quality assurance. Copyright © 2010 Editrice Gastroenterologica Italiana S.r.l. Published by Elsevier Ltd. All rights reserved.

  9. Quality assurance in the manufacture of pressure components

    International Nuclear Information System (INIS)

    Knoedler, D.

    1979-01-01

    New regulations for nuclear power plants emphasize more quality assurance than it was the case in the past. Quality assurance is a management tool. During erection the quality assurance measures of the manufacturer, the main contractor and the required quality and the reliability of the proof of quality. The qualification of processes, equipment and personnel is a significant measure of quality assurance. The proof for quality assurance to be effective needs not only system-oriented audits, but also product audits aimed at quality characteristics of the product itself. The existing problems of examination techniques not optimized according to latest experience and of the large volume of documetation will persist in case the existing regulations are not adjusted according to the results of relevant studies. Furthermore the effectiveness of quality assurance is too often hampered by vague definitions of the safety objectives. (orig.) [de

  10. Material quality assurance risk assessment : [summary].

    Science.gov (United States)

    2013-01-01

    With the shift from quality control (QC) of materials and placement techniques : to quality assurance (QA) and acceptance over the years, the role of the Office : of Materials Technology (OMT) has been shifting towards assurance of : material quality...

  11. 75 FR 78238 - Access to Confidential Business Information by Science Applications International Corporation and...

    Science.gov (United States)

    2010-12-15

    ... Business Information by Science Applications International Corporation and Its Identified Subcontractors..., Science Applications International Corporation (SAIC) of San Diego, CA, and Its Identified Subcontractors... Control Act (TSCA). Some of the information may be claimed or determined to be Confidential Business...

  12. 77 FR 76028 - Access to Confidential Business Information by Science Applications International Corporation and...

    Science.gov (United States)

    2012-12-26

    ... Business Information by Science Applications International Corporation and Its Identified Subcontractor...: EPA has authorized its contractor, Science Applications International Corporation (SAIC) of McLean, VA... information may be claimed or determined to be Confidential Business Information (CBI). DATES: Access to the...

  13. 78 FR 66697 - Access to Confidential Business Information by Science Applications International Corporation and...

    Science.gov (United States)

    2013-11-06

    ... Business Information by Science Applications International Corporation and Its Identified Subcontractors..., Science Applications International Corporation (SAIC) of McLean, VA, and its subcontractors to access...). Some of the information may have been claimed or determined to be Confidential Business Information...

  14. Quality assurance program for nuclear power plants

    International Nuclear Information System (INIS)

    Gamon, T.H.

    1976-02-01

    The Topical Report presented establishes and provides the basis for the Brown and Root Quality Assurance Program for Nuclear Power Plants from which the Brown and Root Quality Assurance Manual is prepared and implemented. The Quality Assurance Program is implemented by the Brown and Root Power Division during the design, procurement, and construction phases of nuclear power plants. The Brown and Root Quality Assurance Program conforms to the requirements of Nuclear Regulatory Commission Regulation 10 CFR 50, Appendix B; to approved industry standards such as ANSI N45.2 and ''Daughter Standards''; or to equivalent alternatives as indicated in the appropriate sections of the report

  15. Quality assurance program for nuclear power plants

    International Nuclear Information System (INIS)

    Gamon, T.H.

    1976-06-01

    This topical report establishes and provides the basis for the Brown and Root Quality Assurance Program for Nuclear Power Plants from which the Brown and Root Quality Assurance Manual is prepared and implemented. The Quality Assurance Program is implemented by the Brown and Root Power Division during the design, procurement, and construction phases of nuclear power plants. The Brown and Root Quality Assurance Program conforms to the requirements of Nuclear Regulatory Commission Regulation 10 CFR 50, Appendix B; to approved industry standards such as ANSI N45.2 and ''Daughter Standards''; or to equivalent alternatives as indicated in the appropriate sections of this report

  16. Materials degradation in fission reactors: Lessons learned of relevance to fusion reactor systems

    International Nuclear Information System (INIS)

    Was, Gary S.

    2007-01-01

    The management of materials in power reactor systems has become a critically important activity in assuring the safe, reliable and economical operation of these facilities. Over the years, the commercial nuclear power reactor industry has faced numerous 'surprises' and unexpected occurrences in materials. Mitigation strategies have sometimes solved one problem at the expense of creating another. Other problems have been solved successfully and have motivated the development of techniques to foresee problems before they occur. This paper focuses on three aspects of fission reactor experience that may benefit future fusion systems. The first is identification of parameters and processes that have had a large impact on the behavior of materials in fission systems such as temperature, dose rate, surface condition, gradients, metallurgical variability and effects of the environment. The second is the development of materials performance and failure models to provide a basis for assuring component integrity. Last is the development of proactive materials management programs that identify and pre-empt degradation processes before they can become problems. These aspects of LWR experience along with the growing experience with materials in the more demanding advanced fission reactor systems form the basis for a set of 'lessons learned' to aid in the successful management of materials in fusion reactor systems

  17. A Lesson about the Circular Flow. Active Learning Lessons. Economics International.

    Science.gov (United States)

    Landfried, Janet

    This lesson plan was developed through "Economics International," an international program to help build economic education infrastructures in the emerging market economies. It provides a lesson description; appropriate grade level; economic concepts; content standards and benchmarks; related subjects; instructional objectives; time…

  18. 48 CFR 2453.246 - Quality Assurance.

    Science.gov (United States)

    2010-10-01

    ... 48 Federal Acquisition Regulations System 6 2010-10-01 2010-10-01 true Quality Assurance. 2453.246 Section 2453.246 Federal Acquisition Regulations System DEPARTMENT OF HOUSING AND URBAN DEVELOPMENT CLAUSES AND FORMS FORMS Prescription of Forms 2453.246 Quality Assurance. ...

  19. Quality assurance manual: Volume 2, Appendices

    Energy Technology Data Exchange (ETDEWEB)

    Oijala, J.E.

    1988-06-01

    This paper contains quality assurance information on departments of the Stanford Linear Accelerator Center. Particular quality assurance policies and standards discussed are on: Mechanical Systems; Klystron and Microwave Department; Electronics Department; Plant Engineering; Accelerator Department; Purchasing; and Experimental Facilities Department. (LSP)

  20. Quality assurance manual: Volume 2, Appendices

    International Nuclear Information System (INIS)

    Oijala, J.E.

    1988-06-01

    This paper contains quality assurance information on departments of the Stanford Linear Accelerator Center. Particular quality assurance policies and standards discussed are on: Mechanical Systems; Klystron and Microwave Department; Electronics Department; Plant Engineering; Accelerator Department; Purchasing; and Experimental Facilities Department

  1. Quality assurance in nuclear medicine

    International Nuclear Information System (INIS)

    Paras, P.

    1978-01-01

    Quality assurance practices must be followed throughout the entire nuclear medicine process, from the initial decision to perform a particular procedure, through the interpretation and reporting of the results. The various parameters that can be defined and measured in each area must be monitored by quality control tests to assure the excellence of the total nuclear medicine process. The presentation will discuss each of the major areas of nuclear medicine quality control and their interaction as a part of the entire system. Quality control testing results and recommendations for measurements of radioactivity distribution will be described with emphasis on imaging equipment and dose calibrating instrumentation. The role of the health physicist in a quality assurance program will be stressed. (author)

  2. Application of Quality Assurance Mechanisms for Effective Library ...

    African Journals Online (AJOL)

    The main strategy used for implementation of quality assurance was integration of the library` services quality assurance agenda into the university structures and the quality assurance mechanisms available and used in Nigerian university libraries were programme accreditation and benchmarking of library systems.

  3. Methods used and lessons learnt in conducting document reviews of medical and allied health curricula - a key step in curriculum evaluation.

    Science.gov (United States)

    Rohwer, Anke; Schoonees, Anel; Young, Taryn

    2014-11-02

    This paper describes the process, our experience and the lessons learnt in doing document reviews of health science curricula. Since we could not find relevant literature to guide us on how to approach these reviews, we feel that sharing our experience would benefit researchers embarking on similar projects. We followed a rigorous, transparent, pre-specified approach that included the preparation of a protocol, a pre-piloted data extraction form and coding schedule. Data were extracted, analysed and synthesised. Quality checks were included at all stages of the process. The main lessons we learnt related to time and project management, continuous quality assurance, selecting the software that meets the needs of the project, involving experts as needed and disseminating the findings to relevant stakeholders. A complete curriculum evaluation comprises, apart from a document review, interviews with students and lecturers to assess the learnt and taught curricula respectively. Rigorous methods must be used to ensure an objective assessment.

  4. Classroom Management and Lesson Planning(4)

    Institute of Scientific and Technical Information of China (English)

    2006-01-01

    Lesson PlanningTask 1As teachers,we all need to plan our lessons before we teach.Make a list of things that you think need tobe included in a lesson plan.Then compare and discuss your list with another teacher.Also think about reasonswhy we need to plan our lessons.

  5. 45 CFR 86.4 - Assurance required.

    Science.gov (United States)

    2010-10-01

    ... SEX IN EDUCATION PROGRAMS OR ACTIVITIES RECEIVING FEDERAL FINANCIAL ASSISTANCE Introduction § 86.4 Assurance required. (a) General. Every application for Federal financial assistance for any education... Director of such assurance. (b) Duration of obligation. (1) In the case of Federal financial assistance...

  6. 40 CFR 5.115 - Assurance required.

    Science.gov (United States)

    2010-07-01

    ... EDUCATION PROGRAMS OR ACTIVITIES RECEIVING FEDERAL FINANCIAL ASSISTANCE Introduction § 5.115 Assurance... that applications for Federal financial assistance or awards of Federal financial assistance contain... official of such assurance. (b) Duration of obligation. (1) In the case of Federal financial assistance...

  7. 28 CFR 54.115 - Assurance required.

    Science.gov (United States)

    2010-07-01

    ... EDUCATION PROGRAMS OR ACTIVITIES RECEIVING FEDERAL FINANCIAL ASSISTANCE Introduction § 54.115 Assurance... that applications for Federal financial assistance or awards of Federal financial assistance contain... official of such assurance. (b) Duration of obligation. (1) In the case of Federal financial assistance...

  8. 10 CFR 1042.115 - Assurance required.

    Science.gov (United States)

    2010-01-01

    ... ACTIVITIES RECEIVING FEDERAL FINANCIAL ASSISTANCE Introduction § 1042.115 Assurance required. (a) General... applications for Federal financial assistance or awards of Federal financial assistance contain, be accompanied... assurance. (b) Duration of obligation. (1) In the case of Federal financial assistance extended to provide...

  9. Constellation Program Lessons Learned. Volume 2; Detailed Lessons Learned

    Science.gov (United States)

    Rhatigan, Jennifer; Neubek, Deborah J.; Thomas, L. Dale

    2011-01-01

    These lessons learned are part of a suite of hardware, software, test results, designs, knowledge base, and documentation that comprises the legacy of the Constellation Program. The context, summary information, and lessons learned are presented in a factual format, as known and described at the time. While our opinions might be discernable in the context, we have avoided all but factually sustainable statements. Statements should not be viewed as being either positive or negative; their value lies in what we did and what we learned that is worthy of passing on. The lessons include both "dos" and "don ts." In many cases, one person s "do" can be viewed as another person s "don t"; therefore, we have attempted to capture both perspectives when applicable and useful. While Volume I summarizes the views of those who managed the program, this Volume II encompasses the views at the working level, describing how the program challenges manifested in day-to-day activities. Here we see themes that were perhaps hinted at, but not completely addressed, in Volume I: unintended consequences of policies that worked well at higher levels but lacked proper implementation at the working level; long-term effects of the "generation gap" in human space flight development, the need to demonstrate early successes at the expense of thorough planning, and the consequences of problems and challenges not yet addressed because other problems and challenges were more immediate or manifest. Not all lessons learned have the benefit of being operationally vetted, since the program was cancelled shortly after Preliminary Design Review. We avoid making statements about operational consequences (with the exception of testing and test flights that did occur), but we do attempt to provide insight into how operational thinking influenced design and testing. The lessons have been formatted with a description, along with supporting information, a succinct statement of the lesson learned, and

  10. Quality assurance for health and environmental chemistry: 1986

    International Nuclear Information System (INIS)

    Gautier, M.A.; Gladney, E.S.; Moss, W.D.; Phillips, M.B.; O'Malley, B.T.

    1987-11-01

    This report documents the continuing quality assurance efforts of the Health and Environmental Chemistry Group at the Los Alamos National Laboratory. The philosophy, methodology, and computing resources used by the quality assurance program to encompass the diversity of analytical chemistry practiced in the group are described. Included in the report are all quality assurance reference materials used, along with their certified or consensus concentrations, and all analytical chemistry quality assurance measurements made by HSE-9 during 1986. 27 refs., 3 figs

  11. 76 FR 77816 - Access to Confidential Business Information by Guident Technologies, Inc. and Subcontractor...

    Science.gov (United States)

    2011-12-14

    ... Business Information by Guident Technologies, Inc. and Subcontractor, Impact Innovations Systems, Inc..., Guident Technologies, Inc. of Herndon, VA and subcontractor, Impact Innovations Systems, Inc. of Manassas... Control Act (TSCA). Some of the information may be claimed or determined to be Confidential Business...

  12. Classroom Management and Lesson Planning(4)

    Institute of Scientific and Technical Information of China (English)

    2006-01-01

    @@ Lesson Planning Task 1 As teachers,we all need to plan our lessons before we teach.Make a list of things that you think need to be included in a lesson plan.Then compare and discuss your list with another teacher.Also think about reasons why we need to plan our lessons.

  13. 20 CFR 603.4 - What is the confidentiality requirement of Federal UC law?

    Science.gov (United States)

    2010-04-01

    ... 20 Employees' Benefits 3 2010-04-01 2010-04-01 false What is the confidentiality requirement of Federal UC law? 603.4 Section 603.4 Employees' Benefits EMPLOYMENT AND TRAINING ADMINISTRATION, DEPARTMENT....C. 502(a)), State law must include provision for such methods of administration as are found by the...

  14. 41 CFR 102-75.320 - Does appraisal information need to be kept confidential?

    Science.gov (United States)

    2010-07-01

    ... 41 Public Contracts and Property Management 3 2010-07-01 2010-07-01 false Does appraisal information need to be kept confidential? 102-75.320 Section 102-75.320 Public Contracts and Property Management Federal Property Management Regulations System (Continued) FEDERAL MANAGEMENT REGULATION REAL PROPERTY 75-REAL PROPERTY DISPOSAL Surplus Real...

  15. Waste Management Quality Assurance Plan

    International Nuclear Information System (INIS)

    1993-01-01

    Lawrence Berkeley Laboratory's Environment Department addresses its responsibilities through activities in a variety of areas. The need for a comprehensive management control system for these activities has been identified by the Department of Energy (DOE). The WM QA (Waste Management Quality Assurance) Plan is an integral part of a management system that provides controls necessary to ensure that the department's activities are planned, performed, documented, and verified. This WM QA Plan defines the requirements of the WM QA program. These requirements are derived from DOE Order 5700.6C, Quality Assurance, the LBL Operating and Assurance Program Plan (OAP, LBL PUB-3111), and other environmental compliance documents applicable to WM activities. The requirements presented herein, as well as the procedures and methodologies that direct the implementation of these requirements, will undergo review and revisions as necessary. The provisions of this QA Plan and its implementing documents apply to quality-affecting activities performed by and for WM. It is also applicable to WM contractors, vendors, and other LBL organizations associated with WM activities, except where such contractors, vendors, or organizations are governed by their own WM-approved QA programs. References used in the preparation of this document are (1) ASME NQA-1-1989, (2) ANSI/ASQC E4 (Draft), (3) Waste Management Quality Assurance Implementing Management Plan (LBL PUB-5352, Rev. 1), (4) LBL Operating and Assurance Program Plan (OAP), LBL PUB-3111, 2/3/93. A list of terms and definitions used throughout this document is included as Appendix A

  16. Lesson Planning the Kodaly Way.

    Science.gov (United States)

    Boshkoff, Ruth

    1991-01-01

    Discusses the contribution of Zoltan Kodaly to music lesson planning. Emphasizes preparation, presentation, and practice as the three important strategies in teaching concepts and skills to be included in a lesson plan. Includes a sample lesson plan covering a semester and advice on choosing song material. (DK)

  17. Model Based Mission Assurance: Emerging Opportunities for Robotic Systems

    Science.gov (United States)

    Evans, John W.; DiVenti, Tony

    2016-01-01

    The emergence of Model Based Systems Engineering (MBSE) in a Model Based Engineering framework has created new opportunities to improve effectiveness and efficiencies across the assurance functions. The MBSE environment supports not only system architecture development, but provides for support of Systems Safety, Reliability and Risk Analysis concurrently in the same framework. Linking to detailed design will further improve assurance capabilities to support failures avoidance and mitigation in flight systems. This also is leading new assurance functions including model assurance and management of uncertainty in the modeling environment. Further, the assurance cases, a structured hierarchal argument or model, are emerging as a basis for supporting a comprehensive viewpoint in which to support Model Based Mission Assurance (MBMA).

  18. Towards improvement in quality assurance

    International Nuclear Information System (INIS)

    1987-03-01

    This first document in the series of the International Nuclear Safety Advisory Group (INSAG) Technical Notes is a general guideline for the establishment of effective quality assurance procedures at nuclear facilities. It sets out primary requirements such as quality objectives, methods for measuring the effectiveness of the quality assurance programme, priority of activities in relation to importance of safety of items, motivation of personnel

  19. Information Assurance in Saudi Organizations - An Empirical Study

    Science.gov (United States)

    Nabi, Syed Irfan; Mirza, Abdulrahman A.; Alghathbar, Khaled

    This paper presents selective results of a survey conducted to find out the much needed insight into the status of information security in Saudi Arabian organizations. The purpose of this research is to give the state of information assurance in the Kingdom and to better understand the prevalent ground realities. The survey covered technical aspects of information security, risk management and information assurance management. The results provide deep insights in to the existing level of information assurance in various sectors that can be helpful in better understanding the intricate details of the prevalent information security in the Kingdom. Also, the results can be very useful for information assurance policy makers in the government as well as private sector organizations. There are few empirical studies on information assurance governance available in literature, especially about the Middle East and Saudi Arabia, therefore, the results are invaluable for information security researchers in improving the understanding of information assurance in this region and the Kingdom.

  20. A conceptual competitive intelligence quality assurance model

    Directory of Open Access Journals (Sweden)

    Tshilidzi Eric Nenzhelele

    2015-12-01

    Full Text Available Competitive Intelligence (CI improves the quality of product and service, decision-making and it improves quality of life. However, it has been established that decision makers are not happy about the quality of CI. This is because enterprises fail in quality assurance of CI. It has been concluded that most enterprises are clueless concerning CI quality assurance. Studies that previously attempted to resolve CI quality problem were limited in scope and focused too much on the quality of information than the overall CI quality. The purpose of this study is to propose a conceptual CI quality assurance model which will help in quality assurance of CI. The research was qualitative in nature and used content analysis.

  1. Quality assurance of radiopharmaceuticals

    International Nuclear Information System (INIS)

    Frier, M.; Hesslewood, S.R.

    1980-01-01

    A practical guide has been composed for all persons involved in the preparation and use of radiopharmaceuticals on methods used in quality assurance and their applications. These methods include the calibration of ionization chamber assay calibrators, the determination of radionuclide purity, radiochemical purity and chemical purity, particle size analysis and the measurement of pH. Quality assurance procedures are described for products not described in Compendial Monographs, or where the monograph exists, additional useful information is provided; such radiopharmaceuticals include technetium, indium-labelled and iodine-labelled products. (U.K.)

  2. 44 CFR 19.115 - Assurance required.

    Science.gov (United States)

    2010-10-01

    ... RECEIVING FEDERAL FINANCIAL ASSISTANCE Introduction § 19.115 Assurance required. (a) General. Either at the... 44 Emergency Management and Assistance 1 2010-10-01 2010-10-01 false Assurance required. 19.115 Section 19.115 Emergency Management and Assistance FEDERAL EMERGENCY MANAGEMENT AGENCY, DEPARTMENT OF...

  3. 22 CFR 146.115 - Assurance required.

    Science.gov (United States)

    2010-04-01

    ... PROGRAMS OR ACTIVITIES RECEIVING FEDERAL FINANCIAL ASSISTANCE Introduction § 146.115 Assurance required. (a... applications for Federal financial assistance or awards of Federal financial assistance contain, be accompanied... assurance. (b) Duration of obligation. (1) In the case of Federal financial assistance extended to provide...

  4. 49 CFR 25.115 - Assurance required.

    Science.gov (United States)

    2010-10-01

    ... PROGRAMS OR ACTIVITIES RECEIVING FEDERAL FINANCIAL ASSISTANCE Introduction § 25.115 Assurance required. (a... applications for Federal financial assistance or awards of Federal financial assistance contain, be accompanied... assurance. (b) Duration of obligation. (1) In the case of Federal financial assistance extended to provide...

  5. 22 CFR 229.115 - Assurance required.

    Science.gov (United States)

    2010-04-01

    ... PROGRAMS OR ACTIVITIES RECEIVING FEDERAL FINANCIAL ASSISTANCE Introduction § 229.115 Assurance required. (a... applications for Federal financial assistance or awards of Federal financial assistance contain, be accompanied... assurance. (b) Duration of obligation. (1) In the case of Federal financial assistance extended to provide...

  6. 45 CFR 605.5 - Assurances required.

    Science.gov (United States)

    2010-10-01

    ... ON THE BASIS OF HANDICAP IN PROGRAMS OR ACTIVITIES RECEIVING FEDERAL FINANCIAL ASSISTANCE General Provisions § 605.5 Assurances required. (a) Assurances. Recipients of Federal financial assistance to which... purpose for which Federal financial assistance is extended or for another purpose involving the provision...

  7. Quality assurance and demolition: 2006 symposium

    International Nuclear Information System (INIS)

    Thierfeldt, S.

    2006-01-01

    The '2006 Symposium: Quality Assurance and Demolition' jointly organized by compra GmbH and Brenk Systemplanung GmbH this year again focused on quality assurance and the demolition of nuclear facilities as its main topics. The papers presented ranged from issues of clearance and disposal to demolition technologies and status reports about specific demolition projects. The sixteen presentations at the '2006 Symposium: Quality Assurance and Demolition' offered an interesting and very topical cross section of decommissioning and demolition of nuclear facilities in Germany. In 2007, the conference about similar main topics will again be held at the Schloss Bensberg Grand Hotel. (orig.)

  8. SWiFT Software Quality Assurance Plan.

    Energy Technology Data Exchange (ETDEWEB)

    Berg, Jonathan Charles [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2016-01-01

    This document describes the software development practice areas and processes which contribute to the ability of SWiFT software developers to provide quality software. These processes are designed to satisfy the requirements set forth by the Sandia Software Quality Assurance Program (SSQAP). APPROVALS SWiFT Software Quality Assurance Plan (SAND2016-0765) approved by: Department Manager SWiFT Site Lead Dave Minster (6121) Date Jonathan White (6121) Date SWiFT Controls Engineer Jonathan Berg (6121) Date CHANGE HISTORY Issue Date Originator(s) Description A 2016/01/27 Jon Berg (06121) Initial release of the SWiFT Software Quality Assurance Plan

  9. Software Quality Assurance activities of ITER CODAC

    Energy Technology Data Exchange (ETDEWEB)

    Pande, Sopan, E-mail: sopan.pande@iter.org [ITER Organization, Route de Vinon sur Verdon, 13115 St Paul Lez Durance (France); DiMaio, Franck; Kim, Changseung; Kim, Joohan; Klotz, Wolf-Dieter; Makijarvi, Petri; Stepanov, Denis; Wallander, Anders [ITER Organization, Route de Vinon sur Verdon, 13115 St Paul Lez Durance (France)

    2013-10-15

    Highlights: ► Comprehensive and consistent software engineering and quality assurance of CODAC. ► Applicable to all CODAC software projects executed by ITER DAs and contractors. ► Configurable plans for cost effective application of SQA processes. ► CODAC software plans SQAP, SVVP, SDP, and SCMP. ► CODAC software processes based on IEEE 12207-2008. -- Abstract: Software as an integral part of the plant system I and C is crucial in the manufacturing and integrated operation of ITER plant systems. Software Quality Assurance is necessary to ensure the development and maintenance of consistently high quality I and C software throughout the lifetime of ITER. CODAC decided to follow IEEE 12207-2008 software lifecycle processes for Software Engineering and Software Quality Assurance. Software Development Plan, Software Configuration Management Plan and Software Verification and Validation Plan are the mainstay of Software Quality Assurance which is documented in the Software Quality Assurance Plan. This paper describes the Software Quality Assurance (SQA) activities performed by CODAC. The SQA includes development and maintenance of above plans, processes and resources. With the help of Verification and Validation Teams they gather evidence of process conformance and product conformance, and record process data for quality audits and perform process improvements.

  10. Software Quality Assurance activities of ITER CODAC

    International Nuclear Information System (INIS)

    Pande, Sopan; DiMaio, Franck; Kim, Changseung; Kim, Joohan; Klotz, Wolf-Dieter; Makijarvi, Petri; Stepanov, Denis; Wallander, Anders

    2013-01-01

    Highlights: ► Comprehensive and consistent software engineering and quality assurance of CODAC. ► Applicable to all CODAC software projects executed by ITER DAs and contractors. ► Configurable plans for cost effective application of SQA processes. ► CODAC software plans SQAP, SVVP, SDP, and SCMP. ► CODAC software processes based on IEEE 12207-2008. -- Abstract: Software as an integral part of the plant system I and C is crucial in the manufacturing and integrated operation of ITER plant systems. Software Quality Assurance is necessary to ensure the development and maintenance of consistently high quality I and C software throughout the lifetime of ITER. CODAC decided to follow IEEE 12207-2008 software lifecycle processes for Software Engineering and Software Quality Assurance. Software Development Plan, Software Configuration Management Plan and Software Verification and Validation Plan are the mainstay of Software Quality Assurance which is documented in the Software Quality Assurance Plan. This paper describes the Software Quality Assurance (SQA) activities performed by CODAC. The SQA includes development and maintenance of above plans, processes and resources. With the help of Verification and Validation Teams they gather evidence of process conformance and product conformance, and record process data for quality audits and perform process improvements

  11. Mothers' attitudes toward adolescent confidential services: development and validation of scales for use in English- and Spanish-speaking populations.

    Science.gov (United States)

    Tebb, Kathleen P; Pollack, Lance M; Millstein, Shana; Otero-Sabogal, Regina; Wibbelsman, Charles J

    2014-09-01

    To explore parental beliefs and attitudes about confidential services for their teenagers; and to develop an instrument to assess these beliefs and attitudes that could be used among English and Spanish speakers. The long-term goal is to use this research to better understand and evaluate interventions to improve parental knowledge and attitudes toward their adolescent's access and utilization of comprehensive confidential health services. The instrument was developed using an extensive literature review and theoretical framework followed by qualitative data from focus groups and in-depth interviews. It was then pilot tested with a random sample of English- and Spanish-speaking parents and further revised. The final instrument was administered to a random sample of 1,000 mothers. The psychometric properties of the instrument were assessed for Spanish and English speakers. The instrument consisted of 12 scales. Most Cronbach alphas were >.70 for Spanish and English speakers. Fewer items for Spanish speakers "loaded" for the Responsibility and Communication scales. Parental Control of Health Information failed for Spanish speakers. The Parental Attitudes of Adolescent Confidential Health Services Questionnaire (PAACS-Q) contains 12 scales and is a valid and reliable instrument to assess parental knowledge and attitudes toward confidential health services for adolescents among English speakers and all but one scale was applicable for Spanish speakers. More research is needed to understand key constructs with Spanish speakers. Copyright © 2014 Society for Adolescent Health and Medicine. Published by Elsevier Inc. All rights reserved.

  12. 43 CFR 2.51 - Assuring integrity of records.

    Science.gov (United States)

    2010-10-01

    ... on those recommended in the National Bureau of Standard's booklet “Computer Security Guidelines for..., technical and physical safeguards to insure the security and confidentiality of records and to protect against any anticipated threats or hazards to their security or integrity which could result in...

  13. Contractual obligations and the sharing of confidential health information in sport.

    Science.gov (United States)

    Anderson, L

    2008-09-01

    As an employee, a sports doctor has obligations to their employer, but also professional and widely accepted obligations of a doctor to the patient (in this case the individual team member). The conflict is evident when sports doctors are asked by an athlete to keep personal health information confidential from the coach and team management, and yet both doctor and athlete have employment contracts specifying that such information shall be shared. Recent research in New Zealand shows that despite the presence of an employment contract, there appears to be a wide range of behaviours among sports doctors when an athlete requests that information about them be kept from team management. Many seem willing to honour requests to keep health information about the athlete confidential, thereby being in breach of the employment contract, while others insist on informing team management against the wishes of the athlete. There are a number of potential solutions to this dilemma from forcing doctors to meet their contractual obligations, to limiting the expectations of the employment contract. This paper suggests that at times it may be appropriate to do both, making the position of the doctor clearer and supporting the ability of this group to resist pressure by coaches and management through having a robust code of ethics.

  14. Quality assurance - how to involve the employees

    DEFF Research Database (Denmark)

    Jørgensen, Michael Søgaard

    1996-01-01

    An overview of strategies for involvement of employees in quality assurance developement and implementation.......An overview of strategies for involvement of employees in quality assurance developement and implementation....

  15. Confidentiality in participatory research: Challenges from one study.

    Science.gov (United States)

    Petrova, Elmira; Dewing, Jan; Camilleri, Michelle

    2016-06-01

    This article presents key ethical challenges that were encountered when conducting a participatory qualitative research project with a very specific, small group of nurses, in this case with practice development nurses in Malta. With the small number of nurses employed in practice development roles in Malta, there are numerous difficulties of maintaining confidentiality. Poorly constructed interventions by the researcher could have resulted in detrimental effects to research participants and the overall trustworthiness of the research. Generally, ethical guidelines for research exist to reinforce validity of research; however, there is not an established consensus on how these strategies can be utilised in some types of qualitative field work. The researcher used an exploratory case study methodology. The sample consisted of 10 participants who were interviewed twice using face-to-face interviews, over a period of 2 months. The study was ethically reviewed by the University Research Ethics Committee and the Faculty Research Ethics Committee, University of Malta. The participants referred to in this article have been given adequate information about the study and their consent has been obtained. Numerous strategies for ensuring confidentiality during recruitment of the participants, during data collection, during transcription and data analysis and during dissemination of research results assisted the researcher in responding to potential and actual ethical issues. This article emphasises the main strategies that can be used to respond to ethical challenges when researching with a small easily identifiable group. The learning discussed here may be relevant to or even transferable to other similar research studies or research contexts. These methods fostered a greater credibility throughout the research process and predisposed the participants to greater trust, and thus, they disclosed their experiences and speak more freely, thus enhancing the quality of the study

  16. Quality assurance and nuclear power plant safety

    International Nuclear Information System (INIS)

    Mullan, J.V.

    1983-01-01

    Quality assurance in the nuclear industry was born in the late 1960s. Atomic Energy Control Board staff began its regulatory practice on quality assurance during that period. In this presentation the author traces the circumstances that first led to the establishment of Canadian nuclear power plant quality assurance programmes, summarizes progress over the last decade and a half, and outlines the current regulatory approach and what has been learned so far

  17. Analysing the integration of engineering in science lessons with the Engineering-Infused Lesson Rubric

    Science.gov (United States)

    Peterman, Karen; Daugherty, Jenny L.; Custer, Rodney L.; Ross, Julia M.

    2017-09-01

    Science teachers are being called on to incorporate engineering practices into their classrooms. This study explores whether the Engineering-Infused Lesson Rubric, a new rubric designed to target best practices in engineering education, could be used to evaluate the extent to which engineering is infused into online science lessons. Eighty lessons were selected at random from three online repositories, and coded with the rubric. Overall results documented the strengths of existing lessons, as well as many components that teachers might strengthen. In addition, a subset of characteristics was found to distinguish lessons with the highest level of engineering infusion. Findings are discussed in relation to the potential of the rubric to help teachers use research evidence-informed practice generally, and in relation to the new content demands of the U.S. Next Generation Science Standards, in particular.

  18. With Interest It Comes To...Unconscionable Clauses in Sales Contracts. A Student's Lesson Plan [and] A Teacher's Lesson Plan [and] A Lawyer's Lesson Plan.

    Science.gov (United States)

    Howard, Estelle; And Others

    One of a series of secondary level teaching units presenting case studies with pro and con analysis of particular legal problems, the document presents a student's lesson plan, a teacher's lesson plan, and a lawyer's lesson plan on unconscionable clauses in sales contracts. The unit acquaints students with the operation of sales contracts and…

  19. Quality assurance for health and environmental chemistry: 1989

    International Nuclear Information System (INIS)

    Gautier, M.A.; Gladney, E.S.; Koski, N.L.; Jones, E.A.; Phillips, M.B.; O'Malley, B.T.

    1990-12-01

    This report documents the continuing quality assurance efforts of the Health and Environmental Chemistry Group (HSE-9) at the Los Alamos National Laboratory. The philosophy, methodology, computing resources, and laboratory information management system used by the quality assurance program to encompass the diversity of analytical chemistry practiced in the group are described. Included in the report are all quality assurance reference materials used, along with their certified or consensus concentrations, and all analytical chemistry quality assurance measurements made by HSE-9 during 1989. 38 refs., 8 figs., 3 tabs

  20. Lessons learned related to packaging and transportation

    International Nuclear Information System (INIS)

    Wallen, C.

    1995-01-01

    The use of lessons learned as a tool for learning from past experiences is well established, especially by many organizations within the nuclear industry. Every person has, at some time, used the principles of lessons learned to adopt good work practices based on their own experiences or the experiences of others. Lessons learned can also help to avoid the recurrence of adverse practices, which is often an area that most lessons-learned programs tend to focus on. This paper will discuss how lessons learned relate to packaging and transportation issues and events experienced at Department of Energy (DOE) facilities. It will also discuss the role performed by the Office of Nuclear and Facility Safety's Office of Operating Experience Analysis and Feedback in disseminating lessons learned and operating experience feedback to the DOE complex. The central concept of lessons learned is that any organization should be able to learn from its own experiences and events. In addition, organizations should implement methodologies to scan external environments for lessons learned, to analyze and determine the relevance of lessons learned, and to bring about the necessary changes learned from these experiences. With increased concerns toward facility safety, the importance of utilizing the lessons-learned principles and the establishment of lessons-learned programs can not be overstated

  1. 30 CFR 7.7 - Quality assurance.

    Science.gov (United States)

    2010-07-01

    ... 30 Mineral Resources 1 2010-07-01 2010-07-01 false Quality assurance. 7.7 Section 7.7 Mineral Resources MINE SAFETY AND HEALTH ADMINISTRATION, DEPARTMENT OF LABOR TESTING, EVALUATION, AND APPROVAL OF MINING PRODUCTS TESTING BY APPLICANT OR THIRD PARTY General § 7.7 Quality assurance. Applicants granted...

  2. Quality assurance for image-guided radiotherapy

    International Nuclear Information System (INIS)

    Marinello, Ginette

    2008-01-01

    The topics discussed include, among others, the following: Quality assurance program; Image guided radiotherapy; Commissioning and quality assurance; Check of agreement between visual and displayed scales; quality controls: electronic portal imaging device (EPID), MV-kV and kV-kV, cone-beam CT (CBCT), patient doses. (P.A.)

  3. 22 CFR 141.4 - Assurances required.

    Science.gov (United States)

    2010-04-01

    ... of the United States for the desegregation of such school or school system, and provides an assurance... other participants. Any such assurance shall include provisions which give the United States a right to... system which the responsible official of the Department of Health, Education, and Welfare determines is...

  4. Quality assurance in nuclear power plant

    International Nuclear Information System (INIS)

    Magalhaes, M.T. de

    1981-01-01

    The factors related to the licensing procedures of a nuclear power plant (quality assurance and safety analysis) are presented and discussed. The consequences of inadequate attitudes towards these factors are shown and suggestions to assure the safety of nuclear power plants in Brazil are presented. (E.G.) [pt

  5. Quality Assurance in Higher Education: Proposals for Consultation.

    Science.gov (United States)

    Higher Education Funding Council for England, Bristol.

    This document sets out for consultation proposals for a revised method for quality assurance of teaching and learning in higher education. The proposals cover: (1) the objectives and principles of quality assurance; (2) an approach to quality assurance based on external audit principles; (3) the collection and publication of information; (4)…

  6. Customers’ Perception regarding Assurance of Bancassurance Channel

    Directory of Open Access Journals (Sweden)

    Choudhury Mousumi

    2016-12-01

    Full Text Available Bancassurance has evolved as a strong distribution channel in India. Bancassurance means that the insurance company and the bank come together to offer insurance products from the counter of the banks to the bank’s customer. The present study attempts to analyse customers’ perception regarding assurance of bancassurance channel in providing insurance-related services. The study also tries to find out the impact of various demographic variables on customers’ perception regarding assurance of bancassurance channel. The study finds that customers consider bancassurance channel having high assurance in providing insurance services. It is also found in the study that there is no significant association between the demographic variables considered in the study and customers’ perception regarding assurance of bancassurance channel.

  7. Quality assurance program plan for radionuclide airborne emissions monitoring

    International Nuclear Information System (INIS)

    Boom, R.J.

    1995-03-01

    This Quality Assurance Program Plan identifies quality assurance program requirements and addresses the various Westinghouse Hanford Company organizations and their particular responsibilities in regards to sample and data handling of airborne emissions. The Hanford Site radioactive airborne emissions requirements are defined in National Emissions Standards for Hazardous Air Pollutants (NESHAP), Code of Federal Regulations, Title 40, Part 61, Subpart H (EPA 1991a). Reporting of the emissions to the US Department of Energy is performed in compliance with requirements of US Department of Energy, Richland Operations Office Order 5400.1, General Environmental Protection Program (DOE-RL 1988). This Quality Assurance Program Plan is prepared in accordance with and to the requirements of QAMS-004/80, Guidelines and Specifications for Preparing Quality Assurance Program Plans (EPA 1983). Title 40 CFR Part 61, Appendix B, Method 114, Quality Assurance Methods (EPA 1991b) specifies the quality assurance requirements and that a program plan should be prepared to meet the requirements of this regulation. This Quality Assurance Program Plan identifies NESHAP responsibilities and how the Westinghouse Hanford Company Environmental, Safety, Health, and Quality Assurance Division will verify that the methods are properly implemented

  8. 25 CFR 43.22 - Assuring integrity of records.

    Science.gov (United States)

    2010-04-01

    ..., “Computer Security Guidelines for Implementing the Privacy Act of 1974” (May 30, 1975), and any supplements... with appropriate administrative, technical and physical safeguards to insure the security and confidentiality of records and to protect against any anticipated threats or hazards to their security or...

  9. Overview of the Hanford Site Performance Assurance Program

    International Nuclear Information System (INIS)

    Duncan, M.R.; Billings, M.P.; Delvin, W.L.; Scott, D.D.; Weatherby, J.W.

    1991-01-01

    This paper reports on a safeguards and security performance assurance program which encompasses the routine and special activities carried out to assure that safeguards and security subsystems and components are operating in a effective and reliable manner. At the Hanford Site, performance assurance involves widely varied activities, e.g., force-on-force exercises, functional testing of security components, and limited scope performance testing of material control and accountability subsystems. These activities belong to one of four categories: performance testing, functional testing, inspection, and preventive maintenance. Using categories has aided in identifying and assessing the relevant contribution each activity makes to the performance assurance program. Efforts have progressed toward incorporating performance assurance activities into the assessment of protection effectiveness required for Master Safeguards and Security Agreement development and its associated verification and validation process

  10. National Program of Quality Assurance in Radiotherapy in Cuba

    International Nuclear Information System (INIS)

    Alonso Samper, J. L.; Dominguez Hung, L.; Morales Lopez, J. L.; Alfonso Laguardia, R.; Garcia Yip, F.

    2001-01-01

    It tries on the establishment of a Quality Assurance Nacional System, a Quality Assurance Committee implemented in Cuba, and a Quality Auditory National Program implemented in Cuba to control and assure radiotherapy quality

  11. Quality assurance

    Energy Technology Data Exchange (ETDEWEB)

    Gillespie, B.M.; Gleckler, B.P.

    1995-06-01

    This section of the 1994 Hanford Site Environmental Report summarizes the quality assurance and quality control practices of Hanford Site environmental monitoring and surveillance programs. Samples are analyzed according to documented standard analytical procedures. This section discusses specific measures taken to ensure quality in project management, sample collection, and analytical results.

  12. Quality assurance

    International Nuclear Information System (INIS)

    Gillespie, B.M.; Gleckler, B.P.

    1995-01-01

    This section of the 1994 Hanford Site Environmental Report summarizes the quality assurance and quality control practices of Hanford Site environmental monitoring and surveillance programs. Samples are analyzed according to documented standard analytical procedures. This section discusses specific measures taken to ensure quality in project management, sample collection, and analytical results

  13. A Quality Assurance Program for decommissioning

    International Nuclear Information System (INIS)

    Briggs, P.M.

    1986-01-01

    Defining the Quality Assurance Program for the US Department of Energy Shippingport Station Decommissioning Project (SSDP) was a unique opportunity because this is the first full-sized commercial nuclear power plant to be decommissioned. General Electric Company defined a Quality Assurance Program that provided adequate control, yet was stripped down to the essentials. The Program is designed to provide a flexible degree of monitoring of subcontractor work, built around a core of radiation safety monitoring, detailed planning, inspection and auditing, and operated with a minimum of dedicated personnel. This paper will concentrate on the traditional quality assurance activities, leaving radiation and environmental monitoring for other presentations

  14. Assuring quality in high-consequence engineering

    Energy Technology Data Exchange (ETDEWEB)

    Hoover, Marcey L.; Kolb, Rachel R.

    2014-03-01

    In high-consequence engineering organizations, such as Sandia, quality assurance may be heavily dependent on staff competency. Competency-dependent quality assurance models are at risk when the environment changes, as it has with increasing attrition rates, budget and schedule cuts, and competing program priorities. Risks in Sandia's competency-dependent culture can be mitigated through changes to hiring, training, and customer engagement approaches to manage people, partners, and products. Sandia's technical quality engineering organization has been able to mitigate corporate-level risks by driving changes that benefit all departments, and in doing so has assured Sandia's commitment to excellence in high-consequence engineering and national service.

  15. 30 CFR 15.8 - Quality assurance.

    Science.gov (United States)

    2010-07-01

    ... 30 Mineral Resources 1 2010-07-01 2010-07-01 false Quality assurance. 15.8 Section 15.8 Mineral Resources MINE SAFETY AND HEALTH ADMINISTRATION, DEPARTMENT OF LABOR TESTING, EVALUATION, AND APPROVAL OF... § 15.8 Quality assurance. (a) Applicants granted an approval or an extension of approval under this...

  16. 40 CFR 194.22 - Quality assurance.

    Science.gov (United States)

    2010-07-01

    ... General Requirements § 194.22 Quality assurance. (a)(1) As soon as practicable after April 9, 1996, the Department shall adhere to a quality assurance program that implements the requirements of ASME NQA-1-1989... elicitation used to support applications for certification or re-certification of compliance; (vi) Design of...

  17. Quality Assurance in Sub-Saharan Africa

    Science.gov (United States)

    Materu, Peter; Righetti, Petra

    2010-01-01

    This article assesses the status and practice of higher education quality assurance in sub-Saharan Africa, focusing on degree-granting tertiary institutions. A main finding is that structured national-level quality assurance processes in African higher education are a very recent phenomenon and that most countries face major capacity constraints.…

  18. Teaching Journalism Students about Confidential Whistleblower Sources: An Analysis of Introductory News Writing Textbooks

    Science.gov (United States)

    Huxford, John; Moore, Maria A.

    2011-01-01

    Whistleblowers are a key journalistic source for many current news stories. However, reporters pursuing these major stories must navigate the dilemma between transparent full disclosure and protecting their confidential source. Professional journalists begin their journey as students, and students begin their journey in the classroom with a…

  19. 17 CFR 145.9 - Petition for confidential treatment of information submitted to the Commission.

    Science.gov (United States)

    2010-04-01

    ... may summarily reject the submitter's request for confidential treatment with leave to the submitter to... treatment of information submitted to the Commission. 145.9 Section 145.9 Commodity and Securities Exchanges... treatment of information submitted to the Commission. (a) Purpose. This section provides a procedure by...

  20. 76 FR 30781 - Confidentiality Determinations for Data Required Under the Mandatory Greenhouse Gas Reporting...

    Science.gov (United States)

    2011-05-26

    ... this document. BAMM Best Available Monitoring Methods CAA Clean Air Act CBI confidential business information CBP Customs and Border Protection CEMS continuous emission monitoring system(s) CFR Code of... prevent competitors from forcing them to defend data on a case-by-case basis in Agency CBI proceedings...