WorldWideScience

Sample records for program dod privacy

  1. 78 FR 52117 - DoD Privacy Program

    Science.gov (United States)

    2013-08-22

    ... how the action will meet that need. An individual's privacy is a fundamental legal right that must be... and place of birth, mother's maiden name, biometric records, home phone numbers, other demographic... a photograph. (y) Risk assessment. An analysis considering information sensitivity, vulnerabilities...

  2. Privacy Training Program

    Science.gov (United States)

    Recognizing that training and awareness are critical to protecting agency Personally Identifiable Information (PII), the EPA is developing online training for privacy contacts in its programs and regions.

  3. Summary of DOD Acquisition Program Audit Coverage

    National Research Council Canada - National Science Library

    2001-01-01

    This report will provide the DoD audit community with information to support their planning efforts and provide management with information on the extent of audit coverage of DoD acquisition programs...

  4. DOD low energy model installation program

    International Nuclear Information System (INIS)

    Fournier, D.F. Jr.

    1993-01-01

    The Model Low Energy Installation Program is a demonstration of an installation-wide, comprehensive energy conservation program that meets the Department of Defense (DoD) energy management goals of reducing energy usage and costs by at least 20%. It employs the required strategies for meeting these goals, quantifies the environmental compliance benefits resulting from energy conservation and serves as a prototype for DoD wide application. This project will develop both analysis tools and implementation procedures as well as demonstrate the effectiveness of a comprehensive, coordinated energy conservation program based on state-of-the-art technologies. A military installation is in reality a small to medium sized city. It generally has a complete utilities infrastructure including water supply and distribution, sewage collection and treatment, electrical supply and distribution, central heating and cooling plants with thermal distribution, and a natural gas distribution system. These utilities are quite extensive and actually consume about 10-15% of the energy on the facility not counting the energy going into the central plants

  5. 32 CFR 701.101 - Privacy program terms and definitions.

    Science.gov (United States)

    2010-07-01

    ... from a project on privacy issues, identifying and resolving the privacy risks, and approval by a... 32 National Defense 5 2010-07-01 2010-07-01 false Privacy program terms and definitions. 701.101... DEPARTMENT OF THE NAVY DOCUMENTS AFFECTING THE PUBLIC DON Privacy Program § 701.101 Privacy program terms and...

  6. 32 CFR 310.37 - DoD training programs.

    Science.gov (United States)

    2010-07-01

    ...) considerations that they shall take into account when making management decisions regarding operational programs... include information regarding information privacy laws, regulations, policies and procedures governing the Department's collection, maintenance, use, or dissemination of personal information. The objective is to...

  7. DOD/COCOM Water Security Program Strategy Document

    Science.gov (United States)

    2011-04-22

    treatment and disposal. DOD/COCOM Water Security Program Strategy 22 18. Toxic Minerals In regions where there are naturally occurring unsafe...surface hydrologic observations using remote sensing to provide data on precipitation, radiation, temperature, soil moisture, groundwater, snowcover...habitat alteration and aquaculture . 13. Centers for Disease Control (CDC) Works with partners throughout the nation and the world to monitor health

  8. DOD's advanced thermionics program an overview

    International Nuclear Information System (INIS)

    Drake, T.R.

    1998-01-01

    The Defense Special Weapons Agency (DSWA) manages a congressionally mandated program in advanced thermionics research. Guided by congressional language to advance the state-of-the-art in the US and support the Integrated Solar Upper Stage (ISUS) program, DSWA efforts concentrate on four areas: an electrically testable design of a high-performance, in-core thermionic fuel element (TFE), the ISUS program, a microminiature thermionic converter and several modeling efforts. The DSWA domestic program is augmented by several small contracts with Russian institutes, awarded under the former TOPAZ International Program that the Ballistic Missile Defense Organization transferred to DSWA. The design effort at General Atomics will result in an electrically testable, multi-cell TFE for in-core conversion, involving system design and advanced collector and emitter technologies. For the ISUS program, DSWA funded a portion of the engine ground demonstration, including development of the power management system and the planar diodes. Current efforts supporting ISUS include continued diode testing and developing an advanced planar diode. The MTC program seeks to design a mass producable, close-spaced thermionic converter using integrated circuit technologies. Modeling and analysis at DSWA involves development of the Reactor System Mass with Thermionics estimation model (RSMASS-T), developing a new thermionic theory, and reviewing applications for the MTC technology. The Russian deliverables include several reports and associated hardware that describe many of its state-of-the-art thermionic technologies and processes

  9. Defense Infrastructure: Continuing Challenges in Managing DOD Lodging Programs as Army Moves to Privatize Its Program

    National Research Council Canada - National Science Library

    Holman, Barry W; Kennedy, Michael; Dickey, Claudia; Lenane, Kate; Sarapu, Leslie; Silvers, Julie; Weissman, Cheryl

    2006-01-01

    The Department of Defense (DoD) transient lodging programs were established to provide quality temporary facilities for authorized personnel, and to reduce travel costs through lower rates than commercial hotels...

  10. Assessment of DoD Voting Assistance Programs for Calendar Year 2015

    Science.gov (United States)

    2016-03-31

    absentee ballot application process and the privacy of the identity and personal data of UOCAVA voters using the procedures. DoD Guidance DoD...Collection of these new performance metrics commenced on January 1, 2015; therefore, CY 2015 is the first full reporting cycle in which the new Measures of... privacy of the contents of absentee ballots cast by absentee uniformed services voters and overseas voters while such ballots are in the possession or

  11. 78 FR 15732 - Privacy Act of 1974; Computer Matching Program

    Science.gov (United States)

    2013-03-12

    ... 1974; Computer Matching Program AGENCY: Department of Homeland Security/U.S. Citizenship and... Privacy Act of 1974 (5 U.S.C. 552a), as amended by the Computer Matching and Privacy Protection Act of 1988 (Pub. L. 100-503) and the Computer Matching and Privacy Protection Amendments of 1990 (Pub. L. 101...

  12. DoD Information Security Program and Protection of Sensitive Compartmented Information (SCI)

    Science.gov (United States)

    2016-04-21

    Sensitive Compartmented Information ( SCI ) References: See Enclosure 1 1. PURPOSE. In accordance with the authority in DoD Directive (DoDD...collateral, special access program, SCI , and controlled unclassified information (CUI) within an overarching DoD Information Security Program...use, and dissemination of SCI within the DoD pursuant to References (a), (c), and (e) and Executive Order 12333 (Reference (h)). 2

  13. 78 FR 38724 - Privacy Act of 1974; Computer Matching Program

    Science.gov (United States)

    2013-06-27

    ... 1974; Computer Matching Program AGENCY: Department of Homeland Security/U.S. Citizenship and... Agreement that establishes a computer matching program between the Department of Homeland Security/U.S... and Privacy Protection Act of 1988 (Pub. L. 100-503) and the Computer Matching and Privacy Protection...

  14. 75 FR 59176 - DoD Mandatory Declassification Review (MDR) Program

    Science.gov (United States)

    2010-09-27

    ..., VA 22060-6201. (13) Missile Defense Agency. Missile Defense Agency, Attention: MDA/DS, 7100 Defense... DEPARTMENT OF DEFENSE Office of the Secretary 32 CFR Part 222 [DoD-2010-OS-0043; RIN 0790-AI62] DoD Mandatory Declassification Review (MDR) Program AGENCY: Department of Defense. ACTION: Proposed...

  15. 78 FR 15731 - Privacy Act of 1974; Computer Matching Program

    Science.gov (United States)

    2013-03-12

    ... DEPARTMENT OF HOMELAND SECURITY Office of the Secretary [Docket No. DHS-2013-0011] Privacy Act of 1974; Computer Matching Program AGENCY: Department of Homeland Security/U.S. Citizenship and... amended by the Computer Matching and Privacy Protection Act of 1988 (Pub. L. 100-503) and the Computer...

  16. 78 FR 1275 - Privacy Act of 1974; Computer Matching Program

    Science.gov (United States)

    2013-01-08

    ... Social Security Administration (Computer Matching Agreement 1071). SUMMARY: In accordance with the Privacy Act of 1974 (5 U.S.C. 552a), as amended by the Computer Matching and Privacy Protection Act of... of its new computer matching program with the Social Security Administration (SSA). DATES: OPM will...

  17. 32 CFR 310.9 - Privacy boards and office, composition and responsibilities.

    Science.gov (United States)

    2010-07-01

    ... involving the DoD Privacy Program, meeting as necessary, to address issues of common concern so as to ensure... privacy issues relating to the Department's collection, maintenance, use, or dissemination of personal... 32 National Defense 2 2010-07-01 2010-07-01 false Privacy boards and office, composition and...

  18. 78 FR 45513 - Privacy Act of 1974; Computer Matching Program

    Science.gov (United States)

    2013-07-29

    ... Responsibilities for Maintaining Records about Individuals'', dated February 8, 1996 (February 20, 1996, 61 FR 6427... purpose of this matching program is to provide the SPAAs with data from DoD military and civilian pay files, the military retired pay files, survivor pay files and the OPM civilian retired and survivor pay...

  19. Military Personnel: Performance Measures Needed to Determine How Well DOD’s Credentialing Program Helps Servicemembers

    Science.gov (United States)

    2016-10-01

    MILITARY PERSONNEL Performance Measures Needed to Determine How Well DOD’s Credentialing Program Helps Servicemembers...Measures Needed to Determine How Well DOD’s Credentialing Program Helps Servicemembers What GAO Found The Department of Defense (DOD) has taken steps to...establish the statutorily required credentialing program, but it has not developed performance measures to gauge the program’s effectiveness

  20. An Analysis Of The Benefits And Application Of Earned Value Management (EVM) Project Management Techniques For Dod Programs That Do Not Meet Dod Policy Thresholds

    Science.gov (United States)

    2017-12-01

    VALUE MANAGEMENT (EVM) PROJECT MANAGEMENT TECHNIQUES FOR DOD PROGRAMS THAT DO NOT MEET DOD POLICY THRESHOLDS December 2017 By: Randy Schneider...Joint applied project 4. TITLE AND SUBTITLE AN ANALYSIS OF THE BENEFITS AND APPLICATION OF EARNED VALUE MANAGEMENT (EVM) PROJECT MANAGEMENT ...performance reporting. The immediate objective of this research project was to examine the question: Can the application of EVM-Lite project management

  1. 48 CFR Appendix I to Chapter 2 - Policy and Procedures for the DOD Pilot Mentor-Protege Program

    Science.gov (United States)

    2010-10-01

    ... the DOD Pilot Mentor-Protege Program I Appendix I to Chapter 2 Federal Acquisition Regulations System... and Procedures for the DOD Pilot Mentor-Protege Program I-100Purpose. (a) This Appendix I to 48 CFR Chapter 2 implements the Pilot Mentor-Protégé Program (hereafter referred to as the “Program”) established...

  2. 78 FR 15734 - Privacy Act of 1974; Computer Matching Program

    Science.gov (United States)

    2013-03-12

    ... 1974; Computer Matching Program AGENCY: Department of Homeland Security/U.S. Citizenship and... computer matching program between the Department of Homeland Security/U.S. Citizenship and Immigration... Protection Act of 1988 (Pub. L. 100-503) and the Computer Matching and Privacy Protection Amendments of 1990...

  3. 78 FR 15733 - Privacy Act of 1974; Computer Matching Program

    Science.gov (United States)

    2013-03-12

    ... 1974; Computer Matching Program AGENCY: Department of Homeland Security/U.S. Citizenship and... computer matching program between the Department of Homeland Security/U.S. Citizenship and Immigration... Protection Act of 1988 (Pub. L. 100-503) and the Computer Matching and Privacy Protection Amendments of 1990...

  4. 32 CFR 806b.51 - Privacy and the Web.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 6 2010-07-01 2010-07-01 false Privacy and the Web. 806b.51 Section 806b.51... PROGRAM Disclosing Records to Third Parties § 806b.51 Privacy and the Web. Do not post personal information on publicly accessible DoD web sites unless clearly authorized by law and implementing regulation...

  5. 77 FR 75499 - Privacy Act of 1974: Computer Matching Program

    Science.gov (United States)

    2012-12-20

    ... DEPARTMENT OF VETERANS AFFAIRS Privacy Act of 1974: Computer Matching Program AGENCY: Department...: This match will commence on or about January 22, 2013 or 40 days after the Office of Management and... of 18 months after the commencing date, the Departments may renew the agreement for another 12 months...

  6. Early Warning: Brought to you by the DoD Chem-Bio Defense Program

    Science.gov (United States)

    Security Robots Lasers RSS Feed Early Warning: Brought to you by the DoD Chem-Bio Defense Program help warfighters prevent, protect against, respond to or recover from chem-bio threats and effects . Hassell said he and his team don't monitor the world for chem-bio threats, they develop the tools that

  7. 78 FR 18932 - Public Meeting: Unmanned Aircraft Systems Test Site Program; Privacy Approach

    Science.gov (United States)

    2013-03-28

    ... discussion about which privacy issues are raised by UAS operations and how law, public policy, and the...-0061] Public Meeting: Unmanned Aircraft Systems Test Site Program; Privacy Approach AGENCY: Federal... a public engagement session on Wednesday, April 3, 2013, on the proposed privacy policy approach for...

  8. Implications of DOD Funds Execution Policy for Acquisition Program Management

    Science.gov (United States)

    2014-08-01

    package, the Automated Cost Estimating Integrated Tools ( ACEIT ). Using development cost estimation modeling techniques, the team also estimates...using Automated Cost Estimating Integrated Tool ( ACEIT )  An SQL database, known as the Program Financial Management System, currently used by the AH... ACEIT Automated Cost Estimating Integrated Tools AFOTEC Air Force Operational Test and Evaluation Center AFSOC Air Force Special Operations Command

  9. 76 FR 11435 - Privacy Act of 1974; Computer Matching Program

    Science.gov (United States)

    2011-03-02

    ... Security Administration. SUMMARY: Pursuant to the Computer Matching and Privacy Protection Act of 1988, Public Law 100-503, the Computer Matching and Privacy Protections Amendments of 1990, Pub. L. 101-508... Interpreting the Provisions of Public Law 100-503, the Computer Matching and Privacy Protection Act of 1988...

  10. Military Transformation: Progress and Challenges for DOD's Advanced Distributed Learning Programs

    National Research Council Canada - National Science Library

    Ensign, John

    2003-01-01

    The Department of Defense (DOD) spends more than $17 billion annually for military schools that offer nearly 30,000 military training courses to almost 3 million military personnel and DOD civilians, much of it to maintain readiness...

  11. Defense Infrastructure: DoD Environmental Community Involvement Programs at Test and Training Ranges

    National Research Council Canada - National Science Library

    2002-01-01

    Who Should Read This Report and Why? This report should be of interest to operational personnel at DoD test and training ranges and to others concerned with the sustainability of DoD test and training ranges...

  12. 77 FR 13388 - Treasury Inspector General for Tax Administration; Privacy Act of 1974: Computer Matching Program

    Science.gov (United States)

    2012-03-06

    ... DEPARTMENT OF THE TREASURY Treasury Inspector General for Tax Administration; Privacy Act of 1974...: Notice. SUMMARY: Pursuant to 5 U.S.C. 552a, the Privacy Act of 1974, as amended, notice is hereby given... Administration. Beginning and Completion Dates: This program of computer matches is expected to commence on March...

  13. 77 FR 43639 - Privacy Act of 1974, as Amended; Computer Matching Program (Social Security Administration (SSA...

    Science.gov (United States)

    2012-07-25

    ... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA 2011-0090] Privacy Act of 1974, as Amended; Computer Matching Program (Social Security Administration (SSA)/Department of Veterans Affairs (VA.... SUPPLEMENTARY INFORMATION: A. General The Computer Matching and Privacy Protection Act of 1988 (Pub. L. 100-503...

  14. 77 FR 54943 - Privacy Act of 1974, as Amended; Computer Matching Program (Social Security Administration (SSA...

    Science.gov (United States)

    2012-09-06

    ... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA 2012-0016] Privacy Act of 1974, as Amended; Computer Matching Program (Social Security Administration (SSA)/Department of Veterans Affairs (VA.... SUPPLEMENTARY INFORMATION: A. General The Computer Matching and Privacy Protection Act of 1988 (Pub. L. 100-503...

  15. 75 FR 5166 - Privacy Act of 1974, as Amended; Computer Matching Program (Social Security Administration...

    Science.gov (United States)

    2010-02-01

    ... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA 2009-0043] Privacy Act of 1974, as Amended; Computer Matching Program (Social Security Administration/Railroad Retirement Board (SSA/RRB))-- Match... INFORMATION: A. General The Computer Matching and Privacy Protection Act of 1988 Public Law (Pub. L.) 100-503...

  16. 78 FR 41916 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2013-07-12

    ... Defense Finance and Accounting Service, Freedom of Information/Privacy Act Program Manager, Corporate...; System of Records AGENCY: Defense Finance and Accounting Service, DoD. ACTION: Notice to alter a System of Records. SUMMARY: The Defense Finance and Accounting Service proposes to alter a system of records...

  17. 78 FR 37799 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2013-06-24

    ... Finance and Accounting Service, Freedom of Information/Privacy Act Program Manager, Corporate...; System of Records AGENCY: Defense Finance and Accounting Service, DoD. ACTION: Notice to amend a System of Records. SUMMARY: The Defense Finance and Accounting Service is amending a system of records...

  18. 77 FR 58106 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2012-09-19

    ... Finance and Accounting Service, Freedom of Information/Privacy Act Program Manager, Corporate...; System of Records AGENCY: Defense Finance and Accounting Service, DoD. ACTION: Notice to amend two Systems of Records. SUMMARY: The Defense Finance and Accounting Service is amending two systems of records...

  19. 78 FR 52518 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2013-08-23

    ... Finance and Accounting Service, Freedom of Information/Privacy Act Program Manager, Corporate...; System of Records AGENCY: Defense Finance and Accounting Service, DoD. ACTION: Notice to amend a System of Records. SUMMARY: The Defense Finance and Accounting Service is amending a system of records...

  20. 77 FR 69444 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2012-11-19

    ..., Defense Finance and Accounting Service, Freedom of Information/Privacy Act Program Manager, Corporate...; System of Records AGENCY: Defense Finance and Accounting Service, DoD. ACTION: Notice to amend a system of records. SUMMARY: The Defense Finance and Accounting Service is amending a system of records...

  1. Department of Defense (DOD) renewables and energy efficiency planning (REEP) program manual

    Energy Technology Data Exchange (ETDEWEB)

    Nemeth, R.J.; Fournier, D.; Debaillie, L.; Edgar, L.; Stroot, P.; Beasley, R.; Edgar, D.; McMillen, L.; Marren, M.

    1995-08-01

    The Renewables and Energy Efficiency Planning (REEP) program was developed at the US Army Construction Engineering Research Laboratories (USACERL). This program allows for the analysis of 78 energy and water conservation opportunities at 239 major DOD installations. REEP uses a series of algorithms in conjunction with installation specific data to estimate the energy and water conservation potential for entire installations. The program provides the energy, financial, pollution, and social benefits of conservation initiatives. The open architecture of the program allows for simple modification of energy and water conservation variables, and installation database values to allow for individualized analysis. The program is essentially a high-level screening tool that can be used to help identify and focus preliminary conservation studies. The REEP program requires an IBM PC or compatible with a 80386 or 80486 microprocessor. It also requires approximately 4 megabytes of disk space and at least 8 megabytes of RAM. The system was developed for a Windows environment and requires Microsoft Windows 3.1{trademark} or higher to run properly.

  2. Military Personnel: DOD Needs More Complete Data on Active-Duty Servicemembers Use of Food Assistance Programs

    Science.gov (United States)

    2016-07-01

    four installations that were selected based on size, cost of living, and presence of food assistance programs. What GAO Recommends GAO... criteria . In an April 2010 report, GAO identified 18 government programs that provide food assistance to low-income households. Servicemembers may apply...Vary 7 DOD Does Not Know the Extent to Which Servicemembers Use Food Assistance Programs 13 Military Officials at Selected Installations Cited

  3. 76 FR 50460 - Privacy Act of 1974; Notice of a Computer Matching Program

    Science.gov (United States)

    2011-08-15

    ... records will be disclosed for the purpose of this computer match are as follows: OPM will use the system... entitled to health care under TRS and TRR.'' E. Description of Computer Matching Program: Under the terms...; Notice of a Computer Matching Program AGENCY: Defense Manpower Data Center, Department of Defense (DoD...

  4. 75 FR 7648 - Privacy Act of 1974, as Amended; Computer Matching Program (SSA/Department of Veterans Affairs...

    Science.gov (United States)

    2010-02-22

    ... Computer Matching and Privacy Protection Act of 1988 (Public Law (Pub. L.) 100-503), amended the Privacy... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA 2010-0006] Privacy Act of 1974, as Amended; Computer Matching Program (SSA/ Department of Veterans Affairs/Veterans Benefits Administration (VA/ VBA...

  5. 76 FR 71417 - Privacy Act of 1974, as Amended; Computer Matching Program (SSA/Law Enforcement Agencies (LEA...

    Science.gov (United States)

    2011-11-17

    ...; Computer Matching Program (SSA/ Law Enforcement Agencies (LEA)) Match Number 5001 AGENCY: Social Security... protections for such persons. The Privacy Act, as amended, regulates the use of computer matching by Federal... accordance with the Privacy Act of 1974, as amended by the Computer Matching and Privacy Protection Act of...

  6. DOD Business Systems Modernization: Key Navy Programs' Compliance with DOD's Federated Business Enterprise Architecture Needs to be Adequately Demonstrated

    National Research Council Canada - National Science Library

    Hite, Randolph C; Lakhmani, Neela; Barkakati, Nabajyoti; Doherty, Neil; Glover, Nancy; Longcore, Emily; Holland, Michael; Le, Anh; Leiling, Josh; McCracken, Lee; Srikanth, Sushmita

    2008-01-01

    .... In particular, the programs BEA compliance assessments did not: * Include all relevant architecture products, such as products that specify the technical standards needed to promote interoperability among related systems...

  7. 76 FR 26712 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2011-05-09

    ... National Capital Region; DoD Directive 1000.25, DoD Personnel Identity Protection (PIP) Program; DoD...), DoD ID number, date of birth, place of birth, height, weight, race, gender, biometric images and... Region; DoD Directive 1000.25, DoD Personnel Identity Protection (PIP) Program; DoD Directive 5105.68...

  8. A new DoD initiative: the Computational Research and Engineering Acquisition Tools and Environments (CREATE) program

    International Nuclear Information System (INIS)

    Arevalo, S; Atwood, C; Bell, P; Blacker, T D; Dey, S; Fisher, D; Fisher, D A; Genalis, P; Gorski, J; Harris, A; Hill, K; Hurwitz, M; Kendall, R P; Meakin, R L; Morton, S; Moyer, E T; Post, D E; Strawn, R; Veldhuizen, D v; Votta, L G

    2008-01-01

    In FY2008, the U.S. Department of Defense (DoD) initiated the Computational Research and Engineering Acquisition Tools and Environments (CREATE) program, a $360M program with a two-year planning phase and a ten-year execution phase. CREATE will develop and deploy three computational engineering tool sets for DoD acquisition programs to use to design aircraft, ships and radio-frequency antennas. The planning and execution of CREATE are based on the 'lessons learned' from case studies of large-scale computational science and engineering projects. The case studies stress the importance of a stable, close-knit development team; a focus on customer needs and requirements; verification and validation; flexible and agile planning, management, and development processes; risk management; realistic schedules and resource levels; balanced short- and long-term goals and deliverables; and stable, long-term support by the program sponsor. Since it began in FY2008, the CREATE program has built a team and project structure, developed requirements and begun validating them, identified candidate products, established initial connections with the acquisition programs, begun detailed project planning and development, and generated the initial collaboration infrastructure necessary for success by its multi-institutional, multidisciplinary teams

  9. 77 FR 3455 - Privacy Act of 1974; System of Records-Migrant Education Bypass Program Student Database

    Science.gov (United States)

    2012-01-24

    ... DEPARTMENT OF EDUCATION Privacy Act of 1974; System of Records--Migrant Education Bypass Program... (Privacy Act), the Department of Education (Department) publishes this notice of a new system of records... called a ``system of records.'' The Migrant Education Program (MEP) is authorized under Title I, Part C...

  10. 78 FR 3474 - Privacy Act of 1974; Computer Matching Program Between the Office Of Personnel Management and...

    Science.gov (United States)

    2013-01-16

    ... amended by the Computer Matching and Privacy Protection Act of 1988 (Pub. L. 100-503), Office of... Security benefit information to OPM via direct computer link for the administration of certain programs by... OFFICE OF PERSONNEL MANAGEMENT Privacy Act of 1974; Computer Matching Program Between the Office...

  11. 75 FR 53004 - Privacy Act of 1974, as Amended; Notice of Computer-Matching Program (Railroad Retirement Board...

    Science.gov (United States)

    2010-08-30

    ... report of this computer-matching program with the Committee on Homeland Security and Governmental Affairs... INFORMATION: A. General The Computer-Matching and Privacy Protection Act of 1988, (Pub. L. 100-503), amended... RAILROAD RETIREMENT BOARD Privacy Act of 1974, as Amended; Notice of Computer-Matching Program...

  12. 78 FR 34678 - Privacy Act of 1974, as Amended; Notice of Computer Matching Program (Railroad Retirement Board...

    Science.gov (United States)

    2013-06-10

    ... notice of its renewal of an ongoing computer-matching program with the Social Security Administration... computer-matching program with the Committee on Homeland Security and Governmental Affairs of the Senate... Computer Matching and Privacy Protection Act of 1988, (Pub. L. 100-503), amended by the Privacy Act of 1974...

  13. 78 FR 70971 - Privacy Act of 1974, as Amended; Notice of Computer Matching Program (Railroad Retirement Board...

    Science.gov (United States)

    2013-11-27

    ... will file a report of this computer-matching program with the Committee on Homeland Security and... . SUPPLEMENTARY INFORMATION: A. General The Computer Matching and Privacy Protection Act of 1988, (Pub. L. 100-503... RAILROAD RETIREMENT BOARD Privacy Act of 1974, as Amended; Notice of Computer Matching Program...

  14. Application of Artificial Intelligence to the DoD Corporate Information Management (CIM) Program

    Science.gov (United States)

    1992-04-01

    problem of balancing the investments of the corporation between several possible assets; buildings, machine tools, training, R&D and "information...and quality of worklife /learning/empowerment. For the moment the driving factor for the DoD has been identified as cost reduction, however it is clear

  15. 75 FR 60397 - DoD Freedom of Information Act (FOIA) Program

    Science.gov (United States)

    2010-09-30

    ...-354, ``Regulatory Flexibility Act'' (5 U.S.C. 601) It has been certified that 32 CFR part 285 is not subject to the Regulatory Flexibility Act (5 U.S.C. 601) because it would not, if promulgated, have a..., the DoD Field Activities, and all other organizational entities in the Department of Defense...

  16. 77 FR 14955 - DoD Information Assurance Scholarship Program (IASP)

    Science.gov (United States)

    2012-03-14

    ... point of contact at each CAE, responsible for publicizing the DoD IASP to potential recruitment students... college or university to NSA. Centers of Academic Excellence in Information Assurance Education and... proposal, and all colleges and universities subsequently receiving grants must provide documentation on how...

  17. 77 FR 74913 - Privacy Act of 1974, as Amended; Computer Matching Program (Social Security Administration (SSA...

    Science.gov (United States)

    2012-12-18

    ...; Computer Matching Program (Social Security Administration (SSA)/Office of Personnel Management (OPM.... SUPPLEMENTARY INFORMATION: A. General The Computer Matching and Privacy Protection Act of 1988 (Public Law (Pub... computer matching involving the Federal government could be performed and adding certain protections for...

  18. Best Practices for Optimizing DoD Contractor Safety and Occupational Health Program Performance

    Science.gov (United States)

    2012-12-01

    acts and omissions. DoD’s duty arises under OSHA’s Multi-Employer Citation Policy, and in tort and admiralty law, as discussed in Section 2.6...unnecessarily subject the government to legal liability for on-the-job injuries under the Federal Tort Claims Act (FTCA). (b) The government may...housing or any other contractual context. Furthermore, DoD can place itself in a similar position via negligence , or contractual actions as well as

  19. 75 FR 62623 - Privacy Act of 1974, as Amended; Computer Matching Program (SSA/Internal Revenue Service (IRS...

    Science.gov (United States)

    2010-10-12

    ... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA 2010-0015] Privacy Act of 1974, as Amended; Computer Matching Program (SSA/ Internal Revenue Service (IRS))--Match Number 1016 AGENCY: Social Security... regarding protections for such persons. The Privacy Act, as amended, regulates the use of computer matching...

  20. 77 FR 33547 - Privacy Act of 1974, as Amended; Computer Matching Program (SSA/Centers for Medicare and Medicaid...

    Science.gov (United States)

    2012-06-06

    ...: Social Security Administration (SSA). ACTION: Notice of a new computer matching program that will expire... protections for such persons. The Privacy Act, as amended, regulates the use of computer matching by Federal... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA 2012-0015] Privacy Act of 1974, as Amended...

  1. 77 FR 24757 - Privacy Act of 1974, as Amended; Computer Matching Program (SSA/Department of Labor (DOL))-Match...

    Science.gov (United States)

    2012-04-25

    ... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA 2011-0083] Privacy Act of 1974, as Amended; Computer Matching Program (SSA/ Department of Labor (DOL))--Match Number 1015 AGENCY: Social Security... regarding protections for such persons. The Privacy Act, as amended, regulates the use of computer matching...

  2. 77 FR 38880 - Privacy Act of 1974, as Amended; Computer Matching Program (SSA/Railroad Retirement Board (SSA...

    Science.gov (United States)

    2012-06-29

    ... Security Administration (SSA). ACTION: Notice of a renewal of an existing computer matching program that... regarding protections for such persons. The Privacy Act, as amended, regulates the use of computer matching... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA 2012-0002] Privacy Act of 1974, as Amended...

  3. 76 FR 12398 - Privacy Act of 1974, as Amended; Computer Matching Program (SSA/Bureau of the Public Debt (BPD...

    Science.gov (United States)

    2011-03-07

    ... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA 2010-0034] Privacy Act of 1974, as Amended; Computer Matching Program (SSA/ Bureau of the Public Debt (BPD))--Match Number 1304 AGENCY: Social Security... as shown above. SUPPLEMENTARY INFORMATION: A. General The Computer Matching and Privacy Protection...

  4. 75 FR 43579 - Privacy Act of 1974; Computer Matching Program Between the Office of Personnel Management and...

    Science.gov (United States)

    2010-07-26

    ... the Computer Matching and Privacy Protection Act of 1988 (Pub. L. 100-503), Office of Management and... safeguards for disclosure of Social Security benefit information to OPM via direct computer link for the... OFFICE OF PERSONNEL MANAGEMENT Privacy Act of 1974; Computer Matching Program Between the Office...

  5. 78 FR 69925 - Privacy Act of 1974, as Amended; Computer Matching Program (SSA/Bureau of the Fiscal Service...

    Science.gov (United States)

    2013-11-21

    ... regarding protections for such persons. The Privacy Act, as amended, regulates the use of computer matching... savings securities. C. Authority for Conducting the Matching Program This computer matching agreement sets... amended by the Computer Matching and Privacy Protection Act of 1988, as amended, and the regulations and...

  6. 75 FR 9012 - Privacy Act of 1974, as Amended; Computer Matching Program (SSA/U.S. Department of Health and...

    Science.gov (United States)

    2010-02-26

    ... INFORMATION: A. General The Computer Matching and Privacy Protection Act of 1988 (Pub. L. 100-503), amended... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA-2009-0052] Privacy Act of 1974, as Amended; Computer Matching Program (SSA/ U.S. Department of Health and Human Services (HHS), Administration for...

  7. 78 FR 12128 - Privacy Act of 1974; Computer Matching Program (SSA/Department of the Treasury, Internal Revenue...

    Science.gov (United States)

    2013-02-21

    ... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA 2012-0067] Privacy Act of 1974; Computer Matching... Security Administration (SSA). ACTION: Notice of a renewal of an existing computer matching program... INFORMATION: A. General The Computer Matching and Privacy Protection Act of 1988 (Public Law (Pub. L.) 100-503...

  8. 77 FR 6620 - Privacy Act of 1974, as Amended; Computer Matching Program (SSA/the States); Match 6000 and 6003

    Science.gov (United States)

    2012-02-08

    ... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA 2011-0102] Privacy Act of 1974, as Amended; Computer Matching Program (SSA/ the States); Match 6000 and 6003 AGENCY: Social Security Administration..., as shown above. SUPPLEMENTARY INFORMATION: A. General The Computer Matching and Privacy Protection...

  9. 75 FR 68396 - Privacy Act of 1974, as Amended; Computer Matching Program (SSA/Department of Labor (DOL))-Match...

    Science.gov (United States)

    2010-11-05

    ... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA 2010-0052] Privacy Act of 1974, as Amended; Computer Matching Program (SSA/ Department of Labor (DOL))--Match Number 1003 AGENCY: Social Security... as shown above. SUPPLEMENTARY INFORMATION: A. General The Computer Matching and Privacy Protection...

  10. 76 FR 5235 - Privacy Act of 1974, as Amended; Computer Matching Program (SSA Internal Match)-Match Number 1014

    Science.gov (United States)

    2011-01-28

    ...; Computer Matching Program (SSA Internal Match)--Match Number 1014 AGENCY: Social Security Administration... regarding protections for such persons. The Privacy Act, as amended, regulates the use of computer matching....C. 552a, as amended, and the provisions of the Computer Matching and Privacy Protection Act of 1988...

  11. 75 FR 18251 - Privacy Act of 1974, as Amended; Computer Matching Program (SSA/Internal Revenue Service (IRS...

    Science.gov (United States)

    2010-04-09

    ... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA-2009-0066] Privacy Act of 1974, as Amended; Computer Matching Program (SSA/ Internal Revenue Service (IRS))--Match 1305 AGENCY: Social Security... INFORMATION: A. General The Computer Matching and Privacy Protection Act of 1988 (Public Law (Pub. L.) 100-503...

  12. 75 FR 32833 - Privacy Act of 1974, as Amended; Computer Matching Program (SSA/Office of Personnel Management...

    Science.gov (United States)

    2010-06-09

    ... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA-2009-0077] Privacy Act of 1974, as Amended; Computer Matching Program (SSA/ Office of Personnel Management (OPM))--Match 1307 AGENCY: Social Security... INFORMATION: A. General The Computer Matching and Privacy Protection Act of 1988 (Public Law (Pub. L.) 100-503...

  13. 75 FR 59780 - Privacy Act of 1974, as Amended; Computer Matching Program (SSA/Railroad Retirement Board (RRB...

    Science.gov (United States)

    2010-09-28

    ... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA 2010-0040] Privacy Act of 1974, as Amended; Computer Matching Program (SSA/ Railroad Retirement Board (RRB))--Match Number 1006 AGENCY: Social Security...: A. General The Computer Matching and Privacy Protection Act of 1988 (Pub. L.) 100-503), amended the...

  14. 77 FR 24756 - Privacy Act of 1974, as Amended; Computer Matching Program (SSA/Department of Labor (DOL))-Match...

    Science.gov (United States)

    2012-04-25

    ... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA 2011-0084] Privacy Act of 1974, as Amended; Computer Matching Program (SSA/ Department of Labor (DOL))--Match Number 1003 AGENCY: Social Security... above. SUPPLEMENTARY INFORMATION: A. General The Computer Matching and Privacy Protection Act of 1988...

  15. 75 FR 12226 - Privacy Act of 1974; Computer Matching Program

    Science.gov (United States)

    2010-03-15

    ... Naturalization Service. SUMMARY: Pursuant to the Office of Management and Budget (OMB) Final Guidance... and Mathematics Access to Retain Talent Grant Program; the Iraq and Afghanistan Service Grant Program... met. 6. Address for Receipt of Public Comments or Inquires. Mr. Leroy Everett, Management and Program...

  16. Privacy Impact Assessment for the Wellness Program Medical Records

    Science.gov (United States)

    The Wellness Program Medical Records System collects contact information and other Personally Identifiable Information (PII). Learn how this data is collected, used, accessed, the purpose of data collection, and record retention policies.

  17. 78 FR 69076 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2013-11-18

    ... Medical Human Resources System internet (DMHRSi). DHA 12 EDHA 12 Third Party Collection System. DHA 16 DoD... DEPARTMENT OF DEFENSE Office of the Secretary [Docket ID: DoD-2013-OS-0216] Privacy Act of 1974... Defense Health Agency's compilation of Privacy Act SORNS. The realignment of the nineteen system...

  18. 78 FR 15730 - Privacy Act of 1974; Computer Matching Program

    Science.gov (United States)

    2013-03-12

    ... the New York Department of Labor. SUMMARY: This document provides notice of the existence of a...), requires DHS to establish a system for the verification of immigration status of alien applicants for, or... order to prevent the issuance of benefits to alien applicants who are not entitled to program benefits...

  19. 76 FR 50198 - Privacy Act of 1974; Computer Matching Program

    Science.gov (United States)

    2011-08-12

    ... Management (OPM) (source agency). This matching program will become effective as explained in this notice. In... between ED and OPM is to assist ED in detecting improper disbursements or overpayments of need- based... underreport family income on the Free Application for Federal Student Aid (FAFSA). Financial need is...

  20. 78 FR 73195 - Privacy Act of 1974: CMS Computer Matching Program Match No. 2013-01; HHS Computer Matching...

    Science.gov (United States)

    2013-12-05

    ... 1974: CMS Computer Matching Program Match No. 2013-01; HHS Computer Matching Program Match No. 1312 AGENCY: Centers for Medicare & Medicaid Services (CMS), Department of Health and Human Services (HHS... Privacy Act of 1974 (5 U.S.C. 552a), as amended, this notice announces the renewal of a CMP that CMS plans...

  1. 77 FR 32709 - Privacy Act of 1974, as Amended; Computer Matching Program (SSA/Department of Homeland Security...

    Science.gov (United States)

    2012-06-01

    ...; Computer Matching Program (SSA/ Department of Homeland Security (DHS))--Match Number 1010 AGENCY: Social Security Administration (SSA). ACTION: Notice of a renewal of an existing computer matching program that... amended by the Computer Matching and Privacy Protection Act of 1988, as amended, and the regulations and...

  2. 75 FR 53005 - Privacy Act of 1974, as amended; Notice of Computer Matching Program (Railroad Retirement Board...

    Science.gov (United States)

    2010-08-30

    ... notice of its renewal of an ongoing computer-matching program with the Social Security Administration... computer-matching program with the Committee on Homeland Security and Governmental Affairs of the Senate.... General The Computer Matching and Privacy Protection Act of 1988, (Pub. L. 100-503), amended by the...

  3. PEPFAR/DOD/Pharmaccess/Tanzania Peoples Defence Forces HIV/AIDS Program

    Science.gov (United States)

    2009-09-01

    NACP National AIDS Control Program NGO Non Governmental Organization NLTP National Leprosy and TB Program NS National Service OIS...have an ongoing DOT-TB program monitored by the Regional Medical Officer, in line with the guidelines of the National Tuberculosis and Leprosy ...and treatment, according to the guidelines of the NACP TB Unit and the National TB and Leprosy Programme (NTLP). 48 48 C Train medical officers

  4. Military Transformation: Progress and Challenges for DOD's Advanced Distributed Learning Programs

    National Research Council Canada - National Science Library

    Ensign, John

    2003-01-01

    ...) programs such as Internet-based training as critical to achieving the department's training and overarching transformation goals and to deliver the highest quality training cost effectively anytime...

  5. DOD Business Systems Modernization: Military Departments Need to Strengthen Management of Enterprise Architecture Programs

    National Research Council Canada - National Science Library

    Hite, Randolph C; Johnson, Tonia; Eagle, Timothy; Epps, Elena; Holland, Michael; Lakhmani, Neela; LaPaza, Rebecca; Le, Anh; Paintsil, Freda

    2008-01-01

    .... Our framework for managing and evaluating the status of architecture programs consists of 31 core elements related to architecture governance, content, use, and measurement that are associated...

  6. DOD Residential Proton Exchange Membrane (PEM) Fuel Cell Demonstration Program. Volume 2. Summary of Fiscal Year 2001-2003 Projects

    Science.gov (United States)

    2005-09-01

    produced many of the Beatles 1970s recordings. This facility was selected to host the UK PEM demonstration project from a selection of four potential sites...funded the Department of Defense (DOD) Residential PEM Demonstration Project to demonstrate domestically-produced, residential Proton Exchange Membrane...PEM) fuel cells at DOD Facilities. The objectives were to: (1) assess PEM fuel cells’ role in supporting sustainability at military installations

  7. Acquisition: Implementation of the DoD Management Control Program for Navy Acquisition Category II and III Programs

    National Research Council Canada - National Science Library

    2004-01-01

    ... deviations in cost, schedule, and performance requirements in acquisition program baselines for Acquisition Category II and III programs and in identifying whether program managers are reporting...

  8. Technical Assistance and Program Support: DoD Historical Black Colleges and Universities and Minority Institutions Program

    National Research Council Canada - National Science Library

    Andrews, Aaron

    2003-01-01

    ... (His), the United Negro College Fund Special Programs developed and implemented a comprehensive technical assistance and infrastructure program This program has provided HBCUs, HSIs, TCUs, and MIs...

  9. DoD Science and Engineering Apprenticeship Program for High School Students, 1995-󈨤 Activities

    Science.gov (United States)

    1996-06-01

    University of Florida Sports Medicine Honor Roll Weightlifting , Swimming NAME: RACE: SEX: HIGH SCHOOL: ANTICIPATED COLLEGE: ANTICIPATED MAJOR...program. Three of the students took a Psychology course, one took a Nutritional Science class, one a Math course and two of them took a Meteorology...Awards and Scholarships: Honor Roll 13. Activities/Hobbies: Weightlifting , Swimming (Suggested Form) INFORMATION FOR EACH APPRENTICE

  10. 2010 Department of Defense (DoD) Chemical and Biological Defense Program (CBDP) Portfolio

    Science.gov (United States)

    2010-03-01

    26 FW OT&E MBU-25/26 FW When integrated with antigravity (anti-G) equipment, the MBU-25 and MBU-26 each provide simultaneous CB protection and anti...Analysis of Materiel Approaches anti-G .............. Antigravity APB .................Acquisition Program Baseline APG

  11. DoD Science and Engineering Apprenticeship Program for High School Students, 1996-󈨥 Activities

    Science.gov (United States)

    1997-05-01

    Science Fair, A Honor Roll Baseball, Cross Country, Athletics, Weightlifting , Computers Robert Sidney Cox, III Other Male Leon High School...Sports Medicine Honor Roll Weightlifting , Swimming Marcus Mills Black Male Godby High School Florida State University Undecided FSU Incentive...paid for by the program. Seven of the students took a Psy- chology course, one a Nutritional Science class and two a Mathematics course. Eight of these

  12. Counterterrorism: DOD Should Enhance Management of and Reporting on Its Global Train and Equip Program

    Science.gov (United States)

    2016-04-01

    this work may contain copyrighted images or other material , permission from the copyright holder may be necessary if you wish to reproduce this... material separately. Page 1 GAO-16-368 Counterterrorism 441 G St. N.W. Washington, DC 20548 April 18, 2016 Congressional Committees...The fiscal year 2015 National Defense Authorization Act (NDAA) included a provision for GAO to conduct biennial audits of programs conducted pursuant

  13. 76 FR 63896 - Federal Acquisition Regulation; Privacy Training, 2010-013

    Science.gov (United States)

    2011-10-14

    ... should a breach occur; and (7) Any agency-specific privacy training requirements. (d) The contractor is... Acquisition Regulation; Privacy Training, 2010-013 AGENCY: Department of Defense (DoD), General Services... contractors to complete training that addresses the protection of privacy, in accordance with the Privacy Act...

  14. 75 FR 35847 - Privacy Act of 1974, Computer Matching Program-U.S. Small Business Administration and U.S...

    Science.gov (United States)

    2010-06-23

    ... ID Number, Product (Home/Business) and Registration Occupant Social Security Number to create a New... SMALL BUSINESS ADMINISTRATION Privacy Act of 1974, Computer Matching Program--U.S. Small Business Administration and U.S. Department of Homeland Security, Federal Emergency Management Agency AGENCY: Small...

  15. 78 FR 4968 - Privacy Act of 1974, Computer Matching Program-U.S. Small Business Administration and U.S...

    Science.gov (United States)

    2013-01-23

    ... Small Business Administration (SBA) and the Department of Homeland Security, Federal Emergency... Security Officer, Office of the Chief Information Officer, Small Business Administration. Eric Won, Chief... SMALL BUSINESS ADMINISTRATION Privacy Act of 1974, Computer Matching Program--U.S. Small Business...

  16. 76 FR 12397 - Privacy Act of 1974, as Amended; Computer Matching Program (SSA/Bureau of the Public Debt (BPD...

    Science.gov (United States)

    2011-03-07

    ...; Computer Matching Program (SSA/ Bureau of the Public Debt (BPD))--Match Number 1038 AGENCY: Social Security... as shown above. SUPPLEMENTARY INFORMATION: A. General The Computer Matching and Privacy Protection... containing SSNs extracted from the Supplemental Security Record database. Exchanges for this computer...

  17. Battleplan for an Unqualified Opinion: How Does the DoD FM Certification Program Help Fix the DoD’s Audit Problem

    Science.gov (United States)

    2016-02-29

    test based certifications to determine if the program enhances the knowledge of the FM workforce and improves financial reporting . This paper found... financial reporting for the federal government.9 This step was extremely important in that it put an emphasis on improving the current state of financial ...likely new to the career field and would not require as in depth knowledge of financial management. Level two is more the intermediate and journeyman

  18. Privacy Policy

    Science.gov (United States)

    ... Home → NLM Privacy Policy URL of this page: https://medlineplus.gov/privacy.html NLM Privacy Policy To ... out of cookies in the most popular browsers, http://www.usa.gov/optout_instructions.shtml. Please note ...

  19. Geological investigations and hydrogeologic model development in support of DoD and DOE environmental programs on Kirtland Air Force Base, New Mexico, U.S.A

    International Nuclear Information System (INIS)

    Gibson, J.D.; Pratt, G.; Davidson, H.; DeWitt, C.; Hitchcock, C.; Kelson, K.; Noller, J.; Sawyer, T.; Thomas, E.

    1994-01-01

    This paper presents results of preliminary geologic site characterization and hydrogeologic conceptual model development for the 250-km 2 Kirtland Air Force Base (KAFB) and associated lands in central New Mexico. The research, development, and other operational activities of the Department of Defense (DoD) and Department of Energy (DOE) on KAFB over the last 50 years have resulted in diverse hazardous, radioactive, and mixed-waste environmental concerns. Because multiple federal, state, and local agencies are responsible for administrating the involved lands and because of the nature of many U.S. environmental regulations, individual contaminated and potentially contaminated DoD and DOE environmental restoration (ER) sites on KAFB are commonly handled as distinct entities with little consideration for the cumulative environmental and health risk from all sites. A site-wide characterization program has been undertaken at Sandia National Laboratories/New Mexico (SNL/NM), under the auspices of the DOE, to construct a conceptual hydrogeologic model for the base. This conceptual model serves as the basis for placing each ER site into a broader context for evaluating background (i.e., non-contaminated) conditions and for modeling of possible contaminant pathways and travel-times. Regional and local hydrogeologic investigations from KAFB can be used as models for characterizing and evaluating other sites around the world where combined civilian and military environmental programs must work together to resolve environmental problems that may present health risks to workers and the general public

  20. 75 FR 77849 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2010-12-14

    ... Agency, Defense Threat Reduction Agency, Missile Defense Organization, Pentagon Force Protection Agency... DEPARTMENT OF DEFENSE Office of the Secretary [Docket ID: DOD-2010-OS-0160] Privacy Act of 1974; System of Records AGENCY: Office of the Secretary of Defense, DoD. ACTION: Notice to add a system of...

  1. A linear programming model for preserving privacy when disclosing patient spatial information for secondary purposes.

    Science.gov (United States)

    Jung, Ho-Won; El Emam, Khaled

    2014-05-29

    A linear programming (LP) model was proposed to create de-identified data sets that maximally include spatial detail (e.g., geocodes such as ZIP or postal codes, census blocks, and locations on maps) while complying with the HIPAA Privacy Rule's Expert Determination method, i.e., ensuring that the risk of re-identification is very small. The LP model determines the transition probability from an original location of a patient to a new randomized location. However, it has a limitation for the cases of areas with a small population (e.g., median of 10 people in a ZIP code). We extend the previous LP model to accommodate the cases of a smaller population in some locations, while creating de-identified patient spatial data sets which ensure the risk of re-identification is very small. Our LP model was applied to a data set of 11,740 postal codes in the City of Ottawa, Canada. On this data set we demonstrated the limitations of the previous LP model, in that it produces improbable results, and showed how our extensions to deal with small areas allows the de-identification of the whole data set. The LP model described in this study can be used to de-identify geospatial information for areas with small populations with minimal distortion to postal codes. Our LP model can be extended to include other information, such as age and gender.

  2. Managing Sensitive Information: DOD Can More Effectively Reduce the Risk of Classification Errors

    National Research Council Canada - National Science Library

    D'Agostino, Davi M; Borseth, Ann; Fenton, Mattias; Hatton, Adam; Hills, Barbara; Keefer, David; Mayfield, David; Reid, Jim; Richardson, Terry; Schwartz, Marc

    2006-01-01

    ...) information security program are increasing the risk of misclassification. DoD's information security program is decentralized to the DoD component level, and the Office of the Under Secretary of Defense for Intelligence (OUSD...

  3. 76 FR 52320 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2011-08-22

    ... & Privacy, and DoD Information Assurance Regulations. Auditing: Audit trail records from all available.../JS Privacy Office, Freedom of Information Directorate, Washington Headquarters Services, 1155 Defense... Defense. DHA 23 System name: Pharmacy Data Transaction Service (PDTS). System location: Primary: Emdeon...

  4. 78 FR 21600 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2013-04-11

    ... DEPARTMENT OF DEFENSE Office of the Secretary [Docket ID: DoD-2013-OS-0050] Privacy Act of 1974... notice in its existing inventory of record systems subject to the Privacy Act of 1974 (5 U.S.C. 552a), as... members of the public is to make these submissions available for public viewing on the Internet at http...

  5. 76 FR 10010 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2011-02-23

    ... DEPARTMENT OF DEFENSE Office of the Secretary [Docket ID: DOD-2011-OS-0020] Privacy Act of 1974... inventory of records systems subject to the Privacy Act of 1974 (5 U.S.C. 552a), as amended. DATES: This... the public is to make these submissions available for public viewing on the Internet at http://www...

  6. 78 FR 52517 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2013-08-23

    ... DEPARTMENT OF DEFENSE Office of the Secretary [Docket ID DoD-2013-OS-0183] Privacy Act of 1974... systems subject to the Privacy Act of 1974 (5 U.S.C. 552a), as amended. DATES: This proposed action will... public is to make these submissions available for public viewing on the Internet at http://www...

  7. 76 FR 53420 - Privacy Act of 1974; Systems of Records

    Science.gov (United States)

    2011-08-26

    ... DEPARTMENT OF DEFENSE Office of the Secretary [Docket ID: DOD-2011-OS-0097] Privacy Act of 1974... notice in its existing inventory of records systems subject to the Privacy Act of 1974, (5 U.S.C. 552a... submissions available for public viewing on the Internet at http://www.regulations.gov as they are [[Page...

  8. 76 FR 11213 - Privacy Act of 1974; Systems of Records

    Science.gov (United States)

    2011-03-01

    ... DEPARTMENT OF DEFENSE Office of the Secretary [Docket ID DOD-2011-OS-0017] Privacy Act of 1974... inventory of records systems subject to the Privacy Act of 1974 (5 U.S.C. 552a), as amended. DATES: This... public is of make these submissions available for public viewing on the Internet at http://www...

  9. 77 FR 37002 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2012-06-20

    ... DEPARTMENT OF DEFENSE Office of the Secretary [Docket ID: DOD-2012-OS-0072] Privacy Act of 1974... inventory of record systems subject to the Privacy Act of 1974 (5 U.S.C. 552a), as amended. DATES: This... available for public viewing on the Internet at http://www.regulations.gov as they are received without...

  10. 76 FR 43993 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2011-07-22

    ... DEPARTMENT OF DEFENSE Office of the Secretary [Docket ID: DOD-2011-OS-0081] Privacy Act of 1974... the Privacy Act of 1974, (5 U.S.C. 552a), as amended. DATES: This proposed action would be effective... the public is to make these submissions available for public viewing on the Internet at http://www...

  11. 75 FR 39921 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2010-07-13

    ... DEPARTMENT OF DEFENSE Office of the Secretary [Docket ID: DOD-2010-OS-0102] Privacy Act of 1974... inventory of records systems subject to the Privacy Act of 1974, (5 U.S.C. 552a), as amended. DATES: This... on the Internet at http://www.regulations.gov as they are received without change, including any...

  12. 75 FR 17910 - Privacy Act of 1974; Systems of Records

    Science.gov (United States)

    2010-04-08

    ... DEPARTMENT OF DEFENSE Office of the Secretary [Docket ID: DOD-2010-OS-0040] Privacy Act of 1974... inventory of records systems subject to the Privacy Act of 1974, (5 U.S.C. 552a), as amended. DATES: This... viewing on the Internet at http://www.regulations.gov as they are received without change, including any...

  13. 76 FR 10008 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2011-02-23

    ... DEPARTMENT OF DEFENSE Office of the Secretary [Docket ID: DOD-2011-OS-0023] Privacy Act of 1974... inventory of record systems subject to the Privacy Act of 1974, (5 U.S.C. 552a), as amended. DATES: This... from members of the public is to make these submissions available for public viewing on the Internet at...

  14. 76 FR 66698 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2011-10-27

    ... DEPARTMENT OF DEFENSE Office of the Secretary [Docket ID: DOD-2011-OS-0117] Privacy Act of 1974... notice from its existing inventory of record systems subject to the Privacy Act of 1974, (5 U.S.C. 552a... submissions available for public viewing on the Internet at http://www.regulations.gov as they are received...

  15. 75 FR 52517 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2010-08-26

    ... DEPARTMENT OF DEFENSE Office of the Secretary [Docket ID DOD-2010-OS-0117] Privacy Act of 1974... existing inventory of record systems subject to the Privacy Act of 1974, (5 U.S.C. 552a), as amended. DATES... available for public viewing on the Internet at http://www.regulations.gov as they are received without...

  16. 75 FR 33789 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2010-06-15

    ... DEPARTMENT OF DEFENSE Office of the Secretary [Docket ID: DOD-2010-OS-0078] Privacy Act of 1974... existing inventory of record systems subject to the Privacy Act of 1974, (5 U.S.C. 552a), as amended. DATES... on the Internet at http://www.regulations.gov as they are received without change, including any...

  17. 78 FR 31905 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2013-05-28

    ... DEPARTMENT OF DEFENSE Office of the Secretary [Docket ID: DoD-2013-OS-0110] Privacy Act of 1974... notice in its existing inventory of record systems subject to the Privacy Act of 1974 (5 U.S.C. 552a), as... members of the public is to make these submissions available for public viewing on the Internet at http...

  18. 76 FR 45543 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2011-07-29

    ... DEPARTMENT OF DEFENSE Office of the Secretary [Docket ID: DOD-2011-OS-0082] Privacy Act of 1974... subject to the Privacy Act of 1974, (5 U.S.C. 552a), as amended. DATES: This proposed action will be... the public is to make these submissions available for public viewing on the Internet at http://www...

  19. 77 FR 65539 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2012-10-29

    ... DEPARTMENT OF DEFENSE Office of the Secretary [Docket ID: DoD-2012-OS-0132] Privacy Act of 1974... existing inventory of record systems subject to the Privacy Act of 1974 (5 U.S.C. 552a), as amended. [[Page... Internet at http://www.regulations.gov as they are received without change, including any personal...

  20. 76 FR 70428 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2011-11-14

    ... DEPARTMENT OF DEFENSE Office of the Secretary [Docket ID: DOD-2011-OS-0120] Privacy Act of 1974... notice from its existing inventory of record systems subject to the Privacy Act of 1974, (5 U.S.C. 552a... submissions available for public viewing on the Internet at http://www.regulations.gov as they are received...

  1. 76 FR 62394 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2011-10-07

    ... DEPARTMENT OF DEFENSE Office of the Secretary [Docket ID: DOD-2011-OS-0109] Privacy Act of 1974... notice from its existing inventory of record systems subject to the Privacy Act of 1974 (5 U.S.C. 552a... public is to make these submissions available for public viewing on the Internet at http://www...

  2. 75 FR 10476 - Privacy Act of 1974; Systems of Records

    Science.gov (United States)

    2010-03-08

    ... DEPARTMENT OF DEFENSE Office of the Secretary [Docket ID DOD-2010-OS-0021] Privacy Act of 1974... inventory of records systems subject to the Privacy Act of 1974, (5 U.S.C. 552a), as amended. DATES: This... on the Internet at http://www.regulations.gov as they are received without change, including any...

  3. 76 FR 1409 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2011-01-10

    ... DEPARTMENT OF DEFENSE Office of the Secretary [Docket ID: DOD-2011-OS-0001] Privacy Act of 1974... inventory of record systems subject to the Privacy Act of 1974, (5 U.S.C. 552a), as amended. DATES: This... from members of the public is to make these submissions available for public viewing on the Internet at...

  4. 75 FR 81247 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2010-12-27

    ... DEPARTMENT OF DEFENSE Office of the Secretary [Docket ID DOD-2010-OS-0168] Privacy Act of 1974... inventory of records systems subject to the Privacy Act of 1974, (5 U.S.C. 552a), as amended. DATES: This... public is to make these submissions available for public viewing on the Internet at http://www...

  5. 76 FR 22682 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2011-04-22

    ... DEPARTMENT OF DEFENSE Office of the Secretary [Docket ID DOD-2011-OS-0044] Privacy Act of 1974... inventory of record systems subject to the Privacy Act of 1974, (5 U.S.C. 552a), as amended. DATES: This... from members of the public is to make these submissions available for public viewing on the Internet at...

  6. 75 FR 29728 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2010-05-27

    ... DEPARTMENT OF DEFENSE Office of the Secretary [Docket ID: DOD-2010-OS-0067] Privacy Act of 1974... existing inventory of record systems subject to the Privacy Act of 1974, (5 U.S.C. 552a), as amended. DATES... on the Internet at http://www.regulations.gov as they are received without change, including any...

  7. 78 FR 6078 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2013-01-29

    ... DEPARTMENT OF DEFENSE Office of the Secretary [Docket ID: DoD-2013-OS-0011] Privacy Act of 1974... record systems subject to the Privacy Act of 1974 (5 U.S.C. 552a), as amended. DATES: This proposed... public is to make these submissions available for public viewing on the Internet at http:// [[Page 6079...

  8. 77 FR 37885 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2012-06-25

    ... DEPARTMENT OF DEFENSE Office of the Secretary [Docket ID DOD-2012-OS-0074] Privacy Act of 1974... existing inventory of record systems subject to the Privacy Act of 1974 (5 U.S.C. 552a), as amended. DATES... available for public viewing on the Internet at http://www.regulations.gov as they are received without...

  9. 78 FR 60265 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2013-10-01

    ... DEPARTMENT OF DEFENSE Office of the Secretary [Docket ID DoD-2013-OS-0201] Privacy Act of 1974... inventory of record systems subject to the Privacy Act of 1974, as amended. DATES: This proposed action will... submissions available for public viewing on the Internet at http://www.regulations.gov as they are received...

  10. 75 FR 16760 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2010-04-02

    ... DEPARTMENT OF DEFENSE Office of the Secretary [Docket ID: DOD-2010-OS-0037] Privacy Act of 1974... inventory of record systems subject to the Privacy Act of 1974 (5 U.S.C. 552a), as amended. DATES: This... on the Internet at http://www.regulations.gov as they are received without change, including any...

  11. 78 FR 5788 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2013-01-28

    ... DEPARTMENT OF DEFENSE Office of the Secretary [Docket ID: DoD-2013-OS-0005] Privacy Act of 1974... of record systems subject to the Privacy Act of 1974 (5 U.S.C. 552a), as amended. DATES: This... of the public is to make these submissions available for public viewing on the Internet at http://www...

  12. 77 FR 60400 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2012-10-03

    ... DEPARTMENT OF DEFENSE Office of the Secretary [Docket ID DOD-2012-OS-0119] Privacy Act of 1974... inventory of record systems subject to the Privacy Act of 1974, (5 U.S.C. 552a(r)), as amended. DATES: This... public is to make these submissions available for public viewing on the Internet at http://www...

  13. 75 FR 33788 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2010-06-15

    ... DEPARTMENT OF DEFENSE Office of the Secretary [Docket ID: DOD-2010-OS-0077] Privacy Act of 1974... existing inventory of record systems subject to the Privacy Act of 1974, (5 U.S.C. 552a), as amended. DATES... on the Internet at http:// [[Page 33789

  14. 75 FR 15694 - Privacy Act of 1974; Systems of Records

    Science.gov (United States)

    2010-03-30

    ... DEPARTMENT OF DEFENSE Office of the Secretary [Docket ID: DOD-2010-OS-0035] Privacy Act of 1974... inventory of records systems subject to the Privacy Act of 1974, (5 U.S.C. 552a), as amended. DATES: This... on the Internet at http://www.regulations.gov as they are received without change, including any...

  15. 75 FR 65456 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2010-10-25

    ... DEPARTMENT OF DEFENSE Office of the Secretary [Docket ID: DOD-2010-OS-0147] Privacy Act of 1974... existing inventory of record systems subject to the Privacy Act of 1974 (5 U.S.C. 552a), as amended. [[Page... available for public viewing on the Internet at http://www.regulations.gov as they are received without...

  16. 77 FR 26260 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2012-05-03

    ... DEPARTMENT OF DEFENSE Office of the Secretary [Docket ID DoD-2012-OS-0030] Privacy Act of 1974... inventory of records systems subject to the Privacy Act of 1974, (5 U.S.C. 552a), as amended. DATES: This... make these submissions available for public viewing on the Internet at http://www.regulations.gov as...

  17. 77 FR 66442 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2012-11-05

    ... DEPARTMENT OF DEFENSE Office of the Secretary [Docket ID: DoD-2012-OS-0133] Privacy Act of 1974... existing inventory of record systems subject to the Privacy Act of 1974 (5 U.S.C. 552a), as amended. DATES... Internet at http://www.regulations.gov as they are received without change, including any personal...

  18. 78 FR 14279 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2013-03-05

    ... DEPARTMENT OF DEFENSE Office of the Secretary [Docket ID DoD-2013-OS-0040] Privacy Act of 1974... of record systems subject to the Privacy Act of 1974 (5 U.S.C. 552a), as amended. DATES: This... of the public is to make these submissions available for public viewing on the Internet at http://www...

  19. 78 FR 14273 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2013-03-05

    ... DEPARTMENT OF DEFENSE Office of the Secretary [Docket ID DoD-2013-OS-0019] Privacy Act of 1974... record systems subject to the Privacy Act of 1974 (5 U.S.C. 552a), as amended. DATES: This proposed... public is to make these submissions available for public viewing on the Internet at http://www...

  20. 75 FR 3714 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2010-01-22

    ... DEPARTMENT OF DEFENSE Office of the Secretary [Docket ID: DOD-2010-OS-0004] Privacy Act of 1974... its existing inventory of record systems subject to the Privacy Act of 1974, (5 U.S.C. 552a), as... available for public viewing on the Internet at http://www.regulations.gov as they are received without...

  1. 76 FR 28002 - Privacy Act of 1974; Systems of Records

    Science.gov (United States)

    2011-05-13

    ... DEPARTMENT OF DEFENSE Office of the Secretary [Docket ID: DOD-2011-OS-0052] Privacy Act of 1974... existing inventory of records systems subject to the Privacy Act of 1974 (5 U.S.C. 552a), as amended. DATES... the public is to make these submissions available for public viewing on the Internet at http://www...

  2. 77 FR 35945 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2012-06-15

    ... DEPARTMENT OF DEFENSE Office of the Secretary [Docket ID: DOD-2012-OS-0067] Privacy Act of 1974... systems subject to the Privacy Act of 1974 (5 U.S.C. 552a), as amended. DATES: The proposed action will be... Internet at http://www.regulations.gov as they are received without change, including any personal...

  3. 75 FR 62111 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2010-10-07

    ... DEPARTMENT OF DEFENSE Office of the Secretary [Docket ID: DOD-2010-OS-0140] Privacy Act of 1974... records notices in its existing inventory of record systems subject to the Privacy Act of 1974, (5 U.S.C... submissions available for public viewing on the Internet at http://www.regulations.gov as they are received...

  4. 78 FR 22525 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2013-04-16

    ... DEPARTMENT OF DEFENSE Office of the Secretary [Docket ID: DoD-2013-0057] Privacy Act of 1974... systems subject to the Privacy Act of 1974 (5 U.S.C. 552a), as amended. DATES: This proposed action will... submissions available for public viewing on the Internet at http://www.regulations.gov as they are received...

  5. 77 FR 48199 - Privacy Act; System of Records: State-35, Information Access Programs Records

    Science.gov (United States)

    2012-08-13

    ..., the Privacy Act, the Ethics in Government Act, the access provisions of Executive Order 13526 or a...; requester's name and requester's mailing and email address; Social Security number (if provided by the...: Hard copy and electronic media. RETRIEVABILITY: Individual name, case number. SAFEGUARDS: All users are...

  6. DOD Open Government

    Science.gov (United States)

    increase transparency and openness. We encourage you to explore other information on our website to learn Defense Search DOD Open Government: Home Open Government @ DoD Transparency Congressional Inquiries IT Dashboard.gov Regulations.gov Challenge.gov Performance.gov ForeignAssistance.gov Transparency

  7. 78 FR 32554 - Privacy Act; Implementation

    Science.gov (United States)

    2013-05-31

    ..., or intelligence efforts by putting the subject of an investigation, study or analysis on notice of...] Privacy Act; Implementation AGENCY: National Geospatial-Intelligence Agency (NGA), DoD. ACTION: Direct final rule. SUMMARY: National Geospatial-Intelligence Agency (NGA) is proposing to update the NGA...

  8. Military Training: Management Actions Needed to Enhance DOD's Investment in the Joint National Training Capability

    National Research Council Canada - National Science Library

    St. Laurent, Janet; Durland, Laura; Harrison, Fred; Faley, Joe; Anderson, Bonita; Watson, Angela; Song, Yong; Keith, Kevin; Ditto, Susan; Shea, Rebecca

    2006-01-01

    .... While DOD's initial training transformation assessment set a basic framework for measuring future program performance, DOD has not developed a strategy to evaluate the overall impact of the JNTC...

  9. Information privacy fundamentals for librarians and information professionals

    CERN Document Server

    Givens, Cherie L

    2014-01-01

    This book introduces library and information professionals to information privacy, provides an overview of information privacy in the library and information science context, U.S. privacy laws by sector, information privacy policy, and key considerations when planning and creating a privacy program.

  10. Privacy policies

    NARCIS (Netherlands)

    Dekker, M.A.C.; Etalle, S.; Hartog, den J.I.; Petkovic, M.; Jonker, W.

    2007-01-01

    Privacy is a prime concern in today’s information society. To protect the privacy of individuals, enterprises must follow certain privacy practices while collecting or processing personal data. In this chapter we look at the setting where an enterprise collects private data on its website, processes

  11. Privacy Policies

    NARCIS (Netherlands)

    Dekker, M.A.C.; Etalle, Sandro; den Hartog, Jeremy; Petkovic, M.; Jonker, W.; Jonker, Willem

    2007-01-01

    Privacy is a prime concern in today's information society. To protect the privacy of individuals, enterprises must follow certain privacy practices, while collecting or processing personal data. In this chapter we look at the setting where an enterprise collects private data on its website,

  12. 39 CFR 262.5 - Systems (Privacy).

    Science.gov (United States)

    2010-07-01

    ... 39 Postal Service 1 2010-07-01 2010-07-01 false Systems (Privacy). 262.5 Section 262.5 Postal... DEFINITIONS § 262.5 Systems (Privacy). (a) Privacy Act system of records. A Postal Service system containing... individual. (c) Computer matching program. A “matching program,” as defined in the Privacy Act, 5 U.S.C. 552a...

  13. Radar Cross Section (RCS) Certification for Static and Dynamic RCS Measurement Facilities. Volume 2: DOD RCS Demonstration Program Results

    National Research Council Canada - National Science Library

    2001-01-01

    ...) 46 Test Group, in cooperation with the RCC/SMSG Radar Committee, the demonstration program described herein was entirely successful and should lay the groundwork for similar technical or laboratory...

  14. Genetic privacy.

    Science.gov (United States)

    Sankar, Pamela

    2003-01-01

    During the past 10 years, the number of genetic tests performed more than tripled, and public concern about genetic privacy emerged. The majority of states and the U.S. government have passed regulations protecting genetic information. However, research has shown that concerns about genetic privacy are disproportionate to known instances of information misuse. Beliefs in genetic determinacy explain some of the heightened concern about genetic privacy. Discussion of the debate over genetic testing within families illustrates the most recent response to genetic privacy concerns.

  15. 75 FR 64713 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2010-10-20

    ... viewing on the Internet at http://www.regulations.gov as they are received without change, including any... Reservation Vehicle Parking Program. System Location: Parking Management Branch, Pentagon Force Protection...: All DoD Civilians, military, and contractors holding DoD parking permits, participating in DoD...

  16. 77 FR 27108 - Privacy Act of 1974, as Amended; Computer Matching Program (SSA/Office of Child Support...

    Science.gov (United States)

    2012-05-08

    ...: Social Security Administration (SSA). ACTION: Notice of a renewal of an existing computer matching... protections for such persons. The Privacy Act, as amended, regulates the use of computer matching by Federal... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA 2012-0010] Privacy Act of 1974, as Amended...

  17. 78 FR 12127 - Privacy Act of 1974, as Amended; Computer Matching Program (SSA/Department of the Treasury...

    Science.gov (United States)

    2013-02-21

    ... 1310 AGENCY: Social Security Administration (SSA). ACTION: Notice of a renewal of an existing computer..., as shown above. SUPPLEMENTARY INFORMATION: A. General The Computer Matching and Privacy Protection... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA 2013-0007] Privacy Act of 1974, as Amended...

  18. 75 FR 51154 - Privacy Act of 1974, as Amended; Computer Matching Program (SSA/Department of the Treasury...

    Science.gov (United States)

    2010-08-18

    ... 1310 AGENCY: Social Security Administration (SSA) ACTION: Notice of a renewal of an existing computer..., as shown above. SUPPLEMENTARY INFORMATION: A. General The Computer Matching and Privacy Protection... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA 2010-0035] Privacy Act of 1974, as Amended...

  19. 77 FR 49849 - Privacy Act of 1974, as Amended; Computer Matching Program (SSA/Office of Child Support...

    Science.gov (United States)

    2012-08-17

    ...: Social Security Administration (SSA). ACTION: Notice of a renewal of an existing computer-matching... INFORMATION: A. General The Computer Matching and Privacy Protection Act of 1988 (Public Law (Pub. L.) 100-503... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA 2012-0021] Privacy Act of 1974, as Amended...

  20. 78 FR 51264 - Privacy Act of 1974, as Amended; Computer Matching Program (SSA/Department of the Treasury...

    Science.gov (United States)

    2013-08-20

    ... 1016 AGENCY: Social Security Administration (SSA). ACTION: Notice of a renewal of an existing computer... above. SUPPLEMENTARY INFORMATION: A. General The Computer Matching and Privacy Protection Act of 1988... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA 2013-0022] Privacy Act of 1974, as Amended...

  1. 76 FR 21091 - Privacy Act of 1974, as Amended; Computer Matching Program (SSA/Centers for Medicare & Medicaid...

    Science.gov (United States)

    2011-04-14

    ...: Social Security Administration (SSA). ACTION: Notice of a renewal of an existing computer matching...: A. General The Computer Matching and Privacy Protection Act of 1988 (Public Law (Pub. L.) 100-503...), as amended, (Pub. L. 100-503, the Computer Matching and Privacy Protection Act (CMPPA) of 1988), the...

  2. 78 FR 69926 - Privacy Act of 1974, as Amended; Computer Matching Program (SSA/Centers for Medicare & Medicaid...

    Science.gov (United States)

    2013-11-21

    ...: Social Security Administration (SSA). ACTION: Notice of a renewal of an existing computer matching... INFORMATION: A. General The Computer Matching and Privacy Protection Act of 1988 (Pub. L 100-503), amended the... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA 2013-0059] Privacy Act of 1974, as Amended...

  3. 78 FR 16564 - Privacy Act of 1974, as Amended; Computer Matching Program (SSA/Office of Personnel Management...

    Science.gov (United States)

    2013-03-15

    ... 1021 AGENCY: Social Security Administration (SSA). ACTION: Notice of a renewal of existing computer... above. SUPPLEMENTARY INFORMATION: A. General The Computer Matching and Privacy Protection Act of 1988... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA 2012-0073] Privacy Act of 1974, as Amended...

  4. 78 FR 31955 - Privacy Act of 1974; Department of Homeland Security National Protection and Programs Directorate...

    Science.gov (United States)

    2013-05-28

    ... 1974; Department of Homeland Security National Protection and Programs Directorate--001 Arrival and... of records titled Department of Homeland Security/National Protection and Programs Directorate--001... of 1974, 5 U.S.C. 552a, the Department of Homeland Security (DHS) National Protection and Programs...

  5. Logistics: DoD International Personal Property Shipment Rates

    National Research Council Canada - National Science Library

    2002-01-01

    ... all or most of the cargo space available on U.S.-flag vessels and subsequently resold the space at an inflated price to selected freight forwarders that participated in the DoD International Personal Property Program...

  6. DoD ESI

    Science.gov (United States)

    awarded BPAs to DLT Solutions, LLC, EC America, Inc., and International Systems Marketing, Inc. for the Information Management, Microsoft Platform Management, Identity & Access Management, Endpoint Systems Management, Data Protection, Performance Monitoring and Support in support of the DoD mission.Click here for

  7. 32 CFR 311.7 - OSD/JS Privacy Office Processes.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 2 2010-07-01 2010-07-01 false OSD/JS Privacy Office Processes. 311.7 Section...) PRIVACY PROGRAM OFFICE OF THE SECRETARY OF DEFENSE AND JOINT STAFF PRIVACY PROGRAM § 311.7 OSD/JS Privacy Office Processes. The OSD/JS Privacy Office shall: (a) Exercise oversight and administrative control of...

  8. Privacy Act

    Science.gov (United States)

    Learn about the Privacy Act of 1974, the Electronic Government Act of 2002, the Federal Information Security Management Act, and other information about the Environmental Protection Agency maintains its records.

  9. Privacy Act System of Records: Employee Counseling and Assistance Program Records, EPA-27

    Science.gov (United States)

    Learn about the Employee Counseling and Assistance Program Records System, including who is covered in the system, the purpose of data collection, routine uses for the system's records, and other security procedures.

  10. Concentrated Differential Privacy

    OpenAIRE

    Dwork, Cynthia; Rothblum, Guy N.

    2016-01-01

    We introduce Concentrated Differential Privacy, a relaxation of Differential Privacy enjoying better accuracy than both pure differential privacy and its popular "(epsilon,delta)" relaxation without compromising on cumulative privacy loss over multiple computations.

  11. 78 FR 29786 - Computer Matching and Privacy Protection Act of 1988; Report of Matching Program: RRB and State...

    Science.gov (United States)

    2013-05-21

    ... required by the Privacy Act of 1974, as amended, the RRB is issuing a public notice in the Federal Register... benefits under the Railroad Retirement Act that the RRB plans to share this computer matching data with...

  12. Defense Primer: DOD Contractors

    Science.gov (United States)

    2017-02-10

    functions, from intelligence analysis or software development to landscaping or food service. Why does DOD use individual contractors? Going back to...that provide professional services, from research to management support. The bulk of contractors—more than 70%—provide products, and these include...10 U.S.C. Part IV: Service, Supply, and Procurement. CRS Products CRS In Focus IF10548, Defense Primer: U.S. Defense Industrial Base, by Daniel

  13. 76 FR 114 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2011-01-03

    ...; System of Records AGENCY: Defense Contract Audit Agency, DoD. ACTION: Notice to amend a system of records. SUMMARY: The Defense Contract Audit Agency is proposing to amend a system of records notice in its... INFORMATION: The Defense Contract Audit Agency systems of records notices subject to the Privacy Act of 1974...

  14. 77 FR 75621 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2012-12-21

    ...; System of Records AGENCY: Defense Contract Audit Agency, DoD. ACTION: Notice to amend a System of Records. SUMMARY: The Defense Contract Audit Agency is amending a system of records notice in its existing.... SUPPLEMENTARY INFORMATION: The Defense Contract Audit Agency systems of records notices subject to the Privacy...

  15. 76 FR 115 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2011-01-03

    ...; System of Records AGENCY: Defense Contract Audit Agency, DoD. ACTION: Notice to amend a system of records. SUMMARY: The Defense Contract Audit Agency is proposing to amend a system of records notice in its... INFORMATION: The Defense Contract Audit Agency systems of records notices subject to the Privacy Act of 1974...

  16. 77 FR 77048 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2012-12-31

    ...; System of Records AGENCY: Defense Contract Audit Agency, DoD. ACTION: Notice to amend a System of Records. SUMMARY: The Defense Contract Audit Agency is amending a system of records notice in its existing.... SUPPLEMENTARY INFORMATION: The Defense Contract Audit Agency systems of records notices subject to the Privacy...

  17. 78 FR 27195 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2013-05-09

    ...; System of Records AGENCY: Defense Finance and Accounting Service, DoD. ACTION: Notice to delete two Systems of Records. SUMMARY: The Defense Finance and Accounting Service is deleting two systems of records...: The Defense Finance and Accounting Service systems of records notices subject to the Privacy Act of...

  18. 78 FR 27194 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2013-05-09

    ...; System of Records AGENCY: Defense Finance and Accounting Service, DoD. ACTION: Notice to delete two Systems of Records. SUMMARY: The Defense Finance and Accounting Service is deleting two systems of records...: The Defense Finance and Accounting Service systems of records notices subject to the Privacy Act of...

  19. 78 FR 69392 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2013-11-19

    ...; System of Records AGENCY: Defense Finance and Accounting Service, DoD. ACTION: Notice to delete a system of records. SUMMARY: The Defense Finance and Accounting Service is deleting a system of records... INFORMATION: The Defense Finance and Accounting Service systems of records notices subject to the Privacy Act...

  20. 78 FR 47309 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2013-08-05

    ...; System of Records AGENCY: Defense Finance and Accounting Service, DoD. ACTION: Notice to amend a System of Records. SUMMARY: The Defense Finance and Accounting Service proposes to alter a system of records... Defense Finance and Accounting Service systems of records notices subject to the Privacy Act of 1974 (5 U...

  1. 78 FR 41920 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2013-07-12

    ... Civil Liberties Office Web site at http://dpclo.defense.gov/privacy/SORNs/component/army/index.html... systems of records notices. Individual should provide full name, SSN and/or DoD ID number and military... penalty of perjury under the laws of the United States of America that the foregoing is true and correct...

  2. 77 FR 56628 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2012-09-13

    .../Central Security Service (NSA/CSS), Freedom of Information Act and Privacy Act Office, 9800 Savage Road... Agencies of Government who wrote to NSA on behalf of the constituent and who use it to respond to the.... The DoD Blanket Routine Uses published at the beginning of the NSA/ CSS's compilation of record...

  3. Online Privacy as a Corporate Social Responsibility

    DEFF Research Database (Denmark)

    Pollach, Irene

    2011-01-01

    Information technology and the Internet have added a new stakeholder concern to the corporate social responsibility agenda: online privacy. While theory suggests that online privacy is a corporate social responsibility, only very few studies in the business ethics literature have connected...... of the companies have comprehensive privacy programs, although more than half of them voice moral or relational motives for addressing online privacy. The privacy measures they have taken are primarily compliance measures, while measures that stimulate a stakeholder dialogue are rare. Overall, a wide variety...

  4. DOD Financial Management: Improvement Needed in DOD Components’ Implementation of Audit Readiness Effort

    Science.gov (United States)

    2011-09-01

    DOD Financial Management Abbreviations AFB Air Force Base COSO Committee of Sponsoring Organizations of the Treadway... Management and mismanagement.11 All of DOD’s programs on GAO’s High- Risk List relate to its business operations, including systems and processes... Management maintains audit readiness through risk -based periodic testing of internal controls utilizing the OMB Circular No. A-123, Appendix A

  5. A Failure to "Do No Harm" -- India's Aadhaar biometric ID program and its inability to protect privacy in relation to measures in Europe and the U.S.

    Science.gov (United States)

    Dixon, Pam

    2017-01-01

    It is important that digital biometric identity systems be used by governments with a Do no Harm mandate, and the establishment of regulatory, enforcement and restorative frameworks ensuring data protection and privacy needs to transpire prior to the implementation of technological programs and services. However, when, and where large government bureaucracies are involved, the proper planning and execution of public service programs very often result in ungainly outcomes, and are often qualitatively not guaranteeable. Several important factors, such as the strength of the political and legal systems, may affect such cases as the implementation of a national digital identity system. Digital identity policy development, as well as technical deployment of biometric technologies and enrollment processes, may all differ markedly, and could depend in some part at least, on the overall economic development of the country in question, or political jurisdiction, among other factors. This article focuses on the Republic of India's national digital biometric identity system, the Aadhaar , for its development, data protection and privacy policies, and impact. Two additional political jurisdictions, the European Union, and the United States are also situationally analyzed as they may be germane to data protection and privacy policies originated to safeguard biometric identities. Since biometrics are foundational elements in modern digital identity systems, expression of data protection policies that orient and direct how biometrics are to be utilized as unique identifiers are the focus of this analysis. As more of the world's economies create and elaborate capacities, capabilities and functionalities within their respective digital ambits, it is not enough to simply install suitable digital identity technologies; much, much more - is durably required. For example, both vigorous and descriptive means of data protection should be well situated within any jurisdictionally relevant

  6. Is DOD on the Right Path to Financial Auditability?

    Science.gov (United States)

    2012-03-22

    and DOD decision-making. Moreover, most of the 10 ERPs run the same software applications (i.e. SAP [Systems Applications and Programs] or PeopleSoft...Financial Readiness; GFEBS; DEAMS; Navy ERP 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT 18. NUMBER OF PAGES 19a. NAME OF...Navy ERP CLASSIFICATION: Unclassified To make every dollar count, the Department of Defense (DOD) must be able to account for every dollar

  7. 32 CFR 806b.30 - Evaluating information systems for Privacy Act compliance.

    Science.gov (United States)

    2010-07-01

    ... privacy issues are unchanged. (d) The depth and content of the Privacy Impact Assessment should be... 32 National Defense 6 2010-07-01 2010-07-01 false Evaluating information systems for Privacy Act... FORCE ADMINISTRATION PRIVACY ACT PROGRAM Privacy Impact Assessments § 806b.30 Evaluating information...

  8. Advanced research in data privacy

    CERN Document Server

    Torra, Vicenç

    2015-01-01

    This book provides an overview of the research work on data privacy and privacy enhancing technologies carried by the participants of the ARES project. ARES (Advanced Research in Privacy an Security, CSD2007-00004) has been one of the most important research projects funded by the Spanish Government in the fields of computer security and privacy. It is part of the now extinct CONSOLIDER INGENIO 2010 program, a highly competitive program which aimed to advance knowledge and open new research lines among top Spanish research groups. The project started in 2007 and will finish this 2014. Composed by 6 research groups from 6 different institutions, it has gathered an important number of researchers during its lifetime. Among the work produced by the ARES project, one specific work package has been related to privacy. This books gathers works produced by members of the project related to data privacy and privacy enhancing technologies. The presented works not only summarize important research carried in the proje...

  9. Energy service contracting in DOD

    International Nuclear Information System (INIS)

    Dahle, D.E.

    1993-01-01

    The U.S. Department of Defense (DOD) annually consumes about $3 Billion in energy to operate facilities at military installations worldwide, representing about 80% of utility operating expense for all Federal facilities. Recent legislation and a Presidential Executive Order have directed DOD by Fiscal Year 2000 to reduce facility energy consumption by 20%, from the level of energy used in Fiscal Year 1985. To achieve this goal it is estimated that energy efficiency improvement investments between $2-3 billion would be required. Considering the competition for resources within DOD as it experiences downsizing and restructuring, DOD will need to seek opportunities to tap alternative investment strategies through energy service contracting to leverage Federal resources. Shared Energy Savings and Operations and Maintenance Energy Services contracting activities in the Department of the Navy will be used to address how such acquisition methods can contribute to achieving DOD energy efficiency goals

  10. 78 FR 37875 - Privacy Act of 1974, as Amended; Computer Matching Program (SSA/Bureau of the Fiscal Service...

    Science.gov (United States)

    2013-06-24

    ...: Social Security Administration (SSA). ACTION: Notice of a renewal of an existing computer matching... above. SUPPLEMENTARY INFORMATION: A. General The Computer Matching and Privacy Protection Act of 1988... computer matching involving the Federal government could be performed and adding certain protections for...

  11. 75 FR 54213 - Privacy Act of 1974, as Amended; Computer Matching Program (SSA/Office of Personnel Management...

    Science.gov (United States)

    2010-09-03

    ... 1021 AGENCY: Social Security Administration (SSA). ACTION: Notice of a renewal of an existing computer.... SUPPLEMENTARY INFORMATION: A. General The Computer Matching and Privacy Protection Act of 1988 (Public Law (Pub... computer matching involving the Federal government could be performed and adding certain protections for...

  12. Privacy transparency patterns

    NARCIS (Netherlands)

    Siljee B.I.J.

    2015-01-01

    This paper describes two privacy patterns for creating privacy transparency: the Personal Data Table pattern and the Privacy Policy Icons pattern, as well as a full overview of privacy transparency patterns. It is a first step in creating a full set of privacy design patterns, which will aid

  13. Toward Integrated DoD Biosurveillance: Assessment and Opportunities.

    Science.gov (United States)

    Moore, Melinda; Fisher, Gail; Stevens, Clare

    2014-01-01

    In the context of the 2012 National Strategy for Biosurveillance, the Office of Management and Budget (OMB) asked the Department of Defense (DoD) to review its biosurveillance programs, prioritize missions and desired outcomes, evaluate how DoD programs contribute to these, and assess the appropriateness and stability of the department's funding system for biosurveillance. DoD sought external analytic support through the RAND Arroyo Center. In response to the questions posed by OMB request, this study finds the following: (1) Current DoD biosurveillance supports three strategic missions. Based mostly on existing statute, the highest-priority mission is force health protection, followed by biological weapons defense and global health security. (2) Guidance issued by the White House on June 27, 2013, specified priorities for planning fiscal year 2015 budgets; it includes an explicit global health security priority, which strengthens the case for this as a key DoD biosurveillance strategic mission. (3) DoD biosurveillance also supports four desired outcomes: early warning and early detection, situational awareness, better decision making at all levels, and forecast of impacts. (4) Programs and measures that address priority missions-force health protection in particular-and desired outcomes should be prioritized over those that do not do so. (5) More near-real-time analysis and better internal and external integration could enhance the performance and value of the biosurveillance enterprise. (6) Improvements are needed in key enablers, including explicit doctrine/policy, efficient organization and governance, and increased staffing and improved facilities for the Armed Forces Health Surveillance Center (AFHSC). (7) AFHSC has requested additional funding to fully implement its current responsibilities under the 2012 Memorandum of Understanding between the Assistant Secretaries of Defense for Health Affairs and for Nuclear, Chemical, and Biological Defense Programs

  14. From Data Privacy to Location Privacy

    Science.gov (United States)

    Wang, Ting; Liu, Ling

    Over the past decade, the research on data privacy has achieved considerable advancement in the following two aspects: First, a variety of privacy threat models and privacy principles have been proposed, aiming at providing sufficient protection against different types of inference attacks; Second, a plethora of algorithms and methods have been developed to implement the proposed privacy principles, while attempting to optimize the utility of the resulting data. The first part of the chapter presents an overview of data privacy research by taking a close examination at the achievements from the above two aspects, with the objective of pinpointing individual research efforts on the grand map of data privacy protection. As a special form of data privacy, location privacy possesses its unique characteristics. In the second part of the chapter, we examine the research challenges and opportunities of location privacy protection, in a perspective analogous to data privacy. Our discussion attempts to answer the following three questions: (1) Is it sufficient to apply the data privacy models and algorithms developed to date for protecting location privacy? (2) What is the current state of the research on location privacy? (3) What are the open issues and technical challenges that demand further investigation? Through answering these questions, we intend to provide a comprehensive review of the state of the art in location privacy research.

  15. When public health and genetic privacy collide: positive and normative theories explaining how ACA's expansion of corporate wellness programs conflicts with GINA's privacy rules.

    Science.gov (United States)

    Bard, Jennifer S

    2011-01-01

    The Patient Protection and Affordable Care Act of 2010 (ACA) contains many provisions intended to increase access to and lower the cost of health care by adopting public health measures. One of these promotes the use of at-work wellness programs by both providing employers with grants to develop these programs and also increasing their ability to tie the price employees pay for health insurance for participating in these programs and meeting specific health goals. Yet despite ACA's specific alteration of three different statues which had in the past shielded employees from having to contribute to the cost of their health insurance based on their achieving employer-designated health markers, it chose to leave alone recently enacted rules implementing the Genetic Non-Discrimination Act (GINA), which prohibits employers from asking employees about their family health history in any context, including assessing their risk for setting wellness targets. This article reviews how both the changes made by ACA and the restrictions recently put place by GINA will affect the way employers are likely to structure Wellness Programs. It also considers how these changes reflect the competing social goals of both ACA, which seeks to expand access to the population by lowering costs, and GINA, which seeks to protect individuals from discrimination. It does so by analyzing both positive theories about how these new laws will function and normative theories explaining the likelihood of future friction between the interests of the population of the United States as a whole who are in need of increased and affordable access to health care, and of the individuals living in this country who risk discrimination, as science and medicine continue to make advances in linking genetic make-up to risk of future illness. © 2011 American Society of Law, Medicine & Ethics, Inc.

  16. 32 CFR 286.2 - DoD public information.

    Science.gov (United States)

    2010-07-01

    ..., consistent always with the legitimate public and private interests of the American people. A record requested... National Defense Department of Defense (Continued) OFFICE OF THE SECRETARY OF DEFENSE (CONTINUED) FREEDOM OF INFORMATION ACT PROGRAM DOD FREEDOM OF INFORMATION ACT PROGRAM REGULATION General Provisions § 286...

  17. Semantic Security: Privacy Definitions Revisited

    OpenAIRE

    Jinfei Liu; Li Xiong; Jun Luo

    2013-01-01

    In this paper we illustrate a privacy framework named Indistinguishabley Privacy. Indistinguishable privacy could be deemed as the formalization of the existing privacy definitions in privacy preserving data publishing as well as secure multi-party computation. We introduce three representative privacy notions in the literature, Bayes-optimal privacy for privacy preserving data publishing, differential privacy for statistical data release, and privacy w.r.t. semi-honest behavior in the secure...

  18. Critical Success Factors and Their Application to DOD Weapon System Acquisition

    National Research Council Canada - National Science Library

    Harris, Chad M

    2006-01-01

    .... The goal of this project was to identify Critical Success Factors and determine if they could be applied to DoD acquisition programs in order to improve the acquisition process and provide program...

  19. Just in Time Research: Privacy Practices

    Science.gov (United States)

    Grama, Joanna Lyn

    2014-01-01

    The January 2014 edition of the ECAR Update subscriber newsletter included an informal poll on information privacy practices. The poll was intended to collect a quick snapshot of the higher education community's thoughts on this important topic during Data Privacy Month. Results of the poll will be used to inform EDUCAUSE research, programs,…

  20. Preserving Employee Privacy in Wellness.

    Science.gov (United States)

    Terry, Paul E

    2017-07-01

    The proposed "Preserving Employee Wellness Programs Act" states that the collection of information about the manifested disease or disorder of a family member shall not be considered an unlawful acquisition of genetic information. The bill recognizes employee privacy protections that are already in place and includes specific language relating to nondiscrimination based on illness. Why did legislation expressly intending to "preserve wellness programs" generate such antipathy about wellness among journalists? This article argues that those who are committed to preserving employee wellness must be equally committed to preserving employee privacy. Related to this, we should better parse between discussions and rules about commonplace health screenings versus much less common genetic testing.

  1. 32 CFR 701.109 - Privacy Act (PA) appeals.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 5 2010-07-01 2010-07-01 false Privacy Act (PA) appeals. 701.109 Section 701... OF THE NAVY DOCUMENTS AFFECTING THE PUBLIC DON Privacy Program § 701.109 Privacy Act (PA) appeals. (a... commence when the appeal reaches the office of the review authority having jurisdiction over the record...

  2. 32 CFR 505.3 - Privacy Act systems of records.

    Science.gov (United States)

    2010-07-01

    ... anticipated threats or hazards to the security or integrity of data, which could result in substantial harm... 32 National Defense 3 2010-07-01 2010-07-01 true Privacy Act systems of records. 505.3 Section 505... AND PUBLIC RELATIONS ARMY PRIVACY ACT PROGRAM § 505.3 Privacy Act systems of records. (a) Systems of...

  3. 32 CFR 701.119 - Privacy and the web.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 5 2010-07-01 2010-07-01 false Privacy and the web. 701.119 Section 701.119... THE NAVY DOCUMENTS AFFECTING THE PUBLIC DON Privacy Program § 701.119 Privacy and the web. DON activities shall consult SECNAVINST 5720.47B for guidance on what may be posted on a Navy Web site. ...

  4. Report from Dagstuhl Seminar 12331 Mobility Data Mining and Privacy

    OpenAIRE

    Clifton, Christopher W.; Kuijpers, Bart; Morik, Katharina; Saygin, Yucel

    2012-01-01

    This report documents the program and the outcomes of Dagstuhl Seminar 12331 “Mobility Data Mining and Privacy”. Mobility data mining aims to extract knowledge from movement behaviour of people, but this data also poses novel privacy risks. This seminar gathered a multidisciplinary team for a conversation on how to balance the value in mining mobility data with privacy issues. The seminar focused on four key issues: Privacy in vehicular data, in cellular data, context- dependent privacy, and ...

  5. 78 FR 73507 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2013-12-06

    ...) pursuant to paragraph 4c of Appendix I to OMB Circular No. A-130, ``Federal Agency Responsibilities for...; DoD Instruction 1400.25-V771, DoD Civilian Personnel Management System (Administrative Grievance... of civilian personnel management programs. To the Comptroller General, or any of his or her...

  6. 75 FR 36640 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2010-06-28

    ..., ``Federal Agency Responsibilities for Maintaining Records About Individuals,'' dated February 8, 1996... individuals covered by the system: Delete entry and replace with ``DoD military and civilian personnel... Benefit Program for DoD military and civilian personnel applying for and in receipt of fare subsidies...

  7. 76 FR 35419 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2011-06-17

    ..., Alternate OSD Federal Register Liaison Officer, Department of Defense. DHA 10 System name: DoD Women... records, please contact the system manager.'' Categories of individuals covered by the system: Delete... members who are eligible for the DoD Women, Infants, and Children Overseas Program.'' Categories of...

  8. 76 FR 58786 - Privacy Act of 1974; Systems of Records

    Science.gov (United States)

    2011-09-22

    ... records, etc.) of employees and applicants for employment. Records contained in this system are also used.../Central Security Service (NSA/CSS) applicants for employment and employees tested for the use of illegal... Workplace; DoD Directive 1010.9, DoD Civilian Employee Drug Abuse Testing Program; and E.O. 9397 (SSN), as...

  9. Privacy og selvbeskrivelse

    DEFF Research Database (Denmark)

    Rosengaard, Hans Ulrik

    2015-01-01

    En beskrivelse af feltet for forskning i Privacy med særligt henblik på privacys betydning for muligheden for at styre sin egen selvbeskrivelse......En beskrivelse af feltet for forskning i Privacy med særligt henblik på privacys betydning for muligheden for at styre sin egen selvbeskrivelse...

  10. Privacy vs security

    CERN Document Server

    Stalla-Bourdillon, Sophie; Ryan, Mark D

    2014-01-01

    Securing privacy in the current environment is one of the great challenges of today's democracies. Privacy vs. Security explores the issues of privacy and security and their complicated interplay, from a legal and a technical point of view. Sophie Stalla-Bourdillon provides a thorough account of the legal underpinnings of the European approach to privacy and examines their implementation through privacy, data protection and data retention laws. Joshua Philips and Mark D. Ryan focus on the technological aspects of privacy, in particular, on today's attacks on privacy by the simple use of today'

  11. 76 FR 18954 - Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security Federal...

    Science.gov (United States)

    2011-04-06

    ... issues please contact: Mary Ellen Callahan (703-235- 0780), Chief Privacy Officer, Privacy Office...] Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security Federal Emergency Management Agency DHS/FEMA-011 Training and Exercise Program Records System of Records AGENCY: Privacy Office...

  12. 77 FR 43100 - Privacy Act of 1974; Department of Homeland Security, Federal Emergency Management Agency-009...

    Science.gov (United States)

    2012-07-23

    ... Homeland Security, Washington, DC 20478. For privacy issues, please contact: Mary Ellen Callahan (703) 235... DEPARTMENT OF HOMELAND SECURITY Office of the Secretary [Docket No. DHS-2011-0097] Privacy Act of... Assistance Grant Programs System of Records AGENCY: Privacy Office, DHS. ACTION: Notice of Privacy Act system...

  13. An Analysis of DOD Fraudulent Vendor Payments

    National Research Council Canada - National Science Library

    Jones-Oxendine, Shawn

    1999-01-01

    ...) known DoD fraudulent vendor cases in light of their management control weaknesses. A high risk of fraudulent vendor payments were present in the DoD, pre-DFAS finance and accounting systems and the current DFAS configuration...

  14. Inpatient Data Supporting the DOD Military Retirement Health Benefits Liability Estimate

    National Research Council Canada - National Science Library

    Lane, F

    2000-01-01

    .... Military retirement health benefits are post-retirement benefits that DoD provides to military retirees and other eligible beneficiaries through the Civilian Health and Medical Program of the Uniformed Services (Purchased Care...

  15. Applying Insights from Transaction Cost Economics (TCE) to Improve DoD Cost Estimation

    National Research Council Canada - National Science Library

    Angelis, Diana I; Dillard, John; Franck, Raymond; Melese, Francois

    2007-01-01

    The purpose of this report is to explore the possibility of improving DoD cost estimation methods by including explanatory variables that capture the coordination and motivation problems associated with the program...

  16. Critical Success Factors and Their Application to DOD Weapon System Acquisition

    National Research Council Canada - National Science Library

    Harris, Chad M

    2006-01-01

    .... The purpose of this project was to investigate and provide an overview of issues within the DoD acquisition system and provide information to assist program managers in dealing with some of the challenges they face...

  17. DOD TRAVEL IMPROPER PAYMENTS: Fiscal Year 2006 Reporting Was Incomplete and Planned Improvement Efforts Face Challenges

    National Research Council Canada - National Science Library

    WIlliams, McCoy

    2007-01-01

    ... was incomplete because it understated the full extent of travel improper payments. The DOD travel payment data used to assess the program s risk of significant improper payments only included payments processed by the Defense Travel System (DTS...

  18. AEROSPACE NESHAP GUIDANCE: PAINTING AND DEPAINTING ALTERNATIVES FOR SELECTED DOD OPERATIONS

    Science.gov (United States)

    This project was sponsored by the DOD's Strategic Environmental Research and Development program (SERDP) and conducted by the EPA's Clean Processes and Products Branch at the NRMRL. In support of SERDP's objective of developing environmental solutions that improve mission readine...

  19. Summary of Security Control Audits of DoD Finance and Accounting Systems

    National Research Council Canada - National Science Library

    2001-01-01

    .... The Act requires DoD to develop a cost-effective security control program that continually assesses risk, is tested and evaluated periodically, and is approved by the Director, Office of Management and Budget...

  20. Managing Sensitive Information: DOD Can More Effectively Reduce the Risk of Classification Errors

    National Research Council Canada - National Science Library

    D'Agostino, Davi M; Borseth, Ann; Fenton, Mattias; Hatton, Adam; Hills, Barbara; Keefer, David; Mayfield, David; Reid, Jim; Richardson, Terry; Schwartz, Marc

    2006-01-01

    .... While some DoD components and their subordinate commands appear to manage effective programs, GAO identified weaknesses in others in the areas of classification management training, self-inspections...

  1. Is Electronic Privacy Achievable?

    National Research Council Canada - National Science Library

    Irvine, Cynthia E; Levin, Timothy E

    2000-01-01

    ... individuals. The purpose of this panel was to focus on how new technologies are affecting privacy. Technologies that might adversely affect privacy were identified by Rein Turn at previous symposia...

  2. Privacy and Innovation

    OpenAIRE

    Avi Goldfarb; Catherine Tucker

    2011-01-01

    Information and communication technology now enables firms to collect detailed and potentially intrusive data about their customers both easily and cheaply. This means that privacy concerns are no longer limited to government surveillance and public figures' private lives. The empirical literature on privacy regulation shows that privacy regulation may affect the extent and direction of data-based innovation. We also show that the impact of privacy regulation can be extremely heterogeneous. T...

  3. Neuroethics and Brain Privacy

    DEFF Research Database (Denmark)

    Ryberg, Jesper

    2017-01-01

    An introduction is presented in which editor discusses various articles within the issue on topics including ethical challenges with importance of privacy for well-being, impact of brain-reading on mind privacy and neurotechnology.......An introduction is presented in which editor discusses various articles within the issue on topics including ethical challenges with importance of privacy for well-being, impact of brain-reading on mind privacy and neurotechnology....

  4. Privacy and internet services

    OpenAIRE

    Samec, Marek

    2010-01-01

    This thesis is focused on internet services user privacy. Goal of this thesis is to determine level of user awareness of how is their privacy approached while using internet services. Then suggest procedure to improve this awareness, or that will lead to better control of individual privacy. In theoretical part I analyze general and legislative approach to privacy, followed by analysis of behaviour of internet service users and providers. Part of this analysis deals with usage of web cookies ...

  5. Internet and Privacy

    OpenAIRE

    Al-Fadhli, Meshal Shehab

    2007-01-01

    The concept of privacy is hard to understand and is not easy to define, because this concept is linked with several dimensions. Internet Privacy is associated with the use of the Internet and most likely appointed under communications privacy, involving the user of the Internet’s personal information and activities, and the disclosure of them online. This essay is going to present the meaning of privacy and the implications of it for Internet users. Also, this essay will demonstrate some of t...

  6. Privacy and Library Records

    Science.gov (United States)

    Bowers, Stacey L.

    2006-01-01

    This paper summarizes the history of privacy as it relates to library records. It commences with a discussion of how the concept of privacy first originated through case law and follows the concept of privacy as it has affected library records through current day and the "USA PATRIOT Act."

  7. Privacy Verification Using Ontologies

    NARCIS (Netherlands)

    Kost, Martin; Freytag, Johann-Christoph; Kargl, Frank; Kung, Antonio

    2011-01-01

    As information systems extensively exchange information between participants, privacy concerns may arise from its potential misuse. A Privacy by Design (PbD) approach considers privacy requirements of different stakeholders during the design and the implementation of a system. Currently, a

  8. DoD Task Force to Improve Industrial Responsiveness.

    Science.gov (United States)

    1982-03-01

    stable programs list. Stable programs will generally not be decremented or subject to offset actions during budget pre- paration as a result of cuts to...with DOD Directive 6050.1 (reference MDf ). 6 _7 ~~o _,N’ "N7 N(- .T’ 5000.2 (Encl 4) 6 JUSTIIICATIOI FOR MAJOR SYSTEM NEW START (JMSNS) - FORMAT...equipment. 4. Deficiencies in the survivability (nuclear, conventional, chemical, 0 laser , electromagnetic warfare, etc.) or endurance of existing

  9. Inspector General, DoD, Oversight of the Army Audit Agency Audit of the U.S. Army Corps of Engineers, Civil Works Program, FY 1996 Financial Statements

    National Research Council Canada - National Science Library

    Lane, F

    1997-01-01

    The audit objective was to determine the accuracy and completeness of the audit of the U.S. Army Corps of Engineers, Civil Works Program, FY 1996, financial statements conducted by the Army Audit Agency...

  10. 76 FR 34732 - Privacy Act of 1974; Department of Homeland Security/National Protection and Programs Directorate...

    Science.gov (United States)

    2011-06-14

    ... 1974; Department of Homeland Security/National Protection and Programs Directorate--002 Chemical... Homeland Security/National Protection and Programs Directorate--002 Chemical Facility Anti-Terrorism.... 552a, the Department of Homeland Security (DHS)/National Protection and Programs Directorate (NPPD...

  11. 75 FR 77607 - Privacy Act of 1974; Proposed New System of Records; Veterinary Medicine Loan Repayment Program

    Science.gov (United States)

    2010-12-13

    ...; Proposed New System of Records; Veterinary Medicine Loan Repayment Program AGENCY: National Institute of..., ``Veterinary Medicine Loan Repayment Program Records System, USDA/NIFA-1.'' This newly established system will... Sherman; National Program Leader, Veterinary Science; National Institute of Food and Agriculture...

  12. Privacy encounters in Teledialogue

    DEFF Research Database (Denmark)

    Andersen, Lars Bo; Bøge, Ask Risom; Danholt, Peter

    2017-01-01

    Privacy is a major concern when new technologies are introduced between public authorities and private citizens. What is meant by privacy, however, is often unclear and contested. Accordingly, this article utilises grounded theory to study privacy empirically in the research and design project...... Teledialogue aimed at introducing new ways for public case managers and placed children to communicate through IT. The resulting argument is that privacy can be understood as an encounter, that is, as something that arises between implicated actors and entails some degree of friction and negotiation....... An argument which is further qualified through the philosophy of Gilles Deleuze. The article opens with a review of privacy literature before continuing to present privacy as an encounter with five different foci: what technologies bring into the encounter; who is related to privacy by implication; what...

  13. Digital privacy in Asia: Setting the agenda | CRDI - Centre de ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    9 juin 2016 ... ... Identification Number (UID) program by arguing for privacy provisions to be part of both the design of the program and the proposed legal framework. UID proposes to collect biometric data of all Indian citizens and residents;. The report, published by Privacy International, highlights the rapid development ...

  14. 76 FR 3098 - Privacy Act of 1974; Systems of Records

    Science.gov (United States)

    2011-01-19

    ... requests and/or records have been referred to the National Security Agency/Central Security Service (NSA..., Department of Defense Privacy Program; NSA/CSS Policy 1-5; NSA/CSS Freedom of Information Act Program; NSA/CSS Policy 1-34; Implementation of the Privacy Act of 1974; NSA/CSS Policy 1-15, Mandatory...

  15. Choose Privacy Week: Educate Your Students (and Yourself) about Privacy

    Science.gov (United States)

    Adams, Helen R.

    2016-01-01

    The purpose of "Choose Privacy Week" is to encourage a national conversation to raise awareness of the growing threats to personal privacy online and in day-to-day life. The 2016 Choose Privacy Week theme is "respecting individuals' privacy," with an emphasis on minors' privacy. A plethora of issues relating to minors' privacy…

  16. 75 FR 63703 - Privacy Act of 1974; Privacy Act Regulation

    Science.gov (United States)

    2010-10-18

    ... FEDERAL RESERVE SYSTEM 12 CFR Part 261a [Docket No. R-1313] Privacy Act of 1974; Privacy Act... implementing the Privacy Act of 1974 (Privacy Act). The primary changes concern the waiver of copying fees... records under the Privacy Act; the amendment of special procedures for the release of medical records to...

  17. A Taxonomy of Privacy Constructs for Privacy-Sensitive Robotics

    OpenAIRE

    Rueben, Matthew; Grimm, Cindy M.; Bernieri, Frank J.; Smart, William D.

    2017-01-01

    The introduction of robots into our society will also introduce new concerns about personal privacy. In order to study these concerns, we must do human-subject experiments that involve measuring privacy-relevant constructs. This paper presents a taxonomy of privacy constructs based on a review of the privacy literature. Future work in operationalizing privacy constructs for HRI studies is also discussed.

  18. 78 FR 47336 - Privacy Act of 1974; Computer Matching Program Between the Department of Housing and Urban...

    Science.gov (United States)

    2013-08-05

    ...) (Pub. L. 111-204); 2. Presidential Memorandum on Enhancing Payment Accuracy Through a ``Do Not Pay List... operating Public Housing programs may now offer tenants the option to pay a flat rent, or an income-based..., program administrators will resolve income discrepancies in consultation with tenants. Additionally...

  19. 76 FR 579 - Privacy Act of 1974; Computer Matching Program Between the Department of Housing and Urban...

    Science.gov (United States)

    2011-01-05

    ... Payment Accuracy Through a ``Do Not Pay List'' (June 18, 2010); 3. Office of Management and Budget M-10-13... operating Public Housing programs may now offer tenants the option to pay a flat rent, or an income-based... all cases, program administrators will resolve income discrepancies in consultation with tenants...

  20. Intellectual Freedom and Privacy: Comments on a National Program for Library and Information Services. Related Paper No. 10.

    Science.gov (United States)

    Molz, R. Kathleen

    The civil libertarian aspects of the National Program for Library and Information Science are analyzed. The five assumptions on which the program is based are closely examined for their references to the word "right." Details are given of the historic development of the library profession's increasing concern for the protection of…

  1. An Analysis of Information Systems Technology Initiatives and Small Businesses in the DoD Small Business Innovation Research (SBIR) Program

    Science.gov (United States)

    2012-09-01

    which aimed at analyzing and evaluating the SBIR program through a survey and case study methodology. The report contained 10 academic articles...highlights the difficulty in any academic research that might attempt to estimate the return on investment of federal funding used in the SBIR...military training tools, knowledge management tools (i.e., “InfoTracker,” which can detect text overlaps and identify plagiarism ), as well as

  2. Primary and Secondary Education in Afghanistan: Comprehensive Assessments Needed to Determine the Progress and Effectiveness of Over $759 Million in DOD, State, and USAID Programs

    Science.gov (United States)

    2016-04-26

    lower transportation costs; improve the provision of water and sanitation services ; increase access to education, health, and local government...which can include “an agency’s mission, strategic goals, functions, activities, services , projects, processes, or other meaningful grouping.”17...agency’s efforts to support Afghan women, which can be used as benchmarks for future programming and assessments. We also recommended that the agencies

  3. 76 FR 49500 - Privacy Act of 1974; Department of Homeland Security United States Coast Guard-020 Substance...

    Science.gov (United States)

    2011-08-10

    ... 7101 Washington, DC 20593. For privacy issues please contact: Mary Ellen Callahan (703-235-0780), Chief... DEPARTMENT OF HOMELAND SECURITY Office of the Secretary [Docket No. DHS-2011-0053] Privacy Act of... Treatment Program System of Records AGENCY: Privacy Office, DHS. ACTION: Notice of Privacy Act system of...

  4. DOD ELAP Lab Uncertainties

    Science.gov (United States)

    2012-03-01

    ISO / IEC   17025  Inspection Bodies – ISO / IEC  17020  RMPs – ISO  Guide 34 (Reference...certify to :  ISO  9001 (QMS),  ISO  14001 (EMS),   TS 16949 (US Automotive)  etc. 2 3 DoD QSM 4.2 standard   ISO / IEC   17025 :2005  Each has uncertainty...IPV6, NLLAP, NEFAP  TRAINING Programs  Certification Bodies – ISO / IEC  17021  Accreditation for  Management System 

  5. DOD Budget and Transformation: Challenges and Opportunities

    National Research Council Canada - National Science Library

    Walker, David M

    2007-01-01

    ...., military, civilian, contractors) * Get the design and implementation of the NSPS right, including modernizing and integrating the DOD, Service, domain, unit, and individual performance measurement and reward systems...

  6. Designing Privacy for You : A User Centric Approach For Privacy

    OpenAIRE

    Senarath, Awanthika; Arachchilage, Nalin A. G.; Slay, Jill

    2017-01-01

    Privacy directly concerns the user as the data owner (data- subject) and hence privacy in systems should be implemented in a manner which concerns the user (user-centered). There are many concepts and guidelines that support development of privacy and embedding privacy into systems. However, none of them approaches privacy in a user- centered manner. Through this research we propose a framework that would enable developers and designers to grasp privacy in a user-centered manner and implement...

  7. Provision of Early Intervention and Special Education Services to Eligible DoD Dependents. Final rule.

    Science.gov (United States)

    2015-06-25

    This rule reissues the current regulations and: Establishes policy, assigns responsibilities, and implements the non-funding and non-reporting provisions in DoD for: Provision of early intervention services (EIS) to infants and toddlers with disabilities and their families, as well as special education and related services to children with disabilities entitled under this part to receive education services from the DoD; implementation of a comprehensive, multidisciplinary program of EIS for infants and toddlers with disabilities and their families who, but for age, are eligible to be enrolled in DoD schools; provision of a free appropriate public education (FAPE), including special education and related services, for children with disabilities, as specified in their individualized education programs (IEP), who are eligible to enroll in DoD schools; and monitoring of DoD programs providing EIS, and special education and related services for compliance with this part. This rule also establishes a DoD Coordinating Committee to recommend policies and provide compliance oversight for early intervention and special education.

  8. Regulating Online Data Privacy

    OpenAIRE

    Paul Reid

    2004-01-01

    With existing data protection laws proving inadequate in the fight to protect online data privacy and with the offline law of privacy in a state of change and uncertainty, the search for an alternative solution to the important problem of online data privacy should commence. With the inherent problem of jurisdiction that the Internet presents, such a solution is best coming from a multi-national body with the power to approximate laws in as many jurisdictions as possible, with a recognised au...

  9. Protecting genetic privacy.

    Science.gov (United States)

    Roche, P A; Annas, G J

    2001-05-01

    This article outlines the arguments for and against new rules to protect genetic privacy. We explain why genetic information is different to other sensitive medical information, why researchers and biotechnology companies have opposed new rules to protect genetic privacy (and favour anti-discrimination laws instead), and discuss what can be done to protect privacy in relation to genetic-sequence information and to DNA samples themselves.

  10. Privacy driven internet ecosystem

    OpenAIRE

    Trinh, Tuan Anh; Gyarmati, Laszlo

    2012-01-01

    The dominant business model of today's Internet is built upon advertisements; users can access Internet services while the providers show ads to them. Although significant efforts have been made to model and analyze the economic aspects of this ecosystem, the heart of the current status quo, namely privacy, has not received the attention of the research community yet. Accordingly, we propose an economic model of the privacy driven Internet ecosystem where privacy is handled as an asset that c...

  11. 76 FR 56781 - Privacy Act of 1974; Notice of a Computer Matching Program Between the Department of Housing and...

    Science.gov (United States)

    2011-09-14

    ... require additional verification to identify inappropriate or inaccurate rental assistance, and may provide... Affordable Housing Act, the Native American Housing Assistance and Self-Determination Act of 1996, and the... matching activities. The computer matching program will also provide for the verification of social...

  12. Privacy in domestic environments

    OpenAIRE

    Radics, Peter J; Gracanin, Denis

    2011-01-01

    non-peer-reviewed While there is a growing body of research on privacy,most of the work puts the focus on information privacy. Physical and psychological privacy issues receive little to no attention. However, the introduction of technology into our lives can cause problems with regard to these aspects of privacy. This is especially true when it comes to our homes, both as nodes of our social life and places for relaxation. This paper presents the results of a study intended to captu...

  13. Practical Privacy Assessment

    DEFF Research Database (Denmark)

    Peen, Søren; Jansen, Thejs Willem; Jensen, Christian D.

    2008-01-01

    This chapter proposes a privacy assessment model called the Operational Privacy Assessment Model that includes organizational, operational and technical factors for the protection of personal data stored in an IT system. The factors can be evaluated in a simple scale so that not only the resulting...... graphical depiction can be easily created for an IT system, but graphical comparisons across multiple IT systems are also possible. Examples of factors presented in a Kiviat graph are also presented. This assessment tool may be used to standardize privacy assessment criteria, making it less painful...... for the management to assess privacy risks on their systems....

  14. The DoD Method

    International Nuclear Information System (INIS)

    Beyrich, W.; Golly, W.; Peter, N.; Seifert, R.

    1990-05-01

    The DoD method for robust estimating of variances of measurement series (time series) without the exclusion of outliers is described in detail, including its mathematical-statistical basis. In particular, it is proved that the total of all n(n-1)/2 absolute differences obtainable from n measurement values (realizations of random variables) may be subdivided into groups, each of them consisting of stochastically independent differences only. This is necessary for theoretical foundation of the DoDM estimator. Numerical examples of possible applications are given. Thereby, the evaluation of IDA-80 data presented earlier is completed applying the DoDM estimator. (orig.) [de

  15. Balancing Privacy and Professionalism: A Survey of General Surgery Program Directors on Social Media and Surgical Education.

    Science.gov (United States)

    Langenfeld, Sean J; Vargo, Daniel J; Schenarts, Paul J

    Unprofessional behavior is common among surgical residents and faculty surgeons on Facebook. Usage of social media outlets such as Facebook and Twitter is growing at exponential rates, so it is imperative that surgery program directors (PDs) focus on professionalism within social media, and develop guidelines for their trainees and surgical colleagues. Our study focuses on the surgery PDs current approach to online professionalism within surgical education. An online survey of general surgery PDs was conducted in October 2015 through the Association for Program Directors in Surgery listserv. Baseline PD demographics, usage and approach to popular social media outlets, existing institutional policies, and formal curricula were assessed. A total of 110 PDs responded to the survey (110/259, 42.5% response rate). Social media usage was high among PDs (Facebook 68% and Twitter 40%). PDs frequently viewed the social media profiles of students, residents, and faculty. Overall, 11% of PDs reported lowering the rank or completely removing a residency applicant from the rank order list because of online behavior, and 10% reported formal disciplinary action against a surgical resident because of online behavior. Overall, 68% of respondents agreed that online professionalism is important, and that residents should receive instruction on the safe use of social media. However, most programs did not have formal didactics or known institutional policies in place. Use of social media is high among PDs, and they often view the online behavior of residency applicants, surgical residents, and faculty surgeons. Within surgical education, there needs to be an increased focus on institutional policies and standardized curricula to help educate physicians on social media and online professionalism. Copyright © 2016 Association of Program Directors in Surgery. Published by Elsevier Inc. All rights reserved.

  16. Space exploration initiative (SEI) logistics support lessons from the DoD

    Science.gov (United States)

    Cox, John R.; McCoy, Walbert G.; Jenkins, Terence

    Proven and innovative logistics management approaches and techniques used for developing and supporting DoD and Strategic Defense Initiative Office (SDIO) systems are described on the basis of input from DoD to the SEI Synthesis Group; SDIO-developed logistics initiatives, innovative tools, and methodologies; and logistics planning support provided to the NASA/Johnson Planet Surface System Office. The approach is tailored for lunar/Martian surface operations, and provides guidelines for the development and management of a crucial element of the SEI logistics support program. A case study is presented which shows how incorporation of DoD's proven and innovative logistics management approach, tools, and techniques can substantially benefit early logistics planning for SEI, while also implementing many of DoD's recommendations for SEI.

  17. Privacy enhanced recommender system

    NARCIS (Netherlands)

    Erkin, Zekeriya; Erkin, Zekeriya; Beye, Michael; Veugen, Thijs; Lagendijk, Reginald L.

    2010-01-01

    Recommender systems are widely used in online applications since they enable personalized service to the users. The underlying collaborative filtering techniques work on user’s data which are mostly privacy sensitive and can be misused by the service provider. To protect the privacy of the users, we

  18. Information Privacy Revealed

    Science.gov (United States)

    Lavagnino, Merri Beth

    2013-01-01

    Why is Information Privacy the focus of the January-February 2013 issue of "EDUCAUSE Review" and "EDUCAUSE Review Online"? Results from the 2012 annual survey of the International Association of Privacy Professionals (IAPP) indicate that "meeting regulatory compliance requirements continues to be the top perceived driver…

  19. Privacy Metrics and Boundaries

    NARCIS (Netherlands)

    L-F. Pau (Louis-François)

    2005-01-01

    textabstractThis paper aims at defining a set of privacy metrics (quantitative and qualitative) in the case of the relation between a privacy protector ,and an information gatherer .The aims with such metrics are: -to allow to assess and compare different user scenarios and their differences; for

  20. 78 FR 41918 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2013-07-12

    ... Finance and Accounting Service, Freedom of Information/Privacy Act Program Manager, Corporate.... SUMMARY: The Defense Finance and Accounting Service proposes to alter a system of records, T7905, entitled...: Mr. Gregory L. Outlaw, Defense Finance and Accounting Service, Freedom of Information/Privacy Act...

  1. 77 FR 60131 - DHS Data Privacy and Integrity Advisory Committee

    Science.gov (United States)

    2012-10-02

    .... to 5 p.m. Please note that the meeting may end early if the Committee has completed its business... privacy protections for the collection and use of biometrics and for cybersecurity pilot programs. These... meeting may end early if all business is completed. Privacy Act Statement: DHS's Use of Your Information...

  2. Privacy under construction : A developmental perspective on privacy perception

    NARCIS (Netherlands)

    Steijn, W.M.P.; Vedder, A.H.

    2015-01-01

    We present a developmental perspective regarding the difference in perceptions toward privacy between young and old. Here, we introduce the notion of privacy conceptions, that is, the specific ideas that individuals have regarding what privacy actually is. The differences in privacy concerns often

  3. 75 FR 7978 - Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security Transportation...

    Science.gov (United States)

    2010-02-23

    ... Security Administration, 601 South 12th Street, Arlington, VA 20598-6036. For privacy issues please contact... Secretary 6 CFR Part 5 [Docket No. DHS-2009-0137] Privacy Act of 1974: Implementation of Exemptions... Program System of Records AGENCY: Privacy Office, DHS. ACTION: Notice of proposed rulemaking. SUMMARY: The...

  4. Status of DoD Robotic Programs

    Science.gov (United States)

    1985-03-01

    planning or adhere to previously planned routes. 0 Control. Controls are micro electronics based which provide means of autonomous action directly...KEY No: I 11 1181 1431 OROJECT Titloi ISMART TERRAIN ANALYSIS FOR ROBOTIC SYSTEMS (STARS) PROJECT Not I I CLASSIFICATION: IUCI TASK Titles IAUTOMATIC

  5. Risk Leading Indicators for DOD Acquisition Programs

    Science.gov (United States)

    2014-08-12

    Accomplishment 2: Preliminary Design Analysis. Criteria: Completed (a) design failure modes and effects analysis (DFMEA), (b) Fault Tree Analysis ( FTA ...Accomplishment 3, completed (a) updated DFMEA, (b) updated FTA , (c) updated reliability and maintainability estimates, (d) reliability growth plan and curve...Guide and Scheduling Guide (draft). GAO. Mar 2013. http://www.aacei-ncs.org/gaohq-6188401-v1- presentation_to_aace_mar-2013.pdf [5] Gary Bliss

  6. DoD Records Management Program

    National Research Council Canada - National Science Library

    Arnason, C

    1997-01-01

    ... title 36, Code of Federal Regulations, Chapter XII, 'National Archives and Records Administration,' Subchapter B, 'Records Management,' under the Assistant Secretary of Defense for Command, Control, Communications and Intelligence (ASD(C3I...

  7. 5 CFR 950.701 - DoD overseas campaign.

    Science.gov (United States)

    2010-01-01

    ... 5 Administrative Personnel 2 2010-01-01 2010-01-01 false DoD overseas campaign. 950.701 Section... VOLUNTARY ORGANIZATIONS DoD Overseas Campaign § 950.701 DoD overseas campaign. (a) A Combined Federal Campaign is authorized for all Department of Defense (DoD) activities in the overseas areas during a 6-week...

  8. NRC licensing requirements: DOD options

    International Nuclear Information System (INIS)

    Pike, W.J.; O'Reilly, P.D.

    1982-09-01

    This report describes the licensing process (both safety and environmental) that would apply if the Department of Defense (DOD) chooses to obtain licenses from the US Nuclear Regulatory Commission (NRC) for using nuclear energy for power and luminous sources. The specific nuclear energy sources being considered include: small or medium-size nuclear power reactors; radioisotopic thermoelectric generators with 90 Sr or 238 Pu; radioisotopic dynamic electric generators with 90 Sr or 238 Pu; and applications of radioisotopes for luminous sources (lights) with 3 H, 85 Kr, or 147 Pm. The steps of the licensing process are summarized in the following sections, with particular attention given to the schedule and level of effort necessary to support the process

  9. Protecting patron privacy

    CERN Document Server

    Beckstrom, Matthew

    2015-01-01

    In a world where almost anyone with computer savvy can hack, track, and record the online activities of others, your library can serve as a protected haven for your visitors who rely on the Internet to conduct research-if you take the necessary steps to safeguard their privacy. This book shows you how to protect patrons' privacy while using the technology that your library provides, including public computers, Internet access, wireless networks, and other devices. Logically organized into two major sections, the first part of the book discusses why the privacy of your users is of paramount

  10. Web Security, Privacy & Commerce

    CERN Document Server

    Garfinkel, Simson

    2011-01-01

    Since the first edition of this classic reference was published, World Wide Web use has exploded and e-commerce has become a daily part of business and personal life. As Web use has grown, so have the threats to our security and privacy--from credit card fraud to routine invasions of privacy by marketers to web site defacements to attacks that shut down popular web sites. Web Security, Privacy & Commerce goes behind the headlines, examines the major security risks facing us today, and explains how we can minimize them. It describes risks for Windows and Unix, Microsoft Internet Exp

  11. Privacy in Social Networks

    CERN Document Server

    Zheleva, Elena

    2012-01-01

    This synthesis lecture provides a survey of work on privacy in online social networks (OSNs). This work encompasses concerns of users as well as service providers and third parties. Our goal is to approach such concerns from a computer-science perspective, and building upon existing work on privacy, security, statistical modeling and databases to provide an overview of the technical and algorithmic issues related to privacy in OSNs. We start our survey by introducing a simple OSN data model and describe common statistical-inference techniques that can be used to infer potentially sensitive inf

  12. The 2000 DOD Financial Management Improvement Plan

    National Research Council Canada - National Science Library

    2001-01-01

    .... As a result, DoD has prepared the Financial Management Improvement Plan (the Plan), which is a strategic framework that includes the Departments financial management concept of operations for the future...

  13. Valuing the DoD Process Output

    National Research Council Canada - National Science Library

    Bourazanis, Petros; Gusnadi

    2005-01-01

    .... As a public institution that provides a public good to the people, the DoD has difficulties in using the prominent investment financial ratios used by the private sector as a metric of their performance...

  14. DoD International Armaments Cooperation Policy

    National Research Council Canada - National Science Library

    Cohen, William

    1997-01-01

    .... In the evolving environment of coalition warfare, limited resources, and a global industrial and technology base, it is DoD policy that we utilize International Armaments Cooperation to the maximum...

  15. The 2000 DOD Financial Management Improvement Plan

    National Research Council Canada - National Science Library

    2001-01-01

    The Federal Financial Management Improvement Act of 1996 requires DoD financial management systems to comply substantially with Federal financial management system requirements, Federal accounting standards, and the U.S...

  16. National Privacy Research Strategy

    Data.gov (United States)

    Networking and Information Technology Research and Development, Executive Office of the President — On July 1, NITRD released the National Privacy Research Strategy. Research agencies across government participated in the development of the strategy, reviewing...

  17. Cybersecurity and Privacy

    DEFF Research Database (Denmark)

    he huge potential in future connected services has as a precondition that privacy and security needs are dealt with in order for new services to be accepted. This issue is increasingly on the agenda both at the company and at individual level. Cybersecurity and Privacy – bridging the gap addresses...... two very complex fields of the digital world, i.e., Cybersecurity and Privacy. These multifaceted, multidisciplinary and complex issues are usually understood and valued differently by different individuals, data holders and legal bodies. But a change in one field immediately affects the others....... Policies, frameworks, strategies, laws, tools, techniques, and technologies – all of these are tightly interwoven when it comes to security and privacy. This book is another attempt to bridge the gap between the industry and academia. The book addresses the views from academia and industry on the subject...

  18. Privacy for Sale?

    DEFF Research Database (Denmark)

    Sørensen, Lene Tolstrup; Sørensen, Jannick Kirk; Khajuria, Samant

    Data brokers have become central players in the collection online of private user data. Data brokers’ activities are however not very transparent or even known by users. Many users regard privacy a central element when they use online services. Based on 12 short interviews with users, this paper...... analyses how users perceive the concept of online privacy in respect to data brokers col- lection of private data, and particularly novel services that offer users the possi- bility to sell their private data. Two groups of users are identified: Those who are considering selling their data under specific...... conditions, and those who reject the idea completely. Based on the literature we identify two positions to privacy either as an instrumental good, or as an intrinsic good. The paper positions vari- ous user perceptions on privacy that are relevant for future service develop- ment....

  19. Certificate Transparency with Privacy

    Directory of Open Access Journals (Sweden)

    Eskandarian Saba

    2017-10-01

    Full Text Available Certificate transparency (CT is an elegant mechanism designed to detect when a certificate authority (CA has issued a certificate incorrectly. Many CAs now support CT and it is being actively deployed in browsers. However, a number of privacy-related challenges remain. In this paper we propose practical solutions to two issues. First, we develop a mechanism that enables web browsers to audit a CT log without violating user privacy. Second, we extend CT to support non-public subdomains.

  20. 75 FR 20298 - Privacy Act Regulations

    Science.gov (United States)

    2010-04-19

    ... prevent and detect fraud, waste, and abuse and perform its other authorized duties and activities relating...--RATB Investigative Files'' and ``RATB--12--RATB Fraud Hotline Program Files,'' pursuant to the Privacy... 5 U.S.C. 552a: (1) From subsection (c)(3) because the release of accounting of disclosure would...

  1. Stratospheric Transparency: Perspectives on Internet Privacy

    Science.gov (United States)

    Hauck, Rita M.

    2009-01-01

    As a parent of teenagers in the 1980s, I recall a concern of the intrusion by MTV into our home. After futile attempts to block the program, my spouse and I set out to convince our sons of its intrusion. Our challenge was miniscule when compared to the Internet privacy issues of today. This paper addresses such challenges and proposes some…

  2. 78 FR 12337 - Published Privacy Impact Assessments on the Web

    Science.gov (United States)

    2013-02-22

    ... updating the DHS/ NPPD/PIA-021 National Cyber Security Division Joint Cybersecurity Services Pilot PIA... of the JCSP will focus on the cyber protection of the Defense Industrial Base (DIB) companies that are participating in the DoD's Cyber Security/Information Assurance (CS/IA) Program. This sub-program...

  3. 76 FR 111 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2011-01-03

    ..., marketing evaluation, assessment of manpower trends and characteristics; and related statistical studies and... participated in the DoD Student Testing Program (STP), as well as civilian applicants to the military services... Program. The data is also used for research, marketing evaluation, assessment of manpower trends and...

  4. 78 FR 34354 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2013-06-07

    ...(r) of the Privacy Act of 1974, as amended, was submitted on May 14, 2013, to the House Committee on... replace with ``System contains personnel data to support enlisted assignment, planning, programming...

  5. 78 FR 65620 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2013-11-01

    ..., as required by 5 U.S.C. 552a(r) of the Privacy Act of 1974, as amended, was submitted on March 18... support officer assignment, planning, programming, accounting, promotions, career development, and...

  6. DOD Task Force for Business and Stability Operations in Afghanistan: Review of Selected Expenditures Highlights Serious Management and Oversight Problems

    Science.gov (United States)

    2016-04-15

    execute projects and programs, but rather to advise DOD entities on ways to improve contracting processes and procedures. The memorandum establishing the...Task Force stated, “The Task Force will not be responsible for contracting, but will advise existing DoD contracting offices on improved...including the fact that the AGS did not appear to screen the trainees it nominated , resulting in the majority of the trainees being functionally

  7. An informational theory of privacy

    NARCIS (Netherlands)

    Schottmuller, C.; Jann, Ole

    2016-01-01

    We develop a theory that explains how and when privacy can increase welfare. Without privacy, some individuals misrepresent their preferences, because they will otherwise be statistically discriminated against. This "chilling effect" hurts them individually, and impairs information aggregation. The

  8. Privacy in social networking sites

    OpenAIRE

    Λεονάρδος, Γεώργιος; Leonardos, Giorgos

    2016-01-01

    The purpose of this study is to explore the aspects of privacy over the use of social networks web sites. More specific, we will show the types of social networks, their privacy mechanisms that are different in each social network site, their privacy options that are offered to users. We will report some serious privacy violations incidents of the most popular social networks sites such as Facebook, Twitter, LinkedIn. Also, we will report some important surveys about social networks and pr...

  9. 77 FR 31371 - Public Workshop: Privacy Compliance Workshop

    Science.gov (United States)

    2012-05-25

    ... presentations, including the privacy compliance fundamentals, privacy and data security, and the privacy... DEPARTMENT OF HOMELAND SECURITY Office of the Secretary Public Workshop: Privacy Compliance... Homeland Security Privacy Office will host a public workshop, ``Privacy Compliance Workshop.'' DATES: The...

  10. 77 FR 11367 - Defense Federal Acquisition Regulation Supplement; Extension of the Test Program for Negotiation...

    Science.gov (United States)

    2012-02-24

    ...DoD is issuing a final rule amending the Defense Federal Acquisition Regulation Supplement to extend the program period for the DoD Test Program for Negotiation of Comprehensive Small Business Subcontracting Plans.

  11. Privacy and Open Government

    Directory of Open Access Journals (Sweden)

    Teresa Scassa

    2014-06-01

    Full Text Available The public-oriented goals of the open government movement promise increased transparency and accountability of governments, enhanced citizen engagement and participation, improved service delivery, economic development and the stimulation of innovation. In part, these goals are to be achieved by making more and more government information public in reusable formats and under open licences. This paper identifies three broad privacy challenges raised by open government. The first is how to balance privacy with transparency and accountability in the context of “public” personal information. The second challenge flows from the disruption of traditional approaches to privacy based on a collapse of the distinctions between public and private sector actors. The third challenge is that of the potential for open government data—even if anonymized—to contribute to the big data environment in which citizens and their activities are increasingly monitored and profiled.

  12. Advertising and Invasion of Privacy.

    Science.gov (United States)

    Rohrer, Daniel Morgan

    The right of privacy as it relates to advertising and the use of a person's name or likeness is discussed in this paper. After an introduction that traces some of the history of invasion of privacy in court decisions, the paper examines cases involving issues such as public figures and newsworthy items, right of privacy waived, right of privacy…

  13. Privacy in an Ambient World

    NARCIS (Netherlands)

    Dekker, M.A.C.; Etalle, Sandro; den Hartog, Jeremy

    Privacy is a prime concern in today's information society. To protect the privacy of individuals, enterprises must follow certain privacy practices, while collecting or processing personal data. In this chapter we look at the setting where an enterprise collects private data on its website,

  14. 76 FR 59073 - Privacy Act

    Science.gov (United States)

    2011-09-23

    ... CENTRAL INTELLIGENCE AGENCY 32 CFR Part 1901 Privacy Act AGENCY: Central Intelligence Agency. ACTION: Proposed rule. SUMMARY: Consistent with the Privacy Act (PA), the Central Intelligence Agency...-1379. SUPPLEMENTARY INFORMATION: Consistent with the Privacy Act (PA), the CIA has undertaken and...

  15. Privacy Expectations in Online Contexts

    Science.gov (United States)

    Pure, Rebekah Abigail

    2013-01-01

    Advances in digital networked communication technology over the last two decades have brought the issue of personal privacy into sharper focus within contemporary public discourse. In this dissertation, I explain the Fourth Amendment and the role that privacy expectations play in the constitutional protection of personal privacy generally, and…

  16. Designing Privacy-by-Design

    NARCIS (Netherlands)

    Rest, J.H.C. van; Boonstra, D.; Everts, M.H.; Rijn, M. van; Paassen, R.J.G. van

    2014-01-01

    The proposal for a new privacy regulation d.d. January 25th 2012 introduces sanctions of up to 2% of the annual turnover of enterprises. This elevates the importance of mitigation of privacy risks. This paper makes Privacy by Design more concrete, and positions it as the mechanism to mitigate these

  17. Major Management Challenges and Program Risks Department of Defense

    National Research Council Canada - National Science Library

    1999-01-01

    .... The report also addresses corrective actions that DOD has taken or initiated on these issues- including DOD'S blueprint for a strategy-based, balanced, and affordable defense program as outlined...

  18. What was privacy?

    Science.gov (United States)

    McCreary, Lew

    2008-10-01

    Why is that question in the past tense? Because individuals can no longer feel confident that the details of their lives--from identifying numbers to cultural preferences--will be treated with discretion rather than exploited. Even as Facebook users happily share the names of their favorite books, movies, songs, and brands, they often regard marketers' use of that information as an invasion of privacy. In this wide-ranging essay, McCreary, a senior editor at HBR, examines numerous facets of the privacy issue, from Google searches, public shaming on the internet, and cell phone etiquette to passenger screening devices, public surveillance cameras, and corporate chief privacy officers. He notes that IBM has been a leader on privacy; its policy forswearing the use of employees' genetic information in hiring and benefits decisions predated the federal Genetic Information Nondiscrimination Act by three years. Now IBM is involved in an open-source project known as Higgins to provide users with transportable, potentially anonymous online presences. Craigslist, whose CEO calls it "as close to 100% user driven as you can get," has taken an extremely conservative position on privacy--perhaps easier for a company with a declared lack of interest in maximizing revenue. But TJX and other corporate victims of security breaches have discovered that retaining consumers' transaction information can be both costly and risky. Companies that underestimate the importance of privacy to their customers or fail to protect it may eventually face harsh regulation, reputational damage, or both. The best thing they can do, says the author, is negotiate directly with those customers over where to draw the line.

  19. How is the DoD Logistics Transformation Going?

    National Research Council Canada - National Science Library

    Eden, Rick

    2001-01-01

    ...: Cost Reduction--The DoD logistics system must reduce the costs of providing support. Responsiveness--The DoD logistics system must improve its basic business processes to match best commercial performance levels...

  20. Interagency cooperation : FEMA and DOD in domestic support operations.

    Science.gov (United States)

    1997-05-01

    This paper studies the interagency cooperation between DOD and FEMA, focusing specifically on the evolution of doctrine and procedures for responding to natural disasters. While both FEMA and DOD have improved in their ability to respond to disasters...

  1. Increasing the Adaptability of DoD Forces and Organizations

    National Research Council Canada - National Science Library

    Gorman, David

    2001-01-01

    The post-Cold War world demands increased adaptability. Since the accelerating pace of technological change reduces DoD ability to forecast threat characteristics, DOD force planning methodology is undermined...

  2. Report of the DOD-DOE Workshop on Converting Waste to Energy Using Fuel Cells

    Science.gov (United States)

    2011-10-01

    cell research, development, and demonstration. Along with the general program overview, Dr. Satyapal highlighted the vast amount of biogas resources...Page ii DOD-DOE Workshop Summary on Converting Waste to Energy Using Fuel Cells List of Tables Table 1. Comparison by Generator Type: Based on 40...Table 2. Typical Composition of Biogas from Various Waste Streams ....................................................... 8 Table D-1

  3. Defense Infrastructure: DOD Needs Clearer Guidance on Notifying Congress of Privately Financed Construction Projects

    Science.gov (United States)

    2017-01-01

    welfare, and recreation activities such as recreation centers; food , beverage , and entertainment programs; and recreational lodging. Private...fast food restaurants. Because these projects are not authorized and funded through the regular appropriations process for military construction...commissaries.8 These funds can be used for various specified purposes, including the construction of commissaries.9 DOD commissaries are managed by

  4. Defense Budget: DOD Needs to Improve Reporting of Operation and Maintenance Base Obligations

    Science.gov (United States)

    2016-08-01

    10For additional information on DOD’s planning, programming, budgeting, and execution process, see GAO, DOD Service Acquisition ...check, or money order. Call for additional information. Connect with GAO on Facebook , Flickr, Twitter, and YouTube. Subscribe to our RSS Feeds or E

  5. PEDOT pillar fabrication using DOD inkjet system

    Science.gov (United States)

    Cui, Wei; Chang, Cheng-Ling; Wang, Wei-Chih

    2012-04-01

    In this paper, we present our preliminary results of high aspect ratio 3D PEDOT pillar study by drop-on demand (DOD) direct printing system. Design of the experimental setup and the fabrication of the DOD PEDOT pillar are introduced. Currently, the system can achieve a PEDOT pillar with a height of 300 μm and 80 μm in diameter. The proposed PEDOT 3D printing process has a wide range of potential applications in the eletronics and display industry.

  6. Report of the Task Force for Improved Coordination of the DoD Science and Technology Program. Volume 2. Reports of the Working Groups. Working Group A: Strategic Planning. Working Group B: Program Coordination. Working Group C: Advocacy

    Science.gov (United States)

    1988-08-01

    OperabllY 19 Technolofy Area Summaries 20 Major Technology Thrws 21 Air Force S&T Investment Summary 25 Program Objectives 28 Glcazy 30 1. D-6 TH~E...8217lRI-TAC Advrane Plannzn Sy-i Mulima Radio AWAM3 IRP JSTARS fris MmAvne Anhn ABOCC 37=6 Comb !dftica~ S~ Surance Radar Ewm EAVZ SYNC Media . R~u... Social Sciences 5001 Eisenhower Avenue Alexandria VA 22333-5600 Col. Harry G. Dangerfield Telephone: (301) 663-7443 Executive Assistant to the PEO for

  7. Enhancing Cross-Cultural Collaboration between DoD and VA

    Science.gov (United States)

    2012-04-27

    Philadelphia. In 1853 and 1855, the Soldiers Home and St. Elizabeth’s Hospital followed in Washington, DC. In 1866, Congress established the National Homes...veterans. The quality of medical care at these homes improved until it was comparable to hospital care of that day. In 1862, the National Cemetery...Evaluation System WG Pain Management WG DoD Recovery Coordination Program ( RCP )* Federal Recovery Coordination Program (FRCP)* * Programs with JEC

  8. The Lean Acquisition Strategy Behind the DOD’s 2015 Electronic Health Record System

    Science.gov (United States)

    2016-09-01

    the acquisition of CHCS, numerous errors caused delays in system development contracting. First, the DOD miscommunicated with some vendors and...Unsolidified program milestones Manager Lack of commitment Program focus on home-grown solutions 3. Question 2: What Were the Key Obstacles and Risks...differences in a way … solutions are presented” (personal communication, June 10, 2016). Program manager 1 echoes the findings from the survey that the

  9. Privacy Bridges: EU and US Privacy Experts In Search of Transatlantic Privacy Solutions

    NARCIS (Netherlands)

    Abramatic, J.-F.; Bellamy, B.; Callahan, M.E.; Cate, F.; van Eecke, P.; van Eijk, N.; Guild, E.; de Hert, P.; Hustinx, P.; Kuner, C.; Mulligan, D.; O'Connor, N.; Reidenberg, J.; Rubinstein, I.; Schaar, P.; Shadbolt, N.; Spiekermann, S.; Vladeck, D.; Weitzner, D.J.; Zuiderveen Borgesius, F.; Hagenauw, D.; Hijmans, H.

    2015-01-01

    The EU and US share a common commitment to privacy protection as a cornerstone of democracy. Following the Treaty of Lisbon, data privacy is a fundamental right that the European Union must proactively guarantee. In the United States, data privacy derives from constitutional protections in the

  10. Emergency Supplemental Appropriations for DoD Needs Arising from Hurricane Katrina at Selected DoD Components

    National Research Council Canada - National Science Library

    Granetto, Paul J; Marsh, Patricia A; Pfeil, Lorin T; Adu, Henry Y; Appiah, Emmanuel A; Lawrence, Charlisa D; Loftin, Sharon A; Straw, Richard W; Davis, Sonya T; Hart, Erin S

    2007-01-01

    .... The Inspector General (IG), DoD, performed this audit to determine if the emergency supplemental appropriations for DoD needs arising from Hurricane Katrina and others were used for their intended purposes...

  11. 75 FR 21264 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2010-04-23

    ... facilities. Categories of records in the system: Name, Social Security Number (SSN), and DoD Electronic Data... Army's Food Service Program. The system facilitates the ordering, receipt, warehousing, and issuance of... user name and password. Data is encrypted in its stored form and cannot be accessed except through the...

  12. 76 FR 58788 - Privacy Act of 1974; Systems of Records

    Science.gov (United States)

    2011-09-22

    ... Manager, Corporate Communications, Defense Finance and Accounting Service, DFAS-HKC/IN, 8899 E. 56th... inquires to FOIA/PA Program Manager, Corporate Communications, Defense Finance and Accounting Service, DFAS...; Systems of Records AGENCY: Defense Finance and Accounting Service, Department of Defense, (DoD). ACTION...

  13. 75 FR 17906 - Privacy Act of 1974; Systems of Records

    Science.gov (United States)

    2010-04-08

    ... ``Program Manager, Law Enforcement Operations, Headquarters, Defense Logistics Agency, Office of Public... Manager, Law Enforcement Operations, Headquarters, Defense Logistics Agency, Office of Public Safety, 8725...; Systems of Records AGENCY: Defense Logistics Agency, DoD. ACTION: Notice to amend a system of records...

  14. Biometrics and privacy

    NARCIS (Netherlands)

    Grijpink, J.H.A.M.

    2001-01-01

    Biometrics offers many alternatives for protecting our privacy and preventing us from falling victim to crime. Biometrics can even serve as a solid basis for safe anonymous and semi-anonymous legal transactions. In this article Jan Grijpink clarifies which concepts and practical applications this

  15. Reconciling privacy and security

    NARCIS (Netherlands)

    Lieshout, M.J. van; Friedewald, M.; Wright, D.; Gutwirth, S.

    2013-01-01

    This paper considers the relationship between privacy and security and, in particular, the traditional "trade-off" paradigm. The issue is this: how, in a democracy, can one reconcile the trend towards increasing security (for example, as manifested by increasing surveillance) with the fundamental

  16. Privacy Policy | FNLCR Staging

    Science.gov (United States)

    The privacy of our users is of utmost importance to Frederick National Lab. The policy outlined below establishes how Frederick National Lab will use the information we gather about you from your visit to our website. We may collect and store

  17. 08471 Report -- Geographic Privacy-Aware Knowledge Discovery and Delivery

    OpenAIRE

    Kuijpers, Bart; Pedreschi, Dino; Saygin, Yucel; Spaccapietra, Stefano

    2009-01-01

    The Dagstuhl-Seminar on Geographic Privacy-Aware Knowledge Discovery and Delivery was held during 16 - 21 November, 2008, with 37 participants registered from various countries from Europe, as well as other parts of the world such as United States, Canada, Argentina, and Brazil. Issues in the newly emerging area of geographic knowledge discovery with a privacy perspective were discussed in a week to consolidate some of the research questions. The Dagstuhl program included...

  18. Cash Accountability in DOD Imprest Funds Maintained by the Office of the Inspector General, DOD

    National Research Council Canada - National Science Library

    Rau, Russell

    1995-01-01

    We are providing this report for your information and use. The audit was made at your request to examine the imprest funds maintained within the Office of the Inspector General, DoD, Arlington, Virginia...

  19. Towards Territorial Privacy in Smart Environments

    NARCIS (Netherlands)

    Könings, Bastian; Schaub, Florian; Weber, M.; Kargl, Frank

    Territorial privacy is an old concept for privacy of the personal space dating back to the 19th century. Despite its former relevance, territorial privacy has been neglected in recent years, while privacy research and legislation mainly focused on the issue of information privacy. However, with the

  20. Privacy Awareness: A Means to Solve the Privacy Paradox?

    Science.gov (United States)

    Pötzsch, Stefanie

    People are limited in their resources, i.e. they have limited memory capabilities, cannot pay attention to too many things at the same time, and forget much information after a while; computers do not suffer from these limitations. Thus, revealing personal data in electronic communication environments and being completely unaware of the impact of privacy might cause a lot of privacy issues later. Even if people are privacy aware in general, the so-called privacy paradox shows that they do not behave according to their stated attitudes. This paper discusses explanations for the existing dichotomy between the intentions of people towards disclosure of personal data and their behaviour. We present requirements on tools for privacy-awareness support in order to counteract the privacy paradox.

  1. Gaussian operations and privacy

    International Nuclear Information System (INIS)

    Navascues, Miguel; Acin, Antonio

    2005-01-01

    We consider the possibilities offered by Gaussian states and operations for two honest parties, Alice and Bob, to obtain privacy against a third eavesdropping party, Eve. We first extend the security analysis of the protocol proposed in [Navascues et al. Phys. Rev. Lett. 94, 010502 (2005)]. Then, we prove that a generalized version of this protocol does not allow one to distill a secret key out of bound entangled Gaussian states

  2. Privacy 2.0

    Directory of Open Access Journals (Sweden)

    Stylianos Papathanassopoulos

    2015-04-01

    Full Text Available We live in the era of change. In this world, privacy is not a static concept, but instead has a dynamic component. Overall, it becomes clear that the public and private are not defined in the same manner as in the past and as in the actual world, while our personal information has become a commodity that can raise our visibility in the social media driven world.

  3. Location Privacy in RFID Applications

    Science.gov (United States)

    Sadeghi, Ahmad-Reza; Visconti, Ivan; Wachsmann, Christian

    RFID-enabled systems allow fully automatic wireless identification of objects and are rapidly becoming a pervasive technology with various applications. However, despite their benefits, RFID-based systems also pose challenging risks, in particular concerning user privacy. Indeed, improvident use of RFID can disclose sensitive information about users and their locations allowing detailed user profiles. Hence, it is crucial to identify and to enforce appropriate security and privacy requirements of RFID applications (that are also compliant to legislation). This chapter first discusses security and privacy requirements for RFID-enabled systems, focusing in particular on location privacy issues. Then it explores the advances in RFID applications, stressing the security and privacy shortcomings of existing proposals. Finally, it presents new promising directions for privacy-preserving RFID systems, where as a case study we focus electronic tickets (e-tickets) for public transportation.

  4. PRIVACY AS A CULTURAL PHENOMENON

    Directory of Open Access Journals (Sweden)

    Garfield Benjamin

    2017-07-01

    Full Text Available Privacy remains both contentious and ever more pertinent in contemporary society. Yet it persists as an ill-defined term, not only within specific fields but in its various uses and implications between and across technical, legal and political contexts. This article offers a new critical review of the history of privacy in terms of two dominant strands of thinking: freedom and property. These two conceptions of privacy can be seen as successive historical epochs brought together under digital technologies, yielding increasingly complex socio-technical dilemmas. By simplifying the taxonomy to its socio-cultural function, the article provides a generalisable, interdisciplinary approach to privacy. Drawing on new technologies, historical trends, sociological studies and political philosophy, the article presents a discussion of the value of privacy as a term, before proposing a defense of the term cyber security as a mode of scalable cognitive privacy that integrates the relative needs of individuals, governments and corporations.

  5. The privacy implications of Bluetooth

    OpenAIRE

    Kostakos, Vassilis

    2008-01-01

    A substantial amount of research, as well as media hype, has surrounded RFID technology and its privacy implications. Currently, researchers and the media focus on the privacy threats posed by RFID, while consumer groups choose to boycott products bearing RFID tags. At the same, however, a very similar technology has quietly become part of our everyday lives: Bluetooth. In this paper we highlight the fact that Bluetooth is a widespread technology that has real privacy implications. Furthermor...

  6. 32 CFR Appendix D to Part 505 - Exemptions; Exceptions; and DoD Blanket Routine Uses

    Science.gov (United States)

    2010-07-01

    ... AID OF CIVIL AUTHORITIES AND PUBLIC RELATIONS ARMY PRIVACY ACT PROGRAM Pt. 505, App. D Appendix D to... of the claim; and the agency or program under which the case arose may be disclosed. However, before... carry out its legally authorized Government-wide personnel management functions and studies. (9...

  7. Cognitive Privacy for Personal Clouds

    Directory of Open Access Journals (Sweden)

    Milena Radenkovic

    2016-01-01

    Full Text Available This paper proposes a novel Cognitive Privacy (CogPriv framework that improves privacy of data sharing between Personal Clouds for different application types and across heterogeneous networks. Depending on the behaviour of neighbouring network nodes, their estimated privacy levels, resource availability, and social network connectivity, each Personal Cloud may decide to use different transmission network for different types of data and privacy requirements. CogPriv is fully distributed, uses complex graph contacts analytics and multiple implicit novel heuristics, and combines these with smart probing to identify presence and behaviour of privacy compromising nodes in the network. Based on sensed local context and through cooperation with remote nodes in the network, CogPriv is able to transparently and on-the-fly change the network in order to avoid transmissions when privacy may be compromised. We show that CogPriv achieves higher end-to-end privacy levels compared to both noncognitive cellular network communication and state-of-the-art strategies based on privacy-aware adaptive social mobile networks routing for a range of experiment scenarios based on real-world user and network traces. CogPriv is able to adapt to varying network connectivity and maintain high quality of service while managing to keep low data exposure for a wide range of privacy leakage levels in the infrastructure.

  8. Data privacy for the smart grid

    CERN Document Server

    Herold, Rebecca

    2015-01-01

    The Smart Grid and PrivacyWhat Is the Smart Grid? Changes from Traditional Energy Delivery Smart Grid Possibilities Business Model Transformations Emerging Privacy Risks The Need for Privacy PoliciesPrivacy Laws, Regulations, and Standards Privacy-Enhancing Technologies New Privacy Challenges IOT Big Data What Is the Smart Grid?Market and Regulatory OverviewTraditional Electricity Business SectorThe Electricity Open Market Classifications of Utilities Rate-Making ProcessesElectricity Consumer

  9. A Survey of Privacy on Data Integration

    OpenAIRE

    Do Son, Thanh

    2015-01-01

    This survey is an integrated view of other surveys on privacy preserving for data integration. First, we review the database context and challenges and research questions. Second, we formulate the privacy problems for schema matching and data matching. Next, we introduce the elements of privacy models. Then, we summarize the existing privacy techniques and the analysis (proofs) of privacy guarantees. Finally, we describe the privacy frameworks and their applications.

  10. Technical Privacy Metrics: a Systematic Survey

    OpenAIRE

    Wagner, Isabel; Eckhoff, David

    2018-01-01

    The file attached to this record is the author's final peer reviewed version The goal of privacy metrics is to measure the degree of privacy enjoyed by users in a system and the amount of protection offered by privacy-enhancing technologies. In this way, privacy metrics contribute to improving user privacy in the digital world. The diversity and complexity of privacy metrics in the literature makes an informed choice of metrics challenging. As a result, instead of using existing metrics, n...

  11. Military Space Programs: Issues Concerning DOD's SBIRS and STSS Programs

    National Research Council Canada - National Science Library

    Smith, Marcia S

    2005-01-01

    .... The Space Tracking and Surveillance System (STSS, formerly SBIRS-Low), managed by the Missile Defense Agency, would perform missile tracking and target discrimination for missile defense objectives...

  12. Military Space Programs: Issues Concerning DOD's SBIRS and STSS Programs

    National Research Council Canada - National Science Library

    Smith, Marcia S

    2006-01-01

    .... The Space Tracking and Surveillance System (STSS, formerly SBIRS-Low), managed by the Missile Defense Agency, would perform missile tracking and target discrimination for missile defense objectives...

  13. Military Space Programs: Issues Concerning DOD's SBIRS and STSS Programs

    National Research Council Canada - National Science Library

    Smith, Marcia S

    2003-01-01

    .... The Space Tracking and Surveillance System (STSS, formerly SBIRS-Low), managed by the Missile Defense Agency, would perform missile tracking and target discrimination for missile defense objectives...

  14. DoD Cybersecurity Discipline Implementation Plan

    Science.gov (United States)

    2016-02-01

    a user: 1) something the user knows, such as a password or key code; 2) something the user is, such as biometrics ; and 3) something the user has...between weak passwords and account takeovers via brute force attacks are well-established. Traditionally, individuals requiring access to DoD information...networks had to create network- and system-specific user names and passwords to access information online. DoDI 8520.03 (Reference (f)) requires

  15. 75 FR 47797 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2010-08-09

    ... Officer, Department of Defense. Deletion: S330.40 CAHS System name: Employee Assistance Program Records (August 27, 1999; 64 FR 46889). Reason: This collection is covered under the existing DHHS/FOH EAP Privacy notice 09-90-0010, entitled ``Employee Assistance Program (EAP) Records, HHS/OS/ASAM/OHR.'' [FR Doc. 2010...

  16. Internal Controls over the Department of Defense Transit Subsidy Program within the National Capital Region

    National Research Council Canada - National Science Library

    Granetto, Paul J; Marsh, Patricia A; Pfeil, Lorin T; Gaich, Walter J; Lawrence, Demetria; Hart, Marcia T; Dickison, Ralph W; Varner, Pamela; Foth, Suellen

    2007-01-01

    DoD personnel with oversight responsibility and personnel working within the DoD transit subsidy program for the National Capital Region should read this report to obtain information about internal...

  17. The Privacy Coach: Supporting customer privacy in the Internet of Things

    OpenAIRE

    Broenink, Gerben; Hoepman, Jaap-Henk; Hof, Christian van 't; van Kranenburg, Rob; Smits, David; Wisman, Tijmen

    2010-01-01

    The Privacy Coach is an application running on a mobile phone that supports customers in making privacy decisions when confronted with RFID tags. The approach we take to increase customer privacy is a radical departure from the mainstream research efforts that focus on implementing privacy enhancing technologies on the RFID tags themselves. Instead the Privacy Coach functions as a mediator between customer privacy preferences and corporate privacy policies, trying to find a match between the ...

  18. Privacy Law and Print Photojournalism.

    Science.gov (United States)

    Dykhouse, Caroline Dow

    Reviews of publications about privacy law, of recent court actions, and of interviews with newspaper photographers and attorneys indicate that torts of privacy often conflict with the freedoms to publish and to gather news. Although some guidelines have already been established (about running distorted pictures, "stealing" pictures, taking…

  19. Story Lab: Student Data Privacy

    Science.gov (United States)

    Herold, Benjamin

    2015-01-01

    Student data privacy is an increasingly high-profile--and controversial--issue that touches schools and families across the country. There are stories to tell in virtually every community. About three dozen states have passed legislation addressing student data privacy in the past two years, and eight different proposals were floating around…

  20. 42 CFR 403.812 - HIPAA privacy, security, administrative data standards, and national identifiers.

    Science.gov (United States)

    2010-10-01

    ... 42 Public Health 2 2010-10-01 2010-10-01 false HIPAA privacy, security, administrative data... Prescription Drug Discount Card and Transitional Assistance Program § 403.812 HIPAA privacy, security, administrative data standards, and national identifiers. (a) HIPAA covered entities. An endorsed sponsor is a...

  1. Privacy and Big Data

    CERN Document Server

    Craig, Terence

    2011-01-01

    Much of what constitutes Big Data is information about us. Through our online activities, we leave an easy-to-follow trail of digital footprints that reveal who we are, what we buy, where we go, and much more. This eye-opening book explores the raging privacy debate over the use of personal data, with one undeniable conclusion: once data's been collected, we have absolutely no control over who uses it or how it is used. Personal data is the hottest commodity on the market today-truly more valuable than gold. We are the asset that every company, industry, non-profit, and government wants. Pri

  2. Speech Privacy Problems

    Science.gov (United States)

    1945-08-18

    eondwious, «ach AnvoWnc either one or tiro staple m^aSattoa processes. The British teo -dimensioaai privacy system eUiissd both ire- oasaay ana time...of the 884 gas tube and ground showed that the tubs did not re- main fired throughout the duration of the 4- kc puls.e. Instead, the tube fired on...ouri’ent through the relay circuit was not sufficient to: permit its firm operation, especially when the amplitude of the 4~ kc pulse was low. This

  3. User Privacy in RFID Networks

    Science.gov (United States)

    Singelée, Dave; Seys, Stefaan

    Wireless RFID networks are getting deployed at a rapid pace and have already entered the public space on a massive scale: public transport cards, the biometric passport, office ID tokens, customer loyalty cards, etc. Although RFID technology offers interesting services to customers and retailers, it could also endanger the privacy of the end-users. The lack of protection mechanisms being deployed could potentially result in a privacy leakage of personal data. Furthermore, there is the emerging threat of location privacy. In this paper, we will show some practical attack scenarios and illustrates some of them with cases that have received press coverage. We will present the main challenges of enhancing privacy in RFID networks and evaluate some solutions proposed in literature. The main advantages and shortcomings will be briefly discussed. Finally, we will give an overview of some academic and industrial research initiatives on RFID privacy.

  4. 32 CFR 635.9 - Guidelines for disclosure within DOD.

    Science.gov (United States)

    2010-07-01

    ... for disclosure within DOD. (a) Criminal record information contained in military police documents will... limit the dissemination of information between military police, the USACIDC, and other law enforcement...

  5. Crossing the Technology Adoption Chasm: Implications for DoD

    National Research Council Canada - National Science Library

    Coughlan, Peter; Dew, Nicholas; Gates, William

    2008-01-01

    .... To better understand DOD's technology adoption challenges, we review the technology diffusion literature to identify factors associated with successful and unsuccessful technology adoption processes...

  6. 76 FR 22849 - DoD Unclassified Controlled Nuclear Information (UCNI)

    Science.gov (United States)

    2011-04-25

    ... containing DoD UCNI information. (8) DoD UCNI processed, stored, or produced on stand-alone or networked... marked as having DoD UCNI may be reproduced minimally without permission of the originator and consistent...

  7. A Generic Privacy Quantification Framework for Privacy-Preserving Data Publishing

    Science.gov (United States)

    Zhu, Zutao

    2010-01-01

    In recent years, the concerns about the privacy for the electronic data collected by government agencies, organizations, and industries are increasing. They include individual privacy and knowledge privacy. Privacy-preserving data publishing is a research branch that preserves the privacy while, at the same time, withholding useful information in…

  8. 76 FR 64115 - Privacy Act of 1974; Privacy Act System of Records

    Science.gov (United States)

    2011-10-17

    ... NATIONAL AERONAUTICS AND SPACE ADMINISTRATION [Notice (11-092)] Privacy Act of 1974; Privacy Act... retirement of one Privacy Act system of records notice. SUMMARY: In accordance with the Privacy Act of 1974, NASA is giving notice that it proposes to cancel the following Privacy Act system of records notice...

  9. 48 CFR 39.105 - Privacy.

    Science.gov (United States)

    2010-10-01

    ... 48 Federal Acquisition Regulations System 1 2010-10-01 2010-10-01 false Privacy. 39.105 Section 39... CONTRACTING ACQUISITION OF INFORMATION TECHNOLOGY General 39.105 Privacy. Agencies shall ensure that contracts for information technology address protection of privacy in accordance with the Privacy Act (5 U.S.C...

  10. Crossing the technology adoption chasm in the presence of network externalities implications for DoD

    OpenAIRE

    Schang, Suzanne L.

    2007-01-01

    This thesis explores factors inhibiting technologies from crossing the technology diffusion "chasm" in between early and wide-scale adoption. It focuses on cost and benefit uncertainty as well as network effects applied to end-users and their organizations. Specifically, it explores Department of Defense (DoD) acquisition programs bringing promising technologies to the field defines successful technology adoption as realizing its full potential return on investment by achieving the widest ...

  11. DoD Fuel Facilities Criteria

    Science.gov (United States)

    2015-04-27

    Pantograph Feb-2010 UFGS 33 58 00 Leak Detection for Fueling Systems Apr-2008 UFGS 33 52 43.13 Aviation Fuel Piping Feb-2010 UFGS 33 59 00 Tightness of... Pipeline Pressure Testing Guidelines  Specifications  Questions 2 7/12/2017 3 7/12/2017 DoD Fuels Facilities Documents  Unified...UFGS)  Most in the 33 nn nn series  Associated with Standard Designs  Available on WBDG site  Coating Systems 4 7/12/2017 Pipeline

  12. An Efficient Context-Aware Privacy Preserving Approach for Smartphones

    Directory of Open Access Journals (Sweden)

    Lichen Zhang

    2017-01-01

    Full Text Available With the proliferation of smartphones and the usage of the smartphone apps, privacy preservation has become an important issue. The existing privacy preservation approaches for smartphones usually have less efficiency due to the absent consideration of the active defense policies and temporal correlations between contexts related to users. In this paper, through modeling the temporal correlations among contexts, we formalize the privacy preservation problem to an optimization problem and prove its correctness and the optimality through theoretical analysis. To further speed up the running time, we transform the original optimization problem to an approximate optimal problem, a linear programming problem. By resolving the linear programming problem, an efficient context-aware privacy preserving algorithm (CAPP is designed, which adopts active defense policy and decides how to release the current context of a user to maximize the level of quality of service (QoS of context-aware apps with privacy preservation. The conducted extensive simulations on real dataset demonstrate the improved performance of CAPP over other traditional approaches.

  13. Towards Privacy Managment of Information Systems

    OpenAIRE

    Drageide, Vidar

    2009-01-01

    This masters thesis provides insight into the concept of privacy. It argues why privacy is important, and why developers and system owners should keep privacy in mind when developing and maintaining systems containing personal information. Following this, a strategy for evaluating the overall level of privacy in a system is defined. The strategy is then applied to parts of the cellphone system in an attempt to evaluate the privacy of traffic and location data in this system.

  14. An Alternative View of Privacy on Facebook

    OpenAIRE

    Christian Fuchs

    2011-01-01

    The predominant analysis of privacy on Facebook focuses on personal information revelation. This paper is critical of this kind of research and introduces an alternative analytical framework for studying privacy on Facebook, social networking sites and web 2.0. This framework is connecting the phenomenon of online privacy to the political economy of capitalism—a focus that has thus far been rather neglected in research literature about Internet and web 2.0 privacy. Liberal privacy philosophy ...

  15. Effective online privacy mechanisms with persuasive communication

    OpenAIRE

    Coopamootoo, P L

    2016-01-01

    This thesis contributes to research by taking a social psychological perspective to managing privacy online. The thesis proposes to support the effort to form a mental model that is required to evaluate a context with regards to privacy attitudes or to ease the effort by biasing activation of privacy attitudes. Privacy being a behavioural concept, the human-computer interaction design plays a major role in supporting and contributing to end users’ ability to manage their privacy online. Howev...

  16. Adding query privacy to robust DHTs

    DEFF Research Database (Denmark)

    Backes, Michael; Goldberg, Ian; Kate, Aniket

    2012-01-01

    intermediate peers that (help to) route the queries towards their destinations. In this paper, we satisfy this requirement by presenting an approach for providing privacy for the keys in DHT queries. We use the concept of oblivious transfer (OT) in communication over DHTs to preserve query privacy without...... privacy over robust DHTs. Finally, we compare the performance of our privacy-preserving protocols with their more privacy-invasive counterparts. We observe that there is no increase in the message complexity...

  17. Trajectory data privacy protection based on differential privacy mechanism

    Science.gov (United States)

    Gu, Ke; Yang, Lihao; Liu, Yongzhi; Liao, Niandong

    2018-05-01

    In this paper, we propose a trajectory data privacy protection scheme based on differential privacy mechanism. In the proposed scheme, the algorithm first selects the protected points from the user’s trajectory data; secondly, the algorithm forms the polygon according to the protected points and the adjacent and high frequent accessed points that are selected from the accessing point database, then the algorithm calculates the polygon centroids; finally, the noises are added to the polygon centroids by the differential privacy method, and the polygon centroids replace the protected points, and then the algorithm constructs and issues the new trajectory data. The experiments show that the running time of the proposed algorithms is fast, the privacy protection of the scheme is effective and the data usability of the scheme is higher.

  18. Privacy and CHI : methodologies for studying privacy issues

    NARCIS (Netherlands)

    Patil, S.; Romero, N.A.; Karat, J.

    2006-01-01

    This workshop aims to reflect on methodologies to empirically study privacy issues related to advanced technology. The goal is to address methodological concerns by drawing upon both theoretical perspectives as well as practical experiences.

  19. DOD Security Cooperation: An Overview of Authorities and Issues

    Science.gov (United States)

    2016-08-23

    Syria, Ukraine .................................................................................................... 7 Global and Regional, Non... crisis intervention, and as an exit strategy for post-9/11 military campaigns. 9 To implement such concepts, DOD requested that Congress grant new...Africa, Iraq, Syria, Ukraine Congress has provided DOD with several authorities to support U.S. military operations or other military efforts in

  20. When Differential Privacy Meets Randomized Perturbation: A Hybrid Approach for Privacy-Preserving Recommender System

    KAUST Repository

    Liu, Xiao; Liu, An; Zhang, Xiangliang; Li, Zhixu; Liu, Guanfeng; Zhao, Lei; Zhou, Xiaofang

    2017-01-01

    result. However, none is designed for both hiding users’ private data and preventing privacy inference. To achieve this goal, we propose in this paper a hybrid approach for privacy-preserving recommender systems by combining differential privacy (DP

  1. Performing privacy in schools

    DEFF Research Database (Denmark)

    Lauritsen, Peter; Bøge, Ask Risom; Andersen, Lars Bo

    with technologies is carried out as well as observation is conducted. We obtain and present new knowledge about how surveillance is practiced in the interpersonal relations of students and teachers. References: Monahan, T., & Torres, R. D. (2009). Schools Under Surveillance: Cultures of Control in Public Education....... Rutgers University Press. Selwyn, N. (2010). Schools and Schooling in the Digital Age: A Critical Analysis. Routledge. Taylor, E. (2013). Surveillance Schools: Security, Discipline and Control in Contemporary Education. Palgrave Macmillan UK. Taylor, E., & Rooney, T. (2016). Surveillance Futures: Social......In this presentation we pursue the question: How is privacy performed and perceived in schools by children? Our aim is to investigate how the boundaries between public and private spheres are continuously performed in the formal setting of the classroom as well as in the social lives of students...

  2. Parasiteware: Unlocking Personal Privacy

    Directory of Open Access Journals (Sweden)

    Daniel B. Garrie

    2006-09-01

    Full Text Available Spyware presents a threat of privacy infringement to unassuming internet users irrespective of their country of citizenship. European legislation attempts to protect end-users from unethical processing of their personal data. Spyware technologies, however, skirts these laws and often break them in their entirety. Outlawing the spyware and strengthening the legal consent requirement to mine data are statutory solutions that can prevent spyware users from skirting the law. An internationally standardized technology education system for the judiciaries in Europe and the U.S. can help ensure that when spyware users do break the law, they cannot hide by escaping from one nation to another without being held accountable. Transnational improvements are necessary to remedy the global spyware epidemic.

  3. Defense Logistics: A Completed Comprehensive Strategy is Needed to Guide DOD’s In-Transit Visibility Efforts

    Science.gov (United States)

    2013-02-01

    Defense Logistics List of Abbreviations aRFID active radio frequency identification DOD Department of Defense RFID...The Navy and the Air Force each have their own Active Radio Frequency Identification ( aRFID ) Migration Program. These two programs are included...with the aRFID Program and the aRFID Infrastructure, respectively and are therefore not listed in the table. Appendix III: Comments from the

  4. Genetic privacy in sports: clearing the hurdles.

    Science.gov (United States)

    Callier, Shawneequa

    2012-12-01

    As genomic medicine continues to advance and inform clinical care, knowledge gained is likely to influence sports medicine and training practices. Susceptibility to injury, sudden cardiac failure, and other serious conditions may one day be tackled on a subclinical level through genetic testing programs. In addition, athletes may increasingly consider using genetic testing services to maximize their performance potential. This paper assesses the role of privacy and genetic discrimination laws that would apply to athletes who engage in genetic testing and the limits of these protections.

  5. Privacy Preserving Distributed Data Mining

    Data.gov (United States)

    National Aeronautics and Space Administration — Distributed data mining from privacy-sensitive multi-party data is likely to play an important role in the next generation of integrated vehicle health monitoring...

  6. Distributed privacy preserving data collection

    KAUST Repository

    Xue, Mingqiang; Papadimitriou, Panagiotis D.; Raï ssi, Chedy; Kalnis, Panos; Pung, Hungkeng

    2011-01-01

    an anonymized table by generalization of quasi-identifier attributes. The protocol employs cryptographic techniques such as homomorphic encryption, private information retrieval and secure multiparty computation to ensure the privacy goal in the process of data

  7. Privacy and the Connected Society

    DEFF Research Database (Denmark)

    Sørensen, Lene Tolstrup; Khajuria, Samant; Skouby, Knud Erik

    The Vision of the 5G enabled connected society is highly based on the evolution and implementation of Internet of Things. This involves, amongst others, a significant raise in devices, sensors and communication in pervasive interconnections as well as cooperation amongst devices and entities across...... the society. Enabling the vision of the connected society, researchers point in the direction of security and privacy as areas to challenge the vision. By use of the Internet of Things reference model as well as the vision of the connected society, this paper identifies privacy of the individual with respect...... to three selected areas: Shopping, connected cars and online gaming. The paper concludes that privacy is a complexity within the connected society vision and that thee is a need for more privacy use cases to shed light on the challenge....

  8. Librarians, Civil Liberties and Privacy.

    Science.gov (United States)

    Fielding, Derek

    1978-01-01

    A comparison of current civil liberties issues in Australia with the status of similar issues in Britain and the United States. Included are political affiliation of government employees, censorship, rights of the individual, privacy, and freedom of information. (JAB)

  9. Privacy Impact Assessment (PIA) Repository

    Data.gov (United States)

    Department of Veterans Affairs — This repository contains Privacy Impact Assessments (PIA) that have been vetted/approved. Section 208 of the Electronic Government Act of 2002 (E-Gov Act) requires...

  10. Factors and Predictors of Online Security and Privacy Behavior

    Directory of Open Access Journals (Sweden)

    Goran Bubaš

    2008-12-01

    Full Text Available Assumptions and habits regarding computer and Internet use are among the major factors which influence online privacy and security of Internet users. In our study a survey was performed on 312 subjects (college students who are Internet users with IT skills that investigated how assumptions and habits of Internet users are related to their online security and privacy. The following four factors of online security and privacy related behaviors were revealed in factor analysis: F1 – conscientiousness in the maintenance of the operating system, upgrading of the Internet browser and use of antivirus and antispyware programs; F2 –engagement in risky and careless online activities with lack of concern for personal online privacy; F3 – disbelief that privacy violations and security threats represent possible problems; F4 – lack of fear regarding potential privacy and security threats with no need for change in personal online behavior. Statistically significant correlations were found between some of the discovered factors on the one side, and criteria variables occurrence of malicious code (C1 and data loss on the home computer (C2 on the other. In addition, a regression analysis was performed which revealed that the potentially risky online behaviors of Internet users were associated with the two criteria variables. To properly interpret the results of correlation and regression analyses a conceptual model was developed of the potential causal relationships between the behavior of Internet users and their experiences with online security threats. An additional study was also performed which partly confirmed the conceptual model, as well as the factors of online security and privacy related behaviors.

  11. Privacy-preserving Identity Management

    OpenAIRE

    Milutinovic, Milica

    2015-01-01

    With the technological advances and the evolution of online services, user privacy is becoming a crucial issue in the modern day society. Privacy in the general sense refers to individuals’ ability to protect information about themselves and selectively present it to other entities. This concept is nowadays strongly affected by everyday practices that assume personal data disclosure, such as online shopping and participation in loyalty schemes. This makes it difficult for an individual to con...

  12. PRIVACY CONCERNS IN FACEBOOK SITE

    OpenAIRE

    Vandana Singh

    2014-01-01

    Today social networking sites play an important role and inexpensive way to maintain existing relationships and present oneself. However, the increasing use of online sites give rise to privacy concerns and risks. All Internet sites are also under attack from phishers, fraudsters, and spammers. They aim to steal user information and expose users to unwanted spam. They have so many resources at their disposal.This paper studies the awareness of college students regarding the privacy in Faceboo...

  13. Security and privacy in biometrics

    CERN Document Server

    Campisi, Patrizio

    2013-01-01

    This important text/reference presents the latest secure and privacy-compliant techniques in automatic human recognition. Featuring viewpoints from an international selection of experts in the field, the comprehensive coverage spans both theory and practical implementations, taking into consideration all ethical and legal issues. Topics and features: presents a unique focus on novel approaches and new architectures for unimodal and multimodal template protection; examines signal processing techniques in the encrypted domain, security and privacy leakage assessment, and aspects of standardizati

  14. Hacking Facebook Privacy and Security

    Science.gov (United States)

    2012-08-28

    REPORT Hacking Facebook Privacy and Security 14. ABSTRACT 16. SECURITY CLASSIFICATION OF: When people talk about hacking and social networks , they’re...12211 Research Triangle Park, NC 27709-2211 15. SUBJECT TERMS Facebook , Privacy, Security, Social Network Dr. Jeff Duffany (Advisor), Omar Galban...transmit personal information that many people that they dare not do it personally. FACEBOOK PLATFORM Facebook is a popular social networking

  15. Privacy concerns in smart cities

    OpenAIRE

    van Zoonen, Liesbet

    2016-01-01

    textabstractIn this paper a framework is constructed to hypothesize if and how smart city technologies and urban big data produce privacy concerns among the people in these cities (as inhabitants, workers, visitors, and otherwise). The framework is built on the basis of two recurring dimensions in research about people's concerns about privacy: one dimensions represents that people perceive particular data as more personal and sensitive than others, the other dimension represents that people'...

  16. 78 FR 5784 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2013-01-28

    ... records. SUMMARY: The Defense Finance and Accounting Service proposes to alter a system of records in its.... FOR FURTHER INFORMATION CONTACT: Mr. Gregory Outlaw, Defense Finance and Accounting Service, Freedom of Information/Privacy Act Program Manager, Corporate Communications, DFAS-HKC/IN, 8899 E. 56th...

  17. 78 FR 14280 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2013-03-05

    ... Records. SUMMARY: The Defense Finance and Accounting Service proposes to alter a system of records notice... information. FOR FURTHER INFORMATION CONTACT: Mr. Gregory L. Outlaw, Defense Finance and Accounting Service, Freedom of Information/Privacy Act Program Manager, Corporate Communications, DFAS-HKC/IN, 8899 E. 56th...

  18. 78 FR 41919 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2013-07-12

    .... SUMMARY: The Defense Finance and Accounting Service proposes to alter a system of records, T7340c... identifiers or contact information. FOR FURTHER INFORMATION CONTACT: Mr. Gregory L. Outlaw, Defense Finance and Accounting Service, Freedom of Information/Privacy Act Program Manager, Corporate Communications...

  19. 78 FR 14281 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2013-03-05

    ... Finance and Accounting Service, Freedom of Information/Privacy Act Program Manager, Corporate... Records. SUMMARY: The Defense Finance and Accounting Service proposes to amend a system of records in its.... FOR FURTHER INFORMATION CONTACT: Mr. Gregory L. Outlaw, Defense Finance and Accounting Service...

  20. 78 FR 14286 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2013-03-05

    ... Records. SUMMARY: The Defense Finance and Accounting Service proposes to amend a system of records in its... information. FOR FURTHER INFORMATION CONTACT: Mr. Gregory L. Outlaw, Defense Finance and Accounting Service, Freedom of Information/Privacy Act Program Manager, Corporate Communications, DFAS-HKC/IN, 8899 E. 56th...

  1. 78 FR 14285 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2013-03-05

    ... Records. SUMMARY: The Defense Finance and Accounting Service proposes to alter a system of records in its.... FOR FURTHER INFORMATION CONTACT: Mr. Gregory L. Outlaw, Defense Finance and Accounting Service, Freedom of Information/Privacy Act Program Manager, Corporate Communications, DFAS-HKC/IN, 8899 E. 56th...

  2. 78 FR 14283 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2013-03-05

    ... Finance and Accounting Service, Freedom of Information/Privacy Act Program Manager, Corporate... a system of records. SUMMARY: The Defense Finance and Accounting Service proposes to alter a system... identifiers or contact information. FOR FURTHER INFORMATION CONTACT: Mr. Gregory L. Outlaw, Defense Finance...

  3. 77 FR 77049 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2012-12-31

    ..., Air Force Privacy Act Office, Office of Warfighting Integration and Chief Information officer, ATTN... of 1974 (5 U.S.C. 552a), as amended, which requires the submission of a new or altered system report...). Reason The Innovative Development through Employee Awareness (IDEA) Program Data System (IPDS) has been...

  4. A Flow-Sensitive Analysis of Privacy Properties

    DEFF Research Database (Denmark)

    Nielson, Hanne Riis; Nielson, Flemming

    2007-01-01

    that information I send to some service never is leaked to another service? - unless I give my permission? We shall develop a static program analysis for the pi- calculus and show how it can be used to give privacy guarantees like the ones requested above. The analysis records the explicit information flow...

  5. 76 FR 81910 - Abolishment of Privacy Act System of Records

    Science.gov (United States)

    2011-12-29

    ... Program Manager, USDA, Forest Service, Office of Safety and Occupational and Health, 1400 Independence... Management Handbook (FSH) 6209.11. This system is abolished and removed from the inventory of the USDA System... DEPARTMENT OF AGRICULTURE Office of the Secretary Abolishment of Privacy Act System of Records...

  6. Future Health and Economic Impact of Comprehensive Tobacco Control in DoD: A Microsimulation Approach.

    Science.gov (United States)

    Yang, Wenya; Zou, Quan; Tan, Eleonora; Watkins, Lachlan; Beronja, Kaleigh; Hogan, Paul F; Elenberg, Kimberly

    2018-01-01

    decrease the prevalence and lifetime medical cost of tobacco use. If the smoking prevalence among Prime beneficiaries could reach the Healthy People 2020 goal of 12%, through additional measures, the lifetime savings could mount to $2.08 billion. To achieve future savings, DoD needs to pay close attention to program design and implementation issues of any additional tobacco control initiatives. © Association of Military Surgeons of the United States 2017. All rights reserved. For permissions, please e-mail: journals.permissions@oup.com.

  7. Counterfeit Parts: DOD Needs to Improve Reporting and Oversight to Reduce Supply Chain Risk

    Science.gov (United States)

    2016-02-01

    agencies and contractors we met with stated that they have encountered counterfeit parts less frequently in the DOD supply chain , in part, because...the DOD supply chain as a method to prevent further counterfeiting.22 DOD and industry officials noted that timely reporting of...COUNTERFEIT PARTS DOD Needs to Improve Reporting and Oversight to Reduce Supply Chain Risk Report to Congressional Committees

  8. 32 CFR 310.50 - Lost, stolen, or compromised information.

    Science.gov (United States)

    2010-07-01

    ... Official for Privacy within 24 hours of discovering that a breach of personally identifiable information... Privacy Office of the breach within 48 hours upon being notified that a loss, theft, or compromise has... (CONTINUED) PRIVACY PROGRAM DOD PRIVACY PROGRAM Privacy Act Violations § 310.50 Lost, stolen, or compromised...

  9. Privacy in the Genomic Era.

    Science.gov (United States)

    Naveed, Muhammad; Ayday, Erman; Clayton, Ellen W; Fellay, Jacques; Gunter, Carl A; Hubaux, Jean-Pierre; Malin, Bradley A; Wang, Xiaofeng

    2015-09-01

    Genome sequencing technology has advanced at a rapid pace and it is now possible to generate highly-detailed genotypes inexpensively. The collection and analysis of such data has the potential to support various applications, including personalized medical services. While the benefits of the genomics revolution are trumpeted by the biomedical community, the increased availability of such data has major implications for personal privacy; notably because the genome has certain essential features, which include (but are not limited to) (i) an association with traits and certain diseases, (ii) identification capability (e.g., forensics), and (iii) revelation of family relationships. Moreover, direct-to-consumer DNA testing increases the likelihood that genome data will be made available in less regulated environments, such as the Internet and for-profit companies. The problem of genome data privacy thus resides at the crossroads of computer science, medicine, and public policy. While the computer scientists have addressed data privacy for various data types, there has been less attention dedicated to genomic data. Thus, the goal of this paper is to provide a systematization of knowledge for the computer science community. In doing so, we address some of the (sometimes erroneous) beliefs of this field and we report on a survey we conducted about genome data privacy with biomedical specialists. Then, after characterizing the genome privacy problem, we review the state-of-the-art regarding privacy attacks on genomic data and strategies for mitigating such attacks, as well as contextualizing these attacks from the perspective of medicine and public policy. This paper concludes with an enumeration of the challenges for genome data privacy and presents a framework to systematize the analysis of threats and the design of countermeasures as the field moves forward.

  10. Privacy in the Genomic Era

    Science.gov (United States)

    NAVEED, MUHAMMAD; AYDAY, ERMAN; CLAYTON, ELLEN W.; FELLAY, JACQUES; GUNTER, CARL A.; HUBAUX, JEAN-PIERRE; MALIN, BRADLEY A.; WANG, XIAOFENG

    2015-01-01

    Genome sequencing technology has advanced at a rapid pace and it is now possible to generate highly-detailed genotypes inexpensively. The collection and analysis of such data has the potential to support various applications, including personalized medical services. While the benefits of the genomics revolution are trumpeted by the biomedical community, the increased availability of such data has major implications for personal privacy; notably because the genome has certain essential features, which include (but are not limited to) (i) an association with traits and certain diseases, (ii) identification capability (e.g., forensics), and (iii) revelation of family relationships. Moreover, direct-to-consumer DNA testing increases the likelihood that genome data will be made available in less regulated environments, such as the Internet and for-profit companies. The problem of genome data privacy thus resides at the crossroads of computer science, medicine, and public policy. While the computer scientists have addressed data privacy for various data types, there has been less attention dedicated to genomic data. Thus, the goal of this paper is to provide a systematization of knowledge for the computer science community. In doing so, we address some of the (sometimes erroneous) beliefs of this field and we report on a survey we conducted about genome data privacy with biomedical specialists. Then, after characterizing the genome privacy problem, we review the state-of-the-art regarding privacy attacks on genomic data and strategies for mitigating such attacks, as well as contextualizing these attacks from the perspective of medicine and public policy. This paper concludes with an enumeration of the challenges for genome data privacy and presents a framework to systematize the analysis of threats and the design of countermeasures as the field moves forward. PMID:26640318

  11. The privacy coach: Supporting customer privacy in the internet of things

    NARCIS (Netherlands)

    Broenink, E.G.; Hoepman, J.H.; Hof, C. van 't; Kranenburg, R. van; Smits, D.; Wisman, T.

    2010-01-01

    The Privacy Coach is an application running on a mobile phone that supports customers in making privacy decisions when confronted with RFID tags. The approach we take to increase customer privacy is a radical departure from the mainstream research efforts that focus on implementing privacy enhancing

  12. 75 FR 81205 - Privacy Act: Revision of Privacy Act Systems of Records

    Science.gov (United States)

    2010-12-27

    ... DEPARTMENT OF AGRICULTURE Office of the Secretary Privacy Act: Revision of Privacy Act Systems of Records AGENCY: Office of the Secretary, USDA. ACTION: Notice to Revise Privacy Act Systems of Records... two Privacy Act Systems of Records entitled ``Information on Persons Disqualified from the...

  13. 76 FR 67763 - Privacy Act of 1974; Privacy Act System of Records

    Science.gov (United States)

    2011-11-02

    ... NATIONAL AERONAUTICS AND SPACE ADMINISTRATION [Notice (11-109)] Privacy Act of 1974; Privacy Act... proposed revisions to an existing Privacy Act system of records. SUMMARY: Pursuant to the provisions of the Privacy Act of 1974 (5 U.S.C. 552a), the National Aeronautics and Space Administration is issuing public...

  14. 76 FR 64114 - Privacy Act of 1974; Privacy Act System of Records

    Science.gov (United States)

    2011-10-17

    ... NATIONAL AERONAUTICS AND SPACE ADMINISTRATION [Notice (11-093)] Privacy Act of 1974; Privacy Act... proposed revisions to an existing Privacy Act system of records. SUMMARY: Pursuant to the provisions of the Privacy Act of 1974 (5 U.S.C. 552a), the National Aeronautics and Space Administration is issuing public...

  15. 76 FR 64112 - Privacy Act of 1974; Privacy Act System of Records Appendices

    Science.gov (United States)

    2011-10-17

    ... NATIONAL AERONAUTICS AND SPACE ADMINISTRATION [Notice (11-091)] Privacy Act of 1974; Privacy Act...: Revisions of NASA Appendices to Privacy Act System of Records. SUMMARY: Notice is hereby given that NASA is... Privacy Act of 1974. This notice publishes those amendments as set forth below under the caption...

  16. 78 FR 40515 - Privacy Act of 1974; Privacy Act System of Records

    Science.gov (United States)

    2013-07-05

    ... NATIONAL AERONAUTICS AND SPACE ADMINISTRATION [Notice 13-071] Privacy Act of 1974; Privacy Act System of Records AGENCY: National Aeronautics and Space Administration (NASA). ACTION: Notice of Privacy Act system of records. SUMMARY: Each Federal agency is required by the Privacy Act of 1974 to publish...

  17. 78 FR 77503 - Privacy Act of 1974; Privacy Act System of Records

    Science.gov (United States)

    2013-12-23

    ... NATIONAL AERONAUTICS AND SPACE ADMINISTRATION [Notice 13-149] Privacy Act of 1974; Privacy Act... proposed revisions to existing Privacy Act systems of records. SUMMARY: Pursuant to the provisions of the Privacy Act of 1974 (5 U.S.C. 552a), the National Aeronautics and Space Administration is issuing public...

  18. 77 FR 69898 - Privacy Act of 1974; Privacy Act System of Records

    Science.gov (United States)

    2012-11-21

    ... NATIONAL AERONAUTICS AND SPACE ADMINISTRATION [Notice 12-100] Privacy Act of 1974; Privacy Act... proposed revisions to an existing Privacy Act system of records. SUMMARY: Pursuant to the provisions of the Privacy Act of 1974 (5 U.S.C. 552a), the National Aeronautics and Space Administration is issuing public...

  19. Privacy Implications of Surveillance Systems

    DEFF Research Database (Denmark)

    Thommesen, Jacob; Andersen, Henning Boje

    2009-01-01

    This paper presents a model for assessing the privacy „cost‟ of a surveillance system. Surveillance systems collect and provide personal information or observations of people by means of surveillance technologies such as databases, video or location tracking. Such systems can be designed for vari......This paper presents a model for assessing the privacy „cost‟ of a surveillance system. Surveillance systems collect and provide personal information or observations of people by means of surveillance technologies such as databases, video or location tracking. Such systems can be designed...... for various purposes, even as a service for those being observed, but in any case they will to some degree invade their privacy. The model provided here can indicate how invasive any particular system may be – and be used to compare the invasiveness of different systems. Applying a functional approach......, the model is established by first considering the social function of privacy in everyday life, which in turn lets us determine which different domains will be considered as private, and finally identify the different types of privacy invasion. This underlying model (function – domain – invasion) then serves...

  20. 76 FR 21708 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2011-04-18

    ... Appendix I to OMB Circular No. A-130, ``Federal Agency Responsibilities for Maintaining Records About... Instruction (DoDI) 1400.25-V810, DoD Civilian Personnel Management System: Injury Compensation; DoDI 1400.25-V850, DoD Civilian Personnel Management System: Unemployment Compensation; DoD 1400.25-M, DoD Civilian...

  1. Internet privacy options for adequate realisation

    CERN Document Server

    2013-01-01

    A thorough multidisciplinary analysis of various perspectives on internet privacy was published as the first volume of a study, revealing the results of the achatech project "Internet Privacy - A Culture of Privacy and Trust on the Internet." The second publication from this project presents integrated, interdisciplinary options for improving privacy on the Internet utilising a normative, value-oriented approach. The ways in which privacy promotes and preconditions fundamental societal values and how privacy violations endanger the flourishing of said values are exemplified. The conditions which must be fulfilled in order to achieve a culture of privacy and trust on the internet are illuminated. This volume presents options for policy-makers, educators, businesses and technology experts how to facilitate solutions for more privacy on the Internet and identifies further research requirements in this area.

  2. CARAVAN: Providing Location Privacy for VANET

    National Research Council Canada - National Science Library

    Sampigethaya, Krishna; Huang, Leping; Li, Mingyan; Poovendran, Radha; Matsuura, Kanta; Sezaki, Kaoru

    2005-01-01

    .... This type of tracking leads to threats on the location privacy of the vehicle's user. In this paper, we study the problem of providing location privacy in VANET by allowing vehicles to prevent tracking of their broadcast communications...

  3. SIED, a Data Privacy Engineering Framework

    OpenAIRE

    Mivule, Kato

    2013-01-01

    While a number of data privacy techniques have been proposed in the recent years, a few frameworks have been suggested for the implementation of the data privacy process. Most of the proposed approaches are tailored towards implementing a specific data privacy algorithm but not the overall data privacy engineering and design process. Therefore, as a contribution, this study proposes SIED (Specification, Implementation, Evaluation, and Dissemination), a conceptual framework that takes a holist...

  4. Privacy and Data-Based Research

    OpenAIRE

    Ori Heffetz; Katrina Ligett

    2013-01-01

    What can we, as users of microdata, formally guarantee to the individuals (or firms) in our dataset, regarding their privacy? We retell a few stories, well-known in data-privacy circles, of failed anonymization attempts in publicly released datasets. We then provide a mostly informal introduction to several ideas from the literature on differential privacy, an active literature in computer science that studies formal approaches to preserving the privacy of individuals in statistical databases...

  5. PriBots: Conversational Privacy with Chatbots

    OpenAIRE

    Harkous, Hamza; Fawaz, Kassem; Shin, Kang G.; Aberer, Karl

    2016-01-01

    Traditional mechanisms for delivering notice and enabling choice have so far failed to protect users’ privacy. Users are continuously frustrated by complex privacy policies, unreachable privacy settings, and a multitude of emerging standards. The miniaturization trend of smart devices and the emergence of the Internet of Things (IoTs) will exacerbate this problem further. In this paper, we propose Conversational Privacy Bots (PriBots) as a new way of delivering notice and choice through a two...

  6. Tactical Aircraft. DOD Needs a Joint and Integrated Investment Strategy

    National Research Council Canada - National Science Library

    2007-01-01

    .... DOD has already incurred substantial cost and schedule overruns in its acquisition of new systems, and further delays could require billions of dollars in additional investments to keep legacy...

  7. DOD Review of Flight Safety Critical Threaded Fasteners and Components

    National Research Council Canada - National Science Library

    Granetto, Paul

    2001-01-01

    This audit was conducted in response to allegations made to the Defense Hotline in October 1999, that the DoD acquisition and quality assurance procedures allowed significant amounts of dimensionally...

  8. Logistics: DoD International Personal Property Shipment Rates

    National Research Council Canada - National Science Library

    2002-01-01

    .... The allegation claimed that under current procedures Code of Service 4 DoD was paying excessive costs for ocean transportation on household goods shipments because a third party company purchased...

  9. DOD Military Retirement Health Benefits Liability for FY 1997

    National Research Council Canada - National Science Library

    1998-01-01

    ...) and the Federal Financial Management Act of 1994 (Public Law 103-356). Public Law 103-356 requires DoD and other Government agencies to prepare consolidated financial statements for FY 1996 and each succeeding year...

  10. Sharing Year 2000 Testing Information on DOD Information Technology Systems

    National Research Council Canada - National Science Library

    1998-01-01

    The audit objective was to determine whether planning for year 2000 testing is adequate to ensure that mission critical DoD information technology systems will continue to operate properly after the year 2000...

  11. Department of Defense (DOD) Military Casualty/Wounded Warrior

    Data.gov (United States)

    Social Security Administration — SSA initiated this agreement with the Department of Defense (DOD) to transmit to SSA information that will identify military personnel injured or taken ill while in...

  12. DoD Global Information Grid Mission Assurance

    National Research Council Canada - National Science Library

    Bargar, Anthony

    2008-01-01

    ... for espionage and the criminal theft of data. GIG mission assurance works to ensure the DoD is able to accomplish its critical missions when networks, services, or information are unavailable, degraded, or distrusted...

  13. DoD Workshop on Southeast Regional Planning and Sustainability

    National Research Council Canada - National Science Library

    Berke, Philip; Brown, Robert; Elliott, Michael; Friday, Paul; Holst, Robert; Weiss, Jonathan; Wilkens, R. N

    2007-01-01

    These proceedings encompass outcomes from the DoD Southeast Regional Planning and Sustainability Workshop, which took place in April 2007, and reflect the opinions and views of workshop participants...

  14. Proposed DoD Guidelines for Implementation of a Web-Based Joint IETM Architecture (JIA) to Assure the Interoperability of DoD IETMs

    National Research Council Canada - National Science Library

    Jorgensen, Eric L

    1999-01-01

    This Paper presents preliminary guidelines intended to serve as input to a planned DoD Handbook for the Acquisition and Deployment of DoD IETMs with the specific purpose of assuring interoperability...

  15. Privacy-Preserving Trajectory Collection

    DEFF Research Database (Denmark)

    Gidofalvi, Gyozo; Xuegang, Huang; Pedersen, Torben Bach

    2008-01-01

    In order to provide context--aware Location--Based Services, real location data of mobile users must be collected and analyzed by spatio--temporal data mining methods. However, the data mining methods need precise location data, while the mobile users want to protect their location privacy....... To remedy this situation, this paper first formally defines novel location privacy requirements. Then, it briefly presents a system for privacy--preserving trajectory collection that meets these requirements. The system is composed of an untrusted server and clients communicating in a P2P network. Location...... data is anonymized in the system using data cloaking and data swapping techniques. Finally, the paper empirically demonstrates that the proposed system is effective and feasible....

  16. Privacy-preserving distributed clustering

    DEFF Research Database (Denmark)

    Erkin, Zekeriya; Veugen, Thijs; Toft, Tomas

    2013-01-01

    with any other entity, including the service provider. Such privacy concerns lead to trust issues between entities, which clearly damages the functioning of the service and even blocks cooperation between entities with similar data sets. To enable joint efforts with private data, we propose a protocol......, or in some cases, information from different databases is pooled to enrich the data so that the merged database can improve the clustering effort. However, in either case, the content of the database may be privacy sensitive and/or commercially valuable such that the owners may not want to share their data...... provider with computations. Experimental results clearly indicate that the work we present is an efficient way of deploying a privacy-preserving clustering algorithm in a distributed manner....

  17. Privacy in the Sharing Economy

    DEFF Research Database (Denmark)

    Ranzini, Giulia; Etter, Michael; Lutz, Christoph

    ’s digital services through providing recommendations to Europe’s institutions. The initial stage of this research project involves a set of three literature reviews of the state of research on three core topics in relation to the sharing economy: participation (1), privacy (2), and power (3). This piece...... is a literature review on the topic of privacy. It addresses key privacy challenges for different stakeholders in the sharing economy. Throughout, we use the term "consumers" to refer to users on the receiving end (e.g., Airbnb guests, Uber passengers), "providers" to refer to users on the providing end (e.......g., Airbnb hosts, Uber drivers) and "platforms" to refer to the mediating sites, apps and infrastructures matching consumers and providers (e.g., Airbnb, Uber)....

  18. Context-Aware Generative Adversarial Privacy

    Directory of Open Access Journals (Sweden)

    Chong Huang

    2017-12-01

    Full Text Available Preserving the utility of published datasets while simultaneously providing provable privacy guarantees is a well-known challenge. On the one hand, context-free privacy solutions, such as differential privacy, provide strong privacy guarantees, but often lead to a significant reduction in utility. On the other hand, context-aware privacy solutions, such as information theoretic privacy, achieve an improved privacy-utility tradeoff, but assume that the data holder has access to dataset statistics. We circumvent these limitations by introducing a novel context-aware privacy framework called generative adversarial privacy (GAP. GAP leverages recent advancements in generative adversarial networks (GANs to allow the data holder to learn privatization schemes from the dataset itself. Under GAP, learning the privacy mechanism is formulated as a constrained minimax game between two players: a privatizer that sanitizes the dataset in a way that limits the risk of inference attacks on the individuals’ private variables, and an adversary that tries to infer the private variables from the sanitized dataset. To evaluate GAP’s performance, we investigate two simple (yet canonical statistical dataset models: (a the binary data model; and (b the binary Gaussian mixture model. For both models, we derive game-theoretically optimal minimax privacy mechanisms, and show that the privacy mechanisms learned from data (in a generative adversarial fashion match the theoretically optimal ones. This demonstrates that our framework can be easily applied in practice, even in the absence of dataset statistics.

  19. Sexiled: Privacy Acquisition Strategies of College Roommates

    Science.gov (United States)

    Erlandson, Karen

    2014-01-01

    This study sought to understand how roommates make privacy bids in college residence halls. The results indicate that privacy for sexual activity is a problem for students living in college residence halls, as almost all participants (82%) reported having dealt with this issue. Two sets of responses were collected and analyzed: privacy acquisition…

  20. 31 CFR 0.216 - Privacy Act.

    Science.gov (United States)

    2010-07-01

    ... 31 Money and Finance: Treasury 1 2010-07-01 2010-07-01 false Privacy Act. 0.216 Section 0.216... RULES OF CONDUCT Rules of Conduct § 0.216 Privacy Act. Employees involved in the design, development, operation, or maintenance of any system of records or in maintaining records subject to the Privacy Act of...

  1. 24 CFR 3280.107 - Interior privacy.

    Science.gov (United States)

    2010-04-01

    ... 24 Housing and Urban Development 5 2010-04-01 2010-04-01 false Interior privacy. 3280.107 Section 3280.107 Housing and Urban Development Regulations Relating to Housing and Urban Development (Continued... privacy. Bathroom and toilet compartment doors shall be equipped with a privacy lock. ...

  2. Context-Aware Generative Adversarial Privacy

    Science.gov (United States)

    Huang, Chong; Kairouz, Peter; Chen, Xiao; Sankar, Lalitha; Rajagopal, Ram

    2017-12-01

    Preserving the utility of published datasets while simultaneously providing provable privacy guarantees is a well-known challenge. On the one hand, context-free privacy solutions, such as differential privacy, provide strong privacy guarantees, but often lead to a significant reduction in utility. On the other hand, context-aware privacy solutions, such as information theoretic privacy, achieve an improved privacy-utility tradeoff, but assume that the data holder has access to dataset statistics. We circumvent these limitations by introducing a novel context-aware privacy framework called generative adversarial privacy (GAP). GAP leverages recent advancements in generative adversarial networks (GANs) to allow the data holder to learn privatization schemes from the dataset itself. Under GAP, learning the privacy mechanism is formulated as a constrained minimax game between two players: a privatizer that sanitizes the dataset in a way that limits the risk of inference attacks on the individuals' private variables, and an adversary that tries to infer the private variables from the sanitized dataset. To evaluate GAP's performance, we investigate two simple (yet canonical) statistical dataset models: (a) the binary data model, and (b) the binary Gaussian mixture model. For both models, we derive game-theoretically optimal minimax privacy mechanisms, and show that the privacy mechanisms learned from data (in a generative adversarial fashion) match the theoretically optimal ones. This demonstrates that our framework can be easily applied in practice, even in the absence of dataset statistics.

  3. 49 CFR 10.13 - Privacy Officer.

    Science.gov (United States)

    2010-10-01

    ... INDIVIDUALS General § 10.13 Privacy Officer. (a) To assist with implementation, evaluation, and administration issues, the Chief Information Officer appoints a principal coordinating official with the title Privacy... 49 Transportation 1 2010-10-01 2010-10-01 false Privacy Officer. 10.13 Section 10.13...

  4. Enhancing Privacy for Digital Rights Management

    NARCIS (Netherlands)

    Petkovic, M.; Conrado, C.; Schrijen, G.J.; Jonker, Willem

    2007-01-01

    This chapter addresses privacy issues in DRM systems. These systems provide a means of protecting digital content, but may violate the privacy of users in that the content they purchase and their actions in the system can be linked to specific users. The chapter proposes a privacy-preserving DRM

  5. Access to Information and Privacy | IDRC - International ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    As a Crown corporation, IDRC is subject to Canada's laws on access to information and privacy protection. The following resources will help you learn more about IDRC and the access to information and privacy acts, including instructions for submitting an access to information or privacy act (ATIP) request. IDRC and ATIP ...

  6. B2B Models for DoD Acquisition

    Science.gov (United States)

    2007-07-30

    product design, demand forecasting, asset management, and sales and marketing plans 35 Proctor & Gamble’s Private Industrial Network SOURCE: Laudon... B2B Models for DoD Acquisition 30 July 2007 by Magdi N. Kamel, Associate Professor Graduate School of Operational & Information Sciences...number. 1. REPORT DATE 30 JUL 2007 2. REPORT TYPE 3. DATES COVERED 00-00-2007 to 00-00-2007 4. TITLE AND SUBTITLE B2B Models for DoD

  7. Addressing Counterfeit Parts in the DoD Supply Chain

    Science.gov (United States)

    2014-03-01

    property rights to that part. Franchised distributor Distributor with which OCM has a contractual agreement to buy , stock, repackage, sell, and...because the DoD is not the largest buyer of microelectronics, the private sector market must buy into DNA tagging in order for manufacturers to include...tacitly acknowledged that “it is impossible to eliminate all risk of counterfeit in every system that the DoD buys or supports” (p. 3). Thus, Metzger

  8. Smartdata privacy meets evolutionary robotics

    CERN Document Server

    Harvey, Inman; Tomko, George

    2013-01-01

    Privacy by Design and the Promise of SmartData.- SmartData: the Need, the Goal and the Challenge.- Perspectives on Artificial Intelligence.- Context dependent information processing entails scale-free dynamics.- Philosophy and SmartData.- Relevance Realization and the Neurodynamics and Neural Connectivity of General Intelligence.- What Matters: Real Bodies and Virtual Worlds.- The development of autonomous virtual agents.- Patterns of Attractors in the "Brain"".- A Privacy-Enabled Mobile Computing Model Using Intelligent Cloud-Based Services.- Unconstraint the Population: the Benefits of Horiz

  9. Location Privacy with Randomness Consistency

    Directory of Open Access Journals (Sweden)

    Wu Hao

    2016-10-01

    Full Text Available Location-Based Social Network (LBSN applications that support geo-location-based posting and queries to provide location-relevant information to mobile users are increasingly popular, but pose a location-privacy risk to posts. We investigated existing LBSNs and location privacy mechanisms, and found a powerful potential attack that can accurately locate users with relatively few queries, even when location data is well secured and location noise is applied. Our technique defeats previously proposed solutions including fake-location detection and query rate limits.

  10. Privacy context model for dynamic privacy adaptation in ubiquitous computing

    NARCIS (Netherlands)

    Schaub, Florian; Koenings, Bastian; Dietzel, Stefan; Weber, M.; Kargl, Frank

    Ubiquitous computing is characterized by the merger of physical and virtual worlds as physical artifacts gain digital sensing, processing, and communication capabilities. Maintaining an appropriate level of privacy in the face of such complex and often highly dynamic systems is challenging. We argue

  11. Privacy, confidentiality and automated health information systems.

    Science.gov (United States)

    Vuori, H

    1977-12-01

    Professor Vuori's paper, first presented at the fourth Medico-legal Conference in Prague in the spring of this year, deals with the problem of the maintenance of confidentiality in computerized health records. Although more and more information is required, the hardware of the computer systems is so sophisticated that it would be very expensive indeed to 'break in' and steal from a modern data bank. Those concerned with programming computers are becoming more aware of their responsibilities concerning confidentiality and privacy, to the extent that a legal code of ethics for programmers is being formulated. They are also aware that the most sensitive of all relationships--the doctor-patient relationship--could be in danger if they failed to maintain high standards of integrity. An area of danger is where administrative boundaries between systems must be crossed--say between those of health and employment. Protection of privacy must be ensured by releasing full information about the type of data being stored, and by maintaining democratic control over the establishment of information systems.

  12. The Regulatory Framework for Privacy and Security

    Science.gov (United States)

    Hiller, Janine S.

    The internet enables the easy collection of massive amounts of personally identifiable information. Unregulated data collection causes distrust and conflicts with widely accepted principles of privacy. The regulatory framework in the United States for ensuring privacy and security in the online environment consists of federal, state, and self-regulatory elements. New laws have been passed to address technological and internet practices that conflict with privacy protecting policies. The United States and the European Union approaches to privacy differ significantly, and the global internet environment will likely cause regulators to face the challenge of balancing privacy interests with data collection for many years to come.

  13. Adding Query Privacy to Robust DHTs

    DEFF Research Database (Denmark)

    Backes, Michael; Goldberg, Ian; Kate, Aniket

    2011-01-01

    intermediate peers that (help to) route the queries towards their destinations. In this paper, we satisfy this requirement by presenting an approach for providing privacy for the keys in DHT queries. We use the concept of oblivious transfer (OT) in communication over DHTs to preserve query privacy without...... of obtaining query privacy over robust DHTs. Finally, we compare the performance of our privacy-preserving protocols with their more privacy-invasive counterparts. We observe that there is no increase in the message complexity and only a small overhead in the computational complexity....

  14. Test Program Set (TPS) Lab

    Data.gov (United States)

    Federal Laboratory Consortium — The ARDEC TPS Laboratory provides an organic Test Program Set (TPS) development, maintenance, and life cycle management capability for DoD LCMC materiel developers....

  15. Conservation Law Enforcement Program Standardization

    National Research Council Canada - National Science Library

    Rogers, Stan

    2004-01-01

    The ultimate goal of standardization is to develop a safe and effective program that is recognized within the USAF, DoD, and by other Federal and state law enforcement agencies, and the general public...

  16. Student Data Privacy Communications Toolkit

    Science.gov (United States)

    Foundation for Excellence in Education, 2016

    2016-01-01

    Parents expect school districts and schools to keep their children safe while they are in school. That expectation of safety and security also extends to the protection of their children's learning data. Therefore, it is critical that school districts and schools are open and transparent about their student data privacy practices, and that those…

  17. Privacy proof in the cloud

    NARCIS (Netherlands)

    Jessen, Veerle; Weigand, Hans; Mouratidis, Haris

    Cloud computing has been a frequently researched subject as it brings many advantages, such as the ability to store data remotely and scale rapidly, but also comes with several issues, including privacy, trust and security. The decision whether it is best to go `into the cloud' or to `stay inside'

  18. Patient privacy and social media.

    Science.gov (United States)

    Hader, Amy L; Brown, Evan D

    2010-08-01

    Healthcare providers using social media must remain mindful of professional boundaries and patients' privacy rights. Facebook and other online postings must comply with the Health Insurance Portability and Accountability Act of 1996 (HIPAA), applicable facility policy, state law, and AANA's Code of Ethics.

  19. Facebook: When Education Meets Privacy

    Science.gov (United States)

    Bruneel, Steven; De Wit, Kurt; Verhoeven, Jef C.; Elen, Jan

    2013-01-01

    The use of social networking sites (SNSs) has become commonplace amongst students. In this research, we aim to shed light upon the educational use and privacy issues on Facebook from the perspective of role theory and reference group theory. 15 bachelor students of the University of Leuven (KU Leuven) in Flanders, Belgium, were interviewed in…

  20. Privacy and Security: A Bibliography.

    Science.gov (United States)

    Computer and Business Equipment Manufacturers Association, Washington, DC.

    Compiled at random from many sources, this bibliography attempts to cite as many publications concerning privacy and security as are available. The entries are organized under seven headings: (1) systems security, technical security, clearance of personnel, (2) corporate physical security, (3) administrative security, (4) miscellaneous--privacy…

  1. Privacy in Online Social Networks

    NARCIS (Netherlands)

    Beye, Michael; Jeckmans, Arjan; Erkin, Zekeriya; Erkin, Zekeriya; Hartel, Pieter H.; Lagendijk, Reginald; Tang, Qiang; Abraham, A.

    Online Social Networks (OSNs) have become part of daily life for millions of users. Users building explicit networks that represent their social relationships and often share a wealth of personal information to their own benefit. The potential privacy risks of such behavior are often underestimated

  2. The European Approach to Privacy

    NARCIS (Netherlands)

    van Hoboken, J.

    2014-01-01

    This paper critically assesses the character of European (Union’s) privacy law and policy in the field of online media and electronic communications. Contrary to current understanding, this field of law is more fragmented and ill-developed than is often assumed, in particular by those discussing

  3. Biobanking and Privacy in India.

    Science.gov (United States)

    Chaturvedi, Sachin; Srinivas, Krishna Ravi; Muthuswamy, Vasantha

    2016-03-01

    Biobank-based research is not specifically addressed in Indian statutory law and therefore Indian Council for Medical Research guidelines are the primary regulators of biobank research in India. The guidelines allow for broad consent and for any level of identification of specimens. Although privacy is a fundamental right under the Indian Constitution, courts have limited this right when it conflicts with other rights or with the public interest. Furthermore, there is no established privacy test or actionable privacy right in the common law of India. In order to facilitate biobank-based research, both of these lacunae should be addressed by statutory law specifically addressing biobanking and more directly addressing the accompanying privacy concerns. A biobank-specific law should be written with international guidelines in mind, but harmonization with other laws should not be attempted until after India has created a law addressing biobank research within the unique legal and cultural environment of India. © 2016 American Society of Law, Medicine & Ethics.

  4. 78 FR 46256 - Privacy Act

    Science.gov (United States)

    2013-07-31

    ... FEDERAL ELECTION COMMISSION 11 CFR Part 1 Privacy Act CFR Correction In Title 11 of the Code of Federal Regulations, revised as of January 1, 2012, on page 5, in Sec. 1.2, the words ``95 and 96 of the Internal Revenue Code of 1954.'' are added at the end of the definition of Act. [FR Doc. 2013-18535 Filed 7...

  5. Privacy concerns in smart cities

    NARCIS (Netherlands)

    E.A. van Zoonen (Liesbet)

    2016-01-01

    textabstractIn this paper a framework is constructed to hypothesize if and how smart city technologies and urban big data produce privacy concerns among the people in these cities (as inhabitants, workers, visitors, and otherwise). The framework is built on the basis of two recurring dimensions in

  6. Protecting Your Child's Privacy Online

    Science.gov (United States)

    ... Keeping Up With Kids' Apps infographic Kids and Computer Security Kids and Mobile Phones Kids and Socializing Online ... email Looking for business guidance on privacy and ... The Federal Trade Commission (FTC) is the nation’s consumer protection agency. The FTC works to prevent fraudulent, deceptive ...

  7. Bridging the transatlantic divide in privacy

    Directory of Open Access Journals (Sweden)

    Paula Kift

    2013-08-01

    Full Text Available In the context of the US National Security Agency surveillance scandal, the transatlantic privacy divide has come back to the fore. In the United States, the right to privacy is primarily understood as a right to physical privacy, thus the protection from unwarranted government searches and seizures. In Germany on the other hand, it is also understood as a right to spiritual privacy, thus the right of citizens to develop into autonomous moral agents. The following article will discuss the different constitutional assumptions that underlie American and German attitudes towards privacy, namely privacy as an aspect of liberty or as an aspect of dignity. As data flows defy jurisdictional boundaries, however, policymakers across the Atlantic are faced with a conundrum: how can German and American privacy cultures be reconciled?

  8. Defense Health Program Financial Reporting of General Property, Plant, and Equipment

    National Research Council Canada - National Science Library

    Lane, F

    2000-01-01

    .... The Defense Health Program funds the operations of the Military Departments' medical treatment facilities, the development of DoD medical systems software, and congressionally directed research...

  9. DoD Purchase Card Program Audit Coverage

    National Research Council Canada - National Science Library

    2001-01-01

    .... We prepared this summary report at the request of the Director, Defense Procurement to provide a central repository of purchase card audit report findings and to identify misuse trends and problems...

  10. DoD Program for Stability of Civilian Employment

    Science.gov (United States)

    1990-02-01

    instructional strategies, training systems and software for formal training courses; provide a learning center and media studio; direct the drone/missile...z ILI atS I 444 c N to-*p in N4 .444<A 4 01 c- 9 a-.4 00 Nmo-WUwS -"Me- to 0 ft5 0t- C4 efl ) - In in-c qie S- 0 4 q~ q 4 0 404 ID4W4444444U44 44...provide complete community services including recreation, adult education, subsistence, housing, transportation, maintenance, repair and construction of

  11. Privacy information management for video surveillance

    Science.gov (United States)

    Luo, Ying; Cheung, Sen-ching S.

    2013-05-01

    The widespread deployment of surveillance cameras has raised serious privacy concerns. Many privacy-enhancing schemes have been proposed to automatically redact images of trusted individuals in the surveillance video. To identify these individuals for protection, the most reliable approach is to use biometric signals such as iris patterns as they are immutable and highly discriminative. In this paper, we propose a privacy data management system to be used in a privacy-aware video surveillance system. The privacy status of a subject is anonymously determined based on her iris pattern. For a trusted subject, the surveillance video is redacted and the original imagery is considered to be the privacy information. Our proposed system allows a subject to access her privacy information via the same biometric signal for privacy status determination. Two secure protocols, one for privacy information encryption and the other for privacy information retrieval are proposed. Error control coding is used to cope with the variability in iris patterns and efficient implementation is achieved using surrogate data records. Experimental results on a public iris biometric database demonstrate the validity of our framework.

  12. 16 CFR 313.2 - Model privacy form and examples.

    Science.gov (United States)

    2010-01-01

    ... 16 Commercial Practices 1 2010-01-01 2010-01-01 false Model privacy form and examples. 313.2... PRIVACY OF CONSUMER FINANCIAL INFORMATION § 313.2 Model privacy form and examples. (a) Model privacy form..., although use of the model privacy form is not required. (b) Examples. The examples in this part are not...

  13. 12 CFR 716.2 - Model privacy form and examples.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 6 2010-01-01 2010-01-01 false Model privacy form and examples. 716.2 Section... PRIVACY OF CONSUMER FINANCIAL INFORMATION § 716.2 Model privacy form and examples. (a) Model privacy form..., although use of the model privacy form is not required. (b) Examples. The examples in this part are not...

  14. Location-Related Privacy in Geo-Social Networks

    DEFF Research Database (Denmark)

    Ruiz Vicente, Carmen; Freni, Dario; Bettini, Claudio

    2011-01-01

    -ins." However, this ability to reveal users' locations causes new privacy threats, which in turn call for new privacy-protection methods. The authors study four privacy aspects central to these social networks - location, absence, co-location, and identity privacy - and describe possible means of protecting...... privacy in these circumstances....

  15. Chatbots amid Privacy Concerns

    OpenAIRE

    IndraStra Global, Editorial Team

    2018-01-01

    "Chatbots" are highly engaging computer programs through which voice and text messages become a part of a back-and-forth conversation between a user and a user interface. They have gained momentum in past couple of years for driving business outcomes in a cost-effective manner with improved customer experience. These bots can be customized and used on mobile devices, web browsers, and on popular chat platforms such as Facebook Messenger, or Slack.

  16. Separate DOD and DOA Estimation for Bistatic MIMO Radar

    Directory of Open Access Journals (Sweden)

    Lin Li

    2016-01-01

    Full Text Available A novel MUSIC-type algorithm is derived in this paper for the direction of departure (DOD and direction of arrival (DOA estimation in a bistatic MIMO radar. Through rearranging the received signal matrix, we illustrate that the DOD and the DOA can be separately estimated. Compared with conventional MUSIC-type algorithms, the proposed separate MUSIC algorithm can avoid the interference between DOD and DOA estimations effectively. Therefore, it is expected to give a better angle estimation performance and have a much lower computational complexity. Meanwhile, we demonstrate that our method is also effective for coherent targets in MIMO radar. Simulation results verify the efficiency of the proposed method, particularly when the signal-to-noise ratio (SNR is low and/or the number of snapshots is small.

  17. Tales from the dark side: Privacy dark strategies and privacy dark patterns

    DEFF Research Database (Denmark)

    Bösch, Christoph; Erb, Benjamin; Kargl, Frank

    2016-01-01

    Privacy strategies and privacy patterns are fundamental concepts of the privacy-by-design engineering approach. While they support a privacy-aware development process for IT systems, the concepts used by malicious, privacy-threatening parties are generally less understood and known. We argue...... that understanding the “dark side”, namely how personal data is abused, is of equal importance. In this paper, we introduce the concept of privacy dark strategies and privacy dark patterns and present a framework that collects, documents, and analyzes such malicious concepts. In addition, we investigate from...... a psychological perspective why privacy dark strategies are effective. The resulting framework allows for a better understanding of these dark concepts, fosters awareness, and supports the development of countermeasures. We aim to contribute to an easier detection and successive removal of such approaches from...

  18. Privacy Protection: Mandating New Arrangements to Implement and Assess Federal Privacy Policy and Practice

    National Research Council Canada - National Science Library

    Relyea, Harold C

    2004-01-01

    When Congress enacted the Privacy Act of 1974, it established a temporary national study commission to conduct a comprehensive assessment of privacy policy and practice in both the public and private...

  19. Logistics: Use of DoD Resources Supporting Hurricane Katrina Disaster

    National Research Council Canada - National Science Library

    Scott, Wanda A; Bloomer, Donald A; Owens, Keith M; Bryant, Leon D; Matthews, Takia A; Chavez, Bryan M; Torres, Anthony M; Woolard, Alan J; Pugh, Jacqueline N

    2006-01-01

    We performed the audit in response to a September 2005 request by the Principal Deputy Inspector General, DoD to assess the use of DoD resources in providing relief efforts in support of the Hurricane...

  20. Analysis of the Air Force ISO 14001 Pilot Study Conducted by DoD

    National Research Council Canada - National Science Library

    Harris, Rodney

    2000-01-01

    The Department of Defense (DoD) conducted an ISO 14001 pilot study with the primary goal of determining how ISO 14001 could help DoD organizations reduce risks, improve compliance with environmental regulations, enhance stewardship...

  1. Major Deficiencies Preventing Auditors From Rendering Audit Opinions on DOD General Fund Financial Statements

    National Research Council Canada - National Science Library

    Rauu, Russell

    1995-01-01

    .... This report gives Congress, the Secretary of Defense, the DoD Chief Financial Officer, financial managers, and the audit community an assessment of progress made in audited financial statements of DoD general funds...

  2. Gulf War Illnesses: DOD's Conclusions about U.S. Troops' Exposure Cannot Be Adequately Supported

    National Research Council Canada - National Science Library

    Rhodes, Keith

    2004-01-01

    ... (MOD) conclusions about troops' exposure. The GAO found that DoD's and MOD's conclusions about troops' exposure to CW agents, based on DoD and CIA plume modeling, cannot be adequately supported...

  3. BIA and DOD Schools: Student Achievement and Other Characteristics Often Differ from Public Schools

    National Research Council Canada - National Science Library

    2001-01-01

    ...) and the Department of Defense (DOD) school systems. Unlike public schools, where federal funding constitutes a small portion of total resources, the BIA and DOD school systems depend almost entirely on federal funds...

  4. BIA AND DOD SCHOOLS: Student Achievement and Other Characteristics Often Differ from Public Schools

    National Research Council Canada - National Science Library

    2001-01-01

    ...) and the Department of Defense (DOD) school systems. Unlike public schools, where federal funding constitutes a small portion of total resources, the BIA and DOD school systems depend almost entirely on federal funds...

  5. Financial Management: DoD Process for Reporting Contingent Legal Liabilities

    National Research Council Canada - National Science Library

    Granetto, Paul J; Marsh, Patricia A; Peek, Marvin L; Brittingham, Scott S; Baidridge, Denise E; Egu, Charles O; Schenck, Kristy M; Adams, Carl L; Reiser, Cheri L

    2006-01-01

    .... The report is intended to convey systemic concerns across DoD and to provide DoD management and legal counsel the basis for developing policies and procedures for reporting and disclosing contingent...

  6. Inspector General, DOD, Oversight of the Audit of the FY 2000 Military Retirement Fund Financial Statements

    National Research Council Canada - National Science Library

    Lane, F

    2001-01-01

    .... This Bulletin requires the Inspector General, DoD, or an independent auditor, to express an opinion on the DoD financial statements and to report on the adequacy of internal controls and compliance...

  7. Planning for Diversity: Options and Recommendations for DoD Leaders

    National Research Council Canada - National Science Library

    Lim, Nelson; Cho, Michelle; Curry, Kimberly

    2008-01-01

    With this report, the authors aim to assist Department of Defense (DoD) leaders in their effort to develop a strategic plan to achieve greater diversity among DoD active duty and civilian leadership...

  8. Privacy and security in teleradiology

    International Nuclear Information System (INIS)

    Ruotsalainen, Pekka

    2010-01-01

    Teleradiology is probably the most successful eHealth service available today. Its business model is based on the remote transmission of radiological images (e.g. X-ray and CT-images) over electronic networks, and on the interpretation of the transmitted images for diagnostic purpose. Two basic service models are commonly used teleradiology today. The most common approach is based on the message paradigm (off-line model), but more developed teleradiology systems are based on the interactive use of PACS/RIS systems. Modern teleradiology is also more and more cross-organisational or even cross-border service between service providers having different jurisdictions and security policies. This paper defines the requirements needed to make different teleradiology models trusted. Those requirements include a common security policy that covers all partners and entities, common security and privacy protection principles and requirements, controlled contracts between partners, and the use of security controls and tools that supporting the common security policy. The security and privacy protection of any teleradiology system must be planned in advance, and the necessary security and privacy enhancing tools should be selected (e.g. strong authentication, data encryption, non-repudiation services and audit-logs) based on the risk analysis and requirements set by the legislation. In any case the teleradiology system should fulfil ethical and regulatory requirements. Certification of the whole teleradiology service system including security and privacy is also proposed. In the future, teleradiology services will be an integrated part of pervasive eHealth. Security requirements for this environment including dynamic and context aware security services are also discussed in this paper.

  9. Trust and Privacy in Healthcare

    Science.gov (United States)

    Singleton, Peter; Kalra, Dipak

    This paper considers issues of trust and privacy in healthcare around increased data-sharing through Electronic Health Records (EHRs). It uses a model structured around different aspects of trust in the healthcare organisation’s reasons for greater data-sharing and their ability to execute EHR projects, particularly any associated confidentiality controls. It reflects the individual’s personal circumstances and attitude to use of health records.

  10. Privacy and security in teleradiology

    Energy Technology Data Exchange (ETDEWEB)

    Ruotsalainen, Pekka [National Institute for Health and Welfare, Helsinki (Finland)], E-mail: pekka.ruotsalainen@THL.fi

    2010-01-15

    Teleradiology is probably the most successful eHealth service available today. Its business model is based on the remote transmission of radiological images (e.g. X-ray and CT-images) over electronic networks, and on the interpretation of the transmitted images for diagnostic purpose. Two basic service models are commonly used teleradiology today. The most common approach is based on the message paradigm (off-line model), but more developed teleradiology systems are based on the interactive use of PACS/RIS systems. Modern teleradiology is also more and more cross-organisational or even cross-border service between service providers having different jurisdictions and security policies. This paper defines the requirements needed to make different teleradiology models trusted. Those requirements include a common security policy that covers all partners and entities, common security and privacy protection principles and requirements, controlled contracts between partners, and the use of security controls and tools that supporting the common security policy. The security and privacy protection of any teleradiology system must be planned in advance, and the necessary security and privacy enhancing tools should be selected (e.g. strong authentication, data encryption, non-repudiation services and audit-logs) based on the risk analysis and requirements set by the legislation. In any case the teleradiology system should fulfil ethical and regulatory requirements. Certification of the whole teleradiology service system including security and privacy is also proposed. In the future, teleradiology services will be an integrated part of pervasive eHealth. Security requirements for this environment including dynamic and context aware security services are also discussed in this paper.

  11. Fictional privacy among Facebook users.

    Science.gov (United States)

    Lemieux, Robert

    2012-08-01

    The current study involved the creation of a fictional Facebook account with limited information and was designed to assess whether participants would accept the friendship of an ambiguous, unknown person. Results indicated that 325 Facebook members (72% of the sample) willingly accepted the friendship of the unknown individual. Results are discussed in relation to privacy concerns, norms of reciprocity, and allowing access to potentially embarrassing information and/or pictures.

  12. Privacy and security in teleradiology.

    Science.gov (United States)

    Ruotsalainen, Pekka

    2010-01-01

    Teleradiology is probably the most successful eHealth service available today. Its business model is based on the remote transmission of radiological images (e.g. X-ray and CT-images) over electronic networks, and on the interpretation of the transmitted images for diagnostic purpose. Two basic service models are commonly used teleradiology today. The most common approach is based on the message paradigm (off-line model), but more developed teleradiology systems are based on the interactive use of PACS/RIS systems. Modern teleradiology is also more and more cross-organisational or even cross-border service between service providers having different jurisdictions and security policies. This paper defines the requirements needed to make different teleradiology models trusted. Those requirements include a common security policy that covers all partners and entities, common security and privacy protection principles and requirements, controlled contracts between partners, and the use of security controls and tools that supporting the common security policy. The security and privacy protection of any teleradiology system must be planned in advance, and the necessary security and privacy enhancing tools should be selected (e.g. strong authentication, data encryption, non-repudiation services and audit-logs) based on the risk analysis and requirements set by the legislation. In any case the teleradiology system should fulfil ethical and regulatory requirements. Certification of the whole teleradiology service system including security and privacy is also proposed. In the future, teleradiology services will be an integrated part of pervasive eHealth. Security requirements for this environment including dynamic and context aware security services are also discussed in this paper. Copyright (c) 2009 Elsevier Ireland Ltd. All rights reserved.

  13. An Effective Grouping Method for Privacy-Preserving Bike Sharing Data Publishing

    Directory of Open Access Journals (Sweden)

    A S M Touhidul Hasan

    2017-10-01

    Full Text Available Bike sharing programs are eco-friendly transportation systems that are widespread in smart city environments. In this paper, we study the problem of privacy-preserving bike sharing microdata publishing. Bike sharing systems collect visiting information along with user identity and make it public by removing the user identity. Even after excluding user identification, the published bike sharing dataset will not be protected against privacy disclosure risks. An adversary may arrange published datasets based on bike’s visiting information to breach a user’s privacy. In this paper, we propose a grouping based anonymization method to protect published bike sharing dataset from linking attacks. The proposed Grouping method ensures that the published bike sharing microdata will be protected from disclosure risks. Experimental results show that our approach can protect user privacy in the released datasets from disclosure risks and can keep more data utility compared with existing methods.

  14. Online Tracking Technologies and Web Privacy:Technologieën voor Online volgen en Web Privacy

    OpenAIRE

    Acar, Mustafa Gunes Can

    2017-01-01

    In my PhD thesis, I would like to study the problem of online privacy with a focus on Web and mobile applications. Key research questions to be addressed by my study are the following: How can we formalize and quantify web tracking? What are the threats presented against privacy by different tracking techniques such as browser fingerprinting and cookie based tracking? What kind of privacy enhancing technologies (PET) can be used to ensure privacy without degrading service quality? The stud...

  15. Gender and online privacy among teens: risk perception, privacy concerns, and protection behaviors.

    Science.gov (United States)

    Youn, Seounmi; Hall, Kimberly

    2008-12-01

    Survey data from 395 high school students revealed that girls perceive more privacy risks and have a higher level of privacy concerns than boys. Regarding privacy protection behaviors, boys tended to read unsolicited e-mail and register for Web sites while directly sending complaints in response to unsolicited e-mail. This study found girls to provide inaccurate information as their privacy concerns increased. Boys, however, refrained from registering to Web sites as their concerns increased.

  16. Portrait of a Privacy Invasion

    Directory of Open Access Journals (Sweden)

    Shoshitaishvili Yan

    2015-04-01

    Full Text Available The popularity of online social networks has changed the way in which we share personal thoughts, political views, and pictures. Pictures have a particularly important role in the privacy of users, as they can convey substantial information (e.g., a person was attending an event, or has met with another person. Moreover, because of the nature of social networks, it has become increasingly difficult to control who has access to which content. Therefore, when a substantial amount of pictures are accessible to one party, there is a very serious potential for violations of the privacy of users. In this paper, we demonstrate a novel technique that, given a large corpus of pictures shared on a social network, automatically determines who is dating whom, with reasonable precision. More specifically, our approach combines facial recognition, spatial analysis, and machine learning techniques to determine pairs that are dating. To the best of our knowledge, this is the first privacy attack of this kind performed on social networks. We implemented our approach in a tool, called Creepic, and evaluated it on two real-world datasets. The results show that it is possible to automatically extract non-obvious, and nondisclosed, relationships between people represented in a group of pictures, even when the people involved are not directly part of a connected social clique.

  17. Distributed privacy preserving data collection

    KAUST Repository

    Xue, Mingqiang

    2011-01-01

    We study the distributed privacy preserving data collection problem: an untrusted data collector (e.g., a medical research institute) wishes to collect data (e.g., medical records) from a group of respondents (e.g., patients). Each respondent owns a multi-attributed record which contains both non-sensitive (e.g., quasi-identifiers) and sensitive information (e.g., a particular disease), and submits it to the data collector. Assuming T is the table formed by all the respondent data records, we say that the data collection process is privacy preserving if it allows the data collector to obtain a k-anonymized or l-diversified version of T without revealing the original records to the adversary. We propose a distributed data collection protocol that outputs an anonymized table by generalization of quasi-identifier attributes. The protocol employs cryptographic techniques such as homomorphic encryption, private information retrieval and secure multiparty computation to ensure the privacy goal in the process of data collection. Meanwhile, the protocol is designed to leak limited but non-critical information to achieve practicability and efficiency. Experiments show that the utility of the anonymized table derived by our protocol is in par with the utility achieved by traditional anonymization techniques. © 2011 Springer-Verlag.

  18. PRIVACY PROTECTION PROBLEMS IN SOCIAL NETWORKS

    OpenAIRE

    OKUR, M. Cudi

    2011-01-01

    Protecting privacy has become a major concern for most social network users because of increased difficulties of controlling the online data. This article presents an assessment of the common privacy related risks of social networking sites. Open and hidden privacy risks of active and passive online profiles are examined and increasing share of social networking in these phenomena is discussed. Inadequacy of available legal and institutional protection is demonstrated and the effectiveness of...

  19. Facebook: Personality and privacy on profiles

    OpenAIRE

    Casado Riera, Carla; Oberst, Ursula; Carbonell, Xavier

    2015-01-01

    The aim of this study was to study the possible relationship between the privacy settings in Facebook profiles and two personality dimensions, extraversion and neuroticism, in relation to gender. The Privacy on Facebook Questionnaire and the Eysenck Personality Inventory was applied to a sample of 92 womenand 70 men, all users of Facebook. No significant relationship was found between extraversion or neuroticism and the privacy settings of Facebook profiles, but the results showed significant...

  20. Toward sensitive document release with privacy guarantees

    OpenAIRE

    David Sánchez; Montserrat Batet

    2017-01-01

    Toward sensitive document release with privacy guarantees DOI: 10.1016/j.engappai.2016.12.013 URL: http://www.sciencedirect.com/science/article/pii/S0952197616302408 Filiació URV: SI Inclòs a la memòria: SI Privacy has become a serious concern for modern Information Societies. The sensitive nature of much of the data that are daily exchanged or released to untrusted parties requires that responsible organizations undertake appropriate privacy protection measures. Nowadays, much...

  1. An Alternative View of Privacy on Facebook

    Directory of Open Access Journals (Sweden)

    Christian Fuchs

    2011-02-01

    Full Text Available The predominant analysis of privacy on Facebook focuses on personal information revelation. This paper is critical of this kind of research and introduces an alternative analytical framework for studying privacy on Facebook, social networking sites and web 2.0. This framework is connecting the phenomenon of online privacy to the political economy of capitalism—a focus that has thus far been rather neglected in research literature about Internet and web 2.0 privacy. Liberal privacy philosophy tends to ignore the political economy of privacy in capitalism that can mask socio-economic inequality and protect capital and the rich from public accountability. Facebook is in this paper analyzed with the help of an approach, in which privacy for dominant groups, in regard to the ability of keeping wealth and power secret from the public, is seen as problematic, whereas privacy at the bottom of the power pyramid for consumers and normal citizens is seen as a protection from dominant interests. Facebook’s privacy concept is based on an understanding that stresses self-regulation and on an individualistic understanding of privacy. The theoretical analysis of the political economy of privacy on Facebook in this paper is based on the political theories of Karl Marx, Hannah Arendt and Jürgen Habermas. Based on the political economist Dallas Smythe’s concept of audience commodification, the process of prosumer commodification on Facebook is analyzed. The political economy of privacy on Facebook is analyzed with the help of a theory of drives that is grounded in Herbert Marcuse’s interpretation of Sigmund Freud, which allows to analyze Facebook based on the concept of play labor (= the convergence of play and labor.

  2. Security measures required for HIPAA privacy.

    Science.gov (United States)

    Amatayakul, M

    2000-01-01

    HIPAA security requirements include administrative, physical, and technical services and mechanisms to safeguard confidentiality, availability, and integrity of health information. Security measures, however, must be implemented in the context of an organization's privacy policies. Because HIPAA's proposed privacy rules are flexible and scalable to account for the nature of each organization's business, size, and resources, each organization will be determining its own privacy policies within the context of the HIPAA requirements and its security capabilities. Security measures cannot be implemented in a vacuum.

  3. A Model-Based Privacy Compliance Checker

    OpenAIRE

    Siani Pearson; Damien Allison

    2009-01-01

    Increasingly, e-business organisations are coming under pressure to be compliant to a range of privacy legislation, policies and best practice. There is a clear need for high-level management and administrators to be able to assess in a dynamic, customisable way the degree to which their enterprise complies with these. We outline a solution to this problem in the form of a model-driven automated privacy process analysis and configuration checking system. This system models privacy compliance ...

  4. Privacy Preservation in Distributed Subgradient Optimization Algorithms

    OpenAIRE

    Lou, Youcheng; Yu, Lean; Wang, Shouyang

    2015-01-01

    Privacy preservation is becoming an increasingly important issue in data mining and machine learning. In this paper, we consider the privacy preserving features of distributed subgradient optimization algorithms. We first show that a well-known distributed subgradient synchronous optimization algorithm, in which all agents make their optimization updates simultaneously at all times, is not privacy preserving in the sense that the malicious agent can learn other agents' subgradients asymptotic...

  5. Negotiating privacy in surveillant welfare relations

    DEFF Research Database (Denmark)

    Andersen, Lars Bo; Lauritsen, Peter; Bøge, Ask Risom

    . However, while privacy is central to debates of surveillance, it has proven less productive as an analytical resource for studying surveillance in practice. Consequently, this paper reviews different conceptualisations of privacy in relation to welfare and surveillance and argues for strengthening...... the analytical capacity of the concept by rendering it a situated and relational concept. The argument is developed through a research and design project called Teledialogue meant to improve the relation between case managers and children placed at institutions or in foster families. Privacy in Teledialogue...... notion of privacy are discussed in relation to both research- and public debates on surveillance in a welfare setting....

  6. Analysis of Privacy on Social Networks

    OpenAIRE

    Tomandl, Luboš

    2015-01-01

    This thesis deals with a question of privacy in a context of social networks. The main substance of these services is the users' option to share an information about their lives. This alone can be a problem for privacy. In the first part of this thesis concentrates on the meaning of privacy as well as its value for both individuals and the society. In the next part the privacy threats on social networks, namely Facebook, are discussed. These threats are disclosed on four levels according to f...

  7. Privacy Protection Research of Mobile RFID

    Institute of Scientific and Technical Information of China (English)

    2007-01-01

    Radio Frequency Identification is one of the most controversial technologies at present.It is very difficult to detect who reads a tag incorporated into products owned by a person,a significant concern to privacy threats in RFID system arises from this reason.User privacy problem is prior considersion for mobile RFID service,because most mobile RFID service based on end-user service.Propose a solution for user privacy protection,which is a modification of EPC Class 1 Generation 2 protocol,and introduce a privacy protection scenario for mobile RFID service using this method.

  8. Location privacy protection in mobile networks

    CERN Document Server

    Liu, Xinxin

    2013-01-01

    This SpringerBrief analyzes the potential privacy threats in wireless and mobile network environments, and reviews some existing works. It proposes multiple privacy preserving techniques against several types of privacy threats that are targeting users in a mobile network environment. Depending on the network architecture, different approaches can be adopted. The first proposed approach considers a three-party system architecture where there is a trusted central authority that can be used to protect users? privacy. The second approach considers a totally distributed environment where users per

  9. Customer privacy on UK healthcare websites.

    Science.gov (United States)

    Mundy, Darren P

    2006-09-01

    Privacy has been and continues to be one of the key challenges of an age devoted to the accumulation, processing, and mining of electronic information. In particular, privacy of healthcare-related information is seen as a key issue as health organizations move towards the electronic provision of services. The aim of the research detailed in this paper has been to analyse privacy policies on popular UK healthcare-related websites to determine the extent to which consumer privacy is protected. The author has combined approaches (such as approaches focused on usability, policy content, and policy quality) used in studies by other researchers on e-commerce and US healthcare websites to provide a comprehensive analysis of UK healthcare privacy policies. The author identifies a wide range of issues related to the protection of consumer privacy through his research analysis using quantitative results. The main outcomes from the author's research are that only 61% of healthcare-related websites in their sample group posted privacy policies. In addition, most of the posted privacy policies had poor readability standards and included a variety of privacy vulnerability statements. Overall, the author's findings represent significant current issues in relation to healthcare information protection on the Internet. The hope is that raising awareness of these results will drive forward changes in the industry, similar to those experienced with information quality.

  10. Extending SQL to Support Privacy Policies

    Science.gov (United States)

    Ghazinour, Kambiz; Pun, Sampson; Majedi, Maryam; Chinaci, Amir H.; Barker, Ken

    Increasing concerns over Internet applications that violate user privacy by exploiting (back-end) database vulnerabilities must be addressed to protect both customer privacy and to ensure corporate strategic assets remain trustworthy. This chapter describes an extension onto database catalogues and Structured Query Language (SQL) for supporting privacy in Internet applications, such as in social networks, e-health, e-governmcnt, etc. The idea is to introduce new predicates to SQL commands to capture common privacy requirements, such as purpose, visibility, generalization, and retention for both mandatory and discretionary access control policies. The contribution is that corporations, when creating the underlying databases, will be able to define what their mandatory privacy policies arc with which all application users have to comply. Furthermore, each application user, when providing their own data, will be able to define their own privacy policies with which other users have to comply. The extension is supported with underlying catalogues and algorithms. The experiments demonstrate a very reasonable overhead for the extension. The result is a low-cost mechanism to create new systems that arc privacy aware and also to transform legacy databases to their privacy-preserving equivalents. Although the examples arc from social networks, one can apply the results to data security and user privacy of other enterprises as well.

  11. Toward Privacy-Preserving Personalized Recommendation Services

    Directory of Open Access Journals (Sweden)

    Cong Wang

    2018-02-01

    Full Text Available Recommendation systems are crucially important for the delivery of personalized services to users. With personalized recommendation services, users can enjoy a variety of targeted recommendations such as movies, books, ads, restaurants, and more. In addition, personalized recommendation services have become extremely effective revenue drivers for online business. Despite the great benefits, deploying personalized recommendation services typically requires the collection of users’ personal data for processing and analytics, which undesirably makes users susceptible to serious privacy violation issues. Therefore, it is of paramount importance to develop practical privacy-preserving techniques to maintain the intelligence of personalized recommendation services while respecting user privacy. In this paper, we provide a comprehensive survey of the literature related to personalized recommendation services with privacy protection. We present the general architecture of personalized recommendation systems, the privacy issues therein, and existing works that focus on privacy-preserving personalized recommendation services. We classify the existing works according to their underlying techniques for personalized recommendation and privacy protection, and thoroughly discuss and compare their merits and demerits, especially in terms of privacy and recommendation accuracy. We also identity some future research directions. Keywords: Privacy protection, Personalized recommendation services, Targeted delivery, Collaborative filtering, Machine learning

  12. Do Privacy Concerns Matter for Millennials?

    DEFF Research Database (Denmark)

    Fodor, Mark; Brem, Alexander

    2015-01-01

    data have raised the question, if location data are considered as sensitive data by users. Thus, we use two privacy concern models, namely Concern for Information Privacy (CFIP) and Internet Users’ Information Privacy Concerns (IUIPC) to find out. Our sample comprises of 235 individuals between 18...... and 34 years (Generation C) from Germany. The results of this study indicate that the second-order factor IUIPC showed better fit for the underlying data than CFIP did. Overall privacy concerns have been found to have an impact on behavioral intentions of users for LBS adoption. Furthermore, other risk...

  13. Vehicular ad hoc network security and privacy

    CERN Document Server

    Lin, X

    2015-01-01

    Unlike any other book in this area, this book provides innovative solutions to security issues, making this book a must read for anyone working with or studying security measures. Vehicular Ad Hoc Network Security and Privacy mainly focuses on security and privacy issues related to vehicular communication systems. It begins with a comprehensive introduction to vehicular ad hoc network and its unique security threats and privacy concerns and then illustrates how to address those challenges in highly dynamic and large size wireless network environments from multiple perspectives. This book is richly illustrated with detailed designs and results for approaching security and privacy threats.

  14. Elections: DOD Needs More Comprehensive Planning to Address Military and Overseas Absentee Voting Challenges

    Science.gov (United States)

    2016-04-01

    Acknowledgments Contact Acknowledgments Related GAO Products Page 75 GAO-16-378 DOD Overseas Absentee Voting U.S. Postal Service: Actions... Products Page 76 GAO-16-378 DOD Overseas Absentee Voting Election Reform: Nine States’ Experiences Implementing Federal Requirements for...ELECTIONS DOD Needs More Comprehensive Planning to Address Military and Overseas Absentee Voting Challenges

  15. Chief Information Officer > About DoD CIO > Organization > DCIO R&A

    Science.gov (United States)

    of Defense Chief Information Officer Home About DoD CIO Bios Organization DCIO C4&IIC DCIO IE , where she helps the organization serve as the DoD CIO focal point for the PPB&E process, including includes personnel management and congressional support. This organization underpins all of DoD CIO's

  16. Whistleblower Protection: DOD Needs to Enhance Oversight of Military Whistleblower Reprisal Investigations

    Science.gov (United States)

    2015-05-01

    WHISTLEBLOWER PROTECTION DOD Needs to Enhance Oversight of Military Whistleblower Reprisal Investigations Report...00-2015 to 00-00-2015 4. TITLE AND SUBTITLE Whistleblower Protection: DOD Needs to Enhance Oversight of Military Whistleblower Reprisal...Government Accountability Office Highlights of GAO-15-477, a report to congressional requesters May 2015 WHISTLEBLOWER PROTECTION DOD

  17. DOD Financial Management: Significant Efforts Still Needed for Remediating Audit Readiness Deficiencies

    Science.gov (United States)

    2017-02-01

    DOD FINANCIAL MANAGEMENT Significant Efforts Still Needed for Remediating Audit Readiness Deficiencies Report to...Accountability Office Highlights of GAO-17-85, a report to congressional committees February 2017 DOD FINANCIAL MANAGEMENT Significant Efforts Still...actions to address the IPAs’ recommendations. Office of Management and Budget (OMB) guidance and the Department of Defense’s (DOD) Financial

  18. 78 FR 9890 - DoD Board of Actuaries; Notice of Federal Advisory Committee Meeting

    Science.gov (United States)

    2013-02-12

    ... DEPARTMENT OF DEFENSE Office of the Secretary DoD Board of Actuaries; Notice of Federal Advisory... Advisory Committee meeting of the DoD Board of Actuaries will take place. DATES: July 18, 2013, from 1:00 p... Defense Human Resource Activity, DoD Office of the Actuary, 4800 Mark Center Drive, STE 06J25-01...

  19. Community Relations: DOD’s Approach for Using Resources Reflects Sound Management Principles

    Science.gov (United States)

    2016-09-01

    COMMUNITY RELATIONS DOD’s Approach for Using Resources Reflects Sound Management Principles Report to...Sound Management Principles What GAO Found The Department of Defense’s (DOD) approach for determining which community relations activities to...undertake reflects sound management principles —both for activities requested by non-DOD entities and for activities initiated by the department. DOD and

  20. Digital privacy in the marketplace perspectives on the information exchange

    CERN Document Server

    Milne, George

    2015-01-01

    Digital Privacy in the Marketplace focuses on the data ex-changes between marketers and consumers, with special ttention to the privacy challenges that are brought about by new information technologies. The purpose of this book is to provide a background source to help the reader think more deeply about the impact of privacy issues on both consumers and marketers. It covers topics such as: why privacy is needed, the technological, historical and academic theories of privacy, how market exchange af-fects privacy, what are the privacy harms and protections available, and what is the likely future of privacy.