WorldWideScience

Sample records for program dod privacy

  1. 78 FR 52117 - DoD Privacy Program

    Science.gov (United States)

    2013-08-22

    ... organizational entities within the DoD (referred to ] collectively in this part as the ``DoD Components''). (b... environment. Defined in Public Law 108-458, ``The Intelligence Reform and Terrorism Prevention Act of 2004... of an authorized law enforcement activity, including an authorized intelligence or administrative...

  2. 32 CFR 310.37 - DoD training programs.

    Science.gov (United States)

    2010-07-01

    ... other levels of training. (2) Specialized training. Training that provides information as to the... 32 National Defense 2 2010-07-01 2010-07-01 false DoD training programs. 310.37 Section 310.37... PROGRAM DOD PRIVACY PROGRAM Training Requirements § 310.37 DoD training programs. (a) The training shall...

  3. 77 FR 46653 - Defense Logistics Agency Privacy Program

    Science.gov (United States)

    2012-08-06

    ... of the Secretary 32 CFR Part 323 RIN 0790-AI86 Defense Logistics Agency Privacy Program AGENCY: Defense Logistics Agency, DoD. ACTION: Proposed rule with request for comments. SUMMARY: The Defense Logistics Agency (DLA) is proposing to amend the DLA Privacy Program Regulation. The DLA Privacy Offices...

  4. Privacy Training Program

    Science.gov (United States)

    Recognizing that training and awareness are critical to protecting agency Personally Identifiable Information (PII), the EPA is developing online training for privacy contacts in its programs and regions.

  5. Military Space Programs: Issues Concerning DOD's SBIRS and STSS Programs

    National Research Council Canada - National Science Library

    Smith, Marcia S

    2006-01-01

    The Department of Defense's (DOD's) programs to develop new satellites to alert U.S. military commanders to foreign missile launches, and to support missile defense objectives, are controversial because of cost growth and schedule slippage...

  6. Military Space Programs: Issues Concerning DOD's SBIRS and STSS Programs

    National Research Council Canada - National Science Library

    Smith, Marcia S

    2005-01-01

    The Department of Defense's (DOD's) programs to develop new satellites to alert U.S. military commanders to foreign missile launches, and to support missile defense objectives, are controversial because of cost growth and schedule slippage...

  7. Military Space Programs: Issues Concerning DOD's SBIRS and STSS Programs

    National Research Council Canada - National Science Library

    Smith, Marcia S

    2003-01-01

    The Department of Defense's (DOD's) programs to develop new satellites to alert U.S. military commanders to foreign missile launches, and to support missile defense objectives, are controversial because of cost growth and schedule slippage...

  8. 77 FR 14955 - DoD Information Assurance Scholarship Program (IASP)

    Science.gov (United States)

    2012-03-14

    ... of the Secretary 32 CFR Part 240 RIN 0790-AI28 DoD Information Assurance Scholarship Program (IASP... scholarship and grant program, known as the DoD Information Assurance Scholarship Program (IASP). The DoD IASP... executing an information assurance scholarship and grant program, known as the DoD Information Assurance...

  9. 77 FR 745 - DoD Mandatory Declassification Review (MDR) Program; Correction

    Science.gov (United States)

    2012-01-06

    ... of the Secretary 32 CFR Part 222 DoD Mandatory Declassification Review (MDR) Program; Correction...-80747), Department of Defense published a final rule titled DoD Mandatory Declassification Review (MDR... Mandatory Declassification Review (MDR) Program. Subsequent to the publication of that final rule...

  10. A Comparison of Science and Technology Funding for DoD's Space and Nonspace Programs

    National Research Council Canada - National Science Library

    Goldberg, Matthew; Rehmus, Paul

    2008-01-01

    ...) unclassified space programs have experienced growth in their costs and delays in their schedules compared with what DoD envisioned when the programs entered the development and demonstration phase...

  11. DoD Procurements Through the Tennessee Valley Authority Technology Brokering Program.

    Science.gov (United States)

    1993-10-20

    OIG, DoD, Report No. 93-068, " Procurement of Services for the Non-Acoustic Anti-Submarine Warfare Program Through the Tennessee Valley Authority...SUMMARY OF PRIOR AUDITS AND OTHER REVIEWS Office of the Inspector General, DoD Report No. 93-068, " Procurement of Services for the Non-Acoustic Anti

  12. DoD Science and Engineering Apprenticeship Program for High School Students, 1996-'97 Activities

    National Research Council Canada - National Science Library

    Pfeffer, Richard

    1997-01-01

    The year 1996-97 represented our fifteenth successful DoD Science and Engineering Apprenticeship Program for High School Students at Florida State University, sponsored by the Office of Naval Research...

  13. 78 FR 31905 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2013-05-28

    ... Finance and Accounting Service, Freedom of Information/Privacy Act Program Manager, Corporate... of the Secretary Privacy Act of 1974; System of Records AGENCY: Defense Finance and Accounting Service, DoD. ACTION: Notice to amend a System of Records. SUMMARY: The Defense Finance and Accounting...

  14. The DoD Civilian Equal Employment Opportunity (EEO) Program

    Science.gov (United States)

    1987-05-21

    Memorandum, "Responsibility for * Maintaining a Work Force Free of Sexual Harrassment ," September 2, 1988 #First amendment (Ch 1, 4/11/89) 1-1 May 21...oppor- tunity for all employees and applicants for employment, including sexual harass- ment in the work force and at work sites and architectural...discrimination in employment, including complaints of sexual harassment. i. Establish DoD SEPs for the FWP, HEP, and HIP. In addition, the ASD(FM&P

  15. 77 FR 56824 - Privacy Act of 1974; Computer Matching Program

    Science.gov (United States)

    2012-09-14

    ... information contained in the USCIS database is referred to as the Verification Information System (VIS), which... records entitled ``Verification Information System Records Notice (DHS-2007-0010).'' Where there is a... Information: Privacy Act of 1974; Computer Matching Program between the U.S. Department of Education and the...

  16. 77 FR 38610 - Privacy Act of 1974; Computer Matching Program

    Science.gov (United States)

    2012-06-28

    ... education at the time of the parent or guardian's death. Beginning July 1, 2010, students who are otherwise... From the Federal Register Online via the Government Publishing Office DEPARTMENT OF EDUCATION Privacy Act of 1974; Computer Matching Program AGENCY: Department of Education. ACTION: Notice--Computer...

  17. 41 CFR 109-45.1004 - Recovery and use of precious metals through the DOD Precious Metals Recovery Program.

    Science.gov (United States)

    2010-07-01

    ... precious metals through the DOD Precious Metals Recovery Program. 109-45.1004 Section 109-45.1004 Public... PERSONAL PROPERTY 45.10-Recovery of Precious Metals § 109-45.1004 Recovery and use of precious metals through the DOD Precious Metals Recovery Program. DOE operates its own precious metals pool and therefore...

  18. 75 FR 69693 - Privacy Act of 1974; Department of Homeland Security National Protection and Programs Directorate...

    Science.gov (United States)

    2010-11-15

    ...-0086] Privacy Act of 1974; Department of Homeland Security National Protection and Programs Directorate...-2182), Privacy Officer, National Protection and Programs Directorate, Department of Homeland Security... Privacy Act protections to all individuals where systems of records maintain information on U.S. citizens...

  19. 75 FR 59176 - DoD Mandatory Declassification Review (MDR) Program

    Science.gov (United States)

    2010-09-27

    ... Department of Defense, the Defense Agencies, the DoD Field Activities, and all other organizational entities... number, requester's name and organizational affiliation, information requested, date of receipt, and date... Intelligence jointly determine that it: (1) Concerns the atomic energy programs of other nations, and (2) It...

  20. Weapon Acquisition Program Outcomes and Efforts to Reform DOD’s Acquisition Process

    Science.gov (United States)

    2016-05-09

    Range Strike Carrier replacement KC-46 Tanker Ohio Class Replacement DEFENSE ACQUISITIONS: Assessments of Selected Weapon Programs (GAO-16-329SP...202-512-9310 Objectives This is GAO’s 14th annual assessment of DOD weapon system acquisitions, an area that has been on GAO’s high-risk list for...amount of future development funding required is likely due to newer programs with less risk entering system development. Changes in the 2015

  1. Request Twin Screw Extruder to Enhance DoD Interested Polymer Nanocomposite Research and STEM Program

    Science.gov (United States)

    2016-09-25

    Nanocomposite Research and STEM Program The views, opinions and/or findings contained in this report are those of the author(s) and should not contrued as an...Request Twin Screw Extruder to Enhance DoD Interested Polymer Nanocomposite Research and STEM Program Report Title In comparison to our existing melt...twin screw extruders will significantly enhance the polymer nanocomposite research such as anti-scratch coating, high k materials and tissue

  2. 76 FR 55693 - Privacy Act of 1974; Department of Homeland Security National Protection and Programs Directorate...

    Science.gov (United States)

    2011-09-08

    ... SECURITY Office of the Secretary Privacy Act of 1974; Department of Homeland Security National Protection... contact: Emily Andrew (703-235-2182), Privacy Officer, National Protection and Programs Directorate... policy, DHS extends administrative Privacy Act protections to all individuals where systems of records...

  3. Review of DoD’s Program Managers

    Science.gov (United States)

    2011-04-01

    DEFENSE BUSINESS BOARD Report to the Secretary of Defense Review of DoD’s Program Managers Report FY11-03...Recommendations for improving the effectiveness of military program managers based on private sector best practices. April 2011...2011 2. REPORT TYPE 3. DATES COVERED 00-00-2011 to 00-00-2011 4. TITLE AND SUBTITLE Review of DoD’s Program Managers 5a. CONTRACT NUMBER 5b

  4. DOD's advanced thermionics program an overview

    Energy Technology Data Exchange (ETDEWEB)

    Drake, T.R.

    1998-07-01

    The Defense Special Weapons Agency (DSWA) manages a congressionally mandated program in advanced thermionics research. Guided by congressional language to advance the state-of-the-art in the US and support the Integrated Solar Upper Stage (ISUS) program, DSWA efforts concentrate on four areas: an electrically testable design of a high-performance, in-core thermionic fuel element (TFE), the ISUS program, a microminiature thermionic converter and several modeling efforts. The DSWA domestic program is augmented by several small contracts with Russian institutes, awarded under the former TOPAZ International Program that the Ballistic Missile Defense Organization transferred to DSWA. The design effort at General Atomics will result in an electrically testable, multi-cell TFE for in-core conversion, involving system design and advanced collector and emitter technologies. For the ISUS program, DSWA funded a portion of the engine ground demonstration, including development of the power management system and the planar diodes. Current efforts supporting ISUS include continued diode testing and developing an advanced planar diode. The MTC program seeks to design a mass producable, close-spaced thermionic converter using integrated circuit technologies. Modeling and analysis at DSWA involves development of the Reactor System Mass with Thermionics estimation model (RSMASS-T), developing a new thermionic theory, and reviewing applications for the MTC technology. The Russian deliverables include several reports and associated hardware that describe many of its state-of-the-art thermionic technologies and processes.

  5. DoD Program for Stability of Civilian Employment

    Science.gov (United States)

    1990-02-01

    for allied students ; and provides techimfal training for Air Force civilian aployees. Prepare LEAF extension courses, caeer developent course, LEAF and...MISSION: To provide students with such instruction in supply duties ashore and afloat so as to qualify them to perform with credit to themselves and...Care Sciences career fields to Air Force and other defense military, civilian, and allied students . Undergraduate pilot training program is conducted

  6. Implications of DOD Funds Execution Policy for Acquisition Program Management

    Science.gov (United States)

    2014-08-01

    E only 5 3 7 1 Procurement and RDT&E 8 1 5 4 Platform Mod C3 UAS Support Equipment Other 9 3 4 3 2 4 Program by Type 19 to distinguish causes and...2010, full-rate production decision scheduled for September 2012  Increment 2 failed IOT &E (Initial Operational Test and Evaluation)  September 2012...ADM provided only additional Low-Rate Initial Production (LRIP) quantities, pending completion of follow-on IOT &E  September 2013 ADM again only

  7. DoD Climate Change Fuel Cell Program

    Energy Technology Data Exchange (ETDEWEB)

    Ken Olsen

    2006-09-15

    's main circuit while the hot water flows from the fuel cell to the college through a closed loop equipped with internal heat exchangers mounted on a custom skid in the boiler room. Fresh make-up water for the fuel cell's reverse osmosis equipment is piped separately from the boiler room out to the fuel cell. The fuel cell operates in parallel with the local electric utility's distribution system that serves the general area. The interconnection design relies on the grid protection components that come as standard equipment in the FCE unit design. Ultimately, the only substantive approval for the installation was for the parallel interconnection with the grid, provided by Jersey Central Power & Light. The utility had a well-defined set of interconnection requirements and procedures for units under 5 MW, and the approval process went smoothly and caused little delays. The primary liaison with PPL and the college was the utility's account representative. PPL and the college report that JCP&L was quite supportive of the project. The 60 percent reimbursement of installed costs was made through the New Jersey Clean Energy Fund, which is in turn funded through utility contributions. The Department of Energy provided an additional $250,000 grant under the Department of Defense fuel cell buy down program. PPL started testing the fuel cell on October 31, 2003. Final acceptance of the fuel cell was completed on December 21, 2003. Following several months of start-up activities, a high availability factor and few operating difficulties have marked operations during the first year.

  8. 78 FR 14283 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2013-03-05

    .... SUPPLEMENTARY INFORMATION: The Defense Finance and Accounting Service notices for systems of records subject to..., DoD. ] ACTION: Notice to alter a system of records. SUMMARY: The Defense Finance and Accounting.... Outlaw, Defense Finance and Accounting Service, Freedom of Information/Privacy Act Program Manager...

  9. 76 FR 28757 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2011-05-18

    ... disposal: Records are maintained for five years (5) or five (5) years after completion of specified program... of the Secretary Privacy Act of 1974; System of Records AGENCY: Office of the Secretary, DoD. ACTION: Notice to Add a System of Records. SUMMARY: The Office of the Secretary of Defense proposes to add a...

  10. 78 FR 29786 - Computer Matching and Privacy Protection Act of 1988; Report of Matching Program: RRB and State...

    Science.gov (United States)

    2013-05-21

    ... Computer Matching and Privacy Protection Act of 1988; Report of Matching Program: RRB and State Medicare... computer matching program due to expire on May 24, 2013. SUMMARY: As required by the Privacy Act of 1974.... Grant, Chief Privacy Officer, Railroad Retirement Board, 844 North Rush Street, Chicago, Illinois 60611...

  11. DoD Program for Stability of Civilian Employment: Policies, Procedures, and Programs Manual

    Science.gov (United States)

    1990-09-01

    ITEM I AREA SELFCT A. Sl . 1 .. Il.. Ilot s orl ra 4-1.4d .. ch. P’.."’,11 ’~r Plopr. by 7--*.. Re;.. C-’ý ".... .. I a n .’-, 3 n p... dd bya.np a - -dr...sickle cell disease, leukemia, hemophilia) 83 Diabetes ............................................................... 84 C-3 DoD 1400.20-1-M

  12. Military Personnel: DOD Needs More Complete Data on Active-Duty Servicemembers Use of Food Assistance Programs

    Science.gov (United States)

    2016-07-01

    component military personnel, military retired members, DOD civilian personnel (including foreign -national direct and indirect hires, as well as...1) limited awareness of some food assistance programs (2) stigma associated with receiving food assistance; and (3) misconceptions about military...that they believe a societal stigma exists generally for those who use food assistance. Officials at one installation added that the self- sufficient

  13. Department of Defense (DOD) renewables and energy efficiency planning (REEP) program manual

    Energy Technology Data Exchange (ETDEWEB)

    Nemeth, R.J.; Fournier, D.; Debaillie, L.; Edgar, L.; Stroot, P.; Beasley, R.; Edgar, D.; McMillen, L.; Marren, M.

    1995-08-01

    The Renewables and Energy Efficiency Planning (REEP) program was developed at the US Army Construction Engineering Research Laboratories (USACERL). This program allows for the analysis of 78 energy and water conservation opportunities at 239 major DOD installations. REEP uses a series of algorithms in conjunction with installation specific data to estimate the energy and water conservation potential for entire installations. The program provides the energy, financial, pollution, and social benefits of conservation initiatives. The open architecture of the program allows for simple modification of energy and water conservation variables, and installation database values to allow for individualized analysis. The program is essentially a high-level screening tool that can be used to help identify and focus preliminary conservation studies. The REEP program requires an IBM PC or compatible with a 80386 or 80486 microprocessor. It also requires approximately 4 megabytes of disk space and at least 8 megabytes of RAM. The system was developed for a Windows environment and requires Microsoft Windows 3.1{trademark} or higher to run properly.

  14. Building Partner Capacity: DOD Should Improve Its Reporting to Congress on Challenges to Expanding Ministry of Defense Advisors Program

    Science.gov (United States)

    2015-02-11

    Ministry of Defense Advisors ( MODA ) program more slowly than planned. It had 2 advisors in the field in Kosovo and Montenegro for most of fiscal year...approval process and with advisor recruitment and training. DOD has met most but not all legislative requirements for the MODA program. As required by...of each Global MODA deployment, which could help Congress assess the value of the program in relation to other capacity-building efforts (see figure

  15. 78 FR 15731 - Privacy Act of 1974; Computer Matching Program

    Science.gov (United States)

    2013-03-12

    ... status information contained within the DHS-USCIS Verification Information System (VIS). The immigration... Homeland Security/U.S. Citizenship and Immigration Services. ACTION: Notice. Overview Information: Privacy.... Citizenship and Immigration Services and the Texas Workforce Commission. SUPPLEMENTARY INFORMATION: The...

  16. 75 FR 17788 - Privacy Act of 1974; Computer Matching Program

    Science.gov (United States)

    2010-04-07

    ... Government Reform of the House of Representatives and the Office of Information and Regulatory Affairs...: James Sparrow on (202) 606-1803. SUPPLEMENTARY INFORMATION: A. General The Privacy Act (5 U.S.C. 552a...

  17. 75 FR 31819 - Privacy Act of 1974; Computer Matching Program

    Science.gov (United States)

    2010-06-04

    ... Government Reform of the House of Representatives and the Office of Information and Regulatory Affairs...: James Sparrow on (202) 606-1803. SUPPLEMENTARY INFORMATION: A. General The Privacy Act (5 U.S.C. 552a...

  18. 75 FR 63524 - Computer Matching and Privacy Protection Act of 1988; Report of Matching Program: RRB and State...

    Science.gov (United States)

    2010-10-15

    ... Computer Matching and Privacy Protection Act of 1988; Report of Matching Program: RRB and State Medicare... required by the Computer Matching and Privacy Protection Act of ] 1988, the RRB is issuing a public notice... Matching and Privacy Protection Act of 1988, Public Law 100-503, requires a Federal agency participating in...

  19. Data Science at the Defense Personnel and Security Research Center. Mission: Improve the Effectiveness, Efficiency, and Fairness of DoD Personnel Security and Suitability Programs

    Science.gov (United States)

    2015-05-14

    Mission: Improve the Effectiveness, Efficiency, and Fairness of DoD Personnel Security and Suitability Programs Report Documentation Page Form... fairness of personnel security in the DoD In the wake of events like 9-11, Ft. Hood, and the Washington Navy Yard shootings, we expanded our

  20. Military Education: Improved Oversight and Management Needed for DOD's Fellowship and Training-with-Industry Programs. Report to Congressional Committees. GAO-12-367

    Science.gov (United States)

    Farrell, Brenda S.

    2012-01-01

    The Department of Defense (DOD), which includes the military services, selects mid- to upper-career-level military officers to participate in fellowship and training-with-industry programs conducted at non-DOD organizations such as universities, think tanks, private corporations, federal agencies, and Congress. For some fellowships, the military…

  1. 78 FR 18932 - Public Meeting: Unmanned Aircraft Systems Test Site Program; Privacy Approach

    Science.gov (United States)

    2013-03-28

    ... Federal Aviation Administration 14 CFR Part 91 Public Meeting: Unmanned Aircraft Systems Test Site Program... privacy policy approach for the unmanned aircraft systems (UAS) test site program. The FAA is seeking the... unmanned aircraft systems in to the National Airspace System. The overall purpose of this test site program...

  2. DOD Business Systems Modernization: Key Navy Programs' Compliance with DOD's Federated Business Enterprise Architecture Needs to be Adequately Demonstrated

    National Research Council Canada - National Science Library

    Hite, Randolph C; Lakhmani, Neela; Barkakati, Nabajyoti; Doherty, Neil; Glover, Nancy; Longcore, Emily; Holland, Michael; Le, Anh; Leiling, Josh; McCracken, Lee; Srikanth, Sushmita

    2008-01-01

    .... In particular, the programs BEA compliance assessments did not: * Include all relevant architecture products, such as products that specify the technical standards needed to promote interoperability among related systems...

  3. 78 FR 15732 - Privacy Act of 1974; Computer Matching Program

    Science.gov (United States)

    2013-03-12

    ... Verification Information System (VIS). The immigration status information will enable CA-DHCS to determine... Homeland Security/U.S. Citizenship and Immigration Services. ACTION: Notice. Overview Information: Privacy.... SUPPLEMENTARY INFORMATION: The Department of Homeland Security/U.S. Citizenship and Immigration Services...

  4. 78 FR 15734 - Privacy Act of 1974; Computer Matching Program

    Science.gov (United States)

    2013-03-12

    ... contained within the DHS/USCIS Verification Information System (VIS). The immigration status information... Homeland Security/U.S. Citizenship and Immigration Services. ACTION: Notice. Overview Information: Privacy... Assistance. SUPPLEMENTARY INFORMATION: The Department of Homeland Security/U.S. Citizenship and Immigration...

  5. 78 FR 38724 - Privacy Act of 1974; Computer Matching Program

    Science.gov (United States)

    2013-06-27

    ... access to immigration status information contained within the DHS/USCIS Verification Information System... Homeland Security/U.S. Citizenship and Immigration Services. ACTION: Notice. Overview Information: Privacy... California Department of Social Services. SUPPLEMENTARY INFORMATION: The Department of Homeland Security/U.S...

  6. 78 FR 15733 - Privacy Act of 1974; Computer Matching Program

    Science.gov (United States)

    2013-03-12

    ... information contained within the DHS/USCIS Verification Information System (VIS). The immigration status... Homeland Security/U.S. Citizenship and Immigration Services. ACTION: Notice. Overview Information: Privacy... Workforce Development. SUPPLEMENTARY INFORMATION: The Department of Homeland Security/U.S. Citizenship and...

  7. 78 FR 24124 - National Guard Bureau Privacy Program

    Science.gov (United States)

    2013-04-24

    ... themselves so as to avoid the civil liability and criminal penalties provided for under 5 U.S.C. 552a. Sec... Civil Liberties Office (DPCLO), or the respective service (Air Force or Army) that the reporting of... of the OIP shall forward complete SORNs to the Defense Privacy and Civil Liberties Office (DPCLO), or...

  8. Military Personnel: Actions Needed to Strengthen Implementation and Oversight of DOD's and the Coast Guard's Sexual Assault Prevention and Response Programs

    National Research Council Canada - National Science Library

    Farrell, Brenda S; Wasleski, Marilyn K; Chan, Joanna; Davis, Pawnee A; Harms, K. N; Johnson, Wesley A; La Due Lake, Ronald; Miller, Amanda K; Weissman, Cheryl A

    2008-01-01

    .... Though not required to do so, the Coast Guard has established a similar policy. This statement addresses implementation and oversight of DoD's and the Coast Guard's programs to prevent and respond to sexual assault incidents...

  9. 76 FR 18741 - Privacy Act of 1974; System of Records-Evaluation of Teacher Residency Programs

    Science.gov (United States)

    2011-04-05

    ... identity. RECORD SOURCE CATEGORIES: This system contains records on residents, mentors, teachers, and... Privacy Act of 1974; System of Records--Evaluation of Teacher Residency Programs AGENCY: Institute of...) publishes this notice of a new system of records entitled ``Evaluation of Teacher Residency Programs'' (18...

  10. 75 FR 53005 - Privacy Act of 1974, as amended; Notice of Computer Matching Program (Railroad Retirement Board...

    Science.gov (United States)

    2010-08-30

    ... Privacy Act of 1974, as amended; Notice of Computer Matching Program (Railroad Retirement Board and Social... computer-matching program with the Social Security Administration (SSA). The purpose of this notice is to... Federal agencies when records contained in a Privacy Act System of Records are matched with other Federal...

  11. 77 FR 74913 - Privacy Act of 1974, as Amended; Computer Matching Program (Social Security Administration (SSA...

    Science.gov (United States)

    2012-12-18

    ... From the Federal Register Online via the Government Publishing Office SOCIAL SECURITY ADMINISTRATION Privacy Act of 1974, as Amended; Computer Matching Program (Social Security Administration (SSA)/Office of Personnel Management (OPM))--Match Number 1307 AGENCY: Social Security Administration. ACTION...

  12. The DoD's High Performance Computing Modernization Program - Ensuing the National Earth Systems Prediction Capability Becomes Operational

    Science.gov (United States)

    Burnett, W.

    2016-12-01

    The Department of Defense's (DoD) High Performance Computing Modernization Program (HPCMP) provides high performance computing to address the most significant challenges in computational resources, software application support and nationwide research and engineering networks. Today, the HPCMP has a critical role in ensuring the National Earth System Prediction Capability (N-ESPC) achieves initial operational status in 2019. A 2015 study commissioned by the HPCMP found that N-ESPC computational requirements will exceed interconnect bandwidth capacity due to the additional load from data assimilation and passing connecting data between ensemble codes. Memory bandwidth and I/O bandwidth will continue to be significant bottlenecks for the Navy's Hybrid Coordinate Ocean Model (HYCOM) scalability - by far the major driver of computing resource requirements in the N-ESPC. The study also found that few of the N-ESPC model developers have detailed plans to ensure their respective codes scale through 2024. Three HPCMP initiatives are designed to directly address and support these issues: Productivity Enhancement, Technology, Transfer and Training (PETTT), the HPCMP Applications Software Initiative (HASI), and Frontier Projects. PETTT supports code conversion by providing assistance, expertise and training in scalable and high-end computing architectures. HASI addresses the continuing need for modern application software that executes effectively and efficiently on next-generation high-performance computers. Frontier Projects enable research and development that could not be achieved using typical HPCMP resources by providing multi-disciplinary teams access to exceptional amounts of high performance computing resources. Finally, the Navy's DoD Supercomputing Resource Center (DSRC) currently operates a 6 Petabyte system, of which Naval Oceanography receives 15% of operational computational system use, or approximately 1 Petabyte of the processing capability. The DSRC will

  13. Afghan National Army: DOD Has Taken Steps to Remedy Poor Management of Vehicle Maintenance Program

    Science.gov (United States)

    2016-07-01

    professional technical services and management support services to both public- and private-sector clients . 2 DOD had previously awarded a $237.2...million firm-fixed-price contract to Pacific Architects and Engineers, Inc. to provide vehicle maintenance, apprenticeship training, and supply chain

  14. 76 FR 39119 - Privacy Act of 1974; Notice of a Computer Matching Program Between the Department of Housing and...

    Science.gov (United States)

    2011-07-05

    ... URBAN DEVELOPMENT Privacy Act of 1974; Notice of a Computer Matching Program Between the Department of Housing and Urban Development (HUD) and the United States Department of Education (ED) AGENCY: Office of... Donna Robinson-Staton, Chief Privacy Officer, Department of Housing and Urban Development, Office of the...

  15. Battleplan for an Unqualified Opinion: How Does the DoD FM Certification Program Help Fix the DoD’s Audit Problem

    Science.gov (United States)

    2016-02-29

    ACSC/2016 AIR COMMAND AND STAFF COLLEGE AIR UNIVERSITY Battleplan for an Unqualified Opinion : How Does the DoD FM Certification...management systems to meet the requirements needed for an unqualified audit opinion ...the public’s opinion on government agencies ability to perform financial management is at an all-time low.2 The federal government has the

  16. Agile Methods and Request for Change (RFC): Observations from DoD Acquisition Programs

    Science.gov (United States)

    2014-01-01

    projects describe the type and size of the software development, and the schedule and labor resources needed for the development. • The treatment of COTS...the Defense Acquisition System, 2 December 2008. http://www.dtic.mil/whs/directives/corres/pdf/500002p.pdf [DoD 2011a] Department of Defense. DTM ...11-009, Directive-Type Memorandum ( DTM ) 11-009, Acquisition Policy for Defense Business Systems (DBS), 23 June 2011. https://dap.dau.mil/policy

  17. DoD Information Security Program and Protection of Sensitive Compartmented Information (SCI)

    Science.gov (United States)

    2016-04-21

    classified, safeguarded, and declassified in accordance with References (c), (d), and DoD Manual 5200.01 (Reference (i)). CUI will be identified...Information will not be classified, continue to be maintained as classified, or fail to be declassified , or be designated CUI under any circumstances in...compliance with established SCI security policies and procedures. (a) Issues reports detailing any deficiencies noted and corrective action required

  18. Joint Exercise Program: DOD Needs to Take Steps to Improve the Quality of Funding Data

    Science.gov (United States)

    2017-02-01

    training exercises. These exercises are primarily aimed at developing the skills needed by U.S. forces to operate in a joint environment and can...military services to build trust and relationships with one another, U.S. allies, and potential partners while developing the skills necessary to...of forces; diplomatic (political and military) considerations; and real world events, such as natural disasters. Though DOD officials stated that

  19. Defense Supplier Base: DOD Should Leverage Ongoing Initiatives in Developing Its Program to Mitigate Risk of Counterfeit Parts

    Science.gov (United States)

    2010-03-01

    titanium, used in fighter jet engine mounts. Brake shoes Brake shoes were made with substandard materials, including seaweed . Source: DOD. DOD does...15The Center for Advanced Life Cycle Engineering is an electronic products and systems research center...company. These brake shoes were made with various materials, including seaweed . U.S. customs agents had already seized the brake shoes and DOD never

  20. 76 FR 11435 - Privacy Act of 1974; Computer Matching Program

    Science.gov (United States)

    2011-03-02

    ... Federal student financial assistance, and the ED personal information number (PIN) Registration System of Records (18-11-12), which contains the applicant's information to receive an ED PIN, will be matched... Dates of the Matching Program This matching program must be approved by the Data Integrity Board of each...

  1. Privacy Impact Assessment for the Wellness Program Medical Records

    Science.gov (United States)

    The Wellness Program Medical Records System collects contact information and other Personally Identifiable Information (PII). Learn how this data is collected, used, accessed, the purpose of data collection, and record retention policies.

  2. 78 FR 21713 - Privacy Act of 1974: Computer Matching Program

    Science.gov (United States)

    2013-04-11

    ..., and the Office of Management and Budget (OMB) Guidelines on the Conduct of Matching Programs, notice... cost of medical care. These veterans supply household income information that includes their spouses and dependents at the time of application for VA health care benefits. DATES: Effective Date: This...

  3. 76 FR 47299 - Privacy Act of 1974: Computer Matching Program

    Science.gov (United States)

    2011-08-04

    ..., and the Office of Management and Budget (OMB) Guidelines on the Conduct of Matching Programs, notice... cost of medical care. These veterans supply household income information that includes their spouses and dependents at the time of application for VA health care benefits. DATES: Effective Date: This...

  4. 78 FR 50146 - Privacy Act of 1974: Computer Matching Program

    Science.gov (United States)

    2013-08-16

    ..., and the Office of Management and Budget (OMB) Guidelines on the Conduct of Matching Programs, notice... care. These veterans supply household income information that includes their spouses and dependents at the time of application for VA health care benefits. DATES: Effective Date: The effective (start) date...

  5. 75 FR 54966 - Privacy Act of 1974: Computer Matching Program

    Science.gov (United States)

    2010-09-09

    ..., and the Office of Management and Budget (OMB) Guidelines on the Conduct of Matching Programs, notice... cost of medical care. These veterans supply household income information that includes their spouses and dependents at the time of application for VA health care benefits. DATES: Effective Date: This...

  6. 78 FR 1275 - Privacy Act of 1974; Computer Matching Program

    Science.gov (United States)

    2013-01-08

    ...: Notice--computer matching between the Office of Personnel Management and the Social Security... matching program with the Social Security Administration (SSA). DATES: OPM will file a report of the..., as amended, regulates the use of computer matching by Federal agencies when records in a system of...

  7. 77 FR 74518 - Privacy Act of 1974; Computer Matching Program

    Science.gov (United States)

    2012-12-14

    ...: Notice--computer matching between the Office of Personnel Management and the Social Security... Personnel Management (OPM) is publishing notice of its new computer matching program with the Social... matching by Federal agencies when records in a system of records are matched with other Federal, State, or...

  8. 75 FR 69988 - Privacy Act of 1974; Computer Matching Program

    Science.gov (United States)

    2010-11-16

    ... section 5301 of the Anti-Drug Abuse Act of 1988, and which was amended and redesignated as section 421 of... Abuse Act of 1988, Pub. L. 100-690, 21 U.S.C. 853a, which was amended and redesignated as section 421 of... court orders issued pursuant to the Denial of Federal Benefits Program. 3. Authority for Conducting the...

  9. 75 FR 12226 - Privacy Act of 1974; Computer Matching Program

    Science.gov (United States)

    2010-03-15

    ...; the Academic Competitiveness Grant Program; the National Science and Mathematics Access to Retain... (FRS), toll free, at 1-800-877-8339. Individuals with disabilities can obtain this document in an... person listed in the preceding paragraph. Electronic Access to This Document You can view this document...

  10. 78 FR 25853 - Defense Logistics Agency Privacy Program

    Science.gov (United States)

    2013-05-03

    ... impact of entitlements, grants, user fees, or loan programs, or the rights and obligations of recipients.... The exemption does not apply to information compiled in anticipation of criminal actions or...). If an individual, however, is denied any right, privilege, or benefit for which he would otherwise be...

  11. 78 FR 31955 - Privacy Act of 1974; Department of Homeland Security National Protection and Programs Directorate...

    Science.gov (United States)

    2013-05-28

    ... SECURITY Office of the Secretary Privacy Act of 1974; Department of Homeland Security National Protection... extends administrative Privacy Act protections to all individuals when systems of records maintain...: Department of Homeland Security, Privacy Office. ACTION: Notice of Privacy Act System of Records. SUMMARY: In...

  12. 76 FR 12397 - Privacy Act of 1974, as Amended; Computer Matching Program (SSA/Bureau of the Public Debt (BPD...

    Science.gov (United States)

    2011-03-07

    ... ADMINISTRATION Privacy Act of 1974, as Amended; Computer Matching Program (SSA/ Bureau of the Public Debt (BPD... Computer Matching Program, SSA with the Bureau of the Public Debt (BPD) A. Participating Agencies SSA and... will be available for public inspection at this address. FOR FURTHER INFORMATION CONTACT: The Executive...

  13. 76 FR 12398 - Privacy Act of 1974, as Amended; Computer Matching Program (SSA/Bureau of the Public Debt (BPD...

    Science.gov (United States)

    2011-03-07

    ... ADMINISTRATION Privacy Act of 1974, as Amended; Computer Matching Program (SSA/ Bureau of the Public Debt (BPD... Computer Matching Program, SSA With the Bureau of the Public Debt (BPD) A. Participating Agencies SSA and... will be available for public inspection at this address. FOR FURTHER INFORMATION CONTACT: The Executive...

  14. 78 FR 34678 - Privacy Act of 1974, as Amended; Notice of Computer Matching Program (Railroad Retirement Board...

    Science.gov (United States)

    2013-06-10

    ... of Social Security Number (SSN) Holders and SSN Applications (the Enumeration System); 75 FR 82121... Privacy Act of 1974, as Amended; Notice of Computer Matching Program (Railroad Retirement Board and Social...-matching program with the Social Security Administration (SSA). The purpose of this notice is to advise...

  15. Management Controls Over the FY 2000 National Drug Control Program Funds Managed Through the DOD Central Transfer Account

    National Research Council Canada - National Science Library

    2001-01-01

    Introduction. This audit was performed to support the attestation review of the annual DoD Drug Control Obligation Report required by the Office of National Drug Control Policy Reauthorization Act of 1998 (Public Law 105-277...

  16. Joint Warfighting and Readiness: DoD Execution of the Warsaw Initiative Program

    National Research Council Canada - National Science Library

    Prinzbach, Robert F., II; Conway, Dennis L; Stanfield, Clara L; Pack, Tomasa; Stephenson, Susann L; Carvalho, Sharon L

    2005-01-01

    .... In January 1994, the North Atlantic Treaty Organization (NATO) launched the Partnership for Peace program, which provides assistance to countries seeking cooperative military and peacekeeping relations with NATO...

  17. 77 FR 38880 - Privacy Act of 1974, as Amended; Computer Matching Program (SSA/Railroad Retirement Board (SSA...

    Science.gov (United States)

    2012-06-29

    ... From the Federal Register Online via the Government Publishing Office SOCIAL SECURITY ADMINISTRATION Privacy Act of 1974, as Amended; Computer Matching Program (SSA/ Railroad Retirement Board (SSA/RRB))--Match Number 1308 AGENCY: Social Security Administration (SSA). ACTION: Notice of a renewal of...

  18. 77 FR 32709 - Privacy Act of 1974, as Amended; Computer Matching Program (SSA/Department of Homeland Security...

    Science.gov (United States)

    2012-06-01

    ... From the Federal Register Online via the Government Publishing Office ] SOCIAL SECURITY ADMINISTRATION Privacy Act of 1974, as Amended; Computer Matching Program (SSA/ Department of Homeland Security (DHS))--Match Number 1010 AGENCY: Social Security Administration (SSA). ACTION: Notice of a renewal of...

  19. 78 FR 51264 - Privacy Act of 1974, as Amended; Computer Matching Program (SSA/Department of the Treasury...

    Science.gov (United States)

    2013-08-20

    ... From the Federal Register Online via the Government Publishing Office SOCIAL SECURITY ADMINISTRATION Privacy Act of 1974, as Amended; Computer Matching Program (SSA/ Department of the Treasury/Internal Revenue Service (IRS))--Match Number 1016 AGENCY: Social Security Administration (SSA). ACTION...

  20. Agile Software Teams: How They Engage with Systems Engineering on DoD Acquisition Programs

    Science.gov (United States)

    2014-07-01

    software malleability —Software is the most easily changed element in a system since no “remanufacturing” of completed hardware components is required...without being called out in that role explicitly, and they have a positive perception of the practices being used, espe- cially the iteration...reviews, and the associated program office is reported to be planning to execute an ACAT 1D program in the future with alternative life-cycle language

  1. Predicting Cost Growth Using Programs Reviews and Milestones for DoD Aircraft

    Science.gov (United States)

    2016-03-24

    growth, percent of programs with cost growth, mean, median, standard deviation, interquartile range, minimum, and maximum. We used Microsoft Excel to...rc en t t ot al  c os t g ro w th Percent Program Completion Mean: % Complete vs % Total Cost  Growth Development Procurement Total 0% 20% 40% 60% 80...100% 120% 0% 20% 40% 60% 80% 100% Pe rc en t t ot al  c os t g ro w th Percent Program Completion Median: % Complete vs % Total Cost  Growth

  2. 2010 Department of Defense (DoD) Chemical and Biological Defense Program (CBDP) Portfolio

    Science.gov (United States)

    2010-03-01

    26 FW OT&E MBU-25/26 FW When integrated with antigravity (anti-G) equipment, the MBU-25 and MBU-26 each provide simultaneous CB protection and anti...Analysis of Materiel Approaches anti-G .............. Antigravity APB .................Acquisition Program Baseline APG

  3. DoD Science and Engineering Apprenticeship Program for High School Students, 1996-󈨥 Activities

    Science.gov (United States)

    1997-05-01

    Science Fair, A Honor Roll Baseball, Cross Country, Athletics, Weightlifting , Computers Robert Sidney Cox, III Other Male Leon High School...Sports Medicine Honor Roll Weightlifting , Swimming Marcus Mills Black Male Godby High School Florida State University Undecided FSU Incentive...mountains on the atmospheric jet stream, and two assisted in data analysis using computer programs on PCs and the VAX. These activities were part of a

  4. DoD Science and Engineering Apprenticeship Program for High School Students, 1995-󈨤 Activities

    Science.gov (United States)

    1996-06-01

    University of Florida Sports Medicine Honor Roll Weightlifting , Swimming NAME: RACE: SEX: HIGH SCHOOL: ANTICIPATED COLLEGE: ANTICIPATED MAJOR...experiments that simulate the influence of mountains on the atmospheric jet stream, and two assisted in data analysis using computer programs on PCs and the...participated during the summer was the analysis of photo- graphic velocity data from laboratory experiments on the interaction of topography with baroclinic

  5. Appraisal and analysis of opportunities for a joint DOE/DOD energy demonstration program. Final report. [Includes possible site information

    Energy Technology Data Exchange (ETDEWEB)

    Ziem, R.W.

    1980-05-01

    The basic objective of this study was to assess the potential for cooperative projects between the Department of Energy (DOE) and the Department of Defense (DOD) in areas concerned with the development of Total Energy (TE) Systems and to do the groundwork and liaison necessary to initiate those projects. The scope of the potential joint projects includes cooperative effort in the development and test of a variety of heat engines (prime movers) capable of utilizing coal as well as synthetic liquid fuels derived from coal and oil shale; as well as the indication of potential Military Department sites which would be suitable for the demonstration of TE systems based on a variety of such prime movers. In order to accomplish the objective of the study, it was necessary to review a large number of DOD studies and plans and to discuss the objective of the TETAS studies with a large number of Military Department people. The DOD recognizes the requirement for an assured energy supply and the need to learn how to use the synthetic fuels from coal and shale being developed by the DOE. The need to modify engine systems to adapt them to differing fuel characteristics and make those engines more flexible relative to the range of fuels they will accept is clear. What is not so clear is the fact that the DOD has a much greater opportunity to conserve energy in now inefficient facility operations than it has in mobility operations which must continue to stress mission and high performance. This report indicates guidelines for the conduct of joint projects between the DOE and the DOD which can aid both in meeting their energy objective.

  6. First Applications of DoD Iridium RUDICS in the NSF Polar Programs

    Science.gov (United States)

    Valentic, T.; Stehle, R.

    2008-12-01

    We will present the first deployment and application of the new Iridium RUDICS service to remote instrumentation projects within the National Science Foundation's polar programs. The rise of automated observing networks has increased the demand for real-time connectivity to remote instruments, not only for immediate access to data, but to also interrogate health and status. Communicating with field sites in the polar regions is complicated by the remoteness from existing infrastructure, low temperatures and limited connection options. Sites located above 78° latitude are not able to see geostationary satellites, leaving the Iridium constellation as the only one that provide a direct connection. Some others, such as Orbcomm, only provide a store-and-forward service. Iridium is often used as a dial up modem to establish a PPP connection to the Internet with data files transferred via FTP. On low-bandwidth, high-latency networks like Iridium (2400bps with ping times of seconds), this approach is time consuming and inefficient. The dial up time alone takes upwards of a minute, and standard TCP/IP and FTP protocols are hampered by the long latencies. Minimizing transmission time is important for reducing battery usage and connection costs. The new Iridium RUDICS service can be used for more efficient transfers. RUDICS is an acronym for "Router-based Unstructured Digital Inter-working Connectivity Solution" and provides a direct connection between an instrument in the field and a server on the Internet. After dialing into the Iridium gateway, a socket connection is opened to a registered port on a user's server. Bytes sent to or from the modem appear at the server's socket. The connection time is reduced to about 10 seconds because the modem training and PPP negotiation stages are eliminated. The remote device does not need to have a full TCP/IP stack, allowing smaller instruments such as data loggers to directly handle the data transmission. Alternative protocols can

  7. 77 FR 43814 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2012-07-26

    ... counter foreign intelligence and terrorist threats to the DoD and the United States. The system of records... of the Secretary Privacy Act of 1974; System of Records AGENCY: Defense Intelligence Agency, DoD. ACTION: Notice to alter a System of Records. SUMMARY: The Defense Intelligence Agency is proposing to...

  8. 77 FR 39748 - Computer Matching and Privacy Protection Act of 1988; Report of Matching Program: RRB and State...

    Science.gov (United States)

    2012-07-05

    ...] [FR Doc No: 2012-16384] RAILROAD RETIREMENT BOARD Computer Matching and Privacy Protection Act of 1988.... General The Computer Matching and Privacy Protection Act of 1988 (Pub. L. 100-503), amended the Privacy... amended the Privacy Act regarding protection for such persons. The Privacy Act, as amended, regulates the...

  9. A linear programming model for preserving privacy when disclosing patient spatial information for secondary purposes.

    Science.gov (United States)

    Jung, Ho-Won; El Emam, Khaled

    2014-05-29

    A linear programming (LP) model was proposed to create de-identified data sets that maximally include spatial detail (e.g., geocodes such as ZIP or postal codes, census blocks, and locations on maps) while complying with the HIPAA Privacy Rule's Expert Determination method, i.e., ensuring that the risk of re-identification is very small. The LP model determines the transition probability from an original location of a patient to a new randomized location. However, it has a limitation for the cases of areas with a small population (e.g., median of 10 people in a ZIP code). We extend the previous LP model to accommodate the cases of a smaller population in some locations, while creating de-identified patient spatial data sets which ensure the risk of re-identification is very small. Our LP model was applied to a data set of 11,740 postal codes in the City of Ottawa, Canada. On this data set we demonstrated the limitations of the previous LP model, in that it produces improbable results, and showed how our extensions to deal with small areas allows the de-identification of the whole data set. The LP model described in this study can be used to de-identify geospatial information for areas with small populations with minimal distortion to postal codes. Our LP model can be extended to include other information, such as age and gender.

  10. 78 FR 60265 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2013-10-01

    ... of the Secretary Privacy Act of 1974; System of Records AGENCY: Office of the Secretary, DoD. ACTION... systems of record notice from its existing inventory of record systems subject to the Privacy Act of 1974... members of the public is to make these submissions available for public viewing on the Internet at http...

  11. 78 FR 52517 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2013-08-23

    ... of the Secretary Privacy Act of 1974; System of Records AGENCY: Defense Logistics Agency, DoD. ACTION... of records in its inventory of record systems subject to the Privacy Act of 1974 (5 U.S.C. 552a), as... Internet at http://www.regulations.gov as they are received without change, including any personal...

  12. 76 FR 10008 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2011-02-23

    ... of the Secretary Privacy Act of 1974; System of Records AGENCY: Office of the Secretary, DoD. ACTION... system of records notice from its existing inventory of record systems subject to the Privacy Act of 1974... submissions available for public viewing on the Internet at http://www.regulations.gov as they are ] received...

  13. 77 FR 37002 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2012-06-20

    ... No: 2012-15041] DEPARTMENT OF DEFENSE Office of the Secretary [Docket ID: DOD-2012-OS-0072] Privacy... from its existing inventory of record systems subject to the Privacy Act of 1974 (5 U.S.C. 552a), as... submissions available for public viewing on the Internet at http://www.regulations.gov as they are received...

  14. 77 FR 37885 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2012-06-25

    ... of the Secretary Privacy Act of 1974; System of Records AGENCY: Defense Threat Reduction Agency, DoD... system of records notice in its existing inventory of record systems subject to the Privacy Act of 1974... submissions available for public viewing on the Internet at http://www.regulations.gov as they are received...

  15. 75 FR 65456 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2010-10-25

    ... of the Secretary Privacy Act of 1974; System of Records AGENCY: Department of Defense (DoD). ACTION... a system of records notice from its existing inventory of record systems subject to the Privacy Act... of the public is to make these submissions available for public viewing on the Internet at http://www...

  16. 75 FR 19626 - Privacy Act of 1974; Systems of Records

    Science.gov (United States)

    2010-04-15

    ... No: 2010-8656] DEPARTMENT OF DEFENSE Office of the Secretary [Docket ID: DOD-2010-OS-0046] Privacy... its existing inventory of records systems subject to the Privacy Act of 1974, (5 U.S.C. 552a), as... viewing on the Internet at http://www.regulations.gov as they are received without change, including any...

  17. 76 FR 39394 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2011-07-06

    ... Department of the Navy Privacy Act of 1974; System of Records AGENCY: Department of the Navy, DoD. ACTION... notice in its existing inventory of record systems subject to the Privacy Act of 1974, (5 U.S.C. 552a... the public is to make these submissions available for public viewing on the Internet at http://www...

  18. 75 FR 15694 - Privacy Act of 1974; Systems of Records

    Science.gov (United States)

    2010-03-30

    ... of the Secretary Privacy Act of 1974; Systems of Records AGENCY: Defense Logistics Agency, DoD... system of records notice in its existing inventory of records systems subject to the Privacy Act of 1974... available for public viewing on the Internet at http://www.regulations.gov as they are received without...

  19. 77 FR 77048 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2012-12-31

    ... Office of the Secretary Privacy Act of 1974; System of Records AGENCY: Defense Contract Audit Agency, DoD... system of records notice in its existing inventory of record systems subject to the Privacy Act of 1974... on the Internet at http://www.regulations.gov as they are received without change, including any...

  20. 76 FR 37329 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2011-06-27

    ... Department of the Air Force Privacy Act of 1974; System of Records AGENCY: Department of the Air Force, DoD... systems of records notice in its existing inventory of record systems subject to the Privacy Act of 1974... on the Internet at http://www.regulations.gov as they are received without change, including any...

  1. 78 FR 27198 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2013-05-09

    ... Department of the Navy Privacy Act of 1974; System of Records AGENCY: Department of the Navy, DoD. ACTION... notice in its existing inventory of record systems subject to the Privacy Act of 1974 (5 U.S.C. 552a), as... members of the public is to make these submissions available for public viewing on the Internet at http...

  2. 75 FR 63824 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2010-10-18

    ... Department of the Air Force Privacy Act of 1974; System of Records AGENCY: Department of the Air Force; DoD... a system of records notice in its existing inventory of record systems subject to the Privacy Act of... of the public is to make these submissions available for public viewing on the Internet at http://www...

  3. 75 FR 33788 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2010-06-15

    ... of the Secretary Privacy Act of 1974; System of Records AGENCY: Department of Defense, DoD. ACTION... a systems of record notice from its existing inventory of record systems subject to the Privacy Act... submissions available for public viewing on the Internet at http:// ] www.regulations.gov as they are received...

  4. 75 FR 20579 - Privacy Act of 1974; Systems of Records

    Science.gov (United States)

    2010-04-20

    ... of the Secretary Privacy Act of 1974; Systems of Records AGENCY: Defense Logistics Agency, DoD... two systems of records notice in its existing inventory of records systems subject to the Privacy Act... submissions available for public viewing on the Internet at http://www.regulations.gov as they are received...

  5. 75 FR 29728 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2010-05-27

    ... of the Secretary Privacy Act of 1974; System of Records AGENCY: Office of the Secretary, DoD. ACTION... a system of records notice from its existing inventory of record systems subject to the Privacy Act... submissions available for public viewing on the Internet at http://www.regulations.gov as they are received...

  6. 75 FR 19625 - Privacy Act of 1974; Systems of Records

    Science.gov (United States)

    2010-04-15

    ...] Privacy Act of 1974; Systems of Records AGENCY: Defense Logistics Agency, DoD. ACTION: Notice to delete a... its existing inventory of records systems subject to the Privacy Act of 1974, (5 U.S.C. 552a), as... available for public viewing on the Internet at http://www.regulations.gov as they are received without...

  7. 76 FR 10010 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2011-02-23

    ... Office of the Secretary Privacy Act of 1974; System of Records AGENCY: Defense Intelligence Agency, DoD... a system of records notice in its existing inventory of records systems subject to the Privacy Act... viewing on the Internet at http://www.regulations.gov as they are received without change, including any...

  8. 77 FR 17035 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2012-03-23

    ... Department of the Air Force Privacy Act of 1974; System of Records AGENCY: Department of the Air Force, DoD... system of records notice in its existing inventory of record systems subject to the Privacy Act of 1974... public is to make these submissions available for public viewing on the Internet at http://www...

  9. 76 FR 82286 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2011-12-30

    ... Department of the Army Privacy Act of 1974; System of Records AGENCY: Department of the Army, DoD. ACTION... notice from its existing inventory of record systems subject to the Privacy Act of 1974 (5 U.S.C. 552a... public is to make these submissions available for public viewing on the Internet at http://www...

  10. 75 FR 22570 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2010-04-29

    ... Department of the Air Force Privacy Act of 1974; System of Records AGENCY: Department of the Air Force, DoD... a system of records notice in its existing inventory of record systems subject to the Privacy Act of... submissions available for public viewing on the Internet at http://www.regulations.gov as they are received...

  11. 75 FR 17911 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2010-04-08

    ... Department of the Air Force Privacy Act of 1974; System of Records AGENCY: Department of the Air Force, DoD... a system of records notice in its existing inventory of record systems subject to the Privacy Act of... submissions available for public viewing on the Internet at http://www.regulations.gov as they are received...

  12. 75 FR 43494 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2010-07-26

    ... of the Secretary Privacy Act of 1974; System of Records AGENCY: Office of the Secretary, DoD. ACTION... a system of records notice from its existing inventory of record systems subject to the Privacy Act... of the public is to make these submissions available for public viewing on the Internet at http://www...

  13. 77 FR 60412 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2012-10-03

    ... Department of the Army Privacy Act of 1974; System of Records AGENCY: Department of the Army, DoD. ACTION... notice in its existing inventory of record systems subject to the Privacy Act of 1974, (5 U.S.C. 552a... Internet at http://www.regulations.gov as they are received without change, including any personal...

  14. 78 FR 14273 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2013-03-05

    ... of the Secretary Privacy Act of 1974; System of Records AGENCY: Defense Logistics Agency, DoD. ACTION... records notice in its existing inventory of record systems subject to the Privacy Act of 1974 (5 U.S.C... Internet at http://www.regulations.gov as they are received without change, including any personal...

  15. 75 FR 16760 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2010-04-02

    ... of the Secretary Privacy Act of 1974; System of Records AGENCY: Office of the Secretary, DoD. ACTION... records notice from its existing inventory of record systems subject to the Privacy Act of 1974 (5 U.S.C... available for public viewing on the Internet at http://www.regulations.gov as they are received without...

  16. 75 FR 17910 - Privacy Act of 1974; Systems of Records

    Science.gov (United States)

    2010-04-08

    ... of the Secretary Privacy Act of 1974; Systems of Records AGENCY: Defense Logistics Agency, DoD... system of records notice in its existing inventory of records systems subject to the Privacy Act of 1974... make these submissions available for public viewing on the Internet at http://www.regulations.gov as...

  17. 78 FR 43869 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2013-07-22

    ... Department of the Navy Privacy Act of 1974; System of Records AGENCY: Department of the Navy, DoD. ACTION... notice in its existing inventory of record systems subject to the Privacy Act of 1974 (5 U.S.C. 552a), as... Internet at http://www.regulations.gov as they are received without change, including any personal...

  18. 76 FR 22682 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2011-04-22

    ... of the Secretary Privacy Act of 1974; System of Records AGENCY: Office of the Secretary, DoD. ACTION... system of records notice from its existing inventory of record systems subject to the Privacy Act of 1974... available for public viewing on the Internet at http://www.regulations.gov as they are received without...

  19. 77 FR 4798 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2012-01-31

    ... Department of the Army Privacy Act of 1974; System of Records AGENCY: Department of the Army, DoD. ACTION... notice in its existing inventory of record systems subject to the Privacy Act of 1974 (5 U.S.C. 552a), as... available for public viewing on the Internet at http://www.regulations.gov as they are received without...

  20. 76 FR 1411 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2011-01-10

    ... Department of the Air Force Privacy Act of 1974; System of Records AGENCY: Department of the Air Force, DoD... systems of records notice in its existing inventory of record systems subject to the Privacy Act of 1974... viewing on the Internet at http://www.regulations.gov as they are received without change, including any...

  1. 75 FR 33789 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2010-06-15

    ... of the Secretary Privacy Act of 1974; System of Records AGENCY: Defense Threat Reduction Agency, DoD... a system of records notice in its existing inventory of record systems subject to the Privacy Act of... submissions available for public viewing on the Internet at http://www.regulations.gov as they are received...

  2. 75 FR 22569 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2010-04-29

    ... Department of the Air Force Privacy Act of 1974; System of Records AGENCY: Department of the Air Force, DoD... a system of records notice in its existing inventory of record systems subject to the Privacy Act of... submissions available for public viewing on the Internet at http://www.regulations.gov as they are received...

  3. 78 FR 22525 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2013-04-16

    ... of the Secretary Privacy Act of 1974; System of Records AGENCY: Defense Logistics Agency, DoD. ACTION... of records in its inventory of record systems subject to the Privacy Act of 1974 (5 U.S.C. 552a), as... members of the public is to make these submissions available for public viewing on the Internet at http...

  4. 77 FR 77047 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2012-12-31

    ... of the Secretary Privacy Act of 1974; System of Records AGENCY: Defense Contract Audit Agency, DoD... deleting a system of records in its existing inventory of record systems subject to the Privacy Act of 1974... for public viewing on the Internet at http://www.regulations.gov as they are received without change...

  5. 75 FR 33794 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2010-06-15

    ... Department of the Army Privacy Act of 1974; System of Records AGENCY: Department of the Army, DoD. ACTION... records notice from its existing inventory of record systems subject to the Privacy Act of 1974, (5 U.S.C... available for public viewing on the Internet at http://www.regulations.gov as they are received without...

  6. 75 FR 47797 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2010-08-09

    ... Defense Logistics Agency Privacy Act of 1974; System of Records AGENCY: Defense Logistics Agency, DoD... a system of records notice in its existing inventory of records systems subject to the Privacy Act... of the public is to make these submissions available for public viewing on the Internet at http://www...

  7. 75 FR 10476 - Privacy Act of 1974; Systems of Records

    Science.gov (United States)

    2010-03-08

    ... of the Secretary Privacy Act of 1974; Systems of Records AGENCY: Defense Logistics Agency, DoD... system of records notice in its existing inventory of records systems subject to the Privacy Act of 1974... available for public viewing on the Internet at http://www.regulations.gov as they are received without...

  8. 78 FR 44102 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2013-07-23

    ... Department of the Army Privacy Act of 1974; System of Records AGENCY: Department of the Army, DoD. ACTION... records notices in its existing inventory of record systems subject to the Privacy Act of 1974 (5 U.S.C... Internet at http://www.regulations.gov as they are received without change, including any personal...

  9. 75 FR 52517 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2010-08-26

    ... of the Secretary Privacy Act of 1974; System of Records AGENCY: Department of Defense (DoD). ACTION... a system of records notice from its existing inventory of record systems subject to the Privacy Act... of the public is to make these submissions available for public viewing on the Internet at http://www...

  10. 75 FR 67703 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2010-11-03

    ... Department of the Army Privacy Act of 1974; System of Records AGENCY: The Department of the Army, DoD. ACTION... notice from its existing inventory of record systems subject to the Privacy Act of 1974, (5 U.S.C. 552a... viewing on the Internet at http://www.regulations.gov as they are received without change, including any...

  11. 75 FR 30003 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2010-05-28

    ... of the Secretary Privacy Act of 1974; System of Records AGENCY: Defense Intelligence Agency, DoD... a system of records notice in its existing inventory of records systems subject to the Privacy Act... submissions available for public viewing on the Internet at http://www.regulations.gov as they are received...

  12. 75 FR 39921 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2010-07-13

    ... of the Secretary Privacy Act of 1974; System of Records AGENCY: Defense Logistics Agency; DoD. ACTION... of records notice in its existing inventory of records systems subject to the Privacy Act of 1974, (5... submissions available for public viewing on the Internet at http://www.regulations.gov as they are received...

  13. 77 FR 60400 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2012-10-03

    ... of the Secretary Privacy Act of 1974; System of Records AGENCY: Office of the Secretary, DoD. ACTION... system of records notice from its existing inventory of record systems subject to the Privacy Act of 1974... for public viewing on the Internet at http://www.regulations.gov as they are received without change...

  14. 78 FR 14279 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2013-03-05

    ... of the Secretary Privacy Act of 1974; System of Records AGENCY: Defense Logistics Agency, DoD. ACTION... records notices in its existing inventory of record systems subject to the Privacy Act of 1974 (5 U.S.C... Internet at http://www.regulations.gov as they are received without change, including any personal...

  15. 76 FR 11213 - Privacy Act of 1974; Systems of Records

    Science.gov (United States)

    2011-03-01

    ... of the Secretary Privacy Act of 1974; Systems of Records AGENCY: Defense Logistics Agency, DoD... system of records notice in its existing inventory of records systems subject to the Privacy Act of 1974... on the Internet at http://www.regulations.gov as they are received without change, including any...

  16. 77 FR 26260 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2012-05-03

    ... of the Secretary Privacy Act of 1974; System of Records AGENCY: Defense Intelligence Agency, DoD... a system of records notice in its existing inventory of records systems subject to the Privacy Act... viewing on the Internet at http://www.regulations.gov as they are received without change, including any...

  17. 75 FR 55576 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2010-09-13

    ... of the Secretary Privacy Act of 1974; System of Records AGENCY: Department of Defense (DoD). ACTION... a system of records notice from its existing inventory of record systems subject to the Privacy Act... of the public is to make these submissions available for public viewing on the Internet at http://www...

  18. 78 FR 6078 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2013-01-29

    ... of the Secretary Privacy Act of 1974; System of Records AGENCY: Defense Logistics Agency, DoD. ACTION... records notice in its existing inventory of record systems subject to the Privacy Act of 1974 (5 U.S.C... Internet at http:// ] www.regulations.gov as they are received without change, including any personal...

  19. 76 FR 1409 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2011-01-10

    ... of the Secretary Privacy Act of 1974; System of Records AGENCY: Office of the Secretary, DoD. ACTION... system of records notice from its existing inventory of record systems subject to the Privacy Act of 1974... available for public viewing on the Internet at http://www.regulations.gov as they are received without...

  20. 78 FR 73511 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2013-12-06

    ... Privacy Act of 1974; System of Records AGENCY: Department of the Navy, DoD. ACTION: Notice to delete a... existing inventory of record systems subject to the Privacy Act of 1974, as amended. The system being... public is to make these submissions available for public viewing on the Internet at http://www...

  1. 78 FR 78946 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2013-12-27

    ... of the Secretary Privacy Act of 1974; System of Records AGENCY: Office of the Inspector General, DoD... inventory of record systems subject to the Privacy Act of 1974 (5 U.S.C. 552a), as amended. This system... submissions available for public viewing on the Internet at http://www.regulations.gov as they are received...

  2. 78 FR 45185 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2013-07-26

    ... From the Federal Register Online via the Government Publishing Office DEPARTMENT OF DEFENSE Office... identifiers or contact information. FOR FURTHER INFORMATION CONTACT: Mark Dorgan, DoD IG FOIA/Privacy Office... records subject to the Privacy Act of 1974 (5 U.S.C. 552a), as amended, have been published in the Federal...

  3. 75 FR 42719 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2010-07-22

    ... Information Assurance and Privacy Act training. RETENTION AND DISPOSAL: Records are destroyed when 2 years old... Department of the Navy Privacy Act of 1974; System of Records AGENCY: Department of the Navy, DoD. ACTION: Notice to add a new system of records. SUMMARY: The Department of the Navy proposes to add a new system...

  4. 78 FR 14275 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2013-03-05

    ... Assurance and Privacy Act training. Retention and disposal: Records are destroyed three years after... of the Secretary Privacy Act of 1974; System of Records AGENCY: Office of the Secretary of Defense, DoD. ACTION: Notice to add a New System of Records. SUMMARY: The Office of the Secretary of Defense...

  5. 75 FR 10473 - Privacy Act of 1974; Systems of Records

    Science.gov (United States)

    2010-03-08

    ... Privacy training. Retention and disposal: Records are destroyed 3 years after disapproval, completion of... of the Secretary Privacy Act of 1974; Systems of Records AGENCY: Defense Logistics Agency, DoD. ACTION: Notice to amend a system of records. SUMMARY: The Defense Logistics Agency proposes to amend a...

  6. 77 FR 35945 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2012-06-15

    ... of the Secretary Privacy Act of 1974; System of Records AGENCY: Defense Logistics Agency, DoD. ACTION: Notice To Amend a system of records. SUMMARY: The Defense Logistics Agency is proposing to amend a system of records in its inventory of record systems subject to the Privacy Act of 1974 (5 U.S.C. 552a), as...

  7. 77 FR 35946 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2012-06-15

    ... Office of the Secretary Privacy Act of 1974; System of Records AGENCY: Defense Logistics Agency, DoD. ACTION: Notice to amend a system of records. SUMMARY: The Defense Logistics Agency is proposing to amend a system of records in its inventory of record systems subject to the Privacy Act of 1974 (5 U.S.C...

  8. 76 FR 76149 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2011-12-06

    ... of the Secretary Privacy Act of 1974; System of Records AGENCY: Defense Logistics Agency, DoD. ACTION: Notice to Amend a System of Records. SUMMARY: The Defense Logistics Agency is proposing to amend a system of records notice in its existing inventory of record systems subject to the Privacy Act of 1974 (5 U...

  9. 76 FR 21706 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2011-04-18

    ... of the Secretary Privacy Act of 1974; System of Records AGENCY: Defense Logistics Agency, DoD. ACTION: Notice to amend a system of records. SUMMARY: The Defense Logistics Agency is proposing to amend a system of records notice in its existing inventory of record systems subject to the Privacy Act of 1974 (5 U...

  10. 76 FR 11213 - Privacy Act of 1974; Systems of Records

    Science.gov (United States)

    2011-03-01

    ... of the Secretary Privacy Act of 1974; Systems of Records AGENCY: Defense Logistics Agency, DoD. ACTION: Notice to delete a system of records. SUMMARY: The Defense Logistics Agency proposes to delete a system of records notice in its existing inventory of records systems subject to the Privacy Act of 1974...

  11. 78 FR 17386 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2013-03-21

    ... of the Secretary Privacy Act of 1974; System of Records AGENCY: Defense Logistics Agency, DoD. ACTION: Notice to alter a System of Records. SUMMARY: The Defense Logistics Agency proposes to alter a system of records in its inventory of record systems subject to the Privacy Act of 1974 (5 U.S.C. 552a), as amended...

  12. 78 FR 17385 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2013-03-21

    ... of the Secretary Privacy Act of 1974; System of Records AGENCY: Defense Logistics Agency, DoD. ACTION: Notice to amend a System of Records. SUMMARY: The Defense Logistics Agency is amending a system of records notice in its existing inventory of record systems subject to the Privacy Act of 1974 (5 U.S.C...

  13. 78 FR 14279 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2013-03-05

    ... of the Secretary Privacy Act of 1974; System of Records AGENCY: Defense Logistics Agency, DoD. ACTION: Notice to amend a System of Records. SUMMARY: The Defense Logistics Agency is proposing to amend a system of records in its inventory of record systems subject to the Privacy Act of 1974 (5 U.S.C. 552a), as...

  14. 75 FR 28242 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2010-05-20

    ... of the Secretary Privacy Act of 1974; System of Records AGENCY: Defense Logistics Agency, DoD. ACTION: Notice to amend a system of records. SUMMARY: The Defense Logistics Agency is proposing to amend a system of records notice in its existing inventory of record systems subject to the Privacy Act of 1974 (5 U...

  15. 77 FR 21755 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2012-04-11

    ... of the Secretary Privacy Act of 1974; System of Records AGENCY: Defense Logistics Agency, DoD. ACTION: Notice to amend a system of records. SUMMARY: The Defense Logistics Agency is proposing to amend a system of records in its inventory of record systems subject to the Privacy Act of 1974 (5 U.S.C. 552a), as...

  16. 78 FR 22854 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2013-04-17

    ... of the Secretary Privacy Act of 1974; System of Records AGENCY: Defense Logistics Agency, DoD. ACTION: Notice to alter a System of Records. SUMMARY: The Defense Logistics Agency proposes to alter a system of records in its inventory of record systems subject to the Privacy Act of 1974 (5 U.S.C. 552a), as amended...

  17. 76 FR 12076 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2011-03-04

    ... of the Secretary Privacy Act of 1974; System of Records AGENCY: Defense Logistics Agency, DoD. ACTION: Notice to amend a system of records. SUMMARY: The Defense Logistics Agency is proposing to amend a system of records notice in its existing inventory of record systems subject to the Privacy Act of 1974 (5 U...

  18. 75 FR 48655 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2010-08-11

    ... of the Secretary Privacy Act of 1974; System of Records AGENCY: Defense Logistics Agency, DoD. ACTION: Notice to amend a system of records. SUMMARY: The Defense Logistics Agency is proposing to amend a system of records notice in its existing inventory of record systems subject to the Privacy Act of 1974 (5 U...

  19. 75 FR 22562 - Privacy Act of 1974; Systems of Records

    Science.gov (United States)

    2010-04-29

    ... of the Secretary Privacy Act of 1974; Systems of Records AGENCY: Defense Logistics Agency, DoD. ACTION: Notice to alter a system of records. SUMMARY: The Defense Logistics Agency proposes to alter a system of records notice in its existing inventory of records systems subject to the Privacy Act of 1974...

  20. 76 FR 26714 - Privacy Act of 1974; Systems of Records

    Science.gov (United States)

    2011-05-09

    ... of the Secretary Privacy Act of 1974; Systems of Records AGENCY: Defense Logistics Agency, DoD. ACTION: Notice to Delete a System of Records. SUMMARY: The Defense Logistics Agency proposes to delete a system of records notice in its existing inventory of records systems subject to the Privacy Act of 1974...

  1. 75 FR 5579 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2010-02-03

    ... of the Secretary Privacy Act of 1974; System of Records AGENCY: Defense Logistics Agency, DoD. ACTION: Notice to amend a system of records. SUMMARY: The Defense Logistics Agency is proposing to amend a system of records notice in its existing inventory of record systems subject to the Privacy Act of 1974 (5 U...

  2. 76 FR 39389 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2011-07-06

    ... of the Secretary Privacy Act of 1974; System of Records AGENCY: Defense Logistics Agency, DoD. ACTION: Notice to Amend a System of Records. SUMMARY: The Defense Logistics Agency is proposing to amend a system of records notice in its existing inventory of record systems subject to the Privacy Act of 1974 (5 U...

  3. 76 FR 28002 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2011-05-13

    ... of the Secretary Privacy Act of 1974; System of Records AGENCY: Defense Logistics Agency, DoD. ACTION: Notice to Amend Two Systems of Records. SUMMARY: The Defense Logistics Agency is proposing to amend two systems of records notices in its existing inventory of record systems subject to the Privacy Act of 1974...

  4. 78 FR 21600 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2013-04-11

    ... of the Secretary Privacy Act of 1974; System of Records AGENCY: Defense Logistics Agency, DoD. ACTION: Notice to delete a Systems of Records. SUMMARY: The Defense Logistics Agency is deleting a system of records notice in its existing inventory of record systems subject to the Privacy Act of 1974 (5 U.S.C...

  5. 75 FR 9185 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2010-03-01

    ... of the Secretary Privacy Act of 1974; System of Records AGENCY: Defense Logistics Agency, DoD. ACTION: Notice to amend a system of records. SUMMARY: The Defense Logistics Agency is proposing to amend a system of records notice in its existing inventory of record systems subject to the Privacy Act of 1974 (5 U...

  6. 75 FR 6000 - Privacy Act of 1974; Systems of Records

    Science.gov (United States)

    2010-02-05

    ... of the Secretary Privacy Act of 1974; Systems of Records AGENCY: Defense Logistics Agency, DoD. ACTION: Notice to delete a system of records. SUMMARY: The Defense Logistics Agency proposes to delete a system of records notice in its existing inventory of records systems subject to the Privacy Act of 1974...

  7. 75 FR 25213 - Privacy Act of 1974; Systems of Records

    Science.gov (United States)

    2010-05-07

    ... of the Secretary Privacy Act of 1974; Systems of Records AGENCY: Defense Logistics Agency, DoD. ACTION: Notice to amend a system of records. SUMMARY: The Defense Logistics Agency proposes to amend a system of records notice in its existing inventory of records systems subject to the Privacy Act of 1974...

  8. 78 FR 14283 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2013-03-05

    ... of the Secretary Privacy Act of 1974; System of Records AGENCY: Defense Logistics Agency, DoD. ACTION: Notice to amend a System of Records. SUMMARY: The Defense Logistics Agency is proposing to amend a system of records in its inventory of record systems subject to the Privacy Act of 1974 (5 U.S.C. 552a), as...

  9. 77 FR 2710 - Privacy Act of 1974; System of Records; Correction

    Science.gov (United States)

    2012-01-19

    ... of the Secretary Privacy Act of 1974; System of Records; Correction AGENCY: U.S. Strategic Command...-2053), DoD published a notice announcing its intent to add a new Privacy Act System of Records. The... announcing its intent to add a new system in its inventory of Privacy Act System of Records: FSTRATCOM 01...

  10. EGRP Privacy Policy & Disclaimers

    Science.gov (United States)

    The Epidemiology and Genomics Research Program complies with requirements for privacy and security established by the Office of Management and Budget, Department of Health and Human Services, the National Institutes of Health, and the National Cancer Institute.

  11. Privacy Concerns Related to the Collection of Personal Information Under the Personal Identify Verification (PIV) Program

    Science.gov (United States)

    2008-03-01

    identity documents will lead to government tracking of individual movements within and throughout buildings. Specific concern has been noted that...subsequently be used to track purchases, transactions, preferences, and movement . As discussed previously in regard to surveillance, some fear that...articleID=16091179 8 Laban , J. (1996). Privacy issues surrounding personal identification systems. State of Connecticut: Department of Social Services

  12. 77 FR 57016 - Privacy Act; Implementation

    Science.gov (United States)

    2012-09-17

    ... the integrity of the security and counter-intelligence records by the Defense Intelligence Agency and... of the Secretary 32 CFR Part 319 Privacy Act; Implementation AGENCY: Defense Intelligence Agency, DoD. ACTION: Direct final rule with request for comments. SUMMARY: Defense Intelligence Agency (DIA) is...

  13. Information privacy fundamentals for librarians and information professionals

    CERN Document Server

    Givens, Cherie L

    2014-01-01

    This book introduces library and information professionals to information privacy, provides an overview of information privacy in the library and information science context, U.S. privacy laws by sector, information privacy policy, and key considerations when planning and creating a privacy program.

  14. Security Vs. Liberty: How to Measure Privacy Costs in Domestic Surveillance Programs

    Science.gov (United States)

    2014-03-01

    with video , infrared imagery, and multispectral sensors, collect their biometric signatures, uniquely identify them, and presumably provide a...to include video , agile 105 Ibid., 9. 106 Ibid., 10. 107 Ibid., 10–11. 108 Ibid., 11. 109 Ibid., A-21. 25...maintain the same level of privacy intended by the framers of the Constitution. Chapter III concluded that a person exhibits a subjective expectation of

  15. DOD TRAVEL IMPROPER PAYMENTS: Fiscal Year 2006 Reporting Was Incomplete and Planned Improvement Efforts Face Challenges

    National Research Council Canada - National Science Library

    WIlliams, McCoy

    2007-01-01

    In its fiscal year 2006 PAR, DOD reported an estimate of approximately $8 million in travel program improper payments, which DOD reported as reflecting about 1 percent of reported travel payments for the year...

  16. Military Training: Management Actions Needed to Enhance DOD's Investment in the Joint National Training Capability

    National Research Council Canada - National Science Library

    St. Laurent, Janet; Durland, Laura; Harrison, Fred; Faley, Joe; Anderson, Bonita; Watson, Angela; Song, Yong; Keith, Kevin; Ditto, Susan; Shea, Rebecca

    2006-01-01

    .... While DOD's initial training transformation assessment set a basic framework for measuring future program performance, DOD has not developed a strategy to evaluate the overall impact of the JNTC...

  17. 39 CFR 262.5 - Systems (Privacy).

    Science.gov (United States)

    2010-07-01

    ... 39 Postal Service 1 2010-07-01 2010-07-01 false Systems (Privacy). 262.5 Section 262.5 Postal... DEFINITIONS § 262.5 Systems (Privacy). (a) Privacy Act system of records. A Postal Service system containing... individual. (c) Computer matching program. A “matching program,” as defined in the Privacy Act, 5 U.S.C. 552a...

  18. Small Business: Action Needed to Determine Whether DOD’s Comprehensive Subcontracting Plan Test Program Should Be Made Permanent

    Science.gov (United States)

    2015-11-01

    SMALL BUSINESS Action Needed to Determine Whether DOD’s Comprehensive Subcontracting Plan Test Program Should Be... Subcontracting Plan Test Program Should Be Made Permanent 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) 5d. PROJECT...committees November 2015 SMALL BUSINESS Action Needed to Determine Whether DOD’s Comprehensive Subcontracting Plan Test Program Should Be Made

  19. Defense Primer: DOD Contractors

    Science.gov (United States)

    2017-02-10

    functions, from intelligence analysis or software development to landscaping or food service. Why does DOD use individual contractors? Going back to...specialized fields, such as linguistics or weapon systems maintenance; and providing a surge capability (quickly delivering critical support

  20. Independent Auditors Report on the FY 2015 DoD Detailed Accounting Report for the Funds Obligated for National Drug Control Program Activities

    Science.gov (United States)

    2016-01-29

    No. DODIG-2016-041 J A N U A R Y 2 9 , 2 0 1 6 Independent Auditor’s Report on the FY 2015 DoD Detailed Accounting Report for the Funds...Defense that supports the warfighter; promotes accountability , integrity, and efficiency; advises the Secretary of Defense and Congress; and informs...THE ARMY SUBJECT: Independent Auditor’s Report on the FY 2015 DoD Detailed Accounting Report for the Funds Obligated for National Drug Control

  1. 76 FR 5235 - Privacy Act of 1974, as Amended; Computer Matching Program (SSA Internal Match)-Match Number 1014

    Science.gov (United States)

    2011-01-28

    ... which we will compare our current employee records of the Federal Personnel/Payroll System with the... amended, regulates the use of computer matching by Federal agencies when records in a system of records... and Privacy Protection Act of 1988. The Privacy Act provides that no record contained in a system of...

  2. 77 FR 3455 - Privacy Act of 1974; System of Records-Migrant Education Bypass Program Student Database

    Science.gov (United States)

    2012-01-24

    ... well as intrusion detection systems to monitor any potential unauthorized access to the MEBPSD. The...] [FR Doc No: 2012-1353] DEPARTMENT OF EDUCATION Privacy Act of 1974; System of Records--Migrant... of Education. ACTION: Notice of a new system of records. SUMMARY: In accordance with the Privacy Act...

  3. 75 FR 58020 - Privacy Act of 1974; Report of Matching Program

    Science.gov (United States)

    2010-09-23

    ... change and that the matching program has been conducted in compliance with the original matching program... accurately identify beneficiaries who are incarcerated for a felony or a misdemeanor in a Federal penal...

  4. Privacy Act

    Science.gov (United States)

    Learn about the Privacy Act of 1974, the Electronic Government Act of 2002, the Federal Information Security Management Act, and other information about the Environmental Protection Agency maintains its records.

  5. Military Personnel: DOD Should Develop a Plan to Evaluate the Effectiveness of Its Career Intermission Pilot Program

    Science.gov (United States)

    2015-10-01

    the Effectiveness of Its Career Intermission Pilot Program Why GAO Did This Study Congress authorized CIPP in 2009 to provide greater...flexibility in career paths for servicemembers and to enhance retention. CIPP allows servicemembers to take sabbaticals of up to 3 years in exchange for 2...Senate Report 113-211 included a provision for GAO to examine CIPP , and particularly the Navy’s experience with it. This report (1) evaluates the

  6. Retrospective Study of Selected DoD Materials and Structures Research and Development Programs. Phase 1. Case History Data Collection

    Science.gov (United States)

    1979-03-01

    UTC firing (out of seven) showed any failure of the C/C exit cone. That was traced to a manufacturing lay-up de - ficiency, which merely pointed up a...Secretary of Defense for Research & Engineering (R&AT) ’ The pentagon Washinton . DC 203,101 MONITORING AGENCY NAME 0 A ODRESS(I di#f’tent from 1 7onr...34successful," it is hoped that guidelines might be de - rived that could enhance the "success" of future programs. These, of course, will frequently go

  7. DoD Theater Nuclear Forces Survivability and Security (TNFSS): Compendium of Assessments Related to TNFSSCCC Program. Volume I.

    Science.gov (United States)

    1979-12-31

    intergration with the existing TNF S2 Compendium. 1.2 ORGANIZATION OF THE COMPENDIUM Each assessment and document which has been identified and included in this...of TNF S2 C3 Program concern: (1) Threat to C3 CODE NUMBER: 1 (2) Security of C3 facilities * 2 (3) Survivability of C3 facilities 3 (4) C3...to the general C3 area and in particular to 10 I the modeling and simulation of C3 systems or networks . Similarly, a B.3.4 entry would indicate a

  8. Concentrated Differential Privacy

    OpenAIRE

    Dwork, Cynthia; Rothblum, Guy N.

    2016-01-01

    We introduce Concentrated Differential Privacy, a relaxation of Differential Privacy enjoying better accuracy than both pure differential privacy and its popular "(epsilon,delta)" relaxation without compromising on cumulative privacy loss over multiple computations.

  9. 77 FR 43639 - Privacy Act of 1974, as Amended; Computer Matching Program (Social Security Administration (SSA...

    Science.gov (United States)

    2012-07-25

    ...)/Department of Veterans Affairs (VA), Veterans Benefits Administration (VBA))--Match Number 1008 AGENCY: SSA... of an existing computer matching program that we are currently conducting with VA/VBA. DATES: We will... Benefits Administration (VBA) A. Participating Agencies SSA and VA/VBA. B. Purpose of the Matching Program...

  10. 77 FR 54943 - Privacy Act of 1974, as Amended; Computer Matching Program (Social Security Administration (SSA...

    Science.gov (United States)

    2012-09-06

    ...)/Department of Veterans Affairs (VA), Veterans Benefits Administration (VBA))--Match Number 1309 AGENCY: SSA... of an existing computer matching program that we are currently conducting with VA/VBA. DATES: We will... Benefits Administration (VBA). A. Participating Agencies SSA and VA/VBA. B. Purpose of the Matching Program...

  11. 78 FR 47830 - Privacy Act of 1974; Report of Matching Program

    Science.gov (United States)

    2013-08-06

    ...: Notice of Computer Matching Program. SUMMARY: The Department of Veterans Affairs (VA) provides notice that it intends to conduct a recurring computer matching program matching Railroad Retirement Board... will disclose the necessary information from RRB-26: Payment, Rate, and Entitlement History File...

  12. Privacy Act System of Records: Federal Lead-Based Paint Program System of Records, EPA-54

    Science.gov (United States)

    Learn about the Federal Lead-Based Paint Program System of Records (FLPPSOR), including the security classification, individuals covered by the system, categories of records, routine uses of the records, and other security procedures.

  13. 78 FR 44100 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2013-07-23

    .../privacy/SORNs/component/osd/index.html . The proposed system report, as required by 5 U.S.C. 552a(r) of... employees, and Financial Management (FM) certification level. Authority for maintenance of the system: 5 U.S... monitoring training events, and DoD FM certifications. Routine uses of records maintained in the system...

  14. 76 FR 49455 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2011-08-10

    ..., educational and medical institutions; and open source information, such as property tax records.'' Exemptions... medical institutions; and open source information, such as property tax records. Exemptions claimed for... of the Secretary Privacy Act of 1974; System of Records AGENCY: Defense Intelligence Agency, DoD...

  15. 77 FR 26256 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2012-05-03

    ..., educational and medical institutions; and open source information, such as property tax records... of the Secretary Privacy Act of 1974; System of Records AGENCY: Defense Intelligence Agency, DoD. ACTION: Notice to Alter a System of Records. SUMMARY: The Defense Intelligence Agency is proposing to...

  16. 75 FR 33791 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2010-06-15

    ... open source literature. Exemptions claimed for the system: Investigatory material compiled for law... of the Secretary Privacy Act of 1974; System of Records AGENCY: Defense Intelligence Agency, DoD. ACTION: Notice to add a system of records. SUMMARY: The Defense Intelligence Agency proposes to add a...

  17. 78 FR 6078 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2013-01-29

    ... of the Secretary Privacy Act of 1974; System of Records AGENCY: Defense Finance and Accounting Service, DoD. ACTION: Notice to delete a system of records. SUMMARY: The Defense Finance and Accounting.... Gregory Outlaw, (317) 510-4591. SUPPLEMENTARY INFORMATION: The Defense Finance and Accounting Service...

  18. 77 FR 56625 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2012-09-13

    ... ``Organizational elements and offices, Defense Intelligence Agency, 200 MacDill Blvd., Washington, DC 20340-0001...] Privacy Act of 1974; System of Records AGENCY: Defense Intelligence Agency, DoD. ACTION: Notice to alter a system of records. SUMMARY: The Defense Intelligence Agency is proposing to alter a system to its...

  19. 75 FR 19946 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2010-04-16

    ... Intelligence Agency. Categories of records in the system: Individual's name, organizational and home address... of the Secretary Privacy Act of 1974; System of Records AGENCY: Defense Intelligence Agency, DoD. ACTION: Notice to amend a system of records. SUMMARY: The Defense Intelligence Agency is proposing to...

  20. 75 FR 10474 - Privacy Act of 1974; Systems of Records

    Science.gov (United States)

    2010-03-08

    ..., Under Secretary of Defense for Acquisition, Technology, and Logistics; and E.O. 9397 (SSN), as amended... of Defense for Acquisition, Technology, and Logistics; and E.O. 9397 (SSN), as amended. PURPOSE(S... of the Secretary Privacy Act of 1974; Systems of Records AGENCY: Defense Logistics Agency, DoD...

  1. 78 FR 47309 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2013-08-05

    ... and Accounting Service-Cleveland, System Manager, Information and Technology, Payroll Services, 1240 E... of the Secretary Privacy Act of 1974; System of Records AGENCY: Defense Finance and Accounting Service, DoD. ACTION: Notice to amend a System of Records. SUMMARY: The Defense Finance and Accounting...

  2. 77 FR 9632 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2012-02-17

    ..., payroll office and payroll records, including automated payroll systems.'' * * * * * BILLING CODE 5001-06... of the Secretary Privacy Act of 1974; System of Records AGENCY: Defense Logistics Agency, DoD. ACTION: Notice to Amend a System of Records. SUMMARY: The Defense Logistics Agency is proposing to amend a system...

  3. 76 FR 33728 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2011-06-09

    ... on conversion to the Defense Joint Military Payroll System (DJMS), and will be destroyed October 1... Department of the Army Privacy Act of 1974; System of Records AGENCY: Department of the Army, DoD. ACTION: Notice to add a system of records. SUMMARY: The Department of the Army proposes to add a system of...

  4. 77 FR 58816 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2012-09-24

    ... Funds Central Payroll System (NAFCPS)(June 24, 2008, 73 FR 35669), therefore the system can be deleted... of the Secretary Privacy Act of 1974; System of Records AGENCY: Defense Information Systems Agency, DoD. ACTION: Notice to delete five Systems of Records. SUMMARY: The Defense Information Systems...

  5. 78 FR 41918 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2013-07-12

    ... ``DFAS automated payroll systems interfaces.'' * * * * * BILLING CODE 5001-06-P ... of the Secretary Privacy Act of 1974; System of Records AGENCY: Office of the Secretary, DoD. ACTION: Notice to alter a System of Records. SUMMARY: The Defense Finance and Accounting Service proposes to...

  6. 76 FR 18738 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2011-04-05

    ... reporting; to plan workloads, to assist in providing time and attendance to the centralized payroll system... Department of the Navy Privacy Act of 1974; System of Records AGENCY: Department of the Navy, DoD. ACTION: Notice to Add a New System of Records. SUMMARY: The Department of the Navy proposes to add a new system...

  7. 78 FR 14285 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2013-03-05

    ... attendance, labor and production data for input to payroll and accounting systems. It will also provide the... of the Secretary Privacy Act of 1974; System of Records AGENCY: Office of the Secretary of Defense, DoD. ACTION: Notice to alter a System of Records. SUMMARY: The Defense Finance and Accounting Service...

  8. 78 FR 14276 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2013-03-05

    ..., and NM07010-1, DON Non- Appropriated Funds Standard payroll System. All records that have met their... of the Secretary Privacy Act of 1974; System of Records AGENCY: United States Marine Corps, DoD. ACTION: Notice to delete twenty-three Systems of Records. SUMMARY: The U.S. Marine Corps is deleting...

  9. 77 FR 60401 - Privacy Act of 1974; Systems of Records

    Science.gov (United States)

    2012-10-03

    ... Liaison Officer, Department of Defense. GNSA 08 System name: NSA/CSS Payroll Processing File (June 8, 2009... Office of the Secretary Privacy Act of 1974; Systems of Records AGENCY: National Security Agency/Central Security Service, DoD. ACTION: Notice to amend a system of records. SUMMARY: The National Security Agency...

  10. 75 FR 17904 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2010-04-08

    ....'' Retention and disposal: Delete entry and replace with ``Records are temporary; destroy when 5 years old or 5.... ] Retention and disposal: Records are temporary; destroy when 5 years old or 5 years after completion of a... of the Secretary Privacy Act of 1974; System of Records AGENCY: Defense Intelligence Agency, DoD...

  11. 75 FR 2117 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2010-01-14

    ... addition to user identification and password for system access. RETENTION AND DISPOSAL: Records are deleted... Department of the Air Force Privacy Act of 1974; System of Records AGENCY: Department of the Air Force, DoD. ACTION: Notice to add a system of records. SUMMARY: The Department of the Air Force proposes to add a...

  12. 76 FR 28961 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2011-05-19

    ... servicing and authorized to use the record system. Retention and disposal: Records are maintained for six... of the Secretary Privacy Act of 1974; System of Records AGENCY: Office of the Secretary, DoD. ACTION: Notice to add a system of records. SUMMARY: The Office of the Secretary of Defense proposes to add a...

  13. 76 FR 46767 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2011-08-03

    ... disposal: Records are kept in current file area until no longer needed for conducting business, then... Department of the Army Privacy Act of 1974; System of Records AGENCY: Department of the Army, DoD. ACTION: Notice to Add a System of Records. SUMMARY: The Department of the Army proposes to add a system of...

  14. 75 FR 10471 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2010-03-08

    ... records notice and 32 CFR part 323. RETENTION AND DISPOSAL: Records have the following disposition... of the Secretary Privacy Act of 1974; System of Records AGENCY: Defense Logistics Agency, DoD. ACTION: Notice to amend a system of records. SUMMARY: The Defense Logistics Agency is proposing to amend a system...

  15. 76 FR 26714 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2011-05-09

    ...-know and who therefore are properly trained and screened. Retention and disposal: Records on local... Department of the Army Privacy Act of 1974; System of Records AGENCY: Department of the Army, DoD. ACTION: Notice to alter a system of records. SUMMARY: Department of the Army is altering a system of records...

  16. 75 FR 6005 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2010-02-05

    ..., and Common Access Card (CAC) governing access to data. Retention and disposal: Records are destroyed... Department of the Air Force Privacy Act of 1974; System of Records AGENCY: Department of the Air Force, DoD. ACTION: Notice to add a system of records. SUMMARY: The Department of the Air Force is proposing to add a...

  17. 75 FR 56517 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2010-09-16

    ....'' * * * * * Retention and disposal: Delete entry and replace with ``Records are destroyed in burn bags one year after... to access the excel spreadsheet. Retention and disposal: Records are destroyed in burn bags one year... of the Secretary Privacy Act of 1974; System of Records AGENCY: Defense Threat Reduction Agency, DoD...

  18. 76 FR 52320 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2011-08-22

    ... assurance procedures. Retention and disposal: Records are retained for two years and then deleted. System... of the Secretary Privacy Act of 1974; System of Records AGENCY: Office of the Secretary of Defense, Department of Defense (DoD). ACTION: Notice to add a system of records. SUMMARY: The Office of the Secretary...

  19. 75 FR 25215 - Privacy Act of 1974; Systems of Records

    Science.gov (United States)

    2010-05-07

    ... passwords and limited to authorized personnel only. Retention and disposal: Records are maintained for 6... of the Secretary Privacy Act of 1974; Systems of Records AGENCY: National Security Agency/Central Security Service, DoD. ACTION: Notice to amend a system of records. SUMMARY: The National Security Agency...

  20. 75 FR 20580 - Privacy Act of 1974; Systems of Records

    Science.gov (United States)

    2010-04-20

    ...).'' * * * * * RETENTION AND DISPOSAL: Delete entry and replace with ``Records are destroyed 3 years after separation of..., or locked cabinets during non duty hours. RETENTION AND DISPOSAL: Records are destroyed 3 years after... Office of the Secretary Privacy Act of 1974; Systems of Records AGENCY: Defense Logistics Agency, DoD...

  1. 75 FR 38494 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2010-07-02

    ... responsible for servicing and authorized to use the system. Retention and disposal: Records are kept for 5... of the Secretary Privacy Act of 1974; System of Records AGENCY: Defense Intelligence Agency, DoD. ACTION: Notice to add a system of records. SUMMARY: The Defense Intelligence proposes to add a system of...

  2. 76 FR 66695 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2011-10-27

    ... Force (RIF) team personnel. Retention and disposal: Records are destroyed two years after case is closed... of the Secretary Privacy Act of 1974; System of Records AGENCY: Office of the Secretary, Department of Defense (DoD). ACTION: Notice to amend a system of records. SUMMARY: The Office of the Secretary...

  3. 75 FR 43498 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2010-07-26

    .... Retention and disposal: Records are maintained for 5 years, then destroyed by erasing. System manager(s) and... Department of the Army Privacy Act of 1974; System of Records AGENCY: Department of the Army, DoD. ACTION: Notice to add a system of records. SUMMARY: The Department of the Army proposes to add a system of...

  4. 75 FR 13094 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2010-03-18

    ... are locked when not in use or kept under surveillance. Retention and disposal: Records are deleted... Department of the Air Force Privacy Act of 1974; System of Records AGENCY: Department of the Air Force, DoD. ACTION: Notice to add a system of records. SUMMARY: The Department of the Air Force proposes to add a...

  5. 75 FR 19624 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2010-04-15

    ... consequences of improperly accessing restricted databases. Retention and disposal: Records are destroyed 1 year...] Privacy Act of 1974; System of Records AGENCY: Defense Logistics Agency, DoD. ACTION: Notice to amend a system of records. SUMMARY: The Defense Logistics Agency is proposing to amend a system of records notice...

  6. 76 FR 13991 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2011-03-15

    ... technology protocols. Retention and disposal: Records are destroyed when superseded or obsolete whichever... of the Secretary Privacy Act of 1974; System of Records AGENCY: Defense Logistics Agency, DoD. ACTION: Notice to amend a system of records. SUMMARY: The Defense Logistics Agency is proposing to amend a system...

  7. 75 FR 49482 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2010-08-13

    ... disposal: Records are maintained in an active file during the period of the individual's assignment to DISA... of the Secretary Privacy Act of 1974; System of Records AGENCY: Defense Information Systems Agency, DoD. ACTION: Notice to amend a system of records. SUMMARY: The Defense Information Systems Agency...

  8. 76 FR 39390 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2011-07-06

    ... disposal: Records will be destroyed 5 years after final resolution of the case. System manager(s) and... of the Secretary Privacy Act of 1974; System of Records AGENCY: Defense Logistics Agency, DoD. ACTION: Notice to amend a system of records. SUMMARY: The Defense Logistics Agency is proposing to amend a system...

  9. 75 FR 21260 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2010-04-23

    .... Retention and disposal: Records are maintained until superseded or for a period of two years and then... Department of the Navy Privacy Act of 1974; System of Records AGENCY: Department of the Navy, DoD. ACTION: Notice to alter a system of records. SUMMARY: The Department of the Navy proposes to alter a system of...

  10. 76 FR 76958 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2011-12-09

    ...'' are provided access. Back-up data is stored in a locked room. Retention and disposal: Records are... of the Secretary Privacy Act of 1974; System of Records AGENCY: Office of the Secretary, Department of Defense (DoD). ACTION: Notice to Amend a System of Records. SUMMARY: The Office of the Secretary...

  11. 75 FR 81246 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2010-12-27

    .... Retention and Disposal: Records are deleted when two years old, or two years after the date of the latest... of the Secretary Privacy Act of 1974; System of Records AGENCY: Office of the Secretary of Defense, DoD. ACTION: Notice to add a system of records. SUMMARY: The Office of the Secretary of Defense...

  12. 77 FR 56628 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2012-09-13

    ... disposal: Records are retained for 10 years and then destroyed. Paper records are destroyed by pulping...-0106] Privacy Act of 1974; System of Records AGENCY: National Security Agency/Central Security Service, DoD. ACTION: Notice to add a system of records. SUMMARY: The National Security Agency/Central...

  13. 76 FR 28002 - Privacy Act of 1974; Systems of Records

    Science.gov (United States)

    2011-05-13

    ... of the Secretary Privacy Act of 1974; Systems of Records AGENCY: Defense Logistics Agency, DoD. ACTION: Notice to delete three systems of records. SUMMARY: The Defense Logistics Agency proposes to delete three systems of records notices in its existing inventory of records systems subject to the...

  14. 76 FR 73602 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2011-11-29

    ... of the Secretary Privacy Act of 1974; System of Records AGENCY: Defense Logistics Agency, Department of Defense (DoD). ACTION: Notice to amend a system of records. SUMMARY: The Defense Logistics Agency is proposing to amend a system of records notice in its existing inventory of record systems subject...

  15. 76 FR 39392 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2011-07-06

    ..., least privilege, and data integrity. Additionally, intrusion detection systems, malicious code... Department of the Army Privacy Act of 1974; System of Records AGENCY: Department of the Army, DoD. ACTION: Notice to Amend a System of Records. SUMMARY: The Department of the Army is proposing to amend a system...

  16. 78 FR 60264 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2013-10-01

    ... controlled facility. Physical entry is restricted by the use of locks, an intrusion detection system, guards... of the Secretary Privacy Act of 1974; System of Records AGENCY: Office of the Secretary of Defense, DoD. ACTION: Notice to add a new System of Records. SUMMARY: The Office of the Secretary of Defense...

  17. 77 FR 43816 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2012-07-26

    ... password. The system is protected by audit logs, virus detection, intrusion detection, firewalls, and... Department of the Air Force Privacy Act of 1974; System of Records AGENCY: Department of the Air Force, DoD. ACTION: Notice to alter a system of records. SUMMARY: The Department of the Air Force proposes to alter a...

  18. 75 FR 76428 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2010-12-08

    ... system permissions, intrusion detection and prevention ] systems and log monitoring. Complete access to... of the Secretary Privacy Act of 1974; System of Records AGENCY: Defense Information Systems Agency, DoD. ACTION: Notice to alter a system of records. SUMMARY: The Defense Information Systems Agency is...

  19. 75 FR 69645 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2010-11-15

    .../Transport Layer Security (SSL/ TLS) connections, access control lists, file system permissions, intrusion detection and prevention systems and log monitoring. Complete access to all records is restricted to and...] Privacy Act of 1974; System of Records AGENCY: Defense Information Systems Agency, DoD. ACTION: Notice to...

  20. 75 FR 69644 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2010-11-15

    ... system permissions, intrusion detection and prevention systems and log monitoring. Complete access to all...] Privacy Act of 1974; System of Records AGENCY: Defense Information Systems Agency, DoD. ACTION: Notice to add a System of Records. SUMMARY: The Defense Information Systems Agency is proposing to add a system...

  1. 78 FR 46799 - Supplemental Nutrition Assistance Program: Privacy Protections of Information From Applicant...

    Science.gov (United States)

    2013-08-02

    ... Federal Regulations is sold by the Superintendent of Documents. #0;Prices of new books are listed in the... educational agencies (LEAs) administering the National School Lunch Program established under the Richard B... school districts. Accordingly, the revision to Sec. 272.1(c) did not change policy, so new State action...

  2. Advanced research in data privacy

    CERN Document Server

    Torra, Vicenç

    2015-01-01

    This book provides an overview of the research work on data privacy and privacy enhancing technologies carried by the participants of the ARES project. ARES (Advanced Research in Privacy an Security, CSD2007-00004) has been one of the most important research projects funded by the Spanish Government in the fields of computer security and privacy. It is part of the now extinct CONSOLIDER INGENIO 2010 program, a highly competitive program which aimed to advance knowledge and open new research lines among top Spanish research groups. The project started in 2007 and will finish this 2014. Composed by 6 research groups from 6 different institutions, it has gathered an important number of researchers during its lifetime. Among the work produced by the ARES project, one specific work package has been related to privacy. This books gathers works produced by members of the project related to data privacy and privacy enhancing technologies. The presented works not only summarize important research carried in the proje...

  3. Perspective on 2015 DoD Cyber Strategy

    Science.gov (United States)

    2015-09-29

    AND SUBTITLE Perspective on 2015 DoD Cyber Strategy 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) 5d. PROJECT...Prescribed by ANSI Std Z39-18 Testimony Perspective on 2015 DoD Cyber Strategy Lara Schmidt RAND Office of External Affairs CT-439 September...310) 451-7002; Email: order@rand.org 1 Lara Schmidt1 The RAND Corporation Perspective on 2015 DoD Cyber Strategy2 Before the Committee

  4. DoD Alcohol and Substance Abuse Consortium Award

    Science.gov (United States)

    2017-10-01

    DoD Alcohol and Substance Abuse Consortium Award Annual Report 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR (S) 5d. PROJECT NUMBER...Award Number: W81XWH-15-2-0077 TITLE: DoD Alcohol and Substance Abuse Consortium Award PRINCIPAL INVESTIGATOR: Rick Williams CONTRACTING...views, opinions and/or findings contained in this report are those of the author (s) and should not be construed as an official Department of the Army

  5. Accounts Receivable for DoD Materiel

    National Research Council Canada - National Science Library

    Granetto, Paul

    1994-01-01

    The overall audit objective was to evaluate the effectiveness of DoD policies and procedures for authorizing DoD contractors and non-DoD agencies to use DoD activity address codes to obtain materiel...

  6. Privacy transparency patterns

    NARCIS (Netherlands)

    Siljee B.I.J.

    2015-01-01

    This paper describes two privacy patterns for creating privacy transparency: the Personal Data Table pattern and the Privacy Policy Icons pattern, as well as a full overview of privacy transparency patterns. It is a first step in creating a full set of privacy design patterns, which will aid

  7. 78 FR 71591 - Privacy Act of 1974; Computer Matching Program between the U.S. Department of Education (ED) and...

    Science.gov (United States)

    2013-11-29

    ...) (recipient agency) and the U.S. Department of Veterans Affairs (VA) (source agency). After the ED and VA Data..., the Computer Matching and Privacy Protection Act of 1988, 54 FR 25818 (June 19, 1989), and OMB... published in the Federal Register, in text or Adobe Portable Document Format (PDF). To use PDF you must have...

  8. Protecting Children's Online Privacy.

    Science.gov (United States)

    Kresses, Mamie

    2001-01-01

    Discuss provisions of new federal Children's Online Privacy Protection Act that principals should know to protect student privacy on the Internet. Also discusses relevant provisions of the Family Educational Rights and Privacy Act. (PKP)

  9. Semantic Security: Privacy Definitions Revisited

    OpenAIRE

    Jinfei Liu; Li Xiong; Jun Luo

    2013-01-01

    In this paper we illustrate a privacy framework named Indistinguishabley Privacy. Indistinguishable privacy could be deemed as the formalization of the existing privacy definitions in privacy preserving data publishing as well as secure multi-party computation. We introduce three representative privacy notions in the literature, Bayes-optimal privacy for privacy preserving data publishing, differential privacy for statistical data release, and privacy w.r.t. semi-honest behavior in the secure...

  10. Toward Integrated DoD Biosurveillance: Assessment and Opportunities.

    Science.gov (United States)

    Moore, Melinda; Fisher, Gail; Stevens, Clare

    2014-01-01

    In the context of the 2012 National Strategy for Biosurveillance, the Office of Management and Budget (OMB) asked the Department of Defense (DoD) to review its biosurveillance programs, prioritize missions and desired outcomes, evaluate how DoD programs contribute to these, and assess the appropriateness and stability of the department's funding system for biosurveillance. DoD sought external analytic support through the RAND Arroyo Center. In response to the questions posed by OMB request, this study finds the following: (1) Current DoD biosurveillance supports three strategic missions. Based mostly on existing statute, the highest-priority mission is force health protection, followed by biological weapons defense and global health security. (2) Guidance issued by the White House on June 27, 2013, specified priorities for planning fiscal year 2015 budgets; it includes an explicit global health security priority, which strengthens the case for this as a key DoD biosurveillance strategic mission. (3) DoD biosurveillance also supports four desired outcomes: early warning and early detection, situational awareness, better decision making at all levels, and forecast of impacts. (4) Programs and measures that address priority missions-force health protection in particular-and desired outcomes should be prioritized over those that do not do so. (5) More near-real-time analysis and better internal and external integration could enhance the performance and value of the biosurveillance enterprise. (6) Improvements are needed in key enablers, including explicit doctrine/policy, efficient organization and governance, and increased staffing and improved facilities for the Armed Forces Health Surveillance Center (AFHSC). (7) AFHSC has requested additional funding to fully implement its current responsibilities under the 2012 Memorandum of Understanding between the Assistant Secretaries of Defense for Health Affairs and for Nuclear, Chemical, and Biological Defense Programs

  11. Privacy og selvbeskrivelse

    DEFF Research Database (Denmark)

    Rosengaard, Hans Ulrik

    2015-01-01

    En beskrivelse af feltet for forskning i Privacy med særligt henblik på privacys betydning for muligheden for at styre sin egen selvbeskrivelse......En beskrivelse af feltet for forskning i Privacy med særligt henblik på privacys betydning for muligheden for at styre sin egen selvbeskrivelse...

  12. Privacy vs security

    CERN Document Server

    Stalla-Bourdillon, Sophie; Ryan, Mark D

    2014-01-01

    Securing privacy in the current environment is one of the great challenges of today's democracies. Privacy vs. Security explores the issues of privacy and security and their complicated interplay, from a legal and a technical point of view. Sophie Stalla-Bourdillon provides a thorough account of the legal underpinnings of the European approach to privacy and examines their implementation through privacy, data protection and data retention laws. Joshua Philips and Mark D. Ryan focus on the technological aspects of privacy, in particular, on today's attacks on privacy by the simple use of today'

  13. 77 FR 40863 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2012-07-11

    ... name; company name; registered business telephone number and address (which for small businesses may... Systems Protection Program; DoD 5240.1-R, Procedures Governing the Activities of DoD Intelligence... Office, ATTN: Chief, Counter Intelligence Operations, Office of Security and Counter Intelligence, 14675...

  14. Paperless Contract Folder's (PCF) DoD 5015.2 certification

    OpenAIRE

    Flynn, Kimberly C.; Boorom, Eric W.; Grasso, Colleen E.

    2010-01-01

    Joint Applied Project The objective of this project is to conduct an analysis of the CECOM Contracting Center's Paperless Contracting Folder program in regards to maintaining its DoD 5015.2 certification. The desired outcomes will be the creation of a File Plan and User Guide to assist with DoD 5015.2 certification.

  15. Case studies of six high priority DOD installations

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1994-11-01

    This is a supplement to the report entitled Environmental Cleanup: Too Many High Priority Sites Impede DOD`s Program. It provides six installation case studies addressing issues including the status of the restoration program, the cost of cleanup to date and projected costs, the cleanup options considered, the option selected, expected completion, and the applicable cleanup standards. The case studies also provide installation specific information on reasons installation was listed on the NPL, the regulatory process, cooperation between the installation and the regulatory agencies, staffing at the installations and the regulatory agencies, and the process for funding the cleanup.

  16. 76 FR 34732 - Privacy Act of 1974; Department of Homeland Security/National Protection and Programs Directorate...

    Science.gov (United States)

    2011-06-14

    ... and Programs Directorate--002 Chemical Facility Anti- Terrorism Standards Personnel Surety Program... Programs Directorate--002 Chemical Facility Anti-Terrorism Standards Personnel Surety Program System of...--002 Chemical Facility Anti-Terrorism Standards Personnel Surety Program System of Records.'' On...

  17. Bidirectional Transfer of DoD Technology: Assessment of Science and Technology Education Applications of DoD Modeling and Simulation Resources

    National Research Council Canada - National Science Library

    Anderson, Rodney

    1996-01-01

    ...) insertion of modeling and simulation in ongoing education and training programs; and (3) application of DoD models and simulations in high priority education and training areas identified by the Interagency Governmental Task Force (IGTF...

  18. Elections: DOD Needs More Comprehensive Planning to Address Military and Overseas Absentee Voting Challenges

    Science.gov (United States)

    2016-04-01

    Internet voting initiatives, which are no longer relevant because the statute that required DOD to carry out an electronic voting demonstration project...security and privacy of all DOD’s voting systems—both electronic and Internet . The plan should also specify milestones, time frames, and...contingencies; synchronize them with planned development of the Commission’s guidelines for Internet voting ; and be developed in conjunction with major

  19. DoD Installations, Energy and the Environment: An Update

    Science.gov (United States)

    2011-05-10

    DoD Installations, Energy and the Environment : An Update Dorothy Robyn Deputy Under Secretary of Defense Installations & Environment E2S2 Symposium...REPORT DATE 10 MAY 2011 2. REPORT TYPE 3. DATES COVERED 00-00-2011 to 00-00-2011 4. TITLE AND SUBTITLE DoD Installations, Energy and the ... Environment : An Update 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) 5d. PROJECT NUMBER 5e. TASK NUMBER 5f. WORK UNIT

  20. Protecting Teachers' Privacy Rights.

    Science.gov (United States)

    Spencer, Ray C.; Hoffman, Darlene Haffner

    2001-01-01

    Addresses concerns about school personnel records and legal precedents regarding privacy. Recommends inclusion in teacher education of content about teachers' privacy rights. Lists fair information practices for schools regarding the accuracy of and access to personnel records. (SK)

  1. Neuroethics and Brain Privacy

    DEFF Research Database (Denmark)

    Ryberg, Jesper

    2017-01-01

    An introduction is presented in which editor discusses various articles within the issue on topics including ethical challenges with importance of privacy for well-being, impact of brain-reading on mind privacy and neurotechnology.......An introduction is presented in which editor discusses various articles within the issue on topics including ethical challenges with importance of privacy for well-being, impact of brain-reading on mind privacy and neurotechnology....

  2. Random Differential Privacy

    OpenAIRE

    Hall, Rob; Rinaldo, Alessandro; Wasserman, Larry

    2011-01-01

    We propose a relaxed privacy definition called {\\em random differential privacy} (RDP). Differential privacy requires that adding any new observation to a database will have small effect on the output of the data-release procedure. Random differential privacy requires that adding a {\\em randomly drawn new observation} to a database will have small effect on the output. We show an analog of the composition property of differentially private procedures which applies to our new definition. We sh...

  3. Heterogeneous Differential Privacy

    OpenAIRE

    Alaggan, Mohammad; Gambs, Sébastien; Kermarrec, Anne-Marie

    2015-01-01

    The massive collection of personal data by personalization systems has rendered the preservation of privacy of individuals more and more difficult. Most of the proposed approaches to preserve privacy in personalization systems usually address this issue uniformly across users, thus ignoring the fact that users have different privacy attitudes and expectations (even among their own personal data). In this paper, we propose to account for this non-uniformity of privacy expectations by introduci...

  4. Internet and Privacy

    OpenAIRE

    Al-Fadhli, Meshal Shehab

    2007-01-01

    The concept of privacy is hard to understand and is not easy to define, because this concept is linked with several dimensions. Internet Privacy is associated with the use of the Internet and most likely appointed under communications privacy, involving the user of the Internet’s personal information and activities, and the disclosure of them online. This essay is going to present the meaning of privacy and the implications of it for Internet users. Also, this essay will demonstrate some of t...

  5. Privacy and internet services

    OpenAIRE

    Samec, Marek

    2010-01-01

    This thesis is focused on internet services user privacy. Goal of this thesis is to determine level of user awareness of how is their privacy approached while using internet services. Then suggest procedure to improve this awareness, or that will lead to better control of individual privacy. In theoretical part I analyze general and legislative approach to privacy, followed by analysis of behaviour of internet service users and providers. Part of this analysis deals with usage of web cookies ...

  6. Privacy Verification Using Ontologies

    NARCIS (Netherlands)

    Kost, Martin; Freytag, Johann-Christoph; Kargl, Frank; Kung, Antonio

    2011-01-01

    As information systems extensively exchange information between participants, privacy concerns may arise from its potential misuse. A Privacy by Design (PbD) approach considers privacy requirements of different stakeholders during the design and the implementation of a system. Currently, a

  7. A typology of privacy

    NARCIS (Netherlands)

    Koops, Bert Jaap; Newell, Bryce; Timan, Tjerk; Skorvánek, Ivan; Chokrevski, Tomislav; Galič, Maša

    2017-01-01

    Despite the difficulty of capturing the nature and boundaries of privacy, it is important to conceptualize it. Some scholars develop unitary theories of privacy in the form of a unified conceptual core; others offer classifications of privacy that make meaningful distinctions between different types

  8. AEROSPACE NESHAP GUIDANCE: PAINTING AND DEPAINTING ALTERNATIVES FOR SELECTED DOD OPERATIONS

    Science.gov (United States)

    This project was sponsored by the DOD's Strategic Environmental Research and Development program (SERDP) and conducted by the EPA's Clean Processes and Products Branch at the NRMRL. In support of SERDP's objective of developing environmental solutions that improve mission readine...

  9. History of Privacy

    Science.gov (United States)

    Holvast, Jan

    Discussion on privacy issues is as old as mankind. Starting with the protection of one’s body and home, it soon evolved in the direction of controlling one’s personal information. In 1891, the American lawyers Samuel Warren and Louis Brandeis described the right to privacy in a famous article: it is the right to be let alone. In 1967 a new milestone was reached with the publication of Alan Westin’s Privacy and Freedom when he defined privacy in terms of self determination: privacy is the claim of individuals, groups, or institutions to determine for themselves when, how, and to what extent information about them is communicated to others.

  10. Privacy encounters in Teledialogue

    DEFF Research Database (Denmark)

    Andersen, Lars Bo; Bøge, Ask Risom; Danholt, Peter

    2017-01-01

    Privacy is a major concern when new technologies are introduced between public authorities and private citizens. What is meant by privacy, however, is often unclear and contested. Accordingly, this article utilises grounded theory to study privacy empirically in the research and design project...... Teledialogue aimed at introducing new ways for public case managers and placed children to communicate through IT. The resulting argument is that privacy can be understood as an encounter, that is, as something that arises between implicated actors and entails some degree of friction and negotiation....... An argument which is further qualified through the philosophy of Gilles Deleuze. The article opens with a review of privacy literature before continuing to present privacy as an encounter with five different foci: what technologies bring into the encounter; who is related to privacy by implication; what...

  11. Privacy encounters in Teledialogue

    DEFF Research Database (Denmark)

    Andersen, Lars Bo; Bøge, Ask Risom; Danholt, Peter

    2016-01-01

    Privacy is a major concern when new technologies are introduced between public authorities and private citizens. What is meant by privacy, however, is often unclear and contested. Accordingly, this article utilises grounded theory to study privacy empirically in the research and design project....... An argument which is further qualified through the philosophy of Gilles Deleuze. The article opens with a review of privacy literature before continuing to present privacy as an encounter with five different foci: what technologies bring into the encounter; who is related to privacy by implication; what...... Teledialogue aimed at introducing new ways for public case managers and placed children to communicate through IT. The resulting argument is that privacy can be understood as an encounter, that is, as something that arises between implicated actors and entails some degree of friction and negotiation...

  12. Choose Privacy Week: Educate Your Students (and Yourself) about Privacy

    Science.gov (United States)

    Adams, Helen R.

    2016-01-01

    The purpose of "Choose Privacy Week" is to encourage a national conversation to raise awareness of the growing threats to personal privacy online and in day-to-day life. The 2016 Choose Privacy Week theme is "respecting individuals' privacy," with an emphasis on minors' privacy. A plethora of issues relating to minors' privacy…

  13. 75 FR 63703 - Privacy Act of 1974; Privacy Act Regulation

    Science.gov (United States)

    2010-10-18

    ... CFR Part 261a Privacy Act of 1974; Privacy Act Regulation AGENCY: Board of Governors of the Federal...) is issuing a final rule to amend its regulation implementing the Privacy Act of 1974 (Privacy Act..., and applicants for Board employment, for access to their records under the Privacy Act; the amendment...

  14. 75 FR 7648 - Privacy Act of 1974, as Amended; Computer Matching Program (SSA/Department of Veterans Affairs...

    Science.gov (United States)

    2010-02-22

    .../Veterans Benefits Administration (VA/ VBA))--Match Number 1309 AGENCY: Social Security Administration (SSA... announces a renewal of an existing computer matching program that we are currently conducting with VA/VBA... Matching Program, SSA With the Department of Veterans Affairs/Veterans Benefits Administration (VA/VBA) A...

  15. Differential Privacy with Compression

    OpenAIRE

    Zhou, Shuheng; Ligett, Katrina; Wasserman, Larry

    2009-01-01

    This work studies formal utility and privacy guarantees for a simple multiplicative database transformation, where the data are compressed by a random linear or affine transformation, reducing the number of data records substantially, while preserving the number of original input variables. We provide an analysis framework inspired by a recent concept known as differential privacy (Dwork 06). Our goal is to show that, despite the general difficulty of achieving the differential privacy guaran...

  16. Renyi Differential Privacy

    OpenAIRE

    Mironov, Ilya

    2017-01-01

    We propose a natural relaxation of differential privacy based on the Renyi divergence. Closely related notions have appeared in several recent papers that analyzed composition of differentially private mechanisms. We argue that the useful analytical tool can be used as a privacy definition, compactly and accurately representing guarantees on the tails of the privacy loss. We demonstrate that the new definition shares many important properties with the standard definition of differential priva...

  17. Privacy driven internet ecosystem

    OpenAIRE

    Trinh, Tuan Anh; Gyarmati, Laszlo

    2012-01-01

    The dominant business model of today's Internet is built upon advertisements; users can access Internet services while the providers show ads to them. Although significant efforts have been made to model and analyze the economic aspects of this ecosystem, the heart of the current status quo, namely privacy, has not received the attention of the research community yet. Accordingly, we propose an economic model of the privacy driven Internet ecosystem where privacy is handled as an asset that c...

  18. Practical Privacy Assessment

    DEFF Research Database (Denmark)

    Peen, Søren; Jansen, Thejs Willem; Jensen, Christian D.

    2008-01-01

    This chapter proposes a privacy assessment model called the Operational Privacy Assessment Model that includes organizational, operational and technical factors for the protection of personal data stored in an IT system. The factors can be evaluated in a simple scale so that not only the resulting...... graphical depiction can be easily created for an IT system, but graphical comparisons across multiple IT systems are also possible. Examples of factors presented in a Kiviat graph are also presented. This assessment tool may be used to standardize privacy assessment criteria, making it less painful...... for the management to assess privacy risks on their systems....

  19. Renewable Energy Production from DoD Installation Solid Wastes by Anaerobic Digestion

    Science.gov (United States)

    2016-06-01

    of solid waste as appropriate and maintenance of cost effective waste prevention and recycling programs in its facilities (USDOE 2008). • The DOD...is ubiquitous at wastewater treatment plants, they do not exist in great numbers at DoD installations. As such, implementation may require new staff...the anaerobic digester, the digestate could likely flow to a local water reclamation facility in the sewer system. As such, there are no expected

  20. DoD Information Assurance Certification and Accreditation Process (DIACAP) Survey and Decision Tree

    Science.gov (United States)

    2011-07-01

    CVC Compliance and Validation Certification DAA designated accrediting authority DATO denial of authorization to operate DIACAP DoD Information...standard based on implementation of the best practices listed in paragraph 2.3. c. Direct the DSG to rename the Data Protection Committee to the...Information Grid (GIG)- based environment. Figure A-1. DoD IA program management. 1.1.1 DIACAP Background. a. Interim DIACAP signed 6 July 2006

  1. DoD Software-intensive Systems Development: A Hit and Miss Process

    Science.gov (United States)

    2015-04-30

    Program ( ESP ) from 1994-1996 and served as the deputy project manager for Light Tactical Vehicles from 1996-1997. He was the 7th Infantry Division...through attaining level 3 in the SEI’s Capability Maturity Model Integrated (CMMI), or equivalent, assessment methodology (DoD, 2013a, p. 92) The... methodology for defining ever- increasing levels of performance specificity using the SEP to guide the development of each successive layer (DoD, 2005, pp

  2. 78 FR 47336 - Privacy Act of 1974; Computer Matching Program Between the Department of Housing and Urban...

    Science.gov (United States)

    2013-08-05

    ... of 1996 (25 U.S.C. 4101 et seq.); and the Quality Housing and Work Responsibility Act of 1998 (42 U.S...-administered programs involving rental housing assistance to disclose to HUD their social security numbers... From the Federal Register Online via the Government Publishing Office DEPARTMENT OF HOUSING AND...

  3. 76 FR 579 - Privacy Act of 1974; Computer Matching Program Between the Department of Housing and Urban...

    Science.gov (United States)

    2011-01-05

    ... Assistance and Self-Determination Act of 1996 (25 U.S.C. 4101 et seq.); and the Quality Housing and Work... older) in HUD-administered programs involving rental housing assistance to disclose to HUD their social... From the Federal Register Online via the Government Publishing Office DEPARTMENT OF HOUSING AND...

  4. 75 FR 16171 - Privacy Act of 1974; Notice of Modification of Existing Computer Matching Program Between the...

    Science.gov (United States)

    2010-03-31

    ... Between the Department of Housing and Urban Development (HUD) and the Social Security Administration (SSA... Housing and Work Responsibility Act (QHWRA) of 1998. The program will also provide for verification of... From the Federal Register Online via the Government Publishing Office DEPARTMENT OF HOUSING AND...

  5. 75 FR 54162 - Privacy Act of 1974

    Science.gov (United States)

    2010-09-03

    ... Security & Privacy Management (DISPM), Enterprise Architecture and Strategy Group (EASG), Office of... program. We may defer implementation of this matching program if we receive comments that persuade us to defer implementation. See ``Effective Dates'' section below for comment period. DATES: Effective Dates...

  6. 78 FR 8538 - Privacy Act of 1974

    Science.gov (United States)

    2013-02-06

    ... intrusion detection system used by HHS and DHS pursuant to the Einstein 2 program. 8. To provide information... a new system of records. SUMMARY: In accordance with the requirements of the Privacy Act of 1974, CMS is establishing a new system of records titled, ``Health Insurance Exchanges (HIX) Program,'' to...

  7. DOD ELAP Lab Uncertainties

    Science.gov (United States)

    2012-03-01

    certify to :  ISO  9001 (QMS),  ISO   14001  (EMS),   TS 16949 (US Automotive)  etc. 2 3 DoD QSM 4.2 standard   ISO /IEC 17025:2005  Each has uncertainty...298 (Rev. 8-98) Prescribed by ANSI Std Z39-18  Laboratories – ISO /IEC 17025  Inspection Bodies – ISO /IEC 17020  RMPs – ISO  Guide 34 (Reference...Materials)  PT Providers – ISO  17043  Product Certifiers – ISO  Guide 65  Government Programs: DoD ELAP,  EPA Energy Star, CPSC Toy Safety,  NRC, NIST

  8. Provision of Early Intervention and Special Education Services to Eligible DoD Dependents. Final rule.

    Science.gov (United States)

    2015-06-25

    This rule reissues the current regulations and: Establishes policy, assigns responsibilities, and implements the non-funding and non-reporting provisions in DoD for: Provision of early intervention services (EIS) to infants and toddlers with disabilities and their families, as well as special education and related services to children with disabilities entitled under this part to receive education services from the DoD; implementation of a comprehensive, multidisciplinary program of EIS for infants and toddlers with disabilities and their families who, but for age, are eligible to be enrolled in DoD schools; provision of a free appropriate public education (FAPE), including special education and related services, for children with disabilities, as specified in their individualized education programs (IEP), who are eligible to enroll in DoD schools; and monitoring of DoD programs providing EIS, and special education and related services for compliance with this part. This rule also establishes a DoD Coordinating Committee to recommend policies and provide compliance oversight for early intervention and special education.

  9. Balancing Privacy and Professionalism: A Survey of General Surgery Program Directors on Social Media and Surgical Education.

    Science.gov (United States)

    Langenfeld, Sean J; Vargo, Daniel J; Schenarts, Paul J

    Unprofessional behavior is common among surgical residents and faculty surgeons on Facebook. Usage of social media outlets such as Facebook and Twitter is growing at exponential rates, so it is imperative that surgery program directors (PDs) focus on professionalism within social media, and develop guidelines for their trainees and surgical colleagues. Our study focuses on the surgery PDs current approach to online professionalism within surgical education. An online survey of general surgery PDs was conducted in October 2015 through the Association for Program Directors in Surgery listserv. Baseline PD demographics, usage and approach to popular social media outlets, existing institutional policies, and formal curricula were assessed. A total of 110 PDs responded to the survey (110/259, 42.5% response rate). Social media usage was high among PDs (Facebook 68% and Twitter 40%). PDs frequently viewed the social media profiles of students, residents, and faculty. Overall, 11% of PDs reported lowering the rank or completely removing a residency applicant from the rank order list because of online behavior, and 10% reported formal disciplinary action against a surgical resident because of online behavior. Overall, 68% of respondents agreed that online professionalism is important, and that residents should receive instruction on the safe use of social media. However, most programs did not have formal didactics or known institutional policies in place. Use of social media is high among PDs, and they often view the online behavior of residency applicants, surgical residents, and faculty surgeons. Within surgical education, there needs to be an increased focus on institutional policies and standardized curricula to help educate physicians on social media and online professionalism. Copyright © 2016 Association of Program Directors in Surgery. Published by Elsevier Inc. All rights reserved.

  10. Information Privacy Revealed

    Science.gov (United States)

    Lavagnino, Merri Beth

    2013-01-01

    Why is Information Privacy the focus of the January-February 2013 issue of "EDUCAUSE Review" and "EDUCAUSE Review Online"? Results from the 2012 annual survey of the International Association of Privacy Professionals (IAPP) indicate that "meeting regulatory compliance requirements continues to be the top perceived driver…

  11. Toward practicing privacy.

    Science.gov (United States)

    Dwork, Cynthia; Pottenger, Rebecca

    2013-01-01

    Private data analysis-the useful analysis of confidential data-requires a rigorous and practicable definition of privacy. Differential privacy, an emerging standard, is the subject of intensive investigation in several diverse research communities. We review the definition, explain its motivation, and discuss some of the challenges to bringing this concept to practice.

  12. Privacy Metrics and Boundaries

    NARCIS (Netherlands)

    L-F. Pau (Louis-François)

    2005-01-01

    textabstractThis paper aims at defining a set of privacy metrics (quantitative and qualitative) in the case of the relation between a privacy protector ,and an information gatherer .The aims with such metrics are: -to allow to assess and compare different user scenarios and their differences; for

  13. Perception Games and Privacy

    OpenAIRE

    Gradwohl, Ronen; Smorodinsky, Rann

    2014-01-01

    Players (people, firms, states, etc.) have privacy concerns that may affect their choice of actions in strategic settings. We use a variant of signaling games to model this effect and study its relation to pooling behavior, misrepresentation of information, and inefficiency. We discuss these issues and show that common intuitions may lead to inaccurate conclusions about the implications of privacy concerns.

  14. Formal Methods for Privacy

    Science.gov (United States)

    2009-09-01

    automated enforcement [52]. Other policy languages such as P3P [15], which has a formal notation, inform website visitors of the site’s privacy practices...Lorrie Faith Cranor. Web Privacy with P3P . O’Reilly, September 2002. [16] Lorrie Faith Cranor, Praveen Guduru, and Manjula Arjula. User interfaces for

  15. DoD Implementation of the Better Buying Power Initiatives

    Science.gov (United States)

    2012-12-01

    measures outlined in the directive are broad and do not affect each acquisition program; however, where they were applicable to SBIRS, I formulated ...times over. Acquisition reform can be likened to Baskin-Robbins ice cream or to Burger King; you can have a different flavor every week, any way...1950s through 1980s was a boon for technology development in the DoD. With the threat of a Cold War, the United States was positioning itself for

  16. 32 CFR 2400.22 - Freedom of Information Act and Privacy Act requests.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 6 2010-07-01 2010-07-01 false Freedom of Information Act and Privacy Act... INFORMATION SECURITY PROGRAM Declassification and Downgrading § 2400.22 Freedom of Information Act and Privacy... that are submitted under the provisions of the Freedom of Information Act, as amended, or the Privacy...

  17. Energy and cost savings analysis of Wood Burning Boiler Plant, Fort Stewart, Georgia: Final report, Validation of ECIP Project No. 193: DOD, Energy Conservation Investment Program (ECIP)

    Energy Technology Data Exchange (ETDEWEB)

    Broders, M.A.; Miller, D.R.

    1987-08-01

    An Energy Conservation Investment Program (ECIP) project to install a 94,900 lb steam per hour wood burning boiler in the Fort Stewart Central Energy Plant was selected by the US Army for validation by the Oak Ridge National Laboratory. This ECIP project was justified on the basis of fuel cost savings and the use of a renewable energy source: wood waste, which is abundantly available at Fort Stewart, Georgia. This report documents the results of a 1-year postretrofit study designed to validate the energy and cost savings attributed to the installation of the new wood burning boiler. During the postretrofit validation study period (FY 1986), the new wood burning boiler produced approximately 90% of the steam required by the Central Energy Plant to meet the seasonal heating and cooling demands of Fort Stewart. In doing so, over 2,880,000 gal of No. 5 fuel oil (a nonrenewable energy source) was conserved. With full consideration given to the increase in electrical energy required to operate the new Wood Burning Boiler Plant addition, an annual nonrenewable energy savings of over 400,000 MBtu is projected. Based on the results of a life cycle cost analysis performed on this ECIP project, a first-year savings of over $1,200,000 is estimated. The resultant discounted savings ratio is 3.36, and the estimated simple payback period is 6.7 years. It was concluded that installation and operation of a wood burning boiler at a military installation such as Fort Stewart can result in significant cost and nonrenewable energy savings.

  18. Privacy and social network applications

    OpenAIRE

    Roig, Antoni

    2009-01-01

    Privacy technological threatens are no limited to data protection. Social Network Applications (SNA) and ubiquitous computing or Ambient Intelligence face other privacy risks. The business model of SNA and the improvement of data mining allow social computation. SNA regulation should favor privacy-by-design and Privacy Enhancing Technologies (PET). Default friendly-privacy policies should also be adopted. The data portability of the applications shifts SNA into a new field of ubiquitous compu...

  19. Protecting patron privacy

    CERN Document Server

    Beckstrom, Matthew

    2015-01-01

    In a world where almost anyone with computer savvy can hack, track, and record the online activities of others, your library can serve as a protected haven for your visitors who rely on the Internet to conduct research-if you take the necessary steps to safeguard their privacy. This book shows you how to protect patrons' privacy while using the technology that your library provides, including public computers, Internet access, wireless networks, and other devices. Logically organized into two major sections, the first part of the book discusses why the privacy of your users is of paramount

  20. Web Security, Privacy & Commerce

    CERN Document Server

    Garfinkel, Simson

    2011-01-01

    Since the first edition of this classic reference was published, World Wide Web use has exploded and e-commerce has become a daily part of business and personal life. As Web use has grown, so have the threats to our security and privacy--from credit card fraud to routine invasions of privacy by marketers to web site defacements to attacks that shut down popular web sites. Web Security, Privacy & Commerce goes behind the headlines, examines the major security risks facing us today, and explains how we can minimize them. It describes risks for Windows and Unix, Microsoft Internet Exp

  1. Privacy in Social Networks

    CERN Document Server

    Zheleva, Elena

    2012-01-01

    This synthesis lecture provides a survey of work on privacy in online social networks (OSNs). This work encompasses concerns of users as well as service providers and third parties. Our goal is to approach such concerns from a computer-science perspective, and building upon existing work on privacy, security, statistical modeling and databases to provide an overview of the technical and algorithmic issues related to privacy in OSNs. We start our survey by introducing a simple OSN data model and describe common statistical-inference techniques that can be used to infer potentially sensitive inf

  2. Assessment of DoD Wounded Warrior Matters - Wounded Warrior Battalion - West Headquarters and Southern California Units

    Science.gov (United States)

    2012-08-22

    Disability Evaluation System DODI Department of Defense Instruction DOD IG Defense of Defense Inspector General DVA Department of Veterans Affairs...Affairs ( DVA ) healthcare services and management, disability programs, and benefits. The Government Accountability Office (GAO), the Department of

  3. National Privacy Research Strategy

    Data.gov (United States)

    Networking and Information Technology Research and Development, Executive Office of the President — On July 1, NITRD released the National Privacy Research Strategy. Research agencies across government participated in the development of the strategy, reviewing...

  4. Privacy for Sale?

    DEFF Research Database (Denmark)

    Sørensen, Lene Tolstrup; Sørensen, Jannick Kirk; Khajuria, Samant

    Data brokers have become central players in the collection online of private user data. Data brokers’ activities are however not very transparent or even known by users. Many users regard privacy a central element when they use online services. Based on 12 short interviews with users, this paper...... analyses how users perceive the concept of online privacy in respect to data brokers col- lection of private data, and particularly novel services that offer users the possi- bility to sell their private data. Two groups of users are identified: Those who are considering selling their data under specific...... conditions, and those who reject the idea completely. Based on the literature we identify two positions to privacy either as an instrumental good, or as an intrinsic good. The paper positions vari- ous user perceptions on privacy that are relevant for future service develop- ment....

  5. Privacy Policy | FNLCR

    Science.gov (United States)

    The privacy of our users is of utmost importance to Frederick National Laboratory. The policy outlined below establishes how Frederick National Laboratory will use the information we gather about you from your visit to our website. We may coll

  6. Common Privacy Myths

    Science.gov (United States)

    ... cannot discuss your care with your family members – FALSE The Privacy Rule permits healthcare provides to share information that is directly relevant to the involvement of a spouse, family members, friends, or other persons identified by you regarding your ...

  7. 5 CFR 950.701 - DoD overseas campaign.

    Science.gov (United States)

    2010-01-01

    ... 5 Administrative Personnel 2 2010-01-01 2010-01-01 false DoD overseas campaign. 950.701 Section... VOLUNTARY ORGANIZATIONS DoD Overseas Campaign § 950.701 DoD overseas campaign. (a) A Combined Federal Campaign is authorized for all Department of Defense (DoD) activities in the overseas areas during a 6-week...

  8. Privacy and Anonymity

    OpenAIRE

    Yanes, Adrian

    2014-01-01

    Since the beginning of the digital area, privacy and anonymity have been impacted drastically (both, positively and negatively), by the different technologies developed for communications purposes. The broad possibilities that the Internet offers since its conception, makes it a mandatory target for those entities that are aiming to know and control the different channels of communication and the information that flows through. In this paper, we address the current threats against privacy and...

  9. Privacy of juridical bodies

    OpenAIRE

    Tiujo, Edson Mitsuo; CESUMAR

    2007-01-01

    According to art. 52 of the present Civil Code, juridical bodies may be titular to personality rights. The legal provision, however, has not defined what are personality rights attributable to juridical bodies, leaving the interpretation to the judges. Among personality rights, there is the right to privacy, which unfolds in other types such as the right to intimacy, to private life and to secrecy, from which juridical dobies have granted a privacy sphere (right to secrecy), from which third ...

  10. DoD Emerging Contaminants Program

    Science.gov (United States)

    2011-03-28

    Perfluorooctanoic acid (PFOA) • Phthalates …recently added • Diisocyanates …recently added • TCE …moved from action list • Perchlorate …moved from action...completed Nov 2010 • Diisocyanates …completed February 2011 • Phthalates…next • Cobalt • Antimony Acquisition, Technology and Logistics 21 Latest Risk

  11. DOD Personal Property Shipment and Storage Program

    Science.gov (United States)

    1986-04-10

    standards, and criteria governing the procurement of services required to ship, store, and handle personal property. The term does not include... of Services . Services may be procured only from respon- sible carriers, storage firms, arid contractors. To be determined responsible, carriers, their...standards, efficiency, economy, and cost-effectiveness, and ensure that it is consistent with the following criteria: 4y Vor 3I 3. ...f., 1. Procurement

  12. DoD Personnel Security Program

    Science.gov (United States)

    1987-01-01

    transsexualism , indecent exposure, rape, contributing to the delinquency of a minor, child molestation, wife-swapping, window-peeping, and similar situations...rehabilitative success, (e.g., spouse or child abuse). 8. Disposition: a. Conviction. b. Disposition on a legal issue not going to the merits of the crime. c...violations, fighting, child or spouse abuse, non-traffic violation or other criminal incidents related to alcohol use. 3. Deterioration of the individual’s

  13. DoD Industrial Security Program

    Science.gov (United States)

    1985-12-01

    case, the protective marking to be used wll be: Classification determination pending. Protect as though classified (CONFIDENTIAL. SCRET , or TOP SECRET...Communications Security CONUS Continental United States COR Central Office of Record COSMIC- TOP SECRET Property of NATO and Subject to Special Security...SlOP Single Integrated Operational Plan SFF Standard Practice Procedure(s) SSS Signature Security Service TO Transportation Officer (TS) TOP SECRET

  14. Stratospheric Transparency: Perspectives on Internet Privacy

    Science.gov (United States)

    Hauck, Rita M.

    2009-01-01

    As a parent of teenagers in the 1980s, I recall a concern of the intrusion by MTV into our home. After futile attempts to block the program, my spouse and I set out to convince our sons of its intrusion. Our challenge was miniscule when compared to the Internet privacy issues of today. This paper addresses such challenges and proposes some…

  15. Economics of Information Security and Privacy

    CERN Document Server

    Moore, Tyler; Ioannidis, Christos

    2010-01-01

    The Workshop on the Economics of Information Security (WEIS) is the leading forum for interdisciplinary research and scholarship on information security and privacy, combining ideas, techniques, and expertise from the fields of economics, social science, business, law, policy, and computer science. In 2009, WEIS was held in London, at UCL, a constituent college of the University of London. "Economics of Information Security and Privacy" includes chapters presented at WEIS 2009, having been carefully reviewed by a program committee composed of leading researchers. Topics covered inclu

  16. NRC licensing requirements: DOD options

    Energy Technology Data Exchange (ETDEWEB)

    Pike, W.J.; O' Reilly, P.D.

    1982-09-01

    This report describes the licensing process (both safety and environmental) that would apply if the Department of Defense (DOD) chooses to obtain licenses from the US Nuclear Regulatory Commission (NRC) for using nuclear energy for power and luminous sources. The specific nuclear energy sources being considered include: small or medium-size nuclear power reactors; radioisotopic thermoelectric generators with /sup 90/Sr or /sup 238/Pu; radioisotopic dynamic electric generators with /sup 90/Sr or /sup 238/Pu; and applications of radioisotopes for luminous sources (lights) with /sup 3/H, /sup 85/Kr, or /sup 147/Pm. The steps of the licensing process are summarized in the following sections, with particular attention given to the schedule and level of effort necessary to support the process.

  17. DOD Security Cooperation: An Overview of Authorities and Issues

    Science.gov (United States)

    2016-08-23

    institutions. DIRI’s FY2017 budget estimate is $25.6 million. DIRI also supports the Ministry of Defense Advisor Program ( MODA ), which deploys senior DOD...and policy, and financial management. MODA’s FY2017 budget estimate is $9.2 million. Only MODA requires State Department input. The Wales (formerly...CDCs (SASC, HASC, SAC-D, HAC-D). Defense Institution Building and Support Ministry of Defense Advisors ( MODA ) Program: FY2012 NDAA, P.L. 112-81

  18. 78 FR 12337 - Published Privacy Impact Assessments on the Web

    Science.gov (United States)

    2013-02-22

    ... are participating in the DoD's Cyber Security/Information Assurance (CS/IA) Program. This sub-program... Homeland Security Information Network R3 User Accounts (HSIN). Component: Operations Coordination and..., information-sharing platform that connects all homeland security mission partners within a wide spectrum of...

  19. The 2000 DOD Financial Management Improvement Plan

    National Research Council Canada - National Science Library

    2001-01-01

    The Federal Financial Management Improvement Act of 1996 requires DoD financial management systems to comply substantially with Federal financial management system requirements, Federal accounting standards, and the U.S...

  20. Valuing the DoD Process Output

    National Research Council Canada - National Science Library

    Bourazanis, Petros; Gusnadi

    2005-01-01

    .... As a public institution that provides a public good to the people, the DoD has difficulties in using the prominent investment financial ratios used by the private sector as a metric of their performance...

  1. An informational theory of privacy

    NARCIS (Netherlands)

    Schottmuller, C.; Jann, Ole

    2016-01-01

    We develop a theory that explains how and when privacy can increase welfare. Without privacy, some individuals misrepresent their preferences, because they will otherwise be statistically discriminated against. This "chilling effect" hurts them individually, and impairs information aggregation. The

  2. Differential Privacy via Wavelet Transforms

    OpenAIRE

    Xiao, Xiaokui; Wang, Guozhang; Gehrke, Johannes

    2009-01-01

    Privacy preserving data publishing has attracted considerable research interest in recent years. Among the existing solutions, {\\em $\\epsilon$-differential privacy} provides one of the strongest privacy guarantees. Existing data publishing methods that achieve $\\epsilon$-differential privacy, however, offer little data utility. In particular, if the output dataset is used to answer count queries, the noise in the query answers can be proportional to the number of tuples in the data, which ren...

  3. Privacy and Open Government

    Directory of Open Access Journals (Sweden)

    Teresa Scassa

    2014-06-01

    Full Text Available The public-oriented goals of the open government movement promise increased transparency and accountability of governments, enhanced citizen engagement and participation, improved service delivery, economic development and the stimulation of innovation. In part, these goals are to be achieved by making more and more government information public in reusable formats and under open licences. This paper identifies three broad privacy challenges raised by open government. The first is how to balance privacy with transparency and accountability in the context of “public” personal information. The second challenge flows from the disruption of traditional approaches to privacy based on a collapse of the distinctions between public and private sector actors. The third challenge is that of the potential for open government data—even if anonymized—to contribute to the big data environment in which citizens and their activities are increasingly monitored and profiled.

  4. Privacy Expectations in Online Contexts

    Science.gov (United States)

    Pure, Rebekah Abigail

    2013-01-01

    Advances in digital networked communication technology over the last two decades have brought the issue of personal privacy into sharper focus within contemporary public discourse. In this dissertation, I explain the Fourth Amendment and the role that privacy expectations play in the constitutional protection of personal privacy generally, and…

  5. Designing Privacy-by-Design

    NARCIS (Netherlands)

    Rest, J.H.C. van; Boonstra, D.; Everts, M.H.; Rijn, M. van; Paassen, R.J.G. van

    2014-01-01

    The proposal for a new privacy regulation d.d. January 25th 2012 introduces sanctions of up to 2% of the annual turnover of enterprises. This elevates the importance of mitigation of privacy risks. This paper makes Privacy by Design more concrete, and positions it as the mechanism to mitigate these

  6. Privacy in an Ambient World

    NARCIS (Netherlands)

    Dekker, M.A.C.; Etalle, Sandro; den Hartog, Jeremy

    Privacy is a prime concern in today's information society. To protect the privacy of individuals, enterprises must follow certain privacy practices, while collecting or processing personal data. In this chapter we look at the setting where an enterprise collects private data on its website,

  7. What was privacy?

    Science.gov (United States)

    McCreary, Lew

    2008-10-01

    Why is that question in the past tense? Because individuals can no longer feel confident that the details of their lives--from identifying numbers to cultural preferences--will be treated with discretion rather than exploited. Even as Facebook users happily share the names of their favorite books, movies, songs, and brands, they often regard marketers' use of that information as an invasion of privacy. In this wide-ranging essay, McCreary, a senior editor at HBR, examines numerous facets of the privacy issue, from Google searches, public shaming on the internet, and cell phone etiquette to passenger screening devices, public surveillance cameras, and corporate chief privacy officers. He notes that IBM has been a leader on privacy; its policy forswearing the use of employees' genetic information in hiring and benefits decisions predated the federal Genetic Information Nondiscrimination Act by three years. Now IBM is involved in an open-source project known as Higgins to provide users with transportable, potentially anonymous online presences. Craigslist, whose CEO calls it "as close to 100% user driven as you can get," has taken an extremely conservative position on privacy--perhaps easier for a company with a declared lack of interest in maximizing revenue. But TJX and other corporate victims of security breaches have discovered that retaining consumers' transaction information can be both costly and risky. Companies that underestimate the importance of privacy to their customers or fail to protect it may eventually face harsh regulation, reputational damage, or both. The best thing they can do, says the author, is negotiate directly with those customers over where to draw the line.

  8. Defense Health Care: DOD Needs to Clarify Policies Related to Occupational and Environmental Health Surveillance and Monitor Risk Mitigation Activities

    Science.gov (United States)

    2015-05-01

    Technical Bulletin: Sanitary Control and Surveillance of Field Water Supplies (2010) X d X Source: GAO analysis of DOD information. │ GAO-15-487...DEFENSE HEALTH CARE DOD Needs to Clarify Policies Related to Occupational and Environmental Health Surveillance and...Related to Occupational and Environmental Health Surveillance and Monitor Risk Mitigation Activities 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM

  9. DoD Cardholders Used Their Government Travel Cards for Personal Use at Casinos and Adult Entertainment Establishments

    Science.gov (United States)

    2015-05-19

    1 9 , 2 0 1 5 DoD Cardholders Used Their Government Travel Cards for Personal Use at Casinos and Adult Entertainment Establishments Report No...Travel Cards for Personal Use at Casinos and Adult Entertainment Establishments 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6...D2014-D000CL-0201.000) │ i Results in Brief DoD Cardholders Used Their Government Travel Cards for Personal Use at Casinos and Adult Entertainment

  10. Privacy Policy | Smokefree 60+

    Science.gov (United States)

    The National Cancer Institute (NCI) respects the privacy of users of its websites. This is why we have taken the time to disclose our privacy policy and information collection practices. NCI does not disclose, give, sell, or transfer any personal information about visitors unless required to do so by law. NCI automatically collects a limited amount of information about the use of websites for statistical purposes — that is, to measure the numbers of visitors. This information may be helpful when considering changes that improve our websites for future visitors.

  11. Privacy Bridges: EU and US Privacy Experts In Search of Transatlantic Privacy Solutions

    NARCIS (Netherlands)

    Abramatic, J.-F.; Bellamy, B.; Callahan, M.E.; Cate, F.; van Eecke, P.; van Eijk, N.; Guild, E.; de Hert, P.; Hustinx, P.; Kuner, C.; Mulligan, D.; O'Connor, N.; Reidenberg, J.; Rubinstein, I.; Schaar, P.; Shadbolt, N.; Spiekermann, S.; Vladeck, D.; Weitzner, D.J.; Zuiderveen Borgesius, F.; Hagenauw, D.; Hijmans, H.

    2015-01-01

    The EU and US share a common commitment to privacy protection as a cornerstone of democracy. Following the Treaty of Lisbon, data privacy is a fundamental right that the European Union must proactively guarantee. In the United States, data privacy derives from constitutional protections in the

  12. 77 FR 26027 - Privacy Act: Notification of a New Privacy Act System of Records, Veterans Homelessness...

    Science.gov (United States)

    2012-05-02

    ...: Notification of a New Privacy Act System of Records, Veterans Homelessness Prevention Demonstration Evaluation... Homelessness Prevention Demonstration Evaluation Data Files (VHPD Data Files) system. The VHPD Data Files system will involve collaborative efforts needed to evaluate certain HUD homelessness prevention programs...

  13. 78 FR 40515 - Privacy Act of 1974; Privacy Act System of Records

    Science.gov (United States)

    2013-07-05

    ... From the Federal Register Online via the Government Publishing Office NATIONAL AERONAUTICS AND... agency is required by the Privacy Act of 1974 to publish a description of the systems of records it... Candidate Recruitment and Selection Program. DATES: Submit comments on or before 60 calendar days from the...

  14. Biometrics and privacy

    NARCIS (Netherlands)

    Grijpink, J.H.A.M.

    2001-01-01

    Biometrics offers many alternatives for protecting our privacy and preventing us from falling victim to crime. Biometrics can even serve as a solid basis for safe anonymous and semi-anonymous legal transactions. In this article Jan Grijpink clarifies which concepts and practical applications this

  15. Reconciling privacy and security

    NARCIS (Netherlands)

    Lieshout, M.J. van; Friedewald, M.; Wright, D.; Gutwirth, S.

    2013-01-01

    This paper considers the relationship between privacy and security and, in particular, the traditional "trade-off" paradigm. The issue is this: how, in a democracy, can one reconcile the trend towards increasing security (for example, as manifested by increasing surveillance) with the fundamental

  16. Privacy Policy | FNLCR Staging

    Science.gov (United States)

    The privacy of our users is of utmost importance to Frederick National Lab. The policy outlined below establishes how Frederick National Lab will use the information we gather about you from your visit to our website. We may collect and store

  17. 77 FR 69807 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2012-11-21

    ... of birth, home of record state, sex, race, education level; VA disability payment records; digital... cards; and to detect fraud and abuse of the benefit programs by claimants and providers to include... analyses; identify current DoD civilian and military personnel for purposes of detecting fraud and abuse of...

  18. Defense Science Board Task Force Report: The Role of Autonomy in DoD Systems

    Science.gov (United States)

    2012-07-01

    sufficient for the demands of the task. Apple’s SIRI system for requesting information on the iPhone (based partly on results from DARPA’s Cognitive...TASK FORCE REPORT: The Role of Autonomy in DoD Systems July 2012 Report Documentation Page Form ApprovedOMB No. 0704-0188 Public...TITLE AND SUBTITLE The Role of Autonomy in DoD Systems 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) 5d. PROJECT

  19. Collaborative Privacy - A Community-Based Privacy Infrastructure

    Science.gov (United States)

    Kolter, Jan; Kernchen, Thomas; Pernul, Günther

    The landscape of the World Wide Web with all its versatile services heavily relies on the disclosure of private user information. Service providers collecting more and more of these personal user data pose a growing privacy threat for users. Addressing user concerns privacy-enhancing technologies emerged. One goal of these technologies is to enable users to improve the control over their personal data. A famous representative is the PRIME project that aims for a holistic privacy-enhancing identity management system. However, approaches like the PRIME privacy architecture require service providers to change their server infrastructure and add specific privacy-enhancing components. In the near future, service providers are not expected to alter internal processes. In this paper, we introduce a collaborative privacy community that allows the open exchange of privacy-related information. We lay out the privacy community’s functions and potentials within a user-centric, provider-independent privacy architecture that will help foster the usage and acceptance of privacy-enhancing technologies.

  20. DoD Installations, Energy and the Environment: The Challenge - and Opportunity

    Science.gov (United States)

    2010-06-15

    DoD Installations, Energy and the Environment : The Challenge—and Opportunity Dorothy Robyn Deputy Under Secretary of Defense (Installations and... the Environment : The Challenge - and Opportunity 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) 5d. PROJECT NUMBER

  1. Defense Satellite Communications: DOD Needs Additional Information to Improve Procurements

    Science.gov (United States)

    2015-07-01

    prior GAO reports, and interviewed DOD officials. What GAO Recommends GAO recommends that DOD (1) enforce current policy requiring DISA to acquire...its components to procure commercial SATCOM through the Defense Information Systems Agency ( DISA ), but GAO found that some components are...bought independently by DOD components, even though DOD found the average cost of commercial SATCOM bought through DISA is about 16 percent lower than

  2. Paradigm shift: Can TQM save DOD's procurement process?

    Science.gov (United States)

    Romeo, Ross V.

    1992-11-01

    The Department of Defense's (DOD) ambitious introduction of total quality management (TQM) will fail, unless they change their paradigm and reengineer how they do business. TQM implementation in the defense department and possibilities for reengineering DOD's management structure were investigated. This paper uses a case study to investigate DOD's procurement efficiency and effectiveness with information technology. The findings show DOD is faced with its greatest challenge since WWII in meeting the rapidly evolving environment of the 1990s and the 21st century.

  3. Privacy and Data Protection in Japan.

    Science.gov (United States)

    Srinivasan, Srinija

    1992-01-01

    Discussion of individual rights and privacy in Japan focuses on the Privacy Protection Act, which acknowledges the threat posed by government databases to the individual's right of privacy. Characteristics of the Japanese legal system are described, origins of privacy in Japanese law are examined, and privacy and government databases are…

  4. Privacy Awareness: A Means to Solve the Privacy Paradox?

    Science.gov (United States)

    Pötzsch, Stefanie

    People are limited in their resources, i.e. they have limited memory capabilities, cannot pay attention to too many things at the same time, and forget much information after a while; computers do not suffer from these limitations. Thus, revealing personal data in electronic communication environments and being completely unaware of the impact of privacy might cause a lot of privacy issues later. Even if people are privacy aware in general, the so-called privacy paradox shows that they do not behave according to their stated attitudes. This paper discusses explanations for the existing dichotomy between the intentions of people towards disclosure of personal data and their behaviour. We present requirements on tools for privacy-awareness support in order to counteract the privacy paradox.

  5. Colourful Privacy: Designing Visible Privacy Settings with Teenage Hospital Patients

    OpenAIRE

    van der Velden, Maja; Machniak, Margaret

    2014-01-01

    The paper reports from a qualitative study based on the analysis of semi-structured interviews and Participatory Design activities with hospitalised teenagers with chronic health challenges. We studied how teenage patients manage their online privacy, with a focus on the design and use of privacy settings. We found that the majority of participants preferred to visualise privacy settings through the use colours and to personalise access control. They also considered these necessary on more se...

  6. Reporting of DOD Inventory and Operating Materials and Supplies on the FY 1997 DOD Consolidated Financial Statements.

    Science.gov (United States)

    1998-11-05

    4 ~ or r0 19990908 014i ~i \\ REPORTING OF DOD INVENTORY AND OPERATING MATERIALS AND SUPPLIES ON THE FY 1997 DOD CONSOLIDATED FINANCIAL ...and Supplies on the FY 1997 DoD Consolidated Financial Statements ( Report No. 99-032) We are providing this report for review and comment. This is the...second in a series of reports on the FY 1997 DoD Consolidated Financial Statements. The Under Secretary of Defense (Comptroller) did not respond to

  7. DOD Financial Management: Improvement Needed in DOD Components’ Implementation of Audit Readiness Effort

    Science.gov (United States)

    2011-09-01

    DOD Financial Management Abbreviations AFB Air Force Base COSO Committee of Sponsoring Organizations of the Treadway...Tool;3 the COSO Guidance on Monitoring Internal Control Systems; and the FIAR Guidance. We conducted this performance audit from May 2010 to

  8. Online Learning via Differential Privacy

    OpenAIRE

    Abernethy, Jacob; Lee, Chansoo; McMillan, Audra; Tewari, Ambuj

    2017-01-01

    We explore the use of tools from differential privacy in the design and analysis of online learning algorithms. We develop a simple and powerful analysis technique for Follow-The-Leader type algorithms under privacy-preserving perturbations. This leads to the minimax optimal algorithm for k-sparse online PCA and the best-known perturbation based algorithm for the dense online PCA. We also show that the differential privacy is the core notion of algorithm stability in various online learning p...

  9. DoD Cybersecurity Discipline Implementation Plan

    Science.gov (United States)

    2016-02-01

    ensure device management is restricted by two-factor authentication (e.g., SecurID [( RSA keys)], DoD PKI, or alternate token logon).” a. Do all...release. “Evaluate and Approve Systems, Fix Vulnerabilities, Perform Regular Security Control Testing ” Current Objective: Systems with high risk

  10. Electronic Payment in DoD Contracting

    Science.gov (United States)

    1993-06-01

    benefits 28 Bank B AuLA Federal Reserve Bank Company A (Originator) "............... a Bank Local ACI- 3 . Company B (Receiver) 5 " Steps in the...study the observation that payment and accounting functions within DoD are virtually inseparable has been stressed. One of the major benefits of

  11. Cognitive Privacy for Personal Clouds

    Directory of Open Access Journals (Sweden)

    Milena Radenkovic

    2016-01-01

    Full Text Available This paper proposes a novel Cognitive Privacy (CogPriv framework that improves privacy of data sharing between Personal Clouds for different application types and across heterogeneous networks. Depending on the behaviour of neighbouring network nodes, their estimated privacy levels, resource availability, and social network connectivity, each Personal Cloud may decide to use different transmission network for different types of data and privacy requirements. CogPriv is fully distributed, uses complex graph contacts analytics and multiple implicit novel heuristics, and combines these with smart probing to identify presence and behaviour of privacy compromising nodes in the network. Based on sensed local context and through cooperation with remote nodes in the network, CogPriv is able to transparently and on-the-fly change the network in order to avoid transmissions when privacy may be compromised. We show that CogPriv achieves higher end-to-end privacy levels compared to both noncognitive cellular network communication and state-of-the-art strategies based on privacy-aware adaptive social mobile networks routing for a range of experiment scenarios based on real-world user and network traces. CogPriv is able to adapt to varying network connectivity and maintain high quality of service while managing to keep low data exposure for a wide range of privacy leakage levels in the infrastructure.

  12. Data privacy for the smart grid

    CERN Document Server

    Herold, Rebecca

    2015-01-01

    The Smart Grid and PrivacyWhat Is the Smart Grid? Changes from Traditional Energy Delivery Smart Grid Possibilities Business Model Transformations Emerging Privacy Risks The Need for Privacy PoliciesPrivacy Laws, Regulations, and Standards Privacy-Enhancing Technologies New Privacy Challenges IOT Big Data What Is the Smart Grid?Market and Regulatory OverviewTraditional Electricity Business SectorThe Electricity Open Market Classifications of Utilities Rate-Making ProcessesElectricity Consumer

  13. Temporal Mode-Checking for Runtime Monitoring of Privacy Policies

    Science.gov (United States)

    2014-05-28

    Workshop on Privacy in the Electronic Society. WPES ’10, New York, NY, USA, ACM (2010) 73–82 [13] Apt, K., Marchiori, E.: Reasoning about prolog programs...1985, IEEE-CS (1985) 29–38 [15] Mellish, C.S.: The automatic generation of mode declarations for Prolog programs. Depart- ment of Artificial

  14. Story Lab: Student Data Privacy

    Science.gov (United States)

    Herold, Benjamin

    2015-01-01

    Student data privacy is an increasingly high-profile--and controversial--issue that touches schools and families across the country. There are stories to tell in virtually every community. About three dozen states have passed legislation addressing student data privacy in the past two years, and eight different proposals were floating around…

  15. 76 FR 59073 - Privacy Act

    Science.gov (United States)

    2011-09-23

    ... 32 CFR Part 1901 Privacy Act AGENCY: Central Intelligence Agency. ACTION: Proposed rule. SUMMARY: Consistent with the Privacy Act (PA), the Central Intelligence Agency (CIA) has undertaken and completed a... Act (PA), the CIA has undertaken and completed a review of its public PA regulations. As a result of...

  16. 78 FR 73466 - Privacy Act

    Science.gov (United States)

    2013-12-06

    ... CORPORATION 22 CFR Part 707 Privacy Act AGENCY: Overseas Private Investment Corporation. ACTION: Notice of... (``OPIC'') Privacy Act (``PA'') regulations by making substantive and administrative changes. These... confidential or inappropriate for public disclosure. Regulatory Flexibility Act (5 U.S.C. 601 et seq.) Pursuant...

  17. Privacy Law and Print Photojournalism.

    Science.gov (United States)

    Dykhouse, Caroline Dow

    Reviews of publications about privacy law, of recent court actions, and of interviews with newspaper photographers and attorneys indicate that torts of privacy often conflict with the freedoms to publish and to gather news. Although some guidelines have already been established (about running distorted pictures, "stealing" pictures, taking…

  18. Privacy-Preserving Trajectory Collection

    DEFF Research Database (Denmark)

    Gidofalvi, Gyozo; Xuegang, Huang; Pedersen, Torben Bach

    2008-01-01

    . To remedy this situation, this paper first formally defines novel location privacy requirements. Then, it briefly presents a system for privacy--preserving trajectory collection that meets these requirements. The system is composed of an untrusted server and clients communicating in a P2P network. Location...

  19. Privacy and the News Media.

    Science.gov (United States)

    Cooper, Stephen

    1995-01-01

    States that the right of the public to know and the right of the individual to privacy are inherently in conflict. Examines the relationship between privacy law and the press. Observes that conditions with the birth of new electronic media are similar to those of a century ago, when two lawyers sued for relief from aggressive journalists. (PA)

  20. 42 CFR 403.812 - HIPAA privacy, security, administrative data standards, and national identifiers.

    Science.gov (United States)

    2010-10-01

    ... 42 Public Health 2 2010-10-01 2010-10-01 false HIPAA privacy, security, administrative data... Prescription Drug Discount Card and Transitional Assistance Program § 403.812 HIPAA privacy, security, administrative data standards, and national identifiers. (a) HIPAA covered entities. An endorsed sponsor is a...

  1. 75 FR 10554 - Privacy Act of 1974; System of Records Notice

    Science.gov (United States)

    2010-03-08

    ... Federal Motor Carrier Safety Administration Privacy Act of 1974; System of Records Notice AGENCY: Federal... Privacy Act of 1974 (5 U.S.C. 552a) for its Pre-Employment Screening Program (PSP), as required by 49 U.S... drivers (motor carriers), via a secure Internet site, as an alternative to requiring them to submit a...

  2. 76 FR 34650 - Announcing a Meeting of the Information Security and Privacy Advisory Board

    Science.gov (United States)

    2011-06-14

    ... expected to include the following items: --Cloud Security and Privacy Panel discussion on addressing security and privacy for different types of cloud computing, --Presentation from National Strategy for... Protection and Programs Directorate, DHS, on the white paper, ``Enabling Distributed Security in Cyberspace...

  3. Money is privacy

    OpenAIRE

    Kahn, Charles M.; McAndrews, James; Roberds, William

    2004-01-01

    An extensive literature in monetary theory has emphasized the role of money as a record-keeping device. Money assumes this role in situations where using credit would be too costly, and some might argue that this role will diminish as the cost of information, and thus the cost of credit-based transactions, continues to fall. ; In this paper we investigate another use for money: the provision of privacy. That is, a money purchase does not identify the purchaser while a credit purchase does. In...

  4. Performing privacy in schools

    DEFF Research Database (Denmark)

    Bøge, Ask Risom; Albrechtslund, Anders; Andersen, Lars Bo

    . School life involves a wide range of technologies, including smartphones, online communication platforms between teachers and parents, and social media. These and other surveillance-enabling services all contribute to the tracking of and by school children and shape their perceptions of privacy (Monahan....... Rutgers University Press. Selwyn, N. (2010). Schools and Schooling in the Digital Age: A Critical Analysis. Routledge. Taylor, E. (2013). Surveillance Schools: Security, Discipline and Control in Contemporary Education. Palgrave Macmillan UK. Taylor, E., & Rooney, T. (2016). Surveillance Futures: Social...

  5. Privacy and Big Data

    CERN Document Server

    Craig, Terence

    2011-01-01

    Much of what constitutes Big Data is information about us. Through our online activities, we leave an easy-to-follow trail of digital footprints that reveal who we are, what we buy, where we go, and much more. This eye-opening book explores the raging privacy debate over the use of personal data, with one undeniable conclusion: once data's been collected, we have absolutely no control over who uses it or how it is used. Personal data is the hottest commodity on the market today-truly more valuable than gold. We are the asset that every company, industry, non-profit, and government wants. Pri

  6. Quo vadis, data privacy?

    Science.gov (United States)

    Gehrke, Johannes

    2012-07-01

    Society can gain much value from Big Data. We can study census data to learn where to allocate public resources, medical records from hospitals to fight diseases, or data about students and teachers to evaluate the effectiveness of various approaches to learning and teaching. In all of these scenarios, we need to limit statistical disclosure: we want to release accurate statistics about the data while preserving the privacy of the individuals who contributed it. This paper gives an overview of recent advances and open challenges in the field, focusing on methods that probably limit how much an adversary can learn from a data release. © 2012 New York Academy of Sciences.

  7. User Privacy in RFID Networks

    Science.gov (United States)

    Singelée, Dave; Seys, Stefaan

    Wireless RFID networks are getting deployed at a rapid pace and have already entered the public space on a massive scale: public transport cards, the biometric passport, office ID tokens, customer loyalty cards, etc. Although RFID technology offers interesting services to customers and retailers, it could also endanger the privacy of the end-users. The lack of protection mechanisms being deployed could potentially result in a privacy leakage of personal data. Furthermore, there is the emerging threat of location privacy. In this paper, we will show some practical attack scenarios and illustrates some of them with cases that have received press coverage. We will present the main challenges of enhancing privacy in RFID networks and evaluate some solutions proposed in literature. The main advantages and shortcomings will be briefly discussed. Finally, we will give an overview of some academic and industrial research initiatives on RFID privacy.

  8. A Generic Privacy Quantification Framework for Privacy-Preserving Data Publishing

    Science.gov (United States)

    Zhu, Zutao

    2010-01-01

    In recent years, the concerns about the privacy for the electronic data collected by government agencies, organizations, and industries are increasing. They include individual privacy and knowledge privacy. Privacy-preserving data publishing is a research branch that preserves the privacy while, at the same time, withholding useful information in…

  9. Medical information and the right to privacy

    Energy Technology Data Exchange (ETDEWEB)

    Drell, D. [ed.

    1994-06-01

    This report is a compilation of submitted abstracts of papers presented at the DOE-supported workshop on medical information and the right to privacy held at the National Academy of Sciences in Washington, DC, on June 9 and 10, 1994. The aim of this meeting is to provide a forum to discuss the legal, ethical and practical issues related to the computerization and use of medical data, as well as the potential impact the use of these data may have on an individual`s privacy. Topical areas include an overview of the Federal and legal requirements to collect medical data, historical experiences with worker screening programs, currently available medical surveillance technologies (both biomedical and computer technologies) and their limitations. In addition, an-depth assessment of the needs and interests of a wide spectrum of parties as they relate to the use of medical data from both a legal and privacy perspective is provided. The needs of the individual, the public (e.g., blood and tissue banks), private enterprises (e.g., industry and insurance carriers), and the government (e.g., FBI) are discussed. Finally, the practical and legal issues relating to the use of computers to carry, store and transmit this information are also examined. The abstracts are presented in the intended order of presentation as indicated in the agenda for the meeting.

  10. Privacy in Social Networks: A Survey

    Science.gov (United States)

    Zheleva, Elena; Getoor, Lise

    In this chapter, we survey the literature on privacy in social networks. We focus both on online social networks and online affiliation networks. We formally define the possible privacy breaches and describe the privacy attacks that have been studied. We present definitions of privacy in the context of anonymization together with existing anonymization techniques.

  11. 48 CFR 39.105 - Privacy.

    Science.gov (United States)

    2010-10-01

    ... 48 Federal Acquisition Regulations System 1 2010-10-01 2010-10-01 false Privacy. 39.105 Section 39... CONTRACTING ACQUISITION OF INFORMATION TECHNOLOGY General 39.105 Privacy. Agencies shall ensure that contracts for information technology address protection of privacy in accordance with the Privacy Act (5 U.S.C...

  12. Employee Privacy Rights: A Management Guide.

    Science.gov (United States)

    Shepard, Ira Michael; Olsen, Harry

    Employee privacy rights are considered, along with practical problems and permissible parameters of employer activity. Included is a state-by-state analysis of the status of workplace privacy. Definitions are offered of "invasion of privacy," with attention to four types of privacy invasions: (1) placing someone in a "false light," (2) the public…

  13. Rethinking Privacy: A Feminist Approach to Privacy Rights after Snowden

    OpenAIRE

    Weinberg, Lindsay

    2017-01-01

    Tim Cook’s message to Apple customers, regarding Apple’s refusal to provide the FBI with a backdoor to the San Bernardino shooter’s iPhone, typifies the corporate appropriation of privacy rights discourse. In light of this appropriation, I propose a reconsideration of the sovereign subject presupposed by privacy rights discourse through a comparative approach to the US and EU’s treatments of privacy rights. I then apply feminist theories of the non-sovereign subject, which challenge liberal d...

  14. 48 CFR 11.102 - Standardization program.

    Science.gov (United States)

    2010-10-01

    ... 48 Federal Acquisition Regulations System 1 2010-10-01 2010-10-01 false Standardization program... Standardization program. Agencies shall select existing requirements documents or develop new requirements... Standardization Manual, FSPM-0001; for DoD components, DoD 4120.24-M, Defense Standardization Program Policies and...

  15. Nursing professional facing patient privacy

    Directory of Open Access Journals (Sweden)

    Fidel López Espuela

    2010-05-01

    Full Text Available Privacy of patients admitted to the hospital is played down in favour of other needs considered more basic by the healthcare system and more related to the disease than to patients themselves. Situations and factors where privacy is damaged are frequent, but it is known that when these are avoided by professionals’ attitude, through strategies and different mechanisms, it becomes one of the most satisfactory elements to patients.Objectives: To identify and analyze situations and factors which affect privacy in hospital environment as well as the adaptation capacity of patients to them.Methodology: Phenomenological, qualitative research. By means of discussion groups with professionals, the following questions where answered: ‘What do professionals understand by privacy? Which situations and factors jeopardize it during the hospital stay? How do they think patients get adapted?Results: The concept of privacy is complex, personal and non-transferable. Situations in which it is jeopardized were divided in 5 main areas. Numerous behaviors regarding adaptation of patients to these were collected.Discussion: Although there is little nursery research referring to privacy and its defense in the professional-patient relationship field, concern about this aspect always shown by nursery staff stands out.As a conclussion, we observe the need to complement this research with the perception patients have about these same questions, establishing the importance they give to privacy.

  16. How the Department of Transportation Supports the DOD

    Science.gov (United States)

    2016-03-09

    vehicular use and move- ment on the nation’s transportation networks. DOT Support of the DOD The DOT supports the DOD during times of war and contin...ensure our nation’s transportation networks are safe and efficient and support the move- ment of commerce. In addition to its core domestic...is a How the Department of Transportation Supports the DOD The Department of Transportation is a critical enabler of civilian transportation for

  17. Cybersecurity Activities Support to DoD Information Network Operations

    Science.gov (United States)

    2016-03-07

    Component training or certification requirements. DoDI 8530.01, March 7, 2016 ENCLOSURE 4 33 ENCLOSURE 4 CYBERSECURITY INTEGRATION INTO DoDIN...Department of Defense INSTRUCTION NUMBER 8530.01 March 7, 2016 DoD CIO SUBJECT: Cybersecurity Activities Support to DoD Information...organizational entities within the DoD (referred to collectively in this instruction as the “DoD Components”). DoDI 8530.01, March 7, 2016 2 b

  18. An Efficient Context-Aware Privacy Preserving Approach for Smartphones

    Directory of Open Access Journals (Sweden)

    Lichen Zhang

    2017-01-01

    Full Text Available With the proliferation of smartphones and the usage of the smartphone apps, privacy preservation has become an important issue. The existing privacy preservation approaches for smartphones usually have less efficiency due to the absent consideration of the active defense policies and temporal correlations between contexts related to users. In this paper, through modeling the temporal correlations among contexts, we formalize the privacy preservation problem to an optimization problem and prove its correctness and the optimality through theoretical analysis. To further speed up the running time, we transform the original optimization problem to an approximate optimal problem, a linear programming problem. By resolving the linear programming problem, an efficient context-aware privacy preserving algorithm (CAPP is designed, which adopts active defense policy and decides how to release the current context of a user to maximize the level of quality of service (QoS of context-aware apps with privacy preservation. The conducted extensive simulations on real dataset demonstrate the improved performance of CAPP over other traditional approaches.

  19. A Privacy Manager for Cloud Computing

    Science.gov (United States)

    Pearson, Siani; Shen, Yun; Mowbray, Miranda

    We describe a privacy manager for cloud computing, which reduces the risk to the cloud computing user of their private data being stolen or misused, and also assists the cloud computing provider to conform to privacy law. We describe different possible architectures for privacy management in cloud computing; give an algebraic description of obfuscation, one of the features of the privacy manager; and describe how the privacy manager might be used to protect private metadata of online photos.

  20. Defense Management Challenges Facing DOD in Implementing Defense Reform Initiatives

    National Research Council Canada - National Science Library

    Warren, David

    1998-01-01

    .... Specifically, it is proposing to: reengineer many of its business processes; consolidate and reorganize DOD'S headquarters elements and defense agencies, including the Office of the Secretary of Defense...

  1. Health data privacy.

    Science.gov (United States)

    Benjamin, G C; Kennan, S A

    1997-01-01

    How can the tradition of patient-provider confidentiality be preserved and still meet the changing information needs of insurers, employers, public health agencies, policy analysts, and researchers? As countries grapple with the issue of a patient's right to medical record privacy, actions that the U.S. takes in this area will set precedents and have implications for nearly every health care electronic transaction. The Health Insurance Portability and Accountability Act requires the Secretary of Health and Human Services (HHS) to recommend standards for electronic financial and administrative transactions. The HHS focused on the confidentially of patient's health care information, guided by five principles in developing recommendations: (1) Boundaries; (2) Security; (3) Consumer Control; (4) Accountability; and (5) Public Responsibility.

  2. Parasiteware: Unlocking Personal Privacy

    Directory of Open Access Journals (Sweden)

    Daniel B. Garrie

    2006-09-01

    Full Text Available Spyware presents a threat of privacy infringement to unassuming internet users irrespective of their country of citizenship. European legislation attempts to protect end-users from unethical processing of their personal data. Spyware technologies, however, skirts these laws and often break them in their entirety. Outlawing the spyware and strengthening the legal consent requirement to mine data are statutory solutions that can prevent spyware users from skirting the law. An internationally standardized technology education system for the judiciaries in Europe and the U.S. can help ensure that when spyware users do break the law, they cannot hide by escaping from one nation to another without being held accountable. Transnational improvements are necessary to remedy the global spyware epidemic.

  3. Insider Threats: DOD Should Strengthen Management and Guidance to Protect Classified Information and Systems

    Science.gov (United States)

    2015-06-01

    e.g., criminal, financial, or credit records) will flag issues of personnel security concern. These checks are to supplement existing security...Guide Host red team DOD, Department of Defense Strategy for Operating in Cyberspace; DODI 8500.01; Joint Chiefs of Staff, Joint Pub. 3-07.2...Connect with GAO To Report Fraud , Waste, and Abuse in Federal Programs Congressional Relations Public Affairs Please Print on Recycled Paper.

  4. Defense Acquisitions: Opportunities Exist to Improve DOD’s Oversight of Power Source Investments

    Science.gov (United States)

    2010-12-01

    defense power sources industry in DOD investments in power source S&T, we met with representatives of Saft America Inc. ( Saft ), Advanced Thermal Batteries...and EaglePicher Technologies, LLC (EaglePicher). According to the companies, Saft and Page 33 GAO-11-113 Defense Acquisitions Appendix I...Air-to-Surface Standoff Missile, Navstar Global Positioning System (GPS) GPS III, and Advanced Extremely High Frequency satellites program offices

  5. Genetic privacy in sports: clearing the hurdles.

    Science.gov (United States)

    Callier, Shawneequa

    2012-12-01

    As genomic medicine continues to advance and inform clinical care, knowledge gained is likely to influence sports medicine and training practices. Susceptibility to injury, sudden cardiac failure, and other serious conditions may one day be tackled on a subclinical level through genetic testing programs. In addition, athletes may increasingly consider using genetic testing services to maximize their performance potential. This paper assesses the role of privacy and genetic discrimination laws that would apply to athletes who engage in genetic testing and the limits of these protections.

  6. Privacy Preserving Distributed Data Mining

    Data.gov (United States)

    National Aeronautics and Space Administration — Distributed data mining from privacy-sensitive multi-party data is likely to play an important role in the next generation of integrated vehicle health monitoring...

  7. Privacy Impact Assessment (PIA) Repository

    Data.gov (United States)

    Department of Veterans Affairs — This repository contains Privacy Impact Assessments (PIA) that have been vetted/approved. Section 208 of the Electronic Government Act of 2002 (E-Gov Act) requires...

  8. Librarians, Civil Liberties and Privacy.

    Science.gov (United States)

    Fielding, Derek

    1978-01-01

    A comparison of current civil liberties issues in Australia with the status of similar issues in Britain and the United States. Included are political affiliation of government employees, censorship, rights of the individual, privacy, and freedom of information. (JAB)

  9. Factors and Predictors of Online Security and Privacy Behavior

    Directory of Open Access Journals (Sweden)

    Goran Bubaš

    2008-12-01

    Full Text Available Assumptions and habits regarding computer and Internet use are among the major factors which influence online privacy and security of Internet users. In our study a survey was performed on 312 subjects (college students who are Internet users with IT skills that investigated how assumptions and habits of Internet users are related to their online security and privacy. The following four factors of online security and privacy related behaviors were revealed in factor analysis: F1 – conscientiousness in the maintenance of the operating system, upgrading of the Internet browser and use of antivirus and antispyware programs; F2 –engagement in risky and careless online activities with lack of concern for personal online privacy; F3 – disbelief that privacy violations and security threats represent possible problems; F4 – lack of fear regarding potential privacy and security threats with no need for change in personal online behavior. Statistically significant correlations were found between some of the discovered factors on the one side, and criteria variables occurrence of malicious code (C1 and data loss on the home computer (C2 on the other. In addition, a regression analysis was performed which revealed that the potentially risky online behaviors of Internet users were associated with the two criteria variables. To properly interpret the results of correlation and regression analyses a conceptual model was developed of the potential causal relationships between the behavior of Internet users and their experiences with online security threats. An additional study was also performed which partly confirmed the conceptual model, as well as the factors of online security and privacy related behaviors.

  10. Privacy in Online Social Networks

    OpenAIRE

    Raad, Elie; Chbeir, Richard

    2013-01-01

    Online social networks have become an important part of the online activities on the web and one of the most influencing media. Unconstrained by physical spaces, online social networks offer to web users new interesting means to communicate, interact, and socialize. While these networks make frequent data sharing and inter-user communications instantly possible, privacy-related issues are their obvious much discussed immediate consequences. Although the notion of privacy may take different fo...

  11. Lower bounds in differential privacy

    OpenAIRE

    De, Anindya

    2011-01-01

    This is a paper about private data analysis, in which a trusted curator holding a confidential database responds to real vector-valued queries. A common approach to ensuring privacy for the database elements is to add appropriately generated random noise to the answers, releasing only these {\\em noisy} responses. In this paper, we investigate various lower bounds on the noise required to maintain different kind of privacy guarantees.

  12. Deep Learning with Differential Privacy

    OpenAIRE

    Abadi, Martín; Chu, Andy; Goodfellow, Ian; McMahan, H. Brendan; Mironov, Ilya; Talwar, Kunal; Zhang, Li

    2016-01-01

    Machine learning techniques based on neural networks are achieving remarkable results in a wide variety of domains. Often, the training of models requires large, representative datasets, which may be crowdsourced and contain sensitive information. The models should not expose private information in these datasets. Addressing this goal, we develop new algorithmic techniques for learning and a refined analysis of privacy costs within the framework of differential privacy. Our implementation and...

  13. Security and privacy in biometrics

    CERN Document Server

    Campisi, Patrizio

    2013-01-01

    This important text/reference presents the latest secure and privacy-compliant techniques in automatic human recognition. Featuring viewpoints from an international selection of experts in the field, the comprehensive coverage spans both theory and practical implementations, taking into consideration all ethical and legal issues. Topics and features: presents a unique focus on novel approaches and new architectures for unimodal and multimodal template protection; examines signal processing techniques in the encrypted domain, security and privacy leakage assessment, and aspects of standardizati

  14. 75 FR 27294 - Privacy Act System of Records

    Science.gov (United States)

    2010-05-14

    ... Statistics for the 2010 Decennial Census, into the COMMERCE/CENSUS-5, Decennial Census Program. No comments... From the Federal Register Online via the Government Publishing Office DEPARTMENT OF COMMERCE Privacy Act System of Records AGENCY: U.S. Census Bureau, Department of Commerce. ACTION: Notice of...

  15. 78 FR 41919 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2013-07-12

    ...: Notice to alter a System of Records. SUMMARY: The Defense Finance and Accounting Service proposes to.... Gregory L. Outlaw, Defense Finance and Accounting Service, Freedom of Information/Privacy Act Program... (317) 212-4591. SUPPLEMENTARY INFORMATION: The Defense Finance and Accounting Service notices for...

  16. 78 FR 79412 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2013-12-30

    ... alter a System of Records. SUMMARY: The Defense Finance and Accounting Service proposes to alter a system of records, T7205, General Accounting and Finance System--Report Database for Financial Statements.... Gregory L. Outlaw, Defense Finance and Accounting Service, Freedom of Information/Privacy Act Program...

  17. A Flow-Sensitive Analysis of Privacy Properties

    DEFF Research Database (Denmark)

    Nielson, Hanne Riis; Nielson, Flemming

    2007-01-01

    that information I send to some service never is leaked to another service? - unless I give my permission? We shall develop a static program analysis for the pi- calculus and show how it can be used to give privacy guarantees like the ones requested above. The analysis records the explicit information flow...

  18. 76 FR 9849 - Privacy Act of 1974: System of Records

    Science.gov (United States)

    2011-02-22

    ... databases at MANILA and the Volpe Center that are secured by password security, encryption, firewalls, and... Administration (FMCSA), Department of Transportation. ACTION: Notice to establish a new system of records... Medical Exemption Program to ensure that privacy and security objectives are met. More detailed...

  19. 77 FR 69444 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2012-11-19

    ... Register Liaison Officer, Department of Defense. T7330 System name: DFAS Payroll Locator File System (PLFS... Service-Cleveland, Information Systems Program Specialist, I&T, Payroll Service, Cleveland, OH 44199-2055... of the Secretary Privacy Act of 1974; System of Records AGENCY: Defense Finance and Accounting...

  20. 77 FR 19751 - Privacy Act of 1974, as Amended

    Science.gov (United States)

    2012-04-02

    ... security safeguards; (vii) utilizing antivirus and intrusion detection software; (viii) performing risk and... Privacy Act System of Records for the Home Affordable Modification Program, hereinafter known as the... four proposed alterations to the system of records currently entitled as ``Treasury/DO .218--Home...

  1. 75 FR 51468 - Published Privacy Impact Assessments on the Web

    Science.gov (United States)

    2010-08-20

    ... intrusion detection and prevention measures to that traffic and for US- CERT to generate automated alerts... programs and systems in the Department. These assessments were approved and published on the Privacy Office..., indicating the DHS component responsible for the system, and the date on which the PIA was approved...

  2. Personal Privacy in an Information Society. Final Report.

    Science.gov (United States)

    Privacy Protection Study Commission, Washington, DC.

    This report of the Privacy Protection Study Commission was prepared in response to a Congressional mandate to study data banks, automatic data processing programs, and information systems of governmental, regional and private organizations to determine standards and procedures in force for the protection of personal information. Recommendations…

  3. Military Base Realignments and Closures: DOD Has Improved Environmental Cleanup Reporting but Should Obtain and Share More Information

    Science.gov (United States)

    2017-01-01

    DOD contamination from hazardous substances , pollutants , or contaminants; unexploded ordnance, discarded military munitions, or munitions constituents...ordnance. The program includes the investigation, identification, and cleanup of contamination from hazardous substances , pollutants , and...as hazardous substances or unexploded ordnance,1 found on military installations closed under the Base Realignment and Closure (BRAC) process has

  4. Assessment of DoD Suicide Prevention Processes

    Science.gov (United States)

    2015-09-30

    Assessment of DoD Suicide Prevention Processes S E P T E M B E R 3 0 , 2 0 1 5 Report No. DODIG-2015-182 Mission Our mission is to provide independent......Objective The objectives of this project were to: 1) evaluate DoD processes used to develop suicide prevention policy and 2) determine what process

  5. Privacy in the Genomic Era

    Science.gov (United States)

    NAVEED, MUHAMMAD; AYDAY, ERMAN; CLAYTON, ELLEN W.; FELLAY, JACQUES; GUNTER, CARL A.; HUBAUX, JEAN-PIERRE; MALIN, BRADLEY A.; WANG, XIAOFENG

    2015-01-01

    Genome sequencing technology has advanced at a rapid pace and it is now possible to generate highly-detailed genotypes inexpensively. The collection and analysis of such data has the potential to support various applications, including personalized medical services. While the benefits of the genomics revolution are trumpeted by the biomedical community, the increased availability of such data has major implications for personal privacy; notably because the genome has certain essential features, which include (but are not limited to) (i) an association with traits and certain diseases, (ii) identification capability (e.g., forensics), and (iii) revelation of family relationships. Moreover, direct-to-consumer DNA testing increases the likelihood that genome data will be made available in less regulated environments, such as the Internet and for-profit companies. The problem of genome data privacy thus resides at the crossroads of computer science, medicine, and public policy. While the computer scientists have addressed data privacy for various data types, there has been less attention dedicated to genomic data. Thus, the goal of this paper is to provide a systematization of knowledge for the computer science community. In doing so, we address some of the (sometimes erroneous) beliefs of this field and we report on a survey we conducted about genome data privacy with biomedical specialists. Then, after characterizing the genome privacy problem, we review the state-of-the-art regarding privacy attacks on genomic data and strategies for mitigating such attacks, as well as contextualizing these attacks from the perspective of medicine and public policy. This paper concludes with an enumeration of the challenges for genome data privacy and presents a framework to systematize the analysis of threats and the design of countermeasures as the field moves forward. PMID:26640318

  6. 76 FR 67763 - Privacy Act of 1974; Privacy Act System of Records

    Science.gov (United States)

    2011-11-02

    ... SPACE ADMINISTRATION Privacy Act of 1974; Privacy Act System of Records AGENCY: National Aeronautics and Space Administration (NASA). ACTION: Notice of proposed revisions to an existing Privacy Act system of records. SUMMARY: Pursuant to the provisions of the Privacy Act of 1974 (5 U.S.C. 552a), the National...

  7. 76 FR 64112 - Privacy Act of 1974; Privacy Act System of Records Appendices

    Science.gov (United States)

    2011-10-17

    ... SPACE ADMINISTRATION Privacy Act of 1974; Privacy Act System of Records Appendices AGENCY: National Aeronautics and Space Administration (NASA). ACTION: Revisions of NASA Appendices to Privacy Act System of... publishes with the Agency's systems of records under the Privacy Act of 1974. This notice publishes those...

  8. 76 FR 64115 - Privacy Act of 1974; Privacy Act System of Records

    Science.gov (United States)

    2011-10-17

    ... SPACE ADMINISTRATION Privacy Act of 1974; Privacy Act System of Records AGENCY: National Aeronautics and Space Administration (NASA). ACTION: Notice of the retirement of one Privacy Act system of records notice. SUMMARY: In accordance with the Privacy Act of 1974, NASA is giving notice that it proposes to...

  9. 76 FR 64114 - Privacy Act of 1974; Privacy Act System of Records

    Science.gov (United States)

    2011-10-17

    ... SPACE ADMINISTRATION Privacy Act of 1974; Privacy Act System of Records AGENCY: National Aeronautics and Space Administration (NASA). ACTION: Notice of proposed revisions to an existing Privacy Act system of records. SUMMARY: Pursuant to the provisions of the Privacy Act of 1974 (5 U.S.C. 552a), the National...

  10. 75 FR 81205 - Privacy Act: Revision of Privacy Act Systems of Records

    Science.gov (United States)

    2010-12-27

    ... Office of the Secretary Privacy Act: Revision of Privacy Act Systems of Records AGENCY: Office of the Secretary, USDA. ACTION: Notice to Revise Privacy Act Systems of Records. SUMMARY: Notice is hereby given that the United States Department of Agriculture (USDA) proposes to revise two Privacy Act Systems of...

  11. 78 FR 77719 - Privacy Act of 1974; Privacy Act System of Records

    Science.gov (United States)

    2013-12-24

    ... SPACE ADMINISTRATION Privacy Act of 1974; Privacy Act System of Records AGENCY: National Aeronautics and Space Administration (NASA). ACTION: Notice of Privacy Act system of records. SUMMARY: Pursuant to the provisions of the Privacy Act of 1974 (5 U.S.C. 552a), the National Aeronautics and Space Administration is...

  12. The privacy coach: Supporting customer privacy in the internet of things

    NARCIS (Netherlands)

    Broenink, E.G.; Hoepman, J.H.; Hof, C. van 't; Kranenburg, R. van; Smits, D.; Wisman, T.

    2010-01-01

    The Privacy Coach is an application running on a mobile phone that supports customers in making privacy decisions when confronted with RFID tags. The approach we take to increase customer privacy is a radical departure from the mainstream research efforts that focus on implementing privacy enhancing

  13. Privacy Implications of Surveillance Systems

    DEFF Research Database (Denmark)

    Thommesen, Jacob; Andersen, Henning Boje

    2009-01-01

    This paper presents a model for assessing the privacy „cost‟ of a surveillance system. Surveillance systems collect and provide personal information or observations of people by means of surveillance technologies such as databases, video or location tracking. Such systems can be designed for vari......This paper presents a model for assessing the privacy „cost‟ of a surveillance system. Surveillance systems collect and provide personal information or observations of people by means of surveillance technologies such as databases, video or location tracking. Such systems can be designed...... for various purposes, even as a service for those being observed, but in any case they will to some degree invade their privacy. The model provided here can indicate how invasive any particular system may be – and be used to compare the invasiveness of different systems. Applying a functional approach......, the model is established by first considering the social function of privacy in everyday life, which in turn lets us determine which different domains will be considered as private, and finally identify the different types of privacy invasion. This underlying model (function – domain – invasion) then serves...

  14. Internet privacy options for adequate realisation

    CERN Document Server

    2013-01-01

    A thorough multidisciplinary analysis of various perspectives on internet privacy was published as the first volume of a study, revealing the results of the achatech project "Internet Privacy - A Culture of Privacy and Trust on the Internet." The second publication from this project presents integrated, interdisciplinary options for improving privacy on the Internet utilising a normative, value-oriented approach. The ways in which privacy promotes and preconditions fundamental societal values and how privacy violations endanger the flourishing of said values are exemplified. The conditions which must be fulfilled in order to achieve a culture of privacy and trust on the internet are illuminated. This volume presents options for policy-makers, educators, businesses and technology experts how to facilitate solutions for more privacy on the Internet and identifies further research requirements in this area.

  15. CARAVAN: Providing Location Privacy for VANET

    National Research Council Canada - National Science Library

    Sampigethaya, Krishna; Huang, Leping; Li, Mingyan; Poovendran, Radha; Matsuura, Kanta; Sezaki, Kaoru

    2005-01-01

    .... This type of tracking leads to threats on the location privacy of the vehicle's user. In this paper, we study the problem of providing location privacy in VANET by allowing vehicles to prevent tracking of their broadcast communications...

  16. Risk analysis for privacy and identity management

    OpenAIRE

    Wangen, Gaute Bjørklund

    2012-01-01

    ENGELSK: The concept of privacy was recognized as early as the time of Aristotle, and has been a theme of debate since. Risks to privacy are problematic because the concept of "privacy" holds different meaning and importance to different people and cultures. What is considered private in Europe, may not be considered private in China, and vice versa. This makes defining and detecting risks to privacy a complex matter. As people become increasingly dependent on online services, ...

  17. Privacy in the Sharing Economy

    DEFF Research Database (Denmark)

    Ranzini, Giulia; Etter, Michael; Lutz, Christoph

    ’s digital services through providing recommendations to Europe’s institutions. The initial stage of this research project involves a set of three literature reviews of the state of research on three core topics in relation to the sharing economy: participation (1), privacy (2), and power (3). This piece......Report from the EU H2020 Research Project Ps2Share:Participation, Privacy, and Power in the Sharing Economy. This paper gives an in-depth overview of the topic of power in the sharing economy. It forms one part of a European Union Horizon 2020 Research Project on the sharing economy: "Ps2Share...... Participation, Privacy, and Power in the Sharing Economy". We aim to foster better awareness of the consequences which the sharing economy has on the way people behave, think, interact, and socialize across Europe. Our overarching objective is to identify key challenges of the sharing economy and improve Europe...

  18. On genomics, kin, and privacy.

    Science.gov (United States)

    Telenti, Amalio; Ayday, Erman; Hubaux, Jean Pierre

    2014-01-01

    The storage of greater numbers of exomes or genomes raises the question of loss of privacy for the individual and for families if genomic data are not properly protected. Access to genome data may result from a personal decision to disclose, or from gaps in protection. In either case, revealing genome data has consequences beyond the individual, as it compromises the privacy of family members. Increasing availability of genome data linked or linkable to metadata through online social networks and services adds one additional layer of complexity to the protection of genome privacy.  The field of computer science and information technology offers solutions to secure genomic data so that individuals, medical personnel or researchers can access only the subset of genomic information required for healthcare or dedicated studies.

  19. Evaluation of the DoD Safety Program: DoD Civilian Safety Survey

    Science.gov (United States)

    2008-12-12

    frame of reference. Since some statements tend to be answered more positively or negatively than others, comparing results against the NSC database...setting a positive safety example 31 . Beier that haZards not foced right away will stil be a!ldressed 36. Safety standard level relabve to standard...Beier that haZards not fiXed light away wiD stil be addressed 36. SupeMsors investigating safety incidents 44. Leadership InCluding safety in job

  20. 6 CFR Appendix A to Part 5 - FOIA/Privacy Act Offices of the Department of Homeland Security

    Science.gov (United States)

    2010-01-01

    ... Information/Privacy Act Program, Department of Justice, 425 Eye Street, NW., 2nd Floor, ULLICO Building... Service: Chief, FOIA Information Management Branch, GSA (CAIM), 1800 F Street, NW., Washington, DC 20405... SECRETARY DISCLOSURE OF RECORDS AND INFORMATION Pt. 5, App. A Appendix A to Part 5—FOIA/Privacy Act Offices...

  1. MediaEval 2013 Visual Privacy Task: Warping-based Privacy Protection Tool

    OpenAIRE

    Korshunov, Pavel; Ebrahimi, Touradj

    2013-01-01

    In this paper, we describe EPFL privacy protection tool submitted to the MediaEval 2013 Visual Privacy task. The goal of the task is to obscure faces and other personal items of people in the provided surveillance clips to preserve their personal privacy. In the privacy protection tool, we used a combination of reversible privacy protection filter based on geometric warping transformation, randomized saturation filter, masking with partial opacity, and pixelization. The aim of the implementat...

  2. Privacy Notice | IDRC - International Development Research Centre

    International Development Research Centre (IDRC) Digital Library (Canada)

    IDRC respects the privacy concerns of users of this website. This Privacy Notice explains how personal information that is collected from and about the visitors to IDRC's website is handled. All personal information held or collected by IDRC is protected under Canada's Privacy Act. Information automatically collected from all ...

  3. Context-Aware Generative Adversarial Privacy

    Science.gov (United States)

    Huang, Chong; Kairouz, Peter; Chen, Xiao; Sankar, Lalitha; Rajagopal, Ram

    2017-12-01

    Preserving the utility of published datasets while simultaneously providing provable privacy guarantees is a well-known challenge. On the one hand, context-free privacy solutions, such as differential privacy, provide strong privacy guarantees, but often lead to a significant reduction in utility. On the other hand, context-aware privacy solutions, such as information theoretic privacy, achieve an improved privacy-utility tradeoff, but assume that the data holder has access to dataset statistics. We circumvent these limitations by introducing a novel context-aware privacy framework called generative adversarial privacy (GAP). GAP leverages recent advancements in generative adversarial networks (GANs) to allow the data holder to learn privatization schemes from the dataset itself. Under GAP, learning the privacy mechanism is formulated as a constrained minimax game between two players: a privatizer that sanitizes the dataset in a way that limits the risk of inference attacks on the individuals' private variables, and an adversary that tries to infer the private variables from the sanitized dataset. To evaluate GAP's performance, we investigate two simple (yet canonical) statistical dataset models: (a) the binary data model, and (b) the binary Gaussian mixture model. For both models, we derive game-theoretically optimal minimax privacy mechanisms, and show that the privacy mechanisms learned from data (in a generative adversarial fashion) match the theoretically optimal ones. This demonstrates that our framework can be easily applied in practice, even in the absence of dataset statistics.

  4. Designing for Privacy in Ubiquitous Social Networking

    DEFF Research Database (Denmark)

    Sapuppo, Antonio; Figueiras, Joao

    2015-01-01

    are subject to crucial privacy threats. Inspired by the usability and privacy limitations of existing design solutions, we identify, describe and qualitatively evaluate four drawbacks to be avoided when designing ubiquitous social networking applications. By addressing these drawbacks, services become more...... functional and more oriented to ensure the end users' privacy, thus contributing to the long–term success of this technology....

  5. 24 CFR 3280.107 - Interior privacy.

    Science.gov (United States)

    2010-04-01

    ... 24 Housing and Urban Development 5 2010-04-01 2010-04-01 false Interior privacy. 3280.107 Section 3280.107 Housing and Urban Development Regulations Relating to Housing and Urban Development (Continued... privacy. Bathroom and toilet compartment doors shall be equipped with a privacy lock. ...

  6. Sexiled: Privacy Acquisition Strategies of College Roommates

    Science.gov (United States)

    Erlandson, Karen

    2014-01-01

    This study sought to understand how roommates make privacy bids in college residence halls. The results indicate that privacy for sexual activity is a problem for students living in college residence halls, as almost all participants (82%) reported having dealt with this issue. Two sets of responses were collected and analyzed: privacy acquisition…

  7. 31 CFR 0.216 - Privacy Act.

    Science.gov (United States)

    2010-07-01

    ... 31 Money and Finance: Treasury 1 2010-07-01 2010-07-01 false Privacy Act. 0.216 Section 0.216... RULES OF CONDUCT Rules of Conduct § 0.216 Privacy Act. Employees involved in the design, development, operation, or maintenance of any system of records or in maintaining records subject to the Privacy Act of...

  8. Urban forests and parks as privacy refuges

    Science.gov (United States)

    William E. Hammitt

    2002-01-01

    Urban forests and parks are forested areas that can serve as refuges for privacy. This article presents a conceptual argument for urban forests and parks as privacy refuges, and data that support the argument. On-site visitors (n = 610) to four Cleveland, Ohio, U.S., Metroparks were surveyed in 1995. Results indicated that considerable amounts of privacy were obtained...

  9. Effective Management of Information Security and Privacy

    Science.gov (United States)

    Anderson, Alicia

    2006-01-01

    No university seems immune to cyber attacks. For many universities, such events have served as wake-up calls to develop a comprehensive information security and privacy strategy. This is no simple task, however. It involves balancing a culture of openness with a need for security and privacy. Security and privacy are not the same, and the…

  10. Context-Aware Generative Adversarial Privacy

    Directory of Open Access Journals (Sweden)

    Chong Huang

    2017-12-01

    Full Text Available Preserving the utility of published datasets while simultaneously providing provable privacy guarantees is a well-known challenge. On the one hand, context-free privacy solutions, such as differential privacy, provide strong privacy guarantees, but often lead to a significant reduction in utility. On the other hand, context-aware privacy solutions, such as information theoretic privacy, achieve an improved privacy-utility tradeoff, but assume that the data holder has access to dataset statistics. We circumvent these limitations by introducing a novel context-aware privacy framework called generative adversarial privacy (GAP. GAP leverages recent advancements in generative adversarial networks (GANs to allow the data holder to learn privatization schemes from the dataset itself. Under GAP, learning the privacy mechanism is formulated as a constrained minimax game between two players: a privatizer that sanitizes the dataset in a way that limits the risk of inference attacks on the individuals’ private variables, and an adversary that tries to infer the private variables from the sanitized dataset. To evaluate GAP’s performance, we investigate two simple (yet canonical statistical dataset models: (a the binary data model; and (b the binary Gaussian mixture model. For both models, we derive game-theoretically optimal minimax privacy mechanisms, and show that the privacy mechanisms learned from data (in a generative adversarial fashion match the theoretically optimal ones. This demonstrates that our framework can be easily applied in practice, even in the absence of dataset statistics.

  11. 42 CFR 457.1110 - Privacy protections.

    Science.gov (United States)

    2010-10-01

    ... 42 Public Health 4 2010-10-01 2010-10-01 false Privacy protections. 457.1110 Section 457.1110... Requirements: Applicant and Enrollee Protections § 457.1110 Privacy protections. The State must ensure that... disclosure, including those laws addressing the confidentiality of information about minors and the privacy...

  12. 21 CFR 1314.45 - Privacy protections.

    Science.gov (United States)

    2010-04-01

    ... 21 Food and Drugs 9 2010-04-01 2010-04-01 false Privacy protections. 1314.45 Section 1314.45 Food and Drugs DRUG ENFORCEMENT ADMINISTRATION, DEPARTMENT OF JUSTICE RETAIL SALE OF SCHEDULED LISTED CHEMICAL PRODUCTS Sales by Regulated Sellers § 1314.45 Privacy protections. To protect the privacy of...

  13. Smartdata privacy meets evolutionary robotics

    CERN Document Server

    Harvey, Inman; Tomko, George

    2013-01-01

    Privacy by Design and the Promise of SmartData.- SmartData: the Need, the Goal and the Challenge.- Perspectives on Artificial Intelligence.- Context dependent information processing entails scale-free dynamics.- Philosophy and SmartData.- Relevance Realization and the Neurodynamics and Neural Connectivity of General Intelligence.- What Matters: Real Bodies and Virtual Worlds.- The development of autonomous virtual agents.- Patterns of Attractors in the "Brain"".- A Privacy-Enabled Mobile Computing Model Using Intelligent Cloud-Based Services.- Unconstraint the Population: the Benefits of Horiz

  14. DoD Freedom of Information Act Policies Need Improvement

    Science.gov (United States)

    2016-08-16

    Governmental Affairs requested that the DoD Inspector General determine whether noncareer officials were adversely affecting the Freedom of Information... determined whether noncareer2 officials were adversely affecting the Freedom of Information Act (FOIA) process at DoD between January 2007 and July 2015...S T 1 6 , 2 0 1 6 DoD Freedom of Information Act Policies Need Improvement Report No. DODIG-2016-124 I N T E G R I T Y  E F F I C I E N C Y

  15. The Privacy War: Enabling Siblings the Right to Privacy.

    Science.gov (United States)

    Sagarese, Margaret; Giannetti, Charlene

    2003-01-01

    Polled adolescents, parents, and teachers to determine where the child's right to privacy ends and the parent's responsibility to protect begins. Results indicate that the worst offenders tend to be siblings. The paper presents a three-pronged strategy to help parents deal with battling children: recognize the breaches, negotiate the truce…

  16. Adding Query Privacy to Robust DHTs

    DEFF Research Database (Denmark)

    Backes, Michael; Goldberg, Ian; Kate, Aniket

    2011-01-01

    intermediate peers that (help to) route the queries towards their destinations. In this paper, we satisfy this requirement by presenting an approach for providing privacy for the keys in DHT queries. We use the concept of oblivious transfer (OT) in communication over DHTs to preserve query privacy without...... of obtaining query privacy over robust DHTs. Finally, we compare the performance of our privacy-preserving protocols with their more privacy-invasive counterparts. We observe that there is no increase in the message complexity and only a small overhead in the computational complexity....

  17. The Regulatory Framework for Privacy and Security

    Science.gov (United States)

    Hiller, Janine S.

    The internet enables the easy collection of massive amounts of personally identifiable information. Unregulated data collection causes distrust and conflicts with widely accepted principles of privacy. The regulatory framework in the United States for ensuring privacy and security in the online environment consists of federal, state, and self-regulatory elements. New laws have been passed to address technological and internet practices that conflict with privacy protecting policies. The United States and the European Union approaches to privacy differ significantly, and the global internet environment will likely cause regulators to face the challenge of balancing privacy interests with data collection for many years to come.

  18. Panel: RFID Security and Privacy

    Science.gov (United States)

    Fu, Kevin

    The panel on RFID security and privacy included Ross Anderson, Jon Callas, Yvo Desmedt, and Kevin Fu. Topics for discussion included the "chip and PIN" EMV payment systems, e-Passports, "mafia" attacks, and RFID-enabled credit cards. Position papers by the panelists appear in the following pages, and the RFID-enabled credit card work appears separately in these proceedings.

  19. 78 FR 46256 - Privacy Act

    Science.gov (United States)

    2013-07-31

    ... From the Federal Register Online via the Government Publishing Office FEDERAL ELECTION COMMISSION 11 CFR Part 1 Privacy Act CFR Correction In Title 11 of the Code of Federal Regulations, revised as... 1954.'' are added at the end of the definition of Act. BILLING CODE 1505-01-D ...

  20. Privacy-protecting video surveillance

    Science.gov (United States)

    Wickramasuriya, Jehan; Alhazzazi, Mohanned; Datt, Mahesh; Mehrotra, Sharad; Venkatasubramanian, Nalini

    2005-02-01

    Forms of surveillance are very quickly becoming an integral part of crime control policy, crisis management, social control theory and community consciousness. In turn, it has been used as a simple and effective solution to many of these problems. However, privacy-related concerns have been expressed over the development and deployment of this technology. Used properly, video cameras help expose wrongdoing but typically come at the cost of privacy to those not involved in any maleficent activity. This work describes the design and implementation of a real-time, privacy-protecting video surveillance infrastructure that fuses additional sensor information (e.g. Radio-frequency Identification) with video streams and an access control framework in order to make decisions about how and when to display the individuals under surveillance. This video surveillance system is a particular instance of a more general paradigm of privacy-protecting data collection. In this paper we describe in detail the video processing techniques used in order to achieve real-time tracking of users in pervasive spaces while utilizing the additional sensor data provided by various instrumented sensors. In particular, we discuss background modeling techniques, object tracking and implementation techniques that pertain to the overall development of this system.

  1. Privacy concerns in smart cities

    NARCIS (Netherlands)

    E.A. van Zoonen (Liesbet)

    2016-01-01

    textabstractIn this paper a framework is constructed to hypothesize if and how smart city technologies and urban big data produce privacy concerns among the people in these cities (as inhabitants, workers, visitors, and otherwise). The framework is built on the basis of two recurring dimensions in

  2. Privacy and disclosure in psychoanalysis.

    Science.gov (United States)

    Kantrowitz, Judy L

    2009-08-01

    The tension between privacy and disclosure in psychoanalysis operates in various ways in analyst, supervisee, and supervisor. Analysts need to maintain the privacy of their patients by keeping their material confidential; they also need to know and share their own internal conscious conflicts to be able to discover unconscious conflicts and their characterological ramifications. Clinical writing is one vehicle for the exploration, discovery, and communication of transference-countertransference issues and other conflicts stimulated by clinical work, but it does not provide the perspective that comes from sharing with another person. Telling a trusted colleague what we think and feel in relation to our patients and ourselves enables us to see our blind spots, as well as providing perspective and affect containment in our work. Mutuality in peer supervision tends to reduce the transference. The special problems of privacy and disclosure in psychoanalytic training are addressed, as are the ways the analyst's belief in maintaining privacy may affect the analytic process and therapeutic relationship.

  3. Privacy in Online Social Networks

    NARCIS (Netherlands)

    Beye, Michael; Jeckmans, Arjan; Erkin, Zekeriya; Erkin, Zekeriya; Hartel, Pieter H.; Lagendijk, Reginald; Tang, Qiang; Abraham, A.

    Online Social Networks (OSNs) have become part of daily life for millions of users. Users building explicit networks that represent their social relationships and often share a wealth of personal information to their own benefit. The potential privacy risks of such behavior are often underestimated

  4. PROTECTION OF PRIVACY THROUGH MICROAGGREGATION

    OpenAIRE

    Feige, Edgar L.; Harold W. Watts

    2005-01-01

    A proposal for maintaining privacy protection in large data bases by the use of partially aggregated data instead of the original individual data. Proper micro aggregation techniques can serve to protect the confidential nature of the individual data with minimumal information loss. Reference:Data base4s, Computers and the Social Sciences, R. Bisco (ed.),Wiley, 1970, pp. 261-272

  5. Facebook: When Education Meets Privacy

    Science.gov (United States)

    Bruneel, Steven; De Wit, Kurt; Verhoeven, Jef C.; Elen, Jan

    2013-01-01

    The use of social networking sites (SNSs) has become commonplace amongst students. In this research, we aim to shed light upon the educational use and privacy issues on Facebook from the perspective of role theory and reference group theory. 15 bachelor students of the University of Leuven (KU Leuven) in Flanders, Belgium, were interviewed in…

  6. Cross-Cultural Privacy Prediction

    Directory of Open Access Journals (Sweden)

    Li Yao

    2017-04-01

    Full Text Available The influence of cultural background on people’s privacy decisions is widely recognized. However, a cross-cultural approach to predicting privacy decisions is still lacking. Our paper presents a first integrated cross-cultural privacy prediction model that merges cultural, demographic, attitudinal and contextual prediction. The model applies supervised machine learning to users’ decisions on the collection of their personal data, collected from a large-scale quantitative study in eight different countries. We find that adding culture-related predictors (i.e. country of residence, language, Hofstede’s cultural dimensions to demographic, attitudinal and contextual predictors in the model can improve the prediction accuracy. Hofstede’s variables - particularly individualism and indulgence - outperform country and language. We further apply generalized linear mixed-effect regression to explore possible interactions between culture and other predictors. We find indeed that the impact of contextual and attitudinal predictors varies between different cultures. The implications of such models in developing privacy-enabling technologies are discussed.

  7. The European Approach to Privacy

    NARCIS (Netherlands)

    van Hoboken, J.

    2014-01-01

    This paper critically assesses the character of European (Union’s) privacy law and policy in the field of online media and electronic communications. Contrary to current understanding, this field of law is more fragmented and ill-developed than is often assumed, in particular by those discussing

  8. Bridging the transatlantic divide in privacy

    Directory of Open Access Journals (Sweden)

    Paula Kift

    2013-08-01

    Full Text Available In the context of the US National Security Agency surveillance scandal, the transatlantic privacy divide has come back to the fore. In the United States, the right to privacy is primarily understood as a right to physical privacy, thus the protection from unwarranted government searches and seizures. In Germany on the other hand, it is also understood as a right to spiritual privacy, thus the right of citizens to develop into autonomous moral agents. The following article will discuss the different constitutional assumptions that underlie American and German attitudes towards privacy, namely privacy as an aspect of liberty or as an aspect of dignity. As data flows defy jurisdictional boundaries, however, policymakers across the Atlantic are faced with a conundrum: how can German and American privacy cultures be reconciled?

  9. Privacy is an essentially contested concept: a multi-dimensional analytic for mapping privacy.

    Science.gov (United States)

    Mulligan, Deirdre K; Koopman, Colin; Doty, Nick

    2016-12-28

    The meaning of privacy has been much disputed throughout its history in response to wave after wave of new technological capabilities and social configurations. The current round of disputes over privacy fuelled by data science has been a cause of despair for many commentators and a death knell for privacy itself for others. We argue that privacy's disputes are neither an accidental feature of the concept nor a lamentable condition of its applicability. Privacy is essentially contested. Because it is, privacy is transformable according to changing technological and social conditions. To make productive use of privacy's essential contestability, we argue for a new approach to privacy research and practical design, focused on the development of conceptual analytics that facilitate dissecting privacy's multiple uses across multiple contexts.This article is part of the themed issue 'The ethical impact of data science'. © 2016 The Author(s).

  10. DOD Hotline Allegation of Overpricing of F-15 Spare Parts

    National Research Council Canada - National Science Library

    1990-01-01

    .... The initial objective of the audit was to determine whether the DoD paid fair and reasonable prices for initial spare parts for the F-15 Aircraft Tactical Electronic Warfare System Intermediate Support System (TISS...

  11. DoD Workshop on Southeast Regional Planning and Sustainability

    National Research Council Canada - National Science Library

    Berke, Philip; Brown, Robert; Elliott, Michael; Friday, Paul; Holst, Robert; Weiss, Jonathan; Wilkens, R. N

    2007-01-01

    These proceedings encompass outcomes from the DoD Southeast Regional Planning and Sustainability Workshop, which took place in April 2007, and reflect the opinions and views of workshop participants...

  12. Department of Defense (DOD) Military Casualty/Wounded Warrior

    Data.gov (United States)

    Social Security Administration — SSA initiated this agreement with the Department of Defense (DOD) to transmit to SSA information that will identify military personnel injured or taken ill while in...

  13. Intelligence Community Reorganization: Potential Effects on DOD Intelligence Agencies

    National Research Council Canada - National Science Library

    Best, Jr, Richard A

    2004-01-01

    Although the Central Intelligence Agency (CIA) is the best known member of the Intelligence Community, the bulk of the nation's intelligence effort is undertaken by the intelligence agencies of the Department of Defense (DoD...

  14. DoD Global Information Grid Mission Assurance

    National Research Council Canada - National Science Library

    Bargar, Anthony

    2008-01-01

    ... for espionage and the criminal theft of data. GIG mission assurance works to ensure the DoD is able to accomplish its critical missions when networks, services, or information are unavailable, degraded, or distrusted...

  15. 32 CFR 310.9 - Privacy boards and office, composition and responsibilities.

    Science.gov (United States)

    2010-07-01

    ... determined by the Chair or the Board. (b) The Defense Data Integrity Board—(1) Membership. The Board shall..., OMB Circular A-130, and DoD 5400.11-R, all computer matching programs involving personal records... the Executive Secretary to the Defense Data Integrity Board; and as the Chair and the Executive...

  16. Study of Scientists and Engineers in DoD Laboratories

    Science.gov (United States)

    1982-09-01

    ivflQtionary effects. - Our findings show some selected skill shortages in the DOD lao worh force. These shortages are mostly well with- in the annual attrition...number of instances has found a fairly wide gulf between perceptions about the DOD lab S&E work force and quantitative data which provides specific...specialists. On the other hand , there are other studies which indicate that there is no shortage now nor is it reasonable to expect a shortage in the

  17. DoD Information Operations Center for Research

    OpenAIRE

    2012-01-01

    This memorandum cancels Deputy Secretary of Defense Memorandum, "Information Operations Center of Excellence," dated Septembet 3, 2004, and redesignates the Naval Postgraduate's School (NPS), Information Operations (IO) Center of Excellence, as the DoD Information Operations Cetner for Research. As the DoD Information Operations Center for Research, the NPS shall provide graduate-level IO education and facilitate the exploration of new IO concepts, research, analysis, and field experimentation.

  18. The East China Sea in DOD China Military Power Reports

    OpenAIRE

    Chapman, Bert

    2017-01-01

    The National Defense Authorization Act of 2000 saw Congress require the Department of Defense (DOD) to prepare an annual report on Chinese military power. This report contains classified and unclassified editions. Documenting Chinese military developments, strategy, and trends are critical parts of these reports. Beijing’s military activities in the East China Sea (ECS) are important report components. This work explains the importance of these and other DOD reports for those studying ECS dev...

  19. Intellectual property rights in software acquired by DoD

    OpenAIRE

    Birmingham, Robert B.

    1995-01-01

    This research reviews the intellectual property rights in software acquired by the Department of Defense (DoD). The intent of the study is to analyze the effectiveness of the DoD's policy concerning noncommercial software intellectual property rights. Surveys were developed to assess the current policy. Contracting officials in the military and commercial sector were the respondents to the interviews. The conclusions based on this research are that contracting officers do not fully understand...

  20. 77 FR 11367 - Defense Federal Acquisition Regulation Supplement; Extension of the Test Program for Negotiation...

    Science.gov (United States)

    2012-02-24

    ... Regulation Supplement; Extension of the Test Program for Negotiation of Comprehensive Small Business... Acquisition Regulation Supplement to extend the program period for the DoD Test Program for Negotiation of...). Section 866 amends the DoD Test Program for Negotiation of Comprehensive Small Business Subcontracting...

  1. 76 FR 31416 - Federal Acquisition Regulation; Oversight of Contractor Ethics Programs

    Science.gov (United States)

    2011-05-31

    ... Federal Acquisition Regulation; Oversight of Contractor Ethics Programs AGENCY: Department of Defense (DoD... contractors have implemented the mandatory contractor business ethics program requirements. DATES: Effective... to Improve DoD's Oversight of Contractor Ethics Programs. The ethics program requirement flows from...

  2. Test Program Set (TPS) Lab

    Data.gov (United States)

    Federal Laboratory Consortium — The ARDEC TPS Laboratory provides an organic Test Program Set (TPS) development, maintenance, and life cycle management capability for DoD LCMC materiel developers....

  3. DoD Frequency Spectrum Issues Coping with Changes: Managing RF Spectrum to Meet DoD Needs

    National Research Council Canada - National Science Library

    Howard, William

    2000-01-01

    .... DoD's mastery at managing its spectrum, both within the Department and at national and international levels, is weakening due to changes in geopolitics, the perceived reduced primacy of defense needs...

  4. Location-Related Privacy in Geo-Social Networks

    DEFF Research Database (Denmark)

    Ruiz Vicente, Carmen; Freni, Dario; Bettini, Claudio

    2011-01-01

    -ins." However, this ability to reveal users' locations causes new privacy threats, which in turn call for new privacy-protection methods. The authors study four privacy aspects central to these social networks - location, absence, co-location, and identity privacy - and describe possible means of protecting...... privacy in these circumstances....

  5. Privacy information management for video surveillance

    Science.gov (United States)

    Luo, Ying; Cheung, Sen-ching S.

    2013-05-01

    The widespread deployment of surveillance cameras has raised serious privacy concerns. Many privacy-enhancing schemes have been proposed to automatically redact images of trusted individuals in the surveillance video. To identify these individuals for protection, the most reliable approach is to use biometric signals such as iris patterns as they are immutable and highly discriminative. In this paper, we propose a privacy data management system to be used in a privacy-aware video surveillance system. The privacy status of a subject is anonymously determined based on her iris pattern. For a trusted subject, the surveillance video is redacted and the original imagery is considered to be the privacy information. Our proposed system allows a subject to access her privacy information via the same biometric signal for privacy status determination. Two secure protocols, one for privacy information encryption and the other for privacy information retrieval are proposed. Error control coding is used to cope with the variability in iris patterns and efficient implementation is achieved using surrogate data records. Experimental results on a public iris biometric database demonstrate the validity of our framework.

  6. Quantifying Differential Privacy under Temporal Correlations

    Science.gov (United States)

    Cao, Yang; Yoshikawa, Masatoshi; Xiao, Yonghui; Xiong, Li

    2017-01-01

    Differential Privacy (DP) has received increasing attention as a rigorous privacy framework. Many existing studies employ traditional DP mechanisms (e.g., the Laplace mechanism) as primitives, which assume that the data are independent, or that adversaries do not have knowledge of the data correlations. However, continuous generated data in the real world tend to be temporally correlated, and such correlations can be acquired by adversaries. In this paper, we investigate the potential privacy loss of a traditional DP mechanism under temporal correlations in the context of continuous data release. First, we model the temporal correlations using Markov model and analyze the privacy leakage of a DP mechanism when adversaries have knowledge of such temporal correlations. Our analysis reveals that the privacy loss of a DP mechanism may accumulate and increase over time. We call it temporal privacy leakage. Second, to measure such privacy loss, we design an efficient algorithm for calculating it in polynomial time. Although the temporal privacy leakage may increase over time, we also show that its supremum may exist in some cases. Third, to bound the privacy loss, we propose mechanisms that convert any existing DP mechanism into one against temporal privacy leakage. Experiments with synthetic data confirm that our approach is efficient and effective. PMID:28883711

  7. Quantifying Differential Privacy under Temporal Correlations.

    Science.gov (United States)

    Cao, Yang; Yoshikawa, Masatoshi; Xiao, Yonghui; Xiong, Li

    2017-04-01

    Differential Privacy (DP) has received increasing attention as a rigorous privacy framework. Many existing studies employ traditional DP mechanisms (e.g., the Laplace mechanism) as primitives, which assume that the data are independent, or that adversaries do not have knowledge of the data correlations. However, continuous generated data in the real world tend to be temporally correlated, and such correlations can be acquired by adversaries. In this paper, we investigate the potential privacy loss of a traditional DP mechanism under temporal correlations in the context of continuous data release. First, we model the temporal correlations using Markov model and analyze the privacy leakage of a DP mechanism when adversaries have knowledge of such temporal correlations. Our analysis reveals that the privacy loss of a DP mechanism may accumulate and increase over time. We call it temporal privacy leakage. Second, to measure such privacy loss, we design an efficient algorithm for calculating it in polynomial time. Although the temporal privacy leakage may increase over time, we also show that its supremum may exist in some cases. Third, to bound the privacy loss, we propose mechanisms that convert any existing DP mechanism into one against temporal privacy leakage. Experiments with synthetic data confirm that our approach is efficient and effective.

  8. Biobank research and the right to privacy.

    Science.gov (United States)

    Ursin, Lars Oystein

    2008-01-01

    What is privacy? What does privacy mean in relation to biobanking, in what way do the participants have an interest in privacy, (why) is there a right to privacy, and how should the privacy issue be regulated when it comes to biobank research? A relational view of privacy is argued for in this article, which takes as its basis a general discussion of several concepts of privacy and attempts at grounding privacy rights. In promoting and protecting the rights that participants in biobank research might have to privacy, it is argued that their interests should be related to the specific context of the provision and reception of health care that participation in biobank research is connected with. Rather than just granting participants an exclusive right to or ownership of their health information, which must be waived in order to make biobank research possible, the privacy aspect of health information should be viewed in light of the moral rights and duties that accompany any involvement in a research based system of health services.

  9. Privacy protection for HealthGrid applications.

    Science.gov (United States)

    Claerhout, B; De Moor, G J E

    2005-01-01

    This contribution aims at introducing the problem of privacy protection in e-Health and at describing a number of existing privacy enhancing techniques (PETs). The recognition that privacy constitutes a fundamental right is gradually entering public awareness. Because healthcare-related data are susceptible to being abused for many obvious reasons, public apprehension about privacy has focused on medical data. Public authorities have become convinced of the need to enforce privacy protection and make considerable efforts for promoting through privacy protection legislation the deployment of PETs. Based on the study of the specific features of Grid technology, ways in which PET services could be integrated in the HealthGrid are being analyzed. Grid technology aims at removing barriers between local and remote resources. The privacy and legal issues raised by the HealthGrid are caused by the transparent interchange and processing of sensitive medical information. PET technology has already proven its usefulness for privacy protection in health-related marketing and research data collection. While this paper does not describe market-ready solutions for privacy protection in the HealthGrid, it puts forward several cases in which the Grid may benefit from PETs. Early integration of privacy protection services into the HealthGrid can lead to a synergy that is beneficial for the development of the HealthGrid itself.

  10. 78 FR 39021 - Privacy Act of 1974; Privacy and Civil Liberties Oversight Board; System of Records Notice

    Science.gov (United States)

    2013-06-28

    ... From the Federal Register Online via the Government Publishing Office PRIVACY AND CIVIL LIBERTIES OVERSIGHT BOARD Privacy Act of 1974; Privacy and Civil Liberties Oversight Board; System of Records Notice AGENCY: Privacy and Civil Liberties Oversight Board. ACTION: Notice of Privacy Act system of records...

  11. Privacy Protection: Mandating New Arrangements to Implement and Assess Federal Privacy Policy and Practice

    National Research Council Canada - National Science Library

    Relyea, Harold C

    2004-01-01

    When Congress enacted the Privacy Act of 1974, it established a temporary national study commission to conduct a comprehensive assessment of privacy policy and practice in both the public and private...

  12. DoD’s Ability to Exploit the Environment in M&S

    Science.gov (United States)

    2008-03-01

    the Environment in M&S 2008 Defense Modeling and Simulation Conference Report Documentation Page Form ApprovedOMB No...COVERED - 4. TITLE AND SUBTITLE DoDs Ability to Exploit the Environment in M&S 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6...e n s o r s B e h a v i o r M o d e l s D e c i s i o n M a k e r s WHY REPLICATE THE ENVIRONMENT Goal: Effect System Performance/Human

  13. Defense Inventory: DOD Needs Additional Information for Managing War Reserve Levels of Meals Ready to Eat

    Science.gov (United States)

    2015-05-01

    Eat 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) 5d. PROJECT NUMBER 5e. TASK NUMBER 5f. WORK UNIT NUMBER 7...Defense Logistics Agency DOD Department of Defense MRE Meals Ready to Eat WRM War reserve materiel This is a work of the U.S. government and is...consistent basis to ensure they can sustain production and surge when necessary. 30Defense Logistics Agency, Meal, Ready-to- Eat (MRE) Strategic Plan

  14. Video Surveillance: Privacy Issues and Legal Compliance

    DEFF Research Database (Denmark)

    Mahmood Rajpoot, Qasim; Jensen, Christian D.

    2015-01-01

    Pervasive usage of video surveillance is rapidly increasing in developed countries. Continuous security threats to public safety demand use of such systems. Contemporary video surveillance systems offer advanced functionalities which threaten the privacy of those recorded in the video....... There is a need to balance the usage of video surveillance against its negative impact on privacy. This chapter aims to highlight the privacy issues in video surveillance and provides a model to help identify the privacy requirements in a video surveillance system. The authors make a step in the direction...... of investigating the existing legal infrastructure for ensuring privacy in video surveillance and suggest guidelines in order to help those who want to deploy video surveillance while least compromising the privacy of people and complying with legal infrastructure....

  15. Online Privacy as a Corporate Social Responsibility

    DEFF Research Database (Denmark)

    Pollach, Irene

    2011-01-01

    Information technology and the Internet have added a new stakeholder concern to the corporate social responsibility agenda: online privacy. While theory suggests that online privacy is a corporate social responsibility, only very few studies in the business ethics literature have connected...... these two. Based on a study of corporate social responsibility disclosures, this article contributes to the existing literature by exploring whether and how the largest IT companies embrace online privacy as a corporate social responsibility. The findings indicate that only a small proportion...... of approaches to addressing privacy was found, which suggests that no institutionalization of privacy practices has taken place yet. The study therefore indicates that online privacy is rather new on the corporate social responsibility agenda, currently playing only a minor role....

  16. An Effective Grouping Method for Privacy-Preserving Bike Sharing Data Publishing

    Directory of Open Access Journals (Sweden)

    A S M Touhidul Hasan

    2017-10-01

    Full Text Available Bike sharing programs are eco-friendly transportation systems that are widespread in smart city environments. In this paper, we study the problem of privacy-preserving bike sharing microdata publishing. Bike sharing systems collect visiting information along with user identity and make it public by removing the user identity. Even after excluding user identification, the published bike sharing dataset will not be protected against privacy disclosure risks. An adversary may arrange published datasets based on bike’s visiting information to breach a user’s privacy. In this paper, we propose a grouping based anonymization method to protect published bike sharing dataset from linking attacks. The proposed Grouping method ensures that the published bike sharing microdata will be protected from disclosure risks. Experimental results show that our approach can protect user privacy in the released datasets from disclosure risks and can keep more data utility compared with existing methods.

  17. Nurse educators' perceptions of the way nursing students protect patient privacy.

    Science.gov (United States)

    Zangão, Otília; Felismina, Mendes

    2014-12-01

    The aim of this study was to assess the teaching-learning process related to patient privacy during the care process and the way nursing students' protect patient privacy. Descriptive/correlational study using a qualitative approach and nonprobability sampling of 19 nurse educators from two schools of nursing. Data was collected using semi-structured interviews. Data analysis was undertaken using the SPSS version 20 and Alceste 2010 programs. The study complied with ethical standards. Two classes were assigned (protection of patient privacy and care process) with four subcategories (protection, empathy, relational competencies and technoscientific competencies).The findings show the need to adopt a reflective approach to the teaching-learning process by using experiential learning activities and real-life activities. We believe that intimacy and the protection of privacy should be core themes of nurse education and training.

  18. Nurse educators’ perceptions of the way nursing students protect patient privacy

    Directory of Open Access Journals (Sweden)

    Otília Zangão

    2014-12-01

    Full Text Available The aim of this study was to assess the teaching-learning process related to patient privacy during the care process and the way nursing students’ protect patient privacy. Descriptive/correlational study using a qualitative approach and nonprobability sampling of 19 nurse educators from two schools of nursing. Data was collected using semi-structured interviews. Data analysis was undertaken using the SPSS version 20 and Alceste 2010 programs. The study complied with ethical standards. Two classes were assigned (protection of patient privacy and care process with four subcategories (protection, empathy, relational competencies and technoscientific competencies.The findings show the need to adopt a reflective approach to the teaching-learning process by using experiential learning activities and real-life activities. We believe that intimacy and the protection of privacy should be core themes of nurse education and training.

  19. Nurse educators’ perceptions of the way nursing students protect patient privacy

    Directory of Open Access Journals (Sweden)

    Otília Zangão

    Full Text Available The aim of this study was to assess the teaching-learning process related to patient privacy during the care process and the way nursing students’ protect patient privacy. Descriptive/correlational study using a qualitative approach and nonprobability sampling of 19 nurse educators from two schools of nursing. Data was collected using semi-structured interviews. Data analysis was undertaken using the SPSS version 20 and Alceste 2010 programs. The study complied with ethical standards. Two classes were assigned (protection of patient privacy and care process with four subcategories (protection, empathy, relational competencies and technoscientific competencies.The findings show the need to adopt a reflective approach to the teaching-learning process by using experiential learning activities and real-life activities. We believe that intimacy and the protection of privacy should be core themes of nurse education and training.

  20. Online Tracking Technologies and Web Privacy:Technologieën voor Online volgen en Web Privacy

    OpenAIRE

    Acar, Mustafa Gunes Can

    2017-01-01

    In my PhD thesis, I would like to study the problem of online privacy with a focus on Web and mobile applications. Key research questions to be addressed by my study are the following: How can we formalize and quantify web tracking? What are the threats presented against privacy by different tracking techniques such as browser fingerprinting and cookie based tracking? What kind of privacy enhancing technologies (PET) can be used to ensure privacy without degrading service quality? The stud...

  1. Gender and online privacy among teens: risk perception, privacy concerns, and protection behaviors.

    Science.gov (United States)

    Youn, Seounmi; Hall, Kimberly

    2008-12-01

    Survey data from 395 high school students revealed that girls perceive more privacy risks and have a higher level of privacy concerns than boys. Regarding privacy protection behaviors, boys tended to read unsolicited e-mail and register for Web sites while directly sending complaints in response to unsolicited e-mail. This study found girls to provide inaccurate information as their privacy concerns increased. Boys, however, refrained from registering to Web sites as their concerns increased.

  2. Portrait of a Privacy Invasion

    Directory of Open Access Journals (Sweden)

    Shoshitaishvili Yan

    2015-04-01

    Full Text Available The popularity of online social networks has changed the way in which we share personal thoughts, political views, and pictures. Pictures have a particularly important role in the privacy of users, as they can convey substantial information (e.g., a person was attending an event, or has met with another person. Moreover, because of the nature of social networks, it has become increasingly difficult to control who has access to which content. Therefore, when a substantial amount of pictures are accessible to one party, there is a very serious potential for violations of the privacy of users. In this paper, we demonstrate a novel technique that, given a large corpus of pictures shared on a social network, automatically determines who is dating whom, with reasonable precision. More specifically, our approach combines facial recognition, spatial analysis, and machine learning techniques to determine pairs that are dating. To the best of our knowledge, this is the first privacy attack of this kind performed on social networks. We implemented our approach in a tool, called Creepic, and evaluated it on two real-world datasets. The results show that it is possible to automatically extract non-obvious, and nondisclosed, relationships between people represented in a group of pictures, even when the people involved are not directly part of a connected social clique.

  3. Distributed privacy preserving data collection

    KAUST Repository

    Xue, Mingqiang

    2011-01-01

    We study the distributed privacy preserving data collection problem: an untrusted data collector (e.g., a medical research institute) wishes to collect data (e.g., medical records) from a group of respondents (e.g., patients). Each respondent owns a multi-attributed record which contains both non-sensitive (e.g., quasi-identifiers) and sensitive information (e.g., a particular disease), and submits it to the data collector. Assuming T is the table formed by all the respondent data records, we say that the data collection process is privacy preserving if it allows the data collector to obtain a k-anonymized or l-diversified version of T without revealing the original records to the adversary. We propose a distributed data collection protocol that outputs an anonymized table by generalization of quasi-identifier attributes. The protocol employs cryptographic techniques such as homomorphic encryption, private information retrieval and secure multiparty computation to ensure the privacy goal in the process of data collection. Meanwhile, the protocol is designed to leak limited but non-critical information to achieve practicability and efficiency. Experiments show that the utility of the anonymized table derived by our protocol is in par with the utility achieved by traditional anonymization techniques. © 2011 Springer-Verlag.

  4. An Alternative View of Privacy on Facebook

    Directory of Open Access Journals (Sweden)

    Christian Fuchs

    2011-02-01

    Full Text Available The predominant analysis of privacy on Facebook focuses on personal information revelation. This paper is critical of this kind of research and introduces an alternative analytical framework for studying privacy on Facebook, social networking sites and web 2.0. This framework is connecting the phenomenon of online privacy to the political economy of capitalism—a focus that has thus far been rather neglected in research literature about Internet and web 2.0 privacy. Liberal privacy philosophy tends to ignore the political economy of privacy in capitalism that can mask socio-economic inequality and protect capital and the rich from public accountability. Facebook is in this paper analyzed with the help of an approach, in which privacy for dominant groups, in regard to the ability of keeping wealth and power secret from the public, is seen as problematic, whereas privacy at the bottom of the power pyramid for consumers and normal citizens is seen as a protection from dominant interests. Facebook’s privacy concept is based on an understanding that stresses self-regulation and on an individualistic understanding of privacy. The theoretical analysis of the political economy of privacy on Facebook in this paper is based on the political theories of Karl Marx, Hannah Arendt and Jürgen Habermas. Based on the political economist Dallas Smythe’s concept of audience commodification, the process of prosumer commodification on Facebook is analyzed. The political economy of privacy on Facebook is analyzed with the help of a theory of drives that is grounded in Herbert Marcuse’s interpretation of Sigmund Freud, which allows to analyze Facebook based on the concept of play labor (= the convergence of play and labor.

  5. Privacy preservation without compromising data integrity

    OpenAIRE

    Sabrina, Tishna

    2017-01-01

    In people-centric applications, participants voluntarily report data to service providers for community benefits. As most of the applications demand high-quality data, straightforward representation of even seemingly benign data may pose significant privacy risks through inference. Retaining high data quality without compromising participants’ privacy is a challenging research problem since these goals are inherently orthogonal. The existing techniques attempt to protect user privacy by re...

  6. PRIVACY PROTECTION PROBLEMS IN SOCIAL NETWORKS

    OpenAIRE

    OKUR, M. Cudi

    2011-01-01

    Protecting privacy has become a major concern for most social network users because of increased difficulties of controlling the online data. This article presents an assessment of the common privacy related risks of social networking sites. Open and hidden privacy risks of active and passive online profiles are examined and increasing share of social networking in these phenomena is discussed. Inadequacy of available legal and institutional protection is demonstrated and the effectiveness of...

  7. Social Network Privacy via Evolving Access Control

    Science.gov (United States)

    di Crescenzo, Giovanni; Lipton, Richard J.

    We study the problem of limiting privacy loss due to data shared in a social network, where the basic underlying assumptions are that users are interested in sharing data and cannot be assumed to constantly follow appropriate privacy policies. Note that if these two assumptions do not hold, social network privacy is theoretically very easy to achieve; for instance, via some form of access control and confidentiality transformation on the data.

  8. Personal privacy versus public accountability: a technological solution to an ethical dilemma.

    Science.gov (United States)

    Pandiani, J A; Banks, S M; Schacht, L M

    1998-11-01

    The tension between personal privacy and public accountability produces one of the major ethical dilemmas facing behavioral health program evaluators and service system researchers. This article discusses the source of this tension and introduces a research methodology that allows program evaluators to fully and equally respect both ethical principles. This methodology uses contemporary computer and statistical technology in conjunction with aggregated, de-identified information derived from existing databases to provide valid and reliable measures of the performance of treatment programs while it protects the personal privacy of individuals.

  9. 78 FR 19744 - Privacy Act of 1974; Privacy Act System of Records

    Science.gov (United States)

    2013-04-02

    ... workstations within the NASA Intranet. RETENTION AND DISPOSAL: Records are retained in a computer database and... SPACE ADMINISTRATION Privacy Act of 1974; Privacy Act System of Records AGENCY: National Aeronautics and Space Administration (NASA). ACTION: Notice of a Privacy Act system of records. SUMMARY: Each Federal...

  10. 78 FR 19745 - Privacy Act of 1974; Privacy Act System of Records

    Science.gov (United States)

    2013-04-02

    ... approved authentication methods can access the system. RETENTION AND DISPOSAL: Records are maintained and... SPACE ADMINISTRATION Privacy Act of 1974; Privacy Act System of Records AGENCY: National Aeronautics and Space Administration (NASA). ACTION: Notice of Privacy Act system of records. SUMMARY: Each Federal...

  11. 75 FR 65229 - Privacy Act; Implementation

    Science.gov (United States)

    2010-10-22

    ... FURTHER INFORMATION CONTACT: Dale Underwood, Privacy Act officer, Department of the Treasury, 1500....underwood@do.treas.gov . SUPPLEMENTARY INFORMATION: The Department of the Treasury is publishing separately...

  12. Customer privacy on UK healthcare websites.

    Science.gov (United States)

    Mundy, Darren P

    2006-09-01

    Privacy has been and continues to be one of the key challenges of an age devoted to the accumulation, processing, and mining of electronic information. In particular, privacy of healthcare-related information is seen as a key issue as health organizations move towards the electronic provision of services. The aim of the research detailed in this paper has been to analyse privacy policies on popular UK healthcare-related websites to determine the extent to which consumer privacy is protected. The author has combined approaches (such as approaches focused on usability, policy content, and policy quality) used in studies by other researchers on e-commerce and US healthcare websites to provide a comprehensive analysis of UK healthcare privacy policies. The author identifies a wide range of issues related to the protection of consumer privacy through his research analysis using quantitative results. The main outcomes from the author's research are that only 61% of healthcare-related websites in their sample group posted privacy policies. In addition, most of the posted privacy policies had poor readability standards and included a variety of privacy vulnerability statements. Overall, the author's findings represent significant current issues in relation to healthcare information protection on the Internet. The hope is that raising awareness of these results will drive forward changes in the industry, similar to those experienced with information quality.

  13. Extending SQL to Support Privacy Policies

    Science.gov (United States)

    Ghazinour, Kambiz; Pun, Sampson; Majedi, Maryam; Chinaci, Amir H.; Barker, Ken

    Increasing concerns over Internet applications that violate user privacy by exploiting (back-end) database vulnerabilities must be addressed to protect both customer privacy and to ensure corporate strategic assets remain trustworthy. This chapter describes an extension onto database catalogues and Structured Query Language (SQL) for supporting privacy in Internet applications, such as in social networks, e-health, e-governmcnt, etc. The idea is to introduce new predicates to SQL commands to capture common privacy requirements, such as purpose, visibility, generalization, and retention for both mandatory and discretionary access control policies. The contribution is that corporations, when creating the underlying databases, will be able to define what their mandatory privacy policies arc with which all application users have to comply. Furthermore, each application user, when providing their own data, will be able to define their own privacy policies with which other users have to comply. The extension is supported with underlying catalogues and algorithms. The experiments demonstrate a very reasonable overhead for the extension. The result is a low-cost mechanism to create new systems that arc privacy aware and also to transform legacy databases to their privacy-preserving equivalents. Although the examples arc from social networks, one can apply the results to data security and user privacy of other enterprises as well.

  14. Location privacy protection in mobile networks

    CERN Document Server

    Liu, Xinxin

    2013-01-01

    This SpringerBrief analyzes the potential privacy threats in wireless and mobile network environments, and reviews some existing works. It proposes multiple privacy preserving techniques against several types of privacy threats that are targeting users in a mobile network environment. Depending on the network architecture, different approaches can be adopted. The first proposed approach considers a three-party system architecture where there is a trusted central authority that can be used to protect users? privacy. The second approach considers a totally distributed environment where users per

  15. An overview of human genetic privacy

    National Research Council Canada - National Science Library

    Shi, Xinghua; Wu, Xintao

    2017-01-01

    .... With increasing research opportunities for integrative genomic studies through data sharing, genetic privacy emerges as a legitimate yet challenging concern that needs to be carefully addressed...

  16. Vehicular ad hoc network security and privacy

    CERN Document Server

    Lin, X

    2015-01-01

    Unlike any other book in this area, this book provides innovative solutions to security issues, making this book a must read for anyone working with or studying security measures. Vehicular Ad Hoc Network Security and Privacy mainly focuses on security and privacy issues related to vehicular communication systems. It begins with a comprehensive introduction to vehicular ad hoc network and its unique security threats and privacy concerns and then illustrates how to address those challenges in highly dynamic and large size wireless network environments from multiple perspectives. This book is richly illustrated with detailed designs and results for approaching security and privacy threats.

  17. Defense Civil Support: DOD Needs to Identify National Guards Cyber Capabilities and Address Challenges in Its Exercises

    Science.gov (United States)

    2016-09-01

    are ready to be mobilized and, when mobilized , to execute military missions in support of the full spectrum of DOD missions, including, but not...GAO’s Mission Obtaining Copies of GAO Reports and Testimony Order by Phone Connect with GAO To Report Fraud, Waste, and Abuse in Federal Programs...Congressional Relations Public Affairs Strategic Planning and External Liaison Please Print on Recycled Paper.

  18. Digital privacy in the marketplace perspectives on the information exchange

    CERN Document Server

    Milne, George

    2015-01-01

    Digital Privacy in the Marketplace focuses on the data ex-changes between marketers and consumers, with special ttention to the privacy challenges that are brought about by new information technologies. The purpose of this book is to provide a background source to help the reader think more deeply about the impact of privacy issues on both consumers and marketers. It covers topics such as: why privacy is needed, the technological, historical and academic theories of privacy, how market exchange af-fects privacy, what are the privacy harms and protections available, and what is the likely future of privacy.

  19. DOD/COCOM Water Security Program Strategy Document

    Science.gov (United States)

    2011-04-22

    and bridges within flood zones, and optimization of drainage or surface water channels.  Train host country on common water-borne pathogens , modes...produce 60% of the nation’s vegetables and 25% of its fruits and nuts . The Bureau of Reclamation is also the second largest producer of

  20. Assessment of the DoD Embedded Media Program

    Science.gov (United States)

    2004-09-01

    Biological Chemical Command SECDEF Secretary of Defense SECNAV Secretary of the Navy GL-6 SIC Sociedade Independente de Comunicacao SITREP...s Th at D id P ar tic ip at e In iti al A llo ca tio ns E m be ds M ed ia O rg s D id N ot P ar tic ip at e In iti al Al lo