WorldWideScience

Sample records for psychology confidentiality desertion

  1. Confidentiality in psychological practice: a decrepit concept?

    Science.gov (United States)

    McMahon, M; Knowles, A D

    1995-11-01

    Although the principle of confidentiality in the relationship between psychologists and client has been vaunted, and is emphasised in the Australian Psychological Society's Code of Professional Conduct (the APS code; 1994), the confidentiality of this relationship is circumscribed by the absence of legal protections, the ethical beliefs of psychologists, institutional practices, and the provisions of the APS code itself. Lack of privilege in judicial proceedings, and statutory obligations to report certain types of behaviour, mandate breaches of confidentiality in some circumstances. Ethical beliefs of psychologists may support disclosure, especially where it is believed that there is danger of serious physical harm to the client or others. Multidisciplinary teams and institutional settings require the exchange of information for optimal delivery of services. Recent amendments to the APS code may require disclosure without the client's consent when a client is believed to be suicidal. Such developments, when considered at all, are typically regarded as exceptions to a general obligation of confidentiality. However, discussion of exceptions presupposes agreement on fundamental principle: the significance of, and rationale for, confidentiality in the psychologist-client relationship. It is argued in this paper that the obligation of confidentiality has been assumed rather than vigorously analysed and empirically explored. A critical examination of this obligation is the most appropriate starting point for the rehabilitation of contemporary principles of confidentiality in the psychologist-client relationship.

  2. Beyond just deserts and deterrence: An evolutionary psychology of punishment and rehabilitation

    DEFF Research Database (Denmark)

    Petersen, Michael Bang

    2007-01-01

    Recent studies indicate that punishment is driven by just deserts motives rather than deterrence motives. In the just deserts perspective, punishment is based on the seriousness of the crime, and rehabilitative alternatives to punishment are only expected to be considered when the seriousness...... is low. By drawing on recent advances in evolutionary psychology, a range of contrasting expectations are developed. Especially, it is expected that the choice between punishment and rehabilitation is determined by assessing the future social value of the criminal. The expectations are supported by data...

  3. PSYCHOLOGICAL EFFICIENCY CRITERIA OF CREATIVE EDUCATION: SELF-DEPENDENCY, ACTIVE THINKING ACTIVITY, CONFIDENTIAL DISCOURSE

    Directory of Open Access Journals (Sweden)

    Mikhail Yu. Chernyshov

    2016-03-01

    Full Text Available Introduction: а detailed investigation has been conducted within the frames of an integrated project and on the basis of a number of schools in 3 regional centers of Russian Federation, its goal presuming the search for psychological ways of refining the innovative education system. The set of the project’s objectives included analysis of the approaches to organization, implementation of innovative education as well as analysis of possible techniques of constructing pedagogical discourse. Маterials and Methods: this investigation presumed either open or hidden observation of the process of structuring and implementation of the education process, as well as observation of the pedagogical discourse, conducting the questioning of the schoolchildren, teachers, school administration and parents. Technical aids of video- and audio-registration were used in course of observations and questioning. The materials obtained were studies, and the conclusions drawn w ere generalized. Results: рithy material was obtained. Its analysis allows one to state that there are systemic problems in education and upbringing, and that there is the need to apply didactic approaches to the end of forming mind, consciousness, feeling-sense sphere of mind and morality in schoolchildren. Discussion and Conclusions: definite approaches to solving these problems are discussed. It is exclusively important that refining the system of innovative education would follow the way of goal-oriented and systemic constructing confidential, correct and only under this circumstance truly innovative pedagogical discourse in class and outside the classroom. Such a discourse shall stimulate not only initiation of thinking activity of schoolchildren (as L. S. Vygotsky presupposed but, first of all, formation of the feeling-sense sphere of mind, which is the basis for forming personally-valuable feelings, senses and moral orientations of schoolchildren. Formation of consciousness, self

  4. Confidentiality and personal integrity.

    Science.gov (United States)

    Edgar, A

    1994-06-01

    This paper uses the social theory of Erving Goffman in order to argue that confidentiality should be understood in relation to the mundane social skills by which individuals present and respect specific self-images of themselves and others during social interaction. The breaching of confidentiality is analysed in terms of one person's capacity to embarrass another, and so to expose that person as incompetent. Respecting confidentiality may at once serve to protect the vulnerable from an unjust society, and yet also protect the guilty from just accusation. Ethical reasoning about confidentiality must therefore recognize the dangers of prejudice and violence inherent in decisions to breach or to respect confidentiality. Case studies are used to illustrate the efficacy of this account, culminating with analyses of three examples from the UKCC document Confidentiality.

  5. Confidentiality and death.

    Science.gov (United States)

    Ong, B B; Kaur, S

    1997-12-01

    The duty of confidentiality in the normal doctor-patient relationship is well recognized. However, the duty of confidentiality between the pathologist who performs the autopsy and the requesting authorities and the next-of-kin is not as clearly spelt out. This article discusses the problems faced by the pathologist with regards to hospital and medico-legal autopsies in Malaysia. A proposed ethical guideline is included on how to deal with peculiar issues regarding confidentiality and the pathologist.

  6. Confidentiality in Sports Medicine.

    Science.gov (United States)

    Malcolm, Dominic

    2016-04-01

    This article synthesizes existing literature to provide a summary of the ethical issues concerning patient confidentiality in sport. It outlines the medical principle of confidentiality and identifies cross-cultural ethicolegal variations that shape its implementation. Clinicians' multiple obligations, physical environments, and practice and policy contexts are discussed, and research detailing experiences of maintaining patient confidentiality in sport is reviewed. Policy recommendations for enhancing compliance with this ethical principle are summarized. It is argued that the context of sport exacerbates pressures on clinicians to break patient confidentiality, breaches occur regularly, and interventions are required to enhance ethical compliance in sports medicine. Copyright © 2016 Elsevier Inc. All rights reserved.

  7. Computer Security: Printing confidentially

    CERN Multimedia

    Stefan Lueders, Computer Security Team

    2015-01-01

    Have you ever hesitated to print a confidential document using CERN printers? Or perhaps you have rushed quickly to the printer after hitting the “print” button in order to avoid someone else getting hold of and reading your document? These times are over now with the new printing infrastructure!   Indeed, many of us regularly print out confidential documents like our salary slips, MARS forms, tendering documents and drafts of preliminary papers. The upcoming CERN data protection policy will require all of us to respect the confidentiality of such documents and, as the word “confidential” implies, access to “confidential” or sensitive documents will be tightly controlled. What can we do about the public printers located in many buildings, floors and shared spaces - accessible not only to CERN staff and users but also to visitors and guests? Some printers are located in the vicinity of restaurants, cafeterias or close to paths taken b...

  8. Minors' request for confidentiality.

    Science.gov (United States)

    Naidoo, S

    2014-07-01

    Dentists must be cognisant of what the law requires and how they are expected to respond. When the law does not address an issue, the dentist would need to weigh the circumstances and consequences and do what he/she thinks is ethically appropriate and acceptable. The need to maintain confidentiality of any information given to us in our professional capacity is paramount. Patient autonomy and their absolute right to confidentiality must be ensured in almost all but the most exceptional circumstances. Patients have the ethical and legal right to expect a health professional to keep confidential the information provided during the course of their care. Disclosure of patient information is only permitted with the patient's consent or if there is an overwhelming public interest in disclosure as prescribed by the law.

  9. Confidentiality principles in psychiatry.

    Science.gov (United States)

    Carasevici, B

    2015-01-01

    Confidentiality stands out in psychiatry through its multiple connotations as an intrinsic necessity in the ethics of professional relationships. Thus it represents an important characteristic of this profession and at the same time a stringent request which, through its specificity, implies a direct contact with persons in need for help. Despite being inserted in professional codes and legislative systems, confidentiality in psychiatry is far from being considered a clarified matter and does not stand aside from ethical controversy. Keeping the professional secret is often a hard task due to the pressure of the law or of other professional groups who can bring multiple justifications, including that of action for the benefit of society. The therapist is often sub- mitted to a tension caused on the one hand by the promise of keeping the professional secret and on the other hand by multiple requests of breaking the confidentiality. So the problem of confidentiality in Psychiatry deserves special attention because in this profession, more than in other branches of medicine, the gain of the patient's trust is essential in the psychotherapeutic relationship.

  10. University Student Expectations of Confidentiality When Disclosing Information to Their Professors

    Science.gov (United States)

    Harris, Gregory E.; Dalton, Stephanie

    2014-01-01

    The purpose of this study was to explore university students' expectations of confidentiality when they make disclosures to their university professors. A secondary purpose was to consider if students have a higher expectation of confidentiality when talking with Psychology professors versus professors in other disciplines. Students were asked to…

  11. Desert Scrublands

    Science.gov (United States)

    Jones, L.L.C.; Halama, K.J.; Lovich, R.E.

    2016-01-01

    Desert scrublands comprise the lower to mid-elevation portions of four different ecosystems including the Chihuahuan, Great Basin, Mojave and Sonoran Deserts. Together the area inside their outer boundaries includes over 8% of the surface area of the United States. Despite significant differences in the flora and fauna of these bioregions they all share the common trait of being arid shrub-steppe ecosystems, receiving, on average, less than 254 mm of rain per year. The austere nature of these landscapes belies their significant biodiversity, the amazing behavioral and physiological adaptations of the biota, and the fragility of the ecosystems to human disturbances. For example, the Mojave Desert alone has at least 250 species of ephemeral plants, mostly winter annuals, and up to 90% are endemic.

  12. Psychology

    Science.gov (United States)

    Blackmore, Susan; Fouad, Nadya; Kagan, Jerome; Kosslyn, Stephen; Posner, Michael; Sternburg, Robert; Driscoll, Marcy; Ge, Xun; Parrish, Patrick

    2013-01-01

    Scholars representing the field of psychology were asked to identify what they considered to be the most exciting and imaginative work currently being done in their field, as well as how that work might change our understanding. The scholars included Susan Blackmore, Nadya Fouad, Jerome Kagan, Stephen Kosslyn, Michael Posner, and Robert Sternberg.…

  13. Psychology

    Science.gov (United States)

    Blackmore, Susan; Fouad, Nadya; Kagan, Jerome; Kosslyn, Stephen; Posner, Michael; Sternburg, Robert; Driscoll, Marcy; Ge, Xun; Parrish, Patrick

    2013-01-01

    Scholars representing the field of psychology were asked to identify what they considered to be the most exciting and imaginative work currently being done in their field, as well as how that work might change our understanding. The scholars included Susan Blackmore, Nadya Fouad, Jerome Kagan, Stephen Kosslyn, Michael Posner, and Robert Sternberg.…

  14. 31 CFR 9.6 - Confidential information.

    Science.gov (United States)

    2010-07-01

    ... ON THE NATIONAL SECURITY § 9.6 Confidential information. Information submitted in confidence which... be accorded confidential treatment. All information submitted in confidence must be on separate pages marked “Business Confidential.” ...

  15. Postmortem Confidentiality: An Ethical Issue

    Science.gov (United States)

    Bradley, Loretta J.; Hendricks, Bret; Kabell, Douglas R.

    2011-01-01

    In an era of increased need and expectation for confidentiality, the counseling record of the deceased client challenges confidentiality. Using ethical codes and legal mandates, the authors explore whether the counseling record of a deceased client should be released when the client's will and the client's counseling records are silent on this…

  16. Ombuds’ corner: Confidentiality

    CERN Multimedia

    Vincent Vuillemin

    2011-01-01

    In this series, the Bulletin aims to explain the role of the Ombuds at CERN by presenting practical examples of misunderstandings that could have been resolved by the Ombuds if he had been contacted earlier. Please note that, in all the situations we present, the names are fictitious and used only to improve clarity.    Jane* came to the Ombuds to share her concerns about the actions of Mike*, one of her senior colleague supervisors, and insisted on the absolute confidentiality. The Ombuds promised to keep the information confidential following the terms of his mandate. During the discussion it appeared that the whole group was affected by the situation, spending a lot of time discussing how to resolve the problem instead of focusing on their main responsibilities. The risks for the Organization seemed very high and could possibly endanger the safety of the operations.  On one side, the Ombuds believed that it was essential to bring this matter to the attention of senior managem...

  17. Can you keep a secret? Confidentiality in psychotherapy.

    Science.gov (United States)

    Younggren, Jeffrey N; Harris, Eric A

    2008-05-01

    Confidentiality is the secret-keeping duty that arises from the establishment of the professional relationship psychologists develop with their clients. It is a duty created by the professional relationship, it is set forth in the American Psychological Association's (2002) Ethical Principles and Code of Conduct, and it is codified in many state regulations. However, the difference between confidentiality and legal privilege; how, why, and when it can be violated; and the reasons for so doing are not well understood by many practitioners. While on the surface confidentiality might seem to be an easy concept to apply to professional practice, in fact it is quite complex and filled with exceptions that frequently differ from circumstance to circumstance and from state to state. A lack of respect for and a lack of familiarity with the significance of these exceptions could have dire professional consequences. This article reviews the ethical imperative of confidentiality and then provides examples of legal cases that help to better understand its complexity. Then, we offer strategies designed to help metal health practitioners when they are confronted with questions regarding confidentiality and privilege.

  18. 34 CFR 300.610 - Confidentiality.

    Science.gov (United States)

    2010-07-01

    ... 34 Education 2 2010-07-01 2010-07-01 false Confidentiality. 300.610 Section 300.610 Education... DISABILITIES Monitoring, Enforcement, Confidentiality, and Program Information Confidentiality of Information § 300.610 Confidentiality. The Secretary takes appropriate action, in accordance with section 444 of...

  19. 32 CFR 806b.9 - Confidentiality promises.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 6 2010-07-01 2010-07-01 false Confidentiality promises. 806b.9 Section 806b.9... PROGRAM Obtaining Law Enforcement Records and Confidentiality Promises § 806b.9 Confidentiality promises. Promises of confidentiality must be prominently annotated in the record to protect from disclosure any...

  20. 25 CFR 571.3 - Confidentiality.

    Science.gov (United States)

    2010-04-01

    ... 25 Indians 2 2010-04-01 2010-04-01 false Confidentiality. 571.3 Section 571.3 Indians NATIONAL... INVESTIGATIONS General § 571.3 Confidentiality. Unless confidentiality is waived, the Commission shall treat as... appropriate law enforcement officials. The confidentiality of documents submitted in a multiple-party...

  1. Desert Shield and Desert Storm Emerging Observations

    Science.gov (United States)

    1991-10-07

    by identifying activo component an civilian maintenance instructors to replace active component instructors receiving orders for war or other PCS sites...STORM Desert scenarios in UCOFT 81619 /61WY (00687) DESERT STORM Activo Tank Table 911 816sy 90990 (006m) DESERT STloM Degraded Mode Guoery WS1W 4042iA

  2. Confidentiality in gamete donation

    Directory of Open Access Journals (Sweden)

    Neda Yavari

    2006-03-01

    Full Text Available During recent decades, the third person intervention in human artificial insemination has created new hopes for infertile couples. However these new progresses have propounded new ethical and legal concerns for families. One of them is confidentiality regarding gamete donor's identity, and its disclosure to the future child and others. Of course, negligence to this ethical issue would produce a big barrier for efficient health care services."nFor compiling this article we searched different websites including Pubmed, Ovid, Elsevier, Google and etc and the resulting articles were investigated carefully. "nIn this article, the history of gamete donation in different countries is reviewed initially and the mentioned reasons for anonymity with that of disclosure are compared. "nBecause of the different cultures and values of various societies, it is not justifiable to propose a unique method regarding this issue; however, there have to be clear rules in this regard, in each country. In order to facilitate this process, pretreatment counseling courses should be established to explain different aspects of this issue for the recipients.

  3. Fetal privacy and confidentiality.

    Science.gov (United States)

    Botkin, J R

    1995-01-01

    With the advent of new and better contraceptive methods and the ability to facilitate and manipulate fertilization and gestation, couples will gain greater control over their fertility. Once a pregnancy has been established or an in vitro embryo created, the ability to evaluate the embryo and fetus will increase dramatically with progress in human genetic research. Preconception and preimplantation genetic testing and screening are now possible, and the technology to perform prenatal screening early in gestation is advancing rapidly. Nonsurgical methods facilitate induced abortion with a relatively lower degree of trauma upon the woman undergoing the procedure. These capabilities may all be used to enable and even encourage the genetic selection of future children. Despite the ethical concerns associated with prenatal testing and abortion, these services will continue to be an integral aspect of reproductive medicine. As technology advances, however, it will be possible to test and screen for conditions which do not produce serious defects. Genetic conditions which produce relatively mild impacts upon health will be identifiable in the embryo or fetus, while late-onset conditions and genetic factors which have only a probability of affecting health will also be located in the fetal genome. Prospective parents may therefore soon have the capability of selecting their most desirable embryo in vitro, or terminating all undesirable fetuses in vivo until the preferred child is delivered. The medical profession must take some responsibility for establishing guidelines on the use of reproductive technology. The standards of practice for the medical profession must reflect the results of a broad social debate over competing moral values. The author develops an argument for legal and ethical limitations on the application of prenatal testing and screening technology, suggesting that for some medical conditions, respect for the privacy and confidentiality of the fetus

  4. Data Confidentiality Challenges in Big Data Applications

    Energy Technology Data Exchange (ETDEWEB)

    Yin, Jian; Zhao, Dongfang

    2015-12-15

    In this paper, we address the problem of data confidentiality in big data analytics. In many fields, much useful patterns can be extracted by applying machine learning techniques to big data. However, data confidentiality must be protected. In many scenarios, data confidentiality could well be a prerequisite for data to be shared. We present a scheme to provide provable secure data confidentiality and discuss various techniques to optimize performance of such a system.

  5. 40 CFR 710.58 - Confidentiality.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 30 2010-07-01 2010-07-01 false Confidentiality. 710.58 Section 710.58... CHEMICAL INVENTORY REGULATIONS Inventory Update Reporting for 2006 and Beyond § 710.58 Confidentiality. (a) Any person submitting information under this subpart may assert a business confidentiality claim for...

  6. 40 CFR 57.606 - Confidentiality.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 5 2010-07-01 2010-07-01 false Confidentiality. 57.606 Section 57.606... NONFERROUS SMELTER ORDERS Research and Development Requirements § 57.606 Confidentiality. The provisions of section 114 of the Act and 40 CFR part 2 shall govern the confidentiality of any data or information...

  7. 42 CFR 56.111 - Confidentiality.

    Science.gov (United States)

    2010-10-01

    ... 42 Public Health 1 2010-10-01 2010-10-01 false Confidentiality. 56.111 Section 56.111 Public... SERVICES General Provisions § 56.111 Confidentiality. All information as to personal facts and... designee with appropriate safeguards for confidentiality of patient records. Otherwise, information may be...

  8. 24 CFR 574.440 - Confidentiality.

    Science.gov (United States)

    2010-04-01

    ... 24 Housing and Urban Development 3 2010-04-01 2010-04-01 false Confidentiality. 574.440 Section... Grantees and Project Sponsors § 574.440 Confidentiality. The grantee shall agree, and shall ensure that each project sponsor agrees, to ensure the confidentiality of the name of any individual assisted under...

  9. 29 CFR 1640.4 - Confidentiality.

    Science.gov (United States)

    2010-07-01

    ... 29 Labor 4 2010-07-01 2010-07-01 false Confidentiality. 1640.4 Section 1640.4 Labor Regulations... WITH DISABILITIES ACT AND SECTION 504 OF THE REHABILITATION ACT OF 1973 § 1640.4 Confidentiality. (a... shall observe the confidentiality requirements of section 706(b) and section 709(e) of the Civil Rights...

  10. 46 CFR 249.11 - Confidentiality.

    Science.gov (United States)

    2010-10-01

    ... 46 Shipping 8 2010-10-01 2010-10-01 false Confidentiality. 249.11 Section 249.11 Shipping MARITIME... UNDERWRITERS FOR MARINE HULL INSURANCE § 249.11 Confidentiality. (a) If the data submitted under this rule... for confidentiality at the time of any request for production of information under the FOIA by third...

  11. 29 CFR 1691.3 - Confidentiality.

    Science.gov (United States)

    2010-07-01

    ... 29 Labor 4 2010-07-01 2010-07-01 false Confidentiality. 1691.3 Section 1691.3 Labor Regulations... EMPLOYMENT DISCRIMINATION FILED AGAINST RECIPIENTS OF FEDERAL FINANCIAL ASSISTANCE § 1691.3 Confidentiality. When an agency receives information obtained by EEOC, the agency shall observe the confidentiality...

  12. 21 CFR 26.76 - Confidentiality.

    Science.gov (United States)

    2010-04-01

    ... 21 Food and Drugs 1 2010-04-01 2010-04-01 false Confidentiality. 26.76 Section 26.76 Food and...Frameworkâ Provisions § 26.76 Confidentiality. (a) Each party agrees to maintain, to the extent required under its laws, the confidentiality of information exchanged under this part. (b) In particular, neither...

  13. 19 CFR 207.105 - Confidentiality.

    Science.gov (United States)

    2010-04-01

    ... 19 Customs Duties 3 2010-04-01 2010-04-01 false Confidentiality. 207.105 Section 207.105 Customs... and Committee Proceedings § 207.105 Confidentiality. (a) Protection of proprietary and privileged.... (b) Confidentiality of proceedings. Upon the request of any charged party pursuant to § 207.106 of...

  14. 40 CFR 717.19 - Confidentiality.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 30 2010-07-01 2010-07-01 false Confidentiality. 717.19 Section 717.19... THE ENVIRONMENT General Provisions § 717.19 Confidentiality. (a) Any person submitting copies of records may assert a business confidentiality claim covering all or part of the submitted information. Any...

  15. 28 CFR 37.4 - Confidentiality.

    Science.gov (United States)

    2010-07-01

    ... 28 Judicial Administration 1 2010-07-01 2010-07-01 false Confidentiality. 37.4 Section 37.4... DISABILITIES ACT AND SECTION 504 OF THE REHABILITATION ACT OF 1973 § 37.4 Confidentiality. (a) When a section... the confidentiality requirements of section 706(b) and section 709(e) of the Civil Rights Act of 1964...

  16. 46 CFR 502.405 - Confidentiality.

    Science.gov (United States)

    2010-10-01

    ... 46 Shipping 9 2010-10-01 2010-10-01 false Confidentiality. 502.405 Section 502.405 Shipping... Alternative Dispute Resolution § 502.405 Confidentiality. (a) Except as provided in paragraphs (d) and (e) of... govern the confidentiality of the dispute resolution proceeding, in accordance with the guidance on...

  17. 14 CFR 413.9 - Confidentiality.

    Science.gov (United States)

    2010-01-01

    ... 14 Aeronautics and Space 4 2010-01-01 2010-01-01 false Confidentiality. 413.9 Section 413.9... TRANSPORTATION LICENSING LICENSE APPLICATION PROCEDURES § 413.9 Confidentiality. (a) Any person furnishing... for which any person or agency requests confidentiality must be clearly marked with an identifying...

  18. 28 CFR 42.603 - Confidentiality.

    Science.gov (United States)

    2010-07-01

    ... 28 Judicial Administration 1 2010-07-01 2010-07-01 false Confidentiality. 42.603 Section 42.603... Financial Assistance § 42.603 Confidentiality. When an agency receives information obtained by EEOC, the agency shall observe the confidentiality requirements of sections 706(b) and 709(e) of title VII as would...

  19. 41 CFR 60-742.3 - Confidentiality.

    Science.gov (United States)

    2010-07-01

    ... 41 Public Contracts and Property Management 1 2010-07-01 2010-07-01 true Confidentiality. 60-742.3... HOLDING GOVERNMENT CONTRACTS OR SUBCONTRACTS § 60-742.3 Confidentiality. When the Department of Labor receives information obtained by EEOC, the Department of Labor shall observe the confidentiality...

  20. 42 CFR 93.108 - Confidentiality.

    Science.gov (United States)

    2010-10-01

    ... 42 Public Health 1 2010-10-01 2010-10-01 false Confidentiality. 93.108 Section 93.108 Public... MISCONDUCT General § 93.108 Confidentiality. (a) Disclosure of the identity of respondents and complainants... prescribed by applicable law, confidentiality must be maintained for any records or evidence from which...

  1. 40 CFR 716.55 - Confidentiality claims.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 30 2010-07-01 2010-07-01 false Confidentiality claims. 716.55 Section... ACT HEALTH AND SAFETY DATA REPORTING General Provisions § 716.55 Confidentiality claims. (a)(1... clearly identify the material subject to the claim. (3) Any respondent may assert a confidentiality claim...

  2. 40 CFR 712.15 - Confidentiality.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 30 2010-07-01 2010-07-01 false Confidentiality. 712.15 Section 712.15... INFORMATION RULES General Provisions § 712.15 Confidentiality. (a) Any person submitting information under this part may assert business confidentiality claims for the information as described in the pertinent...

  3. 8 CFR 1003.108 - Confidentiality.

    Science.gov (United States)

    2010-01-01

    ... 8 Aliens and Nationality 1 2010-01-01 2010-01-01 false Confidentiality. 1003.108 Section 1003.108....108 Confidentiality. (a) Complaints and preliminary inquiries. Except as otherwise provided by law or... conduct is the subject of a complaint or preliminary inquiry, however, may waive confidentiality, except...

  4. 15 CFR 801.5 - Confidentiality.

    Science.gov (United States)

    2010-01-01

    ... 15 Commerce and Foreign Trade 3 2010-01-01 2010-01-01 false Confidentiality. 801.5 Section 801.5 Commerce and Foreign Trade Regulations Relating to Commerce and Foreign Trade (Continued) BUREAU OF... FOREIGN PERSONS § 801.5 Confidentiality. Information collected pursuant to § 801.3 is confidential (see...

  5. 40 CFR 790.7 - Confidentiality.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 31 2010-07-01 2010-07-01 true Confidentiality. 790.7 Section 790.7...) PROCEDURES GOVERNING TESTING CONSENT AGREEMENTS AND TEST RULES General Provisions § 790.7 Confidentiality. (a... Act may assert a claim of confidentiality for certain information submitted to EPA in response to the...

  6. 40 CFR 2.215 - Confidentiality agreements.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 1 2010-07-01 2010-07-01 false Confidentiality agreements. 2.215 Section 2.215 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY GENERAL PUBLIC INFORMATION Confidentiality of Business Information § 2.215 Confidentiality agreements. (a) No EPA officer, employee...

  7. 46 CFR 531.4 - Confidentiality.

    Science.gov (United States)

    2010-10-01

    ... 46 Shipping 9 2010-10-01 2010-10-01 false Confidentiality. 531.4 Section 531.4 Shipping FEDERAL... General Provisions § 531.4 Confidentiality. (a) All NSAs and amendments to NSAs filed with the Commission... agree to disclose information contained in it. Breach of any confidentiality agreement contained in an...

  8. 40 CFR 707.75 - Confidentiality.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 30 2010-07-01 2010-07-01 false Confidentiality. 707.75 Section 707.75... IMPORTS AND EXPORTS Notices of Export Under Section 12(b) § 707.75 Confidentiality. (a) A person may assert a claim of confidentiality for any information which is submitted to EPA in a notice. (b) Any...

  9. 42 CFR 2.13 - Confidentiality restrictions.

    Science.gov (United States)

    2010-10-01

    ... 42 Public Health 1 2010-10-01 2010-10-01 false Confidentiality restrictions. 2.13 Section 2.13 Public Health PUBLIC HEALTH SERVICE, DEPARTMENT OF HEALTH AND HUMAN SERVICES GENERAL PROVISIONS CONFIDENTIALITY OF ALCOHOL AND DRUG ABUSE PATIENT RECORDS General Provisions § 2.13 Confidentiality restrictions...

  10. 42 CFR 51c.110 - Confidentiality.

    Science.gov (United States)

    2010-10-01

    ... 42 Public Health 1 2010-10-01 2010-10-01 false Confidentiality. 51c.110 Section 51c.110 Public... SERVICES General Provisions § 51c.110 Confidentiality. All information as to personal facts and... designee with appropriate safeguards for confidentiality of patient records. Otherwise, information may be...

  11. 42 CFR 67.20 - Confidentiality.

    Science.gov (United States)

    2010-10-01

    ... 42 Public Health 1 2010-10-01 2010-10-01 false Confidentiality. 67.20 Section 67.20 Public Health PUBLIC HEALTH SERVICE, DEPARTMENT OF HEALTH AND HUMAN SERVICES FELLOWSHIPS, INTERNSHIPS, TRAINING AGENCY..., Evaluation, Demonstration, and Dissemination Projects § 67.20 Confidentiality. The confidentiality of...

  12. 42 CFR 59.11 - Confidentiality.

    Science.gov (United States)

    2010-10-01

    ... 42 Public Health 1 2010-10-01 2010-10-01 false Confidentiality. 59.11 Section 59.11 Public Health... Project Grants for Family Planning Services § 59.11 Confidentiality. All information as to personal facts... confidentiality. Otherwise, information may be disclosed only in summary, statistical, or other form which does...

  13. 15 CFR 285.2 - Confidentiality.

    Science.gov (United States)

    2010-01-01

    ... 15 Commerce and Foreign Trade 1 2010-01-01 2010-01-01 false Confidentiality. 285.2 Section 285.2... LABORATORY ACCREDITATION PROGRAM § 285.2 Confidentiality. To the extent permitted by applicable laws, NVLAP will protect the confidentiality of all information obtained relating to the application, on-site...

  14. 29 CFR 1641.3 - Confidentiality.

    Science.gov (United States)

    2010-07-01

    ... 29 Labor 4 2010-07-01 2010-07-01 false Confidentiality. 1641.3 Section 1641.3 Labor Regulations... SUBCONTRACTS § 1641.3 Confidentiality. When the Department of Labor receives information obtained by EEOC, the Department of Labor shall observe the confidentiality requirements of sections 706(b) and 709(e) of title VII...

  15. 14 CFR 414.13 - Confidentiality.

    Science.gov (United States)

    2010-01-01

    ... 14 Aeronautics and Space 4 2010-01-01 2010-01-01 false Confidentiality. 414.13 Section 414.13... TRANSPORTATION LICENSING SAFETY APPROVALS Application Procedures § 414.13 Confidentiality. (a) To ensure confidentiality of data or information in the application, the applicant must— (1) Send a written request with the...

  16. 37 CFR 382.14 - Confidential information.

    Science.gov (United States)

    2010-07-01

    ... 37 Patents, Trademarks, and Copyrights 1 2010-07-01 2010-07-01 false Confidential information. 382... Confidential information. (a) Definition. For purposes of this subpart, “Confidential Information” shall include the statements of account and any information contained therein, including the amount of...

  17. 7 CFR 983.65 - Confidential information.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 8 2010-01-01 2010-01-01 false Confidential information. 983.65 Section 983.65..., ARIZONA, AND NEW MEXICO Reports, Books and Records § 983.65 Confidential information. All reports and records furnished or submitted by handlers to the committee which include confidential data or...

  18. 37 CFR 261.5 - Confidential information.

    Science.gov (United States)

    2010-07-01

    ... 37 Patents, Trademarks, and Copyrights 1 2010-07-01 2010-07-01 false Confidential information. 261... THE MAKING OF EPHEMERAL REPRODUCTIONS § 261.5 Confidential information. (a) For purposes of this part, “Confidential Information” shall include the statements of account, any information contained therein,...

  19. 37 CFR 384.5 - Confidential information.

    Science.gov (United States)

    2010-07-01

    ... 37 Patents, Trademarks, and Copyrights 1 2010-07-01 2010-07-01 false Confidential information. 384... BUSINESS ESTABLISHMENT SERVICES § 384.5 Confidential information. (a) Definition. For purposes of this part, “Confidential Information” shall include the statements of account, any information contained therein,...

  20. College Confidential: A Field Guide

    Science.gov (United States)

    Hoover, Eric

    2013-01-01

    Day and night the locals chatter. They counsel and console, bicker and rant. Their questions are endless. Though often hopeful, they never stop pounding the drums of worry. This is College Confidential, a vast virtual realm where visitors can find the best and worst of human nature. Here, in moderated discussion forums, people help strangers. They…

  1. Medical confidentiality and patient safety: reporting procedures.

    Science.gov (United States)

    Abbing, Henriette Roscam

    2014-06-01

    Medical confidentiality is of individual and of general interest. Medical confidentiality is not absolute. European countries differ in their legislative approaches of consent for data-sharing and lawful breaches of medical confidentiality. An increase of interference by the legislator with medical confidentiality is noticeable. In The Netherlands for instance this takes the form of new mandatory duties to report resp. of legislation providing for a release of medical confidentiality in specific situations, often under the condition that reporting takes place on the basis of a professional code that includes elements imposed by the legislator (e.g. (suspicion of) child abuse, domestic violence). Legislative interference must not result in the patient loosing trust in healthcare. To avoid erosion of medical confidentiality, (comparative) effectiveness studies and privacy impact assessments are necessary (European and national level). Medical confidentiality should be a subject of permanent education of health personnel.

  2. [Professional confidentiality and the family].

    Science.gov (United States)

    Louvrier, P

    2006-09-01

    The roots of " doctor-patient privilege " or professional confidentiality go back to the Greek island of Cos - Hippocrates' birthplace. The Cos school advocated silence about what the doctor might learn during his visits. In 1868 the Napoleonic Criminal Code sanctioned those who divulged secrets that were entrusted to them by virtue of their profession or estate. The [Belgian medical association's] Code of Professional Ethics extends the bounds of professional confidentiality to include everything that the doctor sees, has knowledge of, learns of, ascertains, discovers, or surprises. Confidentiality as a matter of public policy is relative. It is a tool for the preservation of values, allowing access to health care without fear of divulgation. This leads to possible conflicts of values, conflicts between two duties involving a value that can be protected only to the detriment of another value. The family's rights are specified in Belgium's law on patient's rights, to wit: indirect consultation of the medical file after an individual's death and representation of a patient who is not able to exercise her/his rights her/himself. Silence is nevertheless the rule. The care that an illness calls for generally forces the doctor to make certain disclosures to the patient's family about the state of the illness. This usually goes no farther if the ailment is benign. However, in some sensitive situations (HIV, alcoholism, and divorce), the doctor must bear in mind that the patient may oppose the disclosure of any and all information. A good understanding of the foundations of professional confidentiality, informing the patient, and the doctor's own human qualities should make it possible to get hitherto stalled situations to move forward. The patient remains the doctor's primary focus.

  3. The risks of absolute medical confidentiality.

    Science.gov (United States)

    Crook, M A

    2013-03-01

    Some ethicists argue that patient confidentiality is absolute and thus should never be broken. I examine these arguments that when critically scrutinised, become porous. I will explore the concept of patient confidentiality and argue that although, this is a very important medical and bioethical issue, this needs to be wisely delivered to reduce third party harm or even detriment to the patient. The argument for absolute confidentiality is particularly weak when it comes to genetic information and inherited disease.

  4. [Confidentiality as ethical responsibility and legal duty].

    Science.gov (United States)

    Arroyo Cordero, Tamara

    2009-01-01

    The article analyzes the challenge that the health professionals encounter when trying to protect their patient's confidentiality, considering the increasing demand for globalization of the information. It discusses the importance that confidentiality has for the therapeutic alliance and how the government has protected it throughout time. It identifies weak areas in the protection of confidentiality, especially in the psychiatry field. Finally, it invites the reader to consider the real benefits of sharing patient's information when deciding whether to brake or not the patient's confidentiality.

  5. 13 CFR 120.1060 - Confidentiality of Reports, Risk Ratings and related Confidential Information.

    Science.gov (United States)

    2010-01-01

    ... order prior to disclosure. For purposes of this regulation, “Information Provider” means any contractor... abides by them. Any disclosure of the Report, Risk Rating, or Confidential Information other than as... Confidentiality of Reports, Risk Ratings and related Confidential Information. (a) In general. Reports and other...

  6. 7 CFR 400.702 - Confidentiality of submission and duration of confidentiality.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 6 2010-01-01 2010-01-01 false Confidentiality of submission and duration of confidentiality. 400.702 Section 400.702 Agriculture Regulations of the Department of Agriculture (Continued... Submission of Policies, Provisions of Policies and Rates of Premium § 400.702 Confidentiality of submission...

  7. 7 CFR 1210.607 - Confidential information.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 10 2010-01-01 2010-01-01 false Confidential information. 1210.607 Section 1210.607 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (MARKETING... PROMOTION PLAN Referendum Procedures § 1210.607 Confidential information. All ballots cast and...

  8. 19 CFR 111.24 - Records confidential.

    Science.gov (United States)

    2010-04-01

    ... 19 Customs Duties 1 2010-04-01 2010-04-01 false Records confidential. 111.24 Section 111.24 Customs Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY; DEPARTMENT OF THE TREASURY CUSTOMS BROKERS Duties and Responsibilities of Customs Brokers § 111.24 Records confidential....

  9. 15 CFR 806.5 - Confidentiality.

    Science.gov (United States)

    2010-01-01

    ... 15 Commerce and Foreign Trade 3 2010-01-01 2010-01-01 false Confidentiality. 806.5 Section 806.5 Commerce and Foreign Trade Regulations Relating to Commerce and Foreign Trade (Continued) BUREAU OF ECONOMIC ANALYSIS, DEPARTMENT OF COMMERCE DIRECT INVESTMENT SURVEYS § 806.5 Confidentiality....

  10. 7 CFR 1220.243 - Confidential treatment.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 10 2010-01-01 2010-01-01 false Confidential treatment. 1220.243 Section 1220.243 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (MARKETING... Confidential treatment. Except as otherwise provided in the Act, financial or commercial information that...

  11. 7 CFR 1219.63 - Confidential treatment.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 10 2010-01-01 2010-01-01 false Confidential treatment. 1219.63 Section 1219.63 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (MARKETING... § 1219.63 Confidential treatment. (a) All information obtained from the books, records, or reports...

  12. 7 CFR 54.1033 - Confidential treatment.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 3 2010-01-01 2010-01-01 false Confidential treatment. 54.1033 Section 54.1033 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (Standards... and Poultry Products § 54.1033 Confidential treatment. Every design review specialist...

  13. 7 CFR 1230.82 - Confidential treatment.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 10 2010-01-01 2010-01-01 false Confidential treatment. 1230.82 Section 1230.82 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (MARKETING... § 1230.82 Confidential treatment. All information obtained from the books, records or reports required...

  14. 7 CFR 1218.62 - Confidential treatment.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 10 2010-01-01 2010-01-01 false Confidential treatment. 1218.62 Section 1218.62 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (MARKETING... § 1218.62 Confidential treatment. All information obtained from books, records, or reports under the...

  15. 7 CFR 1212.72 - Confidential treatment.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 10 2010-01-01 2010-01-01 false Confidential treatment. 1212.72 Section 1212.72 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (MARKETING... Confidential treatment. All information obtained from books, records, or reports under the Act and this...

  16. 7 CFR 1205.340 - Confidential treatment.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 10 2010-01-01 2010-01-01 false Confidential treatment. 1205.340 Section 1205.340 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (MARKETING... Cotton Research and Promotion Order Reports, Books, and Records § 1205.340 Confidential treatment....

  17. 7 CFR 1207.352 - Confidential treatment.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 10 2010-01-01 2010-01-01 false Confidential treatment. 1207.352 Section 1207.352 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (MARKETING... PLAN Potato Research and Promotion Plan Reports, Books, and Records § 1207.352 Confidential...

  18. 7 CFR 1221.127 - Confidential treatment.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 10 2010-01-01 2010-01-01 false Confidential treatment. 1221.127 Section 1221.127 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (MARKETING... Confidential treatment. All information obtained from books, records, or reports under the Act and this...

  19. 7 CFR 1206.62 - Confidential treatment.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 10 2010-01-01 2010-01-01 false Confidential treatment. 1206.62 Section 1206.62 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (MARKETING... Confidential treatment. All information obtained from books, records, or reports under the Act and this...

  20. 7 CFR 1250.354 - Confidential treatment.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 10 2010-01-01 2010-01-01 false Confidential treatment. 1250.354 Section 1250.354 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (MARKETING... Research and Promotion Order Reports, Books, and Records § 1250.354 Confidential treatment. (a)...

  1. 7 CFR 1260.203 - Confidential treatment.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 10 2010-01-01 2010-01-01 false Confidential treatment. 1260.203 Section 1260.203 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (MARKETING... Promotion and Research Order Reports, Books and Records § 1260.203 Confidential treatment. All...

  2. 7 CFR 1209.62 - Confidential treatment.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 10 2010-01-01 2010-01-01 false Confidential treatment. 1209.62 Section 1209.62 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (MARKETING..., Books and Records § 1209.62 Confidential treatment. All information obtained from books, records,...

  3. 7 CFR 1150.278 - Confidential treatment.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 9 2010-01-01 2009-01-01 true Confidential treatment. 1150.278 Section 1150.278 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (Marketing... of Milk Producer Organizations § 1150.278 Confidential treatment. All documents and other...

  4. 7 CFR 1160.403 - Confidential treatment.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 9 2010-01-01 2009-01-01 true Confidential treatment. 1160.403 Section 1160.403 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (Marketing... Order Reports, Books and Records § 1160.403 Confidential treatment. (a) All persons, including...

  5. 7 CFR 1150.173 - Confidential treatment.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 9 2010-01-01 2009-01-01 true Confidential treatment. 1150.173 Section 1150.173 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (Marketing... Order Reports, Books and Records § 1150.173 Confidential treatment. All information obtained from...

  6. 7 CFR 1216.62 - Confidential treatment.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 10 2010-01-01 2010-01-01 false Confidential treatment. 1216.62 Section 1216.62 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (MARKETING... Confidential treatment. All information obtained from books, records, or reports under the Act, this...

  7. 7 CFR 1215.62 - Confidential treatment.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 10 2010-01-01 2010-01-01 false Confidential treatment. 1215.62 Section 1215.62 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (MARKETING... Records § 1215.62 Confidential treatment. (a) All information obtained from books, records, or...

  8. 42 CFR 50.310 - Confidentiality.

    Science.gov (United States)

    2010-10-01

    ... 42 Public Health 1 2010-10-01 2010-10-01 false Confidentiality. 50.310 Section 50.310 Public Health PUBLIC HEALTH SERVICE, DEPARTMENT OF HEALTH AND HUMAN SERVICES GRANTS POLICIES OF GENERAL... § 50.310 Confidentiality. Information in the records or in the possession of programs or projects which...

  9. 8 CFR 244.16 - Confidentiality.

    Science.gov (United States)

    2010-01-01

    ... 8 Aliens and Nationality 1 2010-01-01 2010-01-01 false Confidentiality. 244.16 Section 244.16 Aliens and Nationality DEPARTMENT OF HOMELAND SECURITY IMMIGRATION REGULATIONS TEMPORARY PROTECTED STATUS FOR NATIONALS OF DESIGNATED STATES § 244.16 Confidentiality. The information contained in the...

  10. 7 CFR 1280.227 - Confidentiality.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 10 2010-01-01 2010-01-01 false Confidentiality. 1280.227 Section 1280.227 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (MARKETING... Confidentiality. All information obtained from books, records, or reports under the Act, this subpart, and the...

  11. 40 CFR 403.14 - Confidentiality.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 28 2010-07-01 2010-07-01 true Confidentiality. 403.14 Section 403.14 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) EFFLUENT GUIDELINES AND STANDARDS GENERAL PRE-TREAT-MENT REGULATIONS FOR EXIST-ING AND NEW SOURCES OF POLLUTION § 403.14 Confidentiality. (a...

  12. 42 CFR 456.213 - Confidentiality.

    Science.gov (United States)

    2010-10-01

    ... 42 Public Health 4 2010-10-01 2010-10-01 false Confidentiality. 456.213 Section 456.213 Public Health CENTERS FOR MEDICARE & MEDICAID SERVICES, DEPARTMENT OF HEALTH AND HUMAN SERVICES (CONTINUED...: Informational Requirements § 456.213 Confidentiality. The UR plan must provide that the identities of individual...

  13. 46 CFR 530.4 - Confidentiality.

    Science.gov (United States)

    2010-10-01

    ... 46 Shipping 9 2010-10-01 2010-10-01 false Confidentiality. 530.4 Section 530.4 Shipping FEDERAL MARITIME COMMISSION REGULATIONS AFFECTING OCEAN SHIPPING IN FOREIGN COMMERCE SERVICE CONTRACTS General Provisions § 530.4 Confidentiality. All service contracts and amendments to service contracts filed with the...

  14. 15 CFR 701.5 - Confidentiality.

    Science.gov (United States)

    2010-01-01

    ... 15 Commerce and Foreign Trade 2 2010-01-01 2010-01-01 false Confidentiality. 701.5 Section 701.5 Commerce and Foreign Trade Regulations Relating to Commerce and Foreign Trade (Continued) BUREAU OF... FIRMS § 701.5 Confidentiality. (a) As provided by § 309(c) of the Defense Production Act of 1950, as...

  15. 29 CFR 1601.22 - Confidentiality.

    Science.gov (United States)

    2010-07-01

    ... 29 Labor 4 2010-07-01 2010-07-01 false Confidentiality. 1601.22 Section 1601.22 Labor Regulations Relating to Labor (Continued) EQUAL EMPLOYMENT OPPORTUNITY COMMISSION PROCEDURAL REGULATIONS Procedure for... Confidentiality. Neither a charge, nor information obtained during the investigation of a charge of employment...

  16. 29 CFR 4043.8 - Confidentiality.

    Science.gov (United States)

    2010-07-01

    ... 29 Labor 9 2010-07-01 2010-07-01 false Confidentiality. 4043.8 Section 4043.8 Labor Regulations Relating to Labor (Continued) PENSION BENEFIT GUARANTY CORPORATION PLAN TERMINATIONS REPORTABLE EVENTS AND CERTAIN OTHER NOTIFICATION REQUIREMENTS General Provisions § 4043.8 Confidentiality. In accordance with...

  17. 21 CFR 821.55 - Confidentiality.

    Science.gov (United States)

    2010-04-01

    ... 21 Food and Drugs 8 2010-04-01 2010-04-01 false Confidentiality. 821.55 Section 821.55 Food and Drugs FOOD AND DRUG ADMINISTRATION, DEPARTMENT OF HEALTH AND HUMAN SERVICES (CONTINUED) MEDICAL DEVICES MEDICAL DEVICE TRACKING REQUIREMENTS Records and Inspections § 821.55 Confidentiality. (a) Any patient...

  18. 28 CFR 0.29f - Confidentiality.

    Science.gov (United States)

    2010-07-01

    ... 28 Judicial Administration 1 2010-07-01 2010-07-01 false Confidentiality. 0.29f Section 0.29f Judicial Administration DEPARTMENT OF JUSTICE ORGANIZATION OF THE DEPARTMENT OF JUSTICE 4-Office of the Inspector General § 0.29f Confidentiality. The Inspector General shall not, during the pendency of an...

  19. 19 CFR 354.17 - Confidentiality.

    Science.gov (United States)

    2010-04-01

    ... 19 Customs Duties 3 2010-04-01 2010-04-01 false Confidentiality. 354.17 Section 354.17 Customs Duties INTERNATIONAL TRADE ADMINISTRATION, DEPARTMENT OF COMMERCE PROCEDURES FOR IMPOSING SANCTIONS FOR VIOLATION OF AN ANTIDUMPING OR COUNTERVAILING DUTY ADMINISTRATIVE PROTECTIVE ORDER § 354.17 Confidentiality...

  20. 36 CFR 906.10 - Confidentiality.

    Science.gov (United States)

    2010-07-01

    ... 36 Parks, Forests, and Public Property 3 2010-07-01 2010-07-01 false Confidentiality. 906.10 Section 906.10 Parks, Forests, and Public Property PENNSYLVANIA AVENUE DEVELOPMENT CORPORATION AFFIRMATIVE ACTION POLICY AND PROCEDURE Development Program § 906.10 Confidentiality. All information submitted to...

  1. 46 CFR 550.104 - Confidentiality.

    Science.gov (United States)

    2010-10-01

    ... 46 Shipping 9 2010-10-01 2010-10-01 false Confidentiality. 550.104 Section 550.104 Shipping FEDERAL MARITIME COMMISSION REGULATIONS AND ACTIONS TO ADDRESS RESTRICTIVE FOREIGN MARITIME PRACTICES... General Provisions § 550.104 Confidentiality. Notwithstanding any other law, the Commission may refuse to...

  2. 7 CFR 1425.5 - Confidentiality.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 10 2010-01-01 2010-01-01 false Confidentiality. 1425.5 Section 1425.5 Agriculture Regulations of the Department of Agriculture (Continued) COMMODITY CREDIT CORPORATION, DEPARTMENT OF AGRICULTURE LOANS, PURCHASES, AND OTHER OPERATIONS COOPERATIVE MARKETING ASSOCIATIONS § 1425.5 Confidentiality...

  3. 42 CFR 456.413 - Confidentiality.

    Science.gov (United States)

    2010-10-01

    ... 42 Public Health 4 2010-10-01 2010-10-01 false Confidentiality. 456.413 Section 456.413 Public Health CENTERS FOR MEDICARE & MEDICAID SERVICES, DEPARTMENT OF HEALTH AND HUMAN SERVICES (CONTINUED...: Informational Requirements § 456.413 Confidentiality. The UR plan must provide that the identities of individual...

  4. 42 CFR 67.104 - Confidentiality.

    Science.gov (United States)

    2010-10-01

    ... 42 Public Health 1 2010-10-01 2010-10-01 false Confidentiality. 67.104 Section 67.104 Public Health PUBLIC HEALTH SERVICE, DEPARTMENT OF HEALTH AND HUMAN SERVICES FELLOWSHIPS, INTERNSHIPS, TRAINING... Services Research, Evaluation, Demonstration, and Dissemination Projects § 67.104 Confidentiality...

  5. 7 CFR 1250.537 - Confidentiality.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 10 2010-01-01 2010-01-01 false Confidentiality. 1250.537 Section 1250.537 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (MARKETING... and Regulations Records § 1250.537 Confidentiality. All information obtained by officers and employees...

  6. 31 CFR 129.5 - Confidentiality.

    Science.gov (United States)

    2010-07-01

    ... 31 Money and Finance: Treasury 1 2010-07-01 2010-07-01 false Confidentiality. 129.5 Section 129.5 Money and Finance: Treasury Regulations Relating to Money and Finance PORTFOLIO INVESTMENT SURVEY REPORTING § 129.5 Confidentiality. (a) Information collected pursuant to the Act will be kept in confidence...

  7. 10 CFR 431.407 - Confidentiality.

    Science.gov (United States)

    2010-01-01

    ... 10 Energy 3 2010-01-01 2010-01-01 false Confidentiality. 431.407 Section 431.407 Energy DEPARTMENT OF ENERGY ENERGY CONSERVATION ENERGY EFFICIENCY PROGRAM FOR CERTAIN COMMERCIAL AND INDUSTRIAL EQUIPMENT General Provisions § 431.407 Confidentiality. Pursuant to the provisions of 10 CFR 1004.11, any...

  8. 19 CFR 356.29 - Confidentiality.

    Science.gov (United States)

    2010-04-01

    ... 19 Customs Duties 3 2010-04-01 2010-04-01 false Confidentiality. 356.29 Section 356.29 Customs Duties INTERNATIONAL TRADE ADMINISTRATION, DEPARTMENT OF COMMERCE PROCEDURES AND RULES FOR IMPLEMENTING... Undertaking § 356.29 Confidentiality. (a) All proceedings involving allegations of a violation of a protective...

  9. 42 CFR 136a.57 - Confidentiality.

    Science.gov (United States)

    2010-10-01

    ... 42 Public Health 1 2010-10-01 2010-10-01 false Confidentiality. 136a.57 Section 136a.57 Public Health PUBLIC HEALTH SERVICE, DEPARTMENT OF HEALTH AND HUMAN SERVICES INDIAN HEALTH SERVICE, DEPARTMENT... Service Facilities and Indian Health Service Programs § 136a.57 Confidentiality. Information which is...

  10. 42 CFR 438.224 - Confidentiality.

    Science.gov (United States)

    2010-10-01

    ... 42 Public Health 4 2010-10-01 2010-10-01 false Confidentiality. 438.224 Section 438.224 Public Health CENTERS FOR MEDICARE & MEDICAID SERVICES, DEPARTMENT OF HEALTH AND HUMAN SERVICES (CONTINUED... Operation Standards § 438.224 Confidentiality. The State must ensure, through its contracts, that...

  11. 45 CFR 1340.20 - Confidentiality.

    Science.gov (United States)

    2010-10-01

    ... 45 Public Welfare 4 2010-10-01 2010-10-01 false Confidentiality. 1340.20 Section 1340.20 Public Welfare Regulations Relating to Public Welfare (Continued) OFFICE OF HUMAN DEVELOPMENT SERVICES... Grants and Contracts § 1340.20 Confidentiality. All projects and programs supported under the Act must...

  12. 7 CFR 1280.634 - Confidentiality.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 10 2010-01-01 2010-01-01 false Confidentiality. 1280.634 Section 1280.634 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (MARKETING... INFORMATION ORDER Procedures To Request a Referendum Definitions § 1280.634 Confidentiality. The names of...

  13. 31 CFR 800.702 - Confidentiality.

    Science.gov (United States)

    2010-07-01

    ... 31 Money and Finance: Treasury 3 2010-07-01 2010-07-01 false Confidentiality. 800.702 Section 800.702 Money and Finance: Treasury Regulations Relating to Money and Finance (Continued) OFFICE OF... TAKEOVERS BY FOREIGN PERSONS Provision and Handling of Information § 800.702 Confidentiality. (a) Any...

  14. 42 CFR 136.57 - Confidentiality.

    Science.gov (United States)

    2010-10-01

    ... 42 Public Health 1 2010-10-01 2010-10-01 false Confidentiality. 136.57 Section 136.57 Public Health PUBLIC HEALTH SERVICE, DEPARTMENT OF HEALTH AND HUMAN SERVICES INDIAN HEALTH SERVICE, DEPARTMENT... Service Facilities and Indian Health Service Programs § 136.57 Confidentiality. Information which is...

  15. 40 CFR 750.16 - Confidentiality.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 30 2010-07-01 2010-07-01 false Confidentiality. 750.16 Section 750.16 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) TOXIC SUBSTANCES CONTROL ACT PROCEDURES... Manufacturing Exemptions § 750.16 Confidentiality. The Agency encourages the submission of nonconfidential...

  16. 18 CFR 270.506 - Confidentiality.

    Science.gov (United States)

    2010-04-01

    ... 18 Conservation of Power and Water Resources 1 2010-04-01 2010-04-01 false Confidentiality. 270.506 Section 270.506 Conservation of Power and Water Resources FEDERAL ENERGY REGULATORY COMMISSION... Commission Review of Jurisdictional Agency Determinations § 270.506 Confidentiality. (a) Except as provided...

  17. 16 CFR 1019.8 - Confidentiality.

    Science.gov (United States)

    2010-01-01

    ... 16 Commercial Practices 2 2010-01-01 2010-01-01 false Confidentiality. 1019.8 Section 1019.8 Commercial Practices CONSUMER PRODUCT SAFETY COMMISSION GENERAL EXPORT OF NONCOMPLYING, MISBRANDED, OR BANNED PRODUCTS Procedures for Export of Noncomplying, Misbranded, or Banned Products § 1019.8 Confidentiality. If...

  18. 42 CFR 456.113 - Confidentiality.

    Science.gov (United States)

    2010-10-01

    ... 42 Public Health 4 2010-10-01 2010-10-01 false Confidentiality. 456.113 Section 456.113 Public Health CENTERS FOR MEDICARE & MEDICAID SERVICES, DEPARTMENT OF HEALTH AND HUMAN SERVICES (CONTINUED... Requirements § 456.113 Confidentiality. The UR plan must provide that the identities of individual recipients...

  19. 10 CFR 430.75 - Confidentiality.

    Science.gov (United States)

    2010-01-01

    ... 10 Energy 3 2010-01-01 2010-01-01 false Confidentiality. 430.75 Section 430.75 Energy DEPARTMENT OF ENERGY ENERGY CONSERVATION ENERGY CONSERVATION PROGRAM FOR CONSUMER PRODUCTS Certification and Enforcement § 430.75 Confidentiality. Pursuant to the provisions of 10 CFR 1004.11, any person submitting...

  20. 8 CFR 1244.16 - Confidentiality.

    Science.gov (United States)

    2010-01-01

    ... 8 Aliens and Nationality 1 2010-01-01 2010-01-01 false Confidentiality. 1244.16 Section 1244.16 Aliens and Nationality EXECUTIVE OFFICE FOR IMMIGRATION REVIEW, DEPARTMENT OF JUSTICE IMMIGRATION REGULATIONS TEMPORARY PROTECTED STATUS FOR NATIONALS OF DESIGNATED STATES § 1244.16 Confidentiality. The...

  1. 40 CFR 750.36 - Confidentiality.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 30 2010-07-01 2010-07-01 false Confidentiality. 750.36 Section 750.36 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) TOXIC SUBSTANCES CONTROL ACT PROCEDURES... Processing and Distribution in Commerce Exemptions § 750.36 Confidentiality. EPA encourages the submission of...

  2. 8 CFR 245a.21 - Confidentiality.

    Science.gov (United States)

    2010-01-01

    ... 8 Aliens and Nationality 1 2010-01-01 2010-01-01 false Confidentiality. 245a.21 Section 245a.21 Aliens and Nationality DEPARTMENT OF HOMELAND SECURITY IMMIGRATION REGULATIONS ADJUSTMENT OF STATUS TO... Confidentiality. (a) No person other than a sworn officer or employee of the Department of Justice or bureau or...

  3. 7 CFR 1220.624 - Confidentiality.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 10 2010-01-01 2010-01-01 false Confidentiality. 1220.624 Section 1220.624 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (MARKETING... CONSUMER INFORMATION Procedures To Request a Referendum Definitions § 1220.624 Confidentiality. The names...

  4. 49 CFR 537.12 - Confidential information.

    Science.gov (United States)

    2010-10-01

    ... ADMINISTRATION, DEPARTMENT OF TRANSPORTATION AUTOMOTIVE FUEL ECONOMY REPORTS § 537.12 Confidential information. (a) Information made available under § 537.11 for public inspection does not include information for... 49 Transportation 6 2010-10-01 2010-10-01 false Confidential information. 537.12 Section...

  5. 7 CFR 930.73 - Confidential information.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 8 2010-01-01 2010-01-01 false Confidential information. 930.73 Section 930.73... Handling Reports and Records § 930.73 Confidential information. All reports and records furnished or submitted by handlers to the Board and its authorized agents which include data or information...

  6. 7 CFR 984.79 - Confidential information.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 8 2010-01-01 2010-01-01 false Confidential information. 984.79 Section 984.79... Regulating Handling Reports, Books, and Other Records § 984.79 Confidential information. All reports and records submitted by handlers to the Board, which include data or information constituting a trade...

  7. 7 CFR 996.72 - Confidential information.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 8 2010-01-01 2010-01-01 false Confidential information. 996.72 Section 996.72... Confidential information. All reports and records furnished or submitted by handlers and importers to USDA which include data or information constituting a trade secret or disclosing a trade position,...

  8. 7 CFR 993.71 - Confidential information.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 8 2010-01-01 2010-01-01 false Confidential information. 993.71 Section 993.71... CALIFORNIA Order Regulating Handling Reports and Books and Other Records § 993.71 Confidential information... information constituting a trade secret or disclosing of the trade position, financial condition, or...

  9. 7 CFR 28.960 - Confidential information.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 2 2010-01-01 2010-01-01 false Confidential information. 28.960 Section 28.960 Agriculture Regulations of the Department of Agriculture AGRICULTURAL MARKETING SERVICE (Standards... Tests § 28.960 Confidential information. No information concerning individual tests under...

  10. 7 CFR 989.75 - Confidential information.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 8 2010-01-01 2010-01-01 false Confidential information. 989.75 Section 989.75... GROWN IN CALIFORNIA Order Regulating Handling Reports and Records § 989.75 Confidential information. All... to no person, except the Secretary upon request therefor, data or information obtained or...

  11. 37 CFR 380.5 - Confidential information.

    Science.gov (United States)

    2010-07-01

    ... 37 Patents, Trademarks, and Copyrights 1 2010-07-01 2010-07-01 false Confidential information. 380... information. (a) Definition. For purposes of this part, “Confidential Information” shall include the statements of account and any information contained therein, including the amount of royalty payments,...

  12. 7 CFR 900.309 - Confidential information.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 8 2010-01-01 2010-01-01 false Confidential information. 900.309 Section 900.309... to Agricultural Marketing Agreement Act of 1937, as Amended § 900.309 Confidential information. The... information furnished to, compiled by, or in the possession of the referendum agent, shall be regarded...

  13. 7 CFR 900.407 - Confidential information.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 8 2010-01-01 2010-01-01 false Confidential information. 900.407 Section 900.407... to the Agricultural Marketing Agreement Act of 1937, as Amended § 900.407 Confidential information... voted or the manner in which any person voted) and all information furnished to, compiled by, or...

  14. 7 CFR 900.352 - Confidential information.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 8 2010-01-01 2010-01-01 false Confidential information. 900.352 Section 900.352... Determining the Qualification of Cooperative Milk Marketing Associations § 900.352 Confidential information. The documents and other information submitted by an applicant association and otherwise obtained...

  15. 7 CFR 982.70 - Confidential information.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 8 2010-01-01 2010-01-01 false Confidential information. 982.70 Section 982.70... WASHINGTON Order Regulating Handling Records and Reports § 982.70 Confidential information. All reports and records furnished or submitted by handlers to the Board, which include data or information constituting...

  16. 7 CFR 929.65 - Confidential information.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 8 2010-01-01 2010-01-01 false Confidential information. 929.65 Section 929.65... Confidential information. All reports and records furnished or submitted by handlers to the committee and its authorized agents which include data or information constituting a trade secret or disclosing the...

  17. 7 CFR 932.63 - Confidential information.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 8 2010-01-01 2010-01-01 false Confidential information. 932.63 Section 932.63... Regulating Handling Reports and Records § 932.63 Confidential information. All reports and information... any person, other than the Secretary upon request therefor, data, or information obtained or...

  18. 37 CFR 262.5 - Confidential information.

    Science.gov (United States)

    2010-07-01

    ... 37 Patents, Trademarks, and Copyrights 1 2010-07-01 2010-07-01 false Confidential information. 262... information. (a) Definition. For purposes of this part, “Confidential Information” shall include the statements of account, any information contained therein, including the amount of royalty payments, and...

  19. Confidentiality in psychotherapy: Some of actual dilemmas

    Directory of Open Access Journals (Sweden)

    Vukosavljević-Gvozden Tatjana D.

    2004-01-01

    Full Text Available The article examines confidentiality principle from different perspectives: as the factor which plays a very important part in developing a productive therapist-client relationship, ethical and, in many countries, legal issue. Ways to maintain confidentiality in therapy are stated, as well as situations in which it is inevitably limited. Three dilemmas concerning confidentiality are explained and discussed. The first is when one should speak and when one should be silent and what we should do when we are in two minds. The second is whether the client should be informed about confidentiality limitations at the very beginning, or when the need arises during the treatment. The third is whether confidentiality limitation (when a client poses a threat to himself or to the society should be legally regulated, as it is being done in many western countries.

  20. Sensors for Desert Surveillance

    Directory of Open Access Journals (Sweden)

    B. S. Chauhan

    2005-10-01

    Full Text Available Various types of sensors-visible, passive night vision, infrared, synthetic aperture radar, etc can be used for desert surveillance. The surveillance capability of these sensors depends to a large extent, on various atmospheric effects, viz., absorption, scattering, aerosol, turbulence, and optical mirage. In this paper, effects of various atmospheric phenomena on the transmission of signals, merits and demerits of different means of surveillance under desert environmental conditions are discussed. Advanced surveillance techniques, ie, multisensor fusion, multi and hyperspectral imaging, having special significance for desert surveillance, have also been discussed.

  1. Summary of the 2009-2010 Season at the Mars Desert Research Station

    Science.gov (United States)

    Nelson, J. V.; Westenberg, A.

    2011-03-01

    The Mars Desert Research Station in Hanksville, Utah is the most accessible, cost-effective martian analog station available. Each year the station is host to dozens of research projects from disciplines including biology, engineering, geology, hydrology, and psychology.

  2. Delivery of confidential care to adolescent males.

    Science.gov (United States)

    Rubin, Susan E; McKee, M Diane; Campos, Giselle; O'Sullivan, Lucia F

    2010-01-01

    Primary care providers' (PCPs') provision of time alone with an adolescent without the parents present (henceforth referred to as "confidential care") has a significant impact on adolescents' disclosure of risk behavior. To inform the development of interventions to improve PCPs' delivery of confidential care, we obtained the perspectives of adolescent males and their mothers about the health care concerns of adolescent males and the provision of confidential care. This focus-group study (5 groups: 2 with adolescent males and 2 with mothers) used standard qualitative methods for analysis. We recruited mother/son dyads who had been seen at urban primary care practices. Adolescents' health concerns focused on pregnancy and sexually transmitted infections; mothers took a broader view. Many adolescents felt that PCPs often delivered safe sex counseling in a superficial, impersonal manner that did not add much value to what they already knew, and that their PCP's principal role was limited to performing sexually transmitted infection testing. Though adolescents cited a number of advantages of confidential care and disclosure, they expressed some general mistrust in PCPs and concerns about limits of confidentiality. Rapport and relationship building with their PCP are key elements to adolescents' comfort and increased disclosure. Overall, mothers viewed confidential care positively, especially in the context of continuity of care, but many felt excluded. To increase adolescents' perception of the relevance of primary care and to foster disclosure during health encounters, our participants described the critical nature of a strong doctor-patient relationship and positive physician demeanor and personalized messages, especially in the context of a continuity relationship. Regular, routine inclusion of confidential care time starting early in adolescence, as well as discussion of the purpose and limitations of confidentiality with parents and adolescents, could lead to

  3. 44 CFR 295.36 - Confidentiality of information.

    Science.gov (United States)

    2010-10-01

    ... 44 Emergency Management and Assistance 1 2010-10-01 2010-10-01 false Confidentiality of... § 295.36 Confidentiality of information. Confidential information submitted by individual Claimants is... the availability of confidentiality protection under exemptions to the Freedom of Information Act and...

  4. 40 CFR 82.182 - Confidentiality of data.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 17 2010-07-01 2010-07-01 false Confidentiality of data. 82.182... Confidentiality of data. (a) Clean Air Act provisions. Anyone submitting information must assert a claim of confidentiality at the time of submission for any data they wish to have treated as confidential business...

  5. 46 CFR 221.79 - Request for confidential treatment.

    Science.gov (United States)

    2010-10-01

    ... 46 Shipping 8 2010-10-01 2010-10-01 false Request for confidential treatment. 221.79 Section 221... INTERESTS Civil Penalties § 221.79 Request for confidential treatment. (a) In addition to information treated as confidential under § 221.77 of this subpart, a request for confidential treatment of a document...

  6. 49 CFR 209.11 - Request for confidential treatment.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 4 2010-10-01 2010-10-01 false Request for confidential treatment. 209.11 Section... confidential treatment. (a) This section governs the procedures for requesting confidential treatment of any... confidential treatment with respect to a document or portion thereof may be made on the basis that the...

  7. 29 CFR 90.33 - Confidential business information.

    Science.gov (United States)

    2010-07-01

    ... of information submitted in confidence. Business information which is to be treated as confidential... 29 Labor 1 2010-07-01 2010-07-01 true Confidential business information. 90.33 Section 90.33 Labor... General Provisions § 90.33 Confidential business information. (a) Definition. Confidential business...

  8. Confidential benchmarking based on multiparty computation

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre; Damgård, Kasper Lyneborg; Nielsen, Kurt

    We report on the design and implementation of a system that uses multiparty computation to enable banks to benchmark their customers' confidential performance data against a large representative set of confidential performance data from a consultancy house. The system ensures that both the banks......' and the consultancy house's data stays confidential, the banks as clients learn nothing but the computed benchmarking score. In the concrete business application, the developed prototype help Danish banks to find the most efficient customers among a large and challenging group of agricultural customers with too much...

  9. What do Islamic institutional fatwas say about medical and research confidentiality and breach of confidentiality?

    Science.gov (United States)

    Alahmad, Ghiath; Dierickx, Kris

    2012-08-01

    Protecting confidentiality is an essential value in all human relationships, no less in medical practice and research.(1) Doctor-patient and researcher-participant relationships are built on trust and on the understanding those patients' secrets will not be disclosed.(2) However, this confidentiality can be breached in some situations where it is necessary to meet a strong conflicting duty.(3) Confidentiality, in a general sense, has received much interest in Islamic resources including the Qur'an, Sunnah and juristic writings. However, medical and research confidentiality have not been explored deeply. There are few fatwas about the issue, despite an increased effort by both individuals and Islamic medical organizations to use these institutional fatwas in their research. Infringements on confidentiality make up a significant portion of institutional fatwas, yet they have never been thoroughly investigated. Moreover, the efforts of organizations and authors in this regard still require further exploration, especially on the issue of research confidentiality. In this article, we explore medical and research confidentiality and potential conflicts with this practice as a result of fatwas released by international, regional, and national Islamic Sunni juristic councils. We discuss how these fatwas affect research and publication by Muslim doctors, researchers, and Islamic medical organizations. We argue that more specialized fatwas are needed to clarify Islamic juristic views about medical and research confidentiality, especially the circumstances in which infringements on this confidentiality are justified. © 2012 Blackwell Publishing Ltd.

  10. Law and ethics in conflict over confidentiality?

    Science.gov (United States)

    Dickens, B M; Cook, R J

    2000-09-01

    Ethical principles that require the preservation of patients' confidential information are reinforced by principles found in several areas of law, such as law on contracts, negligence, defamation and fiduciary duty. However, laws sometimes compel disclosures of medical confidences, and more often may justify or excuse disclosures. Legally contentious issues concern patients' confidences regarding possible unlawful conduct, such as pregnancy termination, and the risk of spread of HIV and other infections. This article reviews the various legal bases of the duty of confidentiality, and legal challenges to the ethical obligation of non-disclosure. It addresses the justifications and limits of exchange of patients' health information among healthcare professionals and trainees, and considers legally recognized limits of confidential duties, and the scope of legitimate disclosure. An underlying theme is how to determine whether physicians are ethically justified in employing the discretion the law sometimes affords them to breach patients' expectations of confidentiality.

  11. 15 CFR 705.6 - Confidential information.

    Science.gov (United States)

    2010-01-01

    ...) BUREAU OF INDUSTRY AND SECURITY, DEPARTMENT OF COMMERCE NATIONAL SECURITY INDUSTRIAL BASE REGULATIONS EFFECT OF IMPORTED ARTICLES ON THE NATIONAL SECURITY § 705.6 Confidential information. (a) Any... the investigation that would disclose national security classified information or business...

  12. Biosafety data as confidential business information.

    Directory of Open Access Journals (Sweden)

    Kaare M Nielsen

    Full Text Available Removal of confidentiality claims on biosafety data is necessary to adhere to standard scientific procedures of quality assurance, to increase transparency, to minimize impacts of conflicts of interests, and ultimately to improve public confidence in GMOs.

  13. Medical confidentiality and the competent patient.

    Science.gov (United States)

    Niveau, Gerard; Burkhardt, Sandra; Chiesa, Sarah

    2013-11-01

    Confidentiality is both a fundamental principle of medical ethics and a legal obligation. In exceptional situations not covered by legal provisions, doctors may want to waive confidentiality against the wishes of the patient. Swiss law calls for an authority to rule on such cases. In the Canton of Geneva this authority is the Commission for Professional Confidentiality. This paper concerns 41 cases managed by this commission. The study shows that the majority of these requests to the Commission concern the reporting of patients who are not incompetent but need the protection of a legal guardianship. In rare cases, there is another interest higher than confidentiality: public order or functioning of justice. The Commission found that the measure requested was justified in the majority of cases brought before it. This study focuses on exceptional cases but it throws into relief the conflict between the principle of autonomy on the one hand and the need for patient protection and social justice on the other.

  14. Protecting Respondent Confidentiality in Qualitative Research

    Science.gov (United States)

    Kaiser, Karen

    2009-01-01

    For qualitative researchers, maintaining respondent confidentiality while presenting rich, detailed accounts of social life presents unique challenges. These challenges are not adequately addressed in the literature on research ethics and research methods. Using an example from a study of breast cancer survivors, I argue that by carefully considering the audience for one’s research and by re-envisioning the informed consent process, qualitative researchers can avoid confidentiality dilemmas that might otherwise lead them not to report rich, detailed data. PMID:19843971

  15. Conditional shared confidentiality in mental health care.

    Science.gov (United States)

    Liégeois, Axel; Eneman, Marc

    2015-05-01

    Because of the development towards community care, care providers not only exchange information in a team, but increasingly also in networks. This is a challenge to confidentiality. The ethical question is how care providers can keep information about the care receiver confidential, whilst at the same time exchanging information about that care receiver in a team or network? Can shared confidentiality be extended from a team to a network? To clarify this question, the article refers to the advice of an expert ethics committee in mental health care. The advice regards exchange of information in a network as a further step in enhancing collaboration among care providers. Therefore, the good and evident practice of shared confidentiality in a team can be extended to a network if the same conditions are met. First, the care providers participate in a clearly defined and identifiable team or network. Secondly, they have a shared care responsibility. Thirdly, they have a duty of confidentiality. Fourth, they dialogue with the care receiver and obtain his or her consent. Finally, they apply the filter of relevance. Hence, conditional shared confidentiality is an ethical justification for the exchange of information in a team or network.

  16. Ecoregion sections of California deserts

    Data.gov (United States)

    U.S. Geological Survey, Department of the Interior — The dataset delineates ecological sections within California deserts. These deserts occupy the southeastern portion of California and include two ecoregional...

  17. Autonomy and confidentiality: patients' perspectives.

    Science.gov (United States)

    Abdalrahman, Ihab Babiker; Osman, Ahmed Mohammed Abdulrahman; Ali, Baraah Mohammed Adham; Mustafa, El Imam ElGhazali Seddik Mohamed; Ali, Eman Esam Hassan; Muneer, Mohamed Siddig Eltayeb

    2015-04-01

    Little is known about patients' opinions about their rights in autonomy and confidentiality concerning their illness and this study was conducted to assess it. This multi-centred, cross-sectional study was conducted in outpatient clinics in Khartoum, Sudan. It was delivered to 295 respondents. Data were managed using Microsoft Excel 2010 and SPSS. Eighty-five percent of the patients wanted to know about their conditions, of whom 17% wanted to choose their treatment and 29% believed they had the right to refuse treatment. Most of the respondents would not wish to hide information from their doctors. There was a wide variation at the rate of patients hiding information from their relatives, depending on their diagnosis (HIV 90%, malignancy 16.7% and tuberculosis 0%.) Respondents want to choose their treating doctor, know about their diseases, be consulted before a procedure. They would like to leave technical issues to their treating doctors without jeopardising their own rights. © The Author(s) 2014 Reprints and permissions: sagepub.co.uk/journalsPermissions.nav.

  18. Journeying the Redshift Desert

    CERN Document Server

    Renzini, Alvio

    2009-01-01

    The cosmic star formation rate, AGN activity, galaxy growth, mass assembly and morphological differentiation all culminate at redshift $\\sim 2$. Yet, the redshift interval $1.4\\lsim z\\lsim 3$ is harder to explore than the closer and the more distant Universe. In spite of so much action taking place in this spacetime portion of the Universe, it has been dubbed the ``Redshift Desert'', as if very little was happening within its boundaries. The difficulties encountered in properly mapping the galaxy populations inhabiting the Desert are illustrated in this paper, along with some possible remedy.

  19. Confidentiality and access to sexual health services.

    Science.gov (United States)

    Ryder, Nathan; McNulty, Anna M

    2009-06-01

    Confidentiality concerns are often described as barriers to seeking sexual health care. There has been little research describing the relative importance of confidentiality to clients of sexual health clinics, and whether members of high-risk groups have greater concerns. This study aimed to determine the importance of confidentiality and anonymity to clients of a public sexual health clinic, and determine associations with gender and sexuality. A self-administered questionnaire was offered to consecutive new English-speaking clients in October and November 2007. Participants were asked to describe the reasons for presenting, likelihood of disclosing identifying information, and concern should specific people and agencies become aware of their attendance. Of 350 eligible clients, 270 (77%) participated in the survey. Expert care was included in the top three reasons for choosing a sexual health clinic rather than a general practitioner by over half of participants, while confidentiality and cost were each included in the top three reasons by one-third of respondents respectively. Over 90% of clients reported they were likely to give accurate identifying information to the clinic. Participants were comfortable with disclosure of information to other health-care workers but became increasingly unwilling for information to be shared with services not directly involved in their care. Overall there were few associations with gender or sexuality. Clients choose to attend our clinic for a variety of reasons, with confidentiality and anonymity being of lesser importance than competence and cost. Confidentiality is important to the majority of clients, whereas few desire anonymity. Most clients would accept information being shared with other health services, suggesting that confidentiality may not be a barrier to the use of electronic health records in sexual health clinics.

  20. Confidential benchmarking based on multiparty computation

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre; Damgård, Kasper Lyneborg; Nielsen, Kurt;

    We report on the design and implementation of a system that uses multiparty computation to enable banks to benchmark their customers' confidential performance data against a large representative set of confidential performance data from a consultancy house. The system ensures that both the banks......' and the consultancy house's data stays confidential, the banks as clients learn nothing but the computed benchmarking score. In the concrete business application, the developed prototype help Danish banks to find the most efficient customers among a large and challenging group of agricultural customers with too much...... debt. We propose a model based on linear programming for doing the benchmarking and implement it using the SPDZ protocol by Damgård et al., which we modify using a new idea that allows clients to supply data and get output without having to participate in the preprocessing phase and without keeping...

  1. [Children's medical records, HIV and confidentiality: practices and attitudes of physicians and families].

    Science.gov (United States)

    Suesser, P; Letrait, S; Welniarz, B

    2001-12-01

    The aim of this study is to describe the attitudes and practices of doctors and families regarding the use of the individual child health journal, especially by exploring the contradictions between the validity and confidentiality of its content, in particular with respect to HIV infection. In order to accomplish this, both doctors (N = 380) and families (N = 242) were questioned, most of them living and working in Seine-Saint-Denis, the metropolitan district with the third highest prevalence rate of HIV. The findings indicate that: most families are not always prepared to make sure that the confidential use of the child's health journal is maintained, and even less so those affected by HIV; doctors refrain from recording certain psychological and even medical data in the child health journal for fear of the information's misuse within the social sphere; doctors as well as families expressed their preoccupations concerning the confidentiality of the child health journal, essentially with respect to its content and how it is used in various contexts. A number of possibilities are proposed by the study's participants: establish a vaccination record separate from the child health journal, educate parents on how to maintain its confidential use and train the health workers to this end.

  2. Client confidentiality: Perspectives of students in a healthcare ...

    African Journals Online (AJOL)

    [4] The legal approach to confidentiality is based on an individualistic perception of patient ... Although students understand what respecting confidentiality means, as laid .... practice in order to build trust and strong interpersonal relationships.

  3. What Does Confidentiality Inside The Arbitration Mean?

    Directory of Open Access Journals (Sweden)

    Diana - Loredana HOGAŞ

    2014-06-01

    Full Text Available The principle of confidentiality is one of the highlights of the institution of arbitration. Its application is not uniform in the national legislation. The parties to an arbitration agreement may experience various unpleasant situations such as unwanted disclosure of issues they wanted to keep secret, although they had relied on the fact that the private nature of arbitration would protect them from prying eyes and unwanted third parties. In this article we take a brief foray into national and international legislation, analyzing the way in which the principle of confidentiality is applied.

  4. 12 CFR 978.5 - Storage of confidential information.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 7 2010-01-01 2010-01-01 false Storage of confidential information. 978.5 Section 978.5 Banks and Banking FEDERAL HOUSING FINANCE BOARD MISCELLANEOUS FEDERAL HOME LOAN BANK... confidential information and maintaining its confidentiality, as a part of its internal audit process....

  5. 12 CFR 978.3 - Request for confidential information.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 7 2010-01-01 2010-01-01 false Request for confidential information. 978.3... OPERATIONS AND AUTHORITIES BANK REQUESTS FOR INFORMATION § 978.3 Request for confidential information. A Bank shall make all requests for confidential information to a financial regulatory agency, or to a regional...

  6. 5 CFR 2634.906 - Review of confidential filer status.

    Science.gov (United States)

    2010-01-01

    ... BRANCH FINANCIAL DISCLOSURE, QUALIFIED TRUSTS, AND CERTIFICATES OF DIVESTITURE Confidential Financial Disclosure Reports § 2634.906 Review of confidential filer status. The head of each agency, or an officer... confidential financial disclosure report pursuant to this subpart. A decision by the agency head or...

  7. 22 CFR 130.15 - Confidential business information.

    Science.gov (United States)

    2010-04-01

    ..., confidential business information means commercial or financial information which by law is entitled to... 22 Foreign Relations 1 2010-04-01 2010-04-01 false Confidential business information. 130.15... CONTRIBUTIONS, FEES AND COMMISSIONS § 130.15 Confidential business information. (a) Any person who is...

  8. CRAC: Confidentiality Risk Assessment and IT-Architecture Comparison

    NARCIS (Netherlands)

    Morali, A.; Zambon, Emmanuele; Etalle, Sandro; Wieringa, Roelf J.

    2010-01-01

    CRAC is an IT-architecture-based method for assessing and comparing confidentiality risks of distributed IT systems. The method determines confidentiality risks by taking into account the effects of the leakage of confidential information (e.g. industrial secrets), and the paths that may be followed

  9. 40 CFR 80.26 - Confidentiality of information.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 16 2010-07-01 2010-07-01 false Confidentiality of information. 80.26... (CONTINUED) REGULATION OF FUELS AND FUEL ADDITIVES Controls and Prohibitions § 80.26 Confidentiality of... treated, in so far as its confidentiality is concerned, in accordance with the provisions of 40 CFR part 2. ...

  10. 19 CFR 210.72 - Confidentiality of information.

    Science.gov (United States)

    2010-04-01

    ... 19 Customs Duties 3 2010-04-01 2010-04-01 false Confidentiality of information. 210.72 Section 210.72 Customs Duties UNITED STATES INTERNATIONAL TRADE COMMISSION INVESTIGATIONS OF UNFAIR PRACTICES IN... Confidentiality of information. Confidential information (as defined in § 201.6(a) of this chapter) that is...

  11. 48 CFR 1652.224-70 - Confidentiality of records.

    Science.gov (United States)

    2010-10-01

    ... 48 Federal Acquisition Regulations System 6 2010-10-01 2010-10-01 true Confidentiality of records... Clauses 1652.224-70 Confidentiality of records. As prescribed in 1624.104, the following clause shall be inserted in all FEHBP contracts: Confidentiality of Records (JAN 1991) (a) The Carrier shall use the...

  12. 31 CFR 31.217 - Confidentiality of information.

    Science.gov (United States)

    2010-07-01

    ... 31 Money and Finance: Treasury 1 2010-07-01 2010-07-01 false Confidentiality of information. 31... RELIEF PROGRAM Conflicts of Interest § 31.217 Confidentiality of information. (a) Nonpublic information... shall take appropriate measures to ensure the confidentiality of nonpublic information and to prevent...

  13. CRAC: Confidentiality Risk Assessment and IT-Infrastructure Comparison

    NARCIS (Netherlands)

    Morali, A.; Zambon, Emmanuele; Etalle, Sandro; Wieringa, Roelf J.

    In this paper we present CRAC, an IT infrastructure-based method for assessing and comparing confidentiality risks of IT based collaborations. The method determines confidentiality risks by taking into account the effects of the leakage of confidential information (e.g. industrial secrets and user

  14. 16 CFR 1117.7 - Confidentiality of reports.

    Science.gov (United States)

    2010-01-01

    ... 16 Commercial Practices 2 2010-01-01 2010-01-01 false Confidentiality of reports. 1117.7 Section 1117.7 Commercial Practices CONSUMER PRODUCT SAFETY COMMISSION CONSUMER PRODUCT SAFETY ACT REGULATIONS... Confidentiality of reports. The confidentiality provisions of section 6 of the CPSA, 15 U.S.C. 2055, apply to...

  15. 30 CFR 47.85 - Confidentiality agreement and remedies.

    Science.gov (United States)

    2010-07-01

    ... 30 Mineral Resources 1 2010-07-01 2010-07-01 false Confidentiality agreement and remedies. 47.85... TRAINING HAZARD COMMUNICATION (HazCom) Trade Secret Hazardous Chemical § 47.85 Confidentiality agreement and remedies. (a) The confidentiality agreement authorized by § 47.84— (1) May restrict the use of the...

  16. 48 CFR 1552.227-76 - Project employee confidentiality agreement.

    Science.gov (United States)

    2010-10-01

    ... confidentiality agreement. 1552.227-76 Section 1552.227-76 Federal Acquisition Regulations System ENVIRONMENTAL... Clauses 1552.227-76 Project employee confidentiality agreement. As prescribed in 1527.409, insert the following clause: Project Employee Confidentiality Agreement (MAY 1994) (a) The Contractor recognizes that...

  17. 49 CFR 1109.3 - Confidentiality in ADR Matters

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 8 2010-10-01 2010-10-01 false Confidentiality in ADR Matters 1109.3 Section 1109... PROCEEDINGS AND THOSE IN WHICH THE BOARD IS A PARTY § 1109.3 Confidentiality in ADR Matters In all ADR matters involving the Board, whether under the Administrative Dispute Resolution Act or not, the confidentiality...

  18. 48 CFR 2152.224-70 - Confidentiality of records.

    Science.gov (United States)

    2010-10-01

    ... 48 Federal Acquisition Regulations System 6 2010-10-01 2010-10-01 true Confidentiality of records... PROVISIONS AND CONTRACT CLAUSES Text of Provisions and Clauses 2152.224-70 Confidentiality of records. As prescribed in 2124.104-70, insert the following clause: Confidentiality of Records (OCT 2005) (a) The...

  19. 16 CFR 1116.9 - Confidentiality of reports.

    Science.gov (United States)

    2010-01-01

    ... 16 Commercial Practices 2 2010-01-01 2010-01-01 false Confidentiality of reports. 1116.9 Section... REPORTS SUBMITTED PURSUANT TO SECTION 37 OF THE CONSUMER PRODUCT SAFETY ACT § 1116.9 Confidentiality of... or references information reported under section 37, the confidentiality provisions of section 6(e...

  20. 32 CFR 776.25 - Confidentiality of information.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 5 2010-07-01 2010-07-01 false Confidentiality of information. 776.25 Section 776.25 National Defense Department of Defense (Continued) DEPARTMENT OF THE NAVY MISCELLANEOUS RULES... Rules of Professional Conduct § 776.25 Confidentiality of information. (a) Confidentiality of...

  1. 12 CFR 261.15 - Request for confidential treatment.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 3 2010-01-01 2010-01-01 false Request for confidential treatment. 261.15... Public; Procedures for Requests § 261.15 Request for confidential treatment. (a) Submission of request. Any submitter of information to the Board who desires confidential treatment pursuant to 5 U.S.C. 552...

  2. Confidentiality and physicians' health. A cross-sectional study of University Hospital Physicians in four European cities (the HOUPE-study).

    Science.gov (United States)

    Løvseth, Lise Tevik; Aasland, Olaf Gjerløw; Fridner, Ann; Jónsdottir, Lilja Sigrun; Marini, Massimo; Linaker, Olav Morten

    2010-01-01

    To investigate how the subjective burden of confidentiality can act as a stressor that affects physicians' psychological health and wellbeing. Cross-sectional survey data from a sample of university hospital physicians (N=1,956) in four European countries (Sweden, Norway, Iceland and Italy) who participated in the HOUPE (Health and Organization among University hospital Physicians in Europe) study was analysed. About 25% of the participants reported that confidentiality impedes emotional support to a considerable degree. An index of confidentiality as a barrier to seeking support (ICBS) had a negative effect on physicians' health and wellbeing. The effect of ICBS was confirmed and slightly increased when controlled for variables known to buffer the adverse mental and physical effects of stress. Though the physicians in Iceland and in Norway found confidentiality the most challenging, it was the physicians in Italy and Sweden who showed a significant effect of ICBS on their health and wellbeing. Whether confidentiality is a stressor in its own right or an amplifier of stressful situations in medical practice should be further investigated to gain a better understanding of the effect of confidentiality on physicians' coping, stress and health. In addition, there is a need to investigate how physicians can balance coping with the inevitable emotional demands of medical practice and maintaining the ethics of confidentiality in a way that protects both patients' privacy rights and physicians' health and wellbeing.

  3. Southwestern desert resources

    Science.gov (United States)

    Halvorson, William L.; van Riper, Charles; Schwalbe, Cecil R.

    2010-01-01

    The southwestern deserts stretch from southeastern California to west Texas and then south to central Mexico. The landscape of this region is known as basin and range topography featuring to "sky islands" of forest rising from the desert lowlands which creates a uniquely diverse ecology. The region is further complicated by an international border, where governments have caused difficulties for many animal populations. This book puts a spotlight on individual research projects which are specific examples of work being done in the area and when they are all brought together, to shed a general light of understanding the biological and cultural resources of this vast region so that those same resources can be managed as effectively and efficiently as possible. The intent is to show that collaborative efforts among federal, state agency, university, and private sector researchers working with land managers, provides better science and better management than when scientists and land managers work independently.

  4. Aquaporins in desert rodent physiology.

    Science.gov (United States)

    Pannabecker, Thomas L

    2015-08-01

    Desert rodents face a sizeable challenge in maintaining salt and water homeostasis due to their life in an arid environment. A number of their organ systems exhibit functional characteristics that limit water loss above that which occurs in non-desert species under similar conditions. These systems include renal, pulmonary, gastrointestinal, nasal, and skin epithelia. The desert rodent kidney preserves body water by producing a highly concentrated urine that reaches a maximum osmolality nearly three times that of the common laboratory rat. The precise mechanism by which urine is concentrated in any mammal is unknown. Insights into the process may be more apparent in species that produce highly concentrated urine. Aquaporin water channels play a fundamental role in water transport in several desert rodent organ systems. The role of aquaporins in facilitating highly effective water preservation in desert rodents is only beginning to be explored. The organ systems of desert rodents and their associated AQPs are described.

  5. 7 CFR 1219.108 - Confidential information.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 10 2010-01-01 2010-01-01 false Confidential information. 1219.108 Section 1219.108 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (MARKETING AGREEMENTS AND ORDERS; MISCELLANEOUS COMMODITIES), DEPARTMENT OF AGRICULTURE HASS AVOCADO PROMOTION,...

  6. 7 CFR 1210.352 - Confidential treatment.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 10 2010-01-01 2010-01-01 false Confidential treatment. 1210.352 Section 1210.352 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (MARKETING... treatment. (a) All information obtained from the books, records, or reports required to be maintained...

  7. On the Drafting of Confidentiality Agreements

    DEFF Research Database (Denmark)

    Drewsen, Merete; Lando, Henrik; Cummins, Tim

    2006-01-01

    IACCM (International Association for Contract and Commercial Management) has initiated. The main theoretical aspect of the article concerns the application of the value maximization principle (the Coase theorem) to the drafting of confidentiality agreements. While the article is not theoretical, its...

  8. Statically checking confidentiality via dynamic labels

    NARCIS (Netherlands)

    Jacobs, B.P.F.; Pieters, Wolter; Warnier, M.

    2005-01-01

    This paper presents a new approach for verifying confidentiality for programs, based on abstract interpretation. The framework is formally developed and proved correct in the theorem prover PVS. We use dynamic labeling functions to abstractly interpret a simple programming language via modification

  9. Confidentiality and Faculty Representation in Academic Governance

    Science.gov (United States)

    American Association of University Professors, 2013

    2013-01-01

    This report argues that requiring faculty members to sign confidentiality agreements as a requirement to serve on university committees is in most cases inconsistent with widely accepted standards of shared governance and with the concept of serving as a representative. This argument does not apply to faculty serving on promotion and tenure…

  10. Confidentiality of Accounting Academics: Consequences of Nonconformity

    Science.gov (United States)

    Amponsah, Emmanuel B.; Boateng, Peter Agyekum; Onuoha, Luke N.

    2016-01-01

    This paper examined ways by which nonconformity to confidentiality among accounting academics could lead to increased-recruitment-and-legal-costs to their employing universities in Ghana that offered accounting degree programmes. With a cross-sectional design, data collected from 1,225 accountants analysed via Cronbach's alpha,…

  11. 7 CFR 987.67 - Confidential information.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 8 2010-01-01 2010-01-01 false Confidential information. 987.67 Section 987.67... information. All data or other information constituting a trade secret or disclosing a trade position or... the Committee and information which would reveal the circumstances of a single handler shall...

  12. Physiological adaptation in desert birds

    NARCIS (Netherlands)

    Williams, JB; Tieleman, BI; Williams, Joseph B.

    2005-01-01

    We call into question the idea that birds have not evolved unique physiological adaptations to desert environments. The rate at which desert larks metabolize energy is lower than in mesic species within the same family, and this lower rate of living translates into a lower overall energy requirement

  13. Data Confidentiality in Mobile Ad hoc Networks

    CERN Document Server

    Aldabbas, Hamza; Janicke, Helge; Al-Bayatti, Ali; 10.5121/ijwmn.2012.4117

    2012-01-01

    Mobile ad hoc networks (MANETs) are self-configuring infrastructure-less networks comprised of mobile nodes that communicate over wireless links without any central control on a peer-to-peer basis. These individual nodes act as routers to forward both their own data and also their neighbours' data by sending and receiving packets to and from other nodes in the network. The relatively easy configuration and the quick deployment make ad hoc networks suitable the emergency situations (such as human or natural disasters) and for military units in enemy territory. Securing data dissemination between these nodes in such networks, however, is a very challenging task. Exposing such information to anyone else other than the intended nodes could cause a privacy and confidentiality breach, particularly in military scenarios. In this paper we present a novel framework to enhance the privacy and data confidentiality in mobile ad hoc networks by attaching the originator policies to the messages as they are sent between nod...

  14. Confidentiality and Security in Medical Information Systems

    Directory of Open Access Journals (Sweden)

    Victor Papanaga

    2008-11-01

    Full Text Available Behind the technologies Medical System contains different types of information including patient information also. The patient data is classified as confidential and is one of the patient rights based on World Health Organization declaration. There are several compromises in solutions selection based on hardware and software requirements, performance, usability, portability. This article presents the investigation results and proposes the secured solution principles for the medical system that deal with patient data.

  15. Data Confidentiality in Mobile Ad hoc Networks

    Directory of Open Access Journals (Sweden)

    Hamza Aldabbas

    2012-03-01

    Full Text Available Mobile ad hoc networks (MANETs are self-configuring infrastructure-less networks comprised of mobile nodes that communicate over wireless links without any central control on a peer-to-peer basis.These individual nodes act as routers to forward both their own data and also their neighbours’ data by sending and receiving packets to and from other nodes in the network. The relatively easy configuration and the quick deployment make ad hoc networks suitable the emergency situations (such as human or natural disasters and for military units in enemy territory. Securing data dissemination between these nodes in such networks, however, is a very challenging task. Exposing such information to anyone else other than the intended nodes could cause a privacy and confidentiality breach, particularly in military scenarios. In this paper we present a novel framework to enhance the privacy and data confidentiality in mobile ad hoc networks by attaching the originator policies to the messages as they are sent between nodes. We evaluate our framework using the Network Simulator (NS-2 to check whether the privacy and confidentiality of the originator are met. For this we implemented the Policy Enforcement Points (PEPs, as NS-2 agents that manage and enforce the policies attached to packets at every node in the MANET.

  16. Practical State Machine Replication with Confidentiality

    Energy Technology Data Exchange (ETDEWEB)

    Zhang, Haibin [University of North Carolina, Chapel Hill

    2016-01-01

    We study how to enable arbitrary randomized algorithms in Byzantine fault-tolerant (BFT) settings. We formalize a randomized BFT protocol and provide a simple and efficient construction that can be built on any existing BFT protocols while adding practically no overhead. We go one step further to revisit a confidential BFT protocol (Yin et al., SOSP '03). We show that their scheme is potentially susceptible to safety and confidentiality attacks. We then present a new protocol that is secure in the stronger model we formalize, by extending the idea of a randomized BFT protocol. Our protocol uses only efficient symmetric cryptography, while Yin et al.'s uses costly threshold signatures. We implemented and evaluated our protocols on microbenchmarks and real-world use cases. We show that our randomized BFT protocol is as efficient as conventional BFT protocols, and our confidential BFT protocol is two to three orders of magnitude faster than Yin et al.'s, which is less secure than ours.

  17. 3-Receiver Broadcast Channels with Common and Confidential Messages

    CERN Document Server

    Chia, Yeow-Khiang

    2009-01-01

    Achievable secrecy rate regions for the general 3-receiver broadcast channel with one common and one confidential message sets are established. We consider two setups: (i) when the confidential message is to be sent to two of the receivers and the third receiver is an eavesdropper; and (ii) when the confidential message is to be sent to one of the receivers and the other two receivers are eavesdroppers. We show that our secrecy rate regions are optimum for some special cases.

  18. Perceived Parental Functioning, Self-Esteem, and Psychological Distress in Adults Whose Parents are Separated/Divorced

    National Research Council Canada - National Science Library

    Verrocchio, Maria C; Marchetti, Daniela; Fulcheri, Mario

    2015-01-01

    ... and their associations with self-esteem and psychological distress. Four hundred seventy adults in Chieti, Italy, completed an anonymous and confidential survey regarding their childhood exposure to parental alienating behaviors...

  19. 5 CFR 2634.901 - Policies of confidential financial disclosure reporting.

    Science.gov (United States)

    2010-01-01

    ... GOVERNMENT ETHICS EXECUTIVE BRANCH FINANCIAL DISCLOSURE, QUALIFIED TRUSTS, AND CERTIFICATES OF DIVESTITURE Confidential Financial Disclosure Reports § 2634.901 Policies of confidential financial disclosure reporting... financial disclosure to complement the Act's system of public disclosure. The confidential reports...

  20. 78 FR 55993 - Revisions to Reporting and Recordkeeping Requirements, and Proposed Confidentiality...

    Science.gov (United States)

    2013-09-11

    ... Recordkeeping Requirements, and Proposed Confidentiality Determinations Under the Greenhouse Gas Reporting... and Recordkeeping Requirements, and Proposed Confidentiality Determinations Under the Greenhouse Gas... the Greenhouse Gas Reporting Program. In addition, the EPA is proposing confidentiality determinations...

  1. 78 FR 66674 - Revisions to Reporting and Recordkeeping Requirements, and Proposed Confidentiality...

    Science.gov (United States)

    2013-11-06

    ... Confidentiality Determinations Under the Greenhouse Gas Reporting Program AGENCY: Environmental Protection Agency... Recordkeeping Requirements, and Proposed Confidentiality Determinations under the Greenhouse Gas Reporting... Requirements, and Proposed Confidentiality Determinations under the Greenhouse Gas Reporting Program,'' which...

  2. 76 FR 77816 - Access to Confidential Business Information by Guident Technologies, Inc. and Subcontractor...

    Science.gov (United States)

    2011-12-14

    ... AGENCY Access to Confidential Business Information by Guident Technologies, Inc. and Subcontractor...: EPA has authorized its contractor, Guident Technologies, Inc. of Herndon, VA and subcontractor, Impact... to be Confidential Business Information (CBI). DATES: Access to the confidential data will occur...

  3. 75 FR 78238 - Access to Confidential Business Information by Science Applications International Corporation and...

    Science.gov (United States)

    2010-12-15

    ... AGENCY Access to Confidential Business Information by Science Applications International Corporation and...: EPA has authorized its contractor, Science Applications International Corporation (SAIC) of San Diego... determined to be Confidential Business Information (CBI). DATES: Access to the confidential data...

  4. Ecological zones of California deserts

    Data.gov (United States)

    U.S. Geological Survey, Department of the Interior — The dataset delineates ecological zones within California deserts. We derived ecological zones by reclassifying LANDFIRE vegetation biophysical setting types, plus...

  5. Research On Preserving User Confidentiality In Cloud Computing – Design Of A Confidentiality Framework

    Directory of Open Access Journals (Sweden)

    Harish Chennamsetty

    2016-09-01

    Full Text Available Cloud Computing creates a dynamic resource sharing platform. Using cloud technologies such as virtualization, data can be provided to the active users who are at high need to utilize the resources provided within the cloud. As this data (or service is stored (or offered outside the data owner's boundaries, they are skeptical for utilizing cloud technology in order to store or utilize their data or service. There are many issues for these active clients (companies or individuals to be petrified at the thought of using cloud computing paradigm. Some of the main issues that make the clients not to choose cloud computing may be determined because of three important security aspects such as confidentiality, integrity, and availability. This research focused on the security models that relate confidentiality issues. A literature Review is performed for analyzing the existing confidentiality frameworks and security models in the area of grid computing, cluster computing and virtualization. A new theoretical framework is then designed to overcome confidentiality issues thereby improving the client‟sgeneric understanding of cloud computing services. The resulting framework when implemented in real world would motivate clients to transform their businesses on to cloud.

  6. Remote Sensing Field Guide - Desert

    Science.gov (United States)

    1991-09-01

    sea in North America is in the Gran Desierto of northern Sonora, Mexico, which extends northward into the Yuma Desert of Arizona and the Algodones...parallel to the dune chains. PATTERN INDICATOR SHEET - DESERT DUNES PHOTO: AERIAL (OBLIQUE) STAR - COMPOUND LOCATION: Mexico (Northern) El Gran Desierto ...dunes. This field is in the central part of El Gran Desierto about 20 km south of the Arizona-Mexico border Photo B (on back) is a closer view. For orien

  7. Patient information: confidentiality and the electronic record.

    Science.gov (United States)

    Griffith, Richard

    The rise of the electronic record now allows nurses to access a large archive of patient information that was more difficult to obtain when records consisted of manually held paper files. There have been several instances where curiosity and, occasionally, more malicious motivations have led nurses to access these records and read the notes of a celebrity or a person they know. In this article, Richard Griffith considers whether nurses' accessing and reading of the record of someone who is not in their care is in breach of their duty of confidentiality.

  8. Enhance Confidentiality of Threshold Signature for MANET

    Institute of Scientific and Technical Information of China (English)

    GUO Wei; XIONG Zhongwei

    2006-01-01

    The participating wireless mobile node that mobile ad hoc network (MANET) communications need to forward may be malicious. That means not only adversary might be able to acquire some sensitive information of the threshold signatures from the compromised node, but also the partial signatures may be fabricated by malicious node, the advantages of threshold signatures would disappear. Signing and encrypting the sensitive information of the threshold signatures, and only the specified receiver can recover it, which will improve the confidentiality of threshold signatures. The security analysis shows the method is suitable for the secure characteristic of MANET that has the malicious nodes, and the message transmission is secure can against the attack.

  9. On the Drafting of Confidentiality Agreements

    DEFF Research Database (Denmark)

    Drewsen, Merete; Lando, Henrik; Cummins, Tim

    2006-01-01

    This is not a theoretical paper but an application of existing law and economic contract theory to the issue of how to draft a specific kind of contract. It is addressed to practitioners and is intended for practical use. It will be part of a Wiki (as in Wikipedia) for contract drafting, which...... IACCM (International Association for Contract and Commercial Management) has initiated. The main theoretical aspect of the article concerns the application of the value maximization principle (the Coase theorem) to the drafting of confidentiality agreements. While the article is not theoretical, its...

  10. America's Atomic Army: The Historical Archaeology of Camp Desert Rock

    Energy Technology Data Exchange (ETDEWEB)

    Susan R. Edwards

    2007-11-02

    Established in 1951, Camp Desert Rock served as the training ground for America's 'Atomic Army'. For the next six years, U.S. ground troops traveled to the Nevada desert to participate in military maneuvers during atmospheric atomic weapons testing. Nearly 60,000 soldiers received physical and psychological training in atomic warfare. Abandoned when atmospheric testing ended, Camp Desert Rock was dismantled and its buildings moved to other locations. Today, the camp appears as a sterile expanse of desert marked by rock-lined tent platforms, concrete foundations, and trash scatters. Although visually unimposing, the site is rich with the history of America's nuclear testing program.

  11. 10 CFR 207.4 - Confidentiality of energy information.

    Science.gov (United States)

    2010-01-01

    ... 10 Energy 3 2010-01-01 2010-01-01 false Confidentiality of energy information. 207.4 Section 207.4 Energy DEPARTMENT OF ENERGY OIL COLLECTION OF INFORMATION Collection of Information Under the Energy Supply and Environmental Coordination Act of 1974 § 207.4 Confidentiality of energy information....

  12. 75 FR 65013 - Access in Litigation to Confidential Business Information

    Science.gov (United States)

    2010-10-21

    ... AGENCY Access in Litigation to Confidential Business Information AGENCY: Environmental Protection Agency (``EPA''). ACTION: Notice of Transfer of Information Claimed as Confidential Business Information to the.... Proc. No. 09-01198 (ALG), pending in the United States Bankruptcy Court for the Southern District of...

  13. 38 CFR 1.520 - Confidentiality of social data.

    Science.gov (United States)

    2010-07-01

    ... Confidentiality of social data. Persons having access to social data will be conscious of the fact that the family... 38 Pensions, Bonuses, and Veterans' Relief 1 2010-07-01 2010-07-01 false Confidentiality of social..., and the social worker, or may destroy their mutual confidence and influence, rendering it impossible...

  14. 25 CFR 700.837 - Confidentiality of archaeological resource information.

    Science.gov (United States)

    2010-04-01

    ... 25 Indians 2 2010-04-01 2010-04-01 false Confidentiality of archaeological resource information... specific archaeological resource or area about which information is sought. (2) The purpose for which the... AND RELOCATION PROCEDURES New Lands Grazing § 700.837 Confidentiality of archaeological...

  15. 43 CFR 7.18 - Confidentiality of archaeological resource information.

    Science.gov (United States)

    2010-10-01

    ... ARCHAEOLOGICAL RESOURCES Uniform Regulations § 7.18 Confidentiality of archaeological resource information. (a... request for information, concerning the archaeological resources within the requesting Governor's State... 43 Public Lands: Interior 1 2010-10-01 2010-10-01 false Confidentiality of archaeological...

  16. 40 CFR 303.31 - Assurance of claimant confidentiality.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 27 2010-07-01 2010-07-01 false Assurance of claimant confidentiality. 303.31 Section 303.31 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) SUPERFUND... VIOLATIONS UNDER SUPERFUND Criteria for Payment of Award § 303.31 Assurance of claimant confidentiality. No...

  17. 24 CFR 401.312 - Confidentiality of information.

    Science.gov (United States)

    2010-04-01

    ... 24 Housing and Urban Development 2 2010-04-01 2010-04-01 false Confidentiality of information. 401.312 Section 401.312 Housing and Urban Development Regulations Relating to Housing and Urban... (PRA) § 401.312 Confidentiality of information. A PAE and every other restricted person (as defined in...

  18. Protecting Confidentiality Rights: The Need for an Ethical Practice Model

    Science.gov (United States)

    Fisher, Mary Alice

    2008-01-01

    All psychologists must uphold the same ethical standards about confidentiality even though each state imposes different legal limits on their ability to protect clients' confidences. The resulting ethical-legal confusion is exacerbated by legally based confidentiality training that treats legal exceptions as if they were the rule and fosters the…

  19. School Counselors' Constructions of Student Confidentiality

    Science.gov (United States)

    Trice-Black, Shannon; Riechel, Morgan E. Kiper; Shillingford, M. Ann

    2013-01-01

    Confidentiality in counseling relationships helps ensure trust between clients and counselors. Yet, defining and understanding the boundaries of confidentiality in school settings is often difficult, as school counselors are engaged in multiple relationships with various stakeholders. This qualitative phenomenological study explores the…

  20. 34 CFR 6.4 - Central records; confidentiality.

    Science.gov (United States)

    2010-07-01

    ... 34 Education 1 2010-07-01 2010-07-01 false Central records; confidentiality. 6.4 Section 6.4 Education Office of the Secretary, Department of Education INVENTIONS AND PATENTS (GENERAL) § 6.4 Central records; confidentiality. Central files and records shall be maintained of all inventions, patents, and...

  1. 28 CFR 549.14 - Confidentiality of information.

    Science.gov (United States)

    2010-07-01

    ... 28 Judicial Administration 2 2010-07-01 2010-07-01 false Confidentiality of information. 549.14 Section 549.14 Judicial Administration BUREAU OF PRISONS, DEPARTMENT OF JUSTICE INSTITUTIONAL MANAGEMENT MEDICAL SERVICES Infectious Disease Management § 549.14 Confidentiality of information. Any disclosure of...

  2. 28 CFR 65.53 - Confidentiality of information.

    Science.gov (United States)

    2010-07-01

    ... 28 Judicial Administration 2 2010-07-01 2010-07-01 false Confidentiality of information. 65.53 Section 65.53 Judicial Administration DEPARTMENT OF JUSTICE (CONTINUED) EMERGENCY FEDERAL LAW ENFORCEMENT ASSISTANCE Additional Requirements § 65.53 Confidentiality of information. Section 812 of title I of the...

  3. 40 CFR 147.2907 - Confidentiality of information.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 22 2010-07-01 2010-07-01 false Confidentiality of information. 147.2907 Section 147.2907 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) WATER... Mineral Reserve-Class II Wells § 147.2907 Confidentiality of information. (a) The following information...

  4. 38 CFR 17.501 - Confidential and privileged documents.

    Science.gov (United States)

    2010-07-01

    ... were produced by or for the VA in the process of conducting systematic healthcare reviews for the purpose of improving the quality of health care or improving the utilization of healthcare resources in VA... AFFAIRS MEDICAL Confidentiality of Healthcare Quality Assurance Review Records § 17.501 Confidential...

  5. 50 CFR 600.130 - Protection of confidentiality of statistics.

    Science.gov (United States)

    2010-10-01

    ... statistics. 600.130 Section 600.130 Wildlife and Fisheries FISHERY CONSERVATION AND MANAGEMENT, NATIONAL... Fishery Management Councils § 600.130 Protection of confidentiality of statistics. Each Council must establish appropriate procedures for ensuring the confidentiality of the statistics that may be submitted...

  6. 19 CFR 201.6 - Confidential business information.

    Science.gov (United States)

    2010-04-01

    ... business information (e.g., discussion of trends) will be treated as confidential business information only... business information shall be addressed to the Secretary, United States International Trade Commission, 500... 19 Customs Duties 3 2010-04-01 2010-04-01 false Confidential business information. 201.6...

  7. 29 CFR 4003.8 - Request for confidential treatment.

    Science.gov (United States)

    2010-07-01

    ... 29 Labor 9 2010-07-01 2010-07-01 false Request for confidential treatment. 4003.8 Section 4003.8 Labor Regulations Relating to Labor (Continued) PENSION BENEFIT GUARANTY CORPORATION GENERAL RULES FOR ADMINISTRATIVE REVIEW OF AGENCY DECISIONS General Provisions § 4003.8 Request for confidential treatment. If any...

  8. 49 CFR 511.66 - Confidential business information.

    Science.gov (United States)

    2010-10-01

    ... in Cases of Violation of Average Fuel Economy Standards § 511.66 Confidential business information... 49 Transportation 6 2010-10-01 2010-10-01 false Confidential business information. 511.66 Section... view information in support of a petition for settlement which has been determined to be...

  9. 75 FR 15635 - Delegations of Authority To Disclose Confidential Information

    Science.gov (United States)

    2010-03-30

    ... the Commission may not be disclosed by the receiving registered entity, registered futures association... its provisions applicable to ``registered entities'' and would permit staff to disclose confidential.... 140.72 Delegation of authority to disclose confidential information to a registered entity, registered...

  10. 18 CFR 1312.18 - Confidentiality of archaeological resource information.

    Science.gov (United States)

    2010-04-01

    ... 18 Conservation of Power and Water Resources 2 2010-04-01 2010-04-01 false Confidentiality of archaeological resource information. 1312.18 Section 1312.18 Conservation of Power and Water Resources TENNESSEE VALLEY AUTHORITY PROTECTION OF ARCHAEOLOGICAL RESOURCES: UNIFORM REGULATIONS § 1312.18 Confidentiality...

  11. A Brief History of Security Models for Confidentiality

    Science.gov (United States)

    Dent, Alexander W.

    Despite the fact that industry continues to rate confidentiality protection as the least important security goal for a commercial organisation, the cryptographic community has a fascination with developing new encryption technologies. It often seems that the majority of advances in general cryptologic theory are a result of research designed to improve our ability to transmit messages confidentially.

  12. Ombuds’ corner: Open door and confidentiality

    CERN Multimedia

    Vincent Vuillemin

    2013-01-01

    For the Open Days, CERN will be transparent for all visitors. It's also the occasion to remember that the Ombuds' door is fully open every day of the year for all persons working for or on behalf of CERN.   The door is open, but as soon as it's closed for a discussion, the office becomes a place where total confidentiality is preserved. This may appear as a contradiction, no? The Ombuds is available to help everyone in all circumstances, but his clause of confidentiality prevents him from acting without the consent of his “visitors”. How can he possibly resolve the in-house conflicts in groups, or units, if all the parties do not voluntarily participate in its resolution? The answer is clear: the job of the Ombuds is to help the parties resolve their conflict by themselves. He will provide a few rules of communication, a process of mutual respect, suggest some possibilities that the parties may want to follow, and mediate the dispute so that people...

  13. Confidential Declaration of Family Situation (CDFS)

    CERN Multimedia

    Human Resources Department

    2005-01-01

    The Confidential Declaration of Family Situation (CDFS) becomes a new computerized EDH form from October 2005 In accordance with Article R IV 1.17 of the Staff Regulations, Staff Members and Fellows, married or separated, must notify any changes in their spouse's income or health insurance cover in writing to CERN, within 30 calendar days of the change. This is necessary for the Organization to determine if a supplementary contribution is payable to the CERN Health Insurance Scheme (CHIS) for the spouse's coverage and, if so, the amount. Until now a paper form called « Confidential Declaration of Family Situation » (CDFS) was used for that purpose.  From early October 2005 the CDFS will be computerized for the whole Organization. Henceforth, any changes in a spouse's income or health insurance cover must be notified using EDH (Electronic Document Handling). Additionally, annual updates of the declaration will be required and will be requested by automatic e-mail. Early October an email will be sent to...

  14. Confidential Declaration of Family Situation (CDFS)

    CERN Multimedia

    Human Resources Department

    2005-01-01

    The Confidential Declaration of Family Situation (CDFS) becomes a new computerized EDH form from October 2005 In accordance with Article R IV 1.17 of the Staff Regulations, Staff Members and Fellows, married or separated, must notify any changes in their spouse's income or health insurance cover in writing to CERN, within 30 calendar days of the change. This is necessary for the Organization to determine if a supplementary contribution is payable to the CERN Health Insurance Scheme (CHIS) for the spouse's coverage and, if so, the amount. Until now a paper form called « Confidential Declaration of Family Situation » (CDFS) was used for that purpose.  From early October 2005 the CDFS will be computerized for the whole Organization. Henceforth, any changes in a spouse's income or health insurance cover must be notified using EDH (Electronic Document Handling). Additionally, annual updates of the declaration will be required and will be requested by automatic e-mail. Early October an email will be...

  15. Genetic secrets: Protecting privacy and confidentiality in the genetic era

    Energy Technology Data Exchange (ETDEWEB)

    Rothstein, M.A. [ed.

    1998-07-01

    Few developments are likely to affect human beings more profoundly in the long run than the discoveries resulting from advances in modern genetics. Although the developments in genetic technology promise to provide many additional benefits, their application to genetic screening poses ethical, social, and legal questions, many of which are rooted in issues of privacy and confidentiality. The ethical, practical, and legal ramifications of these and related questions are explored in depth. The broad range of topics includes: the privacy and confidentiality of genetic information; the challenges to privacy and confidentiality that may be projected to result from the emerging genetic technologies; the role of informed consent in protecting the confidentiality of genetic information in the clinical setting; the potential uses of genetic information by third parties; the implications of changes in the health care delivery system for privacy and confidentiality; relevant national and international developments in public policies, professional standards, and laws; recommendations; and the identification of research needs.

  16. Desert and desertification in Iran

    Science.gov (United States)

    Bahrami, M.

    2009-04-01

    One of the greatest environmental concerns in Iran as in other arid and semiarid countries is the transformation of once productive, or marginally productive, land to deteriorated land and soil unable to support plants and animals. Because the land becomes barren and dry, the process is described as desertification, which occurs as a sequence of events. The area of deserts in Iran is about 340,000 Km2 (less than one fifth of its total area), of which 100,000 Km2 is being used for some cultivation, 120,000 Km2 is subjected to moving sands about 40 % of which is active sand dunes. Most of features and processes usual in world famous deserts are also observed in Iran: low precipitation, high evaporation, poor or lack of vegetation, saline and alkaline soils, low population and small and sparse oases. The deserts of Iran are generally classified in the subtropical, warm, arid and semiarid group, but the effect and presence of some geographical and geoclimatical factors such as height, vicinity to Indian Ocean and so on do some changes in climatic conditions and geographical features causing some local and regional differences in them. Geographically, two groups of deserts have been known in Iran: (1) Coastal deserts which, like a ribbon with variable width, stretch from extreme southeast to extreme southwest, at the north parts of Oman Sea and Persian Gulf. One important feature of these deserts is relatively high humidity which differentiates them from other deserts. This causes an increase in vegetation coverage and hence a decrease in eolian erosion and also a dominance of chemical weathering to that of physical. (2) internal deserts, which rest in central, eastern and southeastern plateau of the country and in independent and semi dependent depressions. This situation, which is due to the surrounding high mountains, blocks humidity entry and causes the aridity of these deserts. Wind as a dominant process in the area causes deflated features such as Reg (desert

  17. Ethical issues in sport psychology.

    Science.gov (United States)

    Watson, Jack C; Way, William C; Hilliard, Robert C

    2017-08-01

    The field of sport psychology is dynamic and growing. To continue building credibility with the public and allied professionals, effective and ethical practice is crucial. Advances in technology have allowed sport psychology professionals to consult with athletes from a distance, but practitioners must be mindful of their competency to use technology, confidentiality concerns, and the suitability of technology for their clients. Movement toward defining competency and clarifying issues of title usage are additional areas in which the field is gaining momentum. Recent attention has also been drawn to the topics of professional development and cultural competency. With the unique settings in which applied sport psychology practice takes place, attention to multiple relationships is another key ethical issue. Copyright © 2017 Elsevier Ltd. All rights reserved.

  18. Recommended Cross-Desert Driving Route

    Institute of Scientific and Technical Information of China (English)

    2004-01-01

    Beijing - Duolun - Dalai Nur- Hexigten Banner -Saihanba - Weichang - Luanping - Miyun - Beijing. Along this 1,600-kilometer route is a 150-kin section(between Duolun and Darhan) of desert with no surfaced road - a paradise for desert drivers.

  19. Stone structures in the Syrian Desert

    CERN Document Server

    Sparavigna, Amelia Carolina

    2011-01-01

    An arid land, known as the Syrian Desert, is covering a large part of the Middle East. In the past, this harsh environment, characterized by huge lava fields, the "harraat", was considered as a barrier between Levant and Mesopotamia. When we observe this desert from space, we discover that it is crossed by some stone structures, the "desert kites", which were the Neolithic traps for the game. Several stone circles are visible too, as many Stonehenge sites dispersed in the desert landscape.

  20. Confidentiality in Family Planning Services for Young People

    Science.gov (United States)

    Brittain, Anna W.; Williams, Jessica R.; Zapata, Lauren B.; Moskosky, Susan B.; Weik, Tasmeen S.

    2015-01-01

    Context Family planning services are essential for reducing high rates of unintended pregnancies among young people, yet a perception that providers will not preserve confidentiality may deter youth from accessing these services. This systematic review, conducted in 2011, summarizes the evidence on the effect of assuring confidentiality in family planning services to young people on reproductive health outcomes. The review was used to inform national recommendations on providing quality family planning services. Evidence acquisition Multiple databases were searched to identify articles addressing confidentiality in family planning services to youth aged 10–24 years. Included studies were published from January 1985 through February 2011. Studies conducted outside the U.S., Canada, Europe, Australia, or New Zealand, and those that focused exclusively on HIV or sexually transmitted diseases, were excluded. Evidence synthesis The search strategy identified 19,332 articles, nine of which met the inclusion criteria. Four studies examined outcomes. Examined outcomes included use of clinical services and intention to use services. Of the four outcome studies, three found a positive association between assurance of confidentiality and at least one outcome of interest. Five studies provided information on youth perspectives and underscored the idea that young people greatly value confidentiality when receiving family planning services. Conclusions This review demonstrates that there is limited research examining whether confidentiality in family planning services to young people affects reproductive health outcomes. A robust research agenda is needed, given the importance young people place on confidentiality. PMID:26190851

  1. Phytoremediation for Oily Desert Soils

    Science.gov (United States)

    Radwan, Samir

    This chapter deals with strategies for cleaning oily desert soils through rhizosphere technology. Bioremediation involves two major approaches; seeding with suitable microorganisms and fertilization with microbial growth enhancing materials. Raising suitable crops in oil-polluted desert soils fulfills both objectives. The rhizosphere of many legume and non-legume plants is richer in oil-utilizing micro-organisms than non-vegetated soils. Furthermore, these rhizospheres also harbour symbiotic and asymbiotic nitrogen-fixing bacteria, and are rich in simple organic compounds exuded by plant roots. Those exudates are excellent nutrients for oil-utilizing microorganisms. Since many rhizospheric bacteria have the combined activities of hydrocarbon-utilization and nitrogen fixation, phytoremediation provides a feasible and environmentally friendly biotechnology for cleaning oil-polluted soils, especially nitrogen-poor desert soils.

  2. Confidentiality. 13: The notification of infectious diseases.

    Science.gov (United States)

    Dimond, B

    Jenny Rose was a paediatric community nurse who regularly visited a child with a chronic lung condition who was being nursed at home. On one visit she noticed that the child's mother, Jane, appeared to be very pale and thin and was told that the mother had a severe gastric disorder with diarrhoea. From the description of the illness, Jenny thought that Jane might be suffering from typhoid. Jane worked as a cook in a restaurant, was unwilling to seek medical advice and intended going to work that night. Jenny was concerned that Jane could have a serious notifiable infectious disease and therefore be a danger to customers in the restaurant. Jane insisted that Jenny should keep the information confidential. Where does Jenny stand?

  3. Psychological literacy: proceed with caution, construction ahead

    Directory of Open Access Journals (Sweden)

    Murdoch DD

    2016-08-01

    Full Text Available Douglas D Murdoch Department of Psychology, Mount Royal University, Calgary, AB, Canada Abstract: Psychological literacy is the ethical application of psychological skills and knowledge. This could benefit individuals in their personal, occupational, and civic lives and subsequently benefit society as a whole. We know that psychology has a wide-ranging impact on society. The potential benefits of a psychologically literate citizenry in improved parenting, better business practices, enlightened legislation, and many other areas make this a desirable goal. It has been proposed that this should become the primary goal of an undergraduate psychology education to benefit the majority who do not go on to graduate school and even those who only take a few psychology courses. This idea has significant merit and warrants further investigation and development. However, there are major concerns that need to be addressed. First, what are uniquely psychological skills and knowledge? Many of the skills psychology undergraduates acquire are generic to university and not specific to psychology. Second, psychology can be as harmful when misapplied as it can be beneficial when ethically applied. Third, psychology departments will need to address pragmatic as well as ethical issues, including issues of competency, boundaries, accountability, and confidentiality. Fourth, the available empirical evidence to direct such efforts is primarily at the anecdotal, case example, and pilot study stages. Significant improvements are needed in measuring psychological literacy, choice of outcome measures, and research methodologies before these advantages can be realized in an empirically supported manner. Currently, best practices in the undergraduate curriculum are the mindful and purposeful design of courses and experiential opportunities. It is proposed that psychological literacy is best conceptualized as a meta-literacy and that it should become a goal of psychology

  4. Desert Environmental Handbook. First Edition

    Science.gov (United States)

    1977-11-01

    Department of the Army, February 1972. 2. Analogs of Yuma Climate I-XI, US Army Natick Laboratories, Natick, Massachusetts, 1958-60. 3. Kolb, C. R.; Dornbusch ...Station Atrea, Arizona, Purdue University, March 1955. Kolb, C. R.; Dornbusch , W. K. Jr.; 1. Analogs of Yuma Terrain in the Middle East Desert; 2

  5. On a Crowded Desert Island.

    Science.gov (United States)

    Rothstein, Samuel

    1989-01-01

    Suggests reference sources most appropriate for a desert island. In addition to "Robinson Crusoe" (Daniel Defoe) and a reference guide to the literature of travel, the list includes basic books on reference work, guides to reference sources, journals, an almanac, encyclopedias, a guide to English usage, and a book of quotations. (14 references)…

  6. Women in the Gobi Desert

    Institute of Scientific and Technical Information of China (English)

    1999-01-01

    THE plane flew for about an hour,transporting me from Beijing to adeserted land,the Gobi desert,where sits the China Arms Testing &Training Target Field.For about 40 years,thousands of scientists and technicianshave made hundreds of greatachievements in the history of Chinesearms testing;among them are a lot ofunusual women making their own quietcontributions.

  7. On a Crowded Desert Island.

    Science.gov (United States)

    Rothstein, Samuel

    1989-01-01

    Suggests reference sources most appropriate for a desert island. In addition to "Robinson Crusoe" (Daniel Defoe) and a reference guide to the literature of travel, the list includes basic books on reference work, guides to reference sources, journals, an almanac, encyclopedias, a guide to English usage, and a book of quotations. (14 references)…

  8. 28 CFR 0.39b - Confidentiality of information.

    Science.gov (United States)

    2010-07-01

    ...-Office of Professional Responsibility § 0.39b Confidentiality of information. The Counsel shall not... necessary to carry out the authority of the Office of Professional Responsibility, including conducting an...

  9. Analysis of LYSA-calculus with explicit confidentiality annotations

    DEFF Research Database (Denmark)

    Gao, Han; Nielson, Hanne Riis

    2006-01-01

    Recently there has been an increased research interest in applying process calculi in the verification of cryptographic protocols due to their ability to formally model protocols. This work presents LYSA with explicit confidentiality annotations for indicating the expected behavior of target...... malicious activities performed by attackers as specified by the confidentiality annotations. The proposed analysis approach is fully automatic without the need of human intervention and has been applied successfully to a number of protocols....

  10. Desert Pathfinder at Work

    Science.gov (United States)

    2005-09-01

    The Atacama Pathfinder Experiment (APEX) project celebrates the inauguration of its outstanding 12-m telescope, located on the 5100m high Chajnantor plateau in the Atacama Desert (Chile). The APEX telescope, designed to work at sub-millimetre wavelengths, in the 0.2 to 1.5 mm range, passed successfully its Science Verification phase in July, and since then is performing regular science observations. This new front-line facility provides access to the "Cold Universe" with unprecedented sensitivity and image quality. After months of careful efforts to set up the telescope to work at the best possible technical level, those involved in the project are looking with satisfaction at the fruit of their labour: APEX is not only fully operational, it has already provided important scientific results. "The superb sensitivity of our detectors together with the excellence of the site allow fantastic observations that would not be possible with any other telescope in the world," said Karl Menten, Director of the group for Millimeter and Sub-Millimeter Astronomy at the Max-Planck-Institute for Radio Astronomy (MPIfR) and Principal Investigator of the APEX project. ESO PR Photo 30/05 ESO PR Photo 30/05 Sub-Millimetre Image of a Stellar Cradle [Preview - JPEG: 400 x 627 pix - 200k] [Normal - JPEG: 800 x 1254 pix - 503k] [Full Res - JPEG: 1539 x 2413 pix - 1.3M] Caption: ESO PR Photo 30/05 is an image of the giant molecular cloud G327 taken with APEX. More than 5000 spectra were taken in the J=3-2 line of the carbon monoxide molecule (CO), one of the best tracers of molecular clouds, in which star formation takes place. The bright peak in the north of the cloud is an evolved star forming region, where the gas is heated by a cluster of new stars. The most interesting region in the image is totally inconspicuous in CO: the G327 hot core, as seen in methanol contours. It is a truly exceptional source, and is one of the richest sources of emission from complex organic molecules in the

  11. Evaluation of stress experienced by soldiers wearing chemical protective clothing during varying work loads in desert or tropical environments. Final report

    Energy Technology Data Exchange (ETDEWEB)

    Hudgens, G.A.; Banderet, L.E.; Cadarette, B.S.

    1994-04-01

    A stress evaluation was conducted in a laboratory test in which the physiological and psychological reactions of soldiers were monitored while they wore either the standard battle dress overgarment (MOPPI) or the full complement of chemical protective clothing with mask (MOPPIV) and worked at low, moderate, or high work loads in simulated desert (hot and dry) or tropic (hot and humid) environments. The psychological instruments indicated greater stress responses for soldiers wearing MOPPIV than wearing MOPPI and for soldiers working at a high work load than working at a low work load. Chemical protective clothing, MOPPIV, Tropics, Desert, Psychological stress, Work load, MOPPI, Stress evaluation.

  12. Confidentiality, disclosure and doping in sports medicine.

    Science.gov (United States)

    McNamee, M; Phillips, N

    2011-03-01

    The manner in which healthcare and medical professionals serve their athlete patients is governed by a variety of relevant codes of conduct. A range of codified rules is presented that refer both the welfare of the patient and the maintaining of confidentiality, which is at the heart of trustworthy relations. The 2009 version of the World Anti-Doping Code (WADC), however, appears to oblige all healthcare professionals not to assist athletes if they are known to be engaged in doping behaviours under fear of removal from working with athletes from the respective sports. In contrast, serving the best interests of their athlete patients may oblige healthcare professionals to give advice and guidance, not least in terms of harm minimisation. In so far as the professional conduct of a healthcare professional is guided both by professional code and World Anti-Doping Code, they are obliged to fall foul of one or the other. We call for urgent and pressing inter-professional dialogue with the World Anti-Doping Agency to clarify this situation.

  13. Exercise Desert Rock Letter Orders. Army, Camp Desert Rock, Nevada.

    Science.gov (United States)

    1957-08-01

    WILF.iED J MSGT A19032i3 HJ;,ŕWAY, ELLafGzJN 8FC Xf,37791267 INOZ W, P. 1. PVT2 US52401808 KELLEY, JESSIE J SFC R1� EVaS, LOUIS PFC .,53073109...Ord Co (HAM) Camo Desert Rock, Nevada You will preeeed to Reynolds Funeral Vome, Sigourney, Iowa 0/a 24 AU ist 1957 for apprx fourteen (14) days to

  14. The practice of confidentiality in an Aboriginal medical service--what do GPs need to know?

    Science.gov (United States)

    James, Jenny; Cameron, Sonya; Usherwood, Tim

    2009-10-01

    The medical ethic of confidentiality is usually taught from a western ethical perspective based on the Hippocratic oath. This study at an urban Aboriginal medical service aimed to explore how confidentiality is understood in a community controlled Aboriginal health service, with a view to informing the training of general practitioners. Twenty-three people, comprising staff, patients and general practice registrars, were interviewed about confidentiality between July 2007 and February 2008. Six themes were identified: overlapping contexts of confidentiality, key sensitivities, sharing of patient information, importance of consent, multiple roles, and consequences of maintaining or breaching confidentiality. Perspectives on confidentiality in this community included issues of social justice, the importance of public demonstrations of confidentiality, and the challenge of protecting all relationships when staff have multiple roles. Incorporation of community perspectives into the teaching of confidentiality may help doctors to understand the responsibilities of practising confidentiality in certain communities.

  15. Psychological literacy: proceed with caution, construction ahead

    Science.gov (United States)

    Murdoch, Douglas D

    2016-01-01

    Psychological literacy is the ethical application of psychological skills and knowledge. This could benefit individuals in their personal, occupational, and civic lives and subsequently benefit society as a whole. We know that psychology has a wide-ranging impact on society. The potential benefits of a psychologically literate citizenry in improved parenting, better business practices, enlightened legislation, and many other areas make this a desirable goal. It has been proposed that this should become the primary goal of an undergraduate psychology education to benefit the majority who do not go on to graduate school and even those who only take a few psychology courses. This idea has significant merit and warrants further investigation and development. However, there are major concerns that need to be addressed. First, what are uniquely psychological skills and knowledge? Many of the skills psychology undergraduates acquire are generic to university and not specific to psychology. Second, psychology can be as harmful when misapplied as it can be beneficial when ethically applied. Third, psychology departments will need to address pragmatic as well as ethical issues, including issues of competency, boundaries, accountability, and confidentiality. Fourth, the available empirical evidence to direct such efforts is primarily at the anecdotal, case example, and pilot study stages. Significant improvements are needed in measuring psychological literacy, choice of outcome measures, and research methodologies before these advantages can be realized in an empirically supported manner. Currently, best practices in the undergraduate curriculum are the mindful and purposeful design of courses and experiential opportunities. It is proposed that psychological literacy is best conceptualized as a meta-literacy and that it should become a goal of psychology undergraduate education but not necessarily the goal. PMID:27540315

  16. Psychological literacy: proceed with caution, construction ahead.

    Science.gov (United States)

    Murdoch, Douglas D

    2016-01-01

    Psychological literacy is the ethical application of psychological skills and knowledge. This could benefit individuals in their personal, occupational, and civic lives and subsequently benefit society as a whole. We know that psychology has a wide-ranging impact on society. The potential benefits of a psychologically literate citizenry in improved parenting, better business practices, enlightened legislation, and many other areas make this a desirable goal. It has been proposed that this should become the primary goal of an undergraduate psychology education to benefit the majority who do not go on to graduate school and even those who only take a few psychology courses. This idea has significant merit and warrants further investigation and development. However, there are major concerns that need to be addressed. First, what are uniquely psychological skills and knowledge? Many of the skills psychology undergraduates acquire are generic to university and not specific to psychology. Second, psychology can be as harmful when misapplied as it can be beneficial when ethically applied. Third, psychology departments will need to address pragmatic as well as ethical issues, including issues of competency, boundaries, accountability, and confidentiality. Fourth, the available empirical evidence to direct such efforts is primarily at the anecdotal, case example, and pilot study stages. Significant improvements are needed in measuring psychological literacy, choice of outcome measures, and research methodologies before these advantages can be realized in an empirically supported manner. Currently, best practices in the undergraduate curriculum are the mindful and purposeful design of courses and experiential opportunities. It is proposed that psychological literacy is best conceptualized as a meta-literacy and that it should become a goal of psychology undergraduate education but not necessarily the goal.

  17. Seed dispersal of desert annuals.

    Science.gov (United States)

    Venable, D Lawrence; Flores-Martinez, Arturo; Muller-Landau, Helene C; Barron-Gafford, Greg; Becerra, Judith X

    2008-08-01

    We quantified seed dispersal in a guild of Sonoran Desert winter desert annuals at a protected natural field site in Tucson, Arizona, USA. Seed production was suppressed under shrub canopies, in the open areas between shrubs, or both by applying an herbicide prior to seed set in large, randomly assigned removal plots (10-30 m diameter). Seedlings were censused along transects crossing the reproductive suppression borders shortly after germination. Dispersal kernels were estimated for Pectocarya recurvata and Schismus barbatus from the change in seedling densities with distance from these borders via inverse modeling. Estimated dispersal distances were short, with most seeds traveling less than a meter. The adhesive seeds of P. recurvata went farther than the small S. barbatus seeds, which have no obvious dispersal adaptation. Seeds dispersed farther downslope than upslope and farther when dispersing into open areas than when dispersing into shrubs. Dispersal distances were short relative to the pattern of spatial heterogeneity created by the shrub and open space mosaic. This suggests that dispersal could contribute to local population buildup, possibly facilitating species coexistence. Overall, these results support the hypothesis that escape in time via delayed germination is likely to be more important for desert annuals than escape in space.

  18. The 13th Psychological Operations Battalion (EPW) during Mobilization, Desert Shield / Desert Storm and Demobilization

    Science.gov (United States)

    1993-05-10

    bus to a mess hall. Despite our late arrival, some fast talking by a few NCOs and a sympathetic mess steward secured for us a gourmet meal of...our premobilization preparation, I was most anxious to make introductions. We fast became friends and were to mutually cooperate in our taskinqs...8217Co Prayer." In this manner, we were able to deliver our psyop messages to the Iraqi EPW with maximum effectivfeness. FOOD P1 OBLEMS AND THE MEALS

  19. Network topology of the desert rose

    Directory of Open Access Journals (Sweden)

    Sigmund Mongstad Hope

    2015-09-01

    Full Text Available Desert roses are gypsum crystals that consist of intersecting disks. We determine their geometrical structure using computer assisted tomography. By mapping the geometrical structure onto a graph, the topology of the desert rose is analyzed and compared to a model based on diffusion limited aggregation. By comparing the topology, we find that the model gets a number of the features of the real desert rose right, whereas others do not fit so well.

  20. Improving Individual Acceptance of Health Clouds through Confidentiality Assurance.

    Science.gov (United States)

    Ermakova, Tatiana; Fabian, Benjamin; Zarnekow, Rüdiger

    2016-10-26

    Cloud computing promises to essentially improve healthcare delivery performance. However, shifting sensitive medical records to third-party cloud providers could create an adoption hurdle because of security and privacy concerns. This study examines the effect of confidentiality assurance in a cloud-computing environment on individuals' willingness to accept the infrastructure for inter-organizational sharing of medical data. We empirically investigate our research question by a survey with over 260 full responses. For the setting with a high confidentiality assurance, we base on a recent multi-cloud architecture which provides very high confidentiality assurance through a secret-sharing mechanism: Health information is cryptographically encoded and distributed in a way that no single and no small group of cloud providers is able to decode it. Our results indicate the importance of confidentiality assurance in individuals' acceptance of health clouds for sensitive medical data. Specifically, this finding holds for a variety of practically relevant circumstances, i.e., in the absence and despite the presence of conventional offline alternatives and along with pseudonymization. On the other hand, we do not find support for the effect of confidentiality assurance in individuals' acceptance of health clouds for non-sensitive medical data. These results could support the process of privacy engineering for health-cloud solutions.

  1. The right of minors to confidentiality and informed consent.

    Science.gov (United States)

    Weisleder, Pedro

    2004-02-01

    Doctor-patient confidentiality is a precept of adolescent medicine. In general, physicians honor the privacy of adolescents unless there is evidence that the youngster is engaging in dangerous activities. An otherwise healthy 16 year old was referred for headache evaluation. During the portion of the interview conducted outside the presence of his mother, the patient revealed using marijuana and cocaine regularly and LSD (lysergic acid diethylamide), hallucinogenic mushrooms, and "Ecstasy" (3,4-methylenedioxymethamphetamine) occasionally. Given this information, and as allowed by North Carolina's General Statutes, the patient was offered confidential treatment for illegal substance abuse; he declined the offer. He also turned down the request to forgo his right to privacy so that his parents could be made aware of his addiction. As a result of the patient's drug use and disregard of its consequences, it was determined that notification of a parent was essential to his life or health; thus, confidentiality was breached. Although substance abuse is a behavior that threatens the abuser's health and life, state and federal laws vary regarding the rights of minors to confidential evaluation and treatment. For this article, laws that govern minors' rights to consent to confidential treatment for illegal substance abuse were reviewed. The aforementioned case is used as a catalyst for discussion.

  2. Computer Security: confidentiality is everybody’s business

    CERN Multimedia

    Stefan Lueders, Computer Security Team

    2015-01-01

    Recently, a zip file with confidential information was mistakenly made public on one of CERN’s websites. Although the file was only intended for members of an internal committee, when placing it onto the CERN website, someone made a mistake when setting the access permissions and, thus, made the file accessible to everyone visiting the site!   Unfortunately, this is but one example of such mistakes. We have seen other documents made accessible to a much wider audience than originally intended… CERN takes serious measures to ensure the confidentiality of data. Confidential or “sensitive” documents (following the nomenclature set out in the CERN Data Protection Policy) deserve professional handling and access protections given only to the people who really need to access them. As such, they must not be widely circulated as attachments in e-mails and, most definitely, must not be stored on random public websites for the sole purpose of shari...

  3. Broadcast Channels with Confidential Messages by Randomness Constrained Stochastic Encoder

    CERN Document Server

    Watanabe, Shun

    2012-01-01

    In coding schemes for the wire-tap channel or the broadcast channels with confidential messages, it is well known that the sender needs to use a stochastic encoding to avoid the information about the transmitted confidential message to be leaked to an eavesdropper. In this paper, it is investigated that the trade-off between the rate of the random number to realize the stochastic encoding and the rates of the common, private, and confidential messages. For the direct theorem, the superposition coding scheme for the wire-tap channel recently proposed by Chia and El Gamal is employed, and its strong security is proved. The matching converse theorem is also established. Our result clarifies that a combination of the ordinary stochastic encoding and the channel prefixing by the channel simulation is suboptimal.

  4. 77 FR 69585 - Greenhouse Gas Reporting Program: Proposed Amendments and Confidentiality Determinations for...

    Science.gov (United States)

    2012-11-20

    ... AGENCY 40 CFR Part 98 Greenhouse Gas Reporting Program: Proposed Amendments and Confidentiality... rule titled ``Greenhouse Gas Reporting Program: Proposed Amendments and Confidentiality Determinations... is (202) 566- 1742. FOR FURTHER INFORMATION CONTACT: Carole Cook, Climate Change Division, Office...

  5. 75 FR 70235 - Access to Confidential Business Information by Industrial Economics, Incorporated

    Science.gov (United States)

    2010-11-17

    ... AGENCY Access to Confidential Business Information by Industrial Economics, Incorporated AGENCY... will authorize its contractor, Industrial Economics, Incorporated (IEc) to access Confidential Business..., Industrial Economics, Incorporated (IEc) will assist the Office of Enforcement and Compliance...

  6. 76 FR 69722 - Access to Confidential Business Information by Protection Strategies Incorporated

    Science.gov (United States)

    2011-11-09

    ... AGENCY Access to Confidential Business Information by Protection Strategies Incorporated AGENCY... access to the Toxic Substances Control Act (TSCA) confidential business information and to provide notice that this contract has been extended until December 31, 2011. Protection Strategies Incorporated (PSI...

  7. 49 CFR Appendix A to Part 512 - Certificate in Support of Request for Confidentiality

    Science.gov (United States)

    2010-10-01

    ...) NATIONAL HIGHWAY TRAFFIC SAFETY ADMINISTRATION, DEPARTMENT OF TRANSPORTATION CONFIDENTIAL BUSINESS... business to release the information for which a claim of confidentiality has been made to ascertain whether... of my knowledge, information and belief, the information for which (company) has claimed...

  8. 75 FR 28070 - Comment Request for Information Collection: “Confidentiality & Disclosure of State Unemployment...

    Science.gov (United States)

    2010-05-19

    ... Request for Information Collection: ``Confidentiality & Disclosure of State Unemployment Compensation... Confidentiality and Disclosure of State Unemployment Compensation Information final rule and State Income and.... ADDRESSEE: Submit written comments to the Employment and Training Administration, Office of Unemployment...

  9. 76 FR 10360 - Access to Confidential Business Information by Guident Technologies Inc. and Its Identified...

    Science.gov (United States)

    2011-02-24

    ... AGENCY Access to Confidential Business Information by Guident Technologies Inc. and Its Identified... contractor, Guident Technologies, Inc. of Herndon, VA and Its Identified Subcontractors, to access...). Some of the information may be claimed or determined to be Confidential Business Information...

  10. 77 FR 76028 - Access to Confidential Business Information by Science Applications International Corporation and...

    Science.gov (United States)

    2012-12-26

    ... AGENCY Access to Confidential Business Information by Science Applications International Corporation and... (EPA). ACTION: Notice. SUMMARY: EPA has authorized its contractor, Science Applications International... (TSCA). Some of the information may be claimed or determined to be Confidential Business...

  11. Independent consultants : fiduciary duties, trade secrets and confidential information

    Energy Technology Data Exchange (ETDEWEB)

    Fraser, B.; Wilhelmson, M. [McCarthy Tetrault, Vancouver, BC (Canada)

    1999-07-01

    Because of cutbacks and downsizing within the petroleum industry, it has become one of the largest users of contract personnel to provide services that were previously provided by senior levels of management. This paper explored the application of common law fiduciary duties and the duty of confidence to the independent workforce. It examined to what extent fiduciary duties apply to independent consultants and the best way for the employer to protect itself from the potentialmisuse of confidential information. Part 1 of the paper described fiduciary duties. A fiduciary relationship was described as one that possesses the following three characteristics: (1) the fiduciary has scope for the exercise of some discretion of power, (2) the fiduciary can unilaterally exercise that power to affect the beneficiary's practical interests, and (3) the beneficiary is peculiarly vulnerable to the fiduciary holding the discretion of power. Three examples of how the courts treated some arguments regarding fiduciaries were presented. Part 2 of this paper discussed how trade secrets and confidential information should be handled. It was explained, that regardless of fiduciary duties, the unauthorized use of confidential information by an independent contractor can give rise to liability and an award of damages by the courts. Some examples where the Supreme Court of Canada found breach of confidence by a party were presented. Information communicated from an employer to an employee can be divided into the following three categories: (1) publicly accessible and not confidential, (2) confidential and must be treated as such while an employee is employed, but if learned becomes part of the employees skill and knowledge, and (3) specific confidential trade secrets that cannot lawfully be used for anyone's benefit but the employer's. Issues regarding defining rights and obligations by contract were also discussed.

  12. Independent consultants : fiduciary duties, trade secrets and confidential information

    Energy Technology Data Exchange (ETDEWEB)

    Fraser, B.; Wilhelmson, M. [McCarthy Tetrault, Vancouver, BC (Canada)

    1999-10-01

    Because of cutbacks and downsizing within the petroleum industry, it has become one of the largest users of contract personnel to provide services that were previously provided by senior levels of management. This paper explored the application of common law fiduciary duties and the duty of confidence to the independent workforce. It examined to what extent fiduciary duties apply to independent consultants and the best way for the employer to protect itself from the potential misuse of confidential information. Part 1 of the paper described fiduciary duties. A fiduciary relationship was described as one that possesses the following three characteristics: (1) the fiduciary has scope for the exercise of some discretion of power, (2) the fiduciary can unilaterally exercise that power to affect the beneficiary`s practical interests, and (3) the beneficiary is peculiarly vulnerable to the fiduciary holding the discretion of power. Three examples of how the courts treated some arguments regarding fiduciaries were presented. Part 2 of this paper discussed how trade secrets and confidential information should be handled. It was explained, that regardless of fiduciary duties, the unauthorized use of confidential information by an independent contractor can give rise to liability and an award of damages by the courts. Some examples where the Supreme Court of Canada found breach of confidence by a party were presented. Information communicated from an employer to an employee can be divided into the following three categories: (1) publicly accessible and not confidential, (2) confidential and must be treated as such while an employee is employed, but if learned becomes part of the employees skill and knowledge, and (3) specific confidential trade secrets that cannot lawfully be used for anyone`s benefit but the employer`s. Issues regarding defining rights and obligations by contract were also discussed.

  13. Balancing confidentiality and collaboration within multidisciplinary health care teams.

    Science.gov (United States)

    Van Liew, Julia R

    2012-12-01

    As multidisciplinary perspectives are increasingly integrated into the treatment of health problems, opportunities for clinical psychologists in medical settings are expanding. Although cross-discipline collaboration is at the core of multidisciplinary treatment models, psychologists must be particularly cautious about information sharing due to their profession's ethical standards regarding patient confidentiality. Psychologists' ethical obligations require them to achieve a delicate balance between contributing to the treatment team and protecting patient confidentiality. In the current review, relevant ethical standards and federal guidelines are applied to everyday practices of clinical psychologists in medical settings. Additionally, recommendations for individual psychologists, health care organizations, and graduate training programs are presented.

  14. Cognitive Interference Channels with Confidential Messages under Randomness Constraint

    CERN Document Server

    Watanabe, Shun

    2012-01-01

    The cognitive interference channel with confidential messages (CICC) proposed by Liang et. al. is investigated. When the security is considered in coding systems, it is well known that the sender needs to use a stochastic encoding to avoid the information about the transmitted confidential message to be leaked to an eavesdropper. For the CICC, the trade-off between the rate of the random number to realize the stochastic encoding and the communication rates is investigated, and the optimal trade-off is completely characterized.

  15. Off-Road and the Fragile Desert

    Science.gov (United States)

    Stebbins, Robert C.

    1974-01-01

    Part one of a two-part article sets forth the dimensions and the political-cultural aspects of the use of off-road vehicles in desert areas. Presents arguments for and against off-road vehicle use on national-resource land as exemplified in the California Desert. (Editor/JR)

  16. A River in the Desert

    Institute of Scientific and Technical Information of China (English)

    杨仲言

    1994-01-01

    The Arabian Peninsula today is a barren desert. But 6,000 yearsago, says Farouk El-Baz,a river ran through the heart of the peninsula.From the Hijaz Mountains in western Saudi Arabia, it flowed 530 milesnortheast, emptying into the Persian Gulf through a delta that coveredmost of present day Kuwait. The Kuwait River, as El-Baz has dubbedit, averaged 5 miles wide and 50 feet deep along its entire length, and itcarried gravel from the Hijaz all the way to Kuwait. "It must have been amighty river, "says El-Baz.

  17. 45 CFR 5.65 - Exemption four: Trade secrets and confidential commercial or financial information.

    Science.gov (United States)

    2010-10-01

    ... be expected if the information is disclosed? (c) Designation of certain confidential information. A... Exemption four: Trade secrets and confidential commercial or financial information. We will withhold trade... confidential. (a) Trade secrets. A trade secret is a secret, commercially valuable plan, formula, process,...

  18. 12 CFR 978.7 - Third party requests for confidential information.

    Science.gov (United States)

    2010-01-01

    ... LOAN BANK OPERATIONS AND AUTHORITIES BANK REQUESTS FOR INFORMATION § 978.7 Third party requests for confidential information. (a) General. In the event a Bank receives a request for confidential information in... to any third party. A Bank shall refer all third party requests for such confidential information to...

  19. 12 CFR 261.16 - Request for access to confidential commercial or financial information.

    Science.gov (United States)

    2010-01-01

    ... Information and Records Available to Public; Procedures for Requests § 261.16 Request for access to confidential commercial or financial information. (a) Request for confidential information. A request by a submitter for confidential treatment of any information shall be considered in connection with a request for...

  20. Confidentiality-Preserving Data Publishing for Credulous Users by Extended Abduction

    CERN Document Server

    Inoue, Katsumi; Wiese, Lena

    2011-01-01

    Publishing private data on external servers incurs the problem of how to avoid unwanted disclosure of confidential data. We study a problem of confidentiality in extended disjunctive logic programs and show how it can be solved by extended abduction. In particular, we analyze how credulous non-monotonic reasoning affects confidentiality.

  1. 43 CFR 20.203 - Exclusion from confidential financial disclosure requirement for certain special Government...

    Science.gov (United States)

    2010-10-01

    ... § 20.203 Exclusion from confidential financial disclosure requirement for certain special Government... reporting requirements of the OGE Form 450. Any confidential financial disclosure requirement must be... 43 Public Lands: Interior 1 2010-10-01 2010-10-01 false Exclusion from confidential...

  2. 77 FR 12284 - Access to Confidential Business Information; Protection Strategies Incorporated

    Science.gov (United States)

    2012-02-29

    ... AGENCY Access to Confidential Business Information; Protection Strategies Incorporated AGENCY... Strategies Incorporated (PSI) of Arlington, VA, to access information which has been submitted to EPA under... determined to be Confidential Business Information (CBI). DATES: Access to the confidential data occurred on...

  3. 75 FR 4812 - Inquiry To Learn Whether Businesses Assert Business Confidentiality Claims

    Science.gov (United States)

    2010-01-29

    ... AGENCY Inquiry To Learn Whether Businesses Assert Business Confidentiality Claims AGENCY: Environmental... business confidentiality covering any of that information at the time of submission. As set forth in the... confidentiality claim.\\13\\ Nevertheless, other businesses identified or referenced in the same documents that were...

  4. 76 FR 362 - Inquiry To Learn Whether Businesses Assert Business Confidentiality Claims

    Science.gov (United States)

    2011-01-04

    ... AGENCY Inquiry To Learn Whether Businesses Assert Business Confidentiality Claims AGENCY: Environmental... not assert a claim of business confidentiality covering any of that information at the time of..., cannot later make a confidentiality claim.\\13\\ Nevertheless, other businesses identified or referenced in...

  5. 77 FR 43803 - Confidentiality of Information; Magnuson-Stevens Fishery Conservation and Management...

    Science.gov (United States)

    2012-07-26

    ... National Oceanic and Atmospheric Administration 50 CFR Part 600 RIN 0648-AV81 Confidentiality of... regulations to revise existing regulations governing the confidentiality of information submitted in... some significant issues that concern NMFS' application of the MSA confidentiality provision to requests...

  6. 77 FR 35349 - Confidentiality of Information; Magnuson-Stevens Fishery Conservation and Management...

    Science.gov (United States)

    2012-06-13

    ... National Oceanic and Atmospheric Administration 50 CFR Part 600 RIN 0648-AV81 Confidentiality of... regulations governing the confidentiality of information submitted in compliance with any requirement or... some significant issues that concern NMFS' application of the MSA confidentiality provision to requests...

  7. 75 FR 44951 - Inquiry To Learn Whether Businesses Assert Business Confidentiality Claims

    Science.gov (United States)

    2010-07-30

    ... Learn Whether Businesses Assert Business Confidentiality Claims AGENCY: Environmental Protection Agency... through 266 and 268, and did not assert a claim of business confidentiality covering any of that... [business confidentiality] claim accompanies the information when it is received by EPA, it may be made...

  8. CRAC: Confidentiality Risk Analysis and IT-Architecture Comparison of Business Networks (extended version)

    NARCIS (Netherlands)

    Morali, A.; Zambon, Emmanuele; Etalle, Sandro; Wieringa, Roelf J.

    2009-01-01

    The leakage of confidential information (e.g.\\ industrial secrets, patient records and user credentials) is one of the risks that have to be accounted for and mitigated by organizations dealing with confidential data. Unfortunately, assessing confidentiality risk is challenging, particularly in the

  9. 75 FR 59708 - Agency Information Collection Activities; Proposed Collection; Comment Request; Confidentiality...

    Science.gov (United States)

    2010-09-28

    ... Information Collection Activities; Proposed Collection; Comment Request; Confidentiality Rules (Renewal... this action are businesses or other for-profit entities. Title: Confidentiality Rules (Renewal). ICR... protect the confidentiality of information as well as the rights of the public to obtain access to...

  10. 44 CFR 5.57 - Predisclosure notification procedures for confidential commercial information.

    Science.gov (United States)

    2010-10-01

    ... company that the information in question is in fact confidential commercial or financial information and... procedures for confidential commercial information. 5.57 Section 5.57 Emergency Management and Assistance... INFORMATION Described Records § 5.57 Predisclosure notification procedures for confidential commercial...

  11. 78 FR 66697 - Access to Confidential Business Information by Science Applications International Corporation and...

    Science.gov (United States)

    2013-11-06

    ... AGENCY Access to Confidential Business Information by Science Applications International Corporation and...: EPA has authorized its contractor, Science Applications International Corporation (SAIC) of McLean, VA... Confidential Business Information (CBI). DATES: Access to the confidential data occurred on or about August...

  12. Simplified analysis of naturally ventilated desert buildings

    Energy Technology Data Exchange (ETDEWEB)

    Mathews, E.H.; Richards, P.G.; Rousseau, P.G. (Pretoria Univ. (South Africa). Dept. of Mechanical Engineering); Etzion, Y.; Erell, E. (Ben-Gurion Univ. of the Negev, Sede Boqer (Israel). J. Blaustein Inst. for Desert Research)

    1992-10-01

    The verification of a simplified thermal analysis procedure and its application to naturally ventilated desert buildings are discussed. Measurements for buildings in the Negev Desert, made independently by the Desert Architecture Unit of the Jacob Blaustein Institute for Desert Research, were inter alia used to verify the simplified thermal analysis procedure QUICK, developed by the Centre for Experimental and Numerical Thermoflow. As detailed information for validation purposes is not always readily available to researchers, the measurements as well as the buildings' descriptions are given in detail in this paper. The effect of natural ventilation strategies on the indoor air temperatures is also investigated for the desert buildings. A simplified but novel procedure to calculate the air change rates through the building from the measured wind speeds, building geometry and surroundings is proposed. Hourly air change rates determined with the proposed procedure are employed in the simulations with QUICK. (author)

  13. Psychological Treatment

    Science.gov (United States)

    ... IBS Pain IBS Global Treatments IBS Diet Low FODMAP Diet Complimentary or Alt Treatments Medications Psychological Treatments ... IBS Pain IBS Global Treatments IBS Diet Low FODMAP Diet Complimentary or Alt Treatments Medications Psychological Treatments ...

  14. Discursive Psychology

    NARCIS (Netherlands)

    Molder, te H.

    2015-01-01

    Discursive psychology was established in the United Kingdom by the end of the 1980s, mainly in response to the dominant cognitivist approach in social psychology. While it borrowed notions from poststructuralism and sociology of science, it is most akin to conversation analysis. Discursive psycholog

  15. Positive Psychology

    Science.gov (United States)

    Peterson, Christopher

    2009-01-01

    Positive psychology is a deliberate correction to the focus of psychology on problems. Positive psychology does not deny the difficulties that people may experience but does suggest that sole attention to disorder leads to an incomplete view of the human condition. Positive psychologists concern themselves with four major topics: (1) positive…

  16. Confidencialidad e intimidad Confidentiality and privacy

    Directory of Open Access Journals (Sweden)

    M. Iraburu

    2006-01-01

    patients frequently continues to be violated, perhaps because we live in a society that trivialises these questions, and the health milieu is not immune to this way of thinking. Besides, the new information technologies have added a new danger by enormously facilitating access to personal data. This article reviews the ethical and legal aspects of this issue, the results of research carried out on the way the professionals of eight Spanish hospitals deal with confidentiality, and some recommendations are outlined in an attempt to encourage reflection by the professionals who interact in a scenario where the patient is obliged to lay himself bare in body and soul.

  17. 20 CFR 726.113 - Disclosure of confidential information.

    Science.gov (United States)

    2010-04-01

    ... information. Any financial information or records, or other information relating to the business of an... 20 Employees' Benefits 3 2010-04-01 2010-04-01 false Disclosure of confidential information. 726.113 Section 726.113 Employees' Benefits EMPLOYMENT STANDARDS ADMINISTRATION, DEPARTMENT OF LABOR...

  18. 48 CFR 9903.202-4 - Privileged and confidential information.

    Science.gov (United States)

    2010-10-01

    ... Statement contains trade secrets and commercial or financial information, which is privileged and... confidential information. 9903.202-4 Section 9903.202-4 Federal Acquisition Regulations System COST ACCOUNTING STANDARDS BOARD, OFFICE OF FEDERAL PROCUREMENT POLICY, OFFICE OF MANAGEMENT AND BUDGET PROCUREMENT PRACTICES...

  19. 48 CFR 1415.207-71 - Confidentiality of proposal evaluation.

    Science.gov (United States)

    2010-10-01

    ... the Government for evaluation or advice shall be approved in writing by the HCA; (2) Outside... proposal evaluation. 1415.207-71 Section 1415.207-71 Federal Acquisition Regulations System DEPARTMENT OF... Receipt of Proposals and Information 1415.207-71 Confidentiality of proposal evaluation. (a)...

  20. 15 CFR 30.60 - Confidentiality of Electronic Export Information.

    Science.gov (United States)

    2010-01-01

    ... 15 Commerce and Foreign Trade 1 2010-01-01 2010-01-01 false Confidentiality of Electronic Export Information. 30.60 Section 30.60 Commerce and Foreign Trade Regulations Relating to Commerce and Foreign Trade BUREAU OF THE CENSUS, DEPARTMENT OF COMMERCE FOREIGN TRADE REGULATIONS General Administrative...

  1. 50 CFR 229.11 - Confidential fisheries data.

    Science.gov (United States)

    2010-10-01

    ... 50 Wildlife and Fisheries 7 2010-10-01 2010-10-01 false Confidential fisheries data. 229.11 Section 229.11 Wildlife and Fisheries NATIONAL MARINE FISHERIES SERVICE, NATIONAL OCEANIC AND ATMOSPHERIC ADMINISTRATION, DEPARTMENT OF COMMERCE MARINE MAMMALS AUTHORIZATION FOR COMMERCIAL FISHERIES UNDER THE...

  2. 40 CFR 144.5 - Confidentiality of information.

    Science.gov (United States)

    2010-07-01

    ... Section 144.5 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) WATER PROGRAMS... submissions, by stamping the words “confidential business information” on each page containing such... which deals with the existence, absence, or level of contaminants in drinking water....

  3. Ethics in health care: confidentiality and information technologies

    African Journals Online (AJOL)

    Ethics CPD Supplement: Ethics in health care: confidentiality and information technologies. S3. Vol 56 No 1 ... on assuring that action is taken that is in the patient's best interests. .... that “all patients have a right to confidentiality”.10 This is also in .... multitasking-a-medical-and-mental-hazard-201201074063. 6. Knapp van ...

  4. 18 CFR 706.410 - Confidentiality of statements.

    Science.gov (United States)

    2010-04-01

    ... EMPLOYEE RESPONSIBILITIES AND CONDUCT Statements of Employment and Financial Interests § 706.410 Confidentiality of statements. Each statement of employment and financial interests, and each supplementary... decision of the Director for good cause shown: Provided, That information from a statement or...

  5. Confidential data in a competitive utility environment: A regulatory perspective

    Energy Technology Data Exchange (ETDEWEB)

    Vine, E.

    1996-08-01

    Historically, the electric utility industry has been regarded as one of the most open industries in the United States in sharing information but their reputation is being challenged by competitive energy providers, the general public, regulators, and other stakeholders. As the prospect of competition among electricity power providers has increased in recent years, many utilities have been requesting that the data they submit to their utility regulatory commissions remain confidential. Withholding utility information from the public is likely to have serious and significant policy implications with respect to: (1) consumer education, the pursuit of truth, mutual respect among parties, and social cooperation; (2) the creation of a fair market for competitive energy services; (3) the regulatory balance; (4) regional and national assessments of energy-savings opportunities; (5) research and development; and (6) evaluations of utility programs, plans, and policies. In a telephone survey of all public utility commissions (PUCs) that regulate electric and gas utilities in the U.S., we found that almost all PUCs have received requests from utility companies for data to be filed as confidential, and confidential data filings appear to have increased (both in scope and in frequency) in those states where utility restructuring is being actively discussed. The most common types of data submitted as confidential by utilities dealt with specific customer data, market data, avoided costs, and utility costs.

  6. 36 CFR 296.18 - Confidentiality of archaeological resource information.

    Science.gov (United States)

    2010-07-01

    ... archaeological resource information. 296.18 Section 296.18 Parks, Forests, and Public Property FOREST SERVICE... Confidentiality of archaeological resource information. (a) The Federal land manager shall not make available to... provision of law, information concerning the nature and location of any archaeological resource, with...

  7. 32 CFR 229.18 - Confidentiality of archaeological resource information.

    Science.gov (United States)

    2010-07-01

    ... § 229.18 Confidentiality of archaeological resource information. (a) The Federal land manager shall not... provision of law, information concerning the nature and location of any archaeological resource, with the... archaeological resource or area about which information is sought; (ii) The purpose for which the information...

  8. [Confidentiality in medical oaths: (When the white crow becomes gray...)].

    Science.gov (United States)

    Gelpi, R J; Pérez, M L; Rancich, A M; Mainetti, J A

    2000-01-01

    Confidentiality, together with the ethical principles of beneficence and non-maleficence, is the most important rule in Medical Oaths at the present time. However, the scientific-technical advances in medicine have made this rule one of the most controversial ones because of its exceptions. In consequence, the aim of the present paper is to comparatively analyze the rule of confidentiality in Medical Oaths of different places, times, origins and in different versions of the Hippocratic Oath in order to determine what should be kept a secret and with what degree of commitment (absolute or "prima facie"). Of the thirty six analyzed Oaths, twenty-seven manifest this rule and nine do not. No relation was found between the manifestation of this rule and the place, time, origin and different versions of the Hippocratic Oath. Most pledges suggest not to reveal what has been seen or heard during the medical act, the same as in the Hippocratic Oath. Seven texts point out that confidentiality should be absolute and four give exceptions in connection with beneficence and justice principles and the moral duty of causing no damage to third parties. Two pledges specify protection of privacy. In conclusion, today confidentiality is considered to be a moral duty for the benefit of the patient and out of consideration for his autonomy; however, at the present time in medicine the duty of keeping absolute secrecy is being reconsidered.

  9. Confidentiality for Probabilistic Multi-Threaded Programs and Its Verification

    NARCIS (Netherlands)

    Ngo, Minh Tri; Stoelinga, Mariëlle Ida Antoinette; Huisman, Marieke

    2012-01-01

    Confidentiality is an important concern in today's information society: electronic payment and personal data should be protected appropriately. This holds in particular for multi-threaded applications, which are generally seen the future of high-performance computing. Multi-threading poses new

  10. Understanding the Code: exceptions to the duty of patient confidentiality.

    Science.gov (United States)

    Griffith, Richard

    2015-07-01

    Last month's article considered the scope of a district nurse's duty to maintain the confidentiality of patient information under the Nursing and Midwifery Council (NMC) Code, their contract of employment, and the law. This month, Richard Griffith considers the exceptions to these duties and sets out when a district nurse would be justified in disclosing patient information.

  11. IT Confidentiality Risk Assessment for an Architecture-Based Approach

    NARCIS (Netherlands)

    Morali, A.; Zambon, Emmanuele; Etalle, Sandro; Overbeek, Paul

    2008-01-01

    Information systems require awareness of risks and a good understanding of vulnerabilities and their exploitations. In this paper, we propose a novel approach for the systematic assessment and analysis of confidentiality risks caused by disclosure of operational and functional information. The

  12. Confidentiality of Substance Use Disorder Patient Records. Final rule.

    Science.gov (United States)

    2017-01-18

    The Department of Health and Human Services (HHS) is issuing this final rule to update and modernize the Confidentiality of Alcohol and Drug Abuse Patient Records regulations and facilitate information exchange within new health care models while addressing the legitimate privacy concerns of patients seeking treatment for a substance use disorder. These modifications also help clarify the regulations and reduce unnecessary burden.

  13. Victim Confidentiality on Sexual Assault Response Teams (SART)

    Science.gov (United States)

    Cole, Jennifer

    2011-01-01

    The purpose of this study is to examine how professionals and paraprofessionals involved with a Sexual Assault Response Team (SART) understand and navigate different professional statutory requirements for victim confidentiality. Telephone surveys are conducted with 78 professionals: medical (27.8%), criminal justice (44.3%), and victim advocacy…

  14. Participants' safety versus confidentiality: A case study of HIV research.

    Science.gov (United States)

    Leyva-Moral, Juan Manuel; Feijoo-Cid, Maria

    2017-05-01

    Background When conducting qualitative research, participants usually share lots of personal and private information with the researcher. As researchers, we must preserve participants' identity and confidentiality of the data. Objective To critically analyze an ethical conflict encountered regarding confidentiality when doing qualitative research. Research design Case study. Findings and discussion one of the participants in a study aiming to explain the meaning of living with HIV verbalized his imminent intention to commit suicide because of stigma of other social problems arising from living with HIV. Given the life-threatening situation, the commitment related to not disclosing the participant's identity and/or the content of the interview had to be broken. To avoid or prevent suicide, the therapist in charge of the case was properly informed about the participant's intentions. One important question arises from this case: was it ethically appropriate to break the confidentiality commitment? Conclusion confidentiality could be broken if a life-threatening event is identified during data collection and participants must know that. This has to be clearly stated in the informed consent form.

  15. Decisions about Confidentiality in Medical Student Mental Health Settings.

    Science.gov (United States)

    Lindenthal, Jacob Jay; And Others

    1984-01-01

    Examined responses of psychologists and psychiatrists in medical schools (N=59) to vignettes representing student problems. Results suggested practitioners were generally unwilling to break confidentiality in response to problems involving suicidal tendencies, sexual coercion/seduction, social transgressions, or falsifying data. Only suggestions…

  16. Effective verification of confidentiality for multi-threaded programs

    NARCIS (Netherlands)

    Ngo, Minh Tri; Stoelinga, Mariëlle; Huisman, Marieke

    2014-01-01

    This paper studies how confidentiality properties of multi-threaded programs can be verified efficiently by a combination of newly developed and existing model checking algorithms. In particular, we study the verification of scheduler-specific observational determinism (SSOD), a property that charac

  17. Zerber: r-Confidential Indexing for Distributed Documents

    NARCIS (Netherlands)

    Zerr, Sergej; Demidova, Elena; Olmedilla, Daniel; Nejdl, Wolfgang; Winslett, Marianne; Mitra, Soumyadeb

    2008-01-01

    Zerr, S., Demidova, E., Olmedilla, D., Nejdl, W., Winslett, M., & Mitra, S. (2008). Zerber: r-Confidential Indexing for Distributed Documents. In J. Teubner (Eds.), Proceedings of the 11th International Conference on Extending Database Technology (pp. 287-298). March, 25-29, 2008, Nantes, France.

  18. 15 CFR 295.9 - Protection of confidential information.

    Science.gov (United States)

    2010-01-01

    ... confidential basis in connection with the activities of any business or joint research and development venture...) Information on the business operation of any member of the business or joint venture; (2) Trade secrets possessed by any business or any member of the joint venture....

  19. IT Confidentiality Risk Assessment for an Architecture-Based Approach

    NARCIS (Netherlands)

    Morali, A.; Zambon, Emmanuele; Etalle, Sandro; Overbeek, Paul

    2008-01-01

    Information systems require awareness of risks and a good understanding of vulnerabilities and their exploitations. In this paper, we propose a novel approach for the systematic assessment and analysis of confidentiality risks caused by disclosure of operational and functional information. The appro

  20. Secondary School Administrators' Attitudes toward Confidentiality in School Counseling

    Science.gov (United States)

    O'Connell, William P.

    2012-01-01

    The school counseling literature emphasizes the importance of confidentiality in the counseling relationship. In some circumstances, school policy may require disclosure of content discussed in counseling unrelated to threat of harm to self or others. This pilot study investigated secondary school principals' attitudes toward the practice of…

  1. 19 CFR 103.35 - Confidential commercial information; exempt.

    Science.gov (United States)

    2010-04-01

    ... confidential and will not be disclosed pursuant to a Freedom of Information Act (FOIA) request or otherwise... supported by a statement by an authorized representative of the business entity providing specific... and that the information has not been disclosed to the public; or (ii) CBP has reason to believe that...

  2. 18 CFR 1b.20 - Request for confidential treatment.

    Science.gov (United States)

    2010-04-01

    ... 18 Conservation of Power and Water Resources 1 2010-04-01 2010-04-01 false Request for confidential treatment. 1b.20 Section 1b.20 Conservation of Power and Water Resources FEDERAL ENERGY REGULATORY... disclosure requirements of the Freedom of Information Act (5 U.S.C. 552), is information referred to in 18...

  3. 18 CFR 1b.9 - Confidentiality of investigations.

    Science.gov (United States)

    2010-04-01

    ... 18 Conservation of Power and Water Resources 1 2010-04-01 2010-04-01 false Confidentiality of investigations. 1b.9 Section 1b.9 Conservation of Power and Water Resources FEDERAL ENERGY REGULATORY COMMISSION... Freedom of Information Act disclosure are set forth in 18 CFR part 3b and § 1b.20. A request...

  4. Data security and patient confidentiality: the manager's role.

    Science.gov (United States)

    Fisher, F; Madge, B

    1996-10-01

    The maintenance of patient confidentiality is of utmost importance in the doctor patient relationship. With the advent of networks such as the National Health Service Wide Area Network in the UK, the potential to transmit identifiable clinical data will become greater. Links between general practitioners (GPs) and hospitals will allow the rapid transmission of data which if intercepted could be potentially embarrassing to the patient concerned. In 1994 the British Medical Association launched a draft bill on privacy and confidentiality and in association with this bill it is pushing for encryption of all clinical data across electronic networks. The manager's role within an acute hospital, community units and general practice, is to ensure that all employees are aware of the principles of data protection, security of hospital computer systems and that no obvious breaches of security can occur at publicly accessible terminals. Managers must be kept up to date with the latest developments in computer security such as digital signatures and be prepared to instigate these developments where practically possible. Managers must also take responsibility for the monitoring of access to terminals and be prepared to deal severely with staff who breach the code of confidentiality. Each manager must be kept informed of employees status with regard to their 'need to know' clearance level and also to promote confidentiality of patient details throughout the hospital. All of the management team must be prepared to train new staff in the principles of data security as they join the organisation and recognise their accountability if the programme fails. Data security and patient confidentiality is a broad responsibility in any healthcare organisation, with the Chief Executive accountable. In family practice, the partners are responsible and accountable. The British Medical Association believes as a matter of policy, that allowing access to personal health data without the patients

  5. Deserts

    DEFF Research Database (Denmark)

    Graulund, Rune

    2016-01-01

    , comic sketches and lyrical reveries; travel writing is now a crucial focus for discussion across many subjects within the humanities and social sciences. An ideal starting point for beginners, but also offering new perspectives for those familiar with the field, The Routledge Companion to Travel Writing...

  6. Deserts

    DEFF Research Database (Denmark)

    Graulund, Rune

    2016-01-01

    , comic sketches and lyrical reveries; travel writing is now a crucial focus for discussion across many subjects within the humanities and social sciences. An ideal starting point for beginners, but also offering new perspectives for those familiar with the field, The Routledge Companion to Travel Writing...

  7. Exploring confidentiality in the context of nurse whistle blowing: issues for nurse managers.

    Science.gov (United States)

    Jackson, Debra; Peters, Kath; Hutchinson, Marie; Edenborough, Michel; Luck, Lauretta; Wilkes, Lesley

    2011-07-01

    The aim of this paper is to reveal the experiences and meaning of confidentiality for Australian nurses in the context of whistle blowing. Despite the ethical, legal and moral importance of confidentiality within the health-care context, little work has addressed the implications of confidentially related to whistle-blowing events. The study used qualitative narrative inquiry. Eighteen Australian nurses, with first-hand experience of whistle blowing, consented to face-to-face semi-structured interviews. Four emergent themes relating to confidentiality were identified: (1) confidentiality as enforced silence; (2) confidentiality as isolating and marginalizing; (3) confidentiality as creating a rumour mill; and (4) confidentiality in the context of the public's 'right to know'. The interpretation and application of confidentiality influences the outcomes of whistle blowing within the context of health-care services. Conversely, confidentially can be a protective mechanism for health-care institutions. It is beholden upon nurse manager to carefully risk manage whistle-blowing events. It is important that nurse managers are aware of the consequences of their interpretation and application of confidentiality to whistle-blowing events, and the potentially competing outcomes for individuals and the institution. © 2011 The Authors. Journal compilation © 2011 Blackwell Publishing Ltd.

  8. Microphytic crusts: 'topsoil' of the desert

    Science.gov (United States)

    Belnap, Jayne

    1990-01-01

    Deserts throughout the world are the home of microphytic, or cryptogamic, crusts. These crusts are dominated by cyanobacteria, previously called blue-green algae, and also include lichens, mosses, green algae, microfungi and bacteria. They are critical components of desert ecosystems, significantly modifying the surfaces on which they occur. In the cold deserts of the Colorado Plateau (including parts of Utah, Arizona, Colorado, and New Mexico), these crusts are extraordinarily well-developed, and may represent 70-80% of the living ground cover.

  9. Desert National Wildlife Range Wilderness study summary

    Data.gov (United States)

    US Fish and Wildlife Service, Department of the Interior — This document is a summary of a wilderness study done of the Desert National Wildlife Range pursuant to the Wilderness Act of 1964. It provides information as to the...

  10. Proposed Desert Pupfish Preserve : Supplemental LARC Report

    Data.gov (United States)

    US Fish and Wildlife Service, Department of the Interior — This document contains supplements to a previous report on the desert pupfish preserve proposal. The attachments are titled: “Vertebrate Animals and Vascular...

  11. Psychological Empowerment

    OpenAIRE

    Flohrer, Nick

    2014-01-01

    Instilling psychological empowerment in employees is one of the most important tasks of modern leadership. Building on quantitative research and the development of a new psychometric scale related to project management this thesis shows: First, individuals' characteristics and their work team environment influence perceptions of access to information and resources – two important antecedents of psychological empowerment. Second, while a project briefing strengthens the link of the psychologic...

  12. [Political psychology].

    Science.gov (United States)

    Resch, Mária; Bella, Tamás

    2013-04-21

    In Hungary one can mostly find references to the psychological processes of politics in the writings of publicists, public opinion pollsters, philosophers, social psychologists, and political analysts. It would be still important if not only legal scientists focusing on political institutions or sociologist-politologists concentrating on social structures could analyse the psychological aspects of political processes; but one could also do so through the application of the methods of political psychology. The authors review the history of political psychology, its position vis-à-vis other fields of science and the essential interfaces through which this field of science, which is still to be discovered in Hungary, connects to other social sciences. As far as its methodology comprising psycho-biographical analyses, questionnaire-based queries, cognitive mapping of interviews and statements are concerned, it is identical with the psychiatric tools of medical sciences. In the next part of this paper, the focus is shifted to the essence and contents of political psychology. Group dynamics properties, voters' attitudes, leaders' personalities and the behavioural patterns demonstrated by them in different political situations, authoritativeness, games, and charisma are all essential components of political psychology, which mostly analyses psychological-psychiatric processes and also involves medical sciences by relying on cognitive and behavioural sciences. This paper describes political psychology, which is basically part of social sciences, still, being an interdisciplinary science, has several ties to medical sciences through psychological and psychiatric aspects.

  13. Is patient confidentiality compromised with the electronic health record?: a position paper.

    Science.gov (United States)

    Wallace, Ilse M

    2015-02-01

    In order for electronic health records to fulfill their expected benefits, protection of privacy of patient information is key. Lack of trust in confidentiality can lead to reluctance in disclosing all relevant information, which could have grave consequences. This position paper contemplates whether patient confidentiality is compromised by electronic health records. The position that confidentiality is compromised was supported by the four bioethical principles and argued that despite laws and various safeguards to protect patients' confidentiality, numerous data breaches have occurred. The position that confidentiality is not compromised was supported by virtue ethics and a utilitarian viewpoint and argued that safeguards keep information confidential and the public feels relatively safe with the electronic health record. The article concludes with an ethically superior position that confidentiality is compromised with the electronic health record. Although organizational and governmental ways of enhancing the confidentiality of patient information within the electronic health record facilitate confidentiality, the ultimate responsibility of maintaining confidentiality rests with the individual end-users and their ethical code of conduct. The American Nurses Association Code of Ethics for nurses calls for nurses to be watchful with data security in electronic communications.

  14. An efficient steganography method for hiding patient confidential information.

    Science.gov (United States)

    Al-Dmour, Hayat; Al-Ani, Ahmed; Nguyen, Hung

    2014-01-01

    This paper deals with the important issue of security and confidentiality of patient information when exchanging or storing medical images. Steganography has recently been viewed as an alternative or complement to cryptography, as existing cryptographic systems are not perfect due to their vulnerability to certain types of attack. We propose in this paper a new steganography algorithm for hiding patient confidential information. It utilizes Pixel Value Differencing (PVD) to identify contrast regions in the image and a Hamming code that embeds 3 secret message bits into 4 bits of the cover image. In order to preserve the content of the region of interest (ROI), the embedding is only performed using the Region of Non-Interest (RONI).

  15. Medical confidentiality versus disclosure: Ethical and legal dilemmas.

    LENUS (Irish Health Repository)

    Agyapong, V I O

    2009-02-01

    A case is described of a fifty year old single man who made disclosures about criminal sexual practices during a psychiatric assessment. In common practice with other professional men, a doctor is under a duty not to disclose, without the consent of his patient, information which he has gained in his professional capacity other than in exceptional circumstances. We discuss the ethical and legal considerations surrounding issues of medical confidentiality and the dilemma that sometimes face clinicians, when they feel obliged, in the public interest, to disclose information they have gained in confidence. Breach of confidences can have deleterious consequences; particularly for the doctor-patient relationship, but failure to disclose in some situations could have serious implications for the well-being of the wider society. Doctors should be aware of the basic principles of confidentiality and the ethical and legal framework around which they are built.

  16. [Ethics in pediatric emergencies: Care access, communication, and confidentiality].

    Science.gov (United States)

    Benoit, J; Berdah, L; Carlier-Gonod, A; Guillou, T; Kouche, C; Patte, M; Schneider, M; Talcone, S; Chappuy, H

    2015-05-01

    Children suffer most from today's increasing precariousness. In France, access to care is available for all children through various structures and existing measures. The support for foreign children is overseen by specific legislation often unfamiliar to caregivers. Pediatric emergencies, their location, organization, actors, and patient flow are a particular environment that is not always suitable to communication and may lead to situations of abuse. Communication should not be forgotten because of the urgency of the situation. The place of the child in the dialogue is often forgotten. Considering the triangular relationship, listening to the child and involving the parents in care are the basis for a good therapeutic alliance. Privacy and medical confidentiality in pediatric emergencies are governed by law. However, changes in treatments and medical practices along with the variety of actors involved imply both individual and collective limitations, to the detriment of medical confidentiality. Copyright © 2015 Elsevier Masson SAS. All rights reserved.

  17. On the Compound MIMO Broadcast Channels with Confidential Messages

    CERN Document Server

    Kobayashi, Mari; Shamai, Shlomo; Debbah, Merouane

    2009-01-01

    We study the compound multi-input multi-output (MIMO) broadcast channel with confidential messages (BCC), where one transmitter sends a common message to two receivers and two confidential messages respectively to each receiver. The channel state may take one of a finite set of states, and the transmitter knows the state set but does not know the realization of the state. We study achievable rates with perfect secrecy in the high SNR regime by characterizing an achievable secrecy degree of freedom (s.d.o.f.) region for two models, the Gaussian MIMO-BCC and the ergodic fading multi-input single-output (MISO)-BCC without a common message. We show that by exploiting an additional temporal dimension due to state variation in the ergodic fading model, the achievable s.d.o.f. region can be significantly improved compared to the Gaussian model with a constant state, although at the price of a larger delay.

  18. The problems related to confidentiality and effectiveness of health care.

    Science.gov (United States)

    Scherrer, J R

    1983-08-01

    The problem of the impact of confidentiality on health effectiveness is discussed along five points: (1) Communication facilities between health departments are main features of health information systems. (2) Efforts, costs, limits of data protection. The privacy violation risks have to be related to the data protection costs. (3) Paradox of the fundamental rights to confidentiality regarding privacy of the individual and the preponderant interest of the State. (4) Facing the increasing health costs, the need for medical and hospital control systems is assessed. (5) New benefits in medicine and in the quality of care are partly the results of more or less extensive studies in epidemiology at national levels. The general conclusion is concerned with the risks that the computer could become an instrumental substitute for human reason with the progressive drop out of responsibility of health officers.

  19. [The relationship between teenage pregnancy and school desertion].

    Science.gov (United States)

    Molina, Marta; Ferrada, Cristina; Pérez, Ruth; Cid, Luis; Casanueva, Víctor; García, Apolinaria

    2004-01-01

    In Chile, the prevalence of teenage pregnancy is 17%. To assess relationship between adolescent pregnancy and school desertion. At the Hospital Guillermo Grant Benavente's Departament of Obstetrics and Gynecology, in Concepción, Chile, 2001 a comparative, cross sectional and correlational study was conducted. The study group were pregnant adolescents who deserted from school system, divided in two subgroups: 86 adolescents who deserted before pregnancy and 130 who deserted during pregnancy. Twenty percent of teenagers that deserted from school before pregnancy belonged to a sublevel of poverty, compared with 5% of those who deserted during pregnancy. Flunk was frequent in both but higher in girls that deserted before pregnancy (46.5 and 36.9% respectively, (prelationship between teenage pregnancy and school desertion. Adolescents who deserted from school before pregnancy are more vulnerable.

  20. Lessons from the confidential enquiry into maternal deaths, Malaysia.

    Science.gov (United States)

    Ravichandran, J; Ravindran, J

    2014-09-01

    Malaysia has successfully reduced maternal mortality through several efforts which, in the broad sense, include (i) the overall socio-economic development of the country; (ii) strengthened health services; and (iii) specific efforts and initiatives for the reduction of maternal mortality, one of which is the audit of maternal deaths by the confidential enquiry into maternal deaths. © 2014 Royal College of Obstetricians and Gynaecologists.

  1. Data Classification Based on Confidentiality in Virtual Cloud Environment

    Directory of Open Access Journals (Sweden)

    Munwar Ali Zardari

    2014-10-01

    Full Text Available The aim of this study is to provide suitable security to data based on the security needs of data. It is very difficult to decide (in cloud which data need what security and which data do not need security. However it will be easy to decide the security level for data after data classification according to their security level based on the characteristics of the data. In this study, we have proposed a data classification cloud model to solve data confidentiality issue in cloud computing environment. The data are classified into two major classes: sensitive and non-sensitive. The K-Nearest Neighbour (K-NN classifier is used for data classification and the Rivest, Shamir and Adelman (RSA algorithm is used to encrypt sensitive data. After implementing the proposed model, it is found that the confidentiality level of data is increased and this model is proved to be more cost and memory friendly for the users as well as for the cloud services providers. The data storage service is one of the cloud services where data servers are virtualized of all users. In a cloud server, the data are stored in two ways. First encrypt the received data and store on cloud servers. Second store data on the cloud servers without encryption. Both of these data storage methods can face data confidentiality issue, because the data have different values and characteristics that must be identified before sending to cloud severs.

  2. Confidential patent application with an example of preparation

    Directory of Open Access Journals (Sweden)

    Obrad T. Čabarkapa

    2013-12-01

    Full Text Available In order that the invention solving a technical problem receives a patent protection, it is necessary to file a patent application. For the protection of confidential inventions which are important for defense and national security, a confidential patent application[1] must be filed. A confidential patent application is an important and complex document, the parts of which are,  in principle, exposed in an established order. For the preparation of patent applications, it is necessary to engage experts with higher education, primarily in the technical field the invention relates to. The contents of the patent application is a basis for examining whether the application meets the requirements for patentability and whether the right to patent protection is achieved. Besides theoretical discussions on patent application, the paper gives a short version of an example of an application regarding a protected confidential invention. Introduction The basic condition for the exercise of patent protection is filing a patent application, the test procedure and, eventually, depending on the test results - the recognition or rejection of the patent. The paper gives a description of all parts of the patent application on an example of a confidential invention already patented. The content of the confidential patent application The confidential patent application for confidential invention protection consists of the following parts: The application for a patent; description of the invention; the claims (indication of what is new and what is required to be protected by patenting; abstract (short summary of the invention  and a draft of the invention (to which the description and the claims are referred. The application for a patent The application for patent is filed on Form P-1 and a request for the petty patent on Form MP-1. The data entered in the file is, for example: the applicant; the lawyer; the name of the invention in Serbian and English; the inventor

  3. Confidential Data Hiding Using Wavlet Based Ecg Stegnography

    Directory of Open Access Journals (Sweden)

    Malashree K S

    2014-05-01

    Full Text Available With the growing number of aging population and a significant portion of that suffering from cardiac diseases, it is conceivable that remote ECG patient monitoring systems are expected to be widely used as Point-of-Care (PoC applications in hospitals around the world. Therefore, huge amount of ECG signal collected by Body Sensor Networks (BSNs from remote patients at homes will be transmitted along with other physiological readings such as blood pressure, temperature, glucose level etc. and diagnosed by those remote patient monitoring systems. It is utterly important that patient confidentiality is protected while data is being transmitted over the public network as well as when they are stored in hospital servers used by remote monitoring systems. In this project, a wavelet based steganography technique has been introduced which combines encryption and scrambling technique to protect patient confidential data. The proposed method allows ECG signal to hide its corresponding patient confidential data and other physiological information thus guaranteeing the integration between ECG and the rest.

  4. Psychological behaviorism and behaviorizing psychology

    Science.gov (United States)

    Staats, Arthur W.

    1994-01-01

    Paradigmatic or psychological behaviorism (PB), in a four-decade history of development, has been shaped by its goal, the establishment of a behaviorism that can also serve as the approach in psychology (Watson's original goal). In the process, PB has become a new generation of behaviorism with abundant heuristic avenues for development in theory, philosophy, methodology, and research. Psychology has resources, purview and problem areas, and nascent developments of many kinds, gathered in chaotic diversity, needing unification (and other things) that cognitivism cannot provide. Behaviorism can, within PB's multilevel framework for connecting and advancing both psychology and behaviorism. PMID:22478175

  5. Psychological behaviorism and behaviorizing psychology.

    Science.gov (United States)

    Staats, A W

    1994-01-01

    Paradigmatic or psychological behaviorism (PB), in a four-decade history of development, has been shaped by its goal, the establishment of a behaviorism that can also serve as the approach in psychology (Watson's original goal). In the process, PB has become a new generation of behaviorism with abundant heuristic avenues for development in theory, philosophy, methodology, and research. Psychology has resources, purview and problem areas, and nascent developments of many kinds, gathered in chaotic diversity, needing unification (and other things) that cognitivism cannot provide. Behaviorism can, within PB's multilevel framework for connecting and advancing both psychology and behaviorism.

  6. Psychological experiment

    NARCIS (Netherlands)

    Boven, Martijn; Emmanuel, Steven M.; McDonald, William; Stewart, Jon

    2015-01-01

    For Kierkegaard the ‘psychological experiment’ is a literary strategy. It enables him to dramatize an existential conflict in an experimental mode. Kierkegaard’s aim is to study the source of movement that animates the existing individual (this is the psychological part). However, he is not interest

  7. Desert dust hazards: A global review

    Science.gov (United States)

    Middleton, N. J.

    2017-02-01

    Dust storms originate in many of the world's drylands and frequently present hazards to human society, both within the drylands themselves but also outside drylands due to long-range transport of aeolian sediments. Major sources of desert dust include the Sahara, the Middle East, central and eastern Asia, and parts of Australia, but dust-raising occurs all across the global drylands and, on occasion, beyond. Dust storms occur throughout the year and they vary in frequency and intensity over a number of timescales. Long-range transport of desert dust typically takes place along seasonal transport paths. Desert dust hazards are here reviewed according to the three phases of the wind erosion system: where dust is entrained, during the transport phase, and on deposition. This paper presents a synthesis of these hazards. It draws on empirical examples in physical geography, medical geology and geomorphology to discuss case studies from all over the world and in various fields. These include accelerated soil erosion in agricultural zones - where dust storms represent a severe form of accelerated soil erosion - the health effects of air pollution caused by desert aerosols via their physical, chemical and biological properties, transport accidents caused by poor visibility during desert dust events, and impacts on electricity generation and distribution. Given the importance of desert dust as a hazard to human societies, it is surprising to note that there have been relatively few attempts to assess their impact in economic terms. Existing studies in this regard are also reviewed, but the wide range of impacts discussed in this paper indicates that desert dust storms deserve more attention in this respect.

  8. A Systems-Level Approach to Resolve Tension between Research Misconduct and Confidentiality

    Science.gov (United States)

    Limehouse, Walter

    2015-01-01

    The author examines methods of resolving tensions between confidentiality and research conduct and methods of avoiding these tensions. He mentions universities are obligated to address misconduct allegations and considers how to do this while respecting confidentiality between patient and therapist. He comments an underlying aspect of research ethics is a core commitment to honesty and states students are obligated to self-report even when patient-therapist confidentiality restricts reporting. PMID:24024821

  9. Confidentiality with adolescents in the medical setting: what do parents think?

    Science.gov (United States)

    Duncan, Rony E; Vandeleur, Moya; Derks, Anouk; Sawyer, Susan

    2011-10-01

    When confidential health care is provided to adolescents they are more likely to seek care, disclose sensitive information, and return for future visits. Guidelines for health professionals recommend seeing young people alone to facilitate confidential care. We sought to document parental views regarding confidentiality with adolescents, aiming to identify topics that parents believe they should be informed about despite an assurance of confidentiality between their child and the doctor. We also aimed to document harms and benefits that parents associate with adolescents seeing doctors alone. A sample of 86 parents attending an adolescent medicine clinic with their son/daughter was surveyed using a brief, anonymous questionnaire. Parents identified several benefits associated with confidential care, yet also believed they should be informed about a wide range of topics, even if their children did not want them to know. Parents' primary concern about confidentiality was a fear of not being informed about important information. Parental views concerning confidentiality are complex and conflicting and differ from current guidance provided to health professionals. Ensuring that parents accurately understand the limits to confidentiality and support the notion of confidential care for their children is a challenging yet vital task for health professionals. Copyright © 2011 Society for Adolescent Health and Medicine. Published by Elsevier Inc. All rights reserved.

  10. 76 FR 72403 - Access to Confidential Business Information by Primus Solutions, Inc.

    Science.gov (United States)

    2011-11-23

    ...] Access to Confidential Business Information by Primus Solutions, Inc. AGENCY: Environmental Protection Agency (EPA). ACTION: Notice. SUMMARY: EPA has authorized its contractor, Primus Solutions, Inc.,...

  11. Desert Amplification in a Warming Climate

    Science.gov (United States)

    Zhou, Liming

    2016-08-01

    Here I analyze the observed and projected surface temperature anomalies over land between 50°S-50°N for the period 1950–2099 by large-scale ecoregion and find strongest warming consistently and persistently seen over driest ecoregions such as the Sahara desert and the Arabian Peninsula during various 30-year periods, pointing to desert amplification in a warming climate. This amplification enhances linearly with the global mean greenhouse gases(GHGs) radiative forcing and is attributable primarily to a stronger GHGs-enhanced downward longwave radiation forcing reaching the surface over drier ecoregions as a consequence of a warmer and thus moister atmosphere in response to increasing GHGs. These results indicate that desert amplification may represent a fundamental pattern of global warming associated with water vapor feedbacks over land in low- and mid- latitudes where surface warming rates depend inversely on ecosystem dryness. It is likely that desert amplification might involve two types of water vapor feedbacks that maximize respectively in the tropical upper troposphere and near the surface over deserts, with both being very dry and thus extremely sensitive to changes of water vapor.

  12. Desert basins of the Southwest

    Science.gov (United States)

    Leake, Stanley A.; Konieczki, Alice D.; Rees, Julie A.H.

    2000-01-01

    Ground water is among the Nation’s most important natural resources. It provides drinking water to urban and rural communities, supports irrigation and industry, sustains the flow of streams and rivers, and maintains riparian and wetland ecosystems. In many areas of the Nation, the future sustainability of ground-water resources is at risk from overuse and contamination. Because ground-water systems typically respond slowly to human actions, a long-term perspective is needed to manage this valuable resource. This publication is one in a series of fact sheets that describe ground-water-resource issues across the United States, as well as some of the activities of the U.S. Geological Survey that provide information to help others develop, manage, and protect ground-water resources in a sustainable manner. Ground-water resources in the Southwest are among the most overused in the United States. Natural recharge to aquifers is low and pumping in many areas has resulted in lowering of water tables. The consequences of large-scale removal of water from storage are becoming increasingly evident. These consequences include land subsidence; loss of springs, streams, wetlands and associated habitat; and degradation of water quality. Water managers are now seeking better ways of managing ground-water resources while looking for supplemental sources of water. This fact sheet reviews basic information on ground water in the desert basins of the Southwest. Also described are some activities of the U.S. Geological Survey (USGS) that are providing scientific information for sustainable management of ground-water resources in the Southwest. Ground-water sustainability is defined as developing and using ground water in a way that can be maintained for an indefinite time without causing unacceptable environmental, economic, or social consequences.

  13. Ecological stability of Tarim Desert Highway shelterbelt

    Institute of Scientific and Technical Information of China (English)

    ZHOU Zhibin; XU Xinwen; LEI Jiaqiang; LI Shengyu

    2006-01-01

    The Tarim Desert Highway shelterbelt,located in hinterland of Taklimakan Desert, is irrigated by underground saline water, with three to thirty gram per litter mineral degrees. The sustainability and stability are affected by multifarious stress.The structural and functional characteristics of shelterbelt are studied to probe into correlation between environment and shelterbelt. On basis, decision analysis is applied to study ecological stability of the Tarim Desert Highway shelterbelt, to screen out limited factors, to establish general index system, and to evaluate the stability of the shelterbelt nowadays.Finally, the concept of ecological stability is utilized to manage the artificial ecosystem. The results show that the artificial ecosystem is relatively flimsy, whose stability can be increased by adjusting stand structure and improving the nutrient cycle.

  14. Rural childhoods in Egypt's desert lands

    DEFF Research Database (Denmark)

    Adriansen, Hanne Kirstine

    . Many settlers move to the Mubarak villages in order to give their children a good start in life. The desert villages are associated with a type of ‘rural idyll’. The process of settling in the desert impacts upon the children’s possible pathways to adulthood and their identities and social...... relationships. Not only do the children grow up in a different physical context, they are also exposed to new norms, values and behaviour that influences their everyday life and shape their identity. Especially the change from living in large, extended families to living in nuclear families as well as women......’s new roles impact upon the children’s lives. The social contexts shaping the desert childhoods are in some ways more similar to contexts in ‘developed’ countries than in other parts of rural Egypt. The paper ends up by contrasting ideas of rural childhoods in Egypt with those found in ‘developed...

  15. Institutional Review Boards’ Use and Understanding of Certificates of Confidentiality

    Science.gov (United States)

    Beskow, Laura M.; Check, Devon K.; Namey, Emily E.; Dame, Lauren A.; Lin, Li; Cooper, Alexandra; Weinfurt, Kevin P.; Wolf, Leslie E.

    2012-01-01

    Certificates of Confidentiality, issued by agencies of the U.S. government, are regarded as an important tool for meeting ethical and legal obligations to safeguard research participants’ privacy and confidentiality. By shielding against forced disclosure of identifying data, Certificates are intended to facilitate research on sensitive topics critical to the public’s health. Although Certificates are potentially applicable to an extensive array of research, their full legal effect is unclear, and little is known about stakeholders’ views of the protections they provide. To begin addressing this challenge, we conducted a national survey of institutional review board (IRB) chairs, followed by telephone interviews with selected chairs, to learn more about their familiarity with and opinions about Certificates; their institutions’ use of Certificates; policies and practices concerning when Certificates are required or recommended; and the role Certificates play in assessments of research risk. Overall, our results suggest uncertainty about Certificates among IRB chairs. On most objective knowledge questions, most respondents chose the incorrect answer or ‘unsure’. Among chairs who reported more familiarity with Certificates, composite opinion scores calculated based on five survey questions were evenly distributed among positive, neutral/middle, and negative views. Further, respondents expressed a variety of ideas about the appropriate use of Certificates, what they are intended to protect, and their effect on research risk. Nevertheless, chairs who participated in our study commonly viewed Certificates as a potentially valuable tool, frequently describing them as an ‘extra layer’ of protection. These findings lead to several practical observations concerning the need for more stakeholder education about Certificates, consideration of Certificates for a broader range of studies, the importance of remaining vigilant and using all tools available to

  16. Institutional review boards' use and understanding of certificates of confidentiality.

    Science.gov (United States)

    Beskow, Laura M; Check, Devon K; Namey, Emily E; Dame, Lauren A; Lin, Li; Cooper, Alexandra; Weinfurt, Kevin P; Wolf, Leslie E

    2012-01-01

    Certificates of Confidentiality, issued by agencies of the U.S. government, are regarded as an important tool for meeting ethical and legal obligations to safeguard research participants' privacy and confidentiality. By shielding against forced disclosure of identifying data, Certificates are intended to facilitate research on sensitive topics critical to the public's health. Although Certificates are potentially applicable to an extensive array of research, their full legal effect is unclear, and little is known about stakeholders' views of the protections they provide. To begin addressing this challenge, we conducted a national survey of institutional review board (IRB) chairs, followed by telephone interviews with selected chairs, to learn more about their familiarity with and opinions about Certificates; their institutions' use of Certificates; policies and practices concerning when Certificates are required or recommended; and the role Certificates play in assessments of research risk. Overall, our results suggest uncertainty about Certificates among IRB chairs. On most objective knowledge questions, most respondents chose the incorrect answer or 'unsure'. Among chairs who reported more familiarity with Certificates, composite opinion scores calculated based on five survey questions were evenly distributed among positive, neutral/middle, and negative views. Further, respondents expressed a variety of ideas about the appropriate use of Certificates, what they are intended to protect, and their effect on research risk. Nevertheless, chairs who participated in our study commonly viewed Certificates as a potentially valuable tool, frequently describing them as an 'extra layer' of protection. These findings lead to several practical observations concerning the need for more stakeholder education about Certificates, consideration of Certificates for a broader range of studies, the importance of remaining vigilant and using all tools available to protect participants

  17. THE INFORMATION CONFIDENTIALITY AND CYBER SECURITY IN MEDICAL INSTITUTIONS

    Directory of Open Access Journals (Sweden)

    SABAU-POPA CLAUDIA DIANA

    2015-07-01

    Full Text Available The information confidentiality and cyber security risk affects the right to confidentiality and privacy of the patient, as regulated in Romania by the Law 46/2002. The manifestation of the cyber security risk event affects the reputation of the healthcare institution and is becoming more and more complex and often due to the: development of network technology, the medical equipment connected to wifi and the electronic databases. The databases containing medical records were implemented due to automation. Thus, transforming data into medical knowledge contribute to a better understanding of the disease. Due to these factors, the measures taken by the hospital management for this type of risk are adapted to the cyber changes. The hospital objectives aim: the implementation of a robust information system, the early threats identifications and the incident reporting. Neglecting this type of risk can generate financial loss, inability to continue providing health care services for a certain period of time, providing an erroneous diagnosis, medical equipment errors etc. Thus, in a digital age the appropriate risk management for the information security and cyber risk represent a necessity. The main concern of hospitals worldwide is to align with international requirements and obtain credentials in terms of data security from the International Organisation for Standardization, which regulates the management of this type of risk. Romania is at the beginning in terms of concerns regarding the management, avoidance and mitigation of information security, the health system being most highly exposed to its manifestation. The present paper examines the concerns of the health system to the confidentiality of information and cyber security risk and its management arrangements. Thus, a set of key risk indicators is implemented and monitored for 2011-2013, using a user interface, a Dashboard, which acts as an early warning system of the manifestation of the

  18. Institutional review boards' use and understanding of certificates of confidentiality.

    Directory of Open Access Journals (Sweden)

    Laura M Beskow

    Full Text Available Certificates of Confidentiality, issued by agencies of the U.S. government, are regarded as an important tool for meeting ethical and legal obligations to safeguard research participants' privacy and confidentiality. By shielding against forced disclosure of identifying data, Certificates are intended to facilitate research on sensitive topics critical to the public's health. Although Certificates are potentially applicable to an extensive array of research, their full legal effect is unclear, and little is known about stakeholders' views of the protections they provide. To begin addressing this challenge, we conducted a national survey of institutional review board (IRB chairs, followed by telephone interviews with selected chairs, to learn more about their familiarity with and opinions about Certificates; their institutions' use of Certificates; policies and practices concerning when Certificates are required or recommended; and the role Certificates play in assessments of research risk. Overall, our results suggest uncertainty about Certificates among IRB chairs. On most objective knowledge questions, most respondents chose the incorrect answer or 'unsure'. Among chairs who reported more familiarity with Certificates, composite opinion scores calculated based on five survey questions were evenly distributed among positive, neutral/middle, and negative views. Further, respondents expressed a variety of ideas about the appropriate use of Certificates, what they are intended to protect, and their effect on research risk. Nevertheless, chairs who participated in our study commonly viewed Certificates as a potentially valuable tool, frequently describing them as an 'extra layer' of protection. These findings lead to several practical observations concerning the need for more stakeholder education about Certificates, consideration of Certificates for a broader range of studies, the importance of remaining vigilant and using all tools available to

  19. Long-term accumulation of atmospheric dust in rocky deserts

    NARCIS (Netherlands)

    Goossens, D.; Offer, Z.Y.

    2005-01-01

    The spatial pattern of long-term (hundreds to thousands of years) accumulation of dust in rocky deserts was investigated in the northern Negev Desert of Israel. The concentration of dust in the desert subsoil was measured at 41 locations in a 53 ha test area for which detailed information exists on

  20. The Punitive Paradox: Desert and the Compulsion to Punish.

    Science.gov (United States)

    Clear, Todd R.

    1996-01-01

    Explores the concept of a "just deserts" justice paradox in which carrying out a deserved penalty breaches the values that undergird the theory of just deserts. Examines whether it might ever be proper, from a desert perspective, to choose not to impose a deserved punishment. (KW)

  1. Re Inquiry into the Confidentiality of Health Records in Ontario.

    Science.gov (United States)

    1978-06-30

    Several members of the Royal Canadian Mounted Police testified at hearings conducted by a commission appointed to study the confidentiality of health records. On approximately 300 occasions, the police had obtained medical information from physicians and hospitals in Ontario without the prior consent of the patient. The court established that the identity of persons who had furnished the information was privileged information for physicians and other persons subject to the control of a hospital board, but not for various employees of the hospital who were not subject to professional standards of discipline.

  2. Jojoba could stop the desert creep

    Energy Technology Data Exchange (ETDEWEB)

    1982-03-25

    The Sahara desert is estimated to be expanding at a rate of 5km a year. The Sudanese government is experimenting with jojoba in six different regions as the bush has the potential to stop this ''desert creep''. The plant, a native to Mexico, is long known for its resistance to drought and for the versatile liquid wax that can be extracted from its seeds. It is estimated that one hectare of mature plants could produce 3000 kg of oil, currently selling at $50 per litre, and so earn valuable foreign currency.

  3. Attitude of Lithuanian residents to confidentiality of adolescent sexual and reproductive health care

    DEFF Research Database (Denmark)

    Jaruseviciene, Lina; Lazarus, Jeff; Zaborskis, Apolinaras

    2011-01-01

    To assess the attitudes of Lithuanian residents towards the protection of confidentiality in the sexual and reproductive health care of adolescents.......To assess the attitudes of Lithuanian residents towards the protection of confidentiality in the sexual and reproductive health care of adolescents....

  4. 5 CFR 1204.14 - Requests for access to confidential commercial information.

    Science.gov (United States)

    2010-01-01

    ... Freedom of Information Act § 1204.14 Requests for access to confidential commercial information. (a... submitter with prompt written notice of a request for its confidential commercial information whenever such... request whenever: (i) The information is less than 10 years old; or (ii) The Board has reason to believe...

  5. Public expectations concerning confidentiality protection of adolescents' sexual and reproductive health care in Lithuania

    DEFF Research Database (Denmark)

    Jaruseviciene, Lina; Zaborskis, Apolinaras; Lazarus, Jeffrey Victor

    2014-01-01

    for confidentiality using a five-point Likert scale for eight types of SRH consultations. RESULTS: Public anticipation for confidentiality depended on whether issues related to sexual behaviour or to its consequences were addressed during adolescent consultation. Only younger respondents had higher expectations...

  6. 34 CFR 21.32 - Confidentiality of information about net worth.

    Science.gov (United States)

    2010-07-01

    ... established procedures under the Freedom of Information Act (34 CFR part 5). (Authority: 5 U.S.C. 504(c)(1)) ... 34 Education 1 2010-07-01 2010-07-01 false Confidentiality of information about net worth. 21.32... One Apply for an Award? § 21.32 Confidentiality of information about net worth. (a) In a proceeding...

  7. 76 FR 7559 - Access in Litigation to Confidential Business Information; Transfer of Information Claimed as...

    Science.gov (United States)

    2011-02-10

    ... AGENCY Access in Litigation to Confidential Business Information; Transfer of Information Claimed as Confidential Business Information to the United States Department of Justice and Parties to Certain Litigation...., Adv. Proc. No. 09-01198 (ALG), pending in the United States Bankruptcy Court for the Southern District...

  8. 76 FR 28434 - Notice of Disclosure of Confidential Business Information Obtained Under the Comprehensive...

    Science.gov (United States)

    2011-05-17

    ... AGENCY Notice of Disclosure of Confidential Business Information Obtained Under the Comprehensive... requirements of 40 CFR 2.310(h) for authorization to disclose confidential business information (``CBI..., inventory, and indexing; to assist with document review and analysis; to verify completeness; and to provide...

  9. 15 CFR 30.55 - Confidential information, import entries, and withdrawals.

    Science.gov (United States)

    2010-01-01

    ... 15 Commerce and Foreign Trade 1 2010-01-01 2010-01-01 false Confidential information, import entries, and withdrawals. 30.55 Section 30.55 Commerce and Foreign Trade Regulations Relating to Commerce... Requirements § 30.55 Confidential information, import entries, and withdrawals. The contents of the statistical...

  10. Collaboration and Confidentiality: Not a Paradox but an Understanding between Principals and School Counselors

    Science.gov (United States)

    Williams, Rhonda L.; Wehrman, Joseph D.

    2010-01-01

    Student confidentiality can create challenges for both school counselors and administrators. The article addresses historical and ethical issues surrounding confidentiality in schools as well as methods of working toward collaboration. Developing an understanding of one another's ethical, legal, and professional responsibilities can lead to a…

  11. Having Confidence in Therapeutic Work with Young People: Constraints and Challenges to Confidentiality

    Science.gov (United States)

    Jenkins, Peter

    2010-01-01

    Confidentiality presents particular challenges to practitioners working with young people, on account of the latter's vulnerability and emotional immaturity. Ethical codes place a key importance on confidentiality, from deontological and teleological perspectives. However, young clients may rely on a more pragmatic approach in deciding whether to…

  12. Patient confidentiality within the context of group medical visits: is there cause for concern?

    Science.gov (United States)

    Wong, Sabrina T; Lavoie, Josee G; Browne, Annette J; MacLeod, Martha L P; Chongo, Meck

    2015-10-01

    Group medical visits (GMVs), clinical encounters with a medical component delivered to groups of patients, have emerged as an innovative approach to potentially increasing efficiency while enhancing the quality of primary health care (PHC). GMVs have created the need to pay explicit attention to patient confidentiality. What strategies are used by providers and patients to address issues of confidentiality within GMVs? In-depth interviews were conducted with 34 PHC providers and 29 patients living in nine rural communities in British Columbia, Canada. Data were analysed using interpretive thematic analysis and a relational autonomy approach. We found three main themes: (i) choosing to disclose: balancing benefits and drawbacks of GMVs, (ii) maintaining confidentiality in GMVs and (iii) gaining strength from interdependent relationships: patients learning from each other. Confidentiality can be addressed and was not a major concern for patients attending or providers facilitating GMVs in these rural communities. Patients adopted strategies to address their own and others' concerns related to confidential health information. Providers used multiple strategies to maintain confidentiality within the group, including renegotiating what information is shared and providing examples of what information ought to be kept confidential. Although GMVs are not for all patients, a relational autonomy approach is useful in drawing attention to the context and structures which may influence their patients' ability to act autonomously. Successful delivery of GMVs requires both patients and providers to negotiate between maintaining confidentiality and an appropriate level of disclosure. © 2013 The Authors. Health Expectations Published by John Wiley & Sons Ltd.

  13. 40 CFR 22.5 - Filing, service, and form of all filed documents; business confidentiality claims.

    Science.gov (United States)

    2010-07-01

    ... documents; business confidentiality claims. 22.5 Section 22.5 Protection of Environment ENVIRONMENTAL... of all filed documents; business confidentiality claims. (a) Filing of documents. (1) The original... knowledge, information and belief, the statements made therein are true, and that it is not interposed...

  14. 19 CFR 206.7 - Confidential business information; furnishing of nonconfidential summaries thereof.

    Science.gov (United States)

    2010-04-01

    ... 19 Customs Duties 3 2010-04-01 2010-04-01 false Confidential business information; furnishing of... NONADJUDICATIVE INVESTIGATIONS INVESTIGATIONS RELATING TO GLOBAL AND BILATERAL SAFEGUARD ACTIONS, MARKET DISRUPTION, TRADE DIVERSION, AND REVIEW OF RELIEF ACTIONS General § 206.7 Confidential business...

  15. 19 CFR 210.39 - In camera treatment of confidential information.

    Science.gov (United States)

    2010-04-01

    ... 19 Customs Duties 3 2010-04-01 2010-04-01 false In camera treatment of confidential information....39 In camera treatment of confidential information. (a) Definition. Except as hereinafter provided... protective orders or orders granting in camera treatment are not made part of the public record and are...

  16. 45 CFR 303.21 - Safeguarding and disclosure of confidential information.

    Science.gov (United States)

    2010-10-01

    ... regulations, an entity described in paragraph (b) of this section may not disclose any confidential... requirements as the Office may prescribe, disclose confidential information to State agencies as necessary to... child's health or welfare is threatened. (2) Upon request, the IV-D agency may disclose information in...

  17. 36 CFR 1600.7 - Special procedures for confidential commercial information.

    Science.gov (United States)

    2010-07-01

    ...) Business submitter means any person or entity which provides confidential commercial information, directly.... Confidential commercial information provided to the Foundation by a business submitter shall not be disclosed... be exempt from disclosure under Exemption 4 of the FOIA and that the person or entity who submitted...

  18. 42 CFR 2.2 - Statutory authority for confidentiality of alcohol abuse patient records.

    Science.gov (United States)

    2010-10-01

    ... HUMAN SERVICES GENERAL PROVISIONS CONFIDENTIALITY OF ALCOHOL AND DRUG ABUSE PATIENT RECORDS Introduction § 2.2 Statutory authority for confidentiality of alcohol abuse patient records. The restrictions of these regulations upon the disclosure and use of alcohol abuse patient records were initially...

  19. 41 CFR 105-60.405 - Processing requests for confidential commercial information.

    Science.gov (United States)

    2010-07-01

    ... MATERIALS 60.4-Described Records § 105-60.405 Processing requests for confidential commercial information... 41 Public Contracts and Property Management 3 2010-07-01 2010-07-01 false Processing requests for confidential commercial information. 105-60.405 Section 105-60.405 Public Contracts and Property...

  20. New Insights in Preservation of Meteorites in Hot Deserts: The Oldest Hot Desert Meteorite Collection.

    Science.gov (United States)

    Hutzler, A.; Rochette, P.; Bourlès, D.; Gattacceca, J.; Merchel, S.; Jull, A. J. T.; Valenzuela, M.

    2016-08-01

    Terrestrial ages of a subset of a chilean meteorite collection have been determined with cosmogenic nuclides. We show here that provided the environnement is favorable enough, hot desert meteorites can survive over a million year.

  1. HIPAA-protecting patient confidentiality or covering something else?

    Directory of Open Access Journals (Sweden)

    Robbins RA

    2013-10-01

    Full Text Available No abstract available. Article truncated at 150 words. A case of a physician fired from the Veterans Administration (VA for violation of the Health Care Portability and Accountability Act of 1996 (HIPAA illustrates a problem with both the law and the VA. Anil Parikh, a VA physician at the Jesse Brown VA in Chicago, was dismissed on a charge of making unauthorized disclosures of confidential patient information on October 19, 2007. On January 3, 2011 the Merit Systems Protection Board (MSPB reversed Dr. Parikh’s removal. Dr. Parikh's initially made disclosures to the VA Office of Inspector General and to Senator Barack Obama and Congressman Luis Gutierrez, in whose district the Jesse Brown VA lies. Dr. Parikh alleged that there were systematic problems within the Jesse Brown VA that resulted in untimely and inadequate patient care. The confidential patient information Parikh disclosed included examples of the misdiagnoses and misdirection of patients within the hospital. Specifically, Dr. Parikh alleged that …

  2. Protecting victims of violent patients while protecting confidentiality.

    Science.gov (United States)

    Bersoff, Donald N

    2014-01-01

    In this article I revisit Tarasoff v. Regents of the University of California (1976), a case decided by the California Supreme Court in 1976 and followed in whole or in part in approximately 33 U.S. jurisdictions. In Tarasoff, perhaps the most notorious case in mental health law, the court held that psychotherapists have a duty to protect intended victims of their patients' conduct if that conduct presents a serious danger of violence. The most prominent means of protection is to warn potential victims and law enforcement personnel. I argue that Tarasoff is bad law, bad social science, and bad social policy. Because of therapists' ethical obligation to disclose the limits of confidentiality at the beginning of treatment, informing patients of the therapist's duty to disclose threats may inhibit patients' expressions of violent urges. Alternatively, as in Tarasoff, once a threat of violence is disclosed, the patient may never return to therapy, making it impossible to work through the threat of violence. I argue that rather than mandate the breaching of confidentiality, it is sounder public policy to give therapists the discretion to disclose so that they may take other measures to protect potential victims. Finally, I briefly touch on the impact of cultural disparity between therapist and patient in these cases. 2014 APA, all rights reserved

  3. Quantum Key Based Burst Confidentiality in Optical Burst Switched Networks

    Directory of Open Access Journals (Sweden)

    A. M. Balamurugan

    2014-01-01

    Full Text Available The optical burst switching (OBS is an emergent result to the technology concern that could achieve a feasible network in future. They are endowed with the ability to meet the bandwidth requirement of those applications that require intensive bandwidth. There are more domains opening up in the OBS that evidently shows their advantages and their capability to face the future network traffic. However, the concept of OBS is still far from perfection facing issues in case of security threat. The transfer of optical switching paradigm to optical burst switching faces serious downfall in the fields of burst aggregation, routing, authentication, dispute resolution, and quality of service (QoS. This paper deals with employing RC4 (stream cipher to encrypt and decrypt bursts thereby ensuring the confidentiality of the burst. Although the use of AES algorithm has already been proposed for the same issue, by contrasting the two algorithms under the parameters of burst encryption and decryption time, end-to-end delay, it was found that RC4 provided better results. This paper looks to provide a better solution for the confidentiality of the burst in OBS networks.

  4. Quantum key based burst confidentiality in optical burst switched networks.

    Science.gov (United States)

    Balamurugan, A M; Sivasubramanian, A

    2014-01-01

    The optical burst switching (OBS) is an emergent result to the technology concern that could achieve a feasible network in future. They are endowed with the ability to meet the bandwidth requirement of those applications that require intensive bandwidth. There are more domains opening up in the OBS that evidently shows their advantages and their capability to face the future network traffic. However, the concept of OBS is still far from perfection facing issues in case of security threat. The transfer of optical switching paradigm to optical burst switching faces serious downfall in the fields of burst aggregation, routing, authentication, dispute resolution, and quality of service (QoS). This paper deals with employing RC4 (stream cipher) to encrypt and decrypt bursts thereby ensuring the confidentiality of the burst. Although the use of AES algorithm has already been proposed for the same issue, by contrasting the two algorithms under the parameters of burst encryption and decryption time, end-to-end delay, it was found that RC4 provided better results. This paper looks to provide a better solution for the confidentiality of the burst in OBS networks.

  5. Confidential Communication Through Chaos Encryption in Wireless Sensor Network

    Institute of Scientific and Technical Information of China (English)

    CHEN Shuai; ZHONG Xian-xin

    2007-01-01

    A new byte block cipher algorithm with discrete chaos and Feistel structure has been studied for confidential communication in wireless sensor network to improve security. After permutation, the byte block was encrypted through a Feistel structure in multiple turns and afterwards replaced again. The child keys are the composite sequence of discrete chaos and linear congruence sequences. Both the plain text and cipher text are of 8 bits. The number of keys is alterable. A nonlinear encryption function in the Feistel structure with chaos was constructed. The cipher algorithm was realized in the Micaz node,and the confidential communication experiment in wireless sensor network was completed successfully. Additional ROM memory required for the cipher algorithm is 4144 bytes and an additional RAM memory 61 bytes. The cipher algorithm is nonlinear chaos and the Feistel structure holds the best of the RC6, DES and SKIPJACK cipher algorithms.The result shows that the algorithm needs a little memory and is safe at a high level.

  6. Genetic secrets: Protecting privacy and confidentiality in the genetic era. Final report

    Energy Technology Data Exchange (ETDEWEB)

    Rothstein, M.A. [ed.

    1998-09-01

    Few developments are likely to affect human beings more profoundly in the long run than the discoveries resulting from advances in modern genetics. Although the developments in genetic technology promise to provide many additional benefits, their application to genetic screening poses ethical, social, and legal questions, many of which are rooted in issues of privacy and confidentiality. The ethical, practical, and legal ramifications of these and related questions are explored in depth. The broad range of topics includes: the privacy and confidentiality of genetic information; the challenges to privacy and confidentiality that may be projected to result from the emerging genetic technologies; the role of informed consent in protecting the confidentiality of genetic information in the clinical setting; the potential uses of genetic information by third parties; the implications of changes in the health care delivery system for privacy and confidentiality; relevant national and international developments in public policies, professional standards, and laws; recommendations; and the identification of research needs.

  7. Psychological IVF

    DEFF Research Database (Denmark)

    Adrian, Stine Willum

    2015-01-01

    During ethnographic fieldwork at a fertility clinic in Denmark, I became intrigued by emotions. In particular, I found an incidence labelled ‘psychological IVF’ theoretically provocative as it challenged my views on materializations, which I was preparing to study. This paper centres on the story...... of psychological IVF, and I use this narrative to consider emotions and materialization methodologically. I also ask how emotions at fertility clinics can be conceptualized to enable analysis of their materialization, change, and effects. In order to do so, I develop the term ‘emotional choreography......’. This theoretical work has three aims. First, it seeks to illustrate how the story of psychological IVF offers a rich range of materializations of emotions. Secondly, this work proposes a feminist materialist conceptualization of emotions that is both non-representational and posthuman. This conceptualization draws...

  8. Microflora in soils of desert regions

    Science.gov (United States)

    Cameron, R. E.

    1970-01-01

    Desert soil samples, collected using aseptic techniques, are low in organic matter and cation exchange capacity. Aerobic and microaerophilic bacteria are most abundant, next are algae and molds. Chemical and physical properties are determined by standard procedures, including the Kjeldahl method and the use of Munsell soil color charts.

  9. From desert to deluge in the Mediterranean

    NARCIS (Netherlands)

    McKenzie, Judith A.

    2002-01-01

    Some time between five and six million years ago, the Mediterranean Sea became isolated from the Atlantic Ocean. In consequence some areas dried out -- hence the title of Kenneth Hsü’s book The Mediterranean was a Desert 1 -- and large salty lakes recharged by rivers flowing through deep canyons rep

  10. Extrafloral nectar fuels ant life in deserts.

    Science.gov (United States)

    Aranda-Rickert, Adriana; Diez, Patricia; Marazzi, Brigitte

    2014-11-07

    Interactions mediated by extrafloral nectary (EFN)-bearing plants that reward ants with a sweet liquid secretion are well documented in temperate and tropical habitats. However, their distribution and abundance in deserts are poorly known. In this study, we test the predictions that biotic interactions between EFN plants and ants are abundant and common also in arid communities and that EFNs are only functional when new vegetative and reproductive structures are developing. In a seasonal desert of northwestern Argentina, we surveyed the richness and phenology of EFN plants and their associated ants and examined the patterns in ant-plant interaction networks. We found that 25 ant species and 11 EFN-bearing plant species were linked together through 96 pairs of associations. Plants bearing EFNs were abundant, representing ca. 19 % of the species encountered in transects and 24 % of the plant cover. Most ant species sampled (ca. 77 %) fed on EF nectar. Interactions showed a marked seasonal pattern: EFN secretion was directly related to plant phenology and correlated with the time of highest ant ground activity. Our results reveal that EFN-mediated interactions are ecologically relevant components of deserts, and that EFN-bearing plants are crucial for the survival of desert ant communities. Published by Oxford University Press on behalf of the Annals of Botany Company.

  11. Reclaiming freshwater sustainability in the Cadillac Desert

    Science.gov (United States)

    Sabo, John L.; Sinha, Tushar; Bowling, Laura C.; Schoups, Gerrit H.W.; Wallender, Wesley W.; Campana, Michael E.; Cherkauer, Keith A.; Fuller, Pam L.; Graf, William L.; Hopmans, Jan W.; Kominoski, John S.; Taylor, Carissa; Trimble, Stanley W.; Webb, Robert H.; Wohl, Ellen E.

    2010-01-01

    Increasing human appropriation of freshwater resources presents a tangible limit to the sustainability of cities, agriculture, and ecosystems in the western United States. Marc Reisner tackles this theme in his 1986 classic Cadillac Desert: The American West and Its Disappearing Water. Reisner's analysis paints a portrait of region-wide hydrologic dysfunction in the western United States, suggesting that the storage capacity of reservoirs will be impaired by sediment infilling, croplands will be rendered infertile by salt, and water scarcity will pit growing desert cities against agribusiness in the face of dwindling water resources. Here we evaluate these claims using the best available data and scientific tools. Our analysis provides strong scientific support for many of Reisner's claims, except the notion that reservoir storage is imminently threatened by sediment. More broadly, we estimate that the equivalent of nearly 76% of streamflow in the Cadillac Desert region is currently appropriated by humans, and this figure could rise to nearly 86% under a doubling of the region's population. Thus, Reisner's incisive journalism led him to the same conclusions as those rendered by copious data, modern scientific tools, and the application of a more genuine scientific method. We close with a prospectus for reclaiming freshwater sustainability in the Cadillac Desert, including a suite of recommendations for reducing region-wide human appropriation of streamflow to a target level of 60%.

  12. Reclaiming freshwater sustainability in the Cadillac Desert

    Science.gov (United States)

    Sabo, John L.; Sinha, Tushar; Bowling, Laura C.; Schoups, Gerrit H. W.; Wallender, Wesley W.; Campana, Michael E.; Cherkauer, Keith A.; Fuller, Pam L.; Graf, William L.; Hopmans, Jan W.; Kominoski, John S.; Taylor, Carissa; Trimble, Stanley W.; Webb, Robert H.; Wohl, Ellen E.

    2010-01-01

    Increasing human appropriation of freshwater resources presents a tangible limit to the sustainability of cities, agriculture, and ecosystems in the western United States. Marc Reisner tackles this theme in his 1986 classic Cadillac Desert: The American West and Its Disappearing Water. Reisner's analysis paints a portrait of region-wide hydrologic dysfunction in the western United States, suggesting that the storage capacity of reservoirs will be impaired by sediment infilling, croplands will be rendered infertile by salt, and water scarcity will pit growing desert cities against agribusiness in the face of dwindling water resources. Here we evaluate these claims using the best available data and scientific tools. Our analysis provides strong scientific support for many of Reisner's claims, except the notion that reservoir storage is imminently threatened by sediment. More broadly, we estimate that the equivalent of nearly 76% of streamflow in the Cadillac Desert region is currently appropriated by humans, and this figure could rise to nearly 86% under a doubling of the region's population. Thus, Reisner's incisive journalism led him to the same conclusions as those rendered by copious data, modern scientific tools, and the application of a more genuine scientific method. We close with a prospectus for reclaiming freshwater sustainability in the Cadillac Desert, including a suite of recommendations for reducing region-wide human appropriation of streamflow to a target level of 60%. PMID:21149727

  13. Spectral reflectance in the Tunisian desert.

    NARCIS (Netherlands)

    Epema, G.F.

    1992-01-01

    .Satellites provide the possibility to give a synoptical view of the earth surface at regular time intervals. Satellites operating in the optical wavelengths have however as disadvantage that monitoring of the surface characteristics becomes impossible as soon as clouds are present. Deserts and dese

  14. Liquid Water Restricts Habitability in Extreme Deserts.

    Science.gov (United States)

    Cockell, Charles S; Brown, Sarah; Landenmark, Hanna; Samuels, Toby; Siddall, Rebecca; Wadsworth, Jennifer

    2017-04-01

    Liquid water is a requirement for biochemistry, yet under some circumstances it is deleterious to life. Here, we show that liquid water reduces the upper temperature survival limit for two extremophilic photosynthetic microorganisms (Gloeocapsa and Chroococcidiopsis spp.) by greater than 40°C under hydrated conditions compared to desiccated conditions. Under hydrated conditions, thermal stress causes protein inactivation as shown by the fluorescein diacetate assay. The presence of water was also found to enhance the deleterious effects of freeze-thaw in Chroococcidiopsis sp. In the presence of water, short-wavelength UV radiation more effectively kills Gloeocapsa sp. colonies, which we hypothesize is caused by factors including the greater penetration of UV radiation into hydrated colonies compared to desiccated colonies. The data predict that deserts where maximum thermal stress or irradiation occurs in conjunction with the presence of liquid water may be less habitable to some organisms than more extreme arid deserts where organisms can dehydrate prior to being exposed to these extremes, thus minimizing thermal and radiation damage. Life in extreme deserts is poised between the deleterious effects of the presence and the lack of liquid water. Key Words: Deserts-Extremophiles-Stress-High temperatures-UV radiation-Desiccation. Astrobiology 17, 309-318.

  15. Preventing desert locust plagues: optimizing management interventions

    NARCIS (Netherlands)

    Huis, van A.; Cressman, K.; Magor, J.I.

    2007-01-01

    Solitarious desert locusts, Schistocerca gregaria (Forskål) (Orthoptera: Acrididae), inhabit the central, arid, and semi-arid parts of the species¿ invasion area in Africa, the Middle East, and South-West Asia. Their annual migration circuit takes them downwind to breed sequentially where winter, sp

  16. Habitat selection by juvenile Mojave Desert tortoises

    Science.gov (United States)

    Todd, Brian D; Halstead, Brian J.; Chiquoine, Lindsay P.; Peaden, J. Mark; Buhlmann, Kurt A.; Tuberville, Tracey D.; Nafus, Melia G.

    2016-01-01

    Growing pressure to develop public lands for renewable energy production places several protected species at increased risk of habitat loss. One example is the Mojave desert tortoise (Gopherus agassizii), a species often at the center of conflicts over public land development. For this species and others on public lands, a better understanding of their habitat needs can help minimize negative impacts and facilitate protection or restoration of habitat. We used radio-telemetry to track 46 neonate and juvenile tortoises in the Eastern Mojave Desert, California, USA, to quantify habitat at tortoise locations and paired random points to assess habitat selection. Tortoise locations near burrows were more likely to be under canopy cover and had greater coverage of perennial plants (especially creosote [Larrea tridentata]), more coverage by washes, a greater number of small-mammal burrows, and fewer white bursage (Ambrosia dumosa) than random points. Active tortoise locations away from burrows were closer to washes and perennial plants than were random points. Our results can help planners locate juvenile tortoises and avoid impacts to habitat critical for this life stage. Additionally, our results provide targets for habitat protection and restoration and suggest that diverse and abundant small-mammal populations and the availability of creosote bush are vital for juvenile desert tortoises in the Eastern Mojave Desert.

  17. 48 CFR 1552.235-75 - Access to Toxic Substances Control Act Confidential Business Information (APR 1996).

    Science.gov (United States)

    2010-10-01

    ... Control Act Confidential Business Information (APR 1996). 1552.235-75 Section 1552.235-75 Federal...: Access to Toxic Substances Control Act Confidential Business Information (APR 1996) In order to perform... Control Act (TSCA) confidential business information (CBI). The Contractor and all of its...

  18. Wood decay in desert riverine environments

    Science.gov (United States)

    Andersen, Douglas; Stricker, Craig A.; Nelson, S. Mark

    2016-01-01

    Floodplain forests and the woody debris they produce are major components of riverine ecosystems in many arid and semiarid regions (drylands). We monitored breakdown and nitrogen dynamics in wood and bark from a native riparian tree, Fremont cottonwood (Populus deltoides subsp. wislizeni), along four North American desert streams. We placed locally-obtained, fresh, coarse material [disks or cylinders (∼500–2000 cm3)] along two cold-desert and two warm-desert rivers in the Colorado River Basin. Material was placed in both floodplain and aquatic environments, and left in situ for up to 12 years. We tested the hypothesis that breakdown would be fastest in relatively warm and moist aerobic environments by comparing the time required for 50% loss of initial ash-free dry matter (T50) calculated using exponential decay models incorporating a lag term. In cold-desert sites (Green and Yampa rivers, Colorado), disks of wood with bark attached exposed for up to 12 years in locations rarely inundated lost mass at a slower rate (T50 = 34 yr) than in locations inundated during most spring floods (T50 = 12 yr). At the latter locations, bark alone loss mass at a rate initially similar to whole disks (T50 = 13 yr), but which subsequently slowed. In warm-desert sites monitored for 3 years, cylinders of wood with bark removed lost mass very slowly (T50 = 60 yr) at a location never inundated (Bill Williams River, Arizona), whereas decay rate varied among aquatic locations (T50 = 20 yr in Bill Williams River; T50 = 3 yr in Las Vegas Wash, an effluent-dominated stream warmed by treated wastewater inflows). Invertebrates had a minor role in wood breakdown except at in-stream locations in Las Vegas Wash. The presence and form of change in nitrogen content during exposure varied among riverine environments. Our results suggest woody debris breakdown in desert riverine ecosystems is primarily a microbial process with rates determined by landscape position

  19. EDUCATIONAL PSYCHOLOGY

    Directory of Open Access Journals (Sweden)

    Sunil Patil

    2009-06-01

    Full Text Available Education Psychology is one of the most rapidly advancing disciplines which is concerned with the description, explanation and control of the educational processes arising from the interaction between the teacher and learner in the context of a specified or unspecified subject. The concept of educational psycology is changing as a result of the general impact of the disciplines such as sociology, anthropology,economics, political science and so on. The subject matter of educational psychology is also reflecting a diversity of structures and emphases in its connection.

  20. Space psychology

    Science.gov (United States)

    Parin, V. V.; Gorbov, F. D.; Kosmolinskiy, F. P.

    1974-01-01

    Psychological selection of astronauts considers mental responses and adaptation to the following space flight stress factors: (1) confinement in a small space; (2) changes in three dimensional orientation; (3) effects of altered gravity and weightlessness; (4) decrease in afferent nerve pulses; (5) a sensation of novelty and danger; and (6) a sense of separation from earth.

  1. Psychology Experiments.

    Science.gov (United States)

    McGraw, Ken; Tew, Mark D.; Williams, John E.

    2001-01-01

    A goal of the PsychExperiments project was to reduce the financial burden on psychology departments for hardware/software used in their laboratories. In its third year, the PsychExperiments site now hosts 39 experiments. Over 200 classrooms worldwide have signed up as official site users and there have been nearly 10,000 data sessions conducted.…

  2. Psychology Today.

    Science.gov (United States)

    Anderssen, Arthur

    2003-01-01

    Describes the design of the University of Texas Austin's Seay Psychology and Child Development & Family Relationships building. With modern technique and materials, the Seay building adds to the established architectural language of the campus, offering a richly tactile structure and adjoining outdoor space embracing the tenets of successful…

  3. Psychology Experiments.

    Science.gov (United States)

    McGraw, Ken; Tew, Mark D.; Williams, John E.

    2001-01-01

    A goal of the PsychExperiments project was to reduce the financial burden on psychology departments for hardware/software used in their laboratories. In its third year, the PsychExperiments site now hosts 39 experiments. Over 200 classrooms worldwide have signed up as official site users and there have been nearly 10,000 data sessions conducted.…

  4. Perceptions of healthcare professionals for colleague confidentiality. A descriptive study.

    Directory of Open Access Journals (Sweden)

    Karkasina Α.

    2013-01-01

    Full Text Available Introduction: Cooperation among nurses is related to Colleague’s Confidentiality Protection, according to Nursing Deontology and their Code of Ethics.The purpose of this study was the evaluation of nursing personnel attitudes, perceptions and behavior towards Colleague’s Confidentiality. Methodology: This study was conducted on the basis of the Master Studies in “Management of health services and crisis management” of University of Peloponnese from July till November of 2011. The sample of the study included nursing personnel of General Hospital of Sparta, of Molai and of Panarkadian Hospital of Tripolis. Based on the study of literature a questionnaire was constructed. Data consistency was tested by Cronbach α (α= 0,81. Specifically, the questionnaire reflected the attitudes and perceptions related to the behavior of the nursing staff regarding the cooperation among them and their collaboration with patients. It also included questions investigating actions made by the participants in case a colleague put in danger patient’s life or risked an infection. Finally, there were questions regarding the participants’ satisfaction from actions taken in case they made a report for a nursing error to the ward they were working. 200 questionnaires were distributed and 177 were finally answered (88.5% respone rate. For the statistical analysis the statistical program SPSS V.16 was used. Results: 9.7% of the participants were men and the rest 90,3% were women. Mean age of the sample was 36,8 years with the lowest to be 20 years old and the highest 58 years old. The majority of the participants (40% said that they had reported an error but they didn’t do it officially. The main reason for non-reporting it was because of the Colleague’s Confidentiality’s Protection. A rate of 48% of the nurses knew Nurses’ Code of Ethics and the law existence supporting it. A rate of 32.5% of the participants considered that by reporting an error, the

  5. 中国心理咨询/治疗中有关保密研究的文献回顾%Literature Review of Confidentiality Research in Counseling and Psychotherapy Field of China

    Institute of Scientific and Technical Information of China (English)

    周司丽; 侯志瑾; 姚莹颖

    2012-01-01

    Confidentiality is a significant precondition to counseling and psychotherapy. As one of ethical codes, it means counselors and psychotherapist should keep clients' information disclosed confidentially. Confidentiality is a complex ethical behavior of the profession. The present study aimed to review all quantitative studies and argumentary papers published on confidentiality in China, and to conclude the status quo and future direction of research and practice of confidentiality. The refinement of the first edition of "Ethical Codes for Clinical and Counseling Professionals of Chinese Psychological Society" was also proposed through review.%保密是进行心理咨询与治疗的一项重要基本前提,其作为伦理守则是指为来访者在咨询与治疗中所表达的信息保守秘密.然而,保密原则在实施中是一个复杂的专业伦理行为.本文试图通过回顾我国心理咨询与治疗领域有关保密的量化研究与各种评述,总结我国心理咨询与治疗领域有关保密问题的研究和实践现状与不足,并在此基础上为《中国心理学会临床与咨询心理学工作伦理守则(第一版)》提出完善建议.

  6. Snow, the Great River, and the Desert

    Science.gov (United States)

    Rango, A.

    2005-12-01

    While many major rivers around the world originate from alpine snowpacks in mountain regions, some experience the extreme contrast of flowing through harsh desert environments downriver. One such stream is the Rio Grande which rises in the San Juan and the Sangre de Christo mountains of southern Colorado and northern New Mexico. Eventually, the snow fed Rio Grande flows through North America's largest desert, the Chihuahuan Desert in New Mexico, Texas, and Mexico, and simultaneously becomes part of the border between the United States and Mexico. As is often true, urban areas develop along the river corridors rather than in more inaccessible mountain regions. This demographic preference tends to isolate the vast majority of population in the Rio Grande, who are dependent on water for their livelihoods, from the mountain snowpacks where the flow is generated. Ironically then, snow is seldom viewed as the source of the much needed water flowing through the desert by the majority of the basin's population. In arid regions of the western U.S., water demand far exceeds the water supply, and water use is apportioned under the doctrine of prior appropriation with the oldest right getting the first use of water. The increasing population in urban areas does not usually have a right to use the water flowing through the desert unless water rights have been purchased by municipalities from the major category of water user in these basins, namely, irrigated agriculture. In the entire Rio Grande basin, irrigation makes up 80% of the consumptive use of water. Additionally, basin compacts and international treaties apportion water between states and countries. Because these formal agreements were based on above average runoff years, there is little flexibility in changing the use of water, particularly in dry to normal runoff years. Most of the older water rights in the Rio Grande, especially the upper basin, are supplied by snowmelt. This leaves the lower basin to depend upon

  7. Disclosure of past crimes: an analysis of mental health professionals' attitudes towards breaching confidentiality.

    Science.gov (United States)

    Wangmo, Tenzin; Handtke, Violet; Elger, Bernice Simone

    2014-09-01

    Ensuring confidentiality is the cornerstone of trust within the doctor-patient relationship. However, health care providers have an obligation to serve not only their patient's interests but also those of potential victims and society, resulting in circumstances where confidentiality must be breached. This article describes the attitudes of mental health professionals (MHPs) when patients disclose past crimes unknown to the justice system. Twenty-four MHPs working in Swiss prisons were interviewed. They shared their experiences concerning confidentiality practices and attitudes towards breaching confidentiality in prison. Qualitative analysis revealed that MHPs study different factors before deciding whether a past crime should be disclosed, including: (1) the type of therapy the prisoner-patient was seeking (i.e., whether it was court-ordered or voluntary), (2) the type of crime that is revealed (e.g., a serious crime, a crime of a similar nature to the original crime, or a minor crime), and (3) the danger posed by the prisoner-patient. Based on this study's findings, risk assessment of dangerousness was one of the most important factors determining disclosures of past crimes, taking into consideration both the type of therapy and the crime involved. Attitudes of MHPs varied with regard to confidentiality rules and when to breach confidentiality, and there was thus a lack of consensus as to when and whether past crimes should be reported. Hence, legal and ethical requirements concerning confidentiality breaches must be made clear and known to physicians in order to guide them with difficult cases.

  8. Privacy and confidentiality: perspectives of mental health consumers and carers in pharmacy settings.

    Science.gov (United States)

    Hattingh, Hendrika Laetitia; Knox, Kathy; Fejzic, Jasmina; McConnell, Denise; Fowler, Jane L; Mey, Amary; Kelly, Fiona; Wheeler, Amanda J

    2015-02-01

    The study aims to explore within the community pharmacy practice context the views of mental health stakeholders on: (1) current and past experiences of privacy, confidentiality and support; and (2) expectations and needs in relation to privacy and confidentiality. In-depth interviews and focus groups were conducted in three states in Australia, namely Queensland, the northern region of New South Wales and Western Australia, between December 2011 and March 2012. There were 98 participants consisting of consumers and carers (n = 74), health professionals (n = 13) and representatives from consumer organisations (n = 11). Participants highlighted a need for improved staff awareness. Consumers indicated a desire to receive information in a way that respects their privacy and confidentiality, in an appropriate space. Areas identified that require improved protection of privacy and confidentiality during pharmacy interactions were the number of staff having access to sensitive information, workflow models causing information exposure and pharmacies' layout not facilitating private discussions. Challenges experienced by carers created feelings of isolation which could impact on care. This study explored mental health stakeholders' experiences and expectations regarding privacy and confidentiality in the Australian community pharmacy context. A need for better pharmacy staff training about the importance of privacy and confidentiality and strategies to enhance compliance with national pharmacy practice requirements was identified. Findings provided insight into privacy and confidentiality needs and will assist in the development of pharmacy staff training material to better support consumers with sensitive conditions. © 2014 Royal Pharmaceutical Society.

  9. Confidentiality in Family Planning Services for Young People: A Systematic Review.

    Science.gov (United States)

    Brittain, Anna W; Williams, Jessica R; Zapata, Lauren B; Moskosky, Susan B; Weik, Tasmeen S

    2015-08-01

    Family planning services are essential for reducing high rates of unintended pregnancies among young people, yet a perception that providers will not preserve confidentiality may deter youth from accessing these services. This systematic review, conducted in 2011, summarizes the evidence on the effect of assuring confidentiality in family planning services to young people on reproductive health outcomes. The review was used to inform national recommendations on providing quality family planning services. Multiple databases were searched to identify articles addressing confidentiality in family planning services to youth aged 10-24 years. Included studies were published from January 1985 through February 2011. Studies conducted outside the U.S., Canada, Europe, Australia, or New Zealand, and those that focused exclusively on HIV or sexually transmitted diseases, were excluded. The search strategy identified 19,332 articles, nine of which met the inclusion criteria. Four studies examined outcomes. Examined outcomes included use of clinical services and intention to use services. Of the four outcome studies, three found a positive association between assurance of confidentiality and at least one outcome of interest. Five studies provided information on youth perspectives and underscored the idea that young people greatly value confidentiality when receiving family planning services. This review demonstrates that there is limited research examining whether confidentiality in family planning services to young people affects reproductive health outcomes. A robust research agenda is needed, given the importance young people place on confidentiality. Published by Elsevier Inc.

  10. Attacker Control and Impact for Confidentiality and Integrity

    CERN Document Server

    Askarov, Aslan

    2011-01-01

    Language-based information flow methods offer a principled way to enforce strong security properties, but enforcing noninterference is too inflexible for realistic applications. Security-typed languages have therefore introduced declassification mechanisms for relaxing confidentiality policies, and endorsement mechanisms for relaxing integrity policies. However, a continuing challenge has been to define what security is guaranteed when such mechanisms are used. This paper presents a new semantic framework for expressing security policies for declassification and endorsement in a language-based setting. The key insight is that security can be characterized in terms of the influence that declassification and endorsement allow to the attacker. The new framework introduces two notions of security to describe the influence of the attacker. Attacker control defines what the attacker is able to learn from observable effects of this code; attacker impact captures the attacker's influence on trusted locations. This ap...

  11. Talking about suicide: confidentiality and anonymity in qualitative research.

    Science.gov (United States)

    Gibson, Susanne; Benson, Outi; Brand, Sarah L

    2013-02-01

    While it is acknowledged that there is a need for more qualitative research on suicide, it is also clear that the ethics of undertaking such research need to be addressed. This article uses the case study of the authors' experience of gaining ethics approval for a research project that asks people what it is like to feel suicidal to (a) analyse the limits of confidentiality and anonymity and (b) consider the ways in which the process of ethics review can shape and constrain suicide research. This leads to a discussion of the ways in which ethics committees assess and monitor qualitative research more generally and some preliminary suggestions for how this might be improved.

  12. Effects of Onset and Type of Fathers' Absence on Children's Levels of Psychological Differentiation.

    Science.gov (United States)

    Gershansky, Ira S.; And Others

    1980-01-01

    The portable rod-and-frame test was used to measure the level of psychological differentation for 100 behavior-problem, father-absent children, ages 8-16. A significant interaction was noted between the reason for the father's absence (death vs divorce/desertion) and the child's age when the father left home. (Author/SJL)

  13. Cultural psychology.

    Science.gov (United States)

    Heine, Steven J; Ruby, Matthew B

    2010-03-01

    Humans are a cultural species, constantly navigating a complex web of culturally bound practices, norms, and worldviews. This article provides a brief overview of the relatively young field of cultural psychology, which investigates the many ways psychology and culture interweave with one another. Highlighting the cultural nature of the human species, it draws upon research on cultural evolution, enculturation, and developmental processes. This review further summarizes a number of cultural differences in how people perceive the self, and the behavioral consequences that follow from these differences, in the domains of internal and external attribution styles, motivations for self-enhancement, approach/avoidance, primary and secondary control, as well as motivations for distinctiveness and conformity. Additionally, the review discusses research on the intersection of culture and emotion, as well as cultural differences in cognition, perception, and reasoning. Copyright © 2010 John Wiley & Sons, Ltd. For further resources related to this article, please visit the WIREs website. Copyright © 2010 John Wiley & Sons, Ltd.

  14. High performance robotic traverse of desert terrain.

    Energy Technology Data Exchange (ETDEWEB)

    Whittaker, William (Carnegie Mellon University, Pittsburgh, PA)

    2004-09-01

    This report presents tentative innovations to enable unmanned vehicle guidance for a class of off-road traverse at sustained speeds greater than 30 miles per hour. Analyses and field trials suggest that even greater navigation speeds might be achieved. The performance calls for innovation in mapping, perception, planning and inertial-referenced stabilization of components, hosted aboard capable locomotion. The innovations are motivated by the challenge of autonomous ground vehicle traverse of 250 miles of desert terrain in less than 10 hours, averaging 30 miles per hour. GPS coverage is assumed to be available with localized blackouts. Terrain and vegetation are assumed to be akin to that of the Mojave Desert. This terrain is interlaced with networks of unimproved roads and trails, which are a key to achieving the high performance mapping, planning and navigation that is presented here.

  15. Himalayan Mountain Range, Taklimakan Desert, China

    Science.gov (United States)

    1991-01-01

    Looking north from Kashmir India (27.5N, 76.5E) into the Tibetan Plateau and beyond, the Taklimakan Desert of far western China appears to be covered with an extensive layer of haze that blankets the entire region. Reaching even into the western Siberian Plains of the CIS. This rugged land is one of the world's richest treasure troves of mineral wealth but the accessability into this remote area is so difficult that it is not yet economically feasible.

  16. Expansion and contraction of Chinese deserts during the Quaternary

    Institute of Scientific and Technical Information of China (English)

    刘东生; 孙继敏

    2002-01-01

    Episodic dune formations during the Quaternary are found in many deserts of China.The causes of desert expansions on different time scales are not the same. Desert extension atabout 1.1 and 0.9 Ma ago were the response to the active tectonic movements, whereas the de-sert evolutions on the ten-thousand years time scale were the response to the orbital scale climaticchanges. Spatial scale studies on desert evolution indicate that desert margins shifted greatly dur-ing the last glacial maximum (LGM) and the Holocene optimum, its changing from 125°E of theLGM to 105°E of the climatic optimum. Historical desertification in the semiarid China is not a re-sponse to climate drought but largely associated with the human impacts (mainly over-cultivation)since about 2300 years ago, which leads to the reworking of the underlying LGM sands.

  17. Wind modeling of Chihuahuan Desert dust outbreaks

    Science.gov (United States)

    Rivera Rivera, Nancy I.; Gill, Thomas E.; Gebhart, Kristi A.; Hand, Jennifer L.; Bleiweiss, Max P.; Fitzgerald, Rosa M.

    The Chihuahuan Desert region of North America is a significant source of mineral aerosols in the Western Hemisphere, and Chihuahuan Desert dust storms frequently impact the Paso del Norte (El Paso, USA/Ciudad Juarez, Mexico) metropolitan area. A statistical analysis of HYSPLIT back trajectory residence times evaluated airflow into El Paso on all days and on days with synoptic (non-convective) dust events in 2001-2005. The incremental probability—a measure of the areas most likely to have been traversed by air masses arriving at El Paso during dusty days—was only strongly positively associated with the region west-southwest of the city, a zone of known dust source areas. Focused case studies were made of major dust events on 15 April and 15 December 2003. Trajectories approached the surface and MM5 (NCAR/Penn State Mesoscale Model) wind speeds increased at locations consistent with dust sources observed in satellite imagery on those dates. Back trajectory and model analyses suggested that surface cyclones adjacent to the Chihuahuan Desert were associated with the extreme dust events, consistent with previous studies of dust storms in the Southern High Plains to the northeast. The recognition of these meteorological patterns serves as a forecast aid for prediction of dust events likely to impact the Paso del Norte.

  18. Adsorption of dyes on Sahara desert sand.

    Science.gov (United States)

    Varlikli, Canan; Bekiari, Vlasoula; Kus, Mahmut; Boduroglu, Numan; Oner, Ilker; Lianos, Panagiotis; Lyberatos, Gerasimos; Icli, Siddik

    2009-10-15

    Sahara desert sand (SaDeS) was employed as a mineral sorbent for retaining organic dyes from aqueous solutions. Natural sand has demonstrated a strong affinity for organic dyes but significantly lost its adsorption capacity when it was washed with water. Therefore, characterization of both natural and water washed sand was performed by XRD, BET, SEM and FTIR techniques. It was found that water-soluble kyanite, which is detected in natural sand, is the dominant factor affecting adsorbance of cationic dyes. The sand adsorbs over 75% of cationic dyes but less than 21% for anionic ones. Among the dyes studied, Methylene Blue (MB) demonstrated the strongest affinity for Sahara desert sand (Q(e)=11.98 mg/g, for initial dye solution concentration 3.5 x 10(-5)mol/L). The effects of initial dye concentration, the amount of the adsorbent, the temperature and the pH of the solution on adsorption capacity were tested by using Methylene Blue as model dye. Pseudo-first-order, pseudo-second-order and intraparticle diffusion models were applied. It was concluded that adsorption of Methylene Blue on Sahara desert sand followed pseudo-second order kinetics. Gibbs free energy, enthalpy change and entropy change were calculated and found -6411 J/mol, -30360 J/mol and -76.58 J/mol K, respectively. These values indicate that the adsorption is an exothermic process and has a spontaneous nature at low temperatures.

  19. The Palm Desert renewable [hydrogen] transportation system

    Energy Technology Data Exchange (ETDEWEB)

    Chamberlin, C.E.; Lehman, P. [Humboldt State Univ., Arcata, CA (United States). Schatz Energy Research Center

    1998-08-01

    This paper describes the Schatz Energy Research Center (SERC) progress on the Palm Desert Renewable Hydrogen Transportation System Project for the period June 1997 through May 1998. The project began in March 1996. The goal of the Palm Desert Project is to develop a clean and sustainable transportation system for a community. The project demonstrates the practical utility of hydrogen as a transportation fuel and the proton exchange membrane (PEM) fuel cell as a vehicle power system. The project includes designing and building 4 fuel cell powered vehicles, a solar hydrogen generating and refueling station, and a fuel cell vehicle diagnostic center. Over this last year, SERC has built a fuel cell powered neighborhood electric vehicle and delivered it to the City of Palm Desert. The design of the hydrogen refueling station is near completion and it is anticipated that construction will be complete in the fall of 1998. The vehicles are currently being refueled at a temporary refueling station. The diagnostic center is being designed and maintenance procedures as well as computer diagnostic programs for the fuel cell vehicles are being developed. City employees are driving the vehicles daily and monitoring data are being collected. The drivers are pleased with the performance of the vehicles.

  20. CAMEL REARING IN CHOLISTAN DESERT OF PAKISTAN

    Directory of Open Access Journals (Sweden)

    I. ALI, M. SHAFIQ CHAUDHRY1 AND U. FAROOQ

    2009-05-01

    Full Text Available The camel is one of the typical and the best adopted animals of the desert, capable of enduring thirst and hunger for days and is the most patient of land animals. For desert nomads of Pakistani Cholistan, it is a beloved companion, a source of milk and meat, transport facility provider and a racing/dancing animal, thus, playing an important role in the socioeconomic uplift of the local community. Camels of Marrecha or Mahra breed are mainly used for riding and load carrying but may be trained for dancing or racing. Berella is another heavy and milch breed of camel famous for milk production and can produce upto 10-15 liters of milk per day. This breed is also suitable for draught purpose, though comparatively slow due to heavy body. The present paper also describes the traditional camel rearing system used by nomads of Cholistan desert. Some aspects of camel health, production, feeding, socio-economic values, marketing and some constraints and suggestions are also given so that the policy makers may consider them for the welfare of this animal.

  1. Sonoran Desert: Fragile Land of Extremes

    Science.gov (United States)

    Produced and Directed by Wessells, Stephen

    2003-01-01

    'Sonoran Desert: Fragile Land of Extremes' shows how biologists with the U.S. Geological Survey work with other scientists in an effort to better understand native plants and animals such as desert tortoises, saguaro cacti, and Gila monsters. Much of the program was shot in and around Saguaro National Park near Tucson, Arizona. Genetic detective work, using DNA, focuses on understanding the lives of tortoises. Studies of saguaros over many decades clarify how these amazing plants reproduce and thrive in the desert. Threats from fire, diseases in tortoises, and a growing human population motivate the scientists. Their work to identify how these organisms live and survive is a crucial step for the sound management of biological resources on public lands. This 28-minute program, USGS Open-File Report 03-305, was shot entirely in high definition video and produced by the USGS Western Ecological Research Center and Southwest Biological Science Center; produced and directed by Stephen Wessells, Western Region Office of Communications.

  2. Psychology of religion: perspectives from cultural psychology

    NARCIS (Netherlands)

    Belzen, J.A.

    2010-01-01

    After a brief introduction, this paper tries to establish what type of psychology the psychology of religion is. Having introduced cultural psychology in general, some theories applicable in research on religion are presented, and some examples of cultural psychological research of religious

  3. Psychology Faculty Perceptions of Abnormal Psychology Textbooks

    Science.gov (United States)

    Rapport, Zachary

    2011-01-01

    The problem. The purpose of the current study was to investigate the perceptions and opinions of psychology professors regarding the accuracy and inclusiveness of abnormal psychology textbooks. It sought answers from psychology professors to the following questions: (1) What are the expectations of the psychology faculty at a private university of…

  4. Aerosol direct radiative forcing in desert and semi-desert regions of northwestern China

    Science.gov (United States)

    Xin, Jinyuan; Gong, Chongshui; Wang, Shigong; Wang, Yuesi

    2016-05-01

    The optical properties of dust aerosols were measured using narrow-band data from a portable sun photometer at four desert and semi-desert stations in northwestern China from 2004 to 2007. Ground-based and satellite observations indicated absorbing dust aerosol loading over the region surrounded by eight large-scale deserts. Radiation forcing was identified by using the Santa Barbara DISORT Atmospheric Radiative Transfer (SBDART) model. The ranges of annual mean aerosol optical depth (AOD), Angström exponents, and single-scattering albedo (SSA) were from 0.25 to 0.35, from - 0.73 to 1.18, and from 0.77 to 0.86, respectively. The ranges of annual mean aerosol direct radiative forcing values at the top of the atmosphere (TOA), mid-atmosphere, and on the surface were from 3.9 to 12.0, from 50.0 to 53.1, and from - 39.1 to - 48.1 W/m2, respectively. The aerosols' optical properties and radiative characteristics showed strong seasonal variations in both the desert and semi-desert regions. Strong winds and relatively low humidity will lead dust aerosols in the atmosphere to an increase, which played greatly affected these optical properties during spring and winter in northwestern China. Based on long-term observations and retrieved data, aerosol direct radiative forcing was confirmed to heat the atmosphere (50-53 W/m2) and cool the surface (- 39 to - 48 W/m2) above the analyzed desert. Radiative forcing in the atmosphere in spring and winter was 18 to 21 W/m2 higher than other two seasons. Based on the dust sources around the sites, the greater the AOD, the more negative the forcing. The annual averaged heating rates for aerosols close to the ground (1 km) were approximately 0.80-0.85 K/day.

  5. Narrative psychological content analysis as a tool for psychological status monitoring of crews in isolated, confined and extreme settings

    Science.gov (United States)

    Ehmann, B.; Balázs, L.; Fülöp, É.; Hargitai, R.; Kabai, P.; Péley, B.; Pólya, T.; Vargha, A.; László, J.

    2011-05-01

    This paper is about a pilot application of narrative psychological content analysis in the psychological status monitoring of Crew 71 of a space analog simulation environment, the Mars Desert Research Station (MDRS). Both the method and its theoretical framework, Scientific Narrative Psychology, are original developments by Hungarian psychologists [5] (László, 2008). The software was NooJ, a multilingual linguistic development environment [11] (Silberztein, 2008). Three measures were conceptualized and assessed: emotional status, team spirit and subjective physical comfort. The results showed the patterns of these three measures on a daily basis at group level, and allowed for detecting individual differences as well. The method is adaptable to languages involved in space psychology, e.g. Russian, French and German in addition to English.

  6. The Use of Water During the Crew 144, Mars Desert Research Station, Utah Desert

    Science.gov (United States)

    De Morais Mendonca Teles, Antonio

    2016-07-01

    Well. from November 29th to December 14th, 2014, the author conducted astrobiological and geological surveys, as analog astronaut member of the international Crew 144, at the site of the Mars Society's Mars Desert Research Station, located at a remote location in the Utah desert, United States. The use of water for drinking, bathing, cleaning, etc., in the crew was a major issue for consideration for a human expedition to the planet Mars in the future. The author would like to tell about the factors of the rationalized use of water.

  7. Ethical issues of using psychological knowledge in the proceedings of the non-procedural forms

    Directory of Open Access Journals (Sweden)

    Safuanov F.S.

    2014-12-01

    Full Text Available The article discusses the main ethical problems arising from the use of psychological knowledge in the criminal and civil proceedings in the form of non-procedural. Showing legal environment conducive to violations of ethics of psychological research reference and advisory nature: equality of the parties, the right of lawyers to draw on contractual basis to clarify issues related to the provision of legal aid. Reveals the main subjective factors of psychological research ethics violations: low level of professional competence psychologist, ignoring the principles of independence, objectivity, confidentiality. Suggests ways of overcoming the ethical issues - in the process of formation of graduate and postgraduate education of ethical competence, implementation of certain algorithms psychologist interaction with the side of a criminal or civil process - customer psychological services. It is proposed to consolidate legislation or regulations regulating certain kinds of non-procedural forms of use of psychological knowledge in the proceedings.

  8. 78 FR 20101 - Access to Confidential Business Information by Chemical Abstract Services

    Science.gov (United States)

    2013-04-03

    ... From the Federal Register Online via the Government Publishing Office ENVIRONMENTAL PROTECTION AGENCY Access to Confidential Business Information by Chemical Abstract Services AGENCY: Environmental Protection Agency (EPA). ACTION: Notice. SUMMARY: EPA expects to authorize its contractor, Chemical...

  9. 75 FR 56096 - Access to Confidential Business Information by Industrial Economics Incorporated

    Science.gov (United States)

    2010-09-15

    ... From the Federal Register Online via the Government Publishing Office ENVIRONMENTAL PROTECTION AGENCY Access to Confidential Business Information by Industrial Economics Incorporated AGENCY... Economics Incorporated (IEI) of Cambridge, MA, to access information which has been submitted to EPA...

  10. 76 FR 37111 - Access to Confidential Business Information by Computer Sciences Corporation and Its Identified...

    Science.gov (United States)

    2011-06-24

    ... From the Federal Register Online via the Government Publishing Office ENVIRONMENTAL PROTECTION AGENCY Access to Confidential Business Information by Computer Sciences Corporation and Its Identified... contractor, Computer Sciences Corporation of Chantilly, VA and Its Identified Subcontractors, to access...

  11. Clean Air Act: Confidential business information security manual (revised). Procedures manual

    Energy Technology Data Exchange (ETDEWEB)

    Toomer, M.W.

    1998-08-01

    The procedures in this manual provide Federal, contractor, and subcontractor employees with the information necessary to utilize Confidential Business Information to perform their assigned duties without violating applicable Federal regulations protecting the rights of its owners.

  12. Is it acceptable for a psychiatrist to break confidentiality to prevent spousal violence?

    Science.gov (United States)

    Guedj, Myriam; Sastre, Maria Teresa Muñoz; Mullet, Etienne; Sorum, Paul Clay

    2009-01-01

    When is it acceptable for a psychiatrist to break confidentiality to protect the wife of a potentially violent patient? 153 lay persons, 13 nursing personnel, 10 physicians, and 10 psychologists in France indicated this acceptability in 48 scenarios. The scenarios were all combinations of 5 factors: gravity of threat (death or beating), certainty of mental illness (certain or not), time spent talking with patient (considerable or little), his attitude toward psychotherapy (rejection, indecision, or acceptance), and whether the physician consulted an expert. Lay people favored breaking confidentiality more than did nursing personnel or psychologists. Consulting an expert had greatest impact. Lay participants were composed of groups that found breaking confidentiality "always acceptable" (22 participants), "depending on many circumstances" (106), requiring "consultation with an expert" (31), and "never acceptable" (27). Lay people in France are influenced by situational factors when deciding if a psychiatrist should break confidentiality to protect a patient's wife.

  13. 19 CFR 206.66 - Limited disclosure of certain confidential business information under administrative protective...

    Science.gov (United States)

    2010-04-01

    ... business information under administrative protective order. 206.66 Section 206.66 Customs Duties UNITED STATES INTERNATIONAL TRADE COMMISSION NONADJUDICATIVE INVESTIGATIONS INVESTIGATIONS RELATING TO GLOBAL... certain confidential business information under administrative protective order. In an investigation...

  14. Design and realization of confidential data management system RFID-based

    Science.gov (United States)

    Huang, Wei; Wang, Zhong; Wang, Xin

    2017-03-01

    This paper introduces the composition of RFID system, and then analyzes the hardware design and software design systems, and finally summarizes the realization and application of the confidential data management system RFID-based.

  15. 32 CFR 727.8 - Confidential and privileged character of service provided.

    Science.gov (United States)

    2010-07-01

    ... legal sense as outlined in the Code of Professional Responsibility, as opposed to confidential in the... individual legal assistance client by name or any other particular, such as social security number, shall...

  16. 76 FR 77224 - Access to Confidential Business Information by Primus Solutions, Inc.

    Science.gov (United States)

    2011-12-12

    ... From the Federal Register Online via the Government Publishing Office ENVIRONMENTAL PROTECTION AGENCY Access to Confidential Business Information by Primus Solutions, Inc. AGENCY: Environmental Protection Agency (EPA). ACTION: Notice. SUMMARY: EPA has authorized its contractor, Primus Solutions,...

  17. 16 CFR 312.8 - Confidentiality, security, and integrity of personal information collected from children.

    Science.gov (United States)

    2010-01-01

    ... personal information collected from children. 312.8 Section 312.8 Commercial Practices FEDERAL TRADE... Confidentiality, security, and integrity of personal information collected from children. The operator must... personal information collected from children....

  18. Confidential Financial Disclosure Form for Environmental Protection Agency Special Government Employees (EPA Form 3110-48)

    Science.gov (United States)

    EPA uses the Confidential Financial Disclosure Form to determine whether there is a conflict of interest or the appearance of a lack of impartiality with regard to the topic under review by the FIFRA Scientific Advisory Panel.

  19. Nursing Students' Perceptions of Confidentiality, Accountability, and E-Professionalism in Relation to Facebook.

    Science.gov (United States)

    Barnable, Alexia; Cunning, Glenda; Parcon, Mariel

    2017-08-29

    This study examined nursing students' perceptions of confidentiality, accountability, and e-professionalism in relation to Facebook. All of the students were aware that posting patients' names and pictures of patients constituted a confidentiality breach. When comparing students based on educational status, there were differing opinions on whether employers should use Facebook profile information for hiring decisions. Nursing programs should provide current education, including clear and up-to-date policies, about social media use.

  20. Attitudes toward medical and genetic confidentiality in the Saudi research biobank: An exploratory survey.

    Science.gov (United States)

    Alahmad, Ghiath; Hifnawy, Tamer; Abbasi, Badaruddin; Dierickx, Kris

    2016-03-01

    Achieving a balance between giving access to information and respecting donors' confidentiality is a crucial issue for any biobank, with its large number of samples and associated information. Despite the existence of much empirical literature on confidentiality, there are too few surveys in the Middle East about the topic, particularly in the Saudi context. A survey was conducted of 200 respondents at King Abdulaziz Medical City in Riyadh, Saudi Arabia, among 5 groups of equal size, comprised of researchers, physicians, medical students, donors and laypersons, respectively. The majority of participants agreed that confidentiality is an important issue and that it is well protected in the Saudi biobank. All 5 groups showed different attitudes toward disclosing information to various third parties. They were in favor of allowing treating physicians, and to a certain extent family members, to have access to medical and genetic results from research. No significant differences were found between views on medical and genetic confidentiality. The majority of respondents agreed that confidentiality might be breached in cases with specific justified reasons. Even considering differences in religion, culture and other factors, the results of the study were consistent with those reported in the literature and research conducted in other countries. We therefore place emphasis on the importance of protecting and promoting patient/donor confidentiality and privacy.

  1. Confidentiality Protection of Digital Health Records in Cloud Computing.

    Science.gov (United States)

    Chen, Shyh-Wei; Chiang, Dai Lun; Liu, Chia-Hui; Chen, Tzer-Shyong; Lai, Feipei; Wang, Huihui; Wei, Wei

    2016-05-01

    Electronic medical records containing confidential information were uploaded to the cloud. The cloud allows medical crews to access and manage the data and integration of medical records easily. This data system provides relevant information to medical personnel and facilitates and improve electronic medical record management and data transmission. A structure of cloud-based and patient-centered personal health record (PHR) is proposed in this study. This technique helps patients to manage their health information, such as appointment date with doctor, health reports, and a completed understanding of their own health conditions. It will create patients a positive attitudes to maintain the health. The patients make decision on their own for those whom has access to their records over a specific span of time specified by the patients. Storing data in the cloud environment can reduce costs and enhance the share of information, but the potential threat of information security should be taken into consideration. This study is proposing the cloud-based secure transmission mechanism is suitable for multiple users (like nurse aides, patients, and family members).

  2. When security and medicine missions conflict: confidentiality in prison settings.

    Science.gov (United States)

    Allen, Scott A; Aburabi, Raed

    2016-06-13

    Purpose - It is a simple fact that prisons cannot exist - practically, legally, ethically or morally - without the support of physicians and other health professionals. Access to adequate healthcare is one of the fundamental measures of the legitimacy of a jail or prison. At the same time, there is a fundamental tension in the missions of the prison and doctor. The primary mission of the prison is security and often punishment. Reform and rehabilitation have intermittently been stated goals of prisons in the last century, but in practice those humane goals have rarely governed prison administrative culture. The primary mission of the physician is to promote the health and welfare of his or her patient. The paper aims to discuss these issues. Design/methodology/approach - At times, what is required to serve the patient's best interest is at odds with the interests of security. Much of the work of the prison physician does not conflict with the operation of security. Indeed, much of the work of the prison physician is allowed to proceed without much interference from the security regime. But given the fundamental discord in the legitimate missions of security vs medicine, conflict between the doctor and the warden is inevitable. Findings - In this paper, the authors consider the example of patient confidentiality to illustrate this conflict, using case examples inspired by real cases from the experience of the authors. Originality/value - The authors provide an ethical and practical framework for health professionals to employ when confronting these inevitable conflicts in correctional settings.

  3. Security, privacy, and confidentiality issues on the Internet.

    Science.gov (United States)

    Kelly, Grant; McKenzie, Bruce

    2002-01-01

    We introduce the issues around protecting information about patients and related data sent via the Internet. We begin by reviewing three concepts necessary to any discussion about data security in a healthcare environment: privacy, confidentiality, and consent. We are giving some advice on how to protect local data. Authentication and privacy of e-mail via encryption is offered by Pretty Good Privacy (PGP) and Secure Multipurpose Internet Mail Extensions (S/MIME). The de facto Internet standard for encrypting Web-based information interchanges is Secure Sockets Layer (SSL), more recently known as Transport Layer Security or TLS. There is a public key infrastructure process to 'sign' a message whereby the private key of an individual can be used to 'hash' the message. This can then be verified against the sender's public key. This ensures the data's authenticity and origin without conferring privacy, and is called a 'digital signature'. The best protection against viruses is not opening e-mails from unknown sources or those containing unusual message headers.

  4. The Palm Desert Renewable Hydrogen Transportation System

    Energy Technology Data Exchange (ETDEWEB)

    Lehman, P. [Humboldt State Univ., Arcata, CA (United States)

    1996-10-01

    The present paper describes, for purposes of the Department of Energy (DoE) Hydrogen Program Review, Schatz Energy Research Center (SERC) progress on the Palm Desert Renewable Hydrogen Transportation System Project for the period January through June 1996. This period represents the first six months of the three year project. The estimated cost over three years is $3.9M, $1.859M of which is funded by the DoE ($600 k for fiscal year 1996). The goal of the Palm Desert Project is to develop a clean and sustainable transportation system for a community. The project will demonstrate the practical utility of hydrogen as a transportation fuel and proton exchange membrane (PEM) fuel cells as vehicle power plants. This transportation system will be developed in the City of Palm Desert in southern California and will include a fleet of 8 fuel cell powered vehicles, solar and wind powered hydrogen generating facilities, a consumer-ready refueling station, and a service infrastructure. The system holds the promise of a clean environment and an energy supply that is predictable, domestic, safe, and abundant. During, the first part of 1996 SERC has nearly completed building a fuel cell powered personal utility vehicle, which features an upgraded safety and computer system; they have designed and built a test bench that is able to mimic golf cart loads and test fuel cell system auxiliary components; they have begun the design of the solar hydrogen generating station; they have worked with Sandia National Laboratory on an advanced metal hydride storage system; they have increased the power density of the SERC fuel cell by as much as 50%; and they have reached out to the rest of the world with a new fact sheet, world wide web pages, a press release, video footage for a television program. and instruction within the community.

  5. Physiological conjunction of allelochemicals and desert plants.

    Science.gov (United States)

    Yosef Friedjung, Avital; Choudhary, Sikander Pal; Dudai, Nativ; Rachmilevitch, Shimon

    2013-01-01

    Plants exchange signals with other physical and biological entities in their habitat, a form of communication termed allelopathy. The underlying principles of allelopathy and secondary-metabolite production are still poorly understood, especially in desert plants. The coordination and role of secondary metabolites were examined as a cause of allelopathy in plants thriving under arid and semiarid soil conditions. Desert plant species, Origanum dayi, Artemisia sieberi and Artemisia judaica from two different sources (cultivar cuttings and wild seeds) were studied in their natural habitats. Growth rate, relative water content, osmotic potential, photochemical efficiency, volatile composition and vital factors of allelopathy were analyzed at regular intervals along four seasons with winter showing optimum soil water content and summer showing water deficit conditions. A comprehensive analysis of the volatile composition of the leaves, ambient air and soil in the biological niche of the plants under study was carried out to determine the effects of soil water conditions and sample plants on the surrounding flora. Significant morpho-physiological changes were observed across the seasons and along different soil water content. Metabolic analysis showed that water deficit was the key for driving selective metabolomic shifts. A. judaica showed the least metabolic shifts, while A. sieberi showed the highest shifts. All the species exhibited high allelopathic effects; A. judaica displayed relatively higher growth-inhibition effects, while O. dayi showed comparatively higher germination-inhibition effects in germination assays. The current study may help in understanding plant behavior, mechanisms underlying secondary-metabolite production in water deficit conditions and metabolite-physiological interrelationship with allelopathy in desert plants, and can help cull economic benefits from the produced volatiles.

  6. Physiological conjunction of allelochemicals and desert plants.

    Directory of Open Access Journals (Sweden)

    Avital Yosef Friedjung

    Full Text Available Plants exchange signals with other physical and biological entities in their habitat, a form of communication termed allelopathy. The underlying principles of allelopathy and secondary-metabolite production are still poorly understood, especially in desert plants. The coordination and role of secondary metabolites were examined as a cause of allelopathy in plants thriving under arid and semiarid soil conditions. Desert plant species, Origanum dayi, Artemisia sieberi and Artemisia judaica from two different sources (cultivar cuttings and wild seeds were studied in their natural habitats. Growth rate, relative water content, osmotic potential, photochemical efficiency, volatile composition and vital factors of allelopathy were analyzed at regular intervals along four seasons with winter showing optimum soil water content and summer showing water deficit conditions. A comprehensive analysis of the volatile composition of the leaves, ambient air and soil in the biological niche of the plants under study was carried out to determine the effects of soil water conditions and sample plants on the surrounding flora. Significant morpho-physiological changes were observed across the seasons and along different soil water content. Metabolic analysis showed that water deficit was the key for driving selective metabolomic shifts. A. judaica showed the least metabolic shifts, while A. sieberi showed the highest shifts. All the species exhibited high allelopathic effects; A. judaica displayed relatively higher growth-inhibition effects, while O. dayi showed comparatively higher germination-inhibition effects in germination assays. The current study may help in understanding plant behavior, mechanisms underlying secondary-metabolite production in water deficit conditions and metabolite-physiological interrelationship with allelopathy in desert plants, and can help cull economic benefits from the produced volatiles.

  7. Pastoralist rock art in the Black Desert of Jordan

    NARCIS (Netherlands)

    Brusgaard, N.O.

    2015-01-01

    This paper discusses the current problems that exist with the rock art research of the Black Desert in Jordan and presents some preliminary field results of the author’s research on the petroglyphs. It also explore the possibilities that the rock art affords to learn more about the elusive desert

  8. The Desert and the Sown Project in Northern Jordan

    DEFF Research Database (Denmark)

    Kerner, Susanne

    2014-01-01

    The desert and sown project, which started in 1999 and continued in 2008-2009, studied the region between the settled areas east of Irbid and Ramtha and the surrounding desert at Mafraq (northern Jordan). Large parts of the material comes from the Palaeolithic period, while some smaller tells date...

  9. From desert to deluge in the Mediterranean

    OpenAIRE

    McKenzie, Judith A.

    2002-01-01

    Some time between five and six million years ago, the Mediterranean Sea became isolated from the Atlantic Ocean. In consequence some areas dried out -- hence the title of Kenneth Hsü’s book The Mediterranean was a Desert 1 -- and large salty lakes recharged by rivers flowing through deep canyons replaced the previously marine basins. During this time, the remaining bodies of water were either too salty or not salty enough for normal marine fauna to flourish. This was the so-called Messinian s...

  10. Morphodynamics of Planetary Deserts: A Laboratory Approach

    Science.gov (United States)

    Garcia, A.; Courrech Du Pont, S.; Rodriguez, S.

    2014-12-01

    Earth deserts show a rich variety of dune shapes from transverse to barchan, star and linear dunes depending on the history of wind regimes (strength and variability) and sand availability [1]. In desert, exposed to one wind direction, dunes perpendicular to the wind direction are found to be transverse or barchans, only sand availability plays a key role on their formation and evolution. However, the evolution time scale of such structures (several years) limits our investigation of their morphodynamics understanding. We use here, a laboratory experiment able to considerably reduce space and time scales by reproducing millimeter to centimeter subaqueous dunes by controlling environmental parameters such as type of wind (multi-winds, bimodal, quasi-bimodal or unidirectional wind) and amount of sediment [2,3]. This set up allows us to characterize more precisely the different modes of dune formation and long-term evolution, and to constrain the physics behind the morphogenesis and dynamics of dunes. Indeed, the formation, evolution and transition between the different dune modes are better understood and quantified thanks to a new setting experiment able to give a remote sediment source in continuous (closer to what happens in terrestrial desert): a sand distributor that controls the input sand flow. Firstly, in a one wind direction conditions, we managed to follow and quantify the growth of the instability of transverse dunes that break into barchans when the sand supply is low and reversely when the sand supply is higher, barchan fields evolve to bars dunes ending to form transverse. The next step will be to perform experiments under two winds conditions in order to better constrain the formation mode of linear dunes, depending also only on the input sand flux. Previous experiments shown that linear "finger" dunes can be triggered by the break of transverse dunes and then the elongating of one barchan's arm [4]. These studies can farther explain more precisely in

  11. Polycultural psychology.

    Science.gov (United States)

    Morris, Michael W; Chiu, Chi-yue; Liu, Zhi

    2015-01-01

    We review limitations of the traditional paradigm for cultural research and propose an alternative framework, polyculturalism. Polyculturalism assumes that individuals' relationships to cultures are not categorical but rather are partial and plural; it also assumes that cultural traditions are not independent, sui generis lineages but rather are interacting systems. Individuals take influences from multiple cultures and thereby become conduits through which cultures can affect each other. Past literatures on the influence of multiple cultural identities and cultural knowledge legacies can be better understood within a polyculturalist rubric. Likewise, the concept elucidates how cultures are changed by contact with other cultures, enabling richer psychological theories of intercultural influence. Different scientific paradigms about culture imply different ideologies and policies; polyculturalism's implied policy of interculturalism provides a valuable complement to the traditional policy frames of multiculturalism and colorblindness.

  12. NASA Desert RATS 2011 Education Pilot Project and Classroom Activities

    Science.gov (United States)

    Gruener, J. E.; McGlone, M.; Allen, J.; Tobola, K.; Graff, P.

    2012-01-01

    The National Aeronautics and Space Administration's (NASA's) Desert Research and Technology Studies (Desert RATS) is a multi-year series of tests of hardware and operations carried out annually in the high desert of Arizona, as an analog to future exploration activities beyond low Earth orbit [1]. For the past several years, these tests have occurred in the San Francisco Volcanic Field, north of Flagstaff. For the 2011 Desert RATS season, the Exploration Systems Mission Directorate (ESMD) at NASA headquarters provided support to develop an education pilot project that would include student activities to parallel the Desert RATS mission planning and exploration activities in the classroom, and educator training sessions. The development of the pilot project was a joint effort between the NASA Johnson Space Center (JSC) Astromaterials Research and Exploration Science (ARES) Directorate and the Aerospace Education Services Project (AESP), managed at Penn State University.

  13. Rekonstruksi Pengaturan Confidential Principle bagi Komunikasi pada Mediasi Sengketa Perdata di Indonesia: Studi Perbandingan dengan Praktik di Amerika Serikat

    Directory of Open Access Journals (Sweden)

    I Gusti Ngurah Parikesit

    2016-04-01

    Full Text Available Peran mediasi sebagai penyelesaian sengketa alternatif untuk sengketa perdata yang semakin populer digunakan pada praktiknya belum berjalan maksimal. Salah satu penyebabnya adalah kekaburan pengaturan prinsip kerahasiaan confidential principle bagi komunikasi yang terjadi pada proses mediasi. Aturan hukum di Indonesia hanya menjelaskan bahwa mediasi dilangsungkan berdasarkan pada asas tertutup dan mediator berkewajiban menjaga kerahasiaan, baik dalam bentuk perkataan maupun catatan, yang terungkap pada mediasi. Sebagai perbandingan, aturan hukum di Amerika Serikat sudah diatur bahwa segala bentuk komunikasi yang terjadi dan berhubungan dengan pelaksanaan mediasi tunduk pada confidential principle, sehingga proses komunikasi mendapatkan hak istimewa (privilege dengan tidak dapat dijadikan barang bukti dan seluruh pihak yang terlibat dalam mediasi tidak dapat dijadikan saksi pada persidangan berikutnya. Dengan demikian, dibutuhkan rekonstruksi pengaturan terkait ruang lingkup komunikasi pada proses mediasi yang terkualifikasi sebagai confidential principle pengaturan terkait pelepasan hak istimewa komunikasi dari confidential principle; dan pengaturan terkait pengecualian terhadap komunikasi yang terkualifikasi sebagai confidential principle Abstract Although being popular, the role of mediation in resolving civil disputes is yet to be maximalized. One of the reasons is the the vague regulation concerning the confidential principle for communication in mediation. The existing regulation in Indonesia only explains that mediation is undertaken based on closed principle and the mediator is obliged to maintain confidentiality the confidentiality of any communication, either in oral or written forms, revealed during mediation. Whereas in comparison, the regulation in the United States of America stipulates that all forms of communications occured during mediation or is made for purposes of conducting or participating in mediation are subjects to the

  14. The Dialectic Psychology perspectives

    OpenAIRE

    Oliveros M., Ricardo; Facultad de Psicología, Universidad Nacional Mayor de San Marcos, Lima, Perú

    2014-01-01

    The present paper exposes the dialectic psychology perspectives in the twentieth first century Peru. We ponder about the dialectics psychology denomination, connecting them to other denominations used in the materialist psychology trend. We analyze the relations between dialectics psychology and social neuroscience, delimiting both the psychological sciences field and the neuroscience field. We develop issues from the emancipator project of dialectics psychology, precising personal developmen...

  15. Plant responses to an edaphic gradient across an active sand dune/desert boundary in the great basin desert.

    NARCIS (Netherlands)

    Rosenthal, D.M.; Ludwig, F.; Donovan, L.A.

    2005-01-01

    In arid ecosystems, variation in precipitation causes broad-scale spatial heterogeneity in soil moisture, but differences in soil texture, development, and plant cover can also create substantial local soil moisture heterogeneity. The boundary between inland desert sand dunes and adjacent desert

  16. Plant responses to an edaphic gradient across an active sand dune/desert boundary in the great basin desert.

    NARCIS (Netherlands)

    Rosenthal, D.M.; Ludwig, F.; Donovan, L.A.

    2005-01-01

    In arid ecosystems, variation in precipitation causes broad-scale spatial heterogeneity in soil moisture, but differences in soil texture, development, and plant cover can also create substantial local soil moisture heterogeneity. The boundary between inland desert sand dunes and adjacent desert hab

  17. Evolutionary developmental psychology

    National Research Council Canada - National Science Library

    King, Ashley C; Bjorklund, David F

    2010-01-01

    The field of evolutionary developmental psychology can potentially broaden the horizons of mainstream evolutionary psychology by combining the principles of Darwinian evolution by natural selection...

  18. The Solar Spectrum in the Atacama Desert

    Science.gov (United States)

    Cordero, R. R.; Damiani, A.; Seckmeyer, G.; Jorquera, J.; Caballero, M.; Rowe, P.; Ferrer, J.; Mubarak, R.; Carrasco, J.; Rondanelli, R.; Matus, M.; Laroze, D.

    2016-03-01

    The Atacama Desert has been pointed out as one of the places on earth where the highest surface irradiance may occur. This area is characterized by its high altitude, prevalent cloudless conditions and relatively low columns of ozone and water vapor. Aimed at the characterization of the solar spectrum in the Atacama Desert, we carried out in February-March 2015 ground-based measurements of the spectral irradiance (from the ultraviolet to the near infrared) at seven locations that ranged from the city of Antofagasta (on the southern pacific coastline) to the Chajnantor Plateau (5,100 m altitude). Our spectral measurements allowed us to retrieve the total ozone column, the precipitable water, and the aerosol properties at each location. We found that changes in these parameters, as well as the shorter optical path length at high-altitude locations, lead to significant increases in the surface irradiance with the altitude. Our measurements show that, in the range 0-5100 m altitude, surface irradiance increases with the altitude by about 27% in the infrared range, 6% in the visible range, and 20% in the ultraviolet range. Spectral measurements carried out at the Izaña Observatory (Tenerife, Spain), in Hannover (Germany) and in Santiago (Chile), were used for further comparisons.

  19. Dew condensation on desert beetle skin.

    Science.gov (United States)

    Guadarrama-Cetina, J; Mongruel, A; Medici, M-G; Baquero, E; Parker, A R; Milimouk-Melnytchuk, I; González-Viñas, W; Beysens, D

    2014-11-01

    Some tenebrionind beetles inhabiting the Namib desert are known for using their body to collect water droplets from wind-blown fogs. We aim to determine whether dew water collection is also possible for desert insects. For this purpose, we investigated the infra-red emissivity, and the wetting and structural properties, of the surface of the elytra of a preserved specimen of Physasterna cribripes (Tenebrionidæ) beetle, where the macro-structure appears as a series of "bumps", with "valleys" between them. Dew formation experiments were carried out in a condensation chamber. The surface properties (infra-red emissivity, wetting properties) were dominated by the wax at the elytra surface and, to a lower extent, its micro-structure. We performed scanning electron microscope on histological sections and determined the infra-red emissivity using a scanning pyrometer. The emissivity measured (0.95±0.07 between 8-14 μm) was close to the black body value. Dew formation occurred on the insect's elytra, which can be explained by these surface properties. From the surface coverage of the condensed drops it was found that dew forms primarily in the valleys between the bumps. The difference in droplet nucleation rate between bumps and valleys can be attributed to the hexagonal microstructure on the surface of the valleys, whereas the surface of the bumps is smooth. The drops can slide when they reach a critical size, and be collected at the insect's mouth.

  20. Scorpions and scorpionism in Iran's central desert.

    Science.gov (United States)

    Nejati, Jalil; Saghafipour, Abedin; Mozaffari, Ehsan; Keyhani, Amir; Jesri, Nahid

    2017-02-01

    Venomous scorpions have extreme importance in field of medicine and public health. This descriptive - analytic study was done to identify scorpion fauna, their ecological aspects as well as scorpionism for risk management and prevention of this health problem in Iran's central desert. Four urban and fifteen rural areas with various climates and topography locations were selected for monthly scorpion collection through a randomly cluster sampling in 2013. The clinical data was obtained from questionnaires provided in 2009-2014. Totally, 1481 scorpion sting cases were recorded. The majority were treated less than 6h after the sting. Statistical tests showed significant difference between season, scorpion's color, living place of patients and scorpionism cases. Plain areas had the most occurrence of scorpionism followed by foothills. Moreover, 311 scorpion samples belonged to 7 species of Buthidae were collected. Mesobuthus eupeus was the dominant species in both rural and urban areas. Most of the collected samples were from indoors, yards and around the houses. The most scorpion activity was recorded in the summer. The studied areas had rich scorpion fauna due to various climates and topography locations. Scorpion stings can be important and fatal in this area, particularly in the plain regions with semi-desert climate. An investigation for assessment of peoples' awareness on prevention methods of scorpionism and also the determination and the assessment of effective factors on reducing the elapsed time between scorpion stings and receiving medical care are here recommended.

  1. Evolutionary Hotspots in the Mojave Desert

    Directory of Open Access Journals (Sweden)

    Sharyn B. Marks

    2013-04-01

    Full Text Available Genetic diversity within species provides the raw material for adaptation and evolution. Just as regions of high species diversity are conservation targets, identifying regions containing high genetic diversity and divergence within and among populations may be important to protect future evolutionary potential. When multiple co-distributed species show spatial overlap in high genetic diversity and divergence, these regions can be considered evolutionary hotspots. We mapped spatial population genetic structure for 17 animal species across the Mojave Desert, USA. We analyzed these in concurrence and located 10 regions of high genetic diversity, divergence or both among species. These were mainly concentrated along the western and southern boundaries where ecotones between mountain, grassland and desert habitat are prevalent, and along the Colorado River. We evaluated the extent to which these hotspots overlapped protected lands and utility-scale renewable energy development projects of the Bureau of Land Management. While 30–40% of the total hotspot area was categorized as protected, between 3–7% overlapped with proposed renewable energy project footprints, and up to 17% overlapped with project footprints combined with transmission corridors. Overlap of evolutionary hotspots with renewable energy development mainly occurred in 6 of the 10 identified hotspots. Resulting GIS-based maps can be incorporated into ongoing landscape planning efforts and highlight specific regions where further investigation of impacts to population persistence and genetic connectivity may be warranted.

  2. Evolutionary hotspots in the Mojave Desert

    Science.gov (United States)

    Vandergast, Amy G.; Inman, Richard D.; Barr, Kelly R.; Nussear, Kenneth E.; Esque, Todd C.; Hathaway, Stacie A.; Wood, Dustin A.; Medica, Philip A.; Breinholt, Jesse W.; Stephen, Catherine L.; Gottscho, Andrew D.; Marks, Sharyn B.; Jennings, W. Bryan; Fisher, Robert N.

    2013-01-01

    Genetic diversity within species provides the raw material for adaptation and evolution. Just as regions of high species diversity are conservation targets, identifying regions containing high genetic diversity and divergence within and among populations may be important to protect future evolutionary potential. When multiple co-distributed species show spatial overlap in high genetic diversity and divergence, these regions can be considered evolutionary hotspots. We mapped spatial population genetic structure for 17 animal species across the Mojave Desert, USA. We analyzed these in concurrence and located 10 regions of high genetic diversity, divergence or both among species. These were mainly concentrated along the western and southern boundaries where ecotones between mountain, grassland and desert habitat are prevalent, and along the Colorado River. We evaluated the extent to which these hotspots overlapped protected lands and utility-scale renewable energy development projects of the Bureau of Land Management. While 30–40% of the total hotspot area was categorized as protected, between 3–7% overlapped with proposed renewable energy project footprints, and up to 17% overlapped with project footprints combined with transmission corridors. Overlap of evolutionary hotspots with renewable energy development mainly occurred in 6 of the 10 identified hotspots. Resulting GIS-based maps can be incorporated into ongoing landscape planning efforts and highlight specific regions where further investigation of impacts to population persistence and genetic connectivity may be warranted.

  3. Psychology Ethics in Introductory Psychology Textbooks

    Science.gov (United States)

    Zucchero, Renee' A.

    2011-01-01

    Previous research revealed that introductory psychology textbooks included limited information about psychology ethics. This study reviewed 48 current introductory psychology textbooks for research and other APA ethics content. These textbooks included slightly more total ethics content and were more thorough in their review of research ethics…

  4. Psychology Ethics in Introductory Psychology Textbooks

    Science.gov (United States)

    Zucchero, Renee' A.

    2011-01-01

    Previous research revealed that introductory psychology textbooks included limited information about psychology ethics. This study reviewed 48 current introductory psychology textbooks for research and other APA ethics content. These textbooks included slightly more total ethics content and were more thorough in their review of research ethics…

  5. Telemedicine and security. Confidentiality, integrity, and availability: a Canadian perspective.

    Science.gov (United States)

    Jennett, P; Watanabe, M; Igras, E; Premkumar, K; Hall, W

    1996-01-01

    The health care system is undergoing major reform, characterized by organized delivery systems (regionalization, decentralization, devolution, etc); shifts in care delivery sites; changing health provider roles; increasing consumer responsibilities; and accountability. Rapid advances in information technology and telecommunications have led to a new type of information infrastructure which can play a major role in this reform. Compatible health information systems are now being integrated and connected across institutional, regional, and sectorial boundaries. In the near future, these information systems will readily be accessed and shared by health providers, researchers, policy makers, health consumers, and the public. SECURITY is a critical characteristic of any health information system. This paper will address three fields associated with SECURITY: confidentiality, integrity, and availability. These will be defined and examined as they relate to specific aspects of Telemedicine, such as electronic integrated records and clinical databases; electronic transfer of documents; as well as data storage and disposal. The guiding principles, standards, and safeguards being considered and put in place to ensure that telemedicine information intrastructures can protect and benefit all stakeholders' rights and needs in both primary and secondary uses of information will be reviewed. Implemented, proposed, and tested institutional, System, and Network solutions will be discussed; for example, encryption-decryption methods; data transfer standards; individual and terminal access and entry I.D. and password levels; smart card access and PIN number control; data loss prevention strategies; interference alerts; information access keys; algorithm safeguards; and active marketing to users of standards and principles. Issues such as policy, implementation, and ownership will be addressed.

  6. Knowledge and practice of confidential data handling in the Welsh Deanery: a brief report.

    Science.gov (United States)

    Jackson, L E; Lim, M W

    2011-01-01

    Recent large-scale personal data loss incidents highlighted the need for public bodies to more securely handle confidential data. We surveyed trainees from all specialties in the Welsh Deanery for their knowledge and practice. All registered trainees were invited to participate in an online anonymised survey. There were 880 completed and non-duplicated responses (52.9% response rate). Responses were analysed using Microsoft Access. Over 40% (388/880 (44.1%)) did not use formal guidelines on storage or disposal of confidential data. The majority appeared to dispose of confidential paper documents securely, that is, using shredders and white shredder bags. However, there were significant numbers of unmarked responses. Clinical documents, such as theatre lists, were taken home by 281/880 (31.9%) of trainees. The majority secured their computers (569/871 (65.3%)) by either not keeping patient identifiable data on them or using encryption. However, 302/871 (34.7%) did not adequately secure their computers. The surgical and anaesthetic specialties were least aware of formal confidentiality guidelines (95/178 (53.4%)) and 52/102 (51.0%) respectively) and least secured their computers (106/178 (59.6%) and 63/102 (61.8%) respectively). Education is needed to improve knowledge and practice of confidential data handling. This may be delivered through workshops during induction programmes or as part of European Computer Driving Licence (ECDL) modules. Training is especially indicated for the surgical and anaesthetic specialties.

  7. METHODS FOR ASSESSING SECURITY THREATS CONFIDENTIAL INFORMATION FOR THE INFORMATION AND TELECOMMUNICATIONS SYSTEMS

    Directory of Open Access Journals (Sweden)

    E. V. Belokurova

    2015-01-01

    Full Text Available The article discusses the different approaches to assessing the safety of confidential information-term for information and telecommunication systems of various pre-appreciable destination in the presence of internal and external threats to its integrity and availability. The difficulty of ensuring the security of confidential information from exposure to information and telecommunication systems of external and internal threats at the present time, is of particular relevance. This problem is confirmed by the analysis of available statistical information on the impact of threats on the security circulating in the information and telecommunications system. Leak confidential information, intellectual property, information, know-how is the result of significant material and moral damage caused to the owner of the restricted information. The paper presents the structure of the indicators and criteria shows that the most promising are analytical criteria. However, their use to assess the level of security of confidential information is difficult due to the lack of appropriate mathematical models. The complexity of the problem is that existing traditional mathematical models are not always appropriate for the stated objectives. Therefore, it is necessary to develop mathematical models designed to assess the security of confidential information and its impact on information and telecommunication system threats.

  8. Psychology of psychology? A theoretization of psychological science through historical and socio-anthropological analysis of Psychology as institution

    OpenAIRE

    Martin Žužek-Kres

    2008-01-01

    The article presents a "new" history of psychology, which is also termed as "psychology of psychology". In some academic communities this unconventional history of psychology represents today an accepted approach to epistemological questions about psychological concepts and it enables an insight into social contextualization of Psychology as an institution. The conclusion presents a referential and institutional context where this psychology of psychology is realized.

  9. Gopherus agassizii (Desert Tortoise). Non-native seed dispersal

    Science.gov (United States)

    Ennen, J.R.; Loughran, Caleb L.; Lovich, Jeffrey E.

    2011-01-01

    Sahara Mustard (Brassica tournefortii) is a non-native, highly invasive weed species of southwestern U.S. deserts. Sahara Mustard is a hardy species, which flourishes under many conditions including drought and in both disturbed and undisturbed habitats (West and Nabhan 2002. In B. Tellman [ed.], Invasive Plants: Their Occurrence and Possible Impact on the Central Gulf Coast of Sonora and the Midriff Islands in the Sea of Cortes, pp. 91–111. University of Arizona Press, Tucson). Because of this species’ ability to thrive in these habitats, B. tournefortii has been able to propagate throughout the southwestern United States establishing itself in the Mojave and Sonoran Deserts in Arizona, California, Nevada, and Utah. Unfortunately, naturally disturbed areas created by native species, such as the Desert Tortoise (Gopherus agassizii), within these deserts could have facilitated the propagation of B. tournefortii. (Lovich 1998. In R. G. Westbrooks [ed.], Invasive Plants, Changing the Landscape of America: Fact Book, p. 77. Federal Interagency Committee for the Management of Noxious and Exotic Weeds [FICMNEW], Washington, DC). However, Desert Tortoises have never been directly observed dispersing Sahara Mustard seeds. Here we present observations of two Desert Tortoises dispersing Sahara Mustard seeds at the interface between the Mojave and Sonoran deserts in California.

  10. Evolution and Functional Classification of Vertebrate Gene Deserts

    Energy Technology Data Exchange (ETDEWEB)

    Ovcharenko, I; Loots, G; Nobrega, M; Hardison, R; Miller, W; Stubbs, L

    2004-07-14

    Gene deserts, long stretches of DNA sequence devoid of protein coding genes, span approximately one quarter of the human genome. Through human-chicken genome comparisons we were able to characterized one third of human gene deserts as evolutionarily stable - they are highly conserved in vertebrates, resist chromosomal rearrangements, and contain multiple conserved non-coding elements physically linked to their neighboring genes. A linear relationship was observed between human and chicken orthologous stable gene deserts, where the human deserts appear to have expanded homogeneously by a uniform accumulation of repetitive elements. Stable gene deserts are associated with key vertebrate genes that construct the framework of vertebrate development; many of which encode transcription factors. We show that the regulatory machinery governing genes associated with stable gene deserts operates differently from other regions in the human genome and relies heavily on distant regulatory elements. The regulation guided by these elements is independent of the distance between the gene and its distant regulatory element, or the distance between two distant regulatory cassettes. The location of gene deserts and their associated genes in the genome is independent of chromosomal length or content presenting these regions as well-bounded regions evolving separately from the rest of the genome.

  11. Browning in Desert Boundaries in Asia in Recent Decades

    Science.gov (United States)

    Jeong, Su-Jong; Ho, Chang-Hoi; Brown, Molly E.; Kug, Jong-Seong; Piao, Shilong

    2011-01-01

    In this study, the changes in desert boundaries in Asia (Gobi, Karakum, Lut, Taklimakan, and Thar deserts) during the growing season (April October) in the years 1982 2008 were investigated by analyzing the normalized difference vegetation index (NDVI), precipitation, and temperature. In the desert boundary regions, the domain mean NDVI values increased by 7.2% per decade in 1982 1998 but decreased by 6.8% per decade thereafter. Accordingly, the bare soil areas (or nonvegetated areas) of the inside of the desert boundaries contracted by 9.8% per decade in the 1990s and expanded by 8.7% per decade in the 2000s. It is noted that the five deserts experience nearly simultaneous NDVI changes although they cover a very diverse area of Asia. In contrast, changes in temperature and precipitation in the deserts show rather diverse results. In desert boundaries located along 40 N (Gobi, Taklimakan, and Karakum), the decadal changes in vegetation greenness were mainly related to regional climate during the entire analysis period. Precipitation increased in the 1990s, providing favorable conditions for vegetation growth (i.e., greening), but precipitation reduced (19 mm per decade) and warming intensified (0.7 C per decade) in the 2000s, causing less moisture to be available for vegetation growth (i.e., browning). In desert boundaries below 40 N (Lut and Thar), although an increase in precipitation (8 mm per decade) led to greening in the 1990s, local changes in precipitation and temperature did not necessarily cause browning in the 2000s. Observed multidecadal changes in vegetation greenness in the present study suggest that under significant global and/or regional warming, changes in moisture availability for vegetation growth in desert boundaries are an important factor when understanding decadal changes in areas vulnerable to desertification over Asia.

  12. Properties of Desert Sand and CMAS Glass

    Science.gov (United States)

    Bansal, Narottam P.; Choi, Sung R.

    2014-01-01

    As-received desert sand from a Middle East country has been characterized for its phase composition and thermal stability. X-ray diffraction analysis showed the presence of quartz (SiO2), calcite (CaCO3), gypsum (CaSO4.2H2O), and NaAlSi3O8 phases in as-received desert sand and showed weight loss of approx. 35 percent due to decomposition of CaCO3 and CaSO4.2H2O when heated to 1400 C. A batch of as-received desert sand was melted into calcium magnesium aluminosilicate (CMAS) glass at approx. 1500 C. From inductively coupled plasma-atomic emission spectrometry, chemical composition of the CMAS glass was analyzed to be 27.8CaO-4MgO-5Al2O3-61.6SiO2-0.6Fe2O3-1K2O (mole percent). Various physical, thermal and mechanical properties of the glass have been evaluated. Bulk density of CMAS glass was 2.69 g/cc, Young's modulus 92 GPa, Shear modulus 36 GPa, Poisson's ratio 0.28, dilatometric glass transition temperature (T (sub g)) 706 C, softening point (T (sub d)) 764 C, Vickers microhardness 6.3 +/- 0.4 GPa, indentation fracture toughness 0.75 +/- 0.15 MPa.m (sup 1/2), and coefficient of thermal expansion (CTE) 9.8 x 10 (exp -6)/degC in the temperature range 25 to 700 C. Temperature dependence of viscosity has also been estimated from various reference points of the CMAS glass using the Vogel-Fulcher-Tamman (VFT) equation. The glass remained amorphous after heat treating at 850 C for 10 hr but crystallized into CaSiO3 and Ca-Mg-Al silicate phases at 900 C or higher temperatures. Crystallization kinetics of the CMAS glass has also been investigated by differential thermal analysis (DTA). Activation energies for the crystallization of two different phases in the glass were calculated to be 403 and 483 kJ/mol, respectively.

  13. In vitro germination of desert rose varieties(

    Directory of Open Access Journals (Sweden)

    Tatiane Lemos Varella

    2015-08-01

    Full Text Available The drought stress resistance is a characteristic of the desert rose and its estimable beauty flowers, which gave it great relevance in the ornamental market. However, the desert rose production and germination is hampered by possible sterility of their male and female flowers and frequent problems in pollination, so the tissue culture is a promising alternative to the propagation of these plants. This study aimed to evaluate the effect of gibberellic acid on four commercial varieties of desert rose (Adenium obesum cultivated in vitro. The seeds of the varieties ‘Orange Pallet’, ‘Carnation violet’, ‘Diamond ring’ and ‘Vermiliont’ were sterilized and inoculated on Water + Agar (T0, medium MS (T1, ½ MS (T2, MS + 0.25 mg L-1 GA3 (T3, MS + 0.5 mg L-1 GA3 (T4, ½ MS + 0.25 mg L-1 GA3 (T5, ½ MS 0.5 mg L-1 GA3 (T6. The seeds germination of A. obesum was initiated on the fourth day of cultivation and on the tenth day was possible to observe the expansion of the cotyledons and leaf expansion with subsequent development of early secondary root. The ‘Orange pallet’ variety germinated 100% of seeds on water + agar and MS ½ + 0.5 mg L-1 of GA3. For ‘Diamond Ring’ and ‘Carnation violet’ the highest rate of germination occurred in treatments MS ½; 0.25 mg L-1 GA3; MS + 0.5 mg L-1 GA3 MS ½ + 0.5 mg L-1 GA3 averaging 80% and 70%, respectively. For ‘Vermiliont’ the best response was in MS and MS ½ + 0.5 mg L-1 GA3 ranging between 70-90% germinated embryos. It was registered different malformations in all treatments like absence of roots and apexes during seedling development. The concentrations of GA3 did not affect significantly the seed germination.

  14. Desert Research and Technology Studies 2005 Report

    Science.gov (United States)

    Ross, Amy J.; Kosmo, Joseph J.; Janoiko, Barbara A.; Bernard, Craig; Splawn, Keith; Eppler, Dean B.

    2006-01-01

    During the first two weeks of September 2005, the National Aeronautics and Space Administration (NASA) Johnson Space Center (JSC) Advanced Extravehicular Activity (AEVA) team led the field test portion of the 2005 Research and Technology Studies (RATS). The Desert RATS field test activity is the culmination of the various individual science and advanced engineering discipline areas year-long technology and operations development efforts into a coordinated field test demonstration under representative (analog) planetary surface terrain conditions. The purpose of the RATS is to drive out preliminary exploration concept of operations EVA system requirements by providing hands-on experience with simulated planetary surface exploration extravehicular activity (EVA) hardware and procedures. The RATS activities also are of significant importance in helping to develop the necessary levels of technical skills and experience for the next generation of engineers, scientists, technicians, and astronauts who will be responsible for realizing the goals of the Constellation Program. The 2005 Desert RATS was the eighth RATS field test and was the most systems-oriented, integrated field test to date with participants from NASA field centers, the United States Geologic Survey (USGS), industry partners, and research institutes. Each week of the test, the 2005 RATS addressed specific sets of objectives. The first week focused on the performance of surface science astro-biological sampling operations, including planetary protection considerations and procedures. The second week supported evaluation of the Science, Crew, Operations, and Utility Testbed (SCOUT) proto-type rover and its sub-systems. Throughout the duration of the field test, the Communications, Avionics, and Infomatics pack (CAI-pack) was tested. This year the CAI-pack served to provide information on surface navigation, science sample collection procedures, and EVA timeline awareness. Additionally, 2005 was the first

  15. Desert disturbance assessments of regional oil exploitation by Aster and ETM+ images in Taklimakan Desert China.

    Science.gov (United States)

    Ouyang, Wei; Hao, Fang-Hua; Fu, Yongshuo; Zhang, Jiaxun

    2008-09-01

    To feed its rapidly growing energy demand, oil exploitation in China has never been more intensive. The most obvious characteristics of oil exploitation are progressive and regional, which can be monitored by remote sensing, such as land use and cover change, either perpetual or temporary, during oil field development such as construction of oil well, roads, transportation systems and other facilities. In this paper, the oil field located on the north edge of Taklimakan Desert, in the Tarim River watershed in northwest of China. The disturbance effects of regional oil exploitation were the main content of regional environmental managements and monitoring. Based on Enhanced Thematic Mapper Plus (ETM+) and Aster images, analyzed regional land use and landscape change from 2001 to 2003. By the comparison, it can be concluded that the ecological quality was deteriorating in these 3 years. The woodland was degrading to grass and desert. The area of woodland dropped from 9.06 km(2) in 2001 to 3.24 km(2) in 2003 with a 64.23% decrease. At the same time, the area of shrubbery lessened 18.23%. On the other hand, the whole area of desert and Saline soils inflated from 15.08 km(2) in 2001 to 25.36 km(2) in 2003. The patch number of bare land did climb dramatically, but single patch area increased. The research demonstrated that desert and Saline soils patches were activated by the human behavior and climate change. The information from the ETM+ and Aster images was proved be an effective and efficient way to be applied in regional environmental managements.

  16. Introduction to Psychology.

    Science.gov (United States)

    Edwards, Lesley

    Designed for community students interested in learning about psychology as a field of study, this module offers group and individual activities to involve the beginning student in research, experimentation and discussion. Unit 1, "What Is Psychology?," includes the use of animals in psychology, ethics, the history of psychology, an…

  17. Introduction to Psychology.

    Science.gov (United States)

    Edwards, Lesley

    Designed for community students interested in learning about psychology as a field of study, this module offers group and individual activities to involve the beginning student in research, experimentation and discussion. Unit 1, "What Is Psychology?," includes the use of animals in psychology, ethics, the history of psychology, an…

  18. Mainstreaming Culture in Psychology

    Science.gov (United States)

    Cheung, Fanny M.

    2012-01-01

    Despite the "awakening" to the importance of culture in psychology in America, international psychology has remained on the sidelines of psychological science. The author recounts her personal and professional experience in tandem with the stages of development in international/cross-cultural psychology. Based on her research in cross-cultural…

  19. Aesthetic value of aeolian geomorphosites in the Kumtagh Desert, China

    Institute of Scientific and Technical Information of China (English)

    JinFeng Wu; Xin Wang; Feng Guo; Lei Li

    2014-01-01

    Tourism development of aeolian geomorphosites in the Kumtagh Desert is beneficial to both harmonious development of human-nature relationship and the sustainable development of the tourist industry in the Kumtagh Desert and its sur-rounding area. This paper adopts some research methods including field observation, expert assessment, and systematic investigation to analyze and evaluate the aesthetic value of aeolian geomorphosites in the Kumtagh Desert from three aspects of"Beauty of Morphology","Beauty of Color"and"Beauty of Forms". This research is a creative work in the field of aeolian geomorphosites combining the method of aeolian geomorphology and tourism geography.

  20. [Confidentiality in HIV-infection/AIDS--a comment on the Communicable Disease Control Act].

    Science.gov (United States)

    Frich, J C

    1995-05-10

    The new Communicable Diseases Control Act has come into force in Norway. It makes it compulsory for a physician to warn a third party if it is obvious that a HIV-positive patient, with a high degree of certainty, puts the third party at risk of being infected with HIV. Some philosophers characterize medical confidentiality as an intransigent and absolute obligation, others as a prima facie duty. This article supports the latter view, but the author still argues that strict conditions have to be fulfilled before a physician should consider breaking medical confidentiality: The doctor must try repeatedly to gain the consent or co-operation of the patient involved. Possible negative long-term consequences for the preventive HIV-work support strict medical confidentiality.

  1. Application-Oriented Confidentiality and Integrity Dynamic Union Security Model Based on MLS Policy

    Science.gov (United States)

    Xue, Mingfu; Hu, Aiqun; He, Chunlong

    We propose a new security model based on MLS Policy to achieve a better security performance on confidentiality, integrity and availability. First, it realizes a combination of BLP model and Biba model through a two-dimensional independent adjustment of integrity and confidentiality. And, the subject's access range is adjusted dynamically according to the security label of related objects and the subject's access history. Second, the security level of the trusted subject is extended to writing and reading privilege range respectively, following the principle of least privilege. Third, it adjusts the objects' security levels after adding confidential information to prevent the information disclosure. Fourth, it uses application-oriented logic to protect specific applications to avoid the degradation of security levels. Thus, it can ensure certain applications operate smoothly. Lastly, examples are presented to show the effectiveness and usability of the proposed model.

  2. Why does geoprivacy matter? The scientific publication of confidential data presented on maps.

    Science.gov (United States)

    Kounadi, Ourania; Leitner, Michael

    2014-10-01

    We examined published maps containing sensitive data, and the protection methods, if any, that were used. We investigated whether the many published warnings about disclosure risk have been effective in reducing privacy risk. During an 8-year period (2005-2012), 19 journals related to GIScience, geography, spatial crime analysis, and health geography were examined. We identified 41 articles that display actual confidential information and 16 articles where confidential information is protected by the use of a geographical mask. During the investigated time frame, the numbers of articles with unmasked confidential data increased, and in total more than 68,000 home addresses were disclosed. One of the more significant findings of this study is that efforts to instill sensitivity to location privacy and disclosure risk have been relatively unsuccessful.

  3. Perceived Parental Functioning, Self-Esteem, and Psychological Distress in Adults Whose Parents are Separated/Divorced

    OpenAIRE

    Verrocchio, Maria C.; Marchetti, Daniela; Fulcheri, Mario

    2015-01-01

    Objective: The objective of this research was to identify retrospectively the alienating behaviors and the parental bonding that occurred in an Italian sample of adults whose had parents separated or divorced and their associations with self-esteem and psychological distress. Methods: Four hundred seventy adults in Chieti, Italy, completed an anonymous and confidential survey regarding their childhood exposure to parental alienating behaviors (using the Baker Strategy Questionnaire), quali...

  4. Perceived parental functioning, self-esteem, and psychological distress in adults whose parents are separated/divorced

    OpenAIRE

    Maria Cristina eVerrocchio; Daniela eMarchetti; Mario eFulcheri

    2015-01-01

    Objective. The objective of this research was to identify retrospectively the alienating behaviors and the parental bonding that occurred in an Italian sample of adults whose had parents separated or divorced and their associations with self-esteem and psychological distress. Methods. Four hundred seventy adults in Chieti, Italy, completed an anonymous and confidential survey regarding their childhood exposure to parental alienating behaviors (using the Baker Strategy Questionnaire), quality ...

  5. Perceived Parental Functioning, Self-Esteem, and Psychological Distress in Adults Whose Parents are Separated/Divorced

    OpenAIRE

    Maria C. Verrocchio; Marchetti, Daniela; Fulcheri, Mario

    2015-01-01

    Objective: The objective of this research was to identify retrospectively the alienating behaviors and the parental bonding that occurred in an Italian sample of adults whose had parents separated or divorced and their associations with self-esteem and psychological distress. Methods: Four hundred seventy adults in Chieti, Italy, completed an anonymous and confidential survey regarding their childhood exposure to parental alienating behaviors (using the Baker Strategy Questionnaire), quali...

  6. Holocene climatic change in Hunshandake Desert

    Institute of Scientific and Technical Information of China (English)

    JIN Heling; SU Zhizhu; SUN Liangying; SUN Zhong; ZHANG Hong; JIN Liya

    2004-01-01

    Research on the geological data of Hunshandake Desert in China monsoon region revealed that Holocene summer monsoon had experienced six prevailing periods and seven weakening periods. The climatic humidity and the vegetation had also undergone the similar periodical variation influenced by the monsoon periodicity. The period when summer monsoon prevailed or winter monsoon weakened and climatic humidity and vegetation coverage relatively increased, corresponded to the global warming events;whereas the period when summer monsoon weakened or winter monsoon prevailed and climatic humidity and vegetation coverage relatively decreased, corresponded to the arid events in middle to low latitudes and the cold events in North Atlantic. As for the changing regularity of summer monsoon intensity there were two distinct periodicities of 1456 years and 494 years, also these two periodicities had global significance.

  7. Thermodynamic and pedogenic differences between desert microsites

    Science.gov (United States)

    Young, Michael; Caldwell, Todd; Lin, Henry

    2014-05-01

    Feedbacks exist between soil properties, climate and ecological productivity. In arid alluvial fan deposits common to the southwestern United States, the strength of these complex feedbacks change slowly over long time frames (e.g., 10s to 100s of millennia) as the climate has become drier and warmer. The feedbacks are also influenced by relatively short-time-frame processes of shrub establishment and subshrub processes that create distinct interspace and sub-canopy microsites. Pedogenic processes in both cases proceed at different rates—slowly in interspaces and rapidly beneath canopies—yet both are subject to similar energy and mass inputs entering the system from above the canopy. In this study, we apply a branch of non-equilibrium (open system) thermodynamics to explain desert pedogenic processes and how the two microsites are tied together. The general concept is that energy and mass flow naturally in directions that minimize gradients, hence maximizing randomness and entropy. We hypothesize that younger soils begin as random bodies, but that energy input from the sun, and mass input from water, dust and vegetation create gradients over time, leading to microsites of pavements and canopies. These features eventually reach metastability and the potential for self-destruction increases (i.e., desert pavements eventually fall apart and erode). We seek to apply these concepts to Mojave Desert soils/ecosystems that have been studied in the field and the laboratory, with the goal of explaining and/or predicting the pathways of pedogenesis in these environments. Of particular interest is how these concepts might be applied in microsite locations influence the two-way coupling of pedologic development and ecosystem functions, and whether we can predict the strength of these feedbacks and processes using knowledge of soil systems today. The field site is found in the Mojave Natural Preserve, CA, USA, where high spatial resolution infiltrometer measurements were

  8. Desert ants learn vibration and magnetic landmarks.

    Directory of Open Access Journals (Sweden)

    Cornelia Buehlmann

    Full Text Available The desert ants Cataglyphis navigate not only by path integration but also by using visual and olfactory landmarks to pinpoint the nest entrance. Here we show that Cataglyphis noda can additionally use magnetic and vibrational landmarks as nest-defining cues. The magnetic field may typically provide directional rather than positional information, and vibrational signals so far have been shown to be involved in social behavior. Thus it remains questionable if magnetic and vibration landmarks are usually provided by the ants' habitat as nest-defining cues. However, our results point to the flexibility of the ants' navigational system, which even makes use of cues that are probably most often sensed in a different context.

  9. Belowground productivity of two cool desert communities.

    Science.gov (United States)

    Caldwell, M M; Camp, L B

    1974-06-01

    A new technique based upon the dilution of C (14) /C (12) ratios in structural carbon of root systems during the course of the growing season was used to evaluate belowground turnover or productivity of two cool desert communities in northern Utah, USA. This technique provides a measure of turnover of the root system of established perennial plant communities avoiding many of the disadvantages of other techniques. Adjacent communities dominated by Atriplex confertifolia and Ceratoides lanata both exhibited belowground productivity values exceeding aboveground production by three-fold. The greater belowground turnover of the Atriplex-dominated community may be a factor contributing to the maintenance of a greater quantity of aboveground biomass and prolonged periods of active photosynthesis during the driest portions of the year when Ceratoides becomes largely photosynthetically inactive.

  10. GPUs: An Oasis in the Supercomputing Desert

    CERN Document Server

    Kamleh, Waseem

    2012-01-01

    A novel metric is introduced to compare the supercomputing resources available to academic researchers on a national basis. Data from the supercomputing Top 500 and the top 500 universities in the Academic Ranking of World Universities (ARWU) are combined to form the proposed "500/500" score for a given country. Australia scores poorly in the 500/500 metric when compared with other countries with a similar ARWU ranking, an indication that HPC-based researchers in Australia are at a relative disadvantage with respect to their overseas competitors. For HPC problems where single precision is sufficient, commodity GPUs provide a cost-effective means of quenching the computational thirst of otherwise parched Lattice practitioners traversing the Australian supercomputing desert. We explore some of the more difficult terrain in single precision territory, finding that BiCGStab is unreliable in single precision at large lattice sizes. We test the CGNE and CGNR forms of the conjugate gradient method on the normal equa...

  11. Ethnomycological survey of traditional usage and indigenous knowledge on desert truffles among the native Sahara Desert people of Algeria.

    Science.gov (United States)

    Bradai, Lyès; Neffar, Souad; Amrani, Khaled; Bissati, Samia; Chenchouni, Haroun

    2015-03-13

    Desert truffles are edible hypogeous fungi, highly appreciated by the inhabitants of hot-desert settlements. Native Saharan people use truffles for food, promoting tourism, increasing fertility, and treatment of eye diseases and fatigue. This study consists of a cross-sectional survey focusing on the knowledge, use and ethnomycological practices of desert truffles among the native people of the Algerian Northern Sahara. The study was conducted through direct interviews with 60 truffle-hunters in the regions of Ouargla and Ghardaia. Three species were harvested and consumed by the surveyed subjects: Terfezia claveryi was the most appreciated and most expensive species, followed by Terfezia areanaria moderately preferred, then Tirmania nivea the least appreciated and least expensive. Among the 60 interviewees, 90% rely on the abundance of symbiotic plants (Helianthemum lippii) to harvest truffles, 65% begin harvesting from mid-February to March, after rains of the autumn (38%) and winter (36%), particularly in the Wadi beds (37%) and Daya landscapes (32%). Interviewees harvested truffles mainly for home consumption; however 26.7% sell any harvest surplus, and of those only 15% generate significant revenue from this source, and 73% considered the sale of desert truffles to have low financial value. Desert truffles are used in traditional medicine, especially against eye infections (22%), weakness (19%) and to promote male fertility (19%). In the case of desert truffles for consumption, the surveyed population preferred to prepare the truffles with couscous and meat, or in porridge. Respondents used price as the main criterion for deciding whether to purchase desert truffles. The surveyed trufflers use the knowledge passed from one generation to the next to help ensure a good harvest of truffles during each foray into the desert. Our findings highlight the various uses of truffles in the Sahara Desert, and how these relate to the lifestyle of local people. Copyright

  12. Lithuanian general practitioners' knowledge of confidentiality laws in adolescent sexual and reproductive healthcare: a cross-sectional study

    DEFF Research Database (Denmark)

    Lazarus, Jeff; Jaruseviciene, Lina; Liljestrand, Jerker

    2008-01-01

    In Lithuania, the legislation addressing confidentiality in adolescent healthcare is contradictory and vague. Previous studies have also revealed that medico-legal knowledge among physicians is poor, and attitudes play a correspondingly greater role than legal knowledge in ensuring the confidenti...

  13. 49 CFR 512.17 - How long should it take to determine whether information is entitled to confidential treatment?

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 6 2010-10-01 2010-10-01 false How long should it take to determine whether information is entitled to confidential treatment? 512.17 Section 512.17 Transportation Other Regulations... TRANSPORTATION CONFIDENTIAL BUSINESS INFORMATION Agency Determination § 512.17 How long should it take...

  14. 21 CFR 601.50 - Confidentiality of data and information in an investigational new drug notice for a biological...

    Science.gov (United States)

    2010-04-01

    ... 21 Food and Drugs 7 2010-04-01 2010-04-01 false Confidentiality of data and information in an investigational new drug notice for a biological product. 601.50 Section 601.50 Food and Drugs FOOD AND DRUG... Information § 601.50 Confidentiality of data and information in an investigational new drug notice for...

  15. 49 CFR 40.321 - What is the general confidentiality rule for drug and alcohol test information?

    Science.gov (United States)

    2010-10-01

    ... Release of Information § 40.321 What is the general confidentiality rule for drug and alcohol test... explicitly authorize or require the transmission of information in the course of the drug or alcohol testing... 49 Transportation 1 2010-10-01 2010-10-01 false What is the general confidentiality rule for...

  16. 37 CFR 201.29 - Access to, and confidentiality of, Statements of Account, Verification Auditor's Reports, and...

    Science.gov (United States)

    2010-07-01

    ... confidentiality of, Statements of Account, Verification Auditor's Reports, and other verification information... GENERAL PROVISIONS § 201.29 Access to, and confidentiality of, Statements of Account, Verification Auditor... Account, including the Primary Auditor's Reports, filed under 17 U.S.C. 1003(c) and access to a Verifying...

  17. 21 CFR 860.5 - Confidentiality and use of data and information submitted in connection with classification and...

    Science.gov (United States)

    2010-04-01

    ... 21 Food and Drugs 8 2010-04-01 2010-04-01 false Confidentiality and use of data and information submitted in connection with classification and reclassification. 860.5 Section 860.5 Food and Drugs FOOD... DEVICE CLASSIFICATION PROCEDURES General § 860.5 Confidentiality and use of data and...

  18. Confidentiality Protection of User Data and Adaptive Resource Allocation for Managing Multiple Workflow Performance in Service-Based Systems

    Science.gov (United States)

    An, Ho

    2012-01-01

    In this dissertation, two interrelated problems of service-based systems (SBS) are addressed: protecting users' data confidentiality from service providers, and managing performance of multiple workflows in SBS. Current SBSs pose serious limitations to protecting users' data confidentiality. Since users' sensitive data is sent in…

  19. Confidentiality and parental involvement in adolescent sexual and reproductive health care: a cross-sectional study of Lithuanian general practitioners.

    Science.gov (United States)

    Jaruseviciene, Lina; Lazarus, Jeffrey V; Zaborskis, Apolinaras

    2011-07-01

    We surveyed Lithuanian general practitioners' (GPs) views on the importance of confidentiality for adolescents and on their practices in informing parents about sexual and reproductive health consultations with this age group. In this cross-sectional study, a 41-item questionnaire was sent to a random sample of 607 Lithuanian GPs. The purpose of this questionnaire was to gain knowledge about current practices of GPs in informing parents on the importance of confidentiality as well as in protecting the privacy of minors. GPs' knowledge of the current legal age limit of confidentiality protection in patient-provider settings was also assessed. Although 67.5% of the responding GPs (response rate 73.5%) stated that they inform the parents or guardians of adolescent patients about the importance of confidentiality, 82.9% of them only did so if the opportunity arose. When consulting on general sexual issues, more than 70% stated that they would guarantee their minor patients confidentiality. However, when cases involved sexually transmitted infections or pregnancy, nearly the same percentage said they would inform the parents. 62.3% of GPs incorrectly believed that the law only protects the right to confidentiality for patients who are 18 or older. Our findings indicate that Lithuanian GPs frequently violate adolescents' right to confidential health services. The study highlights the need for a comprehensive strategy to strengthen the confidentiality of sexual and reproductive health services for this group in Lithuanian primary care.

  20. Confidentiality Protection of User Data and Adaptive Resource Allocation for Managing Multiple Workflow Performance in Service-Based Systems

    Science.gov (United States)

    An, Ho

    2012-01-01

    In this dissertation, two interrelated problems of service-based systems (SBS) are addressed: protecting users' data confidentiality from service providers, and managing performance of multiple workflows in SBS. Current SBSs pose serious limitations to protecting users' data confidentiality. Since users' sensitive data is sent in…