WorldWideScience

Sample records for regulations securities act

  1. Employee Retirement Income Security Act of 1974: rules and regulations for administration and enforcement; claims procedure. Pension and Welfare Benefits Administration, Labor. Final regulation.

    Science.gov (United States)

    2000-11-21

    This document contains a final regulation revising the minimum requirements for benefit claims procedures of employee benefit plans covered by Title I of the Employee Retirement Income Security Act of 1974 (ERISA or the Act). The regulation establishes new standards for the processing of claims under group health plans and plans providing disability benefits and further clarifies existing standards for all other employee benefit plans. The new standards are intended to ensure more timely benefit determinations, to improve access to information on which a benefit determination is made, and to assure that participants and beneficiaries will be afforded a full and fair review of denied claims. When effective, the regulation will affect participants and beneficiaries of employee benefit plans, employers who sponsor employee benefit plans, plan fiduciaries, and others who assist in the provision of plan benefits, such as third-party benefits administrators and health service providers or health maintenance organizations that provide benefits to participants and beneficiaries of employee benefit plans.

  2. Chemical Facility Security: Regulation and Issues for Congress

    National Research Council Canada - National Science Library

    Shea, Dana A; Tatelman, Todd B

    2007-01-01

    The Department of Homeland Security (DHS) has proposed security regulations for chemical facilities, implementing the statutory authority granted in the Homeland Security Appropriations Act, 2007 (P.L...

  3. 76 FR 59592 - Government Securities Act Regulations; Replacement of References to Credit Ratings and Technical...

    Science.gov (United States)

    2011-09-27

    ... creditworthiness of a security or money market instrument; and (2) any references to or requirements in such... or gross short position in money market instruments qualifying as Treasury market risk instruments...), that mature in 45 days or more, settled on a cash or delivery basis. Money market instruments...

  4. 17 CFR 239.500 - Form D, notice of sales of securities under Regulation D and section 4(6) of the Securities Act...

    Science.gov (United States)

    2010-04-01

    ... amount since the previously filed notice of sales on Form D, does not result in an increase of more than... 17 Commodity and Securities Exchanges 2 2010-04-01 2010-04-01 false Form D, notice of sales of... ACT OF 1933 Forms Pertaining to Exemptions § 239.500 Form D, notice of sales of securities under...

  5. 17 CFR 229.801 - Securities Act industry guides.

    Science.gov (United States)

    2010-04-01

    ... 17 Commodity and Securities Exchanges 2 2010-04-01 2010-04-01 false Securities Act industry guides... AND CONSERVATION ACT OF 1975-REGULATION S-K List of Industry Guides § 229.801 Securities Act industry... claims and claim adjustment expenses of property-casualty insurance underwriters. (g) Guide 7...

  6. Air traffic security act unconstitutional

    International Nuclear Information System (INIS)

    Heller, W.

    2006-01-01

    In the interest of more effective protective measures against terrorist attacks, the German federal parliament inter alia added a clause to the Air Traffic Security Act (Sec. 14, Para. 3, Air Traffic Security Act) empowering the armed forces to shoot down aircraft to be used as a weapon against human lives. In Germany, this defense possibility has been discussed also in connection with deliberate crashes of hijacked aircraft on nuclear power plants. The 1 st Division of the German Federal Constitutional Court, in its decision of February 15, 2006, ruled that Sec. 14, Para. 3, Air Traffic Security Act was incompatible with the Basic Law and thus was null and void (file No. 1 BvR 357/05) for two reasons: - There was no legislative authority on the part of the federal government. - The provision was incompatible with the basic right of life and the guarantee of human dignity as enshrined in the Basic Law. (orig.)

  7. Air traffic security act unconstitutional; Luftsicherheitsgesetz verfassungswidrig

    Energy Technology Data Exchange (ETDEWEB)

    Heller, W.

    2006-05-15

    In the interest of more effective protective measures against terrorist attacks, the German federal parliament inter alia added a clause to the Air Traffic Security Act (Sec. 14, Para. 3, Air Traffic Security Act) empowering the armed forces to shoot down aircraft to be used as a weapon against human lives. In Germany, this defense possibility has been discussed also in connection with deliberate crashes of hijacked aircraft on nuclear power plants. The 1{sup st} Division of the German Federal Constitutional Court, in its decision of February 15, 2006, ruled that Sec. 14, Para. 3, Air Traffic Security Act was incompatible with the Basic Law and thus was null and void (file No. 1 BvR 357/05) for two reasons: - There was no legislative authority on the part of the federal government. - The provision was incompatible with the basic right of life and the guarantee of human dignity as enshrined in the Basic Law. (orig.)

  8. 76 FR 62630 - Information Security Regulations

    Science.gov (United States)

    2011-10-11

    ... CENTRAL INTELLIGENCE AGENCY 32 CFR Part 1902 Information Security Regulations AGENCY: Central... information security regulations which have become outdated. The Executive Order upon which the regulations... CFR Part 1902 Information security regulations. PART 1902 [REMOVED AND RESERVED] Sec. 1902.13 [Removed...

  9. Self-regulation in securities markets

    OpenAIRE

    Carson, John

    2011-01-01

    This paper canvasses the trends in self-regulation and the role of self-regulation in securities markets in different parts of the world. The paper also describes the conditions in which self-regulation might be an effective element of securities markets regulation, particularly in emerging markets. Use of self-regulation and self-regulatory organizations is often recommended in emerging m...

  10. DATA Act File C Award Financial - Social Security

    Data.gov (United States)

    Social Security Administration — The DATA Act Information Model Schema Reporting Submission Specification File C. File C includes the agency award information from the financial accounting system at...

  11. Information Security for Compliance with Select Agent Regulations

    Science.gov (United States)

    Lewis, Nick; Campbell, Mark J.

    2015-01-01

    The past decade has seen a significant rise in research on high-consequence human and animal pathogens, many now known as “select agents.” While physical security around these agents is tightly regulated, information security standards are still lagging. The understanding of the threats unique to the academic and research environment is still evolving, in part due to poor communication between the various stakeholders. Perhaps as a result, information security guidelines published by select agent regulators lack the critical details and directives needed to achieve even the lowest security level of the Federal Information Security Management Act (FISMA). While only government agencies are currently required to abide by the provisions of FISMA (unless specified as preconditions for obtaining government grants or contracts—still a relatively rare or narrowly scoped occurrence), the same strategies were recently recommended by executive order for others. We propose that information security guidelines for select agent research be updated to promulgate and detail FISMA standards and processes and that the latter be ultimately incorporated into select agent regulations. We also suggest that information security in academic and research institutions would greatly benefit from active efforts to improve communication among the biosecurity, security, and information technology communities, and from a secure venue for exchange of timely information on emerging threats and solutions in the research environment. PMID:26042864

  12. Information security for compliance with select agent regulations.

    Science.gov (United States)

    Lewis, Nick; Campbell, Mark J; Baskin, Carole R

    2015-01-01

    The past decade has seen a significant rise in research on high-consequence human and animal pathogens, many now known as "select agents." While physical security around these agents is tightly regulated, information security standards are still lagging. The understanding of the threats unique to the academic and research environment is still evolving, in part due to poor communication between the various stakeholders. Perhaps as a result, information security guidelines published by select agent regulators lack the critical details and directives needed to achieve even the lowest security level of the Federal Information Security Management Act (FISMA). While only government agencies are currently required to abide by the provisions of FISMA (unless specified as preconditions for obtaining government grants or contracts--still a relatively rare or narrowly scoped occurrence), the same strategies were recently recommended by executive order for others. We propose that information security guidelines for select agent research be updated to promulgate and detail FISMA standards and processes and that the latter be ultimately incorporated into select agent regulations. We also suggest that information security in academic and research institutions would greatly benefit from active efforts to improve communication among the biosecurity, security, and information technology communities, and from a secure venue for exchange of timely information on emerging threats and solutions in the research environment.

  13. Legislating for Terrorism: The Philippines’ Human Security Act 2007

    Directory of Open Access Journals (Sweden)

    Pauline E. Eadie

    2011-11-01

    Full Text Available In February 2007 the Philippine Senate passed the Human Security Act (HSA otherwise known as Republic Act No. 9372: An Act to Secure the State and Protect our People From Terrorism. Philippine Senate Minority Leader Aquilino Q. Pimentel Jr. was heavily involved in the final drafting of the HSA. He gave it its final name shortly before the Senate Chamber passed it into law. Previously the Act had been known by various titles including ‘An Act to Deter and Punish Acts of Terrorism and for Other Purposes’ (Senate Bill No. 2137 and ‘An Act to Define and Punish the Crime of Terrorism, the Crime of Conspiracy to Commit Terrorism, and the Crime of Proposal to Commit Terrorism, and for Other Purposes (Senate Bill No. 2187. Thus the Human Security Act exists as an instrument of counter terrorism as opposed to human security policy.

  14. 76 FR 43376 - Order Granting Temporary Exemptions From Certain Government Securities Act Provisions and...

    Science.gov (United States)

    2011-07-20

    .../gsareg.htm . As noted in its request, on July 16, 2011, ICE Trust reorganized its corporate structure... DEPARTMENT OF THE TREASURY Order Granting Temporary Exemptions From Certain Government Securities... temporary exemptions from certain Government Securities Act of 1986 provisions and regulations regarding...

  15. 77 FR 70796 - Privacy Act of 1974; Retirement of Department of Homeland Security Transportation Security...

    Science.gov (United States)

    2012-11-27

    ... privacy issues, please contact: Jonathan Cantor, (202-343-1717), Acting Chief Privacy Officer, Privacy... DEPARTMENT OF HOMELAND SECURITY Office of the Secretary Privacy Act of 1974; Retirement of Department of Homeland Security Transportation Security Administration System of Records AGENCY: Privacy...

  16. 76 FR 79529 - Community Reinvestment Act Regulations

    Science.gov (United States)

    2011-12-22

    ... ``agencies'') are amending their Community Reinvestment Act (CRA) regulations to adjust the asset-size... ``intermediate small savings association.'' As required by the CRA regulations, the adjustment to the threshold... Description of the Joint Final Rule The agencies' CRA regulations establish CRA performance standards for...

  17. 48 CFR 1552.235-78 - Data Security for Toxic Substances Control Act Confidential Business Information (DEC 1997).

    Science.gov (United States)

    2010-10-01

    ...: Data Security for Toxic Substances Control Act Confidential Business Information (DEC 1997) The... 48 Federal Acquisition Regulations System 6 2010-10-01 2010-10-01 true Data Security for Toxic Substances Control Act Confidential Business Information (DEC 1997). 1552.235-78 Section 1552.235-78 Federal...

  18. Report: Fiscal Year 2010 Federal Information Security Management Act Report

    Science.gov (United States)

    Report #11-P-0017, November 16, 2010. Attached is the Office of Inspector General’s (OIG’s) Fiscal Year 2010 Federal Information Security Management Act (FISMA) Reporting Template, as prescribed by the Office of Management and Budget (OMB).

  19. 77 FR 70795 - Privacy Act of 1974; Retirement of Department of Homeland Security Transportation Security...

    Science.gov (United States)

    2012-11-27

    ... 20598-6036; email: [email protected] . For privacy issues please contact: Jonathan Cantor, (202-343... DEPARTMENT OF HOMELAND SECURITY Office of the Secretary Privacy Act of 1974; Retirement of Department of Homeland Security Transportation Security Administration System of Records AGENCY: Privacy...

  20. 77 FR 70792 - Privacy Act of 1974; Retirement of Department of Homeland Security Transportation Security...

    Science.gov (United States)

    2012-11-27

    ..., VA 20598-6036; email: [email protected] . For privacy issues please contact: Jonathan R. Cantor... DEPARTMENT OF HOMELAND SECURITY Office of the Secretary Privacy Act of 1974; Retirement of Department of Homeland Security Transportation Security Administration System of Records AGENCY: Privacy...

  1. Securities regulation and implicit penalties

    Directory of Open Access Journals (Sweden)

    Donghua Chen

    2011-06-01

    Full Text Available The extant literature offers extensive support for the significant role played by institutions in financial markets, but implicit regulation and monitoring have yet to be examined. This study fills this void in the literature by employing unique Chinese datasets to explore the implicit regulation and penalties imposed by the Chinese government in regulating the initial public offering (IPO market. Of particular interest are the economic consequences of underwriting IPO deals for client firms that violate regulatory rules in China’s capital market. We provide evidence to show that the associated underwriters’ reputations are impaired and their market share declines. We further explore whether such negative consequences result from a market disciplinary mechanism or a penalty imposed by the government. To analyze the possibility of a market disciplinary mechanism at work, we investigate (1 the market reaction to other client firms whose IPO deals were underwritten by underwriters associated with a violation at the time the violation was publicly disclosed and (2 the under-pricing of IPO deals undertaken by these underwriters after such disclosure. To analyze whether the government imposes an implicit penalty, we examine the application processing time for future IPO deals underwritten by the associated underwriters and find it to be significantly longer than for IPO deals underwritten by other underwriters. Overall, there is little evidence to suggest that the market penalizes underwriters for the rule-violating behavior of their client firms in China. Instead, the Chinese government implicitly penalizes them by imposing more stringent criteria on and lengthening the processing time of the IPO deals they subsequently underwrite.

  2. Review of Drug Quality and Security Act of 2013: The Drug Supply Chain Security Act (DSCSA

    Directory of Open Access Journals (Sweden)

    Elona Gjini

    2016-10-01

    Full Text Available The Drug Supply Chain Security Act (DSCSA signed into law in November 27, 2013 by president Obama creates a uniform national standard for tracing drug products through the supply chain. The goal of DQSA is to enhance FDA’s ability to help protect consumers by detecting and removing potential dangerous products from the pharmaceutics distribution supply chain. A new electronic, interoperable system will identify and trace only prescription drugs in the finished form for human use while distributed in the United States. The purpose of this review was to shed light on a complex and complicated process that it will require cooperation between FDA and drug manufactures, wholesale drug distributors, repackagers and dispensers. The implementation of the DSCSA is based on several law requirements and FDA has developed a schedule with time frames for each of them to be executed over a 10-year period. From this review, FDA recommendations are provided through the FDA Guidance on Identifying Suspect Product document to help trading partners and provide information about the risk of suspect drugs entering the supply chain. Moreover, FDA organized on April 5-6, 2016 in Silver Spring, MD a public workshop to gather valuable feedback from stakeholders who shared their input about the implementation of the new electronic system and its requirements. By the end of 2023, a unified system will provide easier data exchange and less errors, and will increase the safety and security of the pharmaceutical distribution supply chain.   Type: Student Project

  3. The NSW Radiation Control Act and regulation

    International Nuclear Information System (INIS)

    Towson, J.

    1994-01-01

    The legal control of radiation safety in New South Wales has undergone substantial change in recent years. The long-awaited Regulation to the 1990 Radiation Control Act came into effect on 1 September 1993 (of necessity, as the Regulation to the previous 1957 Radioactive Substances Act expired on that date). It has not met with unanimous acclaim. The Regulation addresses three broad areas, namely - (a) legal controls - licensing, registration, radiation 'experts'; (b) safety matters - workplace management, monitoring, research exposures, transport/disposal, accidents; and (c) miscellaneous -radiation safety officers, committees, penalties, records, This article offers a personal view of the implications for nuclear medicine practice in New South Wales

  4. 75 FR 28046 - Privacy Act of 1974; Department of Homeland Security Transportation Security Administration-002...

    Science.gov (United States)

    2010-05-19

    ... security, law enforcement, immigration, intelligence, or other functions consistent with the routine uses... transportation operators, flight students, and others, where appropriate, for services related to security threat.... Enforce safety- and security-related regulations and requirements; 3. Assess and distribute intelligence...

  5. SOR/83-77, Physical Security Regulations

    International Nuclear Information System (INIS)

    1983-01-01

    These Regulations establish and require the maintenance of security systems, equipment and procedures to implement Canada's international obligations regarding security at those nuclear facilities. The Regulations, which determine the different areas in a nuclear facility, provide for the establishment of security barriers around the ''protected areas'' occupied by facilities and prescribe that the licensees (operators) are required to keep the facilities for which they hold a licence under constant surveillance. They must also make arrangements for a response force - a local, provincial or federal police force detachment or similar force - to provide assistance where necessary. No person may enter a protected area without written authorization from the licensee concerned. Inspectors appointed under the Atomic Energy Control Regulations or designated under an agreement between Canada and the IAEA may be granted an authorization to enter such areas to discharge their duties. The Regulations have been amended by SOR/84-81 of 12 January 1988 to add certain requirements concerning documentary evidence and the duties of the board; by SOR/85-1016 of 25 October 1985 to revise the definition of response force and provide other clarifications; by SOR/91-585 of 10 October 1991 to clarify wording in French. (NEA)

  6. 75 FR 28042 - Privacy Act of 1974: System of Records; Department of Homeland Security Transportation Security...

    Science.gov (United States)

    2010-05-19

    ..., VA 20598-6036 or [email protected] . For privacy issues please contact: Mary Ellen Callahan (703-235... DEPARTMENT OF HOMELAND SECURITY Office of the Secretary [Docket No. DHS-2010-0013] Privacy Act of..., Transportation Security Enforcement Record System, System of Records AGENCY: Privacy Office, DHS. ACTION: Notice...

  7. 75 FR 82217 - Community Reinvestment Act Regulations

    Science.gov (United States)

    2010-12-30

    ... Thrift Supervision 12 CFR Part 563e [Docket ID OTS-2010-0032] RIN 1550-AC45 Community Reinvestment Act... Federal Reserve System (Board); Federal Deposit Insurance Corporation (FDIC); Office of Thrift Supervision...) regulations to adjust the asset-size thresholds used to define ``small bank'' or ``small savings association...

  8. 78 FR 10169 - Federal Advisory Committee Act; Communications Security, Reliability, and Interoperability Council

    Science.gov (United States)

    2013-02-13

    ... Location Accuracy, Network Security Best Practices, DNSSEC Implementation Practices for ISPs, Secure BGP... FEDERAL COMMUNICATIONS COMMISSION Federal Advisory Committee Act; Communications Security... persons that the Federal Communications Commission's (FCC) Communications Security, Reliability, and...

  9. 78 FR 55270 - Privacy Act of 1974; Department of Homeland Security Transportation Security Administration-DHS...

    Science.gov (United States)

    2013-09-10

    ... their official duties. The computer system also maintains a real-time audit of individuals who access... Secure Flight Program regulations \\4\\ for the purpose of enhancing the security of air travel in the... detection of individuals on federal government watch lists who seek to travel by air, and to facilitate the...

  10. 48 CFR 1552.235-77 - Data Security for Federal Insecticide, Fungicide and Rodenticide Act Confidential Business...

    Science.gov (United States)

    2010-10-01

    ... 48 Federal Acquisition Regulations System 6 2010-10-01 2010-10-01 true Data Security for Federal Insecticide, Fungicide and Rodenticide Act Confidential Business Information (DEC 1997). 1552.235-77 Section... SOLICITATION PROVISIONS AND CONTRACT CLAUSES Texts of Provisions and Clauses 1552.235-77 Data Security for...

  11. 76 FR 72428 - Privacy Act of 1974; Department of Homeland Security/ALL-017 General Legal Records System of Records

    Science.gov (United States)

    2011-11-23

    ... http://www.regulations.gov . FOR FURTHER INFORMATION CONTACT: For general questions and privacy issues... DEPARTMENT OF HOMELAND SECURITY Office of the Secretary [Docket No. DHS-2011-0094] Privacy Act of 1974; Department of Homeland Security/ALL--017 General Legal Records System of Records AGENCY: Privacy...

  12. 77 FR 32709 - Privacy Act of 1974, as Amended; Computer Matching Program (SSA/Department of Homeland Security...

    Science.gov (United States)

    2012-06-01

    ...; Computer Matching Program (SSA/ Department of Homeland Security (DHS))--Match Number 1010 AGENCY: Social Security Administration (SSA). ACTION: Notice of a renewal of an existing computer matching program that... amended by the Computer Matching and Privacy Protection Act of 1988, as amended, and the regulations and...

  13. 75 FR 6231 - Securities Act of 1933; Securities Exchange Act of 1934; Order Regarding Review of FASB...

    Science.gov (United States)

    2010-02-08

    ...; Securities Exchange Act of 1934; Order Regarding Review of FASB Accounting Support Fee for 2010 Under Section...'s accounting support fee for calendar year 2010. In connection with its review, the Commission also... contributions from the accounting profession. After its review, the Commission determined that the 2010 annual...

  14. The French Space Operation Act: Technical Regulations

    Science.gov (United States)

    Trinchero, J. P.; Lazare, B.

    2010-09-01

    The French Space Operation Act(FSOA) stipulates that a prime objective of the National technical regulations is to protect people, property, public health and the environment. Compliance with these technical regulations is mandatory as of 10 December 2010 for space operations by French space operators and for space operations from French territory. The space safety requirements and regulations governing procedures are based on national and international best practices and experience. A critical design review of the space system and procedures shall be carried out by the applicant, in order to verify compliance with the Technical Regulations. An independent technical assessment of the operation is delegated to CNES. The principles applied when drafting technical regulations are as follows: requirements must as far as possible establish the rules according to the objective to be obtained, rather than how it is to be achieved; requirements must give preference to international standards recognised as being the state of the art; requirements must take previous experience into account. Technical regulations are divided into three sections covering common requirements for the launch, control and return of a space object. A dedicated section will cover specific rules to be applied at the Guiana Space Centre. The main topics addressed by the technical regulations are: operator safety management system; study of risks to people, property, public health and the Earth’s environment; impact study on the outer space environment: space debris generated by the operation; planetary protection.

  15. Nuclear regulation. NRC's security clearance program can be strengthened

    International Nuclear Information System (INIS)

    Fultz, Keith O.; Kruslicky, Mary Ann; Bagnulo, John E.

    1988-12-01

    Because of the national security implications of its programs, the Nuclear Regulatory Commission (NRC) investigates the background of its employees and consultants as well as others to ensure that they are reliable and trustworthy. If the investigation indicates that an employee will not endanger national security, NRC grants a security clearance that allows access to classified information, material, and facilities. NRC also requires periodic checks for some clearance holders to ensure their continued clearance eligibility. The Chairman, Subcommittee on Environment, Energy, and Natural Resources, House Committee on Government Operations, asked GAO to review NRC's personnel security clearance program and assess the procedures that NRC uses to ensure that those who operate nuclear power plants do not pose a threat to the public. The Atomic Energy Act of 1954 requires NRC to conduct background investigations of its employees and consultants as well as others who have access to classified information, material, or facilities. To do this, NRC established a personnel security clearance program. Under NRC policies, a security clearance is granted after the Office of Personnel Management (OPM) or the Federal Bureau of Investigation checks the background of those applying for an NRC clearance. NRC also periodically reassesses the integrity of those holding the highest level clearance. NRC employees, consultants, contractors, and licensees as well as other federal employees hold approximately 10,600 NRC clearances. NRC does not grant clearances to commercial nuclear utility employees unless they require access to classified information or special nuclear material. However, the utilities have voluntarily established screening programs to ensure that their employees do not pose a threat to nuclear plants. NRC faces a dilemma when it hires new employees. Although its policy calls for new hires to be cleared before they start work, the security clearance process takes so long

  16. SOR/84-81, Physical Security Regulations, amendment

    International Nuclear Information System (INIS)

    1984-01-01

    The Physical Security Regulations of 14 January 1983 which establish regulations concerning security systems, equipment and procedures at nuclear installations were amended in particular to take account of Canada's Charter of Rights and to provide for the security of certain information. (NEA)

  17. 75 FR 63703 - Privacy Act of 1974; Privacy Act Regulation

    Science.gov (United States)

    2010-10-18

    ... FEDERAL RESERVE SYSTEM 12 CFR Part 261a [Docket No. R-1313] Privacy Act of 1974; Privacy Act... implementing the Privacy Act of 1974 (Privacy Act). The primary changes concern the waiver of copying fees... records under the Privacy Act; the amendment of special procedures for the release of medical records to...

  18. 17 CFR 239.18 - Form S-11, for registration under the Securities Act of 1933 of securities of certain real estate...

    Science.gov (United States)

    2010-04-01

    ... under the Securities Act of 1933 of securities of certain real estate companies. 239.18 Section 239.18... Securities Act of 1933 of securities of certain real estate companies. This form shall be used for registration under the Securities Act of 1933 of (a) securities issued by real estate investment trusts, as...

  19. 49 CFR 176.4 - Port security and safety regulations.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 2 2010-10-01 2010-10-01 false Port security and safety regulations. 176.4... SAFETY ADMINISTRATION, DEPARTMENT OF TRANSPORTATION HAZARDOUS MATERIALS REGULATIONS CARRIAGE BY VESSEL General § 176.4 Port security and safety regulations. (a) Each carrier, master, agent, and charterer of a...

  20. 75 FR 18863 - Privacy Act of 1974; Department of Homeland Security Transportation Security Administration-006...

    Science.gov (United States)

    2010-04-13

    ... 12th Street, Arlington, VA, 20598-6036. For privacy issues please contact: Mary Ellen Callahan (703-235... DEPARTMENT OF HOMELAND SECURITY Office of the Secretary [Docket No. DHS-2010-0015] Privacy Act of... Matters Tracking Records AGENCY: Privacy Office, DHS. [[Page 18864

  1. 75 FR 8088 - Privacy Act of 1974; Department of Homeland Security/ALL-023 Personnel Security Management System...

    Science.gov (United States)

    2010-02-23

    ... risk of harm to economic or property interests, identity theft or fraud, or harm to the security or... DEPARTMENT OF HOMELAND SECURITY Office of the Secretary [Docket No. DHS-2009-0041] Privacy Act of 1974; Department of Homeland Security/ALL--023 Personnel Security Management System of Records AGENCY...

  2. 76 FR 72922 - Federal Advisory Committee Act; Communications Security, Reliability, and Interoperability Council

    Science.gov (United States)

    2011-11-28

    ... alerting systems, 9-1-1 location accuracy, and network security. The FCC will attempt to accommodate as... FEDERAL COMMUNICATIONS COMMISSION Federal Advisory Committee Act; Communications Security... persons that the Federal Communications Commission's (FCC) third Communications Security, Reliability, and...

  3. 76 FR 54234 - Public Safety and Homeland Security Bureau; Federal Advisory Committee Act; Communications...

    Science.gov (United States)

    2011-08-31

    ... FEDERAL COMMUNICATIONS COMMISSION Public Safety and Homeland Security Bureau; Federal Advisory Committee Act; Communications Security, Reliability, and Interoperability Council AGENCY: Federal.... Postal Service Mail to Jeffery Goldthorp, Associate Bureau Chief, Public Safety and Homeland Security...

  4. 77 FR 12054 - Public Safety and Homeland Security Bureau; Federal Advisory Committee Act; Communications...

    Science.gov (United States)

    2012-02-28

    ... FEDERAL COMMUNICATIONS COMMISSION Public Safety and Homeland Security Bureau; Federal Advisory Committee Act; Communications Security, Reliability, and Interoperability Council AGENCY: Federal..., Associate Bureau Chief, Public Safety and Homeland Security Bureau, Federal Communications Commission, 445...

  5. 75 FR 9899 - Public Safety and Homeland Security Bureau; Federal Advisory Committee Act; Communications...

    Science.gov (United States)

    2010-03-04

    ... FEDERAL COMMUNICATIONS COMMISSION Public Safety and Homeland Security Bureau; Federal Advisory Committee Act; Communications Security, Reliability, and Interoperability Council; Notice of Public Meeting... Analysis Division, Public Safety and Homeland Security Bureau, Federal Communications Commission, 445 12th...

  6. 75 FR 56533 - Public Safety and Homeland Security Bureau; Federal Advisory Committee Act; Communications...

    Science.gov (United States)

    2010-09-16

    ... FEDERAL COMMUNICATIONS COMMISSION Public Safety and Homeland Security Bureau; Federal Advisory Committee Act; Communications Security, Reliability, and Interoperability Council AGENCY: Federal...) Communications Security, Reliability, and Interoperability Council (CSRIC) will hold its third meeting on October...

  7. 77 FR 70777 - Public Safety and Homeland Security Bureau; Federal Advisory Committee Act; Communications...

    Science.gov (United States)

    2012-11-27

    ... FEDERAL COMMUNICATIONS COMMISSION Public Safety and Homeland Security Bureau; Federal Advisory Committee Act; Communications Security, Reliability, and Interoperability Council AGENCY: Federal... Security, Reliability, and Interoperability Council (CSRIC III) scheduled for December 5, 2012, at Federal...

  8. 76 FR 10362 - Public Safety and Homeland Security Bureau; Federal Advisory Committee Act; Communications...

    Science.gov (United States)

    2011-02-24

    ... FEDERAL COMMUNICATIONS COMMISSION Public Safety and Homeland Security Bureau; Federal Advisory Committee Act; Communications Security, Reliability, and Interoperability Council AGENCY: Federal... Cybersecurity and Communications Reliability Public Safety and Homeland Security Bureau, Federal Communications...

  9. 75 FR 74050 - Public Safety and Homeland Security Bureau; Federal Advisory Committee Act; Communications...

    Science.gov (United States)

    2010-11-30

    ... FEDERAL COMMUNICATIONS COMMISSION Public Safety and Homeland Security Bureau; Federal Advisory Committee Act; Communications Security, Reliability, and Interoperability Council AGENCY: Federal...) Communications Security, Reliability, and Interoperability Council (CSRIC) will hold its fourth meeting on...

  10. 78 FR 17176 - Federal Acquisition Regulation; Defense Base Act

    Science.gov (United States)

    2013-03-20

    ... Regulation; Defense Base Act AGENCIES: Department of Defense (DoD), General Services Administration (GSA... the Defense Base Act. DATES: Interested parties should submit written comments to the Regulatory... Act as extended by the Defense Base Act. II. Discussion and Analysis The Defense Base Act of 1941...

  11. Act to amend cost regulations of the Atomic Energy Act

    International Nuclear Information System (INIS)

    1980-01-01

    Article 21 is replaced by articles 21 to 21b. According to this, fees or reimbursements for expenses for official acts (e.g. decisions, supervisory acts, safeguarding of nuclear fuels) as well as for the use of facilities according to article 9a, section 3, of the Atomic Energy Act (e.g. Laender facilities to collect nuclear waste). (HP) [de

  12. Maritime security : progress made in implementing Maritime Transportation Security Act, but concerns remain : statement of Margaret Wrightson, Director, Homeland Security and Justice Issues

    Science.gov (United States)

    2003-09-09

    After the events of September 11, 2001, concerns were raised over the security of U.S. ports and waterways. In response to the concerns over port security, Congress passed the Maritime Transportation Security Act in November 2002. The act created a b...

  13. Dutch National Security Reform Under Review : Sufficient Checks and Balances in the Intelligence and Security Services Act 2017?

    NARCIS (Netherlands)

    Quirine Eijkman; Nico van Eijk; Robert van Schaik

    2018-01-01

    In May 2018, the new Dutch Intelligence and Security Services Act 2017 (Wet op de Inlichtingen- en veiligheidsdiensten, Wiv) will enter into force. It replaces the previous 2002 Act and incorporates many reforms to the information gathering powers of the two intelligence and security services as

  14. 78 FR 6216 - Freedom of Information Act Regulations

    Science.gov (United States)

    2013-01-30

    ... DEPARTMENT OF THE INTERIOR Office of the Secretary 43 CFR Part 2 RIN 1093-AA15 Freedom of... regulation revises the Department's Freedom of Information Act regulations. DATES: Effective January 30, 2013... 31, 2012, revising the Department of the Interior Freedom of Information Act (FOIA) regulations. This...

  15. 77 FR 19963 - Special Local Regulation and Security Zone: War of 1812 Bicentennial Commemoration, Port of...

    Science.gov (United States)

    2012-04-03

    ... National Technology Transfer and Advancement Act (NTTAA) (15 U.S.C. 272 note) directs agencies to use...] RIN 1625-AA00; 1625-AA08 Special Local Regulation and Security Zone: War of 1812 Bicentennial..., and after the War of 1812 Bicentennial Commemoration events in the Port of Boston, Massachusetts, to...

  16. 76 FR 31350 - Cruise Vessel Safety and Security Act of 2010, Available Technology

    Science.gov (United States)

    2011-05-31

    ... DEPARTMENT OF HOMELAND SECURITY Coast Guard [Docket No. USCG-2011-0357] Cruise Vessel Safety and Security Act of 2010, Available Technology AGENCY: Coast Guard, DHS. ACTION: Notice of request for comments... Security and Safety Act of 2010(CVSSA), specifically related to video recording and overboard detection...

  17. Australian Experience in Implementing Transport Safety Regulations and Transport Security Recommendations

    International Nuclear Information System (INIS)

    Sarkar, S.

    2016-01-01

    Australian transport safety and security regulatory framework is governed by Commonwealth, State and Territory legislations. There are eleven competent authorities in Australia that includes three Commonwealth authorities, six states and two territory authorities. IAEA Regulations for Safe Transport of Radioactive Material (TS-R-1, 2005 edition) is applied through Australian Radiation Protection and Nuclear Safety Agency (ARPANSA) Code of Practice for Transport of Radioactive Material 2008 by road, rail and waterways not covered by marine legislations. All states and territories apply this Transport Code through their regulatory system. For air transport, the Civil Aviation Act 1988 adopts the requirements of the ICAO Technical Instructions for the Safe Transport of Dangerous Goods by Air DOC 9284, which also adopts TS-R-1. The security of radioactive material in air transport is achieved via the Aviation Transport Security Act 2004. For sea transport Australian Marine Order 41 applies the requirements of IMDG (International Maritime Dangerous Goods) Code which also adopts TS-R-1. The security of radioactive material (nuclear material) is governed by two Commonwealth Agencies namely, ARPANSA and ASNO (Australian Safeguards and Non-proliferation Office) . ARPANSA regulates the security of radioactive sources through ARPANSA Code of Practice for the Security of Radioactive Sources 2007 which is based on the IAEA Draft Security Series. ASNO regulates security of nuclear material including U, Th and Pu through the Nuclear Non-Proliferation (Safeguards) Act, and the object of which is to give effect to certain obligations that Australia has as a party to the NPT, Australia’s safeguards agreement with the IAEA, and other bilateral safeguards agreements and certain obligations that Australia has as a party to the Convention for the Physical Protection of Nuclear Materials (CPPNM). This paper presents the effectiveness of regulatory approaches for safe and secure

  18. 76 FR 23810 - Public Safety and Homeland Security Bureau; Federal Advisory Committee Act; Emergency Response...

    Science.gov (United States)

    2011-04-28

    ... FEDERAL COMMUNICATIONS COMMISSION Public Safety and Homeland Security Bureau; Federal Advisory Committee Act; Emergency Response Interoperability Center Public Safety Advisory Committee Meeting AGENCY... Fullano, Associate Chief, Public Safety and Homeland Security Bureau, Federal Communications Commission...

  19. Operating Nuclear Power Stations in a Regulated Cyber Security Environment

    Energy Technology Data Exchange (ETDEWEB)

    Dorman, E.

    2014-07-01

    The United States Nuclear Regulatory Commission (NRC) issued 10CFR73.54 to implement a regulated Cyber Security Program at each operating nuclear reactor facility. Milestones were implemented December 31, 2012 to mitigate the attack vectors for the most critical digital assets acknowledged by the industry and the NR C. The NRC inspections have begun. The nuclear Cyber Security Plan, implemented by the site Cyber Security Program (Program), is an element of the operating license at each facility. (Author)

  20. Operating Nuclear Power Stations in a Regulated Cyber Security Environment

    International Nuclear Information System (INIS)

    Dorman, E.

    2014-01-01

    The United States Nuclear Regulatory Commission (NRC) issued 10CFR73.54 to implement a regulated Cyber Security Program at each operating nuclear reactor facility. Milestones were implemented December 31, 2012 to mitigate the attack vectors for the most critical digital assets acknowledged by the industry and the NR C. The NRC inspections have begun. The nuclear Cyber Security Plan, implemented by the site Cyber Security Program (Program), is an element of the operating license at each facility. (Author)

  1. Incentive Regulation and Utility Benchmarking for Electricity Network Security

    OpenAIRE

    Zhang, Y.; Nepal, R.

    2014-01-01

    The incentive regulation of costs related to physical and cyber security in electricity networks is an important but relatively unexplored and ambiguous issue. These costs can be part of cost efficiency benchmarking or, alternatively, dealt with separately. This paper discusses the issues and proposes options for incorporating network security costs within incentive regulation in a benchmarking framework. The relevant concerns and limitations associated with the accounting and classification ...

  2. DATA Act File B Object Class and Program Activity - Social Security

    Data.gov (United States)

    Social Security Administration — The DATA Act Information Model Schema Reporting Submission Specification File B. File B includes the agency object class and program activity detail obligation and...

  3. 76 FR 31790 - Federal Seed Act Regulations

    Science.gov (United States)

    2011-06-02

    ... improvements in the noxious-weed seed tolerances using modern statistical applications. The AOSA has already... the introductory text. 0 B. Removing the word ``act'' and adding in its place the word ``Act'', and by...'' in paragraph (c)(2) introductory text. Sec. 201.41 [Amended] 0 6. In Sec. 201.41, paragraph (a), the...

  4. Report: Fiscal Year 2011 Federal Information Security Management Act Report Status of EPA’s Computer Security Program

    Science.gov (United States)

    Report #12-P-0062, November 9, 2011. Attached is the Office of Inspector General’s (OIG’s) Fiscal Year 2011 Federal Information Security Management Act (FISMA) Reporting Template, as prescribed by the Office of Management and Budget (OMB).

  5. A Certificate Authority (CA-based cryptographic solution for HIPAA privacy/security regulations

    Directory of Open Access Journals (Sweden)

    Sangram Ray

    2014-07-01

    Full Text Available The Health Insurance Portability and Accountability Act (HIPAA passed by the US Congress establishes a number of privacy/security regulations for e-healthcare systems. These regulations support patients’ medical privacy and secure exchange of PHI (protected health information among medical practitioners. Three existing HIPAA-based schemes have been studied but appear to be ineffective as patients’ PHI is stored in smartcards. Moreover, carrying a smartcard during a treatment session and accessing PHI from different locations results in restrictions. In addition, authentication of the smartcard presenter would not be possible if the PIN is compromised. In this context, we propose an MCS (medical center server should be located at each hospital and accessed via the Internet for secure handling of patients’ PHI. All entities of the proposed e-health system register online with the MCS, and each entity negotiates a contributory registration key, where public-key certificates issued and maintained by CAs are used for authentication. Prior to a treatment session, a doctor negotiates a secret session key with MCS and uploads/retrieves patients’ PHI securely. The proposed scheme has five phases, which have been implemented in a secure manner for supporting HIPAA privacy/security regulations. Finally, the security aspects, computation and communication costs of the scheme are analyzed and compared with existing methods that display satisfactory performance.

  6. Security of supply and regulation of energy networks

    International Nuclear Information System (INIS)

    Jamasb, Tooraj; Pollitt, Michael

    2008-01-01

    In recent years, the security of energy supplies has re-emerged as a central issue in the energy policy arena in the UK and elsewhere. This re-emergence takes place against a backdrop of increased liberalisation of the energy markets, so that security of supply needs to be revisited within this context. Security of supply is multifaceted, but is often discussed in terms of physical availability of energy sources and their commodity price risk. This paper discusses the relationship between security of supply and network regulation - that is, how the energy networks, and appropriate regulation of them, can contribute to security of supply in liberalised energy sectors. Energy networks are predominantly natural monopolies and as a result are generally subject to regulatory oversight. We discuss a range of issues and trends that pose challenges and opportunities to network regulation and which call for new and innovative measures. The paper identifies a number of areas where network regulation can play a significant role in increasing the security of supply of future energy systems. (author)

  7. 77 FR 43100 - Privacy Act of 1974; Department of Homeland Security, Federal Emergency Management Agency-009...

    Science.gov (United States)

    2012-07-23

    ... Homeland Security, Washington, DC 20478. For privacy issues, please contact: Mary Ellen Callahan (703) 235... DEPARTMENT OF HOMELAND SECURITY Office of the Secretary [Docket No. DHS-2011-0097] Privacy Act of... Assistance Grant Programs System of Records AGENCY: Privacy Office, DHS. ACTION: Notice of Privacy Act system...

  8. 77 FR 43639 - Privacy Act of 1974, as Amended; Computer Matching Program (Social Security Administration (SSA...

    Science.gov (United States)

    2012-07-25

    ... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA 2011-0090] Privacy Act of 1974, as Amended; Computer Matching Program (Social Security Administration (SSA)/Department of Veterans Affairs (VA.... SUPPLEMENTARY INFORMATION: A. General The Computer Matching and Privacy Protection Act of 1988 (Pub. L. 100-503...

  9. 77 FR 54943 - Privacy Act of 1974, as Amended; Computer Matching Program (Social Security Administration (SSA...

    Science.gov (United States)

    2012-09-06

    ... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA 2012-0016] Privacy Act of 1974, as Amended; Computer Matching Program (Social Security Administration (SSA)/Department of Veterans Affairs (VA.... SUPPLEMENTARY INFORMATION: A. General The Computer Matching and Privacy Protection Act of 1988 (Pub. L. 100-503...

  10. 75 FR 5166 - Privacy Act of 1974, as Amended; Computer Matching Program (Social Security Administration...

    Science.gov (United States)

    2010-02-01

    ... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA 2009-0043] Privacy Act of 1974, as Amended; Computer Matching Program (Social Security Administration/Railroad Retirement Board (SSA/RRB))-- Match... INFORMATION: A. General The Computer Matching and Privacy Protection Act of 1988 Public Law (Pub. L.) 100-503...

  11. International Regulations for Transport of Radioactive Materials, History and Security

    International Nuclear Information System (INIS)

    EL-Shinawy, R.M.K.

    2013-01-01

    International Regulations for the transport of radioactive materials have been published by International Atomic Energy Agency (IAEA) since 1961. These Regulations have been widely adopted into national Regulations. Also adopted into different modal Regulations such as International Air Transport Association (IATA) and International Martime Organization (IMO). These Regulations provide standards for insuring a high level of safety of general public, transport workers, property and environment against radiation, contamination, criticality hazard and thermal effects associated with the transport of radioactive wastes and materials. Several reviews conducted in consultation with Member States (MS) and concerned international organizations, resulted in comprehensive revisions till now. Radioactive materials are generally transported by specialized transport companies and experts. Shippers and carriers have designed their transport operations to comply with these international Regulations. About 20 million consignments of radioactive materials take place around the world each year. These materials were used in different fields such as medicine, industry, agriculture, research, consumer product and electric power generation. After September 11,2001, the IAEA and MS have worked together to develop a new guidance document concerning the security in the transport of radioactive materials. IAEA have initiated activities to assist MS in addressing the need for transport security in a comprehensive manner. The security guidance and measures were mentioned and discussed. The transport security becomes more developed and integrated into national Regulations of many countries beside the safety Regulations. IAEA and other International organizations are working with MS to implement transport security programs such as guidance, training, security assessments and upgrade assistance in these fields.

  12. 78 FR 43890 - Privacy Act of 1974; Department of Homeland Security, Federal Emergency Management Agency-006...

    Science.gov (United States)

    2013-07-22

    ... titled, ``Department of Homeland Security/Federal Emergency Management Agency--006 Citizen Corps Database... DEPARTMENT OF HOMELAND SECURITY Office of the Secretary [Docket No. DHS-2013-0049] Privacy Act of 1974; Department of Homeland Security, Federal Emergency Management Agency--006 Citizen Corps Program...

  13. 78 FR 69861 - Privacy Act of 1974; Department of Homeland Security, Federal Emergency Management Agency...

    Science.gov (United States)

    2013-11-21

    ... Homeland Security, Washington, DC 20478. For privacy issues, please contact: Karen L. Neuman, (202) 343... DEPARTMENT OF HOMELAND SECURITY Office of the Secretary [DHS-2013-0073] Privacy Act of 1974... Defense Executive Reserve System of Records AGENCY: Department of Homeland Security, Privacy Office...

  14. 75 FR 4626 - Order Granting a Temporary Exemption From Certain Government Securities Act Provisions and...

    Science.gov (United States)

    2010-01-28

    ... DEPARTMENT OF THE TREASURY Order Granting a Temporary Exemption From Certain Government Securities... Department of the Treasury (Treasury) is issuing a temporary exemption from certain Government Securities Act... accommodate customer clearing of credit default swaps that reference government securities. Treasury is also...

  15. 75 FR 79278 - Community Reinvestment Act Regulations

    Science.gov (United States)

    2010-12-20

    ... Congressional intent that the funds have maximum impact and be targeted to States and local communities with the... communities affected by high levels of foreclosures and delinquencies. \\12\\ The Board also received over 650... Thrift Supervision 12 CFR Part 563e [Docket ID OTS-2010-0031] RIN 1550-AC42 Community Reinvestment Act...

  16. 78 FR 79283 - Community Reinvestment Act Regulations

    Science.gov (United States)

    2013-12-30

    ... by reference to asset-size criteria expressed in dollar amounts, and they further require the....C. 553(b)(B) of the Administrative Procedure Act (APA), an agency may, for good cause, find (and.... Under 5 U.S.C. 553(d)(3) of the APA, the required publication or service of a substantive rule shall be...

  17. 75 FR 50700 - Quarterly Listings; Safety Zones, Security Zones, Special Local Regulations, and Drawbridge...

    Science.gov (United States)

    2010-08-17

    ...] Quarterly Listings; Safety Zones, Security Zones, Special Local Regulations, and Drawbridge Operation... notice lists temporary safety zones, security zones, special local regulations, and drawbridge operation... responsive to the safety and security needs within their jurisdiction; therefore, District Commanders and...

  18. Monitoring the Implementation of State Regulation of National Economic Security

    Directory of Open Access Journals (Sweden)

    Hubarieva Iryna O.

    2018-03-01

    Full Text Available The aim of the article is to improve the methodological tools for monitoring the implementation of state regulation of national economic security. The approaches to defining the essence of the concept of “national economic security” are generalized. Assessment of the level of national economic security is a key element in monitoring the implementation of state regulation in this area. Recommendations for improving the methodology for assessing national economic security, the calculation algorithm of which includes four interrelated components (economic, political, social, spiritual one, suggests using analysis methods (correlation and cluster analysis, and taxonomy, which allows to determine the level and disproportion of development, can serve as a basis for monitoring the implementation of state regulation of national economic security. Such an approach to assessing national economic security makes it possible to determine the place (rank that a country occupies in a totality of countries, the dynamics of changing ranks over a certain period of time, to identify problem components, and monitor the effectiveness of state regulation of the national economic security. It the course of the research it was determined that the economic sphere is the main problem component of ensuring the security of Ukraine’s economy. The analysis made it possible to identify the most problematic partial indicators in the economic sphere of Ukraine: economic globalization, uneven economic development, level of infrastructure, level of financial market development, level of economic instability, macroeconomic stability. These indicators have a stable negative dynamics and a downward trend, which requires an immediate intervention of state bodies to ensure the national economic security.

  19. 75 FR 8096 - Privacy Act of 1974; Department of Homeland Security Transportation Security Administration-023...

    Science.gov (United States)

    2010-02-23

    ... response to workplace violence, analyzes data as needed, and provides training. Additionally, DHS is... 1974; Department of Homeland Security Transportation Security Administration--023 Workplace Violence... Security Administration--023 Workplace Violence Prevention Program System of Records.'' This system will...

  20. An Agile Enterprise Regulation Architecture for Health Information Security Management

    Science.gov (United States)

    Chen, Ying-Pei; Hsieh, Sung-Huai; Chien, Tsan-Nan; Chen, Heng-Shuen; Luh, Jer-Junn; Lai, Jin-Shin; Lai, Feipei; Chen, Sao-Jie

    2010-01-01

    Abstract Information security management for healthcare enterprises is complex as well as mission critical. Information technology requests from clinical users are of such urgency that the information office should do its best to achieve as many user requests as possible at a high service level using swift security policies. This research proposes the Agile Enterprise Regulation Architecture (AERA) of information security management for healthcare enterprises to implement as part of the electronic health record process. Survey outcomes and evidential experiences from a sample of medical center users proved that AERA encourages the information officials and enterprise administrators to overcome the challenges faced within an electronically equipped hospital. PMID:20815748

  1. An agile enterprise regulation architecture for health information security management.

    Science.gov (United States)

    Chen, Ying-Pei; Hsieh, Sung-Huai; Cheng, Po-Hsun; Chien, Tsan-Nan; Chen, Heng-Shuen; Luh, Jer-Junn; Lai, Jin-Shin; Lai, Feipei; Chen, Sao-Jie

    2010-09-01

    Information security management for healthcare enterprises is complex as well as mission critical. Information technology requests from clinical users are of such urgency that the information office should do its best to achieve as many user requests as possible at a high service level using swift security policies. This research proposes the Agile Enterprise Regulation Architecture (AERA) of information security management for healthcare enterprises to implement as part of the electronic health record process. Survey outcomes and evidential experiences from a sample of medical center users proved that AERA encourages the information officials and enterprise administrators to overcome the challenges faced within an electronically equipped hospital.

  2. 75 FR 35686 - Community Reinvestment Act Regulation Hearings

    Science.gov (United States)

    2010-06-23

    ... will post comments on the OTS Internet Site at http://www.ots.treas.gov/?p=LawsRegulations . Viewing... consider violations of additional consumer laws, such as the Truth in Savings Act, the Electronic Fund...

  3. 77 FR 50390 - Equal Credit Opportunity Act (Regulation B)

    Science.gov (United States)

    2012-08-21

    ..., such as account numbers or social security numbers, should not be included. Comments will not be edited... most severe U.S. recession since the Great Depression.\\6\\ The Dodd-Frank Act created the Bureau and... other similar media. In addition, the proposed comment clarifies that creditors should look to Sec. 1002...

  4. Slovak Republic Act of 11 February 1998 on the energetics and on alterations to Act No. 455/1991 Collection of Acts of CSFR on small business (trade Act) in version of posterior regulations

    International Nuclear Information System (INIS)

    1998-01-01

    This act constitute: (a) conditions of undertaking in electro-energetic, gas industry, and heat supply (in next only 'energetic' branches) ; (b) rights and responsibility of physical and act person undertaking in energetic branches; (c) rights and responsibility of customers of electricity, gas, and heat; counteract measures in the need situations, (d) and at prevention before need situations in energetic branches; (e) state regulation in energetic; (f) authority on keep of this act. The act is divided into for parts: (1) General constitutions, (2) Energetic branches; (3) The state authority; (4) Common, transient and invalidation constitutions.This act deals with the specific conditions for undertaking in nuclear power plants, too (licensing, security). This act shall into effect on 1 July 1998

  5. 13 CFR 107.30 - Amendments to Act and regulations.

    Science.gov (United States)

    2010-01-01

    ... 13 Business Credit and Assistance 1 2010-01-01 2010-01-01 false Amendments to Act and regulations. 107.30 Section 107.30 Business Credit and Assistance SMALL BUSINESS ADMINISTRATION SMALL BUSINESS... subject to all existing and future provisions of the Act and parts 107 and 112 of title 13 of the Code of...

  6. Modifications to the HIPAA Privacy, Security, Enforcement, and Breach Notification rules under the Health Information Technology for Economic and Clinical Health Act and the Genetic Information Nondiscrimination Act; other modifications to the HIPAA rules.

    Science.gov (United States)

    2013-01-25

    The Department of Health and Human Services (HHS or ``the Department'') is issuing this final rule to: Modify the Health Insurance Portability and Accountability Act (HIPAA) Privacy, Security, and Enforcement Rules to implement statutory amendments under the Health Information Technology for Economic and Clinical Health Act (``the HITECH Act'' or ``the Act'') to strengthen the privacy and security protection for individuals' health information; modify the rule for Breach Notification for Unsecured Protected Health Information (Breach Notification Rule) under the HITECH Act to address public comment received on the interim final rule; modify the HIPAA Privacy Rule to strengthen the privacy protections for genetic information by implementing section 105 of Title I of the Genetic Information Nondiscrimination Act of 2008 (GINA); and make certain other modifications to the HIPAA Privacy, Security, Breach Notification, and Enforcement Rules (the HIPAA Rules) to improve their workability and effectiveness and to increase flexibility for and decrease burden on the regulated entities.

  7. Radiation security regulation. 1st revision

    International Nuclear Information System (INIS)

    1984-01-01

    Established are allowable maximum levels for personnel occupationally exposed to ionizing radiation in the ININ and for the public, in accordance with the international standards; defined are categories of radiation facilities, requirements and operating conditions that must be met. Demarcated are the kinds of placards to be posted in controlled and restricted areas and the signs, symbols and tags to be used, defined and established is environmental dosimetric and medical radiation monitoring. Regulated are methods for handling sealed and unsealed sources of radiation, work clothes, closing of radiation installations, storage, transfer and transport of radioactive material; classified are types of possible radiation accidents, action to be taken upon the occurrence and subsequent clean up. (corporate author)

  8. 75 FR 53153 - Federal Acquisition Regulation; American Recovery and Reinvestment Act of 2009 (the Recovery Act...

    Science.gov (United States)

    2010-08-30

    ... States would not fully implement section 1605 of the Recovery Act. Section 1605 singled out iron and... statute and how best to convey these requirements in the regulations. Because iron and steel are singled...

  9. 78 FR 32595 - Revision of Freedom of Information Act Regulation

    Science.gov (United States)

    2013-05-31

    ... Revision of Freedom of Information Act Regulation AGENCY: Office of the Secretary, HUD. ACTION: Proposed rule. SUMMARY: This proposed rule would amend HUD's regulations implementing the Freedom of Information... with speech or hearing impairments may access this number via TTY by calling the toll-free Federal...

  10. 25 CFR 900.148 - How can an Indian tribe or tribal organization secure a determination that a law or regulation...

    Science.gov (United States)

    2010-04-01

    ... determination that a law or regulation has been superseded by the Indian Self-Determination Act, as specified in... SELF-DETERMINATION AND EDUCATION ASSISTANCE ACT Waiver Procedures § 900.148 How can an Indian tribe or tribal organization secure a determination that a law or regulation has been superseded by the Indian...

  11. 78 FR 73868 - Privacy Act of 1974; Department of Homeland Security Transportation Security Administration-DHS...

    Science.gov (United States)

    2013-12-09

    ... security screening and identity verification of individuals, including identification media and identifying... undergoing screening of their person (including identity verification) or property; individuals against whom... addresses, phone numbers); Social Security Number, Fingerprints or other biometric identifiers; Photographs...

  12. Energy Independence and Security Act of 2007: A Summary of Major Provisions

    National Research Council Canada - National Science Library

    Sissine, Fred

    2007-01-01

    The Energy Independence and Security Act (P.L. 110-140, H.R. 6) is an omnibus energy policy law that consists mainly of provisions designed to increase energy efficiency and the availability of renewable energy...

  13. P.L. 110-140, "Energy Independence and Security Act of 2007", 2007

    Energy Technology Data Exchange (ETDEWEB)

    None

    2007-12-19

    The Energy Independence and Security Act of 2007 (EISA), signed into law on December 19, 2007, set forth an agenda for improving U.S. energy security across the entire economy. While industrial energy efficiency is specifically called out in Title IV, Subtitle D, other EISA provisions also apply to AMO activities.

  14. 75 FR 69604 - Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security Office of...

    Science.gov (United States)

    2010-11-15

    ... Security, Washington, DC 20528. For privacy issues please contact: Mary Ellen Callahan (703-235- [[Page...] Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security Office of Operations... System of Records AGENCY: Privacy Office, DHS. ACTION: Notice of proposed rulemaking. SUMMARY: The...

  15. 75 FR 11191 - Privacy Act of 1974; Retirement of Department of Homeland Security Federal Emergency Management...

    Science.gov (United States)

    2010-03-10

    ... 20472. For privacy issues please contact: Mary Ellen Callahan (703-235- 0780), Chief Privacy Officer... DEPARTMENT OF HOMELAND SECURITY Office of the Secretary Privacy Act of 1974; Retirement of Department of Homeland Security Federal Emergency Management Agency System of Records AGENCY: Privacy Office...

  16. 75 FR 11627 - Order Granting Temporary Exemptions From Certain Government Securities Act Provisions and...

    Science.gov (United States)

    2010-03-11

    ... DEPARTMENT OF THE TREASURY Order Granting Temporary Exemptions From Certain Government Securities... Department of the Treasury (Treasury) is granting temporary exemptions from certain Government Securities Act...).pdf. \\8\\ 75 FR 4626, January 28, 2010 Order Granting a Temporary Exemption from Certain Government...

  17. 78 FR 20705 - Securities Act of 1933; Securities Exchange Act of 1934; Order Regarding Review of FASB...

    Science.gov (United States)

    2013-04-05

    ... accepted for purposes of the securities laws, any accounting principles established by a standard setting... Financial Accounting Standards Board (``FASB'') and its parent organization, the Financial Accounting... recognizing the FASB's financial accounting and reporting standards as ``generally accepted'' under Section...

  18. P.L. 96-294, "Energy Security Act" (1980)

    Energy Technology Data Exchange (ETDEWEB)

    None

    2011-12-13

    Declares it to be the purpose of this title to reduce dependence on foreign energy resources by producing synthetic fuel. Part A: Development of Synthetic Fuel Under the Defense Production Act of 1950 - Defense Production Act Amendments of 1980 - Amends the Defense Production Act of 1950 to include within the policy objectives of such Act Government preparedness to contend with foreign actions which could reduce or terminate the availability of material, including energy, which is crucial to national defense. States that greater independence in domestic energy supplies is necessary to national defense preparedness. Designates "energy" as a "strategic and critical material." States that such designation shall not give the President any authority: (1) for the mandatory allocation or pricing of any fuel or feedstock; or (2) to engage in the production of energy in any manner whatsoever, except for synthetic fuel production.

  19. 17 CFR 239.40 - Form F-10, for registration under the Securities Act of 1933 of securities of certain Canadian...

    Science.gov (United States)

    2010-04-01

    ...) This Form may not be used for registration of derivative securities except: (1) Warrants, options and... 17 Commodity and Securities Exchanges 2 2010-04-01 2010-04-01 false Form F-10, for registration under the Securities Act of 1933 of securities of certain Canadian issuers. 239.40 Section 239.40...

  20. 77 FR 6007 - Quarterly Listings; Safety Zones, Security Zones, Special Local Regulations, Drawbridge Operation...

    Science.gov (United States)

    2012-02-07

    ...] Quarterly Listings; Safety Zones, Security Zones, Special Local Regulations, Drawbridge Operation... they could be published in the Federal Register. This notice lists temporary safety zones, security... the safety and security needs within their jurisdiction; therefore, District Commanders and COTPs have...

  1. Information Security: Comments on the Proposed Federal Information Security Management Act of 2002

    National Research Council Canada - National Science Library

    Dacey, Robert

    2002-01-01

    ... 2001.1 Concerned with reports that continuing, pervasive information security weaknesses place federal operations at significant risk of disruption, tampering, fraud, and inappropriate disclosures...

  2. 77 FR 14843 - [Securities Act of 1933; Release No. 9300/March 7, 2012; Securities Exchange Act of 1934; Release...

    Science.gov (United States)

    2012-03-13

    ..., as generally accepted for purposes of the securities laws, any accounting principles established by a... concluding that the Financial Accounting Standards Board (``FASB'') and its parent organization, the Financial Accounting Foundation (``FAF''), satisfied the criteria for an accounting standard-setting body...

  3. Act of 4 August 1955 concerning State Security in the Nuclear Field

    International Nuclear Information System (INIS)

    1955-01-01

    This Act governing State security in the nuclear field lays down that the King may determine the security measures to be complied with concerning nuclear research, materials, methods of production used by establishments and legal or physical persons having in their possession information, documents or material obtained either directly from the Government or with its consent. The Act was supplemented by Royal Order of 14 March 1956 which amplified its provisions by laying down specific requirements regarding the classification of information and material, the security measures to be applied thereto, and to establishments involved in related research work. It also provides for the security clearance to be applied to persons who shall be authorised to obtain such information and classified material. A Royal Order of 18 October 1974 amends this Order in respect of the authorities responsible for its implementation. (NEA) [fr

  4. Statement at NRC International Regulators Conference on Nuclear Security, 4 December 2012, Washington, United States

    International Nuclear Information System (INIS)

    Amano, Y.

    2012-01-01

    I would like to begin by thanking NRC Chairman Allison Macfarlane for hosting this first regulatory Conference on nuclear security involving regulators, law enforcement agencies and the IAEA. The United States has been a very important partner in the IAEA's nuclear security activities right from the start. It is by far the largest donor to our Nuclear Security Fund. It has actively supported our programmes and has been generous in providing funding, equipment and training to other Member States. When President Obama hosted the first Nuclear Security Summit in April 2010, he said it was important that that event should be part of a ''serious and sustained effort'' to improve nuclear security throughout the world. Since then, a growing number of governments have given high-level attention to this vitally important issue. This is very encouraging. Today, I am especially pleased to see regulators coming together to focus on this subject. I am confident that your meeting will make a valuable contribution to strengthening global nuclear security. I would like to share with you some important recent milestones in the IAEA's nuclear security work. As you know, primary responsibility for ensuring nuclear security lies with national governments. However, governments have recognized that international cooperation is vital. Terrorists and other criminals do not respect international borders and no country can respond effectively on its own to the threat which they pose. In September, our Member States - there are now 158 - reaffirmed the central role of the IAEA in e nsuring coordination of international activities in the field of nuclear security, while avoiding duplication and overlap . Our central role reflects the Agency's extensive membership, our mandate, our unique expertise and our long experience of providing technical assistance and specialist, practical guidance to countries. To put it simply, our work focuses on helping to minimize the risk of nuclear and other

  5. 76 FR 49698 - Covered Securities Pursuant to Section 18 of the Securities Act of 1933

    Science.gov (United States)

    2011-08-11

    ... listed on the Nasdaq Capital Market (``NCM'') as Covered Securities for purposes of Section 18(b) of the... posed above, commenters are welcome to offer their views on any other matter raised by the proposed..., competition and capital formation. We have considered, and discuss below, the effects of the proposed...

  6. 75 FR 18867 - Privacy Act of 1974; Department of Homeland Security Transportation Security Administration-011...

    Science.gov (United States)

    2010-04-13

    ... source categories, retention and disposal, and notification procedure. The Transportation Security... recipients of information about individuals who are their employees, job applicants, or contractors, or.... For each system of records covered by this notice, the retention and disposal sections are updated to...

  7. 48 CFR 245.7311-2 - Safety, security, and fire regulations.

    Science.gov (United States)

    2010-10-01

    ... 48 Federal Acquisition Regulations System 3 2010-10-01 2010-10-01 false Safety, security, and fire regulations. 245.7311-2 Section 245.7311-2 Federal Acquisition Regulations System DEFENSE ACQUISITION... Inventory 245.7311-2 Safety, security, and fire regulations. ...

  8. Global health security and the International Health Regulations

    Directory of Open Access Journals (Sweden)

    Oliva Otavio

    2010-12-01

    Full Text Available Abstract Global nuclear proliferation, bioterrorism, and emerging infections have challenged national capacities to achieve and maintain global security. Over the last century, emerging infectious disease threats resulted in the development of the preliminary versions of the International Health Regulations (IHR of the World Health Organization (WHO. The current HR(2005 contain major differences compared to earlier versions, including: substantial shifts from containment at the border to containment at the source of the event; shifts from a rather small disease list (smallpox, plague, cholera, and yellow fever required to be reported, to all public health threats; and shifts from preset measures to tailored responses with more flexibility to deal with the local situations on the ground. The new IHR(2005 call for accountability. They also call for strengthened national capacity for surveillance and control; prevention, alert, and response to international public health emergencies beyond the traditional short list of required reporting; global partnership and collaboration; and human rights, obligations, accountability, and procedures of monitoring. Under these evolved regulations, as well as other measures, such as the Revolving Fund for vaccine procurement of the Pan American Health Organization (PAHO, global health security could be maintained in the response to urban yellow fever in Paraguay in 2008 and the influenza (H1N1 pandemic of 2009-2010.

  9. 75 FR 75207 - Regulation SBSR-Reporting and Dissemination of Security-Based Swap Information

    Science.gov (United States)

    2010-12-02

    ... Dissemination of Security-Based Swap Information; Proposed Rule #0;#0;Federal Register / Vol. 75 , No. 231... Dissemination of Security-Based Swap Information AGENCY: Securities and Exchange Commission. ACTION: Proposed... SBSR--Reporting and Dissemination of Security-Based Swap Information (``Regulation SBSR'') under the...

  10. A study on the barriers of the implementation of social security act in ...

    African Journals Online (AJOL)

    In this study, an analytical review was done on the historical process and contexts of welfare system and social security in order to analyze and evaluate the main features of this act especially in the area of medical services. It was also attempted to study the executive barriers of the appropriate implementation of social ...

  11. P.L. 110-140, "Energy Independence and Security Act of 2007" (2007)

    Energy Technology Data Exchange (ETDEWEB)

    None

    2007-12-13

    An act to move the United States toward greater energy independence and security, to increase the production of clean renewable fuels, to protect consumers, to increase the efficiency of products, buildings, and vehicles, to promote research on and deploy greenhouse gas capture and storage options, and to improve the energy performance of the Federal Government, and for other purposes.

  12. Notification: FY2017 Audit of the CSB's compliance with the Federal Information Security Management Act (FISMA)

    Science.gov (United States)

    Project #, May 23, 2017. The EPA OIG plans to begin fieldwork for an audit of the U.S. Chemical Safety and Hazard Investigation Board’s (CSB’s) compliance with the Federal Information Security Modernization Act of 2014 (FISMA).

  13. Education Issues Raised by S.744: The Border Security, Economic Opportunity, and Immigration Modernization Act

    Science.gov (United States)

    Murphy, Garrett

    2014-01-01

    This brief report summarizes the requirements for undocumented immigrants set forth by the Border Security, Economic Opportunity, and Immigration Modernization Act (S.744). Assuming that S.744 will move forward in Congress, the report also examines issues having to do with certain language, civics and government, and education/training provisions…

  14. 76 FR 12745 - Privacy Act of 1974; Department of Homeland Security Office of Operations Coordination and...

    Science.gov (United States)

    2011-03-08

    ... 20528. For privacy issues please contact: Mary Ellen Callahan (703-235-0780), Chief Privacy Officer... DEPARTMENT OF HOMELAND SECURITY Office of the Secretary [Docket No. DHS-2010-0055] Privacy Act of... Operations Center Tracker and Senior Watch Officer Logs System of Records AGENCY: Privacy Office, DHS. ACTION...

  15. 76 FR 18954 - Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security Federal...

    Science.gov (United States)

    2011-04-06

    ... issues please contact: Mary Ellen Callahan (703-235- 0780), Chief Privacy Officer, Privacy Office...] Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security Federal Emergency Management Agency DHS/FEMA-011 Training and Exercise Program Records System of Records AGENCY: Privacy Office...

  16. 75 FR 7978 - Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security Transportation...

    Science.gov (United States)

    2010-02-23

    ... Security Administration, 601 South 12th Street, Arlington, VA 20598-6036. For privacy issues please contact... Secretary 6 CFR Part 5 [Docket No. DHS-2009-0137] Privacy Act of 1974: Implementation of Exemptions... Program System of Records AGENCY: Privacy Office, DHS. ACTION: Notice of proposed rulemaking. SUMMARY: The...

  17. 77 FR 74913 - Privacy Act of 1974, as Amended; Computer Matching Program (Social Security Administration (SSA...

    Science.gov (United States)

    2012-12-18

    ...; Computer Matching Program (Social Security Administration (SSA)/Office of Personnel Management (OPM.... SUPPLEMENTARY INFORMATION: A. General The Computer Matching and Privacy Protection Act of 1988 (Public Law (Pub... computer matching involving the Federal government could be performed and adding certain protections for...

  18. 77 FR 69491 - Privacy Act of 1974: System of Records; Secure Flight Records

    Science.gov (United States)

    2012-11-19

    ... page at http://www.regulations.gov ; (2) Accessing the Government Printing Office's Web page at http...) of the Intelligence Reform and Terrorism Prevention Act of 2004 (IRTPA),\\4\\ Congress directed TSA and... Intelligence Agency, the Secretary of the Treasury, and the Secretary of Defense. The Attorney General, acting...

  19. 77 FR 39749 - Sunshine Act Meeting

    Science.gov (United States)

    2012-07-05

    ... advertising in securities offerings conducted pursuant to Rule 506 of Regulation D under the Securities Act... Startups Act. At times, changes in Commission priorities require alterations in the scheduling of meeting...

  20. Regulations under the Radiation Protection and Control Act, 1982, No. 221 of 1984

    International Nuclear Information System (INIS)

    1984-01-01

    These Regulations made under the Radiation Protection and Control Act of 1982, amend several numerical quotations contained in the Radiation Safety (Transport) Regulations, No. 27, 1984, also made under the above mentioned Act. (NEA) [fr

  1. 76 FR 9646 - Quarterly Listings; Safety Zones, Security Zones, Special Local Regulations, Drawbridge Operation...

    Science.gov (United States)

    2011-02-22

    ... DEPARTMENT OF HOMELAND SECURITY Coast Guard 33 CFR Parts 100, 117, 147, and 165 [USCG-2010-0399] Quarterly Listings; Safety Zones, Security Zones, Special Local Regulations, Drawbridge Operation Regulations and Regulated Navigation Areas AGENCY: Coast Guard, DHS. ACTION: Notice of expired temporary rules...

  2. 75 FR 8092 - Privacy Act of 1974; Department of Homeland Security/ALL-027 The History of the Department of...

    Science.gov (United States)

    2010-02-23

    ... Policy, U.S. Department of Homeland Security, Washington, DC 20528. For privacy issues please contact... DEPARTMENT OF HOMELAND SECURITY Office of the Secretary [Docket No. DHS-2009-0040] Privacy Act of... System of Records AGENCY: Privacy Office, DHS. ACTION: Notice of Privacy Act system of records. SUMMARY...

  3. 76 FR 21768 - Privacy Act of 1974; Department of Homeland Security/Office of Health Affairs-001 Contractor...

    Science.gov (United States)

    2011-04-18

    ... Homeland Security, Washington, DC 20520. For privacy issues please contact: Mary Ellen Callahan (703-235... DEPARTMENT OF HOMELAND SECURITY Office of the Secretary [Docket No. DHS-2011-0013] Privacy Act of... Immunization Records System of Records AGENCY: Privacy Office, DHS. ACTION: Notice of Privacy Act system of...

  4. 17 CFR 240.19g2-1 - Enforcement of compliance by national securities exchanges and registered securities associations...

    Science.gov (United States)

    2010-04-01

    ... national securities exchanges and registered securities associations with the Act and rules and regulations... Enforcement of compliance by national securities exchanges and registered securities associations with the Act... associated with its members, a national securities exchange or registered securities association is not...

  5. 15 CFR 744.11 - License requirements that apply to entities acting contrary to the national security or foreign...

    Science.gov (United States)

    2010-01-01

    ... entities acting contrary to the national security or foreign policy interests of the United States. 744.11... national security or foreign policy interests of the United States. BIS may impose foreign policy export... of being or becoming involved in activities that are contrary to the national security or foreign...

  6. 76 FR 66940 - Privacy Act of 1974; Department of Homeland Security/United States Secret Service-004 Protection...

    Science.gov (United States)

    2011-10-28

    ... DEPARTMENT OF HOMELAND SECURITY Office of the Secretary [Docket No. DHS-2011-0083] Privacy Act of 1974; Department of Homeland Security/United States Secret Service--004 Protection Information System... Security (DHS)/United States Secret Service (USSS)-004 System name: DHS/USSS-004 Protection Information...

  7. 76 FR 39315 - Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security/ALL-030 Use of...

    Science.gov (United States)

    2011-07-06

    ... the Terrorist Screening Database System of Records relates to official DHS national security and law... DEPARTMENT OF HOMELAND SECURITY Office of the Secretary 6 CFR Part 5 [Docket No. DHS-2011-0060] Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security/ALL--030 Use of the...

  8. Safe drinking water act: Amendments, regulations and standards

    International Nuclear Information System (INIS)

    Calabrese, E.J.; Gilbert, C.E.; Pastides, H.

    1989-01-01

    This book approaches the topic of safe drinking water by communicating how the EPA has responded to the mandates of Congress. Chapter 1 summarizes what is and will be involved in achieving safe drinking water. Chapter 2 describes the historical development of drinking water regulations. Chapter 3 summarizes the directives of the Safe Drinking Water Act Amendments of 1986. Chapters 4 through 9 discuss each phase of the regulatory program in turn. Specific problems associated with volatile organic chemicals, synthetic organics, inorganic chemicals, and microbiological contaminants are assessed in Chapter 4 and 5. The unique characteristics of radionuclides and their regulation are treated in Chapter 6. The disinfection process and its resultant disinfection by-products are presented in Chapter 7. The contaminant selection process and the additional contaminants to be regulated by 1989 and 1991 and in future years are discussed in Chapters 8 and 9. EPA's Office of Drinking Water's Health Advisory Program is explained in Chapter 10. The record of public water system compliance with the primary drinking water regulations is detailed in Chapter 11. Chapter 12 offers a nongovernmental perspective on the general quality of drinking water and how this is affected by a wide range of drinking water treatment technologies. Separate abstracts are processed for 5 chapters in this book for inclusion in the appropriate data bases

  9. 77 FR 74546 - Posting of Pamphlet Provided for in the International Marriage Broker Regulation Act

    Science.gov (United States)

    2012-12-14

    ... Marriage Broker Regulation Act ACTION: Notice of posting of pamphlet provided for in section 833(a) of the International Marriage Broker Regulation Act, Title D of Public Law 109-162. SUMMARY: Section 833(a) of the International Marriage Broker Regulation Act, Title D of Public Law 109-162, provided that the Secretary of...

  10. 76 FR 42003 - Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security Transportation...

    Science.gov (United States)

    2011-07-18

    ... Disclosures) because release of the accounting of disclosures could alert the subject of an investigation of... efforts to preserve national security. Disclosure of the accounting would also permit the individual who... preamble, DHS amends Chapter I of Title 6, Code of Federal Regulations, as follows: PART 5--DISCLOSURE OF...

  11. 76 FR 42005 - Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security Office of...

    Science.gov (United States)

    2011-07-18

    ... Disclosures) because release of the accounting of disclosures could alert the subject of an investigation of... efforts to preserve national security. Disclosure of the accounting would also permit the individual who... Title 6, Code of Federal Regulations, as follows: PART 5--DISCLOSURE OF RECORDS AND INFORMATION 0 1. The...

  12. Environmental impact assessment modern dressed? To the amendment of the EIA act and other acts and regulations

    International Nuclear Information System (INIS)

    Feldmann, Ulrike

    2017-01-01

    On 22 December 2016, the Federal Ministry for the Environment (BMUB) presented the ''Draft Act for the Modernization of the Act on the Environmental Impact Assessment'' within the framework of the association consultation, as well as the ''Draft first Ordinance Amending the Ordinance on the Approval Procedure - 9. BImSchV''. The EIA Modernization Act as well as the Atomic Act Procedure Regulation and the Federal Mining Act should be revised by terms of an omnibus act. The association consultation was held on 18 January 2017.

  13. Adaptive Equilibrium Regulation: A Balancing Act in Two Timescales

    Science.gov (United States)

    Boker, Steven M.

    2015-01-01

    An equilibrium involves a balancing of forces. Just as one maintains upright posture in standing or walking, many self-regulatory and interpersonal behaviors can be framed as a balancing act between an ever changing environment and within-person processes. The emerging balance between person and environment, the equilibria, are dynamic and adaptive in response to development and learning. A distinction is made between equilibrium achieved solely due to a short timescale balancing of forces and a longer timescale preferred equilibrium which we define as a state towards which the system slowly adapts. Together, these are developed into a framework that this article calls Adaptive Equilibrium Regulation (ÆR), which separates a regulatory process into two timescales: a faster regulation that automatically balances forces and a slower timescale adaptation process that reconfigures the fast regulation so as to move the system towards its preferred equilibrium when an environmental force persists over the longer timescale. This way of thinking leads to novel models for the interplay between multiple timescales of behavior, learning, and development. PMID:27066197

  14. Radiation sources safety and radioactive materials security regulation in Ukraine

    International Nuclear Information System (INIS)

    Smyshliaiev, A.; Holubiev, V.; Makarovska, O.

    2001-01-01

    packages for shipment of radiation sources; State registration of radiation sources; licensing of radiation material transportation. In 1997, the Government of Ukraine decided to establish a unified computerized system of accountancy, control and registration of radiation sources - the State Register of Radiation Sources (Register). In 1998, under the Ukrainian State Production Enterprise 'Isotope' a separate subdivision 'State Register of Radiation Sources' was established. This subdivision functions as the main registration centre, and has been supplied with computer equipment with the assistance of the IAEA. During 1999-2000, the basic documents that regulate the legal status of the Register, the radiation source registration procedure and the State inventory of radiation source procedure were developed and approved by the relevant ministries. Urgent commissioning of the Register and starting the State registration of radiation sources will form a good basis for considerable upgrading of the level of safety and security of radiation sources, reduction of illicit trafficking in radiation sources, and investigation of illicit trafficking cases. Lack of funds is the main problem impeding the commissioning of the Register. On the basis of analysis of safety regulation system for activities dealing with radiation sources in Ukraine, we can draw a conclusion about its sufficiency for effective safety regulation of radiation sources and security of radioactive materials. (author)

  15. STATE REGULATION OF CARGO SECURING FOR ROAD TRANSPORT

    Directory of Open Access Journals (Sweden)

    Nikolay Anatolievich Atrokhov

    2015-09-01

    Full Text Available This article examines the legal documents governing the securing of cargo in road transport, provides an overview of international experience in the safety of road transport of goods by means of securing.

  16. Security Safeguards on E-Payment Systems in Malaysia: Analysis on the Payment Systems Act 2003

    OpenAIRE

    Zulhuda, Sonny; Azmi, Ida Madieha bt. Abdul Ghani

    2011-01-01

    Central to the infrastructure of electronic commerce activities is the electronic payment system. This encompasses not only the issues of technical sophistication but also legal readiness. In the context of electronic commerce environment in Malaysia, this paper seeks to highlight and examine the Malaysian legal readiness in the aspect of electronic payment system, focusing on its Payment Systems Act 2003. The discussion is limited to the issue of electronic security measures embodied in the ...

  17. 76 FR 70342 - Quarterly Listings; Safety Zones, Security Zones, Special Local Regulations, Drawbridge Operation...

    Science.gov (United States)

    2011-11-14

    ...] Quarterly Listings; Safety Zones, Security Zones, Special Local Regulations, Drawbridge Operation... published in the Federal Register. This notice lists temporary safety zones, security zones, special local... Commanders and Captains of the Port (COTP) must be immediately responsive to the safety and security needs...

  18. Financial Sector Assessment Program : Malaysia - IOSCO Objectives and Principles of Securities Regulation

    OpenAIRE

    World Bank; International Monetary Fund

    2013-01-01

    The Securities Commission Malaysia (SC), as the supervisor of the capital markets, has developed a robust supervisory framework that exhibits high levels of implementation of the International Organization of Securities Commissions Objectives and Principles of Securities Regulation (IOSCO Principles) in most areas. The SC's independence will be buttressed by some changes to the legal provi...

  19. 76 FR 27897 - Security and Safety Zone Regulations, Large Passenger Vessel Protection, Captain of the Port...

    Science.gov (United States)

    2011-05-13

    ... DEPARTMENT OF HOMELAND SECURITY Coast Guard 33 CFR Part 165 [Docket No. USCG-2011-0342] Security and Safety Zone Regulations, Large Passenger Vessel Protection, Captain of the Port Columbia River... will enforce the security and safety zone in 33 CFR 165.1318 for large passenger vessels operating in...

  20. 75 FR 50846 - Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security/ALL-001...

    Science.gov (United States)

    2010-08-18

    ... INFORMATION CONTACT: For general questions and privacy issues please contact: Mary Ellen Callahan (703-235...] Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security/ALL--001 Freedom of Information Act and Privacy Act Records System of Records AGENCY: Privacy Office, DHS. ACTION: Final rule...

  1. 75 FR 7546 - Foreign Trade Regulations (FTR): Eliminate the Social Security Number (SSN) as an Identification...

    Science.gov (United States)

    2010-02-22

    ... DEPARTMENT OF COMMERCE Census Bureau 15 CFR Part 30 [Docket Number: 090422707-91445-02] RIN 0607-AA48 Foreign Trade Regulations (FTR): Eliminate the Social Security Number (SSN) as an Identification... Trade Regulations (FTR) to eliminate the requirement to report a Social Security Number (SSN) as an...

  2. 48 CFR 1552.224-70 - Social security numbers of consultants and certain sole proprietors and Privacy Act statement.

    Science.gov (United States)

    2010-10-01

    ... 48 Federal Acquisition Regulations System 6 2010-10-01 2010-10-01 true Social security numbers of... CONTRACT CLAUSES Texts of Provisions and Clauses 1552.224-70 Social security numbers of consultants and... provision in all solicitations. Social Security Numbers of Consultants and Certain Sole Proprietors and...

  3. The Regulation of the Security of Electronic Information in Lithuania and Russia: the Comparative Aspects

    Directory of Open Access Journals (Sweden)

    Darius Štitilis

    2013-02-01

    Full Text Available Cybercrime has become a global phenomenon, which is causing more harm to individual citizens, organizations, society and the state. Most countries in the world compare cybercrime with such offences as terrorism and drug trafficking due to its risks and profitability. Therefore, the legal regulation of cybercrime is one of the most relevant problems in the world, including Lithuania and our neighbouring country, Russia. So far cybercrime analysis in scientific literature has been rather limited. We have not succeeded in finding a comparison between the regulatory practices of cybercrime in the Russian Federation and the Republic of Lithuania in any of the references. The main goal of the thesis paper is to analyse and to compare the electronic information security legal framework of the Russian Federation and the Republic of Lithuania. The article consists of two parts. The first part deals with the comparative aspect of strategic documents—the program governing electronic information protection in Lithuania and the Russian Federation. The second part of the article examines the comparative aspect of electronic information protection legislative, legal framework Republic of Lithuania and the Russian Federation. It was found that at the moment in both countries there is a strategic document which defines the planned state policy in this area, but the lack of a Lithuanian Law which can fully and consistently regulate social relations in relation to electronic information security. Several different approaches have been used in the research. The authors have used a comparative method to investigate the Lithuanian and Russian legal framework for the security of electronic information. Empirical analysis of legal documents was used to determine the legal regulation of the security of electronic information in Lithuania and Russia. Legal acts of the Republic of Lithuania and the Russian Federation have been analysed. Having analysed the official

  4. The Regulation of the Security of Electronic Information in Lithuania and Russia: the Comparative Aspects

    Directory of Open Access Journals (Sweden)

    Darius Štitilis

    2012-12-01

    Full Text Available Cybercrime has become a global phenomenon, which is causing more harm to individual citizens, organizations, society and the state. Most countries in the world compare cybercrime with such offences as terrorism and drug trafficking due to its risks and profitability. Therefore, the legal regulation of cybercrime is one of the most relevant problems in the world, including Lithuania and our neighbouring country, Russia. So far cybercrime analysis in scientific literature has been rather limited. We have not succeeded in finding a comparison between the regulatory practices of cybercrime in the Russian Federation and the Republic of Lithuania in any of the references.The main goal of the thesis paper is to analyse and to compare the electronic information security legal framework of the Russian Federation and the Republic of Lithuania.The article consists of two parts. The first part deals with the comparative aspect of strategic documents—the program governing electronic information protection in Lithuania and the Russian Federation.The second part of the article examines the comparative aspect of electronic information protection legislative, legal framework Republic of Lithuania and the Russian Federation. It was found that at the moment in both countries there is a strategic document which defines the planned state policy in this area, but the lack of a Lithuanian Law which can fully and consistently regulate social relations in relation to electronic information security.Several different approaches have been used in the research. The authors have used a comparative method to investigate the Lithuanian and Russian legal framework for the security of electronic information. Empirical analysis of legal documents was used to determine the legal regulation of the security of electronic information in Lithuania and Russia. Legal acts of the Republic of Lithuania and the Russian Federation have been analysed. Having analysed the official

  5. 78 FR 70515 - Petition To Promulgate Standards for Bears Under the Animal Welfare Act Regulations

    Science.gov (United States)

    2013-11-26

    ... the Animal Welfare Act Regulations AGENCY: Animal and Plant Health Inspection Service, USDA. ACTION... Service has received a petition requesting that we amend the Animal Welfare Act regulations to add..., Riverdale, MD 20737-1234; (301) 851-3751. SUPPLEMENTARY INFORMATION: Background The Animal Welfare Act (AWA...

  6. 20 CFR 626.3 - Purpose, scope, and applicability of the Job Training Partnership Act regulations.

    Science.gov (United States)

    2010-04-01

    ... ADMINISTRATION, DEPARTMENT OF LABOR INTRODUCTION TO THE REGULATIONS UNDER THE JOB TRAINING PARTNERSHIP ACT § 626.3 Purpose, scope, and applicability of the Job Training Partnership Act regulations. (a) Parts 626..., part C of the Job Training Partnership Act) establish the Federal programmatic and administrative...

  7. 17 CFR 259.206 - Form U-6B-2, for notification of security issues exempt under section 6(b) of the Act.

    Science.gov (United States)

    2010-04-01

    ... of security issues exempt under section 6(b) of the Act. 259.206 Section 259.206 Commodity and... security issues exempt under section 6(b) of the Act. This form shall be filed pursuant to section 6(b) of the Act as the certificate of notification of the issue, sale, renewal, or guaranty of securities...

  8. 17 CFR 240.15b5-1 - Extension of registration for purposes of the Securities Investor Protection Act of 1970 after...

    Science.gov (United States)

    2010-04-01

    ... purposes of the Securities Investor Protection Act of 1970 after cancellation or revocation. 240.15b5-1... purposes of the Securities Investor Protection Act of 1970 after cancellation or revocation. Commission... member within the meaning of Section 3(a)(2) of the Securities Investor Protection Act of 1970 for...

  9. 75 FR 42363 - Public Health Security and Bioterrorism Preparedness and Response Act of 2002; Biennial Review...

    Science.gov (United States)

    2010-07-21

    ... be e-mailed to: [email protected] . FOR FURTHER INFORMATION CONTACT: Robbin Weyant, Director..., Atlanta, GA 30333. Telephone: (404) 718- 2000. SUPPLEMENTARY INFORMATION: The Bioterrorism Act requires... to the Select Agent regulations (42 CFR Part 73) to implement a tiering and/or stratification schema...

  10. A legislative history of the Social Security Protection Act of 2004.

    Science.gov (United States)

    Hansen, Erik

    2008-01-01

    Passage of the original Social Security Act in 1935, Public Law (P.L.) 74-271, represented one of the watershed achievements of social welfare reform in American history. For the first time, workers were guaranteed a basic floor of protection against the hardships of poverty. In the ensuing decades, more than 100 million beneficiaries have realized the value of this protection through the receipt of monthly Social Security payments. As this guarantee has endured and progressed, the policies and administration of such a vast and complex program have required ongoing modifications-more than 150 such revisions over the past 73 years. To some extent, these amendments can be seen as an ongoing refinement process, with the Social Security Protection Act of 2004 (SSPA) being another incremental step in the development of a social insurance program that best meets the evolving needs of American society. This article discusses the legislative history of the SSPA in detail. It includes summaries of the provisions and a chronology of the modification of these proposals as they passed through the House and Senate, and ultimately to the president's desk.

  11. 7 CFR 27.95 - Spot markets to conform to Act and regulations.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 2 2010-01-01 2010-01-01 false Spot markets to conform to Act and regulations. 27.95 Section 27.95 Agriculture Regulations of the Department of Agriculture AGRICULTURAL MARKETING SERVICE... and Differences § 27.95 Spot markets to conform to Act and regulations. Every bona fide spot market...

  12. Notification: Audit of the U.S. EPA's Compliance with the Federal Information Security Management Act (FISMA)

    Science.gov (United States)

    Project #OA-FY13-0280, May 9, 2013. The Office of Inspector General plans to begin fieldwork for an audit of the U.S. Environmental Protection Agency’s compliance with the Federal Information Security Management Act.

  13. Theater Security Cooperation Planning with Article 98: How the 2002 Servicemembers' Protection Act Fosters China's Quest for Global Influence

    National Research Council Canada - National Science Library

    Hernandez, Jaime A

    2005-01-01

    The Combatant Commander is hindered in constructing Theater Security Cooperation plans due to the restrictions placed upon foreign military aid dispersal as a result of the 2002 American Servicemembers' Protection Act...

  14. Notification: Audit of the U.S. Environmental Protection Agency’s Compliance with the Federal Information Security Management Act

    Science.gov (United States)

    Project #OA-FY14-0135, February 10, 2014. The Office of Inspector General plans to begin fieldwork for an audit of the U.S. Environmental Protection Agency's compliance with the Federal Information Security Management Act (FISMA).

  15. Regulating the Role of PMCs in Shaping Security and Politics

    DEFF Research Database (Denmark)

    Leander, Anna

    2006-01-01

    This paper focuses on the way PMCs shape security policies and more generally political priorities. Linking up with classical thinking about "civil-military relations", it suggests that preoccupation with security professionals' role in shaping politics is as important when these professionals...

  16. 75 FR 7979 - Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security/ALL-027 The...

    Science.gov (United States)

    2010-02-23

    ... privacy issues please contact: Mary Ellen Callahan (703-235-0780), Chief Privacy Officer, Privacy Office...] Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security/ALL-027 The History of the Department of Homeland Security System of Records AGENCY: Privacy Office, DHS. ACTION: Notice of...

  17. 75 FR 5491 - Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security/U.S. Customs...

    Science.gov (United States)

    2010-02-03

    ... addressing privacy concerns. The fifteen- year retention period will allow CBP to access the data when needed... security, law enforcement and counterterrorism missions, while addressing privacy concerns. Legal or...] Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security/U.S. Customs and Border...

  18. Statutory Instrument No. 2056, The Nuclear Installations Act 1965 etc. (Repeals and Modifications) Regulations 1974

    International Nuclear Information System (INIS)

    1975-01-01

    These Regulations contain repeals and modifications of provisions of the Nuclear Installations Act 1965 and a modification of the Nuclear Installations (Dangerous Occurrences) Regulations 1965. They are made in consequence of the establishment on 1st January 1975 of the Health and Safety Executive and the coming into operation on that date of provisions of the Health and Safety at Work etc. Act 1974 which supersede or affect provisions of the 1965 Act and the 1965 Regulations. (NEA) [fr

  19. Charging scheme for Radioactive Substances Act regulation 1998-1999

    International Nuclear Information System (INIS)

    1998-03-01

    The Environment Act 1995 provides for the Environment Agency ('the Agency') to recover the costs and expenses incurred by the Agency and by the Minister of Agriculture, Fisheries and Food (MAFF) in carrying out their functions in relation to the Radioactive Substances Act 1993 ('the Act'). The Act deals with the keeping and use of radioactive substances, and with the accumulation and disposal of radioactive waste

  20. 76 FR 72132 - Regulations Under The Fur Products Labeling Act

    Science.gov (United States)

    2011-11-22

    ... then suggests issues for discussion at the hearing. A. Fur Act and Rules The Fur Act prohibits..., fleece, and fur-bearing animals.'' \\9\\ The Act further requires these names to ``be the true English names for the animals in question, or in the absence of a true English name for an animal, the name by...

  1. 76 FR 39963 - Order Pursuant to Section 36 of the Securities Exchange Act of 1934 Granting Temporary Exemptions...

    Science.gov (United States)

    2011-07-07

    ... Exchange Act Release No. 64017, supra note 9. \\16\\ The Commission stresses that the functions highlighted... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-64796; File No. S7-28-11] Order Pursuant to...- counter (``OTC'') market are centrally cleared.\\4\\ One of the key ways in which the Dodd-Frank Act seeks...

  2. 78 FR 69858 - Privacy Act of 1974; Department of Homeland Security/Federal Emergency Management Agency-001...

    Science.gov (United States)

    2013-11-21

    ... Emergency Management Agency, 500 C Street SW., Washington, DC 20475. For privacy issues please contact... DEPARTMENT OF HOMELAND SECURITY Office of the Secretary [Docket No. DHS-2013-0077] Privacy Act of..., Privacy Office. ACTION: Notice of Privacy Act System of Records. SUMMARY: In accordance with the Privacy...

  3. 76 FR 49500 - Privacy Act of 1974; Department of Homeland Security United States Coast Guard-020 Substance...

    Science.gov (United States)

    2011-08-10

    ... 7101 Washington, DC 20593. For privacy issues please contact: Mary Ellen Callahan (703-235-0780), Chief... DEPARTMENT OF HOMELAND SECURITY Office of the Secretary [Docket No. DHS-2011-0053] Privacy Act of... Treatment Program System of Records AGENCY: Privacy Office, DHS. ACTION: Notice of Privacy Act system of...

  4. REGULATION OF AUSTRALIAN MEDICAL PROFESSIONALS AND NATIONAL SECURITY: LESSONS FROM THREE CASE STUDIES.

    Science.gov (United States)

    Faunce, Thomas; McKenna, Michael; Rayner, Johanna; Hawes, Jazmin

    2016-03-01

    In recent times, Australia's national security concerns have had controversial impacts on regulation of Australian medical practitioners in areas related to immigration detention. This column explores three recent case studies relevant to this issue. The first involves the enactment of the Australian Border Force Act 2015 (Cth), which has a significant impact on the regulation of medical professionals who work with people in immigration detention. The second involves the decision of the High Court of Australia in Plaintiff M68/2015 v Minister for Immigration and Border Protection [2016] HCA 1 that an amendment to Australian federal legislation justified sending children back to immigration detention centres in Papua New Guinea and Nauru. This legislation was previously heavily criticised by the Australian Human Rights Commissioner. The third concerns the deregistration of Tareq Kamleh, an Australian doctor of German-Palestinian heritage who came to public attention on ANZAC Day 2015 with his appearance online in a propaganda video for the Islamic State terrorist organisation al-Dawla al-Islamyia fil Iraq wa'al Sham, also known as Islamic State of Iraq and Syria (ISIS) or Daesh. Australia's professional regulatory system should presumptively respect professional virtues, such as loyalty to the relief of individual patient suffering, when dealing with doctors (whether in Australia or ISIS-occupied Syria) working under regimes whose principles appear inconsistent with those of ethics and human rights.

  5. 76 FR 78977 - Real Estate Settlement Procedures Act (Regulation X)

    Science.gov (United States)

    2011-12-20

    ... 1061 of the Dodd-Frank Act transferred to the Bureau all of the HUD Secretary's consumer protection... a ``creditor'', as defined in section 103(g) of the Consumer Credit Protection Act (15 U.S.C. 1602(g... Vol. 76 Tuesday, No. 244 December 20, 2011 Part II Bureau of Consumer Financial Protection 12 CFR...

  6. 20 CFR 626.2 - Format of the Job Training Partnership Act regulations.

    Science.gov (United States)

    2010-04-01

    ... 20 Employees' Benefits 3 2010-04-01 2010-04-01 false Format of the Job Training Partnership Act regulations. 626.2 Section 626.2 Employees' Benefits EMPLOYMENT AND TRAINING ADMINISTRATION, DEPARTMENT OF LABOR INTRODUCTION TO THE REGULATIONS UNDER THE JOB TRAINING PARTNERSHIP ACT § 626.2 Format of the Job...

  7. 77 FR 19455 - Regulations Implementing the Byrd Amendments to the Black Lung Benefits Act: Determining Coal...

    Science.gov (United States)

    2012-03-30

    ... Programs 20 CFR Parts 718 and 725 Regulations Implementing the Byrd Amendments to the Black Lung Benefits... Implementing the Byrd Amendments to the Black Lung Benefits Act: Determining Coal Miners' and Survivors... amendments to the Black Lung Benefits Act (BLBA or Act) made by the Patient Protection and Affordable Care...

  8. 78 FR 60686 - Regulations Implementing the Byrd Amendments to the Black Lung Benefits Act: Determining Coal...

    Science.gov (United States)

    2013-10-02

    ...-AA04 Regulations Implementing the Byrd Amendments to the Black Lung Benefits Act: Determining Coal... correcting the preamble to a final rule implementing amendments to the Black Lung Benefits Act that appeared... the Byrd Amendments to the Black Lung Benefits Act: Determining Coal Miners' and Survivors...

  9. 77 FR 29982 - Federal Acquisition Regulation; Submission for OMB Review; Davis Bacon Act-Price Adjustment...

    Science.gov (United States)

    2012-05-21

    ...; Submission for OMB Review; Davis Bacon Act-Price Adjustment (Actual Method) AGENCY: Department of Defense... previously approved information collection requirement concerning the Davis-Bacon Act price adjustment... Bacon Act-Price Adjustment (Actual Method), by any of the following methods: Regulations.gov : http...

  10. 75 FR 51619 - Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security/United States...

    Science.gov (United States)

    2010-08-23

    ... regulations to exempt portions of a Department of Homeland Security/United States Citizenship and Immigration system of records entitled the ``United States Citizenship and Immigration Services--009 Compliance... of 1974: Implementation of Exemptions; Department of Homeland Security/United States Citizenship and...

  11. 1990 No. 1918. The Nuclear Installations Act 1965 (Repeal and Modifications) Regulations 1990

    International Nuclear Information System (INIS)

    1990-01-01

    These Regulations entered into force on 31 October 1990. They repeal part of Section (1) of the Nuclear Installations Act 1965 to remove the exemption of the United Kingdom Atomic Energy Authority (UKAEA) from licensing under the Act. The Regulations also amend the 1965 Act to ensure that the UKAEA's duties in respect of the safety of premises it occupies will continue to apply whether or not a nuclear site licence has been granted. (NEA) [fr

  12. 17 CFR 239.24 - Form N-5, form for registration of small business investment company under the Securities Act of...

    Science.gov (United States)

    2010-04-01

    ... registration of small business investment company under the Securities Act of 1933 and the Investment Company... N-5, form for registration of small business investment company under the Securities Act of 1933 and... of 1933 of securities issued by any small business investment company which is registered under the...

  13. Infant emotion regulation: relations to bedtime emotional availability, attachment security, and temperament.

    Science.gov (United States)

    Kim, Bo-Ram; Stifter, Cynthia A; Philbrook, Lauren E; Teti, Douglas M

    2014-11-01

    The present study examines the influences of mothers' emotional availability toward their infants during bedtime, infant attachment security, and interactions between bedtime parenting and attachment with infant temperamental negative affectivity, on infants' emotion regulation strategy use at 12 and 18 months. Infants' emotion regulation strategies were assessed during a frustration task that required infants to regulate their emotions in the absence of parental support. Whereas emotional availability was not directly related to infants' emotion regulation strategies, infant attachment security had direct relations with infants' orienting toward the environment and tension reduction behaviors. Both maternal emotional availability and security of the mother-infant attachment relationship interacted with infant temperamental negative affectivity to predict two strategies that were less adaptive in regulating frustration. Copyright © 2014 Elsevier Inc. All rights reserved.

  14. Coal Mine Health and Safety Regulation 2006 under the Coal Mine Health and Safety Act 2002

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2006-12-22

    The aim of the Act is to secure the health, safety and welfare of people in connection with coal operations (which include all places of work where coal is mined and certain other places). The Regulation contains provisions about the following matters: (a) places of work to which the Act does not apply, (b) duties relating to health, welfare and safety at coal operations, including the following: (i) the nomination of the operator of a coal operation and the provision of health and safety information for incoming operators, (ii) the contents of health and safety management systems for coal operations, (iii) major hazards and the contents of major hazard management plans for coal operations, (iv) duties relating to contractors, (v) the contents of management structures and emergency management systems for coal operations, escape and rescue plans and fire fighting plans and high risk activities, (c) notifications, including (i) notification of incidents, (ii) inquiries, (iii) notification of other matters to the Chief Inspector), (d) aspects of safety at coal operations, including the following: (i) controlled materials, plants and practices, (ii) coal dust explosion prevention and suppression, (iii) ventilation at coal operations, (iv) escape from coal operations, (v) the operation of transport at coal operations, (vi) surveys and certified plans, (vii) employment at coal operations, (e) the licensing of certain activities, (f) competence standards, (g) the Coal Competence Board, (h) check inspectors, (i) exemptions from provisions of this Regulation, (j) the following miscellaneous matters concerning coal mine health and safety: (i) the keeping of records and reporting, (ii) penalties, the review of decisions by the Administrative Decisions Tribunal, fees and charges, consultation, information and other miscellaneous matters, (k) savings and transitional provisions.

  15. 76 FR 67755 - Privacy Act of 1974; Department of Homeland Security U.S. Customs and Border Protection DHS/CBP...

    Science.gov (United States)

    2011-11-02

    ... DEPARTMENT OF HOMELAND SECURITY Office of the Secretary [Docket No. DHS-2011-0102] Privacy Act of... Data System of Records AGENCY: Privacy Office, DHS. ACTION: Notice of Privacy Act system of records. SUMMARY: In accordance with the Privacy Act of 1974 the Department of Homeland Security proposes to...

  16. Local television news coverage of President Clinton's introduction of the Health Security Act.

    Science.gov (United States)

    Dorfman, L; Schauffler, H H; Wilkerson, J; Feinson, J

    1996-04-17

    To investigate how local television news reported on health system reform during the week President Clinton presented his health system reform bill. Retrospective content analysis of the 1342-page Health Security Act of 1993, the printed text of President Clinton's speech before Congress on September 22, 1993, and a sample of local television news stories on health system reform broadcast during the week of September 19 through 25, 1993. The state of California. During the week, 316 television news stories on health system reform were aired during the 166 local news broadcasts sampled. Health system reform was the second most frequently reported topic, second to stories on violent crime. News stories on health system reform averaged 1 minute 38 seconds in length, compared with 57 seconds for violent crime. Fifty-seven percent of the local news stories focused on interest group politics. Compared with the content of the Health Security Act, local news broadcasts devoted a significantly greater portion of their stories to financing, eligibility, and preventive services. Local news stories gave significantly less attention to cost-saving mechanisms, long-term care benefits, and changes in Medicare and Medicaid, and less than 2% of stories mentioned quality assurance mechanisms, malpractice reform, or new public health initiatives. Of the 316 televised news stories, 53 reported on the president's speech, covering many of the same topics emphasized in the speech (financing, organization and administration, and eligibility) and de-emphasizing many of the same topics (Medicare and Medicaid, quality assurance, and malpractice reform). Two percent of the president's speech covered partisan politics; 45% of the local news stories on the speech featured challenges from partisan politicians. Although health system reform was the focus of a large number of local television news stories during the week, in-depth explanation was scarce. In general, the news stories provided

  17. 48 CFR 252.222-7004 - Compliance with Spanish social security laws and regulations.

    Science.gov (United States)

    2010-10-01

    ... 48 Federal Acquisition Regulations System 3 2010-10-01 2010-10-01 false Compliance with Spanish... PROVISIONS AND CONTRACT CLAUSES Text of Provisions And Clauses 252.222-7004 Compliance with Spanish social... Spanish Social Security Laws and Regulations (JUN 1997) (a) The Contractor shall comply with all Spanish...

  18. Enforcement actions and their effectiveness in securities regulation: Empirical evidence from management earnings forecasts

    Directory of Open Access Journals (Sweden)

    Yunling Song

    2012-03-01

    Full Text Available Due to resource constraints, securities regulators cannot find or punish all firms that have conducted irregular or even illegal activities (hereafter referred to as fraud. Those who study securities regulations can only find the instances of fraud that have been punished, not those that have not been punished, and it is these unknown cases that would make the best control sample for studies of enforcement action criteria. China’s mandatory management earnings forecasts solve this sampling problem. In the A-share market, firms that have not forecasted as mandated are likely in a position to be punished by securities regulators or are attempting to escape punishment, and their identification allows researchers to build suitable study and control samples when examining securities regulations. Our results indicate that enforcement actions taken by securities regulators are selective. The probability that a firm will be punished for irregular management forecasting is significantly related to proxies for survival rates. Specifically, fraudulent firms with lower return on assets (ROAs or higher cash flow risk are more likely to be punished. Further analysis shows that selective enforcement of regulations has had little positive effect on the quality of listed firms’ management forecasts.

  19. Intervention pursuant to article 4(h) of the Constitutive Act of the African Union without United Nations Security Council authorisation

    OpenAIRE

    Amvane, Gabriel

    2015-01-01

    Article 4(h) of the Constitutive Act of the African Union (AU) establishes the right of the Union to intervene in a member state to prevent grave violations of human rights. It does not state whether the AU should request prior authorisation from the United Nations (UN) Security Council, leading to many interpretations. Many articles were written on this issue at a time when the AU and the Security Council were not in confrontation. However, the situation has changed since the controversy ove...

  20. 75 FR 48585 - Revision of Freedom of Information Act Regulations

    Science.gov (United States)

    2010-08-11

    ... the initial publication of CEQ's FOIA regulations in 1977, reflects the increased cost of human..., CEQ has adhered to the regulatory philosophy and the applicable principles of regulation as set forth... significantly affecting the quality of the human environment.'' If an action may have a significant impact and...

  1. 77 FR 74347 - Freedom of Information Act Regulations

    Science.gov (United States)

    2012-12-14

    ... regulation, CIGIE adhered to the regulatory philosophy and the applicable principles of regulation as set... research (if the request is from an educational institution) or scientific research (if the request is from... operating one or more programs of scholarly research. (2) The term ``non-commercial scientific institution...

  2. 33 CFR 165.117 - Regulated Navigation Areas, Safety and Security Zones: Deepwater Ports, First Coast Guard District.

    Science.gov (United States)

    2010-07-01

    ..., Safety and Security Zones: Deepwater Ports, First Coast Guard District. 165.117 Section 165.117... Limited Access Areas First Coast Guard District § 165.117 Regulated Navigation Areas, Safety and Security... section are designated as regulated navigation areas. (2) Safety and security zones. All waters within a...

  3. 20 CFR 220.37 - When a child's disability determination is governed by the regulations of the Social Security...

    Science.gov (United States)

    2010-04-01

    ...) Inclusion as a disabled child in the employee's annuity rate under the social security overall minimum. (2... governed by the regulations of the Social Security Administration. 220.37 Section 220.37 Employees... Disability Determinations Governed by the Regulations of the Social Security Administration § 220.37 When a...

  4. Could Regulator Materialize Potential Demand for Islamic Securities? Evidence from Indonesia

    Directory of Open Access Journals (Sweden)

    Bayu Kariastanto

    2012-01-01

    Full Text Available Objective – The objective of this paper is to provide a discussion whether Islamic securities enjoy larger demands than conventional securities. This paper also investigate whether regulator could effectively take a role in materializing demands for Islamic securities and whether regulator declaration is more convincing than sharia compliance declaration by another institution.Methods - We employ differences in differences (DID regression to see the immediate, medium, and long term market response to this announcement. We also estimate cumulative abnormal returns by employing the standard market model for the robustness test.Results - We find that market reacts to sharia compliance declaration by regulator in the long-run, hence potential demands are realized and the Islamic securities will enjoy greater market power. We also provide evidence that Islamic investors are not too strict in screening Islamic securities and are willing to accept different opinions regarding sharia compliance.Conclusion - This finding could explain why Islamic finance is still growing rapidly even though there are critiques in the genuineness of sharia compliance of the current Islamic financial products/services.Keywords: Regulator, Islamic securities, sharia compliance, demand, investor confidence

  5. IAEA Nuclear Security Assessment Methodologies (NUSAM) Project for Regulated Facilities

    International Nuclear Information System (INIS)

    Jang, Sung Soon

    2016-01-01

    Nuclear Security Assessment Methodologies (NUSAM) is a coordinate research project. The objectives of the NUSAM project is to establish a risk informed, performance-based methodological framework in a systematic, structured, comprehensive and appropriately transparent manner; to provide an environment for the sharing and transfer of knowledge and experience; and to provide guidance on, and practical examples of good practices in assessing the security of nuclear and other radioactive materials, as well as associated facilities and activities. The author worked as an IAEA scientific secretary of the NUAM project from 2013 to 2015. IAEA launched this project in 2013 and performed many activities: meetings, document development, table-top exercises and computer simulations. Now the project is in the final stage and will be concluded in the late 2016. The project will produce documents on NUSAM assessment methods and case study documents on NPP, Irradiator Facility and Transport. South Korea as a main contributor to this project will get benefits from the NUSAM. In 2014, South Korea introduced force-on-force exercises, which could be used as the assessment of physical protection system by the methods of NUSAM

  6. IAEA Nuclear Security Assessment Methodologies (NUSAM) Project for Regulated Facilities

    Energy Technology Data Exchange (ETDEWEB)

    Jang, Sung Soon [Korea Nuclear Non-proliferation and Control, Daejeon (Korea, Republic of)

    2016-05-15

    Nuclear Security Assessment Methodologies (NUSAM) is a coordinate research project. The objectives of the NUSAM project is to establish a risk informed, performance-based methodological framework in a systematic, structured, comprehensive and appropriately transparent manner; to provide an environment for the sharing and transfer of knowledge and experience; and to provide guidance on, and practical examples of good practices in assessing the security of nuclear and other radioactive materials, as well as associated facilities and activities. The author worked as an IAEA scientific secretary of the NUAM project from 2013 to 2015. IAEA launched this project in 2013 and performed many activities: meetings, document development, table-top exercises and computer simulations. Now the project is in the final stage and will be concluded in the late 2016. The project will produce documents on NUSAM assessment methods and case study documents on NPP, Irradiator Facility and Transport. South Korea as a main contributor to this project will get benefits from the NUSAM. In 2014, South Korea introduced force-on-force exercises, which could be used as the assessment of physical protection system by the methods of NUSAM.

  7. 75 FR 41370 - Regulations Implementing the Freedom of Information Act

    Science.gov (United States)

    2010-07-16

    ... updates paragraph (a) to reflect the new maintenance of statistics requirements in the OPEN Government Act... 2201.4 is amended: 0 a. By revising paragraphs (c) introductory text, (c)(1), (3), (4), and (5); 0 b...) introductory text; 0 b. Adding paragraph (b)(2)(v); and 0 c. Revising paragraph (e). The revisions and addition...

  8. 75 FR 22320 - Regulations Implementing the Freedom of Information Act

    Science.gov (United States)

    2010-04-28

    ... reflect the new maintenance of statistics requirements in the OPEN Government Act. 5 U.S.C. 552(e). III... 2201.4 is amended: a. By revising paragraphs (c) introductory text, (c)(1), (3), (4), and (5); b. By.... Revising paragraphs (b)(1) and (b)(2) introductory text; b. Adding paragraph (b)(2)(v); and c. Revising...

  9. 76 FR 22939 - Sunshine Act Meeting

    Science.gov (United States)

    2011-04-25

    ... SECURITIES AND EXCHANGE COMMISSION Sunshine Act Meeting Notice is hereby given, pursuant to the provisions of the Government in the Sunshine Act, Public Law 94-409, that the Securities and Exchange... Swap,'' ``Security-Based Swap Agreement,'' the regulation of mixed swaps, and books and records...

  10. Radioactive Substances Regulations, 1959 under the Radioactive Substances Act 1957

    International Nuclear Information System (INIS)

    1983-01-01

    These Regulations as amended lay down maximum permissible concentrations and doses and prescribe radiation protection measures for personnel. They provide for the licensing procedures for radioactive materials and irradiating apparatus and the conditions to be complied with for their handling, packaging, transport and disposal. The Schedules to the Regulations contain tables of maximum permissible radionuclide concentrations, models of licence application forms and labels. (NEA) [fr

  11. Compliance Issues and Homeland Security with New Federal Regulations for Higher Education Institutions

    Science.gov (United States)

    Valcik, Nicolas A.

    2010-01-01

    Research advancements into different fields of study have increased the risks for accidents, criminal acts, or a potential breach of national security, and the types of hazardous materials (HAZMAT) stored and used at universities and colleges are under new scrutiny. Before, a chemistry laboratory might only have basic substances such as sulfur,…

  12. Report: Fiscal Year 2006 Federal Information Security Management Act Report Status of EPA’s Computer Security Program

    Science.gov (United States)

    Report #2006-S-00008, September 25, 2006. Although the Agency has made substantial progress to improve its security program, the OIG identified weaknesses in the Agency’s incident reporting practices.

  13. Report: Fiscal Year 2015 Federal Information Security Modernization Act Report: Status of CSB’s Information Security Program

    Science.gov (United States)

    Report #16-P-0086, January 27, 2016. The effectiveness of the CSB’s information security program is challenged by its lack of personal identity verification cards for logical access, complete system inventory.

  14. Operating nuclear power stations in a regulated cyber security environment: a roadmap for success

    Energy Technology Data Exchange (ETDEWEB)

    Dorman, E., E-mail: Erik.Dorman@areva.com [AREVA Inc., Cyber Security Solutions, Charlotte, NC (United States)

    2015-07-01

    The United States Nuclear Regulatory Commission (NRC) issued 10CFR73.54 to implement a regulated Cyber Security Program at each operating nuclear reactor facility. Milestones were implemented December 31, 2012 to mitigate the attack vectors for the most critical digital assets acknowledged by the industry and the NRC. The NRC inspections have begun. The nuclear Cyber Security Plan, implemented by the site Cyber Security Program (Program), is an element of the operating license at each facility. The Program is designed to protect critical digital assets (CDAs) by applying and maintaining defense-in depth protective strategies to ensure the capability to detect, respond to, and recover from cyber-attacks. The Program references NEI 08-09 R. 6, the Nuclear Energy Institute Template that provides guidance for applying Cyber Security controls derived from NIST 800-53/82 and slightly modified to fit the nuclear environment. Many mature processes are in place at nuclear facilities in response to numerous regulations implemented over the past 30 years. Many of these processes such as the Physical Security Program offer protections that are leveraged to protect the functions of critical digital assets from unauthorized physical access. Other processes and technology such as engineering design control, work management and pre-job briefs, control of portable media and mobile devices, and deterministically segregated networks protect critical digital assets. By leveraging the regulated nuclear environment, integrating NIST type Cyber Security controls, and prudently deploying technology the Cyber Security posture of operating nuclear facilities supports on-demand base load electricity 24/7 with capacity factors exceeding 85%. This paper is designed to provide a glimpse into Cyber Security Programs that support safe operation and reliability in the regulated nuclear environment while supporting the on-demand base load electricity production 24/7. (author)

  15. Operating nuclear power stations in a regulated cyber security environment: a roadmap for success

    International Nuclear Information System (INIS)

    Dorman, E.

    2015-01-01

    The United States Nuclear Regulatory Commission (NRC) issued 10CFR73.54 to implement a regulated Cyber Security Program at each operating nuclear reactor facility. Milestones were implemented December 31, 2012 to mitigate the attack vectors for the most critical digital assets acknowledged by the industry and the NRC. The NRC inspections have begun. The nuclear Cyber Security Plan, implemented by the site Cyber Security Program (Program), is an element of the operating license at each facility. The Program is designed to protect critical digital assets (CDAs) by applying and maintaining defense-in depth protective strategies to ensure the capability to detect, respond to, and recover from cyber-attacks. The Program references NEI 08-09 R. 6, the Nuclear Energy Institute Template that provides guidance for applying Cyber Security controls derived from NIST 800-53/82 and slightly modified to fit the nuclear environment. Many mature processes are in place at nuclear facilities in response to numerous regulations implemented over the past 30 years. Many of these processes such as the Physical Security Program offer protections that are leveraged to protect the functions of critical digital assets from unauthorized physical access. Other processes and technology such as engineering design control, work management and pre-job briefs, control of portable media and mobile devices, and deterministically segregated networks protect critical digital assets. By leveraging the regulated nuclear environment, integrating NIST type Cyber Security controls, and prudently deploying technology the Cyber Security posture of operating nuclear facilities supports on-demand base load electricity 24/7 with capacity factors exceeding 85%. This paper is designed to provide a glimpse into Cyber Security Programs that support safe operation and reliability in the regulated nuclear environment while supporting the on-demand base load electricity production 24/7. (author)

  16. Control and Regulation of Private Security Providers in Latin America and the Caribbean: A Comparative Analysis

    Directory of Open Access Journals (Sweden)

    Francesca Caonero

    2014-05-01

    Full Text Available States and different international players have drafted legal frameworks to adequately regulate the phenomenon of privatization of security. Among these initiatives is the Project for a Possible Convention on Private Military and Security Companies, prepared with guidance from the United Nations Human Rights Council. The objective of this proposed convention is to provide a universal framework to regulate these companies.The United Nations Regional Center for Peace, Disarmament and Development in Latin America and the Caribbean (UNLIREC has studied this Proposed Convention and contrasted it with existing national regulations. The objective of this study is to identify whether and how States already comply with some of the provisions contained in this proposal.Based on the study of national private security law, UNLIREC has contrasted it with the Convention Proposal identifying the different items in this document that are referred to in the different national regulations from various countries in Latin America and the Caribbean.As a result of this legal contrast, it can be observed that laws in some States in the region include significant legal aspects put forth in the Proposed Convention, such as licenses, registry and training. Other States go beyond that, stipulating specific regulations that can be noted. Others, on the contrary, lack any provisions regarding control and regulation of private security providers.DOI: http://dx.doi.org/10.5377/rpsp.v1i1.1392

  17. The radioactive waste regulation in the new Czech Nuclear Energy Act

    International Nuclear Information System (INIS)

    Kucerka, M.

    1995-01-01

    Recently, in the Czech Republic, there is in the phase of development the Act on Peaceful Use of Nuclear Energy and Ionizing Radiation, so called the Nuclear Energy Act. This Act has to replace existing regulations and fulfill some not yet covered fields of that area. The act is developed as so called ''umbrella act'' and has to cover all aspects of the nuclear energy and ionizing radiation use, from uranium mining or isotopes use in medicine, to the power generation in nuclear power plants. It will include among others also provisions on registration and licensing, liability for nuclear damage, decommissioning and radioactive waste management funding, and some other topics, that were missing in the regulations up to today. The paper describes recent state policy in the field of radioactive waste management and the main provisions of proposed Nuclear Energy Act, concerning the radioactive waste management

  18. 75 FR 79947 - Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security/ALL-031...

    Science.gov (United States)

    2010-12-21

    ... contains regulatory documents #0;having general applicability and legal effect, most of which are keyed #0... particularly to any potential plans to collect cybersecurity information from private entities regarding cyber... security threats and would not include the Bank Secrecy Act (BSA) related SARs filed with FinCEN. The ISE...

  19. 75 FR 38824 - Privacy Act of 1974; Department of Homeland Security/ALL-029 Civil Rights and Civil Liberties...

    Science.gov (United States)

    2010-07-06

    ... civil rights, civil liberties, such as profiling on the basis of race, ethnicity, or religion, by.../ religion (CRCL does not solicit this information, it is tracked if individuals provide it); Allegation... Officer and Chief Freedom of Information Act Officer, Department of Homeland Security, 245 Murray Drive...

  20. 76 FR 53921 - Privacy Act of 1974; Department of Homeland Security ALL-034 Emergency Care Medical Records...

    Science.gov (United States)

    2011-08-30

    ... AGENCY: Privacy Office, DHS. ACTION: Notice of Privacy Act system of records. SUMMARY: In accordance with... Security Office of Health Affairs to collect and maintain records on individuals who receive emergency care... consistent, quality medical care. To support MQM, OHA operates the electronic Patient Care Record (ePCR), an...

  1. 75 FR 39184 - Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security/ALL-029 Civil...

    Science.gov (United States)

    2010-07-08

    ... questions and privacy issues please contact: Mary Ellen Callahan (703-235-0780), Chief Privacy Officer... Secretary 6 CFR Part 5 [Docket No. DHS-2010-0034] Privacy Act of 1974: Implementation of Exemptions...: Privacy Office, DHS. ACTION: Notice of proposed rulemaking. SUMMARY: The Department of Homeland Security...

  2. Brightening up: the effect of the Physician Payment Sunshine Act on existing regulation of pharmaceutical marketing.

    Science.gov (United States)

    Gorlach, Igor; Pham-Kanter, Genevieve

    2013-01-01

    With the passage of the Physician Payment Sunshine Act as part of the federal health care reform law, pharmaceutical manufacturers are now required to disclose a wide range of payments made by manufacturers to physicians. We review current state regulation of pharmaceutical marketing and consider how the federal sunshine provision will affect existing marketing regulation. We analyze the legal and practical implications of the Physician Payment Sunshine Act. © 2013 American Society of Law, Medicine & Ethics, Inc.

  3. 10 CFR 780.8 - Security.

    Science.gov (United States)

    2010-01-01

    ... 10 Energy 4 2010-01-01 2010-01-01 false Security. 780.8 Section 780.8 Energy DEPARTMENT OF ENERGY PATENT COMPENSATION BOARD REGULATIONS General Provisions § 780.8 Security. In any proceeding under this... the Act to assure compliance with Department security regulations and the common defense. ...

  4. 77 FR 42673 - Freedom of Information Act Regulations

    Science.gov (United States)

    2012-07-20

    .... 552). In issuing this regulation, CIGIE adhered to the regulatory philosophy and the applicable... research (if the request is from an educational institution) or scientific research (if the request is from... operating one or more programs of scholarly research. (2) The term ``non-commercial scientific institution...

  5. Mining Act 1968-1983 with regulations and an index (compiled to 1 January, 1984)

    Energy Technology Data Exchange (ETDEWEB)

    1984-01-01

    This consolidation of the Queensland Mining Act covers the Mining Act 1968 - 1983, Mining Act Amendment Act 1971 (No.2) No.82: Mining Act Amendment Act 1980, No.13: Mining Acts Amendment Act of 1929, 20 Geo. 5 of No.35: Regulations. The Act is arranged in 13 parts. Part I. Preliminary; II. Meaning of Terms; III. Mining districts and mining fields; IV. Authorities conferring rights to mine and prospect - Division I. Miner's right; IA. Mining claim; II. Authority to prospect; III. Mining Lease; IV. Compensation for damage caused by mining on Crown land; V. Caveats: Part V. Mining on reserves, residence areas and business areas; Part VI. Constructions and carriage through, over, or under alien land; VII. Sludge abatement; VIII. Royalties; IX. Administration - Division I. Appointment of officers; II. Wardens courts; III. Special powers of wardens and wardens courts; IV. Appeals from wardens courts: Part X. General Provisions; XI. Regulations; XII. Mining on private land; XIII. Rights independent of this Act preserved: Schedule.

  6. 10 years beyond the Health Security Act failure: subsequent developments and persistent problems.

    Science.gov (United States)

    Budetti, Peter P

    2004-10-27

    Ten years after the failure of President Clinton's Health Security Act (HSA), the United States continues to face multiple stresses in health care, including large numbers of uninsured individuals, increasing costs, questions about quality, and dissatisfaction with managed care. Using the framework of the HSA-particularly universal coverage, spending and managed competition, insurance for low-income persons, and patients' rights-the post-HSA evolution and current status of the US health care system is traced and lessons to guide future actions are outlined. Neither incremental legislation nor private sector changes in health care organization and financing during the past decade have ameliorated the problems addressed by the HSA, and new troubles have emerged. These problems affect every group in the country and continue to deteriorate health care, yet there has been no political support for large-scale reform. The core components of a vision for future action-universal coverage, quality improvement, cost containment, and subsidies for the economically vulnerable-are essential. There is a pressing need to construct a clear vision that would tie together incremental steps into a rational approach to comprehensive reform and to actually move toward the realization of that vision.

  7. The missing millions: organized labor, business, and the defeat of Clinton's Health Security Act.

    Science.gov (United States)

    Gottschalk, M

    1999-06-01

    During the battle over comprehensive health care reform in the early 1990s, organized labor was not only unable to put together a winning coalition but also found itself divided and on the defensive as it struggled to prevent any further erosion of the private-sector safety net of the U.S. welfare state. Labor's relative ineffectiveness has deep institutional and political roots and was not merely a consequence of its dwindling membership base. Several key institutions of the private welfare state, notably the Taft-Hartley health and welfare funds and the Employment Retirement Income Security Act (ERISA) preemption, brought the interests of organized labor more closely in line with those of large employers and commercial insurers and aggravated divisions within organized labor and between unions and public interest groups. In addition, several political factors conspired to reinforce labor's tendency to stick to a policy path on health care issues that was predicated on an employer-mandate solution and that had been charted primarily by business and leading Democrats. As a result, organized labor did not emerge from the 1993-1994 struggle with its political base fortified nor with a viable long-term political strategy to achieve universal health care and to shift the political debate over health policy in a more desirable direction.

  8. Hospital employee assault rates before and after enactment of the california hospital safety and security act.

    Science.gov (United States)

    Casteel, Carri; Peek-Asa, Corinne; Nocera, Maryalice; Smith, Jamie B; Blando, James; Goldmacher, Suzi; O'Hagan, Emily; Valiante, David; Harrison, Robert

    2009-02-01

    This study examines changes in violent event rates to hospital employees before and after enactment of the California Hospital Safety and Security Act in 1995. We compared pre- and post-initiative employee assault rates in California (n = 116) emergency departments and psychiatric units with those in New Jersey (n = 50), where statewide workplace violence initiatives do not exist. Poisson regression with generalized estimating equations was used to compare assault rates between a 3-year pre-enactment period (1993-1995) and a 6-year post-enactment period (1996-2001) using New Jersey hospitals as a temporal control. Assault rates among emergency department employees decreased 48% in California post-enactment, compared with emergency department employee assault rates in New Jersey (rate ratio [RR] = 0.52, 95% confidence interval [CI]: 0.31, 0.90). Emergency department employee assault rates decreased in smaller facilities (RR = 0.46, 95% CI: 0.21, 0.96) and for-profit-controlled hospitals (RR = 0.39, 95% CI: 0.19, 0.79) post-enactment. Among psychiatric units, for-profit-controlled hospitals (RR = 0.41, 95% CI: 0.19, 0.85) and hospitals located in smaller communities (RR = 0.44, 95% CI: 0.21, 0.92) experienced decreased assault rates post-enactment. Policy may be an effective method to increase safety to health care workers.

  9. 40 CFR 261.8 - PCB wastes regulated under Toxic Substance Control Act.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 25 2010-07-01 2010-07-01 false PCB wastes regulated under Toxic... (CONTINUED) SOLID WASTES (CONTINUED) IDENTIFICATION AND LISTING OF HAZARDOUS WASTE General § 261.8 PCB wastes regulated under Toxic Substance Control Act. The disposal of PCB-containing dielectric fluid and electric...

  10. 78 FR 55274 - Privacy Act of 1974; Department of Homeland Security/Transportation Security Administration-DHS...

    Science.gov (United States)

    2013-09-10

    ... enforcement, immigration, and intelligence databases, including a fingerprint-based criminal history records... boarding pass printing instruction. If the passenger's identifying information matches the entry on the TSA... enforcement, immigration, intelligence, or other homeland security functions. In addition, TSA may share...

  11. 12 CFR 250.408 - Short-term negotiable notes of banks not securities under section 32, Banking Act of 1933.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 3 2010-01-01 2010-01-01 false Short-term negotiable notes of banks not securities under section 32, Banking Act of 1933. 250.408 Section 250.408 Banks and Banking FEDERAL RESERVE... securities under section 32, Banking Act of 1933. (a) The Board of Governors has been asked whether short...

  12. Understanding Title V of the Social Security Act: A Guide to the Provisions of the Federal Maternal and Child Health Block Grant.

    Science.gov (United States)

    Health Resources and Services Administration (DHHS/PHS), Washington, DC. Maternal and Child Health Bureau.

    The Maternal and Child Health (MCH) Services Block Grant (Title V of the Social Security Act) has operated as a federal-state partnership since the Social Security Act was passed in 1935. Through Title V, the federal government pledged its support of state efforts to extend health and welfare services for mothers and children. Title V has been…

  13. Federal Act on Protection against Nuisances (BImSchG) and supplementing regulations. 11. ed.

    International Nuclear Information System (INIS)

    Hansmann, K.

    1993-01-01

    This handy booklet contains the BImSchG and related implementing regulations as well as the Technical Codes Clean Air and Noise Abatement. The contribution on the BImSchG explains the origin of the Act, the scope of application, its concept and principles. The contents of the Act is portrayed by emphasizing subject-related connections. Dealt with are also regulations for installations requiring licensing, the measurement of airborne pollution, stipulations concerning the area of installations and transport, as well as the regulation concerning the monitoring of airborne pollution in the Federal Republic of Germany. (orig.) [de

  14. Federal Act on Protection against Nuisances (BImSchG) and supplementing regulations. 9. ed.

    International Nuclear Information System (INIS)

    Hansmann, K.

    1992-01-01

    This handy booklet contains the BImSchG and related implementing regulations as well as the Technical Codes Clean Air and Noise Abatement. The contribution on the BImSchG explains the origin of the Act, the scope of application, its concept and principles. The contents of the Act is portrayed by emphasizing subject-related connections. Dealt with are also regulations for installations requiring licensing, the measurement of airborne pollution, stipulations concerning the area of installations and transport, as well as the regulation concerning the monitoring of airborne pollution in the Federal Republic of Germany. (orig.) [de

  15. 76 FR 10898 - Public Safety and Homeland Security Bureau; Federal Advisory Committee Act; Emergency Response...

    Science.gov (United States)

    2011-02-28

    ... FEDERAL COMMUNICATIONS COMMISSION Public Safety and Homeland Security Bureau; Federal Advisory..., Public Safety and Homeland Security Bureau, Federal Communications Commission, 445 12th Street, SW., Room..., Public Safety and Homeland Security Bureau. [FR Doc. 2011-4398 Filed 2-25-11; 8:45 am] BILLING CODE 6712...

  16. 76 FR 60067 - Privacy Act of 1974; Department of Homeland Security Federal Emergency Management Agency-012...

    Science.gov (United States)

    2011-09-28

    ... 1974; Department of Homeland Security Federal Emergency Management Agency--012 Suspicious Activity... establish a new system of records titled, ``Department of Homeland Security/Federal Emergency Management... Department of Homeland Security/Federal Emergency Management Agency to collect, maintain, and retrieve...

  17. 78 FR 31955 - Privacy Act of 1974; Department of Homeland Security National Protection and Programs Directorate...

    Science.gov (United States)

    2013-05-28

    ... 1974; Department of Homeland Security National Protection and Programs Directorate--001 Arrival and... of records titled Department of Homeland Security/National Protection and Programs Directorate--001... of 1974, 5 U.S.C. 552a, the Department of Homeland Security (DHS) National Protection and Programs...

  18. Children's perceptions of emotion regulation strategy effectiveness: links with attachment security.

    Science.gov (United States)

    Waters, Sara F; Thompson, Ross A

    2016-08-01

    Six- and nine-year-old children (N = 97) heard illustrated stories evoking anger in a story character and provided evaluations of the effectiveness of eight anger regulation strategies. Half the stories involved the child's mother as social partner and the other half involved a peer. Attachment security was assessed via the Security Scale. Children reported greater effectiveness for seeking support from adults and peers in the peer context than the mother context, but perceived venting as more effective with mothers. Children with higher security scores were more likely to endorse problem solving and less likely to endorse aggression in both social contexts than those with lower security scores. Early evidence for gender differences was found in that boys endorsed the effectiveness of distraction while girls endorsed venting their emotion.

  19. Shale Gas, the Environment and Energy Security : A New Framework For Energy Regulation

    NARCIS (Netherlands)

    Fleming, Ruven

    2017-01-01

    `This pioneering and in-depth study into the regulation of shale gas extraction examines how changes in the constitutional set-ups of EU Member States over the last 25 years have substantially altered the legal leverage of environmental protection and energy security as state objectives. As well as

  20. 75 FR 16370 - Regulated Navigation Areas, Safety Zones, Security Zones; Deepwater Ports in Boston Captain of...

    Science.gov (United States)

    2010-04-01

    ... rule under Executive Order 13045, Protection of Children from Environmental Health Risks and Safety Risks. This rule is not an economically significant rule and would not create an environmental risk to...] RIN 1625-AA00, RIN 1625-AA11 Regulated Navigation Areas, Safety Zones, Security Zones; Deepwater Ports...

  1. Social Information Processing, Security of Attachment, and Emotion Regulation in Children with Learning Disabilities

    Science.gov (United States)

    Bauminger, Nirit; Kimhi-Kind, Ilanit

    2008-01-01

    This study examined the contribution of attachment security and emotion regulation (ER) to the explanation of social information processing (SIP) in middle childhood boys with learning disabilities (LD) and without LD matched on age and grade level. Children analyzed four social vignettes using Dodge's SIP model and completed the Kerns security…

  2. Child Self-Regulation, Parental Secure Base Scripts, and At-Risk Kindergartners' Academic Achievement

    Science.gov (United States)

    McLear, Caitlin; Trentacosta, Christopher J.; Smith-Darden, Joanne

    2016-01-01

    Research Findings: Early reading and mathematics skills predict later academic success, and child self-regulation and secure parent-child relationships are both predictors of early academic skills. Self-regulatory and family relationship factors have rarely been studied together as predictors of early academic success in populations of young…

  3. 76 FR 70638 - Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security/U.S...

    Science.gov (United States)

    2011-11-15

    ... Disclosures) because release of the accounting of disclosures could alert the subject of an investigation of... efforts to preserve national security. Disclosure of the accounting would also permit the individual who... of Federal Regulations, as follows: PART 5--DISCLOSURE OF RECORDS AND INFORMATION 0 1. The authority...

  4. 33 CFR 165.1313 - Security zone regulations, tank ship protection, Puget Sound and adjacent waters, Washington

    Science.gov (United States)

    2010-07-01

    ... Areas Thirteenth Coast Guard District § 165.1313 Security zone regulations, tank ship protection, Puget... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false Security zone regulations, tank ship protection, Puget Sound and adjacent waters, Washington 165.1313 Section 165.1313 Navigation and...

  5. A Regulation-Based Security Evaluation Method for Data Link in Wireless Sensor Network

    Directory of Open Access Journals (Sweden)

    Claudio S. Malavenda

    2014-01-01

    Full Text Available This article presents a novel approach to the analysis of wireless sensor networks (WSN security, based on the regulations intended for wireless communication devices. Starting from the analysis and classification of attacks, countermeasures, and available protocols, we present the current state on secure communication stacks for embedded systems. The regulation analysis is based on civil EN 50150 and MIL STD-188-220, both applicable to WSN communications. Afterwards, starting from a list of known WSN attacks, we use a correspondence table to match WSN attacks with countermeasures required by regulations. This approach allows us to produce a precise security evaluation and classification methodology for WSN protocols. The results show that current protocols do not present a complete coverage of security issues. While this conclusion is already known for many WSN protocols, to the best of our knowledge this is the first time a complete methodology is proposed to base this assertion. Moreover, by using the proposed methodology, we are able to precisely identify the exposed threats for each WSN protocol under analysis.

  6. Types of adaptation of the system of enterprise economic security to the impact of subjects of tax regulation

    Directory of Open Access Journals (Sweden)

    Pohorelov Yurii S.

    2014-01-01

    Full Text Available The article offers the authors’ approach to identification of types of adaptation of the system of enterprise economic security to negative influence of subjects of tax regulation. It determines composition of these subjects and, separately, regulation subjects that form fundamental grounds of the tax sphere and subjects of effective influence, which directly interact with entrepreneurial structures and realise tax regulation of their activity in practice. As regards direct adaptation of the system of enterprise economic security, the article offers to mark out its individual types with respect to the set goal, essence of changes in the system of economic security, degree of its manageability and nature of accumulated changes. Moreover, the article offers a list of catalysts and inhibitors of adaptation of the system of enterprise economic security to impact of subjects of tax regulation. It also marks out adaptation parameters of the system of enterprise economic security to the impact of subjects of tax regulation and provides their gradations.

  7. 78 FR 47215 - Petition to Amend Animal Welfare Act Regulations To Prohibit Public Contact With Big Cats, Bears...

    Science.gov (United States)

    2013-08-05

    ... No. APHIS-2012-0107] Petition to Amend Animal Welfare Act Regulations To Prohibit Public Contact With... Inspection Service has received a petition requesting amendments to the Animal Welfare Act regulations and...: Background The Animal Welfare Act (AWA, 7 U.S.C. 2131 et seq.) authorizes the Secretary of Agriculture to...

  8. 'Acting like chameleons’: on the McDonaldization of private security

    NARCIS (Netherlands)

    van Steden, R.; de Waard, J.

    2013-01-01

    Private security is a fragmented industry with tens of thousands of small- and medium-sized suppliers worldwide. However, with the arrival in the market of multinational brands such as Group 4 Securicor and Securitas, we are witnessing a McDonaldization of security commodities. This development

  9. 75 FR 23274 - Privacy Act of 1974; Department of Homeland Security United States Immigration Customs and...

    Science.gov (United States)

    2010-05-03

    ... 1974; Department of Homeland Security United States Immigration Customs and Enforcement--011 Immigration and Enforcement Operational Records System of Records AGENCY: Privacy Office, DHS. ACTION: Notice... the Department of Homeland Security U.S. Immigration and Customs Enforcement is updating an existing...

  10. 75 FR 9238 - Privacy Act of 1974; Department of Homeland Security United States Immigration Customs and...

    Science.gov (United States)

    2010-03-01

    ... 1974; Department of Homeland Security United States Immigration Customs and Enforcement--011 Immigration and Enforcement Operational Records System of Records AGENCY: Privacy Office, DHS. ACTION: Notice... the Department of Homeland Security U.S. Immigration and Customs Enforcement is updating an existing...

  11. 76 FR 34616 - Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security/National...

    Science.gov (United States)

    2011-06-14

    ... business practices. Information will be submitted to DHS/NPPD through the Chemical Security Assessment Tool... programs. DHS/ TSA/TTAC will compare the information of affected individuals collected by DHS (via CSAT) to... security, law enforcement, immigration, intelligence, or other functions consistent with the routine uses...

  12. State regulation as a tool for improving the economic security of the regions

    Directory of Open Access Journals (Sweden)

    Yu. M. Sokolinskaya

    2017-01-01

    Full Text Available Providing economic security for the development of regions, increasing their competitiveness, risk-free and sustainable activities are the main tasks of the regional program of social and economic development, which occupies a special place in the system of instruments for public management of these processes. The program of social and economic development is a unique strategy of the region aimed at security and optimization of the spatial structure and relations between the center and the regions in order to ensure economic security and growth by maximizing the effective use of existing internal and external factors. The institutional influence of the state in order to improve the economic security of regions and enterprises occurs palliatively when the business of the region is supported in direct – subsidies, and more often indirectly – compliance with the laws and regulations of the Russian Federation and the region, on the principles of institutional and market synergies. Adaptation of enterprises in the region to the market is difficult, when specific socio-organizational, economic, technical and technological, scientific, information activities in their interrelations function in the field of Russian laws. The search for ways to improve the economic security of the Russian Federation, regions and enterprises takes place in the context of global integration through the improvement of the mechanism of state regulation. An important task of the current stage of economic security of the country and regions is the construction of a system of its institutional organization that would be able to balance the levers of government with the opportunities of private enterprises, provide a quality level of providing the business with protection from terrorism, predation, financial risks, legal competition etc.

  13. A new Brazilian regulation for the security of nuclear material and nuclear facilities

    International Nuclear Information System (INIS)

    Tavares, Renato L.A.; Filho, Josélio S.M.; Torres, Luiz F.B.; Lima, Alexandre R.; Lima, Fabiano P.C.

    2017-01-01

    The present paper aims to outline the challenges related to the elaboration and concepts involved in a regulatory transition from a purely prescriptive approach to a combined approach that mixes performance-based concepts and evaluation metrics based on statistical data of equipment and personnel. This methodology might represent an improvement compared to a purely prescriptive approach, in which the regulatory authority defines the measures to be taken by operators of nuclear facilities to prevent theft, sabotage events, and mitigate their consequences. The prescriptive approach, despite having the advantages of clarity in the definition of requirements, simplicity in regulatory terms (inspections to verify compliance), and homogeneity in relation to various facilities, does not allow a clear and effective performance measurement, may provide insufficient or excessive security measures (with excessive expenditure of material and human resources), and the possibility of providing a false sense of security. It is known that, in many countries, the state-sponsored nuclear security regime mixes elements of the two mentioned approaches, prescriptive and based on performance, which is not Brazilian practice nowadays. Such methodological developments happened globally due to the increase of threat level for nuclear facilities and materials. The currently regulation in force is CNEN-NE 2.01, which provides a set of measures intended to implement Physical Protection Systems in Nuclear, Radiological Facilities as well as Transport Operations, and all documents related to security of such issues. The new regulation, named CNEN-NN 2.01, will focus only on Nuclear Material and Facilities (two other regulations specific for Security of Radioactive Sources and Transport Operations are under elaboration process). CNEN NN 2.01 is intended to provide further adherence to new international recommendations, e.g, IAEA INFCIRC 225 Rev.5 (NSS 13), which is currently regarded as the

  14. A new Brazilian regulation for the security of nuclear material and nuclear facilities

    Energy Technology Data Exchange (ETDEWEB)

    Tavares, Renato L.A.; Filho, Josélio S.M.; Torres, Luiz F.B.; Lima, Alexandre R., E-mail: renato.tavares@cnen.gov.br, E-mail: joselio@cnen.gov.br, E-mail: ltorres@cnen.gov.br, E-mail: alexandre.lima@cnen.gov.br [Comissao Nacional de Energia Nuclear (CNEN), Rio de Janeiro, RJ (Brazil). Diretoria de Radioproteção e Segurança Nuclear; Lima, Fabiano P.C., E-mail: fabianopetruceli@outlook.com [Presidência da República, Brasilia, DF (Brazil). Gabinete de Segurança Institucional

    2017-07-01

    The present paper aims to outline the challenges related to the elaboration and concepts involved in a regulatory transition from a purely prescriptive approach to a combined approach that mixes performance-based concepts and evaluation metrics based on statistical data of equipment and personnel. This methodology might represent an improvement compared to a purely prescriptive approach, in which the regulatory authority defines the measures to be taken by operators of nuclear facilities to prevent theft, sabotage events, and mitigate their consequences. The prescriptive approach, despite having the advantages of clarity in the definition of requirements, simplicity in regulatory terms (inspections to verify compliance), and homogeneity in relation to various facilities, does not allow a clear and effective performance measurement, may provide insufficient or excessive security measures (with excessive expenditure of material and human resources), and the possibility of providing a false sense of security. It is known that, in many countries, the state-sponsored nuclear security regime mixes elements of the two mentioned approaches, prescriptive and based on performance, which is not Brazilian practice nowadays. Such methodological developments happened globally due to the increase of threat level for nuclear facilities and materials. The currently regulation in force is CNEN-NE 2.01, which provides a set of measures intended to implement Physical Protection Systems in Nuclear, Radiological Facilities as well as Transport Operations, and all documents related to security of such issues. The new regulation, named CNEN-NN 2.01, will focus only on Nuclear Material and Facilities (two other regulations specific for Security of Radioactive Sources and Transport Operations are under elaboration process). CNEN NN 2.01 is intended to provide further adherence to new international recommendations, e.g, IAEA INFCIRC 225 Rev.5 (NSS 13), which is currently regarded as the

  15. The International Traffic in Arms Regulations: An Impediment to National Security

    Science.gov (United States)

    2008-05-02

    00-00-2007 to 00-00-2008 4. TITLE AND SUBTITLE The International Traffic in Arms Regulations: An Impediment to National Security 5a . CONTRACT...2008 2. REPORT TYPE Program Research Paper 3. DATES COVERED (From - To) 4. TITLE AND SUBTITLE 5a . CONTRACT NUMBER The International Traffic in Arms...certain level of ITAR problems, such as on Koreasat 5 with its dual civil and military uses, U.S. companies will often choose not to expend the bid and

  16. Security of pipeline facilities

    Energy Technology Data Exchange (ETDEWEB)

    Lee, S.C. [Alberta Energy and Utilities Board, Calgary, AB (Canada); Van Egmond, C.; Duquette, L. [National Energy Board, Calgary, AB (Canada); Revie, W. [Canada Centre for Mineral and Energy Technology, Ottawa, ON (Canada)

    2005-07-01

    This working group provided an update on provincial, federal and industry directions regarding the security of pipeline facilities. The decision to include security issues in the NEB Act was discussed as well as the Pipeline Security Management Assessment Project, which was created to establish a better understanding of existing security management programs as well as to assist the NEB in the development and implementation of security management regulations and initiatives. Amendments to the NEB were also discussed. Areas of pipeline security management assessment include physical safety management; cyber and information security management; and personnel security. Security management regulations were discussed, as well as implementation policies. Details of the Enbridge Liquids Pipelines Security Plan were examined. It was noted that the plan incorporates flexibility for operations and is integrated with Emergency Response and Crisis Management. Asset characterization and vulnerability assessments were discussed, as well as security and terrorist threats. It was noted that corporate security threat assessment and auditing are based on threat information from the United States intelligence community. It was concluded that the oil and gas industry is a leader in security in North America. The Trans Alaska Pipeline Incident was discussed as a reminder of how costly accidents can be. Issues of concern for the future included geographic and climate issues. It was concluded that limited resources are an ongoing concern, and that the regulatory environment is becoming increasingly prescriptive. Other concerns included the threat of not taking international terrorism seriously, and open media reporting of vulnerability of critical assets, including maps. tabs., figs.

  17. Depository Accounting of Securities in the Ukrainian Stock Market Regulation System

    Directory of Open Access Journals (Sweden)

    Veriha Hanna V.

    2016-02-01

    Full Text Available The aim of the article is to study the procedures, technologies, prudential regulation of depository accounting of securities in the system of the Ukrainian stock market infrastructure and identify directions of its improvement. The article analyzes the dynamics of the number of licenses issued by types of professional activity in the stock market. The necessity for further improvement of mechanisms of the updated system of depository accounting of securities in Ukraine has been proved. There have been developed the following recommendations: to improve the unified rules of accounting and regulation support of the system of risk management of depository activity; develop tools for prudential regulation of depository activity and strengthen the control over fulfillment of prudential standards by the Central Depository and depository institutions; create the necessary conditions for the practical implementation of legal norms concerning establishment of clearing institutions and increase in the level of competition between depositaries; expand the correspondent relations of the Central Depository in relation to the establishment of international depositary relations for the liberalization of the international movement of securities; use segregated accounts providing the possibility of storage of client funds separately from the funds of the transfer bank to protect the capital of the issuer and investor from risks of any force majeure situations; mediate the movement of funds at implementing dividend payments through participants of the accounting system: issuer-the Central Depository-depository institution-depositor.

  18. 75 FR 40754 - Government in the Sunshine Act Regulations of the National Science Board

    Science.gov (United States)

    2010-07-14

    ... NATIONAL SCIENCE FOUNDATION 45 CFR Part 614 RIN 3145-AA53 Government in the Sunshine Act Regulations of the National Science Board AGENCY: National Science Board (NSB), National Science Foundation (NSF). ACTION: Direct final rule. SUMMARY: The National Science Board (NSB) National Science Foundation...

  19. 76 FR 20569 - Horse Protection Act; Petition for Amendments to Regulations

    Science.gov (United States)

    2011-04-13

    ... of Cruelty to Animals, the American Horse Protection Association, Inc., Friends of Sound Horses, Inc... DEPARTMENT OF AGRICULTURE Animal and Plant Health Inspection Service 9 CFR Part 11 [Docket No. APHIS-2011-0006] Horse Protection Act; Petition for Amendments to Regulations AGENCY: Animal and Plant...

  20. 76 FR 78483 - S.A.F.E. Mortgage Licensing Act (Regulations G & H)

    Science.gov (United States)

    2011-12-19

    ... BUREAU OF CONSUMER FINANCIAL PROTECTION 12 CFR Part 1007 and 1008 [Docket No. CFPB-2011-0023] RIN 3170-AA06 S.A.F.E. Mortgage Licensing Act (Regulations G & H) AGENCY: Bureau of Consumer Financial... number of consumer financial protection laws from seven Federal agencies to the Bureau of Consumer...

  1. 76 FR 82117 - Regulations Implementing the Longshore and Harbor Workers' Compensation Act: Recreational Vessels

    Science.gov (United States)

    2011-12-30

    ... activity, and whether it falls within the Coast Guard definition of a non- recreational vessel less than 20... recreational vessel work, the employee will be eligible for benefits based on the covered work. The last... Regulations Implementing the Longshore and Harbor Workers' Compensation Act: Recreational Vessels AGENCY...

  2. Energy Security Requires Diversity: An Argument for The Defense Production Act Title III Biofuel Initiative

    Science.gov (United States)

    2013-06-19

    Media, Integrated Marketing Communications at Northwestern University, http://oilchangeproject.nationalsecurityzone.org/choke-points/chokepoints-map-2...23 Source: The National Security Reporting Project, Medill School of Journalism, Media, Integrated Marketing Communications at Northwestern

  3. 76 FR 41274 - Privacy Act of 1974; Department of Homeland Security/ALL-033 Reasonable Accommodations Records...

    Science.gov (United States)

    2011-07-13

    ..., telecommuting, or reassignment to a vacant position; and/or (3) acquisition or modification of equipment or... the control of an agency for which information is retrieved by the name of an individual or by some... possession or under the control of DHS by complying with DHS Privacy Act regulations, 6 CFR Part 5. The...

  4. The relation of attachment security status to effortful self-regulation: A meta-analysis.

    Science.gov (United States)

    Pallini, Susanna; Chirumbolo, Antonio; Morelli, Mara; Baiocco, Roberto; Laghi, Fiorenzo; Eisenberg, Nancy

    2018-05-01

    Secure attachment relationships have been described as having a regulatory function in regard to children's emotions, social cognition, and behavior. Although some theorists and researchers have argued that attachment affects children's self-regulation, most attachment theorists have not strongly emphasized this association. The goal of the current meta-analysis was to determine the magnitude of the relation between attachment security status and effortful control (EC)/top-down self-regulation in children up to 18 years of age. One hundred six papers met the inclusion criteria and 101 independent samples were used in analyses. When secure attachment status was compared with insecure attachment status, a significant relation (effect size [ES]) with EC favoring children with a secure attachment was found (100 studies; 20,350 participants; r = .20). A stronger relation was found when the same coder evaluated attachment than when the coder was different and when the measure of attachment was continuous; other moderators were not significant. Securely attached children were higher in EC than their avoidant (r = .10) or resistant (r = .17) counterparts. Children with organized attachments were higher in EC than those with disorganized attachments (r = .17), although this finding could be due to publication bias. For some comparisons of subgroups (B vs. A, B vs. C, and/or D vs. all others), moderation was found by source of information (higher ES for same reporter), age at assessment of EC and/or attachment (higher ES at older ages), method of attachment (lower ES for observational measures), time difference between assessments or research design (higher ESs for smaller time differences and concurrent findings), and published versus unpublished studies (higher ES for unpublished studies for A vs. B). (PsycINFO Database Record (c) 2018 APA, all rights reserved).

  5. Measuring Stability and Security in Iraq: Report to Congress in Accordance with the Department of Defense Appropriations Act 2007 (Section 9010, Public Law 109-289)

    National Research Council Canada - National Science Library

    2006-01-01

    This report to Congress includes specific performance indicators and measures of progress toward political, economic, and security stability in Iraq, as directed in Section 9010, DoD Defense Appropriations Act 2007...

  6. 76 FR 9034 - Privacy Act of 1974; Department of Homeland Security United States Citizenship and Immigration...

    Science.gov (United States)

    2011-02-16

    ... Immigrant Responsibility Act of 1996 (IIRIRA), Public Law (Pub. L.) 104-208, September 30, 1996. The E... Immigration Reform and Immigrant Responsibility Act of 1996 (IIRIRA), Public Law 104-208, dated September 30... system: Storage: Records in this system are stored electronically, on magnetic disc, tape, digital media...

  7. Deciphering the Sunshine Act: Transparency Regulation and Financial Conflicts in Health Care.

    Science.gov (United States)

    Saver, Richard S

    2017-11-01

    The Physician Payments Sunshine Act ("Sunshine Act"), enacted to address financial conflicts in health care, is the first comprehensive federal legislation mandating public reporting of payments between drug companies, device manufacturers, and medicine. This article analyzes the Sunshine Act's uneven record, exploring how the law serves as an intriguing example of the uncertain case for transparency regulation in health care. The Sunshine Act's bumpy rollout demonstrates that commanding transparency through legislation can be arduous because of considerable implementation challenges. Capturing all the relevant information about financial relationships and reporting it with sufficient contextual and comparative data has proven disappointingly difficult. In addition, the law suffers from uncertainty and poor design as to the intended audience. Indeed, there is strong reason to believe that it will not significantly impact decision-making of primary recipients like patients. Yet the Sunshine Act nonetheless retains important and perhaps underappreciated value. From the almost four years of information generated, we have learned that industry-medicine financial ties vary significantly by physician specialty, and somewhat by physician gender. In many medical fields the distribution of top dollar payments tends to be heavily skewed to a few recipients, all of which have important implications for optimal management of financial conflicts and for health policy more generally. Accordingly, the Sunshine Act's greatest potential is not guiding decisions of individual patients or physicians, but its downstream effects. This Article traces how secondary audiences, such as regulators, watchdogs, and counsel are already starting to make productive use of Sunshine Act information. Public reporting has, for example, made more feasible linking industry payment information with Medicare reimbursement data. As a result, policymakers can more closely examine correlations between

  8. 76 FR 26549 - Removal of Certain References to Credit Ratings Under the Securities Exchange Act of 1934

    Science.gov (United States)

    2011-05-06

    ... related security'' and ``small business related security,'' respectively, as the Commission considers how... terms ``mortgage related security'' and ``small business related security,'' respectively, as the...),\\9\\ which defines the term ``small business related security.'' In place of the credit rating...

  9. 28 CFR 700.24 - Security of systems of records.

    Science.gov (United States)

    2010-07-01

    ... 28 Judicial Administration 2 2010-07-01 2010-07-01 false Security of systems of records. 700.24... Records Under the Privacy Act of 1974 § 700.24 Security of systems of records. (a) The Office Administrator or Security Officer shall be responsible for issuing regulations governing the security of systems...

  10. A study on how to divide and recodify the atomic energy act and its related regulations

    Energy Technology Data Exchange (ETDEWEB)

    Lee, Kyung Hui; Chung, Sang Ki; Lee, Sang Soo [Hannam Univ., Taejon (Korea, Republic of); Myung, Jae Jin [Chungnam National Univ., Taejon (Korea, Republic of)

    2003-02-15

    As a part of big project named 'streamlining and optimization of nuclear safety regulatory system', this report focuses on how to divide and recodify the Atomic Energy Act and its related regulations. Follow the first chapter of preface, the second chapter shows the systemic problems of regulation of current AEA and out strategy to reform and re-systematize it. This report concludes that the regulations of the current AEA need to be divided in three parts, i.e. the presidential regulations of FWAAE, NNA and RPA and the ministerial regulation of AEA in two part, i.e. that of NNA and RPA. Then the problems of current regulations of AEA are pointed out and the alternative regulations of FWAAE and NNA are persented in the third and forth chapter respectively. In the fifth chapter RPA is persented. And finally the legal character of several nuclear safety standards is estimated. Concerning nuclear safety or technology standards, those issued by Minister of Science and Technology (MST) empowered by law or its regulation is obviously forceful as a law. But the standards made by KINS to meet the tasks entrusted to KINS by MST is only conditionally forceful as a law, that is, on the condition that law or regulation empowered the chief of KINS to make nuclear safety and/or technology standards.

  11. 33 CFR 165.1318 - Security and Safety Zone Regulations, Large Passenger Vessel Protection, Portland, OR Captain of...

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false Security and Safety Zone Regulations, Large Passenger Vessel Protection, Portland, OR Captain of the Port Zone 165.1318 Section 165.1318 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) PORTS AND...

  12. 19 CFR 0.2 - All other CBP regulations issued under the authority of the Department of Homeland Security.

    Science.gov (United States)

    2010-04-01

    ... 19 Customs Duties 1 2010-04-01 2010-04-01 false All other CBP regulations issued under the authority of the Department of Homeland Security. 0.2 Section 0.2 Customs Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY; DEPARTMENT OF THE TREASURY TRANSFERRED OR DELEGATED AUTHORITY...

  13. 76 FR 44452 - Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security National...

    Science.gov (United States)

    2011-07-26

    ..., including 5 U.S.C. 552a(c)(3), which entitles individuals to an accounting of disclosures of their records... Disclosures) because release of the accounting of disclosures could alert the subject of an investigation of... efforts to preserve national security. Disclosure of the accounting would also permit the individual who...

  14. 76 FR 60387 - Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security Federal...

    Science.gov (United States)

    2011-09-29

    ...)(3) (Accounting for Disclosures) because release of the accounting of disclosures could alert the... recipient agency. Disclosure of the accounting would therefore present a serious impediment to law enforcement efforts and/or efforts to preserve national security. Disclosure of the accounting would also...

  15. 75 FR 9085 - Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security Immigration...

    Science.gov (United States)

    2010-03-01

    ... subsection (c)(3) and (4) (Accounting for Disclosures) because release of the accounting of disclosures could... information. Disclosure of the accounting would therefore present a serious impediment to ICE's Visa Security... individuals under certain circumstances, such as where the access or disclosure of such information would...

  16. 77 FR 1387 - Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security/Federal...

    Science.gov (United States)

    2012-01-10

    ... request is made, for the following reasons: (a) From subsection (c)(3) (Accounting for Disclosures) because release of the accounting of disclosures could alert the subject of an investigation of an actual... national security. Disclosure of the accounting would also permit the individual who is the subject of a...

  17. 78 FR 63408 - Petition To Amend Animal Welfare Act Regulations To Prohibit Public Contact With Big Cats, Bears...

    Science.gov (United States)

    2013-10-24

    ... Inspection Service 9 CFR Parts 2 and 3 [Docket No. APHIS-2012-0107] Petition To Amend Animal Welfare Act... the comment period for a petition requesting amendments to the Animal Welfare Act regulations and... notice \\1\\ making available for comment a petition requesting amendments to the Animal Welfare Act...

  18. 20 CFR 416.1071 - Good cause for not following the Act, our regulations, or other written guidelines.

    Science.gov (United States)

    2010-04-01

    ..., we will not find that the State agency has substantially failed to meet our standards. We will... regulations, or other written guidelines. 416.1071 Section 416.1071 Employees' Benefits SOCIAL SECURITY ADMINISTRATION SUPPLEMENTAL SECURITY INCOME FOR THE AGED, BLIND, AND DISABLED Determinations of Disability...

  19. let-7 miRNAs Can Act through Notch to Regulate Human Gliogenesis

    Directory of Open Access Journals (Sweden)

    M. Patterson

    2014-11-01

    Full Text Available It is clear that neural differentiation from human pluripotent stem cells generates cells that are developmentally immature. Here, we show that the let-7 plays a functional role in the developmental decision making of human neural progenitors, controlling whether these cells make neurons or glia. Through gain- and loss-of-function studies on both tissue and pluripotent derived cells, our data show that let-7 specifically regulates decision making in this context by regulation of a key chromatin-associated protein, HMGA2. Furthermore, we provide evidence that the let-7/HMGA2 circuit acts on HES5, a NOTCH effector and well-established node that regulates fate decisions in the nervous system. These data link the let-7 circuit to NOTCH signaling and suggest that this interaction serves to regulate human developmental progression.

  20. Draft Federal Act of the Russian Federation 'The Civil Liability for Nuclear Damage and its Financial Security'

    International Nuclear Information System (INIS)

    Lebedeva, Yulia

    2014-01-01

    The use of nuclear power by states in the modern world requires supplements to international law through the development of national legislation on civil liability for nuclear damage and compensation. The situation in the Russian Federation is no exception. Russian law on civil liability for nuclear damage has not fully evolved, and currently, there is no specific law covering liability for nuclear damage, nor is there a law regarding the financial and insurance mechanisms for compensation. Instead, the current laws establish a state system of benefits and compensation for damage to health and property of citizens. Since 1996, Russia has been actively working to develop a draft federal act to cover liability for nuclear damage. A bill was first introduced in the State Duma of the Federal Assembly of the Russian Federation on 16 July 1996, and was originally called 'The Compensation for Nuclear Damage and Nuclear Insurance'. In 1997, the official representative of the Government of the Russian Federation, Head of Russian Federal Inspectorate for Nuclear and Radiation Safety, Yuri Vishnevsky, was appointed to present this bill for discussion in the chambers of the Federal Assembly of the Russian Federation. In September 1998, the State Duma rejected the draft federal act and instead adopted in the first reading a different draft federal act: No. 96700118-2, 'The Civil Liability for Nuclear Damage and its Financial Security' ('the bill'). In this case, the State Duma Committee on Ecology was charged with incorporating the incoming amendments into a final bill and submitting it to the State Duma for a second reading. In 2005, Russia ratified the Vienna Convention on Civil Liability for Nuclear Damage. This ratification required significant amendments to 'The Civil Liability for Nuclear Damage and its Financial Security' bill. But, even though the Russian Federation had not yet ratified the Vienna Convention, the drafters were still careful to take into account the

  1. The role of the Gosatomnadzor of Russia in national regulating of safety of radiation sources and security of radioactive materials

    International Nuclear Information System (INIS)

    Mikhailov, M.V.; Sitnikov, S.A.

    2001-01-01

    As at the end of 1999, the Gosatomnadzor of Russia supervised 6551 radiation sources, including 1285 unsealed sources with individual activity from a minimal level to 1x10 12 Bq and a total activity of 585x10 12 Bq, and also 5266 sealed sources with individual activity from 30 to 1x10 17 Bq and the total activity of more than 11x10 17 Bq. A national infrastructure has been created in the Russian Federation in order to regulate the safety of nuclear energy use. The infrastructure includes the legal system and the regulatory authorities based on and acting according to it. The regulation of radiation safety, including assurance of radiation source safety and radioactive material security (management of disused sources, planning, preparedness and response to abnormal events and emergencies, recovery of control over orphan sources, informing users and others who might be affected by lost source, and education and training in the safety of radiation sources and the security of radioactive materials), is realized within this infrastructure. The legal system includes federal laws ('On the Use of Nuclear Energy' and 'On Public Radiation Safety'), a number of decrees and resolutions of the President and the Government of the Russian Federation, federal standards and rules for nuclear energy use, and also departmental and industrial manuals and rules, State standards, construction standards and rules and other documents. The safety regulation tasks have been defined by these laws, according to which regulatory authorities are entrusted with the development, approval and putting into force of standards and rules in the nuclear energy use, with issuing licenses for carrying out nuclear activities, with safety supervision assurance, with review and inspection implementation, with control over development and realization of protective measures for workers, population and environment in emergencies at nuclear and radiation hazardous facilities. Russian national regulatory

  2. Privacy Act

    Science.gov (United States)

    Learn about the Privacy Act of 1974, the Electronic Government Act of 2002, the Federal Information Security Management Act, and other information about the Environmental Protection Agency maintains its records.

  3. On the reform of the regulations in the Atomic Energy Act concerning governmental supervision

    International Nuclear Information System (INIS)

    Rebentisch, M.

    1991-01-01

    The deliberations on the amendment to the Atomic Energy Act aim at a harmonization with the Federal Immission Control Act. This holds especially for the area of regulations dealing with the installation. With its function as a licensing law for industrial installations the Federal Immission Control Act has a key position in technology and safety law. The lecture deals especially with the obligation to inform and with the right of the supervising authority to reserve its consent to minor alterations; legal qualification and lawfulness of the reservation of consent; reservation of consent to the start-up after an exchange of fuel elements; requirement of a permit for the decommissioning of installations. (orig./HSCH) [de

  4. Energy Independence and Security Act of 2007: A Summary of Major Provisions

    Science.gov (United States)

    2007-12-21

    costs of the program. Section 548 stresses that funding will supplement, not replace, funding provided by DOE under the Weatherization and State Energy... telecommuting programs. Reports to Congress are required for each of those programs. Section 1204 raises the Small Business Investment Act (SBIA

  5. 77 FR 69517 - Order Granting Exmeptions From Specified Provisions of the Securities Exchange Act and the...

    Science.gov (United States)

    2012-11-19

    ... annual and semi-annual reports to investors affected by Hurricane Sandy; and For the period from and... reports to unitholders affected by Hurricane Sandy, Provided That (a) The affected investor's mailing... investors. Section 17A(c)(1) of the Exchange Act provides that the appropriate regulatory agency, by rule or...

  6. 75 FR 22656 - Order Extending Temporary Conditional Exemptions Under the Securities Exchange Act of 1934 in...

    Science.gov (United States)

    2010-04-29

    ... Home Loan Mortgage Corporation (``Freddie Mac'') or the Government National Mortgage Association... assessment of the areas set forth in the Commission's Automation Review Policy Statements \\15\\ and its annual... advantage of this exemption from Exchange Act requirements. This should promote compliance with the...

  7. 76 FR 12609 - Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security Office of...

    Science.gov (United States)

    2011-03-08

    ... 20528. For privacy issues please contact: Mary Ellen Callahan (703-235-0780), Chief Privacy Officer... Secretary 6 CFR Part 5 [Docket No. DHS-2010-0051] Privacy Act of 1974: Implementation of Exemptions... Center Tracker and Senior Watch Officer Logs System of Records AGENCY: Privacy Office, DHS. ACTION...

  8. 75 FR 69603 - Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security National...

    Science.gov (United States)

    2010-11-15

    ... 20528. For privacy issues please contact: Mary Ellen Callahan (703-235- 0780), Chief Privacy Officer... Secretary 6 CFR Part 5 [Docket No. DHS-2010-0085] Privacy Act of 1974: Implementation of Exemptions... Coordinating Center Records System of Records AGENCY: Privacy Office, DHS. ACTION: Notice of proposed...

  9. Transports of radioactive materials. Legal regulations, safety and security concepts, experience

    International Nuclear Information System (INIS)

    Schwarz, Guenther

    2012-01-01

    In Germany, approximately 650,000 to 750,000 units containing radioactive materials for scientific, medical and technical applications are shipped annually by surface, air and water transports. Legally speaking, radioactive materials are dangerous goods which can cause hazards to life, health, property and the environment as a result of faulty handling or accidents in transit. For protection against these hazards, their shipment therefore is regulated in extensive national and international rules of protection and safety. The article contains a topical review of the international and national transport regulations and codes pertaining to shipments of radioactive materials, and of the protection concepts underlying these codes so as to ensure an adequate standard of safety and security in shipping radioactive materials in national and international goods traffic. (orig.)

  10. Strengthening global health security by embedding the International Health Regulations requirements into national health systems.

    Science.gov (United States)

    Kluge, Hans; Martín-Moreno, Jose Maria; Emiroglu, Nedret; Rodier, Guenael; Kelley, Edward; Vujnovic, Melitta; Permanand, Govin

    2018-01-01

    The International Health Regulations (IHR) 2005, as the overarching instrument for global health security, are designed to prevent and cope with major international public health threats. But poor implementation in countries hampers their effectiveness. In the wake of a number of major international health crises, such as the 2014 Ebola and 2016 Zika outbreaks, and the findings of a number of high-level assessments of the global response to these crises, it has become clear that there is a need for more joined-up thinking between health system strengthening activities and health security efforts for prevention, alert and response. WHO is working directly with its Member States to promote this approach, more specifically around how to better embed the IHR (2005) core capacities into the main health system functions. This paper looks at how and where the intersections between the IHR and the health system can be best leveraged towards developing greater health system resilience. This merging of approaches is a key component in pursuit of Universal Health Coverage and strengthened global health security as two mutually reinforcing agendas.

  11. Characterizing, Classifying, and Understanding Information Security Laws and Regulations: Considerations for Policymakers and Organizations Protecting Sensitive Information Assets

    Science.gov (United States)

    Thaw, David Bernard

    2011-01-01

    Current scholarly understanding of information security regulation in the United States is limited. Several competing mechanisms exist, many of which are untested in the courts and before state regulators, and new mechanisms are being proposed on a regular basis. Perhaps of even greater concern, the pace at which technology and threats change far…

  12. 77 FR 6954 - Special Local Regulations; Safety and Security Zones; Recurring Events in Captain of the Port...

    Science.gov (United States)

    2012-02-10

    ... necessary security zone, and (3) updating and reorganizing existing regulations for ease of use and... provide the event name, and type, as well as locations of the events. Annual notifications will be made to..., before the effective period, the Coast Guard will issue notice of the time and location of each regulated...

  13. The Perspectives of International Regulation of Private Military and Security Companies

    Directory of Open Access Journals (Sweden)

    Maria A. Nebolsina

    2016-01-01

    Full Text Available Modern international security is a heterogeneous sphere that includes both state and nonstate actors. Legal status of some non-state actors is not always clear. This can be attributed mostly to the dynamics of the global processes. The emergence of new actors, their fast transformation and shift from old forms of activity to the new ones often outpace political and legal assessment of their nature, the impact on some other international trends and the implications of their use that may arise. States and international organizations together with business and non-governmental foundations have started to turn to private security actors more frequently. The fact that traditional methods of state violence are complemented by non-traditional forms influences the idea of violence in the society at large. The efficiency of non-state security actors and the speed they provide services with sometimes exceed the ones of civil servants' and outmaneuver state machine. However these advantages do not contribute to the legitimacy of these non-state actors. As a result during a certain period of time, sometimes a significant one, new actors perform having just a partial legitimacy and a vague accoun tability. Various approaches towards regulation of the abovementioned actors within the framework of national and regional legislation clarify their status in a way. But these measures are not enough for them to obtain legal status under the International Law so far. To address the problem a complex approach that would combine the existing International Law mechanisms with the developing self-regulation methods is needed.

  14. Y-12 National Security Complex National Historic Preservation Act Historic Preservation Plan

    Energy Technology Data Exchange (ETDEWEB)

    None

    2003-09-30

    The Historic Preservation Plan (HPP) recognizes that the Y-12 National Security Complex is a vital and long-term component of DOE and NNSA. In addition to NNSA missions, the Office of Science and Energy, the Office of Nuclear Energy, and the Office of Environmental Management have properties located at Y-12 that must be taken into consideration. The HPP also recognizes that the challenge for cultural resource management is incorporating the requirements of NNSA, SC, NE, and EM missions while preserving and protecting its historic resources. The HPP seeks to find an effective way to meet the obligations at Y-12 for historic and archeological protection while at the same time facilitating effective completion of ongoing site mission activities, including removal of obsolete or contaminated facilities, adaptive reuse of existing facilities whenever feasible, and construction of new facilities in order to meet site mission needs. The Y-12 Historic Preservation Plan (HPP) defines the preservation strategy for the Y-12 National Security Complex and will direct efficient compliance with the NHPA and federal archaeological protection legislation at Y-12 as DOE and NNSA continues mission activities of the site.

  15. NOISE SECURES SECRET DATA! BY ACT AS A REFERENCE FOR EMBEDDING

    Directory of Open Access Journals (Sweden)

    J. Jayaseelan

    2014-03-01

    Full Text Available Data Security is that the most crucial think about a communication network. Data security is achieved by cryptography and data concealing. Steganography is one of the info concealing technique; here any form of signal is concealing by exploitation a picture, audio or video. In an exceedingly spatial domain steganography, most typically the info is embedded into a LSB’s of the cover image pixels. As a result of it maintain the standard of the stego image as like as cover image instead of embedded into MSB’s. To embedding into a LSB’s of cover image (R, G, B plane researchers are using different types of pixel indicating methods, random embedding, edge based embedding in spatial domain or applying completely different reworks in transform domain. In this paper, for spatial domain steganography noise based embedding technique is proposed; it is entirely different from the out there techniques. In this paper two copies of JPEG, PNG, GIF, or BMP etc., images are used. One is taken as a reference image and noise is added onto that. Supported this reference image knowledge is embedded into the LSB’s of cover image. Proposed system using salt and pepper noise for data embedding, it is an ON, OFF noise. Based on added salt, pepper, and no noise portions of reference image completely different range of bits are embedded into the cover image. The result is analyzed by using MSE, PSNR and capacity performance metrics.

  16. Progranulin acts as a shared chaperone and regulates multiple lysosomal enzymes

    Directory of Open Access Journals (Sweden)

    Jinlong Jian

    2017-09-01

    Full Text Available Multifunctional factor progranulin (PGRN plays an important role in lysosomes, and its mutations and insufficiency are associated with lysosomal storage diseases, including neuronal ceroid lipofuscinosis and Gaucher disease (GD. The first breakthrough in understanding the molecular mechanisms of PGRN as regulator of lysosomal storage diseases came unexpectedly while investigating the role of PGRN in inflammation. Challenged PGRN null mice displayed typical features of GD. In addition, GRN gene variants were identified in GD patients and the serum levels of PGRN were significantly lower in GD patients. PGRN directly binds to and functions as a chaperone of the lysosomal enzyme β-glucocerebrosidase (GCaase, whose mutations cause GD. In addition, its C-terminus containing granulin E domain, termed Pcgin (PGRN C-terminus for GCase Interaction, is required for the association between PGRN and GCase. The concept that PGRN acts as a chaperone of lysosomal enzymes was further supported and extended by a recent article showing that PGRN acts as a chaperone molecule of lysosomal enzyme cathepsin D (CSTD, and the association between PGRN and CSTD is also mediated by PGRN's C-terminal granulin E domain. Collectively, these reports suggest that PGRN may act as a shared chaperone and regulates multiple lysosomal enzymes.

  17. 75 FR 50730 - Public Health Security and Bioterrorism Preparedness and Response Act of 2002: Biennial Review...

    Science.gov (United States)

    2010-08-17

    .... Comments may be e-mailed to: [email protected] . FOR FURTHER INFORMATION CONTACT: Robbin Weyant, Director...., MS A-46, Atlanta, Georgia 30333. Telephone: (404) 718-2000. SUPPLEMENTARY INFORMATION: On July 21... regulations (42 CFR part 73) to implement a tiering and/or stratification schema along with any corresponding...

  18. 76 FR 30374 - Cruise Vessel Safety and Security Act of 2010, Available Technology

    Science.gov (United States)

    2011-05-25

    ... http://www.regulations.gov on or before July 25, 2011 or reach the Docket Management Facility by that... that occur on the vessel, and provide law enforcement officials in the course and scope of an... industry best practices for placement and retention of video recording devices exist? If yes, please...

  19. 78 FR 14403 - Alabama Metal Coil Securement Act; Petition for Determination of Preemption

    Science.gov (United States)

    2013-03-05

    ... benefit; (2) are incompatible with Federal regulations; or (3) would cause an unreasonable burden on interstate commerce. FMCSA has determined that there is insufficient support for the claimed safety benefits... safety benefits and do not place an unreasonable burden on interstate commerce. Applicable Law Section...

  20. 75 FR 18857 - Privacy Act of 1974; Department of Homeland Security Citizenship and Immigration Services...

    Science.gov (United States)

    2010-04-13

    ... processing of information and to aid the Ombudsman in assisting individuals and employers in making systemic... individuals and employers problems allowing the Ombudsman to make systemic recommendations to USCIS. The... prosecuting a violation or enforcing or implementing a law, rule, regulation, or order, where a record, either...

  1. Regulation of rice root development by a retrotransposon acting as a microRNA sponge.

    Science.gov (United States)

    Cho, Jungnam; Paszkowski, Jerzy

    2017-08-26

    It is well documented that transposable elements (TEs) can regulate the expression of neighbouring genes. However, their ability to act in trans and influence ectopic loci has been reported rarely. We searched in rice transcriptomes for tissue-specific expression of TEs and found them to be regulated developmentally. They often shared sequence homology with co-expressed genes and contained potential microRNA-binding sites, which suggested possible contributions to gene regulation. In fact, we have identified a retrotransposon that is highly transcribed in roots and whose spliced transcript constitutes a target mimic for miR171. miR171 destabilizes mRNAs encoding the root-specific family of SCARECROW-Like transcription factors. We demonstrate that retrotransposon-derived transcripts act as decoys for miR171, triggering its degradation and thus results in the root-specific accumulation of SCARECROW-Like mRNAs. Such transposon-mediated post-transcriptional control of miR171 levels is conserved in diverse rice species.

  2. Identification of trans-acting factors regulating SamDC expression in Oryza sativa

    Energy Technology Data Exchange (ETDEWEB)

    Basu, Supratim, E-mail: supratim_genetics@yahoo.co.in [Department of Crop Soil and Environmental Sciences, University of Arkansas, Fayetteville, AR 72701 (United States); Division of Plant Biology, Bose Institute, Kolkata (India); Roychoudhury, Aryadeep [Post Graduate Department of Biotechnology, St. Xavier' s College (Autonomous), 30, Mother Teresa Sarani, Kolkata - 700016, West Bengal (India); Sengupta, Dibyendu N. [Division of Plant Biology, Bose Institute, Kolkata (India)

    2014-03-07

    Highlights: • Identification of cis elements responsible for SamDC expression by in silico analysis. • qPCR analysis of SamDC expression to abiotic and biotic stress treatments. • Detection of SamDC regulators using identified cis-elements as probe by EMSA. • Southwestern Blot analysis to predict the size of the trans-acting factors. - Abstract: Abiotic stress affects the growth and productivity of crop plants; to cope with the adverse environmental conditions, plants have developed efficient defense machinery comprising of antioxidants like phenolics and flavonoids, and osmolytes like polyamines. SamDC is a key enzyme in the polyamine biosynthesis pathway in plants. In our present communication we have done in silico analysis of the promoter region of SamDC to look for the presence of different cis-regulatory elements contributing to its expression. Based on the presence of different cis-regulatory elements we completed comparative analysis of SamDC gene expression in rice lamina of IR-29 and Nonabokra by qPCR in response to the abiotic stress treatments of salinity, drought, cold and the biotic stress treatments of ABA and light. Additionally, to explore the role of the cis-regulatory elements in regulating the expression of SamDC gene in plants we comparatively analyzed the binding of rice nuclear proteins prepared from IR-29 and Nonabokra undergoing various stress treatments. The intensity of the complex formed was low and inducible in IR-29 in contrast to Nonabokra. Southwestern blot analysis helped in predicting the size of the trans-acting factors binding to these cis-elements. To our knowledge this is the first report on the comprehensive analysis of SamDC gene expression in rice and identification of the trans-acting factors regulating its expression.

  3. 76 FR 39927 - Order Granting Temporary Exemptions Under the Securities Exchange Act of 1934 in Connection With...

    Science.gov (United States)

    2011-07-07

    ... defined as a person ``in the business of effecting transactions in securities for the account of others... the business of buying and selling securities (not including security-based swaps, other than security... the purpose of using any facility of an exchange * * * to effect any transaction in a security, or to...

  4. MIGRATORY THREATS TO NATIONAL SECURITY OF UKRAINE: CURRENT CHALLENGES AND WAYS OF REGULATION

    Directory of Open Access Journals (Sweden)

    Mychailo Romaniuk

    2016-11-01

    Full Text Available The purpose of the article is to disclose the migratory threats which are connected with external and mass internal inter-regional migrations, which are caused by the annexation of the Crimea and military aggression in Donbas by Russia. Methodological and practical aspects of improving the management of intensive interstate and inter-regional migratory processes, negative consequences of which threaten national security of the country because of hybrid war in Donbas, illegal migration, worsening of the demographic situation, departure of scientists and specialists abroad are described in the article too. The main strategic objective, which consists of maintenance of state sovereignty, territorial integrity of Ukraine, and also integration in European and migratory space, ensuring close to the world standards of quality and length of life, realization of rights and freedoms of citizens, is formulated. Actions and tasks of the state migratory policy, ways and methods of regulation of external migrations of the population are considered. Principal reasons of external migrations of population are identified and analysed. The inwardly-regional, interregional and intergovernmental migrations of population of Ukraine in the years of its state independence (1991- 2014 are analyzed in details. The results of analysis showed that migratory activity goes down on inwardly-regional and interregional levels. Also intensity of exchange of population went down between the regions of country. At the same time Ukraine for years state independence through depopulation processes lost 6,5 million persons, and in the external migratory moving of population of loss made over 1 million persons. The problem of illegal external labour migration is considered. It is noted that illegal migration from Ukraine to the threats to national security in the Law of Ukraine "On the National Security of Ukraine" is not included, and a threat to national security posed by illegal

  5. Development of System Regulating and Support for Nuclear Security in Belarus

    International Nuclear Information System (INIS)

    Lobach, D.; Astashka, R.; Lugovskaya, O.

    2015-01-01

    A safeguards strengthening in Belarus is realized as complex for measures of legal authorities building, advance staff education and international cooperation. The main scope of complex coordinated activities is to provide the sustainable development of national regulatory system and support for current and future challenges in a more globalized world to assure relevant safeguards measures and implements, to get the sustainable international and regional cooperation. Collected and implemented information and knowledge, analytical thinking of involved specialists will improve cooperation between IAEA and States to optimize technical support and experience exchange. Some authorities are responsible in regulating and oversighting for nuclear security in Belarus. The main challenge of national system development is realization the conception of effective coordination. The nuclear regulatory authority (the Ministry for Emergency Situations/ Gosatomnadzor) has the responsibility either to build up own technical capabilities for detailed review and assessment of processes and activities of the NPP operator or to make sure that a technical support organization equipped with sufficient knowledge and structural capabilities is involved in assessment and analysis of processes at all phases of the NPP use. There is developed the conception for creation of analytical and technical support laboratory including both stationary and mobile equipment and techniques for nuclear security prevention and control measures and arrangements. It is actually the realization of conception the Joint Center for Nuclear Security Competence in Belarus for national and cooperational purposes. The implementation of strengthening plans and put-up arrangements will lead to integrated regulatory activities in order to allow practical optimization of the resources to get benefits from exchange of experience and issues from safety analysis and oversighting as synergy effect. (author)

  6. Evaluation of the Navy Implementation of DOD Financial Management Regulation, Volume 14, Administrative Control of Funds and Antideficiency Act Violations

    National Research Council Canada - National Science Library

    Lane, F

    1996-01-01

    On August 1, 1995, the Under Secretary of Defense (Comptroller) released for implementation Financial Management Regulation, volume 14, "Administrative Control of Funds and Antideficiency Act Violations," August 1, 1995...

  7. Status of the Regulation for safe and secure transport of radioactive materials in Madagascar

    International Nuclear Information System (INIS)

    Raoelina Andriambololona; Zafimanjato, J.L.R.; Solofoarisina, W.C.; Randriantseheno, H.F.

    2011-01-01

    Radioactive sources are widely used in medicine, in industrial exploration and development, as well as in basic scientific research and education in Madagascar. The ability to use such radioactive materials in these sectors depends on their safe and secure transport both within and between countries. Transport safety of radioactive materials within the country is regulated. The law No. 97-041 on radiation protection and radioactive waste management in Madagascar promulgated in January 1998 and the decree No.2735/94 dealing the transport of radioactive materials promulgated in June 1994 govern all activities related to the transport of radioactive material. This law was established to meet the requirements of the International Basic Safety Standards (BSS, IAEA Safety Series 115). It is not fully consistent with current international standards (GS-R-1). Indeed, in order to enhance the security of radioactive sources, Madagascar has implemented the Code of Conduct and the Guidance on the Import and Export of Radioactive Sources. Faced with delays and denials of shipment of radioactive materials issues, the National Focal Point has been appointed to work with ISC members and the regional networks on the global basis.

  8. Status of the regulation for safe and secure transport of radioactive materials in Madagascar

    International Nuclear Information System (INIS)

    Andriambololona, Raoelina; Zafimanjato, J.L.R.; Solofoarisina, W.C.; Randriantseheno, H.F.

    2016-01-01

    Radioactive sources are widely used in medicine, in industrial exploration and development, as well as in basic scientific research and education in Madagascar. The ability to use such radioactive materials in these sectors depends on their safe and secure transport both within and between countries. Transport safety of radioactive materials within the country is regulated. The law n° 97-041 on radiation protection and radioactive waste management in Madagascar promulgated in January 1998 and the decree n° 2735/94 dealing the transport of radioactive materials promulgated in June 1994 govern all activities related to the transport of radioactive material. This law was established to meet the requirements of the International Basic Safety Standards (BSS, IAEA Safety Series 115). It is not fully consistent with current international standards (GS-R-1). Indeed, in order to enhance the security of radioactive sources, Madagascar has implemented the Code of Conduct and the Guidance on the Import and Export of Radioactive Sources. Faced with delays and denials of shipment of radioactive materials issues, the National Focal Point has been appointed to work with ISC members and the regional networks on the global basis. (author)

  9. Act No. 225 of 17 March 1979 containing regulations on third party liability for damage caused by nuclear incidents; Nuclear Incidents (Third Party Liability) Act

    International Nuclear Information System (INIS)

    1979-01-01

    This Act on nuclear third party liability provides that the maximum amount of liability of the operator of a nuclear installation in the Netherlands is set at 100 million guilders in accordance with the Paris Convention; it also implements the Brussels Supplementary Convention's additional compensation mechanism. The new Act further provides that if damage is suffered on the Netherlands' territory as a result of a nuclear incident for which compensation is payable pursuant to the Brussels Convention or to the Act, and that the funds available for this purpose are insufficient to secure compensation of such damage to an amount of one thousand million guilders, the State shall make available the public funds needed to compensate such damage up to that amount. (NEA) [fr

  10. 76 FR 75799 - General Administrative Regulations; Mutual Consent Cancellation; Food Security Act of 1985...

    Science.gov (United States)

    2011-12-05

    ... or limited liability partnership and is ineligible as a result of a delinquent debt, all partners of the ineligible general or limited liability partnership will be ineligible. (i) All crop insurance..., estate, trust, corporation, limited liability company, limited partnership, or other similar entity, and...

  11. Self-esteem and the quest for felt security: how perceived regard regulates attachment processes.

    Science.gov (United States)

    Murray, S L; Holmes, J G; Griffin, D W

    2000-03-01

    The authors proposed that personal feelings of self-esteem foster the level of confidence in a partner's regard critical for satisfying attachments. Dating and married couples described themselves, their partners, how they thought their partners saw them, and how they wanted their partners to see them on a variety of interpersonal qualities. The results revealed that low self-esteem individuals dramatically underestimated how positively their partners saw them. Such unwarranted and unwanted insecurities were associated with less generous perceptions of partners and lower relationship well-being. The converse was true for high self-esteem individuals. A longitudinal examination of the dating couples revealed that the vulnerabilities of lows were only exacerbated over time. A dependency regulation model is proposed, wherein felt security in a partner's perceived regard is suggested as a prime mechanism linking self-esteem to relational well-being.

  12. Knowledge of the Animal Welfare Act and Animal Welfare Regulations Influences Attitudes toward Animal Research

    Science.gov (United States)

    2015-01-01

    Recent public-opinion polls indicate that Americans have shown a decline in support for animal experimentation, and several reports suggest a relationship between people's knowledge of animal welfare regulations and their attitudes toward animal research. Therefore, this study was designed to assess respondent's knowledge of several provisions in the Animal Welfare Act (AWA) and Animal Welfare Regulations (AWR), and determine whether exposure to elements of this legislation would influence an individual's attitudes toward the use of animals in research. A survey was used to assess knowledge of animal research regulations and attitudes toward animal research from a sample of individuals recruited through Amazon's Mechanical Turk crowdsourcing marketplace. Results from study 1 confirmed the hypothesis that respondents had little knowledge of various federal regulations that govern animal research activities. Data from study 2 revealed that exposure to elements of the AWA and AWR influenced participants’ attitudes toward the use of animals in research. These results suggest that providing information to the general public about the AWA and AWR that protect laboratory animals from abuse and neglect may help alleviate concerns about using animals in research settings. PMID:25651094

  13. A Secure Base from Which to Regulate: Attachment Security in Toddlerhood as a Predictor of Executive Functioning at School Entry

    Science.gov (United States)

    Bernier, Annie; Beauchamp, Miriam H.; Carlson, Stephanie M.; Lalonde, Gabrielle

    2015-01-01

    In light of emerging evidence suggesting that the affective quality of parent-child relationships may relate to individual differences in young children's executive functioning (EF) skills, the aim of this study was to investigate the prospective associations between attachment security in toddlerhood and children's EF skills in kindergarten.…

  14. 78 FR 13298 - Notice of Retrospective Review of the Americans With Disabilities Act Regulations for Over-the...

    Science.gov (United States)

    2013-02-27

    ... accessible OTRB service. An OTRB is defined as ``a bus characterized by an elevated passenger deck located...] Notice of Retrospective Review of the Americans With Disabilities Act Regulations for Over-the-Road Bus... bus (OTRB) operators. The DOT will review regulations specified in the SUPPLEMENTARY INFORMATION...

  15. 3 CFR 101.4 - National Security Council.

    Science.gov (United States)

    2010-01-01

    ... 3 The President 1 2010-01-01 2010-01-01 false National Security Council. 101.4 Section 101.4... PROCEDURES ACT § 101.4 National Security Council. Freedom of Information regulations for the National Security Council appear at 32 CFR Ch. XXI. ...

  16. Fgf9 and Wnt4 act as antagonistic signals to regulate mammalian sex determination.

    Directory of Open Access Journals (Sweden)

    Yuna Kim

    2006-06-01

    Full Text Available The genes encoding members of the wingless-related MMTV integration site (WNT and fibroblast growth factor (FGF families coordinate growth, morphogenesis, and differentiation in many fields of cells during development. In the mouse, Fgf9 and Wnt4 are expressed in gonads of both sexes prior to sex determination. Loss of Fgf9 leads to XY sex reversal, whereas loss of Wnt4 results in partial testis development in XX gonads. However, the relationship between these signals and the male sex-determining gene, Sry, was unknown. We show through gain- and loss-of-function experiments that fibroblast growth factor 9 (FGF9 and WNT4 act as opposing signals to regulate sex determination. In the mouse XY gonad, Sry normally initiates a feed-forward loop between Sox9 and Fgf9, which up-regulates Fgf9 and represses Wnt4 to establish the testis pathway. Surprisingly, loss of Wnt4 in XX gonads is sufficient to up-regulate Fgf9 and Sox9 in the absence of Sry. These data suggest that the fate of the gonad is controlled by antagonism between Fgf9 and Wnt4. The role of the male sex-determining switch--Sry in the case of mammals--is to tip the balance between these underlying patterning signals. In principle, sex determination in other vertebrates may operate through any switch that introduces an imbalance between these two signaling pathways.

  17. 685. Order amending the Order concerning the definition of goods whose export requires a permit in accordance with the Security Control Act

    International Nuclear Information System (INIS)

    1990-01-01

    The list of goods which may not be exported without a permit, in accordance with the Act of 1972 on security control, was amended by this Order. The amendment includes numerous items or equipment involving radiation or radioactive materials. It came into effect on 1 December 1990. (NEA)

  18. 17 CFR 403.4 - Customer protection-reserves and custody of securities.

    Science.gov (United States)

    2010-04-01

    ... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Customer protection-reserves... TREASURY REGULATIONS UNDER SECTION 15C OF THE SECURITIES EXCHANGE ACT OF 1934 PROTECTION OF CUSTOMER SECURITIES AND BALANCES § 403.4 Customer protection—reserves and custody of securities. Every registered...

  19. Synthesis of securement device options and strategies

    Science.gov (United States)

    2002-03-01

    The Americans with Disabilities Act of 1990 (ADA) requires that public transit vehicles be equipped with securement location(s) and device(s) that are able to secure common wheelchairs," as defined in the ADA regulations. The definition and size spec...

  20. The Registration of Special Notarial Bonds under the Security by Means of Movable Property Act and the Publicity Principle: Lessons from Developments in Belgium

    Directory of Open Access Journals (Sweden)

    Lefa

    2018-01-01

    Full Text Available Many people do not own immovable property to offer as security but do have movable property which can be offered as security for the repayment of a debt. In today's world, where the costs of a motor car can exceed that of a house, the increasing value of movable things makes them popular and appropriate security objects. Under the common law pledge, delivery of the movable property from the pledgor (the debtor to the pledgee (the creditor has to take place in order for the pledgee to acquire a real security right in the property. Delivery of the property is aimed at ensuring compliance with the publicity principle. The principle of publicity entails that the existence of a real security must be known to the public. With the aim of promoting commerce, certain countries have taken the initiative in reforming their laws on pledge to allow the debtor to retain possession of the movable property that serves as security. Furthermore, technology has advanced to a level where national registration systems which can be accessed easily and at minimal cost can be established. The South African legislature enacted the Security by Means of Movable Property Act 57 of 1993 which makes provision for a pledge without possession. This Act deemed a duly registered notarial bond over specified movable property to have been delivered as if delivery had in fact taken place, thereby substituting the common law delivery requirement with registration in the Deeds Office. On 30 May 2013 the Belgian House of Representatives adopted a Belgian Pledge Act which allows for a non-possessory pledge on movable property subject to registration in a newly created public register called the Electronic Pledge Register. This article therefore examines the efficacy of the registration system of special notarial bonds in South African law and whether this form of registration complies with the publicity principle looking at the developments of a computerised registration system taking

  1. 77 FR 43081 - Federal Acquisition Regulation; Information Collection; Buy American Act-Free Trade Agreements...

    Science.gov (United States)

    2012-07-23

    ...; Information Collection; Buy American Act--Free Trade Agreements--Israeli Trade Act Certificate AGENCIES... approved information collection requirement concerning the Buy American Act--Free Trade Agreements--Israeli..., Buy American Act--Free Trade Agreements--Israeli Trade Act Certificate, by any of the following...

  2. 76 FR 52133 - Defense Federal Acquisition Regulation Supplement; Contractors Performing Private Security...

    Science.gov (United States)

    2011-08-19

    ... Outside the United States.'' DFARS 225.302-3, Definitions, provides the definition of ``private security... this total, 361, or 20 percent, were awarded to small businesses. Firms performing private security... private security functions in response to a perceived immediate threat; (2) Ensure that all employees of...

  3. Tlx acts as a proangiogenic switch by regulating extracellular assembly of fibronectin matrices in retinal astrocytes.

    Science.gov (United States)

    Uemura, Akiyoshi; Kusuhara, Sentaro; Wiegand, Stanley J; Yu, Ruth T; Nishikawa, Shin-ichi

    2006-02-01

    In response to hypoxia, hypoxia-inducible factors act as the primary proangiogenic triggers by regulating transcription levels of target genes, including VEGF. However, little is known about the specific factors that control other components of the angiogenic process, particularly formation of matrix scaffolds that promote adhesion and migration of endothelial cells. We show that in the postnatal mouse retina, the orphan nuclear receptor tailless (Tlx) is strongly expressed in the proangiogenic astrocytes, which secrete VEGF and fibronectin. Tlx expression by retinal astrocytes is controlled by oxygen concentration and rapidly downregulated upon contact with blood vessels. In mice null for Tlx, retinal astrocytes maintain VEGF expression; however, the extracellular assembly of fibronectin matrices by astrocytes is severely impaired, leading to defective scaffold formation and a complete failure of normal retinal vascular development. This work identifies Tlx as an essential component of the molecular network involved in the hypoxia-inducible proangiogenic switch in retinal astrocytes.

  4. The Clean Air Act implementation and the coal industry: A regulator's perspective

    International Nuclear Information System (INIS)

    Rolka, D.W.

    1991-01-01

    Utility regulators are responsible for insuring that there is a sufficient supply of electricity to meet consumers needs at a reasonable price. The Pennsylvania Public Utility Commission Act (CAA) compliance strategies are effective at the lowest possible cost. Those potential compliance costs in Pennsylvania may exceed $3 billion by the end of the decade. This does not include worst case estimates of over $750 million per year in added operations and maintenance costs. In the face of these expenses, concerns such as jobs and the health of Pennsylvania's coal industry may carry little weight. The Commission cannot relieve companies of their responsibility for complying. Thus, in order to maintain its market among electric companies, coal will have to be competitive both in offering solutions to the emissions requirements of the CAA and in providing acceptable alternatives for future, new generating plants

  5. 17 CFR 239.41 - Form F-80, for registration under the Securities Act of 1933 of securities of certain Canadian...

    Science.gov (United States)

    2010-04-01

    ... completed fiscal years immediately prior to the business combination, when combined with the listing history... offers or a business combination. 239.41 Section 239.41 Commodity and Securities Exchanges SECURITIES AND... issuers to be issued in exchange offers or a business combination. (a) Form F-80 may be used for...

  6. 17 CFR 239.38 - Form F-8, for registration under the Securities Act of 1933 of securities of certain Canadian...

    Science.gov (United States)

    2010-04-01

    ... completed fiscal years immediately prior to the business combination, when combined with the listing history... offers or a business combination. 239.38 Section 239.38 Commodity and Securities Exchanges SECURITIES AND... issuers to be issued in exchange offers or a business combination. (a) Form F-8 may be used for...

  7. The Massachusetts Toxics Use Reduction Act: a model for nanomaterials regulation?

    Science.gov (United States)

    Nash, Jennifer

    2012-08-01

    Nanomaterials exemplify a new class of emerging technologies that have significant economic and social value, pose uncertain health and environmental risks, and are entering the marketplace at a rapid pace. Effective regimes for regulating emerging technologies generate information about known or suspected hazards and draw on private sector expertise to guide managers' behavior toward risk reduction, even in the absence of clear evidence of harm. This paper considers the extent to which the federal Toxic Substances Control Act (TSCA) accomplishes those objectives. It offers the approach of the Massachusetts Toxics Use Reduction Act (TURA) as a possible supplement to TSCA, filling gaps in agency knowledge and private sector capacities. TURA is notable for its focus on chemicals use and hazard and its emphasis on strengthening firms' internal management systems. Given the current deadlock in Congressional efforts to modernize federal laws such as TSCA, the role of state laws like TURA merit attention. Absent definitive information about risk, a governance strategy that generates information and focuses management attention on reducing hazards is worth considering.

  8. The Massachusetts Toxics Use Reduction Act: a model for nanomaterials regulation?

    International Nuclear Information System (INIS)

    Nash, Jennifer

    2012-01-01

    Nanomaterials exemplify a new class of emerging technologies that have significant economic and social value, pose uncertain health and environmental risks, and are entering the marketplace at a rapid pace. Effective regimes for regulating emerging technologies generate information about known or suspected hazards and draw on private sector expertise to guide managers’ behavior toward risk reduction, even in the absence of clear evidence of harm. This paper considers the extent to which the federal Toxic Substances Control Act (TSCA) accomplishes those objectives. It offers the approach of the Massachusetts Toxics Use Reduction Act (TURA) as a possible supplement to TSCA, filling gaps in agency knowledge and private sector capacities. TURA is notable for its focus on chemicals use and hazard and its emphasis on strengthening firms’ internal management systems. Given the current deadlock in Congressional efforts to modernize federal laws such as TSCA, the role of state laws like TURA merit attention. Absent definitive information about risk, a governance strategy that generates information and focuses management attention on reducing hazards is worth considering.

  9. Flavonoids act as negative regulators of auxin transport in vivo in arabidopsis

    Science.gov (United States)

    Brown, D. E.; Rashotte, A. M.; Murphy, A. S.; Normanly, J.; Tague, B. W.; Peer, W. A.; Taiz, L.; Muday, G. K.

    2001-01-01

    Polar transport of the plant hormone auxin controls many aspects of plant growth and development. A number of synthetic compounds have been shown to block the process of auxin transport by inhibition of the auxin efflux carrier complex. These synthetic auxin transport inhibitors may act by mimicking endogenous molecules. Flavonoids, a class of secondary plant metabolic compounds, have been suggested to be auxin transport inhibitors based on their in vitro activity. The hypothesis that flavonoids regulate auxin transport in vivo was tested in Arabidopsis by comparing wild-type (WT) and transparent testa (tt4) plants with a mutation in the gene encoding the first enzyme in flavonoid biosynthesis, chalcone synthase. In a comparison between tt4 and WT plants, phenotypic differences were observed, including three times as many secondary inflorescence stems, reduced plant height, decreased stem diameter, and increased secondary root development. Growth of WT Arabidopsis plants on naringenin, a biosynthetic precursor to those flavonoids with auxin transport inhibitor activity in vitro, leads to a reduction in root growth and gravitropism, similar to the effects of synthetic auxin transport inhibitors. Analyses of auxin transport in the inflorescence and hypocotyl of independent tt4 alleles indicate that auxin transport is elevated in plants with a tt4 mutation. In hypocotyls of tt4, this elevated transport is reversed when flavonoids are synthesized by growth of plants on the flavonoid precursor, naringenin. These results are consistent with a role for flavonoids as endogenous regulators of auxin transport.

  10. Security an introduction

    CERN Document Server

    Purpura, Philip P

    2011-01-01

    Section I The History and Profession of SecurityDefinition, Role, and History of Security Security Defined The Contexts of Security The Roles of Security The History of Security Security in an Environment of Threats, Terrorism, and All-Hazards Threats and Hazards Terrorism National Strategies The Profession and Business of Security The Business of Security Professionalism and Security Associations Ethics Regulation of the Security Industry Security Training Higher Education Careers Section II Protecting People and AssetsSecurity Methodology Methodology Defined Security Business Proposals Secur

  11. 76 FR 70735 - Privacy Act of 1974; Department of Homeland Security/U.S. Citizenship and Immigration Services...

    Science.gov (United States)

    2011-11-15

    ... identify potential national security concerns, criminality, and fraud to ensure that serious or complex... duplicate and related accounts and identify potential national security concerns, criminality, and fraud to... identify national security concerns, criminality, and fraud to ensure that serious or complex cases receive...

  12. 76 FR 34732 - Privacy Act of 1974; Department of Homeland Security/National Protection and Programs Directorate...

    Science.gov (United States)

    2011-06-14

    ... 1974; Department of Homeland Security/National Protection and Programs Directorate--002 Chemical... Homeland Security/National Protection and Programs Directorate--002 Chemical Facility Anti-Terrorism.... 552a, the Department of Homeland Security (DHS)/National Protection and Programs Directorate (NPPD...

  13. 76 FR 28795 - Privacy Act of 1974; Department of Homeland Security United States Coast Guard-024 Auxiliary...

    Science.gov (United States)

    2011-05-18

    ... 1974; Department of Homeland Security United States Coast Guard-024 Auxiliary Database System of... Security/United States Coast Guard-024 Auxiliary Database (AUXDATA) System of Records.'' This system of...: United States Coast Guard Auxiliary Database (AUXDATA). Security classification: Unclassified. System...

  14. 75 FR 17181 - Order Extending Temporary Exemptions Under the Securities Exchange Act of 1934 in Connection With...

    Science.gov (United States)

    2010-04-05

    ..., financial institutions such as insurance companies, pension funds, securities firms, and hedge funds have... believes that it is important in the CDS market, as in the securities market generally, that parties to... participants that receive or hold funds or securities for the purpose of purchasing, selling, clearing...

  15. 75 FR 75502 - Order Extending and Modifying Temporary Exemptions Under the Securities Exchange Act of 1934 in...

    Science.gov (United States)

    2010-12-03

    ... that it is important in the CDS market, as in the market for securities generally, that parties to... funds or securities for the purpose of purchasing, selling, clearing, settling, or holding Cleared CDS... holds funds or securities for the purpose of purchasing, selling, clearing, settling, or holding Cleared...

  16. 17 CFR 240.11a-1 - Regulation of floor trading.

    Science.gov (United States)

    2010-04-01

    ... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Regulation of floor trading... Securities Exchange Act of 1934 Adoption of Floor Trading Regulation (rule 11a-1) § 240.11a-1 Regulation of floor trading. (a) No member of a national securities exchange, while on the floor of such exchange...

  17. Security culture for nuclear facilities

    Science.gov (United States)

    Gupta, Deeksha; Bajramovic, Edita

    2017-01-01

    Natural radioactive elements are part of our environment and radioactivity is a natural phenomenon. There are numerous beneficial applications of radioactive elements (radioisotopes) and radiation, starting from power generation to usages in medical, industrial and agriculture applications. But the risk of radiation exposure is always attached to operational workers, the public and the environment. Hence, this risk has to be assessed and controlled. The main goal of safety and security measures is to protect human life, health, and the environment. Currently, nuclear security considerations became essential along with nuclear safety as nuclear facilities are facing rapidly increase in cybersecurity risks. Therefore, prevention and adequate protection of nuclear facilities from cyberattacks is the major task. Historically, nuclear safety is well defined by IAEA guidelines while nuclear security is just gradually being addressed by some new guidance, especially the IAEA Nuclear Security Series (NSS), IEC 62645 and some national regulations. At the overall level, IAEA NSS 7 describes nuclear security as deterrence and detection of, and response to, theft, sabotage, unauthorized access, illegal transfer or other malicious acts involving nuclear, other radioactive substances and their associated facilities. Nuclear security should be included throughout nuclear facilities. Proper implementation of a nuclear security culture leads to staff vigilance and a high level of security posture. Nuclear security also depends on policy makers, regulators, managers, individual employees and members of public. Therefore, proper education and security awareness are essential in keeping nuclear facilities safe and secure.

  18. Maritime security report number 3. September 1996 [U.S. Coast Guard issues passenger vessel and terminal security inspection regulations; international perspectives on maritime security; first Inter-American course on port security

    Science.gov (United States)

    1996-09-01

    While most issues of the Maritime Security Report deal with the security situation in geographic area, the articles in this issue deal with publications, training courses, and policy developments which contribute to deterring opportunities for crimin...

  19. Some impacts of the 1990 Clean Air Act and state clean-air regulations on the fertilizer industry

    International Nuclear Information System (INIS)

    Breed, C.E.; Kerns, O.S.

    1992-01-01

    The Clean Air Act amendments of 1990 will intensify national efforts to reduce air pollution. They will have major impacts on governmental agencies and on industrial and commercial facilities throughout the country. As with other industries, it is essential for fertilizer dealers and producers to understand how these changes to the Clean Air Act can significantly change the way they do business. This paper is proffered as an overview of ways in which the 1990 amendments to the Clean Air Act may impact the fertilizer industry. The nonattainment, toxics, and permit provisions of the amended act will be three areas of particular concern to the fertilizer industry. Implementation of the new regulatory requirements of this legislation promises to be a long and onerous process for all concerned. However, it appears that state and local regulations may have a much more profound impact on the fertilizer industry than the new Clean Air Act

  20. Endocannabinoid system acts as a regulator of immune homeostasis in the gut.

    Science.gov (United States)

    Acharya, Nandini; Penukonda, Sasi; Shcheglova, Tatiana; Hagymasi, Adam T; Basu, Sreyashi; Srivastava, Pramod K

    2017-05-09

    Endogenous cannabinoids (endocannabinoids) are small molecules biosynthesized from membrane glycerophospholipid. Anandamide (AEA) is an endogenous intestinal cannabinoid that controls appetite and energy balance by engagement of the enteric nervous system through cannabinoid receptors. Here, we uncover a role for AEA and its receptor, cannabinoid receptor 2 (CB2), in the regulation of immune tolerance in the gut and the pancreas. This work demonstrates a major immunological role for an endocannabinoid. The pungent molecule capsaicin (CP) has a similar effect as AEA; however, CP acts by engagement of the vanilloid receptor TRPV1, causing local production of AEA, which acts through CB2. We show that the engagement of the cannabinoid/vanilloid receptors augments the number and immune suppressive function of the regulatory CX3CR1 hi macrophages (Mϕ), which express the highest levels of such receptors among the gut immune cells. Additionally, TRPV1 -/- or CB2 -/- mice have fewer CX3CR1 hi Mϕ in the gut. Treatment of mice with CP also leads to differentiation of a regulatory subset of CD4 + cells, the Tr1 cells, in an IL-27-dependent manner in vitro and in vivo. In a functional demonstration, tolerance elicited by engagement of TRPV1 can be transferred to naïve nonobese diabetic (NOD) mice [model of type 1 diabetes (T1D)] by transfer of CD4 + T cells. Further, oral administration of AEA to NOD mice provides protection from T1D. Our study unveils a role for the endocannabinoid system in maintaining immune homeostasis in the gut/pancreas and reveals a conversation between the nervous and immune systems using distinct receptors.

  1. Air quality impacts of increased use of ethanol under the United States’ Energy Independence and Security Act

    Science.gov (United States)

    Cook, Rich; Phillips, Sharon; Houyoux, Marc; Dolwick, Pat; Mason, Rich; Yanca, Catherine; Zawacki, Margaret; Davidson, Ken; Michaels, Harvey; Harvey, Craig; Somers, Joseph; Luecken, Deborah

    2011-12-01

    Increased use of ethanol in the United States fuel supply will impact emissions and ambient concentrations of greenhouse gases, "criteria" pollutants for which the U. S. EPA sets ambient air quality standards, and a variety of air toxic compounds. This paper focuses on impacts of increased ethanol use on ozone and air toxics under a potential implementation scenario resulting from mandates in the U. S. Energy Independence and Security Act (EISA) of 2007. The assessment of impacts was done for calendar year 2022, when 36 billion gallons of renewable fuels must be used. Impacts were assessed relative to a baseline which assumed ethanol volumes mandated by the first renewable fuels standard promulgated by U. S. EPA in early 2007. This assessment addresses both impacts of increased ethanol use on vehicle and other engine emissions, referred to as "downstream" emissions, and "upstream" impacts, i.e., those connected with fuel production and distribution. Air quality modeling was performed for the continental United States using the Community Multi-scale Air Quality Model (CMAQ), version 4.7. Pollutants included in the assessment were ozone, acetaldehyde, ethanol, formaldehyde, acrolein, benzene, and 1,3-butadiene. Results suggest that increased ethanol use due to EISA in 2022 will adversely increase ozone concentrations over much of the U.S., by as much as 1 ppb. However, EISA is projected to improve ozone air quality in a few highly-populated areas that currently have poor air quality. Most of the ozone improvements are due to our assumption of increases in nitrogen oxides (NO x) in volatile organic compound (VOC)-limited areas. While there are some localized impacts, the EISA renewable fuel standards have relatively little impact on national average ambient concentrations of most air toxics, although ethanol concentrations increase substantially. Significant uncertainties are associated with all results, due to limitations in available data. These uncertainties are

  2. 75 FR 41097 - Homeland Security Acquisition Regulation; Lead System Integrators [HSAR Case 2009-003

    Science.gov (United States)

    2010-07-15

    ... C. Regulatory Flexibility Act D. Paperwork Reduction Act E. National Environmental Policy Act I... competitive procedures, DHS takes appropriate steps to prevent any organizational conflicts of interest in the.... This rule helps to avoid organizational conflicts of interest in the award and performance of contracts...

  3. Regulation of the Private Security Sector in Africa | CRDI - Centre de ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    In Africa as elsewhere, the past decade has seen rapid growth in the private security industry. In a growing trend, key defense and security functions - such as the protection of the president and areas rich in valuable resources - are being outsourced to private companies. The recent unsuccessful coup attempt in Equatorial ...

  4. 77 FR 43039 - Federal Acquisition Regulation; Contractors Performing Private Security Functions Outside the...

    Science.gov (United States)

    2012-07-23

    ... expatriate security company (the source is 32 CFR 159.3, section (3) of the definition of ``covered contract.... Such firms are, by definition, not small businesses because they are not U.S. firms. In the small... unpredictable high-threat environment where personnel performing security functions may be called upon to use...

  5. Egr2 induced during DC development acts as an intrinsic negative regulator of DC immunogenicity.

    Science.gov (United States)

    Miah, Mohammad Alam; Byeon, Se Eun; Ahmed, Md Selim; Yoon, Cheol-Hee; Ha, Sang-Jun; Bae, Yong-Soo

    2013-09-01

    Early growth response gene 2 (Egr2), which encodes a zinc finger transcription factor, is rapidly and transiently induced in various cell types independently of de novo protein synthesis. Although a role for Egr2 is well established in T-cell development, Egr2 expression and its biological function in dendritic cells (DCs) have not yet been described. Here, we demonstrate Egr2 expression during DC development, and its role in DC-mediated immune responses. Egr2 is expressed in the later stage of DC development from BM precursor cells. Even at steady state, Egr2 is highly expressed in mouse splenic DCs. Egr2-knockdown (Egr2-KD) DCs showed increased levels of major histocompatability complex (MHC) class I and II and co-stimulatory molecules, and enhanced antigen uptake and migratory capacities. Furthermore, Egr2-KD abolished SOCS1 expression and signal transducer and activator of transcription 5 (STAT5) activation during DC development, probably resulting in the enhancement of IL-12 expression and Th1 immunogenicity of a DC vaccine. DC-mediated cytotoxic T lymphocyte (CTL) activation and antitumor immunity were significantly enhanced by Egr2-KD, and impaired by Egr2 overexpression in antigen-pulsed DC vaccines. These data suggest that Egr2 acts as an intrinsic negative regulator of DC immunogenicity and can be an attractive molecular target for DC vaccine development. © 2013 WILEY-VCH Verlag GmbH & Co. KGaA, Weinheim.

  6. Free fatty acid receptors act as nutrient sensors to regulate energy homeostasis.

    Science.gov (United States)

    Ichimura, Atsuhiko; Hirasawa, Akira; Hara, Takafumi; Tsujimoto, Gozoh

    2009-09-01

    Free fatty acids (FFAs) have been demonstrated to act as ligands of several G-protein-coupled receptors (GPCRs) (FFAR1, FFAR2, FFAR3, GPR84, and GPR120). These fatty acid receptors are proposed to play critical roles in a variety of types of physiological homeostasis. FFAR1 and GPR120 are activated by medium- and long-chain FFAs. GPR84 is activated by medium-chain, but not long-chain, FFAs. In contrast, FFAR2 and FFAR3 are activated by short-chain FFAs. FFAR1 is expressed mainly in pancreatic beta-cells and mediates insulin secretion, whereas GPR120 is expressed abundantly in the intestine and promotes the secretion of glucagon-like peptide-1 (GLP-1). FFAR3 is expressed in enteroendocrine cells and regulates host energy balance through effects that are dependent upon the gut microbiota. In this review, we summarize the identification, structure, and pharmacology of these receptors and present an essential overview of the current understanding of their physiological roles.

  7. Deficiencies of regulation of euthanasia in legal acts of foreign countries

    Directory of Open Access Journals (Sweden)

    Polaks R.

    2014-01-01

    Full Text Available Today in most countries the practising of euthanasia is not permissible and as in any case of a criminal offence, which endangers the life of a person, criminal liability applies here. However, the analysis of legal norms in foreign criminal codes reveals several deficiencies, ranging from – the absence of legal regulation which leads to a paradoxical situation, when ignoring the motive and aim of the offence, euthanasia is qualified according to the article of the criminal code which provides for liability for murder with no mitigating circumstances, but assisted suicide liability does not apply at all, – to including special legal norms pertaining to this problematic issue, in the structure of criminal codes, in the disposition of which there is an absence of several mandatory constituent elements of these particular criminal offences, thus unduly extending the provision of these norms in practice also in the cases not related to “easy death”. The deficiencies of legal acts are observed also in those few countries which allow a definite form of euthanasia and its practising by means of special laws. And most importantly, foreign legislators ignore such forms of terminating the lives of incurably ill persons as active and passive non-voluntary euthanasia, which depending on the nature of the offence requires an appropriate legal framework, which so far has not been observed.

  8. Sixth Warren K. Sinclair keynote address: The role of a strong regulator in safe and secure nuclear energy.

    Science.gov (United States)

    Lyons, Peter B

    2011-01-01

    The history of nuclear regulation is briefly reviewed to underscore the early recognition that independence of the regulator was essential in achieving and maintaining public credibility. The current licensing process is reviewed along with the status of applications. Challenges faced by both the NRC and the industry are reviewed, such as new construction techniques involving modular construction, digital controls replacing analog circuitry, globalization of the entire supply chain, and increased security requirements. The vital area of safety culture is discussed in some detail, and its importance is emphasized. Copyright © 2010 Health Physics Society

  9. 77 FR 33635 - Amendment to the Bank Secrecy Act Regulations-Requirement That Clerks of Court Report Certain...

    Science.gov (United States)

    2012-06-07

    ... business rule reflects that the definition of currency used therein is slightly different from the... Amendment to the Bank Secrecy Act Regulations--Requirement That Clerks of Court Report Certain Currency...: FinCEN is amending the rules relating to the reporting of certain currency transactions consistent...

  10. 78 FR 57402 - Privacy Act of 1974; Department of Homeland Security/U.S. Customs and Border Protection-019 Air...

    Science.gov (United States)

    2013-09-18

    ..., 1225, and 1324; and the Immigration Reform and Immigrant Responsibility Act of 1996, Public Law 104-208..., 1225, and 1324; the Illegal Immigration Reform and Immigrant Responsibility Act of 1996, Public Law 104... [[Page 57405

  11. Reflections on nuclear security. The USA's top nuclear regulator reviews the 9/11 response

    International Nuclear Information System (INIS)

    Meserve, R.A.

    2002-01-01

    There are three fundamental points related to nuclear security that should be emphasized. First, the physical protection at nuclear power plants was strong before September 11. Second, there have been no specific credible threats of a terrorist attack on nuclear power plants since September 11. Third, in light of the events of September 11, the NRC has recognized the need to reexamine past security strategies to ensure that we have the right protections in place for the long term. Following the attacks, the NRC issued over 30 safeguards and threat advisories to the major licensed facilities, placing them on the highest security level. Security across the nuclear industry was enhanced as a result of these actions, and many of the strengthened security measures are now requirements as a result of subsequently issued NRC Orders. One should note that nuclear facilities are the strongest and most well protected civilian facilities in our country. But the need to enhance those protections must be recognized. The NRC is dedicated to meeting the obligation to protect the public health and safety and the common defense and security from threats of all kinds. Much has been accomplished over the last year, but there is more to be done. Put in place within months of the September 2001 terrorist attacks, the IAEA's Action Plan on Nuclear Security is now being implemented on many fronts worldwide

  12. 17 CFR 239.33 - Form F-3, for registration under the Securities Act of 1933 of securities of certain foreign...

    Science.gov (United States)

    2010-04-01

    ... holding company and that the assets and liabilities of the successor at the time of succession were... Commission and posted on its corporate Web site, if any, all Interactive Data Files required to be submitted...) Primary offerings by certain registrants. Securities to be offered for cash by or on behalf of a...

  13. 17 CFR 239.13 - Form S-3, for registration under the Securities Act of 1933 of securities of certain issuers...

    Science.gov (United States)

    2010-04-01

    ... predecessor or forming a holding company and that the assets and liabilities of the successor at the time of... posted on its corporate Web site, if any, all Interactive Data Files required to be submitted and posted... offerings by certain registrants. Securities to be offered for cash by or on behalf of a registrant, or...

  14. 76 FR 66937 - Privacy Act of 1974; Department of Homeland Security/United States Secret Service-003 Non...

    Science.gov (United States)

    2011-10-28

    ... 1974; Department of Homeland Security/United States Secret Service--003 Non-Criminal Investigation... Security/United States Secret Service--003 Non-Criminal Investigation Information System.'' As a result of... Secret Service, 245 Murray Lane SW., Building T-5, Washington, DC 20223. For privacy issues please...

  15. 76 FR 60385 - Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security U.S...

    Science.gov (United States)

    2011-09-29

    ... for Disclosures) because release of the accounting of disclosures could alert the subject of an... efforts to preserve national security. Disclosure of the accounting would also permit the individual who... ongoing law enforcement, national security or fraud investigation; to avoid disclosure of investigative...

  16. 12 CFR 226.36 - Prohibited acts or practices in connection with credit secured by a consumer's principal dwelling.

    Science.gov (United States)

    2010-01-01

    ... credit secured by a consumer's principal dwelling. 226.36 Section 226.36 Banks and Banking FEDERAL... with credit secured by a consumer's principal dwelling. (a) Mortgage broker defined. For purposes of...) Misrepresentation of value of consumer's dwelling—(1) Coercion of appraiser. In connection with a consumer credit...

  17. Clean/alternative fueled fleet programs - 1990 Amendments to the Clean Air Act, the Colorado Air Pollution Prevention and Control Act, and Denver City and County regulations

    International Nuclear Information System (INIS)

    Bowles, S.L.; Manderino, L.A.

    1993-01-01

    Despite substantial regulations for nearly two decades, attainment of this ambient standards for ozone and carbon monoxide (CO) remain difficult goals to achieve, Even with of ozone precursors and CO. The 1990 Amendments to the Clean Air Act (CAA90) prescribe further reductions of mobile source emissions. One such reduction strategy is using clean fuels, such as methanol, ethanol, or other alcohols (in blends of 85 percent or more alcohol with gasoline or other fuel), reformulated gasoline or diesel, natural gas, liquified petroleum gas, hydrogen, or electricity. There are regulatory measures involving special fuels which will be required in areas heavily polluted with ozone and CO. The state of Colorado recently passed the 1992 Air Pollution Prevention and Control Act which included provisions for the use of alternative fuels which will be implemented in 1994. In addition to adhering to the Colorado state regulations, the city and county of Denver also have regulations pertaining to the use of alternative fuels in fleets of 10 or more vehicles. Denver's program began in 1992. This paper will address the issue of fleet conversion and its impact on industry in Colorado, and Denver in particular

  18. International cooperation for the development of consistent and stable transportation regulations to promote and enhance safety and security

    International Nuclear Information System (INIS)

    Strosnider, J.

    2004-01-01

    International commerce of radioactive materials crosses national boundaries, linking separate regulatory institutions with a common purpose and making it necessary for these institutions to work together in order to achieve common safety goals in a manner that does not place an undue burden on industry and commerce. Widespread and increasing use of radioactive materials across the world has led to increases in the transport of radioactive materials. The demand for consistency in the oversight of international transport has also increased to prevent unnecessary delays and costs associated with incongruent or redundant regulatory requirements by the various countries through which radioactive material is transported. The International Atomic Energy Agency (IAEA) is the authority for international regulation of transportation of radioactive materials responsible for promulgation of regulations and guidance for the establishment of acceptable methods of transportation for the international community. As such, the IAEA is seen as the focal point for consensus building between its Member States to develop consistency in transportation regulations and reviews and to ensure the safe and secure transport of radioactive material. International cooperation is also needed to ensure stability in our regulatory processes. Changes to transportation regulations should be based on an anticipated safety benefit supported by risk information and insights gained from continuing experience, evaluation, and research studies. If we keep safety as the principle basis for regulatory changes, regulatory stability will be enhanced. Finally, as we endeavour to maintain consistency and stability in our international regulations, we must be mindful of the new security challenges that lay before the international community as a result of a changing terrorist environment. Terrorism is a problem of global concern that also requires international cooperation and support, as we look for ways to

  19. DEPARTMENT OF ENERGY: Views on Proposed Civil Penalties, Security Oversight, and External Safety Regulation Legislation

    National Research Council Canada - National Science Library

    Jones, Gary

    2000-01-01

    This report provides the General Accounting Office's views on three bills designed to improve worker and nuclear facility safety and health as well as to enhance security for the Department of Energy (DOE...

  20. 76 FR 59926 - Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security/U.S...

    Science.gov (United States)

    2011-09-28

    ... are promulgating the regulation ``Immigration Benefits Business Transformation, Increment I'' (August... regulation will assist USCIS in the transformation of its operations by removing references and processes...

  1. 76 FR 60059 - Privacy Act of 1974; Department of Homeland Security/U.S. Citizenship and Immigration Services...

    Science.gov (United States)

    2011-09-28

    ... and USCIS are promulgating the regulation ``Immigration Benefits Business Transformation, Increment I... regulation will assist USCIS in the transformation of its electronics operations by removing references and...

  2. Selected text of Atomic Energy Act, Executive Orders and other laws of general interest to safeguards and security executives

    International Nuclear Information System (INIS)

    Cadwell, J.J.; Ruger, C.J.

    1995-12-01

    This document is one of a three report set, BNL 52201 contains detailed information for use by executives. BNL 52202 is titled, U.S. Statutes of General Interest to Safeguards and Security Officers, and contains less detail than BNL 52201. It is intended for use by officers. BNL 52203 is titled, U.S.Statutes for Enforcement by Security Inspectors, and only contains statutes to be applied by uniformed security inspectors. These are a newly updated version of a set of documents of similar titles published in September 1988, which were an updated version of an original set of documents published in November 1983

  3. Environmental impact assessment modern dressed? To the amendment of the EIA act and other acts and regulations; Umweltvertraeglichkeitspruefung im modernen Gewand? Zur Aenderung des UVP-Gesetzes und zahlreicher weiterer Gesetze und Verordnungen

    Energy Technology Data Exchange (ETDEWEB)

    Feldmann, Ulrike

    2017-03-15

    On 22 December 2016, the Federal Ministry for the Environment (BMUB) presented the ''Draft Act for the Modernization of the Act on the Environmental Impact Assessment'' within the framework of the association consultation, as well as the ''Draft first Ordinance Amending the Ordinance on the Approval Procedure - 9. BImSchV''. The EIA Modernization Act as well as the Atomic Act Procedure Regulation and the Federal Mining Act should be revised by terms of an omnibus act. The association consultation was held on 18 January 2017.

  4. Austria; Financial Sector Assessment Program Update Technical Note: Factual Update and Analysis of the IOSCO Objectives and Principles of Securities Regulation

    OpenAIRE

    International Monetary Fund

    2008-01-01

    This technical note focuses on the International Organization of Securities Commissions objectives and principles of securities regulations of Austria. The 2003 assessment found that Austria had fully broadly implemented a large majority of principles. The human resources of the Securities Supervision Department of the Financial Market Authority (FMA) should be increased, especially to conduct on-site inspections, in addition to the 14 planned appointments. Administrative fines should be rais...

  5. Do privacy and security regulations need a status update? Perspectives from an intergenerational survey.

    Science.gov (United States)

    Pereira, Stacey; Robinson, Jill Oliver; Peoples, Hayley A; Gutierrez, Amanda M; Majumder, Mary A; McGuire, Amy L; Rothstein, Mark A

    2017-01-01

    The importance of health privacy protections in the era of the "Facebook Generation" has been called into question. The ease with which younger people share personal information about themselves has led to the assumption that they are less concerned than older generations about the privacy of their information, including health information. We explored whether survey respondents' views toward health privacy suggest that efforts to strengthen privacy protections as health information is moved online are unnecessary. Using Amazon's Mechanical Turk (MTurk), which is well-known for recruitment for survey research, we distributed a 45-item survey to individuals in the U.S. to assess their perspectives toward privacy and security of online and health information, social media behaviors, use of health and fitness devices, and demographic information. 1310 participants (mean age: 36 years, 50% female, 78% non-Hispanic white, 54% college graduates or higher) were categorized by generations: Millennials, Generation X, and Baby Boomers. In multivariate regression models, we found that generational cohort was an independent predictor of level of concern about privacy and security of both online and health information. Younger generations were significantly less likely to be concerned than older generations (all P privacy or security of online or health information (all P > 0.05). This study is limited by the non-representativeness of our sample. Though Millennials reported lower levels of concern about privacy and security, this was not related to internet or social media behaviors, and majorities within all generations reported concern about both the privacy and security of their health information. Thus, there is no intergenerational imperative to relax privacy and security standards, and it would be advisable to take privacy and security of health information more seriously.

  6. Do privacy and security regulations need a status update? Perspectives from an intergenerational survey

    Science.gov (United States)

    Pereira, Stacey; Robinson, Jill Oliver; Gutierrez, Amanda M.; Majumder, Mary A.; McGuire, Amy L.; Rothstein, Mark A.

    2017-01-01

    Background The importance of health privacy protections in the era of the “Facebook Generation” has been called into question. The ease with which younger people share personal information about themselves has led to the assumption that they are less concerned than older generations about the privacy of their information, including health information. We explored whether survey respondents’ views toward health privacy suggest that efforts to strengthen privacy protections as health information is moved online are unnecessary. Methods Using Amazon’s Mechanical Turk (MTurk), which is well-known for recruitment for survey research, we distributed a 45-item survey to individuals in the U.S. to assess their perspectives toward privacy and security of online and health information, social media behaviors, use of health and fitness devices, and demographic information. Results 1310 participants (mean age: 36 years, 50% female, 78% non-Hispanic white, 54% college graduates or higher) were categorized by generations: Millennials, Generation X, and Baby Boomers. In multivariate regression models, we found that generational cohort was an independent predictor of level of concern about privacy and security of both online and health information. Younger generations were significantly less likely to be concerned than older generations (all P privacy or security of online or health information (all P > 0.05). Limitations This study is limited by the non-representativeness of our sample. Conclusions Though Millennials reported lower levels of concern about privacy and security, this was not related to internet or social media behaviors, and majorities within all generations reported concern about both the privacy and security of their health information. Thus, there is no intergenerational imperative to relax privacy and security standards, and it would be advisable to take privacy and security of health information more seriously. PMID:28926626

  7. Corporate reporting, security regulation and trading on the Kuwaiti stock exchange (KSE – institutional implications for research

    Directory of Open Access Journals (Sweden)

    Eiman A. Algharaballi

    2012-06-01

    Full Text Available The regulation of equities trading in Kuwait over the period from 1983 to 2011 is documented in this paper. An eclectic approach has resulted in overlapping responsibilities for the three main regulatory and supervisory bodies. Regulation appears to be responsive to market crises. As a result, regulations have tended to change with market conditions. Kuwaiti accounting and auditing requirements are also reviewed. The institutional setting in Kuwait has a number of implications for capital market-based research. Informational inefficiency precludes research that relies on the assumption that security price reflects firm value. Other features (including the profit requirement, lock-up restrictions and the two auditor rule provide opportunities for capital market research in Kuwait.

  8. 75 FR 5609 - Privacy Act of 1974; Department of Homeland Security/ALL-024 Facility and Perimeter Access...

    Science.gov (United States)

    2010-02-03

    ..., date of birth, and social security number. Organization's name; Citizenship; Country of origin, if... servers, magnetic disc, tape, digital media, and CD-ROM. Retrievability: Records may be retrieved by...

  9. Example of a single national regulator responsible for both transport safety and security

    International Nuclear Information System (INIS)

    Karhu, P.; Lahkola, A.; Markkanen, M.; Hellstén, S.

    2016-01-01

    Safety and security in the use of nuclear energy and in the use of radiation, including the transport of nuclear and other radioactive material, share a common objective: to protect people, society, environment, and future generations from the harmful effects of ionizing radiation. Some measures for safety contribute to those for security, and vice versa, while some requirements of one conflict with those of the other. The differences in the requirements arise from the difference in the threat against which the measures are designed: accident vs. intent. A coordinated approach endeavours to take advantage of the similarities and to avoid the problems caused by the differences. One way to implement it is to have one competent authority responsible for the regulatory control of safety and security. It is the experience in Finland that this enables an efficient regulatory system. From the operators’ point of view, a one-stop shop regulatory authority ensures that requirements for safety and security are consistent. Both safety and security require the involvement of and cooperation between several authorities—regulatory, rescue, law enforcement—and operators. The approach in Finland is built on cooperation and a clear division of competences and responsibilities. One regulatory authority provides a fixed point of contact within the professional cooperation network as well as for the public. The one regulatory authority is also easily identifiable, as appropriate, as a point of contact in international cooperation in implementing nuclear and radiation safety and security. Whatever the national regulatory framework and the assignment of responsibilities between authorities, cooperation is essential in house, nationally, and internationally. (author)

  10. Do privacy and security regulations need a status update? Perspectives from an intergenerational survey.

    Directory of Open Access Journals (Sweden)

    Stacey Pereira

    Full Text Available The importance of health privacy protections in the era of the "Facebook Generation" has been called into question. The ease with which younger people share personal information about themselves has led to the assumption that they are less concerned than older generations about the privacy of their information, including health information. We explored whether survey respondents' views toward health privacy suggest that efforts to strengthen privacy protections as health information is moved online are unnecessary.Using Amazon's Mechanical Turk (MTurk, which is well-known for recruitment for survey research, we distributed a 45-item survey to individuals in the U.S. to assess their perspectives toward privacy and security of online and health information, social media behaviors, use of health and fitness devices, and demographic information.1310 participants (mean age: 36 years, 50% female, 78% non-Hispanic white, 54% college graduates or higher were categorized by generations: Millennials, Generation X, and Baby Boomers. In multivariate regression models, we found that generational cohort was an independent predictor of level of concern about privacy and security of both online and health information. Younger generations were significantly less likely to be concerned than older generations (all P 0.05.This study is limited by the non-representativeness of our sample.Though Millennials reported lower levels of concern about privacy and security, this was not related to internet or social media behaviors, and majorities within all generations reported concern about both the privacy and security of their health information. Thus, there is no intergenerational imperative to relax privacy and security standards, and it would be advisable to take privacy and security of health information more seriously.

  11. 75 FR 12377 - Native American Graves Protection and Repatriation Act Regulations-Disposition of Culturally...

    Science.gov (United States)

    2010-03-15

    ... support of a particular religious point of view or excessive entanglement with religion in the context of... Religious Freedom Act. Our Response: The proposed change revised the regulatory definition of cultural... Freedom Act. Section 10.2(e)(2) Definition of Culturally Unidentifiable Section 10.2(e)(2) defines the...

  12. 78 FR 57808 - Rules and Regulations Under the Wool Products Labeling Act of 1939

    Science.gov (United States)

    2013-09-20

    ... noted a Cashmere and Camel Hair Manufacturers Institute study finding that, between 2004 and 2009, false... wool.\\26\\ The Joint Comment, however, reported the lack of consensus in the trade regarding ``how the S... with the Wool Act, to establish a complete defense to false advertising claims under the Lanham Act as...

  13. 78 FR 8963 - Update of Existing Privacy Act-NASA Regulations

    Science.gov (United States)

    2013-02-07

    ... FR 60622] inadvertently omits the responsibility of NASA's Freedom of Information Act (FOIA) Office..., this correction adds responsibility of the FOIA Office. This corrections also corrects the title to Sec... appropriate system manager, or, if unknown, to the Center Privacy Manager or Freedom of Information Act (FOIA...

  14. 76 FR 63817 - Disclosure of Information; Privacy Act Regulations; Notice and Amendments

    Science.gov (United States)

    2011-10-14

    ..., paper, reports of examination, work papers, and correspondence relating to such reports, to the.... Regulatory Flexibility Act The Regulatory Flexibility Act, 5 U.S.C. 601, et seq., (RFA) applies only to rules... and comment requirements of the APA, the requirement to prepare a final regulatory flexibility...

  15. 14 CFR 374.3 - Compliance with the Consumer Credit Protection Act and regulations.

    Science.gov (United States)

    2010-01-01

    ... requirements of the Consumer Credit Protection Act, 15 U.S.C. 1601-1693r. Any violation of the following... PROTECTION ACT WITH RESPECT TO AIR CARRIERS AND FOREIGN AIR CARRIERS § 374.3 Compliance with the Consumer... 14 Aeronautics and Space 4 2010-01-01 2010-01-01 false Compliance with the Consumer Credit...

  16. 78 FR 54250 - Federal Acquisition Regulation; Information Collection; American Recovery and Reinvestment Act...

    Science.gov (United States)

    2013-09-03

    ... Recovery Act; d. A narrative description of the employment impact of the Recovery Act funded work; and e... subcontracts awarded to a subcontractor that in the previous tax year had gross income under $300,000, the... data was a sufficient baseline for estimating the number of respondents per year (2,247) that would...

  17. 25 CFR 309.1 - How do the regulations in this part carry out the Indian Arts and Crafts Act of 1990?

    Science.gov (United States)

    2010-04-01

    ... Arts and Crafts Act of 1990? 309.1 Section 309.1 Indians INDIAN ARTS AND CRAFTS BOARD, DEPARTMENT OF THE INTERIOR PROTECTION OF INDIAN ARTS AND CRAFTS PRODUCTS § 309.1 How do the regulations in this part carry out the Indian Arts and Crafts Act of 1990? These regulations define the nature and Indian origin...

  18. DEPARTMENT OF ENERGY: Views on Proposed Civil Penalties, Security Oversight, and External Safety Regulation Legislation

    National Research Council Canada - National Science Library

    Jones, Gary

    2000-01-01

    .... 3383 would amend the Atomic Energy Act by eliminating the exemption that currently allows certain nonprofit contractors to avoid paying civil penalties if they violate DOE's nuclear safety rules...

  19. Gli3 acts as a repressor downstream of Ihh in regulating two distinct steps of chondrocyte differentiation.

    Science.gov (United States)

    Koziel, Lydia; Wuelling, Manuela; Schneider, Sabine; Vortkamp, Andrea

    2005-12-01

    During endochondral ossification, the secreted growth factor Indian hedgehog (Ihh) regulates several differentiation steps. It interacts with a second secreted factor, parathyroid hormone-related protein (PTHrP), to regulate the onset of hypertrophic differentiation, and it regulates chondrocyte proliferation and ossification of the perichondrium independently of PTHrP. To investigate how the Ihh signal is translated in the different target tissues, we analyzed the role of the zinc-finger transcription factor Gli3, which acts downstream of hedgehog signals in other organs. Loss of Gli3 in Ihh mutants restores chondrocyte proliferation and delays the accelerated onset of hypertrophic differentiation observed in Ihh-/- mutants. Furthermore the expression of the Ihh target genes patched (Ptch) and PTHrP is reactivated in Ihh-/-;Gli3-/- mutants. Gli3 seems thus to act as a strong repressor of Ihh signals in regulating chondrocyte differentiation. In addition, loss of Gli3 in mice that overexpress Ihh in chondrocytes accelerates the onset of hypertrophic differentiation by reducing the domain and possibly the level of PTHrP expression. Careful analysis of chondrocyte differentiation in Gli3-/- mutants revealed that Gli3 negatively regulates the differentiation of distal, low proliferating chondrocytes into columnar, high proliferating cells. Our results suggest a model in which the Ihh/Gli3 system regulates two distinct steps of chondrocyte differentiation: (1) the switch from distal into columnar chondrocytes is repressed by Gli3 in a PTHrP-independent mechanism; (2) the transition from proliferating into hypertrophic chondrocytes is regulated by Gli3-dependent expression of PTHrP. Furthermore, by regulating distal chondrocyte differentiation, Gli3 seems to position the domain of PTHrP expression.

  20. GP supervisors' experience in supporting self-regulated learning: a balancing act

    NARCIS (Netherlands)

    Sagasser, M.H.; Kramer, A.W.M.; Weel, C. van; Vleuten, C.P.M. van der

    2015-01-01

    Self-regulated learning is essential for professional development and lifelong learning. As self-regulated learning has many inaccuracies, the need to support self-regulated learning has been recommended. Supervisors can provide such support. In a prior study trainees reported on the variation in

  1. Regulations under the Radiation Protection and Control Act, 1982, No. 27 of 1984

    International Nuclear Information System (INIS)

    1984-01-01

    These regulations provide for the control and administration of transporting, packaging and storing radioactive materials in South Australia. Such operations must be carried out in accordance with the Code of Practice for the Safe Transport of Radioactive Substances, the present Regulations and the IAEA Regulations for the Safe Transport of Radioactive Materials (1973 Edition), slightly amended for purposes of national application. (NEA) [fr

  2. GP Supervisors' Experience in Supporting Self-Regulated Learning: A Balancing Act

    Science.gov (United States)

    Sagasser, Margaretha H.; Kramer, Anneke W. M.; van Weel, Chris; van der Vleuten, Cees P. M.

    2015-01-01

    Self-regulated learning is essential for professional development and lifelong learning. As self-regulated learning has many inaccuracies, the need to support self-regulated learning has been recommended. Supervisors can provide such support. In a prior study trainees reported on the variation in received supervisor support. This study aims at…

  3. Utilization of coal fly ash in construction in relation to regulations within the framework of the Dutch Soil Protection Act

    International Nuclear Information System (INIS)

    van der Sloot, H.A.

    1991-01-01

    In 1987, the Dutch Government passed the Soil Protection Act. Within the framework of this act aiming at reduction of soil pollution by anthropogenic activities, a number of regulations will be enforced. One of these is the Regulation for Construction Materials, which is intended to control environmental impacts resulting from the utilization of industrial residues in construction. The regulation will apply to all conventional materials used in construction and raw materials derived from waste materials. For effective enforcement of this regulation by 1992, a full set of well documented procedures are needed to cover such aspects as sampling, storage, analysis of solids and liquids, leaching, and evaluation of test results. These procedures should ultimately be available as national (NEN), or preferably internationally (CEN, ISO), agreed standard protocols. A coherent program of projects has been started in 1990 in association with the Dutch Normalization Institute to generate these protocols and initiate the necessary research activities. As a result of the new regulations, initiatives have been taken to certify industrial residues for certain applications. The utilization of coal combustion residues in construction is governed by certificates. Thus, quality control at the utilities is an integral part of coal fly ash utilization and marketing. For public acceptance of utilization of these materials, quality control and certification is an essential element along with demonstrations of proper performance in practice

  4. The regulation of hazardous air pollutants under the Clean Air Act Amendments of 1990: Effects on the Portland cement industry

    International Nuclear Information System (INIS)

    Mikols, E.H.; Gill, A.S.; Dougherty, A.

    1996-01-01

    Title III of the 1990 Clean Air Act Amendments (CAAA) addresses the control of hazardous air pollutants (HAPs) from major sources of air pollution in the US. In the CAAA, Congress defined 189 compounds as hazardous air pollutants in need of additional control by the Environmental Protection Agency (EPA). Congress directed EPA to identify the major source categories which emit HAPs and to prepare regulations that would reduce and control future HAP emissions. This paper outlines the activities undertaken by EPA to regulate HAP emissions from Portland cement plants and the program developed by the Portland cement manufacturing industry to cope with Title III

  5. A novel radiation responsive cis-acting element regulates gene induction and mediates tissue injury

    International Nuclear Information System (INIS)

    Hallahan, Dennis E.; Virudachalam, Subbulakshmi; Kuchibahtla, Jaya

    1997-01-01

    containing binding domains for the transcription factors AP-1 and Ets. This DNA sequence (TGCCTCAGTTTCCC) is similar to antioxidant responsive element. X-ray- mediated transcriptional activation of the 5' regulatory region of ICAM-1 required the antioxidant responsive element (ARE). Electrophoretic mobility shift analysis of nuclear proteins from irradiated endothelial cells incubated with the ARE binding domain (5'-GCTGCTGCCTCAGTTTCCC-3') showed increased protein-DNA complexes at 60 and 120 minutes after irradiation. Conclusions: 1) ICAM induction in irradiated tissue occurs in the microvascular endothelium. 2) ICAM expression contributes to the pathogenesis of radiation-mediated tissue injury and the ICAM knockout serves as a model for the study of the pathogenesis of tissue injury. 3) ICAM expression is regulated by a novel radiation-inducible cis-acting element that has homology to previously identified antioxidant responsive elements

  6. Shared Solar. Current Landscape, Market Potential, and the Impact of Federal Securities Regulation

    Energy Technology Data Exchange (ETDEWEB)

    Feldman, David [National Renewable Energy Laboratory (NREL), Golden, CO (United States); Brockway, Anna M. [U.S. Department of Energy, Washington, DC (United States); Ulrich, Elaine [U.S. Department of Energy, Washington, DC (United States); Margolis, Robert [National Renewable Energy Laboratory (NREL), Golden, CO (United States)

    2015-04-07

    This report provides a high-level overview of the current U.S. shared solar landscape, the impact that a given shared solar program’s structure has on requiring federal securities oversight, as well as an estimate of market potential for U.S. shared solar deployment.

  7. Shared Solar. Current Landscape, Market Potential, and the Impact of Federal Securities Regulation

    Energy Technology Data Exchange (ETDEWEB)

    Feldman, David [National Renewable Energy Lab. (NREL), Golden, CO (United States); Brockway, Anna M. [Office of Energy Efficiency and Renewable Energy (EERE), Washington, DC (United States); Ulrich, Elaine [Office of Energy Efficiency and Renewable Energy (EERE), Washington, DC (United States); Margolis, Robert [National Renewable Energy Lab. (NREL), Golden, CO (United States)

    2015-04-01

    This report provides a high-level overview of the current U.S. shared solar landscape and the impact that a given shared solar program’s structure has on requiring federal securities oversight, as well as an estimate of market potential for U.S. shared solar deployment.

  8. 44 CFR 6.3 - Collection and use of information (Privacy Act statements).

    Science.gov (United States)

    2010-10-01

    ... in compliance with the Act and these regulations. (c) Solicitation of Social Security numbers. Before... such individual refuses to disclose his/her social security account number, the employee of FEMA shall... identity of an individual, and the social security number will become a part of a system of records in...

  9. S.1220: This Act may be referred to as the National Energy Security Act of 1991, introduced in the Senate of the United States, One Hundred Second Congress, First Session, June 5, 1991

    International Nuclear Information System (INIS)

    Anon.

    1991-01-01

    This bill would reduce the Nation's dependence on imported oil and provide for the energy security of the US. The contents of this bill are extensive. The Titles are as follows: Findings and purposes; Definitions; Corporate average fuel economy; Fleets and alternative fuels; Renewable energy; Energy efficiency; Oil and gas leasing in the Arctic National Wildlife Refuge; Advanced nuclear reactor commercialization; Nuclear reactor licensing; Uranium; Natural gas; Outer continental shelf; Research, development, demonstration and commercialization activities; Coal, coal technology, and electricity; Public Utility Holding Company Act reform; and Strategic petroleum reserve

  10. Regulating edible insects: the challenge of adressing food security, nature conservation, and the erosion of traditional food culture

    DEFF Research Database (Denmark)

    Halloran, Afton Marina Szasz; Vantomme, Paul; Hanboonsong, Y.

    2015-01-01

    Entomophagy is a common practice in many regions of the world but there are few examples of national regulations that govern insects for human consumption. Where entomophagy is not common, the current regulatory discourse focuses primarily on food safety and consumer protection. In countries where...... species, they do not appear explicitly in dietary guidelines. Although food safety is a major concern, it can undermine the importance of nature conservation, traditional food culture, food security, and potential economic development. Thus, entomophagy should be viewed holistically and development...

  11. Drinking water regulations under the Safe Drinking Water Act. Fact sheet

    International Nuclear Information System (INIS)

    1990-12-01

    The fact sheet describes the requirements covered under the 1986 amendments to the Safe Drinking Water Act. Levels of various contaminants (including radio nuclides) are explained. Also discussed are the Surface Water Treatment Rule and the Total Coliforms Rule

  12. Reflection About the Necessity of Amending Art. 8 par. 2a of the Social Security System Act on the Example of the Medical Activity

    Directory of Open Access Journals (Sweden)

    Damian Wąsik

    2014-12-01

    Full Text Available The publication discusses the problem of a controversial interpretation of art. 8 paragraph. 2a of the Social Security Act, requiring hospital treatment as actual beneficiaries “work” of doctors and nurses (midwives on duty under civil law contracts - signed with a third party. The author analyzes the accuracy of the interpretation from the perspective of medical activity assumptions, which specificity seems to be so far marginalized in the process of applying the law. The result of the author's considerations are demands to work on the amendment of the law on social insurance system taking into account the specific conditions of the exercise of the medical profession.

  13. 76 FR 58525 - Privacy Act of 1974; Department of Homeland Security, U.S. Citizenship and Immigration Services...

    Science.gov (United States)

    2011-09-21

    ... the Illegal Immigration Reform and Immigrant Responsibility Act of 1996 (IIRIRA), Public Law 104-208... locked drawer behind a locked door. The records are stored on magnetic disc, tape, digital media, and CD...

  14. 78 FR 43893 - Privacy Act of 1974; Department of Homeland Security U.S. Citizenship and Immigration Services...

    Science.gov (United States)

    2013-07-22

    ... Reform and Immigrant Responsibility Act of 1996 (IIRIRA), Public Law 104-208 (1996). Purpose(s): This... magnetic disc, tape, digital media, and CD-ROM. Retrievability: Records may be retrieved by name...

  15. 75 FR 5487 - Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security/U.S. Customs...

    Science.gov (United States)

    2010-02-03

    ... individual, is a strange use of Privacy Act exemptions. Response: The language of Routine Use M was drafted... sets of circumstances, will remain accessible for the life of the law enforcement matter. Redress and...

  16. 75 FR 51374 - Regulated Navigation Areas, Safety Zones, Security Zones; Deepwater Ports in Boston Captain of...

    Science.gov (United States)

    2010-08-20

    ... Ocean off the coast of Gloucester, Massachusetts. The purpose of these regulated areas is to protect... a water area within a defined boundary for which regulations for vessels navigating within the area..., Neptune Deepwater Port (Neptune), is located in the Atlantic Ocean, approximately eight nautical miles...

  17. Transports of radioactive materials. Legal regulations, safety and security concepts, experience; Befoerderung radioaktiver Stoffe. Rechtsvorschriften, Sicherheits- und Sicherungskonzept, Erfahrungen

    Energy Technology Data Exchange (ETDEWEB)

    Schwarz, Guenther

    2012-07-15

    In Germany, approximately 650,000 to 750,000 units containing radioactive materials for scientific, medical and technical applications are shipped annually by surface, air and water transports. Legally speaking, radioactive materials are dangerous goods which can cause hazards to life, health, property and the environment as a result of faulty handling or accidents in transit. For protection against these hazards, their shipment therefore is regulated in extensive national and international rules of protection and safety. The article contains a topical review of the international and national transport regulations and codes pertaining to shipments of radioactive materials, and of the protection concepts underlying these codes so as to ensure an adequate standard of safety and security in shipping radioactive materials in national and international goods traffic. (orig.)

  18. Taking aim at medical identity theft. Document security key element to comply with government regulations.

    Science.gov (United States)

    Raymond, Colette

    2010-01-01

    Sensitive paper documents, such as patient records, customer data, and legal information, must be securely stored and destroyed when no longer needed. This is not only a good business practice that reduces costs and protects reputations, but also a legal and regulatory imperative. According to some experts, medical identity theft is the fastest-growing form of identity theft in North America. The Federal Trade Commission's Red Flags Rule, due to take effect June 1, 2010, requires banks; credit card companies; and, in some situations, retailers, hospitals, insurance companies, health clinics, and other organizations to store confidential personal information that can expose consumers to significant identity theft risks. This also includes healthcare providers and other organizations that are considered creditors according to their billing/payment procedures. This article highlights the steps healthcare providers must take to ensure data security.

  19. Can Career Advancement and Job Security Act as Collaterals for Commitment? Evidence from the Hotel Industry of Malaysia

    OpenAIRE

    Aizzat Mohd. Nasurdin; Noor Hazlina Ahmad; Cheng Ling Tan

    2014-01-01

    This study aims to examine the role of career advancement and job security as predictors of employee commitment to their organization. Data was collected from 580 frontline employees attached to two departments of 29 luxury hotels in Peninsular Malaysia. Statistical results using Partial Least Squares technique provided support for the proposed hypotheses. In view of the findings, theoretical and practical implications are discussed.

  20. 77 FR 70792 - Privacy Act of 1974; Department of Homeland Security/ALL-004 General Information Technology...

    Science.gov (United States)

    2012-11-27

    ... agency to publish in the Federal Register a description denoting the type and character of each system of... DHS IT resources; IP address of access; Logs of Internet activity; and Records on the authentication... and Technology (NIST) Security Standards from Authentication to Certification and Accreditation...

  1. 78 FR 69983 - Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security U.S...

    Science.gov (United States)

    2013-11-22

    ...) (Accounting for Disclosures) because release of the accounting of disclosures could alert the subject of an... efforts to preserve national security. Disclosure of the accounting would also permit the individual who... relating to DHS activities from disclosure to subjects or others related to these activities. Specifically...

  2. 75 FR 81371 - Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security/United States...

    Science.gov (United States)

    2010-12-28

    ...)(3) (Accounting for Disclosures) because release of the accounting of disclosures could alert the... recipient agency. Disclosure of the accounting would therefore present a serious impediment to law enforcement efforts and/or efforts to preserve national security. Disclosure of the accounting could also...

  3. 78 FR 58254 - Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security/U.S. Customs...

    Science.gov (United States)

    2013-09-23

    ...)(3) and (4) (Accounting for Disclosures) because release of the accounting of disclosures could alert... the recipient agency. Disclosure of the accounting would therefore present a serious impediment to law enforcement efforts and/or efforts to preserve national security. Disclosure of the accounting would also...

  4. 77 FR 47767 - Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security U.S. Customs...

    Science.gov (United States)

    2012-08-10

    ... subsection (c)(3) and (4) (Accounting for Disclosures) because release of the accounting of disclosures could... as the recipient agency. Disclosure of the accounting would therefore present a serious impediment to law enforcement efforts and/or efforts to preserve national security. Disclosure of the accounting...

  5. 78 FR 20680 - Privacy Act of 1974; Department of Homeland Security/U.S. Citizenship and Immigration Services...

    Science.gov (United States)

    2013-04-05

    ... USCIS ELIS employees receive training and agree to USCIS-wide system rules of behavior before being...., involvement with national security threats, criminal offenses, Communist party, torture, genocide, killing... eligibility for requested benefits. Disclosure to consumer reporting agencies: None. Policies and practices...

  6. 75 FR 5614 - Privacy Act of 1974; Department of Homeland Security/ALL-025 Law Enforcement Authority in Support...

    Science.gov (United States)

    2010-02-03

    ...'s or entity's name; Digital photograph; Date of birth, place of birth, and age; Social security number; Duty/work address and telephone number; Alias; Race and ethnicity; Citizenship; Fingerprints; Sex... servers, magnetic disc, tape, digital media, and CD-ROM. RETRIEVABILITY: Records may be retrieved by...

  7. 78 FR 70313 - Privacy Act of 1974; Department of Homeland Security U.S. Citizenship and Immigration Services...

    Science.gov (United States)

    2013-11-25

    ... performing or working on a contract, service, grant, cooperative agreement, or other assignment for DOS, when...; Date of Birth; Gender; A-Number; Social Security number; Immigration Status; Date of Arrival in the U.S... disclosure made to such agencies, entities, and persons is reasonably necessary to assist in connection with...

  8. 78 FR 28867 - Privacy Act of 1974; Department of Homeland Security/U.S. Immigration and Customs Enforcement-014...

    Science.gov (United States)

    2013-05-16

    ... related to travel and identity documents; latent and patent finger and palm prints; and audio and video... Homeland Security Investigations (HSI) that provides a broad range of forensic, intelligence, and... finger and palm prints; and audio and video files in support of law enforcement investigations and...

  9. 76 FR 69749 - Privacy Act of 1974; Department of Homeland Security United States Coast Guard-029 Notice of...

    Science.gov (United States)

    2011-11-09

    ... person making the disclosure. I. To an organization or individual in either the public or private sector... vetting of individuals pursuant to its mission for protecting and securing the maritime sector. The..., date and place of birth, gender, country of citizenship, travel/mariner document type, number and...

  10. SURROGACY POLICY IN INDIA AND NEED OF ACTS TO REGULATE COMMERCIAL SURROGACY

    OpenAIRE

    Chaturvedi; Garg; Abha; Vidya; Praveen

    2014-01-01

    Surrogacy is an arrangement by which a woman, called as surrogate, carries and delivers the offspring of the commissioning parents and it has been recognized in India under the ART treatment. For commercial surrogacy, there is no any uniform law in India or there is no law that binds or regulates this industry. In this paper, we have focused our attention on the present existing laws or guidelines regulating surrogacy with emphasis on need for stringent laws to regulate co...

  11. New Zealand; Financial Sector Assessment Program—Detailed Assessments of Observance of Standards and Codes—International Organization of Securities Commission (IOSCO)—Objectives and Principles of Securities Regulation

    OpenAIRE

    International Monetary Fund

    2004-01-01

    This paper evaluates the Observance of Standards and Codes on the International Organization of Securities Commission (IOSCO) Objectives and Principles of Securities Regulation for New Zealand. New Zealand equity markets are comparatively small with market capitalization of about 44 percent of GDP. Reflecting a preference for property investment, ownership of New Zealand-listed equities remains mostly in the hands of offshore investors and domestic institutional investors, with only about one...

  12. The implications of RCRA [Resource Conservation and Recovery Act] regulation for the disposal of transuranic and high-level waste

    International Nuclear Information System (INIS)

    Sigmon, C.F.; Sharples, F.E.; Smith, E.D.

    1988-01-01

    In May of 1987 the Department of Energy (DOE) published a rule interpreting the definition of ''byproduct'' under the Atomic Energy Act. This byproduct rule clarified the role of the Resource Conservation and Recovery Act (RCRA) in the regulation of DOE's radioactive waste management activities. According to the rule, only the radioactive portion of DOE's mixed radioactive and hazardous waste (mixed waste), including mixed transuranic (TRU) and high-level waste (HLW), is exempt from RCRA under the byproduct exemption. The portion of a waste that is hazardous as defined by RCRA is subject to full regulation under RCRA. Because the radioactive and hazardous portions of m any, if not most, DOE wastes are likely to be inseparable, the rule in effect makes most mixed wastes subject to dual regulation. The potential application of RCRA to facilities such as the Waste Isolation Pilot Plant (WIPP) and the HLW repository creates unique challenges for both the DOE and regulatory authorities. Strategies must be developed to assure compliance with RCRA without either causing excessive administrative burdens or abandoning the goal of minimizing radiation exposure. This paper will explore some of the potential regulatory options for and recent trends in the regulation of TRU and HLW under RCRA

  13. 77 FR 54835 - Homeland Security Acquisition Regulation (HSAR); Revision Initiative [HSAR Case 2009-002...

    Science.gov (United States)

    2012-09-06

    .... We are correcting each instance of (DATE) to correctly state the appropriate date of ``(SEP 2012... response to or recovery from a natural disaster, act of terrorism, or other manmade disaster; clarified... correcting each instance of (DATE) to correctly state the appropriate date of ``(SEP 2012)''. In FR Doc. 2012...

  14. 75 FR 32723 - Revision of Department of Homeland Security Acquisition Regulation; Limitations on Subcontracting...

    Science.gov (United States)

    2010-06-09

    ... 541611 ``Administrative Management and General Management Consulting Services,'' NAICS code 721211 ``RV... 692 of the Post-Katrina Emergency Management Reform Act of 2006 (PKEMRA), Public Law 109-295, 120 Stat... disaster, and for which the Federal Emergency Management Agency has approved a fire management assistance...

  15. 17 CFR 248.16 - Protection of Fair Credit Reporting Act.

    Science.gov (United States)

    2010-04-01

    ... Reporting Act. 248.16 Section 248.16 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION (CONTINUED) REGULATIONS S-P AND S-AM Regulation S-P: Privacy of Consumer Financial Information and Safeguarding Personal Information Relation to Other Laws; Effective Date § 248.16 Protection of Fair Credit...

  16. The International Traffic in Arms Regulations: An Impediment to National Security

    National Research Council Canada - National Science Library

    Mahon, Steven G

    2008-01-01

    The International Traffic in Arms Regulations (ITAR) is putting United States (U.S.) advanced technology and weapons companies at a competitive disadvantage, particularly in the fields of satellite manufacturing and technology...

  17. Act No. 25 of 31 January 1983 amending Act No. 1103 of 4 August 1965 and Decree No. 680 of 6 March 1968 on regulations governing the activities of technicians in medical radiology

    International Nuclear Information System (INIS)

    1983-01-01

    This Act amends Act No. 1103 of 4 August 1965 and Decree No. 680 of 6 March 1968 of the President of the Republic regulating the activities of auxiliary personnel engaged in medical radiology. It establishes new conditions for training and qualifications of such technicians in respect of radiodiagnosis, radiotherapy and nuclear medicine. (NEA) [fr

  18. 76 FR 60063 - Privacy Act of 1974; Department of Homeland Security/U.S. Citizenship and Immigration Services...

    Science.gov (United States)

    2011-09-28

    ... auditing capabilities. DHS and USCIS are promulgating the regulation ``Immigration Benefits Business Transformation, Increment I'' (August 29, 2011, 76 FR 53764) to allow USCIS to transition to an electronic environment. This regulation will assist USCIS in the transformation of its operations by removing references...

  19. 76 FR 70730 - Privacy Act of 1974; Department of Homeland Security/U.S. Citizenship and Immigration Services...

    Science.gov (United States)

    2011-11-15

    ... auditing capabilities. DHS and USCIS promulgated the regulation ``Immigration Benefits Business Transformation, Increment I'' (August 29, 2011, 76 FR 53764) to allow USCIS to transition to an electronic environment. This regulation assists USCIS in the transformation of its operations by removing references and...

  20. Islamic movement and human rights: Pertubuhan Jamaah Islah Malaysia’s involvement in the “Abolish Internal Security Act Movement,” 2000-2012

    Directory of Open Access Journals (Sweden)

    Maszlee Malik

    2014-12-01

    Full Text Available Human rights has been acknowledged as one of the essential characteristics of good governance. Abuse of human rights is strongly associated with bad governance, which is believed by many to be a serious impediment to development and sustainable growth. Despite the active participations of Islamic movements in many parts of the political world, very little is known of their involvement in advocating human rights issues as part of their struggle for power. Nevertheless, as an Islamic movement and an Islamic revivalism actor in Malaysia, Pertubuhan Jamaah Islah Malaysia (JIM has shown otherwise. JIM has resembled a different attitude towards the issue of human rights that they believe as an integrated and pertinent composition of good governance. By scrutinising their political activities and discourse since 2000, it becomes clear that JIM has been actively engaged in good governance and human rights issues, especially those that relate to the political rights of citizens through its involvement in the Abolish Internal Security Act (ISA Movement (Gerakan Mansuhkan ISA. This paper examines JIM’s involvement in human rights issues with a special focus on its active and leading role in calling for the abolishment of the Internal Security Act (ISA.

  1. Market effects of environmental regulation: coal, railroads, and the 1990 Clean Air Act

    Energy Technology Data Exchange (ETDEWEB)

    Busse, M.R.; Keohane, N.O. [University of California Berkeley, Berkeley, CA (United States)

    2007-01-01

    Many environmental regulations encourage the use of 'clean' inputs. When the suppliers of such an input have market power, environmental regulation will affect not only the quantity of the input used but also its price. We investigate the effect of the Title IV emissions trading program for sulfur dioxide on the market for low-sulfur coal. We find that the two railroads transporting coal were able to price discriminate on the basis of environmental regulation and geographic location. Delivered prices rose for plants in the trading program relative to other plants, and by more at plants near a low-sulfur coal source.

  2. 76 FR 68690 - Rules and Regulations Under the Textile Fiber Products Identification Act

    Science.gov (United States)

    2011-11-07

    ... Products Identification Act; add or clarify definitions of terms set forth in the Rules; and modify its..., ``Textiles--Man-made fibres--Generic Names'' in Section 303.7.\\1\\ Later in 1998, the Commission amended the... updated version of ISO 2076: 1999(E), ``Textiles--Man-made fibres--Generic Names,'' referenced in Section...

  3. 75 FR 46859 - Lacey Act Implementation Plan; Definitions for Exempt and Regulated Articles

    Science.gov (United States)

    2010-08-04

    ... amended in 1981, is the United States' oldest wildlife protection statute. The Act combats trafficking in... cultivated for human or animal consumption, and (b) Is a species or hybrid that is cultivated on a commercial... cultivated for human or animal consumption; and (b) Is a species or hybrid that is cultivated on a commercial...

  4. 77 FR 4498 - Rules and Regulations Under the Wool Products Labeling Act of 1939

    Science.gov (United States)

    2012-01-30

    ... achieve their intended purpose without unduly burdening commerce. As part of this systematic review, the Commission requests public comment on the overall costs, benefits, necessity, and regulatory and economic..., and on the costs and benefits of certain provisions of the Wool Products Labeling Act of 1939. DATES...

  5. ATR acts stage specifically to regulate multiple aspects of mammalian meiotic silencing

    NARCIS (Netherlands)

    Royo, Hélène; Prosser, Haydn; Ruzankina, Yaroslava; Mahadevaiah, Shantha K.; Cloutier, Jeffrey M.; Baumann, Marek; Fukuda, Tomoyuki; Höög, Christer; Tóth, Attila; de Rooij, Dirk G.; Bradley, Allan; Brown, Eric J.; Turner, James M. A.

    2013-01-01

    In mammals, homologs that fail to synapse during meiosis are transcriptionally inactivated. This process, meiotic silencing, drives inactivation of the heterologous XY bivalent in male germ cells (meiotic sex chromosome inactivation [MSCI]) and is thought to act as a meiotic surveillance mechanism.

  6. 78 FR 36693 - Rules and Regulations Under the Fur Products Labeling Act

    Science.gov (United States)

    2013-06-19

    ... marketing or sale of the products would violate the Act or Rules.\\27\\ \\27\\ NRF at 5. As discussed in the... products as private label products; unless the retailers knew or should have known that the marketing or... Skills Needed To Comply As explained earlier in this document, the proposed amendments would clarify and...

  7. 20 CFR 626.4 - Table of contents for the Job Training Partnership Act regulations.

    Science.gov (United States)

    2010-04-01

    .... 628.210State Job Training Coordinating Council. 628.215State Human Resource Investment Council... and for general program management. Subpart G [Reserved] Subpart H—Job Training Partnership Act... 20 Employees' Benefits 3 2010-04-01 2010-04-01 false Table of contents for the Job Training...

  8. 75 FR 18403 - Rules of Procedure; Regulations Implementing the Government in the Sunshine Act; Implementation...

    Science.gov (United States)

    2010-04-12

    ... to Justice Act in Proceedings Before the Occupational Safety and Health Review Commission; Correction AGENCY: Occupational Safety and Health Review Commission. ACTION: Final rule; correction. [[Page 18404... OCCUPATIONAL SAFETY AND HEALTH REVIEW COMMISSION 29 CFR Parts 2200, 2203, and 2204 Rules of...

  9. 77 FR 57199 - 2012 Real Estate Settlement Procedures Act (Regulation X) Mortgage Servicing Proposal

    Science.gov (United States)

    2012-09-17

    ... servicers under a variety of business models. In some cases, creditors service mortgage loans that they... business model, servicers act primarily as payment collectors and processors, and provide minimal customer... (2011) (Thompson), available at http://digital.law.washington.edu/dspace-law/bitstream/handle/1773.1...

  10. 78 FR 4725 - Escrow Requirements Under the Truth in Lending Act (Regulation Z)

    Science.gov (United States)

    2013-01-22

    ... the Truth in Lending Act (TILA), 15 U.S.C. 1601 et seq., based on findings that economic stability... Current Mortgage Origination Market Even with the economic downturn and tightening of credit standards...'' numbered 7, 10, 11, and 12, maintained by the Economic Research Service (ERS) of the United States...

  11. 29 CFR 1903.2 - Posting of notice; availability of the Act, regulations and applicable standards.

    Science.gov (United States)

    2010-07-01

    ... compliance with the posting requirements of section 8(c)(1) of the Act. Employers whose operations are not... business is conducted or where services or industrial operations are performed. (For example: A factory, mill, store, hotel, restaurant, movie theatre, farm, ranch, bank, sales office, warehouse, or central...

  12. 77 FR 76861 - Removal of Job Training Partnership Act Implementing Regulations

    Science.gov (United States)

    2012-12-31

    ..., 633, 634, 636, 637, and 638 RIN 1205-AB68 Removal of Job Training Partnership Act Implementing...=FR . SUPPLEMENTARY INFORMATION: I. Direct Final Rule Procedure Since removal of the Job Training... barriers to employment for participation in the labor force by providing job training and other services...

  13. Regulating the advertising of genetic tests in Europe: a balancing act.

    Science.gov (United States)

    Kalokairinou, Louiza; Borry, Pascal; Howard, Heidi Carmen

    2017-10-01

    Direct-to-consumer (DTC) genetic tests (GT) have provoked criticism over their potential adverse impact on public health. The European Parliament called for a ban on DTC advertising of GT during the debate for the adoption of a European Regulation on in vitro diagnostic medical devices. This proposal, however, was not ultimately retained in the final text. Instead, the regulation includes an article prohibiting misleading claims for this kind of advertising. These two different approaches raise questions about the optimal degree of regulation. Herein, we provide an overview of the ways GT have been advertised and related ethical issues. Subsequently, the laws regulating the advertising of GT at the European Union and national level are examined. Finally, recent regulatory developments are discussed. © Article author(s) (or their employer(s) unless otherwise stated in the text of the article) 2017. All rights reserved. No commercial use is permitted unless otherwise expressly granted.

  14. Reforming the Regulation of Therapeutic Products in Canada: The Protecting of Canadians from Unsafe Drugs Act (Vanessa’s Law

    Directory of Open Access Journals (Sweden)

    Katherine Fierlbeck

    2016-11-01

    Full Text Available Enacted November 2014, Vanessa’s Law amends the Food and Drugs Act to give Health Canada greater powers to compel the disclosure of information, recall drugs and devices, impose fines and injunctions, and collect post-market safety information. The Act amends seriously outdated legislation that had been in place since 1954. While the explicit goals of the Act are to improve patient safety and provide transparency, it also establishes a regulatory framework that facilitates investment in the burgeoning field of biotechnology. While regulatory reform was already on the public agenda, public awareness of litigation against large pharmaceutical firms combined with the championing of the legislation by Conservative MP Terence Young, whose daughter Vanessa died from an adverse drug reaction, pushed the legislation through to implementation. Many key aspects of the Act depend upon the precise nature of supporting regulations that are still to be implemented. Despite the new powers conferred by the legislation on the Minister of Health, there is some concern that these discretionary powers may not be exercised, and that Health Canada may not have sufficient resources to take advantage of these new powers. Given experience to date since enactment, the new legislation, designed to provide greater transparency vis-à-vis therapeutic products, may actually have a chilling effect on independent scrutiny.

  15. 78 FR 4347 - Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security; U.S. Customs...

    Science.gov (United States)

    2013-01-22

    ... Secretary 6 CFR Part 5 [Docket No. DHS-2012-0035] Privacy Act of 1974: Implementation of Exemptions... trademark or copyright. This information allows retailers, consumers, and other businesses to contact the..., law enforcement, or intelligence agencies (federal, state, local, foreign, international or tribal) in...

  16. 78 FR 15889 - Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security U.S. Customs...

    Science.gov (United States)

    2013-03-13

    ... individual. However, the Privacy Act requires DHS to maintain an accounting of the disclosures made pursuant...)(3) and (4) (Accounting for Disclosures) because release of the accounting of disclosures could alert... the recipient agency. Disclosure of the accounting would therefore present a serious impediment to law...

  17. 76 FR 67621 - Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security U.S. Customs...

    Science.gov (United States)

    2011-11-02

    ...., Washington, DC 20229. For privacy issues please contact: Mary Ellen Callahan (703) 235-0780), Chief Privacy... Secretary 6 CFR Part 5 [Docket No. DHS-2011-0103] Privacy Act of 1974: Implementation of Exemptions... of Records AGENCY: Privacy Office, DHS. ACTION: Notice of proposed rulemaking. SUMMARY: The...

  18. 78 FR 4079 - Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security U.S. Customs...

    Science.gov (United States)

    2013-01-18

    ... Ninth Street NW., Washington, DC 20229. For privacy issues please contact: Jonathan R. Cantor (202-343... Secretary 6 CFR Part 5 [Docket No. DHS 2012-0076] Privacy Act of 1974: Implementation of Exemptions...), System of Records AGENCY: Privacy Office, DHS. ACTION: Notice of proposed rulemaking. SUMMARY: The...

  19. Who regulates the disposal of low-level radioactive waste under the Low-Level Radioactive Waste Policy Act

    International Nuclear Information System (INIS)

    Mostaghel, D.M.

    1988-01-01

    The present existence of immense quantities of low-level nuclear waste, a federal law providing for state or regional control of such waste disposal, and a number of state disposal laws challenged on a variety of constitutional grounds underscore what currently may be the most serious problem in nuclear waste disposal: who is to regulate the disposal of low-level nuclear wastes. This problem's origin may be traced to crucial omissions in the Atomic Energy Act of 1946 and its 1954 amendments (AEA) that concern radioactive waste disposal. Although the AEA states that nuclear materials and facilities are affected with the public interest and should be regulated to provide for the public health and safety, the statute fails to prescribe specific guidelines for any nuclear waste disposal. The Low-Level Radioactive Waste Policy Act of 1980 (LLRWPA) grants states some control over radioactive waste disposal, an area from which they were previously excluded by the doctrine of federal preemption. This Comment discusses the question of who regulates low-level radioactive waste disposal facilities by examining the following: the constitutional doctrines safeguarding federal government authority; area of state authority; grants of specific authority delegations under the LLRWPA and its amendment; and finally, potential problems that may arise depending on whether ultimate regulatory authority is deemed to rest with single states, regional compacts, or the federal government

  20. Atomic Energy Act (AtG) and subordinate legislation. Collections. 35. ed.

    International Nuclear Information System (INIS)

    Ziegler, Eberhard

    2018-01-01

    The Atomic Energy Act (AtG) and subordinate legislation covers the following issues: The German constitution, the atomic energy act, subordinate process regulations, radiation protection regulation, X-ray regulation, financial security regulation, cost regulations, safety delegate and reporting regulations, law on the installation of a Federal Office for nuclear disposal security, site selection law, final repository advance financing, radioactive waste transport regulation, disposal fund law, regulation on the payment receipt according to the disposal fund law, transitional disposal law, transparency law, run-off liability law, law on the installation of the Federal office for radiation protection, radiation protection law, food irradiation law, regulation on drug treatment with radioactivity or ionizing radiation, Paris agreement on nuclear liabilities and additional agreement, joint protocol on the application of the Vienna and Paris agreements, environmental compatibility assessment law, criminal code (partial), state competence regulations on the execution of regulations according the atomic energy act.

  1. Atomic Energy Act (AtG) and subordinate legislation. Collections. 35. ed.; Atomgesetz mit Verordnungen. Textsammlung

    Energy Technology Data Exchange (ETDEWEB)

    Ziegler, Eberhard (ed.)

    2018-03-01

    The Atomic Energy Act (AtG) and subordinate legislation covers the following issues: The German constitution, the atomic energy act, subordinate process regulations, radiation protection regulation, X-ray regulation, financial security regulation, cost regulations, safety delegate and reporting regulations, law on the installation of a Federal Office for nuclear disposal security, site selection law, final repository advance financing, radioactive waste transport regulation, disposal fund law, regulation on the payment receipt according to the disposal fund law, transitional disposal law, transparency law, run-off liability law, law on the installation of the Federal office for radiation protection, radiation protection law, food irradiation law, regulation on drug treatment with radioactivity or ionizing radiation, Paris agreement on nuclear liabilities and additional agreement, joint protocol on the application of the Vienna and Paris agreements, environmental compatibility assessment law, criminal code (partial), state competence regulations on the execution of regulations according the atomic energy act.

  2. 76 FR 70739 - Privacy Act of 1974; Department of Homeland Security/U.S. Citizenship and Immigration Services...

    Science.gov (United States)

    2011-11-15

    ... the regulation ``Immigration Benefits Business Transformation, Increment I'' (August 29, 2011, 76 FR... in the transformation of its operations by removing references and processes that inhibit the use of...

  3. 76 FR 60070 - Privacy Act of 1974; Department of Homeland Security/U.S. Citizenship and Immigration Services...

    Science.gov (United States)

    2011-09-28

    ... ``Immigration Benefits Business Transformation, Increment I'' (August 29, 2011, 76 FR 53764) to allow for USCIS to transition to an electronic environment. This regulation will assist USCIS in the transformation...

  4. Arabidopsis MADS-Box Transcription Factor AGL21 Acts as Environmental Surveillance of Seed Germination by Regulating ABI5 Expression.

    Science.gov (United States)

    Yu, Lin-Hui; Wu, Jie; Zhang, Zi-Sheng; Miao, Zi-Qing; Zhao, Ping-Xia; Wang, Zhen; Xiang, Cheng-Bin

    2017-06-05

    Seed germination is a crucial checkpoint for plant survival under unfavorable environmental conditions. Abscisic acid (ABA) signaling plays a vital role in integrating environmental information to regulate seed germination. It has been well known that MCM1/AGAMOUS/DEFICIENS/SRF (MADS)-box transcription factors are key regulators of seed and flower development in Arabidopsis. However, little is known about their functions in seed germination. Here we report that MADS-box transcription factor AGL21 is a negative regulator of seed germination and post-germination growth by controlling the expression of ABA-INSENSITIVE 5 (ABI5) in Arabidopsis. The AGL21-overexpressing plants were hypersensitive to ABA, salt, and osmotic stresses during seed germination and early post-germination growth, whereas agl21 mutants were less sensitive. We found that AGL21 positively regulated ABI5 expression in seeds. Consistently, genetic analyses showed that AGL21 is epistatic to ABI5 in controlling seed germination. Chromatin immunoprecipitation assays further demonstrated that AGL21 could directly bind to the ABI5 promoter in plant cells. Moreover, we found that AGL21 responded to multiple environmental stresses and plant hormones during seed germination. Taken together, our results suggest that AGL21 acts as a surveillance integrator that incorporates environmental cues and endogenous hormonal signals into ABA signaling to regulate seed germination and early post-germination growth. Copyright © 2017 The Author. Published by Elsevier Inc. All rights reserved.

  5. Off-road compression-ignition engine emission regulations under the Canadian Environmental Protection Act 1999 : guidance document

    International Nuclear Information System (INIS)

    2006-03-01

    This guide explained the requirements for Off-Road Compression Ignition Engine Emission Regulations established under the Canadian Environmental Protection Act. The regulations are enforced by Environment Canada, which authorizes and monitors the use of the national emissions mark. The regulations prescribe standards for off-road engines that operate as reciprocating, internal combustion engines, other than those that operate under characteristics similar to the Otto combustion cycle and that use a spark plug or other sparking device. The regulations apply to engines that are typically diesel-fuelled and found in construction, mining, farming and forestry machines such as tractors, excavators and log skidders. Four different types of persons are potentially affected by the regulations: Canadian engine manufacturers; distributors of Canadian engines or machines containing Canadian engines; importers of engines or machines for the purpose of sale; and persons not in companies importing engines or machines. Details of emission standards were presented, as well as issues concerning evidence of conformity, importing engines, and special engine cases. Compliance and enforcement details were reviewed, as well as applicable standards and provisions for emission control systems and defeat devices; exhaust emissions; crankcase and smoke emissions; and adjustable parameters. Details of import declarations were reviewed, as well as issues concerning defects and maintenance instructions. 4 tabs., 4 figs

  6. 76 FR 10947 - Registration and Regulation of Security-Based Swap Execution Facilities

    Science.gov (United States)

    2011-02-28

    ... SB swaps is opaque, with little, if any, pre-trade transparency (the ability of market participants... development of the SB swap market may alter some of the specific calculus for future regulation of SB SEFs..., there may be no pre-trade or post-trade transparency available to the marketplace because only the two...

  7. Emotional and Adrenocortical Regulation in Early Adolescence: Prediction by Attachment Security and Disorganization in Infancy

    Science.gov (United States)

    Spangler, Gottfried; Zimmermann, Peter

    2014-01-01

    The aim of the present study was to examine differences in emotion expression and emotion regulation in emotion-eliciting situations in early adolescence from a bio-psycho-social perspective, specifically investigating the influence of early mother-infant attachment and attachment disorganization on behavioural and adrenocortical responses. The…

  8. 76 FR 7107 - Quarterly Listings; Safety Zones, Security Zones, Special Local Regulations, Drawbridge Operation...

    Science.gov (United States)

    2011-02-09

    ... defined boundary for which regulations for vessels navigating within the area have been established by the...)...... 9/19/2008 USCG-2008-0814 San Diego, CA Safety Zones (Part 165)...... 9/6/2008 USCG-2008-0827 Ocean... (Part 165). USCG-2009-0402 Ocean City, NJ Safety Zones (Part 165)...... 10/10/2009 USCG-2009-0403...

  9. 77 FR 50631 - Homeland Security Acquisition Regulation (HSAR); Revision Initiative [HSAR Case 2009-002

    Science.gov (United States)

    2012-08-22

    ..., provides guidance and direction for compliance with green purchasing and other sustainable practices...--IMPROPER BUSINESS PRACTICES AND PERSONAL CONFLICTS OF INTEREST 0 14. Revise section 3003.101-3 to read as follows: 3003.101-3 Agency regulations. The United States Office of Government Ethics has promulgated...

  10. 75 FR 62623 - Privacy Act of 1974, as Amended; Computer Matching Program (SSA/Internal Revenue Service (IRS...

    Science.gov (United States)

    2010-10-12

    ... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA 2010-0015] Privacy Act of 1974, as Amended; Computer Matching Program (SSA/ Internal Revenue Service (IRS))--Match Number 1016 AGENCY: Social Security... regarding protections for such persons. The Privacy Act, as amended, regulates the use of computer matching...

  11. 77 FR 33547 - Privacy Act of 1974, as Amended; Computer Matching Program (SSA/Centers for Medicare and Medicaid...

    Science.gov (United States)

    2012-06-06

    ...: Social Security Administration (SSA). ACTION: Notice of a new computer matching program that will expire... protections for such persons. The Privacy Act, as amended, regulates the use of computer matching by Federal... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA 2012-0015] Privacy Act of 1974, as Amended...

  12. 77 FR 24757 - Privacy Act of 1974, as Amended; Computer Matching Program (SSA/Department of Labor (DOL))-Match...

    Science.gov (United States)

    2012-04-25

    ... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA 2011-0083] Privacy Act of 1974, as Amended; Computer Matching Program (SSA/ Department of Labor (DOL))--Match Number 1015 AGENCY: Social Security... regarding protections for such persons. The Privacy Act, as amended, regulates the use of computer matching...

  13. 77 FR 27108 - Privacy Act of 1974, as Amended; Computer Matching Program (SSA/Office of Child Support...

    Science.gov (United States)

    2012-05-08

    ...: Social Security Administration (SSA). ACTION: Notice of a renewal of an existing computer matching... protections for such persons. The Privacy Act, as amended, regulates the use of computer matching by Federal... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA 2012-0010] Privacy Act of 1974, as Amended...

  14. 77 FR 38880 - Privacy Act of 1974, as Amended; Computer Matching Program (SSA/Railroad Retirement Board (SSA...

    Science.gov (United States)

    2012-06-29

    ... Security Administration (SSA). ACTION: Notice of a renewal of an existing computer matching program that... regarding protections for such persons. The Privacy Act, as amended, regulates the use of computer matching... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA 2012-0002] Privacy Act of 1974, as Amended...

  15. Nitric oxide acts as a positive regulator to induce metamorphosis of the ascidian Herdmania momus.

    Science.gov (United States)

    Ueda, Nobuo; Degnan, Sandie M

    2013-01-01

    Marine invertebrates commonly have a biphasic life cycle in which the metamorphic transition from a pelagic larva to a benthic post-larva is mediated by the nitric oxide signalling pathway. Nitric oxide (NO) is synthesised by nitric oxide synthase (NOS), which is a client protein of the molecular chaperon heat shock protein 90 (HSP90). It is notable, then, that both NO and HSP90 have been implicated in regulating metamorphosis in marine invertebrates as diverse as urochordates, echinoderms, molluscs, annelids, and crustaceans. Specifically, the suppression of NOS activity by the application of either NOS- or HSP90-inhibiting pharmacological agents has been shown consistently to induce the initiation of metamorphosis, leading to the hypothesis that a negative regulatory role of NO is widely conserved in biphasic life cycles. Further, the induction of metamorphosis by heat-shock has been demonstrated for multiple species. Here, we investigate the regulatory role of NO in induction of metamorphosis of the solitary tropical ascidian, Herdmania momus. By coupling pharmacological treatments with analysis of HmNOS and HmHSP90 gene expression, we present compelling evidence of a positive regulatory role for NO in metamorphosis of this species, in contrast to all existing ascidian data that supports the hypothesis of NO as a conserved negative regulator of metamorphosis. The exposure of competent H. momus larvae to a NOS inhibitor or an NO donor results in an up-regulation of NOS and HSP90 genes. Heat shock of competent larvae induces metamorphosis in a temperature dependent manner, up to a thermal tolerance that approaches 35°C. Both larval/post-larval survival and the appearance of abnormal morphologies in H. momus post-larvae reflect the magnitude of up-regulation of the HSP90 gene in response to heat-shock. The demonstrated role of NO as a positive metamorphic regulator in H. momus suggests the existence of inter-specific adaptations of NO regulation in ascidian

  16. 17 CFR 230.488 - Effective date of registration statements relating to securities to be issued in certain business...

    Science.gov (United States)

    2010-04-01

    ... statements relating to securities to be issued in certain business combination transactions. 230.488 Section... REGULATIONS, SECURITIES ACT OF 1933 Investment Companies; Business Development Companies § 230.488 Effective date of registration statements relating to securities to be issued in certain business combination...

  17. Potential Impact of Clean Air Act Regulations on Nitrogen Fate and Transport in the Neuse River Basin: a Modeling Investigation Using CMAQ and SWAT

    Science.gov (United States)

    There has been extensive analysis of Clean Air Act Amendment (CAAA) regulation impacts to changes in atmospheric nitrogen deposition; however, few studies have focused on watershed nitrogen transfer particularly regarding long-term predictions. In this study, we investigated impa...

  18. Policies and regulations in Mexico with regard to genetic technology and food security

    OpenAIRE

    Colmenarez Ortiz, Claudia; Ortiz Garcia, Sol

    2016-01-01

    In 1988 the first application for field trials of a GMO was formally received in Mexico. Since then a Biosafety law, few bylaws and national official standards were enacted in order to regulate the safe use of GMOs and to evaluate, control and avoid adverse effects to human health and the environment. The Law on Biosafety of Genetically Modified Organisms was enacted in 2005 in order to comply with international obligations derived from the Cartagena Protocol on Biosafety signed by Mexico in ...

  19. Contract Labour (Regulation and Abolition) Act 1970 and labour market flexibility: An exploratory assessment of contract labour use in India's formal manufacturing

    OpenAIRE

    Das, Deb Kusum; Choudhury, Homagni; Singh, Jaivir

    2015-01-01

    One particularly significant piece of labour legislation in India is the Contract Labour (Regulation and Abolition) Act, 1970 (CLA,1970), which regulates labour hired by firms through the offices of a labour contractor - such labour being referred to as 'contract' labour in India. This paper seeks to examine this Act and its implication for manufacturing employment in India. While empirical evidence seems to indicate the presence of large number of 'contract' workers in the Indian manufacturi...

  20. Factories Act 1961, Ionizing Radiations (Unsealed Radioactive Substances) Regulations 1968, Certificate of Approval No.1 (General)

    International Nuclear Information System (INIS)

    1969-01-01

    Under the Ionising Radiations (Unsealed Radioactive Substances) Regulations No. 780 of 1968, the Chief Inspector of Factories has wide powers to ensure the protection of workers. By this Certificate he approved, for the purpose of measuring radiation doses, any radiation dosemeter, based on the phenomenon of radiation-induced thermoluminescence, supplied by an approved laboratory. (NEA) [fr

  1. 78 FR 27308 - Loan Originator Compensation Requirements Under the Truth In Lending Act (Regulation Z...

    Science.gov (United States)

    2013-05-10

    ... consumer financial laws, to consider the potential benefits and costs of regulation to consumers and... effective date of Sec. 1026.36(i) would also delay the consumer benefit that would result from allowing the..., 2013 / Proposed Rules#0;#0; [[Page 27308

  2. 75 FR 19241 - Financial Crimes Enforcement Network; Amendment to the Bank Secrecy Act Regulations; Defining...

    Science.gov (United States)

    2010-04-14

    ... definition of mutual fund in the rule requiring mutual funds to establish anti-money laundering (``AML...-money laundering programs and compliance procedures.\\1\\ Regulations implementing the BSA appear at 31... transactions.\\7\\ \\5\\ Anti-Money Laundering Programs for Mutual Funds, 67 FR 21117 (April 29, 2002); Customer...

  3. Regulations under the Radioactive Substances Act of 1958, No. 115, 1961

    International Nuclear Information System (INIS)

    1961-01-01

    These very detailed regulations lay down the licensing system for the use of radioactive materials. They provide for monitoring and control of radiation and radiation contamination, storage, labelling and transport of radioactive materials and also for the disposal of radioactive waste. (NEA) [fr

  4. 78 FR 58202 - Federal Tort Claims Act (FTCA) Medical Malpractice Program Regulations: Clarification of FTCA...

    Science.gov (United States)

    2013-09-23

    ...) Medical Malpractice Program Regulations: Clarification of FTCA Coverage for Services Provided to Non... not limit coverage to childhood vaccinations; and (3) To add the following new example as subsection 6... that have substantial direct effects on the states, the relationship between the national government...

  5. 77 FR 60620 - Update of Existing Privacy Act-NASA Regulations

    Science.gov (United States)

    2012-10-04

    ... rules and regulations governing the manner of its operations and the exercise of the powers vested in it..., public health and safety effects, distributive impacts, and equity). Executive Order 13563 emphasizes the importance of quantifying both costs and benefits, of reducing costs, of harmonizing rules, and of promoting...

  6. 76 FR 10516 - Transfer and Reorganization of Bank Secrecy Act Regulations-Technical Amendment.

    Science.gov (United States)

    2011-02-25

    ... violate provisions of Title 12 of the Code of Federal Regulations. PART 1021--RULES FOR CASINOS AND CARD CLUBS 0 3. The authority citation for part 1021 is added to read as follows: Authority: 12 U.S.C. 1829b... CREDIT CARD SYSTEMS 0 17. The authority citation for part 1028 is added to read as follows: Authority: 12...

  7. Security of Radioactive Waste

    International Nuclear Information System (INIS)

    Goldammer, W.

    2003-01-01

    Measures to achieve radioactive waste security are discussed. Categorization of waste in order to implement adequate and consistent security measures based on potential consequences is made. The measures include appropriate treatment/storage/disposal of waste to minimize the potential and consequences of malicious acts; management of waste only within an authorised, regulated, legal framework; management of the security of personnel and information; measures to minimize the acquisition of radioactive waste by those with malicious intent. The specific measures are: deter unauthorized access to the waste; detect any such attempt or any loss or theft of waste; delay unauthorized access; provide timely response to counter any attempt to gain unauthorised access; measures to minimize acts of sabotage; efforts to recover any lost or stolen waste; mitigation and emergency plans in case of release of radioactivity. An approach to develop guidance, starting with the categorisation of sources and identification of dangerous sources, is presented. Dosimetric criteria for internal and external irradiation are set. Different exposure scenarios are considered. Waste categories and security categories based on the IAEA INFCIRC/225/Rev.4 are presented

  8. The Patient Protection and Affordable Care Act and the regulation of the health insurance industry.

    Science.gov (United States)

    Jha, Saurabh; Baker, Tom

    2012-12-01

    The Patient Protection and Affordable Care Act is a comprehensive and multipronged reform of the US health care system. The legislation makes incremental changes to Medicare, Medicaid, and the market for employer-sponsored health insurance. However, it makes substantial changes to the market for individual and small-group health insurance. The purpose of this article is to introduce the key regulatory reforms in the market for individual and small-group health insurance and explain how these reforms tackle adverse selection and risk classification and improve access to health care for the hitherto uninsured or underinsured population. Copyright © 2012 American College of Radiology. Published by Elsevier Inc. All rights reserved.

  9. A review of state regulations that exceed those of the federal Resource Conservation and Recovery Act (RCRA)

    International Nuclear Information System (INIS)

    Coutant, C.C.; Heckman, C.L.

    1988-04-01

    This report identifies and provides information on state hazardous waste management programs and regulations in states where the US Department of Energy (DOE) has facilities. The objective is to describe for the DOE defense program and its contractors how state requirements are more stringent than the federal regulations under the Resource Conservation and Recovery Act (RCRA). DOE defense programs are located in 13 of the 50 states. Most of these states have regulations that are essentially equivalent to the federal RCRA requirements as they existed prior to the 1984 amendments, but their regulations are, in most instances, more stringment than the federal requirements. Differences are both substantive and procedural, and they are summarized and tabulated herein. All but three of these 13 states have been granted Final Authorization from the US Environmental Protection Agency (EPA) to operate their own hazardous waste management program in accord with the federal RCRA program prior to the 1984 amendments; two of the three others have some stage of Interim Authorization. EPA currently administers all of the provisions of the 1984 amendments, including requirements for corrective action under Sect. 3004(u). Two states, Colorado and Tennessee, have been granted revisions to their Final Authorizations delegating responsibility for the hazardous wastes. Responsible state agencies (with appropriate telephone numbers) are indicated, as are the relevant laws and current regulatory statutes

  10. Global Health Security Demands a Strong International Health Regulations Treaty and Leadership From a Highly Resourced World Health Organization.

    Science.gov (United States)

    Burkle, Frederick M

    2015-10-01

    If the Ebola tragedy of West Africa has taught us anything, it should be that the 2005 International Health Regulations (IHR) Treaty, which gave unprecedented authority to the World Health Organization (WHO) to provide global public health security during public health emergencies of international concern, has fallen severely short of its original goal. After encouraging successes with the 2003 severe acute respiratory syndrome (SARS) pandemic, the intent of the legally binding Treaty to improve the capacity of all countries to detect, assess, notify, and respond to public health threats has shamefully lapsed. Despite the granting of 2-year extensions in 2012 to countries to meet core surveillance and response requirements, less than 20% of countries have complied. Today it is not realistic to expect that these gaps will be solved or narrowed in the foreseeable future by the IHR or the WHO alone under current provisions. The unfortunate failures that culminated in an inadequate response to the Ebola epidemic in West Africa are multifactorial, including funding, staffing, and poor leadership decisions, but all are reversible. A rush by the Global Health Security Agenda partners to fill critical gaps in administrative and operational areas has been crucial in the short term, but questions remain as to the real priorities of the G20 as time elapses and critical gaps in public health protections and infrastructure take precedence over the economic and security needs of the developed world. The response from the Global Outbreak Alert and Response Network and foreign medical teams to Ebola proved indispensable to global health security, but both deserve stronger strategic capacity support and institutional status under the WHO leadership granted by the IHR Treaty. Treaties are the most successful means the world has in preventing, preparing for, and controlling epidemics in an increasingly globalized world. Other options are not sustainable. Given the gravity of ongoing

  11. Two group A streptococcal peptide pheromones act through opposing Rgg regulators to control biofilm development.

    Directory of Open Access Journals (Sweden)

    Jennifer C Chang

    2011-08-01

    Full Text Available Streptococcus pyogenes (Group A Streptococcus, GAS is an important human commensal that occasionally causes localized infections and less frequently causes severe invasive disease with high mortality rates. How GAS regulates expression of factors used to colonize the host and avoid immune responses remains poorly understood. Intercellular communication is an important means by which bacteria coordinate gene expression to defend against host assaults and competing bacteria, yet no conserved cell-to-cell signaling system has been elucidated in GAS. Encoded within the GAS genome are four rgg-like genes, two of which (rgg2 and rgg3 have no previously described function. We tested the hypothesis that rgg2 or rgg3 rely on extracellular peptides to control target-gene regulation. We found that Rgg2 and Rgg3 together tightly regulate two linked genes encoding new peptide pheromones. Rgg2 activates transcription of and is required for full induction of the pheromone genes, while Rgg3 plays an antagonistic role and represses pheromone expression. The active pheromone signals, termed SHP2 and SHP3, are short and hydrophobic (DI[I/L]IIVGG, and, though highly similar in sequence, their ability to disrupt Rgg3-DNA complexes were observed to be different, indicating that specificity and differential activation of promoters are characteristics of the Rgg2/3 regulatory circuit. SHP-pheromone signaling requires an intact oligopeptide permease (opp and a metalloprotease (eep, supporting the model that pro-peptides are secreted, processed to the mature form, and subsequently imported to the cytoplasm to interact directly with the Rgg receptors. At least one consequence of pheromone stimulation of the Rgg2/3 pathway is increased biogenesis of biofilms, which counteracts negative regulation of biofilms by RopB (Rgg1. These data provide the first demonstration that Rgg-dependent quorum sensing functions in GAS and substantiate the role that Rggs play as peptide

  12. Centriolar SAS-7 acts upstream of SPD-2 to regulate centriole assembly and pericentriolar material formation

    Science.gov (United States)

    Sugioka, Kenji; Hamill, Danielle R; Lowry, Joshua B; McNeely, Marie E; Enrick, Molly; Richter, Alyssa C; Kiebler, Lauren E; Priess, James R; Bowerman, Bruce

    2017-01-01

    The centriole/basal body is a eukaryotic organelle that plays essential roles in cell division and signaling. Among five known core centriole proteins, SPD-2/Cep192 is the first recruited to the site of daughter centriole formation and regulates the centriolar localization of the other components in C. elegans and in humans. However, the molecular basis for SPD-2 centriolar localization remains unknown. Here, we describe a new centriole component, the coiled-coil protein SAS-7, as a regulator of centriole duplication, assembly and elongation. Intriguingly, our genetic data suggest that SAS-7 is required for daughter centrioles to become competent for duplication, and for mother centrioles to maintain this competence. We also show that SAS-7 binds SPD-2 and regulates SPD-2 centriolar recruitment, while SAS-7 centriolar localization is SPD-2-independent. Furthermore, pericentriolar material (PCM) formation is abnormal in sas-7 mutants, and the PCM-dependent induction of cell polarity that defines the anterior-posterior body axis frequently fails. We conclude that SAS-7 functions at the earliest step in centriole duplication yet identified and plays important roles in the orchestration of centriole and PCM assembly. DOI: http://dx.doi.org/10.7554/eLife.20353.001 PMID:28092264

  13. Regulations implementing the Byrd Amendments to the Black Lung Benefits Act: determining coal miners' and survivors' entitlement to benefits. Final rule.

    Science.gov (United States)

    2013-09-25

    This final rule revises the Black Lung Benefits Act (BLBA or Act) regulations to implement amendments made by the Patient Protection and Affordable Care Act (ACA). The ACA amended the BLBA in two ways. First, it revived a rebuttable presumption of total disability or death due to pneumoconiosis for certain claims. Second, it reinstituted automatic entitlement to benefits for certain eligible survivors of coal miners whose lifetime benefit claims were awarded because they were totally disabled due to pneumoconiosis. These regulations clarify how the statutory presumption may be invoked and rebutted and the application and scope of the survivor-entitlement provision. The rule also eliminates several unnecessary or obsolete provisions.

  14. The Texas space flight liability act and efficient regulation for the private commercial space flight era

    Science.gov (United States)

    Johnson, Christopher D.

    2013-12-01

    In the spring of 2011, the American state of Texas passed into law an act limiting the liability of commercial space flight entities. Under it, those companies would not be liable for space flight participant injuries, except in cases of intentional injury or injury proximately caused by the company's gross negligence. An analysis within the framework of international and national space law, but especially informed by the academic discipline of law and economics, discusses the incentives of all relevant parties and attempts to understand whether the law is economically "efficient" (allocating resources so as to yield maximum utility), and suited to further the development of the fledgling commercial suborbital tourism industry. Insights into the Texas law are applicable to other states hoping to foster commercial space tourism and considering space tourism related legislation.

  15. Challenges Faced by Regulators and Technical, Scientific and Support Organizations (TSOs) in Enhancing Nuclear Safety and Security

    International Nuclear Information System (INIS)

    Travers, W.D.

    2011-01-01

    Renewed interest in new reactor build programmes, not only in countries with already established nuclear programmes but also in many other countries with limited or no workforce experienced in the design, licensing, construction and operation of nuclear power plants, has resulted in a need for technical, scientific and support organizations (TSOs) to support regulatory bodies in carrying out their mandated responsibilities. The primary function of a regulatory body, such as the Federal Authority for Nuclear Regulation (FANR) in the United Arab Emirates (UAE), is to regulate the safe use of nuclear facilities and radioactive material for peaceful civilian purposes. In so doing, the regulatory body needs to provide a clear and focused approach to: safety, security and safeguards for licensing; inspection and enforcement of reactor design; construction; commissioning; operation; decommissioning; nuclear waste management activities; and the use, possession or transfer of special nuclear materials and activities within the country. Accomplishing this goal requires a highly educated, multidisciplinary, diverse workforce with significant work experience. Recognizing that it takes several decades and a lot of resources to achieve self-sufficiency, many countries, particularly emergent nuclear countries, would have to rely on TSOs to start their programmes and to carry out their oversight responsibilities. Towards that end, FANR is working closely with international counterparts, the International Atomic Energy Agency and TSOs to exchange information, expertise, industry experience and ongoing research to ensure that high levels of safety, security and safeguards are established and maintained in reactor design and operation throughout the life of the facility, and that special nuclear material within the UAE is properly documented and controlled, is not stolen, lost or diverted to any illicit or non-peaceful activities, and does not pose unreasonable radiological risk due

  16. Cyclic AMP Receptor Protein Acts as a Transcription Regulator in Response to Stresses in Deinococcus radiodurans.

    Directory of Open Access Journals (Sweden)

    Su Yang

    Full Text Available The cyclic AMP receptor protein family of transcription factors regulates various metabolic pathways in bacteria, and also play roles in response to environmental changes. Here, we identify four homologs of the CRP family in Deinococcus radiodurans, one of which tolerates extremely high levels of oxidative stress and DNA-damaging reagents. Transcriptional levels of CRP were increased under hydrogen peroxide (H2O2 treatment during the stationary growth phase, indicating that CRPs function in response to oxidative stress. By constructing all CRP single knockout mutants, we found that the dr0997 mutant showed the lowest tolerance toward H2O2, ultraviolet radiation, ionizing radiation, and mitomycin C, while the phenotypes of the dr2362, dr0834, and dr1646 mutants showed slight or no significant differences from those of the wild-type strain. Taking advantage of the conservation of the CRP-binding site in many bacteria, we found that transcription of 18 genes, including genes encoding chromosome-partitioning protein (dr0998, Lon proteases (dr0349 and dr1974, NADH-quinone oxidoreductase (dr1506, thiosulfate sulfurtransferase (dr2531, the DNA repair protein UvsE (dr1819, PprA (dra0346, and RecN (dr1447, are directly regulated by DR0997. Quantitative real-time polymerase chain reaction (qRT-PCR analyses showed that certain genes involved in anti-oxidative responses, DNA repair, and various cellular pathways are transcriptionally attenuated in the dr0997 mutant. Interestingly, DR0997 also regulate the transcriptional levels of all CRP genes in this bacterium. These data suggest that DR0997 contributes to the extreme stress resistance of D. radiodurans via its regulatory role in multiple cellular pathways, such as anti-oxidation and DNA repair pathways.

  17. Syk Tyrosine Kinase Acts as a Pancreatic Adenocarcinoma Tumor Suppressor by Regulating Cellular Growth and Invasion

    OpenAIRE

    Layton, Tracy; Stalens, Cristel; Gunderson, Felizza; Goodison, Steve; Silletti, Steve

    2009-01-01

    We have identified the nonreceptor tyrosine kinase syk as a marker of differentiation/tumor suppressor in pancreatic ductal adenocarcinoma (PDAC). Syk expression is lost in poorly differentiated PDAC cells in vitro and in situ, and stable reexpression of syk in endogenously syk-negative Panc1 (Panc1/syk) cells retarded their growth in vitro and in vivo and reduced anchorage-independent growth in vitro. Panc1/syk cells exhibited a more differentiated morphology and down-regulated cyclin D1, ak...

  18. A novel branched chain amino acids responsive transcriptional regulator, BCARR, negatively acts on the proteolytic system in Lactobacillus helveticus.

    Directory of Open Access Journals (Sweden)

    Taketo Wakai

    Full Text Available Transcriptional negative regulation of the proteolytic system of Lactobacillus helveticus CM4 in response to amino acids seems to be very important for the control of antihypertensive peptide production; however, it remains poorly understood. A 26-kDa protein with N-terminal cystathionine β-synthase domains (CBS domain protein, which seems to be involved in the regulatory system, was purified by using a DNA-sepharose bound 300-bp DNA fragment corresponding to the upstream regions of the six proteolytic genes that are down-regulated by amino acids. The CBS domain protein bound to a DNA fragment corresponding to the region upstream of the pepV gene in response to branched chain amino acids (BCAAs. The expression of the pepV gene in Escherichia coli grown in BCAA-enriched medium was repressed when the CBS domain protein was co-expressed. These results reveal that the CBS domain protein acts as a novel type of BCAA-responsive transcriptional regulator (BCARR in L. helveticus. From comparative analysis of the promoter regions of the six proteolysis genes, a palindromic AT-rich motif, 5'-AAAAANNCTWTTATT-3', was predicted as the consensus DNA motif for the BCARR protein binding. Footprint analysis using the pepV promotor region and gel shift analyses with the corresponding short DNA fragments strongly suggested that the BCARR protein binds adjacent to the pepV promoter region and affects the transcription level of the pepV gene in the presence of BCAAs. Homology search analysis of the C-terminal region of the BCARR protein suggested the existence of a unique βαββαβ fold structure that has been reported in a variety of ACT (aspartate kinase-chorismate mutase-tyrA domain proteins for sensing amino acids. These results also suggest that the sensing of BCAAs by the ACT domain might promote the binding of the BCARR to DNA sequences upstream of proteolysis genes, which affects the gene expression of the proteolytic system in L. helveticus.

  19. Ca2+ sparks act as potent regulators of excitation-contraction coupling in airway smooth muscle.

    Science.gov (United States)

    Zhuge, Ronghua; Bao, Rongfeng; Fogarty, Kevin E; Lifshitz, Lawrence M

    2010-01-15

    Ca2+ sparks are short lived and localized Ca2+ transients resulting from the opening of ryanodine receptors in sarcoplasmic reticulum. These events relax certain types of smooth muscle by activating big conductance Ca2+-activated K+ channels to produce spontaneous transient outward currents (STOCs) and the resultant closure of voltage-dependent Ca2+ channels. But in many smooth muscles from a variety of organs, Ca2+ sparks can additionally activate Ca2+-activated Cl(-) channels to generate spontaneous transient inward current (STICs). To date, the physiological roles of Ca2+ sparks in this latter group of smooth muscle remain elusive. Here, we show that in airway smooth muscle, Ca2+ sparks under physiological conditions, activating STOCs and STICs, induce biphasic membrane potential transients (BiMPTs), leading to membrane potential oscillations. Paradoxically, BiMPTs stabilize the membrane potential by clamping it within a negative range and prevent the generation of action potentials. Moreover, blocking either Ca2+ sparks or hyperpolarization components of BiMPTs activates voltage-dependent Ca2+ channels, resulting in an increase in global [Ca2+](i) and cell contraction. Therefore, Ca2+ sparks in smooth muscle presenting both STICs and STOCs act as a stabilizer of membrane potential, and altering the balance can profoundly alter the status of excitability and contractility. These results reveal a novel mechanism underlying the control of excitability and contractility in smooth muscle.

  20. Information Technology: DoD FY 2004 Implementation of the Federal Information Security Management Act for Information Technology Training and Awareness

    National Research Council Canada - National Science Library

    Davis, Sarah; Mitchell, James; Palmer, Kevin A; Riggins, Liyang; Truex, Kathryn; Williams, Zac

    2004-01-01

    ...). Specifically, we evaluated whether all agency employees, including contractors, received IT security training and awareness and whether employees with significant IT security responsibilities...

  1. SOX17 Regulates Cholangiocyte Differentiation and Acts as a Tumor Suppressor in Cholangiocarcinoma

    DEFF Research Database (Denmark)

    Merino-Azpitarte, M; Lozano, E; Perugorria, M J

    2017-01-01

    /function was evaluated along the differentiation of human induced pluripotent stem cells (iPSC) into cholangiocytes, in the dedifferentiation process of normal human cholangiocytes (NHC) in culture and in cholangiocarcinogenesis. Lentiviruses for SOX17 overexpression or knock-down were used. Gene expression and DNA......BACKGROUND & AIMS: Cholangiocarcinoma (CCA) is a biliary malignancy linked to genetic and epigenetic abnormalities, such as hypermethylation of SOX17 promoter. Here, the role of SOX17 in cholangiocyte differentiation and cholangiocarcinogenesis was studied. METHODS: SOX17 expression...... methylation profiling were performed. RESULTS: SOX17 expression is induced in the last stage of cholangiocyte differentiation from iPSC and regulates the acquisition of biliary markers. SOX17 becomes downregulated in NHC undergoing dedifferentiation; experimental SOX17 knock-down in differentiated NHC...

  2. The United Nations and One Health: the International Health Regulations (2005) and global health security.

    Science.gov (United States)

    Nuttall, I; Miyagishima, K; Roth, C; de La Rocque, S

    2014-08-01

    The One Health approach encompasses multiple themes and can be understood from many different perspectives. This paper expresses the viewpoint of those in charge of responding to public health events of international concern and, in particular, to outbreaks of zoonotic disease. Several international organisations are involved in responding to such outbreaks, including the United Nations (UN) and its technical agencies; principally, the Food and Agriculture Organization of the UN (FAO) and the World Health Organization (WHO); UN funds and programmes, such as the United Nations Development Programme, the World Food Programme, the United Nations Environment Programme, the United Nations Children's Fund; the UN-linked multilateral banking system (the World Bank and regional development banks); and partner organisations, such as the World Organisation for Animal Health (OIE). All of these organisations have benefited from the experiences gained during zoonotic disease outbreaks over the last decade, developing common approaches and mechanisms to foster good governance, promote policies that cut across different sectors, target investment more effectively and strengthen global and national capacities for dealing with emerging crises. Coordination among the various UN agencies and creating partnerships with related organisations have helped to improve disease surveillance in all countries, enabling more efficient detection of disease outbreaks and a faster response, greater transparency and stakeholder engagement and improved public health. The need to build more robust national public human and animal health systems, which are based on good governance and comply with the International Health Regulations (2005) and the international standards set by the OIE, prompted FAO, WHO and the OIE to join forces with the World Bank, to provide practical tools to help countries manage their zoonotic disease risks and develop adequate resources to prevent and control disease

  3. Medico-economic evaluation of health products in the context of the Social Security Financing Act for 2012.

    Science.gov (United States)

    Dervaux, Benoît; Baseilhac, Eric; Fagon, Jean-Yves; Ameye, Véronique; Angot, Pierre; Audry, Antoine; Becquemont, Laurent; Borel, Thomas; Cazeneuve, Béatrice; Courtois, Jocelyn; Detournay, Bruno; Favre, Pascal; Granger, Muriel; Josseran, Anne; Lassale, Catherine; Louvet, Olivier; Pinson, Jean; de Pouvourville, Gérard; Rochaix, Lise; Rumeau-Pichon, Catherine; de Saab, Rima; Schwarzinger, Mickaël; Sun, Aristide

    2013-01-01

    The participants in round table 6 of the Giens Workshops 2012 drafted recommendations based on the collective interpretation of important elements of the decree concerning the medico-economic evaluation of health products published a few days earlier (02 October 2012). The medico-economic evaluation (MEE), becomes an additional determinant for fixing the prices of health products by the Health products economic committee (Comité économique des produits de santé, CEPS) via the hierarchisation of treatment strategies, and thus modifies the market access conditions. Limiting the analysis to medicinal products and medical devices for which a major, important or moderate improvement in the medical service rendered (ASMR) or of the expected service (ASA) has been requested and presenting a significant budget impact on the Social Security expenses, excludes health products with ASMR or ASA with a lower level requested which often create complex price fixing problems and often have a major budget impact. This latter concept remains to be defined in detail. The MEE envisaged for the first registration must include the need to confirm or refute the initial hypotheses especially concerning the actual position in the therapeutic strategy at the time of renewal of the registration. For the first registration, the conventional reference to European prices guaranteeing a minimum price to innovative medicinal products, the medico-economic models submitted by the industry to the French Drug Authority (Haute autorité de santé, HAS) must be used to guide the compilation of new data to be requested at the time of the registration renewal and to negotiate the level of the discounts in the framework of a price-volume agreement, if applicable. The MEE will allow comparing the result of the analysis to the model hypothesis at the time of the renewal of the registration, which may contribute to the renegotiation (either up or down) of the price of health goods. The costs related to

  4. Synemin acts as a regulator of signalling molecules during skeletal muscle hypertrophy.

    Science.gov (United States)

    Li, Zhenlin; Parlakian, Ara; Coletti, Dario; Alonso-Martin, Sonia; Hourdé, Christophe; Joanne, Pierre; Gao-Li, Jacqueline; Blanc, Jocelyne; Ferry, Arnaud; Paulin, Denise; Xue, Zhigang; Agbulut, Onnik

    2014-11-01

    Synemin, a type IV intermediate filament (IF) protein, forms a bridge between IFs and cellular membranes. As an A-kinase-anchoring protein, it also provides temporal and spatial targeting of protein kinase A (PKA). However, little is known about its functional roles in either process. To better understand its functions in muscle tissue, we generated synemin-deficient (Synm(-) (/-)) mice. Synm(-) (/-) mice displayed normal development and fertility but showed a mild degeneration and regeneration phenotype in myofibres and defects in sarcolemma membranes. Following mechanical overload, Synm(-) (/-) mice muscles showed a higher hypertrophic capacity with increased maximal force and fatigue resistance compared with control mice. At the molecular level, increased remodelling capacity was accompanied by decreased myostatin (also known as GDF8) and atrogin (also known as FBXO32) expression, and increased follistatin expression. Furthermore, the activity of muscle-mass control molecules (the PKA RIIα subunit, p70S6K and CREB1) was increased in mutant mice. Finally, analysis of muscle satellite cell behaviour suggested that the absence of synemin could affect the balance between self-renewal and differentiation of these cells. Taken together, our results show that synemin is necessary to maintain membrane integrity and regulates signalling molecules during muscle hypertrophy. © 2014. Published by The Company of Biologists Ltd.

  5. Regulation of DNA replication in irradiated cells by trans-acting factors

    International Nuclear Information System (INIS)

    Wang, Y.; Huq, M.S.; Cheng, X.; Iliakis, G.

    1995-01-01

    We compared DNA replication activity in cytoplasmic extracts prepared from irradiated and nonirradiated HeLa cells using a simian virus 40 (SV40)-based in vitro replication assay. The assay measures semi-conservative DNA replication in a plasmid carrying the SV40 origin of replication and requires SV40 T antigen as the sole noncellular protein. The plasmid DNA used in the replication reaction is never exposed to radiation. We find that replication of plasmid DNA is significantly reduced when cytoplasmic extracts from irradiated cells are used. Since plasmid replication proceeds to completion in extracts from irradiated cells, the observed reduction in the overall replication activity is probably due to a reduction in the efficiency of initiation events. The degree of inhibition of DNA replication after exposure to 10, 30 and 50 Gy X rays as measured in vitro using this assay is similar to that measured in intact cells immediately before processing for extract preparation. These observations are compatible with the induction or activation by ionizing radiation of a factor(s) that inhibits in trans DNA replication. The results contribute to our understanding of the mechanism(s) developed by the cells to regulate DNA replication when exposed to clastogenic agents. Such processes may be of significance in the restoration of DNA integrity, and may define yet another checkpoint operating during S at the level of clusters of replicons. 26 refs., 4 figs

  6. cis- and trans-acting elements of the estrogen-regulated vitellogenin gene B1 of Xenopus laevis.

    Science.gov (United States)

    Wahli, W; Martinez, E; Corthésy, B; Cardinaux, J R

    1989-01-01

    Vitellogenin genes are expressed under strict estrogen control in the liver of female oviparous vertebrates. Gene transfer experiments using estrogen-responsive cells have shown that the 13 bp perfect palindromic element GGTCACTGTGACC found upstream of the Xenopus laevis vitellogenin gene A2 promoter mediates hormonal stimulation and thus, was called the estrogen-responsive element (ERE). In the Xenopus vitellogenin genes B1 and B2 there are two closely adjacent EREs with one or more base substitutions when compared to the consensus ERE GGTCANNNTGACC. On their own, these degenerated elements have only a low or no regulatory capacity at all but act together synergistically to form an estrogen-responsive unit (ERU) with the same strength as the perfect palindromic 13 bp element. Analysis of estrogen receptor binding to the gene B1 ERU revealed a cooperative interaction of receptor dimers to the two adjacent imperfect EREs which most likely explains the synergistic stimulation observed in vivo. Furthermore, a promoter activator element located between positions --113 and --42 of the gene B1 and functional in the human MCF-7 and the Xenopus B3.2 cells has been identified and shown to be involved in the high level of induced transcription activity when the ERE is placed at a distance from the promoter. Finally, a hormone-controlled in vitro transcription system derived from Xenopus liver nuclear extracts was exploited to characterize two additional novel cis-acting elements within the vitellogenin gene B1 promoter. One of them, a negative regulatory element (NRE), is responsible for repression of promoter activity in the absence of hormone. The second is related to the NF-I binding site and is required, together with the ERE, to mediate hormonal induction. Moreover, we detected three trans-acting activities in Xenopus liver nuclear extracts that interact with these regions and demonstrated that they participate in the regulation of the expression of the vitellogenin

  7. 17 CFR 270.3c-3 - Definition of certain terms used in section 3(c)(1) of the Act with respect to certain debt...

    Science.gov (United States)

    2010-04-01

    ... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Definition of certain terms used in section 3(c)(1) of the Act with respect to certain debt securities offered by small business... COMMISSION (CONTINUED) RULES AND REGULATIONS, INVESTMENT COMPANY ACT OF 1940 § 270.3c-3 Definition of certain...

  8. 78 FR 69925 - Privacy Act of 1974, as Amended; Computer Matching Program (SSA/Bureau of the Fiscal Service...

    Science.gov (United States)

    2013-11-21

    ... regarding protections for such persons. The Privacy Act, as amended, regulates the use of computer matching... savings securities. C. Authority for Conducting the Matching Program This computer matching agreement sets... amended by the Computer Matching and Privacy Protection Act of 1988, as amended, and the regulations and...

  9. 33 CFR 165.1405 - Regulated Navigation Areas and Security Zones; Designated Escorted Vessels-Philippine Sea and...

    Science.gov (United States)

    2010-07-01

    ...) PORTS AND WATERWAYS SAFETY REGULATED NAVIGATION AREAS AND LIMITED ACCESS AREAS Specific Regulated...). (a) Regulated navigation area. The following areas, designated by coordinates referencing World...

  10. 76 FR 71417 - Privacy Act of 1974, as Amended; Computer Matching Program (SSA/Law Enforcement Agencies (LEA...

    Science.gov (United States)

    2011-11-17

    ...; Computer Matching Program (SSA/ Law Enforcement Agencies (LEA)) Match Number 5001 AGENCY: Social Security... protections for such persons. The Privacy Act, as amended, regulates the use of computer matching by Federal... accordance with the Privacy Act of 1974, as amended by the Computer Matching and Privacy Protection Act of...

  11. Transcription profiling suggests that mitochondrial topoisomerase IB acts as a topological barrier and regulator of mitochondrial DNA transcription.

    Science.gov (United States)

    Dalla Rosa, Ilaria; Zhang, Hongliang; Khiati, Salim; Wu, Xiaolin; Pommier, Yves

    2017-12-08

    Mitochondrial DNA (mtDNA) is essential for cell viability because it encodes subunits of the respiratory chain complexes. Mitochondrial topoisomerase IB (TOP1MT) facilitates mtDNA replication by removing DNA topological tensions produced during mtDNA transcription, but it appears to be dispensable. To test whether cells lacking TOP1MT have aberrant mtDNA transcription, we performed mitochondrial transcriptome profiling. To that end, we designed and implemented a customized tiling array, which enabled genome-wide, strand-specific, and simultaneous detection of all mitochondrial transcripts. Our technique revealed that Top1mt KO mouse cells process the mitochondrial transcripts normally but that protein-coding mitochondrial transcripts are elevated. Moreover, we found discrete long noncoding RNAs produced by H-strand transcription and encompassing the noncoding regulatory region of mtDNA in human and murine cells and tissues. Of note, these noncoding RNAs were strongly up-regulated in the absence of TOP1MT. In contrast, 7S DNA, produced by mtDNA replication, was reduced in the Top1mt KO cells. We propose that the long noncoding RNA species in the D-loop region are generated by the extension of H-strand transcripts beyond their canonical stop site and that TOP1MT acts as a topological barrier and regulator for mtDNA transcription and D-loop formation.

  12. Post-Closure Report for Closed Resource Conservation and Recovery Act Corrective Action Units, Nevada National Security Site, Nevada, for Fiscal Year 2014

    Energy Technology Data Exchange (ETDEWEB)

    Silvas, Alissa J. [Nevada Field Office, Las Vegas, NV (United States)

    2015-01-01

    This report serves as the combined annual report for post-closure activities for several Corrective Action Units (CAUs). The locations of the sites are shown in Figure 1. This report covers fiscal year 2014 (October 2013–September 2014). The post-closure requirements for these sites are described in Resource Conservation and Recovery Act Permit Number NEV HW0101 and summarized in each CAU-specific section in Section 1.0 of this report. The results of the inspections, a summary of maintenance activities, and an evaluation of monitoring data are presented in this report. Site inspections are conducted semiannually at CAUs 90 and 91 and quarterly at CAUs 92, 110, 111, and 112. Additional inspections are conducted at CAU 92 if precipitation occurs in excess of 0.50 inches (in.) in a 24-hour period and at CAU 111 if precipitation occurs in excess of 1.0 in. in a 24-hour period. Inspections include an evaluation of the condition of the units, including covers, fences, signs, gates, and locks. In addition to visual inspections, soil moisture monitoring, vegetation evaluations, and subsidence surveys are conducted at CAU 110. At CAU 111, soil moisture monitoring, vegetation evaluations, subsidence surveys, direct radiation monitoring, air monitoring, radon flux monitoring, and groundwater monitoring are conducted. The results of the vegetation surveys and an analysis of the soil moisture monitoring data at CAU 110 are presented in this report. Results of additional monitoring at CAU 111 are documented annually in the Nevada National Security Site Waste Management Monitoring Report Area 3 and Area 5 Radioactive Waste Management Sites and in the Nevada National Security Site Data Report: Groundwater Monitoring Program Area 5 Radioactive Waste Management Site, which will be prepared in approximately June 2015. All required inspections, maintenance, and monitoring were conducted in accordance with the post-closure requirements of the permit. It is recommended to continue

  13. Technologies to counter aviation security threats

    Science.gov (United States)

    Karoly, Steve

    2017-11-01

    The Aviation and Transportation Security Act (ATSA) makes TSA responsible for security in all modes of transportation, and requires that TSA assess threats to transportation, enforce security-related regulations and requirements, and ensure the adequacy of security measures at airports and other transportation facilities. Today, TSA faces a significant challenge and must address a wide range of commercial, military grade, and homemade explosives and these can be presented in an infinite number of configurations and from multiple vectors. TSA screens 2 million passengers and crew, and screens almost 5 million carry-on items and 1.2 million checked bags daily. As TSA explores new technologies for improving efficiency and security, those on the forefront of research and development can help identify unique and advanced methods to combat terrorism. Research and Development (R&D) drives the development of future technology investments that can address an evolving adversary and aviation threat. The goal is to rethink the aviation security regime in its entirety, and rather than focusing security at particular points in the enterprise, distribute security from the time a reservation is made to the time a passenger boards the aircraft. The ultimate objective is to reengineer aviation security from top to bottom with a continued focus on increasing security throughout the system.

  14. 16 CFR 312.8 - Confidentiality, security, and integrity of personal information collected from children.

    Science.gov (United States)

    2010-01-01

    ... 16 Commercial Practices 1 2010-01-01 2010-01-01 false Confidentiality, security, and integrity of... COMMISSION REGULATIONS UNDER SPECIFIC ACTS OF CONGRESS CHILDREN'S ONLINE PRIVACY PROTECTION RULE § 312.8 Confidentiality, security, and integrity of personal information collected from children. The operator must...

  15. Act No. 1240 of 15 December 1971. Regulations concerning the restructuring of the National Nuclear Energy Commission (CNEN)

    International Nuclear Information System (INIS)

    1972-01-01

    This Act which annuls the preceding Act of 1960 with the exception of Sections 12 to 16, confirms the CNEN's responsibilities. As opposed to the previous Act this Act contains provisions concerning the National Institute for Nuclear Physics (INFN). (NEA) [fr

  16. 75 FR 44163 - Implementation of Regulations Required Under Title XI of the Food, Conservation and Energy Act of...

    Science.gov (United States)

    2010-07-28

    ... Under Title XI of the Food, Conservation and Energy Act of 2008; Conduct in Violation of the Act AGENCY... Act and provide for a fairer market place. DATES: We will consider comments we receive by November 22... clarify conditions for industry compliance with the P&S Act and provide for a fairer market place. We have...

  17. An Act to Control and Regulate the Possession, Sale, Transport and Use of Radioactive Substances and the Possession and Use of Certain Apparatus capable of producing Radiation

    International Nuclear Information System (INIS)

    1958-01-01

    This Act covers all activities involving radioactive materials and radiation sources. It sets up a Radiological Advisory Council to advise the Minister responsible for health in Queensland on administration of the Act, regulations made thereunder and on preventing and minimising dangers arising from radioactive materials and radiation sources. It lays down the Council's composition and rules of procedure. The Act also provides for the licensing, control and registration of such materials and sources, including sanctions in case of non-compliance with its provisions. (NEA) [fr

  18. Hybrid Security Policies

    Directory of Open Access Journals (Sweden)

    Radu CONSTANTINESCU

    2006-01-01

    Full Text Available Policy is defined as the rules and regulations set by the organization. They are laid down by management in compliance with industry regulations, law and internal decisions. Policies are mandatory. Security policies rules how the information is protected against security vulnerabilities and they are the basis for security awareness, training and vital for security audits. Policies are focused on desired results. The means of achieving the goals are defined on controls, standards and procedures.

  19. HRS1 Acts as a Negative Regulator of Abscisic Acid Signaling to Promote Timely Germination of Arabidopsis Seeds

    Science.gov (United States)

    Wang, Ran; Liu, Hong; Yang, Huixia; Rodriguez, Pedro L.; Qin, Huanju; Liu, Xin; Wang, Daowen

    2012-01-01

    In this work, we conducted functional analysis of Arabidopsis HRS1 gene in order to provide new insights into the mechanisms governing seed germination. Compared with wild type (WT) control, HRS1 knockout mutant (hrs1-1) exhibited significant germination delays on either normal medium or those supplemented with abscisic acid (ABA) or sodium chloride (NaCl), with the magnitude of the delay being substantially larger on the latter media. The hypersensitivity of hrs1-1 germination to ABA and NaCl required ABI3, ABI4 and ABI5, and was aggravated in the double mutant hrs1-1abi1-2 and triple mutant hrs1-1hab1-1abi1-2, indicating that HRS1 acts as a negative regulator of ABA signaling during seed germination. Consistent with this notion, HRS1 expression was found in the embryo axis, and was regulated both temporally and spatially, during seed germination. Further analysis showed that the delay of hrs1-1 germination under normal conditions was associated with reduction in the elongation of the cells located in the lower hypocotyl (LH) and transition zone (TZ) of embryo axis. Interestingly, the germination rate of hrs1-1 was more severely reduced by the inhibitor of cell elongation, and more significantly decreased by the suppressors of plasmalemma H+-ATPase activity, than that of WT control. The plasmalemma H+-ATPase activity in the germinating seeds of hrs1-1 was substantially lower than that exhibited by WT control, and fusicoccin, an activator of this pump, corrected the transient germination delay of hrs1-1. Together, our data suggest that HRS1 may be needed for suppressing ABA signaling in germinating embryo axis, which promotes the timely germination of Arabidopsis seeds probably by facilitating the proper function of plasmalemma H+-ATPase and the efficient elongation of LH and TZ cells. PMID:22545134

  20. cAMP-CRP acts as a key regulator for the viable but non-culturable state in Escherichia coli.

    Science.gov (United States)

    Nosho, Kazuki; Fukushima, Hiroko; Asai, Takehiro; Nishio, Masahiro; Takamaru, Reiko; Kobayashi-Kirschvink, Koseki Joseph; Ogawa, Tetsuhiro; Hidaka, Makoto; Masaki, Haruhiko

    2018-03-01

    A variety of bacteria, including Escherichia coli, are known to enter the viable but non-culturable (VBNC) state under various stress conditions. During this state, cells lose colony-forming activities on conventional agar plates while retaining signs of viability. Diverse environmental stresses including starvation induce the VBNC state. However, little is known about the genetic mechanism inducing this state. Here, we aimed to reveal the genetic determinants of the VBNC state of E. coli. We hypothesized that the VBNC state is a process wherein specific gene products important for colony formation are depleted during the extended period of stress conditions. If so, higher expression of these genes would maintain colony-forming activities, thereby restraining cells from entering the VBNC state. From an E. coli plasmid-encoded ORF library, we identified genes that were responsible for maintaining high colony-forming activities after exposure to starvation condition. Among these, cpdA encoding cAMP phosphodiesterase exhibited higher performance in the maintenance of colony-forming activities. As cpdA overexpression decreases intracellular cAMP, cAMP or its complex with cAMP-receptor protein (CRP) may negatively regulate colony-forming activities under stress conditions. We confirmed this using deletion mutants lacking adenylate cyclase or CRP. These mutants fully maintained colony-forming activities even after a long period of starvation, while wild-type cells lost most of this activity. Thus, we concluded that the lack of cAMP-CRP effectively retains high colony-forming activities, indicating that cAMP-CRP acts as a positive regulator necessary for the induction of the VBNC state in E. coli.

  1. 76 FR 66933 - Privacy Act of 1974; Department of Homeland Security U.S. Coast Guard DHS/USCG-014 Military Pay...

    Science.gov (United States)

    2011-10-28

    ... 1974; Department of Homeland Security U.S. Coast Guard DHS/USCG--014 Military Pay and Personnel System... Security U.S. Coast Guard--014 Military Pay and Personnel System of Records.'' This system of records allows the Department of Homeland Security U.S. Coast Guard to collect and maintain records regarding pay...

  2. Impacts and Compliance Implementation Plans and Required Deviations for Toxic Substance Control Act (TSCA) Regulation of Double Shell Tanks (DST)

    International Nuclear Information System (INIS)

    MULKEY, C.H.

    2000-01-01

    In May 2000, the U.S. Department of Energy, Office of River Protection (DOE-ORP) and the U.S. Environmental Protection Agency (EPA) held meetings regarding the management of polychlorinated biphenyls (PCBs) in the Hanford tank waste. It was decided that the radioactive waste currently stored in the double-shell tanks (DSTs) contain waste which will become subject to the Toxic Substance Control Act (TSCA) (40 CFR 761). As a result, DOE-ORP directed the River Protection Project tank farm contractor (TFC) to prepare plans for managing the PCB inventory in the DSTs. Two components of the PCB management plans are this assessment of the operational impacts of TSCA regulation and the identifications of deviations from TSCA that are required to accommodate tank farm unique limitations. This plan provides ORP and CH2M HILL Hanford Group, Inc. (CHG) with an outline of TSCA PCB requirements and their applicability to tank farm activities, and recommends a compliance/implementation approach. Where strict compliance is not possible, the need for deviations from TSCA PCB requirements is identified. The purpose of assembling this information is to enhance the understanding of PCB management requirements, identify operational impacts and select impact mitigation strategies. This information should be useful in developing formal agreements with EPA where required

  3. To The Question Of The Concepts "National Security", "Information Security", "National Information Security" Meanings

    OpenAIRE

    Alexander A. Galushkin

    2015-01-01

    In the present article author analyzes value of the concepts "national security", "information security", "national information security". Author gives opinions of scientists-jurists, definitions given by legislators and normotvorets in various regulations.

  4. 75 FR 35338 - Implementation of Regulations Required Under Title XI of the Food, Conservation and Energy Act of...

    Science.gov (United States)

    2010-06-22

    ... Under Title XI of the Food, Conservation and Energy Act of 2008; Conduct in Violation of the Act AGENCY... fairer market place. DATES: We will consider comments we receive by August 23, 2010. ADDRESSES: We invite... Title XI of the Food, Conservation and Energy Act of 2008 (Farm Bill) (Pub. L. 110-246), Congress...

  5. International codes concerning the security of radioisotopes

    International Nuclear Information System (INIS)

    Kusama, Keiji

    2013-01-01

    Explained is the title subject with international and Japanese official argument or publications and actions, where the security is defined as protection of sealed and unsealed radioisotopes (RI) from malicious acts. IAEA worked out the Code of Conduct on the Safety and Security of Radioactive Sources in 2004 based on its preceding argument and with the turning point of the terrorism 3.11 (2001), and Nuclear Security Recommendations on radioactive material and associated facilities (2011), for whose prerequisite, Security of radioactive sources: implementing guide (2009) and Security in the transport of radioactive material (2008) had been drawn up. The Code of Conduct indicates the security system to regulate the sealed sources that each nation has to build up through legislation, setup of regulatory agency, registration of the sources, provision of concerned facilities with radiation protection, etc. For attaining this purpose, IAEA defined Guidance on the Import and Export of Radioactive Sources (2005, 2012), Categorization of radioactive sources (2005) and Dangerous quantities of radioactive material (D-VALUES) (2006). For updating the related matters, IAEA holds international conferences somewhere in the world every year. The Nuclear Security Recommendations indicate the nation's responsibility of building up and maintaining the security system above with well-balanced measures between the safe and secure use of RI without the invalid inhibition of their usage. Japan government worked out the concept essential for ensuring the nuclear security in Sep. 2011, in which for RI, defined were the risk and benefit in use and security, and securing role of the present legal systems concerning the safety handling and objective RI involved in their registration system. Securing measures of RI in such usage as medical and industrial aids must be of advanced usefulness and safety in harmony with activities of other countries. (T.T)

  6. 20 CFR 234.20 - Computation of the employee's 1937 Act LSDP basic amount.

    Science.gov (United States)

    2010-04-01

    ... compensation and section 209 of the Social Security Act for a definition of creditable wages.) Closing date... 20 Employees' Benefits 1 2010-04-01 2010-04-01 false Computation of the employee's 1937 Act LSDP basic amount. 234.20 Section 234.20 Employees' Benefits RAILROAD RETIREMENT BOARD REGULATIONS UNDER THE...

  7. Regulatory risks associated with nuclear safety legislation after Fukushima Daiichi Nuclear Accident in Japan. Focus on legal structure of the nuclear reactor regulation act

    International Nuclear Information System (INIS)

    Tanabe, Tomoyuki; Maruyama, Masahiro

    2016-01-01

    Nuclear safety regulations enforced after Fukushima Daiichi Nuclear Accident under the Nuclear Reactor Regulation Act face the following regulatory problems that involve potential risk factors for nuclear businesses; 1) 'entity based regulation' unable to cope with business cessation or bankruptcy of the entity subject of regulation, 2) potential risk of the Nuclear Regulation Authority's inappropriate involvement in nuclear industry policy beyond their duty, and 3) compliance of backfits under vague regulations. In order to alleviate them, this report, through analyzing these regulatory problems from the view point of sound development of the nuclear industry, proposes the following regulatory reforms; (1) To clarify the rule for industry policy in nuclear regulations and enable the authority, Ministry of Economy, Trade and Industry, to choose most appropriate industrial policy measure. (2) Through establishing safety goals as measures to promote continuous improvement of nuclear safety regulations, to stimulate timely adjustments of the regulations, and to introduce a legal mechanism into the nuclear regulation systems under which validity of administrative law and its application can be checked. (author)

  8. The impact of the European insolvency regulation on lenders, lending decisions, the structuring of transactions and enforcement of security

    OpenAIRE

    Sharma, R

    2011-01-01

    This Thesis seeks to shed light on the issue of how far secured creditor rights are protected in EU cross-border insolvencies by focusing on the perspective and position of English lenders. The main thread throughout is the legal concerns faced by lenders when lending to a company incorporated in England and Wales which operates across the European Union and has assets and creditors spread across various Member States. The initial stages of the structuring of a cross-border security arrangeme...

  9. 45 CFR 205.25 - Eligibility of supplemental security income beneficiaries for food stamps or surplus commodities.

    Science.gov (United States)

    2010-10-01

    ... beneficiaries for food stamps or surplus commodities. 205.25 Section 205.25 Public Welfare Regulations Relating....25 Eligibility of supplemental security income beneficiaries for food stamps or surplus commodities... XVI of the Social Security Act, the State agency shall make the following determinations: (1) The...

  10. Privatising Security

    Directory of Open Access Journals (Sweden)

    Irina Mindova-Docheva

    2016-06-01

    Full Text Available The article proposes an analysis of the different approaches towards employing the international legal framework in the regulation and oversight of private military and security companies’ operation in armed conflicts and in peace time security systems. It proposes a partnership-based approach for public and private actors aiming at creating and sharing common values under the principles of solidarity, protection of human rights and rule of law. A focus of further research should be the process of shaping those common values.

  11. Amendment of the Energy Economy Act. Novellierung des Energiewirtschaftsgesetzes

    Energy Technology Data Exchange (ETDEWEB)

    1990-12-20

    The Federal Association of German Industry deliberates on the reform of the Energy Economy Act, arriving at the following intermediate result that is to be discussed by the member associations. The following might be essential points for the attitude of the industry regarding the reform of the energy economy act: deregulation, qualitative modernization, concentration on electric power and gas, differentiated regulations for power and gas, limitation of municipal influence (outside the scope of the energy economy act: reform of the municipal right of way), secure power and gas supply at internationally competitive prices. This is followed by considerations regarding the individual provisions of the energy economy act and their discussion. (orig./HSCH).

  12. Some controversy about law on private security

    Directory of Open Access Journals (Sweden)

    Stajić Ljubomir

    2014-01-01

    Full Text Available The Republic of Serbia is one of the last countries that legally regulate the private security sector, which is a new conceptual system of the national security system. Since the law is expected to solve many issues and dilemmas, and bring order to the area, which by some accounts is a very profitable branch of economy. Expectations were that by the end to regulate issues such as: 1 the need for institutionalization of partnership between the public and private sectors for mutual benefit, 2 the need of expressing mutual interest to establish the desired condition of security in the entire society and 3 the need to define the mechanisms and authority to achieve mentioned above. Based on this, legal framework of private security should explicitly provide: 1 a new role of the private sector, 2 communication and data exchange between the public and private sector, 3 mandatory notification about prepared or committed criminal acts on which there is information, 4 cooperation in the tasks of necessarily protected facilities, 4 cooperation in crisis situations including natural disasters, traffic accidents, strikes, sabotage, terrorist attacks, etc., 5 cooperate in the selection and training of staff and 6 cooperation in planning activities and project design of security. This paper presents a critical review of some theoretical and professional controversies in the solutions provided by law, for the purpose of answering whether it is achieving the purpose of passing of such a legal act.

  13. 76 FR 72878 - Financial Crimes Enforcement Network; Amendment to the Bank Secrecy Act Regulations-Imposition of...

    Science.gov (United States)

    2011-11-28

    ... Iran as a Jurisdiction of Primary Money Laundering Concern AGENCY: Financial Crimes Enforcement Network... Republic of Iran (``Iran'') is a jurisdiction of primary money laundering concern pursuant to 31 U.S.C... Act amends the anti- money laundering provisions of the Bank Secrecy Act (``BSA''), codified at 12 U.S...

  14. Federal Coal Mine Health and Safety Act of 1969, Title IV, as amended (The Black Lung Benefits Act); payment of benefits--withholding Part B benefits where Part C payments are made for the same period. Social Security Administration. Final rule.

    Science.gov (United States)

    1982-05-04

    This regulation confirms the interim rule authorizing the Social Security Administration to withhold payment of Part B Black Lung benefits where Part C Black Lung benefits administered by the Dept. of Labor are paid for the same period. We are doing this by expanding the definition of "overpayment" in 20 CFR 410.560(a) to include these duplicate payments under Part C. This regulation provides a quick and efficient means of avoiding unjustified duplicate payments.

  15. Shared Solar: Current Landscape, Market Potential, and the Impact of Federal Securities Regulation; NREL (National Renewable Energy Laboratory)

    Energy Technology Data Exchange (ETDEWEB)

    None

    2015-05-27

    This presentation provides a high-level overview of the current U.S. shared solar landscape, the impact that a given shared solar program's structure has on requiring federal securities oversight, as well as an estimate of market potential for U.S. shared solar deployment.

  16. 75 FR 73095 - Privacy Act of 1974; Report of New System of Records

    Science.gov (United States)

    2010-11-29

    ... Information Security Management Act of 2002; the Computer Fraud and Abuse Act of 1986; the E-Government Act of... Information Security Management Act of 2002; the Computer Fraud and Abuse Act of 1986; the E-Government Act of... Social Security Act (the Act) by establishing incentive payments to eligible professionals (EPs...

  17. Medical Information Security

    OpenAIRE

    William C. Figg, Ph.D.; Hwee Joo Kam, M.S.

    2011-01-01

    Modern medicine is facing a complex environment, not from medical technology but rather government regulations and information vulnerability. HIPPA is the government’s attempt to protect patient’s information yet this only addresses traditional record handling. The main threat is from the evolving security issues. Many medical offices and facilities have multiple areas of information security concerns. Physical security is often weak, office personnel are not always aware of security needs an...

  18. S. 2415: Title I may be cited as the Uranium Enrichment Act of 1990; Title II may be cited as the Uranium Security and Tailings Reclamation Act of 1989; and Title III may be cited as The Solar, Wind, Waste, and Geothermal Power Production Incentives Act of 1990, introduced in the Senate, One Hundred First Congress, Second Session, April 4, 1990

    International Nuclear Information System (INIS)

    Anon.

    1990-01-01

    S. 2415 (which started out as a bill to encourage solar and geothermal power generation) now would amend the Atomic Energy Act of 1954 to redirect uranium enrichment enterprises to further the national interest, respond to competitive market forces, and to ensure the nation's common defense and security. It would establish a United States Enrichment Corporation for the following purposes: to acquire feed materials, enriched uranium, and enrichment facilities; to operate these facilities; to market enriched uranium for governmental purposes and qualified domestic and foreign persons; to conduct research into uranium enrichment; and to operate as a profitable, self-financing, reliable corporation and in a manner consistent with the health and safety of the public. The bill describes powers and duties of the corporation; the organization, finance, and management; decontamination and decommissioning. The second part of the bill would ensure an adequate supply of domestic uranium for defense and power production; provide assistance to the domestic uranium industry; and establish, facilitate, and expedite a comprehensive system for financing reclamation and remedial action at active uranium and thorium processing sites. The third part of the bill would remove the size limitations on power production facilities now part of the Public Utility Regulatory Policies Act of 1978. Solar, wind, waste, or geothermal power facilities would no longer have to be less than 80 MW to qualify as a small power production facility

  19. 76 FR 10205 - Department of Homeland Security Implementation of OMB Guidance on Drug-Free Workplace Requirements

    Science.gov (United States)

    2011-02-24

    ... Flexibility Act, 5 U.S.C. 605(b), as amended by the Small Business Regulatory Enforcement and Fairness Act of... Guidance on Drug-Free Workplace Requirements AGENCY: Department of Homeland Security (DHS). ACTION: Final... consolidate all Federal regulations on drug-free workplace requirements for financial assistance into one...

  20. 17 CFR 230.100 - Definitions of terms used in the rules and regulations.

    Science.gov (United States)

    2010-04-01

    ... express reference to the Act or to the rules and regulations or to a portion thereof defines such term for... 17 Commodity and Securities Exchanges 2 2010-04-01 2010-04-01 false Definitions of terms used in... terms used in the rules and regulations. (a) As used in the rules and regulations prescribed in this...