42 CFR 405.215 - Confidential commercial and trade secret information.
2010-10-01
... 42 Public Health 2 2010-10-01 2010-10-01 false Confidential commercial and trade secret information. 405.215 Section 405.215 Public Health CENTERS FOR MEDICARE & MEDICAID SERVICES, DEPARTMENT OF... trade secret information. To the extent that CMS relies on confidential commercial or trade secret...
40 CFR 370.64 - What information can I claim as trade secret or confidential?
2010-07-01
... secret or confidential? 370.64 Section 370.64 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY... secret or confidential? (a) Trade secrets. You may be able to withhold the name of a specific chemical... trade secret. The requirements for withholding trade secret information are set forth in EPCRA section...
Independent consultants : fiduciary duties, trade secrets and confidential information
International Nuclear Information System (INIS)
Fraser, B.; Wilhelmson, M.
1999-01-01
Because of cutbacks and downsizing within the petroleum industry, it has become one of the largest users of contract personnel to provide services that were previously provided by senior levels of management. This paper explored the application of common law fiduciary duties and the duty of confidence to the independent workforce. It examined to what extent fiduciary duties apply to independent consultants and the best way for the employer to protect itself from the potential misuse of confidential information. Part 1 of the paper described fiduciary duties. A fiduciary relationship was described as one that possesses the following three characteristics: (1) the fiduciary has scope for the exercise of some discretion of power, (2) the fiduciary can unilaterally exercise that power to affect the beneficiary's practical interests, and (3) the beneficiary is peculiarly vulnerable to the fiduciary holding the discretion of power. Three examples of how the courts treated some arguments regarding fiduciaries were presented. Part 2 of this paper discussed how trade secrets and confidential information should be handled. It was explained, that regardless of fiduciary duties, the unauthorized use of confidential information by an independent contractor can give rise to liability and an award of damages by the courts. Some examples where the Supreme Court of Canada found breach of confidence by a party were presented. Information communicated from an employer to an employee can be divided into the following three categories: (1) publicly accessible and not confidential, (2) confidential and must be treated as such while an employee is employed, but if learned becomes part of the employees skill and knowledge, and (3) specific confidential trade secrets that cannot lawfully be used for anyone's benefit but the employer's. Issues regarding defining rights and obligations by contract were also discussed
2011-05-09
... assistance can take the form of financial assistance (i.e., grants, cooperative agreements, and technology... Department of Energy Trade Secrets and Commercial or Financial Information That Is Privileged or Confidential... of trade secrets and commercial or financial information that is privileged or confidential, where...
5 CFR 1312.26 - Control of secret and confidential material.
2010-01-01
... 5 Administrative Personnel 3 2010-01-01 2010-01-01 false Control of secret and confidential... Accountability of Classified Information § 1312.26 Control of secret and confidential material. Classified... Document Control, will be used to establish accountability controls on all Secret material received or...
The problem of using trade secrets in economic relations
Directory of Open Access Journals (Sweden)
А. О. Олефір
2015-05-01
Full Text Available Problem setting. In a market economy and increased competition between enterprises become increasingly important concepts such as business information, trade secrets, know-how, confidential information, the information with restricted access. Given the fact that only one patent protection is unable to meet the needs of researchers, in addition to formal public protection and secured legal means we would like to pay attention at private legal measures, particular, the mode of trade secrets. Recent research and publications analysis. Different aspects of the protection of trade secrets were investigated by specialists such as G. Androschuk, J. Berzhye, I. Davydov, O. Davydyuk, D. Zadyhaylo, P. Kraynov, G. Nikiforov, S. Nikiforov, V. Rubanov, E. Solovyov, L. Hoffman, V. Chaplygin, A. Cherniavsky and others. However, at present there is a lack of comprehensive research of this legal phenomenon, equally useful for innovators and businesses that actively protect corporate security. Paper objective. This article is planned to determine the legal characteristics, structural elements and mechanisms by which the use of trade secrets in business have a positive impact on innovation development and corporate security entities. Paper main body. On the basis of requirements of Art. 505 Civil Code of Ukraine and art. 39 of the TRIPS Agreement we formulated commercial information signs under which it receives legal protection as an object of intellectual property: (1 privacy (real or potential in the sense that it is as a whole or in a precise combination of aggregate and its components are not generally known or available to persons in the circles that normally deal with such information; (2 commercial value (not purely industrial or industrial, due to its secrecy; this information is unknown to others, which is a commercial interest; (3 the lawful holder of the information provides active special measures (technical, organizational, legal to preserve secrecy
7 CFR 1425.5 - Confidentiality.
2010-01-01
... AGRICULTURE LOANS, PURCHASES, AND OTHER OPERATIONS COOPERATIVE MARKETING ASSOCIATIONS § 1425.5 Confidentiality. Information submitted to CCC related to trade secrets, financial or commercial operations, or the financial...
7 CFR 930.73 - Confidential information.
2010-01-01
... 7 Agriculture 8 2010-01-01 2010-01-01 false Confidential information. 930.73 Section 930.73 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (Marketing... a trade secret or disclosing trade position, financial condition, or business operations of the...
2010-04-01
... ADMINISTRATION, DEPARTMENT OF HEALTH AND HUMAN SERVICES GENERAL PUBLIC INFORMATION Exemptions § 20.61 Trade..., preparing, compounding, or processing of trade commodities and that can be said to be the end product of either innovation or substantial effort. There must be a direct relationship between the trade secret and...
40 CFR 790.7 - Confidentiality.
2010-07-01
... words “confidential business information,” “trade secret,” or another appropriate phrase indicating its... competitor use such information? How substantial would the harmful effects be? What is the causal...
7 CFR 993.71 - Confidential information.
2010-01-01
... 7 Agriculture 8 2010-01-01 2010-01-01 false Confidential information. 993.71 Section 993.71 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (Marketing... information constituting a trade secret or disclosing of the trade position, financial condition, or business...
7 CFR 982.70 - Confidential information.
2010-01-01
... 7 Agriculture 8 2010-01-01 2010-01-01 false Confidential information. 982.70 Section 982.70 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (Marketing... trade secret or disclosing of the trade position, financial condition, or business operations of the...
The Confidentiality of Medical Secrets of Patients by the Nursing Staff
Directory of Open Access Journals (Sweden)
Chalkias Theodoros
2010-01-01
Full Text Available In this article you will find a critical discussion about the significance of confidentiality of "medical secrets" (keeping the secrets of ill people by nurses. Special cases are mentioned regarding the need to keep, or reveal the secret.
Can you keep a secret? Confidentiality in psychotherapy.
Younggren, Jeffrey N; Harris, Eric A
2008-05-01
Confidentiality is the secret-keeping duty that arises from the establishment of the professional relationship psychologists develop with their clients. It is a duty created by the professional relationship, it is set forth in the American Psychological Association's (2002) Ethical Principles and Code of Conduct, and it is codified in many state regulations. However, the difference between confidentiality and legal privilege; how, why, and when it can be violated; and the reasons for so doing are not well understood by many practitioners. While on the surface confidentiality might seem to be an easy concept to apply to professional practice, in fact it is quite complex and filled with exceptions that frequently differ from circumstance to circumstance and from state to state. A lack of respect for and a lack of familiarity with the significance of these exceptions could have dire professional consequences. This article reviews the ethical imperative of confidentiality and then provides examples of legal cases that help to better understand its complexity. Then, we offer strategies designed to help metal health practitioners when they are confronted with questions regarding confidentiality and privilege.
Trade Secrets in Life Science and Pharmaceutical Companies
Nealey, Tara; Daignault, Ronald M.; Cai, Yu
2015-01-01
Trade secret protection arises under state common law and state statutes. In general, a trade secret is information that is not generally known to the public and is maintained as a secret, and it provides a competitive advantage or economic benefit to the trade secret holder. Trade secrets can be worth tens or hundreds of millions of dollars, and damage awards in trade secret litigation have been high; often, there is a lot at stake. Obtaining a trade secret through “improper means” is misappropriation. If the alleged trade secret, however, was developed independently, known publicly, or not maintained as a secret, then those defenses may successfully overcome a claim for trade secret misappropriation. With today’s interconnectedness in the biotechnology and pharmaceutical fields, more collaborations, joint ventures, and outsourcing arrangements among firms, and increased mobility of employees’ careers, life science companies need to not only understand how to protect their trade secrets, but also know how to defend against a claim for trade secret theft. PMID:25414378
Trade secrets in life science and pharmaceutical companies.
Nealey, Tara; Daignault, Ronald M; Cai, Yu
2014-11-20
Trade secret protection arises under state common law and state statutes. In general, a trade secret is information that is not generally known to the public and is maintained as a secret, and it provides a competitive advantage or economic benefit to the trade secret holder. Trade secrets can be worth tens or hundreds of millions of dollars, and damage awards in trade secret litigation have been high; often, there is a lot at stake. Obtaining a trade secret through "improper means" is misappropriation. If the alleged trade secret, however, was developed independently, known publicly, or not maintained as a secret, then those defenses may successfully overcome a claim for trade secret misappropriation. With today's interconnectedness in the biotechnology and pharmaceutical fields, more collaborations, joint ventures, and outsourcing arrangements among firms, and increased mobility of employees' careers, life science companies need to not only understand how to protect their trade secrets, but also know how to defend against a claim for trade secret theft. Copyright © 2015 Cold Spring Harbor Laboratory Press; all rights reserved.
Some Economics of Trade Secret Law
David D. Friedman; William M. Landes; Richard A. Posner
1991-01-01
Despite the practical importance of trade secrets to the business community, the law of trade secrets is a neglected orphan in economic analysis. This paper sketches an approach to the economics of trade secret law that connects it more closely both to other areas of intellectual property and to broader issues in the positive economic theory of the common law.
18 CFR 401.75 - Protection of trade secrets; Confidential information.
2010-04-01
..., confidential statistical data, amount or source of any income, profits, losses, or expenditures of any person... States Code which provides: Whoever, being an officer or employee of the United States or of any...
29 CFR 1903.9 - Trade secrets.
2010-07-01
... INSPECTIONS, CITATIONS AND PROPOSED PENALTIES § 1903.9 Trade secrets. (a) Section 15 of the Act provides: “All... concerns or relates to the trade secrets, processes, operations, style of work, or apparatus, or to the...
2010-07-01
... 32 National Defense 1 2010-07-01 2010-07-01 false Temporary eligibility for access at the confidential and secret levels and temporary eligibility for âLâ access authorization. 147.30 Section 147.30... Temporary Access § 147.30 Temporary eligibility for access at the confidential and secret levels and...
Trade Secrets in the Legal Studies Curriculum--A Case Study
Evans, Michelle
2012-01-01
Trade secrets can be a valuable company asset because of their potential to last forever. Unfortunately, along with such a significant benefit, there is also a significant risk--the risk that the trade secret can be lost in an instant if it is not sufficiently protected. Companies must be vigilant in protecting these secrets. However, the law is…
15 CFR 806.5 - Confidentiality.
2010-01-01
... 15 Commerce and Foreign Trade 3 2010-01-01 2010-01-01 false Confidentiality. 806.5 Section 806.5 Commerce and Foreign Trade Regulations Relating to Commerce and Foreign Trade (Continued) BUREAU OF ECONOMIC ANALYSIS, DEPARTMENT OF COMMERCE DIRECT INVESTMENT SURVEYS § 806.5 Confidentiality. Information...
2012-06-08
... Activities; Proposed Collection; Comment Request; Trade Secret Claims for Emergency Planning and Community... Planning and Community Right-to- Know Act (EPCRA). Title: Trade Secret Claims for Emergency Planning and...). Estimated total number of potential respondents: 481. Frequency of response: Trade secret claims are...
EPCRA Trade Secret Form Instructions (PDF)
Detail on what information is required for each section of the form. Only the specific chemical identity required to be disclosed in EPCRA sections 303, 311,312, and 313 submissions may be claimed trade secret on the EPCRA report.
A trade secret model for genomic biobanking.
Conley, John M; Mitchell, Robert; Cadigan, R Jean; Davis, Arlene M; Dobson, Allison W; Gladden, Ryan Q
2012-01-01
Genomic biobanks present ethical challenges that are qualitatively unique and quantitatively unprecedented. Many critics have questioned whether the current system of informed consent can be meaningfully applied to genomic biobanking. Proposals for reform have come from many directions, but have tended to involve incremental change in current informed consent practice. This paper reports on our efforts to seek new ideas and approaches from those whom informed consent is designed to protect: research subjects. Our model emerged from semi-structured interviews with healthy volunteers who had been recruited to join either of two biobanks (some joined, some did not), and whom we encouraged to explain their concerns and how they understood the relationship between specimen contributors and biobanks. These subjects spoke about their DNA and the information it contains in ways that were strikingly evocative of the legal concept of the trade secret. They then described the terms and conditions under which they might let others study their DNA, and there was a compelling analogy to the commonplace practice of trade secret licensing. We propose a novel biobanking model based on this trade secret concept, and argue that it would be a practical, legal, and ethical improvement on the status quo. © 2012 American Society of Law, Medicine & Ethics, Inc.
40 CFR 350.15 - Public petitions requesting disclosure of chemical identity claimed as trade secret.
2010-07-01
... of chemical identity claimed as trade secret. 350.15 Section 350.15 Protection of Environment... TRADE SECRECY CLAIMS FOR EMERGENCY PLANNING AND COMMUNITY RIGHT-TO-KNOW INFORMATION: AND TRADE SECRET... chemical identity claimed as trade secret. (a) The public may request the disclosure of chemical identity...
Employees, Trade Secrets and Restrictive Covenants
Kamperman Sanders, Anselm; Heath, C.
2017-01-01
The book covers the protection of trade secrets and the law on post-contractual non-compete clauses (restrictive covenants) in an employment context. The topic is approached on an international and comparative level (chapters 1–3 and 10), and by way of country reports covering several European and
WTO confidential: the case of asbestos. World Trade Organization.
Castleman, Barry
2002-01-01
The World Trade Organization (WTO), created in 1995, adjudicates "trade disputes" between member nations in cases with great human rights, cultural, environmental, and public health significance. Throughout the process of dispute resolution and even after a case is concluded, very little of what happens is made accessible to the public. However, it is one thing to criticize the WTO for its lack of transparency from outside the process, and another to critically examine what was withheld from disclosure and what dangers that presents. This is the inside story from a scientific adviser to one of the parties in a WTO case, analyzing what happened from a public health point of view. This analysis concludes that the public health justification of banning asbestos was accepted in the end by the economists at the WTO, despite the WTO's bias in favoring the party (Canada) making the free trade challenge (to public health legislation, in this case) in numerous stages of the process, despite the WTO's utter lack of expertise in science, medicine, engineering, and public health, and despite important erroneous statements made to the WTO under the cover of confidentiality. Despite its result, this case illustrates that the WTO's threat to national sovereignty could never withstand the light of day, that the people of the world would reject this dangerous free trade fundamentalism if the limitations and dangers of the process were open for all to see.
Trading secrets: Jews and the early modern quest for clandestine knowledge.
Jütte, Daniel
2012-12-01
This essay explores the significance and function of secrecy and secret sciences in Jewish-Christian relations and in Jewish culture in the early modern period. It shows how the trade in clandestine knowledge and the practice of secret sciences became a complex, sometimes hazardous space for contact between Jews and Christians. By examining this trade, the essay clarifies the role of secrecy in the early modern marketplace of knowledge. The attribution of secretiveness to Jews was a widespread topos in early modern European thought. However, relatively little is known about the implications of such beliefs in science or in daily life. The essay pays special attention to the fact that trade in secret knowledge frequently offered Jews a path to the center of power, especially at court. Furthermore, it becomes clear that the practice of secret sciences, the trade in clandestine knowledge, and a mercantile agenda were often inextricably interwoven. Special attention is paid to the Italian-Jewish alchemist, engineer, and entrepreneur Abramo Colorni (ca. 1544-1599), whose career illustrates the opportunities provided by the marketplace of secrets at that time. Much scholarly (and less scholarly) attention has been devoted to whether and what Jews "contributed" to what is commonly called the "Scientific Revolution." This essay argues that the question is misdirected and that, instead, we should pay more attention to the distinctive opportunities offered by the early modern economy of secrecy.
19 CFR 210.5 - Confidential business information.
2010-04-01
... 19 Customs Duties 3 2010-04-01 2010-04-01 false Confidential business information. 210.5 Section 210.5 Customs Duties UNITED STATES INTERNATIONAL TRADE COMMISSION INVESTIGATIONS OF UNFAIR PRACTICES IN IMPORT TRADE ADJUDICATION AND ENFORCEMENT Rules of General Applicability § 210.5 Confidential...
Trade Secret Law and Information Systems: Can Your Students Keep a Secret?
Willey, Lorrie; Ford, Janet C.; White, Barbara Jo; Clapper, Danial L.
2011-01-01
The impact of intellectual property (IP) law on information systems (IS) professionals in business cannot be overstated. The IS 2010 model curriculum guidelines for undergraduate IS programs stress the importance of information security and knowledge about IP. While copyright and patents are the most well-known types of IP, another, trade secrets,…
15 CFR 718.2 - Identification of confidential business information.
2010-01-01
... business information. 718.2 Section 718.2 Commerce and Foreign Trade Regulations Relating to Commerce and Foreign Trade (Continued) BUREAU OF INDUSTRY AND SECURITY, DEPARTMENT OF COMMERCE CHEMICAL WEAPONS CONVENTION REGULATIONS CONFIDENTIAL BUSINESS INFORMATION 718.2 Identification of confidential business...
The trade secrets protection in U.S. and in Europe: a comparative study
Directory of Open Access Journals (Sweden)
Chiara Gaido
2017-12-01
Full Text Available Only by deeply understanding the new laws that govern trade secrets protection in the United States and Europe, companies will be able to effectively protect their own trade secrets. The purpose of this paper is to highlight the similarities and differences between both regulations to give useful guidelines to international companies who deal in both geographical areas. Therefore, the paper will focus first on the economic value of trade secrets and the costs related to cybercrime and cyberespionage. Then, it will analyze the US and EU historical legal backgrounds that brought to the adoption of both laws. Finally, this article will make a comparative analysis of the provisions in each law. Hence, the paper makes potential suggestions for companies that deal in both regimes.
2010-07-01
... determined to be non-trade secret; notice of intent to release chemical identity. 350.18 Section 350.18... INFORMATION: AND TRADE SECRET DISCLOSURES TO HEALTH PROFESSIONALS Trade Secrecy Claims § 350.18 Release of chemical identity determined to be non-trade secret; notice of intent to release chemical identity. (a...
Genetic secrets: Protecting privacy and confidentiality in the genetic era
Energy Technology Data Exchange (ETDEWEB)
Rothstein, M.A. [ed.
1998-07-01
Few developments are likely to affect human beings more profoundly in the long run than the discoveries resulting from advances in modern genetics. Although the developments in genetic technology promise to provide many additional benefits, their application to genetic screening poses ethical, social, and legal questions, many of which are rooted in issues of privacy and confidentiality. The ethical, practical, and legal ramifications of these and related questions are explored in depth. The broad range of topics includes: the privacy and confidentiality of genetic information; the challenges to privacy and confidentiality that may be projected to result from the emerging genetic technologies; the role of informed consent in protecting the confidentiality of genetic information in the clinical setting; the potential uses of genetic information by third parties; the implications of changes in the health care delivery system for privacy and confidentiality; relevant national and international developments in public policies, professional standards, and laws; recommendations; and the identification of research needs.
15 CFR 718.3 - Disclosure of confidential business information.
2010-01-01
... 15 Commerce and Foreign Trade 2 2010-01-01 2010-01-01 false Disclosure of confidential business... (Continued) BUREAU OF INDUSTRY AND SECURITY, DEPARTMENT OF COMMERCE CHEMICAL WEAPONS CONVENTION REGULATIONS CONFIDENTIAL BUSINESS INFORMATION § 718.3 Disclosure of confidential business information. (a) General...
19 CFR 181.121 - Maintenance of confidentiality.
2010-04-01
... 181.121 Customs Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY; DEPARTMENT OF THE TREASURY (CONTINUED) NORTH AMERICAN FREE TRADE AGREEMENT Confidentiality of Business... possession of confidential business information collected pursuant to this part shall, in accordance with...
15 CFR 325.16 - Protecting confidentiality of information.
2010-01-01
... 15 Commerce and Foreign Trade 2 2010-01-01 2010-01-01 false Protecting confidentiality of information. 325.16 Section 325.16 Commerce and Foreign Trade Regulations Relating to Commerce and Foreign Trade (Continued) INTERNATIONAL TRADE ADMINISTRATION, DEPARTMENT OF COMMERCE MISCELLANEOUS REGULATIONS...
CRAC : Confidentiality risk analysis and IT-architecture comparison of business networks
Morali, A.; Zambon, E.; Etalle, S.; Wieringa, R.J.
2009-01-01
The leakage of confidential information (e.g. industrial secrets, patient records and user credentials) is one of the risks that have to be accounted for and mitigated by organizations dealing with confidential data. Unfortunately, assessing confidentiality risk is challenging, particularly in the
Madison, Michael
2017-01-01
The law of trade secrets is often conceptualized in bilateral terms, as creating and enforcing rights between trade secret owners, on the one hand, and misappropriators on the other hand. This paper, a chapter in a forthcoming collection on the law of trade secrets, argues that trade secrets and the law that guards them can serve structural and insitutional roles as well. Somewhat surprisingly, given the law’s focus on secrecy, among the institutional products of trade secrets law are commons...
78 FR 16692 - Chemical Facility Anti-Terrorism Standards (CFATS)
2013-03-18
... trade secrets, confidential commercial or financial information, Chemical-terrorism Vulnerability... from other comments in response to this notice. Comments containing trade secrets, confidential... Burden Cost (operating/maintaining): $3,977. Instrument: Notification of a New Top Screen. Frequency: On...
77 FR 74677 - Chemical Facility Anti-Terrorism Standards (CFATS)
2012-12-17
... information provided. Special Instructions: Comments that include trade secrets, confidential commercial or.... Comments containing trade secrets, confidential commercial or financial information, CVI, SSI, or PCII.... Instrument: Notification of a New Top Screen. Frequency: On occasion/Other. Affected Public: Business or...
77 FR 74678 - Chemical Security Assessment Tool (CSAT)
2012-12-17
... information provided. Special Instructions: Comments that include trade secrets, confidential commercial or.... Comments containing trade secrets, confidential commercial or financial information, CVI, SSI, or PCII... March 31, 2013. The Department's Methodology in Estimating the Burden for the Top- Screen Number of...
19 CFR 210.72 - Confidentiality of information.
2010-04-01
... 19 Customs Duties 3 2010-04-01 2010-04-01 false Confidentiality of information. 210.72 Section 210.72 Customs Duties UNITED STATES INTERNATIONAL TRADE COMMISSION INVESTIGATIONS OF UNFAIR PRACTICES IN IMPORT TRADE ADJUDICATION AND ENFORCEMENT Enforcement Procedures and Advisory Opinions § 210.72...
15 CFR Supplement No. 1 to Part 718 - Confidential Business Information Declared or Reported *
2010-01-01
... 15 Commerce and Foreign Trade 2 2010-01-01 2010-01-01 false Confidential Business Information... Commerce and Foreign Trade (Continued) BUREAU OF INDUSTRY AND SECURITY, DEPARTMENT OF COMMERCE CHEMICAL WEAPONS CONVENTION REGULATIONS CONFIDENTIAL BUSINESS INFORMATION Pt. 718, Supp. 1 Supplement No. 1 to Part...
Genetic secrets: Protecting privacy and confidentiality in the genetic era. Final report
Energy Technology Data Exchange (ETDEWEB)
Rothstein, M.A. [ed.
1998-09-01
Few developments are likely to affect human beings more profoundly in the long run than the discoveries resulting from advances in modern genetics. Although the developments in genetic technology promise to provide many additional benefits, their application to genetic screening poses ethical, social, and legal questions, many of which are rooted in issues of privacy and confidentiality. The ethical, practical, and legal ramifications of these and related questions are explored in depth. The broad range of topics includes: the privacy and confidentiality of genetic information; the challenges to privacy and confidentiality that may be projected to result from the emerging genetic technologies; the role of informed consent in protecting the confidentiality of genetic information in the clinical setting; the potential uses of genetic information by third parties; the implications of changes in the health care delivery system for privacy and confidentiality; relevant national and international developments in public policies, professional standards, and laws; recommendations; and the identification of research needs.
Directory of Open Access Journals (Sweden)
Nelson Remolina Angarita
2017-12-01
Full Text Available This text analyses the legal requirements for information to be considered a trade secret based on Colombian regulations and rulings issued by the Superintendencia de Industria y Comercio. A contractual clause, by itself, does not have the power to define the information that can be considered a trade secret because freedom of choice cannot disregard the legal nature of the information.
19 CFR 210.20 - Declassification of confidential information.
2010-04-01
... 19 Customs Duties 3 2010-04-01 2010-04-01 false Declassification of confidential information. 210.20 Section 210.20 Customs Duties UNITED STATES INTERNATIONAL TRADE COMMISSION INVESTIGATIONS OF UNFAIR PRACTICES IN IMPORT TRADE ADJUDICATION AND ENFORCEMENT Motions § 210.20 Declassification of...
The Criminalization of the Theft of Trade Secrets:\\ud An Analysis of the Economic Espionage Act
Searle, Nicola
2012-01-01
This paper presents a law and economics assessment of how the elevation of the theft of trade secrets from civil malfeasance to a felony affects the incentives for both firms and potential thieves. The paper begins with theoretical analysis of the EEA and concludes with an empirical assessment of prosecutions under the EEA. In comparison to penalties used in civil cases, the new incentive of a criminal deterrent to trade secret theft introduces severe consequences, such as incarceration as a ...
Breaching confidentiality: medical mandatory reporting laws in Iran.
Milanifar, Alireza; Larijani, Bagher; Paykarzadeh, Parvaneh; Ashtari, Golanna; Mehdi Akhondi, Mohammad
2014-01-01
Medical ethics is a realm where four important subjects of philosophy, medicine, theology and law are covered. Physicians and philosophers cooperation in this area will have great efficiency in the respective ethical rules formation. In addition to respect the autonomy of the patient, physician's obligation is to ensure that the medical intervention has benefit for the patient and the harm is minimal. There is an obvious conflict between duty of confidentiality and duty of mandatory reporting. Professional confidentiality is one of the basic components in building a constant physician-patient relationship which nowadays, beside the novelty, it is the subject of discussion. Legal obligation of confidentiality is not absolute. In physician-patient relationship, keeping patient's secrets and maintaining confidentiality is a legal and ethical duty, and disclosure of such secrets is mainly through specific statutes. Thus, there are a number of situations where breach of confidentiality is permitted in different legal systems. One of the situations where breaching confidentiality is permitted is the medical mandatory reporting to the relevant authority which is in accordance with many countries' legal systems. Some situations are considered in many countries legal systems' such as notification of births and deaths, infectious diseases, child abuse, sport and relevant events, medical errors, drug side effects and dangerous pregnancies. In this paper, we will examine and discuss medical mandatory reporting and its ethical and legal aspects in the judicial and legal system of Iran and few other countries. Finally we will suggest making Medical Mandatory Reporting Law in Iran.
78 FR 16694 - Chemical Security Assessment Tool (CSAT)
2013-03-18
... information provided. Comments that include trade secrets, confidential commercial or financial information... secrets, confidential commercial or financial information, CVI, SSI, or PCII should be appropriately... Department make the instruments (e.g., Top-Screen, Security Vulnerability Assessment [SVA]/ Alternative...
7 CFR 984.79 - Confidential information.
2010-01-01
... 7 Agriculture 8 2010-01-01 2010-01-01 false Confidential information. 984.79 Section 984.79 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (Marketing... or disclosing the trade position, or financial condition or business operations of the handler shall...
7 CFR 932.63 - Confidential information.
2010-01-01
... 7 Agriculture 8 2010-01-01 2010-01-01 false Confidential information. 932.63 Section 932.63 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (Marketing... from such reports and records which might affect the trade position, financial condition, or business...
19 CFR 210.39 - In camera treatment of confidential information.
2010-04-01
... 19 Customs Duties 3 2010-04-01 2010-04-01 false In camera treatment of confidential information. 210.39 Section 210.39 Customs Duties UNITED STATES INTERNATIONAL TRADE COMMISSION INVESTIGATIONS OF UNFAIR PRACTICES IN IMPORT TRADE ADJUDICATION AND ENFORCEMENT Prehearing Conferences and Hearings § 210...
77 FR 33630 - Residency Requirements for Aliens Acquiring Firearms (2011R-23P)
2012-06-07
... material that is confidential under law (e.g., trade secrets, processes, etc.). Any portion of a comment... shall be prominently marked ``confidential'' at the top of each page. Confidential information will be...
2010-09-16
... comment that contains material that is confidential under law (e.g., trade secrets, processes, etc.). Any... of the comment and shall be prominently marked ``confidential'' at the top of each page. Confidential...
77 FR 5460 - Federal Firearms License Proceedings-Hearings (2008R-15P)
2012-02-03
... material that is confidential under law (e.g., trade secrets, processes, etc.). Any portion of a comment... shall be prominently marked ``confidential'' at the top of each page. Confidential information will be...
Velicer, Clayton; Lempert, Lauren K; Glantz, Stanton
2015-09-01
Use previously secret tobacco industry documents to assess tobacco companies' routine claims of trade secret protection for information on cigarette ingredients, additives and construction made to regulatory agencies, as well as the companies' refusal to publicly disclose this information. We analysed previously secret tobacco industry documents available at (http://legacy.library.ucsf.edu) to identify 100 examples of seven major tobacco companies' reverse engineering of their competitors' brands between 1937 and 2001. These reverse engineering reports contain detailed data for 142 different measurements for at least two companies, including physical parameters of the cigarettes, tobacco types, humectants, additives, flavourings, and smoke constituents of competitors' cigarettes. These 100 documents were distributed to 564 employees, including top managers in domestic and foreign offices across multiple departments, including executive leadership, research and design, product development, marketing and legal. These documents reported new competitors' products, measured ingredient changes over time, and informed companies' decisions regarding ingredients in their own products. Because cigarette companies routinely analyse their competitors' cigarettes in great detail, this information is neither secret nor commercially valuable and, thus, does not meet the legal definition of a 'trade secret.' This information is only being kept 'secret' from the people consuming cigarettes and the scientific community. Public agencies should release this detailed information because it would provide valuable information about how ingredients affect addictiveness and toxicity, and would help the public health community and consumers better understand the impact of cigarette design on human health. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://group.bmj.com/group/rights-licensing/permissions.
Epstein, Richard A
2011-01-01
The Biologics Price Competition and Innovation Act of 2009 ("Biosimilars Act") is for the field of pharmaceutical products the single most important legislative development since passage of the Drug Price Competition and Patent Term Restoration Act of 1984 ("Hatch-Waxman Act"), on which portions of the Biosimilars Act are clearly patterned. Congress revised section 351 of the Public Health Service Act (PHSA) to create a pathway for FDA approval of "biosimilar" biological products. Each biosimilar applicant is required to cite in its application a "reference product" that was approved on the basis of a full application containing testing data and manufacturing information, which is owned and was submitted by another company and much of which constitutes trade secret information subject to constitutional protection. Because the Biosimilars Act authorizes biosimilar applicants to cite these previously approved applications, the implementation of the new legislative scheme raises critical issues under the Fifth Amendment of the Constitution, pursuant to which private property--trade secrets included--may not be taken for public use, without "just compensation." FDA must confront those issues as it implements the scheme set out in the Biosimilars Act. This article will discuss these issues, after providing a brief overview of the Biosimilars Act and a more detailed examination of the law of trade secrets.
7 CFR 926.19 - Confidential information.
2010-01-01
... Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (Marketing... RECORDKEEPING REQUIREMENTS APPLICABLE TO CRANBERRIES NOT SUBJECT TO THE CRANBERRY MARKETING ORDER § 926.19... data or information constituting a trade secret or disclosing the trade position or financial condition...
van den Heuvel, C.M.J.M.; Weingart, Scott B; Spelt, Nils; Nellen, H.J.M.
2016-01-01
Science in the Early Modern World depended on the one hand on openness in scholarly communication, but on the other hand the competition in commerce and trade and the political and religious conflicts required secrecy and confidentiality. This papers analyzes these concepts of confidentiality and
Improving Individual Acceptance of Health Clouds through Confidentiality Assurance.
Ermakova, Tatiana; Fabian, Benjamin; Zarnekow, Rüdiger
2016-10-26
Cloud computing promises to essentially improve healthcare delivery performance. However, shifting sensitive medical records to third-party cloud providers could create an adoption hurdle because of security and privacy concerns. This study examines the effect of confidentiality assurance in a cloud-computing environment on individuals' willingness to accept the infrastructure for inter-organizational sharing of medical data. We empirically investigate our research question by a survey with over 260 full responses. For the setting with a high confidentiality assurance, we base on a recent multi-cloud architecture which provides very high confidentiality assurance through a secret-sharing mechanism: Health information is cryptographically encoded and distributed in a way that no single and no small group of cloud providers is able to decode it. Our results indicate the importance of confidentiality assurance in individuals' acceptance of health clouds for sensitive medical data. Specifically, this finding holds for a variety of practically relevant circumstances, i.e., in the absence and despite the presence of conventional offline alternatives and along with pseudonymization. On the other hand, we do not find support for the effect of confidentiality assurance in individuals' acceptance of health clouds for non-sensitive medical data. These results could support the process of privacy engineering for health-cloud solutions.
2010-01-01
... by other statutes; confidential, commercial, and financial information; and matters involving....) are covered by this exemption; (4) Trade secrets and commercial or financial information obtained from... lawful national security intelligence investigation, information furnished by a confidential source, (v...
Secret Sharing of a Quantum State.
Lu, He; Zhang, Zhen; Chen, Luo-Kan; Li, Zheng-Da; Liu, Chang; Li, Li; Liu, Nai-Le; Ma, Xiongfeng; Chen, Yu-Ao; Pan, Jian-Wei
2016-07-15
Secret sharing of a quantum state, or quantum secret sharing, in which a dealer wants to share a certain amount of quantum information with a few players, has wide applications in quantum information. The critical criterion in a threshold secret sharing scheme is confidentiality: with less than the designated number of players, no information can be recovered. Furthermore, in a quantum scenario, one additional critical criterion exists: the capability of sharing entangled and unknown quantum information. Here, by employing a six-photon entangled state, we demonstrate a quantum threshold scheme, where the shared quantum secrecy can be efficiently reconstructed with a state fidelity as high as 93%. By observing that any one or two parties cannot recover the secrecy, we show that our scheme meets the confidentiality criterion. Meanwhile, we also demonstrate that entangled quantum information can be shared and recovered via our setting, which shows that our implemented scheme is fully quantum. Moreover, our experimental setup can be treated as a decoding circuit of the five-qubit quantum error-correcting code with two erasure errors.
Secret Sessions of Congress: A Brief Historical Overview
National Research Council Canada - National Science Library
Amer, Mildred
2005-01-01
"Secret" or "closed door" sessions of the House of Representatives and Senate are held periodically to discuss business, including impeachment deliberations, deemed to require confidentiality and secrecy...
Secret Sessions of Congress: A Brief Historical Overview
National Research Council Canada - National Science Library
Amer, Mildred
2004-01-01
Secret or closed door sessions of the House of Representatives and Senate are held periodically to discuss business, including impeachment deliberations, deemed to require confidentiality and secrecy...
Data-protection standards and confidentiality of HIV/AIDS status in ...
African Journals Online (AJOL)
Also, the article presents a preliminary assessment of the possible impact of professionalisation (and outsourcing) of workplace HIV/AIDS management on ... the development of law governing data protection and HIV/AIDS confidentiality in South Africa) and interviews conducted with workplace health managers and trade ...
15 CFR 4a.3 - Classification levels.
2010-01-01
... 15 Commerce and Foreign Trade 1 2010-01-01 2010-01-01 false Classification levels. 4a.3 Section 4a.3 Commerce and Foreign Trade Office of the Secretary of Commerce CLASSIFICATION, DECLASSIFICATION... E.O. 12958. The levels established by E.O. 12958 (Top Secret, Secret, and Confidential) are the only...
Doctor-patient confidentiality - right and duty of a doctor in law regulations
Directory of Open Access Journals (Sweden)
Janusz Jaroszyński
2018-03-01
Full Text Available Physician’s professional secrecy is one of the most important duties of a doctor and should be provided with confidentiality regarding his or her health. Generally speaking, there is no legal definition of "physician’s professional secrecy" in Poland, although this concept already appears in the oath of Hippocrates: ‘I will keep secret anything I see or hear professionally which ought not to be told’. The issue of medical confidentiality (physician’s professional secrecy has been regulated in several legal acts such as: The Patient Rights and Patients Ombudsman Act, The Constitution of the Republic of Poland, The Medical Profession Act, The Civil Code Act, The Criminal Code Act and Code of Medical Ethics which is not considered as a legal act. The patient has the right to require confidentiality of the information concerning him and the obligation to keep medical confidentiality will apply to every representative of the medical profession, who obtained certain information by various professional activities.
The Psychological Competence of Police Officers in Confidential Cooperation with Citizens
Uspanov, Zholdybai T.; Turabayeva, Dana S.; Ermolovich, Vladimir F.
2016-01-01
This research studied the psychological aspects of citizens' assistance to law enforcement agencies on a confidential basis. The comprehensive observance of the psychological norms of cooperation is determined by the professional ethics of police officers, the necessity of nondisclosure of investigation secrets by citizens, and the security of the…
19 CFR 210.34 - Protective orders; reporting requirement; sanctions and other actions.
2010-04-01
...; sanctions and other actions. 210.34 Section 210.34 Customs Duties UNITED STATES INTERNATIONAL TRADE COMMISSION INVESTIGATIONS OF UNFAIR PRACTICES IN IMPORT TRADE ADJUDICATION AND ENFORCEMENT Discovery and... order of the Commission or the administrative law judge; (7) That a trade secret or other confidential...
19 CFR 201.19 - Notification regarding requests for confidential business information.
2010-04-01
... business information. 201.19 Section 201.19 Customs Duties UNITED STATES INTERNATIONAL TRADE COMMISSION GENERAL RULES OF GENERAL APPLICATION Availability of Information to the Public Pursuant to 5 U.S.C. 552 § 201.19 Notification regarding requests for confidential business information. (a) In general. Business...
Combined model of 9x9 playfair and RSA for securing confidential ...
African Journals Online (AJOL)
Combined model of 9x9 playfair and RSA for securing confidential information. Y.B. Zakariyau, L.J. Muhammad, A.M. Usman, A Garba. Abstract. No Abstract. Keywords: Cryptography, RSA, Playfair Cipher, Public and Secret Key. Full Text: EMAIL FULL TEXT EMAIL FULL TEXT · DOWNLOAD FULL TEXT DOWNLOAD FULL ...
Trade secrets protection mode of nuclear power plant
International Nuclear Information System (INIS)
Zeng Bin
2015-01-01
The paper analyzes the legal environment in which nuclear power enterprises are stayed, and mainly discusses the business secret protection modes of China's nuclear power enterprises. It is expected to provide a revelation and help for these enterprises to protect their business secrets. Firstly, the paper briefly expounds the legal basis of business secret protection and China's legalization status in this regard. Then it mainly puts forward the business secret management framework and postulations for nuclear power enterprises, and key points in application and protection of nuclear power business secret. (author)
2012-05-16
... could disclose confidential trade secrets or commercial property such as patentable material, and... Institute of Child Health and Human Development Initial Review Group; Function, Integration, and...
2010-03-05
... could disclose confidential trade secrets or commercial property such as patentable material, and... Institute of Child Health and Human Development, Initial Review Group, Function, Integration, and...
2011-05-26
... could disclose confidential trade secrets or commercial property such as patentable material, and... Institute of Child Health and Human Development Initial Review Group; Function, Integration, and...
2011-02-18
... could disclose confidential trade secrets or commercial property such as patentable material, and... Institute of Child Health and Human Development Initial Review Group; Function, Integration, and...
2013-02-27
... could disclose confidential trade secrets or commercial property such as patentable material, and... Institute of Child Health and Human Development Initial Review Group; Function, Integration, and...
2012-10-09
... could disclose confidential trade secrets or commercial property such as patentable material, and... Institute of Child Health and Human Development Initial Review Group Function, Integration, and...
2011-10-17
... could disclose confidential trade secrets or commercial property such as patentable material, and... Institute of Child Health and Human Development Initial Review Group, Function, Integration, and...
2012-03-01
... could disclose confidential trade secrets or commercial property such as patentable material, and... Institute of Child Health and Human Development Initial Review Group; Function, Integration, and...
2010-09-15
... could disclose confidential trade secrets or commercial property such as patentable material, and... Institute of Child Health and Human Development Initial Review Group; Function, Integration and...
78 FR 54664 - Center for Scientific Review; Notice of Closed Meetings
2013-09-05
...., as amended. The grant applications and the discussions could disclose confidential trade secrets or..., Functional and Cognitive Neuroscience Integrated Review Group; Sensorimotor Integration Study Section. Date...
2013-05-20
... could disclose confidential trade secrets or commercial property such as patentable material, and... Group; Function, Integration, and Rehabilitation Sciences Subcommittee. Date: June 3, 2013. Time: 8:30 a...
78 FR 20931 - National Institute of Environmental Health Sciences; Notice of Meeting
2013-04-08
... attendance limited to space available. Individuals who plan to attend and need special assistance, such as... applications and the discussions could disclose confidential trade secrets or commercial property such as...
5 CFR 2413.4 - Closing of meetings; reasons therefor.
2010-01-01
... otherwise involving a determination on the record after opportunity for a hearing, or any court proceedings... confidential trade secrets and commercial or financial information); (c)(5) (matters of alleged criminal...
22 CFR 1413.4 - Closing of meetings; reasons therefor.
2010-04-01
... or otherwise involving a determination on the record after opportunity for a hearing, or any court...) (privileged or confidential trade secrets and commercial or financial information); (c)(5) (matters of alleged...
[Confidentiality in medical oaths: (When the white crow becomes gray...)].
Gelpi, R J; Pérez, M L; Rancich, A M; Mainetti, J A
2000-01-01
Confidentiality, together with the ethical principles of beneficence and non-maleficence, is the most important rule in Medical Oaths at the present time. However, the scientific-technical advances in medicine have made this rule one of the most controversial ones because of its exceptions. In consequence, the aim of the present paper is to comparatively analyze the rule of confidentiality in Medical Oaths of different places, times, origins and in different versions of the Hippocratic Oath in order to determine what should be kept a secret and with what degree of commitment (absolute or "prima facie"). Of the thirty six analyzed Oaths, twenty-seven manifest this rule and nine do not. No relation was found between the manifestation of this rule and the place, time, origin and different versions of the Hippocratic Oath. Most pledges suggest not to reveal what has been seen or heard during the medical act, the same as in the Hippocratic Oath. Seven texts point out that confidentiality should be absolute and four give exceptions in connection with beneficence and justice principles and the moral duty of causing no damage to third parties. Two pledges specify protection of privacy. In conclusion, today confidentiality is considered to be a moral duty for the benefit of the patient and out of consideration for his autonomy; however, at the present time in medicine the duty of keeping absolute secrecy is being reconsidered.
Confidentiality and personal integrity.
Edgar, A
1994-06-01
This paper uses the social theory of Erving Goffman in order to argue that confidentiality should be understood in relation to the mundane social skills by which individuals present and respect specific self-images of themselves and others during social interaction. The breaching of confidentiality is analysed in terms of one person's capacity to embarrass another, and so to expose that person as incompetent. Respecting confidentiality may at once serve to protect the vulnerable from an unjust society, and yet also protect the guilty from just accusation. Ethical reasoning about confidentiality must therefore recognize the dangers of prejudice and violence inherent in decisions to breach or to respect confidentiality. Case studies are used to illustrate the efficacy of this account, culminating with analyses of three examples from the UKCC document Confidentiality.
WTO confidential: the case of asbestos.
Castleman, Barry
2003-01-01
The World Trade Organization (WTO), established in 1995, adjudicates "trade disputes" between member nations in cases with human rights, cultural, environmental, and public health significance. Throughout the resolution process and even after a case's conclusion, little of what happens is made accessible to the public. However, it is one thing to criticize the WTO for its lack of transparency from outside the process and another to critically examine what was withheld from disclosure and what dangers that presents. This is the inside story from a scientific adviser to one party in a WTO case, who analyzes what happened from a public health point of view. The analysis concludes that the public health justification for banning asbestos was accepted in the end by WTO economists, despite the WTO's bias in favor of the party (Canada) making the free trade challenge (to public health legislation), despite the WTO's lack of expertise in science, medicine, engineering, and public health, and despite important erroneous statements made to the WTO under the cover of confidentiality. The case nevertheless illustrates that the WTO's threat to national sovereignty could never withstand the light of day if the limitations and dangers of the process were open for all to see.
77 FR 40364 - Announcement of Requirements and Registration for Million Hearts TM
2012-07-09
... disclosure by the Sponsor and/or Administrator of the intellectual property, trade secrets, or confidential... top of the Challenge site. Amount of the Prize Three winners will be selected. The first place winner...
78 FR 26642 - Center for Scientific Review; Notice of Closed Meetings
2013-05-07
...., as amended. The grant applications and the discussions could disclose confidential trade secrets or... Review Group; Sensorimotor Integration Study Section. Date: June 4, 2013. Time: 8:00 a.m. to 6:00 p.m...
78 FR 73867 - Center for Scientific Review; Notice of Closed Meetings
2013-12-09
...., as amended. The grant applications and the discussions could disclose confidential trade secrets or...: Integration and Analysis of Diverse HIV- Associated Data (R03). Date: December 16, 2013. Time: 8:00 a.m. to 5...
77 FR 26021 - National Institute of Allergy and Infectious Diseases; Notice of Closed Meeting
2012-05-02
... confidential trade secrets or commercial property such as patentable material, and personal information... Integration Support Contract (BISC).'' Date: May 25, 2012. Time: 8:00 a.m. to 5:00 p.m. Agenda: To review and...
76 FR 7569 - Public Meeting of the Presidential Commission for the Study of Bioethical Issues
2011-02-10
... scientific and technological advances; examine diverse perspectives and possibilities for useful... ethical issues involving genetics, neuroscience, and neuroimaging used for research, diagnosis, risk... any personally identifiable or confidential business information that they contain. Trade secrets...
21 CFR 720.8 - Confidentiality of statements.
2010-04-01
... the ingredient is known outside petitioner's business; (2) The extent to which the identity of the ingredient is known by employees and others involved in petitioner's business; (3) The extent of measures... the identity of the claimed trade secret ingredient to the petitioner and to its competitors; (5) The...
2012-12-17
... DEPARTMENT OF HOMELAND SECURITY [Docket No. DHS-2012-0057] Chemical Facility Anti-Terrorism Standards (CFATS) Chemical- Terrorism Vulnerability Information (CVI) AGENCY: National Protection and...: Comments that include trade secrets, confidential commercial or financial information, Chemical-terrorism...
2010-05-27
... could disclose confidential trade secrets or commercial property such as patentable material, and... Institute of Child Health and Human Development Initial Review Group Function, Integration, and Rehabilitation Sciences Subcommittee; Function, Integration and Rehabilitation Sciences Subcommittee. Date: June...
Physicians and Insider Trading.
Kesselheim, Aaron S; Sinha, Michael S; Joffe, Steven
2015-12-01
Although insider trading is illegal, recent high-profile cases have involved physicians and scientists who are part of corporate governance or who have access to information about clinical trials of investigational products. Insider trading occurs when a person in possession of information that might affect the share price of a company's stock uses that information to buy or sell securities--or supplies that information to others who buy or sell--when the person is expected to keep such information confidential. The input that physicians and scientists provide to business leaders can serve legitimate social functions, but insider trading threatens to undermine any positive outcomes of these relationships. We review insider-trading rules and consider approaches to securities fraud in the health care field. Given the magnitude of the potential financial rewards, the ease of concealing illegal conduct, and the absence of identifiable victims, the temptation for physicians and scientists to engage in insider trading will always be present. Minimizing the occurrence of insider trading will require robust education, strictly enforced contractual provisions, and selective prohibitions against high-risk conduct, such as participation in expert consulting networks and online physician forums, by those individuals with access to valuable inside information.
EPCRA Trade Secret Forms and Instructions
This form is required in order to substantiate claims of trade secrecy. You must be able to describe safeguarding measures and disclosure history for the specific chemical identity, and identify harm to your competitive position.
2011-09-09
... identify and promote policies and practices that assure ethically responsible conduct of scientific... assurance ``that current rules for research participants protect people from harm or unethical treatment... personally identifiable or confidential business information that they contain. Trade secrets should not be...
78 FR 5467 - National Institute of Allergy and Infectious Diseases; Notice of Closed Meeting
2013-01-25
... confidential trade secrets or commercial property such as patentable material, and personal information... Infectious Diseases Special Emphasis Panel; ``OMICS'' Technologies for Predictive Modeling of Infectious... applications. Place: Sheraton Silver Spring Hotel, 8777 Georgia Avenue, Silver Spring, MD 20910. Contact Person...
78 FR 64260 - Overseas Security Advisory Council (OSAC) Meeting Notice
2013-10-28
... corporate security policies and procedures and will involve extensive discussion of trade secrets and proprietary commercial information that is privileged and confidential, and will discuss law enforcement... protection of U.S. business information overseas. For more information, contact Marsha Thurman, Overseas...
76 FR 24499 - National Eye Institute; Notice of Closed Meeting
2011-05-02
... the public as indicated below, with attendance limited to space available. Individuals who plan to... disclose confidential trade secrets or commercial property such as patentable material, and personal... discussions concerning Institute programs. Place: National Institutes of Health, 5635 Fishers Lane, Terrace...
77 FR 31032 - National Eye Institute; Notice of Closed Meeting
2012-05-24
... the public as indicated below, with attendance limited to space available. Individuals who plan to... disclose confidential trade secrets or commercial property such as patentable material, and personal... concerning Institute programs. Place: National Institutes of Health, 5635 Fishers Lane, Terrace Level...
77 FR 73037 - National Eye Institute; Notice of Closed Meeting
2012-12-07
... the public as indicated below, with attendance limited to space available. Individuals who plan to... disclose confidential trade secrets or commercial property such as patentable material, and personal... discussions concerning Institute programs. Place: National Institutes of Health, 5635 Fishers Lane, Terrace...
77 FR 55852 - National Eye Institute; Notice of Closed Meeting
2012-09-11
... the public as indicated below, with attendance limited to space available. Individuals who plan to... disclose confidential trade secrets or commercial property such as patentable material, and personal... concerning Institute programs. Place: National Institutes of Health, 5635 Fishers Lane, Terrace Level...
75 FR 76474 - National Eye Institute; Notice of Closed Meeting
2010-12-08
... the public as indicated below, with attendance limited to space available. Individuals who plan to... disclose confidential trade secrets or commercial property such as patentable material, and personal... concerning Institute programs. Place: National Institutes of Health, 5635 Fishers Lane, Terrace Level...
76 FR 53687 - National Eye Institute Notice of Closed Meeting
2011-08-29
... the public as indicated below, with attendance limited to space available. Individuals who plan to... disclose confidential trade secrets or commercial property such as patentable material, and personal... concerning Institute programs. Place: National Institutes of Health, 5635 Fishers Lane, Terrace Level...
77 FR 72872 - National Institute of Neurological Disorders and Stroke; Notice of Meeting
2012-12-06
... limited to space available. Individuals who plan to attend and need special assistance, such as sign... and the discussions could disclose confidential trade secrets or commercial property such as... Associate Director for Extramural Research; and Administrative and Program Developments. Place: National...
78 FR 76633 - National Institute of Neurological Disorders and Stroke; Notice of Meeting
2013-12-18
... limited to space available. Individuals who plan to attend and need special assistance, such as sign... and the discussions could disclose confidential trade secrets or commercial property such as... Director for Extramural Research; and Administrative and Program Developments. Place: National Institutes...
77 FR 2076 - National Eye Institute; Notice of Closed Meeting
2012-01-13
... the public as indicated below, with attendance limited to space available. Individuals who plan to... disclose confidential trade secrets or commercial property such as patentable material, and personal... concerning Institute programs. Place: National Institutes of Health, 5635 Fishers Lane, Terrace Level...
2010-07-01
... from disclosure by statute; (4) Trade secrets and commercial or financial information obtained from a... lawful national security intelligence investigation, information furnished by a confidential source, (v... intelligence or counterintelligence, or international terrorism, and the existence of the records is classified...
RMP Guidance for Chemical Distributors - Chapter 9: Risk Management Plan
You must submit one RMP for all of covered processes, using free software RMP*eSubmit on EPA's Central Data Exchange (CDX), and fully update and resubmit at least every five years. You may claim confidential business information and trade secrets.
2013-11-07
... Deafness and Other Communication Disorders; Notice of Closed Meeting Pursuant to section 10(d) of the... disclose confidential trade secrets or commercial property such as patentable material, and personal... Deafness and Other Communication Disorders Special Emphasis Panel; Hearing Clinical Trial Review. Date...
2012-08-22
... Deafness and Other Communication Disorders; Notice of Closed Meetings Pursuant to section 10(d) of the... disclose confidential trade secrets or commercial property such as patentable material, and personal... Deafness and Other Communication Disorders Special Emphasis Panel, NIDCD P30 Review Meeting. Date...
2010-06-15
... Deafness and Other Communication Disorders; Notice of Closed Meeting Pursuant to section 10(d) of the... disclose confidential trade secrets or commercial property such as patentable material, and personal... Deafness and Other Communication Disorders Special Emphasis Panel, Translational PAR. Date: July 8, 2010...
2012-02-01
... Deafness and Other Communication Disorders; Notice of Closed Meetings Pursuant to section 10(d) of the... disclose confidential trade secrets or commercial property such as patentable material, and personal... Deafness and Other Communication Disorders Special Emphasis Panel; Affordable Hearing. Date: February 14...
2012-02-01
... Deafness and Other Communication Disorders; Notice of Closed Meeting Pursuant to section 10(d) of the... disclose confidential trade secrets or commercial property such as patentable material, and personal... constitute a clearly unwarranted invasion of personal privacy. Name of Committee: Communication Disorders...
78 FR 27408 - National Cancer Institute; Notice of Closed Meetings
2013-05-10
...., as amended. The contract proposals and the discussions could disclose confidential trade secrets or... with the contract proposals, the disclosure of which would constitute a clearly unwarranted invasion of personal privacy. Name of Committee: National Cancer Institute Special Emphasis Panel; SBIR Topic 304...
21 CFR 806.40 - Public availability of reports.
2010-04-01
... report: (1) Any information that constitutes trade secret or confidential commercial or financial... report all the information in the report concerning that patient. ... 21 Food and Drugs 8 2010-04-01 2010-04-01 false Public availability of reports. 806.40 Section 806...
78 FR 22274 - National Institute of Neurological Disorders and Stroke; Notice of Meeting
2013-04-15
... limited to space available. Individuals who plan to attend and need special assistance, such as sign... and the discussions could disclose confidential trade secrets or commercial property such as... for Extramural Research; Administrative and Program Developments; and an Overview of the NINDS...
76 FR 21384 - Office of the Director, National Institutes of Health; Notice of Meeting
2011-04-15
.... The meeting will be open to the public as indicated below, with attendance limited to space available... confidential trade secrets or commercial property such as patentable material, and personal information..., MD 20892. Contact Person: Robin Kawazoe, Executive Secretary, Division Of Program Coordination...
77 FR 1699 - Office of the Director, National Institutes of Health; Notice of Meeting
2012-01-11
.... The meeting will be open to the public as indicated below, with attendance limited to space available... confidential trade secrets or commercial property such as patentable material, and personal information... Program (ORIP), Division of Program Coordination, Planning, and Strategic Initiatives Update, and...
77 FR 59200 - National Heart, Lung, and Blood Institute; Notice of Meeting
2012-09-26
... space available. Individuals who plan to attend and need special assistance, such as sign language... could disclose confidential trade secrets or commercial property such as patentable material, and... program policies and issues. Place: National Institutes of Health, Building 31, 31 Center Drive...
76 FR 28055 - Notice of Meeting
2011-05-13
... confidential trade secrets or commercial property such as patentable material, and personal information... below, with attendance limited to space available. Individuals who plan to attend and need special... Federal Domestic Assistance Program Nos. 93.14, Intramural Research Training Award; 93.22, Clinical...
78 FR 20671 - Office of the Director, National Institutes of Health; Notice of Meeting
2013-04-05
... Councils. The meeting will be open to the public as indicated below, with attendance limited to space... discussions could disclose confidential trade secrets or commercial property such as patentable material, and... Epigenomics Program, Scientific Presentation, NIH Update, Concept Clearance and Discussion. Place: National...
76 FR 30733 - National Institute of Diabetes and Digestive and Kidney Diseases; Notice of Meeting
2011-05-26
... meeting will be open to the public as indicated below, with attendance limited to space available... confidential trade secrets or commercial property such as patentable material, and personal information... Domestic Assistance Program Nos. 93.847, Diabetes, Endocrinology and Metabolic Research; 93.848, Digestive...
78 FR 24761 - National Institute of Dental & Craniofacial Research; Notice of Meeting
2013-04-26
... limited to space available. Individuals who plan to attend and need special assistance, such as sign... and the discussions could disclose confidential trade secrets or commercial property such as... available. (Catalogue of Federal Domestic Assistance Program Nos. 93.121, Oral Diseases and Disorders...
75 FR 54642 - National Eye Institute; Notice of Meeting
2010-09-08
... public as indicated below, with attendance limited to space available. Individuals who plan to attend and... disclose confidential trade secrets or commercial property such as patentable material, and personal... concerning Institute programs. Place: Melrose Hotel, 2430 Pennsylvania Ave., NW., Washington, DC 20037...
78 FR 7795 - Fogarty International Center; Notice of Meeting
2013-02-04
... meeting will be open to the public as indicated below, with attendance limited to space available... discussions could disclose confidential trade secrets or commercial property such as patentable materials, and... posted when available. (Catalogue of Federal Domestic Assistance Program Nos. 93.106, Minority...
2011-08-17
... indicated below, with attendance limited to space available. Individuals who plan to attend and need special.... The grant applications and the discussions could disclose confidential trade secrets or commercial... Federal Domestic Assistance Program Nos. 93.846, Arthritis, Musculoskeletal and Skin Diseases Research...
78 FR 58322 - National Institute of Diabetes and Digestive and Kidney Diseases; Notice of Meeting
2013-09-23
... meeting will be open to the public as indicated below, with attendance limited to space available... confidential trade secrets or commercial property such as patentable material, and personal information... . (Catalogue of Federal Domestic Assistance Program Nos. 93.847, Diabetes, Endocrinology and Metabolic Research...
2012-08-09
... indicated below, with attendance limited to space available. Individuals who plan to attend and need special.... The grant applications and the discussions could disclose confidential trade secrets or commercial.... (Catalogue of Federal Domestic Assistance Program Nos. 93.846, Arthritis, Musculoskeletal and Skin Diseases...
2013-05-02
... indicated below, with attendance limited to space available. Individuals who plan to attend and need special.... The grant applications and the discussions could disclose confidential trade secrets or commercial... visit. (Catalogue of Federal Domestic Assistance Program Nos. 93.846, Arthritis, Musculoskeletal and...
2010-05-20
... indicated below, with attendance limited to space available. Individuals who plan to attend and need special.... The grant applications and the discussions could disclose confidential trade secrets or commercial... Federal Domestic Assistance Program Nos. 93.846, Arthritis, Musculoskeletal and Skin Diseases Research...
2012-05-03
... indicated below, with attendance limited to space available. Individuals who plan to attend and need special.... The grant applications and the discussions could disclose confidential trade secrets or commercial.... (Catalogue of Federal Domestic Assistance Program Nos. 93.846, Arthritis, Musculoskeletal and Skin Diseases...
76 FR 78285 - National Institute on Aging; Notice of Meeting
2011-12-16
... be open to the public as indicated below, with attendance limited to space available. Individuals who... disclose confidential trade secrets or commercial property such as patentable material, and personal... Working Group on Program; council speaker; and Program Highlights. Place: National Institutes of Health...
78 FR 51734 - National Center for Complementary and Alternative Medicine Notice of Meeting
2013-08-21
... below, with attendance limited to space available. Individuals who plan to attend and need special.... The grant applications and the discussions could disclose confidential trade secrets or commercial... for the meeting will be posted when available. (Catalogue of Federal Domestic Assistance Program Nos...
2012-12-19
... indicated below, with attendance limited to space available. Individuals who plan to attend and need special.... The grant applications and the discussions could disclose confidential trade secrets or commercial.... (Catalogue of Federal Domestic Assistance Program Nos. 93.846, Arthritis, Musculoskeletal and Skin Diseases...
78 FR 77692 - National Institute of Mental Health Notice of Meeting
2013-12-24
... meeting will be open to the public as indicated below, with attendance limited to space available... confidential trade secrets or commercial property such as patentable material, and personal information... Division of Intramural Research Programs. Place: National Institutes of Health (NIH), Neuroscience Center...
2011-12-13
... indicated below, with attendance limited to space available. Individuals who plan to attend and need special.... The grant applications and the discussions could disclose confidential trade secrets or commercial... Federal Domestic Assistance Program Nos. 93.846, Arthritis, Musculoskeletal and Skin Diseases Research...
77 FR 74674 - National Institute of Dental & Craniofacial Research; Notice of Meeting
2012-12-17
... limited to space available. Individuals who plan to attend and need special assistance, such as sign... and the discussions could disclose confidential trade secrets or commercial property such as... professional affiliation of the interested person. (Catalogue of Federal Domestic Assistance Program Nos. 93...
76 FR 18567 - Fogarty International Center; Notice of Meeting
2011-04-04
... meeting will be open to the public as indicated below, with attendance limited to space available... confidential trade secrets or commercial property such as patentable materials, and personal information... be posted when available. (Catalogue of Federal Domestic Assistance Program Nos. 93.14, Intramural...
77 FR 3479 - National Institute of Diabetes and Digestive and Kidney Diseases Notice of Meeting
2012-01-24
... meeting will be open to the public as indicated below, with attendance limited to space available... confidential trade secrets or commercial property such as patentable material, and personal information... Program Nos. 93.847, Diabetes, Endocrinology and Metabolic Research; 93.848, Digestive Diseases and...
41 CFR 105-60.501 - Categories of records exempt from disclosure under the FOIA.
2010-07-01
... to be withheld; (4) Trade secrets and commercial or financial information obtained from a person and... intelligence investigation, information furnished by a confidential source; (v) Would disclose techniques and... foreign intelligence or counterintelligence, or international terrorism, and the existence of the records...
2010-08-19
... Deafness and Other Communication Disorders; Notice of Closed Meetings Pursuant to section 10(d) of the... disclose confidential trade secrets or commercial property such as patentable material, and personal... Deafness and Other Communication Disorders Special Emphasis Panel, R24 RFA. Date: September 16, 2010. Time...
78 FR 73552 - National Institute on Deafness and Other Communication Disorders; Notice of Meeting
2013-12-06
... Deafness and Other Communication Disorders; Notice of Meeting Pursuant to section 10(d) of the Federal... Deafness and Other Communication Disorders Advisory Council. The meeting will be open to the public as.... The grant applications and the discussions could disclose confidential trade secrets or commercial...
2010-06-15
... Deafness and Other Communication Disorders; Notice of Closed Meeting Pursuant to section 10(d) of the... disclose confidential trade secrets or commercial property such as patentable material, and personal... Deafness and Other Communication Disorders Special Emphasis Panel; VSL--SEP Review. Date: June 14, 2010...
75 FR 2445 - Chemical Facility Anti-Terrorism Standards
2010-01-15
... include trade secrets, confidential commercial information, Chemical-terrorism Vulnerability Information... and submit an online data collection (the Top-Screen) to DHS. The Department uses the facility's Top... required to submit Top-Screens. See 72 FR 65397-65398. \\2\\ Among other things, the November 2007 rule...
77 FR 7116 - Announcement of Competition Under the America COMPETES Reauthorization Act of 2011
2012-02-10
..., which demonstrates a lack of respect for public morals or conduct, which disparages any individual or... the intellectual property, trade secrets, or confidential business information of the Contestant; (c... with entering this Challenge, but in no event attorneys' fees. All issues and questions concerning the...
78 FR 26645 - National Institute of Mental Health; Notice of Meeting
2013-05-07
.... The meeting will be open to the public as indicated below, with attendance limited to space available... confidential trade secrets or commercial property such as patentable material, and personal information... and discussion of NIMH program and policy issues. Place: National Institutes of Health, Neuroscience...
78 FR 22892 - National Institute of Nursing Research; Notice of Meeting
2013-04-17
... Research. The meeting will be open to the public as indicated below, with attendance limited to space... disclose confidential trade secrets or commercial property such as patentable material, and personal...: Discussion of Program Policies and Issues. Place: National Institutes of Health, Building 31, Conference Room...
76 FR 78015 - National Institute on Alcohol Abuse and Alcoholism; Notice of Meeting
2011-12-15
... attendance limited to space available. Individuals who plan to attend and need special assistance, such as... applications and the discussions could disclose confidential trade secrets or commercial property such as... . (Catalogue of Federal Domestic Assistance Program Nos. 93.271, Alcohol Research Career Development Awards for...
75 FR 2149 - National Institute of Neurological Disorders and Stroke; Notice of Meeting
2010-01-14
... attendance limited to space available. Individuals who plan to attend and need special assistance, such as... applications and/or contract proposals and the discussions could disclose confidential trade secrets or... for the meeting will be posted when available. (Catalogue of Federal Domestic Assistance Program Nos...
78 FR 77472 - National Institute of General Medical Sciences; Notice of Meeting
2013-12-23
... comment period at the end. Attendance is limited by the space available. Individuals who plan to attend... disclose confidential trade secrets or commercial property, such as patentable material, and personal... Adjournment. Agenda: For the discussion of program policies and issues, opening remarks, report of the...
78 FR 19724 - National Institute on Drug Abuse: Notice of Meeting
2013-04-02
.... The meeting will be open to the public as indicated below, with attendance limited to space available... confidential trade secrets or commercial property such as patentable material, and personal information..., legislative and program developments in the drug abuse field. Place: National Institutes of Health...
75 FR 80511 - National Institute on Alcohol Abuse And Alcoholism; Notice of Closed Meeting
2010-12-22
... attendance limited to space available. Individuals who plan to attend and need special assistance, such as... applications and the discussions could disclose confidential trade secrets or commercial property such as... Domestic Assistance Program Nos.: 93.271, Alcohol Research Career Development Awards for Scientists and...
76 FR 39406 - National Institute on Alcohol Abuse and Alcoholism; Notice of Meeting
2011-07-06
... attendance limited to space available. Individuals who plan to attend and need special assistance, such as... applications and the discussions could disclose confidential trade secrets or commercial property such as.... (Catalogue of Federal Domestic Assistance Program Nos. 93.271, Alcohol Research Career Development Awards for...
77 FR 50516 - Fogarty International Center; Notice of Meetings
2012-08-21
... Board. The meeting will be open to the public as indicated below, with attendance limited to space... and the discussions could disclose confidential trade secrets or commercial property such as... Federal Domestic Assistance Program Nos. 93.106, Minority International Research Training Grant in the...
75 FR 56552 - National Institute of Diabetes and Digestive and Kidney Diseases; Notice of Meeting
2010-09-16
... meeting will be open to the public as indicated below, with attendance limited to space available... confidential trade secrets or commercial property such as patentable material, and personal information... Boulevard, Bethesda, MD 20892-5452, [email protected] . (Catalogue of Federal Domestic Assistance Program Nos...
77 FR 24726 - National Institute on Alcohol Abuse and Alcoholism; Notice of Meeting
2012-04-25
... attendance limited to space available. Individuals who plan to attend and need special assistance, such as... applications and the discussions could disclose confidential trade secrets or commercial property such as... Assistance Program Nos. 93.273, Alcohol Research Programs; 93.701, ARRA Related Biomedical Research and...
75 FR 52010 - National Institute of Neurological Disorders and Stroke; Notice of Meetings
2010-08-24
... attendance limited to space available. Individuals who plan to attend and need special assistance, such as... applications and the discussions could disclose confidential trade secrets or commercial property such as... Domestic Assistance Program Nos. 93.853, Clinical Research Related to Neurological Disorders; 93.854...
78 FR 50069 - National Center for Advancing Translational Sciences; Notice of Meetings
2013-08-16
... attendance limited to space available. Individuals who plan to attend and need special assistance, such as... applications and the discussions could disclose confidential trade secrets or commercial property such as...-8064, [email protected] . Dated: August 8, 2013. Michelle Trout, Program Analyst, Office of Federal...
76 FR 23612 - National Institute of Dental & Craniofacial Research; Notice of Meeting
2011-04-27
... limited to space available. Individuals who plan to attend and need special assistance, such as sign... and the discussions could disclose confidential trade secrets or commercial property such as... posted when available. (Catalogue of Federal Domestic Assistance Program Nos. 93.121, Oral Diseases and...
75 FR 47819 - National Institute on Alcohol Abuse and Alcoholism; Notice of Closed Meeting
2010-08-09
... attendance limited to space available. Individuals who plan to attend and need special assistance, such as... applications and the discussions could disclose confidential trade secrets or commercial property such as... Domestic Assistance Program Nos.: 93.271, Alcohol Research Career Development Awards for Scientists and...
78 FR 55749 - Office of the Director, National Institutes of Health; Notice of Meeting
2013-09-11
... Councils. The meeting will be open to the public as indicated below, with attendance limited to space... discussions could disclose confidential trade secrets or commercial property such as patentable material, and... NIH Update; Overview of Shared and High-End, Instrumentation Program; Scientific Presentation. Place...
77 FR 43604 - National Institute on Alcohol Abuse and Alcoholism; Notice of Meeting
2012-07-25
... attendance limited to space available. Individuals who plan to attend and need special assistance, such as... and the discussions could disclose confidential trade secrets or commercial property such as.... (Catalogue of Federal Domestic Assistance Program Nos. 93.273, Alcohol Research Programs; 93.701, ARRA...
77 FR 75180 - National Center for Advancing Translational Sciences; Notice of Meeting
2012-12-19
..., with attendance limited to space available. Individuals who plan to attend and need special assistance... applications and the discussions could disclose confidential trade secrets or commercial property such as...: December 12, 2012. David Clary, Program Analyst, Office of Federal Advisory Committee Policy. [FR Doc. 2012...
77 FR 23488 - National Institute of Dental & Craniofacial Research; Notice of Meeting
2012-04-19
... limited to space available. Individuals who plan to attend and need special assistance, such as sign... and/or contract proposals and the discussions could disclose confidential trade secrets or commercial... Federal Domestic Assistance Program Nos. 93.121, Oral Diseases and Disorders Research, National Institutes...
77 FR 47858 - Office of The Director, National Institutes of Health; Notice of Meeting
2012-08-10
.... The meeting will be open to the public as indicated below, with attendance limited to space available... disclosure of trade secrets and/or commercial or confidential financial information obtained from a person... Secretary, Division of Program Coordination, Planning, and Strategic Initiatives, Office of The Director...
78 FR 45541 - National Institute on Alcohol Abuse and Alcoholism; Notice of Meeting
2013-07-29
... attendance limited to space available. Individuals who plan to attend and need special assistance, such as... applications and the discussions could disclose confidential trade secrets or commercial property such as.... (Catalogue of Federal Domestic Assistance Program Nos. 93.273, Alcohol Research Programs, National Institutes...
78 FR 78983 - Office of the Director, National Institutes of Health; Notice of Meeting
2013-12-27
... Councils. The meeting will be open to the public as indicated below, with attendance limited to space... discussions could disclose confidential trade secrets or commercial property such as patentable material, and... Behavior Change Program. Update on Common Fund Planning and Management Working Group. Place: National...
76 FR 2129 - National Institute of Neurological Disorders And Stroke; Notice of Meeting
2011-01-12
... attendance limited to space available. Individuals who plan to attend and need special assistance, such as... applications and the discussions could disclose confidential trade secrets or commercial property such as... available. (Catalogue of Federal Domestic Assistance Program Nos. 93.853, Clinical Research Related to...
76 FR 80953 - National Institute of Dental & Craniofacial Research; Notice of Meeting
2011-12-27
... limited to space available. Individuals who plan to attend and need special assistance, such as sign... and/or contract proposals and the discussions could disclose confidential trade secrets or commercial... Federal Domestic Assistance Program Nos. 93.121, Oral Diseases and Disorders Research, National Institutes...
78 FR 76634 - National Center for Advancing Translational Sciences; Notice of Meetings
2013-12-18
... attendance limited to space available. Individuals who plan to attend and need special assistance, such as... applications and the discussions could disclose confidential trade secrets or commercial property such as... 20892, 301-594-8064, [email protected] . Dated: December 12, 2013. David Clary, Program Analyst...
75 FR 20852 - National Institute on Alcohol Abuse and Alcoholism; Notice of Meeting
2010-04-21
... attendance limited to space available. Individuals who plan to attend and need special assistance, such as... applications and the discussions could disclose confidential trade secrets or commercial property such as... information for the meeting will be posted when available. (Catalogue of Federal Domestic Assistance Program...
78 FR 50426 - Fogarty International Center; Notice of Meeting
2013-08-19
... meeting will be open to the public as indicated below, with attendance limited to space available... discussions could disclose confidential trade secrets or commercial property such as patentable materials, and... Assistance Program Nos. 93.106, Minority International Research Training Grant in the Biomedical and...
75 FR 51275 - National Institute of Dental and Craniofacial Research; Notice of Meeting
2010-08-19
... attendance limited to space available. Individuals who plan to attend and need special assistance, such as... applications and the discussions could disclose confidential trade secrets or commercial property such as... posted when available. (Catalogue of Federal Domestic Assistance Program Nos. 93.121, Oral Diseases and...
77 FR 1705 - Fogarty International Center; Notice of Meetings
2012-01-11
... meeting will be open to the public as indicated below, with attendance limited to space available... discussions could disclose confidential trade secrets or commercial property such as patentable materials, and... of Federal Domestic Assistance Program Nos. 93.106, Minority International Research Training Grant in...
76 FR 26308 - National Institute on Alcohol Abuse And Alcoholism; Notice of Meeting.
2011-05-06
... attendance limited to space available. Individuals who plan to attend and need special assistance, such as... applications and the discussions could disclose confidential trade secrets or commercial property such as... the meeting will be posted when available. (Catalogue of Federal Domestic Assistance Program Nos. 93...
78 FR 73867 - National Eye Institute; Notice of Meeting
2013-12-09
... open to the public as indicated below, with attendance limited to space available. Individuals who plan... discussions could disclose confidential trade secrets or commercial property such as patentable material, and... concerning Institute programs. Place: National Institutes of Health, Rockledge II Building, Room 9100/9104...
78 FR 50066 - National Institute of Dental and Craniofacial Research; Notice of Meeting
2013-08-16
... indicated below, with attendance limited to space available. Individuals who plan to attend and need special.... The grant applications and the discussions could disclose confidential trade secrets or commercial... information for the meeting will be posted when available. (Catalogue of Federal Domestic Assistance Program...
2012-05-03
... appliance rule have been approved by the Office of Management and Budget (``OMB'') under OMB control number... manufacturers and importers introducing new products or models, or making changes to labels, instructions, or... not submit confidential business information, trade secret information, or other sensitive or...
2010-07-01
... Administration COURT SERVICES AND OFFENDER SUPERVISION AGENCY FOR THE DISTRICT OF COLUMBIA DISCLOSURE OF RECORDS... records. (c) Business information means trade secrets or other commercial or financial information. (d...) software is not an agency record. (f) Confidential commercial information means records provided to the...
2013-03-19
... public. SUMMARY: The theft of trade secrets from U.S. corporations can impact national security... companies or foreign governments to gain an unfair commercial advantage over U.S. companies. We need to... information of a confidential nature, such as sensitive personal information or proprietary business...
Marjanova Jovanov, Tamara
2010-01-01
“Economic espionage and trade secret theft threaten our nation’s national security and economic well being.” Since the 1970s brought the explosion of the Information Revolution and the rise of personal computers, we’ve become even more interested in the brain and how it works. We shouldn’t be aware of Artificial Intelligence and the smart machines of the 21st Century, but of the people in our surroundings and their ability to be corrupted from our competitors. How can we know who is rea...
Transparency and secrets in the nuclear sector: report and recommendations
International Nuclear Information System (INIS)
2011-01-01
Based on several meetings, hearings of many actors involved in matters of transparency and secrets concerning the nuclear activity, and visits of ships carrying nuclear materials, this report aims at examining and analysing means to reconcile the transparency of nuclear information intended for the public with the confidentiality essential to transport security or nuclear activities. The authors also aim at a better understanding of these both notions of transparency and secret with respect to a legal and regulatory framework. In the following part of this report, the authors analyse recommendations which have been made in the past, and their consequences. They discuss possible appeal ways in front of a refusal to issue nuclear information because it is classified as secret. Remaining difficulties are identified as well as ways to overcome them
75 FR 1552 - Chemical Facility Anti-Terrorism Standards
2010-01-12
... Vulnerability Information (CVI) Do not submit comments that include trade secrets, confidential commercial...) specified in Appendix A to complete and submit an online data collection (the Top-Screen) to DHS. The Department uses the facility's Top-Screen and, where applicable, other available information to perform a...
21 CFR 803.9 - What information from the reports do we disclose to the public?
2010-04-01
... AND HUMAN SERVICES (CONTINUED) MEDICAL DEVICES MEDICAL DEVICE REPORTING General Provisions § 803.9... following: (1) Any information that constitutes trade secret or confidential commercial or financial.... (c) We may not disclose the identity of a device user facility that makes a report under this part...
75 FR 53319 - National Institute of Neurological Disorders and Stroke; Notice of Meetings
2010-08-31
... below, with attendance limited to space available. Individuals who plan to attend and need special.... The grant applications and the discussions could disclose confidential trade secrets or commercial... Development, and Special Programs Subcommittee. Date: September 22, 2010. Open: 6 p.m. to 7 p.m. Agenda: To...
77 FR 74198 - National Institute Environmental Health Sciences Notice of Meeting
2012-12-13
... attendance limited to space available. Individuals who plan to attend and need special assistance, such as... applications and the discussions could disclose confidential trade secrets or commercial property such as.... to 4:35 p.m. Agenda: Discussion of program policies and issues. Place: Nat. Inst. of Environmental...
77 FR 76059 - National Institute of General Medical Sciences; Notice of Meeting
2012-12-26
... limited to space available. Individuals who plan to attend and need special assistance, such as sign... and the discussions could disclose confidential trade secrets or commercial property such as...: January 25, 2013, 8:30 a.m. to Adjournment. Agenda: For the discussion of program policies and issues...
78 FR 25281 - National Institute of General Medical Sciences; Notice of Meeting
2013-04-30
... limited to space available. Individuals who plan to attend and need special assistance, such as sign... and the discussions could disclose confidential trade secrets or commercial property, such as... 17, 2013, 8:30 a.m. to ADJOURNMENT. Agenda: For the discussion of program policies and issues...
76 FR 571 - National Institute of Nursing Research; Notice of Meeting
2011-01-05
... Research. The meeting will be open to the public as indicated below, with attendance limited to space... disclose confidential trade secrets or commercial property such as patentable material, and personal...: Discussion of Program Policies and Issues. Place: National Institutes of Health, Building 31, 31 Center Drive...
78 FR 48695 - National Institute of Environmental Health Sciences; Notice of Meeting
2013-08-09
... attendance limited to space available. Individuals who plan to attend and need special assistance, such as... applications and the discussions could disclose confidential trade secrets or commercial property such as.... to 3:15 p.m. Agenda: Discussion of program policies and issues. Place: Nat. Inst. of Environmental...
78 FR 20932 - National Institute on Alcohol Abuse and Alcoholism; Notice of Meeting
2013-04-08
... attendance limited to space available. Individuals who plan to attend and need special assistance, such as... applications and the discussions could disclose confidential trade secrets or commercial property such as... Assistance Program Nos. 93.273, Alcohol Research Programs, National Institutes of Health, HHS) Dated: April 2...
77 FR 23260 - Agency Information Collection Activities: Proposed Collection; Comment Request
2012-04-18
.... 6. Scientific soundness of the measure: Explanation of methods to determine the scientific soundness..., 2015. Method of Collection To achieve the goals of this project, AHRQ intends to solicit submission of... proprietary rights (e.g., patent or data rights), any confidentiality or trade secret protections, National...
78 FR 47715 - National Human Genome Research Institute; Notice of Meeting
2013-08-06
... space available. Individuals who plan to attend and need special assistance, such as sign language... could disclose confidential trade secrets or commercial property such as patentable material, and...: September 09, 2013, 10:00 a.m. to 4:00 p.m. Agenda: To discuss matters of program relevance. Place: National...
78 FR 71628 - National Institute on Alcohol Abuse and Alcoholism; Notice of Meeting
2013-11-29
... attendance limited to space available. Individuals who plan to attend and need special assistance, such as... applications and the discussions could disclose confidential trade secrets or commercial property such as...' evaluation of NIAAA's Intramural Programs. Open: 2:00 p.m. to 5:00 p.m. Agenda: Presentations and other...
78 FR 2682 - National Cancer Institute; Notice of Meeting
2013-01-14
... be open to the public as indicated below, with attendance limited to space available. Individuals who... confidential trade secrets or commercial property such as patentable material, and personal information... Advisory Board. Open: February 8, 2013, 9:00 a.m. to 3:30 p.m. Agenda: Program reports and presentations...
2011-02-08
... non- sensitive, per the considerations in 10 CFR 2.390 and 9.17. This does not apply to financial... information, such as trade secrets and commercial or financial information provided by the Agreement States, that is considered privileged or confidential. Information such as financial assurance and the status...
Confidentiality and integrity in crowdsourcing systems
Ranj Bar, Amin
2014-01-01
Confidentiality and Integrity in Crowdsourcing Systems focuses on identity, privacy, and security related issues in crowdsourcing systems and in particular the confidentiality and integrity of online data created via crowdsourcing. This book begins with an introduction to crowdsourcing and then covers the privacy and security challenges of Confidentiality. The book examines integrity in these systems and the management and control of crowdsourcing systems.
A challenge to unqualified medical confidentiality.
Bozzo, Alexander
2018-04-01
Medical personnel sometimes face a seeming conflict between a duty to respect patient confidentiality and a duty to warn or protect endangered third parties. The conventional answer to dilemmas of this sort is that, in certain circumstances, medical professionals have an obligation to breach confidentiality. Kenneth Kipnis has argued, however, that the conventional wisdom on the nature of medical confidentiality is mistaken. Kipnis argues that the obligation to respect patient confidentiality is unqualified or absolute, since unqualified policies can save more lives in the long run. In this paper, I identify the form of Kipnis's argument and present a challenge to it. I conclude that, as matters stand now, a qualified confidentiality policy is the more rational choice. © Article author(s) (or their employer(s) unless otherwise stated in the text of the article) 2018. All rights reserved. No commercial use is permitted unless otherwise expressly granted.
77 FR 74673 - Office of the Director, National Institutes of Health; Notice of Meeting
2012-12-17
... Councils. The meeting will be open to the public as indicated below, with attendance limited to space... discussions could disclose confidential trade secrets or commercial property such as patentable material, and... Councils. Open: January 22, 2013, 8:30 a.m. to 12:45 p.m. Agenda: Program Reports and Presentations...
78 FR 50067 - National Institute of Nursing Research; Notice of Meeting
2013-08-16
... Research. The meeting will be open to the public as indicated below, with attendance limited to space... and the discussions could disclose confidential trade secrets or commercial property such as..., 2013. Open: September 17, 2013, 1:00 p.m. to 5:15 p.m. Agenda: Discussion of Program Policies and...
75 FR 46951 - National Human Genome Research Institute; Notice of Meeting
2010-08-04
... space available. Individuals who plan to attend and need special assistance, such as sign language... proposals and the discussions could disclose confidential trade secrets or commercial property such as... 13-14, 2010. Open: September 13, 2010, 8:30 a.m. to 3 p.m. Agenda: To discuss matters of program...
76 FR 5594 - National Institute of Environmental Health Sciences; Notice of Meeting
2011-02-01
... attendance limited to space available. Individuals who plan to attend and need special assistance, such as... applications and the discussions could disclose confidential trade secrets or commercial property such as...: February 16, 2011, 8:30 a.m. to 2:45 p.m. Agenda: Discussion of program policies and issues. Place: Nat...
77 FR 68135 - National Institute on Alcohol Abuse and Alcoholism; Notice of Meeting
2012-11-15
... attendance limited to space available. Individuals who plan to attend and need special assistance, such as... applications and the discussions could disclose confidential trade secrets or commercial property such as...: February 7, 2013, 8:00 to 8:45 a.m. Agenda: Presentation of the IC Intramural Program Evaluation to Council...
78 FR 75358 - National Institute of Nursing Research; Notice of Meeting
2013-12-11
... Research. The meeting will be open to the public as indicated below, with attendance limited to space... and the discussions could disclose confidential trade secrets or commercial property such as..., 2014. Open: January 13, 2014, 1:00 p.m. to 5:00 p.m. Agenda: Discussion of Program Policies and Issues...
Gravity Models of Trade-Based Money Laundering
Ferwerda, Joras|info:eu-repo/dai/nl/314405526; Kattenberg, Marc|info:eu-repo/dai/nl/357208986; Chang, Han-Hsin|info:eu-repo/dai/nl/357209370; Unger, Brigitte|info:eu-repo/dai/nl/290994926; Groot, Loek|info:eu-repo/dai/nl/073642398; Bikker, Jaap|info:eu-repo/dai/nl/06912261X
Several attempts have been made in the economics literature to measure money laundering. However, the adequacy of these models is difficult to assess, as money laundering takes place secretly and, hence, goes unobserved. An exception is trade-based money laundering (TBML), a special form of trade
Directory of Open Access Journals (Sweden)
Flávia Cristine Martineli Loureiro
2011-01-01
Full Text Available BACKGROUND: Confidential unit exclusion remains a controversial strategy to reduce the residual risk of transfusion-transmitted infections. OBJECTIVE: This study aimed to analyze confidential unit exclusion from its development in a large institution in light of confidential donation confirmation. METHODS: Data of individuals who donated from October 1, 2008 to December 31, 2009 were analyzed in a case-control study. The serological results and sociodemographic characteristics of donors who did not confirm their donations were compared to those who did. Variables with p-values < 0.20 in univariate analysis were included in a logistic multivariate analysis. RESULTS: In the univariate analysis there was a statically significant association between positive serological results and response to confidential donation confirmation of "No". Donation type, (firsttime or return donor - OR 1.69, CI 1.37-2.09, gender (OR 1.66, CI 1.35-2.04, education level (OR 2.82, CI 2.30-3.47 and ethnic background (OR 0.67, CI 0.55-0.82 were included in the final logistic regression model. In all logistic regression models analyzed, the serological suitability and confidential donation confirmation were not found to be statistically associated. The adoption of new measures of clinical classification such as audiovisual touch-screen computer-assisted self-administered interviews might be more effective than confidential unit exclusion in the identification of donor risk behavior. The requirement that transfusion services continue to use confidential unit exclusion needs to be debated in countries where more specific and sensitive clinical and serological screening methods are available. CONCLUSION: Our findings suggest that there are not enough benefits to justify continued use of confidential donation confirmation in the analyzed institution.
22 CFR 130.15 - Confidential business information.
2010-04-01
..., confidential business information means commercial or financial information which by law is entitled to... 22 Foreign Relations 1 2010-04-01 2010-04-01 false Confidential business information. 130.15... CONTRIBUTIONS, FEES AND COMMISSIONS § 130.15 Confidential business information. (a) Any person who is required...
7 CFR 1280.634 - Confidentiality.
2010-01-01
... 7 Agriculture 10 2010-01-01 2010-01-01 false Confidentiality. 1280.634 Section 1280.634 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (MARKETING... persons voting in the referendum and ballots shall be confidential and the contents of the ballots shall...
77 FR 44224 - Access to Confidential Business Information by Eastern Research Group, Incorporated
2012-07-27
... landfilled. The methodology used in this report is a ``top-down'' materials flow approach to estimate the..., may be claimed by industry to contain trade secrets or CBI. In accordance with the provisions of 40...
Confidentiality in psychological practice: a decrepit concept?
McMahon, M; Knowles, A D
1995-11-01
Although the principle of confidentiality in the relationship between psychologists and client has been vaunted, and is emphasised in the Australian Psychological Society's Code of Professional Conduct (the APS code; 1994), the confidentiality of this relationship is circumscribed by the absence of legal protections, the ethical beliefs of psychologists, institutional practices, and the provisions of the APS code itself. Lack of privilege in judicial proceedings, and statutory obligations to report certain types of behaviour, mandate breaches of confidentiality in some circumstances. Ethical beliefs of psychologists may support disclosure, especially where it is believed that there is danger of serious physical harm to the client or others. Multidisciplinary teams and institutional settings require the exchange of information for optimal delivery of services. Recent amendments to the APS code may require disclosure without the client's consent when a client is believed to be suicidal. Such developments, when considered at all, are typically regarded as exceptions to a general obligation of confidentiality. However, discussion of exceptions presupposes agreement on fundamental principle: the significance of, and rationale for, confidentiality in the psychologist-client relationship. It is argued in this paper that the obligation of confidentiality has been assumed rather than vigorously analysed and empirically explored. A critical examination of this obligation is the most appropriate starting point for the rehabilitation of contemporary principles of confidentiality in the psychologist-client relationship.
A novel secret image sharing scheme based on chaotic system
Li, Li; Abd El-Latif, Ahmed A.; Wang, Chuanjun; Li, Qiong; Niu, Xiamu
2012-04-01
In this paper, we propose a new secret image sharing scheme based on chaotic system and Shamir's method. The new scheme protects the shadow images with confidentiality and loss-tolerance simultaneously. In the new scheme, we generate the key sequence based on chaotic system and then encrypt the original image during the sharing phase. Experimental results and analysis of the proposed scheme demonstrate a better performance than other schemes and confirm a high probability to resist brute force attack.
Muskat-Gorska, Zuzanna
2008-11-01
The article contextualises an emerging new regime for information privacy in South Africa (i.e. the draft Protection of Personal Information Bill). Subsequently, it discusses the possibility of successful implementation of international data-protection standards in an environment where there is an urgent need to balance HIV/AIDS confidentiality rights with public health requirements. Also, the article presents a preliminary assessment of the possible impact of professionalisation (and outsourcing) of workplace HIV/AIDS management on workplace data-protection practices, and it identifies some spaces for social dialogue on HIV/AIDS-data treatment in South Africa. The study methods comprise an analysis of legal documents (concerning international data-protection standards and the development of law governing data protection and HIV/AIDS confidentiality in South Africa) and interviews conducted with workplace health managers and trade union representatives, in Johannesburg, in 2007.
Computer Security: Printing confidentially
Stefan Lueders, Computer Security Team
2015-01-01
Have you ever hesitated to print a confidential document using CERN printers? Or perhaps you have rushed quickly to the printer after hitting the “print” button in order to avoid someone else getting hold of and reading your document? These times are over now with the new printing infrastructure! Indeed, many of us regularly print out confidential documents like our salary slips, MARS forms, tendering documents and drafts of preliminary papers. The upcoming CERN data protection policy will require all of us to respect the confidentiality of such documents and, as the word “confidential” implies, access to “confidential” or sensitive documents will be tightly controlled. What can we do about the public printers located in many buildings, floors and shared spaces - accessible not only to CERN staff and users but also to visitors and guests? Some printers are located in the vicinity of restaurants, cafeterias or close to paths taken b...
7 CFR 1150.278 - Confidential treatment.
2010-01-01
... 7 Agriculture 9 2010-01-01 2009-01-01 true Confidential treatment. 1150.278 Section 1150.278 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (Marketing... of Milk Producer Organizations § 1150.278 Confidential treatment. All documents and other information...
40 CFR 716.55 - Confidentiality claims.
2010-07-01
... confidential business information, health and safety studies of any substance or mixture that has been offered for commercial distribution (including for test marketing purposes and for use in research and... because disclosure would reveal a confidential process or quantitative mixture composition should briefly...
7 CFR 1206.107 - Confidential information.
2010-01-01
... 7 Agriculture 10 2010-01-01 2010-01-01 false Confidential information. 1206.107 Section 1206.107 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (MARKETING... INFORMATION Referendum Procedures. § 1206.107 Confidential information. The ballots and other information or...
The Confidentiality of Interlibrary Loan Records.
Nolan, Christopher W.
1993-01-01
Discusses potential problems for confidentiality within interlibrary loan requests, outlines legal issues related to confidentiality, and proposes guidelines intended to protect library users' rights to privacy. Interlibrary loan documentation procedures are considered; laws and professional standards are reviewed; and the disposition of…
31 CFR 9.6 - Confidential information.
2010-07-01
... 9.6 Money and Finance: Treasury Office of the Secretary of the Treasury EFFECTS OF IMPORTED ARTICLES ON THE NATIONAL SECURITY § 9.6 Confidential information. Information submitted in confidence which... marked “Business Confidential.” [40 FR 50717, Oct. 31, 1975] ...
15 CFR 705.6 - Confidential information.
2010-01-01
... EFFECT OF IMPORTED ARTICLES ON THE NATIONAL SECURITY § 705.6 Confidential information. (a) Any... the investigation that would disclose national security classified information or business... Security Classified” or “Business Confidential,” as appropriate, marked at the top of each sheet. Any...
7 CFR 1207.352 - Confidential treatment.
2010-01-01
... 7 Agriculture 10 2010-01-01 2010-01-01 false Confidential treatment. 1207.352 Section 1207.352 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (MARKETING... PLAN Potato Research and Promotion Plan Reports, Books, and Records § 1207.352 Confidential treatment...
7 CFR 1205.340 - Confidential treatment.
2010-01-01
... 7 Agriculture 10 2010-01-01 2010-01-01 false Confidential treatment. 1205.340 Section 1205.340 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (MARKETING... Cotton Research and Promotion Order Reports, Books, and Records § 1205.340 Confidential treatment. All...
7 CFR 1220.243 - Confidential treatment.
2010-01-01
... 7 Agriculture 10 2010-01-01 2010-01-01 false Confidential treatment. 1220.243 Section 1220.243 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (MARKETING... Confidential treatment. Except as otherwise provided in the Act, financial or commercial information that is...
Directory of Open Access Journals (Sweden)
洪榮宗 Oliver Hung
2007-12-01
Full Text Available 營業秘密法生效迄今十年,其對於營業秘密的保護是否已周延?實有待觀察。又離職後競業禁止約款之相關實務運作現況為何?亦為探討營業秘密保護議題時,無法切割之問題。 本文利用司法院之系統查詢我國地方法院自1999 年8 月1 日起至2006年6 月30 日止,侵害營業秘密或違反競業禁止約款之民事判決,並以量化分析方式探討司法實務之態度。 本文之量化分析顯示:營業秘密與競業禁止訴訟之勝率均偏低;主張違反競業禁止明顯比主張侵害營業秘密來得容易;兩類訴訟之平均審理時間恐無法因應其急迫性需求;未約定違反競業禁止約款之違約賠償罰則的敗訴機率極高;競業禁止約款之五原則在法院實務上並未被遵守等。本文希望透過上開發現與確認,能期待找出改善之道。 The ROC Trade Secret Act has come into force for 10 years. However, whether it has sufficiently protected the trade secrets remains unanswered. In addition, the current operation and practice of “Non-Compete Clauses after Employment Relationship” are also important issues while discussing the trade secrets issues. Through the database of the ROC Judicial Yuan, we reviewed all the cases in the ROC district courts in connection with infringements on trade secrets and breach of non-compete clauses from August 1, 1999 to June 30, 2006 and conducted quantitative analysis of the courts’ opinions in this regard. The results of our quantitative analysis show that: 1. most of the decisions related to trade secret infringements and breach of non-compete clauses are in favor of defendants; 2. it is easier to claim violation of the non-compete clauses than infringements on trade secrets; 3. the trial period is too long to protect the plaintiffs given that the time is of essence; 4. it is quite probable that plaintiffs will lose the lawsuits if no penalty clause for
The Secret Driving Force Behind Mongolia’s Successful Democracy
2016-03-01
the nation’s democracy movement its earliest stages. Courtesy of the Democratic Union of Mongolia PRISM 6, no. 1 FROM THE FIELD | 141 The Secret Driving...assistance and trade. Our state budget PRISM 6, no. 1 FROM THE FIELD | 143 THE SECRET DRIVING FORCE BEHIND MONGOLIA’S SUCCESSFUL DEMOCRACY collapsed; we...O yungerel Tsedevdam ba (2006) PRISM 6, no. 1 FROM THE FIELD | 145 THE SECRET DRIVING FORCE BEHIND MONGOLIA’S SUCCESSFUL DEMOCRACY significantly as
Simulating cloud environment for HIS backup using secret sharing.
Kuroda, Tomohiro; Kimura, Eizen; Matsumura, Yasushi; Yamashita, Yoshinori; Hiramatsu, Haruhiko; Kume, Naoto
2013-01-01
In the face of a disaster hospitals are expected to be able to continue providing efficient and high-quality care to patients. It is therefore crucial for hospitals to develop business continuity plans (BCPs) that identify their vulnerabilities, and prepare procedures to overcome them. A key aspect of most hospitals' BCPs is creating the backup of the hospital information system (HIS) data at multiple remote sites. However, the need to keep the data confidential dramatically increases the costs of making such backups. Secret sharing is a method to split an original secret message so that individual pieces are meaningless, but putting sufficient number of pieces together reveals the original message. It allows creation of pseudo-redundant arrays of independent disks for privacy-sensitive data over the Internet. We developed a secret sharing environment for StarBED, a large-scale network experiment environment, and evaluated its potential and performance during disaster recovery. Simulation results showed that the entire main HIS database of Kyoto University Hospital could be retrieved within three days even if one of the distributed storage systems crashed during a disaster.
16 CFR 14.12 - Use of secret coding in marketing research.
2010-01-01
... 16 Commercial Practices 1 2010-01-01 2010-01-01 false Use of secret coding in marketing research... STATEMENTS § 14.12 Use of secret coding in marketing research. (a) The Federal Trade Commission has determined to close its industry-wide investigation of marketing research firms that was initiated in...
32 CFR 154.77 - Reporting requirements.
2010-07-01
... took the action, using the enclosed format: (1) Number of Top Secret, Secret, and Confidential clearances issued; (2) Number of Top Secret, Secret, and Confidential clearances denied; (3) Number of Top...) Total number of personnel holding a clearance for Top Secret, Secret, Confidential and Sensitive...
40 CFR 350.7 - Substantiating claims of trade secrecy.
2010-07-01
... publications or other information sources available to the public or your competitors (of which you are aware... of the chemical claimed as trade secret and explain why it is a secret of interest to competitors... competitors could deduce this use from disclosure of the chemical identity together with other information on...
Confidentiality and the employee assistance program professional.
Mistretta, E F; Inlow, L B
1991-02-01
During the last two decades EAPs have offered employees confidential assessment, counseling, and referral. Many occupational health nurses have taken on the role of EAP professional or function as the liaison between the EAP counselor and the employee. The occupational health nurse involved in any EAP issue must adhere to the standards of confidentiality. The federal and state laws, company policy, and professional codes of ethics regarding these clients must be clearly understood, especially related to the issue of confidentiality.
2011-04-13
.... Government-granted security clearance (i.e., Top Secret, Secret, or Confidential). d. A review of the... active U.S. Government granted security clearance, i.e., Top Secret, Secret or Confidential. 5. The... another active U.S. Government granted security clearance, i.e., Top Secret, Secret or Confidential. 6...
2010-05-06
.... Government-granted security clearance (i.e., Top Secret, Secret, or Confidential). d. A review of the... active U.S. Government granted security clearance, i.e., Top Secret, Secret or Confidential. 5. The... another active U.S. Government granted security clearance, i.e., Top Secret, Secret or Confidential. 6...
Wireless Physical Layer Security: On the Performance Limit of Secret-Key Agreement
Zorgui, Marwen
2015-05-01
Physical layer security (PLS) is a new paradigm aiming at securing communications between legitimate parties at the physical layer. Conventionally, achieving confidentiality in communication networks relies on cryptographic techniques such as public-key cryptography, secret-key distribution and symmetric encryption. Such techniques are deemed secure based on the assumption of limited computational abilities of a wiretapper. Given the relentless progress in computational capacities and the dynamic topology and proliferation of modern wireless networks, the relevance of the previous techniques in securing communications is more and more questionable and less and less reliable. In contrast to this paradigm, PLS does not assume a specific computational power at any eavesdropper, its premise to guarantee provable security via employing channel coding techniques at the physical layer exploiting the inherent randomness in most communication systems. In this dissertation, we investigate a particular aspect of PLS, which is secret-key agreement, also known as secret-sharing. In this setup, two legitimate parties try to distill a secret-key via the observation of correlated signals through a noisy wireless channel, in the presence of an eavesdropper who must be kept ignorant of the secret-key. Additionally, a noiseless public channel is made available to the legitimate parties to exchange public messages that are also accessible to the eavesdropper. Recall that key agreement is an important aspect toward realizing secure communications in the sense that the key can be used in a one-time pad scheme to send the confidential message. In the first part, our focus is on secret-sharing over Rayleigh fading quasi-static channels. We study the fundamental relationship relating the probability of error and a given target secret-key rate in the high power regime. This is characterized through the diversity multiplexing tradeoff (DMT) concept, that we define for our model and then
Law and ethics in conflict over confidentiality?
Dickens, B M; Cook, R J
2000-09-01
Ethical principles that require the preservation of patients' confidential information are reinforced by principles found in several areas of law, such as law on contracts, negligence, defamation and fiduciary duty. However, laws sometimes compel disclosures of medical confidences, and more often may justify or excuse disclosures. Legally contentious issues concern patients' confidences regarding possible unlawful conduct, such as pregnancy termination, and the risk of spread of HIV and other infections. This article reviews the various legal bases of the duty of confidentiality, and legal challenges to the ethical obligation of non-disclosure. It addresses the justifications and limits of exchange of patients' health information among healthcare professionals and trainees, and considers legally recognized limits of confidential duties, and the scope of legitimate disclosure. An underlying theme is how to determine whether physicians are ethically justified in employing the discretion the law sometimes affords them to breach patients' expectations of confidentiality.
A secure data outsourcing scheme based on Asmuth-Bloom secret sharing
Idris Muhammad, Yusuf; Kaiiali, Mustafa; Habbal, Adib; Wazan, A. S.; Sani Ilyasu, Auwal
2016-11-01
Data outsourcing is an emerging paradigm for data management in which a database is provided as a service by third-party service providers. One of the major benefits of offering database as a service is to provide organisations, which are unable to purchase expensive hardware and software to host their databases, with efficient data storage accessible online at a cheap rate. Despite that, several issues of data confidentiality, integrity, availability and efficient indexing of users' queries at the server side have to be addressed in the data outsourcing paradigm. Service providers have to guarantee that their clients' data are secured against internal (insider) and external attacks. This paper briefly analyses the existing indexing schemes in data outsourcing and highlights their advantages and disadvantages. Then, this paper proposes a secure data outsourcing scheme based on Asmuth-Bloom secret sharing which tries to address the issues in data outsourcing such as data confidentiality, availability and order preservation for efficient indexing.
42 CFR 35.11 - Clinical records; confidential.
2010-10-01
... EXAMINATIONS HOSPITAL AND STATION MANAGEMENT General § 35.11 Clinical records; confidential. A complete clinical record shall be maintained for each patient admitted to a station or hospital of the Service. Such... 42 Public Health 1 2010-10-01 2010-10-01 false Clinical records; confidential. 35.11 Section 35.11...
37 CFR 260.4 - Confidential information and statements of account.
2010-07-01
... Confidential information and statements of account. (a) For purposes of this part, confidential information shall include statements of account and any information pertaining to the statements of account... included on the statement of account. (d) Access to the confidential information pertaining to the royalty...
Is patient confidentiality compromised with the electronic health record?: a position paper.
Wallace, Ilse M
2015-02-01
In order for electronic health records to fulfill their expected benefits, protection of privacy of patient information is key. Lack of trust in confidentiality can lead to reluctance in disclosing all relevant information, which could have grave consequences. This position paper contemplates whether patient confidentiality is compromised by electronic health records. The position that confidentiality is compromised was supported by the four bioethical principles and argued that despite laws and various safeguards to protect patients' confidentiality, numerous data breaches have occurred. The position that confidentiality is not compromised was supported by virtue ethics and a utilitarian viewpoint and argued that safeguards keep information confidential and the public feels relatively safe with the electronic health record. The article concludes with an ethically superior position that confidentiality is compromised with the electronic health record. Although organizational and governmental ways of enhancing the confidentiality of patient information within the electronic health record facilitate confidentiality, the ultimate responsibility of maintaining confidentiality rests with the individual end-users and their ethical code of conduct. The American Nurses Association Code of Ethics for nurses calls for nurses to be watchful with data security in electronic communications.
Protecting Privacy and Confidentiality in Environmental Health Research.
Resnik, David B
2010-01-01
Environmental health researchers often need to make difficult decisions on how to protect privacy and confidentiality when they conduct research in the home or workplace. These dilemmas are different from those normally encountered in clinical research. Although protecting privacy and confidentiality is one of the most important principles of research involving human subjects, it can be overridden to prevent imminent harm to individuals or if required by law. Investigators should carefully consider the facts and circumstances and use good judgment when deciding whether to breach privacy or confidentiality.
Ombuds’ corner: Confidentiality
Vincent Vuillemin
2011-01-01
In this series, the Bulletin aims to explain the role of the Ombuds at CERN by presenting practical examples of misunderstandings that could have been resolved by the Ombuds if he had been contacted earlier. Please note that, in all the situations we present, the names are fictitious and used only to improve clarity. Jane* came to the Ombuds to share her concerns about the actions of Mike*, one of her senior colleague supervisors, and insisted on the absolute confidentiality. The Ombuds promised to keep the information confidential following the terms of his mandate. During the discussion it appeared that the whole group was affected by the situation, spending a lot of time discussing how to resolve the problem instead of focusing on their main responsibilities. The risks for the Organization seemed very high and could possibly endanger the safety of the operations. On one side, the Ombuds believed that it was essential to bring this matter to the attention of senior managem...
Directory of Open Access Journals (Sweden)
Made Dwi Juliana
2015-07-01
Full Text Available One type of a criminal in the capital market is the practice of insider trading. Insider trading is an act that involves a group of insider in the capital market who deliberately exploit information that has not been released to investors with the advantages. In insider trading there are two actors such as party directly as an insider who works in the company or indirect as tippee party who obtain confidential information from an insider. Tippee is the party who receives confidential information from an insider either passively or actively against the law or not against the law for personal gain in the stock trading. This is very detrimental to the investors in the stock trading. Because of that if needs the protection for investors against the actions of the Tippee. This study discusses two (2 problem first about the subject matter of the action form Tippee in insider trading to the stock at Indonesia and the second about OJK authority on legal protection for investors in case of insider trading by the Tippee in capital market activities. This research is a normative law. The Method approach is the approach of legislation, conceptual approach and comparative approach. Legal materials used are primary and secondary legal materials. Mechanical collection of legal materials is through the study of literature that further uses analysis techniques that description techniques and interpretation. The results shows that this form of action Tippee can be done actively and passively. Actively to perform an unlawful act such as stealing information. In is not trying to fight the law, but to obtain inside information and legal safeguards for investors to act with regard to insider trading Tippee do give legal certainty through legislation and legal certainty by the OJK through law enforcement
Confidential benchmarking based on multiparty computation
DEFF Research Database (Denmark)
Damgård, Ivan Bjerre; Damgård, Kasper Lyneborg; Nielsen, Kurt
We report on the design and implementation of a system that uses multiparty computation to enable banks to benchmark their customers' confidential performance data against a large representative set of confidential performance data from a consultancy house. The system ensures that both the banks......' and the consultancy house's data stays confidential, the banks as clients learn nothing but the computed benchmarking score. In the concrete business application, the developed prototype help Danish banks to find the most efficient customers among a large and challenging group of agricultural customers with too much...... debt. We propose a model based on linear programming for doing the benchmarking and implement it using the SPDZ protocol by Damgård et al., which we modify using a new idea that allows clients to supply data and get output without having to participate in the preprocessing phase and without keeping...
Client confidentiality: Perspectives of students in a healthcare ...
African Journals Online (AJOL)
This moral dilemma is difficult for students to circumvent and therefore this paper presents healthcare students' perspectives of confidentiality. Methods. We aimed to explore healthcare students' views and experiences of confidentiality as an ethical principle by adopting a qualitative explorative approach. Purposeful ...
Physician Knowledge and Attitudes around Confidential Care for Minor Patients.
Riley, Margaret; Ahmed, Sana; Reed, Barbara D; Quint, Elisabeth H
2015-08-01
Minor adolescent patients have a legal right to access certain medical services confidentially without parental consent or notification. We sought to assess physicians' knowledge of these laws, attitudes around the provision of confidential care to minors, and barriers to providing confidential care. An anonymous online survey was sent to physicians in the Departments of Family Medicine, Internal Medicine-Pediatrics, Obstetrics/Gynecology, and Pediatrics at the University of Michigan. Response rate was 40% (259/650). The majority of physicians felt comfortable addressing sexual health, mental health, and substance use with adolescent patients. On average, physicians answered just over half of the legal knowledge questions correctly (mean 56.6% ± 16.7%). The majority of physicians approved of laws allowing minors to consent for confidential care (90.8% ± 1.7% approval), while substantially fewer (45.1% ± 4.5%) approved of laws allowing parental notification of this care at the physician's discretion. Most physicians agreed that assured access to confidential care should be a right for adolescents. After taking the survey most physicians (76.6%) felt they needed additional training on confidentiality laws. The provision of confidential care to minors was perceived to be most inhibited by insurance issues, parental concerns/relationships with the family, and issues with the electronic medical record. Physicians are comfortable discussing sensitive issues with adolescents and generally approve of minor consent laws, but lack knowledge about what services a minor can access confidentially. Further research is needed to assess best methods to educate physicians about minors' legal rights to confidential healthcare services. Copyright © 2015 North American Society for Pediatric and Adolescent Gynecology. Published by Elsevier Inc. All rights reserved.
2010-06-18
... or possess another active U.S. Government-granted security clearance (i.e., Top Secret, Secret, or....e., Top Secret, Secret or Confidential. 5. The licensee shall develop, implement, and maintain....e., Top Secret, Secret or Confidential. [[Page 34791
Confidentiality: From the Stacks to the Witness Stand.
Lee, Janis M.; Smith, G. Guy
1988-01-01
A library director describes her experience of safeguarding the confidentiality of the circulation records of a woman who went on a shooting rampage at a shopping mall. The lawyer who represented the library discusses the legal responsibility of public and school libraries concerning confidentiality. (CLB)
26 CFR 1.971-1 - Definitions with respect to export trade corporations.
2010-04-01
..., copyrights, secret processes and formulas, goodwill, trademarks, trade brands, franchises, and other like... trade income, the anticipated future needs of the business will be taken into account to the extent that... determination date; anticipated future needs relating to a later period will not be taken into account unless it...
20 CFR 726.113 - Disclosure of confidential information.
2010-04-01
... MINE OPERATOR'S INSURANCE Authorization of Self-Insurers § 726.113 Disclosure of confidential... 20 Employees' Benefits 3 2010-04-01 2010-04-01 false Disclosure of confidential information. 726... authorized self-insurer or applicant for the authorization of self-insurance obtained by the Office shall be...
Gravity Models of Trade-based Money Laundering
Ferwerda, J.|info:eu-repo/dai/nl/314405526; Kattenberg, M.A.C.|info:eu-repo/dai/nl/357208986; Chang, H.-S.; Unger, B.|info:eu-repo/dai/nl/290994926; Groot, L.F.M.|info:eu-repo/dai/nl/073642398; Bikker, J.A.|info:eu-repo/dai/nl/06912261X
2011-01-01
Several attempts have been made in the economics literature to measure money laundering. However, the adequacy of these models is difficult to assess, as money laundering takes place secretly and, hence, goes unobserved. An exception is tradebased money laundering (TBML), a special form of trade
Practical State Machine Replication with Confidentiality
Energy Technology Data Exchange (ETDEWEB)
Duan, Sisi [ORNL; Zhang, Haibin [University of North Carolina, Chapel Hill
2016-01-01
We study how to enable arbitrary randomized algorithms in Byzantine fault-tolerant (BFT) settings. We formalize a randomized BFT protocol and provide a simple and efficient construction that can be built on any existing BFT protocols while adding practically no overhead. We go one step further to revisit a confidential BFT protocol (Yin et al., SOSP '03). We show that their scheme is potentially susceptible to safety and confidentiality attacks. We then present a new protocol that is secure in the stronger model we formalize, by extending the idea of a randomized BFT protocol. Our protocol uses only efficient symmetric cryptography, while Yin et al.'s uses costly threshold signatures. We implemented and evaluated our protocols on microbenchmarks and real-world use cases. We show that our randomized BFT protocol is as efficient as conventional BFT protocols, and our confidential BFT protocol is two to three orders of magnitude faster than Yin et al.'s, which is less secure than ours.
41 CFR 105-62.102 - Authority to originally classify.
2010-07-01
... originally classify. (a) Top secret, secret, and confidential. The authority to originally classify information as Top Secret, Secret, or Confidential may be exercised only by the Administrator and is delegable...
29 CFR 4010.13 - Confidentiality of information submitted.
2010-07-01
... REPORTING AND DISCLOSURE REQUIREMENTS ANNUAL FINANCIAL AND ACTUARIAL INFORMATION REPORTING § 4010.13 Confidentiality of information submitted. In accordance with § 4901.21(a)(3) of this chapter and ERISA section... 29 Labor 9 2010-07-01 2010-07-01 false Confidentiality of information submitted. 4010.13 Section...
75 FR 75586 - Confidentiality of Suspicious Activity Reports
2010-12-03
...] RIN 1550-AC26 Confidentiality of Suspicious Activity Reports AGENCY: The Office of Thrift Supervision... implementing the Bank Secrecy Act (BSA) governing the confidentiality of a suspicious activity report (SAR) to... corporations regulated by the OTS, to keep certain records and make certain reports that have been determined...
Protecting confidentiality rights: the need for an ethical practice model.
Fisher, Mary Alice
2008-01-01
All psychologists must uphold the same ethical standards about confidentiality even though each state imposes different legal limits on their ability to protect clients' confidences. The resulting ethical-legal confusion is exacerbated by legally based confidentiality training that treats legal exceptions as if they were the rule and fosters the impression that attorneys are now the only real experts about this aspect of practice. This article provides an ethics-based confidentiality practice model that clarifies the ethical rule and puts its legal exceptions into ethical perspective. Like the Confidentiality section of the American Psychological Association's (2002) Ethical Principles of Psychologists and Code of Conduct, this outline would apply to all psychologists regardless of state laws, but the details of its implementation would vary according to role and setting. It can be used as a universal training outline, a consultation and supervision tool, a guide to professional practice, and a basis for clearer ongoing conversation about the ethics of "conditional confidentiality." Psychologists can use this practice model to regain their status as experts about the confidentiality ethics of their own profession. PsycINFO Database Record (c) 2008 APA, all rights reserved.
2012-05-01
... or possess another active U.S. Government-granted security clearance (i.e., Top Secret, Secret, or....e., Top Secret, Secret or Confidential. 5. The licensee shall develop, implement, and maintain....e., Top Secret, Secret or Confidential. 6. The licensee shall develop, implement, and maintain...
2010-07-13
... or possess another active U.S. Government-granted security clearance (i.e., Top Secret, Secret, or....e., Top Secret, Secret or Confidential. 5. The licensee shall develop, implement, and maintain....e., Top Secret, Secret or Confidential. 6. The licensee shall develop, implement, and maintain...
2013-08-06
... or possess another active U.S. Government-granted security clearance (i.e., Top Secret, Secret, or....e., Top Secret, Secret or Confidential. 5. The licensee shall develop, implement, and maintain....e., Top Secret, Secret or Confidential. 6. The licensee shall develop, implement, and maintain...
78 FR 32541 - Technical Amendments
2013-05-31
.... All information classified ``Top Secret,'' ``Secret,'' and ``Confidential'' shall be delivered to the... information classified ``Top Secret,'' ``Secret,'' and ``Confidential.'' (c) Storage. All classified documents shall be stored in the safe designated by the Executive Director for information classified ``Top Secret...
Evaluation in a competitive utility environment: the threat of confidentiality
International Nuclear Information System (INIS)
Vine, Edward
1997-01-01
Utilities have become concerned that their competitors will desire access to energy-related data--including energy-efficiency data collected by utilities from their energy- efficiency programs--that they may regard as proprietary or confidential. In the future, disputes about confidentiality may focus more on costs and market information (as well as energy use and load data) than on energy-efficiency data per se. So far, the discussion has been limited to ratepayer-funded data. Consequently, many utilities are now requesting that the data (including evaluation data) they submit to their utility regulatory commissions remain confidential. Withholding utility information from the public is likely to harm the evaluation community that depends on the free flow of information for improving the practice of evaluation as well as for disseminating the lessons learned from particular program evaluations. Confidentiality will also have significant policy implications. In response to these concerns, in late 1995 and early 1996, we conducted a survey of state public utility commissions (PUCs) in the U.S. to assess: (1) the relative importance of the issue of confidential data in the regulatory arena; (2) the regulatory response to utility requests for confidentiality (e.g., formal policies, guidelines, rules and procedures, and decisions); and (3) the type of data filed as confidential with PUCS. We focus on the first two objectives of this study. In addition to our interviews, we reviewed selected state statutes, judicial and PUC decisions, rules and procedures, protective orders, and interim policy documents. Evaluators need to understand the context of confidentiality as well as the response of the regulatory commissions to confidentiality, because evaluators will need to adapt to a new environment where energy-related data and information may be harder to obtain and distribute. We propose that regulators conduct the following activities as soon as possible: 1. Assess
DLP system and the secret of personal correspondence
Directory of Open Access Journals (Sweden)
Mavrinskaya T.V.
2017-04-01
Full Text Available according to the authors, every day a number of threats to information security increases, and this requires an increase in resources (systems of information protection of organizations and enterprises. There are many information security tools with different functionality, but the main mean of preventing information leakage is the Date Loss Prevention (DLP system. If you need to establish control over the leak of confidential information there appear a number of questions of conformity of decisions with the legislation and regulations. This article describes the issue of compliance functionality of a DLP system the provisions and requirements of the legislation in the sphere of protection of family and personal secrets, as well as compliance with the Constitutional right of citizens to privacy of correspondence.
50 CFR 600.130 - Protection of confidentiality of statistics.
2010-10-01
... statistics. 600.130 Section 600.130 Wildlife and Fisheries FISHERY CONSERVATION AND MANAGEMENT, NATIONAL... Fishery Management Councils § 600.130 Protection of confidentiality of statistics. Each Council must establish appropriate procedures for ensuring the confidentiality of the statistics that may be submitted to...
2011-06-02
... another active U.S. Government-granted security clearance (i.e., Top Secret, Secret, or Confidential). d...'' clearances or possess another active U.S. Government granted security clearance, i.e., Top Secret, Secret or... another active U.S. Government granted security clearance, i.e., Top Secret, Secret or Confidential. 6...
7 CFR 1205.540 - Confidential books, records, and reports.
2010-01-01
... 7 Agriculture 10 2010-01-01 2010-01-01 false Confidential books, records, and reports. 1205.540 Section 1205.540 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL... Confidential books, records, and reports. All information obtained from the books, records, and reports of...
45 CFR 5.65 - Exemption four: Trade secrets and confidential commercial or financial information.
2010-10-01
... can be said to be the end product of either innovation or substantial effort. There must be a direct... commercial or financial information. 5.65 Section 5.65 Public Welfare DEPARTMENT OF HEALTH AND HUMAN SERVICES... attorney-client privilege or the work product privilege. Information may be privileged for this purpose...
13 CFR 120.1060 - Confidentiality of Reports, Risk Ratings and related Confidential Information.
2010-01-01
... other than SBA's Lender oversight and SBA's portfolio management purposes. An SBA Lender, Intermediary... conjunction with SBA's Lender Oversight Program and SBA's portfolio management (for purposes of this... 13 Business Credit and Assistance 1 2010-01-01 2010-01-01 false Confidentiality of Reports, Risk...
Computer Security: confidentiality is everybody’s business
Stefan Lueders, Computer Security Team
2015-01-01
Recently, a zip file with confidential information was mistakenly made public on one of CERN’s websites. Although the file was only intended for members of an internal committee, when placing it onto the CERN website, someone made a mistake when setting the access permissions and, thus, made the file accessible to everyone visiting the site! Unfortunately, this is but one example of such mistakes. We have seen other documents made accessible to a much wider audience than originally intended… CERN takes serious measures to ensure the confidentiality of data. Confidential or “sensitive” documents (following the nomenclature set out in the CERN Data Protection Policy) deserve professional handling and access protections given only to the people who really need to access them. As such, they must not be widely circulated as attachments in e-mails and, most definitely, must not be stored on random public websites for the sole purpose of shari...
Sur les usages publics du secret : les archives du Service Secret Communiste Roumain
Directory of Open Access Journals (Sweden)
Andi Mihalache
2009-10-01
Full Text Available L’étude s’occupe des dossiers de l’ancienne police politique du régime communiste de Roumanie, la Securitate. Il a comme point de départ le fait que la mémoire sociale, le contexte politique et les débats publics actuels influencent la recherche historique, modifiant les perceptions sur le document d’archive. Ce dernier n’est plus vu seulement comme source principale de la recherche historique, devenant outil redoutable dans les disputes électorales, car, en base des informations extraites d’un dossier de la Securitate, l’on peut évincer un adversaire incommode. Se montrant utile à dénoncer la collaboration de quelqu’un sous le régime communiste, le document d’archive a acquis des mises symboliques imprévues, étant caché, protégé, volé, racheté, truqué, perdu et redécouvert à commande. Toutes ces pratiques compromettent de plus en plus les chances des historiens de reconstituer de manière crédible l’histoire récente des Roumains. On obtient difficilement l’accès aux dossiers de la Securitate, la patrimonialisation excessive des documents - en vérité leur trésorisation - étant conséquence directe du prestige idéologique et social que le secret détenait au temps communiste.This article focuses on the Securitate files as a political stake, but also as first rank sources for academic research, not from the current perspective of recent history, but from that of cultural history. In post-communist Romania, silence is the secret’s poor relative and confidentiality its respectable form. Ironically or not, we could state that in our country the secrets of communist repression are literally protected by law. The secret is an unbidden, illegitimate competence. In its ethics it does not matter what is good and what is bad, what is true and what is false. The main interest is what is said and what isn’t. The secret being a convention, a pact, the gesture of not saying seems to be more important than
Library Records: A Review of Confidentiality Laws and Policies.
Million, Angela C.; Fisher, Kim N.
1986-01-01
Cites the importance of having a state law, knowing what it says, and having a library policy statement regarding the confidentiality of patron records. Discussion covers writing and implementing a policy, the role of automation, existing laws, library records defined, exceptions to confidentiality, and legal liability. Thirty-seven references are…
5 CFR 2634.901 - Policies of confidential financial disclosure reporting.
2010-01-01
.... (a) The confidential financial reporting system set forth in this subpart is designed to complement... Government duties involve the exercise of significant discretion in certain sensitive areas, report their... apparent conflicts of interest. The confidential financial disclosure system promotes that goal, with...
Analysis of LYSA-calculus with explicit confidentiality annotations
DEFF Research Database (Denmark)
Gao, Han; Nielson, Hanne Riis
2006-01-01
Recently there has been an increased research interest in applying process calculi in the verification of cryptographic protocols due to their ability to formally model protocols. This work presents LYSA with explicit confidentiality annotations for indicating the expected behavior of target...... malicious activities performed by attackers as specified by the confidentiality annotations. The proposed analysis approach is fully automatic without the need of human intervention and has been applied successfully to a number of protocols....
48 CFR 1552.235-80 - Access to confidential business information.
2010-10-01
... business information. 1552.235-80 Section 1552.235-80 Federal Acquisition Regulations System ENVIRONMENTAL... Clauses 1552.235-80 Access to confidential business information. As prescribed in 1535.007-70(g), insert the following clause. Access to Confidential Business Information (OCT 2000) It is not anticipated...
Confidential Business Information under TSCA
This website informs businesses, policymakers, and the public about the confidential business information (CBI) provisions of § 14 of the Toxic Substances Control Act (TSCA), as amended by the Frank R. Lautenberg Chemical Safety for the 21st Century Act.
6 CFR 25.10 - Confidentiality and protection of Intellectual Property.
2010-01-01
... 6 Domestic Security 1 2010-01-01 2010-01-01 false Confidentiality and protection of Intellectual Property. 25.10 Section 25.10 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY REGULATIONS TO SUPPORT ANTI-TERRORISM BY FOSTERING EFFECTIVE TECHNOLOGIES § 25.10 Confidentiality and...
40 CFR 260.2 - Availability of information; confidentiality of information.
2010-07-01
... 40 Protection of Environment 25 2010-07-01 2010-07-01 false Availability of information; confidentiality of information. 260.2 Section 260.2 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) SOLID WASTES (CONTINUED) HAZARDOUS WASTE MANAGEMENT SYSTEM: GENERAL General § 260.2 Availability of information; confidentiality of...
48 CFR 1552.235-71 - Treatment of confidential business information.
2010-10-01
... business information. 1552.235-71 Section 1552.235-71 Federal Acquisition Regulations System ENVIRONMENTAL... Clauses 1552.235-71 Treatment of confidential business information. As prescribed in 1535.007-70(b... determined that in the performance of a contract, EPA may furnish confidential business information to the...
7 CFR 1280.227 - Confidentiality.
2010-01-01
... statistical data collected therefrom, which statements do not identify the information furnished by any person... 7 Agriculture 10 2010-01-01 2010-01-01 false Confidentiality. 1280.227 Section 1280.227 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (MARKETING...
22 CFR 1101.5 - Security, confidentiality and protection of records.
2010-04-01
... 22 Foreign Relations 2 2010-04-01 2010-04-01 true Security, confidentiality and protection of... Bureau of Standard's booklet “Computer Security Guidelines for Implementing the Privacy Act of 1974” (May... STATES AND MEXICO, UNITED STATES SECTION PRIVACY ACT OF 1974 § 1101.5 Security, confidentiality and...
Clandestine Bushmeat Trade in Cross River State, Nigeria ...
African Journals Online (AJOL)
This paper surveyed the herp species traded in secret bush meat markets of Cross River State, with the view of assessing their conservation status and uses they are put to. The study mainly focused on six selected communities in Akamkpa Local Government Area (LGA) of Cross Rivers State, Nigeria – the host LGA of ...
International trade agreements: hazards to health?
Shaffer, Ellen R; Brenner, Joseph E
2004-01-01
Since the 1980s, neoliberal policies have prescribed reducing the role of governments, relying on market forces to organize and provide health care and other vital human services. In this context, international trade agreements increasingly serve as mechanisms to enforce the privatization, deregulation, and decentralization of health care and other services, with important implications for democracy as well as for health. Critics contend that social austerity and "free" trade agreements contribute to the rise in global poverty and economic inequality and instability, and therefore to increased preventable illness and death. Under new agreements through the World Trade Organization that cover vital human services such as health care, water, education, and energy, unaccountable, secret trade tribunals could overrule decisions by democratically elected officials on public financing for national health care systems, licensing and training standards for health professionals, patient safety and quality regulations, occupational safety and health, control of hazardous substances such as tobacco and alcohol, the environment, and affordable access to safe water and sanitation. International negotiations in 2003 in Cancun and in Miami suggested that countervailing views are developing momentum. A concerned health care community has begun to call for a moratorium on trade negotiations on health care and water, and to reinvigorate an alternative vision of universal access to vital services.
12 CFR 563g.13 - Public disclosure and confidential treatment.
2010-01-01
... 12 Banks and Banking 5 2010-01-01 2010-01-01 false Public disclosure and confidential treatment. 563g.13 Section 563g.13 Banks and Banking OFFICE OF THRIFT SUPERVISION, DEPARTMENT OF THE TREASURY SECURITIES OFFERINGS § 563g.13 Public disclosure and confidential treatment. (a) Any offering circular...
21 CFR 821.55 - Confidentiality.
2010-04-01
... permission to release, the patient's name, address, telephone number, and social security number, or other... MEDICAL DEVICE TRACKING REQUIREMENTS Records and Inspections § 821.55 Confidentiality. (a) Any patient... identify patient or research subjects shall not be available for public disclosure except as provided in...
Conflicting duties over confidentiality in Argentina and Peru.
Cavallo, Mercedes
2011-02-01
The medical duty of confidentiality represents a key element for the provision of reproductive and sexual health services. In some Latin American countries, such as Argentina and Peru, the legal systems impose—or are interpreted as imposing—on health professionals the duty of confidentiality, but also the duty to report the commission of a public order offense that they know about owing to the practicing of their profession. In these countries, the conflicting duties and the criminalization of abortion cause severe public health and human rights problems when health professionals assist their patients for post-abortion treatment. Typically, patients are deterred from seeking prompt medical care, and their privacy, autonomy, and dignity are violated. A 2010 ruling from the Supreme Court of Argentina and a 2004 ruling from the Inter-American Court of Human Rights emerge as important instruments that grant a more adequate protection of medical confidentiality. © 2010 International Federation of Gynecology and Obstetrics. Published by Elsevier Ireland Ltd. All rights reserved.
Confidential patent application with an example of preparation
Directory of Open Access Journals (Sweden)
Obrad T. Čabarkapa
2013-12-01
Full Text Available In order that the invention solving a technical problem receives a patent protection, it is necessary to file a patent application. For the protection of confidential inventions which are important for defense and national security, a confidential patent application[1] must be filed. A confidential patent application is an important and complex document, the parts of which are, in principle, exposed in an established order. For the preparation of patent applications, it is necessary to engage experts with higher education, primarily in the technical field the invention relates to. The contents of the patent application is a basis for examining whether the application meets the requirements for patentability and whether the right to patent protection is achieved. Besides theoretical discussions on patent application, the paper gives a short version of an example of an application regarding a protected confidential invention. Introduction The basic condition for the exercise of patent protection is filing a patent application, the test procedure and, eventually, depending on the test results - the recognition or rejection of the patent. The paper gives a description of all parts of the patent application on an example of a confidential invention already patented. The content of the confidential patent application The confidential patent application for confidential invention protection consists of the following parts: The application for a patent; description of the invention; the claims (indication of what is new and what is required to be protected by patenting; abstract (short summary of the invention and a draft of the invention (to which the description and the claims are referred. The application for a patent The application for patent is filed on Form P-1 and a request for the petty patent on Form MP-1. The data entered in the file is, for example: the applicant; the lawyer; the name of the invention in Serbian and English; the inventor
Confidentiality with Minors: The Need for Policy To Promote and Protect.
Stone, Carolyn; Isaacs, Madelyn L.
2003-01-01
Investigated school counselors' attitudes toward breaching confidentiality before and after the 1999 Columbine High School shootings. Surveys of demographically similar counselors indicated that the Columbine shootings affected counselors' predictions about their attitudes and behavior regarding confidentiality. Counselors were more reluctant to…
42 CFR 93.108 - Confidentiality.
2010-10-01
... 42 Public Health 1 2010-10-01 2010-10-01 false Confidentiality. 93.108 Section 93.108 Public Health PUBLIC HEALTH SERVICE, DEPARTMENT OF HEALTH AND HUMAN SERVICES HEALTH ASSESSMENTS AND HEALTH EFFECTS STUDIES OF HAZARDOUS SUBSTANCES RELEASES AND FACILITIES PUBLIC HEALTH SERVICE POLICIES ON RESEARCH...
40 CFR 710.58 - Confidentiality.
2010-07-01
...) Any person submitting information under this subpart may assert a business confidentiality claim for... with reporting under this subpart? How could a competitor use such information? Would the effects of... that your competitors do not know it is being manufactured or imported for a commercial purpose by...
Participants' safety versus confidentiality: A case study of HIV research.
Leyva-Moral, Juan Manuel; Feijoo-Cid, Maria
2017-05-01
Background When conducting qualitative research, participants usually share lots of personal and private information with the researcher. As researchers, we must preserve participants' identity and confidentiality of the data. Objective To critically analyze an ethical conflict encountered regarding confidentiality when doing qualitative research. Research design Case study. Findings and discussion one of the participants in a study aiming to explain the meaning of living with HIV verbalized his imminent intention to commit suicide because of stigma of other social problems arising from living with HIV. Given the life-threatening situation, the commitment related to not disclosing the participant's identity and/or the content of the interview had to be broken. To avoid or prevent suicide, the therapist in charge of the case was properly informed about the participant's intentions. One important question arises from this case: was it ethically appropriate to break the confidentiality commitment? Conclusion confidentiality could be broken if a life-threatening event is identified during data collection and participants must know that. This has to be clearly stated in the informed consent form.
Meaningful Use of a Confidential Adolescent Patient Portal.
Thompson, Lindsay A; Martinko, Thomas; Budd, Pamela; Mercado, Rebeccah; Schentrup, Anzeela M
2016-02-01
To design and evaluate the usage of an adolescent patient portal specifically adapted for adolescent health care needs that also satisfied institutional meaningful use guidelines regarding electronic health records. Key stakeholders at one academic health care center adopted an online portal and opted to designate a patient portal specifically for adolescents to maximize confidentiality in compliance with state privacy laws. This study analyzed aggregate electronic health record data of adolescents' (ages 12-17.9 years) uptake, usage, and functionality of this portal and compared it to parent portal usage for younger children (ages 0-11 years). Differences in means were calculated using paired t tests. The portal was used similarly between parents of young children and adolescents, with almost 1,000 enrollees in each group from September 1, 2012 to March 31, 2015. There were no gender differences in enrollment. Adolescents were less likely than parents of younger children to review appointments (73% vs. 85%), laboratory tests (67% vs. 79%), problem lists (40% vs. 78%), or allergies (45% vs. 77%, all p values adolescents sent 1,397 confidential messages. Institutional decisions for implementing meaningful use requirements can align with goals of adolescent health. Patient portals can enhance adolescent health care quality and adolescents readily use a confidential portal. Implementation of meaningful use requirements should be checked against adolescent health care needs to maximize confidentiality and promote health communication. Copyright © 2016 Society for Adolescent Health and Medicine. Published by Elsevier Inc. All rights reserved.
Safeguarding Confidentiality in Electronic Health Records.
Shenoy, Akhil; Appel, Jacob M
2017-04-01
Electronic health records (EHRs) offer significant advantages over paper charts, such as ease of portability, facilitated communication, and a decreased risk of medical errors; however, important ethical concerns related to patient confidentiality remain. Although legal protections have been implemented, in practice, EHRs may be still prone to breaches that threaten patient privacy. Potential safeguards are essential, and have been implemented especially in sensitive areas such as mental illness, substance abuse, and sexual health. Features of one institutional model are described that may illustrate the efforts to both ensure adequate transparency and ensure patient confidentiality. Trust and the therapeutic alliance are critical to the provider-patient relationship and quality healthcare services. All of the benefits of an EHR are only possible if patients retain confidence in the security and accuracy of their medical records.
31 CFR 129.5 - Confidentiality.
2010-07-01
... 31 Money and Finance: Treasury 1 2010-07-01 2010-07-01 false Confidentiality. 129.5 Section 129.5 Money and Finance: Treasury Regulations Relating to Money and Finance PORTFOLIO INVESTMENT SURVEY... contain data aggregated in such a way that neither the person supplying the information nor the investor...
40 CFR 710.38 - Confidentiality.
2010-07-01
... submitting information under this part may assert a business confidentiality claim for the information. The... with reporting under this part? How could a competitor use such information? Would the effects of... that your competitors do not know it is being manufactured or imported for a commercial purpose by...
DEFF Research Database (Denmark)
Jaruseviciene, Lina; Zaborskis, Apolinaras; Lazarus, Jeffrey Victor
2014-01-01
OBJECTIVE: An adolescent's right to confidential healthcare is protected by international law and professional consensus. However, parental and social support for confidential sexual and reproductive health (SRH) services, in particular, varies greatly. This study documents Lithuanian residents......' expectations with regard to confidentiality protection for adolescents in this domain, and explores the factors related to the diversity of these expectations. METHODS: Two national surveys of Lithuanian residents completed in 2005 and 2012 using anonymous questionnaires. Participants rated their expectations...... for confidentiality using a five-point Likert scale for eight types of SRH consultations. RESULTS: Public anticipation for confidentiality depended on whether issues related to sexual behaviour or to its consequences were addressed during adolescent consultation. Only younger respondents had higher expectations...
THE PRINCIPLE OF CONFIDENTIALITY IN ARBITRATION. APPLICATION AND LIMITATIONS OF THE PRINCIPLE
Directory of Open Access Journals (Sweden)
Bazil Oglindă
2015-11-01
Full Text Available Over the years, arbitration has grown to be the preferred means of dispute resolution by commercial entities. One of the benefits that build the attraction for this system of dispute resolution was the principle of confidentiality. One issue that needs to be analyzed is about the reasons why confidentiality is so important in business. Confidentiality is a principle largely embraced in arbitration, but, as we will see, the principle is not an absolute one. There are a set of questions that needs to be answer to, like: Who is bound by the duty of confidentiality? Does this refer only to the parties or does it expands to other actors involved in the arbitral proceedings? What happens with the obligation of confidentiality when issues are brought before a court, taking in account the principle of open justice? We will see that in some countries are procedural laws allowing the courts to order an arbitration claim to be heard in public or in private. Another important aspect that has arisen in the last period is regarding the public policy and the protection of public interest as a limitation to confidentiality of arbitration. This is a sensitive matter especially when one of the parties is a state or a state entity. This study aims to explore the principle of confidentiality in arbitration by focusing on its domain and on its limits, both from the comparative approach and from the Romanian approach. Knowing all this aspects, we will realize the importance of having professional counseling when drafting an arbitration clause and how this can be the missing puzzle piece of your business.
41 CFR 105-60.405 - Processing requests for confidential commercial information.
2010-07-01
... MATERIALS 60.4-Described Records § 105-60.405 Processing requests for confidential commercial information... 41 Public Contracts and Property Management 3 2010-07-01 2010-07-01 false Processing requests for confidential commercial information. 105-60.405 Section 105-60.405 Public Contracts and Property Management...
Hattingh, Hendrika Laetitia; Knox, Kathy; Fejzic, Jasmina; McConnell, Denise; Fowler, Jane L; Mey, Amary; Kelly, Fiona; Wheeler, Amanda J
2015-02-01
The study aims to explore within the community pharmacy practice context the views of mental health stakeholders on: (1) current and past experiences of privacy, confidentiality and support; and (2) expectations and needs in relation to privacy and confidentiality. In-depth interviews and focus groups were conducted in three states in Australia, namely Queensland, the northern region of New South Wales and Western Australia, between December 2011 and March 2012. There were 98 participants consisting of consumers and carers (n = 74), health professionals (n = 13) and representatives from consumer organisations (n = 11). Participants highlighted a need for improved staff awareness. Consumers indicated a desire to receive information in a way that respects their privacy and confidentiality, in an appropriate space. Areas identified that require improved protection of privacy and confidentiality during pharmacy interactions were the number of staff having access to sensitive information, workflow models causing information exposure and pharmacies' layout not facilitating private discussions. Challenges experienced by carers created feelings of isolation which could impact on care. This study explored mental health stakeholders' experiences and expectations regarding privacy and confidentiality in the Australian community pharmacy context. A need for better pharmacy staff training about the importance of privacy and confidentiality and strategies to enhance compliance with national pharmacy practice requirements was identified. Findings provided insight into privacy and confidentiality needs and will assist in the development of pharmacy staff training material to better support consumers with sensitive conditions. © 2014 Royal Pharmaceutical Society.
The erosion of psychiatrist-patient confidentiality by subpoenas.
Levy, John; Galambos, Gary; Skarbek, Yvonne
2014-08-01
We explore the reasons for the prolific use of subpoenas to gain access to psychiatric records in Australia. We examine the applicable legal principles and practices at the New South Wales (NSW) and Commonwealth levels, aiming to develop recommendations for Australian Governments to curb the inappropriate and harmful use of subpoenas. Unfettered legal access to psychiatric records is inconsistent with professional ethical guidelines and risks undermining the provision of quality psychiatric care to the community. The existing legal provisions are failing to protect psychiatrist-patient confidentiality. In NSW, the onus is placed on the psychiatrist and/or patient to make a complicated application to the court, to direct that a subpoena be set aside on the grounds of "Professional Confidential Relationship Privilege." An absence of Commonwealth legislation to protect psychiatrist-patient confidentiality is used by some litigants in family law proceedings to disadvantage patients by stigmatising them, because they have consulted psychiatrists. We recommend that uniform legislation be implemented, giving effect to a primary rule of privilege with exceptions. © The Royal Australian and New Zealand College of Psychiatrists 2014.
Improved Message Authentication and Confidentiality Checking
International Nuclear Information System (INIS)
Ismail Jabiullah, M.; Abdullah Al-Shamim, M.; Lutfar Rahman, M.
2005-01-01
The most confusing areas of the secured network communications are the message authentication and confidentiality checking. The attacks and the counter measures have become so convoluted that the users in this area begin to account for all contingencies. Two session-key generation techniques are used here to generate two separate session keys K 1 and K 2 ; and both the sender and the reveiver share these keys for higher degree of authentication and confidentiality. For this, the message is first encrypted by the key K 1 , and then the intermediary message authenticatin code (MAC) is generated by encrypting the encrypted message using the key K 2 . Then, the encrypted message and the intermediary MAC is again encrypted by using the K 2 and concatenated with the encrypted message and sent to the destination. At the receiving end, first, the received ciphertext is encrypted by using key K 2 and compared to the received MAC. The received ciphertext again is decrypted by the key K 2 and compared with the first decrypted MAC twice by the key K 2 . The plaintext is obtained by decrypting the received ciphertext first by K 2 and then by K 1 , using the corresponding decryption techniques respectively. The encryption techniques with key K 2 provides the authentication and with key K 1 provides the confidentiality checking of the transmitted message. The developed technique can be applied to both academic and commercial applications in online or offline electronic transactions for security.(authors)
Access control and confidentiality in radiology
Noumeir, Rita; Chafik, Adil
2005-04-01
A medical record contains a large amount of data about the patient such as height, weight and blood pressure. It also contains sensitive information such as fertility, abortion, psychiatric data, sexually transmitted diseases and diagnostic results. Access to this information must be carefully controlled. Information technology has greatly improved patient care. The recent extensive deployment of digital medical images made diagnostic images promptly available to healthcare decision makers, regardless of their geographic location. Medical images are digitally archived, transferred on telecommunication networks, and visualized on computer screens. However, with the widespread use of computing and communication technologies in healthcare, the issue of data security has become increasingly important. Most of the work until now has focused on the security of data communication to ensure its integrity, authentication, confidentiality and user accountability. The mechanisms that have been proposed to achieve the security of data communication are not specific to healthcare. Data integrity can be achieved with data signature. Data authentication can be achieved with certificate exchange. Data confidentiality can be achieved with encryption. User accountability can be achieved with audits. Although these mechanisms are essential to ensure data security during its transfer on the network, access control is needed in order to ensure data confidentiality and privacy within the information system application. In this paper, we present and discuss an access control mechanism that takes into account the notion of a care process. Radiology information is categorized and a model to enforce data privacy is proposed.
Secret Key Agreement: Fundamental Limits and Practical Challenges
Rezki, Zouheir
2017-02-15
Despite the tremendous progress made toward establishing PLS as a new paradigm to guarantee security of communication systems at the physical layerthere is a common belief among researchers and industrials that there are many practical challenges that prevent PLS from flourishing at the industrial scale. Most secure message transmission constructions available to date are tied to strong assumptions on CSI, consider simple channel models and undermine eavesdropping capabilities; thus compromising their practical interest to a big extent. Perhaps arguably, the most likely reasonable way to leverage PLS potential in securing modern wireless communication systems is via secret-key agreement. In the latter setting, the legitimate parties try to agree on a key exploiting availability of a public channel with high capacity which is also accessible to the eavesdropper. Once a key is shared by the legitimate parties, they may use it in a one-time pad encryption, for instance. In this article, we investigate two performance limits of secret-key agreement communications; namely, the secret-key diversity-multiplexing trade-off and the effect of transmit correlation on the secretkey capacity. We show via examples how secretkey agreement offers more flexibility than secure message transmissions. Finally, we explore a few challenges of secret-key agreement concept and propose a few guidelines to overturn them.
University Student Expectations of Confidentiality When Disclosing Information to Their Professors
Harris, Gregory E.; Dalton, Stephanie
2014-01-01
The purpose of this study was to explore university students' expectations of confidentiality when they make disclosures to their university professors. A secondary purpose was to consider if students have a higher expectation of confidentiality when talking with Psychology professors versus professors in other disciplines. Students were asked to…
18 CFR 270.506 - Confidentiality.
2010-04-01
... 18 Conservation of Power and Water Resources 1 2010-04-01 2010-04-01 false Confidentiality. 270.506 Section 270.506 Conservation of Power and Water Resources FEDERAL ENERGY REGULATORY COMMISSION...) through (9) of 5 U.S.C. 552(b). (b) Upon receipt of a request for disclosure of information treated as...
40 CFR 350.5 - Assertion of claims of trade secrecy.
2010-07-01
... deleted, and the generic class or category of the chemical identity or identities inserted in its place... place of the specific chemical identity claimed as trade secret, the generic class or category of the... the specific chemical identity of an extremely hazardous substance under sections 303 (d)(2) and (d)(3...
Beeson, Tishra; Mead, Katherine H; Wood, Susan; Goldberg, Debora Goetz; Shin, Peter; Rosenbaum, Sara
2016-03-01
The confidentiality of family planning services remains a high priority to adolescents, but barriers to implementing confidentiality and privacy practices exist in settings designed for teenagers who are medically underserved, including federally qualified health centers (FQHCs). A sample of 423 FQHCs surveyed in 2011 provided information on their use of five selected privacy and confidentiality practices, which were examined separately and combined into an index. Regression modeling was used to assess whether various state policies and organizational characteristics were associated with FQHCs' scores on the index. In-depth case studies of six FQHCs were conducted to provide additional contextual information. Among FQHCs reporting on confidentiality, most reported providing written or verbal information regarding adolescents' rights to confidential care (81%) and limiting access to family planning and medical records to protect adolescents' confidentiality (84%). Far fewer reported maintaining separate medical records for family planning (10%), using a security block on electronic medical records to prevent disclosures (43%) or using separate contact information for communications regarding family planning services (50%). Index scores were higher among FQHCs that received Title X funding than among those that did not (coefficient, 0.70) and among FQHCs with the largest patient volumes than among those with the smallest caseloads (0.43). Case studies highlighted how a lack of guidelines and providers' confusion over relevant laws present a challenge in offering confidential care to adolescents. The organizational practices used to ensure adolescent family planning confidentiality in FQHCs are varied across organizations. Copyright © 2016 by the Guttmacher Institute.
7 CFR 900.309 - Confidential information.
2010-01-01
... Conduct of Referenda To Determine Producer Approval of Milk Marketing Orders To Be Made Effective Pursuant to Agricultural Marketing Agreement Act of 1937, as Amended § 900.309 Confidential information. The... Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (Marketing...
7 CFR 1216.62 - Confidential treatment.
2010-01-01
... this subpart or statistical data collected therefrom, which statements do not identify the information... 7 Agriculture 10 2010-01-01 2010-01-01 false Confidential treatment. 1216.62 Section 1216.62 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (MARKETING...
7 CFR 1209.62 - Confidential treatment.
2010-01-01
... this subpart or statistical data collected therefrom, which statements do not identify the information... 7 Agriculture 10 2010-01-01 2010-01-01 false Confidential treatment. 1209.62 Section 1209.62 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (MARKETING...
7 CFR 929.65 - Confidential information.
2010-01-01
... 7 Agriculture 8 2010-01-01 2010-01-01 false Confidential information. 929.65 Section 929.65 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (Marketing... position, financial condition, or business operations of the particular handler from whom received, shall...
7 CFR 1150.173 - Confidential treatment.
2010-01-01
... reports of the number of persons subject to this subpart or statistical data collected therefrom, which... 7 Agriculture 9 2010-01-01 2009-01-01 true Confidential treatment. 1150.173 Section 1150.173 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (Marketing...
7 CFR 1221.127 - Confidential treatment.
2010-01-01
... statistical data collected there from, which statements do not identify the information furnished by any... 7 Agriculture 10 2010-01-01 2010-01-01 false Confidential treatment. 1221.127 Section 1221.127 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (MARKETING...
7 CFR 1160.403 - Confidential treatment.
2010-01-01
... statistical data collected from such sources, which statements do not identify the information furnished by... 7 Agriculture 9 2010-01-01 2009-01-01 true Confidential treatment. 1160.403 Section 1160.403 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (Marketing...
7 CFR 1250.354 - Confidential treatment.
2010-01-01
... subject to this subpart or statistical data collected therefrom, which statements do not identify the... 7 Agriculture 10 2010-01-01 2010-01-01 false Confidential treatment. 1250.354 Section 1250.354 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (MARKETING...
7 CFR 1260.203 - Confidential treatment.
2010-01-01
... of persons subject to this subpart or statistical data collected therefrom, which statements do not... 7 Agriculture 10 2010-01-01 2010-01-01 false Confidential treatment. 1260.203 Section 1260.203 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (MARKETING...
7 CFR 1218.62 - Confidential treatment.
2010-01-01
... of the number of persons subject to this subpart or statistical data collected therefrom, which... 7 Agriculture 10 2010-01-01 2010-01-01 false Confidential treatment. 1218.62 Section 1218.62 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (MARKETING...
7 CFR 1215.62 - Confidential treatment.
2010-01-01
... persons subject to this part or statistical data collected therefrom, which statements do not identify the... 7 Agriculture 10 2010-01-01 2010-01-01 false Confidential treatment. 1215.62 Section 1215.62 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (MARKETING...
7 CFR 1210.607 - Confidential information.
2010-01-01
... 7 Agriculture 10 2010-01-01 2010-01-01 false Confidential information. 1210.607 Section 1210.607 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (MARKETING... contents and all other information or reports furnished to, compiled by, or in possession of, the...
7 CFR 1210.352 - Confidential treatment.
2010-01-01
... 7 Agriculture 10 2010-01-01 2010-01-01 false Confidential treatment. 1210.352 Section 1210.352 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (MARKETING... treatment. (a) All information obtained from the books, records, or reports required to be maintained under...
48 CFR 1552.235-76 - Treatment of Confidential Business Information (APR 1996).
2010-10-01
... Business Information (APR 1996). 1552.235-76 Section 1552.235-76 Federal Acquisition Regulations System... Provisions and Clauses 1552.235-76 Treatment of Confidential Business Information (APR 1996). As prescribed in 1535.007-70(c), insert the following clause: Treatment of Confidential Business Information (TSCA...
48 CFR 1552.235-70 - Screening business information for claims of confidentiality.
2010-10-01
... 48 Federal Acquisition Regulations System 6 2010-10-01 2010-10-01 true Screening business... Texts of Provisions and Clauses 1552.235-70 Screening business information for claims of confidentiality... proprietary or confidential by the business that has the right to the information. The following clause...
7 CFR 1212.72 - Confidential treatment.
2010-01-01
... statements based upon the reports of the number of persons subject to this subpart or statistical data... 7 Agriculture 10 2010-01-01 2010-01-01 false Confidential treatment. 1212.72 Section 1212.72 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (MARKETING...
7 CFR 1206.62 - Confidential treatment.
2010-01-01
... statements based upon the reports of the number of persons subject to this subpart or statistical data... 7 Agriculture 10 2010-01-01 2010-01-01 false Confidential treatment. 1206.62 Section 1206.62 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (MARKETING...
7 CFR 1219.63 - Confidential treatment.
2010-01-01
... upon the reports of the number of persons subject to this subpart or statistical data collected from... 7 Agriculture 10 2010-01-01 2010-01-01 false Confidential treatment. 1219.63 Section 1219.63 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (MARKETING...
7 CFR 983.65 - Confidential information.
2010-01-01
... 7 Agriculture 8 2010-01-01 2010-01-01 false Confidential information. 983.65 Section 983.65 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (Marketing... the particular handler or their customers shall be received by, and at all times kept in the custody...
7 CFR 996.72 - Confidential information.
2010-01-01
... 7 Agriculture 8 2010-01-01 2010-01-01 false Confidential information. 996.72 Section 996.72 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (Marketing... condition, or business operations of the particular handlers or their customers shall be received by, and at...
Confidential Declaration of Family Situation (CDFS)
Human Resources Department
2005-01-01
The Confidential Declaration of Family Situation (CDFS) becomes a new computerized EDH form from October 2005 In accordance with Article R IV 1.17 of the Staff Regulations, Staff Members and Fellows, married or separated, must notify any changes in their spouse's income or health insurance cover in writing to CERN, within 30 calendar days of the change. This is necessary for the Organization to determine if a supplementary contribution is payable to the CERN Health Insurance Scheme (CHIS) for the spouse's coverage and, if so, the amount. Until now a paper form called « Confidential Declaration of Family Situation » (CDFS) was used for that purpose. From early October 2005 the CDFS will be computerized for the whole Organization. Henceforth, any changes in a spouse's income or health insurance cover must be notified using EDH (Electronic Document Handling). Additionally, annual updates of the declaration will be required and will be requested by automatic e-mail. Early October an email will be sent to...
2010-10-01
... Insecticide, Fungicide, and Rodenticide Act Confidential Business Information (APR 1996). 1552.235-73 Section... Insecticide, Fungicide, and Rodenticide Act Confidential Business Information (APR 1996). As prescribed in... Act Confidential Business Information (APR 1996) In order to perform duties under the contract, the...
Audit, Accountability and Confidential Enquiries into Maternal ...
African Journals Online (AJOL)
HP
Time for Action: Audit, Accountability and Confidential Enquiries ... provision of quality maternity services. Having such a ... services are more likely to be sustained if women can find ..... Donabedian A. An introduction to quality assurance in.
2012-10-16
... Greenhouse Gas Reporting Program: Proposed Amendments and Confidentiality Determinations for Subpart I...-AR61 Greenhouse Gas Reporting Program: Proposed Amendments and Confidentiality Determinations for... Manufacturing, of the Greenhouse Gas Reporting Rule. Proposed changes include revising certain calculation...
Elger, Bernice Simone; Handtke, Violet; Wangmo, Tenzin
2015-06-01
This manuscript presents mental health practitioners' (MHPs) practice, attitudes and justifications for breaching confidentiality when imprisoned patients disclose suicidal thoughts or abuse by others. 24 MHPs working in Swiss prisons shared their experiences regarding confidentiality practices. The data were analysed qualitatively and MHPs' attitudes and course of action were identified. Analysis revealed paternalistic breaches of confidentiality. When patients reported suicidal thoughts and abuse, MHPs believed that forgoing confidentiality is necessary to protect patients, providing several justifications for it. Patients were informed that such information will be transmitted without their consent to medical and non-medical prison personnel. With reference to suicidal attempts, MHPs resorted to methods that may reduce suicidal attempts such as transfer to hospital or internal changes in living arrangements, which would require provision of certain information to prison guards. In cases of abuse, some MHPs convinced patients to accept intervention or sometimes overrode competent patients' refusals to report. Also in the case of abuse, provision of limited information to other prison personnel was seen as an acceptable method to protect patients from further harm. Breaches of confidentiality, whether limited or full, remain unethical, when used for competent patients based solely on paternalistic justifications. Institutionalising ethical and legal procedures to address suicidal and abuse situations would be helpful. Education and training to help both medical and prison personnel to respond to such situations in an appropriate manner that ensures confidentiality and protects patients from suicide and abuse are necessary. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://group.bmj.com/group/rights-licensing/permissions.
2010-10-01
... Control Act Confidential Business Information (APR 1996). 1552.235-75 Section 1552.235-75 Federal... Confidential Business Information (APR 1996). As prescribed in 1535.007(b), insert the following provision: Access to Toxic Substances Control Act Confidential Business Information (APR 1996) In order to perform...
30 CFR 210.40 - Will MMS keep the information I provide confidential?
2010-07-01
... 30 Mineral Resources 2 2010-07-01 2010-07-01 false Will MMS keep the information I provide... MINERALS REVENUE MANAGEMENT FORMS AND REPORTS General Provisions § 210.40 Will MMS keep the information I provide confidential? The MMS will treat information obtained under this part as confidential to the...
Gravity Models of Trade-Based Money Laundering
Ferwerda, Joras; Kattenberg, Marc; Chang, Han-Hsin; Unger, Brigitte; Groot, Loek; Bikker, Jaap
2011-01-01
Several attempts have been made in the economics literature to measure money laundering. However, the adequacy of these models is difficult to assess, as money laundering takes place secretly and, hence, goes unobserved. An exception is tradebased money laundering (TBML), a special form of trade abuse that has been discovered only recently. TBML refers to criminal proceeds that are transferred around the world using fake invoices that under- or overvalue imports and exports. This article is a...
Nuclear exports. Parliamentary control and confidentiality
International Nuclear Information System (INIS)
Feldmann, Ulrike
2015-01-01
With its decision taken on 21. October 2014 (Az.: 2 BvE 5/11) the Federal Constitutional Court (BVerfG) decided during court proceedings between administrative bodies on the scope and limits of the parliamentary right of information. Even though the proceeding did not deal with nuclear exports but arm exports, foreign trade law, however, does not only designate an export licence obligation for military weapons but also for so called dual-use goods meaning goods, which can be used both for friendly as well as for military purposes. The export of these goods requires according to the so-called Dual-Use Regulation (EG) 428/2009 a licence. Annex I category 0 of the regulation (EG) 428/2009 lists a variety of nuclear materials, plants and equipment items for which this licence applies. In the same manner as arm exports, also exports of nuclear dual-use goods are being discussed in a special cabinet committee, the Federal Security Council (BSR), which shall coordinate cross-departmentally the German security and defence policy under consideration of economic interests and which categorises its results, according to the rules of procedure, as confidential. Also legally not regulated but common ''preliminary enquiries'' at the responsible Federal Ministry or rather Federal Office of Economics and Export Control by companies which plan an export and want to affirm the general approval for their export business prior to conclusion of contract take not only place for arm exports but also for nuclear dual-use goods. The decision by the Federal Constitutional Court can be applied to consultations about the authorisation of nuclear dual-use goods.
Confidential data in a competitive utility environment: A regulatory perspective
Energy Technology Data Exchange (ETDEWEB)
Vine, E.
1996-08-01
Historically, the electric utility industry has been regarded as one of the most open industries in the United States in sharing information but their reputation is being challenged by competitive energy providers, the general public, regulators, and other stakeholders. As the prospect of competition among electricity power providers has increased in recent years, many utilities have been requesting that the data they submit to their utility regulatory commissions remain confidential. Withholding utility information from the public is likely to have serious and significant policy implications with respect to: (1) consumer education, the pursuit of truth, mutual respect among parties, and social cooperation; (2) the creation of a fair market for competitive energy services; (3) the regulatory balance; (4) regional and national assessments of energy-savings opportunities; (5) research and development; and (6) evaluations of utility programs, plans, and policies. In a telephone survey of all public utility commissions (PUCs) that regulate electric and gas utilities in the U.S., we found that almost all PUCs have received requests from utility companies for data to be filed as confidential, and confidential data filings appear to have increased (both in scope and in frequency) in those states where utility restructuring is being actively discussed. The most common types of data submitted as confidential by utilities dealt with specific customer data, market data, avoided costs, and utility costs.
Security without obscurity a guide to confidentiality, authentication, and integrity
Stapleton, JJ
2014-01-01
The traditional view of information security includes the three cornerstones: confidentiality, integrity, and availability; however the author asserts authentication is the third keystone. As the field continues to grow in complexity, novices and professionals need a reliable reference that clearly outlines the essentials. Security without Obscurity: A Guide to Confidentiality, Authentication, and Integrity fills this need. Rather than focusing on compliance or policies and procedures, this book takes a top-down approach. It shares the author's knowledge, insights, and observations about infor
DEFF Research Database (Denmark)
Jaruseviciene, Lina; Lazarus, Jeff; Zaborskis, Apolinaras
2011-01-01
To assess the attitudes of Lithuanian residents towards the protection of confidentiality in the sexual and reproductive health care of adolescents.......To assess the attitudes of Lithuanian residents towards the protection of confidentiality in the sexual and reproductive health care of adolescents....
17 CFR 200.83 - Confidential treatment procedures under the Freedom of Information Act.
2010-04-01
... SECURITIES AND EXCHANGE COMMISSION ORGANIZATION; CONDUCT AND ETHICS; AND INFORMATION AND REQUESTS Information... first received by the Commission (i) it is supplied segregated from information for which confidential..., 100 F Street, NE., Washington, DC 20549. The person requesting confidential treatment may supply...
Confidentiality, anonymity and amnesty for midwives in distress seeking online support - Ethical?
Pezaro, Sally; Clyne, Wendy; Gerada, Clare
2018-06-01
Midwife health is intrinsically linked to the quality of safe patient care. To ensure safe patient care, there is a need to deliver emotional support to midwives. One option that midwives may turn to may be a confidential online intervention, instead of localised, face-to-face support. Following the Realist And MEta-narrative Evidence Syntheses: Evolving Standards publication standards, this realist synthesis approach explores the ethical considerations in permitting confidentiality, anonymity and amnesty in online interventions to support midwives in work-related psychological distress. An iterative search methodology was used to select nine papers for review. To assimilate information, papers were examined for ideas relating to ethical dimensions of online interventions to support midwives in work-related psychological distress. This review takes a narrative approach. Online interventions can support the development of insight, help seeking and open discussion. Additionally, Internet support groups can become morally persuasive in nature. Anonymity and confidentiality are both effective and therapeutic features of online interventions when used in collaboration with effective online moderation. Yet, ethical dilemmas remain where users cannot be identified. Confidentiality and anonymity remain key components of successful online interventions. However, sanctioning the corollary component of amnesty may provoke moral discomfort for those seeking immediate accountability. For others, amnesty is seen as essential for open disclosure and help seeking. Ultimately, the needs of midwives must be balanced with the requirement to protect the public and the professional reputation of midwifery. In supporting midwives online, the principles of anonymity, confidentiality and amnesty may evoke some resistance on ethical grounds. However, without offering identity protection, it may not be possible to create effective online support services for midwives. The authors of this
Alahmad, Ghiath; Hifnawy, Tamer; Abbasi, Badaruddin; Dierickx, Kris
2016-03-01
Achieving a balance between giving access to information and respecting donors' confidentiality is a crucial issue for any biobank, with its large number of samples and associated information. Despite the existence of much empirical literature on confidentiality, there are too few surveys in the Middle East about the topic, particularly in the Saudi context. A survey was conducted of 200 respondents at King Abdulaziz Medical City in Riyadh, Saudi Arabia, among 5 groups of equal size, comprised of researchers, physicians, medical students, donors and laypersons, respectively. The majority of participants agreed that confidentiality is an important issue and that it is well protected in the Saudi biobank. All 5 groups showed different attitudes toward disclosing information to various third parties. They were in favor of allowing treating physicians, and to a certain extent family members, to have access to medical and genetic results from research. No significant differences were found between views on medical and genetic confidentiality. The majority of respondents agreed that confidentiality might be breached in cases with specific justified reasons. Even considering differences in religion, culture and other factors, the results of the study were consistent with those reported in the literature and research conducted in other countries. We therefore place emphasis on the importance of protecting and promoting patient/donor confidentiality and privacy. Copyright © 2016. Published by Elsevier Ireland Ltd.
Directory of Open Access Journals (Sweden)
E. V. Belokurova
2015-01-01
Full Text Available The article discusses the different approaches to assessing the safety of confidential information-term for information and telecommunication systems of various pre-appreciable destination in the presence of internal and external threats to its integrity and availability. The difficulty of ensuring the security of confidential information from exposure to information and telecommunication systems of external and internal threats at the present time, is of particular relevance. This problem is confirmed by the analysis of available statistical information on the impact of threats on the security circulating in the information and telecommunications system. Leak confidential information, intellectual property, information, know-how is the result of significant material and moral damage caused to the owner of the restricted information. The paper presents the structure of the indicators and criteria shows that the most promising are analytical criteria. However, their use to assess the level of security of confidential information is difficult due to the lack of appropriate mathematical models. The complexity of the problem is that existing traditional mathematical models are not always appropriate for the stated objectives. Therefore, it is necessary to develop mathematical models designed to assess the security of confidential information and its impact on information and telecommunication system threats.
Novel approach to information security management of confidential ...
African Journals Online (AJOL)
Novel approach to information security management of confidential and propriety information ... Journal of Fundamental and Applied Sciences ... valuable information by using steganography it can have a major impact security management.
Analysis of the ethical aspects of professional confidentiality in dental practice
Directory of Open Access Journals (Sweden)
Cléa Adas Saliba Garbin
2008-02-01
Full Text Available From the point of view of deontological ethics, privacy is a moral right that patients are entitled to and it is bound to professional confidentiality. Otherwise, the information given by patients to health professionals would not be reliable and a trustable relationship could not be established. The aim of the present study was to assess, by means of questionnaires with open and closed questions, the awareness and attitudes of 100 dentists working in the city of Andradina, São Paulo State, Brazil, with respect to professional confidentiality in dental practice. Most dentists (91.43% reported to have instructed their assistants on professional confidentiality. However, 44.29% of the interviewees showed to act contradictorily as reported talking about the clinical cases of their patients to their friends or spouses. The great majority of professionals (98.57% believed that it is important to have classes on Ethics and Bioethics during graduation and, when asked about their knowledge of the penalties imposed for breach of professional confidentiality, only 48.57% of them declared to be aware of it. Only 28.57% of the interviewees affirmed to have exclusive access to the files; 67.14% reported that that files were also accessed by their secretary; 1.43% answered that their spouses also had access, and 2.86% did not answer. From the results of the present survey, it could be observed that, although dentists affirmed to be aware of professional confidentiality, their attitudes did not adhere to ethical and legal requirements. This stand of health professionals has contributed to violate professional ethics and the law itself, bringing problems both to the professional and to the patient.
Analysis of the ethical aspects of professional confidentiality in dental practice.
Garbin, Cléa Adas Saliba; Garbin, Artênio José Isper; Saliba, Nemre Adas; de Lima, Daniela Coelho; de Macedo, Ana Paula Ayala
2008-01-01
From the point of view of deontological ethics, privacy is a moral right that patients are entitled to and it is bound to professional confidentiality. Otherwise, the information given by patients to health professionals would not be reliable and a trustable relationship could not be established. The aim of the present study was to assess, by means of questionnaires with open and closed questions, the awareness and attitudes of 100 dentists working in the city of Andradina, São Paulo State, Brazil, with respect to professional confidentiality in dental practice. Most dentists (91.43%) reported to have instructed their assistants on professional confidentiality. However, 44.29% of the interviewees showed to act contradictorily as reported talking about the clinical cases of their patients to their friends or spouses. The great majority of professionals (98.57%) believed that it is important to have classes on Ethics and Bioethics during graduation and, when asked about their knowledge of the penalties imposed for breach of professional confidentiality, only 48.57% of them declared to be aware of it. Only 28.57% of the interviewees affirmed to have exclusive access to the files; 67.14% reported that that files were also accessed by their secretary; 1.43% answered that their spouses also had access, and 2.86% did not answer. From the results of the present survey, it could be observed that, although dentists affirmed to be aware of professional confidentiality, their attitudes did not adhere to ethical and legal requirements. This stand of health professionals has contributed to violate professional ethics and the law itself, bringing problems both to the professional and to the patient.
Directory of Open Access Journals (Sweden)
林志潔 Carol Chih-Chieh Lin
2016-06-01
Full Text Available 科技、經濟、國家安全,看似不相關的三個名詞,因營業秘密的存在而牢牢相扣。美國自1996 年起以聯邦層級的經濟間諜法來保護營業秘密,對於侵害營業秘密者課予刑事責任,並明確區分竊取營業秘密行為及經濟間諜行為,以嚇阻企業競爭對手竊取營業秘密,防止國家經濟、安全受到危害。然而,美國聯邦經濟間諜法施行至今已十九年,關於經濟間諜罪的案件,經法院判決確定有罪者卻為數不多,本文擬分析經濟間諜法實務上施行之困境,並提出改革建議。又,我國營業秘密法於2013 年增訂刑事規範第13 條之1至第13 條之4,主要參考自經濟間諜法,為分析比較,本文亦將一併檢討我國營業秘密法刑罰化後之問題。 “Technology, economic and national security,” these three words seem to be irrelevant on the surface; however, they are tightly bounded by the existence of the word—trade secret. The federal government of the U.S. passed the Economic Espionage Act in 1996 in an attempt to create a “comprehensive and systematic” approach to address trade secrecy misappropriation, drawing a clear line between economic espionage and theft of trade secrets through federal criminal justice system. It is established to prevent trade rivals from stealing other business’s most precious property—trade secret, and to protect the national economy, security from any harm. While the Economic Espionage Act has been implemented for 19 years, there are only few cases brought in a verdict of guilty, which seemingly contradicts to the legislative purposes. Therefore, this article aims to analyze the predicamentof the Act, and to give constructive propositions. Furthermore, the Trade Secret Act in Taiwan was revised in 2013. It mainly referred to the Economic Espionage, adding article 13-1 to 13-4. In order to compare and assay, this article will also probe into
38 CFR 1.462 - Confidentiality restrictions.
2010-07-01
... Sickle Cell Anemia § 1.462 Confidentiality restrictions. (a) General. The patient records to which §§ 1..., infection with the HIV, or sickle cell anemia may be acknowledged only if the patient's written consent is... with the HIV, or sickle cell anemia. (2) Any answer to a request for a disclosure of patient records...
42 CFR 2.1 - Statutory authority for confidentiality of drug abuse patient records.
2010-10-01
... HUMAN SERVICES GENERAL PROVISIONS CONFIDENTIALITY OF ALCOHOL AND DRUG ABUSE PATIENT RECORDS Introduction § 2.1 Statutory authority for confidentiality of drug abuse patient records. The restrictions of these regulations upon the disclosure and use of drug abuse patient records were initially authorized by section 408...
Jenkins, Peter
2010-01-01
Confidentiality presents particular challenges to practitioners working with young people, on account of the latter's vulnerability and emotional immaturity. Ethical codes place a key importance on confidentiality, from deontological and teleological perspectives. However, young clients may rely on a more pragmatic approach in deciding whether to…
Ombuds’ corner: Open door and confidentiality
Vincent Vuillemin
2013-01-01
For the Open Days, CERN will be transparent for all visitors. It's also the occasion to remember that the Ombuds' door is fully open every day of the year for all persons working for or on behalf of CERN. The door is open, but as soon as it's closed for a discussion, the office becomes a place where total confidentiality is preserved. This may appear as a contradiction, no? The Ombuds is available to help everyone in all circumstances, but his clause of confidentiality prevents him from acting without the consent of his “visitors”. How can he possibly resolve the in-house conflicts in groups, or units, if all the parties do not voluntarily participate in its resolution? The answer is clear: the job of the Ombuds is to help the parties resolve their conflict by themselves. He will provide a few rules of communication, a process of mutual respect, suggest some possibilities that the parties may want to follow, and mediate the dispute so that people...
Confidential Declaration of Family Situation (CDFS)
Human Resources Department
2005-01-01
The Confidential Declaration of Family Situation (CDFS) becomes a new computerized EDH form from October 2005 In accordance with Article R IV 1.17 of the Staff Regulations, Staff Members and Fellows, married or separated, must notify any changes in their spouse's income or health insurance cover in writing to CERN, within 30 calendar days of the change. This is necessary for the Organization to determine if a supplementary contribution is payable to the CERN Health Insurance Scheme (CHIS) for the spouse's coverage and, if so, the amount. Until now a paper form called « Confidential Declaration of Family Situation » (CDFS) was used for that purpose. From early October 2005 the CDFS will be computerized for the whole Organization. Henceforth, any changes in a spouse's income or health insurance cover must be notified using EDH (Electronic Document Handling). Additionally, annual updates of the declaration will be required and will be requested by automatic e-mail. Early October an email will be...
Confidentiality, 'no blame culture' and whistleblowing, non-physician practice and accountability.
White, Stuart M
2006-12-01
Confidentiality is a core tenet of medical professionalism, which enables the maintenance of trust in a doctor-patient relationship. However, both the amount of personal data stored and the number of third parties who might access this data have increased dramatically in the digital age, necessitating the introduction of various national data protection acts. Paradoxically, the Freedom of Information Act 2000 allows United Kingdom citizens to access information held by public bodies, including hospitals. Furthermore, the Public Interest Disclosure Act 1998 actively protects physicians who breach their duty of confidentiality in the name of public interest ('whistleblowing'). This article explores the evolution of the law and ethics in this area, and draws attention to the difficulties in balancing confidentiality against freedom of information. In addition, the role and responsibilities of the non-physician anaesthetist are examined.
Confidentiality and parental involvement in adolescent sexual and reproductive health care
DEFF Research Database (Denmark)
Jaruseviciene, Lina; Lazarus, Jeff; Zaborskis, Apolinaras
2011-01-01
AIM: We surveyed Lithuanian general practitioners' (GPs) views on the importance of confidentiality for adolescents and on their practices in informing parents about sexual and reproductive health consultations with this age group. METHODS: In this cross-sectional study, a 41-item questionnaire...... was sent to a random sample of 607 Lithuanian GPs. The purpose of this questionnaire was to gain knowledge about current practices of GPs in informing parents on the importance of confidentiality as well as in protecting the privacy of minors. GPs' knowledge of the current legal age limit...... consulting on general sexual issues, more than 70% stated that they would guarantee their minor patients confidentiality. However, when cases involved sexually transmitted infections or pregnancy, nearly the same percentage said they would inform the parents. 62.3% of GPs incorrectly believed that the law...
2012-01-10
... Fluorinated Gas Production....... 325120 Industrial gases manufacturing facilities. Electrical Equipment Use... Proposed Confidentiality Determinations for Data Elements Under the Mandatory Reporting of Greenhouse Gases...-proposes confidentiality determinations for the data elements under the Mandatory Greenhouse Gas Reporting...
7 CFR 983.9 - Confidential data or information.
2010-01-01
... 7 Agriculture 8 2010-01-01 2010-01-01 false Confidential data or information. 983.9 Section 983.9 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (Marketing... customers. ...
Secret Forwarding of Events over Distributed Publish/Subscribe Overlay Network.
Yoon, Young; Kim, Beom Heyn
2016-01-01
Publish/subscribe is a communication paradigm where loosely-coupled clients communicate in an asynchronous fashion. Publish/subscribe supports the flexible development of large-scale, event-driven and ubiquitous systems. Publish/subscribe is prevalent in a number of application domains such as social networking, distributed business processes and real-time mission-critical systems. Many publish/subscribe applications are sensitive to message loss and violation of privacy. To overcome such issues, we propose a novel method of using secret sharing and replication techniques. This is to reliably and confidentially deliver decryption keys along with encrypted publications even under the presence of several Byzantine brokers across publish/subscribe overlay networks. We also propose a framework for dynamically and strategically allocating broker replicas based on flexibly definable criteria for reliability and performance. Moreover, a thorough evaluation is done through a case study on social networks using the real trace of interactions among Facebook users.
18 CFR 706.410 - Confidentiality of statements.
2010-04-01
... use of information on the statements shall be limited to that necessary to carry out the purposes of... EMPLOYEE RESPONSIBILITIES AND CONDUCT Statements of Employment and Financial Interests § 706.410 Confidentiality of statements. Each statement of employment and financial interests, and each supplementary...
Zerber: r-Confidential Indexing for Distributed Documents
Zerr, Sergej; Demidova, Elena; Olmedilla, Daniel; Nejdl, Wolfgang; Winslett, Marianne; Mitra, Soumyadeb
2008-01-01
Zerr, S., Demidova, E., Olmedilla, D., Nejdl, W., Winslett, M., & Mitra, S. (2008). Zerber: r-Confidential Indexing for Distributed Documents. In J. Teubner (Eds.), Proceedings of the 11th International Conference on Extending Database Technology (pp. 287-298). March, 25-29, 2008, Nantes, France.
ML Confidential : machine learning on encrypted data
Graepel, T.; Lauter, K.; Naehrig, M.
2012-01-01
We demonstrate that by using a recently proposed somewhat homomorphic encryption (SHE) scheme it is possible to delegate the execution of a machine learning (ML) algorithm to a compute service while retaining confidentiality of the training and test data. Since the computational complexity of the
Ethics in health care: confidentiality and information technologies
African Journals Online (AJOL)
information could result in confidential patient data falling ... Before the advent of the new communication and information technologies (NCITs), patient care was sometimes delayed .... computer system intended to be used and the security.
2013-03-14
... Collection: Confidentiality and Disclosure of State Unemployment Compensation Information Final Rule and... about the regulatory requirements of the Confidentiality and Disclosure of State Unemployment... Administration, Office of Unemployment Insurance, 200 Constitution Avenue NW., Room S4524, Washington, DC 20210...
2012-08-13
... Final Confidentiality Determinations for Regulations Under the Mandatory Reporting of Greenhouse Gases... confidentiality determinations for certain data elements in regulations under the Mandatory Greenhouse Gas... Greenhouse Gas Reporting Program Web site at http://www.epa.gov/climatechange/emissions/ghgrulemaking.html...
Confidentiality of Accounting Academics: Consequences of Nonconformity
Amponsah, Emmanuel B.; Boateng, Peter Agyekum; Onuoha, Luke N.
2016-01-01
This paper examined ways by which nonconformity to confidentiality among accounting academics could lead to increased-recruitment-and-legal-costs to their employing universities in Ghana that offered accounting degree programmes. With a cross-sectional design, data collected from 1,225 accountants analysed via Cronbach's alpha,…
2010-01-01
... 16 Commercial Practices 1 2010-01-01 2010-01-01 false Confidentiality, security, and integrity of... COMMISSION REGULATIONS UNDER SPECIFIC ACTS OF CONGRESS CHILDREN'S ONLINE PRIVACY PROTECTION RULE § 312.8 Confidentiality, security, and integrity of personal information collected from children. The operator must...
Directory of Open Access Journals (Sweden)
I Gusti Ngurah Parikesit
2016-04-01
Full Text Available Peran mediasi sebagai penyelesaian sengketa alternatif untuk sengketa perdata yang semakin populer digunakan pada praktiknya belum berjalan maksimal. Salah satu penyebabnya adalah kekaburan pengaturan prinsip kerahasiaan confidential principle bagi komunikasi yang terjadi pada proses mediasi. Aturan hukum di Indonesia hanya menjelaskan bahwa mediasi dilangsungkan berdasarkan pada asas tertutup dan mediator berkewajiban menjaga kerahasiaan, baik dalam bentuk perkataan maupun catatan, yang terungkap pada mediasi. Sebagai perbandingan, aturan hukum di Amerika Serikat sudah diatur bahwa segala bentuk komunikasi yang terjadi dan berhubungan dengan pelaksanaan mediasi tunduk pada confidential principle, sehingga proses komunikasi mendapatkan hak istimewa (privilege dengan tidak dapat dijadikan barang bukti dan seluruh pihak yang terlibat dalam mediasi tidak dapat dijadikan saksi pada persidangan berikutnya. Dengan demikian, dibutuhkan rekonstruksi pengaturan terkait ruang lingkup komunikasi pada proses mediasi yang terkualifikasi sebagai confidential principle pengaturan terkait pelepasan hak istimewa komunikasi dari confidential principle; dan pengaturan terkait pengecualian terhadap komunikasi yang terkualifikasi sebagai confidential principle Abstract Although being popular, the role of mediation in resolving civil disputes is yet to be maximalized. One of the reasons is the the vague regulation concerning the confidential principle for communication in mediation. The existing regulation in Indonesia only explains that mediation is undertaken based on closed principle and the mediator is obliged to maintain confidentiality the confidentiality of any communication, either in oral or written forms, revealed during mediation. Whereas in comparison, the regulation in the United States of America stipulates that all forms of communications occured during mediation or is made for purposes of conducting or participating in mediation are subjects to the
30 CFR 291.111 - How does MMS treat the confidential information I provide?
2010-07-01
... 30 Mineral Resources 2 2010-07-01 2010-07-01 false How does MMS treat the confidential information... SHELF LANDS ACT § 291.111 How does MMS treat the confidential information I provide? (a) Any person who provides documents under this part in response to a request by MMS to inform a decision on whether open...
Permit trading and credit trading
DEFF Research Database (Denmark)
Boom, Jan-Tjeerd; R. Dijstra, Bouwe
This paper compares emissions trading based on a cap on total emissions (permit trading) and on relative standards per unit of output (credit trading). Two types of market structure are considered: perfect competition and Cournot oligopoly. We find that output, abatement costs and the number...... of firms are higher under credit trading. Allowing trade between permit-trading and credit-trading sectors may increase in welfare. With perfect competition, permit trading always leads to higher welfare than credit trading. With imperfect competition, credit trading may outperform permit trading....... Environmental policy can lead to exit, but also to entry of firms. Entry and exit have a profound impact on the performance of the schemes, especially under imperfect competition. We find that it may be impossible to implement certain levels of total industry emissions. Under credit trading several levels...
Directory of Open Access Journals (Sweden)
Chalee Vorakulpipat
2017-01-01
Full Text Available Today, many organizations allow their employees to bring their own smartphones or tablets to work and to access the corporate network, which is known as a bring your own device (BYOD. However, many such companies overlook potential security risks concerning privacy and confidentiality. This paper provides a review of existing literature concerning the preservation of privacy and confidentiality, with a focus on recent trends in the use of BYOD. This review spans a large spectrum of information security research, ranging from management (risk and policy to technical aspects of privacy and confidentiality in BYOD. Furthermore, this study proposes a policy-based framework for preserving data confidentiality in BYOD. This framework considers a number of aspects of information security and corresponding techniques, such as policy, location privacy, centralized control, cryptography, and operating system level security, which have been omitted in previous studies. The main contribution is to investigate recent trends concerning the preservation of confidentiality in BYOD from the perspective of information security and to analyze the critical and comprehensive factors needed to strengthen data privacy in BYOD. Finally, this paper provides a foundation for developing the concept of preserving confidentiality in BYOD and describes the key technical and organizational challenges faced by BYOD-friendly organizations.
31 CFR 31.217 - Confidentiality of information.
2010-07-01
... 31 Money and Finance: Treasury 1 2010-07-01 2010-07-01 false Confidentiality of information. 31.217 Section 31.217 Money and Finance: Treasury Office of the Secretary of the Treasury TROUBLED ASSET... from a source other than the retained entity. (b) Prohibitions. The retained entity shall not: (1...
12 CFR 404.7 - Confidential business information.
2010-01-01
... 12 Banks and Banking 4 2010-01-01 2010-01-01 false Confidential business information. 404.7 Section 404.7 Banks and Banking EXPORT-IMPORT BANK OF THE UNITED STATES INFORMATION DISCLOSURE Procedures... involved, a general description of the related U.S. exports, and the country to which such exports are...
Building Trust and Confidentiality in Cloud computing Distributed ...
African Journals Online (AJOL)
new technology, this new way of doing business brings with it new challenges, ... In this paper, we looked at data security, described the current state of data ... has the potential to solve many threats concerning confidentiality and adoption of
Secret Forwarding of Events over Distributed Publish/Subscribe Overlay Network.
Directory of Open Access Journals (Sweden)
Young Yoon
Full Text Available Publish/subscribe is a communication paradigm where loosely-coupled clients communicate in an asynchronous fashion. Publish/subscribe supports the flexible development of large-scale, event-driven and ubiquitous systems. Publish/subscribe is prevalent in a number of application domains such as social networking, distributed business processes and real-time mission-critical systems. Many publish/subscribe applications are sensitive to message loss and violation of privacy. To overcome such issues, we propose a novel method of using secret sharing and replication techniques. This is to reliably and confidentially deliver decryption keys along with encrypted publications even under the presence of several Byzantine brokers across publish/subscribe overlay networks. We also propose a framework for dynamically and strategically allocating broker replicas based on flexibly definable criteria for reliability and performance. Moreover, a thorough evaluation is done through a case study on social networks using the real trace of interactions among Facebook users.
Effective verification of confidentiality for multi-threaded programs
Ngo, Minh Tri; Stoelinga, Mariëlle Ida Antoinette; Huisman, Marieke
2014-01-01
This paper studies how confidentiality properties of multi-threaded programs can be verified efficiently by a combination of newly developed and existing model checking algorithms. In particular, we study the verification of scheduler-specific observational determinism (SSOD), a property that
Privacy Perspectives for Online Searchers: Confidentiality with Confidence?
Duberman, Josh; Beaudet, Michael
2000-01-01
Presents issues and questions involved in online privacy from the information professional's perspective. Topics include consumer concerns; query confidentiality; securing computers from intrusion; electronic mail; search engines; patents and intellectual property searches; government's role; Internet service providers; database mining; user…
[Confidentiality in HIV-infection/AIDS--a comment on the Communicable Disease Control Act].
Frich, J C
1995-05-10
The new Communicable Diseases Control Act has come into force in Norway. It makes it compulsory for a physician to warn a third party if it is obvious that a HIV-positive patient, with a high degree of certainty, puts the third party at risk of being infected with HIV. Some philosophers characterize medical confidentiality as an intransigent and absolute obligation, others as a prima facie duty. This article supports the latter view, but the author still argues that strict conditions have to be fulfilled before a physician should consider breaking medical confidentiality: The doctor must try repeatedly to gain the consent or co-operation of the patient involved. Possible negative long-term consequences for the preventive HIV-work support strict medical confidentiality.
19 CFR 201.6 - Confidential business information.
2010-04-01
...) of a type for which there is a clear and compelling need to withhold from disclosure. Special rules... the right to appeal to the Commission. (e) Appeals from denial of confidential treatment. (1) For good cause shown, the Commission may grant an appeal from a denial by the Secretary of a request for...
Enhanced Obfuscation Technique for Data Confidentiality in Public Cloud Storage
Directory of Open Access Journals (Sweden)
Oli S. Arul
2016-01-01
Full Text Available With an advent of cloud computing, data storage has become a boon in information technology. At the same time, data storage in remote places have become important issues. Lot of techniques are available to ensure protection of data confidentiality. These techniques do not completely serve the purpose in protecting data. The Obfuscation techniques come to rescue for protecting data from malicious attacks. This paper proposes an obfuscation technique to encrypt the desired data type on the cloud providing more protection from unknown hackers. The experimental results show that the time taken for obfuscation is low and the confidentiality percentage is high when compared with existing techniques.
Medical confidentiality versus disclosure: Ethical and legal dilemmas.
LENUS (Irish Health Repository)
Agyapong, V I O
2009-02-01
A case is described of a fifty year old single man who made disclosures about criminal sexual practices during a psychiatric assessment. In common practice with other professional men, a doctor is under a duty not to disclose, without the consent of his patient, information which he has gained in his professional capacity other than in exceptional circumstances. We discuss the ethical and legal considerations surrounding issues of medical confidentiality and the dilemma that sometimes face clinicians, when they feel obliged, in the public interest, to disclose information they have gained in confidence. Breach of confidences can have deleterious consequences; particularly for the doctor-patient relationship, but failure to disclose in some situations could have serious implications for the well-being of the wider society. Doctors should be aware of the basic principles of confidentiality and the ethical and legal framework around which they are built.
Privacy, confidentiality and automated health information systems.
Vuori, H
1977-12-01
Professor Vuori's paper, first presented at the fourth Medico-legal Conference in Prague in the spring of this year, deals with the problem of the maintenance of confidentiality in computerized health records. Although more and more information is required, the hardware of the computer systems is so sophisticated that it would be very expensive indeed to 'break in' and steal from a modern data bank. Those concerned with programming computers are becoming more aware of their responsibilities concerning confidentiality and privacy, to the extent that a legal code of ethics for programmers is being formulated. They are also aware that the most sensitive of all relationships--the doctor-patient relationship--could be in danger if they failed to maintain high standards of integrity. An area of danger is where administrative boundaries between systems must be crossed--say between those of health and employment. Protection of privacy must be ensured by releasing full information about the type of data being stored, and by maintaining democratic control over the establishment of information systems.
International Nuclear Information System (INIS)
Mahmoud, S.; Ayad, N.; Elsayed, F.; Elbendary, M.
2016-01-01
Full text: Due to the widespread usage of the internet and other wired and wireless communication methods, the security of the transmitted data has become a major requirement. Nuclear knowledge is mainly built upon the exchange of nuclear information which is considered highly sensitive information, so its security has to be enhanced by using high level security mechanisms. Data confidentiality is concerned with the achievement of higher protection for confidential information from unauthorized disclosure or access. Cryptography and steganography are famous and widely used techniques that process information in order to achieve its confidentiality, but sometimes, when used individually, they don’t satisfy a required level of security for highly sensitive data. In this paper, cryptography is accompanied with steganography for constituting a multilayer security techniques that can strengthen the level of security of highly confidential nuclear data that are archived or transmitted through different channel types and noise conditions. (author)
The end of medical confidentiality? Patients, physicians and the state in history.
Rieder, Philip; Louis-Courvoisier, Micheline; Huber, Philippe
2016-09-01
Medical confidentiality has come under attack in the public sphere. In recent disasters both journalists and politicians have questioned medical confidentiality and claimed that in specific contexts physicians should be compelled to communicate data on their patients' health. The murders of innocent individuals by a suicidal pilot and a Swiss convicted criminal have generated polemical debates on the topic. In this article, historical data on medical confidentiality is used to show that medical practices of secrecy were regularly attacked in the past, and that the nature of medical confidentiality evolved through time depending on physicians' values and judgements. Our demonstration is based on three moments in history. First, at the end of the 16th century, lay authorities put pressure on physicians to disclose the names of patients suffering from syphilis. Second, in the 18th century, physicians faced constant demands for information about patients' health from relatives and friends. Third, employers and insurance companies in the 20th century requested medical data on sick employees. In these three different situations, history reveals that the concept of medical confidentiality was plastic, modelled in the first instance to defend well-to-do patients, in the second instance it was adapted to accommodate the physician's social role and, finally, to defend universal values and public health. Medical secrecy was, and is today, a medical and societal norm that is shaped collectively. Any change in its definition and enforcement was and should be the result of negotiations with all social actors concerned. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://www.bmj.com/company/products-services/rights-and-licensing/
Boundaries of confidentiality in nursing care for mother and child in HIV programmes.
Våga, Bodil Bø; Moland, Karen Marie; Blystad, Astrid
2016-08-01
Confidentiality lies at the core of medical ethics and is the cornerstone for developing and keeping a trusting relationship between nurses and patients. In the wake of the HIV epidemic, there has been a heightened focus on confidentiality in healthcare contexts. Nurses' follow-up of HIV-positive women and their susceptible HIV-exposed children has proved to be challenging in this regard, but the ethical dilemmas concerning confidentiality that emerge in the process of ensuring HIV-free survival of the third party - the child - have attracted limited attention. The study explores challenges of confidentiality linked to a third party in nurse-patient relationships in a rural Tanzanian HIV/AIDS context. The study was carried out in rural and semi-urban settings of Tanzania where the population is largely agro-pastoral, the formal educational level is low and poverty is rife. The HIV prevalence of 1.5% is low compared to the national prevalence of 5.1%. Data were collected during 9 months of ethnographic fieldwork and consisted of participant observation in clinical settings and during home visits combined with in-depth interviews. The main categories of informants were nurses employed in prevention of mother-to-child transmission of HIV programmes and HIV-positive women enrolled in these programmes. Based on information about the study aims, all informants consented to participate. Ethical approval was granted by ethics review boards in Tanzania and Norway. The material indicates a delicate balance between the nurses' attempt to secure the HIV-free survival of the babies and the mothers' desire to preserve confidentiality. Profound confidentiality-related dilemmas emerged in actual practice, and indications of a lack of thorough consideration of the implication of a patient's restricted disclosure came to light during follow-up of the HIV-positive women and the third party - the child who is at risk of HIV infection through mother's milk. World Health Organization
2010-10-01
... ENFORCEMENT SYSTEMS § 307.13 Security and confidentiality for computerized support enforcement systems in... systems in operation after October 1, 1997. (a) Information integrity and security. Have safeguards... 45 Public Welfare 2 2010-10-01 2010-10-01 false Security and confidentiality for computerized...
40 CFR 85.1415 - Treatment of confidential information.
2010-07-01
... 40 Protection of Environment 18 2010-07-01 2010-07-01 false Treatment of confidential information. 85.1415 Section 85.1415 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) AIR PROGRAMS (CONTINUED) CONTROL OF AIR POLLUTION FROM MOBILE SOURCES Urban Bus Rebuild Requirements § 85.1415...
Debelva, F.; Mosquera, Valderrama I.J.
2017-01-01
The overall aim of this article is to analyse the taxpayers’ rights to confidentiality and privacy in exchange of information including the new global standard of automatic exchange of information. Section 2 will analyse the state of the art regarding the right to privacy and confidentiality in
40 CFR 86.615-84 - Treatment of confidential information.
2010-07-01
...) Selective Enforcement Auditing of New Light-Duty Vehicles, Light-Duty Trucks, and Heavy-Duty Vehicles § 86... part 2, subpart B. (b) Any claim of confidentiality must accompany the information at the time it is...
Absolutism on Access and Confidentiality: Principled or Irresponsible?
Sheerin, William E.
1991-01-01
Discusses issues involved in public access to library materials and facilities and patron confidentiality. Topics discussed include children's access to adult materials; parents' right to know about their children's materials; First and Fourth Amendment protections; the Library Bill of Rights; and American Library Association (ALA) documents that…
12 CFR 19.181 - Confidentiality of formal investigations.
2010-01-01
... 12 Banks and Banking 1 2010-01-01 2010-01-01 false Confidentiality of formal investigations. 19.181 Section 19.181 Banks and Banking COMPTROLLER OF THE CURRENCY, DEPARTMENT OF THE TREASURY RULES OF... only in accordance with the provisions of part 4 of this chapter. ...
49 CFR 805.735-21 - Confidentiality of statements.
2010-10-01
... TRANSPORTATION SAFETY BOARD EMPLOYEE RESPONSIBILITIES AND CONDUCT § 805.735-21 Confidentiality of statements. Subject to the provisions of § 805.735-24 concerning review of employee statements, each statement of... Personnel Officer is personally responsible for the retention of employee statements in confidence and may...
HIPAA-protecting patient confidentiality or covering something else?
Directory of Open Access Journals (Sweden)
Robbins RA
2013-10-01
Full Text Available No abstract available. Article truncated at 150 words. A case of a physician fired from the Veterans Administration (VA for violation of the Health Care Portability and Accountability Act of 1996 (HIPAA illustrates a problem with both the law and the VA. Anil Parikh, a VA physician at the Jesse Brown VA in Chicago, was dismissed on a charge of making unauthorized disclosures of confidential patient information on October 19, 2007. On January 3, 2011 the Merit Systems Protection Board (MSPB reversed Dr. Parikh’s removal. Dr. Parikh's initially made disclosures to the VA Office of Inspector General and to Senator Barack Obama and Congressman Luis Gutierrez, in whose district the Jesse Brown VA lies. Dr. Parikh alleged that there were systematic problems within the Jesse Brown VA that resulted in untimely and inadequate patient care. The confidential patient information Parikh disclosed included examples of the misdiagnoses and misdirection of patients within the hospital. Specifically, Dr. Parikh alleged that …
2010-07-01
... ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) TOXIC SUBSTANCES CONTROL ACT REPORTING REQUIREMENTS AND REVIEW... appear on the public version of the Inventory, in § 725.239 or in subpart M of this part. Instead, it is contained in a confidential version held in EPA's Confidential Business Information Center (CBIC). The...
Hyden, Christel; Allegrante, John P; Cohall, Alwyn T
2014-03-01
This study sought to evaluate HIV testing locations in New York City in terms of staff communication of confidentiality policies for adolescent clients. Using the New York State Directory of HIV Counseling and Testing Resources as a sampling frame, this study made telephone contact with 164 public HIV testing locations in New York City and used a semistructured interview to ask questions about confidentiality, parental permission, and parent access to test results. At 48% of locations, either HIV testing was not offered or we were unable to reach a staff member to ask questions about testing options and confidentiality. At the remaining sites, information provided regarding confidentiality, parental consent, and privacy of test results was correct only 69% to 85% of the time. Additionally, 23% of sites successfully contacted offered testing exclusively between 9:00 a.m. and 3:00 p.m. weekdays, when most adolescents are in school. Our findings point to a need for increased training and quality control at the clinical level to ensure that consumers in need of HIV testing are provided with accurate information and accessible services. Furthermore, these results highlight the need for more "patient-centric" sites with enhanced accessibility for potential clients, particularly youth.
DEFF Research Database (Denmark)
Lazarus, Jeff; Jaruseviciene, Lina; Liljestrand, Jerker
2008-01-01
In Lithuania, the legislation addressing confidentiality in adolescent healthcare is contradictory and vague. Previous studies have also revealed that medico-legal knowledge among physicians is poor, and attitudes play a correspondingly greater role than legal knowledge in ensuring the confidenti......In Lithuania, the legislation addressing confidentiality in adolescent healthcare is contradictory and vague. Previous studies have also revealed that medico-legal knowledge among physicians is poor, and attitudes play a correspondingly greater role than legal knowledge in ensuring...
40 CFR 303.31 - Assurance of claimant confidentiality.
2010-07-01
... 40 Protection of Environment 27 2010-07-01 2010-07-01 false Assurance of claimant confidentiality. 303.31 Section 303.31 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) SUPERFUND... knowledge, shall be given access to the identity of, or information that would lead to the identity of, a...
75 FR 75576 - Confidentiality of Suspicious Activity Reports
2010-12-03
...-2010-0019] RIN 1557-AD17 Confidentiality of Suspicious Activity Reports AGENCY: The Office of the... suspicious activity report (SAR) to: clarify the scope of the statutory prohibition on the disclosure by a... institutions, including national banks regulated by the OCC, to keep certain records and make certain reports...
Barnable, Alexia; Cunning, Glenda; Parcon, Mariel
This study examined nursing students' perceptions of confidentiality, accountability, and e-professionalism in relation to Facebook. All of the students were aware that posting patients' names and pictures of patients constituted a confidentiality breach. When comparing students based on educational status, there were differing opinions on whether employers should use Facebook profile information for hiring decisions. Nursing programs should provide current education, including clear and up-to-date policies, about social media use.
2010-01-01
... regulated by the Commission. This part does not apply to Top Secret information because Top Secret... obtaining facility security clearance and for safeguarding Secret and Confidential National Security...
41 CFR 105-62.101 - Security classification categories.
2010-07-01
... three categories: Namely, Top Secret, Secret, or Confidential, depending on its degree of significance... provided by statute. The three classification categories are defined as follows: (a) Top Secret. Top Secret... with the utmost restraint. (b) Secret. Secret refers to that national security information or material...
18 CFR 1b.9 - Confidentiality of investigations.
2010-04-01
... 18 Conservation of Power and Water Resources 1 2010-04-01 2010-04-01 false Confidentiality of investigations. 1b.9 Section 1b.9 Conservation of Power and Water Resources FEDERAL ENERGY REGULATORY COMMISSION... pursuant to subpoena, and all investigative proceedings shall be treated as nonpublic by the Commission and...
Directory of Open Access Journals (Sweden)
Carlos Alberto de Salles
2017-05-01
Full Text Available This article debates the tension that exists between confidentiality, usual in ADRs, and the publicity principle, that rules the Public Administration in Brazil. As a solution points that the parameter of confidentiality when Public Administration is a party must be the preservation of accountability of the involved agencies, what means, the capacity to answer to its own goals and to obey the public control.
IT Confidentiality Risk Assessment for an Architecture-Based Approach
Morali, A.; Zambon, Emmanuele; Etalle, Sandro; Overbeek, Paul
2008-01-01
Information systems require awareness of risks and a good understanding of vulnerabilities and their exploitations. In this paper, we propose a novel approach for the systematic assessment and analysis of confidentiality risks caused by disclosure of operational and functional information. The
48 CFR 1415.207-71 - Confidentiality of proposal evaluation.
2010-10-01
... THE INTERIOR CONTRACTING METHODS AND CONTRACT TYPES CONTRACTING BY NEGOTIATION Solicitation and... evaluators and advisors shall sign a Conflict of Interest Certificate and a Confidentiality Certificate in a... outside the Government shall take into consideration requirements for avoiding individual conflicts of...
Jaruseviciene, Lina; Zaborskis, Apolinaras; Lazarus, Jeffrey Victor
2014-04-01
An adolescent's right to confidential healthcare is protected by international law and professional consensus. However, parental and social support for confidential sexual and reproductive health (SRH) services, in particular, varies greatly. This study documents Lithuanian residents' expectations with regard to confidentiality protection for adolescents in this domain, and explores the factors related to the diversity of these expectations. Two national surveys of Lithuanian residents completed in 2005 and 2012 using anonymous questionnaires. Participants rated their expectations for confidentiality using a five-point Likert scale for eight types of SRH consultations. Public anticipation for confidentiality depended on whether issues related to sexual behaviour or to its consequences were addressed during adolescent consultation. Only younger respondents had higher expectations for confidentiality in both contexts. Public expectations regarding confidentiality were less demanding in 2012 than in 2005. The expectation of confidentiality protection was greater for topics related to sexual behaviour than for the consequences of sexual behaviour, such as pregnancy, abortion or a sexually transmitted infection. This implies a need for targeted information strategies for the general population and explicit guidance for physicians on when and for whom care should remain confidential.
49 CFR 40.321 - What is the general confidentiality rule for drug and alcohol test information?
2010-10-01
... Transportation PROCEDURES FOR TRANSPORTATION WORKPLACE DRUG AND ALCOHOL TESTING PROGRAMS Confidentiality and Release of Information § 40.321 What is the general confidentiality rule for drug and alcohol test... DOT drug or alcohol testing process, you are prohibited from releasing individual test results or...
14 CFR 1203.412 - Classification guides.
2010-01-01
... of the classification designations (i.e., Top Secret, Secret or Confidential) apply to the identified... writing by an official with original Top Secret classification authority; the identity of the official...
29 CFR 14.20 - Dissemination to individuals and firms outside the executive branch.
2010-07-01
... following guidelines: (a) Top Secret information. All requests for Top Secret information by an individual... Confidential, Secret, or Top Secret information, a report providing all available details must be immediately... outside the United States. All requests from outside the United States for Top Secret, Secret or...
2010-07-01
... confidentiality of, Statements of Account, Verification Auditor's Reports, and other verification information... GENERAL PROVISIONS § 201.29 Access to, and confidentiality of, Statements of Account, Verification Auditor... Account, including the Primary Auditor's Reports, filed under 17 U.S.C. 1003(c) and access to a Verifying...
22 CFR 1104.17 - Confidentiality of archaeological resource information.
2010-04-01
... 22 Foreign Relations 2 2010-04-01 2010-04-01 true Confidentiality of archaeological resource information. 1104.17 Section 1104.17 Foreign Relations INTERNATIONAL BOUNDARY AND WATER COMMISSION, UNITED... of archaeological resource information. (a) The Commissioner shall not make available to the public...
Decisions about Confidentiality in Medical Student Mental Health Settings.
Lindenthal, Jacob Jay; And Others
1984-01-01
Examined responses of psychologists and psychiatrists in medical schools (N=59) to vignettes representing student problems. Results suggested practitioners were generally unwilling to break confidentiality in response to problems involving suicidal tendencies, sexual coercion/seduction, social transgressions, or falsifying data. Only suggestions…
Privacy, confidentiality and abortion statistics: a question of public interest?
McHale, Jean V; Jones, June
2012-01-01
The precise nature and scope of healthcare confidentiality has long been the subject of debate. While the obligation of confidentiality is integral to professional ethical codes and is also safeguarded under English law through the equitable remedy of breach of confidence, underpinned by the right to privacy enshrined in Article 8 of the Human Rights Act 1998, it has never been regarded as absolute. But when can and should personal information be made available for statistical and research purposes and what if the information in question is highly sensitive information, such as that relating to the termination of pregnancy after 24 weeks? This article explores the case of In the Matter of an Appeal to the Information Tribunal under section 57 of the Freedom of Information Act 2000, concerning the decision of the Department of Health to withhold some statistical data from the publication of its annual abortion statistics. The specific data being withheld concerned the termination for serious fetal handicap under section 1(1)d of the Abortion Act 1967. The paper explores the implications of this case, which relate both to the nature and scope of personal privacy. It suggests that lessons can be drawn from this case about public interest and use of statistical information and also about general policy issues concerning the legal regulation of confidentiality and privacy in the future.
Streamlining digital signal processing a tricks of the trade guidebook
2012-01-01
Streamlining Digital Signal Processing, Second Edition, presents recent advances in DSP that simplify or increase the computational speed of common signal processing operations and provides practical, real-world tips and tricks not covered in conventional DSP textbooks. It offers new implementations of digital filter design, spectrum analysis, signal generation, high-speed function approximation, and various other DSP functions. It provides:Great tips, tricks of the trade, secrets, practical shortcuts, and clever engineering solutions from seasoned signal processing professionalsAn assortment.
On Converting Secret Sharing Scheme to Visual Secret Sharing Scheme
Directory of Open Access Journals (Sweden)
Wang Daoshun
2010-01-01
Full Text Available Abstract Traditional Secret Sharing (SS schemes reconstruct secret exactly the same as the original one but involve complex computation. Visual Secret Sharing (VSS schemes decode the secret without computation, but each share is m times as big as the original and the quality of the reconstructed secret image is reduced. Probabilistic visual secret sharing (Prob.VSS schemes for a binary image use only one subpixel to share the secret image; however the probability of white pixels in a white area is higher than that in a black area in the reconstructed secret image. SS schemes, VSS schemes, and Prob. VSS schemes have various construction methods and advantages. This paper first presents an approach to convert (transform a -SS scheme to a -VSS scheme for greyscale images. The generation of the shadow images (shares is based on Boolean XOR operation. The secret image can be reconstructed directly by performing Boolean OR operation, as in most conventional VSS schemes. Its pixel expansion is significantly smaller than that of VSS schemes. The quality of the reconstructed images, measured by average contrast, is the same as VSS schemes. Then a novel matrix-concatenation approach is used to extend the greyscale -SS scheme to a more general case of greyscale -VSS scheme.
Authentication Without Secrets
Energy Technology Data Exchange (ETDEWEB)
Pierson, Lyndon G. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Robertson, Perry J. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)
2015-11-01
This work examines a new approach to authentication, which is the most fundamental security primitive that underpins all cyber security protections. Current Internet authentication techniques require the protection of one or more secret keys along with the integrity protection of the algorithms/computations designed to prove possession of the secret without actually revealing it. Protecting a secret requires physical barriers or encryption with yet another secret key. The reason to strive for "Authentication without Secret Keys" is that protecting secrets (even small ones only kept in a small corner of a component or device) is much harder than protecting the integrity of information that is not secret. Promising methods are examined for authentication of components, data, programs, network transactions, and/or individuals. The successful development of authentication without secret keys will enable far more tractable system security engineering for high exposure, high consequence systems by eliminating the need for brittle protection mechanisms to protect secret keys (such as are now protected in smart cards, etc.). This paper is a re-release of SAND2009-7032 with new figures numerous edits.
Denying a patient's final will: public safety vs. medical confidentiality and patient autonomy.
Gaertner, Jan; Vent, Julia; Greinwald, Ralf; Rothschild, Markus A; Ostgathe, Christoph; Kessel, Rene; Voltz, Raymond
2011-12-01
Especially when caring for patients approaching the end of life, physicians and nursing staff feel committed to fulfilling as many patient desires as possible. However, sometimes a patient's "final will" may threaten public safety. This can lead to severe conflicts, outweighing the physician's obligation and dedication to care for the patient and to respect his autonomy. Yet, public safety can be threatened if confidentiality is not broken. This article provides a concise summary of the medicolegal and ethical fundamentals concerning this difficult situation. If the patient's and others' health and safety are at risk, physicians may (and in some countries must) break medical confidentiality and disclose confidential patient information to the police and other authorities. Physicians should be able to professionally deal with such a conflict in all patients, not only in patients with advanced illness. Copyright © 2011 U.S. Cancer Pain Relief Committee. Published by Elsevier Inc. All rights reserved.
2010-07-01
... Security Policy Board. (b) Requirements for physical protection—(1) Top Secret. Top Secret information... of the alarm annunciation. (2) Secret. Secret information shall be stored in the same manner as Top.... Confidential information shall be stored in the same manner as prescribed for Top Secret or Secret information...
Security classification of information
Energy Technology Data Exchange (ETDEWEB)
Quist, A.S.
1993-04-01
This document is the second of a planned four-volume work that comprehensively discusses the security classification of information. The main focus of Volume 2 is on the principles for classification of information. Included herein are descriptions of the two major types of information that governments classify for national security reasons (subjective and objective information), guidance to use when determining whether information under consideration for classification is controlled by the government (a necessary requirement for classification to be effective), information disclosure risks and benefits (the benefits and costs of classification), standards to use when balancing information disclosure risks and benefits, guidance for assigning classification levels (Top Secret, Secret, or Confidential) to classified information, guidance for determining how long information should be classified (classification duration), classification of associations of information, classification of compilations of information, and principles for declassifying and downgrading information. Rules or principles of certain areas of our legal system (e.g., trade secret law) are sometimes mentioned to .provide added support to some of those classification principles.
Zandbergen, Paul A
2014-01-01
Public health datasets increasingly use geographic identifiers such as an individual's address. Geocoding these addresses often provides new insights since it becomes possible to examine spatial patterns and associations. Address information is typically considered confidential and is therefore not released or shared with others. Publishing maps with the locations of individuals, however, may also breach confidentiality since addresses and associated identities can be discovered through reverse geocoding. One commonly used technique to protect confidentiality when releasing individual-level geocoded data is geographic masking. This typically consists of applying a certain amount of random perturbation in a systematic manner to reduce the risk of reidentification. A number of geographic masking techniques have been developed as well as methods to quantity the risk of reidentification associated with a particular masking method. This paper presents a review of the current state-of-the-art in geographic masking, summarizing the various methods and their strengths and weaknesses. Despite recent progress, no universally accepted or endorsed geographic masking technique has emerged. Researchers on the other hand are publishing maps using geographic masking of confidential locations. Any researcher publishing such maps is advised to become familiar with the different masking techniques available and their associated reidentification risks.
Directory of Open Access Journals (Sweden)
Paul A. Zandbergen
2014-01-01
Full Text Available Public health datasets increasingly use geographic identifiers such as an individual’s address. Geocoding these addresses often provides new insights since it becomes possible to examine spatial patterns and associations. Address information is typically considered confidential and is therefore not released or shared with others. Publishing maps with the locations of individuals, however, may also breach confidentiality since addresses and associated identities can be discovered through reverse geocoding. One commonly used technique to protect confidentiality when releasing individual-level geocoded data is geographic masking. This typically consists of applying a certain amount of random perturbation in a systematic manner to reduce the risk of reidentification. A number of geographic masking techniques have been developed as well as methods to quantity the risk of reidentification associated with a particular masking method. This paper presents a review of the current state-of-the-art in geographic masking, summarizing the various methods and their strengths and weaknesses. Despite recent progress, no universally accepted or endorsed geographic masking technique has emerged. Researchers on the other hand are publishing maps using geographic masking of confidential locations. Any researcher publishing such maps is advised to become familiar with the different masking techniques available and their associated reidentification risks.
Energy Technology Data Exchange (ETDEWEB)
Thiyagarajan, P.; Thandra, Prasanth Kumar; Rajan, J.; Satyamurthy, S.A.V. [Indira Gandhi Centre for Atomic Research (IGCAR), Kalpakkam (India). Computer Div.; Aghila, G. [National Institute of Technology, Karaikal (India). Dept. of Computer Science and Engineering
2015-05-15
In recent years, due to the sophistication offered by the Internet, strategic organizations like nuclear power plants are linked to the outside world communication through the Internet. The entry of outside world communication into strategic organization (nuclear power plant) increases the hacker's attempts to crack its security and to trace any information which is being sent among the top level officials. Information security system in nuclear power plant is very crucial as even small loophole in the security system will lead to a major disaster. Recent cyber attacks in nuclear power plant provoked information security professionals to look deeply into the information security aspects of strategic organizations (nuclear power plant). In these lines, Shamir secret sharing scheme with dynamic access structure (SSSDAS) is proposed in the paper which provides enhanced security by providing dynamic access structure for each node in different hierarchies. The SSSDAS algorithm can be applied to any strategic organizations with hierarchical structures. In this paper the possible scenarios where SSSDAS algorithm can be applied to nuclear power plant is explained as a case study. The proposed SSSDAS scheme identifies the wrong shares, if any, used for reconstruction of the secret. The SSSDAS scheme also address the three major security parameters namely confidentiality, authentication and integrity.
International Nuclear Information System (INIS)
Thiyagarajan, P.; Thandra, Prasanth Kumar; Rajan, J.; Satyamurthy, S.A.V.; Aghila, G.
2015-01-01
In recent years, due to the sophistication offered by the Internet, strategic organizations like nuclear power plants are linked to the outside world communication through the Internet. The entry of outside world communication into strategic organization (nuclear power plant) increases the hacker's attempts to crack its security and to trace any information which is being sent among the top level officials. Information security system in nuclear power plant is very crucial as even small loophole in the security system will lead to a major disaster. Recent cyber attacks in nuclear power plant provoked information security professionals to look deeply into the information security aspects of strategic organizations (nuclear power plant). In these lines, Shamir secret sharing scheme with dynamic access structure (SSSDAS) is proposed in the paper which provides enhanced security by providing dynamic access structure for each node in different hierarchies. The SSSDAS algorithm can be applied to any strategic organizations with hierarchical structures. In this paper the possible scenarios where SSSDAS algorithm can be applied to nuclear power plant is explained as a case study. The proposed SSSDAS scheme identifies the wrong shares, if any, used for reconstruction of the secret. The SSSDAS scheme also address the three major security parameters namely confidentiality, authentication and integrity.
2013-07-11
.... Government-granted security clearance (i.e., Top Secret, Secret, or Confidential). d. A review of the...'' clearances or possess another active U.S. Government granted security clearance, i.e., Top Secret, Secret or...'' clearances or possess another active U.S. Government granted security clearance, i.e., Top Secret, Secret or...
2011-12-28
.... Government-granted security clearance (i.e., Top Secret, Secret, or Confidential). d. A review of the...'' clearances or possess another active U.S. Government granted security clearance, i.e., Top Secret, Secret or...'' clearances or possess another active U.S. Government granted security clearance, i.e., Top Secret, Secret or...
18 CFR 3a.11 - Classification of official information.
2010-04-01
... classified Top Secret, Secret or Confidential, depending upon the degree of its significance to national... classification categories are defined as follows: (1) Top Secret. Top Secret refers to national security information or material which requires the highest degree of protection. The test for assigning Top Secret...
2010-10-01
...: Data Security for Toxic Substances Control Act Confidential Business Information (DEC 1997) The... 48 Federal Acquisition Regulations System 6 2010-10-01 2010-10-01 true Data Security for Toxic Substances Control Act Confidential Business Information (DEC 1997). 1552.235-78 Section 1552.235-78 Federal...
6 CFR 7.20 - Classification and declassification authority.
2010-01-01
.... (a) Top Secret original classification authority may only be exercised by the Secretary of Homeland... up to and including Top Secret. No official who is delegated Top Secret original classification... Secret and Confidential original classification authority to other officials determined to have frequent...
32 CFR 147.19 - The three standards.
2010-07-01
...) The investigation standard for“Q” access authorizations and for access to top secret (including top secret Special Access Programs) and Sensitive Compartmented Information; (c) The reinvestigation standard... authorizations and for access to confidential and secret (including all secret-level Special Access Programs not...
Anonymous electronic trading versus floor trading
Franke, Günter; Hess, Dieter
1995-01-01
This paper compares the attractiveness of floor trading and anonymous electronic trading systems. It is argued that in times of low information intensity the insight into the order book of the electronic trading system provides more valuable information than floor trading, but in times of high information intensity the reverse is true. Thus, the electronic system's market share in trading activity should decline in times of high information intensity. This hypothesis is tested by data on BUND...
7 CFR 981.75 - Confidential nature of records and reports.
2010-01-01
... Section 981.75 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (Marketing Agreements and Orders; Fruits, Vegetables, Nuts), DEPARTMENT OF AGRICULTURE ALMONDS..., financial condition, or business operations of any handler shall be considered as confidential information...
Fundamental rate-loss trade-off for the quantum internet.
Azuma, Koji; Mizutani, Akihiro; Lo, Hoi-Kwong
2016-11-25
The quantum internet holds promise for achieving quantum communication-such as quantum teleportation and quantum key distribution (QKD)-freely between any clients all over the globe, as well as for the simulation of the evolution of quantum many-body systems. The most primitive function of the quantum internet is to provide quantum entanglement or a secret key to two points efficiently, by using intermediate nodes connected by optical channels with each other. Here we derive a fundamental rate-loss trade-off for a quantum internet protocol, by generalizing the Takeoka-Guha-Wilde bound to be applicable to any network topology. This trade-off has essentially no scaling gap with the quantum communication efficiencies of protocols known to be indispensable to long-distance quantum communication, such as intercity QKD and quantum repeaters. Our result-putting a practical but general limitation on the quantum internet-enables us to grasp the potential of the future quantum internet.
Time for Action: Audit, Accountability and Confidential Enquiries into ...
African Journals Online (AJOL)
Improving the quality of care is essential for achieving reductions in maternal mortality. Audit is one of the methods which can be used to simultaneously assess as well as improve quality. This commentary discusses one type of audit – confidential enquiries into maternal death. We believe that the enthusiasm for ...
Martindale, S J; Chambers, E; Thompson, A R
2009-12-01
To explore and describe the experience of clinical psychology service users in relation to the processes associated with confidentiality and the generation of informed consent in individual therapy. A qualitative interview-based study employing interpretative phenomenological analysis was conducted with service users. User researchers were active collaborators in the study. A focus group of four users was convened to explore issues related to confidentiality and consent, which then informed the development of the semi-structured interview schedule. Twelve users of community mental health clinical psychology services were interviewed by user researchers. A user researcher and a clinical psychologist undertook joint analysis of the data. A second clinical psychologist facilitated reflexivity and wider consideration of validity issues. Four main themes were identified from the data: being referred; the participant's feelings, mental health difficulties, and their impact; relationships with workers and carers; and autonomy. The meaningfulness of processes of discussing confidentiality, and generating informed consent, can be improved by psychologists placing a greater emphasis on choice, control, autonomy, individual preferences, and actively involving the user in dialogue on repeated occasions.
Directory of Open Access Journals (Sweden)
Krishna Rahadian
2014-10-01
Full Text Available The purpose of this study was to evaluate the effects of the process of ISO 27001 with respect to the confidentiality of customer cellular card Jakarta and to improve cellular card customer data confidentiality at PT.XYZ from data leakage of the customer data due to the third party involvement, clean-desk policy, and access right. Recommendation regarding the improvement is provided after reviewing the confidentiality of customer data. The survey in this study is conducted by questionnaire. From the evaluation results of the questionnaire, it is concluded that the larger customer data leaks are mainly caused by the external factors.
Trotman, Gylynthia E; Mackey, Eleanor; Tefera, Eshetu; Gomez-Lobo, Veronica
2018-03-23
To explore parental and adolescent views on the confidential interview in the gynecologic setting and compare adolescent reported risk-taking behaviors with parental perception. Anonymous surveys were administered separately to parents/guardians and adolescents between the ages of 11-17. Information pertaining to the patient's Tanner stage and reason for visit was obtained from the provider. This first phase served as the usual care group. In the second phase of the study, surveys were once again distributed after a brief educational intervention. Linear regression analysis, Wilcoxon rank sum test, and Fisher exact test were used where appropriate. Pediatric and Adolescent Gynecology clinics in two tertiary hospitals INTERVENTION: Brief educational handout on key concepts of the confidential interview MAIN OUTCOME MEASURES: Parental perception of the confidential interview and adolescent risk- taking behaviors RESULTS: A total of 248 surveys were included in the final analysis, which accounts for 62 adolescent and parent/guardian pairs in each group. The majority of parents and adolescents reported perceived benefit to the confidential interview. However, parents were less likely to rate benefits of private time specifically for their own adolescent and less than half of parents believed that adolescents should have access to private time in the gynecologic setting. Both parents/guardians and adolescents feared that the confidential interview would limit the parent's ability to take part in decision-making. The low support for confidential time for their adolescent was not different in the usual care group as compared to the intervention group, although there was a trend toward parental acceptance with increased adolescent age. Adolescents were consistently more likely to report more risk-taking behaviors than their parents perceived. There is a discord between parental perception and adolescent reports of risk taking behaviors. This is coupled with a lack of
Mora, Erika; Franco, G
2010-01-01
The recently introduced Italian law on the protection of workers' health states that the occupational health physician (competent physician) is required to act according to the Code of Ethics of the International Commission on Occupational Health (ICOH). This paper aims at examining the articles of legislative decree 81/2008 dealing with informed consent and confidentiality compared with the corresponding points of the ICOH Ethics Code. Analysis of the relationship between articles 25 and 39 (informed consent) and 18, 20 and 39 (confidentiality) of the decree shows that there are some points of disagreement between the legal requirements and the Code of Ethics, in particular concerning prescribed health surveillance, consent based on appropriate information (points 8, 10 and 12 of the Code) and some aspects of confidentiality (points 10, 20, 21, 22 and 23 of the Code). Although the competent physician is required to act according to the law, the decisional process could lead to a violation of workers' autonomy.
18 CFR 3a.12 - Authority to classify official information.
2010-04-01
... efficient administration. (b) The authority to classify information or material originally as Top Secret is... classify information or material originally as Secret is exercised only by: (1) Officials who have Top... information or material originally as Confidential is exercised by officials who have Top Secret or Secret...
LcrG secretion is not required for blocking of Yops secretion in Yersinia pestis
Directory of Open Access Journals (Sweden)
Matson Jyl S
2008-02-01
Full Text Available Abstract Background LcrG, a negative regulator of the Yersinia type III secretion apparatus has been shown to be primarily a cytoplasmic protein, but is secreted at least in Y. pestis. LcrG secretion has not been functionally analyzed and the relevance of LcrG secretion on LcrG function is unknown. Results An LcrG-GAL4AD chimera, originally constructed for two-hybrid analyses to analyze LcrG protein interactions, appeared to be not secreted but the LcrG-GAL4AD chimera retained the ability to regulate Yops secretion. This result led to further investigation to determine the significance of LcrG secretion on LcrG function. Additional analyses including deletion and substitution mutations of amino acids 2–6 in the N-terminus of LcrG were constructed to analyze LcrG secretion and LcrG's ability to control secretion. Some changes to the N-terminus of LcrG were found to not affect LcrG's secretion or LcrG's secretion-controlling activity. However, substitution of poly-isoleucine in the N-terminus of LcrG did eliminate LcrG secretion but did not affect LcrG's secretion controlling activity. Conclusion These results indicate that secretion of LcrG, while observable and T3SS mediated, is not relevant for LcrG's ability to control secretion.
THE INFORMATION CONFIDENTIALITY AND CYBER SECURITY IN MEDICAL INSTITUTIONS
Directory of Open Access Journals (Sweden)
SABAU-POPA CLAUDIA DIANA
2015-07-01
Full Text Available The information confidentiality and cyber security risk affects the right to confidentiality and privacy of the patient, as regulated in Romania by the Law 46/2002. The manifestation of the cyber security risk event affects the reputation of the healthcare institution and is becoming more and more complex and often due to the: development of network technology, the medical equipment connected to wifi and the electronic databases. The databases containing medical records were implemented due to automation. Thus, transforming data into medical knowledge contribute to a better understanding of the disease. Due to these factors, the measures taken by the hospital management for this type of risk are adapted to the cyber changes. The hospital objectives aim: the implementation of a robust information system, the early threats identifications and the incident reporting. Neglecting this type of risk can generate financial loss, inability to continue providing health care services for a certain period of time, providing an erroneous diagnosis, medical equipment errors etc. Thus, in a digital age the appropriate risk management for the information security and cyber risk represent a necessity. The main concern of hospitals worldwide is to align with international requirements and obtain credentials in terms of data security from the International Organisation for Standardization, which regulates the management of this type of risk. Romania is at the beginning in terms of concerns regarding the management, avoidance and mitigation of information security, the health system being most highly exposed to its manifestation. The present paper examines the concerns of the health system to the confidentiality of information and cyber security risk and its management arrangements. Thus, a set of key risk indicators is implemented and monitored for 2011-2013, using a user interface, a Dashboard, which acts as an early warning system of the manifestation of the
Tamper-proof secret image-sharing scheme for identifying cheated secret keys and shared images
Chen, Chien-Chang; Liu, Chong-An
2013-01-01
A (t,n) secret image-sharing scheme shares a secret image to n participants, and the t users recover the image. During the recovery procedure of a conventional secret image-sharing scheme, cheaters may use counterfeit secret keys or modified shared images to cheat other users' secret keys and shared images. A cheated secret key or shared image leads to an incorrect secret image. Unfortunately, the cheater cannot be identified. We present an exponent and modulus-based scheme to provide a tamper-proof secret image-sharing scheme for identifying cheaters on secret keys or shared images. The proposed scheme allows users to securely select their secret key. This assignment can be performed over networks. Modulus results of each shared image is calculated to recognize cheaters of a shared image. Experimental results indicate that the proposed scheme is excellent at identifying cheated secret keys and shared images.
Wrapped up in Covers: Preschoolers' Secrets and Secret Hiding Places
Corson, Kimberly; Colwell, Malinda J.; Bell, Nancy J.; Trejos-Castillo, Elizabeth
2014-01-01
In this qualitative study, interviews about children's secret hiding places were conducted with 3-5-year-olds (n?=?17) in a university sponsored preschool programme using art narratives. Since prior studies indicate that children understand the concept of a secret as early as five and that they associate secrets with hiding places, the purpose of…
Jana: Confidential Communications on Social Networks
2017-08-09
consuming phone resources and privacy leakage ?” We address this challenge via an extensive user study. Next, we ask “How can we detect background apps...not support secret group communications. Furthermore, access to such social networks via mobile platforms raises a series of concerns like leakage of...not support secret group communications. Furthermore, access to such social networks via mobile platforms raises a series of concerns like leakage of
Salmonella-secreted Virulence Factors
Energy Technology Data Exchange (ETDEWEB)
Heffron, Fred; Niemann, George; Yoon, Hyunjin; Kidwai, Afshan S.; Brown, Roslyn N.; McDermott, Jason E.; Smith, Richard D.; Adkins, Joshua N.
2011-05-01
In this short review we discuss secreted virulence factors of Salmonella, which directly affect Salmonella interaction with its host. Salmonella secretes protein to subvert host defenses but also, as discussed, to reduce virulence thereby permitting the bacteria to persist longer and more successfully disperse. The type III secretion system (TTSS) is the best known and well studied of the mechanisms that enable secretion from the bacterial cytoplasm to the host cell cytoplasm. Other secretion systems include outer membrane vesicles, which are present in all Gram-negative bacteria examined to date, two-partner secretion, and type VI secretion will also be addressed. Excellent reviews of Salmonella secreted effectors have focused on themes such as actin rearrangements, vesicular trafficking, ubiquitination, and the activities of the virulence factors themselves. This short review is based on S. Typhimurium infection of mice because it is a model of typhoid like disease in humans. We have organized effectors in terms of events that happen during the infection cycle and how secreted effectors may be involved.
An, Ho
2012-01-01
In this dissertation, two interrelated problems of service-based systems (SBS) are addressed: protecting users' data confidentiality from service providers, and managing performance of multiple workflows in SBS. Current SBSs pose serious limitations to protecting users' data confidentiality. Since users' sensitive data is sent in…
21 CFR 1316.23 - Confidentiality of identity of research subjects.
2010-04-01
... 21 Food and Drugs 9 2010-04-01 2010-04-01 false Confidentiality of identity of research subjects. 1316.23 Section 1316.23 Food and Drugs DRUG ENFORCEMENT ADMINISTRATION, DEPARTMENT OF JUSTICE ADMINISTRATIVE FUNCTIONS, PRACTICES, AND PROCEDURES Protection of Researchers and Research Subjects § 1316.23...
37 CFR 382.4 - Confidential information and statements of account.
2010-07-01
... information and statements of account. (a) For purposes of this subpart, confidential information shall include statements of account and any information pertaining to the statements of account designated as... payments. (c) A statement of account shall include only such information as is necessary to verify the...
2010-07-01
... Officer. (b) Access to Top Secret material. Access to Top Secret Information within the primary organizational units of the DOL by employees of other Federal agencies must be approved in advance by the Top Secret Control Officer of the primary organizational unit. (c) Access to Secret and Confidential...
Trading volume and the number of trades
Marwan Izzeldin
2007-01-01
Trading volume and the number of trades are both used as proxies for market activity, with disagreement as to which is the better proxy for market activity. This paper investigates this issue using high frequency data for Cisco and Intel in 1997. A number of econometric methods are used, including GARCH augmented with lagged trading volume and number of trades, tests based on moment restrictions, regression analysis of volatility on volume and trades, normality of returns when standardized by...
75 FR 8330 - Access to Confidential Business Information by Eastern Research Group
2010-02-24
... ENVIRONMENTAL PROTECTION AGENCY [EPA-HQ-OPPT-2003-0004; FRL-8812-4] Access to Confidential Business Information by Eastern Research Group AGENCY: Environmental Protection Agency (EPA). ACTION: Notice. [[Page 8331
Regional Trade Agreement and Agricultural Trade in East African ...
African Journals Online (AJOL)
Intra-EAC trade is very low, that is, at 9 per cent of the total regional trade, but it is on upward trend. Agricultural trade accounts for over 40 per cent of the intra-EAC trade. This study investigated the effect of EAC regional trade agreement on the regions agricultural trade by analyzing the degree of trade creation and ...
Trade creation and trade diversion in the Canada - United States Free Trade Agreement
Kimberly A. Clausing
2001-01-01
In this paper the changes in trade patterns introduced by the Canada-United States Free Trade Agreement are examined. Variation in the extent of tariff liberalization under the agreement is used to identify the impact of tariff liberalization on the growth of trade both with member countries and non-member countries. Data at the commodity level are used, and the results indicate that the Canada-United States Free Trade Agreement had substantial trade creation effects, with little evidence of ...
DEFF Research Database (Denmark)
Jaruseviciene, Lina; Zaborskis, Apolinaras; Sauliune, Skirmante
2015-01-01
was employed to estimate absolute differences in prevalence of belief in whether or not adolescents would find confidentiality important when consulting a physician on SRH issues. A log-binomial regression model was fitted to estimate the relative changes (prevalence ratio) of the independent variables......BACKGROUND: In Lithuania, the right to confidentiality in healthcare for adolescents over the age of 16 was guaranteed in 2010 through the adoption of new legislation. This study sets out to explore changes in Lithuanian residents' attitudes towards confidentiality protection in adolescent sexual....... RESULTS: The total number of respondents was 1054 (response rate 83%) in 2005 and 1002 (response rate 80%) in 2012. The proportion of respondents who reported a belief that adolescents would find confidentiality important when seeing a physician for SRH issues increased significantly from 62% in 2005...
Murray Gibbs
2007-01-01
In an otherwise insightful and thoughtful article, Sebastian Pfotenhauer (Trade Policy Is Science Policy,” Issues, Fall 2013) might better have entitled his contribution “Trade Policy Needs to Be Reconciled with Science Policy.” The North American Free Trade Agreement (NAFTA) and the agreements administered by the World Trade Organization, particularly the General Agreement on Tariffs and Trade (GATT) and the Technical Barriers to Trade (TBT), were adopted to promote international trade and i...
Privacy Act System of Records: Confidential Business Information Tracking System, EPA-20
Learn about the Confidential Business Information Tracking System, including who is covered in the system, the purpose of data collection, routine uses for the system's records, and other security procedures.
40 CFR 1601.26 - Special procedures for confidential business information.
2010-07-01
... described in paragraph (c) of this section, the CSB shall, to the extent permitted by law, afford a business... business information. 1601.26 Section 1601.26 Protection of Environment CHEMICAL SAFETY AND HAZARD... Requesting and Disclosing Records § 1601.26 Special procedures for confidential business information. (a) In...
42 CFR 3.206 - Confidentiality of patient safety work product.
2010-10-01
... 42 Public Health 1 2010-10-01 2010-10-01 false Confidentiality of patient safety work product. 3... individually identifiable health information in such patient safety work product, the direct identifiers listed at 45 CFR 164.514(e)(2) have been removed. (5) Disclosure of nonidentifiable patient safety work...
International provision of trade services, trade, and fragmentation
Deardorff, Alan V.
2001-01-01
The author examines the special role that trade liberalization in services industries can play in stimulating trade in both services, and goods. International trade in goods requires inputs from such trade services as transportation, insurance, and finance, for example. Restrictions on services across borders, and within foreign countries add costs, and barriers to international trade. Lib...
77 FR 12284 - Access to Confidential Business Information; Protection Strategies Incorporated
2012-02-29
... Business Information; Protection Strategies Incorporated AGENCY: Environmental Protection Agency (EPA). ACTION: Notice. SUMMARY: EPA has authorized its contractor, Protection Strategies Incorporated (PSI) of... Business Information (CBI). DATES: Access to the confidential data occurred on or about February 16, 2012...
Meaningful Share Generation for Increased Number of Secrets in Visual Secret-Sharing Scheme
Directory of Open Access Journals (Sweden)
Mustafa Ulutas
2010-01-01
Full Text Available This paper presents a new scheme for hiding two halftone secret images into two meaningful shares created from halftone cover images. Meaningful shares are more desirable than noise-like (meaningless shares in Visual Secret Sharing because they look natural and do not attract eavesdroppers' attention. Previous works in the field focus on either increasing number of secrets or creating meaningful shares for one secret image. The method outlined in this paper both increases the number of secrets and creates meaningful shares at the same time. While the contrast ratio of shares is equal to that of Extended Visual Cryptography, two secrets are encoded into two shares as opposed to one secret in the Extended Visual Cryptography. Any two natural-looking images can be used as cover unlike the Halftone Visual Cryptography method where one cover should be the negative of the other cover image and can only encode one secret. Effectiveness of the proposed method is verified by an experiment.
Confidentiality and its limits: some contributions from Christianity.
Torrance, I R
2003-02-01
The issue is whether Christianity, of its nature, would seek to prevent a justifiable breach of confidentiality or could endorse it, under certain circumstances, as the act which is fundamentally more loving or more truthful. The individualistic nature of Western Christianity is noted. The Lutheran theologian Dietrich Bonhoeffer is used to show Christian support for dynamic rather than literal truth telling, and for awareness of the contexts and power relations within which persons stand.
Kivimäki, M
1996-11-01
Although yearly confidential conversations between a supervisor and an employee have been recommended as a means for improving leadership, evidence on the actual effects of these conversations has been lacking. The present study therefore investigated whether confidential conversations improve perceptions of goal clarity, sufficiency of feedback and innovativeness, and elicit satisfaction with the supervisor's leadership style within the hospital setting. Nine wards were divided into one experimental group (3 wards) and two control groups (3 + 3 wards). A questionnaire on goal clarity, feedback, innovativeness and satisfaction was administered twice to every group (1st measurement: r = 186, 2nd measurement: n = 163). The experimental group began confidential conversations after the first measurement, control group 1 entered into conversations during both measurements, and control group 2 did not enter into conversations at the time of either measurement. Confidential conversations improved perceived feedback. In both measurements, the sufficiency of feedback was reported to be significantly better in the groups having conversations than in the other groups. In addition, there was a significant positive change in the perceived sufficiency of feedback in the experimental group but not in the other groups. Confidential conversations did not affect the perceptions of goal clarity and innovativeness or elicit satisfaction with the supervisor's management style.
Genetic privacy and confidentiality: why they are so hard to protect.
Rothstein, M A
1998-01-01
Author notes that widespread concerns have been raised about protecting genetic privacy and confidentiality in insurance and employment. He argues that effective protections are difficult because complicated issues, such as the right of access to health care, are invariably implicated.
THE WORLD TRADE ORGANIZATION (WTO FREE TRADE WITHIN FAIR TRADE CHALLENGES
Directory of Open Access Journals (Sweden)
M. Ya’kub Aiyub Kadir
2014-06-01
Full Text Available Free trade and fair trade are considered an ambiguous term with relative meanings of identification. Objectively, free and fair trade does not mean completely free and fair, but it means trade under binding rules obeyed by member countries as a consequence of their commitment after signing and ratification of the WTO agreements. Hence, this paper aims at exploring the issue and does an effort to harmonise between free trade and fair trade within the WTO system. Perdagangan bebas dan perdagangan yang adil adalah dua istilah yang ambigu maknanya. Secara obyektif, perdagangan bebas tidak bermakna bebas dan adil seluruhnya, tetapi bermakna sebuah perdagangan di bawah aturan-aturan mengikat setelah negara anggota menandatangani dan meratifikasi kesepakatan WTO. Tetapi dalam realitas kebanyakan Negara, terutama negara berkembang tidak mampu untuk membuka pasar dan menurunkan tarif secara keseluruhan. Persoalan tidak berimbangnya kekuatan, kurang demokrasi, krisis legitimasi dan dobel standar dalam WTO sistem merupakan sebuah tantangan yang masih berlanjut. Paper ini akan mengkaji persoalan ini dan berupaya mengharmonisasikan antara perdagangan bebas dan adil dalam sistem WTO.
THE WORLD TRADE ORGANIZATION (WTO FREE TRADE WITHIN FAIR TRADE CHALLENGES
Directory of Open Access Journals (Sweden)
M. Ya’kub Aiyub Kadir
2014-06-01
Full Text Available Free trade and fair trade are considered an ambiguous term with relative meanings of identification. Objectively, free and fair trade does not mean completely free and fair, but it means trade under binding rules obeyed by member countries as a consequence of their commitment after signing and ratification of the WTO agreements. Hence, this paper aims at exploring the issue and does an effort to harmonise between free trade and fair trade within the WTO system. Perdagangan bebas dan perdagangan yang adil adalah dua istilah yang ambigu maknanya. Secara obyektif, perdagangan bebas tidak bermakna bebas dan adil seluruhnya, tetapi bermakna sebuah perdagangan di bawah aturan-aturan mengikat setelah negara anggota menandatangani dan meratifikasi kesepakatan WTO. Tetapi dalam realitas kebanyakan Negara, terutama negara berkembang tidak mampu untuk membuka pasar dan menurunkan tarif secara keseluruhan. Persoalan tidak berimbangnya kekuatan, kurang demokrasi, krisis legitimasi dan dobel standar dalam WTO sistem merupakan sebuah tantangan yang masih berlanjut. Paper ini akan mengkaji persoalan ini dan berupaya mengharmonisasikan antara perdagangan bebas dan adil dalam sistem WTO.
Morgan, Steven G; Vogler, Sabine; Wagner, Anita K
2017-04-01
Institutional payers for pharmaceuticals worldwide appear to be increasingly negotiating confidential discounts off of the official list price of pharmaceuticals purchased in the community setting. We conducted an anonymous survey about experiences with and attitudes toward confidential discounts on patented pharmaceuticals in a sample of high-income countries. Confidential price discounts are now common among the ten health systems that participated in our study, though some had only recently begun to use these pricing arrangements on a routine basis. Several health systems had used a wide variety of discounting schemes in the past two years. The most frequent discount received by participating health systems was between 20% and 29% of official list prices; however, six participants reported their health system received one or more discount over the past two years that was valued at 60% or more of the list prices. On average, participants reported that confidential discounts were more common, complex, and significant for specialty pharmaceuticals than for primary care pharmaceuticals. Participants had a more favorable view of the impact of confidential discount schemes on their health systems than on the global marketplace. Overall, the frequency, complexity, and scale of confidential discounts being routinely negotiated suggest that the list prices for medicines bear limited resemblance to what many institutional payers actually pay. Copyright © 2017 The Authors. Published by Elsevier B.V. All rights reserved.
22 CFR 212.38 - Predisclosure notification procedures for confidential commercial information.
2010-04-01
... 22 Foreign Relations 1 2010-04-01 2010-04-01 false Predisclosure notification procedures for confidential commercial information. 212.38 Section 212.38 Foreign Relations AGENCY FOR INTERNATIONAL DEVELOPMENT PUBLIC INFORMATION Access to Agency Records § 212.38 Predisclosure notification procedures for...
18 CFR 385.606 - Confidentiality in dispute resolution proceedings (Rule 606).
2010-04-01
... be required to disclose, any information concerning any dispute resolution communication or any communication provided in confidence to the neutral, unless: (1) All participants in the dispute resolution... reducing the confidence of participants in future cases that their communications will remain confidential...
Ilgili, Önder; Arda, Berna
This paper presents and analyses, in terms of privacy and confidentiality, the Turkish Draft Law on National DNA Database prepared in 2004, and concerning the use of DNA analysis for forensic objectives and identity verification in Turkey. After a short introduction including related concepts, we evaluate the draft law and provide articles about confidentiality. The evaluation reminded us of some important topics at international level for the developing countries. As a result, the need for sophisticated legislations about DNA databases, for solutions to issues related to the education of employees, and the technological dependency to other countries emerged as main challenges in terms of confidentiality for the developing countries. As seen in the Turkish Draft Law on National DNA Database, the protection of the fundamental rights and freedoms requires more care during the legislative efforts.
Security, privacy, and confidentiality issues on the Internet
Kelly, Grant; McKenzie, Bruce
2002-01-01
We introduce the issues around protecting information about patients and related data sent via the Internet. We begin by reviewing three concepts necessary to any discussion about data security in a healthcare environment: privacy, confidentiality, and consent. We are giving some advice on how to protect local data. Authentication and privacy of e-mail via encryption is offered by Pretty Good Privacy (PGP) and Secure Multipurpose Internet Mail Extensions (S/MIME). The de facto Internet standa...
DEFF Research Database (Denmark)
Schmidt, P T; Hansen, L; Hilsted, L
2004-01-01
BACKGROUND: Cholecystokinin inhibits the secretion of gastrin from antral G cells, an effect that is speculated to be mediated by D cells secreting somatostatin. The aim of the study was to test directly whether cholecystokinin inhibition of antral gastrin secretion is mediated by somatostatin....... METHODS: The effects of CCK on gastrin and somatostatin secretion were studied in isolated vascularly perfused preparations of pig antrum before and after immunoneutralization brought about by infusion of large amounts of a high affinity monoclonal antibody against somatostatin. RESULTS: CCK infusion...... at 10(-9) M and 10(-8) M decreased gastrin output to 70.5% +/- 7.6% (n = 8) and 76.3% +/- 3.6% (n = 7) of basal output, respectively. CCK at 10(-10) M had no effect (n = 6). Somatostatin secretion was dose-dependently increased by CCK infusion and increased to 268 +/- 38.2% (n = 7) of basal secretion...
Dynamic quantum secret sharing
International Nuclear Information System (INIS)
Jia, Heng-Yue; Wen, Qiao-Yan; Gao, Fei; Qin, Su-Juan; Guo, Fen-Zhuo
2012-01-01
In this Letter we consider quantum secret sharing (QSS) between a sender and a dynamic agent group, called dynamic quantum secret sharing (DQSS). In the DQSS, the change of the agent group is allowable during the procedure of sharing classical and quantum information. Two DQSS schemes are proposed based on a special kind of entangled state, starlike cluster states. Without redistributing all the shares, the changed agent group can reconstruct the sender's secret by their cooperation. Compared with the previous quantum secret sharing scheme, our schemes are more flexible and suitable for practical applications. -- Highlights: ► We consider quantum secret sharing between a sender and a dynamic agent group, called dynamic quantum secret sharing (DQSS). ► In the DQSS, the change of the agent group is allowable during the procedure of sharing classical and quantum information. ► Two DQSS schemes are proposed based on a special kind of entangled state, starlike cluster states. ► Without redistributing all the shares, the changed agent group can reconstruct the sender's secret by their cooperation. ► Compared with the previous quantum secret sharing scheme, our schemes are more flexible and suitable for practical applications.
NSGIC State | GIS Inventory — Poultry Houses dataset current as of 2009. WI Livestock Consortium Livestock Premises; confidentiality protected by law; use for animal health emergencies only; some...
International Nuclear Information System (INIS)
Glachant, J.M.; Kimman, R.; Schweickardt, H.E.
2001-05-01
This document brings together 18 testimonies of experts about energy trading: 1 - the energy trading experience on European deregulated markets: structure of deregulated energy markets in Europe, case study: a two years experience of a power exchange in western Europe, case study: European energy exchanges (experience of spot and future trading), case study: risk management on energy deregulated markets; 2 - the trading activity environment and realities in France: the French electrical law and the purchase for resale, experience feedback: status after 3 months of trading in France (the first experience of a French producer), the access to the power transportation network, which legal constraints for trading in France, the access of eligible clients to the French power market, conditions of implementation of a power exchange market in France, which real trading possibilities in France for producers and self-producers in the legal frame, case study: the role of trading in the company (main part or link to process), convergence of gas and electricity markets, gas-electricity trading: which pricing models; 3 - risk management and use of new technologies potentiality, the results outside the French borders: case study: what differences between the European and US markets, prices volatility and commodity risk management: towards the on-line trading, role and developments of E-business in energy trading, how to simplify trade in a liberalized market. (J.S.)
12 CFR 366.13 - What is my obligation regarding confidential information?
2010-01-01
... services on your behalf may use or disclose information obtained from us or a third party in connection... general public. (b) The following are examples of when your use of confidential information is... financial information, such as a financial statement to an unauthorized party. ...
International trade law perspectives on paperless trade and inclusive digital trade
Mitchell, Andrew D.; Mishra, Neha
2017-01-01
Cross-border paperless trade is increasingly important to generate economic gains in a digitalised economy. Several developing and least developed countries will need to modernise their domestic laws and regulations to facilitate cross-border electronic transmissions, particularly to promote cloud computing and electronic payments. In recent trade agreements, trading partners have committed to deeper and more comprehensive provisions on electronic commerce, including adopting domestic laws on...
Data distribution method of workflow in the cloud environment
Wang, Yong; Wu, Junjuan; Wang, Ying
2017-08-01
Cloud computing for workflow applications provides the required high efficiency calculation and large storage capacity and it also brings challenges to the protection of trade secrets and other privacy data. Because of privacy data will cause the increase of the data transmission time, this paper presents a new data allocation algorithm based on data collaborative damage degree, to improve the existing data allocation strategy? Safety and public cloud computer algorithm depends on the private cloud; the static allocation method in the initial stage only to the non-confidential data division to improve the original data, in the operational phase will continue to generate data to dynamically adjust the data distribution scheme. The experimental results show that the improved method is effective in reducing the data transmission time.
75 FR 56096 - Access to Confidential Business Information by Industrial Economics Incorporated
2010-09-15
... ENVIRONMENTAL PROTECTION AGENCY [EPA-HQ-OPPT-2003-0004; FRL-8845-1] Access to Confidential Business Information by Industrial Economics Incorporated AGENCY: Environmental Protection Agency (EPA). ACTION: Notice. SUMMARY: EPA has authorized contractor, Industrial Economics Incorporated (IEI) of...
45 CFR 60.15 - Confidentiality of National Practitioner Data Bank information.
2010-10-01
... 45 Public Welfare 1 2010-10-01 2010-10-01 false Confidentiality of National Practitioner Data Bank information. 60.15 Section 60.15 Public Welfare DEPARTMENT OF HEALTH AND HUMAN SERVICES GENERAL ADMINISTRATION NATIONAL PRACTITIONER DATA BANK FOR ADVERSE INFORMATION ON PHYSICIANS AND OTHER HEALTH CARE PRACTITIONERS...
Zhang, Congyang; Wang, Bo; Li, Wanbin; Huang, Shouqiang; Kong, Long; Li, Zhichun; Li, Liang
2017-10-31
Traditional smart fluorescent materials, which have been attracting increasing interest for security protection, are usually visible under either ambient or UV light, making them adverse to the potential application of confidential information protection. Herein, we report an approach to realize confidential information protection and storage based on the conversion of lead-based metal-organic frameworks (MOFs) to luminescent perovskite nanocrystals (NCs). Owing to the invisible and controlled printable characteristics of lead-based MOFs, confidential information can be recorded and encrypted by MOF patterns, which cannot be read through common decryption methods. Through our conversion strategy, highly luminescent perovskite NCs can be formed quickly and simply by using a halide salt trigger that reacts with the MOF, thus promoting effective information decryption. Finally, through polar solvents impregnation and halide salt conversion, the luminescence of the perovskite NCs can be quenched and recovered, leading to reversible on/off switching of the luminescence signal for multiple information encryption and decryption processes.
Biobanks in South Africa: A global perspective on privacy and confidentiality
Directory of Open Access Journals (Sweden)
Riaan Rheeder
2017-05-01
Full Text Available The Universal Declaration of Bioethics and Human Rights (UDBHR of the United Nations Educational, Scientific and Cultural Organization (UNESCO was adopted unanimously in 2005 by the world community as a universal guideline, according to which members of the global community were accountable to each other. Research results from UNESCO show that the UDBHR has had little or no impact in South Africa (SA. The primary objective of this article is to promote awareness of the UDBHR in SA and Africa by focusing on Article 9 of the Declaration, which accepts the right to privacy and confidentiality. For this objective to be relevant in the SA context, depends on whether the guidelines of the National Department of Health’s Ethics in Health Research: Principles, Processes and Structures of 2015 acknowledge biobanks of the universally accepted ethical guidelines on privacy and confidentiality of autonomous persons and whether these guidelines are broadly in accordance with global bioethical guidelines.
2013-09-06
... received will be included in the public docket without change including any personal information provided, unless the comment includes profanity, threats, or information claimed to be Confidential Business... of appropriate automated electronic, mechanical, or other technological collection techniques or...
75 FR 37253 - Classified National Security Information
2010-06-28
... ``Secret.'' (3) Each interior page of a classified document shall be marked at the top and bottom either... ``(TS)'' for Top Secret, ``(S)'' for Secret, and ``(C)'' for Confidential will be used. (2) Portions... from the informational text. (1) Conspicuously place the overall classification at the top and bottom...
76 FR 69722 - Access to Confidential Business Information by Protection Strategies Incorporated
2011-11-09
... Business Information by Protection Strategies Incorporated AGENCY: Environmental Protection Agency (EPA... Control Act (TSCA) confidential business information and to provide notice that this contract has been extended until December 31, 2011. Protection Strategies Incorporated (PSI) has been the owner of Eagle...
Additive versus multiplicative trade costs and the gains from trade
DEFF Research Database (Denmark)
Sørensen, Allan
This paper addresses welfare effects from trade liberalization in a heterogeneous-fi…rms trade model including the empirically important per-unit (i.e. additive) trade costs in addition to the conventional iceberg (i.e. multiplicative) and fi…xed trade costs. The novel contribution of the paper...... is the result that the welfare gain for a given increase in trade openness is higher for reductions in per-unit (additive) trade costs than for reductions in iceberg (multiplicative) trade costs. The ranking derives from differences in intra-industry reallocations and in particular from dissimilar impacts...
1999-06-25
Human immunodeficiency virus (HIV) counseling and voluntary testing (CT) programs have been an important part of national HIV prevention efforts since the first HIV antibody tests became available in 1985. In 1995, these programs accounted for approximately 15% of annual HIV antibody testing in the United States, excluding testing for blood donation. CT opportunities are offered to persons at risk for HIV infection at approximately 11,000 sites, including dedicated HIV CT sites, sexually transmitted disease (STD) clinics, drug-treatment centers, hospitals, and prisons. In 39 states, testing can be obtained anonymously, where persons do not have to give their name to get tested. All states provide confidential testing (by name) and have confidentiality laws and regulations to protect this information. This report compares patterns of anonymous and confidential testing in all federally funded CT programs from 1995 through 1997 and documents the importance of both types of testing opportunities.
Estimating the elasticity of trade: the trade share approach
Mauro Lanati
2013-01-01
Recent theoretical work on international trade emphasizes the importance of trade elasticity as the fundamental statistic needed to conduct welfare analysis. Eaton and Kortum (2002) proposed a two-step method to estimate this parameter, where exporter fixed effects are regressed on proxies for technology and wages. Within the same Ricardian model of trade, the trade share provides an alternative source of identication for the elasticity of trade. Following Santos Silva and Tenreyro (2006) bot...
Plurilateral Trade Deals: An Alternative for Multilateral Trade Agreements?
Directory of Open Access Journals (Sweden)
Agnes Ghibuțiu
2016-04-01
Full Text Available While multilateral trade negotiations under the World Trade Organization (WTO continue to be in impasse, plurilateral trade negotiations – i.e. among a group of WTO members – have intensified in recent years, and also recorded a series of concrete results in liberalizing specific sectors of international trade. Hence, there is a widely shared view that plurilateral trade negotiations could be an alternative for the multilateral ones. This paper aims to answer the following questions: What are plurilateral trade agreements? Which are the reasons behind the surge in plurilateral negotiations in recent years? What are the main achievements in liberalizing trade at the plurilateral level? What are the advantages of plurilateral negotiations relative to multilateral ones, and why are they considered an attractive alternative for negotiations at the multilateral level?
Act locally, trade globally. Emissions trading for climate policy
Energy Technology Data Exchange (ETDEWEB)
none
2005-07-01
Climate policy raises a number of challenges for the energy sector, the most significant being the transition from a high to a low-CO2 energy path in a few decades. Emissions trading has become the instrument of choice to help manage the cost of this transition, whether used at international or at domestic level. Act Locally, Trade Globally, offers an overview of existing trading systems, their mechanisms, and looks into the future of the instrument for limiting greenhouse gas emissions. Are current markets likely to be as efficient as the theory predicts? What is, if any, the role of governments in these markets? Can domestic emissions trading systems be broadened to activities other than large stationary energy uses? Can international emissions trading accommodate potentially diverse types of emissions targets and widely different energy realities across countries? Are there hurdles to linking emissions trading systems based on various design features? Can emissions trading carry the entire burden of climate policy, or will other policy instruments remain necessary? In answering these questions, Act Locally, Trade Globally seeks to provide a complete picture of the future role of emissions trading in climate policy and the energy sector.
The Position of Suitcase Trading in Turkey’s Foreign Trade and Growth-Suitcase Trading Connection
Directory of Open Access Journals (Sweden)
Sinem YAPAR SAÇIK
2013-12-01
Full Text Available Suitcase trading which is defined as a purchasing process of merchandises in a country that is implemented by travelers (nonresidents to sell those merchandises in their own country; it has started to take place in balance of payments of Turkey since 1996. After the collapse of USSR in 1991 Turkey became a net exporter in suitcase trading so the country reached significant figures occasionally. In this paper the position of suitcase trading in Turkey’s foreign trade is analyzed in consideration of statistical indicators. According to the findings acquired from the study, suitcase trading is a significant variable for Turkey to have currency and to close foreign deficits. Suitcase trading and growth connection is also analyzed by econometric method which is co-integration test and the result is affirmative. And also it is found that this connection is unilateral causation from growth towards suitcase trading according to the findings of Granger causality test
Quantum strongly secure ramp secret sharing
DEFF Research Database (Denmark)
Zhang, Paul; Matsumoto, Rytaro Yamashita
2015-01-01
Quantum secret sharing is a scheme for encoding a quantum state (the secret) into multiple shares and distributing them among several participants. If a sufficient number of shares are put together, then the secret can be fully reconstructed. If an insufficient number of shares are put together...... however, no information about the secret can be revealed. In quantum ramp secret sharing, partial information about the secret is allowed to leak to a set of participants, called an unqualified set, that cannot fully reconstruct the secret. By allowing this, the size of a share can be drastically reduced....... This paper introduces a quantum analog of classical strong security in ramp secret sharing schemes. While the ramp secret sharing scheme still leaks partial information about the secret to unqualified sets of participants, the strong security condition ensures that qudits with critical information can...
75 FR 44951 - Inquiry To Learn Whether Businesses Assert Business Confidentiality Claims
2010-07-30
... such treatment. Certain businesses, however, do not meet the definition of ``affected business,'' and... definition of ``affected business,'' and are not covered by today's notice. They consist of any business that... Businesses Assert Business Confidentiality Claims AGENCY: Environmental Protection Agency (EPA). ACTION...
76 FR 362 - Inquiry To Learn Whether Businesses Assert Business Confidentiality Claims
2011-01-04
... claims for such treatment. Certain businesses, however, do not meet the definition of ``affected business.... Certain businesses, however, do not meet the definition of ``affected business,'' and are not covered by... Businesses Assert Business Confidentiality Claims AGENCY: Environmental Protection Agency (EPA). ACTION...
Scheduler-specific Confidentiality for Multi-Threaded Programs and Its Logic-Based Verification
Huisman, Marieke; Ngo, Minh Tri
2011-01-01
Observational determinism has been proposed in the literature as a way to ensure confidentiality for multi-threaded programs. Intuitively, a program is observationally deterministic if the behavior of the public variables is deterministic, i.e., independent of the private variables and the
75 FR 55577 - Clean Water Act; Contractor Access to Confidential Business Information
2010-09-13
... ENVIRONMENTAL PROTECTION AGENCY [FRL-9200-8] Clean Water Act; Contractor Access to Confidential... Recovery Act (RCRA). Transfer of the information will allow the contractor and subcontractors to access... contractors and subcontractors over the history of the effluent guidelines program. EPA determined that this...
77 FR 60962 - Clean Water Act; Contractor Access to Confidential Business Information
2012-10-05
... ENVIRONMENTAL PROTECTION AGENCY 40 CFR Part 2 [FRL-9733-8] Clean Water Act; Contractor Access to... transfer of confidential business information to contractor, subcontractors, and consultants. SUMMARY: The... certain industries. We have determined that the contractors listed below require access [[Page 60963
75 FR 60452 - Clean Water Act; Contractor Access to Confidential Business Information
2010-09-30
... ENVIRONMENTAL PROTECTION AGENCY [FRL-9208-9] Clean Water Act; Contractor Access to Confidential... electric industry to a new subcontractor of a contractor, Eastern Research Group (ERG). EPA previously... contractors and subcontractors to access information necessary to support EPA in the planning, development...
78 FR 49963 - Heavy-Duty Engine and Vehicle and Nonroad Technical Amendments
2013-08-16
... future model year in which your average CO 2 level exceeds the standard. You may trade credits to another..., Confidential business information, Environmental protection, Incorporation by reference, Labeling, Motor... Environmental protection, Administrative practice and procedure, Air pollution control, Confidential business...
19 CFR 181.122 - Disclosure to government authorities.
2010-04-01
... Section 181.122 Customs Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY; DEPARTMENT OF THE TREASURY (CONTINUED) NORTH AMERICAN FREE TRADE AGREEMENT Confidentiality of Business... the disclosure of confidential business information to governmental authorities in the United States...
Contributory factors in surgical incidents as delineated by a confidential reporting system.
Mushtaq, F; O'Driscoll, C; Smith, Fct; Wilkins, D; Kapur, N; Lawton, R
2018-05-01
Background Confidential reporting systems play a key role in capturing information about adverse surgical events. However, the value of these systems is limited if the reports that are generated are not subjected to systematic analysis. The aim of this study was to provide the first systematic analysis of data from a novel surgical confidential reporting system to delineate contributory factors in surgical incidents and document lessons that can be learned. Methods One-hundred and forty-five patient safety incidents submitted to the UK Confidential Reporting System for Surgery over a 10-year period were analysed using an adapted version of the empirically-grounded Yorkshire Contributory Factors Framework. Results The most common factors identified as contributing to reported surgical incidents were cognitive limitations (30.09%), communication failures (16.11%) and a lack of adherence to established policies and procedures (8.81%). The analysis also revealed that adverse events were only rarely related to an isolated, single factor (20.71%) - with the majority of cases involving multiple contributory factors (79.29% of all cases had more than one contributory factor). Examination of active failures - those closest in time and space to the adverse event - pointed to frequent coupling with latent, systems-related contributory factors. Conclusions Specific patterns of errors often underlie surgical adverse events and may therefore be amenable to targeted intervention, including particular forms of training. The findings in this paper confirm the view that surgical errors tend to be multi-factorial in nature, which also necessitates a multi-disciplinary and system-wide approach to bringing about improvements.