WorldWideScience

Sample records for university confidential invention

  1. Confidential patent application with an example of preparation

    Directory of Open Access Journals (Sweden)

    Obrad T. Čabarkapa

    2013-12-01

    Full Text Available In order that the invention solving a technical problem receives a patent protection, it is necessary to file a patent application. For the protection of confidential inventions which are important for defense and national security, a confidential patent application[1] must be filed. A confidential patent application is an important and complex document, the parts of which are,  in principle, exposed in an established order. For the preparation of patent applications, it is necessary to engage experts with higher education, primarily in the technical field the invention relates to. The contents of the patent application is a basis for examining whether the application meets the requirements for patentability and whether the right to patent protection is achieved. Besides theoretical discussions on patent application, the paper gives a short version of an example of an application regarding a protected confidential invention. Introduction The basic condition for the exercise of patent protection is filing a patent application, the test procedure and, eventually, depending on the test results - the recognition or rejection of the patent. The paper gives a description of all parts of the patent application on an example of a confidential invention already patented. The content of the confidential patent application The confidential patent application for confidential invention protection consists of the following parts: The application for a patent; description of the invention; the claims (indication of what is new and what is required to be protected by patenting; abstract (short summary of the invention  and a draft of the invention (to which the description and the claims are referred. The application for a patent The application for patent is filed on Form P-1 and a request for the petty patent on Form MP-1. The data entered in the file is, for example: the applicant; the lawyer; the name of the invention in Serbian and English; the inventor

  2. University Student Expectations of Confidentiality When Disclosing Information to Their Professors

    Science.gov (United States)

    Harris, Gregory E.; Dalton, Stephanie

    2014-01-01

    The purpose of this study was to explore university students' expectations of confidentiality when they make disclosures to their university professors. A secondary purpose was to consider if students have a higher expectation of confidentiality when talking with Psychology professors versus professors in other disciplines. Students were asked to…

  3. Commercialising university inventions for sustainability : A case study of (non-)intermediating 'cleantech' at Aalto University

    NARCIS (Netherlands)

    Kivimaa, Paula; Boon, Wouter; Antikainen, Riina

    2017-01-01

    The challenge to transform towards more sustainable societies requires action on multiple levels, including commercialisation of inventions created in universities. We examine intermediation in the pre-commercialisation phase of cleantech inventions developed at Aalto University, Finland, focusing

  4. The Invention Studio: A University Maker Space and Culture

    Science.gov (United States)

    Forest, Craig R.; Moore, Roxanne A.; Jariwala, Amit S.; Fasse, Barbara Burks; Linsey, Julie; Newstetter, Wendy; Ngo, Peter; Quintero, Christopher

    2014-01-01

    Creativity, invention, and innovation are values championed as central pillars of engineering education. However, university environments that foster open-ended design-build projects are uncommon. Fabrication and prototyping spaces at universities are typically "machine shops" where students relinquish actual fabrication activities to…

  5. Technological Innovation and Beyond: Exploring Public Value of University Inventions Based on Contingent Effectiveness Model

    DEFF Research Database (Denmark)

    Milana, Evita; Li-Ying, Jason; Faria, Lourenco

    2017-01-01

    University inventions are traditionally seen as significant input into development of new technologies and innovations in the market as they generate growth and regional development. (REF) Yet, these inventions developed into new technologies can simultaneously create public values such as those...... that are related with sustainability goals. In this paper, we apply the Contingent Effectiveness Model by Bozeman et.al. (2015) as a framework to consider the effectiveness of technology transfer from university to industry via licensing, and examine what values derive during the commercialization process...... of university inventions. We define four main values: technological, economic, social and environmental, and place the latter two under the concept of public value. The aim of this paper is to expand the understanding of public value and incorporate it into technology transfer literature. We assign...

  6. Can Universities Profit from General Purpose Inventions?

    DEFF Research Database (Denmark)

    Barirani, Ahmad; Beaudry, Catherine; Agard, Bruno

    2017-01-01

    The lack of control over downstream assets can hinder universities’ ability to extract rents from their inventive activities. We explore this possibility by assessing the relationship between invention generality and renewal decisions for a sample of Canadian nanotechnology patents. Our results s...

  7. Patentna zaštita poverljivih pronalazaka / Patent protection of classified invention

    Directory of Open Access Journals (Sweden)

    Obrad T. Čabarkapa

    2008-10-01

    Full Text Available Svaki pronalazak za koji se utvrdi da je značajan za odbranu i bezbednost Republike Srbije smatra se poverljivim. Za patentnu zaštitu poverljivih pronalazaka podnosi se prijava organu nadležnom za poslove odbrane, koji ima isključivo pravo da raspolaže poverljivim pronalascima1. U organizacijskoj jedinici nadležnoj za poslove naučne i inovacione delatnosti2 realizuje postupak ispitivanja poverljivih prijava patenata. Da bi se donela ocena o poverljivosti prijavljenog pronalaska neophodno je realizovati određene faze u postupku ispitivanja prijave. Poverljivi pronalazak se ne objavljuje, a pronalazač, nakon priznavanja patenta, u skladu sa zakonskim propisima, ima određena moralna i materijalna prava. / Every invention established to be of significance for defense or security of the Republic of Serbia is considered to be a classified invention. For the purpose of patent protection of classified inventions, a confidential application must be submitted to a relevant defense authority having the exclusive right to deal with classified inventions3. An organizational unit competent for scientific and innovation issues carries out the examination of classified patent applications. In order to evaluate classification of the submitted invention, regarding its significance for defense or security of the country as well as to make the final decision on the application, the examination procedure should be carried out through several phases. A classified invention is not to be published and once the patent has been approved, the inventor enjoys moral and material rights in accordance with law.

  8. Book Review: Inventing the Market: Smith, Hegel & Political Theory by Liza Herzog

    DEFF Research Database (Denmark)

    Boscan, Luis

    2014-01-01

    Review of: Inventing the Market: Smith, Hegel & Political Theory. Liza Herzog. Oxford University Press. April 2013.......Review of: Inventing the Market: Smith, Hegel & Political Theory. Liza Herzog. Oxford University Press. April 2013....

  9. Protecting confidentiality rights: the need for an ethical practice model.

    Science.gov (United States)

    Fisher, Mary Alice

    2008-01-01

    All psychologists must uphold the same ethical standards about confidentiality even though each state imposes different legal limits on their ability to protect clients' confidences. The resulting ethical-legal confusion is exacerbated by legally based confidentiality training that treats legal exceptions as if they were the rule and fosters the impression that attorneys are now the only real experts about this aspect of practice. This article provides an ethics-based confidentiality practice model that clarifies the ethical rule and puts its legal exceptions into ethical perspective. Like the Confidentiality section of the American Psychological Association's (2002) Ethical Principles of Psychologists and Code of Conduct, this outline would apply to all psychologists regardless of state laws, but the details of its implementation would vary according to role and setting. It can be used as a universal training outline, a consultation and supervision tool, a guide to professional practice, and a basis for clearer ongoing conversation about the ethics of "conditional confidentiality." Psychologists can use this practice model to regain their status as experts about the confidentiality ethics of their own profession. PsycINFO Database Record (c) 2008 APA, all rights reserved.

  10. Pierre Sikivie from the University of Florida invented the working principle of all magnetic axion telescopes, such as CAST.

    CERN Multimedia

    Claudia Marcelloni

    2006-01-01

    The possible existence of axions in the universe means that they are a candidate for (very) cold dark matter, as another axion pioneer, Pierre Sikivie, from the University of Florida explained during the first Joint ILIAS-CAST-CERN Axion Training workshop. He also described the technique that he invented in 1983 for detecting axions. The idea is that axions in the galactic halo may be resonantly converted to microwave photons in a cavity permeated by a strong magnetic field.

  11. Confidentiality of Accounting Academics: Consequences of Nonconformity

    Science.gov (United States)

    Amponsah, Emmanuel B.; Boateng, Peter Agyekum; Onuoha, Luke N.

    2016-01-01

    This paper examined ways by which nonconformity to confidentiality among accounting academics could lead to increased-recruitment-and-legal-costs to their employing universities in Ghana that offered accounting degree programmes. With a cross-sectional design, data collected from 1,225 accountants analysed via Cronbach's alpha,…

  12. Invention class

    International Nuclear Information System (INIS)

    Wang, Yeon Jung

    1990-03-01

    This book gives descriptions of whole conception of patent, which includes invention and human, the way to invent, ten commandments of invention, 50 well-known inventions and inventors, conception of industrial property right system, measures on industrial property right practice, measures on industrial property right invasion, the best 10 patent dispute in history, the best 10 real patent cases in history, field of patent invention, inventions and supporting system of technical development ; supporting by the patent and trademark office and the commerce-industry ministry.

  13. Confidentiality and personal integrity.

    Science.gov (United States)

    Edgar, A

    1994-06-01

    This paper uses the social theory of Erving Goffman in order to argue that confidentiality should be understood in relation to the mundane social skills by which individuals present and respect specific self-images of themselves and others during social interaction. The breaching of confidentiality is analysed in terms of one person's capacity to embarrass another, and so to expose that person as incompetent. Respecting confidentiality may at once serve to protect the vulnerable from an unjust society, and yet also protect the guilty from just accusation. Ethical reasoning about confidentiality must therefore recognize the dangers of prejudice and violence inherent in decisions to breach or to respect confidentiality. Case studies are used to illustrate the efficacy of this account, culminating with analyses of three examples from the UKCC document Confidentiality.

  14. Humanisme : inventer l'avenir

    Science.gov (United States)

    Mayor, Federico

    2014-06-01

    Humanism: inventing the future - Humanity is still confronted by the scourges of poverty, hunger, violence and inequality. If we are to invent a better future, we must first understand the past, recalling the missed opportunities of 1918, 1945 and 1989, at the end of two world wars and a cold war. This article summarises the proposals put forward by the author on several occasions during his career. He expresses a forceful confidence in humankind's ability to take control of its destiny and shake off government that puts economic interest before universal human values. The twenty-first century should be the era of rebellion in cyberspace, one in which more women and young people are involved in decision making, heralding a future of freedom and happiness for all.

  15. Physician Knowledge and Attitudes around Confidential Care for Minor Patients.

    Science.gov (United States)

    Riley, Margaret; Ahmed, Sana; Reed, Barbara D; Quint, Elisabeth H

    2015-08-01

    Minor adolescent patients have a legal right to access certain medical services confidentially without parental consent or notification. We sought to assess physicians' knowledge of these laws, attitudes around the provision of confidential care to minors, and barriers to providing confidential care. An anonymous online survey was sent to physicians in the Departments of Family Medicine, Internal Medicine-Pediatrics, Obstetrics/Gynecology, and Pediatrics at the University of Michigan. Response rate was 40% (259/650). The majority of physicians felt comfortable addressing sexual health, mental health, and substance use with adolescent patients. On average, physicians answered just over half of the legal knowledge questions correctly (mean 56.6% ± 16.7%). The majority of physicians approved of laws allowing minors to consent for confidential care (90.8% ± 1.7% approval), while substantially fewer (45.1% ± 4.5%) approved of laws allowing parental notification of this care at the physician's discretion. Most physicians agreed that assured access to confidential care should be a right for adolescents. After taking the survey most physicians (76.6%) felt they needed additional training on confidentiality laws. The provision of confidential care to minors was perceived to be most inhibited by insurance issues, parental concerns/relationships with the family, and issues with the electronic medical record. Physicians are comfortable discussing sensitive issues with adolescents and generally approve of minor consent laws, but lack knowledge about what services a minor can access confidentially. Further research is needed to assess best methods to educate physicians about minors' legal rights to confidential healthcare services. Copyright © 2015 North American Society for Pediatric and Adolescent Gynecology. Published by Elsevier Inc. All rights reserved.

  16. The Software Invention Cube: A classification scheme for software inventions

    NARCIS (Netherlands)

    Bergstra, J.A.; Klint, P.

    2008-01-01

    The patent system protects inventions. The requirement that a software invention should make ‘a technical contribution’ turns out to be untenable in practice and this raises the question, what constitutes an invention in the realm of software. The authors developed the Software Invention Cube

  17. Biobanks in South Africa: A global perspective on privacy and confidentiality

    Directory of Open Access Journals (Sweden)

    Riaan Rheeder

    2017-05-01

    Full Text Available The Universal Declaration of Bioethics and Human Rights (UDBHR of the United Nations Educational, Scientific and Cultural Organization (UNESCO was adopted unanimously in 2005 by the world community as a universal guideline, according to which members of the global community were accountable to each other. Research results from UNESCO show that the UDBHR has had little or no impact in South Africa (SA. The primary objective of this article is to promote awareness of the UDBHR in SA and Africa by focusing on Article 9 of the Declaration, which accepts the right to privacy and confidentiality. For this objective to be relevant in the SA context, depends on whether the guidelines of the National Department of Health’s Ethics in Health Research: Principles, Processes and Structures of 2015 acknowledge biobanks of the universally accepted ethical guidelines on privacy and confidentiality of autonomous persons and whether these guidelines are broadly in accordance with global bioethical guidelines.

  18. University Technology Transfer

    Directory of Open Access Journals (Sweden)

    Mike Cox

    2004-09-01

    Full Text Available This article describes the experiences and general observations of the author at Heriot-Watt University and concerns the transfer of university technology for the purposes of commercialisation. Full commercial exploitation of a university invention generally requires transferring that technology into the industrial arena, usually either by formation of a new company or licensing into an existing company. Commercialisation activities need to be carried out in unison with the prime activities of the university of research and teaching. Responsibility for commercialising university inventions generally rests with a specific group within the university, typically referred to as the technology transfer group. Each technology transfer should be considered individually and appropriate arrangements made for that particular invention. In general, this transfer process involves four stages: identification, evaluation, protection and exploitation. Considerations under these general headings are outlined from a university viewpoint. A phased approach is generally preferred where possible for the evaluation, protection and exploitation of an invention to balance risk with potential reward. Evaluation of the potential opportunity for a university invention involves essentially the same considerations as for an industrial invention. However, there are a range of commercial exploitation routes and potential deals so that only general guidelines can be given. Naturally, the final deal achieved is that which can be negotiated. The potential rewards for the university and inventor are both financial (via licensing income and equity realisation and non-financial.

  19. Perceptions of the Invention Disclosure Process at a Federal Laboratory after the America Invents Act of 2011

    Science.gov (United States)

    Rice-Moore, Sharla V.

    The America Invents Act of 2011 reformed the patent process in the United States. This study focused on the effect of one provision which allows the first inventor to file the application of patent to become the owner of the intellectual property. Prior to this, the Patent and Trademark Act of 1980 allowed small businesses, universities, and non-profit institutions to pursue ownership of intellectual property developed from federally funded research. The new regulations could influence government employees' disclosure of invention and new technology. There is limited research on the disclosure of technology process for government employees. This study examined 1,389 invention disclosure forms from March 2009 to March 2015 during three phases of the law: before it was signed, before the implementation of the first inventor to file provision in 2013, and after full enactment. The reported State of Development showed significant changes prior to implementation for large companies. The findings reveal disclosures were filed at an earlier stage of development, but no change was noted in the significance of the technology. A survey was also distributed using the framework of Organizational Justice theory. The results showed the disclosure reporting process was fair and unbiased. The research supports the efforts of management to keep employees informed about the disclosure process and the importance of technology transfer of government developed innovation. Key words: America Invents Act, Organizational Justice, patent process.

  20. Summary Robert Noyce and the invention of Silicon Valley

    CERN Document Server

    2014-01-01

    This work offers a summary of the book "THE MAN BEHIND THE MICROCHIP: Robert Noyce and the Invention of Silicon Valley""by Leslie Berlin.The Man behind the Microchip is Leslie Berlin's first book. This author is project historian for the Silicon Valley Archives, a division of the Stanford University Department of Special Collections. This book tells the story of a giant of the high-tech industry: the multimillionaire Bob Noyce. This co-founder of Fairchild Semiconductor and Intel co-invented the integrated circuit which became the electronic heart of every modern computer, automobile, advance

  1. High-Technology Companies Often Turn to Colleges for Confidential 'Beta Tests' of New Products.

    Science.gov (United States)

    Turner, Judith Axler

    1988-01-01

    Beta testing--the process of trying a product in a real-world setting before releasing it commercially--exploits a natural interface between universities and high-technology industries. High-tech companies need confidential, real-world tests of new products, and universities are eager to get an early look at tomorrow's technology. (MLW)

  2. Leisure Time Invention

    DEFF Research Database (Denmark)

    Davis, Lee N.; Davis, Jerome D.; Hoisl, Karin

    2013-01-01

    the employee is away from the workplace. We build on existing theory in the fields of organizational creativity and knowledge recombination, especially work relating context to creativity. The paper’s main theoretical contribution is to extend our understanding of the boundaries of employee creativity......This paper studies the contextual factors that influence whether invention occurs during work time or leisure time. Leisure time invention, a potentially important but thus far largely unexplored source of employee creativity, refers to invention where the main underlying idea occurs while...... by adding to the discussion of how access to and exploitation of different types of resources—during work hours or during leisure time — may affect creativity. Based on survey data from more than 3,000 inventions from German employee inventors, we find that leisure time inventions are more frequently...

  3. Confidentiality and integrity in crowdsourcing systems

    CERN Document Server

    Ranj Bar, Amin

    2014-01-01

    Confidentiality and Integrity in Crowdsourcing Systems focuses on identity, privacy, and security related issues in crowdsourcing systems and in particular the confidentiality and integrity of online data created via crowdsourcing. This book begins with an introduction to crowdsourcing and then covers the privacy and security challenges of Confidentiality. The book examines integrity in these systems and the management and control of crowdsourcing systems.

  4. A challenge to unqualified medical confidentiality.

    Science.gov (United States)

    Bozzo, Alexander

    2018-04-01

    Medical personnel sometimes face a seeming conflict between a duty to respect patient confidentiality and a duty to warn or protect endangered third parties. The conventional answer to dilemmas of this sort is that, in certain circumstances, medical professionals have an obligation to breach confidentiality. Kenneth Kipnis has argued, however, that the conventional wisdom on the nature of medical confidentiality is mistaken. Kipnis argues that the obligation to respect patient confidentiality is unqualified or absolute, since unqualified policies can save more lives in the long run. In this paper, I identify the form of Kipnis's argument and present a challenge to it. I conclude that, as matters stand now, a qualified confidentiality policy is the more rational choice. © Article author(s) (or their employer(s) unless otherwise stated in the text of the article) 2018. All rights reserved. No commercial use is permitted unless otherwise expressly granted.

  5. How James Watt invented the copier forgotten inventions of our great scientists

    CERN Document Server

    Schils, René

    2012-01-01

    Features 25 different scientists and the ideas which may not have made them famous, but made history… Typically, we remember our greatest scientists from one single invention, one new formula or one incredible breakthrough. This narrow perspective does not give justice to the versatility of many scientists who also earned a reputation in other areas of science. James Watt, for instance, is known for inventing the steam engine, yet most people do not know that he also invented the copier. Alexander Graham Bell of course invented the telephone, but only few know that he invented artificial breathing equipment, a prototype of the ‘iron lung’. Edmond Halley, whose name is associated with the comet that visits Earth every 75 years, produced the first mortality tables, used for life insurances. This entertaining book is aimed at anyone who enjoys reading about inventions and discoveries by the most creative minds. Detailed illustrations of the forgotten designs and ideas enrich the work throughout.

  6. Confidential donation confirmation as an alternative to confidential unit exclusion: 15 months experience of the HEMOMINAS foundation

    Directory of Open Access Journals (Sweden)

    Flávia Cristine Martineli Loureiro

    2011-01-01

    Full Text Available BACKGROUND: Confidential unit exclusion remains a controversial strategy to reduce the residual risk of transfusion-transmitted infections. OBJECTIVE: This study aimed to analyze confidential unit exclusion from its development in a large institution in light of confidential donation confirmation. METHODS: Data of individuals who donated from October 1, 2008 to December 31, 2009 were analyzed in a case-control study. The serological results and sociodemographic characteristics of donors who did not confirm their donations were compared to those who did. Variables with p-values < 0.20 in univariate analysis were included in a logistic multivariate analysis. RESULTS: In the univariate analysis there was a statically significant association between positive serological results and response to confidential donation confirmation of "No". Donation type, (firsttime or return donor - OR 1.69, CI 1.37-2.09, gender (OR 1.66, CI 1.35-2.04, education level (OR 2.82, CI 2.30-3.47 and ethnic background (OR 0.67, CI 0.55-0.82 were included in the final logistic regression model. In all logistic regression models analyzed, the serological suitability and confidential donation confirmation were not found to be statistically associated. The adoption of new measures of clinical classification such as audiovisual touch-screen computer-assisted self-administered interviews might be more effective than confidential unit exclusion in the identification of donor risk behavior. The requirement that transfusion services continue to use confidential unit exclusion needs to be debated in countries where more specific and sensitive clinical and serological screening methods are available. CONCLUSION: Our findings suggest that there are not enough benefits to justify continued use of confidential donation confirmation in the analyzed institution.

  7. 22 CFR 130.15 - Confidential business information.

    Science.gov (United States)

    2010-04-01

    ..., confidential business information means commercial or financial information which by law is entitled to... 22 Foreign Relations 1 2010-04-01 2010-04-01 false Confidential business information. 130.15... CONTRIBUTIONS, FEES AND COMMISSIONS § 130.15 Confidential business information. (a) Any person who is required...

  8. Secret of success for invention technology

    International Nuclear Information System (INIS)

    Kim, Gwan Hyeong

    1990-12-01

    This book deals with importance, meaning, history of invention technology, technique of invention technology, and invention in connection with the duties. It covers importance, meaning, flow of invention technology development, basis of invention technology development, development, development investment, development workforce of invention technology, and development of invention technology introduction. It also contains outline, research, management of technology development information, outline, research, management of patent information, and reality of invention technology research development.

  9. 7 CFR 1280.634 - Confidentiality.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 10 2010-01-01 2010-01-01 false Confidentiality. 1280.634 Section 1280.634 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (MARKETING... persons voting in the referendum and ballots shall be confidential and the contents of the ballots shall...

  10. Review of The Invention of Enterprise

    Directory of Open Access Journals (Sweden)

    Michael E. Marotta

    2011-05-01

    Full Text Available The Invention of Enterprise: Entrepreneurship from Ancient Mesopotamia to Modern Times, David S. Landes, Joel Mokyr, and William J. Baumol, eds., Princeton University Press, 2010, is a dense anthology that provides an “orbital view” of the history of trade and commerce. The essays encompass several theoretic frameworks while following three themes: the creation of enterprises; the distinctions between creative and corrosive capitalism; and the societies that engender those different modes.

  11. 15 CFR 806.5 - Confidentiality.

    Science.gov (United States)

    2010-01-01

    ... 15 Commerce and Foreign Trade 3 2010-01-01 2010-01-01 false Confidentiality. 806.5 Section 806.5 Commerce and Foreign Trade Regulations Relating to Commerce and Foreign Trade (Continued) BUREAU OF ECONOMIC ANALYSIS, DEPARTMENT OF COMMERCE DIRECT INVESTMENT SURVEYS § 806.5 Confidentiality. Information...

  12. L’invention instrumentale

    Directory of Open Access Journals (Sweden)

    Jacques Dewitte

    2011-03-01

    Full Text Available L’instrument de musique n’a pas d’identité déterminée avant qu’il ne soit joué par un musicien concret, ou utilisé dans une œuvre singulière. Pour Stravinsky, l’instrument de musique « n’est rien en soi ». C’est l’œuvre, comme invention et création, qui donne à l’instrument son identité, sur la base de propriétés organologiques préexistantes. Les œuvres de Stravinsky pour petite formation illustrent cette idée d’une invention de l’instrument de musique par l’œuvre qu’il joue, ainsi que son amour pour des instruments nouveaux ou « nouveaux pour lui » (le cymbalum. L’invention instrumentale (qui n’est pas ici création d’un nouvel instrument consiste à faire sonner de manière neuve un instrument déjà existant. Cette invention suppose une « érotique » musicale, un amour spécifique pour les instruments et les altérités dont ils sont porteurs. Tout se passe alors comme si un a priori (une possibilité musicale enfouie dans l’instrumentA musical instrument has no specific identity until it is played by a concrete musician or used in a singular work. According to Stravinsky, a musical instrument is « nothing in itself ». Only a work, as a process of invention and creation, gives an instrument its identity on the basis of pre-existing organologic properties. Stravinsky’s works for small ensembles show how musical instruments may be invented by the work which they play, as well as the composer’s love for instruments that are new or “new for him” (such as the cymbalo. Musical invention (which does not mean here the creation of a new instrument consists in giving a new ring to an existing instrument. This kind of invention implies a notion of musical “eroticism”, that is a specific love for instruments and the otherness they may bear. Everything is happening as though an a priori quality (a musical possibility buried in the instrument appeared only a posteriori

  13. Invention note and patent note

    International Nuclear Information System (INIS)

    Chang, Sung Su

    1997-09-01

    This book deals with origin of invention and term related patent and invention, making idea, brain storming, 10 laws of invention skill, attitude of inventors, invention order, making good inventions, patent system, preparation of application, procedure and method of patent, management of patent, patent and trademark office, patent lawyer, copyright, new intellectual property right, industrial property right, trademark, invasion of industrial property right, patent, Judgment, preparation of items, application of industrial property right and effect of inventor and related people.

  14. Non-Intentional Invention: The Promethean, Trickster, and Improvisational Invention Heuristics of Academic Writers and Poets

    Science.gov (United States)

    Wirtz, Jason

    2013-01-01

    This essay introduces a novel way to conceptualize writerly invention -- invention as adopting a non-intentional intellectual stance wherein heuristics are experienced as acting upon the writer as opposed to being enacted by the writer. This view of invention complicates and extends the traditional, Aristotelian view of invention as discreet…

  15. Safeguarding critical e-documents implementing a program for securing confidential information assets

    CERN Document Server

    Smallwood, Robert F

    2012-01-01

    Practical, step-by-step guidance for corporations, universities and government agencies to protect and secure confidential documents and business records Managers and public officials are looking for technology and information governance solutions to "information leakage" in an understandable, concise format. Safeguarding Critical E-Documents provides a road map for corporations, governments, financial services firms, hospitals, law firms, universities and other organizations to safeguard their internal electronic documents and private communications.Provides practical, step-by-step guidance o

  16. Confidentiality in psychological practice: a decrepit concept?

    Science.gov (United States)

    McMahon, M; Knowles, A D

    1995-11-01

    Although the principle of confidentiality in the relationship between psychologists and client has been vaunted, and is emphasised in the Australian Psychological Society's Code of Professional Conduct (the APS code; 1994), the confidentiality of this relationship is circumscribed by the absence of legal protections, the ethical beliefs of psychologists, institutional practices, and the provisions of the APS code itself. Lack of privilege in judicial proceedings, and statutory obligations to report certain types of behaviour, mandate breaches of confidentiality in some circumstances. Ethical beliefs of psychologists may support disclosure, especially where it is believed that there is danger of serious physical harm to the client or others. Multidisciplinary teams and institutional settings require the exchange of information for optimal delivery of services. Recent amendments to the APS code may require disclosure without the client's consent when a client is believed to be suicidal. Such developments, when considered at all, are typically regarded as exceptions to a general obligation of confidentiality. However, discussion of exceptions presupposes agreement on fundamental principle: the significance of, and rationale for, confidentiality in the psychologist-client relationship. It is argued in this paper that the obligation of confidentiality has been assumed rather than vigorously analysed and empirically explored. A critical examination of this obligation is the most appropriate starting point for the rehabilitation of contemporary principles of confidentiality in the psychologist-client relationship.

  17. Entrepreneurship and University Licensing

    NARCIS (Netherlands)

    Brouwer, M.

    2005-01-01

    Outside invention has gained in importance as universities are actively seeking commercialization of their inventions since the passage of the Bayh-Dole Act. The paper analyzes the incentives to invent for outside and inside inventors. It is shown that outside inventors have greater incentives to

  18. SCHOOL ECONOMY IN THE INVENTING EDUCATION PARADIGM

    Directory of Open Access Journals (Sweden)

    Anatoliy Alexandrovich Lepeshev

    2018-01-01

    Full Text Available Requirements applied to specialists for working in the sixth wave of innovation, i.e. Industry 4.0, determines the necessity of education system improvement concerning training solution and, as a result, creation of inventive ideas. Today in our country this process is stimulated by various competitions, including financing for the implementation of results. In training programs knowledge approach still prevails. The corresponding methods, along with stimulation, are included into educational programs in leading foreign educational institutions, mostly at universities. If in previous decades mostly divergent methods were studied (morphological analysis, the focal objects method, synectics, etc., then now the leading place is taken by theory of inventive problem solving – TRIZ created in the former USSR by G.S. Altshuller in connection with the increasing leading corporations requirement for specialists in TRIZ. This fact gives Russia essential competitive advantages in the innovative way of development. For effective use of this advantage it is important to form the TRIZ-based innovative thinking beginning from school days. For this purpose authors developed new methods in TRIZ-pedagogics, uniting metasubject results (in higher education institutions – competences into the system of innovative thinking. As a result, both educational and economic effects are achieved: the intellectual property created in educational process. For schools it is the possibility of significant improvement of financing causing importance of new mechanisms of intellectual property fixation, protection and implementation. Recommendations about creation of such system are provided in the article. Purpose Defining the opportunities and ways of improving economic effectiveness of educational activities in the paradigm of inventive education. Tasks: – analysis of school education institutions experience in implementation of approaches preceding the inventing education

  19. Computer Security: Printing confidentially

    CERN Document Server

    Stefan Lueders, Computer Security Team

    2015-01-01

    Have you ever hesitated to print a confidential document using CERN printers? Or perhaps you have rushed quickly to the printer after hitting the “print” button in order to avoid someone else getting hold of and reading your document? These times are over now with the new printing infrastructure!   Indeed, many of us regularly print out confidential documents like our salary slips, MARS forms, tendering documents and drafts of preliminary papers. The upcoming CERN data protection policy will require all of us to respect the confidentiality of such documents and, as the word “confidential” implies, access to “confidential” or sensitive documents will be tightly controlled. What can we do about the public printers located in many buildings, floors and shared spaces - accessible not only to CERN staff and users but also to visitors and guests? Some printers are located in the vicinity of restaurants, cafeterias or close to paths taken b...

  20. Invention/Re-invention

    OpenAIRE

    Mera, M.

    2009-01-01

    This article examines the relationship between texts that are re-invented for different media and/or contexts including: film remakes, prequels and sequels, video games that become films and vice versa, internet mashups, and television series that move across geographical borders. The article points to significant sources in this emerging field and presents some of the challenges that arise in relation to its study. In particular questions of originality, fidelity, repetition and difference a...

  1. 7 CFR 1150.278 - Confidential treatment.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 9 2010-01-01 2009-01-01 true Confidential treatment. 1150.278 Section 1150.278 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (Marketing... of Milk Producer Organizations § 1150.278 Confidential treatment. All documents and other information...

  2. 40 CFR 716.55 - Confidentiality claims.

    Science.gov (United States)

    2010-07-01

    ... confidential business information, health and safety studies of any substance or mixture that has been offered for commercial distribution (including for test marketing purposes and for use in research and... because disclosure would reveal a confidential process or quantitative mixture composition should briefly...

  3. 7 CFR 1206.107 - Confidential information.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 10 2010-01-01 2010-01-01 false Confidential information. 1206.107 Section 1206.107 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (MARKETING... INFORMATION Referendum Procedures. § 1206.107 Confidential information. The ballots and other information or...

  4. The Confidentiality of Interlibrary Loan Records.

    Science.gov (United States)

    Nolan, Christopher W.

    1993-01-01

    Discusses potential problems for confidentiality within interlibrary loan requests, outlines legal issues related to confidentiality, and proposes guidelines intended to protect library users' rights to privacy. Interlibrary loan documentation procedures are considered; laws and professional standards are reviewed; and the disposition of…

  5. 31 CFR 9.6 - Confidential information.

    Science.gov (United States)

    2010-07-01

    ... 9.6 Money and Finance: Treasury Office of the Secretary of the Treasury EFFECTS OF IMPORTED ARTICLES ON THE NATIONAL SECURITY § 9.6 Confidential information. Information submitted in confidence which... marked “Business Confidential.” [40 FR 50717, Oct. 31, 1975] ...

  6. 15 CFR 705.6 - Confidential information.

    Science.gov (United States)

    2010-01-01

    ... EFFECT OF IMPORTED ARTICLES ON THE NATIONAL SECURITY § 705.6 Confidential information. (a) Any... the investigation that would disclose national security classified information or business... Security Classified” or “Business Confidential,” as appropriate, marked at the top of each sheet. Any...

  7. Inventors and Inventions.

    Science.gov (United States)

    Dawson, Tom

    An 8-day unit introduces middle school students to American inventors and inventions. In separate lessons, students examine the patenting process, women inventors, minority inventors, Native American inventors, the airplane, Thomas Edison, and the impact of inventions on America's growth. A brief outline of daily lesson plans precedes a section of…

  8. 7 CFR 1207.352 - Confidential treatment.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 10 2010-01-01 2010-01-01 false Confidential treatment. 1207.352 Section 1207.352 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (MARKETING... PLAN Potato Research and Promotion Plan Reports, Books, and Records § 1207.352 Confidential treatment...

  9. 7 CFR 1205.340 - Confidential treatment.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 10 2010-01-01 2010-01-01 false Confidential treatment. 1205.340 Section 1205.340 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (MARKETING... Cotton Research and Promotion Order Reports, Books, and Records § 1205.340 Confidential treatment. All...

  10. 7 CFR 1220.243 - Confidential treatment.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 10 2010-01-01 2010-01-01 false Confidential treatment. 1220.243 Section 1220.243 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (MARKETING... Confidential treatment. Except as otherwise provided in the Act, financial or commercial information that is...

  11. Simultaneous invention and the patent law

    DEFF Research Database (Denmark)

    Howells, John

    inventions they often find this to challenge the idea that patent law (which rewards only the first inventor with exclusive rights) is needed to encourage invention and innovation. We review the empirical evidence alleged to show that simultaneous invention is prevalent for important inventions. In general...... is typical of important pioneer inventions in both survey evidence and alleged illustrative cases of simultaneous invention. We show this in the cases of Edison, the Wright brothers, the Selden automobile patent vis a vis Ford, Watt and the steam engine. We then point out that patent law inherently ensures...... that patent protection is not extended to near simultaneous inventions. There remain a number of simultaneous inventions discovered through interference proceedings but we find the number too small to mount a serious challenge to the general operation of patent law....

  12. Invention party of students 1

    International Nuclear Information System (INIS)

    Wang, Yeon Jung

    2000-02-01

    The contents of this book are story about making a mistake by friends, o dear! my mistake, shower and platform for crocks of sauces and condiments, good thing and bad thing when it appears, dream and invention of JuMok, failure is another discovery, a certain goal, idea in a life, addition and subtraction, a little hint is a great invention, question : why? This book gives advices and encouragement how to invent and what to invent to students.

  13. Ensuring Confidentiality of Geocoded Health Data: Assessing Geographic Masking Strategies for Individual-Level Data.

    Science.gov (United States)

    Zandbergen, Paul A

    2014-01-01

    Public health datasets increasingly use geographic identifiers such as an individual's address. Geocoding these addresses often provides new insights since it becomes possible to examine spatial patterns and associations. Address information is typically considered confidential and is therefore not released or shared with others. Publishing maps with the locations of individuals, however, may also breach confidentiality since addresses and associated identities can be discovered through reverse geocoding. One commonly used technique to protect confidentiality when releasing individual-level geocoded data is geographic masking. This typically consists of applying a certain amount of random perturbation in a systematic manner to reduce the risk of reidentification. A number of geographic masking techniques have been developed as well as methods to quantity the risk of reidentification associated with a particular masking method. This paper presents a review of the current state-of-the-art in geographic masking, summarizing the various methods and their strengths and weaknesses. Despite recent progress, no universally accepted or endorsed geographic masking technique has emerged. Researchers on the other hand are publishing maps using geographic masking of confidential locations. Any researcher publishing such maps is advised to become familiar with the different masking techniques available and their associated reidentification risks.

  14. Ensuring Confidentiality of Geocoded Health Data: Assessing Geographic Masking Strategies for Individual-Level Data

    Directory of Open Access Journals (Sweden)

    Paul A. Zandbergen

    2014-01-01

    Full Text Available Public health datasets increasingly use geographic identifiers such as an individual’s address. Geocoding these addresses often provides new insights since it becomes possible to examine spatial patterns and associations. Address information is typically considered confidential and is therefore not released or shared with others. Publishing maps with the locations of individuals, however, may also breach confidentiality since addresses and associated identities can be discovered through reverse geocoding. One commonly used technique to protect confidentiality when releasing individual-level geocoded data is geographic masking. This typically consists of applying a certain amount of random perturbation in a systematic manner to reduce the risk of reidentification. A number of geographic masking techniques have been developed as well as methods to quantity the risk of reidentification associated with a particular masking method. This paper presents a review of the current state-of-the-art in geographic masking, summarizing the various methods and their strengths and weaknesses. Despite recent progress, no universally accepted or endorsed geographic masking technique has emerged. Researchers on the other hand are publishing maps using geographic masking of confidential locations. Any researcher publishing such maps is advised to become familiar with the different masking techniques available and their associated reidentification risks.

  15. Confidentiality and the employee assistance program professional.

    Science.gov (United States)

    Mistretta, E F; Inlow, L B

    1991-02-01

    During the last two decades EAPs have offered employees confidential assessment, counseling, and referral. Many occupational health nurses have taken on the role of EAP professional or function as the liaison between the EAP counselor and the employee. The occupational health nurse involved in any EAP issue must adhere to the standards of confidentiality. The federal and state laws, company policy, and professional codes of ethics regarding these clients must be clearly understood, especially related to the issue of confidentiality.

  16. Invention through Form and Function Analogy

    Science.gov (United States)

    Rule, Audrey C.

    2015-01-01

    "Invention through Form and Function Analogy" is an invention book for teachers and other leaders working with youth who are involving students in the invention process. The book consists of an introduction and set of nine learning cycle formatted lessons for teaching the principles of invention through the science and engineering design…

  17. The end of medical confidentiality? Patients, physicians and the state in history.

    Science.gov (United States)

    Rieder, Philip; Louis-Courvoisier, Micheline; Huber, Philippe

    2016-09-01

    Medical confidentiality has come under attack in the public sphere. In recent disasters both journalists and politicians have questioned medical confidentiality and claimed that in specific contexts physicians should be compelled to communicate data on their patients' health. The murders of innocent individuals by a suicidal pilot and a Swiss convicted criminal have generated polemical debates on the topic. In this article, historical data on medical confidentiality is used to show that medical practices of secrecy were regularly attacked in the past, and that the nature of medical confidentiality evolved through time depending on physicians' values and judgements. Our demonstration is based on three moments in history. First, at the end of the 16th century, lay authorities put pressure on physicians to disclose the names of patients suffering from syphilis. Second, in the 18th century, physicians faced constant demands for information about patients' health from relatives and friends. Third, employers and insurance companies in the 20th century requested medical data on sick employees. In these three different situations, history reveals that the concept of medical confidentiality was plastic, modelled in the first instance to defend well-to-do patients, in the second instance it was adapted to accommodate the physician's social role and, finally, to defend universal values and public health. Medical secrecy was, and is today, a medical and societal norm that is shaped collectively. Any change in its definition and enforcement was and should be the result of negotiations with all social actors concerned. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://www.bmj.com/company/products-services/rights-and-licensing/

  18. 15 CFR 718.3 - Disclosure of confidential business information.

    Science.gov (United States)

    2010-01-01

    ... 15 Commerce and Foreign Trade 2 2010-01-01 2010-01-01 false Disclosure of confidential business... (Continued) BUREAU OF INDUSTRY AND SECURITY, DEPARTMENT OF COMMERCE CHEMICAL WEAPONS CONVENTION REGULATIONS CONFIDENTIAL BUSINESS INFORMATION § 718.3 Disclosure of confidential business information. (a) General...

  19. Overcome IMF crisis with idea and invention

    International Nuclear Information System (INIS)

    Wang, Yeon Jung

    1998-01-01

    This book introduces the invention as a tool to overcome IMF crisis. These are the titles of the way to create invention and idea : what is idea? everyone can create something, have a confidence, this is patent, replace or change something, invention is not logical, challenge the normal law, throw away stereotype, movement of idea, original imagination, there are a lot of solutions, there is no expert, have a positive thought, why does inventor invent? necessity is invention of mother, three stage of idea and invention and imitation for invention.

  20. Overcome IMF crisis with idea and invention

    Energy Technology Data Exchange (ETDEWEB)

    Wang, Yeon Jung

    1998-01-15

    This book introduces the invention as a tool to overcome IMF crisis. These are the titles of the way to create invention and idea : what is idea? everyone can create something, have a confidence, this is patent, replace or change something, invention is not logical, challenge the normal law, throw away stereotype, movement of idea, original imagination, there are a lot of solutions, there is no expert, have a positive thought, why does inventor invent? necessity is invention of mother, three stage of idea and invention and imitation for invention.

  1. Teaching Confidentiality through Comics at One Spanish Medical School.

    Science.gov (United States)

    Lalanda, Mónica; Altisent, Rogelio; Delgado-Marroquín, Maria Teresa

    2018-02-01

    At the University of Zaragoza in Spain we developed an innovative way to teach the concept of confidentiality to medical students, which we tested by comparing the use of customized comics with more traditional methods. We proved that using comics is more attractive to students than lectures and class discussions, that it increases class participation and students' self-awareness of learning, and that it maintains the same academic results. We share our experience visually in a two-page comic. © 2018 American Medical Association. All Rights Reserved.

  2. 19 CFR 181.121 - Maintenance of confidentiality.

    Science.gov (United States)

    2010-04-01

    ... 181.121 Customs Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY; DEPARTMENT OF THE TREASURY (CONTINUED) NORTH AMERICAN FREE TRADE AGREEMENT Confidentiality of Business... possession of confidential business information collected pursuant to this part shall, in accordance with...

  3. Scientific work on the level of inventions

    Energy Technology Data Exchange (ETDEWEB)

    Piven' , G.I.; Pustovit, Yu.A.

    1980-06-01

    Describes the organizational scheme of the Ukrainian Research Scientific Coal-Chemical Institute patent department. The department evaluates new technological inventions patented abroad and associated with the coking industry, prepares information on new patents for the Institute's scientific staff. The department also helps employees of the Institute in formal patenting of their inventions. Inventions in the following fields are discussed: selective crushing of coal for coking, preheating of the coal charge, coal preparation (15 inventions) coal preparation before the coking process (45 inventions), modelling the optimum parameters of coking (6 inventions), production of formed coke (25 inventions) and smokeless and dustless charging of coal in coking ovens (6 invections). Twenty-one inventions are associated with using the waste products of coal preparation and coking, and environmental protection in conjunction with coking plants. (In Polish)

  4. Law and ethics in conflict over confidentiality?

    Science.gov (United States)

    Dickens, B M; Cook, R J

    2000-09-01

    Ethical principles that require the preservation of patients' confidential information are reinforced by principles found in several areas of law, such as law on contracts, negligence, defamation and fiduciary duty. However, laws sometimes compel disclosures of medical confidences, and more often may justify or excuse disclosures. Legally contentious issues concern patients' confidences regarding possible unlawful conduct, such as pregnancy termination, and the risk of spread of HIV and other infections. This article reviews the various legal bases of the duty of confidentiality, and legal challenges to the ethical obligation of non-disclosure. It addresses the justifications and limits of exchange of patients' health information among healthcare professionals and trainees, and considers legally recognized limits of confidential duties, and the scope of legitimate disclosure. An underlying theme is how to determine whether physicians are ethically justified in employing the discretion the law sometimes affords them to breach patients' expectations of confidentiality.

  5. 19 CFR 210.5 - Confidential business information.

    Science.gov (United States)

    2010-04-01

    ... 19 Customs Duties 3 2010-04-01 2010-04-01 false Confidential business information. 210.5 Section 210.5 Customs Duties UNITED STATES INTERNATIONAL TRADE COMMISSION INVESTIGATIONS OF UNFAIR PRACTICES IN IMPORT TRADE ADJUDICATION AND ENFORCEMENT Rules of General Applicability § 210.5 Confidential...

  6. The Invention Notebook Challenge

    Science.gov (United States)

    Roman, Harry T.

    2018-01-01

    Like scientists who keep lab notebooks detailing their experiments, inventors keep invention notebooks that chronologically detail the inception, development, and refinement of their inventions. These notebooks are legal documents that can help prove one inventor's precedent over another. Scenarios like these are very real, as the author has had…

  7. Aristotle's "Rhetoric": Reinterpreting Invention.

    Science.gov (United States)

    Quandahl, Ellen

    1986-01-01

    Shows that Aristotle's common topics are part of a theory of interpretation rather than a collection of devices for invention. Argues that it is more Aristotelian and more useful to understand composing as interpretation and not invention. Uses scholarship to inform pedagogy and to reorient composing toward acts of reading. (EL)

  8. 42 CFR 35.11 - Clinical records; confidential.

    Science.gov (United States)

    2010-10-01

    ... EXAMINATIONS HOSPITAL AND STATION MANAGEMENT General § 35.11 Clinical records; confidential. A complete clinical record shall be maintained for each patient admitted to a station or hospital of the Service. Such... 42 Public Health 1 2010-10-01 2010-10-01 false Clinical records; confidential. 35.11 Section 35.11...

  9. Technology transfer of Cornell university

    International Nuclear Information System (INIS)

    Yoo, Wan Sik

    2010-01-01

    This book introduces technology transfer of Cornell university which deals with introduction of Cornell university, composition of organization and practice of technology transfer : a research contract, research perform, invention report, evaluation and succession of invention, a patent application and management, marketing, negotiation and writing contract, management of contract, compensation, result of technology transfer, cases of success on technical commercialization and daily life of technology transfer center.

  10. 37 CFR 260.4 - Confidential information and statements of account.

    Science.gov (United States)

    2010-07-01

    ... Confidential information and statements of account. (a) For purposes of this part, confidential information shall include statements of account and any information pertaining to the statements of account... included on the statement of account. (d) Access to the confidential information pertaining to the royalty...

  11. 45 CFR 650.19 - Electronic invention handling.

    Science.gov (United States)

    2010-10-01

    ... Report or a Final Invention Statement and Certification. (b) Questions on use of iEdison and requests for... 45 Public Welfare 3 2010-10-01 2010-10-01 false Electronic invention handling. 650.19 Section 650... PATENTS § 650.19 Electronic invention handling. (a) Grantees must use the iEdison Invention Information...

  12. Is patient confidentiality compromised with the electronic health record?: a position paper.

    Science.gov (United States)

    Wallace, Ilse M

    2015-02-01

    In order for electronic health records to fulfill their expected benefits, protection of privacy of patient information is key. Lack of trust in confidentiality can lead to reluctance in disclosing all relevant information, which could have grave consequences. This position paper contemplates whether patient confidentiality is compromised by electronic health records. The position that confidentiality is compromised was supported by the four bioethical principles and argued that despite laws and various safeguards to protect patients' confidentiality, numerous data breaches have occurred. The position that confidentiality is not compromised was supported by virtue ethics and a utilitarian viewpoint and argued that safeguards keep information confidential and the public feels relatively safe with the electronic health record. The article concludes with an ethically superior position that confidentiality is compromised with the electronic health record. Although organizational and governmental ways of enhancing the confidentiality of patient information within the electronic health record facilitate confidentiality, the ultimate responsibility of maintaining confidentiality rests with the individual end-users and their ethical code of conduct. The American Nurses Association Code of Ethics for nurses calls for nurses to be watchful with data security in electronic communications.

  13. Can you keep a secret? Confidentiality in psychotherapy.

    Science.gov (United States)

    Younggren, Jeffrey N; Harris, Eric A

    2008-05-01

    Confidentiality is the secret-keeping duty that arises from the establishment of the professional relationship psychologists develop with their clients. It is a duty created by the professional relationship, it is set forth in the American Psychological Association's (2002) Ethical Principles and Code of Conduct, and it is codified in many state regulations. However, the difference between confidentiality and legal privilege; how, why, and when it can be violated; and the reasons for so doing are not well understood by many practitioners. While on the surface confidentiality might seem to be an easy concept to apply to professional practice, in fact it is quite complex and filled with exceptions that frequently differ from circumstance to circumstance and from state to state. A lack of respect for and a lack of familiarity with the significance of these exceptions could have dire professional consequences. This article reviews the ethical imperative of confidentiality and then provides examples of legal cases that help to better understand its complexity. Then, we offer strategies designed to help metal health practitioners when they are confronted with questions regarding confidentiality and privilege.

  14. Protecting Privacy and Confidentiality in Environmental Health Research.

    Science.gov (United States)

    Resnik, David B

    2010-01-01

    Environmental health researchers often need to make difficult decisions on how to protect privacy and confidentiality when they conduct research in the home or workplace. These dilemmas are different from those normally encountered in clinical research. Although protecting privacy and confidentiality is one of the most important principles of research involving human subjects, it can be overridden to prevent imminent harm to individuals or if required by law. Investigators should carefully consider the facts and circumstances and use good judgment when deciding whether to breach privacy or confidentiality.

  15. Ombuds’ corner: Confidentiality

    CERN Multimedia

    Vincent Vuillemin

    2011-01-01

    In this series, the Bulletin aims to explain the role of the Ombuds at CERN by presenting practical examples of misunderstandings that could have been resolved by the Ombuds if he had been contacted earlier. Please note that, in all the situations we present, the names are fictitious and used only to improve clarity.    Jane* came to the Ombuds to share her concerns about the actions of Mike*, one of her senior colleague supervisors, and insisted on the absolute confidentiality. The Ombuds promised to keep the information confidential following the terms of his mandate. During the discussion it appeared that the whole group was affected by the situation, spending a lot of time discussing how to resolve the problem instead of focusing on their main responsibilities. The risks for the Organization seemed very high and could possibly endanger the safety of the operations.  On one side, the Ombuds believed that it was essential to bring this matter to the attention of senior managem...

  16. From Invention to Innovation

    Energy Technology Data Exchange (ETDEWEB)

    Rorke, M.

    2000-07-18

    The Inventions and Innovation Program, formerly known as ERIP (Energy-related Inventions Program), was established by the U.S. Congress in 1974. The program offers assistance to independent inventors and very small businesses engaged in developing new energy-saving technologies. The program remains clearly focused on energy generation and savings. The I&I Program funding is based on a competitive proposal process.

  17. Confidential benchmarking based on multiparty computation

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre; Damgård, Kasper Lyneborg; Nielsen, Kurt

    We report on the design and implementation of a system that uses multiparty computation to enable banks to benchmark their customers' confidential performance data against a large representative set of confidential performance data from a consultancy house. The system ensures that both the banks......' and the consultancy house's data stays confidential, the banks as clients learn nothing but the computed benchmarking score. In the concrete business application, the developed prototype help Danish banks to find the most efficient customers among a large and challenging group of agricultural customers with too much...... debt. We propose a model based on linear programming for doing the benchmarking and implement it using the SPDZ protocol by Damgård et al., which we modify using a new idea that allows clients to supply data and get output without having to participate in the preprocessing phase and without keeping...

  18. Client confidentiality: Perspectives of students in a healthcare ...

    African Journals Online (AJOL)

    This moral dilemma is difficult for students to circumvent and therefore this paper presents healthcare students' perspectives of confidentiality. Methods. We aimed to explore healthcare students' views and experiences of confidentiality as an ethical principle by adopting a qualitative explorative approach. Purposeful ...

  19. Invention Zaman Barok dan Pengembangan Permainan Piano

    Directory of Open Access Journals (Sweden)

    RIANTI MARDALENA PASARIBU

    2013-11-01

    Full Text Available Invention in Barok Era and The Development of Piano Lesson. In piano lesson, one material of parts towhich had been given is polyphony, which is an Invention from J.S. Invention is a basic fi nger-skill for pianist.Invention develops in the Baroque period. The baroque ideology is not only called as the reaction of Renaissance,but also as the continuing development from Renaissance. Invention is known in two forms. First is as a pianocomposition and second is as a piano play which can push a pianist to understand more about an arrangement thathe played and expressed.

  20. Breaching confidentiality: medical mandatory reporting laws in Iran.

    Science.gov (United States)

    Milanifar, Alireza; Larijani, Bagher; Paykarzadeh, Parvaneh; Ashtari, Golanna; Mehdi Akhondi, Mohammad

    2014-01-01

    Medical ethics is a realm where four important subjects of philosophy, medicine, theology and law are covered. Physicians and philosophers cooperation in this area will have great efficiency in the respective ethical rules formation. In addition to respect the autonomy of the patient, physician's obligation is to ensure that the medical intervention has benefit for the patient and the harm is minimal. There is an obvious conflict between duty of confidentiality and duty of mandatory reporting. Professional confidentiality is one of the basic components in building a constant physician-patient relationship which nowadays, beside the novelty, it is the subject of discussion. Legal obligation of confidentiality is not absolute. In physician-patient relationship, keeping patient's secrets and maintaining confidentiality is a legal and ethical duty, and disclosure of such secrets is mainly through specific statutes. Thus, there are a number of situations where breach of confidentiality is permitted in different legal systems. One of the situations where breaching confidentiality is permitted is the medical mandatory reporting to the relevant authority which is in accordance with many countries' legal systems. Some situations are considered in many countries legal systems' such as notification of births and deaths, infectious diseases, child abuse, sport and relevant events, medical errors, drug side effects and dangerous pregnancies. In this paper, we will examine and discuss medical mandatory reporting and its ethical and legal aspects in the judicial and legal system of Iran and few other countries. Finally we will suggest making Medical Mandatory Reporting Law in Iran.

  1. Confidentiality: From the Stacks to the Witness Stand.

    Science.gov (United States)

    Lee, Janis M.; Smith, G. Guy

    1988-01-01

    A library director describes her experience of safeguarding the confidentiality of the circulation records of a woman who went on a shooting rampage at a shopping mall. The lawyer who represented the library discusses the legal responsibility of public and school libraries concerning confidentiality. (CLB)

  2. Science of invention patent

    International Nuclear Information System (INIS)

    Park, Yeong Taek; Park, Su Dong

    1999-02-01

    This book tells science of invention patent about new way of invention and creative solution for problems, basic conception of TRIZ, resolution of physical contradictory and technical contradictory, development of system and types of evolution, change of thinking for solving the problems, analysis of structure for problem solution, problem solution using scientific phenomenon and effect, use of standard solution and algorithm of creative problem solution.

  3. Confidentiality in participatory research: Challenges from one study.

    Science.gov (United States)

    Petrova, Elmira; Dewing, Jan; Camilleri, Michelle

    2016-06-01

    This article presents key ethical challenges that were encountered when conducting a participatory qualitative research project with a very specific, small group of nurses, in this case with practice development nurses in Malta. With the small number of nurses employed in practice development roles in Malta, there are numerous difficulties of maintaining confidentiality. Poorly constructed interventions by the researcher could have resulted in detrimental effects to research participants and the overall trustworthiness of the research. Generally, ethical guidelines for research exist to reinforce validity of research; however, there is not an established consensus on how these strategies can be utilised in some types of qualitative field work. The researcher used an exploratory case study methodology. The sample consisted of 10 participants who were interviewed twice using face-to-face interviews, over a period of 2 months. The study was ethically reviewed by the University Research Ethics Committee and the Faculty Research Ethics Committee, University of Malta. The participants referred to in this article have been given adequate information about the study and their consent has been obtained. Numerous strategies for ensuring confidentiality during recruitment of the participants, during data collection, during transcription and data analysis and during dissemination of research results assisted the researcher in responding to potential and actual ethical issues. This article emphasises the main strategies that can be used to respond to ethical challenges when researching with a small easily identifiable group. The learning discussed here may be relevant to or even transferable to other similar research studies or research contexts. These methods fostered a greater credibility throughout the research process and predisposed the participants to greater trust, and thus, they disclosed their experiences and speak more freely, thus enhancing the quality of the study

  4. Evaluation of Energy-Related Inventions Program: An Empirical Analysis of 204 Inventions; TOPICAL

    International Nuclear Information System (INIS)

    Brown, M.A.

    1987-01-01

    This report is an evaluation of the Energy-Related Inventions Program (ERIP). It assess the program's effectiveness and impacts, characterizes participating inventions and inventors, and identifies correlates of successful commercialization in order to suggest possible improvements. Seventy of the 204 ERIP inventions that were studied were successfully introduced into the market, accounting for more than$200M in sales from 1976 through 1984. During 1984, 921 full-time equivalent employees were supported directly by ERIP inventors or their licensees. (Estimates of indirect economic impacts are also contained in the report.) Data on patterns of fund raising clearly show a need for assistance by programs like ERIP. Commercially successful inventors shared several traits. They had less formal education, fewer patents, more work experience in small firms, more outside funding early in their work, more shared responsibility with others for invention development, more management experience, and greater previous experience with starting new businesses. Recommendations are made regarding: (1) priorities for allocating ERIP grants; (2) improved efficiency of the NBS/DOE operations; (3) delivery of technical and commercialization assistance to grant recipients; and (4) further evaluation research

  5. 20 CFR 726.113 - Disclosure of confidential information.

    Science.gov (United States)

    2010-04-01

    ... MINE OPERATOR'S INSURANCE Authorization of Self-Insurers § 726.113 Disclosure of confidential... 20 Employees' Benefits 3 2010-04-01 2010-04-01 false Disclosure of confidential information. 726... authorized self-insurer or applicant for the authorization of self-insurance obtained by the Office shall be...

  6. Practical State Machine Replication with Confidentiality

    Energy Technology Data Exchange (ETDEWEB)

    Duan, Sisi [ORNL; Zhang, Haibin [University of North Carolina, Chapel Hill

    2016-01-01

    We study how to enable arbitrary randomized algorithms in Byzantine fault-tolerant (BFT) settings. We formalize a randomized BFT protocol and provide a simple and efficient construction that can be built on any existing BFT protocols while adding practically no overhead. We go one step further to revisit a confidential BFT protocol (Yin et al., SOSP '03). We show that their scheme is potentially susceptible to safety and confidentiality attacks. We then present a new protocol that is secure in the stronger model we formalize, by extending the idea of a randomized BFT protocol. Our protocol uses only efficient symmetric cryptography, while Yin et al.'s uses costly threshold signatures. We implemented and evaluated our protocols on microbenchmarks and real-world use cases. We show that our randomized BFT protocol is as efficient as conventional BFT protocols, and our confidential BFT protocol is two to three orders of magnitude faster than Yin et al.'s, which is less secure than ours.

  7. CRAC : Confidentiality risk analysis and IT-architecture comparison of business networks

    NARCIS (Netherlands)

    Morali, A.; Zambon, E.; Etalle, S.; Wieringa, R.J.

    2009-01-01

    The leakage of confidential information (e.g. industrial secrets, patient records and user credentials) is one of the risks that have to be accounted for and mitigated by organizations dealing with confidential data. Unfortunately, assessing confidentiality risk is challenging, particularly in the

  8. 29 CFR 4010.13 - Confidentiality of information submitted.

    Science.gov (United States)

    2010-07-01

    ... REPORTING AND DISCLOSURE REQUIREMENTS ANNUAL FINANCIAL AND ACTUARIAL INFORMATION REPORTING § 4010.13 Confidentiality of information submitted. In accordance with § 4901.21(a)(3) of this chapter and ERISA section... 29 Labor 9 2010-07-01 2010-07-01 false Confidentiality of information submitted. 4010.13 Section...

  9. 75 FR 75586 - Confidentiality of Suspicious Activity Reports

    Science.gov (United States)

    2010-12-03

    ...] RIN 1550-AC26 Confidentiality of Suspicious Activity Reports AGENCY: The Office of Thrift Supervision... implementing the Bank Secrecy Act (BSA) governing the confidentiality of a suspicious activity report (SAR) to... corporations regulated by the OTS, to keep certain records and make certain reports that have been determined...

  10. Fuel on the Invention Funnel

    DEFF Research Database (Denmark)

    Leone, Maria Isabella; Reichstein, Toke; Boccardelli, Paolo

    In this paper, we examine the impact of technology licensing-in on firm invention performance. Studying a sample of 266 licensees and matched non-licensees using a two-part model specification, we find that licensees are more likely to introduce inventions than their non-licensee counterparts. Th...

  11. Multiple, connective intellection: the condition for invention

    Directory of Open Access Journals (Sweden)

    C S (Fanie de Beer

    2015-11-01

    Full Text Available Since this article involves invention, the conditions for inventiveness become the issue: assuming multiple reality; thinking in a special way; transgressing boundaries; acknowledging networks (in the terms of Michel Serres: communication, transduction, interference, distribution, passages between the sciences. There are, however, misplaced expectations: technology should work wonders in this regard while forgetting that humans, redefined though, remain the key to establish connections and networks between people, paradigms, disciplines, sciences and technologies. Against this background, Michel Serres’s emphasis on invention and “thinking as invention” and his a-critical anti-method – ‘connective, multiple intellection’ which is a special kind of thought – are desperately needed. Guattari’s articulation of the three ecologies and the ecosophic views he developed in this regard provides a significant amplification of the approach of ‘multiple connective intellection’. These insights can be enlightened and strongly driven home through the views of Latour with an anthropological and socio-dynamic perspective on the scientific endeavour with the articulation of the actor-network theory inherited from Serres. The thoughtful beyond-methodology of Edgar Morin with his strong noological position as the ultimate condition for inventiveness, and Gregory Ulmer with his special emphasis on invention and inventiveness, especially with the help and assistance of electronic means (video and internet, and with his work with the architect Bernard Tschumi on invention and inventiveness, are of special significance in the sphere of inventiveness, the real and final guarantee for a spirited re-enchantment of the world as well as the final demonstration that the battle for intelligence as opposed to ignorance, stupidity and barbarism can be fought with great hope to succeed.

  12. Genetic secrets: Protecting privacy and confidentiality in the genetic era

    Energy Technology Data Exchange (ETDEWEB)

    Rothstein, M.A. [ed.

    1998-07-01

    Few developments are likely to affect human beings more profoundly in the long run than the discoveries resulting from advances in modern genetics. Although the developments in genetic technology promise to provide many additional benefits, their application to genetic screening poses ethical, social, and legal questions, many of which are rooted in issues of privacy and confidentiality. The ethical, practical, and legal ramifications of these and related questions are explored in depth. The broad range of topics includes: the privacy and confidentiality of genetic information; the challenges to privacy and confidentiality that may be projected to result from the emerging genetic technologies; the role of informed consent in protecting the confidentiality of genetic information in the clinical setting; the potential uses of genetic information by third parties; the implications of changes in the health care delivery system for privacy and confidentiality; relevant national and international developments in public policies, professional standards, and laws; recommendations; and the identification of research needs.

  13. Evaluation in a competitive utility environment: the threat of confidentiality

    International Nuclear Information System (INIS)

    Vine, Edward

    1997-01-01

    Utilities have become concerned that their competitors will desire access to energy-related data--including energy-efficiency data collected by utilities from their energy- efficiency programs--that they may regard as proprietary or confidential. In the future, disputes about confidentiality may focus more on costs and market information (as well as energy use and load data) than on energy-efficiency data per se. So far, the discussion has been limited to ratepayer-funded data. Consequently, many utilities are now requesting that the data (including evaluation data) they submit to their utility regulatory commissions remain confidential. Withholding utility information from the public is likely to harm the evaluation community that depends on the free flow of information for improving the practice of evaluation as well as for disseminating the lessons learned from particular program evaluations. Confidentiality will also have significant policy implications. In response to these concerns, in late 1995 and early 1996, we conducted a survey of state public utility commissions (PUCs) in the U.S. to assess: (1) the relative importance of the issue of confidential data in the regulatory arena; (2) the regulatory response to utility requests for confidentiality (e.g., formal policies, guidelines, rules and procedures, and decisions); and (3) the type of data filed as confidential with PUCS. We focus on the first two objectives of this study. In addition to our interviews, we reviewed selected state statutes, judicial and PUC decisions, rules and procedures, protective orders, and interim policy documents. Evaluators need to understand the context of confidentiality as well as the response of the regulatory commissions to confidentiality, because evaluators will need to adapt to a new environment where energy-related data and information may be harder to obtain and distribute. We propose that regulators conduct the following activities as soon as possible: 1. Assess

  14. 37 CFR 1.293 - Statutory invention registration.

    Science.gov (United States)

    2010-07-01

    ... the date of publication of the statutory invention registration; (2) The required fee for filing a request for publication of a statutory invention registration as provided for in § 1.17 (n) or (o); (3) A... application. (b) Any request for publication of a statutory invention registration must include the following...

  15. 15 CFR 718.2 - Identification of confidential business information.

    Science.gov (United States)

    2010-01-01

    ... business information. 718.2 Section 718.2 Commerce and Foreign Trade Regulations Relating to Commerce and Foreign Trade (Continued) BUREAU OF INDUSTRY AND SECURITY, DEPARTMENT OF COMMERCE CHEMICAL WEAPONS CONVENTION REGULATIONS CONFIDENTIAL BUSINESS INFORMATION 718.2 Identification of confidential business...

  16. 7 CFR 1425.5 - Confidentiality.

    Science.gov (United States)

    2010-01-01

    ... AGRICULTURE LOANS, PURCHASES, AND OTHER OPERATIONS COOPERATIVE MARKETING ASSOCIATIONS § 1425.5 Confidentiality. Information submitted to CCC related to trade secrets, financial or commercial operations, or the financial...

  17. 50 CFR 600.130 - Protection of confidentiality of statistics.

    Science.gov (United States)

    2010-10-01

    ... statistics. 600.130 Section 600.130 Wildlife and Fisheries FISHERY CONSERVATION AND MANAGEMENT, NATIONAL... Fishery Management Councils § 600.130 Protection of confidentiality of statistics. Each Council must establish appropriate procedures for ensuring the confidentiality of the statistics that may be submitted to...

  18. Sensational inventions by girls and boys

    International Nuclear Information System (INIS)

    Wang, Yeon Jung

    1999-05-01

    This book introduces the interesting and original inventions invented by girls and boys. These are the titles of the inventions : an antenna ruler, muscular strength machine with spring, items to remove sticky matter for advertisement, chair ladder for the disabled, useful control box for feeding bees, a portable carriage for dogs, a lid of ashtray, hot-air balloon using solar power, toy cannon for reports, hard badminton racket, tv cable and a distributor which are easy to install, device for car automatic parking, a cleanser for vegetables.

  19. Sensational inventions by girls and boys

    Energy Technology Data Exchange (ETDEWEB)

    Wang, Yeon Jung

    1999-05-15

    This book introduces the interesting and original inventions invented by girls and boys. These are the titles of the inventions : an antenna ruler, muscular strength machine with spring, items to remove sticky matter for advertisement, chair ladder for the disabled, useful control box for feeding bees, a portable carriage for dogs, a lid of ashtray, hot-air balloon using solar power, toy cannon for reports, hard badminton racket, tv cable and a distributor which are easy to install, device for car automatic parking, a cleanser for vegetables.

  20. Ghosts of inventions: Patent law's digital mediations.

    Science.gov (United States)

    Kang, Hyo Yoon

    2018-04-01

    This article examines the shifts in the material ordering of inventions in patent law organization and their effects on the meaning and scope of inventions as intellectual property. Formats and media are constitutive of the establishment and stabilization of inventions as objects of intellectual property. Modern patent law's materiality had been dominated by paper documents but ever more consists of digital images, files, and networked data. The article traces and analyzes such effects of digital media on the meaning of intellectual/intangible property and argues that inventions increasingly matter as digital data in the legal realm.

  1. 7 CFR 1205.540 - Confidential books, records, and reports.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 10 2010-01-01 2010-01-01 false Confidential books, records, and reports. 1205.540 Section 1205.540 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL... Confidential books, records, and reports. All information obtained from the books, records, and reports of...

  2. Improving Individual Acceptance of Health Clouds through Confidentiality Assurance.

    Science.gov (United States)

    Ermakova, Tatiana; Fabian, Benjamin; Zarnekow, Rüdiger

    2016-10-26

    Cloud computing promises to essentially improve healthcare delivery performance. However, shifting sensitive medical records to third-party cloud providers could create an adoption hurdle because of security and privacy concerns. This study examines the effect of confidentiality assurance in a cloud-computing environment on individuals' willingness to accept the infrastructure for inter-organizational sharing of medical data. We empirically investigate our research question by a survey with over 260 full responses. For the setting with a high confidentiality assurance, we base on a recent multi-cloud architecture which provides very high confidentiality assurance through a secret-sharing mechanism: Health information is cryptographically encoded and distributed in a way that no single and no small group of cloud providers is able to decode it. Our results indicate the importance of confidentiality assurance in individuals' acceptance of health clouds for sensitive medical data. Specifically, this finding holds for a variety of practically relevant circumstances, i.e., in the absence and despite the presence of conventional offline alternatives and along with pseudonymization. On the other hand, we do not find support for the effect of confidentiality assurance in individuals' acceptance of health clouds for non-sensitive medical data. These results could support the process of privacy engineering for health-cloud solutions.

  3. 40 CFR 790.7 - Confidentiality.

    Science.gov (United States)

    2010-07-01

    ... words “confidential business information,” “trade secret,” or another appropriate phrase indicating its... competitor use such information? How substantial would the harmful effects be? What is the causal...

  4. 13 CFR 120.1060 - Confidentiality of Reports, Risk Ratings and related Confidential Information.

    Science.gov (United States)

    2010-01-01

    ... other than SBA's Lender oversight and SBA's portfolio management purposes. An SBA Lender, Intermediary... conjunction with SBA's Lender Oversight Program and SBA's portfolio management (for purposes of this... 13 Business Credit and Assistance 1 2010-01-01 2010-01-01 false Confidentiality of Reports, Risk...

  5. Computer Security: confidentiality is everybody’s business

    CERN Multimedia

    Stefan Lueders, Computer Security Team

    2015-01-01

    Recently, a zip file with confidential information was mistakenly made public on one of CERN’s websites. Although the file was only intended for members of an internal committee, when placing it onto the CERN website, someone made a mistake when setting the access permissions and, thus, made the file accessible to everyone visiting the site!   Unfortunately, this is but one example of such mistakes. We have seen other documents made accessible to a much wider audience than originally intended… CERN takes serious measures to ensure the confidentiality of data. Confidential or “sensitive” documents (following the nomenclature set out in the CERN Data Protection Policy) deserve professional handling and access protections given only to the people who really need to access them. As such, they must not be widely circulated as attachments in e-mails and, most definitely, must not be stored on random public websites for the sole purpose of shari...

  6. How can I invent?

    Energy Technology Data Exchange (ETDEWEB)

    Wang, Yeon Jung

    2001-10-15

    This book gives descriptions of how to invent with various and useful tips. The contents of this book are set up the proper goal according to your condition, let's find the other use, change the order and put a replacement, search more convenience, have application of color characteristic, imitation is beginning of the invention, convert imitation into creation, look into the deserted idea, learn the basic science, catch the stream of times, try to study hard, have a big dream, change your way of thinking, develop the system, and throw away the stereotype.

  7. How can I invent?

    International Nuclear Information System (INIS)

    Wang, Yeon Jung

    2001-10-01

    This book gives descriptions of how to invent with various and useful tips. The contents of this book are set up the proper goal according to your condition, let's find the other use, change the order and put a replacement, search more convenience, have application of color characteristic, imitation is beginning of the invention, convert imitation into creation, look into the deserted idea, learn the basic science, catch the stream of times, try to study hard, have a big dream, change your way of thinking, develop the system, and throw away the stereotype.

  8. Library Records: A Review of Confidentiality Laws and Policies.

    Science.gov (United States)

    Million, Angela C.; Fisher, Kim N.

    1986-01-01

    Cites the importance of having a state law, knowing what it says, and having a library policy statement regarding the confidentiality of patron records. Discussion covers writing and implementing a policy, the role of automation, existing laws, library records defined, exceptions to confidentiality, and legal liability. Thirty-seven references are…

  9. Independent consultants : fiduciary duties, trade secrets and confidential information

    International Nuclear Information System (INIS)

    Fraser, B.; Wilhelmson, M.

    1999-01-01

    Because of cutbacks and downsizing within the petroleum industry, it has become one of the largest users of contract personnel to provide services that were previously provided by senior levels of management. This paper explored the application of common law fiduciary duties and the duty of confidence to the independent workforce. It examined to what extent fiduciary duties apply to independent consultants and the best way for the employer to protect itself from the potential misuse of confidential information. Part 1 of the paper described fiduciary duties. A fiduciary relationship was described as one that possesses the following three characteristics: (1) the fiduciary has scope for the exercise of some discretion of power, (2) the fiduciary can unilaterally exercise that power to affect the beneficiary's practical interests, and (3) the beneficiary is peculiarly vulnerable to the fiduciary holding the discretion of power. Three examples of how the courts treated some arguments regarding fiduciaries were presented. Part 2 of this paper discussed how trade secrets and confidential information should be handled. It was explained, that regardless of fiduciary duties, the unauthorized use of confidential information by an independent contractor can give rise to liability and an award of damages by the courts. Some examples where the Supreme Court of Canada found breach of confidence by a party were presented. Information communicated from an employer to an employee can be divided into the following three categories: (1) publicly accessible and not confidential, (2) confidential and must be treated as such while an employee is employed, but if learned becomes part of the employees skill and knowledge, and (3) specific confidential trade secrets that cannot lawfully be used for anyone's benefit but the employer's. Issues regarding defining rights and obligations by contract were also discussed

  10. Energy-Related Inventions Program: an overview of the evaluation

    Energy Technology Data Exchange (ETDEWEB)

    Soderstrom, E.J.; Bronfman, L.M.; Rorke, M.G.

    1983-09-01

    The Energy-Related Inventions Program (ERIP) is jointly administered by the US Departments of Energy and Commerce. Grants were awarded for 165 of 208 inventions recommended by the National Bureau of Standards (NBS). Of the 165 inventions, 46 have been able to acquire follow-on financing from a variety of sources. Further, 35 of the inventions have reached the marketplace, and their cumulative sales to date total $178 million. An additional 10 inventions are now starting into production. Jobs that have been created directly by production related to the inventions total 756; additional spin-off jobs attributable to the inventions include component and material suppliers, jobbers, franchisees, and distributors. The program was recently evaluated at Oak Ridge National Laboratory, with the following conclusions: (1) the evaluation process at NBS has been successful in identifying technically and economically feasible inventions, (2) the success rate for the program is about equivalent to the reported success rates of private venture capital firms, (3) the program is supporting inventions at a point in their development where they are supported by neither the venture capital community nor industry, and (4) the one-time DOE grants and the associated ERIP support to inventors have been successful in readying inventors for follow-on financing from the private sector.

  11. 5 CFR 2634.901 - Policies of confidential financial disclosure reporting.

    Science.gov (United States)

    2010-01-01

    .... (a) The confidential financial reporting system set forth in this subpart is designed to complement... Government duties involve the exercise of significant discretion in certain sensitive areas, report their... apparent conflicts of interest. The confidential financial disclosure system promotes that goal, with...

  12. Analysis of LYSA-calculus with explicit confidentiality annotations

    DEFF Research Database (Denmark)

    Gao, Han; Nielson, Hanne Riis

    2006-01-01

    Recently there has been an increased research interest in applying process calculi in the verification of cryptographic protocols due to their ability to formally model protocols. This work presents LYSA with explicit confidentiality annotations for indicating the expected behavior of target...... malicious activities performed by attackers as specified by the confidentiality annotations. The proposed analysis approach is fully automatic without the need of human intervention and has been applied successfully to a number of protocols....

  13. 40 CFR 40.160-3 - Reporting of inventions.

    Science.gov (United States)

    2010-07-01

    ... application. (b) A final invention report is required within 90 days after completion of the project period... 40 Protection of Environment 1 2010-07-01 2010-07-01 false Reporting of inventions. 40.160-3... ASSISTANCE RESEARCH AND DEMONSTRATION GRANTS § 40.160-3 Reporting of inventions. As provided in appendix B of...

  14. 5 CFR 1312.26 - Control of secret and confidential material.

    Science.gov (United States)

    2010-01-01

    ... 5 Administrative Personnel 3 2010-01-01 2010-01-01 false Control of secret and confidential... Accountability of Classified Information § 1312.26 Control of secret and confidential material. Classified... Document Control, will be used to establish accountability controls on all Secret material received or...

  15. 48 CFR 1552.235-80 - Access to confidential business information.

    Science.gov (United States)

    2010-10-01

    ... business information. 1552.235-80 Section 1552.235-80 Federal Acquisition Regulations System ENVIRONMENTAL... Clauses 1552.235-80 Access to confidential business information. As prescribed in 1535.007-70(g), insert the following clause. Access to Confidential Business Information (OCT 2000) It is not anticipated...

  16. Confidential Business Information under TSCA

    Science.gov (United States)

    This website informs businesses, policymakers, and the public about the confidential business information (CBI) provisions of § 14 of the Toxic Substances Control Act (TSCA), as amended by the Frank R. Lautenberg Chemical Safety for the 21st Century Act.

  17. A commercial outcome prediction system for university technology transfer using neural networks

    OpenAIRE

    Chu, Ling

    2007-01-01

    This thesis was submitted for the degree of Doctor of Philosophy and awarded by Brunel University, 26/03/2007. This thesis presents a commercial outcome prediction system (CPS) capable of predicting the likely future monetary return that would be generated by an invention. The CPS is designed to be used by university technology transfer offices for invention assessment purposes, and is based on the data from their historical invention cases. It is aimed at improving technology transfer off...

  18. The "GeneTrustee": a universal identification system that ensures privacy and confidentiality for human genetic databases.

    Science.gov (United States)

    Burnett, Leslie; Barlow-Stewart, Kris; Proos, Anné L; Aizenberg, Harry

    2003-05-01

    This article describes a generic model for access to samples and information in human genetic databases. The model utilises a "GeneTrustee", a third-party intermediary independent of the subjects and of the investigators or database custodians. The GeneTrustee model has been implemented successfully in various community genetics screening programs and has facilitated research access to genetic databases while protecting the privacy and confidentiality of research subjects. The GeneTrustee model could also be applied to various types of non-conventional genetic databases, including neonatal screening Guthrie card collections, and to forensic DNA samples.

  19. 6 CFR 25.10 - Confidentiality and protection of Intellectual Property.

    Science.gov (United States)

    2010-01-01

    ... 6 Domestic Security 1 2010-01-01 2010-01-01 false Confidentiality and protection of Intellectual Property. 25.10 Section 25.10 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY REGULATIONS TO SUPPORT ANTI-TERRORISM BY FOSTERING EFFECTIVE TECHNOLOGIES § 25.10 Confidentiality and...

  20. 42 CFR 405.215 - Confidential commercial and trade secret information.

    Science.gov (United States)

    2010-10-01

    ... 42 Public Health 2 2010-10-01 2010-10-01 false Confidential commercial and trade secret information. 405.215 Section 405.215 Public Health CENTERS FOR MEDICARE & MEDICAID SERVICES, DEPARTMENT OF... trade secret information. To the extent that CMS relies on confidential commercial or trade secret...

  1. 40 CFR 260.2 - Availability of information; confidentiality of information.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 25 2010-07-01 2010-07-01 false Availability of information; confidentiality of information. 260.2 Section 260.2 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) SOLID WASTES (CONTINUED) HAZARDOUS WASTE MANAGEMENT SYSTEM: GENERAL General § 260.2 Availability of information; confidentiality of...

  2. 48 CFR 1552.235-71 - Treatment of confidential business information.

    Science.gov (United States)

    2010-10-01

    ... business information. 1552.235-71 Section 1552.235-71 Federal Acquisition Regulations System ENVIRONMENTAL... Clauses 1552.235-71 Treatment of confidential business information. As prescribed in 1535.007-70(b... determined that in the performance of a contract, EPA may furnish confidential business information to the...

  3. 7 CFR 1280.227 - Confidentiality.

    Science.gov (United States)

    2010-01-01

    ... statistical data collected therefrom, which statements do not identify the information furnished by any person... 7 Agriculture 10 2010-01-01 2010-01-01 false Confidentiality. 1280.227 Section 1280.227 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (MARKETING...

  4. 22 CFR 1101.5 - Security, confidentiality and protection of records.

    Science.gov (United States)

    2010-04-01

    ... 22 Foreign Relations 2 2010-04-01 2010-04-01 true Security, confidentiality and protection of... Bureau of Standard's booklet “Computer Security Guidelines for Implementing the Privacy Act of 1974” (May... STATES AND MEXICO, UNITED STATES SECTION PRIVACY ACT OF 1974 § 1101.5 Security, confidentiality and...

  5. Genetic secrets: Protecting privacy and confidentiality in the genetic era. Final report

    Energy Technology Data Exchange (ETDEWEB)

    Rothstein, M.A. [ed.

    1998-09-01

    Few developments are likely to affect human beings more profoundly in the long run than the discoveries resulting from advances in modern genetics. Although the developments in genetic technology promise to provide many additional benefits, their application to genetic screening poses ethical, social, and legal questions, many of which are rooted in issues of privacy and confidentiality. The ethical, practical, and legal ramifications of these and related questions are explored in depth. The broad range of topics includes: the privacy and confidentiality of genetic information; the challenges to privacy and confidentiality that may be projected to result from the emerging genetic technologies; the role of informed consent in protecting the confidentiality of genetic information in the clinical setting; the potential uses of genetic information by third parties; the implications of changes in the health care delivery system for privacy and confidentiality; relevant national and international developments in public policies, professional standards, and laws; recommendations; and the identification of research needs.

  6. 12 CFR 563g.13 - Public disclosure and confidential treatment.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 5 2010-01-01 2010-01-01 false Public disclosure and confidential treatment. 563g.13 Section 563g.13 Banks and Banking OFFICE OF THRIFT SUPERVISION, DEPARTMENT OF THE TREASURY SECURITIES OFFERINGS § 563g.13 Public disclosure and confidential treatment. (a) Any offering circular...

  7. 21 CFR 821.55 - Confidentiality.

    Science.gov (United States)

    2010-04-01

    ... permission to release, the patient's name, address, telephone number, and social security number, or other... MEDICAL DEVICE TRACKING REQUIREMENTS Records and Inspections § 821.55 Confidentiality. (a) Any patient... identify patient or research subjects shall not be available for public disclosure except as provided in...

  8. Conflicting duties over confidentiality in Argentina and Peru.

    Science.gov (United States)

    Cavallo, Mercedes

    2011-02-01

    The medical duty of confidentiality represents a key element for the provision of reproductive and sexual health services. In some Latin American countries, such as Argentina and Peru, the legal systems impose—or are interpreted as imposing—on health professionals the duty of confidentiality, but also the duty to report the commission of a public order offense that they know about owing to the practicing of their profession. In these countries, the conflicting duties and the criminalization of abortion cause severe public health and human rights problems when health professionals assist their patients for post-abortion treatment. Typically, patients are deterred from seeking prompt medical care, and their privacy, autonomy, and dignity are violated. A 2010 ruling from the Supreme Court of Argentina and a 2004 ruling from the Inter-American Court of Human Rights emerge as important instruments that grant a more adequate protection of medical confidentiality. © 2010 International Federation of Gynecology and Obstetrics. Published by Elsevier Ireland Ltd. All rights reserved.

  9. 76 FR 13193 - Government-Owned Inventions; Availability for Licensing

    Science.gov (United States)

    2011-03-10

    ...-451-7533 for more information. Method for the Detection of a Subdural Hematoma Using a Handheld Hematoma Detector and Discriminator Description of Invention: The invention offered for licensing and... utilized to discriminate between subdural and epidural hematoma. The invention also discloses a novel...

  10. Commercial progress and impacts of inventions and innovations

    Energy Technology Data Exchange (ETDEWEB)

    Perlack, R.D.; Rizy, C.G.; Franchuk, C.A.; Cohn, S.M.

    1999-08-01

    This report presents the survey results from the 1997 inventions and innovations evaluation questionnaire. The evaluation impacts are based on responses from 136 out of 334 inventors sent the questionnaire. In 1996, there were 67 inventions identified that currently have direct, licensed, or spinoff sales. In total, the number of inventions and innovations with current sales and past sales (now retired from the market) is 144. This represents a commercial success rate of over 27%. For these grant-receiving inventions, the following performance metrics are of interest: (1) total cumulative direct and licensed sales through 1996 were $700 million (1995$), in addition, cumulative spinoff sales and royalties were $90 million and $20 million (1995$) through 1996, respectively; (2) employment sustained by direct and licensed sales was 1,189 full-time equivalents in 1996, employment attributable to technologies with no sales was 90 full-time equivalents, and the annual federal income taxes collected as a result of this employment was in excess of $6 million; and (3) energy savings attribute to supported inventions and innovations were estimated at 78 trillion Btu in 1996 with an estimated value of nearly $190 million (1995$), the associated reduction in carbon emissions was over 1.5 million metric tons. In terms of future commercialization progress and impacts, the 1997 survey revealed that 60% of the respondents are actively pursuing their invention, and nearly 50% of the inventions are in the prototype development, pre-production prototype testing, and pre-production development stages.

  11. Invention party of students 2

    International Nuclear Information System (INIS)

    Wang, Yeon Jung

    2000-02-01

    The contents of this book are lettuce and royal foxglove tree leaves, memory of summer sea, summer vacation of a freak, waste tires and a fishbowl, a spoon and a iron hand, a iron hand and emergency signal light, my friend is Macgyver, a merry cleaning time, Hojin's invention diary. I am a inventor, a happy winter vacation, the best from losing the draw. This book gives a descriptions of the cases of inventions which are made up through unique and brilliant idea.

  12. THE VALUE AND ECONOMIC EFFECTS OF UNAPPLIED INVENTIONS

    Directory of Open Access Journals (Sweden)

    Raul Sorin V. FÂNTÂNĂ

    2014-06-01

    Full Text Available The accounting regulations, the guidelines for their application and other articles by accounting specialists argue that inventions created internally are not recognized as intangible assets. Only assets acquired separately can be measured reliably, based on the document justifying the purchase transaction. Other specialised papers show that it is difficult to establish the existence of this intangible asset and its credible cost. That is, it can give or calculate a value of the invention only if it can show the acceptable cost of achieving it. But all these works argue that the protection of inventions is profitable if it is the basis of a new business, if it promotes or protects the current activity. However, these papers elude - because it is uncomfortable - the situation where an invention created internally has a value only because it forecloses the market. It is curious that an invention has accounting value only when traded.

  13. Confidentiality with Minors: The Need for Policy To Promote and Protect.

    Science.gov (United States)

    Stone, Carolyn; Isaacs, Madelyn L.

    2003-01-01

    Investigated school counselors' attitudes toward breaching confidentiality before and after the 1999 Columbine High School shootings. Surveys of demographically similar counselors indicated that the Columbine shootings affected counselors' predictions about their attitudes and behavior regarding confidentiality. Counselors were more reluctant to…

  14. 42 CFR 93.108 - Confidentiality.

    Science.gov (United States)

    2010-10-01

    ... 42 Public Health 1 2010-10-01 2010-10-01 false Confidentiality. 93.108 Section 93.108 Public Health PUBLIC HEALTH SERVICE, DEPARTMENT OF HEALTH AND HUMAN SERVICES HEALTH ASSESSMENTS AND HEALTH EFFECTS STUDIES OF HAZARDOUS SUBSTANCES RELEASES AND FACILITIES PUBLIC HEALTH SERVICE POLICIES ON RESEARCH...

  15. 40 CFR 710.58 - Confidentiality.

    Science.gov (United States)

    2010-07-01

    ...) Any person submitting information under this subpart may assert a business confidentiality claim for... with reporting under this subpart? How could a competitor use such information? Would the effects of... that your competitors do not know it is being manufactured or imported for a commercial purpose by...

  16. Optimizing Outcome in the University-Industry Technology Transfer Projects

    Science.gov (United States)

    Alavi, Hamed; Hąbek, Patrycja

    2016-06-01

    Transferring inventions of academic scientists to private enterprises for the purpose of commercialization is long known as University-Industry (firm) Technology Transfer While the importance of this phenomenon is simultaneously raising in public and private sector, only a part of patented academic inventions succeed in passing the process of commercialization. Despite the fact that formal Technology Transfer process and licencing of patented innovations to third party is the main legal tool for safeguarding rights of academic inventors in commercialization of their inventions, it is not sufficient for transmitting tacit knowledge which is necessary in exploitation of transferred technology. Existence of reciprocal and complementary relations between formal and informal technology transfer process has resulted in formation of different models for university-industry organizational collaboration or even integration where licensee firms keep contact with academic inventors after gaining legal right for commercialization of their patented invention. Current paper argues that despite necessity for patents to legally pass the right of commercialization of an invention, they are not sufficient for complete knowledge transmission in the process of technology transfer. Lack of efficiency of formal mechanism to end the Technology Transfer loop makes an opportunity to create innovative interpersonal and organizational connections among patentee and licensee company. With emphasize on need for further elaboration of informal mechanisms as critical and underappreciated aspect of technology transfer process, article will try to answer the questions of how to optimize knowledge transmission process in the framework of University-Industry Technology Transfer Projects? What is the theoretical basis for university-industry technology transfer process? What are organization collaborative models which can enhance overall performance by improving transmission of knowledge in

  17. Inventions leading to the development of the diagnostic test kit industry--from the modern pregnancy test to the sandwich assays.

    Science.gov (United States)

    Wide, Leif

    2005-01-01

    The universities are encouraged by the government nowadays to stimulate innovations and also to provide the proper machinery for assisting the protection and commercialisation of innovations. A better understanding of the innovation process may help to create an atmosphere suitable for inventions at the university. Examples can be taken from successful innovations previously made at the university. During the 1960's I made a series of inventions, which ultimately led to the development of the diagnostic test kit industry. The first, which I made as an undergraduate, was a simple and reliable test kit for diagnosis of pregnancy. This was followed by the solid phase radioimmunoassay and a solid phase assay for vitamin B12; next, the dual specific non-competitive sandwich assay and the in-vitro test for diagnosis of allergy, called RAST (Radioallergosorbent test). Organon in Holland with the pregnancy test kit, and Pharmacia in Sweden with test kits for radioimmunoassay, became pioneers among the diagnostic test kit industries. Pharmacia Diagnostics later became one of the leading diagnostic test kit companies in the world and has continued to be so in the field of allergy diagnosis. Each one of these inventions started with a few unique observations leading to a technical development. The pregnancy test as well as the allergy test emerged from the development of assay methods with unique qualities with the subsequent search for appropriate applications. The foreseeing of a commercial value on a future market was a very important step. This was followed by the search for a suitable industry interested to exploit the invention with its new business opportunity i.e. apply for a patent, produce and market the products, which in my case consisted of the necessary reagents and equipments for particular diagnostic tests. Finally, an agreement had to be settled between the entrepreneur and the inventors. This report describes these inventions and particularly discusses some

  18. Participants' safety versus confidentiality: A case study of HIV research.

    Science.gov (United States)

    Leyva-Moral, Juan Manuel; Feijoo-Cid, Maria

    2017-05-01

    Background When conducting qualitative research, participants usually share lots of personal and private information with the researcher. As researchers, we must preserve participants' identity and confidentiality of the data. Objective To critically analyze an ethical conflict encountered regarding confidentiality when doing qualitative research. Research design Case study. Findings and discussion one of the participants in a study aiming to explain the meaning of living with HIV verbalized his imminent intention to commit suicide because of stigma of other social problems arising from living with HIV. Given the life-threatening situation, the commitment related to not disclosing the participant's identity and/or the content of the interview had to be broken. To avoid or prevent suicide, the therapist in charge of the case was properly informed about the participant's intentions. One important question arises from this case: was it ethically appropriate to break the confidentiality commitment? Conclusion confidentiality could be broken if a life-threatening event is identified during data collection and participants must know that. This has to be clearly stated in the informed consent form.

  19. Inventions for future sustainable development in agriculture

    NARCIS (Netherlands)

    Jacobsen, E.; Beers, P.J.; Fischer, A.R.H.

    2011-01-01

    This chapter is directed to the importance of different inventions as driver for sustainable development of agriculture. Inventions are defined as radical new ideas, perspectives and technologies that hold the potential to trigger a change in sustainable agriculture. Innovation is based on one or

  20. 75 FR 39544 - Government-Owned Inventions; Availability for Licensing

    Science.gov (United States)

    2010-07-09

    ... inventions to extend market coverage for companies and may also be available for licensing. ADDRESSES... might be used as a basis for a potential new strategy in cancer therapeutics. The invention also might... novel way to target various cancers for treatment. This invention maybe also useful in regenerative...

  1. How easy the invention is

    Energy Technology Data Exchange (ETDEWEB)

    Wang, Yeon Jung

    2002-05-15

    This book deals with the inventions invented by kids such as a utility helmet, a useful drawing board, automatic safe device, telephone for the blind, a peaceful washboard, roly poly milk bottle, seat belt with height control, gas hose to prevent thief, portable magic soap, useful bus handle, convent desk, a paper cup attached a spoon, a useful washboard, dressing room using moveable small cymbals, fluorescent light which is easy to put in a new one, rods for night, curtain for cars, spray shampoo, and a good calendar.

  2. How easy the invention is

    International Nuclear Information System (INIS)

    Wang, Yeon Jung

    2002-05-01

    This book deals with the inventions invented by kids such as a utility helmet, a useful drawing board, automatic safe device, telephone for the blind, a peaceful washboard, roly poly milk bottle, seat belt with height control, gas hose to prevent thief, portable magic soap, useful bus handle, convent desk, a paper cup attached a spoon, a useful washboard, dressing room using moveable small cymbals, fluorescent light which is easy to put in a new one, rods for night, curtain for cars, spray shampoo, and a good calendar.

  3. Meaningful Use of a Confidential Adolescent Patient Portal.

    Science.gov (United States)

    Thompson, Lindsay A; Martinko, Thomas; Budd, Pamela; Mercado, Rebeccah; Schentrup, Anzeela M

    2016-02-01

    To design and evaluate the usage of an adolescent patient portal specifically adapted for adolescent health care needs that also satisfied institutional meaningful use guidelines regarding electronic health records. Key stakeholders at one academic health care center adopted an online portal and opted to designate a patient portal specifically for adolescents to maximize confidentiality in compliance with state privacy laws. This study analyzed aggregate electronic health record data of adolescents' (ages 12-17.9 years) uptake, usage, and functionality of this portal and compared it to parent portal usage for younger children (ages 0-11 years). Differences in means were calculated using paired t tests. The portal was used similarly between parents of young children and adolescents, with almost 1,000 enrollees in each group from September 1, 2012 to March 31, 2015. There were no gender differences in enrollment. Adolescents were less likely than parents of younger children to review appointments (73% vs. 85%), laboratory tests (67% vs. 79%), problem lists (40% vs. 78%), or allergies (45% vs. 77%, all p values adolescents sent 1,397 confidential messages. Institutional decisions for implementing meaningful use requirements can align with goals of adolescent health. Patient portals can enhance adolescent health care quality and adolescents readily use a confidential portal. Implementation of meaningful use requirements should be checked against adolescent health care needs to maximize confidentiality and promote health communication. Copyright © 2016 Society for Adolescent Health and Medicine. Published by Elsevier Inc. All rights reserved.

  4. Safeguarding Confidentiality in Electronic Health Records.

    Science.gov (United States)

    Shenoy, Akhil; Appel, Jacob M

    2017-04-01

    Electronic health records (EHRs) offer significant advantages over paper charts, such as ease of portability, facilitated communication, and a decreased risk of medical errors; however, important ethical concerns related to patient confidentiality remain. Although legal protections have been implemented, in practice, EHRs may be still prone to breaches that threaten patient privacy. Potential safeguards are essential, and have been implemented especially in sensitive areas such as mental illness, substance abuse, and sexual health. Features of one institutional model are described that may illustrate the efforts to both ensure adequate transparency and ensure patient confidentiality. Trust and the therapeutic alliance are critical to the provider-patient relationship and quality healthcare services. All of the benefits of an EHR are only possible if patients retain confidence in the security and accuracy of their medical records.

  5. 31 CFR 129.5 - Confidentiality.

    Science.gov (United States)

    2010-07-01

    ... 31 Money and Finance: Treasury 1 2010-07-01 2010-07-01 false Confidentiality. 129.5 Section 129.5 Money and Finance: Treasury Regulations Relating to Money and Finance PORTFOLIO INVESTMENT SURVEY... contain data aggregated in such a way that neither the person supplying the information nor the investor...

  6. 40 CFR 710.38 - Confidentiality.

    Science.gov (United States)

    2010-07-01

    ... submitting information under this part may assert a business confidentiality claim for the information. The... with reporting under this part? How could a competitor use such information? Would the effects of... that your competitors do not know it is being manufactured or imported for a commercial purpose by...

  7. Ancient engineers' inventions precursors of the present

    CERN Document Server

    Rossi, Cesare

    2017-01-01

    This book describes the inventions and designs of ancient engineers who are the precursors of the present. The period ranges mainly from 300 B.C. to 1600 A.D. with several exceptions. Many of the oldest inventions are documented by archaeological finds, often very little known, mainly from Pompeii, Herculaneum and Stabiae and reveal a surprising modernity in their conception. Most of the inventions presented in the first four parts of the book were conceived up to the late Roman Empire and may be considered as milestones, each in their respective field. The fifth part concentrates on more recent centuries. The sixth part deals with some building construction techniques. Generally, for each of the presented inventions, three elements of research and reference are provided: written documents (the classics), iconic references (coins, bas-reliefs, etc.) and archaeological findings. The authors did not write this book for engineers only; hence they describe all the devices without assuming wide technical knowledge...

  8. Public expectations concerning confidentiality protection of adolescents' sexual and reproductive health care in Lithuania

    DEFF Research Database (Denmark)

    Jaruseviciene, Lina; Zaborskis, Apolinaras; Lazarus, Jeffrey Victor

    2014-01-01

    OBJECTIVE: An adolescent's right to confidential healthcare is protected by international law and professional consensus. However, parental and social support for confidential sexual and reproductive health (SRH) services, in particular, varies greatly. This study documents Lithuanian residents......' expectations with regard to confidentiality protection for adolescents in this domain, and explores the factors related to the diversity of these expectations. METHODS: Two national surveys of Lithuanian residents completed in 2005 and 2012 using anonymous questionnaires. Participants rated their expectations...... for confidentiality using a five-point Likert scale for eight types of SRH consultations. RESULTS: Public anticipation for confidentiality depended on whether issues related to sexual behaviour or to its consequences were addressed during adolescent consultation. Only younger respondents had higher expectations...

  9. 43 CFR 6.2 - Report of invention.

    Science.gov (United States)

    2010-10-01

    ... official working hours, the extent use was made of government facilities, equipment, funds, material or... withhold the report until the process or device is completely reduced to practice, reduction to practice... the Government and of the inventor. If an invention is reduced to practice after the invention report...

  10. THE PRINCIPLE OF CONFIDENTIALITY IN ARBITRATION. APPLICATION AND LIMITATIONS OF THE PRINCIPLE

    Directory of Open Access Journals (Sweden)

    Bazil Oglindă

    2015-11-01

    Full Text Available Over the years, arbitration has grown to be the preferred means of dispute resolution by commercial entities. One of the benefits that build the attraction for this system of dispute resolution was the principle of confidentiality. One issue that needs to be analyzed is about the reasons why confidentiality is so important in business. Confidentiality is a principle largely embraced in arbitration, but, as we will see, the principle is not an absolute one. There are a set of questions that needs to be answer to, like: Who is bound by the duty of confidentiality? Does this refer only to the parties or does it expands to other actors involved in the arbitral proceedings? What happens with the obligation of confidentiality when issues are brought before a court, taking in account the principle of open justice? We will see that in some countries are procedural laws allowing the courts to order an arbitration claim to be heard in public or in private. Another important aspect that has arisen in the last period is regarding the public policy and the protection of public interest as a limitation to confidentiality of arbitration. This is a sensitive matter especially when one of the parties is a state or a state entity. This study aims to explore the principle of confidentiality in arbitration by focusing on its domain and on its limits, both from the comparative approach and from the Romanian approach. Knowing all this aspects, we will realize the importance of having professional counseling when drafting an arbitration clause and how this can be the missing puzzle piece of your business.

  11. 41 CFR 105-60.405 - Processing requests for confidential commercial information.

    Science.gov (United States)

    2010-07-01

    ... MATERIALS 60.4-Described Records § 105-60.405 Processing requests for confidential commercial information... 41 Public Contracts and Property Management 3 2010-07-01 2010-07-01 false Processing requests for confidential commercial information. 105-60.405 Section 105-60.405 Public Contracts and Property Management...

  12. Privacy and confidentiality: perspectives of mental health consumers and carers in pharmacy settings.

    Science.gov (United States)

    Hattingh, Hendrika Laetitia; Knox, Kathy; Fejzic, Jasmina; McConnell, Denise; Fowler, Jane L; Mey, Amary; Kelly, Fiona; Wheeler, Amanda J

    2015-02-01

    The study aims to explore within the community pharmacy practice context the views of mental health stakeholders on: (1) current and past experiences of privacy, confidentiality and support; and (2) expectations and needs in relation to privacy and confidentiality. In-depth interviews and focus groups were conducted in three states in Australia, namely Queensland, the northern region of New South Wales and Western Australia, between December 2011 and March 2012. There were 98 participants consisting of consumers and carers (n = 74), health professionals (n = 13) and representatives from consumer organisations (n = 11). Participants highlighted a need for improved staff awareness. Consumers indicated a desire to receive information in a way that respects their privacy and confidentiality, in an appropriate space. Areas identified that require improved protection of privacy and confidentiality during pharmacy interactions were the number of staff having access to sensitive information, workflow models causing information exposure and pharmacies' layout not facilitating private discussions. Challenges experienced by carers created feelings of isolation which could impact on care. This study explored mental health stakeholders' experiences and expectations regarding privacy and confidentiality in the Australian community pharmacy context. A need for better pharmacy staff training about the importance of privacy and confidentiality and strategies to enhance compliance with national pharmacy practice requirements was identified. Findings provided insight into privacy and confidentiality needs and will assist in the development of pharmacy staff training material to better support consumers with sensitive conditions. © 2014 Royal Pharmaceutical Society.

  13. Examining the social and scientific roles of invention in science education

    Science.gov (United States)

    Calabrese-Barton, Angela

    1998-03-01

    I have been drawn to the construct of “invention” and “inventive acts” because in my research involving how homeless children construct science and the self-in-science, an overwhelming theme has been the multiple ways in which self-identity in science has been described by the children through a language of invention. Using post-modern feminism and science and technologies studies, I examine the multiple uses and definitions of “invention” in science in order to develop a theory of invention and inventive acts around the themes: invention as a social act, invention as a recursive and socially linked process, and embodied agency. I use this framework to examine the construct of “invention” in two different case studies involving the science education of urban homeless children. Finally, I link this discussion of invention and inventive acts with current international reform initiatives revolving around constructivist science teaching and learning.

  14. The erosion of psychiatrist-patient confidentiality by subpoenas.

    Science.gov (United States)

    Levy, John; Galambos, Gary; Skarbek, Yvonne

    2014-08-01

    We explore the reasons for the prolific use of subpoenas to gain access to psychiatric records in Australia. We examine the applicable legal principles and practices at the New South Wales (NSW) and Commonwealth levels, aiming to develop recommendations for Australian Governments to curb the inappropriate and harmful use of subpoenas. Unfettered legal access to psychiatric records is inconsistent with professional ethical guidelines and risks undermining the provision of quality psychiatric care to the community. The existing legal provisions are failing to protect psychiatrist-patient confidentiality. In NSW, the onus is placed on the psychiatrist and/or patient to make a complicated application to the court, to direct that a subpoena be set aside on the grounds of "Professional Confidential Relationship Privilege." An absence of Commonwealth legislation to protect psychiatrist-patient confidentiality is used by some litigants in family law proceedings to disadvantage patients by stigmatising them, because they have consulted psychiatrists. We recommend that uniform legislation be implemented, giving effect to a primary rule of privilege with exceptions. © The Royal Australian and New Zealand College of Psychiatrists 2014.

  15. Improved Message Authentication and Confidentiality Checking

    International Nuclear Information System (INIS)

    Ismail Jabiullah, M.; Abdullah Al-Shamim, M.; Lutfar Rahman, M.

    2005-01-01

    The most confusing areas of the secured network communications are the message authentication and confidentiality checking. The attacks and the counter measures have become so convoluted that the users in this area begin to account for all contingencies. Two session-key generation techniques are used here to generate two separate session keys K 1 and K 2 ; and both the sender and the reveiver share these keys for higher degree of authentication and confidentiality. For this, the message is first encrypted by the key K 1 , and then the intermediary message authenticatin code (MAC) is generated by encrypting the encrypted message using the key K 2 . Then, the encrypted message and the intermediary MAC is again encrypted by using the K 2 and concatenated with the encrypted message and sent to the destination. At the receiving end, first, the received ciphertext is encrypted by using key K 2 and compared to the received MAC. The received ciphertext again is decrypted by the key K 2 and compared with the first decrypted MAC twice by the key K 2 . The plaintext is obtained by decrypting the received ciphertext first by K 2 and then by K 1 , using the corresponding decryption techniques respectively. The encryption techniques with key K 2 provides the authentication and with key K 1 provides the confidentiality checking of the transmitted message. The developed technique can be applied to both academic and commercial applications in online or offline electronic transactions for security.(authors)

  16. Access control and confidentiality in radiology

    Science.gov (United States)

    Noumeir, Rita; Chafik, Adil

    2005-04-01

    A medical record contains a large amount of data about the patient such as height, weight and blood pressure. It also contains sensitive information such as fertility, abortion, psychiatric data, sexually transmitted diseases and diagnostic results. Access to this information must be carefully controlled. Information technology has greatly improved patient care. The recent extensive deployment of digital medical images made diagnostic images promptly available to healthcare decision makers, regardless of their geographic location. Medical images are digitally archived, transferred on telecommunication networks, and visualized on computer screens. However, with the widespread use of computing and communication technologies in healthcare, the issue of data security has become increasingly important. Most of the work until now has focused on the security of data communication to ensure its integrity, authentication, confidentiality and user accountability. The mechanisms that have been proposed to achieve the security of data communication are not specific to healthcare. Data integrity can be achieved with data signature. Data authentication can be achieved with certificate exchange. Data confidentiality can be achieved with encryption. User accountability can be achieved with audits. Although these mechanisms are essential to ensure data security during its transfer on the network, access control is needed in order to ensure data confidentiality and privacy within the information system application. In this paper, we present and discuss an access control mechanism that takes into account the notion of a care process. Radiology information is categorized and a model to enforce data privacy is proposed.

  17. 18 CFR 270.506 - Confidentiality.

    Science.gov (United States)

    2010-04-01

    ... 18 Conservation of Power and Water Resources 1 2010-04-01 2010-04-01 false Confidentiality. 270.506 Section 270.506 Conservation of Power and Water Resources FEDERAL ENERGY REGULATORY COMMISSION...) through (9) of 5 U.S.C. 552(b). (b) Upon receipt of a request for disclosure of information treated as...

  18. OPTIMIZING OUTCOME IN THE UNIVERSITY-INDUSTRY TECHNOLOGY TRANSFER PROJECTS

    Directory of Open Access Journals (Sweden)

    Hamed ALAVI

    2016-04-01

    Full Text Available Transferring inventions of academic scientists to private enterprises for the purpose of commercialization is long known as University-Industry (firm Technology Transfer While the importance of this phenomenon is simultaneously raising in public and private sector, only a part of patented academic inventions succeed in passing the process of commercialization. Despite the fact that formal Technology Transfer process and licencing of patented innovations to third party is the main legal tool for safeguarding rights of academic inventors in commercialization of their inventions, it is not sufficient for transmitting tacit knowledge which is necessary in exploitation of transferred technology. Existence of reciprocal and complementary relations between formal and informal technology transfer process has resulted in formation of different models for university-industry organizational collaboration or even integration where licensee firms keep contact with academic inventors after gaining legal right for commercialization of their patented invention. Current paper argues that despite necessity for patents to legally pass the right of commercialization of an invention, they are not sufficient for complete knowledge transmission in the process of technology transfer. Lack of efficiency of formal mechanism to end the Technology Transfer loop makes an opportunity to create innovative interpersonal and organizational connections among patentee and licensee company. With emphasize on need for further elaboration of informal mechanisms as critical and underappreciated aspect of technology transfer process, article will try to answer the questions of how to optimize knowledge transmission process in the framework of University-Industry Technology Transfer Projects? What is the theoretical basis for university-industry technology transfer process? What are organization collaborative models which can enhance overall performance by improving transmission of

  19. Privacy and Confidentiality Practices In Adolescent Family Planning Care At Federally Qualified Health Centers.

    Science.gov (United States)

    Beeson, Tishra; Mead, Katherine H; Wood, Susan; Goldberg, Debora Goetz; Shin, Peter; Rosenbaum, Sara

    2016-03-01

    The confidentiality of family planning services remains a high priority to adolescents, but barriers to implementing confidentiality and privacy practices exist in settings designed for teenagers who are medically underserved, including federally qualified health centers (FQHCs). A sample of 423 FQHCs surveyed in 2011 provided information on their use of five selected privacy and confidentiality practices, which were examined separately and combined into an index. Regression modeling was used to assess whether various state policies and organizational characteristics were associated with FQHCs' scores on the index. In-depth case studies of six FQHCs were conducted to provide additional contextual information. Among FQHCs reporting on confidentiality, most reported providing written or verbal information regarding adolescents' rights to confidential care (81%) and limiting access to family planning and medical records to protect adolescents' confidentiality (84%). Far fewer reported maintaining separate medical records for family planning (10%), using a security block on electronic medical records to prevent disclosures (43%) or using separate contact information for communications regarding family planning services (50%). Index scores were higher among FQHCs that received Title X funding than among those that did not (coefficient, 0.70) and among FQHCs with the largest patient volumes than among those with the smallest caseloads (0.43). Case studies highlighted how a lack of guidelines and providers' confusion over relevant laws present a challenge in offering confidential care to adolescents. The organizational practices used to ensure adolescent family planning confidentiality in FQHCs are varied across organizations. Copyright © 2016 by the Guttmacher Institute.

  20. Ombudsing at Canadian universities through the eyes of a Dutch ombudsman

    NARCIS (Netherlands)

    Herfs, Paul

    2016-01-01

    The Ombudsman of Utrecht University in the Netherlands made a study trip to Canada in the spring of 2016. He visited 12 universities in order to gather best practises at the Offices of Canadian ombudspersons. The major principles namely Independence, impartiality and confidentiality were described.

  1. 7 CFR 900.309 - Confidential information.

    Science.gov (United States)

    2010-01-01

    ... Conduct of Referenda To Determine Producer Approval of Milk Marketing Orders To Be Made Effective Pursuant to Agricultural Marketing Agreement Act of 1937, as Amended § 900.309 Confidential information. The... Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (Marketing...

  2. 7 CFR 1216.62 - Confidential treatment.

    Science.gov (United States)

    2010-01-01

    ... this subpart or statistical data collected therefrom, which statements do not identify the information... 7 Agriculture 10 2010-01-01 2010-01-01 false Confidential treatment. 1216.62 Section 1216.62 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (MARKETING...

  3. 7 CFR 1209.62 - Confidential treatment.

    Science.gov (United States)

    2010-01-01

    ... this subpart or statistical data collected therefrom, which statements do not identify the information... 7 Agriculture 10 2010-01-01 2010-01-01 false Confidential treatment. 1209.62 Section 1209.62 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (MARKETING...

  4. 7 CFR 929.65 - Confidential information.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 8 2010-01-01 2010-01-01 false Confidential information. 929.65 Section 929.65 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (Marketing... position, financial condition, or business operations of the particular handler from whom received, shall...

  5. 7 CFR 930.73 - Confidential information.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 8 2010-01-01 2010-01-01 false Confidential information. 930.73 Section 930.73 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (Marketing... a trade secret or disclosing trade position, financial condition, or business operations of the...

  6. Distant Recombination and the Creation of Basic Inventions

    DEFF Research Database (Denmark)

    Barirani, Ahmad; Beaudry, Catherine; Agard, Bruno

    2015-01-01

    This article explores whether the relationship between the breath of technological integration (recombination distance) and the breath of an invention׳s subsequent application (basicness) is moderated by the sector of activity (private or public), science-linkage strength and industry characteris...

  7. New Paradigms for Computer Aids to Invention.

    Science.gov (United States)

    Langston, M. Diane

    Many people are interested in computer aids to rhetorical invention and want to know how to evaluate an invention aid, what the criteria are for a good one, and how to assess the trade-offs involved in buying one product or another. The frame of reference for this evaluation is an "old paradigm," which treats the computer as if it were…

  8. 7 CFR 1150.173 - Confidential treatment.

    Science.gov (United States)

    2010-01-01

    ... reports of the number of persons subject to this subpart or statistical data collected therefrom, which... 7 Agriculture 9 2010-01-01 2009-01-01 true Confidential treatment. 1150.173 Section 1150.173 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (Marketing...

  9. 7 CFR 1221.127 - Confidential treatment.

    Science.gov (United States)

    2010-01-01

    ... statistical data collected there from, which statements do not identify the information furnished by any... 7 Agriculture 10 2010-01-01 2010-01-01 false Confidential treatment. 1221.127 Section 1221.127 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (MARKETING...

  10. 7 CFR 1160.403 - Confidential treatment.

    Science.gov (United States)

    2010-01-01

    ... statistical data collected from such sources, which statements do not identify the information furnished by... 7 Agriculture 9 2010-01-01 2009-01-01 true Confidential treatment. 1160.403 Section 1160.403 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (Marketing...

  11. 7 CFR 1250.354 - Confidential treatment.

    Science.gov (United States)

    2010-01-01

    ... subject to this subpart or statistical data collected therefrom, which statements do not identify the... 7 Agriculture 10 2010-01-01 2010-01-01 false Confidential treatment. 1250.354 Section 1250.354 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (MARKETING...

  12. 7 CFR 1260.203 - Confidential treatment.

    Science.gov (United States)

    2010-01-01

    ... of persons subject to this subpart or statistical data collected therefrom, which statements do not... 7 Agriculture 10 2010-01-01 2010-01-01 false Confidential treatment. 1260.203 Section 1260.203 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (MARKETING...

  13. 7 CFR 1218.62 - Confidential treatment.

    Science.gov (United States)

    2010-01-01

    ... of the number of persons subject to this subpart or statistical data collected therefrom, which... 7 Agriculture 10 2010-01-01 2010-01-01 false Confidential treatment. 1218.62 Section 1218.62 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (MARKETING...

  14. 7 CFR 1215.62 - Confidential treatment.

    Science.gov (United States)

    2010-01-01

    ... persons subject to this part or statistical data collected therefrom, which statements do not identify the... 7 Agriculture 10 2010-01-01 2010-01-01 false Confidential treatment. 1215.62 Section 1215.62 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (MARKETING...

  15. 7 CFR 1210.607 - Confidential information.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 10 2010-01-01 2010-01-01 false Confidential information. 1210.607 Section 1210.607 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (MARKETING... contents and all other information or reports furnished to, compiled by, or in possession of, the...

  16. 7 CFR 1210.352 - Confidential treatment.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 10 2010-01-01 2010-01-01 false Confidential treatment. 1210.352 Section 1210.352 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (MARKETING... treatment. (a) All information obtained from the books, records, or reports required to be maintained under...

  17. 7 CFR 984.79 - Confidential information.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 8 2010-01-01 2010-01-01 false Confidential information. 984.79 Section 984.79 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (Marketing... or disclosing the trade position, or financial condition or business operations of the handler shall...

  18. 7 CFR 993.71 - Confidential information.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 8 2010-01-01 2010-01-01 false Confidential information. 993.71 Section 993.71 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (Marketing... information constituting a trade secret or disclosing of the trade position, financial condition, or business...

  19. 7 CFR 932.63 - Confidential information.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 8 2010-01-01 2010-01-01 false Confidential information. 932.63 Section 932.63 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (Marketing... from such reports and records which might affect the trade position, financial condition, or business...

  20. 7 CFR 982.70 - Confidential information.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 8 2010-01-01 2010-01-01 false Confidential information. 982.70 Section 982.70 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (Marketing... trade secret or disclosing of the trade position, financial condition, or business operations of the...

  1. 48 CFR 1552.235-76 - Treatment of Confidential Business Information (APR 1996).

    Science.gov (United States)

    2010-10-01

    ... Business Information (APR 1996). 1552.235-76 Section 1552.235-76 Federal Acquisition Regulations System... Provisions and Clauses 1552.235-76 Treatment of Confidential Business Information (APR 1996). As prescribed in 1535.007-70(c), insert the following clause: Treatment of Confidential Business Information (TSCA...

  2. 45 CFR 7.1 - Duty of employee to report inventions.

    Science.gov (United States)

    2010-10-01

    ... 45 Public Welfare 1 2010-10-01 2010-10-01 false Duty of employee to report inventions. 7.1 Section 7.1 Public Welfare DEPARTMENT OF HEALTH AND HUMAN SERVICES GENERAL ADMINISTRATION EMPLOYEE INVENTIONS § 7.1 Duty of employee to report inventions. Every Department employee is required to report to...

  3. 48 CFR 1552.235-70 - Screening business information for claims of confidentiality.

    Science.gov (United States)

    2010-10-01

    ... 48 Federal Acquisition Regulations System 6 2010-10-01 2010-10-01 true Screening business... Texts of Provisions and Clauses 1552.235-70 Screening business information for claims of confidentiality... proprietary or confidential by the business that has the right to the information. The following clause...

  4. Identifying and Developing Inventive Talent in the Republic of Korea

    Science.gov (United States)

    Lee, Seungmo

    2016-01-01

    In the 21st century, the need to develop creative potential through education is more critical than ever. Invention-gifted education is one approach that can both foster creativity and develop inventive talent. Invention-gifted education in the Republic of Korea is distinctive in its systematic approach to talent identification and talent…

  5. 7 CFR 1212.72 - Confidential treatment.

    Science.gov (United States)

    2010-01-01

    ... statements based upon the reports of the number of persons subject to this subpart or statistical data... 7 Agriculture 10 2010-01-01 2010-01-01 false Confidential treatment. 1212.72 Section 1212.72 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (MARKETING...

  6. 7 CFR 1206.62 - Confidential treatment.

    Science.gov (United States)

    2010-01-01

    ... statements based upon the reports of the number of persons subject to this subpart or statistical data... 7 Agriculture 10 2010-01-01 2010-01-01 false Confidential treatment. 1206.62 Section 1206.62 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (MARKETING...

  7. 7 CFR 1219.63 - Confidential treatment.

    Science.gov (United States)

    2010-01-01

    ... upon the reports of the number of persons subject to this subpart or statistical data collected from... 7 Agriculture 10 2010-01-01 2010-01-01 false Confidential treatment. 1219.63 Section 1219.63 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (MARKETING...

  8. 7 CFR 983.65 - Confidential information.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 8 2010-01-01 2010-01-01 false Confidential information. 983.65 Section 983.65 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (Marketing... the particular handler or their customers shall be received by, and at all times kept in the custody...

  9. 7 CFR 996.72 - Confidential information.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 8 2010-01-01 2010-01-01 false Confidential information. 996.72 Section 996.72 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (Marketing... condition, or business operations of the particular handlers or their customers shall be received by, and at...

  10. Doctor-patient confidentiality - right and duty of a doctor in law regulations

    Directory of Open Access Journals (Sweden)

    Janusz Jaroszyński

    2018-03-01

    Full Text Available Physician’s professional secrecy is one of the most important duties of a doctor and should be provided with confidentiality regarding his or her health. Generally speaking, there is no legal definition of "physician’s professional secrecy" in Poland, although this concept already appears in the oath of Hippocrates: ‘I will keep secret anything I see or hear professionally which ought not to be told’. The issue of medical confidentiality (physician’s professional secrecy has been regulated in several legal acts such as: The Patient Rights and Patients Ombudsman Act, The Constitution of the Republic of Poland, The Medical Profession Act, The Civil Code Act, The Criminal Code Act and Code of Medical Ethics which is not considered as a legal act. The patient has the right to require confidentiality of the information concerning him and the obligation to keep medical confidentiality will apply to every representative of the medical profession, who obtained certain information by various professional activities.

  11. Science, technology and inventions: Children draw their own visions

    Science.gov (United States)

    D'Addezio, G.; Rubbia, G.; Marsili, A.

    2013-12-01

    Italian primary schools participated with enthusiasm to the drawing competition 'I'm a scientist too! Science and scientists from the children point of view' organized by the Laboratorio di Didattica e Divulgazione Scientifica of Istituto Nazionale di Geofisica e Vulcanologia (INGV) in Rome, Italy. The best drawings were awarded and published in the 2011 school calendar. Children were asked to realize a drawing, choosing among three suggestions: 1) How do you imagine a scientist, and how do you imagine the daily activities of a researcher? 2) What invention do you consider the most important among all those you know? 3) What would you invent? The topic 'invention' (#3) was the most successful. In fact, among the collected 1,000 drawings, 400 drawings depict scientists, nearly 150 depict scientists with their inventions, and other 350 depict inventions alone. A classification scheme was designed in order to synthetically describe this set of images and analyze it. The Draw-A-Scientist scheme, known from literature, was maintained but modified in order to characterize both inventors and inventions. A preliminary analysis about scientists reveals a persistent gender stereotype, since most of depicted persons were male and nearly half of girls draw men scientists. The image of 'mad scientist' is still present but it is mainly related to men. Women scientists are drawn by girls; they are represented as young, not crazy, usually good-looking. There are no particular differences between boys and girls in assigning research fields to scientists. Women scientists are often depicted as assistants, but when alone they are self-confident enough to give their name to an invention or to aspire for Nobel Prize. In this work we present the preliminary analysis performed on drawings containing inventions. What do girls and boys 6 to 11 years old invent? Robots, helping in housekeeping or in doing homework; rockets, space vehicles and time machines, but also fictional machines and

  12. Confidential Declaration of Family Situation (CDFS)

    CERN Document Server

    Human Resources Department

    2005-01-01

    The Confidential Declaration of Family Situation (CDFS) becomes a new computerized EDH form from October 2005 In accordance with Article R IV 1.17 of the Staff Regulations, Staff Members and Fellows, married or separated, must notify any changes in their spouse's income or health insurance cover in writing to CERN, within 30 calendar days of the change. This is necessary for the Organization to determine if a supplementary contribution is payable to the CERN Health Insurance Scheme (CHIS) for the spouse's coverage and, if so, the amount. Until now a paper form called « Confidential Declaration of Family Situation » (CDFS) was used for that purpose.  From early October 2005 the CDFS will be computerized for the whole Organization. Henceforth, any changes in a spouse's income or health insurance cover must be notified using EDH (Electronic Document Handling). Additionally, annual updates of the declaration will be required and will be requested by automatic e-mail. Early October an email will be sent to...

  13. 10 CFR 784.5 - Waiver of identified inventions.

    Science.gov (United States)

    2010-01-01

    ... contractor has made or will make substantial investment of financial resources or technology developed at the contractor's private expense which will directly benefit the commercialization of the invention; (g) The... extent to which the Government has contributed to the field of technology of the invention; (e) The...

  14. 48 CFR 1552.235-73 - Access to Federal Insecticide, Fungicide, and Rodenticide Act Confidential Business Information...

    Science.gov (United States)

    2010-10-01

    ... Insecticide, Fungicide, and Rodenticide Act Confidential Business Information (APR 1996). 1552.235-73 Section... Insecticide, Fungicide, and Rodenticide Act Confidential Business Information (APR 1996). As prescribed in... Act Confidential Business Information (APR 1996) In order to perform duties under the contract, the...

  15. Audit, Accountability and Confidential Enquiries into Maternal ...

    African Journals Online (AJOL)

    HP

    Time for Action: Audit, Accountability and Confidential Enquiries ... provision of quality maternity services. Having such a ... services are more likely to be sustained if women can find ..... Donabedian A. An introduction to quality assurance in.

  16. 75 FR 54656 - Government-Owned Inventions, Available for Licensing

    Science.gov (United States)

    2010-09-08

    ... availability of inventions for licensing. SUMMARY: Patent applications on the inventions listed below assigned..., Pasadena, CA 91109; telephone (818) 354-7770. NASA Case No.: NPO-46771-1: Diamond Heat-Spreader for...

  17. 77 FR 63537 - Greenhouse Gas Reporting Program: Proposed Amendments and Confidentiality Determinations for...

    Science.gov (United States)

    2012-10-16

    ... Greenhouse Gas Reporting Program: Proposed Amendments and Confidentiality Determinations for Subpart I...-AR61 Greenhouse Gas Reporting Program: Proposed Amendments and Confidentiality Determinations for... Manufacturing, of the Greenhouse Gas Reporting Rule. Proposed changes include revising certain calculation...

  18. Paternalistic breaches of confidentiality in prison: mental health professionals' attitudes and justifications.

    Science.gov (United States)

    Elger, Bernice Simone; Handtke, Violet; Wangmo, Tenzin

    2015-06-01

    This manuscript presents mental health practitioners' (MHPs) practice, attitudes and justifications for breaching confidentiality when imprisoned patients disclose suicidal thoughts or abuse by others. 24 MHPs working in Swiss prisons shared their experiences regarding confidentiality practices. The data were analysed qualitatively and MHPs' attitudes and course of action were identified. Analysis revealed paternalistic breaches of confidentiality. When patients reported suicidal thoughts and abuse, MHPs believed that forgoing confidentiality is necessary to protect patients, providing several justifications for it. Patients were informed that such information will be transmitted without their consent to medical and non-medical prison personnel. With reference to suicidal attempts, MHPs resorted to methods that may reduce suicidal attempts such as transfer to hospital or internal changes in living arrangements, which would require provision of certain information to prison guards. In cases of abuse, some MHPs convinced patients to accept intervention or sometimes overrode competent patients' refusals to report. Also in the case of abuse, provision of limited information to other prison personnel was seen as an acceptable method to protect patients from further harm. Breaches of confidentiality, whether limited or full, remain unethical, when used for competent patients based solely on paternalistic justifications. Institutionalising ethical and legal procedures to address suicidal and abuse situations would be helpful. Education and training to help both medical and prison personnel to respond to such situations in an appropriate manner that ensures confidentiality and protects patients from suicide and abuse are necessary. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://group.bmj.com/group/rights-licensing/permissions.

  19. 48 CFR 1552.235-75 - Access to Toxic Substances Control Act Confidential Business Information (APR 1996).

    Science.gov (United States)

    2010-10-01

    ... Control Act Confidential Business Information (APR 1996). 1552.235-75 Section 1552.235-75 Federal... Confidential Business Information (APR 1996). As prescribed in 1535.007(b), insert the following provision: Access to Toxic Substances Control Act Confidential Business Information (APR 1996) In order to perform...

  20. Rhetorical Invention and Advanced Literacy: An Historical Perspective.

    Science.gov (United States)

    Hagaman, John

    Recent criticism of rhetorical invention faults the discipline for not promoting "advanced literacy," defined as the use of critical reading and writing abilities to serve social ends. Aristotle's vision of rhetoric has contributed significantly to a cognitive view of invention, but Aristotle also acknowledged the importance of social…

  1. To succeed using patent and invention which are brillant idea

    International Nuclear Information System (INIS)

    Yu, Jae Bok

    1999-07-01

    This book deals with what invention is, how we can be a inventor, how we apply inventions to intellectual property office, and other useful advice and lesson on patent. These are the titles of each part : trouble stories on success to invent, everybody can be a inventor, this is a invention. There is a problem when the idea is same or similar, preceding patent, where does it hide? database on patent, patent information, Let's go to Korean intellectual property office, patient application which we misses in our dream, and instructions of patent including various sides.

  2. 30 CFR 210.40 - Will MMS keep the information I provide confidential?

    Science.gov (United States)

    2010-07-01

    ... 30 Mineral Resources 2 2010-07-01 2010-07-01 false Will MMS keep the information I provide... MINERALS REVENUE MANAGEMENT FORMS AND REPORTS General Provisions § 210.40 Will MMS keep the information I provide confidential? The MMS will treat information obtained under this part as confidential to the...

  3. Confidential data in a competitive utility environment: A regulatory perspective

    Energy Technology Data Exchange (ETDEWEB)

    Vine, E.

    1996-08-01

    Historically, the electric utility industry has been regarded as one of the most open industries in the United States in sharing information but their reputation is being challenged by competitive energy providers, the general public, regulators, and other stakeholders. As the prospect of competition among electricity power providers has increased in recent years, many utilities have been requesting that the data they submit to their utility regulatory commissions remain confidential. Withholding utility information from the public is likely to have serious and significant policy implications with respect to: (1) consumer education, the pursuit of truth, mutual respect among parties, and social cooperation; (2) the creation of a fair market for competitive energy services; (3) the regulatory balance; (4) regional and national assessments of energy-savings opportunities; (5) research and development; and (6) evaluations of utility programs, plans, and policies. In a telephone survey of all public utility commissions (PUCs) that regulate electric and gas utilities in the U.S., we found that almost all PUCs have received requests from utility companies for data to be filed as confidential, and confidential data filings appear to have increased (both in scope and in frequency) in those states where utility restructuring is being actively discussed. The most common types of data submitted as confidential by utilities dealt with specific customer data, market data, avoided costs, and utility costs.

  4. Security without obscurity a guide to confidentiality, authentication, and integrity

    CERN Document Server

    Stapleton, JJ

    2014-01-01

    The traditional view of information security includes the three cornerstones: confidentiality, integrity, and availability; however the author asserts authentication is the third keystone. As the field continues to grow in complexity, novices and professionals need a reliable reference that clearly outlines the essentials. Security without Obscurity: A Guide to Confidentiality, Authentication, and Integrity fills this need. Rather than focusing on compliance or policies and procedures, this book takes a top-down approach. It shares the author's knowledge, insights, and observations about infor

  5. Nanotechnological inventions considerably improve performance characteristics

    Directory of Open Access Journals (Sweden)

    VLASOV Vladimir Alexeevich

    2014-06-01

    Full Text Available The invention «The method of production of carbon nanomaterial (RU 2509053» can be used as an additive for concretes and polymers which significantly improves their performance characteristics. The method of production of carbon nanomaterial consists of the following stages: preliminary preparation of sphagnous moss when it is refined from foreign admixtures, dried up to 10% humidity and ground, then ground material is exposed to pyrolysis under the temperature 850–950оC for 1–2 hours and cooled up to the environment temperature. After that amorphous carbon obtained in pyrolysis is treated with mechanical activation in the variable planetary mill for 7–10 hours. The invention makes it possible to provide increased outcome of nanotubes with high cleanliness. The invention «The method of production of nanodispersed metal powders and alloys of them (RU 2509626» relates to the powder metallurgy. Powder metal chloride or powder mixture at least of two metal chlorides is treated in the environment of the water steam which is supplied in reaction space at the rate of 50–100 ml/min at the temperature 400–800оC at the presence of absorbent carbon or introducing carbon oxide (II obtained during dissolution of formic acid HCOOH. The invention provides reliable production of nanodispersed metal powders and alloys of them from 3-d metal range: Ni, Co, Cu, Fe, Zn which can be used in powder metallurgy to improve baking process, in chemical industry as the fillers of polymers and reaction catalysts; as additives to anticorrosive covers, etc.

  6. Attitude of Lithuanian residents to confidentiality of adolescent sexual and reproductive health care

    DEFF Research Database (Denmark)

    Jaruseviciene, Lina; Lazarus, Jeff; Zaborskis, Apolinaras

    2011-01-01

    To assess the attitudes of Lithuanian residents towards the protection of confidentiality in the sexual and reproductive health care of adolescents.......To assess the attitudes of Lithuanian residents towards the protection of confidentiality in the sexual and reproductive health care of adolescents....

  7. 17 CFR 200.83 - Confidential treatment procedures under the Freedom of Information Act.

    Science.gov (United States)

    2010-04-01

    ... SECURITIES AND EXCHANGE COMMISSION ORGANIZATION; CONDUCT AND ETHICS; AND INFORMATION AND REQUESTS Information... first received by the Commission (i) it is supplied segregated from information for which confidential..., 100 F Street, NE., Washington, DC 20549. The person requesting confidential treatment may supply...

  8. Confidentiality, anonymity and amnesty for midwives in distress seeking online support - Ethical?

    Science.gov (United States)

    Pezaro, Sally; Clyne, Wendy; Gerada, Clare

    2018-06-01

    Midwife health is intrinsically linked to the quality of safe patient care. To ensure safe patient care, there is a need to deliver emotional support to midwives. One option that midwives may turn to may be a confidential online intervention, instead of localised, face-to-face support. Following the Realist And MEta-narrative Evidence Syntheses: Evolving Standards publication standards, this realist synthesis approach explores the ethical considerations in permitting confidentiality, anonymity and amnesty in online interventions to support midwives in work-related psychological distress. An iterative search methodology was used to select nine papers for review. To assimilate information, papers were examined for ideas relating to ethical dimensions of online interventions to support midwives in work-related psychological distress. This review takes a narrative approach. Online interventions can support the development of insight, help seeking and open discussion. Additionally, Internet support groups can become morally persuasive in nature. Anonymity and confidentiality are both effective and therapeutic features of online interventions when used in collaboration with effective online moderation. Yet, ethical dilemmas remain where users cannot be identified. Confidentiality and anonymity remain key components of successful online interventions. However, sanctioning the corollary component of amnesty may provoke moral discomfort for those seeking immediate accountability. For others, amnesty is seen as essential for open disclosure and help seeking. Ultimately, the needs of midwives must be balanced with the requirement to protect the public and the professional reputation of midwifery. In supporting midwives online, the principles of anonymity, confidentiality and amnesty may evoke some resistance on ethical grounds. However, without offering identity protection, it may not be possible to create effective online support services for midwives. The authors of this

  9. Attitudes toward medical and genetic confidentiality in the Saudi research biobank: An exploratory survey.

    Science.gov (United States)

    Alahmad, Ghiath; Hifnawy, Tamer; Abbasi, Badaruddin; Dierickx, Kris

    2016-03-01

    Achieving a balance between giving access to information and respecting donors' confidentiality is a crucial issue for any biobank, with its large number of samples and associated information. Despite the existence of much empirical literature on confidentiality, there are too few surveys in the Middle East about the topic, particularly in the Saudi context. A survey was conducted of 200 respondents at King Abdulaziz Medical City in Riyadh, Saudi Arabia, among 5 groups of equal size, comprised of researchers, physicians, medical students, donors and laypersons, respectively. The majority of participants agreed that confidentiality is an important issue and that it is well protected in the Saudi biobank. All 5 groups showed different attitudes toward disclosing information to various third parties. They were in favor of allowing treating physicians, and to a certain extent family members, to have access to medical and genetic results from research. No significant differences were found between views on medical and genetic confidentiality. The majority of respondents agreed that confidentiality might be breached in cases with specific justified reasons. Even considering differences in religion, culture and other factors, the results of the study were consistent with those reported in the literature and research conducted in other countries. We therefore place emphasis on the importance of protecting and promoting patient/donor confidentiality and privacy. Copyright © 2016. Published by Elsevier Ireland Ltd.

  10. 78 FR 31948 - Government-Owned Inventions; Availability for Licensing

    Science.gov (United States)

    2013-05-28

    ... DEPARTMENT OF HEALTH AND HUMAN SERVICES National Institutes of Health Government-Owned Inventions... research and development. Foreign patent applications are filed on selected inventions to extend market... libraries Optimization assay to further develop potential drug candidates Competitive Advantages: Fast...

  11. METHODS FOR ASSESSING SECURITY THREATS CONFIDENTIAL INFORMATION FOR THE INFORMATION AND TELECOMMUNICATIONS SYSTEMS

    Directory of Open Access Journals (Sweden)

    E. V. Belokurova

    2015-01-01

    Full Text Available The article discusses the different approaches to assessing the safety of confidential information-term for information and telecommunication systems of various pre-appreciable destination in the presence of internal and external threats to its integrity and availability. The difficulty of ensuring the security of confidential information from exposure to information and telecommunication systems of external and internal threats at the present time, is of particular relevance. This problem is confirmed by the analysis of available statistical information on the impact of threats on the security circulating in the information and telecommunications system. Leak confidential information, intellectual property, information, know-how is the result of significant material and moral damage caused to the owner of the restricted information. The paper presents the structure of the indicators and criteria shows that the most promising are analytical criteria. However, their use to assess the level of security of confidential information is difficult due to the lack of appropriate mathematical models. The complexity of the problem is that existing traditional mathematical models are not always appropriate for the stated objectives. Therefore, it is necessary to develop mathematical models designed to assess the security of confidential information and its impact on information and telecommunication system threats.

  12. Novel approach to information security management of confidential ...

    African Journals Online (AJOL)

    Novel approach to information security management of confidential and propriety information ... Journal of Fundamental and Applied Sciences ... valuable information by using steganography it can have a major impact security management.

  13. 75 FR 67985 - Government-Owned Inventions; Availability for Licensing

    Science.gov (United States)

    2010-11-04

    ... . Inhibition of Cell Motility, Angiogenesis and Metastasis Description of Invention: The present invention... SH2 domain-mediated interactions in the metastatic process and support the potential efficacy of this... Modality: Inhibition of cell motility-dependent processes, including angiogenesis and metastasis, in...

  14. Invention Development Program Helps Nurture NCI at Frederick Technologies | Poster

    Science.gov (United States)

    The Invention Development Fund (IDF) was piloted by the Technology Transfer Center (TTC) in 2014 to facilitate the commercial development of NCI technologies. The IDF received a second round of funding from the NCI Office of the Director and the Office of Budget and Management to establish the Invention Development Program (IDP) for fiscal year 2016. The IDP is using these funds to help advance a second set of inventions.

  15. Analysis of the ethical aspects of professional confidentiality in dental practice

    Directory of Open Access Journals (Sweden)

    Cléa Adas Saliba Garbin

    2008-02-01

    Full Text Available From the point of view of deontological ethics, privacy is a moral right that patients are entitled to and it is bound to professional confidentiality. Otherwise, the information given by patients to health professionals would not be reliable and a trustable relationship could not be established. The aim of the present study was to assess, by means of questionnaires with open and closed questions, the awareness and attitudes of 100 dentists working in the city of Andradina, São Paulo State, Brazil, with respect to professional confidentiality in dental practice. Most dentists (91.43% reported to have instructed their assistants on professional confidentiality. However, 44.29% of the interviewees showed to act contradictorily as reported talking about the clinical cases of their patients to their friends or spouses. The great majority of professionals (98.57% believed that it is important to have classes on Ethics and Bioethics during graduation and, when asked about their knowledge of the penalties imposed for breach of professional confidentiality, only 48.57% of them declared to be aware of it. Only 28.57% of the interviewees affirmed to have exclusive access to the files; 67.14% reported that that files were also accessed by their secretary; 1.43% answered that their spouses also had access, and 2.86% did not answer. From the results of the present survey, it could be observed that, although dentists affirmed to be aware of professional confidentiality, their attitudes did not adhere to ethical and legal requirements. This stand of health professionals has contributed to violate professional ethics and the law itself, bringing problems both to the professional and to the patient.

  16. Analysis of the ethical aspects of professional confidentiality in dental practice.

    Science.gov (United States)

    Garbin, Cléa Adas Saliba; Garbin, Artênio José Isper; Saliba, Nemre Adas; de Lima, Daniela Coelho; de Macedo, Ana Paula Ayala

    2008-01-01

    From the point of view of deontological ethics, privacy is a moral right that patients are entitled to and it is bound to professional confidentiality. Otherwise, the information given by patients to health professionals would not be reliable and a trustable relationship could not be established. The aim of the present study was to assess, by means of questionnaires with open and closed questions, the awareness and attitudes of 100 dentists working in the city of Andradina, São Paulo State, Brazil, with respect to professional confidentiality in dental practice. Most dentists (91.43%) reported to have instructed their assistants on professional confidentiality. However, 44.29% of the interviewees showed to act contradictorily as reported talking about the clinical cases of their patients to their friends or spouses. The great majority of professionals (98.57%) believed that it is important to have classes on Ethics and Bioethics during graduation and, when asked about their knowledge of the penalties imposed for breach of professional confidentiality, only 48.57% of them declared to be aware of it. Only 28.57% of the interviewees affirmed to have exclusive access to the files; 67.14% reported that that files were also accessed by their secretary; 1.43% answered that their spouses also had access, and 2.86% did not answer. From the results of the present survey, it could be observed that, although dentists affirmed to be aware of professional confidentiality, their attitudes did not adhere to ethical and legal requirements. This stand of health professionals has contributed to violate professional ethics and the law itself, bringing problems both to the professional and to the patient.

  17. 38 CFR 1.462 - Confidentiality restrictions.

    Science.gov (United States)

    2010-07-01

    ... Sickle Cell Anemia § 1.462 Confidentiality restrictions. (a) General. The patient records to which §§ 1..., infection with the HIV, or sickle cell anemia may be acknowledged only if the patient's written consent is... with the HIV, or sickle cell anemia. (2) Any answer to a request for a disclosure of patient records...

  18. 42 CFR 2.1 - Statutory authority for confidentiality of drug abuse patient records.

    Science.gov (United States)

    2010-10-01

    ... HUMAN SERVICES GENERAL PROVISIONS CONFIDENTIALITY OF ALCOHOL AND DRUG ABUSE PATIENT RECORDS Introduction § 2.1 Statutory authority for confidentiality of drug abuse patient records. The restrictions of these regulations upon the disclosure and use of drug abuse patient records were initially authorized by section 408...

  19. Having Confidence in Therapeutic Work with Young People: Constraints and Challenges to Confidentiality

    Science.gov (United States)

    Jenkins, Peter

    2010-01-01

    Confidentiality presents particular challenges to practitioners working with young people, on account of the latter's vulnerability and emotional immaturity. Ethical codes place a key importance on confidentiality, from deontological and teleological perspectives. However, young clients may rely on a more pragmatic approach in deciding whether to…

  20. Ombuds’ corner: Open door and confidentiality

    CERN Multimedia

    Vincent Vuillemin

    2013-01-01

    For the Open Days, CERN will be transparent for all visitors. It's also the occasion to remember that the Ombuds' door is fully open every day of the year for all persons working for or on behalf of CERN.   The door is open, but as soon as it's closed for a discussion, the office becomes a place where total confidentiality is preserved. This may appear as a contradiction, no? The Ombuds is available to help everyone in all circumstances, but his clause of confidentiality prevents him from acting without the consent of his “visitors”. How can he possibly resolve the in-house conflicts in groups, or units, if all the parties do not voluntarily participate in its resolution? The answer is clear: the job of the Ombuds is to help the parties resolve their conflict by themselves. He will provide a few rules of communication, a process of mutual respect, suggest some possibilities that the parties may want to follow, and mediate the dispute so that people...

  1. Confidential Declaration of Family Situation (CDFS)

    CERN Multimedia

    Human Resources Department

    2005-01-01

    The Confidential Declaration of Family Situation (CDFS) becomes a new computerized EDH form from October 2005 In accordance with Article R IV 1.17 of the Staff Regulations, Staff Members and Fellows, married or separated, must notify any changes in their spouse's income or health insurance cover in writing to CERN, within 30 calendar days of the change. This is necessary for the Organization to determine if a supplementary contribution is payable to the CERN Health Insurance Scheme (CHIS) for the spouse's coverage and, if so, the amount. Until now a paper form called « Confidential Declaration of Family Situation » (CDFS) was used for that purpose.  From early October 2005 the CDFS will be computerized for the whole Organization. Henceforth, any changes in a spouse's income or health insurance cover must be notified using EDH (Electronic Document Handling). Additionally, annual updates of the declaration will be required and will be requested by automatic e-mail. Early October an email will be...

  2. Confidentiality, 'no blame culture' and whistleblowing, non-physician practice and accountability.

    Science.gov (United States)

    White, Stuart M

    2006-12-01

    Confidentiality is a core tenet of medical professionalism, which enables the maintenance of trust in a doctor-patient relationship. However, both the amount of personal data stored and the number of third parties who might access this data have increased dramatically in the digital age, necessitating the introduction of various national data protection acts. Paradoxically, the Freedom of Information Act 2000 allows United Kingdom citizens to access information held by public bodies, including hospitals. Furthermore, the Public Interest Disclosure Act 1998 actively protects physicians who breach their duty of confidentiality in the name of public interest ('whistleblowing'). This article explores the evolution of the law and ethics in this area, and draws attention to the difficulties in balancing confidentiality against freedom of information. In addition, the role and responsibilities of the non-physician anaesthetist are examined.

  3. Confidentiality and parental involvement in adolescent sexual and reproductive health care

    DEFF Research Database (Denmark)

    Jaruseviciene, Lina; Lazarus, Jeff; Zaborskis, Apolinaras

    2011-01-01

    AIM: We surveyed Lithuanian general practitioners' (GPs) views on the importance of confidentiality for adolescents and on their practices in informing parents about sexual and reproductive health consultations with this age group. METHODS: In this cross-sectional study, a 41-item questionnaire...... was sent to a random sample of 607 Lithuanian GPs. The purpose of this questionnaire was to gain knowledge about current practices of GPs in informing parents on the importance of confidentiality as well as in protecting the privacy of minors. GPs' knowledge of the current legal age limit...... consulting on general sexual issues, more than 70% stated that they would guarantee their minor patients confidentiality. However, when cases involved sexually transmitted infections or pregnancy, nearly the same percentage said they would inform the parents. 62.3% of GPs incorrectly believed that the law...

  4. [Confidentiality in medical oaths: (When the white crow becomes gray...)].

    Science.gov (United States)

    Gelpi, R J; Pérez, M L; Rancich, A M; Mainetti, J A

    2000-01-01

    Confidentiality, together with the ethical principles of beneficence and non-maleficence, is the most important rule in Medical Oaths at the present time. However, the scientific-technical advances in medicine have made this rule one of the most controversial ones because of its exceptions. In consequence, the aim of the present paper is to comparatively analyze the rule of confidentiality in Medical Oaths of different places, times, origins and in different versions of the Hippocratic Oath in order to determine what should be kept a secret and with what degree of commitment (absolute or "prima facie"). Of the thirty six analyzed Oaths, twenty-seven manifest this rule and nine do not. No relation was found between the manifestation of this rule and the place, time, origin and different versions of the Hippocratic Oath. Most pledges suggest not to reveal what has been seen or heard during the medical act, the same as in the Hippocratic Oath. Seven texts point out that confidentiality should be absolute and four give exceptions in connection with beneficence and justice principles and the moral duty of causing no damage to third parties. Two pledges specify protection of privacy. In conclusion, today confidentiality is considered to be a moral duty for the benefit of the patient and out of consideration for his autonomy; however, at the present time in medicine the duty of keeping absolute secrecy is being reconsidered.

  5. 77 FR 1434 - Proposed Confidentiality Determinations for Data Elements Under the Mandatory Reporting of...

    Science.gov (United States)

    2012-01-10

    ... Fluorinated Gas Production....... 325120 Industrial gases manufacturing facilities. Electrical Equipment Use... Proposed Confidentiality Determinations for Data Elements Under the Mandatory Reporting of Greenhouse Gases...-proposes confidentiality determinations for the data elements under the Mandatory Greenhouse Gas Reporting...

  6. 7 CFR 983.9 - Confidential data or information.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 8 2010-01-01 2010-01-01 false Confidential data or information. 983.9 Section 983.9 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (Marketing... customers. ...

  7. Pulsed laser deposition—invention or discovery?

    International Nuclear Information System (INIS)

    Venkatesan, T

    2014-01-01

    The evolution of pulsed laser deposition had been an exciting process of invention and discovery, with the development of high T c superconducting films as the main driver. It has become the method of choice in research and development for rapid prototyping of multicomponent inorganic materials for preparing a variety of thin films, heterostructures and atomically sharp interfaces, and has become an indispensable tool for advancing oxide electronics. In this paper I will give a personal account of the invention and development of this process at Bellcore/Rutgers, the opportunity, challenges and mostly the extraordinary excitement that was generated, typical of any disruptive technology. (paper)

  8. 76 FR 18564 - Government-Owned Inventions; Availability for Licensing

    Science.gov (United States)

    2011-04-04

    ... Antibiotics: Naturally-Occurring Chrysophaetins and Their Analogues Description of Invention: This invention... the very limited number of new antibiotics developed in recent decades and the increased epidemic of infectious diseases. In fact, infectious diseases are the leading cause of death worldwide. In the United...

  9. 18 CFR 706.410 - Confidentiality of statements.

    Science.gov (United States)

    2010-04-01

    ... use of information on the statements shall be limited to that necessary to carry out the purposes of... EMPLOYEE RESPONSIBILITIES AND CONDUCT Statements of Employment and Financial Interests § 706.410 Confidentiality of statements. Each statement of employment and financial interests, and each supplementary...

  10. Zerber: r-Confidential Indexing for Distributed Documents

    NARCIS (Netherlands)

    Zerr, Sergej; Demidova, Elena; Olmedilla, Daniel; Nejdl, Wolfgang; Winslett, Marianne; Mitra, Soumyadeb

    2008-01-01

    Zerr, S., Demidova, E., Olmedilla, D., Nejdl, W., Winslett, M., & Mitra, S. (2008). Zerber: r-Confidential Indexing for Distributed Documents. In J. Teubner (Eds.), Proceedings of the 11th International Conference on Extending Database Technology (pp. 287-298). March, 25-29, 2008, Nantes, France.

  11. 19 CFR 210.72 - Confidentiality of information.

    Science.gov (United States)

    2010-04-01

    ... 19 Customs Duties 3 2010-04-01 2010-04-01 false Confidentiality of information. 210.72 Section 210.72 Customs Duties UNITED STATES INTERNATIONAL TRADE COMMISSION INVESTIGATIONS OF UNFAIR PRACTICES IN IMPORT TRADE ADJUDICATION AND ENFORCEMENT Enforcement Procedures and Advisory Opinions § 210.72...

  12. ML Confidential : machine learning on encrypted data

    NARCIS (Netherlands)

    Graepel, T.; Lauter, K.; Naehrig, M.

    2012-01-01

    We demonstrate that by using a recently proposed somewhat homomorphic encryption (SHE) scheme it is possible to delegate the execution of a machine learning (ML) algorithm to a compute service while retaining confidentiality of the training and test data. Since the computational complexity of the

  13. Ethics in health care: confidentiality and information technologies

    African Journals Online (AJOL)

    information could result in confidential patient data falling ... Before the advent of the new communication and information technologies (NCITs), patient care was sometimes delayed .... computer system intended to be used and the security.

  14. 78 FR 16298 - Comment Request for Information Collection: Confidentiality and Disclosure of State Unemployment...

    Science.gov (United States)

    2013-03-14

    ... Collection: Confidentiality and Disclosure of State Unemployment Compensation Information Final Rule and... about the regulatory requirements of the Confidentiality and Disclosure of State Unemployment... Administration, Office of Unemployment Insurance, 200 Constitution Avenue NW., Room S4524, Washington, DC 20210...

  15. 75 FR 44267 - Government-Owned Inventions; Availability for Licensing

    Science.gov (United States)

    2010-07-28

    ... inventions to extend market coverage for companies and may also be available for licensing. ADDRESSES..., PhD, at 301-435-3121 or [email protected] for more information. Software for Accurate Segmentation of Cell Nuclei in Breast Tissue Description of Invention: Automatic segmentation of cell nuclei is...

  16. 77 FR 48072 - Final Confidentiality Determinations for Regulations Under the Mandatory Reporting of Greenhouse...

    Science.gov (United States)

    2012-08-13

    ... Final Confidentiality Determinations for Regulations Under the Mandatory Reporting of Greenhouse Gases... confidentiality determinations for certain data elements in regulations under the Mandatory Greenhouse Gas... Greenhouse Gas Reporting Program Web site at http://www.epa.gov/climatechange/emissions/ghgrulemaking.html...

  17. Universities Report $1.8-Billion in Earnings on Inventions in 2011

    Science.gov (United States)

    Blumenstyk, Goldie

    2012-01-01

    Universities and their inventors earned more than $1.8-billion from commercializing their academic research in the 2011 fiscal year, collecting royalties from new breeds of wheat, from a new drug for the treatment of HIV, and from longstanding arrangements over enduring products like Gatorade. Northwestern University earned the most of any…

  18. Managing disclosure of research misconduct by a graduate student to a university mental health professional during a clinical counseling session.

    Science.gov (United States)

    Taylor, Holly A; Wilfond, Benjamin S

    2013-01-01

    This case looks at the question of how to consider obligations of confidentiality by a mental health professional who works for an institution and learns that a student has been using a drug intended for an animal research project. Dr. Paul Appelbaum, MD, a psychiatrist at Columbia University, examines the issue of the limits of confidentiality. Nicholas Steneck, PhD, a scholar in research misconduct at the University of Michigan, explores the obligations to report research misconduct. Walter Limehouse, MD, an ethicist at the Medical University of South Carolina, considers the systems issues raised by this case and offers some suggestions that might change the institutional environment.

  19. Playful Invention and Exploration. Final Evaluation Report: Executive Summary

    Science.gov (United States)

    St. John; Mark; Carroll, Becky; Helms, Jen; Smith, Anita

    2008-01-01

    PIE (Playful Invention and Exploration) is a unique approach to learning that centers on the use of technology and design challenges to create powerful learning experiences in informal education settings. The Playful Invention and Exploration (PIE) Institute project was funded in 2005 by the National Science Foundation (NSF). Overall, 150…

  20. 16 CFR 312.8 - Confidentiality, security, and integrity of personal information collected from children.

    Science.gov (United States)

    2010-01-01

    ... 16 Commercial Practices 1 2010-01-01 2010-01-01 false Confidentiality, security, and integrity of... COMMISSION REGULATIONS UNDER SPECIFIC ACTS OF CONGRESS CHILDREN'S ONLINE PRIVACY PROTECTION RULE § 312.8 Confidentiality, security, and integrity of personal information collected from children. The operator must...

  1. 15 CFR Supplement No. 1 to Part 718 - Confidential Business Information Declared or Reported *

    Science.gov (United States)

    2010-01-01

    ... 15 Commerce and Foreign Trade 2 2010-01-01 2010-01-01 false Confidential Business Information... Commerce and Foreign Trade (Continued) BUREAU OF INDUSTRY AND SECURITY, DEPARTMENT OF COMMERCE CHEMICAL WEAPONS CONVENTION REGULATIONS CONFIDENTIAL BUSINESS INFORMATION Pt. 718, Supp. 1 Supplement No. 1 to Part...

  2. Rekonstruksi Pengaturan Confidential Principle bagi Komunikasi pada Mediasi Sengketa Perdata di Indonesia: Studi Perbandingan dengan Praktik di Amerika Serikat

    Directory of Open Access Journals (Sweden)

    I Gusti Ngurah Parikesit

    2016-04-01

    Full Text Available Peran mediasi sebagai penyelesaian sengketa alternatif untuk sengketa perdata yang semakin populer digunakan pada praktiknya belum berjalan maksimal. Salah satu penyebabnya adalah kekaburan pengaturan prinsip kerahasiaan confidential principle bagi komunikasi yang terjadi pada proses mediasi. Aturan hukum di Indonesia hanya menjelaskan bahwa mediasi dilangsungkan berdasarkan pada asas tertutup dan mediator berkewajiban menjaga kerahasiaan, baik dalam bentuk perkataan maupun catatan, yang terungkap pada mediasi. Sebagai perbandingan, aturan hukum di Amerika Serikat sudah diatur bahwa segala bentuk komunikasi yang terjadi dan berhubungan dengan pelaksanaan mediasi tunduk pada confidential principle, sehingga proses komunikasi mendapatkan hak istimewa (privilege dengan tidak dapat dijadikan barang bukti dan seluruh pihak yang terlibat dalam mediasi tidak dapat dijadikan saksi pada persidangan berikutnya. Dengan demikian, dibutuhkan rekonstruksi pengaturan terkait ruang lingkup komunikasi pada proses mediasi yang terkualifikasi sebagai confidential principle pengaturan terkait pelepasan hak istimewa komunikasi dari confidential principle; dan pengaturan terkait pengecualian terhadap komunikasi yang terkualifikasi sebagai confidential principle Abstract Although being popular, the role of mediation in resolving civil disputes is yet to be maximalized. One of the reasons is the the vague regulation concerning the confidential principle for communication in mediation. The existing regulation in Indonesia only explains that mediation is undertaken based on closed principle and the mediator is obliged to maintain confidentiality the confidentiality of any communication, either in oral or written forms, revealed during mediation. Whereas in comparison, the regulation in the United States of America stipulates that all forms of communications occured during mediation or is made for purposes of conducting or participating in mediation are subjects to the

  3. 30 CFR 291.111 - How does MMS treat the confidential information I provide?

    Science.gov (United States)

    2010-07-01

    ... 30 Mineral Resources 2 2010-07-01 2010-07-01 false How does MMS treat the confidential information... SHELF LANDS ACT § 291.111 How does MMS treat the confidential information I provide? (a) Any person who provides documents under this part in response to a request by MMS to inform a decision on whether open...

  4. University Technology Transfer Information Processing from the Attention Based View

    Science.gov (United States)

    Hamilton, Clovia

    2015-01-01

    Between 2005 and 2011, there was no substantial growth in licenses executed by university technology transfer offices. Since the passage of the Bayh Dole Act of 1980, universities have owned technological inventions afforded by federal research funding. There are still university technology transfer offices that struggle with increasing their…

  5. 40 CFR 370.64 - What information can I claim as trade secret or confidential?

    Science.gov (United States)

    2010-07-01

    ... secret or confidential? 370.64 Section 370.64 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY... secret or confidential? (a) Trade secrets. You may be able to withhold the name of a specific chemical... trade secret. The requirements for withholding trade secret information are set forth in EPCRA section...

  6. Innovation and invention in Finland. Strategies for networking. An international evaluation

    Energy Technology Data Exchange (ETDEWEB)

    Zegveld, W.; McCarthy, S.; Lemola, T.

    1998-12-31

    The objective of the evaluation was to come up with recommendations on how the Finnish systems for promoting independent inventions and their commercialisation could be most appropriately developed. In practice, the evaluation was expected to address at least the following aspects of the promotion: The role of the public sector; The role of the private sector (inventors, financiers, companies); The evaluation of the Finnish Foundation for Inventions (FFI); The strengths and weaknesses of the present system for promoting inventions and their commercialisation. In effect, the evaluation proved to be the evaluation of a subsystem integrated within the overall Finnish National System of Innovation with its many players from the public and private sectors. An effort was made to evaluate the relationship between the different actors in this system and closer cooperation is recommended in many areas. Interviews were held with 130 individuals from 70 organisations. The evaluators address the following nine issues: (1) Improving the balance between r and d and the promotion of inventiveness/innovation; (2) Increased coherence between the different organisations; (3) The responsibility of inventors and research organisations in inventive activities and the role of support organisations; (4) A gradual shift towards private services; (5) The development of the role of FFI; (6) Improving the competence in the area of intellectual property rights; (7) Financial incentives for inventors; (8) Increasing the awareness on invention and innovation; (9) The requirement to broaden the concept of inventiveness and innovation. (orig.)

  7. Innovation and invention in Finland. Strategies for networking. An international evaluation

    Energy Technology Data Exchange (ETDEWEB)

    Zegveld, W; McCarthy, S; Lemola, T

    1999-12-31

    The objective of the evaluation was to come up with recommendations on how the Finnish systems for promoting independent inventions and their commercialisation could be most appropriately developed. In practice, the evaluation was expected to address at least the following aspects of the promotion: The role of the public sector; The role of the private sector (inventors, financiers, companies); The evaluation of the Finnish Foundation for Inventions (FFI); The strengths and weaknesses of the present system for promoting inventions and their commercialisation. In effect, the evaluation proved to be the evaluation of a subsystem integrated within the overall Finnish National System of Innovation with its many players from the public and private sectors. An effort was made to evaluate the relationship between the different actors in this system and closer cooperation is recommended in many areas. Interviews were held with 130 individuals from 70 organisations. The evaluators address the following nine issues: (1) Improving the balance between r and d and the promotion of inventiveness/innovation; (2) Increased coherence between the different organisations; (3) The responsibility of inventors and research organisations in inventive activities and the role of support organisations; (4) A gradual shift towards private services; (5) The development of the role of FFI; (6) Improving the competence in the area of intellectual property rights; (7) Financial incentives for inventors; (8) Increasing the awareness on invention and innovation; (9) The requirement to broaden the concept of inventiveness and innovation. (orig.)

  8. A Policy-Based Framework for Preserving Confidentiality in BYOD Environments: A Review of Information Security Perspectives

    Directory of Open Access Journals (Sweden)

    Chalee Vorakulpipat

    2017-01-01

    Full Text Available Today, many organizations allow their employees to bring their own smartphones or tablets to work and to access the corporate network, which is known as a bring your own device (BYOD. However, many such companies overlook potential security risks concerning privacy and confidentiality. This paper provides a review of existing literature concerning the preservation of privacy and confidentiality, with a focus on recent trends in the use of BYOD. This review spans a large spectrum of information security research, ranging from management (risk and policy to technical aspects of privacy and confidentiality in BYOD. Furthermore, this study proposes a policy-based framework for preserving data confidentiality in BYOD. This framework considers a number of aspects of information security and corresponding techniques, such as policy, location privacy, centralized control, cryptography, and operating system level security, which have been omitted in previous studies. The main contribution is to investigate recent trends concerning the preservation of confidentiality in BYOD from the perspective of information security and to analyze the critical and comprehensive factors needed to strengthen data privacy in BYOD. Finally, this paper provides a foundation for developing the concept of preserving confidentiality in BYOD and describes the key technical and organizational challenges faced by BYOD-friendly organizations.

  9. The Transformation of Science Into Patented Inventions

    DEFF Research Database (Denmark)

    Beukel, Karin

    This paper presents the results of a grounded theory study of the transformation of scientific discoveries into patented inventions. Using an algebraic interpretive approach, the narratives collected during interviews are analyzed as Bayesian inferences and the developed theory is tested. The fin......This paper presents the results of a grounded theory study of the transformation of scientific discoveries into patented inventions. Using an algebraic interpretive approach, the narratives collected during interviews are analyzed as Bayesian inferences and the developed theory is tested....... The findings recast the relationship between science and patents as a process in which the way the transformation of the scientific invention is handled has an effect on the breadth of the patent scope. Unleashing patent scope surplus is dependent on processes related to abstraction and cognitive variety......, which can be mobilized by patent experts with both an in-depth understanding of the scientific discovery, due to their educational background in the life sciences, and capabilities within the legal framework for patenting. More specifically, the findings reveal previously unreported aspects...

  10. 31 CFR 31.217 - Confidentiality of information.

    Science.gov (United States)

    2010-07-01

    ... 31 Money and Finance: Treasury 1 2010-07-01 2010-07-01 false Confidentiality of information. 31.217 Section 31.217 Money and Finance: Treasury Office of the Secretary of the Treasury TROUBLED ASSET... from a source other than the retained entity. (b) Prohibitions. The retained entity shall not: (1...

  11. 12 CFR 404.7 - Confidential business information.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 4 2010-01-01 2010-01-01 false Confidential business information. 404.7 Section 404.7 Banks and Banking EXPORT-IMPORT BANK OF THE UNITED STATES INFORMATION DISCLOSURE Procedures... involved, a general description of the related U.S. exports, and the country to which such exports are...

  12. Building Trust and Confidentiality in Cloud computing Distributed ...

    African Journals Online (AJOL)

    new technology, this new way of doing business brings with it new challenges, ... In this paper, we looked at data security, described the current state of data ... has the potential to solve many threats concerning confidentiality and adoption of

  13. The asymmetry between discoveries and inventions in the Nobel Prize for Physics

    NARCIS (Netherlands)

    Bartneck, C.; Rauterberg, G.W.M.

    2008-01-01

    This paper presents an empirical study on the frequency of discoveries and inventions that were awarded with the. More than 70 per cent of all Nobel Prizes were given to discoveries. The majority of inventions were awarded at the beginning of the twentieth century and only three inventions had a

  14. Effective verification of confidentiality for multi-threaded programs

    NARCIS (Netherlands)

    Ngo, Minh Tri; Stoelinga, Mariëlle Ida Antoinette; Huisman, Marieke

    2014-01-01

    This paper studies how confidentiality properties of multi-threaded programs can be verified efficiently by a combination of newly developed and existing model checking algorithms. In particular, we study the verification of scheduler-specific observational determinism (SSOD), a property that

  15. Privacy Perspectives for Online Searchers: Confidentiality with Confidence?

    Science.gov (United States)

    Duberman, Josh; Beaudet, Michael

    2000-01-01

    Presents issues and questions involved in online privacy from the information professional's perspective. Topics include consumer concerns; query confidentiality; securing computers from intrusion; electronic mail; search engines; patents and intellectual property searches; government's role; Internet service providers; database mining; user…

  16. University Technology Transfer Factors as Predictors of Entrepreneurial Orientation

    Science.gov (United States)

    Kirkman, Dorothy M.

    2011-01-01

    University technology transfer is a collaborative effort between academia and industry involving knowledge sharing and learning. Working closely with their university partners affords biotechnology firms the opportunity to successfully develop licensed inventions and gain access to novel scientific and technological discoveries. These factors may…

  17. [Confidentiality in HIV-infection/AIDS--a comment on the Communicable Disease Control Act].

    Science.gov (United States)

    Frich, J C

    1995-05-10

    The new Communicable Diseases Control Act has come into force in Norway. It makes it compulsory for a physician to warn a third party if it is obvious that a HIV-positive patient, with a high degree of certainty, puts the third party at risk of being infected with HIV. Some philosophers characterize medical confidentiality as an intransigent and absolute obligation, others as a prima facie duty. This article supports the latter view, but the author still argues that strict conditions have to be fulfilled before a physician should consider breaking medical confidentiality: The doctor must try repeatedly to gain the consent or co-operation of the patient involved. Possible negative long-term consequences for the preventive HIV-work support strict medical confidentiality.

  18. 19 CFR 201.6 - Confidential business information.

    Science.gov (United States)

    2010-04-01

    ...) of a type for which there is a clear and compelling need to withhold from disclosure. Special rules... the right to appeal to the Commission. (e) Appeals from denial of confidential treatment. (1) For good cause shown, the Commission may grant an appeal from a denial by the Secretary of a request for...

  19. Not-Invented-Here

    DEFF Research Database (Denmark)

    Burcharth, Ana Luiza Lara de Araújo; Fosfuri, Andrea

    knowledge, the so-called Not-Invented-Here (NIH) syndrome. Drawing on multi-informant survey data of small and medium-sized Danish enterprises, the paper finds that socialization practices are an important driver of the NIH syndrome with such an effect being attenuated in technologically highly specialized......The management literature has highlighted several potential benefits of socialization practices within companies. By contrast, this paper posits that socialization practices, by fostering a higher degree of company identity, contribute to generate a greater reluctance to the adoption of external...

  20. Making Patent Scopes Exceed the Technological Scopes of Scientific Inventions

    DEFF Research Database (Denmark)

    Beukel, Karin

    This paper presents the results of a grounded theory study of the transformation of scientific discoveries into patented inventions. Using an algebraic interpretive approach, the narratives collected during interviews are analyzed as Bayesian inferences and the developed theory is tested. The fin...... for searching in new directions for solutions if challenges of exploitation with regard to the scientific invention arise.......This paper presents the results of a grounded theory study of the transformation of scientific discoveries into patented inventions. Using an algebraic interpretive approach, the narratives collected during interviews are analyzed as Bayesian inferences and the developed theory is tested....... The findings recast the relationship between science and patents as a process in which the way the transformation of the scientific invention is handled has an effect on the breadth of the patent scope. Unleashing patent scope surplus is dependent on processes related to abstraction and cognitive variety...

  1. Enhanced Obfuscation Technique for Data Confidentiality in Public Cloud Storage

    Directory of Open Access Journals (Sweden)

    Oli S. Arul

    2016-01-01

    Full Text Available With an advent of cloud computing, data storage has become a boon in information technology. At the same time, data storage in remote places have become important issues. Lot of techniques are available to ensure protection of data confidentiality. These techniques do not completely serve the purpose in protecting data. The Obfuscation techniques come to rescue for protecting data from malicious attacks. This paper proposes an obfuscation technique to encrypt the desired data type on the cloud providing more protection from unknown hackers. The experimental results show that the time taken for obfuscation is low and the confidentiality percentage is high when compared with existing techniques.

  2. The Energy-Related Inventions Program: A decade of commercial progress

    Energy Technology Data Exchange (ETDEWEB)

    Brown, M.A.; Franchuk, C.A. (Oak Ridge National Lab., TN (United States)); Wilson, C.R. (Tennessee Univ., Knoxville, TN (United States))

    1991-12-01

    This report provides information on the recent commercial progress of inventions supported by the US Department of Energy's Energy-Related Inventions Programs (ERIP). It describes the results of the latest in a series of ERIP evaluation projects that have been completed since 1980. It focuses on the economic impacts of the program, notably sales and employment benefits. The period of interest is 1980 through 1990. The evaluation is based on data collected through mail and telephone surveying of 143 participants in the Program. As of October 1989, a total of 486 inventions were recommended to DOE by the National Institute for Standards and Technology, which screens all submitted inventions in terms of technical merit, potential for commercial success, and potential energy impact. By the end of 1990, at least 109 of these inventions had entered the market, generating total cumulative sales of more than $500 million. With $25.7 million in grants awarded from 1975 through 1990, and $63.1 million in program appropriations over the same period, ERIP has generated a 20:1 return in terms of sales values to grants, and an 8:1 return in sales versus program appropriations. It is estimated that 25% of all ERIP inventions had achieved sales by the end of 1990. While it is difficult to make exact comparisons between these percentages and other indicators of the success rates of technological innovations as a whole, the ERIP figures remain impressive. The commercial progress of spin-off technologies is also documented.

  3. The Energy-Related Inventions Program: A decade of commercial progress

    Energy Technology Data Exchange (ETDEWEB)

    Brown, M.A.; Franchuk, C.A. [Oak Ridge National Lab., TN (United States); Wilson, C.R. [Tennessee Univ., Knoxville, TN (United States)

    1991-12-01

    This report provides information on the recent commercial progress of inventions supported by the US Department of Energy`s Energy-Related Inventions Programs (ERIP). It describes the results of the latest in a series of ERIP evaluation projects that have been completed since 1980. It focuses on the economic impacts of the program, notably sales and employment benefits. The period of interest is 1980 through 1990. The evaluation is based on data collected through mail and telephone surveying of 143 participants in the Program. As of October 1989, a total of 486 inventions were recommended to DOE by the National Institute for Standards and Technology, which screens all submitted inventions in terms of technical merit, potential for commercial success, and potential energy impact. By the end of 1990, at least 109 of these inventions had entered the market, generating total cumulative sales of more than $500 million. With $25.7 million in grants awarded from 1975 through 1990, and $63.1 million in program appropriations over the same period, ERIP has generated a 20:1 return in terms of sales values to grants, and an 8:1 return in sales versus program appropriations. It is estimated that 25% of all ERIP inventions had achieved sales by the end of 1990. While it is difficult to make exact comparisons between these percentages and other indicators of the success rates of technological innovations as a whole, the ERIP figures remain impressive. The commercial progress of spin-off technologies is also documented.

  4. 15 CFR 325.16 - Protecting confidentiality of information.

    Science.gov (United States)

    2010-01-01

    ... 15 Commerce and Foreign Trade 2 2010-01-01 2010-01-01 false Protecting confidentiality of information. 325.16 Section 325.16 Commerce and Foreign Trade Regulations Relating to Commerce and Foreign Trade (Continued) INTERNATIONAL TRADE ADMINISTRATION, DEPARTMENT OF COMMERCE MISCELLANEOUS REGULATIONS...

  5. 19 CFR 210.20 - Declassification of confidential information.

    Science.gov (United States)

    2010-04-01

    ... 19 Customs Duties 3 2010-04-01 2010-04-01 false Declassification of confidential information. 210.20 Section 210.20 Customs Duties UNITED STATES INTERNATIONAL TRADE COMMISSION INVESTIGATIONS OF UNFAIR PRACTICES IN IMPORT TRADE ADJUDICATION AND ENFORCEMENT Motions § 210.20 Declassification of...

  6. Social networks in the history of innovation and invention

    CERN Document Server

    Moon, Francis C

    2014-01-01

    This book integrates history of science and technology with modern social network theory. Using examples from the history of machines, as well as case studies from wireless, radio and chaos theory, the author challenges the genius model of invention. Network analysis concepts are presented to demonstrate the societal nature of invention in areas such as steam power, internal combustion engines, early aviation, air conditioning and more. Using modern measures of network theory, the author demonstrates that the social networks of invention from the 19th and early 20th centuries have similar characteristics to modern 21st C networks such as the World Wide Web. The book provides evidence that exponential growth in technical innovation is linked to the growth of historical innovation networks.

  7. An introduction to intellectual property licensing for technology companies

    Science.gov (United States)

    Meier, Lawrence H.

    2001-05-01

    Intellectual property licensing is an important issue facing all technology companies. Before entering into license agreements a number of issues need to be addressed, including invention ownership, obtaining and identifying licensable subject matter, and developing a licensing strategy. There are a number of important provisions that are included in most intellectual property license agreements. These provisions include definitions, the license grant, consideration, audit rights confidentiality, warranties, indemnification, and limitation of liability. Special licensing considerations exist relative to each type of intellectual property, and when the other party is a foreign company or a university.

  8. Medical confidentiality versus disclosure: Ethical and legal dilemmas.

    LENUS (Irish Health Repository)

    Agyapong, V I O

    2009-02-01

    A case is described of a fifty year old single man who made disclosures about criminal sexual practices during a psychiatric assessment. In common practice with other professional men, a doctor is under a duty not to disclose, without the consent of his patient, information which he has gained in his professional capacity other than in exceptional circumstances. We discuss the ethical and legal considerations surrounding issues of medical confidentiality and the dilemma that sometimes face clinicians, when they feel obliged, in the public interest, to disclose information they have gained in confidence. Breach of confidences can have deleterious consequences; particularly for the doctor-patient relationship, but failure to disclose in some situations could have serious implications for the well-being of the wider society. Doctors should be aware of the basic principles of confidentiality and the ethical and legal framework around which they are built.

  9. Privacy, confidentiality and automated health information systems.

    Science.gov (United States)

    Vuori, H

    1977-12-01

    Professor Vuori's paper, first presented at the fourth Medico-legal Conference in Prague in the spring of this year, deals with the problem of the maintenance of confidentiality in computerized health records. Although more and more information is required, the hardware of the computer systems is so sophisticated that it would be very expensive indeed to 'break in' and steal from a modern data bank. Those concerned with programming computers are becoming more aware of their responsibilities concerning confidentiality and privacy, to the extent that a legal code of ethics for programmers is being formulated. They are also aware that the most sensitive of all relationships--the doctor-patient relationship--could be in danger if they failed to maintain high standards of integrity. An area of danger is where administrative boundaries between systems must be crossed--say between those of health and employment. Protection of privacy must be ensured by releasing full information about the type of data being stored, and by maintaining democratic control over the establishment of information systems.

  10. Confidentiality Enhancement of Highly Sensitive Nuclear Data Using Steganography with Chaotic Encryption over OFDM Channel

    International Nuclear Information System (INIS)

    Mahmoud, S.; Ayad, N.; Elsayed, F.; Elbendary, M.

    2016-01-01

    Full text: Due to the widespread usage of the internet and other wired and wireless communication methods, the security of the transmitted data has become a major requirement. Nuclear knowledge is mainly built upon the exchange of nuclear information which is considered highly sensitive information, so its security has to be enhanced by using high level security mechanisms. Data confidentiality is concerned with the achievement of higher protection for confidential information from unauthorized disclosure or access. Cryptography and steganography are famous and widely used techniques that process information in order to achieve its confidentiality, but sometimes, when used individually, they don’t satisfy a required level of security for highly sensitive data. In this paper, cryptography is accompanied with steganography for constituting a multilayer security techniques that can strengthen the level of security of highly confidential nuclear data that are archived or transmitted through different channel types and noise conditions. (author)

  11. Boundaries of confidentiality in nursing care for mother and child in HIV programmes.

    Science.gov (United States)

    Våga, Bodil Bø; Moland, Karen Marie; Blystad, Astrid

    2016-08-01

    Confidentiality lies at the core of medical ethics and is the cornerstone for developing and keeping a trusting relationship between nurses and patients. In the wake of the HIV epidemic, there has been a heightened focus on confidentiality in healthcare contexts. Nurses' follow-up of HIV-positive women and their susceptible HIV-exposed children has proved to be challenging in this regard, but the ethical dilemmas concerning confidentiality that emerge in the process of ensuring HIV-free survival of the third party - the child - have attracted limited attention. The study explores challenges of confidentiality linked to a third party in nurse-patient relationships in a rural Tanzanian HIV/AIDS context. The study was carried out in rural and semi-urban settings of Tanzania where the population is largely agro-pastoral, the formal educational level is low and poverty is rife. The HIV prevalence of 1.5% is low compared to the national prevalence of 5.1%. Data were collected during 9 months of ethnographic fieldwork and consisted of participant observation in clinical settings and during home visits combined with in-depth interviews. The main categories of informants were nurses employed in prevention of mother-to-child transmission of HIV programmes and HIV-positive women enrolled in these programmes. Based on information about the study aims, all informants consented to participate. Ethical approval was granted by ethics review boards in Tanzania and Norway. The material indicates a delicate balance between the nurses' attempt to secure the HIV-free survival of the babies and the mothers' desire to preserve confidentiality. Profound confidentiality-related dilemmas emerged in actual practice, and indications of a lack of thorough consideration of the implication of a patient's restricted disclosure came to light during follow-up of the HIV-positive women and the third party - the child who is at risk of HIV infection through mother's milk. World Health Organization

  12. NIH Employee Invention Report (EIR) | NCI Technology Transfer Center | TTC

    Science.gov (United States)

    NIH researchers must immediately contact their Laboratory or Branch Chief and inform him or her of a possible invention, and then consult with your NCI TTC Technology Transfer Manager about submitting an Employee Invention Report (EIR) Form. | [google6f4cd5334ac394ab.html

  13. Economy and Transparency: The Model Invention

    Directory of Open Access Journals (Sweden)

    Mahmud Hassan TALUKDAR

    2013-12-01

    Full Text Available Relation of Transparency and Economic growth is a long global debate in the society. Theoretically, policy makers, scholars and researchers argue that there is a close relation among these two variables. However, the quantitative relation and any global model is yet unrevealed. So, the main aim of this paper is to ascertain the nature, dimension and extent of the relationship between economy and Transparency as well as to invent a global model. This paper is useful for researchers, planners, policy makers and scholars who are directly or indirectly involved or willing to involve in the thrust for quantitative relation of these two variables. Literature review is the main source of information of this study. In introductory section, this paper briefly describes theoretical relationship of economy and Transparency as well as it also describes the proxy variables.GDP (2012 of different countries are used as proxy of Economy and Corruption Perception Index (CPI scores (2012 of different countries are used as proxy of level of Transparency. In methodology section this paper describes the detail methodology, sampling procedure and level of analysis. This study randomly selects 30 countries (10 from higher CPI scores+10 from moderate CPI scores+ 10 from lower CPI scores around the globe as sample. In the third section, this research presents the correlation value which divulge that there is a positive correlation (p=.047 with 95% confidence level. That reveals, if the level of transparency of any country increase, the GDP also increase accordingly. Then in this section two quantitative models are developed using linear regression analysis. First invented model is: Economy (GDP in billion US$ = [(8.983*Level of transparency -108.11]. This paper termed the first invented model as “Mahmud EcoT Model-1”. This model calibrates that one unit improvement of transparency leads 8.98 billion US$ improvement in the GDP of a country. Then taking this unit

  14. 45 CFR 307.13 - Security and confidentiality for computerized support enforcement systems in operation after...

    Science.gov (United States)

    2010-10-01

    ... ENFORCEMENT SYSTEMS § 307.13 Security and confidentiality for computerized support enforcement systems in... systems in operation after October 1, 1997. (a) Information integrity and security. Have safeguards... 45 Public Welfare 2 2010-10-01 2010-10-01 false Security and confidentiality for computerized...

  15. 40 CFR 85.1415 - Treatment of confidential information.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 18 2010-07-01 2010-07-01 false Treatment of confidential information. 85.1415 Section 85.1415 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) AIR PROGRAMS (CONTINUED) CONTROL OF AIR POLLUTION FROM MOBILE SOURCES Urban Bus Rebuild Requirements § 85.1415...

  16. Privacy and Confidentiality in Exchange of Information Procedures : Some Uncertainties, Many Issues, but Few Solutions

    NARCIS (Netherlands)

    Debelva, F.; Mosquera, Valderrama I.J.

    2017-01-01

    The overall aim of this article is to analyse the taxpayers’ rights to confidentiality and privacy in exchange of information including the new global standard of automatic exchange of information. Section 2 will analyse the state of the art regarding the right to privacy and confidentiality in

  17. 40 CFR 86.615-84 - Treatment of confidential information.

    Science.gov (United States)

    2010-07-01

    ...) Selective Enforcement Auditing of New Light-Duty Vehicles, Light-Duty Trucks, and Heavy-Duty Vehicles § 86... part 2, subpart B. (b) Any claim of confidentiality must accompany the information at the time it is...

  18. Universal nucleic acids sample preparation method for cells, spores and their mixture

    Science.gov (United States)

    Bavykin, Sergei [Darien, IL

    2011-01-18

    The present invention relates to a method for extracting nucleic acids from biological samples. More specifically the invention relates to a universal method for extracting nucleic acids from unidentified biological samples. An advantage of the presently invented method is its ability to effectively and efficiently extract nucleic acids from a variety of different cell types including but not limited to prokaryotic or eukaryotic cells and/or recalcitrant organisms (i.e. spores). Unlike prior art methods which are focused on extracting nucleic acids from vegetative cell or spores, the present invention effectively extracts nucleic acids from spores, multiple cell types or mixtures thereof using a single method. Important that the invented method has demonstrated an ability to extract nucleic acids from spores and vegetative bacterial cells with similar levels effectiveness. The invented method employs a multi-step protocol which erodes the cell structure of the biological sample, isolates, labels, fragments nucleic acids and purifies labeled samples from the excess of dye.

  19. Entrapment and Escape: Inventional Metaphors in Ronald Reagan's Economic Rhetoric.

    Science.gov (United States)

    Aden, Roger C.

    1989-01-01

    Examines Ronald Reagan's use of inventional metaphors of entrapment and escape, language meshing with the American public's perception of the economy in the early 1980s. Notes that Reagan's reliance on inventional metaphors produced a rigidity in his approach to new situations, ultimately damaging his ability to lead the nation. (MM)

  20. Absolutism on Access and Confidentiality: Principled or Irresponsible?

    Science.gov (United States)

    Sheerin, William E.

    1991-01-01

    Discusses issues involved in public access to library materials and facilities and patron confidentiality. Topics discussed include children's access to adult materials; parents' right to know about their children's materials; First and Fourth Amendment protections; the Library Bill of Rights; and American Library Association (ALA) documents that…

  1. 12 CFR 19.181 - Confidentiality of formal investigations.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 1 2010-01-01 2010-01-01 false Confidentiality of formal investigations. 19.181 Section 19.181 Banks and Banking COMPTROLLER OF THE CURRENCY, DEPARTMENT OF THE TREASURY RULES OF... only in accordance with the provisions of part 4 of this chapter. ...

  2. 49 CFR 805.735-21 - Confidentiality of statements.

    Science.gov (United States)

    2010-10-01

    ... TRANSPORTATION SAFETY BOARD EMPLOYEE RESPONSIBILITIES AND CONDUCT § 805.735-21 Confidentiality of statements. Subject to the provisions of § 805.735-24 concerning review of employee statements, each statement of... Personnel Officer is personally responsible for the retention of employee statements in confidence and may...

  3. HIPAA-protecting patient confidentiality or covering something else?

    Directory of Open Access Journals (Sweden)

    Robbins RA

    2013-10-01

    Full Text Available No abstract available. Article truncated at 150 words. A case of a physician fired from the Veterans Administration (VA for violation of the Health Care Portability and Accountability Act of 1996 (HIPAA illustrates a problem with both the law and the VA. Anil Parikh, a VA physician at the Jesse Brown VA in Chicago, was dismissed on a charge of making unauthorized disclosures of confidential patient information on October 19, 2007. On January 3, 2011 the Merit Systems Protection Board (MSPB reversed Dr. Parikh’s removal. Dr. Parikh's initially made disclosures to the VA Office of Inspector General and to Senator Barack Obama and Congressman Luis Gutierrez, in whose district the Jesse Brown VA lies. Dr. Parikh alleged that there were systematic problems within the Jesse Brown VA that resulted in untimely and inadequate patient care. The confidential patient information Parikh disclosed included examples of the misdiagnoses and misdirection of patients within the hospital. Specifically, Dr. Parikh alleged that …

  4. 40 CFR 725.15 - Determining applicability when microorganism identity or use is confidential or uncertain.

    Science.gov (United States)

    2010-07-01

    ... ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) TOXIC SUBSTANCES CONTROL ACT REPORTING REQUIREMENTS AND REVIEW... appear on the public version of the Inventory, in § 725.239 or in subpart M of this part. Instead, it is contained in a confidential version held in EPA's Confidential Business Information Center (CBIC). The...

  5. HIV testing sites' communication about adolescent confidentiality: potential barriers and facilitators to testing.

    Science.gov (United States)

    Hyden, Christel; Allegrante, John P; Cohall, Alwyn T

    2014-03-01

    This study sought to evaluate HIV testing locations in New York City in terms of staff communication of confidentiality policies for adolescent clients. Using the New York State Directory of HIV Counseling and Testing Resources as a sampling frame, this study made telephone contact with 164 public HIV testing locations in New York City and used a semistructured interview to ask questions about confidentiality, parental permission, and parent access to test results. At 48% of locations, either HIV testing was not offered or we were unable to reach a staff member to ask questions about testing options and confidentiality. At the remaining sites, information provided regarding confidentiality, parental consent, and privacy of test results was correct only 69% to 85% of the time. Additionally, 23% of sites successfully contacted offered testing exclusively between 9:00 a.m. and 3:00 p.m. weekdays, when most adolescents are in school. Our findings point to a need for increased training and quality control at the clinical level to ensure that consumers in need of HIV testing are provided with accurate information and accessible services. Furthermore, these results highlight the need for more "patient-centric" sites with enhanced accessibility for potential clients, particularly youth.

  6. Lithuanian general practitioners' knowledge of confidentiality laws in adolescent sexual and reproductive healthcare: a cross-sectional study

    DEFF Research Database (Denmark)

    Lazarus, Jeff; Jaruseviciene, Lina; Liljestrand, Jerker

    2008-01-01

    In Lithuania, the legislation addressing confidentiality in adolescent healthcare is contradictory and vague. Previous studies have also revealed that medico-legal knowledge among physicians is poor, and attitudes play a correspondingly greater role than legal knowledge in ensuring the confidenti......In Lithuania, the legislation addressing confidentiality in adolescent healthcare is contradictory and vague. Previous studies have also revealed that medico-legal knowledge among physicians is poor, and attitudes play a correspondingly greater role than legal knowledge in ensuring...

  7. 40 CFR 303.31 - Assurance of claimant confidentiality.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 27 2010-07-01 2010-07-01 false Assurance of claimant confidentiality. 303.31 Section 303.31 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) SUPERFUND... knowledge, shall be given access to the identity of, or information that would lead to the identity of, a...

  8. 75 FR 75576 - Confidentiality of Suspicious Activity Reports

    Science.gov (United States)

    2010-12-03

    ...-2010-0019] RIN 1557-AD17 Confidentiality of Suspicious Activity Reports AGENCY: The Office of the... suspicious activity report (SAR) to: clarify the scope of the statutory prohibition on the disclosure by a... institutions, including national banks regulated by the OCC, to keep certain records and make certain reports...

  9. Nursing Students' Perceptions of Confidentiality, Accountability, and E-Professionalism in Relation to Facebook.

    Science.gov (United States)

    Barnable, Alexia; Cunning, Glenda; Parcon, Mariel

    This study examined nursing students' perceptions of confidentiality, accountability, and e-professionalism in relation to Facebook. All of the students were aware that posting patients' names and pictures of patients constituted a confidentiality breach. When comparing students based on educational status, there were differing opinions on whether employers should use Facebook profile information for hiring decisions. Nursing programs should provide current education, including clear and up-to-date policies, about social media use.

  10. To succeed with invention and patent which are my own idea

    International Nuclear Information System (INIS)

    Yu, Jae Bok

    1999-07-01

    This book introduces how to invent through various way such as successful story about the effect to invent, conception like everyone can be a inventor and this is invention. This book also explains all of process of patent such as application of patent, patent in Korea, Japan, the U.S and other countries, what is patent information, how to hunt patent, intellectual property right, priority system, international patent application is possible in Korea, other common sense on patent application, patent as a great power and questions and answers on patent.

  11. I can invent

    Energy Technology Data Exchange (ETDEWEB)

    Wang, Yeon Jung

    2001-10-15

    This book introduces the inventions which are unique and interesting. The titles of these are pots which boil very quick and safe, a desk with a pencil case, a scale which is not rusty, a book cover with a pocket, a skate with wax and mop, a seat belt airbag, a desk lamp which can control the light, a desk in the future, a recycling bin for cans, a blackboard eraser which erase very well, a useful crutches, swimming goggles attached convex lens, flower pots using waste tires, toilet paper holder with sawtooth, a brush which washes a flask, improved pump for petroleum.

  12. I can invent

    International Nuclear Information System (INIS)

    Wang, Yeon Jung

    2001-10-01

    This book introduces the inventions which are unique and interesting. The titles of these are pots which boil very quick and safe, a desk with a pencil case, a scale which is not rusty, a book cover with a pocket, a skate with wax and mop, a seat belt airbag, a desk lamp which can control the light, a desk in the future, a recycling bin for cans, a blackboard eraser which erase very well, a useful crutches, swimming goggles attached convex lens, flower pots using waste tires, toilet paper holder with sawtooth, a brush which washes a flask, improved pump for petroleum.

  13. 18 CFR 1b.9 - Confidentiality of investigations.

    Science.gov (United States)

    2010-04-01

    ... 18 Conservation of Power and Water Resources 1 2010-04-01 2010-04-01 false Confidentiality of investigations. 1b.9 Section 1b.9 Conservation of Power and Water Resources FEDERAL ENERGY REGULATORY COMMISSION... pursuant to subpoena, and all investigative proceedings shall be treated as nonpublic by the Commission and...

  14. Weaving the universe is modern cosmology discovered or invented?

    CERN Document Server

    Wesson, Paul S

    2011-01-01

    This new book is a thorough but short review of the history and present status of ideas in cosmology. It is aimed at a broad audience, but will contain a few equations where needed to make the argument exact. The coverage of cosmological ideas will focus mainly on the period from the early 1900s when Einstein formulated relativity and when his colleague Sir Arthur Eddington was creating relativistic models of the universe. It ends with the completion of the Large Hadron Collider in late 2008, having surveyed modern ideas of particle physics and astrophysics. To organize the large body of infor

  15. THE POSSIBLE CONFIDENTIALITY: THE PUBLIC ADMINISTRATION AS PARTY IN THE ALTERNATIVE DISPUTE RESOLUTION MECHANISM

    Directory of Open Access Journals (Sweden)

    Carlos Alberto de Salles

    2017-05-01

    Full Text Available This article debates the tension that exists between confidentiality, usual in ADRs, and the publicity principle, that rules the Public Administration in Brazil. As a solution points that the parameter of confidentiality when Public Administration is a party must be the preservation of accountability of the involved agencies, what means, the capacity to answer to its own goals and to obey the public control.

  16. IT Confidentiality Risk Assessment for an Architecture-Based Approach

    NARCIS (Netherlands)

    Morali, A.; Zambon, Emmanuele; Etalle, Sandro; Overbeek, Paul

    2008-01-01

    Information systems require awareness of risks and a good understanding of vulnerabilities and their exploitations. In this paper, we propose a novel approach for the systematic assessment and analysis of confidentiality risks caused by disclosure of operational and functional information. The

  17. 48 CFR 1415.207-71 - Confidentiality of proposal evaluation.

    Science.gov (United States)

    2010-10-01

    ... THE INTERIOR CONTRACTING METHODS AND CONTRACT TYPES CONTRACTING BY NEGOTIATION Solicitation and... evaluators and advisors shall sign a Conflict of Interest Certificate and a Confidentiality Certificate in a... outside the Government shall take into consideration requirements for avoiding individual conflicts of...

  18. Public expectations concerning confidentiality protection of adolescents' sexual and reproductive health care in Lithuania: findings of the surveys conducted in 2005 and 2012.

    Science.gov (United States)

    Jaruseviciene, Lina; Zaborskis, Apolinaras; Lazarus, Jeffrey Victor

    2014-04-01

    An adolescent's right to confidential healthcare is protected by international law and professional consensus. However, parental and social support for confidential sexual and reproductive health (SRH) services, in particular, varies greatly. This study documents Lithuanian residents' expectations with regard to confidentiality protection for adolescents in this domain, and explores the factors related to the diversity of these expectations. Two national surveys of Lithuanian residents completed in 2005 and 2012 using anonymous questionnaires. Participants rated their expectations for confidentiality using a five-point Likert scale for eight types of SRH consultations. Public anticipation for confidentiality depended on whether issues related to sexual behaviour or to its consequences were addressed during adolescent consultation. Only younger respondents had higher expectations for confidentiality in both contexts. Public expectations regarding confidentiality were less demanding in 2012 than in 2005. The expectation of confidentiality protection was greater for topics related to sexual behaviour than for the consequences of sexual behaviour, such as pregnancy, abortion or a sexually transmitted infection. This implies a need for targeted information strategies for the general population and explicit guidance for physicians on when and for whom care should remain confidential.

  19. 49 CFR 40.321 - What is the general confidentiality rule for drug and alcohol test information?

    Science.gov (United States)

    2010-10-01

    ... Transportation PROCEDURES FOR TRANSPORTATION WORKPLACE DRUG AND ALCOHOL TESTING PROGRAMS Confidentiality and Release of Information § 40.321 What is the general confidentiality rule for drug and alcohol test... DOT drug or alcohol testing process, you are prohibited from releasing individual test results or...

  20. The Power of Individual-level Drivers of Inventive Performance

    DEFF Research Database (Denmark)

    Zwick, Thomas; Frosch, Katharina; Hoisl, Karin

    2017-01-01

    (KSAO) model. We link survey information spanning the inventors’ entire careers and psychometric test evidence with patent history data for more than 1000 inventors. We also control for variables that have traditionally been used in studies of inventive performance including inventor age, applicant type......, technology, patent, and time information. We show that educational level, skills acquired during the career, personality traits, career motivation, cognitive ability, and cognitive problem-solving style are significantly related to inventive performance....

  1. Drug Delivery Research: The Invention Cycle.

    Science.gov (United States)

    Park, Kinam

    2016-07-05

    Controlled drug delivery systems have been successful in introducing improved formulations for better use of existing drugs and novel delivery of biologicals. The initial success of producing many oral products and some injectable depot formulations, however, reached a plateau, and the progress over the past three decades has been slow. This is likely due to the difficulties of formulating hydrophilic, high molecular weight drugs, such as proteins and nucleic acids, for targeting specific cells, month-long sustained delivery, and pulsatile release. Since the approaches that have served well for delivery of small molecules are not applicable to large molecules, it is time to develop new methods for biologicals. The process of developing future drug delivery systems, termed as the invention cycle, is proposed, and it starts with clearly defining the problems for developing certain formulations. Once the problems are well-defined, creative imagination examines all potential options and selects the best answer and alternatives. Then, innovation takes over to generate unique solutions for developing new formulations that resolve the previously identified problems. Ultimately, the new delivery systems will have to go through a translational process to produce the final formulations for clinical use. The invention cycle also emphasizes examining the reasons for success of certain formulations, not just the reasons for failure of many systems. Implementation of the new invention cycle requires new mechanisms of funding the younger generation of scientists and a new way of identifying their achievements, thereby releasing them from the burden of short-termism.

  2. 37 CFR 201.29 - Access to, and confidentiality of, Statements of Account, Verification Auditor's Reports, and...

    Science.gov (United States)

    2010-07-01

    ... confidentiality of, Statements of Account, Verification Auditor's Reports, and other verification information... GENERAL PROVISIONS § 201.29 Access to, and confidentiality of, Statements of Account, Verification Auditor... Account, including the Primary Auditor's Reports, filed under 17 U.S.C. 1003(c) and access to a Verifying...

  3. Invented genealogies as political mythologies: definitionand examples

    Directory of Open Access Journals (Sweden)

    Filip-Lucian Iorga

    2012-10-01

    Full Text Available The genealogical imaginary is a subcategory of the imaginary referring to the origin and it comprises a wide range of genealogical myths: fictitious ancestors, whether divine or human, fabulous kinships, invented genealogies, descendancies which are impossible to certify with documents, erroneous interpretations of certain degrees of kinship, real genealogies that have received unexpected interpretations and historiographic clichés grown on more or less attestable genealogies. The case of the Balş family is one of the most interesting: trying to integrate in the political structures of the Austrian and Russian Empire, some members of this old Moldavian family invent a fictitious genealogy that links the French counts of Baux, the Balsa family, a Serbian medieval dynasty and the Balş family, Moldavian boyars.

  4. Frederick Soddy's invention of isotopes in 1911

    International Nuclear Information System (INIS)

    Attas, M.

    2011-01-01

    This paper describes the history of the invention of isotopes by Frederick Soddy in 1911. The idea of the nucleus had been conceived by a physicist, Ernest Rutherford. But it took a chemist, Frederick Soddy, to make chemical sense of the zoo of recently discovered radioactive elements, by inventing the idea of isotopes. He showed how one radioactive substance transformed itself spontaneously into another, following mathematical laws of exponential growth and decay. In his book The Chemistry of the Radio-Elements, Soddy compiled complete descriptions of the physical and chemical properties of each of the radioactive substances. He organized their sequences of transmutations by the.similarities in their chemical properties, so that the emanations, for example, were all side-by-side in a chart.

  5. 22 CFR 1104.17 - Confidentiality of archaeological resource information.

    Science.gov (United States)

    2010-04-01

    ... 22 Foreign Relations 2 2010-04-01 2010-04-01 true Confidentiality of archaeological resource information. 1104.17 Section 1104.17 Foreign Relations INTERNATIONAL BOUNDARY AND WATER COMMISSION, UNITED... of archaeological resource information. (a) The Commissioner shall not make available to the public...

  6. Decisions about Confidentiality in Medical Student Mental Health Settings.

    Science.gov (United States)

    Lindenthal, Jacob Jay; And Others

    1984-01-01

    Examined responses of psychologists and psychiatrists in medical schools (N=59) to vignettes representing student problems. Results suggested practitioners were generally unwilling to break confidentiality in response to problems involving suicidal tendencies, sexual coercion/seduction, social transgressions, or falsifying data. Only suggestions…

  7. Privacy, confidentiality and abortion statistics: a question of public interest?

    Science.gov (United States)

    McHale, Jean V; Jones, June

    2012-01-01

    The precise nature and scope of healthcare confidentiality has long been the subject of debate. While the obligation of confidentiality is integral to professional ethical codes and is also safeguarded under English law through the equitable remedy of breach of confidence, underpinned by the right to privacy enshrined in Article 8 of the Human Rights Act 1998, it has never been regarded as absolute. But when can and should personal information be made available for statistical and research purposes and what if the information in question is highly sensitive information, such as that relating to the termination of pregnancy after 24 weeks? This article explores the case of In the Matter of an Appeal to the Information Tribunal under section 57 of the Freedom of Information Act 2000, concerning the decision of the Department of Health to withhold some statistical data from the publication of its annual abortion statistics. The specific data being withheld concerned the termination for serious fetal handicap under section 1(1)d of the Abortion Act 1967. The paper explores the implications of this case, which relate both to the nature and scope of personal privacy. It suggests that lessons can be drawn from this case about public interest and use of statistical information and also about general policy issues concerning the legal regulation of confidentiality and privacy in the future.

  8. 76 FR 59410 - Government-Owned Inventions; Availability for Licensing

    Science.gov (United States)

    2011-09-26

    ...: Licensing information and copies of the U.S. patent applications listed below may be obtained by writing to...-402-0220. A signed Confidential Disclosure Agreement will be required to receive copies of the patent... to menopause, birth control, menstrual cycle/amenorrhea, fertility or endometriosis. Competitive...

  9. 18 CFR 401.75 - Protection of trade secrets; Confidential information.

    Science.gov (United States)

    2010-04-01

    ..., confidential statistical data, amount or source of any income, profits, losses, or expenditures of any person... States Code which provides: Whoever, being an officer or employee of the United States or of any...

  10. Denying a patient's final will: public safety vs. medical confidentiality and patient autonomy.

    Science.gov (United States)

    Gaertner, Jan; Vent, Julia; Greinwald, Ralf; Rothschild, Markus A; Ostgathe, Christoph; Kessel, Rene; Voltz, Raymond

    2011-12-01

    Especially when caring for patients approaching the end of life, physicians and nursing staff feel committed to fulfilling as many patient desires as possible. However, sometimes a patient's "final will" may threaten public safety. This can lead to severe conflicts, outweighing the physician's obligation and dedication to care for the patient and to respect his autonomy. Yet, public safety can be threatened if confidentiality is not broken. This article provides a concise summary of the medicolegal and ethical fundamentals concerning this difficult situation. If the patient's and others' health and safety are at risk, physicians may (and in some countries must) break medical confidentiality and disclose confidential patient information to the police and other authorities. Physicians should be able to professionally deal with such a conflict in all patients, not only in patients with advanced illness. Copyright © 2011 U.S. Cancer Pain Relief Committee. Published by Elsevier Inc. All rights reserved.

  11. Nanotechnological Inventions and Nanomaterials Produce A Profound Effect

    Directory of Open Access Journals (Sweden)

    VLASOV Vladimir Alexeevich

    2015-02-01

    Full Text Available The inventions in the area of nanotechnologies and nanomaterials produce a profound effect in construction, housing and communal services and adjacent economic fields as they allow us: to increase mechanical strength, coefficient of elasticity, alkali resistance and temperature of products vitrification; to obtain nanostructured coatings with the property of shape memory on the steel; to raise the dynamics of coal burning and its full burnout in the boilers of thermoelectric power station; to produce metal nanopowders with increased stored energy 10–15% etc. For example, the invention «Epoxy composition for high strength, alkali resistant structures» refers to epoxy composition used as a binder for production of high strength, thermal- and alkali-resistant glass-fiber material which can be applied in the manufacture process of construction reinforcement to strengthen concrete structures. The invention «The method to produce nanostructured reaction foil» can be used to join different materials including metal alloys, ceramics, amorphous materials and elements of microelectronic devices that are sensible to the heating. This process provides decreased labour-output ratio and energy consumption as well as the condition to manufacture foil with specified stored energy and high mechanical properties. The invention «The method of intensification of burning lowreactionary coal in the boilers of thermoelectric power station» refers to the thermal energy and can be implemented at the thermal plants. The increased dynamics of inflaming and burning leads to full burnout of powdered-coal low-reactionary fuel and decreased mechanical underfiring. The specialists may be also interested in the following inventions: fine dispersed organic suspension of carbon metal-containing nanostructures and the method to produce it; the dispersion of carbon nanotubes; the composition for reinforcement of building structures; the reinforced plate element made of

  12. Invented Spelling, Word Stress, and Phonological Awareness in Relation to Reading Difficulties in Children

    Science.gov (United States)

    Mehta, Sheena

    2016-01-01

    The purpose of the current research is to assess the clinical utility of an invented spelling tool and determine whether invented spelling and word stress (supra-segmental level measures) can also be used to better identify reading difficulties. The proposed invented spelling tool incorporated linguistic manipulations to alter the difficulty…

  13. ENGAGING STUDENTS THROUGH EVENT MARKETING: AN EXAMPLE OF UNIVERSITY ENTREPRENEURSHIP EVENT

    Directory of Open Access Journals (Sweden)

    Alev KOÇAK ALAN

    2017-12-01

    Full Text Available Despite the growing importance of event marketing, this study investigated the impact of entrepreneurship event on university students which was hosting by one of the leading university in Turkey. Three different assets of event image (event inventiveness, event appropriateness, event adequacy were proposed to influence students’ satisfaction and revisit intentions. Research conducted to 468 students which participate in the entrepreneurship event for two days. For the analyses structural equation modeling technique was used. It was found that (i the dimensions of event image (inventiveness, appropriateness, and adequacy have an impact on students’ satisfaction and (ii students’ satisfaction was a main driver of their revisit intention. Results, future researches and managerial implications were addressed.

  14. Invention profiles and uneven growth in the field of emerging nano-energy

    International Nuclear Information System (INIS)

    Guan, Jiancheng; Liu, Na

    2015-01-01

    This paper aims to synthetically investigate invention profiles and uneven growth of technological knowledge in the emerging nano-energy field, based on patents data extracted from the Derwent Innovation Index (DII) database during the time period 1991–2012. The trend analysis shows that invention in this field has experienced enormous growth and also diversification over the past 22 years. The co-occurrence network of burst technology domains reveals that technology domains constantly burst, and innovative progress in nanotechnology has tremendously contributed to energy production, storage, conversion and harvesting and so on. Nano-energy patented inventions mainly come from a combinatorial process with a very limited role of developing brand-new technological capabilities. Reusing existing technological capabilities including recombination reuse, recombination creation and single reuse is the primary source of inventions. For the impacts of technology networks' embeddedness, we find that network tie strength suppresses the growth of technological knowledge domains, and network status and convergence both facilitate the growth of technological knowledge domains. We expect that this study will provide some enlightenment for inventing or creating new knowledge in emerging fields in complex technological environment. - Highlights: • We define and utilize a unique dataset of nano-energy patents. • We identify and map the burst technological knowledge domains. • Quantitative argument is provided to prove the combinatorial invention. • Impacts of network embeddedness on growth of technology domain are examined. • Network characteristics affect the growth of technology domain

  15. Circles of Confidence in Correspondences. : Confidentiality in seventeenth-century knowledge exchange in networks of letters and drawings

    NARCIS (Netherlands)

    van den Heuvel, C.M.J.M.; Weingart, Scott B; Spelt, Nils; Nellen, H.J.M.

    2016-01-01

    Science in the Early Modern World depended on the one hand on openness in scholarly communication, but on the other hand the competition in commerce and trade and the political and religious conflicts required secrecy and confidentiality. This papers analyzes these concepts of confidentiality and

  16. Japan acts to speed technology transfer from universities

    CERN Multimedia

    Saegusa, A

    1999-01-01

    A Japanese law will take effect in the autumn to promote technology transfer from universities and laboratories. The new measures aim to encourage collaborations with the commercial sector and allow industrial research partners to retain title to inventions (1 page).

  17. The Invention Convention: Mind Meets Simple Machines.

    Science.gov (United States)

    Hadi-Tabassum, Samina

    1997-01-01

    Describes an Earth Day celebration where students had to design an invention made of simple machines that could crush an empty aluminum can through 10 rapid mechanical movements using materials foraged from the students' homes. (JRH)

  18. 100 questions and 100 answers for university TLO management

    International Nuclear Information System (INIS)

    2008-09-01

    The contents of this book are what is university TLO?, how to form the organization, what are the related regulations? what programs for development of skill for TLO members do it have? which service is provided to TLO research worker or laboratory? what regulations are related on national research and development business? what is the reason that we use patent information or research and development? what is the difference between jobs invention and free invention? what is priority system? what is laying-open of application and what is technology marketing?

  19. Inventing Freud.

    Science.gov (United States)

    Rudnytsky, Peter L

    2008-06-01

    Written to commemorate the 150th anniversary of Freud's birth, this paper construes Nina Coltart's statement that "if Freud did not exist it would be necessary to invent him," with its implicit comparison of Freud to God, to refer to (a) the things that Freud taught that are incontrovertibly true; (b) the unavoidable subjectivity in all judgments of Freud; and (c) the resemblances between psychoanalysis and religion. This last comparison is likewise seen to have both positive and negative aspects. Freud's ideas have inspired many people, yet he unscientifically arrogated sovereign authority over psychoanalysis. Freud's admirers are reminded of his extreme difficulty in admitting he was wrong and changing his mind when he should have known better, while his detractors are encouraged to consider the evidence supporting many of Freud's core tenets and to recognize that his discovery of psychoanalysis is indeed one of the supreme achievements in human history.

  20. 48 CFR 1552.235-78 - Data Security for Toxic Substances Control Act Confidential Business Information (DEC 1997).

    Science.gov (United States)

    2010-10-01

    ...: Data Security for Toxic Substances Control Act Confidential Business Information (DEC 1997) The... 48 Federal Acquisition Regulations System 6 2010-10-01 2010-10-01 true Data Security for Toxic Substances Control Act Confidential Business Information (DEC 1997). 1552.235-78 Section 1552.235-78 Federal...

  1. Para que servem os inventários de fauna?

    Directory of Open Access Journals (Sweden)

    Luís Fábio Silveira

    2010-01-01

    Full Text Available Inventários de fauna acessam diretamente a diversidade de uma localidade, em um determinado espaço e tempo. Os dados primários gerados pelos inventários compõem uma das ferramentas mais importantes na tomada de decisões a respeito do manejo de áreas naturais. Entretanto, vários problemas têm sido observados em diversos níveis relacionados aos inventários de fauna no Brasil e vão desde a formação de recursos humanos até a ausência de padronização, de desenho experimental e de seleção de métodos inadequados. São apresentados estudos de caso com mamíferos, répteis, anfíbios e peixes, nos quais são discutidos problemas como variabilidade temporal e métodos para detecção de fauna terrestre, sugerindo que tanto os inventários quanto os programas de monitoramento devam se estender por prazos maiores e que os inventários devem incluir diferentes metodologias para que os seus objetivos sejam plenamente alcançados.Inventories of fauna directly access the diversity of a locality in a certain period of time. The primary data generated by these inventories comprise one of the most important steps in decisions making regarding the management of natural areas. However, several problems have been observed at different levels related to inventories of fauna in Brazil, and range from the training of humans to the lack of standardization of experimental design and selection of inappropriate methods. We present case studies of mammals, reptiles, amphibians and fishes, where they discussed issues such temporal variability and methods for detection of terrestrial fauna, suggesting that both inventories and monitoring programs should be extended for longer terms and that inventories should include different methodologies to ensure that their goals are fully achieved.

  2. 75 FR 51823 - Government-Owned Inventions; Availability for Licensing

    Science.gov (United States)

    2010-08-23

    ...: Licensing information and copies of the U.S. patent applications listed below may be obtained by writing to.../402-0220. A signed Confidential Disclosure Agreement will be required to receive copies of the patent... infertility and irregular menstrual periods than in healthy women. The discovery of MATER as an important...

  3. 7 CFR 981.75 - Confidential nature of records and reports.

    Science.gov (United States)

    2010-01-01

    ... Section 981.75 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (Marketing Agreements and Orders; Fruits, Vegetables, Nuts), DEPARTMENT OF AGRICULTURE ALMONDS..., financial condition, or business operations of any handler shall be considered as confidential information...

  4. 37 CFR 1.295 - Review of decision finally refusing to publish a statutory invention registration.

    Science.gov (United States)

    2010-07-01

    ... dissatisfied with the final refusal to publish a statutory invention registration for reasons other than... refunded if the final refusal to publish a statutory invention registration for reasons other than... refusing to publish a statutory invention registration. 1.295 Section 1.295 Patents, Trademarks, and...

  5. Time for Action: Audit, Accountability and Confidential Enquiries into ...

    African Journals Online (AJOL)

    Improving the quality of care is essential for achieving reductions in maternal mortality. Audit is one of the methods which can be used to simultaneously assess as well as improve quality. This commentary discusses one type of audit – confidential enquiries into maternal death. We believe that the enthusiasm for ...

  6. Clinical psychology service users' experiences of confidentiality and informed consent: a qualitative analysis.

    Science.gov (United States)

    Martindale, S J; Chambers, E; Thompson, A R

    2009-12-01

    To explore and describe the experience of clinical psychology service users in relation to the processes associated with confidentiality and the generation of informed consent in individual therapy. A qualitative interview-based study employing interpretative phenomenological analysis was conducted with service users. User researchers were active collaborators in the study. A focus group of four users was convened to explore issues related to confidentiality and consent, which then informed the development of the semi-structured interview schedule. Twelve users of community mental health clinical psychology services were interviewed by user researchers. A user researcher and a clinical psychologist undertook joint analysis of the data. A second clinical psychologist facilitated reflexivity and wider consideration of validity issues. Four main themes were identified from the data: being referred; the participant's feelings, mental health difficulties, and their impact; relationships with workers and carers; and autonomy. The meaningfulness of processes of discussing confidentiality, and generating informed consent, can be improved by psychologists placing a greater emphasis on choice, control, autonomy, individual preferences, and actively involving the user in dialogue on repeated occasions.

  7. MEASUREMENT OF APPLICATION OF ISO 27001 OF CUSTOMER CELLULAR CARD CONFIDENTIALITY DATA IN PT. XYZ AREA JAKARTA

    Directory of Open Access Journals (Sweden)

    Krishna Rahadian

    2014-10-01

    Full Text Available The purpose of this study was to evaluate the effects of the process of ISO 27001 with respect to the confidentiality of customer cellular card Jakarta and to improve cellular card customer data confidentiality at PT.XYZ from data leakage of the customer data due to the third party involvement, clean-desk policy, and access right. Recommendation regarding the improvement is provided after reviewing the confidentiality of customer data. The survey in this study is conducted by questionnaire. From the evaluation results of the questionnaire, it is concluded that the larger customer data leaks are mainly caused by the external factors.

  8. 10 CFR 603.860 - Rights to inventions.

    Science.gov (United States)

    2010-01-01

    ... approved by assigned intellectual property counsel. (c) Taking past investments as an example, the... DEPARTMENT OF ENERGY (CONTINUED) ASSISTANCE REGULATIONS TECHNOLOGY INVESTMENT AGREEMENTS Award Terms Related to Other Administrative Matters Intellectual Property § 603.860 Rights to inventions. (a) The...

  9. 32 CFR 147.30 - Temporary eligibility for access at the confidential and secret levels and temporary eligibility...

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 1 2010-07-01 2010-07-01 false Temporary eligibility for access at the confidential and secret levels and temporary eligibility for âLâ access authorization. 147.30 Section 147.30... Temporary Access § 147.30 Temporary eligibility for access at the confidential and secret levels and...

  10. Comparison of parental and adolescent views on the confidential interview and adolescent health risk behaviors within the gynecologic setting.

    Science.gov (United States)

    Trotman, Gylynthia E; Mackey, Eleanor; Tefera, Eshetu; Gomez-Lobo, Veronica

    2018-03-23

    To explore parental and adolescent views on the confidential interview in the gynecologic setting and compare adolescent reported risk-taking behaviors with parental perception. Anonymous surveys were administered separately to parents/guardians and adolescents between the ages of 11-17. Information pertaining to the patient's Tanner stage and reason for visit was obtained from the provider. This first phase served as the usual care group. In the second phase of the study, surveys were once again distributed after a brief educational intervention. Linear regression analysis, Wilcoxon rank sum test, and Fisher exact test were used where appropriate. Pediatric and Adolescent Gynecology clinics in two tertiary hospitals INTERVENTION: Brief educational handout on key concepts of the confidential interview MAIN OUTCOME MEASURES: Parental perception of the confidential interview and adolescent risk- taking behaviors RESULTS: A total of 248 surveys were included in the final analysis, which accounts for 62 adolescent and parent/guardian pairs in each group. The majority of parents and adolescents reported perceived benefit to the confidential interview. However, parents were less likely to rate benefits of private time specifically for their own adolescent and less than half of parents believed that adolescents should have access to private time in the gynecologic setting. Both parents/guardians and adolescents feared that the confidential interview would limit the parent's ability to take part in decision-making. The low support for confidential time for their adolescent was not different in the usual care group as compared to the intervention group, although there was a trend toward parental acceptance with increased adolescent age. Adolescents were consistently more likely to report more risk-taking behaviors than their parents perceived. There is a discord between parental perception and adolescent reports of risk taking behaviors. This is coupled with a lack of

  11. Inventions and developments of democracy

    DEFF Research Database (Denmark)

    Jakobsen, Uffe

    2010-01-01

    In traditional approaches to the history of political ideas, the history of democracy is uniformly studied concerning the point of departure, selection of canonical texts, etc. The paper introduces the Koselleckian conceptual history approach (Begriffsgeschichte) and the principle of a broader...... selection of texts than in the traditional history of ideas to provide a fuller account of usages of the concept, thereby opening up for alternative conceptions of the inventions and development of democracy....

  12. Was the Monetarist Tradition Invented?

    OpenAIRE

    George S. Tavlas

    1998-01-01

    In 1969, Harry Johnson charged that Milton Friedman 'invented' a Chicago oral quantity theory tradition, the idea being that in order to launch a monetarist counter-revolution, Friedman needed to establish a linkage with pre-Keynesian orthodoxy. This paper shows that there was a distinct pre-Keynesian Chicago quantity-theory tradition that advocated increased government expenditure during the Great Depression in order to put money directly into circulation. This policy stance distinguished th...

  13. [Consent and confidentiality in occupational health practice: balance between legal requirements and ethical values].

    Science.gov (United States)

    Mora, Erika; Franco, G

    2010-01-01

    The recently introduced Italian law on the protection of workers' health states that the occupational health physician (competent physician) is required to act according to the Code of Ethics of the International Commission on Occupational Health (ICOH). This paper aims at examining the articles of legislative decree 81/2008 dealing with informed consent and confidentiality compared with the corresponding points of the ICOH Ethics Code. Analysis of the relationship between articles 25 and 39 (informed consent) and 18, 20 and 39 (confidentiality) of the decree shows that there are some points of disagreement between the legal requirements and the Code of Ethics, in particular concerning prescribed health surveillance, consent based on appropriate information (points 8, 10 and 12 of the Code) and some aspects of confidentiality (points 10, 20, 21, 22 and 23 of the Code). Although the competent physician is required to act according to the law, the decisional process could lead to a violation of workers' autonomy.

  14. 76 FR 42684 - Statutory Invention Registration

    Science.gov (United States)

    2011-07-19

    ... 3.00 Totals 8 10.00 There is annual (non-hour) cost burden in the way of filing fees associated with...) Filing fee $ cost burden (a) (b) (a x b) (c) Statutory Invention Registration (Requested prior to 2 $920...) respondent cost burden for this collection in the form of postage costs and filing fees will be $8,170. IV...

  15. Inventive Activity of Researchers: Cross-Country Rating Assessments

    Directory of Open Access Journals (Sweden)

    Tatyana Ivanovna Volkova

    2017-03-01

    Full Text Available In recent years, the study of the research capacity of the country and regions has become more active not only from the point of view of their leading components (personnel, financial, information, organizational, material-and-technical ones but also from the perspective of the assessment of productivity and effectiveness of researchers’ work. In the cross-country analysis, the certain highly aggregative parameters, which values, as a rule, are not in favour of Russia, are used. At the same time, at profound studying of this topic, these estimates cannot represent correctly the real trends of inventive activity in the scientific and technological sphere of the country and its regions. Moreover, the measurement of the researchers’ creative potential realization is carried out mainly through the assessment systems of their printing activity. Little attention is paid to the problem of the rating assessments of the researchers’ inventive and patent activity and its products from a cross-country perspective (especially to the detailed ones as well as to its institutional determinants. Therefore, the authors have chosen this subject-matter of the research. Its empirical basis is the statistical materials of both the national database and those which are recognized by the world scientific community. This research has both theoretical and methodological orientations. The purpose is the development of methodological and methodical tools of the research and assessment of researchers’ inventive activity including methodological support of cross-country comparative assessments. The authors have based the hypothesis on their previous research: in the conditions of the decreasing level of financial security, continuous reduction of a number of researchers, institutional restrictions and contradictions, the inventive activity of national researchers is still exist, and in a number of its leading parameters is implemented at the level of the advanced

  16. THE INFORMATION CONFIDENTIALITY AND CYBER SECURITY IN MEDICAL INSTITUTIONS

    Directory of Open Access Journals (Sweden)

    SABAU-POPA CLAUDIA DIANA

    2015-07-01

    Full Text Available The information confidentiality and cyber security risk affects the right to confidentiality and privacy of the patient, as regulated in Romania by the Law 46/2002. The manifestation of the cyber security risk event affects the reputation of the healthcare institution and is becoming more and more complex and often due to the: development of network technology, the medical equipment connected to wifi and the electronic databases. The databases containing medical records were implemented due to automation. Thus, transforming data into medical knowledge contribute to a better understanding of the disease. Due to these factors, the measures taken by the hospital management for this type of risk are adapted to the cyber changes. The hospital objectives aim: the implementation of a robust information system, the early threats identifications and the incident reporting. Neglecting this type of risk can generate financial loss, inability to continue providing health care services for a certain period of time, providing an erroneous diagnosis, medical equipment errors etc. Thus, in a digital age the appropriate risk management for the information security and cyber risk represent a necessity. The main concern of hospitals worldwide is to align with international requirements and obtain credentials in terms of data security from the International Organisation for Standardization, which regulates the management of this type of risk. Romania is at the beginning in terms of concerns regarding the management, avoidance and mitigation of information security, the health system being most highly exposed to its manifestation. The present paper examines the concerns of the health system to the confidentiality of information and cyber security risk and its management arrangements. Thus, a set of key risk indicators is implemented and monitored for 2011-2013, using a user interface, a Dashboard, which acts as an early warning system of the manifestation of the

  17. 19 CFR 210.39 - In camera treatment of confidential information.

    Science.gov (United States)

    2010-04-01

    ... 19 Customs Duties 3 2010-04-01 2010-04-01 false In camera treatment of confidential information. 210.39 Section 210.39 Customs Duties UNITED STATES INTERNATIONAL TRADE COMMISSION INVESTIGATIONS OF UNFAIR PRACTICES IN IMPORT TRADE ADJUDICATION AND ENFORCEMENT Prehearing Conferences and Hearings § 210...

  18. Data-protection standards and confidentiality of HIV/AIDS status in ...

    African Journals Online (AJOL)

    Also, the article presents a preliminary assessment of the possible impact of professionalisation (and outsourcing) of workplace HIV/AIDS management on ... the development of law governing data protection and HIV/AIDS confidentiality in South Africa) and interviews conducted with workplace health managers and trade ...

  19. User's guide to the radionuclide inventory and hazard code INVENT

    International Nuclear Information System (INIS)

    Nancarrow, D.J.; Thorne, M.C.

    1986-05-01

    This report constitutes the user's guide to the radionuclide inventory and hazard index code INVENT and provides an explanation of the mathematical basis of the code, the database used and operation of the code. INVENT was designed to facilitate the post-closure radiological assessment of land-based repositories for low and intermediate-level wastes. For those radionuclides identified to be of potential significance, it allows the calculation of time-dependent radionuclide activities, hazard indices for both inhalation and ingestion of activity, and photon spectra. (author)

  20. Confidentiality Protection of User Data and Adaptive Resource Allocation for Managing Multiple Workflow Performance in Service-Based Systems

    Science.gov (United States)

    An, Ho

    2012-01-01

    In this dissertation, two interrelated problems of service-based systems (SBS) are addressed: protecting users' data confidentiality from service providers, and managing performance of multiple workflows in SBS. Current SBSs pose serious limitations to protecting users' data confidentiality. Since users' sensitive data is sent in…

  1. 21 CFR 1316.23 - Confidentiality of identity of research subjects.

    Science.gov (United States)

    2010-04-01

    ... 21 Food and Drugs 9 2010-04-01 2010-04-01 false Confidentiality of identity of research subjects. 1316.23 Section 1316.23 Food and Drugs DRUG ENFORCEMENT ADMINISTRATION, DEPARTMENT OF JUSTICE ADMINISTRATIVE FUNCTIONS, PRACTICES, AND PROCEDURES Protection of Researchers and Research Subjects § 1316.23...

  2. 37 CFR 382.4 - Confidential information and statements of account.

    Science.gov (United States)

    2010-07-01

    ... information and statements of account. (a) For purposes of this subpart, confidential information shall include statements of account and any information pertaining to the statements of account designated as... payments. (c) A statement of account shall include only such information as is necessary to verify the...

  3. Inventing Democracy: Future Alternatives for Social Action.

    Science.gov (United States)

    Deethardt, John F.

    1983-01-01

    Considers the rational basis for participatory democracy and six ideas designed to embody that conceptual basis. Contends that the mission of speech communication scholars to the civic culture should be an activation of civic competencies and an invention of new places to practice free speech skills. (PD)

  4. 75 FR 8330 - Access to Confidential Business Information by Eastern Research Group

    Science.gov (United States)

    2010-02-24

    ... ENVIRONMENTAL PROTECTION AGENCY [EPA-HQ-OPPT-2003-0004; FRL-8812-4] Access to Confidential Business Information by Eastern Research Group AGENCY: Environmental Protection Agency (EPA). ACTION: Notice. [[Page 8331

  5. What if there were no universities?

    Science.gov (United States)

    Vasbinder, Jan W

    2017-12-01

    To a large extent, the pursuit of science takes place in universities. In this essay, I ask the following questions. Supposing there were no universities, and that all the knowledge mankind has ever collected and generated is somehow accessible, would we invent universities to make this knowledge available to address the problems humanity faces? What should those universities perform, and what role would science play in such universities? To look for answers to those questions, I consider the nature of the problems dealt with by science, the knowledge needed to address those problems, the gap between the two, the need for interdisciplinarity and the need to educate the leaders of the future, and finally, the boundaries of scientific knowledge. © 2017 The Institute of Psychology, Chinese Academy of Sciences and John Wiley & Sons Australia, Ltd.

  6. Changes in public attitudes towards confidential adolescent sexual and reproductive health services in Lithuania after the introduction of new legislation

    DEFF Research Database (Denmark)

    Jaruseviciene, Lina; Zaborskis, Apolinaras; Sauliune, Skirmante

    2015-01-01

    was employed to estimate absolute differences in prevalence of belief in whether or not adolescents would find confidentiality important when consulting a physician on SRH issues. A log-binomial regression model was fitted to estimate the relative changes (prevalence ratio) of the independent variables......BACKGROUND: In Lithuania, the right to confidentiality in healthcare for adolescents over the age of 16 was guaranteed in 2010 through the adoption of new legislation. This study sets out to explore changes in Lithuanian residents' attitudes towards confidentiality protection in adolescent sexual....... RESULTS: The total number of respondents was 1054 (response rate 83%) in 2005 and 1002 (response rate 80%) in 2012. The proportion of respondents who reported a belief that adolescents would find confidentiality important when seeing a physician for SRH issues increased significantly from 62% in 2005...

  7. Privacy Act System of Records: Confidential Business Information Tracking System, EPA-20

    Science.gov (United States)

    Learn about the Confidential Business Information Tracking System, including who is covered in the system, the purpose of data collection, routine uses for the system's records, and other security procedures.

  8. Cooke and Wheatstone and the invention of the electric telegraph

    CERN Document Server

    Hubbard, Geoffrey

    2013-01-01

    Originally published in 1965. Charles Wheatstone collaborated with William Cooke in the invention and early exploitation of the Electric Telegraph. This was the first long distance, faster-than-a-horse messenger. This volume gives an account of the earlier work on which the English invention was founded, and the curious route by which it came to England. It discusses the way in which two such antagonistic men were driven into collaboration and sets out the history of the early telegraph lines, including work on the London and Birmingham Railway and the Great Western Railway.

  9. Reluctant genius Alexander Graham Bell and the passion for invention

    CERN Document Server

    Gray, Charlotte

    2011-01-01

    The popular image of Alexander Graham Bell is that of an elderly American patriarch, memorable only for his paunch, his Santa Claus beard, and the invention of the telephone. In this magisterial reassessment based on thorough new research, acclaimed biographer Charlotte Gray reveals Bell's wide-ranging passion for invention and delves into the private life that supported his genius. The child of a speech therapist and a deaf mother, and possessed of superbly acute hearing, Bell developed an early interest in sound. His understanding of how sound waves might relate to electrical waves enabled h

  10. 40 CFR 1601.26 - Special procedures for confidential business information.

    Science.gov (United States)

    2010-07-01

    ... described in paragraph (c) of this section, the CSB shall, to the extent permitted by law, afford a business... business information. 1601.26 Section 1601.26 Protection of Environment CHEMICAL SAFETY AND HAZARD... Requesting and Disclosing Records § 1601.26 Special procedures for confidential business information. (a) In...

  11. 42 CFR 3.206 - Confidentiality of patient safety work product.

    Science.gov (United States)

    2010-10-01

    ... 42 Public Health 1 2010-10-01 2010-10-01 false Confidentiality of patient safety work product. 3... individually identifiable health information in such patient safety work product, the direct identifiers listed at 45 CFR 164.514(e)(2) have been removed. (5) Disclosure of nonidentifiable patient safety work...

  12. 77 FR 12284 - Access to Confidential Business Information; Protection Strategies Incorporated

    Science.gov (United States)

    2012-02-29

    ... Business Information; Protection Strategies Incorporated AGENCY: Environmental Protection Agency (EPA). ACTION: Notice. SUMMARY: EPA has authorized its contractor, Protection Strategies Incorporated (PSI) of... Business Information (CBI). DATES: Access to the confidential data occurred on or about February 16, 2012...

  13. Half of Vermont Academic and Public Libraries Lack Written Confidentiality Policies Despite Directors’ Support for Principles of Patron Confidentiality. A Review of: Magi, Trina J., “The Gap between Theory and Practice: A Study of the Prevalence and Strength of Patron Confidentiality Policies in Public and Academic Libraries.” Library & Information Science Research 29 (2007: 455-70.

    Directory of Open Access Journals (Sweden)

    Stephanie Walker

    2008-09-01

    Full Text Available Objectives – To examine the prevalence and strength of patron confidentiality policies and practices at academic and public libraries in Vermont; to examine variances in policies by type and size of library and by qualifications of library directors; and to examine the level of support among Vermont library directors for strengthening state law to clarify that personally identifiable information about library patrons is confidential and should only be released with a court order.Design – Survey (non-randomized of 213 library directors.Setting – Academic and public libraries in Vermont (USA.Subjects – The initial audience was defined to be the directors of the 213 academic and public libraries in Vermont (as the persons to whom the survey was directed. Ultimately, results from 149 returned surveys were used as a basis for analysis. In addition, a written report of the information gathered was provided to the governing bodies of the Vermont Department of Libraries and the Vermont Library Association. The author also anticipates that the results of the survey will be of general interest to academic and public librarians.Methods – A literature review of previous research on library policies and practices regarding patron confidentiality was completed. As well, the author examined the various state and federal laws and library association codes of ethics which address issues of the confidentiality of library patron data. A paper questionnaire was mailed on January 11, 2006, to directors of 188 municipal and incorporated public libraries (including 11 combined public and school libraries and 25 college and university libraries, for a total of 213 libraries targeted. Cover letters explaining the purpose of the study and assuring respondents of the confidentiality of their responses were included in the mailing. The contact information came from a list supplied by the Vermont Department of Libraries. The questionnaire had previously been

  14. Confidentiality and its limits: some contributions from Christianity.

    Science.gov (United States)

    Torrance, I R

    2003-02-01

    The issue is whether Christianity, of its nature, would seek to prevent a justifiable breach of confidentiality or could endorse it, under certain circumstances, as the act which is fundamentally more loving or more truthful. The individualistic nature of Western Christianity is noted. The Lutheran theologian Dietrich Bonhoeffer is used to show Christian support for dynamic rather than literal truth telling, and for awareness of the contexts and power relations within which persons stand.

  15. Confidential conversations between supervisor and employee as a means for improving leadership: a quasi-experimental study in hospital wards.

    Science.gov (United States)

    Kivimäki, M

    1996-11-01

    Although yearly confidential conversations between a supervisor and an employee have been recommended as a means for improving leadership, evidence on the actual effects of these conversations has been lacking. The present study therefore investigated whether confidential conversations improve perceptions of goal clarity, sufficiency of feedback and innovativeness, and elicit satisfaction with the supervisor's leadership style within the hospital setting. Nine wards were divided into one experimental group (3 wards) and two control groups (3 + 3 wards). A questionnaire on goal clarity, feedback, innovativeness and satisfaction was administered twice to every group (1st measurement: r = 186, 2nd measurement: n = 163). The experimental group began confidential conversations after the first measurement, control group 1 entered into conversations during both measurements, and control group 2 did not enter into conversations at the time of either measurement. Confidential conversations improved perceived feedback. In both measurements, the sufficiency of feedback was reported to be significantly better in the groups having conversations than in the other groups. In addition, there was a significant positive change in the perceived sufficiency of feedback in the experimental group but not in the other groups. Confidential conversations did not affect the perceptions of goal clarity and innovativeness or elicit satisfaction with the supervisor's management style.

  16. Genetic privacy and confidentiality: why they are so hard to protect.

    Science.gov (United States)

    Rothstein, M A

    1998-01-01

    Author notes that widespread concerns have been raised about protecting genetic privacy and confidentiality in insurance and employment. He argues that effective protections are difficult because complicated issues, such as the right of access to health care, are invariably implicated.

  17. The Confidentiality of Medical Secrets of Patients by the Nursing Staff

    Directory of Open Access Journals (Sweden)

    Chalkias Theodoros

    2010-01-01

    Full Text Available In this article you will find a critical discussion about the significance of confidentiality of "medical secrets" (keeping the secrets of ill people by nurses. Special cases are mentioned regarding the need to keep, or reveal the secret.

  18. Inventing the Electronic University

    Science.gov (United States)

    Lewis, David W.

    2015-01-01

    Higher education is confronting a fundamental change. The transition from print on paper to digital and electronic technologies is transforming instruction, scholarly communication, and the storage and preservation of knowledge. What is required is not the automation of old systems, but the restructuring of institutions. The drive for autonomy,…

  19. The energy-related inventions program: Continuing benefits to the inventor community

    Energy Technology Data Exchange (ETDEWEB)

    Braid, R.B. Jr.; Brown, M.A.; Wilson, C.R.; Franchuk, C.A.; Rizy, C.G.

    1996-10-01

    This report provides information on the economic, energy, and environmental impacts of inventions supported by the Energy-Related Inventions Program (ERIP) - a technology commercialization program jointly operated by the U.S. Department of Energy (DOE) and the National Institute of Standards and Technology (NIST). It describes the results of the latest in a series of ERIP evaluation projects that have been completed since 1980. The period of interest is 1980 through 1994. The evaluation is based on data collected in 1995 through mail and telephone surveys of 211 program participants, and historical data collected during previous evaluations for an additional 253 participants. As of September 1993, a total of 609 inventions had been recommended to DOE by NIST, which screens all submitted inventions for technical merit, potential for commercial success, and potential energy impact. By the end of 1994, at least 144 (or 24%) of these inventions had entered the market, generating total cumulative sales of $961 million (in 19944). It is estimated that in 1994 ERIP inventors earned royalties of $2.3 million, and over the lifetime of the program, royalties total $28.2 million. With $47.5 million in grants awarded from 1975 through 1994 and $124 million in program appropriations over the same period, ERIP has generated a 20:1 return in terms of sales values to grants, and an 8:1 return in sales versus program appropriations. Further, it is estimated that at least 757 job-years of employment were supported by ERIP technologies in 1994, and that this resulted in a return of approximately $3.4 million in individual income taxes to the U.S. Treasury. Finally, approximately $334 million of energy expenditures were saved in 1994 as a result of the commercial success of five ERIP projects. These energy savings resulted in reduced emissions of 2.1 million metric tons of carbon in 1994 alone.

  20. 7 CFR 1150.184 - Patents, copyrights, inventions and publications.

    Science.gov (United States)

    2010-01-01

    ... MARKETING SERVICE (Marketing Agreements and Orders; Milk), DEPARTMENT OF AGRICULTURE DAIRY PROMOTION PROGRAM... the rental, sale, leasing, franchising, or other uses of such patents, copyrights, inventions, or...

  1. 7 CFR 1220.254 - Patents, copyrights, inventions, and publications.

    Science.gov (United States)

    2010-01-01

    ...) AGRICULTURAL MARKETING SERVICE (MARKETING AGREEMENTS AND ORDERS; MISCELLANEOUS COMMODITIES), DEPARTMENT OF..., franchising, or other uses of such patents, copyrights, inventions, or publications, inure to the benefit of...

  2. Invented spelling – a window on early literacy

    Directory of Open Access Journals (Sweden)

    Elżbieta Awramiuk

    2014-01-01

    Full Text Available A wide spectrum of research on preschool spelling development in different languages is presented. In Poland, children at kindergarten are usually at a stage of pre-literacy. Invented spelling means the writing produced by young children (aged 3–7 before they are formally taught reading and writing or are at the beginning of the learning process. Their writing is more spontaneous than learnt. The paper describes an investigation of the development of early literacy and factors influencing it, such as knowledge about orthography (spelling, early morphological awareness or teaching methods. Children’s early writing provides a window on their conceptualisation of the written language, illustrating the process of developing language awareness and spelling skills. Invented spelling, together with phonological abilities and letter knowledge is considered to be a strong predictor for later literacy skills.

  3. Patent Work: The Other Side of Invention

    Science.gov (United States)

    Dillon, Tamara

    2009-01-01

    In popular culture, the inventor is often portrayed as a lone tinkerer who emerges from a workshop with some magnificent new device. In reality, most inventions are the collaborative effort of scientists and engineers--usually researchers affiliated with a college or corporation--that result in the discovery, creation, or improvement of either…

  4. Payers' experiences with confidential pharmaceutical price discounts: A survey of public and statutory health systems in North America, Europe, and Australasia.

    Science.gov (United States)

    Morgan, Steven G; Vogler, Sabine; Wagner, Anita K

    2017-04-01

    Institutional payers for pharmaceuticals worldwide appear to be increasingly negotiating confidential discounts off of the official list price of pharmaceuticals purchased in the community setting. We conducted an anonymous survey about experiences with and attitudes toward confidential discounts on patented pharmaceuticals in a sample of high-income countries. Confidential price discounts are now common among the ten health systems that participated in our study, though some had only recently begun to use these pricing arrangements on a routine basis. Several health systems had used a wide variety of discounting schemes in the past two years. The most frequent discount received by participating health systems was between 20% and 29% of official list prices; however, six participants reported their health system received one or more discount over the past two years that was valued at 60% or more of the list prices. On average, participants reported that confidential discounts were more common, complex, and significant for specialty pharmaceuticals than for primary care pharmaceuticals. Participants had a more favorable view of the impact of confidential discount schemes on their health systems than on the global marketplace. Overall, the frequency, complexity, and scale of confidential discounts being routinely negotiated suggest that the list prices for medicines bear limited resemblance to what many institutional payers actually pay. Copyright © 2017 The Authors. Published by Elsevier B.V. All rights reserved.

  5. Pinyin and English Invented Spelling in Chinese-Speaking Students Who Speak English as a Second Language.

    Science.gov (United States)

    Ding, Yi; Liu, Ru-De; McBride, Catherine A; Fan, Chung-Hau; Xu, Le; Wang, Jia

    2018-05-07

    This study examined pinyin (the official phonetic system that transcribes the lexical tones and pronunciation of Chinese characters) invented spelling and English invented spelling in 72 Mandarin-speaking 6th graders who learned English as their second language. The pinyin invented spelling task measured segmental-level awareness including syllable and phoneme awareness, and suprasegmental-level awareness including lexical tones and tone sandhi in Chinese Mandarin. The English invented spelling task manipulated segmental-level awareness including syllable awareness and phoneme awareness, and suprasegmental-level awareness including word stress. This pinyin task outperformed a traditional phonological awareness task that only measured segmental-level awareness and may have optimal utility to measure unique phonological and linguistic features in Chinese reading. The pinyin invented spelling uniquely explained variance in Chinese conventional spelling and word reading in both languages. The English invented spelling uniquely explained variance in conventional spelling and word reading in both languages. Our findings appear to support the role of phonological activation in Chinese reading. Our experimental linguistic manipulations altered the phonological awareness item difficulties.

  6. 22 CFR 212.38 - Predisclosure notification procedures for confidential commercial information.

    Science.gov (United States)

    2010-04-01

    ... 22 Foreign Relations 1 2010-04-01 2010-04-01 false Predisclosure notification procedures for confidential commercial information. 212.38 Section 212.38 Foreign Relations AGENCY FOR INTERNATIONAL DEVELOPMENT PUBLIC INFORMATION Access to Agency Records § 212.38 Predisclosure notification procedures for...

  7. 18 CFR 385.606 - Confidentiality in dispute resolution proceedings (Rule 606).

    Science.gov (United States)

    2010-04-01

    ... be required to disclose, any information concerning any dispute resolution communication or any communication provided in confidence to the neutral, unless: (1) All participants in the dispute resolution... reducing the confidence of participants in future cases that their communications will remain confidential...

  8. 77 FR 31859 - Government-Owned Inventions; Availability for Licensing

    Science.gov (United States)

    2012-05-30

    ... inventions to extend market coverage for companies and may also be available for licensing. FOR FURTHER... three-dimensional segmentation approach for the quantitative interpretation of electron tomograms. IEEE...

  9. Deepening Learning through Learning-by-Inventing

    OpenAIRE

    Apiola, Mikko; Tedre, Matti

    2013-01-01

    It has been shown that deep approaches to learning, intrinsic motivation, and self-regulated learning have strong positive effects on learning. How those pedagogical theories can be integrated in computing curricula is, however, still lacking empirically grounded analyses. This study integrated, in a robotics-based programming class, a method of learning-by-inventing, and studied its qualitative effects on students’ learning through 144 interviews. Five findings were related with learning the...

  10. FORENSIC DNA BANKING LEGISLATION IN DEVELOPING COUNTRIES: PRIVACY AND CONFIDENTIALITY CONCERNS REGARDING A DRAFT FROM TURKISH LEGISLATION.

    Science.gov (United States)

    Ilgili, Önder; Arda, Berna

    This paper presents and analyses, in terms of privacy and confidentiality, the Turkish Draft Law on National DNA Database prepared in 2004, and concerning the use of DNA analysis for forensic objectives and identity verification in Turkey. After a short introduction including related concepts, we evaluate the draft law and provide articles about confidentiality. The evaluation reminded us of some important topics at international level for the developing countries. As a result, the need for sophisticated legislations about DNA databases, for solutions to issues related to the education of employees, and the technological dependency to other countries emerged as main challenges in terms of confidentiality for the developing countries. As seen in the Turkish Draft Law on National DNA Database, the protection of the fundamental rights and freedoms requires more care during the legislative efforts.

  11. Security, privacy, and confidentiality issues on the Internet

    OpenAIRE

    Kelly, Grant; McKenzie, Bruce

    2002-01-01

    We introduce the issues around protecting information about patients and related data sent via the Internet. We begin by reviewing three concepts necessary to any discussion about data security in a healthcare environment: privacy, confidentiality, and consent. We are giving some advice on how to protect local data. Authentication and privacy of e-mail via encryption is offered by Pretty Good Privacy (PGP) and Secure Multipurpose Internet Mail Extensions (S/MIME). The de facto Internet standa...

  12. CHARACTERISTICS OF UNIVERSITY SPIN-OFFS. THE ROMANIAN SITUATION

    Directory of Open Access Journals (Sweden)

    Nicolae BIBU

    2016-07-01

    Full Text Available Along the history the interest in entrepreneurship and small firms had an impact on the academic world. The option to create wealth, competitive advantage from the commercialization of research by valorization of the inventions, in what has historically been a non-commercial environment, raised new entrepreneurial challenges. University spin-offs bring researchers together, creating a context with the purpose of commercializing products. The objective of this article is to review the available literature on university spin-off and to present the situation of university-spin-offs, funded in Romania with EU grants, between 2007 and 2013.

  13. 76 FR 55069 - Government-Owned Inventions; Availability for Licensing

    Science.gov (United States)

    2011-09-06

    ... invention relates to an improved system for measuring bone mineral density (BMD). BMD measurement is an... vivo data available (animal) Inventors: Geraldo Kaplan (FDA), Krishnamurthy Konduru (FDA), et al...

  14. Tree Ordination as Invented Tradition

    Directory of Open Access Journals (Sweden)

    Avery Morrow

    2012-01-01

    Full Text Available The symbolic ordination of trees as monks in Thailand is widely perceived in Western scholarship to be proof of the power of Buddhism to spur ecological thought. However, a closer analysis of tree ordination demonstrates that it is not primarily about Buddhist teaching, but rather is an invented tradition based on the sanctity of Thai Buddhist symbols as well as those of spirit worship and the monarchy. Tree ordinations performed by non-Buddhist minorities in Thailand do not demonstrate a religious commitment but rather a political one.

  15. Using History to Teach Invention and Design: The Case of the Telephone

    Science.gov (United States)

    Gorman, Michael E.; Robinson, J. Kirby

    This paper shows how a historical case, the invention of the telephone, can be used to teach invention and design in a way that combines engineering, social sciences, and humanities. The historical problem of transmitting speech was turned into an active learning module, in which students sought to improve patents obtained by early telephone inventors like Alexander Graham Bell and Elisha Gray, using equipment similar to what was available at the time. The result was a collaborative learning environment in which students from a wide range of majors worked in teams, eventually producing a patent application. As part of the project, they were allowed to search historical materials like the Bell notebooks, which were made available on line. This experience gave them a better understanding of the invention and design process.

  16. 12 CFR 366.13 - What is my obligation regarding confidential information?

    Science.gov (United States)

    2010-01-01

    ... services on your behalf may use or disclose information obtained from us or a third party in connection... general public. (b) The following are examples of when your use of confidential information is... financial information, such as a financial statement to an unauthorized party. ...

  17. The mathematician's mind the psychology of invention in the mathematical field

    CERN Document Server

    Hadamard, Jacques

    1996-01-01

    Fifty years ago when Jacques Hadamard set out to explore how mathematicians invent new ideas, he considered the creative experiences of some of the greatest thinkers of his generation, such as George Polya, Claude Lévi-Strauss, and Albert Einstein. It appeared that inspiration could strike anytime, particularly after an individual had worked hard on a problem for days and then turned attention to another activity. In exploring this phenomenon, Hadamard produced one of the most famous and cogent cases for the existence of unconscious mental processes in mathematical invention and other forms of creativity. Written before the explosion of research in computers and cognitive science, his book, originally titled The Psychology of Invention in the Mathematical Field, remains an important tool for exploring the increasingly complex problem of mental life. The roots of creativity for Hadamard lie not in consciousness, but in the long unconscious work of incubation, and in the unconscious aesthetic selection of ide...

  18. Comparative Study of the Role of Institutions in Shaping Inventive Activity in Mid-Range Emerging Economies

    Directory of Open Access Journals (Sweden)

    Ervits Irina

    2016-12-01

    Full Text Available The objective of this paper is to investigate the effects of institutions on national rates of inventive activity. Invention, part of the innovation process, is acknowledged as one of the driving forces behind economic growth, and patent statistics are frequently used as a measurable indicator of inventive output. Thus this paper explores the relationship between national patent statistics and measures of institutional quality. As a result of our research, the effect of the “threshold of inventive activity” was observed. This effect demonstrates that when countries reach a certain level of institutional development and attain a general institutional climate conducive to inventive activity, the number of patent applications begins to sharply increase. The paper contributes to the body of evidence that confirms that a combination of fundamental institutions like the rule of law or freedom of expression, which are not necessarily aimed at boosting innovation, create an overall environment conducive to patenting. We demonstrate that “mid-range emerging economies”,2 including those in Central and Eastern Europe3 (CEE, where the quality of institutions is lagging behind more developed counterparts and/or their influence is weak or sporadic, have not yet reached the threshold of inventive activity yet. However, those CEE countries that have acceded to the European Union first have made visible progress with respect to institutional quality and invention.

  19. The needs analysis of learning Inventive Problem Solving for technical and vocational students

    Science.gov (United States)

    Sai'en, Shanty; Tze Kiong, Tee; Yunos, Jailani Md; Foong, Lee Ming; Heong, Yee Mei; Mohaffyza Mohamad, Mimi

    2017-08-01

    Malaysian Ministry of Education highlighted in their National Higher Education Strategic plan that higher education’s need to focus adopting 21st century skills in order to increase a graduate’s employability. Current research indicates that most graduate lack of problem solving skills to help them securing the job. Realising the important of this skill hence an alternative way suggested as an option for high institution’s student to solve their problem. This study was undertaken to measure the level of problem solving skills, identify the needs of learning inventive problem solving skills and the needs of developing an Inventive problem solving module. Using a questionnaire, the study sampled 132 students from Faculty of Technical and Vocational Education. Findings indicated that majority of the students fail to define what is an inventive problem and the root cause of a problem. They also unable to state the objectives and goal thus fail to solve the problem. As a result, the students agreed on the developing Inventive Problem Solving Module to assist them.

  20. 7 CFR 1160.505 - Patents, copyrights, inventions and publications.

    Science.gov (United States)

    2010-01-01

    ... funds collected under the provisions of this subpart are the property of the United States Government as... the rental, sale, leasing, franchising, or other uses of such patents, copyrights, inventions, or...

  1. 75 FR 56096 - Access to Confidential Business Information by Industrial Economics Incorporated

    Science.gov (United States)

    2010-09-15

    ... ENVIRONMENTAL PROTECTION AGENCY [EPA-HQ-OPPT-2003-0004; FRL-8845-1] Access to Confidential Business Information by Industrial Economics Incorporated AGENCY: Environmental Protection Agency (EPA). ACTION: Notice. SUMMARY: EPA has authorized contractor, Industrial Economics Incorporated (IEI) of...

  2. 45 CFR 60.15 - Confidentiality of National Practitioner Data Bank information.

    Science.gov (United States)

    2010-10-01

    ... 45 Public Welfare 1 2010-10-01 2010-10-01 false Confidentiality of National Practitioner Data Bank information. 60.15 Section 60.15 Public Welfare DEPARTMENT OF HEALTH AND HUMAN SERVICES GENERAL ADMINISTRATION NATIONAL PRACTITIONER DATA BANK FOR ADVERSE INFORMATION ON PHYSICIANS AND OTHER HEALTH CARE PRACTITIONERS...

  3. 19 CFR 201.19 - Notification regarding requests for confidential business information.

    Science.gov (United States)

    2010-04-01

    ... business information. 201.19 Section 201.19 Customs Duties UNITED STATES INTERNATIONAL TRADE COMMISSION GENERAL RULES OF GENERAL APPLICATION Availability of Information to the Public Pursuant to 5 U.S.C. 552 § 201.19 Notification regarding requests for confidential business information. (a) In general. Business...

  4. 75 FR 43992 - Government-Owned Inventions; Availability for Licensing

    Science.gov (United States)

    2010-07-27

    ... immune system may play an important role. This invention discloses that patients with AMD gain additional... of age related macular degeneration. This is in light of new findings that immune mechanisms appear...

  5. Medical students and personal smartphones in the clinical environment: the impact on confidentiality of personal health information and professionalism.

    Science.gov (United States)

    Tran, Kim; Morra, Dante; Lo, Vivian; Quan, Sherman D; Abrams, Howard; Wu, Robert C

    2014-05-22

    Smartphones are becoming ubiquitous in health care settings. The increased adoption of mobile technology such as smartphones may be attributed to their use as a point-of-care information source and to perceived improvements in clinical communication and efficiency. However, little is known about medical students' use of personal smartphones for clinical work. The intent of the study was to examine final-year medical students' experience with and attitudes toward using personal mobile technology in the clinical environment, with respect to the perceived impact on patient confidentiality and provider professionalism. Cross-sectional surveys were completed by final-year medical students at the University of Toronto. Respondents were asked about the type of personal mobile phone they use, security features on their personal phone, experiences using their personal phone during clinical rotations, and attitudes about using their personal phone for clinical work purposes. The overall response rate was 45.4% (99/218). Smartphone ownership was prevalent (98%, 97/99) with the majority (86%, 85/99) of participants using their personal phones for patient-related communication during clinical rotations. A total of 26% (26/99) of participants reported not having any type of security feature on their personal phone, 94% (90/96) of participants agreed that using their personal phone for clinical work makes them more efficient, and 86% (82/95) agreed that their personal phone allows them to provide better patient care. Although 68% (65/95) of participants believe that the use of personal phones for patient-related communication with colleagues poses a risk to the privacy and confidentiality of patient health information, 22% (21/96) of participants still use their personal phone to text or email identifiable patient data to colleagues. Our findings suggest that the use of personal smartphones for clinical work by medical students is prevalent. There is a need to more fully address

  6. Conversion of invisible metal-organic frameworks to luminescent perovskite nanocrystals for confidential information encryption and decryption.

    Science.gov (United States)

    Zhang, Congyang; Wang, Bo; Li, Wanbin; Huang, Shouqiang; Kong, Long; Li, Zhichun; Li, Liang

    2017-10-31

    Traditional smart fluorescent materials, which have been attracting increasing interest for security protection, are usually visible under either ambient or UV light, making them adverse to the potential application of confidential information protection. Herein, we report an approach to realize confidential information protection and storage based on the conversion of lead-based metal-organic frameworks (MOFs) to luminescent perovskite nanocrystals (NCs). Owing to the invisible and controlled printable characteristics of lead-based MOFs, confidential information can be recorded and encrypted by MOF patterns, which cannot be read through common decryption methods. Through our conversion strategy, highly luminescent perovskite NCs can be formed quickly and simply by using a halide salt trigger that reacts with the MOF, thus promoting effective information decryption. Finally, through polar solvents impregnation and halide salt conversion, the luminescence of the perovskite NCs can be quenched and recovered, leading to reversible on/off switching of the luminescence signal for multiple information encryption and decryption processes.

  7. 77 FR 46615 - Changes To Implement Miscellaneous Post Patent Provisions of the Leahy-Smith America Invents Act

    Science.gov (United States)

    2012-08-06

    ... the Leahy-Smith America Invents Act AGENCY: United States Patent and Trademark Office, Commerce. ACTION: Final rule. SUMMARY: The Leahy-Smith America Invents Act (AIA) expands the scope of information... instituted. Section 6(a) and (d) of the Leahy-Smith American Invents Act also contains provisions (35 U.S.C...

  8. 78 FR 38352 - Government-Owned Inventions; Availability for Licensing

    Science.gov (United States)

    2013-06-26

    ...). The invention rat is superior to AD mice models because the rat has a larger sized brain to.... Licensing Contact: Patrick McCue, Ph.D.; 301-435-5560; [email protected] . Collaborative Research...

  9. 7 CFR 1230.88 - Patents, copyrights, inventions, and publications.

    Science.gov (United States)

    2010-01-01

    ... provisions of this subpart shall be the property of the United States Government as represented by the Board..., leasing, franchising, or other uses of such patents, copyrights, inventions, or publications inure to the...

  10. 76 FR 59115 - Notice of Availability of Patent Fee Changes Under the Leahy-Smith America Invents Act

    Science.gov (United States)

    2011-09-23

    ... Availability of Patent Fee Changes Under the Leahy- Smith America Invents Act AGENCY: United States Patent and... of the Leahy-Smith America Invents Act (i.e., September 26, 2011) by operation of the fifteen percent... in effect sixty days after the date of enactment of the Leahy-Smith America Invents Act (i.e...

  11. 78 FR 54889 - Proposed Information Collection Request; Comment Request; Confidentiality Rules (Renewal)

    Science.gov (United States)

    2013-09-06

    ... received will be included in the public docket without change including any personal information provided, unless the comment includes profanity, threats, or information claimed to be Confidential Business... of appropriate automated electronic, mechanical, or other technological collection techniques or...

  12. The Psychological Competence of Police Officers in Confidential Cooperation with Citizens

    Science.gov (United States)

    Uspanov, Zholdybai T.; Turabayeva, Dana S.; Ermolovich, Vladimir F.

    2016-01-01

    This research studied the psychological aspects of citizens' assistance to law enforcement agencies on a confidential basis. The comprehensive observance of the psychological norms of cooperation is determined by the professional ethics of police officers, the necessity of nondisclosure of investigation secrets by citizens, and the security of the…

  13. The inventions in the area of nanotechnologies and nanomaterials. Part 1

    Directory of Open Access Journals (Sweden)

    VLASOV Vladimir Alexeevich

    2016-02-01

    Full Text Available The inventions in the area of nanotechnologies and nanomaterials produce a profound effect in construction, housing and communal services and adjacent economic fields. The invention «Raw material mixture for high strength fiber concrete (RU 2569140» refers to the industry of building materials and can be used for production of concrete units in civil, industrial and road construction including ones with the use of nanotechnologies. The technical result of the invention is that it increases bending and compressive strength, corrosion resistance of fiber concrete, decreases the consumption of silica-containing component introduced into raw material mixture to increase the corrosion resistance of the basalt fiber. The invention «The device to form nanostructured shape memory coatings on the surface of the hollow details (RU 2569871» refers to engineering and metallurgy. The device contains technological unit for ion purification of the surface of the treated detail by creating glow discharge in vacuum chamber. The source of metal ion implantation is installed at the frame of vacuum chamber and is connected with control block. On the lid of vacuum chamber there is a device round the upper end of the tube with the detail. The device is for surface plastic deformation of the applied coating to obtain nanostructured shape memory layer. All that increases strength characteristics, coating reliability as well as convertible deformation and wear resistance. The specialists may be also interested in the following nanotechnological inventions: the method to produce complex nanodispersed additive for high strength concrete (RU 2563264; the method to produce graphene nanocomposite and tungsten carbide (RU 2570691; the method of ultrasound final polishing for details from constructional and tool steels and the equipment for its implementation (RU 2530678; the method to produce nanodispersed powders and the equipment for its implementation (RU 2533580; the

  14. Keys to Taking Your Nanotech Inventions to the Market

    Science.gov (United States)

    Rickert, Scott

    Although many scientists and engineers may wish to be an owner of something they invented, and then take that something to the market, there are many obstacles to do so. Many of these roadblocks are self-imposed, and many more are there because most of us are not aware of the very strict rules that exist in the world of marketing, selling, and manufacturing in the United States. This lecture will identify a small subset of these obstacles and discuss some ways to overcome them. Belief in your goals is most important, and this belief must be shared by others, or you cannot succeed. Believe it or not, no one wants to steal your ideas or inventions. They would much rather have you take it to market yourself. This really is a lecture about winning.

  15. The invention and early history of the CCD

    International Nuclear Information System (INIS)

    Smith, George E.

    2009-01-01

    As the first practical solid-state imaging device, the invention of the Charge Coupled Device has profoundly affected image sensing technology. They are used in a wide range of applications as both area and linear imaging devices starting with the replacement of imaging tubes used in commercial TV cameras and camcorders. The rapid increase of their use in digital cameras has initiated the demise of film photography and created vast new markets with great economic benefit for many. Other uses include a wide variety of scientific, surveillance and scanning applications. The inception of the device at Bell Labs by Willard S. Boyle and George E. Smith in 1969 was strongly influenced by several unique factors existing both within Bell Labs and the current world state of technology. These factors and their relevance will be discussed along with the train of thought leading to the invention. Early experimental devices and their initial applications were vigorously pursued and will be described. Current applications will be mentioned.

  16. 76 FR 69722 - Access to Confidential Business Information by Protection Strategies Incorporated

    Science.gov (United States)

    2011-11-09

    ... Business Information by Protection Strategies Incorporated AGENCY: Environmental Protection Agency (EPA... Control Act (TSCA) confidential business information and to provide notice that this contract has been extended until December 31, 2011. Protection Strategies Incorporated (PSI) has been the owner of Eagle...

  17. 76 FR 72207 - Government-Owned Inventions; Availability for Licensing

    Science.gov (United States)

    2011-11-22

    ... Macular degeneration Diabetic retinopathy Retinal vein occlusion Competitive Advantages: Small sample... Vascular access devices Competitive Advantages: Non-degradable antimicrobial methods. Development Stage... DEPARTMENT OF HEALTH AND HUMAN SERVICES National Institutes of Health Government-Owned Inventions...

  18. Anonymous or confidential HIV counseling and voluntary testing in federally funded testing sites--United States, 1995-1997.

    Science.gov (United States)

    1999-06-25

    Human immunodeficiency virus (HIV) counseling and voluntary testing (CT) programs have been an important part of national HIV prevention efforts since the first HIV antibody tests became available in 1985. In 1995, these programs accounted for approximately 15% of annual HIV antibody testing in the United States, excluding testing for blood donation. CT opportunities are offered to persons at risk for HIV infection at approximately 11,000 sites, including dedicated HIV CT sites, sexually transmitted disease (STD) clinics, drug-treatment centers, hospitals, and prisons. In 39 states, testing can be obtained anonymously, where persons do not have to give their name to get tested. All states provide confidential testing (by name) and have confidentiality laws and regulations to protect this information. This report compares patterns of anonymous and confidential testing in all federally funded CT programs from 1995 through 1997 and documents the importance of both types of testing opportunities.

  19. Stay Rates of Foreign Doctorate Recipients from U.S. Universities, 2013

    Energy Technology Data Exchange (ETDEWEB)

    Finn, Michael G. [Oak Ridge Inst. for Science and Education (ORISE), Oak Ridge, TN (United States); Pennington, Leigh Ann [Oak Ridge Inst. for Science and Education (ORISE), Oak Ridge, TN (United States)

    2018-01-01

    This study estimates the stay rate of foreign nationals who receive doctorates in science and engineering from U.S. universities. Stay rates are estimated using tax records in a way that does not violate individual confidentiality. The 2013 stay rate for all foreign doctorate recipients, including those on permanent visas at graduation, was 70 percent for those graduating 5 years earlier, and 62 percent for those graduating 10 years earlier.

  20. Teachers' learning on the workshop of STS approach as a way of enhancing inventive thinking skills

    Science.gov (United States)

    Ngaewkoodrua, Nophakun; Yuenyong, Chokchai

    2018-01-01

    To improve science teachers to develop the STS lesson plans for enhancing the students' inventive thinking skills, the workshop of improving science teachers to develop the STS lesson plans for enhancing the Inventive thinking skills were organized. The paper aimed to clarify what teachers learn from the workshop. The goal of the activity of the workshop aimed to: 1) improve participants a better understanding of the relationship between the Inquiry based learning with STS approach, 2) understand the meaning and importance of the STS approach and identify the various stages of Yuenyong (2006) STS learning process, 3) discuss what they learned from the examples of Yuenyong (2006) lesson plan, 4) develop some activities for each stage of Yuenyong (2006) STS approach, and 5) ideas of providing STS approach activities for enhancing inventive thinking skills. Participants included 3 science teachers who work in Khon Kaen, Thailand. Methodology regarded interpretive paradigm. Teachers' learning about pedagogy of enhancing the students' inventive thinking skills will be interpreted through participant observation, teachers' tasks, and interview. The finding revealed that all participants could demonstrate their ideas how to generate the STS lesson plans as a way of enhancing inventive thinking skills. Teachers could mention some element of inventive thinking skills which could be generated on their STS learning activities.

  1. 75 FR 44270 - Government-Owned Inventions; Availability for Licensing

    Science.gov (United States)

    2010-07-28

    ... belongs to a group of disorders in which the immune system may play an important role. This invention... agents in the treatment of age related macular degeneration. This is in light of new findings that immune...

  2. Nanotechnologies and nanomaterials: review of inventions. Part 1

    Directory of Open Access Journals (Sweden)

    IVANOV Leonid Alexeevich

    2017-02-01

    Full Text Available The new technical solutions including inventions in the area of nanotechnology and nanomaterials are efficiently applied in communal and housing services as well as in construction and other joint fields. The invention «Protection system of urban housing and the method to build it (RU 2604933» refers to construction including environmental structures and can be used to protect cities, objects of national economy from destruction, floods and other types of natural and antropogenic disasters. Reinforcement of basements of city buildings is performed with barrels with fillers and flexible dampener-ties that receive natural and antropogenic impacts thus providing safety, including ecological one, for urban housing. The system is equipped with solar accumulators that supply energy to people in case of emergencies and additional monitoring system to inform people about emergencies. Storm discharge facilities protect cities and towns from floods. All that provides safety of inhabitants’ lives and functioning of enterprises when natural and antropogenic disasters such as floods, mud-and-stone flows and other types occur. The specialists may be also interested in the following nanotechnological inventions: the method to produce hardening mortar (RU 2601885, increase of durability of basalt fiber concrete by nanostructural additives, the method to treat surface and underground waters from titanium and its compounds by means of carbon nanotubes and ultrasound (RU 2575029, material on polymer basis for combined radio- and radiation protection (RU 2605696, thermoelectric heat pump with nanofilm semiconductor sides (RU 2595911, polymer composite nanomaterial (RU 2605590, the method to produce compositions from polymer and nanosize fillers (RU 2586979, the method to produce complex nanodispersed additive for highstrength concrete (RU 2563264 et al.

  3. 75 FR 44951 - Inquiry To Learn Whether Businesses Assert Business Confidentiality Claims

    Science.gov (United States)

    2010-07-30

    ... such treatment. Certain businesses, however, do not meet the definition of ``affected business,'' and... definition of ``affected business,'' and are not covered by today's notice. They consist of any business that... Businesses Assert Business Confidentiality Claims AGENCY: Environmental Protection Agency (EPA). ACTION...

  4. 76 FR 362 - Inquiry To Learn Whether Businesses Assert Business Confidentiality Claims

    Science.gov (United States)

    2011-01-04

    ... claims for such treatment. Certain businesses, however, do not meet the definition of ``affected business.... Certain businesses, however, do not meet the definition of ``affected business,'' and are not covered by... Businesses Assert Business Confidentiality Claims AGENCY: Environmental Protection Agency (EPA). ACTION...

  5. Scheduler-specific Confidentiality for Multi-Threaded Programs and Its Logic-Based Verification

    NARCIS (Netherlands)

    Huisman, Marieke; Ngo, Minh Tri

    2011-01-01

    Observational determinism has been proposed in the literature as a way to ensure confidentiality for multi-threaded programs. Intuitively, a program is observationally deterministic if the behavior of the public variables is deterministic, i.e., independent of the private variables and the

  6. 75 FR 55577 - Clean Water Act; Contractor Access to Confidential Business Information

    Science.gov (United States)

    2010-09-13

    ... ENVIRONMENTAL PROTECTION AGENCY [FRL-9200-8] Clean Water Act; Contractor Access to Confidential... Recovery Act (RCRA). Transfer of the information will allow the contractor and subcontractors to access... contractors and subcontractors over the history of the effluent guidelines program. EPA determined that this...

  7. 77 FR 60962 - Clean Water Act; Contractor Access to Confidential Business Information

    Science.gov (United States)

    2012-10-05

    ... ENVIRONMENTAL PROTECTION AGENCY 40 CFR Part 2 [FRL-9733-8] Clean Water Act; Contractor Access to... transfer of confidential business information to contractor, subcontractors, and consultants. SUMMARY: The... certain industries. We have determined that the contractors listed below require access [[Page 60963

  8. 75 FR 60452 - Clean Water Act; Contractor Access to Confidential Business Information

    Science.gov (United States)

    2010-09-30

    ... ENVIRONMENTAL PROTECTION AGENCY [FRL-9208-9] Clean Water Act; Contractor Access to Confidential... electric industry to a new subcontractor of a contractor, Eastern Research Group (ERG). EPA previously... contractors and subcontractors to access information necessary to support EPA in the planning, development...

  9. 75 FR 58401 - Government-Owned Inventions; Availability for Licensing

    Science.gov (United States)

    2010-09-24

    ..., attention deficit hyperactivity disorder (ADHD), and schizophrenia. Development of selective pharmacological... bipolar disorder, attention deficit disorder (ADD), and autism. Applications Method of diagnosis and... Disorders Description of Invention: The inventors have isolated and characterized an alkaloid, phantasmidine...

  10. 78 FR 21614 - Government-Owned Inventions; Availability for Licensing

    Science.gov (United States)

    2013-04-11

    ... useful in drug development. Competitive Advantages: The bioluminescent marker allows for effective...-related Macular Degeneration. Competitive Advantages: This technology is potentially a more sensitive... DEPARTMENT OF HEALTH AND HUMAN SERVICES National Institutes of Health Government-Owned Inventions...

  11. The story of global patent inventions

    International Nuclear Information System (INIS)

    Wang, Yeun Jung

    1996-11-01

    This book introduces the global patent inventions, which are soap floating on the water, computer, radar, zipper, fuel cell, a raincoat, a pencil, a ball point pen, vitamin, an ice saw, a subway, post it, endoscope, ultrasonic detector, machine to pierce the hall, hair-restorer, a refrigerator, tricycle tractor of Benz steam engine of watt, carburettor, aluminum smelting process, video game, ice cream freezer, lead powder, piling system, burner using infrared rays, small projector, blender for recycling of resource, and artificial silk.

  12. The story of global patent inventions

    Energy Technology Data Exchange (ETDEWEB)

    Wang, Yeun Jung

    1996-11-15

    This book introduces the global patent inventions, which are soap floating on the water, computer, radar, zipper, fuel cell, a raincoat, a pencil, a ball point pen, vitamin, an ice saw, a subway, post it, endoscope, ultrasonic detector, machine to pierce the hall, hair-restorer, a refrigerator, tricycle tractor of Benz steam engine of watt, carburettor, aluminum smelting process, video game, ice cream freezer, lead powder, piling system, burner using infrared rays, small projector, blender for recycling of resource, and artificial silk.

  13. Reflexivity and the Sociology of Science and Technology: The Invention of "Eryc" the Antibiotic

    Science.gov (United States)

    Collyer, Fran

    2011-01-01

    Until recently, the social-technical process of invention has fallen between sociological investigation of the genesis of a new idea (an ideational phenomenon) and the production of a new technology (a material phenomenon). The advent of post-modernism and post-structuralism offered new avenues for theorising invention, accounting for, on the one…

  14. 78 FR 29386 - Government-Owned Inventions, Available for Licensing

    Science.gov (United States)

    2013-05-20

    ... NATIONAL AERONAUTICS AND SPACE ADMINISTRATION [Notice (13-053)] Government-Owned Inventions, Available for Licensing AGENCY: National Aeronautics and Space Administration. ACTION: Notice of... N Channel JFET Based Digital Logic Gate Structure Using Resistive Level Shifters and Having Direct...

  15. 75 FR 58404 - Government-Owned Inventions; Availability for Licensing

    Science.gov (United States)

    2010-09-24

    ... the indicated licensing contact at the Office of Technology Transfer, National Institutes of Health... disorders (see above Description of Invention). Please contact NHGRI Technology Development Coordinator... for alcohol and drug addiction. Neuropsychiatric disorders including, for example, mood, anxiety...

  16. Contributory factors in surgical incidents as delineated by a confidential reporting system.

    Science.gov (United States)

    Mushtaq, F; O'Driscoll, C; Smith, Fct; Wilkins, D; Kapur, N; Lawton, R

    2018-05-01

    Background Confidential reporting systems play a key role in capturing information about adverse surgical events. However, the value of these systems is limited if the reports that are generated are not subjected to systematic analysis. The aim of this study was to provide the first systematic analysis of data from a novel surgical confidential reporting system to delineate contributory factors in surgical incidents and document lessons that can be learned. Methods One-hundred and forty-five patient safety incidents submitted to the UK Confidential Reporting System for Surgery over a 10-year period were analysed using an adapted version of the empirically-grounded Yorkshire Contributory Factors Framework. Results The most common factors identified as contributing to reported surgical incidents were cognitive limitations (30.09%), communication failures (16.11%) and a lack of adherence to established policies and procedures (8.81%). The analysis also revealed that adverse events were only rarely related to an isolated, single factor (20.71%) - with the majority of cases involving multiple contributory factors (79.29% of all cases had more than one contributory factor). Examination of active failures - those closest in time and space to the adverse event - pointed to frequent coupling with latent, systems-related contributory factors. Conclusions Specific patterns of errors often underlie surgical adverse events and may therefore be amenable to targeted intervention, including particular forms of training. The findings in this paper confirm the view that surgical errors tend to be multi-factorial in nature, which also necessitates a multi-disciplinary and system-wide approach to bringing about improvements.

  17. Quantum key based burst confidentiality in optical burst switched networks.

    Science.gov (United States)

    Balamurugan, A M; Sivasubramanian, A

    2014-01-01

    The optical burst switching (OBS) is an emergent result to the technology concern that could achieve a feasible network in future. They are endowed with the ability to meet the bandwidth requirement of those applications that require intensive bandwidth. There are more domains opening up in the OBS that evidently shows their advantages and their capability to face the future network traffic. However, the concept of OBS is still far from perfection facing issues in case of security threat. The transfer of optical switching paradigm to optical burst switching faces serious downfall in the fields of burst aggregation, routing, authentication, dispute resolution, and quality of service (QoS). This paper deals with employing RC4 (stream cipher) to encrypt and decrypt bursts thereby ensuring the confidentiality of the burst. Although the use of AES algorithm has already been proposed for the same issue, by contrasting the two algorithms under the parameters of burst encryption and decryption time, end-to-end delay, it was found that RC4 provided better results. This paper looks to provide a better solution for the confidentiality of the burst in OBS networks.

  18. Quantum Key Based Burst Confidentiality in Optical Burst Switched Networks

    Directory of Open Access Journals (Sweden)

    A. M. Balamurugan

    2014-01-01

    Full Text Available The optical burst switching (OBS is an emergent result to the technology concern that could achieve a feasible network in future. They are endowed with the ability to meet the bandwidth requirement of those applications that require intensive bandwidth. There are more domains opening up in the OBS that evidently shows their advantages and their capability to face the future network traffic. However, the concept of OBS is still far from perfection facing issues in case of security threat. The transfer of optical switching paradigm to optical burst switching faces serious downfall in the fields of burst aggregation, routing, authentication, dispute resolution, and quality of service (QoS. This paper deals with employing RC4 (stream cipher to encrypt and decrypt bursts thereby ensuring the confidentiality of the burst. Although the use of AES algorithm has already been proposed for the same issue, by contrasting the two algorithms under the parameters of burst encryption and decryption time, end-to-end delay, it was found that RC4 provided better results. This paper looks to provide a better solution for the confidentiality of the burst in OBS networks.

  19. A Systematic Review on Confidentiality, Disclosure, and Stigma in the United States: Lessons for HIV Care in Pregnancy From Reproductive Genetics.

    Science.gov (United States)

    Wilkinson, Barbara; Arora, Kavita Shah

    2015-01-01

    The fields of HIV care in pregnancy and reproductive genetics have always been 'exceptional' in that patients are highly concerned about the potential for stigma and the corresponding need for privacy and confidentiality. However, the two fields have diverged in how they have addressed these concerns. The systematic review analyzed 61 manuscripts for similarities and differences between the fields of HIV care in pregnancy and reproductive genetics in the United States, with respect to privacy, confidentiality, disclosure, and stigma. The systematic review revealed that the field of HIV care in pregnancy has insufficiently addressed patient concerns about privacy, confidentiality, and stigma compared to the field of reproductive genetics. Failure to adequately protect confidentiality of HIV-positive patients, and failure to reduce stigma associated with HIV testing and treatment are deficiencies in the delivery of care to HIV-positive pregnant woman and barriers to reducing vertical transmission of HIV. Improvements in care and policy should mirror the field of reproductive genetics.

  20. Gossip, stories and friendship: confidentiality in midwifery practice.

    Science.gov (United States)

    James, S

    1995-12-01

    Women often seek midwifery care as an alternative to the maternity services that are readily available within the insured health care system in Alberta. Some aspects of community-based, primary care midwifery in Alberta that characterize this alternative are the use of story-telling as a form of knowledge, the development of social connections among women seeking midwifery care, and nonauthoritarian relationships between midwives and women. In this paper, the concept of confidentiality, as it relates to these aspects of midwifery practice, is explored, using traditional, caring and feminist models of ethics.

  1. 78 FR 42527 - Government-Owned Inventions; Availability for Licensing

    Science.gov (United States)

    2013-07-16

    ... DEPARTMENT OF HEALTH AND HUMAN SERVICES National Institutes of Health Government-Owned Inventions... (allowing high- throughput production with limited screening) Higher efficiency cloning of baculovirus... for this technology. Related Technology: HHS Reference No. E-164-2011--Combinatorial Cloning Platform...

  2. 75 FR 4812 - Inquiry To Learn Whether Businesses Assert Business Confidentiality Claims

    Science.gov (United States)

    2010-01-29

    ..., however, do not meet the definition of ``affected business,'' and are not covered by today's notice. They.... Certain businesses, however, do not meet the definition of ``affected business,'' and are not covered by... Businesses Assert Business Confidentiality Claims AGENCY: Environmental Protection Agency (EPA). ACTION...

  3. 78 FR 79692 - Clean Water Act; Contractor Access to Confidential Business Information

    Science.gov (United States)

    2013-12-31

    ... ENVIRONMENTAL PROTECTION AGENCY [FRL-9904-94-OW] Clean Water Act; Contractor Access to... Transfer of Confidential Business Information to Contractor, Subcontractors, and Consultants. SUMMARY: The... contractors listed below require access to CBI submitted to EPA under Section 308 of the Clean Water Act (CWA...

  4. 5 CFR 213.3301 - Positions of a confidential or policy-determining nature.

    Science.gov (United States)

    2010-01-01

    ... 5 Administrative Personnel 1 2010-01-01 2010-01-01 false Positions of a confidential or policy-determining nature. 213.3301 Section 213.3301 Administrative Personnel OFFICE OF PERSONNEL MANAGEMENT CIVIL... or policy-determining nature. (a) Upon specific authorization by OPM, agencies may make appointments...

  5. Using and Disclosing Confidential Patient Information and The English Common Law: What are the Information Requirements of a Valid Consent?

    Science.gov (United States)

    Chico, Victoria; Taylor, Mark J

    2018-02-01

    The National Health Service in England and Wales is dependent upon the flow of confidential patient data. In the context of consent to the use of patient health data, insistence on the requirements of an 'informed' consent that are difficult to achieve will drive reliance on alternatives to consent. Here we argue that one can obtain a valid consent to the disclosure of confidential patient data, such that this disclosure would not amount to a breach of the common law duty of confidentiality, having provided less information than would typically be associated with an 'informed consent'. This position protects consent as a practicable legal basis for disclosure from debilitating uncertainty or impracticability and, perhaps counter-intuitively, promotes patient autonomy.

  6. A play´s libretto “Sami”. The invention of evil. A Halloween tale

    Directory of Open Access Journals (Sweden)

    Carlos Bernardo González León

    2010-11-01

    Full Text Available In an atmosphere of comedy, satire and play, we go through the most significant celestial event in the Western religious view on the myth of creation of the Universe, and the celestial battle between Luzbel who, out of pride, rebelled against God, desiring to be like him, and was expelled from heaven by the Archangel Michael as a punishment, along with the army of rebellious angels who were dragged by him (a group of innocent cherubim, being known from that time as the Fallen Angel: Bearer of Light; this is, the logos (who delivers the wisdom and the fire to men; but also becomes the supreme archetype of the Rebel, the first universal separatist and autonomist, for the sake of freedom and anarchy. And is in this polarisation of the medieval mind that appears what we know as evil: an invention of human culture. Here the classic characters of the Middle Ages are reinterpreted: God, the Death, demons, angels and cherubim, are mixed with classic Celtic spirits, fairies, witches, and Merlin, coinciding with the naturalistic and ecological spirit of the ";;new age” in a fun recreation of this ultimate contradiction.

  7. DLP: REDUCED RISK OF LEAKAGE OF CONFIDENTIAL INFORMATION OF THE BANK

    Directory of Open Access Journals (Sweden)

    T. A. Andryianava

    2017-01-01

    Full Text Available Research application of DLP-system for protection of confidential information, a methodology for adapting the DLP-system to the specific activities of the organization, comparative analysis of the results of standard and adapted DLP-systems in the Bank. Developed: a technique for analyzing information security events, algorithm for responding to identified events, methodology and procedures for adapting the standard DLP-system to the specifics of the Bank’s activities. The methodology for adapting a standard DLP-system to the specifics of the Bank’s work consists of the following activities: identification of critical corporate information categories, audit of information systems, description of current risks and their assessment, introduction of rules for Bank’s critical information and setting up a DLP system in accordance with the specifics of the Bank’s work. Modernization of the configuration of a standard DLP-system includes the following procedures: selection of confidential information of the Bank based on membership criteria, setting up detection, creating perimeters and developing an algorithm for responding to identified information security events in the Bank. The algorithm is designed to improve the efficiency of the response of information security officers in cases of incident detection and describes the stages of the subsequent actions. The results of the research prove that using an adapted DLP-system significantly reduces the number of false positives, increasing the accuracy of detecting confidential information and reducing the risk of leakage of critical information outside the corporate network. The application of the adapted DLP-system in the Bank allowed to increase the speed of response of information security specialists to the information security events detected by the DLP-system adapted to the Bank, and also allowed the DLP-system to transition from the copy mode to the blocking mode of illegitimate transfer

  8. 76 FR 49777 - Government-Owned Inventions; Availability for Licensing

    Science.gov (United States)

    2011-08-11

    ... repress cell activation targets. Immunotherapy, although an effective treatment strategy, sometimes fails... inventions to extend market coverage for companies and may also be available for licensing. ADDRESSES... Target Validation Laboratory, DCTD, NCI, NIH, is seeking statements of capability or interest from...

  9. 78 FR 29387 - Government-Owned Inventions, Available for Licensing

    Science.gov (United States)

    2013-05-20

    ... NATIONAL AERONAUTICS AND SPACE ADMINISTRATION [Notice (13-056)] Government-Owned Inventions, Available for Licensing AGENCY: National Aeronautics and Space Administration. ACTION: Notice of... Method; NASA Case No.: MSC-25265-1: Device and Method and for Digital-to-Analog Transformation and...

  10. 78 FR 16690 - Government-Owned Inventions; Availability for Licensing

    Science.gov (United States)

    2013-03-18

    ... Ionizing Radiation Description of Technology: The invention relates to methods of using ketogenic compounds to protect against the adverse effects of radiation exposure, including ionizing radiation tissue... therapeutic efficacy of radiation therapies by protecting non-target tissues from incidental radiation damage...

  11. Law on consent and confidentiality in India: a need for clarity.

    Science.gov (United States)

    Mathiharan, Karunakaran

    2014-01-01

    The concept of informed consent specific to medical research and treatment is still alien to many medical researchers and practitioners and to millions of Indians. The doctor-patient relationship in India is governed more by trust where the doctor is the authoritative person. Therefore, the benefit of informed consent does not reach all patients in day-to-day medical practice. To complicate the issue, the Indian law is not specific about the age at which a person can give valid consent. The Indian Penal Code is silent about the legal validity of consent given by persons between 12 and 18 years of age. Similarly, the age at which the 'Right to Confidentiality' begins is yet to be defined either by the statute or by the courts. Hence, there is a need for a clear statutory provision to remove the anomalies and ambiguities regarding the age of consent to undergo invasive therapeutic or investigative procedures, participate in clinical trials, as well as define the age at which a person's right to medical confidentiality begins.

  12. Confidentiality Concerns and Sexual and Reproductive Health Care Among Adolescents and Young Adults Aged 15-25.

    Science.gov (United States)

    Copen, Casey E; Dittus, Patricia J; Leichliter, Jami S

    2016-12-01

    Data from the National Survey of Family Growth •About 7% of persons aged 15-25 would not seek sexual or reproductive health care because of concerns that their parents might find out about it. •For females aged 15-17 and 18-25, those who had confidentiality concerns were less likely to receive sexual and reproductive health services in the past year compared with those without these concerns. •Less than one-half of teenagers aged 15-17 (38.1%) spent some time alone in the past year during a visit with a doctor or other health care provider without a parent, relative, or guardian in the room. •Teenagers aged 15-17 who spent some time alone during a visit with a health care provider were more likely to have received sexual or reproductive health services in the past year compared with those who had not. Confidentiality concerns can impact adolescent and young adults' access to sexual and reproductive health services (1-4). Young people who are covered by their parents' private health insurance may be deterred from obtaining these services due to concerns that their parents might find out about it (2). Similarly, confidentiality concerns may arise because youth seeking such services may not have time alone during a visit with a health care provider (4). This report describes two measures related to confidentiality concerns and sexual and reproductive health care. All material appearing in this report is in the public domain and may be reproduced or copied without permission; citation as to source, however, is appreciated.

  13. The Airplane as an Open-Source Invention

    OpenAIRE

    Peter B. Meyer

    2013-01-01

    Airplanes were invented after decades of experimentation in many countries through a process we can call open-source innovation. Experimenters, inventors, and writers contributed to the airplane’s development by sharing information in publications, in clubs, by writing letters and by visiting. The hundreds of aeronautical patents before 1900 were treated like publications, not like claims to intellectual property. Inventors of modern airplanes copied earlier designs, analogously to advances i...

  14. Pinyin Invented Spelling in Mandarin Chinese-Speaking Children With and Without Reading Difficulties.

    Science.gov (United States)

    Ding, Yi; Liu, Ru-De; McBride, Catherine; Zhang, Dake

    2015-01-01

    This study examined analytical pinyin (a phonological coding system for teaching pronunciation and lexical tones of Chinese characters) skills in 54 Mandarin-speaking fourth graders by using an invented spelling instrument that tapped into syllable awareness, phoneme awareness, lexical tones, and tone sandhi in Chinese. Pinyin invented spelling was significantly correlated with Chinese character recognition and Chinese phonological awareness (i.e., syllable deletion and phoneme deletion). In comparison to good and average readers, poor readers performed significantly worse on the invented spelling task, and a difference was also found between average and good readers. To differentiate readers at different levels, the pinyin invented spelling task, which examined both segmental and suprasegmental elements, was superior to the typical phonological awareness task, which examined segments only. Within this new task, items involving tone sandhi (Chinese language changes in which the tones of words alter according to predetermined rules) were more difficult to manipulate than were those without tone sandhi. The findings suggest that this newly developed task may be optimal for tapping unique phonological and linguistic features in reading of Chinese and examining particular tonal difficulties in struggling Chinese readers. In addition, the results suggest that phonics manipulations within tasks of phonological and tonal awareness can alter their difficulty levels. © Hammill Institute on Disabilities 2014.

  15. Assessing subject privacy and data confidentiality in an emerging region for clinical trials: United Arab Emirates.

    Science.gov (United States)

    Nair, Satish Chandrasekhar; Ibrahim, Halah

    2015-01-01

    Pharmaceutical sponsored clinical trials, formerly conducted predominantly in the United States and Europe, have expanded to emerging regions, including the Middle East. Our study explores factors influencing clinical trial privacy and confidentiality in the United Arab Emirates. Factors including concept familiarity, informed consent compliance, data access, and preservation, were analyzed to assess current practices in the Arab world. As the UAE is an emerging region for clinical trials, there is a growing need for regulations related to data confidentiality and subject privacy. Informational and decisional privacy should be viewed within the realms of Arab culture and religious background.

  16. 78 FR 78370 - Government-Owned Inventions; Availability for Licensing

    Science.gov (United States)

    2013-12-26

    ... have developed a research tool, a murine cell line model (JygMC(A)) with a reporter construct, of... marrow transplantation, stem cell therapy, tissue regeneration) Competitive Advantages: Labeling markers... federally-funded research and development. Foreign patent applications are filed on selected inventions to...

  17. Scottish and Slovak University Student Discussions about Stigmatized Persons: A Challenge for Education--Moving towards Democracy and Inclusion

    Science.gov (United States)

    Plichtová, Jana

    2013-01-01

    The paper compares discussions in 12 groups of university students (6 Slovak and 6 Scottish) equal in sex and age. The participants discussed the same problem--how to control the spread of HIV/AIDS and respect medical confidentiality (MC). Systematic comparisons revealed striking differences between the two national groups. The Scottish…

  18. 42 CFR 2.2 - Statutory authority for confidentiality of alcohol abuse patient records.

    Science.gov (United States)

    2010-10-01

    ... HUMAN SERVICES GENERAL PROVISIONS CONFIDENTIALITY OF ALCOHOL AND DRUG ABUSE PATIENT RECORDS Introduction.... (B) To qualified personnel for the purpose of conducting scientific research, management audits, financial audits, or program evaluation, but such personnel may not identify, directly or indirectly, any...

  19. Protecting the confidentiality and security of personal health information in low- and middle-income countries in the era of SDGs and Big Data

    Directory of Open Access Journals (Sweden)

    Eduard J. Beck

    2016-11-01

    success of programs like Universal Health Coverage, under the recently ratified Sustainable Development Goals is also contingent on the availability of personal health information for communicable and non-communicable diseases. Design: Guidance for countries to develop and implement their own guidelines for protecting HIV-information formed the basis of identifying a number of fundamental principles, governing the areas of privacy, confidentiality and security. The use of individual-level data must balance maximizing the benefits from their most effective and fullest use, and minimizing harm resulting from their malicious or inadvertent release. Discussion: These general principles are described in this paper, as along with a bibliography referring to more detailed technical information. A country assessment tool and user's manual, based on these principles, have been developed to support countries to assess the privacy, confidentiality, and security of personal health information at facility, data warehouse/repository, and national levels. The successful development and implementation of national guidance will require strong collaboration at local, regional, and national levels, and this is a pre-condition for the successful implementation of a range of national and global programs. Conclusion: This paper is a call for action for stakeholders in low- and middle-income countries to develop and implement such coherent policies and provides fundamental principles governing the areas of privacy, confidentiality, and security of personal health information being collected in low- and middle-income countries.

  20. Protecting the confidentiality and security of personal health information in low- and middle-income countries in the era of SDGs and Big Data.

    Science.gov (United States)

    Beck, Eduard J; Gill, Wayne; De Lay, Paul R

    2016-01-01

    Universal Health Coverage, under the recently ratified Sustainable Development Goals is also contingent on the availability of personal health information for communicable and non-communicable diseases. Guidance for countries to develop and implement their own guidelines for protecting HIV-information formed the basis of identifying a number of fundamental principles, governing the areas of privacy, confidentiality and security. The use of individual-level data must balance maximizing the benefits from their most effective and fullest use, and minimizing harm resulting from their malicious or inadvertent release. These general principles are described in this paper, as along with a bibliography referring to more detailed technical information. A country assessment tool and user's manual, based on these principles, have been developed to support countries to assess the privacy, confidentiality, and security of personal health information at facility, data warehouse/repository, and national levels. The successful development and implementation of national guidance will require strong collaboration at local, regional, and national levels, and this is a pre-condition for the successful implementation of a range of national and global programs. This paper is a call for action for stakeholders in low- and middle-income countries to develop and implement such coherent policies and provides fundamental principles governing the areas of privacy, confidentiality, and security of personal health information being collected in low- and middle-income countries.

  1. 78 FR 73549 - Government-Owned Inventions; Availability for Licensing

    Science.gov (United States)

    2013-12-06

    ... extend market coverage for companies and may also be available for licensing. FOR FURTHER INFORMATION... resistance due to the high sequence conservation of the target. More stable than thioesters. Development... makes this invention a novel and potential long-term therapeutic for restoration of exocrine gland...

  2. 7 CFR 1280.231 - Patents, copyrights, inventions, product formulations, and publications.

    Science.gov (United States)

    2010-01-01

    ... (Continued) AGRICULTURAL MARKETING SERVICE (MARKETING AGREEMENTS AND ORDERS; MISCELLANEOUS COMMODITIES... the rental, sale leasing, franchising, or other uses of such patents, copyrights, inventions, or...

  3. Spatial confidentiality and GIS: re-engineering mortality locations from published maps about Hurricane Katrina

    Directory of Open Access Journals (Sweden)

    Leitner Michael

    2006-10-01

    Full Text Available Abstract Background Geographic Information Systems (GIS can provide valuable insight into patterns of human activity. Online spatial display applications, such as Google Earth, can democratise this information by disseminating it to the general public. Although this is a generally positive advance for society, there is a legitimate concern involving the disclosure of confidential information through spatial display. Although guidelines exist for aggregated data, little has been written concerning the display of point level information. The concern is that a map containing points representing cases of cancer or an infectious disease, could be re-engineered back to identify an actual residence. This risk is investigated using point mortality locations from Hurricane Katrina re-engineered from a map published in the Baton Rouge Advocate newspaper, and a field team validating these residences using search and rescue building markings. Results We show that the residence of an individual, visualized as a generalized point covering approximately one and half city blocks on a map, can be re-engineered back to identify the actual house location, or at least a close neighbour, even if the map contains little spatial reference information. The degree of re-engineering success is also shown to depend on the urban characteristic of the neighborhood. Conclusion The results in this paper suggest a need to re-evaluate current guidelines for the display of point (address level data. Examples of other point maps displaying health data extracted from the academic literature are presented where a similar re-engineering approach might cause concern with respect to violating confidentiality. More research is also needed into the role urban structure plays in the accuracy of re-engineering. We suggest that health and spatial scientists should be proactive and suggest a series of point level spatial confidentiality guidelines before governmental decisions are made

  4. Spatial confidentiality and GIS: re-engineering mortality locations from published maps about Hurricane Katrina.

    Science.gov (United States)

    Curtis, Andrew J; Mills, Jacqueline W; Leitner, Michael

    2006-10-10

    Geographic Information Systems (GIS) can provide valuable insight into patterns of human activity. Online spatial display applications, such as Google Earth, can democratise this information by disseminating it to the general public. Although this is a generally positive advance for society, there is a legitimate concern involving the disclosure of confidential information through spatial display. Although guidelines exist for aggregated data, little has been written concerning the display of point level information. The concern is that a map containing points representing cases of cancer or an infectious disease, could be re-engineered back to identify an actual residence. This risk is investigated using point mortality locations from Hurricane Katrina re-engineered from a map published in the Baton Rouge Advocate newspaper, and a field team validating these residences using search and rescue building markings. We show that the residence of an individual, visualized as a generalized point covering approximately one and half city blocks on a map, can be re-engineered back to identify the actual house location, or at least a close neighbour, even if the map contains little spatial reference information. The degree of re-engineering success is also shown to depend on the urban characteristic of the neighborhood. The results in this paper suggest a need to re-evaluate current guidelines for the display of point (address level) data. Examples of other point maps displaying health data extracted from the academic literature are presented where a similar re-engineering approach might cause concern with respect to violating confidentiality. More research is also needed into the role urban structure plays in the accuracy of re-engineering. We suggest that health and spatial scientists should be proactive and suggest a series of point level spatial confidentiality guidelines before governmental decisions are made which may be reactionary toward the threat of revealing

  5. Patentability of inventions under the Nigeria's patents and designs act

    African Journals Online (AJOL)

    Patentability of inventions under the Nigeria's patents and designs act: an examination. ... AFRICAN JOURNALS ONLINE (AJOL) · Journals · Advanced Search · USING ... The Nigerian Patent Registry refuses patent applications for Software or ...

  6. Invention activities as preparation for learning laboratory data handling skills

    Science.gov (United States)

    Day, James

    2012-10-01

    Undergraduate physics laboratories are often driven by a mix of goals, and usually enough of them to cause cognitive overload for the student. Our recent findings align well with studies indicating that students often exit a physics lab without having properly learned how to handle real data. The value of having students explore the underlying structure of a problem before being able to solve it has been shown as an effective way to ready students for learning. Borrowing on findings from the fields of education and cognitive psychology, we use ``invention activities'' to precede direct instruction and bolster learning. In this talk I will show some of what we have learned about students' data handling skills, explain how an invention activity works, and share some observations of successful transfer.

  7. Combined model of 9x9 playfair and RSA for securing confidential ...

    African Journals Online (AJOL)

    Combined model of 9x9 playfair and RSA for securing confidential information. Y.B. Zakariyau, L.J. Muhammad, A.M. Usman, A Garba. Abstract. No Abstract. Keywords: Cryptography, RSA, Playfair Cipher, Public and Secret Key. Full Text: EMAIL FULL TEXT EMAIL FULL TEXT · DOWNLOAD FULL TEXT DOWNLOAD FULL ...

  8. Research Participants' Understanding of and Reactions to Certificates of Confidentiality.

    Science.gov (United States)

    Beskow, Laura M; Check, Devon K; Ammarell, Natalie

    2014-01-01

    Certificates of Confidentiality are intended to facilitate participation in critical public health research by protecting against forced disclosure of identifying data in legal proceedings, but little is known about the effect of Certificate descriptions in consent forms. To gain preliminary insights, we conducted qualitative interviews with 50 HIV-positive individuals in Durham, North Carolina to explore their subjective understanding of Certificate descriptions and whether their reactions differed based on receiving a standard versus simplified description. Most interviewees were neither reassured nor alarmed by Certificate information, and most said it would not influence their willingness to participate or provide truthful information. However, compared with those receiving the simplified description, more who read the standard description said it raised new concerns, that their likelihood of participating would be lower, and that they might be less forthcoming. Most interviewees said they found the Certificate description clear, but standard-group participants often found particular words and phrases confusing, while simplified-group participants more often questioned the information's substance. Valid informed consent requires comprehension and voluntariness. Our findings highlight the importance of developing consent descriptions of Certificates and other confidentiality protections that are simple and accurate. These qualitative results provide rich detail to inform a larger, quantitative study that would permit further rigorous comparisons.

  9. 78 FR 68161 - Greenhouse Gas Reporting Program: Final Amendments and Confidentiality Determinations for...

    Science.gov (United States)

    2013-11-13

    ... 98 Greenhouse Gas Reporting Program: Final Amendments and Confidentiality Determinations for...-HQ-OAR-2011-0028; FRL-9845-6] RIN 2060-AR61 Greenhouse Gas Reporting Program: Final Amendments and... monitoring methodologies for electronics manufacturers covered by the Greenhouse Gas Reporting Rule. These...

  10. 78 FR 37554 - Government-Owned Inventions; Availability for Licensing

    Science.gov (United States)

    2013-06-21

    ... generation of self-renewing cells with a high proliferative capacity. Induced pluripotent stem cells (iPS... invention relates to a method of using CD47-modulating compounds to induce multipotent stem cells without..., please contact Denise Crooks at [email protected] . Method of Inducing Pluripotent or Multipotent...

  11. 75 FR 12764 - Government-Owned Inventions; Availability for Licensing

    Science.gov (United States)

    2010-03-17

    ..., lung, mammarys and kidney cancers. These mouse models serve as vehicles to test the efficacy of new... inventions to extend market coverage for companies and may also be available for licensing. ADDRESSES... applications. Spontaneously Transformed Mouse Epithelial Cancer Cell Lines Serving as Mouse Models: A New Model...

  12. 77 FR 32642 - Patents and Inventions; Delegation of Authority

    Science.gov (United States)

    2012-06-01

    ... DEPARTMENT OF HEALTH AND HUMAN SERVICES Centers for Disease Control and Prevention Patents and... Prevention (CDC), the Deputy Director, DLPP, LSPPPO, OSELS, CDC, and the Chief, Technology Management Branch... regarding the invention and patent program of CDC and the authority to make determinations of rights in...

  13. 76 FR 40381 - Government-Owned Inventions; Availability for Licensing

    Science.gov (United States)

    2011-07-08

    ... inventions to extend market coverage for companies and may also be available for licensing. ADDRESSES... effective treatment option. EGFRvIII CARs can cross the blood-brain barrier, are expected to target only... squamous cell carcinomas. A personalized cancer treatment strategy for patients whose tumor cells express...

  14. 75 FR 21634 - Government-Owned Inventions; Availability for Licensing

    Science.gov (United States)

    2010-04-26

    ... interventional devices for delivery of drugs, cells, energy, or sutures through complex trajectories of the body... Ligands for Live Cell Imaging Description of Invention: Recently-developed protein tags enable the..., to fusion proteins containing these tags. For example, SNAP and CLIP tags bind O\\6\\-benzylguanine...

  15. 75 FR 26258 - Government-Owned Inventions; Availability for Licensing

    Science.gov (United States)

    2010-05-11

    ....gov for more information. Parvovirus B19 Codon Optimized Structural Proteins for Vaccine and Diagnostic Applications Description of Invention: Parvovirus B19 (B19V) is the only known pathogenic human parvovirus. Infection by this viral pathogen can cause transient aplastic crisis in individuals with high red...

  16. 12 CFR 261.20 - Confidential supervisory information made available to supervised financial institutions and...

    Science.gov (United States)

    2010-01-01

    ... available to supervised financial institutions and financial institution supervisory agencies. 261.20... Supervised Institutions, Financial Institution Supervisory Agencies, Law Enforcement Agencies, and Others in... institutions and financial institution supervisory agencies. (a) Disclosure of confidential supervisory...

  17. IVO`s CHP know-how: experience, inventions, patents

    Energy Technology Data Exchange (ETDEWEB)

    Aeijaelae, M.; Ohtonen, V. [ed.

    1997-11-01

    IVO can justly claim mastery in the co-generation of district heat and electricity - CHP. As well as looking at the issue from the viewpoint of planners, builders and operators, IVO`s engineers also view power plants through the eyes of the product developer and inventor. This approach has resulted in successful power plant configurations, inventions and patents and visions

  18. 37 CFR 1.475 - Unity of invention before the International Searching Authority, the International Preliminary...

    Science.gov (United States)

    2010-07-01

    ... general inventive concept (“requirement of unity of invention”). Where a group of inventions is claimed in... combinations of categories: (1) A product and a process specially adapted for the manufacture of said product; or (2) A product and a process of use of said product; or (3) A product, a process specially adapted...

  19. Assessing the Inventiveness of Bio-Pharmaceuticals under European and US Patent Law

    DEFF Research Database (Denmark)

    Minssen, Timo

    , is utterly wrong, since any DNA and the information it contains is the embodiment of the code of life and should be regarded part of the common heritage of mankind. Some patent opponents go even further and argue for a prohibition of patents on proteins. Others, and in particular the life science industry...... specifically, it investigates how the European and US patent systems interpret and apply the so called "inventive step" (Europe) or "non-obviousness" requirement (U.S.) vis-à-vis bio-pharmaceutical technology with a special emphasis on DNA-and protein related inventions. In addition to evaluating the de lata...

  20. The economic, energy, and environmental impacts of the Energy-Related Inventions Program

    International Nuclear Information System (INIS)

    Brown, M.A.; Wilson, C.R.; Franchuk, C.A.; Cohn, S.M.; Jones, D.

    1994-07-01

    This report provides information on the economic, energy, and environmental impacts of inventions supported by the Energy-Related Inventions Program (ERIP) -- a program jointly operated by the US Department of Energy and the National Institute of Standards and Technology (NIST). It describes the results of the latest in a series of ERIP evaluation projects that have been completed since 1980. The period of interest is 1980 through 1992. The evaluation is based on data collected in 1993 through mail and telephone surveys of 253 program participants, and historical data collected during previous evaluations for an additional 189 participants

  1. The economic, energy, and environmental impacts of the Energy-Related Inventions Program

    Energy Technology Data Exchange (ETDEWEB)

    Brown, M.A.; Wilson, C.R.; Franchuk, C.A.; Cohn, S.M.; Jones, D.

    1994-07-01

    This report provides information on the economic, energy, and environmental impacts of inventions supported by the Energy-Related Inventions Program (ERIP) -- a program jointly operated by the US Department of Energy and the National Institute of Standards and Technology (NIST). It describes the results of the latest in a series of ERIP evaluation projects that have been completed since 1980. The period of interest is 1980 through 1992. The evaluation is based on data collected in 1993 through mail and telephone surveys of 253 program participants, and historical data collected during previous evaluations for an additional 189 participants.

  2. 75 FR 39545 - Government-Owned Inventions; Availability for Licensing

    Science.gov (United States)

    2010-07-09

    ... Virus Recombinant HA Proteins for Vaccine and Diagnostic Applications Description of Invention: Pandemic... are specific recombinant HA proteins from H1N1, H5N1, and other strains of influenza virus produced in... H5N1 peptides useful for assays to detect antibodies generated [[Page 39546

  3. Increasing Access to Patented Inventions by Post-grant Measures

    DEFF Research Database (Denmark)

    Schovsbo, Jens Hemmingsen

    2009-01-01

    " and the so called "tragedy of the anticommons". Next the paper discusses the use of (some) post grant measure to increase access to patented inventions. Traditionally patent law has not paid much attention to such measures. The paper argues that developments suggest that there is good reason to reconsider...

  4. Invention and Transfer of Climate Change Mitigation Technologies on a Global Scale: A Study Drawing on Patent Data

    International Nuclear Information System (INIS)

    Dechezlepretre, A.; Glachant, M.; Hascic, I.; Johnstone, N.; Meniere, Y.

    2010-01-01

    This paper uses the EPO/OECD World Patent Statistical Database (PATSTAT) to provide a quantitative description of the geographic distribution of inventions in thirteen climate mitigation technologies since 1978 and their international diffusion on a global scale. Statistics suggest that innovation has mostly been driven by energy prices until 1990. Since then, environmental policies, and climate policies more recently, have accelerated the pace of innovation. Innovation is highly concentrated in three countries - Japan, Germany and the USA - which account for 60% of total innovations. Surprisingly, the innovation performance of emerging economies is far from being negligible as China and South Korea together represent about 15% of total inventions. However, they export much less inventions than industrialized countries, suggesting their inventions have less value. More generally, international transfers mostly occur between developed countries (73% of exported inventions). Exports from developed countries to emerging economies are still limited (22%) but are growing rapidly, especially to China. (authors)

  5. To Tell, or Not to Tell; Confidentiality in an Iranian HIV Positive Patient: A Viewpoint

    Directory of Open Access Journals (Sweden)

    Mahshad Noroozi

    2017-08-01

    Full Text Available Confidentiality is a basic concept in medical ethics and protecting confidentiality is considered as physicians’ duty. In some occasions, this protection is in conflict with the right of the patient’s sexual partner, who should be informed about the possibility of being infected. The sexual partner being pregnant, the situation is going to be more complicated. In this paper, we present a case discussion with special ethical, legal, social, cultural, and religious aspects. According to this informing sexual partner with the patient’s assent, opt-out Human immunodeficiency virus (HIV screening in pregnant women and enhancing psychosocial and family support are highly recommended. Strategic changes in health system policies and regulations seem to be necessary as well.

  6. 77 FR 48827 - Changes To Implement the Supplemental Examination Provisions of the Leahy-Smith America Invents...

    Science.gov (United States)

    2012-08-14

    ... Office 37 CFR Part 1 Changes To Implement the Supplemental Examination Provisions of the Leahy-Smith... Changes To Implement the Supplemental Examination Provisions of the Leahy-Smith America Invents Act and To... patent cases to implement the supplemental examination provisions of the Leahy-Smith America Invents Act...

  7. Metaphor and the Rhetorical Invention of Cold War "Idealists."

    Science.gov (United States)

    Ivie, Robert L.

    1987-01-01

    Presents a procedure for identifying metaphorical concepts guiding the rhetorical invention of three Cold War "idealists": Henry Wallace, J. William Fulbright, and Helen Caldicott, whose collective failure to dispel threatening images of the Soviets is located in a recurrent system of metaphors that promotes a reversal of the enemy-image…

  8. 75 FR 41501 - Government-Owned Inventions; Availability for Licensing

    Science.gov (United States)

    2010-07-16

    ... applications. A Transgenic Model of Human Basal Triple Negative Breast Cancer [C3(l)- tag mice] Description of Invention: Basal triple-negative breast cancer (TNBC) is a common form of human breast cancer for which..., causes a painful stimulation and incapacitates a person for only a brief period. This technology may...

  9. 76 FR 72713 - Government-Owned Inventions; Availability for Licensing

    Science.gov (United States)

    2011-11-25

    ...; Availability for Licensing AGENCY: National Institutes of Health, Public Health Service, HHS. ACTION: Notice... are thought to play a central role in this process. The subject invention is a novel method of... (CTLA4IgG) fusion protein to salivary glands. The system effectively blocks CTLA4 ligand interactions with...

  10. 78 FR 48692 - Government-Owned Inventions; Availability for Licensing

    Science.gov (United States)

    2013-08-09

    ... federally-funded research and development. Foreign patent applications are filed on selected inventions to... disrupts lipid homeostasis in liver. J Biol Chem. 2010 Apr 2;285(14):10880-9. [PMID 20097939]. Intellectual Property: HHS Reference No. E-465-2013/0--Research Tool. Patent protection is not being pursued for this...

  11. 76 FR 55070 - Government-Owned Inventions; Availability for Licensing

    Science.gov (United States)

    2011-09-06

    .... SUMMARY: The inventions listed below are owned by an agency of the U.S. Government and are available for..., 6011 Executive Boulevard, Suite 325, Rockville, Maryland 20852-3804; telephone: 301-496-7057; fax: 301... samples for anti- cancer immunotherapy by making use of gas permeable (GP) flasks. This advancement in...

  12. 75 FR 70010 - Government-Owned Inventions; Availability for Licensing

    Science.gov (United States)

    2010-11-16

    ... Appella (NCI), John K. Inman (NIAID), Deyun Wang (NIDDK), Lisa M. Miller Jenkins (NCI), Ryo Hayashi (NCI). Publications: 1. Miller Jenkins LM, et al. Nature Chemical Biology, in press. 2. Miller Jenkins LM, et al..., evaluate, or commercialize this invention. Please contact Dr. Henry Eden at [email protected] for more...

  13. 45 CFR 61.14 - Confidentiality of Healthcare Integrity and Protection Data Bank information.

    Science.gov (United States)

    2010-10-01

    ... 45 Public Welfare 1 2010-10-01 2010-10-01 false Confidentiality of Healthcare Integrity and Protection Data Bank information. 61.14 Section 61.14 Public Welfare DEPARTMENT OF HEALTH AND HUMAN SERVICES GENERAL ADMINISTRATION HEALTHCARE INTEGRITY AND PROTECTION DATA BANK FOR FINAL ADVERSE INFORMATION ON...

  14. 75 FR 46948 - Medicare Program; Listening Session Regarding Confidential Feedback Reports and the...

    Science.gov (United States)

    2010-08-04

    ...] Medicare Program; Listening Session Regarding Confidential Feedback Reports and the Implementation of a... Services (CMS), HHS. ACTION: Notice of meeting. SUMMARY: This notice announces a listening session being... modifier to the fee- for-service physician fee schedule. The purpose of the listening session is to solicit...

  15. 78 FR 69337 - Greenhouse Gas Reporting Program: Amendments and Confidentiality Determinations for Fluorinated...

    Science.gov (United States)

    2013-11-19

    ...-AR78 Greenhouse Gas Reporting Program: Amendments and Confidentiality Determinations for Fluorinated... Greenhouse Gas Reporting Rule. The proposed changes would reduce the level of detail in which emissions were..., please go to the Greenhouse Gas Reporting Rule Program Web site at http://www.epa.gov/climatechange...

  16. 76 FR 13135 - Intent To Grant an Exclusive License for a U.S. Government-Owned Invention

    Science.gov (United States)

    2011-03-10

    ... DEPARTMENT OF DEFENSE Department of the Army Intent To Grant an Exclusive License for a U.S. Government-Owned Invention AGENCY: Department of the Army, DoD. ACTION: Notice. SUMMARY: In accordance with... intent to grant an exclusive, revocable license for the invention claimed in the patent application PCT...

  17. Enhanced Obfuscation Technique for Data Confidentiality in Public Cloud Storage

    OpenAIRE

    Oli S. Arul; Arockiam L.

    2016-01-01

    With an advent of cloud computing, data storage has become a boon in information technology. At the same time, data storage in remote places have become important issues. Lot of techniques are available to ensure protection of data confidentiality. These techniques do not completely serve the purpose in protecting data. The Obfuscation techniques come to rescue for protecting data from malicious attacks. This paper proposes an obfuscation technique to encrypt the desired data type on the clou...

  18. 76 FR 63309 - Government-Owned Inventions; Availability for Licensing

    Science.gov (United States)

    2011-10-12

    ... applications, such as the characterization and study of glucocorticoid signaling in cancer, inflammation, and... is a need to track the spread of these viruses both in the animal and human populations to avert or.... SUMMARY: The inventions listed below are owned by an agency of the U.S. Government and are available for...

  19. 75 FR 12761 - Government-Owned Inventions; Availability for Licensing

    Science.gov (United States)

    2010-03-17

    ... inventions to extend market coverage for companies and may also be available for licensing. ADDRESSES..., ADP-ribosylated HNP-1 and other defensins are degraded rapidly in vivo due to the susceptibility of... at the level of approximately $6 billion a year and is expected to grow to $13 billion by the year...

  20. IMPROVING PATENT PROTECTION OF INVENTIVE ACTIVITY IN THE CONTEXT OF EU LEGISLATION

    Directory of Open Access Journals (Sweden)

    Nataliya Philyk

    2017-07-01

    Full Text Available Purpose: clarify legal nature of relations emerging in connection with registration of patent law objects. In this article the authors research special features of legal regulation of inventive activity. In particular, they consider several issues of patenting the patent law objects and clarify legal nature of relations arose during registration of the rights to the patent law objects. Methods: formal legal and case-study methods together with inductive reasoning, and comparison were used to analyse the legislation in the area of jurisdiction inventive activity Results: during the research the authors focus their attention to the drawbacks of the effective legislation and form the main directions of the effective legislation improvement in accordance with international law in the context of the patent law objects protection. Special attention is devoted to analysis of the main threats of the patent law violations and ways to overcome them. Conclusions: the results confirming improving the efficiency of the system of intellectual property protection through institutional changes and changes in the legal regulation of inventive activity and results will have a positive impact on the reform of the system of intellectual property protection in Ukraine.

  1. 75 FR 78238 - Access to Confidential Business Information by Science Applications International Corporation and...

    Science.gov (United States)

    2010-12-15

    ... Business Information by Science Applications International Corporation and Its Identified Subcontractors..., Science Applications International Corporation (SAIC) of San Diego, CA, and Its Identified Subcontractors... Control Act (TSCA). Some of the information may be claimed or determined to be Confidential Business...

  2. 77 FR 76028 - Access to Confidential Business Information by Science Applications International Corporation and...

    Science.gov (United States)

    2012-12-26

    ... Business Information by Science Applications International Corporation and Its Identified Subcontractor...: EPA has authorized its contractor, Science Applications International Corporation (SAIC) of McLean, VA... information may be claimed or determined to be Confidential Business Information (CBI). DATES: Access to the...

  3. 78 FR 66697 - Access to Confidential Business Information by Science Applications International Corporation and...

    Science.gov (United States)

    2013-11-06

    ... Business Information by Science Applications International Corporation and Its Identified Subcontractors..., Science Applications International Corporation (SAIC) of McLean, VA, and its subcontractors to access...). Some of the information may have been claimed or determined to be Confidential Business Information...

  4. Nobel physics prize to Charpak for inventing particle detectors

    International Nuclear Information System (INIS)

    Schwarzschild, B.

    1993-01-01

    This article describes the work of Georges Charpak of France leading to his receipt of the 1992 Nobel Prize in Physics. The Nobel Prize was awarded to Charpak open-quotes for his invention and development of particle detectors, in particular the multiwire proportional chamber.close quotes Historical aspects of Charpak's life and research are given

  5. 76 FR 77816 - Access to Confidential Business Information by Guident Technologies, Inc. and Subcontractor...

    Science.gov (United States)

    2011-12-14

    ... Business Information by Guident Technologies, Inc. and Subcontractor, Impact Innovations Systems, Inc..., Guident Technologies, Inc. of Herndon, VA and subcontractor, Impact Innovations Systems, Inc. of Manassas... Control Act (TSCA). Some of the information may be claimed or determined to be Confidential Business...

  6. 20 CFR 603.4 - What is the confidentiality requirement of Federal UC law?

    Science.gov (United States)

    2010-04-01

    ... 20 Employees' Benefits 3 2010-04-01 2010-04-01 false What is the confidentiality requirement of Federal UC law? 603.4 Section 603.4 Employees' Benefits EMPLOYMENT AND TRAINING ADMINISTRATION, DEPARTMENT....C. 502(a)), State law must include provision for such methods of administration as are found by the...

  7. 41 CFR 102-75.320 - Does appraisal information need to be kept confidential?

    Science.gov (United States)

    2010-07-01

    ... 41 Public Contracts and Property Management 3 2010-07-01 2010-07-01 false Does appraisal information need to be kept confidential? 102-75.320 Section 102-75.320 Public Contracts and Property Management Federal Property Management Regulations System (Continued) FEDERAL MANAGEMENT REGULATION REAL PROPERTY 75-REAL PROPERTY DISPOSAL Surplus Real...

  8. The theory of inventive problem solving integrated to the cleaner production: theoretical approach

    Directory of Open Access Journals (Sweden)

    Flávio Issao Kubota

    2013-03-01

    Full Text Available Efforts towards to reduction of environmental impact by enterprises are a solving problem process, which often need inventive solutions that generate environmental, technical and economic benefits. Hence, this research aimed to verify, through literature, and discuss the Theory of Inventive Problem Solving (TRIZ integration to cleaner production (CP strategies, in order to structure a new methodology for inventive solutions focused on reduction of effluents, waste and emissions. To perform this study, we proceeded a qualitative and descriptive research, with documentary data collection strategy. The results show predominance of CP level 1 researches, with greater focus on product improvement, a smaller quantity of process modification studies (level 1 and internal recycling (level 2, and no evidence of TRIZ utilization was obtained on level 3 (external recycling and biogenic cycles. The proposed integration is promising, since both methodologies aim ideal situation and problems’ reduction. At the end, opportunities were detected for application of TRIZ in production processes, by means of functional analysis and Ideal Final Result (IFR, being possible to direct teams towards optimization of technical systems.

  9. Industry-university collaborations in Canada, Japan, the UK and USA--with emphasis on publication freedom and managing the intellectual property lock-up problem.

    Science.gov (United States)

    Kneller, Robert; Mongeon, Marcel; Cope, Jeff; Garner, Cathy; Ternouth, Philip

    2014-01-01

    As industry-university collaborations are promoted to commercialize university research and foster economic growth, it is important to understand how companies benefit from these collaborations, and to ensure that resulting academic discoveries are developed for the benefit of all stakeholders: companies, universities and public. Lock up of inventions, and censoring of academic publications, should be avoided if feasible. This case-study analysis of interviews with 90 companies in Canada, Japan, the UK and USA assesses the scope of this challenge and suggests possible resolutions. The participating companies were asked to describe an important interaction with universities, and most described collaborative research. The most frequently cited tensions concerned intellectual property management and publication freedom. IP disagreements were most frequent in the context of narrowly-focused collaborations with American universities. However, in the case of exploratory research, companies accepted the IP management practices of US universities. It might make sense to let companies have an automatic exclusive license to IP from narrowly defined collaborations, but to encourage universities to manage inventions from exploratory collaborations to ensure development incentives. Although Canada, the UK and US have strong publication freedom guarantees, tensions over this issue arose frequently in focused collaborations, though were rare in exploratory collaborations. The UK Lambert Agreements give sponsors the option to control publications in return for paying the full economic cost of a project. This may offer a model for the other three countries. Uniquely among the four countries, Japan enables companies to control exclusively most collaborative inventions and to censor academic publications. Despite this high degree of control, the interviews suggest many companies do not develop university discoveries to their full potential. The steps suggested above may rebalance the

  10. Industry-university collaborations in Canada, Japan, the UK and USA--with emphasis on publication freedom and managing the intellectual property lock-up problem.

    Directory of Open Access Journals (Sweden)

    Robert Kneller

    Full Text Available As industry-university collaborations are promoted to commercialize university research and foster economic growth, it is important to understand how companies benefit from these collaborations, and to ensure that resulting academic discoveries are developed for the benefit of all stakeholders: companies, universities and public. Lock up of inventions, and censoring of academic publications, should be avoided if feasible. This case-study analysis of interviews with 90 companies in Canada, Japan, the UK and USA assesses the scope of this challenge and suggests possible resolutions. The participating companies were asked to describe an important interaction with universities, and most described collaborative research. The most frequently cited tensions concerned intellectual property management and publication freedom. IP disagreements were most frequent in the context of narrowly-focused collaborations with American universities. However, in the case of exploratory research, companies accepted the IP management practices of US universities. It might make sense to let companies have an automatic exclusive license to IP from narrowly defined collaborations, but to encourage universities to manage inventions from exploratory collaborations to ensure development incentives. Although Canada, the UK and US have strong publication freedom guarantees, tensions over this issue arose frequently in focused collaborations, though were rare in exploratory collaborations. The UK Lambert Agreements give sponsors the option to control publications in return for paying the full economic cost of a project. This may offer a model for the other three countries. Uniquely among the four countries, Japan enables companies to control exclusively most collaborative inventions and to censor academic publications. Despite this high degree of control, the interviews suggest many companies do not develop university discoveries to their full potential. The steps suggested

  11. Mothers' attitudes toward adolescent confidential services: development and validation of scales for use in English- and Spanish-speaking populations.

    Science.gov (United States)

    Tebb, Kathleen P; Pollack, Lance M; Millstein, Shana; Otero-Sabogal, Regina; Wibbelsman, Charles J

    2014-09-01

    To explore parental beliefs and attitudes about confidential services for their teenagers; and to develop an instrument to assess these beliefs and attitudes that could be used among English and Spanish speakers. The long-term goal is to use this research to better understand and evaluate interventions to improve parental knowledge and attitudes toward their adolescent's access and utilization of comprehensive confidential health services. The instrument was developed using an extensive literature review and theoretical framework followed by qualitative data from focus groups and in-depth interviews. It was then pilot tested with a random sample of English- and Spanish-speaking parents and further revised. The final instrument was administered to a random sample of 1,000 mothers. The psychometric properties of the instrument were assessed for Spanish and English speakers. The instrument consisted of 12 scales. Most Cronbach alphas were >.70 for Spanish and English speakers. Fewer items for Spanish speakers "loaded" for the Responsibility and Communication scales. Parental Control of Health Information failed for Spanish speakers. The Parental Attitudes of Adolescent Confidential Health Services Questionnaire (PAACS-Q) contains 12 scales and is a valid and reliable instrument to assess parental knowledge and attitudes toward confidential health services for adolescents among English speakers and all but one scale was applicable for Spanish speakers. More research is needed to understand key constructs with Spanish speakers. Copyright © 2014 Society for Adolescent Health and Medicine. Published by Elsevier Inc. All rights reserved.

  12. Contractual obligations and the sharing of confidential health information in sport.

    Science.gov (United States)

    Anderson, L

    2008-09-01

    As an employee, a sports doctor has obligations to their employer, but also professional and widely accepted obligations of a doctor to the patient (in this case the individual team member). The conflict is evident when sports doctors are asked by an athlete to keep personal health information confidential from the coach and team management, and yet both doctor and athlete have employment contracts specifying that such information shall be shared. Recent research in New Zealand shows that despite the presence of an employment contract, there appears to be a wide range of behaviours among sports doctors when an athlete requests that information about them be kept from team management. Many seem willing to honour requests to keep health information about the athlete confidential, thereby being in breach of the employment contract, while others insist on informing team management against the wishes of the athlete. There are a number of potential solutions to this dilemma from forcing doctors to meet their contractual obligations, to limiting the expectations of the employment contract. This paper suggests that at times it may be appropriate to do both, making the position of the doctor clearer and supporting the ability of this group to resist pressure by coaches and management through having a robust code of ethics.

  13. Designing of Success Criteria-based Evaluation Model for Assessing the Research Collaboration between University and Industry

    OpenAIRE

    Abeda Muhammad Iqbal; Adnan Shahid Khan; Saima Iqbal; Aslan Amat Senin

    2011-01-01

    Innovations and inventions are not outcomes of single activity of any organization. This is a resultof collaboration of different partners. Collaborated research of university and industry canenhance the ability of scientist to make significant advances in their fields. The evaluation ofcollaborated research between university and industry has created the greatest interest amongstthe collaborational researchers as it can determine the feasibility and value of thecollaboration. This paper inte...

  14. Girls & Young Women Inventing: Twenty True Stories about Inventors Plus How You Can Be One Yourself.

    Science.gov (United States)

    Karnes, Frances A.; Bean, Suzanne M.

    This book presents first-person accounts of 20 young female inventors. Most have won prizes for their inventions; some have even obtained patents. Part 1 "Inventors and Their Inventions," focuses on the young inventors and their lives, how they came up with their ideas, who helped them, what problems they faced, and how they solved their problems.…

  15. 75 FR 30779 - Notice of Jointly Owned Invention Available for Licensing

    Science.gov (United States)

    2010-06-02

    ... indicated below. The invention available for licensing is: [NIST DOCKET NUMBER: 10-004] Title: Gradient.... Gebbie, Director, Physics Laboratory. [FR Doc. 2010-13200 Filed 6-1-10; 8:45 am] BILLING CODE 3510-13-P ...

  16. Not invented here : managing corporate innovation in a new era

    NARCIS (Netherlands)

    Vrande, van de V.J.A.

    2007-01-01

    Not Invented here: Managing Corporate Innovation in a New Era External technology sourcing as a means to develop new businesses is taking a more central role in established companies. Acquiring new technologies from outside the firm which speeds up the innovation process and complements internal R&D

  17. EkSTEMiT Learning Module and Inculcation of Inventive Thinking

    Directory of Open Access Journals (Sweden)

    Norhaslinda Abdul Samad

    2017-10-01

    Full Text Available The young generation of today must be prepared with the knowledge and skills necessary to be able to compete globally thus boosting economic growth and prosperity. Therefore, students should not only be equipped with knowledge but they are in need of the “21st century skills”, which is the top priority and one of the main education agenda goals today. As one of the domains in the 21st century skills, inventive thinking includes elements of flexibility, self-regulation, curiosity, creativity, risk taking, higher order thinking and reasoning. In order to inculcate inventive thinking for students, the EkSTEMiT Learning Module was developed for the topic Electrochemistry; one of the most difficult topics to learn among students. EkSTEMiT Learning Module was developed based on the STEM (Science, Technology, Engineering and Mathematics integrated model. Thus, this paper will discuss the conceptual framework underlying the development of EkSTEMiT Learning Module with descriptions of learning activities designed for Electrochemistry.

  18. Entrepreneurship for Physicists; A practical guide to move inventions from university to market

    Science.gov (United States)

    Iannuzzi, Davide

    2017-10-01

    This book offers a concise analysis of the key ingredients that enable physicists to successfully move their idea from university to market, bringing added value to their customers. It dives into a set of theories, models, and tools that play fundamental roles in technology transfer including topics often neglected by other books including trust, communication, and persuasion. It also explains how most of the topics discussed are applicable to careers in a broader sense.

  19. Industry-University Collaborations in Canada, Japan, the UK and USA – With Emphasis on Publication Freedom and Managing the Intellectual Property Lock-Up Problem

    Science.gov (United States)

    Kneller, Robert; Mongeon, Marcel; Cope, Jeff; Garner, Cathy; Ternouth, Philip

    2014-01-01

    As industry-university collaborations are promoted to commercialize university research and foster economic growth, it is important to understand how companies benefit from these collaborations, and to ensure that resulting academic discoveries are developed for the benefit of all stakeholders: companies, universities and public. Lock up of inventions, and censoring of academic publications, should be avoided if feasible. This case-study analysis of interviews with 90 companies in Canada, Japan, the UK and USA assesses the scope of this challenge and suggests possible resolutions. The participating companies were asked to describe an important interaction with universities, and most described collaborative research. The most frequently cited tensions concerned intellectual property management and publication freedom. IP disagreements were most frequent in the context of narrowly-focused collaborations with American universities. However, in the case of exploratory research, companies accepted the IP management practices of US universities. It might make sense to let companies have an automatic exclusive license to IP from narrowly defined collaborations, but to encourage universities to manage inventions from exploratory collaborations to ensure development incentives. Although Canada, the UK and US have strong publication freedom guarantees, tensions over this issue arose frequently in focused collaborations, though were rare in exploratory collaborations. The UK Lambert Agreements give sponsors the option to control publications in return for paying the full economic cost of a project. This may offer a model for the other three countries. Uniquely among the four countries, Japan enables companies to control exclusively most collaborative inventions and to censor academic publications. Despite this high degree of control, the interviews suggest many companies do not develop university discoveries to their full potential. The steps suggested above may rebalance the

  20. Fourth Graders Make Inventions Using SCAMPER and Animal Adaptation Ideas

    Science.gov (United States)

    Hussain, Mahjabeen; Carignan, Anastasia

    2016-01-01

    This study explores to what extent the SCAMPER (Substitute, Combine, Adapt, Modify, Put to another use, Eliminate, and Rearrange) technique combined with animal adaptation ideas learned through form and function analogy activities can help fourth graders generate creative ideas while augmenting their inventiveness. The sample consisted of 24…