WorldWideScience

Sample records for university confidential invention

  1. Can Universities Profit from General Purpose Inventions?

    Barirani, Ahmad; Beaudry, Catherine; Agard, Bruno

    2017-01-01

    The lack of control over downstream assets can hinder universities’ ability to extract rents from their inventive activities. We explore this possibility by assessing the relationship between invention generality and renewal decisions for a sample of Canadian nanotechnology patents. Our results s...

  2. Commercialising university inventions for sustainability : A case study of (non-)intermediating 'cleantech' at Aalto University

    Kivimaa, Paula; Boon, Wouter; Antikainen, Riina

    2017-01-01

    The challenge to transform towards more sustainable societies requires action on multiple levels, including commercialisation of inventions created in universities. We examine intermediation in the pre-commercialisation phase of cleantech inventions developed at Aalto University, Finland, focusing

  3. The Invention Studio: A University Maker Space and Culture

    Forest, Craig R.; Moore, Roxanne A.; Jariwala, Amit S.; Fasse, Barbara Burks; Linsey, Julie; Newstetter, Wendy; Ngo, Peter; Quintero, Christopher

    2014-01-01

    Creativity, invention, and innovation are values championed as central pillars of engineering education. However, university environments that foster open-ended design-build projects are uncommon. Fabrication and prototyping spaces at universities are typically "machine shops" where students relinquish actual fabrication activities to…

  4. University Student Expectations of Confidentiality When Disclosing Information to Their Professors

    Harris, Gregory E.; Dalton, Stephanie

    2014-01-01

    The purpose of this study was to explore university students' expectations of confidentiality when they make disclosures to their university professors. A secondary purpose was to consider if students have a higher expectation of confidentiality when talking with Psychology professors versus professors in other disciplines. Students were asked to…

  5. Technological Innovation and Beyond: Exploring Public Value of University Inventions Based on Contingent Effectiveness Model

    Milana, Evita; Li-Ying, Jason; Faria, Lourenco

    2017-01-01

    University inventions are traditionally seen as significant input into development of new technologies and innovations in the market as they generate growth and regional development. (REF) Yet, these inventions developed into new technologies can simultaneously create public values such as those...... that are related with sustainability goals. In this paper, we apply the Contingent Effectiveness Model by Bozeman et.al. (2015) as a framework to consider the effectiveness of technology transfer from university to industry via licensing, and examine what values derive during the commercialization process...... of university inventions. We define four main values: technological, economic, social and environmental, and place the latter two under the concept of public value. The aim of this paper is to expand the understanding of public value and incorporate it into technology transfer literature. We assign...

  6. Weaving the universe is modern cosmology discovered or invented?

    Wesson, Paul S

    2011-01-01

    This new book is a thorough but short review of the history and present status of ideas in cosmology. It is aimed at a broad audience, but will contain a few equations where needed to make the argument exact. The coverage of cosmological ideas will focus mainly on the period from the early 1900s when Einstein formulated relativity and when his colleague Sir Arthur Eddington was creating relativistic models of the universe. It ends with the completion of the Large Hadron Collider in late 2008, having surveyed modern ideas of particle physics and astrophysics. To organize the large body of infor

  7. Pierre Sikivie from the University of Florida invented the working principle of all magnetic axion telescopes, such as CAST.

    Claudia Marcelloni

    2006-01-01

    The possible existence of axions in the universe means that they are a candidate for (very) cold dark matter, as another axion pioneer, Pierre Sikivie, from the University of Florida explained during the first Joint ILIAS-CAST-CERN Axion Training workshop. He also described the technique that he invented in 1983 for detecting axions. The idea is that axions in the galactic halo may be resonantly converted to microwave photons in a cavity permeated by a strong magnetic field.

  8. Invention/Re-invention

    Mera, M.

    2009-01-01

    This article examines the relationship between texts that are re-invented for different media and/or contexts including: film remakes, prequels and sequels, video games that become films and vice versa, internet mashups, and television series that move across geographical borders. The article points to significant sources in this emerging field and presents some of the challenges that arise in relation to its study. In particular questions of originality, fidelity, repetition and difference a...

  9. Invention class

    Wang, Yeon Jung

    1990-03-01

    This book gives descriptions of whole conception of patent, which includes invention and human, the way to invent, ten commandments of invention, 50 well-known inventions and inventors, conception of industrial property right system, measures on industrial property right practice, measures on industrial property right invasion, the best 10 patent dispute in history, the best 10 real patent cases in history, field of patent invention, inventions and supporting system of technical development ; supporting by the patent and trademark office and the commerce-industry ministry.

  10. Universities Report $1.8-Billion in Earnings on Inventions in 2011

    Blumenstyk, Goldie

    2012-01-01

    Universities and their inventors earned more than $1.8-billion from commercializing their academic research in the 2011 fiscal year, collecting royalties from new breeds of wheat, from a new drug for the treatment of HIV, and from longstanding arrangements over enduring products like Gatorade. Northwestern University earned the most of any…

  11. Entrepreneurship for Physicists; A practical guide to move inventions from university to market

    Iannuzzi, Davide

    2017-10-01

    This book offers a concise analysis of the key ingredients that enable physicists to successfully move their idea from university to market, bringing added value to their customers. It dives into a set of theories, models, and tools that play fundamental roles in technology transfer including topics often neglected by other books including trust, communication, and persuasion. It also explains how most of the topics discussed are applicable to careers in a broader sense.

  12. Inventing Problems for Technical Solutions – The Co-production of Universities, Skills and Engineering Challenges

    Juhl, Joakim; Buch, Anders

    institution building where business and management competencies are incorporated to engineering curricula. By comparing experiences from early career alumni from educations that are results of moving engineering institutions into business, we analyze the consequences imposed by changing disciplinary...... of innovation. In the recent two decades, universities and other engineering institutions that are typically identified with technology development have expanded their research and teaching activities towards the business end of innovation. Purpose This paper investigates the new emergent trend in academic...... demarcations within academic and professional engineering knowledges. Theoretical and methodological framework The paper draws upon theoretical frameworks from Practice Theory (e.g. as developed by Theodore Schatzki, Stephen Kemmis et al.), and co-production and sociotechnical imaginaries from Science...

  13. Inventing the Electronic University

    Lewis, David W.

    2015-01-01

    Higher education is confronting a fundamental change. The transition from print on paper to digital and electronic technologies is transforming instruction, scholarly communication, and the storage and preservation of knowledge. What is required is not the automation of old systems, but the restructuring of institutions. The drive for autonomy,…

  14. The "GeneTrustee": a universal identification system that ensures privacy and confidentiality for human genetic databases.

    Burnett, Leslie; Barlow-Stewart, Kris; Proos, Anné L; Aizenberg, Harry

    2003-05-01

    This article describes a generic model for access to samples and information in human genetic databases. The model utilises a "GeneTrustee", a third-party intermediary independent of the subjects and of the investigators or database custodians. The GeneTrustee model has been implemented successfully in various community genetics screening programs and has facilitated research access to genetic databases while protecting the privacy and confidentiality of research subjects. The GeneTrustee model could also be applied to various types of non-conventional genetic databases, including neonatal screening Guthrie card collections, and to forensic DNA samples.

  15. Inventing Freud.

    Rudnytsky, Peter L

    2008-06-01

    Written to commemorate the 150th anniversary of Freud's birth, this paper construes Nina Coltart's statement that "if Freud did not exist it would be necessary to invent him," with its implicit comparison of Freud to God, to refer to (a) the things that Freud taught that are incontrovertibly true; (b) the unavoidable subjectivity in all judgments of Freud; and (c) the resemblances between psychoanalysis and religion. This last comparison is likewise seen to have both positive and negative aspects. Freud's ideas have inspired many people, yet he unscientifically arrogated sovereign authority over psychoanalysis. Freud's admirers are reminded of his extreme difficulty in admitting he was wrong and changing his mind when he should have known better, while his detractors are encouraged to consider the evidence supporting many of Freud's core tenets and to recognize that his discovery of psychoanalysis is indeed one of the supreme achievements in human history.

  16. Confidential patent application with an example of preparation

    Obrad T. Čabarkapa

    2013-12-01

    Full Text Available In order that the invention solving a technical problem receives a patent protection, it is necessary to file a patent application. For the protection of confidential inventions which are important for defense and national security, a confidential patent application[1] must be filed. A confidential patent application is an important and complex document, the parts of which are,  in principle, exposed in an established order. For the preparation of patent applications, it is necessary to engage experts with higher education, primarily in the technical field the invention relates to. The contents of the patent application is a basis for examining whether the application meets the requirements for patentability and whether the right to patent protection is achieved. Besides theoretical discussions on patent application, the paper gives a short version of an example of an application regarding a protected confidential invention. Introduction The basic condition for the exercise of patent protection is filing a patent application, the test procedure and, eventually, depending on the test results - the recognition or rejection of the patent. The paper gives a description of all parts of the patent application on an example of a confidential invention already patented. The content of the confidential patent application The confidential patent application for confidential invention protection consists of the following parts: The application for a patent; description of the invention; the claims (indication of what is new and what is required to be protected by patenting; abstract (short summary of the invention  and a draft of the invention (to which the description and the claims are referred. The application for a patent The application for patent is filed on Form P-1 and a request for the petty patent on Form MP-1. The data entered in the file is, for example: the applicant; the lawyer; the name of the invention in Serbian and English; the inventor

  17. Confidentiality and personal integrity.

    Edgar, A

    1994-06-01

    This paper uses the social theory of Erving Goffman in order to argue that confidentiality should be understood in relation to the mundane social skills by which individuals present and respect specific self-images of themselves and others during social interaction. The breaching of confidentiality is analysed in terms of one person's capacity to embarrass another, and so to expose that person as incompetent. Respecting confidentiality may at once serve to protect the vulnerable from an unjust society, and yet also protect the guilty from just accusation. Ethical reasoning about confidentiality must therefore recognize the dangers of prejudice and violence inherent in decisions to breach or to respect confidentiality. Case studies are used to illustrate the efficacy of this account, culminating with analyses of three examples from the UKCC document Confidentiality.

  18. Inventors and Inventions.

    Dawson, Tom

    An 8-day unit introduces middle school students to American inventors and inventions. In separate lessons, students examine the patenting process, women inventors, minority inventors, Native American inventors, the airplane, Thomas Edison, and the impact of inventions on America's growth. A brief outline of daily lesson plans precedes a section of…

  19. The Invention Notebook Challenge

    Roman, Harry T.

    2018-01-01

    Like scientists who keep lab notebooks detailing their experiments, inventors keep invention notebooks that chronologically detail the inception, development, and refinement of their inventions. These notebooks are legal documents that can help prove one inventor's precedent over another. Scenarios like these are very real, as the author has had…

  20. Aristotle's "Rhetoric": Reinterpreting Invention.

    Quandahl, Ellen

    1986-01-01

    Shows that Aristotle's common topics are part of a theory of interpretation rather than a collection of devices for invention. Argues that it is more Aristotelian and more useful to understand composing as interpretation and not invention. Uses scholarship to inform pedagogy and to reorient composing toward acts of reading. (EL)

  1. Leisure Time Invention

    Davis, Lee N.; Davis, Jerome D.; Hoisl, Karin

    2013-01-01

    the employee is away from the workplace. We build on existing theory in the fields of organizational creativity and knowledge recombination, especially work relating context to creativity. The paper’s main theoretical contribution is to extend our understanding of the boundaries of employee creativity......This paper studies the contextual factors that influence whether invention occurs during work time or leisure time. Leisure time invention, a potentially important but thus far largely unexplored source of employee creativity, refers to invention where the main underlying idea occurs while...... by adding to the discussion of how access to and exploitation of different types of resources—during work hours or during leisure time — may affect creativity. Based on survey data from more than 3,000 inventions from German employee inventors, we find that leisure time inventions are more frequently...

  2. Humanisme : inventer l'avenir

    Mayor, Federico

    2014-06-01

    Humanism: inventing the future - Humanity is still confronted by the scourges of poverty, hunger, violence and inequality. If we are to invent a better future, we must first understand the past, recalling the missed opportunities of 1918, 1945 and 1989, at the end of two world wars and a cold war. This article summarises the proposals put forward by the author on several occasions during his career. He expresses a forceful confidence in humankind's ability to take control of its destiny and shake off government that puts economic interest before universal human values. The twenty-first century should be the era of rebellion in cyberspace, one in which more women and young people are involved in decision making, heralding a future of freedom and happiness for all.

  3. Confidentiality of Accounting Academics: Consequences of Nonconformity

    Amponsah, Emmanuel B.; Boateng, Peter Agyekum; Onuoha, Luke N.

    2016-01-01

    This paper examined ways by which nonconformity to confidentiality among accounting academics could lead to increased-recruitment-and-legal-costs to their employing universities in Ghana that offered accounting degree programmes. With a cross-sectional design, data collected from 1,225 accountants analysed via Cronbach's alpha,…

  4. Computer Security: Printing confidentially

    Stefan Lueders, Computer Security Team

    2015-01-01

    Have you ever hesitated to print a confidential document using CERN printers? Or perhaps you have rushed quickly to the printer after hitting the “print” button in order to avoid someone else getting hold of and reading your document? These times are over now with the new printing infrastructure!   Indeed, many of us regularly print out confidential documents like our salary slips, MARS forms, tendering documents and drafts of preliminary papers. The upcoming CERN data protection policy will require all of us to respect the confidentiality of such documents and, as the word “confidential” implies, access to “confidential” or sensitive documents will be tightly controlled. What can we do about the public printers located in many buildings, floors and shared spaces - accessible not only to CERN staff and users but also to visitors and guests? Some printers are located in the vicinity of restaurants, cafeterias or close to paths taken b...

  5. Science of invention patent

    Park, Yeong Taek; Park, Su Dong

    1999-02-01

    This book tells science of invention patent about new way of invention and creative solution for problems, basic conception of TRIZ, resolution of physical contradictory and technical contradictory, development of system and types of evolution, change of thinking for solving the problems, analysis of structure for problem solution, problem solution using scientific phenomenon and effect, use of standard solution and algorithm of creative problem solution.

  6. From Invention to Innovation

    Rorke, M.

    2000-07-18

    The Inventions and Innovation Program, formerly known as ERIP (Energy-related Inventions Program), was established by the U.S. Congress in 1974. The program offers assistance to independent inventors and very small businesses engaged in developing new energy-saving technologies. The program remains clearly focused on energy generation and savings. The I&I Program funding is based on a competitive proposal process.

  7. The Software Invention Cube: A classification scheme for software inventions

    Bergstra, J.A.; Klint, P.

    2008-01-01

    The patent system protects inventions. The requirement that a software invention should make ‘a technical contribution’ turns out to be untenable in practice and this raises the question, what constitutes an invention in the realm of software. The authors developed the Software Invention Cube

  8. Book Review: Inventing the Market: Smith, Hegel & Political Theory by Liza Herzog

    Boscan, Luis

    2014-01-01

    Review of: Inventing the Market: Smith, Hegel & Political Theory. Liza Herzog. Oxford University Press. April 2013.......Review of: Inventing the Market: Smith, Hegel & Political Theory. Liza Herzog. Oxford University Press. April 2013....

  9. L’invention instrumentale

    Jacques Dewitte

    2011-03-01

    Full Text Available L’instrument de musique n’a pas d’identité déterminée avant qu’il ne soit joué par un musicien concret, ou utilisé dans une œuvre singulière. Pour Stravinsky, l’instrument de musique « n’est rien en soi ». C’est l’œuvre, comme invention et création, qui donne à l’instrument son identité, sur la base de propriétés organologiques préexistantes. Les œuvres de Stravinsky pour petite formation illustrent cette idée d’une invention de l’instrument de musique par l’œuvre qu’il joue, ainsi que son amour pour des instruments nouveaux ou « nouveaux pour lui » (le cymbalum. L’invention instrumentale (qui n’est pas ici création d’un nouvel instrument consiste à faire sonner de manière neuve un instrument déjà existant. Cette invention suppose une « érotique » musicale, un amour spécifique pour les instruments et les altérités dont ils sont porteurs. Tout se passe alors comme si un a priori (une possibilité musicale enfouie dans l’instrumentA musical instrument has no specific identity until it is played by a concrete musician or used in a singular work. According to Stravinsky, a musical instrument is « nothing in itself ». Only a work, as a process of invention and creation, gives an instrument its identity on the basis of pre-existing organologic properties. Stravinsky’s works for small ensembles show how musical instruments may be invented by the work which they play, as well as the composer’s love for instruments that are new or “new for him” (such as the cymbalo. Musical invention (which does not mean here the creation of a new instrument consists in giving a new ring to an existing instrument. This kind of invention implies a notion of musical “eroticism”, that is a specific love for instruments and the otherness they may bear. Everything is happening as though an a priori quality (a musical possibility buried in the instrument appeared only a posteriori

  10. How can I invent?

    Wang, Yeon Jung

    2001-10-15

    This book gives descriptions of how to invent with various and useful tips. The contents of this book are set up the proper goal according to your condition, let's find the other use, change the order and put a replacement, search more convenience, have application of color characteristic, imitation is beginning of the invention, convert imitation into creation, look into the deserted idea, learn the basic science, catch the stream of times, try to study hard, have a big dream, change your way of thinking, develop the system, and throw away the stereotype.

  11. How can I invent?

    Wang, Yeon Jung

    2001-10-01

    This book gives descriptions of how to invent with various and useful tips. The contents of this book are set up the proper goal according to your condition, let's find the other use, change the order and put a replacement, search more convenience, have application of color characteristic, imitation is beginning of the invention, convert imitation into creation, look into the deserted idea, learn the basic science, catch the stream of times, try to study hard, have a big dream, change your way of thinking, develop the system, and throw away the stereotype.

  12. Invention note and patent note

    Chang, Sung Su

    1997-09-01

    This book deals with origin of invention and term related patent and invention, making idea, brain storming, 10 laws of invention skill, attitude of inventors, invention order, making good inventions, patent system, preparation of application, procedure and method of patent, management of patent, patent and trademark office, patent lawyer, copyright, new intellectual property right, industrial property right, trademark, invasion of industrial property right, patent, Judgment, preparation of items, application of industrial property right and effect of inventor and related people.

  13. Invention party of students 1

    Wang, Yeon Jung

    2000-02-01

    The contents of this book are story about making a mistake by friends, o dear! my mistake, shower and platform for crocks of sauces and condiments, good thing and bad thing when it appears, dream and invention of JuMok, failure is another discovery, a certain goal, idea in a life, addition and subtraction, a little hint is a great invention, question : why? This book gives advices and encouragement how to invent and what to invent to students.

  14. Ombuds’ corner: Confidentiality

    Vincent Vuillemin

    2011-01-01

    In this series, the Bulletin aims to explain the role of the Ombuds at CERN by presenting practical examples of misunderstandings that could have been resolved by the Ombuds if he had been contacted earlier. Please note that, in all the situations we present, the names are fictitious and used only to improve clarity.    Jane* came to the Ombuds to share her concerns about the actions of Mike*, one of her senior colleague supervisors, and insisted on the absolute confidentiality. The Ombuds promised to keep the information confidential following the terms of his mandate. During the discussion it appeared that the whole group was affected by the situation, spending a lot of time discussing how to resolve the problem instead of focusing on their main responsibilities. The risks for the Organization seemed very high and could possibly endanger the safety of the operations.  On one side, the Ombuds believed that it was essential to bring this matter to the attention of senior managem...

  15. Physician Knowledge and Attitudes around Confidential Care for Minor Patients.

    Riley, Margaret; Ahmed, Sana; Reed, Barbara D; Quint, Elisabeth H

    2015-08-01

    Minor adolescent patients have a legal right to access certain medical services confidentially without parental consent or notification. We sought to assess physicians' knowledge of these laws, attitudes around the provision of confidential care to minors, and barriers to providing confidential care. An anonymous online survey was sent to physicians in the Departments of Family Medicine, Internal Medicine-Pediatrics, Obstetrics/Gynecology, and Pediatrics at the University of Michigan. Response rate was 40% (259/650). The majority of physicians felt comfortable addressing sexual health, mental health, and substance use with adolescent patients. On average, physicians answered just over half of the legal knowledge questions correctly (mean 56.6% ± 16.7%). The majority of physicians approved of laws allowing minors to consent for confidential care (90.8% ± 1.7% approval), while substantially fewer (45.1% ± 4.5%) approved of laws allowing parental notification of this care at the physician's discretion. Most physicians agreed that assured access to confidential care should be a right for adolescents. After taking the survey most physicians (76.6%) felt they needed additional training on confidentiality laws. The provision of confidential care to minors was perceived to be most inhibited by insurance issues, parental concerns/relationships with the family, and issues with the electronic medical record. Physicians are comfortable discussing sensitive issues with adolescents and generally approve of minor consent laws, but lack knowledge about what services a minor can access confidentially. Further research is needed to assess best methods to educate physicians about minors' legal rights to confidential healthcare services. Copyright © 2015 North American Society for Pediatric and Adolescent Gynecology. Published by Elsevier Inc. All rights reserved.

  16. Not-Invented-Here

    Burcharth, Ana Luiza Lara de Araújo; Fosfuri, Andrea

    knowledge, the so-called Not-Invented-Here (NIH) syndrome. Drawing on multi-informant survey data of small and medium-sized Danish enterprises, the paper finds that socialization practices are an important driver of the NIH syndrome with such an effect being attenuated in technologically highly specialized......The management literature has highlighted several potential benefits of socialization practices within companies. By contrast, this paper posits that socialization practices, by fostering a higher degree of company identity, contribute to generate a greater reluctance to the adoption of external...

  17. I can invent

    Wang, Yeon Jung

    2001-10-15

    This book introduces the inventions which are unique and interesting. The titles of these are pots which boil very quick and safe, a desk with a pencil case, a scale which is not rusty, a book cover with a pocket, a skate with wax and mop, a seat belt airbag, a desk lamp which can control the light, a desk in the future, a recycling bin for cans, a blackboard eraser which erase very well, a useful crutches, swimming goggles attached convex lens, flower pots using waste tires, toilet paper holder with sawtooth, a brush which washes a flask, improved pump for petroleum.

  18. I can invent

    Wang, Yeon Jung

    2001-10-01

    This book introduces the inventions which are unique and interesting. The titles of these are pots which boil very quick and safe, a desk with a pencil case, a scale which is not rusty, a book cover with a pocket, a skate with wax and mop, a seat belt airbag, a desk lamp which can control the light, a desk in the future, a recycling bin for cans, a blackboard eraser which erase very well, a useful crutches, swimming goggles attached convex lens, flower pots using waste tires, toilet paper holder with sawtooth, a brush which washes a flask, improved pump for petroleum.

  19. Secret of success for invention technology

    Kim, Gwan Hyeong

    1990-12-01

    This book deals with importance, meaning, history of invention technology, technique of invention technology, and invention in connection with the duties. It covers importance, meaning, flow of invention technology development, basis of invention technology development, development, development investment, development workforce of invention technology, and development of invention technology introduction. It also contains outline, research, management of technology development information, outline, research, management of patent information, and reality of invention technology research development.

  20. Protecting confidentiality rights: the need for an ethical practice model.

    Fisher, Mary Alice

    2008-01-01

    All psychologists must uphold the same ethical standards about confidentiality even though each state imposes different legal limits on their ability to protect clients' confidences. The resulting ethical-legal confusion is exacerbated by legally based confidentiality training that treats legal exceptions as if they were the rule and fosters the impression that attorneys are now the only real experts about this aspect of practice. This article provides an ethics-based confidentiality practice model that clarifies the ethical rule and puts its legal exceptions into ethical perspective. Like the Confidentiality section of the American Psychological Association's (2002) Ethical Principles of Psychologists and Code of Conduct, this outline would apply to all psychologists regardless of state laws, but the details of its implementation would vary according to role and setting. It can be used as a universal training outline, a consultation and supervision tool, a guide to professional practice, and a basis for clearer ongoing conversation about the ethics of "conditional confidentiality." Psychologists can use this practice model to regain their status as experts about the confidentiality ethics of their own profession. PsycINFO Database Record (c) 2008 APA, all rights reserved.

  1. Confidential Business Information under TSCA

    This website informs businesses, policymakers, and the public about the confidential business information (CBI) provisions of § 14 of the Toxic Substances Control Act (TSCA), as amended by the Frank R. Lautenberg Chemical Safety for the 21st Century Act.

  2. SCHOOL ECONOMY IN THE INVENTING EDUCATION PARADIGM

    Anatoliy Alexandrovich Lepeshev

    2018-01-01

    Full Text Available Requirements applied to specialists for working in the sixth wave of innovation, i.e. Industry 4.0, determines the necessity of education system improvement concerning training solution and, as a result, creation of inventive ideas. Today in our country this process is stimulated by various competitions, including financing for the implementation of results. In training programs knowledge approach still prevails. The corresponding methods, along with stimulation, are included into educational programs in leading foreign educational institutions, mostly at universities. If in previous decades mostly divergent methods were studied (morphological analysis, the focal objects method, synectics, etc., then now the leading place is taken by theory of inventive problem solving – TRIZ created in the former USSR by G.S. Altshuller in connection with the increasing leading corporations requirement for specialists in TRIZ. This fact gives Russia essential competitive advantages in the innovative way of development. For effective use of this advantage it is important to form the TRIZ-based innovative thinking beginning from school days. For this purpose authors developed new methods in TRIZ-pedagogics, uniting metasubject results (in higher education institutions – competences into the system of innovative thinking. As a result, both educational and economic effects are achieved: the intellectual property created in educational process. For schools it is the possibility of significant improvement of financing causing importance of new mechanisms of intellectual property fixation, protection and implementation. Recommendations about creation of such system are provided in the article. Purpose Defining the opportunities and ways of improving economic effectiveness of educational activities in the paradigm of inventive education. Tasks: – analysis of school education institutions experience in implementation of approaches preceding the inventing education

  3. Review of The Invention of Enterprise

    Michael E. Marotta

    2011-05-01

    Full Text Available The Invention of Enterprise: Entrepreneurship from Ancient Mesopotamia to Modern Times, David S. Landes, Joel Mokyr, and William J. Baumol, eds., Princeton University Press, 2010, is a dense anthology that provides an “orbital view” of the history of trade and commerce. The essays encompass several theoretic frameworks while following three themes: the creation of enterprises; the distinctions between creative and corrosive capitalism; and the societies that engender those different modes.

  4. Fuel on the Invention Funnel

    Leone, Maria Isabella; Reichstein, Toke; Boccardelli, Paolo

    In this paper, we examine the impact of technology licensing-in on firm invention performance. Studying a sample of 266 licensees and matched non-licensees using a two-part model specification, we find that licensees are more likely to introduce inventions than their non-licensee counterparts. Th...

  5. Confidentiality and integrity in crowdsourcing systems

    Ranj Bar, Amin

    2014-01-01

    Confidentiality and Integrity in Crowdsourcing Systems focuses on identity, privacy, and security related issues in crowdsourcing systems and in particular the confidentiality and integrity of online data created via crowdsourcing. This book begins with an introduction to crowdsourcing and then covers the privacy and security challenges of Confidentiality. The book examines integrity in these systems and the management and control of crowdsourcing systems.

  6. Invention through Form and Function Analogy

    Rule, Audrey C.

    2015-01-01

    "Invention through Form and Function Analogy" is an invention book for teachers and other leaders working with youth who are involving students in the invention process. The book consists of an introduction and set of nine learning cycle formatted lessons for teaching the principles of invention through the science and engineering design…

  7. Overcome IMF crisis with idea and invention

    Wang, Yeon Jung

    1998-01-01

    This book introduces the invention as a tool to overcome IMF crisis. These are the titles of the way to create invention and idea : what is idea? everyone can create something, have a confidence, this is patent, replace or change something, invention is not logical, challenge the normal law, throw away stereotype, movement of idea, original imagination, there are a lot of solutions, there is no expert, have a positive thought, why does inventor invent? necessity is invention of mother, three stage of idea and invention and imitation for invention.

  8. Overcome IMF crisis with idea and invention

    Wang, Yeon Jung

    1998-01-15

    This book introduces the invention as a tool to overcome IMF crisis. These are the titles of the way to create invention and idea : what is idea? everyone can create something, have a confidence, this is patent, replace or change something, invention is not logical, challenge the normal law, throw away stereotype, movement of idea, original imagination, there are a lot of solutions, there is no expert, have a positive thought, why does inventor invent? necessity is invention of mother, three stage of idea and invention and imitation for invention.

  9. How easy the invention is

    Wang, Yeon Jung

    2002-05-15

    This book deals with the inventions invented by kids such as a utility helmet, a useful drawing board, automatic safe device, telephone for the blind, a peaceful washboard, roly poly milk bottle, seat belt with height control, gas hose to prevent thief, portable magic soap, useful bus handle, convent desk, a paper cup attached a spoon, a useful washboard, dressing room using moveable small cymbals, fluorescent light which is easy to put in a new one, rods for night, curtain for cars, spray shampoo, and a good calendar.

  10. How easy the invention is

    Wang, Yeon Jung

    2002-05-01

    This book deals with the inventions invented by kids such as a utility helmet, a useful drawing board, automatic safe device, telephone for the blind, a peaceful washboard, roly poly milk bottle, seat belt with height control, gas hose to prevent thief, portable magic soap, useful bus handle, convent desk, a paper cup attached a spoon, a useful washboard, dressing room using moveable small cymbals, fluorescent light which is easy to put in a new one, rods for night, curtain for cars, spray shampoo, and a good calendar.

  11. Invention party of students 2

    Wang, Yeon Jung

    2000-02-01

    The contents of this book are lettuce and royal foxglove tree leaves, memory of summer sea, summer vacation of a freak, waste tires and a fishbowl, a spoon and a iron hand, a iron hand and emergency signal light, my friend is Macgyver, a merry cleaning time, Hojin's invention diary. I am a inventor, a happy winter vacation, the best from losing the draw. This book gives a descriptions of the cases of inventions which are made up through unique and brilliant idea.

  12. Confidentiality and the employee assistance program professional.

    Mistretta, E F; Inlow, L B

    1991-02-01

    During the last two decades EAPs have offered employees confidential assessment, counseling, and referral. Many occupational health nurses have taken on the role of EAP professional or function as the liaison between the EAP counselor and the employee. The occupational health nurse involved in any EAP issue must adhere to the standards of confidentiality. The federal and state laws, company policy, and professional codes of ethics regarding these clients must be clearly understood, especially related to the issue of confidentiality.

  13. Inventions and developments of democracy

    Jakobsen, Uffe

    2010-01-01

    In traditional approaches to the history of political ideas, the history of democracy is uniformly studied concerning the point of departure, selection of canonical texts, etc. The paper introduces the Koselleckian conceptual history approach (Begriffsgeschichte) and the principle of a broader...... selection of texts than in the traditional history of ideas to provide a fuller account of usages of the concept, thereby opening up for alternative conceptions of the inventions and development of democracy....

  14. Was the Monetarist Tradition Invented?

    George S. Tavlas

    1998-01-01

    In 1969, Harry Johnson charged that Milton Friedman 'invented' a Chicago oral quantity theory tradition, the idea being that in order to launch a monetarist counter-revolution, Friedman needed to establish a linkage with pre-Keynesian orthodoxy. This paper shows that there was a distinct pre-Keynesian Chicago quantity-theory tradition that advocated increased government expenditure during the Great Depression in order to put money directly into circulation. This policy stance distinguished th...

  15. Simultaneous invention and the patent law

    Howells, John

    inventions they often find this to challenge the idea that patent law (which rewards only the first inventor with exclusive rights) is needed to encourage invention and innovation. We review the empirical evidence alleged to show that simultaneous invention is prevalent for important inventions. In general...... is typical of important pioneer inventions in both survey evidence and alleged illustrative cases of simultaneous invention. We show this in the cases of Edison, the Wright brothers, the Selden automobile patent vis a vis Ford, Watt and the steam engine. We then point out that patent law inherently ensures...... that patent protection is not extended to near simultaneous inventions. There remain a number of simultaneous inventions discovered through interference proceedings but we find the number too small to mount a serious challenge to the general operation of patent law....

  16. Scientific work on the level of inventions

    Piven' , G.I.; Pustovit, Yu.A.

    1980-06-01

    Describes the organizational scheme of the Ukrainian Research Scientific Coal-Chemical Institute patent department. The department evaluates new technological inventions patented abroad and associated with the coking industry, prepares information on new patents for the Institute's scientific staff. The department also helps employees of the Institute in formal patenting of their inventions. Inventions in the following fields are discussed: selective crushing of coal for coking, preheating of the coal charge, coal preparation (15 inventions) coal preparation before the coking process (45 inventions), modelling the optimum parameters of coking (6 inventions), production of formed coke (25 inventions) and smokeless and dustless charging of coal in coking ovens (6 invections). Twenty-one inventions are associated with using the waste products of coal preparation and coking, and environmental protection in conjunction with coking plants. (In Polish)

  17. Confidentiality

    jacobien

    essential to the professional ethics of med- ical practitioners. ... promise-keeping and utility (or welfare). Autonomy. Autonomous beings are those that are capable of controlling their own lives.They ... private medical information is lim- ited: the ...

  18. Summary Robert Noyce and the invention of Silicon Valley

    2014-01-01

    This work offers a summary of the book "THE MAN BEHIND THE MICROCHIP: Robert Noyce and the Invention of Silicon Valley""by Leslie Berlin.The Man behind the Microchip is Leslie Berlin's first book. This author is project historian for the Silicon Valley Archives, a division of the Stanford University Department of Special Collections. This book tells the story of a giant of the high-tech industry: the multimillionaire Bob Noyce. This co-founder of Fairchild Semiconductor and Intel co-invented the integrated circuit which became the electronic heart of every modern computer, automobile, advance

  19. 7 CFR 1280.634 - Confidentiality.

    2010-01-01

    ... 7 Agriculture 10 2010-01-01 2010-01-01 false Confidentiality. 1280.634 Section 1280.634 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (MARKETING... persons voting in the referendum and ballots shall be confidential and the contents of the ballots shall...

  20. 7 CFR 1206.107 - Confidential information.

    2010-01-01

    ... 7 Agriculture 10 2010-01-01 2010-01-01 false Confidential information. 1206.107 Section 1206.107 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (MARKETING... INFORMATION Referendum Procedures. § 1206.107 Confidential information. The ballots and other information or...

  1. 7 CFR 1150.278 - Confidential treatment.

    2010-01-01

    ... 7 Agriculture 9 2010-01-01 2009-01-01 true Confidential treatment. 1150.278 Section 1150.278 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (Marketing... of Milk Producer Organizations § 1150.278 Confidential treatment. All documents and other information...

  2. 7 CFR 1207.352 - Confidential treatment.

    2010-01-01

    ... 7 Agriculture 10 2010-01-01 2010-01-01 false Confidential treatment. 1207.352 Section 1207.352 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (MARKETING... PLAN Potato Research and Promotion Plan Reports, Books, and Records § 1207.352 Confidential treatment...

  3. 7 CFR 1205.340 - Confidential treatment.

    2010-01-01

    ... 7 Agriculture 10 2010-01-01 2010-01-01 false Confidential treatment. 1205.340 Section 1205.340 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (MARKETING... Cotton Research and Promotion Order Reports, Books, and Records § 1205.340 Confidential treatment. All...

  4. 7 CFR 1220.243 - Confidential treatment.

    2010-01-01

    ... 7 Agriculture 10 2010-01-01 2010-01-01 false Confidential treatment. 1220.243 Section 1220.243 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (MARKETING... Confidential treatment. Except as otherwise provided in the Act, financial or commercial information that is...

  5. The Confidentiality of Interlibrary Loan Records.

    Nolan, Christopher W.

    1993-01-01

    Discusses potential problems for confidentiality within interlibrary loan requests, outlines legal issues related to confidentiality, and proposes guidelines intended to protect library users' rights to privacy. Interlibrary loan documentation procedures are considered; laws and professional standards are reviewed; and the disposition of…

  6. 40 CFR 716.55 - Confidentiality claims.

    2010-07-01

    ... confidential business information, health and safety studies of any substance or mixture that has been offered for commercial distribution (including for test marketing purposes and for use in research and... because disclosure would reveal a confidential process or quantitative mixture composition should briefly...

  7. 15 CFR 806.5 - Confidentiality.

    2010-01-01

    ... 15 Commerce and Foreign Trade 3 2010-01-01 2010-01-01 false Confidentiality. 806.5 Section 806.5 Commerce and Foreign Trade Regulations Relating to Commerce and Foreign Trade (Continued) BUREAU OF ECONOMIC ANALYSIS, DEPARTMENT OF COMMERCE DIRECT INVESTMENT SURVEYS § 806.5 Confidentiality. Information...

  8. 31 CFR 9.6 - Confidential information.

    2010-07-01

    ... 9.6 Money and Finance: Treasury Office of the Secretary of the Treasury EFFECTS OF IMPORTED ARTICLES ON THE NATIONAL SECURITY § 9.6 Confidential information. Information submitted in confidence which... marked “Business Confidential.” [40 FR 50717, Oct. 31, 1975] ...

  9. 15 CFR 705.6 - Confidential information.

    2010-01-01

    ... EFFECT OF IMPORTED ARTICLES ON THE NATIONAL SECURITY § 705.6 Confidential information. (a) Any... the investigation that would disclose national security classified information or business... Security Classified” or “Business Confidential,” as appropriate, marked at the top of each sheet. Any...

  10. Non-Intentional Invention: The Promethean, Trickster, and Improvisational Invention Heuristics of Academic Writers and Poets

    Wirtz, Jason

    2013-01-01

    This essay introduces a novel way to conceptualize writerly invention -- invention as adopting a non-intentional intellectual stance wherein heuristics are experienced as acting upon the writer as opposed to being enacted by the writer. This view of invention complicates and extends the traditional, Aristotelian view of invention as discreet…

  11. Invention Zaman Barok dan Pengembangan Permainan Piano

    RIANTI MARDALENA PASARIBU

    2013-11-01

    Full Text Available Invention in Barok Era and The Development of Piano Lesson. In piano lesson, one material of parts towhich had been given is polyphony, which is an Invention from J.S. Invention is a basic fi nger-skill for pianist.Invention develops in the Baroque period. The baroque ideology is not only called as the reaction of Renaissance,but also as the continuing development from Renaissance. Invention is known in two forms. First is as a pianocomposition and second is as a piano play which can push a pianist to understand more about an arrangement thathe played and expressed.

  12. Entrepreneurship and University Licensing

    Brouwer, M.

    2005-01-01

    Outside invention has gained in importance as universities are actively seeking commercialization of their inventions since the passage of the Bayh-Dole Act. The paper analyzes the incentives to invent for outside and inside inventors. It is shown that outside inventors have greater incentives to

  13. A challenge to unqualified medical confidentiality.

    Bozzo, Alexander

    2018-04-01

    Medical personnel sometimes face a seeming conflict between a duty to respect patient confidentiality and a duty to warn or protect endangered third parties. The conventional answer to dilemmas of this sort is that, in certain circumstances, medical professionals have an obligation to breach confidentiality. Kenneth Kipnis has argued, however, that the conventional wisdom on the nature of medical confidentiality is mistaken. Kipnis argues that the obligation to respect patient confidentiality is unqualified or absolute, since unqualified policies can save more lives in the long run. In this paper, I identify the form of Kipnis's argument and present a challenge to it. I conclude that, as matters stand now, a qualified confidentiality policy is the more rational choice. © Article author(s) (or their employer(s) unless otherwise stated in the text of the article) 2018. All rights reserved. No commercial use is permitted unless otherwise expressly granted.

  14. Tree Ordination as Invented Tradition

    Avery Morrow

    2012-01-01

    Full Text Available The symbolic ordination of trees as monks in Thailand is widely perceived in Western scholarship to be proof of the power of Buddhism to spur ecological thought. However, a closer analysis of tree ordination demonstrates that it is not primarily about Buddhist teaching, but rather is an invented tradition based on the sanctity of Thai Buddhist symbols as well as those of spirit worship and the monarchy. Tree ordinations performed by non-Buddhist minorities in Thailand do not demonstrate a religious commitment but rather a political one.

  15. High-Technology Companies Often Turn to Colleges for Confidential 'Beta Tests' of New Products.

    Turner, Judith Axler

    1988-01-01

    Beta testing--the process of trying a product in a real-world setting before releasing it commercially--exploits a natural interface between universities and high-technology industries. High-tech companies need confidential, real-world tests of new products, and universities are eager to get an early look at tomorrow's technology. (MLW)

  16. Confidentiality in psychological practice: a decrepit concept?

    McMahon, M; Knowles, A D

    1995-11-01

    Although the principle of confidentiality in the relationship between psychologists and client has been vaunted, and is emphasised in the Australian Psychological Society's Code of Professional Conduct (the APS code; 1994), the confidentiality of this relationship is circumscribed by the absence of legal protections, the ethical beliefs of psychologists, institutional practices, and the provisions of the APS code itself. Lack of privilege in judicial proceedings, and statutory obligations to report certain types of behaviour, mandate breaches of confidentiality in some circumstances. Ethical beliefs of psychologists may support disclosure, especially where it is believed that there is danger of serious physical harm to the client or others. Multidisciplinary teams and institutional settings require the exchange of information for optimal delivery of services. Recent amendments to the APS code may require disclosure without the client's consent when a client is believed to be suicidal. Such developments, when considered at all, are typically regarded as exceptions to a general obligation of confidentiality. However, discussion of exceptions presupposes agreement on fundamental principle: the significance of, and rationale for, confidentiality in the psychologist-client relationship. It is argued in this paper that the obligation of confidentiality has been assumed rather than vigorously analysed and empirically explored. A critical examination of this obligation is the most appropriate starting point for the rehabilitation of contemporary principles of confidentiality in the psychologist-client relationship.

  17. Ghosts of inventions: Patent law's digital mediations.

    Kang, Hyo Yoon

    2018-04-01

    This article examines the shifts in the material ordering of inventions in patent law organization and their effects on the meaning and scope of inventions as intellectual property. Formats and media are constitutive of the establishment and stabilization of inventions as objects of intellectual property. Modern patent law's materiality had been dominated by paper documents but ever more consists of digital images, files, and networked data. The article traces and analyzes such effects of digital media on the meaning of intellectual/intangible property and argues that inventions increasingly matter as digital data in the legal realm.

  18. 7 CFR 1425.5 - Confidentiality.

    2010-01-01

    ... AGRICULTURE LOANS, PURCHASES, AND OTHER OPERATIONS COOPERATIVE MARKETING ASSOCIATIONS § 1425.5 Confidentiality. Information submitted to CCC related to trade secrets, financial or commercial operations, or the financial...

  19. Law and ethics in conflict over confidentiality?

    Dickens, B M; Cook, R J

    2000-09-01

    Ethical principles that require the preservation of patients' confidential information are reinforced by principles found in several areas of law, such as law on contracts, negligence, defamation and fiduciary duty. However, laws sometimes compel disclosures of medical confidences, and more often may justify or excuse disclosures. Legally contentious issues concern patients' confidences regarding possible unlawful conduct, such as pregnancy termination, and the risk of spread of HIV and other infections. This article reviews the various legal bases of the duty of confidentiality, and legal challenges to the ethical obligation of non-disclosure. It addresses the justifications and limits of exchange of patients' health information among healthcare professionals and trainees, and considers legally recognized limits of confidential duties, and the scope of legitimate disclosure. An underlying theme is how to determine whether physicians are ethically justified in employing the discretion the law sometimes affords them to breach patients' expectations of confidentiality.

  20. Audit, Accountability and Confidential Enquiries into Maternal ...

    HP

    Time for Action: Audit, Accountability and Confidential Enquiries ... provision of quality maternity services. Having such a ... services are more likely to be sustained if women can find ..... Donabedian A. An introduction to quality assurance in.

  1. 40 CFR 790.7 - Confidentiality.

    2010-07-01

    ... words “confidential business information,” “trade secret,” or another appropriate phrase indicating its... competitor use such information? How substantial would the harmful effects be? What is the causal...

  2. Teaching Confidentiality through Comics at One Spanish Medical School.

    Lalanda, Mónica; Altisent, Rogelio; Delgado-Marroquín, Maria Teresa

    2018-02-01

    At the University of Zaragoza in Spain we developed an innovative way to teach the concept of confidentiality to medical students, which we tested by comparing the use of customized comics with more traditional methods. We proved that using comics is more attractive to students than lectures and class discussions, that it increases class participation and students' self-awareness of learning, and that it maintains the same academic results. We share our experience visually in a two-page comic. © 2018 American Medical Association. All Rights Reserved.

  3. Another of CERN's many inventions!

    CERN Bulletin

    2010-01-01

    CERN has often been the incubator for the development of innovative technologies but very few people know about the capacitive touch screens invented for the consoles of the SPS Control Room in 1973. The Bulletin interviewed their inventor, Bent Stumpe, who also developed the CERN tracker ball and the computer-programmable knob.   Bent Stumpe, inventor of the CERN touch screens, tracker ball and programmable knob. Here we see him with one the first touch screens developed in 1973.   A specific goal, a lot of motivation and the technical skills to do it: that’s all you need to create something nobody else has ever done before. Back in the 1970s, the SPS was being built and its control room required the installation of thousands of buttons, knobs, switches and oscilloscopes to operate the machine. Frank Beck, newly recruited from the DD Division to be in charge of the central control hub in the SPS control room, asked Bent Stumpe for solutions to the following problem: how to bui...

  4. New Paradigms for Computer Aids to Invention.

    Langston, M. Diane

    Many people are interested in computer aids to rhetorical invention and want to know how to evaluate an invention aid, what the criteria are for a good one, and how to assess the trade-offs involved in buying one product or another. The frame of reference for this evaluation is an "old paradigm," which treats the computer as if it were…

  5. Inventions for future sustainable development in agriculture

    Jacobsen, E.; Beers, P.J.; Fischer, A.R.H.

    2011-01-01

    This chapter is directed to the importance of different inventions as driver for sustainable development of agriculture. Inventions are defined as radical new ideas, perspectives and technologies that hold the potential to trigger a change in sustainable agriculture. Innovation is based on one or

  6. Perceptions of the Invention Disclosure Process at a Federal Laboratory after the America Invents Act of 2011

    Rice-Moore, Sharla V.

    The America Invents Act of 2011 reformed the patent process in the United States. This study focused on the effect of one provision which allows the first inventor to file the application of patent to become the owner of the intellectual property. Prior to this, the Patent and Trademark Act of 1980 allowed small businesses, universities, and non-profit institutions to pursue ownership of intellectual property developed from federally funded research. The new regulations could influence government employees' disclosure of invention and new technology. There is limited research on the disclosure of technology process for government employees. This study examined 1,389 invention disclosure forms from March 2009 to March 2015 during three phases of the law: before it was signed, before the implementation of the first inventor to file provision in 2013, and after full enactment. The reported State of Development showed significant changes prior to implementation for large companies. The findings reveal disclosures were filed at an earlier stage of development, but no change was noted in the significance of the technology. A survey was also distributed using the framework of Organizational Justice theory. The results showed the disclosure reporting process was fair and unbiased. The research supports the efforts of management to keep employees informed about the disclosure process and the importance of technology transfer of government developed innovation. Key words: America Invents Act, Organizational Justice, patent process.

  7. Patentna zaštita poverljivih pronalazaka / Patent protection of classified invention

    Obrad T. Čabarkapa

    2008-10-01

    Full Text Available Svaki pronalazak za koji se utvrdi da je značajan za odbranu i bezbednost Republike Srbije smatra se poverljivim. Za patentnu zaštitu poverljivih pronalazaka podnosi se prijava organu nadležnom za poslove odbrane, koji ima isključivo pravo da raspolaže poverljivim pronalascima1. U organizacijskoj jedinici nadležnoj za poslove naučne i inovacione delatnosti2 realizuje postupak ispitivanja poverljivih prijava patenata. Da bi se donela ocena o poverljivosti prijavljenog pronalaska neophodno je realizovati određene faze u postupku ispitivanja prijave. Poverljivi pronalazak se ne objavljuje, a pronalazač, nakon priznavanja patenta, u skladu sa zakonskim propisima, ima određena moralna i materijalna prava. / Every invention established to be of significance for defense or security of the Republic of Serbia is considered to be a classified invention. For the purpose of patent protection of classified inventions, a confidential application must be submitted to a relevant defense authority having the exclusive right to deal with classified inventions3. An organizational unit competent for scientific and innovation issues carries out the examination of classified patent applications. In order to evaluate classification of the submitted invention, regarding its significance for defense or security of the country as well as to make the final decision on the application, the examination procedure should be carried out through several phases. A classified invention is not to be published and once the patent has been approved, the inventor enjoys moral and material rights in accordance with law.

  8. Multiple, connective intellection: the condition for invention

    C S (Fanie de Beer

    2015-11-01

    Full Text Available Since this article involves invention, the conditions for inventiveness become the issue: assuming multiple reality; thinking in a special way; transgressing boundaries; acknowledging networks (in the terms of Michel Serres: communication, transduction, interference, distribution, passages between the sciences. There are, however, misplaced expectations: technology should work wonders in this regard while forgetting that humans, redefined though, remain the key to establish connections and networks between people, paradigms, disciplines, sciences and technologies. Against this background, Michel Serres’s emphasis on invention and “thinking as invention” and his a-critical anti-method – ‘connective, multiple intellection’ which is a special kind of thought – are desperately needed. Guattari’s articulation of the three ecologies and the ecosophic views he developed in this regard provides a significant amplification of the approach of ‘multiple connective intellection’. These insights can be enlightened and strongly driven home through the views of Latour with an anthropological and socio-dynamic perspective on the scientific endeavour with the articulation of the actor-network theory inherited from Serres. The thoughtful beyond-methodology of Edgar Morin with his strong noological position as the ultimate condition for inventiveness, and Gregory Ulmer with his special emphasis on invention and inventiveness, especially with the help and assistance of electronic means (video and internet, and with his work with the architect Bernard Tschumi on invention and inventiveness, are of special significance in the sphere of inventiveness, the real and final guarantee for a spirited re-enchantment of the world as well as the final demonstration that the battle for intelligence as opposed to ignorance, stupidity and barbarism can be fought with great hope to succeed.

  9. Sensational inventions by girls and boys

    Wang, Yeon Jung

    1999-05-01

    This book introduces the interesting and original inventions invented by girls and boys. These are the titles of the inventions : an antenna ruler, muscular strength machine with spring, items to remove sticky matter for advertisement, chair ladder for the disabled, useful control box for feeding bees, a portable carriage for dogs, a lid of ashtray, hot-air balloon using solar power, toy cannon for reports, hard badminton racket, tv cable and a distributor which are easy to install, device for car automatic parking, a cleanser for vegetables.

  10. Sensational inventions by girls and boys

    Wang, Yeon Jung

    1999-05-15

    This book introduces the interesting and original inventions invented by girls and boys. These are the titles of the inventions : an antenna ruler, muscular strength machine with spring, items to remove sticky matter for advertisement, chair ladder for the disabled, useful control box for feeding bees, a portable carriage for dogs, a lid of ashtray, hot-air balloon using solar power, toy cannon for reports, hard badminton racket, tv cable and a distributor which are easy to install, device for car automatic parking, a cleanser for vegetables.

  11. Confidential benchmarking based on multiparty computation

    Damgård, Ivan Bjerre; Damgård, Kasper Lyneborg; Nielsen, Kurt

    We report on the design and implementation of a system that uses multiparty computation to enable banks to benchmark their customers' confidential performance data against a large representative set of confidential performance data from a consultancy house. The system ensures that both the banks......' and the consultancy house's data stays confidential, the banks as clients learn nothing but the computed benchmarking score. In the concrete business application, the developed prototype help Danish banks to find the most efficient customers among a large and challenging group of agricultural customers with too much...... debt. We propose a model based on linear programming for doing the benchmarking and implement it using the SPDZ protocol by Damgård et al., which we modify using a new idea that allows clients to supply data and get output without having to participate in the preprocessing phase and without keeping...

  12. Ancient engineers' inventions precursors of the present

    Rossi, Cesare

    2017-01-01

    This book describes the inventions and designs of ancient engineers who are the precursors of the present. The period ranges mainly from 300 B.C. to 1600 A.D. with several exceptions. Many of the oldest inventions are documented by archaeological finds, often very little known, mainly from Pompeii, Herculaneum and Stabiae and reveal a surprising modernity in their conception. Most of the inventions presented in the first four parts of the book were conceived up to the late Roman Empire and may be considered as milestones, each in their respective field. The fifth part concentrates on more recent centuries. The sixth part deals with some building construction techniques. Generally, for each of the presented inventions, three elements of research and reference are provided: written documents (the classics), iconic references (coins, bas-reliefs, etc.) and archaeological findings. The authors did not write this book for engineers only; hence they describe all the devices without assuming wide technical knowledge...

  13. The Invention Convention: Mind Meets Simple Machines.

    Hadi-Tabassum, Samina

    1997-01-01

    Describes an Earth Day celebration where students had to design an invention made of simple machines that could crush an empty aluminum can through 10 rapid mechanical movements using materials foraged from the students' homes. (JRH)

  14. How James Watt invented the copier forgotten inventions of our great scientists

    Schils, René

    2012-01-01

    Features 25 different scientists and the ideas which may not have made them famous, but made history… Typically, we remember our greatest scientists from one single invention, one new formula or one incredible breakthrough. This narrow perspective does not give justice to the versatility of many scientists who also earned a reputation in other areas of science. James Watt, for instance, is known for inventing the steam engine, yet most people do not know that he also invented the copier. Alexander Graham Bell of course invented the telephone, but only few know that he invented artificial breathing equipment, a prototype of the ‘iron lung’. Edmond Halley, whose name is associated with the comet that visits Earth every 75 years, produced the first mortality tables, used for life insurances. This entertaining book is aimed at anyone who enjoys reading about inventions and discoveries by the most creative minds. Detailed illustrations of the forgotten designs and ideas enrich the work throughout.

  15. 7 CFR 1210.607 - Confidential information.

    2010-01-01

    ... 7 Agriculture 10 2010-01-01 2010-01-01 false Confidential information. 1210.607 Section 1210.607 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (MARKETING... contents and all other information or reports furnished to, compiled by, or in possession of, the...

  16. 7 CFR 1210.352 - Confidential treatment.

    2010-01-01

    ... 7 Agriculture 10 2010-01-01 2010-01-01 false Confidential treatment. 1210.352 Section 1210.352 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (MARKETING... treatment. (a) All information obtained from the books, records, or reports required to be maintained under...

  17. ML Confidential : machine learning on encrypted data

    Graepel, T.; Lauter, K.; Naehrig, M.

    2012-01-01

    We demonstrate that by using a recently proposed somewhat homomorphic encryption (SHE) scheme it is possible to delegate the execution of a machine learning (ML) algorithm to a compute service while retaining confidentiality of the training and test data. Since the computational complexity of the

  18. 7 CFR 1150.173 - Confidential treatment.

    2010-01-01

    ... reports of the number of persons subject to this subpart or statistical data collected therefrom, which... 7 Agriculture 9 2010-01-01 2009-01-01 true Confidential treatment. 1150.173 Section 1150.173 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (Marketing...

  19. 7 CFR 1221.127 - Confidential treatment.

    2010-01-01

    ... statistical data collected there from, which statements do not identify the information furnished by any... 7 Agriculture 10 2010-01-01 2010-01-01 false Confidential treatment. 1221.127 Section 1221.127 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (MARKETING...

  20. 7 CFR 1160.403 - Confidential treatment.

    2010-01-01

    ... statistical data collected from such sources, which statements do not identify the information furnished by... 7 Agriculture 9 2010-01-01 2009-01-01 true Confidential treatment. 1160.403 Section 1160.403 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (Marketing...

  1. 7 CFR 1250.354 - Confidential treatment.

    2010-01-01

    ... subject to this subpart or statistical data collected therefrom, which statements do not identify the... 7 Agriculture 10 2010-01-01 2010-01-01 false Confidential treatment. 1250.354 Section 1250.354 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (MARKETING...

  2. 7 CFR 1212.72 - Confidential treatment.

    2010-01-01

    ... statements based upon the reports of the number of persons subject to this subpart or statistical data... 7 Agriculture 10 2010-01-01 2010-01-01 false Confidential treatment. 1212.72 Section 1212.72 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (MARKETING...

  3. 7 CFR 1260.203 - Confidential treatment.

    2010-01-01

    ... of persons subject to this subpart or statistical data collected therefrom, which statements do not... 7 Agriculture 10 2010-01-01 2010-01-01 false Confidential treatment. 1260.203 Section 1260.203 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (MARKETING...

  4. 7 CFR 1216.62 - Confidential treatment.

    2010-01-01

    ... this subpart or statistical data collected therefrom, which statements do not identify the information... 7 Agriculture 10 2010-01-01 2010-01-01 false Confidential treatment. 1216.62 Section 1216.62 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (MARKETING...

  5. 7 CFR 1209.62 - Confidential treatment.

    2010-01-01

    ... this subpart or statistical data collected therefrom, which statements do not identify the information... 7 Agriculture 10 2010-01-01 2010-01-01 false Confidential treatment. 1209.62 Section 1209.62 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (MARKETING...

  6. 7 CFR 1206.62 - Confidential treatment.

    2010-01-01

    ... statements based upon the reports of the number of persons subject to this subpart or statistical data... 7 Agriculture 10 2010-01-01 2010-01-01 false Confidential treatment. 1206.62 Section 1206.62 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (MARKETING...

  7. 7 CFR 1218.62 - Confidential treatment.

    2010-01-01

    ... of the number of persons subject to this subpart or statistical data collected therefrom, which... 7 Agriculture 10 2010-01-01 2010-01-01 false Confidential treatment. 1218.62 Section 1218.62 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (MARKETING...

  8. 7 CFR 1215.62 - Confidential treatment.

    2010-01-01

    ... persons subject to this part or statistical data collected therefrom, which statements do not identify the... 7 Agriculture 10 2010-01-01 2010-01-01 false Confidential treatment. 1215.62 Section 1215.62 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (MARKETING...

  9. 7 CFR 1219.63 - Confidential treatment.

    2010-01-01

    ... upon the reports of the number of persons subject to this subpart or statistical data collected from... 7 Agriculture 10 2010-01-01 2010-01-01 false Confidential treatment. 1219.63 Section 1219.63 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (MARKETING...

  10. 7 CFR 1280.227 - Confidentiality.

    2010-01-01

    ... statistical data collected therefrom, which statements do not identify the information furnished by any person... 7 Agriculture 10 2010-01-01 2010-01-01 false Confidentiality. 1280.227 Section 1280.227 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (MARKETING...

  11. 18 CFR 270.506 - Confidentiality.

    2010-04-01

    ... 18 Conservation of Power and Water Resources 1 2010-04-01 2010-04-01 false Confidentiality. 270.506 Section 270.506 Conservation of Power and Water Resources FEDERAL ENERGY REGULATORY COMMISSION...) through (9) of 5 U.S.C. 552(b). (b) Upon receipt of a request for disclosure of information treated as...

  12. 21 CFR 821.55 - Confidentiality.

    2010-04-01

    ... permission to release, the patient's name, address, telephone number, and social security number, or other... MEDICAL DEVICE TRACKING REQUIREMENTS Records and Inspections § 821.55 Confidentiality. (a) Any patient... identify patient or research subjects shall not be available for public disclosure except as provided in...

  13. 7 CFR 900.309 - Confidential information.

    2010-01-01

    ... Conduct of Referenda To Determine Producer Approval of Milk Marketing Orders To Be Made Effective Pursuant to Agricultural Marketing Agreement Act of 1937, as Amended § 900.309 Confidential information. The... Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (Marketing...

  14. 7 CFR 984.79 - Confidential information.

    2010-01-01

    ... 7 Agriculture 8 2010-01-01 2010-01-01 false Confidential information. 984.79 Section 984.79 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (Marketing... or disclosing the trade position, or financial condition or business operations of the handler shall...

  15. 7 CFR 993.71 - Confidential information.

    2010-01-01

    ... 7 Agriculture 8 2010-01-01 2010-01-01 false Confidential information. 993.71 Section 993.71 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (Marketing... information constituting a trade secret or disclosing of the trade position, financial condition, or business...

  16. 7 CFR 932.63 - Confidential information.

    2010-01-01

    ... 7 Agriculture 8 2010-01-01 2010-01-01 false Confidential information. 932.63 Section 932.63 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (Marketing... from such reports and records which might affect the trade position, financial condition, or business...

  17. 7 CFR 929.65 - Confidential information.

    2010-01-01

    ... 7 Agriculture 8 2010-01-01 2010-01-01 false Confidential information. 929.65 Section 929.65 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (Marketing... position, financial condition, or business operations of the particular handler from whom received, shall...

  18. 7 CFR 982.70 - Confidential information.

    2010-01-01

    ... 7 Agriculture 8 2010-01-01 2010-01-01 false Confidential information. 982.70 Section 982.70 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (Marketing... trade secret or disclosing of the trade position, financial condition, or business operations of the...

  19. 7 CFR 930.73 - Confidential information.

    2010-01-01

    ... 7 Agriculture 8 2010-01-01 2010-01-01 false Confidential information. 930.73 Section 930.73 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (Marketing... a trade secret or disclosing trade position, financial condition, or business operations of the...

  20. 7 CFR 983.65 - Confidential information.

    2010-01-01

    ... 7 Agriculture 8 2010-01-01 2010-01-01 false Confidential information. 983.65 Section 983.65 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (Marketing... the particular handler or their customers shall be received by, and at all times kept in the custody...

  1. 7 CFR 996.72 - Confidential information.

    2010-01-01

    ... 7 Agriculture 8 2010-01-01 2010-01-01 false Confidential information. 996.72 Section 996.72 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (Marketing... condition, or business operations of the particular handlers or their customers shall be received by, and at...

  2. 31 CFR 129.5 - Confidentiality.

    2010-07-01

    ... 31 Money and Finance: Treasury 1 2010-07-01 2010-07-01 false Confidentiality. 129.5 Section 129.5 Money and Finance: Treasury Regulations Relating to Money and Finance PORTFOLIO INVESTMENT SURVEY... contain data aggregated in such a way that neither the person supplying the information nor the investor...

  3. 40 CFR 710.58 - Confidentiality.

    2010-07-01

    ...) Any person submitting information under this subpart may assert a business confidentiality claim for... with reporting under this subpart? How could a competitor use such information? Would the effects of... that your competitors do not know it is being manufactured or imported for a commercial purpose by...

  4. 40 CFR 710.38 - Confidentiality.

    2010-07-01

    ... submitting information under this part may assert a business confidentiality claim for the information. The... with reporting under this part? How could a competitor use such information? Would the effects of... that your competitors do not know it is being manufactured or imported for a commercial purpose by...

  5. 38 CFR 1.462 - Confidentiality restrictions.

    2010-07-01

    ... Sickle Cell Anemia § 1.462 Confidentiality restrictions. (a) General. The patient records to which §§ 1..., infection with the HIV, or sickle cell anemia may be acknowledged only if the patient's written consent is... with the HIV, or sickle cell anemia. (2) Any answer to a request for a disclosure of patient records...

  6. 42 CFR 93.108 - Confidentiality.

    2010-10-01

    ... 42 Public Health 1 2010-10-01 2010-10-01 false Confidentiality. 93.108 Section 93.108 Public Health PUBLIC HEALTH SERVICE, DEPARTMENT OF HEALTH AND HUMAN SERVICES HEALTH ASSESSMENTS AND HEALTH EFFECTS STUDIES OF HAZARDOUS SUBSTANCES RELEASES AND FACILITIES PUBLIC HEALTH SERVICE POLICIES ON RESEARCH...

  7. 22 CFR 130.15 - Confidential business information.

    2010-04-01

    ..., confidential business information means commercial or financial information which by law is entitled to... 22 Foreign Relations 1 2010-04-01 2010-04-01 false Confidential business information. 130.15... CONTRIBUTIONS, FEES AND COMMISSIONS § 130.15 Confidential business information. (a) Any person who is required...

  8. 15 CFR 718.3 - Disclosure of confidential business information.

    2010-01-01

    ... 15 Commerce and Foreign Trade 2 2010-01-01 2010-01-01 false Disclosure of confidential business... (Continued) BUREAU OF INDUSTRY AND SECURITY, DEPARTMENT OF COMMERCE CHEMICAL WEAPONS CONVENTION REGULATIONS CONFIDENTIAL BUSINESS INFORMATION § 718.3 Disclosure of confidential business information. (a) General...

  9. Safeguarding critical e-documents implementing a program for securing confidential information assets

    Smallwood, Robert F

    2012-01-01

    Practical, step-by-step guidance for corporations, universities and government agencies to protect and secure confidential documents and business records Managers and public officials are looking for technology and information governance solutions to "information leakage" in an understandable, concise format. Safeguarding Critical E-Documents provides a road map for corporations, governments, financial services firms, hospitals, law firms, universities and other organizations to safeguard their internal electronic documents and private communications.Provides practical, step-by-step guidance o

  10. Biobanks in South Africa: A global perspective on privacy and confidentiality

    Riaan Rheeder

    2017-05-01

    Full Text Available The Universal Declaration of Bioethics and Human Rights (UDBHR of the United Nations Educational, Scientific and Cultural Organization (UNESCO was adopted unanimously in 2005 by the world community as a universal guideline, according to which members of the global community were accountable to each other. Research results from UNESCO show that the UDBHR has had little or no impact in South Africa (SA. The primary objective of this article is to promote awareness of the UDBHR in SA and Africa by focusing on Article 9 of the Declaration, which accepts the right to privacy and confidentiality. For this objective to be relevant in the SA context, depends on whether the guidelines of the National Department of Health’s Ethics in Health Research: Principles, Processes and Structures of 2015 acknowledge biobanks of the universally accepted ethical guidelines on privacy and confidentiality of autonomous persons and whether these guidelines are broadly in accordance with global bioethical guidelines.

  11. 45 CFR 650.19 - Electronic invention handling.

    2010-10-01

    ... Report or a Final Invention Statement and Certification. (b) Questions on use of iEdison and requests for... 45 Public Welfare 3 2010-10-01 2010-10-01 false Electronic invention handling. 650.19 Section 650... PATENTS § 650.19 Electronic invention handling. (a) Grantees must use the iEdison Invention Information...

  12. Pulsed laser deposition—invention or discovery?

    Venkatesan, T

    2014-01-01

    The evolution of pulsed laser deposition had been an exciting process of invention and discovery, with the development of high T c superconducting films as the main driver. It has become the method of choice in research and development for rapid prototyping of multicomponent inorganic materials for preparing a variety of thin films, heterostructures and atomically sharp interfaces, and has become an indispensable tool for advancing oxide electronics. In this paper I will give a personal account of the invention and development of this process at Bellcore/Rutgers, the opportunity, challenges and mostly the extraordinary excitement that was generated, typical of any disruptive technology. (paper)

  13. Safeguarding Confidentiality in Electronic Health Records.

    Shenoy, Akhil; Appel, Jacob M

    2017-04-01

    Electronic health records (EHRs) offer significant advantages over paper charts, such as ease of portability, facilitated communication, and a decreased risk of medical errors; however, important ethical concerns related to patient confidentiality remain. Although legal protections have been implemented, in practice, EHRs may be still prone to breaches that threaten patient privacy. Potential safeguards are essential, and have been implemented especially in sensitive areas such as mental illness, substance abuse, and sexual health. Features of one institutional model are described that may illustrate the efforts to both ensure adequate transparency and ensure patient confidentiality. Trust and the therapeutic alliance are critical to the provider-patient relationship and quality healthcare services. All of the benefits of an EHR are only possible if patients retain confidence in the security and accuracy of their medical records.

  14. Improved Message Authentication and Confidentiality Checking

    Ismail Jabiullah, M.; Abdullah Al-Shamim, M.; Lutfar Rahman, M.

    2005-01-01

    The most confusing areas of the secured network communications are the message authentication and confidentiality checking. The attacks and the counter measures have become so convoluted that the users in this area begin to account for all contingencies. Two session-key generation techniques are used here to generate two separate session keys K 1 and K 2 ; and both the sender and the reveiver share these keys for higher degree of authentication and confidentiality. For this, the message is first encrypted by the key K 1 , and then the intermediary message authenticatin code (MAC) is generated by encrypting the encrypted message using the key K 2 . Then, the encrypted message and the intermediary MAC is again encrypted by using the K 2 and concatenated with the encrypted message and sent to the destination. At the receiving end, first, the received ciphertext is encrypted by using key K 2 and compared to the received MAC. The received ciphertext again is decrypted by the key K 2 and compared with the first decrypted MAC twice by the key K 2 . The plaintext is obtained by decrypting the received ciphertext first by K 2 and then by K 1 , using the corresponding decryption techniques respectively. The encryption techniques with key K 2 provides the authentication and with key K 1 provides the confidentiality checking of the transmitted message. The developed technique can be applied to both academic and commercial applications in online or offline electronic transactions for security.(authors)

  15. Practical State Machine Replication with Confidentiality

    Duan, Sisi [ORNL; Zhang, Haibin [University of North Carolina, Chapel Hill

    2016-01-01

    We study how to enable arbitrary randomized algorithms in Byzantine fault-tolerant (BFT) settings. We formalize a randomized BFT protocol and provide a simple and efficient construction that can be built on any existing BFT protocols while adding practically no overhead. We go one step further to revisit a confidential BFT protocol (Yin et al., SOSP '03). We show that their scheme is potentially susceptible to safety and confidentiality attacks. We then present a new protocol that is secure in the stronger model we formalize, by extending the idea of a randomized BFT protocol. Our protocol uses only efficient symmetric cryptography, while Yin et al.'s uses costly threshold signatures. We implemented and evaluated our protocols on microbenchmarks and real-world use cases. We show that our randomized BFT protocol is as efficient as conventional BFT protocols, and our confidential BFT protocol is two to three orders of magnitude faster than Yin et al.'s, which is less secure than ours.

  16. Access control and confidentiality in radiology

    Noumeir, Rita; Chafik, Adil

    2005-04-01

    A medical record contains a large amount of data about the patient such as height, weight and blood pressure. It also contains sensitive information such as fertility, abortion, psychiatric data, sexually transmitted diseases and diagnostic results. Access to this information must be carefully controlled. Information technology has greatly improved patient care. The recent extensive deployment of digital medical images made diagnostic images promptly available to healthcare decision makers, regardless of their geographic location. Medical images are digitally archived, transferred on telecommunication networks, and visualized on computer screens. However, with the widespread use of computing and communication technologies in healthcare, the issue of data security has become increasingly important. Most of the work until now has focused on the security of data communication to ensure its integrity, authentication, confidentiality and user accountability. The mechanisms that have been proposed to achieve the security of data communication are not specific to healthcare. Data integrity can be achieved with data signature. Data authentication can be achieved with certificate exchange. Data confidentiality can be achieved with encryption. User accountability can be achieved with audits. Although these mechanisms are essential to ensure data security during its transfer on the network, access control is needed in order to ensure data confidentiality and privacy within the information system application. In this paper, we present and discuss an access control mechanism that takes into account the notion of a care process. Radiology information is categorized and a model to enforce data privacy is proposed.

  17. University Technology Transfer

    Mike Cox

    2004-09-01

    Full Text Available This article describes the experiences and general observations of the author at Heriot-Watt University and concerns the transfer of university technology for the purposes of commercialisation. Full commercial exploitation of a university invention generally requires transferring that technology into the industrial arena, usually either by formation of a new company or licensing into an existing company. Commercialisation activities need to be carried out in unison with the prime activities of the university of research and teaching. Responsibility for commercialising university inventions generally rests with a specific group within the university, typically referred to as the technology transfer group. Each technology transfer should be considered individually and appropriate arrangements made for that particular invention. In general, this transfer process involves four stages: identification, evaluation, protection and exploitation. Considerations under these general headings are outlined from a university viewpoint. A phased approach is generally preferred where possible for the evaluation, protection and exploitation of an invention to balance risk with potential reward. Evaluation of the potential opportunity for a university invention involves essentially the same considerations as for an industrial invention. However, there are a range of commercial exploitation routes and potential deals so that only general guidelines can be given. Naturally, the final deal achieved is that which can be negotiated. The potential rewards for the university and inventor are both financial (via licensing income and equity realisation and non-financial.

  18. Confidentiality in participatory research: Challenges from one study.

    Petrova, Elmira; Dewing, Jan; Camilleri, Michelle

    2016-06-01

    This article presents key ethical challenges that were encountered when conducting a participatory qualitative research project with a very specific, small group of nurses, in this case with practice development nurses in Malta. With the small number of nurses employed in practice development roles in Malta, there are numerous difficulties of maintaining confidentiality. Poorly constructed interventions by the researcher could have resulted in detrimental effects to research participants and the overall trustworthiness of the research. Generally, ethical guidelines for research exist to reinforce validity of research; however, there is not an established consensus on how these strategies can be utilised in some types of qualitative field work. The researcher used an exploratory case study methodology. The sample consisted of 10 participants who were interviewed twice using face-to-face interviews, over a period of 2 months. The study was ethically reviewed by the University Research Ethics Committee and the Faculty Research Ethics Committee, University of Malta. The participants referred to in this article have been given adequate information about the study and their consent has been obtained. Numerous strategies for ensuring confidentiality during recruitment of the participants, during data collection, during transcription and data analysis and during dissemination of research results assisted the researcher in responding to potential and actual ethical issues. This article emphasises the main strategies that can be used to respond to ethical challenges when researching with a small easily identifiable group. The learning discussed here may be relevant to or even transferable to other similar research studies or research contexts. These methods fostered a greater credibility throughout the research process and predisposed the participants to greater trust, and thus, they disclosed their experiences and speak more freely, thus enhancing the quality of the study

  19. 76 FR 42684 - Statutory Invention Registration

    2011-07-19

    ... 3.00 Totals 8 10.00 There is annual (non-hour) cost burden in the way of filing fees associated with...) Filing fee $ cost burden (a) (b) (a x b) (c) Statutory Invention Registration (Requested prior to 2 $920...) respondent cost burden for this collection in the form of postage costs and filing fees will be $8,170. IV...

  20. Inventing Democracy: Future Alternatives for Social Action.

    Deethardt, John F.

    1983-01-01

    Considers the rational basis for participatory democracy and six ideas designed to embody that conceptual basis. Contends that the mission of speech communication scholars to the civic culture should be an activation of civic competencies and an invention of new places to practice free speech skills. (PD)

  1. Patent Work: The Other Side of Invention

    Dillon, Tamara

    2009-01-01

    In popular culture, the inventor is often portrayed as a lone tinkerer who emerges from a workshop with some magnificent new device. In reality, most inventions are the collaborative effort of scientists and engineers--usually researchers affiliated with a college or corporation--that result in the discovery, creation, or improvement of either…

  2. Ensuring Confidentiality of Geocoded Health Data: Assessing Geographic Masking Strategies for Individual-Level Data.

    Zandbergen, Paul A

    2014-01-01

    Public health datasets increasingly use geographic identifiers such as an individual's address. Geocoding these addresses often provides new insights since it becomes possible to examine spatial patterns and associations. Address information is typically considered confidential and is therefore not released or shared with others. Publishing maps with the locations of individuals, however, may also breach confidentiality since addresses and associated identities can be discovered through reverse geocoding. One commonly used technique to protect confidentiality when releasing individual-level geocoded data is geographic masking. This typically consists of applying a certain amount of random perturbation in a systematic manner to reduce the risk of reidentification. A number of geographic masking techniques have been developed as well as methods to quantity the risk of reidentification associated with a particular masking method. This paper presents a review of the current state-of-the-art in geographic masking, summarizing the various methods and their strengths and weaknesses. Despite recent progress, no universally accepted or endorsed geographic masking technique has emerged. Researchers on the other hand are publishing maps using geographic masking of confidential locations. Any researcher publishing such maps is advised to become familiar with the different masking techniques available and their associated reidentification risks.

  3. Ensuring Confidentiality of Geocoded Health Data: Assessing Geographic Masking Strategies for Individual-Level Data

    Paul A. Zandbergen

    2014-01-01

    Full Text Available Public health datasets increasingly use geographic identifiers such as an individual’s address. Geocoding these addresses often provides new insights since it becomes possible to examine spatial patterns and associations. Address information is typically considered confidential and is therefore not released or shared with others. Publishing maps with the locations of individuals, however, may also breach confidentiality since addresses and associated identities can be discovered through reverse geocoding. One commonly used technique to protect confidentiality when releasing individual-level geocoded data is geographic masking. This typically consists of applying a certain amount of random perturbation in a systematic manner to reduce the risk of reidentification. A number of geographic masking techniques have been developed as well as methods to quantity the risk of reidentification associated with a particular masking method. This paper presents a review of the current state-of-the-art in geographic masking, summarizing the various methods and their strengths and weaknesses. Despite recent progress, no universally accepted or endorsed geographic masking technique has emerged. Researchers on the other hand are publishing maps using geographic masking of confidential locations. Any researcher publishing such maps is advised to become familiar with the different masking techniques available and their associated reidentification risks.

  4. Frederick Soddy's invention of isotopes in 1911

    Attas, M.

    2011-01-01

    This paper describes the history of the invention of isotopes by Frederick Soddy in 1911. The idea of the nucleus had been conceived by a physicist, Ernest Rutherford. But it took a chemist, Frederick Soddy, to make chemical sense of the zoo of recently discovered radioactive elements, by inventing the idea of isotopes. He showed how one radioactive substance transformed itself spontaneously into another, following mathematical laws of exponential growth and decay. In his book The Chemistry of the Radio-Elements, Soddy compiled complete descriptions of the physical and chemical properties of each of the radioactive substances. He organized their sequences of transmutations by the.similarities in their chemical properties, so that the emanations, for example, were all side-by-side in a chart.

  5. Invented genealogies as political mythologies: definitionand examples

    Filip-Lucian Iorga

    2012-10-01

    Full Text Available The genealogical imaginary is a subcategory of the imaginary referring to the origin and it comprises a wide range of genealogical myths: fictitious ancestors, whether divine or human, fabulous kinships, invented genealogies, descendancies which are impossible to certify with documents, erroneous interpretations of certain degrees of kinship, real genealogies that have received unexpected interpretations and historiographic clichés grown on more or less attestable genealogies. The case of the Balş family is one of the most interesting: trying to integrate in the political structures of the Austrian and Russian Empire, some members of this old Moldavian family invent a fictitious genealogy that links the French counts of Baux, the Balsa family, a Serbian medieval dynasty and the Balş family, Moldavian boyars.

  6. The story of global patent inventions

    Wang, Yeun Jung

    1996-11-01

    This book introduces the global patent inventions, which are soap floating on the water, computer, radar, zipper, fuel cell, a raincoat, a pencil, a ball point pen, vitamin, an ice saw, a subway, post it, endoscope, ultrasonic detector, machine to pierce the hall, hair-restorer, a refrigerator, tricycle tractor of Benz steam engine of watt, carburettor, aluminum smelting process, video game, ice cream freezer, lead powder, piling system, burner using infrared rays, small projector, blender for recycling of resource, and artificial silk.

  7. The story of global patent inventions

    Wang, Yeun Jung

    1996-11-15

    This book introduces the global patent inventions, which are soap floating on the water, computer, radar, zipper, fuel cell, a raincoat, a pencil, a ball point pen, vitamin, an ice saw, a subway, post it, endoscope, ultrasonic detector, machine to pierce the hall, hair-restorer, a refrigerator, tricycle tractor of Benz steam engine of watt, carburettor, aluminum smelting process, video game, ice cream freezer, lead powder, piling system, burner using infrared rays, small projector, blender for recycling of resource, and artificial silk.

  8. Nanotechnological inventions considerably improve performance characteristics

    VLASOV Vladimir Alexeevich

    2014-06-01

    Full Text Available The invention «The method of production of carbon nanomaterial (RU 2509053» can be used as an additive for concretes and polymers which significantly improves their performance characteristics. The method of production of carbon nanomaterial consists of the following stages: preliminary preparation of sphagnous moss when it is refined from foreign admixtures, dried up to 10% humidity and ground, then ground material is exposed to pyrolysis under the temperature 850–950оC for 1–2 hours and cooled up to the environment temperature. After that amorphous carbon obtained in pyrolysis is treated with mechanical activation in the variable planetary mill for 7–10 hours. The invention makes it possible to provide increased outcome of nanotubes with high cleanliness. The invention «The method of production of nanodispersed metal powders and alloys of them (RU 2509626» relates to the powder metallurgy. Powder metal chloride or powder mixture at least of two metal chlorides is treated in the environment of the water steam which is supplied in reaction space at the rate of 50–100 ml/min at the temperature 400–800оC at the presence of absorbent carbon or introducing carbon oxide (II obtained during dissolution of formic acid HCOOH. The invention provides reliable production of nanodispersed metal powders and alloys of them from 3-d metal range: Ni, Co, Cu, Fe, Zn which can be used in powder metallurgy to improve baking process, in chemical industry as the fillers of polymers and reaction catalysts; as additives to anticorrosive covers, etc.

  9. Deepening Learning through Learning-by-Inventing

    Apiola, Mikko; Tedre, Matti

    2013-01-01

    It has been shown that deep approaches to learning, intrinsic motivation, and self-regulated learning have strong positive effects on learning. How those pedagogical theories can be integrated in computing curricula is, however, still lacking empirically grounded analyses. This study integrated, in a robotics-based programming class, a method of learning-by-inventing, and studied its qualitative effects on students’ learning through 144 interviews. Five findings were related with learning the...

  10. 13 CFR 120.1060 - Confidentiality of Reports, Risk Ratings and related Confidential Information.

    2010-01-01

    ... other than SBA's Lender oversight and SBA's portfolio management purposes. An SBA Lender, Intermediary... conjunction with SBA's Lender Oversight Program and SBA's portfolio management (for purposes of this... 13 Business Credit and Assistance 1 2010-01-01 2010-01-01 false Confidentiality of Reports, Risk...

  11. Drug Delivery Research: The Invention Cycle.

    Park, Kinam

    2016-07-05

    Controlled drug delivery systems have been successful in introducing improved formulations for better use of existing drugs and novel delivery of biologicals. The initial success of producing many oral products and some injectable depot formulations, however, reached a plateau, and the progress over the past three decades has been slow. This is likely due to the difficulties of formulating hydrophilic, high molecular weight drugs, such as proteins and nucleic acids, for targeting specific cells, month-long sustained delivery, and pulsatile release. Since the approaches that have served well for delivery of small molecules are not applicable to large molecules, it is time to develop new methods for biologicals. The process of developing future drug delivery systems, termed as the invention cycle, is proposed, and it starts with clearly defining the problems for developing certain formulations. Once the problems are well-defined, creative imagination examines all potential options and selects the best answer and alternatives. Then, innovation takes over to generate unique solutions for developing new formulations that resolve the previously identified problems. Ultimately, the new delivery systems will have to go through a translational process to produce the final formulations for clinical use. The invention cycle also emphasizes examining the reasons for success of certain formulations, not just the reasons for failure of many systems. Implementation of the new invention cycle requires new mechanisms of funding the younger generation of scientists and a new way of identifying their achievements, thereby releasing them from the burden of short-termism.

  12. The Transformation of Science Into Patented Inventions

    Beukel, Karin

    This paper presents the results of a grounded theory study of the transformation of scientific discoveries into patented inventions. Using an algebraic interpretive approach, the narratives collected during interviews are analyzed as Bayesian inferences and the developed theory is tested. The fin......This paper presents the results of a grounded theory study of the transformation of scientific discoveries into patented inventions. Using an algebraic interpretive approach, the narratives collected during interviews are analyzed as Bayesian inferences and the developed theory is tested....... The findings recast the relationship between science and patents as a process in which the way the transformation of the scientific invention is handled has an effect on the breadth of the patent scope. Unleashing patent scope surplus is dependent on processes related to abstraction and cognitive variety......, which can be mobilized by patent experts with both an in-depth understanding of the scientific discovery, due to their educational background in the life sciences, and capabilities within the legal framework for patenting. More specifically, the findings reveal previously unreported aspects...

  13. Validade de construto da versão brasileira do Inventário Espectral de Externalização: evidências a partir de uma amostra de estudantes universitários Construct validity of the Brazilian version of the Externalizing Spectrum Inventory: evidence from a university student sample

    Hudson Wander de Carvalho

    2010-01-01

    Full Text Available CONTEXTO: Externalização é uma dimensão das diferenças individuais que dá substrato e unifica traços impulsivos e agressivos de personalidade a transtornos mentais relacionados ao uso de substância e à conduta antissocial. OBJETIVOS: O presente estudo objetivou apresentar indicadores de validade de construto da versão brasileira do Inventário Espectral de Externalização. MÉTODO: Trata-se de um estudo psicométrico de orientação correlacional. Foram utilizadas duas técnicas clássicas de representação de construto: análise exploratória de fatores comuns e análise de consistência interna. A amostra consistiu de 258 participantes de ambos os sexos, provenientes de diferentes cursos universitários de duas instituições públicas do estado de Minas Gerais. RESULTADOS: A análise fatorial resultou em um modelo de um fator de segunda ordem (Externalização com três fatores de primeira ordem (dimensões de agressão, de uso de substância e de impulsividade/alienação. Os coeficientes alfa mostraram-se bastante elevados, com índices acima de 0,9 tanto para os três fatores de primeira ordem quanto para o fator geral. CONCLUSÃO: Combinados, os resultados trazem evidências de validade e de fidedignidade para a versão brasileira do Inventário Espectral de Externalização no que tange à sua aplicabilidade a estudantes universitários.BACKGROUND: Externalizing is a dimension of individual differences that undergirds and unites aggressive and impulsive personality traits to psychopathological disorders related to substance use and antisocial behavior. OBJECTIVES: The present study aims to establish parameters of construct validity for the Brazilian version of the Externalizing Spectrum Inventory. METHOD: This is a psychometrical correlacional study design. Two classical techniques of construct representation were implemented: unweighted least squares exploratory factor analysis and internal consistency analysis. The sample

  14. The end of medical confidentiality? Patients, physicians and the state in history.

    Rieder, Philip; Louis-Courvoisier, Micheline; Huber, Philippe

    2016-09-01

    Medical confidentiality has come under attack in the public sphere. In recent disasters both journalists and politicians have questioned medical confidentiality and claimed that in specific contexts physicians should be compelled to communicate data on their patients' health. The murders of innocent individuals by a suicidal pilot and a Swiss convicted criminal have generated polemical debates on the topic. In this article, historical data on medical confidentiality is used to show that medical practices of secrecy were regularly attacked in the past, and that the nature of medical confidentiality evolved through time depending on physicians' values and judgements. Our demonstration is based on three moments in history. First, at the end of the 16th century, lay authorities put pressure on physicians to disclose the names of patients suffering from syphilis. Second, in the 18th century, physicians faced constant demands for information about patients' health from relatives and friends. Third, employers and insurance companies in the 20th century requested medical data on sick employees. In these three different situations, history reveals that the concept of medical confidentiality was plastic, modelled in the first instance to defend well-to-do patients, in the second instance it was adapted to accommodate the physician's social role and, finally, to defend universal values and public health. Medical secrecy was, and is today, a medical and societal norm that is shaped collectively. Any change in its definition and enforcement was and should be the result of negotiations with all social actors concerned. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://www.bmj.com/company/products-services/rights-and-licensing/

  15. 75 FR 54656 - Government-Owned Inventions, Available for Licensing

    2010-09-08

    ... availability of inventions for licensing. SUMMARY: Patent applications on the inventions listed below assigned..., Pasadena, CA 91109; telephone (818) 354-7770. NASA Case No.: NPO-46771-1: Diamond Heat-Spreader for...

  16. 78 FR 31948 - Government-Owned Inventions; Availability for Licensing

    2013-05-28

    ... DEPARTMENT OF HEALTH AND HUMAN SERVICES National Institutes of Health Government-Owned Inventions... research and development. Foreign patent applications are filed on selected inventions to extend market... libraries Optimization assay to further develop potential drug candidates Competitive Advantages: Fast...

  17. Economy and Transparency: The Model Invention

    Mahmud Hassan TALUKDAR

    2013-12-01

    Full Text Available Relation of Transparency and Economic growth is a long global debate in the society. Theoretically, policy makers, scholars and researchers argue that there is a close relation among these two variables. However, the quantitative relation and any global model is yet unrevealed. So, the main aim of this paper is to ascertain the nature, dimension and extent of the relationship between economy and Transparency as well as to invent a global model. This paper is useful for researchers, planners, policy makers and scholars who are directly or indirectly involved or willing to involve in the thrust for quantitative relation of these two variables. Literature review is the main source of information of this study. In introductory section, this paper briefly describes theoretical relationship of economy and Transparency as well as it also describes the proxy variables.GDP (2012 of different countries are used as proxy of Economy and Corruption Perception Index (CPI scores (2012 of different countries are used as proxy of level of Transparency. In methodology section this paper describes the detail methodology, sampling procedure and level of analysis. This study randomly selects 30 countries (10 from higher CPI scores+10 from moderate CPI scores+ 10 from lower CPI scores around the globe as sample. In the third section, this research presents the correlation value which divulge that there is a positive correlation (p=.047 with 95% confidence level. That reveals, if the level of transparency of any country increase, the GDP also increase accordingly. Then in this section two quantitative models are developed using linear regression analysis. First invented model is: Economy (GDP in billion US$ = [(8.983*Level of transparency -108.11]. This paper termed the first invented model as “Mahmud EcoT Model-1”. This model calibrates that one unit improvement of transparency leads 8.98 billion US$ improvement in the GDP of a country. Then taking this unit

  18. Privacy, confidentiality and automated health information systems.

    Vuori, H

    1977-12-01

    Professor Vuori's paper, first presented at the fourth Medico-legal Conference in Prague in the spring of this year, deals with the problem of the maintenance of confidentiality in computerized health records. Although more and more information is required, the hardware of the computer systems is so sophisticated that it would be very expensive indeed to 'break in' and steal from a modern data bank. Those concerned with programming computers are becoming more aware of their responsibilities concerning confidentiality and privacy, to the extent that a legal code of ethics for programmers is being formulated. They are also aware that the most sensitive of all relationships--the doctor-patient relationship--could be in danger if they failed to maintain high standards of integrity. An area of danger is where administrative boundaries between systems must be crossed--say between those of health and employment. Protection of privacy must be ensured by releasing full information about the type of data being stored, and by maintaining democratic control over the establishment of information systems.

  19. Ombuds’ corner: Open door and confidentiality

    Vincent Vuillemin

    2013-01-01

    For the Open Days, CERN will be transparent for all visitors. It's also the occasion to remember that the Ombuds' door is fully open every day of the year for all persons working for or on behalf of CERN.   The door is open, but as soon as it's closed for a discussion, the office becomes a place where total confidentiality is preserved. This may appear as a contradiction, no? The Ombuds is available to help everyone in all circumstances, but his clause of confidentiality prevents him from acting without the consent of his “visitors”. How can he possibly resolve the in-house conflicts in groups, or units, if all the parties do not voluntarily participate in its resolution? The answer is clear: the job of the Ombuds is to help the parties resolve their conflict by themselves. He will provide a few rules of communication, a process of mutual respect, suggest some possibilities that the parties may want to follow, and mediate the dispute so that people...

  20. Confidential Declaration of Family Situation (CDFS)

    Human Resources Department

    2005-01-01

    The Confidential Declaration of Family Situation (CDFS) becomes a new computerized EDH form from October 2005 In accordance with Article R IV 1.17 of the Staff Regulations, Staff Members and Fellows, married or separated, must notify any changes in their spouse's income or health insurance cover in writing to CERN, within 30 calendar days of the change. This is necessary for the Organization to determine if a supplementary contribution is payable to the CERN Health Insurance Scheme (CHIS) for the spouse's coverage and, if so, the amount. Until now a paper form called « Confidential Declaration of Family Situation » (CDFS) was used for that purpose.  From early October 2005 the CDFS will be computerized for the whole Organization. Henceforth, any changes in a spouse's income or health insurance cover must be notified using EDH (Electronic Document Handling). Additionally, annual updates of the declaration will be required and will be requested by automatic e-mail. Early October an email will be sent to...

  1. Confidential Declaration of Family Situation (CDFS)

    Human Resources Department

    2005-01-01

    The Confidential Declaration of Family Situation (CDFS) becomes a new computerized EDH form from October 2005 In accordance with Article R IV 1.17 of the Staff Regulations, Staff Members and Fellows, married or separated, must notify any changes in their spouse's income or health insurance cover in writing to CERN, within 30 calendar days of the change. This is necessary for the Organization to determine if a supplementary contribution is payable to the CERN Health Insurance Scheme (CHIS) for the spouse's coverage and, if so, the amount. Until now a paper form called « Confidential Declaration of Family Situation » (CDFS) was used for that purpose.  From early October 2005 the CDFS will be computerized for the whole Organization. Henceforth, any changes in a spouse's income or health insurance cover must be notified using EDH (Electronic Document Handling). Additionally, annual updates of the declaration will be required and will be requested by automatic e-mail. Early October an email will be...

  2. 76 FR 13193 - Government-Owned Inventions; Availability for Licensing

    2011-03-10

    ...-451-7533 for more information. Method for the Detection of a Subdural Hematoma Using a Handheld Hematoma Detector and Discriminator Description of Invention: The invention offered for licensing and... utilized to discriminate between subdural and epidural hematoma. The invention also discloses a novel...

  3. 75 FR 39544 - Government-Owned Inventions; Availability for Licensing

    2010-07-09

    ... inventions to extend market coverage for companies and may also be available for licensing. ADDRESSES... might be used as a basis for a potential new strategy in cancer therapeutics. The invention also might... novel way to target various cancers for treatment. This invention maybe also useful in regenerative...

  4. Identifying and Developing Inventive Talent in the Republic of Korea

    Lee, Seungmo

    2016-01-01

    In the 21st century, the need to develop creative potential through education is more critical than ever. Invention-gifted education is one approach that can both foster creativity and develop inventive talent. Invention-gifted education in the Republic of Korea is distinctive in its systematic approach to talent identification and talent…

  5. 40 CFR 40.160-3 - Reporting of inventions.

    2010-07-01

    ... application. (b) A final invention report is required within 90 days after completion of the project period... 40 Protection of Environment 1 2010-07-01 2010-07-01 false Reporting of inventions. 40.160-3... ASSISTANCE RESEARCH AND DEMONSTRATION GRANTS § 40.160-3 Reporting of inventions. As provided in appendix B of...

  6. 37 CFR 1.293 - Statutory invention registration.

    2010-07-01

    ... the date of publication of the statutory invention registration; (2) The required fee for filing a request for publication of a statutory invention registration as provided for in § 1.17 (n) or (o); (3) A... application. (b) Any request for publication of a statutory invention registration must include the following...

  7. 12 CFR 563g.13 - Public disclosure and confidential treatment.

    2010-01-01

    ... 12 Banks and Banking 5 2010-01-01 2010-01-01 false Public disclosure and confidential treatment. 563g.13 Section 563g.13 Banks and Banking OFFICE OF THRIFT SUPERVISION, DEPARTMENT OF THE TREASURY SECURITIES OFFERINGS § 563g.13 Public disclosure and confidential treatment. (a) Any offering circular...

  8. 7 CFR 1205.540 - Confidential books, records, and reports.

    2010-01-01

    ... 7 Agriculture 10 2010-01-01 2010-01-01 false Confidential books, records, and reports. 1205.540 Section 1205.540 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL... Confidential books, records, and reports. All information obtained from the books, records, and reports of...

  9. 19 CFR 210.5 - Confidential business information.

    2010-04-01

    ... 19 Customs Duties 3 2010-04-01 2010-04-01 false Confidential business information. 210.5 Section 210.5 Customs Duties UNITED STATES INTERNATIONAL TRADE COMMISSION INVESTIGATIONS OF UNFAIR PRACTICES IN IMPORT TRADE ADJUDICATION AND ENFORCEMENT Rules of General Applicability § 210.5 Confidential...

  10. Client confidentiality: Perspectives of students in a healthcare ...

    This moral dilemma is difficult for students to circumvent and therefore this paper presents healthcare students' perspectives of confidentiality. Methods. We aimed to explore healthcare students' views and experiences of confidentiality as an ethical principle by adopting a qualitative explorative approach. Purposeful ...

  11. Library Records: A Review of Confidentiality Laws and Policies.

    Million, Angela C.; Fisher, Kim N.

    1986-01-01

    Cites the importance of having a state law, knowing what it says, and having a library policy statement regarding the confidentiality of patron records. Discussion covers writing and implementing a policy, the role of automation, existing laws, library records defined, exceptions to confidentiality, and legal liability. Thirty-seven references are…

  12. 29 CFR 4010.13 - Confidentiality of information submitted.

    2010-07-01

    ... REPORTING AND DISCLOSURE REQUIREMENTS ANNUAL FINANCIAL AND ACTUARIAL INFORMATION REPORTING § 4010.13 Confidentiality of information submitted. In accordance with § 4901.21(a)(3) of this chapter and ERISA section... 29 Labor 9 2010-07-01 2010-07-01 false Confidentiality of information submitted. 4010.13 Section...

  13. 20 CFR 726.113 - Disclosure of confidential information.

    2010-04-01

    ... MINE OPERATOR'S INSURANCE Authorization of Self-Insurers § 726.113 Disclosure of confidential... 20 Employees' Benefits 3 2010-04-01 2010-04-01 false Disclosure of confidential information. 726... authorized self-insurer or applicant for the authorization of self-insurance obtained by the Office shall be...

  14. 15 CFR 718.2 - Identification of confidential business information.

    2010-01-01

    ... business information. 718.2 Section 718.2 Commerce and Foreign Trade Regulations Relating to Commerce and Foreign Trade (Continued) BUREAU OF INDUSTRY AND SECURITY, DEPARTMENT OF COMMERCE CHEMICAL WEAPONS CONVENTION REGULATIONS CONFIDENTIAL BUSINESS INFORMATION 718.2 Identification of confidential business...

  15. 19 CFR 181.121 - Maintenance of confidentiality.

    2010-04-01

    ... 181.121 Customs Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY; DEPARTMENT OF THE TREASURY (CONTINUED) NORTH AMERICAN FREE TRADE AGREEMENT Confidentiality of Business... possession of confidential business information collected pursuant to this part shall, in accordance with...

  16. 75 FR 75586 - Confidentiality of Suspicious Activity Reports

    2010-12-03

    ...] RIN 1550-AC26 Confidentiality of Suspicious Activity Reports AGENCY: The Office of Thrift Supervision... implementing the Bank Secrecy Act (BSA) governing the confidentiality of a suspicious activity report (SAR) to... corporations regulated by the OTS, to keep certain records and make certain reports that have been determined...

  17. Confidentiality: From the Stacks to the Witness Stand.

    Lee, Janis M.; Smith, G. Guy

    1988-01-01

    A library director describes her experience of safeguarding the confidentiality of the circulation records of a woman who went on a shooting rampage at a shopping mall. The lawyer who represented the library discusses the legal responsibility of public and school libraries concerning confidentiality. (CLB)

  18. 50 CFR 600.130 - Protection of confidentiality of statistics.

    2010-10-01

    ... statistics. 600.130 Section 600.130 Wildlife and Fisheries FISHERY CONSERVATION AND MANAGEMENT, NATIONAL... Fishery Management Councils § 600.130 Protection of confidentiality of statistics. Each Council must establish appropriate procedures for ensuring the confidentiality of the statistics that may be submitted to...

  19. 42 CFR 35.11 - Clinical records; confidential.

    2010-10-01

    ... EXAMINATIONS HOSPITAL AND STATION MANAGEMENT General § 35.11 Clinical records; confidential. A complete clinical record shall be maintained for each patient admitted to a station or hospital of the Service. Such... 42 Public Health 1 2010-10-01 2010-10-01 false Clinical records; confidential. 35.11 Section 35.11...

  20. Genetic secrets: Protecting privacy and confidentiality in the genetic era

    Rothstein, M.A. [ed.

    1998-07-01

    Few developments are likely to affect human beings more profoundly in the long run than the discoveries resulting from advances in modern genetics. Although the developments in genetic technology promise to provide many additional benefits, their application to genetic screening poses ethical, social, and legal questions, many of which are rooted in issues of privacy and confidentiality. The ethical, practical, and legal ramifications of these and related questions are explored in depth. The broad range of topics includes: the privacy and confidentiality of genetic information; the challenges to privacy and confidentiality that may be projected to result from the emerging genetic technologies; the role of informed consent in protecting the confidentiality of genetic information in the clinical setting; the potential uses of genetic information by third parties; the implications of changes in the health care delivery system for privacy and confidentiality; relevant national and international developments in public policies, professional standards, and laws; recommendations; and the identification of research needs.

  1. Universe

    2009-01-01

    The Universe, is one book in the Britannica Illustrated Science Library Series that is correlated to the science curriculum in grades 5-8. The Britannica Illustrated Science Library is a visually compelling set that covers earth science, life science, and physical science in 16 volumes.  Created for ages 10 and up, each volume provides an overview on a subject and thoroughly explains it through detailed and powerful graphics-more than 1,000 per volume-that turn complex subjects into information that students can grasp.  Each volume contains a glossary with full definitions for vocabulary help and an index.

  2. Evaluation of Energy-Related Inventions Program: An Empirical Analysis of 204 Inventions; TOPICAL

    Brown, M.A.

    1987-01-01

    This report is an evaluation of the Energy-Related Inventions Program (ERIP). It assess the program's effectiveness and impacts, characterizes participating inventions and inventors, and identifies correlates of successful commercialization in order to suggest possible improvements. Seventy of the 204 ERIP inventions that were studied were successfully introduced into the market, accounting for more than$200M in sales from 1976 through 1984. During 1984, 921 full-time equivalent employees were supported directly by ERIP inventors or their licensees. (Estimates of indirect economic impacts are also contained in the report.) Data on patterns of fund raising clearly show a need for assistance by programs like ERIP. Commercially successful inventors shared several traits. They had less formal education, fewer patents, more work experience in small firms, more outside funding early in their work, more shared responsibility with others for invention development, more management experience, and greater previous experience with starting new businesses. Recommendations are made regarding: (1) priorities for allocating ERIP grants; (2) improved efficiency of the NBS/DOE operations; (3) delivery of technical and commercialization assistance to grant recipients; and (4) further evaluation research

  3. Protecting Privacy and Confidentiality in Environmental Health Research.

    Resnik, David B

    2010-01-01

    Environmental health researchers often need to make difficult decisions on how to protect privacy and confidentiality when they conduct research in the home or workplace. These dilemmas are different from those normally encountered in clinical research. Although protecting privacy and confidentiality is one of the most important principles of research involving human subjects, it can be overridden to prevent imminent harm to individuals or if required by law. Investigators should carefully consider the facts and circumstances and use good judgment when deciding whether to breach privacy or confidentiality.

  4. The invention of the athletic body

    Hortensia Moreno

    2013-01-01

    Full Text Available Based on two mythic figures − one belonging to classic Greece (the “Glowing Body”, and another to primitive Christianity (the “Heavenly Body” − I reflect on the symbolic logic of exclusion as enacted in four moments in the history of the Olympic Games. The first has to do with the invention of amateurism in the sporting philosophy of Coubertin, or the class exclusion. The second refers to the Anthropology Days held at the 1904 Olympic Games in Saint Louis (Missouri, or the ethnic/racial exclusion. The third is the Berlin Parade of Nations in 1936, or the national supremacy. The fourth explores the introduction of gender verification in Mexico City (1968, or the gender exclusion. In this fashion, we re-connect the imagined/imaginary configuration of the body with practices and politics which will result in an anthropological rationalization of discrimination.

  5. Physical tools for textile creativity and invention

    Heimdal, Elisabeth Jacobsen; Lenau, Torben Anker

    2010-01-01

    Two textile research projects (one completed and one ongoing) are described, where physical inspirational tools are developed and tested with the aim of stimulating textile creativity and invention, i.e. the use of textile materials in new kinds of products, thus bringing textiles into new contexts....... The first research project (completed) concerns how textile designers use new responsive materials and technologies, whereas the second (ongoing) concerns how architects and design engineers can use textile materials. In both projects, the developed inspirational tool is tested through workshops...... with the mentioned stakeholders. In these workshops, new ways of disseminating the results from research in textiles and textile design are experimented with. The submitted contribution therefore mainly addresses the role of interdisciplinarity in textile design research as well as the impact of new materials...

  6. Singapore: The Politics of Inventing National Identity

    Stephan Ortmann

    2009-01-01

    Full Text Available This study wants to shed new light on the politics of Singapore’s national identity invention. Since independence in 1965, the Singaporean government has tried to generate a sense of national identity in Singapore. While at first, the priority was on pragmatic values to promote the economic development, this changed in the late 1980s when the government became concerned with the widespread materialism within the society. As an alternative, so-called Asian values sought to provide an ideological alternative and a new basis for a stronger national identity. At the same time, average Singaporeans have developed their own unique conceptions of the city-state’s national identity, which sometimes contradict the official nation-building efforts and thus constitute a subtle form of opposition. Many Singaporeans demand greater participation in the negotiation of their Singaporean identity, which demonstrates the difficulty of constructing a sustainable authoritarian civic national identity.

  7. Consciousness and the Invention of Morel

    Lampros ePerogamvros

    2013-03-01

    Full Text Available A scientific study of consciousness should take into consideration both objective and subjective measures of conscious experiences. To this date, very few studies have tried to integrate third-person data, or data about the neurophysiological correlates of conscious states, with first-person data, or data about subjective experience. Inspired by Morel’s invention (Casares, 1940, a literary machine capable of reproducing sensory-dependent external reality, this article suggests that combination of virtual reality techniques and brain reading technologies, that is, decoding of conscious states by brain activity alone, can offer this integration. It is also proposed that the multimodal, simulating and integrative capacities of the dreaming brain render it an 'endogenous' Morel's machine, which can potentially be used in studying consciousness, but not always in a reliable way. Both the literary machine and dreaming could contribute to a better understanding of conscious states.

  8. The Democratic Invention. A Reading of Lefort.

    Matías Sirczuk

    2014-12-01

    Full Text Available In this paper I will present the way in which Lefort interprets modern democracy as a new form of society in regard to the sources of law and legitimacy. Lefort is a thinker who is difficult to place within the context of contemporary political theory: he not only defends democracy against Marxism but also thinks that this form of society cannot be circumscribed within the limits of the modern state, nor be understood through the categories that the tradition of political philosophy has developed to distinguish between political regimes. Lefort combines the defense of democracy with a radical critique of the established order. He identifies the democratic invention with the institution of a dynamic that makes, by right, the radical questioning of law the source of political legitimacy.

  9. How important are local inventive milieus

    Ejermo, Olof; Hansen, Høgni Kalsø

    2015-01-01

    positive effects are also evident from birthplace, whereas no consistent positive effect can be derived from individuals’ high school location. Therefore, the formative influences mainly deriving from family upbringing, birth region and from local milieu effects arising from a conscious choice to attend......Using data on the entire population in combination with data on almost all individuals in Sweden listed as inventors, we study how the probability of being listed on a patent as inventor is influenced by the density of other future inventors residing in the same region. In this process, we control...... for demographic and sector effects along with the educational characteristics of parents. This approach allows us to trace how location history influences individuals’ inventive capacity. We focus on three types of influences: (a) future inventors in the municipality around the time of birth, (b) future inventors...

  10. The electronics revolution inventing the future

    Williams, J B

    2017-01-01

    This book is about how electronics, computing, and telecommunications have profoundly changed our lives – the way we work, live, and play. It covers a myriad of topics from the invention of the fundamental devices, and integrated circuits, through radio and television, to computers, mobile telephones and GPS. Today our lives are ruled by electronics as they control the home and computers dominate the workspace. We walk around with mobile phones and communicate by email. Electronics didn’t exist until into the twentieth century. The industrial revolution is the term usually applied to the coming of steam, railways and the factory system. In the twentieth century, it is electronics that has changed the way we gather our information, entertain ourselves, communicate and work. This book demonstrates that this is, in fact, another revolution. .

  11. Ethical limitations in patenting biotechnological inventions.

    Lugagnani, V

    1999-01-01

    In order to connect ethical considerations with practical limits to patentability, the moral judgement should possibly move from the exploitation of the invention to the nature and/or objectives of Research and Development (R&D) projects which have produced it: in other words, it appears quite reasonable and logical that Society is not rewarding unethical R&D activities by granting intellectual property rights. As far as biotechnology R&D is concerned, ethical guidance can be derived from the 1996 Council of EuropeOs OConvention for the protection of human rights and dignity of the human being with regard to the application of biology and medicineO, whose Chapter V - Scientific research - provides guidelines on: i. protection of persons undergoing research (e.g. informed consent); ii. protection of persons not able to consent to research; iii. research on embryos in vitro. As far as the specific point of patenting biotechnology inventions is concerned, the four exclusions prescribed by Directive 98/44/EC (i.e. human cloning, human germ-line gene therapy, use of human embryos for commercial purposes, unjustified animal suffering for medical purposes) are all we have in Europe in terms of ethical guidance to patentability. In Italy, in particular, we certainly need far more comprehensive legislation, expressing SocietyOs demand to provide ethical control of modern biotechnology. However it is quite difficult to claim that ethical concerns are being raised by currently awarded biotechnology patents related to living organisms and material thereof; they largely deal with the results of genomic R&D, purposely and usefully oriented toward improving health-care and agri-food processes, products and services. ONo patents on lifeOO can be an appealing slogan of militants against modern biotechnology, but it is far too much of an over-simplified abstraction to become the Eleventh Commandment our Society.

  12. Invention Development Program Helps Nurture NCI at Frederick Technologies | Poster

    The Invention Development Fund (IDF) was piloted by the Technology Transfer Center (TTC) in 2014 to facilitate the commercial development of NCI technologies. The IDF received a second round of funding from the NCI Office of the Director and the Office of Budget and Management to establish the Invention Development Program (IDP) for fiscal year 2016. The IDP is using these funds to help advance a second set of inventions.

  13. Energy-Related Inventions Program: an overview of the evaluation

    Soderstrom, E.J.; Bronfman, L.M.; Rorke, M.G.

    1983-09-01

    The Energy-Related Inventions Program (ERIP) is jointly administered by the US Departments of Energy and Commerce. Grants were awarded for 165 of 208 inventions recommended by the National Bureau of Standards (NBS). Of the 165 inventions, 46 have been able to acquire follow-on financing from a variety of sources. Further, 35 of the inventions have reached the marketplace, and their cumulative sales to date total $178 million. An additional 10 inventions are now starting into production. Jobs that have been created directly by production related to the inventions total 756; additional spin-off jobs attributable to the inventions include component and material suppliers, jobbers, franchisees, and distributors. The program was recently evaluated at Oak Ridge National Laboratory, with the following conclusions: (1) the evaluation process at NBS has been successful in identifying technically and economically feasible inventions, (2) the success rate for the program is about equivalent to the reported success rates of private venture capital firms, (3) the program is supporting inventions at a point in their development where they are supported by neither the venture capital community nor industry, and (4) the one-time DOE grants and the associated ERIP support to inventors have been successful in readying inventors for follow-on financing from the private sector.

  14. 7 CFR 1150.184 - Patents, copyrights, inventions and publications.

    2010-01-01

    ... MARKETING SERVICE (Marketing Agreements and Orders; Milk), DEPARTMENT OF AGRICULTURE DAIRY PROMOTION PROGRAM... the rental, sale, leasing, franchising, or other uses of such patents, copyrights, inventions, or...

  15. 7 CFR 1220.254 - Patents, copyrights, inventions, and publications.

    2010-01-01

    ...) AGRICULTURAL MARKETING SERVICE (MARKETING AGREEMENTS AND ORDERS; MISCELLANEOUS COMMODITIES), DEPARTMENT OF..., franchising, or other uses of such patents, copyrights, inventions, or publications, inure to the benefit of...

  16. To succeed using patent and invention which are brillant idea

    Yu, Jae Bok

    1999-07-01

    This book deals with what invention is, how we can be a inventor, how we apply inventions to intellectual property office, and other useful advice and lesson on patent. These are the titles of each part : trouble stories on success to invent, everybody can be a inventor, this is a invention. There is a problem when the idea is same or similar, preceding patent, where does it hide? database on patent, patent information, Let's go to Korean intellectual property office, patient application which we misses in our dream, and instructions of patent including various sides.

  17. Ethics in health care: confidentiality and information technologies

    information could result in confidential patient data falling ... Before the advent of the new communication and information technologies (NCITs), patient care was sometimes delayed .... computer system intended to be used and the security.

  18. Novel approach to information security management of confidential ...

    Novel approach to information security management of confidential and propriety information ... Journal of Fundamental and Applied Sciences ... valuable information by using steganography it can have a major impact security management.

  19. Privacy Perspectives for Online Searchers: Confidentiality with Confidence?

    Duberman, Josh; Beaudet, Michael

    2000-01-01

    Presents issues and questions involved in online privacy from the information professional's perspective. Topics include consumer concerns; query confidentiality; securing computers from intrusion; electronic mail; search engines; patents and intellectual property searches; government's role; Internet service providers; database mining; user…

  20. 7 CFR 983.9 - Confidential data or information.

    2010-01-01

    ... 7 Agriculture 8 2010-01-01 2010-01-01 false Confidential data or information. 983.9 Section 983.9 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (Marketing... customers. ...

  1. 40 CFR 86.615-84 - Treatment of confidential information.

    2010-07-01

    ...) Selective Enforcement Auditing of New Light-Duty Vehicles, Light-Duty Trucks, and Heavy-Duty Vehicles § 86... part 2, subpart B. (b) Any claim of confidentiality must accompany the information at the time it is...

  2. Building Trust and Confidentiality in Cloud computing Distributed ...

    new technology, this new way of doing business brings with it new challenges, ... In this paper, we looked at data security, described the current state of data ... has the potential to solve many threats concerning confidentiality and adoption of

  3. Confidentiality, disclosure and doping in sports medicine.

    McNamee, M; Phillips, N

    2011-03-01

    The manner in which healthcare and medical professionals serve their athlete patients is governed by a variety of relevant codes of conduct. A range of codified rules is presented that refer both the welfare of the patient and the maintaining of confidentiality, which is at the heart of trustworthy relations. The 2009 version of the World Anti-Doping Code (WADC), however, appears to oblige all healthcare professionals not to assist athletes if they are known to be engaged in doping behaviours under fear of removal from working with athletes from the respective sports. In contrast, serving the best interests of their athlete patients may oblige healthcare professionals to give advice and guidance, not least in terms of harm minimisation. In so far as the professional conduct of a healthcare professional is guided both by professional code and World Anti-Doping Code, they are obliged to fall foul of one or the other. We call for urgent and pressing inter-professional dialogue with the World Anti-Doping Agency to clarify this situation.

  4. WTO confidential: the case of asbestos.

    Castleman, Barry

    2003-01-01

    The World Trade Organization (WTO), established in 1995, adjudicates "trade disputes" between member nations in cases with human rights, cultural, environmental, and public health significance. Throughout the resolution process and even after a case's conclusion, little of what happens is made accessible to the public. However, it is one thing to criticize the WTO for its lack of transparency from outside the process and another to critically examine what was withheld from disclosure and what dangers that presents. This is the inside story from a scientific adviser to one party in a WTO case, who analyzes what happened from a public health point of view. The analysis concludes that the public health justification for banning asbestos was accepted in the end by WTO economists, despite the WTO's bias in favor of the party (Canada) making the free trade challenge (to public health legislation), despite the WTO's lack of expertise in science, medicine, engineering, and public health, and despite important erroneous statements made to the WTO under the cover of confidentiality. The case nevertheless illustrates that the WTO's threat to national sovereignty could never withstand the light of day if the limitations and dangers of the process were open for all to see.

  5. Security without obscurity a guide to confidentiality, authentication, and integrity

    Stapleton, JJ

    2014-01-01

    The traditional view of information security includes the three cornerstones: confidentiality, integrity, and availability; however the author asserts authentication is the third keystone. As the field continues to grow in complexity, novices and professionals need a reliable reference that clearly outlines the essentials. Security without Obscurity: A Guide to Confidentiality, Authentication, and Integrity fills this need. Rather than focusing on compliance or policies and procedures, this book takes a top-down approach. It shares the author's knowledge, insights, and observations about infor

  6. Analysis of LYSA-calculus with explicit confidentiality annotations

    Gao, Han; Nielson, Hanne Riis

    2006-01-01

    Recently there has been an increased research interest in applying process calculi in the verification of cryptographic protocols due to their ability to formally model protocols. This work presents LYSA with explicit confidentiality annotations for indicating the expected behavior of target...... malicious activities performed by attackers as specified by the confidentiality annotations. The proposed analysis approach is fully automatic without the need of human intervention and has been applied successfully to a number of protocols....

  7. Breaching confidentiality: medical mandatory reporting laws in Iran.

    Milanifar, Alireza; Larijani, Bagher; Paykarzadeh, Parvaneh; Ashtari, Golanna; Mehdi Akhondi, Mohammad

    2014-01-01

    Medical ethics is a realm where four important subjects of philosophy, medicine, theology and law are covered. Physicians and philosophers cooperation in this area will have great efficiency in the respective ethical rules formation. In addition to respect the autonomy of the patient, physician's obligation is to ensure that the medical intervention has benefit for the patient and the harm is minimal. There is an obvious conflict between duty of confidentiality and duty of mandatory reporting. Professional confidentiality is one of the basic components in building a constant physician-patient relationship which nowadays, beside the novelty, it is the subject of discussion. Legal obligation of confidentiality is not absolute. In physician-patient relationship, keeping patient's secrets and maintaining confidentiality is a legal and ethical duty, and disclosure of such secrets is mainly through specific statutes. Thus, there are a number of situations where breach of confidentiality is permitted in different legal systems. One of the situations where breaching confidentiality is permitted is the medical mandatory reporting to the relevant authority which is in accordance with many countries' legal systems. Some situations are considered in many countries legal systems' such as notification of births and deaths, infectious diseases, child abuse, sport and relevant events, medical errors, drug side effects and dangerous pregnancies. In this paper, we will examine and discuss medical mandatory reporting and its ethical and legal aspects in the judicial and legal system of Iran and few other countries. Finally we will suggest making Medical Mandatory Reporting Law in Iran.

  8. Confidential donation confirmation as an alternative to confidential unit exclusion: 15 months experience of the HEMOMINAS foundation

    Flávia Cristine Martineli Loureiro

    2011-01-01

    Full Text Available BACKGROUND: Confidential unit exclusion remains a controversial strategy to reduce the residual risk of transfusion-transmitted infections. OBJECTIVE: This study aimed to analyze confidential unit exclusion from its development in a large institution in light of confidential donation confirmation. METHODS: Data of individuals who donated from October 1, 2008 to December 31, 2009 were analyzed in a case-control study. The serological results and sociodemographic characteristics of donors who did not confirm their donations were compared to those who did. Variables with p-values < 0.20 in univariate analysis were included in a logistic multivariate analysis. RESULTS: In the univariate analysis there was a statically significant association between positive serological results and response to confidential donation confirmation of "No". Donation type, (firsttime or return donor - OR 1.69, CI 1.37-2.09, gender (OR 1.66, CI 1.35-2.04, education level (OR 2.82, CI 2.30-3.47 and ethnic background (OR 0.67, CI 0.55-0.82 were included in the final logistic regression model. In all logistic regression models analyzed, the serological suitability and confidential donation confirmation were not found to be statistically associated. The adoption of new measures of clinical classification such as audiovisual touch-screen computer-assisted self-administered interviews might be more effective than confidential unit exclusion in the identification of donor risk behavior. The requirement that transfusion services continue to use confidential unit exclusion needs to be debated in countries where more specific and sensitive clinical and serological screening methods are available. CONCLUSION: Our findings suggest that there are not enough benefits to justify continued use of confidential donation confirmation in the analyzed institution.

  9. Reliability of the Social Phobia and Anxiety Inventory (SPAI Portuguese version in a heterogeneous sample of Brazilian university students Fidedignidade da versão em português do Inventário de Ansiedade e Fobia Social (SPAI em amostra heterogênea de estudantes universitários brasileiros

    Patrícia Picon

    2005-06-01

    Full Text Available OBJECTIVE: To evaluate internal consistency and temporal stability trough test re-test reliability of the Portuguese version of the Social Phobia and Anxiety Inventory (SPAI in a heterogeneous Brazilian sample. METHODS: After informed consent, the translated and adapted version of the SPAI Portuguese was tested and re-tested at a 14-day interval in a sample of 225 university students, both genders, from 4 different undergraduate courses. After double data entry, statistical analysis included Cronbach's alphas, Pearson and intra-class correlation coefficients. RESULTS: The studied sample consisted of 213 students from 4 sub-samples: 95 law students, 31 social communication students, 54 civil engineering students and 33 dental medicine students. The mean age was 23 (±6 years and 110 (51.6% were female. The Cronbach' alpha was 0.96, no difference for both genders. The differential (total score of the SPAI Portuguese showed Pearson coefficient 0.83 (95% CI 0.78-0.87 and Intra-class coefficient 0.83 (95% CI 0.78-0.86. There was no statistical difference in Pearson coefficients between genders (p = 0.121 and the 4 sub-samples (p = 0.258. CONCLUSION: The results do not ensure validity, however, the SPAI Portuguese version presented a good content homogeneity with satisfactory level of internal consistency. The temporal stability evaluated was substantial. The results showed that the Portuguese SPAI presents perfectly acceptable reliability for both genders and suggest that it can be used in Brazilian populationsOBJETIVO: Avaliar consistência interna e estabilidade temporal, através de fidedignidade teste-reteste, da versão em português do Inventário de Ansiedade e Fobia Social (SPAI, em uma amostra brasileira heterogênea. MÉTODOS: Após consentimento informado, a versão traduzida e adaptada para o português do SPAI foi testada e re-testada, com 14 dias de intervalo, em uma amostra de 225 estudantes universitários de ambos os gêneros, de

  10. The practical Einstein experiments, patents, inventions

    Illy, József

    2012-01-01

    Albert Einstein may be best known as the wire-haired whacky physicist who gave us the theory of relativity, but that's just one facet of this genius' contribution to human knowledge and modern science. As Jozsef Illy expertly shows in this book, Einstein had an eminently practical side as well. As a youth, Einstein was an inveterate tinkerer in the electrical supply factory his father and uncle owned and operated. His first paid job was as a patent examiner. Later in life, Einstein contributed to many inventions, including refrigerators, microphones, and instruments for aviation. In published papers, Einstein often provided ways to test his theories and fundamental problems of the scientific community of his times. He delved deeply into a variety of technological innovations, most notably the gyrocompass, and consulted for industry in patent cases and on other legal matters. Einstein also provided explanations for common and mundane phenomena, such as the meandering of rivers. In these and other hands-on exam...

  11. Why Is Hard To Patent An Invention?

    2007-01-01

    Full Text Available When employed by a company, in almost all the cases a new employee has to sign an agreement giving the company exclusive rights to any intellectual property developed as part of their work assignments. This agreement could extend beyond a change of jobs and cause conflict of interests in new employment situations. A patent is a government-granted monopoly given to an inventor as both a reward for the intellectual and financial investment, and a stimulus to innovate. As a monopoly, the patent has legal power to exclude others from exploiting the invention in any way for a period of 20 years from the time the patent application has been filed. A trademark provides instant recognition of a product or company; a service mark provides instant recognition of a service. They both have unlimited lifetime. But the owner must renew or confirm continuous use at the end of five years, and every 10 years thereafter. A trade secret is information keep secret by the owner to give him advantage over competitors. Since it is secret, a trade secret protection has unlimited lifetime.

  12. CERN at the International Inventions Fair

    2007-01-01

    CERN is the guest of honour at the 35th International Inventions Fair, which will take place from 18th to 22nd April at Palexpo, in Geneva. CERN has been chosen as the guest of honour for its ability to develop new technologies and translate them for the benefit of society. For the Fair, CERN has teamed up with ten companies that have made use of technologies and ideas from the Laboratory. The CERN stand at the exhibition will be dedicated to a presentation of the Laboratory and the LHC. Each of the technologies featured will be highlighted on the stand, along with the companies that have put them into more general use. This will allow visitors to trace the path from basic research to practical application from start to finish. One example is Medipix, a particle detection technology that has found applications in medical imaging. Visitors to the Fair will be able to see a Medipix detector in action on the CERN stand, and use it to view the particles emitted by everyday objects.

  13. 75 FR 67985 - Government-Owned Inventions; Availability for Licensing

    2010-11-04

    ... . Inhibition of Cell Motility, Angiogenesis and Metastasis Description of Invention: The present invention... SH2 domain-mediated interactions in the metastatic process and support the potential efficacy of this... Modality: Inhibition of cell motility-dependent processes, including angiogenesis and metastasis, in...

  14. NIH Employee Invention Report (EIR) | NCI Technology Transfer Center | TTC

    NIH researchers must immediately contact their Laboratory or Branch Chief and inform him or her of a possible invention, and then consult with your NCI TTC Technology Transfer Manager about submitting an Employee Invention Report (EIR) Form. | [google6f4cd5334ac394ab.html

  15. 10 CFR 784.5 - Waiver of identified inventions.

    2010-01-01

    ... contractor has made or will make substantial investment of financial resources or technology developed at the contractor's private expense which will directly benefit the commercialization of the invention; (g) The... extent to which the Government has contributed to the field of technology of the invention; (e) The...

  16. 76 FR 18564 - Government-Owned Inventions; Availability for Licensing

    2011-04-04

    ... Antibiotics: Naturally-Occurring Chrysophaetins and Their Analogues Description of Invention: This invention... the very limited number of new antibiotics developed in recent decades and the increased epidemic of infectious diseases. In fact, infectious diseases are the leading cause of death worldwide. In the United...

  17. Entrapment and Escape: Inventional Metaphors in Ronald Reagan's Economic Rhetoric.

    Aden, Roger C.

    1989-01-01

    Examines Ronald Reagan's use of inventional metaphors of entrapment and escape, language meshing with the American public's perception of the economy in the early 1980s. Notes that Reagan's reliance on inventional metaphors produced a rigidity in his approach to new situations, ultimately damaging his ability to lead the nation. (MM)

  18. 75 FR 44267 - Government-Owned Inventions; Availability for Licensing

    2010-07-28

    ... inventions to extend market coverage for companies and may also be available for licensing. ADDRESSES..., PhD, at 301-435-3121 or [email protected] for more information. Software for Accurate Segmentation of Cell Nuclei in Breast Tissue Description of Invention: Automatic segmentation of cell nuclei is...

  19. Playful Invention and Exploration. Final Evaluation Report: Executive Summary

    St. John; Mark; Carroll, Becky; Helms, Jen; Smith, Anita

    2008-01-01

    PIE (Playful Invention and Exploration) is a unique approach to learning that centers on the use of technology and design challenges to create powerful learning experiences in informal education settings. The Playful Invention and Exploration (PIE) Institute project was funded in 2005 by the National Science Foundation (NSF). Overall, 150…

  20. Rhetorical Invention and Advanced Literacy: An Historical Perspective.

    Hagaman, John

    Recent criticism of rhetorical invention faults the discipline for not promoting "advanced literacy," defined as the use of critical reading and writing abilities to serve social ends. Aristotle's vision of rhetoric has contributed significantly to a cognitive view of invention, but Aristotle also acknowledged the importance of social…

  1. Distant Recombination and the Creation of Basic Inventions

    Barirani, Ahmad; Beaudry, Catherine; Agard, Bruno

    2015-01-01

    This article explores whether the relationship between the breath of technological integration (recombination distance) and the breath of an invention׳s subsequent application (basicness) is moderated by the sector of activity (private or public), science-linkage strength and industry characteris...

  2. 43 CFR 6.2 - Report of invention.

    2010-10-01

    ... official working hours, the extent use was made of government facilities, equipment, funds, material or... withhold the report until the process or device is completely reduced to practice, reduction to practice... the Government and of the inventor. If an invention is reduced to practice after the invention report...

  3. Nuclear exports. Parliamentary control and confidentiality

    Feldmann, Ulrike

    2015-01-01

    With its decision taken on 21. October 2014 (Az.: 2 BvE 5/11) the Federal Constitutional Court (BVerfG) decided during court proceedings between administrative bodies on the scope and limits of the parliamentary right of information. Even though the proceeding did not deal with nuclear exports but arm exports, foreign trade law, however, does not only designate an export licence obligation for military weapons but also for so called dual-use goods meaning goods, which can be used both for friendly as well as for military purposes. The export of these goods requires according to the so-called Dual-Use Regulation (EG) 428/2009 a licence. Annex I category 0 of the regulation (EG) 428/2009 lists a variety of nuclear materials, plants and equipment items for which this licence applies. In the same manner as arm exports, also exports of nuclear dual-use goods are being discussed in a special cabinet committee, the Federal Security Council (BSR), which shall coordinate cross-departmentally the German security and defence policy under consideration of economic interests and which categorises its results, according to the rules of procedure, as confidential. Also legally not regulated but common ''preliminary enquiries'' at the responsible Federal Ministry or rather Federal Office of Economics and Export Control by companies which plan an export and want to affirm the general approval for their export business prior to conclusion of contract take not only place for arm exports but also for nuclear dual-use goods. The decision by the Federal Constitutional Court can be applied to consultations about the authorisation of nuclear dual-use goods.

  4. Evaluation in a competitive utility environment: the threat of confidentiality

    Vine, Edward

    1997-01-01

    Utilities have become concerned that their competitors will desire access to energy-related data--including energy-efficiency data collected by utilities from their energy- efficiency programs--that they may regard as proprietary or confidential. In the future, disputes about confidentiality may focus more on costs and market information (as well as energy use and load data) than on energy-efficiency data per se. So far, the discussion has been limited to ratepayer-funded data. Consequently, many utilities are now requesting that the data (including evaluation data) they submit to their utility regulatory commissions remain confidential. Withholding utility information from the public is likely to harm the evaluation community that depends on the free flow of information for improving the practice of evaluation as well as for disseminating the lessons learned from particular program evaluations. Confidentiality will also have significant policy implications. In response to these concerns, in late 1995 and early 1996, we conducted a survey of state public utility commissions (PUCs) in the U.S. to assess: (1) the relative importance of the issue of confidential data in the regulatory arena; (2) the regulatory response to utility requests for confidentiality (e.g., formal policies, guidelines, rules and procedures, and decisions); and (3) the type of data filed as confidential with PUCS. We focus on the first two objectives of this study. In addition to our interviews, we reviewed selected state statutes, judicial and PUC decisions, rules and procedures, protective orders, and interim policy documents. Evaluators need to understand the context of confidentiality as well as the response of the regulatory commissions to confidentiality, because evaluators will need to adapt to a new environment where energy-related data and information may be harder to obtain and distribute. We propose that regulators conduct the following activities as soon as possible: 1. Assess

  5. THE VALUE AND ECONOMIC EFFECTS OF UNAPPLIED INVENTIONS

    Raul Sorin V. FÂNTÂNĂ

    2014-06-01

    Full Text Available The accounting regulations, the guidelines for their application and other articles by accounting specialists argue that inventions created internally are not recognized as intangible assets. Only assets acquired separately can be measured reliably, based on the document justifying the purchase transaction. Other specialised papers show that it is difficult to establish the existence of this intangible asset and its credible cost. That is, it can give or calculate a value of the invention only if it can show the acceptable cost of achieving it. But all these works argue that the protection of inventions is profitable if it is the basis of a new business, if it promotes or protects the current activity. However, these papers elude - because it is uncomfortable - the situation where an invention created internally has a value only because it forecloses the market. It is curious that an invention has accounting value only when traded.

  6. Technology transfer of Cornell university

    Yoo, Wan Sik

    2010-01-01

    This book introduces technology transfer of Cornell university which deals with introduction of Cornell university, composition of organization and practice of technology transfer : a research contract, research perform, invention report, evaluation and succession of invention, a patent application and management, marketing, negotiation and writing contract, management of contract, compensation, result of technology transfer, cases of success on technical commercialization and daily life of technology transfer center.

  7. Biography of louis braille and invention of the braille alphabet.

    Jiménez, Javier; Olea, Jesús; Torres, Jesús; Alonso, Inmaculada; Harder, Dirk; Fischer, Konstanze

    2009-01-01

    Louis Braille (1809-1852) was born in France. At the age of three, he wounded his right eye with a cobbler's tool while playing in his father's workshop. No medical knowledge could save his eyesight at that time. Louis's left eye became inflamed, apparently due to subsequent sympathetic ophthalmia, and he eventually lost the sight in that eye. At the age of five, Louis Braille was completely blind. He is considered to be the inventor of a writing system by touch that bears his name, the Braille system. This revolutionary system has allowed blind people to access written culture, and it can therefore be considered a major advance in the quality of life for the blind. The immediate precursor of the invention of the Braille system was the alphabet created by Charles Barbier de la Serre (1767-1841) who created a language by touch designed for military and secret use. Louis Braille modified this alphabet into the Braille alphabet, which is practically the same one that is currently used. It required time to be recognized and to be implemented as a reading and writing method for blind people throughout the world. In 1950, UNESCO effectively universalized the Braille alphabet, and in 2005 it recognized Braille system as a "vital language of communication, as legitimate as all other languages in the world."

  8. Can you keep a secret? Confidentiality in psychotherapy.

    Younggren, Jeffrey N; Harris, Eric A

    2008-05-01

    Confidentiality is the secret-keeping duty that arises from the establishment of the professional relationship psychologists develop with their clients. It is a duty created by the professional relationship, it is set forth in the American Psychological Association's (2002) Ethical Principles and Code of Conduct, and it is codified in many state regulations. However, the difference between confidentiality and legal privilege; how, why, and when it can be violated; and the reasons for so doing are not well understood by many practitioners. While on the surface confidentiality might seem to be an easy concept to apply to professional practice, in fact it is quite complex and filled with exceptions that frequently differ from circumstance to circumstance and from state to state. A lack of respect for and a lack of familiarity with the significance of these exceptions could have dire professional consequences. This article reviews the ethical imperative of confidentiality and then provides examples of legal cases that help to better understand its complexity. Then, we offer strategies designed to help metal health practitioners when they are confronted with questions regarding confidentiality and privilege.

  9. Improving Individual Acceptance of Health Clouds through Confidentiality Assurance.

    Ermakova, Tatiana; Fabian, Benjamin; Zarnekow, Rüdiger

    2016-10-26

    Cloud computing promises to essentially improve healthcare delivery performance. However, shifting sensitive medical records to third-party cloud providers could create an adoption hurdle because of security and privacy concerns. This study examines the effect of confidentiality assurance in a cloud-computing environment on individuals' willingness to accept the infrastructure for inter-organizational sharing of medical data. We empirically investigate our research question by a survey with over 260 full responses. For the setting with a high confidentiality assurance, we base on a recent multi-cloud architecture which provides very high confidentiality assurance through a secret-sharing mechanism: Health information is cryptographically encoded and distributed in a way that no single and no small group of cloud providers is able to decode it. Our results indicate the importance of confidentiality assurance in individuals' acceptance of health clouds for sensitive medical data. Specifically, this finding holds for a variety of practically relevant circumstances, i.e., in the absence and despite the presence of conventional offline alternatives and along with pseudonymization. On the other hand, we do not find support for the effect of confidentiality assurance in individuals' acceptance of health clouds for non-sensitive medical data. These results could support the process of privacy engineering for health-cloud solutions.

  10. Commercial progress and impacts of inventions and innovations

    Perlack, R.D.; Rizy, C.G.; Franchuk, C.A.; Cohn, S.M.

    1999-08-01

    This report presents the survey results from the 1997 inventions and innovations evaluation questionnaire. The evaluation impacts are based on responses from 136 out of 334 inventors sent the questionnaire. In 1996, there were 67 inventions identified that currently have direct, licensed, or spinoff sales. In total, the number of inventions and innovations with current sales and past sales (now retired from the market) is 144. This represents a commercial success rate of over 27%. For these grant-receiving inventions, the following performance metrics are of interest: (1) total cumulative direct and licensed sales through 1996 were $700 million (1995$), in addition, cumulative spinoff sales and royalties were $90 million and $20 million (1995$) through 1996, respectively; (2) employment sustained by direct and licensed sales was 1,189 full-time equivalents in 1996, employment attributable to technologies with no sales was 90 full-time equivalents, and the annual federal income taxes collected as a result of this employment was in excess of $6 million; and (3) energy savings attribute to supported inventions and innovations were estimated at 78 trillion Btu in 1996 with an estimated value of nearly $190 million (1995$), the associated reduction in carbon emissions was over 1.5 million metric tons. In terms of future commercialization progress and impacts, the 1997 survey revealed that 60% of the respondents are actively pursuing their invention, and nearly 50% of the inventions are in the prototype development, pre-production prototype testing, and pre-production development stages.

  11. Computer Security: confidentiality is everybody’s business

    Stefan Lueders, Computer Security Team

    2015-01-01

    Recently, a zip file with confidential information was mistakenly made public on one of CERN’s websites. Although the file was only intended for members of an internal committee, when placing it onto the CERN website, someone made a mistake when setting the access permissions and, thus, made the file accessible to everyone visiting the site!   Unfortunately, this is but one example of such mistakes. We have seen other documents made accessible to a much wider audience than originally intended… CERN takes serious measures to ensure the confidentiality of data. Confidential or “sensitive” documents (following the nomenclature set out in the CERN Data Protection Policy) deserve professional handling and access protections given only to the people who really need to access them. As such, they must not be widely circulated as attachments in e-mails and, most definitely, must not be stored on random public websites for the sole purpose of shari...

  12. The Invention of Tradition: Illyrian Heraldry

    Aleksandar Palavestra

    2016-02-01

    Full Text Available The "Illyrian heraldry", as a phenomenon of the invented tradition, encompasses the rolls of arms - armorials, which appear in Dalmatia, Italy, Spain and Austria at the end of the XVI and beginning of the XVII century. These armorials contained Serbian and other southern Slav monarchic, territorial and family coats of arms. The authenticity, heraldic sources and origins of these armorials are extremely complex problems that can be traced back to the medieval heraldic heritage of the Serbs, on the one hand, and reveal the intricate web of political circumstances in the XVI and XVII centuries. Illyrian heraldry is also closely linked to the personal and political ambitions of the Spanish admiral, Don Pedro Ohmučević Grgurić, from Slano near Dubrovnik. One cannot, however, link the entire Illyrian heraldry movement only to the daring ambitions of Petar Ohmučević Grgurić In in the XVI and XVII centuries historical constructions, inspired for the most part by sincere Slav patriotism, emerged that proved the unity of the Illyrians and the Slavs, revealed the alleged Slav origins of famous figures (Alexander the Great, Justinian, or simply extolled the splendor and magnitude of a lost Slav kingdom, that could be restored again. Much as it was developing within the spiritual scope of the Catholic church, this "Slovine" movement found its historical basis in the medieval statehood of Serbia and Bosnia, particularly in the powerful empire of Stephan Dushan (1331-55, in the Serbian potentates, heroes, their glitter and opulence, which used to glorify the Slav world. Since the XVII century till today, despite their doubtful authenticity, the Illyrian armorials have been considered important genealogical and heraldic documents. Many families relied on the information in Illyrian heraldic collections when claiming their true, or, more often purported, ancient hereditary rights, titles and lands. The Illyrian armorials were transcribed and reprinted in

  13. Independent consultants : fiduciary duties, trade secrets and confidential information

    Fraser, B.; Wilhelmson, M.

    1999-01-01

    Because of cutbacks and downsizing within the petroleum industry, it has become one of the largest users of contract personnel to provide services that were previously provided by senior levels of management. This paper explored the application of common law fiduciary duties and the duty of confidence to the independent workforce. It examined to what extent fiduciary duties apply to independent consultants and the best way for the employer to protect itself from the potential misuse of confidential information. Part 1 of the paper described fiduciary duties. A fiduciary relationship was described as one that possesses the following three characteristics: (1) the fiduciary has scope for the exercise of some discretion of power, (2) the fiduciary can unilaterally exercise that power to affect the beneficiary's practical interests, and (3) the beneficiary is peculiarly vulnerable to the fiduciary holding the discretion of power. Three examples of how the courts treated some arguments regarding fiduciaries were presented. Part 2 of this paper discussed how trade secrets and confidential information should be handled. It was explained, that regardless of fiduciary duties, the unauthorized use of confidential information by an independent contractor can give rise to liability and an award of damages by the courts. Some examples where the Supreme Court of Canada found breach of confidence by a party were presented. Information communicated from an employer to an employee can be divided into the following three categories: (1) publicly accessible and not confidential, (2) confidential and must be treated as such while an employee is employed, but if learned becomes part of the employees skill and knowledge, and (3) specific confidential trade secrets that cannot lawfully be used for anyone's benefit but the employer's. Issues regarding defining rights and obligations by contract were also discussed

  14. Enhanced Obfuscation Technique for Data Confidentiality in Public Cloud Storage

    Oli S. Arul

    2016-01-01

    Full Text Available With an advent of cloud computing, data storage has become a boon in information technology. At the same time, data storage in remote places have become important issues. Lot of techniques are available to ensure protection of data confidentiality. These techniques do not completely serve the purpose in protecting data. The Obfuscation techniques come to rescue for protecting data from malicious attacks. This paper proposes an obfuscation technique to encrypt the desired data type on the cloud providing more protection from unknown hackers. The experimental results show that the time taken for obfuscation is low and the confidentiality percentage is high when compared with existing techniques.

  15. 76 FR 55069 - Government-Owned Inventions; Availability for Licensing

    2011-09-06

    ... invention relates to an improved system for measuring bone mineral density (BMD). BMD measurement is an... vivo data available (animal) Inventors: Geraldo Kaplan (FDA), Krishnamurthy Konduru (FDA), et al...

  16. Making Patent Scopes Exceed the Technological Scopes of Scientific Inventions

    Beukel, Karin

    This paper presents the results of a grounded theory study of the transformation of scientific discoveries into patented inventions. Using an algebraic interpretive approach, the narratives collected during interviews are analyzed as Bayesian inferences and the developed theory is tested. The fin...... for searching in new directions for solutions if challenges of exploitation with regard to the scientific invention arise.......This paper presents the results of a grounded theory study of the transformation of scientific discoveries into patented inventions. Using an algebraic interpretive approach, the narratives collected during interviews are analyzed as Bayesian inferences and the developed theory is tested....... The findings recast the relationship between science and patents as a process in which the way the transformation of the scientific invention is handled has an effect on the breadth of the patent scope. Unleashing patent scope surplus is dependent on processes related to abstraction and cognitive variety...

  17. 78 FR 29386 - Government-Owned Inventions, Available for Licensing

    2013-05-20

    ... NATIONAL AERONAUTICS AND SPACE ADMINISTRATION [Notice (13-053)] Government-Owned Inventions, Available for Licensing AGENCY: National Aeronautics and Space Administration. ACTION: Notice of... N Channel JFET Based Digital Logic Gate Structure Using Resistive Level Shifters and Having Direct...

  18. 75 FR 58401 - Government-Owned Inventions; Availability for Licensing

    2010-09-24

    ..., attention deficit hyperactivity disorder (ADHD), and schizophrenia. Development of selective pharmacological... bipolar disorder, attention deficit disorder (ADD), and autism. Applications Method of diagnosis and... Disorders Description of Invention: The inventors have isolated and characterized an alkaloid, phantasmidine...

  19. 78 FR 38352 - Government-Owned Inventions; Availability for Licensing

    2013-06-26

    ...). The invention rat is superior to AD mice models because the rat has a larger sized brain to.... Licensing Contact: Patrick McCue, Ph.D.; 301-435-5560; [email protected] . Collaborative Research...

  20. 75 FR 43992 - Government-Owned Inventions; Availability for Licensing

    2010-07-27

    ... immune system may play an important role. This invention discloses that patients with AMD gain additional... of age related macular degeneration. This is in light of new findings that immune mechanisms appear...

  1. 75 FR 44270 - Government-Owned Inventions; Availability for Licensing

    2010-07-28

    ... belongs to a group of disorders in which the immune system may play an important role. This invention... agents in the treatment of age related macular degeneration. This is in light of new findings that immune...

  2. Patentability of inventions under the Nigeria's patents and designs act

    Patentability of inventions under the Nigeria's patents and designs act: an examination. ... AFRICAN JOURNALS ONLINE (AJOL) · Journals · Advanced Search · USING ... The Nigerian Patent Registry refuses patent applications for Software or ...

  3. 77 FR 31859 - Government-Owned Inventions; Availability for Licensing

    2012-05-30

    ... inventions to extend market coverage for companies and may also be available for licensing. FOR FURTHER... three-dimensional segmentation approach for the quantitative interpretation of electron tomograms. IEEE...

  4. 7 CFR 1230.88 - Patents, copyrights, inventions, and publications.

    2010-01-01

    ... provisions of this subpart shall be the property of the United States Government as represented by the Board..., leasing, franchising, or other uses of such patents, copyrights, inventions, or publications inure to the...

  5. 7 CFR 1160.505 - Patents, copyrights, inventions and publications.

    2010-01-01

    ... funds collected under the provisions of this subpart are the property of the United States Government as... the rental, sale, leasing, franchising, or other uses of such patents, copyrights, inventions, or...

  6. 76 FR 72207 - Government-Owned Inventions; Availability for Licensing

    2011-11-22

    ... Macular degeneration Diabetic retinopathy Retinal vein occlusion Competitive Advantages: Small sample... Vascular access devices Competitive Advantages: Non-degradable antimicrobial methods. Development Stage... DEPARTMENT OF HEALTH AND HUMAN SERVICES National Institutes of Health Government-Owned Inventions...

  7. 78 FR 21614 - Government-Owned Inventions; Availability for Licensing

    2013-04-11

    ... useful in drug development. Competitive Advantages: The bioluminescent marker allows for effective...-related Macular Degeneration. Competitive Advantages: This technology is potentially a more sensitive... DEPARTMENT OF HEALTH AND HUMAN SERVICES National Institutes of Health Government-Owned Inventions...

  8. 75 FR 58404 - Government-Owned Inventions; Availability for Licensing

    2010-09-24

    ... the indicated licensing contact at the Office of Technology Transfer, National Institutes of Health... disorders (see above Description of Invention). Please contact NHGRI Technology Development Coordinator... for alcohol and drug addiction. Neuropsychiatric disorders including, for example, mood, anxiety...

  9. The Power of Individual-level Drivers of Inventive Performance

    Zwick, Thomas; Frosch, Katharina; Hoisl, Karin

    2017-01-01

    (KSAO) model. We link survey information spanning the inventors’ entire careers and psychometric test evidence with patent history data for more than 1000 inventors. We also control for variables that have traditionally been used in studies of inventive performance including inventor age, applicant type......, technology, patent, and time information. We show that educational level, skills acquired during the career, personality traits, career motivation, cognitive ability, and cognitive problem-solving style are significantly related to inventive performance....

  10. 76 FR 59410 - Government-Owned Inventions; Availability for Licensing

    2011-09-26

    ...: Licensing information and copies of the U.S. patent applications listed below may be obtained by writing to...-402-0220. A signed Confidential Disclosure Agreement will be required to receive copies of the patent... to menopause, birth control, menstrual cycle/amenorrhea, fertility or endometriosis. Competitive...

  11. 75 FR 51823 - Government-Owned Inventions; Availability for Licensing

    2010-08-23

    ...: Licensing information and copies of the U.S. patent applications listed below may be obtained by writing to.../402-0220. A signed Confidential Disclosure Agreement will be required to receive copies of the patent... infertility and irregular menstrual periods than in healthy women. The discovery of MATER as an important...

  12. 78 FR 16298 - Comment Request for Information Collection: Confidentiality and Disclosure of State Unemployment...

    2013-03-14

    ... Collection: Confidentiality and Disclosure of State Unemployment Compensation Information Final Rule and... about the regulatory requirements of the Confidentiality and Disclosure of State Unemployment... Administration, Office of Unemployment Insurance, 200 Constitution Avenue NW., Room S4524, Washington, DC 20210...

  13. 77 FR 1434 - Proposed Confidentiality Determinations for Data Elements Under the Mandatory Reporting of...

    2012-01-10

    ... Fluorinated Gas Production....... 325120 Industrial gases manufacturing facilities. Electrical Equipment Use... Proposed Confidentiality Determinations for Data Elements Under the Mandatory Reporting of Greenhouse Gases...-proposes confidentiality determinations for the data elements under the Mandatory Greenhouse Gas Reporting...

  14. 77 FR 63537 - Greenhouse Gas Reporting Program: Proposed Amendments and Confidentiality Determinations for...

    2012-10-16

    ... Greenhouse Gas Reporting Program: Proposed Amendments and Confidentiality Determinations for Subpart I...-AR61 Greenhouse Gas Reporting Program: Proposed Amendments and Confidentiality Determinations for... Manufacturing, of the Greenhouse Gas Reporting Rule. Proposed changes include revising certain calculation...

  15. 18 CFR 706.410 - Confidentiality of statements.

    2010-04-01

    ... use of information on the statements shall be limited to that necessary to carry out the purposes of... EMPLOYEE RESPONSIBILITIES AND CONDUCT Statements of Employment and Financial Interests § 706.410 Confidentiality of statements. Each statement of employment and financial interests, and each supplementary...

  16. Effective verification of confidentiality for multi-threaded programs

    Ngo, Minh Tri; Stoelinga, Mariëlle Ida Antoinette; Huisman, Marieke

    2014-01-01

    This paper studies how confidentiality properties of multi-threaded programs can be verified efficiently by a combination of newly developed and existing model checking algorithms. In particular, we study the verification of scheduler-specific observational determinism (SSOD), a property that

  17. 15 CFR 325.16 - Protecting confidentiality of information.

    2010-01-01

    ... 15 Commerce and Foreign Trade 2 2010-01-01 2010-01-01 false Protecting confidentiality of information. 325.16 Section 325.16 Commerce and Foreign Trade Regulations Relating to Commerce and Foreign Trade (Continued) INTERNATIONAL TRADE ADMINISTRATION, DEPARTMENT OF COMMERCE MISCELLANEOUS REGULATIONS...

  18. 48 CFR 1415.207-71 - Confidentiality of proposal evaluation.

    2010-10-01

    ... THE INTERIOR CONTRACTING METHODS AND CONTRACT TYPES CONTRACTING BY NEGOTIATION Solicitation and... evaluators and advisors shall sign a Conflict of Interest Certificate and a Confidentiality Certificate in a... outside the Government shall take into consideration requirements for avoiding individual conflicts of...

  19. Absolutism on Access and Confidentiality: Principled or Irresponsible?

    Sheerin, William E.

    1991-01-01

    Discusses issues involved in public access to library materials and facilities and patron confidentiality. Topics discussed include children's access to adult materials; parents' right to know about their children's materials; First and Fourth Amendment protections; the Library Bill of Rights; and American Library Association (ALA) documents that…

  20. 40 CFR 303.31 - Assurance of claimant confidentiality.

    2010-07-01

    ... 40 Protection of Environment 27 2010-07-01 2010-07-01 false Assurance of claimant confidentiality. 303.31 Section 303.31 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) SUPERFUND... knowledge, shall be given access to the identity of, or information that would lead to the identity of, a...

  1. 18 CFR 1b.9 - Confidentiality of investigations.

    2010-04-01

    ... 18 Conservation of Power and Water Resources 1 2010-04-01 2010-04-01 false Confidentiality of investigations. 1b.9 Section 1b.9 Conservation of Power and Water Resources FEDERAL ENERGY REGULATORY COMMISSION... pursuant to subpoena, and all investigative proceedings shall be treated as nonpublic by the Commission and...

  2. 22 CFR 1104.17 - Confidentiality of archaeological resource information.

    2010-04-01

    ... 22 Foreign Relations 2 2010-04-01 2010-04-01 true Confidentiality of archaeological resource information. 1104.17 Section 1104.17 Foreign Relations INTERNATIONAL BOUNDARY AND WATER COMMISSION, UNITED... of archaeological resource information. (a) The Commissioner shall not make available to the public...

  3. IT Confidentiality Risk Assessment for an Architecture-Based Approach

    Morali, A.; Zambon, Emmanuele; Etalle, Sandro; Overbeek, Paul

    2008-01-01

    Information systems require awareness of risks and a good understanding of vulnerabilities and their exploitations. In this paper, we propose a novel approach for the systematic assessment and analysis of confidentiality risks caused by disclosure of operational and functional information. The

  4. 12 CFR 19.181 - Confidentiality of formal investigations.

    2010-01-01

    ... 12 Banks and Banking 1 2010-01-01 2010-01-01 false Confidentiality of formal investigations. 19.181 Section 19.181 Banks and Banking COMPTROLLER OF THE CURRENCY, DEPARTMENT OF THE TREASURY RULES OF... only in accordance with the provisions of part 4 of this chapter. ...

  5. 19 CFR 210.72 - Confidentiality of information.

    2010-04-01

    ... 19 Customs Duties 3 2010-04-01 2010-04-01 false Confidentiality of information. 210.72 Section 210.72 Customs Duties UNITED STATES INTERNATIONAL TRADE COMMISSION INVESTIGATIONS OF UNFAIR PRACTICES IN IMPORT TRADE ADJUDICATION AND ENFORCEMENT Enforcement Procedures and Advisory Opinions § 210.72...

  6. 19 CFR 210.20 - Declassification of confidential information.

    2010-04-01

    ... 19 Customs Duties 3 2010-04-01 2010-04-01 false Declassification of confidential information. 210.20 Section 210.20 Customs Duties UNITED STATES INTERNATIONAL TRADE COMMISSION INVESTIGATIONS OF UNFAIR PRACTICES IN IMPORT TRADE ADJUDICATION AND ENFORCEMENT Motions § 210.20 Declassification of...

  7. Zerber: r-Confidential Indexing for Distributed Documents

    Zerr, Sergej; Demidova, Elena; Olmedilla, Daniel; Nejdl, Wolfgang; Winslett, Marianne; Mitra, Soumyadeb

    2008-01-01

    Zerr, S., Demidova, E., Olmedilla, D., Nejdl, W., Winslett, M., & Mitra, S. (2008). Zerber: r-Confidential Indexing for Distributed Documents. In J. Teubner (Eds.), Proceedings of the 11th International Conference on Extending Database Technology (pp. 287-298). March, 25-29, 2008, Nantes, France.

  8. Meaningful Use of a Confidential Adolescent Patient Portal.

    Thompson, Lindsay A; Martinko, Thomas; Budd, Pamela; Mercado, Rebeccah; Schentrup, Anzeela M

    2016-02-01

    To design and evaluate the usage of an adolescent patient portal specifically adapted for adolescent health care needs that also satisfied institutional meaningful use guidelines regarding electronic health records. Key stakeholders at one academic health care center adopted an online portal and opted to designate a patient portal specifically for adolescents to maximize confidentiality in compliance with state privacy laws. This study analyzed aggregate electronic health record data of adolescents' (ages 12-17.9 years) uptake, usage, and functionality of this portal and compared it to parent portal usage for younger children (ages 0-11 years). Differences in means were calculated using paired t tests. The portal was used similarly between parents of young children and adolescents, with almost 1,000 enrollees in each group from September 1, 2012 to March 31, 2015. There were no gender differences in enrollment. Adolescents were less likely than parents of younger children to review appointments (73% vs. 85%), laboratory tests (67% vs. 79%), problem lists (40% vs. 78%), or allergies (45% vs. 77%, all p values adolescents sent 1,397 confidential messages. Institutional decisions for implementing meaningful use requirements can align with goals of adolescent health. Patient portals can enhance adolescent health care quality and adolescents readily use a confidential portal. Implementation of meaningful use requirements should be checked against adolescent health care needs to maximize confidentiality and promote health communication. Copyright © 2016 Society for Adolescent Health and Medicine. Published by Elsevier Inc. All rights reserved.

  9. 31 CFR 31.217 - Confidentiality of information.

    2010-07-01

    ... 31 Money and Finance: Treasury 1 2010-07-01 2010-07-01 false Confidentiality of information. 31.217 Section 31.217 Money and Finance: Treasury Office of the Secretary of the Treasury TROUBLED ASSET... from a source other than the retained entity. (b) Prohibitions. The retained entity shall not: (1...

  10. Decisions about Confidentiality in Medical Student Mental Health Settings.

    Lindenthal, Jacob Jay; And Others

    1984-01-01

    Examined responses of psychologists and psychiatrists in medical schools (N=59) to vignettes representing student problems. Results suggested practitioners were generally unwilling to break confidentiality in response to problems involving suicidal tendencies, sexual coercion/seduction, social transgressions, or falsifying data. Only suggestions…

  11. 75 FR 75576 - Confidentiality of Suspicious Activity Reports

    2010-12-03

    ...-2010-0019] RIN 1557-AD17 Confidentiality of Suspicious Activity Reports AGENCY: The Office of the... suspicious activity report (SAR) to: clarify the scope of the statutory prohibition on the disclosure by a... institutions, including national banks regulated by the OCC, to keep certain records and make certain reports...

  12. Participants' safety versus confidentiality: A case study of HIV research.

    Leyva-Moral, Juan Manuel; Feijoo-Cid, Maria

    2017-05-01

    Background When conducting qualitative research, participants usually share lots of personal and private information with the researcher. As researchers, we must preserve participants' identity and confidentiality of the data. Objective To critically analyze an ethical conflict encountered regarding confidentiality when doing qualitative research. Research design Case study. Findings and discussion one of the participants in a study aiming to explain the meaning of living with HIV verbalized his imminent intention to commit suicide because of stigma of other social problems arising from living with HIV. Given the life-threatening situation, the commitment related to not disclosing the participant's identity and/or the content of the interview had to be broken. To avoid or prevent suicide, the therapist in charge of the case was properly informed about the participant's intentions. One important question arises from this case: was it ethically appropriate to break the confidentiality commitment? Conclusion confidentiality could be broken if a life-threatening event is identified during data collection and participants must know that. This has to be clearly stated in the informed consent form.

  13. 12 CFR 404.7 - Confidential business information.

    2010-01-01

    ... 12 Banks and Banking 4 2010-01-01 2010-01-01 false Confidential business information. 404.7 Section 404.7 Banks and Banking EXPORT-IMPORT BANK OF THE UNITED STATES INFORMATION DISCLOSURE Procedures... involved, a general description of the related U.S. exports, and the country to which such exports are...

  14. [Confidentiality in medical oaths: (When the white crow becomes gray...)].

    Gelpi, R J; Pérez, M L; Rancich, A M; Mainetti, J A

    2000-01-01

    Confidentiality, together with the ethical principles of beneficence and non-maleficence, is the most important rule in Medical Oaths at the present time. However, the scientific-technical advances in medicine have made this rule one of the most controversial ones because of its exceptions. In consequence, the aim of the present paper is to comparatively analyze the rule of confidentiality in Medical Oaths of different places, times, origins and in different versions of the Hippocratic Oath in order to determine what should be kept a secret and with what degree of commitment (absolute or "prima facie"). Of the thirty six analyzed Oaths, twenty-seven manifest this rule and nine do not. No relation was found between the manifestation of this rule and the place, time, origin and different versions of the Hippocratic Oath. Most pledges suggest not to reveal what has been seen or heard during the medical act, the same as in the Hippocratic Oath. Seven texts point out that confidentiality should be absolute and four give exceptions in connection with beneficence and justice principles and the moral duty of causing no damage to third parties. Two pledges specify protection of privacy. In conclusion, today confidentiality is considered to be a moral duty for the benefit of the patient and out of consideration for his autonomy; however, at the present time in medicine the duty of keeping absolute secrecy is being reconsidered.

  15. 49 CFR 805.735-21 - Confidentiality of statements.

    2010-10-01

    ... TRANSPORTATION SAFETY BOARD EMPLOYEE RESPONSIBILITIES AND CONDUCT § 805.735-21 Confidentiality of statements. Subject to the provisions of § 805.735-24 concerning review of employee statements, each statement of... Personnel Officer is personally responsible for the retention of employee statements in confidence and may...

  16. 19 CFR 201.6 - Confidential business information.

    2010-04-01

    ...) of a type for which there is a clear and compelling need to withhold from disclosure. Special rules... the right to appeal to the Commission. (e) Appeals from denial of confidential treatment. (1) For good cause shown, the Commission may grant an appeal from a denial by the Secretary of a request for...

  17. Confidential data in a competitive utility environment: A regulatory perspective

    Vine, E.

    1996-08-01

    Historically, the electric utility industry has been regarded as one of the most open industries in the United States in sharing information but their reputation is being challenged by competitive energy providers, the general public, regulators, and other stakeholders. As the prospect of competition among electricity power providers has increased in recent years, many utilities have been requesting that the data they submit to their utility regulatory commissions remain confidential. Withholding utility information from the public is likely to have serious and significant policy implications with respect to: (1) consumer education, the pursuit of truth, mutual respect among parties, and social cooperation; (2) the creation of a fair market for competitive energy services; (3) the regulatory balance; (4) regional and national assessments of energy-savings opportunities; (5) research and development; and (6) evaluations of utility programs, plans, and policies. In a telephone survey of all public utility commissions (PUCs) that regulate electric and gas utilities in the U.S., we found that almost all PUCs have received requests from utility companies for data to be filed as confidential, and confidential data filings appear to have increased (both in scope and in frequency) in those states where utility restructuring is being actively discussed. The most common types of data submitted as confidential by utilities dealt with specific customer data, market data, avoided costs, and utility costs.

  18. 40 CFR 85.1415 - Treatment of confidential information.

    2010-07-01

    ... 40 Protection of Environment 18 2010-07-01 2010-07-01 false Treatment of confidential information. 85.1415 Section 85.1415 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) AIR PROGRAMS (CONTINUED) CONTROL OF AIR POLLUTION FROM MOBILE SOURCES Urban Bus Rebuild Requirements § 85.1415...

  19. Time for Action: Audit, Accountability and Confidential Enquiries into ...

    Improving the quality of care is essential for achieving reductions in maternal mortality. Audit is one of the methods which can be used to simultaneously assess as well as improve quality. This commentary discusses one type of audit – confidential enquiries into maternal death. We believe that the enthusiasm for ...

  20. CRAC : Confidentiality risk analysis and IT-architecture comparison of business networks

    Morali, A.; Zambon, E.; Etalle, S.; Wieringa, R.J.

    2009-01-01

    The leakage of confidential information (e.g. industrial secrets, patient records and user credentials) is one of the risks that have to be accounted for and mitigated by organizations dealing with confidential data. Unfortunately, assessing confidentiality risk is challenging, particularly in the

  1. 37 CFR 260.4 - Confidential information and statements of account.

    2010-07-01

    ... Confidential information and statements of account. (a) For purposes of this part, confidential information shall include statements of account and any information pertaining to the statements of account... included on the statement of account. (d) Access to the confidential information pertaining to the royalty...

  2. Survey on Password Quality and Confidentiality

    Šolić, Krešimir; Očevčić, Hrvoje; Blažević, Damir

    2015-01-01

    In this paper are presented results of empirical survey on password quality self-assessment and several privacy issues regarding password manipulation among information systems' users. Data was collected by questioning 627 e-mail users that were adults, Croatian national and were using e-mail system on regular basis. Comparisons among different kind of users were done regarding age, gender, technical background knowledge, university degree and experience in usage. Results of statistical analy...

  3. Science, technology and inventions: Children draw their own visions

    D'Addezio, G.; Rubbia, G.; Marsili, A.

    2013-12-01

    Italian primary schools participated with enthusiasm to the drawing competition 'I'm a scientist too! Science and scientists from the children point of view' organized by the Laboratorio di Didattica e Divulgazione Scientifica of Istituto Nazionale di Geofisica e Vulcanologia (INGV) in Rome, Italy. The best drawings were awarded and published in the 2011 school calendar. Children were asked to realize a drawing, choosing among three suggestions: 1) How do you imagine a scientist, and how do you imagine the daily activities of a researcher? 2) What invention do you consider the most important among all those you know? 3) What would you invent? The topic 'invention' (#3) was the most successful. In fact, among the collected 1,000 drawings, 400 drawings depict scientists, nearly 150 depict scientists with their inventions, and other 350 depict inventions alone. A classification scheme was designed in order to synthetically describe this set of images and analyze it. The Draw-A-Scientist scheme, known from literature, was maintained but modified in order to characterize both inventors and inventions. A preliminary analysis about scientists reveals a persistent gender stereotype, since most of depicted persons were male and nearly half of girls draw men scientists. The image of 'mad scientist' is still present but it is mainly related to men. Women scientists are drawn by girls; they are represented as young, not crazy, usually good-looking. There are no particular differences between boys and girls in assigning research fields to scientists. Women scientists are often depicted as assistants, but when alone they are self-confident enough to give their name to an invention or to aspire for Nobel Prize. In this work we present the preliminary analysis performed on drawings containing inventions. What do girls and boys 6 to 11 years old invent? Robots, helping in housekeeping or in doing homework; rockets, space vehicles and time machines, but also fictional machines and

  4. Social networks in the history of innovation and invention

    Moon, Francis C

    2014-01-01

    This book integrates history of science and technology with modern social network theory. Using examples from the history of machines, as well as case studies from wireless, radio and chaos theory, the author challenges the genius model of invention. Network analysis concepts are presented to demonstrate the societal nature of invention in areas such as steam power, internal combustion engines, early aviation, air conditioning and more. Using modern measures of network theory, the author demonstrates that the social networks of invention from the 19th and early 20th centuries have similar characteristics to modern 21st C networks such as the World Wide Web. The book provides evidence that exponential growth in technical innovation is linked to the growth of historical innovation networks.

  5. Cooke and Wheatstone and the invention of the electric telegraph

    Hubbard, Geoffrey

    2013-01-01

    Originally published in 1965. Charles Wheatstone collaborated with William Cooke in the invention and early exploitation of the Electric Telegraph. This was the first long distance, faster-than-a-horse messenger. This volume gives an account of the earlier work on which the English invention was founded, and the curious route by which it came to England. It discusses the way in which two such antagonistic men were driven into collaboration and sets out the history of the early telegraph lines, including work on the London and Birmingham Railway and the Great Western Railway.

  6. Reluctant genius Alexander Graham Bell and the passion for invention

    Gray, Charlotte

    2011-01-01

    The popular image of Alexander Graham Bell is that of an elderly American patriarch, memorable only for his paunch, his Santa Claus beard, and the invention of the telephone. In this magisterial reassessment based on thorough new research, acclaimed biographer Charlotte Gray reveals Bell's wide-ranging passion for invention and delves into the private life that supported his genius. The child of a speech therapist and a deaf mother, and possessed of superbly acute hearing, Bell developed an early interest in sound. His understanding of how sound waves might relate to electrical waves enabled h

  7. User's guide to the radionuclide inventory and hazard code INVENT

    Nancarrow, D.J.; Thorne, M.C.

    1986-05-01

    This report constitutes the user's guide to the radionuclide inventory and hazard index code INVENT and provides an explanation of the mathematical basis of the code, the database used and operation of the code. INVENT was designed to facilitate the post-closure radiological assessment of land-based repositories for low and intermediate-level wastes. For those radionuclides identified to be of potential significance, it allows the calculation of time-dependent radionuclide activities, hazard indices for both inhalation and ingestion of activity, and photon spectra. (author)

  8. Medical confidentiality versus disclosure: Ethical and legal dilemmas.

    Agyapong, V I O

    2009-02-01

    A case is described of a fifty year old single man who made disclosures about criminal sexual practices during a psychiatric assessment. In common practice with other professional men, a doctor is under a duty not to disclose, without the consent of his patient, information which he has gained in his professional capacity other than in exceptional circumstances. We discuss the ethical and legal considerations surrounding issues of medical confidentiality and the dilemma that sometimes face clinicians, when they feel obliged, in the public interest, to disclose information they have gained in confidence. Breach of confidences can have deleterious consequences; particularly for the doctor-patient relationship, but failure to disclose in some situations could have serious implications for the well-being of the wider society. Doctors should be aware of the basic principles of confidentiality and the ethical and legal framework around which they are built.

  9. Confidentiality and its limits: some contributions from Christianity.

    Torrance, I R

    2003-02-01

    The issue is whether Christianity, of its nature, would seek to prevent a justifiable breach of confidentiality or could endorse it, under certain circumstances, as the act which is fundamentally more loving or more truthful. The individualistic nature of Western Christianity is noted. The Lutheran theologian Dietrich Bonhoeffer is used to show Christian support for dynamic rather than literal truth telling, and for awareness of the contexts and power relations within which persons stand.

  10. Enhanced Obfuscation Technique for Data Confidentiality in Public Cloud Storage

    Oli S. Arul; Arockiam L.

    2016-01-01

    With an advent of cloud computing, data storage has become a boon in information technology. At the same time, data storage in remote places have become important issues. Lot of techniques are available to ensure protection of data confidentiality. These techniques do not completely serve the purpose in protecting data. The Obfuscation techniques come to rescue for protecting data from malicious attacks. This paper proposes an obfuscation technique to encrypt the desired data type on the clou...

  11. Security, privacy, and confidentiality issues on the Internet

    Kelly, Grant; McKenzie, Bruce

    2002-01-01

    We introduce the issues around protecting information about patients and related data sent via the Internet. We begin by reviewing three concepts necessary to any discussion about data security in a healthcare environment: privacy, confidentiality, and consent. We are giving some advice on how to protect local data. Authentication and privacy of e-mail via encryption is offered by Pretty Good Privacy (PGP) and Secure Multipurpose Internet Mail Extensions (S/MIME). The de facto Internet standa...

  12. Privacy, confidentiality and abortion statistics: a question of public interest?

    McHale, Jean V; Jones, June

    2012-01-01

    The precise nature and scope of healthcare confidentiality has long been the subject of debate. While the obligation of confidentiality is integral to professional ethical codes and is also safeguarded under English law through the equitable remedy of breach of confidence, underpinned by the right to privacy enshrined in Article 8 of the Human Rights Act 1998, it has never been regarded as absolute. But when can and should personal information be made available for statistical and research purposes and what if the information in question is highly sensitive information, such as that relating to the termination of pregnancy after 24 weeks? This article explores the case of In the Matter of an Appeal to the Information Tribunal under section 57 of the Freedom of Information Act 2000, concerning the decision of the Department of Health to withhold some statistical data from the publication of its annual abortion statistics. The specific data being withheld concerned the termination for serious fetal handicap under section 1(1)d of the Abortion Act 1967. The paper explores the implications of this case, which relate both to the nature and scope of personal privacy. It suggests that lessons can be drawn from this case about public interest and use of statistical information and also about general policy issues concerning the legal regulation of confidentiality and privacy in the future.

  13. The erosion of psychiatrist-patient confidentiality by subpoenas.

    Levy, John; Galambos, Gary; Skarbek, Yvonne

    2014-08-01

    We explore the reasons for the prolific use of subpoenas to gain access to psychiatric records in Australia. We examine the applicable legal principles and practices at the New South Wales (NSW) and Commonwealth levels, aiming to develop recommendations for Australian Governments to curb the inappropriate and harmful use of subpoenas. Unfettered legal access to psychiatric records is inconsistent with professional ethical guidelines and risks undermining the provision of quality psychiatric care to the community. The existing legal provisions are failing to protect psychiatrist-patient confidentiality. In NSW, the onus is placed on the psychiatrist and/or patient to make a complicated application to the court, to direct that a subpoena be set aside on the grounds of "Professional Confidential Relationship Privilege." An absence of Commonwealth legislation to protect psychiatrist-patient confidentiality is used by some litigants in family law proceedings to disadvantage patients by stigmatising them, because they have consulted psychiatrists. We recommend that uniform legislation be implemented, giving effect to a primary rule of privilege with exceptions. © The Royal Australian and New Zealand College of Psychiatrists 2014.

  14. Conflicting duties over confidentiality in Argentina and Peru.

    Cavallo, Mercedes

    2011-02-01

    The medical duty of confidentiality represents a key element for the provision of reproductive and sexual health services. In some Latin American countries, such as Argentina and Peru, the legal systems impose—or are interpreted as imposing—on health professionals the duty of confidentiality, but also the duty to report the commission of a public order offense that they know about owing to the practicing of their profession. In these countries, the conflicting duties and the criminalization of abortion cause severe public health and human rights problems when health professionals assist their patients for post-abortion treatment. Typically, patients are deterred from seeking prompt medical care, and their privacy, autonomy, and dignity are violated. A 2010 ruling from the Supreme Court of Argentina and a 2004 ruling from the Inter-American Court of Human Rights emerge as important instruments that grant a more adequate protection of medical confidentiality. © 2010 International Federation of Gynecology and Obstetrics. Published by Elsevier Ireland Ltd. All rights reserved.

  15. 75 FR 12764 - Government-Owned Inventions; Availability for Licensing

    2010-03-17

    ..., lung, mammarys and kidney cancers. These mouse models serve as vehicles to test the efficacy of new... inventions to extend market coverage for companies and may also be available for licensing. ADDRESSES... applications. Spontaneously Transformed Mouse Epithelial Cancer Cell Lines Serving as Mouse Models: A New Model...

  16. 77 FR 32642 - Patents and Inventions; Delegation of Authority

    2012-06-01

    ... DEPARTMENT OF HEALTH AND HUMAN SERVICES Centers for Disease Control and Prevention Patents and... Prevention (CDC), the Deputy Director, DLPP, LSPPPO, OSELS, CDC, and the Chief, Technology Management Branch... regarding the invention and patent program of CDC and the authority to make determinations of rights in...

  17. The laser and its uses: 50 years after its invention

    Besnard, P.; Favennec, P.N.

    2011-01-01

    The laser, 50 years after its invention, has become a major player in modern technologies with its efficient partner the optical fiber. This book reviews the numerous applications of laser in diverse fields such as telecommunication, metrology, optical radar, surface treatment, medicine. The last chapter is dedicated to inertial fusion through the presentation of the Megajoule laser (LMJ) project

  18. 76 FR 72713 - Government-Owned Inventions; Availability for Licensing

    2011-11-25

    ...; Availability for Licensing AGENCY: National Institutes of Health, Public Health Service, HHS. ACTION: Notice... are thought to play a central role in this process. The subject invention is a novel method of... (CTLA4IgG) fusion protein to salivary glands. The system effectively blocks CTLA4 ligand interactions with...

  19. 75 FR 12761 - Government-Owned Inventions; Availability for Licensing

    2010-03-17

    ... inventions to extend market coverage for companies and may also be available for licensing. ADDRESSES..., ADP-ribosylated HNP-1 and other defensins are degraded rapidly in vivo due to the susceptibility of... at the level of approximately $6 billion a year and is expected to grow to $13 billion by the year...

  20. 78 FR 29387 - Government-Owned Inventions, Available for Licensing

    2013-05-20

    ... NATIONAL AERONAUTICS AND SPACE ADMINISTRATION [Notice (13-056)] Government-Owned Inventions, Available for Licensing AGENCY: National Aeronautics and Space Administration. ACTION: Notice of... Method; NASA Case No.: MSC-25265-1: Device and Method and for Digital-to-Analog Transformation and...

  1. 75 FR 41501 - Government-Owned Inventions; Availability for Licensing

    2010-07-16

    ... applications. A Transgenic Model of Human Basal Triple Negative Breast Cancer [C3(l)- tag mice] Description of Invention: Basal triple-negative breast cancer (TNBC) is a common form of human breast cancer for which..., causes a painful stimulation and incapacitates a person for only a brief period. This technology may...

  2. 10 CFR 603.860 - Rights to inventions.

    2010-01-01

    ... approved by assigned intellectual property counsel. (c) Taking past investments as an example, the... DEPARTMENT OF ENERGY (CONTINUED) ASSISTANCE REGULATIONS TECHNOLOGY INVESTMENT AGREEMENTS Award Terms Related to Other Administrative Matters Intellectual Property § 603.860 Rights to inventions. (a) The...

  3. 78 FR 78370 - Government-Owned Inventions; Availability for Licensing

    2013-12-26

    ... have developed a research tool, a murine cell line model (JygMC(A)) with a reporter construct, of... marrow transplantation, stem cell therapy, tissue regeneration) Competitive Advantages: Labeling markers... federally-funded research and development. Foreign patent applications are filed on selected inventions to...

  4. 78 FR 37554 - Government-Owned Inventions; Availability for Licensing

    2013-06-21

    ... generation of self-renewing cells with a high proliferative capacity. Induced pluripotent stem cells (iPS... invention relates to a method of using CD47-modulating compounds to induce multipotent stem cells without..., please contact Denise Crooks at [email protected] . Method of Inducing Pluripotent or Multipotent...

  5. 75 FR 39545 - Government-Owned Inventions; Availability for Licensing

    2010-07-09

    ... Virus Recombinant HA Proteins for Vaccine and Diagnostic Applications Description of Invention: Pandemic... are specific recombinant HA proteins from H1N1, H5N1, and other strains of influenza virus produced in... H5N1 peptides useful for assays to detect antibodies generated [[Page 39546

  6. Increasing Access to Patented Inventions by Post-grant Measures

    Schovsbo, Jens Hemmingsen

    2009-01-01

    " and the so called "tragedy of the anticommons". Next the paper discusses the use of (some) post grant measure to increase access to patented inventions. Traditionally patent law has not paid much attention to such measures. The paper argues that developments suggest that there is good reason to reconsider...

  7. Nobel physics prize to Charpak for inventing particle detectors

    Schwarzschild, B.

    1993-01-01

    This article describes the work of Georges Charpak of France leading to his receipt of the 1992 Nobel Prize in Physics. The Nobel Prize was awarded to Charpak open-quotes for his invention and development of particle detectors, in particular the multiwire proportional chamber.close quotes Historical aspects of Charpak's life and research are given

  8. Metaphor and the Rhetorical Invention of Cold War "Idealists."

    Ivie, Robert L.

    1987-01-01

    Presents a procedure for identifying metaphorical concepts guiding the rhetorical invention of three Cold War "idealists": Henry Wallace, J. William Fulbright, and Helen Caldicott, whose collective failure to dispel threatening images of the Soviets is located in a recurrent system of metaphors that promotes a reversal of the enemy-image…

  9. 78 FR 73549 - Government-Owned Inventions; Availability for Licensing

    2013-12-06

    ... extend market coverage for companies and may also be available for licensing. FOR FURTHER INFORMATION... resistance due to the high sequence conservation of the target. More stable than thioesters. Development... makes this invention a novel and potential long-term therapeutic for restoration of exocrine gland...

  10. 78 FR 42527 - Government-Owned Inventions; Availability for Licensing

    2013-07-16

    ... DEPARTMENT OF HEALTH AND HUMAN SERVICES National Institutes of Health Government-Owned Inventions... (allowing high- throughput production with limited screening) Higher efficiency cloning of baculovirus... for this technology. Related Technology: HHS Reference No. E-164-2011--Combinatorial Cloning Platform...

  11. 78 FR 48692 - Government-Owned Inventions; Availability for Licensing

    2013-08-09

    ... federally-funded research and development. Foreign patent applications are filed on selected inventions to... disrupts lipid homeostasis in liver. J Biol Chem. 2010 Apr 2;285(14):10880-9. [PMID 20097939]. Intellectual Property: HHS Reference No. E-465-2013/0--Research Tool. Patent protection is not being pursued for this...

  12. 76 FR 40381 - Government-Owned Inventions; Availability for Licensing

    2011-07-08

    ... inventions to extend market coverage for companies and may also be available for licensing. ADDRESSES... effective treatment option. EGFRvIII CARs can cross the blood-brain barrier, are expected to target only... squamous cell carcinomas. A personalized cancer treatment strategy for patients whose tumor cells express...

  13. 76 FR 49777 - Government-Owned Inventions; Availability for Licensing

    2011-08-11

    ... repress cell activation targets. Immunotherapy, although an effective treatment strategy, sometimes fails... inventions to extend market coverage for companies and may also be available for licensing. ADDRESSES... Target Validation Laboratory, DCTD, NCI, NIH, is seeking statements of capability or interest from...

  14. 76 FR 63309 - Government-Owned Inventions; Availability for Licensing

    2011-10-12

    ... applications, such as the characterization and study of glucocorticoid signaling in cancer, inflammation, and... is a need to track the spread of these viruses both in the animal and human populations to avert or.... SUMMARY: The inventions listed below are owned by an agency of the U.S. Government and are available for...

  15. Not invented here : managing corporate innovation in a new era

    Vrande, van de V.J.A.

    2007-01-01

    Not Invented here: Managing Corporate Innovation in a New Era External technology sourcing as a means to develop new businesses is taking a more central role in established companies. Acquiring new technologies from outside the firm which speeds up the innovation process and complements internal R&D

  16. 78 FR 16690 - Government-Owned Inventions; Availability for Licensing

    2013-03-18

    ... Ionizing Radiation Description of Technology: The invention relates to methods of using ketogenic compounds to protect against the adverse effects of radiation exposure, including ionizing radiation tissue... therapeutic efficacy of radiation therapies by protecting non-target tissues from incidental radiation damage...

  17. 75 FR 21634 - Government-Owned Inventions; Availability for Licensing

    2010-04-26

    ... interventional devices for delivery of drugs, cells, energy, or sutures through complex trajectories of the body... Ligands for Live Cell Imaging Description of Invention: Recently-developed protein tags enable the..., to fusion proteins containing these tags. For example, SNAP and CLIP tags bind O\\6\\-benzylguanine...

  18. IVO`s CHP know-how: experience, inventions, patents

    Aeijaelae, M.; Ohtonen, V. [ed.

    1997-11-01

    IVO can justly claim mastery in the co-generation of district heat and electricity - CHP. As well as looking at the issue from the viewpoint of planners, builders and operators, IVO`s engineers also view power plants through the eyes of the product developer and inventor. This approach has resulted in successful power plant configurations, inventions and patents and visions

  19. 76 FR 55070 - Government-Owned Inventions; Availability for Licensing

    2011-09-06

    .... SUMMARY: The inventions listed below are owned by an agency of the U.S. Government and are available for..., 6011 Executive Boulevard, Suite 325, Rockville, Maryland 20852-3804; telephone: 301-496-7057; fax: 301... samples for anti- cancer immunotherapy by making use of gas permeable (GP) flasks. This advancement in...

  20. 75 FR 70010 - Government-Owned Inventions; Availability for Licensing

    2010-11-16

    ... Appella (NCI), John K. Inman (NIAID), Deyun Wang (NIDDK), Lisa M. Miller Jenkins (NCI), Ryo Hayashi (NCI). Publications: 1. Miller Jenkins LM, et al. Nature Chemical Biology, in press. 2. Miller Jenkins LM, et al..., evaluate, or commercialize this invention. Please contact Dr. Henry Eden at [email protected] for more...

  1. 75 FR 26258 - Government-Owned Inventions; Availability for Licensing

    2010-05-11

    ....gov for more information. Parvovirus B19 Codon Optimized Structural Proteins for Vaccine and Diagnostic Applications Description of Invention: Parvovirus B19 (B19V) is the only known pathogenic human parvovirus. Infection by this viral pathogen can cause transient aplastic crisis in individuals with high red...

  2. Fourth Graders Make Inventions Using SCAMPER and Animal Adaptation Ideas

    Hussain, Mahjabeen; Carignan, Anastasia

    2016-01-01

    This study explores to what extent the SCAMPER (Substitute, Combine, Adapt, Modify, Put to another use, Eliminate, and Rearrange) technique combined with animal adaptation ideas learned through form and function analogy activities can help fourth graders generate creative ideas while augmenting their inventiveness. The sample consisted of 24…

  3. Is patient confidentiality compromised with the electronic health record?: a position paper.

    Wallace, Ilse M

    2015-02-01

    In order for electronic health records to fulfill their expected benefits, protection of privacy of patient information is key. Lack of trust in confidentiality can lead to reluctance in disclosing all relevant information, which could have grave consequences. This position paper contemplates whether patient confidentiality is compromised by electronic health records. The position that confidentiality is compromised was supported by the four bioethical principles and argued that despite laws and various safeguards to protect patients' confidentiality, numerous data breaches have occurred. The position that confidentiality is not compromised was supported by virtue ethics and a utilitarian viewpoint and argued that safeguards keep information confidential and the public feels relatively safe with the electronic health record. The article concludes with an ethically superior position that confidentiality is compromised with the electronic health record. Although organizational and governmental ways of enhancing the confidentiality of patient information within the electronic health record facilitate confidentiality, the ultimate responsibility of maintaining confidentiality rests with the individual end-users and their ethical code of conduct. The American Nurses Association Code of Ethics for nurses calls for nurses to be watchful with data security in electronic communications.

  4. THE INFORMATION CONFIDENTIALITY AND CYBER SECURITY IN MEDICAL INSTITUTIONS

    SABAU-POPA CLAUDIA DIANA

    2015-07-01

    Full Text Available The information confidentiality and cyber security risk affects the right to confidentiality and privacy of the patient, as regulated in Romania by the Law 46/2002. The manifestation of the cyber security risk event affects the reputation of the healthcare institution and is becoming more and more complex and often due to the: development of network technology, the medical equipment connected to wifi and the electronic databases. The databases containing medical records were implemented due to automation. Thus, transforming data into medical knowledge contribute to a better understanding of the disease. Due to these factors, the measures taken by the hospital management for this type of risk are adapted to the cyber changes. The hospital objectives aim: the implementation of a robust information system, the early threats identifications and the incident reporting. Neglecting this type of risk can generate financial loss, inability to continue providing health care services for a certain period of time, providing an erroneous diagnosis, medical equipment errors etc. Thus, in a digital age the appropriate risk management for the information security and cyber risk represent a necessity. The main concern of hospitals worldwide is to align with international requirements and obtain credentials in terms of data security from the International Organisation for Standardization, which regulates the management of this type of risk. Romania is at the beginning in terms of concerns regarding the management, avoidance and mitigation of information security, the health system being most highly exposed to its manifestation. The present paper examines the concerns of the health system to the confidentiality of information and cyber security risk and its management arrangements. Thus, a set of key risk indicators is implemented and monitored for 2011-2013, using a user interface, a Dashboard, which acts as an early warning system of the manifestation of the

  5. Keys to Taking Your Nanotech Inventions to the Market

    Rickert, Scott

    Although many scientists and engineers may wish to be an owner of something they invented, and then take that something to the market, there are many obstacles to do so. Many of these roadblocks are self-imposed, and many more are there because most of us are not aware of the very strict rules that exist in the world of marketing, selling, and manufacturing in the United States. This lecture will identify a small subset of these obstacles and discuss some ways to overcome them. Belief in your goals is most important, and this belief must be shared by others, or you cannot succeed. Believe it or not, no one wants to steal your ideas or inventions. They would much rather have you take it to market yourself. This really is a lecture about winning.

  6. Invented spelling – a window on early literacy

    Elżbieta Awramiuk

    2014-01-01

    Full Text Available A wide spectrum of research on preschool spelling development in different languages is presented. In Poland, children at kindergarten are usually at a stage of pre-literacy. Invented spelling means the writing produced by young children (aged 3–7 before they are formally taught reading and writing or are at the beginning of the learning process. Their writing is more spontaneous than learnt. The paper describes an investigation of the development of early literacy and factors influencing it, such as knowledge about orthography (spelling, early morphological awareness or teaching methods. Children’s early writing provides a window on their conceptualisation of the written language, illustrating the process of developing language awareness and spelling skills. Invented spelling, together with phonological abilities and letter knowledge is considered to be a strong predictor for later literacy skills.

  7. Invention activities as preparation for learning laboratory data handling skills

    Day, James

    2012-10-01

    Undergraduate physics laboratories are often driven by a mix of goals, and usually enough of them to cause cognitive overload for the student. Our recent findings align well with studies indicating that students often exit a physics lab without having properly learned how to handle real data. The value of having students explore the underlying structure of a problem before being able to solve it has been shown as an effective way to ready students for learning. Borrowing on findings from the fields of education and cognitive psychology, we use ``invention activities'' to precede direct instruction and bolster learning. In this talk I will show some of what we have learned about students' data handling skills, explain how an invention activity works, and share some observations of successful transfer.

  8. Gossip, stories and friendship: confidentiality in midwifery practice.

    James, S

    1995-12-01

    Women often seek midwifery care as an alternative to the maternity services that are readily available within the insured health care system in Alberta. Some aspects of community-based, primary care midwifery in Alberta that characterize this alternative are the use of story-telling as a form of knowledge, the development of social connections among women seeking midwifery care, and nonauthoritarian relationships between midwives and women. In this paper, the concept of confidentiality, as it relates to these aspects of midwifery practice, is explored, using traditional, caring and feminist models of ethics.

  9. Invention of Lithium Ion Secondary Battery and Its Business Development

    正本, 順三/米田,晴幸; 米田, 晴幸; MASAMOTO, Junzo; YONEDA, Haruyuki

    2010-01-01

    At present, mobile phones and laptop computers are essential items in our daily life. As a battery for such portable devices, the lithium ion secondary battery is used. The lithium ion secondary battery, which is used as a battery for such portable devices, was first invented by Dr. Yoshino at Asahi Kasei. In this paper, the authors describe how the lithium ion secondary battery was developed by the inventor. The authors also describe the battery separator, which is one of the key components ...

  10. Not invented here : managing corporate innovation in a new era

    Vrande, van de, V.J.A.

    2007-01-01

    Not Invented here: Managing Corporate Innovation in a New Era External technology sourcing as a means to develop new businesses is taking a more central role in established companies. Acquiring new technologies from outside the firm which speeds up the innovation process and complements internal R&D is an important aspect of new business development within the paradigm of open innovation. It is becoming a requirement to create and sustain competitive advantage in different product markets, an...

  11. The Airplane as an Open-Source Invention

    Peter B. Meyer

    2013-01-01

    Airplanes were invented after decades of experimentation in many countries through a process we can call open-source innovation. Experimenters, inventors, and writers contributed to the airplane’s development by sharing information in publications, in clubs, by writing letters and by visiting. The hundreds of aeronautical patents before 1900 were treated like publications, not like claims to intellectual property. Inventors of modern airplanes copied earlier designs, analogously to advances i...

  12. Examining the social and scientific roles of invention in science education

    Calabrese-Barton, Angela

    1998-03-01

    I have been drawn to the construct of “invention” and “inventive acts” because in my research involving how homeless children construct science and the self-in-science, an overwhelming theme has been the multiple ways in which self-identity in science has been described by the children through a language of invention. Using post-modern feminism and science and technologies studies, I examine the multiple uses and definitions of “invention” in science in order to develop a theory of invention and inventive acts around the themes: invention as a social act, invention as a recursive and socially linked process, and embodied agency. I use this framework to examine the construct of “invention” in two different case studies involving the science education of urban homeless children. Finally, I link this discussion of invention and inventive acts with current international reform initiatives revolving around constructivist science teaching and learning.

  13. Nanotechnological Inventions and Nanomaterials Produce A Profound Effect

    VLASOV Vladimir Alexeevich

    2015-02-01

    Full Text Available The inventions in the area of nanotechnologies and nanomaterials produce a profound effect in construction, housing and communal services and adjacent economic fields as they allow us: to increase mechanical strength, coefficient of elasticity, alkali resistance and temperature of products vitrification; to obtain nanostructured coatings with the property of shape memory on the steel; to raise the dynamics of coal burning and its full burnout in the boilers of thermoelectric power station; to produce metal nanopowders with increased stored energy 10–15% etc. For example, the invention «Epoxy composition for high strength, alkali resistant structures» refers to epoxy composition used as a binder for production of high strength, thermal- and alkali-resistant glass-fiber material which can be applied in the manufacture process of construction reinforcement to strengthen concrete structures. The invention «The method to produce nanostructured reaction foil» can be used to join different materials including metal alloys, ceramics, amorphous materials and elements of microelectronic devices that are sensible to the heating. This process provides decreased labour-output ratio and energy consumption as well as the condition to manufacture foil with specified stored energy and high mechanical properties. The invention «The method of intensification of burning lowreactionary coal in the boilers of thermoelectric power station» refers to the thermal energy and can be implemented at the thermal plants. The increased dynamics of inflaming and burning leads to full burnout of powdered-coal low-reactionary fuel and decreased mechanical underfiring. The specialists may be also interested in the following inventions: fine dispersed organic suspension of carbon metal-containing nanostructures and the method to produce it; the dispersion of carbon nanotubes; the composition for reinforcement of building structures; the reinforced plate element made of

  14. Para que servem os inventários de fauna?

    Luís Fábio Silveira

    2010-01-01

    Full Text Available Inventários de fauna acessam diretamente a diversidade de uma localidade, em um determinado espaço e tempo. Os dados primários gerados pelos inventários compõem uma das ferramentas mais importantes na tomada de decisões a respeito do manejo de áreas naturais. Entretanto, vários problemas têm sido observados em diversos níveis relacionados aos inventários de fauna no Brasil e vão desde a formação de recursos humanos até a ausência de padronização, de desenho experimental e de seleção de métodos inadequados. São apresentados estudos de caso com mamíferos, répteis, anfíbios e peixes, nos quais são discutidos problemas como variabilidade temporal e métodos para detecção de fauna terrestre, sugerindo que tanto os inventários quanto os programas de monitoramento devam se estender por prazos maiores e que os inventários devem incluir diferentes metodologias para que os seus objetivos sejam plenamente alcançados.Inventories of fauna directly access the diversity of a locality in a certain period of time. The primary data generated by these inventories comprise one of the most important steps in decisions making regarding the management of natural areas. However, several problems have been observed at different levels related to inventories of fauna in Brazil, and range from the training of humans to the lack of standardization of experimental design and selection of inappropriate methods. We present case studies of mammals, reptiles, amphibians and fishes, where they discussed issues such temporal variability and methods for detection of terrestrial fauna, suggesting that both inventories and monitoring programs should be extended for longer terms and that inventories should include different methodologies to ensure that their goals are fully achieved.

  15. Quantum key based burst confidentiality in optical burst switched networks.

    Balamurugan, A M; Sivasubramanian, A

    2014-01-01

    The optical burst switching (OBS) is an emergent result to the technology concern that could achieve a feasible network in future. They are endowed with the ability to meet the bandwidth requirement of those applications that require intensive bandwidth. There are more domains opening up in the OBS that evidently shows their advantages and their capability to face the future network traffic. However, the concept of OBS is still far from perfection facing issues in case of security threat. The transfer of optical switching paradigm to optical burst switching faces serious downfall in the fields of burst aggregation, routing, authentication, dispute resolution, and quality of service (QoS). This paper deals with employing RC4 (stream cipher) to encrypt and decrypt bursts thereby ensuring the confidentiality of the burst. Although the use of AES algorithm has already been proposed for the same issue, by contrasting the two algorithms under the parameters of burst encryption and decryption time, end-to-end delay, it was found that RC4 provided better results. This paper looks to provide a better solution for the confidentiality of the burst in OBS networks.

  16. Quantum Key Based Burst Confidentiality in Optical Burst Switched Networks

    A. M. Balamurugan

    2014-01-01

    Full Text Available The optical burst switching (OBS is an emergent result to the technology concern that could achieve a feasible network in future. They are endowed with the ability to meet the bandwidth requirement of those applications that require intensive bandwidth. There are more domains opening up in the OBS that evidently shows their advantages and their capability to face the future network traffic. However, the concept of OBS is still far from perfection facing issues in case of security threat. The transfer of optical switching paradigm to optical burst switching faces serious downfall in the fields of burst aggregation, routing, authentication, dispute resolution, and quality of service (QoS. This paper deals with employing RC4 (stream cipher to encrypt and decrypt bursts thereby ensuring the confidentiality of the burst. Although the use of AES algorithm has already been proposed for the same issue, by contrasting the two algorithms under the parameters of burst encryption and decryption time, end-to-end delay, it was found that RC4 provided better results. This paper looks to provide a better solution for the confidentiality of the burst in OBS networks.

  17. HIPAA-protecting patient confidentiality or covering something else?

    Robbins RA

    2013-10-01

    Full Text Available No abstract available. Article truncated at 150 words. A case of a physician fired from the Veterans Administration (VA for violation of the Health Care Portability and Accountability Act of 1996 (HIPAA illustrates a problem with both the law and the VA. Anil Parikh, a VA physician at the Jesse Brown VA in Chicago, was dismissed on a charge of making unauthorized disclosures of confidential patient information on October 19, 2007. On January 3, 2011 the Merit Systems Protection Board (MSPB reversed Dr. Parikh’s removal. Dr. Parikh's initially made disclosures to the VA Office of Inspector General and to Senator Barack Obama and Congressman Luis Gutierrez, in whose district the Jesse Brown VA lies. Dr. Parikh alleged that there were systematic problems within the Jesse Brown VA that resulted in untimely and inadequate patient care. The confidential patient information Parikh disclosed included examples of the misdiagnoses and misdirection of patients within the hospital. Specifically, Dr. Parikh alleged that …

  18. Research Participants' Understanding of and Reactions to Certificates of Confidentiality.

    Beskow, Laura M; Check, Devon K; Ammarell, Natalie

    2014-01-01

    Certificates of Confidentiality are intended to facilitate participation in critical public health research by protecting against forced disclosure of identifying data in legal proceedings, but little is known about the effect of Certificate descriptions in consent forms. To gain preliminary insights, we conducted qualitative interviews with 50 HIV-positive individuals in Durham, North Carolina to explore their subjective understanding of Certificate descriptions and whether their reactions differed based on receiving a standard versus simplified description. Most interviewees were neither reassured nor alarmed by Certificate information, and most said it would not influence their willingness to participate or provide truthful information. However, compared with those receiving the simplified description, more who read the standard description said it raised new concerns, that their likelihood of participating would be lower, and that they might be less forthcoming. Most interviewees said they found the Certificate description clear, but standard-group participants often found particular words and phrases confusing, while simplified-group participants more often questioned the information's substance. Valid informed consent requires comprehension and voluntariness. Our findings highlight the importance of developing consent descriptions of Certificates and other confidentiality protections that are simple and accurate. These qualitative results provide rich detail to inform a larger, quantitative study that would permit further rigorous comparisons.

  19. A commercial outcome prediction system for university technology transfer using neural networks

    Chu, Ling

    2007-01-01

    This thesis was submitted for the degree of Doctor of Philosophy and awarded by Brunel University, 26/03/2007. This thesis presents a commercial outcome prediction system (CPS) capable of predicting the likely future monetary return that would be generated by an invention. The CPS is designed to be used by university technology transfer offices for invention assessment purposes, and is based on the data from their historical invention cases. It is aimed at improving technology transfer off...

  20. Invented Spelling, Word Stress, and Phonological Awareness in Relation to Reading Difficulties in Children

    Mehta, Sheena

    2016-01-01

    The purpose of the current research is to assess the clinical utility of an invented spelling tool and determine whether invented spelling and word stress (supra-segmental level measures) can also be used to better identify reading difficulties. The proposed invented spelling tool incorporated linguistic manipulations to alter the difficulty…

  1. The asymmetry between discoveries and inventions in the Nobel Prize for Physics

    Bartneck, C.; Rauterberg, G.W.M.

    2008-01-01

    This paper presents an empirical study on the frequency of discoveries and inventions that were awarded with the. More than 70 per cent of all Nobel Prizes were given to discoveries. The majority of inventions were awarded at the beginning of the twentieth century and only three inventions had a

  2. 37 CFR 1.295 - Review of decision finally refusing to publish a statutory invention registration.

    2010-07-01

    ... dissatisfied with the final refusal to publish a statutory invention registration for reasons other than... refunded if the final refusal to publish a statutory invention registration for reasons other than... refusing to publish a statutory invention registration. 1.295 Section 1.295 Patents, Trademarks, and...

  3. 45 CFR 7.1 - Duty of employee to report inventions.

    2010-10-01

    ... 45 Public Welfare 1 2010-10-01 2010-10-01 false Duty of employee to report inventions. 7.1 Section 7.1 Public Welfare DEPARTMENT OF HEALTH AND HUMAN SERVICES GENERAL ADMINISTRATION EMPLOYEE INVENTIONS § 7.1 Duty of employee to report inventions. Every Department employee is required to report to...

  4. Privacy and Confidentiality in Exchange of Information Procedures : Some Uncertainties, Many Issues, but Few Solutions

    Debelva, F.; Mosquera, Valderrama I.J.

    2017-01-01

    The overall aim of this article is to analyse the taxpayers’ rights to confidentiality and privacy in exchange of information including the new global standard of automatic exchange of information. Section 2 will analyse the state of the art regarding the right to privacy and confidentiality in

  5. 5 CFR 2634.901 - Policies of confidential financial disclosure reporting.

    2010-01-01

    .... (a) The confidential financial reporting system set forth in this subpart is designed to complement... Government duties involve the exercise of significant discretion in certain sensitive areas, report their... apparent conflicts of interest. The confidential financial disclosure system promotes that goal, with...

  6. 41 CFR 105-60.405 - Processing requests for confidential commercial information.

    2010-07-01

    ... MATERIALS 60.4-Described Records § 105-60.405 Processing requests for confidential commercial information... 41 Public Contracts and Property Management 3 2010-07-01 2010-07-01 false Processing requests for confidential commercial information. 105-60.405 Section 105-60.405 Public Contracts and Property Management...

  7. Attitude of Lithuanian residents to confidentiality of adolescent sexual and reproductive health care

    Jaruseviciene, Lina; Lazarus, Jeff; Zaborskis, Apolinaras

    2011-01-01

    To assess the attitudes of Lithuanian residents towards the protection of confidentiality in the sexual and reproductive health care of adolescents.......To assess the attitudes of Lithuanian residents towards the protection of confidentiality in the sexual and reproductive health care of adolescents....

  8. 40 CFR 260.2 - Availability of information; confidentiality of information.

    2010-07-01

    ... 40 Protection of Environment 25 2010-07-01 2010-07-01 false Availability of information; confidentiality of information. 260.2 Section 260.2 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) SOLID WASTES (CONTINUED) HAZARDOUS WASTE MANAGEMENT SYSTEM: GENERAL General § 260.2 Availability of information; confidentiality of...

  9. Privacy and Confidentiality Practices In Adolescent Family Planning Care At Federally Qualified Health Centers.

    Beeson, Tishra; Mead, Katherine H; Wood, Susan; Goldberg, Debora Goetz; Shin, Peter; Rosenbaum, Sara

    2016-03-01

    The confidentiality of family planning services remains a high priority to adolescents, but barriers to implementing confidentiality and privacy practices exist in settings designed for teenagers who are medically underserved, including federally qualified health centers (FQHCs). A sample of 423 FQHCs surveyed in 2011 provided information on their use of five selected privacy and confidentiality practices, which were examined separately and combined into an index. Regression modeling was used to assess whether various state policies and organizational characteristics were associated with FQHCs' scores on the index. In-depth case studies of six FQHCs were conducted to provide additional contextual information. Among FQHCs reporting on confidentiality, most reported providing written or verbal information regarding adolescents' rights to confidential care (81%) and limiting access to family planning and medical records to protect adolescents' confidentiality (84%). Far fewer reported maintaining separate medical records for family planning (10%), using a security block on electronic medical records to prevent disclosures (43%) or using separate contact information for communications regarding family planning services (50%). Index scores were higher among FQHCs that received Title X funding than among those that did not (coefficient, 0.70) and among FQHCs with the largest patient volumes than among those with the smallest caseloads (0.43). Case studies highlighted how a lack of guidelines and providers' confusion over relevant laws present a challenge in offering confidential care to adolescents. The organizational practices used to ensure adolescent family planning confidentiality in FQHCs are varied across organizations. Copyright © 2016 by the Guttmacher Institute.

  10. 45 CFR 307.13 - Security and confidentiality for computerized support enforcement systems in operation after...

    2010-10-01

    ... ENFORCEMENT SYSTEMS § 307.13 Security and confidentiality for computerized support enforcement systems in... systems in operation after October 1, 1997. (a) Information integrity and security. Have safeguards... 45 Public Welfare 2 2010-10-01 2010-10-01 false Security and confidentiality for computerized...

  11. 6 CFR 25.10 - Confidentiality and protection of Intellectual Property.

    2010-01-01

    ... 6 Domestic Security 1 2010-01-01 2010-01-01 false Confidentiality and protection of Intellectual Property. 25.10 Section 25.10 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY REGULATIONS TO SUPPORT ANTI-TERRORISM BY FOSTERING EFFECTIVE TECHNOLOGIES § 25.10 Confidentiality and...

  12. 5 CFR 1312.26 - Control of secret and confidential material.

    2010-01-01

    ... 5 Administrative Personnel 3 2010-01-01 2010-01-01 false Control of secret and confidential... Accountability of Classified Information § 1312.26 Control of secret and confidential material. Classified... Document Control, will be used to establish accountability controls on all Secret material received or...

  13. 42 CFR 405.215 - Confidential commercial and trade secret information.

    2010-10-01

    ... 42 Public Health 2 2010-10-01 2010-10-01 false Confidential commercial and trade secret information. 405.215 Section 405.215 Public Health CENTERS FOR MEDICARE & MEDICAID SERVICES, DEPARTMENT OF... trade secret information. To the extent that CMS relies on confidential commercial or trade secret...

  14. 40 CFR 370.64 - What information can I claim as trade secret or confidential?

    2010-07-01

    ... secret or confidential? 370.64 Section 370.64 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY... secret or confidential? (a) Trade secrets. You may be able to withhold the name of a specific chemical... trade secret. The requirements for withholding trade secret information are set forth in EPCRA section...

  15. 40 CFR 725.15 - Determining applicability when microorganism identity or use is confidential or uncertain.

    2010-07-01

    ... ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) TOXIC SUBSTANCES CONTROL ACT REPORTING REQUIREMENTS AND REVIEW... appear on the public version of the Inventory, in § 725.239 or in subpart M of this part. Instead, it is contained in a confidential version held in EPA's Confidential Business Information Center (CBIC). The...

  16. 16 CFR 312.8 - Confidentiality, security, and integrity of personal information collected from children.

    2010-01-01

    ... 16 Commercial Practices 1 2010-01-01 2010-01-01 false Confidentiality, security, and integrity of... COMMISSION REGULATIONS UNDER SPECIFIC ACTS OF CONGRESS CHILDREN'S ONLINE PRIVACY PROTECTION RULE § 312.8 Confidentiality, security, and integrity of personal information collected from children. The operator must...

  17. 77 FR 48072 - Final Confidentiality Determinations for Regulations Under the Mandatory Reporting of Greenhouse...

    2012-08-13

    ... Final Confidentiality Determinations for Regulations Under the Mandatory Reporting of Greenhouse Gases... confidentiality determinations for certain data elements in regulations under the Mandatory Greenhouse Gas... Greenhouse Gas Reporting Program Web site at http://www.epa.gov/climatechange/emissions/ghgrulemaking.html...

  18. 17 CFR 200.83 - Confidential treatment procedures under the Freedom of Information Act.

    2010-04-01

    ... SECURITIES AND EXCHANGE COMMISSION ORGANIZATION; CONDUCT AND ETHICS; AND INFORMATION AND REQUESTS Information... first received by the Commission (i) it is supplied segregated from information for which confidential..., 100 F Street, NE., Washington, DC 20549. The person requesting confidential treatment may supply...

  19. Having Confidence in Therapeutic Work with Young People: Constraints and Challenges to Confidentiality

    Jenkins, Peter

    2010-01-01

    Confidentiality presents particular challenges to practitioners working with young people, on account of the latter's vulnerability and emotional immaturity. Ethical codes place a key importance on confidentiality, from deontological and teleological perspectives. However, young clients may rely on a more pragmatic approach in deciding whether to…

  20. 15 CFR Supplement No. 1 to Part 718 - Confidential Business Information Declared or Reported *

    2010-01-01

    ... 15 Commerce and Foreign Trade 2 2010-01-01 2010-01-01 false Confidential Business Information... Commerce and Foreign Trade (Continued) BUREAU OF INDUSTRY AND SECURITY, DEPARTMENT OF COMMERCE CHEMICAL WEAPONS CONVENTION REGULATIONS CONFIDENTIAL BUSINESS INFORMATION Pt. 718, Supp. 1 Supplement No. 1 to Part...

  1. 42 CFR 2.1 - Statutory authority for confidentiality of drug abuse patient records.

    2010-10-01

    ... HUMAN SERVICES GENERAL PROVISIONS CONFIDENTIALITY OF ALCOHOL AND DRUG ABUSE PATIENT RECORDS Introduction § 2.1 Statutory authority for confidentiality of drug abuse patient records. The restrictions of these regulations upon the disclosure and use of drug abuse patient records were initially authorized by section 408...

  2. 30 CFR 210.40 - Will MMS keep the information I provide confidential?

    2010-07-01

    ... 30 Mineral Resources 2 2010-07-01 2010-07-01 false Will MMS keep the information I provide... MINERALS REVENUE MANAGEMENT FORMS AND REPORTS General Provisions § 210.40 Will MMS keep the information I provide confidential? The MMS will treat information obtained under this part as confidential to the...

  3. 30 CFR 291.111 - How does MMS treat the confidential information I provide?

    2010-07-01

    ... 30 Mineral Resources 2 2010-07-01 2010-07-01 false How does MMS treat the confidential information... SHELF LANDS ACT § 291.111 How does MMS treat the confidential information I provide? (a) Any person who provides documents under this part in response to a request by MMS to inform a decision on whether open...

  4. 48 CFR 1552.235-71 - Treatment of confidential business information.

    2010-10-01

    ... business information. 1552.235-71 Section 1552.235-71 Federal Acquisition Regulations System ENVIRONMENTAL... Clauses 1552.235-71 Treatment of confidential business information. As prescribed in 1535.007-70(b... determined that in the performance of a contract, EPA may furnish confidential business information to the...

  5. 48 CFR 1552.235-80 - Access to confidential business information.

    2010-10-01

    ... business information. 1552.235-80 Section 1552.235-80 Federal Acquisition Regulations System ENVIRONMENTAL... Clauses 1552.235-80 Access to confidential business information. As prescribed in 1535.007-70(g), insert the following clause. Access to Confidential Business Information (OCT 2000) It is not anticipated...

  6. 48 CFR 1552.235-76 - Treatment of Confidential Business Information (APR 1996).

    2010-10-01

    ... Business Information (APR 1996). 1552.235-76 Section 1552.235-76 Federal Acquisition Regulations System... Provisions and Clauses 1552.235-76 Treatment of Confidential Business Information (APR 1996). As prescribed in 1535.007-70(c), insert the following clause: Treatment of Confidential Business Information (TSCA...

  7. 48 CFR 1552.235-70 - Screening business information for claims of confidentiality.

    2010-10-01

    ... 48 Federal Acquisition Regulations System 6 2010-10-01 2010-10-01 true Screening business... Texts of Provisions and Clauses 1552.235-70 Screening business information for claims of confidentiality... proprietary or confidential by the business that has the right to the information. The following clause...

  8. Confidentiality with Minors: The Need for Policy To Promote and Protect.

    Stone, Carolyn; Isaacs, Madelyn L.

    2003-01-01

    Investigated school counselors' attitudes toward breaching confidentiality before and after the 1999 Columbine High School shootings. Surveys of demographically similar counselors indicated that the Columbine shootings affected counselors' predictions about their attitudes and behavior regarding confidentiality. Counselors were more reluctant to…

  9. 22 CFR 1101.5 - Security, confidentiality and protection of records.

    2010-04-01

    ... 22 Foreign Relations 2 2010-04-01 2010-04-01 true Security, confidentiality and protection of... Bureau of Standard's booklet “Computer Security Guidelines for Implementing the Privacy Act of 1974” (May... STATES AND MEXICO, UNITED STATES SECTION PRIVACY ACT OF 1974 § 1101.5 Security, confidentiality and...

  10. Public expectations concerning confidentiality protection of adolescents' sexual and reproductive health care in Lithuania

    Jaruseviciene, Lina; Zaborskis, Apolinaras; Lazarus, Jeffrey Victor

    2014-01-01

    OBJECTIVE: An adolescent's right to confidential healthcare is protected by international law and professional consensus. However, parental and social support for confidential sexual and reproductive health (SRH) services, in particular, varies greatly. This study documents Lithuanian residents......' expectations with regard to confidentiality protection for adolescents in this domain, and explores the factors related to the diversity of these expectations. METHODS: Two national surveys of Lithuanian residents completed in 2005 and 2012 using anonymous questionnaires. Participants rated their expectations...... for confidentiality using a five-point Likert scale for eight types of SRH consultations. RESULTS: Public anticipation for confidentiality depended on whether issues related to sexual behaviour or to its consequences were addressed during adolescent consultation. Only younger respondents had higher expectations...

  11. Genetic secrets: Protecting privacy and confidentiality in the genetic era. Final report

    Rothstein, M.A. [ed.

    1998-09-01

    Few developments are likely to affect human beings more profoundly in the long run than the discoveries resulting from advances in modern genetics. Although the developments in genetic technology promise to provide many additional benefits, their application to genetic screening poses ethical, social, and legal questions, many of which are rooted in issues of privacy and confidentiality. The ethical, practical, and legal ramifications of these and related questions are explored in depth. The broad range of topics includes: the privacy and confidentiality of genetic information; the challenges to privacy and confidentiality that may be projected to result from the emerging genetic technologies; the role of informed consent in protecting the confidentiality of genetic information in the clinical setting; the potential uses of genetic information by third parties; the implications of changes in the health care delivery system for privacy and confidentiality; relevant national and international developments in public policies, professional standards, and laws; recommendations; and the identification of research needs.

  12. Inventive Activity of Researchers: Cross-Country Rating Assessments

    Tatyana Ivanovna Volkova

    2017-03-01

    Full Text Available In recent years, the study of the research capacity of the country and regions has become more active not only from the point of view of their leading components (personnel, financial, information, organizational, material-and-technical ones but also from the perspective of the assessment of productivity and effectiveness of researchers’ work. In the cross-country analysis, the certain highly aggregative parameters, which values, as a rule, are not in favour of Russia, are used. At the same time, at profound studying of this topic, these estimates cannot represent correctly the real trends of inventive activity in the scientific and technological sphere of the country and its regions. Moreover, the measurement of the researchers’ creative potential realization is carried out mainly through the assessment systems of their printing activity. Little attention is paid to the problem of the rating assessments of the researchers’ inventive and patent activity and its products from a cross-country perspective (especially to the detailed ones as well as to its institutional determinants. Therefore, the authors have chosen this subject-matter of the research. Its empirical basis is the statistical materials of both the national database and those which are recognized by the world scientific community. This research has both theoretical and methodological orientations. The purpose is the development of methodological and methodical tools of the research and assessment of researchers’ inventive activity including methodological support of cross-country comparative assessments. The authors have based the hypothesis on their previous research: in the conditions of the decreasing level of financial security, continuous reduction of a number of researchers, institutional restrictions and contradictions, the inventive activity of national researchers is still exist, and in a number of its leading parameters is implemented at the level of the advanced

  13. Nanotechnologies and nanomaterials: review of inventions. Part 1

    IVANOV Leonid Alexeevich

    2017-02-01

    Full Text Available The new technical solutions including inventions in the area of nanotechnology and nanomaterials are efficiently applied in communal and housing services as well as in construction and other joint fields. The invention «Protection system of urban housing and the method to build it (RU 2604933» refers to construction including environmental structures and can be used to protect cities, objects of national economy from destruction, floods and other types of natural and antropogenic disasters. Reinforcement of basements of city buildings is performed with barrels with fillers and flexible dampener-ties that receive natural and antropogenic impacts thus providing safety, including ecological one, for urban housing. The system is equipped with solar accumulators that supply energy to people in case of emergencies and additional monitoring system to inform people about emergencies. Storm discharge facilities protect cities and towns from floods. All that provides safety of inhabitants’ lives and functioning of enterprises when natural and antropogenic disasters such as floods, mud-and-stone flows and other types occur. The specialists may be also interested in the following nanotechnological inventions: the method to produce hardening mortar (RU 2601885, increase of durability of basalt fiber concrete by nanostructural additives, the method to treat surface and underground waters from titanium and its compounds by means of carbon nanotubes and ultrasound (RU 2575029, material on polymer basis for combined radio- and radiation protection (RU 2605696, thermoelectric heat pump with nanofilm semiconductor sides (RU 2595911, polymer composite nanomaterial (RU 2605590, the method to produce compositions from polymer and nanosize fillers (RU 2586979, the method to produce complex nanodispersed additive for highstrength concrete (RU 2563264 et al.

  14. Inventing around Edison’s Incandescent Lamp Patent

    Howells, John; Katznelson, Ron D.

    ’s ‘898 patent. Third, by analysis of forward citation to these patents we show that regardless of these inventions’ commercial viability in the incandescent lamp market, some became important prior art for new technological fields and some laid the groundwork for the later successful substitute...... for Edison’s carbon filament. Fourthly, we show that the recent view that Edison’s patent gave the patent holder General Electric (GE) a dominant position in the incandescent lamp market is incorrect: we show that besides commercially-successful invention around the claims of this patent, data for GE...

  15. Inventing around Edison’s incandescent lamp patent

    Howells, John; Ron D, Katznelson

    ’s ‘898 patent. Third, by analysis of forward citation to these patents we show that regardless of these inventions’ commercial viability in the incandescent lamp market, some became important prior art for new technological fields and some laid the groundwork for the later successful substitute...... for Edison’s carbon filament. Fourthly, we show that the recent view that Edison’s patent gave the patent holder General Electric (GE) a dominant position in the incandescent lamp market is incorrect: we show that besides commercially-successful invention around the claims of this patent, data for GE...

  16. Sun, wave, earth, and wind. 50 energy machines already invented

    Eriksen, B W

    1980-01-01

    This publication gives illustrated examples of issued patents showing what has already been invented, the aim being to avoid scarce resources of creativity and finance being wastefully expended on already existing solutions. Furthermore, it is the aim of this publication to direct the attention of experimenters, researchers and inventors working within the field of alternative energy sources to patent literature in order that they may use it as a basis for further development and thus avoid reinventing the wheel. The examples given are only illustrative. They do not represent a full survey of patent literature.

  17. The Invention of a Danish Well-being Tourism Region

    Hjalager, Anne Mette

    2011-01-01

    . Strategy is about expressing the direction and timing of development. In this particular regional setting, with numerous individual actors, it was not simple to reconcile the needs and objectives of those involved, but collaboration has nevertheless resulted in targeted fields of action. Substance...... a commitment for the future. Symbolic actions are fundamental parts of the substance or visual elements that happen to have an intrinsic communicative power. Symbolic actions addressed in the project included community based marketing and policy related extensions, etc. Inventing a regional product or brand...... requires a painstaking combination of strategy, substance, structure and symbolic action, and in Southern Denmark, the first steps have been taken....

  18. Marking time the epic quest to invent the perfect calendar

    Steel, Duncan

    2001-01-01

    ""If you lie awake worrying about the overnight transition from December 31, 1 b.c., to January 1, a.d. 1 (there is no year zero), then you will enjoy Duncan Steel's Marking Time.""--American Scientist ""No book could serve as a better guide to the cumulative invention that defines the imaginary threshold to the new millennium.""--Booklist A Fascinating March through History and the Evolution of the Modern-Day Calendar . . . In this vivid, fast-moving narrative, you'll discover the surprising story of how our modern calendar came about and how it has changed dramatically through the years.

  19. 48 CFR 1552.235-73 - Access to Federal Insecticide, Fungicide, and Rodenticide Act Confidential Business Information...

    2010-10-01

    ... Insecticide, Fungicide, and Rodenticide Act Confidential Business Information (APR 1996). 1552.235-73 Section... Insecticide, Fungicide, and Rodenticide Act Confidential Business Information (APR 1996). As prescribed in... Act Confidential Business Information (APR 1996) In order to perform duties under the contract, the...

  20. 48 CFR 1552.235-75 - Access to Toxic Substances Control Act Confidential Business Information (APR 1996).

    2010-10-01

    ... Control Act Confidential Business Information (APR 1996). 1552.235-75 Section 1552.235-75 Federal... Confidential Business Information (APR 1996). As prescribed in 1535.007(b), insert the following provision: Access to Toxic Substances Control Act Confidential Business Information (APR 1996) In order to perform...

  1. The invention and early history of the CCD

    Smith, George E.

    2009-01-01

    As the first practical solid-state imaging device, the invention of the Charge Coupled Device has profoundly affected image sensing technology. They are used in a wide range of applications as both area and linear imaging devices starting with the replacement of imaging tubes used in commercial TV cameras and camcorders. The rapid increase of their use in digital cameras has initiated the demise of film photography and created vast new markets with great economic benefit for many. Other uses include a wide variety of scientific, surveillance and scanning applications. The inception of the device at Bell Labs by Willard S. Boyle and George E. Smith in 1969 was strongly influenced by several unique factors existing both within Bell Labs and the current world state of technology. These factors and their relevance will be discussed along with the train of thought leading to the invention. Early experimental devices and their initial applications were vigorously pursued and will be described. Current applications will be mentioned.

  2. Japan acts to speed technology transfer from universities

    Saegusa, A

    1999-01-01

    A Japanese law will take effect in the autumn to promote technology transfer from universities and laboratories. The new measures aim to encourage collaborations with the commercial sector and allow industrial research partners to retain title to inventions (1 page).

  3. Privacy and confidentiality: perspectives of mental health consumers and carers in pharmacy settings.

    Hattingh, Hendrika Laetitia; Knox, Kathy; Fejzic, Jasmina; McConnell, Denise; Fowler, Jane L; Mey, Amary; Kelly, Fiona; Wheeler, Amanda J

    2015-02-01

    The study aims to explore within the community pharmacy practice context the views of mental health stakeholders on: (1) current and past experiences of privacy, confidentiality and support; and (2) expectations and needs in relation to privacy and confidentiality. In-depth interviews and focus groups were conducted in three states in Australia, namely Queensland, the northern region of New South Wales and Western Australia, between December 2011 and March 2012. There were 98 participants consisting of consumers and carers (n = 74), health professionals (n = 13) and representatives from consumer organisations (n = 11). Participants highlighted a need for improved staff awareness. Consumers indicated a desire to receive information in a way that respects their privacy and confidentiality, in an appropriate space. Areas identified that require improved protection of privacy and confidentiality during pharmacy interactions were the number of staff having access to sensitive information, workflow models causing information exposure and pharmacies' layout not facilitating private discussions. Challenges experienced by carers created feelings of isolation which could impact on care. This study explored mental health stakeholders' experiences and expectations regarding privacy and confidentiality in the Australian community pharmacy context. A need for better pharmacy staff training about the importance of privacy and confidentiality and strategies to enhance compliance with national pharmacy practice requirements was identified. Findings provided insight into privacy and confidentiality needs and will assist in the development of pharmacy staff training material to better support consumers with sensitive conditions. © 2014 Royal Pharmaceutical Society.

  4. Inventions leading to the development of the diagnostic test kit industry--from the modern pregnancy test to the sandwich assays.

    Wide, Leif

    2005-01-01

    The universities are encouraged by the government nowadays to stimulate innovations and also to provide the proper machinery for assisting the protection and commercialisation of innovations. A better understanding of the innovation process may help to create an atmosphere suitable for inventions at the university. Examples can be taken from successful innovations previously made at the university. During the 1960's I made a series of inventions, which ultimately led to the development of the diagnostic test kit industry. The first, which I made as an undergraduate, was a simple and reliable test kit for diagnosis of pregnancy. This was followed by the solid phase radioimmunoassay and a solid phase assay for vitamin B12; next, the dual specific non-competitive sandwich assay and the in-vitro test for diagnosis of allergy, called RAST (Radioallergosorbent test). Organon in Holland with the pregnancy test kit, and Pharmacia in Sweden with test kits for radioimmunoassay, became pioneers among the diagnostic test kit industries. Pharmacia Diagnostics later became one of the leading diagnostic test kit companies in the world and has continued to be so in the field of allergy diagnosis. Each one of these inventions started with a few unique observations leading to a technical development. The pregnancy test as well as the allergy test emerged from the development of assay methods with unique qualities with the subsequent search for appropriate applications. The foreseeing of a commercial value on a future market was a very important step. This was followed by the search for a suitable industry interested to exploit the invention with its new business opportunity i.e. apply for a patent, produce and market the products, which in my case consisted of the necessary reagents and equipments for particular diagnostic tests. Finally, an agreement had to be settled between the entrepreneur and the inventors. This report describes these inventions and particularly discusses some

  5. Half of Vermont Academic and Public Libraries Lack Written Confidentiality Policies Despite Directors’ Support for Principles of Patron Confidentiality. A Review of: Magi, Trina J., “The Gap between Theory and Practice: A Study of the Prevalence and Strength of Patron Confidentiality Policies in Public and Academic Libraries.” Library & Information Science Research 29 (2007: 455-70.

    Stephanie Walker

    2008-09-01

    Full Text Available Objectives – To examine the prevalence and strength of patron confidentiality policies and practices at academic and public libraries in Vermont; to examine variances in policies by type and size of library and by qualifications of library directors; and to examine the level of support among Vermont library directors for strengthening state law to clarify that personally identifiable information about library patrons is confidential and should only be released with a court order.Design – Survey (non-randomized of 213 library directors.Setting – Academic and public libraries in Vermont (USA.Subjects – The initial audience was defined to be the directors of the 213 academic and public libraries in Vermont (as the persons to whom the survey was directed. Ultimately, results from 149 returned surveys were used as a basis for analysis. In addition, a written report of the information gathered was provided to the governing bodies of the Vermont Department of Libraries and the Vermont Library Association. The author also anticipates that the results of the survey will be of general interest to academic and public librarians.Methods – A literature review of previous research on library policies and practices regarding patron confidentiality was completed. As well, the author examined the various state and federal laws and library association codes of ethics which address issues of the confidentiality of library patron data. A paper questionnaire was mailed on January 11, 2006, to directors of 188 municipal and incorporated public libraries (including 11 combined public and school libraries and 25 college and university libraries, for a total of 213 libraries targeted. Cover letters explaining the purpose of the study and assuring respondents of the confidentiality of their responses were included in the mailing. The contact information came from a list supplied by the Vermont Department of Libraries. The questionnaire had previously been

  6. The nanotechnological inventions raise competitive ability of the products

    VLASOV Vladimir Alexeevich

    2014-12-01

    Full Text Available A brief description of the nanotechnological inventions is given. The inventions in the area of nanotechnologies and nanomaterials produce a profound effect in construction, housing and communal services and adjacent economic fields as they allow us: to obtain high strength and durability of surfaces of the details, to provide different materials with hydrophil properties, to increase efficiency of transformation of light energy into electrical one etc., and in general – to raise competitive ability of the products. For example, the method of production of solar element and a unit of solar elements (RU 2532137 comprises following stages: formation of pn-transfer in semiconductor base plate, formation of passivating layer on the light-receptive surface and/or non light-receptive surface of semiconductor base plate and formation of power robbing electrodes on the light-receptive surface and non light-receptive. A film of aluminium oxide is formed as passivating layer, its thickness is up to 40 nm, and lectrode is formed by baking conductive paste under the temperature 500–900ͦͦ°C for 1 second – 30 inutes with formation of sintered product. The sintered product penetrates through passivating layer setting electric contact between electrode and base plate. The formation of aluminium ide with specified thickness on the surface of base plate makes it possible to achieve good passivating characteristics and good electric contact between silica and electrode only by eans of baking conductive paste, that is standard technology. Moreover the baking stage which was necessary to get the effect of film passivation for aluminium oxide in the past now can be cancelled to decrease costs. The specialists may be also interested in the following nanotechnological inventions: reinforced flaked element made of natural or conglomerate stone and its multilayer protective coating (RU 2520193; fine organic suspension of carbon metal-containing nanostructures

  7. The Las Vegas Strip as a Genuinely Invented Global Landscape

    Daniel Ortega

    2004-12-01

    Full Text Available Las Vegas, Nevada, is typically recognised as a place via a single urban gesture, that gesture being Las Vegas Boulevard, which is more commonly referred to as "The Strip". In constructing a thesis around the theme, "Here or There? Interconnections between the Global and the Local", one cannot ignore the invitation to discuss globalisation and its effects on a particular local fabric. For the purpose of this text, globalisation can be thought of as what Carmona et al describe as an intricate series of events leading to the world "becoming increasingly interconnected, with centralised decision making exploiting economies of scale and standardisation" (2003: 101. The centralised decision-making process for The Strip is evident in the strategy to develop individually themed casino resorts along Las Vegas Boulevard that respond to a competitive economy, thus creating a newly standardised landscape. If we also understand that globalisation can be thought of as the development of an interconnected world where economic, political and cultural boundaries can be easily crossed, this work can begin to define how the Las Vegas Strip is a genuinely invented global landscape. This paper addresses the "here-ness" as well as the "there-ness" of The Strip, while offering a dialectical framework for establishing a meaning of place by having 'there' placed 'here'. By employing semiological interpretations of real landscapes from around the globe (for example, Venturi et al, 1972, The Strip becomes a newly invented landscape of "simulations" (Baudrillard, 1988. As such, The Strip acts as a narrative that forms a unique place, opening the door to questions of authenticity and identity. This paper concludes by focusing on the question of "Here or There?" as an appropriate deviation from the assumed role that the post-modern landscape of the Las Vegas Strip plays. This work is intended to be a point of departure from the frequent criticism of the Las Vegas Strip as

  8. Private Finance 2 (PF2): Re-inventing the Wheel?

    Zawawi, N. A. W. A.; Abdul-Aziz, A. R.; Khamidi, M. F.; Othman, I.; Idrus, A.; Umar, A. A.

    2013-06-01

    The Procurement policy of any government is the most influential factor in determining the efficiency of infrastructure and service provision like roads, water supply and energy. The UK's HM Treasury released its new guidelines on private involvement in infrastructures provision and services towards reforming the popular Private Finance Initiatives (PFI) policy. This new approach, it now refers to as the Private Finance 2 (PF2) is meant to correct the imperfections which have bedeviled the older version-PFI. However, the 'new guidelines' contained nothing really new in the area of private financing and operation of public infrastructures, at best it is akin to 're-inventing the wheel' rather than being 'new'. While dwelling extensively on issues relating to cheaper financing sources, risks transfer, counterpart funding by government and improving public sector procurement skills, this paper argues that some countries in the developing world have long recognised these issues and taken practical steps to correct them.

  9. Japan's patent issues relating to life science therapeutic inventions.

    Tessensohn, John A

    2014-09-01

    Japan has made 'innovation in science and technology' as one of its central pillars to ensure high growth in its next stage of economic development and its life sciences market which hosts regenerative medicine was proclaimed to be 'the best market in the world right now.' Although life science therapeutic inventions are patentable subject matter under Japanese patent law, there are nuanced obviousness and enablement challenges under Japanese patent law that can be surmounted in view of some encouraging Japanese court developments in fostering a pro-patent applicant environment in the life sciences therapeutic patent field. Nevertheless, great care must be taken when drafting and prosecuting such patent applications in the world's second most important life sciences therapeutic market.

  10. Inventing the future: Energy and the CO2 "greenhouse" effect

    Davis, E. E., Jr.

    Dennis Gabor, A winner of the Nobel Prize for Physics, once remarked that man cannot predict the future, but he can invent it. The point is that while we do not know with certainty how things will turn out, our own actions can play a powerful role in shaping the future. Naturally, Gabor had in mind the power of science and technology, and the model includes that of correction or feedback. It is an important: Man does not have the gift of prophecy. Any manager or government planner would err seriously by masterminding a plan based unalterably on some vision of the future, without provision for mid-course correction. It is also a comforting thought. With man's notorious inability to create reliable predictions about such matters as elections, stock markets, energy supply and demand, and, of course, the weather, it is a great consolation to feel that we can still retain some control of the future.

  11. Transmedia marketing and re-invention of public relations

    Jakus Dalibor

    2016-12-01

    Full Text Available Many concepts have been developed to describe the convergence of media, public relations and storytelling formats in contemporary media systems. This article presents a theoretical reflection on “transmedia storytelling” from a perspective of integration narrative in the context of the re-invention of public relations. The rapid evolution of digital media technology and the emergence of transmedia storytelling present foresight professionals with a powerful new approach for communicating about the future. A transmedia story unfolds across multiple media platforms with each new text making a distinctive and valuable contribution to the whole. Between other, this article also outlines some of the key principles and elements of transmedia storytelling in combination with modern public relations, in order to provide a basic framework that public relations practitioner can use when designing transmedia projects.

  12. From Hallucination to Fiction: The Invention of Meaning in Psychosis.

    Lippi, Silvia; Lehaire, Célia; Petit, Laetitia

    2016-12-01

    Taking their inspiration from a case history, the authors explore the effects of a writing workshop led by a professional writer for patients in a psychiatric hospital. This workshop allowed different modes of transference to unfold: transference to the analyst-therapist, transference to the writer who led the workshop, and transference to the other members of the group. The writing activity created conditions in which there could be a movement from hallucination to delusion-a delusion expressed in fiction through the act of writing. Psychotic patients "invent" a writing that remains unfinished and that relates to the experiences of persecution. Writing thus makes it possible for them to tolerate language, through its transformation into writing.

  13. The Invention of Infertility in the Classical Greek World:

    Flemming, Rebecca

    2013-01-01

    Summary The article examines the understandings of, and responses to, reproductive failure in the classical Greek world. It discusses explanations and treatments for non-procreation in a range of ancient Greek medical texts, focusing on the writings of the Hippocratic Corpus, which devote considerable energy to matters of fertility and generation, and places them alongside the availability of a divine approach to dealing with reproductive disruption, the possibility of asking various deities, including the specialist healing god Asclepius, for assistance in having children. Though the relations between these options are complex, they combine to produce a rich remedial array for those struggling with childlessness, the possibility that any impediment to procreation can be removed. Classical Greece, rather than the nineteenth century, or even 1978, is thus the time when “infertility,” understood as an essentially reversible somatic state, was invented. PMID:24362276

  14. Art, Science and the Invention of Things That Last

    Edwards, David

    2018-01-14

    Aesthetic creation involves a close collaboration between discovery, invention and cultural exhibition, as well as between learning and producing value. It is typified by the patterns of creative behavior in highly innovative communities like Silicon Valley (for IT) or Boston (for biotech) where cultures of learning, experimentation, and production or commercialization coexist, and where a high degree of interdisciplinary collaboration occurs. In this lecture, David Edwards will highlight the growing movement of aesthetic creation in the arts, sciences and engineering as a path for sustaining and improving the human condition in the longest term. He will highlight aesthetic creation in the light of the culture lab model of Le Laboratoire (Paris, Cambridge) and the new World Frontiers Forum with examples of learning, pubic experimentation and value creation particularly related to the future of sensory experience.

  15. Private Finance 2 (PF2): Re-inventing the Wheel?

    Zawawi, N A W A; Khamidi, M F; Othman, I; Umar, A A; Abdul-Aziz, A R; Idrus, A

    2013-01-01

    The Procurement policy of any government is the most influential factor in determining the efficiency of infrastructure and service provision like roads, water supply and energy. The UK's HM Treasury released its new guidelines on private involvement in infrastructures provision and services towards reforming the popular Private Finance Initiatives (PFI) policy. This new approach, it now refers to as the Private Finance 2 (PF2) is meant to correct the imperfections which have bedeviled the older version-PFI. However, the 'new guidelines' contained nothing really new in the area of private financing and operation of public infrastructures, at best it is akin to 're-inventing the wheel' rather than being 'new'. While dwelling extensively on issues relating to cheaper financing sources, risks transfer, counterpart funding by government and improving public sector procurement skills, this paper argues that some countries in the developing world have long recognised these issues and taken practical steps to correct them.

  16. 18 CFR 401.75 - Protection of trade secrets; Confidential information.

    2010-04-01

    ..., confidential statistical data, amount or source of any income, profits, losses, or expenditures of any person... States Code which provides: Whoever, being an officer or employee of the United States or of any...

  17. 75 FR 56096 - Access to Confidential Business Information by Industrial Economics Incorporated

    2010-09-15

    ... ENVIRONMENTAL PROTECTION AGENCY [EPA-HQ-OPPT-2003-0004; FRL-8845-1] Access to Confidential Business Information by Industrial Economics Incorporated AGENCY: Environmental Protection Agency (EPA). ACTION: Notice. SUMMARY: EPA has authorized contractor, Industrial Economics Incorporated (IEI) of...

  18. 75 FR 78238 - Access to Confidential Business Information by Science Applications International Corporation and...

    2010-12-15

    ... Business Information by Science Applications International Corporation and Its Identified Subcontractors..., Science Applications International Corporation (SAIC) of San Diego, CA, and Its Identified Subcontractors... Control Act (TSCA). Some of the information may be claimed or determined to be Confidential Business...

  19. Genetic privacy and confidentiality: why they are so hard to protect.

    Rothstein, M A

    1998-01-01

    Author notes that widespread concerns have been raised about protecting genetic privacy and confidentiality in insurance and employment. He argues that effective protections are difficult because complicated issues, such as the right of access to health care, are invariably implicated.

  20. Developing an effective corrective action process : lessons learned from operating a confidential close call reporting system

    2013-03-05

    In 2007, the Federal Railroad Administration (FRA) launched : C3RS, the Confidential Close Call Reporting System, as a : demonstration project to learn how to facilitate the effective : reporting and implementation of corrective actions, and assess t...

  1. 7 CFR 981.75 - Confidential nature of records and reports.

    2010-01-01

    ... Section 981.75 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (Marketing Agreements and Orders; Fruits, Vegetables, Nuts), DEPARTMENT OF AGRICULTURE ALMONDS..., financial condition, or business operations of any handler shall be considered as confidential information...

  2. Confidentiality Enhancement of Highly Sensitive Nuclear Data Using Steganography with Chaotic Encryption over OFDM Channel

    Mahmoud, S.; Ayad, N.; Elsayed, F.; Elbendary, M.

    2016-01-01

    Full text: Due to the widespread usage of the internet and other wired and wireless communication methods, the security of the transmitted data has become a major requirement. Nuclear knowledge is mainly built upon the exchange of nuclear information which is considered highly sensitive information, so its security has to be enhanced by using high level security mechanisms. Data confidentiality is concerned with the achievement of higher protection for confidential information from unauthorized disclosure or access. Cryptography and steganography are famous and widely used techniques that process information in order to achieve its confidentiality, but sometimes, when used individually, they don’t satisfy a required level of security for highly sensitive data. In this paper, cryptography is accompanied with steganography for constituting a multilayer security techniques that can strengthen the level of security of highly confidential nuclear data that are archived or transmitted through different channel types and noise conditions. (author)

  3. 77 FR 12284 - Access to Confidential Business Information; Protection Strategies Incorporated

    2012-02-29

    ... Business Information; Protection Strategies Incorporated AGENCY: Environmental Protection Agency (EPA). ACTION: Notice. SUMMARY: EPA has authorized its contractor, Protection Strategies Incorporated (PSI) of... Business Information (CBI). DATES: Access to the confidential data occurred on or about February 16, 2012...

  4. 75 FR 57768 - Access to Confidential Business Information by Eastern Research Group and Its Identified...

    2010-09-22

    ... Business Information by Eastern Research Group and Its Identified Subcontractor AGENCY: Environmental Protection Agency (EPA). ACTION: Notice. SUMMARY: EPA has authorized its contractor, Eastern Research Group... the information may be claimed or determined to be Confidential Business Information (CBI). DATES...

  5. Privacy Act System of Records: Confidential Business Information Tracking System, EPA-20

    Learn about the Confidential Business Information Tracking System, including who is covered in the system, the purpose of data collection, routine uses for the system's records, and other security procedures.

  6. 78 FR 54889 - Proposed Information Collection Request; Comment Request; Confidentiality Rules (Renewal)

    2013-09-06

    ... received will be included in the public docket without change including any personal information provided, unless the comment includes profanity, threats, or information claimed to be Confidential Business... of appropriate automated electronic, mechanical, or other technological collection techniques or...

  7. 75 FR 8330 - Access to Confidential Business Information by Eastern Research Group

    2010-02-24

    ... ENVIRONMENTAL PROTECTION AGENCY [EPA-HQ-OPPT-2003-0004; FRL-8812-4] Access to Confidential Business Information by Eastern Research Group AGENCY: Environmental Protection Agency (EPA). ACTION: Notice. [[Page 8331

  8. 12 CFR 261.20 - Confidential supervisory information made available to supervised financial institutions and...

    2010-01-01

    ... available to supervised financial institutions and financial institution supervisory agencies. 261.20... Supervised Institutions, Financial Institution Supervisory Agencies, Law Enforcement Agencies, and Others in... institutions and financial institution supervisory agencies. (a) Disclosure of confidential supervisory...

  9. A play´s libretto “Sami”. The invention of evil. A Halloween tale

    Carlos Bernardo González León

    2010-11-01

    Full Text Available In an atmosphere of comedy, satire and play, we go through the most significant celestial event in the Western religious view on the myth of creation of the Universe, and the celestial battle between Luzbel who, out of pride, rebelled against God, desiring to be like him, and was expelled from heaven by the Archangel Michael as a punishment, along with the army of rebellious angels who were dragged by him (a group of innocent cherubim, being known from that time as the Fallen Angel: Bearer of Light; this is, the logos (who delivers the wisdom and the fire to men; but also becomes the supreme archetype of the Rebel, the first universal separatist and autonomist, for the sake of freedom and anarchy. And is in this polarisation of the medieval mind that appears what we know as evil: an invention of human culture. Here the classic characters of the Middle Ages are reinterpreted: God, the Death, demons, angels and cherubim, are mixed with classic Celtic spirits, fairies, witches, and Merlin, coinciding with the naturalistic and ecological spirit of the ";;new age” in a fun recreation of this ultimate contradiction.

  10. 7 CFR 1280.231 - Patents, copyrights, inventions, product formulations, and publications.

    2010-01-01

    ... (Continued) AGRICULTURAL MARKETING SERVICE (MARKETING AGREEMENTS AND ORDERS; MISCELLANEOUS COMMODITIES... the rental, sale leasing, franchising, or other uses of such patents, copyrights, inventions, or...

  11. When security and medicine missions conflict: confidentiality in prison settings.

    Allen, Scott A; Aburabi, Raed

    2016-06-13

    Purpose - It is a simple fact that prisons cannot exist - practically, legally, ethically or morally - without the support of physicians and other health professionals. Access to adequate healthcare is one of the fundamental measures of the legitimacy of a jail or prison. At the same time, there is a fundamental tension in the missions of the prison and doctor. The primary mission of the prison is security and often punishment. Reform and rehabilitation have intermittently been stated goals of prisons in the last century, but in practice those humane goals have rarely governed prison administrative culture. The primary mission of the physician is to promote the health and welfare of his or her patient. The paper aims to discuss these issues. Design/methodology/approach - At times, what is required to serve the patient's best interest is at odds with the interests of security. Much of the work of the prison physician does not conflict with the operation of security. Indeed, much of the work of the prison physician is allowed to proceed without much interference from the security regime. But given the fundamental discord in the legitimate missions of security vs medicine, conflict between the doctor and the warden is inevitable. Findings - In this paper, the authors consider the example of patient confidentiality to illustrate this conflict, using case examples inspired by real cases from the experience of the authors. Originality/value - The authors provide an ethical and practical framework for health professionals to employ when confronting these inevitable conflicts in correctional settings.

  12. RESPECTING THE CONFIDENTIALITY AND ANONYMITY IN QUALITATIVE RESEARCH IN SOCIOLOGY

    Maria OPREA

    2018-06-01

    Full Text Available Ethics, a philosophical discipline, formulates a set of principles that must be followed, in respect of good and truth, fundamental values of humanity. The world of scientific research, of all kinds, also obeys moral imperatives and principles and is called upon to answer to society not only in relation to the discoveries themselves but, above all, in relation to the possible destructive effects on man or his life environment. The researcher in the sphere of social sciences is more involved in the act of responsibility, the more the topic subject of the study is the individual, the social group, the social environment. He must rigorously follow the principles and requirements of fair, honest, objective studies that do not harm the dignity of the human being. In line with the ethical rigors of scientific research, the article aims to highlight some aspects of respecting the principle of confidentiality and anonymity in qualitative research in the field of sociology, with reference to the study of vulnerable groups in Arad County.

  13. Confidentiality Protection of Digital Health Records in Cloud Computing.

    Chen, Shyh-Wei; Chiang, Dai Lun; Liu, Chia-Hui; Chen, Tzer-Shyong; Lai, Feipei; Wang, Huihui; Wei, Wei

    2016-05-01

    Electronic medical records containing confidential information were uploaded to the cloud. The cloud allows medical crews to access and manage the data and integration of medical records easily. This data system provides relevant information to medical personnel and facilitates and improve electronic medical record management and data transmission. A structure of cloud-based and patient-centered personal health record (PHR) is proposed in this study. This technique helps patients to manage their health information, such as appointment date with doctor, health reports, and a completed understanding of their own health conditions. It will create patients a positive attitudes to maintain the health. The patients make decision on their own for those whom has access to their records over a specific span of time specified by the patients. Storing data in the cloud environment can reduce costs and enhance the share of information, but the potential threat of information security should be taken into consideration. This study is proposing the cloud-based secure transmission mechanism is suitable for multiple users (like nurse aides, patients, and family members).

  14. WTO confidential: the case of asbestos. World Trade Organization.

    Castleman, Barry

    2002-01-01

    The World Trade Organization (WTO), created in 1995, adjudicates "trade disputes" between member nations in cases with great human rights, cultural, environmental, and public health significance. Throughout the process of dispute resolution and even after a case is concluded, very little of what happens is made accessible to the public. However, it is one thing to criticize the WTO for its lack of transparency from outside the process, and another to critically examine what was withheld from disclosure and what dangers that presents. This is the inside story from a scientific adviser to one of the parties in a WTO case, analyzing what happened from a public health point of view. This analysis concludes that the public health justification of banning asbestos was accepted in the end by the economists at the WTO, despite the WTO's bias in favoring the party (Canada) making the free trade challenge (to public health legislation, in this case) in numerous stages of the process, despite the WTO's utter lack of expertise in science, medicine, engineering, and public health, and despite important erroneous statements made to the WTO under the cover of confidentiality. Despite its result, this case illustrates that the WTO's threat to national sovereignty could never withstand the light of day, that the people of the world would reject this dangerous free trade fundamentalism if the limitations and dangers of the process were open for all to see.

  15. Security, privacy, and confidentiality issues on the Internet

    Kelly, Grant; McKenzie, Bruce

    2002-01-01

    We introduce the issues around protecting information about patients and related data sent via the Internet. We begin by reviewing three concepts necessary to any discussion about data security in a healthcare environment: privacy, confidentiality, and consent. We are giving some advice on how to protect local data. Authentication and privacy of e-mail via encryption is offered by Pretty Good Privacy (PGP) and Secure Multipurpose Internet Mail Extensions (S/MIME). The de facto Internet standard for encrypting Web-based information interchanges is Secure Sockets Layer (SSL), more recently known as Transport Layer Security or TLS. There is a public key infrastructure process to `sign' a message whereby the private key of an individual can be used to `hash' the message. This can then be verified against the sender's public key. This ensures the data's authenticity and origin without conferring privacy, and is called a `digital signature'. The best protection against viruses is not opening e-mails from unknown sources or those containing unusual message headers. PMID:12554559

  16. Security, privacy, and confidentiality issues on the Internet.

    Kelly, Grant; McKenzie, Bruce

    2002-01-01

    We introduce the issues around protecting information about patients and related data sent via the Internet. We begin by reviewing three concepts necessary to any discussion about data security in a healthcare environment: privacy, confidentiality, and consent. We are giving some advice on how to protect local data. Authentication and privacy of e-mail via encryption is offered by Pretty Good Privacy (PGP) and Secure Multipurpose Internet Mail Extensions (S/MIME). The de facto Internet standard for encrypting Web-based information interchanges is Secure Sockets Layer (SSL), more recently known as Transport Layer Security or TLS. There is a public key infrastructure process to 'sign' a message whereby the private key of an individual can be used to 'hash' the message. This can then be verified against the sender's public key. This ensures the data's authenticity and origin without conferring privacy, and is called a 'digital signature'. The best protection against viruses is not opening e-mails from unknown sources or those containing unusual message headers.

  17. Nursing Students' Perceptions of Confidentiality, Accountability, and E-Professionalism in Relation to Facebook.

    Barnable, Alexia; Cunning, Glenda; Parcon, Mariel

    This study examined nursing students' perceptions of confidentiality, accountability, and e-professionalism in relation to Facebook. All of the students were aware that posting patients' names and pictures of patients constituted a confidentiality breach. When comparing students based on educational status, there were differing opinions on whether employers should use Facebook profile information for hiring decisions. Nursing programs should provide current education, including clear and up-to-date policies, about social media use.

  18. THE POSSIBLE CONFIDENTIALITY: THE PUBLIC ADMINISTRATION AS PARTY IN THE ALTERNATIVE DISPUTE RESOLUTION MECHANISM

    Carlos Alberto de Salles

    2017-05-01

    Full Text Available This article debates the tension that exists between confidentiality, usual in ADRs, and the publicity principle, that rules the Public Administration in Brazil. As a solution points that the parameter of confidentiality when Public Administration is a party must be the preservation of accountability of the involved agencies, what means, the capacity to answer to its own goals and to obey the public control.

  19. Attitudes toward medical and genetic confidentiality in the Saudi research biobank: An exploratory survey.

    Alahmad, Ghiath; Hifnawy, Tamer; Abbasi, Badaruddin; Dierickx, Kris

    2016-03-01

    Achieving a balance between giving access to information and respecting donors' confidentiality is a crucial issue for any biobank, with its large number of samples and associated information. Despite the existence of much empirical literature on confidentiality, there are too few surveys in the Middle East about the topic, particularly in the Saudi context. A survey was conducted of 200 respondents at King Abdulaziz Medical City in Riyadh, Saudi Arabia, among 5 groups of equal size, comprised of researchers, physicians, medical students, donors and laypersons, respectively. The majority of participants agreed that confidentiality is an important issue and that it is well protected in the Saudi biobank. All 5 groups showed different attitudes toward disclosing information to various third parties. They were in favor of allowing treating physicians, and to a certain extent family members, to have access to medical and genetic results from research. No significant differences were found between views on medical and genetic confidentiality. The majority of respondents agreed that confidentiality might be breached in cases with specific justified reasons. Even considering differences in religion, culture and other factors, the results of the study were consistent with those reported in the literature and research conducted in other countries. We therefore place emphasis on the importance of protecting and promoting patient/donor confidentiality and privacy. Copyright © 2016. Published by Elsevier Ireland Ltd.

  20. Wallace H. Coulter: decades of invention and discovery.

    Robinson, J Paul

    2013-05-01

    Only a few inventors can be said to have made as great an impact on mankind as Wallace Coulter. His inquisitive mind and ability to see well beyond what existed served him well for 40 years of inventing. So many of the fundamental tools that exist today in the area of hematology were derived from or driven by Coulter's inventions that he could be called the most technological innovator in the field of modern hematology. In achieving these discoveries Wallace Coulter was clearly capable of visualizing future opportunities that few others recognized. His vision was combined with an uncanny ability to translate his ideas into products. He developed a large number of tools that shaped the fields of cytometry, image analysis, and industrial materials. His understanding of the future power of computation drove him to link these technologies in a unique way. In the end, Coulter shaped the technologies that ultimately drove hematology in a new direction, one that remains on a critical pathway linking technology innovation all the way to true translational impact. It was said of Henry Ford that "[h]e has no notion that wealth has made him great, and any one who is imprest merely by his wealth bores him. In his personal contacts he likes to dodge the subject. He would prefer to talk with a machinist about machinery, or with somebody who likes birds about birds. In these contacts, he asks no deference; and if he gets it, he suspects it is mere deference to wealth, and that ends his interest."(1) The same could be said of Wallace Coulter, who, like Ford, understood the concepts of mass production and customer service. Coulter had the ability to recognize the opportunity and fulfill the need for development of a blood-cell counter that could be placed in every pathology laboratory, and in so doing transformed a field from a qualitative to a quantitative environment. Every person who has ever entered a medical lab, hospital, or doctor's office has felt the impact of Coulter

  1. University Technology Transfer Information Processing from the Attention Based View

    Hamilton, Clovia

    2015-01-01

    Between 2005 and 2011, there was no substantial growth in licenses executed by university technology transfer offices. Since the passage of the Bayh Dole Act of 1980, universities have owned technological inventions afforded by federal research funding. There are still university technology transfer offices that struggle with increasing their…

  2. Expedited patent examination for green inventions: Developing countries' policy choices

    Lu, Bingbin

    2013-01-01

    Innovation in green technology is important. Patent rights can provide incentives for green technology research and development. Expedited patent examination for green inventions has emerged as a policy instrument to provide such incentives. Developing countries were never opposed to patents for green technologies. China and Brazil have led the way by offering expedited examinations for green patent applications. More developing countries are expected to follow. Expedited examination for green technologies is consistent with the intellectual property system objectives and is justified by the clear social benefit from green technologies. Introducing such expedited programs in developing countries has sufficient advantages. Existing models of expedited programs for green technologies are analyzed to generalize key issues and to discern suitable policy choices for developing countries. When introducing such programs, a balanced definition for green technology is preferred; a special classification requirement is premature and is not recommended; a pre-examination search requirement is generally recommended to balance patent office workloads, and a green patent database is recommended. - Highlights: • There is no north–south divide in promoting green technologies. • Earlier issuance of green patents has its great social benefit. • Green patent application should receive expedited examination. • Developing countries should introduce such expedited programs. • A suitable approach for developing countries is searched and recommended

  3. No wonder you wonder! great inventions and scientific mysteries

    Phipps, Claude

    2016-01-01

    This book explores and explains scientific mysteries and principles, leavened with tongue-in-cheek humor and an abundance of illustrations. Chapters are short, but give an understanding of technology and science not available elsewhere. Questions include: • What holds a satellite up while it goes around the Earth? • Why is the sky (made out of clear air!) blue instead of green, or just black as night like the sky that high altitude jumper Felix Baumgartner saw? • How is laser light different from “normal” light? • Did Columbus really discover that the Earth is round? • Which one invention will assuredly survive our civilization? • Why can’t you travel back in time?  If you often feel embarrassed because you don’t have a clue about lasers, the difference between volts, amps and watts, or how jet planes really work – but you would like to understand the physical principles of our modern world, whether you’re a teen or a parent – this book is for you! To understand the basics of quantu...

  4. Invention Versus Direct Instruction: For Some Content, It's a Tie

    Chase, Catherine C.; Klahr, David

    2017-12-01

    An important, but as yet unresolved pedagogical question is whether discovery-oriented or direct instruction methods lead to greater learning and transfer. We address this issue in a study with 101 fourth and fifth grade students that contrasts two distinct instructional methods. One is a blend of discovery and direct instruction called Invent-then-Tell (IT), and the other is a version of direct instruction called Tell-then-Practice (TP). The relative effectiveness of these methods is compared in the context of learning a critical inquiry skill—the control-of-variables strategy. Previous research has demonstrated the success of IT over TP for teaching deep domain structures, while other research has demonstrated the superiority of direct instruction for teaching simple experimental design, a domain-general inquiry skill. In the present study, students in both conditions made equally large gains on an immediate assessment of their application and conceptual understanding of experimental design, and they also performed similarly on a test of far transfer. These results were fairly consistent across school populations with various levels of prior achievement and socioeconomic status. Findings suggest that broad claims about the relative effectiveness of these two distinct methods should be conditionalized by particular instructional contexts, such as the type of knowledge being taught.

  5. Modelling Chemical Reasoning to Predict and Invent Reactions.

    Segler, Marwin H S; Waller, Mark P

    2017-05-02

    The ability to reason beyond established knowledge allows organic chemists to solve synthetic problems and invent novel transformations. Herein, we propose a model that mimics chemical reasoning, and formalises reaction prediction as finding missing links in a knowledge graph. We have constructed a knowledge graph containing 14.4 million molecules and 8.2 million binary reactions, which represents the bulk of all chemical reactions ever published in the scientific literature. Our model outperforms a rule-based expert system in the reaction prediction task for 180 000 randomly selected binary reactions. The data-driven model generalises even beyond known reaction types, and is thus capable of effectively (re-)discovering novel transformations (even including transition metal-catalysed reactions). Our model enables computers to infer hypotheses about reactivity and reactions by only considering the intrinsic local structure of the graph and because each single reaction prediction is typically achieved in a sub-second time frame, the model can be used as a high-throughput generator of reaction hypotheses for reaction discovery. © 2017 Wiley-VCH Verlag GmbH & Co. KGaA, Weinheim.

  6. Tradition and Agency. Tracing cultural continuity and invention

    Tradition helps ensure continuity and stability in human affairs, signifying both the handing down of cultural heritage from one generation to the next, and the particular customs, beliefs and rituals being handed down. In the social sciences, tradition has been a central concept from the very st...... address the larger questions of cultural continuity, agency and the use of cultural resources. In the postscript, Terence Ranger offers a complementary perspective by tracing the effects of nationalism, imperialism and globalised exchange on tradition.......Tradition helps ensure continuity and stability in human affairs, signifying both the handing down of cultural heritage from one generation to the next, and the particular customs, beliefs and rituals being handed down. In the social sciences, tradition has been a central concept from the very...... revolutionize the understanding of tradition in anthropology, history and sociology, stimulating an enormous amount of research on invented and imagined traditions. However, most of this research has focussed on the cultural dynamics of specific local innovations and reactions to global developments...

  7. Invention of science a new history of the scientific revolution

    Wootton, David

    2015-01-01

    We live in a world made by science. How and when did this happen? This book tells the story of the extraordinary intellectual and cultural revolution that gave birth to modern science, and mounts a major challenge to the prevailing orthodoxy of its history. Before 1492 it was assumed that all significant knowledge was already available; there was no concept of progress; people looked for understanding to the past not the future. This book argues that everything changed with the discovery of America, which demonstrated that new knowledge was possible: indeed it introduced the very concept of "discovery", and opened the way to the invention of science. The first crucial discovery was Tycho Brahe's nova of 1572: proof that there could be change in the heavens. The telescope (1610) rendered the old astronomy obsolete. Torricelli's experiment with the vacuum (1643) led directly to the triumph of the experimental method in the Royal Society of Boyle and Newton. By 1750 Newtonianism was being celebrated throughout E...

  8. 37 CFR 1.475 - Unity of invention before the International Searching Authority, the International Preliminary...

    2010-07-01

    ... general inventive concept (“requirement of unity of invention”). Where a group of inventions is claimed in... combinations of categories: (1) A product and a process specially adapted for the manufacture of said product; or (2) A product and a process of use of said product; or (3) A product, a process specially adapted...

  9. Girls & Young Women Inventing: Twenty True Stories about Inventors Plus How You Can Be One Yourself.

    Karnes, Frances A.; Bean, Suzanne M.

    This book presents first-person accounts of 20 young female inventors. Most have won prizes for their inventions; some have even obtained patents. Part 1 "Inventors and Their Inventions," focuses on the young inventors and their lives, how they came up with their ideas, who helped them, what problems they faced, and how they solved their problems.…

  10. Reflexivity and the Sociology of Science and Technology: The Invention of "Eryc" the Antibiotic

    Collyer, Fran

    2011-01-01

    Until recently, the social-technical process of invention has fallen between sociological investigation of the genesis of a new idea (an ideational phenomenon) and the production of a new technology (a material phenomenon). The advent of post-modernism and post-structuralism offered new avenues for theorising invention, accounting for, on the one…

  11. THE PRINCIPLE OF CONFIDENTIALITY IN ARBITRATION. APPLICATION AND LIMITATIONS OF THE PRINCIPLE

    Bazil Oglindă

    2015-11-01

    Full Text Available Over the years, arbitration has grown to be the preferred means of dispute resolution by commercial entities. One of the benefits that build the attraction for this system of dispute resolution was the principle of confidentiality. One issue that needs to be analyzed is about the reasons why confidentiality is so important in business. Confidentiality is a principle largely embraced in arbitration, but, as we will see, the principle is not an absolute one. There are a set of questions that needs to be answer to, like: Who is bound by the duty of confidentiality? Does this refer only to the parties or does it expands to other actors involved in the arbitral proceedings? What happens with the obligation of confidentiality when issues are brought before a court, taking in account the principle of open justice? We will see that in some countries are procedural laws allowing the courts to order an arbitration claim to be heard in public or in private. Another important aspect that has arisen in the last period is regarding the public policy and the protection of public interest as a limitation to confidentiality of arbitration. This is a sensitive matter especially when one of the parties is a state or a state entity. This study aims to explore the principle of confidentiality in arbitration by focusing on its domain and on its limits, both from the comparative approach and from the Romanian approach. Knowing all this aspects, we will realize the importance of having professional counseling when drafting an arbitration clause and how this can be the missing puzzle piece of your business.

  12. Medical students and personal smartphones in the clinical environment: the impact on confidentiality of personal health information and professionalism.

    Tran, Kim; Morra, Dante; Lo, Vivian; Quan, Sherman D; Abrams, Howard; Wu, Robert C

    2014-05-22

    Smartphones are becoming ubiquitous in health care settings. The increased adoption of mobile technology such as smartphones may be attributed to their use as a point-of-care information source and to perceived improvements in clinical communication and efficiency. However, little is known about medical students' use of personal smartphones for clinical work. The intent of the study was to examine final-year medical students' experience with and attitudes toward using personal mobile technology in the clinical environment, with respect to the perceived impact on patient confidentiality and provider professionalism. Cross-sectional surveys were completed by final-year medical students at the University of Toronto. Respondents were asked about the type of personal mobile phone they use, security features on their personal phone, experiences using their personal phone during clinical rotations, and attitudes about using their personal phone for clinical work purposes. The overall response rate was 45.4% (99/218). Smartphone ownership was prevalent (98%, 97/99) with the majority (86%, 85/99) of participants using their personal phones for patient-related communication during clinical rotations. A total of 26% (26/99) of participants reported not having any type of security feature on their personal phone, 94% (90/96) of participants agreed that using their personal phone for clinical work makes them more efficient, and 86% (82/95) agreed that their personal phone allows them to provide better patient care. Although 68% (65/95) of participants believe that the use of personal phones for patient-related communication with colleagues poses a risk to the privacy and confidentiality of patient health information, 22% (21/96) of participants still use their personal phone to text or email identifiable patient data to colleagues. Our findings suggest that the use of personal smartphones for clinical work by medical students is prevalent. There is a need to more fully address

  13. Confidentiality concerning HIV/AIDS status - the implications of the ...

    His evidence justifying his disclosure was that he was. Department of Orthodontics, University of the Witwatersrand,. Johannesburg. J. T. Dancaster. BD.S. Department of Business Administration, University of Natal, Durban ... Supreme Court judgement, the Appeal judgement notes that not only did Kruger not seek to obtain ...

  14. Rekonstruksi Pengaturan Confidential Principle bagi Komunikasi pada Mediasi Sengketa Perdata di Indonesia: Studi Perbandingan dengan Praktik di Amerika Serikat

    I Gusti Ngurah Parikesit

    2016-04-01

    Full Text Available Peran mediasi sebagai penyelesaian sengketa alternatif untuk sengketa perdata yang semakin populer digunakan pada praktiknya belum berjalan maksimal. Salah satu penyebabnya adalah kekaburan pengaturan prinsip kerahasiaan confidential principle bagi komunikasi yang terjadi pada proses mediasi. Aturan hukum di Indonesia hanya menjelaskan bahwa mediasi dilangsungkan berdasarkan pada asas tertutup dan mediator berkewajiban menjaga kerahasiaan, baik dalam bentuk perkataan maupun catatan, yang terungkap pada mediasi. Sebagai perbandingan, aturan hukum di Amerika Serikat sudah diatur bahwa segala bentuk komunikasi yang terjadi dan berhubungan dengan pelaksanaan mediasi tunduk pada confidential principle, sehingga proses komunikasi mendapatkan hak istimewa (privilege dengan tidak dapat dijadikan barang bukti dan seluruh pihak yang terlibat dalam mediasi tidak dapat dijadikan saksi pada persidangan berikutnya. Dengan demikian, dibutuhkan rekonstruksi pengaturan terkait ruang lingkup komunikasi pada proses mediasi yang terkualifikasi sebagai confidential principle pengaturan terkait pelepasan hak istimewa komunikasi dari confidential principle; dan pengaturan terkait pengecualian terhadap komunikasi yang terkualifikasi sebagai confidential principle Abstract Although being popular, the role of mediation in resolving civil disputes is yet to be maximalized. One of the reasons is the the vague regulation concerning the confidential principle for communication in mediation. The existing regulation in Indonesia only explains that mediation is undertaken based on closed principle and the mediator is obliged to maintain confidentiality the confidentiality of any communication, either in oral or written forms, revealed during mediation. Whereas in comparison, the regulation in the United States of America stipulates that all forms of communications occured during mediation or is made for purposes of conducting or participating in mediation are subjects to the

  15. Lithuanian general practitioners' knowledge of confidentiality laws in adolescent sexual and reproductive healthcare: a cross-sectional study

    Lazarus, Jeff; Jaruseviciene, Lina; Liljestrand, Jerker

    2008-01-01

    In Lithuania, the legislation addressing confidentiality in adolescent healthcare is contradictory and vague. Previous studies have also revealed that medico-legal knowledge among physicians is poor, and attitudes play a correspondingly greater role than legal knowledge in ensuring the confidenti......In Lithuania, the legislation addressing confidentiality in adolescent healthcare is contradictory and vague. Previous studies have also revealed that medico-legal knowledge among physicians is poor, and attitudes play a correspondingly greater role than legal knowledge in ensuring...

  16. Recent Inventions and Trends in Algal Biofuels Research.

    Karemore, Ankush; Nayak, Manoranjan; Sen, Ramkrishna

    2016-01-01

    In recent times, when energy crisis compounded by global warming and climate change is receiving worldwide attention, the emergence of algae, as a better feedstock for third-generation biofuels than energy crops or plants, holds great promise. As compared to conventional biofuels feedstocks, algae offer several advantages and can alone produce a significant amount of biofuels sustainably in a shorter period to fulfill the rising demand for energy. Towards commercialisation, there have been numerous efforts put for- ward for the development of algae-derived biofuel. This article reviews and summarizes the recent inventions and the current trends that are reported and captured in relevant patents pertaining to the novel methods of algae biomass cultivation and processing for biofuels and value-added products. In addition, the recent advancement in techniques and technologies for microalgal biofuel production has been highlighted. Various steps involved in the production of algal biofuels have been considered in this article. Moreover, the work that advances to improve the efficiency and cost-effectiveness of the processes for the manufacture of biofuels has been presented. Our survey was conducted in the patent databases: WIPO, Spacenet and USPTO. There are still some technological bottlenecks that could be overcome by designing advanced photobioreactor and raceway ponds, developing new and low cost technologies for biomass cultivation, harvesting, drying and extraction. Recent advancement in algae biofuels methods is directed toward developing efficient and integrated systems to produce biofuels by overcoming the current challenges. However, further research effort is required to scale-up and improve the efficiency of these methods in the upstream and downstream technologies to make the cost of biofuels competitive with petroleum fuels.

  17. METHODS FOR ASSESSING SECURITY THREATS CONFIDENTIAL INFORMATION FOR THE INFORMATION AND TELECOMMUNICATIONS SYSTEMS

    E. V. Belokurova

    2015-01-01

    Full Text Available The article discusses the different approaches to assessing the safety of confidential information-term for information and telecommunication systems of various pre-appreciable destination in the presence of internal and external threats to its integrity and availability. The difficulty of ensuring the security of confidential information from exposure to information and telecommunication systems of external and internal threats at the present time, is of particular relevance. This problem is confirmed by the analysis of available statistical information on the impact of threats on the security circulating in the information and telecommunications system. Leak confidential information, intellectual property, information, know-how is the result of significant material and moral damage caused to the owner of the restricted information. The paper presents the structure of the indicators and criteria shows that the most promising are analytical criteria. However, their use to assess the level of security of confidential information is difficult due to the lack of appropriate mathematical models. The complexity of the problem is that existing traditional mathematical models are not always appropriate for the stated objectives. Therefore, it is necessary to develop mathematical models designed to assess the security of confidential information and its impact on information and telecommunication system threats.

  18. Universal nucleic acids sample preparation method for cells, spores and their mixture

    Bavykin, Sergei [Darien, IL

    2011-01-18

    The present invention relates to a method for extracting nucleic acids from biological samples. More specifically the invention relates to a universal method for extracting nucleic acids from unidentified biological samples. An advantage of the presently invented method is its ability to effectively and efficiently extract nucleic acids from a variety of different cell types including but not limited to prokaryotic or eukaryotic cells and/or recalcitrant organisms (i.e. spores). Unlike prior art methods which are focused on extracting nucleic acids from vegetative cell or spores, the present invention effectively extracts nucleic acids from spores, multiple cell types or mixtures thereof using a single method. Important that the invented method has demonstrated an ability to extract nucleic acids from spores and vegetative bacterial cells with similar levels effectiveness. The invented method employs a multi-step protocol which erodes the cell structure of the biological sample, isolates, labels, fragments nucleic acids and purifies labeled samples from the excess of dye.

  19. Innovation and invention in Finland. Strategies for networking. An international evaluation

    Zegveld, W.; McCarthy, S.; Lemola, T.

    1998-12-31

    The objective of the evaluation was to come up with recommendations on how the Finnish systems for promoting independent inventions and their commercialisation could be most appropriately developed. In practice, the evaluation was expected to address at least the following aspects of the promotion: The role of the public sector; The role of the private sector (inventors, financiers, companies); The evaluation of the Finnish Foundation for Inventions (FFI); The strengths and weaknesses of the present system for promoting inventions and their commercialisation. In effect, the evaluation proved to be the evaluation of a subsystem integrated within the overall Finnish National System of Innovation with its many players from the public and private sectors. An effort was made to evaluate the relationship between the different actors in this system and closer cooperation is recommended in many areas. Interviews were held with 130 individuals from 70 organisations. The evaluators address the following nine issues: (1) Improving the balance between r and d and the promotion of inventiveness/innovation; (2) Increased coherence between the different organisations; (3) The responsibility of inventors and research organisations in inventive activities and the role of support organisations; (4) A gradual shift towards private services; (5) The development of the role of FFI; (6) Improving the competence in the area of intellectual property rights; (7) Financial incentives for inventors; (8) Increasing the awareness on invention and innovation; (9) The requirement to broaden the concept of inventiveness and innovation. (orig.)

  20. Innovation and invention in Finland. Strategies for networking. An international evaluation

    Zegveld, W; McCarthy, S; Lemola, T

    1999-12-31

    The objective of the evaluation was to come up with recommendations on how the Finnish systems for promoting independent inventions and their commercialisation could be most appropriately developed. In practice, the evaluation was expected to address at least the following aspects of the promotion: The role of the public sector; The role of the private sector (inventors, financiers, companies); The evaluation of the Finnish Foundation for Inventions (FFI); The strengths and weaknesses of the present system for promoting inventions and their commercialisation. In effect, the evaluation proved to be the evaluation of a subsystem integrated within the overall Finnish National System of Innovation with its many players from the public and private sectors. An effort was made to evaluate the relationship between the different actors in this system and closer cooperation is recommended in many areas. Interviews were held with 130 individuals from 70 organisations. The evaluators address the following nine issues: (1) Improving the balance between r and d and the promotion of inventiveness/innovation; (2) Increased coherence between the different organisations; (3) The responsibility of inventors and research organisations in inventive activities and the role of support organisations; (4) A gradual shift towards private services; (5) The development of the role of FFI; (6) Improving the competence in the area of intellectual property rights; (7) Financial incentives for inventors; (8) Increasing the awareness on invention and innovation; (9) The requirement to broaden the concept of inventiveness and innovation. (orig.)

  1. Building Trust and Confidentiality in Cloud computing Distributed ...

    2013-03-01

    Mar 1, 2013 ... Department of Computer Science, University of Port Harcourt, Rivers State ... considering the security and privacy of the information stored and processed within the cloud. .... protection (perhaps access control), through to.

  2. Ombudsing at Canadian universities through the eyes of a Dutch ombudsman

    Herfs, Paul

    2016-01-01

    The Ombudsman of Utrecht University in the Netherlands made a study trip to Canada in the spring of 2016. He visited 12 universities in order to gather best practises at the Offices of Canadian ombudspersons. The major principles namely Independence, impartiality and confidentiality were described.

  3. [Consent and confidentiality in occupational health practice: balance between legal requirements and ethical values].

    Mora, Erika; Franco, G

    2010-01-01

    The recently introduced Italian law on the protection of workers' health states that the occupational health physician (competent physician) is required to act according to the Code of Ethics of the International Commission on Occupational Health (ICOH). This paper aims at examining the articles of legislative decree 81/2008 dealing with informed consent and confidentiality compared with the corresponding points of the ICOH Ethics Code. Analysis of the relationship between articles 25 and 39 (informed consent) and 18, 20 and 39 (confidentiality) of the decree shows that there are some points of disagreement between the legal requirements and the Code of Ethics, in particular concerning prescribed health surveillance, consent based on appropriate information (points 8, 10 and 12 of the Code) and some aspects of confidentiality (points 10, 20, 21, 22 and 23 of the Code). Although the competent physician is required to act according to the law, the decisional process could lead to a violation of workers' autonomy.

  4. Confidentiality and parental involvement in adolescent sexual and reproductive health care

    Jaruseviciene, Lina; Lazarus, Jeff; Zaborskis, Apolinaras

    2011-01-01

    AIM: We surveyed Lithuanian general practitioners' (GPs) views on the importance of confidentiality for adolescents and on their practices in informing parents about sexual and reproductive health consultations with this age group. METHODS: In this cross-sectional study, a 41-item questionnaire...... was sent to a random sample of 607 Lithuanian GPs. The purpose of this questionnaire was to gain knowledge about current practices of GPs in informing parents on the importance of confidentiality as well as in protecting the privacy of minors. GPs' knowledge of the current legal age limit...... consulting on general sexual issues, more than 70% stated that they would guarantee their minor patients confidentiality. However, when cases involved sexually transmitted infections or pregnancy, nearly the same percentage said they would inform the parents. 62.3% of GPs incorrectly believed that the law...

  5. Denying a patient's final will: public safety vs. medical confidentiality and patient autonomy.

    Gaertner, Jan; Vent, Julia; Greinwald, Ralf; Rothschild, Markus A; Ostgathe, Christoph; Kessel, Rene; Voltz, Raymond

    2011-12-01

    Especially when caring for patients approaching the end of life, physicians and nursing staff feel committed to fulfilling as many patient desires as possible. However, sometimes a patient's "final will" may threaten public safety. This can lead to severe conflicts, outweighing the physician's obligation and dedication to care for the patient and to respect his autonomy. Yet, public safety can be threatened if confidentiality is not broken. This article provides a concise summary of the medicolegal and ethical fundamentals concerning this difficult situation. If the patient's and others' health and safety are at risk, physicians may (and in some countries must) break medical confidentiality and disclose confidential patient information to the police and other authorities. Physicians should be able to professionally deal with such a conflict in all patients, not only in patients with advanced illness. Copyright © 2011 U.S. Cancer Pain Relief Committee. Published by Elsevier Inc. All rights reserved.

  6. Confidentiality, 'no blame culture' and whistleblowing, non-physician practice and accountability.

    White, Stuart M

    2006-12-01

    Confidentiality is a core tenet of medical professionalism, which enables the maintenance of trust in a doctor-patient relationship. However, both the amount of personal data stored and the number of third parties who might access this data have increased dramatically in the digital age, necessitating the introduction of various national data protection acts. Paradoxically, the Freedom of Information Act 2000 allows United Kingdom citizens to access information held by public bodies, including hospitals. Furthermore, the Public Interest Disclosure Act 1998 actively protects physicians who breach their duty of confidentiality in the name of public interest ('whistleblowing'). This article explores the evolution of the law and ethics in this area, and draws attention to the difficulties in balancing confidentiality against freedom of information. In addition, the role and responsibilities of the non-physician anaesthetist are examined.

  7. [Confidentiality in HIV-infection/AIDS--a comment on the Communicable Disease Control Act].

    Frich, J C

    1995-05-10

    The new Communicable Diseases Control Act has come into force in Norway. It makes it compulsory for a physician to warn a third party if it is obvious that a HIV-positive patient, with a high degree of certainty, puts the third party at risk of being infected with HIV. Some philosophers characterize medical confidentiality as an intransigent and absolute obligation, others as a prima facie duty. This article supports the latter view, but the author still argues that strict conditions have to be fulfilled before a physician should consider breaking medical confidentiality: The doctor must try repeatedly to gain the consent or co-operation of the patient involved. Possible negative long-term consequences for the preventive HIV-work support strict medical confidentiality.

  8. To succeed with invention and patent which are my own idea

    Yu, Jae Bok

    1999-07-01

    This book introduces how to invent through various way such as successful story about the effect to invent, conception like everyone can be a inventor and this is invention. This book also explains all of process of patent such as application of patent, patent in Korea, Japan, the U.S and other countries, what is patent information, how to hunt patent, intellectual property right, priority system, international patent application is possible in Korea, other common sense on patent application, patent as a great power and questions and answers on patent.

  9. Paternalistic breaches of confidentiality in prison: mental health professionals' attitudes and justifications.

    Elger, Bernice Simone; Handtke, Violet; Wangmo, Tenzin

    2015-06-01

    This manuscript presents mental health practitioners' (MHPs) practice, attitudes and justifications for breaching confidentiality when imprisoned patients disclose suicidal thoughts or abuse by others. 24 MHPs working in Swiss prisons shared their experiences regarding confidentiality practices. The data were analysed qualitatively and MHPs' attitudes and course of action were identified. Analysis revealed paternalistic breaches of confidentiality. When patients reported suicidal thoughts and abuse, MHPs believed that forgoing confidentiality is necessary to protect patients, providing several justifications for it. Patients were informed that such information will be transmitted without their consent to medical and non-medical prison personnel. With reference to suicidal attempts, MHPs resorted to methods that may reduce suicidal attempts such as transfer to hospital or internal changes in living arrangements, which would require provision of certain information to prison guards. In cases of abuse, some MHPs convinced patients to accept intervention or sometimes overrode competent patients' refusals to report. Also in the case of abuse, provision of limited information to other prison personnel was seen as an acceptable method to protect patients from further harm. Breaches of confidentiality, whether limited or full, remain unethical, when used for competent patients based solely on paternalistic justifications. Institutionalising ethical and legal procedures to address suicidal and abuse situations would be helpful. Education and training to help both medical and prison personnel to respond to such situations in an appropriate manner that ensures confidentiality and protects patients from suicide and abuse are necessary. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://group.bmj.com/group/rights-licensing/permissions.

  10. Confidentiality, anonymity and amnesty for midwives in distress seeking online support - Ethical?

    Pezaro, Sally; Clyne, Wendy; Gerada, Clare

    2018-06-01

    Midwife health is intrinsically linked to the quality of safe patient care. To ensure safe patient care, there is a need to deliver emotional support to midwives. One option that midwives may turn to may be a confidential online intervention, instead of localised, face-to-face support. Following the Realist And MEta-narrative Evidence Syntheses: Evolving Standards publication standards, this realist synthesis approach explores the ethical considerations in permitting confidentiality, anonymity and amnesty in online interventions to support midwives in work-related psychological distress. An iterative search methodology was used to select nine papers for review. To assimilate information, papers were examined for ideas relating to ethical dimensions of online interventions to support midwives in work-related psychological distress. This review takes a narrative approach. Online interventions can support the development of insight, help seeking and open discussion. Additionally, Internet support groups can become morally persuasive in nature. Anonymity and confidentiality are both effective and therapeutic features of online interventions when used in collaboration with effective online moderation. Yet, ethical dilemmas remain where users cannot be identified. Confidentiality and anonymity remain key components of successful online interventions. However, sanctioning the corollary component of amnesty may provoke moral discomfort for those seeking immediate accountability. For others, amnesty is seen as essential for open disclosure and help seeking. Ultimately, the needs of midwives must be balanced with the requirement to protect the public and the professional reputation of midwifery. In supporting midwives online, the principles of anonymity, confidentiality and amnesty may evoke some resistance on ethical grounds. However, without offering identity protection, it may not be possible to create effective online support services for midwives. The authors of this

  11. Highly Inventive Explorer of Creativity: An Interview with John Baer

    Henshon, Suzanna E.

    2009-01-01

    Dr. John Baer is a Professor in the Department of Teacher Education at Rider University. Dr. Baer has published 10 books and scores of research articles and book chapters on creativity, cooperative learning, and other educational psychology topics. His research on the development of creativity and his teaching have both won national awards,…

  12. Inventing the Educational Subject in the "Information Age"

    Bojesen, Emile

    2016-01-01

    This paper asks the question of how we can situate the educational subject in what Luciano Floridi has defined as an "informational ontology" (Floridi in "The philosophy of information." Oxford University Press, Oxford, 2011a). It will suggest that Jacques Derrida and Bernard Stiegler offer paths toward rethinking the…

  13. Assessing subject privacy and data confidentiality in an emerging region for clinical trials: United Arab Emirates.

    Nair, Satish Chandrasekhar; Ibrahim, Halah

    2015-01-01

    Pharmaceutical sponsored clinical trials, formerly conducted predominantly in the United States and Europe, have expanded to emerging regions, including the Middle East. Our study explores factors influencing clinical trial privacy and confidentiality in the United Arab Emirates. Factors including concept familiarity, informed consent compliance, data access, and preservation, were analyzed to assess current practices in the Arab world. As the UAE is an emerging region for clinical trials, there is a growing need for regulations related to data confidentiality and subject privacy. Informational and decisional privacy should be viewed within the realms of Arab culture and religious background.

  14. 76 FR 59115 - Notice of Availability of Patent Fee Changes Under the Leahy-Smith America Invents Act

    2011-09-23

    ... Availability of Patent Fee Changes Under the Leahy- Smith America Invents Act AGENCY: United States Patent and... of the Leahy-Smith America Invents Act (i.e., September 26, 2011) by operation of the fifteen percent... in effect sixty days after the date of enactment of the Leahy-Smith America Invents Act (i.e...

  15. 77 FR 46615 - Changes To Implement Miscellaneous Post Patent Provisions of the Leahy-Smith America Invents Act

    2012-08-06

    ... the Leahy-Smith America Invents Act AGENCY: United States Patent and Trademark Office, Commerce. ACTION: Final rule. SUMMARY: The Leahy-Smith America Invents Act (AIA) expands the scope of information... instituted. Section 6(a) and (d) of the Leahy-Smith American Invents Act also contains provisions (35 U.S.C...

  16. 49 CFR 40.321 - What is the general confidentiality rule for drug and alcohol test information?

    2010-10-01

    ... Transportation PROCEDURES FOR TRANSPORTATION WORKPLACE DRUG AND ALCOHOL TESTING PROGRAMS Confidentiality and Release of Information § 40.321 What is the general confidentiality rule for drug and alcohol test... DOT drug or alcohol testing process, you are prohibited from releasing individual test results or...

  17. 32 CFR 147.30 - Temporary eligibility for access at the confidential and secret levels and temporary eligibility...

    2010-07-01

    ... 32 National Defense 1 2010-07-01 2010-07-01 false Temporary eligibility for access at the confidential and secret levels and temporary eligibility for âLâ access authorization. 147.30 Section 147.30... Temporary Access § 147.30 Temporary eligibility for access at the confidential and secret levels and...

  18. Circles of Confidence in Correspondences. : Confidentiality in seventeenth-century knowledge exchange in networks of letters and drawings

    van den Heuvel, C.M.J.M.; Weingart, Scott B; Spelt, Nils; Nellen, H.J.M.

    2016-01-01

    Science in the Early Modern World depended on the one hand on openness in scholarly communication, but on the other hand the competition in commerce and trade and the political and religious conflicts required secrecy and confidentiality. This papers analyzes these concepts of confidentiality and

  19. 48 CFR 1552.235-78 - Data Security for Toxic Substances Control Act Confidential Business Information (DEC 1997).

    2010-10-01

    ...: Data Security for Toxic Substances Control Act Confidential Business Information (DEC 1997) The... 48 Federal Acquisition Regulations System 6 2010-10-01 2010-10-01 true Data Security for Toxic Substances Control Act Confidential Business Information (DEC 1997). 1552.235-78 Section 1552.235-78 Federal...

  20. Confidentiality Protection of User Data and Adaptive Resource Allocation for Managing Multiple Workflow Performance in Service-Based Systems

    An, Ho

    2012-01-01

    In this dissertation, two interrelated problems of service-based systems (SBS) are addressed: protecting users' data confidentiality from service providers, and managing performance of multiple workflows in SBS. Current SBSs pose serious limitations to protecting users' data confidentiality. Since users' sensitive data is sent in…

  1. 37 CFR 201.29 - Access to, and confidentiality of, Statements of Account, Verification Auditor's Reports, and...

    2010-07-01

    ... confidentiality of, Statements of Account, Verification Auditor's Reports, and other verification information... GENERAL PROVISIONS § 201.29 Access to, and confidentiality of, Statements of Account, Verification Auditor... Account, including the Primary Auditor's Reports, filed under 17 U.S.C. 1003(c) and access to a Verifying...

  2. 75 FR 30779 - Notice of Jointly Owned Invention Available for Licensing

    2010-06-02

    ... indicated below. The invention available for licensing is: [NIST DOCKET NUMBER: 10-004] Title: Gradient.... Gebbie, Director, Physics Laboratory. [FR Doc. 2010-13200 Filed 6-1-10; 8:45 am] BILLING CODE 3510-13-P ...

  3. Privacy Act System of Records: Invention Reports Submitted to the EPA, EPA-38

    Learn about the Invention Reports Submitted to the EPA System, including who is covered in the system, the purpose of data collection, routine uses for the system's records, and other security procedures.

  4. Is co-invention expediting technological catch up? A study of collaboration between emerging country firms

    Giuliani, Elisa; Martinelli, Arianna; Rabellotti, Roberta

    2015-01-01

    Firms from emerging countries such as Brazil, India, and China (BIC) are going global, and Europe is attracting around one-third of their direct outward investments. Growing internationalization constitutes an opportunity for technological catch up. In this paper we analyze BIC firms' cross-border inventions with European Union (EU-27) actors, during the period 1990-2012. Our results suggest that cross-border inventions represent an opportunity for BIC firms to accumulate technological capabi...

  5. Higgs the invention and discovery of the 'God Particle'

    Baggott, Jim

    2012-01-01

    The hunt for the Higgs particle has involved the biggest, most expensive experiment ever. So exactly what is this particle? Why does it matter so much? What does it tell us about the Universe? Has the discovery announced on 4 July 2012 finished the search? And was finding it really worth all the effort? The short answer is yes. The Higgs field is proposed as the way in which particles gain mass - a fundamental property of matter. It's the strongest indicator yet that the Standard Model of physics really does reflect the basic building blocks of our Universe. Little wonder the hunt and discovery of this new particle has produced such intense media interest.

  6. Invention profiles and uneven growth in the field of emerging nano-energy

    Guan, Jiancheng; Liu, Na

    2015-01-01

    This paper aims to synthetically investigate invention profiles and uneven growth of technological knowledge in the emerging nano-energy field, based on patents data extracted from the Derwent Innovation Index (DII) database during the time period 1991–2012. The trend analysis shows that invention in this field has experienced enormous growth and also diversification over the past 22 years. The co-occurrence network of burst technology domains reveals that technology domains constantly burst, and innovative progress in nanotechnology has tremendously contributed to energy production, storage, conversion and harvesting and so on. Nano-energy patented inventions mainly come from a combinatorial process with a very limited role of developing brand-new technological capabilities. Reusing existing technological capabilities including recombination reuse, recombination creation and single reuse is the primary source of inventions. For the impacts of technology networks' embeddedness, we find that network tie strength suppresses the growth of technological knowledge domains, and network status and convergence both facilitate the growth of technological knowledge domains. We expect that this study will provide some enlightenment for inventing or creating new knowledge in emerging fields in complex technological environment. - Highlights: • We define and utilize a unique dataset of nano-energy patents. • We identify and map the burst technological knowledge domains. • Quantitative argument is provided to prove the combinatorial invention. • Impacts of network embeddedness on growth of technology domain are examined. • Network characteristics affect the growth of technology domain

  7. The Energy-Related Inventions Program: A decade of commercial progress

    Brown, M.A.; Franchuk, C.A. [Oak Ridge National Lab., TN (United States); Wilson, C.R. [Tennessee Univ., Knoxville, TN (United States)

    1991-12-01

    This report provides information on the recent commercial progress of inventions supported by the US Department of Energy`s Energy-Related Inventions Programs (ERIP). It describes the results of the latest in a series of ERIP evaluation projects that have been completed since 1980. It focuses on the economic impacts of the program, notably sales and employment benefits. The period of interest is 1980 through 1990. The evaluation is based on data collected through mail and telephone surveying of 143 participants in the Program. As of October 1989, a total of 486 inventions were recommended to DOE by the National Institute for Standards and Technology, which screens all submitted inventions in terms of technical merit, potential for commercial success, and potential energy impact. By the end of 1990, at least 109 of these inventions had entered the market, generating total cumulative sales of more than $500 million. With $25.7 million in grants awarded from 1975 through 1990, and $63.1 million in program appropriations over the same period, ERIP has generated a 20:1 return in terms of sales values to grants, and an 8:1 return in sales versus program appropriations. It is estimated that 25% of all ERIP inventions had achieved sales by the end of 1990. While it is difficult to make exact comparisons between these percentages and other indicators of the success rates of technological innovations as a whole, the ERIP figures remain impressive. The commercial progress of spin-off technologies is also documented.

  8. Teachers' learning on the workshop of STS approach as a way of enhancing inventive thinking skills

    Ngaewkoodrua, Nophakun; Yuenyong, Chokchai

    2018-01-01

    To improve science teachers to develop the STS lesson plans for enhancing the students' inventive thinking skills, the workshop of improving science teachers to develop the STS lesson plans for enhancing the Inventive thinking skills were organized. The paper aimed to clarify what teachers learn from the workshop. The goal of the activity of the workshop aimed to: 1) improve participants a better understanding of the relationship between the Inquiry based learning with STS approach, 2) understand the meaning and importance of the STS approach and identify the various stages of Yuenyong (2006) STS learning process, 3) discuss what they learned from the examples of Yuenyong (2006) lesson plan, 4) develop some activities for each stage of Yuenyong (2006) STS approach, and 5) ideas of providing STS approach activities for enhancing inventive thinking skills. Participants included 3 science teachers who work in Khon Kaen, Thailand. Methodology regarded interpretive paradigm. Teachers' learning about pedagogy of enhancing the students' inventive thinking skills will be interpreted through participant observation, teachers' tasks, and interview. The finding revealed that all participants could demonstrate their ideas how to generate the STS lesson plans as a way of enhancing inventive thinking skills. Teachers could mention some element of inventive thinking skills which could be generated on their STS learning activities.

  9. University Technology Transfer Factors as Predictors of Entrepreneurial Orientation

    Kirkman, Dorothy M.

    2011-01-01

    University technology transfer is a collaborative effort between academia and industry involving knowledge sharing and learning. Working closely with their university partners affords biotechnology firms the opportunity to successfully develop licensed inventions and gain access to novel scientific and technological discoveries. These factors may…

  10. 17 CFR 145.9 - Petition for confidential treatment of information submitted to the Commission.

    2010-04-01

    ... may summarily reject the submitter's request for confidential treatment with leave to the submitter to... treatment of information submitted to the Commission. 145.9 Section 145.9 Commodity and Securities Exchanges... treatment of information submitted to the Commission. (a) Purpose. This section provides a procedure by...

  11. 21 CFR 1316.23 - Confidentiality of identity of research subjects.

    2010-04-01

    ... 21 Food and Drugs 9 2010-04-01 2010-04-01 false Confidentiality of identity of research subjects. 1316.23 Section 1316.23 Food and Drugs DRUG ENFORCEMENT ADMINISTRATION, DEPARTMENT OF JUSTICE ADMINISTRATIVE FUNCTIONS, PRACTICES, AND PROCEDURES Protection of Researchers and Research Subjects § 1316.23...

  12. 12 CFR 366.13 - What is my obligation regarding confidential information?

    2010-01-01

    ... services on your behalf may use or disclose information obtained from us or a third party in connection... general public. (b) The following are examples of when your use of confidential information is... financial information, such as a financial statement to an unauthorized party. ...

  13. 40 CFR 1601.26 - Special procedures for confidential business information.

    2010-07-01

    ... described in paragraph (c) of this section, the CSB shall, to the extent permitted by law, afford a business... business information. 1601.26 Section 1601.26 Protection of Environment CHEMICAL SAFETY AND HAZARD... Requesting and Disclosing Records § 1601.26 Special procedures for confidential business information. (a) In...

  14. 76 FR 30781 - Confidentiality Determinations for Data Required Under the Mandatory Greenhouse Gas Reporting...

    2011-05-26

    ... this document. BAMM Best Available Monitoring Methods CAA Clean Air Act CBI confidential business information CBP Customs and Border Protection CEMS continuous emission monitoring system(s) CFR Code of... prevent competitors from forcing them to defend data on a case-by-case basis in Agency CBI proceedings...

  15. 45 CFR 61.14 - Confidentiality of Healthcare Integrity and Protection Data Bank information.

    2010-10-01

    ... 45 Public Welfare 1 2010-10-01 2010-10-01 false Confidentiality of Healthcare Integrity and Protection Data Bank information. 61.14 Section 61.14 Public Welfare DEPARTMENT OF HEALTH AND HUMAN SERVICES GENERAL ADMINISTRATION HEALTHCARE INTEGRITY AND PROTECTION DATA BANK FOR FINAL ADVERSE INFORMATION ON...

  16. 45 CFR 60.15 - Confidentiality of National Practitioner Data Bank information.

    2010-10-01

    ... 45 Public Welfare 1 2010-10-01 2010-10-01 false Confidentiality of National Practitioner Data Bank information. 60.15 Section 60.15 Public Welfare DEPARTMENT OF HEALTH AND HUMAN SERVICES GENERAL ADMINISTRATION NATIONAL PRACTITIONER DATA BANK FOR ADVERSE INFORMATION ON PHYSICIANS AND OTHER HEALTH CARE PRACTITIONERS...

  17. 42 CFR 2.2 - Statutory authority for confidentiality of alcohol abuse patient records.

    2010-10-01

    ... HUMAN SERVICES GENERAL PROVISIONS CONFIDENTIALITY OF ALCOHOL AND DRUG ABUSE PATIENT RECORDS Introduction.... (B) To qualified personnel for the purpose of conducting scientific research, management audits, financial audits, or program evaluation, but such personnel may not identify, directly or indirectly, any...

  18. 76 FR 77816 - Access to Confidential Business Information by Guident Technologies, Inc. and Subcontractor...

    2011-12-14

    ... Business Information by Guident Technologies, Inc. and Subcontractor, Impact Innovations Systems, Inc..., Guident Technologies, Inc. of Herndon, VA and subcontractor, Impact Innovations Systems, Inc. of Manassas... Control Act (TSCA). Some of the information may be claimed or determined to be Confidential Business...

  19. 76 FR 10360 - Access to Confidential Business Information by Guident Technologies Inc. and Its Identified...

    2011-02-24

    ... Business Information by Guident Technologies Inc. and Its Identified Subcontractors AGENCY: Environmental Protection Agency (EPA). ACTION: Notice. SUMMARY: EPA has authorized its contractor, Guident Technologies... information may be claimed or determined to be Confidential Business Information (CBI). DATES: Access to the...

  20. 22 CFR 212.38 - Predisclosure notification procedures for confidential commercial information.

    2010-04-01

    ... 22 Foreign Relations 1 2010-04-01 2010-04-01 false Predisclosure notification procedures for confidential commercial information. 212.38 Section 212.38 Foreign Relations AGENCY FOR INTERNATIONAL DEVELOPMENT PUBLIC INFORMATION Access to Agency Records § 212.38 Predisclosure notification procedures for...

  1. 18 CFR 385.606 - Confidentiality in dispute resolution proceedings (Rule 606).

    2010-04-01

    ... be required to disclose, any information concerning any dispute resolution communication or any communication provided in confidence to the neutral, unless: (1) All participants in the dispute resolution... reducing the confidence of participants in future cases that their communications will remain confidential...

  2. 19 CFR 210.39 - In camera treatment of confidential information.

    2010-04-01

    ... 19 Customs Duties 3 2010-04-01 2010-04-01 false In camera treatment of confidential information. 210.39 Section 210.39 Customs Duties UNITED STATES INTERNATIONAL TRADE COMMISSION INVESTIGATIONS OF UNFAIR PRACTICES IN IMPORT TRADE ADJUDICATION AND ENFORCEMENT Prehearing Conferences and Hearings § 210...

  3. HIV testing sites' communication about adolescent confidentiality: potential barriers and facilitators to testing.

    Hyden, Christel; Allegrante, John P; Cohall, Alwyn T

    2014-03-01

    This study sought to evaluate HIV testing locations in New York City in terms of staff communication of confidentiality policies for adolescent clients. Using the New York State Directory of HIV Counseling and Testing Resources as a sampling frame, this study made telephone contact with 164 public HIV testing locations in New York City and used a semistructured interview to ask questions about confidentiality, parental permission, and parent access to test results. At 48% of locations, either HIV testing was not offered or we were unable to reach a staff member to ask questions about testing options and confidentiality. At the remaining sites, information provided regarding confidentiality, parental consent, and privacy of test results was correct only 69% to 85% of the time. Additionally, 23% of sites successfully contacted offered testing exclusively between 9:00 a.m. and 3:00 p.m. weekdays, when most adolescents are in school. Our findings point to a need for increased training and quality control at the clinical level to ensure that consumers in need of HIV testing are provided with accurate information and accessible services. Furthermore, these results highlight the need for more "patient-centric" sites with enhanced accessibility for potential clients, particularly youth.

  4. Teaching Journalism Students about Confidential Whistleblower Sources: An Analysis of Introductory News Writing Textbooks

    Huxford, John; Moore, Maria A.

    2011-01-01

    Whistleblowers are a key journalistic source for many current news stories. However, reporters pursuing these major stories must navigate the dilemma between transparent full disclosure and protecting their confidential source. Professional journalists begin their journey as students, and students begin their journey in the classroom with a…

  5. 77 FR 76028 - Access to Confidential Business Information by Science Applications International Corporation and...

    2012-12-26

    ... Business Information by Science Applications International Corporation and Its Identified Subcontractor...: EPA has authorized its contractor, Science Applications International Corporation (SAIC) of McLean, VA... information may be claimed or determined to be Confidential Business Information (CBI). DATES: Access to the...

  6. 78 FR 66697 - Access to Confidential Business Information by Science Applications International Corporation and...

    2013-11-06

    ... Business Information by Science Applications International Corporation and Its Identified Subcontractors..., Science Applications International Corporation (SAIC) of McLean, VA, and its subcontractors to access...). Some of the information may have been claimed or determined to be Confidential Business Information...

  7. Data-protection standards and confidentiality of HIV/AIDS status in ...

    Also, the article presents a preliminary assessment of the possible impact of professionalisation (and outsourcing) of workplace HIV/AIDS management on ... the development of law governing data protection and HIV/AIDS confidentiality in South Africa) and interviews conducted with workplace health managers and trade ...

  8. 78 FR 68161 - Greenhouse Gas Reporting Program: Final Amendments and Confidentiality Determinations for...

    2013-11-13

    ... 98 Greenhouse Gas Reporting Program: Final Amendments and Confidentiality Determinations for...-HQ-OAR-2011-0028; FRL-9845-6] RIN 2060-AR61 Greenhouse Gas Reporting Program: Final Amendments and... monitoring methodologies for electronics manufacturers covered by the Greenhouse Gas Reporting Rule. These...

  9. 78 FR 69337 - Greenhouse Gas Reporting Program: Amendments and Confidentiality Determinations for Fluorinated...

    2013-11-19

    ...-AR78 Greenhouse Gas Reporting Program: Amendments and Confidentiality Determinations for Fluorinated... Greenhouse Gas Reporting Rule. The proposed changes would reduce the level of detail in which emissions were..., please go to the Greenhouse Gas Reporting Rule Program Web site at http://www.epa.gov/climatechange...

  10. 76 FR 52659 - Access by EPA Contractors to Confidential Business Information (CBI) Related to the Greenhouse...

    2011-08-23

    ... Confidential Business Information (CBI) Related to the Greenhouse Gas Reporting Program AGENCY: Environmental... contractors named in this notice to access information that will be submitted to EPA under the Greenhouse Gas...), EPA created the Greenhouse Gas Reporting Program (GHGRP), 40 CFR part 98 (part 98), which requires...

  11. The Psychological Competence of Police Officers in Confidential Cooperation with Citizens

    Uspanov, Zholdybai T.; Turabayeva, Dana S.; Ermolovich, Vladimir F.

    2016-01-01

    This research studied the psychological aspects of citizens' assistance to law enforcement agencies on a confidential basis. The comprehensive observance of the psychological norms of cooperation is determined by the professional ethics of police officers, the necessity of nondisclosure of investigation secrets by citizens, and the security of the…

  12. 20 CFR 603.4 - What is the confidentiality requirement of Federal UC law?

    2010-04-01

    ... 20 Employees' Benefits 3 2010-04-01 2010-04-01 false What is the confidentiality requirement of Federal UC law? 603.4 Section 603.4 Employees' Benefits EMPLOYMENT AND TRAINING ADMINISTRATION, DEPARTMENT....C. 502(a)), State law must include provision for such methods of administration as are found by the...

  13. Scheduler-specific Confidentiality for Multi-Threaded Programs and Its Logic-Based Verification

    Huisman, Marieke; Ngo, Minh Tri

    2011-01-01

    Observational determinism has been proposed in the literature as a way to ensure confidentiality for multi-threaded programs. Intuitively, a program is observationally deterministic if the behavior of the public variables is deterministic, i.e., independent of the private variables and the

  14. 75 FR 46948 - Medicare Program; Listening Session Regarding Confidential Feedback Reports and the...

    2010-08-04

    ...] Medicare Program; Listening Session Regarding Confidential Feedback Reports and the Implementation of a... Services (CMS), HHS. ACTION: Notice of meeting. SUMMARY: This notice announces a listening session being... modifier to the fee- for-service physician fee schedule. The purpose of the listening session is to solicit...

  15. 77 FR 25475 - Inquiry To Learn Whether Businesses Assert Business Confidentiality Claims Regarding Waste Import...

    2012-04-30

    ... meet the definition of ``affected business,'' and are not covered by today's notice. They consist of..., however, do not meet the definition of ``affected business,'' and are not covered by today's notice. They... Businesses Assert Business Confidentiality Claims Regarding Waste Import and Export AGENCY: Environmental...

  16. 77 FR 109 - Inquiry To Learn Whether Businesses Assert Business Confidentiality Claims Regarding Waste Import...

    2012-01-03

    ... definition of ``affected business,'' and are not covered by today's notice. They consist of any business that.... Certain businesses, however, do not meet the definition of ``affected business,'' and are not covered by... Businesses Assert Business Confidentiality Claims Regarding Waste Import and Export AGENCY: Environmental...

  17. 75 FR 44951 - Inquiry To Learn Whether Businesses Assert Business Confidentiality Claims

    2010-07-30

    ... such treatment. Certain businesses, however, do not meet the definition of ``affected business,'' and... definition of ``affected business,'' and are not covered by today's notice. They consist of any business that... Businesses Assert Business Confidentiality Claims AGENCY: Environmental Protection Agency (EPA). ACTION...

  18. 76 FR 362 - Inquiry To Learn Whether Businesses Assert Business Confidentiality Claims

    2011-01-04

    ... claims for such treatment. Certain businesses, however, do not meet the definition of ``affected business.... Certain businesses, however, do not meet the definition of ``affected business,'' and are not covered by... Businesses Assert Business Confidentiality Claims AGENCY: Environmental Protection Agency (EPA). ACTION...

  19. 75 FR 4812 - Inquiry To Learn Whether Businesses Assert Business Confidentiality Claims

    2010-01-29

    ..., however, do not meet the definition of ``affected business,'' and are not covered by today's notice. They.... Certain businesses, however, do not meet the definition of ``affected business,'' and are not covered by... Businesses Assert Business Confidentiality Claims AGENCY: Environmental Protection Agency (EPA). ACTION...

  20. 78 FR 2669 - Waste Import and Export; Inquiry To Learn Whether Businesses Assert Business Confidentiality Claims

    2013-01-14

    ... definition of ``affected business,'' and are not covered by today's notice. They consist of any business that... waste'' is defined at 40 CFR 273.9. Certain businesses, however, do not meet the definition of...; Inquiry To Learn Whether Businesses Assert Business Confidentiality Claims AGENCY: Environmental...