Sample records for adult privacy policy

  1. Privacy Policies for Apps Targeted Toward Youth: Descriptive Analysis of Readability

    PubMed Central

    Das, Gitanjali; Cheung, Cynthia; Nebeker, Camille; Bietz, Matthew

    2018-01-01

    Background Due to the growing availability of consumer information, the protection of personal data is of increasing concern. Objective We assessed readability metrics of privacy policies for apps that are either available to or targeted toward youth to inform strategies to educate and protect youth from unintentional sharing of personal data. Methods We reviewed the 1200 highest ranked apps from the Apple and Google Play Stores and systematically selected apps geared toward youth. After applying exclusion criteria, 99 highly ranked apps geared toward minors remained, 64 of which had a privacy policy. We obtained and analyzed these privacy policies using reading grade level (RGL) as a metric. Policies were further compared as a function of app category (free vs paid; entertainment vs social networking vs utility). Results Analysis of privacy policies for these 64 apps revealed an average RGL of 12.78, which is well above the average reading level (8.0) of adults in the United States. There was also a small but statistically significant difference in word count as a function of app category (entertainment: 2546 words, social networking: 3493 words, and utility: 1038 words; P=.02). Conclusions Although users must agree to privacy policies to access digital tools and products, readability analyses suggest that these agreements are not comprehensible to most adults, let alone youth. We propose that stakeholders, including pediatricians and other health care professionals, play a role in educating youth and their guardians about the use of Web-based services and potential privacy risks, including the unintentional sharing of personal data. PMID:29301737

  2. Privacy Policies for Apps Targeted Toward Youth: Descriptive Analysis of Readability.

    PubMed

    Das, Gitanjali; Cheung, Cynthia; Nebeker, Camille; Bietz, Matthew; Bloss, Cinnamon

    2018-01-04

    Due to the growing availability of consumer information, the protection of personal data is of increasing concern. We assessed readability metrics of privacy policies for apps that are either available to or targeted toward youth to inform strategies to educate and protect youth from unintentional sharing of personal data. We reviewed the 1200 highest ranked apps from the Apple and Google Play Stores and systematically selected apps geared toward youth. After applying exclusion criteria, 99 highly ranked apps geared toward minors remained, 64 of which had a privacy policy. We obtained and analyzed these privacy policies using reading grade level (RGL) as a metric. Policies were further compared as a function of app category (free vs paid; entertainment vs social networking vs utility). Analysis of privacy policies for these 64 apps revealed an average RGL of 12.78, which is well above the average reading level (8.0) of adults in the United States. There was also a small but statistically significant difference in word count as a function of app category (entertainment: 2546 words, social networking: 3493 words, and utility: 1038 words; P=.02). Although users must agree to privacy policies to access digital tools and products, readability analyses suggest that these agreements are not comprehensible to most adults, let alone youth. We propose that stakeholders, including pediatricians and other health care professionals, play a role in educating youth and their guardians about the use of Web-based services and potential privacy risks, including the unintentional sharing of personal data. ©Gitanjali Das, Cynthia Cheung, Camille Nebeker, Matthew Bietz, Cinnamon Bloss. Originally published in JMIR Mhealth and Uhealth (http://mhealth.jmir.org), 04.01.2018.

  3. Do Online Privacy Concerns Predict Selfie Behavior among Adolescents, Young Adults and Adults?

    PubMed Central

    Dhir, Amandeep; Torsheim, Torbjørn; Pallesen, Ståle; Andreassen, Cecilie S.

    2017-01-01

    Selfies, or self-portraits, are often taken and shared on social media for online self-presentation reasons, which are considered essential for the psychosocial development and well-being of people in today’s culture. Despite the growing popularity and widespread sharing of selfies in the online space, little is known about how privacy concerns moderate selfie behavior. In addition to this, it is also not known whether privacy concerns across age and gender groups influence selfie behavior. To address this timely issue, a survey assessing common selfie behaviors, that is, frequency of taking (individual and group selfies), editing (cropping and filtering), and posting selfies online, and social media privacy concerns (over personal data being accessed and misused by third parties) was conducted. The web-survey was administered to 3,763 Norwegian social media users, ranging from 13 to 50 years, with a preponderance of women (n = 2,509, 66.7%). The present study investigated the impact of privacy concerns on selfie behaviors across gender and age groups (adolescent, young adult, and adult) by use of the structural equation modeling approach. The results suggest that young adults have greater privacy concerns compared to adolescents and adults. Females have greater privacy concerns than males. Greater privacy concerns among female social media users were linked to lower engagement in selfie behavior, but privacy concerns did not influence selfie behavior in the case of male adolescents and young adults. Overall, privacy concerns were more consistently and inversely related to selfie behavior (taking and posting) among females than males. The study results have theoretical as well as practical implications for both researchers and policy makers. PMID:28588530

  4. Do Online Privacy Concerns Predict Selfie Behavior among Adolescents, Young Adults and Adults?

    PubMed

    Dhir, Amandeep; Torsheim, Torbjørn; Pallesen, Ståle; Andreassen, Cecilie S

    2017-01-01

    Selfies, or self-portraits, are often taken and shared on social media for online self-presentation reasons, which are considered essential for the psychosocial development and well-being of people in today's culture. Despite the growing popularity and widespread sharing of selfies in the online space, little is known about how privacy concerns moderate selfie behavior. In addition to this, it is also not known whether privacy concerns across age and gender groups influence selfie behavior. To address this timely issue, a survey assessing common selfie behaviors, that is, frequency of taking (individual and group selfies), editing (cropping and filtering), and posting selfies online, and social media privacy concerns (over personal data being accessed and misused by third parties) was conducted. The web-survey was administered to 3,763 Norwegian social media users, ranging from 13 to 50 years, with a preponderance of women ( n = 2,509, 66.7%). The present study investigated the impact of privacy concerns on selfie behaviors across gender and age groups (adolescent, young adult, and adult) by use of the structural equation modeling approach. The results suggest that young adults have greater privacy concerns compared to adolescents and adults. Females have greater privacy concerns than males. Greater privacy concerns among female social media users were linked to lower engagement in selfie behavior, but privacy concerns did not influence selfie behavior in the case of male adolescents and young adults. Overall, privacy concerns were more consistently and inversely related to selfie behavior (taking and posting) among females than males. The study results have theoretical as well as practical implications for both researchers and policy makers.

  5. ACHP | Web Site Privacy Policy

    Science.gov Websites

    Search skip specific nav links Home arrow About ACHP arrow Web Site Privacy Policy ACHP Web Site Privacy be used after its purpose has been fulfilled. For questions on our Web site privacy policy, please contact the Web manager. Updated October 2, 2006 Return to Top

  6. 75 FR 22577 - Proposed Privacy Policy Statement

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-04-29

    ... ELECTION ASSISTANCE COMMISSION Proposed Privacy Policy Statement AGENCY: U.S. Election Assistance Commission. ACTION: Notice and request for public comment on Proposed Privacy Policy Statement. SUMMARY: The U.S. Election Assistance Commission (EAC) seeks public comment on the Proposed Privacy Policy...

  7. Extending SQL to Support Privacy Policies

    NASA Astrophysics Data System (ADS)

    Ghazinour, Kambiz; Pun, Sampson; Majedi, Maryam; Chinaci, Amir H.; Barker, Ken

    Increasing concerns over Internet applications that violate user privacy by exploiting (back-end) database vulnerabilities must be addressed to protect both customer privacy and to ensure corporate strategic assets remain trustworthy. This chapter describes an extension onto database catalogues and Structured Query Language (SQL) for supporting privacy in Internet applications, such as in social networks, e-health, e-governmcnt, etc. The idea is to introduce new predicates to SQL commands to capture common privacy requirements, such as purpose, visibility, generalization, and retention for both mandatory and discretionary access control policies. The contribution is that corporations, when creating the underlying databases, will be able to define what their mandatory privacy policies arc with which all application users have to comply. Furthermore, each application user, when providing their own data, will be able to define their own privacy policies with which other users have to comply. The extension is supported with underlying catalogues and algorithms. The experiments demonstrate a very reasonable overhead for the extension. The result is a low-cost mechanism to create new systems that arc privacy aware and also to transform legacy databases to their privacy-preserving equivalents. Although the examples arc from social networks, one can apply the results to data security and user privacy of other enterprises as well.

  8. 32 CFR 1701.4 - Privacy Act responsibilities/policy.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 32 National Defense 6 2011-07-01 2011-07-01 false Privacy Act responsibilities/policy. 1701.4... NATIONAL INTELLIGENCE ADMINISTRATION OF RECORDS UNDER THE PRIVACY ACT OF 1974 Protection of Privacy and Access to Individual Records Under the Privacy Act of 1974 § 1701.4 Privacy Act responsibilities/policy...

  9. 32 CFR 1701.4 - Privacy Act responsibilities/policy.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 32 National Defense 6 2013-07-01 2013-07-01 false Privacy Act responsibilities/policy. 1701.4... NATIONAL INTELLIGENCE ADMINISTRATION OF RECORDS UNDER THE PRIVACY ACT OF 1974 Protection of Privacy and Access to Individual Records Under the Privacy Act of 1974 § 1701.4 Privacy Act responsibilities/policy...

  10. 32 CFR 1701.4 - Privacy Act responsibilities/policy.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 32 National Defense 6 2012-07-01 2012-07-01 false Privacy Act responsibilities/policy. 1701.4... NATIONAL INTELLIGENCE ADMINISTRATION OF RECORDS UNDER THE PRIVACY ACT OF 1974 Protection of Privacy and Access to Individual Records Under the Privacy Act of 1974 § 1701.4 Privacy Act responsibilities/policy...

  11. 32 CFR 1701.4 - Privacy Act responsibilities/policy.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 32 National Defense 6 2014-07-01 2014-07-01 false Privacy Act responsibilities/policy. 1701.4... NATIONAL INTELLIGENCE ADMINISTRATION OF RECORDS UNDER THE PRIVACY ACT OF 1974 Protection of Privacy and Access to Individual Records Under the Privacy Act of 1974 § 1701.4 Privacy Act responsibilities/policy...

  12. 32 CFR 1701.4 - Privacy Act responsibilities/policy.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 32 National Defense 6 2010-07-01 2010-07-01 false Privacy Act responsibilities/policy. 1701.4... NATIONAL INTELLIGENCE ADMINISTRATION OF RECORDS UNDER THE PRIVACY ACT OF 1974 Protection of Privacy and Access to Individual Records Under the Privacy Act of 1974 § 1701.4 Privacy Act responsibilities/policy...

  13. Ocean Drilling Program: Privacy Policy

    Science.gov Websites

    and products Drilling services and tools Online Janus database Search the ODP/TAMU web site ODP's main web site ODP/TAMU Science Operator Home Ocean Drilling Program Privacy Policy The following is the privacy policy for the www-odp.tamu.edu web site. 1. Cookies are used in the Database portion of the web

  14. Availability and quality of mobile health app privacy policies.

    PubMed

    Sunyaev, Ali; Dehling, Tobias; Taylor, Patrick L; Mandl, Kenneth D

    2015-04-01

    Mobile health (mHealth) customers shopping for applications (apps) should be aware of app privacy practices so they can make informed decisions about purchase and use. We sought to assess the availability, scope, and transparency of mHealth app privacy policies on iOS and Android. Over 35,000 mHealth apps are available for iOS and Android. Of the 600 most commonly used apps, only 183 (30.5%) had privacy policies. Average policy length was 1755 (SD 1301) words with a reading grade level of 16 (SD 2.9). Two thirds (66.1%) of privacy policies did not specifically address the app itself. Our findings show that currently mHealth developers often fail to provide app privacy policies. The privacy policies that are available do not make information privacy practices transparent to users, require college-level literacy, and are often not focused on the app itself. Further research is warranted to address why privacy policies are often absent, opaque, or irrelevant, and to find a remedy. © The Author 2015. Published by Oxford University Press on behalf of the American Medical Informatics Association. All rights reserved. For Permissions, please email: journals.permissions@oup.com.

  15. 45 CFR 503.2 - General policies-Privacy Act.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 45 Public Welfare 3 2012-10-01 2012-10-01 false General policies-Privacy Act. 503.2 Section 503.2... THE UNITED STATES, DEPARTMENT OF JUSTICE RULES OF PRACTICE PRIVACY ACT AND GOVERNMENT IN THE SUNSHINE REGULATIONS Privacy Act Regulations § 503.2 General policies—Privacy Act. The Commission will protect the...

  16. 45 CFR 503.2 - General policies-Privacy Act.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 45 Public Welfare 3 2013-10-01 2013-10-01 false General policies-Privacy Act. 503.2 Section 503.2... THE UNITED STATES, DEPARTMENT OF JUSTICE RULES OF PRACTICE PRIVACY ACT AND GOVERNMENT IN THE SUNSHINE REGULATIONS Privacy Act Regulations § 503.2 General policies—Privacy Act. The Commission will protect the...

  17. 45 CFR 503.2 - General policies-Privacy Act.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 45 Public Welfare 3 2011-10-01 2011-10-01 false General policies-Privacy Act. 503.2 Section 503.2... THE UNITED STATES, DEPARTMENT OF JUSTICE RULES OF PRACTICE PRIVACY ACT AND GOVERNMENT IN THE SUNSHINE REGULATIONS Privacy Act Regulations § 503.2 General policies—Privacy Act. The Commission will protect the...

  18. 45 CFR 503.2 - General policies-Privacy Act.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 45 Public Welfare 3 2014-10-01 2014-10-01 false General policies-Privacy Act. 503.2 Section 503.2... THE UNITED STATES, DEPARTMENT OF JUSTICE RULES OF PRACTICE PRIVACY ACT AND GOVERNMENT IN THE SUNSHINE REGULATIONS Privacy Act Regulations § 503.2 General policies—Privacy Act. The Commission will protect the...

  19. 45 CFR 503.2 - General policies-Privacy Act.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 45 Public Welfare 3 2010-10-01 2010-10-01 false General policies-Privacy Act. 503.2 Section 503.2... THE UNITED STATES, DEPARTMENT OF JUSTICE RULES OF PRACTICE PRIVACY ACT AND GOVERNMENT IN THE SUNSHINE REGULATIONS Privacy Act Regulations § 503.2 General policies—Privacy Act. The Commission will protect the...

  20. Obtaining P3P Privacy Policies for Composite Services

    PubMed Central

    Sun, Yi; Huang, Zhiqiu; Ke, Changbo

    2014-01-01

    With the development of web services technology, web services have changed from single to composite services. Privacy protection in composite services is becoming an important issue. P3P (platform for privacy preferences) is a privacy policy language which was designed for single web services. It enables service providers to express how they will deal with the privacy information of service consumers. In order to solve the problem that P3P cannot be applied to composite services directly, we propose a method to obtain P3P privacy policies for composite services. In this method, we present the definitions of Purpose, Recipient, and Retention elements as well as Optional and Required attributes for P3P policies of composite services. We also provide an instantiation to illustrate the feasibility of the method. PMID:25126609

  1. Obtaining P3P privacy policies for composite services.

    PubMed

    Sun, Yi; Huang, Zhiqiu; Ke, Changbo

    2014-01-01

    With the development of web services technology, web services have changed from single to composite services. Privacy protection in composite services is becoming an important issue. P3P (platform for privacy preferences) is a privacy policy language which was designed for single web services. It enables service providers to express how they will deal with the privacy information of service consumers. In order to solve the problem that P3P cannot be applied to composite services directly, we propose a method to obtain P3P privacy policies for composite services. In this method, we present the definitions of Purpose, Recipient, and Retention elements as well as Optional and Required attributes for P3P policies of composite services. We also provide an instantiation to illustrate the feasibility of the method.

  2. Data Security and Privacy in Apps for Dementia: An Analysis of Existing Privacy Policies.

    PubMed

    Rosenfeld, Lisa; Torous, John; Vahia, Ipsit V

    2017-08-01

    Despite tremendous growth in the number of health applications (apps), little is known about how well these apps protect their users' health-related data. This gap in knowledge is of particular concern for apps targeting people with dementia, whose cognitive impairment puts them at increased risk of privacy breaches. In this article, we determine how many dementia apps have privacy policies and how well they protect user data. Our analysis included all iPhone apps that matched the search terms "medical + dementia" or "health & fitness + dementia" and collected user-generated content. We evaluated all available privacy policies for these apps based on criteria that systematically measure how individual user data is handled. Seventy-two apps met the above search teams and collected user data. Of these, only 33 (46%) had an available privacy policy. Nineteen of the 33 with policies (58%) were specific to the app in question, and 25 (76%) specified how individual-user as opposed to aggregate data would be handled. Among these, there was a preponderance of missing information, the majority acknowledged collecting individual data for internal purposes, and most admitted to instances in which they would share user data with outside parties. At present, the majority of health apps focused on dementia lack a privacy policy, and those that do exist lack clarity. Bolstering safeguards and improving communication about privacy protections will help facilitate consumer trust in apps, thereby enabling more widespread and meaningful use by people with dementia and those involved in their care. Copyright © 2017. Published by Elsevier Inc.

  3. Privacy Policy | Smokefree 60+

    Cancer.gov

    The National Cancer Institute (NCI) respects the privacy of users of its websites. This is why we have taken the time to disclose our privacy policy and information collection practices. NCI does not disclose, give, sell, or transfer any personal information about visitors unless required to do so by law. NCI automatically collects a limited amount of information about the use of websites for statistical purposes — that is, to measure the numbers of visitors. This information may be helpful when considering changes that improve our websites for future visitors.

  4. Privacy Policy | FNLCR Staging

    Cancer.gov

    The privacy of our users is of utmost importance to Frederick National Lab. The policy outlined below establishes how Frederick National Lab will use the information we gather about you from your visit to our website. We may collect and store

  5. Realizing IoT service's policy privacy over publish/subscribe-based middleware.

    PubMed

    Duan, Li; Zhang, Yang; Chen, Shiping; Wang, Shiyao; Cheng, Bo; Chen, Junliang

    2016-01-01

    The publish/subscribe paradigm makes IoT service collaborations more scalable and flexible, due to the space, time and control decoupling of event producers and consumers. Thus, the paradigm can be used to establish large-scale IoT service communication infrastructures such as Supervisory Control and Data Acquisition systems. However, preserving IoT service's policy privacy is difficult in this paradigm, because a classical publisher has little control of its own event after being published; and a subscriber has to accept all the events from the subscribed event type with no choice. Few existing publish/subscribe middleware have built-in mechanisms to address the above issues. In this paper, we present a novel access control framework, which is capable of preserving IoT service's policy privacy. In particular, we adopt the publish/subscribe paradigm as the IoT service communication infrastructure to facilitate the protection of IoT services policy privacy. The key idea in our policy-privacy solution is using a two-layer cooperating method to match bi-directional privacy control requirements: (a) data layer for protecting IoT events; and (b) application layer for preserving the privacy of service policy. Furthermore, the anonymous-set-based principle is adopted to realize the functionalities of the framework, including policy embedding and policy encoding as well as policy matching. Our security analysis shows that the policy privacy framework is Chosen-Plaintext Attack secure. We extend the open source Apache ActiveMQ broker by building into a policy-based authorization mechanism to enforce the privacy policy. The performance evaluation results indicate that our approach is scalable with reasonable overheads.

  6. Privacy and policy for genetic research.

    PubMed

    DeCew, Judith Wagner

    2004-01-01

    I begin with a discussion of the value of privacy and what we lose without it. I then turn to the difficulties of preserving privacy for genetic information and other medical records in the face of advanced information technology. I suggest three alternative public policy approaches to the problem of protecting individual privacy and also preserving databases for genetic research: (1) governmental guidelines and centralized databases, (2) corporate self-regulation, and (3) my hybrid approach. None of these are unproblematic; I discuss strengths and drawbacks of each, emphasizing the importance of protecting the privacy of sensitive medical and genetic information as well as letting information technology flourish to aid patient care, public health and scientific research.

  7. Reading level of privacy policies on Internet health Web sites.

    PubMed

    Graber, Mark A; D'Alessandro, Donna M; Johnson-West, Jill

    2002-07-01

    Most individuals would like to maintain the privacy of their medical information on the World Wide Web (WWW). In response, commercial interests and other sites post privacy policies that are designed to inform users of how their information will be used. However, it is not known if these statements are comprehensible to most WWW users. The purpose of this study was to determine the reading level of privacy statements on Internet health Web sites and to determine whether these statements can inform users of their rights. This was a descriptive study. Eighty Internet health sites were examined and the readability of their privacy policies was determined. The selected sample included the top 25 Internet health sites as well as other sites that a user might encounter while researching a common problem such as high blood pressure. Sixty percent of the sites were commercial (.com), 17.5% were organizations (.org), 8.8% were from the United Kingdom (.uk), 3.8% were United States governmental (.gov), and 2.5% were educational (.edu). The readability level of the privacy policies was calculated using the Flesch, the Fry, and the SMOG readability levels. Of the 80 Internet health Web sites studied, 30% (including 23% of the commercial Web sites) had no privacy policy posted. The average readability level of the remaining sites required 2 years of college level education to comprehend, and no Web site had a privacy policy that was comprehensible by most English-speaking individuals in the United States. The privacy policies of health Web sites are not easily understood by most individuals in the United States and do not serve to inform users of their rights. Possible remedies include rewriting policies to make them comprehensible and protecting online health information by using legal statutes or standardized insignias indicating compliance with a set of privacy standards (eg, "Health on the Net" [HON] http://www.hon.ch).

  8. Privacy policies for health social networking sites.

    PubMed

    Li, Jingquan

    2013-01-01

    Health social networking sites (HSNS), virtual communities where users connect with each other around common problems and share relevant health data, have been increasingly adopted by medical professionals and patients. The growing use of HSNS like Sermo and PatientsLikeMe has prompted public concerns about the risks that such online data-sharing platforms pose to the privacy and security of personal health data. This paper articulates a set of privacy risks introduced by social networking in health care and presents a practical example that demonstrates how the risks might be intrinsic to some HSNS. The aim of this study is to identify and sketch the policy implications of using HSNS and how policy makers and stakeholders should elaborate upon them to protect the privacy of online health data.

  9. Privacy policies for health social networking sites

    PubMed Central

    Li, Jingquan

    2013-01-01

    Health social networking sites (HSNS), virtual communities where users connect with each other around common problems and share relevant health data, have been increasingly adopted by medical professionals and patients. The growing use of HSNS like Sermo and PatientsLikeMe has prompted public concerns about the risks that such online data-sharing platforms pose to the privacy and security of personal health data. This paper articulates a set of privacy risks introduced by social networking in health care and presents a practical example that demonstrates how the risks might be intrinsic to some HSNS. The aim of this study is to identify and sketch the policy implications of using HSNS and how policy makers and stakeholders should elaborate upon them to protect the privacy of online health data. PMID:23599228

  10. Trust Information and Privacy Policies - Enablers for pHealth and Ubiquitous Health.

    PubMed

    Ruotsalainen, Pekka; Blobel, Bernd

    2014-01-01

    pHealth occurs in uncontrolled and unsecure environment where predefined organizational trust does not exist. To be accepted by users, pHealth requires a privacy model where privacy is a personal property, i.e., a person can perform own will and define policies which regulate how personal health information (PHI) is used. Privacy and trust are interconnected concepts. Therefore, before beginning to use pHealth services, the person needs practical and reliable information that enables her or him to determine the trustworthiness level of services. To avoid the use of blind trust, organizations, researchers, policymakers, and standardization organizations have proposed the use of dynamic context-aware policies for privacy management in pHealth. To make meaningful privacy decision, a person should understand the impact of selected policy rules on the processing of PHI in different situations. In this paper, the use of computational trust information for defining privacy polies and reducing their number is proposed. A trust value and understandable trust attributes enable a person to tailor privacy policies requested for trustworthy use of pHealth services. Trust attributes proposed are derived from privacy concerns existing in open ubiquitous environment. These attributes also force pHealth services providers to publish information needed for trust calculation and in this way to support openness and transparency.

  11. An examination of electronic health information privacy in older adults.

    PubMed

    Le, Thai; Thompson, Hilaire; Demiris, George

    2013-01-01

    Older adults are the quickest growing demographic group and are key consumers of health services. As the United States health system transitions to electronic health records, it is important to understand older adult perceptions of privacy and security. We performed a secondary analysis of the Health Information National Trends Survey (2012, Cycle 1), to examine differences in perceptions of electronic health information privacy between older adults and the general population. We found differences in the level of importance placed on access to electronic health information (older adults placed greater emphasis on provider as opposed to personal access) and tendency to withhold information out of concerns for privacy and security (older adults were less likely to withhold information). We provide recommendations to alleviate some of these privacy concerns. This may facilitate greater use of electronic health communication between patient and provider, while promoting shared decision making.

  12. Privacy policy analysis for health information networks and regional health information organizations.

    PubMed

    Noblin, Alice M

    2007-01-01

    Regional Health Information Organizations (RHIOs) are forming in response to President George W. Bush's 2004 mandate that medical information be made available electronically to facilitate continuity of care. Privacy concerns are a deterrent to widespread acceptance of RHIOs. The Health Information Portability and Accountability Act of 1996 provides some guidelines for privacy protection. However, most states have stricter guidelines, causing difficulty when RHIOs form across these jurisdictions. This article compares several RHIOs including their privacy policies where available. In addition, studies were reviewed considering privacy concerns of people in the United States and elsewhere. Surveys reveal that Americans are concerned about the privacy of their personal health information and ultimately feel it is the role of the government to provide protection. The purpose of this article is to look at the privacy issues and recommend a policy that may help to resolve some of the concerns of both providers and patients. Policy research and action are needed to move the National Health Information Network toward reality. Efforts to provide consistency in privacy laws are a necessary early step to facilitate the construction and maintenance of RHIOs and the National Health Information Network.

  13. Privacy Policy Enforcement for Ambient Ubiquitous Services

    NASA Astrophysics Data System (ADS)

    Oyomno, Were; Jäppinen, Pekka; Kerttula, Esa

    Ubiquitous service providers leverage miniaturised computing terminals equipped with wireless capabilities to avail new service models. These models are pivoted on personal and inexpensive terminals to customise services to individual preferences. Portability, small sizes and compact keyboards are few features popularising mobile terminals. Features enable storing and carrying of ever increasing proportions of personal data and ability to use them in service adaptations. Ubiquitous services automate deeper soliciting of personal data transparently without the need for user interactions. Transparent solicitations, acquisitions and handling of personal data legitimises privacy concerns regarding disclosures, retention and re-use of the data. This study presents a policy enforcement for ubiquitous services that safeguards handling of users personal data and monitors adherence to stipulated privacy policies. Enforcement structures towards usability and scalability are presented.

  14. Determining the privacy policy deficiencies of health ICT applications through semi-formal modelling.

    PubMed

    Croll, Peter R

    2011-02-01

    To ensure that patient confidentiality is securely maintained, health ICT applications that contain sensitive personal information demand comprehensive privacy policies. Determining the adequacy of these policies to meet legal conformity together with clinical users and patient expectation is demanding in practice. Organisations and agencies looking to analyse their Privacy and Security policies can benefit from guidance provided by outside entities such as the Privacy Office of their State or Government together with law firms and ICT specialists. The advice given is not uniform and often open to different interpretations. Of greater concern is the possibility of overlooking any important aspects that later result in a data breach. Based on three case studies, this paper considers whether a more formal approach to privacy analysis could be taken that would help identify the full coverage of a Privacy Impact Analysis and determine the deficiencies with an organisation's current policies and approach. A diagrammatic model showing the relationships between Confidentiality, Privacy, Trust, Security and Safety is introduced. First the validity of this model is determined by mapping it against the real-world case studies taken from three healthcare services that depend on ICT. Then, by using software engineering methods, a formal mapping of the relationships is undertaken to identify a full set of policies needed to satisfy the model. How effective this approach may prove as a generic method for deriving a comprehensive set of policies in health ICT applications is finally discussed. Copyright © 2010 Elsevier Ireland Ltd. All rights reserved.

  15. Insights to develop privacy policy for organization in Indonesia

    NASA Astrophysics Data System (ADS)

    Rosmaini, E.; Kusumasari, T. F.; Lubis, M.; Lubis, A. R.

    2018-03-01

    Nowadays, the increased utilization of shared application in the network needs not only dictate to have enhanced security but also emphasize the need to balance its privacy protection and ease of use. Meanwhile, its accessibility and availability as the demand from organization service put privacy obligations become more complex process to be handled and controlled. Nonetheless, the underlying principles for privacy policy exist in Indonesian current laws, even though they spread across various article regulations. Religions, constitutions, statutes, regulations, custom and culture requirements still become the reference model to control the activity process for data collection and information sharing accordingly. Moreover, as the customer and organization often misinterpret their responsibilities and rights in the business function, process and level, the essential thing to be considered for professionals on how to articulate clearly the rules that manage their information gathering and distribution in a manner that translates into information system specification and requirements for developers and managers. This study focus on providing suggestion and recommendation to develop privacy policy based on descriptive analysis of 791 respondents on personal data protection in accordance with political and economic factor in Indonesia.

  16. A software platform to analyse the ethical issues of electronic patient privacy policy: the S3P example.

    PubMed

    Mizani, M A; Baykal, N

    2007-12-01

    Paper-based privacy policies fail to resolve the new changes posed by electronic healthcare. Protecting patient privacy through electronic systems has become a serious concern and is the subject of several recent studies. The shift towards an electronic privacy policy introduces new ethical challenges that cannot be solved merely by technical measures. Structured Patient Privacy Policy (S3P) is a software tool assuming an automated electronic privacy policy in an electronic healthcare setting. It is designed to simulate different access levels and rights of various professionals involved in healthcare in order to assess the emerging ethical problems. The authors discuss ethical issues concerning electronic patient privacy policies that have become apparent during the development and application of S3P.

  17. Policy recommendations for addressing privacy challenges associated with cell-based research and interventions.

    PubMed

    Ogbogu, Ubaka; Burningham, Sarah; Ollenberger, Adam; Calder, Kathryn; Du, Li; El Emam, Khaled; Hyde-Lay, Robyn; Isasi, Rosario; Joly, Yann; Kerr, Ian; Malin, Bradley; McDonald, Michael; Penney, Steven; Piat, Gayle; Roy, Denis-Claude; Sugarman, Jeremy; Vercauteren, Suzanne; Verhenneman, Griet; West, Lori; Caulfield, Timothy

    2014-02-03

    The increased use of human biological material for cell-based research and clinical interventions poses risks to the privacy of patients and donors, including the possibility of re-identification of individuals from anonymized cell lines and associated genetic data. These risks will increase as technologies and databases used for re-identification become affordable and more sophisticated. Policies that require ongoing linkage of cell lines to donors' clinical information for research and regulatory purposes, and existing practices that limit research participants' ability to control what is done with their genetic data, amplify the privacy concerns. To date, the privacy issues associated with cell-based research and interventions have not received much attention in the academic and policymaking contexts. This paper, arising out of a multi-disciplinary workshop, aims to rectify this by outlining the issues, proposing novel governance strategies and policy recommendations, and identifying areas where further evidence is required to make sound policy decisions. The authors of this paper take the position that existing rules and norms can be reasonably extended to address privacy risks in this context without compromising emerging developments in the research environment, and that exceptions from such rules should be justified using a case-by-case approach. In developing new policies, the broader framework of regulations governing cell-based research and related areas must be taken into account, as well as the views of impacted groups, including scientists, research participants and the general public. This paper outlines deliberations at a policy development workshop focusing on privacy challenges associated with cell-based research and interventions. The paper provides an overview of these challenges, followed by a discussion of key themes and recommendations that emerged from discussions at the workshop. The paper concludes that privacy risks associated with cell

  18. Policy recommendations for addressing privacy challenges associated with cell-based research and interventions

    PubMed Central

    2014-01-01

    Background The increased use of human biological material for cell-based research and clinical interventions poses risks to the privacy of patients and donors, including the possibility of re-identification of individuals from anonymized cell lines and associated genetic data. These risks will increase as technologies and databases used for re-identification become affordable and more sophisticated. Policies that require ongoing linkage of cell lines to donors’ clinical information for research and regulatory purposes, and existing practices that limit research participants’ ability to control what is done with their genetic data, amplify the privacy concerns. Discussion To date, the privacy issues associated with cell-based research and interventions have not received much attention in the academic and policymaking contexts. This paper, arising out of a multi-disciplinary workshop, aims to rectify this by outlining the issues, proposing novel governance strategies and policy recommendations, and identifying areas where further evidence is required to make sound policy decisions. The authors of this paper take the position that existing rules and norms can be reasonably extended to address privacy risks in this context without compromising emerging developments in the research environment, and that exceptions from such rules should be justified using a case-by-case approach. In developing new policies, the broader framework of regulations governing cell-based research and related areas must be taken into account, as well as the views of impacted groups, including scientists, research participants and the general public. Summary This paper outlines deliberations at a policy development workshop focusing on privacy challenges associated with cell-based research and interventions. The paper provides an overview of these challenges, followed by a discussion of key themes and recommendations that emerged from discussions at the workshop. The paper concludes that

  19. Privacy Policy | Frederick National Laboratory for Cancer Research

    Cancer.gov

    The privacy of our users is of utmost importance to Frederick National Laboratory. The policy outlined below establishes how Frederick National Laboratory will use the information we gather about you from your visit to our website. We may coll

  20. A Content Analysis of Library Vendor Privacy Policies: Do They Meet Our Standards?

    ERIC Educational Resources Information Center

    Magi, Trina J.

    2010-01-01

    Librarians have a long history of protecting user privacy, but they have done seemingly little to understand or influence the privacy policies of library resource vendors that increasingly collect user information through Web 2.0-style personalization features. After citing evidence that college students value privacy, this study used content…

  1. Assessing the privacy policies in mobile personal health records.

    PubMed

    Zapata, Belén Cruz; Hernández Niñirola, Antonio; Fernández-Alemán, José Luis; Toval, Ambrosio

    2014-01-01

    The huge increase in the number and use of smartphones and tablets has led health service providers to take an interest in mHealth. Popular mobile app markets like Apple App Store or Google Play contain thousands of health applications. Although mobile personal health records (mPHRs) have a number of benefits, important challenges appear in the form of adoption barriers. Security and privacy have been identified as part of these barriers and should be addressed. This paper analyzes and assesses a total of 24 free mPHRs for Android and iOS. Characteristics regarding privacy and security were extracted from the HIPAA. The results show important differences in both the mPHRs and the characteristics analyzed. A questionnaire containing six questions concerning privacy policies was defined. Our questionnaire may assist developers and stakeholders to evaluate the security and privacy of their mPHRs.

  2. Technical and policy approaches to balancing patient privacy and data sharing in clinical and translational research.

    PubMed

    Malin, Bradley; Karp, David; Scheuermann, Richard H

    2010-01-01

    Clinical researchers need to share data to support scientific validation and information reuse and to comply with a host of regulations and directives from funders. Various organizations are constructing informatics resources in the form of centralized databases to ensure reuse of data derived from sponsored research. The widespread use of such open databases is contingent on the protection of patient privacy. We review privacy-related problems associated with data sharing for clinical research from technical and policy perspectives. We investigate existing policies for secondary data sharing and privacy requirements in the context of data derived from research and clinical settings. In particular, we focus on policies specified by the US National Institutes of Health and the Health Insurance Portability and Accountability Act and touch on how these policies are related to current and future use of data stored in public database archives. We address aspects of data privacy and identifiability from a technical, although approachable, perspective and summarize how biomedical databanks can be exploited and seemingly anonymous records can be reidentified using various resources without hacking into secure computer systems. We highlight which clinical and translational data features, specified in emerging research models, are potentially vulnerable or exploitable. In the process, we recount a recent privacy-related concern associated with the publication of aggregate statistics from pooled genome-wide association studies that have had a significant impact on the data sharing policies of National Institutes of Health-sponsored databanks. Based on our analysis and observations we provide a list of recommendations that cover various technical, legal, and policy mechanisms that open clinical databases can adopt to strengthen data privacy protection as they move toward wider deployment and adoption.

  3. Technical and Policy Approaches to Balancing Patient Privacy and Data Sharing in Clinical and Translational Research

    PubMed Central

    Malin, Bradley; Karp, David; Scheuermann, Richard H.

    2010-01-01

    Clinical researchers need to share data to support scientific validation and information reuse, and to comply with a host of regulations and directives from funders. Various organizations are constructing informatics resources in the form of centralized databases to ensure widespread availability of data derived from sponsored research. The widespread use of such open databases is contingent on the protection of patient privacy. In this paper, we review several aspects of the privacy-related problems associated with data sharing for clinical research from technical and policy perspectives. We begin with a review of existing policies for secondary data sharing and privacy requirements in the context of data derived from research and clinical settings. In particular, we focus on policies specified by the U.S. National Institutes of Health and the Health Insurance Portability and Accountability Act and touch upon how these policies are related to current, as well as future, use of data stored in public database archives. Next, we address aspects of data privacy and “identifiability” from a more technical perspective, and review how biomedical databanks can be exploited and seemingly anonymous records can be “re-identified” using various resources without compromising or hacking into secure computer systems. We highlight which data features specified in clinical research data models are potentially vulnerable or exploitable. In the process, we recount a recent privacy-related concern associated with the publication of aggregate statistics from pooled genome-wide association studies that has had a significant impact on the data sharing policies of NIH-sponsored databanks. Finally, we conclude with a list of recommendations that cover various technical, legal, and policy mechanisms that open clinical databases can adopt to strengthen data privacy protections as they move toward wider deployment and adoption. PMID:20051768

  4. A Deterrence Approach to Regulate Nurses' Compliance with Electronic Medical Records Privacy Policy.

    PubMed

    Kuo, Kuang-Ming; Talley, Paul C; Hung, Ming-Chien; Chen, Yen-Liang

    2017-11-03

    Hospitals have become increasingly aware that electronic medical records (EMR) may bring about tangible/intangible benefits to managing institutions, including reduced medical errors, improved quality-of-care, curtailed costs, and allowed access to patient information by healthcare professionals regardless of limitations. However, increased dependence on EMR has led to a corresponding increase in the influence of EMR breaches. Such incursions, which have been significantly facilitated by the introduction of mobile devices for accessing EMR, may induce tangible/intangible damage to both hospitals and concerned individuals. The purpose of this study was to explore factors which may tend to inhibit nurses' intentions to violate privacy policy concerning EMR based upon the deterrence theory perspective. Utilizing survey methodology, 262 responses were analyzed via structural equation modeling. Results revealed that punishment certainty, detection certainty, and subjective norm would most certainly and significantly reduce nurses' intentions to violate established EMR privacy policy. With these findings, recommendations for health administrators in planning and designing effective strategies which may potentially inhibit nurses from violating EMR privacy policy are discussed.

  5. Compliance With Electronic Medical Records Privacy Policy: An Empirical Investigation of Hospital Information Technology Staff

    PubMed Central

    Sher, Ming-Ling; Talley, Paul C.; Yang, Ching-Wen; Kuo, Kuang-Ming

    2017-01-01

    The employment of Electronic Medical Records is expected to better enhance health care quality and to relieve increased financial pressure. Electronic Medical Records are, however, potentially vulnerable to security breaches that may result in a rise of patients’ privacy concerns. The purpose of our study was to explore the factors that motivate hospital information technology staff’s compliance with Electronic Medical Records privacy policy from the theoretical lenses of protection motivation theory and the theory of reasoned action. The study collected data using survey methodology. A total of 310 responses from information technology staff of 7 medical centers in Taiwan was analyzed using the Structural Equation Modeling technique. The results revealed that perceived vulnerability and perceived severity of threats from Electronic Medical Records breaches may be used to predict the information technology staff’s fear arousal level. And factors including fear arousal, response efficacy, self-efficacy, and subjective norm, in their turn, significantly predicted IT staff’s behavioral intention to comply with privacy policy. Response cost was not found to have any relationship with behavioral intention. Based on the findings, we suggest that hospitals could plan and design effective strategies such as initiating privacy-protection awareness and skills training programs to improve information technology staff member’s adherence to privacy policy. Furthermore, enhancing the privacy-protection climate in hospitals is also a viable means to the end. Further practical and research implications are also discussed.

  6. Privacy Policy of NOAA's National Weather Service - NOAA's National Weather

    Science.gov Websites

    Safety Weather Radio Hazard Assmt... StormReady / TsunamiReady Skywarn(tm) Education/Outreach Information , and National Weather Service information collection practices. This Privacy Policy Statement applies only to National Weather Service web sites. Some organizations within NOAA may have other information

  7. Customer privacy on UK healthcare websites.

    PubMed

    Mundy, Darren P

    2006-09-01

    Privacy has been and continues to be one of the key challenges of an age devoted to the accumulation, processing, and mining of electronic information. In particular, privacy of healthcare-related information is seen as a key issue as health organizations move towards the electronic provision of services. The aim of the research detailed in this paper has been to analyse privacy policies on popular UK healthcare-related websites to determine the extent to which consumer privacy is protected. The author has combined approaches (such as approaches focused on usability, policy content, and policy quality) used in studies by other researchers on e-commerce and US healthcare websites to provide a comprehensive analysis of UK healthcare privacy policies. The author identifies a wide range of issues related to the protection of consumer privacy through his research analysis using quantitative results. The main outcomes from the author's research are that only 61% of healthcare-related websites in their sample group posted privacy policies. In addition, most of the posted privacy policies had poor readability standards and included a variety of privacy vulnerability statements. Overall, the author's findings represent significant current issues in relation to healthcare information protection on the Internet. The hope is that raising awareness of these results will drive forward changes in the industry, similar to those experienced with information quality.

  8. Closing the Barn Door: The Effect of Parental Supervision on Canadian Children's Online Privacy

    ERIC Educational Resources Information Center

    Steeves, Valerie; Webster, Cheryl

    2008-01-01

    Empirical data from a large sample of Canadian youth aged 13 to 17 years suggest that, although the current privacy policy framework is having a positive effect on the extent to which young people are complying with the types of behavior promoted by adults as privacy protective, its primary focus on parental supervision is inadequate to fully…

  9. Identity management and privacy languages technologies: Improving user control of data privacy

    NASA Astrophysics Data System (ADS)

    García, José Enrique López; García, Carlos Alberto Gil; Pacheco, Álvaro Armenteros; Organero, Pedro Luis Muñoz

    The identity management solutions have the capability to bring confidence to internet services, but this confidence could be improved if user has more control over the privacy policy of its attributes. Privacy languages could help to this task due to its capability to define privacy policies for data in a very flexible way. So, an integration problem arises: making work together both identity management and privacy languages. Despite several proposals for accomplishing this have already been defined, this paper suggests some topics and improvements that could be considered.

  10. Are personal health records safe? A review of free web-accessible personal health record privacy policies.

    PubMed

    Carrión Señor, Inmaculada; Fernández-Alemán, José Luis; Toval, Ambrosio

    2012-08-23

    Several obstacles prevent the adoption and use of personal health record (PHR) systems, including users' concerns regarding the privacy and security of their personal health information. To analyze the privacy and security characteristics of PHR privacy policies. It is hoped that identification of the strengths and weaknesses of the PHR systems will be useful for PHR users, health care professionals, decision makers, and designers. We conducted a systematic review using the principal databases related to health and computer science to discover the Web-based and free PHR systems mentioned in published articles. The privacy policy of each PHR system selected was reviewed to extract its main privacy and security characteristics. The search of databases and the myPHR website provided a total of 52 PHR systems, of which 24 met our inclusion criteria. Of these, 17 (71%) allowed users to manage their data and to control access to their health care information. Only 9 (38%) PHR systems permitted users to check who had accessed their data. The majority of PHR systems used information related to the users' accesses to monitor and analyze system use, 12 (50%) of them aggregated user information to publish trends, and 20 (83%) used diverse types of security measures. Finally, 15 (63%) PHR systems were based on regulations or principles such as the US Health Insurance Portability and Accountability Act (HIPAA) and the Health on the Net Foundation Code of Conduct (HONcode). Most privacy policies of PHR systems do not provide an in-depth description of the security measures that they use. Moreover, compliance with standards and regulations in PHR systems is still low.

  11. Are Personal Health Records Safe? A Review of Free Web-Accessible Personal Health Record Privacy Policies

    PubMed Central

    Fernández-Alemán, José Luis; Toval, Ambrosio

    2012-01-01

    Background Several obstacles prevent the adoption and use of personal health record (PHR) systems, including users’ concerns regarding the privacy and security of their personal health information. Objective To analyze the privacy and security characteristics of PHR privacy policies. It is hoped that identification of the strengths and weaknesses of the PHR systems will be useful for PHR users, health care professionals, decision makers, and designers. Methods We conducted a systematic review using the principal databases related to health and computer science to discover the Web-based and free PHR systems mentioned in published articles. The privacy policy of each PHR system selected was reviewed to extract its main privacy and security characteristics. Results The search of databases and the myPHR website provided a total of 52 PHR systems, of which 24 met our inclusion criteria. Of these, 17 (71%) allowed users to manage their data and to control access to their health care information. Only 9 (38%) PHR systems permitted users to check who had accessed their data. The majority of PHR systems used information related to the users’ accesses to monitor and analyze system use, 12 (50%) of them aggregated user information to publish trends, and 20 (83%) used diverse types of security measures. Finally, 15 (63%) PHR systems were based on regulations or principles such as the US Health Insurance Portability and Accountability Act (HIPAA) and the Health on the Net Foundation Code of Conduct (HONcode). Conclusions Most privacy policies of PHR systems do not provide an in-depth description of the security measures that they use. Moreover, compliance with standards and regulations in PHR systems is still low. PMID:22917868

  12. Variability in adolescent portal privacy features: how the unique privacy needs of the adolescent patient create a complex decision-making process.

    PubMed

    Sharko, Marianne; Wilcox, Lauren; Hong, Matthew K; Ancker, Jessica S

    2018-05-17

    Medical privacy policies, which are clear-cut for adults and young children, become ambiguous during adolescence. Yet medical organizations must establish unambiguous rules about patient and parental access to electronic patient portals. We conducted a national interview study to characterize the diversity in adolescent portal policies across a range of institutions and determine the factors influencing decisions about these policies. Within a sampling framework that ensured diversity of geography and medical organization type, we used purposive and snowball sampling to identify key informants. Semi-structured interviews were conducted and analyzed with inductive thematic analysis, followed by a member check. We interviewed informants from 25 medical organizations. Policies established different degrees of adolescent access (from none to partial to complete), access ages (from 10 to 18 years), degrees of parental access, and types of information considered sensitive. Federal and state law did not dominate policy decisions. Other factors in the decision process were: technology capabilities; differing patient population needs; resources; community expectations; balance between information access and privacy; balance between promoting autonomy and promoting family shared decision-making; and tension between teen privacy and parental preferences. Some informants believed that clearer standards would simplify policy-making; others worried that standards could restrict high-quality polices. In the absence of universally accepted standards, medical organizations typically undergo an arduous decision-making process to develop teen portal policies, weighing legal, economic, social, clinical, and technological factors. As a result, portal access policies are highly inconsistent across the United States and within individual states.

  13. Development of a privacy and security policy framework for a multistate comparative effectiveness research network.

    PubMed

    Kim, Katherine K; McGraw, Deven; Mamo, Laura; Ohno-Machado, Lucila

    2013-08-01

    Comparative effectiveness research (CER) conducted in distributed research networks (DRNs) is subject to different state laws and regulations as well as institution-specific policies intended to protect privacy and security of health information. The goal of the Scalable National Network for Effectiveness Research (SCANNER) project is to develop and demonstrate a scalable, flexible technical infrastructure for DRNs that enables near real-time CER consistent with privacy and security laws and best practices. This investigation began with an analysis of privacy and security laws and state health information exchange (HIE) guidelines applicable to SCANNER participants from California, Illinois, Massachusetts, and the Federal Veteran's Administration. A 7-member expert panel of policy and technical experts reviewed the analysis and gave input into the framework during 5 meetings held in 2011-2012. The state/federal guidelines were applied to 3 CER use cases: safety of new oral hematologic medications; medication therapy management for patients with diabetes and hypertension; and informational interventions for providers in the treatment of acute respiratory infections. The policy framework provides flexibility, beginning with a use-case approach rather than a one-size-fits-all approach. The policies may vary depending on the type of patient data shared (aggregate counts, deidentified, limited, and fully identified datasets) and the flow of data. The types of agreements necessary for a DRN may include a network-level and data use agreements. The need for flexibility in the development and implementation of policies must be balanced with responsibilities of data stewardship.

  14. Privacy and health in the information age: a content analysis of health web site privacy policy statements.

    PubMed

    Rains, Stephen A; Bosch, Leslie A

    2009-07-01

    This article reports a content analysis of the privacy policy statements (PPSs) from 97 general reference health Web sites that was conducted to examine the ways in which visitors' privacy is constructed by health organizations. PPSs are formal documents created by the Web site owner to describe how information regarding site visitors and their behavior is collected and used. The results show that over 80% of the PPSs in the sample indicated automatically collecting or requesting that visitors voluntarily provide information about themselves, and only 3% met all five of the Federal Trade Commission's Fair Information Practices guidelines. Additionally, the results suggest that the manner in which PPSs are framed and the use of justifications for collecting information are tropes used by health organizations to foster a secondary exchange of visitors' personal information for access to Web site content.

  15. Young adult females' views regarding online privacy protection at two time points.

    PubMed

    Moreno, Megan A; Kelleher, Erin; Ameenuddin, Nusheen; Rastogi, Sarah

    2014-09-01

    Risks associated with adolescent Internet use include exposure to inappropriate information and privacy violations. Privacy expectations and policies have changed over time. Recent Facebook security setting changes heighten these risks. The purpose of this study was to investigate views and experiences with Internet safety and privacy protection among older adolescent females at two time points, in 2009 and 2012. Two waves of focus groups were conducted, one in 2009 and the other in 2012. During these focus groups, female university students discussed Internet safety risks and strategies and privacy protection. All focus groups were audio recorded and manually transcribed. Qualitative analysis was conducted at the end of each wave and then reviewed and combined in a separate analysis using the constant comparative method. A total of 48 females participated across the two waves. The themes included (1) abundant urban myths, such as the ability for companies to access private information; (2) the importance of filtering one's displayed information; and (3) maintaining age limits on social media access to avoid younger teens' presence on Facebook. The findings present a complex picture of how adolescents view privacy protection and online safety. Older adolescents may be valuable partners in promoting safe and age-appropriate Internet use for younger teens in the changing landscape of privacy. Copyright © 2014. Published by Elsevier Inc.

  16. Privacy and Technology: Folk Definitions and Perspectives

    PubMed Central

    Kwasny, Michelle N.; Caine, Kelly E.; Rogers, Wendy A.; Fisk, Arthur D.

    2017-01-01

    In this paper we present preliminary results from a study of individual differences in privacy beliefs, as well as relate folk definitions of privacy to extant privacy theory. Focus groups were conducted with young adults aged 18–28 and older adults aged 65–75. Participants first shared their individual definitions of privacy, followed by a discussion of privacy in six scenarios chosen to represent a range of potentially invasive situations. Taken together, Westin’s and Altman’s theories of privacy accounted for both younger and older adults’ ideas about privacy, however, neither theory successfully accounted for findings across all age and gender groups. Whereas males tended to think of privacy in terms of personal needs and convenience, females focused more on privacy in terms of others, respecting privacy rights, and safety. Older adults tended to be more concerned about privacy of space rather than information privacy. Initial results reinforce the notion that targeting HCI design to the user population, even with respect to privacy, is critically important. PMID:29057397

  17. Fixing Broken Doors: Strategies for Drafting Privacy Policies Young People Can Understand

    ERIC Educational Resources Information Center

    Micheti, Anca; Burkell, Jacquelyn; Steeves, Valerie

    2010-01-01

    The goal of this project is to identify guidelines for privacy policies that children and teens can accurately interpret with relative ease. A three-pronged strategy was used to achieve this goal. First, an analysis of the relevant literature on reading was undertaken to identify the document features that affect comprehension. Second, focus…

  18. Policy Review on Adult Learning: The Adult Non-Formal Education Policy of Mali, West Africa

    ERIC Educational Resources Information Center

    Gadio, Moussa

    2011-01-01

    This article focuses on the issue of policy development for adult learning in Mali, West Africa. On January 2007, the Malian government adopted the "Adult Non-formal Education Policy Document," which was intended to regulate the adult learning sector and federate the actions of policy makers, adult education providers, and adult…

  19. A Model Privacy Statement for Ohio Library Web Sites.

    ERIC Educational Resources Information Center

    Monaco, Michael J.

    The purpose of this research was to develop a model privacy policy statement for library World Wide Web sites. First, standards of privacy protection were identified. These standards were culled from the privacy and confidentiality policies of the American Library Association, the Federal Trade Commission's online privacy reports, the guidelines…

  20. EGRP Privacy Policy & Disclaimers

    Cancer.gov

    The Epidemiology and Genomics Research Program complies with requirements for privacy and security established by the Office of Management and Budget, Department of Health and Human Services, the National Institutes of Health, and the National Cancer Institute.

  1. Older adult perceptions of smart home technologies: implications for research, policy & market innovations in healthcare.

    PubMed

    Coughlin, J; D'Ambrosio, L A; Reimer, B; Pratt, M R

    2007-01-01

    Advances in information communications technology and related computational power are providing a wide array of systems and related services that form the basis of smart home technologies to support the health, safety and independence of older adults. While these technologies offer significant benefits to older people and their families, they are also transforming older adults into lead adopters of a new 24/7 lifestyle of being monitored, managed, and, at times, motivated, to maintain their health and wellness. To better understand older adult perceptions of smart home technologies and to inform future research a workshop and focus group was conducted with 30 leaders in aging advocacy and aging services from 10 northeastern states. Participants expressed support of technological advance along with a variety of concerns that included usability, reliability, trust, privacy, stigma, accessibility and affordability. Participants also observed that there is a virtual absence of a comprehensive market and policy environment to support either the consumer or the diffusion of these technologies. Implications for research, policy and market innovation are discussed.

  2. A multimethod approach to examining usability of Web privacy polices and user agents for specifying privacy preferences.

    PubMed

    Proctor, Robert W; Vu, Kim-Phuong L

    2007-05-01

    Because all research methods have strengths and weaknesses, a multimethod approach often provides the best way to understand human behavior in applied settings. We describe how a multimethod approach was employed in a series of studies designed to examine usability issues associated with two aspects of online privacy: comprehension of privacy policies and configuration of privacy preferences for an online user agent. Archival research, user surveys, data mining, quantitative observations, and controlled experiments each yielded unique findings that, together, contributed to increased understanding of online-privacy issues for users. These findings were used to evaluate the accessibility of Web privacy policies to computer-literate users, determine whether people can configure user agents to achieve specific privacy goals, and discover ways in which the usability of those agents can be improved.

  3. Autonomy and Privacy in Clinical Laboratory Science Policy and Practice.

    PubMed

    Leibach, Elizabeth Kenimer

    2014-01-01

    Rapid advancements in diagnostic technologies coupled with growth in testing options and choices mandate the development of evidence-based testing algorithms linked to the care paths of the major chronic diseases and health challenges encountered most frequently. As care paths are evaluated, patient/consumers become partners in healthcare delivery. Clinical laboratory scientists find themselves firmly embedded in both quality improvement and clinical research with an urgent need to translate clinical laboratory information into knowledge required by practitioners and patient/consumers alike. To implement this patient-centered care approach in clinical laboratory science, practitioners must understand their roles in (1) protecting patient/consumer autonomy in the healthcare informed consent process and (2) assuring patient/consumer privacy and confidentiality while blending quality improvement study findings with protected health information. A literature review, describing the current ethical environment, supports a consultative role for clinical laboratory scientists in the clinical decision-making process and suggests guidance for policy and practice regarding the principle of autonomy and its associated operational characteristics: informed consent and privacy.

  4. Temporal Mode-Checking for Runtime Monitoring of Privacy Policies

    DTIC Science & Technology

    2014-05-28

    is a natural number. For any arbitrary i, j ∈ N with i > j , τi > τj (monotonicity). The environment η maps free variables to values in D. Given an...and for all j , where j ∈ N and k < j ≤ i, it implies that L, τ, j , η |= ϕ1 holds. • L, τ, i, η |=Iϕ iff there exists k ≥ i, where k ∈ N, such that (τk...and for all j , where j ∈ N and i ≤ j < k, it implies that L, τ, j , η |= ϕ1 holds. 3 Example policy. The following GMP formula represents a privacy

  5. Achieving Privacy in a Federated Identity Management System

    NASA Astrophysics Data System (ADS)

    Landau, Susan; Le van Gong, Hubert; Wilton, Robin

    Federated identity management allows a user to efficiently authenticate and use identity information from data distributed across multiple domains. The sharing of data across domains blurs security boundaries and potentially creates privacy risks. We examine privacy risks and fundamental privacy protections of federated identity- management systems. The protections include minimal disclosure and providing PII only on a “need-to-know” basis. We then look at the Liberty Alliance system and analyze previous privacy critiques of that system. We show how law and policy provide privacy protections in federated identity-management systems, and that privacy threats are best handled using a combination of technology and law/policy tools.

  6. Security measures required for HIPAA privacy.

    PubMed

    Amatayakul, M

    2000-01-01

    HIPAA security requirements include administrative, physical, and technical services and mechanisms to safeguard confidentiality, availability, and integrity of health information. Security measures, however, must be implemented in the context of an organization's privacy policies. Because HIPAA's proposed privacy rules are flexible and scalable to account for the nature of each organization's business, size, and resources, each organization will be determining its own privacy policies within the context of the HIPAA requirements and its security capabilities. Security measures cannot be implemented in a vacuum.

  7. Globalisation, Transnational Policies and Adult Education

    ERIC Educational Resources Information Center

    Milana, Marcella

    2012-01-01

    Globalisation, transnational policies and adult education--This paper examines policy documents produced by the United Nations Educational, Scientific and Cultural Organization (UNESCO) and the European Union (EU) in the field of adult education and learning. Both these entities address adult education as an explicit object of policy. This paper…

  8. Privacy-related context information for ubiquitous health.

    PubMed

    Seppälä, Antto; Nykänen, Pirkko; Ruotsalainen, Pekka

    2014-03-11

    Ubiquitous health has been defined as a dynamic network of interconnected systems. A system is composed of one or more information systems, their stakeholders, and the environment. These systems offer health services to individuals and thus implement ubiquitous computing. Privacy is the key challenge for ubiquitous health because of autonomous processing, rich contextual metadata, lack of predefined trust among participants, and the business objectives. Additionally, regulations and policies of stakeholders may be unknown to the individual. Context-sensitive privacy policies are needed to regulate information processing. Our goal was to analyze privacy-related context information and to define the corresponding components and their properties that support privacy management in ubiquitous health. These properties should describe the privacy issues of information processing. With components and their properties, individuals can define context-aware privacy policies and set their privacy preferences that can change in different information-processing situations. Scenarios and user stories are used to analyze typical activities in ubiquitous health to identify main actors, goals, tasks, and stakeholders. Context arises from an activity and, therefore, we can determine different situations, services, and systems to identify properties for privacy-related context information in information-processing situations. Privacy-related context information components are situation, environment, individual, information technology system, service, and stakeholder. Combining our analyses and previously identified characteristics of ubiquitous health, more detailed properties for the components are defined. Properties define explicitly what context information for different components is needed to create context-aware privacy policies that can control, limit, and constrain information processing. With properties, we can define, for example, how data can be processed or how components

  9. Privacy Policy | DoDLive

    Science.gov Websites

    Assistant Secretary of Defense-Public Affairs. Information presented on this website is considered public information and may be distributed or copied unless otherwise specified. Use of appropriate byline/photo/image credits is requested. Privacy Act Statement - If you choose to provide us with personal information - like

  10. International Policies on Sharing Genomic Research Results with Relatives: Approaches to Balancing Privacy with Access

    PubMed Central

    Branum, Rebecca; Wolf, Susan M.

    2015-01-01

    Returning genetic research results to raises complex issues. In order to inform the U.S. debate, this paper analyzes international law and policies governing the sharing of genetic research results with relatives and identifies key themes and lessons. The laws and policies from other countries demonstrate a range of approaches to balancing individual privacy and autonomy with family access for health benefit, offering important lessons for further development of approaches in the United States. PMID:26479568

  11. Technology, Privacy, and Electronic Freedom of Speech.

    ERIC Educational Resources Information Center

    McDonald, Frances M.

    1986-01-01

    Explores five issues related to technology's impact on privacy and access to information--regulation and licensing of the press, electronic surveillance, invasion of privacy, copyright, and policy-making and regulation. The importance of First Amendment rights and civil liberties in forming a coherent national information policy is stressed.…

  12. The Privacy Jungle:On the Market for Data Protection in Social Networks

    NASA Astrophysics Data System (ADS)

    Bonneau, Joseph; Preibusch, Sören

    We have conducted the first thorough analysis of the market for privacy practices and policies in online social networks. From an evaluation of 45 social networking sites using 260 criteria we find that many popular assumptions regarding privacy and social networking need to be revisited when considering the entire ecosystem instead of only a handful of well-known sites. Contrary to the common perception of an oligopolistic market, we find evidence of vigorous competition for new users. Despite observing many poor security practices, there is evidence that social network providers are making efforts to implement privacy enhancing technologies with substantial diversity in the amount of privacy control offered. However, privacy is rarely used as a selling point, even then only as auxiliary, nondecisive feature. Sites also failed to promote their existing privacy controls within the site. We similarly found great diversity in the length and content of formal privacy policies, but found an opposite promotional trend: though almost all policies are not accessible to ordinary users due to obfuscating legal jargon, they conspicuously vaunt the sites' privacy practices. We conclude that the market for privacy in social networks is dysfunctional in that there is significant variation in sites' privacy controls, data collection requirements, and legal privacy policies, but this is not effectively conveyed to users. Our empirical findings motivate us to introduce the novel model of a privacy communication game, where the economically rational choice for a site operator is to make privacy control available to evade criticism from privacy fundamentalists, while hiding the privacy control interface and privacy policy to maximize sign-up numbers and encourage data sharing from the pragmatic majority of users.

  13. Privacy-Related Context Information for Ubiquitous Health

    PubMed Central

    Nykänen, Pirkko; Ruotsalainen, Pekka

    2014-01-01

    Background Ubiquitous health has been defined as a dynamic network of interconnected systems. A system is composed of one or more information systems, their stakeholders, and the environment. These systems offer health services to individuals and thus implement ubiquitous computing. Privacy is the key challenge for ubiquitous health because of autonomous processing, rich contextual metadata, lack of predefined trust among participants, and the business objectives. Additionally, regulations and policies of stakeholders may be unknown to the individual. Context-sensitive privacy policies are needed to regulate information processing. Objective Our goal was to analyze privacy-related context information and to define the corresponding components and their properties that support privacy management in ubiquitous health. These properties should describe the privacy issues of information processing. With components and their properties, individuals can define context-aware privacy policies and set their privacy preferences that can change in different information-processing situations. Methods Scenarios and user stories are used to analyze typical activities in ubiquitous health to identify main actors, goals, tasks, and stakeholders. Context arises from an activity and, therefore, we can determine different situations, services, and systems to identify properties for privacy-related context information in information-processing situations. Results Privacy-related context information components are situation, environment, individual, information technology system, service, and stakeholder. Combining our analyses and previously identified characteristics of ubiquitous health, more detailed properties for the components are defined. Properties define explicitly what context information for different components is needed to create context-aware privacy policies that can control, limit, and constrain information processing. With properties, we can define, for example, how

  14. International Policies on Sharing Genomic Research Results with Relatives: Approaches to Balancing Privacy with Access.

    PubMed

    Branum, Rebecca; Wolf, Susan M

    2015-01-01

    Returning genetic research results to relatives raises complex issues. In order to inform the U.S. debate, this paper analyzes international law and policies governing the sharing of genetic research results with relatives and identifies key themes and lessons. The laws and policies from other countries demonstrate a range of approaches to balancing individual privacy and autonomy with family access for health benefit, offering important lessons for further development of approaches in the United States. © 2015 American Society of Law, Medicine & Ethics, Inc.

  15. Digital Privacy: Toward a New Politics and Discursive Practice.

    ERIC Educational Resources Information Center

    Doty, Philip

    2001-01-01

    Discussion of privacy focuses on digital environments and a more inclusive understanding of privacy. Highlights include legal and policy conceptions; legislation protecting privacy; relevant Supreme Court cases; torts and privacy; European and other efforts; surveillance and social control; information entrepreneurialism; Jurgen Habermas; free…

  16. 12 CFR 332.2 - Model privacy form and examples.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 12 Banks and Banking 5 2012-01-01 2012-01-01 false Model privacy form and examples. 332.2 Section... POLICY PRIVACY OF CONSUMER FINANCIAL INFORMATION § 332.2 Model privacy form and examples. (a) Model privacy form. Use of the model privacy form in appendix A of this part, consistent with the instructions...

  17. 12 CFR 332.2 - Model privacy form and examples.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 12 Banks and Banking 5 2014-01-01 2014-01-01 false Model privacy form and examples. 332.2 Section... POLICY PRIVACY OF CONSUMER FINANCIAL INFORMATION § 332.2 Model privacy form and examples. (a) Model privacy form. Use of the model privacy form in appendix A of this part, consistent with the instructions...

  18. 12 CFR 332.2 - Model privacy form and examples.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 12 Banks and Banking 4 2011-01-01 2011-01-01 false Model privacy form and examples. 332.2 Section... POLICY PRIVACY OF CONSUMER FINANCIAL INFORMATION § 332.2 Model privacy form and examples. (a) Model privacy form. Use of the model privacy form in Appendix A of this part, consistent with the instructions...

  19. 12 CFR 332.2 - Model privacy form and examples.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 12 Banks and Banking 5 2013-01-01 2013-01-01 false Model privacy form and examples. 332.2 Section... POLICY PRIVACY OF CONSUMER FINANCIAL INFORMATION § 332.2 Model privacy form and examples. (a) Model privacy form. Use of the model privacy form in appendix A of this part, consistent with the instructions...

  20. 12 CFR 332.2 - Model privacy form and examples.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 12 Banks and Banking 4 2010-01-01 2010-01-01 false Model privacy form and examples. 332.2 Section... POLICY PRIVACY OF CONSUMER FINANCIAL INFORMATION § 332.2 Model privacy form and examples. (a) Model privacy form. Use of the model privacy form in Appendix A of this part, consistent with the instructions...

  1. 16 CFR 313.4 - Initial privacy notice to consumers required.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 16 Commercial Practices 1 2014-01-01 2014-01-01 false Initial privacy notice to consumers required... CONGRESS PRIVACY OF CONSUMER FINANCIAL INFORMATION Privacy and Opt Out Notices § 313.4 Initial privacy... notice that accurately reflects your privacy policies and practices to: (1) Customer. An individual who...

  2. 16 CFR 313.5 - Annual privacy notice to customers required.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 16 Commercial Practices 1 2011-01-01 2011-01-01 false Annual privacy notice to customers required... CONGRESS PRIVACY OF CONSUMER FINANCIAL INFORMATION Privacy and Opt Out Notices § 313.5 Annual privacy... customers that accurately reflects your privacy policies and practices not less than annually during the...

  3. 16 CFR 313.5 - Annual privacy notice to customers required.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 16 Commercial Practices 1 2012-01-01 2012-01-01 false Annual privacy notice to customers required... CONGRESS PRIVACY OF CONSUMER FINANCIAL INFORMATION Privacy and Opt Out Notices § 313.5 Annual privacy... customers that accurately reflects your privacy policies and practices not less than annually during the...

  4. 17 CFR 160.4 - Initial privacy notice to consumers required.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 17 Commodity and Securities Exchanges 1 2011-04-01 2011-04-01 false Initial privacy notice to... COMMISSION PRIVACY OF CONSUMER FINANCIAL INFORMATION Privacy and Opt Out Notices § 160.4 Initial privacy... notice that accurately reflects your privacy policies and practices to: (1) Customer. An individual who...

  5. 17 CFR 160.5 - Annual privacy notice to customers required.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 17 Commodity and Securities Exchanges 1 2011-04-01 2011-04-01 false Annual privacy notice to... COMMISSION PRIVACY OF CONSUMER FINANCIAL INFORMATION Privacy and Opt Out Notices § 160.5 Annual privacy... customers that accurately reflects your privacy policies and practices not less than annually during the...

  6. 16 CFR 313.5 - Annual privacy notice to customers required.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 16 Commercial Practices 1 2014-01-01 2014-01-01 false Annual privacy notice to customers required... CONGRESS PRIVACY OF CONSUMER FINANCIAL INFORMATION Privacy and Opt Out Notices § 313.5 Annual privacy... customers that accurately reflects your privacy policies and practices not less than annually during the...

  7. 16 CFR 313.4 - Initial privacy notice to consumers required.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 16 Commercial Practices 1 2011-01-01 2011-01-01 false Initial privacy notice to consumers required... CONGRESS PRIVACY OF CONSUMER FINANCIAL INFORMATION Privacy and Opt Out Notices § 313.4 Initial privacy... notice that accurately reflects your privacy policies and practices to: (1) Customer. An individual who...

  8. 16 CFR 313.4 - Initial privacy notice to consumers required.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 16 Commercial Practices 1 2012-01-01 2012-01-01 false Initial privacy notice to consumers required... CONGRESS PRIVACY OF CONSUMER FINANCIAL INFORMATION Privacy and Opt Out Notices § 313.4 Initial privacy... notice that accurately reflects your privacy policies and practices to: (1) Customer. An individual who...

  9. Evaluating Common Privacy Vulnerabilities in Internet Service Providers

    NASA Astrophysics Data System (ADS)

    Kotzanikolaou, Panayiotis; Maniatis, Sotirios; Nikolouzou, Eugenia; Stathopoulos, Vassilios

    Privacy in electronic communications receives increased attention in both research and industry forums, stemming from both the users' needs and from legal and regulatory requirements in national or international context. Privacy in internet-based communications heavily relies on the level of security of the Internet Service Providers (ISPs), as well as on the security awareness of the end users. This paper discusses the role of the ISP in the privacy of the communications. Based on real security audits performed in national-wide ISPs, we illustrate privacy-specific threats and vulnerabilities that many providers fail to address when implementing their security policies. We subsequently provide and discuss specific security measures that the ISPs can implement, in order to fine-tune their security policies in the context of privacy protection.

  10. 12 CFR 716.5 - Annual privacy notice to members required.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 12 Banks and Banking 6 2010-01-01 2010-01-01 false Annual privacy notice to members required. 716... UNIONS PRIVACY OF CONSUMER FINANCIAL INFORMATION Privacy and Opt Out Notices § 716.5 Annual privacy... members that accurately reflects your privacy policies and practices not less than annually during the...

  11. Altered states: state health privacy laws and the impact of the Federal Health Privacy Rule.

    PubMed

    Pritts, Joy L

    2002-01-01

    Although the Federal Health Privacy Rule has evened out some of the inconsistencies between states' health privacy laws, gaps in protection still remain. Furthermore, the Federal Rule contains some lax standards for the disclosure of health information. State laws can play a vital role in filling these gaps and strengthening the protections afforded health information. By enacting legislation that has higher privacy-protective standards than the Federal Health Privacy Rule, states can play three important roles. First, because they can directly regulate entities that are beyond HHS's mandate, states can afford their citizens a broader degree of privacy protection than the Federal Health Privacy Rule. Second, by having state health privacy laws, states can enforce privacy protections at the local level. Finally, action by the states can positively influence health privacy policies at the federal level by raising the standard as to what constitutes sufficient privacy protection. High privacy protections imposed by states may serve as the standard for comprehensive federal legislation, if and when Congress reconsiders the issue. So far, states' reactions to the Federal Privacy Rule have been mixed. Only time will tell whether states will assume the mantle of leadership on health privacy or relinquish their role as the primary protectors of health information.

  12. Privacy and social implications of distinct sensing approaches to implementing smart homes for older adults.

    PubMed

    Demiris, George

    2009-01-01

    Two distinct approaches to smart home design, namely Distributed Direct Sensing (DDS) and Infrastructure Mediated Sensing (IMS), have distinguishing features and implications resulting from their implementation. These two distinct smart home approaches have not been directly compared pertaining to their technical performance or their acceptance by the end users. It is also unclear what the perceived privacy and obtrusiveness concerns are when it comes to the implementation of these two different approaches in homes. The study presented here aimed to evaluate acceptance of these two sensing approaches by older adults and assess the perceived privacy and obtrusiveness concerns and ultimately define their social implications.

  13. Globalisation, transnational policies and adult education

    NASA Astrophysics Data System (ADS)

    Milana, Marcella

    2012-12-01

    Globalisation, transnational policies and adult education - This paper examines policy documents produced by the United Nations Educational, Scientific and Cultural Organization (UNESCO) and the European Union (EU) in the field of adult education and learning. Both these entities address adult education as an explicit object of policy. This paper investigates how globalisation processes are constructed as policy problems when these transnational political agents propose adult education as a response. The author's main argument is that while UNESCO presents the provision of adult education as a means for governments worldwide to overcome disadvantages experienced by their own citizenry, the EU institutionalises learning experiences as a means for governments to sustain regional economic growth and political expansion. After reviewing the literature on globalisation to elucidate the theories that inform current understanding of contemporary economic, political, cultural and ecological changes as political problems, she presents the conceptual and methodological framework of her analysis. The author then examines the active role played by UNESCO and the EU in promoting adult education as a policy objective at transnational level, and unpacks the specific problem "representations" that are substantiated by these organisations. She argues that UNESCO and EU processes assign specific values and meanings to globalisation, and that these reflect a limited understanding of the complexity of globalisation. Finally, she considers two of the effects produced by these problem representations.

  14. Regulation, Privacy and Security: Chairman's Opening Remarks

    PubMed Central

    Gabrieli, E.R.

    1979-01-01

    Medical privacy is a keystone of a free democratic society. To conserve the right of the patient to medical privacy, computerization of the medical data must be regulated. This paper enumerates some steps to be taken urgently for the protection of computerized sensitive medical data. A computer-oriented medical lexicon is urgently needed for accurate coding. Health industry standards should be drafted. The goals of various data centers must be sharply defined to avoid conflicts of interest. Medical privacy should be studied further, and medical data centers should consider cost-effectiveness. State boards for medical privacy should be created to monitor data security procedures. There is a need for purposeful decentralization. A national medical information policy should be drafted, and a national clinical information board should implement the nation's medical information policy.

  15. 12 CFR 332.9 - Delivering privacy and opt out notices.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 12 Banks and Banking 5 2013-01-01 2013-01-01 false Delivering privacy and opt out notices. 332.9... GENERAL POLICY PRIVACY OF CONSUMER FINANCIAL INFORMATION Privacy and Opt Out Notices § 332.9 Delivering privacy and opt out notices. (a) How to provide notices. You must provide any privacy notices and opt out...

  16. Privacy and Biobanking in China: A Case of Policy in Transition.

    PubMed

    Chen, Haidan; Chan, Benny; Joly, Yann

    2015-01-01

    Disease-based biobanks have operated in hospitals and research institutes in China for decades, and China has recently embarked on a plan to establish further biobank networks with the aim of promoting data sharing among the existing biobanks. Although the Chinese Constitution has only recently begun to recognize individual privacy as a distinct and independent constitutional right, biobanking in China has been loosely regulated under a patchwork of sometimes overlapping laws (such as the Interim Measures for the Administration of Human Genetic Resources) and regulatory instruments, as well as and the policies of individual biobanks and networks of biobanks (such as the Shanghai Biobank Network Guidelines). A Draft Ordinance on Human Genetics Resources is currently being developed that will deal in more detail than previous laws with issues such as management measures, legal liability, and punishment for violations. International data sharing will be tightly regulated under this new law, and individual biobanks' policies such as the Shanghai Guidelines may choose to regulate such sharing even more. In contrast with national regulatory instruments, the Shanghai Guidelines also contain detailed de-identification policies, and explicitly endorse broad consent. © 2015 American Society of Law, Medicine & Ethics, Inc.

  17. Users or Students? Privacy in University MOOCS.

    PubMed

    Jones, Meg Leta; Regner, Lucas

    2016-10-01

    Two terms, student privacy and Massive Open Online Courses, have received a significant amount of attention recently. Both represent interesting sites of change in entrenched structures, one educational and one legal. MOOCs represent something college courses have never been able to provide: universal access. Universities not wanting to miss the MOOC wave have started to build MOOC courses and integrate them into the university system in various ways. However, the design and scale of university MOOCs create tension for privacy laws intended to regulate information practices exercised by educational institutions. Are MOOCs part of the educational institutions these laws and policies aim to regulate? Are MOOC users students whose data are protected by aforementioned laws and policies? Many university researchers and faculty members are asked to participate as designers and instructors in MOOCs but may not know how to approach the issues proposed. While recent scholarship has addressed the disruptive nature of MOOCs, student privacy generally, and data privacy in the K-12 system, we provide an in-depth description and analysis of the MOOC phenomenon and the privacy laws and policies that guide and regulate educational institutions today. We offer privacy case studies of three major MOOC providers active in the market today to reveal inconsistencies among MOOC platform and the level and type of legal uncertainty surrounding them. Finally, we provide a list of organizational questions to pose internally to navigate the uncertainty presented to university MOOC teams.

  18. Privacy Management and Networked PPD Systems - Challenges Solutions.

    PubMed

    Ruotsalainen, Pekka; Pharow, Peter; Petersen, Francoise

    2015-01-01

    Modern personal portable health devices (PPDs) become increasingly part of a larger, inhomogeneous information system. Information collected by sensors are stored and processed in global clouds. Services are often free of charge, but at the same time service providers' business model is based on the disclosure of users' intimate health information. Health data processed in PPD networks is not regulated by health care specific legislation. In PPD networks, there is no guarantee that stakeholders share same ethical principles with the user. Often service providers have own security and privacy policies and they rarely offer to the user possibilities to define own, or adapt existing privacy policies. This all raises huge ethical and privacy concerns. In this paper, the authors have analyzed privacy challenges in PPD networks from users' viewpoint using system modeling method and propose the principle "Personal Health Data under Personal Control" must generally be accepted at global level. Among possible implementation of this principle, the authors propose encryption, computer understandable privacy policies, and privacy labels or trust based privacy management methods. The latter can be realized using infrastructural trust calculation and monitoring service. A first step is to require the protection of personal health information and the principle proposed being internationally mandatory. This requires both regulatory and standardization activities, and the availability of open and certified software application which all service providers can implement. One of those applications should be the independent Trust verifier.

  19. 12 CFR 332.6 - Information to be included in privacy notices.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 12 Banks and Banking 5 2013-01-01 2013-01-01 false Information to be included in privacy notices... OF GENERAL POLICY PRIVACY OF CONSUMER FINANCIAL INFORMATION Privacy and Opt Out Notices § 332.6 Information to be included in privacy notices. (a) General rule. The initial, annual and revised privacy...

  20. 75 FR 21226 - Information Privacy and Innovation in the Internet Economy

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-04-23

    ...The Department of Commerce's Internet Policy Task Force is conducting a comprehensive review of the nexus between privacy policy and innovation in the Internet economy. The Department seeks public comment from all Internet stakeholders, including the commercial, academic and civil society sectors, on the impact of current privacy laws in the United States and around the world on the pace of innovation in the information economy. The Department also seeks to understand whether current privacy laws serve consumer interests and fundamental democratic values. After analyzing the comments responding to this Notice, the Department intends to issue a report, which will contribute to the Administration's domestic policy and international engagement in the area of Internet privacy.

  1. Quick Guide to Health Literacy and Older Adults

    MedlinePlus

    ... starter tips Resources Additional Resources Cultural Competence Health Literacy Older Adults Plain Language Visual Impairment Web sites Content last updated: October 30, 2007 skip to navigation | skip to content ACCESSIBILITY | FREEDOM OF INFORMATION ACT | PRIVACY POLICY | CONTACT US Office of Disease ...

  2. 12 CFR 332.5 - Annual privacy notice to customers required.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 12 Banks and Banking 5 2013-01-01 2013-01-01 false Annual privacy notice to customers required... OF GENERAL POLICY PRIVACY OF CONSUMER FINANCIAL INFORMATION Privacy and Opt Out Notices § 332.5 Annual privacy notice to customers required. (a)(1) General rule. You must provide a clear and...

  3. 12 CFR 332.4 - Initial privacy notice to consumers required.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 12 Banks and Banking 5 2013-01-01 2013-01-01 false Initial privacy notice to consumers required... OF GENERAL POLICY PRIVACY OF CONSUMER FINANCIAL INFORMATION Privacy and Opt Out Notices § 332.4 Initial privacy notice to consumers required. (a) Initial notice requirement. You must provide a clear and...

  4. 32 CFR 323.3 - Policy.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 32 National Defense 2 2013-07-01 2013-07-01 false Policy. 323.3 Section 323.3 National Defense Department of Defense (Continued) OFFICE OF THE SECRETARY OF DEFENSE (CONTINUED) PRIVACY PROGRAM DEFENSE LOGISTICS AGENCY PRIVACY PROGRAM § 323.3 Policy. DLA adopts and supplements the DoD Privacy Program policy...

  5. 32 CFR 323.3 - Policy.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 32 National Defense 2 2014-07-01 2014-07-01 false Policy. 323.3 Section 323.3 National Defense Department of Defense (Continued) OFFICE OF THE SECRETARY OF DEFENSE (CONTINUED) PRIVACY PROGRAM DEFENSE LOGISTICS AGENCY PRIVACY PROGRAM § 323.3 Policy. DLA adopts and supplements the DoD Privacy Program policy...

  6. "Everybody Knows Your Business"/"Todo Mundo Se Da Cuenta": Immigrant Adults' Construction of Privacy, Risk, and Vulnerability in Online Platforms

    ERIC Educational Resources Information Center

    Noguerón-Liu, Silvia

    2017-01-01

    This article examines immigrant adults' understandings of privacy, risk, and vulnerability in digital literacy practices that involve visual media. Although the benefits of digital media production have been explored with immigrant youths, the perspectives of adults remain unexplored. Informed by critical and transnational perspectives to digital…

  7. Trust information-based privacy architecture for ubiquitous health.

    PubMed

    Ruotsalainen, Pekka Sakari; Blobel, Bernd; Seppälä, Antto; Nykänen, Pirkko

    2013-10-08

    Ubiquitous health is defined as a dynamic network of interconnected systems that offers health services independent of time and location to a data subject (DS). The network takes place in open and unsecure information space. It is created and managed by the DS who sets rules that regulate the way personal health information is collected and used. Compared to health care, it is impossible in ubiquitous health to assume the existence of a priori trust between the DS and service providers and to produce privacy using static security services. In ubiquitous health features, business goals and regulations systems followed often remain unknown. Furthermore, health care-specific regulations do not rule the ways health data is processed and shared. To be successful, ubiquitous health requires novel privacy architecture. The goal of this study was to develop a privacy management architecture that helps the DS to create and dynamically manage the network and to maintain information privacy. The architecture should enable the DS to dynamically define service and system-specific rules that regulate the way subject data is processed. The architecture should provide to the DS reliable trust information about systems and assist in the formulation of privacy policies. Furthermore, the architecture should give feedback upon how systems follow the policies of DS and offer protection against privacy and trust threats existing in ubiquitous environments. A sequential method that combines methodologies used in system theory, systems engineering, requirement analysis, and system design was used in the study. In the first phase, principles, trust and privacy models, and viewpoints were selected. Thereafter, functional requirements and services were developed on the basis of a careful analysis of existing research published in journals and conference proceedings. Based on principles, models, and requirements, architectural components and their interconnections were developed using system

  8. Trust Information-Based Privacy Architecture for Ubiquitous Health

    PubMed Central

    2013-01-01

    Background Ubiquitous health is defined as a dynamic network of interconnected systems that offers health services independent of time and location to a data subject (DS). The network takes place in open and unsecure information space. It is created and managed by the DS who sets rules that regulate the way personal health information is collected and used. Compared to health care, it is impossible in ubiquitous health to assume the existence of a priori trust between the DS and service providers and to produce privacy using static security services. In ubiquitous health features, business goals and regulations systems followed often remain unknown. Furthermore, health care-specific regulations do not rule the ways health data is processed and shared. To be successful, ubiquitous health requires novel privacy architecture. Objective The goal of this study was to develop a privacy management architecture that helps the DS to create and dynamically manage the network and to maintain information privacy. The architecture should enable the DS to dynamically define service and system-specific rules that regulate the way subject data is processed. The architecture should provide to the DS reliable trust information about systems and assist in the formulation of privacy policies. Furthermore, the architecture should give feedback upon how systems follow the policies of DS and offer protection against privacy and trust threats existing in ubiquitous environments. Methods A sequential method that combines methodologies used in system theory, systems engineering, requirement analysis, and system design was used in the study. In the first phase, principles, trust and privacy models, and viewpoints were selected. Thereafter, functional requirements and services were developed on the basis of a careful analysis of existing research published in journals and conference proceedings. Based on principles, models, and requirements, architectural components and their interconnections

  9. The Regulatory Framework for Privacy and Security

    NASA Astrophysics Data System (ADS)

    Hiller, Janine S.

    The internet enables the easy collection of massive amounts of personally identifiable information. Unregulated data collection causes distrust and conflicts with widely accepted principles of privacy. The regulatory framework in the United States for ensuring privacy and security in the online environment consists of federal, state, and self-regulatory elements. New laws have been passed to address technological and internet practices that conflict with privacy protecting policies. The United States and the European Union approaches to privacy differ significantly, and the global internet environment will likely cause regulators to face the challenge of balancing privacy interests with data collection for many years to come.

  10. Privacy in the Genomic Era

    PubMed Central

    NAVEED, MUHAMMAD; AYDAY, ERMAN; CLAYTON, ELLEN W.; FELLAY, JACQUES; GUNTER, CARL A.; HUBAUX, JEAN-PIERRE; MALIN, BRADLEY A.; WANG, XIAOFENG

    2015-01-01

    Genome sequencing technology has advanced at a rapid pace and it is now possible to generate highly-detailed genotypes inexpensively. The collection and analysis of such data has the potential to support various applications, including personalized medical services. While the benefits of the genomics revolution are trumpeted by the biomedical community, the increased availability of such data has major implications for personal privacy; notably because the genome has certain essential features, which include (but are not limited to) (i) an association with traits and certain diseases, (ii) identification capability (e.g., forensics), and (iii) revelation of family relationships. Moreover, direct-to-consumer DNA testing increases the likelihood that genome data will be made available in less regulated environments, such as the Internet and for-profit companies. The problem of genome data privacy thus resides at the crossroads of computer science, medicine, and public policy. While the computer scientists have addressed data privacy for various data types, there has been less attention dedicated to genomic data. Thus, the goal of this paper is to provide a systematization of knowledge for the computer science community. In doing so, we address some of the (sometimes erroneous) beliefs of this field and we report on a survey we conducted about genome data privacy with biomedical specialists. Then, after characterizing the genome privacy problem, we review the state-of-the-art regarding privacy attacks on genomic data and strategies for mitigating such attacks, as well as contextualizing these attacks from the perspective of medicine and public policy. This paper concludes with an enumeration of the challenges for genome data privacy and presents a framework to systematize the analysis of threats and the design of countermeasures as the field moves forward. PMID:26640318

  11. Privacy in the Genomic Era.

    PubMed

    Naveed, Muhammad; Ayday, Erman; Clayton, Ellen W; Fellay, Jacques; Gunter, Carl A; Hubaux, Jean-Pierre; Malin, Bradley A; Wang, Xiaofeng

    2015-09-01

    Genome sequencing technology has advanced at a rapid pace and it is now possible to generate highly-detailed genotypes inexpensively. The collection and analysis of such data has the potential to support various applications, including personalized medical services. While the benefits of the genomics revolution are trumpeted by the biomedical community, the increased availability of such data has major implications for personal privacy; notably because the genome has certain essential features, which include (but are not limited to) (i) an association with traits and certain diseases, (ii) identification capability (e.g., forensics), and (iii) revelation of family relationships. Moreover, direct-to-consumer DNA testing increases the likelihood that genome data will be made available in less regulated environments, such as the Internet and for-profit companies. The problem of genome data privacy thus resides at the crossroads of computer science, medicine, and public policy. While the computer scientists have addressed data privacy for various data types, there has been less attention dedicated to genomic data. Thus, the goal of this paper is to provide a systematization of knowledge for the computer science community. In doing so, we address some of the (sometimes erroneous) beliefs of this field and we report on a survey we conducted about genome data privacy with biomedical specialists. Then, after characterizing the genome privacy problem, we review the state-of-the-art regarding privacy attacks on genomic data and strategies for mitigating such attacks, as well as contextualizing these attacks from the perspective of medicine and public policy. This paper concludes with an enumeration of the challenges for genome data privacy and presents a framework to systematize the analysis of threats and the design of countermeasures as the field moves forward.

  12. 20 CFR 401.30 - Privacy Act and other responsibilities.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... in carrying out the privacy and disclosure policy. (e) Senior Agency Official for Privacy. The Senior...-date and, where additional or revised procedures may be called for, working with the relevant agency...

  13. 75 FR 32372 - Information Privacy and Innovation in the Internet Economy

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-06-08

    ... initiative designed to gather public input and review the nexus between privacy policy and innovation in the... Internet. \\1\\ Commerce Secretary Locke Announces Public Review of Privacy Policy and Innovation in the... flexibility needed to foster innovation in the information economy; (2) the public confidence necessary for...

  14. Privacy Preserving Nearest Neighbor Search

    NASA Astrophysics Data System (ADS)

    Shaneck, Mark; Kim, Yongdae; Kumar, Vipin

    Data mining is frequently obstructed by privacy concerns. In many cases data is distributed, and bringing the data together in one place for analysis is not possible due to privacy laws (e.g. HIPAA) or policies. Privacy preserving data mining techniques have been developed to address this issue by providing mechanisms to mine the data while giving certain privacy guarantees. In this chapter we address the issue of privacy preserving nearest neighbor search, which forms the kernel of many data mining applications. To this end, we present a novel algorithm based on secure multiparty computation primitives to compute the nearest neighbors of records in horizontally distributed data. We show how this algorithm can be used in three important data mining algorithms, namely LOF outlier detection, SNN clustering, and kNN classification. We prove the security of these algorithms under the semi-honest adversarial model, and describe methods that can be used to optimize their performance. Keywords: Privacy Preserving Data Mining, Nearest Neighbor Search, Outlier Detection, Clustering, Classification, Secure Multiparty Computation

  15. Information Parents Must Know about Online Privacy.

    ERIC Educational Resources Information Center

    Markell, Ginny

    2000-01-01

    Presents four tips to help parents monitor whether website operators are complying with the 1988 Children's Online Privacy Protection Act: look for privacy policies on children's websites; determine if they ask for parental consent to collect personal information; regularly monitor information being sent to children; and determine if web operators…

  16. Privacy protection for patients with substance use problems.

    PubMed

    Hu, Lianne Lian; Sparenborg, Steven; Tai, Betty

    2011-01-01

    Many Americans with substance use problems will have opportunities to receive coordinated health care through the integration of primary care and specialty care for substance use disorders under the Patient Protection and Affordable Care Act of 2010. Sharing of patient health records among care providers is essential to realize the benefits of electronic health records. Health information exchange through meaningful use of electronic health records can improve health care safety, quality, and efficiency. Implementation of electronic health records and health information exchange presents great opportunities for health care integration, but also makes patient privacy potentially vulnerable. Privacy issues are paramount for patients with substance use problems. This paper discusses major differences between two federal privacy laws associated with health care for substance use disorders, identifies health care problems created by privacy policies, and describes potential solutions to these problems through technology innovation and policy improvement.

  17. Privacy protection for patients with substance use problems

    PubMed Central

    Hu, Lianne Lian; Sparenborg, Steven; Tai, Betty

    2011-01-01

    Many Americans with substance use problems will have opportunities to receive coordinated health care through the integration of primary care and specialty care for substance use disorders under the Patient Protection and Affordable Care Act of 2010. Sharing of patient health records among care providers is essential to realize the benefits of electronic health records. Health information exchange through meaningful use of electronic health records can improve health care safety, quality, and efficiency. Implementation of electronic health records and health information exchange presents great opportunities for health care integration, but also makes patient privacy potentially vulnerable. Privacy issues are paramount for patients with substance use problems. This paper discusses major differences between two federal privacy laws associated with health care for substance use disorders, identifies health care problems created by privacy policies, and describes potential solutions to these problems through technology innovation and policy improvement. PMID:24474860

  18. Internet Addiction of Young Greek Adults: Psychological Aspects and Information Privacy.

    PubMed

    Grammenos, P; Syrengela, N A; Magkos, E; Tsohou, A

    2017-01-01

    The main goal of this study is to examine the Internet addiction status of Greek young adults, aged from 18 to 25, using Young's Internet Addiction Test (IAT) and self-administered questionnaires. In addition this paper assesses the psychological traits of addicted persons per addiction category, using the big five factor model tool to study the user's personality and analyze the components that lead a person to become Internet addicted. Furthermore, we found an association between addicted people and the five factors from the Big Five Factor Model; i.e., extraversion, agreeableness, conscientiousness, neuroticism, openness to experience. Moreover, this paper discusses information privacy awareness issues related to Internet Addiction treatment.

  19. Debating Global Polity, Policy Crossing, and Adult Education

    ERIC Educational Resources Information Center

    Milana, Marcella

    2015-01-01

    This article revisits the concept of "global polity" as a useful conceptual tool for studying public policy development in adult education. First, it describes the relations between polity, policy, and praxis and how these are addressed in adult education research. Then, it reviews how policy is conceptualized in terms of material and…

  20. HIPAA compliance and patient privacy protection.

    PubMed

    Grandison, Tyrone; Bhatti, Rafae

    2010-01-01

    Recent prosecution of violations of the Health Insurance Portability and Accountability Act (HIPAA), and the amendments currently in process to strengthen the Act of 1996, has led many companies to take serious notice of the measures they must take to be a compliance. A company's privacy policy states the business' privacy practices and embodies the firm's commitments to its users and is normally mandatory step in reaching legislative compliance. in the face of this, the patient has to decipher if the company's privacy practices are congruent with their thoughts on the level of privacy protection they should be receiving. This is the core of our investigation. In this paper, we explore the question "Is a healthcare entity's compliance with regulation sufficient to provide the patient with adequate privacy protection?" in the context of the United States of America.

  1. Privacy and senior willingness to adopt smart home information technology in residential care facilities.

    PubMed

    Courtney, K L

    2008-01-01

    With large predicted increases of the older adult (65 years and older) population, researchers have been exploring the use of smart home information technologies (IT) in residential care (RC) facilities to enhance resident quality of life and safety. Older adults' perceptions of privacy can inhibit their acceptance and subsequent adoption of smart home IT. This qualitative study, guided by principles of grounded theory research, investigated the relationship between privacy, living environment and willingness of older adults living in residential care facilities to adopt smart home IT through focus groups and individual interviews. The findings from this study indicate that privacy can be a barrier for older adults' adoption of smart home IT; however their own perception of their need for the technology may override their privacy concerns. Privacy concerns, as a barrier to technology adoption, can be influenced by both individual-level and community-level factors. Further exploration of the factors influencing older adults' perceptions of smart home IT need is necessary.

  2. 32 CFR 311.4 - Policy.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... Department of Defense (Continued) OFFICE OF THE SECRETARY OF DEFENSE (CONTINUED) PRIVACY PROGRAM OFFICE OF THE SECRETARY OF DEFENSE AND JOINT STAFF PRIVACY PROGRAM § 311.4 Policy. It is DoD policy, in..., United States Code, commonly known and hereafter referred to as the “Privacy Act” and Appendix I of...

  3. Privacy and human behavior in the age of information.

    PubMed

    Acquisti, Alessandro; Brandimarte, Laura; Loewenstein, George

    2015-01-30

    This Review summarizes and draws connections between diverse streams of empirical research on privacy behavior. We use three themes to connect insights from social and behavioral sciences: people's uncertainty about the consequences of privacy-related behaviors and their own preferences over those consequences; the context-dependence of people's concern, or lack thereof, about privacy; and the degree to which privacy concerns are malleable—manipulable by commercial and governmental interests. Organizing our discussion by these themes, we offer observations concerning the role of public policy in the protection of privacy in the information age. Copyright © 2015, American Association for the Advancement of Science.

  4. Health information: reconciling personal privacy with the public good of human health.

    PubMed

    Gostin, L O

    2001-01-01

    The success of the health care system depends on the accuracy, correctness and trustworthiness of the information, and the privacy rights of individuals to control the disclosure of personal information. A national policy on health informational privacy should be guided by ethical principles that respect individual autonomy while recognizing the important collective interests in the use of health information. At present there are no adequate laws or constitutional principles to help guide a rational privacy policy. The laws are scattered and fragmented across the states. Constitutional law is highly general, without important specific safeguards. Finally, a case study is provided showing the important trade-offs that exist between public health and privacy. For a model public health law, see www.critpath.org/msphpa/privacy.

  5. Willingness of older adults to share data and privacy concerns after exposure to unobtrusive in-home monitoring.

    PubMed

    Boise, Linda; Wild, Katherine; Mattek, Nora; Ruhl, Mary; Dodge, Hiroko H; Kaye, Jeffrey

    2013-01-01

    Older adult participants in the Intelligent Systems for Assessment of Aging Changes study (ISAAC) carried out by the Oregon Center for Aging and Technology (ORCATECH) were surveyed regarding their attitudes about unobtrusive home monitoring and computer use at baseline and after one year (n=119). The survey was part of a longitudinal study using in-home sensor technology to detect cognitive changes and other health problems. Our primary objective was to measure willingness to share health or activity data with one's doctor or family members and concerns about privacy or security of monitoring over one year of study participation. Differences in attitudes of participants with Mild Cognitive Impairment (MCI) compared to those with normal cognition were also examined. A high proportion (over 72%) of participants reported acceptance of in-home and computer monitoring and willingness to have data shared with their doctor or family members. However, a majority (60%) reported concerns related to privacy or security; these concerns increased after one year of participation. Few differences between participants with MCI and those with normal cognition were identified. Findings suggest that involvement in this unobtrusive in-home monitoring study may have raised awareness about the potential privacy risks of technology. Still, results show high acceptance, stable over time, of sharing information from monitoring systems with family members and doctors. Our findings have important implications for the deployment of technologies among older adults in research studies as well as in the general community.

  6. Footprints near the Surf: Individual Privacy Decisions in Online Contexts

    ERIC Educational Resources Information Center

    McDonald, Aleecia M.

    2010-01-01

    As more people seek the benefits of going online, more people are exposed to privacy risks from their time online. With a largely unregulated Internet, self-determination about privacy risks must be feasible for people from all walks of life. Yet in many cases decisions are either not obvious or not accessible. As one example, privacy policies are…

  7. Privacy and security in teleradiology.

    PubMed

    Ruotsalainen, Pekka

    2010-01-01

    Teleradiology is probably the most successful eHealth service available today. Its business model is based on the remote transmission of radiological images (e.g. X-ray and CT-images) over electronic networks, and on the interpretation of the transmitted images for diagnostic purpose. Two basic service models are commonly used teleradiology today. The most common approach is based on the message paradigm (off-line model), but more developed teleradiology systems are based on the interactive use of PACS/RIS systems. Modern teleradiology is also more and more cross-organisational or even cross-border service between service providers having different jurisdictions and security policies. This paper defines the requirements needed to make different teleradiology models trusted. Those requirements include a common security policy that covers all partners and entities, common security and privacy protection principles and requirements, controlled contracts between partners, and the use of security controls and tools that supporting the common security policy. The security and privacy protection of any teleradiology system must be planned in advance, and the necessary security and privacy enhancing tools should be selected (e.g. strong authentication, data encryption, non-repudiation services and audit-logs) based on the risk analysis and requirements set by the legislation. In any case the teleradiology system should fulfil ethical and regulatory requirements. Certification of the whole teleradiology service system including security and privacy is also proposed. In the future, teleradiology services will be an integrated part of pervasive eHealth. Security requirements for this environment including dynamic and context aware security services are also discussed in this paper. Copyright (c) 2009 Elsevier Ireland Ltd. All rights reserved.

  8. 78 FR 32256 - Privacy Act of 1974; Report of an Altered CMS System of Records Notice

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-05-29

    ... tax payers or tax filers, and spouses and parents of applicants. Due to the potential impact of the... Privacy Officer, Division of Privacy Policy, Privacy Policy and Compliance Group, Office of E-Health... Health Care and Education Reconciliation Act of 2010 (Pub. L. 111-152) (collectively referred to as the...

  9. Privacy Policy

    MedlinePlus

    ... a database that is regularly purged. Third party contractors may have access to this information in order ... a response to your question or comment. These contractors are held to strict policies to safeguard the ...

  10. Policy to Performance Toolkit: Transitioning Adults to Opportunity

    ERIC Educational Resources Information Center

    Alamprese, Judith A.; Limardo, Chrys

    2012-01-01

    The "Policy to Performance Toolkit" is designed to provide state adult education staff and key stakeholders with guidance and tools to use in developing, implementing, and monitoring state policies and their associated practices that support an effective state adult basic education (ABE) to postsecondary education and training transition…

  11. Query Monitoring and Analysis for Database Privacy - A Security Automata Model Approach.

    PubMed

    Kumar, Anand; Ligatti, Jay; Tu, Yi-Cheng

    2015-11-01

    Privacy and usage restriction issues are important when valuable data are exchanged or acquired by different organizations. Standard access control mechanisms either restrict or completely grant access to valuable data. On the other hand, data obfuscation limits the overall usability and may result in loss of total value. There are no standard policy enforcement mechanisms for data acquired through mutual and copyright agreements. In practice, many different types of policies can be enforced in protecting data privacy. Hence there is the need for an unified framework that encapsulates multiple suites of policies to protect the data. We present our vision of an architecture named security automata model (SAM) to enforce privacy-preserving policies and usage restrictions. SAM analyzes the input queries and their outputs to enforce various policies, liberating data owners from the burden of monitoring data access. SAM allows administrators to specify various policies and enforces them to monitor queries and control the data access. Our goal is to address the problems of data usage control and protection through privacy policies that can be defined, enforced, and integrated with the existing access control mechanisms using SAM. In this paper, we lay out the theoretical foundation of SAM, which is based on an automata named Mandatory Result Automata. We also discuss the major challenges of implementing SAM in a real-world database environment as well as ideas to meet such challenges.

  12. 32 CFR 323.2 - Policy.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 32 National Defense 2 2010-07-01 2010-07-01 false Policy. 323.2 Section 323.2 National Defense Department of Defense (Continued) OFFICE OF THE SECRETARY OF DEFENSE (CONTINUED) PRIVACY PROGRAM DEFENSE LOGISTICS AGENCY PRIVACY PROGRAM § 323.2 Policy. It is the policy of DLA to safeguard personal information...

  13. 32 CFR 323.2 - Policy.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 32 National Defense 2 2011-07-01 2011-07-01 false Policy. 323.2 Section 323.2 National Defense Department of Defense (Continued) OFFICE OF THE SECRETARY OF DEFENSE (CONTINUED) PRIVACY PROGRAM DEFENSE LOGISTICS AGENCY PRIVACY PROGRAM § 323.2 Policy. It is the policy of DLA to safeguard personal information...

  14. 32 CFR 323.2 - Policy.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 32 National Defense 2 2012-07-01 2012-07-01 false Policy. 323.2 Section 323.2 National Defense Department of Defense (Continued) OFFICE OF THE SECRETARY OF DEFENSE (CONTINUED) PRIVACY PROGRAM DEFENSE LOGISTICS AGENCY PRIVACY PROGRAM § 323.2 Policy. It is the policy of DLA to safeguard personal information...

  15. Adult Basic Skills: Innovations in Measurement and Policy Analysis. Series on Literacy: Research, Policy, and Practice.

    ERIC Educational Resources Information Center

    Tuijnman, Albert C., Ed.; Kirsch, Irwin S., Ed.; Wagner, Daniel A., Ed.

    This book contains 13 papers examining innovations in measuring adults' basic skills and analyzing adult literacy policy. The following papers are included: "Series Preface" (Daniel A. Wagner); "Foreword" (Torsten Husen); "Introduction" (Albert Tuijnman); "Adult Basic Skills: Policy Issues and a Research…

  16. Trust and Privacy Solutions Based on Holistic Service Requirements.

    PubMed

    Sánchez Alcón, José Antonio; López, Lourdes; Martínez, José-Fernán; Rubio Cifuentes, Gregorio

    2015-12-24

    The products and services designed for Smart Cities provide the necessary tools to improve the management of modern cities in a more efficient way. These tools need to gather citizens' information about their activity, preferences, habits, etc. opening up the possibility of tracking them. Thus, privacy and security policies must be developed in order to satisfy and manage the legislative heterogeneity surrounding the services provided and comply with the laws of the country where they are provided. This paper presents one of the possible solutions to manage this heterogeneity, bearing in mind these types of networks, such as Wireless Sensor Networks, have important resource limitations. A knowledge and ontology management system is proposed to facilitate the collaboration between the business, legal and technological areas. This will ease the implementation of adequate specific security and privacy policies for a given service. All these security and privacy policies are based on the information provided by the deployed platforms and by expert system processing.

  17. Trust and Privacy Solutions Based on Holistic Service Requirements

    PubMed Central

    Sánchez Alcón, José Antonio; López, Lourdes; Martínez, José-Fernán; Rubio Cifuentes, Gregorio

    2015-01-01

    The products and services designed for Smart Cities provide the necessary tools to improve the management of modern cities in a more efficient way. These tools need to gather citizens’ information about their activity, preferences, habits, etc. opening up the possibility of tracking them. Thus, privacy and security policies must be developed in order to satisfy and manage the legislative heterogeneity surrounding the services provided and comply with the laws of the country where they are provided. This paper presents one of the possible solutions to manage this heterogeneity, bearing in mind these types of networks, such as Wireless Sensor Networks, have important resource limitations. A knowledge and ontology management system is proposed to facilitate the collaboration between the business, legal and technological areas. This will ease the implementation of adequate specific security and privacy policies for a given service. All these security and privacy policies are based on the information provided by the deployed platforms and by expert system processing. PMID:26712752

  18. Tweens' Conceptions of Privacy Online: Implications for Educators

    ERIC Educational Resources Information Center

    Davis, Katie; James, Carrie

    2013-01-01

    There is considerable debate about young people's concern for privacy today, given their frequent use of social media to share information and other content about themselves and others. While researchers have investigated the online privacy practices of teens and emerging adults, relatively little is known about the attitudes and behaviors of…

  19. 32 CFR 316.5 - Policy.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 32 National Defense 2 2010-07-01 2010-07-01 false Policy. 316.5 Section 316.5 National Defense Department of Defense (Continued) OFFICE OF THE SECRETARY OF DEFENSE (CONTINUED) PRIVACY PROGRAM DEFENSE INFORMATION SYSTEMS AGENCY PRIVACY PROGRAM § 316.5 Policy. It is the policy of DISA: (a) To preserve the...

  20. What was privacy?

    PubMed

    McCreary, Lew

    2008-10-01

    Why is that question in the past tense? Because individuals can no longer feel confident that the details of their lives--from identifying numbers to cultural preferences--will be treated with discretion rather than exploited. Even as Facebook users happily share the names of their favorite books, movies, songs, and brands, they often regard marketers' use of that information as an invasion of privacy. In this wide-ranging essay, McCreary, a senior editor at HBR, examines numerous facets of the privacy issue, from Google searches, public shaming on the internet, and cell phone etiquette to passenger screening devices, public surveillance cameras, and corporate chief privacy officers. He notes that IBM has been a leader on privacy; its policy forswearing the use of employees' genetic information in hiring and benefits decisions predated the federal Genetic Information Nondiscrimination Act by three years. Now IBM is involved in an open-source project known as Higgins to provide users with transportable, potentially anonymous online presences. Craigslist, whose CEO calls it "as close to 100% user driven as you can get," has taken an extremely conservative position on privacy--perhaps easier for a company with a declared lack of interest in maximizing revenue. But TJX and other corporate victims of security breaches have discovered that retaining consumers' transaction information can be both costly and risky. Companies that underestimate the importance of privacy to their customers or fail to protect it may eventually face harsh regulation, reputational damage, or both. The best thing they can do, says the author, is negotiate directly with those customers over where to draw the line.

  1. 32 CFR 321.14 - DSS implementation policies.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ...) PRIVACY PROGRAM DEFENSE SECURITY SERVICE PRIVACY PROGRAM § 321.14 DSS implementation policies. (a) General... matters of particular concern to the Defense Security Service. (b) Privacy Act rules application. Any... 32 National Defense 2 2014-07-01 2014-07-01 false DSS implementation policies. 321.14 Section 321...

  2. 32 CFR 321.14 - DSS implementation policies.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ...) PRIVACY PROGRAM DEFENSE SECURITY SERVICE PRIVACY PROGRAM § 321.14 DSS implementation policies. (a) General... matters of particular concern to the Defense Security Service. (b) Privacy Act rules application. Any... 32 National Defense 2 2013-07-01 2013-07-01 false DSS implementation policies. 321.14 Section 321...

  3. 32 CFR 321.14 - DSS implementation policies.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ...) PRIVACY PROGRAM DEFENSE SECURITY SERVICE PRIVACY PROGRAM § 321.14 DSS implementation policies. (a) General... matters of particular concern to the Defense Security Service. (b) Privacy Act rules application. Any... 32 National Defense 2 2012-07-01 2012-07-01 false DSS implementation policies. 321.14 Section 321...

  4. 22 CFR 308.2 - Policy.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 22 Foreign Relations 2 2011-04-01 2009-04-01 true Policy. 308.2 Section 308.2 Foreign Relations PEACE CORPS IMPLEMENTATION OF THE PRIVACY ACT OF 1974 § 308.2 Policy. It is the policy of the Peace Corps to protect, preserve and defend the right of privacy of any individual as to whom the agency...

  5. Query Monitoring and Analysis for Database Privacy - A Security Automata Model Approach

    PubMed Central

    Kumar, Anand; Ligatti, Jay; Tu, Yi-Cheng

    2015-01-01

    Privacy and usage restriction issues are important when valuable data are exchanged or acquired by different organizations. Standard access control mechanisms either restrict or completely grant access to valuable data. On the other hand, data obfuscation limits the overall usability and may result in loss of total value. There are no standard policy enforcement mechanisms for data acquired through mutual and copyright agreements. In practice, many different types of policies can be enforced in protecting data privacy. Hence there is the need for an unified framework that encapsulates multiple suites of policies to protect the data. We present our vision of an architecture named security automata model (SAM) to enforce privacy-preserving policies and usage restrictions. SAM analyzes the input queries and their outputs to enforce various policies, liberating data owners from the burden of monitoring data access. SAM allows administrators to specify various policies and enforces them to monitor queries and control the data access. Our goal is to address the problems of data usage control and protection through privacy policies that can be defined, enforced, and integrated with the existing access control mechanisms using SAM. In this paper, we lay out the theoretical foundation of SAM, which is based on an automata named Mandatory Result Automata. We also discuss the major challenges of implementing SAM in a real-world database environment as well as ideas to meet such challenges. PMID:26997936

  6. From Data Privacy to Location Privacy

    NASA Astrophysics Data System (ADS)

    Wang, Ting; Liu, Ling

    Over the past decade, the research on data privacy has achieved considerable advancement in the following two aspects: First, a variety of privacy threat models and privacy principles have been proposed, aiming at providing sufficient protection against different types of inference attacks; Second, a plethora of algorithms and methods have been developed to implement the proposed privacy principles, while attempting to optimize the utility of the resulting data. The first part of the chapter presents an overview of data privacy research by taking a close examination at the achievements from the above two aspects, with the objective of pinpointing individual research efforts on the grand map of data privacy protection. As a special form of data privacy, location privacy possesses its unique characteristics. In the second part of the chapter, we examine the research challenges and opportunities of location privacy protection, in a perspective analogous to data privacy. Our discussion attempts to answer the following three questions: (1) Is it sufficient to apply the data privacy models and algorithms developed to date for protecting location privacy? (2) What is the current state of the research on location privacy? (3) What are the open issues and technical challenges that demand further investigation? Through answering these questions, we intend to provide a comprehensive review of the state of the art in location privacy research.

  7. Privacy, confidentiality, and security in information systems of state health agencies.

    PubMed

    O'Brien, D G; Yasnoff, W A

    1999-05-01

    To assess the employment and status of privacy, confidentiality, security and fair information practices in electronic information systems of U.S. state health agencies. A survey instrument was developed and administered to key contacts within the state health agencies of each of the 50 U.S. states, Puerto Rico and the District of Columbia. About a third of U.S. state health agencies have no written policies in place regarding privacy and confidentiality in electronic information systems. The doctrines of fair information practice often seemed to be ignored. One quarter of the agencies reported at least one security breach during the past two years, and 16% experienced a privacy and confidentiality related transgression. Most of the breaches were committed by personnel from within the agencies. These results raise questions about the integrity of existing privacy, confidentiality and security measures in the information systems of U.S. state health agencies. Recommendations include the development and vigorous enforcement of written privacy and confidentiality policies, increased personnel training, and expanded implementation of security measures such as encryption and system firewalls. A discussion of the current status of U.S. privacy, confidentiality and security issues is offered.

  8. Patient privacy and social media.

    PubMed

    Hader, Amy L; Brown, Evan D

    2010-08-01

    Healthcare providers using social media must remain mindful of professional boundaries and patients' privacy rights. Facebook and other online postings must comply with the Health Insurance Portability and Accountability Act of 1996 (HIPAA), applicable facility policy, state law, and AANA's Code of Ethics.

  9. Online Patron Records and Privacy: Service vs. Security.

    ERIC Educational Resources Information Center

    Fouty, Kathleen G.

    1993-01-01

    Examines issues regarding the privacy of information contained in patron databases that have resulted from online circulation systems. Topics discussed include library policies to protect information in patron records; ensuring compliance with policies; limiting the data collected; security authorizations; and creating and modifying patron…

  10. 45 CFR 5b.3 - Policy.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 45 Public Welfare 1 2012-10-01 2012-10-01 false Policy. 5b.3 Section 5b.3 Public Welfare DEPARTMENT OF HEALTH AND HUMAN SERVICES GENERAL ADMINISTRATION PRIVACY ACT REGULATIONS § 5b.3 Policy. It is the policy of the Department to protect the privacy of individuals to the fullest extent possible...

  11. Aligning the Effective Use of Student Data with Student Privacy and Security Laws

    ERIC Educational Resources Information Center

    Winnick, Steve; Coleman, Art; Palmer, Scott; Lipper, Kate; Neiditz, Jon

    2011-01-01

    This legal and policy guidance provides a summary framework for state policymakers as they work to use longitudinal data to improve student achievement while also protecting the privacy and security of individual student records. Summarizing relevant federal privacy and security laws, with a focus on the Family Educational Records and Privacy Act…

  12. 32 CFR 322.3 - Policy.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 32 National Defense 2 2012-07-01 2012-07-01 false Policy. 322.3 Section 322.3 National Defense Department of Defense (Continued) OFFICE OF THE SECRETARY OF DEFENSE (CONTINUED) PRIVACY PROGRAM NATIONAL SECURITY AGENCY/CENTRAL SECURITY SERVICES PRIVACY ACT PROGRAM § 322.3 Policy. (a) The National Security...

  13. 32 CFR 322.3 - Policy.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 32 National Defense 2 2011-07-01 2011-07-01 false Policy. 322.3 Section 322.3 National Defense Department of Defense (Continued) OFFICE OF THE SECRETARY OF DEFENSE (CONTINUED) PRIVACY PROGRAM NATIONAL SECURITY AGENCY/CENTRAL SECURITY SERVICES PRIVACY ACT PROGRAM § 322.3 Policy. (a) The National Security...

  14. 32 CFR 322.3 - Policy.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 32 National Defense 2 2014-07-01 2014-07-01 false Policy. 322.3 Section 322.3 National Defense Department of Defense (Continued) OFFICE OF THE SECRETARY OF DEFENSE (CONTINUED) PRIVACY PROGRAM NATIONAL SECURITY AGENCY/CENTRAL SECURITY SERVICES PRIVACY ACT PROGRAM § 322.3 Policy. (a) The National Security...

  15. 32 CFR 322.3 - Policy.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 32 National Defense 2 2010-07-01 2010-07-01 false Policy. 322.3 Section 322.3 National Defense Department of Defense (Continued) OFFICE OF THE SECRETARY OF DEFENSE (CONTINUED) PRIVACY PROGRAM NATIONAL SECURITY AGENCY/CENTRAL SECURITY SERVICES PRIVACY ACT PROGRAM § 322.3 Policy. (a) The National Security...

  16. 32 CFR 322.3 - Policy.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 32 National Defense 2 2013-07-01 2013-07-01 false Policy. 322.3 Section 322.3 National Defense Department of Defense (Continued) OFFICE OF THE SECRETARY OF DEFENSE (CONTINUED) PRIVACY PROGRAM NATIONAL SECURITY AGENCY/CENTRAL SECURITY SERVICES PRIVACY ACT PROGRAM § 322.3 Policy. (a) The National Security...

  17. Privacy Practices of Health Social Networking Sites: Implications for Privacy and Data Security in Online Cancer Communities.

    PubMed

    Charbonneau, Deborah H

    2016-08-01

    While online communities for social support continue to grow, little is known about the state of privacy practices of health social networking sites. This article reports on a structured content analysis of privacy policies and disclosure practices for 25 online ovarian cancer communities. All of the health social networking sites in the study sample provided privacy statements to users, yet privacy practices varied considerably across the sites. The majority of sites informed users that personal information was collected about participants and shared with third parties (96%, n = 24). Furthermore, more than half of the sites (56%, n = 14) stated that cookies technology was used to track user behaviors. Despite these disclosures, only 36% (n = 9) offered opt-out choices for sharing data with third parties. In addition, very few of the sites (28%, n = 7) allowed individuals to delete their personal information. Discussions about specific security measures used to protect personal information were largely missing. Implications for privacy, confidentiality, consumer choice, and data safety in online environments are discussed. Overall, nurses and other health professionals can utilize these findings to encourage individuals seeking online support and participating in social networking sites to build awareness of privacy risks to better protect their personal health information in the digital age.

  18. Federal Restrictions on Educational Research: Privacy Protection Study Commission Hearings

    ERIC Educational Resources Information Center

    Michael, John; Weinberg, JoAnn

    1977-01-01

    The Privacy Protection Study Commission (PPSC) held public hearings on personal data record-keeping policies and practices in educational institutions in Los Angeles in October and in Washington, D.C. in November, 1976. Under consideration were the protections afforded parents and students by the Family Educational Rights and Privacy Act.…

  19. 34 CFR 5b.3 - Policy.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 34 Education 1 2012-07-01 2012-07-01 false Policy. 5b.3 Section 5b.3 Education Office of the Secretary, Department of Education PRIVACY ACT REGULATIONS § 5b.3 Policy. It is the policy of the Department to protect the privacy of individuals to the fullest extent possible while nonetheless permitting the...

  20. Privacy versus autonomy: a tradeoff model for smart home monitoring technologies.

    PubMed

    Townsend, Daphne; Knoefel, Frank; Goubran, Rafik

    2011-01-01

    Smart homes are proposed as a new location for the delivery of healthcare services. They provide healthcare monitoring and communication services, by using integrated sensor network technologies. We validate a hypothesis regarding older adults' adoption of home monitoring technologies by conducting a literature review of articles studying older adults' attitudes and perceptions of sensor technologies. Using current literature to support the hypothesis, this paper applies the tradeoff model to decisions about sensor acceptance. Older adults are willing to trade privacy (by accepting a monitoring technology), for autonomy. As the information captured by the sensor becomes more intrusive and the infringement on privacy increases, sensors are accepted if the loss in privacy is traded for autonomy. Even video cameras, the most intrusive sensor type were accepted in exchange for the height of autonomy which is to remain in the home.

  1. Medicaid provider reimbursement policy for adult immunizations☆

    PubMed Central

    Stewart, Alexandra M.; Lindley, Megan C.; Cox, Marisa A.

    2015-01-01

    Background State Medicaid programs establish provider reimbursement policy for adult immunizations based on: costs, private insurance payments, and percentage of Medicare payments for equivalent services. Each program determines provider eligibility, payment amount, and permissible settings for administration. Total reimbursement consists of different combinations of Current Procedural Terminology codes: vaccine, vaccine administration, and visit. Objective Determine how Medicaid programs in the 50 states and the District of Columbia approach provider reimbursement for adult immunizations. Design Observational analysis using document review and a survey. Setting and participants Medicaid administrators in 50 states and the District of Columbia. Measurements Whether fee-for-service programs reimburse providers for: vaccines; their administration; and/or office visits when provided to adult enrollees. We assessed whether adult vaccination services are reimbursed when administered by a wide range of providers in a wide range of settings. Results Medicaid programs use one of 4 payment methods for adults: (1) a vaccine and an administration code; (2) a vaccine and visit code; (3) a vaccine code; and (4) a vaccine, visit, and administration code. Limitations Study results do not reflect any changes related to implementation of national health reform. Nine of fifty one programs did not respond to the survey or declined to participate, limiting the information available to researchers. Conclusions Medicaid reimbursement policy for adult vaccines impacts provider participation and enrollee access and uptake. While programs have generally increased reimbursement levels since 2003, each program could assess whether current policies reflect the most effective approach to encourage providers to increase vaccination services. PMID:26403369

  2. Medicaid provider reimbursement policy for adult immunizations.

    PubMed

    Stewart, Alexandra M; Lindley, Megan C; Cox, Marisa A

    2015-10-26

    State Medicaid programs establish provider reimbursement policy for adult immunizations based on: costs, private insurance payments, and percentage of Medicare payments for equivalent services. Each program determines provider eligibility, payment amount, and permissible settings for administration. Total reimbursement consists of different combinations of Current Procedural Terminology codes: vaccine, vaccine administration, and visit. Determine how Medicaid programs in the 50 states and the District of Columbia approach provider reimbursement for adult immunizations. Observational analysis using document review and a survey. Medicaid administrators in 50 states and the District of Columbia. Whether fee-for-service programs reimburse providers for: vaccines; their administration; and/or office visits when provided to adult enrollees. We assessed whether adult vaccination services are reimbursed when administered by a wide range of providers in a wide range of settings. Medicaid programs use one of 4 payment methods for adults: (1) a vaccine and an administration code; (2) a vaccine and visit code; (3) a vaccine code; and (4) a vaccine, visit, and administration code. Study results do not reflect any changes related to implementation of national health reform. Nine of fifty one programs did not respond to the survey or declined to participate, limiting the information available to researchers. Medicaid reimbursement policy for adult vaccines impacts provider participation and enrollee access and uptake. While programs have generally increased reimbursement levels since 2003, each program could assess whether current policies reflect the most effective approach to encourage providers to increase vaccination services. Copyright © 2015 Elsevier Ltd. All rights reserved.

  3. Electronic consent channels: preserving patient privacy without handcuffing researchers.

    PubMed

    Shelton, Robert H

    2011-02-09

    Advances in health information technology and electronic medical records have the tremendous potential to accelerate translational and clinical research. However, privacy concerns threaten to be a rate-limiting factor. By recognizing and responding to patient privacy concerns, policy-makers, researchers, and information technology leaders have the opportunity to transform trial recruitment and make it safer to electronically locate and convey sensitive health information.

  4. Privacy-protecting video surveillance

    NASA Astrophysics Data System (ADS)

    Wickramasuriya, Jehan; Alhazzazi, Mohanned; Datt, Mahesh; Mehrotra, Sharad; Venkatasubramanian, Nalini

    2005-02-01

    Forms of surveillance are very quickly becoming an integral part of crime control policy, crisis management, social control theory and community consciousness. In turn, it has been used as a simple and effective solution to many of these problems. However, privacy-related concerns have been expressed over the development and deployment of this technology. Used properly, video cameras help expose wrongdoing but typically come at the cost of privacy to those not involved in any maleficent activity. This work describes the design and implementation of a real-time, privacy-protecting video surveillance infrastructure that fuses additional sensor information (e.g. Radio-frequency Identification) with video streams and an access control framework in order to make decisions about how and when to display the individuals under surveillance. This video surveillance system is a particular instance of a more general paradigm of privacy-protecting data collection. In this paper we describe in detail the video processing techniques used in order to achieve real-time tracking of users in pervasive spaces while utilizing the additional sensor data provided by various instrumented sensors. In particular, we discuss background modeling techniques, object tracking and implementation techniques that pertain to the overall development of this system.

  5. 41 CFR 105-64.107 - What standards of conduct apply to employees with privacy-related responsibilities?

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... SERVICES ADMINISTRATION Regional Offices-General Services Administration 64-GSA PRIVACY ACT RULES 64.1-Policies and Responsibilities § 105-64.107 What standards of conduct apply to employees with privacy... training requirements. All such employees will follow GSA orders HCO 9297.1 GSA Data Release Policy, HCO...

  6. "Everybody Knows Everybody Else's Business"-Privacy in Rural Communities.

    PubMed

    Leung, Janni; Smith, Annetta; Atherton, Iain; McLaughlin, Deirdre

    2016-12-01

    Patients have a right to privacy in a health care setting. This involves conversational discretion, security of medical records and physical privacy of remaining unnoticed or unidentified when using health care services other than by those who need to know or whom the patient wishes to know. However, the privacy of cancer patients who live in rural areas is more difficult to protect due to the characteristics of rural communities. The purpose of this article is to reflect on concerns relating to the lack of privacy experienced by cancer patients and health care professionals in the rural health care setting. In addition, this article suggests future research directions to provide much needed evidence for educating health care providers and guiding health care policies that can lead to better protection of privacy among cancer patients living in rural communities.

  7. Quality consciousness...auditing for HIPAA Privacy Compliance.

    PubMed

    LePar, Kathleen

    2004-01-01

    The Health Insurance Portability and Accountability Act (HIPAA) privacy deadline has passed. Now it is essential to comply with the regulations. The stakes are high; therefore, a HIPAA Privacy Compliance Program must be part of an organization's quality initiatives. This article provides guidelines for the challenges of continual program improvement, successful cultural change, and effective monitoring of the existing program. Healthcare organizations will attain compliance goals through internal audits on the processes, policies, and training efforts of their HIPAA program.

  8. 14 CFR 1212.600 - General policy.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 14 Aeronautics and Space 5 2011-01-01 2010-01-01 true General policy. 1212.600 Section 1212.600 Aeronautics and Space NATIONAL AERONAUTICS AND SPACE ADMINISTRATION PRIVACY ACT-NASA REGULATIONS Instructions for NASA Employees § 1212.600 General policy. In compliance with the Privacy Act and in accordance...

  9. 14 CFR 1212.600 - General policy.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 14 Aeronautics and Space 5 2010-01-01 2010-01-01 false General policy. 1212.600 Section 1212.600 Aeronautics and Space NATIONAL AERONAUTICS AND SPACE ADMINISTRATION PRIVACY ACT-NASA REGULATIONS Instructions for NASA Employees § 1212.600 General policy. In compliance with the Privacy Act and in accordance...

  10. Individual privacy in an information dependent society

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Clifford, B.P.

    1994-12-31

    The extraordinary technologies and capabilities of the Information Age have vastly improved communication, while allowing executives to have ultra-current information about their companies, subsidiaries, staff, clients, and practically any individual in the world. These advances, however, have stripped the individual of his privacy. Although invasions of privacy do not require a computer, computers have made it much easier to gather and select informatin, which means that it is also much easier to invade privacy. The increased value of information to policy makers leads them to covet information, even when acquiring it invades someone`s pricacy; not only do managers of privatemore » companies gather personal data, almost every citizen has files about him in Federal agencies and administrations.« less

  11. Creating Older Adults Technology Training Policies: Lessons from Community Practices

    ERIC Educational Resources Information Center

    Nycyk, Michael; Redsell, Margaret

    2007-01-01

    Influencing government policy in adult learning areas requires consistent efforts in having findings noticed by educational policymakers. Submissions by Adult Learning Australia and researchers have called for unified educational policies and practices across Australia. This paper argues that, whilst it is important to address macro issues of…

  12. 48 CFR 2124.102-70 - Policy.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... GROUP LIFE INSURANCE FEDERAL ACQUISITION REGULATION SOCIOECONOMIC PROGRAMS PROTECTION OF PRIVACY AND FREEDOM OF INFORMATION Protection of Individual Privacy 2124.102-70 Policy. Records retained by FEGLI... OPM. Consequently, the records do not fall within the provisions of the Privacy Act. Nevertheless, OPM...

  13. A systematic literature review on security and privacy of electronic health record systems: technical perspectives.

    PubMed

    Rezaeibagha, Fatemeh; Win, Khin Than; Susilo, Willy

    Even though many safeguards and policies for electronic health record (EHR) security have been implemented, barriers to the privacy and security protection of EHR systems persist. This article presents the results of a systematic literature review regarding frequently adopted security and privacy technical features of EHR systems. Our inclusion criteria were full articles that dealt with the security and privacy of technical implementations of EHR systems published in English in peer-reviewed journals and conference proceedings between 1998 and 2013; 55 selected studies were reviewed in detail. We analysed the review results using two International Organization for Standardization (ISO) standards (29100 and 27002) in order to consolidate the study findings. Using this process, we identified 13 features that are essential to security and privacy in EHRs. These included system and application access control, compliance with security requirements, interoperability, integration and sharing, consent and choice mechanism, policies and regulation, applicability and scalability and cryptography techniques. This review highlights the importance of technical features, including mandated access control policies and consent mechanisms, to provide patients' consent, scalability through proper architecture and frameworks, and interoperability of health information systems, to EHR security and privacy requirements.

  14. 41 CFR 105-64.107 - What standards of conduct apply to employees with privacy-related responsibilities?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... conduct apply to employees with privacy-related responsibilities? 105-64.107 Section 105-64.107 Public... SERVICES ADMINISTRATION Regional Offices-General Services Administration 64-GSA PRIVACY ACT RULES 64.1-Policies and Responsibilities § 105-64.107 What standards of conduct apply to employees with privacy...

  15. 41 CFR 105-64.107 - What standards of conduct apply to employees with privacy-related responsibilities?

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... conduct apply to employees with privacy-related responsibilities? 105-64.107 Section 105-64.107 Public... SERVICES ADMINISTRATION Regional Offices-General Services Administration 64-GSA PRIVACY ACT RULES 64.1-Policies and Responsibilities § 105-64.107 What standards of conduct apply to employees with privacy...

  16. Is Privacy at Risk when Commercial Websites Target Primary School Children? A Case Study in Korea

    ERIC Educational Resources Information Center

    Kim, Sora; Yi, Soon-Hyung

    2010-01-01

    This study discusses privacy risk factors when commercial web sites target primary school children in Korea. Specifically, the authors examined types of personal information required for membership subscriptions and whether privacy policies at commercial sites for children abide by privacy guidelines. A total of 159 commercial sites targeting…

  17. Privacy and anonymity in the information society - challenges for the European Union.

    PubMed

    Tsoukalas, Ioannis A; Siozos, Panagiotis D

    2011-03-01

    Electronic information is challenging traditional views on property and privacy. The explosion of digital data, driven by novel web applications, social networking, and mobile devices makes data security and the protection of privacy increasingly difficult. Furthermore, biometric data and radiofrequency identification applications enable correlations that are able to trace our cultural, behavioral, and emotional states. The concept of privacy in the digital realm is transformed and emerges as one of the biggest risks facing today's Information Society. In this context, the European Union (EU) policy-making procedures strive to adapt to the pace of technological advancement. The EU needs to improve the existing legal frameworks for privacy and data protection. It needs to work towards a "privacy by education" approach for the empowerment of "privacy-literate" European digital citizens.

  18. Ownership, Privacy, Confidentiality, and Security Data.

    ERIC Educational Resources Information Center

    Staman, E. Michael

    1986-01-01

    One of the areas most often neglected by those responsible for information systems in colleges and universities relates to ownership, privacy, confidentiality, and security of data. Background information and definitions are provided, and a suggested environment is described. Model recommendations for institutional policy are offered. (MLW)

  19. 32 CFR 1701.20 - Exemption policies.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... INTELLIGENCE ADMINISTRATION OF RECORDS UNDER THE PRIVACY ACT OF 1974 Exemption of Record Systems Under the Privacy Act § 1701.20 Exemption policies. (a) General. The DNI has determined that invoking exemptions under the Privacy Act and continuing exemptions previously asserted by agencies whose records ODNI...

  20. 45 CFR 5b.3 - Policy.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... DEPARTMENT OF HEALTH AND HUMAN SERVICES GENERAL ADMINISTRATION PRIVACY ACT REGULATIONS § 5b.3 Policy. It is the policy of the Department to protect the privacy of individuals to the fullest extent possible... public is entitled to have under the Freedom of Information Act, 5 U.S.C. 552, and part 5 of this title. ...

  1. 45 CFR 5b.3 - Policy.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... Department of Health and Human Services GENERAL ADMINISTRATION PRIVACY ACT REGULATIONS § 5b.3 Policy. It is the policy of the Department to protect the privacy of individuals to the fullest extent possible... public is entitled to have under the Freedom of Information Act, 5 U.S.C. 552, and part 5 of this title. ...

  2. 45 CFR 5b.3 - Policy.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... DEPARTMENT OF HEALTH AND HUMAN SERVICES GENERAL ADMINISTRATION PRIVACY ACT REGULATIONS § 5b.3 Policy. It is the policy of the Department to protect the privacy of individuals to the fullest extent possible... public is entitled to have under the Freedom of Information Act, 5 U.S.C. 552, and part 5 of this title. ...

  3. Overview of Privacy in Social Networking Sites (SNS)

    NASA Astrophysics Data System (ADS)

    Powale, Pallavi I.; Bhutkar, Ganesh D.

    2013-07-01

    Social Networking Sites (SNS) have become an integral part of communication and life style of people in today's world. Because of the wide range of services offered by SNSs mostly for free of cost, these sites are attracting the attention of all possible Internet users. Most importantly, users from all age groups have become members of SNSs. Since many of the users are not aware of the data thefts associated with information sharing, they freely share their personal information with SNSs. Therefore, SNSs may be used for investigating users' character and social habits by familiar or even unknown persons and agencies. Such commercial and social scenario, has led to number of privacy and security threats. Though, all major issues in SNSs need to be addressed, by SNS providers, privacy of SNS users is the most crucial. And therefore, in this paper, we have focused our discussion on "privacy in SNSs". We have discussed different ways of Personally Identifiable Information (PII) leakages from SNSs, information revelation to third-party domains without user consent and privacy related threats associated with such information sharing. We expect that this comprehensive overview on privacy in SNSs will definitely help in raising user awareness about sharing data and managing their privacy with SNSs. It will also help SNS providers to rethink about their privacy policies.

  4. National Adult Education Programme: Policy Statement and Programme Outline. Government of India's Policy Statement on Adult Education

    ERIC Educational Resources Information Center

    New Frontiers in Education, 1978

    1978-01-01

    An eight-point policy statement on adult education in India is presented, followed by an outline of operational details for putting it into effect. Focus is on combatting illiteracy by providing those citizens with skills for self-directed learning. (LBH)

  5. Privacy rules for DNA databanks. Protecting coded 'future diaries'.

    PubMed

    Annas, G J

    1993-11-17

    In privacy terms, genetic information is like medical information. But the information contained in the DNA molecule itself is more sensitive because it contains an individual's probabilistic "future diary," is written in a code that has only partially been broken, and contains information about an individual's parents, siblings, and children. Current rules for protecting the privacy of medical information cannot protect either genetic information or identifiable DNA samples stored in DNA databanks. A review of the legal and public policy rationales for protecting genetic privacy suggests that specific enforceable privacy rules for DNA databanks are needed. Four preliminary rules are proposed to govern the creation of DNA databanks, the collection of DNA samples for storage, limits on the use of information derived from the samples, and continuing obligations to those whose DNA samples are in the databanks.

  6. 32 CFR 1701.6 - Disclosure of records/policy.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... NATIONAL INTELLIGENCE ADMINISTRATION OF RECORDS UNDER THE PRIVACY ACT OF 1974 Protection of Privacy and Access to Individual Records Under the Privacy Act of 1974 § 1701.6 Disclosure of records/policy... Privacy Act Systems of Records Notices (available at http://www.dni.gov); (d) Release to the Bureau of the...

  7. Policy to Performance: State ABE Transition Systems Report. Transitioning Adults to Opportunity

    ERIC Educational Resources Information Center

    Alamprese, Judith A.

    2012-01-01

    The U.S. Department of Education's Policy to Performance project was funded in 2009 to build the capacity of state adult basic education (ABE) staff to develop and implement policies and practices that would support an ABE transition system. Policy to Performance states were selected though a competitive process. State adult education directors…

  8. Privacy and medical information on the Internet.

    PubMed

    Nelson, Steven B

    2006-02-01

    Health-care consumers are beginning to realize the presence and value of health-care information available on the Internet, but they need to be aware of risks that may be involved. In addition to delivering information, some Web sites collect information. Though not all of the information might be classified as protected health information, consumers need to realize what is collected and how it might be used. Consumers should know a Web site\\'s privacy policy before divulging any personal information. Health-care providers have a responsibility to know what information they are collecting and why. Web servers may collect large amounts of visitor information by default, and they should be modified to limit data collection to only what is necessary. Providers need to be cognizant of the many regulations concerning collection and disclosure of information obtained from consumers. Providers should also provide an easily understood privacy policy for users.

  9. Control use of data to protect privacy.

    PubMed

    Landau, Susan

    2015-01-30

    Massive data collection by businesses and governments calls into question traditional methods for protecting privacy, underpinned by two core principles: (i) notice, that there should be no data collection system whose existence is secret, and (ii) consent, that data collected for one purpose not be used for another without user permission. But notice, designated as a fundamental privacy principle in a different era, makes little sense in situations where collection consists of lots and lots of small amounts of information, whereas consent is no longer realistic, given the complexity and number of decisions that must be made. Thus, efforts to protect privacy by controlling use of data are gaining more attention. I discuss relevant technology, policy, and law, as well as some examples that can illuminate the way. Copyright © 2015, American Association for the Advancement of Science.

  10. Perspectives of Australian adults about protecting the privacy of their health information in statistical databases.

    PubMed

    King, Tatiana; Brankovic, Ljiljana; Gillard, Patricia

    2012-04-01

    The aim of this study was to discover the public's attitude and views towards privacy in health care. This is a part of a larger project which aims to gain an insight into what kind of privacy is needed and develop technical measures to provide such privacy. The study was a two-stage process which combined qualitative and quantitative research. Stage One of the study comprised arranging and facilitating focus groups while in Stage Two we conducted a social survey. We measured attitudes towards privacy, medical research and consent; privacy concern about sharing one's health information for research; privacy concern about the possibility that some specific information from medical records could be linked to the patient's name in a situation that was not related to medical treatment. The results of the study revealed both great support for medical research (98%), and concern about privacy of health information (66%). Participants prefer to be asked for their permission before their health information is used for any purpose other than medical treatment (92%), and they would like to know the organisation and details of the research before allowing the use of their health records (83%). Age, level of education, place of birth and employment status are most strongly associated with privacy concerns. The study showed that there are some particularly sensitive issues and there is a concern (42-60%) about any possibility of linking these kinds of data to the patient's name in a situation that is not related to medical treatment. Such issues include sexually transmitted diseases, abortions and infertility, family medical history/genetic disorders, mental illness, drug/alcohol related incidents, lists of previous operations/procedures/dates and current medications. Participants believe they should be asked for permission before their health information is used for any purpose other than medical treatment. However, consent and privacy concerns are not necessary related

  11. Unaddressed privacy risks in accredited health and wellness apps: a cross-sectional systematic assessment.

    PubMed

    Huckvale, Kit; Prieto, José Tomás; Tilney, Myra; Benghozi, Pierre-Jean; Car, Josip

    2015-09-07

    Poor information privacy practices have been identified in health apps. Medical app accreditation programs offer a mechanism for assuring the quality of apps; however, little is known about their ability to control information privacy risks. We aimed to assess the extent to which already-certified apps complied with data protection principles mandated by the largest national accreditation program. Cross-sectional, systematic, 6-month assessment of 79 apps certified as clinically safe and trustworthy by the UK NHS Health Apps Library. Protocol-based testing was used to characterize personal information collection, local-device storage and information transmission. Observed information handling practices were compared against privacy policy commitments. The study revealed that 89% (n = 70/79) of apps transmitted information to online services. No app encrypted personal information stored locally. Furthermore, 66% (23/35) of apps sending identifying information over the Internet did not use encryption and 20% (7/35) did not have a privacy policy. Overall, 67% (53/79) of apps had some form of privacy policy. No app collected or transmitted information that a policy explicitly stated it would not; however, 78% (38/49) of information-transmitting apps with a policy did not describe the nature of personal information included in transmissions. Four apps sent both identifying and health information without encryption. Although the study was not designed to examine data handling after transmission to online services, security problems appeared to place users at risk of data theft in two cases. Systematic gaps in compliance with data protection principles in accredited health apps question whether certification programs relying substantially on developer disclosures can provide a trusted resource for patients and clinicians. Accreditation programs should, as a minimum, provide consistent and reliable warnings about possible threats and, ideally, require publishers to

  12. EPPS: Efficient and Privacy-Preserving Personal Health Information Sharing in Mobile Healthcare Social Networks.

    PubMed

    Jiang, Shunrong; Zhu, Xiaoyan; Wang, Liangmin

    2015-09-03

    Mobile healthcare social networks (MHSNs) have emerged as a promising next-generation healthcare system, which will significantly improve the quality of life. However, there are many security and privacy concerns before personal health information (PHI) is shared with other parities. To ensure patients' full control over their PHI, we propose a fine-grained and scalable data access control scheme based on attribute-based encryption (ABE). Besides, policies themselves for PHI sharing may be sensitive and may reveal information about underlying PHI or about data owners or recipients. In our scheme, we let each attribute contain an attribute name and its value and adopt the Bloom filter to efficiently check attributes before decryption. Thus, the data privacy and policy privacy can be preserved in our proposed scheme. Moreover, considering the fact that the computational cost grows with the complexity of the access policy and the limitation of the resource and energy in a smart phone, we outsource ABE decryption to the cloud while preventing the cloud from learning anything about the content and access policy. The security and performance analysis is carried out to demonstrate that our proposed scheme can achieve fine-grained access policies for PHI sharing in MHSNs.

  13. Managing security and privacy concerns over data storage in healthcare research.

    PubMed

    Mackenzie, Isla S; Mantay, Brian J; McDonnell, Patrick G; Wei, Li; MacDonald, Thomas M

    2011-08-01

    Issues surrounding data security and privacy are of great importance when handling sensitive health-related data for research. The emphasis in the past has been on balancing the risks to individuals with the benefit to society of the use of databases for research. However, a new way of looking at such issues is that by optimising procedures and policies regarding security and privacy of data to the extent that there is no appreciable risk to the privacy of individuals, we can create a 'win-win' situation in which everyone benefits, and pharmacoepidemiological research can flourish with public support. We discuss holistic measures, involving both information technology and people, taken to improve the security and privacy of data storage. After an internal review, we commissioned an external audit by an independent consultant with a view to optimising our data storage and handling procedures. Improvements to our policies and procedures were implemented as a result of the audit. By optimising our storage of data, we hope to inspire public confidence and hence cooperation with the use of health care data in research. Copyright © 2011 John Wiley & Sons, Ltd.

  14. Lessons learned from a privacy breach at an academic health science centre.

    PubMed

    Malonda, Jacqueline; Campbell, Janice; Crivianu-Gaita, Daniela; Freedman, Melvin H; Stevens, Polly; Laxer, Ronald M

    2009-01-01

    In 2007, the Hospital for Sick Children experienced a serious privacy breach when a laptop computer containing the personal health information of approximately 3,000 patients and research subjects was stolen from a physician-researcher's vehicle. This incident was reported to the information and privacy commissioner of Ontario (IPC). The IPC issued an order that required the hospital to examine and revise its policies, practices and research protocols related to the protection of personal health information and to educate staff on privacy-related matters.

  15. Toward a Behavioral Approach to Privacy for Online Social Networks

    NASA Astrophysics Data System (ADS)

    Banks, Lerone D.; Wu, S. Felix

    We examine the correlation between user interactions and self reported information revelation preferences for users of the popular Online Social Network (OSN), Facebook. Our primary goal is to explore the use of indicators of tie strength to inform localized, per-user privacy preferences for users and their ties within OSNs. We examine the limitations of such an approach and discuss future plans to incorporate this approach into the development of an automated system for helping users define privacy policy. As part of future work, we discuss how to define/expand policy to the entire social network. We also present additional collected data similar to other studies such as perceived tie strength and information revelation preferences for OSN users.

  16. Adolescents and Social Media: Privacy, Brain Development, and the Law.

    PubMed

    Costello, Caitlin R; McNiel, Dale E; Binder, Renée L

    2016-09-01

    Adolescents under the age of 18 are not recognized in the law as adults, nor do they have the fully developed capacity of adults. Yet teens regularly enter into contractual arrangements with operators of websites to send and post information about themselves. Their level of development limits their capacity to understand the implications of online communications, yet the risks are real to adolescents' privacy and reputations. This article explores an apparent contradiction in the law: that in areas other than online communications, U.S. legal systems seek to protect minors from the limitations of youth. The Children's Online Privacy Protection Act provides some protection to the privacy of young people, but applies only to children under age 13, leaving minors of ages 13 to 17 with little legal protection in their online activities. In this article, we discuss several strategies to mitigate the risks of adolescent online activity. © 2016 American Academy of Psychiatry and the Law.

  17. Surgical patients' and nurses' opinions and expectations about privacy in care.

    PubMed

    Akyüz, Elif; Erdemir, Firdevs

    2013-09-01

    The purpose of this study was to determine the opinions and expectations of patients and nurses about privacy during a hospital admission for surgery. The study explored what enables and maintains privacy from the perspective of Turkish surgical patients and nurses. The study included 102 adult patients having surgery and 47 nurses caring for them. Data were collected via semistructured questionnaire by face-to-face interviews. The results showed that patients were mostly satisfied by the respect shown to their privacy by the nurses but were less confident of the confidentiality of their personal data. It was found that patients have expectations regarding nursing approaches and attitudes about acknowledging and respecting patient autonomy and confidentiality. It is remarkable that while nurses focused on the physical dimension of privacy, patients focused on informational and psychosocial dimensions of privacy, as well as its physical dimension.

  18. Protecting the Privacy and Security of Your Health Information

    MedlinePlus

    ... Access to Medical Records Privacy, Security, and HIPAA Laws, Regulation, and Policy Scientific Initiatives Standards & Technology Usability ... care providers and professionals, and the government. Federal laws require many of the key persons and organizations ...

  19. Automated Detection of Privacy Sensitive Conditions in C-CDAs: Security Labeling Services at the Department of Veterans Affairs

    PubMed Central

    Bouhaddou, Omar; Davis, Mike; Donahue, Margaret; Mallia, Anthony; Griffin, Stephania; Teal, Jennifer; Nebeker, Jonathan

    2016-01-01

    Care coordination across healthcare organizations depends upon health information exchange. Various policies and laws govern permissible exchange, particularly when the information includes privacy sensitive conditions. The Department of Veterans Affairs (VA) privacy policy has required either blanket consent or manual sensitivity review prior to exchanging any health information. The VA experience has been an expensive, administratively demanding burden on staffand Veterans alike, particularly for patients without privacy sensitive conditions. Until recently, automatic sensitivity determination has not been feasible. This paper proposes a policy-driven algorithmic approach (Security Labeling Service or SLS) to health information exchange that automatically detects the presence or absence of specific privacy sensitive conditions and then, to only require a Veteran signed consent for release when actually present. The SLS was applied successfully to a sample of real patient Consolidated-Clinical Document Architecture(C-CDA) documents. The SLS identified standard terminology codes by both parsing structured entries and analyzing textual information using Natural Language Processing (NLP). PMID:28269828

  20. Automated Detection of Privacy Sensitive Conditions in C-CDAs: Security Labeling Services at the Department of Veterans Affairs.

    PubMed

    Bouhaddou, Omar; Davis, Mike; Donahue, Margaret; Mallia, Anthony; Griffin, Stephania; Teal, Jennifer; Nebeker, Jonathan

    2016-01-01

    Care coordination across healthcare organizations depends upon health information exchange. Various policies and laws govern permissible exchange, particularly when the information includes privacy sensitive conditions. The Department of Veterans Affairs (VA) privacy policy has required either blanket consent or manual sensitivity review prior to exchanging any health information. The VA experience has been an expensive, administratively demanding burden on staffand Veterans alike, particularly for patients without privacy sensitive conditions. Until recently, automatic sensitivity determination has not been feasible. This paper proposes a policy-driven algorithmic approach (Security Labeling Service or SLS) to health information exchange that automatically detects the presence or absence of specific privacy sensitive conditions and then, to only require a Veteran signed consent for release when actually present. The SLS was applied successfully to a sample of real patient Consolidated-Clinical Document Architecture(C-CDA) documents. The SLS identified standard terminology codes by both parsing structured entries and analyzing textual information using Natural Language Processing (NLP).

  1. Regulating genetic privacy in the online health information era.

    PubMed

    Magnusson, Roger S

    As the clinical implications of the genetic components of disease come to be better understood, there is likely to be a significant increase in the volume of genetic information held within clinical records. As patient health care records, in turn, come on-line as part of broader health information networks, there is likely to be considerable pressure in favour of special laws protecting genetic privacy. This paper reviews some of the privacy challenges posed by electronic health records, some government initiatives in this area, and notes the impact that developments in genetic testing will have upon the 'genetic content' of e-health records. Despite the sensitivity of genetic information, the paper argues against a policy of 'genetic exceptionalism', and its implications for genetic privacy laws.

  2. A Generic Privacy Quantification Framework for Privacy-Preserving Data Publishing

    ERIC Educational Resources Information Center

    Zhu, Zutao

    2010-01-01

    In recent years, the concerns about the privacy for the electronic data collected by government agencies, organizations, and industries are increasing. They include individual privacy and knowledge privacy. Privacy-preserving data publishing is a research branch that preserves the privacy while, at the same time, withholding useful information in…

  3. New Technology "Clouds" Student Data Privacy

    ERIC Educational Resources Information Center

    Krueger, Keith R.; Moore, Bob

    2015-01-01

    As technology has leaped forward to provide valuable learning tools, parents and policy makers have begun raising concerns about the privacy of student data that schools and systems have. Federal laws are intended to protect students and their families but they have not and will never be able to keep up with rapidly evolving technology. School…

  4. Research That Counts: OECD Statistics and "Policy Entrepreneurs" Impacting on Australian Adult Literacy and Numeracy Policy

    ERIC Educational Resources Information Center

    Black, Stephen; Yasukawa, Keiko

    2016-01-01

    This paper analyses research that has impacted on Australia's most recent national policy document on adult literacy and numeracy, the National Foundation Skills Strategy (NFSS). The paper draws in part on Lingard's 2013 paper, "The impact of research on education policy in an era of evidence-based policy", in which he outlines the…

  5. The role of health care experience and consumer information efficacy in shaping privacy and security perceptions of medical records: national consumer survey results.

    PubMed

    Patel, Vaishali; Beckjord, Ellen; Moser, Richard P; Hughes, Penelope; Hesse, Bradford W

    2015-04-02

    Providers' adoption of electronic health records (EHRs) is increasing and consumers have expressed concerns about the potential effects of EHRs on privacy and security. Yet, we lack a comprehensive understanding regarding factors that affect individuals' perceptions regarding the privacy and security of their medical information. The aim of this study was to describe national perceptions regarding the privacy and security of medical records and identify a comprehensive set of factors associated with these perceptions. Using a nationally representative 2011-2012 survey, we reported on adults' perceptions regarding privacy and security of medical records and sharing of health information between providers, and whether adults withheld information from a health care provider due to privacy or security concerns. We used multivariable models to examine the association between these outcomes and sociodemographic characteristics, health and health care experience, information efficacy, and technology-related variables. Approximately one-quarter of American adults (weighted n=235,217,323; unweighted n=3959) indicated they were very confident (n=989) and approximately half indicated they were somewhat confident (n=1597) in the privacy of their medical records; we found similar results regarding adults' confidence in the security of medical records (very confident: n=828; somewhat confident: n=1742). In all, 12.33% (520/3904) withheld information from a health care provider and 59.06% (2100/3459) expressed concerns about the security of both faxed and electronic health information. Adjusting for other characteristics, adults who reported higher quality of care had significantly greater confidence in the privacy and security of their medical records and were less likely to withhold information from their health care provider due to privacy or security concerns. Adults with higher information efficacy had significantly greater confidence in the privacy and security of medical

  6. EPPS: Efficient and Privacy-Preserving Personal Health Information Sharing in Mobile Healthcare Social Networks

    PubMed Central

    Jiang, Shunrong; Zhu, Xiaoyan; Wang, Liangmin

    2015-01-01

    Mobile healthcare social networks (MHSNs) have emerged as a promising next-generation healthcare system, which will significantly improve the quality of life. However, there are many security and privacy concerns before personal health information (PHI) is shared with other parities. To ensure patients’ full control over their PHI, we propose a fine-grained and scalable data access control scheme based on attribute-based encryption (ABE). Besides, policies themselves for PHI sharing may be sensitive and may reveal information about underlying PHI or about data owners or recipients. In our scheme, we let each attribute contain an attribute name and its value and adopt the Bloom filter to efficiently check attributes before decryption. Thus, the data privacy and policy privacy can be preserved in our proposed scheme. Moreover, considering the fact that the computational cost grows with the complexity of the access policy and the limitation of the resource and energy in a smart phone, we outsource ABE decryption to the cloud while preventing the cloud from learning anything about the content and access policy. The security and performance analysis is carried out to demonstrate that our proposed scheme can achieve fine-grained access policies for PHI sharing in MHSNs. PMID:26404300

  7. Choose Privacy Week: Educate Your Students (and Yourself) about Privacy

    ERIC Educational Resources Information Center

    Adams, Helen R.

    2016-01-01

    The purpose of "Choose Privacy Week" is to encourage a national conversation to raise awareness of the growing threats to personal privacy online and in day-to-day life. The 2016 Choose Privacy Week theme is "respecting individuals' privacy," with an emphasis on minors' privacy. A plethora of issues relating to minors' privacy…

  8. 32 CFR 326.6 - Policies for processing requests for records.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... DEFENSE (CONTINUED) PRIVACY PROGRAM NATIONAL RECONNAISSANCE OFFICE PRIVACY ACT PROGRAM § 326.6 Policies... Freedom of Information Act (FOIA) and the Privacy Act and the applicable regulations. Such requests will... disclosure under the FOIA. (b) A Privacy Act request that neither specifies the system(s) of records to be...

  9. 32 CFR 326.6 - Policies for processing requests for records.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... DEFENSE (CONTINUED) PRIVACY PROGRAM NATIONAL RECONNAISSANCE OFFICE PRIVACY ACT PROGRAM § 326.6 Policies... Freedom of Information Act (FOIA) and the Privacy Act and the applicable regulations. Such requests will... disclosure under the FOIA. (b) A Privacy Act request that neither specifies the system(s) of records to be...

  10. Navigating State and Federal Student Privacy Laws to Design Educationally Sound Parental Notice Policies

    ERIC Educational Resources Information Center

    Baker, Thomas R.

    2008-01-01

    This chapter describes the relationship between federal student privacy laws and state privacy laws, and identifies the changes in the federal law over the last ten years affecting disclosure to parents of college students. Recent litigation on health emergencies is outlined and the limited rights of college students not yet eighteen years of age…

  11. Casino gambling among older adults in North Dakota: a policy analysis.

    PubMed

    Bjelde, Kristine; Chromy, Barbara; Pankow, Debra

    2008-12-01

    This article examined social issues surrounding casino gambling among older adults both nationally and in the state of North Dakota. An exploratory review of gambling trends among older adults and an examination of policies to protect older gamblers revealed that older adults are targeted by the gaming industry as a lucrative market (Singh et al. J Retail Leisure Property 2007, 6(1):61-68). The authors used the national literature to frame their qualitative study, which explored gambling issues among older adults in North Dakota from the perspective of six counselors trained in gambling addiction who provide treatment services in the state. Findings indicated that relatively few policies existed at the state and national levels to protect older, more vulnerable adults who gamble. Further, the six casinos in North Dakota were viewed as very effective in marketing their casino gaming opportunities to older citizens by the gambling treatment providers interviewed. Additionally, barriers to gambling addiction treatment involved lack of available services and distance to receive services in this rural state. Based on the findings of this study, social policy changes which could lead to increased protection for older adult gamblers in the state were included.

  12. Disclosure of personal medical information: differences among parents and affected adults for genetic and nongenetic conditions.

    PubMed

    Johnson, Summer; Kass, Nancy E; Natowicz, Marvin

    2005-01-01

    Protecting the confidentiality of medical information has been an issue of great interest in the fields of bioethics, public policy, and law. Few empirical studies have addressed patient experiences and attitudes toward disclosure of private medical information in multiple contexts such as health insurance, employment, and the family. Furthermore, it is unclear whether differences exist in experiences and attitudes about privacy between those living with a serious medical condition versus those who have a child with a medical condition. The study sought to determine whether attitudes and experiences related to medical privacy and confidentiality differ between affected adults and parents of affected children. Interviews were conducted with 296 adults and parents of children with sickle cell disease (SCD), cystic fibrosis (CF), or diabetes mellitus (DM). This cross-sectional study collected data regarding their experiences, attitudes, and beliefs concerning medical privacy and confidentiality. Multinomial logistic regression analysis was conducted on quantitative data. Qualitative analysis was conducted on data from open-ended response items. Parents disclose their child's diagnosis to others more often than affected adults disclose their own disease status. Parents are less likely than affected adults to regret their disclosure, to hope others do not find out, to have been pressured to share information, and to be asked about their disease by employers. Affected adults express greater concern about disclosure, a greater prevalence and greater fear of discrimination, and experience greater pressure from family members to disclose. Clinicians and researchers working with these populations should consider these differences in privacy and disclosure. Further study is necessary to examine the implications of these differences in attitudes and experiences concerning insurance, employment, and social interactions among persons with these conditions.

  13. 48 CFR 24.203 - Policy.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... PROTECTION OF PRIVACY AND FREEDOM OF INFORMATION Freedom of Information Act 24.203 Policy. (a) The Act... law enforcement. Since these requests often involve complex issues requiring an in-depth knowledge of..., authorized agency officials may contact the Department of Justice, Office of Information and Privacy. A...

  14. Efficient Privacy-Aware Record Integration.

    PubMed

    Kuzu, Mehmet; Kantarcioglu, Murat; Inan, Ali; Bertino, Elisa; Durham, Elizabeth; Malin, Bradley

    2013-01-01

    The integration of information dispersed among multiple repositories is a crucial step for accurate data analysis in various domains. In support of this goal, it is critical to devise procedures for identifying similar records across distinct data sources. At the same time, to adhere to privacy regulations and policies, such procedures should protect the confidentiality of the individuals to whom the information corresponds. Various private record linkage (PRL) protocols have been proposed to achieve this goal, involving secure multi-party computation (SMC) and similarity preserving data transformation techniques. SMC methods provide secure and accurate solutions to the PRL problem, but are prohibitively expensive in practice, mainly due to excessive computational requirements. Data transformation techniques offer more practical solutions, but incur the cost of information leakage and false matches. In this paper, we introduce a novel model for practical PRL, which 1) affords controlled and limited information leakage, 2) avoids false matches resulting from data transformation. Initially, we partition the data sources into blocks to eliminate comparisons for records that are unlikely to match. Then, to identify matches, we apply an efficient SMC technique between the candidate record pairs. To enable efficiency and privacy, our model leaks a controlled amount of obfuscated data prior to the secure computations. Applied obfuscation relies on differential privacy which provides strong privacy guarantees against adversaries with arbitrary background knowledge. In addition, we illustrate the practical nature of our approach through an empirical analysis with data derived from public voter records.

  15. Biobanking Research and Privacy Laws in the United States.

    PubMed

    Harrell, Heather L; Rothstein, Mark A

    2016-03-01

    Privacy is protected in biobank-based research in the US primarily by the Health Insurance Portability and Accountability Act (HIPAA) Privacy Rule and the Federal Policy for Protection of Human Subjects (Common Rule). Neither rule, however, was created to function in the unique context of biobank research, and therefore neither applies to all biobank-based research. Not only is it challenging to determine when the HIPAA Privacy Rule or the Common Rule apply, but these laws apply different standards to protect privacy. In addition, many other federal and state laws may be applicable to a particular biobank, researcher, or project. US law also does not directly address international sharing of data or specimens outside of the EU-US Safe Harbor Agreement, which only applies to receipt of data by certain US entities from EU countries, and is in the process of revision. Although new rules would help clarify privacy protections in biobanking, any implemented changes should be studied to determine the sufficiency of the protections as well as its ability to facilitate or hinder international collaborations. © 2016 American Society of Law, Medicine & Ethics.

  16. 48 CFR 724.202 - Policy.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... PROGRAMS PROTECTION OF PRIVACY AND FREEDOM OF INFORMATION Freedom of Information Act 724.202 Policy. The U.S. Agency for International Development's policies concerning implementation of the Freedom of...

  17. Adult Literacy Policy and Performance in Malawi: An Analysis.

    ERIC Educational Resources Information Center

    Bhola, H. S.

    In Malawi, adult literacy deserves immediate attention in order to promote health, family planning, and productivity. While policy commitment for adult literacy promotion has not been lacking, intensified action has been. In 1979 the government accepted the Unesco Mission Report to undertake a functional literacy program on the successful…

  18. Implementation of data security and data privacy provisions will bring sweeping changes to laboratory service providers.

    PubMed

    Boothe, J F

    2000-01-01

    The Health Insurance Portability and Accountability Act included substantial changes involving handling of health information by establishing national standards for electronic transactions, data privacy, and data security. The first final rule for electronic transaction standards was published August 17, 2000. The remaining final rules are expected to be published in Winter 2000. Providers, such as clinical laboratories, will have 26 months from the data of publication to comply. The civil monetary fines for noncompliance are substantial. This article will review the key provisions of the data security and data privacy proposed rules. These provisions will touch virtually every aspect of electronic claims submissions, electronic data transactions, and the electronic storage of medical information. The proposed rules will require a coordinated approach by providers to develop the policies and procedures, and the technical and physical infrastructure to protect health information. Moreover, providers will need to identify a privacy officer, to review existing privacy policies to compare the proposed rule with any existing state laws to determine which may be more stringent, and to develop new policies to address the particular requirements of the final rule.

  19. 32 CFR 310.5 - Policy.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 32 National Defense 2 2014-07-01 2014-07-01 false Policy. 310.5 Section 310.5 National Defense Department of Defense (Continued) OFFICE OF THE SECRETARY OF DEFENSE (CONTINUED) PRIVACY PROGRAM DOD PRIVACY... and fundamental right that shall be respected and protected. (1) The Department's need to collect...

  20. Privacy Awareness: A Means to Solve the Privacy Paradox?

    NASA Astrophysics Data System (ADS)

    Pötzsch, Stefanie

    People are limited in their resources, i.e. they have limited memory capabilities, cannot pay attention to too many things at the same time, and forget much information after a while; computers do not suffer from these limitations. Thus, revealing personal data in electronic communication environments and being completely unaware of the impact of privacy might cause a lot of privacy issues later. Even if people are privacy aware in general, the so-called privacy paradox shows that they do not behave according to their stated attitudes. This paper discusses explanations for the existing dichotomy between the intentions of people towards disclosure of personal data and their behaviour. We present requirements on tools for privacy-awareness support in order to counteract the privacy paradox.

  1. Privacy and Technology: Counseling Institutions of Higher Education.

    ERIC Educational Resources Information Center

    Cranman, Kevin A.

    1998-01-01

    Examines the challenges to colleges and universities associated with maintaining privacy as use of technology increases and technology advances. Lapses in security, types of information needing protection, liability under federal laws, other relevant laws and pending legislation, ethics, and policy implementation in the electronic age are…

  2. Privacy and data security in E-health: requirements from the user's perspective.

    PubMed

    Wilkowska, Wiktoria; Ziefle, Martina

    2012-09-01

    In this study two currently relevant aspects of using medical assistive technologies were addressed-security and privacy. In a two-step empirical approach that used focus groups (n = 19) and a survey (n = 104), users' requirements for the use of medical technologies were collected and evaluated. Specifically, we focused on the perceived importance of data security and privacy issues. Outcomes showed that both security and privacy aspects play an important role in the successful adoption of medical assistive technologies in the home environment. In particular, analysis of data with respect to gender, health-status and age (young, middle-aged and old users) revealed that females and healthy adults require, and insist on, the highest security and privacy standards compared with males and the ailing elderly.

  3. Medical privacy and the disclosure of personal medical information: the beliefs and experiences of those with genetic and other clinical conditions.

    PubMed

    Kass, Nancy E; Hull, Sara Chandros; Natowicz, Marvin R; Faden, Ruth R; Plantinga, Laura; Gostin, Lawrence O; Slutsman, Julia

    2004-07-30

    There has been heightened legislative attention to medical privacy and to protections from genetic discrimination, without large-scale studies to document privacy concerns or analysis of whether experiences differ by whether the condition is genetic (defined here as a single-gene disorder) or non-genetic. To determine whether experiences regarding privacy, disclosure, and consequences of disclosure differ by whether one's medical condition is genetic, we conducted a descriptive study with one-time, structured quantitative and qualitative interviews. We interviewed approximately 100 adults or parents of children with each of the following medical conditions: sickle cell disease, cystic fibrosis, diabetes, and HIV, and 200 adults with or at risk for breast cancer or colon cancer. The percentages of the total 597 respondents experiencing positive or negative consequences of disclosure and the degree to which experiences differed by whether the condition was genetic were the outcomes of interest. Seventy-four percent were glad and 13% regretted others knew about their condition; these findings did not differ significantly by genetic vs. non-genetic condition. Reports of job and health insurance discrimination were not uncommon for the overall study population (19 and 27%, respectively) but were more likely among those with genetic conditions (30 and 37%, respectively). Legislation and other policy-making should target the needs of persons with all conditions and not focus exclusively on genetic discrimination, given that experiences and concerns generally do not differ based on the genetic etiology of the condition. Copyright 2004 Wiley-Liss, Inc.

  4. Genetic secrets: Protecting privacy and confidentiality in the genetic era

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Rothstein, M.A.

    1998-07-01

    Few developments are likely to affect human beings more profoundly in the long run than the discoveries resulting from advances in modern genetics. Although the developments in genetic technology promise to provide many additional benefits, their application to genetic screening poses ethical, social, and legal questions, many of which are rooted in issues of privacy and confidentiality. The ethical, practical, and legal ramifications of these and related questions are explored in depth. The broad range of topics includes: the privacy and confidentiality of genetic information; the challenges to privacy and confidentiality that may be projected to result from the emergingmore » genetic technologies; the role of informed consent in protecting the confidentiality of genetic information in the clinical setting; the potential uses of genetic information by third parties; the implications of changes in the health care delivery system for privacy and confidentiality; relevant national and international developments in public policies, professional standards, and laws; recommendations; and the identification of research needs.« less

  5. Privacy as an enabler, not an impediment: building trust into health information exchange.

    PubMed

    McGraw, Deven; Dempsey, James X; Harris, Leslie; Goldman, Janlori

    2009-01-01

    Building privacy and security protections into health information technology systems will bolster trust in such systems and promote their adoption. The privacy issue, too long seen as a barrier to electronic health information exchange, can be resolved through a comprehensive framework that implements core privacy principles, adopts trusted network design characteristics, and establishes oversight and accountability mechanisms. The public policy challenges of implementing this framework in a complex and evolving environment will require improvements to existing law, new rules for entities outside the traditional health care sector, a more nuanced approach to the role of consent, and stronger enforcement mechanisms.

  6. Security controls in an integrated Biobank to protect privacy in data sharing: rationale and study design.

    PubMed

    Takai-Igarashi, Takako; Kinoshita, Kengo; Nagasaki, Masao; Ogishima, Soichi; Nakamura, Naoki; Nagase, Sachiko; Nagaie, Satoshi; Saito, Tomo; Nagami, Fuji; Minegishi, Naoko; Suzuki, Yoichi; Suzuki, Kichiya; Hashizume, Hiroaki; Kuriyama, Shinichi; Hozawa, Atsushi; Yaegashi, Nobuo; Kure, Shigeo; Tamiya, Gen; Kawaguchi, Yoshio; Tanaka, Hiroshi; Yamamoto, Masayuki

    2017-07-06

    With the goal of realizing genome-based personalized healthcare, we have developed a biobank that integrates personal health, genome, and omics data along with biospecimens donated by volunteers of 150,000. Such a large-scale of data integration involves obvious risks of privacy violation. The research use of personal genome and health information is a topic of global discussion with regard to the protection of privacy while promoting scientific advancement. The present paper reports on our plans, current attempts, and accomplishments in addressing security problems involved in data sharing to ensure donor privacy while promoting scientific advancement. Biospecimens and data have been collected in prospective cohort studies with the comprehensive agreement. The sample size of 150,000 participants was required for multiple researches including genome-wide screening of gene by environment interactions, haplotype phasing, and parametric linkage analysis. We established the T ohoku M edical M egabank (TMM) data sharing policy: a privacy protection rule that requires physical, personnel, and technological safeguards against privacy violation regarding the use and sharing of data. The proposed policy refers to that of NCBI and that of the Sanger Institute. The proposed policy classifies shared data according to the strength of re-identification risks. Local committees organized by TMM evaluate re-identification risk and assign a security category to a dataset. Every dataset is stored in an assigned segment of a supercomputer in accordance with its security category. A security manager should be designated to handle all security problems at individual data use locations. The proposed policy requires closed networks and IP-VPN remote connections. The mission of the biobank is to distribute biological resources most productively. This mission motivated us to collect biospecimens and health data and simultaneously analyze genome/omics data in-house. The biobank also has the

  7. 32 CFR 311.4 - Policy.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 32 National Defense 2 2010-07-01 2010-07-01 false Policy. 311.4 Section 311.4 National Defense... THE SECRETARY OF DEFENSE AND JOINT STAFF PRIVACY PROGRAM § 311.4 Policy. It is DoD policy, in... manner that complies with the law and DoD policy. Any information collected by WHS-Serviced Components...

  8. Balancing Cyberspace Promise, Privacy, and Protection: Tracking the Debate.

    ERIC Educational Resources Information Center

    Metivier-Carreiro, Karen A.; LaFollette, Marcel C.

    1997-01-01

    Examines aspects of cyberspace policy: Internet content and expectations; privacy: medical information and data collected by the government; and the regulation of offensive material: the Communications Decency Act, Internet filters, and the American Library Association's proactive great Web sites for children. Suggests that even "child…

  9. Surveillance versus Privacy: Considerations for the San Bernardino Community

    ERIC Educational Resources Information Center

    Price, Robert

    2017-01-01

    This privacy versus security doctoral research examines existing literature, policies, and perceptions to identify the effects of the 2015 San Bernardino terrorist attack on the San Bernardino community. This study contributes to identifying factors that influence perceptions of governmental surveillance. Multiple articles contribute to the…

  10. Reinterpreting Lifelong Learning: Meanings of Adult Education Policy in Portugal, 1999-2010

    ERIC Educational Resources Information Center

    Guimaraes, Paula

    2013-01-01

    This article analyses Portugal's adult education policy between 1999 and 2010. Our empirical material consists of Portuguese as well as supranational policy documents. We use a theoretical framework which distinguishes three models of public policy, with different views on the roles of public policy and of education: (1) participative…

  11. Drug benefit decisions among older adults: a policy-capturing analysis.

    PubMed

    Cline, Richard R; Gupta, Kiran

    2006-01-01

    Under the Medicare Prescription Drug Improvement and Modernization Act, beneficiaries remaining in the traditional fee-for-service plan will face a variety of drug benefit options provided by private stand-alone prescription drug plans. Although these plans likely will differ with regard to a number of important attributes, little is known about older adults' judgment processes in this context. The objectives of this study were to 1) better understand the manner in which drug insurance attributes are weighted in older adults' judgments of drug benefit suitability, 2) explore variability in judgment strategies among seniors, and 3) assess seniors' insight into their judgment policies. Three focus groups were conducted with 19 older adults to elicit important drug plan attributes. A policy-capturing study with 32 seniors, none of whom had participated in the focus groups, then was employed to quantify the impacts of these attributes on judgments of plan suitability. Focus group participants reported that copayment, monthly premium, deductible, formulary use, and mail-order pharmacy use were important drug insurance attributes. The policy-capturing study showed that deductibles and premiums were weighted most heavily in judgment formation. However, significant variability in judgment policies was apparent, with 3 distinct groups emerging from cluster analysis. The first emphasized deductibles and copayments, the second premiums and deductibles, and the third use of a mail-order pharmacy and deductibles. Study volunteers exhibited insight into the role of some plan attributes in their judgments, but not others. Cost-sharing provisions appear to be most important in older adults' evaluations of drug benefit plans. However, significant heterogeneity in attribute preferences also was apparent in this study. Older adults may not be cognizant of the manner in which some plan attributes affect their evaluations, suggesting a role for decision aids in this process.

  12. 76 FR 64115 - Privacy Act of 1974; Privacy Act System of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-10-17

    ... NATIONAL AERONAUTICS AND SPACE ADMINISTRATION [Notice (11-092)] Privacy Act of 1974; Privacy Act... retirement of one Privacy Act system of records notice. SUMMARY: In accordance with the Privacy Act of 1974, NASA is giving notice that it proposes to cancel the following Privacy Act system of records notice...

  13. Genetic privacy.

    PubMed

    Sankar, Pamela

    2003-01-01

    During the past 10 years, the number of genetic tests performed more than tripled, and public concern about genetic privacy emerged. The majority of states and the U.S. government have passed regulations protecting genetic information. However, research has shown that concerns about genetic privacy are disproportionate to known instances of information misuse. Beliefs in genetic determinacy explain some of the heightened concern about genetic privacy. Discussion of the debate over genetic testing within families illustrates the most recent response to genetic privacy concerns.

  14. Public Opinion about the Importance of Privacy in Biobank Research

    PubMed Central

    Kaufman, David J.; Murphy-Bollinger, Juli; Scott, Joan; Hudson, Kathy L.

    2009-01-01

    Concerns about privacy may deter people from participating in genetic research. Recruitment and retention of biobank participants requires understanding the nature and magnitude of these concerns. Potential participants in a proposed biobank were asked about their willingness to participate, their privacy concerns, informed consent, and data sharing. A representative survey of 4659 U.S. adults was conducted. Ninety percent of respondents would be concerned about privacy, 56% would be concerned about researchers having their information, and 37% would worry that study data could be used against them. However, 60% would participate in the biobank if asked. Nearly half (48%) would prefer to provide consent once for all research approved by an oversight panel, whereas 42% would prefer to provide consent for each project separately. Although 92% would allow academic researchers to use study data, 80% and 75%, respectively, would grant access to government and industry researchers. Concern about privacy was related to lower willingness to participate only when respondents were told that they would receive $50 for participation and would not receive individual research results back. Among respondents who were told that they would receive $200 or individual research results, privacy concerns were not related to willingness. Survey respondents valued both privacy and participation in biomedical research. Despite pervasive privacy concerns, 60% would participate in a biobank. Assuring research participants that their privacy will be protected to the best of researchers' abilities may increase participants' acceptance of consent for broad research uses of biobank data by a wide range of researchers. PMID:19878915

  15. Public opinion about the importance of privacy in biobank research.

    PubMed

    Kaufman, David J; Murphy-Bollinger, Juli; Scott, Joan; Hudson, Kathy L

    2009-11-01

    Concerns about privacy may deter people from participating in genetic research. Recruitment and retention of biobank participants requires understanding the nature and magnitude of these concerns. Potential participants in a proposed biobank were asked about their willingness to participate, their privacy concerns, informed consent, and data sharing. A representative survey of 4659 U.S. adults was conducted. Ninety percent of respondents would be concerned about privacy, 56% would be concerned about researchers having their information, and 37% would worry that study data could be used against them. However, 60% would participate in the biobank if asked. Nearly half (48%) would prefer to provide consent once for all research approved by an oversight panel, whereas 42% would prefer to provide consent for each project separately. Although 92% would allow academic researchers to use study data, 80% and 75%, respectively, would grant access to government and industry researchers. Concern about privacy was related to lower willingness to participate only when respondents were told that they would receive $50 for participation and would not receive individual research results back. Among respondents who were told that they would receive $200 or individual research results, privacy concerns were not related to willingness. Survey respondents valued both privacy and participation in biomedical research. Despite pervasive privacy concerns, 60% would participate in a biobank. Assuring research participants that their privacy will be protected to the best of researchers' abilities may increase participants' acceptance of consent for broad research uses of biobank data by a wide range of researchers.

  16. Challenges for Policy and Standards for Adult and Higher Education

    ERIC Educational Resources Information Center

    Wheelan, Belle S.

    2016-01-01

    This chapter addresses educational policy as a force that contemporary adult education would be required to reckon with from the point of view of an accreditor. It identifies the issues and projects shifts that are currently taking place in higher education policy at the national, state, and regional levels.

  17. Efficient Method of Achieving Agreements between Individuals and Organizations about RFID Privacy

    NASA Astrophysics Data System (ADS)

    Cha, Shi-Cho

    This work presents novel technical and legal approaches that address privacy concerns for personal data in RFID systems. In recent years, to minimize the conflict between convenience and the privacy risk of RFID systems, organizations have been requested to disclose their policies regarding RFID activities, obtain customer consent, and adopt appropriate mechanisms to enforce these policies. However, current research on RFID typically focuses on enforcement mechanisms to protect personal data stored in RFID tags and prevent organizations from tracking user activity through information emitted by specific RFID tags. A missing piece is how organizations can obtain customers' consent efficiently and flexibly. This study recommends that organizations obtain licenses automatically or semi-automatically before collecting personal data via RFID technologies rather than deal with written consents. Such digitalized and standard licenses can be checked automatically to ensure that collection and use of personal data is based on user consent. While individuals can easily control who has licenses and license content, the proposed framework provides an efficient and flexible way to overcome the deficiencies in current privacy protection technologies for RFID systems.

  18. Development, Regional Training Policy and Adult Education.

    ERIC Educational Resources Information Center

    Scheffknecht, J. J.

    Interest in a regional and local approach to vocational training and adult education is increasing throughout the member nations of the Council of Europe. This is largely a result of the changing European economic order and the new internationalization of industrial strategies. Particularly needed is a targeted local and regional policy for the…

  19. 22 CFR 308.2 - Policy.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 22 Foreign Relations 2 2014-04-01 2014-04-01 false Policy. 308.2 Section 308.2 Foreign Relations PEACE CORPS IMPLEMENTATION OF THE PRIVACY ACT OF 1974 § 308.2 Policy. It is the policy of the Peace... records including adequate opportunity to correct any errors in said records. It is further the policy of...

  20. Couldn't or wouldn't? The influence of privacy concerns and self-efficacy in privacy management on privacy protection.

    PubMed

    Chen, Hsuan-Ting; Chen, Wenghong

    2015-01-01

    Sampling 515 college students, this study investigates how privacy protection, including profile visibility, self-disclosure, and friending, are influenced by privacy concerns and efficacy regarding one's own ability to manage privacy settings, a factor that researchers have yet to give a great deal of attention to in the context of social networking sites (SNSs). The results of this study indicate an inconsistency in adopting strategies to protect privacy, a disconnect from limiting profile visibility and friending to self-disclosure. More specifically, privacy concerns lead SNS users to limit their profile visibility and discourage them from expanding their network. However, they do not constrain self-disclosure. Similarly, while self-efficacy in privacy management encourages SNS users to limit their profile visibility, it facilitates self-disclosure. This suggests that if users are limiting their profile visibility and constraining their friending behaviors, it does not necessarily mean they will reduce self-disclosure on SNSs because these behaviors are predicted by different factors. In addition, the study finds an interaction effect between privacy concerns and self-efficacy in privacy management on friending. It points to the potential problem of increased risk-taking behaviors resulting from high self-efficacy in privacy management and low privacy concerns.

  1. Transnationalization of Czech Adult Education Policy as Glocalization of the World and European Policy Mainstream(s)

    ERIC Educational Resources Information Center

    Kopecký, Martin

    2014-01-01

    This article focuses on the development of Czech adult education policy over the past twenty years. It comments on the fact that the processes of globalization and Europeanization represent the most significant factor of that policy. The introductory part presents the historical development from the mid-nineteenth century until the end of the…

  2. Strategies for maintaining patient privacy in i2b2.

    PubMed

    Murphy, Shawn N; Gainer, Vivian; Mendis, Michael; Churchill, Susanne; Kohane, Isaac

    2011-12-01

    The re-use of patient data from electronic healthcare record systems can provide tremendous benefits for clinical research, but measures to protect patient privacy while utilizing these records have many challenges. Some of these challenges arise from a misperception that the problem should be solved technically when actually the problem needs a holistic solution. The authors' experience with informatics for integrating biology and the bedside (i2b2) use cases indicates that the privacy of the patient should be considered on three fronts: technical de-identification of the data, trust in the researcher and the research, and the security of the underlying technical platforms. The security structure of i2b2 is implemented based on consideration of all three fronts. It has been supported with several use cases across the USA, resulting in five privacy categories of users that serve to protect the data while supporting the use cases. The i2b2 architecture is designed to provide consistency and faithfully implement these user privacy categories. These privacy categories help reflect the policy of both the Health Insurance Portability and Accountability Act and the provisions of the National Research Act of 1974, as embodied by current institutional review boards. By implementing a holistic approach to patient privacy solutions, i2b2 is able to help close the gap between principle and practice.

  3. EPA's Public Access Website Children’s Privacy and Copyright Issues

    EPA Pesticide Factsheets

    This document establishes the policy for protecting the privacy of children on EPA’s Public Access Web site. It concerns the collection, both online and off, of information from ages 13 and under, and the display of Personally Identifying Information (PII)

  4. 48 CFR 24.203 - Policy.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 48 Federal Acquisition Regulations System 1 2013-10-01 2013-10-01 false Policy. 24.203 Section 24... PROTECTION OF PRIVACY AND FREEDOM OF INFORMATION Freedom of Information Act 24.203 Policy. (a) The Act... a large and increasing body of court rulings and policy guidance, contracting officers are cautioned...

  5. Adult Education--The Legislative and Policy Environment.

    ERIC Educational Resources Information Center

    Haddad, Sergio, Ed.

    The 10 studies in this volume present a sampling of policy and legislation relating to adult learning in various parts of the world. The articles resulted from an international research project conducted at the UNESCO Institute for Education in conjunction with the University of Florence. They were written by the following contributors: Robb Mason…

  6. Policy forum. Data, privacy, and the greater good.

    PubMed

    Horvitz, Eric; Mulligan, Deirdre

    2015-07-17

    Large-scale aggregate analyses of anonymized data can yield valuable results and insights that address public health challenges and provide new avenues for scientific discovery. These methods can extend our knowledge and provide new tools for enhancing health and wellbeing. However, they raise questions about how to best address potential threats to privacy while reaping benefits for individuals and to society as a whole. The use of machine learning to make leaps across informational and social contexts to infer health conditions and risks from nonmedical data provides representative scenarios for reflections on directions with balancing innovation and regulation. Copyright © 2015, American Association for the Advancement of Science.

  7. The Role of Health Care Experience and Consumer Information Efficacy in Shaping Privacy and Security Perceptions of Medical Records: National Consumer Survey Results

    PubMed Central

    Beckjord, Ellen; Moser, Richard P; Hughes, Penelope; Hesse, Bradford W

    2015-01-01

    Background Providers’ adoption of electronic health records (EHRs) is increasing and consumers have expressed concerns about the potential effects of EHRs on privacy and security. Yet, we lack a comprehensive understanding regarding factors that affect individuals’ perceptions regarding the privacy and security of their medical information. Objective The aim of this study was to describe national perceptions regarding the privacy and security of medical records and identify a comprehensive set of factors associated with these perceptions. Methods Using a nationally representative 2011-2012 survey, we reported on adults’ perceptions regarding privacy and security of medical records and sharing of health information between providers, and whether adults withheld information from a health care provider due to privacy or security concerns. We used multivariable models to examine the association between these outcomes and sociodemographic characteristics, health and health care experience, information efficacy, and technology-related variables. Results Approximately one-quarter of American adults (weighted n=235,217,323; unweighted n=3959) indicated they were very confident (n=989) and approximately half indicated they were somewhat confident (n=1597) in the privacy of their medical records; we found similar results regarding adults’ confidence in the security of medical records (very confident: n=828; somewhat confident: n=1742). In all, 12.33% (520/3904) withheld information from a health care provider and 59.06% (2100/3459) expressed concerns about the security of both faxed and electronic health information. Adjusting for other characteristics, adults who reported higher quality of care had significantly greater confidence in the privacy and security of their medical records and were less likely to withhold information from their health care provider due to privacy or security concerns. Adults with higher information efficacy had significantly greater

  8. A Web Policy Primer.

    ERIC Educational Resources Information Center

    Levine, Elliott

    2001-01-01

    Sound technology policies can spell the difference between an effective website and an online nightmare. An effective web development policy addresses six key areas: roles and responsibilities, content/educational value, privacy and safety, adherence to copyright laws, technical standards, and use of commercial sites and services. (MLH)

  9. Preserving Patient Privacy When Sharing Same-Disease Data.

    PubMed

    Liu, Xiaoping; Li, Xiao-Bai; Motiwalla, Luvai; Li, Wenjun; Zheng, Hua; Franklin, Patricia D

    2016-10-01

    Medical and health data are often collected for studying a specific disease. For such same-disease microdata, a privacy disclosure occurs as long as an individual is known to be in the microdata. Individuals in same-disease microdata are thus subject to higher disclosure risk than those in microdata with different diseases. This important problem has been overlooked in data-privacy research and practice, and no prior study has addressed this problem. In this study, we analyze the disclosure risk for the individuals in same-disease microdata and propose a new metric that is appropriate for measuring disclosure risk in this situation. An efficient algorithm is designed and implemented for anonymizing same-disease data to minimize the disclosure risk while keeping data utility as good as possible. An experimental study was conducted on real patient and population data. Experimental results show that traditional reidentification risk measures underestimate the actual disclosure risk for the individuals in same-disease microdata and demonstrate that the proposed approach is very effective in reducing the actual risk for same-disease data. This study suggests that privacy protection policy and practice for sharing medical and health data should consider not only the individuals' identifying attributes but also the health and disease information contained in the data. It is recommended that data-sharing entities employ a statistical approach, instead of the HIPAA's Safe Harbor policy, when sharing same-disease microdata.

  10. Preserving Patient Privacy When Sharing Same-Disease Data

    PubMed Central

    LIU, XIAOPING; LI, XIAO-BAI; MOTIWALLA, LUVAI; LI, WENJUN; ZHENG, HUA; FRANKLIN, PATRICIA D.

    2016-01-01

    Medical and health data are often collected for studying a specific disease. For such same-disease microdata, a privacy disclosure occurs as long as an individual is known to be in the microdata. Individuals in same-disease microdata are thus subject to higher disclosure risk than those in microdata with different diseases. This important problem has been overlooked in data-privacy research and practice, and no prior study has addressed this problem. In this study, we analyze the disclosure risk for the individuals in same-disease microdata and propose a new metric that is appropriate for measuring disclosure risk in this situation. An efficient algorithm is designed and implemented for anonymizing same-disease data to minimize the disclosure risk while keeping data utility as good as possible. An experimental study was conducted on real patient and population data. Experimental results show that traditional reidentification risk measures underestimate the actual disclosure risk for the individuals in same-disease microdata and demonstrate that the proposed approach is very effective in reducing the actual risk for same-disease data. This study suggests that privacy protection policy and practice for sharing medical and health data should consider not only the individuals’ identifying attributes but also the health and disease information contained in the data. It is recommended that data-sharing entities employ a statistical approach, instead of the HIPAA's Safe Harbor policy, when sharing same-disease microdata. PMID:27867450

  11. Research in the Biotech Age: Can Informational Privacy Compete?

    ERIC Educational Resources Information Center

    Peekhaus, Wilhelm

    2008-01-01

    This article examines the privacy of personal medical information in the health research context. Arguing that biomedical research in Canada has been caught up in the government's broader neoliberal policy agenda that has positioned biotechnology as a strategic driver of economic growth, the author discusses the tension between informational…

  12. 75 FR 50845 - Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security/ALL-027 The...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-08-18

    ... Policy, Department of Homeland Security, Washington, DC 20528. For privacy issues please contact: Mary...;Prices of new books are listed in the first FEDERAL REGISTER issue of each #0;week. #0; #0; #0; #0;#0...] Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security/ALL--027 The History of...

  13. Older Adult Education: A Guide to Research, Programs, and Policies.

    ERIC Educational Resources Information Center

    Manheimer, Ronald J.; And Others

    This guide highlights certain institutional, research, and policy trends in how educational opportunities for older adults have been evolving--especially during the past 15-20 years. Chapter 1 provides an overview of how older adult education looks today within the context of aging issues and programs. It explores purposes, goals, rationales,…

  14. Policy Study of Vocational and Adult Education in Rural Areas.

    ERIC Educational Resources Information Center

    Mertens, Donna M.

    This study of the vocational and adult education system in isolated rural areas was designed to provide information that is necessary for the development of policy for vocational and adult education in isolated rural areas. The study consisted of a review of literature; unstructured interviews with representatives of the business, civic, and…

  15. Efficient Discovery of De-identification Policies Through a Risk-Utility Frontier.

    PubMed

    Xia, Weiyi; Heatherly, Raymond; Ding, Xiaofeng; Li, Jiuyong; Malin, Bradley

    2013-01-01

    Modern information technologies enable organizations to capture large quantities of person-specific data while providing routine services. Many organizations hope, or are legally required, to share such data for secondary purposes (e.g., validation of research findings) in a de-identified manner. In previous work, it was shown de-identification policy alternatives could be modeled on a lattice, which could be searched for policies that met a prespecified risk threshold (e.g., likelihood of re-identification). However, the search was limited in several ways. First, its definition of utility was syntactic - based on the level of the lattice - and not semantic - based on the actual changes induced in the resulting data. Second, the threshold may not be known in advance. The goal of this work is to build the optimal set of policies that trade-off between privacy risk (R) and utility (U), which we refer to as a R-U frontier. To model this problem, we introduce a semantic definition of utility, based on information theory, that is compatible with the lattice representation of policies. To solve the problem, we initially build a set of policies that define a frontier. We then use a probability-guided heuristic to search the lattice for policies likely to update the frontier. To demonstrate the effectiveness of our approach, we perform an empirical analysis with the Adult dataset of the UCI Machine Learning Repository. We show that our approach can construct a frontier closer to optimal than competitive approaches by searching a smaller number of policies. In addition, we show that a frequently followed de-identification policy (i.e., the Safe Harbor standard of the HIPAA Privacy Rule) is suboptimal in comparison to the frontier discovered by our approach.

  16. Efficient Discovery of De-identification Policies Through a Risk-Utility Frontier

    PubMed Central

    Xia, Weiyi; Heatherly, Raymond; Ding, Xiaofeng; Li, Jiuyong; Malin, Bradley

    2014-01-01

    Modern information technologies enable organizations to capture large quantities of person-specific data while providing routine services. Many organizations hope, or are legally required, to share such data for secondary purposes (e.g., validation of research findings) in a de-identified manner. In previous work, it was shown de-identification policy alternatives could be modeled on a lattice, which could be searched for policies that met a prespecified risk threshold (e.g., likelihood of re-identification). However, the search was limited in several ways. First, its definition of utility was syntactic - based on the level of the lattice - and not semantic - based on the actual changes induced in the resulting data. Second, the threshold may not be known in advance. The goal of this work is to build the optimal set of policies that trade-off between privacy risk (R) and utility (U), which we refer to as a R-U frontier. To model this problem, we introduce a semantic definition of utility, based on information theory, that is compatible with the lattice representation of policies. To solve the problem, we initially build a set of policies that define a frontier. We then use a probability-guided heuristic to search the lattice for policies likely to update the frontier. To demonstrate the effectiveness of our approach, we perform an empirical analysis with the Adult dataset of the UCI Machine Learning Repository. We show that our approach can construct a frontier closer to optimal than competitive approaches by searching a smaller number of policies. In addition, we show that a frequently followed de-identification policy (i.e., the Safe Harbor standard of the HIPAA Privacy Rule) is suboptimal in comparison to the frontier discovered by our approach. PMID:25520961

  17. Distributed clinical data sharing via dynamic access-control policy transformation.

    PubMed

    Rezaeibagha, Fatemeh; Mu, Yi

    2016-05-01

    Data sharing in electronic health record (EHR) systems is important for improving the quality of healthcare delivery. Data sharing, however, has raised some security and privacy concerns because healthcare data could be potentially accessible by a variety of users, which could lead to privacy exposure of patients. Without addressing this issue, large-scale adoption and sharing of EHR data are impractical. The traditional solution to the problem is via encryption. Although encryption can be applied to access control, it is not applicable for complex EHR systems that require multiple domains (e.g. public and private clouds) with various access requirements. This study was carried out to address the security and privacy issues of EHR data sharing with our novel access-control mechanism, which captures the scenario of the hybrid clouds and need of access-control policy transformation, to provide secure and privacy-preserving data sharing among different healthcare enterprises. We introduce an access-control mechanism with some cryptographic building blocks and present a novel approach for secure EHR data sharing and access-control policy transformation in EHR systems for hybrid clouds. We propose a useful data sharing system for healthcare providers to handle various EHR users who have various access privileges in different cloud environments. A systematic study has been conducted on data sharing in EHR systems to provide a solution to the security and privacy issues. In conclusion, we introduce an access-control method for privacy protection of EHRs and EHR policy transformation that allows an EHR access-control policy to be transformed from a private cloud to a public cloud. This method has never been studied previously in the literature. Furthermore, we provide a protocol to demonstrate policy transformation as an application scenario. Copyright © 2016 Elsevier Ireland Ltd. All rights reserved.

  18. Building Sustainable Adult Literacy Provision: A Review of International Trends in Adult Literacy Policy and Programs

    ERIC Educational Resources Information Center

    McKenna, Rosa; Fitzpatrick, Lynne

    2004-01-01

    This document summarizes an extensive study of policies and practices in adult literacy and adult basic education in a number of countries undertaken by Rosa McKenna and Lynne Fitzpatrick. The original study contains considerably greater detail and analyses issues on a country-by-country basis. The countries studied--Canada, the Republic of…

  19. 21 CFR 21.60 - Policy.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 21 Food and Drugs 1 2014-04-01 2014-04-01 false Policy. 21.60 Section 21.60 Food and Drugs FOOD AND DRUG ADMINISTRATION, DEPARTMENT OF HEALTH AND HUMAN SERVICES GENERAL PROTECTION OF PRIVACY Exemptions § 21.60 Policy. It is the policy of the Food and Drug Administration that record systems should be...

  20. Risk-Based Models for Managing Data Privacy in Healthcare

    ERIC Educational Resources Information Center

    AL Faresi, Ahmed

    2011-01-01

    Current research in health care lacks a systematic investigation to identify and classify various sources of threats to information privacy when sharing health data. Identifying and classifying such threats would enable the development of effective information security risk monitoring and management policies. In this research I put the first step…

  1. Informational privacy and the public's health: the Model State Public Health Privacy Act.

    PubMed

    Gostin, L O; Hodge, J G; Valdiserri, R O

    2001-09-01

    Protecting public health requires the acquisition, use, and storage of extensive health-related information about individuals. The electronic accumulation and exchange of personal data promises significant public health benefits but also threatens individual privacy; breaches of privacy can lead to individual discrimination in employment, insurance, and government programs. Individuals concerned about privacy invasions may avoid clinical or public health tests, treatments, or research. Although individual privacy protections are critical, comprehensive federal privacy protections do not adequately protect public health data, and existing state privacy laws are inconsistent and fragmented. The Model State Public Health Privacy Act provides strong privacy safeguards for public health data while preserving the ability of state and local public health departments to act for the common good.

  2. Privacy is an essentially contested concept: a multi-dimensional analytic for mapping privacy.

    PubMed

    Mulligan, Deirdre K; Koopman, Colin; Doty, Nick

    2016-12-28

    The meaning of privacy has been much disputed throughout its history in response to wave after wave of new technological capabilities and social configurations. The current round of disputes over privacy fuelled by data science has been a cause of despair for many commentators and a death knell for privacy itself for others. We argue that privacy's disputes are neither an accidental feature of the concept nor a lamentable condition of its applicability. Privacy is essentially contested. Because it is, privacy is transformable according to changing technological and social conditions. To make productive use of privacy's essential contestability, we argue for a new approach to privacy research and practical design, focused on the development of conceptual analytics that facilitate dissecting privacy's multiple uses across multiple contexts.This article is part of the themed issue 'The ethical impact of data science'. © 2016 The Author(s).

  3. The Convergence of Virtual Reality and Social Networks: Threats to Privacy and Autonomy.

    PubMed

    O'Brolcháin, Fiachra; Jacquemard, Tim; Monaghan, David; O'Connor, Noel; Novitzky, Peter; Gordijn, Bert

    2016-02-01

    The rapid evolution of information, communication and entertainment technologies will transform the lives of citizens and ultimately transform society. This paper focuses on ethical issues associated with the likely convergence of virtual realities (VR) and social networks (SNs), hereafter VRSNs. We examine a scenario in which a significant segment of the world's population has a presence in a VRSN. Given the pace of technological development and the popularity of these new forms of social interaction, this scenario is plausible. However, it brings with it ethical problems. Two central ethical issues are addressed: those of privacy and those of autonomy. VRSNs pose threats to both privacy and autonomy. The threats to privacy can be broadly categorized as threats to informational privacy, threats to physical privacy, and threats to associational privacy. Each of these threats is further subdivided. The threats to autonomy can be broadly categorized as threats to freedom, to knowledge and to authenticity. Again, these three threats are divided into subcategories. Having categorized the main threats posed by VRSNs, a number of recommendations are provided so that policy-makers, developers, and users can make the best possible use of VRSNs.

  4. Privacy Preserving Association Rule Mining Revisited: Privacy Enhancement and Resources Efficiency

    NASA Astrophysics Data System (ADS)

    Mohaisen, Abedelaziz; Jho, Nam-Su; Hong, Dowon; Nyang, Daehun

    Privacy preserving association rule mining algorithms have been designed for discovering the relations between variables in data while maintaining the data privacy. In this article we revise one of the recently introduced schemes for association rule mining using fake transactions (FS). In particular, our analysis shows that the FS scheme has exhaustive storage and high computation requirements for guaranteeing a reasonable level of privacy. We introduce a realistic definition of privacy that benefits from the average case privacy and motivates the study of a weakness in the structure of FS by fake transactions filtering. In order to overcome this problem, we improve the FS scheme by presenting a hybrid scheme that considers both privacy and resources as two concurrent guidelines. Analytical and empirical results show the efficiency and applicability of our proposed scheme.

  5. 76 FR 67763 - Privacy Act of 1974; Privacy Act System of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-11-02

    ... NATIONAL AERONAUTICS AND SPACE ADMINISTRATION [Notice (11-109)] Privacy Act of 1974; Privacy Act... proposed revisions to an existing Privacy Act system of records. SUMMARY: Pursuant to the provisions of the Privacy Act of 1974 (5 U.S.C. 552a), the National Aeronautics and Space Administration is issuing public...

  6. 48 CFR 624.202 - Policy.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 48 Federal Acquisition Regulations System 4 2011-10-01 2011-10-01 false Policy. 624.202 Section 624.202 Federal Acquisition Regulations System DEPARTMENT OF STATE SOCIOECONOMIC PROGRAMS PROTECTION OF PRIVACY AND FREEDOM OF INFORMATION Freedom of Information Act 624.202 Policy. DOS regulations...

  7. 48 CFR 2824.202 - Policy.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 48 Federal Acquisition Regulations System 6 2010-10-01 2010-10-01 true Policy. 2824.202 Section 2824.202 Federal Acquisition Regulations System DEPARTMENT OF JUSTICE Socioeconomic Programs PROTECTION OF PRIVACY AND FREEDOM OF INFORMATION Freedom of Information Act 2824.202 Policy. Procedures for...

  8. 48 CFR 2024.202 - Policy.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 48 Federal Acquisition Regulations System 6 2014-10-01 2014-10-01 false Policy. 2024.202 Section 2024.202 Federal Acquisition Regulations System NUCLEAR REGULATORY COMMISSION SOCIOECONOMIC PROGRAMS PROTECTION OF PRIVACY AND FREEDOM OF INFORMATION Freedom of Information Act 2024.202 Policy. The provisions...

  9. 48 CFR 2024.202 - Policy.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 48 Federal Acquisition Regulations System 6 2012-10-01 2012-10-01 false Policy. 2024.202 Section 2024.202 Federal Acquisition Regulations System NUCLEAR REGULATORY COMMISSION SOCIOECONOMIC PROGRAMS PROTECTION OF PRIVACY AND FREEDOM OF INFORMATION Freedom of Information Act 2024.202 Policy. The provisions...

  10. 48 CFR 2824.202 - Policy.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 48 Federal Acquisition Regulations System 6 2012-10-01 2012-10-01 false Policy. 2824.202 Section 2824.202 Federal Acquisition Regulations System DEPARTMENT OF JUSTICE SOCIOECONOMIC PROGRAMS PROTECTION OF PRIVACY AND FREEDOM OF INFORMATION Freedom of Information Act 2824.202 Policy. Procedures for...

  11. 48 CFR 2824.202 - Policy.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 48 Federal Acquisition Regulations System 6 2014-10-01 2014-10-01 false Policy. 2824.202 Section 2824.202 Federal Acquisition Regulations System DEPARTMENT OF JUSTICE SOCIOECONOMIC PROGRAMS PROTECTION OF PRIVACY AND FREEDOM OF INFORMATION Freedom of Information Act 2824.202 Policy. Procedures for...

  12. 48 CFR 2024.202 - Policy.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 48 Federal Acquisition Regulations System 6 2010-10-01 2010-10-01 true Policy. 2024.202 Section 2024.202 Federal Acquisition Regulations System NUCLEAR REGULATORY COMMISSION SOCIOECONOMIC PROGRAMS PROTECTION OF PRIVACY AND FREEDOM OF INFORMATION Freedom of Information Act 2024.202 Policy. The provisions...

  13. Genetic secrets: Protecting privacy and confidentiality in the genetic era. Final report

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Rothstein, M.A.

    1998-09-01

    Few developments are likely to affect human beings more profoundly in the long run than the discoveries resulting from advances in modern genetics. Although the developments in genetic technology promise to provide many additional benefits, their application to genetic screening poses ethical, social, and legal questions, many of which are rooted in issues of privacy and confidentiality. The ethical, practical, and legal ramifications of these and related questions are explored in depth. The broad range of topics includes: the privacy and confidentiality of genetic information; the challenges to privacy and confidentiality that may be projected to result from the emergingmore » genetic technologies; the role of informed consent in protecting the confidentiality of genetic information in the clinical setting; the potential uses of genetic information by third parties; the implications of changes in the health care delivery system for privacy and confidentiality; relevant national and international developments in public policies, professional standards, and laws; recommendations; and the identification of research needs.« less

  14. A proposed legal framework for addressing privacy for patient controlled health records in pediatrics.

    PubMed

    Bourgeois, Fabienne; Taylor, Patrick; Mandl, Kenneth

    2006-01-01

    Patient controlled health records(PCHRs) provide widespread and flexible access to integrated medical information. Unique legal challenges arise where the patient is a minor. Variations in laws and statutes concerning minor's rights to privacy and confidentiality, and institutions' local interpretations of them, need to be integrated in the principles governing PCHRs. We propose a legal framework to guide the development of access policies for PCHRs to ensure appropriate privacy and confidentiality protection surrounding minors.

  15. De Facto Language Policy in Legislation Defining Adult Basic Education in the United States

    ERIC Educational Resources Information Center

    Vanek, Jenifer

    2016-01-01

    This paper investigates the impact of differing interpretation of federal education policy in three different states. The policy, the Workforce Investment Act Title II, has defined the services provided for adult English language learners (ELLs) enrolled in Adult Basic Education programs in the United States since it was passed in 1998. At the…

  16. An In-Depth Analysis of Adult Learning Policies and Their Effectiveness in Europe

    ERIC Educational Resources Information Center

    European Union, 2015

    2015-01-01

    Adult learning policies, like any other policies, need to be effective: they need to reach their objectives and attain the desired impacts, which should be carefully defined. Understanding the performance of policies allows policy makers to change and improve them. A growing body of research and statistics provides important insights into how…

  17. 75 FR 33811 - Office of the National Coordinator for Health Information Technology; HIT Policy Committee's...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-06-15

    ... DEPARTMENT OF HEALTH AND HUMAN SERVICES Office of the National Coordinator for Health Information Technology; HIT Policy Committee's Privacy & Security Tiger Team Meeting; Notice of Meeting AGENCY: Office of... of Committee: HIT Policy Committee's Privacy & Security Tiger Team. General Function of the Committee...

  18. Evidence-Based Policy-Making: The Usability of the Eurostat Adult Education Survey

    ERIC Educational Resources Information Center

    Boeren, Ellen

    2014-01-01

    This article reflects on European education policy which is driven by benchmarks and indicators. While the European benchmark on adult lifelong learning participation--15% to be achieved by 2020--is measured by the Labour Force Survey, the Eurostat Adult Education Survey (AES) was designed to better understand the topic of adult lifelong learning…

  19. Privacy, Self-Regulation, and the Fight for Control of Personal Information.

    ERIC Educational Resources Information Center

    Johnston, Scott D.

    2000-01-01

    Examines the role of self-regulation in the establishment of an informational privacy policy. Discusses information technologies and changes in commerce; personal information in databases; demands for accountability; institutional and enforcement models; legislation; government failures; self-regulation and the individual; and potential problems…

  20. Alcohol Policy Comprehension, Compliance and Consequences Among Young Adult Restaurant Workers

    PubMed Central

    Ames, Genevieve M.; Cunradi, Carol B.; Duke, Michael R.

    2012-01-01

    SUMMARY This study explores relationships between young adult restaurant employees' understanding and compliance with workplace alcohol control policies and consequences of alcohol policy violation. A mixed method analysis of 67 semi-structured interviews and 1,294 telephone surveys from restaurant chain employees found that alcohol policy details confused roughly a third of employees. Among current drinkers (n=1,093), multivariable linear regression analysis found that frequency of alcohol policy violation was positively associated with frequency of experiencing problems at work; perceived supervisor enforcement of alcohol policy was negatively associated with this outcome. Implications for preventing workplace alcohol-related problems include streamlining confusing alcohol policy guidelines. PMID:22984360

  1. Accountability in teenage dating violence: a comparative examination of adult domestic violence and juvenile justice systems policies.

    PubMed

    Zosky, Diane L

    2010-10-01

    Unlike in the adult criminal justice system, where domestic violence policies hold perpetrators accountable for their violence, the juvenile justice system rarely addresses teenage dating violence. Although the adult criminal justice system has pursued policies toward intimate partner violence grounded on a "zero tolerance" ideology, the juvenile justice system was originally founded on an ideology of "child saving" to rehabilitate youths and divert them from the justice system. The implication of policy disparity between the adult criminal justice system and the juvenile justice system may be one contributing reason why teenage dating violence has received a different societal response than adult domestic violence. This article, a comparative examination of juvenile justice and domestic violence policies, reveals very different histories, philosophies, and trajectories of policy development. Teenage dating violence may be "falling through the cracks" between two policy approaches. Perhaps the juvenile justice system could find a balanced approach to adopting the philosophy of zero tolerance or holding teenage perpetrators accountable for their choice to use violence, as the adult criminal justice system does, while at the same time maintaining the "rehabilitative" philosophy of the original juvenile justice policies.

  2. 78 FR 40515 - Privacy Act of 1974; Privacy Act System of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-07-05

    ... NATIONAL AERONAUTICS AND SPACE ADMINISTRATION [Notice 13-071] Privacy Act of 1974; Privacy Act System of Records AGENCY: National Aeronautics and Space Administration (NASA). ACTION: Notice of Privacy... training associated with [[Page 40516

  3. Global, Regional and Local Influences on Adult Literacy Policy in England

    ERIC Educational Resources Information Center

    Hamilton, Mary

    2014-01-01

    This paper explores the relationship between global, regional and local influences on adult literacy policy and practice in the UK through a discourse analysis of policy-related texts. The analysis is framed by theoretical perspectives from literacy studies and socio-material theory. The paper identifies a number of specific features in the UK…

  4. 75 FR 19942 - Information Privacy and Innovation in the Internet Economy

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-04-16

    ...The National Telecommunications and Information Administration (NTIA) and the International Trade Administration (ITA), on behalf of the U.S. Department of Commerce (Department), will hold a public meeting on May 7, 2010, to discuss the nexus between privacy policy and innovation in the Internet economy.

  5. 78 FR 54446 - Privacy Act of 1974: System of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-09-04

    ... Department of Commerce and the public. While the Department of Commerce may use social media applications to... social media applications is subject to the third party privacy policies posted on their Web sites. The... commented or submitted information on a Department of Commerce section on a social media Web site. The...

  6. Universal Individualism and Constructions of the Adult Student in Scottish Adult Education Policy

    ERIC Educational Resources Information Center

    Galloway, Vernon

    2005-01-01

    This article argues that adult education policy in Scotland has been constructed, in particular ways which resonate with significant cultural themes, lending them a currency which appeals to a deep sense of identity. Using the theme of universal individualism, the paper considers how ideas of community and education have been used to maintain the…

  7. Trajectory data privacy protection based on differential privacy mechanism

    NASA Astrophysics Data System (ADS)

    Gu, Ke; Yang, Lihao; Liu, Yongzhi; Liao, Niandong

    2018-05-01

    In this paper, we propose a trajectory data privacy protection scheme based on differential privacy mechanism. In the proposed scheme, the algorithm first selects the protected points from the user’s trajectory data; secondly, the algorithm forms the polygon according to the protected points and the adjacent and high frequent accessed points that are selected from the accessing point database, then the algorithm calculates the polygon centroids; finally, the noises are added to the polygon centroids by the differential privacy method, and the polygon centroids replace the protected points, and then the algorithm constructs and issues the new trajectory data. The experiments show that the running time of the proposed algorithms is fast, the privacy protection of the scheme is effective and the data usability of the scheme is higher.

  8. Student Privacy versus Campus Safety: Has Recent Legislation Compromised Privacy Rights?

    ERIC Educational Resources Information Center

    van der Kaay, Christopher D.

    This study highlights major legislation addressing campus safety and crime reporting and discusses its impact on a student's right to privacy. The 1974 Family Educational Rights and Privacy Act, commonly referred to as the "Buckley Amendment," was among the first pieces of legislation to address the notion of student privacy and confidentiality.…

  9. 48 CFR 2124.102-70 - Policy.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 48 Federal Acquisition Regulations System 6 2012-10-01 2012-10-01 false Policy. 2124.102-70 Section 2124.102-70 Federal Acquisition Regulations System OFFICE OF PERSONNEL MANAGEMENT, FEDERAL... AND FREEDOM OF INFORMATION Protection of Individual Privacy 2124.102-70 Policy. Records retained by...

  10. 48 CFR 2124.102-70 - Policy.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 48 Federal Acquisition Regulations System 6 2014-10-01 2014-10-01 false Policy. 2124.102-70 Section 2124.102-70 Federal Acquisition Regulations System OFFICE OF PERSONNEL MANAGEMENT, FEDERAL... AND FREEDOM OF INFORMATION Protection of Individual Privacy 2124.102-70 Policy. Records retained by...

  11. The Experiences in Processing Policies and Contracts by Adult ESL Readers

    ERIC Educational Resources Information Center

    Abiog, Evalyn B.

    2017-01-01

    The present study describes the experiences of adult English as a Second Language (ESL) readers in processing legal texts prior to entering a financial agreement. A preliminary survey was conducted to determine the commonly read policies and contracts of adult ESL reader-consumers, which revealed those of banks and life-insurance companies; hence,…

  12. Federal Privacy Laws That Apply to Children and Education. Safeguarding Data

    ERIC Educational Resources Information Center

    Data Quality Campaign, 2014

    2014-01-01

    This table identifies and briefly describes the following federal policies that safeguard and protect the confidentiality of personal information: (1) Family Educational Rights and Privacy Act (FERPA); (2) Protection of Pupil Rights Amendment (PPRA); (3) Health Insurance Portability and Accountability Act (HIPAA); (4) Children's Online Privacy…

  13. Privacy and security compliance in the E-healthcare marketplace.

    PubMed

    Lutes, M

    2000-03-01

    Complying with security and privacy regulations proposed by HHS in response to the Health Insurance Portability and Accountability Act (HIPAA) will require healthcare managers to address both internal and external business interactions and initiatives. The proposed regulations mandate certain procedures regarding administration, physical safeguards, technical security for data integrity and confidentiality, and technical security against unauthorized access. In particular, the proposed regulations require organizations to contractually ensure that vendors adhere to the regulations. Healthcare organizations also must implement training procedures for staff members who have contact with protected health information and designate a privacy officer to guard against improper disclosure of such information. Documented policies for organizational decision making are vital to an organization's efforts to implement procedures for compliance with the regulations.

  14. Beyond Lawrence v. Texas: crafting a fundamental right to sexual privacy.

    PubMed

    Fasullo, Kristin

    2009-05-01

    After the watershed 2003 U.S. Supreme Court decision Lawrence v.Texas, courts are faced with the daunting task of navigating the bounds of sexual privacy in light of Lawrence's sweeping language and unconventional structure. This Note focuses on the specific issue of state governments regulating sexual device distribution. Evaluating the substantive due process rights of sexual device retailers and users, this Note ultimately argues that the privacy interest identified in Lawrence is sufficiently broad to protect intimate decisions to engage in adult consensual sexual behavior, including the liberty to sell, purchase, and use a sexual device.

  15. A health app developer's guide to law and policy: a multi-sector policy analysis.

    PubMed

    Parker, Lisa; Karliychuk, Tanya; Gillies, Donna; Mintzes, Barbara; Raven, Melissa; Grundy, Quinn

    2017-10-02

    Apps targeted at health and wellbeing sit in a rapidly growing industry associated with widespread optimism about their potential to deliver accessible and cost-effective healthcare. App developers might not be aware of all the regulatory requirements and best practice principles are emergent. Health apps are regulated in order to minimise their potential for harm due to, for example, loss of personal health privacy, financial costs, and health harms from delayed or unnecessary diagnosis, monitoring and treatment. We aimed to produce a comprehensive guide to assist app developers in producing health apps that are legally compliant and in keeping with high professional standards of user protection. We conducted a case study analysis of the Australian and related international policy environment for mental health apps to identify relevant sectors, policy actors, and policy solutions. We identified 29 policies produced by governments and non-government organisations that provide oversight of health apps. In consultation with stakeholders, we developed an interactive tool targeted at app developers, summarising key features of the policy environment and highlighting legislative, industry and professional standards around seven relevant domains: privacy, security, content, promotion and advertising, consumer finances, medical device efficacy and safety, and professional ethics. We annotated this developer guidance tool with information about: the relevance of each domain; existing legislative and non-legislative guidance; critiques of existing policy; recommendations for developers; and suggestions for other key stakeholders. We anticipate that mental health apps developed in accordance with this tool will be more likely to conform to regulatory requirements, protect consumer privacy, protect consumer finances, and deliver health benefit; and less likely to attract regulatory penalties, offend consumers and communities, mislead consumers, or deliver health harms. We

  16. What's that, you say? Employee expectations of privacy when using employer-provided technology--and how employers can defeat them.

    PubMed

    Herrin, Barry S

    2012-01-01

    Two 2010 court cases that determined the effectiveness of policies governing employees' use of employer-provided communication devices can be used to guide employers when constructing their own technology policies. In light of a policy that stated that "users should have no expectation of privacy or confidentiality," one case established that the employer was in the right. However, a separate case favored the employee due, in part, to an "unclear and ambiguous" policy. Ultimately, employers can restrict the use of employer-furnished technology by employees by: 1) clearly outlining that employees do not have a reasonable expectation of privacy in their use of company devices; 2) stating that any use of personal e-mail accounts using employer-provided technology will be subject to the policy; 3) detailing all technology used to monitor employees; 4) identifying company devices covered; 5) not exposing the content of employee communications; and 6) having employees sign and acknowledge the policy.

  17. What's Going On? An Overview of Adult Education Policies in Spain

    ERIC Educational Resources Information Center

    Lucio-Villegas, Emilio

    2012-01-01

    In this paper, I attempt to present the state of adult education in Spain. Adult education in Spain is not unlike that of other countries in Europe in that it focuses on the policies and practices of lifelong learning rather than on the perspectives of people and communities. However, Spain has two specific characteristics that are distinctive…

  18. Protecting Children's Online Privacy.

    ERIC Educational Resources Information Center

    Kresses, Mamie

    2001-01-01

    Discuss provisions of new federal Children's Online Privacy Protection Act that principals should know to protect student privacy on the Internet. Also discusses relevant provisions of the Family Educational Rights and Privacy Act. (PKP)

  19. HIPAA privacy rules and compliance with federal and state employment laws: the participant authorization form.

    PubMed

    Brislin, Joseph A

    2003-03-01

    Although HIPAA privacy rules do not apply directly to employers or to employment records, they do apply indirectly to employers because employer-sponsored group health plans and all health care providers are covered. HIPAA privacy regulations overlap with federal and state employment laws, and liabilities for breach of confidentiality can be substantial. Employers can use a participant's authorization form to comply with employment laws and company policies. Sample authorization forms are provided at the end of this article.

  20. Context-Aware Generative Adversarial Privacy

    NASA Astrophysics Data System (ADS)

    Huang, Chong; Kairouz, Peter; Chen, Xiao; Sankar, Lalitha; Rajagopal, Ram

    2017-12-01

    Preserving the utility of published datasets while simultaneously providing provable privacy guarantees is a well-known challenge. On the one hand, context-free privacy solutions, such as differential privacy, provide strong privacy guarantees, but often lead to a significant reduction in utility. On the other hand, context-aware privacy solutions, such as information theoretic privacy, achieve an improved privacy-utility tradeoff, but assume that the data holder has access to dataset statistics. We circumvent these limitations by introducing a novel context-aware privacy framework called generative adversarial privacy (GAP). GAP leverages recent advancements in generative adversarial networks (GANs) to allow the data holder to learn privatization schemes from the dataset itself. Under GAP, learning the privacy mechanism is formulated as a constrained minimax game between two players: a privatizer that sanitizes the dataset in a way that limits the risk of inference attacks on the individuals' private variables, and an adversary that tries to infer the private variables from the sanitized dataset. To evaluate GAP's performance, we investigate two simple (yet canonical) statistical dataset models: (a) the binary data model, and (b) the binary Gaussian mixture model. For both models, we derive game-theoretically optimal minimax privacy mechanisms, and show that the privacy mechanisms learned from data (in a generative adversarial fashion) match the theoretically optimal ones. This demonstrates that our framework can be easily applied in practice, even in the absence of dataset statistics.

  1. The Health Insurance Portability and Accountability Act: security and privacy requirements.

    PubMed

    Tribble, D A

    2001-05-01

    The security and privacy requirements of the Health Insurance Portability and Accountability Act of 1996 (HIPAA) and their implications for pharmacy are discussed. HIPAA was enacted to improve the portability of health care insurance for persons leaving jobs. A section of the act encourages the use of electronic communications for health care claims adjudication, mandates the use of new standard code sets and transaction sets, and establishes the need for regulations to protect the security and privacy of individually identifiable health care information. Creating these regulations became the task of the Department of Health and Human Services. Regulations on security have been published for comment. Regulations on privacy and the definition of standard transaction sets and code sets are complete. National identifiers for patients, providers, and payers have not yet been established. The HIPAA regulations on security and privacy will require that pharmacies adopt policies and procedures that limit access to health care information. Existing pharmacy information systems may require upgrading or replacement. Costs of implementation nationwide are estimated to exceed $8 billion. The health care community has two years from the finalization of each regulation to comply with that regulation. The security and privacy requirements of HIPAA will require pharmacies to review their practices regarding the storage, use, and disclosure of protected health care information.

  2. Protecting genetic privacy.

    PubMed

    Roche, P A; Annas, G J

    2001-05-01

    This article outlines the arguments for and against new rules to protect genetic privacy. We explain why genetic information is different to other sensitive medical information, why researchers and biotechnology companies have opposed new rules to protect genetic privacy (and favour anti-discrimination laws instead), and discuss what can be done to protect privacy in relation to genetic-sequence information and to DNA samples themselves.

  3. The Alcohol Policy Environment and Policy Subgroups as Predictors of Binge Drinking Measures Among US Adults

    PubMed Central

    Blanchette, Jason; Nelson, Toben F.; Heeren, Timothy; Oussayef, Nadia; Naimi, Timothy S.

    2015-01-01

    Objectives. We examined the relationships of the state-level alcohol policy environment and policy subgroups with individual-level binge drinking measures. Methods. We used generalized estimating equations regression models to relate the alcohol policy environment based on data from 29 policies in US states from 2004 to 2009 to 3 binge drinking measures in adults from the 2005 to 2010 Behavioral Risk Factor Surveillance System surveys. Results. A 10 percentage point higher alcohol policy environment score, which reflected increased policy effectiveness and implementation, was associated with an 8% lower adjusted odds of binge drinking and binge drinking 5 or more times, and a 10% lower adjusted odds of consuming 10 or more drinks. Policies that targeted the general population rather than the underage population, alcohol consumption rather than impaired driving, and raising the price or reducing the availability of alcohol had the strongest independent associations with reduced binge drinking. Alcohol taxes and outlet density accounted for approximately half of the effect magnitude observed for all policies. Conclusions. A small number of policies that raised alcohol prices and reduced its availability appeared to affect binge drinking. PMID:25122017

  4. Disentangling privacy from property: toward a deeper understanding of genetic privacy.

    PubMed

    Suter, Sonia M

    2004-04-01

    With the mapping of the human genome, genetic privacy has become a concern to many. People care about genetic privacy because genes play an important role in shaping us--our genetic information is about us, and it is deeply connected to our sense of ourselves. In addition, unwanted disclosure of our genetic information, like a great deal of other personal information, makes us vulnerable to unwanted exposure, stigmatization, and discrimination. One recent approach to protecting genetic privacy is to create property rights in genetic information. This Article argues against that approach. Privacy and property are fundamentally different concepts. At heart, the term "property" connotes control within the marketplace and over something that is disaggregated or alienable from the self. "Privacy," in contrast, connotes control over access to the self as well as things close to, intimately connected to, and about the self. Given these different meanings, a regime of property rights in genetic information would impoverish our understanding of that information, ourselves, and the relationships we hope will be built around and through its disclosure. This Article explores our interests in genetic information in order to deepen our understanding of the ongoing discourse about the distinction between property and privacy. It develops a conception of genetic privacy with a strong relational component. We ordinarily share genetic information in the context of relationships in which disclosure is important to the relationship--family, intimate, doctor-patient, researcher-participant, employer-employee, and insurer-insured relationships. Such disclosure makes us vulnerable to and dependent on the person to whom we disclose it. As a result, trust is essential to the integrity of these relationships and our sharing of genetic information. Genetic privacy can protect our vulnerability in these relationships and enhance the trust we hope to have in them. Property, in contrast, by

  5. Policymaking to preserve privacy in disclosure of public health data: a suggested framework.

    PubMed

    Mizani, Mehrdad A; Baykal, Nazife

    2015-03-01

    Health organisations in Turkey gather a vast amount of valuable individual data that can be used for public health purposes. The organisations use rigid methods to remove some useful details from the data while publishing the rest of the data in a highly aggregated form, mostly because of privacy concerns and lack of standardised policies. This action leads to information loss and bias affecting public health research. Hence, organisations need dynamic policies and well-defined procedures rather than a specific algorithm to protect the privacy of individual data. To address this need, we developed a framework for the systematic application of anonymity methods while reducing and objectively reporting the information loss without leaking confidentiality. This framework acts as a roadmap for policymaking by providing high-level pseudo-policies with semitechnical guidelines in addition to some sample scenarios suitable for policymakers, public health programme managers and legislators. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://group.bmj.com/group/rights-licensing/permissions.

  6. Privacy-Enhanced and Multifunctional Health Data Aggregation under Differential Privacy Guarantees.

    PubMed

    Ren, Hao; Li, Hongwei; Liang, Xiaohui; He, Shibo; Dai, Yuanshun; Zhao, Lian

    2016-09-10

    With the rapid growth of the health data scale, the limited storage and computation resources of wireless body area sensor networks (WBANs) is becoming a barrier to their development. Therefore, outsourcing the encrypted health data to the cloud has been an appealing strategy. However, date aggregation will become difficult. Some recently-proposed schemes try to address this problem. However, there are still some functions and privacy issues that are not discussed. In this paper, we propose a privacy-enhanced and multifunctional health data aggregation scheme (PMHA-DP) under differential privacy. Specifically, we achieve a new aggregation function, weighted average (WAAS), and design a privacy-enhanced aggregation scheme (PAAS) to protect the aggregated data from cloud servers. Besides, a histogram aggregation scheme with high accuracy is proposed. PMHA-DP supports fault tolerance while preserving data privacy. The performance evaluation shows that the proposal leads to less communication overhead than the existing one.

  7. Connecting Research, Policy, and Practice. Review of Adult Learning and Literacy, Volume 7

    ERIC Educational Resources Information Center

    Comings, John, Ed.; Garner, Barbara, Ed.; Smith, Christine, Ed.

    2007-01-01

    "Review of Adult Learning and Literacy: Connecting Research, Policy, and Practice, Volume 7" is the newest volume in a series of annual publications of the National Center for the Study of Adult Learning and Literacy (NCSALL) that address major issues, the latest research, and the best practices in the field of adult literacy and…

  8. Supporting the labor force participation of older adults: an international survey of policy options.

    PubMed

    Barusch, Amanda S; Luptak, Marilyn; Hurtado, Marcella

    2009-01-01

    The unprecedented aging of the world's population challenges many institutions, including labor markets and public pension programs. This study was conducted to survey expert opinions regarding conditions and policies that affect employment of older adults. Eighty-nine respondents from 26 nations responded to an Internet survey regarding their own experiences with the aging labor force; factors that encouraged or discouraged labor force participation of older adults; and government responses to these issues. Respondents identified barriers to employment of older adults and described their governments' responses. Findings illuminate a range of current policy options and suggest possible opportunities for innovation.

  9. Support for indoor tanning policies among young adult women who indoor tan.

    PubMed

    Mays, Darren; Murphy, Sarah E; Bubly, Rachel; Atkins, Michael B; Tercyak, Kenneth P

    2016-12-01

    The purpose of this study to examine support for indoor tanning policies and correlates of policy support among young adult women who indoor tan. Non-Hispanic white women ages 18-30 who indoor tanned in the past year (n = 356, M 23.3 age, SD 3.1) recruited in the Washington, DC area from 2013 to 2016 completed measures of indoor tanning behaviors, attitudes, perceptions, beliefs, and policy support. Most women in the sample supported policies to prevent children under the age of 18 from indoor tanning (74.0 %) and stronger warnings about the risks of indoor tanning on tanning devices (77.6 %); only 10.1 % supported a total ban. In multivariable analyses, support for individual indoor tanning policies varied by demographics (e.g., age), frequent indoor tanning behavior, indoor tanning beliefs, and risk perceptions. Non-Hispanic white young adult women who indoor tan, the primary consumers of indoor tanning, and a high-risk population, largely support indoor tanning prevention policies implemented by many state governments and those currently under review for national enactment. Given low levels of support for a total indoor tanning ban, support for other potential policies (e.g., increasing the minimum age to 21) should be investigated to inform future steps to reduce indoor tanning and the associated health risks.

  10. A Policy Analysis of Adult Literacy Education in India: Across the Two National Policy Reviews of 1968 and 1986.

    ERIC Educational Resources Information Center

    Bhola, H. S.

    There have been few, if any, significant changes in educational policy regarding the provision of adult literacy education in India over the past two decades. The changes that have taken place in India's adult literacy programs have occurred in the realm of technology rather than ideology, thereby supporting a continuity in the existing…

  11. Gender and online privacy among teens: risk perception, privacy concerns, and protection behaviors.

    PubMed

    Youn, Seounmi; Hall, Kimberly

    2008-12-01

    Survey data from 395 high school students revealed that girls perceive more privacy risks and have a higher level of privacy concerns than boys. Regarding privacy protection behaviors, boys tended to read unsolicited e-mail and register for Web sites while directly sending complaints in response to unsolicited e-mail. This study found girls to provide inaccurate information as their privacy concerns increased. Boys, however, refrained from registering to Web sites as their concerns increased.

  12. Privacy, confidentiality, and electronic medical records.

    PubMed Central

    Barrows, R C; Clayton, P D

    1996-01-01

    The enhanced availability of health information in an electronic format is strategic for industry-wide efforts to improve the quality and reduce the cost of health care, yet it brings a concomitant concern of greater risk for loss of privacy among health care participants. The authors review the conflicting goals of accessibility and security for electronic medical records and discuss nontechnical and technical aspects that constitute a reasonable security solution. It is argued that with guiding policy and current technology, an electronic medical record may offer better security than a traditional paper record. PMID:8653450

  13. Privacy-Enhanced and Multifunctional Health Data Aggregation under Differential Privacy Guarantees

    PubMed Central

    Ren, Hao; Li, Hongwei; Liang, Xiaohui; He, Shibo; Dai, Yuanshun; Zhao, Lian

    2016-01-01

    With the rapid growth of the health data scale, the limited storage and computation resources of wireless body area sensor networks (WBANs) is becoming a barrier to their development. Therefore, outsourcing the encrypted health data to the cloud has been an appealing strategy. However, date aggregation will become difficult. Some recently-proposed schemes try to address this problem. However, there are still some functions and privacy issues that are not discussed. In this paper, we propose a privacy-enhanced and multifunctional health data aggregation scheme (PMHA-DP) under differential privacy. Specifically, we achieve a new aggregation function, weighted average (WAAS), and design a privacy-enhanced aggregation scheme (PAAS) to protect the aggregated data from cloud servers. Besides, a histogram aggregation scheme with high accuracy is proposed. PMHA-DP supports fault tolerance while preserving data privacy. The performance evaluation shows that the proposal leads to less communication overhead than the existing one. PMID:27626417

  14. Using the Personal Health Train for Automated and Privacy-Preserving Analytics on Vertically Partitioned Data.

    PubMed

    van Soest, Johan; Sun, Chang; Mussmann, Ole; Puts, Marco; van den Berg, Bob; Malic, Alexander; van Oppen, Claudia; Towend, David; Dekker, Andre; Dumontier, Michel

    2018-01-01

    Conventional data mining algorithms are unable to satisfy the current requirements on analyzing big data in some fields such as medicine, policy making, judicial, and tax records. However, applying diverse datasets from different institutes (both healthcare and non-healthcare related) can enrich information and insights. So far, analyzing this data in an automated, privacy-preserving manner does not exist to our knowledge. In this work, we propose an infrastructure, and proof-of-concept for privacy-preserving analytics on vertically partitioned data.

  15. 48 CFR 39.105 - Privacy.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 48 Federal Acquisition Regulations System 1 2012-10-01 2012-10-01 false Privacy. 39.105 Section 39... CONTRACTING ACQUISITION OF INFORMATION TECHNOLOGY General 39.105 Privacy. Agencies shall ensure that contracts for information technology address protection of privacy in accordance with the Privacy Act (5 U.S.C...

  16. 48 CFR 39.105 - Privacy.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 48 Federal Acquisition Regulations System 1 2014-10-01 2014-10-01 false Privacy. 39.105 Section 39... CONTRACTING ACQUISITION OF INFORMATION TECHNOLOGY General 39.105 Privacy. Agencies shall ensure that contracts for information technology address protection of privacy in accordance with the Privacy Act (5 U.S.C...

  17. 48 CFR 39.105 - Privacy.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 48 Federal Acquisition Regulations System 1 2011-10-01 2011-10-01 false Privacy. 39.105 Section 39... CONTRACTING ACQUISITION OF INFORMATION TECHNOLOGY General 39.105 Privacy. Agencies shall ensure that contracts for information technology address protection of privacy in accordance with the Privacy Act (5 U.S.C...

  18. 48 CFR 39.105 - Privacy.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 48 Federal Acquisition Regulations System 1 2013-10-01 2013-10-01 false Privacy. 39.105 Section 39... CONTRACTING ACQUISITION OF INFORMATION TECHNOLOGY General 39.105 Privacy. Agencies shall ensure that contracts for information technology address protection of privacy in accordance with the Privacy Act (5 U.S.C...

  19. [The Comparison of the Difference Between the Emphasis on and the Receipt of Patient Privacy in the Hospital Setting].

    PubMed

    Li, Chiu-Kuel; Lin, Chiou-Fen

    2015-10-01

    Privacy is a unique privilege for humans. Enhancing the balance between the importance given to patient privacy and the receipt of this privacy by patients is one key approach to improving the relationship between patients and the hospital. This study compared the difference between the importance of patient privacy and receipt of this privacy by patients as a reference for future patient privacy policy planning. This study was a cross-sectional design. We randomly sampled three hospitals in northern Taiwan and investigated patients using a questionnaire. The questionnaire was self-designed and verified for reliability and validity. We used frequency and percentage to describe demographic data and used a t-test to compare the deviation between the emphasis on and receipt of patient privacy. There were 296 valid samples in this study and the effective rate was 84.57%. The highest degree of importance was information privacy and the lowest was physical privacy. Physical privacy (t = 3.04, p < .001) and mental privacy (t = 2.42, p < .01) exhibited significant differences between emphasis and receipt. Demographic data on gender, age, education level, marital status, and occupation. Type of hospital and ward level correlated with the emphasis and receipt of privacy. The importance of privacy for physical and mental wellbeing was higher than the actual receipt of this privacy among the patient sample. The importance of privacy for married individuals and young women with high education levels was higher, while males and less-educated individuals scored lower in terms of privacy receipt. Medical agencies must provide higher levels of physical and mental privacy in order to enhance patient satisfaction.

  20. Privacy is an essentially contested concept: a multi-dimensional analytic for mapping privacy

    PubMed Central

    Koopman, Colin; Doty, Nick

    2016-01-01

    The meaning of privacy has been much disputed throughout its history in response to wave after wave of new technological capabilities and social configurations. The current round of disputes over privacy fuelled by data science has been a cause of despair for many commentators and a death knell for privacy itself for others. We argue that privacy’s disputes are neither an accidental feature of the concept nor a lamentable condition of its applicability. Privacy is essentially contested. Because it is, privacy is transformable according to changing technological and social conditions. To make productive use of privacy’s essential contestability, we argue for a new approach to privacy research and practical design, focused on the development of conceptual analytics that facilitate dissecting privacy’s multiple uses across multiple contexts. This article is part of the themed issue ‘The ethical impact of data science’. PMID:28336797

  1. Privacy-Preserving Location-Based Service Scheme for Mobile Sensing Data.

    PubMed

    Xie, Qingqing; Wang, Liangmin

    2016-11-25

    With the wide use of mobile sensing application, more and more location-embedded data are collected and stored in mobile clouds, such as iCloud, Samsung cloud, etc. Using these data, the cloud service provider (CSP) can provide location-based service (LBS) for users. However, the mobile cloud is untrustworthy. The privacy concerns force the sensitive locations to be stored on the mobile cloud in an encrypted form. However, this brings a great challenge to utilize these data to provide efficient LBS. To solve this problem, we propose a privacy-preserving LBS scheme for mobile sensing data, based on the RSA (for Rivest, Shamir and Adleman) algorithm and ciphertext policy attribute-based encryption (CP-ABE) scheme. The mobile cloud can perform location distance computing and comparison efficiently for authorized users, without location privacy leakage. In the end, theoretical security analysis and experimental evaluation demonstrate that our scheme is secure against the chosen plaintext attack (CPA) and efficient enough for practical applications in terms of user side computation overhead.

  2. Professional Development for Adult Education Instructors. State Policy Update.

    ERIC Educational Resources Information Center

    Tolbert, Michelle

    This State Policy Update provides background on professional development (PD) in adult education. Section 2 describes survey methods used to document how states funded and designed their PD systems. Section 3 reviews data collected by the survey of state PD systems, highlighting PD activities in Kentucky, New York, Oregon, and Tennessee. It…

  3. Privacy and Library Records

    ERIC Educational Resources Information Center

    Bowers, Stacey L.

    2006-01-01

    This paper summarizes the history of privacy as it relates to library records. It commences with a discussion of how the concept of privacy first originated through case law and follows the concept of privacy as it has affected library records through current day and the "USA PATRIOT Act."

  4. The role of adult education and learning policy in fostering societal sustainability

    NASA Astrophysics Data System (ADS)

    Milana, Marcella; Rasmussen, Palle; Holford, John

    2016-10-01

    The idea of "sustainability" as a core value has slowly permeated policy and practice at governmental and institutional levels, in public and private policy. However, at times when social and economic crises have revealed the fragility of existing institutions and policies, it is important to consider how sustainability is - and could be - integrated into educational policies. In this theoretical contribution to a special issue on "Societal sustainability", the authors draw on available literature and knowledge. They begin their paper by summarising the conditions under which the concept of "sustainability" entered political discourse in the early 1970s and outline how it has influenced educational research. They then introduce the longstanding debate about the relative role of tradition (in terms of traditional cultural and social order) and change (in terms of efforts to provide learning opportunities for everyone) in adult education. Finally, they argue for a rethinking of the ontology of sustainability: this, they suggest, can shed new light on its relationships with adult education and learning and social justice.

  5. Towards a privacy preserving cohort discovery framework for clinical research networks.

    PubMed

    Yuan, Jiawei; Malin, Bradley; Modave, François; Guo, Yi; Hogan, William R; Shenkman, Elizabeth; Bian, Jiang

    2017-02-01

    The last few years have witnessed an increasing number of clinical research networks (CRNs) focused on building large collections of data from electronic health records (EHRs), claims, and patient-reported outcomes (PROs). Many of these CRNs provide a service for the discovery of research cohorts with various health conditions, which is especially useful for rare diseases. Supporting patient privacy can enhance the scalability and efficiency of such processes; however, current practice mainly relies on policy, such as guidelines defined in the Health Insurance Portability and Accountability Act (HIPAA), which are insufficient for CRNs (e.g., HIPAA does not require encryption of data - which can mitigate insider threats). By combining policy with privacy enhancing technologies we can enhance the trustworthiness of CRNs. The goal of this research is to determine if searchable encryption can instill privacy in CRNs without sacrificing their usability. We developed a technique, implemented in working software to enable privacy-preserving cohort discovery (PPCD) services in large distributed CRNs based on elliptic curve cryptography (ECC). This technique also incorporates a block indexing strategy to improve the performance (in terms of computational running time) of PPCD. We evaluated the PPCD service with three real cohort definitions: (1) elderly cervical cancer patients who underwent radical hysterectomy, (2) oropharyngeal and tongue cancer patients who underwent robotic transoral surgery, and (3) female breast cancer patients who underwent mastectomy) with varied query complexity. These definitions were tested in an encrypted database of 7.1 million records derived from the publically available Healthcare Cost and Utilization Project (HCUP) Nationwide Inpatient Sample (NIS). We assessed the performance of the PPCD service in terms of (1) accuracy in cohort discovery, (2) computational running time, and (3) privacy afforded to the underlying records during PPCD. The

  6. Privacy and Data Protection in Japan.

    ERIC Educational Resources Information Center

    Srinivasan, Srinija

    1992-01-01

    Discussion of individual rights and privacy in Japan focuses on the Privacy Protection Act, which acknowledges the threat posed by government databases to the individual's right of privacy. Characteristics of the Japanese legal system are described, origins of privacy in Japanese law are examined, and privacy and government databases are…

  7. Privacy and occupational health services

    PubMed Central

    Heikkinen, A; Launis, V; Wainwright, P; Leino‐Kilpi, H

    2006-01-01

    Privacy is a key ethical principle in occupational health services. Its importance is emphasised in several laws, in ethical codes of conduct as well as in the literature, yet there is only very limited empirical research on privacy in the occupational health context. Conceptual questions on privacy in the occupational health context are discussed. The baseline assumption is that, in this context, privacy cannot be approached and examined only from the employee's (an individual) vantage point but the employer's (a group) point of view must also be taken into account, and that the concept has several dimensions (physical, social, informational and psychological). Even though privacy is a basic human need, there is no universally accepted definition of the concept and no consensus on whether an organisation can have privacy in the same way as people do. Many of the challenges surrounding privacy in the context of occupational health seem to be associated with the dual loyalties of occupational health professionals towards the employee and employer and with their simultaneous duties of disseminating and protecting information (informational privacy). Privacy is thus not an absolute value, but more research is needed to understand its multidimensional nature in the context of occupational health. PMID:16943333

  8. Mum's the Word: Feds Are Serious About Protecting Patients' Privacy.

    PubMed

    Conde, Crystal

    2010-08-01

    The Health Information Technology for Economic and Clinical Health (HITECH) Act significantly changes HIPAA privacy and security policies that affect physicians. Chief among the changes are the new breach notification regulations, developed by the U.S. Department of Health and Human Services Office for Civil Rights. The Texas Medical Association has developed resources to help physicians comply with the new HIPAA regulations.

  9. Toward Privacy-preserving Content Access Control for Information Centric Networking

    DTIC Science & Technology

    2014-03-01

    REPORT Toward Privacy-preserving Content Access Control for Information Centric Networking 14. ABSTRACT 16. SECURITY CLASSIFICATION OF: Information...regardless the security mechanisms provided by different content hosting servers. However, using ABE has a drawback that the enforced content access...Encryption (ABE) is a flexible approach to enforce the content access policies regardless the security mechanisms provided by different content hosting

  10. Preempting genetic discrimination and assaults on privacy: report of a symposium.

    PubMed

    Shinaman, Aileen; Bain, Lisa J; Shoulson, Ira

    2003-08-01

    At a symposium in June, 2002, biomedical researchers, clinicians, legal experts, policymakers, and representatives of the insurance industry and the advocacy community gathered to address issues of genetic privacy and discrimination; and to identify research, legal, and policy gaps needing to be filled. They concluded that over the next decade, as more genetic information becomes available and the public becomes more aware of individual risks, concerns about privacy and discrimination will become increasingly important. Documented cases of genetic discrimination are rare and largely anecdotal, yet individuals with genetic conditions harbor significant fears about discrimination. Current laws enacted to protect individuals from workplace and insurance discrimination offer some measure of protection, but leave many unfilled gaps. Moreover, the use of genetic information in potentially discriminatory ways is not limited to employment and insurability. Existing laws do little to protect people seeking life, disability, or long-term care insurance. And the courts have used genetic information in a wide variety of cases including paternity, criminal, and tort (personal injury) cases. Genetic information that might jeopardize an individual's right to privacy may also be obtained in the course of research studies, including through the collection of DNA and tissue samples. The insurance industry, State and Federal agencies, and the advocacy community are all making efforts to address some of these gaps through legislation and education of clinicians, the public, and policy makers. Copyright 2003 Wiley-Liss, Inc.

  11. Challenging Representations: Constructing the Adult Literacy Learner over 30 Years of Policy and Practice in the United Kingdom

    ERIC Educational Resources Information Center

    Hamilton, Mary; Pitt, Kathy

    2011-01-01

    This article addresses the question, How do changes in policy discourses shape public representations of literacy learners and the goals of adult literacy education? It examines specifically how the agency of adult literacy learners is constructed. We carry out a critical discourse analysis of two key adult literacy policy documents from the U.K.:…

  12. 48 CFR 1424.203 - Policy.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... PROTECTION OF PRIVACY AND FREEDOM OF INFORMATION Freedom of Information Act 1424.203 Policy. (a) The... restrictions on the disclosure and use of proposal data that certain data may be subject to disclosure under a...

  13. 48 CFR 1424.203 - Policy.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... PROTECTION OF PRIVACY AND FREEDOM OF INFORMATION Freedom of Information Act 1424.203 Policy. (a) The... restrictions on the disclosure and use of proposal data that certain data may be subject to disclosure under a...

  14. 48 CFR 1424.203 - Policy.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... PROTECTION OF PRIVACY AND FREEDOM OF INFORMATION Freedom of Information Act 1424.203 Policy. (a) The... restrictions on the disclosure and use of proposal data that certain data may be subject to disclosure under a...

  15. Youth Drinking in the United States: Relationships With Alcohol Policies and Adult Drinking

    PubMed Central

    Xuan, Ziming; Blanchette, Jason G.; Nelson, Toben F.; Nguyen, Thien H.; Hadland, Scott E.; Oussayef, Nadia L.; Heeren, Timothy C.

    2015-01-01

    BACKGROUND: The relationship between the alcohol policy environment (ie, the combined effectiveness and implementation of multiple existing alcohol policies) and youth drinking in the United States has not been assessed. We hypothesized that stronger alcohol policy environments are inversely associated with youth drinking, and this relationship is partly explained by adult drinking. METHODS: Alcohol Policy Scale (APS) scores that characterized the strength of the state-level alcohol policy environments were assessed with repeated cross-sectional Youth Risk Behavior Survey data of representative samples of high school students in grades 9 to 12, from biennial years between 1999 and 2011. RESULTS: In fully adjusted models, a 10 percentage point increase in APS scores (representing stronger policy environments) was associated with an 8% reduction in the odds of youth drinking and a 7% reduction in the odds of youth binge drinking. After we accounted for youth-oriented alcohol policies, the subgroup of population-oriented policies was independently associated with lower odds of youth drinking (adjusted odds ratio 0.94; 95% confidence interval 0.92–0.97) and youth binge drinking (adjusted odds ratio 0.96; 95% confidence interval 0.94–0.99). State-level per capita consumption mediated the relationship between population-oriented alcohol policies and binge drinking among youth. CONCLUSIONS: Stronger alcohol policies, including those that do not target youth specifically, are related to a reduced likelihood of youth alcohol consumption. These findings suggest that efforts to reduce youth drinking should incorporate population-based policies to reduce excessive drinking among adults as part of a comprehensive approach to preventing alcohol-related harms. Future research should examine influence of alcohol policy subgroups and discrete policies. PMID:26034246

  16. Privacy information management for video surveillance

    NASA Astrophysics Data System (ADS)

    Luo, Ying; Cheung, Sen-ching S.

    2013-05-01

    The widespread deployment of surveillance cameras has raised serious privacy concerns. Many privacy-enhancing schemes have been proposed to automatically redact images of trusted individuals in the surveillance video. To identify these individuals for protection, the most reliable approach is to use biometric signals such as iris patterns as they are immutable and highly discriminative. In this paper, we propose a privacy data management system to be used in a privacy-aware video surveillance system. The privacy status of a subject is anonymously determined based on her iris pattern. For a trusted subject, the surveillance video is redacted and the original imagery is considered to be the privacy information. Our proposed system allows a subject to access her privacy information via the same biometric signal for privacy status determination. Two secure protocols, one for privacy information encryption and the other for privacy information retrieval are proposed. Error control coding is used to cope with the variability in iris patterns and efficient implementation is achieved using surrogate data records. Experimental results on a public iris biometric database demonstrate the validity of our framework.

  17. Social Network Privacy: Overcoming Facebook Policies that put Users at Risk

    DTIC Science & Technology

    2011-01-01

    risks. The Rise of Facebook Facebook is one of the largest web sites in the world. The site was started in 2004 by Mark Zucker- berg when he was...sites collect. Aggregation of Facebook Data Could a more sophisticated aggregation of Facebook data allow privacy to be exposed? Facebook CEO Mark ... Zuckerberg says he is providing “the power to share in or- der to make the world more open…” Facebook’s advanced search allows one to query the

  18. Accountability in Teenage Dating Violence: A Comparative Examination of Adult Domestic Violence and Juvenile Justice Systems Policies

    ERIC Educational Resources Information Center

    Zosky, Diane L.

    2010-01-01

    Unlike in the adult criminal justice system, where domestic violence policies hold perpetrators accountable for their violence, the juvenile justice system rarely addresses teenage dating violence. Although the adult criminal justice system has pursued policies toward intimate partner violence grounded on a "zero tolerance" ideology, the juvenile…

  19. Legal and ethical issues in neuroimaging research: human subjects protection, medical privacy, and the public communication of research results.

    PubMed

    Kulynych, Jennifer

    2002-12-01

    Humans subjects research entails significant legal and ethical obligations. Neuroimaging researchers must be familiar with the requirements of human subjects protection, including evolving standards for the protection of privacy and the disclosure of risk in "non-therapeutic" research. Techniques for creating veridical surface renderings from volumetric anatomical imaging data raise new privacy concerns, particularly under the federal medical privacy regulation. Additionally, neuroimaging researchers must consider their obligation to communicate research results responsibly. The emerging field of neuroethics should strive to raise awareness of these issues and to involve neuroimaging researchers in the legal, ethical, and policy debates that currently surround human subjects research.

  20. Privacy, autonomy, and public policy: French and North American perspectives.

    PubMed

    Merchant, Jennifer

    2016-12-01

    This article raises the question of whether in both the United States and in France, an individual's autonomy and private decision-making right(s) in matters of health care and access to reproductive technologies can be conciliated with the general interest, and more specifically, the role of the State. Can a full-fledged right to privacy, the ability to exercise one's autonomy, exist alongside the general interest, and depend neither on financial resources like in the United States nor on centralised government decisions or the medical hierarchy like in France? The contrast between these two modern democracies justify the importance of comparing them. I will demonstrate that overlaps do exist: the free exercise of religion and opinion, freedom of expression, the inherent value of each individual. What differs, however, are the institutions and how they provide, protect, promote, or frame access to and expressions of these democratic principles. The impact of the global economy, the exposure of people around the world to each other via the internet, and the mirror effects of social media, blogs, and other such forums, have created new perspectives that countries project onto one another. For example, does France now seem to tout 'autonomy' as a new and important value because it appears to be an 'American success story'? Does the United States now seem to value human rights and a social-democratic approach because of the 'French model'? There seems to be some truth behind these assertions, but as this article will demonstrate, the portrayals of what the 'right to privacy' is in the United States and what 'socialised medicine' is in France are not necessarily fully accurate.

  1. Privacy Act Statement

    EPA Pesticide Factsheets

    Any information you provide to the Environmental Protection Agency’s (EPA) Suspension and Debarment Program will be governed by the Privacy Act and will be included in the EPA Debarment and Suspension Files, a Privacy Act system of records.

  2. 48 CFR 39.101 - Policy.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ..., including consideration of security of resources, protection of privacy, national security and emergency... information technology, agencies shall include the appropriate information technology security policies and requirements, including use of common security configurations available from the National Institute of...

  3. 48 CFR 39.101 - Policy.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ..., including consideration of security of resources, protection of privacy, national security and emergency... information technology, agencies shall include the appropriate information technology security policies and requirements, including use of common security configurations available from the National Institute of...

  4. 48 CFR 39.101 - Policy.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ..., including consideration of security of resources, protection of privacy, national security and emergency... information technology, agencies shall include the appropriate information technology security policies and requirements, including use of common security configurations available from the National Institute of...

  5. 48 CFR 39.101 - Policy.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ..., including consideration of security of resources, protection of privacy, national security and emergency... information technology, agencies shall include the appropriate information technology security policies and requirements, including use of common security configurations available from the National Institute of...

  6. Partitioning-based mechanisms under personalized differential privacy.

    PubMed

    Li, Haoran; Xiong, Li; Ji, Zhanglong; Jiang, Xiaoqian

    2017-05-01

    Differential privacy has recently emerged in private statistical aggregate analysis as one of the strongest privacy guarantees. A limitation of the model is that it provides the same privacy protection for all individuals in the database. However, it is common that data owners may have different privacy preferences for their data. Consequently, a global differential privacy parameter may provide excessive privacy protection for some users, while insufficient for others. In this paper, we propose two partitioning-based mechanisms, privacy-aware and utility-based partitioning, to handle personalized differential privacy parameters for each individual in a dataset while maximizing utility of the differentially private computation. The privacy-aware partitioning is to minimize the privacy budget waste, while utility-based partitioning is to maximize the utility for a given aggregate analysis. We also develop a t -round partitioning to take full advantage of remaining privacy budgets. Extensive experiments using real datasets show the effectiveness of our partitioning mechanisms.

  7. Partitioning-based mechanisms under personalized differential privacy

    PubMed Central

    Li, Haoran; Xiong, Li; Ji, Zhanglong; Jiang, Xiaoqian

    2017-01-01

    Differential privacy has recently emerged in private statistical aggregate analysis as one of the strongest privacy guarantees. A limitation of the model is that it provides the same privacy protection for all individuals in the database. However, it is common that data owners may have different privacy preferences for their data. Consequently, a global differential privacy parameter may provide excessive privacy protection for some users, while insufficient for others. In this paper, we propose two partitioning-based mechanisms, privacy-aware and utility-based partitioning, to handle personalized differential privacy parameters for each individual in a dataset while maximizing utility of the differentially private computation. The privacy-aware partitioning is to minimize the privacy budget waste, while utility-based partitioning is to maximize the utility for a given aggregate analysis. We also develop a t-round partitioning to take full advantage of remaining privacy budgets. Extensive experiments using real datasets show the effectiveness of our partitioning mechanisms. PMID:28932827

  8. Analyzing privacy requirements: A case study of healthcare in Saudi Arabia.

    PubMed

    Ebad, Shouki A; Jaha, Emad S; Al-Qadhi, Mohammed A

    2016-01-01

    Developing legally compliant systems is a challenging software engineering problem, especially in systems that are governed by law, such as healthcare information systems. This challenge comes from the ambiguities and domain-specific definitions that are found in governmental rules. Therefore, there is a significant business need to automatically analyze privacy texts, extract rules and subsequently enforce them throughout the supply chain. The existing works that analyze health regulations use the U.S. Health Insurance Portability and Accountability Act as a case study. In this article, we applied the Breaux and Antón approach to the text of the Saudi Arabian healthcare privacy regulations; in Saudi Arabia, privacy is among the top dilemmas for public and private healthcare practitioners. As a result, we extracted and analyzed 2 rights, 4 obligations, 22 constraints, and 6 rules. Our analysis can assist requirements engineers, standards organizations, compliance officers and stakeholders by ensuring that their systems conform to Saudi policy. In addition, this article discusses the threats to the study validity and suggests open problems for future research.

  9. Privacy-Preserving Location-Based Service Scheme for Mobile Sensing Data †

    PubMed Central

    Xie, Qingqing; Wang, Liangmin

    2016-01-01

    With the wide use of mobile sensing application, more and more location-embedded data are collected and stored in mobile clouds, such as iCloud, Samsung cloud, etc. Using these data, the cloud service provider (CSP) can provide location-based service (LBS) for users. However, the mobile cloud is untrustworthy. The privacy concerns force the sensitive locations to be stored on the mobile cloud in an encrypted form. However, this brings a great challenge to utilize these data to provide efficient LBS. To solve this problem, we propose a privacy-preserving LBS scheme for mobile sensing data, based on the RSA (for Rivest, Shamir and Adleman) algorithm and ciphertext policy attribute-based encryption (CP-ABE) scheme. The mobile cloud can perform location distance computing and comparison efficiently for authorized users, without location privacy leakage. In the end, theoretical security analysis and experimental evaluation demonstrate that our scheme is secure against the chosen plaintext attack (CPA) and efficient enough for practical applications in terms of user side computation overhead. PMID:27897984

  10. Location Privacy in RFID Applications

    NASA Astrophysics Data System (ADS)

    Sadeghi, Ahmad-Reza; Visconti, Ivan; Wachsmann, Christian

    RFID-enabled systems allow fully automatic wireless identification of objects and are rapidly becoming a pervasive technology with various applications. However, despite their benefits, RFID-based systems also pose challenging risks, in particular concerning user privacy. Indeed, improvident use of RFID can disclose sensitive information about users and their locations allowing detailed user profiles. Hence, it is crucial to identify and to enforce appropriate security and privacy requirements of RFID applications (that are also compliant to legislation). This chapter first discusses security and privacy requirements for RFID-enabled systems, focusing in particular on location privacy issues. Then it explores the advances in RFID applications, stressing the security and privacy shortcomings of existing proposals. Finally, it presents new promising directions for privacy-preserving RFID systems, where as a case study we focus electronic tickets (e-tickets) for public transportation.

  11. VOIP for Telerehabilitation: A Risk Analysis for Privacy, Security and HIPAA Compliance: Part II.

    PubMed

    Watzlaf, Valerie J M; Moeini, Sohrab; Matusow, Laura; Firouzan, Patti

    2011-01-01

    In a previous publication the authors developed a privacy and security checklist to evaluate Voice over Internet Protocol (VoIP) videoconferencing software used between patients and therapists to provide telerehabilitation (TR) therapy. In this paper, the privacy and security checklist that was previously developed is used to perform a risk analysis of the top ten VoIP videoconferencing software to determine if their policies provide answers to the privacy and security checklist. Sixty percent of the companies claimed they do not listen into video-therapy calls unless maintenance is needed. Only 50% of the companies assessed use some form of encryption, and some did not specify what type of encryption was used. Seventy percent of the companies assessed did not specify any form of auditing on their servers. Statistically significant differences across company websites were found for sharing information outside of the country (p=0.010), encryption (p=0.006), and security evaluation (p=0.005). Healthcare providers considering use of VoIP software for TR services may consider using this privacy and security checklist before deciding to incorporate a VoIP software system for TR. Other videoconferencing software that is specific for TR with strong encryption, good access controls, and hardware that meets privacy and security standards should be considered for use with TR.

  12. Ethics and Privacy.

    ERIC Educational Resources Information Center

    Brewer, Erin; Eastmond, Nick; Geertsen, Reed; Johnson, Doug; Lewandowski, Judith; Yeaman, Andrew R. J.

    2003-01-01

    Contains four articles covering trends and issues on ethics and privacy in instructional technology, including: considerations for assessing ethical issues; what schools must do to develop ethical behaviors in students; a privacy primer for educators; and manufacturing technophopia. Each article contains references. (MES)

  13. Evaluating the privacy properties of telephone metadata.

    PubMed

    Mayer, Jonathan; Mutchler, Patrick; Mitchell, John C

    2016-05-17

    Since 2013, a stream of disclosures has prompted reconsideration of surveillance law and policy. One of the most controversial principles, both in the United States and abroad, is that communications metadata receives substantially less protection than communications content. Several nations currently collect telephone metadata in bulk, including on their own citizens. In this paper, we attempt to shed light on the privacy properties of telephone metadata. Using a crowdsourcing methodology, we demonstrate that telephone metadata is densely interconnected, can trivially be reidentified, and can be used to draw sensitive inferences.

  14. Evaluating the privacy properties of telephone metadata

    PubMed Central

    Mayer, Jonathan; Mutchler, Patrick; Mitchell, John C.

    2016-01-01

    Since 2013, a stream of disclosures has prompted reconsideration of surveillance law and policy. One of the most controversial principles, both in the United States and abroad, is that communications metadata receives substantially less protection than communications content. Several nations currently collect telephone metadata in bulk, including on their own citizens. In this paper, we attempt to shed light on the privacy properties of telephone metadata. Using a crowdsourcing methodology, we demonstrate that telephone metadata is densely interconnected, can trivially be reidentified, and can be used to draw sensitive inferences. PMID:27185922

  15. Adult Literacy: Monitoring and Evaluation for Practice and Policy

    NASA Astrophysics Data System (ADS)

    Wagner, Daniel A.

    2008-11-01

    With the advent of the UN Literacy Decade launched in 2003, there is increased emphasis on monitoring and evaluation of adult literacy around the globe. The present paper presents an overview of the main approaches that have been taken to measure adult literacy within and across countries. A particular focus of the present review is to compare and contrast three models of literacy assessment: (1) the "traditional" model based largely on census enumeration, which has been used over recent decades to collect national and regional rates of illiteracy; (2) the large-scale survey techniques employed with the International Adult Literacy Survey and similar models; and (3) an intermediate type of assessment that borrows from the previous two models, and attempts to "tailor" the size and complexity of the survey methodology to the policy questions needing answers (called the SQC model). The present paper suggests that there is no single model or set of methods that are universally appropriate to monitoring and measuring in adult literacy around the world, but that blending both programmatic and comparative models through the SQC approach may bring greater involvement in, and insight into, adult literacy evaluations.

  16. 78 FR 18932 - Public Meeting: Unmanned Aircraft Systems Test Site Program; Privacy Approach

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-03-28

    ... operation of the UAS Test Sites. They are not intended to pre-determine the long- term policy and regulatory...-0061] Public Meeting: Unmanned Aircraft Systems Test Site Program; Privacy Approach AGENCY: Federal... the unmanned aircraft systems (UAS) test site program. The FAA is seeking the views from the public...

  17. Quantifying Differential Privacy under Temporal Correlations

    PubMed Central

    Cao, Yang; Yoshikawa, Masatoshi; Xiao, Yonghui; Xiong, Li

    2017-01-01

    Differential Privacy (DP) has received increasing attention as a rigorous privacy framework. Many existing studies employ traditional DP mechanisms (e.g., the Laplace mechanism) as primitives, which assume that the data are independent, or that adversaries do not have knowledge of the data correlations. However, continuous generated data in the real world tend to be temporally correlated, and such correlations can be acquired by adversaries. In this paper, we investigate the potential privacy loss of a traditional DP mechanism under temporal correlations in the context of continuous data release. First, we model the temporal correlations using Markov model and analyze the privacy leakage of a DP mechanism when adversaries have knowledge of such temporal correlations. Our analysis reveals that the privacy loss of a DP mechanism may accumulate and increase over time. We call it temporal privacy leakage. Second, to measure such privacy loss, we design an efficient algorithm for calculating it in polynomial time. Although the temporal privacy leakage may increase over time, we also show that its supremum may exist in some cases. Third, to bound the privacy loss, we propose mechanisms that convert any existing DP mechanism into one against temporal privacy leakage. Experiments with synthetic data confirm that our approach is efficient and effective. PMID:28883711

  18. Quantifying Differential Privacy under Temporal Correlations.

    PubMed

    Cao, Yang; Yoshikawa, Masatoshi; Xiao, Yonghui; Xiong, Li

    2017-04-01

    Differential Privacy (DP) has received increasing attention as a rigorous privacy framework. Many existing studies employ traditional DP mechanisms (e.g., the Laplace mechanism) as primitives, which assume that the data are independent, or that adversaries do not have knowledge of the data correlations. However, continuous generated data in the real world tend to be temporally correlated, and such correlations can be acquired by adversaries. In this paper, we investigate the potential privacy loss of a traditional DP mechanism under temporal correlations in the context of continuous data release. First, we model the temporal correlations using Markov model and analyze the privacy leakage of a DP mechanism when adversaries have knowledge of such temporal correlations. Our analysis reveals that the privacy loss of a DP mechanism may accumulate and increase over time . We call it temporal privacy leakage . Second, to measure such privacy loss, we design an efficient algorithm for calculating it in polynomial time. Although the temporal privacy leakage may increase over time, we also show that its supremum may exist in some cases. Third, to bound the privacy loss, we propose mechanisms that convert any existing DP mechanism into one against temporal privacy leakage. Experiments with synthetic data confirm that our approach is efficient and effective.

  19. A standardised graphic method for describing data privacy frameworks in primary care research using a flexible zone model.

    PubMed

    Kuchinke, Wolfgang; Ohmann, Christian; Verheij, Robert A; van Veen, Evert-Ben; Arvanitis, Theodoros N; Taweel, Adel; Delaney, Brendan C

    2014-12-01

    To develop a model describing core concepts and principles of data flow, data privacy and confidentiality, in a simple and flexible way, using concise process descriptions and a diagrammatic notation applied to research workflow processes. The model should help to generate robust data privacy frameworks for research done with patient data. Based on an exploration of EU legal requirements for data protection and privacy, data access policies, and existing privacy frameworks of research projects, basic concepts and common processes were extracted, described and incorporated into a model with a formal graphical representation and a standardised notation. The Unified Modelling Language (UML) notation was enriched by workflow and own symbols to enable the representation of extended data flow requirements, data privacy and data security requirements, privacy enhancing techniques (PET) and to allow privacy threat analysis for research scenarios. Our model is built upon the concept of three privacy zones (Care Zone, Non-care Zone and Research Zone) containing databases, data transformation operators, such as data linkers and privacy filters. Using these model components, a risk gradient for moving data from a zone of high risk for patient identification to a zone of low risk can be described. The model was applied to the analysis of data flows in several general clinical research use cases and two research scenarios from the TRANSFoRm project (e.g., finding patients for clinical research and linkage of databases). The model was validated by representing research done with the NIVEL Primary Care Database in the Netherlands. The model allows analysis of data privacy and confidentiality issues for research with patient data in a structured way and provides a framework to specify a privacy compliant data flow, to communicate privacy requirements and to identify weak points for an adequate implementation of data privacy. Copyright © 2014 Elsevier Ireland Ltd. All rights

  20. Sharing health-related data: a privacy test?

    PubMed Central

    Dyke, Stephanie OM; Dove, Edward S; Knoppers, Bartha M

    2016-01-01

    Greater sharing of potentially sensitive data raises important ethical, legal and social issues (ELSI), which risk hindering and even preventing useful data sharing if not properly addressed. One such important issue is respecting the privacy-related interests of individuals whose data are used in genomic research and clinical care. As part of the Global Alliance for Genomics and Health (GA4GH), we examined the ELSI status of health-related data that are typically considered ‘sensitive’ in international policy and data protection laws. We propose that ‘tiered protection’ of such data could be implemented in contexts such as that of the GA4GH Beacon Project to facilitate responsible data sharing. To this end, we discuss a Data Sharing Privacy Test developed to distinguish degrees of sensitivity within categories of data recognised as ‘sensitive’. Based on this, we propose guidance for determining the level of protection when sharing genomic and health-related data for the Beacon Project and in other international data sharing initiatives. PMID:27990299

  1. 75 FR 20298 - Privacy Act Regulations

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-04-19

    ... Part 200 RIN 0430-AA03 Privacy Act Regulations AGENCY: Recovery Accountability and Transparency Board... amend the Board's regulations implementing the Privacy Act of 1974 (Privacy Act), as amended. This proposed rule would exempt certain systems of records from certain sections of the Privacy Act. These...

  2. Locking it down: The privacy and security of mobile medication apps.

    PubMed

    Grindrod, Kelly; Boersema, Jonathan; Waked, Khrystine; Smith, Vivian; Yang, Jilan; Gebotys, Catherine

    2017-01-01

    To explore the privacy and security of free medication applications (apps) available to Canadian consumers. The authors searched the Canadian iTunes store for iOS apps and the Canadian Google Play store for Android apps related to medication use and management. Using an Apple iPad Air 2 and a Google Nexus 7 tablet, 2 reviewers generated a list of apps that met the following inclusion criteria: free, available in English, intended for consumer use and related to medication management. Using a standard data collection form, 2 reviewers independently coded each app for the presence/absence of passwords, the storage of personal health information, a privacy statement, encryption, remote wipe and third-party sharing. A Cohen's Kappa statistic was used to measure interrater agreement. Of the 184 apps evaluated, 70.1% had no password protection or sign-in system. Personal information, including name, date of birth and gender, was requested by 41.8% (77/184) of apps. Contact information, such as address, phone number and email, was requested by 25% (46/184) of apps. Finally, personal health information, other than medication name, was requested by 89.1% (164/184) of apps. Only 34.2% (63/184) of apps had a privacy policy in place. Most free medication apps offer very limited authentication and privacy protocols. As a result, the onus currently falls on patients to input information in these apps selectively and to be aware of the potential privacy issues. Until more secure systems are built, health care practitioners cannot fully support patients wanting to use such apps.

  3. The Impact of Irish Policy and Legislation on How Adults with Learning Disabilities Make Choices

    ERIC Educational Resources Information Center

    Carey, Eileen; Griffiths, Colin

    2016-01-01

    This paper reflects the impact of policy and legislation in the context of how adults with learning disabilities make choices. Following an overview of policies which have improved choice for people with learning disability in the United Kingdom, this paper reviews "choice" in current Irish policy and legislation. This paper, while…

  4. The Risks to Patient Privacy from Publishing Data from Clinical Anesthesia Studies.

    PubMed

    O'Neill, Liam; Dexter, Franklin; Zhang, Nan

    2016-06-01

    In this article, we consider the privacy implications of posting data from small, randomized trials, observational studies, or case series in anesthesia from a few (e.g., 1-3) hospitals. Prior to publishing such data as supplemental digital content, the authors remove attributes that could be used to re-identify individuals, a process known as "anonymization." Posting health information that has been properly "de-identified" is assumed to pose no risks to patient privacy. Yet, computer scientists have demonstrated that this assumption is flawed. We consider various realistic scenarios of how the publication of such data could lead to breaches of patient privacy. Several examples of successful privacy attacks are reviewed, as well as the methods used. We survey the latest models and methods from computer science for protecting health information and their application to posting data from small anesthesia studies. To illustrate the vulnerability of such published data, we calculate the "population uniqueness" for patients undergoing one or more surgical procedures using data from the State of Texas. For a patient selected uniformly at random, the probability that an adversary could match this patient's record to a unique record in the state external database was 42.8% (SE < 0.1%). Despite the 42.8% being an unacceptably high level of risk, it underestimates the risk for patients from smaller states or provinces. We propose an editorial policy that greatly reduces the likelihood of a privacy breach, while supporting the goal of transparency of the research process.

  5. Theme with Variations: Social Policy, Community Care and Adult Education.

    ERIC Educational Resources Information Center

    Lavender, Peter

    1990-01-01

    Changes in British social policy regarding community health care has implications for local education agency (LEA) providers of adult continuing education. LEAs will either have a role in providing staff training and other learning opportunities, will be forced to provide cheaper forms of community care, or will be ignored altogether. (SK)

  6. Privacy for All Students? Talking about and around Trans Students in "Public"

    ERIC Educational Resources Information Center

    Stiegler, Sam

    2016-01-01

    This paper places under examination the arguments used to fight against school policies and legislation intended to guarantee and protect the rights of trans students. That is, the paper's central investigation works to uncover the regimes of truth about children, gender, race and privacy implicit in the methods employed by activists who seek to…

  7. Adult and Community Education Policy in Aotearoa New Zealand 2000-2014: Neoliberal Influences?

    ERIC Educational Resources Information Center

    Leach, Linda

    2014-01-01

    Changes in tertiary education policy in Aotearoa New Zealand in the last decade have impacted on adult and community education (ACE). Marginalized and understood as non-formal education at the turn of the century, ACE is now part of the "tertiary landscape". It is explicitly steered by education policy, its role severely narrowed, its…

  8. More Than Defense in Daily Experience of Privacy: The Functions of Privacy in Digital and Physical Environments

    PubMed Central

    Lombardi, Debora Benedetta; Ciceri, Maria Rita

    2016-01-01

    The purpose of the current study was to investigate the experience of privacy, focusing on its functional role in personal well-being. A sample (N = 180) comprised subjects between 18 and 50 years of age were asked to spontaneously provide accounts of their experiences with privacy and answer close-ended questions to acquire a description of a daily experience of privacy. The results showed the importance attributed to the function of privacy related to the “defense from social threats”, and the twofold function of privacy related to an “achieved state of privacy”, in the terms of both “system maintenance” and “system development”. The results also shed light on the role of the environment in shaping one’s experience of privacy. Specifically, the participants recognized more easily the function of defense from threats related to seeking privacy while interacting in digital environments, whereas they seemed to benefit from positive functions related to an achieved state of privacy in physical environments. The findings sustain the notion of privacy as a supportive condition for some psychological processes involved in the positive human functioning and confirm previous studies conducted on the role of privacy in human well-being. PMID:27247696

  9. 48 CFR 39.105 - Privacy.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... CONTRACTING ACQUISITION OF INFORMATION TECHNOLOGY General 39.105 Privacy. Agencies shall ensure that contracts for information technology address protection of privacy in accordance with the Privacy Act (5 U.S.C... operation of a system of records using commercial information technology services or information technology...

  10. 45 CFR 5b.3 - Policy.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 45 Public Welfare 1 2010-10-01 2010-10-01 false Policy. 5b.3 Section 5b.3 Public Welfare DEPARTMENT OF HEALTH AND HUMAN SERVICES GENERAL ADMINISTRATION PRIVACY ACT REGULATIONS § 5b.3 Policy. It is... public is entitled to have under the Freedom of Information Act, 5 U.S.C. 552, and part 5 of this title. ...

  11. Children's Online Privacy.

    ERIC Educational Resources Information Center

    Aidman, Amy

    2000-01-01

    The first federal Internet privacy law (the Children's Online Privacy Protection Act) provides safeguards for children by regulating collection of their personal information. Unfortunately, teens are not protected. Legislation is pending to protect children from online marketers such as ZapMe! Interactive technologies require constant vigilance.…

  12. Information Privacy Revealed

    ERIC Educational Resources Information Center

    Lavagnino, Merri Beth

    2013-01-01

    Why is Information Privacy the focus of the January-February 2013 issue of "EDUCAUSE Review" and "EDUCAUSE Review Online"? Results from the 2012 annual survey of the International Association of Privacy Professionals (IAPP) indicate that "meeting regulatory compliance requirements continues to be the top perceived driver…

  13. Privacy protection for HealthGrid applications.

    PubMed

    Claerhout, B; De Moor, G J E

    2005-01-01

    This contribution aims at introducing the problem of privacy protection in e-Health and at describing a number of existing privacy enhancing techniques (PETs). The recognition that privacy constitutes a fundamental right is gradually entering public awareness. Because healthcare-related data are susceptible to being abused for many obvious reasons, public apprehension about privacy has focused on medical data. Public authorities have become convinced of the need to enforce privacy protection and make considerable efforts for promoting through privacy protection legislation the deployment of PETs. Based on the study of the specific features of Grid technology, ways in which PET services could be integrated in the HealthGrid are being analyzed. Grid technology aims at removing barriers between local and remote resources. The privacy and legal issues raised by the HealthGrid are caused by the transparent interchange and processing of sensitive medical information. PET technology has already proven its usefulness for privacy protection in health-related marketing and research data collection. While this paper does not describe market-ready solutions for privacy protection in the HealthGrid, it puts forward several cases in which the Grid may benefit from PETs. Early integration of privacy protection services into the HealthGrid can lead to a synergy that is beneficial for the development of the HealthGrid itself.

  14. The Need for Privacy and the Application of Privacy to the Day Care Setting.

    ERIC Educational Resources Information Center

    Jacobs, Ellen

    This paper, focusing on young children's need for privacy, describes a study conducted to determine the manner in which children in day care centers resolve the problem of reduced space and time for privacy. A pilot study revealed that children displayed three privacy seeking behaviors: (1) verbal and nonverbal territorial behavior (use or defense…

  15. Approved Drugs for Adults

    MedlinePlus

    ... Us Quick Links What Is Hepatitis B? Prevention & Diagnosis Treatment & Management Resources & Support Research & Programs News & Events Contact Us Subscribe Disclaimer Privacy Policy 3805 Old Easton Road Doylestown, PA 18902 USA Phone: 215.489.4900 ...

  16. 77 FR 57015 - Privacy Act; Implementation

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-09-17

    ... DEPARTMENT OF DEFENSE Office of the Secretary [Docket ID DoD-2012-OS-0104] 32 CFR Part 319 Privacy... the records in another Privacy Act system of records. DIA is updating the DIA Privacy Act Program by... its Privacy Programs. DoD expects no opposition to the changes and no significant adverse comments...

  17. Employee Privacy Rights: A Management Guide.

    ERIC Educational Resources Information Center

    Shepard, Ira Michael; Olsen, Harry

    Employee privacy rights are considered, along with practical problems and permissible parameters of employer activity. Included is a state-by-state analysis of the status of workplace privacy. Definitions are offered of "invasion of privacy," with attention to four types of privacy invasions: (1) placing someone in a "false light," (2) the public…

  18. Privacy in Social Networks: A Survey

    NASA Astrophysics Data System (ADS)

    Zheleva, Elena; Getoor, Lise

    In this chapter, we survey the literature on privacy in social networks. We focus both on online social networks and online affiliation networks. We formally define the possible privacy breaches and describe the privacy attacks that have been studied. We present definitions of privacy in the context of anonymization together with existing anonymization techniques.

  19. Information Systems, Security, and Privacy.

    ERIC Educational Resources Information Center

    Ware, Willis H.

    1984-01-01

    Computer security and computer privacy issues are discussed. Among the areas addressed are technical and human security threats, security and privacy issues for information in electronic mail systems, the need for a national commission to examine these issues, and security/privacy issues relevant to colleges and universities. (JN)

  20. Privacy Expectations in Online Contexts

    ERIC Educational Resources Information Center

    Pure, Rebekah Abigail

    2013-01-01

    Advances in digital networked communication technology over the last two decades have brought the issue of personal privacy into sharper focus within contemporary public discourse. In this dissertation, I explain the Fourth Amendment and the role that privacy expectations play in the constitutional protection of personal privacy generally, and…

  1. Tax policy, adult binge drinking, and youth alcohol consumption in the United States.

    PubMed

    Xuan, Ziming; Nelson, Toben F; Heeren, Timothy; Blanchette, Jason; Nelson, David E; Gruenewald, Paul; Naimi, Timothy S

    2013-10-01

    Prior research attributed youth alcohol consumption to the attitudes and drinking patterns among adults. Yet at a population level, few have examined the relationship between state-level adult binge drinking prevalence and youth drinking behaviors, or whether tax policy plays a role in this relationship. We analyzed 6 biennial surveys (1999 to 2009) of individual-level youth alcohol use and related behaviors from state-based Youth Risk Behavior Surveys and corresponding years of state-level adult binge drinking prevalence from the Behavioral Risk Factor Surveillance System. We employed logistic regression with generalized estimating equations method to assess the extent to which state adult binge drinking predicted individual-level youth drinking outcomes and examined the role of alcohol taxes in that relationship. Population-aggregate analyses based on 194 state-year strata showed a positive correlation between state adult binge drinking and youth binge drinking (Pearson r = 0.40, p < 0.01). For individual-level youth drinking outcomes, a 5 percentage point increase in binge drinking prevalence among adults was associated with a 12% relative increase in the odds of alcohol use (adjusted OR = 1.12, 95% CI: 1.08, 1.16). Taxes were strongly inversely related with adult and youth drinking measures, and the effect of tax on youth drinking was attenuated after controlling for adult binge drinking. Both tax and adult binge drinking are strong predictors of youth drinking. Tax may affect youth drinking through its effect on adult alcohol consumption. Implementing effective alcohol policies to reduce excessive drinking in the general population is an important strategy to reduce youth drinking. Copyright © 2013 by the Research Society on Alcoholism.

  2. Tax Policy, Adult Binge Drinking, and Youth Alcohol Consumption in the United States

    PubMed Central

    Xuan, Ziming; Nelson, Toben F.; Heeren, Timothy; Blanchette, Jason; Nelson, David E.; Gruenewald, Paul; Naimi, Timothy S.

    2013-01-01

    Background Prior research attributed youth alcohol consumption to the attitudes and drinking patterns among adults. Yet at a population level, few have examined the relationship between state-level adult binge drinking prevalence and youth drinking behaviors, or whether tax policy plays a role in this relationship. Methods We analyzed 6 biennial surveys (1999 to 2009) of individual-level youth alcohol use and related behaviors from state-based Youth Risk Behavior Surveys and corresponding years of state-level adult binge drinking prevalence from the Behavioral Risk Factor Surveillance System. We employed logistic regression with generalized estimating equations method to assess the extent to which state adult binge drinking predicted individual-level youth drinking outcomes and examined the role of alcohol taxes in that relationship. Results Population-aggregate analyses based on 194 state-year strata showed a positive correlation between state adult binge drinking and youth binge drinking (Pearson r = 0.40, p < 0.01). For individual-level youth drinking outcomes, a 5 percentage point increase in binge drinking prevalence among adults was associated with a 12% relative increase in the odds of alcohol use (adjusted OR = 1.12, 95% CI: 1.08, 1.16). Taxes were strongly inversely related with adult and youth drinking measures, and the effect of tax on youth drinking was attenuated after controlling for adult binge drinking. Conclusions Both tax and adult binge drinking are strong predictors of youth drinking. Tax may affect youth drinking through its effect on adult alcohol consumption. Implementing effective alcohol policies to reduce excessive drinking in the general population is an important strategy to reduce youth drinking. PMID:23711219

  3. 12 CFR 332.8 - Revised privacy notices.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 12 Banks and Banking 5 2014-01-01 2014-01-01 false Revised privacy notices. 332.8 Section 332.8... PRIVACY OF CONSUMER FINANCIAL INFORMATION Privacy and Opt Out Notices § 332.8 Revised privacy notices. (a... described in your prior notice. (c) Delivery. When you are required to deliver a revised privacy notice by...

  4. 12 CFR 332.8 - Revised privacy notices.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 12 Banks and Banking 5 2012-01-01 2012-01-01 false Revised privacy notices. 332.8 Section 332.8... PRIVACY OF CONSUMER FINANCIAL INFORMATION Privacy and Opt Out Notices § 332.8 Revised privacy notices. (a... described in your prior notice. (c) Delivery. When you are required to deliver a revised privacy notice by...

  5. 12 CFR 332.8 - Revised privacy notices.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 12 Banks and Banking 5 2013-01-01 2013-01-01 false Revised privacy notices. 332.8 Section 332.8... PRIVACY OF CONSUMER FINANCIAL INFORMATION Privacy and Opt Out Notices § 332.8 Revised privacy notices. (a... described in your prior notice. (c) Delivery. When you are required to deliver a revised privacy notice by...

  6. 12 CFR 332.8 - Revised privacy notices.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 12 Banks and Banking 4 2011-01-01 2011-01-01 false Revised privacy notices. 332.8 Section 332.8... PRIVACY OF CONSUMER FINANCIAL INFORMATION Privacy and Opt Out Notices § 332.8 Revised privacy notices. (a... described in your prior notice. (c) Delivery. When you are required to deliver a revised privacy notice by...

  7. 12 CFR 332.8 - Revised privacy notices.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 12 Banks and Banking 4 2010-01-01 2010-01-01 false Revised privacy notices. 332.8 Section 332.8... PRIVACY OF CONSUMER FINANCIAL INFORMATION Privacy and Opt Out Notices § 332.8 Revised privacy notices. (a... described in your prior notice. (c) Delivery. When you are required to deliver a revised privacy notice by...

  8. Biobank research and the right to privacy.

    PubMed

    Ursin, Lars Oystein

    2008-01-01

    What is privacy? What does privacy mean in relation to biobanking, in what way do the participants have an interest in privacy, (why) is there a right to privacy, and how should the privacy issue be regulated when it comes to biobank research? A relational view of privacy is argued for in this article, which takes as its basis a general discussion of several concepts of privacy and attempts at grounding privacy rights. In promoting and protecting the rights that participants in biobank research might have to privacy, it is argued that their interests should be related to the specific context of the provision and reception of health care that participation in biobank research is connected with. Rather than just granting participants an exclusive right to or ownership of their health information, which must be waived in order to make biobank research possible, the privacy aspect of health information should be viewed in light of the moral rights and duties that accompany any involvement in a research based system of health services.

  9. Privacy and ethics in pediatric environmental health research-part I: genetic and prenatal testing.

    PubMed

    Fisher, Celia B

    2006-10-01

    The pressing need for empirically informed public policies aimed at understanding and promoting children's health has challenged environmental scientists to modify traditional research paradigms and reevaluate their roles and obligations toward research participants. Methodologic approaches to children's environmental health research raise ethical challenges for which federal regulations may provide insufficient guidance. In this article I begin with a general discussion of privacy concerns and informed consent within pediatric environmental health research contexts. I then turn to specific ethical challenges associated with research on genetic determinants of environmental risk, prenatal studies and maternal privacy, and data causing inflicted insight or affecting the informational rights of third parties.

  10. Privacy and Ethics in Pediatric Environmental Health Research—Part I: Genetic and Prenatal Testing

    PubMed Central

    Fisher, Celia B.

    2006-01-01

    The pressing need for empirically informed public policies aimed at understanding and promoting children’s health has challenged environmental scientists to modify traditional research paradigms and reevaluate their roles and obligations toward research participants. Methodologic approaches to children’s environmental health research raise ethical challenges for which federal regulations may provide insufficient guidance. In this article I begin with a general discussion of privacy concerns and informed consent within pediatric environmental health research contexts. I then turn to specific ethical challenges associated with research on genetic determinants of environmental risk, prenatal studies and maternal privacy, and data causing inflicted insight or affecting the informational rights of third parties. PMID:17035153

  11. Documenting death: public access to government death records and attendant privacy concerns.

    PubMed

    Boles, Jeffrey R

    2012-01-01

    This Article examines the contentious relationship between public rights to access government-held death records and privacy rights concerning the deceased, whose personal information is contained in those same records. This right of access dispute implicates core democratic principles and public policy interests. Open access to death records, such as death certificates and autopsy reports, serves the public interest by shedding light on government agency performance, uncovering potential government wrongdoing, providing data on public health trends, and aiding those investigating family history, for instance. Families of the deceased have challenged the release of these records on privacy grounds, as the records may contain sensitive and embarrassing information about the deceased. Legislatures and the courts addressing this dispute have collectively struggled to reconcile the competing open access and privacy principles. The Article demonstrates how a substantial portion of the resulting law in this area is haphazardly formed, significantly overbroad, and loaded with unintended consequences. The Article offers legal reforms to bring consistency and coherence to this currently disordered area of jurisprudence.

  12. VOIP for Telerehabilitation: A Risk Analysis for Privacy, Security and HIPAA Compliance: Part II

    PubMed Central

    Watzlaf, Valerie J.M.; Moeini, Sohrab; Matusow, Laura; Firouzan, Patti

    2011-01-01

    In a previous publication the authors developed a privacy and security checklist to evaluate Voice over Internet Protocol (VoIP) videoconferencing software used between patients and therapists to provide telerehabilitation (TR) therapy. In this paper, the privacy and security checklist that was previously developed is used to perform a risk analysis of the top ten VoIP videoconferencing software to determine if their policies provide answers to the privacy and security checklist. Sixty percent of the companies claimed they do not listen into video-therapy calls unless maintenance is needed. Only 50% of the companies assessed use some form of encryption, and some did not specify what type of encryption was used. Seventy percent of the companies assessed did not specify any form of auditing on their servers. Statistically significant differences across company websites were found for sharing information outside of the country (p=0.010), encryption (p=0.006), and security evaluation (p=0.005). Healthcare providers considering use of VoIP software for TR services may consider using this privacy and security checklist before deciding to incorporate a VoIP software system for TR. Other videoconferencing software that is specific for TR with strong encryption, good access controls, and hardware that meets privacy and security standards should be considered for use with TR. PMID:25945177

  13. User Centric Policy Management

    ERIC Educational Resources Information Center

    Cheek, Gorrell P.

    2013-01-01

    Internet use, in general, and online social networking sites, in particular, are experiencing tremendous growth with hundreds of millions of active users. As a result, there is a tremendous amount of privacy information and content online. Protecting this information is a challenge. Access control policy composition is complex, laborious and…

  14. Toward practicing privacy

    PubMed Central

    Dwork, Cynthia; Pottenger, Rebecca

    2013-01-01

    Private data analysis—the useful analysis of confidential data—requires a rigorous and practicable definition of privacy. Differential privacy, an emerging standard, is the subject of intensive investigation in several diverse research communities. We review the definition, explain its motivation, and discuss some of the challenges to bringing this concept to practice. PMID:23243088

  15. Security of electronic medical information and patient privacy: what you need to know.

    PubMed

    Andriole, Katherine P

    2014-12-01

    The responsibility that physicians have to protect their patients from harm extends to protecting the privacy and confidentiality of patient health information including that contained within radiological images. The intent of HIPAA and subsequent HIPAA Privacy and Security Rules is to keep patients' private information confidential while allowing providers access to and maintaining the integrity of relevant information needed to provide care. Failure to comply with electronic protected health information (ePHI) regulations could result in financial or criminal penalties or both. Protected health information refers to anything that can reasonably be used to identify a patient (eg, name, age, date of birth, social security number, radiology examination accession number). The basic tools and techniques used to maintain medical information security and patient privacy described in this article include physical safeguards such as computer device isolation and data backup, technical safeguards such as firewalls and secure transmission modes, and administrative safeguards including documentation of security policies, training of staff, and audit tracking through system logs. Other important concepts related to privacy and security are explained, including user authentication, authorization, availability, confidentiality, data integrity, and nonrepudiation. Patient privacy and security of medical information are critical elements in today's electronic health care environment. Radiology has led the way in adopting digital systems to make possible the availability of medical information anywhere anytime, and in identifying and working to eliminate any risks to patients. Copyright © 2014 American College of Radiology. Published by Elsevier Inc. All rights reserved.

  16. Advertising and Invasion of Privacy.

    ERIC Educational Resources Information Center

    Rohrer, Daniel Morgan

    The right of privacy as it relates to advertising and the use of a person's name or likeness is discussed in this paper. After an introduction that traces some of the history of invasion of privacy in court decisions, the paper examines cases involving issues such as public figures and newsworthy items, right of privacy waived, right of privacy…

  17. Balancing between two goods: Health Insurance Portability and Accountability Act and ethical compliancy considerations for privacy-sensitive materials in health sciences archival and historical special collections.

    PubMed

    Wiener, Judith A; Gilliland, Anne T

    2011-01-01

    The investigation provides recommendations for establishing institutional collection guidelines and policies that protect the integrity of the historical record, while upholding the privacy and confidentiality of those who are protected by Health Insurance Portability and Accountability Act (HIPAA) or professional ethical standards. The authors completed a systematic historical investigation of the concepts of collection integrity, privacy, and confidentiality in the formal and informal legal and professional ethics literature and applied these standards to create best practices for institutional policies in these areas. Through an in-depth examination of the historical concepts of privacy and confidentiality in the legal and professional ethics literature, the authors were able to create recommendations that would allow institutions to provide access to important, yet sensitive, materials, while complying with the standards set by HIPAA regulations and professional ethical expectations. With thoughtful planning, it is possible to balance the integrity of and access to the historical record of sensitive documents, while supporting the privacy protections of HIPAA and professional ethical standards. Although it is theorized that collection development policies of institutions have changed due to HIPAA legislation, additional research is suggested to see how various legal interpretations have affected the integrity of the historical record in actuality.

  18. 75 FR 81205 - Privacy Act: Revision of Privacy Act Systems of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-12-27

    ... DEPARTMENT OF AGRICULTURE Office of the Secretary Privacy Act: Revision of Privacy Act Systems of.... SUMMARY: Notice is hereby given that the United States Department of Agriculture (USDA) proposes to revise... from participating in SNAP. Dated: December 14, 2010. Thomas J. Vilsack, Secretary of Agriculture...

  19. Do U.S. states' socioeconomic and policy contexts shape adult disability?

    PubMed

    Montez, Jennifer Karas; Hayward, Mark D; Wolf, Douglas A

    2017-04-01

    Growing disparities in adult mortality across U.S. states point to the importance of assessing disparities in other domains of health. Here, we estimate state-level differences in disability, and draw on the WHO socio-ecological framework to assess the role of ecological factors in explaining these differences. Our study is based on data from 5.5 million adults aged 25-94 years in the 2010-2014 waves of the American Community Survey. Disability is defined as difficulty with mobility, independent living, self-care, vision, hearing, or cognition. We first provide estimates of age-standardized and age-specific disability prevalence by state. We then estimate multilevel models to assess how states' socioeconomic and policy contexts shape the probability of having a disability. Age-standardized disability prevalence differs markedly by state, from 12.9% in North Dakota and Minnesota to 23.5% in West Virginia. Disability was lower in states with stronger economic output, more income equality, longer histories of tax credits for low-income workers, and higher cigarette taxes (for middle-age women), net of individuals' socio-demographic characteristics. States' socioeconomic and policy contexts appear particularly important for older adults. Findings underscore the importance of socio-ecological influences on disability. Copyright © 2017 Elsevier Ltd. All rights reserved.

  20. Do U.S. States’ Socioeconomic and Policy Contexts Shape Adult Disability?

    PubMed Central

    Hayward, Mark D.; Wolf, Douglas A.

    2017-01-01

    Growing disparities in adult mortality across U.S. states point to the importance of assessing disparities in other domains of health. Here, we estimate state-level differences in disability, and draw on the WHO socio-ecological framework to assess the role of ecological factors in explaining these differences. Our study is based on data from 5.5 million adults aged 25–94 years in the 2010–2014 waves of the American Community Survey. Disability is defined as difficulty with mobility, independent living, self-care, vision, hearing, or cognition. We first provide estimates of age-standardized and age-specific disability prevalence by state. We then estimate multilevel models to assess how states’ socioeconomic and policy contexts shape the probability of having a disability. Age-standardized disability prevalence differs markedly by state, from 12.9% in North Dakota and Minnesota to 23.5% in West Virginia. Disability was lower in states with stronger economic output, more income equality, longer histories of tax credits for low-income workers, and higher cigarette taxes (for middle-age women), net of individuals’ socio-demographic characteristics. States’ socioeconomic and policy contexts appear particularly important for older adults. Findings underscore the importance of socio-ecological influences on disability. PMID:28219027

  1. Ethical issues in U.S. family planning policy.

    PubMed

    Benshoof, J

    1983-08-01

    2 concepts are central to the ethics of government family planning policies in the US: the goal of equality for women depends on control over their reproductive lives; and the Constitution protects liberty and privacy. Both of these considerations are grounded on constitutional principles that recognize the primacy of individual decision making, particularly when that decision making involves religious, ethical, or moral choices about private areas of one's life. The guarantee of individual liberty requires that both privacy and personal choice prevail over the mandatory imposition of a family planning policy for either demographic, religious, or ideological reasons. The Supreme Court, when it overturned restrictive abortion laws in 1973, based its decision on the constitutional right of privacy. Poor women and minors are particularly vulnerable to restrictions in the areas of family planning and reproductive health. For both of these classes of women, the ability to make choices has been diminished by such legal requirements as mandatory parental involvement or by the withdrawal of public funds for contraceptive or abortion services. For those persons who must depend on public assistance for medical care, legal restrictions on how public money is spent can be as effective as outright prohibitions. Nor are physicians exempt from financial restrictions. If doctors who counseled patients about family planning or provided them with contraceptives were rendered ineligible from government benefits, the effect would be similar to that of making the activities illegal. In 1976 Congress virtually ended public funding for abortion services, although it continues to fund all other legal and medically necessary services. Through financial restrictions, the US family planning policy treats poor women in a discriminatory manner. Although the Supreme Court has stated that minors have a right to both contraceptives and abortion, minors as a class enjoy less constitutional

  2. A survey of georgia adult protective service staff: implications for older adult injury prevention and policy.

    PubMed

    Strasser, Sheryl M; Kerr, Judith; King, Patricia S; Payne, Brian; Beddington, Sarah; Pendrick, Danielle; Leyda, Elizabeth; McCarty, Frances

    2011-07-01

    The aging population is a rapidly growing demographic. Isolation and limited autonomy render many of the elderly vulnerable to abuse, neglect and exploitation. As the population grows, so does the need for Adult Protective Services (APS). This study was conducted to examine current knowledge of older adult protection laws in Georgia among APS staff and to identify training opportunities to better prepare the APS workforce in case detection and intervention. The Georgia State University Institute of Public Health faculty developed a primary survey in partnership with the Georgia Division of Aging Services' leadership to identify key training priority issues for APS caseworkers and investigators. A 47-item electronic questionnaire was delivered to all APS employees via work-issued email accounts. We conducted descriptive analyses, t-tests and chi-square analyses to determine APS employees' baseline knowledge of Georgia's elder abuse policies, laws and practices, as well as examine associations of age, ethnicity, and educational attainment with knowledge. We used a p-value of 0.05 and 95% confidence intervals to determine statistical significance of analyses performed. Ninety-two out of 175 APS staff responded to the survey (53% response rate). The majority of respondents were Caucasian (56%) women (92%). For over half the survey items, paired sample t-tests revealed significant differences between what APS staff reported as known and what APS staff members indicated they needed to know more about in terms of elder abuse and current policies. Chi-square tests revealed that non-Caucasians significantly preferred video conferencing as a training format (44% compared to 18%), [χ(2)(1) = 7.102, p < .008], whereas Caucasians preferred asynchronous online learning formats (55% compared to 28%) [χ(2)(1) =5.951, p < .015]. Results from this study provide the Georgia Division of Aging with insight into specific policy areas that are not well understood by APS staff

  3. Adult Education and the Challenges of Regional Development: Policy and Sustainability in North Denmark

    ERIC Educational Resources Information Center

    Rasmussen, Palle; Staugaard, Hans Jørgen

    2016-01-01

    Adult education is governed at many levels--internationally, nationally and locally. The authors of this paper look at the challenges, structures and practices of adult education policy at the local level, more specifically in North Denmark (Northern Jutland), one of the five administrative regions of the Danish nation-state. In many ways, the…

  4. 39 CFR 266.2 - Policy.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... STATES POSTAL SERVICE ORGANIZATION AND ADMINISTRATION PRIVACY OF INFORMATION § 266.2 Policy. It is the... describes any characteristic or provides historical information about an individual or that affords a basis... of any affiliation with an organization or activity, or admission to an institution, is accurate...

  5. 39 CFR 266.2 - Policy.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... STATES POSTAL SERVICE ORGANIZATION AND ADMINISTRATION PRIVACY OF INFORMATION § 266.2 Policy. It is the... describes any characteristic or provides historical information about an individual or that affords a basis... of any affiliation with an organization or activity, or admission to an institution, is accurate...

  6. 39 CFR 266.2 - Policy.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... STATES POSTAL SERVICE ORGANIZATION AND ADMINISTRATION PRIVACY OF INFORMATION § 266.2 Policy. It is the... describes any characteristic or provides historical information about an individual or that affords a basis... of any affiliation with an organization or activity, or admission to an institution, is accurate...

  7. 39 CFR 266.2 - Policy.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... STATES POSTAL SERVICE ORGANIZATION AND ADMINISTRATION PRIVACY OF INFORMATION § 266.2 Policy. It is the... describes any characteristic or provides historical information about an individual or that affords a basis... of any affiliation with an organization or activity, or admission to an institution, is accurate...

  8. 39 CFR 266.2 - Policy.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... STATES POSTAL SERVICE ORGANIZATION AND ADMINISTRATION PRIVACY OF INFORMATION § 266.2 Policy. It is the... describes any characteristic or provides historical information about an individual or that affords a basis... of any affiliation with an organization or activity, or admission to an institution, is accurate...

  9. 32 CFR 310.43 - Privacy Act inspections.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 32 National Defense 2 2013-07-01 2013-07-01 false Privacy Act inspections. 310.43 Section 310.43 National Defense Department of Defense (Continued) OFFICE OF THE SECRETARY OF DEFENSE (CONTINUED) PRIVACY PROGRAM DOD PRIVACY PROGRAM Inspections § 310.43 Privacy Act inspections. During internal inspections...

  10. 32 CFR 310.43 - Privacy Act inspections.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 32 National Defense 2 2014-07-01 2014-07-01 false Privacy Act inspections. 310.43 Section 310.43 National Defense Department of Defense (Continued) OFFICE OF THE SECRETARY OF DEFENSE (CONTINUED) PRIVACY PROGRAM DOD PRIVACY PROGRAM Inspections § 310.43 Privacy Act inspections. During internal inspections...

  11. 32 CFR 310.43 - Privacy Act inspections.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 32 National Defense 2 2011-07-01 2011-07-01 false Privacy Act inspections. 310.43 Section 310.43 National Defense Department of Defense (Continued) OFFICE OF THE SECRETARY OF DEFENSE (CONTINUED) PRIVACY PROGRAM DOD PRIVACY PROGRAM Inspections § 310.43 Privacy Act inspections. During internal inspections...

  12. 32 CFR 310.43 - Privacy Act inspections.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 32 National Defense 2 2012-07-01 2012-07-01 false Privacy Act inspections. 310.43 Section 310.43 National Defense Department of Defense (Continued) OFFICE OF THE SECRETARY OF DEFENSE (CONTINUED) PRIVACY PROGRAM DOD PRIVACY PROGRAM Inspections § 310.43 Privacy Act inspections. During internal inspections...

  13. 32 CFR 310.43 - Privacy Act inspections.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 32 National Defense 2 2010-07-01 2010-07-01 false Privacy Act inspections. 310.43 Section 310.43 National Defense Department of Defense (Continued) OFFICE OF THE SECRETARY OF DEFENSE (CONTINUED) PRIVACY PROGRAM DOD PRIVACY PROGRAM Inspections § 310.43 Privacy Act inspections. During internal inspections...

  14. User Privacy in RFID Networks

    NASA Astrophysics Data System (ADS)

    Singelée, Dave; Seys, Stefaan

    Wireless RFID networks are getting deployed at a rapid pace and have already entered the public space on a massive scale: public transport cards, the biometric passport, office ID tokens, customer loyalty cards, etc. Although RFID technology offers interesting services to customers and retailers, it could also endanger the privacy of the end-users. The lack of protection mechanisms being deployed could potentially result in a privacy leakage of personal data. Furthermore, there is the emerging threat of location privacy. In this paper, we will show some practical attack scenarios and illustrates some of them with cases that have received press coverage. We will present the main challenges of enhancing privacy in RFID networks and evaluate some solutions proposed in literature. The main advantages and shortcomings will be briefly discussed. Finally, we will give an overview of some academic and industrial research initiatives on RFID privacy.

  15. 17 CFR 160.8 - Revised privacy notices.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 17 Commodity and Securities Exchanges 1 2011-04-01 2011-04-01 false Revised privacy notices. 160.8 Section 160.8 Commodity and Securities Exchanges COMMODITY FUTURES TRADING COMMISSION PRIVACY OF CONSUMER FINANCIAL INFORMATION Privacy and Opt Out Notices § 160.8 Revised privacy notices. (a) General rule. Except...

  16. 12 CFR 716.8 - Revised privacy notices.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 12 Banks and Banking 7 2012-01-01 2012-01-01 false Revised privacy notices. 716.8 Section 716.8 Banks and Banking NATIONAL CREDIT UNION ADMINISTRATION REGULATIONS AFFECTING CREDIT UNIONS PRIVACY OF CONSUMER FINANCIAL INFORMATION Privacy and Opt Out Notices § 716.8 Revised privacy notices. (a) General...

  17. 12 CFR 716.8 - Revised privacy notices.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 12 Banks and Banking 7 2013-01-01 2013-01-01 false Revised privacy notices. 716.8 Section 716.8 Banks and Banking NATIONAL CREDIT UNION ADMINISTRATION REGULATIONS AFFECTING CREDIT UNIONS PRIVACY OF CONSUMER FINANCIAL INFORMATION Privacy and Opt Out Notices § 716.8 Revised privacy notices. (a) General...

  18. 12 CFR 716.8 - Revised privacy notices.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 12 Banks and Banking 6 2011-01-01 2011-01-01 false Revised privacy notices. 716.8 Section 716.8 Banks and Banking NATIONAL CREDIT UNION ADMINISTRATION REGULATIONS AFFECTING CREDIT UNIONS PRIVACY OF CONSUMER FINANCIAL INFORMATION Privacy and Opt Out Notices § 716.8 Revised privacy notices. (a) General...

  19. 12 CFR 716.8 - Revised privacy notices.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 12 Banks and Banking 6 2010-01-01 2010-01-01 false Revised privacy notices. 716.8 Section 716.8 Banks and Banking NATIONAL CREDIT UNION ADMINISTRATION REGULATIONS AFFECTING CREDIT UNIONS PRIVACY OF CONSUMER FINANCIAL INFORMATION Privacy and Opt Out Notices § 716.8 Revised privacy notices. (a) General...

  20. 17 CFR 160.8 - Revised privacy notices.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 17 Commodity and Securities Exchanges 1 2010-04-01 2010-04-01 false Revised privacy notices. 160.8 Section 160.8 Commodity and Securities Exchanges COMMODITY FUTURES TRADING COMMISSION PRIVACY OF CONSUMER FINANCIAL INFORMATION Privacy and Opt Out Notices § 160.8 Revised privacy notices. (a) General rule. Except...

  1. 12 CFR 1016.8 - Revised privacy notices.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 12 Banks and Banking 8 2014-01-01 2014-01-01 false Revised privacy notices. 1016.8 Section 1016.8 Banks and Banking BUREAU OF CONSUMER FINANCIAL PROTECTION PRIVACY OF CONSUMER FINANCIAL INFORMATION (REGULATION P) Privacy and Opt Out Notices § 1016.8 Revised privacy notices. (a) General rule. Except as...

  2. 12 CFR 1016.8 - Revised privacy notices.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 12 Banks and Banking 8 2012-01-01 2012-01-01 false Revised privacy notices. 1016.8 Section 1016.8 Banks and Banking BUREAU OF CONSUMER FINANCIAL PROTECTION PRIVACY OF CONSUMER FINANCIAL INFORMATION (REGULATION P) Privacy and Opt Out Notices § 1016.8 Revised privacy notices. (a) General rule. Except as...

  3. 16 CFR 313.8 - Revised privacy notices.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 16 Commercial Practices 1 2013-01-01 2013-01-01 false Revised privacy notices. 313.8 Section 313.8 Commercial Practices FEDERAL TRADE COMMISSION REGULATIONS UNDER SPECIFIC ACTS OF CONGRESS PRIVACY OF CONSUMER FINANCIAL INFORMATION Privacy and Opt Out Notices § 313.8 Revised privacy notices. (a) General rule. Except...

  4. 16 CFR 313.8 - Revised privacy notices.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 16 Commercial Practices 1 2014-01-01 2014-01-01 false Revised privacy notices. 313.8 Section 313.8 Commercial Practices FEDERAL TRADE COMMISSION REGULATIONS UNDER SPECIFIC ACTS OF CONGRESS PRIVACY OF CONSUMER FINANCIAL INFORMATION Privacy and Opt Out Notices § 313.8 Revised privacy notices. (a) General rule. Except...

  5. 16 CFR 313.8 - Revised privacy notices.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 16 Commercial Practices 1 2012-01-01 2012-01-01 false Revised privacy notices. 313.8 Section 313.8 Commercial Practices FEDERAL TRADE COMMISSION REGULATIONS UNDER SPECIFIC ACTS OF CONGRESS PRIVACY OF CONSUMER FINANCIAL INFORMATION Privacy and Opt Out Notices § 313.8 Revised privacy notices. (a) General rule. Except...

  6. 16 CFR 313.8 - Revised privacy notices.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 16 Commercial Practices 1 2011-01-01 2011-01-01 false Revised privacy notices. 313.8 Section 313.8 Commercial Practices FEDERAL TRADE COMMISSION REGULATIONS UNDER SPECIFIC ACTS OF CONGRESS PRIVACY OF CONSUMER FINANCIAL INFORMATION Privacy and Opt Out Notices § 313.8 Revised privacy notices. (a) General rule. Except...

  7. 12 CFR 1016.8 - Revised privacy notices.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 12 Banks and Banking 8 2013-01-01 2013-01-01 false Revised privacy notices. 1016.8 Section 1016.8 Banks and Banking BUREAU OF CONSUMER FINANCIAL PROTECTION PRIVACY OF CONSUMER FINANCIAL INFORMATION (REGULATION P) Privacy and Opt Out Notices § 1016.8 Revised privacy notices. (a) General rule. Except as...

  8. 16 CFR 313.8 - Revised privacy notices.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 16 Commercial Practices 1 2010-01-01 2010-01-01 false Revised privacy notices. 313.8 Section 313.8 Commercial Practices FEDERAL TRADE COMMISSION REGULATIONS UNDER SPECIFIC ACTS OF CONGRESS PRIVACY OF CONSUMER FINANCIAL INFORMATION Privacy and Opt Out Notices § 313.8 Revised privacy notices. (a) General rule. Except...

  9. Employee rights to privacy and access to personnel records: a new look.

    PubMed

    Linowes, D F

    1978-01-01

    Do employees really enjoy a so-called right to privacy in their employment relationship? To what extent are their rights violated by the pre-employment screening process? These are the questions discussed in this article by David F. Linowes, Boeschenstein Professor of Political Economy and Public Policy and Science at the University of Illinois and recently chairman of the Privacy Protection Study Commission. Citing the availability of data to a prospective employer through credit card companies, banks, insurance companies, mailing lists, health records, and investigative reporting agencies, Professor Linowes makes the point that little is left unknoun when the investigative process is completed. There is no clear line separating what is relevant and what is privileged. The Study Commission's report to Congress suggests guidelines that would insure fairness to all parties.

  10. 32 CFR 318.4 - Policy.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 32 National Defense 2 2014-07-01 2014-07-01 false Policy. 318.4 Section 318.4 National Defense Department of Defense (Continued) OFFICE OF THE SECRETARY OF DEFENSE (CONTINUED) PRIVACY PROGRAM DEFENSE... administrative, technical, and physical safeguards shall be established, based on the media (e.g., paper...

  11. 32 CFR 318.4 - Policy.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 32 National Defense 2 2010-07-01 2010-07-01 false Policy. 318.4 Section 318.4 National Defense Department of Defense (Continued) OFFICE OF THE SECRETARY OF DEFENSE (CONTINUED) PRIVACY PROGRAM DEFENSE... administrative, technical, and physical safeguards shall be established, based on the media (e.g., paper...

  12. Network Policy and Economic Doctrines

    ERIC Educational Resources Information Center

    Atkinson, Robert D.

    2010-01-01

    For many years, debates over telecommunications network policy were marked by a relative lack of partisan and ideological conflict. In the last decade, this has changed markedly. Today, debates over a whole set of issues, including broadband competition, net neutrality, copyright, privacy, and others, have become more contentious. These…

  13. 24 CFR 3280.107 - Interior privacy.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 24 Housing and Urban Development 5 2012-04-01 2012-04-01 false Interior privacy. 3280.107 Section 3280.107 Housing and Urban Development Regulations Relating to Housing and Urban Development (Continued... privacy. Bathroom and toilet compartment doors shall be equipped with a privacy lock. ...

  14. 24 CFR 3280.107 - Interior privacy.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 24 Housing and Urban Development 5 2014-04-01 2014-04-01 false Interior privacy. 3280.107 Section 3280.107 Housing and Urban Development Regulations Relating to Housing and Urban Development (Continued... privacy. Bathroom and toilet compartment doors shall be equipped with a privacy lock. ...

  15. 24 CFR 3280.107 - Interior privacy.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 24 Housing and Urban Development 5 2011-04-01 2011-04-01 false Interior privacy. 3280.107 Section 3280.107 Housing and Urban Development Regulations Relating to Housing and Urban Development (Continued... privacy. Bathroom and toilet compartment doors shall be equipped with a privacy lock. ...

  16. 24 CFR 3280.107 - Interior privacy.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 24 Housing and Urban Development 5 2013-04-01 2013-04-01 false Interior privacy. 3280.107 Section 3280.107 Housing and Urban Development Regulations Relating to Housing and Urban Development (Continued... privacy. Bathroom and toilet compartment doors shall be equipped with a privacy lock. ...

  17. 78 FR 69551 - Privacy Act; Implementation

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-11-20

    ... Privacy Act; Implementation AGENCY: Defense Intelligence Agency, DoD. ACTION: Direct final rule with request for comments. SUMMARY: Defense Intelligence Agency (DIA) is proposing to update the DIA Privacy... Privacy Program rules that will exempt applicable Department records and/or material from certain portions...

  18. 24 CFR 3280.107 - Interior privacy.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 24 Housing and Urban Development 5 2010-04-01 2010-04-01 false Interior privacy. 3280.107 Section 3280.107 Housing and Urban Development Regulations Relating to Housing and Urban Development (Continued... privacy. Bathroom and toilet compartment doors shall be equipped with a privacy lock. ...

  19. 12 CFR 573.8 - Revised privacy notices.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 12 Banks and Banking 6 2013-01-01 2012-01-01 true Revised privacy notices. 573.8 Section 573.8 Banks and Banking OFFICE OF THRIFT SUPERVISION, DEPARTMENT OF THE TREASURY PRIVACY OF CONSUMER FINANCIAL INFORMATION Privacy and Opt Out Notices § 573.8 Revised privacy notices. (a) General rule. Except as otherwise...

  20. 17 CFR 248.8 - Revised privacy notices.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 17 Commodity and Securities Exchanges 3 2012-04-01 2012-04-01 false Revised privacy notices. 248.8...) REGULATIONS S-P AND S-AM Regulation S-P: Privacy of Consumer Financial Information and Safeguarding Personal Information Privacy and Opt Out Notices § 248.8 Revised privacy notices. (a) General rule. Except as otherwise...

  1. 4 CFR 200.13 - Privacy Act training.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 4 Accounts 1 2014-01-01 2013-01-01 true Privacy Act training. 200.13 Section 200.13 Accounts RECOVERY ACCOUNTABILITY AND TRANSPARENCY BOARD PRIVACY ACT OF 1974 § 200.13 Privacy Act training. (a) The... any Board systems of records are informed of all requirements necessary to protect the privacy of...

  2. 12 CFR 40.8 - Revised privacy notices.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 12 Banks and Banking 1 2011-01-01 2011-01-01 false Revised privacy notices. 40.8 Section 40.8 Banks and Banking COMPTROLLER OF THE CURRENCY, DEPARTMENT OF THE TREASURY PRIVACY OF CONSUMER FINANCIAL INFORMATION Privacy and Opt Out Notices § 40.8 Revised privacy notices. (a) General rule. Except as otherwise...

  3. 45 CFR 503.1 - Definitions-Privacy Act.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 45 Public Welfare 3 2013-10-01 2013-10-01 false Definitions-Privacy Act. 503.1 Section 503.1... THE UNITED STATES, DEPARTMENT OF JUSTICE RULES OF PRACTICE PRIVACY ACT AND GOVERNMENT IN THE SUNSHINE REGULATIONS Privacy Act Regulations § 503.1 Definitions—Privacy Act. For the purpose of this part: Agency...

  4. 45 CFR 503.1 - Definitions-Privacy Act.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 45 Public Welfare 3 2014-10-01 2014-10-01 false Definitions-Privacy Act. 503.1 Section 503.1... THE UNITED STATES, DEPARTMENT OF JUSTICE RULES OF PRACTICE PRIVACY ACT AND GOVERNMENT IN THE SUNSHINE REGULATIONS Privacy Act Regulations § 503.1 Definitions—Privacy Act. For the purpose of this part: Agency...

  5. 4 CFR 200.4 - Privacy Act inquiries.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 4 Accounts 1 2013-01-01 2013-01-01 false Privacy Act inquiries. 200.4 Section 200.4 Accounts RECOVERY ACCOUNTABILITY AND TRANSPARENCY BOARD PRIVACY ACT OF 1974 § 200.4 Privacy Act inquiries. (a... Avenue, NW., Suite 700, Washington, DC 20006. Inquiries should be marked “Privacy Act Inquiry” on each...

  6. 45 CFR 503.1 - Definitions-Privacy Act.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 45 Public Welfare 3 2012-10-01 2012-10-01 false Definitions-Privacy Act. 503.1 Section 503.1... THE UNITED STATES, DEPARTMENT OF JUSTICE RULES OF PRACTICE PRIVACY ACT AND GOVERNMENT IN THE SUNSHINE REGULATIONS Privacy Act Regulations § 503.1 Definitions—Privacy Act. For the purpose of this part: Agency...

  7. 17 CFR 248.8 - Revised privacy notices.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 17 Commodity and Securities Exchanges 4 2014-04-01 2014-04-01 false Revised privacy notices. 248.8...) REGULATIONS S-P, S-AM, AND S-ID Regulation S-P: Privacy of Consumer Financial Information and Safeguarding Personal Information Privacy and Opt Out Notices § 248.8 Revised privacy notices. (a) General rule. Except...

  8. 12 CFR 40.8 - Revised privacy notices.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 12 Banks and Banking 1 2013-01-01 2013-01-01 false Revised privacy notices. 40.8 Section 40.8 Banks and Banking COMPTROLLER OF THE CURRENCY, DEPARTMENT OF THE TREASURY PRIVACY OF CONSUMER FINANCIAL INFORMATION Privacy and Opt Out Notices § 40.8 Revised privacy notices. (a) General rule. Except as otherwise...

  9. 12 CFR 40.8 - Revised privacy notices.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 12 Banks and Banking 1 2012-01-01 2012-01-01 false Revised privacy notices. 40.8 Section 40.8 Banks and Banking COMPTROLLER OF THE CURRENCY, DEPARTMENT OF THE TREASURY PRIVACY OF CONSUMER FINANCIAL INFORMATION Privacy and Opt Out Notices § 40.8 Revised privacy notices. (a) General rule. Except as otherwise...

  10. 48 CFR 52.224-2 - Privacy Act.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 48 Federal Acquisition Regulations System 2 2014-10-01 2014-10-01 false Privacy Act. 52.224-2... AND FORMS SOLICITATION PROVISIONS AND CONTRACT CLAUSES Text of Provisions and Clauses 52.224-2 Privacy... agency function: Privacy Act (APR 1984) (a) The Contractor agrees to— (1) Comply with the Privacy Act of...

  11. 12 CFR 216.8 - Revised privacy notices.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 12 Banks and Banking 2 2014-01-01 2014-01-01 false Revised privacy notices. 216.8 Section 216.8 Banks and Banking FEDERAL RESERVE SYSTEM BOARD OF GOVERNORS OF THE FEDERAL RESERVE SYSTEM PRIVACY OF CONSUMER FINANCIAL INFORMATION (REGULATION P) Privacy and Opt Out Notices § 216.8 Revised privacy notices...

  12. 17 CFR 248.8 - Revised privacy notices.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 17 Commodity and Securities Exchanges 3 2013-04-01 2013-04-01 false Revised privacy notices. 248.8...) REGULATIONS S-P AND S-AM Regulation S-P: Privacy of Consumer Financial Information and Safeguarding Personal Information Privacy and Opt Out Notices § 248.8 Revised privacy notices. (a) General rule. Except as otherwise...

  13. 4 CFR 200.4 - Privacy Act inquiries.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 4 Accounts 1 2014-01-01 2013-01-01 true Privacy Act inquiries. 200.4 Section 200.4 Accounts RECOVERY ACCOUNTABILITY AND TRANSPARENCY BOARD PRIVACY ACT OF 1974 § 200.4 Privacy Act inquiries. (a... Avenue, NW., Suite 700, Washington, DC 20006. Inquiries should be marked “Privacy Act Inquiry” on each...

  14. 4 CFR 200.13 - Privacy Act training.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 4 Accounts 1 2012-01-01 2012-01-01 false Privacy Act training. 200.13 Section 200.13 Accounts RECOVERY ACCOUNTABILITY AND TRANSPARENCY BOARD PRIVACY ACT OF 1974 § 200.13 Privacy Act training. (a) The... any Board systems of records are informed of all requirements necessary to protect the privacy of...

  15. 10 CFR 1304.113 - Privacy Act training.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 10 Energy 4 2012-01-01 2012-01-01 false Privacy Act training. 1304.113 Section 1304.113 Energy NUCLEAR WASTE TECHNICAL REVIEW BOARD PRIVACY ACT OF 1974 § 1304.113 Privacy Act training. (a) The Board... Board systems are informed of all requirements necessary to protect the privacy of individuals. The...

  16. 10 CFR 1304.113 - Privacy Act training.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 10 Energy 4 2014-01-01 2014-01-01 false Privacy Act training. 1304.113 Section 1304.113 Energy NUCLEAR WASTE TECHNICAL REVIEW BOARD PRIVACY ACT OF 1974 § 1304.113 Privacy Act training. (a) The Board... Board systems are informed of all requirements necessary to protect the privacy of individuals. The...

  17. 4 CFR 200.13 - Privacy Act training.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 4 Accounts 1 2013-01-01 2013-01-01 false Privacy Act training. 200.13 Section 200.13 Accounts RECOVERY ACCOUNTABILITY AND TRANSPARENCY BOARD PRIVACY ACT OF 1974 § 200.13 Privacy Act training. (a) The... any Board systems of records are informed of all requirements necessary to protect the privacy of...

  18. 12 CFR 573.8 - Revised privacy notices.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 12 Banks and Banking 5 2011-01-01 2011-01-01 false Revised privacy notices. 573.8 Section 573.8 Banks and Banking OFFICE OF THRIFT SUPERVISION, DEPARTMENT OF THE TREASURY PRIVACY OF CONSUMER FINANCIAL INFORMATION Privacy and Opt Out Notices § 573.8 Revised privacy notices. (a) General rule. Except as otherwise...

  19. 4 CFR 200.13 - Privacy Act training.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 4 Accounts 1 2011-01-01 2011-01-01 false Privacy Act training. 200.13 Section 200.13 Accounts RECOVERY ACCOUNTABILITY AND TRANSPARENCY BOARD PRIVACY ACT OF 1974 § 200.13 Privacy Act training. (a) The... any Board systems of records are informed of all requirements necessary to protect the privacy of...

  20. 45 CFR 503.1 - Definitions-Privacy Act.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 45 Public Welfare 3 2011-10-01 2011-10-01 false Definitions-Privacy Act. 503.1 Section 503.1... THE UNITED STATES, DEPARTMENT OF JUSTICE RULES OF PRACTICE PRIVACY ACT AND GOVERNMENT IN THE SUNSHINE REGULATIONS Privacy Act Regulations § 503.1 Definitions—Privacy Act. For the purpose of this part: Agency...

  1. 12 CFR 216.8 - Revised privacy notices.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 12 Banks and Banking 2 2011-01-01 2011-01-01 false Revised privacy notices. 216.8 Section 216.8 Banks and Banking FEDERAL RESERVE SYSTEM BOARD OF GOVERNORS OF THE FEDERAL RESERVE SYSTEM PRIVACY OF CONSUMER FINANCIAL INFORMATION (REGULATION P) Privacy and Opt Out Notices § 216.8 Revised privacy notices...

  2. 12 CFR 216.8 - Revised privacy notices.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 12 Banks and Banking 2 2012-01-01 2012-01-01 false Revised privacy notices. 216.8 Section 216.8 Banks and Banking FEDERAL RESERVE SYSTEM BOARD OF GOVERNORS OF THE FEDERAL RESERVE SYSTEM PRIVACY OF CONSUMER FINANCIAL INFORMATION (REGULATION P) Privacy and Opt Out Notices § 216.8 Revised privacy notices...

  3. 10 CFR 1304.113 - Privacy Act training.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 10 Energy 4 2011-01-01 2011-01-01 false Privacy Act training. 1304.113 Section 1304.113 Energy NUCLEAR WASTE TECHNICAL REVIEW BOARD PRIVACY ACT OF 1974 § 1304.113 Privacy Act training. (a) The Board... Board systems are informed of all requirements necessary to protect the privacy of individuals. The...

  4. 12 CFR 40.8 - Revised privacy notices.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 12 Banks and Banking 1 2014-01-01 2014-01-01 false Revised privacy notices. 40.8 Section 40.8 Banks and Banking COMPTROLLER OF THE CURRENCY, DEPARTMENT OF THE TREASURY PRIVACY OF CONSUMER FINANCIAL INFORMATION Privacy and Opt Out Notices § 40.8 Revised privacy notices. (a) General rule. Except as otherwise...

  5. 12 CFR 573.8 - Revised privacy notices.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 12 Banks and Banking 6 2012-01-01 2012-01-01 false Revised privacy notices. 573.8 Section 573.8 Banks and Banking OFFICE OF THRIFT SUPERVISION, DEPARTMENT OF THE TREASURY PRIVACY OF CONSUMER FINANCIAL INFORMATION Privacy and Opt Out Notices § 573.8 Revised privacy notices. (a) General rule. Except as otherwise...

  6. 12 CFR 573.8 - Revised privacy notices.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 12 Banks and Banking 6 2014-01-01 2012-01-01 true Revised privacy notices. 573.8 Section 573.8 Banks and Banking OFFICE OF THRIFT SUPERVISION, DEPARTMENT OF THE TREASURY PRIVACY OF CONSUMER FINANCIAL INFORMATION Privacy and Opt Out Notices § 573.8 Revised privacy notices. (a) General rule. Except as otherwise...

  7. 10 CFR 1304.113 - Privacy Act training.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 10 Energy 4 2013-01-01 2013-01-01 false Privacy Act training. 1304.113 Section 1304.113 Energy NUCLEAR WASTE TECHNICAL REVIEW BOARD PRIVACY ACT OF 1974 § 1304.113 Privacy Act training. (a) The Board... Board systems are informed of all requirements necessary to protect the privacy of individuals. The...

  8. 17 CFR 248.8 - Revised privacy notices.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 17 Commodity and Securities Exchanges 3 2011-04-01 2011-04-01 false Revised privacy notices. 248.8...) REGULATIONS S-P AND S-AM Regulation S-P: Privacy of Consumer Financial Information and Safeguarding Personal Information Privacy and Opt Out Notices § 248.8 Revised privacy notices. (a) General rule. Except as otherwise...

  9. 4 CFR 200.4 - Privacy Act inquiries.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 4 Accounts 1 2012-01-01 2012-01-01 false Privacy Act inquiries. 200.4 Section 200.4 Accounts RECOVERY ACCOUNTABILITY AND TRANSPARENCY BOARD PRIVACY ACT OF 1974 § 200.4 Privacy Act inquiries. (a... Avenue, NW., Suite 700, Washington, DC 20006. Inquiries should be marked “Privacy Act Inquiry” on each...

  10. 12 CFR 216.8 - Revised privacy notices.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 12 Banks and Banking 2 2013-01-01 2013-01-01 false Revised privacy notices. 216.8 Section 216.8 Banks and Banking FEDERAL RESERVE SYSTEM BOARD OF GOVERNORS OF THE FEDERAL RESERVE SYSTEM PRIVACY OF CONSUMER FINANCIAL INFORMATION (REGULATION P) Privacy and Opt Out Notices § 216.8 Revised privacy notices...

  11. 4 CFR 200.4 - Privacy Act inquiries.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 4 Accounts 1 2011-01-01 2011-01-01 false Privacy Act inquiries. 200.4 Section 200.4 Accounts RECOVERY ACCOUNTABILITY AND TRANSPARENCY BOARD PRIVACY ACT OF 1974 § 200.4 Privacy Act inquiries. (a... Avenue, NW., Suite 700, Washington, DC 20006. Inquiries should be marked “Privacy Act Inquiry” on each...

  12. 12 CFR 573.8 - Revised privacy notices.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 12 Banks and Banking 5 2010-01-01 2010-01-01 false Revised privacy notices. 573.8 Section 573.8 Banks and Banking OFFICE OF THRIFT SUPERVISION, DEPARTMENT OF THE TREASURY PRIVACY OF CONSUMER FINANCIAL INFORMATION Privacy and Opt Out Notices § 573.8 Revised privacy notices. (a) General rule. Except as otherwise...

  13. 45 CFR 503.1 - Definitions-Privacy Act.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 45 Public Welfare 3 2010-10-01 2010-10-01 false Definitions-Privacy Act. 503.1 Section 503.1... THE UNITED STATES, DEPARTMENT OF JUSTICE RULES OF PRACTICE PRIVACY ACT AND GOVERNMENT IN THE SUNSHINE REGULATIONS Privacy Act Regulations § 503.1 Definitions—Privacy Act. For the purpose of this part: Agency...

  14. 17 CFR 248.8 - Revised privacy notices.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Revised privacy notices. 248.8...) REGULATIONS S-P AND S-AM Regulation S-P: Privacy of Consumer Financial Information and Safeguarding Personal Information Privacy and Opt Out Notices § 248.8 Revised privacy notices. (a) General rule. Except as otherwise...

  15. 4 CFR 200.4 - Privacy Act inquiries.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 4 Accounts 1 2010-01-01 2010-01-01 false Privacy Act inquiries. 200.4 Section 200.4 Accounts RECOVERY ACCOUNTABILITY AND TRANSPARENCY BOARD PRIVACY ACT OF 1974 § 200.4 Privacy Act inquiries. (a... Avenue, NW., Suite 700, Washington, DC 20006. Inquiries should be marked “Privacy Act Inquiry” on each...

  16. 10 CFR 1304.113 - Privacy Act training.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 10 Energy 4 2010-01-01 2010-01-01 false Privacy Act training. 1304.113 Section 1304.113 Energy NUCLEAR WASTE TECHNICAL REVIEW BOARD PRIVACY ACT OF 1974 § 1304.113 Privacy Act training. (a) The Board... Board systems are informed of all requirements necessary to protect the privacy of individuals. The...

  17. 12 CFR 216.8 - Revised privacy notices.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 12 Banks and Banking 2 2010-01-01 2010-01-01 false Revised privacy notices. 216.8 Section 216.8 Banks and Banking FEDERAL RESERVE SYSTEM BOARD OF GOVERNORS OF THE FEDERAL RESERVE SYSTEM PRIVACY OF CONSUMER FINANCIAL INFORMATION (REGULATION P) Privacy and Opt Out Notices § 216.8 Revised privacy notices...

  18. 4 CFR 200.13 - Privacy Act training.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 4 Accounts 1 2010-01-01 2010-01-01 false Privacy Act training. 200.13 Section 200.13 Accounts RECOVERY ACCOUNTABILITY AND TRANSPARENCY BOARD PRIVACY ACT OF 1974 § 200.13 Privacy Act training. (a) The... any Board systems of records are informed of all requirements necessary to protect the privacy of...

  19. 12 CFR 40.8 - Revised privacy notices.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 12 Banks and Banking 1 2010-01-01 2010-01-01 false Revised privacy notices. 40.8 Section 40.8 Banks and Banking COMPTROLLER OF THE CURRENCY, DEPARTMENT OF THE TREASURY PRIVACY OF CONSUMER FINANCIAL INFORMATION Privacy and Opt Out Notices § 40.8 Revised privacy notices. (a) General rule. Except as otherwise...

  20. Adult and Organizational Learning and Policy Development in Environments of Gray

    ERIC Educational Resources Information Center

    Fair-Szofran, Nancy C.

    2010-01-01

    Adult and Organizational Learning and Policy Development in Environments of Gray The purpose of this study was to describe, analyze and provide an understanding of the values that influence state legislators' decision-making as it relates to appropriations, tuition and fees, and financial aid for public postsecondary education in Idaho. The study…

  1. 32 CFR 806b.4 - Privacy Act complaints.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 32 National Defense 6 2014-07-01 2014-07-01 false Privacy Act complaints. 806b.4 Section 806b.4 National Defense Department of Defense (Continued) DEPARTMENT OF THE AIR FORCE ADMINISTRATION PRIVACY ACT PROGRAM Overview of the Privacy Act Program § 806b.4 Privacy Act complaints. (a) Process Privacy Act...

  2. 32 CFR 806b.4 - Privacy Act complaints.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 32 National Defense 6 2013-07-01 2013-07-01 false Privacy Act complaints. 806b.4 Section 806b.4 National Defense Department of Defense (Continued) DEPARTMENT OF THE AIR FORCE ADMINISTRATION PRIVACY ACT PROGRAM Overview of the Privacy Act Program § 806b.4 Privacy Act complaints. (a) Process Privacy Act...

  3. 32 CFR 806b.4 - Privacy Act complaints.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 32 National Defense 6 2011-07-01 2011-07-01 false Privacy Act complaints. 806b.4 Section 806b.4 National Defense Department of Defense (Continued) DEPARTMENT OF THE AIR FORCE ADMINISTRATION PRIVACY ACT PROGRAM Overview of the Privacy Act Program § 806b.4 Privacy Act complaints. (a) Process Privacy Act...

  4. 32 CFR 806b.4 - Privacy Act complaints.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 32 National Defense 6 2012-07-01 2012-07-01 false Privacy Act complaints. 806b.4 Section 806b.4 National Defense Department of Defense (Continued) DEPARTMENT OF THE AIR FORCE ADMINISTRATION PRIVACY ACT PROGRAM Overview of the Privacy Act Program § 806b.4 Privacy Act complaints. (a) Process Privacy Act...

  5. 32 CFR 806b.4 - Privacy Act complaints.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 32 National Defense 6 2010-07-01 2010-07-01 false Privacy Act complaints. 806b.4 Section 806b.4 National Defense Department of Defense (Continued) DEPARTMENT OF THE AIR FORCE ADMINISTRATION PRIVACY ACT PROGRAM Overview of the Privacy Act Program § 806b.4 Privacy Act complaints. (a) Process Privacy Act...

  6. 10 CFR 1304.103 - Privacy Act inquiries.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 10 Energy 4 2012-01-01 2012-01-01 false Privacy Act inquiries. 1304.103 Section 1304.103 Energy NUCLEAR WASTE TECHNICAL REVIEW BOARD PRIVACY ACT OF 1974 § 1304.103 Privacy Act inquiries. (a) Requests... Clarendon Blvd., Suite 1300; Arlington, VA. Requests should be marked “Privacy Act Request” on each page of...

  7. 10 CFR 1304.103 - Privacy Act inquiries.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 10 Energy 4 2011-01-01 2011-01-01 false Privacy Act inquiries. 1304.103 Section 1304.103 Energy NUCLEAR WASTE TECHNICAL REVIEW BOARD PRIVACY ACT OF 1974 § 1304.103 Privacy Act inquiries. (a) Requests... Clarendon Blvd., Suite 1300; Arlington, VA. Requests should be marked “Privacy Act Request” on each page of...

  8. 10 CFR 1304.103 - Privacy Act inquiries.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 10 Energy 4 2013-01-01 2013-01-01 false Privacy Act inquiries. 1304.103 Section 1304.103 Energy NUCLEAR WASTE TECHNICAL REVIEW BOARD PRIVACY ACT OF 1974 § 1304.103 Privacy Act inquiries. (a) Requests... Clarendon Blvd., Suite 1300; Arlington, VA. Requests should be marked “Privacy Act Request” on each page of...

  9. 6 CFR 1002.3 - Privacy Act requests.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 6 Domestic Security 1 2014-01-01 2014-01-01 false Privacy Act requests. 1002.3 Section 1002.3 Domestic Security PRIVACY AND CIVIL LIBERTIES OVERSIGHT BOARD IMPLEMENTATION OF THE PRIVACY ACT OF 1974 § 1002.3 Privacy Act requests. (a) Requests to determine if you are the subject of a record. You may...

  10. 10 CFR 1304.103 - Privacy Act inquiries.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 10 Energy 4 2014-01-01 2014-01-01 false Privacy Act inquiries. 1304.103 Section 1304.103 Energy NUCLEAR WASTE TECHNICAL REVIEW BOARD PRIVACY ACT OF 1974 § 1304.103 Privacy Act inquiries. (a) Requests... Clarendon Blvd., Suite 1300; Arlington, VA. Requests should be marked “Privacy Act Request” on each page of...

  11. 49 CFR 10.13 - Privacy Officer.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 49 Transportation 1 2014-10-01 2014-10-01 false Privacy Officer. 10.13 Section 10.13... INDIVIDUALS General § 10.13 Privacy Officer. (a) To assist with implementation, evaluation, and administration issues, the Chief Information Officer appoints a principal coordinating official with the title Privacy...

  12. 49 CFR 10.13 - Privacy Officer.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 49 Transportation 1 2012-10-01 2012-10-01 false Privacy Officer. 10.13 Section 10.13... INDIVIDUALS General § 10.13 Privacy Officer. (a) To assist with implementation, evaluation, and administration issues, the Chief Information Officer appoints a principal coordinating official with the title Privacy...

  13. 49 CFR 10.13 - Privacy Officer.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 49 Transportation 1 2013-10-01 2013-10-01 false Privacy Officer. 10.13 Section 10.13... INDIVIDUALS General § 10.13 Privacy Officer. (a) To assist with implementation, evaluation, and administration issues, the Chief Information Officer appoints a principal coordinating official with the title Privacy...

  14. 49 CFR 10.13 - Privacy Officer.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 49 Transportation 1 2011-10-01 2011-10-01 false Privacy Officer. 10.13 Section 10.13... INDIVIDUALS General § 10.13 Privacy Officer. (a) To assist with implementation, evaluation, and administration issues, the Chief Information Officer appoints a principal coordinating official with the title Privacy...

  15. 49 CFR 10.13 - Privacy Officer.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 49 Transportation 1 2010-10-01 2010-10-01 false Privacy Officer. 10.13 Section 10.13... INDIVIDUALS General § 10.13 Privacy Officer. (a) To assist with implementation, evaluation, and administration issues, the Chief Information Officer appoints a principal coordinating official with the title Privacy...

  16. Somali asylum seekers' perceptions of privacy in healthcare.

    PubMed

    Eklöf, Niina; Abdulkarim, Hibag; Hupli, Maija; Leino-Kilpi, Helena

    2016-08-01

    Privacy has been recognized as a basic human right and a part of quality of care. However, little is known about the privacy of Somali asylum seekers in healthcare, even though they are one of the largest asylum seeker groups in the world. The aim of the study was to describe the content and importance of privacy and its importance in healthcare from the perspective of Somali asylum seekers. The data of this explorative qualitative study were collected by four focus group interviews with 18 Somali asylum seekers with the help of an interpreter. The data were analysed by inductive content analysis. Research permissions were obtained from the director of the reception centre and from the Department of Social Services. Ethical approval was obtained from the Ethics Committee of Turku University. The content of privacy includes visual privacy, physical privacy and informational privacy. All contents can be shared with healthcare professionals. The importance of privacy includes respect, dignity and freedom. Privacy is strongly connected to the collectivism of Somali culture and religion. Unlike the Western cultures, privacy is not important only for the individual; most of all, it is seen to support collectivism. Even though all contents of privacy can be shared with healthcare professionals, it is important to recognize the cultural aspect of privacy especially when using interpreters with Somali background. © The Author(s) 2015.

  17. Adult Bed-Wetting: A Concern?

    MedlinePlus

    Adult bed-wetting: A concern? My 24-year-old husband has started to wet the bed at ... of Privacy Practices Notice of Nondiscrimination Manage Cookies Advertising Mayo Clinic is a not-for-profit organization ...

  18. 78 FR 32554 - Privacy Act; Implementation

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-05-31

    ...] Privacy Act; Implementation AGENCY: National Geospatial-Intelligence Agency (NGA), DoD. ACTION: Direct... Privacy Act Program by adding the (j)(2) and (k)(2) exemptions to accurately describe the basis for... changes dealing with DoD's management of its Privacy Programs. DoD expects no opposition to the changes...

  19. Framework for objective evaluation of privacy filters

    NASA Astrophysics Data System (ADS)

    Korshunov, Pavel; Melle, Andrea; Dugelay, Jean-Luc; Ebrahimi, Touradj

    2013-09-01

    Extensive adoption of video surveillance, affecting many aspects of our daily lives, alarms the public about the increasing invasion into personal privacy. To address these concerns, many tools have been proposed for protection of personal privacy in image and video. However, little is understood regarding the effectiveness of such tools and especially their impact on the underlying surveillance tasks, leading to a tradeoff between the preservation of privacy offered by these tools and the intelligibility of activities under video surveillance. In this paper, we investigate this privacy-intelligibility tradeoff objectively by proposing an objective framework for evaluation of privacy filters. We apply the proposed framework on a use case where privacy of people is protected by obscuring faces, assuming an automated video surveillance system. We used several popular privacy protection filters, such as blurring, pixelization, and masking and applied them with varying strengths to people's faces from different public datasets of video surveillance footage. Accuracy of face detection algorithm was used as a measure of intelligibility (a face should be detected to perform a surveillance task), and accuracy of face recognition algorithm as a measure of privacy (a specific person should not be identified). Under these conditions, after application of an ideal privacy protection tool, an obfuscated face would be visible as a face but would not be correctly identified by the recognition algorithm. The experiments demonstrate that, in general, an increase in strength of privacy filters under consideration leads to an increase in privacy (i.e., reduction in recognition accuracy) and to a decrease in intelligibility (i.e., reduction in detection accuracy). Masking also shows to be the most favorable filter across all tested datasets.

  20. Will our children be healthy adults? Applying science to public health policy.

    PubMed

    Law, Catherine

    2010-12-01

    Cardiovascular disease is predicted to be a leading cause of death and disability worldwide for the foreseeable future. Observational studies link a variety of prevalent early life experiences (for example, smoking in pregnancy, child poverty) to increased risk of adult cardiovascular disease. Experimental animal studies suggest plausible causal relationships. However, there has been little consideration of how to use this wealth of information to benefit children's futures. Policy documents have drawn on research evidence to recognise that early experience influences life chances, the development of human capital, and long-term health. This has led to a general policy emphasis on prevention and early intervention. To date, there are few examples of the evidence base being useful in shaping specific policies, despite potential to do so, and some examples of policy misunderstanding of science. Minor changes to the perspectives of epidemiological research in this area might greatly increase the potential for evidence-based policy.