Science.gov

Sample records for personal information protection

  1. Protecting Personal Information on Social Networking Sites

    ERIC Educational Resources Information Center

    Gallant, David T.

    2011-01-01

    Almost everyone uses social networking sites like Facebook, MySpace, and LinkedIn. Since Facebook is the most popular site in the history of the Internet, this article will focus on how one can protect his/her personal information and how that extends to protecting the private information of others.

  2. Protecting Your Child's Personal Information at School

    ERIC Educational Resources Information Center

    Federal Trade Commission, 2012

    2012-01-01

    Back to school--an annual ritual that includes buying new notebooks, packing lunches, coordinating transportation, and filling out forms: registration forms, health forms, permission slips, and emergency contact forms, to name a few. Many school forms require personal and, sometimes, sensitive information. In the wrong hands, this information can…

  3. 32 CFR 806b.44 - Personal information that requires protection.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 32 National Defense 6 2010-07-01 2010-07-01 false Personal information that requires protection... ADMINISTRATION PRIVACY ACT PROGRAM Disclosing Records to Third Parties § 806b.44 Personal information that requires protection. Following are some examples of information that is not releasable without the...

  4. 32 CFR 701.115 - Protected personal information (PPI).

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 32 National Defense 5 2010-07-01 2010-07-01 false Protected personal information (PPI). 701.115... information (PPI). (a) Access/disclosure. Access to and disclosure of PPI such as SSN, date of birth, home... must take every step to properly mark the correspondence so that the receiver of the information...

  5. 32 CFR 806b.44 - Personal information that requires protection.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 32 National Defense 6 2012-07-01 2012-07-01 false Personal information that requires protection. 806b.44 Section 806b.44 National Defense Department of Defense (Continued) DEPARTMENT OF THE AIR FORCE..., separated). (b) Number, name, and sex of dependents. (c) Civilian educational degrees and major areas...

  6. 32 CFR 806b.44 - Personal information that requires protection.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 32 National Defense 6 2014-07-01 2014-07-01 false Personal information that requires protection. 806b.44 Section 806b.44 National Defense Department of Defense (Continued) DEPARTMENT OF THE AIR FORCE..., separated). (b) Number, name, and sex of dependents. (c) Civilian educational degrees and major areas...

  7. 32 CFR 806b.44 - Personal information that requires protection.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 32 National Defense 6 2011-07-01 2011-07-01 false Personal information that requires protection. 806b.44 Section 806b.44 National Defense Department of Defense (Continued) DEPARTMENT OF THE AIR FORCE..., separated). (b) Number, name, and sex of dependents. (c) Civilian educational degrees and major areas...

  8. 32 CFR 806b.44 - Personal information that requires protection.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 32 National Defense 6 2013-07-01 2013-07-01 false Personal information that requires protection. 806b.44 Section 806b.44 National Defense Department of Defense (Continued) DEPARTMENT OF THE AIR FORCE..., separated). (b) Number, name, and sex of dependents. (c) Civilian educational degrees and major areas...

  9. 32 CFR 701.115 - Protected personal information (PPI).

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 32 National Defense 5 2014-07-01 2014-07-01 false Protected personal information (PPI). 701.115 Section 701.115 National Defense Department of Defense (Continued) DEPARTMENT OF THE NAVY UNITED STATES NAVY REGULATIONS AND OFFICIAL RECORDS AVAILABILITY OF DEPARTMENT OF THE NAVY RECORDS AND PUBLICATION OF DEPARTMENT OF THE NAVY DOCUMENTS...

  10. 34 CFR 5.71 - Protection of personal privacy and proprietary information.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 34 Education 1 2010-07-01 2010-07-01 false Protection of personal privacy and proprietary....71 Protection of personal privacy and proprietary information. As set forth with more particularity... where disclosure would be inconsistent with individual rights of personal privacy or would...

  11. 32 CFR 701.115 - Protected personal information (PPI).

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... the misuse and overuse of PPI information that could be used to commit identity theft. PA Coordinators... overuse and misuse of SSNs should be discontinued to avoid the potential for identity theft. For example... PPI is removed to prevent identity theft. (7) Remove PPI from documents prior to posting...

  12. 32 CFR 701.115 - Protected personal information (PPI).

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... the misuse and overuse of PPI information that could be used to commit identity theft. PA Coordinators... overuse and misuse of SSNs should be discontinued to avoid the potential for identity theft. For example... PPI is removed to prevent identity theft. (7) Remove PPI from documents prior to posting...

  13. 32 CFR 701.115 - Protected personal information (PPI).

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... the misuse and overuse of PPI information that could be used to commit identity theft. PA Coordinators... overuse and misuse of SSNs should be discontinued to avoid the potential for identity theft. For example... PPI is removed to prevent identity theft. (7) Remove PPI from documents prior to posting...

  14. Personal information protection - exceptional challenges of integrated systems of eHealth.

    PubMed

    Bolka, Anka; Zadel, Blaž; Zorko, Martina

    2011-01-01

    Informatization has been bringing important, quick and extensive changes into the healthcare environment for years. Individual systems still represent isolated information islands; however, the need for interconnectivity and mutual accessibility has become more pronounced. On the one hand, integration of systems brings numerous, financially measurable advantages, and on the other hand, personal information in such systems becomes more vulnerable. Providing personal information protection is therefore the permanent task of informatisation and, with elimination of national borders and integration of national systems, it is becoming a challenge from the legal, organisational, technical and financial standpoints. PMID:21685589

  15. 34 CFR 361.38 - Protection, use, and release of personal information.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 34 Education 2 2014-07-01 2013-07-01 true Protection, use, and release of personal information. 361.38 Section 361.38 Education Regulations of the Offices of the Department of Education (Continued) OFFICE OF SPECIAL EDUCATION AND REHABILITATIVE SERVICES, DEPARTMENT OF EDUCATION STATE VOCATIONAL REHABILITATION SERVICES PROGRAM State Plan and...

  16. How Strong are Passwords Used to Protect Personal Health Information in Clinical Trials?

    PubMed Central

    Moreau, Katherine; Jonker, Elizabeth

    2011-01-01

    Background Findings and statements about how securely personal health information is managed in clinical research are mixed. Objective The objective of our study was to evaluate the security of practices used to transfer and share sensitive files in clinical trials. Methods Two studies were performed. First, 15 password-protected files that were transmitted by email during regulated Canadian clinical trials were obtained. Commercial password recovery tools were used on these files to try to crack their passwords. Second, interviews with 20 study coordinators were conducted to understand file-sharing practices in clinical trials for files containing personal health information. Results We were able to crack the passwords for 93% of the files (14/15). Among these, 13 files contained thousands of records with sensitive health information on trial participants. The passwords tended to be relatively weak, using common names of locations, animals, car brands, and obvious numeric sequences. Patient information is commonly shared by email in the context of query resolution. Files containing personal health information are shared by email and, by posting them on shared drives with common passwords, to facilitate collaboration. Conclusion If files containing sensitive patient information must be transferred by email, mechanisms to encrypt them and to ensure that password strength is high are necessary. More sophisticated collaboration tools are required to allow file sharing without password sharing. We provide recommendations to implement these practices. PMID:21317106

  17. Personal protective equipment

    MedlinePlus

    ... protective equipment. Available at: www.cdc.gov/niosh/ppe . Accessed October 27, 2015. Holland MG, Cawthon D. Personal protective equipment and decontamination of adults and children. Emerg Med Clin N ...

  18. 34 CFR 361.38 - Protection, use, and release of personal information.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... research. Personal information may be released to an organization, agency, or individual engaged in audit, evaluation, or research only for purposes directly connected with the administration of the vocational... only to persons officially connected with the audit, evaluation, or research; (3) The information...

  19. 34 CFR 361.38 - Protection, use, and release of personal information.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... research. Personal information may be released to an organization, agency, or individual engaged in audit, evaluation, or research only for purposes directly connected with the administration of the vocational... only to persons officially connected with the audit, evaluation, or research; (3) The information...

  20. 34 CFR 361.38 - Protection, use, and release of personal information.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... research. Personal information may be released to an organization, agency, or individual engaged in audit, evaluation, or research only for purposes directly connected with the administration of the vocational... only to persons officially connected with the audit, evaluation, or research; (3) The information...

  1. Pesticide personal protective clothing.

    PubMed

    Branson, D H; Sweeney, M

    1991-01-01

    A fairly large established data base provides information on clothing worn by U.S. and Canadian farmers to work with pesticides, their attitudes and beliefs about pesticide risk, and clothing as a dermal barrier. Very limited similar data are available for farmers in less developed countries. Clearly, farmers perceive the benefits of pesticides to far exceed any risks. While few report poisoning symptoms, most believe that their usual work clothing offers a sufficient pesticide barrier, and few wear special-purpose protective clothing. Gloves of various materials, including cotton and leather, appear to be the major protective clothing item. Although farmers feel that their usual work clothing provides excellent protection, fabric penetration research does not support this. Shirting-weight fabrics offer some limited protection against light spray of field-strenght pesticides. Heavier-weight fabrics, such as denim and twill, are better barriers. With a heavier spray or a spill, usual work clothing does not give sufficient protection. Greater protection can usually be achieved with the use of a fluorocarbon finished fabric, such as Scotchgard or Zepel. Scotchgard can readily be applied at home. A durable-press finish does not appear to improve fabric's pesticide-barrier resistance and some data suggest that it may decrease barrier properties. A second alternative for increased protection is the use of a special-purpose fabric, such as a coated nonwoven or possibly Gore-Tex. Numerous other new "waterproof breathable" fabrics have recently come to the market. Many of these are finished or coated fabrics and one would expect them to be at least somewhat resistant to pesticides. However, they have not been tested. Wearing an additional layer also appears to be another clothing strategy to minimize exposure. Fabric penetration research also shows that pesticide formulation, volume or spray regime, concentration, and active ingredients influence the barrier properties of

  2. PERSONAL LEADERSHIP PROTECTS RESEARCH SUBJECTS

    Technology Transfer Automated Retrieval System (TEKTRAN)

    Personal leadership promotes the ethical conduct of human research activities. Leadership entails application of one’s cognitive abilities, technical skills, and emotional intelligence during the conduct of research activities, Personal leadership assures human research subject protection....

  3. Personal Radiation Protection System

    NASA Technical Reports Server (NTRS)

    McDonald, Mark; Vinci, Victoria

    2004-01-01

    A report describes the personal radiation protection system (PRPS), which has been invented for use on the International Space Station and other spacecraft. The PRPS comprises walls that can be erected inside spacecraft, where and when needed, to reduce the amount of radiation to which personnel are exposed. The basic structural modules of the PRPS are pairs of 1-in. (2.54-cm)-thick plates of high-density polyethylene equipped with fasteners. The plates of each module are assembled with a lap joint. The modules are denoted bricks because they are designed to be stacked with overlaps, in a manner reminiscent of bricks, to build 2-in. (5.08-cm)-thick walls of various lengths and widths. The bricks are of two varieties: one for flat wall areas and one for corners. The corner bricks are specialized adaptations of the flat-area bricks that make it possible to join walls perpendicular to each other. Bricks are attached to spacecraft structures and to each other by use of straps that can be tightened to increase the strengths and stiffnesses of joints.

  4. Personal, Anticipated Information Need

    ERIC Educational Resources Information Center

    Bruce, Harry

    2005-01-01

    Background: The role of personal information collections is a well known feature of personal information management. The World Wide Web has introduced to such collections ideas such as filing Web pages or noting their existence in "Bookmarks" and "Favourites". Argument: It is suggested that personal information collections are…

  5. 77 FR 59581 - Personal Identity Verification, Release and Handling of Restricted Information, Protection of the...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-09-28

    ... Register at 73 FR 45679-45680. The second cancelled proposed rule is identified by RIN 2700-AD43, Release and Handling of Restricted Information. It was published in the Federal Register at 75 FR 9860- 9864... Federal Register at 73 FR 63420-63421. William P. McNally, Assistant Administrator for...

  6. 34 CFR 381.31 - What are the requirements pertaining to the protection, use, and release of personal information?

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ..., DEPARTMENT OF EDUCATION PROTECTION AND ADVOCACY OF INDIVIDUAL RIGHTS What Conditions Must Be Met After an... purposes directly connected with the protection and advocacy program, including program evaluation... and advocacy program, unless the consent of the individual to whom the information applies, or his...

  7. 22 CFR 212.22 - Protection of personal privacy.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 22 Foreign Relations 1 2012-04-01 2012-04-01 false Protection of personal privacy. 212.22 Section... Information for Public Inspection and Copying § 212.22 Protection of personal privacy. To the extent required to prevent a clearly unwarranted invasion of personal privacy, USAID may delete identifying...

  8. 22 CFR 212.22 - Protection of personal privacy.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 22 Foreign Relations 1 2011-04-01 2011-04-01 false Protection of personal privacy. 212.22 Section... Information for Public Inspection and Copying § 212.22 Protection of personal privacy. To the extent required to prevent a clearly unwarranted invasion of personal privacy, USAID may delete identifying...

  9. 22 CFR 212.22 - Protection of personal privacy.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 22 Foreign Relations 1 2014-04-01 2014-04-01 false Protection of personal privacy. 212.22 Section... Information for Public Inspection and Copying § 212.22 Protection of personal privacy. To the extent required to prevent a clearly unwarranted invasion of personal privacy, USAID may delete identifying...

  10. 22 CFR 212.22 - Protection of personal privacy.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 22 Foreign Relations 1 2013-04-01 2013-04-01 false Protection of personal privacy. 212.22 Section... Information for Public Inspection and Copying § 212.22 Protection of personal privacy. To the extent required to prevent a clearly unwarranted invasion of personal privacy, USAID may delete identifying...

  11. 22 CFR 212.22 - Protection of personal privacy.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 22 Foreign Relations 1 2010-04-01 2010-04-01 false Protection of personal privacy. 212.22 Section 212.22 Foreign Relations AGENCY FOR INTERNATIONAL DEVELOPMENT PUBLIC INFORMATION Availability of Information for Public Inspection and Copying § 212.22 Protection of personal privacy. To the extent...

  12. Personal protection against biting insects and ticks

    PubMed Central

    2011-01-01

    Recent events with the first cases of local transmission of chikungunya and dengue fever virus in southern France by Aedes albopictus, adding to the nuisance and potential vectors that can be encountered when traveling in tropical or sub-tropical countries, has shown the value of a reflection on the Personal protection against vectors (PPAV). It is seen during an outbreak of vector-borne disease, or simply because of nuisance arthropods, that our fellow citizens try to protect themselves individually by using an arsenal of resources available on the market. Yet most of these means have been neither checked for effectiveness or safety tests, however, essential. Travellers, staff on mission or assignment, are looking for specific information on how to protect themselves or their families. Health workers had at their disposal so far indications that vary widely from one source to another. Therefore it seemed important to the Society of Travel Medicine (SMV) and the French Society of Parasitology (SFP) to initiate a reflection on this theme. This reflection took the form of recommendations for good practice, following the outline established by the French High Health Authority (HAS). The aim was to gather all relevant information, verified and validated and the format to be used not only by health personnel (doctors, pharmacists, nurses), but also by travel agents and individuals. This document highlights the need to take into account the risk of vector-borne diseases, some deadly, and the benefit of various methods of personal protection. The choice of methods is clearly oriented towards those whose effectiveness has been proven and potential risks assessed. The paper finally proposes two decision trees based on the transmission type (day or night) and kind of stay (short or roaming, long and steady). It concerns travellers, but also expatriates, residents and nomads. PMID:21395212

  13. Coming soon to a health sector near you: an advance look at the new Ontario Personal Health Information Protection Act (PHIPA): part II.

    PubMed

    Beardwood, John P; Kerr, J Alexis

    2005-01-01

    This is Part II of a two-part article that provides a broad overview and comparative study of the new Ontario health sector-specific privacy legislation. In Part I, which appeared in the previous issue of Healthcare Quarterly, we discussed the objectives, structure and scope of, as well as the substantive rights and obligations created by, the new Ontario Act. In Part II, we discuss the administrative obligations created by the Ontario Act, as well as the provisions relating to the enforcement of, and remedies available under, the Act. We also contrast the Ontario Act with the various approaches to the protection of personal health information that has already been adopted by other provinces, including Alberta, Saskatchewan and Manitoba. PMID:15715338

  14. About Personal Protective Equipment (PPE)

    MedlinePlus

    ... evaluation or testing against specific viruses, such as Ebola or flu. If performance data has met FDA ... about the Flu What You Should Know about Ebola Q3. Should caregivers use PPE to help protect ...

  15. Statistical Methods for Protecting Personally Identifiable Information in Aggregate Reporting. SLDS Technical Brief 3. NCES 2011-603

    ERIC Educational Resources Information Center

    National Center for Education Statistics, 2010

    2010-01-01

    Over the last decade, increased attention on education has led to an expansion in the amount of information on students and their schools and school districts reported to parents and the general public (20 U.S.C. Section 6311). States now report student outcomes based on assessments of student achievement in specific subjects and grade levels for…

  16. 40 CFR 156.212 - Personal protective equipment statements.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 40 Protection of Environment 23 2010-07-01 2010-07-01 false Personal protective equipment... Personal protective equipment statements. (a) Requirement. Each product shall bear the personal protective... personal protective equipment were required for a product before the effective date of this subpart,...

  17. 32 CFR 505.5 - Individual access to personal information.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 32 National Defense 3 2010-07-01 2010-07-01 true Individual access to personal information. 505.5... AUTHORITIES AND PUBLIC RELATIONS ARMY PRIVACY ACT PROGRAM § 505.5 Individual access to personal information... Act protected information to members of Congress when they are acting on behalf of the constituent...

  18. 41 CFR 50-204.7 - Personal protective equipment.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 41 Public Contracts and Property Management 1 2011-07-01 2009-07-01 true Personal protective... CONTRACTS General Safety and Health Standards § 50-204.7 Personal protective equipment. Protective equipment, including personal protective equipment for eyes, face, head, and extremities, protective...

  19. 41 CFR 50-204.7 - Personal protective equipment.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 41 Public Contracts and Property Management 1 2013-07-01 2013-07-01 false Personal protective... CONTRACTS General Safety and Health Standards § 50-204.7 Personal protective equipment. Protective equipment, including personal protective equipment for eyes, face, head, and extremities, protective...

  20. 41 CFR 50-204.7 - Personal protective equipment.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 41 Public Contracts and Property Management 1 2012-07-01 2009-07-01 true Personal protective... CONTRACTS General Safety and Health Standards § 50-204.7 Personal protective equipment. Protective equipment, including personal protective equipment for eyes, face, head, and extremities, protective...

  1. 41 CFR 50-204.7 - Personal protective equipment.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 41 Public Contracts and Property Management 1 2014-07-01 2014-07-01 false Personal protective... CONTRACTS General Safety and Health Standards § 50-204.7 Personal protective equipment. Protective equipment, including personal protective equipment for eyes, face, head, and extremities, protective...

  2. Economics of Personal Data Management: Fair Personal Information Trades

    NASA Astrophysics Data System (ADS)

    Tasidou, A.; Efraimidis, P. S.; Katos, V.

    Individuals today have no control over the way their personal information is being used even though they are the ones to suffer the consequences of any unwanted uses of their information. We propose addressing this externality through the creation of a market for personal information, where licenses to access individuals' personal information will be voluntarily traded. Through this market, satisfactory compensation to the information owner is provided, whilst personal information remains under the owner's control. Using cryptographic tools and micropayments we propose and develop a prototype for personal information trades where the above principles are implemented and tested.

  3. Personal protective equipment and dermal exposure.

    PubMed

    Evans, P G; McAlinden, J J; Griffin, P

    2001-02-01

    Personal protective equipment (PPE) should only be used as a control measure when other measures are inappropriate or are inadequate by themselves. The person undertaking a risk assessment must exercise his or her judgment to take into account the protection afforded by the PPE. There is, therefore, considerable scope for differences in approach and it would seem sensible to eliminate these differences and ensure consistency, where possible, by reaching agreement on the attenuating effect of PPE. However, there is growing evidence that the levels of protection indicated by laboratory-based tests may not be achieved in real use situations. Studies of workplace protection suggest that the spread of contaminants inside protective clothing, including gloves, is commonplace and significant. Insufficient attention may have been paid to the effect of factors such as temperature differentials on the permeation of chemical agents through protective materials. To investigate this, a test cell was designed and built to measure the breakthrough times and subsequent permeation rate of solvents through glove materials where the temperature inside and outside the glove was representative of those that can occur in the workplace. Two chemical solvents were tested against two different glove materials at three different temperature conditions. The differences between the breakthrough times and permeation rates were measured and compared to manufacturer's test data. The practical implications are considered for risk of health and safety to the wearer. PMID:11217735

  4. Insertion Loss of Personal Protective Clothing

    SciTech Connect

    Shull D.J.; Biesel, V.B.; Cunefare, K.A.

    1999-05-13

    'The use of personal protective clothing that covers the head is a common practice in many industries. Such personal protective clothing will impact the sound pressure level and the frequency content of sounds to which the wearer will be exposed. The use of such clothing, then, may impact speech and alarm audibility. A measure of the impact of such clothing is its insertion loss. Insertion loss measurements were performed on four types of personal protective clothing in use by Westinghouse Savannah River Company personnel which utilize cloth and plastic hood configurations to protect the head. All clothing configurations tested at least partially cover the ears. The measurements revealed that insertion loss of the items tested was notable at frequencies above 1000 Hz only and was a function of material stiffness and acoustic flanking paths to the ear. Further, an estimate of the clothing''s noise reduction rating reveals poor performance in that regard, even though the insertion loss of the test articles was significant at frequencies at and above 1000 Hz.'

  5. Personal respiratory protection against Mycobacterium tuberculosis.

    PubMed

    Fennelly, K P

    1997-03-01

    Although there are no data demonstrating the effectiveness of personal respiratory protection in the prevention of occupational tuberculosis, there are sound theoretical bases supporting the use of respirators to reduce the risk of inhalational exposure. The major factor that limits the effectiveness of most respirators is the leakage between the face and the mask. There are data suggesting that traditional fit testing of respirators does not adequately predict the degree of protection in actual use, and more research is needed in that area. There is a large range of infectiousness of aerosols of TB, and classes of respirators vary greatly in the degree of protection they offer. I have argued that respirator selection should be based on anticipated exposures. High-risk exposures to TB are often associated with cough-inducing procedures or with aerosolization of infected tissues during autopsies. In my opinion, the most reasonable type of respirator for such high-risk situations in health care settings is a PAPR hood. The concentration of infectious aerosols in well-ventilated respiratory isolation rooms is likely to be very low, and the new N95 respirators offer a reasonable balance of comfort, cost, practicality, and protection. Preliminary data from mathematical modeling studies suggest there may be little additional benefit from more sophisticated personal respiratory protection in such settings. Additional research is needed to more accurately assess exposures to TB, to determine the size and aerodynamic behavior of TB generated by infectious patients, and to more accurately define the role and effectiveness of personal respiratory protection against TB. PMID:9098607

  6. Overwhelming Physiological Regulation Through Personal Protection.

    PubMed

    Taylor, Nigel A S

    2015-11-01

    There is often a fine line between providing appropriate personal protection and compromising capability. In some situations, protection must come first. In other circumstances, capability becomes paramount. In the military, mission-specific objectives can force personal protection to be less than ideal. Indeed, levels of protection appropriate within the civilian context could jeopardise health and operational success, and for operations conducted in the heat involving load carriage and armored protection with almost total-body clothing coverage, it is the likely thermal impediment to performance that perhaps first comes to mind. Although this consideration is appropriate, it may direct attention away from the actual cause of, and therefore preventative solutions to, physiological collapse. For instance, although classical heat illness absolutely occurs at the age extremes, and it may affect all people when air temperatures are exceptionally hot, frank hyperthermia is not generally the primary cause of exhaustion when healthy clothed individuals are working in the heat. Instead, another homoeostatic process is implicated; blood pressure regulation. In addition to participating in temperature regulation, the cardiovascular system supports oxygen delivery, blood pressure regulatory, and waste removal requirements. Therefore, the elevated cardiac output accompanying work must be shared. Accordingly, the case will be developed that thermoregulatory failure is often not the primary causal mechanism for soldier collapse, although such individuals may be hyperthermic. Alternatively, moderately, but not excessively, hyperthermic soldiers working under these conditions are perhaps more likely to collapse from cardiovascular insufficiency that precipitates uncompensable hypotension. PMID:26506173

  7. Electronic Health Record in Italy and Personal Data Protection.

    PubMed

    Bologna, Silvio; Bellavista, Alessandro; Corso, Pietro Paolo; Zangara, Gianluca

    2016-06-01

    The present article deals with the Italian Electronic Health Record (hereinafter EHR), recently introduced by Act 221/2012, with a specific focus on personal data protection. Privacy issues--e.g., informed consent, data processing, patients' rights and minors' will--are discussed within the framework of recent e-Health legislation, national Data Protection Code, the related Data Protection Authority pronouncements and EU law. The paper is aimed at discussing the problems arising from a complex, fragmentary and sometimes uncertain legal framework on e-Health. PMID:27491249

  8. Personal computing in radiation protection programs

    SciTech Connect

    Bunker, A.S. )

    1987-01-01

    In the fall of 1986, Radiation Protection Management surveyed its Correspondents (radiation protection professionals at utilities, universities, national laboratories, consulting firms, and government agencies) on their use of personal computers (PCs). This article presents the results of the survey with profiles of the PC user, the PC equipment, the software, and the work environment. The average PC user is proficient with more than one type of software, is self taught, knows at least one programing language, and uses his/her PC every day. The standard radiation protection PC is an IBM PC/XT/AT or compatible, fully-loaded with 640K of RAM, a hard disk, a modem, etc. Radiation protection professionals use their PCs mainly for word processing and specialty (technical) applications -- their favorite programs are Lotus 1-2-3, Ashton-Tate's dBase series, and MicroPro's WordStar series. Most PCs are shared by several persons, but one of them often uses the PC more than all of the others combined.

  9. Personal Privacy in an Information Society. Final Report.

    ERIC Educational Resources Information Center

    Privacy Protection Study Commission, Washington, DC.

    This report of the Privacy Protection Study Commission was prepared in response to a Congressional mandate to study data banks, automatic data processing programs, and information systems of governmental, regional and private organizations to determine standards and procedures in force for the protection of personal information. Recommendations…

  10. 10 CFR 110.126 - Protection of classified information.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 10 Energy 2 2010-01-01 2010-01-01 false Protection of classified information. 110.126 Section 110... MATERIAL Special Procedures for Classified Information in Hearings § 110.126 Protection of classified information. Nothing in this subpart shall relieve any person from safeguarding classified information...

  11. 10 CFR 110.126 - Protection of classified information.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 10 Energy 2 2011-01-01 2011-01-01 false Protection of classified information. 110.126 Section 110... MATERIAL Special Procedures for Classified Information in Hearings § 110.126 Protection of classified information. Nothing in this subpart shall relieve any person from safeguarding classified information...

  12. 10 CFR 110.126 - Protection of classified information.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 10 Energy 2 2014-01-01 2014-01-01 false Protection of classified information. 110.126 Section 110... MATERIAL Special Procedures for Classified Information in Hearings § 110.126 Protection of classified information. Nothing in this subpart shall relieve any person from safeguarding classified information...

  13. 10 CFR 110.126 - Protection of classified information.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 10 Energy 2 2012-01-01 2012-01-01 false Protection of classified information. 110.126 Section 110... MATERIAL Special Procedures for Classified Information in Hearings § 110.126 Protection of classified information. Nothing in this subpart shall relieve any person from safeguarding classified information...

  14. 10 CFR 110.126 - Protection of classified information.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 10 Energy 2 2013-01-01 2013-01-01 false Protection of classified information. 110.126 Section 110... MATERIAL Special Procedures for Classified Information in Hearings § 110.126 Protection of classified information. Nothing in this subpart shall relieve any person from safeguarding classified information...

  15. 20 CFR 636.2 - Protection of informants.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 20 Employees' Benefits 3 2010-04-01 2010-04-01 false Protection of informants. 636.2 Section 636.2... AND HEARINGS § 636.2 Protection of informants. (a) Informants. Where possible the identity of any person who has furnished information relating to, or assisted in an investigation of a possible...

  16. 41 CFR 50-204.7 - Personal protective equipment.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... assure its adequacy, including proper maintenance and sanitation of such equipment. All personal... 41 Public Contracts and Property Management 1 2010-07-01 2010-07-01 true Personal protective... CONTRACTS General Safety and Health Standards § 50-204.7 Personal protective equipment. Protective...

  17. 29 CFR 1926.95 - Criteria for personal protective equipment.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 29 Labor 8 2014-07-01 2014-07-01 false Criteria for personal protective equipment. 1926.95 Section..., DEPARTMENT OF LABOR (CONTINUED) SAFETY AND HEALTH REGULATIONS FOR CONSTRUCTION Personal Protective and Life Saving Equipment § 1926.95 Criteria for personal protective equipment. (a) Application....

  18. 29 CFR 1926.95 - Criteria for personal protective equipment.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 29 Labor 8 2010-07-01 2010-07-01 false Criteria for personal protective equipment. 1926.95 Section..., DEPARTMENT OF LABOR (CONTINUED) SAFETY AND HEALTH REGULATIONS FOR CONSTRUCTION Personal Protective and Life Saving Equipment § 1926.95 Criteria for personal protective equipment. (a) Application....

  19. How to use personal protective equipment.

    PubMed

    Pang, Vicky; Carter, Yvonne; Scott, Janice; Salazar, Glenn; Johnson, Velor

    This article offers a refresher on what personal protective equipment (PPE) is, how to choose the right PPE and how to wear and remove it safely. PPE aims to improve staff and patient safety, but self-contamination commonly occurs during its removal; failure to remove PPE carefully can lead to contamination of the user's skin, own clothes, uniform or scrubs, hair, face and hands. The importance of correct PPE use has been highlighted by the ebola crisis and NHS preparations to deal with patients who are infected. PMID:26012067

  20. 32 CFR 310.13 - Safeguarding personal information.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ..., subpart C of 32 CFR part 286 (“DoD Freedom of Information Act Program”) as “For Official Use Only,” and... is stored or processed in an information technology system to protect against threats unique to an... 32 National Defense 2 2010-07-01 2010-07-01 false Safeguarding personal information....

  1. 10 CFR 26.411 - Protection of information.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 10 Energy 1 2010-01-01 2010-01-01 false Protection of information. 26.411 Section 26.411 Energy NUCLEAR REGULATORY COMMISSION FITNESS FOR DUTY PROGRAMS FFD Program for Construction § 26.411 Protection of information. (a) Licensees and other entities who collect personal information about an...

  2. 36 CFR 902.56 - Protection of personal privacy.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 36 Parks, Forests, and Public Property 3 2013-07-01 2012-07-01 true Protection of personal privacy... personal privacy. (a) Any of the following personnel, medical, or similar records is within the statutory... personal privacy: (1) Personnel and background records personal to any officer or employee of...

  3. The protection of the person in medical research in Germany.

    PubMed

    Deutsch, E

    1999-01-01

    Because of its history Germany has many rules concerning the protection of persons in medical research. In fact Germany was the first state to issue a directive regulating medical experimentation with human beings in the year 1900. The ten principles of Nuremberg originated out of the medical case. Germany adheres to the Revised Declaration of Helsinki of the World Medical Association and will probably sign the European convention on biomedicine. The pharmaceutical act contains elaborate provisions for the protection of the patient or proband, e.g. informed consent, risk-benefit ratio, no experimentation on prisoners, approval of a local ethics committee. Moreover in pharmaceutical trials there has to be third party accident insurance for the experimental subject. There is no strict liability for medical experimentation, but the standard of care is high. In general the German law seems to be adequate for the protection of experimental subjects. PMID:10436740

  4. 45 CFR 673.4 - Environmental protection information.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 45 Public Welfare 3 2014-10-01 2014-10-01 false Environmental protection information. 673.4 Section 673.4 Public Welfare Regulations Relating to Public Welfare (Continued) NATIONAL SCIENCE FOUNDATION ANTARCTIC NON-GOVERNMENTAL EXPEDITIONS § 673.4 Environmental protection information. (a) Any person who organizes a non-governmental expedition...

  5. 78 FR 12065 - National Institute for Occupational Safety and Health Personal Protective Technology for...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-02-21

    ... facilitate focused communication and exchange ideas and solutions between key stakeholder groups. Stakeholder... cleared in advance. This clearance takes a minimum of 30 days. FOR FURTHER INFORMATION CONTACT: Dr... Health Personal Protective Technology for Pesticide Handlers: Stakeholder Meeting AGENCY: The...

  6. How Do Students Organize Personal Information Spaces?

    ERIC Educational Resources Information Center

    Hardof-Jaffe, Sharon; Hershkovitz, Arnon; Abu-Kishk, Hama; Bergman, Ofer; Nachmias, Rafi

    2009-01-01

    The purpose of this study is to empirically reveal strategies of students' organization of learning-related digital materials within an online personal information archive. Research population included 518 students who utilized the personal Web space allocated to them on the university servers for archiving information items, and data describing…

  7. 49 CFR 229.41 - Protection against personal injury.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 49 Transportation 4 2010-10-01 2010-10-01 false Protection against personal injury. 229.41 Section 229.41 Transportation Other Regulations Relating to Transportation (Continued) FEDERAL RAILROAD... Requirements § 229.41 Protection against personal injury. Fan openings, exposed gears and pinions,...

  8. 49 CFR 238.117 - Protection against personal injury.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 49 Transportation 4 2010-10-01 2010-10-01 false Protection against personal injury. 238.117 Section 238.117 Transportation Other Regulations Relating to Transportation (Continued) FEDERAL RAILROAD... Requirements § 238.117 Protection against personal injury. On or after November 8, 1999, all moving parts,...

  9. 29 CFR 1926.95 - Criteria for personal protective equipment.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 29 Labor 8 2011-07-01 2011-07-01 false Criteria for personal protective equipment. 1926.95 Section 1926.95 Labor Regulations Relating to Labor (Continued) OCCUPATIONAL SAFETY AND HEALTH ADMINISTRATION, DEPARTMENT OF LABOR (CONTINUED) SAFETY AND HEALTH REGULATIONS FOR CONSTRUCTION Personal Protective and Life Saving Equipment § 1926.95...

  10. 36 CFR 902.56 - Protection of personal privacy.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 36 Parks, Forests, and Public Property 3 2010-07-01 2010-07-01 false Protection of personal privacy. 902.56 Section 902.56 Parks, Forests, and Public Property PENNSYLVANIA AVENUE DEVELOPMENT... Protection of personal privacy. (a) Any of the following personnel, medical, or similar records is within...

  11. 36 CFR 902.56 - Protection of personal privacy.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... privacy. 902.56 Section 902.56 Parks, Forests, and Public Property PENNSYLVANIA AVENUE DEVELOPMENT... Protection of personal privacy. (a) Any of the following personnel, medical, or similar records is within the... invasion of his personal privacy: (1) Personnel and background records personal to any officer or...

  12. 36 CFR 902.56 - Protection of personal privacy.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... privacy. 902.56 Section 902.56 Parks, Forests, and Public Property PENNSYLVANIA AVENUE DEVELOPMENT... Protection of personal privacy. (a) Any of the following personnel, medical, or similar records is within the... invasion of his personal privacy: (1) Personnel and background records personal to any officer or...

  13. 36 CFR 902.56 - Protection of personal privacy.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... privacy. 902.56 Section 902.56 Parks, Forests, and Public Property PENNSYLVANIA AVENUE DEVELOPMENT... Protection of personal privacy. (a) Any of the following personnel, medical, or similar records is within the... invasion of his personal privacy: (1) Personnel and background records personal to any officer or...

  14. [Data protection as a personal right. Government Agency].

    PubMed

    Jacob, J

    1999-12-01

    The sector-specific secrets are traditionally regarded as the historical predecessors of general data protection law. The lecture demonstrates that they are not only aimed at protecting the individual's right to self-determination of the handling of his personal data. It also indicates that those particular secrets are, at the same time, serving for further purposes which are of importance in their respective sectors. The general (omnibus) data protection statues are given attention in the light of the beginning of automated information processing and in their role of guaranteeing the right to personal privacy, a role which the Federal Constitutional Court underlined in its census decision of 1983 and which became of general relevance in the course of the further developments. In conclusion, the report particularizes that, inter alia, statutory adaptations and amendments are necessary in order to preserve the effects of the doctor-patient confidentiality under the conditions of modern data processing. The examples given are comprising: health data on chip cards, health data in networks and the electronic record of the patient. PMID:10683888

  15. Adaptive Visualization for Focused Personalized Information Retrieval

    ERIC Educational Resources Information Center

    Ahn, Jae-wook

    2010-01-01

    The new trend on the Web has totally changed today's information access environment. The traditional information overload problem has evolved into the qualitative level beyond the quantitative growth. The mode of producing and consuming information is changing and we need a new paradigm for accessing information. Personalized search is one of…

  16. Don't Take It Personal: European Union Legal Aspects of Procuring and Protecting Environmental Exposure Data in Population Biobanks Through the Use of a Geo-Information-Systems Toolkit.

    PubMed

    Bovenberg, Jasper Adriaan; de Hoogh, Kees; Knoppers, Bartha Maria; Hveem, Kristian; Hansell, Anna L

    2016-06-01

    Under European Union (EU) law, population-based cohort studies have the right to collect environmental data and to access geospatial data, at street level, on the web, from a host of public sources. As to geospatial information, they should be able to avail themselves of Member States' networks of services for geospatial data sets and services (discovery, viewing, downloading) via the Internet. On the other hand, linkage of health data of biobank participants to environmental data, using geospatial data, is limited, as it must satisfy the provisions of the EU Directive on the Protection of Personal Data, pursuant to which geospatial data regarding biobank participants are likely to qualify as personal data. Hence, we submit that the consents of biobank participants be reviewed to assess whether they cover the generation and linkage of geospatial data. We also submit that biobanks must have measures in place to prevent the re-identification of participants by use of their geospatial data. We present a model Geographic-Information-Systems (GIS) Toolkit, as an example of what measures could be taken to that effect. PMID:27187500

  17. 46 CFR 197.555 - Personal protective clothing and equipment.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... SAFETY AND HEALTH STANDARDS GENERAL PROVISIONS Benzene § 197.555 Personal protective clothing and..., tight-fitting eye goggles to limit dermal exposure to, and prevent eye contact with, liquid benzene....

  18. 46 CFR 197.555 - Personal protective clothing and equipment.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... SAFETY AND HEALTH STANDARDS GENERAL PROVISIONS Benzene § 197.555 Personal protective clothing and..., tight-fitting eye goggles to limit dermal exposure to, and prevent eye contact with, liquid benzene....

  19. 46 CFR 197.555 - Personal protective clothing and equipment.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... SAFETY AND HEALTH STANDARDS GENERAL PROVISIONS Benzene § 197.555 Personal protective clothing and..., tight-fitting eye goggles to limit dermal exposure to, and prevent eye contact with, liquid benzene....

  20. 46 CFR 197.555 - Personal protective clothing and equipment.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... SAFETY AND HEALTH STANDARDS GENERAL PROVISIONS Benzene § 197.555 Personal protective clothing and..., tight-fitting eye goggles to limit dermal exposure to, and prevent eye contact with, liquid benzene....

  1. 46 CFR 197.555 - Personal protective clothing and equipment.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... SAFETY AND HEALTH STANDARDS GENERAL PROVISIONS Benzene § 197.555 Personal protective clothing and..., tight-fitting eye goggles to limit dermal exposure to, and prevent eye contact with, liquid benzene....

  2. Usage and Perceived Side Effects of Personal Protective Measures against Mosquitoes among Current Users in Delhi

    PubMed Central

    Kumar, Rajesh; Meena, G. S.; Singh, M. M.; Sahoo, Jyotiranjan; Ingle, G. K.

    2014-01-01

    Background. Mosquito-borne diseases constitute an important cause of morbidity and mortality. The use of personal protective measures (PPM) like mats, bednets, screening, repellents, liquid vaporizers, mosquito coils, and so forth has been advocated as an effective tool in control of mosquito-borne diseases, but data about the safety profile of personal protective measures is still scarce. Objective. To study the usage and side effects of personal protective measures against mosquitoes among current users in Delhi. Materials and Methods. A community-based cross-sectional study among 350 adult individuals selected by systematic sampling method. Data was collected using pretested semistructured questionnaire after taking written informed consent. Data was analysed using SPSS version 17. Chi-square/Fisher's Exact test was used for qualitative variables to find association and P value <0.05 was considered significant. Results. Out of 350 families selected, 210 belonged to rural area and 140 to urban area. Personal protective measures were used by 219 (62.5%) subjects. Liquid vaporizer was the most preferred method (41.4%). Most common perceived side effect of personal protective measures was headache (7.7%). Other perceived side effects were cough (3.2%), sore throat (2.7%), allergy (1.3%), and eye irritation (0.9%) predominantly among coil users. Conclusion. There is a need to have a close watch for side effects of personal protective measures among users. Further research is also needed to develop safe and effective personal protective measures against mosquitoes. PMID:24616805

  3. Personal medical information system using laser card

    NASA Astrophysics Data System (ADS)

    Cho, Seong H.; Kim, Keun Ho; Choi, Hyung-Sik; Park, Hyun Wook

    1996-04-01

    The well-known hospital information system (HIS) and the picture archiving and communication system (PACS) are typical applications of multimedia to medical area. This paper proposes a personal medical information save-and-carry system using a laser card. This laser card is very useful, especially in emergency situations, because the medical information in the laser card can be read at anytime and anywhere if there exists a laser card reader/writer. The contents of the laser card include the clinical histories of a patient such as clinical chart, exam result, diagnostic reports, images, and so on. The purpose of this system is not a primary diagnosis, but emergency reference of clinical history of the patient. This personal medical information system consists of a personal computer integrated with laser card reader/writer, color frame grabber, color CCD camera and a high resolution image scanner optionally. Window-based graphical user interface was designed for easy use. The laser card has relatively sufficient capacity to store the personal medical information, and has fast access speed to restore and load the data with a portable size as compact as a credit card. Database items of laser card provide the doctors with medical data such as laser card information, patient information, clinical information, and diagnostic result information.

  4. Evaluating the utility of personal genomic information.

    PubMed

    Foster, Morris W; Mulvihill, John J; Sharp, Richard R

    2009-08-01

    In evaluating the utility of human genome-wide assays, the answer will differ depending on why the question is asked. For purposes of regulating medical tests, a restrictive sense of clinical utility is used, although it may be possible to have clinical utility without changing patient's outcomes and clinical utility may vary between patients. For purposes of using limited third party or public health resources, cost effectiveness should be evaluated in a societal rather than individual context. However, for other health uses of genomic information a broader sense of overall utility should be used. Behavioral changes and increased individual awareness of health-related choices are relevant metrics for evaluating the personal utility of genomic information, even when traditional clinical benefits are not manifested. In taking account of personal utility, cost effectiveness may be calculated on an individual and societal basis. Overall measures of utility (including both restrictive clinical measures and measures of personal utility) may vary significantly between individuals depending on potential changes in lifestyle, health awareness and behaviors, family dynamics, and personal choice and interest as well as the psychological effects of disease risk perception. That interindividual variation suggests that a more expansive overall measure of utility could be used to identify individuals who are more likely to benefit from personal genomic information as well as those for whom the risks of personal information may be greater than any benefits. PMID:19478683

  5. The Personal Construction of Information Space.

    ERIC Educational Resources Information Center

    McKnight, Cliff

    2000-01-01

    Describes the use of Repertory Grid methodology as a means of externalizing an individual's view of information space. Discusses personal construct theory (PCT), describes the Grid method with a single participant, and proposes future work which will investigate the extent to which individuals share perceptions of information space. (Author/LRW)

  6. Barriers and spatial repellents for personal protection.

    Technology Transfer Automated Retrieval System (TEKTRAN)

    Insecticides were assessed in the field for protectant suitability on perimeter vegetation and fabric enclosures. CO2-generating traps were used as surrogate hosts for dense populations of Anopheles quadrimaculatus, Psorophora columbiae and Culex spp. The most effective insecticide was combined w...

  7. Thermal Materials Protect Priceless, Personal Keepsakes

    NASA Technical Reports Server (NTRS)

    2014-01-01

    NASA astronaut Scott Parazynski led the development of materials and techniques for the inspection and repair of the shuttle’s thermal protection system. Parazynski later met Chris Shiver of Houston-based DreamSaver Enterprises LLC and used concepts from his work at Johnson Space Center to develop an enclosure that can withstand 98 percent of residential fires.

  8. Mucosal Correlates of Protection in HIV-1-Exposed Seronegative Persons

    PubMed Central

    Shen, Ruizhong; Smith, Phillip D.

    2014-01-01

    Resistance to HIV-1 infection in HIV-1-exposed seronegative (HESN) persons offers a promising opportunity to identify mechanisms of “natural” protection. Unique features of the mucosa in particular may contribute to this protection. Here we highlight several key issues pertaining to the mucosal correlates of protection in HESN persons, including humoral immune responses, mechanisms of mucosal HIV-1-neutralization, immune cell activation, and role of the microbiota in mucosal responses. We also discuss mucosal model systems that can be used to investigate the mechanisms of resistance in HESN subjects. A clear understanding of the mucosal correlates of protection against HIV-1 in HESN persons will provide critical new insights for the development of effective vaccine and microbicide strategies for the prevention of HIV-1 transmission. PMID:24428610

  9. Divulging Personal Information within Learning Analytics Systems

    ERIC Educational Resources Information Center

    Ifenthaler, Dirk; Schumacher, Clara

    2015-01-01

    The purpose of this study was to investigate if students are prepared to release any personal data in order to inform learning analytics systems. Besides the well-documented benefits of learning analytics, serious concerns and challenges are associated with the application of these data driven systems. Most notably, empirical evidence regarding…

  10. Disclosing personal health information relating to adults who lack capacity.

    PubMed

    Griffith, Richard

    2014-03-01

    The need to share information about patients is vital to effective care and protection, especially where it relates to adults who lack decision-making capacity but it has to be balanced against the right to confidentiality. Like other health professionals, district nurses have a duty to maintain the confidentiality of patient information, and incapable adults have the right to expect their personal health information to be kept private. This right is guaranteed by the common-law duty of confidence, the Data Protection Act 1998 and the NHS Care Record Guarantee and confidentiality policy. This article discusses the district nurse's legal obligations when considering sharing information in relation to an incapable adult PMID:24897837

  11. 16 CFR 312.6 - Right of parent to review personal information provided by a child.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... UNDER SPECIFIC ACTS OF CONGRESS CHILDREN'S ONLINE PRIVACY PROTECTION RULE § 312.6 Right of parent to... personal information to a website or online service, the operator of that website or online service is... permit the operator's further use or future online collection of personal information from that...

  12. 30 CFR 56.12020 - Protection of persons at switchgear.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 30 Mineral Resources 1 2013-07-01 2013-07-01 false Protection of persons at switchgear. 56.12020 Section 56.12020 Mineral Resources MINE SAFETY AND HEALTH ADMINISTRATION, DEPARTMENT OF LABOR METAL AND NONMETAL MINE SAFETY AND HEALTH SAFETY AND HEALTH STANDARDS-SURFACE METAL AND NONMETAL MINES...

  13. 30 CFR 56.12020 - Protection of persons at switchgear.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 30 Mineral Resources 1 2014-07-01 2014-07-01 false Protection of persons at switchgear. 56.12020 Section 56.12020 Mineral Resources MINE SAFETY AND HEALTH ADMINISTRATION, DEPARTMENT OF LABOR METAL AND NONMETAL MINE SAFETY AND HEALTH SAFETY AND HEALTH STANDARDS-SURFACE METAL AND NONMETAL MINES...

  14. 30 CFR 56.12020 - Protection of persons at switchgear.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 30 Mineral Resources 1 2012-07-01 2012-07-01 false Protection of persons at switchgear. 56.12020 Section 56.12020 Mineral Resources MINE SAFETY AND HEALTH ADMINISTRATION, DEPARTMENT OF LABOR METAL AND NONMETAL MINE SAFETY AND HEALTH SAFETY AND HEALTH STANDARDS-SURFACE METAL AND NONMETAL MINES...

  15. Evaluation of commercial products for personal protection against mosquitoes

    Technology Transfer Automated Retrieval System (TEKTRAN)

    Human landing catch studies were conducted in a semi-field setting to determine the efficacy of seven commercial products used for personal protection against mosquitoes. Experiments were conducted in two empty, insecticide free, greenhouse compartments, in Israel, with either 1500 Aedes albopictus...

  16. 30 CFR 56.12020 - Protection of persons at switchgear.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 30 Mineral Resources 1 2011-07-01 2011-07-01 false Protection of persons at switchgear. 56.12020 Section 56.12020 Mineral Resources MINE SAFETY AND HEALTH ADMINISTRATION, DEPARTMENT OF LABOR METAL AND NONMETAL MINE SAFETY AND HEALTH SAFETY AND HEALTH STANDARDS-SURFACE METAL AND NONMETAL MINES...

  17. 30 CFR 56.12020 - Protection of persons at switchgear.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 30 Mineral Resources 1 2010-07-01 2010-07-01 false Protection of persons at switchgear. 56.12020 Section 56.12020 Mineral Resources MINE SAFETY AND HEALTH ADMINISTRATION, DEPARTMENT OF LABOR METAL AND NONMETAL MINE SAFETY AND HEALTH SAFETY AND HEALTH STANDARDS-SURFACE METAL AND NONMETAL MINES...

  18. 40 CFR 170.240 - Personal protective equipment.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ..., chemical-resistant gloves, chemical-resistant footwear, respiratory protection devices, chemical-resistant... using a closed system to mix or load pesticides with a signal word of DANGER or WARNING may substitute a...) Persons using a closed system to mix or load pesticides other than those in paragraph (d)(4)(i) of...

  19. 40 CFR 170.240 - Personal protective equipment.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ..., chemical-resistant gloves, chemical-resistant footwear, respiratory protection devices, chemical-resistant... using a closed system to mix or load pesticides with a signal word of DANGER or WARNING may substitute a...) Persons using a closed system to mix or load pesticides other than those in paragraph (d)(4)(i) of...

  20. 40 CFR 170.240 - Personal protective equipment.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ..., chemical-resistant gloves, chemical-resistant footwear, respiratory protection devices, chemical-resistant... using a closed system to mix or load pesticides with a signal word of DANGER or WARNING may substitute a...) Persons using a closed system to mix or load pesticides other than those in paragraph (d)(4)(i) of...

  1. 40 CFR 170.240 - Personal protective equipment.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ..., chemical-resistant gloves, chemical-resistant footwear, respiratory protection devices, chemical-resistant... using a closed system to mix or load pesticides with a signal word of DANGER or WARNING may substitute a...) Persons using a closed system to mix or load pesticides other than those in paragraph (d)(4)(i) of...

  2. 49 CFR 214.111 - Personal protective equipment, generally.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 49 Transportation 4 2011-10-01 2011-10-01 false Personal protective equipment, generally. 214.111 Section 214.111 Transportation Other Regulations Relating to Transportation (Continued) FEDERAL RAILROAD ADMINISTRATION, DEPARTMENT OF TRANSPORTATION RAILROAD WORKPLACE SAFETY Bridge Worker Safety Standards §...

  3. Chlorobenzylidenemalonitrile Gas Exposure from A Novelty Personal-Protection Gun

    PubMed Central

    Dong, Christopher; de la Garza, Albert

    2007-01-01

    We present an unusual case of chlorobenzylidenemalonitrile (CS) tear-gas exposure from the unwitting discharge of a personal-protection handgun loaded with CS gas. The gun was in a bag of toys purchased from a local thrift store and was discharged by a child. The responding paramedic presumptively identified the substance as CS based solely on personal experience. This recognition led to suboptimal field management of the incident with the paramedic failing to follow the standard operating procedures for an unknown chemical exposure. As this was a benign agent, there were no serious consequences. This case highlights the pre-hospital and emergency department challenges associated with the management of an unknown chemical exposure and the potential consequences if the chemical is a toxic substance. A methodical approach following established protocols can reduce the potential for negative outcomes. Review of the literature found no other report of CS gas exposure from such a personal-protection weapon. PMID:20440402

  4. 40 CFR 370.60 - How does a person obtain MSDS information about a specific facility?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 40 Protection of Environment 27 2010-07-01 2010-07-01 false How does a person obtain MSDS information about a specific facility? 370.60 Section 370.60 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) SUPERFUND, EMERGENCY PLANNING, AND COMMUNITY RIGHT-TO-KNOW PROGRAMS HAZARDOUS CHEMICAL REPORTING: COMMUNITY...

  5. Hazard Assessment of Personal Protective Clothing for Hydrogen Peroxide Service

    NASA Technical Reports Server (NTRS)

    Greene, Ben; McClure, Mark B.; Johnson, Harry T.

    2004-01-01

    Selection of personal protective equipment (PPE) for hydrogen peroxide service is an important part of the hazard assessment process. But because drip testing of chemical protective clothing for hydrogen peroxide service has not been reported for about 40 years, it is of great interest to test new protective clothing materials with new, high-concentration hydrogen peroxide following similar procedures. The suitability of PPE for hydrogen peroxide service is in part determined by observations made when hydrogen peroxide is dripped onto swatches of protective clothing material. Protective clothing material was tested as received, in soiled condition, and in grossly soiled condition. Materials were soiled by pretreating the material with potassium permanganate (KMnO4) solution then drying to promote a reaction. Materials were grossly soiled with solid KMnO4 to greatly promote reaction. Observations of results including visual changes to the hydrogen peroxide and materials, times to ignition, and self-extinguishing characteristics of the materials are reported.

  6. 32 CFR Appendix A to Part 310 - Safeguarding Personally Identifiable Information (PII)

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... SECRETARY OF DEFENSE (CONTINUED) PRIVACY PROGRAM DOD PRIVACY PROGRAM Pt. 310, App. A Appendix A to Part 310... stringent protection for remote access or mobile computing. 2. Encrypt unclassified personal information...

  7. Protecting Privacy in Computerized Medical Information.

    ERIC Educational Resources Information Center

    Congress of the U.S., Washington, DC. Office of Technology Assessment.

    This report analyzes the implications of computerized medical information and the challenges it brings to individual privacy. The report examines the nature of the privacy interest in health care information and the current state of the law protecting that information; the nature of proposals to computerize health care information and the…

  8. Web-browser encryption of personal health information

    PubMed Central

    2011-01-01

    Background Electronic health records provide access to an unprecedented amount of clinical data for research that can accelerate the development of effective medical practices. However it is important to protect patient confidentiality, as many medical conditions are stigmatized and disclosure could result in personal and/or financial loss. Results We describe a system for remote data entry that allows the data that would identify the patient to be encrypted in the web browser of the person entering the data. These data cannot be decrypted on the server by the staff at the data center but can be decrypted by the person entering the data or their delegate. We developed this system to solve a problem that arose in the context of clinical research, but it is applicable in a range of situations where sensitive information is stored and updated in a database and it is necessary to ensure that it cannot be viewed by any except those intentionally given access. Conclusion By developing this system, we are able to centralize the collection of some patient data while minimizing the risk that protected health information be made available to study personnel who are not authorized to use it. PMID:22073940

  9. Personal protective equipment and decontamination of adults and children.

    PubMed

    Holland, Michael G; Cawthon, David

    2015-02-01

    Accurate identification of the hazardous material is essential for proper care. Efficient hospital security and triage must prevent contaminated victims from entering the emergency department (ED) and causing secondary contamination. The decontamination area should be located outside the ambulance entrance. Decontamination priorities are protection of the health care worker, utilization of Level C personal protective equipment, and proper decontamination of the exposed patient. Decontamination proceeds in a head-to-toe sequence. Run-off water is a hazardous waste. Hospital and Community Management Planning for these emergencies is essential for proper preparation and effective response to the hazardous materials incident. PMID:25455662

  10. Self-informant Agreement for Personality and Evaluative Person Descriptors: Comparing Methods for Creating Informant Measures

    PubMed Central

    Simms, Leonard J.; Zelazny, Kerry; Yam, Wern How; Gros, Daniel F.

    2011-01-01

    Little attention typically is paid to the way self-report measures are translated for use in self-informant agreement studies. We studied two possible methods for creating informant measures: (a) the traditional method in which self-report items were translated from the first- to the third-person and (b) an alternative meta-perceptual method in which informants were directed to rate their perception of the targets’ self-perception. We hypothesized that the latter method would yield stronger self-informant agreement for evaluative personality dimensions measured by indirect item markers. We studied these methods in a sample of 303 undergraduate friendship dyads. Results revealed mean-level differences between methods, similar self-informant agreement across methods, stronger agreement for Big Five dimensions than for evaluative dimensions, and incremental validity for meta-perceptual informant rating methods. Limited power reduced the interpretability of several sparse acquaintanceship effects. We conclude that traditional informant methods are appropriate for most personality traits, but meta-perceptual methods may be more appropriate when personality questionnaire items reflect indirect indicators of the trait being measured, which is particularly likely for evaluative traits. PMID:21541262

  11. [Safety analysis for astronaut and the personal protective equipment].

    PubMed

    Chen, J D; Sun, J B; Shi, H P; Sun, H L

    1999-12-01

    Objective. To analyze and study astronaut and his personal equipment safety. Method. Three of the most widely used approaches, failure mode and effect analysis (FMEA), fault tree analysis (FTA) and system hazards analysis (SHA) were used. Result. It was demonstrated that astronaut and the personal equipment are subjected to various potential hazards, such as human errors, astronaut illness, fire or space suit emergency decompression, etc. Their causes, mechanisms, possible effects and criticality of some critical potential hazards were analyzed and identified in more details with considerations of the historic accidents of manned spaceflight. And the compensating provisions and preventive measures for each hazard were discussed. Conclusion. The analysis study may be helpful in enhancing the safety of the astronaut and its personal protective equipment. PMID:12434807

  12. 77 FR 35700 - Protected Critical Infrastructure Information (PCII) Program Survey

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-06-14

    ... SECURITY Protected Critical Infrastructure Information (PCII) Program Survey AGENCY: National Protection...), National Protection and Programs Directorate (NPPD), Office of Infrastructure Protection (IP), Infrastructure Information Collection Division (IICD), will submit the following Information Collection...

  13. 22 CFR 96.26 - Protection of information and documents by the accrediting entity.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 22 Foreign Relations 1 2010-04-01 2010-04-01 false Protection of information and documents by the... of Applicants for Accreditation and Approval § 96.26 Protection of information and documents by the... and information about the agency or person it receives including, but not limited to, documents...

  14. 6 CFR 29.7 - Safeguarding of Protected Critical Infrastructure Information.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... Infrastructure Information. 29.7 Section 29.7 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY PROTECTED CRITICAL INFRASTRUCTURE INFORMATION § 29.7 Safeguarding of Protected Critical Infrastructure Information. (a) Safeguarding. All persons granted access to PCII are responsible for...

  15. 6 CFR 29.7 - Safeguarding of Protected Critical Infrastructure Information.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... Infrastructure Information. 29.7 Section 29.7 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY PROTECTED CRITICAL INFRASTRUCTURE INFORMATION § 29.7 Safeguarding of Protected Critical Infrastructure Information. (a) Safeguarding. All persons granted access to PCII are responsible for...

  16. 6 CFR 29.7 - Safeguarding of Protected Critical Infrastructure Information.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... Infrastructure Information. 29.7 Section 29.7 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY PROTECTED CRITICAL INFRASTRUCTURE INFORMATION § 29.7 Safeguarding of Protected Critical Infrastructure Information. (a) Safeguarding. All persons granted access to PCII are responsible for...

  17. 6 CFR 29.7 - Safeguarding of Protected Critical Infrastructure Information.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... Infrastructure Information. 29.7 Section 29.7 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY PROTECTED CRITICAL INFRASTRUCTURE INFORMATION § 29.7 Safeguarding of Protected Critical Infrastructure Information. (a) Safeguarding. All persons granted access to PCII are responsible for...

  18. Government Doublethink: Protection or Suppression in Information.

    ERIC Educational Resources Information Center

    Drake, Miriam A.

    2003-01-01

    Discusses regulations and actions related to government withholding, suppressing, and altering information since September 11, 2001. Topics include conflicting goals of an informed citizenry versus national security, science and technology progress versus protection of sensitive information, and public health versus ideology; political pressure;…

  19. Insect repellents and associated personal protection for a reduction in human disease

    Technology Transfer Automated Retrieval System (TEKTRAN)

    Personal protection measures against biting arthropods include topical insect repellents, area repellents, insecticide-treated bednets and treated clothing. The literature on the effectiveness of personal protection products against arthropods is mainly limited to studies of prevention of bites, rat...

  20. Personal Health Information in Canada: A Comparison of Citizen Expectations and Legislation

    ERIC Educational Resources Information Center

    Peekhaus, Wilhelm

    2008-01-01

    This paper explores whether the Canadian legislative protections in place to safeguard medical privacy meet the expectations of Canadians. An overview of current governance systems designed to protect the privacy of personal health information at both the federal and provincial levels is first presented. This is followed by an empirical analysis…

  1. Hiding personal information reveals the worst

    PubMed Central

    John, Leslie K.; Barasz, Kate; Norton, Michael I.

    2016-01-01

    Seven experiments explore people’s decisions to share or withhold personal information, and the wisdom of such decisions. When people choose not to reveal information—to be “hiders”—they are judged negatively by others (experiment 1). These negative judgments emerge when hiding is volitional (experiments 2A and 2B) and are driven by decreases in trustworthiness engendered by decisions to hide (experiments 3A and 3B). Moreover, hiders do not intuit these negative consequences: given the choice to withhold or reveal unsavory information, people often choose to withhold, but observers rate those who reveal even questionable behavior more positively (experiments 4A and 4B). The negative impact of hiding holds whether opting not to disclose unflattering (drug use, poor grades, and sexually transmitted diseases) or flattering (blood donations) information, and across decisions ranging from whom to date to whom to hire. When faced with decisions about disclosure, decision-makers should be aware not just of the risk of revealing, but of what hiding reveals. PMID:26755591

  2. Evaluation of commercial products for personal protection against mosquitoes.

    PubMed

    Revay, Edita E; Junnila, Amy; Xue, Rui-De; Kline, Daniel L; Bernier, Ulrich R; Kravchenko, Vasiliy D; Qualls, Whitney A; Ghattas, Nina; Müller, Günter C

    2013-02-01

    Human landing catch studies were conducted in a semi-field setting to determine the efficacy of seven commercial products used for personal protection against mosquitoes. Experiments were conducted in two empty, insecticide free, mesh-enclosed greenhouses, in Israel, with either 1500 Aedes albopictus or 1500 Culex pipiens released on consecutive study nights. The products tested in this study were the OFF!(®) Clip-On™ Mosquito Repellent (Metofluthrin 31.2%) and the Terminix(®) ALLCLEAR(®) Sidekick Mosquito Repeller (Cinnamon oil 10.5%; Eugenol 13%; Geranium oil 21%; Peppermint 5.3%; Lemongrass oil 2.6%), which are personal diffusers; Super Band™ Wristband (22% Citronella oil) and the PIC(®) Citronella Plus Wristband (Geraniol 15%; Lemongrass oil 5%, Citronella oil 1%); the Sonic Insect Repeller Keychain; the Mosquito Guard Patch (Oil of Lemon Eucalyptus 80mg), an adhesive-backed sticker for use on textiles; and the Mosquito Patch (vitamin B1 300mg), a transdermal patch. It was determined that the sticker, transdermal patch, wristbands and sonic device did not provide significant protection to volunteers compared with the mosquito attack rate on control volunteers who were not wearing a repellent device. The personal diffusers: - OFF!(®) Clip-On™ and Terminix(®) ALLCLEAR(®) Sidekick - provided superior protection compared with all other devices in this study. These diffusers reduced biting on the arms of volunteers by 96.28% and 95.26% respectively, for Ae. albopictus, and by 94.94% and 92.15% respectively, for Cx. pipiens. In a second trial conducted to compare these devices directly, biting was reduced by the OFF!(®) Clip-On™ and the Terminix(®) ALLCLEAR(®) by 87.55% and 92.83%, respectively, for Ae. albopictus, and by 97.22% and 94.14%, respectively, for Cx. pipiens. There was no significant difference between the performances of the two diffusers for each species. PMID:23092689

  3. Incontinence-associated dermatitis: protecting the older person.

    PubMed

    Beldon, Pauline

    As the older population in the UK continues to grow, so too will the number of people presenting with dermatological problems. Older people's skin is subject to dehydration internally and environmental factors externally. If, in addition, the individual suffers continence problems, he or she is at risk of painful incontinence-associated dermatitis, or even formation of a moisture lesion. The use of an effective barrier cream that gives protection while not interfering with continence pad efficacy can be an invaluable means of comfort to the older person. PMID:22585017

  4. 78 FR 5116 - NASA Information Security Protection

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-01-24

    ... Executive Order of 13132 E.O. 13132, ``Federalism,'' 64 FR 43255 (August 4, 1999) requires regulations be... SPACE ADMINISTRATION 14 CFR Part 1203 RIN 2700-AD61 NASA Information Security Protection AGENCY..., Classified National Security Information, and appropriately to correspond with NASA's internal...

  5. Information for and by Blind Persons in Rural Asia.

    ERIC Educational Resources Information Center

    Miles, M.

    1990-01-01

    The concept of information-based rehabilitation has emerged from implementation of information and communication strategies with rural Asian blind persons. Radio broadcast of mobility skill instruction is considered as a medium for mass dissemination of information to blind persons. Information derived from the experiences of blind people should…

  6. Making sense of personal health information: challenges for information visualization.

    PubMed

    Faisal, Sarah; Blandford, Ann; Potts, Henry W W

    2013-09-01

    This article presents a systematic review of the literature on information visualization for making sense of personal health information. Based on this review, five application themes were identified: treatment planning, examination of patients' medical records, representation of pedigrees and family history, communication and shared decision making, and life management and health monitoring. While there are recognized design challenges associated with each of these themes, such as how best to represent data visually and integrate qualitative and quantitative information, other challenges and opportunities have received little attention to date. In this article, we highlight, in particular, the opportunities for supporting people in better understanding their own illnesses and making sense of their health conditions in order to manage them more effectively. PMID:23981395

  7. 78 FR 24234 - Agency Information Collection Activities; Submission for OMB Review; Comment Request; Personal...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-04-24

    ...; Personal Protective Equipment Standard for General Industry ACTION: Notice. SUMMARY: The Department of... collection request (ICR) titled, ``Personal Protective Equipment Standard for General Industry,'' to the... that personal protective equipment (PPE)--including equipment for eyes, face, head, and...

  8. [Personal protection measures against blood-sucking insects and ticks].

    PubMed

    Orshan, Laor; Wilamowski, Amos; Pener, Hedva

    2010-09-01

    Blood-sucking arthropods are major vectors of various pathogens like viruses, bacteria, protozoa and nematodes. Preventing exposure to the vector is imperative especially when vaccine and prophylactic treatments are not available. Personal protection measures (PPM) are essential and often the only means available when dealing with blood-sucking disease transmitting arthropods. Awareness of the risk in the specific areas of travel is the first step to be taken before and while traveling. PPM include preventive personal behavior, suitable clothing, application of insect repellents to the skin, the use of space repellents, impregnation of clothing, camping gear and bed nets and, when necessary, ground spraying of insecticides. The registered and recommended active ingredients for skin application are Deet, picaridin (icaridin), p-menthane-3,8-diol (PMD) and IR3535. Volatile pyrethrins are used as space repellents while pyrethroids, especially permethrin, are employed for impregnation and for ground spraying. It is recommended to purchase only products registered in Israel or other developed countries. These products should have a detailed label specifying the concentration of the active ingredient, application instructions and the duration of protection. PMID:21302476

  9. Personal protective equipment for registration purposes of pesticides.

    PubMed

    Gerritsen-Ebben, M G; Brouwer, D H; van Hemmen, J J

    2007-01-01

    Regulatory authorities in North America, Europe and Australia use different approaches for the estimation of exposure reduction effectiveness of personal protective equipment (PPE) in registration processes of agrochemical pesticides. TNO has investigated current views and facts for the use of default values and set up a discussion paper which can be used as a starting point to achieve an internationally harmonised set of PPE protection factors for regulatory use. For inhalation exposure Loading it is proposed to use the assigned protection factors (APF) as deduced by BSI (British Standard Institution) and ANSI (American National Standards Institution). Since these values are somewhat variance and since in agricultural settings efficient control and proper training and education with respect to inhalation protection devices is generally absent, it is good to err on the safe side and to use the Lowest of both values, if available. For dermal exposure Loading differentiations are made for operators and re-entry workers and further for hand and body protection. Next to this the restrictions and framework for the use of the proposed defaults are very relevant. Oral exposure loading is only considered in special cases where dermal exposure may be relatively high and the hand-mouth shunt may lead to appreciable oral exposure loading. The presented defaults for PPE have been discussed with experts of regulatory authorities and industry, but a formal discussion still has to take place. This needs to be done on EU level between Member States. The current proposal is based on state-of-the-art knowledge and policy considerations, but further research is needed to better underpin the proposed values and/or to adapt them. PMID:18399428

  10. DEVELOPMENT OF PERSONAL PROTECTIVE EQUIPMENT FOR DECONTAMINATION AND DECOMMISSIONING

    SciTech Connect

    M.A. Ebadian, Ph.D.

    1999-01-01

    The purpose of this one-year investigation is to perform a technology integration/search, thereby ensuring that the safest and most cost-effective options are developed and subsequently used during the deactivation and decommissioning (D&D) of U.S. Department of Energy Environmental Management (DOE-EM) sites. Issues of worker health and safety are the main concern, followed by cost. Two lines of action were explored: innovative Personal Cooling Systems (PCS) and Personal Monitoring Equipment (PME). PME refers to sensors affixed to the worker that warn of an approaching heat stress condition, thereby preventing it. Three types of cooling systems were investigated: Pre-Chilled or Forced-Air System (PCFA), Umbilical Fluid-Chilled System (UFCS), and Passive Vest System (PVS). Of these, the UFCS leads the way. The PVS or Gel pack vest lagged due to a limited cooling duration. And the PCFA or chilled liquid air supply was cumbersome and required an expensive and complex recharge system. The UFCS in the form of the Personal Ice Cooling System (PICS) performed exceptionally. The technology uses a chilled liquid circulating undergarment and a Personal Protective Equipment (PPE) external pump and ice reservoir. The system is moderately expensive, but the recharge is low-tech and inexpensive enough to offset the cost. There are commercially available PME that can be augmented to meet the DOE's heat stress alleviation need. The technology is costly, in excess of $4,000 per unit. Workers easily ignore the alarm. The benefit to health & safety is indirect so can be overlooked. A PCS is a more justifiable expenditure.

  11. Content Sharing Based on Personal Information in Virtually Secured Space

    NASA Astrophysics Data System (ADS)

    Sohn, Hosik; Ro, Yong Man; Plataniotis, Kostantinos N.

    User generated contents (UGC) are shared in an open space like social media where users can upload and consume contents freely. Since the access of contents is not restricted, the contents could be delivered to unwanted users or misused sometimes. In this paper, we propose a method for sharing UGCs securely based on the personal information of users. With the proposed method, virtual secure space is created for contents delivery. The virtual secure space allows UGC creator to deliver contents to users who have similar personal information and they can consume the contents without any leakage of personal information. In order to verify the usefulness of the proposed method, the experiment was performed where the content was encrypted with personal information of creator, and users with similar personal information have decrypted and consumed the contents. The results showed that UGCs were securely shared among users who have similar personal information.

  12. 48 CFR 32.1104 - Protection of EFT information.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... GENERAL CONTRACTING REQUIREMENTS CONTRACT FINANCING Electronic Funds Transfer 32.1104 Protection of EFT information. The Government shall protect against improper disclosure of contractors' EFT information....

  13. Permeation Resistance of Personal Protective Equipment Materials to Monomethyhydrazine

    NASA Technical Reports Server (NTRS)

    Waller, J. M.; Williams, J. H.

    1997-01-01

    Permeation resistance was determined by measuring the breakthrough time and time-averaged vapor transmission rate of monomethylhydrazine (MMH) through two types of personal protective equipment (PPE). The two types of PPE evaluated were the totally encapsulating ILC Dover Chemturion Model 1212 chemical protective suit with accessories, and the FabOhio polyvinyl chloride (PVC) splash garment. Two exposure scenarios were simulated: (1) a saturated vapor exposure for 2 hours (h), and (2) a brief MMH 'splash' followed by a 2-h saturated vapor exposure. Time-averaged MMH concentrations inside the totally-encapsulating suit were calculated by summation of the area-weighted contributions made by each suit component. Results show that the totally encapsulating suit provides adequate protection at the new 10 ppb Threshold Limit Value Time-Weighted Average (TLV-TWA). The permeation resistance of the PVC splash garment to MMH was poorer than any of the totally encapsulating suit materials tested. Breakthrough occurred soon after initial vapor or 'splash' exposure.

  14. A guide to unclassified sensitive information protection

    SciTech Connect

    Donahue, S.C.

    1996-11-14

    This document is a reference guide for CIC-Division employees who lead or participate in projects that use and/or produce unclassified sensitive information. It is intended for use on a case by case basis to develop project specific sensitive information handling procedures and standards. It contains criteria for identifying sensitive information and determining levels of sensitivity, and describes cost effective measures for protecting various levels of sensitive information. The goal of this document is to help establish good business practices that benefit both the Laboratory and its customers. Division personnel are encouraged to apply these guidelines.

  15. Ethical Considerations Regarding Classroom Use of Personal Genomic Information

    PubMed Central

    Parker, Lisa S.; Grubs, Robin

    2014-01-01

    Rapidly decreasing costs of genetic technologies—especially next-generation sequencing—and intensifying need for a clinical workforce trained in genomic medicine have increased interest in having students use personal genomic information to motivate and enhance genomics education. Numerous ethical issues attend classroom/pedagogical use of students’ personal genomic information, including their informed decision to participate, pressures to participate, privacy concerns, and psychosocial sequelae of learning genomic information. This paper addresses these issues, advocates explicit discussion of these issues to cultivate students’ ethical reasoning skills, suggests ways to mitigate potential harms, and recommends collection of ethically relevant data regarding pedagogical use of personal genomic information. PMID:25574277

  16. 32 CFR 505.4 - Collecting personal information.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... AUTHORITIES AND PUBLIC RELATIONS ARMY PRIVACY ACT PROGRAM § 505.4 Collecting personal information. (a) General... information on public Web sites without the express permission of the user. Requests for exceptions must...

  17. 32 CFR 327.6 - Collecting personal information

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 32 National Defense 2 2010-07-01 2010-07-01 false Collecting personal information 327.6 Section 327.6 National Defense Department of Defense (Continued) OFFICE OF THE SECRETARY OF DEFENSE (CONTINUED) PRIVACY PROGRAM DEFENSE COMMISSARY AGENCY PRIVACY ACT PROGRAM § 327.6 Collecting personal information (a) Collect directly from the individual....

  18. 32 CFR 310.17 - Individual access to personal information.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 32 National Defense 2 2013-07-01 2013-07-01 false Individual access to personal information. 310.17 Section 310.17 National Defense Department of Defense (Continued) OFFICE OF THE SECRETARY OF DEFENSE (CONTINUED) PRIVACY PROGRAM DOD PRIVACY PROGRAM Access by Individuals § 310.17 Individual access to personal information. (a) Individual access....

  19. 32 CFR 310.17 - Individual access to personal information.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 32 National Defense 2 2014-07-01 2014-07-01 false Individual access to personal information. 310.17 Section 310.17 National Defense Department of Defense (Continued) OFFICE OF THE SECRETARY OF DEFENSE (CONTINUED) PRIVACY PROGRAM DOD PRIVACY PROGRAM Access by Individuals § 310.17 Individual access to personal information. (a) Individual access....

  20. Continuum Thinking and the Contexts of Personal Information Management

    ERIC Educational Resources Information Center

    Huvila, Isto; Eriksen, Jon; Häusner, Eva-Maria; Jansson, Ina-Maria

    2014-01-01

    Introduction: Recent personal information management literature has underlined the significance of the contextuality of personal information and its use. The present article discusses the applicability of the records continuum model and its generalisation, continuum thinking, as a theoretical framework for explicating the overlap and evolution of…

  1. Farmers' use of personal protective equipment during handling of plant protection products: Determinants of implementation.

    PubMed

    Damalas, Christos A; Abdollahzadeh, Gholamhossein

    2016-11-15

    Understanding factors affecting the use of personal protective equipment (PPE) during handling of plant protection products (PPPs) is of major importance for the design of tailored interventions to minimize exposure among farmers. However, data regarding this issue are highly limited. Factors related to the use of PPE during handling of PPPs were explored in a survey of cotton farmers in northern Greece. Data were collected through face-to-face interviews with the farmers based on a questionnaire with structured items on the frequency of use of various personal protective devices during handling of PPPs. New evidence on patterns of PPE use and potential exposure of farmers to PPPs is provided. Most farmers (49.3%) showed potentially unsafe behaviour with respect to PPE use. Hat and boots were the most commonly used protective items during PPPs use, but most of the farmers surveyed reported low frequency of use for gloves, goggles, face mask, coveralls, and respirator. Especially the respirator was reported to be the least used PPE item amongst farmers. Farmers who perceived PPPs as harmful substances or those who had an episode of intoxication in the past reported more frequent use of several PPE items. Stepwise multiple regression analysis revealed that the variable episode of intoxication in the past exerted the strongest positive influence on PPE use, followed by the perception of PPPs being hazardous substances, upper secondary education, previous training on PPPs (i.e., spraying equipment, application parameters, risks to human health and environment, safety issues) and farm size under cultivation. Old age exerted a significant negative influence on PPE use, namely, elderly farmers tended not to use PPE. Strategies to maximize the protection of applicators of PPPs from hazardous exposures still require innovation to achieve increased effectiveness. Emphasis on lifelong training and education of farmers about hazards and risks of PPPs is crucial for changing

  2. 10 CFR 2.903 - Protection of restricted data and national security information.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... Restricted Data and/or National Security Information § 2.903 Protection of restricted data and national security information. Nothing in this subpart shall relieve any person from safeguarding Restricted Data or National Security Information in accordance with the applicable provisions of laws of the United States...

  3. 10 CFR 2.903 - Protection of restricted data and national security information.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... Restricted Data and/or National Security Information § 2.903 Protection of restricted data and national security information. Nothing in this subpart shall relieve any person from safeguarding Restricted Data or National Security Information in accordance with the applicable provisions of laws of the United States...

  4. 10 CFR 2.903 - Protection of restricted data and national security information.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... Restricted Data and/or National Security Information § 2.903 Protection of restricted data and national security information. Nothing in this subpart shall relieve any person from safeguarding Restricted Data or National Security Information in accordance with the applicable provisions of laws of the United States...

  5. Are Norms of Disclosure of Online and Offline Personal Information Associated with the Disclosure of Personal Information Online?

    ERIC Educational Resources Information Center

    Mesch, Gustavo S.; Beker, Guy

    2010-01-01

    This study investigated whether norms of self-disclosure of one's online and offline identity are linked to online disclosure of personal and intimate information. We expected online disclosure of personal and intimate information to be associated with norms of online disclosure. Secondary analysis of the 2006 Pew and American Life Survey of…

  6. 48 CFR 8.608 - Protection of classified and sensitive information.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 48 Federal Acquisition Regulations System 1 2010-10-01 2010-10-01 false Protection of classified... Prison Industries, Inc. 8.608 Protection of classified and sensitive information. Agencies shall not... petroleum products, or other commodities; or (3) Other utilities; or (c) Personal or financial...

  7. Personal health records: retrieving contextual information with Google Custom Search.

    PubMed

    Ahsan, Mahmud; Seldon, H Lee; Sayeed, Shohel

    2012-01-01

    Ubiquitous personal health records, which can accompany a person everywhere, are a necessary requirement for ubiquitous healthcare. Contextual information related to health events is important for the diagnosis and treatment of disease and for the maintenance of good health, yet it is seldom recorded in a health record. We describe a dual cellphone-and-Web-based personal health record system which can include 'external' contextual information. Much contextual information is available on the Internet and we can use ontologies to help identify relevant sites and information. But a search engine is required to retrieve information from the Web and developing a customized search engine is beyond our scope, so we can use Google Custom Search API Web service to get contextual data. In this paper we describe a framework which combines a health-and-environment 'knowledge base' or ontology with the Google Custom Search API to retrieve relevant contextual information related to entries in a ubiquitous personal health record. PMID:23138074

  8. The Personalized Information Retrieval Model Based on User Interest

    NASA Astrophysics Data System (ADS)

    Gong, Songjie

    Personalized information retrieval systems can help customers to gain orientation in information overload by determining which items are relevant for their interests. One type of information retrieval is content-based filtering. In content-based filtering, items contain words in natural language. Meanings of words in natural language are often ambiguous. The problem of word meaning disambiguation is often decomposed to determining semantic similarity of words. In this paper, the architecture of personalized information retrieval based on user interest is presented. The architecture includes user interface model, user interest model, detecting interest model and update model. It established a user model for personalized information retrieval based on user interest keyword list on client server, which can supply personalized information retrieval service for user with the communications and collaboration of all modules of the architecture.

  9. Smartphone Mobile Application Delivering Personalized, Real-Time Sun Protection Advice: A Randomized Clinical Trial

    PubMed Central

    Buller, David B.; Berwick, Marianne; Lantz, Kathy; Buller, Mary Klein; Shane, James; Kane, Ilima; Liu, Xia

    2014-01-01

    Importance Mobile smart phones are rapidly emerging as an effective means of communicating with many Americans. Using mobile applications, they can access remote databases, track time and location, and integrate user input to provide tailored health information. Objective A smart phone mobile application providing personalized, real-time sun protection advice was evaluated in a randomized trial. Design The trial was conducted in 2012 and had a randomized pretest-posttest controlled design with a 10-week follow-up. Setting Data was collected from a nationwide population-based survey panel. Participants The trial enrolled a sample of n=604 non-Hispanic and Hispanic adults from the Knowledge Panel® aged 18 or older who owned an Android smart phone. Intervention The mobile application provided advice on sun protection (i.e., protection practices and risk of sunburn) and alerts (to apply/reapply sunscreen and get out of the sun), hourly UV Index, and vitamin D production based on the forecast UV Index, phone's time and location, and user input. Main Outcomes and Measures Percent of days using sun protection and time spent outdoors (days and minutes) in the midday sun and number of sunburns in the past 3 months were collected. Results Individuals in the treatment group reported more shade use but less sunscreen use than controls. Those who used the mobile app reported spending less time in the sun and using all protection behaviors combined more. Conclusions and Relevance The mobile application improved some sun protection. Use of the mobile application was lower than expected but associated with increased sun protection. Providing personalized advice when and where people are in the sun may help reduce sun exposure. PMID:25629710

  10. Managing Personal and Group Collections of Information

    NASA Technical Reports Server (NTRS)

    Wolfe, Shawn R.; Wragg, Stephen D.; Chen, James R.; Koga, Dennis (Technical Monitor)

    1999-01-01

    The internet revolution has dramatically increased the amount of information available to users. Various tools such as search engines have been developed to help users find the information they need from this vast repository. Users often also need tools to help manipulate the growing amount of useful information they have discovered. Current tools available for this purpose are typically local components of web browsers designed to manage URL bookmarks. They provide limited functionalities to handle high information complexities. To tackle this have created DIAMS, an agent-based tool to help users or groups manage their information collections and share their collections with other. the main features of DIAMS are described here.

  11. 41 CFR 105-64.108 - How does GSA safeguard personal information?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 41 Public Contracts and Property Management 3 2010-07-01 2010-07-01 false How does GSA safeguard... GSA safeguard personal information? (a) System managers will establish administrative, technical, and physical safeguards to ensure the security and confidentiality of records, protect the records...

  12. 41 CFR 105-64.108 - How does GSA safeguard personal information?

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 41 Public Contracts and Property Management 3 2011-01-01 2011-01-01 false How does GSA safeguard... GSA safeguard personal information? (a) System managers will establish administrative, technical, and physical safeguards to ensure the security and confidentiality of records, protect the records...

  13. 16 CFR 312.8 - Confidentiality, security, and integrity of personal information collected from children.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 16 Commercial Practices 1 2011-01-01 2011-01-01 false Confidentiality, security, and integrity of... Confidentiality, security, and integrity of personal information collected from children. The operator must establish and maintain reasonable procedures to protect the confidentiality, security, and integrity...

  14. 75 FR 11982 - Request for Information for the 2010 Trafficking in Persons Report

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-03-12

    ...The Department of State (``the Department'') requests written information to assist in reporting on the degree to which the United States and foreign governments comply with the minimum standards for the elimination of trafficking in persons (``minimum standards'') that are prescribed by the Trafficking Victims Protection Act (``TVPA'') of 2000, Div. A of Public Law 106-386, section 108, as......

  15. 16 CFR 312.8 - Confidentiality, security, and integrity of personal information collected from children.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 16 Commercial Practices 1 2010-01-01 2010-01-01 false Confidentiality, security, and integrity of... Confidentiality, security, and integrity of personal information collected from children. The operator must establish and maintain reasonable procedures to protect the confidentiality, security, and integrity...

  16. 16 CFR 312.7 - Prohibition against conditioning a child's participation on collection of personal information.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 16 Commercial Practices 1 2010-01-01 2010-01-01 false Prohibition against conditioning a child's participation on collection of personal information. 312.7 Section 312.7 Commercial Practices FEDERAL TRADE COMMISSION REGULATIONS UNDER SPECIFIC ACTS OF CONGRESS CHILDREN'S ONLINE PRIVACY PROTECTION RULE §...

  17. 34 CFR 364.56 - What are the special requirements pertaining to the protection, use, and release of personal...

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 34 Education 2 2010-07-01 2010-07-01 false What are the special requirements pertaining to the protection, use, and release of personal information? 364.56 Section 364.56 Education Regulations of the Offices of the Department of Education (Continued) OFFICE OF SPECIAL EDUCATION AND REHABILITATIVE SERVICES, DEPARTMENT OF EDUCATION...

  18. Trust-based information system architecture for personal wellness.

    PubMed

    Ruotsalainen, Pekka; Nykänen, Pirkko; Seppälä, Antto; Blobel, Bernd

    2014-01-01

    Modern eHealth, ubiquitous health and personal wellness systems take place in an unsecure and ubiquitous information space where no predefined trust occurs. This paper presents novel information model and an architecture for trust based privacy management of personal health and wellness information in ubiquitous environment. The architecture enables a person to calculate a dynamic and context-aware trust value for each service provider, and using it to design personal privacy policies for trustworthy use of health and wellness services. For trust calculation a novel set of measurable context-aware and health information-sensitive attributes is developed. The architecture enables a person to manage his or her privacy in ubiquitous environment by formulating context-aware and service provider specific policies. Focus groups and information modelling was used for developing a wellness information model. System analysis method based on sequential steps that enable to combine results of analysis of privacy and trust concerns and the selection of trust and privacy services was used for development of the information system architecture. Its services (e.g. trust calculation, decision support, policy management and policy binding services) and developed attributes enable a person to define situation-aware policies that regulate the way his or her wellness and health information is processed. PMID:25160161

  19. 78 FR 53478 - Proposed Information Collection; United States Park Police Personal History Statement

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-08-29

    ... National Park Service Proposed Information Collection; United States Park Police Personal History Statement... Police Personal History Statement) to collect detailed personal history information from applicants... information, including financial data and residence history. Selective Service information and military...

  20. Withholding Information to Protect a Loved One.

    PubMed

    Kilbaugh, Todd J; Groll, Daniel; Morrison, Wynne; Liebow, Nabina; Lantos, John D

    2016-06-01

    Parents respond to the death of a child in very different ways. Some parents may be violent or angry, some sad and tearful, some quiet and withdrawn, and some frankly delusional. We present a case in which a father's reaction to his daughter's death is a desire to protect his wife from the stressful information. The wife is in the second trimester of a high-risk pregnancy and so is particularly fragile. We asked pediatricians and bioethicists to discuss the ways in which they might respond to the father's understandable but troubling request. PMID:27244864

  1. Critical Connections: Personal Learning Environments and Information Literacy

    ERIC Educational Resources Information Center

    Hicks, Alison; Sinkinson, Caroline

    2015-01-01

    Personal learning environments (PLEs) and critical information literacies (CILs) are two concepts that have been presented as responses to the challenges of the rich and complex information landscape. While both approaches support learners' critical engagement with new information environments, each was developed within a different field. This…

  2. Chest Compression With Personal Protective Equipment During Cardiopulmonary Resuscitation

    PubMed Central

    Chen, Jie; Lu, Kai-Zhi; Yi, Bin; Chen, Yan

    2016-01-01

    Abstract Following a chemical, biological, radiation, and nuclear incident, prompt cardiopulmonary resuscitation (CPR) procedure is essential for patients who suffer cardiac arrest. But CPR when wearing personal protection equipment (PPE) before decontamination becomes a challenge for healthcare workers (HCW). Although previous studies have assessed the impact of PPE on airway management, there is little research available regarding the quality of chest compression (CC) when wearing PPE. A present randomized cross-over simulation study was designed to evaluate the effect of PPE on CC performance using mannequins. The study was set in one university medical center in the China. Forty anesthesia residents participated in this randomized cross-over study. Each participant performed 2 min of CC on a manikin with and without PPE, respectively. Participants were randomized into 2 groups that either performed CC with PPE first, followed by a trial without PPE after a 180-min rest, or vice versa. CPR recording technology was used to objectively quantify the quality of CC. Additionally, participants’ physiological parameters and subjective fatigue score values were recorded. With the use of PPE, a significant decrease of the percentage of effective compressions (41.3 ± 17.1% with PPE vs 67.5 ± 15.6% without PPE, P < 0.001) and the percentage of adequate compressions (67.7 ± 18.9% with PPE vs 80.7 ± 15.5% without PPE, P < 0.001) were observed. Furthermore, the increases in heart rate, mean arterial pressure, and subjective fatigue score values were more obvious with the use of PPE (all P < 0.01). We found significant deterioration of CC performance in HCW with the use of a level-C PPE, which may be a disadvantage for enhancing survival of cardiac arrest. PMID:27057878

  3. Personal protective equipment and risk for avian influenza (H7N3).

    PubMed

    Morgan, Oliver; Kuhne, Mirjam; Nair, Pat; Verlander, Neville Q; Preece, Richard; McDougal, Marianne; Zambon, Maria; Reacher, Mark

    2009-01-01

    An outbreak of avian influenza (H7N3) among poultry resulted in laboratory-confirmed disease in 1 of 103 exposed persons. Incomplete use of personal protective equipment (PPE) was associated with conjunctivitis and influenza-like symptoms. Rigorous use of PPE by persons managing avian influenza outbreaks may reduce exposure to potentially hazardous infected poultry materials. PMID:19116052

  4. Personal Protective Equipment and Risk for Avian Influenza (H7N3)

    PubMed Central

    Kuhne, Mirjam; Nair, Pat; Verlander, Neville Q.; Preece, Richard; McDougal, Marianne; Zambon, Maria; Reacher, Mark

    2009-01-01

    An outbreak of avian influenza (H7N3) among poultry resulted in laboratory-confirmed disease in 1 of 103 exposed persons. Incomplete use of personal protective equipment (PPE) was associated with conjunctivitis and influenza-like symptoms. Rigorous use of PPE by persons managing avian influenza outbreaks may reduce exposure to potentially hazardous infected poultry materials. PMID:19116052

  5. River Protection Project information systems assessment

    SciTech Connect

    JOHNSON, A.L.

    1999-07-28

    The Information Systems Assessment Report documents the results from assessing the Project Hanford Management Contract (PHMC) Hanford Data Integrator 2000 (HANDI 2000) system, Business Management System (BMS) and Work Management System phases (WMS), with respect to the System Engineering Capability Assessment Model (CAM). The assessment was performed in accordance with the expectations stated in the fiscal year (FY) 1999 Performance Agreement 7.1.1, item (2) which reads, ''Provide an assessment report on the selected Integrated Information System by July 31, 1999.'' This report assesses the BMS and WMS as implemented and planned for the River Protection Project (RPP). The systems implementation is being performed under the PHMC HANDI 2000 information system project. The project began in FY 1998 with the BMS, proceeded in FY 1999 with the Master Equipment List portion of the WMS, and will continue the WMS implementation as funding provides. This report constitutes an interim quality assessment providing information necessary for planning RPP's information systems activities. To avoid confusion, HANDI 2000 will be used when referring to the entire system, encompassing both the BMS and WMS. A graphical depiction of the system is shown in Figure 2-1 of this report.

  6. 18 CFR 401.75 - Protection of trade secrets; Confidential information.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... secrets; Confidential information. 401.75 Section 401.75 Conservation of Power and Water Resources... to Decisions of the Executive Director in Water Qualtity Cases § 401.75 Protection of trade secrets; Confidential information. No person shall be required in such report to divulge trade secrets or...

  7. 18 CFR 401.75 - Protection of trade secrets; Confidential information.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... secrets; Confidential information. 401.75 Section 401.75 Conservation of Power and Water Resources... to Decisions of the Executive Director in Water Qualtity Cases § 401.75 Protection of trade secrets; Confidential information. No person shall be required in such report to divulge trade secrets or...

  8. 18 CFR 401.75 - Protection of trade secrets; Confidential information.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... secrets; Confidential information. 401.75 Section 401.75 Conservation of Power and Water Resources... to Decisions of the Executive Director in Water Qualtity Cases § 401.75 Protection of trade secrets; Confidential information. No person shall be required in such report to divulge trade secrets or...

  9. 18 CFR 401.75 - Protection of trade secrets; Confidential information.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... secrets; Confidential information. 401.75 Section 401.75 Conservation of Power and Water Resources... to Decisions of the Executive Director in Water Qualtity Cases § 401.75 Protection of trade secrets; Confidential information. No person shall be required in such report to divulge trade secrets or...

  10. 18 CFR 401.75 - Protection of trade secrets; Confidential information.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... secrets; Confidential information. 401.75 Section 401.75 Conservation of Power and Water Resources... to Decisions of the Executive Director in Water Qualtity Cases § 401.75 Protection of trade secrets; Confidential information. No person shall be required in such report to divulge trade secrets or...

  11. Personal Genomic Information Management and Personalized Medicine: Challenges, Current Solutions, and Roles of HIM Professionals

    PubMed Central

    Alzu'bi, Amal; Zhou, Leming; Watzlaf, Valerie

    2014-01-01

    In recent years, the term personalized medicine has received more and more attention in the field of healthcare. The increasing use of this term is closely related to the astonishing advancement in DNA sequencing technologies and other high-throughput biotechnologies. A large amount of personal genomic data can be generated by these technologies in a short time. Consequently, the needs for managing, analyzing, and interpreting these personal genomic data to facilitate personalized care are escalated. In this article, we discuss the challenges for implementing genomics-based personalized medicine in healthcare, current solutions to these challenges, and the roles of health information management (HIM) professionals in genomics-based personalized medicine. PMID:24808804

  12. Health information privacy protection: crisis or common sense?

    PubMed

    Kumekawa, J K

    2001-01-01

    Concerns about the protection of personally identifiable information are not unique to the health care industry; however, consumers view their medical records as more "private" than other information, such as financial data, because involuntary disclosure can affect jobs or health insurance status. This paper briefly touches upon new sweeping federal privacy standards mandated under the Health Insurance Portability and Accountability Act of 1996 (HIPAA). The article outlines who and what is covered under the new rules, considers how practitioners can approach compliance with common sense, addresses concerns related to risk management, discusses consumer health privacy issues, and notes the difficulty of evaluating these rules and regulations. The article also looks at some unique privacy issues facing telemedicine and telehealth practitioners. PMID:11936942

  13. Implementing personalized medicine with asymmetric information on prevalence rates.

    PubMed

    Antoñanzas, Fernando; Juárez-Castelló, Carmelo A; Rodríguez-Ibeas, Roberto

    2016-12-01

    Although personalized medicine is becoming the new paradigm to manage some diseases, the economics of personalized medicine have only focused on assessing the efficiency of specific treatments, lacking a theoretical framework analyzing the interactions between pharmaceutical firms and healthcare systems leading to the implementation of personalized treatments. We model the interaction between the hospitals and the manufacturer of a new treatment as an adverse selection problem where the firm does not have perfect information on the prevalence across hospitals of the genetic characteristics of the patients making them eligible to receive a new treatment. As a result of the model, hospitals with high prevalence rates benefit from the information asymmetry only when the standard treatment is inefficient when applied to the patients eligible to receive the new treatment. Otherwise, information asymmetry has no value. Personalized medicine may be fully or partially implemented depending on the proportion of high prevalence hospitals. PMID:27539222

  14. 15 CFR 270.351 - Protection of voluntarily submitted information.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... Protection of voluntarily submitted information. Notwithstanding any other provision of law, a Team, NIST, any investigation participant, and any agency receiving information from a Team, NIST, or any...

  15. 15 CFR 270.351 - Protection of voluntarily submitted information.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... Protection of voluntarily submitted information. Notwithstanding any other provision of law, a Team, NIST, any investigation participant, and any agency receiving information from a Team, NIST, or any...

  16. 15 CFR 270.351 - Protection of voluntarily submitted information.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... Protection of voluntarily submitted information. Notwithstanding any other provision of law, a Team, NIST, any investigation participant, and any agency receiving information from a Team, NIST, or any...

  17. 15 CFR 270.351 - Protection of voluntarily submitted information.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... Protection of voluntarily submitted information. Notwithstanding any other provision of law, a Team, NIST, any investigation participant, and any agency receiving information from a Team, NIST, or any...

  18. 10 CFR 71.11 - Protection of Safeguards Information.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 10 Energy 2 2010-01-01 2010-01-01 false Protection of Safeguards Information. 71.11 Section 71.11... General Provisions § 71.11 Protection of Safeguards Information. Each licensee, certificate holder, or... public health and safety or the common defense and security, shall protect Safeguards Information...

  19. 10 CFR 71.11 - Protection of Safeguards Information.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 10 Energy 2 2011-01-01 2011-01-01 false Protection of Safeguards Information. 71.11 Section 71.11... General Provisions § 71.11 Protection of Safeguards Information. Each licensee, certificate holder, or... public health and safety or the common defense and security, shall protect Safeguards Information...

  20. RFID Based Context Information Security System Architecture for Securing Personal Information under Ubiquitous Environment

    NASA Astrophysics Data System (ADS)

    Song, Jae-Gu; Park, Gil-Cheol; Kim, Seoksoo

    2007-12-01

    In this study, framework for securing personal information among various contexts collected and utilized under ubiquitous environment is proposed. The proposed framework will analyze relativity among information used to determine the exposure of personal information according to circumstances where personal information is used. In addition, the study will define the definition of role-based structure and propose a structure applying password security system according to access level. Furthermore, the study will propose a method for building information security system using RFID tag information which generates context information.

  1. Attitudes regarding privacy of genomic information in personalized cancer therapy

    PubMed Central

    Rogith, Deevakar; Yusuf, Rafeek A; Hovick, Shelley R; Peterson, Susan K; Burton-Chase, Allison M; Li, Yisheng; Meric-Bernstam, Funda; Bernstam, Elmer V

    2014-01-01

    Objective To evaluate attitudes regarding privacy of genomic data in a sample of patients with breast cancer. Methods Female patients with breast cancer (n=100) completed a questionnaire assessing attitudes regarding concerns about privacy of genomic data. Results Most patients (83%) indicated that genomic data should be protected. However, only 13% had significant concerns regarding privacy of such data. Patients expressed more concern about insurance discrimination than employment discrimination (43% vs 28%, p<0.001). They expressed less concern about research institutions protecting the security of their molecular data than government agencies or drug companies (20% vs 38% vs 44%; p<0.001). Most did not express concern regarding the association of their genomic data with their name and personal identity (49% concerned), billing and insurance information (44% concerned), or clinical data (27% concerned). Significantly fewer patients were concerned about the association with clinical data than other data types (p<0.001). In the absence of direct benefit, patients were more willing to consent to sharing of deidentified than identified data with researchers not involved in their care (76% vs 60%; p<0.001). Most (85%) patients were willing to consent to DNA banking. Discussion While patients are opposed to indiscriminate release of genomic data, privacy does not appear to be their primary concern. Furthermore, we did not find any specific predictors of privacy concerns. Conclusions Patients generally expressed low levels of concern regarding privacy of genomic data, and many expressed willingness to consent to sharing their genomic data with researchers. PMID:24737606

  2. Using interactive computer simulation for teaching the proper use of personal protective equipment.

    PubMed

    Hung, Pan-Pan; Choi, Kup-Sze; Chiang, Vico Chung-Lim

    2015-02-01

    The use of personal protective equipment is one of the basic infection control precautions in health care. The effectiveness of personal protective equipment is highly dependent on adequate staff training. In this project, a computer simulation program, as a supplement to conventional training approaches, was developed to facilitate the learning of the proper use of personal protective equipment. The simulation program was a Web-based interactive software with user-friendly graphical interface for users to practice the use of personal protective equipment usage via drag-and-drop metaphors and respond to questions online. The effectiveness of the computer simulation software was investigated by a controlled study. Fifty healthcare workers were randomly assigned into two groups: one received conventional personal protective equipment training only (control group), whereas the other also received the same conventional training but followed by using the developed simulation program for self-learning (experimental group). Their performance was assessed by personal protective equipment donning and doffing evaluation before and after the training. The results showed that the computer simulation program is able to improve the healthcare workers' understanding and competence in using personal protective equipment. PMID:25521788

  3. 78 FR 73817 - Information Collection; Federal Excess Personal Property (FEPP) and Firefighter Property (FFP...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-12-09

    ... Forest Service Information Collection; Federal Excess Personal Property (FEPP) and Firefighter Property... currently approved information collection, Federal Excess Personal Property (FEPP) and Firefighter Property... Friday. SUPPLEMENTARY INFORMATION: Title: Federal Excess Personal Property (FEPP) and...

  4. The User-Subjective Approach to Personal Information Management Systems.

    ERIC Educational Resources Information Center

    Bergman, Ofer; Beyth-Marom, Ruth; Nachmias, Rafi

    2003-01-01

    Explains personal information management (PIM) systems and suggests a user-subjective approach to PIM system design. Advocates that PIM systems relate to the subjective value-added attributes that the user gives the stored data so that the user can find information again, recall it when needed, and use it effectively in the next interaction.…

  5. Attributions, Attention, and Person Memory: Processing Congruent and Incongruent Information.

    ERIC Educational Resources Information Center

    Crocker, Jennifer; Vitkus, John

    Impressions of people are resistant to change. Information contradictory to an initial impression has relatively little impact on the impression and is particularly likely to be recalled. Possible resolutions on this paradox include: (1) the recalled information and the impression of the person are independent of each other; (2) people may link…

  6. 32 CFR 806b.10 - How to collect personal information.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 32 National Defense 6 2011-07-01 2011-07-01 false How to collect personal information. 806b.10 Section 806b.10 National Defense Department of Defense (Continued) DEPARTMENT OF THE AIR FORCE... parties when: (a) You must verify information. (b) You want opinions or evaluations. (c) You can't...

  7. 32 CFR 806b.10 - How to collect personal information.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 32 National Defense 6 2010-07-01 2010-07-01 false How to collect personal information. 806b.10 Section 806b.10 National Defense Department of Defense (Continued) DEPARTMENT OF THE AIR FORCE... parties when: (a) You must verify information. (b) You want opinions or evaluations. (c) You can't...

  8. A Study of Personal Information Management Strategies for Online Faculty

    ERIC Educational Resources Information Center

    Kearns, Lorna R.; Frey, Barbara A.; Tomer, Christinger; Alman, Susan

    2014-01-01

    The literature suggests that personal information management is a serious challenge for many computer users. Online faculty are especially challenged because of the large number of electronic files necessitated by teaching online. Those who have experience in this environment may offer valuable insights regarding information management challenges…

  9. 32 CFR 310.17 - Individual access to personal information.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... provide information that is disclosable pursuant to the DoD Freedom of Information Act program (see 32 CFR... 32 CFR, part 286). (iii) When an individual seeks personal access to records pertaining to themselves... to be released under the Privacy Act, the FOIA (32 CFR part 286) does not bar release even if a...

  10. Informatics in Radiology (infoRAD): personal computer security: part 2. Software Configuration and file protection.

    PubMed

    Caruso, Ronald D

    2004-01-01

    Proper configuration of software security settings and proper file management are necessary and important elements of safe computer use. Unfortunately, the configuration of software security options is often not user friendly. Safe file management requires the use of several utilities, most of which are already installed on the computer or available as freeware. Among these file operations are setting passwords, defragmentation, deletion, wiping, removal of personal information, and encryption. For example, Digital Imaging and Communications in Medicine medical images need to be anonymized, or "scrubbed," to remove patient identifying information in the header section prior to their use in a public educational or research environment. The choices made with respect to computer security may affect the convenience of the computing process. Ultimately, the degree of inconvenience accepted will depend on the sensitivity of the files and communications to be protected and the tolerance of the user. PMID:15371625

  11. Solving the software protection problem with intrinsic personal physical unclonable functions.

    SciTech Connect

    Nithyanand, Rishab; Sion, Radu

    2011-09-01

    Physical Unclonable Functions (PUFs) or Physical One Way Functions (P-OWFs) are physical systems whose responses to input stimuli (i.e., challenges) are easy to measure (within reasonable error bounds) but hard to clone. The unclonability property comes from the accepted hardness of replicating the multitude of characteristics introduced during the manufacturing process. This makes PUFs useful for solving problems such as device authentication, software protection, licensing, and certified execution. In this paper, we focus on the effectiveness of PUFs for software protection in offline settings. We first argue that traditional (black-box) PUFs are not useful for protecting software in settings where communication with a vendor's server or third party network device is infeasible or impossible. Instead, we argue that Intrinsic PUFs are needed to solve the above mentioned problems because they are intrinsically involved in processing the information that is to be protected. Finally, we describe how sources of randomness in any computing device can be used for creating intrinsic-personal-PUFs (IP-PUF) and present experimental results in using standard off-the-shelf computers as IP-PUFs.

  12. An Inter-Personal Information Sharing Model Based on Personalized Recommendations

    NASA Astrophysics Data System (ADS)

    Kamei, Koji; Funakoshi, Kaname; Akahani, Jun-Ichi; Satoh, Tetsuji

    In this paper, we propose an inter-personal information sharing model among individuals based on personalized recommendations. In the proposed model, we define an information resource as shared between people when both of them consider it important --- not merely when they both possess it. In other words, the model defines the importance of information resources based on personalized recommendations from identifiable acquaintances. The proposed method is based on a collaborative filtering system that focuses on evaluations from identifiable acquaintances. It utilizes both user evaluations for documents and their contents. In other words, each user profile is represented as a matrix of credibility to the other users' evaluations on each domain of interests. We extended the content-based collaborative filtering method to distinguish other users to whom the documents should be recommended. We also applied a concept-based vector space model to represent the domain of interests instead of the previous method which represented them by a term-based vector space model. We introduce a personalized concept-base compiled from each user's information repository to improve the information retrieval in the user's environment. Furthermore, the concept-spaces change from user to user since they reflect the personalities of the users. Because of different concept-spaces, the similarity between a document and a user's interest varies for each user. As a result, a user receives recommendations from other users who have different view points, achieving inter-personal information sharing based on personalized recommendations. This paper also describes an experimental simulation of our information sharing model. In our laboratory, five participants accumulated a personal repository of e-mails and web pages from which they built their own concept-base. Then we estimated the user profiles according to personalized concept-bases and sets of documents which others evaluated. We simulated

  13. 48 CFR 3.104-4 - Disclosure, protection, and marking of contractor bid or proposal information and source...

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... BUSINESS PRACTICES AND PERSONAL CONFLICTS OF INTEREST Safeguards 3.104-4 Disclosure, protection, and... 48 Federal Acquisition Regulations System 1 2010-10-01 2010-10-01 false Disclosure, protection, and marking of contractor bid or proposal information and source selection information....

  14. Ubiquitous Data Management in a Personal Information Environment

    NASA Astrophysics Data System (ADS)

    Mohammad, Atif Farid

    This paper presents a novel research work on Personal Information Environment (PIE), which is a relatively new field to get explored. PIE is a self managing pervasive environment. It contains an individual's personal pervasive information associated within user's related or non-related contextual environments. Contexts are vitally important because they control, influence and affect everything within them by dominating its pervasive content(s). This paper shows in depth the achievement of Personal Information Environment, which deals with a user's devices, which are to be spontaneous, readily self-manageable on autonomic basis. This paper shows an actual implementation of pervasive data management of a PIE-user, which contains append and update of PIE's data from the last device used by the user to another PIE devices for further processing and storage needs. Data recharging is utilized to transmit and receive data among PIE devices.

  15. 40 CFR 51.368 - Public information and consumer protection.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... the area, as described in § 51.369(b)(1) of this subpart. Motorists that fail the I/M test shall also... protection. 51.368 Section 51.368 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) AIR.../Maintenance Program Requirements § 51.368 Public information and consumer protection. (a) Public...

  16. 40 CFR 51.368 - Public information and consumer protection.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 40 Protection of Environment 2 2010-07-01 2010-07-01 false Public information and consumer.../Maintenance Program Requirements § 51.368 Public information and consumer protection. (a) Public awareness... the test that were failed. (b) Consumer protection. The oversight agency shall institute...

  17. Personal Protection Measures Against Mosquitoes, Ticks, and Other Arthropods.

    PubMed

    Alpern, Jonathan D; Dunlop, Stephen J; Dolan, Benjamin J; Stauffer, William M; Boulware, David R

    2016-03-01

    Arthropod-associated diseases are a major cause of morbidity among travelers. Obtaining a detailed travel itinerary and understanding traveler-specific and destination-specific risk factors can help mitigate the risk of vector-borne diseases. DEET, picaridin, PMD, and IR3535 are insect repellents that offer sufficient protection against arthropod bites. IR3535 does not provide adequate protection against Anopheles mosquitoes, and should be avoided in malaria-endemic regions. General protective measures, such as bite avoidance, protective clothing, insecticide-treated bed nets, and insecticide-treated clothing, should be recommended, especially in malaria-endemic areas. Spatial repellents may prevent nuisance biting, but have not been shown to prevent against vector-borne disease. PMID:26900115

  18. Considerations for selecting personal protective equipment for hazardous materials decontamination.

    PubMed

    Lehmann, Jeff

    2002-09-01

    PPE is necessary to protect staff and to deliver rapid and efficient care to patients contaminated with HAZMAT chemicals. Planning for HAZMAT cases includes learning about the common chemicals in the area, what resources are available to care for victims, identifying a decontamination area, and providing PPE to protect employees and other patients. A customized service can be used to meet OSHA standards and reduce costs. Ongoing training will be an important part of any HAZMAT program. PMID:12685463

  19. Cognitive, personality, and social factors associated with adolescents' online personal information disclosure.

    PubMed

    Liu, Cong; Ang, Rebecca P; Lwin, May O

    2013-08-01

    The current study aims to understand the factors that influence adolescents' disclosure of personally identifiable information (PII) on social networking sites (SNSs). A survey was conducted among 780 adolescent participants (between 13 and 18) who were Facebook users. Structural equation modeling was used for analyzing the data and obtaining an overarching model that include cognitive, personality, and social factors that influence adolescents' PII disclosure. Results showed privacy concern as the cognitive factor reduces adolescents' PII disclosure and it serves as a potential mediator for personality and social factors. Amongst personality factors, narcissism was found to directly increase PII disclosure, and social anxiety indirectly decreases PII disclosure by increasing privacy concern. Amongst social factors, active parental mediation decreases PII disclosure directly and indirectly by increasing privacy concern. Restrictive parental mediation decreases PII disclosure only indirectly by increasing privacy concern. Implications of the findings to parents, educators, and policy makers were discussed. PMID:23849657

  20. Personality and Information Gathering in Free-Ranging Great Tits

    PubMed Central

    van Overveld, Thijs; Matthysen, Erik

    2013-01-01

    One aspect of animal personality that has been well described in captivity, but received only little attention in studies in the wild, is that personality types may vary in their behavioural flexibility towards environmental changes. A fundamental factor underlying such differences is believed to be the degree to which individual behavior is guided by environmental stimuli. We tested this hypothesis in the wild using free-ranging great tits. Personality variation was quantified using exploratory behaviour in a novel environment, which has previously been shown to be repeatable and correlated with other behaviours in this and other populations of the same species. By temporarily removing food at feeding stations we examined whether birds with different personality differed in returning to visit empty feeders as this may provide information on how birds continue to sample their environment after a sudden change in conditions. In two summer experiments, we found that fast-exploring juveniles visited empty feeders less often compared to slow-exploring juveniles. In winter, sampling behaviour was sex dependent but not related to personality. In both seasons, we found that birds who sampled empty feeders more often were more likely to rediscover food after we again re-baited the feeding stations, but there was no effect of personality. Our results show that personality types may indeed differ in ways of collecting environmental information, which is consistent with the view of personalities as different styles of coping with environmental changes. The adaptive value of these alternative behavioural tactics, however, needs to be further explored. PMID:23383299

  1. Personality and information gathering in free-ranging great tits.

    PubMed

    van Overveld, Thijs; Matthysen, Erik

    2013-01-01

    One aspect of animal personality that has been well described in captivity, but received only little attention in studies in the wild, is that personality types may vary in their behavioural flexibility towards environmental changes. A fundamental factor underlying such differences is believed to be the degree to which individual behavior is guided by environmental stimuli. We tested this hypothesis in the wild using free-ranging great tits. Personality variation was quantified using exploratory behaviour in a novel environment, which has previously been shown to be repeatable and correlated with other behaviours in this and other populations of the same species. By temporarily removing food at feeding stations we examined whether birds with different personality differed in returning to visit empty feeders as this may provide information on how birds continue to sample their environment after a sudden change in conditions. In two summer experiments, we found that fast-exploring juveniles visited empty feeders less often compared to slow-exploring juveniles. In winter, sampling behaviour was sex dependent but not related to personality. In both seasons, we found that birds who sampled empty feeders more often were more likely to rediscover food after we again re-baited the feeding stations, but there was no effect of personality. Our results show that personality types may indeed differ in ways of collecting environmental information, which is consistent with the view of personalities as different styles of coping with environmental changes. The adaptive value of these alternative behavioural tactics, however, needs to be further explored. PMID:23383299

  2. 45 CFR 164.502 - Uses and disclosures of protected health information: general rules.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 45 Public Welfare 1 2010-10-01 2010-10-01 false Uses and disclosures of protected health information: general rules. 164.502 Section 164.502 Public Welfare DEPARTMENT OF HEALTH AND HUMAN SERVICES... or may be subjected to domestic violence, abuse, or neglect by such person; or (B) Treating...

  3. 32 CFR 2400.38 - Protection of foreign government information.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 32 National Defense 6 2010-07-01 2010-07-01 false Protection of foreign government information... SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM Foreign Government Information § 2400.38 Protection of foreign...

  4. 32 CFR 2400.38 - Protection of foreign government information.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 32 National Defense 6 2011-07-01 2011-07-01 false Protection of foreign government information... SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM Foreign Government Information § 2400.38 Protection of foreign...

  5. 32 CFR 644.394 - Protection of disposal information.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 32 National Defense 4 2010-07-01 2010-07-01 true Protection of disposal information. 644.394... PROPERTY REAL ESTATE HANDBOOK Disposal Predisposal Action § 644.394 Protection of disposal information. To prevent premature disclosure to the public, information on and plans for disposal of all or a portion...

  6. Management Guide to the Protection of Information Resources.

    ERIC Educational Resources Information Center

    Helsing, Cheryl; And Others

    This guide introduces information systems security concerns and outlines the issues that must be addressed by all agency managers in meeting their responsibilities to protect information systems within their organizations. It describes the essential components of an effective information resource protection process that applies to an individual…

  7. Exploring Healthcare Consumer Acceptance of Personal Health Information Management Technology through Personal Health Record Systems

    ERIC Educational Resources Information Center

    Wu, Huijuan

    2013-01-01

    Healthcare technologies are evolving from a practitioner-centric model to a patient-centric model due to the increasing need for technology that directly serves healthcare consumers, including healthy people and patients. Personal health information management (PHIM) technology is one of the technologies designed to enhance an individual's ability…

  8. Informed consent in direct-to-consumer personal genome testing: the outline of a model between specific and generic consent.

    PubMed

    Bunnik, Eline M; Janssens, A Cecile J W; Schermer, Maartje H N

    2014-09-01

    Broad genome-wide testing is increasingly finding its way to the public through the online direct-to-consumer marketing of so-called personal genome tests. Personal genome tests estimate genetic susceptibilities to multiple diseases and other phenotypic traits simultaneously. Providers commonly make use of Terms of Service agreements rather than informed consent procedures. However, to protect consumers from the potential physical, psychological and social harms associated with personal genome testing and to promote autonomous decision-making with regard to the testing offer, we argue that current practices of information provision are insufficient and that there is a place--and a need--for informed consent in personal genome testing, also when it is offered commercially. The increasing quantity, complexity and diversity of most testing offers, however, pose challenges for information provision and informed consent. Both specific and generic models for informed consent fail to meet its moral aims when applied to personal genome testing. Consumers should be enabled to know the limitations, risks and implications of personal genome testing and should be given control over the genetic information they do or do not wish to obtain. We present the outline of a new model for informed consent which can meet both the norm of providing sufficient information and the norm of providing understandable information. The model can be used for personal genome testing, but will also be applicable to other, future forms of broad genetic testing or screening in commercial and clinical settings. PMID:23137034

  9. 29 CFR 1926.95 - Criteria for personal protective equipment.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... construction for the work to be performed. (d) Payment for protective equipment. (1) Except as provided by... is not required to pay for: (i) Everyday clothing, such as long-sleeve shirts, long pants, street shoes, and normal work boots; or (ii) Ordinary clothing, skin creams, or other items, used solely...

  10. Protective measures, personal experience, and the affective psychology of time.

    PubMed

    Peters, E; Kunreuther, H; Sagara, N; Slovic, P; Schley, D R

    2012-12-01

    We examined the role of time and affect in intentions to purchase a risk-protective measure (Studies 1 and 2) and explored participant abilities to factor time into the likelihood judgments that presumably underlie such intentions (Study 3). Participants worried more about losing their possessions and were more likely to purchase a protective measure given a longer term lease than a short-term lease, but only if their belongings were described in affect-poor terms. If described instead as being particularly special and affect-rich, participants neglected time and were about equally likely to purchase a risk-protective measure for shorter and longer term leases. However, and consistent with prior literature, the cognitive mechanism underlying this time-neglect-with-affect-richness effect seemed to be the greater use of the affect heuristic in the shorter term than the longer term. Study 2 results demonstrated that prior experience with having been burglarized amplified the interactive effect of time and affect. Greater deliberation did not attenuate this effect as hypothesized whether deliberation was measured through numeracy or manipulated through instructions. The results of Study 3 indicated that few participants are able to calculate correctly the risk numbers necessary to take time into account. Two possible solutions to encourage more purchases of protective measures in the long term are discussed. PMID:22548249

  11. Audit Report on "Protection of the Department of Energy's Unclassified Sensitive Electronic Information"

    SciTech Connect

    2009-08-01

    The Department of Energy and its contractors store and process massive quantities of sensitive information to accomplish national security, energy, science, and environmental missions. Sensitive unclassified data, such as personally identifiable information (PII), official use only, and unclassified controlled nuclear information require special handling and protection to prevent misuse of the information for inappropriate purposes. Industry experts have reported that more than 203 million personal privacy records have been lost or stolen over the past three years, including information maintained by corporations, educational institutions, and Federal agencies. The loss of personal and other sensitive information can result in substantial financial harm, embarrassment, and inconvenience to individuals and organizations. Therefore, strong protective measures, including data encryption, help protect against the unauthorized disclosure of sensitive information. Prior reports involving the loss of sensitive information have highlighted weaknesses in the Department's ability to protect sensitive data. Our report on Security Over Personally Identifiable Information (DOE/IG-0771, July 2007) disclosed that the Department had not fully implemented all measures recommended by the Office of Management and Budget (OMB) and required by the National Institute of Standards and Technology (NIST) to protect PII, including failures to identify and encrypt PII maintained on information systems. Similarly, the Government Accountability Office recently reported that the Department had not yet installed encryption technology to protect sensitive data on the vast majority of laptop computers and handheld devices. Because of the potential for harm, we initiated this audit to determine whether the Department and its contractors adequately safeguarded sensitive electronic information. The Department had taken a number of steps to improve protection of PII. Our review, however, identified

  12. 41 CFR 109-1.5107 - Physical protection of personal property.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 41 Public Contracts and Property Management 3 2010-07-01 2010-07-01 false Physical protection of... Management Regulations System (Continued) DEPARTMENT OF ENERGY PROPERTY MANAGEMENT REGULATIONS GENERAL 1-INTRODUCTION 1.51-Personal Property Management Standards and Practices § 109-1.5107 Physical protection...

  13. 41 CFR 109-1.5107 - Physical protection of personal property.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 41 Public Contracts and Property Management 3 2014-01-01 2014-01-01 false Physical protection of... Management Regulations System (Continued) DEPARTMENT OF ENERGY PROPERTY MANAGEMENT REGULATIONS GENERAL 1-INTRODUCTION 1.51-Personal Property Management Standards and Practices § 109-1.5107 Physical protection...

  14. 41 CFR 109-1.5107 - Physical protection of personal property.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 41 Public Contracts and Property Management 3 2011-01-01 2011-01-01 false Physical protection of... Management Regulations System (Continued) DEPARTMENT OF ENERGY PROPERTY MANAGEMENT REGULATIONS GENERAL 1-INTRODUCTION 1.51-Personal Property Management Standards and Practices § 109-1.5107 Physical protection...

  15. Effectiveness of Personal Protective Equipment for Healthcare Workers Caring for Patients with Filovirus Disease: A Rapid Review

    PubMed Central

    Quach, Pauline; Hamel, Candyce; Thavorn, Kednapa; Garritty, Chantelle; Skidmore, Becky; Vallenas, Constanza; Norris, Susan L.; Egger, Matthias; Eremin, Sergey; Ferri, Mauricio; Shindo, Nahoko; Moher, David

    2015-01-01

    Background A rapid review, guided by a protocol, was conducted to inform development of the World Health Organization’s guideline on personal protective equipment in the context of the ongoing (2013–present) Western African filovirus disease outbreak, with a focus on health care workers directly caring for patients with Ebola or Marburg virus diseases. Methods Electronic databases and grey literature sources were searched. Eligibility criteria initially included comparative studies on Ebola and Marburg virus diseases reported in English or French, but criteria were expanded to studies on other viral hemorrhagic fevers and non-comparative designs due to the paucity of studies. After title and abstract screening (two people to exclude), full-text reports of potentially relevant articles were assessed in duplicate. Fifty-seven percent of extraction information was verified. The Grading of Recommendations Assessment, Development and Evaluation framework was used to inform the quality of evidence assessments. Results Thirty non-comparative studies (8 related to Ebola virus disease) were located, and 27 provided data on viral transmission. Reporting of personal protective equipment components and infection prevention and control protocols was generally poor. Conclusions Insufficient evidence exists to draw conclusions regarding the comparative effectiveness of various types of personal protective equipment. Additional research is urgently needed to determine optimal PPE for health care workers caring for patients with filovirus. PMID:26451847

  16. 45 CFR 164.522 - Rights to request privacy protection for protected health information.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... health information. 164.522 Section 164.522 Public Welfare DEPARTMENT OF HEALTH AND HUMAN SERVICES... Health Information § 164.522 Rights to request privacy protection for protected health information. (a)(1) Standard: Right of an individual to request restriction of uses and disclosures. (i) A covered entity...

  17. 45 CFR 164.522 - Rights to request privacy protection for protected health information.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... health information. 164.522 Section 164.522 Public Welfare DEPARTMENT OF HEALTH AND HUMAN SERVICES... Health Information § 164.522 Rights to request privacy protection for protected health information. (a)(1) Standard: Right of an individual to request restriction of uses and disclosures. (i) A covered entity...

  18. Informed consent for research in Borderline Personality Disorder

    PubMed Central

    Dew, Rachel E

    2007-01-01

    Background Previous research on informed consent for research in psychiatric patients has centered on disorders that affect comprehension and appreciation of risks. Little has been written about consent to research in those subjects with Borderline Personality Disorder, a prevalent and disabling condition. Discussion Despite apparently intact cognition and comprehension of risks, a borderline subject may deliberately choose self-harm in order to fulfill abnormal psychological needs, or due to suicidality. Alternatively, such a subject may refuse enrollment due to transference or the desire to harm him or herself. Such phenomena could be precipitated or prevented by the interpersonal dynamics of the informed consent encounter. Summary Caution should be exercised in obtaining informed consent for research from subjects with Borderline Personality Disorder. A literature review and recommendations for future research are discussed. PMID:17493277

  19. Sharing sensitive personal health information through Facebook: the unintended consequences.

    PubMed

    Househ, Mowafa

    2011-01-01

    The purpose of this paper was to explore the types of sensitive health information posted by individuals through social network media sites such as Facebook. The researcher found several instances in which individuals, who could be identified by their user profiles, posted personal and sensitive health information related to mental and genetic disorders and sexually transmitted diseases. The data suggest that Facebook users should be made aware of the potential harm that may occur when sharing sensitive health information publicly through Facebook. Ethical considerations in undertaking such research are also examined. PMID:21893822

  20. 32 CFR 2400.38 - Protection of foreign government information.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY... information. Classified foreign government information shall be protected as is prescribed by this...

  1. Shared Expectations for Protection of Identifiable Health Care Information

    PubMed Central

    Wynia, Matthew K; Coughlin, Steven S; Alpert, Sheri; Cummins, Deborah S; Emanuel, Linda L

    2001-01-01

    ongoing data quality, limitations on how identifiable information may be used, and provisions for meaningful accountability. CONCLUSIONS This process established consensus on 34 measurable ethical expectations for the protection of privacy and confidentiality in health care. These expectations should apply to any organization with access to personally identifiable health information, including managed care organizations, physician groups, hospitals, other provider organizations, and purchasers. Performance measurement on these expectations may improve accountability across the health care system. PMID:11251761

  2. 76 FR 17935 - Protected Critical Infrastructure Information (PCII) Stakeholder Survey

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-03-31

    ... SECURITY Protected Critical Infrastructure Information (PCII) Stakeholder Survey AGENCY: National... the Critical Infrastructure Information Act of 2002, (Sections 211-215, Title II, Subtitle B of the... owners and operators of critical infrastructure and protected systems. The PCII Program is implemented...

  3. 45 CFR 673.4 - Environmental protection information.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 45 Public Welfare 3 2012-10-01 2012-10-01 false Environmental protection information. 673.4 Section 673.4 Public Welfare Regulations Relating to Public Welfare (Continued) NATIONAL SCIENCE FOUNDATION ANTARCTIC NON-GOVERNMENTAL EXPEDITIONS § 673.4 Environmental protection information. (a)...

  4. 45 CFR 673.4 - Environmental protection information.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 45 Public Welfare 3 2013-10-01 2013-10-01 false Environmental protection information. 673.4 Section 673.4 Public Welfare Regulations Relating to Public Welfare (Continued) NATIONAL SCIENCE FOUNDATION ANTARCTIC NON-GOVERNMENTAL EXPEDITIONS § 673.4 Environmental protection information. (a)...

  5. 45 CFR 673.4 - Environmental protection information.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 45 Public Welfare 3 2011-10-01 2011-10-01 false Environmental protection information. 673.4 Section 673.4 Public Welfare Regulations Relating to Public Welfare (Continued) NATIONAL SCIENCE FOUNDATION ANTARCTIC NON-GOVERNMENTAL EXPEDITIONS § 673.4 Environmental protection information. (a)...

  6. 45 CFR 673.4 - Environmental protection information.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 45 Public Welfare 3 2010-10-01 2010-10-01 false Environmental protection information. 673.4 Section 673.4 Public Welfare Regulations Relating to Public Welfare (Continued) NATIONAL SCIENCE FOUNDATION ANTARCTIC NON-GOVERNMENTAL EXPEDITIONS § 673.4 Environmental protection information. (a)...

  7. 12 CFR 568.5 - Protection of customer information.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 12 Banks and Banking 5 2010-01-01 2010-01-01 false Protection of customer information. 568.5 Section 568.5 Banks and Banking OFFICE OF THRIFT SUPERVISION, DEPARTMENT OF THE TREASURY SECURITY PROCEDURES § 568.5 Protection of customer information. Savings associations and their subsidiaries...

  8. 49 CFR 1522.125 - Protection of information.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... VALIDATION FIRMS AND VALIDATORS TSA-Approved Validation Firms and Validators for the Certified Cargo Screening Program § 1522.125 Protection of information. (a) Sensitive Security Information. Each validation firm must comply with the requirements in 49 CFR part 1520 regarding the handling and protection...

  9. Fluorescence-based optical chemical sensors for personal protection

    NASA Astrophysics Data System (ADS)

    Korent Urek, Špela; Lobnik, Aleksandra; Turel, Matejka

    2010-04-01

    The World Health Organization has reported that each year approximately 3 million people are poised by organophosphate substances (pesticides and nerve agents) resulting in 220,000 deaths. Organophosphates (OP) are toxic compounds which cause rapid and severe inhibition of serine proteases, most markedly acetylcholinesterase, which is vital to nerve function. This inhibition is often fatal. OP nerve agents are generally stable, easy to disperse, and highly toxic. They can be absorbed through the skin, by ingestion, or by respiration. A release of a nerve agent has the potential to rapidly affect a large number of people. The ease of manufacturing and dispensability of nerve agents, as well as available, inexpensive starting materials make these agents a weapon of choice for criminal terrorist attacks. One of the major steps toward protection against dangerous substances is to develop sensor devices that can act as an early warning system to the endangered people.

  10. 36 CFR 1202.28 - What rules do NARA employees follow in managing personal information?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ..., 5 CFR 2635.703. ... follow in managing personal information? 1202.28 Section 1202.28 Parks, Forests, and Public Property... Collecting Information § 1202.28 What rules do NARA employees follow in managing personal information?...

  11. 36 CFR 1202.28 - What rules do NARA employees follow in managing personal information?

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ..., 5 CFR 2635.703. ... follow in managing personal information? 1202.28 Section 1202.28 Parks, Forests, and Public Property... Collecting Information § 1202.28 What rules do NARA employees follow in managing personal information?...

  12. 36 CFR 1202.28 - What rules do NARA employees follow in managing personal information?

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ..., 5 CFR 2635.703. ... follow in managing personal information? 1202.28 Section 1202.28 Parks, Forests, and Public Property... Collecting Information § 1202.28 What rules do NARA employees follow in managing personal information?...

  13. 36 CFR 1202.28 - What rules do NARA employees follow in managing personal information?

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ..., 5 CFR 2635.703. ... follow in managing personal information? 1202.28 Section 1202.28 Parks, Forests, and Public Property... Collecting Information § 1202.28 What rules do NARA employees follow in managing personal information?...

  14. 36 CFR 1202.28 - What rules do NARA employees follow in managing personal information?

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ..., 5 CFR 2635.703. ... follow in managing personal information? 1202.28 Section 1202.28 Parks, Forests, and Public Property... Collecting Information § 1202.28 What rules do NARA employees follow in managing personal information?...

  15. Personal Protective Equipment for Filovirus Epidemics: A Call for Better Evidence

    PubMed Central

    Sprecher, Armand G.; Caluwaerts, An; Draper, Mike; Feldmann, Heinz; Frey, Clifford P.; Funk, Renée H.; Kobinger, Gary; Le Duc, James W.; Spiropoulou, Christina; Williams, Warren Jon

    2015-01-01

    Personal protective equipment (PPE) is an important part of worker protection during filovirus outbreaks. The need to protect against a highly virulent fluid-borne pathogen in the tropical environment imposes a heat stress on the wearer that is itself a safety risk. No evidence supports the choice of PPE employed in recent outbreaks, and standard testing procedures employed by the protective garment industry do not well simulate filovirus exposure. Further research is needed to determine the appropriate PPE for filoviruses and the heat stress that it imposes. PMID:25821225

  16. Informed consent for research participation in frail older persons.

    PubMed

    Barron, Jeremy S; Duffey, Patricia L; Byrd, Linda Jo; Campbell, Robin; Ferrucci, Luigi

    2004-02-01

    Informed consent has been the most scrutinized and controversial aspect of clinical research ethics. Institutional review boards (IRBs), government regulatory agencies, and the threat of litigation have all contributed to increasingly detailed consent documents that hope to ensure that subjects are not misled or coerced. Unfortunately, the growing regulatory burden on researchers has not succeeded in protecting subjects, but has rather made the consent process less effective and has discouraged research on vulnerable populations. As a matter of fact, investigators and ethicists continue to identify failures of the consenting process, particularly concerning participation in research of older individuals. The challenges involved in ensuring appropriate consent from the elderly include physical frailty, reduced autonomy and privacy, and impaired decision-making capacity due to dementia, delirium, or other neuropsychiatric illnesses. Ageism among investigators also contributes to failure of informed consent. The evaluation and continuing re-evaluation of an individual's decision-making capacity is critical but difficult. In the most extreme cases, the older adult's ability to participate in the consent process is clearly impaired. However, in many instances, the decision-making capacity is only partially impaired but declines during the course of a research project. Implementing methods of effective communication may enable many frail elderly individuals to make informed decisions. Special challenges are posed by research on end-of-life care, which typically involves frail, older subjects who are uniquely vulnerable, and research is conducted in institutional settings where subtle violations of autonomy are routine. Clearly, the frail elderly represent a vulnerable population that deserves special attention when developing and evaluating an informed consent process. Two important ethical conflicts should be kept in mind. First, although vulnerable older patients must

  17. 32 CFR 806b.29 - Sending personal information over electronic mail.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... information over electronic mail. (a) Exercise caution before transmitting personal information over e-mail to ensure it is adequately safeguarded. Some information may be so sensitive and personal that e-mail may not be the proper way to transmit it. When sending personal information over e-mail within DoD,...

  18. 32 CFR 806b.29 - Sending personal information over electronic mail.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... information over electronic mail. (a) Exercise caution before transmitting personal information over e-mail to ensure it is adequately safeguarded. Some information may be so sensitive and personal that e-mail may not be the proper way to transmit it. When sending personal information over e-mail within DoD,...

  19. 32 CFR 806b.29 - Sending personal information over electronic mail.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... information over electronic mail. (a) Exercise caution before transmitting personal information over e-mail to ensure it is adequately safeguarded. Some information may be so sensitive and personal that e-mail may not be the proper way to transmit it. When sending personal information over e-mail within DoD,...

  20. Using Usability Evaluation to Inform Alberta's Personal Health Record Design.

    PubMed

    Price, Morgan; Bellwood, Paule; Davies, Iryna

    2015-01-01

    Alberta Health is deploying the Personal Health Portal (PHP) (MyHealth.Alberta.ca) to all people in the province of Alberta, Canada. The PHP will include several components such as a Personal Health Record (PHR) where users can enter and access their own health data. For the first PHR of its kind in Canada, Alberta Health asked the University of Victoria's eHealth Observatory to evaluate the PHP, including the PHR. The evaluation includes pre-design, design, and adoption evaluation. This paper focuses on early usability evaluations of the PHR software. Persona-based usability inspection was combined with usability testing sessions using think aloud. These evaluations found that while people were familiar with the web-based technology, several aspects of the PHR information architecture, content, and presentation could be improved to better support and provide value to the users. The findings could be helpful to others designing and implementing similar PHR software. PMID:25676994

  1. 14 CFR 1203.301 - Identification of information requiring protection.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... INFORMATION SECURITY PROGRAM Classification Principles and Considerations § 1203.301 Identification of information requiring protection. Classifiers shall identify the level of classification of each classified... 14 Aeronautics and Space 5 2010-01-01 2010-01-01 false Identification of information...

  2. What Your Can Do to Protect Your Health Information

    MedlinePlus

    ... don't want made public. Your doctor uses tools to protect and secure your health information at his or her office. You can do the same at home. If you have health information stored on your home computer or mobile device — ... email — simple tools like passwords can help keep your health information ...

  3. 78 FR 9918 - Protections Against Trafficking In Persons In Federal Contracts

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-02-12

    ... on trafficking in persons (``TIP''). Interested parties may offer oral and/or written comments at a... Comments on Protections Against TIP.'' Parties wishing to share written statements at the public meeting... agency is the General Services Administration; the point-of-contact is Deborah Lague at 202.694-8149....

  4. 29 CFR 1977.5 - Persons protected by section 11(c).

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 29 Labor 9 2011-07-01 2011-07-01 false Persons protected by section 11(c). 1977.5 Section 1977.5 Labor Regulations Relating to Labor (Continued) OCCUPATIONAL SAFETY AND HEALTH ADMINISTRATION, DEPARTMENT OF LABOR (CONTINUED) DISCRIMINATION AGAINST EMPLOYEES EXERCISING RIGHTS UNDER THE...

  5. 78 FR 49524 - National Institute for Occupational Safety and Health Personal Protective Technology Program and...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-08-14

    ... conformity assessment. This meeting will include presentations on Product and Standards, Risk Assessment... Conformity Assessment Public Meeting AGENCY: The National Institute for Occupational Safety and Health (NIOSH...: ``Conformity Assessment Meeting on Non-Respiratory Personal Protective Equipment (PPE).'' To view the...

  6. 29 CFR 1977.5 - Persons protected by section 11(c).

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 29 Labor 9 2010-07-01 2010-07-01 false Persons protected by section 11(c). 1977.5 Section 1977.5 Labor Regulations Relating to Labor (Continued) OCCUPATIONAL SAFETY AND HEALTH ADMINISTRATION, DEPARTMENT OF LABOR (CONTINUED) DISCRIMINATION AGAINST EMPLOYEES EXERCISING RIGHTS UNDER THE WILLIAMS-STEIGER OCCUPATIONAL SAFETY AND HEALTH ACT OF...

  7. Risk and Protective Factors Associated with Personal Mastery Among Sexual Minority African American Female Sex Workers

    PubMed Central

    Buttram, Mance E.; Surratt, Hilary L.; Kurtz, Steven P.

    2014-01-01

    Research among sexual minorities has traditionally examined problems such as substance use, HIV risk, mental health problems, and victimization. Among sexual minority street-based female sex workers, these vulnerabilities can be magnified. Grounded in theories of resilience, this study examines risk and protective factors associated with a high level of personal mastery among a vulnerable population of women. Data are drawn from baseline interviews from street-based African American female sex workers enrolled in a randomized intervention trial in Miami, Florida. We compare sexual minority (N=197) and heterosexual (N=365) women on measures of risk and protective factors; among sexual minority women we present logistic regression analyses which reveal that severe mental distress and HIV transmission risk are associated with low levels of personal mastery, while protective factors of transportation access and social support are associated with high levels of personal mastery. These findings suggest that these protective factors may potentially facilitate the development of personal mastery and represent beneficial avenues for intervention efforts. PMID:25530691

  8. Use of remote video auditing to validate Ebola level II personal protective equipment competency.

    PubMed

    Allar, Peter J; Frank-Cooper, Madalyn

    2015-06-01

    Faced with an Ebola-related mandate to regularly train frontline hospital staff with the donning and doffing of personal protective equipment, a community hospital's emergency department implemented remote video auditing (RVA) to assist in the training and remediation of its nursing staff. RVA was found to be useful in assessing performance and facilitating remediation. PMID:26057158

  9. 41 CFR 109-1.5107 - Physical protection of personal property.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 41 Public Contracts and Property Management 3 2013-07-01 2013-07-01 false Physical protection of personal property. 109-1.5107 Section 109-1.5107 Public Contracts and Property Management Federal Property Management Regulations System (Continued) DEPARTMENT OF ENERGY PROPERTY MANAGEMENT REGULATIONS GENERAL...

  10. 41 CFR 109-1.5107 - Physical protection of personal property.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 41 Public Contracts and Property Management 3 2012-01-01 2012-01-01 false Physical protection of personal property. 109-1.5107 Section 109-1.5107 Public Contracts and Property Management Federal Property Management Regulations System (Continued) DEPARTMENT OF ENERGY PROPERTY MANAGEMENT REGULATIONS GENERAL...