Science.gov

Sample records for personal information protection

  1. Protecting Personal Information on Social Networking Sites

    ERIC Educational Resources Information Center

    Gallant, David T.

    2011-01-01

    Almost everyone uses social networking sites like Facebook, MySpace, and LinkedIn. Since Facebook is the most popular site in the history of the Internet, this article will focus on how one can protect his/her personal information and how that extends to protecting the private information of others.

  2. Protecting Your Child's Personal Information at School

    ERIC Educational Resources Information Center

    Federal Trade Commission, 2012

    2012-01-01

    Back to school--an annual ritual that includes buying new notebooks, packing lunches, coordinating transportation, and filling out forms: registration forms, health forms, permission slips, and emergency contact forms, to name a few. Many school forms require personal and, sometimes, sensitive information. In the wrong hands, this information can…

  3. 32 CFR 806b.44 - Personal information that requires protection.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 32 National Defense 6 2010-07-01 2010-07-01 false Personal information that requires protection... ADMINISTRATION PRIVACY ACT PROGRAM Disclosing Records to Third Parties § 806b.44 Personal information that requires protection. Following are some examples of information that is not releasable without the...

  4. 32 CFR 701.115 - Protected personal information (PPI).

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 32 National Defense 5 2010-07-01 2010-07-01 false Protected personal information (PPI). 701.115... information (PPI). (a) Access/disclosure. Access to and disclosure of PPI such as SSN, date of birth, home... must take every step to properly mark the correspondence so that the receiver of the information...

  5. 32 CFR 806b.44 - Personal information that requires protection.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 32 National Defense 6 2012-07-01 2012-07-01 false Personal information that requires protection. 806b.44 Section 806b.44 National Defense Department of Defense (Continued) DEPARTMENT OF THE AIR FORCE..., separated). (b) Number, name, and sex of dependents. (c) Civilian educational degrees and major areas...

  6. 32 CFR 806b.44 - Personal information that requires protection.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 32 National Defense 6 2014-07-01 2014-07-01 false Personal information that requires protection. 806b.44 Section 806b.44 National Defense Department of Defense (Continued) DEPARTMENT OF THE AIR FORCE..., separated). (b) Number, name, and sex of dependents. (c) Civilian educational degrees and major areas...

  7. 32 CFR 806b.44 - Personal information that requires protection.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 32 National Defense 6 2011-07-01 2011-07-01 false Personal information that requires protection. 806b.44 Section 806b.44 National Defense Department of Defense (Continued) DEPARTMENT OF THE AIR FORCE..., separated). (b) Number, name, and sex of dependents. (c) Civilian educational degrees and major areas...

  8. 32 CFR 806b.44 - Personal information that requires protection.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 32 National Defense 6 2013-07-01 2013-07-01 false Personal information that requires protection. 806b.44 Section 806b.44 National Defense Department of Defense (Continued) DEPARTMENT OF THE AIR FORCE..., separated). (b) Number, name, and sex of dependents. (c) Civilian educational degrees and major areas...

  9. 32 CFR 701.115 - Protected personal information (PPI).

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 32 National Defense 5 2014-07-01 2014-07-01 false Protected personal information (PPI). 701.115 Section 701.115 National Defense Department of Defense (Continued) DEPARTMENT OF THE NAVY UNITED STATES NAVY REGULATIONS AND OFFICIAL RECORDS AVAILABILITY OF DEPARTMENT OF THE NAVY RECORDS AND PUBLICATION OF DEPARTMENT OF THE NAVY DOCUMENTS...

  10. 34 CFR 5.71 - Protection of personal privacy and proprietary information.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 34 Education 1 2010-07-01 2010-07-01 false Protection of personal privacy and proprietary....71 Protection of personal privacy and proprietary information. As set forth with more particularity... where disclosure would be inconsistent with individual rights of personal privacy or would...

  11. 32 CFR 701.115 - Protected personal information (PPI).

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... the misuse and overuse of PPI information that could be used to commit identity theft. PA Coordinators... overuse and misuse of SSNs should be discontinued to avoid the potential for identity theft. For example... PPI is removed to prevent identity theft. (7) Remove PPI from documents prior to posting...

  12. 32 CFR 701.115 - Protected personal information (PPI).

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... the misuse and overuse of PPI information that could be used to commit identity theft. PA Coordinators... overuse and misuse of SSNs should be discontinued to avoid the potential for identity theft. For example... PPI is removed to prevent identity theft. (7) Remove PPI from documents prior to posting...

  13. 32 CFR 701.115 - Protected personal information (PPI).

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... the misuse and overuse of PPI information that could be used to commit identity theft. PA Coordinators... overuse and misuse of SSNs should be discontinued to avoid the potential for identity theft. For example... PPI is removed to prevent identity theft. (7) Remove PPI from documents prior to posting...

  14. Personal information protection - exceptional challenges of integrated systems of eHealth.

    PubMed

    Bolka, Anka; Zadel, Blaž; Zorko, Martina

    2011-01-01

    Informatization has been bringing important, quick and extensive changes into the healthcare environment for years. Individual systems still represent isolated information islands; however, the need for interconnectivity and mutual accessibility has become more pronounced. On the one hand, integration of systems brings numerous, financially measurable advantages, and on the other hand, personal information in such systems becomes more vulnerable. Providing personal information protection is therefore the permanent task of informatisation and, with elimination of national borders and integration of national systems, it is becoming a challenge from the legal, organisational, technical and financial standpoints. PMID:21685589

  15. 34 CFR 361.38 - Protection, use, and release of personal information.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 34 Education 2 2014-07-01 2013-07-01 true Protection, use, and release of personal information. 361.38 Section 361.38 Education Regulations of the Offices of the Department of Education (Continued) OFFICE OF SPECIAL EDUCATION AND REHABILITATIVE SERVICES, DEPARTMENT OF EDUCATION STATE VOCATIONAL REHABILITATION SERVICES PROGRAM State Plan and...

  16. How Strong are Passwords Used to Protect Personal Health Information in Clinical Trials?

    PubMed Central

    Moreau, Katherine; Jonker, Elizabeth

    2011-01-01

    Background Findings and statements about how securely personal health information is managed in clinical research are mixed. Objective The objective of our study was to evaluate the security of practices used to transfer and share sensitive files in clinical trials. Methods Two studies were performed. First, 15 password-protected files that were transmitted by email during regulated Canadian clinical trials were obtained. Commercial password recovery tools were used on these files to try to crack their passwords. Second, interviews with 20 study coordinators were conducted to understand file-sharing practices in clinical trials for files containing personal health information. Results We were able to crack the passwords for 93% of the files (14/15). Among these, 13 files contained thousands of records with sensitive health information on trial participants. The passwords tended to be relatively weak, using common names of locations, animals, car brands, and obvious numeric sequences. Patient information is commonly shared by email in the context of query resolution. Files containing personal health information are shared by email and, by posting them on shared drives with common passwords, to facilitate collaboration. Conclusion If files containing sensitive patient information must be transferred by email, mechanisms to encrypt them and to ensure that password strength is high are necessary. More sophisticated collaboration tools are required to allow file sharing without password sharing. We provide recommendations to implement these practices. PMID:21317106

  17. Personal protective equipment

    MedlinePlus

    ... protective equipment. Available at: www.cdc.gov/niosh/ppe . Accessed October 27, 2015. Holland MG, Cawthon D. Personal protective equipment and decontamination of adults and children. Emerg Med Clin N ...

  18. 34 CFR 361.38 - Protection, use, and release of personal information.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... research. Personal information may be released to an organization, agency, or individual engaged in audit, evaluation, or research only for purposes directly connected with the administration of the vocational... only to persons officially connected with the audit, evaluation, or research; (3) The information...

  19. 34 CFR 361.38 - Protection, use, and release of personal information.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... research. Personal information may be released to an organization, agency, or individual engaged in audit, evaluation, or research only for purposes directly connected with the administration of the vocational... only to persons officially connected with the audit, evaluation, or research; (3) The information...

  20. 34 CFR 361.38 - Protection, use, and release of personal information.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... research. Personal information may be released to an organization, agency, or individual engaged in audit, evaluation, or research only for purposes directly connected with the administration of the vocational... only to persons officially connected with the audit, evaluation, or research; (3) The information...

  1. Pesticide personal protective clothing.

    PubMed

    Branson, D H; Sweeney, M

    1991-01-01

    A fairly large established data base provides information on clothing worn by U.S. and Canadian farmers to work with pesticides, their attitudes and beliefs about pesticide risk, and clothing as a dermal barrier. Very limited similar data are available for farmers in less developed countries. Clearly, farmers perceive the benefits of pesticides to far exceed any risks. While few report poisoning symptoms, most believe that their usual work clothing offers a sufficient pesticide barrier, and few wear special-purpose protective clothing. Gloves of various materials, including cotton and leather, appear to be the major protective clothing item. Although farmers feel that their usual work clothing provides excellent protection, fabric penetration research does not support this. Shirting-weight fabrics offer some limited protection against light spray of field-strenght pesticides. Heavier-weight fabrics, such as denim and twill, are better barriers. With a heavier spray or a spill, usual work clothing does not give sufficient protection. Greater protection can usually be achieved with the use of a fluorocarbon finished fabric, such as Scotchgard or Zepel. Scotchgard can readily be applied at home. A durable-press finish does not appear to improve fabric's pesticide-barrier resistance and some data suggest that it may decrease barrier properties. A second alternative for increased protection is the use of a special-purpose fabric, such as a coated nonwoven or possibly Gore-Tex. Numerous other new "waterproof breathable" fabrics have recently come to the market. Many of these are finished or coated fabrics and one would expect them to be at least somewhat resistant to pesticides. However, they have not been tested. Wearing an additional layer also appears to be another clothing strategy to minimize exposure. Fabric penetration research also shows that pesticide formulation, volume or spray regime, concentration, and active ingredients influence the barrier properties of

  2. PERSONAL LEADERSHIP PROTECTS RESEARCH SUBJECTS

    Technology Transfer Automated Retrieval System (TEKTRAN)

    Personal leadership promotes the ethical conduct of human research activities. Leadership entails application of one’s cognitive abilities, technical skills, and emotional intelligence during the conduct of research activities, Personal leadership assures human research subject protection....

  3. Personal Radiation Protection System

    NASA Technical Reports Server (NTRS)

    McDonald, Mark; Vinci, Victoria

    2004-01-01

    A report describes the personal radiation protection system (PRPS), which has been invented for use on the International Space Station and other spacecraft. The PRPS comprises walls that can be erected inside spacecraft, where and when needed, to reduce the amount of radiation to which personnel are exposed. The basic structural modules of the PRPS are pairs of 1-in. (2.54-cm)-thick plates of high-density polyethylene equipped with fasteners. The plates of each module are assembled with a lap joint. The modules are denoted bricks because they are designed to be stacked with overlaps, in a manner reminiscent of bricks, to build 2-in. (5.08-cm)-thick walls of various lengths and widths. The bricks are of two varieties: one for flat wall areas and one for corners. The corner bricks are specialized adaptations of the flat-area bricks that make it possible to join walls perpendicular to each other. Bricks are attached to spacecraft structures and to each other by use of straps that can be tightened to increase the strengths and stiffnesses of joints.

  4. Personal, Anticipated Information Need

    ERIC Educational Resources Information Center

    Bruce, Harry

    2005-01-01

    Background: The role of personal information collections is a well known feature of personal information management. The World Wide Web has introduced to such collections ideas such as filing Web pages or noting their existence in "Bookmarks" and "Favourites". Argument: It is suggested that personal information collections are…

  5. 77 FR 59581 - Personal Identity Verification, Release and Handling of Restricted Information, Protection of the...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-09-28

    ... Register at 73 FR 45679-45680. The second cancelled proposed rule is identified by RIN 2700-AD43, Release and Handling of Restricted Information. It was published in the Federal Register at 75 FR 9860- 9864... Federal Register at 73 FR 63420-63421. William P. McNally, Assistant Administrator for...

  6. 34 CFR 381.31 - What are the requirements pertaining to the protection, use, and release of personal information?

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ..., DEPARTMENT OF EDUCATION PROTECTION AND ADVOCACY OF INDIVIDUAL RIGHTS What Conditions Must Be Met After an... purposes directly connected with the protection and advocacy program, including program evaluation... and advocacy program, unless the consent of the individual to whom the information applies, or his...

  7. 22 CFR 212.22 - Protection of personal privacy.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 22 Foreign Relations 1 2012-04-01 2012-04-01 false Protection of personal privacy. 212.22 Section... Information for Public Inspection and Copying § 212.22 Protection of personal privacy. To the extent required to prevent a clearly unwarranted invasion of personal privacy, USAID may delete identifying...

  8. 22 CFR 212.22 - Protection of personal privacy.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 22 Foreign Relations 1 2011-04-01 2011-04-01 false Protection of personal privacy. 212.22 Section... Information for Public Inspection and Copying § 212.22 Protection of personal privacy. To the extent required to prevent a clearly unwarranted invasion of personal privacy, USAID may delete identifying...

  9. 22 CFR 212.22 - Protection of personal privacy.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 22 Foreign Relations 1 2014-04-01 2014-04-01 false Protection of personal privacy. 212.22 Section... Information for Public Inspection and Copying § 212.22 Protection of personal privacy. To the extent required to prevent a clearly unwarranted invasion of personal privacy, USAID may delete identifying...

  10. 22 CFR 212.22 - Protection of personal privacy.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 22 Foreign Relations 1 2013-04-01 2013-04-01 false Protection of personal privacy. 212.22 Section... Information for Public Inspection and Copying § 212.22 Protection of personal privacy. To the extent required to prevent a clearly unwarranted invasion of personal privacy, USAID may delete identifying...

  11. 22 CFR 212.22 - Protection of personal privacy.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 22 Foreign Relations 1 2010-04-01 2010-04-01 false Protection of personal privacy. 212.22 Section 212.22 Foreign Relations AGENCY FOR INTERNATIONAL DEVELOPMENT PUBLIC INFORMATION Availability of Information for Public Inspection and Copying § 212.22 Protection of personal privacy. To the extent...

  12. Personal protection against biting insects and ticks

    PubMed Central

    2011-01-01

    Recent events with the first cases of local transmission of chikungunya and dengue fever virus in southern France by Aedes albopictus, adding to the nuisance and potential vectors that can be encountered when traveling in tropical or sub-tropical countries, has shown the value of a reflection on the Personal protection against vectors (PPAV). It is seen during an outbreak of vector-borne disease, or simply because of nuisance arthropods, that our fellow citizens try to protect themselves individually by using an arsenal of resources available on the market. Yet most of these means have been neither checked for effectiveness or safety tests, however, essential. Travellers, staff on mission or assignment, are looking for specific information on how to protect themselves or their families. Health workers had at their disposal so far indications that vary widely from one source to another. Therefore it seemed important to the Society of Travel Medicine (SMV) and the French Society of Parasitology (SFP) to initiate a reflection on this theme. This reflection took the form of recommendations for good practice, following the outline established by the French High Health Authority (HAS). The aim was to gather all relevant information, verified and validated and the format to be used not only by health personnel (doctors, pharmacists, nurses), but also by travel agents and individuals. This document highlights the need to take into account the risk of vector-borne diseases, some deadly, and the benefit of various methods of personal protection. The choice of methods is clearly oriented towards those whose effectiveness has been proven and potential risks assessed. The paper finally proposes two decision trees based on the transmission type (day or night) and kind of stay (short or roaming, long and steady). It concerns travellers, but also expatriates, residents and nomads. PMID:21395212

  13. Coming soon to a health sector near you: an advance look at the new Ontario Personal Health Information Protection Act (PHIPA): part II.

    PubMed

    Beardwood, John P; Kerr, J Alexis

    2005-01-01

    This is Part II of a two-part article that provides a broad overview and comparative study of the new Ontario health sector-specific privacy legislation. In Part I, which appeared in the previous issue of Healthcare Quarterly, we discussed the objectives, structure and scope of, as well as the substantive rights and obligations created by, the new Ontario Act. In Part II, we discuss the administrative obligations created by the Ontario Act, as well as the provisions relating to the enforcement of, and remedies available under, the Act. We also contrast the Ontario Act with the various approaches to the protection of personal health information that has already been adopted by other provinces, including Alberta, Saskatchewan and Manitoba. PMID:15715338

  14. About Personal Protective Equipment (PPE)

    MedlinePlus

    ... evaluation or testing against specific viruses, such as Ebola or flu. If performance data has met FDA ... about the Flu What You Should Know about Ebola Q3. Should caregivers use PPE to help protect ...

  15. Statistical Methods for Protecting Personally Identifiable Information in Aggregate Reporting. SLDS Technical Brief 3. NCES 2011-603

    ERIC Educational Resources Information Center

    National Center for Education Statistics, 2010

    2010-01-01

    Over the last decade, increased attention on education has led to an expansion in the amount of information on students and their schools and school districts reported to parents and the general public (20 U.S.C. Section 6311). States now report student outcomes based on assessments of student achievement in specific subjects and grade levels for…

  16. 40 CFR 156.212 - Personal protective equipment statements.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 40 Protection of Environment 23 2010-07-01 2010-07-01 false Personal protective equipment... Personal protective equipment statements. (a) Requirement. Each product shall bear the personal protective... personal protective equipment were required for a product before the effective date of this subpart,...

  17. 32 CFR 505.5 - Individual access to personal information.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 32 National Defense 3 2010-07-01 2010-07-01 true Individual access to personal information. 505.5... AUTHORITIES AND PUBLIC RELATIONS ARMY PRIVACY ACT PROGRAM § 505.5 Individual access to personal information... Act protected information to members of Congress when they are acting on behalf of the constituent...

  18. 41 CFR 50-204.7 - Personal protective equipment.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 41 Public Contracts and Property Management 1 2011-07-01 2009-07-01 true Personal protective... CONTRACTS General Safety and Health Standards § 50-204.7 Personal protective equipment. Protective equipment, including personal protective equipment for eyes, face, head, and extremities, protective...

  19. 41 CFR 50-204.7 - Personal protective equipment.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 41 Public Contracts and Property Management 1 2013-07-01 2013-07-01 false Personal protective... CONTRACTS General Safety and Health Standards § 50-204.7 Personal protective equipment. Protective equipment, including personal protective equipment for eyes, face, head, and extremities, protective...

  20. 41 CFR 50-204.7 - Personal protective equipment.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 41 Public Contracts and Property Management 1 2012-07-01 2009-07-01 true Personal protective... CONTRACTS General Safety and Health Standards § 50-204.7 Personal protective equipment. Protective equipment, including personal protective equipment for eyes, face, head, and extremities, protective...

  1. 41 CFR 50-204.7 - Personal protective equipment.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 41 Public Contracts and Property Management 1 2014-07-01 2014-07-01 false Personal protective... CONTRACTS General Safety and Health Standards § 50-204.7 Personal protective equipment. Protective equipment, including personal protective equipment for eyes, face, head, and extremities, protective...

  2. Economics of Personal Data Management: Fair Personal Information Trades

    NASA Astrophysics Data System (ADS)

    Tasidou, A.; Efraimidis, P. S.; Katos, V.

    Individuals today have no control over the way their personal information is being used even though they are the ones to suffer the consequences of any unwanted uses of their information. We propose addressing this externality through the creation of a market for personal information, where licenses to access individuals' personal information will be voluntarily traded. Through this market, satisfactory compensation to the information owner is provided, whilst personal information remains under the owner's control. Using cryptographic tools and micropayments we propose and develop a prototype for personal information trades where the above principles are implemented and tested.

  3. Personal protective equipment and dermal exposure.

    PubMed

    Evans, P G; McAlinden, J J; Griffin, P

    2001-02-01

    Personal protective equipment (PPE) should only be used as a control measure when other measures are inappropriate or are inadequate by themselves. The person undertaking a risk assessment must exercise his or her judgment to take into account the protection afforded by the PPE. There is, therefore, considerable scope for differences in approach and it would seem sensible to eliminate these differences and ensure consistency, where possible, by reaching agreement on the attenuating effect of PPE. However, there is growing evidence that the levels of protection indicated by laboratory-based tests may not be achieved in real use situations. Studies of workplace protection suggest that the spread of contaminants inside protective clothing, including gloves, is commonplace and significant. Insufficient attention may have been paid to the effect of factors such as temperature differentials on the permeation of chemical agents through protective materials. To investigate this, a test cell was designed and built to measure the breakthrough times and subsequent permeation rate of solvents through glove materials where the temperature inside and outside the glove was representative of those that can occur in the workplace. Two chemical solvents were tested against two different glove materials at three different temperature conditions. The differences between the breakthrough times and permeation rates were measured and compared to manufacturer's test data. The practical implications are considered for risk of health and safety to the wearer. PMID:11217735

  4. Insertion Loss of Personal Protective Clothing

    SciTech Connect

    Shull D.J.; Biesel, V.B.; Cunefare, K.A.

    1999-05-13

    'The use of personal protective clothing that covers the head is a common practice in many industries. Such personal protective clothing will impact the sound pressure level and the frequency content of sounds to which the wearer will be exposed. The use of such clothing, then, may impact speech and alarm audibility. A measure of the impact of such clothing is its insertion loss. Insertion loss measurements were performed on four types of personal protective clothing in use by Westinghouse Savannah River Company personnel which utilize cloth and plastic hood configurations to protect the head. All clothing configurations tested at least partially cover the ears. The measurements revealed that insertion loss of the items tested was notable at frequencies above 1000 Hz only and was a function of material stiffness and acoustic flanking paths to the ear. Further, an estimate of the clothing''s noise reduction rating reveals poor performance in that regard, even though the insertion loss of the test articles was significant at frequencies at and above 1000 Hz.'

  5. Personal respiratory protection against Mycobacterium tuberculosis.

    PubMed

    Fennelly, K P

    1997-03-01

    Although there are no data demonstrating the effectiveness of personal respiratory protection in the prevention of occupational tuberculosis, there are sound theoretical bases supporting the use of respirators to reduce the risk of inhalational exposure. The major factor that limits the effectiveness of most respirators is the leakage between the face and the mask. There are data suggesting that traditional fit testing of respirators does not adequately predict the degree of protection in actual use, and more research is needed in that area. There is a large range of infectiousness of aerosols of TB, and classes of respirators vary greatly in the degree of protection they offer. I have argued that respirator selection should be based on anticipated exposures. High-risk exposures to TB are often associated with cough-inducing procedures or with aerosolization of infected tissues during autopsies. In my opinion, the most reasonable type of respirator for such high-risk situations in health care settings is a PAPR hood. The concentration of infectious aerosols in well-ventilated respiratory isolation rooms is likely to be very low, and the new N95 respirators offer a reasonable balance of comfort, cost, practicality, and protection. Preliminary data from mathematical modeling studies suggest there may be little additional benefit from more sophisticated personal respiratory protection in such settings. Additional research is needed to more accurately assess exposures to TB, to determine the size and aerodynamic behavior of TB generated by infectious patients, and to more accurately define the role and effectiveness of personal respiratory protection against TB. PMID:9098607

  6. Overwhelming Physiological Regulation Through Personal Protection.

    PubMed

    Taylor, Nigel A S

    2015-11-01

    There is often a fine line between providing appropriate personal protection and compromising capability. In some situations, protection must come first. In other circumstances, capability becomes paramount. In the military, mission-specific objectives can force personal protection to be less than ideal. Indeed, levels of protection appropriate within the civilian context could jeopardise health and operational success, and for operations conducted in the heat involving load carriage and armored protection with almost total-body clothing coverage, it is the likely thermal impediment to performance that perhaps first comes to mind. Although this consideration is appropriate, it may direct attention away from the actual cause of, and therefore preventative solutions to, physiological collapse. For instance, although classical heat illness absolutely occurs at the age extremes, and it may affect all people when air temperatures are exceptionally hot, frank hyperthermia is not generally the primary cause of exhaustion when healthy clothed individuals are working in the heat. Instead, another homoeostatic process is implicated; blood pressure regulation. In addition to participating in temperature regulation, the cardiovascular system supports oxygen delivery, blood pressure regulatory, and waste removal requirements. Therefore, the elevated cardiac output accompanying work must be shared. Accordingly, the case will be developed that thermoregulatory failure is often not the primary causal mechanism for soldier collapse, although such individuals may be hyperthermic. Alternatively, moderately, but not excessively, hyperthermic soldiers working under these conditions are perhaps more likely to collapse from cardiovascular insufficiency that precipitates uncompensable hypotension. PMID:26506173

  7. Electronic Health Record in Italy and Personal Data Protection.

    PubMed

    Bologna, Silvio; Bellavista, Alessandro; Corso, Pietro Paolo; Zangara, Gianluca

    2016-06-01

    The present article deals with the Italian Electronic Health Record (hereinafter EHR), recently introduced by Act 221/2012, with a specific focus on personal data protection. Privacy issues--e.g., informed consent, data processing, patients' rights and minors' will--are discussed within the framework of recent e-Health legislation, national Data Protection Code, the related Data Protection Authority pronouncements and EU law. The paper is aimed at discussing the problems arising from a complex, fragmentary and sometimes uncertain legal framework on e-Health. PMID:27491249

  8. Personal computing in radiation protection programs

    SciTech Connect

    Bunker, A.S. )

    1987-01-01

    In the fall of 1986, Radiation Protection Management surveyed its Correspondents (radiation protection professionals at utilities, universities, national laboratories, consulting firms, and government agencies) on their use of personal computers (PCs). This article presents the results of the survey with profiles of the PC user, the PC equipment, the software, and the work environment. The average PC user is proficient with more than one type of software, is self taught, knows at least one programing language, and uses his/her PC every day. The standard radiation protection PC is an IBM PC/XT/AT or compatible, fully-loaded with 640K of RAM, a hard disk, a modem, etc. Radiation protection professionals use their PCs mainly for word processing and specialty (technical) applications -- their favorite programs are Lotus 1-2-3, Ashton-Tate's dBase series, and MicroPro's WordStar series. Most PCs are shared by several persons, but one of them often uses the PC more than all of the others combined.

  9. Personal Privacy in an Information Society. Final Report.

    ERIC Educational Resources Information Center

    Privacy Protection Study Commission, Washington, DC.

    This report of the Privacy Protection Study Commission was prepared in response to a Congressional mandate to study data banks, automatic data processing programs, and information systems of governmental, regional and private organizations to determine standards and procedures in force for the protection of personal information. Recommendations…

  10. 10 CFR 110.126 - Protection of classified information.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 10 Energy 2 2010-01-01 2010-01-01 false Protection of classified information. 110.126 Section 110... MATERIAL Special Procedures for Classified Information in Hearings § 110.126 Protection of classified information. Nothing in this subpart shall relieve any person from safeguarding classified information...

  11. 10 CFR 110.126 - Protection of classified information.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 10 Energy 2 2011-01-01 2011-01-01 false Protection of classified information. 110.126 Section 110... MATERIAL Special Procedures for Classified Information in Hearings § 110.126 Protection of classified information. Nothing in this subpart shall relieve any person from safeguarding classified information...

  12. 10 CFR 110.126 - Protection of classified information.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 10 Energy 2 2014-01-01 2014-01-01 false Protection of classified information. 110.126 Section 110... MATERIAL Special Procedures for Classified Information in Hearings § 110.126 Protection of classified information. Nothing in this subpart shall relieve any person from safeguarding classified information...

  13. 10 CFR 110.126 - Protection of classified information.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 10 Energy 2 2012-01-01 2012-01-01 false Protection of classified information. 110.126 Section 110... MATERIAL Special Procedures for Classified Information in Hearings § 110.126 Protection of classified information. Nothing in this subpart shall relieve any person from safeguarding classified information...

  14. 10 CFR 110.126 - Protection of classified information.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 10 Energy 2 2013-01-01 2013-01-01 false Protection of classified information. 110.126 Section 110... MATERIAL Special Procedures for Classified Information in Hearings § 110.126 Protection of classified information. Nothing in this subpart shall relieve any person from safeguarding classified information...

  15. 20 CFR 636.2 - Protection of informants.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 20 Employees' Benefits 3 2010-04-01 2010-04-01 false Protection of informants. 636.2 Section 636.2... AND HEARINGS § 636.2 Protection of informants. (a) Informants. Where possible the identity of any person who has furnished information relating to, or assisted in an investigation of a possible...

  16. 41 CFR 50-204.7 - Personal protective equipment.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... assure its adequacy, including proper maintenance and sanitation of such equipment. All personal... 41 Public Contracts and Property Management 1 2010-07-01 2010-07-01 true Personal protective... CONTRACTS General Safety and Health Standards § 50-204.7 Personal protective equipment. Protective...

  17. 29 CFR 1926.95 - Criteria for personal protective equipment.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 29 Labor 8 2014-07-01 2014-07-01 false Criteria for personal protective equipment. 1926.95 Section..., DEPARTMENT OF LABOR (CONTINUED) SAFETY AND HEALTH REGULATIONS FOR CONSTRUCTION Personal Protective and Life Saving Equipment § 1926.95 Criteria for personal protective equipment. (a) Application....

  18. 29 CFR 1926.95 - Criteria for personal protective equipment.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 29 Labor 8 2010-07-01 2010-07-01 false Criteria for personal protective equipment. 1926.95 Section..., DEPARTMENT OF LABOR (CONTINUED) SAFETY AND HEALTH REGULATIONS FOR CONSTRUCTION Personal Protective and Life Saving Equipment § 1926.95 Criteria for personal protective equipment. (a) Application....

  19. How to use personal protective equipment.

    PubMed

    Pang, Vicky; Carter, Yvonne; Scott, Janice; Salazar, Glenn; Johnson, Velor

    This article offers a refresher on what personal protective equipment (PPE) is, how to choose the right PPE and how to wear and remove it safely. PPE aims to improve staff and patient safety, but self-contamination commonly occurs during its removal; failure to remove PPE carefully can lead to contamination of the user's skin, own clothes, uniform or scrubs, hair, face and hands. The importance of correct PPE use has been highlighted by the ebola crisis and NHS preparations to deal with patients who are infected. PMID:26012067

  20. 32 CFR 310.13 - Safeguarding personal information.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ..., subpart C of 32 CFR part 286 (“DoD Freedom of Information Act Program”) as “For Official Use Only,” and... is stored or processed in an information technology system to protect against threats unique to an... 32 National Defense 2 2010-07-01 2010-07-01 false Safeguarding personal information....

  1. 10 CFR 26.411 - Protection of information.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 10 Energy 1 2010-01-01 2010-01-01 false Protection of information. 26.411 Section 26.411 Energy NUCLEAR REGULATORY COMMISSION FITNESS FOR DUTY PROGRAMS FFD Program for Construction § 26.411 Protection of information. (a) Licensees and other entities who collect personal information about an...

  2. 36 CFR 902.56 - Protection of personal privacy.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 36 Parks, Forests, and Public Property 3 2013-07-01 2012-07-01 true Protection of personal privacy... personal privacy. (a) Any of the following personnel, medical, or similar records is within the statutory... personal privacy: (1) Personnel and background records personal to any officer or employee of...

  3. The protection of the person in medical research in Germany.

    PubMed

    Deutsch, E

    1999-01-01

    Because of its history Germany has many rules concerning the protection of persons in medical research. In fact Germany was the first state to issue a directive regulating medical experimentation with human beings in the year 1900. The ten principles of Nuremberg originated out of the medical case. Germany adheres to the Revised Declaration of Helsinki of the World Medical Association and will probably sign the European convention on biomedicine. The pharmaceutical act contains elaborate provisions for the protection of the patient or proband, e.g. informed consent, risk-benefit ratio, no experimentation on prisoners, approval of a local ethics committee. Moreover in pharmaceutical trials there has to be third party accident insurance for the experimental subject. There is no strict liability for medical experimentation, but the standard of care is high. In general the German law seems to be adequate for the protection of experimental subjects. PMID:10436740

  4. 45 CFR 673.4 - Environmental protection information.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 45 Public Welfare 3 2014-10-01 2014-10-01 false Environmental protection information. 673.4 Section 673.4 Public Welfare Regulations Relating to Public Welfare (Continued) NATIONAL SCIENCE FOUNDATION ANTARCTIC NON-GOVERNMENTAL EXPEDITIONS § 673.4 Environmental protection information. (a) Any person who organizes a non-governmental expedition...

  5. 78 FR 12065 - National Institute for Occupational Safety and Health Personal Protective Technology for...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-02-21

    ... facilitate focused communication and exchange ideas and solutions between key stakeholder groups. Stakeholder... cleared in advance. This clearance takes a minimum of 30 days. FOR FURTHER INFORMATION CONTACT: Dr... Health Personal Protective Technology for Pesticide Handlers: Stakeholder Meeting AGENCY: The...

  6. How Do Students Organize Personal Information Spaces?

    ERIC Educational Resources Information Center

    Hardof-Jaffe, Sharon; Hershkovitz, Arnon; Abu-Kishk, Hama; Bergman, Ofer; Nachmias, Rafi

    2009-01-01

    The purpose of this study is to empirically reveal strategies of students' organization of learning-related digital materials within an online personal information archive. Research population included 518 students who utilized the personal Web space allocated to them on the university servers for archiving information items, and data describing…

  7. 29 CFR 1926.95 - Criteria for personal protective equipment.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 29 Labor 8 2011-07-01 2011-07-01 false Criteria for personal protective equipment. 1926.95 Section 1926.95 Labor Regulations Relating to Labor (Continued) OCCUPATIONAL SAFETY AND HEALTH ADMINISTRATION, DEPARTMENT OF LABOR (CONTINUED) SAFETY AND HEALTH REGULATIONS FOR CONSTRUCTION Personal Protective and Life Saving Equipment § 1926.95...

  8. 49 CFR 229.41 - Protection against personal injury.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 49 Transportation 4 2010-10-01 2010-10-01 false Protection against personal injury. 229.41 Section 229.41 Transportation Other Regulations Relating to Transportation (Continued) FEDERAL RAILROAD... Requirements § 229.41 Protection against personal injury. Fan openings, exposed gears and pinions,...

  9. 49 CFR 238.117 - Protection against personal injury.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 49 Transportation 4 2010-10-01 2010-10-01 false Protection against personal injury. 238.117 Section 238.117 Transportation Other Regulations Relating to Transportation (Continued) FEDERAL RAILROAD... Requirements § 238.117 Protection against personal injury. On or after November 8, 1999, all moving parts,...

  10. 36 CFR 902.56 - Protection of personal privacy.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 36 Parks, Forests, and Public Property 3 2010-07-01 2010-07-01 false Protection of personal privacy. 902.56 Section 902.56 Parks, Forests, and Public Property PENNSYLVANIA AVENUE DEVELOPMENT... Protection of personal privacy. (a) Any of the following personnel, medical, or similar records is within...

  11. 36 CFR 902.56 - Protection of personal privacy.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... privacy. 902.56 Section 902.56 Parks, Forests, and Public Property PENNSYLVANIA AVENUE DEVELOPMENT... Protection of personal privacy. (a) Any of the following personnel, medical, or similar records is within the... invasion of his personal privacy: (1) Personnel and background records personal to any officer or...

  12. 36 CFR 902.56 - Protection of personal privacy.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... privacy. 902.56 Section 902.56 Parks, Forests, and Public Property PENNSYLVANIA AVENUE DEVELOPMENT... Protection of personal privacy. (a) Any of the following personnel, medical, or similar records is within the... invasion of his personal privacy: (1) Personnel and background records personal to any officer or...

  13. 36 CFR 902.56 - Protection of personal privacy.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... privacy. 902.56 Section 902.56 Parks, Forests, and Public Property PENNSYLVANIA AVENUE DEVELOPMENT... Protection of personal privacy. (a) Any of the following personnel, medical, or similar records is within the... invasion of his personal privacy: (1) Personnel and background records personal to any officer or...

  14. [Data protection as a personal right. Government Agency].

    PubMed

    Jacob, J

    1999-12-01

    The sector-specific secrets are traditionally regarded as the historical predecessors of general data protection law. The lecture demonstrates that they are not only aimed at protecting the individual's right to self-determination of the handling of his personal data. It also indicates that those particular secrets are, at the same time, serving for further purposes which are of importance in their respective sectors. The general (omnibus) data protection statues are given attention in the light of the beginning of automated information processing and in their role of guaranteeing the right to personal privacy, a role which the Federal Constitutional Court underlined in its census decision of 1983 and which became of general relevance in the course of the further developments. In conclusion, the report particularizes that, inter alia, statutory adaptations and amendments are necessary in order to preserve the effects of the doctor-patient confidentiality under the conditions of modern data processing. The examples given are comprising: health data on chip cards, health data in networks and the electronic record of the patient. PMID:10683888

  15. Adaptive Visualization for Focused Personalized Information Retrieval

    ERIC Educational Resources Information Center

    Ahn, Jae-wook

    2010-01-01

    The new trend on the Web has totally changed today's information access environment. The traditional information overload problem has evolved into the qualitative level beyond the quantitative growth. The mode of producing and consuming information is changing and we need a new paradigm for accessing information. Personalized search is one of…

  16. Don't Take It Personal: European Union Legal Aspects of Procuring and Protecting Environmental Exposure Data in Population Biobanks Through the Use of a Geo-Information-Systems Toolkit.

    PubMed

    Bovenberg, Jasper Adriaan; de Hoogh, Kees; Knoppers, Bartha Maria; Hveem, Kristian; Hansell, Anna L

    2016-06-01

    Under European Union (EU) law, population-based cohort studies have the right to collect environmental data and to access geospatial data, at street level, on the web, from a host of public sources. As to geospatial information, they should be able to avail themselves of Member States' networks of services for geospatial data sets and services (discovery, viewing, downloading) via the Internet. On the other hand, linkage of health data of biobank participants to environmental data, using geospatial data, is limited, as it must satisfy the provisions of the EU Directive on the Protection of Personal Data, pursuant to which geospatial data regarding biobank participants are likely to qualify as personal data. Hence, we submit that the consents of biobank participants be reviewed to assess whether they cover the generation and linkage of geospatial data. We also submit that biobanks must have measures in place to prevent the re-identification of participants by use of their geospatial data. We present a model Geographic-Information-Systems (GIS) Toolkit, as an example of what measures could be taken to that effect. PMID:27187500

  17. 46 CFR 197.555 - Personal protective clothing and equipment.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... SAFETY AND HEALTH STANDARDS GENERAL PROVISIONS Benzene § 197.555 Personal protective clothing and..., tight-fitting eye goggles to limit dermal exposure to, and prevent eye contact with, liquid benzene....

  18. 46 CFR 197.555 - Personal protective clothing and equipment.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... SAFETY AND HEALTH STANDARDS GENERAL PROVISIONS Benzene § 197.555 Personal protective clothing and..., tight-fitting eye goggles to limit dermal exposure to, and prevent eye contact with, liquid benzene....

  19. 46 CFR 197.555 - Personal protective clothing and equipment.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... SAFETY AND HEALTH STANDARDS GENERAL PROVISIONS Benzene § 197.555 Personal protective clothing and..., tight-fitting eye goggles to limit dermal exposure to, and prevent eye contact with, liquid benzene....

  20. 46 CFR 197.555 - Personal protective clothing and equipment.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... SAFETY AND HEALTH STANDARDS GENERAL PROVISIONS Benzene § 197.555 Personal protective clothing and..., tight-fitting eye goggles to limit dermal exposure to, and prevent eye contact with, liquid benzene....

  1. 46 CFR 197.555 - Personal protective clothing and equipment.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... SAFETY AND HEALTH STANDARDS GENERAL PROVISIONS Benzene § 197.555 Personal protective clothing and..., tight-fitting eye goggles to limit dermal exposure to, and prevent eye contact with, liquid benzene....

  2. Usage and Perceived Side Effects of Personal Protective Measures against Mosquitoes among Current Users in Delhi

    PubMed Central

    Kumar, Rajesh; Meena, G. S.; Singh, M. M.; Sahoo, Jyotiranjan; Ingle, G. K.

    2014-01-01

    Background. Mosquito-borne diseases constitute an important cause of morbidity and mortality. The use of personal protective measures (PPM) like mats, bednets, screening, repellents, liquid vaporizers, mosquito coils, and so forth has been advocated as an effective tool in control of mosquito-borne diseases, but data about the safety profile of personal protective measures is still scarce. Objective. To study the usage and side effects of personal protective measures against mosquitoes among current users in Delhi. Materials and Methods. A community-based cross-sectional study among 350 adult individuals selected by systematic sampling method. Data was collected using pretested semistructured questionnaire after taking written informed consent. Data was analysed using SPSS version 17. Chi-square/Fisher's Exact test was used for qualitative variables to find association and P value <0.05 was considered significant. Results. Out of 350 families selected, 210 belonged to rural area and 140 to urban area. Personal protective measures were used by 219 (62.5%) subjects. Liquid vaporizer was the most preferred method (41.4%). Most common perceived side effect of personal protective measures was headache (7.7%). Other perceived side effects were cough (3.2%), sore throat (2.7%), allergy (1.3%), and eye irritation (0.9%) predominantly among coil users. Conclusion. There is a need to have a close watch for side effects of personal protective measures among users. Further research is also needed to develop safe and effective personal protective measures against mosquitoes. PMID:24616805

  3. Personal medical information system using laser card

    NASA Astrophysics Data System (ADS)

    Cho, Seong H.; Kim, Keun Ho; Choi, Hyung-Sik; Park, Hyun Wook

    1996-04-01

    The well-known hospital information system (HIS) and the picture archiving and communication system (PACS) are typical applications of multimedia to medical area. This paper proposes a personal medical information save-and-carry system using a laser card. This laser card is very useful, especially in emergency situations, because the medical information in the laser card can be read at anytime and anywhere if there exists a laser card reader/writer. The contents of the laser card include the clinical histories of a patient such as clinical chart, exam result, diagnostic reports, images, and so on. The purpose of this system is not a primary diagnosis, but emergency reference of clinical history of the patient. This personal medical information system consists of a personal computer integrated with laser card reader/writer, color frame grabber, color CCD camera and a high resolution image scanner optionally. Window-based graphical user interface was designed for easy use. The laser card has relatively sufficient capacity to store the personal medical information, and has fast access speed to restore and load the data with a portable size as compact as a credit card. Database items of laser card provide the doctors with medical data such as laser card information, patient information, clinical information, and diagnostic result information.

  4. Evaluating the utility of personal genomic information.

    PubMed

    Foster, Morris W; Mulvihill, John J; Sharp, Richard R

    2009-08-01

    In evaluating the utility of human genome-wide assays, the answer will differ depending on why the question is asked. For purposes of regulating medical tests, a restrictive sense of clinical utility is used, although it may be possible to have clinical utility without changing patient's outcomes and clinical utility may vary between patients. For purposes of using limited third party or public health resources, cost effectiveness should be evaluated in a societal rather than individual context. However, for other health uses of genomic information a broader sense of overall utility should be used. Behavioral changes and increased individual awareness of health-related choices are relevant metrics for evaluating the personal utility of genomic information, even when traditional clinical benefits are not manifested. In taking account of personal utility, cost effectiveness may be calculated on an individual and societal basis. Overall measures of utility (including both restrictive clinical measures and measures of personal utility) may vary significantly between individuals depending on potential changes in lifestyle, health awareness and behaviors, family dynamics, and personal choice and interest as well as the psychological effects of disease risk perception. That interindividual variation suggests that a more expansive overall measure of utility could be used to identify individuals who are more likely to benefit from personal genomic information as well as those for whom the risks of personal information may be greater than any benefits. PMID:19478683

  5. The Personal Construction of Information Space.

    ERIC Educational Resources Information Center

    McKnight, Cliff

    2000-01-01

    Describes the use of Repertory Grid methodology as a means of externalizing an individual's view of information space. Discusses personal construct theory (PCT), describes the Grid method with a single participant, and proposes future work which will investigate the extent to which individuals share perceptions of information space. (Author/LRW)

  6. Barriers and spatial repellents for personal protection.

    Technology Transfer Automated Retrieval System (TEKTRAN)

    Insecticides were assessed in the field for protectant suitability on perimeter vegetation and fabric enclosures. CO2-generating traps were used as surrogate hosts for dense populations of Anopheles quadrimaculatus, Psorophora columbiae and Culex spp. The most effective insecticide was combined w...

  7. Thermal Materials Protect Priceless, Personal Keepsakes

    NASA Technical Reports Server (NTRS)

    2014-01-01

    NASA astronaut Scott Parazynski led the development of materials and techniques for the inspection and repair of the shuttle’s thermal protection system. Parazynski later met Chris Shiver of Houston-based DreamSaver Enterprises LLC and used concepts from his work at Johnson Space Center to develop an enclosure that can withstand 98 percent of residential fires.

  8. Mucosal Correlates of Protection in HIV-1-Exposed Seronegative Persons

    PubMed Central

    Shen, Ruizhong; Smith, Phillip D.

    2014-01-01

    Resistance to HIV-1 infection in HIV-1-exposed seronegative (HESN) persons offers a promising opportunity to identify mechanisms of “natural” protection. Unique features of the mucosa in particular may contribute to this protection. Here we highlight several key issues pertaining to the mucosal correlates of protection in HESN persons, including humoral immune responses, mechanisms of mucosal HIV-1-neutralization, immune cell activation, and role of the microbiota in mucosal responses. We also discuss mucosal model systems that can be used to investigate the mechanisms of resistance in HESN subjects. A clear understanding of the mucosal correlates of protection against HIV-1 in HESN persons will provide critical new insights for the development of effective vaccine and microbicide strategies for the prevention of HIV-1 transmission. PMID:24428610

  9. Divulging Personal Information within Learning Analytics Systems

    ERIC Educational Resources Information Center

    Ifenthaler, Dirk; Schumacher, Clara

    2015-01-01

    The purpose of this study was to investigate if students are prepared to release any personal data in order to inform learning analytics systems. Besides the well-documented benefits of learning analytics, serious concerns and challenges are associated with the application of these data driven systems. Most notably, empirical evidence regarding…

  10. Disclosing personal health information relating to adults who lack capacity.

    PubMed

    Griffith, Richard

    2014-03-01

    The need to share information about patients is vital to effective care and protection, especially where it relates to adults who lack decision-making capacity but it has to be balanced against the right to confidentiality. Like other health professionals, district nurses have a duty to maintain the confidentiality of patient information, and incapable adults have the right to expect their personal health information to be kept private. This right is guaranteed by the common-law duty of confidence, the Data Protection Act 1998 and the NHS Care Record Guarantee and confidentiality policy. This article discusses the district nurse's legal obligations when considering sharing information in relation to an incapable adult PMID:24897837

  11. 16 CFR 312.6 - Right of parent to review personal information provided by a child.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... UNDER SPECIFIC ACTS OF CONGRESS CHILDREN'S ONLINE PRIVACY PROTECTION RULE § 312.6 Right of parent to... personal information to a website or online service, the operator of that website or online service is... permit the operator's further use or future online collection of personal information from that...

  12. Evaluation of commercial products for personal protection against mosquitoes

    Technology Transfer Automated Retrieval System (TEKTRAN)

    Human landing catch studies were conducted in a semi-field setting to determine the efficacy of seven commercial products used for personal protection against mosquitoes. Experiments were conducted in two empty, insecticide free, greenhouse compartments, in Israel, with either 1500 Aedes albopictus...

  13. 30 CFR 56.12020 - Protection of persons at switchgear.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 30 Mineral Resources 1 2011-07-01 2011-07-01 false Protection of persons at switchgear. 56.12020 Section 56.12020 Mineral Resources MINE SAFETY AND HEALTH ADMINISTRATION, DEPARTMENT OF LABOR METAL AND NONMETAL MINE SAFETY AND HEALTH SAFETY AND HEALTH STANDARDS-SURFACE METAL AND NONMETAL MINES...

  14. 30 CFR 56.12020 - Protection of persons at switchgear.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 30 Mineral Resources 1 2010-07-01 2010-07-01 false Protection of persons at switchgear. 56.12020 Section 56.12020 Mineral Resources MINE SAFETY AND HEALTH ADMINISTRATION, DEPARTMENT OF LABOR METAL AND NONMETAL MINE SAFETY AND HEALTH SAFETY AND HEALTH STANDARDS-SURFACE METAL AND NONMETAL MINES...

  15. 30 CFR 56.12020 - Protection of persons at switchgear.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 30 Mineral Resources 1 2013-07-01 2013-07-01 false Protection of persons at switchgear. 56.12020 Section 56.12020 Mineral Resources MINE SAFETY AND HEALTH ADMINISTRATION, DEPARTMENT OF LABOR METAL AND NONMETAL MINE SAFETY AND HEALTH SAFETY AND HEALTH STANDARDS-SURFACE METAL AND NONMETAL MINES...

  16. 30 CFR 56.12020 - Protection of persons at switchgear.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 30 Mineral Resources 1 2014-07-01 2014-07-01 false Protection of persons at switchgear. 56.12020 Section 56.12020 Mineral Resources MINE SAFETY AND HEALTH ADMINISTRATION, DEPARTMENT OF LABOR METAL AND NONMETAL MINE SAFETY AND HEALTH SAFETY AND HEALTH STANDARDS-SURFACE METAL AND NONMETAL MINES...

  17. 30 CFR 56.12020 - Protection of persons at switchgear.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 30 Mineral Resources 1 2012-07-01 2012-07-01 false Protection of persons at switchgear. 56.12020 Section 56.12020 Mineral Resources MINE SAFETY AND HEALTH ADMINISTRATION, DEPARTMENT OF LABOR METAL AND NONMETAL MINE SAFETY AND HEALTH SAFETY AND HEALTH STANDARDS-SURFACE METAL AND NONMETAL MINES...

  18. 49 CFR 214.111 - Personal protective equipment, generally.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 49 Transportation 4 2011-10-01 2011-10-01 false Personal protective equipment, generally. 214.111 Section 214.111 Transportation Other Regulations Relating to Transportation (Continued) FEDERAL RAILROAD ADMINISTRATION, DEPARTMENT OF TRANSPORTATION RAILROAD WORKPLACE SAFETY Bridge Worker Safety Standards §...

  19. 40 CFR 170.240 - Personal protective equipment.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ..., chemical-resistant gloves, chemical-resistant footwear, respiratory protection devices, chemical-resistant... using a closed system to mix or load pesticides with a signal word of DANGER or WARNING may substitute a...) Persons using a closed system to mix or load pesticides other than those in paragraph (d)(4)(i) of...

  20. 40 CFR 170.240 - Personal protective equipment.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ..., chemical-resistant gloves, chemical-resistant footwear, respiratory protection devices, chemical-resistant... using a closed system to mix or load pesticides with a signal word of DANGER or WARNING may substitute a...) Persons using a closed system to mix or load pesticides other than those in paragraph (d)(4)(i) of...

  1. 40 CFR 170.240 - Personal protective equipment.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ..., chemical-resistant gloves, chemical-resistant footwear, respiratory protection devices, chemical-resistant... using a closed system to mix or load pesticides with a signal word of DANGER or WARNING may substitute a...) Persons using a closed system to mix or load pesticides other than those in paragraph (d)(4)(i) of...

  2. 40 CFR 170.240 - Personal protective equipment.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ..., chemical-resistant gloves, chemical-resistant footwear, respiratory protection devices, chemical-resistant... using a closed system to mix or load pesticides with a signal word of DANGER or WARNING may substitute a...) Persons using a closed system to mix or load pesticides other than those in paragraph (d)(4)(i) of...

  3. Chlorobenzylidenemalonitrile Gas Exposure from A Novelty Personal-Protection Gun

    PubMed Central

    Dong, Christopher; de la Garza, Albert

    2007-01-01

    We present an unusual case of chlorobenzylidenemalonitrile (CS) tear-gas exposure from the unwitting discharge of a personal-protection handgun loaded with CS gas. The gun was in a bag of toys purchased from a local thrift store and was discharged by a child. The responding paramedic presumptively identified the substance as CS based solely on personal experience. This recognition led to suboptimal field management of the incident with the paramedic failing to follow the standard operating procedures for an unknown chemical exposure. As this was a benign agent, there were no serious consequences. This case highlights the pre-hospital and emergency department challenges associated with the management of an unknown chemical exposure and the potential consequences if the chemical is a toxic substance. A methodical approach following established protocols can reduce the potential for negative outcomes. Review of the literature found no other report of CS gas exposure from such a personal-protection weapon. PMID:20440402

  4. 40 CFR 370.60 - How does a person obtain MSDS information about a specific facility?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 40 Protection of Environment 27 2010-07-01 2010-07-01 false How does a person obtain MSDS information about a specific facility? 370.60 Section 370.60 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) SUPERFUND, EMERGENCY PLANNING, AND COMMUNITY RIGHT-TO-KNOW PROGRAMS HAZARDOUS CHEMICAL REPORTING: COMMUNITY...

  5. Hazard Assessment of Personal Protective Clothing for Hydrogen Peroxide Service

    NASA Technical Reports Server (NTRS)

    Greene, Ben; McClure, Mark B.; Johnson, Harry T.

    2004-01-01

    Selection of personal protective equipment (PPE) for hydrogen peroxide service is an important part of the hazard assessment process. But because drip testing of chemical protective clothing for hydrogen peroxide service has not been reported for about 40 years, it is of great interest to test new protective clothing materials with new, high-concentration hydrogen peroxide following similar procedures. The suitability of PPE for hydrogen peroxide service is in part determined by observations made when hydrogen peroxide is dripped onto swatches of protective clothing material. Protective clothing material was tested as received, in soiled condition, and in grossly soiled condition. Materials were soiled by pretreating the material with potassium permanganate (KMnO4) solution then drying to promote a reaction. Materials were grossly soiled with solid KMnO4 to greatly promote reaction. Observations of results including visual changes to the hydrogen peroxide and materials, times to ignition, and self-extinguishing characteristics of the materials are reported.

  6. 32 CFR Appendix A to Part 310 - Safeguarding Personally Identifiable Information (PII)

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... SECRETARY OF DEFENSE (CONTINUED) PRIVACY PROGRAM DOD PRIVACY PROGRAM Pt. 310, App. A Appendix A to Part 310... stringent protection for remote access or mobile computing. 2. Encrypt unclassified personal information...

  7. Protecting Privacy in Computerized Medical Information.

    ERIC Educational Resources Information Center

    Congress of the U.S., Washington, DC. Office of Technology Assessment.

    This report analyzes the implications of computerized medical information and the challenges it brings to individual privacy. The report examines the nature of the privacy interest in health care information and the current state of the law protecting that information; the nature of proposals to computerize health care information and the…

  8. Web-browser encryption of personal health information

    PubMed Central

    2011-01-01

    Background Electronic health records provide access to an unprecedented amount of clinical data for research that can accelerate the development of effective medical practices. However it is important to protect patient confidentiality, as many medical conditions are stigmatized and disclosure could result in personal and/or financial loss. Results We describe a system for remote data entry that allows the data that would identify the patient to be encrypted in the web browser of the person entering the data. These data cannot be decrypted on the server by the staff at the data center but can be decrypted by the person entering the data or their delegate. We developed this system to solve a problem that arose in the context of clinical research, but it is applicable in a range of situations where sensitive information is stored and updated in a database and it is necessary to ensure that it cannot be viewed by any except those intentionally given access. Conclusion By developing this system, we are able to centralize the collection of some patient data while minimizing the risk that protected health information be made available to study personnel who are not authorized to use it. PMID:22073940

  9. Personal protective equipment and decontamination of adults and children.

    PubMed

    Holland, Michael G; Cawthon, David

    2015-02-01

    Accurate identification of the hazardous material is essential for proper care. Efficient hospital security and triage must prevent contaminated victims from entering the emergency department (ED) and causing secondary contamination. The decontamination area should be located outside the ambulance entrance. Decontamination priorities are protection of the health care worker, utilization of Level C personal protective equipment, and proper decontamination of the exposed patient. Decontamination proceeds in a head-to-toe sequence. Run-off water is a hazardous waste. Hospital and Community Management Planning for these emergencies is essential for proper preparation and effective response to the hazardous materials incident. PMID:25455662

  10. Self-informant Agreement for Personality and Evaluative Person Descriptors: Comparing Methods for Creating Informant Measures

    PubMed Central

    Simms, Leonard J.; Zelazny, Kerry; Yam, Wern How; Gros, Daniel F.

    2011-01-01

    Little attention typically is paid to the way self-report measures are translated for use in self-informant agreement studies. We studied two possible methods for creating informant measures: (a) the traditional method in which self-report items were translated from the first- to the third-person and (b) an alternative meta-perceptual method in which informants were directed to rate their perception of the targets’ self-perception. We hypothesized that the latter method would yield stronger self-informant agreement for evaluative personality dimensions measured by indirect item markers. We studied these methods in a sample of 303 undergraduate friendship dyads. Results revealed mean-level differences between methods, similar self-informant agreement across methods, stronger agreement for Big Five dimensions than for evaluative dimensions, and incremental validity for meta-perceptual informant rating methods. Limited power reduced the interpretability of several sparse acquaintanceship effects. We conclude that traditional informant methods are appropriate for most personality traits, but meta-perceptual methods may be more appropriate when personality questionnaire items reflect indirect indicators of the trait being measured, which is particularly likely for evaluative traits. PMID:21541262

  11. [Safety analysis for astronaut and the personal protective equipment].

    PubMed

    Chen, J D; Sun, J B; Shi, H P; Sun, H L

    1999-12-01

    Objective. To analyze and study astronaut and his personal equipment safety. Method. Three of the most widely used approaches, failure mode and effect analysis (FMEA), fault tree analysis (FTA) and system hazards analysis (SHA) were used. Result. It was demonstrated that astronaut and the personal equipment are subjected to various potential hazards, such as human errors, astronaut illness, fire or space suit emergency decompression, etc. Their causes, mechanisms, possible effects and criticality of some critical potential hazards were analyzed and identified in more details with considerations of the historic accidents of manned spaceflight. And the compensating provisions and preventive measures for each hazard were discussed. Conclusion. The analysis study may be helpful in enhancing the safety of the astronaut and its personal protective equipment. PMID:12434807

  12. 77 FR 35700 - Protected Critical Infrastructure Information (PCII) Program Survey

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-06-14

    ... SECURITY Protected Critical Infrastructure Information (PCII) Program Survey AGENCY: National Protection...), National Protection and Programs Directorate (NPPD), Office of Infrastructure Protection (IP), Infrastructure Information Collection Division (IICD), will submit the following Information Collection...

  13. 22 CFR 96.26 - Protection of information and documents by the accrediting entity.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 22 Foreign Relations 1 2010-04-01 2010-04-01 false Protection of information and documents by the... of Applicants for Accreditation and Approval § 96.26 Protection of information and documents by the... and information about the agency or person it receives including, but not limited to, documents...

  14. 6 CFR 29.7 - Safeguarding of Protected Critical Infrastructure Information.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... Infrastructure Information. 29.7 Section 29.7 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY PROTECTED CRITICAL INFRASTRUCTURE INFORMATION § 29.7 Safeguarding of Protected Critical Infrastructure Information. (a) Safeguarding. All persons granted access to PCII are responsible for...

  15. 6 CFR 29.7 - Safeguarding of Protected Critical Infrastructure Information.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... Infrastructure Information. 29.7 Section 29.7 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY PROTECTED CRITICAL INFRASTRUCTURE INFORMATION § 29.7 Safeguarding of Protected Critical Infrastructure Information. (a) Safeguarding. All persons granted access to PCII are responsible for...

  16. 6 CFR 29.7 - Safeguarding of Protected Critical Infrastructure Information.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... Infrastructure Information. 29.7 Section 29.7 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY PROTECTED CRITICAL INFRASTRUCTURE INFORMATION § 29.7 Safeguarding of Protected Critical Infrastructure Information. (a) Safeguarding. All persons granted access to PCII are responsible for...

  17. 6 CFR 29.7 - Safeguarding of Protected Critical Infrastructure Information.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... Infrastructure Information. 29.7 Section 29.7 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY PROTECTED CRITICAL INFRASTRUCTURE INFORMATION § 29.7 Safeguarding of Protected Critical Infrastructure Information. (a) Safeguarding. All persons granted access to PCII are responsible for...

  18. Government Doublethink: Protection or Suppression in Information.

    ERIC Educational Resources Information Center

    Drake, Miriam A.

    2003-01-01

    Discusses regulations and actions related to government withholding, suppressing, and altering information since September 11, 2001. Topics include conflicting goals of an informed citizenry versus national security, science and technology progress versus protection of sensitive information, and public health versus ideology; political pressure;…

  19. Insect repellents and associated personal protection for a reduction in human disease

    Technology Transfer Automated Retrieval System (TEKTRAN)

    Personal protection measures against biting arthropods include topical insect repellents, area repellents, insecticide-treated bednets and treated clothing. The literature on the effectiveness of personal protection products against arthropods is mainly limited to studies of prevention of bites, rat...

  20. Personal Health Information in Canada: A Comparison of Citizen Expectations and Legislation

    ERIC Educational Resources Information Center

    Peekhaus, Wilhelm

    2008-01-01

    This paper explores whether the Canadian legislative protections in place to safeguard medical privacy meet the expectations of Canadians. An overview of current governance systems designed to protect the privacy of personal health information at both the federal and provincial levels is first presented. This is followed by an empirical analysis…

  1. Hiding personal information reveals the worst

    PubMed Central

    John, Leslie K.; Barasz, Kate; Norton, Michael I.

    2016-01-01

    Seven experiments explore people’s decisions to share or withhold personal information, and the wisdom of such decisions. When people choose not to reveal information—to be “hiders”—they are judged negatively by others (experiment 1). These negative judgments emerge when hiding is volitional (experiments 2A and 2B) and are driven by decreases in trustworthiness engendered by decisions to hide (experiments 3A and 3B). Moreover, hiders do not intuit these negative consequences: given the choice to withhold or reveal unsavory information, people often choose to withhold, but observers rate those who reveal even questionable behavior more positively (experiments 4A and 4B). The negative impact of hiding holds whether opting not to disclose unflattering (drug use, poor grades, and sexually transmitted diseases) or flattering (blood donations) information, and across decisions ranging from whom to date to whom to hire. When faced with decisions about disclosure, decision-makers should be aware not just of the risk of revealing, but of what hiding reveals. PMID:26755591

  2. Evaluation of commercial products for personal protection against mosquitoes.

    PubMed

    Revay, Edita E; Junnila, Amy; Xue, Rui-De; Kline, Daniel L; Bernier, Ulrich R; Kravchenko, Vasiliy D; Qualls, Whitney A; Ghattas, Nina; Müller, Günter C

    2013-02-01

    Human landing catch studies were conducted in a semi-field setting to determine the efficacy of seven commercial products used for personal protection against mosquitoes. Experiments were conducted in two empty, insecticide free, mesh-enclosed greenhouses, in Israel, with either 1500 Aedes albopictus or 1500 Culex pipiens released on consecutive study nights. The products tested in this study were the OFF!(®) Clip-On™ Mosquito Repellent (Metofluthrin 31.2%) and the Terminix(®) ALLCLEAR(®) Sidekick Mosquito Repeller (Cinnamon oil 10.5%; Eugenol 13%; Geranium oil 21%; Peppermint 5.3%; Lemongrass oil 2.6%), which are personal diffusers; Super Band™ Wristband (22% Citronella oil) and the PIC(®) Citronella Plus Wristband (Geraniol 15%; Lemongrass oil 5%, Citronella oil 1%); the Sonic Insect Repeller Keychain; the Mosquito Guard Patch (Oil of Lemon Eucalyptus 80mg), an adhesive-backed sticker for use on textiles; and the Mosquito Patch (vitamin B1 300mg), a transdermal patch. It was determined that the sticker, transdermal patch, wristbands and sonic device did not provide significant protection to volunteers compared with the mosquito attack rate on control volunteers who were not wearing a repellent device. The personal diffusers: - OFF!(®) Clip-On™ and Terminix(®) ALLCLEAR(®) Sidekick - provided superior protection compared with all other devices in this study. These diffusers reduced biting on the arms of volunteers by 96.28% and 95.26% respectively, for Ae. albopictus, and by 94.94% and 92.15% respectively, for Cx. pipiens. In a second trial conducted to compare these devices directly, biting was reduced by the OFF!(®) Clip-On™ and the Terminix(®) ALLCLEAR(®) by 87.55% and 92.83%, respectively, for Ae. albopictus, and by 97.22% and 94.14%, respectively, for Cx. pipiens. There was no significant difference between the performances of the two diffusers for each species. PMID:23092689

  3. 78 FR 5116 - NASA Information Security Protection

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-01-24

    ... Executive Order of 13132 E.O. 13132, ``Federalism,'' 64 FR 43255 (August 4, 1999) requires regulations be... SPACE ADMINISTRATION 14 CFR Part 1203 RIN 2700-AD61 NASA Information Security Protection AGENCY..., Classified National Security Information, and appropriately to correspond with NASA's internal...

  4. Incontinence-associated dermatitis: protecting the older person.

    PubMed

    Beldon, Pauline

    As the older population in the UK continues to grow, so too will the number of people presenting with dermatological problems. Older people's skin is subject to dehydration internally and environmental factors externally. If, in addition, the individual suffers continence problems, he or she is at risk of painful incontinence-associated dermatitis, or even formation of a moisture lesion. The use of an effective barrier cream that gives protection while not interfering with continence pad efficacy can be an invaluable means of comfort to the older person. PMID:22585017

  5. Making sense of personal health information: challenges for information visualization.

    PubMed

    Faisal, Sarah; Blandford, Ann; Potts, Henry W W

    2013-09-01

    This article presents a systematic review of the literature on information visualization for making sense of personal health information. Based on this review, five application themes were identified: treatment planning, examination of patients' medical records, representation of pedigrees and family history, communication and shared decision making, and life management and health monitoring. While there are recognized design challenges associated with each of these themes, such as how best to represent data visually and integrate qualitative and quantitative information, other challenges and opportunities have received little attention to date. In this article, we highlight, in particular, the opportunities for supporting people in better understanding their own illnesses and making sense of their health conditions in order to manage them more effectively. PMID:23981395

  6. Information for and by Blind Persons in Rural Asia.

    ERIC Educational Resources Information Center

    Miles, M.

    1990-01-01

    The concept of information-based rehabilitation has emerged from implementation of information and communication strategies with rural Asian blind persons. Radio broadcast of mobility skill instruction is considered as a medium for mass dissemination of information to blind persons. Information derived from the experiences of blind people should…

  7. 78 FR 24234 - Agency Information Collection Activities; Submission for OMB Review; Comment Request; Personal...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-04-24

    ...; Personal Protective Equipment Standard for General Industry ACTION: Notice. SUMMARY: The Department of... collection request (ICR) titled, ``Personal Protective Equipment Standard for General Industry,'' to the... that personal protective equipment (PPE)--including equipment for eyes, face, head, and...

  8. [Personal protection measures against blood-sucking insects and ticks].

    PubMed

    Orshan, Laor; Wilamowski, Amos; Pener, Hedva

    2010-09-01

    Blood-sucking arthropods are major vectors of various pathogens like viruses, bacteria, protozoa and nematodes. Preventing exposure to the vector is imperative especially when vaccine and prophylactic treatments are not available. Personal protection measures (PPM) are essential and often the only means available when dealing with blood-sucking disease transmitting arthropods. Awareness of the risk in the specific areas of travel is the first step to be taken before and while traveling. PPM include preventive personal behavior, suitable clothing, application of insect repellents to the skin, the use of space repellents, impregnation of clothing, camping gear and bed nets and, when necessary, ground spraying of insecticides. The registered and recommended active ingredients for skin application are Deet, picaridin (icaridin), p-menthane-3,8-diol (PMD) and IR3535. Volatile pyrethrins are used as space repellents while pyrethroids, especially permethrin, are employed for impregnation and for ground spraying. It is recommended to purchase only products registered in Israel or other developed countries. These products should have a detailed label specifying the concentration of the active ingredient, application instructions and the duration of protection. PMID:21302476

  9. Personal protective equipment for registration purposes of pesticides.

    PubMed

    Gerritsen-Ebben, M G; Brouwer, D H; van Hemmen, J J

    2007-01-01

    Regulatory authorities in North America, Europe and Australia use different approaches for the estimation of exposure reduction effectiveness of personal protective equipment (PPE) in registration processes of agrochemical pesticides. TNO has investigated current views and facts for the use of default values and set up a discussion paper which can be used as a starting point to achieve an internationally harmonised set of PPE protection factors for regulatory use. For inhalation exposure Loading it is proposed to use the assigned protection factors (APF) as deduced by BSI (British Standard Institution) and ANSI (American National Standards Institution). Since these values are somewhat variance and since in agricultural settings efficient control and proper training and education with respect to inhalation protection devices is generally absent, it is good to err on the safe side and to use the Lowest of both values, if available. For dermal exposure Loading differentiations are made for operators and re-entry workers and further for hand and body protection. Next to this the restrictions and framework for the use of the proposed defaults are very relevant. Oral exposure loading is only considered in special cases where dermal exposure may be relatively high and the hand-mouth shunt may lead to appreciable oral exposure loading. The presented defaults for PPE have been discussed with experts of regulatory authorities and industry, but a formal discussion still has to take place. This needs to be done on EU level between Member States. The current proposal is based on state-of-the-art knowledge and policy considerations, but further research is needed to better underpin the proposed values and/or to adapt them. PMID:18399428

  10. Content Sharing Based on Personal Information in Virtually Secured Space

    NASA Astrophysics Data System (ADS)

    Sohn, Hosik; Ro, Yong Man; Plataniotis, Kostantinos N.

    User generated contents (UGC) are shared in an open space like social media where users can upload and consume contents freely. Since the access of contents is not restricted, the contents could be delivered to unwanted users or misused sometimes. In this paper, we propose a method for sharing UGCs securely based on the personal information of users. With the proposed method, virtual secure space is created for contents delivery. The virtual secure space allows UGC creator to deliver contents to users who have similar personal information and they can consume the contents without any leakage of personal information. In order to verify the usefulness of the proposed method, the experiment was performed where the content was encrypted with personal information of creator, and users with similar personal information have decrypted and consumed the contents. The results showed that UGCs were securely shared among users who have similar personal information.

  11. 48 CFR 32.1104 - Protection of EFT information.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... GENERAL CONTRACTING REQUIREMENTS CONTRACT FINANCING Electronic Funds Transfer 32.1104 Protection of EFT information. The Government shall protect against improper disclosure of contractors' EFT information....

  12. DEVELOPMENT OF PERSONAL PROTECTIVE EQUIPMENT FOR DECONTAMINATION AND DECOMMISSIONING

    SciTech Connect

    M.A. Ebadian, Ph.D.

    1999-01-01

    The purpose of this one-year investigation is to perform a technology integration/search, thereby ensuring that the safest and most cost-effective options are developed and subsequently used during the deactivation and decommissioning (D&D) of U.S. Department of Energy Environmental Management (DOE-EM) sites. Issues of worker health and safety are the main concern, followed by cost. Two lines of action were explored: innovative Personal Cooling Systems (PCS) and Personal Monitoring Equipment (PME). PME refers to sensors affixed to the worker that warn of an approaching heat stress condition, thereby preventing it. Three types of cooling systems were investigated: Pre-Chilled or Forced-Air System (PCFA), Umbilical Fluid-Chilled System (UFCS), and Passive Vest System (PVS). Of these, the UFCS leads the way. The PVS or Gel pack vest lagged due to a limited cooling duration. And the PCFA or chilled liquid air supply was cumbersome and required an expensive and complex recharge system. The UFCS in the form of the Personal Ice Cooling System (PICS) performed exceptionally. The technology uses a chilled liquid circulating undergarment and a Personal Protective Equipment (PPE) external pump and ice reservoir. The system is moderately expensive, but the recharge is low-tech and inexpensive enough to offset the cost. There are commercially available PME that can be augmented to meet the DOE's heat stress alleviation need. The technology is costly, in excess of $4,000 per unit. Workers easily ignore the alarm. The benefit to health & safety is indirect so can be overlooked. A PCS is a more justifiable expenditure.

  13. Permeation Resistance of Personal Protective Equipment Materials to Monomethyhydrazine

    NASA Technical Reports Server (NTRS)

    Waller, J. M.; Williams, J. H.

    1997-01-01

    Permeation resistance was determined by measuring the breakthrough time and time-averaged vapor transmission rate of monomethylhydrazine (MMH) through two types of personal protective equipment (PPE). The two types of PPE evaluated were the totally encapsulating ILC Dover Chemturion Model 1212 chemical protective suit with accessories, and the FabOhio polyvinyl chloride (PVC) splash garment. Two exposure scenarios were simulated: (1) a saturated vapor exposure for 2 hours (h), and (2) a brief MMH 'splash' followed by a 2-h saturated vapor exposure. Time-averaged MMH concentrations inside the totally-encapsulating suit were calculated by summation of the area-weighted contributions made by each suit component. Results show that the totally encapsulating suit provides adequate protection at the new 10 ppb Threshold Limit Value Time-Weighted Average (TLV-TWA). The permeation resistance of the PVC splash garment to MMH was poorer than any of the totally encapsulating suit materials tested. Breakthrough occurred soon after initial vapor or 'splash' exposure.

  14. A guide to unclassified sensitive information protection

    SciTech Connect

    Donahue, S.C.

    1996-11-14

    This document is a reference guide for CIC-Division employees who lead or participate in projects that use and/or produce unclassified sensitive information. It is intended for use on a case by case basis to develop project specific sensitive information handling procedures and standards. It contains criteria for identifying sensitive information and determining levels of sensitivity, and describes cost effective measures for protecting various levels of sensitive information. The goal of this document is to help establish good business practices that benefit both the Laboratory and its customers. Division personnel are encouraged to apply these guidelines.

  15. Ethical Considerations Regarding Classroom Use of Personal Genomic Information

    PubMed Central

    Parker, Lisa S.; Grubs, Robin

    2014-01-01

    Rapidly decreasing costs of genetic technologies—especially next-generation sequencing—and intensifying need for a clinical workforce trained in genomic medicine have increased interest in having students use personal genomic information to motivate and enhance genomics education. Numerous ethical issues attend classroom/pedagogical use of students’ personal genomic information, including their informed decision to participate, pressures to participate, privacy concerns, and psychosocial sequelae of learning genomic information. This paper addresses these issues, advocates explicit discussion of these issues to cultivate students’ ethical reasoning skills, suggests ways to mitigate potential harms, and recommends collection of ethically relevant data regarding pedagogical use of personal genomic information. PMID:25574277

  16. 32 CFR 505.4 - Collecting personal information.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... AUTHORITIES AND PUBLIC RELATIONS ARMY PRIVACY ACT PROGRAM § 505.4 Collecting personal information. (a) General... information on public Web sites without the express permission of the user. Requests for exceptions must...

  17. 32 CFR 310.17 - Individual access to personal information.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 32 National Defense 2 2013-07-01 2013-07-01 false Individual access to personal information. 310.17 Section 310.17 National Defense Department of Defense (Continued) OFFICE OF THE SECRETARY OF DEFENSE (CONTINUED) PRIVACY PROGRAM DOD PRIVACY PROGRAM Access by Individuals § 310.17 Individual access to personal information. (a) Individual access....

  18. 32 CFR 310.17 - Individual access to personal information.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 32 National Defense 2 2014-07-01 2014-07-01 false Individual access to personal information. 310.17 Section 310.17 National Defense Department of Defense (Continued) OFFICE OF THE SECRETARY OF DEFENSE (CONTINUED) PRIVACY PROGRAM DOD PRIVACY PROGRAM Access by Individuals § 310.17 Individual access to personal information. (a) Individual access....

  19. Continuum Thinking and the Contexts of Personal Information Management

    ERIC Educational Resources Information Center

    Huvila, Isto; Eriksen, Jon; Häusner, Eva-Maria; Jansson, Ina-Maria

    2014-01-01

    Introduction: Recent personal information management literature has underlined the significance of the contextuality of personal information and its use. The present article discusses the applicability of the records continuum model and its generalisation, continuum thinking, as a theoretical framework for explicating the overlap and evolution of…

  20. 32 CFR 327.6 - Collecting personal information

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 32 National Defense 2 2010-07-01 2010-07-01 false Collecting personal information 327.6 Section 327.6 National Defense Department of Defense (Continued) OFFICE OF THE SECRETARY OF DEFENSE (CONTINUED) PRIVACY PROGRAM DEFENSE COMMISSARY AGENCY PRIVACY ACT PROGRAM § 327.6 Collecting personal information (a) Collect directly from the individual....

  1. Farmers' use of personal protective equipment during handling of plant protection products: Determinants of implementation.

    PubMed

    Damalas, Christos A; Abdollahzadeh, Gholamhossein

    2016-11-15

    Understanding factors affecting the use of personal protective equipment (PPE) during handling of plant protection products (PPPs) is of major importance for the design of tailored interventions to minimize exposure among farmers. However, data regarding this issue are highly limited. Factors related to the use of PPE during handling of PPPs were explored in a survey of cotton farmers in northern Greece. Data were collected through face-to-face interviews with the farmers based on a questionnaire with structured items on the frequency of use of various personal protective devices during handling of PPPs. New evidence on patterns of PPE use and potential exposure of farmers to PPPs is provided. Most farmers (49.3%) showed potentially unsafe behaviour with respect to PPE use. Hat and boots were the most commonly used protective items during PPPs use, but most of the farmers surveyed reported low frequency of use for gloves, goggles, face mask, coveralls, and respirator. Especially the respirator was reported to be the least used PPE item amongst farmers. Farmers who perceived PPPs as harmful substances or those who had an episode of intoxication in the past reported more frequent use of several PPE items. Stepwise multiple regression analysis revealed that the variable episode of intoxication in the past exerted the strongest positive influence on PPE use, followed by the perception of PPPs being hazardous substances, upper secondary education, previous training on PPPs (i.e., spraying equipment, application parameters, risks to human health and environment, safety issues) and farm size under cultivation. Old age exerted a significant negative influence on PPE use, namely, elderly farmers tended not to use PPE. Strategies to maximize the protection of applicators of PPPs from hazardous exposures still require innovation to achieve increased effectiveness. Emphasis on lifelong training and education of farmers about hazards and risks of PPPs is crucial for changing

  2. 10 CFR 2.903 - Protection of restricted data and national security information.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... Restricted Data and/or National Security Information § 2.903 Protection of restricted data and national security information. Nothing in this subpart shall relieve any person from safeguarding Restricted Data or National Security Information in accordance with the applicable provisions of laws of the United States...

  3. 10 CFR 2.903 - Protection of restricted data and national security information.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... Restricted Data and/or National Security Information § 2.903 Protection of restricted data and national security information. Nothing in this subpart shall relieve any person from safeguarding Restricted Data or National Security Information in accordance with the applicable provisions of laws of the United States...

  4. 10 CFR 2.903 - Protection of restricted data and national security information.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... Restricted Data and/or National Security Information § 2.903 Protection of restricted data and national security information. Nothing in this subpart shall relieve any person from safeguarding Restricted Data or National Security Information in accordance with the applicable provisions of laws of the United States...

  5. Are Norms of Disclosure of Online and Offline Personal Information Associated with the Disclosure of Personal Information Online?

    ERIC Educational Resources Information Center

    Mesch, Gustavo S.; Beker, Guy

    2010-01-01

    This study investigated whether norms of self-disclosure of one's online and offline identity are linked to online disclosure of personal and intimate information. We expected online disclosure of personal and intimate information to be associated with norms of online disclosure. Secondary analysis of the 2006 Pew and American Life Survey of…

  6. 48 CFR 8.608 - Protection of classified and sensitive information.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 48 Federal Acquisition Regulations System 1 2010-10-01 2010-10-01 false Protection of classified... Prison Industries, Inc. 8.608 Protection of classified and sensitive information. Agencies shall not... petroleum products, or other commodities; or (3) Other utilities; or (c) Personal or financial...

  7. The Personalized Information Retrieval Model Based on User Interest

    NASA Astrophysics Data System (ADS)

    Gong, Songjie

    Personalized information retrieval systems can help customers to gain orientation in information overload by determining which items are relevant for their interests. One type of information retrieval is content-based filtering. In content-based filtering, items contain words in natural language. Meanings of words in natural language are often ambiguous. The problem of word meaning disambiguation is often decomposed to determining semantic similarity of words. In this paper, the architecture of personalized information retrieval based on user interest is presented. The architecture includes user interface model, user interest model, detecting interest model and update model. It established a user model for personalized information retrieval based on user interest keyword list on client server, which can supply personalized information retrieval service for user with the communications and collaboration of all modules of the architecture.

  8. Personal health records: retrieving contextual information with Google Custom Search.

    PubMed

    Ahsan, Mahmud; Seldon, H Lee; Sayeed, Shohel

    2012-01-01

    Ubiquitous personal health records, which can accompany a person everywhere, are a necessary requirement for ubiquitous healthcare. Contextual information related to health events is important for the diagnosis and treatment of disease and for the maintenance of good health, yet it is seldom recorded in a health record. We describe a dual cellphone-and-Web-based personal health record system which can include 'external' contextual information. Much contextual information is available on the Internet and we can use ontologies to help identify relevant sites and information. But a search engine is required to retrieve information from the Web and developing a customized search engine is beyond our scope, so we can use Google Custom Search API Web service to get contextual data. In this paper we describe a framework which combines a health-and-environment 'knowledge base' or ontology with the Google Custom Search API to retrieve relevant contextual information related to entries in a ubiquitous personal health record. PMID:23138074

  9. Smartphone Mobile Application Delivering Personalized, Real-Time Sun Protection Advice: A Randomized Clinical Trial

    PubMed Central

    Buller, David B.; Berwick, Marianne; Lantz, Kathy; Buller, Mary Klein; Shane, James; Kane, Ilima; Liu, Xia

    2014-01-01

    Importance Mobile smart phones are rapidly emerging as an effective means of communicating with many Americans. Using mobile applications, they can access remote databases, track time and location, and integrate user input to provide tailored health information. Objective A smart phone mobile application providing personalized, real-time sun protection advice was evaluated in a randomized trial. Design The trial was conducted in 2012 and had a randomized pretest-posttest controlled design with a 10-week follow-up. Setting Data was collected from a nationwide population-based survey panel. Participants The trial enrolled a sample of n=604 non-Hispanic and Hispanic adults from the Knowledge Panel® aged 18 or older who owned an Android smart phone. Intervention The mobile application provided advice on sun protection (i.e., protection practices and risk of sunburn) and alerts (to apply/reapply sunscreen and get out of the sun), hourly UV Index, and vitamin D production based on the forecast UV Index, phone's time and location, and user input. Main Outcomes and Measures Percent of days using sun protection and time spent outdoors (days and minutes) in the midday sun and number of sunburns in the past 3 months were collected. Results Individuals in the treatment group reported more shade use but less sunscreen use than controls. Those who used the mobile app reported spending less time in the sun and using all protection behaviors combined more. Conclusions and Relevance The mobile application improved some sun protection. Use of the mobile application was lower than expected but associated with increased sun protection. Providing personalized advice when and where people are in the sun may help reduce sun exposure. PMID:25629710

  10. Managing Personal and Group Collections of Information

    NASA Technical Reports Server (NTRS)

    Wolfe, Shawn R.; Wragg, Stephen D.; Chen, James R.; Koga, Dennis (Technical Monitor)

    1999-01-01

    The internet revolution has dramatically increased the amount of information available to users. Various tools such as search engines have been developed to help users find the information they need from this vast repository. Users often also need tools to help manipulate the growing amount of useful information they have discovered. Current tools available for this purpose are typically local components of web browsers designed to manage URL bookmarks. They provide limited functionalities to handle high information complexities. To tackle this have created DIAMS, an agent-based tool to help users or groups manage their information collections and share their collections with other. the main features of DIAMS are described here.

  11. 16 CFR 312.8 - Confidentiality, security, and integrity of personal information collected from children.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 16 Commercial Practices 1 2010-01-01 2010-01-01 false Confidentiality, security, and integrity of... Confidentiality, security, and integrity of personal information collected from children. The operator must establish and maintain reasonable procedures to protect the confidentiality, security, and integrity...

  12. 16 CFR 312.7 - Prohibition against conditioning a child's participation on collection of personal information.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 16 Commercial Practices 1 2010-01-01 2010-01-01 false Prohibition against conditioning a child's participation on collection of personal information. 312.7 Section 312.7 Commercial Practices FEDERAL TRADE COMMISSION REGULATIONS UNDER SPECIFIC ACTS OF CONGRESS CHILDREN'S ONLINE PRIVACY PROTECTION RULE §...

  13. 16 CFR 312.8 - Confidentiality, security, and integrity of personal information collected from children.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 16 Commercial Practices 1 2011-01-01 2011-01-01 false Confidentiality, security, and integrity of... Confidentiality, security, and integrity of personal information collected from children. The operator must establish and maintain reasonable procedures to protect the confidentiality, security, and integrity...

  14. 75 FR 11982 - Request for Information for the 2010 Trafficking in Persons Report

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-03-12

    ...The Department of State (``the Department'') requests written information to assist in reporting on the degree to which the United States and foreign governments comply with the minimum standards for the elimination of trafficking in persons (``minimum standards'') that are prescribed by the Trafficking Victims Protection Act (``TVPA'') of 2000, Div. A of Public Law 106-386, section 108, as......

  15. 41 CFR 105-64.108 - How does GSA safeguard personal information?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 41 Public Contracts and Property Management 3 2010-07-01 2010-07-01 false How does GSA safeguard... GSA safeguard personal information? (a) System managers will establish administrative, technical, and physical safeguards to ensure the security and confidentiality of records, protect the records...

  16. 41 CFR 105-64.108 - How does GSA safeguard personal information?

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 41 Public Contracts and Property Management 3 2011-01-01 2011-01-01 false How does GSA safeguard... GSA safeguard personal information? (a) System managers will establish administrative, technical, and physical safeguards to ensure the security and confidentiality of records, protect the records...

  17. 34 CFR 364.56 - What are the special requirements pertaining to the protection, use, and release of personal...

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 34 Education 2 2010-07-01 2010-07-01 false What are the special requirements pertaining to the protection, use, and release of personal information? 364.56 Section 364.56 Education Regulations of the Offices of the Department of Education (Continued) OFFICE OF SPECIAL EDUCATION AND REHABILITATIVE SERVICES, DEPARTMENT OF EDUCATION...

  18. Trust-based information system architecture for personal wellness.

    PubMed

    Ruotsalainen, Pekka; Nykänen, Pirkko; Seppälä, Antto; Blobel, Bernd

    2014-01-01

    Modern eHealth, ubiquitous health and personal wellness systems take place in an unsecure and ubiquitous information space where no predefined trust occurs. This paper presents novel information model and an architecture for trust based privacy management of personal health and wellness information in ubiquitous environment. The architecture enables a person to calculate a dynamic and context-aware trust value for each service provider, and using it to design personal privacy policies for trustworthy use of health and wellness services. For trust calculation a novel set of measurable context-aware and health information-sensitive attributes is developed. The architecture enables a person to manage his or her privacy in ubiquitous environment by formulating context-aware and service provider specific policies. Focus groups and information modelling was used for developing a wellness information model. System analysis method based on sequential steps that enable to combine results of analysis of privacy and trust concerns and the selection of trust and privacy services was used for development of the information system architecture. Its services (e.g. trust calculation, decision support, policy management and policy binding services) and developed attributes enable a person to define situation-aware policies that regulate the way his or her wellness and health information is processed. PMID:25160161

  19. 78 FR 53478 - Proposed Information Collection; United States Park Police Personal History Statement

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-08-29

    ... National Park Service Proposed Information Collection; United States Park Police Personal History Statement... Police Personal History Statement) to collect detailed personal history information from applicants... information, including financial data and residence history. Selective Service information and military...

  20. Withholding Information to Protect a Loved One.

    PubMed

    Kilbaugh, Todd J; Groll, Daniel; Morrison, Wynne; Liebow, Nabina; Lantos, John D

    2016-06-01

    Parents respond to the death of a child in very different ways. Some parents may be violent or angry, some sad and tearful, some quiet and withdrawn, and some frankly delusional. We present a case in which a father's reaction to his daughter's death is a desire to protect his wife from the stressful information. The wife is in the second trimester of a high-risk pregnancy and so is particularly fragile. We asked pediatricians and bioethicists to discuss the ways in which they might respond to the father's understandable but troubling request. PMID:27244864

  1. Critical Connections: Personal Learning Environments and Information Literacy

    ERIC Educational Resources Information Center

    Hicks, Alison; Sinkinson, Caroline

    2015-01-01

    Personal learning environments (PLEs) and critical information literacies (CILs) are two concepts that have been presented as responses to the challenges of the rich and complex information landscape. While both approaches support learners' critical engagement with new information environments, each was developed within a different field. This…

  2. River Protection Project information systems assessment

    SciTech Connect

    JOHNSON, A.L.

    1999-07-28

    The Information Systems Assessment Report documents the results from assessing the Project Hanford Management Contract (PHMC) Hanford Data Integrator 2000 (HANDI 2000) system, Business Management System (BMS) and Work Management System phases (WMS), with respect to the System Engineering Capability Assessment Model (CAM). The assessment was performed in accordance with the expectations stated in the fiscal year (FY) 1999 Performance Agreement 7.1.1, item (2) which reads, ''Provide an assessment report on the selected Integrated Information System by July 31, 1999.'' This report assesses the BMS and WMS as implemented and planned for the River Protection Project (RPP). The systems implementation is being performed under the PHMC HANDI 2000 information system project. The project began in FY 1998 with the BMS, proceeded in FY 1999 with the Master Equipment List portion of the WMS, and will continue the WMS implementation as funding provides. This report constitutes an interim quality assessment providing information necessary for planning RPP's information systems activities. To avoid confusion, HANDI 2000 will be used when referring to the entire system, encompassing both the BMS and WMS. A graphical depiction of the system is shown in Figure 2-1 of this report.

  3. Chest Compression With Personal Protective Equipment During Cardiopulmonary Resuscitation

    PubMed Central

    Chen, Jie; Lu, Kai-Zhi; Yi, Bin; Chen, Yan

    2016-01-01

    Abstract Following a chemical, biological, radiation, and nuclear incident, prompt cardiopulmonary resuscitation (CPR) procedure is essential for patients who suffer cardiac arrest. But CPR when wearing personal protection equipment (PPE) before decontamination becomes a challenge for healthcare workers (HCW). Although previous studies have assessed the impact of PPE on airway management, there is little research available regarding the quality of chest compression (CC) when wearing PPE. A present randomized cross-over simulation study was designed to evaluate the effect of PPE on CC performance using mannequins. The study was set in one university medical center in the China. Forty anesthesia residents participated in this randomized cross-over study. Each participant performed 2 min of CC on a manikin with and without PPE, respectively. Participants were randomized into 2 groups that either performed CC with PPE first, followed by a trial without PPE after a 180-min rest, or vice versa. CPR recording technology was used to objectively quantify the quality of CC. Additionally, participants’ physiological parameters and subjective fatigue score values were recorded. With the use of PPE, a significant decrease of the percentage of effective compressions (41.3 ± 17.1% with PPE vs 67.5 ± 15.6% without PPE, P < 0.001) and the percentage of adequate compressions (67.7 ± 18.9% with PPE vs 80.7 ± 15.5% without PPE, P < 0.001) were observed. Furthermore, the increases in heart rate, mean arterial pressure, and subjective fatigue score values were more obvious with the use of PPE (all P < 0.01). We found significant deterioration of CC performance in HCW with the use of a level-C PPE, which may be a disadvantage for enhancing survival of cardiac arrest. PMID:27057878

  4. Personal protective equipment and risk for avian influenza (H7N3).

    PubMed

    Morgan, Oliver; Kuhne, Mirjam; Nair, Pat; Verlander, Neville Q; Preece, Richard; McDougal, Marianne; Zambon, Maria; Reacher, Mark

    2009-01-01

    An outbreak of avian influenza (H7N3) among poultry resulted in laboratory-confirmed disease in 1 of 103 exposed persons. Incomplete use of personal protective equipment (PPE) was associated with conjunctivitis and influenza-like symptoms. Rigorous use of PPE by persons managing avian influenza outbreaks may reduce exposure to potentially hazardous infected poultry materials. PMID:19116052

  5. Personal Protective Equipment and Risk for Avian Influenza (H7N3)

    PubMed Central

    Kuhne, Mirjam; Nair, Pat; Verlander, Neville Q.; Preece, Richard; McDougal, Marianne; Zambon, Maria; Reacher, Mark

    2009-01-01

    An outbreak of avian influenza (H7N3) among poultry resulted in laboratory-confirmed disease in 1 of 103 exposed persons. Incomplete use of personal protective equipment (PPE) was associated with conjunctivitis and influenza-like symptoms. Rigorous use of PPE by persons managing avian influenza outbreaks may reduce exposure to potentially hazardous infected poultry materials. PMID:19116052

  6. 18 CFR 401.75 - Protection of trade secrets; Confidential information.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... secrets; Confidential information. 401.75 Section 401.75 Conservation of Power and Water Resources... to Decisions of the Executive Director in Water Qualtity Cases § 401.75 Protection of trade secrets; Confidential information. No person shall be required in such report to divulge trade secrets or...

  7. 18 CFR 401.75 - Protection of trade secrets; Confidential information.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... secrets; Confidential information. 401.75 Section 401.75 Conservation of Power and Water Resources... to Decisions of the Executive Director in Water Qualtity Cases § 401.75 Protection of trade secrets; Confidential information. No person shall be required in such report to divulge trade secrets or...

  8. 18 CFR 401.75 - Protection of trade secrets; Confidential information.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... secrets; Confidential information. 401.75 Section 401.75 Conservation of Power and Water Resources... to Decisions of the Executive Director in Water Qualtity Cases § 401.75 Protection of trade secrets; Confidential information. No person shall be required in such report to divulge trade secrets or...

  9. 18 CFR 401.75 - Protection of trade secrets; Confidential information.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... secrets; Confidential information. 401.75 Section 401.75 Conservation of Power and Water Resources... to Decisions of the Executive Director in Water Qualtity Cases § 401.75 Protection of trade secrets; Confidential information. No person shall be required in such report to divulge trade secrets or...

  10. 18 CFR 401.75 - Protection of trade secrets; Confidential information.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... secrets; Confidential information. 401.75 Section 401.75 Conservation of Power and Water Resources... to Decisions of the Executive Director in Water Qualtity Cases § 401.75 Protection of trade secrets; Confidential information. No person shall be required in such report to divulge trade secrets or...

  11. Health information privacy protection: crisis or common sense?

    PubMed

    Kumekawa, J K

    2001-01-01

    Concerns about the protection of personally identifiable information are not unique to the health care industry; however, consumers view their medical records as more "private" than other information, such as financial data, because involuntary disclosure can affect jobs or health insurance status. This paper briefly touches upon new sweeping federal privacy standards mandated under the Health Insurance Portability and Accountability Act of 1996 (HIPAA). The article outlines who and what is covered under the new rules, considers how practitioners can approach compliance with common sense, addresses concerns related to risk management, discusses consumer health privacy issues, and notes the difficulty of evaluating these rules and regulations. The article also looks at some unique privacy issues facing telemedicine and telehealth practitioners. PMID:11936942

  12. Personal Genomic Information Management and Personalized Medicine: Challenges, Current Solutions, and Roles of HIM Professionals

    PubMed Central

    Alzu'bi, Amal; Zhou, Leming; Watzlaf, Valerie

    2014-01-01

    In recent years, the term personalized medicine has received more and more attention in the field of healthcare. The increasing use of this term is closely related to the astonishing advancement in DNA sequencing technologies and other high-throughput biotechnologies. A large amount of personal genomic data can be generated by these technologies in a short time. Consequently, the needs for managing, analyzing, and interpreting these personal genomic data to facilitate personalized care are escalated. In this article, we discuss the challenges for implementing genomics-based personalized medicine in healthcare, current solutions to these challenges, and the roles of health information management (HIM) professionals in genomics-based personalized medicine. PMID:24808804

  13. Implementing personalized medicine with asymmetric information on prevalence rates.

    PubMed

    Antoñanzas, Fernando; Juárez-Castelló, Carmelo A; Rodríguez-Ibeas, Roberto

    2016-12-01

    Although personalized medicine is becoming the new paradigm to manage some diseases, the economics of personalized medicine have only focused on assessing the efficiency of specific treatments, lacking a theoretical framework analyzing the interactions between pharmaceutical firms and healthcare systems leading to the implementation of personalized treatments. We model the interaction between the hospitals and the manufacturer of a new treatment as an adverse selection problem where the firm does not have perfect information on the prevalence across hospitals of the genetic characteristics of the patients making them eligible to receive a new treatment. As a result of the model, hospitals with high prevalence rates benefit from the information asymmetry only when the standard treatment is inefficient when applied to the patients eligible to receive the new treatment. Otherwise, information asymmetry has no value. Personalized medicine may be fully or partially implemented depending on the proportion of high prevalence hospitals. PMID:27539222

  14. 15 CFR 270.351 - Protection of voluntarily submitted information.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... Protection of voluntarily submitted information. Notwithstanding any other provision of law, a Team, NIST, any investigation participant, and any agency receiving information from a Team, NIST, or any...

  15. 15 CFR 270.351 - Protection of voluntarily submitted information.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... Protection of voluntarily submitted information. Notwithstanding any other provision of law, a Team, NIST, any investigation participant, and any agency receiving information from a Team, NIST, or any...

  16. 15 CFR 270.351 - Protection of voluntarily submitted information.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... Protection of voluntarily submitted information. Notwithstanding any other provision of law, a Team, NIST, any investigation participant, and any agency receiving information from a Team, NIST, or any...

  17. 15 CFR 270.351 - Protection of voluntarily submitted information.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... Protection of voluntarily submitted information. Notwithstanding any other provision of law, a Team, NIST, any investigation participant, and any agency receiving information from a Team, NIST, or any...

  18. 10 CFR 71.11 - Protection of Safeguards Information.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 10 Energy 2 2010-01-01 2010-01-01 false Protection of Safeguards Information. 71.11 Section 71.11... General Provisions § 71.11 Protection of Safeguards Information. Each licensee, certificate holder, or... public health and safety or the common defense and security, shall protect Safeguards Information...

  19. 10 CFR 71.11 - Protection of Safeguards Information.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 10 Energy 2 2011-01-01 2011-01-01 false Protection of Safeguards Information. 71.11 Section 71.11... General Provisions § 71.11 Protection of Safeguards Information. Each licensee, certificate holder, or... public health and safety or the common defense and security, shall protect Safeguards Information...

  20. RFID Based Context Information Security System Architecture for Securing Personal Information under Ubiquitous Environment

    NASA Astrophysics Data System (ADS)

    Song, Jae-Gu; Park, Gil-Cheol; Kim, Seoksoo

    2007-12-01

    In this study, framework for securing personal information among various contexts collected and utilized under ubiquitous environment is proposed. The proposed framework will analyze relativity among information used to determine the exposure of personal information according to circumstances where personal information is used. In addition, the study will define the definition of role-based structure and propose a structure applying password security system according to access level. Furthermore, the study will propose a method for building information security system using RFID tag information which generates context information.

  1. Attitudes regarding privacy of genomic information in personalized cancer therapy

    PubMed Central

    Rogith, Deevakar; Yusuf, Rafeek A; Hovick, Shelley R; Peterson, Susan K; Burton-Chase, Allison M; Li, Yisheng; Meric-Bernstam, Funda; Bernstam, Elmer V

    2014-01-01

    Objective To evaluate attitudes regarding privacy of genomic data in a sample of patients with breast cancer. Methods Female patients with breast cancer (n=100) completed a questionnaire assessing attitudes regarding concerns about privacy of genomic data. Results Most patients (83%) indicated that genomic data should be protected. However, only 13% had significant concerns regarding privacy of such data. Patients expressed more concern about insurance discrimination than employment discrimination (43% vs 28%, p<0.001). They expressed less concern about research institutions protecting the security of their molecular data than government agencies or drug companies (20% vs 38% vs 44%; p<0.001). Most did not express concern regarding the association of their genomic data with their name and personal identity (49% concerned), billing and insurance information (44% concerned), or clinical data (27% concerned). Significantly fewer patients were concerned about the association with clinical data than other data types (p<0.001). In the absence of direct benefit, patients were more willing to consent to sharing of deidentified than identified data with researchers not involved in their care (76% vs 60%; p<0.001). Most (85%) patients were willing to consent to DNA banking. Discussion While patients are opposed to indiscriminate release of genomic data, privacy does not appear to be their primary concern. Furthermore, we did not find any specific predictors of privacy concerns. Conclusions Patients generally expressed low levels of concern regarding privacy of genomic data, and many expressed willingness to consent to sharing their genomic data with researchers. PMID:24737606

  2. Using interactive computer simulation for teaching the proper use of personal protective equipment.

    PubMed

    Hung, Pan-Pan; Choi, Kup-Sze; Chiang, Vico Chung-Lim

    2015-02-01

    The use of personal protective equipment is one of the basic infection control precautions in health care. The effectiveness of personal protective equipment is highly dependent on adequate staff training. In this project, a computer simulation program, as a supplement to conventional training approaches, was developed to facilitate the learning of the proper use of personal protective equipment. The simulation program was a Web-based interactive software with user-friendly graphical interface for users to practice the use of personal protective equipment usage via drag-and-drop metaphors and respond to questions online. The effectiveness of the computer simulation software was investigated by a controlled study. Fifty healthcare workers were randomly assigned into two groups: one received conventional personal protective equipment training only (control group), whereas the other also received the same conventional training but followed by using the developed simulation program for self-learning (experimental group). Their performance was assessed by personal protective equipment donning and doffing evaluation before and after the training. The results showed that the computer simulation program is able to improve the healthcare workers' understanding and competence in using personal protective equipment. PMID:25521788

  3. 78 FR 73817 - Information Collection; Federal Excess Personal Property (FEPP) and Firefighter Property (FFP...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-12-09

    ... Forest Service Information Collection; Federal Excess Personal Property (FEPP) and Firefighter Property... currently approved information collection, Federal Excess Personal Property (FEPP) and Firefighter Property... Friday. SUPPLEMENTARY INFORMATION: Title: Federal Excess Personal Property (FEPP) and...

  4. 32 CFR 806b.10 - How to collect personal information.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 32 National Defense 6 2011-07-01 2011-07-01 false How to collect personal information. 806b.10 Section 806b.10 National Defense Department of Defense (Continued) DEPARTMENT OF THE AIR FORCE... parties when: (a) You must verify information. (b) You want opinions or evaluations. (c) You can't...

  5. 32 CFR 806b.10 - How to collect personal information.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 32 National Defense 6 2010-07-01 2010-07-01 false How to collect personal information. 806b.10 Section 806b.10 National Defense Department of Defense (Continued) DEPARTMENT OF THE AIR FORCE... parties when: (a) You must verify information. (b) You want opinions or evaluations. (c) You can't...

  6. Attributions, Attention, and Person Memory: Processing Congruent and Incongruent Information.

    ERIC Educational Resources Information Center

    Crocker, Jennifer; Vitkus, John

    Impressions of people are resistant to change. Information contradictory to an initial impression has relatively little impact on the impression and is particularly likely to be recalled. Possible resolutions on this paradox include: (1) the recalled information and the impression of the person are independent of each other; (2) people may link…

  7. The User-Subjective Approach to Personal Information Management Systems.

    ERIC Educational Resources Information Center

    Bergman, Ofer; Beyth-Marom, Ruth; Nachmias, Rafi

    2003-01-01

    Explains personal information management (PIM) systems and suggests a user-subjective approach to PIM system design. Advocates that PIM systems relate to the subjective value-added attributes that the user gives the stored data so that the user can find information again, recall it when needed, and use it effectively in the next interaction.…

  8. A Study of Personal Information Management Strategies for Online Faculty

    ERIC Educational Resources Information Center

    Kearns, Lorna R.; Frey, Barbara A.; Tomer, Christinger; Alman, Susan

    2014-01-01

    The literature suggests that personal information management is a serious challenge for many computer users. Online faculty are especially challenged because of the large number of electronic files necessitated by teaching online. Those who have experience in this environment may offer valuable insights regarding information management challenges…

  9. 32 CFR 310.17 - Individual access to personal information.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... provide information that is disclosable pursuant to the DoD Freedom of Information Act program (see 32 CFR... 32 CFR, part 286). (iii) When an individual seeks personal access to records pertaining to themselves... to be released under the Privacy Act, the FOIA (32 CFR part 286) does not bar release even if a...

  10. Informatics in Radiology (infoRAD): personal computer security: part 2. Software Configuration and file protection.

    PubMed

    Caruso, Ronald D

    2004-01-01

    Proper configuration of software security settings and proper file management are necessary and important elements of safe computer use. Unfortunately, the configuration of software security options is often not user friendly. Safe file management requires the use of several utilities, most of which are already installed on the computer or available as freeware. Among these file operations are setting passwords, defragmentation, deletion, wiping, removal of personal information, and encryption. For example, Digital Imaging and Communications in Medicine medical images need to be anonymized, or "scrubbed," to remove patient identifying information in the header section prior to their use in a public educational or research environment. The choices made with respect to computer security may affect the convenience of the computing process. Ultimately, the degree of inconvenience accepted will depend on the sensitivity of the files and communications to be protected and the tolerance of the user. PMID:15371625

  11. Solving the software protection problem with intrinsic personal physical unclonable functions.

    SciTech Connect

    Nithyanand, Rishab; Sion, Radu

    2011-09-01

    Physical Unclonable Functions (PUFs) or Physical One Way Functions (P-OWFs) are physical systems whose responses to input stimuli (i.e., challenges) are easy to measure (within reasonable error bounds) but hard to clone. The unclonability property comes from the accepted hardness of replicating the multitude of characteristics introduced during the manufacturing process. This makes PUFs useful for solving problems such as device authentication, software protection, licensing, and certified execution. In this paper, we focus on the effectiveness of PUFs for software protection in offline settings. We first argue that traditional (black-box) PUFs are not useful for protecting software in settings where communication with a vendor's server or third party network device is infeasible or impossible. Instead, we argue that Intrinsic PUFs are needed to solve the above mentioned problems because they are intrinsically involved in processing the information that is to be protected. Finally, we describe how sources of randomness in any computing device can be used for creating intrinsic-personal-PUFs (IP-PUF) and present experimental results in using standard off-the-shelf computers as IP-PUFs.

  12. An Inter-Personal Information Sharing Model Based on Personalized Recommendations

    NASA Astrophysics Data System (ADS)

    Kamei, Koji; Funakoshi, Kaname; Akahani, Jun-Ichi; Satoh, Tetsuji

    In this paper, we propose an inter-personal information sharing model among individuals based on personalized recommendations. In the proposed model, we define an information resource as shared between people when both of them consider it important --- not merely when they both possess it. In other words, the model defines the importance of information resources based on personalized recommendations from identifiable acquaintances. The proposed method is based on a collaborative filtering system that focuses on evaluations from identifiable acquaintances. It utilizes both user evaluations for documents and their contents. In other words, each user profile is represented as a matrix of credibility to the other users' evaluations on each domain of interests. We extended the content-based collaborative filtering method to distinguish other users to whom the documents should be recommended. We also applied a concept-based vector space model to represent the domain of interests instead of the previous method which represented them by a term-based vector space model. We introduce a personalized concept-base compiled from each user's information repository to improve the information retrieval in the user's environment. Furthermore, the concept-spaces change from user to user since they reflect the personalities of the users. Because of different concept-spaces, the similarity between a document and a user's interest varies for each user. As a result, a user receives recommendations from other users who have different view points, achieving inter-personal information sharing based on personalized recommendations. This paper also describes an experimental simulation of our information sharing model. In our laboratory, five participants accumulated a personal repository of e-mails and web pages from which they built their own concept-base. Then we estimated the user profiles according to personalized concept-bases and sets of documents which others evaluated. We simulated

  13. 48 CFR 3.104-4 - Disclosure, protection, and marking of contractor bid or proposal information and source...

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... BUSINESS PRACTICES AND PERSONAL CONFLICTS OF INTEREST Safeguards 3.104-4 Disclosure, protection, and... 48 Federal Acquisition Regulations System 1 2010-10-01 2010-10-01 false Disclosure, protection, and marking of contractor bid or proposal information and source selection information....

  14. Ubiquitous Data Management in a Personal Information Environment

    NASA Astrophysics Data System (ADS)

    Mohammad, Atif Farid

    This paper presents a novel research work on Personal Information Environment (PIE), which is a relatively new field to get explored. PIE is a self managing pervasive environment. It contains an individual's personal pervasive information associated within user's related or non-related contextual environments. Contexts are vitally important because they control, influence and affect everything within them by dominating its pervasive content(s). This paper shows in depth the achievement of Personal Information Environment, which deals with a user's devices, which are to be spontaneous, readily self-manageable on autonomic basis. This paper shows an actual implementation of pervasive data management of a PIE-user, which contains append and update of PIE's data from the last device used by the user to another PIE devices for further processing and storage needs. Data recharging is utilized to transmit and receive data among PIE devices.

  15. 40 CFR 51.368 - Public information and consumer protection.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... the area, as described in § 51.369(b)(1) of this subpart. Motorists that fail the I/M test shall also... protection. 51.368 Section 51.368 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) AIR.../Maintenance Program Requirements § 51.368 Public information and consumer protection. (a) Public...

  16. 40 CFR 51.368 - Public information and consumer protection.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 40 Protection of Environment 2 2010-07-01 2010-07-01 false Public information and consumer.../Maintenance Program Requirements § 51.368 Public information and consumer protection. (a) Public awareness... the test that were failed. (b) Consumer protection. The oversight agency shall institute...

  17. Personal Protection Measures Against Mosquitoes, Ticks, and Other Arthropods.

    PubMed

    Alpern, Jonathan D; Dunlop, Stephen J; Dolan, Benjamin J; Stauffer, William M; Boulware, David R

    2016-03-01

    Arthropod-associated diseases are a major cause of morbidity among travelers. Obtaining a detailed travel itinerary and understanding traveler-specific and destination-specific risk factors can help mitigate the risk of vector-borne diseases. DEET, picaridin, PMD, and IR3535 are insect repellents that offer sufficient protection against arthropod bites. IR3535 does not provide adequate protection against Anopheles mosquitoes, and should be avoided in malaria-endemic regions. General protective measures, such as bite avoidance, protective clothing, insecticide-treated bed nets, and insecticide-treated clothing, should be recommended, especially in malaria-endemic areas. Spatial repellents may prevent nuisance biting, but have not been shown to prevent against vector-borne disease. PMID:26900115

  18. Considerations for selecting personal protective equipment for hazardous materials decontamination.

    PubMed

    Lehmann, Jeff

    2002-09-01

    PPE is necessary to protect staff and to deliver rapid and efficient care to patients contaminated with HAZMAT chemicals. Planning for HAZMAT cases includes learning about the common chemicals in the area, what resources are available to care for victims, identifying a decontamination area, and providing PPE to protect employees and other patients. A customized service can be used to meet OSHA standards and reduce costs. Ongoing training will be an important part of any HAZMAT program. PMID:12685463

  19. Cognitive, personality, and social factors associated with adolescents' online personal information disclosure.

    PubMed

    Liu, Cong; Ang, Rebecca P; Lwin, May O

    2013-08-01

    The current study aims to understand the factors that influence adolescents' disclosure of personally identifiable information (PII) on social networking sites (SNSs). A survey was conducted among 780 adolescent participants (between 13 and 18) who were Facebook users. Structural equation modeling was used for analyzing the data and obtaining an overarching model that include cognitive, personality, and social factors that influence adolescents' PII disclosure. Results showed privacy concern as the cognitive factor reduces adolescents' PII disclosure and it serves as a potential mediator for personality and social factors. Amongst personality factors, narcissism was found to directly increase PII disclosure, and social anxiety indirectly decreases PII disclosure by increasing privacy concern. Amongst social factors, active parental mediation decreases PII disclosure directly and indirectly by increasing privacy concern. Restrictive parental mediation decreases PII disclosure only indirectly by increasing privacy concern. Implications of the findings to parents, educators, and policy makers were discussed. PMID:23849657

  20. Personality and Information Gathering in Free-Ranging Great Tits

    PubMed Central

    van Overveld, Thijs; Matthysen, Erik

    2013-01-01

    One aspect of animal personality that has been well described in captivity, but received only little attention in studies in the wild, is that personality types may vary in their behavioural flexibility towards environmental changes. A fundamental factor underlying such differences is believed to be the degree to which individual behavior is guided by environmental stimuli. We tested this hypothesis in the wild using free-ranging great tits. Personality variation was quantified using exploratory behaviour in a novel environment, which has previously been shown to be repeatable and correlated with other behaviours in this and other populations of the same species. By temporarily removing food at feeding stations we examined whether birds with different personality differed in returning to visit empty feeders as this may provide information on how birds continue to sample their environment after a sudden change in conditions. In two summer experiments, we found that fast-exploring juveniles visited empty feeders less often compared to slow-exploring juveniles. In winter, sampling behaviour was sex dependent but not related to personality. In both seasons, we found that birds who sampled empty feeders more often were more likely to rediscover food after we again re-baited the feeding stations, but there was no effect of personality. Our results show that personality types may indeed differ in ways of collecting environmental information, which is consistent with the view of personalities as different styles of coping with environmental changes. The adaptive value of these alternative behavioural tactics, however, needs to be further explored. PMID:23383299

  1. Personality and information gathering in free-ranging great tits.

    PubMed

    van Overveld, Thijs; Matthysen, Erik

    2013-01-01

    One aspect of animal personality that has been well described in captivity, but received only little attention in studies in the wild, is that personality types may vary in their behavioural flexibility towards environmental changes. A fundamental factor underlying such differences is believed to be the degree to which individual behavior is guided by environmental stimuli. We tested this hypothesis in the wild using free-ranging great tits. Personality variation was quantified using exploratory behaviour in a novel environment, which has previously been shown to be repeatable and correlated with other behaviours in this and other populations of the same species. By temporarily removing food at feeding stations we examined whether birds with different personality differed in returning to visit empty feeders as this may provide information on how birds continue to sample their environment after a sudden change in conditions. In two summer experiments, we found that fast-exploring juveniles visited empty feeders less often compared to slow-exploring juveniles. In winter, sampling behaviour was sex dependent but not related to personality. In both seasons, we found that birds who sampled empty feeders more often were more likely to rediscover food after we again re-baited the feeding stations, but there was no effect of personality. Our results show that personality types may indeed differ in ways of collecting environmental information, which is consistent with the view of personalities as different styles of coping with environmental changes. The adaptive value of these alternative behavioural tactics, however, needs to be further explored. PMID:23383299

  2. 45 CFR 164.502 - Uses and disclosures of protected health information: general rules.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 45 Public Welfare 1 2010-10-01 2010-10-01 false Uses and disclosures of protected health information: general rules. 164.502 Section 164.502 Public Welfare DEPARTMENT OF HEALTH AND HUMAN SERVICES... or may be subjected to domestic violence, abuse, or neglect by such person; or (B) Treating...

  3. 32 CFR 2400.38 - Protection of foreign government information.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 32 National Defense 6 2011-07-01 2011-07-01 false Protection of foreign government information... SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM Foreign Government Information § 2400.38 Protection of foreign...

  4. 32 CFR 644.394 - Protection of disposal information.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 32 National Defense 4 2010-07-01 2010-07-01 true Protection of disposal information. 644.394... PROPERTY REAL ESTATE HANDBOOK Disposal Predisposal Action § 644.394 Protection of disposal information. To prevent premature disclosure to the public, information on and plans for disposal of all or a portion...

  5. 32 CFR 2400.38 - Protection of foreign government information.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 32 National Defense 6 2010-07-01 2010-07-01 false Protection of foreign government information... SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM Foreign Government Information § 2400.38 Protection of foreign...

  6. Management Guide to the Protection of Information Resources.

    ERIC Educational Resources Information Center

    Helsing, Cheryl; And Others

    This guide introduces information systems security concerns and outlines the issues that must be addressed by all agency managers in meeting their responsibilities to protect information systems within their organizations. It describes the essential components of an effective information resource protection process that applies to an individual…

  7. Exploring Healthcare Consumer Acceptance of Personal Health Information Management Technology through Personal Health Record Systems

    ERIC Educational Resources Information Center

    Wu, Huijuan

    2013-01-01

    Healthcare technologies are evolving from a practitioner-centric model to a patient-centric model due to the increasing need for technology that directly serves healthcare consumers, including healthy people and patients. Personal health information management (PHIM) technology is one of the technologies designed to enhance an individual's ability…

  8. Informed consent in direct-to-consumer personal genome testing: the outline of a model between specific and generic consent.

    PubMed

    Bunnik, Eline M; Janssens, A Cecile J W; Schermer, Maartje H N

    2014-09-01

    Broad genome-wide testing is increasingly finding its way to the public through the online direct-to-consumer marketing of so-called personal genome tests. Personal genome tests estimate genetic susceptibilities to multiple diseases and other phenotypic traits simultaneously. Providers commonly make use of Terms of Service agreements rather than informed consent procedures. However, to protect consumers from the potential physical, psychological and social harms associated with personal genome testing and to promote autonomous decision-making with regard to the testing offer, we argue that current practices of information provision are insufficient and that there is a place--and a need--for informed consent in personal genome testing, also when it is offered commercially. The increasing quantity, complexity and diversity of most testing offers, however, pose challenges for information provision and informed consent. Both specific and generic models for informed consent fail to meet its moral aims when applied to personal genome testing. Consumers should be enabled to know the limitations, risks and implications of personal genome testing and should be given control over the genetic information they do or do not wish to obtain. We present the outline of a new model for informed consent which can meet both the norm of providing sufficient information and the norm of providing understandable information. The model can be used for personal genome testing, but will also be applicable to other, future forms of broad genetic testing or screening in commercial and clinical settings. PMID:23137034

  9. Audit Report on "Protection of the Department of Energy's Unclassified Sensitive Electronic Information"

    SciTech Connect

    2009-08-01

    The Department of Energy and its contractors store and process massive quantities of sensitive information to accomplish national security, energy, science, and environmental missions. Sensitive unclassified data, such as personally identifiable information (PII), official use only, and unclassified controlled nuclear information require special handling and protection to prevent misuse of the information for inappropriate purposes. Industry experts have reported that more than 203 million personal privacy records have been lost or stolen over the past three years, including information maintained by corporations, educational institutions, and Federal agencies. The loss of personal and other sensitive information can result in substantial financial harm, embarrassment, and inconvenience to individuals and organizations. Therefore, strong protective measures, including data encryption, help protect against the unauthorized disclosure of sensitive information. Prior reports involving the loss of sensitive information have highlighted weaknesses in the Department's ability to protect sensitive data. Our report on Security Over Personally Identifiable Information (DOE/IG-0771, July 2007) disclosed that the Department had not fully implemented all measures recommended by the Office of Management and Budget (OMB) and required by the National Institute of Standards and Technology (NIST) to protect PII, including failures to identify and encrypt PII maintained on information systems. Similarly, the Government Accountability Office recently reported that the Department had not yet installed encryption technology to protect sensitive data on the vast majority of laptop computers and handheld devices. Because of the potential for harm, we initiated this audit to determine whether the Department and its contractors adequately safeguarded sensitive electronic information. The Department had taken a number of steps to improve protection of PII. Our review, however, identified

  10. Protective measures, personal experience, and the affective psychology of time.

    PubMed

    Peters, E; Kunreuther, H; Sagara, N; Slovic, P; Schley, D R

    2012-12-01

    We examined the role of time and affect in intentions to purchase a risk-protective measure (Studies 1 and 2) and explored participant abilities to factor time into the likelihood judgments that presumably underlie such intentions (Study 3). Participants worried more about losing their possessions and were more likely to purchase a protective measure given a longer term lease than a short-term lease, but only if their belongings were described in affect-poor terms. If described instead as being particularly special and affect-rich, participants neglected time and were about equally likely to purchase a risk-protective measure for shorter and longer term leases. However, and consistent with prior literature, the cognitive mechanism underlying this time-neglect-with-affect-richness effect seemed to be the greater use of the affect heuristic in the shorter term than the longer term. Study 2 results demonstrated that prior experience with having been burglarized amplified the interactive effect of time and affect. Greater deliberation did not attenuate this effect as hypothesized whether deliberation was measured through numeracy or manipulated through instructions. The results of Study 3 indicated that few participants are able to calculate correctly the risk numbers necessary to take time into account. Two possible solutions to encourage more purchases of protective measures in the long term are discussed. PMID:22548249

  11. 29 CFR 1926.95 - Criteria for personal protective equipment.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... construction for the work to be performed. (d) Payment for protective equipment. (1) Except as provided by... is not required to pay for: (i) Everyday clothing, such as long-sleeve shirts, long pants, street shoes, and normal work boots; or (ii) Ordinary clothing, skin creams, or other items, used solely...

  12. 41 CFR 109-1.5107 - Physical protection of personal property.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 41 Public Contracts and Property Management 3 2010-07-01 2010-07-01 false Physical protection of... Management Regulations System (Continued) DEPARTMENT OF ENERGY PROPERTY MANAGEMENT REGULATIONS GENERAL 1-INTRODUCTION 1.51-Personal Property Management Standards and Practices § 109-1.5107 Physical protection...

  13. 41 CFR 109-1.5107 - Physical protection of personal property.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 41 Public Contracts and Property Management 3 2014-01-01 2014-01-01 false Physical protection of... Management Regulations System (Continued) DEPARTMENT OF ENERGY PROPERTY MANAGEMENT REGULATIONS GENERAL 1-INTRODUCTION 1.51-Personal Property Management Standards and Practices § 109-1.5107 Physical protection...

  14. 41 CFR 109-1.5107 - Physical protection of personal property.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 41 Public Contracts and Property Management 3 2011-01-01 2011-01-01 false Physical protection of... Management Regulations System (Continued) DEPARTMENT OF ENERGY PROPERTY MANAGEMENT REGULATIONS GENERAL 1-INTRODUCTION 1.51-Personal Property Management Standards and Practices § 109-1.5107 Physical protection...

  15. Effectiveness of Personal Protective Equipment for Healthcare Workers Caring for Patients with Filovirus Disease: A Rapid Review

    PubMed Central

    Quach, Pauline; Hamel, Candyce; Thavorn, Kednapa; Garritty, Chantelle; Skidmore, Becky; Vallenas, Constanza; Norris, Susan L.; Egger, Matthias; Eremin, Sergey; Ferri, Mauricio; Shindo, Nahoko; Moher, David

    2015-01-01

    Background A rapid review, guided by a protocol, was conducted to inform development of the World Health Organization’s guideline on personal protective equipment in the context of the ongoing (2013–present) Western African filovirus disease outbreak, with a focus on health care workers directly caring for patients with Ebola or Marburg virus diseases. Methods Electronic databases and grey literature sources were searched. Eligibility criteria initially included comparative studies on Ebola and Marburg virus diseases reported in English or French, but criteria were expanded to studies on other viral hemorrhagic fevers and non-comparative designs due to the paucity of studies. After title and abstract screening (two people to exclude), full-text reports of potentially relevant articles were assessed in duplicate. Fifty-seven percent of extraction information was verified. The Grading of Recommendations Assessment, Development and Evaluation framework was used to inform the quality of evidence assessments. Results Thirty non-comparative studies (8 related to Ebola virus disease) were located, and 27 provided data on viral transmission. Reporting of personal protective equipment components and infection prevention and control protocols was generally poor. Conclusions Insufficient evidence exists to draw conclusions regarding the comparative effectiveness of various types of personal protective equipment. Additional research is urgently needed to determine optimal PPE for health care workers caring for patients with filovirus. PMID:26451847

  16. 45 CFR 164.522 - Rights to request privacy protection for protected health information.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... health information. 164.522 Section 164.522 Public Welfare DEPARTMENT OF HEALTH AND HUMAN SERVICES... Health Information § 164.522 Rights to request privacy protection for protected health information. (a)(1) Standard: Right of an individual to request restriction of uses and disclosures. (i) A covered entity...

  17. 45 CFR 164.522 - Rights to request privacy protection for protected health information.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... health information. 164.522 Section 164.522 Public Welfare DEPARTMENT OF HEALTH AND HUMAN SERVICES... Health Information § 164.522 Rights to request privacy protection for protected health information. (a)(1) Standard: Right of an individual to request restriction of uses and disclosures. (i) A covered entity...

  18. Informed consent for research in Borderline Personality Disorder

    PubMed Central

    Dew, Rachel E

    2007-01-01

    Background Previous research on informed consent for research in psychiatric patients has centered on disorders that affect comprehension and appreciation of risks. Little has been written about consent to research in those subjects with Borderline Personality Disorder, a prevalent and disabling condition. Discussion Despite apparently intact cognition and comprehension of risks, a borderline subject may deliberately choose self-harm in order to fulfill abnormal psychological needs, or due to suicidality. Alternatively, such a subject may refuse enrollment due to transference or the desire to harm him or herself. Such phenomena could be precipitated or prevented by the interpersonal dynamics of the informed consent encounter. Summary Caution should be exercised in obtaining informed consent for research from subjects with Borderline Personality Disorder. A literature review and recommendations for future research are discussed. PMID:17493277

  19. Sharing sensitive personal health information through Facebook: the unintended consequences.

    PubMed

    Househ, Mowafa

    2011-01-01

    The purpose of this paper was to explore the types of sensitive health information posted by individuals through social network media sites such as Facebook. The researcher found several instances in which individuals, who could be identified by their user profiles, posted personal and sensitive health information related to mental and genetic disorders and sexually transmitted diseases. The data suggest that Facebook users should be made aware of the potential harm that may occur when sharing sensitive health information publicly through Facebook. Ethical considerations in undertaking such research are also examined. PMID:21893822

  20. 32 CFR 2400.38 - Protection of foreign government information.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY... information. Classified foreign government information shall be protected as is prescribed by this...

  1. Shared Expectations for Protection of Identifiable Health Care Information

    PubMed Central

    Wynia, Matthew K; Coughlin, Steven S; Alpert, Sheri; Cummins, Deborah S; Emanuel, Linda L

    2001-01-01

    ongoing data quality, limitations on how identifiable information may be used, and provisions for meaningful accountability. CONCLUSIONS This process established consensus on 34 measurable ethical expectations for the protection of privacy and confidentiality in health care. These expectations should apply to any organization with access to personally identifiable health information, including managed care organizations, physician groups, hospitals, other provider organizations, and purchasers. Performance measurement on these expectations may improve accountability across the health care system. PMID:11251761

  2. 45 CFR 673.4 - Environmental protection information.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 45 Public Welfare 3 2011-10-01 2011-10-01 false Environmental protection information. 673.4 Section 673.4 Public Welfare Regulations Relating to Public Welfare (Continued) NATIONAL SCIENCE FOUNDATION ANTARCTIC NON-GOVERNMENTAL EXPEDITIONS § 673.4 Environmental protection information. (a)...

  3. 45 CFR 673.4 - Environmental protection information.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 45 Public Welfare 3 2010-10-01 2010-10-01 false Environmental protection information. 673.4 Section 673.4 Public Welfare Regulations Relating to Public Welfare (Continued) NATIONAL SCIENCE FOUNDATION ANTARCTIC NON-GOVERNMENTAL EXPEDITIONS § 673.4 Environmental protection information. (a)...

  4. 12 CFR 568.5 - Protection of customer information.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 12 Banks and Banking 5 2010-01-01 2010-01-01 false Protection of customer information. 568.5 Section 568.5 Banks and Banking OFFICE OF THRIFT SUPERVISION, DEPARTMENT OF THE TREASURY SECURITY PROCEDURES § 568.5 Protection of customer information. Savings associations and their subsidiaries...

  5. 76 FR 17935 - Protected Critical Infrastructure Information (PCII) Stakeholder Survey

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-03-31

    ... SECURITY Protected Critical Infrastructure Information (PCII) Stakeholder Survey AGENCY: National... the Critical Infrastructure Information Act of 2002, (Sections 211-215, Title II, Subtitle B of the... owners and operators of critical infrastructure and protected systems. The PCII Program is implemented...

  6. 45 CFR 673.4 - Environmental protection information.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 45 Public Welfare 3 2012-10-01 2012-10-01 false Environmental protection information. 673.4 Section 673.4 Public Welfare Regulations Relating to Public Welfare (Continued) NATIONAL SCIENCE FOUNDATION ANTARCTIC NON-GOVERNMENTAL EXPEDITIONS § 673.4 Environmental protection information. (a)...

  7. 45 CFR 673.4 - Environmental protection information.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 45 Public Welfare 3 2013-10-01 2013-10-01 false Environmental protection information. 673.4 Section 673.4 Public Welfare Regulations Relating to Public Welfare (Continued) NATIONAL SCIENCE FOUNDATION ANTARCTIC NON-GOVERNMENTAL EXPEDITIONS § 673.4 Environmental protection information. (a)...

  8. 49 CFR 1522.125 - Protection of information.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... VALIDATION FIRMS AND VALIDATORS TSA-Approved Validation Firms and Validators for the Certified Cargo Screening Program § 1522.125 Protection of information. (a) Sensitive Security Information. Each validation firm must comply with the requirements in 49 CFR part 1520 regarding the handling and protection...

  9. 36 CFR 1202.28 - What rules do NARA employees follow in managing personal information?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ..., 5 CFR 2635.703. ... follow in managing personal information? 1202.28 Section 1202.28 Parks, Forests, and Public Property... Collecting Information § 1202.28 What rules do NARA employees follow in managing personal information?...

  10. 36 CFR 1202.28 - What rules do NARA employees follow in managing personal information?

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ..., 5 CFR 2635.703. ... follow in managing personal information? 1202.28 Section 1202.28 Parks, Forests, and Public Property... Collecting Information § 1202.28 What rules do NARA employees follow in managing personal information?...

  11. 36 CFR 1202.28 - What rules do NARA employees follow in managing personal information?

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ..., 5 CFR 2635.703. ... follow in managing personal information? 1202.28 Section 1202.28 Parks, Forests, and Public Property... Collecting Information § 1202.28 What rules do NARA employees follow in managing personal information?...

  12. 36 CFR 1202.28 - What rules do NARA employees follow in managing personal information?

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ..., 5 CFR 2635.703. ... follow in managing personal information? 1202.28 Section 1202.28 Parks, Forests, and Public Property... Collecting Information § 1202.28 What rules do NARA employees follow in managing personal information?...

  13. 36 CFR 1202.28 - What rules do NARA employees follow in managing personal information?

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ..., 5 CFR 2635.703. ... follow in managing personal information? 1202.28 Section 1202.28 Parks, Forests, and Public Property... Collecting Information § 1202.28 What rules do NARA employees follow in managing personal information?...

  14. Fluorescence-based optical chemical sensors for personal protection

    NASA Astrophysics Data System (ADS)

    Korent Urek, Špela; Lobnik, Aleksandra; Turel, Matejka

    2010-04-01

    The World Health Organization has reported that each year approximately 3 million people are poised by organophosphate substances (pesticides and nerve agents) resulting in 220,000 deaths. Organophosphates (OP) are toxic compounds which cause rapid and severe inhibition of serine proteases, most markedly acetylcholinesterase, which is vital to nerve function. This inhibition is often fatal. OP nerve agents are generally stable, easy to disperse, and highly toxic. They can be absorbed through the skin, by ingestion, or by respiration. A release of a nerve agent has the potential to rapidly affect a large number of people. The ease of manufacturing and dispensability of nerve agents, as well as available, inexpensive starting materials make these agents a weapon of choice for criminal terrorist attacks. One of the major steps toward protection against dangerous substances is to develop sensor devices that can act as an early warning system to the endangered people.

  15. Personal Protective Equipment for Filovirus Epidemics: A Call for Better Evidence

    PubMed Central

    Sprecher, Armand G.; Caluwaerts, An; Draper, Mike; Feldmann, Heinz; Frey, Clifford P.; Funk, Renée H.; Kobinger, Gary; Le Duc, James W.; Spiropoulou, Christina; Williams, Warren Jon

    2015-01-01

    Personal protective equipment (PPE) is an important part of worker protection during filovirus outbreaks. The need to protect against a highly virulent fluid-borne pathogen in the tropical environment imposes a heat stress on the wearer that is itself a safety risk. No evidence supports the choice of PPE employed in recent outbreaks, and standard testing procedures employed by the protective garment industry do not well simulate filovirus exposure. Further research is needed to determine the appropriate PPE for filoviruses and the heat stress that it imposes. PMID:25821225

  16. Informed consent for research participation in frail older persons.

    PubMed

    Barron, Jeremy S; Duffey, Patricia L; Byrd, Linda Jo; Campbell, Robin; Ferrucci, Luigi

    2004-02-01

    Informed consent has been the most scrutinized and controversial aspect of clinical research ethics. Institutional review boards (IRBs), government regulatory agencies, and the threat of litigation have all contributed to increasingly detailed consent documents that hope to ensure that subjects are not misled or coerced. Unfortunately, the growing regulatory burden on researchers has not succeeded in protecting subjects, but has rather made the consent process less effective and has discouraged research on vulnerable populations. As a matter of fact, investigators and ethicists continue to identify failures of the consenting process, particularly concerning participation in research of older individuals. The challenges involved in ensuring appropriate consent from the elderly include physical frailty, reduced autonomy and privacy, and impaired decision-making capacity due to dementia, delirium, or other neuropsychiatric illnesses. Ageism among investigators also contributes to failure of informed consent. The evaluation and continuing re-evaluation of an individual's decision-making capacity is critical but difficult. In the most extreme cases, the older adult's ability to participate in the consent process is clearly impaired. However, in many instances, the decision-making capacity is only partially impaired but declines during the course of a research project. Implementing methods of effective communication may enable many frail elderly individuals to make informed decisions. Special challenges are posed by research on end-of-life care, which typically involves frail, older subjects who are uniquely vulnerable, and research is conducted in institutional settings where subtle violations of autonomy are routine. Clearly, the frail elderly represent a vulnerable population that deserves special attention when developing and evaluating an informed consent process. Two important ethical conflicts should be kept in mind. First, although vulnerable older patients must

  17. 32 CFR 806b.29 - Sending personal information over electronic mail.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... information over electronic mail. (a) Exercise caution before transmitting personal information over e-mail to ensure it is adequately safeguarded. Some information may be so sensitive and personal that e-mail may not be the proper way to transmit it. When sending personal information over e-mail within DoD,...

  18. 32 CFR 806b.29 - Sending personal information over electronic mail.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... information over electronic mail. (a) Exercise caution before transmitting personal information over e-mail to ensure it is adequately safeguarded. Some information may be so sensitive and personal that e-mail may not be the proper way to transmit it. When sending personal information over e-mail within DoD,...

  19. 32 CFR 806b.29 - Sending personal information over electronic mail.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... information over electronic mail. (a) Exercise caution before transmitting personal information over e-mail to ensure it is adequately safeguarded. Some information may be so sensitive and personal that e-mail may not be the proper way to transmit it. When sending personal information over e-mail within DoD,...

  20. Using Usability Evaluation to Inform Alberta's Personal Health Record Design.

    PubMed

    Price, Morgan; Bellwood, Paule; Davies, Iryna

    2015-01-01

    Alberta Health is deploying the Personal Health Portal (PHP) (MyHealth.Alberta.ca) to all people in the province of Alberta, Canada. The PHP will include several components such as a Personal Health Record (PHR) where users can enter and access their own health data. For the first PHR of its kind in Canada, Alberta Health asked the University of Victoria's eHealth Observatory to evaluate the PHP, including the PHR. The evaluation includes pre-design, design, and adoption evaluation. This paper focuses on early usability evaluations of the PHR software. Persona-based usability inspection was combined with usability testing sessions using think aloud. These evaluations found that while people were familiar with the web-based technology, several aspects of the PHR information architecture, content, and presentation could be improved to better support and provide value to the users. The findings could be helpful to others designing and implementing similar PHR software. PMID:25676994

  1. 14 CFR 1203.301 - Identification of information requiring protection.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... INFORMATION SECURITY PROGRAM Classification Principles and Considerations § 1203.301 Identification of information requiring protection. Classifiers shall identify the level of classification of each classified... 14 Aeronautics and Space 5 2010-01-01 2010-01-01 false Identification of information...

  2. What Your Can Do to Protect Your Health Information

    MedlinePlus

    ... don't want made public. Your doctor uses tools to protect and secure your health information at his or her office. You can do the same at home. If you have health information stored on your home computer or mobile device — ... email — simple tools like passwords can help keep your health information ...

  3. 15 CFR 295.9 - Protection of confidential information.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY, DEPARTMENT OF COMMERCE NIST EXTRAMURAL PROGRAMS ADVANCED TECHNOLOGY PROGRAM General § 295.9 Protection of confidential information. As required by section 278n(d)(5... 15 Commerce and Foreign Trade 1 2010-01-01 2010-01-01 false Protection of confidential...

  4. 78 FR 49524 - National Institute for Occupational Safety and Health Personal Protective Technology Program and...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-08-14

    ... conformity assessment. This meeting will include presentations on Product and Standards, Risk Assessment... Conformity Assessment Public Meeting AGENCY: The National Institute for Occupational Safety and Health (NIOSH...: ``Conformity Assessment Meeting on Non-Respiratory Personal Protective Equipment (PPE).'' To view the...

  5. 29 CFR 1977.5 - Persons protected by section 11(c).

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 29 Labor 9 2010-07-01 2010-07-01 false Persons protected by section 11(c). 1977.5 Section 1977.5 Labor Regulations Relating to Labor (Continued) OCCUPATIONAL SAFETY AND HEALTH ADMINISTRATION, DEPARTMENT OF LABOR (CONTINUED) DISCRIMINATION AGAINST EMPLOYEES EXERCISING RIGHTS UNDER THE WILLIAMS-STEIGER OCCUPATIONAL SAFETY AND HEALTH ACT OF...

  6. Risk and Protective Factors Associated with Personal Mastery Among Sexual Minority African American Female Sex Workers

    PubMed Central

    Buttram, Mance E.; Surratt, Hilary L.; Kurtz, Steven P.

    2014-01-01

    Research among sexual minorities has traditionally examined problems such as substance use, HIV risk, mental health problems, and victimization. Among sexual minority street-based female sex workers, these vulnerabilities can be magnified. Grounded in theories of resilience, this study examines risk and protective factors associated with a high level of personal mastery among a vulnerable population of women. Data are drawn from baseline interviews from street-based African American female sex workers enrolled in a randomized intervention trial in Miami, Florida. We compare sexual minority (N=197) and heterosexual (N=365) women on measures of risk and protective factors; among sexual minority women we present logistic regression analyses which reveal that severe mental distress and HIV transmission risk are associated with low levels of personal mastery, while protective factors of transportation access and social support are associated with high levels of personal mastery. These findings suggest that these protective factors may potentially facilitate the development of personal mastery and represent beneficial avenues for intervention efforts. PMID:25530691

  7. 78 FR 9918 - Protections Against Trafficking In Persons In Federal Contracts

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-02-12

    ... on trafficking in persons (``TIP''). Interested parties may offer oral and/or written comments at a... Comments on Protections Against TIP.'' Parties wishing to share written statements at the public meeting... agency is the General Services Administration; the point-of-contact is Deborah Lague at 202.694-8149....

  8. 29 CFR 1977.5 - Persons protected by section 11(c).

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 29 Labor 9 2011-07-01 2011-07-01 false Persons protected by section 11(c). 1977.5 Section 1977.5 Labor Regulations Relating to Labor (Continued) OCCUPATIONAL SAFETY AND HEALTH ADMINISTRATION, DEPARTMENT OF LABOR (CONTINUED) DISCRIMINATION AGAINST EMPLOYEES EXERCISING RIGHTS UNDER THE...

  9. Use of remote video auditing to validate Ebola level II personal protective equipment competency.

    PubMed

    Allar, Peter J; Frank-Cooper, Madalyn

    2015-06-01

    Faced with an Ebola-related mandate to regularly train frontline hospital staff with the donning and doffing of personal protective equipment, a community hospital's emergency department implemented remote video auditing (RVA) to assist in the training and remediation of its nursing staff. RVA was found to be useful in assessing performance and facilitating remediation. PMID:26057158

  10. 41 CFR 109-1.5107 - Physical protection of personal property.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 41 Public Contracts and Property Management 3 2013-07-01 2013-07-01 false Physical protection of personal property. 109-1.5107 Section 109-1.5107 Public Contracts and Property Management Federal Property Management Regulations System (Continued) DEPARTMENT OF ENERGY PROPERTY MANAGEMENT REGULATIONS GENERAL...

  11. 41 CFR 109-1.5107 - Physical protection of personal property.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 41 Public Contracts and Property Management 3 2012-01-01 2012-01-01 false Physical protection of personal property. 109-1.5107 Section 109-1.5107 Public Contracts and Property Management Federal Property Management Regulations System (Continued) DEPARTMENT OF ENERGY PROPERTY MANAGEMENT REGULATIONS GENERAL...

  12. 48 CFR 603.104-4 - Disclosure, protection, and marking of contractor bid or proposal information and source...

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 48 Federal Acquisition Regulations System 4 2010-10-01 2010-10-01 false Disclosure, protection, and marking of contractor bid or proposal information and source selection information. 603.104-4 Section 603.104-4 Federal Acquisition Regulations System DEPARTMENT OF STATE GENERAL IMPROPER BUSINESS PRACTICES AND PERSONAL CONFLICTS OF...

  13. 10 CFR 71.11 - Protection of Safeguards Information.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... applicant for a Certificate of Compliance for a transportation package for transport of irradiated reactor... public health and safety or the common defense and security, shall protect Safeguards Information against... Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) PACKAGING AND TRANSPORTATION OF RADIOACTIVE...

  14. 76 FR 42676 - Information Collection; Federal Excess Personal Property (FEPP) Inventory

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-07-19

    ... Forest Service Information Collection; Federal Excess Personal Property (FEPP) Inventory AGENCY: Forest... Personal Property (FEPP) Inventory. DATES: Comments must be received in writing on or before September 19..., every day of the year, including holidays. SUPPLEMENTARY INFORMATION: Title: Federal Excess...

  15. 77 FR 25499 - Notice of Proposed Information Collection: Comment Request; Personal Financial and Credit Statement

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-04-30

    ... also lists the following information: Title of Proposal: Personal Financial and Credit Statement. OMB... URBAN DEVELOPMENT Notice of Proposed Information Collection: Comment Request; Personal Financial and Credit Statement AGENCY: Office of the Assistant Secretary for Housing, HUD. ACTION: Notice. SUMMARY:...

  16. [Two cases of personal identification from dental information].

    PubMed

    Yamaguchi, T; Yamada, Y; Ohtani, S; Kogure, T; Nagao, M; Takatori, T; Ohira, H; Yamamoto, I; Watanabe, A

    1997-08-01

    We describe two cases in which unknown bodies were positively identified from dental information and biochemical examination using tooth materials. In one case, a charred body was positively identified with little effort by comparison of antemortem dental records (dental chart and dental X-ray film) with postmortem data. In the other case, although the unknown individual had dental treatment, the police were unable to obtain the antemortem dental records of the victim. We then conducted biochemical analysis of teeth, facilitating personal identification using DNA analysis and age estimation based on aspartic acid racemization. The mutation obtained from the sequence of mtDNA and the genotypes of HLADQ alpha, HPRTB and ABO blood groups including the data for estimated age supported the kinship between the unknown individual and his mother. The data for maternally inherited mtDNA were of great importance in this case, since it was possible to obtain DNA from the mother. Dental identification in one of the most accurate methods of personal identification if suitable antemortem records are available. In the absence of such records, biochemical analysis of teeth also makes it possible to increase the probability of correct personal identification. PMID:9366140

  17. Personalized disclosure by information-on-demand: attending to patients' needs in the informed consent process.

    PubMed

    Siegal, Gil; Bonnie, Richard J; Appelbaum, Paul S

    2012-01-01

    Obtaining informed consent has typically become a stylized ritual of presenting and signing a form, in which physicians are acting defensively and patients lack control over the content and flow of information. This leaves patients at risk both for being under-informed relative to their decisional needs and of receiving more information than they need or desire. By personalizing the process of seeking and receiving information and allowing patients to specify their desire for information in a prospective manner, we aim to shift genuine control over the informational process to patients. A new paradigm of Information on Demand, such as we suggest, would also enhance legal certainty, achieve greater congruence between the information patients want and the information they receive, and promote more meaningful patient-physician interactions, a desirable outcome that has been difficult to achieve by other means. PMID:22789051

  18. 29 CFR 2400.4 - Collection and disclosure of personal information.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 29 Labor 9 2010-07-01 2010-07-01 false Collection and disclosure of personal information. 2400.4... COMMISSION REGULATIONS IMPLEMENTING THE PRIVACY ACT § 2400.4 Collection and disclosure of personal information. (a) The following rules govern the collection of personal information throughout OSHRC...

  19. Personal Protective Equipment for Infectious Disease Preparedness: A Human Factors Evaluation.

    PubMed

    Herlihey, Tracey A; Gelmi, Stefano; Flewwelling, Christopher J; Hall, Trevor N T; Bañez, Carleene; Morita, Plinio P; Beverley, Paul; Cafazzo, Joseph A; Hota, Susy

    2016-09-01

    OBJECTIVE To identify issues during donning and doffing of personal protective equipment (PPE) for infectious diseases and to inform PPE procurement criteria and design. DESIGN A mixed methods approach was used. Usability testing assessed the appropriateness, potential for errors, and ease of use of various combinations of PPE. A qualitative constructivist approach was used to analyze participant feedback. SETTING Four academic health sciences centers: 2 adult hospitals, 1 trauma center, and 1 pediatric hospital, in Toronto, Canada. PARTICIPANTS Participants (n=82) were representative of the potential users of PPE within Western healthcare institutions. RESULTS None of the tested combinations provided a complete solution for PPE. Environmental factors, such as anteroom layout, and the design of protocols and instructional material were also found to impact safety. The study identified the need to design PPE as a complete system, rather than mixing and matching components. CONCLUSIONS Healthcare institutions are encouraged to use human factors methods to identify risk and failure points with the usage of their selected PPE, and to modify on the basis of iterative evaluations with representative end users. Manufacturers of PPE should consider usability when designing the next generation of PPE. Infect Control Hosp Epidemiol 2016;37:1022-1028. PMID:27291787

  20. An Evaluation of Personal Health Information Remnants in Second-Hand Personal Computer Disk Drives

    PubMed Central

    Neri, Emilio; Jonker, Elizabeth

    2007-01-01

    Background The public is concerned about the privacy of their health information, especially as more of it is collected, stored, and exchanged electronically. But we do not know the extent of leakage of personal health information (PHI) from data custodians. One form of data leakage is through computer equipment that is sold, donated, lost, or stolen from health care facilities or individuals who work at these facilities. Previous studies have shown that it is possible to get sensitive personal information (PI) from second-hand disk drives. However, there have been no studies investigating the leakage of PHI in this way. Objectives The aim of the study was to determine the extent to which PHI can be obtained from second-hand computer disk drives. Methods A list of Canadian vendors selling second-hand computer equipment was constructed, and we systematically went through the shuffled list and attempted to purchase used disk drives from the vendors. Sixty functional disk drives were purchased and analyzed for data remnants containing PHI using computer forensic tools. Results It was possible to recover PI from 65% (95% CI: 52%-76%) of the drives. In total, 10% (95% CI: 5%-20%) had PHI on people other than the owner(s) of the drive, and 8% (95% CI: 7%-24%) had PHI on the owner(s) of the drive. Some of the PHI included very sensitive mental health information on a large number of people. Conclusions There is a strong need for health care data custodians to either encrypt all computers that can hold PHI on their clients or patients, including those used by employees and subcontractors in their homes, or to ensure that their computers are destroyed rather than finding a second life in the used computer market. PMID:17942386

  1. 45 CFR 164.526 - Amendment of protected health information.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 45 Public Welfare 1 2013-10-01 2013-10-01 false Amendment of protected health information. 164.526 Section 164.526 Public Welfare DEPARTMENT OF HEALTH AND HUMAN SERVICES ADMINISTRATIVE DATA STANDARDS AND RELATED REQUIREMENTS SECURITY AND PRIVACY Privacy of Individually Identifiable Health Information §...

  2. Theft of information in the take-grant protection model

    NASA Technical Reports Server (NTRS)

    Bishop, Matt

    1989-01-01

    Using the information transfer extensions to the Take-Grant Protection Model, the concept of theft of information is defined and necessary and sufficient conditions for such theft to occur are presented, as well as bounds on the number of actors involved in such theft. Finally, the application of these results to reference monitors are explored.

  3. 14 CFR 1203.301 - Identification of information requiring protection.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 14 Aeronautics and Space 5 2012-01-01 2012-01-01 false Identification of information requiring protection. 1203.301 Section 1203.301 Aeronautics and Space NATIONAL AERONAUTICS AND SPACE ADMINISTRATION INFORMATION SECURITY PROGRAM Classification Principles and Considerations § 1203.301 Identification...

  4. 14 CFR 1203.301 - Identification of information requiring protection.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 14 Aeronautics and Space 5 2011-01-01 2010-01-01 true Identification of information requiring protection. 1203.301 Section 1203.301 Aeronautics and Space NATIONAL AERONAUTICS AND SPACE ADMINISTRATION INFORMATION SECURITY PROGRAM Classification Principles and Considerations § 1203.301 Identification...

  5. 14 CFR 1203.301 - Identification of information requiring protection.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 14 Aeronautics and Space 5 2013-01-01 2013-01-01 false Identification of information requiring protection. 1203.301 Section 1203.301 Aeronautics and Space NATIONAL AERONAUTICS AND SPACE ADMINISTRATION INFORMATION SECURITY PROGRAM Classification Principles and Considerations § 1203.301 Identification...

  6. Drunk Personality: Reports from Drinkers and Knowledgeable Informants

    PubMed Central

    Winograd, Rachel P.; Steinley, Douglas; Sher, Kenneth J.

    2014-01-01

    Objective Existing literature supports the Five-Factor Model (FFM) of personality (i.e., Extraversion, Agreeableness, Conscientiousness, Emotional Stability, and Intellect or Openness) as a comprehensive representation of stable aspects of mood, affect, and behavior. This study evaluated the FFM as a framework for both self-perceptions of drunkenness (i.e. individual changes in mood, affect, and behavior associated with one’s own intoxication), as well “drinking buddies’” perceptions of their friends’ drunkenness (i.e., changes in mood, affect, and behavior associated with a friend’s intoxication) and the association of reported sober-to-drunk differences with negative alcohol-related consequences. Method College-student drinkers (N = 374 [187 “drinking buddy” pairs]) reported on their sober and drunk levels of the five factors, as well as those of their drinking buddy. Buddies completed parallel assessments for themselves and their friend in order for rater agreement to be determined. All participants completed assessments of harmful alcohol outcomes experienced within the past year. Results Regardless of reporter, differences between drunken and sober states were found across all five factors and agreement between self and informant reports was consistently significant and comparable across sober and drunk conditions. Low levels of drunk Conscientiousness and drunk Emotional Stability were associated with experiencing more alcohol-related consequences, even when controlling for sober factor levels and binge drinking frequency. Conclusions Findings support the use of the FFM as a clinically relevant framework for organizing differences in personality expression associated with intoxication and the validity of self-reports of drunk personality. PMID:24796850

  7. Personalized Information Environments: Do Public Libraries Want a Slice of the PIE?

    ERIC Educational Resources Information Center

    Worcester, Lea

    2003-01-01

    Discussion of personalized information environments (PIEs) focuses on library personalized interfaces. Describes academic library PIEs and commercial sites, such as Amazon.com that use personalization; explores the Public Library of Charlotte and Mecklenburg's personalized interface; and discusses opportunities and challenges PIEs offer public…

  8. Seamless personal health information system in cloud computing.

    PubMed

    Chung, Wan-Young; Fong, Ee May

    2014-01-01

    Noncontact ECG measurement has gained popularity these days due to its noninvasive and conveniences to be applied on daily life. This approach does not require any direct contact between patient's skin and sensor for physiological signal measurement. The noncontact ECG measurement is integrated with mobile healthcare system for health status monitoring. Mobile phone acts as the personal health information system displaying health status and body mass index (BMI) tracking. Besides that, it plays an important role being the medical guidance providing medical knowledge database including symptom checker and health fitness guidance. At the same time, the system also features some unique medical functions that cater to the living demand of the patients or users, including regular medication reminders, alert alarm, medical guidance, appointment scheduling. Lastly, we demonstrate mobile healthcare system with web application for extended uses, thus health data are clouded into web server system and web database storage. This allows remote health status monitoring easily and so forth it promotes a cost effective personal healthcare system. PMID:25570784

  9. Person perception informs understanding of cognition during visual search.

    PubMed

    Brennan, Allison A; Watson, Marcus R; Kingstone, Alan; Enns, James T

    2011-08-01

    Does person perception--the impressions we form from watching others--hold clues to the mental states of people engaged in cognitive tasks? We investigated this with a two-phase method: In Phase 1, participants searched on a computer screen (Experiment 1) or in an office (Experiment 2); in Phase 2, other participants rated the searchers' video-recorded behavior. The results showed that blind raters are sensitive to individual differences in search proficiency and search strategy, as well as to environmental factors affecting search difficulty. Also, different behaviors were linked to search success in each setting: Eye movement frequency predicted successful search on a computer screen; head movement frequency predicted search success in an office. In both settings, an active search strategy and positive emotional expressions were linked to search success. These data indicate that person perception informs cognition beyond the scope of performance measures, offering the potential for new measurements of cognition that are both rich and unobtrusive. PMID:21626239

  10. Open consent, biobanking and data protection law: can open consent be 'informed' under the forthcoming data protection regulation?

    PubMed

    Hallinan, Dara; Friedewald, Michael

    2015-01-01

    This article focuses on whether a certain form of consent used by biobanks--open consent--is compatible with the Proposed Data Protection Regulation. In an open consent procedure, the biobank requests consent once from the data subject for all future research uses of genetic material and data. However, as biobanks process personal data, they must comply with data protection law. Data protection law is currently undergoing reform. The Proposed Data Protection Regulation is the culmination of this reform and, if voted into law, will constitute a new legal framework for biobanking. The Regulation puts strict conditions on consent--in particular relating to information which must be given to the data subject. It seems clear that open consent cannot meet these requirements. 4 categories of information cannot be provided with adequate specificity: purpose, recipient, possible third country transfers, data collected. However, whilst open consent cannot meet the formal requirements laid out by the Regulation, this is not to say that these requirements are substantially undebateable. Two arguments could be put forward suggesting the applicable consent requirements should be rethought. First, from policy documents regarding the drafting process, it seems that the informational requirements in the Regulation are so strict in order to protect the data subject from risks inherent in the use of the consent mechanism in a certain context--exemplified by the online context. There are substantial differences between this context and the biobanking context. Arguably, a consent transaction in the biobanking does not present the same type of risk to the data subject. If the risks are different, then perhaps there are also grounds for a reconsideration of consent requirements? Second, an argument can be made that the legislator drafted the Regulation based on certain assumptions as to the nature of 'data'. The authors argue that these assumptions are difficult to apply to genetic data

  11. The need for empirically derived permeation data for personal protective equipment: the death of Dr. Karen E. Wetterhahn.

    PubMed

    Blayney, M B

    2001-02-01

    Personal protective equipment (PPE) is an essential component in any occupational health and safety program. The appropriate selection and use of PPE can help prevent or limit exposure to hazardous materials. The inappropriate selection or use of PPE can lead to unnecessary exposure or --with extremely hazardous materials--serious harm including death. In 1997, Dr. Karen E. Wetterhahn died from mercury poisoning resulting from a single exposure to dimethylmercury almost a year before. Her death raised numerous questions as to how this tragedy occurred and what could be done to protect against a chemical as dangerous as dimethylmercury. This article provides a brief review of the case and discusses the glove permeation testing done during the course of the accident investigation. Using this case as an example, the author argues that all recommendations for PPE be based on empirical testing using accepted methods and that this information be readily available. PMID:11217716

  12. Review of Extracting Information From the Social Web for Health Personalization

    PubMed Central

    Karlsen, Randi; Bonander, Jason

    2011-01-01

    In recent years the Web has come into its own as a social platform where health consumers are actively creating and consuming Web content. Moreover, as the Web matures, consumers are gaining access to personalized applications adapted to their health needs and interests. The creation of personalized Web applications relies on extracted information about the users and the content to personalize. The Social Web itself provides many sources of information that can be used to extract information for personalization apart from traditional Web forms and questionnaires. This paper provides a review of different approaches for extracting information from the Social Web for health personalization. We reviewed research literature across different fields addressing the disclosure of health information in the Social Web, techniques to extract that information, and examples of personalized health applications. In addition, the paper includes a discussion of technical and socioethical challenges related to the extraction of information for health personalization. PMID:21278049

  13. Review of extracting information from the Social Web for health personalization.

    PubMed

    Fernandez-Luque, Luis; Karlsen, Randi; Bonander, Jason

    2011-01-01

    In recent years the Web has come into its own as a social platform where health consumers are actively creating and consuming Web content. Moreover, as the Web matures, consumers are gaining access to personalized applications adapted to their health needs and interests. The creation of personalized Web applications relies on extracted information about the users and the content to personalize. The Social Web itself provides many sources of information that can be used to extract information for personalization apart from traditional Web forms and questionnaires. This paper provides a review of different approaches for extracting information from the Social Web for health personalization. We reviewed research literature across different fields addressing the disclosure of health information in the Social Web, techniques to extract that information, and examples of personalized health applications. In addition, the paper includes a discussion of technical and socioethical challenges related to the extraction of information for health personalization. PMID:21278049

  14. Attenuation of X and Gamma Rays in Personal Radiation Shielding Protective Clothing.

    PubMed

    Kozlovska, Michaela; Cerny, Radek; Otahal, Petr

    2015-11-01

    A collection of personal radiation shielding protective clothing, suitable for use in case of accidents in nuclear facilities or radiological emergency situations involving radioactive agents, was gathered and tested at the Nuclear Protection Department of the National Institute for Nuclear, Chemical and Biological Protection, Czech Republic. Attenuating qualities of shielding layers in individual protective clothing were tested via spectra measurement of x and gamma rays, penetrating them. The rays originated from different radionuclide point sources, the gamma ray energies of which cover a broad energy range. The spectra were measured by handheld spectrometers, both scintillation and High Purity Germanium. Different narrow beam geometries were adjusted using a special testing bench and a set of various collimators. The main experimentally determined quantity for individual samples of personal radiation shielding protective clothing was x and gamma rays attenuation for significant energies of the spectra. The attenuation was assessed comparing net peak areas (after background subtraction) in spectra, where a tested sample was placed between the source and the detector, and corresponding net peak areas in spectra, measured without the sample. Mass attenuation coefficients, which describe attenuating qualities of shielding layers materials in individual samples, together with corresponding lead equivalents, were determined as well. Experimentally assessed mass attenuation coefficients of the samples were compared to the referred ones for individual heavy metals. PMID:26425983

  15. 45 CFR 164.522 - Rights to request privacy protection for protected health information.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... communications of protected health information from the covered health care provider by alternative means or at alternative locations. (ii) A health plan must permit individuals to request and must accommodate reasonable... health information. 164.522 Section 164.522 Public Welfare DEPARTMENT OF HEALTH AND HUMAN...

  16. 75 FR 69369 - Walking-Working Surfaces and Personal Protective Equipment (Fall Protection Systems)

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-11-12

    ..., subparts D and I), published on May 24, 2010 (73 FR 28862). DATES: Informal public hearings: OSHA will hold... Equipment standard (73 FR 28862). OSHA invited written comments and requests for hearings on the proposed...), Secretary of Labor's Order 4- 2010 (75 FR 55355), and 29 CFR part 1911. ] Signed at Washington, DC,...

  17. Heat strain imposed by personal protective ensembles: quantitative analysis using a thermoregulation model

    NASA Astrophysics Data System (ADS)

    Xu, Xiaojiang; Gonzalez, Julio A.; Santee, William R.; Blanchard, Laurie A.; Hoyt, Reed W.

    2016-07-01

    The objective of this paper is to study the effects of personal protective equipment (PPE) and specific PPE layers, defined as thermal/evaporative resistances and the mass, on heat strain during physical activity. A stepwise thermal manikin testing and modeling approach was used to analyze a PPE ensemble with four layers: uniform, ballistic protection, chemical protective clothing, and mask and gloves. The PPE was tested on a thermal manikin, starting with the uniform, then adding an additional layer in each step. Wearing PPE increases the metabolic rates (dot{M}) , thus dot{M} were adjusted according to the mass of each of four configurations. A human thermoregulatory model was used to predict endurance time for each configuration at fixed dot{M} and at its mass adjusted dot{M} . Reductions in endurance time due to resistances, and due to mass, were separately determined using predicted results. Fractional contributions of PPE's thermal/evaporative resistances by layer show that the ballistic protection and the chemical protective clothing layers contribute about 20 %, respectively. Wearing the ballistic protection over the uniform reduced endurance time from 146 to 75 min, with 31 min of the decrement due to the additional resistances of the ballistic protection, and 40 min due to increased dot{M} associated with the additional mass. Effects of mass on heat strain are of a similar magnitude relative to effects of increased resistances. Reducing resistances and mass can both significantly alleviate heat strain.

  18. Heat strain imposed by personal protective ensembles: quantitative analysis using a thermoregulation model.

    PubMed

    Xu, Xiaojiang; Gonzalez, Julio A; Santee, William R; Blanchard, Laurie A; Hoyt, Reed W

    2016-07-01

    The objective of this paper is to study the effects of personal protective equipment (PPE) and specific PPE layers, defined as thermal/evaporative resistances and the mass, on heat strain during physical activity. A stepwise thermal manikin testing and modeling approach was used to analyze a PPE ensemble with four layers: uniform, ballistic protection, chemical protective clothing, and mask and gloves. The PPE was tested on a thermal manikin, starting with the uniform, then adding an additional layer in each step. Wearing PPE increases the metabolic rates [Formula: see text], thus [Formula: see text] were adjusted according to the mass of each of four configurations. A human thermoregulatory model was used to predict endurance time for each configuration at fixed [Formula: see text] and at its mass adjusted [Formula: see text]. Reductions in endurance time due to resistances, and due to mass, were separately determined using predicted results. Fractional contributions of PPE's thermal/evaporative resistances by layer show that the ballistic protection and the chemical protective clothing layers contribute about 20 %, respectively. Wearing the ballistic protection over the uniform reduced endurance time from 146 to 75 min, with 31 min of the decrement due to the additional resistances of the ballistic protection, and 40 min due to increased [Formula: see text] associated with the additional mass. Effects of mass on heat strain are of a similar magnitude relative to effects of increased resistances. Reducing resistances and mass can both significantly alleviate heat strain. PMID:26638214

  19. Heat strain imposed by personal protective ensembles: quantitative analysis using a thermoregulation model

    NASA Astrophysics Data System (ADS)

    Xu, Xiaojiang; Gonzalez, Julio A.; Santee, William R.; Blanchard, Laurie A.; Hoyt, Reed W.

    2015-12-01

    The objective of this paper is to study the effects of personal protective equipment (PPE) and specific PPE layers, defined as thermal/evaporative resistances and the mass, on heat strain during physical activity. A stepwise thermal manikin testing and modeling approach was used to analyze a PPE ensemble with four layers: uniform, ballistic protection, chemical protective clothing, and mask and gloves. The PPE was tested on a thermal manikin, starting with the uniform, then adding an additional layer in each step. Wearing PPE increases the metabolic rates (dot{M}) , thus dot{M} were adjusted according to the mass of each of four configurations. A human thermoregulatory model was used to predict endurance time for each configuration at fixed dot{M} and at its mass adjusted dot{M} . Reductions in endurance time due to resistances, and due to mass, were separately determined using predicted results. Fractional contributions of PPE's thermal/evaporative resistances by layer show that the ballistic protection and the chemical protective clothing layers contribute about 20 %, respectively. Wearing the ballistic protection over the uniform reduced endurance time from 146 to 75 min, with 31 min of the decrement due to the additional resistances of the ballistic protection, and 40 min due to increased dot{M} associated with the additional mass. Effects of mass on heat strain are of a similar magnitude relative to effects of increased resistances. Reducing resistances and mass can both significantly alleviate heat strain.

  20. The role of privacy protection in healthcare information systems adoption.

    PubMed

    Hsu, Chien-Lung; Lee, Ming-Ren; Su, Chien-Hui

    2013-10-01

    Privacy protection is an important issue and challenge in healthcare information systems (HISs). Recently, some privacy-enhanced HISs are proposed. Users' privacy perception, intention, and attitude might affect the adoption of such systems. This paper aims to propose a privacy-enhanced HIS framework and investigate the role of privacy protection in HISs adoption. In the proposed framework, privacy protection, access control, and secure transmission modules are designed to enhance the privacy protection of a HIS. An experimental privacy-enhanced HIS is also implemented. Furthermore, we proposed a research model extending the unified theory of acceptance and use of technology by considering perceived security and information security literacy and then investigate user adoption of a privacy-enhanced HIS. The experimental results and analyses showed that user adoption of a privacy-enhanced HIS is directly affected by social influence, performance expectancy, facilitating conditions, and perceived security. Perceived security has a mediating effect between information security literacy and user adoption. This study proposes several implications for research and practice to improve designing, development, and promotion of a good healthcare information system with privacy protection. PMID:24014266

  1. 32 CFR 806b.34 - Protecting records.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... contact with information in identifiable form. Protect information according to its sensitivity level. Consider the personal sensitivity of the information and the risk of disclosure, loss or alteration....

  2. 32 CFR 806b.34 - Protecting records.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... contact with information in identifiable form. Protect information according to its sensitivity level. Consider the personal sensitivity of the information and the risk of disclosure, loss or alteration....

  3. 32 CFR 806b.34 - Protecting records.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... contact with information in identifiable form. Protect information according to its sensitivity level. Consider the personal sensitivity of the information and the risk of disclosure, loss or alteration....

  4. 32 CFR 806b.34 - Protecting records.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... contact with information in identifiable form. Protect information according to its sensitivity level. Consider the personal sensitivity of the information and the risk of disclosure, loss or alteration....

  5. 32 CFR 806b.34 - Protecting records.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... contact with information in identifiable form. Protect information according to its sensitivity level. Consider the personal sensitivity of the information and the risk of disclosure, loss or alteration....

  6. "Insensitive" to touch: fabric-supported lubricant-swollen polymeric films for omniphobic personal protective gear.

    PubMed

    Damle, Viraj G; Tummala, Abhishiktha; Chandrashekar, Sriram; Kido, Cassidee; Roopesh, Ajay; Sun, Xiaoda; Doudrick, Kyle; Chinn, Jeff; Lee, James R; Burgin, Timothy P; Rykaczewski, Konrad

    2015-02-25

    The use of personal protective gear made from omniphobic materials that easily shed drops of all sizes could provide enhanced protection from direct exposure to most liquid-phase biological and chemical hazards and facilitate the postexposure decontamination of the gear. In recent literature, lubricated nanostructured fabrics are seen as attractive candidates for personal protective gear due to their omniphobic and self-healing characteristics. However, the ability of these lubricated fabrics to shed low surface tension liquids after physical contact with other objects in the surrounding, which is critical in demanding healthcare and military field operations, has not been investigated. In this work, we investigate the depletion of oil from lubricated fabrics in contact with highly absorbing porous media and the resulting changes in the wetting characteristics of the fabrics by representative low and high surface tension liquids. In particular, we quantify the loss of the lubricant and the dynamic contact angles of water and ethanol on lubricated fabrics upon repeated pressurized contact with highly absorbent cellulose-fiber wipes at different time intervals. We demonstrate that, in contrast to hydrophobic nanoparticle coated microfibers, fabrics encapsulated within a polymer that swells with the lubricant retain the majority of the oil and are capable of repelling high as well as low surface tension liquids even upon multiple contacts with the highly absorbing wipes. The fabric supported lubricant-swollen polymeric films introduced here, therefore, could provide durable and easy to decontaminate protection against hazardous biological and chemical liquids. PMID:25633081

  7. Health care facilities' "war on terrorism": a deliberate process for recommending personal protective equipment.

    PubMed

    Koenig, Kristi L; Boatright, Connie J; Hancock, John A; Denny, Frank J; Teeter, David S; Kahn, Christopher A; Schultz, Carl H

    2007-02-01

    The protection of health care facility (HCF) staff from the effects of weapons of mass destruction has gained heightened attention since the 9-11 terrorist attacks. One critical component of protection is personal protective equipment (PPE). No universal standard exists for an "essential" level of PPE for HCF staff. The absence of such a standard raises the need for development of national policy for PPE levels, particularly in HCFs. We describe a process used by the Veterans Health Administration for recommending policy for "essential" PPE levels. Although the recommendations are specific for Veterans Health Administration, the process, findings, and applications may be useful to other institutions as they attempt to resolve this critical issue. This descriptive account will serve to generate practical scientific debate in the academic community and lead to definitive public policy recommendations for the Nation's HCFs in executing their roles in the event of a terrorist attack. PMID:17276809

  8. A guide to the selection of personal protective equipment for use in responding to a release of chemical warfare agents

    SciTech Connect

    Foust, C.B.

    1997-10-01

    Recognition by the US Army that a potential threat to the public from continued storage was potentially as great a threat as from transportation and the final demilitarization of chemical agents gave rise to the Chemical Stockpile Emergency Preparedness Program (CSEPP). CSEPP is a civilian community emergency preparedness program complementing the Department of Defense`s initiative to destroy domestic stockpiles of aged chemical warface munitions. An incident involving chemical warfare agents requires a unique hazardous materials (HAZMAT) response. As with any HAZMAT event, federal regulations prescribe that responders must be protected from exposure to the chemical agents. But unlike other HAZMAT events, special considerations govern the selection of personal protective equipment (PPE). PPE includes all clothing, respirators and detection equipment used to respond to a chemical release. PPE can differ depending on whether responders are military or civilian personnel. FEMA requested that ORNL create training materials for CSEPP participants. These training materials were to provide information on a variety of topics and answer questions that a typical CSEPP participant might ask, including the following: how did the Army select the CSEPP recommended ensemble (i.e., protective clothing, respiratory equipment, and detection equipment); how does the CSEPP participant know this ensemble is the right PPE for chemical warfare agents and will actually protect him; what are the concept of operations and work rules? Does one need to know what the CSEPP concept of operations and work rules include? This report describes the training document ORNL created.

  9. Preferred Sources of Health Information in Persons With Multiple Sclerosis: Degree of Trust and Information Sought

    PubMed Central

    Salter, Amber R; Tyry, Tuula; Fox, Robert J; Cutter, Gary R

    2013-01-01

    Background Effective health communication is important for informed decision-making, yet little is known about the range of information sources used by persons with multiple sclerosis (MS), the perceived trust in those information sources, or how this might vary according to patient characteristics. Objective We aimed to investigate the sources of health information used by persons with MS, their preferences for the source of health information, and levels of trust in those information sources. We also aimed to evaluate how these findings varied according to participant characteristics. Methods In 2011, participants in the North American Research Committee on Multiple Sclerosis (NARCOMS) Registry were asked about their sources of health information using selected questions adapted from the 2007 Health Information National Trends (HINTS) survey. Results Of 12,974 eligible participants, 66.18% (8586/12,974) completed the questionnaire. Mass media sources, rather than interpersonal information sources, were the first sources used by 83.22% (5953/7153) of participants for general health topics and by 68.31% (5026/7357) of participants for MS concerns. Specifically, the Internet was the first source of health information for general health issues (5332/7267, 73.40%) and MS (4369/7376, 59.23%). In a logistic regression model, younger age, less disability, and higher annual income were independently associated with increased odds of use of mass media rather than interpersonal sources of information first. The most trusted information source was a physician, with 97.94% (8318/8493) reporting that they trusted a physician some or a lot. Information sought included treatment for MS (4470/5663, 78.93%), general information about MS (3378/5405, 62.50%), paying for medical care (1096/4282, 25.59%), where to get medical care (787/4282, 18.38%), and supports for coping with MS (2775/5031, 55.16%). Nearly 40% (2998/7521) of participants had concerns about the quality of the

  10. Balancing Good Intentions: Protecting the Privacy of Electronic Health Information

    ERIC Educational Resources Information Center

    McClanahan, Kitty

    2008-01-01

    Electronic information is a vital but complex component in the modern health care system, fueling ongoing efforts to develop a universal electronic health record infrastructure. This innovation creates a substantial tension between two desirable values: the increased quality and utility of patient medical records and the protection of the privacy…

  11. Executive Guide to the Protection of Information Resources.

    ERIC Educational Resources Information Center

    Helsing, Cheryl; And Others

    The purpose of this guide is to help the policy maker address a series of questions regarding the protection and safety of computer systems and data processed within his/her agency. It introduces information systems security concerns, outlines the management issues that must be addressed by agency policies and programs, and describes the essential…

  12. 31 CFR 501.733 - Evidence: confidential information, protective orders.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 31 Money and Finance:Treasury 3 2011-07-01 2011-07-01 false Evidence: confidential information, protective orders. 501.733 Section 501.733 Money and Finance: Treasury Regulations Relating to Money and Finance (Continued) OFFICE OF FOREIGN ASSETS CONTROL, DEPARTMENT OF THE TREASURY REPORTING, PROCEDURES...

  13. 31 CFR 501.733 - Evidence: confidential information, protective orders.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 31 Money and Finance:Treasury 3 2013-07-01 2013-07-01 false Evidence: confidential information, protective orders. 501.733 Section 501.733 Money and Finance: Treasury Regulations Relating to Money and Finance (Continued) OFFICE OF FOREIGN ASSETS CONTROL, DEPARTMENT OF THE TREASURY REPORTING, PROCEDURES...

  14. 31 CFR 501.733 - Evidence: confidential information, protective orders.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 31 Money and Finance: Treasury 3 2010-07-01 2010-07-01 false Evidence: confidential information, protective orders. 501.733 Section 501.733 Money and Finance: Treasury Regulations Relating to Money and Finance (Continued) OFFICE OF FOREIGN ASSETS CONTROL, DEPARTMENT OF THE TREASURY REPORTING, PROCEDURES...

  15. 31 CFR 501.733 - Evidence: confidential information, protective orders.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 31 Money and Finance:Treasury 3 2012-07-01 2012-07-01 false Evidence: confidential information, protective orders. 501.733 Section 501.733 Money and Finance: Treasury Regulations Relating to Money and Finance (Continued) OFFICE OF FOREIGN ASSETS CONTROL, DEPARTMENT OF THE TREASURY REPORTING, PROCEDURES...

  16. 31 CFR 501.733 - Evidence: confidential information, protective orders.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 31 Money and Finance:Treasury 3 2014-07-01 2014-07-01 false Evidence: confidential information, protective orders. 501.733 Section 501.733 Money and Finance: Treasury Regulations Relating to Money and Finance (Continued) OFFICE OF FOREIGN ASSETS CONTROL, DEPARTMENT OF THE TREASURY REPORTING, PROCEDURES...

  17. 10 CFR 26.37 - Protection of information.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... NUCLEAR REGULATORY COMMISSION FITNESS FOR DUTY PROGRAMS Program Elements § 26.37 Protection of information... program, including determinations of fitness, FFD program audits, or some human resources functions; (6... test results, MRO reviews, determinations of fitness, and management actions pertaining to the...

  18. 10 CFR 26.37 - Protection of information.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... NUCLEAR REGULATORY COMMISSION FITNESS FOR DUTY PROGRAMS Program Elements § 26.37 Protection of information... program, including determinations of fitness, FFD program audits, or some human resources functions; (6... test results, MRO reviews, determinations of fitness, and management actions pertaining to the...

  19. 10 CFR 26.37 - Protection of information.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... NUCLEAR REGULATORY COMMISSION FITNESS FOR DUTY PROGRAMS Program Elements § 26.37 Protection of information... program, including determinations of fitness, FFD program audits, or some human resources functions; (6... test results, MRO reviews, determinations of fitness, and management actions pertaining to the...

  20. 10 CFR 26.37 - Protection of information.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... NUCLEAR REGULATORY COMMISSION FITNESS FOR DUTY PROGRAMS Program Elements § 26.37 Protection of information... program, including determinations of fitness, FFD program audits, or some human resources functions; (6... test results, MRO reviews, determinations of fitness, and management actions pertaining to the...

  1. 10 CFR 26.37 - Protection of information.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... NUCLEAR REGULATORY COMMISSION FITNESS FOR DUTY PROGRAMS Program Elements § 26.37 Protection of information... program, including determinations of fitness, FFD program audits, or some human resources functions; (6... test results, MRO reviews, determinations of fitness, and management actions pertaining to the...

  2. 15 CFR 295.9 - Protection of confidential information.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 15 Commerce and Foreign Trade 1 2013-01-01 2013-01-01 false Protection of confidential information. 295.9 Section 295.9 Commerce and Foreign Trade Regulations Relating to Commerce and Foreign Trade NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY, DEPARTMENT OF COMMERCE NIST EXTRAMURAL PROGRAMS...

  3. 15 CFR 295.9 - Protection of confidential information.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 15 Commerce and Foreign Trade 1 2011-01-01 2011-01-01 false Protection of confidential information. 295.9 Section 295.9 Commerce and Foreign Trade Regulations Relating to Commerce and Foreign Trade NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY, DEPARTMENT OF COMMERCE NIST EXTRAMURAL PROGRAMS...

  4. 15 CFR 295.9 - Protection of confidential information.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 15 Commerce and Foreign Trade 1 2014-01-01 2014-01-01 false Protection of confidential information. 295.9 Section 295.9 Commerce and Foreign Trade Regulations Relating to Commerce and Foreign Trade NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY, DEPARTMENT OF COMMERCE NIST EXTRAMURAL PROGRAMS...

  5. 15 CFR 295.9 - Protection of confidential information.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 15 Commerce and Foreign Trade 1 2012-01-01 2012-01-01 false Protection of confidential information. 295.9 Section 295.9 Commerce and Foreign Trade Regulations Relating to Commerce and Foreign Trade NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY, DEPARTMENT OF COMMERCE NIST EXTRAMURAL PROGRAMS...

  6. 78 FR 29375 - Protected Critical Infrastructure Information (PCII) Office Self-Assessment Questionnaire

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-05-20

    ... SECURITY Protected Critical Infrastructure Information (PCII) Office Self- Assessment Questionnaire AGENCY... Information Collection Division (IICD), Protected Critical Infrastructure Information (PCII) Program will...: The PCII Program was created by Congress under the Critical Infrastructure Information Act of...

  7. Why don't pesticide applicators protect themselves? Exploring the use of personal protective equipment among Colombian smallholders.

    PubMed

    Feola, Giuseppe; Binder, Claudia R

    2010-01-01

    The misuse of personal protective equipment (PPE) during pesticide application was investigated among smallholders in Colombia. The integrative agent-centered (IAC) framework and a logistic regression approach were adopted. The results suggest that the descriptive social norm was significantly influencing PPE use. The following were also important: (1) having experienced pesticide-related health problems; (2) age; (3) the share of pesticide application carried out; and (4) the perception of PPE hindering work. Interestingly, the influence of these factors differed for different pieces of PPE. Since conformity to the social norm is a source of rigidity in the system, behavioral change may take the form of a discontinuous transition. In conclusion, five suggestions for triggering a transition towards more sustainable PPE use are formulated: (1) diversifying targets/tools; (2) addressing structural aspects; (3) sustaining interventions in the long-term; (4) targeting farmers' learning-by-experience; and (5) targeting PPE use on a collective level. PMID:20166315

  8. 22 CFR 104.2 - Sharing of information regarding international trafficking in persons.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 22 Foreign Relations 1 2011-04-01 2011-04-01 false Sharing of information regarding international... INTERNATIONAL TRAFFICKING IN PERSONS: INTERAGENCY COORDINATION OF ACTIVITIES AND SHARING OF INFORMATION § 104.2 Sharing of information regarding international trafficking in persons. Each Federal Department or...

  9. 22 CFR 104.2 - Sharing of information regarding international trafficking in persons.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 22 Foreign Relations 1 2010-04-01 2010-04-01 false Sharing of information regarding international... INTERNATIONAL TRAFFICKING IN PERSONS: INTERAGENCY COORDINATION OF ACTIVITIES AND SHARING OF INFORMATION § 104.2 Sharing of information regarding international trafficking in persons. Each Federal Department or...

  10. Flame-retardant contamination of firefighter personal protective clothing - A potential health risk for firefighters.

    PubMed

    Alexander, Barbara M; Baxter, C Stuart

    2016-09-01

    There is a high incidence of cardiovascular disease and certain cancers in firefighters that may be related to their occupational exposure to hazardous substances. Exposure may result from contaminated personal protective gear, as well as from direct exposure at fire scenes. This study characterized flame-retardant contamination on firefighter personal protective clothing to assess exposure of firefighters to these chemicals. Samples from used and unused firefighter protective clothing, including gloves, hoods and a coat wristlet, were extracted with methylene chloride and analyzed by EPA method 8270D Specific Ion Method (SIM) for polybrominated diphenyl ethers (PBDEs). Until recently PBDEs were some of the most common flame-retardant chemicals used in the US. Fifteen of the seventeen PBDEs for which analysis was performed were found on at least one clothing swatch. Every clothing sample, including an unused hood and all three layers of an unused glove, held a detectable concentration of at least one PBDE. These findings, along with previous research, suggest that firefighters are exposed to PBDE flame retardants at levels much higher than the general public. PBDEs are found widely dispersed in the environment and still persist in existing domestic materials such as clothing and furnishings. Firefighter exposure to flame retardants therefore merits further study. PMID:27171467

  11. E-Data Privacy and the Personal Data Protection Bill of Malaysia

    NASA Astrophysics Data System (ADS)

    Jawahitha, Sarabdeen; Ishak, Mohamed; Mazahir, Mohamed

    Hi-tech development in information and communication technology or ICT enables the public to carry out various business activities. In the course of such businesses, all relevant individual information are saved in the computer system. However, keeping such information in computer is not at all secured due to the availability of technology that may circumvent or get access to the said information. This could be a threat to the privacy specially data privacy. Regulatory compliance and liability issues arising from the use of information technologies and possibility of privacy violation should be given important consideration as the evolution and progression of e-related activities is dependent upon and influenced by the rapidly changing advances in law. The Data Protection Bill 1998 was drafted setting provisions on data principles and rights to data subjects so that data privacy can considerably be protected. However, the introduction of Data Protection Bill 2001 is seen to have focused more on regulation of private sector than public sector whereby the level of protection for data held in public sector is very much reduced.

  12. Information support systems for cultural heritage protection against flooding

    NASA Astrophysics Data System (ADS)

    Nedvedova, K.; Pergl, R.

    2015-08-01

    The goal of this paper is to present use of different kind of software applications to create complex support system for protection of cultural heritage against flooding. The project is very complex and it tries to cover the whole area of the problem from prevention to liquidation of aftermath effects. We used GIS for mapping the risk areas, ontology systems for vulnerability assessment application and the BORM method (Business Object Relation Modelling) for flood protection system planning guide. Those modern technologies helped us to gather a lot of information in one place and provide the knowledge to the broad audience.

  13. [Personal identification using information from cranio-facial region].

    PubMed

    Minaguchi, Kiyoshi

    2007-11-01

    Much of Forensic Odontology is concerned with personal identification, through examination of cranio-facial region. This paper describes several studies in which we worked with materials derived from cranio-facial region. The following topics are addressed : (1) Human saliva contains proteins specific to salivary glands, proteins which are highly polymorphic compared with those found in other body fluids. In particular, six genes for proline-rich proteins coded many proteins found in human saliva, and we found several of them. At least five kinds of cystatin are secreted in saliva. We constructed recombinant polymorphic proteins, cystatin SAl and SA2. Using these proteins, we compared effects of amino acid mutation on protease inhibitor activity, and demonstrated a novel function for type-2 cystatin cytokine-inducing activity. (2) Among autosomal STR loci, we identified the D12S67 locus as highly polymorphic, with a heterozygosity of 95%, by investigating differences in nucleotide repeat units. Highly polymorphic autosomal STR loci offer an effective forensic tool under certain conditions, in addition to multiplex PCR, and therefore merit further study in forensic practice. (3) Although digitalization is prevalent in photography, analog images are preferable in certain circumstances as they offer better resolution. (4) Usually, information on mtDNA polymorphisms from HV1 and HV2 in the control region is used in forensic practice. However, information from the coding region considerably increases the discrimination power of mtDNA polymorphisms. It is important to increase the volume of coding region information available with regard to mtDNA polymorphisms for future forensic practice. (5) Y-STR polymorphisms are closely associated with binary haplogroups, and it is possible to estimate a binary haplogroup from an STR haplotype. (6) Mitochondrial DNA and Y-chromosomal polymorphisms can be used to determine geographic origin in individuals from East Asia, something

  14. Personal Record Keeping. The CIRcular: Consumer Information Report 21.

    ERIC Educational Resources Information Center

    Bank of America NT & SA, San Francisco, CA.

    This report explains the importance of keeping personal records, describes types of records to keep, and suggests places in which to keep them and ways to organize them. Guidelines are offered for keeping the following types of records: (1) personal documents (family records, wills, passports, diplomas, and social security cards); (2) property…

  15. 26 CFR 1.6039-2 - Statements to persons with respect to whom information is reported.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 26 Internal Revenue 13 2010-04-01 2010-04-01 false Statements to persons with respect to whom... to persons with respect to whom information is reported. (a) Requirement of statement with respect to...) shall furnish to each person whose name is set forth in such return a written statement with respect...

  16. The Structure of Informal Social Networks of Persons with Profound Intellectual and Multiple Disabilities

    ERIC Educational Resources Information Center

    Kamstra, A.; van der Putten, A. A. J.; Vlaskamp, C.

    2015-01-01

    Background: Persons with less severe disabilities are able to express their needs and show initiatives in social contacts, persons with profound intellectual and multiple disabilities (PIMD), however, depend on others for this. This study analysed the structure of informal networks of persons with PIMD. Materials and Methods: Data concerning the…

  17. Privacy and Personal Information Held by Government: A Comparative Study, Japan and New Zealand

    NASA Astrophysics Data System (ADS)

    Cullen, Rowena

    This chapter reports on the concepts of information privacy and trust in government among citizens in Japan and New Zealand in a transnational, crosscultural study. Data from both countries are presented, and cultural and other factors are sought that might explain differences in attitudes shown. In both countries, citizens display a range of views, not related to age or gender. New Zealand citizens express concern about information privacy in relation to information held by government, but show a higher level of trust in government overall, and most attribute breaches of privacy to incompetence, rather than deliberate malfeasance. Japanese citizens interviewed also indicated that they had major concerns about information privacy, and had considerably less trust in government than New Zealand respondents showed. They were more inclined to attribute breaches of privacy to lax behavior in individuals than government systems. In both countries citizens showed an awareness of the tradeoffs necessary between personal privacy and the needs of the state to hold information for the benefit of all citizens, but knew little about the protection offered by privacy legislation, and expressed overall concern about privacy practices in the modern state. The study also provides evidence of cultural differences that can be related to Hofstede's dimensions of culture.

  18. Special article: personal protective equipment for care of pandemic influenza patients: a training workshop for the powered air purifying respirator.

    PubMed

    Tompkins, Bonnie M; Kerchberger, John P

    2010-10-01

    Virulent respiratory infectious diseases may present a life-threatening risk for health care professionals during aerosol-generating procedures, including endotracheal intubation. The 2009 Pandemic Influenza A (H1N1) brings this concern to the immediate forefront. The Centers for Disease Control and Prevention have stated that, when performing or participating in aerosol-generating procedures on patients with virulent contagious respiratory diseases, health care professionals must wear a minimum of the N95 respirator, and they may wish to consider using the powered air purifying respirator (PAPR). For influenza and other diseases transmitted by both respiratory and contact modes, protective respirators must be combined with contact precautions. The PAPR provides 2.5 to 100 times greater protection than the N95, when used within the context of an Occupational Safety and Health Administration-compliant respiratory protection program. The relative protective capability of a respirator is quantified using the assigned protection factor. The level of protection designated by the APF can only be achieved with appropriate training and correct use of the respirator. Face seal leakage limits the protective capability of the N95 respirator, and fit testing does not assure the ability to maintain a tight face seal. The protective capability of the PAPR will be defeated by improper handling of contaminated equipment, incorrect assembly and maintenance, and improper don (put on) and doff (take off) procedures. Stress, discomfort, and physical encumbrance may impair performance. Acclimatization through training will mitigate these effects. Training in the use of PAPRs in advance of their need is strongly advised. "Just in time" training is unlikely to provide adequate preparation for groups of practitioners requiring specialized personal protective equipment during a pandemic. Employee health departments in hospitals may not presently have a PAPR training program in place

  19. Factors Surgical Team Members Perceive Influence Choices of Wearing or Not Wearing Personal Protective Equipment during Operative/Invasive Procedures

    ERIC Educational Resources Information Center

    Cuming, Richard G.

    2009-01-01

    Exposure to certain bloodborne pathogens can prematurely end a person's life. Healthcare workers (HCWs), especially those who are members of surgical teams, are at increased risk of exposure to these pathogens. The proper use of personal protective equipment (PPE) during operative/invasive procedures reduces that risk. Despite this, some HCWs fail…

  20. Search and seizure law; practical advice and interpretation for nuclear protective force persons

    SciTech Connect

    Cadwell, J.J.

    1983-07-06

    Recent Supreme Court decisions, which interpret the 200-year-old Fourth Amendment of the US Constitution, are used to provide a brief overview of some search and seizure subjects important to management and officers responsible for physical protection of nuclear facilities. The overview is framed in practical terms in order to make the comments applicable to the everyday activity of nuclear-protective-force persons. The Supreme Court has described several exceptions where searches and seizures (arrests) are permitted without a warrant, despite the Fourth Amendment which states that warrants are always required. The seven exceptions briefly discussed are search incidents to a lawful arrest, the automobile-search exception, the suitcase or container exception, the hot-pursuit or emergency exception, the stop-and-frisk exception, the plain-view exception, and consent to be searched.

  1. Person re-identification employing 3D scene information

    NASA Astrophysics Data System (ADS)

    Bak, Sławomir; Brémond, François

    2015-09-01

    The person reidentification task applied in a real-world scenario is addressed. Finding people in a network of cameras is challenging due to significant variations in lighting conditions, different color responses, and different camera viewpoints. State-of-the-art algorithms are likely to fail due to serious perspective and pose changes. Most of the existing approaches try to cope with all these changes by applying metric learning tools to find a transfer function between a camera pair while ignoring the body alignment issue. Additionally, this transfer function usually depends on the camera pair and requires labeled training data for each camera. This might be unattainable in a large camera network. We employ three-dimensional scene information for minimizing perspective distortions and estimating the target pose. The estimated pose is further used for splitting a target trajectory into reliable chunks, each one with a uniform pose. These chunks are matched through a network of cameras using a previously learned metric pool. However, instead of learning transfer functions that cope with all appearance variations, we propose to learn a generic metric pool that only focuses on pose changes. This pool consists of metrics, each one learned to match a specific pair of poses and not being limited to a specific camera pair. Automatically estimated poses determine the proper metric, thus improving matching. We show that metrics learned using only a single camera can significantly improve the matching across the whole camera network, providing a scalable solution. We validated our approach on publicly available datasets, demonstrating increase in the reidentification performance.

  2. Quantitative Information Differences Between Object-Person Presentation Methods

    ERIC Educational Resources Information Center

    Boyd, J. Edwin; Perry, Raymond P.

    1972-01-01

    Subjects used significantly more adjectives, on an adjective checklist (ACL), in giving their impressions of an object-person; based on written and audiovisual presentations, more than audio presentations. (SD)

  3. Feasibility analysis of the privacy attributes of the personal wellness information model.

    PubMed

    Nykänen, Pirkko; Seppälä, Antto; Ruotsalainen, Pekka; Blobel, Bernd

    2013-01-01

    A feasibility analysis has been performed to study the applicability of privacy attributes with a developed wellness information model. Information privacy concerns specifically access to individually identifiable personal information and one's ability to control information about oneself. We carried out a user scenario walk-through of the privacy attributes related to the wellness components. The walk-through showed a need to relate self-regulating privacy policies to the pervasive context so that during various trust-building processes, a person is aware and can control the use, disclosure and even secondary use of his personal, private wellness information. PMID:23920548

  4. Modern Methods of Real-Time Gamma Radiation Monitoring for General Personal Protection

    NASA Astrophysics Data System (ADS)

    Korostynska, O.; Arshak, K.; Arshak, A.; Vaseashta, Ashok

    Real-time radiation detectors become an essential part of emergency personnel who may have to respond to unknown accidents, incidents or terrorist attacks, which could involve radioactive material. More and more ordinary citizens are interested in personal radiation protection as well. Reasons include lost sources, nuclear industrial accidents, nuclear or radiological terrorism and the possibility of nuclear weapons being used in a war. People want to have the ability to measure it for themselves and they want to be notified when the radiation levels are increased. To meet this demand, considerable research into new sensors is underway, including efforts to enhance the sensor performance through both the material properties and manufacturing technologies. Deep understanding of physical properties of the materials under the influence of radiation exposure is vital for the effective design of dosimeter devices. Detection of radiation is based on the fact that both the electrical and the optical properties of the materials undergo changes upon the exposure to ionizing radiation. It is believed that radiation causes structural defects. The influence of radiation depends on both the dose and the parameters of the films including their thickness: the degradation is more severe for the higher dose and the thinner films. This paper presents overview of modern methods of real-time gamma radiation monitoring for personal protection of radiation workers and general public and suggests further developments in this area.

  5. Theft of information in the take-grant protection model

    NASA Technical Reports Server (NTRS)

    Bishop, Matt

    1989-01-01

    Questions of information flow are in many ways more important than questions of access control, because the goal of many security policies is to thwart the unauthorized release of information, not merely the illicit obtaining of access rights to that information. The Take-Grant Protection Model is a theoretical tool for examining such issues because conditions necessary and sufficient for information to flow between two objects, and for rights to objects to be obtained or stolen, are known. These results are extended by examining the question of information flow from an object the owner of which is unwilling to release that information. Necessary and sufficient conditions for such theft of information to occur are derived, and bounds on the number of subjects that must take action for the theft to occur are presented. To emphasize the usefulness of these results, the security policies of complete isolation, transfer of rights with the cooperation of an owner, and transfer of information (but not rights) with the cooperation of the owner are presented; the last is used to model a simple reference monitor guarding a resource.

  6. 16 CFR 312.6 - Right of parent to review personal information provided by a child.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... review personal information provided by a child. (a) Upon request of a parent whose child has provided personal information to a website or online service, the operator of that website or online service is... 16 Commercial Practices 1 2012-01-01 2012-01-01 false Right of parent to review...

  7. 42 CFR 455.106 - Disclosure by providers: Information on persons convicted of crimes.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 42 Public Health 4 2010-10-01 2010-10-01 false Disclosure by providers: Information on persons convicted of crimes. 455.106 Section 455.106 Public Health CENTERS FOR MEDICARE & MEDICAID SERVICES... persons convicted of crimes. (a) Information that must be disclosed. Before the Medicaid agency...

  8. 42 CFR 455.106 - Disclosure by providers: Information on persons convicted of crimes.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 42 Public Health 4 2011-10-01 2011-10-01 false Disclosure by providers: Information on persons convicted of crimes. 455.106 Section 455.106 Public Health CENTERS FOR MEDICARE & MEDICAID SERVICES... persons convicted of crimes. (a) Information that must be disclosed. Before the Medicaid agency...

  9. 42 CFR 455.106 - Disclosure by providers: Information on persons convicted of crimes.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 42 Public Health 4 2012-10-01 2012-10-01 false Disclosure by providers: Information on persons convicted of crimes. 455.106 Section 455.106 Public Health CENTERS FOR MEDICARE & MEDICAID SERVICES... persons convicted of crimes. (a) Information that must be disclosed. Before the Medicaid agency...

  10. 42 CFR 455.106 - Disclosure by providers: Information on persons convicted of crimes.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 42 Public Health 4 2014-10-01 2014-10-01 false Disclosure by providers: Information on persons convicted of crimes. 455.106 Section 455.106 Public Health CENTERS FOR MEDICARE & MEDICAID SERVICES... persons convicted of crimes. (a) Information that must be disclosed. Before the Medicaid agency...

  11. 42 CFR 455.106 - Disclosure by providers: Information on persons convicted of crimes.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 42 Public Health 4 2013-10-01 2013-10-01 false Disclosure by providers: Information on persons convicted of crimes. 455.106 Section 455.106 Public Health CENTERS FOR MEDICARE & MEDICAID SERVICES... persons convicted of crimes. (a) Information that must be disclosed. Before the Medicaid agency...

  12. 77 FR 35709 - Notice of Submission of Proposed Information Collection to OMB; Personal Financial and Credit...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-06-14

    ...: Personal Financial and Credit Statement. OMB Approval Number: 2502-0001. Form Numbers: HUD-92417... URBAN DEVELOPMENT Notice of Submission of Proposed Information Collection to OMB; Personal Financial and Credit Statement AGENCY: Office of the Chief Information Officer, HUD. ACTION: Notice. SUMMARY:...

  13. Factors Associated with Behavioral Intention to Disclose Personal Information on Geosocial Networking Applications

    ERIC Educational Resources Information Center

    Cox, Trissa

    2012-01-01

    Information privacy is a major concern for consumers adopting emerging technologies dependent on location-based services. This study sought to determine whether a relationship exists among factors of personalization, locatability, perceived playfulness, privacy concern and behavioral intention to disclose personal information for individuals using…

  14. 22 CFR 104.2 - Sharing of information regarding international trafficking in persons.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 22 Foreign Relations 1 2013-04-01 2013-04-01 false Sharing of information regarding international trafficking in persons. 104.2 Section 104.2 Foreign Relations DEPARTMENT OF STATE ECONOMIC AND OTHER FUNCTIONS INTERNATIONAL TRAFFICKING IN PERSONS: INTERAGENCY COORDINATION OF ACTIVITIES AND SHARING OF INFORMATION §...

  15. 22 CFR 104.2 - Sharing of information regarding international trafficking in persons.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 22 Foreign Relations 1 2012-04-01 2012-04-01 false Sharing of information regarding international trafficking in persons. 104.2 Section 104.2 Foreign Relations DEPARTMENT OF STATE ECONOMIC AND OTHER FUNCTIONS INTERNATIONAL TRAFFICKING IN PERSONS: INTERAGENCY COORDINATION OF ACTIVITIES AND SHARING OF INFORMATION §...

  16. 22 CFR 104.2 - Sharing of information regarding international trafficking in persons.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 22 Foreign Relations 1 2014-04-01 2014-04-01 false Sharing of information regarding international trafficking in persons. 104.2 Section 104.2 Foreign Relations DEPARTMENT OF STATE ECONOMIC AND OTHER FUNCTIONS INTERNATIONAL TRAFFICKING IN PERSONS: INTERAGENCY COORDINATION OF ACTIVITIES AND SHARING OF INFORMATION §...

  17. 32 CFR 505.7 - Disclosure of personal information to other agencies and third parties.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 32 National Defense 3 2011-07-01 2009-07-01 true Disclosure of personal information to other agencies and third parties. 505.7 Section 505.7 National Defense Department of Defense (Continued) DEPARTMENT OF THE ARMY AID OF CIVIL AUTHORITIES AND PUBLIC RELATIONS ARMY PRIVACY ACT PROGRAM § 505.7 Disclosure of personal information to other...

  18. Personality information: does it influence attractiveness ratings of various body sizes?

    PubMed

    Fisak, Brian; Tantleff-Dunn, Stacey; Peterson, Rachel D

    2007-06-01

    In the present study, the influence of personality information on attractiveness ratings of different body sizes was examined. Specifically, participants were presented with either no personality information, negative information, or positive information about a hypothetical female target and asked to rate the smallest and largest figure that they would consider attractive for her using a figure rating scale. Consistent with the study hypotheses: (1) participants chose a wider range of figures as attractive for a female described to have a positive personality when compared to the range chosen when no personality information was provided; (2) females selected wider attractive ranges than males; and (3) other participant characteristics (i.e., physical appearance anxiety and body mass) were found to predict attractive ranges selected by participants. These findings may have implications for the treatment of body-image disturbance, as the findings suggest that personality, rather than appearance alone, may be a factor in perceptions of attractiveness of various body sizes. PMID:18089267

  19. Toward a genetically-informed model of borderline personality disorder.

    PubMed

    Livesley, John

    2008-02-01

    This article describes a conceptual framework for describing borderline personality disorder (BPD) based on empirical studies of the phenotypic structure and genetic architecture of personality. The proposed phenotype has 2 components: (1) a description of core self and interpersonal pathology-the defining features of personality disorder-as these features are expressed in the disorder; and (2) a set of traits based on the anxious-dependent or emotional dysregulation factor of the four-factor model of PD. Four kinds of traits are described: emotional (anxiousness, emotional reactivity, emotional intensity, and pessimistic-anhedonia), interpersonal (submissiveness, insecure attachment, social apprehensiveness, and need for approval), cognitive (cognitive dysregulation), and self-harm (behaviors and ideas). Formulation of the phenotype was guided by the conceptualization of personality as a system of interrelated sub-systems. The psychopathology associated with BPD involves most components of the system. The trait structure of the disorder is assumed to reflect the genetic architecture of personality and individual traits are assumed to be based on adaptive mechanisms. It is suggested that borderline traits are organized around the trait of anxiousness and that an important feature of BPD is dysregulation of the threat management system leading to pervasive fearfulness and unstable emotions. The interpersonal traits are assumed to be heritable characteristics that evolved to deal with interpersonal threats that arose as a result of social living. The potential for unstable and conflicted interpersonal relationships that is inherent to the disorder is assumed to result from the interplay between the adaptive structure of personality and psychosocial adversity. The etiology of the disorder is discussed in terms of biological and environmental factors associated with each component of the phenotype. PMID:18312122

  20. Personal Money Planner. The CIRcular: Consumer Information Report 14.

    ERIC Educational Resources Information Center

    Bank of America NT & SA, San Francisco, CA.

    This report gives suggestions for starting a personal money plan, provides a worksheet for developing the plan, and offers ideas for putting the plan into action. Guidelines are presented for the following steps in developing a money plan: setting short- and long-term spending and saving goals; making a timetable for reaching those goals;…

  1. 45 CFR 164.514 - Other requirements relating to uses and disclosures of protected health information.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... disclosures of protected health information. 164.514 Section 164.514 Public Welfare DEPARTMENT OF HEALTH AND... Individually Identifiable Health Information § 164.514 Other requirements relating to uses and disclosures of protected health information. (a) Standard: de-identification of protected health information....

  2. Money makes you reveal more: consequences of monetary cues on preferential disclosure of personal information.

    PubMed

    Mukherjee, Sumitava; Manjaly, Jaison A; Nargundkar, Maithilee

    2013-01-01

    With continuous growth in information aggregation and dissemination, studies on privacy preferences are important to understand what makes people reveal information about them. Previous studies have demonstrated that short-term gains and possible monetary rewards make people risk disclosing information. Given the malleability of privacy preferences and the ubiquitous monetary cues in daily lives, we measured the contextual effect of reminding people about money on their privacy disclosure preferences. In experiment 1, we found that priming money increased willingness to disclose their personal information that could be shared with an online shopping website. Beyond stated willingness, experiment 2 tested whether priming money increases propensity for actually giving out personal information. Across both experiments, we found that priming money increases both the reported willingness and the actual disclosure of personal information. Our results imply that not only do short-term rewards make people trade-off personal security and privacy, but also mere exposure to money increases self-disclosure. PMID:24273524

  3. Money makes you reveal more: consequences of monetary cues on preferential disclosure of personal information

    PubMed Central

    Mukherjee, Sumitava; Manjaly, Jaison A.; Nargundkar, Maithilee

    2013-01-01

    With continuous growth in information aggregation and dissemination, studies on privacy preferences are important to understand what makes people reveal information about them. Previous studies have demonstrated that short-term gains and possible monetary rewards make people risk disclosing information. Given the malleability of privacy preferences and the ubiquitous monetary cues in daily lives, we measured the contextual effect of reminding people about money on their privacy disclosure preferences. In experiment 1, we found that priming money increased willingness to disclose their personal information that could be shared with an online shopping website. Beyond stated willingness, experiment 2 tested whether priming money increases propensity for actually giving out personal information. Across both experiments, we found that priming money increases both the reported willingness and the actual disclosure of personal information. Our results imply that not only do short-term rewards make people trade-off personal security and privacy, but also mere exposure to money increases self-disclosure. PMID:24273524

  4. Border malaria in China: knowledge and use of personal protection by minority populations and implications for malaria control: a questionnaire-based survey

    PubMed Central

    Moore, Sarah J; Min, Xia; Hill, Nigel; Jones, Caroline; Zaixing, Zhang; Cameron, Mary M

    2008-01-01

    Background Malaria control in remote, forested areas of the Mekong region relies on personal protection from mosquito bites. Uptake of these methods may be limited by knowledge of the link between mosquitoes and malaria as well as social and economic aspects. Understanding barriers to uptake will inform malaria control programmes on targets for improvement of delivery. Methods A total 748 key respondents: health providers and village heads, from 187 villages and 25 different ethnic groups, were interviewed using structured questionnaires. Differences in use of personal protection, and knowledge of malaria between groups were analysed using chi-square; and binary logistic regression used for multivariate analysis. Results Malaria knowledge was poor with 19.4% of women and 37.5% of men linking mosquitoes with malaria, although 95.6% knew one or more methods of mosquito control. Virtually all respondents used personal protection at some time during the year; and understanding of malaria transmission was strongly associated with bednet use. Those working in forest agriculture were significantly more likely to know that mosquitoes transmit malaria but this did not translate into a significantly greater likelihood of using bednets. Furthermore, use of personal protection while woing outdoors was rare, and less than 3% of respondents knew about the insecticide impregnation of bednets. The use of bednets, synthetic repellents and mosquito coils varied between ethnic groups, but was significantly more frequent among those with higher income, more years of education and permanent housing. The reported use of repellents and coils was also more common among women despite their low knowledge of malaria transmission, and low likelihood of having heard information on malaria within the last year. Conclusion The use of personal protection must be increased, particularly among outdoor workers that have higher malaria risk. However, personal protection is widely used and widely

  5. Repellents and acaricides as personal protection measures in the prevention of tick-borne diseases.

    PubMed

    Cisak, Ewa; Wójcik-Fatla, Angelina; Zając, Violetta; Dutkiewicz, Jacek

    2012-01-01

    A number of preventive measures for the protection of humans against tick-borne diseases were evaluated. Measures involving the avoidance of tick bites with the use of protective clothing and insect repellents are the simplest and most effective. Repellents are applied directly to the skin or clothing and other fabrics, such as bednets, tents and anti-mosquito screens. Currently, DEET (N,N-diethyl-m-toluamide) is considered the most efficient arthropod repellent reference substance. The registered and recommended active repellent ingredients for skin and/or cloths application, among others, are: DEET, 1-methyl-propyl-2- (hydroxyethyl)-1-piperidinecarboxylate (picaridin), p-menthane-3,8-diol (PMD), ethyl butylactyloaminopropionate ( IR3535), 1S,2S-2-methylpiperidinyl-3-cyclohexene-1-carboxamide (SS220), racemic 2-methylpiperidinyl-3-cyclohexene-1-carboxamide (AI3-37220) and synthethic pyrethroid - 3-phenoxybenzyl-cis-trans-3(2,2 dichlorovinyl)-2,2-dimethylcyclopropancarboxylate (permethrin) - an acaricide with repellent properties. To achieve the protection from tick bites by avoiding attachment and/or engorgement by the arthropod, acaricides with repellent properties, such as synthetic pyrethroid-permethrin are used. This pyrethroid is an acaricide of choice used for clothing impregnation, which is effective for personal protection against all three parasitic stages of western black-legged ticks. Products based on natural compounds, e.g. eugenol from Ocimum basilicum, 2-undecanone originally derived from wild tomato, geraniol - a natural product extracted from plants, and many others, represent an interesting alternative to common synthetic repellents and/or acaricides. PMID:23311778

  6. TANK VAPOR CHEMICALS OF POTENTIAL CONCERN & EXISTING DIRECT READING INSTRUMENTION & PERSONAL PROTECTIVE EQUIPMENT CONSIDERATIONS

    SciTech Connect

    BUTLER, N.K.

    2004-11-01

    This document takes the newly released Industrial Hygiene Chemical Vapor Technical Basis (RPP-22491) and evaluates the chemicals of potential concern (COPC) identified for selected implementation actions by the industrial hygiene organization. This document is not intended as a hazard analysis with recommended controls for all tank farm activities. Not all of the chemicals listed are present in all tanks; therefore, hazard analyses can and should be tailored as appropriate. Detection of each chemical by current industrial hygiene non-specific instrumentation in use at the tank farms is evaluated. Information gaps are identified and recommendations are made to resolve these needs. Of the 52 COPC, 34 can be detected with existing instrumentation. Three additional chemicals could be detected with a photoionization detector (PID) equipped with a different lamp. Discussion with specific instrument manufacturers is warranted. Consideration should be given to having the SapphIRe XL customized for tank farm applications. Other instruments, sampling or modeling techniques should be evaluated to estimate concentrations of chemicals not detected by direct reading instruments. In addition, relative instrument response needs to be factored in to action levels used for direct reading instruments. These action levels should be correlated to exposures to the COPC and corresponding occupational exposure limits (OELs). The minimum respiratory protection for each of the COPC is evaluated against current options. Recommendations are made for respiratory protection based on each chemical. Until exposures are sufficiently quantified and analyzed, the current use of supplied air respiratory protection is appropriate and protective for the COPC. Use of supplied air respiratory protection should be evaluated once a detailed exposure assessment for the COPC is completed. The established tank farm OELs should be documented in the TFC-PLN-34. For chemicals without an established tank farm OEL

  7. Defending the doomed: implicit strategies concerning protection of first-person shooter games.

    PubMed

    Kneer, Julia; Munko, Daniel; Glock, Sabine; Bente, Gary

    2012-05-01

    Censorship of violent digital games, especially first-person shooter (FPS) games, is broadly discussed between generations. While older people are concerned about possible negative influences of these games, not only players but also nonplayers of the younger net-generation seem to deny any association with real aggressive behavior. Our study aimed at investigating defense mechanisms players and nonplayers use to defend FPS and peers with playing habits. By using a lexical decision task, we found that aggressive concepts are activated by priming the content of FPS but suppressed afterward. Only if participants were instructed to actively suppress aggressive concepts after priming, thought suppression was no longer necessary. Young people still do have negative associations with violent video games. These associations are neglected by implicitly applying defense strategies--independent of own playing habits--to protect this specific hobby, which is common for the net-generation. PMID:22515170

  8. Defending the Doomed: Implicit Strategies Concerning Protection of First-Person Shooter Games

    PubMed Central

    Munko, Daniel; Glock, Sabine; Bente, Gary

    2012-01-01

    Abstract Censorship of violent digital games, especially first-person shooter (FPS) games, is broadly discussed between generations. While older people are concerned about possible negative influences of these games, not only players but also nonplayers of the younger net-generation seem to deny any association with real aggressive behavior. Our study aimed at investigating defense mechanisms players and nonplayers use to defend FPS and peers with playing habits. By using a lexical decision task, we found that aggressive concepts are activated by priming the content of FPS but suppressed afterward. Only if participants were instructed to actively suppress aggressive concepts after priming, thought suppression was no longer necessary. Young people still do have negative associations with violent video games. These associations are neglected by implicitly applying defense strategies—independent of own playing habits—to protect this specific hobby, which is common for the net-generation. PMID:22515170

  9. Persuasion to use personal protective equipment in constructing subway stations: application of social marketing.

    PubMed

    Shamsi, Mahmoud; Pariani, Abbas; Shams, Mohsen; Soleymani-nejad, Marzieh

    2016-04-01

    To study the effects of an intervention based on social marketing to persuade workers to use personal protective equipment (PPE) in constructing subway stations in Isfahan, Iran. This was a quasi-experimental study. Two stations were selected as intervention and control groups. Intervention was designed based on results of a formative research. A free package containing a safety helmet with a tailored message affixed to it, mask and gloves and an educational pamphlet was delivered to the intervention group. After 6 weeks, behaviours in the intervention and control stations were measured using an observational checklist. After the intervention, the percentage of workers who used PPE at the intervention station increased significantly. OR for helmet and mask usage was 7.009 and 2.235, respectively, in the intervention group. Social marketing can be used to persuade workers to use PPE in the workplace. PMID:25873072

  10. Application of Spacesuit Glove Requirements Tools to Athletic and Personal Protective Equipment

    NASA Technical Reports Server (NTRS)

    England, Scott; Benson, Elizabeth; Melsoh, Miranda; Thompson, Shelby; Rajulu, Sudhakar

    2010-01-01

    Despite decades of ongoing improvement, astronauts must still struggle with inhibited dexterity and accelerated fatigue due to the requirement of wearing a pressurized Extra-Vehicular Activity (EVA) glove. Recent research in the Anthropometry and Biomechanics Facility at NASA's Johnson Space Center has focused on developing requirements for improvements in the design of the next generation of EVA glove. In the course of this research, it was decided to expand the scope of the testing to include a variety of commercially available athletic and consumer gloves to help provide a more recognizable comparison for investigators and designers to evaluate the current state of EVA glove mobility and strength. This comparison is being provided with the hope that innovative methods may help commercial development of gloves for various athletic and personal protective endeavors.

  11. Factors contributing to discomfort or dissatisfaction as a result of wearing personal protective equipment.

    PubMed

    Akbar-Khanzadeh, F

    1998-12-01

    In a metal refining plant, 366 workers were interviewed to investigate factors contributing to the discomfort or dissatisfaction of wearing personal protective equipment (PPE). Up to 97.8% of these individuals used one or more types of PPE. The percentages of employees who reported their hard hats and cooling vests as comfortable were 17% and 19%, respectively. Twenty-five percent of workers felt their respirators and safety harnesses were comfortable. Safety glasses ranked at 50%, gloves 53%, and safety shoes 54% for comfort factor. The percentage of employees who tolerated their PPE (just acceptable) ranged from 27% to 52%. The most frequently cited factors contributing to discomfort or dissatisfaction of wearing PPE were related to the workers' beliefs that the PPE was not needed, created a new hazard, interfered with work, was too heavy, was hard to wear, prohibited breathing or communicating, irritated skin, put pressure on the body, and was of an undesirable type or model. PMID:11579702

  12. Personalization.

    ERIC Educational Resources Information Center

    Shore, Rebecca Martin

    1996-01-01

    Describes how a typical high school in Huntington Beach, California, curbed disruptive student behavior by personalizing the school experience for "problem" students. Through mostly volunteer efforts, an adopt-a-kid program was initiated that matched kids' learning styles to adults' personality styles and resulted in fewer suspensions and numerous…

  13. Personalized Recommendations Based on Users' Information-Centered Social Networks

    ERIC Educational Resources Information Center

    Lee, Danielle

    2013-01-01

    The overwhelming amount of information available today makes it difficult for users to find useful information and as the solution to this information glut problem, recommendation technologies emerged. Among the several streams of related research, one important evolution in technology is to generate recommendations based on users' own social…

  14. Goats favour personal over social information in an experimental foraging task

    PubMed Central

    Baciadonna, Luigi

    2013-01-01

    Animals can use their environments more efficiently by selecting particular sources of information (personal or social), according to specific situations. Group-living animals may benefit from gaining information based on the behaviour of other individuals. Indeed, social information is assumed to be faster and less costly to use than personal information, thus increasing foraging efficiency. However, when food sources change seasonally or are randomly distributed, individual information may become more reliable than social information. The aim of this study was to test the use of conflicting personal versus social information in goats (Capra hircus), in a foraging task. We found that goats relied more on personal than social information, when both types of information were available and in conflict. No effect of social rank was found on the occasions when goats followed other demonstrator goats. Goats are selective browsers/grazers and therefore relying on personal rather than social information could be the most efficient way to find patchily distributed resources in highly variable environments. Studies testing specific assumptions regarding the use of different sources of information can extend our understanding of decision making, including observed patterns of social learning. PMID:24109556

  15. Foraging Bumble Bees Weigh the Reliability of Personal and Social Information.

    PubMed

    Dunlap, Aimee S; Nielsen, Matthew E; Dornhaus, Anna; Papaj, Daniel R

    2016-05-01

    Many animals, including insects, make decisions using both personally gathered information and social information derived from the behavior of other, usually conspecific, individuals [1]. Moreover, animals adjust use of social versus personal information appropriately under a variety of experimental conditions [2-5]. An important factor in how information is used is the information's reliability, that is, how consistently the information is correlated with something of relevance in the environment [6]. The reliability of information determines which signals should be attended to during communication [6-9], which types of stimuli animals should learn about, and even whether learning should evolve [10, 11]. Here, we show that bumble bees (Bombus impatiens) account for the reliability of personally acquired information (which flower color was previously associated with reward) and social information (which flowers are chosen by other bees) in making foraging decisions; however, the two types of information are not treated equally. Bees prefer to use social information if it predicts a reward at all, but if social information becomes entirely unreliable, flower color will be used instead. This greater sensitivity to the reliability of social information, and avoidance of conspecifics in some cases, may reflect the specific ecological circumstances of bee foraging. Overall, the bees' ability to make decisions based on both personally acquired and socially derived information, and the relative reliability of both, demonstrates a new level of sophistication and flexibility in animal, particularly insect, decision-making. PMID:27133871

  16. 75 FR 82041 - Notice of Proposed Information Collection: Comment Request; Floodplain Management and Protection...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-12-29

    ... URBAN DEVELOPMENT Notice of Proposed Information Collection: Comment Request; Floodplain Management and... Notice also lists the following information: Title of Proposal: Floodplain Management and Protection of..., ``Floodplain Management,'' and Executive Order 11990, ``Protection of Wetlands.'' Each respondent that...

  17. 19 CFR 206.66 - Limited disclosure of certain confidential business information under administrative protective...

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... business information under administrative protective order. 206.66 Section 206.66 Customs Duties UNITED STATES INTERNATIONAL TRADE COMMISSION NONADJUDICATIVE INVESTIGATIONS INVESTIGATIONS RELATING TO GLOBAL... certain confidential business information under administrative protective order. In an investigation...

  18. 19 CFR 206.37 - Limited disclosure of certain confidential business information under administrative protective...

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... business information under administrative protective order. 206.37 Section 206.37 Customs Duties UNITED STATES INTERNATIONAL TRADE COMMISSION NONADJUDICATIVE INVESTIGATIONS INVESTIGATIONS RELATING TO GLOBAL... business information under administrative protective order. Except in the case of an investigation...

  19. 19 CFR 206.66 - Limited disclosure of certain confidential business information under administrative protective...

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... business information under administrative protective order. 206.66 Section 206.66 Customs Duties UNITED STATES INTERNATIONAL TRADE COMMISSION NONADJUDICATIVE INVESTIGATIONS INVESTIGATIONS RELATING TO GLOBAL... certain confidential business information under administrative protective order. In an investigation...

  20. 19 CFR 206.66 - Limited disclosure of certain confidential business information under administrative protective...

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... business information under administrative protective order. 206.66 Section 206.66 Customs Duties UNITED STATES INTERNATIONAL TRADE COMMISSION NONADJUDICATIVE INVESTIGATIONS INVESTIGATIONS RELATING TO GLOBAL... certain confidential business information under administrative protective order. In an investigation...

  1. 19 CFR 206.37 - Limited disclosure of certain confidential business information under administrative protective...

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... business information under administrative protective order. 206.37 Section 206.37 Customs Duties UNITED STATES INTERNATIONAL TRADE COMMISSION NONADJUDICATIVE INVESTIGATIONS INVESTIGATIONS RELATING TO GLOBAL... business information under administrative protective order. Except in the case of an investigation...

  2. 77 FR 12875 - Proposed Information Collection; Native American Graves Protection and Repatriation Regulations

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-03-02

    ... National Park Service Proposed Information Collection; Native American Graves Protection and Repatriation... Number ``1024- 0144, Native American Graves Protection and Repatriation Regulations'' in the subject line... entire ICR package free of charge. SUPPLEMENTARY INFORMATION: I. Abstract The Native American...

  3. The risk of incomplete personal protection coverage in vector-borne disease.

    PubMed

    Miller, Ezer; Dushoff, Jonathan; Huppert, Amit

    2016-02-01

    Personal protection (PP) techniques, such as insecticide-treated nets, repellents and medications, include some of the most important and commonest ways used today to protect individuals from vector-borne infectious diseases. In this study, we explore the possibility that a PP intervention with partial coverage may have the counterintuitive effect of increasing disease burden at the population level, by increasing the biting intensity on the unprotected portion of the population. To this end, we have developed a dynamic model which incorporates parameters that describe the potential effects of PP on vector searching and biting behaviour and calculated its basic reproductive rate, R0. R0 is a well-established threshold of disease risk; the higher R0 is above unity, the stronger the disease onset intensity. When R0 is below unity, the disease is typically unable to persist. The model analysis revealed that partial coverage with popular PP techniques can realistically lead to a substantial increase in the reproductive number. An increase in R0 implies an increase in disease burden and difficulties in eradication efforts within certain parameter regimes. Our findings therefore stress the importance of studying vector behavioural patterns in response to PP interventions for future mitigation of vector-borne diseases. PMID:26911486

  4. Effect of base layer materials on physiological and perceptual responses to exercise in personal protective equipment.

    PubMed

    Smith, Denise L; Arena, Logan; DeBlois, Jacob P; Haller, Jeannie M; Hultquist, Eric M; Lefferts, Wesley K; Russell, Tim; Wu, Annie; Fehling, Patricia C

    2014-05-01

    Ten men (non-firefighters) completed a 110 min walking/recovery protocol (three 20-min exercise bouts, with recovery periods of 10, 20, and 20 min following successive bouts) in a thermoneutral laboratory while wearing firefighting personal protective equipment over one of four base layers: cotton, modacrylic, wool, and phase change material. There were no significant differences in changes in heart rate, core temperature, rating of perceived exertion, thermal discomfort, and thermal strain among base layers. Sticking to skin, coolness/hotness, and clothing humidity sensation were more favorable (p < 0.05) for wool compared with cotton; no significant differences were identified for the other 7 clothing sensations assessed. Separate materials performance testing of the individual base layers and firefighting ensembles (base layer + turnout gear) indicated differences in thermal protective performance and total heat loss among the base layers and among ensembles; however, differences in heat dissipation did not correspond with physiological responses during exercise or recovery. PMID:23849898

  5. 40 CFR 174.9 - Confidential business information claims for plant-incorporated protectant submissions.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 40 Protection of Environment 23 2010-07-01 2010-07-01 false Confidential business information claims for plant-incorporated protectant submissions. 174.9 Section 174.9 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) PESTICIDE PROGRAMS PROCEDURES AND REQUIREMENTS FOR PLANT-INCORPORATED PROTECTANTS General Provisions §...

  6. Personal Privacy in an Information Society: What are the Trade-Offs? Insights into Consumer Issues.

    ERIC Educational Resources Information Center

    J.C. Penney Co., Inc., New York, NY.

    Insights into Consumer Issues is one of a group of educational publications and teaching units that J.C. Penney provides for consumer educators as a public service. This folder illustrates that although computerized processing of personal information has brought considerable convenience, the potential risk to personal privacy is of increasing…

  7. 17 CFR 400.4 - Information concerning associated persons of financial institutions that are government...

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... regulatory agency for such financial institution, a statement correcting such information. (c) For the... associated persons of financial institutions that are government securities brokers or dealers. 400.4 Section... associated persons of financial institutions that are government securities brokers or dealers. (a)...

  8. Using Personal Computers To Acquire Special Education Information. Revised. ERIC Digest #429.

    ERIC Educational Resources Information Center

    ERIC Clearinghouse on Handicapped and Gifted Children, Reston, VA.

    This digest offers basic information about resources, available to users of personal computers, in the area of professional development in special education. Two types of resources are described: those that can be purchased on computer diskettes and those made available by linking personal computers through electronic telephone networks. Resources…

  9. 34 CFR 303.401 - Definitions of consent, native language, and personally identifiable information.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 34 Education 2 2011-07-01 2010-07-01 true Definitions of consent, native language, and personally... Definitions of consent, native language, and personally identifiable information. As used in this subpart— (a... which consent is sought, in the parent's native language or other mode of communication; (2) The...

  10. 26 CFR 1.6050B-1 - Information returns by person making unemployment compensation payments.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... unemployment compensation payments. 1.6050B-1 Section 1.6050B-1 Internal Revenue INTERNAL REVENUE SERVICE... § 1.6050B-1 Information returns by person making unemployment compensation payments. For taxable years beginning after December 31, 1978, every person who makes payments of unemployment compensation (as...

  11. 26 CFR 1.6050B-1 - Information returns by person making unemployment compensation payments.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... unemployment compensation payments. 1.6050B-1 Section 1.6050B-1 Internal Revenue INTERNAL REVENUE SERVICE... § 1.6050B-1 Information returns by person making unemployment compensation payments. For taxable years beginning after December 31, 1978, every person who makes payments of unemployment compensation (as...

  12. 26 CFR 1.6050B-1 - Information returns by person making unemployment compensation payments.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... unemployment compensation payments. 1.6050B-1 Section 1.6050B-1 Internal Revenue INTERNAL REVENUE SERVICE... § 1.6050B-1 Information returns by person making unemployment compensation payments. For taxable years beginning after December 31, 1978, every person who makes payments of unemployment compensation (as...

  13. 26 CFR 1.6050B-1 - Information returns by person making unemployment compensation payments.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... unemployment compensation payments. 1.6050B-1 Section 1.6050B-1 Internal Revenue INTERNAL REVENUE SERVICE... Information returns by person making unemployment compensation payments. For taxable years beginning after December 31, 1978, every person who makes payments of unemployment compensation (as defined in section...

  14. 77 FR 31068 - Additional Identifying Information Associated With Persons Whose Property and Interests in...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-05-24

    ... and Suspending Entry Into the United States of Certain Persons With Respect to Grave Human Rights... Property and Suspending Entry Into the United States of Certain Persons With Respect to Grave Human Rights... Rights Abuses by Governments of Iran and Syria via Information Technology AGENCY: Office of...

  15. Exploring New Potentials of Blogs for Learning: Can Children Use Blogs for Personal Information Management (PIM)?

    ERIC Educational Resources Information Center

    Yeo, Hwan-Ik; Lee, Yekyung Lisa

    2014-01-01

    This study explores the use of blogs for personal information management (PIM) as a learning tool that could bring increased efficiency and academic self-efficacy for carrying out learning tasks. In order to identify the uses and effects of using blogs for PIM by children, a control group that used personal spaces within the class website and an…

  16. 34 CFR 303.401 - Definitions of consent, native language, and personally identifiable information.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 34 Education 2 2010-07-01 2010-07-01 false Definitions of consent, native language, and personally... Definitions of consent, native language, and personally identifiable information. As used in this subpart— (a... which consent is sought, in the parent's native language or other mode of communication; (2) The...

  17. 32 CFR Appendix A to Part 310 - Safeguarding Personally Identifiable Information (PII)

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 32 National Defense 2 2011-07-01 2011-07-01 false Safeguarding Personally Identifiable Information (PII) A Appendix A to Part 310 National Defense Department of Defense (Continued) OFFICE OF THE SECRETARY OF DEFENSE (CONTINUED) PRIVACY PROGRAM DOD PRIVACY PROGRAM Pt. 310, App. A Appendix A to Part 310—Safeguarding Personally...

  18. 26 CFR 1.6050B-1 - Information returns by person making unemployment compensation payments.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... unemployment compensation payments. 1.6050B-1 Section 1.6050B-1 Internal Revenue INTERNAL REVENUE SERVICE... § 1.6050B-1 Information returns by person making unemployment compensation payments. For taxable years beginning after December 31, 1978, every person who makes payments of unemployment compensation (as...

  19. Personality-Informed Interventions for Healthy Aging: Conclusions from a National Institute on Aging Work Group

    ERIC Educational Resources Information Center

    Chapman, Benjamin P.; Hampson, Sarah; Clarkin, John

    2014-01-01

    We describe 2 frameworks in which personality dimensions relevant to health, such as Conscientiousness, can be used to inform interventions designed to promote health aging. First, contemporary data and theory do not suggest that personality is "immutable," but instead focus on questions of who changes, in what way, why, when, and how.…

  20. PERSIVAL, a System for Personalized Search and Summarization over Multimedia Healthcare Information.

    ERIC Educational Resources Information Center

    McKeown, Kathleen R.; Chang, Shih-Fu; Cimino, James; Feiner, Steven K.; Friedman, Carol; Gravano, Luis; Hatzivassiloglou, Vasileios; Johnson, Steven; Jordan, Desmond A.; Klavans, Judith L.; Kushniruk, Andre; Patel, Vimla; Teufel, Simone

    This paper reports on the ongoing development of PERSIVAL (Personalized Retrieval and Summarization of Image, Video, and Language), a system designed to provide personalized access to a distributed digital library of medical literature and consumer health information. The goal for PERSIVAL is to tailor search, presentation, and summarization of…

  1. Personality-Informed Interventions for Healthy Aging: Conclusions From a National Institute on Aging Workgroup

    PubMed Central

    Chapman, Benjamin P.; Hampson, Sarah; Clarkin, John

    2013-01-01

    We describe two frameworks in which personality dimensions relevant to health, such as Conscientiousness, can be used to inform interventions designed to promote health aging. First, contemporary data and theory do not suggest that personality is “immutable”, but instead focus on questions of who changes, in what way, why, when, and how. In fact, the notion that personality could be changed was part and parcel of many schools of psychotherapy, which suggested that long term and meaningful change in symptoms could not be achieved without change in relevant aspects of personality. We review intervention research documenting change in personality. Based on an integrative view of personality as a complex system, we describe a “bottom-up” model of change in which interventions to change basic personality processes eventuate in changes at the trait level. A second framework leverages the descriptive and predictive power of personality to tailor individual risk prediction and treatment, as well as refine public health programs, to the relevant dispositional characteristics of the target population. These methods dovetail with and add a systematic and rigorous psychosocial dimension to the personalized medicine and patient-centeredness movements in medicine. In addition to improving health through earlier intervention and increased fit between treatments and persons, cost-effectiveness improvements can be realized by more accurate resource allocation. Numerous examples from the personality, health, and aging literature on Conscientiousness and other traits are provided throughout, and we conclude with a series of recommendations for research in these emerging areas. PMID:23978300

  2. Personality-informed interventions for healthy aging: conclusions from a National Institute on Aging work group.

    PubMed

    Chapman, Benjamin P; Hampson, Sarah; Clarkin, John

    2014-05-01

    We describe 2 frameworks in which personality dimensions relevant to health, such as Conscientiousness, can be used to inform interventions designed to promote health aging. First, contemporary data and theory do not suggest that personality is "immutable," but instead focus on questions of who changes, in what way, why, when, and how. In fact, the notion that personality could be changed was part and parcel of many schools of psychotherapy, which suggested that long-term and meaningful change in symptoms could not be achieved without change in relevant aspects of personality. We review intervention research documenting change in personality. On the basis of an integrative view of personality as a complex system, we describe a bottom-up model of change in which interventions to change basic personality processes eventuate in changes at the trait level. A 2nd framework leverages the descriptive and predictive power of personality to tailor individual risk prediction and treatment, as well as refine public health programs, to the relevant dispositional characteristics of the target population. These methods dovetail with, and add a systematic and rigorous psychosocial dimension to, the personalized medicine and patient-centeredness movements in medicine. In addition to improving health through earlier intervention and increased fit between treatments and persons, cost-effectiveness improvements can be realized by more accurate resource allocation. Numerous examples from the personality, health, and aging literature on Conscientiousness and other traits are provided throughout, and we conclude with a series of recommendations for research in these emerging areas. PMID:23978300

  3. 34 CFR 364.56 - What are the special requirements pertaining to the protection, use, and release of personal...

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... audit, evaluation, and research. Personal information may be released to an organization, agency, or individual engaged in audit, evaluation, or research activities only for purposes directly connected with the... will be released only to persons officially connected with the audit, evaluation, or research; (3)...

  4. 32 CFR 310.17 - Individual access to personal information.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... (32 CFR part 286). If the system of records is exempt from the access provisions of this part, and if... requests processed under the provisions of this part and the FOIA (32 CFR part 286). If the system of... provide information that is disclosable pursuant to the DoD Freedom of Information Act program (see 32...

  5. 32 CFR 310.17 - Individual access to personal information.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... (32 CFR part 286). If the system of records is exempt from the access provisions of this part, and if... requests processed under the provisions of this part and the FOIA (32 CFR part 286). If the system of... provide information that is disclosable pursuant to the DoD Freedom of Information Act program (see 32...

  6. 6 CFR 29.7 - Safeguarding of Protected Critical Infrastructure Information.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 6 Domestic Security 1 2010-01-01 2010-01-01 false Safeguarding of Protected Critical Infrastructure Information. 29.7 Section 29.7 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY PROTECTED CRITICAL INFRASTRUCTURE INFORMATION § 29.7 Safeguarding of Protected Critical Infrastructure Information. (a) Safeguarding....

  7. Dissemination of Information in Developing Countries: The Personal Computer and beyond

    ERIC Educational Resources Information Center

    Wong, Wai-Man

    2005-01-01

    With the blooming of information in digital format, dissemination of information is becoming a big challenge for developing countries. It is not only due to the limited provision of personal computers--in addition, the technological infrastructure and the ability to access information are also becoming major concerns in developing countries. This…

  8. "Doing Ethics" in the Context of Sharing Patients' Personal Health Information

    ERIC Educational Resources Information Center

    Somerville, Margaret A.

    2004-01-01

    There are at present two inconsistencies with respect to the sharing of personal health information (PHI) among health care professionals caring for a patient whom the information concerns. First, there is an inconsistency between what is in theory the ethics and law governing the confidentiality and privacy of this information--it may only be…

  9. Informal Learning in Professional and Personal Life: Implications for Instructional Design and Performance Improvement

    ERIC Educational Resources Information Center

    Klein, James D.; Moore, Alison L.

    2016-01-01

    This article focuses on informal learning and its implications for instructional design and performance improvement. The authors begin by sharing a story of how a novice instructional designer employs informal learning strategies in her professional and personal life. Next, they offer a definition of informal learning that encompasses both…

  10. Adults Living with Type 2 Diabetes: Kept Personal Health Information Items as Expressions of Need

    ERIC Educational Resources Information Center

    Whetstone, Melinda

    2013-01-01

    This study investigated personal information behavior and information needs that 21 adults managing life with Type 2 diabetes identify explicitly and implicitly during discussions of item acquisition and use of health information items that are kept in their homes. Research drew upon a naturalistic lens, in that semi-structured interviews were…

  11. Personalizing Information Retrieval Using Task Features, Topic Knowledge, and Task Products

    ERIC Educational Resources Information Center

    Liu, Jingjing

    2010-01-01

    Personalization of information retrieval tailors search towards individual users to meet their particular information needs by taking into account information about users and their contexts, often through implicit sources of evidence such as user behaviors and contextual factors. The current study looks particularly at users' dwelling behavior,…

  12. 12 CFR 4.37 - Persons and entities with access to OCC information; prohibition on dissemination.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... OUTREACH PROGRAM, POST-EMPLOYMENT RESTRICTIONS FOR SENIOR EXAMINERS § 4.37 Persons and entities with access... dissemination of the information. Effective Date Note: At 75 FR 75576, Dec. 3, 2010, § 4.37 was amended in...

  13. 16 CFR 312.6 - Right of parent to review personal information provided by a child.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... permit the operator's further use or future online collection of personal information from that child... parent of that child, taking into account available technology; and (ii) Not be unduly burdensome to...

  14. 16 CFR 312.6 - Right of parent to review personal information provided by a child.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... permit the operator's further use or future online collection of personal information from that child... parent of that child, taking into account available technology; and (ii) Not be unduly burdensome to...

  15. 32 CFR 505.5 - Individual access to personal information.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... parent. (5) These provisions should allow for the maximum release of information consistent with Army and.... (8) DA activities will not honor any Privacy Act requests for investigative, intelligence, or...

  16. 32 CFR 310.13 - Safeguarding personal information.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ..., subpart C of 32 CFR part 286 (“DoD Freedom of Information Act Program”) as “For Official Use Only,” and... decomposition, pulping, pulverizing, shredding, or mutilation are acceptable. For electronic records, and...

  17. 32 CFR 310.13 - Safeguarding personal information.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ..., subpart C of 32 CFR part 286 (“DoD Freedom of Information Act Program”) as “For Official Use Only,” and... decomposition, pulping, pulverizing, shredding, or mutilation are acceptable. For electronic records, and...

  18. 32 CFR 310.13 - Safeguarding personal information.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ..., subpart C of 32 CFR part 286 (“DoD Freedom of Information Act Program”) as “For Official Use Only,” and... decomposition, pulping, pulverizing, shredding, or mutilation are acceptable. For electronic records, and...

  19. 32 CFR 310.13 - Safeguarding personal information.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ..., subpart C of 32 CFR part 286 (“DoD Freedom of Information Act Program”) as “For Official Use Only,” and... decomposition, pulping, pulverizing, shredding, or mutilation are acceptable. For electronic records, and...

  20. Risk and protective factors for cognitive impairment in persons aged 85 years and older

    PubMed Central

    Cha, Ruth H.; Mielke, Michelle M.; Geda, Yonas E.; Boeve, Bradley F.; Machulda, Mary M.; Knopman, David S.; Petersen, Ronald C.

    2015-01-01

    Objective: To determine risk and protective factors for mild cognitive impairment (MCI) among persons 85 years and older. Methods: Participants in the population-based prospective Mayo Clinic Study of Aging were comprehensively evaluated at baseline and at 15 monthly intervals to determine incident MCI. At baseline, lifestyle factors in midlife and late life were assessed by self-reported questionnaire; vascular and comorbid conditions were abstracted from participants' medical records. Results: Of 256 participants who were cognitively normal at enrollment (median age 87.3 years, 62% women), 121 developed MCI at a median 4.1 years of follow-up. Predictors of MCI were APOE ε4 allele (hazard ratio [HR] 1.89; p = 0.008), current depressive symptoms (HR 1.78; p = 0.02), midlife onset of hypertension (HR 2.43; p = 0.005), increasing number of vascular diseases (HR 1.13; p = 0.02), and chronic conditions from the Charlson Comorbidity Index (HR 1.08; p = 0.006). Models were adjusted for sex and education, with age as the time variable. The risk of MCI was reduced for participants who reported engagement in artistic (HR 0.27; p = 0.03), craft (HR 0.55; p = 0.02), and social (HR 0.45; p = 0.005) activities in both midlife and late life, and in the use of a computer in late life (HR 0.47; p = 0.008). Conclusions: Chronic disease burden increases risk of MCI, whereas certain lifestyle factors reduce risk in persons 85 years and older. This implies that preventive strategies for MCI may need to begin in midlife and should persist throughout late life. PMID:25854867

  1. Automatic detection of protected health information from clinic narratives.

    PubMed

    Yang, Hui; Garibaldi, Jonathan M

    2015-12-01

    This paper presents a natural language processing (NLP) system that was designed to participate in the 2014 i2b2 de-identification challenge. The challenge task aims to identify and classify seven main Protected Health Information (PHI) categories and 25 associated sub-categories. A hybrid model was proposed which combines machine learning techniques with keyword-based and rule-based approaches to deal with the complexity inherent in PHI categories. Our proposed approaches exploit a rich set of linguistic features, both syntactic and word surface-oriented, which are further enriched by task-specific features and regular expression template patterns to characterize the semantics of various PHI categories. Our system achieved promising accuracy on the challenge test data with an overall micro-averaged F-measure of 93.6%, which was the winner of this de-identification challenge. PMID:26231070

  2. Developing COSHH Essentials: dermal exposure, personal protective equipment and first aid.

    PubMed

    Garrod, A N I; Rajan-Sithamparanadarajah, R

    2003-10-01

    The 'control banding' approach in COSHH Essentials combines the potential for harm with the potential for exposure by inhalation to band measures to control exposure at source, as generic strategies. These are simply adapted to specific tasks and circumstances to produce specific control advice. Where it is not possible or practical to use this control advice, the control bands can suggest adequate respiratory protective equipment using 'protection factors'. Proposals in the paper enable the user to identify the right level of respiratory protective equipment (RPE), and to begin selecting suitable RPE. Selection is made through a formatted questionnaire, enabling the user to give the right facts to the supplier. COSHH Essentials applies mainly to exposure by inhalation. However, skin exposure is very common and uptake via the skin can be an important contributor to body dose. This paper examines the factors concerning skin exposure, and the options for banding the potential for harm to the skin or via the skin. Proposals have then been made for dermal exposure control. Planning for emergencies is an important facet of risk control. Proposals are outlined to band chemical hazards for emergency planning according to a minimum of information, i.e. the danger symbol on a product label. PMID:14530184

  3. Interactional Features of Repair Negotiation in NS-NNS Interaction on Two Task Types: Information Gap and Personal Information Exchange

    ERIC Educational Resources Information Center

    Kitajima, Ryu

    2013-01-01

    The studies in task-based approaches in second language acquisition claim that controlled and goal convergent tasks such as information gap tasks surpass open-ended conversations such as personal information exchange tasks for the development of the learner's interlanguage, in that the formers promote more repair negotiation. And yet, few studies…

  4. Network security vulnerabilities and personal privacy issues in Healthcare Information Systems: a case study in a private hospital in Turkey.

    PubMed

    Namoğlu, Nihan; Ulgen, Yekta

    2013-01-01

    Healthcare industry has become widely dependent on information technology and internet as it moves from paper to electronic records. Healthcare Information System has to provide a high quality service to patients and a productive knowledge share between healthcare staff by means of patient data. With the internet being commonly used across hospitals, healthcare industry got its own share from cyber threats like other industries in the world. The challenge is allowing knowledge transfer to hospital staff while still ensuring compliance with security mandates. Working in collaboration with a private hospital in Turkey; this study aims to reveal the essential elements of a 21st century business continuity plan for hospitals while presenting the security vulnerabilities in the current hospital information systems and personal privacy auditing standards proposed by regulations and laws. We will survey the accreditation criteria in Turkey and counterparts in US and EU. We will also interview with medical staff in the hospital to understand the needs for personal privacy and the technical staff to perceive the technical requirements in terms of network security configuration and deployment. As hospitals are adopting electronic transactions, it should be considered a must to protect these electronic health records in terms of personal privacy aspects. PMID:23823398

  5. Information security governance: a risk assessment approach to health information systems protection.

    PubMed

    Williams, Patricia A H

    2013-01-01

    It is no small task to manage the protection of healthcare data and healthcare information systems. In an environment that is demanding adaptation to change for all information collection, storage and retrieval systems, including those for of e-health and information systems, it is imperative that good information security governance is in place. This includes understanding and meeting legislative and regulatory requirements. This chapter provides three models to educate and guide organisations in this complex area, and to simplify the process of information security governance and ensure appropriate and effective measures are put in place. The approach is risk based, adapted and contextualized for healthcare. In addition, specific considerations of the impact of cloud services, secondary use of data, big data and mobile health are discussed. PMID:24018517

  6. 29 CFR Appendix A to Subpart I of... - Non-Mandatory Guidelines for Hazard Assessment, Personal Protective Equipment (PPE) Selection...

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 29 Labor 7 2011-07-01 2011-07-01 false Non-Mandatory Guidelines for Hazard Assessment, Personal Protective Equipment (PPE) Selection, and PPE Training Program A Appendix A to Subpart I of Part 1915 Labor Regulations Relating to Labor (Continued) OCCUPATIONAL SAFETY AND HEALTH ADMINISTRATION, DEPARTMENT OF LABOR (CONTINUED) OCCUPATIONAL SAFETY...

  7. 29 CFR Appendix A to Subpart I of... - Non-Mandatory Guidelines for Hazard Assessment, Personal Protective Equipment (PPE) Selection...

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 29 Labor 7 2010-07-01 2010-07-01 false Non-Mandatory Guidelines for Hazard Assessment, Personal Protective Equipment (PPE) Selection, and PPE Training Program A Appendix A to Subpart I of Part 1915 Labor Regulations Relating to Labor (Continued) OCCUPATIONAL SAFETY AND HEALTH ADMINISTRATION, DEPARTMENT OF LABOR (CONTINUED) OCCUPATIONAL SAFETY...

  8. 29 CFR Appendix B to Subpart I to... - Non-mandatory Compliance Guidelines for Hazard Assessment and Personal Protective Equipment...

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 29 Labor 5 2011-07-01 2011-07-01 false Non-mandatory Compliance Guidelines for Hazard Assessment and Personal Protective Equipment Selection B Appendix B to Subpart I to Part 1910 Labor Regulations Relating to Labor (Continued) OCCUPATIONAL SAFETY AND HEALTH ADMINISTRATION, DEPARTMENT OF LABOR OCCUPATIONAL SAFETY AND HEALTH STANDARDS...

  9. 29 CFR Appendix B to Subpart I to... - Non-mandatory Compliance Guidelines for Hazard Assessment and Personal Protective Equipment...

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 29 Labor 5 2012-07-01 2012-07-01 false Non-mandatory Compliance Guidelines for Hazard Assessment and Personal Protective Equipment Selection B Appendix B to Subpart I to Part 1910 Labor Regulations Relating to Labor (Continued) OCCUPATIONAL SAFETY AND HEALTH ADMINISTRATION, DEPARTMENT OF LABOR OCCUPATIONAL SAFETY AND HEALTH STANDARDS...

  10. Community Violence and Psychological Distress: The Protective Effects of Emotional Social Support and Sense of Personal Control among Older Adolescents

    ERIC Educational Resources Information Center

    Rosenthal, Beth Spenciner; Wilson, W. Cody

    2008-01-01

    This empirical study investigated three mechanisms of protection (preventive, compensatory, buffering) for two factors (emotional social support, sense of personal control) in the relationship between exposure to community violence and psychological distress among 947 diverse, older adolescents. Findings indicate that social support and sense of…

  11. No More "Personal Notes"? Data Protection Policy and Practice in Higher Education Counselling Services in the UK

    ERIC Educational Resources Information Center

    Jenkins, Peter; Potter, Steve

    2007-01-01

    The introduction of the Data Protection Act 1998 has presented significant challenges to counselling recording, through its detailed requirements for the processing of personal data. The impact of these changes on recording in Higher Education counselling services in the UK is explored, using responses from an electronic survey of universities and…

  12. Personal Protective Equipment Use and Safety Behaviors among Farm Adolescents: Gender Differences and Predictors of Work Practices

    ERIC Educational Resources Information Center

    Reed, Deborah B.; Browning, Steven R.; Westneat, Susan C.; Kidd, Pamela S.

    2006-01-01

    Context: Children on farms perform work that places them at risk for acute and chronic negative health outcomes. Despite strategies for preventing and reducing the risk of disease and injury, children's use of personal protective equipment and safety equipped farm machinery has generally remained unreported. Purpose: This paper reports the use of…

  13. Development of personal pollen information-the next generation of pollen information and a step forward for hay fever sufferers.

    PubMed

    Kmenta, Maximilian; Bastl, Katharina; Jäger, Siegfried; Berger, Uwe

    2014-10-01

    Pollen allergies affect a large part of the European population and are considered likely to increase. User feedback indicates that there are difficulties in providing proper information and valid forecasts using traditional methods of aerobiology due to a variety of factors. Allergen content, pollen loads, and pollen allergy symptoms vary per region and year. The first steps in challenging such issues have already been undertaken. A personalized pollen-related symptom forecast is thought to be a possible answer. However, attempts made thus far have not led to an improvement in daily forecasting procedures. This study describes a model that was launched in 2013 in Austria to provide the first available personal pollen information. This system includes innovative forecast models using bi-hourly pollen data, traditional pollen forecasts based on historical data, meteorological data, and recent symptom data from the patient's hayfever diary. Furthermore, it calculates the personal symptom load in real time, in particular, the entries of the previous 5 days, to classify users. The personal pollen information was made available in Austria on the Austrian pollen information website and via a mobile pollen application, described herein for the first time. It is supposed that the inclusion of personal symptoms will lead to major improvements in pollen information concerning hay fever sufferers. PMID:24357491

  14. 32 CFR 505.5 - Individual access to personal information.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... whose records are maintained in a Privacy Act system of records. If a representative acts on their... system of records maintained by a DOD Component may be made to a congressional office from the record of... him or her that is maintained in a Privacy Act system of records, unless— (i) The information...

  15. 32 CFR 505.4 - Collecting personal information.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... language that is explicit, easily understood, and not so lengthy as to deter an individual from reading it... records notice(s). If none, the language to be used is: “Routine Use(s): None. However the ‘Blanket... requested information; (ii) Within the body with a notation of its location below the title; (iii) On...

  16. 32 CFR 505.4 - Collecting personal information.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... language that is explicit, easily understood, and not so lengthy as to deter an individual from reading it... records notice(s). If none, the language to be used is: “Routine Use(s): None. However the ‘Blanket... requested information; (ii) Within the body with a notation of its location below the title; (iii) On...

  17. Ebola virus disease: The use of fluorescents as markers of contamination for personal protective equipment

    PubMed Central

    Bell, Todd; Smoot, John; Patterson, Justin; Smalligan, Roger; Jordan, Richard

    2014-01-01

    The recent Ebola virus disease (EVD) outbreak has created interest in personal protective equipment (PPE) content and usage. PPE testing has historically been done by individual component, rather than as a bundle for contact isolation. Fluorescent agents are commonly used in training for infection control techniques. The purpose of our study was to compare 2 PPE bundles and to evaluate the feasibility of fluorescent markers as an assessment tool for PPE effectiveness. Eight healthcare providers volunteered for this preliminary study. Participants were randomized to 1 of 2 PPE bundles that meet current (October 20, 2014) CDC recommendations. One PPE bundle utilized commercial EVD-recommended components. The other PPE bundle used components already available at local hospitals or retail stores. Participants were also randomized to standard or high volume exposures (HVE) to simulate fluid splash. Each participant was assisted in PPE donning and doffing by an experienced trainer. A training mannequin was contaminated with fluorescent agents to simulate bodily fluids. Participants were then given clinical tasks to care for the EVD “patient.” De-gowned participants were examined under “black light” for fluorescence indicative of contamination. One participant in each PPE arm had evidence of contamination. One of the contamination events was suspected during the patient care exercise. The other contamination event was not suspected until black light examination. In spite of a large difference in cost of PPE, the two bundle arms performed similarly. Bundle testing using fluorescent markers could help identify optimal PPE systems. PMID:26793445

  18. Using Reduced Personal Protective Equipment in an Endemically Infected Mouse Colony

    PubMed Central

    Baker, Samuel W; Prestia, Kevin A; Karolewski, Brian

    2014-01-01

    Personal protective equipment (PPE) frequently is used to reduce the risk of spreading adventitial diseases in rodent colonies. The PPE worn often reflects the historic practices of the research institution rather than published performance data. Standard PPE for a rodent facility typically consists of a disposable hair bonnet, gown, face mask, shoe covers, and gloves, which are donned on facility entry and removed on exiting. This study evaluated the effect of a reduced PPE protocol on disease spread within an endemically infected mouse colony. In the reduced protocol, only the parts of the wearer that came in direct contact with the mice or their environment were covered with PPE. To test the reduced PPE protocol, proven naïve mice were housed in a facility endemically infected with murine norovirus and mouse hepatitis virus for 12 wk. During that time, routine husbandry operations were conducted by using either the standard or reduced PPE protocols. All study mice remained free of virus antibody when reduced PPE was implemented. These results indicate that reduced PPE is adequate for disease containment when correct techniques for handling microisolation caging are used. Reducing the amount of PPE used in an animal facility affords considerable cost savings yet limits the risk of disease spread. PMID:24827569

  19. Research on Personal Protective Equipment for Dual-Use Technology and Technology Transfer

    NASA Technical Reports Server (NTRS)

    Driggers, Donald C.

    1994-01-01

    The National Aeronautics and Space Administration (NASA) places highest priority on the safety of its astronauts and support personnel. Because this is so, and to ensure the continuation of this safety, the agency has undertaken to thoroughly research and develop and provide personal protective equipment (PPE) and individual life support systems (LSS) in support of manned spaceflight. It is probable that technology developed for manned spaceflight in the field of PPE and individual LSS can be utilized in certain industrial/commercial endeavors. In an attempt to determine these other uses for this PPE and individual LSS, the Space Suit Systems Branch of the NASA JSC Crew Systems Division initiated a research project designed to access potential common technology that could benefit industry. Such dual-use technology transfer could eventually involve a joint effort by Government and industry. The research project took place over several months and involved discussions with various manufacturers/suppliers/users, as well as regulatory agencies and industries, of PPE and individual LSS. Research data was compiled and evaluated and a summary of significant findings is presented for identifying and establishing opportunities for future cooperation between Government and industry in the field of PPE and individual LSS.

  20. Attitude towards personal protective equipment in the French nuclear fuel industry.

    PubMed

    Guseva Canu, Irina; Faust, Ségolène; Canioni, Pierre; Collomb, Philippe; Samson, Eric; Laurier, Dominique

    2013-06-01

    This descriptive cross-sectional study examines the compliance of workers from the European Gaseous Diffusion Uranium Enrichment Consortium (EURODIF) with personal protection equipment (PPE) in view of the various hazards in the nuclear fuel industry. The PPE inventory was drawn up by an industrial hygienist in charge of the PPE at EURODIF. Two hundred and twenty seven (10%) randomly selected, active and retired, EURODIF workers filled in a questionnaire on their attitudes towards PPE. Exposure data from the EURODIF job exposure matrix were used to examine whether PPE usage varies according to exposure level. The study suggests a PPE usage profile that varies depending on the hazards present and PPE available. Anti-uranium PPE and gloves were among the best rated, while anti-spray goggles were the least used. We found that, for most hazards known to cause cancer or irreversible health damage, PPE usage varied according to exposure (homogeneity test, p<0.05; trend test, p<0.05). The continuous use of PPE among workers should be encouraged through improvements to the PPE management system. A precise model of individual exposure can only be designed if the use and efficiency of PPE are taken into consideration. PMID:23819938

  1. Development of a draft British standard: the assessment of heat strain for workers wearing personal protective equipment.

    PubMed

    Hanson, M A

    1999-07-01

    Existing methods for estimating heat stress, enshrined in British/International Standards (the Wet Bulb Globe Temperature (WBGT) index [BS EN 27243] and the Required Sweat Rate equation [BS EN 12515; ISO 7933 modified]), assume that the clothing worn by the individual is water vapour permeable; the WBGT index also assumes that the clothing is relatively light. Because most forms of personal protective equipment (PPE) either have a higher insulative value than that assumed or are water vapour impermeable, the Standards cannot be accurately applied to workers wearing PPE. There was, therefore, a need to develop a British Standard which would allow interpretation of these existing Standards for workers wearing PPE. Relevant information was obtained through reviewing the literature and consulting experts. Two questionnaire surveys of potential users of the Standards were conducted, and physiological data collected both experimentally and in work situations were considered. The information collected was used to develop the draft British Standard. It provides information and data on: The general effect of PPE on heat balance of the body (the ability of the body to maintain its 'core' temperature within an acceptable range). The effect of specific forms of PPE on metabolic heat production rate. The thermal insulation and evaporative resistance of types of PPE. The effect of the closure of the garments to the body on heat transfer. The effect of the PPE on the proportion of the body covered. The effect of an air supply (for example, Breathing Apparatus [BA]) to the wearer. Guidance is given on conducting an analysis of the work situation, taking account of the impact of PPE. Detailed methods of interpreting both BS EN 27243 and BS EN 12515 for workers wearing PPE are given, taking account of the factors listed above. Three worked examples using BS EN 27243 and BS EN 12515 are given in the Annex of the draft Standard. PMID:10481630

  2. National Perspectives on Data Protection.

    ERIC Educational Resources Information Center

    Yurow, Jane

    1983-01-01

    Discussion of different approaches to protecting personal information in Europe and the United States highlights data protection laws and agreements (international transfer of personal data, European laws, United States state and federal laws), United States and European views of privacy protection, national economic and political goals, and…

  3. Defining Requirements and Applying Information Modeling for Protecting Enterprise Assets

    NASA Astrophysics Data System (ADS)

    Fortier, Stephen C.; Volk, Jennifer H.

    The advent of terrorist threats has heightened local, regional, and national governments' interest in emergency response and disaster preparedness. The threat of natural disasters also challenges emergency responders to act swiftly and in a coordinated fashion. When a disaster occurs, an ad hoc coalition of pre-planned groups usually forms to respond to the incident. History has shown that these “system of systems” do not interoperate very well. Communications between fire, police and rescue components either do not work or are inefficient. Government agencies, non-governmental organizations (NGOs), and private industry use a wide array of software platforms for managing data about emergency conditions, resources and response activities. Most of these are stand-alone systems with very limited capability for data sharing with other agencies or other levels of government. Information technology advances have facilitated the movement towards an integrated and coordinated approach to emergency management. Other communication mechanisms, such as video teleconferencing, digital television and radio broadcasting, are being utilized to combat the challenges of emergency information exchange. Recent disasters, such as Hurricane Katrina and the tsunami in Indonesia, have illuminated the weaknesses in emergency response. This paper will discuss the need for defining requirements for components of ad hoc coalitions which are formed to respond to disasters. A goal of our effort was to develop a proof of concept that applying information modeling to the business processes used to protect and mitigate potential loss of an enterprise was feasible. These activities would be modeled both pre- and post-incident.

  4. Public, private and personal: Qualitative research on policymakers' opinions on smokefree interventions to protect children in 'private' spaces

    PubMed Central

    2010-01-01

    Background Governments use law to constrain aspects of private activities for purposes of protecting health and social wellbeing. Policymakers have a range of perceptions and beliefs about what is public or private. An understanding of the possible drivers of policymaker decisions about where government can or should intervene for health is important, as one way to better guide appropriate policy formation. Our aim was to identify obstacles to, and opportunities for, government smokefree regulation of private and public spaces to protect children. In particular, to seek policymaker opinions on the regulation of smoking in homes, cars and public parks and playgrounds in a country with incomplete smokefree laws (New Zealand). Methods Case study, using structured interviews to ask policymakers (62 politicians and senior officials) about their opinions on new smokefree legislation for public and private places. Supplementary data was obtained from the Factiva media database, on the views of New Zealand local authority councillors about policies for smokefree outdoor public places. Results Overall, interviewees thought that government regulation of smoking in private places was impractical and unwise. However, there were some differences on what was defined as 'private', particularly for cars. Even in public parks, smoking was seen by some as a 'personal' decision, and unlikely to be amenable to regulation. Most participants believed that educative, supportive and community-based measures were better and more practical means of reducing smoking in private places, compared to regulation. Conclusions The constrained view of the role of regulation of smoking in public and private domains may be in keeping with current political discourse in New Zealand and similar Anglo-American countries. Policy and advocacy options to promote additional smokefree measures include providing a better voice for childrens' views, increasing information to policymakers about the harms to

  5. 40 CFR 174.9 - Confidential business information claims for plant-incorporated protectant submissions.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 40 Protection of Environment 24 2014-07-01 2014-07-01 false Confidential business information claims for plant-incorporated protectant submissions. 174.9 Section 174.9 Protection of Environment...-incorporated protectant submissions. Although it is strongly recommended that the submitter minimize the...

  6. 40 CFR 174.9 - Confidential business information claims for plant-incorporated protectant submissions.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 40 Protection of Environment 24 2011-07-01 2011-07-01 false Confidential business information claims for plant-incorporated protectant submissions. 174.9 Section 174.9 Protection of Environment...-incorporated protectant submissions. Although it is strongly recommended that the submitter minimize the...

  7. 40 CFR 174.9 - Confidential business information claims for plant-incorporated protectant submissions.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 40 Protection of Environment 25 2013-07-01 2013-07-01 false Confidential business information claims for plant-incorporated protectant submissions. 174.9 Section 174.9 Protection of Environment...-incorporated protectant submissions. Although it is strongly recommended that the submitter minimize the...

  8. 40 CFR 174.9 - Confidential business information claims for plant-incorporated protectant submissions.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 40 Protection of Environment 25 2012-07-01 2012-07-01 false Confidential business information claims for plant-incorporated protectant submissions. 174.9 Section 174.9 Protection of Environment...-incorporated protectant submissions. Although it is strongly recommended that the submitter minimize the...

  9. 6 CFR 29.8 - Disclosure of Protected Critical Infrastructure Information.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 6 Domestic Security 1 2013-01-01 2013-01-01 false Disclosure of Protected Critical Infrastructure... PROTECTED CRITICAL INFRASTRUCTURE INFORMATION § 29.8 Disclosure of Protected Critical Infrastructure... Infrastructure Protection, or either's designee may choose to provide or authorize access to PCII under one...

  10. 6 CFR 29.8 - Disclosure of Protected Critical Infrastructure Information.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 6 Domestic Security 1 2014-01-01 2014-01-01 false Disclosure of Protected Critical Infrastructure... PROTECTED CRITICAL INFRASTRUCTURE INFORMATION § 29.8 Disclosure of Protected Critical Infrastructure... Infrastructure Protection, or either's designee may choose to provide or authorize access to PCII under one...

  11. 6 CFR 29.8 - Disclosure of Protected Critical Infrastructure Information.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 6 Domestic Security 1 2011-01-01 2011-01-01 false Disclosure of Protected Critical Infrastructure... PROTECTED CRITICAL INFRASTRUCTURE INFORMATION § 29.8 Disclosure of Protected Critical Infrastructure... Infrastructure Protection, or either's designee may choose to provide or authorize access to PCII under one...

  12. 6 CFR 29.8 - Disclosure of Protected Critical Infrastructure Information.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 6 Domestic Security 1 2010-01-01 2010-01-01 false Disclosure of Protected Critical Infrastructure... PROTECTED CRITICAL INFRASTRUCTURE INFORMATION § 29.8 Disclosure of Protected Critical Infrastructure... Infrastructure Protection, or either's designee may choose to provide or authorize access to PCII under one...

  13. Chemical exposure reduction: Factors impacting on South African herbicide sprayers' personal protective equipment compliance and high risk work practices.

    PubMed

    Andrade-Rivas, Federico; Rother, Hanna-Andrea

    2015-10-01

    The high exposure risks of workers to herbicides in low- and middle-income countries is an important public health concern because of the potential resulting negative impacts on workers' health. This study investigated workers' personal protective equipment (PPE) compliance as a risk mitigation measure; particularly workers who apply herbicides for Working for Water (WfW) - a South African invasive alien vegetation control programme. The study aim was to understand workers' low PPE compliance by analysing their risk perceptions of herbicide use, working conditions and socio-cultural context. Research methods included ethnographic observations, informal interviews, visual media, questionnaires and a focus group. Study results indicated that low PPE compliance persists despite workers' awareness of herbicide exposure risks and as a result of the influence from workers' socio-cultural context (i.e. gender dynamics and social status), herbicide risk perceptions and working conditions (i.e. environmental and logistical). Interestingly, teams comprised of mostly women had the highest compliance rate. These findings highlighted that given the complexity of PPE compliance, especially in countries with several economic and social constraints, exposure reduction interventions should not rely solely on PPE use promotion. Instead, other control strategies requiring less worker input for effectiveness should be implemented, such as elimination and substitution of highly hazardous pesticides, and altering application methods. PMID:26093240

  14. 41 CFR 102-41.150 - What special information do we provide on reports of unclaimed personal property?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... do we provide on reports of unclaimed personal property? 102-41.150 Section 102-41.150 Public... MANAGEMENT REGULATION PERSONAL PROPERTY 41-DISPOSITION OF SEIZED, FORFEITED, VOLUNTARILY ABANDONED, AND UNCLAIMED PERSONAL PROPERTY Unclaimed Personal Property § 102-41.150 What special information do we...

  15. 10 CFR 73.23 - Protection of Safeguards Information-Modified Handling: Specific requirements.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... National Institute of Standards and Technology (NIST) has validated as conforming to Federal Information... 10 Energy 2 2010-01-01 2010-01-01 false Protection of Safeguards Information-Modified Handling... PROTECTION OF PLANTS AND MATERIALS General Provisions § 73.23 Protection of Safeguards...

  16. 6 CFR 29.4 - Protected Critical Infrastructure Information Program administration.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ...) Ensure the secure sharing of PCII with appropriate authorities and individuals, as set forth in 6 CFR 29... 6 Domestic Security 1 2014-01-01 2014-01-01 false Protected Critical Infrastructure Information... SECRETARY PROTECTED CRITICAL INFRASTRUCTURE INFORMATION § 29.4 Protected Critical Infrastructure...

  17. 6 CFR 29.4 - Protected Critical Infrastructure Information Program administration.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ...) Ensure the secure sharing of PCII with appropriate authorities and individuals, as set forth in 6 CFR 29... 6 Domestic Security 1 2012-01-01 2012-01-01 false Protected Critical Infrastructure Information... SECRETARY PROTECTED CRITICAL INFRASTRUCTURE INFORMATION § 29.4 Protected Critical Infrastructure...

  18. 6 CFR 29.4 - Protected Critical Infrastructure Information Program administration.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ...) Ensure the secure sharing of PCII with appropriate authorities and individuals, as set forth in 6 CFR 29... 6 Domestic Security 1 2013-01-01 2013-01-01 false Protected Critical Infrastructure Information... SECRETARY PROTECTED CRITICAL INFRASTRUCTURE INFORMATION § 29.4 Protected Critical Infrastructure...

  19. 6 CFR 29.4 - Protected Critical Infrastructure Information Program administration.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ...) Ensure the secure sharing of PCII with appropriate authorities and individuals, as set forth in 6 CFR 29... 6 Domestic Security 1 2010-01-01 2010-01-01 false Protected Critical Infrastructure Information... SECRETARY PROTECTED CRITICAL INFRASTRUCTURE INFORMATION § 29.4 Protected Critical Infrastructure...

  20. 6 CFR 29.4 - Protected Critical Infrastructure Information Program administration.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ...) Ensure the secure sharing of PCII with appropriate authorities and individuals, as set forth in 6 CFR 29... 6 Domestic Security 1 2011-01-01 2011-01-01 false Protected Critical Infrastructure Information... SECRETARY PROTECTED CRITICAL INFRASTRUCTURE INFORMATION § 29.4 Protected Critical Infrastructure...

  1. Survey of Health Professionals' Information Habits and Needs Through Personal Interviews.

    ERIC Educational Resources Information Center

    Stinson, E. Ray; Mueller, Dorothy A.

    The first of three phases of a project to develop a Comprehensive Integrated Cancer Information System (CICIS) consisted of a survey which was conducted through personal interviews with 402 Alabama health professionals to determine their sources of health information. Type of practice, location of practice, age, size of hospital, and specialty…

  2. 32 CFR 1900.32 - Procedures for information concerning other persons.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 32 National Defense 6 2014-07-01 2014-07-01 false Procedures for information concerning other persons. 1900.32 Section 1900.32 National Defense Other Regulations Relating to National Defense CENTRAL INTELLIGENCE AGENCY PUBLIC ACCESS TO CIA RECORDS UNDER THE FREEDOM OF INFORMATION ACT (FOIA)...

  3. 32 CFR 1900.32 - Procedures for information concerning other persons.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 32 National Defense 6 2010-07-01 2010-07-01 false Procedures for information concerning other persons. 1900.32 Section 1900.32 National Defense Other Regulations Relating to National Defense CENTRAL INTELLIGENCE AGENCY PUBLIC ACCESS TO CIA RECORDS UNDER THE FREEDOM OF INFORMATION ACT (FOIA)...

  4. 32 CFR 1900.32 - Procedures for information concerning other persons.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 32 National Defense 6 2012-07-01 2012-07-01 false Procedures for information concerning other persons. 1900.32 Section 1900.32 National Defense Other Regulations Relating to National Defense CENTRAL INTELLIGENCE AGENCY PUBLIC ACCESS TO CIA RECORDS UNDER THE FREEDOM OF INFORMATION ACT (FOIA)...

  5. 17 CFR 160.10 - Limits on disclosure of nonpublic personal information to nonaffiliated third parties.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 17 Commodity and Securities Exchanges 1 2010-04-01 2010-04-01 false Limits on disclosure of nonpublic personal information to nonaffiliated third parties. 160.10 Section 160.10 Commodity and Securities Exchanges COMMODITY FUTURES TRADING COMMISSION PRIVACY OF CONSUMER FINANCIAL INFORMATION Limits on Disclosures § 160.10 Limits on disclosure...

  6. 32 CFR 1800.32 - Procedures for information concerning other persons.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 32 National Defense 6 2012-07-01 2012-07-01 false Procedures for information concerning other persons. 1800.32 Section 1800.32 National Defense Other Regulations Relating to National Defense NATIONAL COUNTERINTELLIGENCE CENTER PUBLIC ACCESS TO NACIC RECORDS UNDER THE FREEDOM OF INFORMATION ACT (FOIA)...

  7. 32 CFR 1800.32 - Procedures for information concerning other persons.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 32 National Defense 6 2013-07-01 2013-07-01 false Procedures for information concerning other persons. 1800.32 Section 1800.32 National Defense Other Regulations Relating to National Defense NATIONAL COUNTERINTELLIGENCE CENTER PUBLIC ACCESS TO NACIC RECORDS UNDER THE FREEDOM OF INFORMATION ACT (FOIA)...

  8. 32 CFR 1800.32 - Procedures for information concerning other persons.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 32 National Defense 6 2010-07-01 2010-07-01 false Procedures for information concerning other persons. 1800.32 Section 1800.32 National Defense Other Regulations Relating to National Defense NATIONAL COUNTERINTELLIGENCE CENTER PUBLIC ACCESS TO NACIC RECORDS UNDER THE FREEDOM OF INFORMATION ACT (FOIA)...

  9. 32 CFR 1800.32 - Procedures for information concerning other persons.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 32 National Defense 6 2011-07-01 2011-07-01 false Procedures for information concerning other persons. 1800.32 Section 1800.32 National Defense Other Regulations Relating to National Defense NATIONAL COUNTERINTELLIGENCE CENTER PUBLIC ACCESS TO NACIC RECORDS UNDER THE FREEDOM OF INFORMATION ACT (FOIA)...

  10. 32 CFR 1800.32 - Procedures for information concerning other persons.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 32 National Defense 6 2014-07-01 2014-07-01 false Procedures for information concerning other persons. 1800.32 Section 1800.32 National Defense Other Regulations Relating to National Defense NATIONAL COUNTERINTELLIGENCE CENTER PUBLIC ACCESS TO NACIC RECORDS UNDER THE FREEDOM OF INFORMATION ACT (FOIA)...

  11. 19 CFR 356.9 - Persons authorized to receive proprietary information.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 19 Customs Duties 3 2014-04-01 2014-04-01 false Persons authorized to receive proprietary information. 356.9 Section 356.9 Customs Duties INTERNATIONAL TRADE ADMINISTRATION, DEPARTMENT OF COMMERCE PROCEDURES AND RULES FOR IMPLEMENTING ARTICLE 1904 OF THE NORTH AMERICAN FREE TRADE AGREEMENT Proprietary and Privileged Information § 356.9...

  12. Influences of Formal Learning, Personal Learning Orientation, and Supportive Learning Environment on Informal Learning

    ERIC Educational Resources Information Center

    Choi, Woojae; Jacobs, Ronald L.

    2011-01-01

    While workplace learning includes formal and informal learning, the relationship between the two has been overlooked, because they have been viewed as separate entities. This study investigated the effects of formal learning, personal learning orientation, and supportive learning environment on informal learning among 203 middle managers in Korean…

  13. Information Needs of Family Caregivers of Persons with Cognitive versus Physical Deficits

    ERIC Educational Resources Information Center

    Koenig, Kelly N.; Steiner, Victoria; Pierce, Linda L.

    2011-01-01

    This study compared information needs of caregivers of persons with dementia with caregivers of those who received rehabilitation treatment. Caregivers were provided a 48-item survey and asked to choose their top ten information needs. Dementia caregivers' (n = 33) top needs were dealing with forgetfulness/confusion (91%) and repeating…

  14. 32 CFR 1900.32 - Procedures for information concerning other persons.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 32 National Defense 6 2011-07-01 2011-07-01 false Procedures for information concerning other persons. 1900.32 Section 1900.32 National Defense Other Regulations Relating to National Defense CENTRAL INTELLIGENCE AGENCY PUBLIC ACCESS TO CIA RECORDS UNDER THE FREEDOM OF INFORMATION ACT (FOIA)...

  15. 32 CFR 1900.32 - Procedures for information concerning other persons.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 32 National Defense 6 2013-07-01 2013-07-01 false Procedures for information concerning other persons. 1900.32 Section 1900.32 National Defense Other Regulations Relating to National Defense CENTRAL INTELLIGENCE AGENCY PUBLIC ACCESS TO CIA RECORDS UNDER THE FREEDOM OF INFORMATION ACT (FOIA)...

  16. Design Considerations for Today's Online Learners: A Study of Personalized, Relationship-Based Social Awareness Information

    ERIC Educational Resources Information Center

    Heo, Misook

    2009-01-01

    This article examined online learners' preferences in personalized, relationship-based social awareness information sharing in course management systems. Three hundred seventy-seven online learners' willingness to share social awareness information was measured through a national survey. Results indicated that today's online learners are open…

  17. 45 CFR 155.260 - Privacy and security of personally identifiable information.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 45 Public Welfare 1 2013-10-01 2013-10-01 false Privacy and security of personally identifiable information. 155.260 Section 155.260 Public Welfare DEPARTMENT OF HEALTH AND HUMAN SERVICES REQUIREMENTS... Medicaid, CHIP or the BHP for the exchange of eligibility information must: (1) Meet any...

  18. Personality Traits and Group-Based Information Behaviour: An Exploratory Study

    ERIC Educational Resources Information Center

    Hyldegard, Jette

    2009-01-01

    Introduction: The relationship between hypothesised behaviour resulting from a personality test and actual information behaviour resulting from a group-based assignment process is addressed in this paper. Methods: Three voluntary groups of ten librarianship and information science students were followed during a project assignment. The long…

  19. 17 CFR 248.10 - Limits on disclosure of nonpublic personal information to nonaffiliated third parties.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Limits on disclosure of nonpublic personal information to nonaffiliated third parties. 248.10 Section 248.10 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION (CONTINUED) REGULATIONS S-P AND S-AM Regulation S-P: Privacy of Consumer Financial Information...

  20. Real-life experience with personally familiar faces enhances discrimination based on global information

    PubMed Central

    Van Belle, Goedele

    2016-01-01

    Despite the agreement that experience with faces leads to more efficient processing, the underlying mechanisms remain largely unknown. Building on empirical evidence from unfamiliar face processing in healthy populations and neuropsychological patients, the present experiment tested the hypothesis that personal familiarity is associated with superior discrimination when identity information is derived based on global, as opposed to local facial information. Diagnosticity and availability of local and global information was manipulated through varied physical similarity and spatial resolution of morph faces created from personally familiar or unfamiliar faces. We found that discrimination of subtle changes between highly similar morph faces was unaffected by familiarity. Contrariwise, relatively more pronounced physical (i.e., identity) differences were more efficiently discriminated for personally familiar faces, indicating more efficient processing of global, as opposed to local facial information through real-life experience. PMID:26855852

  1. Accuracy of Judgments of Personality Based on Textual Information on Major Life Domains.

    PubMed

    Borkenau, Peter; Mosch, Alice; Tandler, Nancy; Wolf, Annegret

    2016-04-01

    We studied the accuracy of personality impressions relying on textual information on important life domains. Specifically, how is accuracy moderated by the trait being judged, information being provided, judgeability of target persons, and perceptiveness of judges? A sample of 208 students was recruited in groups of four mutual acquaintances who described themselves and each other on a measure of the Five-Factor Model of personality. Moreover, they wrote essays on their hobbies, friends, family, academic studies, and plans for the future and provided self-reports on possible predictors of expressive accuracy. The essays were delivered to 130 strangers who reported their impressions of the personality of the targets and provided self-reports on possible predictors of perceptive accuracy. Accuracy was measured by correlating these impressions with the descriptions of the targets by their acquaintances. The judges used the available information efficiently. Overall, impressions of Openness to Experience were most accurate, but accuracy depended on the information being provided. Several predictors of expressive and perceptive accuracy were identified using Biesanz's (2010) social accuracy model. The results advance our understanding of factors contributing to and moderating the accuracy of personality impressions based on textual information. PMID:25417640

  2. Towards a personalized environmental health information service using low-cost sensors and crowdsourcing

    NASA Astrophysics Data System (ADS)

    Castell, Nuria; Liu, Hai-Ying; Schneider, Philipp; Cole-Hunter, Tom; Lahoz, William; Bartonova, Alena

    2015-04-01

    Most European cities exceed the air quality guidelines established by the WHO to protect human health. As such, citizens are exposed to potentially harmful pollutant levels. Some cities have services (e.g., web pages, mobile apps, etc.) which provide timely air quality information to the public. However, air quality data at individual level is currently scarce or non-existent. Making this information directly useful to individuals poses a challenge. For instance, if a user is informed that the air quality is "poor", what does that mean for him/her, and how can this information be acted upon? Despite individuals having a unique relationship with their environment, the information on the state of atmospheric components and related hazards is currently mostly generic, and seldom personally relevant. This undermines citizens' interest in their environment, and consequently limits their ability to recognize and change both their contribution and their exposure to air pollution. In Oslo, two EU founded projects, CITI-SENSE (Engelken-Jorge et al., 2014) and Citi-Sense-MOB (Castell et al., 2014), are trying to establish a dialogue with citizens by providing them with the possibility of getting personalized air quality information on their smartphones. The users are able to check the air quality in their immediate surroundings and track their individual exposure while moving through the urban environment (Castell et al., 2014). In this way, they may be able to reduce their exposure such as by changing transport modes or routes, for example by selecting less polluted streets to walk or cycle through. Using a smartphone application, citizens are engaged in collecting and sharing environmental data generated by low-cost air quality sensors, and in reporting their individual perception (turning citizens into sensors themselves). The highly spatially resolved data on air quality and perception is geo-located. This allows for simultaneous visualization of both kinds of the sensor

  3. Sharing personal health information via service-oriented computing: a case of long-term care.

    PubMed

    Lin, Yung-Hsiu; Chen, Rong-Rong; Guo, Sophie Huey-Ming; Chiang, Su-Chien; Chang, Her-Kun

    2012-12-01

    Sharing personal health information among healthcare providers is a crucial business process not only for saving limited healthcare resources but also for increasing patient's healthcare quality. Building an effective personal health information sharing process from established healthcare systems is a challenge in terms of coordination different business operations among healthcare providers and restructuring technical details existed in different healthcare information systems. This study responds this challenge with a service-oriented approach and develops a business software application to describe how the challenge can be alleviated from both managerial and technical perspectives. The software application in this study depicts personal health information sharing process among different providers in a long-term care setting. The information sharing scenario is based on an industrial initiative, such as Integrating the Healthcare Enterprise (IHE) from healthcare domain and the technologies for implementing the scenario are Web Service technologies from Service-oriented computing paradigm. The implementation in this study can inform healthcare researchers and practitioners applying technologies from service-oriented computing to design and develop healthcare collaborative systems to meet the increasing need for personal health information sharing. PMID:22366977

  4. 75 FR 52768 - National Protection and Programs Directorate; Agency Information Collection Activities: Office of...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-08-27

    ... training program to improve security in the chemical industry sector. Information is automatically.... chemical industry direct employment is about 850,000 (2009 per the American Chemistry Council... Infrastructure Protection; Chemical Security Awareness Training Program AGENCY: National Protection and...

  5. 20 CFR 401.110 - Disclosure of personal information in nonprogram records without the consent of the subject of...

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... be disclosed under the Freedom of Information Act, 5 U.S.C. 552, and 20 CFR part 402. (c) For a... 20 Employees' Benefits 2 2010-04-01 2010-04-01 false Disclosure of personal information in... Disclosure of Official Records and Information § 401.110 Disclosure of personal information in...

  6. Comparison groups on bills: Automated, personalized energy information

    SciTech Connect

    Iyer, Maithili; Kempton, Willett; Payne, Christopher

    2006-07-01

    A program called ``Innovative Billing?? has been developed to provide individualized energy information for a mass audience?the entireresidential customer base of an electric or gas utility. Customers receive a graph on the bill that compares that customer?s consumption with othersimilar customers for the same month. The program aims to stimulate customers to make ef?ciency improvements. To group as many as severalmillion customers into small ``comparison groups??, an automated method must be developed drawing solely from the data available to the utility.This paper develops and applies methods to compare the quality of resulting comparison groups.A data base of 114,000 customers from a utility billing system was used to evaluate Innovative Billing comparison groups, comparing fouralternative criteria: house characteristics (?oor area, housing type, and heating fuel); street; meter read route; billing cycle. Also, customers wereinterviewed to see what forms of comparison graphs made most sense and led to fewest errors of interpretation. We ?nd that good qualitycomparison groups result from using street name, meter book, or multiple house characteristics. Other criteria we tested, such as entire cycle, entiremeter book, or single house characteristics such as ?oor area, resulted in poor quality comparison groups. This analysis provides a basis forchoosing comparison groups based on extensive user testing and statistical analysis. The result is a practical set of guidelines that can be used toimplement realistic, inexpensive innovative billing for the entire customer base of an electric or gas utility.

  7. The inadvertent disclosure of personal health information through peer-to-peer file sharing programs

    PubMed Central

    Neri, Emilio; Jonker, Elizabeth; Sokolova, Marina; Peyton, Liam; Neisa, Angelica; Scassa, Teresa

    2010-01-01

    Objective There has been a consistent concern about the inadvertent disclosure of personal information through peer-to-peer file sharing applications, such as Limewire and Morpheus. Examples of personal health and financial information being exposed have been published. We wanted to estimate the extent to which personal health information (PHI) is being disclosed in this way, and compare that to the extent of disclosure of personal financial information (PFI). Design After careful review and approval of our protocol by our institutional research ethics board, files were downloaded from peer-to-peer file sharing networks and manually analyzed for the presence of PHI and PFI. The geographic region of the IP addresses was determined, and classified as either USA or Canada. Measurement We estimated the proportion of files that contain personal health and financial information for each region. We also estimated the proportion of search terms that return files with personal health and financial information. We ascertained and discuss the ethical issues related to this study. Results Approximately 0.4% of Canadian IP addresses had PHI, as did 0.5% of US IP addresses. There was more disclosure of financial information, at 1.7% of Canadian IP addresses and 4.7% of US IP addresses. An analysis of search terms used in these file sharing networks showed that a small percentage of the terms would return PHI and PFI files (ie, there are people successfully searching for PFI and PHI on the peer-to-peer file sharing networks). Conclusion There is a real risk of inadvertent disclosure of PHI through peer-to-peer file sharing networks, although the risk is not as large as for PFI. Anyone keeping PHI on their computers should avoid installing file sharing applications on their computers, or if they have to use such tools, actively manage the risks of inadvertent disclosure of their, their family's, their clients', or patients' PHI. PMID:20190057

  8. Chest Compression With Personal Protective Equipment During Cardiopulmonary Resuscitation: A Randomized Crossover Simulation Study.

    PubMed

    Chen, Jie; Lu, Kai-Zhi; Yi, Bin; Chen, Yan

    2016-04-01

    Following a chemical, biological, radiation, and nuclear incident, prompt cardiopulmonary resuscitation (CPR) procedure is essential for patients who suffer cardiac arrest. But CPR when wearing personal protection equipment (PPE) before decontamination becomes a challenge for healthcare workers (HCW). Although previous studies have assessed the impact of PPE on airway management, there is little research available regarding the quality of chest compression (CC) when wearing PPE.A present randomized cross-over simulation study was designed to evaluate the effect of PPE on CC performance using mannequins.The study was set in one university medical center in the China.Forty anesthesia residents participated in this randomized cross-over study.Each participant performed 2 min of CC on a manikin with and without PPE, respectively. Participants were randomized into 2 groups that either performed CC with PPE first, followed by a trial without PPE after a 180-min rest, or vice versa.CPR recording technology was used to objectively quantify the quality of CC. Additionally, participants' physiological parameters and subjective fatigue score values were recorded.With the use of PPE, a significant decrease of the percentage of effective compressions (41.3 ± 17.1% with PPE vs 67.5 ± 15.6% without PPE, P < 0.001) and the percentage of adequate compressions (67.7 ± 18.9% with PPE vs 80.7 ± 15.5% without PPE, P < 0.001) were observed. Furthermore, the increases in heart rate, mean arterial pressure, and subjective fatigue score values were more obvious with the use of PPE (all P < 0.01).We found significant deterioration of CC performance in HCW with the use of a level-C PPE, which may be a disadvantage for enhancing survival of cardiac arrest. PMID:27057878

  9. Ebola Response: Modeling the Risk of Heat Stress from Personal Protective Clothing

    PubMed Central

    Potter, Adam W.; Gonzalez, Julio A.; Xu, Xiaojiang

    2015-01-01

    Introduction A significant number of healthcare workers have responded to aid in the relief and containment of the 2013 Ebola virus disease (EVD) outbreak in West Africa. Healthcare workers are required to wear personal protective clothing (PPC) to impede the transmission of the virus; however, the impermeable design and the hot humid environment lead to risk of heat stress. Objective Provide healthcare workers quantitative modeling and analysis to aid in the prevention of heat stress while wearing PPC in West Africa. Methods A sweating thermal manikin was used to measure the thermal (Rct) and evaporative resistance (Ret) of the five currently used levels of PPC for healthcare workers in the West Africa EVD response. Mathematical methods of predicting the rise in core body temperature (Tc) in response to clothing, activity, and environment was used to simulate different responses to PPC levels, individual body sizes, and two hot humid conditions: morning/evening (air temperature: 25°C, relative humidity: 40%, mean radiant temperature: 35°C, wind velocity: 1 m/s) and mid-day (30°C, 60%, 70°C, 1 m/s). Results Nearly still air (0.4 m/s) measures of Rct ranged from 0.18 to 0.26 m2 K/W and Ret ranged from 25.53 to 340.26 m2 Pa/W. Conclusion Biophysical assessments and modeling in this study provide quantitative guidance for prevention of heat stress of healthcare workers wearing PPC responding to the EVD outbreak in West Africa. PMID:26575389

  10. Information Policy in the European Community: Balancing Protection and Competition.

    ERIC Educational Resources Information Center

    Sillince, J. A. A.

    1994-01-01

    Discusses European Community policy relating to information technology and the information industry. Topics addressed include the information services industry; transborder information flow, including electronic mail, data owner responsibility, and software piracy; digital data networks; electronic data interchange; telecommunications; information…

  11. 32 CFR 2004.21 - Protection of Classified Information [201(e)].

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 32 National Defense 6 2012-07-01 2012-07-01 false Protection of Classified Information . 2004.21... DIRECTIVE NO. 1 Operations § 2004.21 Protection of Classified Information . Procedures for the safeguarding of classified information by contractors are promulgated in the NISPOM. DoD, as the Executive...

  12. 32 CFR 2004.21 - Protection of Classified Information [201(e)].

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 32 National Defense 6 2013-07-01 2013-07-01 false Protection of Classified Information . 2004.21... DIRECTIVE NO. 1 Operations § 2004.21 Protection of Classified Information . Procedures for the safeguarding of classified information by contractors are promulgated in the NISPOM. DoD, as the Executive...

  13. 32 CFR 2004.21 - Protection of Classified Information [201(e)].

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 32 National Defense 6 2011-07-01 2011-07-01 false Protection of Classified Information . 2004.21... DIRECTIVE NO. 1 Operations § 2004.21 Protection of Classified Information . Procedures for the safeguarding of classified information by contractors are promulgated in the NISPOM. DoD, as the Executive...

  14. 19 CFR 207.94 - Protection of privileged information during panel and committee proceedings.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... the category of individuals eligible to receive proprietary information pursuant to 19 CFR 207.93(b... 19 Customs Duties 3 2010-04-01 2010-04-01 false Protection of privileged information during panel... Regulations for the North American Free Trade Agreement § 207.94 Protection of privileged information...

  15. 10 CFR 2.903 - Protection of restricted data and national security information.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... Security Information § 2.903 Protection of restricted data and national security information. Nothing in... 10 Energy 1 2014-01-01 2014-01-01 false Protection of restricted data and national security information. 2.903 Section 2.903 Energy NUCLEAR REGULATORY COMMISSION AGENCY RULES OF PRACTICE AND...

  16. 10 CFR 2.903 - Protection of restricted data and national security information.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... Security Information § 2.903 Protection of restricted data and national security information. Nothing in... 10 Energy 1 2013-01-01 2013-01-01 false Protection of restricted data and national security information. 2.903 Section 2.903 Energy NUCLEAR REGULATORY COMMISSION AGENCY RULES OF PRACTICE AND...

  17. 76 FR 22113 - Agency Information Collection Activities: Office of Infrastructure Protection; Infrastructure...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-04-20

    ... Information Collection Request in the Federal Register on November 4, 2010 at 75 FR 67989, for a 60-day public... SECURITY Agency Information Collection Activities: Office of Infrastructure Protection; Infrastructure... Infrastructure Protection (IP), will submit the following Information Collection Request to the Office...

  18. A tiered-layered-staged model for informed consent in personal genome testing.

    PubMed

    Bunnik, Eline M; Janssens, A Cecile J W; Schermer, Maartje H N

    2013-06-01

    In recent years, developments in genomics technologies have led to the rise of commercial personal genome testing (PGT): broad genome-wide testing for multiple diseases simultaneously. While some commercial providers require physicians to order a personal genome test, others can be accessed directly. All providers advertise directly to consumers and offer genetic risk information about dozens of diseases in one single purchase. The quantity and the complexity of risk information pose challenges to adequate pre-test and post-test information provision and informed consent. There are currently no guidelines for what should constitute informed consent in PGT or how adequate informed consent can be achieved. In this paper, we propose a tiered-layered-staged model for informed consent. First, the proposed model is tiered as it offers choices between categories of diseases that are associated with distinct ethical, personal or societal issues. Second, the model distinguishes layers of information with a first layer offering minimal, indispensable information that is material to all consumers, and additional layers offering more detailed information made available upon request. Finally, the model stages informed consent as a process by feeding information to consumers in each subsequent stage of the process of undergoing a test, and by accommodating renewed consent for test result updates, resulting from the ongoing development of the science underlying PGT. A tiered-layered-staged model for informed consent with a focus on the consumer perspective can help overcome the ethical problems of information provision and informed consent in direct-to-consumer PGT. PMID:23169494

  19. Library workers' personal beliefs about childhood vaccination and vaccination information provision.

    PubMed

    Keselman, Alla; Smith, Catherine Arnott; Hundal, Savreen

    2014-07-01

    This is a report on the impact of library workers' personal beliefs on provision of vaccination information. Nine public librarians were interviewed about a hypothetical scenario involving a patron who is concerned about possible vaccination-autism connections. The analysis employed thematic coding. Results suggested that while most participants supported childhood vaccination, tension between their personal views and neutrality impacted their ability to conduct the interaction. The neutrality stance, though consonant with professional guidelines, curtails librarians' ability to provide accurate health information. Outreach and communication between public and health sciences libraries can help librarians provide resources to address health controversies. PMID:25031563

  20. Library workers' personal beliefs about childhood vaccination and vaccination information provision*

    PubMed Central

    Keselman, Alla; Smith, Catherine Arnott; Hundal, Savreen

    2014-01-01

    This is a report on the impact of library workers' personal beliefs on provision of vaccination information. Nine public librarians were interviewed about a hypothetical scenario involving a patron who is concerned about possible vaccination-autism connections. The analysis employed thematic coding. Results suggested that while most participants supported childhood vaccination, tension between their personal views and neutrality impacted their ability to conduct the interaction. The neutrality stance, though consonant with professional guidelines, curtails librarians' ability to provide accurate health information. Outreach and communication between public and health sciences libraries can help librarians provide resources to address health controversies. PMID:25031563

  1. Protecting Privacy and Confidentiality in a Multiple Use, Multiple User Mental Health Information System.

    ERIC Educational Resources Information Center

    Bank, Rheta; Laska, Eugene M.

    1978-01-01

    These aspects of maintaining the security of computer-processed information concerning mental health patients are discussed: legal protection, technological safeguards, and managerial responsibility. (CTM)

  2. Cognitive models in training health professionals to protect patients' confidential information.

    PubMed

    Patel, V L; Arocha, J F; Shortliffe, E H

    2000-11-01

    Recent advances in theories of learning and knowledge acquisition in culturally-situated environments have illuminated the role of cognition in changing behavior, and in turn on influencing performance for the long term. One such advance focuses on the relationship between explicit formal training and implicit knowledge acquired through daily interactive activities in schools and organizations. The former relates more to instruction regarding the policy issues whereas the latter is tied closely to cultural, moral and organizational values. In this paper, we draw on these theories of cognition and learning to show the shift in thinking that is needed regarding education of health professionals, including steps required to assure that the protection of confidential information becomes part of their routine practices. Illustrative examples are used to show the nature of conceptual change in the health professional's knowledge organization and reasoning strategies that is necessary for more sustained behavior change with regards to protecting data confidentiality and privacy of individual patients. This re-conceptualization is intended to be reflected at various levels of training and education for health professionals, including influences on personal and organizational practices as well as revisions in medical-school and graduate-medical curricula. PMID:11154965

  3. Some legal implications of the Precautionary Principle: improving information-generation and legal protections.

    PubMed

    Cranor, Carl F

    2004-01-01

    In creating a legal agenda in service of the Precautionary Principle, the idea of precaution requires more inventories and better monitoring of the condition of public and workforce health than at present. Rectifying problems of the past to better serve the aims of precaution will require more affirmative pre-market and much more post-market knowledge-generation by those who create and use potentially toxic substances, improved pre-market review of substances, better responses to early warnings, and quicker protective post-market responses to evidence of toxicity. This paper conceptualizes a model pre-market screening law to highlight the need for primary prevention measures and to provide philosophic ideas for improving post-market laws and addressing a large universe of existing substances that have been poorly characterized. Although retrospective personal injury law does not have good mechanisms for precaution, even this can be more protective than it is at present by enhancing causes of action for reasonable fear of disease and medical monitoring, and moving to create new causes of action for failure to develop and disseminate information needed to assess the toxicity of substances. PMID:15212203

  4. "Doing ethics" in the context of sharing patients' personal health information.

    PubMed

    Somerville, Margaret A

    2004-01-01

    There are at present two inconsistencies with respect to the sharing of personal health information (PHI) among health care professionals caring for a patient whom the information concerns. First, there is an inconsistency between what is in theory the ethics and law governing the confidentiality and privacy of this information--it may only be disclosed with informed consent--and what is the actual practice of health care professionals--they share it without such consent. Second, there is an inconsistency between what ethics and law demand in theory and what all parties want: They all approve of the current practice. Ethics and law can be brought into line with what is needed to act in the patient's best interests and with what people want, without opening up any serious potential for abuse of privacy and confidentiality, by establishing a safeguarded, provision-of-care exception that allows co-caring health care professionals to share patients' PHI. The requirements for a system establishing such safeguards are proposed. The basic governing presumption is respect for the person and for rights to autonomy, self-determination, privacy, and confidentiality. Therefore, disclosure may only be made with the informed consent of the competent person to whom the information pertains, unless a defence of necessity applies. Where there is doubt about someone's competence, there should likewise be doubt about disclosure without that person's informed consent. Where the person is incompetent, such a disclosure can be made to the patient's substitute decision makers, most often the family, if that is necessary for the care of the patient and in the patient's best interests. To the extent possible, consistent with the best interests of the patient, the wishes of incompetent people should be respected. PMID:15660294

  5. 22 CFR 123.17 - Exports of firearms, ammunition, and personal protective gear.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... person brought into the United States under the provisions of 27 CFR 478.115(d). (The latter provision... 22 Foreign Relations 1 2014-04-01 2014-04-01 false Exports of firearms, ammunition, and personal... REGULATIONS LICENSES FOR THE EXPORT AND TEMPORARY IMPORT OF DEFENSE ARTICLES § 123.17 Exports of...

  6. 22 CFR 123.17 - Exports of firearms, ammunition, and personal protective gear.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... the foreign person brought into the United States under the provisions of 27 CFR 478.115(d). (The... 22 Foreign Relations 1 2013-04-01 2013-04-01 false Exports of firearms, ammunition, and personal... REGULATIONS LICENSES FOR THE EXPORT OF DEFENSE ARTICLES § 123.17 Exports of firearms, ammunition, and...

  7. Do Reincarnation Beliefs Protect Older Adult Chinese Buddhists against Personal Death Anxiety?

    ERIC Educational Resources Information Center

    Hui, Victoria Ka-Ying; Coleman, Peter G.

    2012-01-01

    The aim of this exploratory survey study was to develop and validate a Buddhist reincarnation beliefs scale and explore the relation between Buddhist reincarnation beliefs and personal death anxiety in 141 older adult Hong Kong Chinese Buddhists. Buddhist reincarnation beliefs were unrelated to personal death anxiety. This suggests that not all…

  8. Personal finances for the physician: a primer on maintaining and protecting your earnings.

    PubMed

    Hill, Austin D; Ortega, Marc E; Williams, Anthony C

    2014-07-01

    Personal finance is a key component to your success as a physician. Your clinical practice does not exist in a vacuum unaffected by circumstances and decisions in your personal life. Though some events in your personal life that can negatively affect your practice are random and unavoidable, consistently making sound decisions regarding your personal life and finances will allow you to continue practicing at a high level. Most core principles of personal finance are common sense and do not involve high level math. Although the concepts are straightforward, people, including physicians, routinely fail to make good decisions at the most elementary level. The core common sense principles for financial success are: do not get divorced, manage your own money, live in a state without state income tax, and drive an old car. Follow these tenants and the path to successful and satisfactory retirement will be smooth. PMID:24918832

  9. Five on one side: personal and social information in spatial choice.

    PubMed

    Brown, Michael F; Saxon, Marie E; Bisbing, Teagan; Evans, Jessica; Ruff, Jennifer; Stokesbury, Andrew

    2015-03-01

    To examine whether the outcome of a rat's own choices ("personal information") and the choice behavior of another rat ("social information") can jointly control spatial choices, rats were tested in an open field task in which they searched for food. For the rats of primary interest (Subject Rats), the baited locations were all on one side of the arena, but the specific locations baited and the side on which they occurred varied over trials. The Subject Rats were sometimes tested together with an informed "Model" rat that had learned to find food in the same five locations (all on the same side of the arena) on every trial. Unintended perceptual cues apparently controlled spatial choices at first, but when perceptual cues to food location were not available, choices were controlled by both personal information (allowing the baited side of the arena to be determined) and social information (allowing baited locations to be determined more precisely). This shows that control by personal and social information are not mutually exclusive and supports the view that these two kinds of information can be used flexibly and adaptively to guide spatial choices. This article is part of a Special Issue entitled: tribute to Tom Zentall. PMID:25572458

  10. Personalized Health Care System with Virtual Reality Rehabilitation and Appropriate Information for Seniors

    PubMed Central

    Páez, Diego Gachet; Aparicio, Fernando; de Buenaga, Manuel; Padrón, Víctor

    2012-01-01

    The concept of the information society is now a common one, as opposed to the industrial society that dominated the economy during the last years. It is assumed that all sectors should have access to information and reap its benefits. Elderly people are, in this respect, a major challenge, due to their lack of interest in technological progress and their lack of knowledge regarding the potential benefits that information society technologies might have on their lives. The Naviga Project (An Open and Adaptable Platform for the Elderly and Persons with Disability to Access the Information Society) is a European effort, whose main goal is to design and develop a technological platform allowing elder people and persons with disability to access the internet and the information society. Naviga also allows the creation of services targeted to social networks, mind training and personalized health care. In this paper we focus on the health care and information services designed on the project, the technological platform developed and details of two representative elements, the virtual reality hand rehabilitation and the health information intelligent system. PMID:22778598

  11. Interpretation of personal genome sequencing data in terms of disease ranks based on mutual information

    PubMed Central

    2015-01-01

    Background The rapid advances in genome sequencing technologies have resulted in an unprecedented number of genome variations being discovered in humans. However, there has been very limited coverage of interpretation of the personal genome sequencing data in terms of diseases. Methods In this paper we present the first computational analysis scheme for interpreting personal genome data by simultaneously considering the functional impact of damaging variants and curated disease-gene association data. This method is based on mutual information as a measure of the relative closeness between the personal genome and diseases. We hypothesize that a higher mutual information score implies that the personal genome is more susceptible to a particular disease than other diseases. Results The method was applied to the sequencing data of 50 acute myeloid leukemia (AML) patients in The Cancer Genome Atlas. The utility of associations between a disease and the personal genome was explored using data of healthy (control) people obtained from the 1000 Genomes Project. The ranks of the disease terms in the AML patient group were compared with those in the healthy control group using "Leukemia, Myeloid, Acute" (C04.557.337.539.550) as the corresponding MeSH disease term. The mutual information rank of the disease term was substantially higher in the AML patient group than in the healthy control group, which demonstrates that the proposed methodology can be successfully applied to infer associations between the personal genome and diseases. Conclusions Overall, the area under the receiver operating characteristics curve was significantly larger for the AML patient data than for the healthy controls. This methodology could contribute to consequential discoveries and explanations for mining personal genome sequencing data in terms of diseases, and have versatility with respect to genomic-based knowledge such as drug-gene and environmental-factor-gene interactions. PMID:26045178

  12. Personal Protection of Permethrin-Treated Clothing against Aedes aegypti, the Vector of Dengue and Zika Virus, in the Laboratory

    PubMed Central

    Orsborne, James; DeRaedt Banks, Sarah; Hendy, Adam; Gezan, Salvador A.; Kaur, Harparkash; Wilder-Smith, Annelies; Lindsay, Steve W.; Logan, James G.

    2016-01-01

    Background The dengue and Zika viruses are primarily transmitted by Aedes aegypti mosquitoes, which are most active during day light hours and feed both in and outside of the household. Personal protection technologies such as insecticide-treated clothing could provide individual protection. Here we assessed the efficacy of permethrin-treated clothing on personal protection in the laboratory. Methods The effect of washing on treated clothing, skin coverage and protection against resistant and susceptible Ae. aegypti was assessed using modified WHO arm-in-cage assays. Coverage was further assessed using free-flight room tests to investigate the protective efficacy of unwashed factory-dipped permethrin-treated clothing. Clothing was worn as full coverage (long sleeves and trousers) and partial coverage (short sleeves and shorts). Residual permethrin on the skin and its effect on mosquitoes was measured using modified WHO cone assays and quantified using high-pressure liquid chromatography (HPLC) analysis. Results In the arm-in-cage assays, unwashed clothing reduced landing by 58.9% (95% CI 49.2–66.9) and biting by 28.5% (95% CI 22.5–34.0), but reduced to 18.5% (95% CI 14.7–22.3) and 11.1% (95% CI 8.5–13.8) respectively after 10 washes. Landing and biting for resistant and susceptible strains was not significantly different (p<0.05). In free-flight room tests, full coverage treated clothing reduced landing by 24.3% (95% CI 17.4–31.7) and biting by 91% (95% CI 82.2–95.9) with partial coverage reducing landing and biting by 26.4% (95% CI 20.3–31.2) and 49.3% (95% CI 42.1–59.1) respectively with coverage type having no significant difference on landing (p<0.05). Residual permethrin was present on the skin in low amounts (0.0041mg/cm2), but still produced a KD of >80% one hour after wearing treated clothing. Conclusion Whilst partially covering the body with permethrin-treated clothing provided some protection against biting, wearing treated clothing with

  13. Sun protection provided by regulation school uniforms in Australian schools: an opportunity to improve personal sun protection during childhood.

    PubMed

    Turner, Denise; Harrison, Simone L

    2014-01-01

    Childhood sun exposure is linked to excessive pigmented mole development and melanoma risk. Clothing provides a physical barrier, protecting skin from ultraviolet radiation (UVR). Extending sleeves to elbow length and shorts to knee length has been shown to significantly reduce mole acquisition in preschoolers from tropical Queensland. We used publicly available uniform images and guidelines from primary schools in Townsville (latitude 19.25°S, n = 43 schools), Cairns (16.87°S, n = 46) and the Atherton Tablelands (17.26°S, n = 23) in tropical Australia to objectively determine the body surface proportion covered by regulation school uniforms. Uniforms of nongovernment, large (≥800 students), urban, educationally advantaged schools with comprehensive sun protection policies covered more skin than those of government schools (63.2% vs 62.0%; P < 0.001), smaller schools (63.4% vs 62.3%; P = 0.009), rural (62.7% vs 61.9%; P = 0.002) and educationally disadvantaged schools (62.8% vs 62.3%; P < 0.001) with underdeveloped sun protection policies (62.8% vs 62.2%; P = 0.002). Overall, SunSmart and non-SunSmart school uniforms covered identical body surface proportions (62.4%, P = 0.084). Although wearing regulation school uniforms is mandatory at most Australian primary schools, this opportunity to improve children's sun protection is largely overlooked. Recent evidence suggests that even encouraging minor alterations to school uniforms (e.g. slightly longer sleeves/dresses/skirts/shorts) to increase skin coverage may reduce mole acquisition and melanoma risk, especially in high-risk populations. PMID:25041466

  14. 41 CFR 105-64.104 - What must the system manager tell me when soliciting personal information?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... manager tell me when soliciting personal information? 105-64.104 Section 105-64.104 Public Contracts and... Responsibilities § 105-64.104 What must the system manager tell me when soliciting personal information? When soliciting information from you or a third party for a system of records, system managers must: Cite...

  15. An Information Push-Delivery System Design for Personal Information Service on the Internet.

    ERIC Educational Resources Information Center

    Chen, Chen-Tung; Tai, Wei-Shen

    2003-01-01

    Discussion of information overload from the Internet focuses on an information push-delivery system, which applies fuzzy information retrieval and fuzzy similarity measurement to avoid the information overload problem. Describes an empirical investigation conducted with students at Da-Yeh University (Taiwan) that investigated satisfaction with a…

  16. 48 CFR 3.104-4 - Disclosure, protection, and marking of contractor bid or proposal information and source...

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ..., and marking of contractor bid or proposal information and source selection information. 3.104-4... marking of contractor bid or proposal information and source selection information. (a) Except as... information or source selection information to any person other than a person authorized, in accordance...

  17. 10 CFR 1044.11 - How do you protect the information that you want to disclose?

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 10 Energy 4 2013-01-01 2013-01-01 false How do you protect the information that you want to disclose? 1044.11 Section 1044.11 Energy DEPARTMENT OF ENERGY (GENERAL PROVISIONS) SECURITY REQUIREMENTS FOR PROTECTED DISCLOSURES UNDER SECTION 3164 OF THE NATIONAL DEFENSE AUTHORIZATION ACT FOR FISCAL YEAR 2000 § 1044.11 How do you protect...

  18. 77 FR 47589 - Notice of Request for Extension of Approval of an Information Collection; Horse Protection...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-08-09

    ... Approval of an Information Collection; Horse Protection Regulations AGENCY: Animal and Plant Health... collection associated with the Horse Protection Program. DATES: We will consider all comments that we receive... the Horse Protection Program, contact Dr. Rachel Cezar, Senior Staff Veterinarian, Animal Care,...

  19. Policies to Protect Persons With Dementia in Assisted Living: Déjà Vu All Over Again?

    PubMed Central

    Kaskie, Brian P.; Nattinger, Matthew; Potter, Andrew

    2015-01-01

    Continued growth in the number of individuals with dementia residing in assisted living (AL) raises concerns about their safety and protection. In this Forum, we review current AL practices relevant to residents with dementia and present a rationale for examining the government role in protecting these individuals within this context. Since public oversight of AL is currently a state prerogative, we assess states’ regulatory activity across 3 domains closely related to safety and protection of persons with dementia: environmental features, staffing, and use of chemical restraints. We then step back to consider the state policymaking environment and assess the feasibility of developing a minimum standard of regulations from one state to the next. This Forum concludes with a historical comparison between the contemporary AL market and the nursing home care market prior to the Nursing Home Reform Act of 1987, and we discuss how an increased amount of federal interest could improve existing state efforts to protect persons with dementia residing in AL. PMID:26035596

  20. Policies to protect persons with dementia in assisted living: déjà vu all over again?

    PubMed

    Kaskie, Brian P; Nattinger, Matthew; Potter, Andrew

    2015-04-01

    Continued growth in the number of individuals with dementia residing in assisted living (AL) raises concerns about their safety and protection. In this Forum, we review current AL practices relevant to residents with dementia and present a rationale for examining the government role in protecting these individuals within this context. Since public oversight of AL is currently a state prerogative, we assess states' regulatory activity across 3 domains closely related to safety and protection of persons with dementia: environmental features, staffing, and use of chemical restraints. We then step back to consider the state policymaking environment and assess the feasibility of developing a minimum standard of regulations from one state to the next. This Forum concludes with a historical comparison between the contemporary AL market and the nursing home care market prior to the Nursing Home Reform Act of 1987, and we discuss how an increased amount of federal interest could improve existing state efforts to protect persons with dementia residing in AL. PMID:26035596