Science.gov

Sample records for addresses gsa privacy

  1. For telehealth to succeed, privacy and security risks must be identified and addressed.

    PubMed

    Hall, Joseph L; McGraw, Deven

    2014-02-01

    The success of telehealth could be undermined if serious privacy and security risks are not addressed. For example, sensors that are located in a patient's home or that interface with the patient's body to detect safety issues or medical emergencies may inadvertently transmit sensitive information about household activities. Similarly, routine data transmissions from an app or medical device, such as an insulin pump, may be shared with third-party advertisers. Without adequate security and privacy protections for underlying telehealth data and systems, providers and patients will lack trust in the use of telehealth solutions. Although some federal and state guidelines for telehealth security and privacy have been established, many gaps remain. No federal agency currently has authority to enact privacy and security requirements to cover the telehealth ecosystem. This article examines privacy risks and security threats to telehealth applications and summarizes the extent to which technical controls and federal law adequately address these risks. We argue for a comprehensive federal regulatory framework for telehealth, developed and enforced by a single federal entity, the Federal Trade Commission, to bolster trust and fully realize the benefits of telehealth.

  2. Policy recommendations for addressing privacy challenges associated with cell-based research and interventions

    PubMed Central

    2014-01-01

    Background The increased use of human biological material for cell-based research and clinical interventions poses risks to the privacy of patients and donors, including the possibility of re-identification of individuals from anonymized cell lines and associated genetic data. These risks will increase as technologies and databases used for re-identification become affordable and more sophisticated. Policies that require ongoing linkage of cell lines to donors’ clinical information for research and regulatory purposes, and existing practices that limit research participants’ ability to control what is done with their genetic data, amplify the privacy concerns. Discussion To date, the privacy issues associated with cell-based research and interventions have not received much attention in the academic and policymaking contexts. This paper, arising out of a multi-disciplinary workshop, aims to rectify this by outlining the issues, proposing novel governance strategies and policy recommendations, and identifying areas where further evidence is required to make sound policy decisions. The authors of this paper take the position that existing rules and norms can be reasonably extended to address privacy risks in this context without compromising emerging developments in the research environment, and that exceptions from such rules should be justified using a case-by-case approach. In developing new policies, the broader framework of regulations governing cell-based research and related areas must be taken into account, as well as the views of impacted groups, including scientists, research participants and the general public. Summary This paper outlines deliberations at a policy development workshop focusing on privacy challenges associated with cell-based research and interventions. The paper provides an overview of these challenges, followed by a discussion of key themes and recommendations that emerged from discussions at the workshop. The paper concludes that

  3. 41 CFR 105-64.106 - What is GSA's policy on information accuracy in a system of records?

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... Regional Offices-General Services Administration 64-GSA PRIVACY ACT RULES 64.1-Policies and... will ensure that all Privacy Act records are accurate, relevant, necessary, timely, and complete. All...) are reviewed to ensure they are relevant, necessary, accurate, up-to-date, and covered by...

  4. 41 CFR 105-64.106 - What is GSA's policy on information accuracy in a system of records?

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... Regional Offices-General Services Administration 64-GSA PRIVACY ACT RULES 64.1-Policies and... will ensure that all Privacy Act records are accurate, relevant, necessary, timely, and complete. All...) are reviewed to ensure they are relevant, necessary, accurate, up-to-date, and covered by...

  5. 41 CFR 105-64.108 - How does GSA safeguard personal information?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... incorporate security controls such as password protection, verification of identity of authorized users... Services Administration 64-GSA PRIVACY ACT RULES 64.1-Policies and Responsibilities § 105-64.108 How does... physical safeguards to ensure the security and confidentiality of records, protect the records...

  6. 48 CFR 41.204 - GSA areawide contracts.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... entire geographical area covered by an areawide contract, although it may be available at specific... information copy furnished to GSA at the address in 41.301(a). (2) Each areawide contract includes an... administrative requirements of the agency, applicable rate schedules, technical information and detailed maps...

  7. 48 CFR 41.204 - GSA areawide contracts.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... entire geographical area covered by an areawide contract, although it may be available at specific... information copy furnished to GSA at the address in 41.301(a). (2) Each areawide contract includes an... administrative requirements of the agency, applicable rate schedules, technical information and detailed maps...

  8. 48 CFR 41.204 - GSA areawide contracts.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... entire geographical area covered by an areawide contract, although it may be available at specific... information copy furnished to GSA at the address in 41.301(a). (2) Each areawide contract includes an... administrative requirements of the agency, applicable rate schedules, technical information and detailed maps...

  9. Protecting Privacy.

    ERIC Educational Resources Information Center

    Coyle, Karen

    2001-01-01

    Discusses privacy issues related to use of the Internet. Topics include data gathering functions that are built into applications of the World Wide Web; cookies that identify Web site visitors; personal identity information; libraries and privacy, including the need for privacy policies; protecting your privacy; and developing privacy literacy.…

  10. Information Systems, Security, and Privacy.

    ERIC Educational Resources Information Center

    Ware, Willis H.

    1984-01-01

    Computer security and computer privacy issues are discussed. Among the areas addressed are technical and human security threats, security and privacy issues for information in electronic mail systems, the need for a national commission to examine these issues, and security/privacy issues relevant to colleges and universities. (JN)

  11. 48 CFR 39.105 - Privacy.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 48 Federal Acquisition Regulations System 1 2010-10-01 2010-10-01 false Privacy. 39.105 Section 39... CONTRACTING ACQUISITION OF INFORMATION TECHNOLOGY General 39.105 Privacy. Agencies shall ensure that contracts for information technology address protection of privacy in accordance with the Privacy Act (5...

  12. 78 FR 79458 - Privacy Act of 1974; Notice of an Updated System of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-12-30

    ... Privacy Act systems to ensure that they are relevant, necessary, accurate, up-to-date, and covered by the.... DATES: Effective date: January 29, 2014. FOR FURTHER INFORMATION CONTACT: Call or email the GSA Privacy... employee's Official Personnel Folder, including: a. Employee's name, Social Security Number, date of...

  13. 78 FR 79694 - Privacy Act of 1974; Notice of an Updated System of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-12-31

    ... analysts and managers. System information also may be used: a. In any legal proceeding, where pertinent, to... ADMINISTRATION Privacy Act of 1974; Notice of an Updated System of Records AGENCY: General Services Administration. ACTION: Notice. ] SUMMARY: GSA reviewed its Privacy Act systems to ensure that they are...

  14. 41 CFR 101-30.603 - GSA Supply Catalog.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 41 Public Contracts and Property Management 2 2012-07-01 2012-07-01 false GSA Supply Catalog. 101... Regulations System FEDERAL PROPERTY MANAGEMENT REGULATIONS SUPPLY AND PROCUREMENT 30-FEDERAL CATALOG SYSTEM 30.6-GSA Section of the Federal Supply Catalog § 101-30.603 GSA Supply Catalog. (a) The GSA...

  15. 41 CFR 101-30.603 - GSA Supply Catalog.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 41 Public Contracts and Property Management 2 2014-07-01 2012-07-01 true GSA Supply Catalog. 101... Regulations System FEDERAL PROPERTY MANAGEMENT REGULATIONS SUPPLY AND PROCUREMENT 30-FEDERAL CATALOG SYSTEM 30.6-GSA Section of the Federal Supply Catalog § 101-30.603 GSA Supply Catalog. (a) The GSA...

  16. 41 CFR 101-30.603-2 - GSA Supply Catalog.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 41 Public Contracts and Property Management 2 2010-07-01 2010-07-01 true GSA Supply Catalog. 101... Regulations System FEDERAL PROPERTY MANAGEMENT REGULATIONS SUPPLY AND PROCUREMENT 30-FEDERAL CATALOG SYSTEM 30.6-GSA Section of the Federal Supply Catalog § 101-30.603-2 GSA Supply Catalog. The GSA...

  17. 41 CFR 101-30.603-2 - GSA Supply Catalog.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 41 Public Contracts and Property Management 2 2014-07-01 2012-07-01 true GSA Supply Catalog. 101... Regulations System FEDERAL PROPERTY MANAGEMENT REGULATIONS SUPPLY AND PROCUREMENT 30-FEDERAL CATALOG SYSTEM 30.6-GSA Section of the Federal Supply Catalog § 101-30.603-2 GSA Supply Catalog. The GSA...

  18. 41 CFR 101-30.603 - GSA Supply Catalog.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 41 Public Contracts and Property Management 2 2011-07-01 2007-07-01 true GSA Supply Catalog. 101... Regulations System FEDERAL PROPERTY MANAGEMENT REGULATIONS SUPPLY AND PROCUREMENT 30-FEDERAL CATALOG SYSTEM 30.6-GSA Section of the Federal Supply Catalog § 101-30.603 GSA Supply Catalog. (a) The GSA...

  19. 41 CFR 101-30.603-2 - GSA Supply Catalog.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 41 Public Contracts and Property Management 2 2011-07-01 2007-07-01 true GSA Supply Catalog. 101... Regulations System FEDERAL PROPERTY MANAGEMENT REGULATIONS SUPPLY AND PROCUREMENT 30-FEDERAL CATALOG SYSTEM 30.6-GSA Section of the Federal Supply Catalog § 101-30.603-2 GSA Supply Catalog. The GSA...

  20. 41 CFR 101-30.603 - GSA Supply Catalog.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 41 Public Contracts and Property Management 2 2010-07-01 2010-07-01 true GSA Supply Catalog. 101... Regulations System FEDERAL PROPERTY MANAGEMENT REGULATIONS SUPPLY AND PROCUREMENT 30-FEDERAL CATALOG SYSTEM 30.6-GSA Section of the Federal Supply Catalog § 101-30.603 GSA Supply Catalog. (a) The GSA...

  1. 41 CFR 101-30.603-2 - GSA Supply Catalog.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 41 Public Contracts and Property Management 2 2012-07-01 2012-07-01 false GSA Supply Catalog. 101... Regulations System FEDERAL PROPERTY MANAGEMENT REGULATIONS SUPPLY AND PROCUREMENT 30-FEDERAL CATALOG SYSTEM 30.6-GSA Section of the Federal Supply Catalog § 101-30.603-2 GSA Supply Catalog. The GSA...

  2. 41 CFR 101-30.603-2 - GSA Supply Catalog.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 41 Public Contracts and Property Management 2 2013-07-01 2012-07-01 true GSA Supply Catalog. 101... Regulations System FEDERAL PROPERTY MANAGEMENT REGULATIONS SUPPLY AND PROCUREMENT 30-FEDERAL CATALOG SYSTEM 30.6-GSA Section of the Federal Supply Catalog § 101-30.603-2 GSA Supply Catalog. The GSA...

  3. 41 CFR 101-30.603 - GSA Supply Catalog.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 41 Public Contracts and Property Management 2 2013-07-01 2012-07-01 true GSA Supply Catalog. 101... Regulations System FEDERAL PROPERTY MANAGEMENT REGULATIONS SUPPLY AND PROCUREMENT 30-FEDERAL CATALOG SYSTEM 30.6-GSA Section of the Federal Supply Catalog § 101-30.603 GSA Supply Catalog. (a) The GSA...

  4. 41 CFR 102-2.100 - Must agencies provide GSA with a follow-up analysis of their experience in deviating from the FMR?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... GSA with a follow-up analysis of their experience in deviating from the FMR? 102-2.100 Section 102-2... § 102-2.100 Must agencies provide GSA with a follow-up analysis of their experience in deviating from... the Regulatory Secretariat's address (see § 102-2.90) to describe their experiences in using...

  5. Student Privacy versus Campus Safety: Has Recent Legislation Compromised Privacy Rights?

    ERIC Educational Resources Information Center

    van der Kaay, Christopher D.

    This study highlights major legislation addressing campus safety and crime reporting and discusses its impact on a student's right to privacy. The 1974 Family Educational Rights and Privacy Act, commonly referred to as the "Buckley Amendment," was among the first pieces of legislation to address the notion of student privacy and confidentiality.…

  6. Collaborative Privacy - A Community-Based Privacy Infrastructure

    NASA Astrophysics Data System (ADS)

    Kolter, Jan; Kernchen, Thomas; Pernul, Günther

    The landscape of the World Wide Web with all its versatile services heavily relies on the disclosure of private user information. Service providers collecting more and more of these personal user data pose a growing privacy threat for users. Addressing user concerns privacy-enhancing technologies emerged. One goal of these technologies is to enable users to improve the control over their personal data. A famous representative is the PRIME project that aims for a holistic privacy-enhancing identity management system. However, approaches like the PRIME privacy architecture require service providers to change their server infrastructure and add specific privacy-enhancing components. In the near future, service providers are not expected to alter internal processes. In this paper, we introduce a collaborative privacy community that allows the open exchange of privacy-related information. We lay out the privacy community’s functions and potentials within a user-centric, provider-independent privacy architecture that will help foster the usage and acceptance of privacy-enhancing technologies.

  7. 41 CFR 105-56.016 - GSA participation.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ....S.C. 5514(a)(1), GSA must participate at least annually in centralized salary offset computer... delinquent for more than 180 days for purposes of administrative offset, as required under 31 U.S.C. 3716(c... within ten years after GSA's right of action accrues; (3) GSA has complied with the provisions of 31...

  8. Biobanking and Privacy in India.

    PubMed

    Chaturvedi, Sachin; Srinivas, Krishna Ravi; Muthuswamy, Vasantha

    2016-03-01

    Biobank-based research is not specifically addressed in Indian statutory law and therefore Indian Council for Medical Research guidelines are the primary regulators of biobank research in India. The guidelines allow for broad consent and for any level of identification of specimens. Although privacy is a fundamental right under the Indian Constitution, courts have limited this right when it conflicts with other rights or with the public interest. Furthermore, there is no established privacy test or actionable privacy right in the common law of India. In order to facilitate biobank-based research, both of these lacunae should be addressed by statutory law specifically addressing biobanking and more directly addressing the accompanying privacy concerns. A biobank-specific law should be written with international guidelines in mind, but harmonization with other laws should not be attempted until after India has created a law addressing biobank research within the unique legal and cultural environment of India.

  9. Biobanking and Privacy in India.

    PubMed

    Chaturvedi, Sachin; Srinivas, Krishna Ravi; Muthuswamy, Vasantha

    2016-03-01

    Biobank-based research is not specifically addressed in Indian statutory law and therefore Indian Council for Medical Research guidelines are the primary regulators of biobank research in India. The guidelines allow for broad consent and for any level of identification of specimens. Although privacy is a fundamental right under the Indian Constitution, courts have limited this right when it conflicts with other rights or with the public interest. Furthermore, there is no established privacy test or actionable privacy right in the common law of India. In order to facilitate biobank-based research, both of these lacunae should be addressed by statutory law specifically addressing biobanking and more directly addressing the accompanying privacy concerns. A biobank-specific law should be written with international guidelines in mind, but harmonization with other laws should not be attempted until after India has created a law addressing biobank research within the unique legal and cultural environment of India. PMID:27256123

  10. 76 FR 34650 - Announcing a Meeting of the Information Security and Privacy Advisory Board

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-06-14

    ... expected to include the following items: --Cloud Security and Privacy Panel discussion on addressing security and privacy for different types of cloud computing, --Presentation from National Strategy...

  11. The Regulatory Framework for Privacy and Security

    NASA Astrophysics Data System (ADS)

    Hiller, Janine S.

    The internet enables the easy collection of massive amounts of personally identifiable information. Unregulated data collection causes distrust and conflicts with widely accepted principles of privacy. The regulatory framework in the United States for ensuring privacy and security in the online environment consists of federal, state, and self-regulatory elements. New laws have been passed to address technological and internet practices that conflict with privacy protecting policies. The United States and the European Union approaches to privacy differ significantly, and the global internet environment will likely cause regulators to face the challenge of balancing privacy interests with data collection for many years to come.

  12. Privacy Questions from Practicing School Nurses

    ERIC Educational Resources Information Center

    Bergren, Martha Dewey

    2004-01-01

    This Question and Answer (Q&A) article addresses practice issues related to school health records and school nursing documentation that were posed by school nurses in the field. Specifically, the questions addressed concern the following: education records, medication privacy issues, sharing of sensitive health information, privacy of individual…

  13. 41 CFR 105-56.026 - GSA participation.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... Offset (CSO) Procedures-GSA as Paying Agency § 105-56.026 GSA participation. (a) As required under 5 U.S... computer matching. To meet this requirement, creditor agencies will notify FMS of all past-due, legally... 31 U.S.C. 3716(c)(6). Additionally, creditor agencies may notify FMS of past-due, legally...

  14. 41 CFR 101-25.203 - Centralized purchases by GSA.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 41 Public Contracts and Property Management 2 2010-07-01 2010-07-01 true Centralized purchases by...-Interagency Purchase Assignments § 101-25.203 Centralized purchases by GSA. GSA will exclusively, or with specified limited exceptions, make purchases and contracts on a continuing basis for articles and...

  15. 32 CFR 644.344 - Coordination with GSA.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 32 National Defense 4 2010-07-01 2010-07-01 true Coordination with GSA. 644.344 Section 644.344 National Defense Department of Defense (Continued) DEPARTMENT OF THE ARMY (CONTINUED) REAL PROPERTY REAL ESTATE HANDBOOK Disposal Clearances-Army Military Real Property § 644.344 Coordination with GSA. At...

  16. 78 FR 79460 - Notification of GSA Strategic Plan

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-12-30

    ... ADMINISTRATION Notification of GSA Strategic Plan AGENCY: Office of the Chief Financial Officer, U.S. General... announcing the availability of the Draft FY 2014-2018 GSA Strategic Plan for public review and comment, as... Act of 2010. The agency anticipates the final Strategic Plan will be submitted to Congress with...

  17. 41 CFR 101-27.209-1 - GSA stock items.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 41 Public Contracts and Property Management 2 2010-07-01 2010-07-01 true GSA stock items. 101-27.209-1 Section 101-27.209-1 Public Contracts and Property Management Federal Property Management...-Management of Shelf-Life Materials § 101-27.209-1 GSA stock items. Shelf-life items that meet the...

  18. 41 CFR 101-25.203 - Centralized purchases by GSA.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 41 Public Contracts and Property Management 2 2011-07-01 2007-07-01 true Centralized purchases by...-Interagency Purchase Assignments § 101-25.203 Centralized purchases by GSA. GSA will exclusively, or with specified limited exceptions, make purchases and contracts on a continuing basis for articles and...

  19. 32 CFR 644.344 - Coordination with GSA.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 32 National Defense 4 2011-07-01 2011-07-01 false Coordination with GSA. 644.344 Section 644.344 National Defense Department of Defense (Continued) DEPARTMENT OF THE ARMY (CONTINUED) REAL PROPERTY REAL ESTATE HANDBOOK Disposal Clearances-Army Military Real Property § 644.344 Coordination with GSA. At...

  20. 41 CFR 101-1.4902-2053 - GSA Form 2053, Agency Consolidated Requirements for GSA Regulations and Other External Issuances.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ...-2053 Public Contracts and Property Management Federal Property Management Regulations System FEDERAL PROPERTY MANAGEMENT REGULATIONS GENERAL 1-INTRODUCTION 1.49-Illustrations of Forms § 101-1.4902-2053 GSA... 41 Public Contracts and Property Management 2 2010-07-01 2010-07-01 true GSA Form 2053,...

  1. 42 CFR 457.1110 - Privacy protections.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 42 Public Health 4 2010-10-01 2010-10-01 false Privacy protections. 457.1110 Section 457.1110... Requirements: Applicant and Enrollee Protections § 457.1110 Privacy protections. The State must ensure that... disclosure, including those laws addressing the confidentiality of information about minors and the...

  2. 75 FR 54162 - Privacy Act of 1974

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-09-03

    ... should address comments to: Walter Stone, CMS Privacy Officer, Division of Information Security & Privacy... extended CHAMPVA benefit to age 65 for any beneficiary eligible for Medicare Part A on the basis of... Law 107-14 provided for extending benefit coverage for beneficiaries over the age of 65 years if...

  3. From Data Privacy to Location Privacy

    NASA Astrophysics Data System (ADS)

    Wang, Ting; Liu, Ling

    Over the past decade, the research on data privacy has achieved considerable advancement in the following two aspects: First, a variety of privacy threat models and privacy principles have been proposed, aiming at providing sufficient protection against different types of inference attacks; Second, a plethora of algorithms and methods have been developed to implement the proposed privacy principles, while attempting to optimize the utility of the resulting data. The first part of the chapter presents an overview of data privacy research by taking a close examination at the achievements from the above two aspects, with the objective of pinpointing individual research efforts on the grand map of data privacy protection. As a special form of data privacy, location privacy possesses its unique characteristics. In the second part of the chapter, we examine the research challenges and opportunities of location privacy protection, in a perspective analogous to data privacy. Our discussion attempts to answer the following three questions: (1) Is it sufficient to apply the data privacy models and algorithms developed to date for protecting location privacy? (2) What is the current state of the research on location privacy? (3) What are the open issues and technical challenges that demand further investigation? Through answering these questions, we intend to provide a comprehensive review of the state of the art in location privacy research.

  4. Privacy in the Genomic Era

    PubMed Central

    NAVEED, MUHAMMAD; AYDAY, ERMAN; CLAYTON, ELLEN W.; FELLAY, JACQUES; GUNTER, CARL A.; HUBAUX, JEAN-PIERRE; MALIN, BRADLEY A.; WANG, XIAOFENG

    2015-01-01

    Genome sequencing technology has advanced at a rapid pace and it is now possible to generate highly-detailed genotypes inexpensively. The collection and analysis of such data has the potential to support various applications, including personalized medical services. While the benefits of the genomics revolution are trumpeted by the biomedical community, the increased availability of such data has major implications for personal privacy; notably because the genome has certain essential features, which include (but are not limited to) (i) an association with traits and certain diseases, (ii) identification capability (e.g., forensics), and (iii) revelation of family relationships. Moreover, direct-to-consumer DNA testing increases the likelihood that genome data will be made available in less regulated environments, such as the Internet and for-profit companies. The problem of genome data privacy thus resides at the crossroads of computer science, medicine, and public policy. While the computer scientists have addressed data privacy for various data types, there has been less attention dedicated to genomic data. Thus, the goal of this paper is to provide a systematization of knowledge for the computer science community. In doing so, we address some of the (sometimes erroneous) beliefs of this field and we report on a survey we conducted about genome data privacy with biomedical specialists. Then, after characterizing the genome privacy problem, we review the state-of-the-art regarding privacy attacks on genomic data and strategies for mitigating such attacks, as well as contextualizing these attacks from the perspective of medicine and public policy. This paper concludes with an enumeration of the challenges for genome data privacy and presents a framework to systematize the analysis of threats and the design of countermeasures as the field moves forward. PMID:26640318

  5. 32 CFR 806b.30 - Evaluating information systems for Privacy Act compliance.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 32 National Defense 6 2010-07-01 2010-07-01 false Evaluating information systems for Privacy Act... systems for Privacy Act compliance. Information system owners and developers must address Privacy Act... cycle of the information system. This is accomplished with a Privacy Impact Assessment. (a) The...

  6. 32 CFR Appendix E to Part 806b - Privacy Impact Assessment

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 32 National Defense 6 2012-07-01 2012-07-01 false Privacy Impact Assessment E Appendix E to Part... PRIVACY ACT PROGRAM Pt. 806b, App. E Appendix E to Part 806b—Privacy Impact Assessment Section A... implement citizen-centered e-Government. Privacy issues must be addressed when systems are being...

  7. 32 CFR Appendix E to Part 806b - Privacy Impact Assessment

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 32 National Defense 6 2010-07-01 2010-07-01 false Privacy Impact Assessment E Appendix E to Part... PRIVACY ACT PROGRAM Pt. 806b, App. E Appendix E to Part 806b—Privacy Impact Assessment Section A... implement citizen-centered e-Government. Privacy issues must be addressed when systems are being...

  8. GSA committees: Progress through service the Annual Program Committee

    USGS Publications Warehouse

    Costa, J.E.

    2007-01-01

    The GSA's Annual Program Committee (APC) is directly responsible for the GSA's meeting and other responsibilities especially before the main event. It decides on the locations, the number and content of the technical sessions, annual membership surveys, hospitality for the guests, field trips and more. In addition, it pays significant attention to creative thinking about geoscience discoveries and directions as well as identify new and emerging areas of earth science. APC is also looking for new ideas, approaches and directions.

  9. Extending SQL to Support Privacy Policies

    NASA Astrophysics Data System (ADS)

    Ghazinour, Kambiz; Pun, Sampson; Majedi, Maryam; Chinaci, Amir H.; Barker, Ken

    Increasing concerns over Internet applications that violate user privacy by exploiting (back-end) database vulnerabilities must be addressed to protect both customer privacy and to ensure corporate strategic assets remain trustworthy. This chapter describes an extension onto database catalogues and Structured Query Language (SQL) for supporting privacy in Internet applications, such as in social networks, e-health, e-governmcnt, etc. The idea is to introduce new predicates to SQL commands to capture common privacy requirements, such as purpose, visibility, generalization, and retention for both mandatory and discretionary access control policies. The contribution is that corporations, when creating the underlying databases, will be able to define what their mandatory privacy policies arc with which all application users have to comply. Furthermore, each application user, when providing their own data, will be able to define their own privacy policies with which other users have to comply. The extension is supported with underlying catalogues and algorithms. The experiments demonstrate a very reasonable overhead for the extension. The result is a low-cost mechanism to create new systems that arc privacy aware and also to transform legacy databases to their privacy-preserving equivalents. Although the examples arc from social networks, one can apply the results to data security and user privacy of other enterprises as well.

  10. Hidden drivers of low-dose pharmaceutical pollutant mixtures revealed by the novel GSA-QHTS screening method

    PubMed Central

    Rodea-Palomares, Ismael; Gonzalez-Pleiter, Miguel; Gonzalo, Soledad; Rosal, Roberto; Leganes, Francisco; Sabater, Sergi; Casellas, Maria; Muñoz-Carpena, Rafael; Fernández-Piñas, Francisca

    2016-01-01

    The ecological impacts of emerging pollutants such as pharmaceuticals are not well understood. The lack of experimental approaches for the identification of pollutant effects in realistic settings (that is, low doses, complex mixtures, and variable environmental conditions) supports the widespread perception that these effects are often unpredictable. To address this, we developed a novel screening method (GSA-QHTS) that couples the computational power of global sensitivity analysis (GSA) with the experimental efficiency of quantitative high-throughput screening (QHTS). We present a case study where GSA-QHTS allowed for the identification of the main pharmaceutical pollutants (and their interactions), driving biological effects of low-dose complex mixtures at the microbial population level. The QHTS experiments involved the integrated analysis of nearly 2700 observations from an array of 180 unique low-dose mixtures, representing the most complex and data-rich experimental mixture effect assessment of main pharmaceutical pollutants to date. An ecological scaling-up experiment confirmed that this subset of pollutants also affects typical freshwater microbial community assemblages. Contrary to our expectations and challenging established scientific opinion, the bioactivity of the mixtures was not predicted by the null mixture models, and the main drivers that were identified by GSA-QHTS were overlooked by the current effect assessment scheme. Our results suggest that current chemical effect assessment methods overlook a substantial number of ecologically dangerous chemical pollutants and introduce a new operational framework for their systematic identification. PMID:27617294

  11. Hidden drivers of low-dose pharmaceutical pollutant mixtures revealed by the novel GSA-QHTS screening method.

    PubMed

    Rodea-Palomares, Ismael; Gonzalez-Pleiter, Miguel; Gonzalo, Soledad; Rosal, Roberto; Leganes, Francisco; Sabater, Sergi; Casellas, Maria; Muñoz-Carpena, Rafael; Fernández-Piñas, Francisca

    2016-09-01

    The ecological impacts of emerging pollutants such as pharmaceuticals are not well understood. The lack of experimental approaches for the identification of pollutant effects in realistic settings (that is, low doses, complex mixtures, and variable environmental conditions) supports the widespread perception that these effects are often unpredictable. To address this, we developed a novel screening method (GSA-QHTS) that couples the computational power of global sensitivity analysis (GSA) with the experimental efficiency of quantitative high-throughput screening (QHTS). We present a case study where GSA-QHTS allowed for the identification of the main pharmaceutical pollutants (and their interactions), driving biological effects of low-dose complex mixtures at the microbial population level. The QHTS experiments involved the integrated analysis of nearly 2700 observations from an array of 180 unique low-dose mixtures, representing the most complex and data-rich experimental mixture effect assessment of main pharmaceutical pollutants to date. An ecological scaling-up experiment confirmed that this subset of pollutants also affects typical freshwater microbial community assemblages. Contrary to our expectations and challenging established scientific opinion, the bioactivity of the mixtures was not predicted by the null mixture models, and the main drivers that were identified by GSA-QHTS were overlooked by the current effect assessment scheme. Our results suggest that current chemical effect assessment methods overlook a substantial number of ecologically dangerous chemical pollutants and introduce a new operational framework for their systematic identification.

  12. Hidden drivers of low-dose pharmaceutical pollutant mixtures revealed by the novel GSA-QHTS screening method

    PubMed Central

    Rodea-Palomares, Ismael; Gonzalez-Pleiter, Miguel; Gonzalo, Soledad; Rosal, Roberto; Leganes, Francisco; Sabater, Sergi; Casellas, Maria; Muñoz-Carpena, Rafael; Fernández-Piñas, Francisca

    2016-01-01

    The ecological impacts of emerging pollutants such as pharmaceuticals are not well understood. The lack of experimental approaches for the identification of pollutant effects in realistic settings (that is, low doses, complex mixtures, and variable environmental conditions) supports the widespread perception that these effects are often unpredictable. To address this, we developed a novel screening method (GSA-QHTS) that couples the computational power of global sensitivity analysis (GSA) with the experimental efficiency of quantitative high-throughput screening (QHTS). We present a case study where GSA-QHTS allowed for the identification of the main pharmaceutical pollutants (and their interactions), driving biological effects of low-dose complex mixtures at the microbial population level. The QHTS experiments involved the integrated analysis of nearly 2700 observations from an array of 180 unique low-dose mixtures, representing the most complex and data-rich experimental mixture effect assessment of main pharmaceutical pollutants to date. An ecological scaling-up experiment confirmed that this subset of pollutants also affects typical freshwater microbial community assemblages. Contrary to our expectations and challenging established scientific opinion, the bioactivity of the mixtures was not predicted by the null mixture models, and the main drivers that were identified by GSA-QHTS were overlooked by the current effect assessment scheme. Our results suggest that current chemical effect assessment methods overlook a substantial number of ecologically dangerous chemical pollutants and introduce a new operational framework for their systematic identification.

  13. Hidden drivers of low-dose pharmaceutical pollutant mixtures revealed by the novel GSA-QHTS screening method.

    PubMed

    Rodea-Palomares, Ismael; Gonzalez-Pleiter, Miguel; Gonzalo, Soledad; Rosal, Roberto; Leganes, Francisco; Sabater, Sergi; Casellas, Maria; Muñoz-Carpena, Rafael; Fernández-Piñas, Francisca

    2016-09-01

    The ecological impacts of emerging pollutants such as pharmaceuticals are not well understood. The lack of experimental approaches for the identification of pollutant effects in realistic settings (that is, low doses, complex mixtures, and variable environmental conditions) supports the widespread perception that these effects are often unpredictable. To address this, we developed a novel screening method (GSA-QHTS) that couples the computational power of global sensitivity analysis (GSA) with the experimental efficiency of quantitative high-throughput screening (QHTS). We present a case study where GSA-QHTS allowed for the identification of the main pharmaceutical pollutants (and their interactions), driving biological effects of low-dose complex mixtures at the microbial population level. The QHTS experiments involved the integrated analysis of nearly 2700 observations from an array of 180 unique low-dose mixtures, representing the most complex and data-rich experimental mixture effect assessment of main pharmaceutical pollutants to date. An ecological scaling-up experiment confirmed that this subset of pollutants also affects typical freshwater microbial community assemblages. Contrary to our expectations and challenging established scientific opinion, the bioactivity of the mixtures was not predicted by the null mixture models, and the main drivers that were identified by GSA-QHTS were overlooked by the current effect assessment scheme. Our results suggest that current chemical effect assessment methods overlook a substantial number of ecologically dangerous chemical pollutants and introduce a new operational framework for their systematic identification. PMID:27617294

  14. E-Mail Privacy.

    ERIC Educational Resources Information Center

    Shieh, Jackie; Ballard, Rhea A-L

    1994-01-01

    Examines the relationship between electronic mail (E-mail) and employee privacy rights. Two current course cases involving the privacy issue are summarized; the Electronic Communications Privacy Act of 1986 is explained; proposed legislation is discussed; and suggestions for employee E-mail privacy that can help avoid possible litigation are…

  15. Widening Privacy Concerns.

    ERIC Educational Resources Information Center

    Amidon, Paige

    1992-01-01

    Discusses privacy concerns relating to electronic information media. European privacy initiatives from the European Community are described, including personal data protection, impact on the online industry, and telecommunications privacy; and activities in the United States are examined, including telephone caller privacy, electronic mail…

  16. 12 CFR 1204.3 - How do I make a Privacy Act request?

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... send your written request to the Privacy Act Officer by electronic mail, regular mail, or fax. The electronic mail address is: privacy@fhfa.gov. The regular mail address is: Privacy Act Officer, Federal... the quickest possible handling, you should mark your electronic mail, letter, or fax and the...

  17. The Potential to Promote Resilience: Piloting a Minority Stress-Informed, GSA-Based, Mental Health Promotion Program for LGBTQ Youth

    PubMed Central

    Heck, Nicholas C.

    2015-01-01

    This article describes the results of a pilot study to determine the feasibility and acceptability of a mental health promotion program that was developed to address minority stressors and promote coping skills among lesbian, gay, bisexual, transgender, and queer (LGBTQ) youth. It was hypothesized that the program would be feasible to implement within the context of a gay-straight alliance (GSA) and that GSA members would find the program acceptable (e.g., educational, enjoyable, helpful, and relevant). Participants included ten members of a high school GSA in the northeastern United States. The program sessions were delivered during GSA meetings. The first session emphasized the identification of minority and general stressors, which was followed by a discussion of coping strategies. The remaining sessions emphasized the development of cognitive coping, affect regulation, and problem-solving skills. After each session, participants completed a 13-item feedback form. Ten items assessed acceptability and three open-ended items allowed participants to provide constructive feedback. Although the program was feasible to implement within the GSA setting, attendance at the sessions was variable. Those who attended the sessions reported them to be enjoyable, informative, relevant to their lives, and potentially helpful for other LGBTQ students. After revising the program, future research is needed to investigate its dissemination potential and determine whether the program can disrupt the minority stress-psychiatric distress relationship. PMID:26366425

  18. GSA's Green Proving Ground: Identifying, Testing and Evaluating Innovative Technologies (Presentation)

    SciTech Connect

    Kandt, A.; Lowell, M.

    2012-05-01

    GSA's Green Proving Ground (GPG) program utilizes GSA's real estate portfolio to test and evaluate innovative and underutilized sustainable building technologies and practices. Findings are used to support the development of GSA performance specifications and inform decision making within GSA, other federal agencies, and the real estate industry. The program aims to drive innovation in environmental performance in federal buildings and help lead market transformation through deployment of new technologies.

  19. 41 CFR 102-37.490 - When must a SASP coordinate with GSA on compliance actions?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 41 Public Contracts and Property Management 3 2010-07-01 2010-07-01 false When must a SASP coordinate with GSA on compliance actions? 102-37.490 Section 102-37.490 Public Contracts and Property... SASP coordinate with GSA on compliance actions? You must coordinate with GSA before selling...

  20. 41 CFR 101-28.202 - GSA/DOD cross-servicing agreement.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 41 Public Contracts and Property Management 2 2013-07-01 2012-07-01 true GSA/DOD cross-servicing... DISTRIBUTION 28.2-Interagency Cross-Servicing in Storage Activities § 101-28.202 GSA/DOD cross-servicing agreement. An agreement between GSA and DOD has established procedures to be followed in the...

  1. 41 CFR 101-28.202 - GSA/DOD cross-servicing agreement.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 41 Public Contracts and Property Management 2 2012-07-01 2012-07-01 false GSA/DOD cross-servicing... DISTRIBUTION 28.2-Interagency Cross-Servicing in Storage Activities § 101-28.202 GSA/DOD cross-servicing agreement. An agreement between GSA and DOD has established procedures to be followed in the...

  2. 41 CFR 101-28.202 - GSA/DOD cross-servicing agreement.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 41 Public Contracts and Property Management 2 2014-07-01 2012-07-01 true GSA/DOD cross-servicing... DISTRIBUTION 28.2-Interagency Cross-Servicing in Storage Activities § 101-28.202 GSA/DOD cross-servicing agreement. An agreement between GSA and DOD has established procedures to be followed in the...

  3. 41 CFR 101-28.202 - GSA/DOD cross-servicing agreement.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 41 Public Contracts and Property Management 2 2010-07-01 2010-07-01 true GSA/DOD cross-servicing... DISTRIBUTION 28.2-Interagency Cross-Servicing in Storage Activities § 101-28.202 GSA/DOD cross-servicing agreement. An agreement between GSA and DOD has established procedures to be followed in the...

  4. 41 CFR 101-28.202 - GSA/DOD cross-servicing agreement.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 41 Public Contracts and Property Management 2 2011-07-01 2007-07-01 true GSA/DOD cross-servicing... DISTRIBUTION 28.2-Interagency Cross-Servicing in Storage Activities § 101-28.202 GSA/DOD cross-servicing agreement. An agreement between GSA and DOD has established procedures to be followed in the...

  5. 41 CFR 102-71.20 - What definitions apply to GSA's real property policies?

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... to GSA's real property policies? 102-71.20 Section 102-71.20 Public Contracts and Property Management...-GENERAL § 102-71.20 What definitions apply to GSA's real property policies? The following definitions apply to GSA's real property policies: Airport means any area of land or water that is used, or...

  6. 41 CFR 101-30.101-10 - GSA section of the Federal Supply Catalog.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... Federal Supply Catalog. 101-30.101-10 Section 101-30.101-10 Public Contracts and Property Management... PROCUREMENT 30-FEDERAL CATALOG SYSTEM 30.1-General § 101-30.101-10 GSA section of the Federal Supply Catalog. GSA section of the Federal Supply Catalog means a series of supply catalogs issued by GSA as...

  7. 41 CFR 101-30.101-10 - GSA section of the Federal Supply Catalog.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... Federal Supply Catalog. 101-30.101-10 Section 101-30.101-10 Public Contracts and Property Management... PROCUREMENT 30-FEDERAL CATALOG SYSTEM 30.1-General § 101-30.101-10 GSA section of the Federal Supply Catalog. GSA section of the Federal Supply Catalog means a series of supply catalogs issued by GSA as...

  8. 41 CFR 101-30.101-10 - GSA section of the Federal Supply Catalog.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... Federal Supply Catalog. 101-30.101-10 Section 101-30.101-10 Public Contracts and Property Management... PROCUREMENT 30-FEDERAL CATALOG SYSTEM 30.1-General § 101-30.101-10 GSA section of the Federal Supply Catalog. GSA section of the Federal Supply Catalog means a series of supply catalogs issued by GSA as...

  9. 41 CFR 101-30.101-10 - GSA section of the Federal Supply Catalog.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... Federal Supply Catalog. 101-30.101-10 Section 101-30.101-10 Public Contracts and Property Management... PROCUREMENT 30-FEDERAL CATALOG SYSTEM 30.1-General § 101-30.101-10 GSA section of the Federal Supply Catalog. GSA section of the Federal Supply Catalog means a series of supply catalogs issued by GSA as...

  10. 41 CFR 101-30.101-10 - GSA section of the Federal Supply Catalog.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... Federal Supply Catalog. 101-30.101-10 Section 101-30.101-10 Public Contracts and Property Management... PROCUREMENT 30-FEDERAL CATALOG SYSTEM 30.1-General § 101-30.101-10 GSA section of the Federal Supply Catalog. GSA section of the Federal Supply Catalog means a series of supply catalogs issued by GSA as...

  11. 75 FR 13131 - General Services Administration Acquisition Regulation; Submission for OMB Review; GSA Advantage...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-03-18

    ...! and Electronic Commerce- FACNET AGENCY: Office of the Chief Acquisition Officer, GSA. ACTION: Notice... collection requirement regarding GSA Advantage! and Electronic Commerce-FACNET. A request for public comments..., Washington, DC 20405. Please cite OMB Control No. 3090-00XX, GSA Advantage! and Electronic...

  12. 41 CFR 102-118.340 - How does my agency contact the GSA Audit Division?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... contact the GSA Audit Division? 102-118.340 Section 102-118.340 Public Contracts and Property Management... Approved Program § 102-118.340 How does my agency contact the GSA Audit Division? Your agency may contact the GSA Audit Division by writing to: General Services Administration, Transportation Audit...

  13. 41 CFR 102-33.380 - Who must report information to GSA on Government aircraft?

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ...-33.380 Who must report information to GSA on Government aircraft? You must report information to GSA... 41 Public Contracts and Property Management 3 2013-07-01 2013-07-01 false Who must report information to GSA on Government aircraft? 102-33.380 Section 102-33.380 Public Contracts and...

  14. 41 CFR 102-33.380 - Who must report information to GSA on Government aircraft?

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ...-33.380 Who must report information to GSA on Government aircraft? You must report information to GSA... 41 Public Contracts and Property Management 3 2011-01-01 2011-01-01 false Who must report information to GSA on Government aircraft? 102-33.380 Section 102-33.380 Public Contracts and...

  15. 41 CFR 102-33.380 - Who must report information to GSA on Government aircraft?

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ...-33.380 Who must report information to GSA on Government aircraft? You must report information to GSA... 41 Public Contracts and Property Management 3 2012-01-01 2012-01-01 false Who must report information to GSA on Government aircraft? 102-33.380 Section 102-33.380 Public Contracts and...

  16. 41 CFR 102-33.380 - Who must report information to GSA on Government aircraft?

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ...-33.380 Who must report information to GSA on Government aircraft? You must report information to GSA... 41 Public Contracts and Property Management 3 2014-01-01 2014-01-01 false Who must report information to GSA on Government aircraft? 102-33.380 Section 102-33.380 Public Contracts and...

  17. Teaching Information Privacy in Marketing Courses: Key Educational Issues for Principles of Marketing and Elective Marketing Courses

    ERIC Educational Resources Information Center

    Peltier, James W.; Milne, George R.; Phelps, Joseph E.; Barrett, Jennifer T.

    2010-01-01

    An "information privacy gap" exists in marketing education, with little research addressing the state of information privacy and how appropriate privacy strategies and tactics should be communicated to students. The primary purpose of this article is to provide educators an understanding of information privacy and how they can incorporate this…

  18. 41 CFR 101-1.4902 - GSA forms.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 41 Public Contracts and Property Management 2 2010-07-01 2010-07-01 true GSA forms. 101-1.4902 Section 101-1.4902 Public Contracts and Property Management Federal Property Management Regulations System FEDERAL PROPERTY MANAGEMENT REGULATIONS GENERAL 1-INTRODUCTION 1.49-Illustrations of Forms §...

  19. 48 CFR 41.204 - GSA areawide contracts.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 48 Federal Acquisition Regulations System 1 2013-10-01 2013-10-01 false GSA areawide contracts. 41.204 Section 41.204 Federal Acquisition Regulations System FEDERAL ACQUISITION REGULATION SPECIAL... entire geographical area covered by an areawide contract, although it may be available at...

  20. Leveraging Lighting for Energy Savings: GSA Northwest/Artic Region

    SciTech Connect

    2016-01-01

    Case study describes how the Northwest/Arctic Region branch of the General Services Administration (GSA) improved safety and energy efficiency in its Fairbanks Federal Building parking garage used by federal employees, U.S. Marshals, and the District Court. A 74% savings was realized by replacing 220 high-pressure sodium fixtures with 220 light-emitting diode fixtures.

  1. 41 CFR 101-27.504 - Notice to GSA.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 41 Public Contracts and Property Management 2 2010-07-01 2010-07-01 true Notice to GSA. 101-27.504 Section 101-27.504 Public Contracts and Property Management Federal Property Management Regulations System FEDERAL PROPERTY MANAGEMENT REGULATIONS SUPPLY AND PROCUREMENT 27-INVENTORY MANAGEMENT 27.5-Return of...

  2. 41 CFR 101-30.705 - GSA assistance.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 41 Public Contracts and Property Management 2 2010-07-01 2010-07-01 true GSA assistance. 101-30.705 Section 101-30.705 Public Contracts and Property Management Federal Property Management Regulations System FEDERAL PROPERTY MANAGEMENT REGULATIONS SUPPLY AND PROCUREMENT 30-FEDERAL CATALOG SYSTEM...

  3. 41 CFR 101-30.705 - GSA assistance.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 41 Public Contracts and Property Management 2 2012-07-01 2012-07-01 false GSA assistance. 101-30.705 Section 101-30.705 Public Contracts and Property Management Federal Property Management Regulations System FEDERAL PROPERTY MANAGEMENT REGULATIONS SUPPLY AND PROCUREMENT 30-FEDERAL CATALOG SYSTEM...

  4. 41 CFR 101-30.705 - GSA assistance.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 41 Public Contracts and Property Management 2 2011-07-01 2007-07-01 true GSA assistance. 101-30.705 Section 101-30.705 Public Contracts and Property Management Federal Property Management Regulations System FEDERAL PROPERTY MANAGEMENT REGULATIONS SUPPLY AND PROCUREMENT 30-FEDERAL CATALOG SYSTEM...

  5. 41 CFR 101-30.705 - GSA assistance.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 41 Public Contracts and Property Management 2 2014-07-01 2012-07-01 true GSA assistance. 101-30.705 Section 101-30.705 Public Contracts and Property Management Federal Property Management Regulations System FEDERAL PROPERTY MANAGEMENT REGULATIONS SUPPLY AND PROCUREMENT 30-FEDERAL CATALOG SYSTEM...

  6. 41 CFR 101-30.705 - GSA assistance.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 41 Public Contracts and Property Management 2 2013-07-01 2012-07-01 true GSA assistance. 101-30.705 Section 101-30.705 Public Contracts and Property Management Federal Property Management Regulations System FEDERAL PROPERTY MANAGEMENT REGULATIONS SUPPLY AND PROCUREMENT 30-FEDERAL CATALOG SYSTEM...

  7. Privacy and Library Records

    ERIC Educational Resources Information Center

    Bowers, Stacey L.

    2006-01-01

    This paper summarizes the history of privacy as it relates to library records. It commences with a discussion of how the concept of privacy first originated through case law and follows the concept of privacy as it has affected library records through current day and the "USA PATRIOT Act."

  8. Privacy-Enhanced and Multifunctional Health Data Aggregation under Differential Privacy Guarantees.

    PubMed

    Ren, Hao; Li, Hongwei; Liang, Xiaohui; He, Shibo; Dai, Yuanshun; Zhao, Lian

    2016-09-10

    With the rapid growth of the health data scale, the limited storage and computation resources of wireless body area sensor networks (WBANs) is becoming a barrier to their development. Therefore, outsourcing the encrypted health data to the cloud has been an appealing strategy. However, date aggregation will become difficult. Some recently-proposed schemes try to address this problem. However, there are still some functions and privacy issues that are not discussed. In this paper, we propose a privacy-enhanced and multifunctional health data aggregation scheme (PMHA-DP) under differential privacy. Specifically, we achieve a new aggregation function, weighted average (WAAS), and design a privacy-enhanced aggregation scheme (PAAS) to protect the aggregated data from cloud servers. Besides, a histogram aggregation scheme with high accuracy is proposed. PMHA-DP supports fault tolerance while preserving data privacy. The performance evaluation shows that the proposal leads to less communication overhead than the existing one.

  9. Privacy-Enhanced and Multifunctional Health Data Aggregation under Differential Privacy Guarantees

    PubMed Central

    Ren, Hao; Li, Hongwei; Liang, Xiaohui; He, Shibo; Dai, Yuanshun; Zhao, Lian

    2016-01-01

    With the rapid growth of the health data scale, the limited storage and computation resources of wireless body area sensor networks (WBANs) is becoming a barrier to their development. Therefore, outsourcing the encrypted health data to the cloud has been an appealing strategy. However, date aggregation will become difficult. Some recently-proposed schemes try to address this problem. However, there are still some functions and privacy issues that are not discussed. In this paper, we propose a privacy-enhanced and multifunctional health data aggregation scheme (PMHA-DP) under differential privacy. Specifically, we achieve a new aggregation function, weighted average (WAAS), and design a privacy-enhanced aggregation scheme (PAAS) to protect the aggregated data from cloud servers. Besides, a histogram aggregation scheme with high accuracy is proposed. PMHA-DP supports fault tolerance while preserving data privacy. The performance evaluation shows that the proposal leads to less communication overhead than the existing one. PMID:27626417

  10. Privacy-Enhanced and Multifunctional Health Data Aggregation under Differential Privacy Guarantees.

    PubMed

    Ren, Hao; Li, Hongwei; Liang, Xiaohui; He, Shibo; Dai, Yuanshun; Zhao, Lian

    2016-01-01

    With the rapid growth of the health data scale, the limited storage and computation resources of wireless body area sensor networks (WBANs) is becoming a barrier to their development. Therefore, outsourcing the encrypted health data to the cloud has been an appealing strategy. However, date aggregation will become difficult. Some recently-proposed schemes try to address this problem. However, there are still some functions and privacy issues that are not discussed. In this paper, we propose a privacy-enhanced and multifunctional health data aggregation scheme (PMHA-DP) under differential privacy. Specifically, we achieve a new aggregation function, weighted average (WAAS), and design a privacy-enhanced aggregation scheme (PAAS) to protect the aggregated data from cloud servers. Besides, a histogram aggregation scheme with high accuracy is proposed. PMHA-DP supports fault tolerance while preserving data privacy. The performance evaluation shows that the proposal leads to less communication overhead than the existing one. PMID:27626417

  11. 41 CFR 302-1.102 - Are agencies required to report their employee relocation activities to GSA?

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... report their employee relocation activities to GSA? 302-1.102 Section 302-1.102 Public Contracts and... employee relocation activities to GSA? Yes, every agency that spends more than $5 million a year on travel... survey year, must annually report their employee relocation activities to GSA. GSA works with...

  12. 41 CFR 302-1.102 - Are agencies required to report their employee relocation activities to GSA?

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... report their employee relocation activities to GSA? 302-1.102 Section 302-1.102 Public Contracts and... employee relocation activities to GSA? Yes, every agency that spends more than $5 million a year on travel... survey year, must annually report their employee relocation activities to GSA. GSA works with...

  13. 41 CFR 102-85.215 - What if another customer agency forces a GSA customer to move?

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 41 Public Contracts and Property Management 3 2011-01-01 2011-01-01 false What if another customer... § 102-85.215 What if another customer agency forces a GSA customer to move? If a GSA customer agency, or GSA, forces the relocation of another GSA customer agency prior to the expiration of the customer's...

  14. 41 CFR 102-75.1150 - What happens to the gift if GSA determines it to be acceptable?

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... if GSA determines it to be acceptable? 102-75.1150 Section 102-75.1150 Public Contracts and Property...-75.1150 What happens to the gift if GSA determines it to be acceptable? When GSA determines that the gift is acceptable and can be accepted and used in the form in which it was offered, GSA must...

  15. Choose Privacy Week: Educate Your Students (and Yourself) about Privacy

    ERIC Educational Resources Information Center

    Adams, Helen R.

    2016-01-01

    The purpose of "Choose Privacy Week" is to encourage a national conversation to raise awareness of the growing threats to personal privacy online and in day-to-day life. The 2016 Choose Privacy Week theme is "respecting individuals' privacy," with an emphasis on minors' privacy. A plethora of issues relating to minors' privacy…

  16. HealthConnect and privacy: a policy conundrum.

    PubMed

    Paterson, Moira

    2004-08-01

    A shared electronic health record is intrinsically privacy-invasive because it creates a comprehensive record for information-sharing. The author explains the significance of information privacy and why it is that health information warrants special protection. She also provides an overview of the existing regulatory framework and an evaluation of suggested options and proposals for addressing privacy-related issues. Her analysis of suggested consent models suggests that they ultimately involve a trade-off between privacy and the broader benefits promised by HealthConnect and that obtaining the right balance is essential if HealthConnect is to achieve optimal health outcomes.

  17. Should There Be an Expectation of Privacy in the Library? Online Treasures

    ERIC Educational Resources Information Center

    Balas, Janet L.

    2005-01-01

    Although some people feel that there should be no expectation of privacy in a library because it is a public place, the debate on the library's obligation to protect patron privacy continues. Despite the media attention given to some notorious breaches of privacy (for example, the hacking of Paris Hilton's electronic address book), and the…

  18. 5 CFR 1830.2 - Requirements for making Privacy Act requests.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 5 Administrative Personnel 3 2013-01-01 2013-01-01 false Requirements for making Privacy Act requests. 1830.2 Section 1830.2 Administrative Personnel OFFICE OF SPECIAL COUNSEL PRIVACY § 1830.2 Requirements for making Privacy Act requests. (a) How made and addressed. A request for OSC records under...

  19. Achieving network level privacy in Wireless Sensor Networks.

    PubMed

    Shaikh, Riaz Ahmed; Jameel, Hassan; d'Auriol, Brian J; Lee, Heejo; Lee, Sungyoung; Song, Young-Jae

    2010-01-01

    Full network level privacy has often been categorized into four sub-categories: Identity, Route, Location and Data privacy. Achieving full network level privacy is a critical and challenging problem due to the constraints imposed by the sensor nodes (e.g., energy, memory and computation power), sensor networks (e.g., mobility and topology) and QoS issues (e.g., packet reach-ability and timeliness). In this paper, we proposed two new identity, route and location privacy algorithms and data privacy mechanism that addresses this problem. The proposed solutions provide additional trustworthiness and reliability at modest cost of memory and energy. Also, we proved that our proposed solutions provide protection against various privacy disclosure attacks, such as eavesdropping and hop-by-hop trace back attacks.

  20. GSAFold: a new application of GSA to protein structure prediction.

    PubMed

    Melo, Marcelo C R; Bernardi, Rafael C; Fernandes, Tácio V A; Pascutti, Pedro G

    2012-08-01

    The folding process defines three-dimensional protein structures from their amino acid chains. A protein's structure determines its activity and properties; thus knowing such conformation on an atomic level is essential for both basic and applied studies of protein function and dynamics. However, the acquisition of such structures by experimental methods is slow and expensive, and current computational methods mostly depend on previously known structures to determine new ones. Here we present a new software called GSAFold that applies the generalized simulated annealing (GSA) algorithm on ab initio protein structure prediction. The GSA is a stochastic search algorithm employed in energy minimization and used in global optimization problems, especially those that depend on long-range interactions, such as gravity models and conformation optimization of small molecules. This new implementation applies, for the first time in ab initio protein structure prediction, an analytical inverse for the Visitation function of GSA. It also employs the broadly used NAMD Molecular Dynamics package to carry out energy calculations, allowing the user to select different force fields and parameterizations. Moreover, the software also allows the execution of several simulations simultaneously. Applications that depend on protein structures include rational drug design and structure-based protein function prediction. Applying GSAFold in a test peptide, it was possible to predict the structure of mastoparan-X to a root mean square deviation of 3.00 Å. PMID:22622959

  1. Comparative Approaches to Biobanks and Privacy.

    PubMed

    Rothstein, Mark A; Knoppers, Bartha Maria; Harrell, Heather L

    2016-03-01

    Laws in the 20 jurisdictions studied for this project display many similar approaches to protecting privacy in biobank research. Although few have enacted biobank-specific legislation, many countries address biobanking within other laws. All provide for some oversight mechanisms for biobank research, even though the nature of that oversight varies between jurisdictions. Most have some sort of controlled access system in place for research with biobank specimens. While broad consent models facilitate biobanking, countries without national or federated biobanks have been slow to adopt broad consent. International guidelines have facilitated sharing and generally take a proportional risk approach, but many countries have provisions guiding international sharing and a few even limit international sharing. Although privacy laws may not prohibit international collaborations, the multi-prong approach to privacy unique to each jurisdiction can complicate international sharing. These symposium issues can serve as a resource for explaining the sometimes intricate privacy laws in each studied jurisdiction, outlining the key issues with regards to privacy and biobanking, and serving to describe a framework for the process of harmonization of privacy laws. PMID:27256132

  2. Comparative Approaches to Biobanks and Privacy.

    PubMed

    Rothstein, Mark A; Knoppers, Bartha Maria; Harrell, Heather L

    2016-03-01

    Laws in the 20 jurisdictions studied for this project display many similar approaches to protecting privacy in biobank research. Although few have enacted biobank-specific legislation, many countries address biobanking within other laws. All provide for some oversight mechanisms for biobank research, even though the nature of that oversight varies between jurisdictions. Most have some sort of controlled access system in place for research with biobank specimens. While broad consent models facilitate biobanking, countries without national or federated biobanks have been slow to adopt broad consent. International guidelines have facilitated sharing and generally take a proportional risk approach, but many countries have provisions guiding international sharing and a few even limit international sharing. Although privacy laws may not prohibit international collaborations, the multi-prong approach to privacy unique to each jurisdiction can complicate international sharing. These symposium issues can serve as a resource for explaining the sometimes intricate privacy laws in each studied jurisdiction, outlining the key issues with regards to privacy and biobanking, and serving to describe a framework for the process of harmonization of privacy laws.

  3. Patient privacy in the genomic era.

    PubMed

    Raisaro, Jean Louis; Ayday, Erman; Hubaux, Jean-Pierre

    2014-05-01

    According to many scientists and clinicians, genomics is taking on a key role in the field of medicine. Impressive advances in genome sequencing have opened the way to a variety of revolutionary applications in modern healthcare. In particular, the increasing understanding of the human genome, and of its relation to diseases and response to treatments brings promise of improvements in better preventive and personalized medicine. However, this progress raises important privacy and ethical concerns that need to be addressed. Indeed, each genome is the ultimate identifier of its owner and, due to its nature, it contains highly personal and privacy-sensitive data. In this article, after summarizing recent advances in genomics, we discuss some important privacy issues associated with human genomic information and methods put in place to address them.

  4. The Impact of Privacy Legislation on the Federal Statistical System

    ERIC Educational Resources Information Center

    Duncan, Joseph W.

    1975-01-01

    Potential implications of the "Privacy Act of 1974" as well as related issues from the perspective of the federal statistical system are discussed. Journal address: DUALabs, 1601 N. Kent St., Suite 900, Arlington, Va. 22209. (RC)

  5. Stratospheric Transparency: Perspectives on Internet Privacy

    ERIC Educational Resources Information Center

    Hauck, Rita M.

    2009-01-01

    As a parent of teenagers in the 1980s, I recall a concern of the intrusion by MTV into our home. After futile attempts to block the program, my spouse and I set out to convince our sons of its intrusion. Our challenge was miniscule when compared to the Internet privacy issues of today. This paper addresses such challenges and proposes some…

  6. Ethics and Privacy.

    ERIC Educational Resources Information Center

    Brewer, Erin; Eastmond, Nick; Geertsen, Reed; Johnson, Doug; Lewandowski, Judith; Yeaman, Andrew R. J.

    2003-01-01

    Contains four articles covering trends and issues on ethics and privacy in instructional technology, including: considerations for assessing ethical issues; what schools must do to develop ethical behaviors in students; a privacy primer for educators; and manufacturing technophopia. Each article contains references. (MES)

  7. Emerging Privacy Issues.

    ERIC Educational Resources Information Center

    Ware, Willis H.

    As the issue of information privacy increases in complexity in terms of the number of organizations involved, the intricacy of the information flows, and the difficulty of conceiving appropriate legal safeguards, it is not certain that the practices and laws that have been developed for current privacy protection can work for new situations.…

  8. Toward practicing privacy

    PubMed Central

    Dwork, Cynthia; Pottenger, Rebecca

    2013-01-01

    Private data analysis—the useful analysis of confidential data—requires a rigorous and practicable definition of privacy. Differential privacy, an emerging standard, is the subject of intensive investigation in several diverse research communities. We review the definition, explain its motivation, and discuss some of the challenges to bringing this concept to practice. PMID:23243088

  9. Information Privacy Revealed

    ERIC Educational Resources Information Center

    Lavagnino, Merri Beth

    2013-01-01

    Why is Information Privacy the focus of the January-February 2013 issue of "EDUCAUSE Review" and "EDUCAUSE Review Online"? Results from the 2012 annual survey of the International Association of Privacy Professionals (IAPP) indicate that "meeting regulatory compliance requirements continues to be the top perceived driver…

  10. Achieving Optimal Privacy in Trust-Aware Social Recommender Systems

    NASA Astrophysics Data System (ADS)

    Dokoohaki, Nima; Kaleli, Cihan; Polat, Huseyin; Matskin, Mihhail

    Collaborative filtering (CF) recommenders are subject to numerous shortcomings such as centralized processing, vulnerability to shilling attacks, and most important of all privacy. To overcome these obstacles, researchers proposed for utilization of interpersonal trust between users, to alleviate many of these crucial shortcomings. Till now, attention has been mainly paid to strong points about trust-aware recommenders such as alleviating profile sparsity or calculation cost efficiency, while least attention has been paid on investigating the notion of privacy surrounding the disclosure of individual ratings and most importantly protection of trust computation across social networks forming the backbone of these systems. To contribute to addressing problem of privacy in trust-aware recommenders, within this paper, first we introduce a framework for enabling privacy-preserving trust-aware recommendation generation. While trust mechanism aims at elevating recommender's accuracy, to preserve privacy, accuracy of the system needs to be decreased. Since within this context, privacy and accuracy are conflicting goals we show that a Pareto set can be found as an optimal setting for both privacy-preserving and trust-enabling mechanisms. We show that this Pareto set, when used as the configuration for measuring the accuracy of base collaborative filtering engine, yields an optimized tradeoff between conflicting goals of privacy and accuracy. We prove this concept along with applicability of our framework by experimenting with accuracy and privacy factors, and we show through experiment how such optimal set can be inferred.

  11. Testing Privacy Awareness

    NASA Astrophysics Data System (ADS)

    Bergmann, Mike

    In web-based business processes the disclosure of personal data by the user is an essential part and mandatory for the processes. Privacy policies help to inform the user about his/her rights and to protect the user’s privacy. In this paper we present a test to empirically measure how the user’s privacy awareness changes by presenting specific elements of the privacy policy in close proximity to the required data items. We compare an experimental group using an enhanced interface to a control group using a conventional interface regarding their capability to recall the agreed privacy-related facts. A concrete online survey has been performed. The major results are presented.

  12. Availability and quality of mobile health app privacy policies.

    PubMed

    Sunyaev, Ali; Dehling, Tobias; Taylor, Patrick L; Mandl, Kenneth D

    2015-04-01

    Mobile health (mHealth) customers shopping for applications (apps) should be aware of app privacy practices so they can make informed decisions about purchase and use. We sought to assess the availability, scope, and transparency of mHealth app privacy policies on iOS and Android. Over 35,000 mHealth apps are available for iOS and Android. Of the 600 most commonly used apps, only 183 (30.5%) had privacy policies. Average policy length was 1755 (SD 1301) words with a reading grade level of 16 (SD 2.9). Two thirds (66.1%) of privacy policies did not specifically address the app itself. Our findings show that currently mHealth developers often fail to provide app privacy policies. The privacy policies that are available do not make information privacy practices transparent to users, require college-level literacy, and are often not focused on the app itself. Further research is warranted to address why privacy policies are often absent, opaque, or irrelevant, and to find a remedy. PMID:25147247

  13. Availability and quality of mobile health app privacy policies.

    PubMed

    Sunyaev, Ali; Dehling, Tobias; Taylor, Patrick L; Mandl, Kenneth D

    2015-04-01

    Mobile health (mHealth) customers shopping for applications (apps) should be aware of app privacy practices so they can make informed decisions about purchase and use. We sought to assess the availability, scope, and transparency of mHealth app privacy policies on iOS and Android. Over 35,000 mHealth apps are available for iOS and Android. Of the 600 most commonly used apps, only 183 (30.5%) had privacy policies. Average policy length was 1755 (SD 1301) words with a reading grade level of 16 (SD 2.9). Two thirds (66.1%) of privacy policies did not specifically address the app itself. Our findings show that currently mHealth developers often fail to provide app privacy policies. The privacy policies that are available do not make information privacy practices transparent to users, require college-level literacy, and are often not focused on the app itself. Further research is warranted to address why privacy policies are often absent, opaque, or irrelevant, and to find a remedy.

  14. Patients' experience of privacy and dignity. Part 2: An empirical study.

    PubMed

    Whitehead, Juliet; Wheeler, Herman

    In May-June 2006, a self-report questionnaire was completed by 40 inpatients to assess their experience of privacy and dignity in hospital. The questionnaire comprised closed and open questions, where the latter, among other things, required the patient's own narrative. Results indicate that patients view privacy/dignity as crucial. Although the staff and inadequate ward layouts compromise and conspire against patients' privacy and dignity, patients appear to sympathize with how hospitals are run, even if the caring environment fails to provide full privacy. Women have greater concerns, and both genders indicated how their privacy and dignity could be met. Recognizing problems relating to meeting patients' privacy and dignity, the article challenges clinical staff and hospital designers to address the issue, especially as central government initiatives and law demand serious attention to ensuring patients' privacy and dignity. Research is indicated to ascertain hospital designs, preferred care strategies and education to address the problem.

  15. 41 CFR 102-192.90 - What must we include in our annual mail management report to GSA?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... publication called “Marketips,” which provides information about supplies and services available through GSA... regard. Note to § 102-192.90: GSA is launching a long-term initiative to improve the usefulness of...

  16. 41 CFR 101-26.4902-1781 - GSA Form 1781, Motor Vehicle Requisition-Delivery Order.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 41 Public Contracts and Property Management 2 2010-07-01 2010-07-01 true GSA Form 1781, Motor Vehicle Requisition-Delivery Order. 101-26.4902-1781 Section 101-26.4902-1781 Public Contracts and... GSA Form 1781, Motor Vehicle Requisition—Delivery Order. Note: The form illustrated in §...

  17. 41 CFR 102-35.15 - What are the goals of GSA's personal property regulations?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 41 Public Contracts and Property Management 3 2010-07-01 2010-07-01 false What are the goals of... PROPERTY 35-DISPOSITION OF PERSONAL PROPERTY § 102-35.15 What are the goals of GSA's personal property regulations? The goals of GSA's personal property regulations are to: (a) Improve the identification...

  18. 45 CFR 12a.5 - Real property reported excess to GSA.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... determine interest in the property in accordance with current regulations. (See 41 CFR 101-47.203-5, 101-47... protect and maintain any property which is reported excess to GSA as provided in 41 CFR 101-47.402. ... in § 12a.5(e). In lieu of the above, GSA may submit a new checklist to HUD and follow the...

  19. 24 CFR 581.5 - Real property reported excess to GSA.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... property in accordance with current regulations. (See 41 CFR 101-47.203-5, 101-47.204-1 and 101-47.303-2... property which is reported excess to GSA as provided in 41 CFR 101-47.402. ... above, GSA may submit a new checklist to HUD and follow the procedures in § 581.5(c) through §...

  20. 24 CFR 581.5 - Real property reported excess to GSA.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... property in accordance with current regulations. (See 41 CFR 101-47.203-5, 101-47.204-1 and 101-47.303-2... property which is reported excess to GSA as provided in 41 CFR 101-47.402. ... above, GSA may submit a new checklist to HUD and follow the procedures in § 581.5(c) through §...

  1. 45 CFR 12a.5 - Real property reported excess to GSA.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... determine interest in the property in accordance with current regulations. (See 41 CFR 101-47.203-5, 101-47... protect and maintain any property which is reported excess to GSA as provided in 41 CFR 101-47.402. ... in § 12a.5(e). In lieu of the above, GSA may submit a new checklist to HUD and follow the...

  2. 41 CFR 105-64.110 - When may GSA establish computer matching programs?

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... computer matching programs? 105-64.110 Section 105-64.110 Public Contracts and Property Management Federal... GSA establish computer matching programs? (a) System managers will establish computer matching... direction of the GSA Data Integrity Board that will be established when and if computer matching...

  3. 41 CFR 105-64.110 - When may GSA establish computer matching programs?

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... computer matching programs? 105-64.110 Section 105-64.110 Public Contracts and Property Management Federal... GSA establish computer matching programs? (a) System managers will establish computer matching... direction of the GSA Data Integrity Board that will be established when and if computer matching...

  4. 41 CFR 105-64.110 - When may GSA establish computer matching programs?

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... computer matching programs? 105-64.110 Section 105-64.110 Public Contracts and Property Management Federal... GSA establish computer matching programs? (a) System managers will establish computer matching... direction of the GSA Data Integrity Board that will be established when and if computer matching...

  5. 41 CFR 105-64.110 - When may GSA establish computer matching programs?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... computer matching programs? 105-64.110 Section 105-64.110 Public Contracts and Property Management Federal... GSA establish computer matching programs? (a) System managers will establish computer matching... direction of the GSA Data Integrity Board that will be established when and if computer matching...

  6. 41 CFR 105-64.110 - When may GSA establish computer matching programs?

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... computer matching programs? 105-64.110 Section 105-64.110 Public Contracts and Property Management Federal... GSA establish computer matching programs? (a) System managers will establish computer matching... direction of the GSA Data Integrity Board that will be established when and if computer matching...

  7. 41 CFR 102-37.90 - What are GSA's responsibilities in the donation of surplus property?

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... responsibilities in the donation of surplus property? 102-37.90 Section 102-37.90 Public Contracts and Property... PROPERTY 37-DONATION OF SURPLUS PERSONAL PROPERTY General Services Administration (GSA) § 102-37.90 What are GSA's responsibilities in the donation of surplus property? The General Services...

  8. 77 FR 15759 - Information Collection; Federal Management Regulation; GSA Form 3040, State Agency Monthly...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-03-16

    ... Donation Report of Surplus Property AGENCY: Federal Acquisition Service, GSA. ACTION: Notice of request for... regarding GSA Form 3040, State Agency Monthly Donation Report of Surplus Property. Public comments are..., State Agency Monthly Donation Report of Surplus Personal Property by any of the following...

  9. 41 CFR 102-37.90 - What are GSA's responsibilities in the donation of surplus property?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... responsibilities in the donation of surplus property? 102-37.90 Section 102-37.90 Public Contracts and Property... PROPERTY 37-DONATION OF SURPLUS PERSONAL PROPERTY General Services Administration (GSA) § 102-37.90 What are GSA's responsibilities in the donation of surplus property? The General Services...

  10. 41 CFR 102-75.299 - What are landholding agencies' responsibilities if GSA conducts the disposal?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... agencies' responsibilities if GSA conducts the disposal? 102-75.299 Section 102-75.299 Public Contracts and... REGULATION REAL PROPERTY 75-REAL PROPERTY DISPOSAL Surplus Real Property Disposal Designation of Disposal Agencies § 102-75.299 What are landholding agencies' responsibilities if GSA conducts the...

  11. 41 CFR 101-26.503 - Multiple award schedule purchases made by GSA supply distribution facilities.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 41 Public Contracts and Property Management 2 2010-07-01 2010-07-01 true Multiple award schedule... Multiple award schedule purchases made by GSA supply distribution facilities. GSA supply distribution... items. Stocking a variety of commercial, high-demand items purchased from FSS multiple award...

  12. 41 CFR 105-60.305-4 - GSA records available at a fee.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 41 Public Contracts and Property Management 3 2010-07-01 2010-07-01 false GSA records available at a fee. 105-60.305-4 Section 105-60.305-4 Public Contracts and Property Management Federal Property..., Orders, Policies, Interpretations, Manuals, and Instructions § 105-60.305-4 GSA records available at...

  13. 41 CFR 102-33.40 - What are GSA's responsibilities for Federal aviation management?

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... responsibilities for Federal aviation management? 102-33.40 Section 102-33.40 Public Contracts and Property... GSA's responsibilities for Federal aviation management? Under OMB Circular A-126, “Improving the.../omb), GSA's chief responsibilities for Federal aviation management are to maintain— (a) A...

  14. 41 CFR 102-33.40 - What are GSA's responsibilities for Federal aviation management?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... responsibilities for Federal aviation management? 102-33.40 Section 102-33.40 Public Contracts and Property... GSA's responsibilities for Federal aviation management? Under OMB Circular A-126, “Improving the.../omb), GSA's chief responsibilities for Federal aviation management are to maintain— (a) A...

  15. 41 CFR 102-33.40 - What are GSA's responsibilities for Federal aviation management?

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... responsibilities for Federal aviation management? 102-33.40 Section 102-33.40 Public Contracts and Property... GSA's responsibilities for Federal aviation management? Under OMB Circular A-126, “Improving the.../omb), GSA's chief responsibilities for Federal aviation management are to maintain— (a) A...

  16. 41 CFR 102-33.40 - What are GSA's responsibilities for Federal aviation management?

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... responsibilities for Federal aviation management? 102-33.40 Section 102-33.40 Public Contracts and Property... GSA's responsibilities for Federal aviation management? Under OMB Circular A-126, “Improving the.../omb), GSA's chief responsibilities for Federal aviation management are to maintain— (a) A...

  17. 41 CFR 102-33.40 - What are GSA's responsibilities for Federal aviation management?

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... responsibilities for Federal aviation management? 102-33.40 Section 102-33.40 Public Contracts and Property... GSA's responsibilities for Federal aviation management? Under OMB Circular A-126, “Improving the.../omb), GSA's chief responsibilities for Federal aviation management are to maintain— (a) A...

  18. 41 CFR 102-36.275 - May we dispose of excess personal property without GSA approval?

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ...) You may dispose of excess personal property without going through GSA when such disposal is authorized..., you may not dispose of excess personal property without GSA approval except under the following limited situations: (a) You may transfer to another federal agency excess personal property that has...

  19. 41 CFR 102-36.275 - May we dispose of excess personal property without GSA approval?

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ...) You may dispose of excess personal property without going through GSA when such disposal is authorized..., you may not dispose of excess personal property without GSA approval except under the following limited situations: (a) You may transfer to another federal agency excess personal property that has...

  20. 41 CFR 102-36.275 - May we dispose of excess personal property without GSA approval?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ...) You may dispose of excess personal property without going through GSA when such disposal is authorized..., you may not dispose of excess personal property without GSA approval except under the following limited situations: (a) You may transfer to another federal agency excess personal property that has...

  1. 41 CFR 102-36.275 - May we dispose of excess personal property without GSA approval?

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ...) You may dispose of excess personal property without going through GSA when such disposal is authorized..., you may not dispose of excess personal property without GSA approval except under the following limited situations: (a) You may transfer to another federal agency excess personal property that has...

  2. 41 CFR 102-36.275 - May we dispose of excess personal property without GSA approval?

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ...) You may dispose of excess personal property without going through GSA when such disposal is authorized..., you may not dispose of excess personal property without GSA approval except under the following limited situations: (a) You may transfer to another federal agency excess personal property that has...

  3. Privacy and Property in the Biobank Context

    PubMed Central

    2010-01-01

    A research biobank is a collection of personal health and lifestyle information, including genetic samples of yet unknown but possibly large information potential about the participant. For the participants, the risk of taking part is not bodily harm but infringements of their privacy and the harmful consequences such infringements might have. But what do we mean by privacy? Which harms are we talking about? To address such questions we need to get a grip on what privacy is all about and aim for a fruitful perspective on the issues of property and privacy rights in the context of biobanking. This paper argues that the limits and handling of private matters is determined in specific social relations. The crucial point is thus to determine which information and activities are or are not the legitimate concern of others. Privacy and property rights should be seen as balanced by duties, that is as inherently relational interests extending into the public sphere, rather than to see these rights as the control of an object—for instance the participant’s biobank material. PMID:20799053

  4. Privacy and property in the biobank context.

    PubMed

    Ursin, Lars Oystein

    2010-09-01

    A research biobank is a collection of personal health and lifestyle information, including genetic samples of yet unknown but possibly large information potential about the participant. For the participants, the risk of taking part is not bodily harm but infringements of their privacy and the harmful consequences such infringements might have. But what do we mean by privacy? Which harms are we talking about? To address such questions we need to get a grip on what privacy is all about and aim for a fruitful perspective on the issues of property and privacy rights in the context of biobanking. This paper argues that the limits and handling of private matters is determined in specific social relations. The crucial point is thus to determine which information and activities are or are not the legitimate concern of others. Privacy and property rights should be seen as balanced by duties, that is as inherently relational interests extending into the public sphere, rather than to see these rights as the control of an object--for instance the participant's biobank material.

  5. Privacy, technology, and norms: the case of Smart Meters.

    PubMed

    Horne, Christine; Darras, Brice; Bean, Elyse; Srivastava, Anurag; Frickel, Scott

    2015-05-01

    Norms shift and emerge in response to technological innovation. One such innovation is Smart Meters - components of Smart Grid energy systems capable of minute-to-minute transmission of consumer electricity use information. We integrate theory from sociological research on social norms and privacy to examine how privacy threats affect the demand for and expectations of norms that emerge in response to new technologies, using Smart Meters as a test case. Results from three vignette experiments suggest that increased threats to privacy created by Smart Meters are likely to provoke strong demand for and expectations of norms opposing the technology and that the strength of these normative rules is at least partly conditional on the context. Privacy concerns vary little with actors' demographic characteristics. These findings contribute to theoretical understanding of norm emergence and have practical implications for implementing privacy protections that effectively address concerns of electricity users.

  6. Privacy, technology, and norms: the case of Smart Meters.

    PubMed

    Horne, Christine; Darras, Brice; Bean, Elyse; Srivastava, Anurag; Frickel, Scott

    2015-05-01

    Norms shift and emerge in response to technological innovation. One such innovation is Smart Meters - components of Smart Grid energy systems capable of minute-to-minute transmission of consumer electricity use information. We integrate theory from sociological research on social norms and privacy to examine how privacy threats affect the demand for and expectations of norms that emerge in response to new technologies, using Smart Meters as a test case. Results from three vignette experiments suggest that increased threats to privacy created by Smart Meters are likely to provoke strong demand for and expectations of norms opposing the technology and that the strength of these normative rules is at least partly conditional on the context. Privacy concerns vary little with actors' demographic characteristics. These findings contribute to theoretical understanding of norm emergence and have practical implications for implementing privacy protections that effectively address concerns of electricity users. PMID:25769852

  7. Energy Savings from GSA's National Deep Retrofit Program

    SciTech Connect

    Shonder, John A

    2014-09-01

    Under its National Deep Energy Retrofit (NDER) program, the U.S. General Services Administration (GSA) awarded 10 ESPC projects with the objectives of using innovative technologies and renewable energy technologies, and moving buildings toward net zero energy consumption. This report analyzes data on energy savings from the 10 NDER projects, and compares them with the savings of a sample of other recently awarded Federal ESPC projects. It is shown that by emphasizing the need for deeper energy savings, and by the establishment of a central Project Management Office (PMO) to provide authoritative contracting, technical and pricing assistance, the NDER projects achieved an average level of savings more than twice that of the other Federal ESPC projects. The level of savings achieved in each project seems to be dependent more on the availability of ECMs at the site than on energy price, energy cost per square foot, pre-retrofit EUI or the length of the contract term. This suggests that GSA can achieve similar results in a wide variety of building

  8. Plug-Load Control and Behavioral Change Research in GSA Office Buildings

    SciTech Connect

    Metzger, I.; Cutler, D.; Sheppy, M.

    2012-10-01

    The U.S. General Services Administration (GSA) owns and leases over 354 million square feet (ft2) of space in over 9,600 buildings [1]. GSA is a leader among federal agencies in aggressively pursuing energy efficiency (EE) opportunities for its facilities and installing renewable energy (RE) systems to provide heating, cooling, and power to these facilities. According to several energy assessments of GSA's buildings conducted by the National Renewable Energy Laboratory (NREL), plug-loads account for approximately 21% of the total electricity consumed within a standard GSA Region 3 office building. This study aims to provide insight on how to effectively manage plug-load energy consumption and attain higher energy and cost savings for plug-loads. As GSA improves the efficiency of its building stock, plug-loads will become an even greater portion of its energy footprint.

  9. EGRP Privacy Policy & Disclaimers

    Cancer.gov

    The Epidemiology and Genomics Research Program complies with requirements for privacy and security established by the Office of Management and Budget, Department of Health and Human Services, the National Institutes of Health, and the National Cancer Institute.

  10. 41 CFR 102-73.85 - Can agencies with independent statutory authority to lease space have GSA perform the leasing...

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... independent statutory authority to lease space have GSA perform the leasing functions? 102-73.85 Section 102...-73.85 Can agencies with independent statutory authority to lease space have GSA perform the leasing functions? Yes, upon request, GSA may perform, on a reimbursable basis, all functions of leasing...

  11. 77 FR 38064 - Public Buildings Service; Information Collection; GSA Form 3453, Application/Permit for Use of...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-06-26

    ... Space in Public Buildings and Grounds AGENCY: Public Buildings Service, GSA. ACTION: Notice of request... requirement regarding GSA Form 3453, Application/Permit for Use of Space in Public Buildings and Grounds... Information Collection 3090- 0044, GSA Form 3453, Application/Permit for Use of Space in Public Buildings...

  12. 48 CFR 339.7001 - Request for approval to make an award to other than a GSA BPA holder.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... make an award to other than a GSA BPA holder. 339.7001 Section 339.7001 Federal Acquisition Regulations... Services 339.7001 Request for approval to make an award to other than a GSA BPA holder. The Contracting... micro-purchase threshold, that obtaining the required services from a source other than a GSA BPA...

  13. 48 CFR 339.7001 - Request for approval to make an award to other than a GSA BPA holder.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... make an award to other than a GSA BPA holder. 339.7001 Section 339.7001 Federal Acquisition Regulations... Services 339.7001 Request for approval to make an award to other than a GSA BPA holder. The Contracting... micro-purchase threshold, that obtaining the required services from a source other than a GSA BPA...

  14. 48 CFR 339.7001 - Request for approval to make an award to other than a GSA BPA holder.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... make an award to other than a GSA BPA holder. 339.7001 Section 339.7001 Federal Acquisition Regulations... Services 339.7001 Request for approval to make an award to other than a GSA BPA holder. The Contracting... micro-purchase threshold, that obtaining the required services from a source other than a GSA BPA...

  15. 48 CFR 339.7001 - Request for approval to make an award to other than a GSA BPA holder.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... make an award to other than a GSA BPA holder. 339.7001 Section 339.7001 Federal Acquisition Regulations... Services 339.7001 Request for approval to make an award to other than a GSA BPA holder. The Contracting... micro-purchase threshold, that obtaining the required services from a source other than a GSA BPA...

  16. 48 CFR 339.7001 - Request for approval to make an award to other than a GSA BPA holder.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... make an award to other than a GSA BPA holder. 339.7001 Section 339.7001 Federal Acquisition Regulations... Services 339.7001 Request for approval to make an award to other than a GSA BPA holder. The Contracting... micro-purchase threshold, that obtaining the required services from a source other than a GSA BPA...

  17. 41 CFR 102-117.35 - What are the advantages and disadvantages of using GSA's tender of service?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 41 Public Contracts and Property Management 3 2010-07-01 2010-07-01 false What are the advantages...-117.35 What are the advantages and disadvantages of using GSA's tender of service? (a) It is an advantage to use GSA's tender of service when you want to: (1) Use GSA's authority to negotiate on behalf...

  18. 41 CFR 102-73.85 - Can agencies with independent statutory authority to lease space have GSA perform the leasing...

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... lease space. However, GSA reserves the right to accept or reject reimbursable leasing service requests... independent statutory authority to lease space have GSA perform the leasing functions? 102-73.85 Section 102...-73.85 Can agencies with independent statutory authority to lease space have GSA perform the...

  19. DQC Comments on the Posted Recommendations Regarding Data Security and Privacy Protections

    ERIC Educational Resources Information Center

    Data Quality Campaign, 2010

    2010-01-01

    The U.S. Department of Education is conducting several activities to address privacy and security issues related to education data. Earlier this year a contractor for the Department convened a group of privacy and security experts and produced a report with recommendations to the Department on ways they can address emerging challenges in…

  20. a Gsa-Svm Hybrid System for Classification of Binary Problems

    NASA Astrophysics Data System (ADS)

    Sarafrazi, Soroor; Nezamabadi-pour, Hossein; Barahman, Mojgan

    2011-06-01

    This paperhybridizesgravitational search algorithm (GSA) with support vector machine (SVM) and made a novel GSA-SVM hybrid system to improve the classification accuracy in binary problems. GSA is an optimization heuristic toolused to optimize the value of SVM kernel parameter (in this paper, radial basis function (RBF) is chosen as the kernel function). The experimental results show that this newapproach can achieve high classification accuracy and is comparable to or better than the particle swarm optimization (PSO)-SVM and genetic algorithm (GA)-SVM, which are two hybrid systems for classification.

  1. Disentangling privacy from property: toward a deeper understanding of genetic privacy.

    PubMed

    Suter, Sonia M

    2004-04-01

    connoting commodification, disaggregation, and arms-length dealings, can negatively affect the self and harm these relationships. This Article concludes that a deeper understanding of genetic privacy calls for remedies for privacy violations that address dignitary harm and breach of trust, as opposed to market harms, as the property model suggests.

  2. Inequalities for the quantum privacy

    NASA Astrophysics Data System (ADS)

    Trindade, M. A. S.; Pinto, E.

    2016-02-01

    In this work, we investigate the asymptotic behavior related to the quantum privacy for multipartite systems. In this context, an inequality for quantum privacy was obtained by exploiting of quantum entropy properties. Subsequently, we derive a lower limit for the quantum privacy through the entanglement fidelity. In particular, we show that there is an interval where an increase in entanglement fidelity implies a decrease in quantum privacy.

  3. The ultimate physical limits of privacy

    NASA Astrophysics Data System (ADS)

    Ekert, Artur; Renner, Renato

    2014-03-01

    Among those who make a living from the science of secrecy, worry and paranoia are just signs of professionalism. Can we protect our secrets against those who wield superior technological powers? Can we trust those who provide us with tools for protection? Can we even trust ourselves, our own freedom of choice? Recent developments in quantum cryptography show that some of these questions can be addressed and discussed in precise and operational terms, suggesting that privacy is indeed possible under surprisingly weak assumptions.

  4. The ultimate physical limits of privacy.

    PubMed

    Ekert, Artur; Renner, Renato

    2014-03-27

    Among those who make a living from the science of secrecy, worry and paranoia are just signs of professionalism. Can we protect our secrets against those who wield superior technological powers? Can we trust those who provide us with tools for protection? Can we even trust ourselves, our own freedom of choice? Recent developments in quantum cryptography show that some of these questions can be addressed and discussed in precise and operational terms, suggesting that privacy is indeed possible under surprisingly weak assumptions.

  5. Advertising and Invasion of Privacy.

    ERIC Educational Resources Information Center

    Rohrer, Daniel Morgan

    The right of privacy as it relates to advertising and the use of a person's name or likeness is discussed in this paper. After an introduction that traces some of the history of invasion of privacy in court decisions, the paper examines cases involving issues such as public figures and newsworthy items, right of privacy waived, right of privacy…

  6. Privacy Expectations in Online Contexts

    ERIC Educational Resources Information Center

    Pure, Rebekah Abigail

    2013-01-01

    Advances in digital networked communication technology over the last two decades have brought the issue of personal privacy into sharper focus within contemporary public discourse. In this dissertation, I explain the Fourth Amendment and the role that privacy expectations play in the constitutional protection of personal privacy generally, and…

  7. What was privacy?

    PubMed

    McCreary, Lew

    2008-10-01

    Why is that question in the past tense? Because individuals can no longer feel confident that the details of their lives--from identifying numbers to cultural preferences--will be treated with discretion rather than exploited. Even as Facebook users happily share the names of their favorite books, movies, songs, and brands, they often regard marketers' use of that information as an invasion of privacy. In this wide-ranging essay, McCreary, a senior editor at HBR, examines numerous facets of the privacy issue, from Google searches, public shaming on the internet, and cell phone etiquette to passenger screening devices, public surveillance cameras, and corporate chief privacy officers. He notes that IBM has been a leader on privacy; its policy forswearing the use of employees' genetic information in hiring and benefits decisions predated the federal Genetic Information Nondiscrimination Act by three years. Now IBM is involved in an open-source project known as Higgins to provide users with transportable, potentially anonymous online presences. Craigslist, whose CEO calls it "as close to 100% user driven as you can get," has taken an extremely conservative position on privacy--perhaps easier for a company with a declared lack of interest in maximizing revenue. But TJX and other corporate victims of security breaches have discovered that retaining consumers' transaction information can be both costly and risky. Companies that underestimate the importance of privacy to their customers or fail to protect it may eventually face harsh regulation, reputational damage, or both. The best thing they can do, says the author, is negotiate directly with those customers over where to draw the line.

  8. Overview of Privacy in Social Networking Sites (SNS)

    NASA Astrophysics Data System (ADS)

    Powale, Pallavi I.; Bhutkar, Ganesh D.

    2013-07-01

    Social Networking Sites (SNS) have become an integral part of communication and life style of people in today's world. Because of the wide range of services offered by SNSs mostly for free of cost, these sites are attracting the attention of all possible Internet users. Most importantly, users from all age groups have become members of SNSs. Since many of the users are not aware of the data thefts associated with information sharing, they freely share their personal information with SNSs. Therefore, SNSs may be used for investigating users' character and social habits by familiar or even unknown persons and agencies. Such commercial and social scenario, has led to number of privacy and security threats. Though, all major issues in SNSs need to be addressed, by SNS providers, privacy of SNS users is the most crucial. And therefore, in this paper, we have focused our discussion on "privacy in SNSs". We have discussed different ways of Personally Identifiable Information (PII) leakages from SNSs, information revelation to third-party domains without user consent and privacy related threats associated with such information sharing. We expect that this comprehensive overview on privacy in SNSs will definitely help in raising user awareness about sharing data and managing their privacy with SNSs. It will also help SNS providers to rethink about their privacy policies.

  9. 20. INTERIOR, COAL CHUTES (G.S.A. PHOTOCOPY, N.D.) (4 x 5 ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    20. INTERIOR, COAL CHUTES (G.S.A. PHOTOCOPY, N.D.) (4 x 5 NEGATIVE) - U.S. General Services Administration, Central Heating Plant, C & D Streets between Twelfth & Thirteenth Streets Southwest, Washington, District of Columbia, DC

  10. 19. INTERIOR, 'CHILLER NO. 2' (G.S.A. PHOTOCOPY, N.D.) (4 x ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    19. INTERIOR, 'CHILLER NO. 2' (G.S.A. PHOTOCOPY, N.D.) (4 x 5 NEGATIVE) - U.S. General Services Administration, Central Heating Plant, C & D Streets between Twelfth & Thirteenth Streets Southwest, Washington, District of Columbia, DC

  11. 18. INTERIOR, CATWALK AND PIPES (G.S.A. PHOTOCOPY, N.D.) (4 x ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    18. INTERIOR, CATWALK AND PIPES (G.S.A. PHOTOCOPY, N.D.) (4 x 5 NEGATIVE) - U.S. General Services Administration, Central Heating Plant, C & D Streets between Twelfth & Thirteenth Streets Southwest, Washington, District of Columbia, DC

  12. 77 FR 5020 - General Services Administration Acquisition Regulation; Information Collection; GSA Form 527...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-02-01

    ... ADMINISTRATION General Services Administration Acquisition Regulation; Information Collection; GSA Form 527... and Financial Information'' on your attached document. Fax: (202) 501-4067. Mail: General Services... provided. SUPPLEMENTARY INFORMATION: A. Purpose The General Services Administration will be requesting...

  13. 77 FR 31016 - General Services Administration Acquisition Regulation; Submission for OMB Review; GSA Mentor...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-05-24

    ... Manual (GSAM). A notice was published in the Federal Register at 77 FR 9659, on February 17, 2012. No... First Street NE., Washington, DC 20417. ATTN: Hada Flowers/IC 3090-0286, GSA Mentor-Prot g...

  14. 41 CFR 102-117.350 - How will GSA use reports I submit?

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... transportation related services will provide GSA with: (1) The ability to assess the magnitude and key... addition, this information will assist you in showing your management the magnitude of your...

  15. 41 CFR 102-117.350 - How will GSA use reports I submit?

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... transportation related services will provide GSA with: (1) The ability to assess the magnitude and key... addition, this information will assist you in showing your management the magnitude of your...

  16. 41 CFR 102-117.350 - How will GSA use reports I submit?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... transportation related services will provide GSA with: (1) The ability to assess the magnitude and key... addition, this information will assist you in showing your management the magnitude of your...

  17. 75 FR 28253 - Federal Management Regulation (FMR); Notice of GSA Bulletin FMR B-26

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-05-20

    ... to work with the Comptroller General and other executive agencies to develop accounting systems for... From the Federal Register Online via the Government Publishing Office GENERAL SERVICES... Governmentwide Policy, General Services Administration (GSA). ACTION: Notice of a bulletin. SUMMARY: This...

  18. Computers and Personal Privacy.

    ERIC Educational Resources Information Center

    Ware, Willis H.

    Privacy is an issue that arises from the intersection of a demand for improved recordkeeping processes, and computing technology as the response to the demand. Recordkeeping in the United States centers on information about people. Modern day computing technology has the ability to maintain, store, and retrieve records quickly; however, this…

  19. Assessing the HIPAA standard in practice: PHR privacy policies.

    PubMed

    Carrión, Inmaculada; Alemán, José Luis Fernández; Toval, Ambrosio

    2011-01-01

    Health service providers are starting to become interested in providing PHRs (Personal Health Records). With PHRs, access to data is controlled by the patient, and not by the health care provider. Companies such as Google and Microsoft are establishing a leadership position in this emerging market. A number of benefits can be achieved with PHRs, but important challenges related to security and privacy must be addressed. This paper presents a review of the privacy policies of 20 free web-based PHRs. Security and privacy characteristics were extracted and assessed according to the HIPAA standard. The results show a number of important differences in the characteristics analyzed. Some improvements can be made to current PHR privacy policies to enhance the audit and management of access to users' PHRs. A questionnaire has been defined to assist PHR designers in this task.

  20. Assessing the privacy policies in mobile personal health records.

    PubMed

    Zapata, Belén Cruz; Hernández Niñirola, Antonio; Fernández-Alemán, José Luis; Toval, Ambrosio

    2014-01-01

    The huge increase in the number and use of smartphones and tablets has led health service providers to take an interest in mHealth. Popular mobile app markets like Apple App Store or Google Play contain thousands of health applications. Although mobile personal health records (mPHRs) have a number of benefits, important challenges appear in the form of adoption barriers. Security and privacy have been identified as part of these barriers and should be addressed. This paper analyzes and assesses a total of 24 free mPHRs for Android and iOS. Characteristics regarding privacy and security were extracted from the HIPAA. The results show important differences in both the mPHRs and the characteristics analyzed. A questionnaire containing six questions concerning privacy policies was defined. Our questionnaire may assist developers and stakeholders to evaluate the security and privacy of their mPHRs. PMID:25571104

  1. Addressing Concerns.

    ERIC Educational Resources Information Center

    Cronin, Greg; Helmig, Mary; Kaplan, Bill; Kosch, Sharon

    2002-01-01

    Four camp directors discuss how the September 11 tragedy and current world events will affect their camps. They describe how they are addressing safety concerns, working with parents, cooperating with outside agencies, hiring and screening international staff, and revising emergency plans. Camps must continue to offer community and support to…

  2. 41 CFR 105-55.017 - Use and disclosure of mailing addresses.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 41 Public Contracts and Property Management 3 2010-07-01 2010-07-01 false Use and disclosure of... Administration 55-COLLECTION OF CLAIMS OWED THE UNITED STATES § 105-55.017 Use and disclosure of mailing... designee) to obtain a debtor's mailing address from the records of the Internal Revenue Service. (b) GSA...

  3. 32 CFR 806b.18 - Third party information in a Privacy Act System of Record.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 32 National Defense 6 2010-07-01 2010-07-01 false Third party information in a Privacy Act System... party information in a Privacy Act System of Record. Ordinarily a person is entitled to their entire... information that is not “about” him or her (for example, the home address of a third party contained in...

  4. The Right to Privacy for Juveniles: A Review for School Counselors.

    ERIC Educational Resources Information Center

    Hayden, Richard J.

    This paper, addressed to school counselors, provides background information concerning the rights of privacy for juveniles. A brief introduction notes the recent changes in juvenile rights and the expansion of the school counselor role and responsibility. The first section presents a general statement of the right of privacy primarily through…

  5. 77 FR 42548 - Privacy Act of 1974; Department of Transportation, Federal Motor Carrier Safety Administration...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-07-19

    ... 17, 2008 (73 FR 3316-3317), or you may visit www.dot.gov/privacy . Docket: For access to the docket..., applicable to all DOT Privacy Act systems of records, are published in the Federal Register at 75 FR 82132... this system may make a written request to the following address: NIC Technologies, 4601 N....

  6. Addressing healthcare.

    PubMed

    Daly, Rich

    2013-02-11

    Though President Barack Obama has rarely made healthcare references in his State of the Union addresses, health policy experts are hoping he changes that strategy this year. "The question is: Will he say anything? You would hope that he would, given that that was the major issue he started his presidency with," says Dr. James Weinstein, left, of the Dartmouth-Hitchcock health system. PMID:23487896

  7. Taking the next step to privacy compliance for hospitals: implementing the OHA guidelines.

    PubMed

    Beardwood, John

    2003-01-01

    The recently released "Guidelines for Managing Privacy, Data Protection and Security for Ontario Hospitals," prepared by the Ontario Hospital eHealth Council Privacy and Security Working Group (the "Guidelines") are useful in that they provide a comprehensive overview of the types of issues raised for hospitals by existing and pending privacy legislation, and a very high-level framework for addressing same. However, the Guidelines are, as stated high-level guidelines only,--leaving hospital management to grapple with the next big step towards privacy compliance: how to operationalize the Guidelines within their particular hospital. PMID:14674181

  8. Simple Peer-to-Peer SIP Privacy

    NASA Astrophysics Data System (ADS)

    Koskela, Joakim; Tarkoma, Sasu

    In this paper, we introduce a model for enhancing privacy in peer-to-peer communication systems. The model is based on data obfuscation, preventing intermediate nodes from tracking calls, while still utilizing the shared resources of the peer network. This increases security when moving between untrusted, limited and ad-hoc networks, when the user is forced to rely on peer-to-peer schemes. The model is evaluated using a Host Identity Protocol-based prototype on mobile devices, and is found to provide good privacy, especially when combined with a source address hiding scheme. The contribution of this paper is to present the model and results obtained from its use, including usability considerations.

  9. Space in Space: Designing for Privacy in the Workplace

    NASA Technical Reports Server (NTRS)

    Akin, Jonie

    2015-01-01

    Privacy is cultural, socially embedded in the spatial, temporal, and material aspects of the lived experience. Definitions of privacy are as varied among scholars as they are among those who fight for their personal rights in the home and the workplace. Privacy in the workplace has become a topic of interest in recent years, as evident in discussions on Big Data as well as the shrinking office spaces in which people work. An article in The New York Times published in February of this year noted that "many companies are looking to cut costs, and one way to do that is by trimming personal space". Increasingly, organizations ranging from tech start-ups to large corporations are downsizing square footage and opting for open-office floorplans hoping to trim the budget and spark creative, productive communication among their employees. The question of how much is too much to trim when it comes to privacy, is one that is being actively addressed by the National Aeronautics and Space Administration (NASA) as they explore habitat designs for future space missions. NASA recognizes privacy as a design-related stressor impacting human health and performance. Given the challenges of sustaining life in an isolated, confined, and extreme environment such as Mars, NASA deems it necessary to determine the acceptable minimal amount for habitable volume for activities requiring at least some level of privacy in order to support optimal crew performance. Ethnographic research was conducted in 2013 to explore perceptions of privacy and privacy needs among astronauts living and working in space as part of a long-distance, long-duration mission. The allocation of space, or habitable volume, becomes an increasingly complex issue in outer space due to the costs associated with maintaining an artificial, confined environment bounded by limitations of mass while located in an extreme environment. Privacy in space, or space in space, provides a unique case study of the complex notions of

  10. Location Privacy in RFID Applications

    NASA Astrophysics Data System (ADS)

    Sadeghi, Ahmad-Reza; Visconti, Ivan; Wachsmann, Christian

    RFID-enabled systems allow fully automatic wireless identification of objects and are rapidly becoming a pervasive technology with various applications. However, despite their benefits, RFID-based systems also pose challenging risks, in particular concerning user privacy. Indeed, improvident use of RFID can disclose sensitive information about users and their locations allowing detailed user profiles. Hence, it is crucial to identify and to enforce appropriate security and privacy requirements of RFID applications (that are also compliant to legislation). This chapter first discusses security and privacy requirements for RFID-enabled systems, focusing in particular on location privacy issues. Then it explores the advances in RFID applications, stressing the security and privacy shortcomings of existing proposals. Finally, it presents new promising directions for privacy-preserving RFID systems, where as a case study we focus electronic tickets (e-tickets) for public transportation.

  11. 75 FR 63703 - Privacy Act of 1974; Privacy Act Regulation

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-10-18

    ... Federal Register, 73 FR 25594, May 7, 2008. The proposed amendments: (1) Waived all copying fees in..., 73 FR 54595, September 22, 2008, certain portions of BGFRS-37 (Electronic Applications) may be exempt... CFR Part 261a Privacy Act of 1974; Privacy Act Regulation AGENCY: Board of Governors of the...

  12. Inaugural address

    NASA Astrophysics Data System (ADS)

    Joshi, P. S.

    2014-03-01

    From jets to cosmos to cosmic censorship P S Joshi Tata Institute of Fundamental Research, Homi Bhabha Road, Colaba, Mumbai 400005, India E-mail: psj@tifr.res.in 1. Introduction At the outset, I should like to acknowledge that part of the title above, which tries to capture the main flavour of this meeting, and has been borrowed from one of the plenary talks at the conference. When we set out to make the programme for the conference, we thought of beginning with observations on the Universe, but then we certainly wanted to go further and address deeper questions, which were at the very foundations of our inquiry, and understanding on the nature and structure of the Universe. I believe, we succeeded to a good extent, and it is all here for you in the form of these Conference Proceedings, which have been aptly titled as 'Vishwa Mimansa', which could be possibly translated as 'Analysis of the Universe'! It is my great pleasure and privilege to welcome you all to the ICGC-2011 meeting at Goa. The International Conference on Gravitation and Cosmology (ICGC) series of meetings are being organized by the Indian Association for General Relativity and Gravitation (IAGRG), and the first such meeting was planned and conducted in Goa in 1987, with subsequent meetings taking place at a duration of about four years at various locations in India. So, it was thought appropriate to return to Goa to celebrate the 25 years of the ICGC meetings. The recollections from that first meeting have been recorded elsewhere here in these Proceedings. The research and teaching on gravitation and cosmology was initiated quite early in India, by V V Narlikar at the Banares Hindu University, and by N R Sen in Kolkata in the 1930s. In course of time, this activity grew and gained momentum, and in early 1969, at the felicitation held for the 60 years of V V Narlikar at a conference in Ahmedabad, P C Vaidya proposed the formation of the IAGRG society, with V V Narlikar being the first President. This

  13. 77 FR 24929 - Privacy Act of 1974; New System of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-04-26

    ... Privacy Act Officer, USDA Forest Service, 1400 Independence Avenue SW., Mail Stop 1143, Washington, DC..., meaning that you must provide your full name, current address, and date and place of birth. You must...

  14. Privacy enhanced group communication in clinical environment

    NASA Astrophysics Data System (ADS)

    Li, Mingyan; Narayanan, Sreeram; Poovendran, Radha

    2005-04-01

    Privacy protection of medical records has always been an important issue and is mandated by the recent Health Insurance Portability and Accountability Act (HIPAA) standards. In this paper, we propose security architectures for a tele-referring system that allows electronic group communication among professionals for better quality treatments, while protecting patient privacy against unauthorized access. Although DICOM defines the much-needed guidelines for confidentiality of medical data during transmission, there is no provision in the existing medical security systems to guarantee patient privacy once the data has been received. In our design, we address this issue by enabling tracing back to the recipient whose received data is disclosed to outsiders, using watermarking technique. We present security architecture design of a tele-referring system using a distributed approach and a centralized web-based approach. The resulting tele-referring system (i) provides confidentiality during the transmission and ensures integrity and authenticity of the received data, (ii) allows tracing of the recipient who has either distributed the data to outsiders or whose system has been compromised, (iii) provides proof of receipt or origin, and (iv) can be easy to use and low-cost to employ in clinical environment.

  15. GSA-Tuning IPD Control of a Field-Sensed Magnetic Suspension System

    PubMed Central

    Li, Jen-Hsing; Chiou, Juing-Shian

    2015-01-01

    The purpose of this paper is to propose a GSA-tuning IPD control technique for magnetic suspension systems. An educational demonstration on a magnetic-field sensed magnetic suspension system is examined for effectiveness. For the magnetic-field sensed magnetic suspension system (FSMSS), the current transducer is employed for measuring the electromagnetic coil current, and a Hall effect device is used for detecting the position of the suspended object. To achieve optimal performance, the gravitational search algorithm (GSA) is adopted for tuning the integral-proportional-derivative (IPD) controller. The IPD control includes the specified PD controller and an integrator. The specified PD control is employed for stabilizing the inherently unstable FSMSS, whereas the integral control is utilized for eliminating the steady-state error. The GSA can tune the IPD control parameters to enable optimal FSMSS performance. We achieved excellent results from the simulations and hands-on experiments for the proposed control strategies and structures. PMID:26694404

  16. Opening Address

    NASA Astrophysics Data System (ADS)

    Yamada, T.

    2014-12-01

    Ladies and Gentlemen, it is my great honor and pleasure to present an opening address of the 3rd International Workshop on "State of the Art in Nuclear Cluster Physics"(SOTANCP3). On the behalf of the organizing committee, I certainly welcome all your visits to KGU Kannai Media Center belonging to Kanto Gakuin University, and stay in Yokohama. In particular, to whom come from abroad more than 17 countries, I would appreciate your participations after long long trips from your homeland to Yokohama. The first international workshop on "State of the Art in Nuclear Cluster Physics", called SOTANCP, was held in Strasbourg, France, in 2008, and the second one was held in Brussels, Belgium, in 2010. Then the third workshop is now held in Yokohama. In this period, we had the traditional 10th cluster conference in Debrecen, Hungary, in 2012. Thus we have the traditional cluster conference and SOTANCP, one after another, every two years. This obviously shows our field of nuclear cluster physics is very active and flourishing. It is for the first time in about 10 years to hold the international workshop on nuclear cluster physics in Japan, because the last cluster conference held in Japan was in Nara in 2003, about 10 years ago. The president in Nara conference was Prof. K. Ikeda, and the chairpersons were Prof. H. Horiuchi and Prof. I. Tanihata. I think, quite a lot of persons in this room had participated at the Nara conference. Since then, about ten years passed. So, this workshop has profound significance for our Japanese colleagues. The subjects of this workshop are to discuss "the state of the art in nuclear cluster physics" and also discuss the prospect of this field. In a couple of years, we saw significant progresses of this field both in theory and in experiment, which have brought better and new understandings on the clustering aspects in stable and unstable nuclei. I think, the concept of clustering has been more important than ever. This is true also in the

  17. Convocation address.

    PubMed

    Ghatowar, P S

    1993-07-01

    The Union Deputy Minister of Health and Family Welfare in India addressed the 35th convocation of the International Institute for Population Sciences in Bombay in 1993. Officials in developing countries have been concerned about population growth for more than 30 years and have instituted policies to reduce population growth. In the 1960s, population growth in developing countries was around 2.5%, but today it is about 2%. Despite this decline, the world will have 1 billion more individuals by the year 2001. 95% of these new people will be born in developing countries. India's population size is so great that India does not have the time to wait for development to reduce population growth. Population needs to be viewed as an integrated part of overall development, since it is linked to poverty, illiteracy, environmental damage, gender issues, and reproductive health. Despite a large population size, India has made some important advancements in health and family planning. For example, India has reduced population growth (to 2.14% annually between 1981-1991), infant mortality, and its birth rate. It has increased the contraceptive use rate and life expectancy. Its southern states have been more successful at achieving demographic goals than have the northern states. India needs to implement efforts to improve living conditions, to change attitudes and perceptions about small families and contraception, and to promote family planning acceptance earlier among young couples. Improvement of living conditions is especially important in India, since almost 33% of the people live in poverty. India needs to invest in nutrition, health, and education. The mass media and nongovernmental organizations need to create population awareness and demand for family planning services. Improvement in women's status accelerates fertility decline, as has happened in Kerala State. The government needs to facilitate generation of jobs. Community participation is needed for India to achieve

  18. 76 FR 3113 - Privacy Act of 1974; System of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-01-19

    .... ACTION: Notice To Alter a System of Records. SUMMARY: The Department of the Air Force proposing to alter a system of records notice in its existing inventory of records systems subject to the Privacy Act..., 2011 unless comments are received that would result in a contrary determination. ADDRESSES: You...

  19. 76 FR 23646 - Privacy Act of 1974, as Amended; Correction

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-04-27

    ..., 2011, in FR Doc. 2011-7629, on page 17997, in the second column, under ``System Location'', correct the location to read ``IRS Campus, Ogden, Utah.'' A further correction appears in FR Doc. 2011-7629, on page... incorrect addresses. FOR FURTHER INFORMATION CONTACT: Dale Underwood, Privacy Act Officer, Department of...

  20. 32 CFR 701.101 - Privacy program terms and definitions.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 32 National Defense 5 2010-07-01 2010-07-01 false Privacy program terms and definitions. 701.101... definitions. (a) Access. Review or copying a record or parts thereof contained in a system of records by any... or online collection that directly identifies an individual (e.g., name, address, social...

  1. 76 FR 35421 - Privacy Act of 1974; System of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-06-17

    ... INFORMATION CONTACT. The proposed system report, as required by 5 U.S.C. 552a(r) of the Privacy Act of 1974... System name: National Security Education Program Records (December 30, 2008, 73 FR 79833). Changes... information about themselves contained in this system should address written inquiries to the Office of...

  2. 77 FR 61582 - Privacy Act of 1974; System of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-10-10

    ... Department of the Air Force Privacy Act of 1974; System of Records AGENCY: Department of the Air Force, DoD. ACTION: Notice To Alter a System of Records. SUMMARY: The Department of the Air Force proposes to alter a.... ADDRESSES: You may submit comments, identified by docket number and title, by any of the following...

  3. 76 FR 72399 - Privacy Act of 1974; System of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-11-23

    ... Department of the Air Force Privacy Act of 1974; System of Records AGENCY: Department of the Air Force... Force is deleting a systems of records notice in its existing inventory of record systems subject to the.... ADDRESSES: Send comments, identified by docket number and title, by any of the following methods:...

  4. 77 FR 16846 - Published Privacy Impact Assessments on the Web

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-03-22

    ... Service protective sites. This technology creates an image of the full body that highlights anomalies that are on the body. It is used as a secondary means of personnel screening at protected sites, and used... screening. To address privacy concerns associated with creating an image of an individual's body, the...

  5. 76 FR 70464 - DHS Data Privacy and Integrity Advisory Committee

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-11-14

    ... Committee has completed its business. ADDRESSES: The meeting will be held in the U.S. Citizenship and... also hear and discuss a presentation on the Office of Intelligence & Analysis' implementation of... site at www.dhs.gov/privacy . Please note that the meeting may end early if all business is...

  6. 76 FR 65756 - Privacy Act of 1974; System of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-10-24

    ... General Privacy Act Systems of Records. These modifications reflect the title and address changes... their amended systems of records in the Federal Register when there is a revision, change, or addition... leadership teams. These changes are proposed for the reasons discussed below. II. Rationale for Changes...

  7. 76 FR 72909 - Privacy Act of 1974; System of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-11-28

    ... (August 7, 2009, 74 FR 39652). Changes: * * * * * System location: Delete entry and replace with ``Records... seeking access to information about themselves contained in this system should address written inquiries... of the Secretary Privacy Act of 1974; System of Records AGENCY: Defense Logistics Agency,...

  8. 77 FR 29616 - Privacy Act of 1974; System of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-05-18

    ....'' Access to records requires DoD Common Access Card (CAC) and PIN. Physical access controls include...: Individuals seeking access to information about themselves contained in this system of records should address... of the Secretary Privacy Act of 1974; System of Records AGENCY: Office of the Secretary of...

  9. 76 FR 37082 - Privacy Act of 1974; Systems of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-06-24

    ... Logistics Agency (DLA) Primary Level Field Activities. Official mailing addresses are published as an... Affairs Offices of the Defense Logistics Agency (DLA) Primary Level Field Activities. Official mailing... of the Secretary Privacy Act of 1974; Systems of Records AGENCY: Defense Logistics Agency,...

  10. 76 FR 51123 - Privacy Act of 1974, as Amended

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-08-17

    ... at 75 FR 78802, pursuant to the Privacy Act of 1974, as amended, 5 U.S.C. 552a. FMS proposes to amend... being unbanked, and gender in determining what types of account options best meet the needs of low- to... ``address'' add the phrase ``as well as demographic data, such as income range, gender or...

  11. Electronic Record Systems and Individual Privacy. Federal Government Information Technology.

    ERIC Educational Resources Information Center

    Congress of the U.S., Washington, DC. Office of Technology Assessment.

    This report considers the privacy issues raised by the growth of the new technology being applied to the personal information collected, maintained, and disseminated by the Federal Government. Four major areas are addressed: (1) technological developments relevant to government record systems; (2) current and prospective Federal agency use of…

  12. Privacy Issues and New Technologies.

    ERIC Educational Resources Information Center

    Colman, Sue

    1997-01-01

    Issues of privacy, anonymity, and computer security emerging with advancing information technology are outlined, and implications for universities are discussed. Emphasis is on the Australian context and on Australian government and international initiatives concerning privacy. Sensitive information categories are identified, and measures…

  13. Student Privacy and School Responsibility.

    ERIC Educational Resources Information Center

    Gluckman, Ivan

    1987-01-01

    This pamphlet considers students' right to privacy and the application of this right to the confidentiality of information disclosed to administrators and counselors. Privacy is also considered in regard to special problems associated with counseling students about drugs, contraceptives, sexually transmitted diseases, abortion, and possible threat…

  14. Privacy Law and Print Photojournalism.

    ERIC Educational Resources Information Center

    Dykhouse, Caroline Dow

    Reviews of publications about privacy law, of recent court actions, and of interviews with newspaper photographers and attorneys indicate that torts of privacy often conflict with the freedoms to publish and to gather news. Although some guidelines have already been established (about running distorted pictures, "stealing" pictures, taking…

  15. 76 FR 59073 - Privacy Act

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-09-23

    ... From the Federal Register Online via the Government Publishing Office CENTRAL INTELLIGENCE AGENCY 32 CFR Part 1901 Privacy Act AGENCY: Central Intelligence Agency. ACTION: Proposed rule. SUMMARY: Consistent with the Privacy Act (PA), the Central Intelligence Agency (CIA) has undertaken and completed...

  16. 41 CFR 102-41.205 - Do we report all forfeited distilled spirits, wine, and beer to GSA for disposal?

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... forfeited distilled spirits, wine, and beer to GSA for disposal? 102-41.205 Section 102-41.205 Public..., and Beer § 102-41.205 Do we report all forfeited distilled spirits, wine, and beer to GSA for disposal? (a) Yes, except do not report distilled spirits, wine, and beer not fit for human consumption or...

  17. 41 CFR 102-41.205 - Do we report all forfeited distilled spirits, wine, and beer to GSA for disposal?

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... forfeited distilled spirits, wine, and beer to GSA for disposal? 102-41.205 Section 102-41.205 Public..., and Beer § 102-41.205 Do we report all forfeited distilled spirits, wine, and beer to GSA for disposal? (a) Yes, except do not report distilled spirits, wine, and beer not fit for human consumption or...

  18. 41 CFR 102-41.205 - Do we report all forfeited distilled spirits, wine, and beer to GSA for disposal?

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... forfeited distilled spirits, wine, and beer to GSA for disposal? 102-41.205 Section 102-41.205 Public..., and Beer § 102-41.205 Do we report all forfeited distilled spirits, wine, and beer to GSA for disposal? (a) Yes, except do not report distilled spirits, wine, and beer not fit for human consumption or...

  19. 41 CFR 102-41.205 - Do we report all forfeited distilled spirits, wine, and beer to GSA for disposal?

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... forfeited distilled spirits, wine, and beer to GSA for disposal? 102-41.205 Section 102-41.205 Public..., and Beer § 102-41.205 Do we report all forfeited distilled spirits, wine, and beer to GSA for disposal? (a) Yes, except do not report distilled spirits, wine, and beer not fit for human consumption or...

  20. 41 CFR 102-41.205 - Do we report all forfeited distilled spirits, wine, and beer to GSA for disposal?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... forfeited distilled spirits, wine, and beer to GSA for disposal? 102-41.205 Section 102-41.205 Public..., and Beer § 102-41.205 Do we report all forfeited distilled spirits, wine, and beer to GSA for disposal? (a) Yes, except do not report distilled spirits, wine, and beer not fit for human consumption or...

  1. 41 CFR 102-117.340 - What other types of assistance may GSA provide agencies in dealing with regulatory bodies?

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... assistance may GSA provide agencies in dealing with regulatory bodies? 102-117.340 Section 102-117.340 Public... MANAGEMENT REGULATION TRANSPORTATION 117-TRANSPORTATION MANAGEMENT Representation Before Regulatory Body... bodies? (a) GSA has oversight of all public utilities used by the Federal Government...

  2. 41 CFR 102-117.340 - What other types of assistance may GSA provide agencies in dealing with regulatory bodies?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... assistance may GSA provide agencies in dealing with regulatory bodies? 102-117.340 Section 102-117.340 Public... MANAGEMENT REGULATION TRANSPORTATION 117-TRANSPORTATION MANAGEMENT Representation Before Regulatory Body... bodies? (a) GSA has oversight of all public utilities used by the Federal Government...

  3. 41 CFR 102-73.85 - Can agencies with independent statutory authority to lease space have GSA perform the leasing...

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... independent statutory authority to lease space have GSA perform the leasing functions? 102-73.85 Section 102...-73.85 Can agencies with independent statutory authority to lease space have GSA perform the leasing... space, and land incidental thereto, for Federal agencies possessing independent statutory authority...

  4. 76 FR 13617 - Office of Federal High-Performance Green Buildings (OFHPGB); Notice of GSA Bulletin OFHPGB 2011...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-03-14

    ... found at http://www.gsa.gov/portal/content/221677 . DATES: Effective March 14, 2011. FOR FURTHER... Buildings.'' Notice 2008-40 can be found at http://www.irs.gov/irb/2008-14_IRB/ar12.html . For clarification... Green Building are located on the Internet at http://www.gsa.gov/portal/content/105239 as...

  5. 41 CFR 102-36.145 - May we obtain excess personal property directly from another Federal agency without GSA approval?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... personal property directly from another Federal agency without GSA approval? 102-36.145 Section 102-36.145... property directly from another Federal agency without GSA approval? Yes, but only under the following... conditions in § 102-36.75(b) applies. (d) You may obtain excess personal property directly from...

  6. 41 CFR 102-36.145 - May we obtain excess personal property directly from another Federal agency without GSA approval?

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... personal property directly from another Federal agency without GSA approval? 102-36.145 Section 102-36.145... property directly from another Federal agency without GSA approval? Yes, but only under the following... conditions in § 102-36.75(b) applies. (d) You may obtain excess personal property directly from...

  7. 41 CFR 105-64.106 - What is GSA's policy on information accuracy in a system of records?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... Responsibilities § 105-64.106 What is GSA's policy on information accuracy in a system of records? System managers... 41 Public Contracts and Property Management 3 2010-07-01 2010-07-01 false What is GSA's policy on information accuracy in a system of records? 105-64.106 Section 105-64.106 Public Contracts and...

  8. 41 CFR 105-64.103 - What is GSA's policy on collecting and using information in a system of records?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... Responsibilities § 105-64.103 What is GSA's policy on collecting and using information in a system of records... 41 Public Contracts and Property Management 3 2010-07-01 2010-07-01 false What is GSA's policy on collecting and using information in a system of records? 105-64.103 Section 105-64.103 Public Contracts...

  9. 41 CFR 105-64.102 - What is GSA's policy on disclosure of information in a system of records?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... Responsibilities § 105-64.102 What is GSA's policy on disclosure of information in a system of records? No... 41 Public Contracts and Property Management 3 2010-07-01 2010-07-01 false What is GSA's policy on disclosure of information in a system of records? 105-64.102 Section 105-64.102 Public Contracts and...

  10. 41 CFR 102-72.105 - What are the requirements for obtaining a utility services delegation of authority from GSA?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... requirements for obtaining a utility services delegation of authority from GSA? 102-72.105 Section 102-72.105....105 What are the requirements for obtaining a utility services delegation of authority from GSA? Executive agencies may be delegated utility services authority when they have the technical expertise...

  11. 41 CFR 102-118.170 - Will GSA continue to maintain a centralized numbering system for Government transportation...

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 41 Public Contracts and Property Management 3 2013-07-01 2013-07-01 false Will GSA continue to maintain a centralized numbering system for Government transportation documents? 102-118.170 Section 102... centralized numbering system for Government transportation documents? Yes, GSA will maintain a...

  12. 41 CFR 102-118.170 - Will GSA continue to maintain a centralized numbering system for Government transportation...

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 41 Public Contracts and Property Management 3 2011-01-01 2011-01-01 false Will GSA continue to maintain a centralized numbering system for Government transportation documents? 102-118.170 Section 102... centralized numbering system for Government transportation documents? Yes, GSA will maintain a...

  13. 41 CFR 102-118.170 - Will GSA continue to maintain a centralized numbering system for Government transportation...

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 41 Public Contracts and Property Management 3 2012-01-01 2012-01-01 false Will GSA continue to maintain a centralized numbering system for Government transportation documents? 102-118.170 Section 102... centralized numbering system for Government transportation documents? Yes, GSA will maintain a...

  14. 41 CFR 102-118.170 - Will GSA continue to maintain a centralized numbering system for Government transportation...

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 41 Public Contracts and Property Management 3 2014-01-01 2014-01-01 false Will GSA continue to maintain a centralized numbering system for Government transportation documents? 102-118.170 Section 102... centralized numbering system for Government transportation documents? Yes, GSA will maintain a...

  15. 41 CFR 102-36.305 - May we abandon or destroy excess personal property without reporting it to GSA?

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... destroy excess personal property without reporting it to GSA? 102-36.305 Section 102-36.305 Public... without reporting it to GSA? Yes, you may abandon or destroy excess personal property when you have made a... when it has neither utility nor monetary value (either as an item or as scrap)....

  16. Welcome Address

    NASA Astrophysics Data System (ADS)

    Kiku, H.

    2014-12-01

    Ladies and Gentlemen, It is an honor for me to present my welcome address in the 3rd International Workshop on "State of the Art in Nuclear Cluster Physics"(SOTANCP3), as the president of Kanto Gakuin University. Particularly to those from abroad more than 17 countries, I am very grateful for your participation after long long trips from your home to Yokohama. On the behalf of the Kanto Gakuin University, we certainly welcome your visit to our university and stay in Yokohama. First I would like to introduce Kanto Gakuin University briefly. Kanto Gakuin University, which is called KGU, traces its roots back to the Yokohama Baptist Seminary founded in 1884 in Yamate, Yokohama. The seminary's founder was Albert Arnold Bennett, alumnus of Brown University, who came to Japan from the United States to establish a theological seminary for cultivating and training Japanese missionaries. Now KGU is a major member of the Kanto Gakuin School Corporation, which is composed of two kindergartens, two primary schools, two junior high schools, two senior high schools as well as KGU. In this university, we have eight faculties with graduate school including Humanities, Economics, Law, Sciences and Engineering, Architecture and Environmental Design, Human and Environmental Studies, Nursing, and Law School. Over eleven thousands students are currently learning in our university. By the way, my major is the geotechnical engineering, and I belong to the faculty of Sciences and Engineering in my university. Prof. T. Yamada, here, is my colleague in the same faculty. I know that the nuclear physics is one of the most active academic fields in the world. In fact, about half of the participants, namely, more than 50 scientists, come from abroad in this conference. Moreover, I know that the nuclear physics is related to not only the other fundamental physics such as the elementary particle physics and astrophysics but also chemistry, medical sciences, medical cares, and radiation metrology

  17. User Privacy in RFID Networks

    NASA Astrophysics Data System (ADS)

    Singelée, Dave; Seys, Stefaan

    Wireless RFID networks are getting deployed at a rapid pace and have already entered the public space on a massive scale: public transport cards, the biometric passport, office ID tokens, customer loyalty cards, etc. Although RFID technology offers interesting services to customers and retailers, it could also endanger the privacy of the end-users. The lack of protection mechanisms being deployed could potentially result in a privacy leakage of personal data. Furthermore, there is the emerging threat of location privacy. In this paper, we will show some practical attack scenarios and illustrates some of them with cases that have received press coverage. We will present the main challenges of enhancing privacy in RFID networks and evaluate some solutions proposed in literature. The main advantages and shortcomings will be briefly discussed. Finally, we will give an overview of some academic and industrial research initiatives on RFID privacy.

  18. The ultimate physical limits of privacy.

    PubMed

    Ekert, Artur; Renner, Renato

    2014-03-27

    Among those who make a living from the science of secrecy, worry and paranoia are just signs of professionalism. Can we protect our secrets against those who wield superior technological powers? Can we trust those who provide us with tools for protection? Can we even trust ourselves, our own freedom of choice? Recent developments in quantum cryptography show that some of these questions can be addressed and discussed in precise and operational terms, suggesting that privacy is indeed possible under surprisingly weak assumptions. PMID:24670761

  19. Setting core standards: privacy, identity & interoperability.

    PubMed

    Manning, B; Benton, S

    2010-01-01

    This position paper focuses on strategic developments and underlying concepts emerging out of the standards and associated domains. It addresses the issue of personal privacy in the wider context of interoperability across an ever-growing range of e-health and social care support systems and processes. These will increasingly be driven by major growth in the elderly segment of national populations where unambiguous identification of both patients and care staff both in hospitals and the community will become significant issues. This is particularly so where remote patient monitoring and access control to personal data is concerned, and is further complicated where racial, cultural and linguistic barriers are prevalent. PMID:20543336

  20. Supporting multi-state collaboration on privacy and security to foster health IT and health information exchange.

    PubMed

    Banger, Alison K; Alakoye, Amoke O; Rizk, Stephanie C

    2008-01-01

    As part of the HHS funded contract, Health Information Security and Privacy Collaboration, 41 states and territories have proposed collaborative projects to address cross-state privacy and security challenges related to health IT and health information exchange. Multi-state collaboration on privacy and security issues remains complicated, and resources to support collaboration around these topics are essential to the success of such collaboration. The resources outlined here offer an example of how to support multi-stakeholder, multi-state projects.

  1. Speech privacy: Beyond architectural solutions

    NASA Astrophysics Data System (ADS)

    Mazer, Susan

    2005-09-01

    HIPAA regulations have brought unparalleled pressures on healthcare organizations to protect private and confidential information from reaching third parties. Yet, as this paper explains, often in the middle of noisy corridors and waiting rooms, this same information needs to be quickly transferred from physician to nurse to family member to others for the care of patients. Research and examples are presented that show that when families, patients, staff are participating together, although independently, in the same or adjacent spaces, the ``caf effect'' produces rising noise levels as each person competes to be heard. This threatens the very confidentiality demanded by HIPAA. Solutions to this problem are not easy or completely resolved by engineering or design specifications. This paper makes the case that it is ultimately the culture of a healthcare organization that determines the ``sound'' of a hospital, and any other organization that battles openness with privacy. It presents and discusses proven solutions to address culture in tandem with architectural and acoustic design interventions.

  2. 41 CFR 102-33.385 - Is any civilian executive agency exempt from the requirement to report information to GSA on...

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... executive agency exempt from the requirement to report information to GSA on Government aircraft? 102-33.385... requirement to report information to GSA on Government aircraft? No civilian executive agency is exempt.... intelligence agencies are exempt from the requirement to report to GSA on Government aircraft....

  3. 41 CFR 102-33.385 - Is any civilian executive agency exempt from the requirement to report information to GSA on...

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... executive agency exempt from the requirement to report information to GSA on Government aircraft? 102-33.385... requirement to report information to GSA on Government aircraft? No civilian executive agency is exempt.... intelligence agencies are exempt from the requirement to report to GSA on Government aircraft....

  4. 41 CFR 102-33.385 - Is any civilian executive agency exempt from the requirement to report information to GSA on...

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... executive agency exempt from the requirement to report information to GSA on Government aircraft? 102-33.385... requirement to report information to GSA on Government aircraft? No civilian executive agency is exempt.... intelligence agencies are exempt from the requirement to report to GSA on Government aircraft....

  5. 41 CFR 102-33.385 - Is any civilian executive agency exempt from the requirement to report information to GSA on...

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... executive agency exempt from the requirement to report information to GSA on Government aircraft? 102-33.385... requirement to report information to GSA on Government aircraft? No civilian executive agency is exempt.... intelligence agencies are exempt from the requirement to report to GSA on Government aircraft....

  6. 41 CFR 102-34.220 - What does GSA do if it learns of unofficial use of a Government motor vehicle?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 41 Public Contracts and Property Management 3 2010-07-01 2010-07-01 false What does GSA do if it learns of unofficial use of a Government motor vehicle? 102-34.220 Section 102-34.220 Public Contracts....220 What does GSA do if it learns of unofficial use of a Government motor vehicle? GSA reports...

  7. 41 CFR 102-34.220 - What does GSA do if it learns of unofficial use of a Government motor vehicle?

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 41 Public Contracts and Property Management 3 2011-01-01 2011-01-01 false What does GSA do if it learns of unofficial use of a Government motor vehicle? 102-34.220 Section 102-34.220 Public Contracts....220 What does GSA do if it learns of unofficial use of a Government motor vehicle? GSA reports...

  8. 41 CFR 102-34.220 - What does GSA do if it learns of unofficial use of a Government motor vehicle?

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 41 Public Contracts and Property Management 3 2014-01-01 2014-01-01 false What does GSA do if it learns of unofficial use of a Government motor vehicle? 102-34.220 Section 102-34.220 Public Contracts....220 What does GSA do if it learns of unofficial use of a Government motor vehicle? GSA reports...

  9. A Generic Privacy Quantification Framework for Privacy-Preserving Data Publishing

    ERIC Educational Resources Information Center

    Zhu, Zutao

    2010-01-01

    In recent years, the concerns about the privacy for the electronic data collected by government agencies, organizations, and industries are increasing. They include individual privacy and knowledge privacy. Privacy-preserving data publishing is a research branch that preserves the privacy while, at the same time, withholding useful information in…

  10. Employee Privacy Rights: A Management Guide.

    ERIC Educational Resources Information Center

    Shepard, Ira Michael; Olsen, Harry

    Employee privacy rights are considered, along with practical problems and permissible parameters of employer activity. Included is a state-by-state analysis of the status of workplace privacy. Definitions are offered of "invasion of privacy," with attention to four types of privacy invasions: (1) placing someone in a "false light," (2) the public…

  11. δ-dependency for privacy-preserving XML data publishing.

    PubMed

    Landberg, Anders H; Nguyen, Kinh; Pardede, Eric; Rahayu, J Wenny

    2014-08-01

    An ever increasing amount of medical data such as electronic health records, is being collected, stored, shared and managed in large online health information systems and electronic medical record systems (EMR) (Williams et al., 2001; Virtanen, 2009; Huang and Liou, 2007) [1-3]. From such rich collections, data is often published in the form of census and statistical data sets for the purpose of knowledge sharing and enabling medical research. This brings with it an increasing need for protecting individual people privacy, and it becomes an issue of great importance especially when information about patients is exposed to the public. While the concept of data privacy has been comprehensively studied for relational data, models and algorithms addressing the distinct differences and complex structure of XML data are yet to be explored. Currently, the common compromise method is to convert private XML data into relational data for publication. This ad hoc approach results in significant loss of useful semantic information previously carried in the private XML data. Health data often has very complex structure, which is best expressed in XML. In fact, XML is the standard format for exchanging (e.g. HL7 version 3(1)) and publishing health information. Lack of means to deal directly with data in XML format is inevitably a serious drawback. In this paper we propose a novel privacy protection model for XML, and an algorithm for implementing this model. We provide general rules, both for transforming a private XML schema into a published XML schema, and for mapping private XML data to the new privacy-protected published XML data. In addition, we propose a new privacy property, δ-dependency, which can be applied to both relational and XML data, and that takes into consideration the hierarchical nature of sensitive data (as opposed to "quasi-identifiers"). Lastly, we provide an implementation of our model, algorithm and privacy property, and perform an experimental analysis

  12. δ-dependency for privacy-preserving XML data publishing.

    PubMed

    Landberg, Anders H; Nguyen, Kinh; Pardede, Eric; Rahayu, J Wenny

    2014-08-01

    An ever increasing amount of medical data such as electronic health records, is being collected, stored, shared and managed in large online health information systems and electronic medical record systems (EMR) (Williams et al., 2001; Virtanen, 2009; Huang and Liou, 2007) [1-3]. From such rich collections, data is often published in the form of census and statistical data sets for the purpose of knowledge sharing and enabling medical research. This brings with it an increasing need for protecting individual people privacy, and it becomes an issue of great importance especially when information about patients is exposed to the public. While the concept of data privacy has been comprehensively studied for relational data, models and algorithms addressing the distinct differences and complex structure of XML data are yet to be explored. Currently, the common compromise method is to convert private XML data into relational data for publication. This ad hoc approach results in significant loss of useful semantic information previously carried in the private XML data. Health data often has very complex structure, which is best expressed in XML. In fact, XML is the standard format for exchanging (e.g. HL7 version 3(1)) and publishing health information. Lack of means to deal directly with data in XML format is inevitably a serious drawback. In this paper we propose a novel privacy protection model for XML, and an algorithm for implementing this model. We provide general rules, both for transforming a private XML schema into a published XML schema, and for mapping private XML data to the new privacy-protected published XML data. In addition, we propose a new privacy property, δ-dependency, which can be applied to both relational and XML data, and that takes into consideration the hierarchical nature of sensitive data (as opposed to "quasi-identifiers"). Lastly, we provide an implementation of our model, algorithm and privacy property, and perform an experimental analysis

  13. Sorted Index Numbers for Privacy Preserving Face Recognition

    NASA Astrophysics Data System (ADS)

    Wang, Yongjin; Hatzinakos, Dimitrios

    2009-12-01

    This paper presents a novel approach for changeable and privacy preserving face recognition. We first introduce a new method of biometric matching using the sorted index numbers (SINs) of feature vectors. Since it is impossible to recover any of the exact values of the original features, the transformation from original features to the SIN vectors is noninvertible. To address the irrevocable nature of biometric signals whilst obtaining stronger privacy protection, a random projection-based method is employed in conjunction with the SIN approach to generate changeable and privacy preserving biometric templates. The effectiveness of the proposed method is demonstrated on a large generic data set, which contains images from several well-known face databases. Extensive experimentation shows that the proposed solution may improve the recognition accuracy.

  14. Safety, security, hygiene and privacy in migrant farmworker housing.

    PubMed

    Arcury, Thomas A; Weir, Maria M; Summers, Phillip; Chen, Haiying; Bailey, Melissa; Wiggins, Melinda F; Bischoff, Werner E; Quandt, Sara A

    2012-01-01

    Safety, security, hygiene, and privacy in migrant farmworker housing have not previously been documented, yet these attributes are important for farmworker quality of life and dignity. This analysis describes the safety, security, hygiene, and privacy of migrant farmworker housing and delineates camp characteristics that are associated with these attributes, using data collected in 183 eastern North Carolina migrant farmworker camps in 2010. Migrant farmworker housing is deficient. For example, 73.8 percent of housing had structural damage and 52.7 percent had indoor temperatures that were not safe. Farmworkers in 83.5 percent of the housing reported that they did not feel they or their possessions were secure. Bathing or toileting privacy was absent in 46.2 percent of the housing. Camps with residents having H-2A visas or North Carolina Department of Labor certificates of inspection posted had better safety, security, and hygiene. Regulations addressing the quality of migrant farmworker housing are needed.

  15. SAFETY, SECURITY, HYGIENE AND PRIVACY IN MIGRANT FARMWORKER HOUSING

    PubMed Central

    Arcury, Thomas A.; Weir, Maria M.; Summers, Phillip; Chen, Haiying; Bailey, Melissa; Wiggins, Melinda F.; Bischoff, Werner E.; Quandt, Sara A.

    2013-01-01

    Safety, security, hygiene, and privacy in migrant farmworker housing have not previously been documented, yet these attributes are important for farmworker quality of life and dignity. This analysis describes the safety, security, hygiene, and privacy of migrant farmworker housing and delineates camp characteristics that are associated with these attributes, using data collected in 183 eastern North Carolina migrant farmworker camps in 2010. Migrant farmworker housing is deficient. For example, 73.8 percent of housing had structural damage and 52.7 percent had indoor temperatures that were not safe. Farmworkers in 83.5 percent of the housing reported that they did not feel they or their possessions were secure. Bathing or toileting privacy was absent in 46.2 percent of the housing. Camps with residents having H-2A visas or North Carolina Department of Labor certificates of inspection posted had better safety, security, and hygiene. Regulations addressing the quality of migrant farmworker housing are needed. PMID:22776578

  16. 41 CFR 102-3.100 - What are the responsibilities and functions of GSA?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... other administrative guidelines and management controls for advisory committees, and assists other... 41 Public Contracts and Property Management 3 2010-07-01 2010-07-01 false What are the responsibilities and functions of GSA? 102-3.100 Section 102-3.100 Public Contracts and Property Management...

  17. 75 FR 1788 - General Services Administration Acquisition Regulation; Submission for OMB Review; GSA Form 1364...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-01-13

    ... From the Federal Register Online via the Government Publishing Office GENERAL SERVICES ADMINISTRATION General Services Administration Acquisition Regulation; Submission for OMB Review; GSA Form 1364...: Under the provisions of the Paperwork Reduction Act of 1995 (44 U.S.C. Chapter 35), the General...

  18. 41 CFR 101-26.4902-1781 - GSA Form 1781, Motor Vehicle Requisition-Delivery Order.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 41 Public Contracts and Property Management 2 2013-07-01 2012-07-01 true GSA Form 1781, Motor Vehicle Requisition-Delivery Order. 101-26.4902-1781 Section 101-26.4902-1781 Public Contracts and Property Management Federal Property Management Regulations System FEDERAL PROPERTY MANAGEMENT...

  19. 41 CFR 101-26.4902-1781 - GSA Form 1781, Motor Vehicle Requisition-Delivery Order.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 41 Public Contracts and Property Management 2 2014-07-01 2012-07-01 true GSA Form 1781, Motor Vehicle Requisition-Delivery Order. 101-26.4902-1781 Section 101-26.4902-1781 Public Contracts and Property Management Federal Property Management Regulations System FEDERAL PROPERTY MANAGEMENT...

  20. 41 CFR 101-26.4902-1781 - GSA Form 1781, Motor Vehicle Requisition-Delivery Order.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 41 Public Contracts and Property Management 2 2012-07-01 2012-07-01 false GSA Form 1781, Motor Vehicle Requisition-Delivery Order. 101-26.4902-1781 Section 101-26.4902-1781 Public Contracts and Property Management Federal Property Management Regulations System FEDERAL PROPERTY MANAGEMENT...

  1. 41 CFR 101-26.4902-1398 - GSA Form 1398: Motor vehicle purchase and inspection label.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 41 Public Contracts and Property Management 2 2012-07-01 2012-07-01 false GSA Form 1398: Motor vehicle purchase and inspection label. 101-26.4902-1398 Section 101-26.4902-1398 Public Contracts and Property Management Federal Property Management Regulations System FEDERAL PROPERTY MANAGEMENT...

  2. 41 CFR 101-26.4902-1398 - GSA Form 1398: Motor vehicle purchase and inspection label.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 41 Public Contracts and Property Management 2 2011-07-01 2007-07-01 true GSA Form 1398: Motor vehicle purchase and inspection label. 101-26.4902-1398 Section 101-26.4902-1398 Public Contracts and Property Management Federal Property Management Regulations System FEDERAL PROPERTY MANAGEMENT...

  3. 41 CFR 101-26.4902-1398 - GSA Form 1398: Motor vehicle purchase and inspection label.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 41 Public Contracts and Property Management 2 2013-07-01 2012-07-01 true GSA Form 1398: Motor vehicle purchase and inspection label. 101-26.4902-1398 Section 101-26.4902-1398 Public Contracts and Property Management Federal Property Management Regulations System FEDERAL PROPERTY MANAGEMENT...

  4. 41 CFR 101-26.4902-1781 - GSA Form 1781, Motor Vehicle Requisition-Delivery Order.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 41 Public Contracts and Property Management 2 2011-07-01 2007-07-01 true GSA Form 1781, Motor Vehicle Requisition-Delivery Order. 101-26.4902-1781 Section 101-26.4902-1781 Public Contracts and Property Management Federal Property Management Regulations System FEDERAL PROPERTY MANAGEMENT...

  5. 41 CFR 101-26.4902-1398 - GSA Form 1398: Motor vehicle purchase and inspection label.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 41 Public Contracts and Property Management 2 2014-07-01 2012-07-01 true GSA Form 1398: Motor vehicle purchase and inspection label. 101-26.4902-1398 Section 101-26.4902-1398 Public Contracts and Property Management Federal Property Management Regulations System FEDERAL PROPERTY MANAGEMENT...

  6. 41 CFR 102-118.435 - What procedures does GSA use to perform a postpayment audit?

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... Division has the delegated authority to implement the following procedures: (a) Audit selected TSP bills after payment; (b) Audit selected TSP bills before payment as needed to protect the Government's... Notice of Overcharge is prepared and mailed for each bill; and (g) Issue a GSA Notice of...

  7. 41 CFR 102-118.435 - What procedures does GSA use to perform a postpayment audit?

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... Division has the delegated authority to implement the following procedures: (a) Audit selected TSP bills after payment; (b) Audit selected TSP bills before payment as needed to protect the Government's... Notice of Overcharge is prepared and mailed for each bill; and (g) Issue a GSA Notice of...

  8. 41 CFR 105-62.103 - Access to GSA-originated materials.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... of General Services in 41 CFR part 105-61. (e) Access by the General Accounting Office and... 41 Public Contracts and Property Management 3 2013-07-01 2013-07-01 false Access to GSA-originated... Management Regulations System (Continued) GENERAL SERVICES ADMINISTRATION Regional Offices-General...

  9. 41 CFR 105-62.103 - Access to GSA-originated materials.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... of General Services in 41 CFR part 105-61. (e) Access by the General Accounting Office and... 41 Public Contracts and Property Management 3 2012-01-01 2012-01-01 false Access to GSA-originated... Management Regulations System (Continued) GENERAL SERVICES ADMINISTRATION Regional Offices-General...

  10. 41 CFR 105-62.103 - Access to GSA-originated materials.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... of General Services in 41 CFR part 105-61. (e) Access by the General Accounting Office and... 41 Public Contracts and Property Management 3 2011-01-01 2011-01-01 false Access to GSA-originated... Management Regulations System (Continued) GENERAL SERVICES ADMINISTRATION Regional Offices-General...

  11. 41 CFR 105-60.305-3 - GSA records available without charge.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 41 Public Contracts and Property Management 3 2010-07-01 2010-07-01 false GSA records available without charge. 105-60.305-3 Section 105-60.305-3 Public Contracts and Property Management Federal Property Management Regulations System (Continued) GENERAL SERVICES ADMINISTRATION Regional...

  12. Gay-Straight Alliance (GSA) Members' Engagement with Sex Education in Canadian High Schools

    ERIC Educational Resources Information Center

    Lapointe, Alicia

    2014-01-01

    This paper offers an examination of gay-straight alliance (GSA) members' engagement with sex education, sexual health, and prejudice and discrimination in Canadian public high schools. It explores how five students' (four straight and one gay-identifying) participation in GSAs served as a springboard for learning about and challenging…

  13. 48 CFR 552.219-75 - GSA Mentor-Protégé Program.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 48 Federal Acquisition Regulations System 4 2011-10-01 2011-10-01 false GSA Mentor-ProtégÃ... Mentor-ProtéGé Program (SEP 2009) (a) Prime contractors, including small businesses, are encouraged to.... (b) The Program consists of: (1) Mentor firms are large prime contractors with at least one...

  14. 41 CFR 101-26.505-7 - GSA assistance in selection of furniture and furnishings.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 41 Public Contracts and Property Management 2 2010-07-01 2010-07-01 true GSA assistance in selection of furniture and furnishings. 101-26.505-7 Section 101-26.505-7 Public Contracts and Property..., upon request, furnish agencies with information on the types, styles, finishes, coverings, and...

  15. 41 CFR 101-26.505-7 - GSA assistance in selection of furniture and furnishings.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 41 Public Contracts and Property Management 2 2013-07-01 2012-07-01 true GSA assistance in selection of furniture and furnishings. 101-26.505-7 Section 101-26.505-7 Public Contracts and Property..., upon request, furnish agencies with information on the types, styles, finishes, coverings, and...

  16. 48 CFR 515.209-70 - Examination of records by GSA clause.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 48 Federal Acquisition Regulations System 4 2011-10-01 2011-10-01 false Examination of records by GSA clause. 515.209-70 Section 515.209-70 Federal Acquisition Regulations System GENERAL SERVICES ADMINISTRATION CONTRACTING METHODS AND CONTRACT TYPES CONTRACTING BY NEGOTIATION Solicitation and Receipt...

  17. GSA Advisors' Self-Efficacy Related to LGBT Youth of Color and Transgender Youth

    ERIC Educational Resources Information Center

    Poteat, V. Paul; Scheer, Jillian R.

    2016-01-01

    Gay-Straight Alliances (GSAs) serve lesbian, gay, bisexual, transgender (LGBT) and heterosexual youth from diverse backgrounds. Although some attention has been given to youth members in general, little attention has been given to adult advisors. Among 47 GSA advisors from 33 high schools (39 cisgender female, 8 cisgender male), the authors…

  18. 32 CFR 644.314 - Rules and regulations of the General Services Administration (GSA).

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 32 National Defense 4 2010-07-01 2010-07-01 true Rules and regulations of the General Services Administration (GSA). 644.314 Section 644.314 National Defense Department of Defense (Continued) DEPARTMENT OF THE ARMY (CONTINUED) REAL PROPERTY REAL ESTATE HANDBOOK Disposal § 644.314 Rules and regulations...

  19. 32 CFR 644.314 - Rules and regulations of the General Services Administration (GSA).

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 32 National Defense 4 2011-07-01 2011-07-01 false Rules and regulations of the General Services Administration (GSA). 644.314 Section 644.314 National Defense Department of Defense (Continued) DEPARTMENT OF THE ARMY (CONTINUED) REAL PROPERTY REAL ESTATE HANDBOOK Disposal § 644.314 Rules and regulations...

  20. 41 CFR 105-54.310 - Advisory committee duties of the GSA Committee Management Officer.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... Committees. (c) Guidelines on committee management operations and procedures as maintained and updated; and... 41 Public Contracts and Property Management 3 2010-07-01 2010-07-01 false Advisory committee duties of the GSA Committee Management Officer. 105-54.310 Section 105-54.310 Public Contracts...

  1. 41 CFR 102-117.350 - How will GSA use reports I submit?

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... transportation related services will provide GSA with: (1) The ability to assess the magnitude and key characteristics of transportation within the Government (e.g., how much agencies spend; what type of commodity is... procedures to improve Government transportation; and (3) A better understanding of how your activity...

  2. 41 CFR 102-117.350 - How will GSA use reports I submit?

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... transportation related services will provide GSA with: (1) The ability to assess the magnitude and key characteristics of transportation within the Government (e.g., how much agencies spend; what type of commodity is... procedures to improve Government transportation; and (3) A better understanding of how your activity...

  3. Biobanking Research and Privacy Laws in the United States.

    PubMed

    Harrell, Heather L; Rothstein, Mark A

    2016-03-01

    Privacy is protected in biobank-based research in the US primarily by the Health Insurance Portability and Accountability Act (HIPAA) Privacy Rule and the Federal Policy for Protection of Human Subjects (Common Rule). Neither rule, however, was created to function in the unique context of biobank research, and therefore neither applies to all biobank-based research. Not only is it challenging to determine when the HIPAA Privacy Rule or the Common Rule apply, but these laws apply different standards to protect privacy. In addition, many other federal and state laws may be applicable to a particular biobank, researcher, or project. US law also does not directly address international sharing of data or specimens outside of the EU-US Safe Harbor Agreement, which only applies to receipt of data by certain US entities from EU countries, and is in the process of revision. Although new rules would help clarify privacy protections in biobanking, any implemented changes should be studied to determine the sufficiency of the protections as well as its ability to facilitate or hinder international collaborations. PMID:27256128

  4. Will You Accept the Government's Friend Request? Social Networks and Privacy Concerns

    PubMed Central

    Siegel, David A.

    2013-01-01

    Participating in social network websites entails voluntarily sharing private information, and the explosive growth of social network websites over the last decade suggests shifting views on privacy. Concurrently, new anti-terrorism laws, such as the USA Patriot Act, ask citizens to surrender substantial claim to privacy in the name of greater security. I address two important questions regarding individuals' views on privacy raised by these trends. First, how does prompting individuals to consider security concerns affect their views on government actions that jeopardize privacy? Second, does the use of social network websites alter the effect of prompted security concerns? I posit that prompting individuals to consider security concerns does lead to an increased willingness to accept government actions that jeopardize privacy, but that frequent users of websites like Facebook are less likely to be swayed by prompted security concerns. An embedded survey experiment provides support for both parts of my claim. PMID:24312236

  5. Will you accept the government's friend request? Social networks and privacy concerns.

    PubMed

    Siegel, David A

    2013-01-01

    Participating in social network websites entails voluntarily sharing private information, and the explosive growth of social network websites over the last decade suggests shifting views on privacy. Concurrently, new anti-terrorism laws, such as the USA Patriot Act, ask citizens to surrender substantial claim to privacy in the name of greater security. I address two important questions regarding individuals' views on privacy raised by these trends. First, how does prompting individuals to consider security concerns affect their views on government actions that jeopardize privacy? Second, does the use of social network websites alter the effect of prompted security concerns? I posit that prompting individuals to consider security concerns does lead to an increased willingness to accept government actions that jeopardize privacy, but that frequent users of websites like Facebook are less likely to be swayed by prompted security concerns. An embedded survey experiment provides support for both parts of my claim.

  6. Data protection, privacy.

    PubMed

    La Monaca, G; Schiralli, I

    2010-01-01

    The topic of data protection is referred closely to the concept of privacy--characterized by the American political philosophy in order to indicate a sphere recognized as personal, and therefore private or intimate, of the person, which exclude other individuals or society--whose protection has deep roots in the international right. The technological progress in the field of telecommunication has increased the facility of acquisition and spreading of information, the exchange of data, and the possibility of access to confidential information by other people. This made it made necessary the regulation of the management and the transfer of these information in order to protect individual rights and, on the other hand, an easy circulation of data for legitimate and useful goals.

  7. Extensive nonadditivity of privacy.

    PubMed

    Smith, Graeme; Smolin, John A

    2009-09-18

    Quantum information theory establishes the ultimate limits on communication and cryptography in terms of channel capacities for various types of information. The private capacity is particularly important because it quantifies achievable rates of quantum key distribution. We study the power of quantum channels with limited private capacity, focusing on channels that dephase in random bases. These display extensive nonadditivity of private capacity: a channel with 2logd input qubits that has a private capacity less than 2, but when used together with a second channel with zero private capacity, the joint capacity jumps to (1/2)logd. In contrast to earlier work which found nonadditivity vanishing as a fraction of input size or conditional on unproven mathematical assumptions, this provides a natural setting manifesting nonadditivity of privacy of the strongest possible sort. PMID:19792417

  8. MedlinePlus: Privacy Policy

    MedlinePlus

    ... is available at: https://bitly.com/pages/privacy . Facebook NLM has multiple Facebook pages where we share information about NLM news, ... register or provide personal information to view our Facebook pages. The complete list of NLM Facebook pages ...

  9. 41 CFR 102-41.30 - What is GSA's role in the disposition of property covered by this part?

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... the United States, it may be returned to the claimant. (b) Forfeited, voluntarily abandoned, or... seizing agency files a request for the property for its official use, the GSA Region 3/National...

  10. 41 CFR 102-118.170 - Will GSA continue to maintain a centralized numbering system for Government transportation...

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... maintain a centralized numbering system for Government transportation documents? 102-118.170 Section 102-118.170 Public Contracts and Property Management Federal Property Management Regulations System... centralized numbering system for Government transportation documents? Yes, GSA will maintain a...

  11. 41 CFR 102-41.140 - When do we report to GSA unclaimed personal property not retained for official use?

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... has filed a claim for it, the title to the property vests in the Government. If you decide not to retain the property for official use, report it as excess to GSA in accordance with part 102-36 of...

  12. Meeting the Privacy Requirements for the Development of a Multi-Centre Patient Registry in Canada: The Rick Hansen Spinal Cord Injury Registry

    PubMed Central

    Noonan, Vanessa K.; Thorogood, Nancy P.; Joshi, Phalgun B.; Fehlings, Michael G.; Craven, B. Catharine; Linassi, Gary; Fourney, Daryl R.; Kwon, Brian K.; Bailey, Christopher S.; Tsai, Eve C.; Drew, Brian M.; Ahn, Henry; Tsui, Deborah; Dvorak, Marcel F.

    2013-01-01

    Privacy legislation addresses concerns regarding the privacy of personal information; however, its interpretation by research ethics boards has resulted in significant challenges to the collection, management, use and disclosure of personal health information for multi-centre research studies. This paper describes the strategy used to develop the national Rick Hansen Spinal Cord Injury Registry (RHSCIR) in accordance with privacy statutes and benchmarked against best practices. An analysis of the regional and national privacy legislation was conducted to determine the requirements for each of the 31 local RHSCIR sites and the national RHSCIR office. A national privacy and security framework was created for RHSCIR that includes a governance structure, standard operating procedures, training processes, physical and technical security and privacy impact assessments. The framework meets a high-water mark in ensuring privacy and security of personal health information nationally and may assist in the development of other national or international research initiatives. PMID:23968640

  13. Zone Level Occupant-Responsive Building Energy Systems at the GSA

    SciTech Connect

    Robinson, Alastair

    2014-03-01

    The General Services Administration (GSA) partnered with the U.S. Department of Energy (DOE) to develop and implement building energy system retrofits, aiming to reduce energy consumption of at least two building systems by a total of 30 percent or more, as part of DOE’s Commercial Building Partnership (CBP) Program. Lawrence Berkeley National Laboratory (LBNL) provided technical expertise in support of this DOE program, working with the GSA and a team of consultants. This case study reports expected energy savings from appropriate energy efficient design and operations modifications to lighting and heating, ventilating and air conditioning (HVAC) systems at the selected study sites. These retrofits comprised installation of new lighting systems with dimming capability and occupancy-sensor control at the individual light fixture level, and utilized lighting system occupancy sensor signals to continually readjust zone-level ventilation airflow according to the number of people present, down to minimum rates when vacant.

  14. 45 CFR 1182.3 - Inquiries about the Institute's systems of records or implementation of the Privacy Act.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... Public Welfare (Continued) NATIONAL FOUNDATION ON THE ARTS AND THE HUMANITIES INSTITUTE OF MUSEUM AND... records or implementation of the Privacy Act should be sent to the following address: Institute of...

  15. GSA's Green Proving Ground: Identifying, Testing and Evaluating Innovative Technologies; Preprint

    SciTech Connect

    Kandt, A.; Lowell, M.

    2012-05-01

    This paper will provide an overview of the GPG program and its objectives as well as a summary and status update of the 16 technologies selected for enhanced testing and evaluation in 2011. The federal government's General Services Administration's (GSA) Public Buildings Service (PBS) acquires space on behalf of the federal government through new construction and leasing, and acts as a caretaker for federal properties across the country. PBS owns or leases 9,624 assets and maintains an inventory of more than 370.2 million square feet of workspace, and as such has enormous potential for implementing energy efficient and renewable energy technologies to reduce energy and water use and associated emissions. The Green Proving Ground (GPG) program utilizes GSA's real estate portfolio to test and evaluate innovative and underutilized sustainable building technologies and practices. Findings are used to support the development of GSA performance specifications and inform decision making within GSA, other federal agencies, and the real estate industry. The program aims to drive innovation in environmental performance in federal buildings and help lead market transformation through deployment of new technologies. In 2011, the GPG program selected 16 technologies or practices for rigorous testing and evaluation. Evaluations are currently being performed in collaboration with the Department of Energy's National Laboratories, and a steady stream of results will be forthcoming throughout 2012. This paper will provide an overview of the GPG program and its objectives as well as a summary and status update of the 16 technologies selected for enhanced testing and evaluation in 2011. Lastly, it provides a general overview of the 2012 program.

  16. Aspinall Courthouse: GSA's Historic Preservation and Net-Zero Renovation Case Study

    SciTech Connect

    Chang, R.; Hayter, S.; Hotchkiss, E.; Pless, S.; Sielcken, J.; Smith-Larney, C.

    2014-10-01

    The federal government is mandated with improving efficiency of buildings, incorporating renewable energy, and achieving net-zero energy operations where possible. These challenges led GSA to consider aligning historic preservation renovations with net-zero energy goals. The Wayne N. Aspinall Federal Building and U.S. Courthouse (Aspinall Courthouse), in Grand Junction, Colorado, is an example of a renovation project that aimed to accomplish both historic preservation and net-zero energy goals.

  17. Is Privacy Important in Scoliosis Screening?

    ERIC Educational Resources Information Center

    Quick, Miriam M.; Highriter, Marion E.

    1981-01-01

    In a study done to determine the importance of privacy during scoliosis screening, individual privacy was provided for some children. Results indicated a definite lessening of anxiety for those students screened privately. (JN)

  18. The Constitutional Right of Privacy: An Examination

    ERIC Educational Resources Information Center

    Northwestern University Law Review, 1974

    1974-01-01

    The right of privacy, a personal right protecting the most traditional concepts of privacy and the most tangible qualities of private life, is discussed in relation to many cases, including three involving teachers in secondary schools. (Author/PG)

  19. Fetal privacy and confidentiality.

    PubMed

    Botkin, J R

    1995-01-01

    With the advent of new and better contraceptive methods and the ability to facilitate and manipulate fertilization and gestation, couples will gain greater control over their fertility. Once a pregnancy has been established or an in vitro embryo created, the ability to evaluate the embryo and fetus will increase dramatically with progress in human genetic research. Preconception and preimplantation genetic testing and screening are now possible, and the technology to perform prenatal screening early in gestation is advancing rapidly. Nonsurgical methods facilitate induced abortion with a relatively lower degree of trauma upon the woman undergoing the procedure. These capabilities may all be used to enable and even encourage the genetic selection of future children. Despite the ethical concerns associated with prenatal testing and abortion, these services will continue to be an integral aspect of reproductive medicine. As technology advances, however, it will be possible to test and screen for conditions which do not produce serious defects. Genetic conditions which produce relatively mild impacts upon health will be identifiable in the embryo or fetus, while late-onset conditions and genetic factors which have only a probability of affecting health will also be located in the fetal genome. Prospective parents may therefore soon have the capability of selecting their most desirable embryo in vitro, or terminating all undesirable fetuses in vivo until the preferred child is delivered. The medical profession must take some responsibility for establishing guidelines on the use of reproductive technology. The standards of practice for the medical profession must reflect the results of a broad social debate over competing moral values. The author develops an argument for legal and ethical limitations on the application of prenatal testing and screening technology, suggesting that for some medical conditions, respect for the privacy and confidentiality of the fetus

  20. 21 CFR 1314.45 - Privacy protections.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 21 Food and Drugs 9 2011-04-01 2011-04-01 false Privacy protections. 1314.45 Section 1314.45 Food and Drugs DRUG ENFORCEMENT ADMINISTRATION, DEPARTMENT OF JUSTICE RETAIL SALE OF SCHEDULED LISTED CHEMICAL PRODUCTS Sales by Regulated Sellers § 1314.45 Privacy protections. To protect the privacy...

  1. 21 CFR 1314.45 - Privacy protections.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 21 Food and Drugs 9 2014-04-01 2014-04-01 false Privacy protections. 1314.45 Section 1314.45 Food and Drugs DRUG ENFORCEMENT ADMINISTRATION, DEPARTMENT OF JUSTICE RETAIL SALE OF SCHEDULED LISTED CHEMICAL PRODUCTS Sales by Regulated Sellers § 1314.45 Privacy protections. To protect the privacy...

  2. 24 CFR 3280.107 - Interior privacy.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 24 Housing and Urban Development 5 2010-04-01 2010-04-01 false Interior privacy. 3280.107 Section 3280.107 Housing and Urban Development Regulations Relating to Housing and Urban Development (Continued... privacy. Bathroom and toilet compartment doors shall be equipped with a privacy lock....

  3. 75 FR 61994 - Privacy Act; Implementation

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-10-07

    ... Office of the Secretary 31 CFR Part 1 RIN 1505-AC25 Privacy Act; Implementation AGENCY: Office of Foreign... requirements of the Privacy Act of 1974, as amended, the Department of the Treasury is amending its regulations... records by revising the number and title of the Privacy Act system of records for which an exemption...

  4. 78 FR 69552 - Privacy Act; Implementation

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-11-20

    ... Department of the Navy 32 CFR Part 701 Privacy Act; Implementation AGENCY: Department of the Navy, DoD... Privacy Act Program by adding the (k)(5) exemption to accurately describe the basis for exempting the... Department of the Navy Privacy Program rules that will exempt applicable Department records and/or...

  5. 76 FR 49661 - Privacy Act; Implementation

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-08-11

    ... Office of the Secretary 32 CFR Part 323 Privacy Act; Implementation AGENCY: Defense Logistics Agency, DoD... updating the DLA Privacy Act Program Rules by updating the language of the (k)(2) exemption. The update of the exemption will more accurately describe the basis for exempting the records. The Privacy...

  6. 75 FR 37287 - Privacy Act Regulations

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-06-29

    ... April 19, 2010 (75 FR 20298) for a public comment period to end on June 18, 2010. This rule amends the... CFR Part 200 RIN 0430-AA03 Privacy Act Regulations AGENCY: Recovery Accountability and Transparency... regulations implementing the Privacy Act of 1974 (Privacy Act), Public Law 93-579, 5 U.S.C. 552a. This...

  7. 76 FR 71293 - Privacy Act; Implementation

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-11-17

    ... Office of the Secretary 31 CFR Part 1 RIN 1505-AC37 Privacy Act; Implementation AGENCY: Office of the Secretary, Treasury. ACTION: Proposed rule. SUMMARY: In accordance with the requirements of the Privacy Act... Identification Number Records'' from certain provisions of the Privacy Act. DATES: Comments must be received...

  8. 75 FR 20298 - Privacy Act Regulations

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-04-19

    ...,'' pursuant to the Privacy Act, as amended (74 FR 60302, Nov. 20, 2009). The Board received no comments on...; ] RECOVERY ACCOUNTABILITY AND TRANSPARENCY BOARD 4 CFR Part 200 RIN 0430-AA03 Privacy Act Regulations AGENCY... and Transparency Board (Board) proposes to amend the Board's regulations implementing the Privacy...

  9. 77 FR 57017 - Privacy Act; Implementation

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-09-17

    ... of the Secretary 32 CFR Part 319 Privacy Act; Implementation AGENCY: Defense Intelligence Agency, DoD... proposing to update the DIA Privacy Act Program by adding the (k)(2) exemption to accurately describe the... involves nonsubstantive changes dealing with DoD's management of its Privacy Programs. DoD expects...

  10. Sexiled: Privacy Acquisition Strategies of College Roommates

    ERIC Educational Resources Information Center

    Erlandson, Karen

    2014-01-01

    This study sought to understand how roommates make privacy bids in college residence halls. The results indicate that privacy for sexual activity is a problem for students living in college residence halls, as almost all participants (82%) reported having dealt with this issue. Two sets of responses were collected and analyzed: privacy acquisition…

  11. 77 FR 57015 - Privacy Act; Implementation

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-09-17

    ... of the Secretary 32 CFR Part 319 Privacy Act; Implementation AGENCY: Defense Intelligence Agency, DoD... that have been previously claimed for the records in another Privacy Act system of records. DIA is updating the DIA Privacy Act Program by adding the (k)(2) and (k)(5) exemptions to accurately describe...

  12. 75 FR 22577 - Proposed Privacy Policy Statement

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-04-29

    ... COMMISSION Proposed Privacy Policy Statement AGENCY: U.S. Election Assistance Commission. ACTION: Notice and request for public comment on Proposed Privacy Policy Statement. SUMMARY: The U.S. Election Assistance Commission (EAC) seeks public comment on the Proposed Privacy Policy Statement. OMB Memorandum M-99-...

  13. 21 CFR 1314.45 - Privacy protections.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 21 Food and Drugs 9 2010-04-01 2010-04-01 false Privacy protections. 1314.45 Section 1314.45 Food and Drugs DRUG ENFORCEMENT ADMINISTRATION, DEPARTMENT OF JUSTICE RETAIL SALE OF SCHEDULED LISTED CHEMICAL PRODUCTS Sales by Regulated Sellers § 1314.45 Privacy protections. To protect the privacy...

  14. Effective Management of Information Security and Privacy

    ERIC Educational Resources Information Center

    Anderson, Alicia

    2006-01-01

    No university seems immune to cyber attacks. For many universities, such events have served as wake-up calls to develop a comprehensive information security and privacy strategy. This is no simple task, however. It involves balancing a culture of openness with a need for security and privacy. Security and privacy are not the same, and the…

  15. Pass the Cookies and Uphold the Privacy.

    ERIC Educational Resources Information Center

    Guenther, Kim

    2001-01-01

    Considers how privacy issues related to online profiling affect library patrons and what librarians should do to protect them. Discusses the need for a privacy policy and provides guidelines from the OECD (Organisation for Economic Cooperation and Development) privacy statement generator that can be adapted for libraries. (LRW)

  16. Privacy and Research with Human Beings

    ERIC Educational Resources Information Center

    Kelman, Herbert C.

    1977-01-01

    This paper explores the psychological significance of preserving privacy, the ways in which different kinds of research may threaten privacy, the requirements for minimizing or counteracting such threats, and the conditions under which research representing a certain degree of invasion of privacy can nevertheless be justified. (Author/AM)

  17. Privacy-enhanced electronic mail

    NASA Astrophysics Data System (ADS)

    Bishop, Matt

    1990-06-01

    The security of electronic mail sent through the Internet may be described in exactly three words: there is none. The Privacy and Security Research Group has recommended implementing mechanisms designed to provide security enhancements. The first set of mechanisms provides a protocol to provide privacy, integrity, and authentication for electronic mail; the second provides a certificate-based key management infrastructure to support key distribution throughout the internet, to support the first set of mechanisms. These mechanisms are described, as well as the reasons behind their selection and how these mechanisms can be used to provide some measure of security in the exchange of electronic mail.

  18. Conformance Verification of Privacy Policies

    NASA Astrophysics Data System (ADS)

    Fu, Xiang

    Web applications are both the consumers and providers of information. To increase customer confidence, many websites choose to publish their privacy protection policies. However, policy conformance is often neglected. We propose a logic based framework for formally specifying and reasoning about the implementation of privacy protection by a web application. A first order extension of computation tree logic is used to specify a policy. A verification paradigm, built upon a static control/data flow analysis, is presented to verify if a policy is satisfied.

  19. Privacy and security of patient data in the pathology laboratory

    PubMed Central

    Cucoranu, Ioan C.; Parwani, Anil V.; West, Andrew J.; Romero-Lauro, Gonzalo; Nauman, Kevin; Carter, Alexis B.; Balis, Ulysses J.; Tuthill, Mark J.; Pantanowitz, Liron

    2013-01-01

    Data protection and security are critical components of routine pathology practice because laboratories are legally required to securely store and transmit electronic patient data. With increasing connectivity of information systems, laboratory work-stations, and instruments themselves to the Internet, the demand to continuously protect and secure laboratory information can become a daunting task. This review addresses informatics security issues in the pathology laboratory related to passwords, biometric devices, data encryption, internet security, virtual private networks, firewalls, anti-viral software, and emergency security situations, as well as the potential impact that newer technologies such as mobile devices have on the privacy and security of electronic protected health information (ePHI). In the United States, the Health Insurance Portability and Accountability Act (HIPAA) govern the privacy and protection of medical information and health records. The HIPAA security standards final rule mandate administrative, physical, and technical safeguards to ensure the confidentiality, integrity, and security of ePHI. Importantly, security failures often lead to privacy breaches, invoking the HIPAA privacy rule as well. Therefore, this review also highlights key aspects of HIPAA and its impact on the pathology laboratory in the United States. PMID:23599904

  20. Privacy and security of patient data in the pathology laboratory.

    PubMed

    Cucoranu, Ioan C; Parwani, Anil V; West, Andrew J; Romero-Lauro, Gonzalo; Nauman, Kevin; Carter, Alexis B; Balis, Ulysses J; Tuthill, Mark J; Pantanowitz, Liron

    2013-01-01

    Data protection and security are critical components of routine pathology practice because laboratories are legally required to securely store and transmit electronic patient data. With increasing connectivity of information systems, laboratory work-stations, and instruments themselves to the Internet, the demand to continuously protect and secure laboratory information can become a daunting task. This review addresses informatics security issues in the pathology laboratory related to passwords, biometric devices, data encryption, internet security, virtual private networks, firewalls, anti-viral software, and emergency security situations, as well as the potential impact that newer technologies such as mobile devices have on the privacy and security of electronic protected health information (ePHI). In the United States, the Health Insurance Portability and Accountability Act (HIPAA) govern the privacy and protection of medical information and health records. The HIPAA security standards final rule mandate administrative, physical, and technical safeguards to ensure the confidentiality, integrity, and security of ePHI. Importantly, security failures often lead to privacy breaches, invoking the HIPAA privacy rule as well. Therefore, this review also highlights key aspects of HIPAA and its impact on the pathology laboratory in the United States.

  1. Privacy and security of patient data in the pathology laboratory.

    PubMed

    Cucoranu, Ioan C; Parwani, Anil V; West, Andrew J; Romero-Lauro, Gonzalo; Nauman, Kevin; Carter, Alexis B; Balis, Ulysses J; Tuthill, Mark J; Pantanowitz, Liron

    2013-01-01

    Data protection and security are critical components of routine pathology practice because laboratories are legally required to securely store and transmit electronic patient data. With increasing connectivity of information systems, laboratory work-stations, and instruments themselves to the Internet, the demand to continuously protect and secure laboratory information can become a daunting task. This review addresses informatics security issues in the pathology laboratory related to passwords, biometric devices, data encryption, internet security, virtual private networks, firewalls, anti-viral software, and emergency security situations, as well as the potential impact that newer technologies such as mobile devices have on the privacy and security of electronic protected health information (ePHI). In the United States, the Health Insurance Portability and Accountability Act (HIPAA) govern the privacy and protection of medical information and health records. The HIPAA security standards final rule mandate administrative, physical, and technical safeguards to ensure the confidentiality, integrity, and security of ePHI. Importantly, security failures often lead to privacy breaches, invoking the HIPAA privacy rule as well. Therefore, this review also highlights key aspects of HIPAA and its impact on the pathology laboratory in the United States. PMID:23599904

  2. Digression and Value Concatenation to Enable Privacy-Preserving Regression

    PubMed Central

    Li, Xiao-Bai; Sarkar, Sumit

    2015-01-01

    Regression techniques can be used not only for legitimate data analysis, but also to infer private information about individuals. In this paper, we demonstrate that regression trees, a popular data-analysis and data-mining technique, can be used to effectively reveal individuals’ sensitive data. This problem, which we call a “regression attack,” has not been addressed in the data privacy literature, and existing privacy-preserving techniques are not appropriate in coping with this problem. We propose a new approach to counter regression attacks. To protect against privacy disclosure, our approach introduces a novel measure, called digression, which assesses the sensitive value disclosure risk in the process of building a regression tree model. Specifically, we develop an algorithm that uses the measure for pruning the tree to limit disclosure of sensitive data. We also propose a dynamic value-concatenation method for anonymizing data, which better preserves data utility than a user-defined generalization scheme commonly used in existing approaches. Our approach can be used for anonymizing both numeric and categorical data. An experimental study is conducted using real-world financial, economic and healthcare data. The results of the experiments demonstrate that the proposed approach is very effective in protecting data privacy while preserving data quality for research and analysis. PMID:26752802

  3. Confidentiality, privacy, and the facilitating role of psychoanalytic organizations.

    PubMed

    O'Neil, Mary Kay

    2007-06-01

    Burgeoning external threats to confidentiality by claims to clinical information create unprecedented challenges for psychoanalysts. Internal threats arise from the use of clinical material for educational, scientific and historical purposes. Traditionally, confidentiality is considered a patient's right and an analyst's obligation; privacy is not usually stated as a professional requirement. Little consideration has been given to the impact of the confidentiality and privacy dilemmas that analysts encounter throughout their careers. There has been no systematic examination of the confidentiality policies of psychoanalytic organizations, nor has their role in facilitating maintenance of patient confidentiality and analysts' privacy been made explicit. The research reported here was undertaken to address these issues and to obtain baseline information about the current confidentiality policies and practices of psychoanalytic organizations in three English-speaking countries (Britain, Canada and the USA). The author discusses survey results in the light of the challenges which arise at each phase of the analytic career. She makes suggestions as to how psychoanalytic organizations can and should facilitate analysts' resolutions of contemporary confidentiality and privacy dilemmas.

  4. HIPAA Privacy 101: essentials for case management practice.

    PubMed

    DiBenedetto, Deborah V

    2003-01-01

    The Health Insurance Portability and Accountability Act (HIPAA) has significant impact on the delivery of healthcare in the United States. The Administrative Simplification (AS) requirements of HIPAA are aimed at reducing administrative costs and burdens in the healthcare industry. The core components of HIPAA's AS requirements address healthcare transactions, code sets, security, unique identifiers, and privacy of health information. HIPAA's privacy standard limits the nonconsensual use and release of private health information, gives patients new rights to access their medical records and to know who else has accessed them, restricts most disclosure of health information to the minimum needed for the intended purpose, establishes new criminal and civil sanctions for improper use or disclosure, and establishes new requirements for access to records by researchers and others. This article focuses on HIPAA's privacy requirements as related to case management of workers compensation populations, the treatment of protected health information, and how case managers can ensure they provide appropriate services while navigating the requirements of HIPAA's privacy standard. PMID:12555039

  5. Using global sensitivity analysis to understand higher order interactions in complex models: an application of GSA on the Revised Universal Soil Loss Equation (RUSLE) to quantify model sensitivity and implications for ecosystem services management in Costa Rica

    NASA Astrophysics Data System (ADS)

    Fremier, A. K.; Estrada Carmona, N.; Harper, E.; DeClerck, F.

    2011-12-01

    Appropriate application of complex models to estimate system behavior requires understanding the influence of model structure and parameter estimates on model output. To date, most researchers perform local sensitivity analyses, rather than global, because of computational time and quantity of data produced. Local sensitivity analyses are limited in quantifying the higher order interactions among parameters, which could lead to incomplete analysis of model behavior. To address this concern, we performed a GSA on a commonly applied equation for soil loss - the Revised Universal Soil Loss Equation. USLE is an empirical model built on plot-scale data from the USA and the Revised version (RUSLE) includes improved equations for wider conditions, with 25 parameters grouped into six factors to estimate long-term plot and watershed scale soil loss. Despite RUSLE's widespread application, a complete sensitivity analysis has yet to be performed. In this research, we applied a GSA to plot and watershed scale data from the US and Costa Rica to parameterize the RUSLE in an effort to understand the relative importance of model factors and parameters across wide environmental space. We analyzed the GSA results using Random Forest, a statistical approach to evaluate parameter importance accounting for the higher order interactions, and used Classification and Regression Trees to show the dominant trends in complex interactions. In all GSA calculations the management of cover crops (C factor) ranks the highest among factors (compared to rain-runoff erosivity, topography, support practices, and soil erodibility). This is counter to previous sensitivity analyses where the topographic factor was determined to be the most important. The GSA finding is consistent across multiple model runs, including data from the US, Costa Rica, and a synthetic dataset of the widest theoretical space. The three most important parameters were: Mass density of live and dead roots found in the upper inch

  6. Privacy and Security: A Bibliography.

    ERIC Educational Resources Information Center

    Computer and Business Equipment Manufacturers Association, Washington, DC.

    Compiled at random from many sources, this bibliography attempts to cite as many publications concerning privacy and security as are available. The entries are organized under seven headings: (1) systems security, technical security, clearance of personnel, (2) corporate physical security, (3) administrative security, (4) miscellaneous--privacy…

  7. 78 FR 46256 - Privacy Act

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-07-31

    ... From the Federal Register Online via the Government Publishing Office FEDERAL ELECTION COMMISSION 11 CFR Part 1 Privacy Act CFR Correction In Title 11 of the Code of Federal Regulations, revised as of January 1, 2012, on page 5, in Sec. 1.2, the words ``95 and 96 of the Internal Revenue Code...

  8. Facebook: When Education Meets Privacy

    ERIC Educational Resources Information Center

    Bruneel, Steven; De Wit, Kurt; Verhoeven, Jef C.; Elen, Jan

    2013-01-01

    The use of social networking sites (SNSs) has become commonplace amongst students. In this research, we aim to shed light upon the educational use and privacy issues on Facebook from the perspective of role theory and reference group theory. 15 bachelor students of the University of Leuven (KU Leuven) in Flanders, Belgium, were interviewed in…

  9. Data Privacy in Cloud-assisted Healthcare Systems: State of the Art and Future Challenges.

    PubMed

    Sajid, Anam; Abbas, Haider

    2016-06-01

    The widespread deployment and utility of Wireless Body Area Networks (WBAN's) in healthcare systems required new technologies like Internet of Things (IoT) and cloud computing, that are able to deal with the storage and processing limitations of WBAN's. This amalgamation of WBAN-based healthcare systems to cloud-based healthcare systems gave rise to serious privacy concerns to the sensitive healthcare data. Hence, there is a need for the proactive identification and effective mitigation mechanisms for these patient's data privacy concerns that pose continuous threats to the integrity and stability of the healthcare environment. For this purpose, a systematic literature review has been conducted that presents a clear picture of the privacy concerns of patient's data in cloud-assisted healthcare systems and analyzed the mechanisms that are recently proposed by the research community. The methodology used for conducting the review was based on Kitchenham guidelines. Results from the review show that most of the patient's data privacy techniques do not fully address the privacy concerns and therefore require more efforts. The summary presented in this paper would help in setting research directions for the techniques and mechanisms that are needed to address the patient's data privacy concerns in a balanced and light-weight manner by considering all the aspects and limitations of the cloud-assisted healthcare systems. PMID:27155893

  10. Data Privacy in Cloud-assisted Healthcare Systems: State of the Art and Future Challenges.

    PubMed

    Sajid, Anam; Abbas, Haider

    2016-06-01

    The widespread deployment and utility of Wireless Body Area Networks (WBAN's) in healthcare systems required new technologies like Internet of Things (IoT) and cloud computing, that are able to deal with the storage and processing limitations of WBAN's. This amalgamation of WBAN-based healthcare systems to cloud-based healthcare systems gave rise to serious privacy concerns to the sensitive healthcare data. Hence, there is a need for the proactive identification and effective mitigation mechanisms for these patient's data privacy concerns that pose continuous threats to the integrity and stability of the healthcare environment. For this purpose, a systematic literature review has been conducted that presents a clear picture of the privacy concerns of patient's data in cloud-assisted healthcare systems and analyzed the mechanisms that are recently proposed by the research community. The methodology used for conducting the review was based on Kitchenham guidelines. Results from the review show that most of the patient's data privacy techniques do not fully address the privacy concerns and therefore require more efforts. The summary presented in this paper would help in setting research directions for the techniques and mechanisms that are needed to address the patient's data privacy concerns in a balanced and light-weight manner by considering all the aspects and limitations of the cloud-assisted healthcare systems.

  11. The development of specifications and discussion of business models for ensuring speech privacy in the healthcare industry

    NASA Astrophysics Data System (ADS)

    Lavallee, Timothy; Good, Kenneth; Sykes, David

    2005-09-01

    The Health Insurance Portability and Accountability Act of 1996 (HIPAA) was developed, among other reasons, to hold healthcare providers accountable for the privacy of patient's personal and medical information. It includes language addressing the need for ``reasonable safeguards'' for speech privacy and oral communication in a healthcare setting. After 50 years of development, speech privacy science and mechanisms are well understood. However, current specifications cannot be directly applied and are not specifically written to address the application of the current acoustical knowledgebase to the health care industry's need for compliance. This is a discussion of the state of existing privacy technology and specifications; the ability and availability of mechanisms currently in the health care industry as a possible route for implementation of the regulation; the state of development of specification to address specifically the industry's needs; and a potential business model for implementation.

  12. Comprehensive quantitative analysis on privacy leak behavior.

    PubMed

    Fan, Lejun; Wang, Yuanzhuo; Jin, Xiaolong; Li, Jingyuan; Cheng, Xueqi; Jin, Shuyuan

    2013-01-01

    Privacy information is prone to be leaked by illegal software providers with various motivations. Privacy leak behavior has thus become an important research issue of cyber security. However, existing approaches can only qualitatively analyze privacy leak behavior of software applications. No quantitative approach, to the best of our knowledge, has been developed in the open literature. To fill this gap, in this paper we propose for the first time four quantitative metrics, namely, possibility, severity, crypticity, and manipulability, for privacy leak behavior analysis based on Privacy Petri Net (PPN). In order to compare the privacy leak behavior among different software, we further propose a comprehensive metric, namely, overall leak degree, based on these four metrics. Finally, we validate the effectiveness of the proposed approach using real-world software applications. The experimental results demonstrate that our approach can quantitatively analyze the privacy leak behaviors of various software types and reveal their characteristics from different aspects. PMID:24066046

  13. Comprehensive Quantitative Analysis on Privacy Leak Behavior

    PubMed Central

    Fan, Lejun; Wang, Yuanzhuo; Jin, Xiaolong; Li, Jingyuan; Cheng, Xueqi; Jin, Shuyuan

    2013-01-01

    Privacy information is prone to be leaked by illegal software providers with various motivations. Privacy leak behavior has thus become an important research issue of cyber security. However, existing approaches can only qualitatively analyze privacy leak behavior of software applications. No quantitative approach, to the best of our knowledge, has been developed in the open literature. To fill this gap, in this paper we propose for the first time four quantitative metrics, namely, possibility, severity, crypticity, and manipulability, for privacy leak behavior analysis based on Privacy Petri Net (PPN). In order to compare the privacy leak behavior among different software, we further propose a comprehensive metric, namely, overall leak degree, based on these four metrics. Finally, we validate the effectiveness of the proposed approach using real-world software applications. The experimental results demonstrate that our approach can quantitatively analyze the privacy leak behaviors of various software types and reveal their characteristics from different aspects. PMID:24066046

  14. Privacy and data security in E-health: requirements from the user's perspective.

    PubMed

    Wilkowska, Wiktoria; Ziefle, Martina

    2012-09-01

    In this study two currently relevant aspects of using medical assistive technologies were addressed-security and privacy. In a two-step empirical approach that used focus groups (n = 19) and a survey (n = 104), users' requirements for the use of medical technologies were collected and evaluated. Specifically, we focused on the perceived importance of data security and privacy issues. Outcomes showed that both security and privacy aspects play an important role in the successful adoption of medical assistive technologies in the home environment. In particular, analysis of data with respect to gender, health-status and age (young, middle-aged and old users) revealed that females and healthy adults require, and insist on, the highest security and privacy standards compared with males and the ailing elderly.

  15. Policy forum. Data, privacy, and the greater good.

    PubMed

    Horvitz, Eric; Mulligan, Deirdre

    2015-07-17

    Large-scale aggregate analyses of anonymized data can yield valuable results and insights that address public health challenges and provide new avenues for scientific discovery. These methods can extend our knowledge and provide new tools for enhancing health and wellbeing. However, they raise questions about how to best address potential threats to privacy while reaping benefits for individuals and to society as a whole. The use of machine learning to make leaps across informational and social contexts to infer health conditions and risks from nonmedical data provides representative scenarios for reflections on directions with balancing innovation and regulation.

  16. Public Perspectives of Mobile Phones’ Effects on Healthcare Quality and Medical Data Security and Privacy: A 2-Year Nationwide Survey

    PubMed Central

    Richardson, Joshua E.; Ancker, Jessica S.

    2015-01-01

    Given growing interest in mobile phones for health management (mHealth), we surveyed consumer perceptions of mHealth in security, privacy, and healthcare quality using national random-digit-dial telephone surveys in 2013 and 2014. In 2013, 48% thought that using a mobile phone to communicate data with a physician’s electronic health record (EHR) would improve the quality of health care. By 2014, the proportion rose to 57% (p < .001). There were no similar changes in privacy concerns yet nearly two-thirds expressed privacy concerns. In 2013 alone, respondents were more likely to express privacy concerns about medical data on mobile phones than they were to endorse similar concerns with EHRs or health information exchange (HIE). Consumers increasingly believe that mHealth improves healthcare quality, but security and privacy concerns need to be addressed for quality improvement to be fully realized. PMID:26958246

  17. Complying across Continents: At the Intersection of Litigation Rights and Privacy Rights

    NASA Astrophysics Data System (ADS)

    Luoma, Milton H.; Luoma, Vicki M.

    This paper addresses the issues and challenges facing multinational corporations when they become involved in litigation that crosses international borders. The conflict of litigation discovery rights and individual privacy rights in different international jurisdictions can present a very challenging situation for litigants. This paper addresses the conflict inherent between litigation discovery rights versus individual privacy rights and how different nations deal with this conflict. The authors offer several pre-litigation recommendations for those corporations that anticipate the possibility of litigation involving parties in more than one international jurisdiction.

  18. PEViD: privacy evaluation video dataset

    NASA Astrophysics Data System (ADS)

    Korshunov, Pavel; Ebrahimi, Touradj

    2013-09-01

    Visual privacy protection, i.e., obfuscation of personal visual information in video surveillance is an important and increasingly popular research topic. However, while many datasets are available for testing performance of various video analytics, little to nothing exists for evaluation of visual privacy tools. Since surveillance and privacy protection have contradictory objectives, the design principles of corresponding evaluation datasets should differ too. In this paper, we outline principles that need to be considered when building a dataset for privacy evaluation. Following these principles, we present new, and the first to our knowledge, Privacy Evaluation Video Dataset (PEViD). With the dataset, we provide XML-based annotations of various privacy regions, including face, accessories, skin regions, hair, body silhouette, and other personal information, and their descriptions. Via preliminary subjective tests, we demonstrate the flexibility and suitability of the dataset for privacy evaluations. The evaluation results also show the importance of secondary privacy regions that contain non-facial personal information for privacy- intelligibility tradeoff. We believe that PEViD dataset is equally suitable for evaluations of privacy protection tools using objective metrics and subjective assessments.

  19. Biobank research and the right to privacy.

    PubMed

    Ursin, Lars Oystein

    2008-01-01

    What is privacy? What does privacy mean in relation to biobanking, in what way do the participants have an interest in privacy, (why) is there a right to privacy, and how should the privacy issue be regulated when it comes to biobank research? A relational view of privacy is argued for in this article, which takes as its basis a general discussion of several concepts of privacy and attempts at grounding privacy rights. In promoting and protecting the rights that participants in biobank research might have to privacy, it is argued that their interests should be related to the specific context of the provision and reception of health care that participation in biobank research is connected with. Rather than just granting participants an exclusive right to or ownership of their health information, which must be waived in order to make biobank research possible, the privacy aspect of health information should be viewed in light of the moral rights and duties that accompany any involvement in a research based system of health services.

  20. Privacy information management for video surveillance

    NASA Astrophysics Data System (ADS)

    Luo, Ying; Cheung, Sen-ching S.

    2013-05-01

    The widespread deployment of surveillance cameras has raised serious privacy concerns. Many privacy-enhancing schemes have been proposed to automatically redact images of trusted individuals in the surveillance video. To identify these individuals for protection, the most reliable approach is to use biometric signals such as iris patterns as they are immutable and highly discriminative. In this paper, we propose a privacy data management system to be used in a privacy-aware video surveillance system. The privacy status of a subject is anonymously determined based on her iris pattern. For a trusted subject, the surveillance video is redacted and the original imagery is considered to be the privacy information. Our proposed system allows a subject to access her privacy information via the same biometric signal for privacy status determination. Two secure protocols, one for privacy information encryption and the other for privacy information retrieval are proposed. Error control coding is used to cope with the variability in iris patterns and efficient implementation is achieved using surrogate data records. Experimental results on a public iris biometric database demonstrate the validity of our framework.

  1. 17 CFR 160.2 - Model privacy form and examples.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 17 Commodity and Securities Exchanges 1 2012-04-01 2012-04-01 false Model privacy form and... PRIVACY OF CONSUMER FINANCIAL INFORMATION UNDER TITLE V OF THE GRAMM-LEACH-BLILEY ACT § 160.2 Model privacy form and examples. (a) Model privacy form. Use of the model privacy form in appendix A of...

  2. 17 CFR 160.2 - Model privacy form and examples.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 17 Commodity and Securities Exchanges 2 2014-04-01 2014-04-01 false Model privacy form and... Model privacy form and examples. (a) Model privacy form. Use of the model privacy form in appendix A of... content requirements of §§ 160.6 and 160.7 of this part, although use of the model privacy form is...

  3. 12 CFR 216.2 - Model privacy form and examples.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 12 Banks and Banking 2 2011-01-01 2011-01-01 false Model privacy form and examples. 216.2 Section... PRIVACY OF CONSUMER FINANCIAL INFORMATION (REGULATION P) § 216.2 Model privacy form and examples. (a) Model privacy form. Use of the model privacy form in appendix A of this part, consistent with...

  4. 17 CFR 160.2 - Model privacy form and examples.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 17 Commodity and Securities Exchanges 1 2011-04-01 2011-04-01 false Model privacy form and... PRIVACY OF CONSUMER FINANCIAL INFORMATION § 160.2 Model privacy form and examples. (a) Model privacy form. Use of the model privacy form in appendix A of this part, consistent with the instructions in...

  5. 16 CFR 313.2 - Model privacy form and examples.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 16 Commercial Practices 1 2011-01-01 2011-01-01 false Model privacy form and examples. 313.2... PRIVACY OF CONSUMER FINANCIAL INFORMATION § 313.2 Model privacy form and examples. (a) Model privacy form. Use of the model privacy form in appendix A of this part, consistent with the instructions in...

  6. 16 CFR 313.2 - Model privacy form and examples.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 16 Commercial Practices 1 2014-01-01 2014-01-01 false Model privacy form and examples. 313.2... PRIVACY OF CONSUMER FINANCIAL INFORMATION § 313.2 Model privacy form and examples. (a) Model privacy form. Use of the model privacy form in appendix A of this part, consistent with the instructions in...

  7. 12 CFR 332.2 - Model privacy form and examples.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 12 Banks and Banking 5 2012-01-01 2012-01-01 false Model privacy form and examples. 332.2 Section... POLICY PRIVACY OF CONSUMER FINANCIAL INFORMATION § 332.2 Model privacy form and examples. (a) Model privacy form. Use of the model privacy form in appendix A of this part, consistent with the...

  8. 12 CFR 716.2 - Model privacy form and examples.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 12 Banks and Banking 7 2012-01-01 2012-01-01 false Model privacy form and examples. 716.2 Section... PRIVACY OF CONSUMER FINANCIAL INFORMATION § 716.2 Model privacy form and examples. (a) Model privacy form. Use of the model privacy form in Appendix A of this part, consistent with the instructions in...

  9. 16 CFR 313.2 - Model privacy form and examples.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 16 Commercial Practices 1 2012-01-01 2012-01-01 false Model privacy form and examples. 313.2... PRIVACY OF CONSUMER FINANCIAL INFORMATION § 313.2 Model privacy form and examples. (a) Model privacy form. Use of the model privacy form in appendix A of this part, consistent with the instructions in...

  10. 12 CFR 216.2 - Model privacy form and examples.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 12 Banks and Banking 2 2013-01-01 2013-01-01 false Model privacy form and examples. 216.2 Section... PRIVACY OF CONSUMER FINANCIAL INFORMATION (REGULATION P) § 216.2 Model privacy form and examples. (a) Model privacy form. Use of the model privacy form in appendix A of this part, consistent with...

  11. 12 CFR 332.2 - Model privacy form and examples.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 12 Banks and Banking 4 2011-01-01 2011-01-01 false Model privacy form and examples. 332.2 Section... POLICY PRIVACY OF CONSUMER FINANCIAL INFORMATION § 332.2 Model privacy form and examples. (a) Model privacy form. Use of the model privacy form in Appendix A of this part, consistent with the...

  12. 12 CFR 216.2 - Model privacy form and examples.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 12 Banks and Banking 2 2014-01-01 2014-01-01 false Model privacy form and examples. 216.2 Section... PRIVACY OF CONSUMER FINANCIAL INFORMATION (REGULATION P) § 216.2 Model privacy form and examples. (a) Model privacy form. Use of the model privacy form in appendix A of this part, consistent with...

  13. 16 CFR 313.2 - Model privacy form and examples.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 16 Commercial Practices 1 2013-01-01 2013-01-01 false Model privacy form and examples. 313.2... PRIVACY OF CONSUMER FINANCIAL INFORMATION § 313.2 Model privacy form and examples. (a) Model privacy form. Use of the model privacy form in appendix A of this part, consistent with the instructions in...

  14. 17 CFR 160.2 - Model privacy form and examples.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 17 Commodity and Securities Exchanges 1 2013-04-01 2013-04-01 false Model privacy form and... PRIVACY OF CONSUMER FINANCIAL INFORMATION UNDER TITLE V OF THE GRAMM-LEACH-BLILEY ACT § 160.2 Model privacy form and examples. (a) Model privacy form. Use of the model privacy form in appendix A of...

  15. 12 CFR 332.2 - Model privacy form and examples.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 12 Banks and Banking 5 2014-01-01 2014-01-01 false Model privacy form and examples. 332.2 Section... POLICY PRIVACY OF CONSUMER FINANCIAL INFORMATION § 332.2 Model privacy form and examples. (a) Model privacy form. Use of the model privacy form in appendix A of this part, consistent with the...

  16. 12 CFR 216.2 - Model privacy form and examples.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 12 Banks and Banking 2 2012-01-01 2012-01-01 false Model privacy form and examples. 216.2 Section... PRIVACY OF CONSUMER FINANCIAL INFORMATION (REGULATION P) § 216.2 Model privacy form and examples. (a) Model privacy form. Use of the model privacy form in appendix A of this part, consistent with...

  17. 12 CFR 332.2 - Model privacy form and examples.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 12 Banks and Banking 5 2013-01-01 2013-01-01 false Model privacy form and examples. 332.2 Section... POLICY PRIVACY OF CONSUMER FINANCIAL INFORMATION § 332.2 Model privacy form and examples. (a) Model privacy form. Use of the model privacy form in appendix A of this part, consistent with the...

  18. 12 CFR 716.2 - Model privacy form and examples.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 12 Banks and Banking 7 2013-01-01 2013-01-01 false Model privacy form and examples. 716.2 Section... PRIVACY OF CONSUMER FINANCIAL INFORMATION § 716.2 Model privacy form and examples. (a) Model privacy form. Use of the model privacy form in Appendix A of this part, consistent with the instructions in...

  19. 12 CFR 716.2 - Model privacy form and examples.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 12 Banks and Banking 6 2011-01-01 2011-01-01 false Model privacy form and examples. 716.2 Section... PRIVACY OF CONSUMER FINANCIAL INFORMATION § 716.2 Model privacy form and examples. (a) Model privacy form. Use of the model privacy form in appendixA of this part, consistent with the instructions in...

  20. 16 CFR 313.2 - Model privacy form and examples.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 16 Commercial Practices 1 2010-01-01 2010-01-01 false Model privacy form and examples. 313.2... PRIVACY OF CONSUMER FINANCIAL INFORMATION § 313.2 Model privacy form and examples. (a) Model privacy form. Use of the model privacy form in appendix A of this part, consistent with the instructions in...

  1. 12 CFR 216.2 - Model privacy form and examples.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 12 Banks and Banking 2 2010-01-01 2010-01-01 false Model privacy form and examples. 216.2 Section... PRIVACY OF CONSUMER FINANCIAL INFORMATION (REGULATION P) § 216.2 Model privacy form and examples. (a) Model privacy form. Use of the model privacy form in appendix A of this part, consistent with...

  2. 13 CFR 102.36 - Privacy Act standards of conduct.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 13 Business Credit and Assistance 1 2010-01-01 2010-01-01 false Privacy Act standards of conduct... AND PRIVACY Protection of Privacy and Access to Individual Records Under the Privacy Act of 1974 § 102.36 Privacy Act standards of conduct. Each Program/Support Office Head or designee shall inform...

  3. 32 CFR 806b.4 - Privacy Act complaints.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 32 National Defense 6 2010-07-01 2010-07-01 false Privacy Act complaints. 806b.4 Section 806b.4 National Defense Department of Defense (Continued) DEPARTMENT OF THE AIR FORCE ADMINISTRATION PRIVACY ACT PROGRAM Overview of the Privacy Act Program § 806b.4 Privacy Act complaints. (a) Process Privacy...

  4. 12 CFR 716.2 - Model privacy form and examples.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 12 Banks and Banking 6 2010-01-01 2010-01-01 false Model privacy form and examples. 716.2 Section... PRIVACY OF CONSUMER FINANCIAL INFORMATION § 716.2 Model privacy form and examples. (a) Model privacy form. Use of the model privacy form in Appendix A of this part, consistent with the instructions in...

  5. 32 CFR 1701.4 - Privacy Act responsibilities/policy.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 32 National Defense 6 2010-07-01 2010-07-01 false Privacy Act responsibilities/policy. 1701.4... NATIONAL INTELLIGENCE ADMINISTRATION OF RECORDS UNDER THE PRIVACY ACT OF 1974 Protection of Privacy and Access to Individual Records Under the Privacy Act of 1974 § 1701.4 Privacy Act...

  6. 17 CFR 160.2 - Model privacy form and examples.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 17 Commodity and Securities Exchanges 1 2010-04-01 2010-04-01 false Model privacy form and... PRIVACY OF CONSUMER FINANCIAL INFORMATION § 160.2 Model privacy form and examples. (a) Model privacy form. Use of the model privacy form in appendix A of this part, consistent with the instructions in...

  7. The Genetic Privacy Act: an analysis of privacy and research concerns.

    PubMed

    Troy, E S

    1997-01-01

    Author argues that the Genetic Privacy Act fails to protect nucleic acid-based information as it relates to individual privacy, yet overburdens medical and scientific research with vague consent standards.

  8. 77 FR 38363 - Office of Privacy, Records, and Disclosure; Privacy Act of 1974, as Amended

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-06-27

    ... FOR AFGHANISTAN RECONSTRUCTION Office of Privacy, Records, and Disclosure; Privacy Act of 1974, as Amended AGENCY: Special Inspector General for Afghanistan Reconstruction. ACTION: Notice of Proposed... Special Inspector General for Afghanistan Reconstruction (SIGAR) gives notice of the establishment...

  9. Genetic privacy: orthodoxy or oxymoron?

    PubMed Central

    Sommerville, A; English, V

    1999-01-01

    In this paper we question whether the concept of "genetic privacy" is a contradiction in terms. And, if so, whether the implications of such a conclusion, inevitably impact on how society comes to perceive privacy and responsibility generally. Current law and ethical discourse place a high value on self-determination and the rights of individuals. In the medical sphere, the recognition of patient "rights" has resulted in health professionals being given clear duties of candour and frankness. Dilemmas arise, however, when patients decline to know relevant information or, knowing it, refuse to share it with others who may also need to know. This paper considers the notions of interconnectedness and responsibility to others which are brought to the fore in the genetic sphere and which challenge the primacy afforded to personal autonomy. It also explores the extent to which an individual's perceived moral obligations can or should be enforced. PMID:10226920

  10. Privacy issues in personalized medicine.

    PubMed

    Vaszar, Laszlo T; Cho, Mildred K; Raffin, Thomas A

    2003-03-01

    Pharmacogenomics is the emerging study of why individuals respond differently to drugs. It aims to replace the current 'one size fits all' therapeutic approach with 'personalized medicine' that will use pharmacogenomic tests to predict drug response. In a simple conceptualization, these tests challenge privacy as a result of two factors: how comprehensive is the test and how is the access to samples or digital information controlled. Point-of-care tests are likely to be limited in scope, fit seamlessly into medical records and do not raise qualitatively new ethical and privacy challenges. In order to define practically relevant pharmacogenomic predictive patterns however, large-scale clinical trials and research on human specimens will be required, resulting in large databases of genomic information. The genomic scans' magnitude, stability, implications to kin and ease of dissemination together represent a qualitatively different challenge compared to traditional, self-limited and often temporally transient medical information.

  11. Fictional privacy among Facebook users.

    PubMed

    Lemieux, Robert

    2012-08-01

    The current study involved the creation of a fictional Facebook account with limited information and was designed to assess whether participants would accept the friendship of an ambiguous, unknown person. Results indicated that 325 Facebook members (72% of the sample) willingly accepted the friendship of the unknown individual. Results are discussed in relation to privacy concerns, norms of reciprocity, and allowing access to potentially embarrassing information and/or pictures. PMID:23045871

  12. Fictional privacy among Facebook users.

    PubMed

    Lemieux, Robert

    2012-08-01

    The current study involved the creation of a fictional Facebook account with limited information and was designed to assess whether participants would accept the friendship of an ambiguous, unknown person. Results indicated that 325 Facebook members (72% of the sample) willingly accepted the friendship of the unknown individual. Results are discussed in relation to privacy concerns, norms of reciprocity, and allowing access to potentially embarrassing information and/or pictures.

  13. Trust and Privacy in Healthcare

    NASA Astrophysics Data System (ADS)

    Singleton, Peter; Kalra, Dipak

    This paper considers issues of trust and privacy in healthcare around increased data-sharing through Electronic Health Records (EHRs). It uses a model structured around different aspects of trust in the healthcare organisation’s reasons for greater data-sharing and their ability to execute EHR projects, particularly any associated confidentiality controls. It reflects the individual’s personal circumstances and attitude to use of health records.

  14. Privacy: after the compliance date.

    PubMed

    Mikels, Debbie

    2004-01-01

    This article reviews successful strategies in preparing for HIPAA Privacy compliance. There are ongoing challenges organizations will face after the compliance date, such as managing research issues, identifying all business associates and managing the accounting of disclosures process. Finally, health information professionals must play an active role in ensuring that patient information is protected, while providing appropriate access as new uses for information are developed.

  15. 41 CFR 102-37.535 - What information must FAA provide to GSA on its administration of the public airport donation...

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... FAA provide to GSA on its administration of the public airport donation program? 102-37.535 Section... (Continued) FEDERAL MANAGEMENT REGULATION PERSONAL PROPERTY 37-DONATION OF SURPLUS PERSONAL PROPERTY Donations to Public Airports § 102-37.535 What information must FAA provide to GSA on its administration...

  16. 77 FR 5252 - Federal Travel Regulation; GSA E-Gov Travel Service (ETS) Transition to E-Gov Travel Service 2...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-02-02

    ... ADMINISTRATION Federal Travel Regulation; GSA E-Gov Travel Service (ETS) Transition to E-Gov Travel Service 2... of a bulletin. SUMMARY: The attached bulletin announces GSA ETS Transition to ETS2. DATES: Effective.... Frank Robinson, ETS Program Manager Center for Travel Management (QMCD), Office of Travel...

  17. 41 CFR 102-34.335 - How do I submit information to the General Services Administration (GSA) for the Federal Fleet...

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... information to the General Services Administration (GSA) for the Federal Fleet Report (FFR)? 102-34.335... (Continued) FEDERAL MANAGEMENT REGULATION PERSONAL PROPERTY 34-MOTOR VEHICLE MANAGEMENT Federal Fleet Report... Fleet Report (FFR)? (a) Annually, agencies must submit to GSA the information needed to produce the...

  18. Proposed draft document for GSA office waste removal and procurement of densified refuse derived fuel for use as a supplemental fuel in GAS operated boilers

    NASA Astrophysics Data System (ADS)

    Campbell, J. A.

    1981-09-01

    A contract specifying waste collection and disposal from buildings managed by Government Services Administration (GSA) in the Washington, D. C. area and the production and delivery of pelletized fuel for burning with coal in one or two GSA steam generating plants is given.

  19. 41 CFR 300-80.5 - What factors will GSA consider in approving a request for a relocation expenses test program?

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 41 Public Contracts and Property Management 4 2012-07-01 2012-07-01 false What factors will GSA... EXPENSES TEST PROGRAMS § 300-80.5 What factors will GSA consider in approving a request for a relocation expenses test program? The following factors will be considered: (a) Potential savings to the...

  20. 41 CFR 102-37.535 - What information must FAA provide to GSA on its administration of the public airport donation...

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 41 Public Contracts and Property Management 3 2010-07-01 2010-07-01 false What information must FAA provide to GSA on its administration of the public airport donation program? 102-37.535 Section... Donations to Public Airports § 102-37.535 What information must FAA provide to GSA on its administration...

  1. Patient Privacy: A Consumer Protection Approach

    PubMed Central

    Brannigan, Vincent M.

    1983-01-01

    In the United States, a “Constitutional Analysis” of medical data privacy has been so far unsuccessful in obtaining significant protection. Statutory protection has evolved primarily to protect the citizen against the state, not to vindicate the privacy interest of the individual. A “Consumer Protection” approach rather than a right to privacy approach can be used to develop a coherent, practical approach to the needs of various parties in the health care system in the U.S.

  2. Supporting multi-state collaboration on privacy and security to foster health IT and health information exchange.

    PubMed

    Banger, Alison K; Alakoye, Amoke O; Rizk, Stephanie C

    2008-01-01

    As part of the HHS funded contract, Health Information Security and Privacy Collaboration, 41 states and territories have proposed collaborative projects to address cross-state privacy and security challenges related to health IT and health information exchange. Multi-state collaboration on privacy and security issues remains complicated, and resources to support collaboration around these topics are essential to the success of such collaboration. The resources outlined here offer an example of how to support multi-stakeholder, multi-state projects. PMID:18999216

  3. GSA's Teacher Advocate Program - getting teachers to be advocates for Earth Science

    NASA Astrophysics Data System (ADS)

    Lewis, G. B.

    2011-12-01

    After parents, teachers are they most influential people when it comes to students leaning about their world. However, when it comes to Earth science, the vast majority of our teachers have little to no Earth science training and lack the resources to run exciting and challenging classes on Earth science topics for their students. The Geological Society of America (GSA) is committed to reversing that trend by developing easy to use resources and training teachers on how to use them in their classrooms. Through a program called the Teacher Advocate Program (TAP), GSA has already had teachers using Earth science materials with over 6 million students (1.3 million a year). Formally established in 2003, TAP aims to raise the number of teachers who are advocates for geoscience in their classrooms, schools and school districts by providing those teachers with: Low cost teaching resources that provide them with teaching notes, teaching materials (images, models etc) and usable class room activities. Low cost training opportunities for teachers on how to use TAP materials. In-field experiences for teachers to provide them with teaching materials and insights.

  4. Contract and beyond GEMnet status and accomplishments: GSA's energy and maintenance network

    SciTech Connect

    Piette, Mary Ann; Kinney, Satkartar; Levi, Mark; McBride, David; May, Stephen

    2002-05-01

    The U.S. General Services Administration Pacific Rim Region (Region 9), manages over 20 million gross square feet of federally owned office space, plus additional leased office space, for the federal government in California, Nevada, Arizona, Hawaii and the Pacific territories. To assist in this real estate management the Pacific Rim Region is developing the GSA Energy and Maintenance Network, or GEMnet. GEMnet is a collection of information technology initiatives, including remote monitoring and control to reduce operational costs by improving energy efficiency, reducing peak demand, and optimizing maintenance in buildings. Ultimately the various systems use a common database platform. This paper describes the status and plans for GEMnet, focusing on how it compares with related monitoring and information technology currently used in nonresidential buildings. This paper will also report on recent activities within the GEMnet purview, demand-shedding and retro-commissioning. For example, two large GSA office buildings in the San Francisco Bay Area participated in the California Independent System Operator (ISO) demand relief program (DRP) during the summer of 2001, shedding nearly 1 MW when called upon. In conjunction with the fielding of GEMnet related programs, a series of retro-commissioning projects is being implemented, scoped to the needs of particular buildings. Details on the BAS retro-commissioning at one building is presented.

  5. The Convergence of Virtual Reality and Social Networks: Threats to Privacy and Autonomy.

    PubMed

    O'Brolcháin, Fiachra; Jacquemard, Tim; Monaghan, David; O'Connor, Noel; Novitzky, Peter; Gordijn, Bert

    2016-02-01

    The rapid evolution of information, communication and entertainment technologies will transform the lives of citizens and ultimately transform society. This paper focuses on ethical issues associated with the likely convergence of virtual realities (VR) and social networks (SNs), hereafter VRSNs. We examine a scenario in which a significant segment of the world's population has a presence in a VRSN. Given the pace of technological development and the popularity of these new forms of social interaction, this scenario is plausible. However, it brings with it ethical problems. Two central ethical issues are addressed: those of privacy and those of autonomy. VRSNs pose threats to both privacy and autonomy. The threats to privacy can be broadly categorized as threats to informational privacy, threats to physical privacy, and threats to associational privacy. Each of these threats is further subdivided. The threats to autonomy can be broadly categorized as threats to freedom, to knowledge and to authenticity. Again, these three threats are divided into subcategories. Having categorized the main threats posed by VRSNs, a number of recommendations are provided so that policy-makers, developers, and users can make the best possible use of VRSNs.

  6. The differing privacy concerns regarding exchanging electronic medical records of internet users in Taiwan.

    PubMed

    Hwang, Hsin-Ginn; Han, Hwai-En; Kuo, Kuang-Ming; Liu, Chung-Feng

    2012-12-01

    This study explores whether Internet users have different privacy concerns regarding the information contained in electronic medical records (EMRs) according to gender, age, occupation, education, and EMR awareness. Based on the Concern for Information Privacy (CFIP) scale developed by Smith and colleagues in 1996, we conducted an online survey using 15 items in four dimensions, namely, collection, unauthorized access, secondary use, and errors, to investigate Internet users' concerns regarding the privacy of EMRs under health information exchanges (HIE). We retrieved 213 valid questionnaires. The results indicate that the respondents had substantial privacy concerns regarding EMRs and their educational level and EMR awareness significantly influenced their privacy concerns regarding unauthorized access and secondary use of EMRs. This study recommends that the Taiwanese government organizes a comprehensive EMR awareness campaign, emphasizing unauthorized access and secondary use of EMRs. Additionally, to cultivate the public's understanding of EMRs, the government should employ various media, especially Internet channels, to promote EMR awareness, thereby enabling the public to accept the concept and use of EMRs. People who are highly educated and have superior EMR awareness should be given a comprehensive explanation of how hospitals protect patients' EMRs from unauthorized access and secondary use to address their concerns. Thus, the public can comprehend, trust, and accept the use of EMRs, reducing their privacy concerns, which should facilitate the future implementation of HIE.

  7. Computerized databases: privacy issues in the development of the nursing minimum data set.

    PubMed

    Rittman, M R; Gorman, R H

    1992-01-01

    Nursing leaders promoting the development and use of computerized databases such as the Nursing Minimum Data Set (NMDS) have not adequately addressed the complex ethical issues involved with computerized information systems. The purpose of this article is to describe the privacy issues involved with the NMDS. Moral considerations and principles guiding resolution of ethical issues concerning violations of patient privacy are discussed. A paradigm case is used to demonstrate the significance of privacy violations in computerized databases. Two security systems currently being considered in other disciplines are included for their relevance to the development of the NMDS. The broader implications concerning the impact of technology on preservation of human dignity and the quality of life are addressed.

  8. Privacy Challenges for Wireless Medical Devices

    SciTech Connect

    Lagesse, Brent J

    2010-01-01

    Implantable medical devices are becoming more pervasive as new technologies increase their reliability and safety. Furthermore, these devices are becoming increasingly reliant on wireless communication for interaction with the device. Such technologies have the potential to leak information that could be utilized by an attacker to threaten the lives of patients. Privacy of patient information is essential; however, this information is not the only privacy issue that must be considered. In this paper, we discuss why information privacy is insufficient for protecting patients from some attacks and how information regarding the presence of individual devices can leak vulnerabilities. Furthermore, we examine existing privacy enhancing algorithms and discuss their applicability to implantable medical devices.

  9. Customer privacy on UK healthcare websites.

    PubMed

    Mundy, Darren P

    2006-09-01

    Privacy has been and continues to be one of the key challenges of an age devoted to the accumulation, processing, and mining of electronic information. In particular, privacy of healthcare-related information is seen as a key issue as health organizations move towards the electronic provision of services. The aim of the research detailed in this paper has been to analyse privacy policies on popular UK healthcare-related websites to determine the extent to which consumer privacy is protected. The author has combined approaches (such as approaches focused on usability, policy content, and policy quality) used in studies by other researchers on e-commerce and US healthcare websites to provide a comprehensive analysis of UK healthcare privacy policies. The author identifies a wide range of issues related to the protection of consumer privacy through his research analysis using quantitative results. The main outcomes from the author's research are that only 61% of healthcare-related websites in their sample group posted privacy policies. In addition, most of the posted privacy policies had poor readability standards and included a variety of privacy vulnerability statements. Overall, the author's findings represent significant current issues in relation to healthcare information protection on the Internet. The hope is that raising awareness of these results will drive forward changes in the industry, similar to those experienced with information quality.

  10. Customer privacy on UK healthcare websites.

    PubMed

    Mundy, Darren P

    2006-09-01

    Privacy has been and continues to be one of the key challenges of an age devoted to the accumulation, processing, and mining of electronic information. In particular, privacy of healthcare-related information is seen as a key issue as health organizations move towards the electronic provision of services. The aim of the research detailed in this paper has been to analyse privacy policies on popular UK healthcare-related websites to determine the extent to which consumer privacy is protected. The author has combined approaches (such as approaches focused on usability, policy content, and policy quality) used in studies by other researchers on e-commerce and US healthcare websites to provide a comprehensive analysis of UK healthcare privacy policies. The author identifies a wide range of issues related to the protection of consumer privacy through his research analysis using quantitative results. The main outcomes from the author's research are that only 61% of healthcare-related websites in their sample group posted privacy policies. In addition, most of the posted privacy policies had poor readability standards and included a variety of privacy vulnerability statements. Overall, the author's findings represent significant current issues in relation to healthcare information protection on the Internet. The hope is that raising awareness of these results will drive forward changes in the industry, similar to those experienced with information quality. PMID:16954055

  11. Realizing IoT service's policy privacy over publish/subscribe-based middleware.

    PubMed

    Duan, Li; Zhang, Yang; Chen, Shiping; Wang, Shiyao; Cheng, Bo; Chen, Junliang

    2016-01-01

    The publish/subscribe paradigm makes IoT service collaborations more scalable and flexible, due to the space, time and control decoupling of event producers and consumers. Thus, the paradigm can be used to establish large-scale IoT service communication infrastructures such as Supervisory Control and Data Acquisition systems. However, preserving IoT service's policy privacy is difficult in this paradigm, because a classical publisher has little control of its own event after being published; and a subscriber has to accept all the events from the subscribed event type with no choice. Few existing publish/subscribe middleware have built-in mechanisms to address the above issues. In this paper, we present a novel access control framework, which is capable of preserving IoT service's policy privacy. In particular, we adopt the publish/subscribe paradigm as the IoT service communication infrastructure to facilitate the protection of IoT services policy privacy. The key idea in our policy-privacy solution is using a two-layer cooperating method to match bi-directional privacy control requirements: (a) data layer for protecting IoT events; and (b) application layer for preserving the privacy of service policy. Furthermore, the anonymous-set-based principle is adopted to realize the functionalities of the framework, including policy embedding and policy encoding as well as policy matching. Our security analysis shows that the policy privacy framework is Chosen-Plaintext Attack secure. We extend the open source Apache ActiveMQ broker by building into a policy-based authorization mechanism to enforce the privacy policy. The performance evaluation results indicate that our approach is scalable with reasonable overheads.

  12. Realizing IoT service's policy privacy over publish/subscribe-based middleware.

    PubMed

    Duan, Li; Zhang, Yang; Chen, Shiping; Wang, Shiyao; Cheng, Bo; Chen, Junliang

    2016-01-01

    The publish/subscribe paradigm makes IoT service collaborations more scalable and flexible, due to the space, time and control decoupling of event producers and consumers. Thus, the paradigm can be used to establish large-scale IoT service communication infrastructures such as Supervisory Control and Data Acquisition systems. However, preserving IoT service's policy privacy is difficult in this paradigm, because a classical publisher has little control of its own event after being published; and a subscriber has to accept all the events from the subscribed event type with no choice. Few existing publish/subscribe middleware have built-in mechanisms to address the above issues. In this paper, we present a novel access control framework, which is capable of preserving IoT service's policy privacy. In particular, we adopt the publish/subscribe paradigm as the IoT service communication infrastructure to facilitate the protection of IoT services policy privacy. The key idea in our policy-privacy solution is using a two-layer cooperating method to match bi-directional privacy control requirements: (a) data layer for protecting IoT events; and (b) application layer for preserving the privacy of service policy. Furthermore, the anonymous-set-based principle is adopted to realize the functionalities of the framework, including policy embedding and policy encoding as well as policy matching. Our security analysis shows that the policy privacy framework is Chosen-Plaintext Attack secure. We extend the open source Apache ActiveMQ broker by building into a policy-based authorization mechanism to enforce the privacy policy. The performance evaluation results indicate that our approach is scalable with reasonable overheads. PMID:27652188

  13. Class Restricted Clustering and Micro-Perturbation for Data Privacy.

    PubMed

    Li, Xiao-Bai; Sarkar, Sumit

    2013-04-01

    The extensive use of information technologies by organizations to collect and share personal data has raised strong privacy concerns. To respond to the public's demand for data privacy, a class of clustering-based data masking techniques is increasingly being used for privacy-preserving data sharing and analytics. Traditional clustering-based approaches for masking numeric attributes, while addressing re-identification risks, typically do not consider the disclosure risk of categorical confidential attributes. We propose a new approach to deal with this problem. The proposed method clusters data such that the data points within a group are similar in the non-confidential attribute values whereas the confidential attribute values within a group are well distributed. To accomplish this, the clustering method, which is based on a minimum spanning tree (MST) technique, uses two risk-utility tradeoff measures in the growing and pruning stages of the MST technique respectively. As part of our approach we also propose a novel cluster-level micro-perturbation method for masking data that overcomes a common problem of traditional clustering-based methods for data masking, which is their inability to preserve important statistical properties such as the variance of attributes and the covariance across attributes. We show that the mean vector and the covariance matrix of the masked data generated using the micro-perturbation method are unbiased estimates of the original mean vector and covariance matrix. An experimental study on several real-world datasets demonstrates the effectiveness of the proposed approach.

  14. 12 CFR 1204.3 - How do I make a Privacy Act request?

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... Officer by electronic mail, mail, delivery service, or facsimile. The electronic mail address is: privacy... can help FHFA and FHFA-OIG process your request by marking electronic mail, letters, or facsimiles and..., passport card, driver's license, ID card, etc.), or one form of unexpired identification with a...

  15. 12 CFR 1204.3 - How do I make a Privacy Act request?

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... Officer by electronic mail, mail, delivery service, or facsimile. The electronic mail address is: privacy... direct response. You can help FHFA and FHFA-OIG process your request by marking electronic mail, letters... agency or entity (i.e. passport, passport card, driver's license, ID card, etc.), or one form...

  16. 12 CFR 1204.3 - How do I make a Privacy Act request?

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... Officer by electronic mail, mail, delivery service, or facsimile. The electronic mail address is: privacy... direct response. You can help FHFA and FHFA-OIG process your request by marking electronic mail, letters... agency or entity (i.e. passport, passport card, driver's license, ID card, etc.), or one form...

  17. 76 FR 58007 - Privacy Act of 1974; Report of a New System of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-09-19

    ... requirements of the Privacy Act of 1974, CMS is establishing a new system of records to support its shared... of the Patient Protection and Affordable Care Act (PPACA), amending the Social Security Act (the Act... of Records Notice (SORN) addresses a new system which HHS is establishing to support CMS...

  18. 77 FR 13388 - Treasury Inspector General for Tax Administration; Privacy Act of 1974: Computer Matching Program

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-03-06

    ... Treasury Inspector General for Tax Administration; Privacy Act of 1974: Computer Matching Program AGENCY... conduct of TIGTA's computer matching program. DATES: Effective Date: April 5, 2012. ADDRESSES: Comments or... Administration, (202) 622-4068. SUPPLEMENTARY INFORMATION: TIGTA's computer matching program assists in...

  19. The Use of Electronic Data Interchange under the Family Educational Rights and Privacy Act.

    ERIC Educational Resources Information Center

    Rhinehart, Paul T.

    1996-01-01

    When used in managing college student records, electronic data interchange allows electronic student records to be fed directly into a receiving institution's database instead of being sent by mail. Although the process offers many clear advantages, one important question that must be addressed is how students' privacy will be protected under a…

  20. 76 FR 52295 - Amendment of Privacy Act Regulations, Request for Comments

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-08-22

    ... From the Federal Register Online via the Government Publishing Office DEPARTMENT OF THE INTERIOR 43 CFR Part 2 RIN 1090-AA94 Amendment of Privacy Act Regulations, Request for Comments AGENCY: Office... on October 3, 2011. ADDRESSES: Send written comments, identified by RIN 1090-AA94, by one of...

  1. 76 FR 44332 - Privacy Act of 1974; Notice of Updated Systems of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-07-25

    ... the Privacy Act, the Computer Security Act, and OMB Circular A-130. Technical, administrative, and... numbers, addresses, Social Security Numbers, birth dates and credit card numbers or other banking... Security Numbers, birth dates and credit card numbers or other banking information; and b....

  2. 41 CFR 102-37.100 - What factors will GSA consider in allocating surplus property among SASPs?

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ...-generated property to be allocated through a SASP for donation to a specific service educational activity. (c) Need and usability of property, as reflected by requests from SASPs. GSA will also give special... property among the SASPs on a fair and equitable basis using the following factors: (a) Extraordinary...

  3. 41 CFR 102-37.100 - What factors will GSA consider in allocating surplus property among SASPs?

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ...-generated property to be allocated through a SASP for donation to a specific service educational activity. (c) Need and usability of property, as reflected by requests from SASPs. GSA will also give special... property among the SASPs on a fair and equitable basis using the following factors: (a) Extraordinary...

  4. 41 CFR 102-37.100 - What factors will GSA consider in allocating surplus property among SASPs?

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ...-generated property to be allocated through a SASP for donation to a specific service educational activity. (c) Need and usability of property, as reflected by requests from SASPs. GSA will also give special... property among the SASPs on a fair and equitable basis using the following factors: (a) Extraordinary...

  5. 41 CFR 102-118.25 - Does GSA still require my agency to submit its overall transportation policies for approval?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... Public Contracts and Property Management Federal Property Management Regulations System (Continued) FEDERAL MANAGEMENT REGULATION TRANSPORTATION 118-TRANSPORTATION PAYMENT AND AUDIT General Introduction... 41 Public Contracts and Property Management 3 2010-07-01 2010-07-01 false Does GSA still...

  6. 75 FR 6032 - Property Obtained Through the Use of Charge Cards; Notice of GSA Bulletin FMR B-25

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-02-05

    ... ADMINISTRATION Property Obtained Through the Use of Charge Cards; Notice of GSA Bulletin FMR B-25 AGENCY: Office... guidance to all agencies acquiring property using the government charge card. DATES: The bulletin announced.... SUPPLEMENTARY INFORMATION: A. Background Although charge cards provide a great benefit in...

  7. 41 CFR 102-118.615 - Will GSA notify a TSP if they internally offset a payment?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 41 Public Contracts and Property Management 3 2010-07-01 2010-07-01 false Will GSA notify a TSP if they internally offset a payment? 102-118.615 Section 102-118.615 Public Contracts and Property Management Federal Property Management Regulations System (Continued) FEDERAL MANAGEMENT REGULATION TRANSPORTATION 118-TRANSPORTATION PAYMENT AND...

  8. 41 CFR 102-71.5 - What is the scope and philosophy of the General Services Administration's (GSA) real property...

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 41 Public Contracts and Property Management 3 2012-01-01 2012-01-01 false What is the scope and philosophy of the General Services Administration's (GSA) real property policies? 102-71.5 Section 102-71.5...) FEDERAL MANAGEMENT REGULATION REAL PROPERTY 71-GENERAL § 102-71.5 What is the scope and philosophy of...

  9. 41 CFR 102-71.5 - What is the scope and philosophy of the General Services Administration's (GSA) real property...

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 41 Public Contracts and Property Management 3 2013-07-01 2013-07-01 false What is the scope and philosophy of the General Services Administration's (GSA) real property policies? 102-71.5 Section 102-71.5...) FEDERAL MANAGEMENT REGULATION REAL PROPERTY 71-GENERAL § 102-71.5 What is the scope and philosophy of...

  10. 41 CFR 102-71.5 - What is the scope and philosophy of the General Services Administration's (GSA) real property...

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 41 Public Contracts and Property Management 3 2014-01-01 2014-01-01 false What is the scope and philosophy of the General Services Administration's (GSA) real property policies? 102-71.5 Section 102-71.5...) FEDERAL MANAGEMENT REGULATION REAL PROPERTY 71-GENERAL § 102-71.5 What is the scope and philosophy of...

  11. 41 CFR 102-75.945 - What is GSA's policy concerning the physical care, handling, protection, and maintenance of...

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... related personal property? 102-75.945 Section 102-75.945 Public Contracts and Property Management Federal... related personal property? GSA's policy is to— (a) Manage excess and surplus real property, including related personal property, by providing only those minimum services necessary to preserve the...

  12. 41 CFR 102-36.305 - May we abandon or destroy excess personal property without reporting it to GSA?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... destroy excess personal property without reporting it to GSA? 102-36.305 Section 102-36.305 Public... MANAGEMENT REGULATION PERSONAL PROPERTY 36-DISPOSITION OF EXCESS PERSONAL PROPERTY Disposition of Excess Personal Property Abandonment/destruction § 102-36.305 May we abandon or destroy excess personal...

  13. 41 CFR 102-36.55 - What is GSA's role in the disposition of excess personal property?

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 41 Public Contracts and Property Management 3 2011-01-01 2011-01-01 false What is GSA's role in the disposition of excess personal property? 102-36.55 Section 102-36.55 Public Contracts and Property Management Federal Property Management Regulations System (Continued) FEDERAL MANAGEMENT REGULATION...

  14. 41 CFR 102-192.90 - What must we include in our annual mail management report to GSA?

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... service provider to ship parts and supplies from a materiel distribution center (see the definition of... publication called “Marketips,” which provides information about supplies and services available through GSA... Systems Manager, Executive Mail Center Manager, Mailpiece Quality Control Specialist, Certified...

  15. 41 CFR 102-118.335 - What does the GSA Audit Division consider when verifying an agency prepayment audit program?

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 41 Public Contracts and Property Management 3 2011-01-01 2011-01-01 false What does the GSA Audit Division consider when verifying an agency prepayment audit program? 102-118.335 Section 102-118.335 Public... positive improvements, as well as adherence to the guidelines listed in this part....

  16. 48 CFR 552.212-71 - Contract Terms and Conditions Applicable to GSA Acquisition of Commercial Items.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 48 Federal Acquisition Regulations System 4 2010-10-01 2010-10-01 false Contract Terms and Conditions Applicable to GSA Acquisition of Commercial Items. 552.212-71 Section 552.212-71 Federal Acquisition Regulations System GENERAL SERVICES ADMINISTRATION CLAUSES AND FORMS SOLICITATION PROVISIONS AND CONTRACT CLAUSES Text of Provisions and...

  17. 48 CFR 52.211-1 - Availability of Specifications Listed in the GSA Index of Federal Specifications, Standards and...

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 48 Federal Acquisition Regulations System 2 2012-10-01 2012-10-01 false Availability of Specifications Listed in the GSA Index of Federal Specifications, Standards and Commercial Item Descriptions, FPMR Part 101-29. 52.211-1 Section 52.211-1 Federal Acquisition Regulations System FEDERAL ACQUISITION REGULATION (CONTINUED) CLAUSES AND...

  18. 48 CFR 52.211-1 - Availability of Specifications Listed in the GSA Index of Federal Specifications, Standards and...

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 48 Federal Acquisition Regulations System 2 2010-10-01 2010-10-01 false Availability of Specifications Listed in the GSA Index of Federal Specifications, Standards and Commercial Item Descriptions, FPMR Part 101-29. 52.211-1 Section 52.211-1 Federal Acquisition Regulations System FEDERAL ACQUISITION REGULATION (CONTINUED) CLAUSES AND...

  19. 48 CFR 52.211-3 - Availability of Specifications Not Listed in the GSA Index of Federal Specifications, Standards...

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 48 Federal Acquisition Regulations System 2 2010-10-01 2010-10-01 false Availability of Specifications Not Listed in the GSA Index of Federal Specifications, Standards and Commercial Item Descriptions. 52.211-3 Section 52.211-3 Federal Acquisition Regulations System FEDERAL ACQUISITION REGULATION (CONTINUED) CLAUSES AND FORMS...

  20. 48 CFR 52.211-4 - Availability for Examination of Specifications Not Listed in the GSA Index of Federal...

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 48 Federal Acquisition Regulations System 2 2012-10-01 2012-10-01 false Availability for Examination of Specifications Not Listed in the GSA Index of Federal Specifications, Standards and Commercial Item Descriptions. 52.211-4 Section 52.211-4 Federal Acquisition Regulations System FEDERAL ACQUISITION REGULATION (CONTINUED) CLAUSES AND...

  1. 48 CFR 52.211-3 - Availability of Specifications Not Listed in the GSA Index of Federal Specifications, Standards...

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 48 Federal Acquisition Regulations System 2 2014-10-01 2014-10-01 false Availability of Specifications Not Listed in the GSA Index of Federal Specifications, Standards and Commercial Item Descriptions. 52.211-3 Section 52.211-3 Federal Acquisition Regulations System FEDERAL ACQUISITION REGULATION (CONTINUED) CLAUSES AND FORMS...

  2. 48 CFR 52.211-4 - Availability for Examination of Specifications Not Listed in the GSA Index of Federal...

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 48 Federal Acquisition Regulations System 2 2014-10-01 2014-10-01 false Availability for Examination of Specifications Not Listed in the GSA Index of Federal Specifications, Standards and Commercial Item Descriptions. 52.211-4 Section 52.211-4 Federal Acquisition Regulations System FEDERAL ACQUISITION REGULATION (CONTINUED) CLAUSES AND...

  3. 48 CFR 52.211-4 - Availability for Examination of Specifications Not Listed in the GSA Index of Federal...

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 48 Federal Acquisition Regulations System 2 2010-10-01 2010-10-01 false Availability for Examination of Specifications Not Listed in the GSA Index of Federal Specifications, Standards and Commercial Item Descriptions. 52.211-4 Section 52.211-4 Federal Acquisition Regulations System FEDERAL ACQUISITION REGULATION (CONTINUED) CLAUSES AND...

  4. 48 CFR 52.211-3 - Availability of Specifications Not Listed in the GSA Index of Federal Specifications, Standards...

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 48 Federal Acquisition Regulations System 2 2012-10-01 2012-10-01 false Availability of Specifications Not Listed in the GSA Index of Federal Specifications, Standards and Commercial Item Descriptions. 52.211-3 Section 52.211-3 Federal Acquisition Regulations System FEDERAL ACQUISITION REGULATION (CONTINUED) CLAUSES AND FORMS...

  5. 48 CFR 52.211-1 - Availability of Specifications Listed in the GSA Index of Federal Specifications, Standards and...

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 48 Federal Acquisition Regulations System 2 2014-10-01 2014-10-01 false Availability of Specifications Listed in the GSA Index of Federal Specifications, Standards and Commercial Item Descriptions, FPMR Part 101-29. 52.211-1 Section 52.211-1 Federal Acquisition Regulations System FEDERAL ACQUISITION REGULATION (CONTINUED) CLAUSES AND...

  6. 5 CFR 6701.104 - Prohibited purchases of real estate by certain GSA employees involved in the acquisition or...

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 5 Administrative Personnel 3 2010-01-01 2010-01-01 false Prohibited purchases of real estate by certain GSA employees involved in the acquisition or disposal of real estate. 6701.104 Section 6701.104 Administrative Personnel GENERAL SERVICES ADMINISTRATION SUPPLEMENTAL STANDARDS OF ETHICAL CONDUCT FOR EMPLOYEES OF THE GENERAL...

  7. 41 CFR 101-26.4902-2891 - GSA Form 2891: Instructions to Users of Federal Supply Schedules.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ...: Instructions to Users of Federal Supply Schedules. 101-26.4902-2891 Section 101-26.4902-2891 Public Contracts....4902-2891 GSA Form 2891: Instructions to Users of Federal Supply Schedules. Note: The form illustrated... Register or the Code of Federal Regulations....

  8. 41 CFR 101-26.104 - End-of-year submission of requisitions for action by GSA.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... required to reflect the applicable appropriation or fiscal year funds to be charged. The fund code entry on... to be chargeable to appropriations expiring the last day of the fiscal year are submitted in sufficient time for GSA to consummate the necessary action before the end of the fiscal year....

  9. 41 CFR 102-118.260 - Must my agency send all quotations, tenders, or contracts with a TSP to GSA?

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... Regulation parts 102-117 and 102-118 (41 CFR parts 102-117 and 102-118), and the TSP(s) hold(s) the required... execution to—General Services Administration, Transportation Audit Division (QMCA), Crystal Plaza 4, Room 300, 2200 Crystal Drive, Arlington, VA 22202, www.gsa.gov/transaudits. (b) Tenders must be...

  10. 41 CFR 102-118.260 - Must my agency send all quotations, tenders, or contracts with a TSP to GSA?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... Regulation parts 102-117 and 102-118 (41 CFR parts 102-117 and 102-118), and the TSP(s) hold(s) the required... execution to—General Services Administration, Transportation Audit Division (QMCA), Crystal Plaza 4, Room 300, 2200 Crystal Drive, Arlington, VA 22202, www.gsa.gov/transaudits. (b) Tenders must be...

  11. 41 CFR 102-118.260 - Must my agency send all quotations, tenders, or contracts with a TSP to GSA?

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... Regulation parts 102-117 and 102-118 (41 CFR parts 102-117 and 102-118), and the TSP(s) hold(s) the required... execution to—General Services Administration, Transportation Audit Division (QMCA), Crystal Plaza 4, Room 300, 2200 Crystal Drive, Arlington, VA 22202, www.gsa.gov/transaudits. (b) Tenders must be...

  12. 41 CFR 102-118.260 - Must my agency send all quotations, tenders, or contracts with a TSP to GSA?

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... Regulation parts 102-117 and 102-118 (41 CFR parts 102-117 and 102-118), and the TSP(s) hold(s) the required... execution to—General Services Administration, Transportation Audit Division (QMCA), Crystal Plaza 4, Room 300, 2200 Crystal Drive, Arlington, VA 22202, www.gsa.gov/transaudits. (b) Tenders must be...

  13. 41 CFR 102-192.90 - What must we include in our annual mail management report to GSA?

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... annual mail management report to GSA? Your annual report must— (a) Identify your agency mail manager; in addition you must promptly report the name of the agency mail manager whenever there is a change of the... accomplishments and plans to improve the economy and efficiency of mail operations in the current and future...

  14. 41 CFR 102-192.90 - What must we include in our annual mail management report to GSA?

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... annual mail management report to GSA? Your annual report must— (a) Identify your agency mail manager; in addition you must promptly report the name of the agency mail manager whenever there is a change of the... accomplishments and plans to improve the economy and efficiency of mail operations in the current and future...

  15. 41 CFR 102-118.530 - Will GSA instruct my agency's disbursing offices to offset unpaid TSP billings?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... Contracts and Property Management Federal Property Management Regulations System (Continued) FEDERAL MANAGEMENT REGULATION TRANSPORTATION 118-TRANSPORTATION PAYMENT AND AUDIT Claims and Appeal Procedures... 41 Public Contracts and Property Management 3 2010-07-01 2010-07-01 false Will GSA instruct...

  16. 41 CFR 102-118.510 - Can my agency revise or alter a GSA Form 7931, Certificate of Settlement?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... Property Management Federal Property Management Regulations System (Continued) FEDERAL MANAGEMENT... 41 Public Contracts and Property Management 3 2010-07-01 2010-07-01 false Can my agency revise or... Information for All Claims § 102-118.510 Can my agency revise or alter a GSA Form 7931, Certificate...

  17. 41 CFR 102-118.260 - Must my agency send all quotations, tenders, or contracts with a TSP to GSA?

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... Regulation parts 102-117 and 102-118 (41 CFR parts 102-117 and 102-118), and the TSP(s) hold(s) the required... execution to—General Services Administration, Transportation Audit Division (QMCA), Crystal Plaza 4, Room 300, 2200 Crystal Drive, Arlington, VA 22202, www.gsa.gov/transaudits. (b) Tenders must be...

  18. 41 CFR 105-64.111 - What is GSA's policy on directives that may conflict with this part?

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 41 Public Contracts and Property Management 3 2011-01-01 2011-01-01 false What is GSA's policy on directives that may conflict with this part? 105-64.111 Section 105-64.111 Public Contracts and Property Management Federal Property Management Regulations System (Continued) GENERAL SERVICES...

  19. 41 CFR 102-71.5 - What is the scope and philosophy of the General Services Administration's (GSA) real property...

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 41 Public Contracts and Property Management 3 2011-01-01 2011-01-01 false What is the scope and philosophy of the General Services Administration's (GSA) real property policies? 102-71.5 Section 102-71.5...) FEDERAL MANAGEMENT REGULATION REAL PROPERTY 71-GENERAL § 102-71.5 What is the scope and philosophy of...

  20. 41 CFR 102-71.5 - What is the scope and philosophy of the General Services Administration's (GSA) real property...

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 41 Public Contracts and Property Management 3 2010-07-01 2010-07-01 false What is the scope and philosophy of the General Services Administration's (GSA) real property policies? 102-71.5 Section 102-71.5...) FEDERAL MANAGEMENT REGULATION REAL PROPERTY 71-GENERAL § 102-71.5 What is the scope and philosophy of...

  1. Re-Assessing Green Building Performance: A Post Occupancy Evaluation of 22 GSA Buildings

    SciTech Connect

    Fowler, Kimberly M.; Rauch, Emily M.; Henderson, Jordan W.; Kora, Angela R.

    2010-06-01

    2nd report on the performance of GSA's sustainably designed buildings. The purpose of this study was to provide an overview of measured whole building performance as it compares to GSA and industry baselines. The PNNL research team found the data analysis illuminated strengths and weaknesses of individual buildings as well as the portfolio of buildings. This section includes summary data, observations that cross multiple performance metrics, discussion of lessons learned from this research, and opportunities for future research. The summary of annual data for each of the performance metrics is provided in Table 25. The data represent 1 year of measurements and are not associated with any specific design features or strategies. Where available, multiple years of data were examined and there were minimal significant differences between the years. Individually focused post occupancy evaluation (POEs) would allow for more detailed analysis of the buildings. Examining building performance over multiple years could potentially offer a useful diagnostic tool for identifying building operations that are in need of operational changes. Investigating what the connection is between the building performance and the design intent would offer potential design guidance and possible insight into building operation strategies. The 'aggregate operating cost' metric used in this study represents the costs that were available for developing a comparative industry baseline for office buildings. The costs include water utilities, energy utilities, general maintenance, grounds maintenance, waste and recycling, and janitorial costs. Three of the buildings that cost more than the baseline in Figure 45 have higher maintenance costs than the baseline, and one has higher energy costs. Given the volume of data collected and analyzed for this study, the inevitable request is for a simple answer with respect to sustainably designed building performance. As previously stated, compiling the

  2. 42 CFR 457.1110 - Privacy protections.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 42 Public Health 4 2014-10-01 2014-10-01 false Privacy protections. 457.1110 Section 457.1110 Public Health CENTERS FOR MEDICARE & MEDICAID SERVICES, DEPARTMENT OF HEALTH AND HUMAN SERVICES... Requirements: Applicant and Enrollee Protections § 457.1110 Privacy protections. The State must ensure...

  3. 42 CFR 457.1110 - Privacy protections.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 42 Public Health 4 2012-10-01 2012-10-01 false Privacy protections. 457.1110 Section 457.1110 Public Health CENTERS FOR MEDICARE & MEDICAID SERVICES, DEPARTMENT OF HEALTH AND HUMAN SERVICES... Requirements: Applicant and Enrollee Protections § 457.1110 Privacy protections. The State must ensure...

  4. 42 CFR 457.1110 - Privacy protections.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 42 Public Health 4 2011-10-01 2011-10-01 false Privacy protections. 457.1110 Section 457.1110 Public Health CENTERS FOR MEDICARE & MEDICAID SERVICES, DEPARTMENT OF HEALTH AND HUMAN SERVICES... Requirements: Applicant and Enrollee Protections § 457.1110 Privacy protections. The State must ensure...

  5. 42 CFR 457.1110 - Privacy protections.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 42 Public Health 4 2013-10-01 2013-10-01 false Privacy protections. 457.1110 Section 457.1110 Public Health CENTERS FOR MEDICARE & MEDICAID SERVICES, DEPARTMENT OF HEALTH AND HUMAN SERVICES... Requirements: Applicant and Enrollee Protections § 457.1110 Privacy protections. The State must ensure...

  6. Privacy and Ethics in Undergraduate GIS Curricula

    ERIC Educational Resources Information Center

    Scull, Peter; Burnett, Adam; Dolfi, Emmalee; Goldfarb, Ali; Baum, Peter

    2016-01-01

    The development of location-aware technologies, such as smartphones, raises serious questions regarding locational privacy and the ethical use of geographic data. The degree to which these concepts are taught in undergraduate geographic information science (GISci) courses is unknown. A survey of GISci educators shows that issues of privacy and…

  7. Reconsidering the Right to Privacy in Canada

    ERIC Educational Resources Information Center

    Shade, Leslie Regan

    2008-01-01

    This article argues that post-September 11 political debates and legislation around security necessitates a reconsideration of a right to privacy in Canada. It looks at the proposal for a Canadian Charter of Privacy Rights promoted by Senator Sheila Finestone in the late 1990s and the current challenges of emergent material technologies…

  8. 77 FR 19095 - Privacy Act; Implementation; Correction

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-03-30

    ... (77 FR 15595-15596), Department of Defense published a direct final rule titled Privacy Act... In the direct final rule (FR Doc. 2012-6170) published on March 16, 2012 (77 FR 15595-15596), make... of the Secretary 32 CFR Part 322 Privacy Act; Implementation; Correction AGENCY: Office of...

  9. 49 CFR 10.13 - Privacy Officer.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 49 Transportation 1 2010-10-01 2010-10-01 false Privacy Officer. 10.13 Section 10.13... INDIVIDUALS General § 10.13 Privacy Officer. (a) To assist with implementation, evaluation, and administration issues, the Chief Information Officer appoints a principal coordinating official with the title...

  10. Privacy-Preserving Location-Based Services

    ERIC Educational Resources Information Center

    Chow, Chi Yin

    2010-01-01

    Location-based services (LBS for short) providers require users' current locations to answer their location-based queries, e.g., range and nearest-neighbor queries. Revealing personal location information to potentially untrusted service providers could create privacy risks for users. To this end, our objective is to design a privacy-preserving…

  11. Just in Time Research: Privacy Practices

    ERIC Educational Resources Information Center

    Grama, Joanna Lyn

    2014-01-01

    The January 2014 edition of the ECAR Update subscriber newsletter included an informal poll on information privacy practices. The poll was intended to collect a quick snapshot of the higher education community's thoughts on this important topic during Data Privacy Month. Results of the poll will be used to inform EDUCAUSE research, programs,…

  12. Protecting Privacy in Computerized Medical Information.

    ERIC Educational Resources Information Center

    Congress of the U.S., Washington, DC. Office of Technology Assessment.

    This report analyzes the implications of computerized medical information and the challenges it brings to individual privacy. The report examines the nature of the privacy interest in health care information and the current state of the law protecting that information; the nature of proposals to computerize health care information and the…

  13. A Deontological View of the Privacy Debate.

    ERIC Educational Resources Information Center

    Wilson, Alan

    The mass media are at odds with the public on issues concerning privacy, i.e., issues concerning whether private information about a person should be printed in a newspaper or magazine. In a 1982 survey, one journalist/respondent said his or her newspaper "almost always" favored the public's right to know over a person's right to privacy.…

  14. Privacy and the National Information Infrastructure.

    ERIC Educational Resources Information Center

    Rotenberg, Marc

    1994-01-01

    Explains the work of Computer Professionals for Social Responsibility regarding privacy issues in the use of electronic networks; recommends principles that should be adopted for a National Information Infrastructure privacy code; discusses the need for public education; and suggests pertinent legislative proposals. (LRW)

  15. Information Parents Must Know about Online Privacy.

    ERIC Educational Resources Information Center

    Markell, Ginny

    2000-01-01

    Presents four tips to help parents monitor whether website operators are complying with the 1988 Children's Online Privacy Protection Act: look for privacy policies on children's websites; determine if they ask for parental consent to collect personal information; regularly monitor information being sent to children; and determine if web operators…

  16. The Press, Privacy, and Community Mores.

    ERIC Educational Resources Information Center

    Glasser, Theodore L.

    Because of judicial indifference and legislative inaction, the conflict between the right of privacy and the freedom of the press is no closer to a resolution than it was a century ago. William Prosser's reduction of the common law of privacy into four separate torts has not solved the problem. The concept of "newsworthiness" has not been helpful…

  17. 77 FR 57013 - Privacy Act; Implementation

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-09-17

    ... of the Secretary 32 CFR Part 319 Privacy Act; Implementation AGENCY: Defense Intelligence Agency, DoD. ACTION: Direct final rule with request for comments. SUMMARY: The Defense Intelligence Agency is updating the Defense Intelligence Agency Privacy Act Program, by adding the (k)(2) exemption to...

  18. 77 FR 15591 - Privacy Act; Implementation

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-03-16

    ... of the Secretary 32 CFR Part 319 Privacy Act; Implementation AGENCY: Defense Intelligence Agency, DoD. ACTION: Direct final rule with request for comments. SUMMARY: The Defense Intelligence Agency is deleting... makes nonsubstantive changes to the Defense Intelligence Agency Privacy Program rules. These...

  19. Update on patient privacy legislation.

    PubMed

    Maddox, P J

    1998-01-01

    The administrative simplification provisions of HIPAA will establish the first national standards for the electronic transmission of health care transactions with which all federal programs (DOD, Medicare, and Medicaid) and all private health plans must comply. Individuals and organizations should prepare themselves, their systems, and their processes to meet these new administrative and financial data standards and requirements. The benefits of standardized electronic transactions on achieving a single paper-free claims submission to be used by all providers and payers is of obvious benefit. Not so obvious are consequences associated with limiting the access and use of existing data repositories on a variety of clinical, administrative, and research functions. It is critically important in this age of increased accountability for fiscal restraint and improving the outcomes of entire patient populations that clinicians, managers, organizations, and researchers to use data for a variety of clinical, quality improvement/evaluation, and research purposes. Administrative simplification and protecting individual privacy should not be achieved by overly bureaucratic and restrictive responses that impede epidemiologic and health services research, quality improvement activities, and optimization strategies for improving the health of populations. While the health system understands the need for some increased regulation to ensure the privacy of individual patient privacy in the "wired" world solutions must be found and overly restrictive consequences associated with prohibiting access to data must be resolved. More than ever, the entire system requires data to inform every level and type of decision made. Legislation and bureaucratic processes that do not understand and support responsible data-driven decision-making will serve to roll-back, not advance health system improvement. As we prepare ourselves for HIPAA compliance and the expectations of the benefits it will

  20. Protecting privacy in a clinical data warehouse.

    PubMed

    Kong, Guilan; Xiao, Zhichun

    2015-06-01

    Peking University has several prestigious teaching hospitals in China. To make secondary use of massive medical data for research purposes, construction of a clinical data warehouse is imperative in Peking University. However, a big concern for clinical data warehouse construction is how to protect patient privacy. In this project, we propose to use a combination of symmetric block ciphers, asymmetric ciphers, and cryptographic hashing algorithms to protect patient privacy information. The novelty of our privacy protection approach lies in message-level data encryption, the key caching system, and the cryptographic key management system. The proposed privacy protection approach is scalable to clinical data warehouse construction with any size of medical data. With the composite privacy protection approach, the clinical data warehouse can be secure enough to keep the confidential data from leaking to the outside world.

  1. Protecting privacy in a clinical data warehouse.

    PubMed

    Kong, Guilan; Xiao, Zhichun

    2015-06-01

    Peking University has several prestigious teaching hospitals in China. To make secondary use of massive medical data for research purposes, construction of a clinical data warehouse is imperative in Peking University. However, a big concern for clinical data warehouse construction is how to protect patient privacy. In this project, we propose to use a combination of symmetric block ciphers, asymmetric ciphers, and cryptographic hashing algorithms to protect patient privacy information. The novelty of our privacy protection approach lies in message-level data encryption, the key caching system, and the cryptographic key management system. The proposed privacy protection approach is scalable to clinical data warehouse construction with any size of medical data. With the composite privacy protection approach, the clinical data warehouse can be secure enough to keep the confidential data from leaking to the outside world. PMID:25301198

  2. 75 FR 3919 - Privacy Act of 1974; as Amended; Notice To Amend an Existing System of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-01-25

    ... received. Beverly E. Walker, Privacy Act Officer, Bureau of Land Management. System Name Timber Sale... 97208; hand-delivering comments to Oregon State Office, 333 SW. 1st Avenue, Portland, Oregon 97204; or e-mailing comments to Sherrie_Reid@blm.gov . Before including your address, phone number, e-mail address,...

  3. The private adolescent: privacy needs of adolescents in hospitals.

    PubMed

    Hutton, Alison

    2002-02-01

    This report is based on an interpretative study that explored the meaning of space to adolescents in the hospital environment. Through designing their own adolescent ward and discussing their designs in an interview, participants articulated their spatial needs in the ward environment. This paper addresses the private space issues of the adolescent patient in the ward environment. Issues that are discussed include the use of the telephone, the bathroom, and the bedroom, and additional facilities needed to enhance privacy in the ward. PMID:11891498

  4. Performance-Oriented Privacy-Preserving Data Integration

    SciTech Connect

    Pon, R K; Critchlow, T

    2004-09-15

    Current solutions to integrating private data with public data have provided useful privacy metrics, such as relative information gain, that can be used to evaluate alternative approaches. Unfortunately, they have not addressed critical performance issues, especially when the public database is very large. The use of hashes and noise yields better performance than existing techniques while still making it difficult for unauthorized entities to distinguish which data items truly exist in the private database. As we show here, leveraging the uncertainty introduced by collisions caused by hashing and the injection of noise, we present a technique for performing a relational join operation between a massive public table and a relatively smaller private one.

  5. 78 FR 22880 - Privacy Act of 1974; Notice of cancellation of System of Record Notice (SORN)

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-04-17

    ... (SAM). The (SORN) was published in the Federal Register at 73 FR 22374 on Friday, April 25, 2008. Dated... Services Administration (GSA). ACTION: Withdrawal of GSA/GOV-8 Excluded Parties List System (EPLS) System...: GSA/GOV-8 Excluded Parties List System (EPLS). DATES: Effective Date: April 17, 2013. FOR...

  6. GcoGSA-BA: a global core genome SNP analysis for Bacillus anthracis.

    PubMed

    Yamashita, Akifmi; Sekizuka, Tsuyoshi; Kuroda, Makoto

    2015-01-01

    As an issue of biosecurity, it is important to identify the origin of a suspected sample to distinguish whether it originated from the release of a bioterrorism agent or from environmental contamination with a virulent agent. Here we have developed an analytical pipeline that can infer the phylogenetic position of Bacillus cereus group species, including B. anthracis, from next-generation sequencing reads without extensive genomics skills. GcoGSA-BA can also detect the existence of anthrax plasmid pXO1 carrying 3 anthrax toxins (lethal factor, edema factor, and protective antigen). This pipeline can also be used to correctly infer the phylogenetic position and to detect the suspected isolate carrying anthrax toxins among B. cereus group.

  7. IT solutions for privacy protection in biobanking.

    PubMed

    Eder, J; Gottweis, H; Zatloukal, K

    2012-01-01

    Biobanks containing human biological samples and associated data are key resources for the advancement of medical research. Efficient access to samples and data increases competitiveness in medical research, reduces effort and time for achieving scientific results and promotes scientific progress. In order to address upcoming health challenges, there is increasing need for transnational collaboration. This requires innovative solutions improving interoperability of biobanks in fields such as sample and data management as well as governance including ethical and legal frameworks. In this context, rights and expectations of donors to determine the usage of their biological material and data and to ensure their privacy have to be observed. We discuss the benefits of biobanks, the needs to support medical research and the societal demands and regulations, in particular, securing the rights of donors and present IT solutions that allow both to maintain the security of personal data and to increase the efficiency of access to data in biobanks. Disclosure filters are discussed as a strategy to combine European public expectations concerning informed consent with the requirements of biobank research.

  8. 12 CFR 1016.2 - Model privacy form and examples.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 12 Banks and Banking 8 2013-01-01 2013-01-01 false Model privacy form and examples. 1016.2 Section... INFORMATION (REGULATION P) § 1016.2 Model privacy form and examples. (a) Model privacy form. Use of the model... model privacy form is not required. (b) Examples. The examples in this part are not...

  9. 12 CFR 1016.2 - Model privacy form and examples.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 12 Banks and Banking 8 2012-01-01 2012-01-01 false Model privacy form and examples. 1016.2 Section... INFORMATION (REGULATION P) § 1016.2 Model privacy form and examples. (a) Model privacy form. Use of the model... model privacy form is not required. (b) Examples. The examples in this part are not...

  10. 12 CFR 1016.2 - Model privacy form and examples.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 12 Banks and Banking 8 2014-01-01 2014-01-01 false Model privacy form and examples. 1016.2 Section... INFORMATION (REGULATION P) § 1016.2 Model privacy form and examples. (a) Model privacy form. Use of the model... model privacy form is not required. (b) Examples. The examples in this part are not...

  11. 10 CFR 1304.103 - Privacy Act inquiries.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 10 Energy 4 2010-01-01 2010-01-01 false Privacy Act inquiries. 1304.103 Section 1304.103 Energy NUCLEAR WASTE TECHNICAL REVIEW BOARD PRIVACY ACT OF 1974 § 1304.103 Privacy Act inquiries. (a) Requests... writing may be sent to: Privacy Act Officer, U.S. Nuclear Waste Technical Review Board, 2300...

  12. 25 CFR 700.259 - Records subject to Privacy Act.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 25 Indians 2 2010-04-01 2010-04-01 false Records subject to Privacy Act. 700.259 Section 700.259 Indians THE OFFICE OF NAVAJO AND HOPI INDIAN RELOCATION COMMISSION OPERATIONS AND RELOCATION PROCEDURES Privacy Act § 700.259 Records subject to Privacy Act. The Privacy Act applies to all “records” as...

  13. 4 CFR 200.13 - Privacy Act training.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 4 Accounts 1 2010-01-01 2010-01-01 false Privacy Act training. 200.13 Section 200.13 Accounts RECOVERY ACCOUNTABILITY AND TRANSPARENCY BOARD PRIVACY ACT OF 1974 § 200.13 Privacy Act training. (a) The... any Board systems of records are informed of all requirements necessary to protect the privacy...

  14. 43 CFR 2.47 - Records subject to Privacy Act.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 43 Public Lands: Interior 1 2010-10-01 2010-10-01 false Records subject to Privacy Act. 2.47 Section 2.47 Public Lands: Interior Office of the Secretary of the Interior RECORDS AND TESTIMONY; FREEDOM OF INFORMATION ACT Privacy Act § 2.47 Records subject to Privacy Act. The Privacy Act applies to...

  15. 17 CFR 248.8 - Revised privacy notices.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Revised privacy notices. 248.8...) REGULATIONS S-P AND S-AM Regulation S-P: Privacy of Consumer Financial Information and Safeguarding Personal Information Privacy and Opt Out Notices § 248.8 Revised privacy notices. (a) General rule. Except as...

  16. 16 CFR 313.8 - Revised privacy notices.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 16 Commercial Practices 1 2010-01-01 2010-01-01 false Revised privacy notices. 313.8 Section 313.8 Commercial Practices FEDERAL TRADE COMMISSION REGULATIONS UNDER SPECIFIC ACTS OF CONGRESS PRIVACY OF CONSUMER FINANCIAL INFORMATION Privacy and Opt Out Notices § 313.8 Revised privacy notices. (a) General rule....

  17. 12 CFR 573.2 - Model privacy form and examples.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 12 Banks and Banking 5 2010-01-01 2010-01-01 false Model privacy form and examples. 573.2 Section 573.2 Banks and Banking OFFICE OF THRIFT SUPERVISION, DEPARTMENT OF THE TREASURY PRIVACY OF CONSUMER FINANCIAL INFORMATION § 573.2 Model privacy form and examples. (a) Model privacy form. Use of the...

  18. 17 CFR 160.8 - Revised privacy notices.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 17 Commodity and Securities Exchanges 1 2010-04-01 2010-04-01 false Revised privacy notices. 160.8 Section 160.8 Commodity and Securities Exchanges COMMODITY FUTURES TRADING COMMISSION PRIVACY OF CONSUMER FINANCIAL INFORMATION Privacy and Opt Out Notices § 160.8 Revised privacy notices. (a) General rule....

  19. 12 CFR 573.8 - Revised privacy notices.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 12 Banks and Banking 5 2010-01-01 2010-01-01 false Revised privacy notices. 573.8 Section 573.8 Banks and Banking OFFICE OF THRIFT SUPERVISION, DEPARTMENT OF THE TREASURY PRIVACY OF CONSUMER FINANCIAL INFORMATION Privacy and Opt Out Notices § 573.8 Revised privacy notices. (a) General rule. Except as...

  20. 12 CFR 216.8 - Revised privacy notices.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 12 Banks and Banking 2 2010-01-01 2010-01-01 false Revised privacy notices. 216.8 Section 216.8 Banks and Banking FEDERAL RESERVE SYSTEM BOARD OF GOVERNORS OF THE FEDERAL RESERVE SYSTEM PRIVACY OF CONSUMER FINANCIAL INFORMATION (REGULATION P) Privacy and Opt Out Notices § 216.8 Revised privacy...

  1. 12 CFR 40.2 - Model privacy form and examples.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 12 Banks and Banking 1 2010-01-01 2010-01-01 false Model privacy form and examples. 40.2 Section 40.2 Banks and Banking COMPTROLLER OF THE CURRENCY, DEPARTMENT OF THE TREASURY PRIVACY OF CONSUMER FINANCIAL INFORMATION § 40.2 Model privacy form and examples. (a) Model privacy form. Use of the...

  2. 32 CFR 310.43 - Privacy Act inspections.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 32 National Defense 2 2010-07-01 2010-07-01 false Privacy Act inspections. 310.43 Section 310.43 National Defense Department of Defense (Continued) OFFICE OF THE SECRETARY OF DEFENSE (CONTINUED) PRIVACY PROGRAM DOD PRIVACY PROGRAM Inspections § 310.43 Privacy Act inspections. During internal...

  3. 12 CFR 716.8 - Revised privacy notices.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 12 Banks and Banking 6 2010-01-01 2010-01-01 false Revised privacy notices. 716.8 Section 716.8 Banks and Banking NATIONAL CREDIT UNION ADMINISTRATION REGULATIONS AFFECTING CREDIT UNIONS PRIVACY OF CONSUMER FINANCIAL INFORMATION Privacy and Opt Out Notices § 716.8 Revised privacy notices. (a)...

  4. 4 CFR 200.4 - Privacy Act inquiries.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 4 Accounts 1 2010-01-01 2010-01-01 false Privacy Act inquiries. 200.4 Section 200.4 Accounts RECOVERY ACCOUNTABILITY AND TRANSPARENCY BOARD PRIVACY ACT OF 1974 § 200.4 Privacy Act inquiries. (a... Avenue, NW., Suite 700, Washington, DC 20006. Inquiries should be marked “Privacy Act Inquiry” on...

  5. 45 CFR 503.1 - Definitions-Privacy Act.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 45 Public Welfare 3 2010-10-01 2010-10-01 false Definitions-Privacy Act. 503.1 Section 503.1... THE UNITED STATES, DEPARTMENT OF JUSTICE RULES OF PRACTICE PRIVACY ACT AND GOVERNMENT IN THE SUNSHINE REGULATIONS Privacy Act Regulations § 503.1 Definitions—Privacy Act. For the purpose of this part:...

  6. 28 CFR 513.50 - Privacy Act requests by inmates.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... ADMINISTRATION ACCESS TO RECORDS Release of Information Privacy Act Requests for Information § 513.50 Privacy Act requests by inmates. Because inmate records are exempt from disclosure under the Privacy Act (see 28 CFR 16... 28 Judicial Administration 2 2010-07-01 2010-07-01 false Privacy Act requests by inmates....

  7. 12 CFR 40.8 - Revised privacy notices.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 12 Banks and Banking 1 2010-01-01 2010-01-01 false Revised privacy notices. 40.8 Section 40.8 Banks and Banking COMPTROLLER OF THE CURRENCY, DEPARTMENT OF THE TREASURY PRIVACY OF CONSUMER FINANCIAL INFORMATION Privacy and Opt Out Notices § 40.8 Revised privacy notices. (a) General rule. Except as...

  8. Privacy Issues of a National Research and Education Network.

    ERIC Educational Resources Information Center

    Katz, James E.; Graveman, Richard F.

    1991-01-01

    Discussion of the right to privacy of communications focuses on privacy expectations within a National Research and Education Network (NREN). Highlights include privacy needs in scientific and education communications; academic and research networks; network security and privacy concerns; protection strategies; and consequences of privacy…

  9. Fourteen Reasons Privacy Matters: A Multidisciplinary Review of Scholarly Literature

    ERIC Educational Resources Information Center

    Magi, Trina J.

    2011-01-01

    Librarians have long recognized the importance of privacy to intellectual freedom. As digital technology and its applications advance, however, efforts to protect privacy may become increasingly difficult. With some users behaving in ways that suggest they do not care about privacy and with powerful voices claiming that privacy is dead, librarians…

  10. Digital Privacy: Toward a New Politics and Discursive Practice.

    ERIC Educational Resources Information Center

    Doty, Philip

    2001-01-01

    Discussion of privacy focuses on digital environments and a more inclusive understanding of privacy. Highlights include legal and policy conceptions; legislation protecting privacy; relevant Supreme Court cases; torts and privacy; European and other efforts; surveillance and social control; information entrepreneurialism; Jurgen Habermas; free…

  11. A Model Privacy Statement for Ohio Library Web Sites.

    ERIC Educational Resources Information Center

    Monaco, Michael J.

    The purpose of this research was to develop a model privacy policy statement for library World Wide Web sites. First, standards of privacy protection were identified. These standards were culled from the privacy and confidentiality policies of the American Library Association, the Federal Trade Commission's online privacy reports, the guidelines…

  12. 10 CFR 1304.103 - Privacy Act inquiries.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 10 Energy 4 2012-01-01 2012-01-01 false Privacy Act inquiries. 1304.103 Section 1304.103 Energy NUCLEAR WASTE TECHNICAL REVIEW BOARD PRIVACY ACT OF 1974 § 1304.103 Privacy Act inquiries. (a) Requests... writing may be sent to: Privacy Act Officer, U.S. Nuclear Waste Technical Review Board, 2300...

  13. 10 CFR 1304.103 - Privacy Act inquiries.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 10 Energy 4 2011-01-01 2011-01-01 false Privacy Act inquiries. 1304.103 Section 1304.103 Energy NUCLEAR WASTE TECHNICAL REVIEW BOARD PRIVACY ACT OF 1974 § 1304.103 Privacy Act inquiries. (a) Requests... writing may be sent to: Privacy Act Officer, U.S. Nuclear Waste Technical Review Board, 2300...

  14. 10 CFR 1304.103 - Privacy Act inquiries.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 10 Energy 4 2014-01-01 2014-01-01 false Privacy Act inquiries. 1304.103 Section 1304.103 Energy NUCLEAR WASTE TECHNICAL REVIEW BOARD PRIVACY ACT OF 1974 § 1304.103 Privacy Act inquiries. (a) Requests... writing may be sent to: Privacy Act Officer, U.S. Nuclear Waste Technical Review Board, 2300...

  15. 75 FR 52944 - Privacy Act of 1974; System of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-08-30

    ... AGENCY Privacy Act of 1974; System of Records AGENCY: Federal Housing Finance Agency. ACTION: Notice of... Privacy Act of 1974, as amended (Privacy Act), the Federal Housing Finance Agency (FHFA) gives notice of a proposed Privacy Act system of records to replace a system of records issued by FHFA's predecessor...

  16. 78 FR 14290 - Privacy Act of 1974; System of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-03-05

    ... Department of the Air Force Privacy Act of 1974; System of Records AGENCY: Department of the Air Force, DoD... system of records notice in its existing inventory of records systems subject to the Privacy Act of 1974..., Department of the Air Force Privacy Office, Air Force Privacy Act Office, Office of Warfighting...

  17. 75 FR 25870 - DHS Data Privacy and Integrity Advisory Committee

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-05-10

    ... SECURITY Office of the Secretary DHS Data Privacy and Integrity Advisory Committee AGENCY: Privacy Office, DHS. ] ACTION: Notice of Federal Advisory Committee meeting. SUMMARY: The DHS Data Privacy and.... Instructions: All submissions must include the words ``Department of Homeland Security Data Privacy...

  18. Ethics, privacy and the legal framework governing medical data: opportunities or threats for biomedical and public health research?

    PubMed

    Coppieters, Yves; Levêque, Alain

    2013-01-01

    Privacy is an important concern in any research programme that deals with personal medical data. In recent years, ethics and privacy have become key considerations when conducting any form of scientific research that involves personal data. These issues are now addressed in healthcare professional training programmes. Indeed, ethics, legal frameworks and privacy are often the subject of much confusion in discussions among healthcare professionals. They tend to group these different concepts under the same heading and delegate responsibility for "ethical" approval of their research programmes to ethics committees. Public health researchers therefore need to ask questions about how changes to legal frameworks and ethical codes governing privacy in the use of personal medical data are to be applied in practice. What types of data do these laws and codes cover? Who is involved? What restrictions and requirements apply to any research programme that involves medical data?

  19. Privacy and confidentiality of genetic information: what rules for the new science?

    PubMed

    Anderlik, M R; Rothstein, M A

    2001-01-01

    This review covers the ethical, legal, and policy issues associated with the generation and dissemination of genetic information. First, conceptual issues, such as the definition of terms and the description of two modes of analysis, are addressed. Research findings on public attitudes toward privacy and genetics and other factors relevant to policy making are also reviewed. Second, the example of genetic research is used to highlight the importance of attention to the intrinsic harms associated with violations of genetic privacy. Subtopics include national databases and biobanks, gene brokers, and pharmacogenomics. Third, the example of insurer access to genetic information is used to highlight the importance of attention to discrimination and other instrumental harms associated with failures of regulation. Fourth, a summary of the preceding sections leads into an outline of a program for realizing the benefits of the new science in a manner that affirms rather than erodes privacy and other important values.

  20. The study on privacy preserving data mining for information security

    NASA Astrophysics Data System (ADS)

    Li, Xiaohui

    2012-04-01

    Privacy preserving data mining have a rapid development in a short year. But it still faces many challenges in the future. Firstly, the level of privacy has different definitions in different filed. Therefore, the measure of privacy preserving data mining technology protecting private information is not the same. So, it's an urgent issue to present a unified privacy definition and measure. Secondly, the most of research in privacy preserving data mining is presently confined to the theory study.